mirror of
https://github.com/SagerNet/sing-box.git
synced 2024-12-04 20:36:37 +00:00
1004 lines
30 KiB
Go
1004 lines
30 KiB
Go
package route
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"net/netip"
|
|
"net/url"
|
|
"os"
|
|
"runtime"
|
|
"strings"
|
|
"syscall"
|
|
"time"
|
|
|
|
"github.com/sagernet/sing-box/adapter"
|
|
"github.com/sagernet/sing-box/common/conntrack"
|
|
"github.com/sagernet/sing-box/common/dialer"
|
|
"github.com/sagernet/sing-box/common/geoip"
|
|
"github.com/sagernet/sing-box/common/geosite"
|
|
"github.com/sagernet/sing-box/common/process"
|
|
"github.com/sagernet/sing-box/common/taskmonitor"
|
|
C "github.com/sagernet/sing-box/constant"
|
|
"github.com/sagernet/sing-box/experimental/libbox/platform"
|
|
"github.com/sagernet/sing-box/log"
|
|
"github.com/sagernet/sing-box/option"
|
|
R "github.com/sagernet/sing-box/route/rule"
|
|
"github.com/sagernet/sing-box/transport/fakeip"
|
|
"github.com/sagernet/sing-dns"
|
|
"github.com/sagernet/sing-tun"
|
|
"github.com/sagernet/sing/common"
|
|
"github.com/sagernet/sing/common/control"
|
|
E "github.com/sagernet/sing/common/exceptions"
|
|
F "github.com/sagernet/sing/common/format"
|
|
M "github.com/sagernet/sing/common/metadata"
|
|
N "github.com/sagernet/sing/common/network"
|
|
"github.com/sagernet/sing/common/ntp"
|
|
"github.com/sagernet/sing/common/task"
|
|
"github.com/sagernet/sing/common/winpowrprof"
|
|
"github.com/sagernet/sing/service"
|
|
"github.com/sagernet/sing/service/pause"
|
|
)
|
|
|
|
var _ adapter.Router = (*Router)(nil)
|
|
|
|
type Router struct {
|
|
ctx context.Context
|
|
logger log.ContextLogger
|
|
dnsLogger log.ContextLogger
|
|
inboundByTag map[string]adapter.Inbound
|
|
outbounds []adapter.Outbound
|
|
outboundByTag map[string]adapter.Outbound
|
|
rules []adapter.Rule
|
|
defaultDetour string
|
|
defaultOutboundForConnection adapter.Outbound
|
|
defaultOutboundForPacketConnection adapter.Outbound
|
|
needGeoIPDatabase bool
|
|
needGeositeDatabase bool
|
|
geoIPOptions option.GeoIPOptions
|
|
geositeOptions option.GeositeOptions
|
|
geoIPReader *geoip.Reader
|
|
geositeReader *geosite.Reader
|
|
geositeCache map[string]adapter.Rule
|
|
needFindProcess bool
|
|
dnsClient *dns.Client
|
|
defaultDomainStrategy dns.DomainStrategy
|
|
dnsRules []adapter.DNSRule
|
|
ruleSets []adapter.RuleSet
|
|
ruleSetMap map[string]adapter.RuleSet
|
|
defaultTransport dns.Transport
|
|
transports []dns.Transport
|
|
transportMap map[string]dns.Transport
|
|
transportDomainStrategy map[dns.Transport]dns.DomainStrategy
|
|
dnsReverseMapping *DNSReverseMapping
|
|
fakeIPStore adapter.FakeIPStore
|
|
interfaceFinder *control.DefaultInterfaceFinder
|
|
autoDetectInterface bool
|
|
defaultInterface string
|
|
defaultMark uint32
|
|
autoRedirectOutputMark uint32
|
|
networkMonitor tun.NetworkUpdateMonitor
|
|
interfaceMonitor tun.DefaultInterfaceMonitor
|
|
packageManager tun.PackageManager
|
|
powerListener winpowrprof.EventListener
|
|
processSearcher process.Searcher
|
|
timeService *ntp.Service
|
|
pauseManager pause.Manager
|
|
clashServer adapter.ClashServer
|
|
v2rayServer adapter.V2RayServer
|
|
platformInterface platform.Interface
|
|
needWIFIState bool
|
|
needPackageManager bool
|
|
wifiState adapter.WIFIState
|
|
started bool
|
|
}
|
|
|
|
func NewRouter(
|
|
ctx context.Context,
|
|
logFactory log.Factory,
|
|
options option.RouteOptions,
|
|
dnsOptions option.DNSOptions,
|
|
ntpOptions option.NTPOptions,
|
|
inbounds []option.Inbound,
|
|
) (*Router, error) {
|
|
router := &Router{
|
|
ctx: ctx,
|
|
logger: logFactory.NewLogger("router"),
|
|
dnsLogger: logFactory.NewLogger("dns"),
|
|
outboundByTag: make(map[string]adapter.Outbound),
|
|
rules: make([]adapter.Rule, 0, len(options.Rules)),
|
|
dnsRules: make([]adapter.DNSRule, 0, len(dnsOptions.Rules)),
|
|
ruleSetMap: make(map[string]adapter.RuleSet),
|
|
needGeoIPDatabase: hasRule(options.Rules, isGeoIPRule) || hasDNSRule(dnsOptions.Rules, isGeoIPDNSRule),
|
|
needGeositeDatabase: hasRule(options.Rules, isGeositeRule) || hasDNSRule(dnsOptions.Rules, isGeositeDNSRule),
|
|
geoIPOptions: common.PtrValueOrDefault(options.GeoIP),
|
|
geositeOptions: common.PtrValueOrDefault(options.Geosite),
|
|
geositeCache: make(map[string]adapter.Rule),
|
|
needFindProcess: hasRule(options.Rules, isProcessRule) || hasDNSRule(dnsOptions.Rules, isProcessDNSRule) || options.FindProcess,
|
|
defaultDetour: options.Final,
|
|
defaultDomainStrategy: dns.DomainStrategy(dnsOptions.Strategy),
|
|
interfaceFinder: control.NewDefaultInterfaceFinder(),
|
|
autoDetectInterface: options.AutoDetectInterface,
|
|
defaultInterface: options.DefaultInterface,
|
|
defaultMark: options.DefaultMark,
|
|
pauseManager: service.FromContext[pause.Manager](ctx),
|
|
platformInterface: service.FromContext[platform.Interface](ctx),
|
|
needWIFIState: hasRule(options.Rules, isWIFIRule) || hasDNSRule(dnsOptions.Rules, isWIFIDNSRule),
|
|
needPackageManager: common.Any(inbounds, func(inbound option.Inbound) bool {
|
|
if tunOptions, isTUN := inbound.Options.(*option.TunInboundOptions); isTUN && tunOptions.AutoRoute {
|
|
return true
|
|
}
|
|
return false
|
|
}),
|
|
}
|
|
router.dnsClient = dns.NewClient(dns.ClientOptions{
|
|
DisableCache: dnsOptions.DNSClientOptions.DisableCache,
|
|
DisableExpire: dnsOptions.DNSClientOptions.DisableExpire,
|
|
IndependentCache: dnsOptions.DNSClientOptions.IndependentCache,
|
|
RDRC: func() dns.RDRCStore {
|
|
cacheFile := service.FromContext[adapter.CacheFile](ctx)
|
|
if cacheFile == nil {
|
|
return nil
|
|
}
|
|
if !cacheFile.StoreRDRC() {
|
|
return nil
|
|
}
|
|
return cacheFile
|
|
},
|
|
Logger: router.dnsLogger,
|
|
})
|
|
for i, ruleOptions := range options.Rules {
|
|
routeRule, err := R.NewRule(ctx, router, router.logger, ruleOptions, true)
|
|
if err != nil {
|
|
return nil, E.Cause(err, "parse rule[", i, "]")
|
|
}
|
|
router.rules = append(router.rules, routeRule)
|
|
}
|
|
for i, dnsRuleOptions := range dnsOptions.Rules {
|
|
dnsRule, err := R.NewDNSRule(ctx, router, router.logger, dnsRuleOptions, true)
|
|
if err != nil {
|
|
return nil, E.Cause(err, "parse dns rule[", i, "]")
|
|
}
|
|
router.dnsRules = append(router.dnsRules, dnsRule)
|
|
}
|
|
for i, ruleSetOptions := range options.RuleSet {
|
|
if _, exists := router.ruleSetMap[ruleSetOptions.Tag]; exists {
|
|
return nil, E.New("duplicate rule-set tag: ", ruleSetOptions.Tag)
|
|
}
|
|
ruleSet, err := R.NewRuleSet(ctx, router, router.logger, ruleSetOptions)
|
|
if err != nil {
|
|
return nil, E.Cause(err, "parse rule-set[", i, "]")
|
|
}
|
|
router.ruleSets = append(router.ruleSets, ruleSet)
|
|
router.ruleSetMap[ruleSetOptions.Tag] = ruleSet
|
|
}
|
|
|
|
transports := make([]dns.Transport, len(dnsOptions.Servers))
|
|
dummyTransportMap := make(map[string]dns.Transport)
|
|
transportMap := make(map[string]dns.Transport)
|
|
transportTags := make([]string, len(dnsOptions.Servers))
|
|
transportTagMap := make(map[string]bool)
|
|
transportDomainStrategy := make(map[dns.Transport]dns.DomainStrategy)
|
|
for i, server := range dnsOptions.Servers {
|
|
var tag string
|
|
if server.Tag != "" {
|
|
tag = server.Tag
|
|
} else {
|
|
tag = F.ToString(i)
|
|
}
|
|
if transportTagMap[tag] {
|
|
return nil, E.New("duplicate dns server tag: ", tag)
|
|
}
|
|
transportTags[i] = tag
|
|
transportTagMap[tag] = true
|
|
}
|
|
ctx = adapter.ContextWithRouter(ctx, router)
|
|
for {
|
|
lastLen := len(dummyTransportMap)
|
|
for i, server := range dnsOptions.Servers {
|
|
tag := transportTags[i]
|
|
if _, exists := dummyTransportMap[tag]; exists {
|
|
continue
|
|
}
|
|
var detour N.Dialer
|
|
if server.Detour == "" {
|
|
detour = dialer.NewRouter(router)
|
|
} else {
|
|
detour = dialer.NewDetour(router, server.Detour)
|
|
}
|
|
var serverProtocol string
|
|
switch server.Address {
|
|
case "local":
|
|
serverProtocol = "local"
|
|
default:
|
|
serverURL, _ := url.Parse(server.Address)
|
|
var serverAddress string
|
|
if serverURL != nil {
|
|
if serverURL.Scheme == "" {
|
|
serverProtocol = "udp"
|
|
} else {
|
|
serverProtocol = serverURL.Scheme
|
|
}
|
|
serverAddress = serverURL.Hostname()
|
|
}
|
|
if serverAddress == "" {
|
|
serverAddress = server.Address
|
|
}
|
|
notIpAddress := !M.ParseSocksaddr(serverAddress).Addr.IsValid()
|
|
if server.AddressResolver != "" {
|
|
if !transportTagMap[server.AddressResolver] {
|
|
return nil, E.New("parse dns server[", tag, "]: address resolver not found: ", server.AddressResolver)
|
|
}
|
|
if upstream, exists := dummyTransportMap[server.AddressResolver]; exists {
|
|
detour = dns.NewDialerWrapper(detour, router.dnsClient, upstream, dns.DomainStrategy(server.AddressStrategy), time.Duration(server.AddressFallbackDelay))
|
|
} else {
|
|
continue
|
|
}
|
|
} else if notIpAddress && strings.Contains(server.Address, ".") {
|
|
return nil, E.New("parse dns server[", tag, "]: missing address_resolver")
|
|
}
|
|
}
|
|
var clientSubnet netip.Prefix
|
|
if server.ClientSubnet != nil {
|
|
clientSubnet = server.ClientSubnet.Build()
|
|
} else if dnsOptions.ClientSubnet != nil {
|
|
clientSubnet = dnsOptions.ClientSubnet.Build()
|
|
}
|
|
if serverProtocol == "" {
|
|
serverProtocol = "transport"
|
|
}
|
|
transport, err := dns.CreateTransport(dns.TransportOptions{
|
|
Context: ctx,
|
|
Logger: logFactory.NewLogger(F.ToString("dns/", serverProtocol, "[", tag, "]")),
|
|
Name: tag,
|
|
Dialer: detour,
|
|
Address: server.Address,
|
|
ClientSubnet: clientSubnet,
|
|
})
|
|
if err != nil {
|
|
return nil, E.Cause(err, "parse dns server[", tag, "]")
|
|
}
|
|
transports[i] = transport
|
|
dummyTransportMap[tag] = transport
|
|
if server.Tag != "" {
|
|
transportMap[server.Tag] = transport
|
|
}
|
|
strategy := dns.DomainStrategy(server.Strategy)
|
|
if strategy != dns.DomainStrategyAsIS {
|
|
transportDomainStrategy[transport] = strategy
|
|
}
|
|
}
|
|
if len(transports) == len(dummyTransportMap) {
|
|
break
|
|
}
|
|
if lastLen != len(dummyTransportMap) {
|
|
continue
|
|
}
|
|
unresolvedTags := common.MapIndexed(common.FilterIndexed(dnsOptions.Servers, func(index int, server option.DNSServerOptions) bool {
|
|
_, exists := dummyTransportMap[transportTags[index]]
|
|
return !exists
|
|
}), func(index int, server option.DNSServerOptions) string {
|
|
return transportTags[index]
|
|
})
|
|
if len(unresolvedTags) == 0 {
|
|
panic(F.ToString("unexpected unresolved dns servers: ", len(transports), " ", len(dummyTransportMap), " ", len(transportMap)))
|
|
}
|
|
return nil, E.New("found circular reference in dns servers: ", strings.Join(unresolvedTags, " "))
|
|
}
|
|
var defaultTransport dns.Transport
|
|
if dnsOptions.Final != "" {
|
|
defaultTransport = dummyTransportMap[dnsOptions.Final]
|
|
if defaultTransport == nil {
|
|
return nil, E.New("default dns server not found: ", dnsOptions.Final)
|
|
}
|
|
}
|
|
if defaultTransport == nil {
|
|
if len(transports) == 0 {
|
|
transports = append(transports, common.Must1(dns.CreateTransport(dns.TransportOptions{
|
|
Context: ctx,
|
|
Name: "local",
|
|
Address: "local",
|
|
Dialer: common.Must1(dialer.NewDefault(router, option.DialerOptions{})),
|
|
})))
|
|
}
|
|
defaultTransport = transports[0]
|
|
}
|
|
if _, isFakeIP := defaultTransport.(adapter.FakeIPTransport); isFakeIP {
|
|
return nil, E.New("default DNS server cannot be fakeip")
|
|
}
|
|
router.defaultTransport = defaultTransport
|
|
router.transports = transports
|
|
router.transportMap = transportMap
|
|
router.transportDomainStrategy = transportDomainStrategy
|
|
|
|
if dnsOptions.ReverseMapping {
|
|
router.dnsReverseMapping = NewDNSReverseMapping()
|
|
}
|
|
|
|
if fakeIPOptions := dnsOptions.FakeIP; fakeIPOptions != nil && dnsOptions.FakeIP.Enabled {
|
|
var inet4Range netip.Prefix
|
|
var inet6Range netip.Prefix
|
|
if fakeIPOptions.Inet4Range != nil {
|
|
inet4Range = *fakeIPOptions.Inet4Range
|
|
}
|
|
if fakeIPOptions.Inet6Range != nil {
|
|
inet6Range = *fakeIPOptions.Inet6Range
|
|
}
|
|
router.fakeIPStore = fakeip.NewStore(ctx, router.logger, inet4Range, inet6Range)
|
|
}
|
|
|
|
usePlatformDefaultInterfaceMonitor := router.platformInterface != nil && router.platformInterface.UsePlatformDefaultInterfaceMonitor()
|
|
needInterfaceMonitor := options.AutoDetectInterface || common.Any(inbounds, func(inbound option.Inbound) bool {
|
|
if httpMixedOptions, isHTTPMixed := inbound.Options.(*option.HTTPMixedInboundOptions); isHTTPMixed && httpMixedOptions.SetSystemProxy {
|
|
return true
|
|
}
|
|
if tunOptions, isTUN := inbound.Options.(*option.TunInboundOptions); isTUN && tunOptions.AutoRoute {
|
|
return true
|
|
}
|
|
return false
|
|
})
|
|
|
|
if !usePlatformDefaultInterfaceMonitor {
|
|
networkMonitor, err := tun.NewNetworkUpdateMonitor(router.logger)
|
|
if !((err != nil && !needInterfaceMonitor) || errors.Is(err, os.ErrInvalid)) {
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
router.networkMonitor = networkMonitor
|
|
networkMonitor.RegisterCallback(func() {
|
|
_ = router.interfaceFinder.Update()
|
|
})
|
|
interfaceMonitor, err := tun.NewDefaultInterfaceMonitor(router.networkMonitor, router.logger, tun.DefaultInterfaceMonitorOptions{
|
|
InterfaceFinder: router.interfaceFinder,
|
|
OverrideAndroidVPN: options.OverrideAndroidVPN,
|
|
UnderNetworkExtension: router.platformInterface != nil && router.platformInterface.UnderNetworkExtension(),
|
|
})
|
|
if err != nil {
|
|
return nil, E.New("auto_detect_interface unsupported on current platform")
|
|
}
|
|
interfaceMonitor.RegisterCallback(router.notifyNetworkUpdate)
|
|
router.interfaceMonitor = interfaceMonitor
|
|
}
|
|
} else {
|
|
interfaceMonitor := router.platformInterface.CreateDefaultInterfaceMonitor(router.logger)
|
|
interfaceMonitor.RegisterCallback(router.notifyNetworkUpdate)
|
|
router.interfaceMonitor = interfaceMonitor
|
|
}
|
|
|
|
if ntpOptions.Enabled {
|
|
ntpDialer, err := dialer.New(router, ntpOptions.DialerOptions)
|
|
if err != nil {
|
|
return nil, E.Cause(err, "create NTP service")
|
|
}
|
|
timeService := ntp.NewService(ntp.Options{
|
|
Context: ctx,
|
|
Dialer: ntpDialer,
|
|
Logger: logFactory.NewLogger("ntp"),
|
|
Server: ntpOptions.ServerOptions.Build(),
|
|
Interval: time.Duration(ntpOptions.Interval),
|
|
WriteToSystem: ntpOptions.WriteToSystem,
|
|
})
|
|
service.MustRegister[ntp.TimeService](ctx, timeService)
|
|
router.timeService = timeService
|
|
}
|
|
return router, nil
|
|
}
|
|
|
|
func (r *Router) Initialize(inbounds []adapter.Inbound, outbounds []adapter.Outbound, defaultOutbound func() adapter.Outbound) error {
|
|
inboundByTag := make(map[string]adapter.Inbound)
|
|
for _, inbound := range inbounds {
|
|
inboundByTag[inbound.Tag()] = inbound
|
|
}
|
|
outboundByTag := make(map[string]adapter.Outbound)
|
|
for _, detour := range outbounds {
|
|
outboundByTag[detour.Tag()] = detour
|
|
}
|
|
var defaultOutboundForConnection adapter.Outbound
|
|
var defaultOutboundForPacketConnection adapter.Outbound
|
|
if r.defaultDetour != "" {
|
|
detour, loaded := outboundByTag[r.defaultDetour]
|
|
if !loaded {
|
|
return E.New("default detour not found: ", r.defaultDetour)
|
|
}
|
|
if common.Contains(detour.Network(), N.NetworkTCP) {
|
|
defaultOutboundForConnection = detour
|
|
}
|
|
if common.Contains(detour.Network(), N.NetworkUDP) {
|
|
defaultOutboundForPacketConnection = detour
|
|
}
|
|
}
|
|
if defaultOutboundForConnection == nil {
|
|
for _, detour := range outbounds {
|
|
if common.Contains(detour.Network(), N.NetworkTCP) {
|
|
defaultOutboundForConnection = detour
|
|
break
|
|
}
|
|
}
|
|
}
|
|
if defaultOutboundForPacketConnection == nil {
|
|
for _, detour := range outbounds {
|
|
if common.Contains(detour.Network(), N.NetworkUDP) {
|
|
defaultOutboundForPacketConnection = detour
|
|
break
|
|
}
|
|
}
|
|
}
|
|
if defaultOutboundForConnection == nil || defaultOutboundForPacketConnection == nil {
|
|
detour := defaultOutbound()
|
|
if defaultOutboundForConnection == nil {
|
|
defaultOutboundForConnection = detour
|
|
}
|
|
if defaultOutboundForPacketConnection == nil {
|
|
defaultOutboundForPacketConnection = detour
|
|
}
|
|
outbounds = append(outbounds, detour)
|
|
outboundByTag[detour.Tag()] = detour
|
|
}
|
|
r.inboundByTag = inboundByTag
|
|
r.outbounds = outbounds
|
|
r.defaultOutboundForConnection = defaultOutboundForConnection
|
|
r.defaultOutboundForPacketConnection = defaultOutboundForPacketConnection
|
|
r.outboundByTag = outboundByTag
|
|
for i, rule := range r.rules {
|
|
routeAction, isRoute := rule.Action().(*R.RuleActionRoute)
|
|
if !isRoute {
|
|
continue
|
|
}
|
|
if _, loaded := outboundByTag[routeAction.Outbound]; !loaded {
|
|
return E.New("outbound not found for rule[", i, "]: ", routeAction.Outbound)
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (r *Router) Outbounds() []adapter.Outbound {
|
|
if !r.started {
|
|
return nil
|
|
}
|
|
return r.outbounds
|
|
}
|
|
|
|
func (r *Router) PreStart() error {
|
|
monitor := taskmonitor.New(r.logger, C.StartTimeout)
|
|
if r.interfaceMonitor != nil {
|
|
monitor.Start("initialize interface monitor")
|
|
err := r.interfaceMonitor.Start()
|
|
monitor.Finish()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
if r.networkMonitor != nil {
|
|
monitor.Start("initialize network monitor")
|
|
err := r.networkMonitor.Start()
|
|
monitor.Finish()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
if r.fakeIPStore != nil {
|
|
monitor.Start("initialize fakeip store")
|
|
err := r.fakeIPStore.Start()
|
|
monitor.Finish()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (r *Router) Start() error {
|
|
monitor := taskmonitor.New(r.logger, C.StartTimeout)
|
|
if r.needGeoIPDatabase {
|
|
monitor.Start("initialize geoip database")
|
|
err := r.prepareGeoIPDatabase()
|
|
monitor.Finish()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
if r.needGeositeDatabase {
|
|
monitor.Start("initialize geosite database")
|
|
err := r.prepareGeositeDatabase()
|
|
monitor.Finish()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
if r.needGeositeDatabase {
|
|
for _, rule := range r.rules {
|
|
err := rule.UpdateGeosite()
|
|
if err != nil {
|
|
r.logger.Error("failed to initialize geosite: ", err)
|
|
}
|
|
}
|
|
for _, rule := range r.dnsRules {
|
|
err := rule.UpdateGeosite()
|
|
if err != nil {
|
|
r.logger.Error("failed to initialize geosite: ", err)
|
|
}
|
|
}
|
|
err := common.Close(r.geositeReader)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
r.geositeCache = nil
|
|
r.geositeReader = nil
|
|
}
|
|
|
|
if runtime.GOOS == "windows" {
|
|
powerListener, err := winpowrprof.NewEventListener(r.notifyWindowsPowerEvent)
|
|
if err == nil {
|
|
r.powerListener = powerListener
|
|
} else {
|
|
r.logger.Warn("initialize power listener: ", err)
|
|
}
|
|
}
|
|
|
|
if r.powerListener != nil {
|
|
monitor.Start("start power listener")
|
|
err := r.powerListener.Start()
|
|
monitor.Finish()
|
|
if err != nil {
|
|
return E.Cause(err, "start power listener")
|
|
}
|
|
}
|
|
|
|
monitor.Start("initialize DNS client")
|
|
r.dnsClient.Start()
|
|
monitor.Finish()
|
|
|
|
if C.IsAndroid && r.platformInterface == nil {
|
|
monitor.Start("initialize package manager")
|
|
packageManager, err := tun.NewPackageManager(tun.PackageManagerOptions{
|
|
Callback: r,
|
|
Logger: r.logger,
|
|
})
|
|
monitor.Finish()
|
|
if err != nil {
|
|
return E.Cause(err, "create package manager")
|
|
}
|
|
if r.needPackageManager {
|
|
monitor.Start("start package manager")
|
|
err = packageManager.Start()
|
|
monitor.Finish()
|
|
if err != nil {
|
|
return E.Cause(err, "start package manager")
|
|
}
|
|
}
|
|
r.packageManager = packageManager
|
|
}
|
|
|
|
for i, rule := range r.dnsRules {
|
|
monitor.Start("initialize DNS rule[", i, "]")
|
|
err := rule.Start()
|
|
monitor.Finish()
|
|
if err != nil {
|
|
return E.Cause(err, "initialize DNS rule[", i, "]")
|
|
}
|
|
}
|
|
for i, transport := range r.transports {
|
|
monitor.Start("initialize DNS transport[", i, "]")
|
|
err := transport.Start()
|
|
monitor.Finish()
|
|
if err != nil {
|
|
return E.Cause(err, "initialize DNS server[", i, "]")
|
|
}
|
|
}
|
|
if r.timeService != nil {
|
|
monitor.Start("initialize time service")
|
|
err := r.timeService.Start()
|
|
monitor.Finish()
|
|
if err != nil {
|
|
return E.Cause(err, "initialize time service")
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (r *Router) Close() error {
|
|
monitor := taskmonitor.New(r.logger, C.StopTimeout)
|
|
var err error
|
|
for i, rule := range r.rules {
|
|
monitor.Start("close rule[", i, "]")
|
|
err = E.Append(err, rule.Close(), func(err error) error {
|
|
return E.Cause(err, "close rule[", i, "]")
|
|
})
|
|
monitor.Finish()
|
|
}
|
|
for i, rule := range r.dnsRules {
|
|
monitor.Start("close dns rule[", i, "]")
|
|
err = E.Append(err, rule.Close(), func(err error) error {
|
|
return E.Cause(err, "close dns rule[", i, "]")
|
|
})
|
|
monitor.Finish()
|
|
}
|
|
for i, transport := range r.transports {
|
|
monitor.Start("close dns transport[", i, "]")
|
|
err = E.Append(err, transport.Close(), func(err error) error {
|
|
return E.Cause(err, "close dns transport[", i, "]")
|
|
})
|
|
monitor.Finish()
|
|
}
|
|
if r.geoIPReader != nil {
|
|
monitor.Start("close geoip reader")
|
|
err = E.Append(err, r.geoIPReader.Close(), func(err error) error {
|
|
return E.Cause(err, "close geoip reader")
|
|
})
|
|
monitor.Finish()
|
|
}
|
|
if r.interfaceMonitor != nil {
|
|
monitor.Start("close interface monitor")
|
|
err = E.Append(err, r.interfaceMonitor.Close(), func(err error) error {
|
|
return E.Cause(err, "close interface monitor")
|
|
})
|
|
monitor.Finish()
|
|
}
|
|
if r.networkMonitor != nil {
|
|
monitor.Start("close network monitor")
|
|
err = E.Append(err, r.networkMonitor.Close(), func(err error) error {
|
|
return E.Cause(err, "close network monitor")
|
|
})
|
|
monitor.Finish()
|
|
}
|
|
if r.packageManager != nil {
|
|
monitor.Start("close package manager")
|
|
err = E.Append(err, r.packageManager.Close(), func(err error) error {
|
|
return E.Cause(err, "close package manager")
|
|
})
|
|
monitor.Finish()
|
|
}
|
|
if r.powerListener != nil {
|
|
monitor.Start("close power listener")
|
|
err = E.Append(err, r.powerListener.Close(), func(err error) error {
|
|
return E.Cause(err, "close power listener")
|
|
})
|
|
monitor.Finish()
|
|
}
|
|
if r.timeService != nil {
|
|
monitor.Start("close time service")
|
|
err = E.Append(err, r.timeService.Close(), func(err error) error {
|
|
return E.Cause(err, "close time service")
|
|
})
|
|
monitor.Finish()
|
|
}
|
|
if r.fakeIPStore != nil {
|
|
monitor.Start("close fakeip store")
|
|
err = E.Append(err, r.fakeIPStore.Close(), func(err error) error {
|
|
return E.Cause(err, "close fakeip store")
|
|
})
|
|
monitor.Finish()
|
|
}
|
|
return err
|
|
}
|
|
|
|
func (r *Router) PostStart() error {
|
|
monitor := taskmonitor.New(r.logger, C.StopTimeout)
|
|
var cacheContext *adapter.HTTPStartContext
|
|
if len(r.ruleSets) > 0 {
|
|
monitor.Start("initialize rule-set")
|
|
cacheContext = adapter.NewHTTPStartContext()
|
|
var ruleSetStartGroup task.Group
|
|
for i, ruleSet := range r.ruleSets {
|
|
ruleSetInPlace := ruleSet
|
|
ruleSetStartGroup.Append0(func(ctx context.Context) error {
|
|
err := ruleSetInPlace.StartContext(ctx, cacheContext)
|
|
if err != nil {
|
|
return E.Cause(err, "initialize rule-set[", i, "]")
|
|
}
|
|
return nil
|
|
})
|
|
}
|
|
ruleSetStartGroup.Concurrency(5)
|
|
ruleSetStartGroup.FastFail()
|
|
err := ruleSetStartGroup.Run(r.ctx)
|
|
monitor.Finish()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
if cacheContext != nil {
|
|
cacheContext.Close()
|
|
}
|
|
needFindProcess := r.needFindProcess
|
|
needWIFIState := r.needWIFIState
|
|
for _, ruleSet := range r.ruleSets {
|
|
metadata := ruleSet.Metadata()
|
|
if metadata.ContainsProcessRule {
|
|
needFindProcess = true
|
|
}
|
|
if metadata.ContainsWIFIRule {
|
|
needWIFIState = true
|
|
}
|
|
}
|
|
if C.IsAndroid && r.platformInterface == nil && !r.needPackageManager {
|
|
if needFindProcess {
|
|
monitor.Start("start package manager")
|
|
err := r.packageManager.Start()
|
|
monitor.Finish()
|
|
if err != nil {
|
|
return E.Cause(err, "start package manager")
|
|
}
|
|
} else {
|
|
r.packageManager = nil
|
|
}
|
|
}
|
|
if needFindProcess {
|
|
if r.platformInterface != nil {
|
|
r.processSearcher = r.platformInterface
|
|
} else {
|
|
monitor.Start("initialize process searcher")
|
|
searcher, err := process.NewSearcher(process.Config{
|
|
Logger: r.logger,
|
|
PackageManager: r.packageManager,
|
|
})
|
|
monitor.Finish()
|
|
if err != nil {
|
|
if err != os.ErrInvalid {
|
|
r.logger.Warn(E.Cause(err, "create process searcher"))
|
|
}
|
|
} else {
|
|
r.processSearcher = searcher
|
|
}
|
|
}
|
|
}
|
|
if needWIFIState && r.platformInterface != nil {
|
|
monitor.Start("initialize WIFI state")
|
|
r.needWIFIState = true
|
|
r.interfaceMonitor.RegisterCallback(func(_ int) {
|
|
r.updateWIFIState()
|
|
})
|
|
r.updateWIFIState()
|
|
monitor.Finish()
|
|
}
|
|
for i, rule := range r.rules {
|
|
monitor.Start("initialize rule[", i, "]")
|
|
err := rule.Start()
|
|
monitor.Finish()
|
|
if err != nil {
|
|
return E.Cause(err, "initialize rule[", i, "]")
|
|
}
|
|
}
|
|
for _, ruleSet := range r.ruleSets {
|
|
monitor.Start("post start rule_set[", ruleSet.Name(), "]")
|
|
err := ruleSet.PostStart()
|
|
monitor.Finish()
|
|
if err != nil {
|
|
return E.Cause(err, "post start rule_set[", ruleSet.Name(), "]")
|
|
}
|
|
}
|
|
r.started = true
|
|
return nil
|
|
}
|
|
|
|
func (r *Router) Cleanup() error {
|
|
for _, ruleSet := range r.ruleSetMap {
|
|
ruleSet.Cleanup()
|
|
}
|
|
runtime.GC()
|
|
return nil
|
|
}
|
|
|
|
func (r *Router) Outbound(tag string) (adapter.Outbound, bool) {
|
|
outbound, loaded := r.outboundByTag[tag]
|
|
return outbound, loaded
|
|
}
|
|
|
|
func (r *Router) DefaultOutbound(network string) (adapter.Outbound, error) {
|
|
if network == N.NetworkTCP {
|
|
if r.defaultOutboundForConnection == nil {
|
|
return nil, E.New("missing default outbound for TCP connections")
|
|
}
|
|
return r.defaultOutboundForConnection, nil
|
|
} else {
|
|
if r.defaultOutboundForPacketConnection == nil {
|
|
return nil, E.New("missing default outbound for UDP connections")
|
|
}
|
|
return r.defaultOutboundForPacketConnection, nil
|
|
}
|
|
}
|
|
|
|
func (r *Router) FakeIPStore() adapter.FakeIPStore {
|
|
return r.fakeIPStore
|
|
}
|
|
|
|
func (r *Router) RuleSet(tag string) (adapter.RuleSet, bool) {
|
|
ruleSet, loaded := r.ruleSetMap[tag]
|
|
return ruleSet, loaded
|
|
}
|
|
|
|
func (r *Router) NeedWIFIState() bool {
|
|
return r.needWIFIState
|
|
}
|
|
|
|
func (r *Router) InterfaceFinder() control.InterfaceFinder {
|
|
return r.interfaceFinder
|
|
}
|
|
|
|
func (r *Router) UpdateInterfaces() error {
|
|
if r.platformInterface == nil || !r.platformInterface.UsePlatformInterfaceGetter() {
|
|
return r.interfaceFinder.Update()
|
|
} else {
|
|
interfaces, err := r.platformInterface.Interfaces()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
r.interfaceFinder.UpdateInterfaces(interfaces)
|
|
return nil
|
|
}
|
|
}
|
|
|
|
func (r *Router) AutoDetectInterface() bool {
|
|
return r.autoDetectInterface
|
|
}
|
|
|
|
func (r *Router) AutoDetectInterfaceFunc() control.Func {
|
|
if r.platformInterface != nil && r.platformInterface.UsePlatformAutoDetectInterfaceControl() {
|
|
return func(network, address string, conn syscall.RawConn) error {
|
|
return control.Raw(conn, func(fd uintptr) error {
|
|
return r.platformInterface.AutoDetectInterfaceControl(int(fd))
|
|
})
|
|
}
|
|
} else {
|
|
if r.interfaceMonitor == nil {
|
|
return nil
|
|
}
|
|
return control.BindToInterfaceFunc(r.InterfaceFinder(), func(network string, address string) (interfaceName string, interfaceIndex int, err error) {
|
|
remoteAddr := M.ParseSocksaddr(address).Addr
|
|
if C.IsLinux {
|
|
interfaceName, interfaceIndex = r.InterfaceMonitor().DefaultInterface(remoteAddr)
|
|
if interfaceIndex == -1 {
|
|
err = tun.ErrNoRoute
|
|
}
|
|
} else {
|
|
interfaceIndex = r.InterfaceMonitor().DefaultInterfaceIndex(remoteAddr)
|
|
if interfaceIndex == -1 {
|
|
err = tun.ErrNoRoute
|
|
}
|
|
}
|
|
return
|
|
})
|
|
}
|
|
}
|
|
|
|
func (r *Router) RegisterAutoRedirectOutputMark(mark uint32) error {
|
|
if r.autoRedirectOutputMark > 0 {
|
|
return E.New("only one auto-redirect can be configured")
|
|
}
|
|
r.autoRedirectOutputMark = mark
|
|
return nil
|
|
}
|
|
|
|
func (r *Router) AutoRedirectOutputMark() uint32 {
|
|
return r.autoRedirectOutputMark
|
|
}
|
|
|
|
func (r *Router) DefaultInterface() string {
|
|
return r.defaultInterface
|
|
}
|
|
|
|
func (r *Router) DefaultMark() uint32 {
|
|
return r.defaultMark
|
|
}
|
|
|
|
func (r *Router) Rules() []adapter.Rule {
|
|
return r.rules
|
|
}
|
|
|
|
func (r *Router) WIFIState() adapter.WIFIState {
|
|
return r.wifiState
|
|
}
|
|
|
|
func (r *Router) NetworkMonitor() tun.NetworkUpdateMonitor {
|
|
return r.networkMonitor
|
|
}
|
|
|
|
func (r *Router) InterfaceMonitor() tun.DefaultInterfaceMonitor {
|
|
return r.interfaceMonitor
|
|
}
|
|
|
|
func (r *Router) PackageManager() tun.PackageManager {
|
|
return r.packageManager
|
|
}
|
|
|
|
func (r *Router) ClashServer() adapter.ClashServer {
|
|
return r.clashServer
|
|
}
|
|
|
|
func (r *Router) SetClashServer(server adapter.ClashServer) {
|
|
r.clashServer = server
|
|
}
|
|
|
|
func (r *Router) V2RayServer() adapter.V2RayServer {
|
|
return r.v2rayServer
|
|
}
|
|
|
|
func (r *Router) SetV2RayServer(server adapter.V2RayServer) {
|
|
r.v2rayServer = server
|
|
}
|
|
|
|
func (r *Router) OnPackagesUpdated(packages int, sharedUsers int) {
|
|
r.logger.Info("updated packages list: ", packages, " packages, ", sharedUsers, " shared users")
|
|
}
|
|
|
|
func (r *Router) NewError(ctx context.Context, err error) {
|
|
common.Close(err)
|
|
if E.IsClosedOrCanceled(err) {
|
|
r.logger.DebugContext(ctx, "connection closed: ", err)
|
|
return
|
|
}
|
|
r.logger.ErrorContext(ctx, err)
|
|
}
|
|
|
|
func (r *Router) notifyNetworkUpdate(event int) {
|
|
if event == tun.EventNoRoute {
|
|
r.pauseManager.NetworkPause()
|
|
r.logger.Error("missing default interface")
|
|
} else {
|
|
r.pauseManager.NetworkWake()
|
|
if C.IsAndroid && r.platformInterface == nil {
|
|
var vpnStatus string
|
|
if r.interfaceMonitor.AndroidVPNEnabled() {
|
|
vpnStatus = "enabled"
|
|
} else {
|
|
vpnStatus = "disabled"
|
|
}
|
|
r.logger.Info("updated default interface ", r.interfaceMonitor.DefaultInterfaceName(netip.IPv4Unspecified()), ", index ", r.interfaceMonitor.DefaultInterfaceIndex(netip.IPv4Unspecified()), ", vpn ", vpnStatus)
|
|
} else {
|
|
r.logger.Info("updated default interface ", r.interfaceMonitor.DefaultInterfaceName(netip.IPv4Unspecified()), ", index ", r.interfaceMonitor.DefaultInterfaceIndex(netip.IPv4Unspecified()))
|
|
}
|
|
}
|
|
|
|
if !r.started {
|
|
return
|
|
}
|
|
|
|
_ = r.ResetNetwork()
|
|
}
|
|
|
|
func (r *Router) ResetNetwork() error {
|
|
conntrack.Close()
|
|
|
|
for _, outbound := range r.outbounds {
|
|
listener, isListener := outbound.(adapter.InterfaceUpdateListener)
|
|
if isListener {
|
|
listener.InterfaceUpdated()
|
|
}
|
|
}
|
|
|
|
for _, transport := range r.transports {
|
|
transport.Reset()
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (r *Router) updateWIFIState() {
|
|
if r.platformInterface == nil {
|
|
return
|
|
}
|
|
state := r.platformInterface.ReadWIFIState()
|
|
if state != r.wifiState {
|
|
r.wifiState = state
|
|
if state.SSID == "" && state.BSSID == "" {
|
|
r.logger.Info("updated WIFI state: disconnected")
|
|
} else {
|
|
r.logger.Info("updated WIFI state: SSID=", state.SSID, ", BSSID=", state.BSSID)
|
|
}
|
|
}
|
|
}
|
|
|
|
func (r *Router) notifyWindowsPowerEvent(event int) {
|
|
switch event {
|
|
case winpowrprof.EVENT_SUSPEND:
|
|
r.pauseManager.DevicePause()
|
|
_ = r.ResetNetwork()
|
|
case winpowrprof.EVENT_RESUME:
|
|
if !r.pauseManager.IsDevicePaused() {
|
|
return
|
|
}
|
|
fallthrough
|
|
case winpowrprof.EVENT_RESUME_AUTOMATIC:
|
|
r.pauseManager.DeviceWake()
|
|
_ = r.ResetNetwork()
|
|
}
|
|
}
|