mirror of
https://github.com/SagerNet/sing-box.git
synced 2024-11-14 04:43:17 +00:00
aa7e85caa7
Add half close for smux Update gVisor to 20220905.0
221 lines
6.7 KiB
Go
221 lines
6.7 KiB
Go
package inbound
|
|
|
|
import (
|
|
"context"
|
|
"net"
|
|
"strconv"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/sagernet/sing-box/adapter"
|
|
"github.com/sagernet/sing-box/common/canceler"
|
|
C "github.com/sagernet/sing-box/constant"
|
|
"github.com/sagernet/sing-box/log"
|
|
"github.com/sagernet/sing-box/option"
|
|
"github.com/sagernet/sing-dns"
|
|
"github.com/sagernet/sing-tun"
|
|
"github.com/sagernet/sing/common"
|
|
E "github.com/sagernet/sing/common/exceptions"
|
|
M "github.com/sagernet/sing/common/metadata"
|
|
N "github.com/sagernet/sing/common/network"
|
|
"github.com/sagernet/sing/common/ranges"
|
|
)
|
|
|
|
var _ adapter.Inbound = (*Tun)(nil)
|
|
|
|
type Tun struct {
|
|
tag string
|
|
ctx context.Context
|
|
router adapter.Router
|
|
logger log.ContextLogger
|
|
inboundOptions option.InboundOptions
|
|
tunOptions tun.Options
|
|
endpointIndependentNat bool
|
|
udpTimeout int64
|
|
stack string
|
|
tunIf tun.Tun
|
|
tunStack tun.Stack
|
|
}
|
|
|
|
func NewTun(ctx context.Context, router adapter.Router, logger log.ContextLogger, tag string, options option.TunInboundOptions) (*Tun, error) {
|
|
tunName := options.InterfaceName
|
|
if tunName == "" {
|
|
tunName = tun.CalculateInterfaceName("")
|
|
}
|
|
tunMTU := options.MTU
|
|
if tunMTU == 0 {
|
|
tunMTU = 9000
|
|
}
|
|
var udpTimeout int64
|
|
if options.UDPTimeout != 0 {
|
|
udpTimeout = options.UDPTimeout
|
|
} else {
|
|
udpTimeout = int64(C.UDPTimeout.Seconds())
|
|
}
|
|
includeUID := uidToRange(options.IncludeUID)
|
|
if len(options.IncludeUIDRange) > 0 {
|
|
var err error
|
|
includeUID, err = parseRange(includeUID, options.IncludeUIDRange)
|
|
if err != nil {
|
|
return nil, E.Cause(err, "parse include_uid_range")
|
|
}
|
|
}
|
|
excludeUID := uidToRange(options.ExcludeUID)
|
|
if len(options.ExcludeUIDRange) > 0 {
|
|
var err error
|
|
excludeUID, err = parseRange(excludeUID, options.ExcludeUIDRange)
|
|
if err != nil {
|
|
return nil, E.Cause(err, "parse exclude_uid_range")
|
|
}
|
|
}
|
|
return &Tun{
|
|
tag: tag,
|
|
ctx: ctx,
|
|
router: router,
|
|
logger: logger,
|
|
inboundOptions: options.InboundOptions,
|
|
tunOptions: tun.Options{
|
|
Name: tunName,
|
|
MTU: tunMTU,
|
|
Inet4Address: common.Map(options.Inet4Address, option.ListenPrefix.Build),
|
|
Inet6Address: common.Map(options.Inet6Address, option.ListenPrefix.Build),
|
|
AutoRoute: options.AutoRoute,
|
|
StrictRoute: options.StrictRoute,
|
|
IncludeUID: includeUID,
|
|
ExcludeUID: excludeUID,
|
|
IncludeAndroidUser: options.IncludeAndroidUser,
|
|
IncludePackage: options.IncludePackage,
|
|
ExcludePackage: options.ExcludePackage,
|
|
InterfaceMonitor: router.InterfaceMonitor(),
|
|
TableIndex: 2022,
|
|
},
|
|
endpointIndependentNat: options.EndpointIndependentNat,
|
|
udpTimeout: udpTimeout,
|
|
stack: options.Stack,
|
|
}, nil
|
|
}
|
|
|
|
func uidToRange(uidList option.Listable[uint32]) []ranges.Range[uint32] {
|
|
return common.Map(uidList, func(uid uint32) ranges.Range[uint32] {
|
|
return ranges.NewSingle(uid)
|
|
})
|
|
}
|
|
|
|
func parseRange(uidRanges []ranges.Range[uint32], rangeList []string) ([]ranges.Range[uint32], error) {
|
|
for _, uidRange := range rangeList {
|
|
if !strings.Contains(uidRange, ":") {
|
|
return nil, E.New("missing ':' in range: ", uidRange)
|
|
}
|
|
subIndex := strings.Index(uidRange, ":")
|
|
if subIndex == 0 {
|
|
return nil, E.New("missing range start: ", uidRange)
|
|
} else if subIndex == len(uidRange)-1 {
|
|
return nil, E.New("missing range end: ", uidRange)
|
|
}
|
|
var start, end uint64
|
|
var err error
|
|
start, err = strconv.ParseUint(uidRange[:subIndex], 10, 32)
|
|
if err != nil {
|
|
return nil, E.Cause(err, "parse range start")
|
|
}
|
|
end, err = strconv.ParseUint(uidRange[subIndex+1:], 10, 32)
|
|
if err != nil {
|
|
return nil, E.Cause(err, "parse range end")
|
|
}
|
|
uidRanges = append(uidRanges, ranges.New(uint32(start), uint32(end)))
|
|
}
|
|
return uidRanges, nil
|
|
}
|
|
|
|
func (t *Tun) Type() string {
|
|
return C.TypeTun
|
|
}
|
|
|
|
func (t *Tun) Tag() string {
|
|
return t.tag
|
|
}
|
|
|
|
func (t *Tun) Start() error {
|
|
if C.IsAndroid {
|
|
t.tunOptions.BuildAndroidRules(t.router.PackageManager(), t)
|
|
}
|
|
tunIf, err := tun.Open(t.tunOptions)
|
|
if err != nil {
|
|
return E.Cause(err, "configure tun interface")
|
|
}
|
|
t.tunIf = tunIf
|
|
t.tunStack, err = tun.NewStack(t.stack, tun.StackOptions{
|
|
Context: t.ctx,
|
|
Tun: tunIf,
|
|
MTU: t.tunOptions.MTU,
|
|
Name: t.tunOptions.Name,
|
|
Inet4Address: t.tunOptions.Inet4Address,
|
|
Inet6Address: t.tunOptions.Inet6Address,
|
|
EndpointIndependentNat: t.endpointIndependentNat,
|
|
UDPTimeout: t.udpTimeout,
|
|
Handler: t,
|
|
Logger: t.logger,
|
|
})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
err = t.tunStack.Start()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
t.logger.Info("started at ", t.tunOptions.Name)
|
|
return nil
|
|
}
|
|
|
|
func (t *Tun) Close() error {
|
|
return common.Close(
|
|
t.tunStack,
|
|
t.tunIf,
|
|
)
|
|
}
|
|
|
|
func (t *Tun) NewConnection(ctx context.Context, conn net.Conn, upstreamMetadata M.Metadata) error {
|
|
ctx = log.ContextWithNewID(ctx)
|
|
var metadata adapter.InboundContext
|
|
metadata.Inbound = t.tag
|
|
metadata.InboundType = C.TypeTun
|
|
metadata.Source = upstreamMetadata.Source
|
|
metadata.Destination = upstreamMetadata.Destination
|
|
metadata.SniffEnabled = t.inboundOptions.SniffEnabled
|
|
metadata.SniffOverrideDestination = t.inboundOptions.SniffOverrideDestination
|
|
metadata.DomainStrategy = dns.DomainStrategy(t.inboundOptions.DomainStrategy)
|
|
t.logger.InfoContext(ctx, "inbound connection from ", metadata.Source)
|
|
t.logger.InfoContext(ctx, "inbound connection to ", metadata.Destination)
|
|
err := t.router.RouteConnection(ctx, conn, metadata)
|
|
if err != nil {
|
|
t.NewError(ctx, err)
|
|
}
|
|
return err
|
|
}
|
|
|
|
func (t *Tun) NewPacketConnection(ctx context.Context, conn N.PacketConn, upstreamMetadata M.Metadata) error {
|
|
ctx = log.ContextWithNewID(ctx)
|
|
if tun.NeedTimeoutFromContext(ctx) {
|
|
ctx, conn = canceler.NewPacketConn(ctx, conn, time.Duration(t.udpTimeout)*time.Second)
|
|
}
|
|
var metadata adapter.InboundContext
|
|
metadata.Inbound = t.tag
|
|
metadata.InboundType = C.TypeTun
|
|
metadata.Source = upstreamMetadata.Source
|
|
metadata.Destination = upstreamMetadata.Destination
|
|
metadata.SniffEnabled = t.inboundOptions.SniffEnabled
|
|
metadata.SniffOverrideDestination = t.inboundOptions.SniffOverrideDestination
|
|
metadata.DomainStrategy = dns.DomainStrategy(t.inboundOptions.DomainStrategy)
|
|
t.logger.InfoContext(ctx, "inbound packet connection from ", metadata.Source)
|
|
t.logger.InfoContext(ctx, "inbound packet connection to ", metadata.Destination)
|
|
err := t.router.RoutePacketConnection(ctx, conn, metadata)
|
|
if err != nil {
|
|
t.NewError(ctx, err)
|
|
}
|
|
return err
|
|
}
|
|
|
|
func (t *Tun) NewError(ctx context.Context, err error) {
|
|
NewError(t.logger, ctx, err)
|
|
}
|