Suppress secure_tcp info logs for TCP proxy requests

Signed-off-by: 21pages <sunboeasy@gmail.com>
This commit is contained in:
21pages
2026-03-29 14:37:16 +08:00
parent 27c0cd4f9b
commit 9f2ce33a6c

View File

@@ -1190,7 +1190,7 @@ async fn tcp_proxy_request(
let mut conn = socket_client::connect_tcp(&*tcp_addr, CONNECT_TIMEOUT).await?; let mut conn = socket_client::connect_tcp(&*tcp_addr, CONNECT_TIMEOUT).await?;
let key = crate::get_key(true).await; let key = crate::get_key(true).await;
secure_tcp(&mut conn, &key).await?; secure_tcp_silent(&mut conn, &key).await?;
let mut req = HttpProxyRequest::new(); let mut req = HttpProxyRequest::new();
req.method = method.to_uppercase(); req.method = method.to_uppercase();
@@ -1913,7 +1913,7 @@ pub fn check_process(arg: &str, mut same_uid: bool) -> bool {
false false
} }
pub async fn secure_tcp(conn: &mut Stream, key: &str) -> ResultType<()> { async fn secure_tcp_impl(conn: &mut Stream, key: &str, log_on_success: bool) -> ResultType<()> {
// Skip additional encryption when using WebSocket connections (wss://) // Skip additional encryption when using WebSocket connections (wss://)
// as WebSocket Secure (wss://) already provides transport layer encryption. // as WebSocket Secure (wss://) already provides transport layer encryption.
// This doesn't affect the end-to-end encryption between clients, // This doesn't affect the end-to-end encryption between clients,
@@ -1946,7 +1946,9 @@ pub async fn secure_tcp(conn: &mut Stream, key: &str) -> ResultType<()> {
}); });
timeout(CONNECT_TIMEOUT, conn.send(&msg_out)).await??; timeout(CONNECT_TIMEOUT, conn.send(&msg_out)).await??;
conn.set_key(key); conn.set_key(key);
log::info!("Connection secured"); if log_on_success {
log::info!("Connection secured");
}
} }
_ => {} _ => {}
} }
@@ -1957,6 +1959,14 @@ pub async fn secure_tcp(conn: &mut Stream, key: &str) -> ResultType<()> {
Ok(()) Ok(())
} }
pub async fn secure_tcp(conn: &mut Stream, key: &str) -> ResultType<()> {
secure_tcp_impl(conn, key, true).await
}
async fn secure_tcp_silent(conn: &mut Stream, key: &str) -> ResultType<()> {
secure_tcp_impl(conn, key, false).await
}
#[inline] #[inline]
fn get_pk(pk: &[u8]) -> Option<[u8; 32]> { fn get_pk(pk: &[u8]) -> Option<[u8; 32]> {
if pk.len() == 32 { if pk.len() == 32 {