-
Notifications
You must be signed in to change notification settings - Fork 24.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Major update: port mapping, vless outbound, and more #190
base: main
Are you sure you want to change the base?
Conversation
via env.LOGPOST
Check: Domain names that only resolves to AAAA may not work with UDP
Your verison lost an important logic compared with original version. In order to resolve the worker issue that socket is not allowed to connect to Cloudflare IPs, the original version make a judgement in L201. Only if the destination website is proxied by Cloudflare, the worker will try to redirect by proxyIP/socks5. In your version, firstly, if I only set the global config as forward outbound protocol and ENV is empty, the code Secondly, after the code was commented out and outbound protocol was set as |
This feature was inherented. The rule of thumb here is that, it will only move on to the next outbound if the previous one fails.
You are right, that is the intended behavior.
If you are an advanced user, of course you can customize the code and comment out the call to setConfigFromEnv. However, it seems that you removed the "freedom" outbound and only leave the "forward" outbound there, which is still a valid config, but it will not follow your intention. In your case, you need to keep both freedom and forward in your outbound. Furthermore, the sequence matters. |
Yes, you are right. Another issue is that the format of After doing this, everything works perfectly. |
Hi, I set the value of VLEES in the Workers environment variable to vless://[email protected]:port?type=tcp&security=tls |
I have tried SOCKS5 and it works, but VLESS can't work properly. |
I suspect your VLESS server is not running on port 443 or port 80. Cloudflare Worker runtime has imposed outbound port restrictions where a TLS (WebSocket secured) outbound request must be made on port 443, and a non-TLS (plain WebSocket) outbound request must be made on port 80. Due to these restrictions, chaining to a VLESS server not running on port 80 (ws) or 443 (wss) won't work. See: https://community.cloudflare.com/t/port-forwarding-with-worker/528002 |
Add a port map to allow the use of non-standard proxy ports:
For example, the above setup will redirect requests originally targeting port 443 to 8443. Similar redirection works for port 80 as well (redirect to proxyIP:8080).
Note: the keys in a JSON must be strings.
"443":8443
is valid but443:8443
is not.To use it, you need to set "PORTMAP" environmental to a JSON like the above example, it will only be valid if "PROXYIP" is set.
Add VLESS outbound
To use it, you need to set "VLESS" environmental to a standard Vless sharing link.
Cloudflare Worker runtime has imposed outbound port restrictions where a TLS (WebSocket secured) outbound request must be made on port 443, and a non-TLS (plain WebSocket) outbound request must be made on port 80. Due to these restrictions, chaining to a VLESS server not running on port 80 (ws) or 443 (wss) won't work.
See: https://community.cloudflare.com/t/port-forwarding-with-worker/528002
Support UDP outbound
Fallback mechanism
When handling outbound, the program goes through outbounds defined in
globalConfig.outbounds
sequencially. If one fails, the next outbound (if any) will be tried, until it reaches the end of the outbound chain.globalConfig.outbounds
is similar to theoutbounds
object in a standard ?ray config file, but with some limitations:protocol: forward
: our addon, used to forward the outbound TCP traffic directly to a proxy server.If run on a CF Worker, the resultant outbound sequence will be
Direct (via worker), Forward (via PROXYIP, PORTMAP applies), VLESS, SOCKS
, seesetConfigFromEnv()
. If a certain environmental variable is not set, the corresponding outbound will be skipped. Note that Direct outbound will always exist and will be attempted first.Abstract worker-vless.js, allow it to be used as a module elsewhere or deploy it locally, see "node/index.js".
It exposes a number of functions and interfaces to be used in an external launcher:
platformAPI
: defines how to create TCP/Websocket/UDP connection in each platform, required to set if not run on CF Workers.globalConfig
: all configurations, such as UUID, outbound methods.setConfigFromEnv
: a simplifer way of setting outbound, the caller should pass a JSON which may contain PROXYIP, PORTMAP, VLESS, and SOCKS string fields.vlessOverWSHandler(webSocket, earlyDataHeader)
: Process an accepted "webSocket" connection, should be called when a new Websocket connection is established. "webSocket" is a Nodejs WS-compatible object, it must be an accepted one before calling this function. "earlyDataHeader" is a base64 string for ws 0rtt, its value comes from an optional field "sec-websocket-protocol" in the request header.getVLESSConfig(hostName)
: Return a human-readable webpage, describing the client config. "getVLESSConfig" now uses the latest active UUID.redirectConsoleLog(logServer, instanceId)
: Call this function to mirrorconsole.log
and POST it to a HTTP(s) server, setLOGPOST
environmental variable in CF Worker to use this function.logServer
is the URL,instanceId
can be an UUID or a random number.Using the provided wrapper to run in NodeJS only requires the ws library (see "node/setup.sh"), no need to install wrangler or other dependencies.