Clash.Meta/tunnel/tunnel.go

226 lines
4.9 KiB
Go
Raw Normal View History

2018-06-10 22:50:03 +08:00
package tunnel
import (
2019-02-02 20:47:38 +08:00
"fmt"
2018-12-05 21:13:29 +08:00
"net"
2018-06-10 22:50:03 +08:00
"sync"
2018-06-16 21:34:13 +08:00
"time"
2018-06-10 22:50:03 +08:00
2018-09-30 12:25:52 +08:00
InboundAdapter "github.com/Dreamacro/clash/adapters/inbound"
2018-06-10 22:50:03 +08:00
C "github.com/Dreamacro/clash/constant"
2018-12-05 21:13:29 +08:00
"github.com/Dreamacro/clash/dns"
2018-11-21 13:47:46 +08:00
"github.com/Dreamacro/clash/log"
2018-06-10 22:50:03 +08:00
2019-02-02 20:47:38 +08:00
channels "gopkg.in/eapache/channels.v1"
2018-06-10 22:50:03 +08:00
)
var (
tunnel *Tunnel
once sync.Once
)
2019-04-23 23:29:36 +08:00
// Tunnel handle relay inbound proxy and outbound proxy
2018-06-10 22:50:03 +08:00
type Tunnel struct {
queue *channels.InfiniteChannel
rules []C.Rule
2018-07-18 21:50:16 +08:00
proxies map[string]C.Proxy
2018-06-15 00:49:52 +08:00
configLock *sync.RWMutex
2018-06-17 22:41:32 +08:00
traffic *C.Traffic
2018-12-05 21:13:29 +08:00
resolver *dns.Resolver
// Outbound Rule
2018-11-21 13:47:46 +08:00
mode Mode
2018-06-10 22:50:03 +08:00
}
// Add request to queue
2018-06-10 22:50:03 +08:00
func (t *Tunnel) Add(req C.ServerAdapter) {
t.queue.In() <- req
}
// Traffic return traffic of all connections
2018-06-18 11:31:49 +08:00
func (t *Tunnel) Traffic() *C.Traffic {
return t.traffic
}
2018-11-21 13:47:46 +08:00
// Rules return all rules
func (t *Tunnel) Rules() []C.Rule {
return t.rules
2018-06-18 11:31:49 +08:00
}
2018-11-21 13:47:46 +08:00
// UpdateRules handle update rules
func (t *Tunnel) UpdateRules(rules []C.Rule) {
t.configLock.Lock()
t.rules = rules
t.configLock.Unlock()
}
// Proxies return all proxies
func (t *Tunnel) Proxies() map[string]C.Proxy {
return t.proxies
}
// UpdateProxies handle update proxies
func (t *Tunnel) UpdateProxies(proxies map[string]C.Proxy) {
t.configLock.Lock()
t.proxies = proxies
t.configLock.Unlock()
}
// Mode return current mode
func (t *Tunnel) Mode() Mode {
return t.mode
}
// SetMode change the mode of tunnel
func (t *Tunnel) SetMode(mode Mode) {
t.mode = mode
2018-06-10 22:50:03 +08:00
}
2018-12-05 21:13:29 +08:00
// SetResolver change the resolver of tunnel
func (t *Tunnel) SetResolver(resolver *dns.Resolver) {
t.resolver = resolver
}
2019-02-02 20:47:38 +08:00
func (t *Tunnel) hasResolver() bool {
return t.resolver != nil
}
2018-06-10 22:50:03 +08:00
func (t *Tunnel) process() {
queue := t.queue.Out()
for {
elm := <-queue
conn := elm.(C.ServerAdapter)
go t.handleConn(conn)
}
}
2018-12-05 21:13:29 +08:00
func (t *Tunnel) resolveIP(host string) (net.IP, error) {
if t.resolver == nil {
ipAddr, err := net.ResolveIPAddr("ip", host)
if err != nil {
return nil, err
}
return ipAddr.IP, nil
}
return t.resolver.ResolveIP(host)
}
2019-02-11 17:20:42 +08:00
func (t *Tunnel) needLookupIP(metadata *C.Metadata) bool {
return t.hasResolver() && t.resolver.IsMapping() && metadata.Host == "" && metadata.IP != nil
2019-02-11 15:44:42 +08:00
}
2018-06-10 22:50:03 +08:00
func (t *Tunnel) handleConn(localConn C.ServerAdapter) {
defer localConn.Close()
2018-09-30 12:25:52 +08:00
metadata := localConn.Metadata()
if !metadata.Valid() {
log.Warnln("[Metadata] not valid: %#v", metadata)
return
}
2019-02-11 17:20:42 +08:00
if t.needLookupIP(metadata) {
2018-12-05 21:13:29 +08:00
host, exist := t.resolver.IPToHost(*metadata.IP)
if exist {
metadata.Host = host
metadata.AddrType = C.AtypDomainName
}
}
var proxy C.Proxy
switch t.mode {
2018-11-21 13:47:46 +08:00
case Direct:
2018-07-18 21:50:16 +08:00
proxy = t.proxies["DIRECT"]
2018-11-21 13:47:46 +08:00
case Global:
proxy = t.proxies["GLOBAL"]
// Rule
default:
2019-02-02 20:47:38 +08:00
var err error
proxy, err = t.match(metadata)
if err != nil {
return
}
}
2019-02-02 20:47:38 +08:00
2019-04-23 23:29:36 +08:00
if metadata.NetWork == C.UDP {
2019-04-24 10:29:29 +08:00
pc, addr, err := proxy.DialUDP(metadata)
defer pc.Close()
if err != nil {
log.Warnln("Proxy[%s] connect [%s --> %s] error: %s", proxy.Name(), metadata.SourceIP.String(), metadata.String(), err.Error())
}
2019-04-23 23:29:36 +08:00
t.handleUDPOverTCP(localConn, pc, addr)
return
}
2019-03-03 11:59:07 +08:00
remoConn, err := proxy.Dial(metadata)
2018-06-10 22:50:03 +08:00
if err != nil {
log.Warnln("Proxy[%s] connect [%s --> %s] error: %s", proxy.Name(), metadata.SourceIP.String(), metadata.String(), err.Error())
2018-06-10 22:50:03 +08:00
return
}
defer remoConn.Close()
switch adapter := localConn.(type) {
2018-09-30 12:25:52 +08:00
case *InboundAdapter.HTTPAdapter:
t.handleHTTP(adapter, remoConn)
2018-09-30 12:25:52 +08:00
case *InboundAdapter.SocketAdapter:
2019-04-23 23:29:36 +08:00
t.handleSocket(adapter, remoConn)
}
2018-06-10 22:50:03 +08:00
}
2019-02-02 20:47:38 +08:00
func (t *Tunnel) shouldResolveIP(rule C.Rule, metadata *C.Metadata) bool {
return (rule.RuleType() == C.GEOIP || rule.RuleType() == C.IPCIDR) && metadata.Host != "" && metadata.IP == nil
}
func (t *Tunnel) match(metadata *C.Metadata) (C.Proxy, error) {
2018-06-15 00:49:52 +08:00
t.configLock.RLock()
defer t.configLock.RUnlock()
2018-06-10 22:50:03 +08:00
for _, rule := range t.rules {
2019-02-02 20:47:38 +08:00
if t.shouldResolveIP(rule, metadata) {
ip, err := t.resolveIP(metadata.Host)
if err != nil {
return nil, fmt.Errorf("[DNS] resolve %s error: %s", metadata.Host, err.Error())
}
log.Debugln("[DNS] %s --> %s", metadata.Host, ip.String())
metadata.IP = &ip
}
2018-09-30 12:25:52 +08:00
if rule.IsMatch(metadata) {
2019-04-23 23:29:36 +08:00
adapter, ok := t.proxies[rule.Adapter()]
if !ok {
continue
2018-06-10 22:50:03 +08:00
}
2019-04-23 23:29:36 +08:00
if metadata.NetWork == C.UDP && !adapter.SupportUDP() {
continue
}
log.Infoln("%s --> %v match %s using %s", metadata.SourceIP.String(), metadata.String(), rule.RuleType().String(), rule.Adapter())
return adapter, nil
2018-06-10 22:50:03 +08:00
}
}
log.Infoln("%s --> %v doesn't match any rule using DIRECT", metadata.SourceIP.String(), metadata.String())
2019-02-02 20:47:38 +08:00
return t.proxies["DIRECT"], nil
2018-06-10 22:50:03 +08:00
}
func newTunnel() *Tunnel {
return &Tunnel{
2018-06-10 22:50:03 +08:00
queue: channels.NewInfiniteChannel(),
2018-07-18 21:50:16 +08:00
proxies: make(map[string]C.Proxy),
2018-06-15 00:49:52 +08:00
configLock: &sync.RWMutex{},
2018-06-17 22:41:32 +08:00
traffic: C.NewTraffic(time.Second),
2018-11-21 13:47:46 +08:00
mode: Rule,
2018-06-10 22:50:03 +08:00
}
}
// Instance return singleton instance of Tunnel
func Instance() *Tunnel {
2018-06-10 22:50:03 +08:00
once.Do(func() {
tunnel = newTunnel()
2018-11-21 13:47:46 +08:00
go tunnel.process()
2018-06-10 22:50:03 +08:00
})
return tunnel
}