trojan.go 5.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174
  1. package inbound
  2. import (
  3. "context"
  4. "crypto/tls"
  5. "net"
  6. "os"
  7. "github.com/sagernet/sing-box/adapter"
  8. C "github.com/sagernet/sing-box/constant"
  9. "github.com/sagernet/sing-box/log"
  10. "github.com/sagernet/sing-box/option"
  11. "github.com/sagernet/sing-box/transport/v2ray"
  12. "github.com/sagernet/sing/common"
  13. "github.com/sagernet/sing/common/auth"
  14. E "github.com/sagernet/sing/common/exceptions"
  15. F "github.com/sagernet/sing/common/format"
  16. M "github.com/sagernet/sing/common/metadata"
  17. N "github.com/sagernet/sing/common/network"
  18. "github.com/sagernet/sing/protocol/trojan"
  19. )
  20. var _ adapter.Inbound = (*Trojan)(nil)
  21. type Trojan struct {
  22. myInboundAdapter
  23. service *trojan.Service[int]
  24. users []option.TrojanUser
  25. tlsConfig *TLSConfig
  26. fallbackAddr M.Socksaddr
  27. transport adapter.V2RayServerTransport
  28. }
  29. func NewTrojan(ctx context.Context, router adapter.Router, logger log.ContextLogger, tag string, options option.TrojanInboundOptions) (*Trojan, error) {
  30. inbound := &Trojan{
  31. myInboundAdapter: myInboundAdapter{
  32. protocol: C.TypeTrojan,
  33. network: []string{N.NetworkTCP},
  34. ctx: ctx,
  35. router: router,
  36. logger: logger,
  37. tag: tag,
  38. listenOptions: options.ListenOptions,
  39. },
  40. users: options.Users,
  41. }
  42. var fallbackHandler N.TCPConnectionHandler
  43. if options.Fallback != nil && options.Fallback.Server != "" {
  44. inbound.fallbackAddr = options.Fallback.Build()
  45. fallbackHandler = adapter.NewUpstreamContextHandler(inbound.fallbackConnection, nil, nil)
  46. }
  47. service := trojan.NewService[int](adapter.NewUpstreamContextHandler(inbound.newConnection, inbound.newPacketConnection, inbound), fallbackHandler)
  48. err := service.UpdateUsers(common.MapIndexed(options.Users, func(index int, it option.TrojanUser) int {
  49. return index
  50. }), common.Map(options.Users, func(it option.TrojanUser) string {
  51. return it.Password
  52. }))
  53. if err != nil {
  54. return nil, err
  55. }
  56. if options.TLS != nil {
  57. tlsConfig, err := NewTLSConfig(ctx, logger, common.PtrValueOrDefault(options.TLS))
  58. if err != nil {
  59. return nil, err
  60. }
  61. inbound.tlsConfig = tlsConfig
  62. }
  63. if options.Transport != nil {
  64. var tlsConfig *tls.Config
  65. if inbound.tlsConfig != nil {
  66. tlsConfig = inbound.tlsConfig.Config()
  67. }
  68. inbound.transport, err = v2ray.NewServerTransport(ctx, common.PtrValueOrDefault(options.Transport), tlsConfig, adapter.NewUpstreamHandler(adapter.InboundContext{}, inbound.newTransportConnection, nil, nil), inbound)
  69. if err != nil {
  70. return nil, E.Cause(err, "create server transport: ", options.Transport.Type)
  71. }
  72. }
  73. inbound.service = service
  74. inbound.connHandler = inbound
  75. return inbound, nil
  76. }
  77. func (h *Trojan) Start() error {
  78. if h.tlsConfig != nil {
  79. err := h.tlsConfig.Start()
  80. if err != nil {
  81. return E.Cause(err, "create TLS config")
  82. }
  83. }
  84. if h.transport == nil {
  85. return h.myInboundAdapter.Start()
  86. }
  87. if common.Contains(h.transport.Network(), N.NetworkTCP) {
  88. tcpListener, err := h.myInboundAdapter.ListenTCP()
  89. if err != nil {
  90. return err
  91. }
  92. go func() {
  93. sErr := h.transport.Serve(tcpListener)
  94. if sErr != nil && !E.IsClosed(sErr) {
  95. h.logger.Error("transport serve error: ", sErr)
  96. }
  97. }()
  98. }
  99. if common.Contains(h.transport.Network(), N.NetworkUDP) {
  100. udpConn, err := h.myInboundAdapter.ListenUDP()
  101. if err != nil {
  102. return err
  103. }
  104. go func() {
  105. sErr := h.transport.ServePacket(udpConn)
  106. if sErr != nil && !E.IsClosed(sErr) {
  107. h.logger.Error("transport serve error: ", sErr)
  108. }
  109. }()
  110. }
  111. return nil
  112. }
  113. func (h *Trojan) Close() error {
  114. return common.Close(
  115. &h.myInboundAdapter,
  116. common.PtrOrNil(h.tlsConfig),
  117. h.transport,
  118. )
  119. }
  120. func (h *Trojan) NewConnection(ctx context.Context, conn net.Conn, metadata adapter.InboundContext) error {
  121. if h.tlsConfig != nil {
  122. conn = tls.Server(conn, h.tlsConfig.Config())
  123. }
  124. return h.service.NewConnection(adapter.WithContext(log.ContextWithNewID(ctx), &metadata), conn, adapter.UpstreamMetadata(metadata))
  125. }
  126. func (h *Trojan) newTransportConnection(ctx context.Context, conn net.Conn, metadata adapter.InboundContext) error {
  127. metadata = h.createMetadata(conn, metadata)
  128. return h.service.NewConnection(adapter.WithContext(log.ContextWithNewID(ctx), &metadata), conn, adapter.UpstreamMetadata(metadata))
  129. }
  130. func (h *Trojan) newConnection(ctx context.Context, conn net.Conn, metadata adapter.InboundContext) error {
  131. userIndex, loaded := auth.UserFromContext[int](ctx)
  132. if !loaded {
  133. return os.ErrInvalid
  134. }
  135. user := h.users[userIndex].Name
  136. if user == "" {
  137. user = F.ToString(userIndex)
  138. } else {
  139. metadata.User = user
  140. }
  141. h.logger.InfoContext(ctx, "[", user, "] inbound connection to ", metadata.Destination)
  142. return h.router.RouteConnection(ctx, conn, metadata)
  143. }
  144. func (h *Trojan) fallbackConnection(ctx context.Context, conn net.Conn, metadata adapter.InboundContext) error {
  145. h.logger.InfoContext(ctx, "fallback connection to ", h.fallbackAddr)
  146. metadata.Destination = h.fallbackAddr
  147. return h.router.RouteConnection(ctx, conn, metadata)
  148. }
  149. func (h *Trojan) newPacketConnection(ctx context.Context, conn N.PacketConn, metadata adapter.InboundContext) error {
  150. userIndex, loaded := auth.UserFromContext[int](ctx)
  151. if !loaded {
  152. return os.ErrInvalid
  153. }
  154. user := h.users[userIndex].Name
  155. if user == "" {
  156. user = F.ToString(userIndex)
  157. } else {
  158. metadata.User = user
  159. }
  160. h.logger.InfoContext(ctx, "[", user, "] inbound packet connection to ", metadata.Destination)
  161. return h.router.RoutePacketConnection(ctx, conn, metadata)
  162. }