sing-box/outbound/wireguard.go

221 lines
6.2 KiB
Go
Raw Permalink Normal View History

2022-08-16 15:37:51 +00:00
//go:build with_wireguard
package outbound
import (
"context"
"encoding/base64"
"encoding/hex"
"fmt"
"net"
"net/netip"
2022-08-16 15:37:51 +00:00
"strings"
"github.com/sagernet/sing-box/adapter"
"github.com/sagernet/sing-box/common/dialer"
C "github.com/sagernet/sing-box/constant"
"github.com/sagernet/sing-box/log"
"github.com/sagernet/sing-box/option"
2022-09-05 16:15:09 +00:00
"github.com/sagernet/sing-box/transport/wireguard"
2023-10-08 14:11:03 +00:00
"github.com/sagernet/sing-dns"
2022-09-15 04:20:38 +00:00
"github.com/sagernet/sing-tun"
2022-08-16 15:37:51 +00:00
E "github.com/sagernet/sing/common/exceptions"
M "github.com/sagernet/sing/common/metadata"
N "github.com/sagernet/sing/common/network"
"github.com/sagernet/sing/common/x/list"
2023-12-16 07:40:14 +00:00
"github.com/sagernet/sing/service"
"github.com/sagernet/sing/service/pause"
"github.com/sagernet/wireguard-go/conn"
"github.com/sagernet/wireguard-go/device"
2022-08-16 15:37:51 +00:00
)
2022-11-06 02:36:19 +00:00
var (
_ adapter.Outbound = (*WireGuard)(nil)
_ adapter.InterfaceUpdateListener = (*WireGuard)(nil)
)
2022-08-16 15:37:51 +00:00
type WireGuard struct {
myOutboundAdapter
ctx context.Context
workers int
peers []wireguard.PeerConfig
useStdNetBind bool
listener N.Dialer
ipcConf string
pauseManager pause.Manager
pauseCallback *list.Element[pause.Callback]
bind conn.Bind
device *device.Device
tunDevice wireguard.Device
2022-08-16 15:37:51 +00:00
}
func NewWireGuard(ctx context.Context, router adapter.Router, logger log.ContextLogger, tag string, options option.WireGuardOutboundOptions) (*WireGuard, error) {
outbound := &WireGuard{
myOutboundAdapter: myOutboundAdapter{
2023-06-13 14:38:05 +00:00
protocol: C.TypeWireGuard,
network: options.Network.Build(),
router: router,
logger: logger,
tag: tag,
dependencies: withDialerDependency(options.DialerOptions),
2022-08-16 15:37:51 +00:00
},
ctx: ctx,
workers: options.Workers,
2023-12-16 07:40:14 +00:00
pauseManager: service.FromContext[pause.Manager](ctx),
2022-08-16 15:37:51 +00:00
}
peers, err := wireguard.ParsePeers(options)
2023-08-08 08:14:03 +00:00
if err != nil {
return nil, err
}
outbound.peers = peers
2023-10-21 04:00:00 +00:00
if len(options.LocalAddress) == 0 {
2022-08-16 15:37:51 +00:00
return nil, E.New("missing local address")
}
if options.GSO {
if options.GSO && options.Detour != "" {
return nil, E.New("gso is conflict with detour")
}
options.IsWireGuardListener = true
outbound.useStdNetBind = true
}
listener, err := dialer.New(router, options.DialerOptions)
if err != nil {
return nil, err
}
outbound.listener = listener
var privateKey string
2022-08-16 15:37:51 +00:00
{
bytes, err := base64.StdEncoding.DecodeString(options.PrivateKey)
if err != nil {
return nil, E.Cause(err, "decode private key")
}
privateKey = hex.EncodeToString(bytes)
}
outbound.ipcConf = "private_key=" + privateKey
2022-08-16 15:37:51 +00:00
mtu := options.MTU
if mtu == 0 {
2022-08-17 07:19:10 +00:00
mtu = 1408
2022-08-16 15:37:51 +00:00
}
2022-09-05 16:15:09 +00:00
var wireTunDevice wireguard.Device
2022-09-15 04:20:38 +00:00
if !options.SystemInterface && tun.WithGVisor {
2023-10-21 04:00:00 +00:00
wireTunDevice, err = wireguard.NewStackDevice(options.LocalAddress, mtu)
2022-09-05 16:15:09 +00:00
} else {
wireTunDevice, err = wireguard.NewSystemDevice(router, options.InterfaceName, options.LocalAddress, mtu, options.GSO)
2022-09-05 16:15:09 +00:00
}
2022-08-16 15:37:51 +00:00
if err != nil {
2022-09-05 16:15:09 +00:00
return nil, E.Cause(err, "create WireGuard device")
2022-08-16 15:37:51 +00:00
}
outbound.tunDevice = wireTunDevice
return outbound, nil
}
func (w *WireGuard) Start() error {
err := wireguard.ResolvePeers(w.ctx, w.router, w.peers)
if err != nil {
return err
}
var bind conn.Bind
if w.useStdNetBind {
bind = conn.NewStdNetBind(w.listener.(dialer.WireGuardListener))
} else {
var (
isConnect bool
connectAddr netip.AddrPort
reserved [3]uint8
)
peerLen := len(w.peers)
if peerLen == 1 {
isConnect = true
connectAddr = w.peers[0].Endpoint
reserved = w.peers[0].Reserved
}
bind = wireguard.NewClientBind(w.ctx, w, w.listener, isConnect, connectAddr, reserved)
}
wgDevice := device.NewDevice(w.tunDevice, bind, &device.Logger{
2022-08-16 15:37:51 +00:00
Verbosef: func(format string, args ...interface{}) {
w.logger.Debug(fmt.Sprintf(strings.ToLower(format), args...))
2022-08-16 15:37:51 +00:00
},
Errorf: func(format string, args ...interface{}) {
w.logger.Error(fmt.Sprintf(strings.ToLower(format), args...))
2022-08-16 15:37:51 +00:00
},
}, w.workers)
ipcConf := w.ipcConf
for _, peer := range w.peers {
ipcConf += peer.GenerateIpcLines()
2022-08-16 15:37:51 +00:00
}
err = wgDevice.IpcSet(ipcConf)
if err != nil {
return E.Cause(err, "setup wireguard: \n", ipcConf)
2022-08-16 15:37:51 +00:00
}
w.device = wgDevice
w.pauseCallback = w.pauseManager.RegisterCallback(w.onPauseUpdated)
return w.tunDevice.Start()
}
func (w *WireGuard) Close() error {
if w.device != nil {
w.device.Close()
}
if w.pauseCallback != nil {
w.pauseManager.UnregisterCallback(w.pauseCallback)
}
w.tunDevice.Close()
return nil
2022-08-16 15:37:51 +00:00
}
2023-07-23 06:42:19 +00:00
func (w *WireGuard) InterfaceUpdated() {
w.device.BindUpdate()
2023-07-23 06:42:19 +00:00
return
2022-11-06 02:36:19 +00:00
}
func (w *WireGuard) onPauseUpdated(event int) {
switch event {
case pause.EventDevicePaused:
w.device.Down()
case pause.EventDeviceWake:
w.device.Up()
}
}
2022-08-16 15:37:51 +00:00
func (w *WireGuard) DialContext(ctx context.Context, network string, destination M.Socksaddr) (net.Conn, error) {
switch network {
case N.NetworkTCP:
w.logger.InfoContext(ctx, "outbound connection to ", destination)
case N.NetworkUDP:
w.logger.InfoContext(ctx, "outbound packet connection to ", destination)
}
if destination.IsFqdn() {
2023-09-06 11:13:39 +00:00
destinationAddresses, err := w.router.LookupDefault(ctx, destination.Fqdn)
2022-08-16 15:37:51 +00:00
if err != nil {
return nil, err
}
2023-09-06 11:13:39 +00:00
return N.DialSerial(ctx, w.tunDevice, network, destination, destinationAddresses)
2022-08-16 15:37:51 +00:00
}
2022-09-05 16:15:09 +00:00
return w.tunDevice.DialContext(ctx, network, destination)
2022-08-16 15:37:51 +00:00
}
func (w *WireGuard) ListenPacket(ctx context.Context, destination M.Socksaddr) (net.PacketConn, error) {
w.logger.InfoContext(ctx, "outbound packet connection to ", destination)
2023-09-06 11:13:39 +00:00
if destination.IsFqdn() {
destinationAddresses, err := w.router.LookupDefault(ctx, destination.Fqdn)
if err != nil {
return nil, err
}
packetConn, _, err := N.ListenSerial(ctx, w.tunDevice, destination, destinationAddresses)
if err != nil {
return nil, err
}
return packetConn, err
}
2022-09-05 16:15:09 +00:00
return w.tunDevice.ListenPacket(ctx, destination)
2022-08-16 15:37:51 +00:00
}
func (w *WireGuard) NewConnection(ctx context.Context, conn net.Conn, metadata adapter.InboundContext) error {
2023-10-08 14:11:03 +00:00
return NewDirectConnection(ctx, w.router, w, conn, metadata, dns.DomainStrategyAsIS)
2022-08-16 15:37:51 +00:00
}
func (w *WireGuard) NewPacketConnection(ctx context.Context, conn N.PacketConn, metadata adapter.InboundContext) error {
2023-10-08 14:11:03 +00:00
return NewDirectPacketConnection(ctx, w.router, w, conn, metadata, dns.DomainStrategyAsIS)
2022-08-16 15:37:51 +00:00
}