123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175 |
- //go:build with_quic
- package inbound
- import (
- "context"
- "net"
- "net/http"
- "net/http/httputil"
- "net/url"
- "time"
- "github.com/sagernet/sing-box/adapter"
- "github.com/sagernet/sing-box/common/tls"
- C "github.com/sagernet/sing-box/constant"
- "github.com/sagernet/sing-box/log"
- "github.com/sagernet/sing-box/option"
- "github.com/sagernet/sing-quic/hysteria"
- "github.com/sagernet/sing-quic/hysteria2"
- "github.com/sagernet/sing/common"
- "github.com/sagernet/sing/common/auth"
- E "github.com/sagernet/sing/common/exceptions"
- N "github.com/sagernet/sing/common/network"
- )
- var _ adapter.Inbound = (*Hysteria2)(nil)
- type Hysteria2 struct {
- myInboundAdapter
- tlsConfig tls.ServerConfig
- service *hysteria2.Service[int]
- userNameList []string
- }
- func NewHysteria2(ctx context.Context, router adapter.Router, logger log.ContextLogger, tag string, options option.Hysteria2InboundOptions) (*Hysteria2, error) {
- options.UDPFragmentDefault = true
- if options.TLS == nil || !options.TLS.Enabled {
- return nil, C.ErrTLSRequired
- }
- tlsConfig, err := tls.NewServer(ctx, logger, common.PtrValueOrDefault(options.TLS))
- if err != nil {
- return nil, err
- }
- var salamanderPassword string
- if options.Obfs != nil {
- if options.Obfs.Password == "" {
- return nil, E.New("missing obfs password")
- }
- switch options.Obfs.Type {
- case hysteria2.ObfsTypeSalamander:
- salamanderPassword = options.Obfs.Password
- default:
- return nil, E.New("unknown obfs type: ", options.Obfs.Type)
- }
- }
- var masqueradeHandler http.Handler
- if options.Masquerade != "" {
- masqueradeURL, err := url.Parse(options.Masquerade)
- if err != nil {
- return nil, E.Cause(err, "parse masquerade URL")
- }
- switch masqueradeURL.Scheme {
- case "file":
- masqueradeHandler = http.FileServer(http.Dir(masqueradeURL.Path))
- case "http", "https":
- masqueradeHandler = &httputil.ReverseProxy{
- Rewrite: func(r *httputil.ProxyRequest) {
- r.SetURL(masqueradeURL)
- r.Out.Host = r.In.Host
- },
- ErrorHandler: func(w http.ResponseWriter, r *http.Request, err error) {
- w.WriteHeader(http.StatusBadGateway)
- },
- }
- default:
- return nil, E.New("unknown masquerade URL scheme: ", masqueradeURL.Scheme)
- }
- }
- inbound := &Hysteria2{
- myInboundAdapter: myInboundAdapter{
- protocol: C.TypeHysteria2,
- network: []string{N.NetworkUDP},
- ctx: ctx,
- router: router,
- logger: logger,
- tag: tag,
- listenOptions: options.ListenOptions,
- },
- tlsConfig: tlsConfig,
- }
- var udpTimeout time.Duration
- if options.UDPTimeout != 0 {
- udpTimeout = time.Duration(options.UDPTimeout)
- } else {
- udpTimeout = C.UDPTimeout
- }
- service, err := hysteria2.NewService[int](hysteria2.ServiceOptions{
- Context: ctx,
- Logger: logger,
- BrutalDebug: options.BrutalDebug,
- SendBPS: uint64(options.UpMbps * hysteria.MbpsToBps),
- ReceiveBPS: uint64(options.DownMbps * hysteria.MbpsToBps),
- SalamanderPassword: salamanderPassword,
- TLSConfig: tlsConfig,
- IgnoreClientBandwidth: options.IgnoreClientBandwidth,
- UDPTimeout: udpTimeout,
- Handler: adapter.NewUpstreamHandler(adapter.InboundContext{}, inbound.newConnection, inbound.newPacketConnection, nil),
- MasqueradeHandler: masqueradeHandler,
- })
- if err != nil {
- return nil, err
- }
- userList := make([]int, 0, len(options.Users))
- userNameList := make([]string, 0, len(options.Users))
- userPasswordList := make([]string, 0, len(options.Users))
- for index, user := range options.Users {
- userList = append(userList, index)
- userNameList = append(userNameList, user.Name)
- userPasswordList = append(userPasswordList, user.Password)
- }
- service.UpdateUsers(userList, userPasswordList)
- inbound.service = service
- inbound.userNameList = userNameList
- return inbound, nil
- }
- func (h *Hysteria2) newConnection(ctx context.Context, conn net.Conn, metadata adapter.InboundContext) error {
- ctx = log.ContextWithNewID(ctx)
- metadata = h.createMetadata(conn, metadata)
- h.logger.InfoContext(ctx, "inbound connection from ", metadata.Source)
- userID, _ := auth.UserFromContext[int](ctx)
- if userName := h.userNameList[userID]; userName != "" {
- metadata.User = userName
- h.logger.InfoContext(ctx, "[", userName, "] inbound connection to ", metadata.Destination)
- } else {
- h.logger.InfoContext(ctx, "inbound connection to ", metadata.Destination)
- }
- return h.router.RouteConnection(ctx, conn, metadata)
- }
- func (h *Hysteria2) newPacketConnection(ctx context.Context, conn N.PacketConn, metadata adapter.InboundContext) error {
- ctx = log.ContextWithNewID(ctx)
- metadata = h.createPacketMetadata(conn, metadata)
- h.logger.InfoContext(ctx, "inbound packet connection from ", metadata.Source)
- userID, _ := auth.UserFromContext[int](ctx)
- if userName := h.userNameList[userID]; userName != "" {
- metadata.User = userName
- h.logger.InfoContext(ctx, "[", userName, "] inbound packet connection to ", metadata.Destination)
- } else {
- h.logger.InfoContext(ctx, "inbound packet connection to ", metadata.Destination)
- }
- return h.router.RoutePacketConnection(ctx, conn, metadata)
- }
- func (h *Hysteria2) Start() error {
- if h.tlsConfig != nil {
- err := h.tlsConfig.Start()
- if err != nil {
- return err
- }
- }
- packetConn, err := h.myInboundAdapter.ListenUDP()
- if err != nil {
- return err
- }
- return h.service.Start(packetConn)
- }
- func (h *Hysteria2) Close() error {
- return common.Close(
- &h.myInboundAdapter,
- h.tlsConfig,
- common.PtrOrNil(h.service),
- )
- }
|