| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263 | 
							- package trojan
 
- import (
 
- 	"context"
 
- 	"net"
 
- 	"os"
 
- 	"github.com/sagernet/sing-box/adapter"
 
- 	"github.com/sagernet/sing-box/adapter/inbound"
 
- 	"github.com/sagernet/sing-box/common/listener"
 
- 	"github.com/sagernet/sing-box/common/mux"
 
- 	"github.com/sagernet/sing-box/common/tls"
 
- 	C "github.com/sagernet/sing-box/constant"
 
- 	"github.com/sagernet/sing-box/log"
 
- 	"github.com/sagernet/sing-box/option"
 
- 	"github.com/sagernet/sing-box/transport/trojan"
 
- 	"github.com/sagernet/sing-box/transport/v2ray"
 
- 	"github.com/sagernet/sing/common"
 
- 	"github.com/sagernet/sing/common/auth"
 
- 	E "github.com/sagernet/sing/common/exceptions"
 
- 	F "github.com/sagernet/sing/common/format"
 
- 	M "github.com/sagernet/sing/common/metadata"
 
- 	N "github.com/sagernet/sing/common/network"
 
- )
 
- func RegisterInbound(registry *inbound.Registry) {
 
- 	inbound.Register[option.TrojanInboundOptions](registry, C.TypeTrojan, NewInbound)
 
- }
 
- var _ adapter.TCPInjectableInbound = (*Inbound)(nil)
 
- type Inbound struct {
 
- 	inbound.Adapter
 
- 	router                   adapter.ConnectionRouterEx
 
- 	logger                   log.ContextLogger
 
- 	listener                 *listener.Listener
 
- 	service                  *trojan.Service[int]
 
- 	users                    []option.TrojanUser
 
- 	tlsConfig                tls.ServerConfig
 
- 	fallbackAddr             M.Socksaddr
 
- 	fallbackAddrTLSNextProto map[string]M.Socksaddr
 
- 	transport                adapter.V2RayServerTransport
 
- }
 
- func NewInbound(ctx context.Context, router adapter.Router, logger log.ContextLogger, tag string, options option.TrojanInboundOptions) (adapter.Inbound, error) {
 
- 	inbound := &Inbound{
 
- 		Adapter: inbound.NewAdapter(C.TypeTrojan, tag),
 
- 		router:  router,
 
- 		logger:  logger,
 
- 		users:   options.Users,
 
- 	}
 
- 	if options.TLS != nil {
 
- 		tlsConfig, err := tls.NewServerWithOptions(tls.ServerOptions{
 
- 			Context: ctx,
 
- 			Logger:  logger,
 
- 			Options: common.PtrValueOrDefault(options.TLS),
 
- 			KTLSCompatible: common.PtrValueOrDefault(options.Transport).Type == "" &&
 
- 				!common.PtrValueOrDefault(options.Multiplex).Enabled,
 
- 		})
 
- 		if err != nil {
 
- 			return nil, err
 
- 		}
 
- 		inbound.tlsConfig = tlsConfig
 
- 	}
 
- 	var fallbackHandler N.TCPConnectionHandlerEx
 
- 	if options.Fallback != nil && options.Fallback.Server != "" || len(options.FallbackForALPN) > 0 {
 
- 		if options.Fallback != nil && options.Fallback.Server != "" {
 
- 			inbound.fallbackAddr = options.Fallback.Build()
 
- 			if !inbound.fallbackAddr.IsValid() {
 
- 				return nil, E.New("invalid fallback address: ", inbound.fallbackAddr)
 
- 			}
 
- 		}
 
- 		if len(options.FallbackForALPN) > 0 {
 
- 			if inbound.tlsConfig == nil {
 
- 				return nil, E.New("fallback for ALPN is not supported without TLS")
 
- 			}
 
- 			fallbackAddrNextProto := make(map[string]M.Socksaddr)
 
- 			for nextProto, destination := range options.FallbackForALPN {
 
- 				fallbackAddr := destination.Build()
 
- 				if !fallbackAddr.IsValid() {
 
- 					return nil, E.New("invalid fallback address for ALPN ", nextProto, ": ", fallbackAddr)
 
- 				}
 
- 				fallbackAddrNextProto[nextProto] = fallbackAddr
 
- 			}
 
- 			inbound.fallbackAddrTLSNextProto = fallbackAddrNextProto
 
- 		}
 
- 		fallbackHandler = adapter.NewUpstreamContextHandlerEx(inbound.fallbackConnection, nil)
 
- 	}
 
- 	service := trojan.NewService[int](adapter.NewUpstreamContextHandlerEx(inbound.newConnection, inbound.newPacketConnection), fallbackHandler, logger)
 
- 	err := service.UpdateUsers(common.MapIndexed(options.Users, func(index int, it option.TrojanUser) int {
 
- 		return index
 
- 	}), common.Map(options.Users, func(it option.TrojanUser) string {
 
- 		return it.Password
 
- 	}))
 
- 	if err != nil {
 
- 		return nil, err
 
- 	}
 
- 	if options.Transport != nil {
 
- 		inbound.transport, err = v2ray.NewServerTransport(ctx, logger, common.PtrValueOrDefault(options.Transport), inbound.tlsConfig, (*inboundTransportHandler)(inbound))
 
- 		if err != nil {
 
- 			return nil, E.Cause(err, "create server transport: ", options.Transport.Type)
 
- 		}
 
- 	}
 
- 	inbound.router, err = mux.NewRouterWithOptions(inbound.router, logger, common.PtrValueOrDefault(options.Multiplex))
 
- 	if err != nil {
 
- 		return nil, err
 
- 	}
 
- 	inbound.service = service
 
- 	inbound.listener = listener.New(listener.Options{
 
- 		Context:           ctx,
 
- 		Logger:            logger,
 
- 		Network:           []string{N.NetworkTCP},
 
- 		Listen:            options.ListenOptions,
 
- 		ConnectionHandler: inbound,
 
- 	})
 
- 	return inbound, nil
 
- }
 
- func (h *Inbound) Start(stage adapter.StartStage) error {
 
- 	if stage != adapter.StartStateStart {
 
- 		return nil
 
- 	}
 
- 	if h.tlsConfig != nil {
 
- 		err := h.tlsConfig.Start()
 
- 		if err != nil {
 
- 			return E.Cause(err, "create TLS config")
 
- 		}
 
- 	}
 
- 	if h.transport == nil {
 
- 		return h.listener.Start()
 
- 	}
 
- 	if common.Contains(h.transport.Network(), N.NetworkTCP) {
 
- 		tcpListener, err := h.listener.ListenTCP()
 
- 		if err != nil {
 
- 			return err
 
- 		}
 
- 		go func() {
 
- 			sErr := h.transport.Serve(tcpListener)
 
- 			if sErr != nil && !E.IsClosed(sErr) {
 
- 				h.logger.Error("transport serve error: ", sErr)
 
- 			}
 
- 		}()
 
- 	}
 
- 	if common.Contains(h.transport.Network(), N.NetworkUDP) {
 
- 		udpConn, err := h.listener.ListenUDP()
 
- 		if err != nil {
 
- 			return err
 
- 		}
 
- 		go func() {
 
- 			sErr := h.transport.ServePacket(udpConn)
 
- 			if sErr != nil && !E.IsClosed(sErr) {
 
- 				h.logger.Error("transport serve error: ", sErr)
 
- 			}
 
- 		}()
 
- 	}
 
- 	return nil
 
- }
 
- func (h *Inbound) Close() error {
 
- 	return common.Close(
 
- 		h.listener,
 
- 		h.tlsConfig,
 
- 		h.transport,
 
- 	)
 
- }
 
- func (h *Inbound) NewConnectionEx(ctx context.Context, conn net.Conn, metadata adapter.InboundContext, onClose N.CloseHandlerFunc) {
 
- 	if h.tlsConfig != nil && h.transport == nil {
 
- 		tlsConn, err := tls.ServerHandshake(ctx, conn, h.tlsConfig)
 
- 		if err != nil {
 
- 			N.CloseOnHandshakeFailure(conn, onClose, err)
 
- 			h.logger.ErrorContext(ctx, E.Cause(err, "process connection from ", metadata.Source, ": TLS handshake"))
 
- 			return
 
- 		}
 
- 		conn = tlsConn
 
- 	}
 
- 	err := h.service.NewConnection(adapter.WithContext(ctx, &metadata), conn, metadata.Source, onClose)
 
- 	if err != nil {
 
- 		N.CloseOnHandshakeFailure(conn, onClose, err)
 
- 		h.logger.ErrorContext(ctx, E.Cause(err, "process connection from ", metadata.Source))
 
- 	}
 
- }
 
- func (h *Inbound) newConnection(ctx context.Context, conn net.Conn, metadata adapter.InboundContext, onClose N.CloseHandlerFunc) {
 
- 	metadata.Inbound = h.Tag()
 
- 	metadata.InboundType = h.Type()
 
- 	userIndex, loaded := auth.UserFromContext[int](ctx)
 
- 	if !loaded {
 
- 		N.CloseOnHandshakeFailure(conn, onClose, os.ErrInvalid)
 
- 		return
 
- 	}
 
- 	user := h.users[userIndex].Name
 
- 	if user == "" {
 
- 		user = F.ToString(userIndex)
 
- 	} else {
 
- 		metadata.User = user
 
- 	}
 
- 	h.logger.InfoContext(ctx, "[", user, "] inbound connection to ", metadata.Destination)
 
- 	h.router.RouteConnectionEx(ctx, conn, metadata, onClose)
 
- }
 
- func (h *Inbound) newPacketConnection(ctx context.Context, conn N.PacketConn, metadata adapter.InboundContext, onClose N.CloseHandlerFunc) {
 
- 	metadata.Inbound = h.Tag()
 
- 	metadata.InboundType = h.Type()
 
- 	userIndex, loaded := auth.UserFromContext[int](ctx)
 
- 	if !loaded {
 
- 		N.CloseOnHandshakeFailure(conn, onClose, os.ErrInvalid)
 
- 		return
 
- 	}
 
- 	user := h.users[userIndex].Name
 
- 	if user == "" {
 
- 		user = F.ToString(userIndex)
 
- 	} else {
 
- 		metadata.User = user
 
- 	}
 
- 	h.logger.InfoContext(ctx, "[", user, "] inbound packet connection to ", metadata.Destination)
 
- 	h.router.RoutePacketConnectionEx(ctx, conn, metadata, onClose)
 
- }
 
- func (h *Inbound) fallbackConnection(ctx context.Context, conn net.Conn, metadata adapter.InboundContext, onClose N.CloseHandlerFunc) {
 
- 	var fallbackAddr M.Socksaddr
 
- 	if len(h.fallbackAddrTLSNextProto) > 0 {
 
- 		if tlsConn, loaded := common.Cast[tls.Conn](conn); loaded {
 
- 			connectionState := tlsConn.ConnectionState()
 
- 			if connectionState.NegotiatedProtocol != "" {
 
- 				if fallbackAddr, loaded = h.fallbackAddrTLSNextProto[connectionState.NegotiatedProtocol]; !loaded {
 
- 					h.logger.DebugContext(ctx, "process connection from ", metadata.Source, ": fallback disabled for ALPN: ", connectionState.NegotiatedProtocol)
 
- 					N.CloseOnHandshakeFailure(conn, onClose, os.ErrInvalid)
 
- 					return
 
- 				}
 
- 			}
 
- 		}
 
- 	}
 
- 	if !fallbackAddr.IsValid() {
 
- 		if !h.fallbackAddr.IsValid() {
 
- 			h.logger.DebugContext(ctx, "process connection from ", metadata.Source, ": fallback disabled by default")
 
- 			N.CloseOnHandshakeFailure(conn, onClose, os.ErrInvalid)
 
- 			return
 
- 		}
 
- 		fallbackAddr = h.fallbackAddr
 
- 	}
 
- 	metadata.Inbound = h.Tag()
 
- 	metadata.InboundType = h.Type()
 
- 	metadata.Destination = fallbackAddr
 
- 	h.logger.InfoContext(ctx, "fallback connection to ", fallbackAddr)
 
- 	h.router.RouteConnectionEx(ctx, conn, metadata, onClose)
 
- }
 
- var _ adapter.V2RayServerTransportHandler = (*inboundTransportHandler)(nil)
 
- type inboundTransportHandler Inbound
 
- func (h *inboundTransportHandler) NewConnectionEx(ctx context.Context, conn net.Conn, source M.Socksaddr, destination M.Socksaddr, onClose N.CloseHandlerFunc) {
 
- 	var metadata adapter.InboundContext
 
- 	metadata.Source = source
 
- 	metadata.Destination = destination
 
- 	//nolint:staticcheck
 
- 	metadata.InboundDetour = h.listener.ListenOptions().Detour
 
- 	//nolint:staticcheck
 
- 	metadata.InboundOptions = h.listener.ListenOptions().InboundOptions
 
- 	h.logger.InfoContext(ctx, "inbound connection from ", metadata.Source)
 
- 	(*Inbound)(h).NewConnectionEx(ctx, conn, metadata, onClose)
 
- }
 
 
  |