2022-07-01 11:34:02 +00:00
|
|
|
package inbound
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"net"
|
|
|
|
"net/netip"
|
|
|
|
"os"
|
|
|
|
"sync"
|
|
|
|
"time"
|
|
|
|
|
2022-07-08 15:03:57 +00:00
|
|
|
"github.com/sagernet/sing-box/adapter"
|
2022-08-23 13:07:35 +00:00
|
|
|
"github.com/sagernet/sing-box/common/proxyproto"
|
2022-07-14 12:30:57 +00:00
|
|
|
"github.com/sagernet/sing-box/common/settings"
|
2022-07-08 15:03:57 +00:00
|
|
|
C "github.com/sagernet/sing-box/constant"
|
|
|
|
"github.com/sagernet/sing-box/log"
|
|
|
|
"github.com/sagernet/sing-box/option"
|
2022-07-11 10:44:59 +00:00
|
|
|
"github.com/sagernet/sing-dns"
|
2022-07-01 11:34:02 +00:00
|
|
|
"github.com/sagernet/sing/common"
|
|
|
|
"github.com/sagernet/sing/common/buf"
|
|
|
|
E "github.com/sagernet/sing/common/exceptions"
|
|
|
|
M "github.com/sagernet/sing/common/metadata"
|
|
|
|
N "github.com/sagernet/sing/common/network"
|
2022-07-06 07:01:09 +00:00
|
|
|
|
|
|
|
"github.com/database64128/tfo-go"
|
2022-07-01 11:34:02 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
var _ adapter.Inbound = (*myInboundAdapter)(nil)
|
|
|
|
|
|
|
|
type myInboundAdapter struct {
|
2022-07-15 00:42:02 +00:00
|
|
|
protocol string
|
|
|
|
network []string
|
|
|
|
ctx context.Context
|
|
|
|
router adapter.Router
|
|
|
|
logger log.ContextLogger
|
|
|
|
tag string
|
|
|
|
listenOptions option.ListenOptions
|
|
|
|
connHandler adapter.ConnectionHandler
|
|
|
|
packetHandler adapter.PacketHandler
|
|
|
|
oobPacketHandler adapter.OOBPacketHandler
|
|
|
|
packetUpstream any
|
2022-07-01 11:34:02 +00:00
|
|
|
|
2022-07-14 06:04:57 +00:00
|
|
|
// http mixed
|
|
|
|
|
2022-08-04 14:01:20 +00:00
|
|
|
setSystemProxy bool
|
|
|
|
clearSystemProxy func() error
|
2022-07-14 06:04:57 +00:00
|
|
|
|
2022-07-01 11:34:02 +00:00
|
|
|
// internal
|
|
|
|
|
2022-08-23 13:07:35 +00:00
|
|
|
tcpListener net.Listener
|
2022-07-01 11:34:02 +00:00
|
|
|
udpConn *net.UDPConn
|
2022-08-20 02:38:12 +00:00
|
|
|
udpAddr M.Socksaddr
|
2022-07-01 11:34:02 +00:00
|
|
|
packetAccess sync.RWMutex
|
|
|
|
packetOutboundClosed chan struct{}
|
|
|
|
packetOutbound chan *myInboundPacket
|
|
|
|
}
|
|
|
|
|
|
|
|
func (a *myInboundAdapter) Type() string {
|
|
|
|
return a.protocol
|
|
|
|
}
|
|
|
|
|
|
|
|
func (a *myInboundAdapter) Tag() string {
|
|
|
|
return a.tag
|
|
|
|
}
|
|
|
|
|
|
|
|
func (a *myInboundAdapter) Start() error {
|
2022-08-04 14:01:20 +00:00
|
|
|
var err error
|
2022-07-29 16:29:22 +00:00
|
|
|
if common.Contains(a.network, N.NetworkTCP) {
|
2022-08-23 11:44:40 +00:00
|
|
|
_, err = a.ListenTCP()
|
2022-07-01 11:34:02 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
go a.loopTCPIn()
|
|
|
|
}
|
2022-07-29 16:29:22 +00:00
|
|
|
if common.Contains(a.network, N.NetworkUDP) {
|
2022-08-23 11:44:40 +00:00
|
|
|
_, err = a.ListenUDP()
|
2022-07-01 11:34:02 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
a.packetOutboundClosed = make(chan struct{})
|
|
|
|
a.packetOutbound = make(chan *myInboundPacket)
|
2022-07-15 00:42:02 +00:00
|
|
|
if a.oobPacketHandler != nil {
|
|
|
|
if _, threadUnsafeHandler := common.Cast[N.ThreadUnsafeWriter](a.packetUpstream); !threadUnsafeHandler {
|
|
|
|
go a.loopUDPOOBIn()
|
|
|
|
} else {
|
|
|
|
go a.loopUDPOOBInThreadSafe()
|
|
|
|
}
|
2022-07-01 11:34:02 +00:00
|
|
|
} else {
|
2022-07-15 00:42:02 +00:00
|
|
|
if _, threadUnsafeHandler := common.Cast[N.ThreadUnsafeWriter](a.packetUpstream); !threadUnsafeHandler {
|
|
|
|
go a.loopUDPIn()
|
|
|
|
} else {
|
|
|
|
go a.loopUDPInThreadSafe()
|
|
|
|
}
|
|
|
|
go a.loopUDPOut()
|
2022-07-01 11:34:02 +00:00
|
|
|
}
|
|
|
|
}
|
2022-07-14 06:04:57 +00:00
|
|
|
if a.setSystemProxy {
|
2022-08-04 14:01:20 +00:00
|
|
|
a.clearSystemProxy, err = settings.SetSystemProxy(a.router, M.SocksaddrFromNet(a.tcpListener.Addr()).Port, a.protocol == C.TypeMixed)
|
2022-07-14 06:04:57 +00:00
|
|
|
if err != nil {
|
|
|
|
return E.Cause(err, "set system proxy")
|
|
|
|
}
|
|
|
|
}
|
2022-07-01 11:34:02 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2022-08-23 13:07:35 +00:00
|
|
|
func (a *myInboundAdapter) ListenTCP() (net.Listener, error) {
|
2022-08-22 10:53:47 +00:00
|
|
|
var err error
|
|
|
|
bindAddr := M.SocksaddrFrom(netip.Addr(a.listenOptions.Listen), a.listenOptions.ListenPort)
|
2022-08-23 13:07:35 +00:00
|
|
|
var tcpListener net.Listener
|
2022-08-22 10:53:47 +00:00
|
|
|
if !a.listenOptions.TCPFastOpen {
|
|
|
|
tcpListener, err = net.ListenTCP(M.NetworkFromNetAddr(N.NetworkTCP, bindAddr.Addr), bindAddr.TCPAddr())
|
|
|
|
} else {
|
|
|
|
tcpListener, err = tfo.ListenTCP(M.NetworkFromNetAddr(N.NetworkTCP, bindAddr.Addr), bindAddr.TCPAddr())
|
|
|
|
}
|
|
|
|
if err == nil {
|
|
|
|
a.logger.Info("tcp server started at ", tcpListener.Addr())
|
|
|
|
}
|
2022-08-23 13:07:35 +00:00
|
|
|
if a.listenOptions.ProxyProtocol {
|
|
|
|
a.logger.Debug("proxy protocol enabled")
|
|
|
|
tcpListener = &proxyproto.Listener{Listener: tcpListener}
|
|
|
|
}
|
2022-08-22 10:53:47 +00:00
|
|
|
a.tcpListener = tcpListener
|
|
|
|
return tcpListener, err
|
|
|
|
}
|
|
|
|
|
2022-08-23 13:07:35 +00:00
|
|
|
func (a *myInboundAdapter) ListenUDP() (net.PacketConn, error) {
|
2022-08-22 13:20:05 +00:00
|
|
|
bindAddr := M.SocksaddrFrom(netip.Addr(a.listenOptions.Listen), a.listenOptions.ListenPort)
|
|
|
|
udpConn, err := net.ListenUDP(M.NetworkFromNetAddr(N.NetworkUDP, bindAddr.Addr), bindAddr.UDPAddr())
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
a.udpConn = udpConn
|
|
|
|
a.udpAddr = bindAddr
|
|
|
|
a.logger.Info("udp server started at ", udpConn.LocalAddr())
|
|
|
|
return udpConn, err
|
|
|
|
}
|
|
|
|
|
2022-07-01 11:34:02 +00:00
|
|
|
func (a *myInboundAdapter) Close() error {
|
2022-07-14 06:04:57 +00:00
|
|
|
var err error
|
2022-08-04 14:01:20 +00:00
|
|
|
if a.clearSystemProxy != nil {
|
|
|
|
err = a.clearSystemProxy()
|
2022-07-14 06:04:57 +00:00
|
|
|
}
|
|
|
|
return E.Errors(err, common.Close(
|
2022-08-23 13:07:35 +00:00
|
|
|
a.tcpListener,
|
2022-07-01 11:34:02 +00:00
|
|
|
common.PtrOrNil(a.udpConn),
|
2022-07-14 06:04:57 +00:00
|
|
|
))
|
2022-07-01 11:34:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (a *myInboundAdapter) upstreamHandler(metadata adapter.InboundContext) adapter.UpstreamHandlerAdapter {
|
2022-07-02 06:07:50 +00:00
|
|
|
return adapter.NewUpstreamHandler(metadata, a.newConnection, a.streamPacketConnection, a)
|
2022-07-01 11:34:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (a *myInboundAdapter) upstreamContextHandler() adapter.UpstreamHandlerAdapter {
|
|
|
|
return adapter.NewUpstreamContextHandler(a.newConnection, a.newPacketConnection, a)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (a *myInboundAdapter) newConnection(ctx context.Context, conn net.Conn, metadata adapter.InboundContext) error {
|
2022-07-12 07:17:29 +00:00
|
|
|
a.logger.InfoContext(ctx, "inbound connection to ", metadata.Destination)
|
2022-07-01 11:34:02 +00:00
|
|
|
return a.router.RouteConnection(ctx, conn, metadata)
|
|
|
|
}
|
|
|
|
|
2022-07-02 06:07:50 +00:00
|
|
|
func (a *myInboundAdapter) streamPacketConnection(ctx context.Context, conn N.PacketConn, metadata adapter.InboundContext) error {
|
2022-07-12 07:17:29 +00:00
|
|
|
a.logger.InfoContext(ctx, "inbound packet connection to ", metadata.Destination)
|
2022-07-02 06:07:50 +00:00
|
|
|
return a.router.RoutePacketConnection(ctx, conn, metadata)
|
|
|
|
}
|
|
|
|
|
2022-07-01 11:34:02 +00:00
|
|
|
func (a *myInboundAdapter) newPacketConnection(ctx context.Context, conn N.PacketConn, metadata adapter.InboundContext) error {
|
2022-07-12 07:17:29 +00:00
|
|
|
ctx = log.ContextWithNewID(ctx)
|
|
|
|
a.logger.InfoContext(ctx, "inbound packet connection from ", metadata.Source)
|
|
|
|
a.logger.InfoContext(ctx, "inbound packet connection to ", metadata.Destination)
|
2022-07-01 11:34:02 +00:00
|
|
|
return a.router.RoutePacketConnection(ctx, conn, metadata)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (a *myInboundAdapter) loopTCPIn() {
|
|
|
|
tcpListener := a.tcpListener
|
|
|
|
for {
|
2022-08-23 13:07:35 +00:00
|
|
|
conn, err := tcpListener.Accept()
|
2022-07-01 11:34:02 +00:00
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
2022-08-22 10:53:47 +00:00
|
|
|
go a.injectTCP(conn)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-08-23 11:44:40 +00:00
|
|
|
func (a *myInboundAdapter) createMetadata(conn net.Conn, metadata adapter.InboundContext) adapter.InboundContext {
|
2022-08-22 10:53:47 +00:00
|
|
|
metadata.Inbound = a.tag
|
|
|
|
metadata.InboundType = a.protocol
|
|
|
|
metadata.SniffEnabled = a.listenOptions.SniffEnabled
|
|
|
|
metadata.SniffOverrideDestination = a.listenOptions.SniffOverrideDestination
|
|
|
|
metadata.DomainStrategy = dns.DomainStrategy(a.listenOptions.DomainStrategy)
|
2022-08-23 13:07:35 +00:00
|
|
|
if !metadata.Source.IsValid() {
|
|
|
|
metadata.Source = M.SocksaddrFromNet(conn.RemoteAddr())
|
|
|
|
}
|
|
|
|
if !metadata.Destination.IsValid() {
|
|
|
|
metadata.Destination = M.SocksaddrFromNet(conn.LocalAddr())
|
|
|
|
}
|
|
|
|
if tcpConn, isTCP := common.Cast[*net.TCPConn](conn); isTCP {
|
|
|
|
metadata.OriginDestination = M.SocksaddrFromNet(tcpConn.LocalAddr())
|
|
|
|
}
|
2022-08-22 10:53:47 +00:00
|
|
|
return metadata
|
|
|
|
}
|
|
|
|
|
|
|
|
func (a *myInboundAdapter) injectTCP(conn net.Conn) {
|
|
|
|
ctx := log.ContextWithNewID(a.ctx)
|
2022-08-23 11:44:40 +00:00
|
|
|
metadata := a.createMetadata(conn, adapter.InboundContext{})
|
2022-08-22 10:53:47 +00:00
|
|
|
a.logger.InfoContext(ctx, "inbound connection from ", metadata.Source)
|
|
|
|
hErr := a.connHandler.NewConnection(ctx, conn, metadata)
|
|
|
|
if hErr != nil {
|
|
|
|
conn.Close()
|
|
|
|
a.NewError(ctx, E.Cause(hErr, "process connection from ", metadata.Source))
|
2022-07-01 11:34:02 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-08-23 05:22:03 +00:00
|
|
|
func (a *myInboundAdapter) routeTCP(ctx context.Context, conn net.Conn, metadata adapter.InboundContext) {
|
|
|
|
a.logger.InfoContext(ctx, "inbound connection from ", metadata.Source)
|
|
|
|
hErr := a.newConnection(ctx, conn, metadata)
|
|
|
|
if hErr != nil {
|
|
|
|
conn.Close()
|
|
|
|
a.NewError(ctx, E.Cause(hErr, "process connection from ", metadata.Source))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-07-01 11:34:02 +00:00
|
|
|
func (a *myInboundAdapter) loopUDPIn() {
|
|
|
|
defer close(a.packetOutboundClosed)
|
|
|
|
_buffer := buf.StackNewPacket()
|
|
|
|
defer common.KeepAlive(_buffer)
|
|
|
|
buffer := common.Dup(_buffer)
|
|
|
|
defer buffer.Release()
|
|
|
|
buffer.IncRef()
|
|
|
|
defer buffer.DecRef()
|
|
|
|
packetService := (*myInboundPacketAdapter)(a)
|
|
|
|
for {
|
|
|
|
buffer.Reset()
|
|
|
|
n, addr, err := a.udpConn.ReadFromUDPAddrPort(buffer.FreeBytes())
|
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
buffer.Truncate(n)
|
2022-07-02 06:07:50 +00:00
|
|
|
var metadata adapter.InboundContext
|
|
|
|
metadata.Inbound = a.tag
|
2022-07-19 14:16:49 +00:00
|
|
|
metadata.InboundType = a.protocol
|
2022-07-06 04:39:44 +00:00
|
|
|
metadata.SniffEnabled = a.listenOptions.SniffEnabled
|
|
|
|
metadata.SniffOverrideDestination = a.listenOptions.SniffOverrideDestination
|
2022-07-11 10:44:59 +00:00
|
|
|
metadata.DomainStrategy = dns.DomainStrategy(a.listenOptions.DomainStrategy)
|
2022-07-02 06:07:50 +00:00
|
|
|
metadata.Source = M.SocksaddrFromNetIP(addr)
|
2022-08-20 02:38:12 +00:00
|
|
|
metadata.OriginDestination = a.udpAddr
|
2022-07-01 11:34:02 +00:00
|
|
|
err = a.packetHandler.NewPacket(a.ctx, packetService, buffer, metadata)
|
|
|
|
if err != nil {
|
2022-07-02 06:07:50 +00:00
|
|
|
a.newError(E.Cause(err, "process packet from ", metadata.Source))
|
2022-07-01 11:34:02 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-07-15 00:42:02 +00:00
|
|
|
func (a *myInboundAdapter) loopUDPOOBIn() {
|
|
|
|
defer close(a.packetOutboundClosed)
|
|
|
|
_buffer := buf.StackNewPacket()
|
|
|
|
defer common.KeepAlive(_buffer)
|
|
|
|
buffer := common.Dup(_buffer)
|
|
|
|
defer buffer.Release()
|
|
|
|
buffer.IncRef()
|
|
|
|
defer buffer.DecRef()
|
|
|
|
packetService := (*myInboundPacketAdapter)(a)
|
|
|
|
oob := make([]byte, 1024)
|
|
|
|
for {
|
|
|
|
buffer.Reset()
|
|
|
|
n, oobN, _, addr, err := a.udpConn.ReadMsgUDPAddrPort(buffer.FreeBytes(), oob)
|
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
buffer.Truncate(n)
|
|
|
|
var metadata adapter.InboundContext
|
|
|
|
metadata.Inbound = a.tag
|
2022-07-19 14:16:49 +00:00
|
|
|
metadata.InboundType = a.protocol
|
2022-07-15 00:42:02 +00:00
|
|
|
metadata.SniffEnabled = a.listenOptions.SniffEnabled
|
|
|
|
metadata.SniffOverrideDestination = a.listenOptions.SniffOverrideDestination
|
|
|
|
metadata.DomainStrategy = dns.DomainStrategy(a.listenOptions.DomainStrategy)
|
|
|
|
metadata.Source = M.SocksaddrFromNetIP(addr)
|
2022-08-20 02:38:12 +00:00
|
|
|
metadata.OriginDestination = a.udpAddr
|
2022-07-15 00:42:02 +00:00
|
|
|
err = a.oobPacketHandler.NewPacket(a.ctx, packetService, buffer, oob[:oobN], metadata)
|
|
|
|
if err != nil {
|
|
|
|
a.newError(E.Cause(err, "process packet from ", metadata.Source))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-07-01 11:34:02 +00:00
|
|
|
func (a *myInboundAdapter) loopUDPInThreadSafe() {
|
|
|
|
defer close(a.packetOutboundClosed)
|
|
|
|
packetService := (*myInboundPacketAdapter)(a)
|
|
|
|
for {
|
|
|
|
buffer := buf.NewPacket()
|
|
|
|
n, addr, err := a.udpConn.ReadFromUDPAddrPort(buffer.FreeBytes())
|
|
|
|
if err != nil {
|
2022-07-03 05:14:49 +00:00
|
|
|
buffer.Release()
|
2022-07-01 11:34:02 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
buffer.Truncate(n)
|
2022-07-02 06:07:50 +00:00
|
|
|
var metadata adapter.InboundContext
|
|
|
|
metadata.Inbound = a.tag
|
2022-07-19 14:16:49 +00:00
|
|
|
metadata.InboundType = a.protocol
|
2022-07-06 04:39:44 +00:00
|
|
|
metadata.SniffEnabled = a.listenOptions.SniffEnabled
|
|
|
|
metadata.SniffOverrideDestination = a.listenOptions.SniffOverrideDestination
|
2022-07-11 10:44:59 +00:00
|
|
|
metadata.DomainStrategy = dns.DomainStrategy(a.listenOptions.DomainStrategy)
|
2022-07-02 06:07:50 +00:00
|
|
|
metadata.Source = M.SocksaddrFromNetIP(addr)
|
2022-08-20 02:38:12 +00:00
|
|
|
metadata.OriginDestination = a.udpAddr
|
2022-07-01 11:34:02 +00:00
|
|
|
err = a.packetHandler.NewPacket(a.ctx, packetService, buffer, metadata)
|
|
|
|
if err != nil {
|
|
|
|
buffer.Release()
|
2022-07-02 06:07:50 +00:00
|
|
|
a.newError(E.Cause(err, "process packet from ", metadata.Source))
|
2022-07-01 11:34:02 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-07-15 00:42:02 +00:00
|
|
|
func (a *myInboundAdapter) loopUDPOOBInThreadSafe() {
|
|
|
|
defer close(a.packetOutboundClosed)
|
|
|
|
packetService := (*myInboundPacketAdapter)(a)
|
|
|
|
oob := make([]byte, 1024)
|
|
|
|
for {
|
|
|
|
buffer := buf.NewPacket()
|
|
|
|
n, oobN, _, addr, err := a.udpConn.ReadMsgUDPAddrPort(buffer.FreeBytes(), oob)
|
|
|
|
if err != nil {
|
|
|
|
buffer.Release()
|
|
|
|
return
|
|
|
|
}
|
|
|
|
buffer.Truncate(n)
|
|
|
|
var metadata adapter.InboundContext
|
|
|
|
metadata.Inbound = a.tag
|
2022-07-19 14:16:49 +00:00
|
|
|
metadata.InboundType = a.protocol
|
2022-07-15 00:42:02 +00:00
|
|
|
metadata.SniffEnabled = a.listenOptions.SniffEnabled
|
|
|
|
metadata.SniffOverrideDestination = a.listenOptions.SniffOverrideDestination
|
|
|
|
metadata.DomainStrategy = dns.DomainStrategy(a.listenOptions.DomainStrategy)
|
|
|
|
metadata.Source = M.SocksaddrFromNetIP(addr)
|
2022-08-20 02:38:12 +00:00
|
|
|
metadata.OriginDestination = a.udpAddr
|
2022-07-15 00:42:02 +00:00
|
|
|
err = a.oobPacketHandler.NewPacket(a.ctx, packetService, buffer, oob[:oobN], metadata)
|
|
|
|
if err != nil {
|
|
|
|
buffer.Release()
|
|
|
|
a.newError(E.Cause(err, "process packet from ", metadata.Source))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-07-01 11:34:02 +00:00
|
|
|
func (a *myInboundAdapter) loopUDPOut() {
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case packet := <-a.packetOutbound:
|
|
|
|
err := a.writePacket(packet.buffer, packet.destination)
|
|
|
|
if err != nil && !E.IsClosed(err) {
|
|
|
|
a.newError(E.New("write back udp: ", err))
|
|
|
|
}
|
|
|
|
continue
|
|
|
|
case <-a.packetOutboundClosed:
|
|
|
|
}
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case packet := <-a.packetOutbound:
|
|
|
|
packet.buffer.Release()
|
|
|
|
default:
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (a *myInboundAdapter) newError(err error) {
|
2022-07-02 06:07:50 +00:00
|
|
|
a.logger.Error(err)
|
2022-07-01 11:34:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (a *myInboundAdapter) NewError(ctx context.Context, err error) {
|
2022-07-09 11:18:37 +00:00
|
|
|
NewError(a.logger, ctx, err)
|
|
|
|
}
|
|
|
|
|
2022-07-12 07:17:29 +00:00
|
|
|
func NewError(logger log.ContextLogger, ctx context.Context, err error) {
|
2022-07-01 11:34:02 +00:00
|
|
|
common.Close(err)
|
2022-07-20 01:41:44 +00:00
|
|
|
if E.IsClosedOrCanceled(err) {
|
2022-08-16 15:37:51 +00:00
|
|
|
logger.DebugContext(ctx, "connection closed: ", err)
|
2022-07-01 11:34:02 +00:00
|
|
|
return
|
|
|
|
}
|
2022-07-12 07:17:29 +00:00
|
|
|
logger.ErrorContext(ctx, err)
|
2022-07-01 11:34:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (a *myInboundAdapter) writePacket(buffer *buf.Buffer, destination M.Socksaddr) error {
|
|
|
|
defer buffer.Release()
|
2022-07-02 14:55:10 +00:00
|
|
|
if destination.IsFqdn() {
|
2022-07-29 16:29:22 +00:00
|
|
|
udpAddr, err := net.ResolveUDPAddr(N.NetworkUDP, destination.String())
|
2022-07-01 11:34:02 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return common.Error(a.udpConn.WriteTo(buffer.Bytes(), udpAddr))
|
|
|
|
}
|
|
|
|
return common.Error(a.udpConn.WriteToUDPAddrPort(buffer.Bytes(), destination.AddrPort()))
|
|
|
|
}
|
|
|
|
|
|
|
|
type myInboundPacketAdapter myInboundAdapter
|
|
|
|
|
|
|
|
func (s *myInboundPacketAdapter) ReadPacket(buffer *buf.Buffer) (M.Socksaddr, error) {
|
|
|
|
n, addr, err := s.udpConn.ReadFromUDPAddrPort(buffer.FreeBytes())
|
|
|
|
if err != nil {
|
|
|
|
return M.Socksaddr{}, err
|
|
|
|
}
|
|
|
|
buffer.Truncate(n)
|
|
|
|
return M.SocksaddrFromNetIP(addr), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *myInboundPacketAdapter) WriteIsThreadUnsafe() {
|
|
|
|
}
|
|
|
|
|
|
|
|
type myInboundPacket struct {
|
|
|
|
buffer *buf.Buffer
|
|
|
|
destination M.Socksaddr
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *myInboundPacketAdapter) Upstream() any {
|
|
|
|
return s.udpConn
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *myInboundPacketAdapter) WritePacket(buffer *buf.Buffer, destination M.Socksaddr) error {
|
|
|
|
s.packetAccess.RLock()
|
|
|
|
defer s.packetAccess.RUnlock()
|
|
|
|
|
|
|
|
select {
|
|
|
|
case <-s.packetOutboundClosed:
|
|
|
|
return os.ErrClosed
|
|
|
|
default:
|
|
|
|
}
|
|
|
|
|
|
|
|
s.packetOutbound <- &myInboundPacket{buffer, destination}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *myInboundPacketAdapter) Close() error {
|
|
|
|
return s.udpConn.Close()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *myInboundPacketAdapter) LocalAddr() net.Addr {
|
|
|
|
return s.udpConn.LocalAddr()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *myInboundPacketAdapter) SetDeadline(t time.Time) error {
|
|
|
|
return s.udpConn.SetDeadline(t)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *myInboundPacketAdapter) SetReadDeadline(t time.Time) error {
|
|
|
|
return s.udpConn.SetReadDeadline(t)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *myInboundPacketAdapter) SetWriteDeadline(t time.Time) error {
|
|
|
|
return s.udpConn.SetWriteDeadline(t)
|
|
|
|
}
|