123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113 |
- package inbound
- import (
- std_bufio "bufio"
- "context"
- "net"
- "os"
- "github.com/sagernet/sing-box/adapter"
- "github.com/sagernet/sing-box/common/tls"
- C "github.com/sagernet/sing-box/constant"
- "github.com/sagernet/sing-box/log"
- "github.com/sagernet/sing-box/option"
- "github.com/sagernet/sing/common"
- "github.com/sagernet/sing/common/auth"
- E "github.com/sagernet/sing/common/exceptions"
- N "github.com/sagernet/sing/common/network"
- "github.com/sagernet/sing/protocol/http"
- )
- var (
- _ adapter.Inbound = (*HTTP)(nil)
- _ adapter.InjectableInbound = (*HTTP)(nil)
- )
- type HTTP struct {
- myInboundAdapter
- authenticator auth.Authenticator
- tlsConfig tls.ServerConfig
- }
- func NewHTTP(ctx context.Context, router adapter.Router, logger log.ContextLogger, tag string, options option.HTTPMixedInboundOptions) (*HTTP, error) {
- inbound := &HTTP{
- myInboundAdapter: myInboundAdapter{
- protocol: C.TypeHTTP,
- network: []string{N.NetworkTCP},
- ctx: ctx,
- router: router,
- logger: logger,
- tag: tag,
- listenOptions: options.ListenOptions,
- setSystemProxy: options.SetSystemProxy,
- },
- authenticator: auth.NewAuthenticator(options.Users),
- }
- if options.TLS != nil {
- tlsConfig, err := tls.NewServer(ctx, router, logger, common.PtrValueOrDefault(options.TLS))
- if err != nil {
- return nil, err
- }
- inbound.tlsConfig = tlsConfig
- }
- inbound.connHandler = inbound
- return inbound, nil
- }
- func (h *HTTP) Start() error {
- if h.tlsConfig != nil {
- err := h.tlsConfig.Start()
- if err != nil {
- return E.Cause(err, "create TLS config")
- }
- }
- return h.myInboundAdapter.Start()
- }
- func (h *HTTP) Close() error {
- return common.Close(
- &h.myInboundAdapter,
- h.tlsConfig,
- )
- }
- func (h *HTTP) NewConnection(ctx context.Context, conn net.Conn, metadata adapter.InboundContext) error {
- var err error
- if h.tlsConfig != nil {
- conn, err = tls.ServerHandshake(ctx, conn, h.tlsConfig)
- if err != nil {
- return err
- }
- }
- return http.HandleConnection(ctx, conn, std_bufio.NewReader(conn), h.authenticator, h.upstreamUserHandler(metadata), adapter.UpstreamMetadata(metadata))
- }
- func (h *HTTP) NewPacketConnection(ctx context.Context, conn N.PacketConn, metadata adapter.InboundContext) error {
- return os.ErrInvalid
- }
- func (a *myInboundAdapter) upstreamUserHandler(metadata adapter.InboundContext) adapter.UpstreamHandlerAdapter {
- return adapter.NewUpstreamHandler(metadata, a.newUserConnection, a.streamUserPacketConnection, a)
- }
- func (a *myInboundAdapter) newUserConnection(ctx context.Context, conn net.Conn, metadata adapter.InboundContext) error {
- user, loaded := auth.UserFromContext[string](ctx)
- if !loaded {
- a.logger.InfoContext(ctx, "inbound connection to ", metadata.Destination)
- return a.router.RouteConnection(ctx, conn, metadata)
- }
- metadata.User = user
- a.logger.InfoContext(ctx, "[", user, "] inbound connection to ", metadata.Destination)
- return a.router.RouteConnection(ctx, conn, metadata)
- }
- func (a *myInboundAdapter) streamUserPacketConnection(ctx context.Context, conn N.PacketConn, metadata adapter.InboundContext) error {
- user, loaded := auth.UserFromContext[string](ctx)
- if !loaded {
- a.logger.InfoContext(ctx, "inbound packet connection to ", metadata.Destination)
- return a.router.RoutePacketConnection(ctx, conn, metadata)
- }
- metadata.User = user
- a.logger.InfoContext(ctx, "[", user, "] inbound packet connection to ", metadata.Destination)
- return a.router.RoutePacketConnection(ctx, conn, metadata)
- }
|