123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102 |
- package inbound
- import (
- "context"
- "net"
- "github.com/sagernet/sing-box/adapter"
- "github.com/sagernet/sing-box/common/dialer"
- C "github.com/sagernet/sing-box/constant"
- "github.com/sagernet/sing-box/log"
- "github.com/sagernet/sing-box/option"
- "github.com/sagernet/sing-shadowtls"
- "github.com/sagernet/sing/common"
- "github.com/sagernet/sing/common/auth"
- E "github.com/sagernet/sing/common/exceptions"
- N "github.com/sagernet/sing/common/network"
- )
- type ShadowTLS struct {
- myInboundAdapter
- service *shadowtls.Service
- }
- func NewShadowTLS(ctx context.Context, router adapter.Router, logger log.ContextLogger, tag string, options option.ShadowTLSInboundOptions) (*ShadowTLS, error) {
- inbound := &ShadowTLS{
- myInboundAdapter: myInboundAdapter{
- protocol: C.TypeShadowTLS,
- network: []string{N.NetworkTCP},
- ctx: ctx,
- router: router,
- logger: logger,
- tag: tag,
- listenOptions: options.ListenOptions,
- },
- }
- if options.Version == 0 {
- options.Version = 1
- }
- var handshakeForServerName map[string]shadowtls.HandshakeConfig
- if options.Version > 1 {
- handshakeForServerName = make(map[string]shadowtls.HandshakeConfig)
- for serverName, serverOptions := range options.HandshakeForServerName {
- handshakeDialer, err := dialer.New(router, serverOptions.DialerOptions)
- if err != nil {
- return nil, err
- }
- handshakeForServerName[serverName] = shadowtls.HandshakeConfig{
- Server: serverOptions.ServerOptions.Build(),
- Dialer: handshakeDialer,
- }
- }
- }
- handshakeDialer, err := dialer.New(router, options.Handshake.DialerOptions)
- if err != nil {
- return nil, err
- }
- service, err := shadowtls.NewService(shadowtls.ServiceConfig{
- Version: options.Version,
- Password: options.Password,
- Users: common.Map(options.Users, func(it option.ShadowTLSUser) shadowtls.User {
- return (shadowtls.User)(it)
- }),
- Handshake: shadowtls.HandshakeConfig{
- Server: options.Handshake.ServerOptions.Build(),
- Dialer: handshakeDialer,
- },
- HandshakeForServerName: handshakeForServerName,
- StrictMode: options.StrictMode,
- Handler: adapter.NewUpstreamContextHandler(inbound.newConnection, nil, inbound),
- Logger: logger,
- })
- if err != nil {
- return nil, err
- }
- inbound.service = service
- inbound.connHandler = inbound
- return inbound, nil
- }
- func (h *ShadowTLS) NewConnection(ctx context.Context, conn net.Conn, metadata adapter.InboundContext) error {
- return h.service.NewConnection(adapter.WithContext(log.ContextWithNewID(ctx), &metadata), conn, adapter.UpstreamMetadata(metadata))
- }
- func (h *ShadowTLS) newConnection(ctx context.Context, conn net.Conn, metadata adapter.InboundContext) error {
- if userName, _ := auth.UserFromContext[string](ctx); userName != "" {
- metadata.User = userName
- h.logger.InfoContext(ctx, "[", userName, "] inbound connection to ", metadata.Destination)
- } else {
- h.logger.InfoContext(ctx, "inbound connection to ", metadata.Destination)
- }
- return h.router.RouteConnection(ctx, conn, metadata)
- }
- func (h *ShadowTLS) NewConnectionEx(ctx context.Context, conn net.Conn, metadata adapter.InboundContext, onClose N.CloseHandlerFunc) {
- err := h.NewConnection(ctx, conn, metadata)
- N.CloseOnHandshakeFailure(conn, onClose, err)
- if err != nil {
- h.logger.ErrorContext(ctx, E.Cause(err, "process connection from ", metadata.Source))
- }
- }
|