http.go 2.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596
  1. package inbound
  2. import (
  3. std_bufio "bufio"
  4. "context"
  5. "crypto/tls"
  6. "net"
  7. "github.com/sagernet/sing-box/adapter"
  8. C "github.com/sagernet/sing-box/constant"
  9. "github.com/sagernet/sing-box/log"
  10. "github.com/sagernet/sing-box/option"
  11. "github.com/sagernet/sing/common"
  12. "github.com/sagernet/sing/common/auth"
  13. E "github.com/sagernet/sing/common/exceptions"
  14. M "github.com/sagernet/sing/common/metadata"
  15. N "github.com/sagernet/sing/common/network"
  16. "github.com/sagernet/sing/protocol/http"
  17. )
  18. var _ adapter.Inbound = (*HTTP)(nil)
  19. type HTTP struct {
  20. myInboundAdapter
  21. authenticator auth.Authenticator
  22. tlsConfig *TLSConfig
  23. }
  24. func NewHTTP(ctx context.Context, router adapter.Router, logger log.ContextLogger, tag string, options option.HTTPMixedInboundOptions) (*HTTP, error) {
  25. inbound := &HTTP{
  26. myInboundAdapter: myInboundAdapter{
  27. protocol: C.TypeHTTP,
  28. network: []string{N.NetworkTCP},
  29. ctx: ctx,
  30. router: router,
  31. logger: logger,
  32. tag: tag,
  33. listenOptions: options.ListenOptions,
  34. setSystemProxy: options.SetSystemProxy,
  35. },
  36. authenticator: auth.NewAuthenticator(options.Users),
  37. }
  38. if options.TLS != nil {
  39. tlsConfig, err := NewTLSConfig(logger, common.PtrValueOrDefault(options.TLS))
  40. if err != nil {
  41. return nil, err
  42. }
  43. inbound.tlsConfig = tlsConfig
  44. }
  45. inbound.connHandler = inbound
  46. return inbound, nil
  47. }
  48. func (h *HTTP) Start() error {
  49. if h.tlsConfig != nil {
  50. err := h.tlsConfig.Start()
  51. if err != nil {
  52. return E.Cause(err, "create TLS config")
  53. }
  54. }
  55. return h.myInboundAdapter.Start()
  56. }
  57. func (h *HTTP) Close() error {
  58. return common.Close(
  59. &h.myInboundAdapter,
  60. common.PtrOrNil(h.tlsConfig),
  61. )
  62. }
  63. func (h *HTTP) NewConnection(ctx context.Context, conn net.Conn, metadata adapter.InboundContext) error {
  64. if h.tlsConfig != nil {
  65. conn = tls.Server(conn, h.tlsConfig.Config())
  66. }
  67. return http.HandleConnection(ctx, conn, std_bufio.NewReader(conn), h.authenticator, h.upstreamUserHandler(metadata), M.Metadata{})
  68. }
  69. func (a *myInboundAdapter) upstreamUserHandler(metadata adapter.InboundContext) adapter.UpstreamHandlerAdapter {
  70. return adapter.NewUpstreamHandler(metadata, a.newUserConnection, a.streamUserPacketConnection, a)
  71. }
  72. func (a *myInboundAdapter) newUserConnection(ctx context.Context, conn net.Conn, metadata adapter.InboundContext) error {
  73. user, loaded := auth.UserFromContext[string](ctx)
  74. if !loaded {
  75. a.logger.InfoContext(ctx, "inbound connection to ", metadata.Destination)
  76. return a.router.RouteConnection(ctx, conn, metadata)
  77. }
  78. metadata.User = user
  79. a.logger.InfoContext(ctx, "[", user, "] inbound connection to ", metadata.Destination)
  80. return a.router.RouteConnection(ctx, conn, metadata)
  81. }
  82. func (a *myInboundAdapter) streamUserPacketConnection(ctx context.Context, conn N.PacketConn, metadata adapter.InboundContext) error {
  83. a.logger.InfoContext(ctx, "inbound packet connection to ", metadata.Destination)
  84. return a.router.RoutePacketConnection(ctx, conn, metadata)
  85. }