trojan.go 7.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234
  1. package inbound
  2. import (
  3. "context"
  4. "net"
  5. "os"
  6. "github.com/sagernet/sing-box/adapter"
  7. "github.com/sagernet/sing-box/common/mux"
  8. "github.com/sagernet/sing-box/common/tls"
  9. C "github.com/sagernet/sing-box/constant"
  10. "github.com/sagernet/sing-box/log"
  11. "github.com/sagernet/sing-box/option"
  12. "github.com/sagernet/sing-box/transport/trojan"
  13. "github.com/sagernet/sing-box/transport/v2ray"
  14. "github.com/sagernet/sing/common"
  15. "github.com/sagernet/sing/common/auth"
  16. E "github.com/sagernet/sing/common/exceptions"
  17. F "github.com/sagernet/sing/common/format"
  18. M "github.com/sagernet/sing/common/metadata"
  19. N "github.com/sagernet/sing/common/network"
  20. )
  21. var (
  22. _ adapter.Inbound = (*Trojan)(nil)
  23. _ adapter.InjectableInbound = (*Trojan)(nil)
  24. )
  25. type Trojan struct {
  26. myInboundAdapter
  27. service *trojan.Service[int]
  28. users []option.TrojanUser
  29. tlsConfig tls.ServerConfig
  30. fallbackAddr M.Socksaddr
  31. fallbackAddrTLSNextProto map[string]M.Socksaddr
  32. transport adapter.V2RayServerTransport
  33. }
  34. func NewTrojan(ctx context.Context, router adapter.Router, logger log.ContextLogger, tag string, options option.TrojanInboundOptions) (*Trojan, error) {
  35. inbound := &Trojan{
  36. myInboundAdapter: myInboundAdapter{
  37. protocol: C.TypeTrojan,
  38. network: []string{N.NetworkTCP},
  39. ctx: ctx,
  40. router: router,
  41. logger: logger,
  42. tag: tag,
  43. listenOptions: options.ListenOptions,
  44. },
  45. users: options.Users,
  46. }
  47. if options.TLS != nil {
  48. tlsConfig, err := tls.NewServer(ctx, logger, common.PtrValueOrDefault(options.TLS))
  49. if err != nil {
  50. return nil, err
  51. }
  52. inbound.tlsConfig = tlsConfig
  53. }
  54. var fallbackHandler N.TCPConnectionHandler
  55. if options.Fallback != nil && options.Fallback.Server != "" || len(options.FallbackForALPN) > 0 {
  56. if options.Fallback != nil && options.Fallback.Server != "" {
  57. inbound.fallbackAddr = options.Fallback.Build()
  58. if !inbound.fallbackAddr.IsValid() {
  59. return nil, E.New("invalid fallback address: ", inbound.fallbackAddr)
  60. }
  61. }
  62. if len(options.FallbackForALPN) > 0 {
  63. if inbound.tlsConfig == nil {
  64. return nil, E.New("fallback for ALPN is not supported without TLS")
  65. }
  66. fallbackAddrNextProto := make(map[string]M.Socksaddr)
  67. for nextProto, destination := range options.FallbackForALPN {
  68. fallbackAddr := destination.Build()
  69. if !fallbackAddr.IsValid() {
  70. return nil, E.New("invalid fallback address for ALPN ", nextProto, ": ", fallbackAddr)
  71. }
  72. fallbackAddrNextProto[nextProto] = fallbackAddr
  73. }
  74. inbound.fallbackAddrTLSNextProto = fallbackAddrNextProto
  75. }
  76. fallbackHandler = adapter.NewUpstreamContextHandler(inbound.fallbackConnection, nil, nil)
  77. }
  78. service := trojan.NewService[int](adapter.NewUpstreamContextHandler(inbound.newConnection, inbound.newPacketConnection, inbound), fallbackHandler)
  79. err := service.UpdateUsers(common.MapIndexed(options.Users, func(index int, it option.TrojanUser) int {
  80. return index
  81. }), common.Map(options.Users, func(it option.TrojanUser) string {
  82. return it.Password
  83. }))
  84. if err != nil {
  85. return nil, err
  86. }
  87. if options.Transport != nil {
  88. inbound.transport, err = v2ray.NewServerTransport(ctx, common.PtrValueOrDefault(options.Transport), inbound.tlsConfig, (*trojanTransportHandler)(inbound))
  89. if err != nil {
  90. return nil, E.Cause(err, "create server transport: ", options.Transport.Type)
  91. }
  92. }
  93. inbound.router, err = mux.NewRouterWithOptions(inbound.router, logger, common.PtrValueOrDefault(options.Multiplex))
  94. if err != nil {
  95. return nil, err
  96. }
  97. inbound.service = service
  98. inbound.connHandler = inbound
  99. return inbound, nil
  100. }
  101. func (h *Trojan) Start() error {
  102. if h.tlsConfig != nil {
  103. err := h.tlsConfig.Start()
  104. if err != nil {
  105. return E.Cause(err, "create TLS config")
  106. }
  107. }
  108. if h.transport == nil {
  109. return h.myInboundAdapter.Start()
  110. }
  111. if common.Contains(h.transport.Network(), N.NetworkTCP) {
  112. tcpListener, err := h.myInboundAdapter.ListenTCP()
  113. if err != nil {
  114. return err
  115. }
  116. go func() {
  117. sErr := h.transport.Serve(tcpListener)
  118. if sErr != nil && !E.IsClosed(sErr) {
  119. h.logger.Error("transport serve error: ", sErr)
  120. }
  121. }()
  122. }
  123. if common.Contains(h.transport.Network(), N.NetworkUDP) {
  124. udpConn, err := h.myInboundAdapter.ListenUDP()
  125. if err != nil {
  126. return err
  127. }
  128. go func() {
  129. sErr := h.transport.ServePacket(udpConn)
  130. if sErr != nil && !E.IsClosed(sErr) {
  131. h.logger.Error("transport serve error: ", sErr)
  132. }
  133. }()
  134. }
  135. return nil
  136. }
  137. func (h *Trojan) Close() error {
  138. return common.Close(
  139. &h.myInboundAdapter,
  140. h.tlsConfig,
  141. h.transport,
  142. )
  143. }
  144. func (h *Trojan) newTransportConnection(ctx context.Context, conn net.Conn, metadata adapter.InboundContext) error {
  145. h.injectTCP(conn, metadata)
  146. return nil
  147. }
  148. func (h *Trojan) NewConnection(ctx context.Context, conn net.Conn, metadata adapter.InboundContext) error {
  149. var err error
  150. if h.tlsConfig != nil && h.transport == nil {
  151. conn, err = tls.ServerHandshake(ctx, conn, h.tlsConfig)
  152. if err != nil {
  153. return err
  154. }
  155. }
  156. return h.service.NewConnection(adapter.WithContext(ctx, &metadata), conn, adapter.UpstreamMetadata(metadata))
  157. }
  158. func (h *Trojan) NewPacketConnection(ctx context.Context, conn N.PacketConn, metadata adapter.InboundContext) error {
  159. return os.ErrInvalid
  160. }
  161. func (h *Trojan) newConnection(ctx context.Context, conn net.Conn, metadata adapter.InboundContext) error {
  162. userIndex, loaded := auth.UserFromContext[int](ctx)
  163. if !loaded {
  164. return os.ErrInvalid
  165. }
  166. user := h.users[userIndex].Name
  167. if user == "" {
  168. user = F.ToString(userIndex)
  169. } else {
  170. metadata.User = user
  171. }
  172. h.logger.InfoContext(ctx, "[", user, "] inbound connection to ", metadata.Destination)
  173. return h.router.RouteConnection(ctx, conn, metadata)
  174. }
  175. func (h *Trojan) fallbackConnection(ctx context.Context, conn net.Conn, metadata adapter.InboundContext) error {
  176. var fallbackAddr M.Socksaddr
  177. if len(h.fallbackAddrTLSNextProto) > 0 {
  178. if tlsConn, loaded := common.Cast[tls.Conn](conn); loaded {
  179. connectionState := tlsConn.ConnectionState()
  180. if connectionState.NegotiatedProtocol != "" {
  181. if fallbackAddr, loaded = h.fallbackAddrTLSNextProto[connectionState.NegotiatedProtocol]; !loaded {
  182. return E.New("fallback disabled for ALPN: ", connectionState.NegotiatedProtocol)
  183. }
  184. }
  185. }
  186. }
  187. if !fallbackAddr.IsValid() {
  188. if !h.fallbackAddr.IsValid() {
  189. return E.New("fallback disabled by default")
  190. }
  191. fallbackAddr = h.fallbackAddr
  192. }
  193. h.logger.InfoContext(ctx, "fallback connection to ", fallbackAddr)
  194. metadata.Destination = fallbackAddr
  195. return h.router.RouteConnection(ctx, conn, metadata)
  196. }
  197. func (h *Trojan) newPacketConnection(ctx context.Context, conn N.PacketConn, metadata adapter.InboundContext) error {
  198. userIndex, loaded := auth.UserFromContext[int](ctx)
  199. if !loaded {
  200. return os.ErrInvalid
  201. }
  202. user := h.users[userIndex].Name
  203. if user == "" {
  204. user = F.ToString(userIndex)
  205. } else {
  206. metadata.User = user
  207. }
  208. h.logger.InfoContext(ctx, "[", user, "] inbound packet connection to ", metadata.Destination)
  209. return h.router.RoutePacketConnection(ctx, conn, metadata)
  210. }
  211. var _ adapter.V2RayServerTransportHandler = (*trojanTransportHandler)(nil)
  212. type trojanTransportHandler Trojan
  213. func (t *trojanTransportHandler) NewConnection(ctx context.Context, conn net.Conn, metadata M.Metadata) error {
  214. return (*Trojan)(t).newTransportConnection(ctx, conn, adapter.InboundContext{
  215. Source: metadata.Source,
  216. Destination: metadata.Destination,
  217. })
  218. }