2018-06-10 22:50:03 +08:00
|
|
|
package tunnel
|
|
|
|
|
|
|
|
import (
|
2019-02-02 20:47:38 +08:00
|
|
|
"fmt"
|
2018-12-05 21:13:29 +08:00
|
|
|
"net"
|
2018-06-10 22:50:03 +08:00
|
|
|
"sync"
|
2018-06-16 21:34:13 +08:00
|
|
|
"time"
|
2018-06-10 22:50:03 +08:00
|
|
|
|
2018-09-30 12:25:52 +08:00
|
|
|
InboundAdapter "github.com/Dreamacro/clash/adapters/inbound"
|
2018-06-10 22:50:03 +08:00
|
|
|
C "github.com/Dreamacro/clash/constant"
|
2018-12-05 21:13:29 +08:00
|
|
|
"github.com/Dreamacro/clash/dns"
|
2018-11-21 13:47:46 +08:00
|
|
|
"github.com/Dreamacro/clash/log"
|
2018-06-10 22:50:03 +08:00
|
|
|
|
2019-02-02 20:47:38 +08:00
|
|
|
channels "gopkg.in/eapache/channels.v1"
|
2018-06-10 22:50:03 +08:00
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
|
|
|
tunnel *Tunnel
|
|
|
|
once sync.Once
|
|
|
|
)
|
|
|
|
|
2019-04-23 23:29:36 +08:00
|
|
|
// Tunnel handle relay inbound proxy and outbound proxy
|
2018-06-10 22:50:03 +08:00
|
|
|
type Tunnel struct {
|
2019-04-24 12:02:52 +08:00
|
|
|
queue *channels.InfiniteChannel
|
|
|
|
rules []C.Rule
|
|
|
|
proxies map[string]C.Proxy
|
|
|
|
configMux *sync.RWMutex
|
|
|
|
traffic *C.Traffic
|
|
|
|
resolver *dns.Resolver
|
|
|
|
|
|
|
|
// experimental features
|
|
|
|
ignoreResolveFail bool
|
2018-07-26 00:04:59 +08:00
|
|
|
|
|
|
|
// Outbound Rule
|
2018-11-21 13:47:46 +08:00
|
|
|
mode Mode
|
2018-06-10 22:50:03 +08:00
|
|
|
}
|
|
|
|
|
2018-07-26 00:04:59 +08:00
|
|
|
// Add request to queue
|
2018-06-10 22:50:03 +08:00
|
|
|
func (t *Tunnel) Add(req C.ServerAdapter) {
|
|
|
|
t.queue.In() <- req
|
|
|
|
}
|
|
|
|
|
2018-07-26 00:04:59 +08:00
|
|
|
// Traffic return traffic of all connections
|
2018-06-18 11:31:49 +08:00
|
|
|
func (t *Tunnel) Traffic() *C.Traffic {
|
|
|
|
return t.traffic
|
|
|
|
}
|
|
|
|
|
2018-11-21 13:47:46 +08:00
|
|
|
// Rules return all rules
|
|
|
|
func (t *Tunnel) Rules() []C.Rule {
|
|
|
|
return t.rules
|
2018-06-18 11:31:49 +08:00
|
|
|
}
|
|
|
|
|
2018-11-21 13:47:46 +08:00
|
|
|
// UpdateRules handle update rules
|
|
|
|
func (t *Tunnel) UpdateRules(rules []C.Rule) {
|
2019-04-24 12:02:52 +08:00
|
|
|
t.configMux.Lock()
|
2018-11-21 13:47:46 +08:00
|
|
|
t.rules = rules
|
2019-04-24 12:02:52 +08:00
|
|
|
t.configMux.Unlock()
|
2018-11-21 13:47:46 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// Proxies return all proxies
|
|
|
|
func (t *Tunnel) Proxies() map[string]C.Proxy {
|
|
|
|
return t.proxies
|
|
|
|
}
|
|
|
|
|
|
|
|
// UpdateProxies handle update proxies
|
|
|
|
func (t *Tunnel) UpdateProxies(proxies map[string]C.Proxy) {
|
2019-04-24 12:02:52 +08:00
|
|
|
t.configMux.Lock()
|
2018-11-21 13:47:46 +08:00
|
|
|
t.proxies = proxies
|
2019-04-24 12:02:52 +08:00
|
|
|
t.configMux.Unlock()
|
|
|
|
}
|
|
|
|
|
|
|
|
// UpdateExperimental handle update experimental config
|
|
|
|
func (t *Tunnel) UpdateExperimental(ignoreResolveFail bool) {
|
|
|
|
t.configMux.Lock()
|
|
|
|
t.ignoreResolveFail = ignoreResolveFail
|
|
|
|
t.configMux.Unlock()
|
2018-11-21 13:47:46 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// Mode return current mode
|
|
|
|
func (t *Tunnel) Mode() Mode {
|
|
|
|
return t.mode
|
|
|
|
}
|
|
|
|
|
|
|
|
// SetMode change the mode of tunnel
|
|
|
|
func (t *Tunnel) SetMode(mode Mode) {
|
|
|
|
t.mode = mode
|
2018-06-10 22:50:03 +08:00
|
|
|
}
|
|
|
|
|
2018-12-05 21:13:29 +08:00
|
|
|
// SetResolver change the resolver of tunnel
|
|
|
|
func (t *Tunnel) SetResolver(resolver *dns.Resolver) {
|
|
|
|
t.resolver = resolver
|
|
|
|
}
|
|
|
|
|
2019-02-02 20:47:38 +08:00
|
|
|
func (t *Tunnel) hasResolver() bool {
|
|
|
|
return t.resolver != nil
|
|
|
|
}
|
|
|
|
|
2018-06-10 22:50:03 +08:00
|
|
|
func (t *Tunnel) process() {
|
|
|
|
queue := t.queue.Out()
|
|
|
|
for {
|
|
|
|
elm := <-queue
|
|
|
|
conn := elm.(C.ServerAdapter)
|
|
|
|
go t.handleConn(conn)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-12-05 21:13:29 +08:00
|
|
|
func (t *Tunnel) resolveIP(host string) (net.IP, error) {
|
|
|
|
if t.resolver == nil {
|
|
|
|
ipAddr, err := net.ResolveIPAddr("ip", host)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return ipAddr.IP, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return t.resolver.ResolveIP(host)
|
|
|
|
}
|
|
|
|
|
2019-02-11 17:20:42 +08:00
|
|
|
func (t *Tunnel) needLookupIP(metadata *C.Metadata) bool {
|
2019-05-09 21:00:29 +08:00
|
|
|
return t.hasResolver() && (t.resolver.IsMapping() || t.resolver.IsFakeIP()) && metadata.Host == "" && metadata.DstIP != nil
|
2019-02-11 15:44:42 +08:00
|
|
|
}
|
|
|
|
|
2018-06-10 22:50:03 +08:00
|
|
|
func (t *Tunnel) handleConn(localConn C.ServerAdapter) {
|
|
|
|
defer localConn.Close()
|
2018-09-30 12:25:52 +08:00
|
|
|
metadata := localConn.Metadata()
|
2018-07-12 23:28:38 +08:00
|
|
|
|
2019-02-18 20:14:18 +08:00
|
|
|
if !metadata.Valid() {
|
|
|
|
log.Warnln("[Metadata] not valid: %#v", metadata)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-05-03 00:05:14 +08:00
|
|
|
// preprocess enhanced-mode metadata
|
2019-02-11 17:20:42 +08:00
|
|
|
if t.needLookupIP(metadata) {
|
2019-05-09 21:00:29 +08:00
|
|
|
host, exist := t.resolver.IPToHost(*metadata.DstIP)
|
2018-12-05 21:13:29 +08:00
|
|
|
if exist {
|
|
|
|
metadata.Host = host
|
|
|
|
metadata.AddrType = C.AtypDomainName
|
2019-05-03 00:05:14 +08:00
|
|
|
if t.resolver.IsFakeIP() {
|
2019-05-09 21:00:29 +08:00
|
|
|
metadata.DstIP = nil
|
2019-05-03 00:05:14 +08:00
|
|
|
}
|
2018-12-05 21:13:29 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-07-12 23:28:38 +08:00
|
|
|
var proxy C.Proxy
|
|
|
|
switch t.mode {
|
2018-11-21 13:47:46 +08:00
|
|
|
case Direct:
|
2018-07-18 21:50:16 +08:00
|
|
|
proxy = t.proxies["DIRECT"]
|
2018-11-21 13:47:46 +08:00
|
|
|
case Global:
|
2018-08-04 23:04:16 +08:00
|
|
|
proxy = t.proxies["GLOBAL"]
|
2018-07-12 23:28:38 +08:00
|
|
|
// Rule
|
|
|
|
default:
|
2019-02-02 20:47:38 +08:00
|
|
|
var err error
|
|
|
|
proxy, err = t.match(metadata)
|
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
2018-07-12 23:28:38 +08:00
|
|
|
}
|
2019-02-02 20:47:38 +08:00
|
|
|
|
2019-04-23 23:29:36 +08:00
|
|
|
if metadata.NetWork == C.UDP {
|
2019-04-24 10:29:29 +08:00
|
|
|
pc, addr, err := proxy.DialUDP(metadata)
|
|
|
|
defer pc.Close()
|
|
|
|
if err != nil {
|
2019-05-09 21:00:29 +08:00
|
|
|
log.Warnln("Proxy[%s] connect [%s --> %s] error: %s", proxy.Name(), metadata.SrcIP.String(), metadata.String(), err.Error())
|
2019-04-24 10:29:29 +08:00
|
|
|
}
|
|
|
|
|
2019-04-23 23:29:36 +08:00
|
|
|
t.handleUDPOverTCP(localConn, pc, addr)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-03-03 11:59:07 +08:00
|
|
|
remoConn, err := proxy.Dial(metadata)
|
2018-06-10 22:50:03 +08:00
|
|
|
if err != nil {
|
2019-05-09 21:00:29 +08:00
|
|
|
log.Warnln("Proxy[%s] connect [%s --> %s] error: %s", proxy.Name(), metadata.SrcIP.String(), metadata.String(), err.Error())
|
2018-06-10 22:50:03 +08:00
|
|
|
return
|
|
|
|
}
|
|
|
|
defer remoConn.Close()
|
|
|
|
|
2018-07-26 00:04:59 +08:00
|
|
|
switch adapter := localConn.(type) {
|
2018-09-30 12:25:52 +08:00
|
|
|
case *InboundAdapter.HTTPAdapter:
|
2018-07-26 00:04:59 +08:00
|
|
|
t.handleHTTP(adapter, remoConn)
|
2018-09-30 12:25:52 +08:00
|
|
|
case *InboundAdapter.SocketAdapter:
|
2019-04-23 23:29:36 +08:00
|
|
|
t.handleSocket(adapter, remoConn)
|
2018-07-26 00:04:59 +08:00
|
|
|
}
|
2018-06-10 22:50:03 +08:00
|
|
|
}
|
|
|
|
|
2019-02-02 20:47:38 +08:00
|
|
|
func (t *Tunnel) shouldResolveIP(rule C.Rule, metadata *C.Metadata) bool {
|
2019-05-09 21:00:29 +08:00
|
|
|
return (rule.RuleType() == C.GEOIP || rule.RuleType() == C.IPCIDR) && metadata.Host != "" && metadata.DstIP == nil
|
2019-02-02 20:47:38 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
func (t *Tunnel) match(metadata *C.Metadata) (C.Proxy, error) {
|
2019-04-24 12:02:52 +08:00
|
|
|
t.configMux.RLock()
|
|
|
|
defer t.configMux.RUnlock()
|
2018-06-15 00:49:52 +08:00
|
|
|
|
2019-04-24 12:02:52 +08:00
|
|
|
var resolved bool
|
2018-06-10 22:50:03 +08:00
|
|
|
for _, rule := range t.rules {
|
2019-04-24 12:02:52 +08:00
|
|
|
if !resolved && t.shouldResolveIP(rule, metadata) {
|
2019-02-02 20:47:38 +08:00
|
|
|
ip, err := t.resolveIP(metadata.Host)
|
|
|
|
if err != nil {
|
2019-04-24 12:02:52 +08:00
|
|
|
if !t.ignoreResolveFail {
|
|
|
|
return nil, fmt.Errorf("[DNS] resolve %s error: %s", metadata.Host, err.Error())
|
|
|
|
}
|
|
|
|
log.Debugln("[DNS] resolve %s error: %s", metadata.Host, err.Error())
|
|
|
|
} else {
|
|
|
|
log.Debugln("[DNS] %s --> %s", metadata.Host, ip.String())
|
2019-05-09 21:00:29 +08:00
|
|
|
metadata.DstIP = &ip
|
2019-02-02 20:47:38 +08:00
|
|
|
}
|
2019-04-24 12:02:52 +08:00
|
|
|
resolved = true
|
2019-02-02 20:47:38 +08:00
|
|
|
}
|
|
|
|
|
2018-09-30 12:25:52 +08:00
|
|
|
if rule.IsMatch(metadata) {
|
2019-04-23 23:29:36 +08:00
|
|
|
adapter, ok := t.proxies[rule.Adapter()]
|
|
|
|
if !ok {
|
|
|
|
continue
|
2018-06-10 22:50:03 +08:00
|
|
|
}
|
2019-04-23 23:29:36 +08:00
|
|
|
|
|
|
|
if metadata.NetWork == C.UDP && !adapter.SupportUDP() {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2019-05-09 21:00:29 +08:00
|
|
|
log.Infoln("%s --> %v match %s using %s", metadata.SrcIP.String(), metadata.String(), rule.RuleType().String(), rule.Adapter())
|
2019-04-23 23:29:36 +08:00
|
|
|
return adapter, nil
|
2018-06-10 22:50:03 +08:00
|
|
|
}
|
|
|
|
}
|
2019-05-09 21:00:29 +08:00
|
|
|
log.Infoln("%s --> %v doesn't match any rule using DIRECT", metadata.SrcIP.String(), metadata.String())
|
2019-02-02 20:47:38 +08:00
|
|
|
return t.proxies["DIRECT"], nil
|
2018-06-10 22:50:03 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
func newTunnel() *Tunnel {
|
2018-07-26 00:04:59 +08:00
|
|
|
return &Tunnel{
|
2019-04-24 12:02:52 +08:00
|
|
|
queue: channels.NewInfiniteChannel(),
|
|
|
|
proxies: make(map[string]C.Proxy),
|
|
|
|
configMux: &sync.RWMutex{},
|
|
|
|
traffic: C.NewTraffic(time.Second),
|
|
|
|
mode: Rule,
|
2018-06-10 22:50:03 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-07-26 00:04:59 +08:00
|
|
|
// Instance return singleton instance of Tunnel
|
|
|
|
func Instance() *Tunnel {
|
2018-06-10 22:50:03 +08:00
|
|
|
once.Do(func() {
|
|
|
|
tunnel = newTunnel()
|
2018-11-21 13:47:46 +08:00
|
|
|
go tunnel.process()
|
2018-06-10 22:50:03 +08:00
|
|
|
})
|
|
|
|
return tunnel
|
|
|
|
}
|