From 9f2ce33a6c3a6207a5bff1c56a5dd10a4b36ab72 Mon Sep 17 00:00:00 2001 From: 21pages Date: Sun, 29 Mar 2026 14:37:16 +0800 Subject: [PATCH] Suppress secure_tcp info logs for TCP proxy requests Signed-off-by: 21pages --- src/common.rs | 16 +++++++++++++--- 1 file changed, 13 insertions(+), 3 deletions(-) diff --git a/src/common.rs b/src/common.rs index 12adc3bff..6d5eb99e5 100644 --- a/src/common.rs +++ b/src/common.rs @@ -1190,7 +1190,7 @@ async fn tcp_proxy_request( let mut conn = socket_client::connect_tcp(&*tcp_addr, CONNECT_TIMEOUT).await?; let key = crate::get_key(true).await; - secure_tcp(&mut conn, &key).await?; + secure_tcp_silent(&mut conn, &key).await?; let mut req = HttpProxyRequest::new(); req.method = method.to_uppercase(); @@ -1913,7 +1913,7 @@ pub fn check_process(arg: &str, mut same_uid: bool) -> bool { false } -pub async fn secure_tcp(conn: &mut Stream, key: &str) -> ResultType<()> { +async fn secure_tcp_impl(conn: &mut Stream, key: &str, log_on_success: bool) -> ResultType<()> { // Skip additional encryption when using WebSocket connections (wss://) // as WebSocket Secure (wss://) already provides transport layer encryption. // This doesn't affect the end-to-end encryption between clients, @@ -1946,7 +1946,9 @@ pub async fn secure_tcp(conn: &mut Stream, key: &str) -> ResultType<()> { }); timeout(CONNECT_TIMEOUT, conn.send(&msg_out)).await??; conn.set_key(key); - log::info!("Connection secured"); + if log_on_success { + log::info!("Connection secured"); + } } _ => {} } @@ -1957,6 +1959,14 @@ pub async fn secure_tcp(conn: &mut Stream, key: &str) -> ResultType<()> { Ok(()) } +pub async fn secure_tcp(conn: &mut Stream, key: &str) -> ResultType<()> { + secure_tcp_impl(conn, key, true).await +} + +async fn secure_tcp_silent(conn: &mut Stream, key: &str) -> ResultType<()> { + secure_tcp_impl(conn, key, false).await +} + #[inline] fn get_pk(pk: &[u8]) -> Option<[u8; 32]> { if pk.len() == 32 {