inbound.go 4.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142
  1. package shadowtls
  2. import (
  3. "context"
  4. "net"
  5. "github.com/sagernet/sing-box/adapter"
  6. "github.com/sagernet/sing-box/adapter/inbound"
  7. "github.com/sagernet/sing-box/common/dialer"
  8. "github.com/sagernet/sing-box/common/listener"
  9. C "github.com/sagernet/sing-box/constant"
  10. "github.com/sagernet/sing-box/log"
  11. "github.com/sagernet/sing-box/option"
  12. "github.com/sagernet/sing-shadowtls"
  13. "github.com/sagernet/sing/common"
  14. "github.com/sagernet/sing/common/auth"
  15. E "github.com/sagernet/sing/common/exceptions"
  16. "github.com/sagernet/sing/common/logger"
  17. M "github.com/sagernet/sing/common/metadata"
  18. N "github.com/sagernet/sing/common/network"
  19. )
  20. func RegisterInbound(registry *inbound.Registry) {
  21. inbound.Register[option.ShadowTLSInboundOptions](registry, C.TypeShadowTLS, NewInbound)
  22. }
  23. type Inbound struct {
  24. inbound.Adapter
  25. router adapter.Router
  26. logger logger.ContextLogger
  27. listener *listener.Listener
  28. service *shadowtls.Service
  29. }
  30. func NewInbound(ctx context.Context, router adapter.Router, logger log.ContextLogger, tag string, options option.ShadowTLSInboundOptions) (adapter.Inbound, error) {
  31. inbound := &Inbound{
  32. Adapter: inbound.NewAdapter(C.TypeShadowTLS, tag),
  33. router: router,
  34. logger: logger,
  35. }
  36. if options.Version == 0 {
  37. options.Version = 1
  38. }
  39. var handshakeForServerName map[string]shadowtls.HandshakeConfig
  40. if options.Version > 1 {
  41. handshakeForServerName = make(map[string]shadowtls.HandshakeConfig)
  42. if options.HandshakeForServerName != nil {
  43. for _, entry := range options.HandshakeForServerName.Entries() {
  44. handshakeDialer, err := dialer.New(ctx, entry.Value.DialerOptions, entry.Value.ServerIsDomain())
  45. if err != nil {
  46. return nil, err
  47. }
  48. handshakeForServerName[entry.Key] = shadowtls.HandshakeConfig{
  49. Server: entry.Value.ServerOptions.Build(),
  50. Dialer: handshakeDialer,
  51. }
  52. }
  53. }
  54. }
  55. serverIsDomain := options.Handshake.ServerIsDomain()
  56. if options.WildcardSNI != option.ShadowTLSWildcardSNIOff {
  57. serverIsDomain = true
  58. }
  59. handshakeDialer, err := dialer.New(ctx, options.Handshake.DialerOptions, serverIsDomain)
  60. if err != nil {
  61. return nil, err
  62. }
  63. service, err := shadowtls.NewService(shadowtls.ServiceConfig{
  64. Version: options.Version,
  65. Password: options.Password,
  66. Users: common.Map(options.Users, func(it option.ShadowTLSUser) shadowtls.User {
  67. return (shadowtls.User)(it)
  68. }),
  69. Handshake: shadowtls.HandshakeConfig{
  70. Server: options.Handshake.ServerOptions.Build(),
  71. Dialer: handshakeDialer,
  72. },
  73. HandshakeForServerName: handshakeForServerName,
  74. StrictMode: options.StrictMode,
  75. WildcardSNI: shadowtls.WildcardSNI(options.WildcardSNI),
  76. Handler: (*inboundHandler)(inbound),
  77. Logger: logger,
  78. })
  79. if err != nil {
  80. return nil, err
  81. }
  82. inbound.service = service
  83. inbound.listener = listener.New(listener.Options{
  84. Context: ctx,
  85. Logger: logger,
  86. Network: []string{N.NetworkTCP},
  87. Listen: options.ListenOptions,
  88. ConnectionHandler: inbound,
  89. })
  90. return inbound, nil
  91. }
  92. func (h *Inbound) Start(stage adapter.StartStage) error {
  93. if stage != adapter.StartStateStart {
  94. return nil
  95. }
  96. return h.listener.Start()
  97. }
  98. func (h *Inbound) Close() error {
  99. return h.listener.Close()
  100. }
  101. func (h *Inbound) NewConnectionEx(ctx context.Context, conn net.Conn, metadata adapter.InboundContext, onClose N.CloseHandlerFunc) {
  102. err := h.service.NewConnection(adapter.WithContext(log.ContextWithNewID(ctx), &metadata), conn, metadata.Source, metadata.Destination, onClose)
  103. N.CloseOnHandshakeFailure(conn, onClose, err)
  104. if err != nil {
  105. if E.IsClosedOrCanceled(err) {
  106. h.logger.DebugContext(ctx, "connection closed: ", err)
  107. } else {
  108. h.logger.ErrorContext(ctx, E.Cause(err, "process connection from ", metadata.Source))
  109. }
  110. }
  111. }
  112. type inboundHandler Inbound
  113. func (h *inboundHandler) NewConnectionEx(ctx context.Context, conn net.Conn, source M.Socksaddr, destination M.Socksaddr, onClose N.CloseHandlerFunc) {
  114. var metadata adapter.InboundContext
  115. metadata.Inbound = h.Tag()
  116. metadata.InboundType = h.Type()
  117. //nolint:staticcheck
  118. metadata.InboundDetour = h.listener.ListenOptions().Detour
  119. //nolint:staticcheck
  120. metadata.InboundOptions = h.listener.ListenOptions().InboundOptions
  121. metadata.Source = source
  122. metadata.Destination = destination
  123. if userName, _ := auth.UserFromContext[string](ctx); userName != "" {
  124. metadata.User = userName
  125. h.logger.InfoContext(ctx, "[", userName, "] inbound connection to ", metadata.Destination)
  126. } else {
  127. h.logger.InfoContext(ctx, "inbound connection to ", metadata.Destination)
  128. }
  129. h.router.RouteConnectionEx(ctx, conn, metadata, onClose)
  130. }