feat: add linsters

This commit is contained in:
Skyxim
2022-12-04 13:37:14 +08:00
parent ba884c29bd
commit 4f75201a98
49 changed files with 1018 additions and 306 deletions

View File

@ -16,6 +16,8 @@ type Listener struct {
listener net.Listener
addr string
closed bool
preferRulesName string
name string
}
// RawAddress implements C.Listener
@ -35,6 +37,10 @@ func (l *Listener) Close() error {
}
func New(addr string, in chan<- C.ConnContext) (*Listener, error) {
return NewWithInfos(addr,"DEFAULT-SOCKS","",in)
}
func NewWithInfos(addr,name,preferRulesName string, in chan<- C.ConnContext) (*Listener, error) {
l, err := inbound.Listen("tcp", addr)
if err != nil {
return nil, err
@ -43,6 +49,8 @@ func New(addr string, in chan<- C.ConnContext) (*Listener, error) {
sl := &Listener{
listener: l,
addr: addr,
name: name,
preferRulesName: preferRulesName,
}
go func() {
for {
@ -53,14 +61,14 @@ func New(addr string, in chan<- C.ConnContext) (*Listener, error) {
}
continue
}
go handleSocks(c, in)
go handleSocks(sl.name,sl.preferRulesName,c, in)
}
}()
return sl, nil
}
func handleSocks(conn net.Conn, in chan<- C.ConnContext) {
func handleSocks(name,preferRulesName string,conn net.Conn, in chan<- C.ConnContext) {
conn.(*net.TCPConn).SetKeepAlive(true)
bufConn := N.NewBufferedConn(conn)
head, err := bufConn.Peek(1)
@ -71,24 +79,24 @@ func handleSocks(conn net.Conn, in chan<- C.ConnContext) {
switch head[0] {
case socks4.Version:
HandleSocks4(bufConn, in)
HandleSocks4(name,preferRulesName,bufConn, in)
case socks5.Version:
HandleSocks5(bufConn, in)
HandleSocks5(name,preferRulesName,bufConn, in)
default:
conn.Close()
}
}
func HandleSocks4(conn net.Conn, in chan<- C.ConnContext) {
func HandleSocks4(name,preferRulesName string, conn net.Conn, in chan<- C.ConnContext) {
addr, _, err := socks4.ServerHandshake(conn, authStore.Authenticator())
if err != nil {
conn.Close()
return
}
in <- inbound.NewSocket(socks5.ParseAddr(addr), conn, C.SOCKS4)
in <- inbound.NewSocketWithInfos(socks5.ParseAddr(addr), conn, C.SOCKS4,name,preferRulesName)
}
func HandleSocks5(conn net.Conn, in chan<- C.ConnContext) {
func HandleSocks5(name,preferRulesName string,conn net.Conn, in chan<- C.ConnContext) {
target, command, err := socks5.ServerHandshake(conn, authStore.Authenticator())
if err != nil {
conn.Close()
@ -99,5 +107,5 @@ func HandleSocks5(conn net.Conn, in chan<- C.ConnContext) {
io.Copy(io.Discard, conn)
return
}
in <- inbound.NewSocket(target, conn, C.SOCKS5)
in <- inbound.NewSocketWithInfos(target, conn, C.SOCKS5,name,preferRulesName)
}

View File

@ -15,6 +15,8 @@ type UDPListener struct {
packetConn net.PacketConn
addr string
closed bool
name string
preferRulesName string
}
// RawAddress implements C.Listener
@ -33,7 +35,11 @@ func (l *UDPListener) Close() error {
return l.packetConn.Close()
}
func NewUDP(addr string, in chan<- *inbound.PacketAdapter) (*UDPListener, error) {
func NewUDP(addr string, in chan<- *C.PacketAdapter) (*UDPListener, error) {
return NewUDPWithInfos(addr,"DEFAULT-SOCKS","",in)
}
func NewUDPWithInfos(addr,name ,preferRulesName string, in chan<- *C.PacketAdapter) (*UDPListener, error) {
l, err := net.ListenPacket("udp", addr)
if err != nil {
return nil, err
@ -46,6 +52,8 @@ func NewUDP(addr string, in chan<- *inbound.PacketAdapter) (*UDPListener, error)
sl := &UDPListener{
packetConn: l,
addr: addr,
preferRulesName: preferRulesName,
name: name,
}
go func() {
for {
@ -58,14 +66,14 @@ func NewUDP(addr string, in chan<- *inbound.PacketAdapter) (*UDPListener, error)
}
continue
}
handleSocksUDP(l, in, buf[:n], remoteAddr)
handleSocksUDP(sl.name,sl.preferRulesName,l, in, buf[:n], remoteAddr)
}
}()
return sl, nil
}
func handleSocksUDP(pc net.PacketConn, in chan<- *inbound.PacketAdapter, buf []byte, addr net.Addr) {
func handleSocksUDP(name,preferRulesName string,pc net.PacketConn, in chan<- *C.PacketAdapter, buf []byte, addr net.Addr) {
target, payload, err := socks5.DecodeUDPPacket(buf)
if err != nil {
// Unresolved UDP packet, return buffer to the pool
@ -79,7 +87,7 @@ func handleSocksUDP(pc net.PacketConn, in chan<- *inbound.PacketAdapter, buf []b
bufRef: buf,
}
select {
case in <- inbound.NewPacket(target, packet, C.SOCKS5):
case in <- inbound.NewPacketWithInfos(target, packet, C.SOCKS5,name,preferRulesName):
default:
}
}