package sing import ( "context" "fmt" "net" "sync" "github.com/InazumaV/V2bX/common/format" "github.com/InazumaV/V2bX/common/rate" "github.com/InazumaV/V2bX/limiter" "github.com/InazumaV/V2bX/common/counter" "github.com/sagernet/sing-box/adapter" "github.com/sagernet/sing-box/log" N "github.com/sagernet/sing/common/network" ) var _ adapter.ConnectionTracker = (*HookServer)(nil) type HookServer struct { counter sync.Map } func (h *HookServer) ModeList() []string { return nil } func NewHookServer() *HookServer { server := &HookServer{ counter: sync.Map{}, } return server } func (h *HookServer) RoutedConnection(_ context.Context, conn net.Conn, m adapter.InboundContext, _ adapter.Rule, _ adapter.Outbound) net.Conn { l, err := limiter.GetLimiter(m.Inbound) if err != nil { log.Warn("get limiter for ", m.Inbound, " error: ", err) return conn } ip := m.Source.Addr.String() if b, r := l.CheckLimit(format.UserTag(m.Inbound, m.User), ip, true, true); r { conn.Close() log.Error("[", m.Inbound, "] ", "Limited ", m.User, " by ip or conn") return conn } else if b != nil { conn = rate.NewConnRateLimiter(conn, b) } if l != nil { destStr := m.Destination.AddrString() protocol := m.Destination.Network() if l.CheckDomainRule(destStr) { log.Error(fmt.Sprintf( "User %s access domain %s reject by rule", m.User, destStr)) conn.Close() return conn } if len(protocol) != 0 { if l.CheckProtocolRule(protocol) { log.Error(fmt.Sprintf( "User %s access protocol %s reject by rule", m.User, protocol)) conn.Close() return conn } } } if c, ok := h.counter.Load(m.Inbound); ok { return counter.NewConnCounter(conn, c.(*counter.TrafficCounter).GetCounter(m.User)) } else { c := counter.NewTrafficCounter() h.counter.Store(m.Inbound, c) return counter.NewConnCounter(conn, c.GetCounter(m.User)) } } func (h *HookServer) RoutedPacketConnection(_ context.Context, conn N.PacketConn, m adapter.InboundContext, _ adapter.Rule, _ adapter.Outbound) N.PacketConn { l, err := limiter.GetLimiter(m.Inbound) if err != nil { log.Warn("get limiter for ", m.Inbound, " error: ", err) return conn } ip := m.Source.Addr.String() if b, r := l.CheckLimit(format.UserTag(m.Inbound, m.User), ip, false, false); r { conn.Close() log.Error("[", m.Inbound, "] ", "Limited ", m.User, " by ip or conn") return conn } else if b != nil { //conn = rate.NewPacketConnCounter(conn, b) } if l != nil { destStr := m.Destination.AddrString() protocol := m.Destination.Network() if l.CheckDomainRule(destStr) { log.Error(fmt.Sprintf( "User %s access domain %s reject by rule", m.User, destStr)) conn.Close() return conn } if len(protocol) != 0 { if l.CheckProtocolRule(protocol) { log.Error(fmt.Sprintf( "User %s access protocol %s reject by rule", m.User, protocol)) conn.Close() return conn } } } if c, ok := h.counter.Load(m.Inbound); ok { return counter.NewPacketConnCounter(conn, c.(*counter.TrafficCounter).GetCounter(m.User)) } else { c := counter.NewTrafficCounter() h.counter.Store(m.Inbound, c) return counter.NewPacketConnCounter(conn, c.GetCounter(m.User)) } }