mirror of
https://github.com/SagerNet/sing-box.git
synced 2024-12-25 02:35:38 +08:00
114 lines
3.4 KiB
Go
114 lines
3.4 KiB
Go
package inbound
|
|
|
|
import (
|
|
std_bufio "bufio"
|
|
"context"
|
|
"net"
|
|
"os"
|
|
|
|
"github.com/sagernet/sing-box/adapter"
|
|
"github.com/sagernet/sing-box/common/tls"
|
|
C "github.com/sagernet/sing-box/constant"
|
|
"github.com/sagernet/sing-box/log"
|
|
"github.com/sagernet/sing-box/option"
|
|
"github.com/sagernet/sing/common"
|
|
"github.com/sagernet/sing/common/auth"
|
|
E "github.com/sagernet/sing/common/exceptions"
|
|
N "github.com/sagernet/sing/common/network"
|
|
"github.com/sagernet/sing/protocol/http"
|
|
)
|
|
|
|
var (
|
|
_ adapter.Inbound = (*HTTP)(nil)
|
|
_ adapter.InjectableInbound = (*HTTP)(nil)
|
|
)
|
|
|
|
type HTTP struct {
|
|
myInboundAdapter
|
|
authenticator auth.Authenticator
|
|
tlsConfig tls.ServerConfig
|
|
}
|
|
|
|
func NewHTTP(ctx context.Context, router adapter.Router, logger log.ContextLogger, tag string, options option.HTTPMixedInboundOptions) (*HTTP, error) {
|
|
inbound := &HTTP{
|
|
myInboundAdapter: myInboundAdapter{
|
|
protocol: C.TypeHTTP,
|
|
network: []string{N.NetworkTCP},
|
|
ctx: ctx,
|
|
router: router,
|
|
logger: logger,
|
|
tag: tag,
|
|
listenOptions: options.ListenOptions,
|
|
setSystemProxy: options.SetSystemProxy,
|
|
},
|
|
authenticator: auth.NewAuthenticator(options.Users),
|
|
}
|
|
if options.TLS != nil {
|
|
tlsConfig, err := tls.NewServer(ctx, router, logger, common.PtrValueOrDefault(options.TLS))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
inbound.tlsConfig = tlsConfig
|
|
}
|
|
inbound.connHandler = inbound
|
|
return inbound, nil
|
|
}
|
|
|
|
func (h *HTTP) Start() error {
|
|
if h.tlsConfig != nil {
|
|
err := h.tlsConfig.Start()
|
|
if err != nil {
|
|
return E.Cause(err, "create TLS config")
|
|
}
|
|
}
|
|
return h.myInboundAdapter.Start()
|
|
}
|
|
|
|
func (h *HTTP) Close() error {
|
|
return common.Close(
|
|
&h.myInboundAdapter,
|
|
h.tlsConfig,
|
|
)
|
|
}
|
|
|
|
func (h *HTTP) NewConnection(ctx context.Context, conn net.Conn, metadata adapter.InboundContext) error {
|
|
var err error
|
|
if h.tlsConfig != nil {
|
|
conn, err = tls.ServerHandshake(ctx, conn, h.tlsConfig)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
return http.HandleConnection(ctx, conn, std_bufio.NewReader(conn), h.authenticator, h.upstreamUserHandler(metadata), adapter.UpstreamMetadata(metadata))
|
|
}
|
|
|
|
func (h *HTTP) NewPacketConnection(ctx context.Context, conn N.PacketConn, metadata adapter.InboundContext) error {
|
|
return os.ErrInvalid
|
|
}
|
|
|
|
func (a *myInboundAdapter) upstreamUserHandler(metadata adapter.InboundContext) adapter.UpstreamHandlerAdapter {
|
|
return adapter.NewUpstreamHandler(metadata, a.newUserConnection, a.streamUserPacketConnection, a)
|
|
}
|
|
|
|
func (a *myInboundAdapter) newUserConnection(ctx context.Context, conn net.Conn, metadata adapter.InboundContext) error {
|
|
user, loaded := auth.UserFromContext[string](ctx)
|
|
if !loaded {
|
|
a.logger.InfoContext(ctx, "inbound connection to ", metadata.Destination)
|
|
return a.router.RouteConnection(ctx, conn, metadata)
|
|
}
|
|
metadata.User = user
|
|
a.logger.InfoContext(ctx, "[", user, "] inbound connection to ", metadata.Destination)
|
|
return a.router.RouteConnection(ctx, conn, metadata)
|
|
}
|
|
|
|
func (a *myInboundAdapter) streamUserPacketConnection(ctx context.Context, conn N.PacketConn, metadata adapter.InboundContext) error {
|
|
user, loaded := auth.UserFromContext[string](ctx)
|
|
if !loaded {
|
|
a.logger.InfoContext(ctx, "inbound packet connection to ", metadata.Destination)
|
|
return a.router.RoutePacketConnection(ctx, conn, metadata)
|
|
}
|
|
metadata.User = user
|
|
a.logger.InfoContext(ctx, "[", user, "] inbound packet connection to ", metadata.Destination)
|
|
return a.router.RoutePacketConnection(ctx, conn, metadata)
|
|
}
|