tuic.go 3.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114
  1. //go:build with_quic
  2. package inbound
  3. import (
  4. "context"
  5. "net"
  6. "time"
  7. "github.com/sagernet/sing-box/adapter"
  8. "github.com/sagernet/sing-box/common/tls"
  9. C "github.com/sagernet/sing-box/constant"
  10. "github.com/sagernet/sing-box/log"
  11. "github.com/sagernet/sing-box/option"
  12. "github.com/sagernet/sing-box/transport/tuic"
  13. "github.com/sagernet/sing/common"
  14. "github.com/sagernet/sing/common/auth"
  15. E "github.com/sagernet/sing/common/exceptions"
  16. N "github.com/sagernet/sing/common/network"
  17. "github.com/gofrs/uuid/v5"
  18. )
  19. var _ adapter.Inbound = (*TUIC)(nil)
  20. type TUIC struct {
  21. myInboundAdapter
  22. server *tuic.Server
  23. tlsConfig tls.ServerConfig
  24. }
  25. func NewTUIC(ctx context.Context, router adapter.Router, logger log.ContextLogger, tag string, options option.TUICInboundOptions) (*TUIC, error) {
  26. options.UDPFragmentDefault = true
  27. if options.TLS == nil || !options.TLS.Enabled {
  28. return nil, C.ErrTLSRequired
  29. }
  30. tlsConfig, err := tls.NewServer(ctx, router, logger, common.PtrValueOrDefault(options.TLS))
  31. if err != nil {
  32. return nil, err
  33. }
  34. rawConfig, err := tlsConfig.Config()
  35. if err != nil {
  36. return nil, err
  37. }
  38. var users []tuic.User
  39. for index, user := range options.Users {
  40. if user.UUID == "" {
  41. return nil, E.New("missing uuid for user ", index)
  42. }
  43. userUUID, err := uuid.FromString(user.UUID)
  44. if err != nil {
  45. return nil, E.Cause(err, "invalid uuid for user ", index)
  46. }
  47. users = append(users, tuic.User{Name: user.Name, UUID: userUUID, Password: user.Password})
  48. }
  49. inbound := &TUIC{
  50. myInboundAdapter: myInboundAdapter{
  51. protocol: C.TypeTUIC,
  52. network: []string{N.NetworkUDP},
  53. ctx: ctx,
  54. router: router,
  55. logger: logger,
  56. tag: tag,
  57. listenOptions: options.ListenOptions,
  58. },
  59. }
  60. server, err := tuic.NewServer(tuic.ServerOptions{
  61. Context: ctx,
  62. Logger: logger,
  63. TLSConfig: rawConfig,
  64. Users: users,
  65. CongestionControl: options.CongestionControl,
  66. AuthTimeout: time.Duration(options.AuthTimeout),
  67. ZeroRTTHandshake: options.ZeroRTTHandshake,
  68. Heartbeat: time.Duration(options.Heartbeat),
  69. Handler: adapter.NewUpstreamHandler(adapter.InboundContext{}, inbound.newConnection, inbound.newPacketConnection, nil),
  70. })
  71. if err != nil {
  72. return nil, err
  73. }
  74. inbound.server = server
  75. return inbound, nil
  76. }
  77. func (h *TUIC) newConnection(ctx context.Context, conn net.Conn, metadata adapter.InboundContext) error {
  78. ctx = log.ContextWithNewID(ctx)
  79. h.logger.InfoContext(ctx, "inbound connection to ", metadata.Destination)
  80. metadata = h.createMetadata(conn, metadata)
  81. metadata.User, _ = auth.UserFromContext[string](ctx)
  82. return h.router.RouteConnection(ctx, conn, metadata)
  83. }
  84. func (h *TUIC) newPacketConnection(ctx context.Context, conn N.PacketConn, metadata adapter.InboundContext) error {
  85. ctx = log.ContextWithNewID(ctx)
  86. metadata = h.createPacketMetadata(conn, metadata)
  87. metadata.User, _ = auth.UserFromContext[string](ctx)
  88. h.logger.InfoContext(ctx, "inbound packet connection to ", metadata.Destination)
  89. return h.router.RoutePacketConnection(ctx, conn, metadata)
  90. }
  91. func (h *TUIC) Start() error {
  92. packetConn, err := h.myInboundAdapter.ListenUDP()
  93. if err != nil {
  94. return err
  95. }
  96. return h.server.Start(packetConn)
  97. }
  98. func (h *TUIC) Close() error {
  99. return common.Close(
  100. &h.myInboundAdapter,
  101. common.PtrOrNil(h.server),
  102. )
  103. }