123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156 |
- package tuic
- import (
- "context"
- "net"
- "time"
- "github.com/sagernet/sing-box/adapter"
- "github.com/sagernet/sing-box/adapter/inbound"
- "github.com/sagernet/sing-box/common/listener"
- "github.com/sagernet/sing-box/common/tls"
- "github.com/sagernet/sing-box/common/uot"
- C "github.com/sagernet/sing-box/constant"
- "github.com/sagernet/sing-box/log"
- "github.com/sagernet/sing-box/option"
- "github.com/sagernet/sing-quic/tuic"
- "github.com/sagernet/sing/common"
- "github.com/sagernet/sing/common/auth"
- E "github.com/sagernet/sing/common/exceptions"
- N "github.com/sagernet/sing/common/network"
- "github.com/gofrs/uuid/v5"
- )
- func RegisterInbound(registry *inbound.Registry) {
- inbound.Register[option.TUICInboundOptions](registry, C.TypeTUIC, NewInbound)
- }
- type Inbound struct {
- inbound.Adapter
- router adapter.ConnectionRouterEx
- logger log.ContextLogger
- listener *listener.Listener
- tlsConfig tls.ServerConfig
- server *tuic.Service[int]
- userNameList []string
- }
- func NewInbound(ctx context.Context, router adapter.Router, logger log.ContextLogger, tag string, options option.TUICInboundOptions) (adapter.Inbound, error) {
- options.UDPFragmentDefault = true
- if options.TLS == nil || !options.TLS.Enabled {
- return nil, C.ErrTLSRequired
- }
- tlsConfig, err := tls.NewServer(ctx, logger, common.PtrValueOrDefault(options.TLS))
- if err != nil {
- return nil, err
- }
- inbound := &Inbound{
- Adapter: inbound.NewAdapter(C.TypeTUIC, tag),
- router: uot.NewRouter(router, logger),
- listener: listener.New(listener.Options{
- Context: ctx,
- Logger: logger,
- Listen: options.ListenOptions,
- }),
- tlsConfig: tlsConfig,
- }
- var udpTimeout time.Duration
- if options.UDPTimeout != 0 {
- udpTimeout = time.Duration(options.UDPTimeout)
- } else {
- udpTimeout = C.UDPTimeout
- }
- service, err := tuic.NewService[int](tuic.ServiceOptions{
- Context: ctx,
- Logger: logger,
- TLSConfig: tlsConfig,
- CongestionControl: options.CongestionControl,
- AuthTimeout: time.Duration(options.AuthTimeout),
- ZeroRTTHandshake: options.ZeroRTTHandshake,
- Heartbeat: time.Duration(options.Heartbeat),
- UDPTimeout: udpTimeout,
- Handler: adapter.NewUpstreamHandler(adapter.InboundContext{}, inbound.newConnection, inbound.newPacketConnection, nil),
- })
- if err != nil {
- return nil, err
- }
- var userList []int
- var userNameList []string
- var userUUIDList [][16]byte
- var userPasswordList []string
- for index, user := range options.Users {
- if user.UUID == "" {
- return nil, E.New("missing uuid for user ", index)
- }
- userUUID, err := uuid.FromString(user.UUID)
- if err != nil {
- return nil, E.Cause(err, "invalid uuid for user ", index)
- }
- userList = append(userList, index)
- userNameList = append(userNameList, user.Name)
- userUUIDList = append(userUUIDList, userUUID)
- userPasswordList = append(userPasswordList, user.Password)
- }
- service.UpdateUsers(userList, userUUIDList, userPasswordList)
- inbound.server = service
- inbound.userNameList = userNameList
- return inbound, nil
- }
- func (h *Inbound) newConnection(ctx context.Context, conn net.Conn, metadata adapter.InboundContext) error {
- ctx = log.ContextWithNewID(ctx)
- metadata.Inbound = h.Tag()
- metadata.InboundType = h.Type()
- metadata.InboundDetour = h.listener.ListenOptions().Detour
- metadata.InboundOptions = h.listener.ListenOptions().InboundOptions
- h.logger.InfoContext(ctx, "inbound connection from ", metadata.Source)
- userID, _ := auth.UserFromContext[int](ctx)
- if userName := h.userNameList[userID]; userName != "" {
- metadata.User = userName
- h.logger.InfoContext(ctx, "[", userName, "] inbound connection to ", metadata.Destination)
- } else {
- h.logger.InfoContext(ctx, "inbound connection to ", metadata.Destination)
- }
- return h.router.RouteConnection(ctx, conn, metadata)
- }
- func (h *Inbound) newPacketConnection(ctx context.Context, conn N.PacketConn, metadata adapter.InboundContext) error {
- ctx = log.ContextWithNewID(ctx)
- metadata.Inbound = h.Tag()
- metadata.InboundType = h.Type()
- metadata.InboundDetour = h.listener.ListenOptions().Detour
- metadata.InboundOptions = h.listener.ListenOptions().InboundOptions
- metadata.OriginDestination = h.listener.UDPAddr()
- h.logger.InfoContext(ctx, "inbound packet connection from ", metadata.Source)
- userID, _ := auth.UserFromContext[int](ctx)
- if userName := h.userNameList[userID]; userName != "" {
- metadata.User = userName
- h.logger.InfoContext(ctx, "[", userName, "] inbound packet connection to ", metadata.Destination)
- } else {
- h.logger.InfoContext(ctx, "inbound packet connection to ", metadata.Destination)
- }
- return h.router.RoutePacketConnection(ctx, conn, metadata)
- }
- func (h *Inbound) Start() error {
- if h.tlsConfig != nil {
- err := h.tlsConfig.Start()
- if err != nil {
- return err
- }
- }
- packetConn, err := h.listener.ListenUDP()
- if err != nil {
- return err
- }
- return h.server.Start(packetConn)
- }
- func (h *Inbound) Close() error {
- return common.Close(
- &h.listener,
- h.tlsConfig,
- common.PtrOrNil(h.server),
- )
- }
|