2022-07-03 12:59:25 +00:00
|
|
|
package dialer
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"net"
|
2022-08-22 06:28:23 +00:00
|
|
|
"net/netip"
|
2022-07-03 12:59:25 +00:00
|
|
|
"time"
|
|
|
|
|
2022-07-10 00:18:52 +00:00
|
|
|
"github.com/sagernet/sing-box/adapter"
|
2022-07-24 14:54:16 +00:00
|
|
|
"github.com/sagernet/sing-box/common/warning"
|
2022-07-06 07:01:09 +00:00
|
|
|
C "github.com/sagernet/sing-box/constant"
|
|
|
|
"github.com/sagernet/sing-box/option"
|
2022-07-08 15:03:57 +00:00
|
|
|
"github.com/sagernet/sing/common/control"
|
2022-08-29 11:58:58 +00:00
|
|
|
E "github.com/sagernet/sing/common/exceptions"
|
2022-07-08 15:03:57 +00:00
|
|
|
M "github.com/sagernet/sing/common/metadata"
|
2022-07-29 16:29:22 +00:00
|
|
|
N "github.com/sagernet/sing/common/network"
|
2022-07-06 07:01:09 +00:00
|
|
|
|
|
|
|
"github.com/database64128/tfo-go"
|
2022-07-03 12:59:25 +00:00
|
|
|
)
|
|
|
|
|
2022-07-24 14:54:16 +00:00
|
|
|
var warnBindInterfaceOnUnsupportedPlatform = warning.New(
|
|
|
|
func() bool {
|
2022-08-05 08:55:46 +00:00
|
|
|
return !(C.IsLinux || C.IsWindows || C.IsDarwin)
|
2022-07-24 14:54:16 +00:00
|
|
|
},
|
|
|
|
"outbound option `bind_interface` is only supported on Linux and Windows",
|
|
|
|
)
|
|
|
|
|
|
|
|
var warnRoutingMarkOnUnsupportedPlatform = warning.New(
|
|
|
|
func() bool {
|
|
|
|
return !C.IsLinux
|
|
|
|
},
|
|
|
|
"outbound option `routing_mark` is only supported on Linux",
|
|
|
|
)
|
|
|
|
|
|
|
|
var warnReuseAdderOnUnsupportedPlatform = warning.New(
|
|
|
|
func() bool {
|
|
|
|
return !(C.IsDarwin || C.IsDragonfly || C.IsFreebsd || C.IsLinux || C.IsNetbsd || C.IsOpenbsd || C.IsSolaris || C.IsWindows)
|
|
|
|
},
|
|
|
|
"outbound option `reuse_addr` is unsupported on current platform",
|
|
|
|
)
|
|
|
|
|
|
|
|
var warnProtectPathOnNonAndroid = warning.New(
|
|
|
|
func() bool {
|
|
|
|
return !C.IsAndroid
|
|
|
|
},
|
|
|
|
"outbound option `protect_path` is only supported on Android",
|
|
|
|
)
|
|
|
|
|
|
|
|
var warnTFOOnUnsupportedPlatform = warning.New(
|
|
|
|
func() bool {
|
|
|
|
return !(C.IsDarwin || C.IsFreebsd || C.IsLinux || C.IsWindows)
|
|
|
|
},
|
|
|
|
"outbound option `tcp_fast_open` is unsupported on current platform",
|
|
|
|
)
|
|
|
|
|
2022-07-07 13:47:21 +00:00
|
|
|
type DefaultDialer struct {
|
2022-08-22 06:35:05 +00:00
|
|
|
dialer tfo.Dialer
|
|
|
|
udpDialer net.Dialer
|
|
|
|
udpListener net.ListenConfig
|
2022-08-22 06:28:23 +00:00
|
|
|
bindUDPAddr string
|
2022-07-03 12:59:25 +00:00
|
|
|
}
|
|
|
|
|
2022-07-10 00:18:52 +00:00
|
|
|
func NewDefault(router adapter.Router, options option.DialerOptions) *DefaultDialer {
|
2022-07-03 12:59:25 +00:00
|
|
|
var dialer net.Dialer
|
|
|
|
var listener net.ListenConfig
|
|
|
|
if options.BindInterface != "" {
|
2022-07-24 14:54:16 +00:00
|
|
|
warnBindInterfaceOnUnsupportedPlatform.Check()
|
2022-09-14 04:46:02 +00:00
|
|
|
bindFunc := control.BindToInterface(router.InterfaceFinder(), options.BindInterface, -1)
|
2022-08-04 14:01:20 +00:00
|
|
|
dialer.Control = control.Append(dialer.Control, bindFunc)
|
|
|
|
listener.Control = control.Append(listener.Control, bindFunc)
|
2022-07-10 00:18:52 +00:00
|
|
|
} else if router.AutoDetectInterface() {
|
2022-09-14 04:46:02 +00:00
|
|
|
const useInterfaceName = C.IsLinux
|
|
|
|
bindFunc := control.BindToInterfaceFunc(router.InterfaceFinder(), func(network string, address string) (interfaceName string, interfaceIndex int) {
|
|
|
|
remoteAddr := M.ParseSocksaddr(address).Addr
|
|
|
|
if C.IsLinux {
|
|
|
|
return router.InterfaceMonitor().DefaultInterfaceName(remoteAddr), -1
|
|
|
|
} else {
|
|
|
|
return "", router.InterfaceMonitor().DefaultInterfaceIndex(remoteAddr)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
dialer.Control = control.Append(dialer.Control, bindFunc)
|
|
|
|
listener.Control = control.Append(listener.Control, bindFunc)
|
2022-07-15 03:51:51 +00:00
|
|
|
} else if router.DefaultInterface() != "" {
|
2022-09-14 04:46:02 +00:00
|
|
|
bindFunc := control.BindToInterface(router.InterfaceFinder(), router.DefaultInterface(), -1)
|
2022-08-04 14:01:20 +00:00
|
|
|
dialer.Control = control.Append(dialer.Control, bindFunc)
|
|
|
|
listener.Control = control.Append(listener.Control, bindFunc)
|
2022-07-03 12:59:25 +00:00
|
|
|
}
|
|
|
|
if options.RoutingMark != 0 {
|
2022-07-24 14:54:16 +00:00
|
|
|
warnRoutingMarkOnUnsupportedPlatform.Check()
|
2022-07-03 12:59:25 +00:00
|
|
|
dialer.Control = control.Append(dialer.Control, control.RoutingMark(options.RoutingMark))
|
|
|
|
listener.Control = control.Append(listener.Control, control.RoutingMark(options.RoutingMark))
|
2022-07-24 09:46:25 +00:00
|
|
|
} else if router.DefaultMark() != 0 {
|
|
|
|
dialer.Control = control.Append(dialer.Control, control.RoutingMark(router.DefaultMark()))
|
|
|
|
listener.Control = control.Append(listener.Control, control.RoutingMark(router.DefaultMark()))
|
2022-07-03 12:59:25 +00:00
|
|
|
}
|
|
|
|
if options.ReuseAddr {
|
2022-07-24 14:54:16 +00:00
|
|
|
warnReuseAdderOnUnsupportedPlatform.Check()
|
2022-07-03 12:59:25 +00:00
|
|
|
listener.Control = control.Append(listener.Control, control.ReuseAddr())
|
|
|
|
}
|
2022-07-06 06:45:56 +00:00
|
|
|
if options.ProtectPath != "" {
|
2022-07-24 14:54:16 +00:00
|
|
|
warnProtectPathOnNonAndroid.Check()
|
2022-07-11 10:44:59 +00:00
|
|
|
dialer.Control = control.Append(dialer.Control, control.ProtectPath(options.ProtectPath))
|
|
|
|
listener.Control = control.Append(listener.Control, control.ProtectPath(options.ProtectPath))
|
2022-07-06 06:45:56 +00:00
|
|
|
}
|
2022-07-03 12:59:25 +00:00
|
|
|
if options.ConnectTimeout != 0 {
|
2022-07-08 04:58:43 +00:00
|
|
|
dialer.Timeout = time.Duration(options.ConnectTimeout)
|
2022-07-18 12:40:14 +00:00
|
|
|
} else {
|
2022-07-25 14:02:39 +00:00
|
|
|
dialer.Timeout = C.TCPTimeout
|
2022-07-03 12:59:25 +00:00
|
|
|
}
|
2022-07-24 14:54:16 +00:00
|
|
|
if options.TCPFastOpen {
|
|
|
|
warnTFOOnUnsupportedPlatform.Check()
|
|
|
|
}
|
2022-09-05 16:54:57 +00:00
|
|
|
if !options.UDPFragment {
|
|
|
|
dialer.Control = control.Append(dialer.Control, control.DisableUDPFragment())
|
|
|
|
listener.Control = control.Append(listener.Control, control.DisableUDPFragment())
|
|
|
|
}
|
2022-08-22 06:28:23 +00:00
|
|
|
var bindUDPAddr string
|
2022-08-22 06:35:05 +00:00
|
|
|
udpDialer := dialer
|
2022-08-25 06:49:49 +00:00
|
|
|
var bindAddress netip.Addr
|
|
|
|
if options.BindAddress != nil {
|
|
|
|
bindAddress = options.BindAddress.Build()
|
|
|
|
}
|
2022-08-22 06:28:23 +00:00
|
|
|
if bindAddress.IsValid() {
|
|
|
|
dialer.LocalAddr = &net.TCPAddr{
|
|
|
|
IP: bindAddress.AsSlice(),
|
|
|
|
}
|
2022-08-22 06:35:05 +00:00
|
|
|
udpDialer.LocalAddr = &net.UDPAddr{
|
|
|
|
IP: bindAddress.AsSlice(),
|
|
|
|
}
|
2022-08-22 06:28:23 +00:00
|
|
|
bindUDPAddr = M.SocksaddrFrom(bindAddress, 0).String()
|
|
|
|
}
|
2022-08-22 06:35:05 +00:00
|
|
|
return &DefaultDialer{tfo.Dialer{Dialer: dialer, DisableTFO: !options.TCPFastOpen}, udpDialer, listener, bindUDPAddr}
|
2022-07-03 12:59:25 +00:00
|
|
|
}
|
|
|
|
|
2022-07-07 13:47:21 +00:00
|
|
|
func (d *DefaultDialer) DialContext(ctx context.Context, network string, address M.Socksaddr) (net.Conn, error) {
|
2022-08-29 11:58:58 +00:00
|
|
|
if !address.IsValid() {
|
|
|
|
return nil, E.New("invalid address")
|
|
|
|
}
|
2022-08-22 06:35:05 +00:00
|
|
|
switch N.NetworkName(network) {
|
|
|
|
case N.NetworkUDP:
|
|
|
|
return d.udpDialer.DialContext(ctx, network, address.String())
|
|
|
|
}
|
|
|
|
return d.dialer.DialContext(ctx, network, address.Unwrap().String())
|
2022-07-03 12:59:25 +00:00
|
|
|
}
|
|
|
|
|
2022-07-07 13:47:21 +00:00
|
|
|
func (d *DefaultDialer) ListenPacket(ctx context.Context, destination M.Socksaddr) (net.PacketConn, error) {
|
2022-08-22 06:35:05 +00:00
|
|
|
return d.udpListener.ListenPacket(ctx, N.NetworkUDP, d.bindUDPAddr)
|
2022-07-07 13:47:21 +00:00
|
|
|
}
|