mirror of
https://github.com/MetaCubeX/mihomo.git
synced 2024-11-16 11:42:43 +08:00
6c56a3b80e
when force is false, if domain in the list, will force replace when force is true, if sniff domain in the list, will skip it
940 lines
26 KiB
Go
940 lines
26 KiB
Go
package config
|
|
|
|
import (
|
|
"container/list"
|
|
"errors"
|
|
"fmt"
|
|
R "github.com/Dreamacro/clash/rule"
|
|
RP "github.com/Dreamacro/clash/rule/provider"
|
|
"net"
|
|
"net/netip"
|
|
"net/url"
|
|
"os"
|
|
"runtime"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/Dreamacro/clash/adapter"
|
|
"github.com/Dreamacro/clash/adapter/outbound"
|
|
"github.com/Dreamacro/clash/adapter/outboundgroup"
|
|
"github.com/Dreamacro/clash/adapter/provider"
|
|
"github.com/Dreamacro/clash/component/auth"
|
|
"github.com/Dreamacro/clash/component/dialer"
|
|
"github.com/Dreamacro/clash/component/fakeip"
|
|
"github.com/Dreamacro/clash/component/geodata"
|
|
"github.com/Dreamacro/clash/component/geodata/router"
|
|
"github.com/Dreamacro/clash/component/trie"
|
|
C "github.com/Dreamacro/clash/constant"
|
|
providerTypes "github.com/Dreamacro/clash/constant/provider"
|
|
"github.com/Dreamacro/clash/dns"
|
|
"github.com/Dreamacro/clash/listener/tun/ipstack/commons"
|
|
"github.com/Dreamacro/clash/log"
|
|
T "github.com/Dreamacro/clash/tunnel"
|
|
|
|
"gopkg.in/yaml.v2"
|
|
)
|
|
|
|
// General config
|
|
type General struct {
|
|
Inbound
|
|
Controller
|
|
Mode T.TunnelMode `json:"mode"`
|
|
UnifiedDelay bool
|
|
LogLevel log.LogLevel `json:"log-level"`
|
|
IPv6 bool `json:"ipv6"`
|
|
Interface string `json:"-"`
|
|
RoutingMark int `json:"-"`
|
|
GeodataMode bool `json:"geodata-mode"`
|
|
GeodataLoader string `json:"geodata-loader"`
|
|
}
|
|
|
|
// Inbound config
|
|
type Inbound struct {
|
|
Port int `json:"port"`
|
|
SocksPort int `json:"socks-port"`
|
|
RedirPort int `json:"redir-port"`
|
|
TProxyPort int `json:"tproxy-port"`
|
|
MixedPort int `json:"mixed-port"`
|
|
Authentication []string `json:"authentication"`
|
|
AllowLan bool `json:"allow-lan"`
|
|
BindAddress string `json:"bind-address"`
|
|
}
|
|
|
|
// Controller config
|
|
type Controller struct {
|
|
ExternalController string `json:"-"`
|
|
ExternalUI string `json:"-"`
|
|
Secret string `json:"-"`
|
|
}
|
|
|
|
// DNS config
|
|
type DNS struct {
|
|
Enable bool `yaml:"enable"`
|
|
IPv6 bool `yaml:"ipv6"`
|
|
NameServer []dns.NameServer `yaml:"nameserver"`
|
|
Fallback []dns.NameServer `yaml:"fallback"`
|
|
FallbackFilter FallbackFilter `yaml:"fallback-filter"`
|
|
Listen string `yaml:"listen"`
|
|
EnhancedMode C.DNSMode `yaml:"enhanced-mode"`
|
|
DefaultNameserver []dns.NameServer `yaml:"default-nameserver"`
|
|
FakeIPRange *fakeip.Pool
|
|
Hosts *trie.DomainTrie[netip.Addr]
|
|
NameServerPolicy map[string]dns.NameServer
|
|
ProxyServerNameserver []dns.NameServer
|
|
}
|
|
|
|
// FallbackFilter config
|
|
type FallbackFilter struct {
|
|
GeoIP bool `yaml:"geoip"`
|
|
GeoIPCode string `yaml:"geoip-code"`
|
|
IPCIDR []*net.IPNet `yaml:"ipcidr"`
|
|
Domain []string `yaml:"domain"`
|
|
GeoSite []*router.DomainMatcher `yaml:"geosite"`
|
|
}
|
|
|
|
var (
|
|
GroupsList = list.New()
|
|
ProxiesList = list.New()
|
|
ParsingProxiesCallback func(groupsList *list.List, proxiesList *list.List)
|
|
)
|
|
|
|
// Profile config
|
|
type Profile struct {
|
|
StoreSelected bool `yaml:"store-selected"`
|
|
StoreFakeIP bool `yaml:"store-fake-ip"`
|
|
}
|
|
|
|
// Tun config
|
|
type Tun struct {
|
|
Enable bool `yaml:"enable" json:"enable"`
|
|
Device string `yaml:"device" json:"device"`
|
|
Stack C.TUNStack `yaml:"stack" json:"stack"`
|
|
DNSHijack []netip.AddrPort `yaml:"dns-hijack" json:"dns-hijack"`
|
|
AutoRoute bool `yaml:"auto-route" json:"auto-route"`
|
|
}
|
|
|
|
// IPTables config
|
|
type IPTables struct {
|
|
Enable bool `yaml:"enable" json:"enable"`
|
|
InboundInterface string `yaml:"inbound-interface" json:"inbound-interface"`
|
|
Bypass []string `yaml:"bypass" json:"bypass"`
|
|
}
|
|
|
|
type Sniffer struct {
|
|
Enable bool
|
|
Force bool
|
|
Sniffers []C.SnifferType
|
|
Reverses trie.DomainTrie[struct{}]
|
|
}
|
|
|
|
// Experimental config
|
|
type Experimental struct{}
|
|
|
|
// Config is clash config manager
|
|
type Config struct {
|
|
General *General
|
|
Tun *Tun
|
|
IPTables *IPTables
|
|
DNS *DNS
|
|
Experimental *Experimental
|
|
Hosts *trie.DomainTrie[netip.Addr]
|
|
Profile *Profile
|
|
Rules []C.Rule
|
|
Users []auth.AuthUser
|
|
Proxies map[string]C.Proxy
|
|
Providers map[string]providerTypes.ProxyProvider
|
|
RuleProviders map[string]*providerTypes.RuleProvider
|
|
Sniffer *Sniffer
|
|
}
|
|
|
|
type RawDNS struct {
|
|
Enable bool `yaml:"enable"`
|
|
IPv6 bool `yaml:"ipv6"`
|
|
UseHosts bool `yaml:"use-hosts"`
|
|
NameServer []string `yaml:"nameserver"`
|
|
Fallback []string `yaml:"fallback"`
|
|
FallbackFilter RawFallbackFilter `yaml:"fallback-filter"`
|
|
Listen string `yaml:"listen"`
|
|
EnhancedMode C.DNSMode `yaml:"enhanced-mode"`
|
|
FakeIPRange string `yaml:"fake-ip-range"`
|
|
FakeIPFilter []string `yaml:"fake-ip-filter"`
|
|
DefaultNameserver []string `yaml:"default-nameserver"`
|
|
NameServerPolicy map[string]string `yaml:"nameserver-policy"`
|
|
ProxyServerNameserver []string `yaml:"proxy-server-nameserver"`
|
|
}
|
|
|
|
type RawFallbackFilter struct {
|
|
GeoIP bool `yaml:"geoip"`
|
|
GeoIPCode string `yaml:"geoip-code"`
|
|
IPCIDR []string `yaml:"ipcidr"`
|
|
Domain []string `yaml:"domain"`
|
|
GeoSite []string `yaml:"geosite"`
|
|
}
|
|
|
|
type RawTun struct {
|
|
Enable bool `yaml:"enable" json:"enable"`
|
|
Device string `yaml:"device" json:"device"`
|
|
Stack C.TUNStack `yaml:"stack" json:"stack"`
|
|
DNSHijack []string `yaml:"dns-hijack" json:"dns-hijack"`
|
|
AutoRoute bool `yaml:"auto-route" json:"auto-route"`
|
|
AutoDetectInterface bool `yaml:"auto-detect-interface"`
|
|
}
|
|
|
|
type RawConfig struct {
|
|
Port int `yaml:"port"`
|
|
SocksPort int `yaml:"socks-port"`
|
|
RedirPort int `yaml:"redir-port"`
|
|
TProxyPort int `yaml:"tproxy-port"`
|
|
MixedPort int `yaml:"mixed-port"`
|
|
Authentication []string `yaml:"authentication"`
|
|
AllowLan bool `yaml:"allow-lan"`
|
|
BindAddress string `yaml:"bind-address"`
|
|
Mode T.TunnelMode `yaml:"mode"`
|
|
UnifiedDelay bool `yaml:"unified-delay"`
|
|
LogLevel log.LogLevel `yaml:"log-level"`
|
|
IPv6 bool `yaml:"ipv6"`
|
|
ExternalController string `yaml:"external-controller"`
|
|
ExternalUI string `yaml:"external-ui"`
|
|
Secret string `yaml:"secret"`
|
|
Interface string `yaml:"interface-name"`
|
|
RoutingMark int `yaml:"routing-mark"`
|
|
GeodataMode bool `yaml:"geodata-mode"`
|
|
GeodataLoader string `yaml:"geodata-loader"`
|
|
|
|
Sniffer SnifferRaw `yaml:"sniffer"`
|
|
ProxyProvider map[string]map[string]any `yaml:"proxy-providers"`
|
|
RuleProvider map[string]map[string]any `yaml:"rule-providers"`
|
|
Hosts map[string]string `yaml:"hosts"`
|
|
DNS RawDNS `yaml:"dns"`
|
|
Tun RawTun `yaml:"tun"`
|
|
IPTables IPTables `yaml:"iptables"`
|
|
Experimental Experimental `yaml:"experimental"`
|
|
Profile Profile `yaml:"profile"`
|
|
Proxy []map[string]any `yaml:"proxies"`
|
|
ProxyGroup []map[string]any `yaml:"proxy-groups"`
|
|
Rule []string `yaml:"rules"`
|
|
}
|
|
|
|
type SnifferRaw struct {
|
|
Enable bool `yaml:"enable" json:"enable"`
|
|
Force bool `yaml:"force" json:"force"`
|
|
Sniffing []string `yaml:"sniffing" json:"sniffing"`
|
|
Reverse []string `yaml:"reverses" json:"reverses"`
|
|
}
|
|
|
|
// Parse config
|
|
func Parse(buf []byte) (*Config, error) {
|
|
rawCfg, err := UnmarshalRawConfig(buf)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return ParseRawConfig(rawCfg)
|
|
}
|
|
|
|
func UnmarshalRawConfig(buf []byte) (*RawConfig, error) {
|
|
// config with default value
|
|
rawCfg := &RawConfig{
|
|
AllowLan: false,
|
|
BindAddress: "*",
|
|
Mode: T.Rule,
|
|
GeodataMode: C.GeodataMode,
|
|
GeodataLoader: "memconservative",
|
|
UnifiedDelay: false,
|
|
Authentication: []string{},
|
|
LogLevel: log.INFO,
|
|
Hosts: map[string]string{},
|
|
Rule: []string{},
|
|
Proxy: []map[string]any{},
|
|
ProxyGroup: []map[string]any{},
|
|
Tun: RawTun{
|
|
Enable: false,
|
|
Device: "",
|
|
AutoDetectInterface: true,
|
|
Stack: C.TunGvisor,
|
|
DNSHijack: []string{"0.0.0.0:53"}, // default hijack all dns query
|
|
AutoRoute: true,
|
|
},
|
|
IPTables: IPTables{
|
|
Enable: false,
|
|
InboundInterface: "lo",
|
|
Bypass: []string{},
|
|
},
|
|
DNS: RawDNS{
|
|
Enable: false,
|
|
UseHosts: true,
|
|
EnhancedMode: C.DNSMapping,
|
|
FakeIPRange: "198.18.0.1/16",
|
|
FallbackFilter: RawFallbackFilter{
|
|
GeoIP: true,
|
|
GeoIPCode: "CN",
|
|
IPCIDR: []string{},
|
|
GeoSite: []string{},
|
|
},
|
|
DefaultNameserver: []string{
|
|
"114.114.114.114",
|
|
"223.5.5.5",
|
|
"8.8.8.8",
|
|
"1.0.0.1",
|
|
},
|
|
NameServer: []string{
|
|
"https://doh.pub/dns-query",
|
|
"tls://223.5.5.5:853",
|
|
},
|
|
FakeIPFilter: []string{
|
|
"dns.msftnsci.com",
|
|
"www.msftnsci.com",
|
|
"www.msftconnecttest.com",
|
|
},
|
|
},
|
|
Sniffer: SnifferRaw{
|
|
Enable: false,
|
|
Force: false,
|
|
Sniffing: []string{},
|
|
Reverse: []string{},
|
|
},
|
|
Profile: Profile{
|
|
StoreSelected: true,
|
|
},
|
|
}
|
|
|
|
if err := yaml.Unmarshal(buf, rawCfg); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return rawCfg, nil
|
|
}
|
|
|
|
func ParseRawConfig(rawCfg *RawConfig) (*Config, error) {
|
|
config := &Config{}
|
|
log.Infoln("Start initial configuration in progress") //Segment finished in xxm
|
|
startTime := time.Now()
|
|
config.Experimental = &rawCfg.Experimental
|
|
config.Profile = &rawCfg.Profile
|
|
config.IPTables = &rawCfg.IPTables
|
|
|
|
general, err := parseGeneral(rawCfg)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
config.General = general
|
|
|
|
tunCfg, err := parseTun(rawCfg.Tun, config.General)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
config.Tun = tunCfg
|
|
|
|
dialer.DefaultInterface.Store(config.General.Interface)
|
|
|
|
proxies, providers, err := parseProxies(rawCfg)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
config.Proxies = proxies
|
|
config.Providers = providers
|
|
|
|
rules, ruleProviders, err := parseRules(rawCfg, proxies)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
config.Rules = rules
|
|
config.RuleProviders = ruleProviders
|
|
|
|
hosts, err := parseHosts(rawCfg)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
config.Hosts = hosts
|
|
|
|
dnsCfg, err := parseDNS(rawCfg, hosts, rules)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
config.DNS = dnsCfg
|
|
|
|
config.Users = parseAuthentication(rawCfg.Authentication)
|
|
|
|
config.Sniffer, err = parseSniffer(rawCfg.Sniffer)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
elapsedTime := time.Since(startTime) / time.Millisecond // duration in ms
|
|
log.Infoln("Initial configuration complete, total time: %dms", elapsedTime) //Segment finished in xxm
|
|
return config, nil
|
|
}
|
|
|
|
func parseGeneral(cfg *RawConfig) (*General, error) {
|
|
externalUI := cfg.ExternalUI
|
|
geodata.SetLoader(cfg.GeodataLoader)
|
|
// checkout externalUI exist
|
|
if externalUI != "" {
|
|
externalUI = C.Path.Resolve(externalUI)
|
|
|
|
if _, err := os.Stat(externalUI); os.IsNotExist(err) {
|
|
return nil, fmt.Errorf("external-ui: %s not exist", externalUI)
|
|
}
|
|
}
|
|
|
|
return &General{
|
|
Inbound: Inbound{
|
|
Port: cfg.Port,
|
|
SocksPort: cfg.SocksPort,
|
|
RedirPort: cfg.RedirPort,
|
|
TProxyPort: cfg.TProxyPort,
|
|
MixedPort: cfg.MixedPort,
|
|
AllowLan: cfg.AllowLan,
|
|
BindAddress: cfg.BindAddress,
|
|
},
|
|
Controller: Controller{
|
|
ExternalController: cfg.ExternalController,
|
|
ExternalUI: cfg.ExternalUI,
|
|
Secret: cfg.Secret,
|
|
},
|
|
UnifiedDelay: cfg.UnifiedDelay,
|
|
Mode: cfg.Mode,
|
|
LogLevel: cfg.LogLevel,
|
|
IPv6: cfg.IPv6,
|
|
Interface: cfg.Interface,
|
|
RoutingMark: cfg.RoutingMark,
|
|
GeodataMode: cfg.GeodataMode,
|
|
GeodataLoader: cfg.GeodataLoader,
|
|
}, nil
|
|
}
|
|
|
|
func parseProxies(cfg *RawConfig) (proxies map[string]C.Proxy, providersMap map[string]providerTypes.ProxyProvider, err error) {
|
|
proxies = make(map[string]C.Proxy)
|
|
providersMap = make(map[string]providerTypes.ProxyProvider)
|
|
proxiesConfig := cfg.Proxy
|
|
groupsConfig := cfg.ProxyGroup
|
|
providersConfig := cfg.ProxyProvider
|
|
|
|
var proxyList []string
|
|
_proxiesList := list.New()
|
|
_groupsList := list.New()
|
|
|
|
proxies["DIRECT"] = adapter.NewProxy(outbound.NewDirect())
|
|
proxies["REJECT"] = adapter.NewProxy(outbound.NewReject())
|
|
proxies["COMPATIBLE"] = adapter.NewProxy(outbound.NewCompatible())
|
|
proxies["PASS"] = adapter.NewProxy(outbound.NewPass())
|
|
proxyList = append(proxyList, "DIRECT", "REJECT")
|
|
|
|
// parse proxy
|
|
for idx, mapping := range proxiesConfig {
|
|
proxy, err := adapter.ParseProxy(mapping)
|
|
if err != nil {
|
|
return nil, nil, fmt.Errorf("proxy %d: %w", idx, err)
|
|
}
|
|
|
|
if _, exist := proxies[proxy.Name()]; exist {
|
|
return nil, nil, fmt.Errorf("proxy %s is the duplicate name", proxy.Name())
|
|
}
|
|
proxies[proxy.Name()] = proxy
|
|
proxyList = append(proxyList, proxy.Name())
|
|
_proxiesList.PushBack(mapping)
|
|
}
|
|
|
|
// keep the original order of ProxyGroups in config file
|
|
for idx, mapping := range groupsConfig {
|
|
groupName, existName := mapping["name"].(string)
|
|
if !existName {
|
|
return nil, nil, fmt.Errorf("proxy group %d: missing name", idx)
|
|
}
|
|
proxyList = append(proxyList, groupName)
|
|
_groupsList.PushBack(mapping)
|
|
}
|
|
|
|
// check if any loop exists and sort the ProxyGroups
|
|
if err := proxyGroupsDagSort(groupsConfig); err != nil {
|
|
return nil, nil, err
|
|
}
|
|
|
|
// parse and initial providers
|
|
for name, mapping := range providersConfig {
|
|
if name == provider.ReservedName {
|
|
return nil, nil, fmt.Errorf("can not defined a provider called `%s`", provider.ReservedName)
|
|
}
|
|
|
|
pd, err := provider.ParseProxyProvider(name, mapping)
|
|
if err != nil {
|
|
return nil, nil, fmt.Errorf("parse proxy provider %s error: %w", name, err)
|
|
}
|
|
|
|
providersMap[name] = pd
|
|
}
|
|
|
|
// parse proxy group
|
|
for idx, mapping := range groupsConfig {
|
|
group, err := outboundgroup.ParseProxyGroup(mapping, proxies, providersMap)
|
|
if err != nil {
|
|
return nil, nil, fmt.Errorf("proxy group[%d]: %w", idx, err)
|
|
}
|
|
|
|
groupName := group.Name()
|
|
if _, exist := proxies[groupName]; exist {
|
|
return nil, nil, fmt.Errorf("proxy group %s: the duplicate name", groupName)
|
|
}
|
|
|
|
proxies[groupName] = adapter.NewProxy(group)
|
|
}
|
|
|
|
var ps []C.Proxy
|
|
for _, v := range proxyList {
|
|
if proxies[v].Type() == C.Pass {
|
|
continue
|
|
}
|
|
ps = append(ps, proxies[v])
|
|
}
|
|
hc := provider.NewHealthCheck(ps, "", 0, true)
|
|
pd, _ := provider.NewCompatibleProvider(provider.ReservedName, ps, hc)
|
|
providersMap[provider.ReservedName] = pd
|
|
|
|
global := outboundgroup.NewSelector(
|
|
&outboundgroup.GroupCommonOption{
|
|
Name: "GLOBAL",
|
|
},
|
|
[]providerTypes.ProxyProvider{pd},
|
|
)
|
|
proxies["GLOBAL"] = adapter.NewProxy(global)
|
|
ProxiesList = _proxiesList
|
|
GroupsList = _groupsList
|
|
if ParsingProxiesCallback != nil {
|
|
// refresh tray menu
|
|
go ParsingProxiesCallback(GroupsList, ProxiesList)
|
|
}
|
|
return proxies, providersMap, nil
|
|
}
|
|
|
|
func parseRules(cfg *RawConfig, proxies map[string]C.Proxy) ([]C.Rule, map[string]*providerTypes.RuleProvider, error) {
|
|
ruleProviders := map[string]*providerTypes.RuleProvider{}
|
|
log.Infoln("Geodata Loader mode: %s", geodata.LoaderName())
|
|
// parse rule provider
|
|
for name, mapping := range cfg.RuleProvider {
|
|
rp, err := RP.ParseRuleProvider(name, mapping)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
|
|
ruleProviders[name] = &rp
|
|
RP.SetRuleProvider(rp)
|
|
}
|
|
|
|
var rules []C.Rule
|
|
rulesConfig := cfg.Rule
|
|
mode := cfg.Mode
|
|
|
|
// parse rules
|
|
for idx, line := range rulesConfig {
|
|
rule := trimArr(strings.Split(line, ","))
|
|
var (
|
|
payload string
|
|
target string
|
|
params []string
|
|
ruleName = strings.ToUpper(rule[0])
|
|
)
|
|
|
|
if mode == T.Script && ruleName != "GEOSITE" {
|
|
continue
|
|
}
|
|
|
|
l := len(rule)
|
|
|
|
if ruleName == "NOT" || ruleName == "OR" || ruleName == "AND" {
|
|
target = rule[l-1]
|
|
payload = strings.Join(rule[1:l-1], ",")
|
|
} else {
|
|
if l < 2 {
|
|
return nil, nil, fmt.Errorf("rules[%d] [%s] error: format invalid", idx, line)
|
|
}
|
|
if l < 4 {
|
|
rule = append(rule, make([]string, 4-l)...)
|
|
}
|
|
if ruleName == "MATCH" {
|
|
l = 2
|
|
}
|
|
if l >= 3 {
|
|
l = 3
|
|
payload = rule[1]
|
|
}
|
|
target = rule[l-1]
|
|
params = rule[l:]
|
|
}
|
|
|
|
if _, ok := proxies[target]; !ok {
|
|
return nil, nil, fmt.Errorf("rules[%d] [%s] error: proxy [%s] not found", idx, line, target)
|
|
}
|
|
|
|
params = trimArr(params)
|
|
|
|
if ruleName == "GEOSITE" {
|
|
if err := initGeoSite(); err != nil {
|
|
return nil, nil, fmt.Errorf("can't initial GeoSite: %s", err)
|
|
}
|
|
initMode = false
|
|
}
|
|
parsed, parseErr := R.ParseRule(ruleName, payload, target, params)
|
|
if parseErr != nil {
|
|
return nil, nil, fmt.Errorf("rules[%d] [%s] error: %s", idx, line, parseErr.Error())
|
|
}
|
|
|
|
rules = append(rules, parsed)
|
|
}
|
|
|
|
runtime.GC()
|
|
|
|
return rules, ruleProviders, nil
|
|
}
|
|
|
|
func parseHosts(cfg *RawConfig) (*trie.DomainTrie[netip.Addr], error) {
|
|
tree := trie.New[netip.Addr]()
|
|
|
|
// add default hosts
|
|
if err := tree.Insert("localhost", netip.AddrFrom4([4]byte{127, 0, 0, 1})); err != nil {
|
|
log.Errorln("insert localhost to host error: %s", err.Error())
|
|
}
|
|
|
|
if len(cfg.Hosts) != 0 {
|
|
for domain, ipStr := range cfg.Hosts {
|
|
ip, err := netip.ParseAddr(ipStr)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("%s is not a valid IP", ipStr)
|
|
}
|
|
_ = tree.Insert(domain, ip)
|
|
}
|
|
}
|
|
|
|
return tree, nil
|
|
}
|
|
|
|
func hostWithDefaultPort(host string, defPort string) (string, error) {
|
|
if !strings.Contains(host, ":") {
|
|
host += ":"
|
|
}
|
|
|
|
hostname, port, err := net.SplitHostPort(host)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
if port == "" {
|
|
port = defPort
|
|
}
|
|
|
|
return net.JoinHostPort(hostname, port), nil
|
|
}
|
|
|
|
func parseNameServer(servers []string) ([]dns.NameServer, error) {
|
|
var nameservers []dns.NameServer
|
|
|
|
for idx, server := range servers {
|
|
// parse without scheme .e.g 8.8.8.8:53
|
|
if !strings.Contains(server, "://") {
|
|
server = "udp://" + server
|
|
}
|
|
u, err := url.Parse(server)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("DNS NameServer[%d] format error: %s", idx, err.Error())
|
|
}
|
|
|
|
var addr, dnsNetType string
|
|
switch u.Scheme {
|
|
case "udp":
|
|
addr, err = hostWithDefaultPort(u.Host, "53")
|
|
dnsNetType = "" // UDP
|
|
case "tcp":
|
|
addr, err = hostWithDefaultPort(u.Host, "53")
|
|
dnsNetType = "tcp" // TCP
|
|
case "tls":
|
|
addr, err = hostWithDefaultPort(u.Host, "853")
|
|
dnsNetType = "tcp-tls" // DNS over TLS
|
|
case "https":
|
|
clearURL := url.URL{Scheme: "https", Host: u.Host, Path: u.Path}
|
|
addr = clearURL.String()
|
|
dnsNetType = "https" // DNS over HTTPS
|
|
case "dhcp":
|
|
addr = u.Host
|
|
dnsNetType = "dhcp" // UDP from DHCP
|
|
case "quic":
|
|
addr, err = hostWithDefaultPort(u.Host, "784")
|
|
dnsNetType = "quic" // DNS over QUIC
|
|
default:
|
|
return nil, fmt.Errorf("DNS NameServer[%d] unsupport scheme: %s", idx, u.Scheme)
|
|
}
|
|
|
|
if err != nil {
|
|
return nil, fmt.Errorf("DNS NameServer[%d] format error: %s", idx, err.Error())
|
|
}
|
|
|
|
nameservers = append(
|
|
nameservers,
|
|
dns.NameServer{
|
|
Net: dnsNetType,
|
|
Addr: addr,
|
|
ProxyAdapter: u.Fragment,
|
|
Interface: dialer.DefaultInterface.Load(),
|
|
},
|
|
)
|
|
}
|
|
return nameservers, nil
|
|
}
|
|
|
|
func parseNameServerPolicy(nsPolicy map[string]string) (map[string]dns.NameServer, error) {
|
|
policy := map[string]dns.NameServer{}
|
|
|
|
for domain, server := range nsPolicy {
|
|
nameservers, err := parseNameServer([]string{server})
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if _, valid := trie.ValidAndSplitDomain(domain); !valid {
|
|
return nil, fmt.Errorf("DNS ResoverRule invalid domain: %s", domain)
|
|
}
|
|
policy[domain] = nameservers[0]
|
|
}
|
|
|
|
return policy, nil
|
|
}
|
|
|
|
func parseFallbackIPCIDR(ips []string) ([]*net.IPNet, error) {
|
|
var ipNets []*net.IPNet
|
|
|
|
for idx, ip := range ips {
|
|
_, ipnet, err := net.ParseCIDR(ip)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("DNS FallbackIP[%d] format error: %s", idx, err.Error())
|
|
}
|
|
ipNets = append(ipNets, ipnet)
|
|
}
|
|
|
|
return ipNets, nil
|
|
}
|
|
|
|
func parseFallbackGeoSite(countries []string, rules []C.Rule) ([]*router.DomainMatcher, error) {
|
|
var sites []*router.DomainMatcher
|
|
if len(countries) > 0 {
|
|
if err := initGeoSite(); err != nil {
|
|
return nil, fmt.Errorf("can't initial GeoSite: %s", err)
|
|
}
|
|
}
|
|
|
|
for _, country := range countries {
|
|
found := false
|
|
for _, rule := range rules {
|
|
if rule.RuleType() == C.GEOSITE {
|
|
if strings.EqualFold(country, rule.Payload()) {
|
|
found = true
|
|
sites = append(sites, rule.(C.RuleGeoSite).GetDomainMatcher())
|
|
log.Infoln("Start initial GeoSite dns fallback filter from rule `%s`", country)
|
|
}
|
|
}
|
|
}
|
|
|
|
if !found {
|
|
matcher, recordsCount, err := geodata.LoadGeoSiteMatcher(country)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
sites = append(sites, matcher)
|
|
|
|
log.Infoln("Start initial GeoSite dns fallback filter `%s`, records: %d", country, recordsCount)
|
|
}
|
|
}
|
|
runtime.GC()
|
|
return sites, nil
|
|
}
|
|
|
|
func parseDNS(rawCfg *RawConfig, hosts *trie.DomainTrie[netip.Addr], rules []C.Rule) (*DNS, error) {
|
|
cfg := rawCfg.DNS
|
|
if cfg.Enable && len(cfg.NameServer) == 0 {
|
|
return nil, fmt.Errorf("if DNS configuration is turned on, NameServer cannot be empty")
|
|
}
|
|
|
|
dnsCfg := &DNS{
|
|
Enable: cfg.Enable,
|
|
Listen: cfg.Listen,
|
|
IPv6: cfg.IPv6,
|
|
EnhancedMode: cfg.EnhancedMode,
|
|
FallbackFilter: FallbackFilter{
|
|
IPCIDR: []*net.IPNet{},
|
|
GeoSite: []*router.DomainMatcher{},
|
|
},
|
|
}
|
|
var err error
|
|
if dnsCfg.NameServer, err = parseNameServer(cfg.NameServer); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if dnsCfg.Fallback, err = parseNameServer(cfg.Fallback); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if dnsCfg.NameServerPolicy, err = parseNameServerPolicy(cfg.NameServerPolicy); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if dnsCfg.ProxyServerNameserver, err = parseNameServer(cfg.ProxyServerNameserver); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if len(cfg.DefaultNameserver) == 0 {
|
|
return nil, errors.New("default nameserver should have at least one nameserver")
|
|
}
|
|
if dnsCfg.DefaultNameserver, err = parseNameServer(cfg.DefaultNameserver); err != nil {
|
|
return nil, err
|
|
}
|
|
// check default nameserver is pure ip addr
|
|
for _, ns := range dnsCfg.DefaultNameserver {
|
|
host, _, err := net.SplitHostPort(ns.Addr)
|
|
if err != nil || net.ParseIP(host) == nil {
|
|
u, err := url.Parse(ns.Addr)
|
|
if err != nil || net.ParseIP(u.Host) == nil {
|
|
return nil, errors.New("default nameserver should be pure IP")
|
|
}
|
|
}
|
|
}
|
|
|
|
if cfg.EnhancedMode == C.DNSFakeIP {
|
|
ipnet, err := netip.ParsePrefix(cfg.FakeIPRange)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
var host *trie.DomainTrie[bool]
|
|
// fake ip skip host filter
|
|
if len(cfg.FakeIPFilter) != 0 {
|
|
host = trie.New[bool]()
|
|
for _, domain := range cfg.FakeIPFilter {
|
|
_ = host.Insert(domain, true)
|
|
}
|
|
}
|
|
|
|
if len(dnsCfg.Fallback) != 0 {
|
|
if host == nil {
|
|
host = trie.New[bool]()
|
|
}
|
|
for _, fb := range dnsCfg.Fallback {
|
|
if net.ParseIP(fb.Addr) != nil {
|
|
continue
|
|
}
|
|
_ = host.Insert(fb.Addr, true)
|
|
}
|
|
}
|
|
|
|
pool, err := fakeip.New(fakeip.Options{
|
|
IPNet: &ipnet,
|
|
Size: 1000,
|
|
Host: host,
|
|
Persistence: rawCfg.Profile.StoreFakeIP,
|
|
})
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
dnsCfg.FakeIPRange = pool
|
|
}
|
|
|
|
if len(cfg.Fallback) != 0 {
|
|
dnsCfg.FallbackFilter.GeoIP = cfg.FallbackFilter.GeoIP
|
|
dnsCfg.FallbackFilter.GeoIPCode = cfg.FallbackFilter.GeoIPCode
|
|
if fallbackip, err := parseFallbackIPCIDR(cfg.FallbackFilter.IPCIDR); err == nil {
|
|
dnsCfg.FallbackFilter.IPCIDR = fallbackip
|
|
}
|
|
dnsCfg.FallbackFilter.Domain = cfg.FallbackFilter.Domain
|
|
fallbackGeoSite, err := parseFallbackGeoSite(cfg.FallbackFilter.GeoSite, rules)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("load GeoSite dns fallback filter error, %w", err)
|
|
}
|
|
dnsCfg.FallbackFilter.GeoSite = fallbackGeoSite
|
|
}
|
|
|
|
if cfg.UseHosts {
|
|
dnsCfg.Hosts = hosts
|
|
}
|
|
|
|
return dnsCfg, nil
|
|
}
|
|
|
|
func parseAuthentication(rawRecords []string) []auth.AuthUser {
|
|
var users []auth.AuthUser
|
|
for _, line := range rawRecords {
|
|
if user, pass, found := strings.Cut(line, ":"); found {
|
|
users = append(users, auth.AuthUser{User: user, Pass: pass})
|
|
}
|
|
}
|
|
return users
|
|
}
|
|
|
|
func parseTun(rawTun RawTun, general *General) (*Tun, error) {
|
|
if rawTun.Enable && rawTun.AutoDetectInterface {
|
|
autoDetectInterfaceName, err := commons.GetAutoDetectInterface()
|
|
if err != nil || autoDetectInterfaceName == "" {
|
|
log.Warnln("Can not find auto detect interface.[%s]", err)
|
|
} else {
|
|
log.Warnln("Auto detect interface: %s", autoDetectInterfaceName)
|
|
}
|
|
|
|
general.Interface = autoDetectInterfaceName
|
|
}
|
|
|
|
var dnsHijack []netip.AddrPort
|
|
|
|
for _, d := range rawTun.DNSHijack {
|
|
if _, after, ok := strings.Cut(d, "://"); ok {
|
|
d = after
|
|
}
|
|
|
|
addrPort, err := netip.ParseAddrPort(d)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("parse dns-hijack url error: %w", err)
|
|
}
|
|
|
|
dnsHijack = append(dnsHijack, addrPort)
|
|
}
|
|
|
|
return &Tun{
|
|
Enable: rawTun.Enable,
|
|
Device: rawTun.Device,
|
|
Stack: rawTun.Stack,
|
|
DNSHijack: dnsHijack,
|
|
AutoRoute: rawTun.AutoRoute,
|
|
}, nil
|
|
}
|
|
|
|
func parseSniffer(snifferRaw SnifferRaw) (*Sniffer, error) {
|
|
sniffer := &Sniffer{
|
|
Enable: snifferRaw.Enable,
|
|
Force: snifferRaw.Force,
|
|
}
|
|
|
|
loadSniffer := make(map[C.SnifferType]struct{})
|
|
|
|
for _, snifferName := range snifferRaw.Sniffing {
|
|
find := false
|
|
for _, snifferType := range C.SnifferList {
|
|
if snifferType.String() == strings.ToUpper(snifferName) {
|
|
find = true
|
|
loadSniffer[snifferType] = struct{}{}
|
|
}
|
|
}
|
|
|
|
if !find {
|
|
return nil, fmt.Errorf("not find the sniffer[%s]", snifferName)
|
|
}
|
|
}
|
|
|
|
for st := range loadSniffer {
|
|
sniffer.Sniffers = append(sniffer.Sniffers, st)
|
|
}
|
|
|
|
for _, domain := range snifferRaw.Reverse {
|
|
err := sniffer.Reverses.Insert(domain, struct{}{})
|
|
if err != nil {
|
|
return nil, fmt.Errorf("error domian[%s], error:%v", domain, err)
|
|
}
|
|
}
|
|
|
|
return sniffer, nil
|
|
}
|