shadowsocks_multi.go 4.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159
  1. package inbound
  2. import (
  3. "context"
  4. "net"
  5. "net/http"
  6. "os"
  7. "github.com/sagernet/sing-box/adapter"
  8. "github.com/sagernet/sing-box/common/pipelistener"
  9. "github.com/sagernet/sing-box/common/trafficcontrol"
  10. C "github.com/sagernet/sing-box/constant"
  11. "github.com/sagernet/sing-box/log"
  12. "github.com/sagernet/sing-box/option"
  13. "github.com/sagernet/sing-shadowsocks/shadowaead_2022"
  14. "github.com/sagernet/sing/common"
  15. "github.com/sagernet/sing/common/auth"
  16. "github.com/sagernet/sing/common/buf"
  17. E "github.com/sagernet/sing/common/exceptions"
  18. F "github.com/sagernet/sing/common/format"
  19. N "github.com/sagernet/sing/common/network"
  20. )
  21. var (
  22. _ adapter.Inbound = (*ShadowsocksMulti)(nil)
  23. _ adapter.InjectableInbound = (*ShadowsocksMulti)(nil)
  24. )
  25. type ShadowsocksMulti struct {
  26. myInboundAdapter
  27. service *shadowaead_2022.MultiService[int]
  28. users []option.ShadowsocksUser
  29. controlEnabled bool
  30. controller *http.Server
  31. controllerPipe *pipelistener.Listener
  32. trafficManager *trafficcontrol.Manager[int]
  33. }
  34. func newShadowsocksMulti(ctx context.Context, router adapter.Router, logger log.ContextLogger, tag string, options option.ShadowsocksInboundOptions) (*ShadowsocksMulti, error) {
  35. inbound := &ShadowsocksMulti{
  36. myInboundAdapter: myInboundAdapter{
  37. protocol: C.TypeShadowsocks,
  38. network: options.Network.Build(),
  39. ctx: ctx,
  40. router: router,
  41. logger: logger,
  42. tag: tag,
  43. listenOptions: options.ListenOptions,
  44. },
  45. }
  46. inbound.connHandler = inbound
  47. inbound.packetHandler = inbound
  48. var udpTimeout int64
  49. if options.UDPTimeout != 0 {
  50. udpTimeout = options.UDPTimeout
  51. } else {
  52. udpTimeout = int64(C.UDPTimeout.Seconds())
  53. }
  54. service, err := shadowaead_2022.NewMultiServiceWithPassword[int](
  55. options.Method,
  56. options.Password,
  57. udpTimeout,
  58. adapter.NewUpstreamContextHandler(inbound.newConnection, inbound.newPacketConnection, inbound),
  59. )
  60. users := options.Users
  61. if options.ControlPassword != "" {
  62. inbound.controlEnabled = true
  63. users = append([]option.ShadowsocksUser{{
  64. Name: "control",
  65. Password: options.ControlPassword,
  66. }}, users...)
  67. inbound.controller = &http.Server{Handler: inbound.createHandler()}
  68. inbound.trafficManager = trafficcontrol.NewManager[int]()
  69. }
  70. if err != nil {
  71. return nil, err
  72. }
  73. err = service.UpdateUsersWithPasswords(common.MapIndexed(users, func(index int, user option.ShadowsocksUser) int {
  74. return index
  75. }), common.Map(options.Users, func(user option.ShadowsocksUser) string {
  76. return user.Password
  77. }))
  78. if err != nil {
  79. return nil, err
  80. }
  81. inbound.service = service
  82. inbound.packetUpstream = service
  83. inbound.users = users
  84. return inbound, err
  85. }
  86. func (h *ShadowsocksMulti) Start() error {
  87. if h.controlEnabled {
  88. h.controllerPipe = pipelistener.New(16)
  89. go func() {
  90. err := h.controller.Serve(h.controllerPipe)
  91. if err != nil {
  92. h.newError(E.Cause(err, "controller serve error"))
  93. }
  94. }()
  95. }
  96. return h.myInboundAdapter.Start()
  97. }
  98. func (h *ShadowsocksMulti) Close() error {
  99. if h.controlEnabled {
  100. h.controllerPipe.Close()
  101. }
  102. return h.myInboundAdapter.Close()
  103. }
  104. func (h *ShadowsocksMulti) NewConnection(ctx context.Context, conn net.Conn, metadata adapter.InboundContext) error {
  105. return h.service.NewConnection(adapter.WithContext(log.ContextWithNewID(ctx), &metadata), conn, adapter.UpstreamMetadata(metadata))
  106. }
  107. func (h *ShadowsocksMulti) NewPacket(ctx context.Context, conn N.PacketConn, buffer *buf.Buffer, metadata adapter.InboundContext) error {
  108. return h.service.NewPacket(adapter.WithContext(ctx, &metadata), conn, buffer, adapter.UpstreamMetadata(metadata))
  109. }
  110. func (h *ShadowsocksMulti) NewPacketConnection(ctx context.Context, conn N.PacketConn, metadata adapter.InboundContext) error {
  111. return os.ErrInvalid
  112. }
  113. func (h *ShadowsocksMulti) newConnection(ctx context.Context, conn net.Conn, metadata adapter.InboundContext) error {
  114. userIndex, loaded := auth.UserFromContext[int](ctx)
  115. if !loaded {
  116. return os.ErrInvalid
  117. }
  118. if userIndex == 0 && h.controlEnabled {
  119. h.logger.InfoContext(ctx, "inbound control connection")
  120. h.controllerPipe.Serve(conn)
  121. return nil
  122. }
  123. user := h.users[userIndex].Name
  124. if user == "" {
  125. user = F.ToString(userIndex)
  126. } else {
  127. metadata.User = user
  128. }
  129. h.logger.InfoContext(ctx, "[", user, "] inbound connection to ", metadata.Destination)
  130. return h.router.RouteConnection(ctx, conn, metadata)
  131. }
  132. func (h *ShadowsocksMulti) newPacketConnection(ctx context.Context, conn N.PacketConn, metadata adapter.InboundContext) error {
  133. userIndex, loaded := auth.UserFromContext[int](ctx)
  134. if !loaded {
  135. return os.ErrInvalid
  136. }
  137. user := h.users[userIndex].Name
  138. if user == "" {
  139. user = F.ToString(userIndex)
  140. } else {
  141. metadata.User = user
  142. }
  143. ctx = log.ContextWithNewID(ctx)
  144. h.logger.InfoContext(ctx, "[", user, "] inbound packet connection from ", metadata.Source)
  145. h.logger.InfoContext(ctx, "[", user, "] inbound packet connection to ", metadata.Destination)
  146. return h.router.RoutePacketConnection(ctx, conn, metadata)
  147. }