sing-box/inbound/vmess.go

208 lines
6.2 KiB
Go
Raw Normal View History

2022-07-18 04:32:31 +00:00
package inbound
import (
"context"
"net"
"os"
"github.com/sagernet/sing-box/adapter"
"github.com/sagernet/sing-box/common/mux"
2022-09-09 10:45:10 +00:00
"github.com/sagernet/sing-box/common/tls"
"github.com/sagernet/sing-box/common/uot"
2022-07-18 04:32:31 +00:00
C "github.com/sagernet/sing-box/constant"
"github.com/sagernet/sing-box/log"
"github.com/sagernet/sing-box/option"
2022-08-22 10:53:47 +00:00
"github.com/sagernet/sing-box/transport/v2ray"
2022-07-18 04:32:31 +00:00
"github.com/sagernet/sing-vmess"
2022-08-27 03:28:01 +00:00
"github.com/sagernet/sing-vmess/packetaddr"
2022-07-18 04:32:31 +00:00
"github.com/sagernet/sing/common"
"github.com/sagernet/sing/common/auth"
2022-07-30 14:00:04 +00:00
E "github.com/sagernet/sing/common/exceptions"
2022-07-18 04:32:31 +00:00
F "github.com/sagernet/sing/common/format"
2022-08-27 03:28:01 +00:00
M "github.com/sagernet/sing/common/metadata"
2022-07-18 04:32:31 +00:00
N "github.com/sagernet/sing/common/network"
2023-08-31 06:00:47 +00:00
"github.com/sagernet/sing/common/ntp"
2022-07-18 04:32:31 +00:00
)
2022-08-29 11:43:13 +00:00
var (
_ adapter.Inbound = (*VMess)(nil)
_ adapter.InjectableInbound = (*VMess)(nil)
)
2022-07-18 04:32:31 +00:00
type VMess struct {
myInboundAdapter
2022-08-22 10:53:47 +00:00
ctx context.Context
2022-07-25 00:14:09 +00:00
service *vmess.Service[int]
users []option.VMessUser
2022-09-09 10:45:10 +00:00
tlsConfig tls.ServerConfig
2022-08-22 10:53:47 +00:00
transport adapter.V2RayServerTransport
2022-07-18 04:32:31 +00:00
}
func NewVMess(ctx context.Context, router adapter.Router, logger log.ContextLogger, tag string, options option.VMessInboundOptions) (*VMess, error) {
inbound := &VMess{
myInboundAdapter: myInboundAdapter{
protocol: C.TypeVMess,
2022-07-29 16:29:22 +00:00
network: []string{N.NetworkTCP},
2022-07-18 04:32:31 +00:00
ctx: ctx,
router: uot.NewRouter(router, logger),
2022-07-18 04:32:31 +00:00
logger: logger,
tag: tag,
listenOptions: options.ListenOptions,
},
2022-08-22 10:53:47 +00:00
ctx: ctx,
2022-07-18 04:32:31 +00:00
users: options.Users,
}
var err error
inbound.router, err = mux.NewRouterWithOptions(inbound.router, logger, common.PtrValueOrDefault(options.Multiplex))
if err != nil {
return nil, err
}
var serviceOptions []vmess.ServiceOption
2023-08-31 06:00:47 +00:00
if timeFunc := ntp.TimeFuncFromContext(ctx); timeFunc != nil {
2023-02-21 06:53:00 +00:00
serviceOptions = append(serviceOptions, vmess.ServiceWithTimeFunc(timeFunc))
}
if options.Transport != nil && options.Transport.Type != "" {
serviceOptions = append(serviceOptions, vmess.ServiceWithDisableHeaderProtection())
}
service := vmess.NewService[int](adapter.NewUpstreamContextHandler(inbound.newConnection, inbound.newPacketConnection, inbound), serviceOptions...)
2022-08-22 10:53:47 +00:00
inbound.service = service
err = service.UpdateUsers(common.MapIndexed(options.Users, func(index int, it option.VMessUser) int {
2022-07-18 04:32:31 +00:00
return index
2022-08-01 04:23:34 +00:00
}), common.Map(options.Users, func(it option.VMessUser) string {
return it.UUID
}), common.Map(options.Users, func(it option.VMessUser) int {
return it.AlterId
2022-07-18 04:32:31 +00:00
}))
if err != nil {
return nil, err
}
2022-07-25 00:14:09 +00:00
if options.TLS != nil {
2023-08-29 05:43:42 +00:00
inbound.tlsConfig, err = tls.NewServer(ctx, logger, common.PtrValueOrDefault(options.TLS))
2022-08-22 10:53:47 +00:00
if err != nil {
return nil, err
}
}
if options.Transport != nil {
inbound.transport, err = v2ray.NewServerTransport(ctx, common.PtrValueOrDefault(options.Transport), inbound.tlsConfig, (*vmessTransportHandler)(inbound))
2022-07-25 00:14:09 +00:00
if err != nil {
2022-08-22 14:19:25 +00:00
return nil, E.Cause(err, "create server transport: ", options.Transport.Type)
2022-07-25 00:14:09 +00:00
}
}
2022-07-18 04:32:31 +00:00
inbound.connHandler = inbound
return inbound, nil
}
2022-07-30 14:00:04 +00:00
func (h *VMess) Start() error {
2022-08-22 10:53:47 +00:00
err := common.Start(
2022-08-01 04:23:34 +00:00
h.service,
2022-09-09 10:45:10 +00:00
h.tlsConfig,
2022-08-01 04:23:34 +00:00
)
2022-08-22 10:53:47 +00:00
if err != nil {
return err
}
if h.transport == nil {
return h.myInboundAdapter.Start()
}
2022-08-22 13:20:05 +00:00
if common.Contains(h.transport.Network(), N.NetworkTCP) {
tcpListener, err := h.myInboundAdapter.ListenTCP()
if err != nil {
return err
}
go func() {
sErr := h.transport.Serve(tcpListener)
if sErr != nil && !E.IsClosed(sErr) {
h.logger.Error("transport serve error: ", sErr)
}
}()
2022-08-22 10:53:47 +00:00
}
2022-08-22 13:20:05 +00:00
if common.Contains(h.transport.Network(), N.NetworkUDP) {
udpConn, err := h.myInboundAdapter.ListenUDP()
if err != nil {
return err
2022-08-22 10:53:47 +00:00
}
2022-08-22 13:20:05 +00:00
go func() {
sErr := h.transport.ServePacket(udpConn)
if sErr != nil && !E.IsClosed(sErr) {
h.logger.Error("transport serve error: ", sErr)
}
}()
}
2022-08-22 10:53:47 +00:00
return nil
2022-07-30 14:00:04 +00:00
}
func (h *VMess) Close() error {
return common.Close(
2022-08-01 04:23:34 +00:00
h.service,
2022-07-30 14:00:04 +00:00
&h.myInboundAdapter,
2022-09-09 10:45:10 +00:00
h.tlsConfig,
2022-08-22 10:53:47 +00:00
h.transport,
2022-07-30 14:00:04 +00:00
)
}
2022-08-29 02:10:41 +00:00
func (h *VMess) newTransportConnection(ctx context.Context, conn net.Conn, metadata adapter.InboundContext) error {
2022-08-29 11:02:14 +00:00
h.injectTCP(conn, metadata)
2022-08-29 02:10:41 +00:00
return nil
}
2022-07-18 04:32:31 +00:00
func (h *VMess) NewConnection(ctx context.Context, conn net.Conn, metadata adapter.InboundContext) error {
2022-09-30 03:27:18 +00:00
var err error
2022-08-29 02:10:41 +00:00
if h.tlsConfig != nil && h.transport == nil {
2022-09-30 03:27:18 +00:00
conn, err = tls.ServerHandshake(ctx, conn, h.tlsConfig)
if err != nil {
return err
}
2022-07-25 00:14:09 +00:00
}
2022-07-18 04:32:31 +00:00
return h.service.NewConnection(adapter.WithContext(log.ContextWithNewID(ctx), &metadata), conn, adapter.UpstreamMetadata(metadata))
2022-08-22 10:53:47 +00:00
}
2022-08-29 11:43:13 +00:00
func (h *VMess) NewPacketConnection(ctx context.Context, conn N.PacketConn, metadata adapter.InboundContext) error {
return os.ErrInvalid
}
2022-07-18 04:32:31 +00:00
func (h *VMess) newConnection(ctx context.Context, conn net.Conn, metadata adapter.InboundContext) error {
userIndex, loaded := auth.UserFromContext[int](ctx)
if !loaded {
return os.ErrInvalid
}
user := h.users[userIndex].Name
if user == "" {
user = F.ToString(userIndex)
} else {
metadata.User = user
}
h.logger.InfoContext(ctx, "[", user, "] inbound connection to ", metadata.Destination)
return h.router.RouteConnection(ctx, conn, metadata)
}
func (h *VMess) newPacketConnection(ctx context.Context, conn N.PacketConn, metadata adapter.InboundContext) error {
userIndex, loaded := auth.UserFromContext[int](ctx)
if !loaded {
return os.ErrInvalid
}
user := h.users[userIndex].Name
if user == "" {
user = F.ToString(userIndex)
} else {
metadata.User = user
}
2022-08-27 03:28:01 +00:00
if metadata.Destination.Fqdn == packetaddr.SeqPacketMagicAddress {
metadata.Destination = M.Socksaddr{}
conn = packetaddr.NewConn(conn.(vmess.PacketConn), metadata.Destination)
h.logger.InfoContext(ctx, "[", user, "] inbound packet addr connection")
} else {
h.logger.InfoContext(ctx, "[", user, "] inbound packet connection to ", metadata.Destination)
}
2022-07-18 04:32:31 +00:00
return h.router.RoutePacketConnection(ctx, conn, metadata)
}
var _ adapter.V2RayServerTransportHandler = (*vmessTransportHandler)(nil)
type vmessTransportHandler VMess
func (t *vmessTransportHandler) NewConnection(ctx context.Context, conn net.Conn, metadata M.Metadata) error {
return (*VMess)(t).newTransportConnection(ctx, conn, adapter.InboundContext{
Source: metadata.Source,
Destination: metadata.Destination,
})
}