2022-06-30 13:27:56 +00:00
|
|
|
package route
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2022-07-02 14:55:10 +00:00
|
|
|
"io"
|
2022-06-30 13:27:56 +00:00
|
|
|
"net"
|
2022-07-02 14:55:10 +00:00
|
|
|
"net/http"
|
|
|
|
"os"
|
|
|
|
"path/filepath"
|
|
|
|
"time"
|
2022-06-30 13:27:56 +00:00
|
|
|
|
|
|
|
"github.com/sagernet/sing-box/adapter"
|
2022-07-05 05:23:47 +00:00
|
|
|
"github.com/sagernet/sing-box/common/geoip"
|
2022-07-05 01:05:35 +00:00
|
|
|
"github.com/sagernet/sing-box/common/geosite"
|
2022-07-06 04:39:44 +00:00
|
|
|
"github.com/sagernet/sing-box/common/sniff"
|
2022-07-02 06:07:50 +00:00
|
|
|
C "github.com/sagernet/sing-box/constant"
|
2022-06-30 13:27:56 +00:00
|
|
|
"github.com/sagernet/sing-box/log"
|
2022-07-02 06:07:50 +00:00
|
|
|
"github.com/sagernet/sing-box/option"
|
|
|
|
"github.com/sagernet/sing/common"
|
2022-07-06 04:39:44 +00:00
|
|
|
"github.com/sagernet/sing/common/buf"
|
|
|
|
"github.com/sagernet/sing/common/bufio"
|
2022-07-02 14:55:10 +00:00
|
|
|
E "github.com/sagernet/sing/common/exceptions"
|
2022-07-03 15:23:18 +00:00
|
|
|
F "github.com/sagernet/sing/common/format"
|
2022-07-02 14:55:10 +00:00
|
|
|
M "github.com/sagernet/sing/common/metadata"
|
2022-06-30 13:27:56 +00:00
|
|
|
N "github.com/sagernet/sing/common/network"
|
2022-07-04 11:34:45 +00:00
|
|
|
"github.com/sagernet/sing/common/rw"
|
2022-06-30 13:27:56 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
var _ adapter.Router = (*Router)(nil)
|
|
|
|
|
|
|
|
type Router struct {
|
2022-07-03 15:23:18 +00:00
|
|
|
ctx context.Context
|
|
|
|
logger log.Logger
|
|
|
|
|
|
|
|
outboundByTag map[string]adapter.Outbound
|
|
|
|
rules []adapter.Rule
|
|
|
|
|
|
|
|
defaultDetour string
|
|
|
|
defaultOutboundForConnection adapter.Outbound
|
|
|
|
defaultOutboundForPacketConnection adapter.Outbound
|
2022-07-02 06:07:50 +00:00
|
|
|
|
2022-07-05 05:23:47 +00:00
|
|
|
needGeoIPDatabase bool
|
2022-07-05 01:05:35 +00:00
|
|
|
needGeositeDatabase bool
|
2022-07-05 05:23:47 +00:00
|
|
|
geoIPOptions option.GeoIPOptions
|
2022-07-05 01:05:35 +00:00
|
|
|
geositeOptions option.GeositeOptions
|
2022-07-05 05:23:47 +00:00
|
|
|
geoIPReader *geoip.Reader
|
2022-07-05 01:05:35 +00:00
|
|
|
geositeReader *geosite.Reader
|
2022-06-30 13:27:56 +00:00
|
|
|
}
|
|
|
|
|
2022-07-02 14:55:10 +00:00
|
|
|
func NewRouter(ctx context.Context, logger log.Logger, options option.RouteOptions) (*Router, error) {
|
|
|
|
router := &Router{
|
2022-07-05 01:05:35 +00:00
|
|
|
ctx: ctx,
|
|
|
|
logger: logger.WithPrefix("router: "),
|
|
|
|
outboundByTag: make(map[string]adapter.Outbound),
|
|
|
|
rules: make([]adapter.Rule, 0, len(options.Rules)),
|
|
|
|
needGeoIPDatabase: hasGeoRule(options.Rules, isGeoIPRule),
|
|
|
|
needGeositeDatabase: hasGeoRule(options.Rules, isGeositeRule),
|
|
|
|
geoIPOptions: common.PtrValueOrDefault(options.GeoIP),
|
|
|
|
defaultDetour: options.DefaultDetour,
|
2022-06-30 13:27:56 +00:00
|
|
|
}
|
2022-07-02 14:55:10 +00:00
|
|
|
for i, ruleOptions := range options.Rules {
|
|
|
|
rule, err := NewRule(router, logger, ruleOptions)
|
|
|
|
if err != nil {
|
|
|
|
return nil, E.Cause(err, "parse rule[", i, "]")
|
2022-07-02 06:07:50 +00:00
|
|
|
}
|
2022-07-02 14:55:10 +00:00
|
|
|
router.rules = append(router.rules, rule)
|
2022-07-02 06:07:50 +00:00
|
|
|
}
|
2022-07-02 14:55:10 +00:00
|
|
|
return router, nil
|
2022-06-30 13:27:56 +00:00
|
|
|
}
|
|
|
|
|
2022-07-03 15:23:18 +00:00
|
|
|
func (r *Router) Initialize(outbounds []adapter.Outbound, defaultOutbound func() adapter.Outbound) error {
|
2022-07-02 06:07:50 +00:00
|
|
|
outboundByTag := make(map[string]adapter.Outbound)
|
2022-07-03 15:23:18 +00:00
|
|
|
for _, detour := range outbounds {
|
|
|
|
outboundByTag[detour.Tag()] = detour
|
|
|
|
}
|
|
|
|
var defaultOutboundForConnection adapter.Outbound
|
|
|
|
var defaultOutboundForPacketConnection adapter.Outbound
|
|
|
|
if r.defaultDetour != "" {
|
|
|
|
detour, loaded := outboundByTag[r.defaultDetour]
|
|
|
|
if !loaded {
|
|
|
|
return E.New("default detour not found: ", r.defaultDetour)
|
|
|
|
}
|
|
|
|
if common.Contains(detour.Network(), C.NetworkTCP) {
|
|
|
|
defaultOutboundForConnection = detour
|
|
|
|
}
|
|
|
|
if common.Contains(detour.Network(), C.NetworkUDP) {
|
|
|
|
defaultOutboundForPacketConnection = detour
|
|
|
|
}
|
|
|
|
}
|
|
|
|
var index, packetIndex int
|
|
|
|
if defaultOutboundForConnection == nil {
|
|
|
|
for i, detour := range outbounds {
|
|
|
|
if common.Contains(detour.Network(), C.NetworkTCP) {
|
|
|
|
index = i
|
|
|
|
defaultOutboundForConnection = detour
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if defaultOutboundForPacketConnection == nil {
|
|
|
|
for i, detour := range outbounds {
|
|
|
|
if common.Contains(detour.Network(), C.NetworkUDP) {
|
|
|
|
packetIndex = i
|
|
|
|
defaultOutboundForPacketConnection = detour
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
2022-07-02 06:07:50 +00:00
|
|
|
}
|
2022-07-03 15:23:18 +00:00
|
|
|
if defaultOutboundForConnection == nil || defaultOutboundForPacketConnection == nil {
|
|
|
|
detour := defaultOutbound()
|
|
|
|
if defaultOutboundForConnection == nil {
|
|
|
|
defaultOutboundForConnection = detour
|
|
|
|
}
|
|
|
|
if defaultOutboundForPacketConnection == nil {
|
|
|
|
defaultOutboundForPacketConnection = detour
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if defaultOutboundForConnection != defaultOutboundForPacketConnection {
|
|
|
|
var description string
|
|
|
|
if defaultOutboundForConnection.Tag() != "" {
|
|
|
|
description = defaultOutboundForConnection.Tag()
|
|
|
|
} else {
|
|
|
|
description = F.ToString(index)
|
|
|
|
}
|
|
|
|
var packetDescription string
|
|
|
|
if defaultOutboundForPacketConnection.Tag() != "" {
|
|
|
|
packetDescription = defaultOutboundForPacketConnection.Tag()
|
|
|
|
} else {
|
|
|
|
packetDescription = F.ToString(packetIndex)
|
|
|
|
}
|
|
|
|
r.logger.Info("using ", defaultOutboundForConnection.Type(), "[", description, "] as default outbound for connection")
|
|
|
|
r.logger.Info("using ", defaultOutboundForPacketConnection.Type(), "[", packetDescription, "] as default outbound for packet connection")
|
2022-07-02 06:07:50 +00:00
|
|
|
}
|
2022-07-03 15:23:18 +00:00
|
|
|
r.defaultOutboundForConnection = defaultOutboundForConnection
|
|
|
|
r.defaultOutboundForPacketConnection = defaultOutboundForPacketConnection
|
2022-07-02 06:07:50 +00:00
|
|
|
r.outboundByTag = outboundByTag
|
2022-07-03 15:23:18 +00:00
|
|
|
return nil
|
2022-07-02 06:07:50 +00:00
|
|
|
}
|
|
|
|
|
2022-07-02 14:55:10 +00:00
|
|
|
func (r *Router) Start() error {
|
2022-07-05 01:05:35 +00:00
|
|
|
if r.needGeoIPDatabase {
|
2022-07-04 11:34:45 +00:00
|
|
|
err := r.prepareGeoIPDatabase()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2022-07-02 06:07:50 +00:00
|
|
|
}
|
2022-07-05 01:05:35 +00:00
|
|
|
if r.needGeositeDatabase {
|
|
|
|
err := r.prepareGeositeDatabase()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
for _, rule := range r.rules {
|
|
|
|
err := rule.Start()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
2022-07-05 05:23:47 +00:00
|
|
|
if r.needGeositeDatabase {
|
|
|
|
for _, rule := range r.rules {
|
|
|
|
err := rule.UpdateGeosite()
|
|
|
|
if err != nil {
|
|
|
|
r.logger.Error("failed to initialize geosite: ", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
err := common.Close(r.geositeReader)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
2022-07-02 06:07:50 +00:00
|
|
|
return nil
|
|
|
|
}
|
2022-07-02 14:55:10 +00:00
|
|
|
|
|
|
|
func (r *Router) Close() error {
|
|
|
|
return common.Close(
|
2022-07-05 01:05:35 +00:00
|
|
|
common.PtrOrNil(r.geoIPReader),
|
2022-07-02 14:55:10 +00:00
|
|
|
)
|
|
|
|
}
|
|
|
|
|
2022-07-05 05:23:47 +00:00
|
|
|
func (r *Router) GeoIPReader() *geoip.Reader {
|
2022-07-05 01:05:35 +00:00
|
|
|
return r.geoIPReader
|
|
|
|
}
|
|
|
|
|
|
|
|
func (r *Router) GeositeReader() *geosite.Reader {
|
|
|
|
return r.geositeReader
|
|
|
|
}
|
|
|
|
|
|
|
|
func (r *Router) Outbound(tag string) (adapter.Outbound, bool) {
|
|
|
|
outbound, loaded := r.outboundByTag[tag]
|
|
|
|
return outbound, loaded
|
|
|
|
}
|
|
|
|
|
|
|
|
func (r *Router) RouteConnection(ctx context.Context, conn net.Conn, metadata adapter.InboundContext) error {
|
2022-07-06 04:39:44 +00:00
|
|
|
if metadata.SniffEnabled {
|
|
|
|
_buffer := buf.StackNew()
|
|
|
|
defer common.KeepAlive(_buffer)
|
|
|
|
buffer := common.Dup(_buffer)
|
|
|
|
defer buffer.Release()
|
|
|
|
reader := io.TeeReader(conn, buffer)
|
|
|
|
sniffMetadata, err := sniff.PeekStream(ctx, reader, sniff.TLSClientHello, sniff.HTTPHost)
|
|
|
|
if err == nil {
|
|
|
|
metadata.Protocol = sniffMetadata.Protocol
|
|
|
|
metadata.Domain = sniffMetadata.Domain
|
|
|
|
if metadata.SniffOverrideDestination && sniff.IsDomainName(metadata.Domain) {
|
|
|
|
metadata.Destination.Fqdn = metadata.Domain
|
|
|
|
}
|
|
|
|
if metadata.Domain != "" {
|
|
|
|
r.logger.WithContext(ctx).Info("sniffed protocol: ", metadata.Protocol, ", domain: ", metadata.Domain)
|
|
|
|
} else {
|
|
|
|
r.logger.WithContext(ctx).Info("sniffed protocol: ", metadata.Protocol)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if !buffer.IsEmpty() {
|
|
|
|
conn = bufio.NewCachedConn(conn, buffer)
|
|
|
|
}
|
|
|
|
}
|
2022-07-05 01:05:35 +00:00
|
|
|
detour := r.match(ctx, metadata, r.defaultOutboundForConnection)
|
|
|
|
if !common.Contains(detour.Network(), C.NetworkTCP) {
|
|
|
|
conn.Close()
|
|
|
|
return E.New("missing supported outbound, closing connection")
|
|
|
|
}
|
|
|
|
return detour.NewConnection(ctx, conn, metadata.Destination)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (r *Router) RoutePacketConnection(ctx context.Context, conn N.PacketConn, metadata adapter.InboundContext) error {
|
2022-07-06 04:39:44 +00:00
|
|
|
if metadata.SniffEnabled {
|
|
|
|
_buffer := buf.StackNewPacket()
|
|
|
|
defer common.KeepAlive(_buffer)
|
|
|
|
buffer := common.Dup(_buffer)
|
|
|
|
defer buffer.Release()
|
|
|
|
_, err := conn.ReadPacket(buffer)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
sniffMetadata, err := sniff.PeekPacket(ctx, buffer.Bytes(), sniff.QUICClientHello)
|
|
|
|
originDestination := metadata.Destination
|
|
|
|
if err == nil {
|
|
|
|
metadata.Protocol = sniffMetadata.Protocol
|
|
|
|
metadata.Domain = sniffMetadata.Domain
|
|
|
|
if metadata.SniffOverrideDestination && sniff.IsDomainName(metadata.Domain) {
|
|
|
|
metadata.Destination.Fqdn = metadata.Domain
|
|
|
|
}
|
|
|
|
if metadata.Domain != "" {
|
|
|
|
r.logger.WithContext(ctx).Info("sniffed protocol: ", metadata.Protocol, ", domain: ", metadata.Domain)
|
|
|
|
} else {
|
|
|
|
r.logger.WithContext(ctx).Info("sniffed protocol: ", metadata.Protocol)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
conn = bufio.NewCachedPacketConn(conn, buffer, originDestination)
|
|
|
|
}
|
2022-07-05 01:05:35 +00:00
|
|
|
detour := r.match(ctx, metadata, r.defaultOutboundForPacketConnection)
|
|
|
|
if !common.Contains(detour.Network(), C.NetworkUDP) {
|
|
|
|
conn.Close()
|
|
|
|
return E.New("missing supported outbound, closing packet connection")
|
|
|
|
}
|
|
|
|
return detour.NewPacketConnection(ctx, conn, metadata.Destination)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (r *Router) match(ctx context.Context, metadata adapter.InboundContext, defaultOutbound adapter.Outbound) adapter.Outbound {
|
|
|
|
for i, rule := range r.rules {
|
|
|
|
if rule.Match(&metadata) {
|
|
|
|
detour := rule.Outbound()
|
2022-07-05 05:23:47 +00:00
|
|
|
r.logger.WithContext(ctx).Info("match[", i, "] ", rule.String(), " => ", detour)
|
2022-07-05 01:05:35 +00:00
|
|
|
if outbound, loaded := r.Outbound(detour); loaded {
|
|
|
|
return outbound
|
|
|
|
}
|
|
|
|
r.logger.WithContext(ctx).Error("outbound not found: ", detour)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
r.logger.WithContext(ctx).Info("no match")
|
|
|
|
return defaultOutbound
|
|
|
|
}
|
|
|
|
|
|
|
|
func hasGeoRule(rules []option.Rule, cond func(rule option.DefaultRule) bool) bool {
|
|
|
|
for _, rule := range rules {
|
|
|
|
switch rule.Type {
|
|
|
|
case C.RuleTypeDefault:
|
|
|
|
if cond(rule.DefaultOptions) {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
case C.RuleTypeLogical:
|
|
|
|
for _, subRule := range rule.LogicalOptions.Rules {
|
|
|
|
if cond(subRule) {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
func isGeoIPRule(rule option.DefaultRule) bool {
|
|
|
|
return len(rule.SourceGeoIP) > 0 && common.Any(rule.SourceGeoIP, notPrivateNode) || len(rule.GeoIP) > 0 && common.Any(rule.GeoIP, notPrivateNode)
|
|
|
|
}
|
|
|
|
|
|
|
|
func isGeositeRule(rule option.DefaultRule) bool {
|
|
|
|
return len(rule.Geosite) > 0
|
|
|
|
}
|
|
|
|
|
|
|
|
func notPrivateNode(code string) bool {
|
|
|
|
return code != "private"
|
2022-07-02 14:55:10 +00:00
|
|
|
}
|
|
|
|
|
2022-07-04 11:34:45 +00:00
|
|
|
func (r *Router) prepareGeoIPDatabase() error {
|
2022-07-02 14:55:10 +00:00
|
|
|
var geoPath string
|
2022-07-05 01:05:35 +00:00
|
|
|
if r.geoIPOptions.Path != "" {
|
|
|
|
geoPath = r.geoIPOptions.Path
|
2022-07-02 14:55:10 +00:00
|
|
|
} else {
|
2022-07-05 05:23:47 +00:00
|
|
|
geoPath = "geoip.db"
|
2022-07-06 06:44:51 +00:00
|
|
|
if foundPath, loaded := C.FindPath(geoPath); loaded {
|
2022-07-04 11:34:45 +00:00
|
|
|
geoPath = foundPath
|
|
|
|
}
|
2022-07-02 14:55:10 +00:00
|
|
|
}
|
2022-07-04 11:34:45 +00:00
|
|
|
if !rw.FileExists(geoPath) {
|
2022-07-02 14:55:10 +00:00
|
|
|
r.logger.Warn("geoip database not exists: ", geoPath)
|
|
|
|
var err error
|
|
|
|
for attempts := 0; attempts < 3; attempts++ {
|
|
|
|
err = r.downloadGeoIPDatabase(geoPath)
|
|
|
|
if err == nil {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
r.logger.Error("download geoip database: ", err)
|
|
|
|
os.Remove(geoPath)
|
|
|
|
time.Sleep(10 * time.Second)
|
|
|
|
}
|
|
|
|
if err != nil {
|
2022-07-04 11:34:45 +00:00
|
|
|
return err
|
2022-07-02 14:55:10 +00:00
|
|
|
}
|
|
|
|
}
|
2022-07-05 05:23:47 +00:00
|
|
|
geoReader, codes, err := geoip.Open(geoPath)
|
|
|
|
if err != nil {
|
2022-07-04 11:34:45 +00:00
|
|
|
return E.Cause(err, "open geoip database")
|
2022-07-02 14:55:10 +00:00
|
|
|
}
|
2022-07-05 05:23:47 +00:00
|
|
|
r.logger.Info("loaded geoip database: ", len(codes), " codes")
|
|
|
|
r.geoIPReader = geoReader
|
2022-07-04 11:34:45 +00:00
|
|
|
return nil
|
2022-07-02 14:55:10 +00:00
|
|
|
}
|
|
|
|
|
2022-07-05 01:05:35 +00:00
|
|
|
func (r *Router) prepareGeositeDatabase() error {
|
|
|
|
var geoPath string
|
|
|
|
if r.geositeOptions.Path != "" {
|
|
|
|
geoPath = r.geoIPOptions.Path
|
|
|
|
} else {
|
|
|
|
geoPath = "geosite.db"
|
2022-07-06 06:44:51 +00:00
|
|
|
if foundPath, loaded := C.FindPath(geoPath); loaded {
|
2022-07-05 01:05:35 +00:00
|
|
|
geoPath = foundPath
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if !rw.FileExists(geoPath) {
|
|
|
|
r.logger.Warn("geosite database not exists: ", geoPath)
|
|
|
|
var err error
|
|
|
|
for attempts := 0; attempts < 3; attempts++ {
|
|
|
|
err = r.downloadGeositeDatabase(geoPath)
|
|
|
|
if err == nil {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
r.logger.Error("download geosite database: ", err)
|
|
|
|
os.Remove(geoPath)
|
|
|
|
time.Sleep(10 * time.Second)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
2022-07-05 05:23:47 +00:00
|
|
|
geoReader, codes, err := geosite.Open(geoPath)
|
2022-07-05 01:05:35 +00:00
|
|
|
if err == nil {
|
2022-07-05 05:23:47 +00:00
|
|
|
r.logger.Info("loaded geosite database: ", len(codes), " codes")
|
2022-07-05 01:05:35 +00:00
|
|
|
r.geositeReader = geoReader
|
|
|
|
} else {
|
|
|
|
return E.Cause(err, "open geosite database")
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2022-07-02 14:55:10 +00:00
|
|
|
func (r *Router) downloadGeoIPDatabase(savePath string) error {
|
|
|
|
var downloadURL string
|
2022-07-05 01:05:35 +00:00
|
|
|
if r.geoIPOptions.DownloadURL != "" {
|
|
|
|
downloadURL = r.geoIPOptions.DownloadURL
|
2022-07-02 14:55:10 +00:00
|
|
|
} else {
|
2022-07-05 05:23:47 +00:00
|
|
|
downloadURL = "https://github.com/SagerNet/sing-geoip/releases/latest/download/geoip.db"
|
2022-07-02 14:55:10 +00:00
|
|
|
}
|
|
|
|
r.logger.Info("downloading geoip database")
|
|
|
|
var detour adapter.Outbound
|
2022-07-05 01:05:35 +00:00
|
|
|
if r.geoIPOptions.DownloadDetour != "" {
|
|
|
|
outbound, loaded := r.Outbound(r.geoIPOptions.DownloadDetour)
|
2022-07-02 14:55:10 +00:00
|
|
|
if !loaded {
|
2022-07-05 01:05:35 +00:00
|
|
|
return E.New("detour outbound not found: ", r.geoIPOptions.DownloadDetour)
|
2022-07-02 14:55:10 +00:00
|
|
|
}
|
|
|
|
detour = outbound
|
|
|
|
} else {
|
2022-07-03 15:23:18 +00:00
|
|
|
detour = r.defaultOutboundForConnection
|
2022-07-02 14:55:10 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if parentDir := filepath.Dir(savePath); parentDir != "" {
|
|
|
|
os.MkdirAll(parentDir, 0o755)
|
|
|
|
}
|
|
|
|
|
|
|
|
saveFile, err := os.OpenFile(savePath, os.O_CREATE|os.O_WRONLY, 0o644)
|
|
|
|
if err != nil {
|
|
|
|
return E.Cause(err, "open output file: ", downloadURL)
|
|
|
|
}
|
|
|
|
defer saveFile.Close()
|
|
|
|
|
|
|
|
httpClient := &http.Client{
|
|
|
|
Transport: &http.Transport{
|
|
|
|
ForceAttemptHTTP2: true,
|
|
|
|
TLSHandshakeTimeout: 5 * time.Second,
|
|
|
|
DialContext: func(ctx context.Context, network, addr string) (net.Conn, error) {
|
|
|
|
return detour.DialContext(ctx, network, M.ParseSocksaddr(addr))
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
response, err := httpClient.Get(downloadURL)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer response.Body.Close()
|
|
|
|
_, err = io.Copy(saveFile, response.Body)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2022-07-05 01:05:35 +00:00
|
|
|
func (r *Router) downloadGeositeDatabase(savePath string) error {
|
|
|
|
var downloadURL string
|
|
|
|
if r.geositeOptions.DownloadURL != "" {
|
|
|
|
downloadURL = r.geositeOptions.DownloadURL
|
|
|
|
} else {
|
|
|
|
downloadURL = "https://github.com/SagerNet/sing-geosite/releases/latest/download/geosite.db"
|
|
|
|
}
|
|
|
|
r.logger.Info("downloading geoip database")
|
|
|
|
var detour adapter.Outbound
|
|
|
|
if r.geositeOptions.DownloadDetour != "" {
|
|
|
|
outbound, loaded := r.Outbound(r.geositeOptions.DownloadDetour)
|
|
|
|
if !loaded {
|
|
|
|
return E.New("detour outbound not found: ", r.geoIPOptions.DownloadDetour)
|
|
|
|
}
|
|
|
|
detour = outbound
|
|
|
|
} else {
|
|
|
|
detour = r.defaultOutboundForConnection
|
|
|
|
}
|
2022-07-02 14:55:10 +00:00
|
|
|
|
2022-07-05 01:05:35 +00:00
|
|
|
if parentDir := filepath.Dir(savePath); parentDir != "" {
|
|
|
|
os.MkdirAll(parentDir, 0o755)
|
2022-07-03 15:23:18 +00:00
|
|
|
}
|
2022-07-02 14:55:10 +00:00
|
|
|
|
2022-07-05 01:05:35 +00:00
|
|
|
saveFile, err := os.OpenFile(savePath, os.O_CREATE|os.O_WRONLY, 0o644)
|
|
|
|
if err != nil {
|
|
|
|
return E.Cause(err, "open output file: ", downloadURL)
|
2022-07-03 15:23:18 +00:00
|
|
|
}
|
2022-07-05 01:05:35 +00:00
|
|
|
defer saveFile.Close()
|
2022-07-02 14:55:10 +00:00
|
|
|
|
2022-07-05 01:05:35 +00:00
|
|
|
httpClient := &http.Client{
|
|
|
|
Transport: &http.Transport{
|
|
|
|
ForceAttemptHTTP2: true,
|
|
|
|
TLSHandshakeTimeout: 5 * time.Second,
|
|
|
|
DialContext: func(ctx context.Context, network, addr string) (net.Conn, error) {
|
|
|
|
return detour.DialContext(ctx, network, M.ParseSocksaddr(addr))
|
|
|
|
},
|
|
|
|
},
|
2022-07-02 14:55:10 +00:00
|
|
|
}
|
2022-07-05 01:05:35 +00:00
|
|
|
response, err := httpClient.Get(downloadURL)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer response.Body.Close()
|
|
|
|
_, err = io.Copy(saveFile, response.Body)
|
|
|
|
return err
|
2022-07-02 14:55:10 +00:00
|
|
|
}
|