mirror of
https://github.com/SagerNet/sing-box.git
synced 2024-11-09 18:43:14 +00:00
89c723e3e4
Refactor Authenticator interface to struct & Update smux & Update gVisor to 20231204.0 & Update quic-go to v0.40.1 & Update wireguard-go & Add GSO support for TUN/WireGuard & Fix router pre-start & Fix bind forwarder to interface for systems stack
132 lines
3.6 KiB
Go
132 lines
3.6 KiB
Go
package outbound
|
|
|
|
import (
|
|
std_bufio "bufio"
|
|
"context"
|
|
"crypto/rand"
|
|
"encoding/hex"
|
|
"net"
|
|
|
|
"github.com/sagernet/sing-box/adapter"
|
|
"github.com/sagernet/sing-box/log"
|
|
"github.com/sagernet/sing/common"
|
|
"github.com/sagernet/sing/common/auth"
|
|
"github.com/sagernet/sing/common/buf"
|
|
"github.com/sagernet/sing/common/bufio"
|
|
E "github.com/sagernet/sing/common/exceptions"
|
|
M "github.com/sagernet/sing/common/metadata"
|
|
N "github.com/sagernet/sing/common/network"
|
|
"github.com/sagernet/sing/common/rw"
|
|
"github.com/sagernet/sing/protocol/http"
|
|
"github.com/sagernet/sing/protocol/socks"
|
|
"github.com/sagernet/sing/protocol/socks/socks4"
|
|
"github.com/sagernet/sing/protocol/socks/socks5"
|
|
)
|
|
|
|
type ProxyListener struct {
|
|
ctx context.Context
|
|
logger log.ContextLogger
|
|
dialer N.Dialer
|
|
tcpListener *net.TCPListener
|
|
username string
|
|
password string
|
|
authenticator *auth.Authenticator
|
|
}
|
|
|
|
func NewProxyListener(ctx context.Context, logger log.ContextLogger, dialer N.Dialer) *ProxyListener {
|
|
var usernameB [64]byte
|
|
var passwordB [64]byte
|
|
rand.Read(usernameB[:])
|
|
rand.Read(passwordB[:])
|
|
username := hex.EncodeToString(usernameB[:])
|
|
password := hex.EncodeToString(passwordB[:])
|
|
return &ProxyListener{
|
|
ctx: ctx,
|
|
logger: logger,
|
|
dialer: dialer,
|
|
authenticator: auth.NewAuthenticator([]auth.User{{Username: username, Password: password}}),
|
|
username: username,
|
|
password: password,
|
|
}
|
|
}
|
|
|
|
func (l *ProxyListener) Start() error {
|
|
tcpListener, err := net.ListenTCP("tcp", &net.TCPAddr{
|
|
IP: net.IPv4(127, 0, 0, 1),
|
|
})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
l.tcpListener = tcpListener
|
|
go l.acceptLoop()
|
|
return nil
|
|
}
|
|
|
|
func (l *ProxyListener) Port() uint16 {
|
|
if l.tcpListener == nil {
|
|
panic("start listener first")
|
|
}
|
|
return M.SocksaddrFromNet(l.tcpListener.Addr()).Port
|
|
}
|
|
|
|
func (l *ProxyListener) Username() string {
|
|
return l.username
|
|
}
|
|
|
|
func (l *ProxyListener) Password() string {
|
|
return l.password
|
|
}
|
|
|
|
func (l *ProxyListener) Close() error {
|
|
return common.Close(l.tcpListener)
|
|
}
|
|
|
|
func (l *ProxyListener) acceptLoop() {
|
|
for {
|
|
tcpConn, err := l.tcpListener.AcceptTCP()
|
|
if err != nil {
|
|
return
|
|
}
|
|
ctx := log.ContextWithNewID(l.ctx)
|
|
go func() {
|
|
hErr := l.accept(ctx, tcpConn)
|
|
if hErr != nil {
|
|
if E.IsClosedOrCanceled(hErr) {
|
|
l.logger.DebugContext(ctx, E.Cause(hErr, "proxy connection closed"))
|
|
return
|
|
}
|
|
l.logger.ErrorContext(ctx, E.Cause(hErr, "proxy"))
|
|
}
|
|
}()
|
|
}
|
|
}
|
|
|
|
func (l *ProxyListener) accept(ctx context.Context, conn *net.TCPConn) error {
|
|
headerType, err := rw.ReadByte(conn)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
switch headerType {
|
|
case socks4.Version, socks5.Version:
|
|
return socks.HandleConnection0(ctx, conn, headerType, l.authenticator, l, M.Metadata{})
|
|
}
|
|
reader := std_bufio.NewReader(bufio.NewCachedReader(conn, buf.As([]byte{headerType})))
|
|
return http.HandleConnection(ctx, conn, reader, l.authenticator, l, M.Metadata{})
|
|
}
|
|
|
|
func (l *ProxyListener) NewConnection(ctx context.Context, conn net.Conn, upstreamMetadata M.Metadata) error {
|
|
var metadata adapter.InboundContext
|
|
metadata.Network = N.NetworkTCP
|
|
metadata.Destination = upstreamMetadata.Destination
|
|
l.logger.InfoContext(ctx, "proxy connection to ", metadata.Destination)
|
|
return NewConnection(ctx, l.dialer, conn, metadata)
|
|
}
|
|
|
|
func (l *ProxyListener) NewPacketConnection(ctx context.Context, conn N.PacketConn, upstreamMetadata M.Metadata) error {
|
|
var metadata adapter.InboundContext
|
|
metadata.Network = N.NetworkUDP
|
|
metadata.Destination = upstreamMetadata.Destination
|
|
l.logger.InfoContext(ctx, "proxy packet connection to ", metadata.Destination)
|
|
return NewPacketConnection(ctx, l.dialer, conn, metadata)
|
|
}
|