123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259 |
- package trojan
- import (
- "context"
- "net"
- "os"
- "github.com/sagernet/sing-box/adapter"
- "github.com/sagernet/sing-box/adapter/inbound"
- "github.com/sagernet/sing-box/common/listener"
- "github.com/sagernet/sing-box/common/mux"
- "github.com/sagernet/sing-box/common/tls"
- C "github.com/sagernet/sing-box/constant"
- "github.com/sagernet/sing-box/log"
- "github.com/sagernet/sing-box/option"
- "github.com/sagernet/sing-box/transport/trojan"
- "github.com/sagernet/sing-box/transport/v2ray"
- "github.com/sagernet/sing/common"
- "github.com/sagernet/sing/common/auth"
- E "github.com/sagernet/sing/common/exceptions"
- F "github.com/sagernet/sing/common/format"
- M "github.com/sagernet/sing/common/metadata"
- N "github.com/sagernet/sing/common/network"
- )
- func RegisterInbound(registry *inbound.Registry) {
- inbound.Register[option.TrojanInboundOptions](registry, C.TypeTrojan, NewInbound)
- }
- var _ adapter.TCPInjectableInbound = (*Inbound)(nil)
- type Inbound struct {
- inbound.Adapter
- router adapter.ConnectionRouterEx
- logger log.ContextLogger
- listener *listener.Listener
- service *trojan.Service[int]
- users []option.TrojanUser
- tlsConfig tls.ServerConfig
- fallbackAddr M.Socksaddr
- fallbackAddrTLSNextProto map[string]M.Socksaddr
- transport adapter.V2RayServerTransport
- }
- func NewInbound(ctx context.Context, router adapter.Router, logger log.ContextLogger, tag string, options option.TrojanInboundOptions) (adapter.Inbound, error) {
- inbound := &Inbound{
- Adapter: inbound.NewAdapter(C.TypeTrojan, tag),
- router: router,
- logger: logger,
- users: options.Users,
- }
- if options.TLS != nil {
- tlsConfig, err := tls.NewServer(ctx, logger, common.PtrValueOrDefault(options.TLS))
- if err != nil {
- return nil, err
- }
- inbound.tlsConfig = tlsConfig
- }
- var fallbackHandler N.TCPConnectionHandler
- if options.Fallback != nil && options.Fallback.Server != "" || len(options.FallbackForALPN) > 0 {
- if options.Fallback != nil && options.Fallback.Server != "" {
- inbound.fallbackAddr = options.Fallback.Build()
- if !inbound.fallbackAddr.IsValid() {
- return nil, E.New("invalid fallback address: ", inbound.fallbackAddr)
- }
- }
- if len(options.FallbackForALPN) > 0 {
- if inbound.tlsConfig == nil {
- return nil, E.New("fallback for ALPN is not supported without TLS")
- }
- fallbackAddrNextProto := make(map[string]M.Socksaddr)
- for nextProto, destination := range options.FallbackForALPN {
- fallbackAddr := destination.Build()
- if !fallbackAddr.IsValid() {
- return nil, E.New("invalid fallback address for ALPN ", nextProto, ": ", fallbackAddr)
- }
- fallbackAddrNextProto[nextProto] = fallbackAddr
- }
- inbound.fallbackAddrTLSNextProto = fallbackAddrNextProto
- }
- fallbackHandler = adapter.NewUpstreamContextHandler(inbound.fallbackConnection, nil, nil)
- }
- service := trojan.NewService[int](adapter.NewUpstreamContextHandler(inbound.newConnection, inbound.newPacketConnection, nil), fallbackHandler, logger)
- err := service.UpdateUsers(common.MapIndexed(options.Users, func(index int, it option.TrojanUser) int {
- return index
- }), common.Map(options.Users, func(it option.TrojanUser) string {
- return it.Password
- }))
- if err != nil {
- return nil, err
- }
- if options.Transport != nil {
- inbound.transport, err = v2ray.NewServerTransport(ctx, logger, common.PtrValueOrDefault(options.Transport), inbound.tlsConfig, (*inboundTransportHandler)(inbound))
- if err != nil {
- return nil, E.Cause(err, "create server transport: ", options.Transport.Type)
- }
- }
- inbound.router, err = mux.NewRouterWithOptions(inbound.router, logger, common.PtrValueOrDefault(options.Multiplex))
- if err != nil {
- return nil, err
- }
- inbound.service = service
- inbound.listener = listener.New(listener.Options{
- Context: ctx,
- Logger: logger,
- Network: []string{N.NetworkTCP},
- Listen: options.ListenOptions,
- ConnectionHandler: inbound,
- })
- return inbound, nil
- }
- func (h *Inbound) Start(stage adapter.StartStage) error {
- if stage != adapter.StartStateStart {
- return nil
- }
- if h.tlsConfig != nil {
- err := h.tlsConfig.Start()
- if err != nil {
- return E.Cause(err, "create TLS config")
- }
- }
- if h.transport == nil {
- return h.listener.Start()
- }
- if common.Contains(h.transport.Network(), N.NetworkTCP) {
- tcpListener, err := h.listener.ListenTCP()
- if err != nil {
- return err
- }
- go func() {
- sErr := h.transport.Serve(tcpListener)
- if sErr != nil && !E.IsClosed(sErr) {
- h.logger.Error("transport serve error: ", sErr)
- }
- }()
- }
- if common.Contains(h.transport.Network(), N.NetworkUDP) {
- udpConn, err := h.listener.ListenUDP()
- if err != nil {
- return err
- }
- go func() {
- sErr := h.transport.ServePacket(udpConn)
- if sErr != nil && !E.IsClosed(sErr) {
- h.logger.Error("transport serve error: ", sErr)
- }
- }()
- }
- return nil
- }
- func (h *Inbound) Close() error {
- return common.Close(
- h.listener,
- h.tlsConfig,
- h.transport,
- )
- }
- func (h *Inbound) NewConnection(ctx context.Context, conn net.Conn, metadata adapter.InboundContext) error {
- var err error
- if h.tlsConfig != nil && h.transport == nil {
- conn, err = tls.ServerHandshake(ctx, conn, h.tlsConfig)
- if err != nil {
- return err
- }
- }
- return h.service.NewConnection(adapter.WithContext(ctx, &metadata), conn, adapter.UpstreamMetadata(metadata))
- }
- func (h *Inbound) NewConnectionEx(ctx context.Context, conn net.Conn, metadata adapter.InboundContext, onClose N.CloseHandlerFunc) {
- err := h.NewConnection(ctx, conn, metadata)
- N.CloseOnHandshakeFailure(conn, onClose, err)
- if err != nil {
- if E.IsClosedOrCanceled(err) {
- h.logger.DebugContext(ctx, "connection closed: ", err)
- } else {
- h.logger.ErrorContext(ctx, E.Cause(err, "process connection from ", metadata.Source))
- }
- }
- }
- func (h *Inbound) newConnection(ctx context.Context, conn net.Conn, metadata adapter.InboundContext) error {
- metadata.Inbound = h.Tag()
- metadata.InboundType = h.Type()
- metadata.InboundDetour = h.listener.ListenOptions().Detour
- metadata.InboundOptions = h.listener.ListenOptions().InboundOptions
- userIndex, loaded := auth.UserFromContext[int](ctx)
- if !loaded {
- return os.ErrInvalid
- }
- user := h.users[userIndex].Name
- if user == "" {
- user = F.ToString(userIndex)
- } else {
- metadata.User = user
- }
- h.logger.InfoContext(ctx, "[", user, "] inbound connection to ", metadata.Destination)
- return h.router.RouteConnection(ctx, conn, metadata)
- }
- func (h *Inbound) fallbackConnection(ctx context.Context, conn net.Conn, metadata adapter.InboundContext) error {
- var fallbackAddr M.Socksaddr
- if len(h.fallbackAddrTLSNextProto) > 0 {
- if tlsConn, loaded := common.Cast[tls.Conn](conn); loaded {
- connectionState := tlsConn.ConnectionState()
- if connectionState.NegotiatedProtocol != "" {
- if fallbackAddr, loaded = h.fallbackAddrTLSNextProto[connectionState.NegotiatedProtocol]; !loaded {
- return E.New("fallback disabled for ALPN: ", connectionState.NegotiatedProtocol)
- }
- }
- }
- }
- if !fallbackAddr.IsValid() {
- if !h.fallbackAddr.IsValid() {
- return E.New("fallback disabled by default")
- }
- fallbackAddr = h.fallbackAddr
- }
- metadata.Inbound = h.Tag()
- metadata.InboundType = h.Type()
- metadata.InboundDetour = h.listener.ListenOptions().Detour
- metadata.InboundOptions = h.listener.ListenOptions().InboundOptions
- h.logger.InfoContext(ctx, "fallback connection to ", fallbackAddr)
- metadata.Destination = fallbackAddr
- return h.router.RouteConnection(ctx, conn, metadata)
- }
- func (h *Inbound) newPacketConnection(ctx context.Context, conn N.PacketConn, metadata adapter.InboundContext) error {
- metadata.Inbound = h.Tag()
- metadata.InboundType = h.Type()
- metadata.InboundDetour = h.listener.ListenOptions().Detour
- metadata.InboundOptions = h.listener.ListenOptions().InboundOptions
- userIndex, loaded := auth.UserFromContext[int](ctx)
- if !loaded {
- return os.ErrInvalid
- }
- user := h.users[userIndex].Name
- if user == "" {
- user = F.ToString(userIndex)
- } else {
- metadata.User = user
- }
- h.logger.InfoContext(ctx, "[", user, "] inbound packet connection to ", metadata.Destination)
- return h.router.RoutePacketConnection(ctx, conn, metadata)
- }
- var _ adapter.V2RayServerTransportHandler = (*inboundTransportHandler)(nil)
- type inboundTransportHandler Inbound
- func (h *inboundTransportHandler) NewConnectionEx(ctx context.Context, conn net.Conn, source M.Socksaddr, destination M.Socksaddr, onClose N.CloseHandlerFunc) {
- var metadata adapter.InboundContext
- metadata.Source = source
- metadata.Destination = destination
- h.logger.InfoContext(ctx, "inbound connection from ", metadata.Source)
- (*Inbound)(h).NewConnectionEx(ctx, conn, metadata, onClose)
- }
|