2024-11-01 16:39:02 +00:00
|
|
|
package tun
|
2022-07-09 11:18:37 +00:00
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"net"
|
2024-06-07 07:55:21 +00:00
|
|
|
"net/netip"
|
|
|
|
"os"
|
|
|
|
"runtime"
|
2022-07-09 11:18:37 +00:00
|
|
|
"strconv"
|
|
|
|
"strings"
|
2023-12-20 11:55:14 +00:00
|
|
|
"time"
|
2022-07-09 11:18:37 +00:00
|
|
|
|
|
|
|
"github.com/sagernet/sing-box/adapter"
|
2024-11-01 16:39:02 +00:00
|
|
|
"github.com/sagernet/sing-box/adapter/inbound"
|
2023-12-04 03:47:25 +00:00
|
|
|
"github.com/sagernet/sing-box/common/taskmonitor"
|
2022-07-09 11:18:37 +00:00
|
|
|
C "github.com/sagernet/sing-box/constant"
|
2024-10-18 01:58:03 +00:00
|
|
|
"github.com/sagernet/sing-box/experimental/deprecated"
|
2022-10-25 04:55:00 +00:00
|
|
|
"github.com/sagernet/sing-box/experimental/libbox/platform"
|
2022-07-09 11:18:37 +00:00
|
|
|
"github.com/sagernet/sing-box/log"
|
|
|
|
"github.com/sagernet/sing-box/option"
|
2022-07-11 10:44:59 +00:00
|
|
|
"github.com/sagernet/sing-tun"
|
2022-07-13 11:01:20 +00:00
|
|
|
"github.com/sagernet/sing/common"
|
2022-07-09 11:18:37 +00:00
|
|
|
E "github.com/sagernet/sing/common/exceptions"
|
|
|
|
M "github.com/sagernet/sing/common/metadata"
|
|
|
|
N "github.com/sagernet/sing/common/network"
|
2022-08-14 16:25:49 +00:00
|
|
|
"github.com/sagernet/sing/common/ranges"
|
2024-06-07 07:55:21 +00:00
|
|
|
"github.com/sagernet/sing/common/x/list"
|
2024-11-01 16:39:02 +00:00
|
|
|
"github.com/sagernet/sing/service"
|
2024-06-07 07:55:21 +00:00
|
|
|
|
|
|
|
"go4.org/netipx"
|
2022-07-09 11:18:37 +00:00
|
|
|
)
|
|
|
|
|
2024-11-01 16:39:02 +00:00
|
|
|
func RegisterInbound(registry *inbound.Registry) {
|
|
|
|
inbound.Register[option.TunInboundOptions](registry, C.TypeTun, NewInbound)
|
|
|
|
}
|
2022-07-09 11:18:37 +00:00
|
|
|
|
2024-11-01 16:39:02 +00:00
|
|
|
type Inbound struct {
|
2024-10-21 15:38:34 +00:00
|
|
|
tag string
|
|
|
|
ctx context.Context
|
|
|
|
router adapter.Router
|
|
|
|
logger log.ContextLogger
|
|
|
|
// Deprecated
|
2024-10-23 05:44:08 +00:00
|
|
|
inboundOptions option.InboundOptions
|
|
|
|
tunOptions tun.Options
|
|
|
|
// Deprecated
|
2024-06-07 07:55:21 +00:00
|
|
|
endpointIndependentNat bool
|
2024-10-21 15:38:34 +00:00
|
|
|
udpTimeout time.Duration
|
2024-06-07 07:55:21 +00:00
|
|
|
stack string
|
|
|
|
tunIf tun.Tun
|
|
|
|
tunStack tun.Stack
|
|
|
|
platformInterface platform.Interface
|
|
|
|
platformOptions option.TunPlatformOptions
|
|
|
|
autoRedirect tun.AutoRedirect
|
|
|
|
routeRuleSet []adapter.RuleSet
|
|
|
|
routeRuleSetCallback []*list.Element[adapter.RuleSetUpdateCallback]
|
|
|
|
routeExcludeRuleSet []adapter.RuleSet
|
|
|
|
routeExcludeRuleSetCallback []*list.Element[adapter.RuleSetUpdateCallback]
|
|
|
|
routeAddressSet []*netipx.IPSet
|
|
|
|
routeExcludeAddressSet []*netipx.IPSet
|
2022-07-09 11:18:37 +00:00
|
|
|
}
|
|
|
|
|
2024-11-01 16:39:02 +00:00
|
|
|
func NewInbound(ctx context.Context, router adapter.Router, logger log.ContextLogger, tag string, options option.TunInboundOptions) (adapter.Inbound, error) {
|
2024-06-07 07:55:21 +00:00
|
|
|
address := options.Address
|
2024-10-18 01:58:03 +00:00
|
|
|
var deprecatedAddressUsed bool
|
2024-06-07 07:55:21 +00:00
|
|
|
//nolint:staticcheck
|
|
|
|
//goland:noinspection GoDeprecation
|
|
|
|
if len(options.Inet4Address) > 0 {
|
|
|
|
address = append(address, options.Inet4Address...)
|
2024-10-18 01:58:03 +00:00
|
|
|
deprecatedAddressUsed = true
|
2024-06-07 07:55:21 +00:00
|
|
|
}
|
|
|
|
//nolint:staticcheck
|
|
|
|
//goland:noinspection GoDeprecation
|
|
|
|
if len(options.Inet6Address) > 0 {
|
|
|
|
address = append(address, options.Inet6Address...)
|
2024-10-18 01:58:03 +00:00
|
|
|
deprecatedAddressUsed = true
|
2024-06-07 07:55:21 +00:00
|
|
|
}
|
|
|
|
inet4Address := common.Filter(address, func(it netip.Prefix) bool {
|
|
|
|
return it.Addr().Is4()
|
|
|
|
})
|
|
|
|
inet6Address := common.Filter(address, func(it netip.Prefix) bool {
|
|
|
|
return it.Addr().Is6()
|
|
|
|
})
|
|
|
|
|
|
|
|
routeAddress := options.RouteAddress
|
|
|
|
//nolint:staticcheck
|
|
|
|
//goland:noinspection GoDeprecation
|
|
|
|
if len(options.Inet4RouteAddress) > 0 {
|
|
|
|
routeAddress = append(routeAddress, options.Inet4RouteAddress...)
|
2024-10-18 01:58:03 +00:00
|
|
|
deprecatedAddressUsed = true
|
2024-06-07 07:55:21 +00:00
|
|
|
}
|
|
|
|
//nolint:staticcheck
|
|
|
|
//goland:noinspection GoDeprecation
|
|
|
|
if len(options.Inet6RouteAddress) > 0 {
|
|
|
|
routeAddress = append(routeAddress, options.Inet6RouteAddress...)
|
2024-10-18 01:58:03 +00:00
|
|
|
deprecatedAddressUsed = true
|
2024-06-07 07:55:21 +00:00
|
|
|
}
|
|
|
|
inet4RouteAddress := common.Filter(routeAddress, func(it netip.Prefix) bool {
|
|
|
|
return it.Addr().Is4()
|
|
|
|
})
|
|
|
|
inet6RouteAddress := common.Filter(routeAddress, func(it netip.Prefix) bool {
|
|
|
|
return it.Addr().Is6()
|
|
|
|
})
|
|
|
|
|
|
|
|
routeExcludeAddress := options.RouteExcludeAddress
|
|
|
|
//nolint:staticcheck
|
|
|
|
//goland:noinspection GoDeprecation
|
|
|
|
if len(options.Inet4RouteExcludeAddress) > 0 {
|
|
|
|
routeExcludeAddress = append(routeExcludeAddress, options.Inet4RouteExcludeAddress...)
|
2024-10-18 01:58:03 +00:00
|
|
|
deprecatedAddressUsed = true
|
2024-06-07 07:55:21 +00:00
|
|
|
}
|
|
|
|
//nolint:staticcheck
|
|
|
|
//goland:noinspection GoDeprecation
|
|
|
|
if len(options.Inet6RouteExcludeAddress) > 0 {
|
|
|
|
routeExcludeAddress = append(routeExcludeAddress, options.Inet6RouteExcludeAddress...)
|
2024-10-18 01:58:03 +00:00
|
|
|
deprecatedAddressUsed = true
|
2024-06-07 07:55:21 +00:00
|
|
|
}
|
|
|
|
inet4RouteExcludeAddress := common.Filter(routeExcludeAddress, func(it netip.Prefix) bool {
|
|
|
|
return it.Addr().Is4()
|
|
|
|
})
|
|
|
|
inet6RouteExcludeAddress := common.Filter(routeExcludeAddress, func(it netip.Prefix) bool {
|
|
|
|
return it.Addr().Is6()
|
|
|
|
})
|
|
|
|
|
2024-10-18 01:58:03 +00:00
|
|
|
if deprecatedAddressUsed {
|
|
|
|
deprecated.Report(ctx, deprecated.OptionTUNAddressX)
|
|
|
|
}
|
|
|
|
|
2022-07-10 01:15:01 +00:00
|
|
|
tunMTU := options.MTU
|
|
|
|
if tunMTU == 0 {
|
2022-09-06 14:52:37 +00:00
|
|
|
tunMTU = 9000
|
2022-07-10 01:15:01 +00:00
|
|
|
}
|
2023-12-20 11:55:14 +00:00
|
|
|
var udpTimeout time.Duration
|
2022-07-26 11:21:56 +00:00
|
|
|
if options.UDPTimeout != 0 {
|
2023-12-20 11:55:14 +00:00
|
|
|
udpTimeout = time.Duration(options.UDPTimeout)
|
2022-07-26 11:21:56 +00:00
|
|
|
} else {
|
2023-12-20 11:55:14 +00:00
|
|
|
udpTimeout = C.UDPTimeout
|
2022-07-26 11:21:56 +00:00
|
|
|
}
|
2024-06-07 07:55:21 +00:00
|
|
|
var err error
|
2022-08-14 16:25:49 +00:00
|
|
|
includeUID := uidToRange(options.IncludeUID)
|
|
|
|
if len(options.IncludeUIDRange) > 0 {
|
|
|
|
includeUID, err = parseRange(includeUID, options.IncludeUIDRange)
|
|
|
|
if err != nil {
|
|
|
|
return nil, E.Cause(err, "parse include_uid_range")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
excludeUID := uidToRange(options.ExcludeUID)
|
|
|
|
if len(options.ExcludeUIDRange) > 0 {
|
|
|
|
excludeUID, err = parseRange(excludeUID, options.ExcludeUIDRange)
|
|
|
|
if err != nil {
|
|
|
|
return nil, E.Cause(err, "parse exclude_uid_range")
|
|
|
|
}
|
|
|
|
}
|
2024-06-07 07:55:21 +00:00
|
|
|
|
|
|
|
tableIndex := options.IPRoute2TableIndex
|
|
|
|
if tableIndex == 0 {
|
|
|
|
tableIndex = tun.DefaultIPRoute2TableIndex
|
|
|
|
}
|
|
|
|
ruleIndex := options.IPRoute2RuleIndex
|
|
|
|
if ruleIndex == 0 {
|
|
|
|
ruleIndex = tun.DefaultIPRoute2RuleIndex
|
|
|
|
}
|
2024-06-22 06:11:49 +00:00
|
|
|
inputMark := uint32(options.AutoRedirectInputMark)
|
2024-06-07 07:55:21 +00:00
|
|
|
if inputMark == 0 {
|
|
|
|
inputMark = tun.DefaultAutoRedirectInputMark
|
|
|
|
}
|
2024-06-22 06:11:49 +00:00
|
|
|
outputMark := uint32(options.AutoRedirectOutputMark)
|
2024-06-07 07:55:21 +00:00
|
|
|
if outputMark == 0 {
|
|
|
|
outputMark = tun.DefaultAutoRedirectOutputMark
|
|
|
|
}
|
|
|
|
|
2024-11-01 16:39:02 +00:00
|
|
|
inbound := &Inbound{
|
2022-08-14 16:25:49 +00:00
|
|
|
tag: tag,
|
|
|
|
ctx: ctx,
|
|
|
|
router: router,
|
|
|
|
logger: logger,
|
|
|
|
inboundOptions: options.InboundOptions,
|
|
|
|
tunOptions: tun.Options{
|
2023-10-30 04:00:00 +00:00
|
|
|
Name: options.InterfaceName,
|
|
|
|
MTU: tunMTU,
|
2023-12-20 12:00:00 +00:00
|
|
|
GSO: options.GSO,
|
2024-06-07 07:55:21 +00:00
|
|
|
Inet4Address: inet4Address,
|
|
|
|
Inet6Address: inet6Address,
|
2023-10-30 04:00:00 +00:00
|
|
|
AutoRoute: options.AutoRoute,
|
2024-06-07 07:55:21 +00:00
|
|
|
IPRoute2TableIndex: tableIndex,
|
|
|
|
IPRoute2RuleIndex: ruleIndex,
|
|
|
|
AutoRedirectInputMark: inputMark,
|
|
|
|
AutoRedirectOutputMark: outputMark,
|
2023-10-30 04:00:00 +00:00
|
|
|
StrictRoute: options.StrictRoute,
|
|
|
|
IncludeInterface: options.IncludeInterface,
|
|
|
|
ExcludeInterface: options.ExcludeInterface,
|
2024-06-07 07:55:21 +00:00
|
|
|
Inet4RouteAddress: inet4RouteAddress,
|
|
|
|
Inet6RouteAddress: inet6RouteAddress,
|
|
|
|
Inet4RouteExcludeAddress: inet4RouteExcludeAddress,
|
|
|
|
Inet6RouteExcludeAddress: inet6RouteExcludeAddress,
|
2023-10-30 04:00:00 +00:00
|
|
|
IncludeUID: includeUID,
|
|
|
|
ExcludeUID: excludeUID,
|
|
|
|
IncludeAndroidUser: options.IncludeAndroidUser,
|
|
|
|
IncludePackage: options.IncludePackage,
|
|
|
|
ExcludePackage: options.ExcludePackage,
|
|
|
|
InterfaceMonitor: router.InterfaceMonitor(),
|
2022-08-14 16:25:49 +00:00
|
|
|
},
|
2022-07-26 11:21:56 +00:00
|
|
|
endpointIndependentNat: options.EndpointIndependentNat,
|
2024-10-21 15:38:34 +00:00
|
|
|
udpTimeout: udpTimeout,
|
2022-08-07 09:21:49 +00:00
|
|
|
stack: options.Stack,
|
2024-11-01 16:39:02 +00:00
|
|
|
platformInterface: service.FromContext[platform.Interface](ctx),
|
2023-02-28 11:02:27 +00:00
|
|
|
platformOptions: common.PtrValueOrDefault(options.Platform),
|
2024-06-07 07:55:21 +00:00
|
|
|
}
|
|
|
|
if options.AutoRedirect {
|
|
|
|
if !options.AutoRoute {
|
|
|
|
return nil, E.New("`auto_route` is required by `auto_redirect`")
|
|
|
|
}
|
|
|
|
disableNFTables, dErr := strconv.ParseBool(os.Getenv("DISABLE_NFTABLES"))
|
|
|
|
inbound.autoRedirect, err = tun.NewAutoRedirect(tun.AutoRedirectOptions{
|
|
|
|
TunOptions: &inbound.tunOptions,
|
|
|
|
Context: ctx,
|
2024-10-21 15:38:34 +00:00
|
|
|
Handler: (*autoRedirectHandler)(inbound),
|
2024-06-07 07:55:21 +00:00
|
|
|
Logger: logger,
|
|
|
|
NetworkMonitor: router.NetworkMonitor(),
|
|
|
|
InterfaceFinder: router.InterfaceFinder(),
|
|
|
|
TableName: "sing-box",
|
|
|
|
DisableNFTables: dErr == nil && disableNFTables,
|
|
|
|
RouteAddressSet: &inbound.routeAddressSet,
|
|
|
|
RouteExcludeAddressSet: &inbound.routeExcludeAddressSet,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return nil, E.Cause(err, "initialize auto-redirect")
|
|
|
|
}
|
|
|
|
if runtime.GOOS != "android" {
|
|
|
|
var markMode bool
|
|
|
|
for _, routeAddressSet := range options.RouteAddressSet {
|
|
|
|
ruleSet, loaded := router.RuleSet(routeAddressSet)
|
|
|
|
if !loaded {
|
|
|
|
return nil, E.New("parse route_address_set: rule-set not found: ", routeAddressSet)
|
|
|
|
}
|
|
|
|
ruleSet.IncRef()
|
|
|
|
inbound.routeRuleSet = append(inbound.routeRuleSet, ruleSet)
|
|
|
|
markMode = true
|
|
|
|
}
|
|
|
|
for _, routeExcludeAddressSet := range options.RouteExcludeAddressSet {
|
|
|
|
ruleSet, loaded := router.RuleSet(routeExcludeAddressSet)
|
|
|
|
if !loaded {
|
|
|
|
return nil, E.New("parse route_exclude_address_set: rule-set not found: ", routeExcludeAddressSet)
|
|
|
|
}
|
|
|
|
ruleSet.IncRef()
|
|
|
|
inbound.routeExcludeRuleSet = append(inbound.routeExcludeRuleSet, ruleSet)
|
|
|
|
markMode = true
|
|
|
|
}
|
|
|
|
if markMode {
|
|
|
|
inbound.tunOptions.AutoRedirectMarkMode = true
|
|
|
|
err = router.RegisterAutoRedirectOutputMark(inbound.tunOptions.AutoRedirectOutputMark)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return inbound, nil
|
2022-07-09 11:18:37 +00:00
|
|
|
}
|
|
|
|
|
2022-08-14 16:25:49 +00:00
|
|
|
func uidToRange(uidList option.Listable[uint32]) []ranges.Range[uint32] {
|
|
|
|
return common.Map(uidList, func(uid uint32) ranges.Range[uint32] {
|
|
|
|
return ranges.NewSingle(uid)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func parseRange(uidRanges []ranges.Range[uint32], rangeList []string) ([]ranges.Range[uint32], error) {
|
|
|
|
for _, uidRange := range rangeList {
|
|
|
|
if !strings.Contains(uidRange, ":") {
|
|
|
|
return nil, E.New("missing ':' in range: ", uidRange)
|
|
|
|
}
|
|
|
|
subIndex := strings.Index(uidRange, ":")
|
|
|
|
if subIndex == 0 {
|
|
|
|
return nil, E.New("missing range start: ", uidRange)
|
|
|
|
} else if subIndex == len(uidRange)-1 {
|
|
|
|
return nil, E.New("missing range end: ", uidRange)
|
|
|
|
}
|
|
|
|
var start, end uint64
|
|
|
|
var err error
|
2024-06-07 07:55:21 +00:00
|
|
|
start, err = strconv.ParseUint(uidRange[:subIndex], 0, 32)
|
2022-08-14 16:25:49 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, E.Cause(err, "parse range start")
|
|
|
|
}
|
2024-06-07 07:55:21 +00:00
|
|
|
end, err = strconv.ParseUint(uidRange[subIndex+1:], 0, 32)
|
2022-08-14 16:25:49 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, E.Cause(err, "parse range end")
|
|
|
|
}
|
|
|
|
uidRanges = append(uidRanges, ranges.New(uint32(start), uint32(end)))
|
|
|
|
}
|
|
|
|
return uidRanges, nil
|
|
|
|
}
|
|
|
|
|
2024-11-01 16:39:02 +00:00
|
|
|
func (t *Inbound) Type() string {
|
2022-07-09 11:18:37 +00:00
|
|
|
return C.TypeTun
|
|
|
|
}
|
|
|
|
|
2024-11-01 16:39:02 +00:00
|
|
|
func (t *Inbound) Tag() string {
|
2022-07-09 11:18:37 +00:00
|
|
|
return t.tag
|
|
|
|
}
|
|
|
|
|
2024-11-01 16:39:02 +00:00
|
|
|
func (t *Inbound) Start() error {
|
2022-10-25 04:55:00 +00:00
|
|
|
if C.IsAndroid && t.platformInterface == nil {
|
2024-10-21 15:38:34 +00:00
|
|
|
t.tunOptions.BuildAndroidRules(t.router.PackageManager())
|
2022-08-15 03:40:49 +00:00
|
|
|
}
|
2023-06-07 12:28:21 +00:00
|
|
|
if t.tunOptions.Name == "" {
|
|
|
|
t.tunOptions.Name = tun.CalculateInterfaceName("")
|
|
|
|
}
|
2022-10-25 04:55:00 +00:00
|
|
|
var (
|
|
|
|
tunInterface tun.Tun
|
|
|
|
err error
|
|
|
|
)
|
2024-04-02 15:07:26 +00:00
|
|
|
monitor := taskmonitor.New(t.logger, C.StartTimeout)
|
2023-12-04 03:47:25 +00:00
|
|
|
monitor.Start("open tun interface")
|
2022-10-25 04:55:00 +00:00
|
|
|
if t.platformInterface != nil {
|
2023-04-17 11:05:02 +00:00
|
|
|
tunInterface, err = t.platformInterface.OpenTun(&t.tunOptions, t.platformOptions)
|
2022-10-25 04:55:00 +00:00
|
|
|
} else {
|
2023-02-26 11:16:28 +00:00
|
|
|
tunInterface, err = tun.New(t.tunOptions)
|
2022-10-25 04:55:00 +00:00
|
|
|
}
|
2023-12-04 03:47:25 +00:00
|
|
|
monitor.Finish()
|
2022-07-09 11:18:37 +00:00
|
|
|
if err != nil {
|
|
|
|
return E.Cause(err, "configure tun interface")
|
|
|
|
}
|
2023-06-07 12:28:21 +00:00
|
|
|
t.logger.Trace("creating stack")
|
2022-10-25 04:55:00 +00:00
|
|
|
t.tunIf = tunInterface
|
2024-05-07 12:34:24 +00:00
|
|
|
var (
|
|
|
|
forwarderBindInterface bool
|
|
|
|
includeAllNetworks bool
|
|
|
|
)
|
|
|
|
if t.platformInterface != nil {
|
|
|
|
forwarderBindInterface = true
|
|
|
|
includeAllNetworks = t.platformInterface.IncludeAllNetworks()
|
|
|
|
}
|
2024-06-25 05:10:25 +00:00
|
|
|
tunStack, err := tun.NewStack(t.stack, tun.StackOptions{
|
2022-09-06 11:30:12 +00:00
|
|
|
Context: t.ctx,
|
2022-10-25 04:55:00 +00:00
|
|
|
Tun: tunInterface,
|
2023-12-20 12:00:00 +00:00
|
|
|
TunOptions: t.tunOptions,
|
2022-09-06 11:30:12 +00:00
|
|
|
UDPTimeout: t.udpTimeout,
|
|
|
|
Handler: t,
|
2022-09-07 14:54:04 +00:00
|
|
|
Logger: t.logger,
|
2024-05-07 12:34:24 +00:00
|
|
|
ForwarderBindInterface: forwarderBindInterface,
|
2023-04-20 01:11:06 +00:00
|
|
|
InterfaceFinder: t.router.InterfaceFinder(),
|
2024-05-07 12:34:24 +00:00
|
|
|
IncludeAllNetworks: includeAllNetworks,
|
2022-09-06 11:30:12 +00:00
|
|
|
})
|
2022-08-07 09:21:49 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2023-12-04 03:47:25 +00:00
|
|
|
monitor.Start("initiating tun stack")
|
2024-06-25 05:10:25 +00:00
|
|
|
err = tunStack.Start()
|
2023-12-04 03:47:25 +00:00
|
|
|
monitor.Finish()
|
2024-06-25 05:10:25 +00:00
|
|
|
t.tunStack = tunStack
|
2022-07-09 11:18:37 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2022-08-14 16:25:49 +00:00
|
|
|
t.logger.Info("started at ", t.tunOptions.Name)
|
2022-07-09 11:18:37 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-11-01 16:39:02 +00:00
|
|
|
func (t *Inbound) PostStart() error {
|
2024-06-07 07:55:21 +00:00
|
|
|
monitor := taskmonitor.New(t.logger, C.StartTimeout)
|
|
|
|
if t.autoRedirect != nil {
|
|
|
|
t.routeAddressSet = common.FlatMap(t.routeRuleSet, adapter.RuleSet.ExtractIPSet)
|
|
|
|
for _, routeRuleSet := range t.routeRuleSet {
|
|
|
|
ipSets := routeRuleSet.ExtractIPSet()
|
|
|
|
if len(ipSets) == 0 {
|
|
|
|
t.logger.Warn("route_address_set: no destination IP CIDR rules found in rule-set: ", routeRuleSet.Name())
|
|
|
|
}
|
|
|
|
t.routeAddressSet = append(t.routeAddressSet, ipSets...)
|
|
|
|
}
|
|
|
|
t.routeExcludeAddressSet = common.FlatMap(t.routeExcludeRuleSet, adapter.RuleSet.ExtractIPSet)
|
|
|
|
for _, routeExcludeRuleSet := range t.routeExcludeRuleSet {
|
|
|
|
ipSets := routeExcludeRuleSet.ExtractIPSet()
|
|
|
|
if len(ipSets) == 0 {
|
|
|
|
t.logger.Warn("route_address_set: no destination IP CIDR rules found in rule-set: ", routeExcludeRuleSet.Name())
|
|
|
|
}
|
|
|
|
t.routeExcludeAddressSet = append(t.routeExcludeAddressSet, ipSets...)
|
|
|
|
}
|
|
|
|
monitor.Start("initialize auto-redirect")
|
|
|
|
err := t.autoRedirect.Start()
|
|
|
|
monitor.Finish()
|
|
|
|
if err != nil {
|
|
|
|
return E.Cause(err, "auto-redirect")
|
|
|
|
}
|
|
|
|
for _, routeRuleSet := range t.routeRuleSet {
|
|
|
|
t.routeRuleSetCallback = append(t.routeRuleSetCallback, routeRuleSet.RegisterCallback(t.updateRouteAddressSet))
|
|
|
|
routeRuleSet.DecRef()
|
|
|
|
}
|
|
|
|
for _, routeExcludeRuleSet := range t.routeExcludeRuleSet {
|
|
|
|
t.routeExcludeRuleSetCallback = append(t.routeExcludeRuleSetCallback, routeExcludeRuleSet.RegisterCallback(t.updateRouteAddressSet))
|
|
|
|
routeExcludeRuleSet.DecRef()
|
|
|
|
}
|
|
|
|
t.routeAddressSet = nil
|
|
|
|
t.routeExcludeAddressSet = nil
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-11-01 16:39:02 +00:00
|
|
|
func (t *Inbound) updateRouteAddressSet(it adapter.RuleSet) {
|
2024-06-07 07:55:21 +00:00
|
|
|
t.routeAddressSet = common.FlatMap(t.routeRuleSet, adapter.RuleSet.ExtractIPSet)
|
|
|
|
t.routeExcludeAddressSet = common.FlatMap(t.routeExcludeRuleSet, adapter.RuleSet.ExtractIPSet)
|
|
|
|
t.autoRedirect.UpdateRouteAddressSet()
|
|
|
|
t.routeAddressSet = nil
|
|
|
|
t.routeExcludeAddressSet = nil
|
|
|
|
}
|
|
|
|
|
2024-11-01 16:39:02 +00:00
|
|
|
func (t *Inbound) Close() error {
|
2022-07-13 11:01:20 +00:00
|
|
|
return common.Close(
|
|
|
|
t.tunStack,
|
|
|
|
t.tunIf,
|
2024-06-07 07:55:21 +00:00
|
|
|
t.autoRedirect,
|
2022-07-09 11:18:37 +00:00
|
|
|
)
|
|
|
|
}
|
|
|
|
|
2024-11-01 16:39:02 +00:00
|
|
|
func (t *Inbound) PrepareConnection(network string, source M.Socksaddr, destination M.Socksaddr) error {
|
2024-10-22 13:28:22 +00:00
|
|
|
return t.router.PreMatch(adapter.InboundContext{
|
|
|
|
Inbound: t.tag,
|
|
|
|
InboundType: C.TypeTun,
|
|
|
|
Network: network,
|
|
|
|
Source: source,
|
|
|
|
Destination: destination,
|
|
|
|
InboundOptions: t.inboundOptions,
|
|
|
|
})
|
2024-10-21 15:38:34 +00:00
|
|
|
}
|
|
|
|
|
2024-11-01 16:39:02 +00:00
|
|
|
func (t *Inbound) NewConnectionEx(ctx context.Context, conn net.Conn, source M.Socksaddr, destination M.Socksaddr, onClose N.CloseHandlerFunc) {
|
2022-07-12 07:17:29 +00:00
|
|
|
ctx = log.ContextWithNewID(ctx)
|
2022-07-09 11:18:37 +00:00
|
|
|
var metadata adapter.InboundContext
|
|
|
|
metadata.Inbound = t.tag
|
2022-07-19 14:16:49 +00:00
|
|
|
metadata.InboundType = C.TypeTun
|
2024-10-21 15:38:34 +00:00
|
|
|
metadata.Source = source
|
|
|
|
metadata.Destination = destination
|
2022-10-07 12:30:27 +00:00
|
|
|
metadata.InboundOptions = t.inboundOptions
|
2024-10-21 15:38:34 +00:00
|
|
|
t.logger.InfoContext(ctx, "inbound connection from ", metadata.Source)
|
2022-07-12 07:17:29 +00:00
|
|
|
t.logger.InfoContext(ctx, "inbound connection to ", metadata.Destination)
|
2024-10-21 15:38:34 +00:00
|
|
|
t.router.RouteConnectionEx(ctx, conn, metadata, onClose)
|
2022-07-09 11:18:37 +00:00
|
|
|
}
|
|
|
|
|
2024-11-01 16:39:02 +00:00
|
|
|
func (t *Inbound) NewPacketConnectionEx(ctx context.Context, conn N.PacketConn, source M.Socksaddr, destination M.Socksaddr, onClose N.CloseHandlerFunc) {
|
2022-07-12 07:17:29 +00:00
|
|
|
ctx = log.ContextWithNewID(ctx)
|
2022-07-09 11:18:37 +00:00
|
|
|
var metadata adapter.InboundContext
|
|
|
|
metadata.Inbound = t.tag
|
2022-07-19 14:16:49 +00:00
|
|
|
metadata.InboundType = C.TypeTun
|
2024-10-21 15:38:34 +00:00
|
|
|
metadata.Source = source
|
|
|
|
metadata.Destination = destination
|
2022-10-07 12:30:27 +00:00
|
|
|
metadata.InboundOptions = t.inboundOptions
|
2022-07-12 07:17:29 +00:00
|
|
|
t.logger.InfoContext(ctx, "inbound packet connection from ", metadata.Source)
|
|
|
|
t.logger.InfoContext(ctx, "inbound packet connection to ", metadata.Destination)
|
2024-10-21 15:38:34 +00:00
|
|
|
t.router.RoutePacketConnectionEx(ctx, conn, metadata, onClose)
|
2022-07-09 11:18:37 +00:00
|
|
|
}
|
|
|
|
|
2024-11-01 16:39:02 +00:00
|
|
|
type autoRedirectHandler Inbound
|
2024-10-21 15:38:34 +00:00
|
|
|
|
|
|
|
func (t *autoRedirectHandler) NewConnectionEx(ctx context.Context, conn net.Conn, source M.Socksaddr, destination M.Socksaddr, onClose N.CloseHandlerFunc) {
|
|
|
|
ctx = log.ContextWithNewID(ctx)
|
|
|
|
var metadata adapter.InboundContext
|
|
|
|
metadata.Inbound = t.tag
|
|
|
|
metadata.InboundType = C.TypeTun
|
|
|
|
metadata.Source = source
|
|
|
|
metadata.Destination = destination
|
|
|
|
metadata.InboundOptions = t.inboundOptions
|
|
|
|
t.logger.InfoContext(ctx, "inbound redirect connection from ", metadata.Source)
|
|
|
|
t.logger.InfoContext(ctx, "inbound connection to ", metadata.Destination)
|
|
|
|
t.router.RouteConnectionEx(ctx, conn, metadata, onClose)
|
2022-07-09 11:18:37 +00:00
|
|
|
}
|