mirror of
https://github.com/SagerNet/sing-quic.git
synced 2025-04-05 12:57:39 +03:00
Improve server API
This commit is contained in:
parent
98205e7e79
commit
b55f3531e7
4 changed files with 75 additions and 88 deletions
|
@ -26,7 +26,7 @@ import (
|
||||||
aTLS "github.com/sagernet/sing/common/tls"
|
aTLS "github.com/sagernet/sing/common/tls"
|
||||||
)
|
)
|
||||||
|
|
||||||
type ServerOptions struct {
|
type ServiceOptions struct {
|
||||||
Context context.Context
|
Context context.Context
|
||||||
Logger logger.Logger
|
Logger logger.Logger
|
||||||
SendBPS uint64
|
SendBPS uint64
|
||||||
|
@ -34,23 +34,17 @@ type ServerOptions struct {
|
||||||
IgnoreClientBandwidth bool
|
IgnoreClientBandwidth bool
|
||||||
SalamanderPassword string
|
SalamanderPassword string
|
||||||
TLSConfig aTLS.ServerConfig
|
TLSConfig aTLS.ServerConfig
|
||||||
Users []User
|
|
||||||
UDPDisabled bool
|
UDPDisabled bool
|
||||||
Handler ServerHandler
|
Handler ServerHandler
|
||||||
MasqueradeHandler http.Handler
|
MasqueradeHandler http.Handler
|
||||||
}
|
}
|
||||||
|
|
||||||
type User struct {
|
|
||||||
Name string
|
|
||||||
Password string
|
|
||||||
}
|
|
||||||
|
|
||||||
type ServerHandler interface {
|
type ServerHandler interface {
|
||||||
N.TCPConnectionHandler
|
N.TCPConnectionHandler
|
||||||
N.UDPConnectionHandler
|
N.UDPConnectionHandler
|
||||||
}
|
}
|
||||||
|
|
||||||
type Server struct {
|
type Service[U comparable] struct {
|
||||||
ctx context.Context
|
ctx context.Context
|
||||||
logger logger.Logger
|
logger logger.Logger
|
||||||
sendBPS uint64
|
sendBPS uint64
|
||||||
|
@ -59,14 +53,14 @@ type Server struct {
|
||||||
salamanderPassword string
|
salamanderPassword string
|
||||||
tlsConfig aTLS.ServerConfig
|
tlsConfig aTLS.ServerConfig
|
||||||
quicConfig *quic.Config
|
quicConfig *quic.Config
|
||||||
userMap map[string]User
|
userMap map[string]U
|
||||||
udpDisabled bool
|
udpDisabled bool
|
||||||
handler ServerHandler
|
handler ServerHandler
|
||||||
masqueradeHandler http.Handler
|
masqueradeHandler http.Handler
|
||||||
quicListener io.Closer
|
quicListener io.Closer
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewServer(options ServerOptions) (*Server, error) {
|
func NewService[U comparable](options ServiceOptions) (*Service[U], error) {
|
||||||
quicConfig := &quic.Config{
|
quicConfig := &quic.Config{
|
||||||
DisablePathMTUDiscovery: !(runtime.GOOS == "windows" || runtime.GOOS == "linux" || runtime.GOOS == "android" || runtime.GOOS == "darwin"),
|
DisablePathMTUDiscovery: !(runtime.GOOS == "windows" || runtime.GOOS == "linux" || runtime.GOOS == "android" || runtime.GOOS == "darwin"),
|
||||||
EnableDatagrams: !options.UDPDisabled,
|
EnableDatagrams: !options.UDPDisabled,
|
||||||
|
@ -78,17 +72,10 @@ func NewServer(options ServerOptions) (*Server, error) {
|
||||||
MaxIdleTimeout: defaultMaxIdleTimeout,
|
MaxIdleTimeout: defaultMaxIdleTimeout,
|
||||||
KeepAlivePeriod: defaultKeepAlivePeriod,
|
KeepAlivePeriod: defaultKeepAlivePeriod,
|
||||||
}
|
}
|
||||||
if len(options.Users) == 0 {
|
|
||||||
return nil, E.New("missing users")
|
|
||||||
}
|
|
||||||
userMap := make(map[string]User)
|
|
||||||
for _, user := range options.Users {
|
|
||||||
userMap[user.Password] = user
|
|
||||||
}
|
|
||||||
if options.MasqueradeHandler == nil {
|
if options.MasqueradeHandler == nil {
|
||||||
options.MasqueradeHandler = http.NotFoundHandler()
|
options.MasqueradeHandler = http.NotFoundHandler()
|
||||||
}
|
}
|
||||||
return &Server{
|
return &Service[U]{
|
||||||
ctx: options.Context,
|
ctx: options.Context,
|
||||||
logger: options.Logger,
|
logger: options.Logger,
|
||||||
sendBPS: options.SendBPS,
|
sendBPS: options.SendBPS,
|
||||||
|
@ -97,14 +84,22 @@ func NewServer(options ServerOptions) (*Server, error) {
|
||||||
salamanderPassword: options.SalamanderPassword,
|
salamanderPassword: options.SalamanderPassword,
|
||||||
tlsConfig: options.TLSConfig,
|
tlsConfig: options.TLSConfig,
|
||||||
quicConfig: quicConfig,
|
quicConfig: quicConfig,
|
||||||
userMap: userMap,
|
userMap: make(map[string]U),
|
||||||
udpDisabled: options.UDPDisabled,
|
udpDisabled: options.UDPDisabled,
|
||||||
handler: options.Handler,
|
handler: options.Handler,
|
||||||
masqueradeHandler: options.MasqueradeHandler,
|
masqueradeHandler: options.MasqueradeHandler,
|
||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *Server) Start(conn net.PacketConn) error {
|
func (s *Service[U]) UpdateUsers(userList []U, passwordList []string) {
|
||||||
|
userMap := make(map[string]U)
|
||||||
|
for i, user := range userList {
|
||||||
|
userMap[passwordList[i]] = user
|
||||||
|
}
|
||||||
|
s.userMap = userMap
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *Service[U]) Start(conn net.PacketConn) error {
|
||||||
if s.salamanderPassword != "" {
|
if s.salamanderPassword != "" {
|
||||||
conn = NewSalamanderConn(conn, []byte(s.salamanderPassword))
|
conn = NewSalamanderConn(conn, []byte(s.salamanderPassword))
|
||||||
}
|
}
|
||||||
|
@ -121,13 +116,13 @@ func (s *Server) Start(conn net.PacketConn) error {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *Server) Close() error {
|
func (s *Service[U]) Close() error {
|
||||||
return common.Close(
|
return common.Close(
|
||||||
s.quicListener,
|
s.quicListener,
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *Server) loopConnections(listener qtls.Listener) {
|
func (s *Service[U]) loopConnections(listener qtls.Listener) {
|
||||||
for {
|
for {
|
||||||
connection, err := listener.Accept(s.ctx)
|
connection, err := listener.Accept(s.ctx)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -142,9 +137,9 @@ func (s *Server) loopConnections(listener qtls.Listener) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *Server) handleConnection(connection quic.Connection) {
|
func (s *Service[U]) handleConnection(connection quic.Connection) {
|
||||||
session := &serverSession{
|
session := &serverSession[U]{
|
||||||
Server: s,
|
Service: s,
|
||||||
ctx: s.ctx,
|
ctx: s.ctx,
|
||||||
quicConn: connection,
|
quicConn: connection,
|
||||||
source: M.SocksaddrFromNet(connection.RemoteAddr()),
|
source: M.SocksaddrFromNet(connection.RemoteAddr()),
|
||||||
|
@ -159,8 +154,8 @@ func (s *Server) handleConnection(connection quic.Connection) {
|
||||||
_ = connection.CloseWithError(0, "")
|
_ = connection.CloseWithError(0, "")
|
||||||
}
|
}
|
||||||
|
|
||||||
type serverSession struct {
|
type serverSession[U comparable] struct {
|
||||||
*Server
|
*Service[U]
|
||||||
ctx context.Context
|
ctx context.Context
|
||||||
quicConn quic.Connection
|
quicConn quic.Connection
|
||||||
source M.Socksaddr
|
source M.Socksaddr
|
||||||
|
@ -168,12 +163,12 @@ type serverSession struct {
|
||||||
connDone chan struct{}
|
connDone chan struct{}
|
||||||
connErr error
|
connErr error
|
||||||
authenticated bool
|
authenticated bool
|
||||||
authUser *User
|
authUser U
|
||||||
udpAccess sync.RWMutex
|
udpAccess sync.RWMutex
|
||||||
udpConnMap map[uint32]*udpPacketConn
|
udpConnMap map[uint32]*udpPacketConn
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *serverSession) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
func (s *serverSession[U]) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
||||||
if r.Method == http.MethodPost && r.Host == protocol.URLHost && r.URL.Path == protocol.URLPath {
|
if r.Method == http.MethodPost && r.Host == protocol.URLHost && r.URL.Path == protocol.URLPath {
|
||||||
if s.authenticated {
|
if s.authenticated {
|
||||||
protocol.AuthResponseToHeader(w.Header(), protocol.AuthResponse{
|
protocol.AuthResponseToHeader(w.Header(), protocol.AuthResponse{
|
||||||
|
@ -190,7 +185,7 @@ func (s *serverSession) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
||||||
s.masqueradeHandler.ServeHTTP(w, r)
|
s.masqueradeHandler.ServeHTTP(w, r)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
s.authUser = &user
|
s.authUser = user
|
||||||
s.authenticated = true
|
s.authenticated = true
|
||||||
if !s.ignoreClientBandwidth && request.Rx > 0 {
|
if !s.ignoreClientBandwidth && request.Rx > 0 {
|
||||||
var sendBps uint64
|
var sendBps uint64
|
||||||
|
@ -231,7 +226,7 @@ func (s *serverSession) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *serverSession) handleStream0(frameType http3.FrameType, connection quic.Connection, stream quic.Stream, err error) (bool, error) {
|
func (s *serverSession[U]) handleStream0(frameType http3.FrameType, connection quic.Connection, stream quic.Stream, err error) (bool, error) {
|
||||||
if !s.authenticated || err != nil {
|
if !s.authenticated || err != nil {
|
||||||
return false, nil
|
return false, nil
|
||||||
}
|
}
|
||||||
|
@ -251,15 +246,12 @@ func (s *serverSession) handleStream0(frameType http3.FrameType, connection quic
|
||||||
return true, nil
|
return true, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *serverSession) handleStream(stream quic.Stream) error {
|
func (s *serverSession[U]) handleStream(stream quic.Stream) error {
|
||||||
destinationString, err := protocol.ReadTCPRequest(stream)
|
destinationString, err := protocol.ReadTCPRequest(stream)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return E.New("read TCP request")
|
return E.New("read TCP request")
|
||||||
}
|
}
|
||||||
ctx := s.ctx
|
ctx := auth.ContextWithUser(s.ctx, s.authUser)
|
||||||
if s.authUser.Name != "" {
|
|
||||||
ctx = auth.ContextWithUser(s.ctx, s.authUser.Name)
|
|
||||||
}
|
|
||||||
_ = s.handler.NewConnection(ctx, &serverConn{Stream: stream}, M.Metadata{
|
_ = s.handler.NewConnection(ctx, &serverConn{Stream: stream}, M.Metadata{
|
||||||
Source: s.source,
|
Source: s.source,
|
||||||
Destination: M.ParseSocksaddr(destinationString),
|
Destination: M.ParseSocksaddr(destinationString),
|
||||||
|
@ -267,7 +259,7 @@ func (s *serverSession) handleStream(stream quic.Stream) error {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *serverSession) closeWithError(err error) {
|
func (s *serverSession[U]) closeWithError(err error) {
|
||||||
s.connAccess.Lock()
|
s.connAccess.Lock()
|
||||||
defer s.connAccess.Unlock()
|
defer s.connAccess.Unlock()
|
||||||
select {
|
select {
|
|
@ -6,7 +6,7 @@ import (
|
||||||
M "github.com/sagernet/sing/common/metadata"
|
M "github.com/sagernet/sing/common/metadata"
|
||||||
)
|
)
|
||||||
|
|
||||||
func (s *serverSession) loopMessages() {
|
func (s *serverSession[U]) loopMessages() {
|
||||||
for {
|
for {
|
||||||
message, err := s.quicConn.ReceiveMessage(s.ctx)
|
message, err := s.quicConn.ReceiveMessage(s.ctx)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -21,7 +21,7 @@ func (s *serverSession) loopMessages() {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *serverSession) handleMessage(data []byte) error {
|
func (s *serverSession[U]) handleMessage(data []byte) error {
|
||||||
message := allocMessage()
|
message := allocMessage()
|
||||||
err := decodeUDPMessage(message, data)
|
err := decodeUDPMessage(message, data)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -32,7 +32,7 @@ func (s *serverSession) handleMessage(data []byte) error {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *serverSession) handleUDPMessage(message *udpMessage) {
|
func (s *serverSession[U]) handleUDPMessage(message *udpMessage) {
|
||||||
s.udpAccess.RLock()
|
s.udpAccess.RLock()
|
||||||
udpConn, loaded := s.udpConnMap[message.sessionID]
|
udpConn, loaded := s.udpConnMap[message.sessionID]
|
||||||
s.udpAccess.RUnlock()
|
s.udpAccess.RUnlock()
|
|
@ -25,44 +25,38 @@ import (
|
||||||
aTLS "github.com/sagernet/sing/common/tls"
|
aTLS "github.com/sagernet/sing/common/tls"
|
||||||
)
|
)
|
||||||
|
|
||||||
type ServerOptions struct {
|
type ServiceOptions struct {
|
||||||
Context context.Context
|
Context context.Context
|
||||||
Logger logger.Logger
|
Logger logger.Logger
|
||||||
TLSConfig aTLS.ServerConfig
|
TLSConfig aTLS.ServerConfig
|
||||||
Users []User
|
|
||||||
CongestionControl string
|
CongestionControl string
|
||||||
AuthTimeout time.Duration
|
AuthTimeout time.Duration
|
||||||
ZeroRTTHandshake bool
|
ZeroRTTHandshake bool
|
||||||
Heartbeat time.Duration
|
Heartbeat time.Duration
|
||||||
Handler ServerHandler
|
Handler ServiceHandler
|
||||||
}
|
}
|
||||||
|
|
||||||
type User struct {
|
type ServiceHandler interface {
|
||||||
Name string
|
|
||||||
UUID [16]byte
|
|
||||||
Password string
|
|
||||||
}
|
|
||||||
|
|
||||||
type ServerHandler interface {
|
|
||||||
N.TCPConnectionHandler
|
N.TCPConnectionHandler
|
||||||
N.UDPConnectionHandler
|
N.UDPConnectionHandler
|
||||||
}
|
}
|
||||||
|
|
||||||
type Server struct {
|
type Service[U comparable] struct {
|
||||||
ctx context.Context
|
ctx context.Context
|
||||||
logger logger.Logger
|
logger logger.Logger
|
||||||
tlsConfig aTLS.ServerConfig
|
tlsConfig aTLS.ServerConfig
|
||||||
heartbeat time.Duration
|
heartbeat time.Duration
|
||||||
quicConfig *quic.Config
|
quicConfig *quic.Config
|
||||||
userMap map[[16]byte]User
|
userMap map[[16]byte]U
|
||||||
|
passwordMap map[U]string
|
||||||
congestionControl string
|
congestionControl string
|
||||||
authTimeout time.Duration
|
authTimeout time.Duration
|
||||||
handler ServerHandler
|
handler ServiceHandler
|
||||||
|
|
||||||
quicListener io.Closer
|
quicListener io.Closer
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewServer(options ServerOptions) (*Server, error) {
|
func NewService[U comparable](options ServiceOptions) (*Service[U], error) {
|
||||||
if options.AuthTimeout == 0 {
|
if options.AuthTimeout == 0 {
|
||||||
options.AuthTimeout = 3 * time.Second
|
options.AuthTimeout = 3 * time.Second
|
||||||
}
|
}
|
||||||
|
@ -84,27 +78,31 @@ func NewServer(options ServerOptions) (*Server, error) {
|
||||||
default:
|
default:
|
||||||
return nil, E.New("unknown congestion control algorithm: ", options.CongestionControl)
|
return nil, E.New("unknown congestion control algorithm: ", options.CongestionControl)
|
||||||
}
|
}
|
||||||
if len(options.Users) == 0 {
|
return &Service[U]{
|
||||||
return nil, E.New("missing users")
|
|
||||||
}
|
|
||||||
userMap := make(map[[16]byte]User)
|
|
||||||
for _, user := range options.Users {
|
|
||||||
userMap[user.UUID] = user
|
|
||||||
}
|
|
||||||
return &Server{
|
|
||||||
ctx: options.Context,
|
ctx: options.Context,
|
||||||
logger: options.Logger,
|
logger: options.Logger,
|
||||||
tlsConfig: options.TLSConfig,
|
tlsConfig: options.TLSConfig,
|
||||||
heartbeat: options.Heartbeat,
|
heartbeat: options.Heartbeat,
|
||||||
quicConfig: quicConfig,
|
quicConfig: quicConfig,
|
||||||
userMap: userMap,
|
userMap: make(map[[16]byte]U),
|
||||||
congestionControl: options.CongestionControl,
|
congestionControl: options.CongestionControl,
|
||||||
authTimeout: options.AuthTimeout,
|
authTimeout: options.AuthTimeout,
|
||||||
handler: options.Handler,
|
handler: options.Handler,
|
||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *Server) Start(conn net.PacketConn) error {
|
func (s *Service[U]) UpdateUsers(userList []U, uuidList [][16]byte, passwordList []string) {
|
||||||
|
userMap := make(map[[16]byte]U)
|
||||||
|
passwordMap := make(map[U]string)
|
||||||
|
for index := range userList {
|
||||||
|
userMap[uuidList[index]] = userList[index]
|
||||||
|
passwordMap[userList[index]] = passwordList[index]
|
||||||
|
}
|
||||||
|
s.userMap = userMap
|
||||||
|
s.passwordMap = passwordMap
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *Service[U]) Start(conn net.PacketConn) error {
|
||||||
if !s.quicConfig.Allow0RTT {
|
if !s.quicConfig.Allow0RTT {
|
||||||
listener, err := qtls.Listen(conn, s.tlsConfig, s.quicConfig)
|
listener, err := qtls.Listen(conn, s.tlsConfig, s.quicConfig)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -149,16 +147,16 @@ func (s *Server) Start(conn net.PacketConn) error {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *Server) Close() error {
|
func (s *Service[U]) Close() error {
|
||||||
return common.Close(
|
return common.Close(
|
||||||
s.quicListener,
|
s.quicListener,
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *Server) handleConnection(connection quic.Connection) {
|
func (s *Service[U]) handleConnection(connection quic.Connection) {
|
||||||
setCongestion(s.ctx, connection, s.congestionControl)
|
setCongestion(s.ctx, connection, s.congestionControl)
|
||||||
session := &serverSession{
|
session := &serverSession[U]{
|
||||||
Server: s,
|
Service: s,
|
||||||
ctx: s.ctx,
|
ctx: s.ctx,
|
||||||
quicConn: connection,
|
quicConn: connection,
|
||||||
source: M.SocksaddrFromNet(connection.RemoteAddr()),
|
source: M.SocksaddrFromNet(connection.RemoteAddr()),
|
||||||
|
@ -169,8 +167,8 @@ func (s *Server) handleConnection(connection quic.Connection) {
|
||||||
session.handle()
|
session.handle()
|
||||||
}
|
}
|
||||||
|
|
||||||
type serverSession struct {
|
type serverSession[U comparable] struct {
|
||||||
*Server
|
*Service[U]
|
||||||
ctx context.Context
|
ctx context.Context
|
||||||
quicConn quic.Connection
|
quicConn quic.Connection
|
||||||
source M.Socksaddr
|
source M.Socksaddr
|
||||||
|
@ -178,12 +176,12 @@ type serverSession struct {
|
||||||
connDone chan struct{}
|
connDone chan struct{}
|
||||||
connErr error
|
connErr error
|
||||||
authDone chan struct{}
|
authDone chan struct{}
|
||||||
authUser *User
|
authUser U
|
||||||
udpAccess sync.RWMutex
|
udpAccess sync.RWMutex
|
||||||
udpConnMap map[uint16]*udpPacketConn
|
udpConnMap map[uint16]*udpPacketConn
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *serverSession) handle() {
|
func (s *serverSession[U]) handle() {
|
||||||
if s.ctx.Done() != nil {
|
if s.ctx.Done() != nil {
|
||||||
go func() {
|
go func() {
|
||||||
select {
|
select {
|
||||||
|
@ -200,7 +198,7 @@ func (s *serverSession) handle() {
|
||||||
go s.loopHeartbeats()
|
go s.loopHeartbeats()
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *serverSession) loopUniStreams() {
|
func (s *serverSession[U]) loopUniStreams() {
|
||||||
for {
|
for {
|
||||||
uniStream, err := s.quicConn.AcceptUniStream(s.ctx)
|
uniStream, err := s.quicConn.AcceptUniStream(s.ctx)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -215,7 +213,7 @@ func (s *serverSession) loopUniStreams() {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *serverSession) handleUniStream(stream quic.ReceiveStream) error {
|
func (s *serverSession[U]) handleUniStream(stream quic.ReceiveStream) error {
|
||||||
defer stream.CancelRead(0)
|
defer stream.CancelRead(0)
|
||||||
buffer := buf.New()
|
buffer := buf.New()
|
||||||
defer buffer.Release()
|
defer buffer.Release()
|
||||||
|
@ -248,14 +246,14 @@ func (s *serverSession) handleUniStream(stream quic.ReceiveStream) error {
|
||||||
return E.New("authentication: unknown user ", userUUID)
|
return E.New("authentication: unknown user ", userUUID)
|
||||||
}
|
}
|
||||||
handshakeState := s.quicConn.ConnectionState()
|
handshakeState := s.quicConn.ConnectionState()
|
||||||
tuicToken, err := handshakeState.ExportKeyingMaterial(string(user.UUID[:]), []byte(user.Password), 32)
|
tuicToken, err := handshakeState.ExportKeyingMaterial(string(userUUID[:]), []byte(s.passwordMap[user]), 32)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return E.Cause(err, "authentication: export keying material")
|
return E.Cause(err, "authentication: export keying material")
|
||||||
}
|
}
|
||||||
if !bytes.Equal(tuicToken, buffer.Range(2+16, 2+16+32)) {
|
if !bytes.Equal(tuicToken, buffer.Range(2+16, 2+16+32)) {
|
||||||
return E.New("authentication: token mismatch")
|
return E.New("authentication: token mismatch")
|
||||||
}
|
}
|
||||||
s.authUser = &user
|
s.authUser = user
|
||||||
close(s.authDone)
|
close(s.authDone)
|
||||||
return nil
|
return nil
|
||||||
case CommandPacket:
|
case CommandPacket:
|
||||||
|
@ -301,7 +299,7 @@ func (s *serverSession) handleUniStream(stream quic.ReceiveStream) error {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *serverSession) handleAuthTimeout() {
|
func (s *serverSession[U]) handleAuthTimeout() {
|
||||||
select {
|
select {
|
||||||
case <-s.connDone:
|
case <-s.connDone:
|
||||||
case <-s.authDone:
|
case <-s.authDone:
|
||||||
|
@ -310,7 +308,7 @@ func (s *serverSession) handleAuthTimeout() {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *serverSession) loopStreams() {
|
func (s *serverSession[U]) loopStreams() {
|
||||||
for {
|
for {
|
||||||
stream, err := s.quicConn.AcceptStream(s.ctx)
|
stream, err := s.quicConn.AcceptStream(s.ctx)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -327,7 +325,7 @@ func (s *serverSession) loopStreams() {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *serverSession) handleStream(stream quic.Stream) error {
|
func (s *serverSession[U]) handleStream(stream quic.Stream) error {
|
||||||
buffer := buf.NewSize(2 + M.MaxSocksaddrLength)
|
buffer := buf.NewSize(2 + M.MaxSocksaddrLength)
|
||||||
defer buffer.Release()
|
defer buffer.Release()
|
||||||
_, err := buffer.ReadAtLeastFrom(stream, 2)
|
_, err := buffer.ReadAtLeastFrom(stream, 2)
|
||||||
|
@ -360,10 +358,7 @@ func (s *serverSession) handleStream(stream quic.Stream) error {
|
||||||
} else {
|
} else {
|
||||||
conn = bufio.NewCachedConn(conn, buffer)
|
conn = bufio.NewCachedConn(conn, buffer)
|
||||||
}
|
}
|
||||||
ctx := s.ctx
|
ctx := auth.ContextWithUser(s.ctx, s.authUser)
|
||||||
if s.authUser.Name != "" {
|
|
||||||
ctx = auth.ContextWithUser(s.ctx, s.authUser.Name)
|
|
||||||
}
|
|
||||||
_ = s.handler.NewConnection(ctx, conn, M.Metadata{
|
_ = s.handler.NewConnection(ctx, conn, M.Metadata{
|
||||||
Source: s.source,
|
Source: s.source,
|
||||||
Destination: destination,
|
Destination: destination,
|
||||||
|
@ -371,7 +366,7 @@ func (s *serverSession) handleStream(stream quic.Stream) error {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *serverSession) loopHeartbeats() {
|
func (s *serverSession[U]) loopHeartbeats() {
|
||||||
ticker := time.NewTicker(s.heartbeat)
|
ticker := time.NewTicker(s.heartbeat)
|
||||||
defer ticker.Stop()
|
defer ticker.Stop()
|
||||||
for {
|
for {
|
||||||
|
@ -387,7 +382,7 @@ func (s *serverSession) loopHeartbeats() {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *serverSession) closeWithError(err error) {
|
func (s *serverSession[U]) closeWithError(err error) {
|
||||||
s.connAccess.Lock()
|
s.connAccess.Lock()
|
||||||
defer s.connAccess.Unlock()
|
defer s.connAccess.Unlock()
|
||||||
select {
|
select {
|
|
@ -6,7 +6,7 @@ import (
|
||||||
M "github.com/sagernet/sing/common/metadata"
|
M "github.com/sagernet/sing/common/metadata"
|
||||||
)
|
)
|
||||||
|
|
||||||
func (s *serverSession) loopMessages() {
|
func (s *serverSession[U]) loopMessages() {
|
||||||
select {
|
select {
|
||||||
case <-s.connDone:
|
case <-s.connDone:
|
||||||
return
|
return
|
||||||
|
@ -26,7 +26,7 @@ func (s *serverSession) loopMessages() {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *serverSession) handleMessage(data []byte) error {
|
func (s *serverSession[U]) handleMessage(data []byte) error {
|
||||||
if len(data) < 2 {
|
if len(data) < 2 {
|
||||||
return E.New("invalid message")
|
return E.New("invalid message")
|
||||||
}
|
}
|
||||||
|
@ -50,7 +50,7 @@ func (s *serverSession) handleMessage(data []byte) error {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *serverSession) handleUDPMessage(message *udpMessage, udpStream bool) {
|
func (s *serverSession[U]) handleUDPMessage(message *udpMessage, udpStream bool) {
|
||||||
s.udpAccess.RLock()
|
s.udpAccess.RLock()
|
||||||
udpConn, loaded := s.udpConnMap[message.sessionID]
|
udpConn, loaded := s.udpConnMap[message.sessionID]
|
||||||
s.udpAccess.RUnlock()
|
s.udpAccess.RUnlock()
|
Loading…
Add table
Add a link
Reference in a new issue