server.go 2.7 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697
  1. package v2raygrpc
  2. import (
  3. "context"
  4. "net"
  5. "os"
  6. "strings"
  7. "time"
  8. "github.com/sagernet/sing-box/adapter"
  9. "github.com/sagernet/sing-box/common/tls"
  10. "github.com/sagernet/sing-box/log"
  11. "github.com/sagernet/sing-box/option"
  12. "github.com/sagernet/sing/common"
  13. "github.com/sagernet/sing/common/logger"
  14. M "github.com/sagernet/sing/common/metadata"
  15. N "github.com/sagernet/sing/common/network"
  16. "golang.org/x/net/http2"
  17. "google.golang.org/grpc"
  18. "google.golang.org/grpc/keepalive"
  19. gM "google.golang.org/grpc/metadata"
  20. "google.golang.org/grpc/peer"
  21. )
  22. var _ adapter.V2RayServerTransport = (*Server)(nil)
  23. type Server struct {
  24. ctx context.Context
  25. logger logger.ContextLogger
  26. handler adapter.V2RayServerTransportHandler
  27. server *grpc.Server
  28. }
  29. func NewServer(ctx context.Context, logger logger.ContextLogger, options option.V2RayGRPCOptions, tlsConfig tls.ServerConfig, handler adapter.V2RayServerTransportHandler) (*Server, error) {
  30. var serverOptions []grpc.ServerOption
  31. if tlsConfig != nil {
  32. if !common.Contains(tlsConfig.NextProtos(), http2.NextProtoTLS) {
  33. tlsConfig.SetNextProtos(append([]string{"h2"}, tlsConfig.NextProtos()...))
  34. }
  35. serverOptions = append(serverOptions, grpc.Creds(NewTLSTransportCredentials(tlsConfig)))
  36. }
  37. if options.IdleTimeout > 0 {
  38. serverOptions = append(serverOptions, grpc.KeepaliveParams(keepalive.ServerParameters{
  39. Time: time.Duration(options.IdleTimeout),
  40. Timeout: time.Duration(options.PingTimeout),
  41. }))
  42. }
  43. server := &Server{ctx, logger, handler, grpc.NewServer(serverOptions...)}
  44. RegisterGunServiceCustomNameServer(server.server, server, options.ServiceName)
  45. return server, nil
  46. }
  47. func (s *Server) Tun(server GunService_TunServer) error {
  48. conn := NewGRPCConn(server)
  49. var source M.Socksaddr
  50. if remotePeer, loaded := peer.FromContext(server.Context()); loaded {
  51. source = M.SocksaddrFromNet(remotePeer.Addr)
  52. }
  53. if grpcMetadata, loaded := gM.FromIncomingContext(server.Context()); loaded {
  54. forwardFrom := strings.Join(grpcMetadata.Get("X-Forwarded-For"), ",")
  55. if forwardFrom != "" {
  56. for _, from := range strings.Split(forwardFrom, ",") {
  57. originAddr := M.ParseSocksaddr(from)
  58. if originAddr.IsValid() {
  59. source = originAddr.Unwrap()
  60. }
  61. }
  62. }
  63. }
  64. done := make(chan struct{})
  65. go s.handler.NewConnectionEx(log.ContextWithNewID(s.ctx), conn, source, M.Socksaddr{}, N.OnceClose(func(it error) {
  66. close(done)
  67. }))
  68. <-done
  69. return nil
  70. }
  71. func (s *Server) mustEmbedUnimplementedGunServiceServer() {
  72. }
  73. func (s *Server) Network() []string {
  74. return []string{N.NetworkTCP}
  75. }
  76. func (s *Server) Serve(listener net.Listener) error {
  77. return s.server.Serve(listener)
  78. }
  79. func (s *Server) ServePacket(listener net.PacketConn) error {
  80. return os.ErrInvalid
  81. }
  82. func (s *Server) Close() error {
  83. s.server.Stop()
  84. return nil
  85. }