mirror of
https://gitclone.com/github.com/MetaCubeX/Clash.Meta
synced 2025-05-12 21:18:03 +08:00
124 lines
2.9 KiB
Go
124 lines
2.9 KiB
Go
package http
|
|
|
|
import (
|
|
"crypto/tls"
|
|
"errors"
|
|
"net"
|
|
|
|
"github.com/metacubex/mihomo/adapter/inbound"
|
|
N "github.com/metacubex/mihomo/common/net"
|
|
C "github.com/metacubex/mihomo/constant"
|
|
authStore "github.com/metacubex/mihomo/listener/auth"
|
|
LC "github.com/metacubex/mihomo/listener/config"
|
|
"github.com/metacubex/mihomo/listener/reality"
|
|
)
|
|
|
|
type Listener struct {
|
|
listener net.Listener
|
|
addr string
|
|
closed bool
|
|
}
|
|
|
|
// RawAddress implements C.Listener
|
|
func (l *Listener) RawAddress() string {
|
|
return l.addr
|
|
}
|
|
|
|
// Address implements C.Listener
|
|
func (l *Listener) Address() string {
|
|
return l.listener.Addr().String()
|
|
}
|
|
|
|
// Close implements C.Listener
|
|
func (l *Listener) Close() error {
|
|
l.closed = true
|
|
return l.listener.Close()
|
|
}
|
|
|
|
func New(addr string, tunnel C.Tunnel, additions ...inbound.Addition) (*Listener, error) {
|
|
return NewWithConfig(LC.AuthServer{Enable: true, Listen: addr, AuthStore: authStore.Default}, tunnel, additions...)
|
|
}
|
|
|
|
// NewWithAuthenticate
|
|
// never change type traits because it's used in CMFA
|
|
func NewWithAuthenticate(addr string, tunnel C.Tunnel, authenticate bool, additions ...inbound.Addition) (*Listener, error) {
|
|
store := authStore.Default
|
|
if !authenticate {
|
|
store = authStore.Nil
|
|
}
|
|
return NewWithConfig(LC.AuthServer{Enable: true, Listen: addr, AuthStore: store}, tunnel, additions...)
|
|
}
|
|
|
|
func NewWithConfig(config LC.AuthServer, tunnel C.Tunnel, additions ...inbound.Addition) (*Listener, error) {
|
|
isDefault := false
|
|
if len(additions) == 0 {
|
|
isDefault = true
|
|
additions = []inbound.Addition{
|
|
inbound.WithInName("DEFAULT-HTTP"),
|
|
inbound.WithSpecialRules(""),
|
|
}
|
|
}
|
|
|
|
l, err := inbound.Listen("tcp", config.Listen)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
tlsConfig := &tls.Config{}
|
|
var realityBuilder *reality.Builder
|
|
|
|
if config.Certificate != "" && config.PrivateKey != "" {
|
|
cert, err := N.ParseCert(config.Certificate, config.PrivateKey, C.Path)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
tlsConfig.Certificates = []tls.Certificate{cert}
|
|
}
|
|
if config.RealityConfig.PrivateKey != "" {
|
|
if tlsConfig.Certificates != nil {
|
|
return nil, errors.New("certificate is unavailable in reality")
|
|
}
|
|
realityBuilder, err = config.RealityConfig.Build(tunnel)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
|
|
if realityBuilder != nil {
|
|
l = realityBuilder.NewListener(l)
|
|
} else if len(tlsConfig.Certificates) > 0 {
|
|
l = tls.NewListener(l, tlsConfig)
|
|
}
|
|
|
|
hl := &Listener{
|
|
listener: l,
|
|
addr: config.Listen,
|
|
}
|
|
|
|
go func() {
|
|
for {
|
|
conn, err := hl.listener.Accept()
|
|
if err != nil {
|
|
if hl.closed {
|
|
break
|
|
}
|
|
continue
|
|
}
|
|
|
|
store := config.AuthStore
|
|
if isDefault || store == authStore.Default { // only apply on default listener
|
|
if !inbound.IsRemoteAddrDisAllowed(conn.RemoteAddr()) {
|
|
_ = conn.Close()
|
|
continue
|
|
}
|
|
if inbound.SkipAuthRemoteAddr(conn.RemoteAddr()) {
|
|
store = authStore.Nil
|
|
}
|
|
}
|
|
go HandleConn(conn, tunnel, store, additions...)
|
|
}
|
|
}()
|
|
|
|
return hl, nil
|
|
}
|