outbound.go 4.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150
  1. package trojan
  2. import (
  3. "context"
  4. "net"
  5. "github.com/sagernet/sing-box/adapter"
  6. "github.com/sagernet/sing-box/adapter/outbound"
  7. "github.com/sagernet/sing-box/common/dialer"
  8. "github.com/sagernet/sing-box/common/mux"
  9. "github.com/sagernet/sing-box/common/tls"
  10. C "github.com/sagernet/sing-box/constant"
  11. "github.com/sagernet/sing-box/log"
  12. "github.com/sagernet/sing-box/option"
  13. "github.com/sagernet/sing-box/transport/trojan"
  14. "github.com/sagernet/sing-box/transport/v2ray"
  15. "github.com/sagernet/sing/common"
  16. "github.com/sagernet/sing/common/bufio"
  17. E "github.com/sagernet/sing/common/exceptions"
  18. "github.com/sagernet/sing/common/logger"
  19. M "github.com/sagernet/sing/common/metadata"
  20. N "github.com/sagernet/sing/common/network"
  21. )
  22. func RegisterOutbound(registry *outbound.Registry) {
  23. outbound.Register[option.TrojanOutboundOptions](registry, C.TypeTrojan, NewOutbound)
  24. }
  25. type Outbound struct {
  26. outbound.Adapter
  27. logger logger.ContextLogger
  28. dialer N.Dialer
  29. serverAddr M.Socksaddr
  30. key [56]byte
  31. multiplexDialer *mux.Client
  32. tlsConfig tls.Config
  33. transport adapter.V2RayClientTransport
  34. }
  35. func NewOutbound(ctx context.Context, router adapter.Router, logger log.ContextLogger, tag string, options option.TrojanOutboundOptions) (adapter.Outbound, error) {
  36. outboundDialer, err := dialer.New(ctx, options.DialerOptions, options.ServerIsDomain())
  37. if err != nil {
  38. return nil, err
  39. }
  40. outbound := &Outbound{
  41. Adapter: outbound.NewAdapterWithDialerOptions(C.TypeTrojan, tag, options.Network.Build(), options.DialerOptions),
  42. logger: logger,
  43. dialer: outboundDialer,
  44. serverAddr: options.ServerOptions.Build(),
  45. key: trojan.Key(options.Password),
  46. }
  47. if options.TLS != nil {
  48. outbound.tlsConfig, err = tls.NewClient(ctx, options.Server, common.PtrValueOrDefault(options.TLS))
  49. if err != nil {
  50. return nil, err
  51. }
  52. }
  53. if options.Transport != nil {
  54. outbound.transport, err = v2ray.NewClientTransport(ctx, outbound.dialer, outbound.serverAddr, common.PtrValueOrDefault(options.Transport), outbound.tlsConfig)
  55. if err != nil {
  56. return nil, E.Cause(err, "create client transport: ", options.Transport.Type)
  57. }
  58. }
  59. outbound.multiplexDialer, err = mux.NewClientWithOptions((*trojanDialer)(outbound), logger, common.PtrValueOrDefault(options.Multiplex))
  60. if err != nil {
  61. return nil, err
  62. }
  63. return outbound, nil
  64. }
  65. func (h *Outbound) DialContext(ctx context.Context, network string, destination M.Socksaddr) (net.Conn, error) {
  66. if h.multiplexDialer == nil {
  67. switch N.NetworkName(network) {
  68. case N.NetworkTCP:
  69. h.logger.InfoContext(ctx, "outbound connection to ", destination)
  70. case N.NetworkUDP:
  71. h.logger.InfoContext(ctx, "outbound packet connection to ", destination)
  72. }
  73. return (*trojanDialer)(h).DialContext(ctx, network, destination)
  74. } else {
  75. switch N.NetworkName(network) {
  76. case N.NetworkTCP:
  77. h.logger.InfoContext(ctx, "outbound multiplex connection to ", destination)
  78. case N.NetworkUDP:
  79. h.logger.InfoContext(ctx, "outbound multiplex packet connection to ", destination)
  80. }
  81. return h.multiplexDialer.DialContext(ctx, network, destination)
  82. }
  83. }
  84. func (h *Outbound) ListenPacket(ctx context.Context, destination M.Socksaddr) (net.PacketConn, error) {
  85. if h.multiplexDialer == nil {
  86. h.logger.InfoContext(ctx, "outbound packet connection to ", destination)
  87. return (*trojanDialer)(h).ListenPacket(ctx, destination)
  88. } else {
  89. h.logger.InfoContext(ctx, "outbound multiplex packet connection to ", destination)
  90. return h.multiplexDialer.ListenPacket(ctx, destination)
  91. }
  92. }
  93. func (h *Outbound) InterfaceUpdated() {
  94. if h.transport != nil {
  95. h.transport.Close()
  96. }
  97. if h.multiplexDialer != nil {
  98. h.multiplexDialer.Reset()
  99. }
  100. }
  101. func (h *Outbound) Close() error {
  102. return common.Close(common.PtrOrNil(h.multiplexDialer), h.transport)
  103. }
  104. type trojanDialer Outbound
  105. func (h *trojanDialer) DialContext(ctx context.Context, network string, destination M.Socksaddr) (net.Conn, error) {
  106. ctx, metadata := adapter.ExtendContext(ctx)
  107. metadata.Outbound = h.Tag()
  108. metadata.Destination = destination
  109. var conn net.Conn
  110. var err error
  111. if h.transport != nil {
  112. conn, err = h.transport.DialContext(ctx)
  113. } else {
  114. conn, err = h.dialer.DialContext(ctx, N.NetworkTCP, h.serverAddr)
  115. if err == nil && h.tlsConfig != nil {
  116. conn, err = tls.ClientHandshake(ctx, conn, h.tlsConfig)
  117. }
  118. }
  119. if err != nil {
  120. common.Close(conn)
  121. return nil, err
  122. }
  123. switch N.NetworkName(network) {
  124. case N.NetworkTCP:
  125. return trojan.NewClientConn(conn, h.key, destination), nil
  126. case N.NetworkUDP:
  127. return bufio.NewBindPacketConn(trojan.NewClientPacketConn(conn, h.key), destination), nil
  128. default:
  129. return nil, E.Extend(N.ErrUnknownNetwork, network)
  130. }
  131. }
  132. func (h *trojanDialer) ListenPacket(ctx context.Context, destination M.Socksaddr) (net.PacketConn, error) {
  133. conn, err := h.DialContext(ctx, N.NetworkUDP, destination)
  134. if err != nil {
  135. return nil, err
  136. }
  137. return conn.(net.PacketConn), nil
  138. }