mihomo/constant/metadata.go

296 lines
6.1 KiB
Go
Raw Permalink Normal View History

2018-06-10 22:50:03 +08:00
package constant
2018-06-11 18:36:39 +08:00
import (
"encoding/json"
"fmt"
2018-06-11 18:36:39 +08:00
"net"
2022-04-20 01:52:51 +08:00
"net/netip"
2020-01-31 14:43:54 +08:00
"strconv"
2022-11-11 09:19:28 +08:00
2023-11-03 21:01:45 +08:00
"github.com/metacubex/mihomo/transport/socks5"
2018-06-11 18:36:39 +08:00
)
2018-06-10 22:50:03 +08:00
// Socks addr type
const (
TCP NetWork = iota
2018-06-14 01:00:58 +08:00
UDP
2021-11-17 16:03:47 +08:00
ALLNet
InvalidNet = 0xff
)
const (
2019-05-09 21:00:29 +08:00
HTTP Type = iota
HTTPS
SOCKS4
SOCKS5
SHADOWSOCKS
VMESS
2018-12-05 21:13:29 +08:00
REDIR
TPROXY
2022-11-18 22:57:33 +08:00
TUNNEL
2021-11-17 16:03:47 +08:00
TUN
2022-11-28 17:09:25 +08:00
TUIC
2023-09-21 14:52:26 +08:00
HYSTERIA2
INNER
2018-06-10 22:50:03 +08:00
)
2018-06-14 01:00:58 +08:00
type NetWork int
2020-06-07 16:54:41 +08:00
func (n NetWork) String() string {
switch n {
case TCP:
2018-06-14 01:00:58 +08:00
return "tcp"
case UDP:
2021-11-17 16:03:47 +08:00
return "udp"
case ALLNet:
return "all"
default:
return "invalid"
2018-06-14 01:00:58 +08:00
}
}
func (n NetWork) MarshalJSON() ([]byte, error) {
return json.Marshal(n.String())
}
2019-05-09 21:00:29 +08:00
type Type int
func (t Type) String() string {
switch t {
case HTTP:
return "HTTP"
case HTTPS:
return "HTTPS"
case SOCKS4:
return "Socks4"
case SOCKS5:
return "Socks5"
case SHADOWSOCKS:
return "ShadowSocks"
case VMESS:
return "Vmess"
case REDIR:
return "Redir"
case TPROXY:
return "TProxy"
case TUNNEL:
return "Tunnel"
2021-11-17 16:03:47 +08:00
case TUN:
return "Tun"
2022-11-28 17:09:25 +08:00
case TUIC:
return "Tuic"
2023-09-21 14:52:26 +08:00
case HYSTERIA2:
return "Hysteria2"
case INNER:
return "Inner"
default:
return "Unknown"
}
}
func ParseType(t string) (*Type, error) {
var res Type
switch t {
case "HTTP":
res = HTTP
case "HTTPS":
res = HTTPS
case "SOCKS4":
res = SOCKS4
case "SOCKS5":
res = SOCKS5
2022-11-28 17:09:25 +08:00
case "SHADOWSOCKS":
res = SHADOWSOCKS
case "VMESS":
res = VMESS
case "REDIR":
res = REDIR
case "TPROXY":
res = TPROXY
case "TUNNEL":
res = TUNNEL
case "TUN":
res = TUN
2022-11-28 17:09:25 +08:00
case "TUIC":
res = TUIC
2023-09-21 14:52:26 +08:00
case "HYSTERIA2":
res = HYSTERIA2
case "INNER":
res = INNER
default:
return nil, fmt.Errorf("unknown type: %s", t)
}
return &res, nil
}
func (t Type) MarshalJSON() ([]byte, error) {
return json.Marshal(t.String())
}
2018-09-30 12:25:52 +08:00
// Metadata is used to store connection address
type Metadata struct {
2022-12-04 22:08:20 +08:00
NetWork NetWork `json:"network"`
Type Type `json:"type"`
SrcIP netip.Addr `json:"sourceIP"`
DstIP netip.Addr `json:"destinationIP"`
SrcPort uint16 `json:"sourcePort,string"` // `,string` is used to compatible with old version json output
DstPort uint16 `json:"destinationPort,string"` // `,string` is used to compatible with old version json output
2022-12-04 22:08:20 +08:00
InIP netip.Addr `json:"inboundIP"`
InPort uint16 `json:"inboundPort,string"` // `,string` is used to compatible with old version json output
2022-12-06 08:23:30 +08:00
InName string `json:"inboundName"`
InUser string `json:"inboundUser"`
2022-12-04 22:08:20 +08:00
Host string `json:"host"`
DNSMode DNSMode `json:"dnsMode"`
2023-01-14 02:23:30 +08:00
Uid uint32 `json:"uid"`
2022-12-04 22:08:20 +08:00
Process string `json:"process"`
ProcessPath string `json:"processPath"`
SpecialProxy string `json:"specialProxy"`
SpecialRules string `json:"specialRules"`
2022-12-06 08:23:30 +08:00
RemoteDst string `json:"remoteDestination"`
RawSrcAddr net.Addr `json:"-"`
RawDstAddr net.Addr `json:"-"`
// Only domain rule
SniffHost string `json:"sniffHost"`
2018-06-10 22:50:03 +08:00
}
2018-06-11 18:36:39 +08:00
2019-10-11 20:11:18 +08:00
func (m *Metadata) RemoteAddress() string {
return net.JoinHostPort(m.String(), strconv.FormatUint(uint64(m.DstPort), 10))
2019-10-11 20:11:18 +08:00
}
2020-01-31 14:58:54 +08:00
func (m *Metadata) SourceAddress() string {
return net.JoinHostPort(m.SrcIP.String(), strconv.FormatUint(uint64(m.SrcPort), 10))
2020-01-31 14:58:54 +08:00
}
func (m *Metadata) SourceDetail() string {
2022-04-21 18:56:33 +08:00
if m.Type == INNER {
2023-11-03 21:01:45 +08:00
return fmt.Sprintf("%s", MihomoName)
2022-04-21 18:56:33 +08:00
}
2023-01-14 02:23:30 +08:00
switch {
case m.Process != "" && m.Uid != 0:
return fmt.Sprintf("%s(%s, uid=%d)", m.SourceAddress(), m.Process, m.Uid)
case m.Uid != 0:
return fmt.Sprintf("%s(uid=%d)", m.SourceAddress(), m.Uid)
case m.Process != "":
return fmt.Sprintf("%s(%s)", m.SourceAddress(), m.Process)
2023-01-14 02:23:30 +08:00
default:
return fmt.Sprintf("%s", m.SourceAddress())
}
}
func (m *Metadata) SourceValid() bool {
return m.SrcPort != 0 && m.SrcIP.IsValid()
}
2022-11-11 09:19:28 +08:00
func (m *Metadata) AddrType() int {
switch true {
2023-02-18 17:18:58 +08:00
case m.Host != "" || !m.DstIP.IsValid():
2022-11-11 09:19:28 +08:00
return socks5.AtypDomainName
case m.DstIP.Is4():
return socks5.AtypIPv4
default:
return socks5.AtypIPv6
}
}
func (m *Metadata) Resolved() bool {
2022-04-20 01:52:51 +08:00
return m.DstIP.IsValid()
}
func (m *Metadata) RuleHost() string {
if len(m.SniffHost) == 0 {
return m.Host
} else {
return m.SniffHost
}
}
// Pure is used to solve unexpected behavior
// when dialing proxy connection in DNSMapping mode.
func (m *Metadata) Pure() *Metadata {
if (m.DNSMode == DNSMapping || m.DNSMode == DNSHosts) && m.DstIP.IsValid() {
2022-04-20 01:52:51 +08:00
copyM := *m
copyM.Host = ""
return &copyM
}
return m
}
func (m *Metadata) AddrPort() netip.AddrPort {
return netip.AddrPortFrom(m.DstIP.Unmap(), m.DstPort)
}
2020-01-31 14:43:54 +08:00
func (m *Metadata) UDPAddr() *net.UDPAddr {
2022-04-20 01:52:51 +08:00
if m.NetWork != UDP || !m.DstIP.IsValid() {
2020-01-31 14:43:54 +08:00
return nil
}
return net.UDPAddrFromAddrPort(m.AddrPort())
2020-01-31 14:43:54 +08:00
}
2019-02-02 20:47:38 +08:00
func (m *Metadata) String() string {
2019-10-11 20:11:18 +08:00
if m.Host != "" {
return m.Host
2022-04-20 01:52:51 +08:00
} else if m.DstIP.IsValid() {
2019-05-09 21:00:29 +08:00
return m.DstIP.String()
2019-10-11 20:11:18 +08:00
} else {
return "<nil>"
2018-06-11 18:36:39 +08:00
}
2019-02-02 20:47:38 +08:00
}
func (m *Metadata) Valid() bool {
2022-04-20 01:52:51 +08:00
return m.Host != "" || m.DstIP.IsValid()
2019-02-02 20:47:38 +08:00
}
2023-10-11 22:54:19 +08:00
func (m *Metadata) SetRemoteAddr(addr net.Addr) error {
if addr == nil {
return nil
}
if rawAddr, ok := addr.(interface{ RawAddr() net.Addr }); ok {
if rawAddr := rawAddr.RawAddr(); rawAddr != nil {
if err := m.SetRemoteAddr(rawAddr); err == nil {
return nil
}
}
}
if addr, ok := addr.(interface{ AddrPort() netip.AddrPort }); ok { // *net.TCPAddr, *net.UDPAddr, M.Socksaddr
if addrPort := addr.AddrPort(); addrPort.Port() != 0 {
m.DstPort = addrPort.Port()
if addrPort.IsValid() { // sing's M.Socksaddr maybe return an invalid AddrPort if it's a DomainName
m.DstIP = addrPort.Addr().Unmap()
return nil
} else {
if addr, ok := addr.(interface{ AddrString() string }); ok { // must be sing's M.Socksaddr
m.Host = addr.AddrString() // actually is M.Socksaddr.Fqdn
return nil
}
}
}
}
return m.SetRemoteAddress(addr.String())
}
func (m *Metadata) SetRemoteAddress(rawAddress string) error {
host, port, err := net.SplitHostPort(rawAddress)
if err != nil {
return err
}
var uint16Port uint16
if port, err := strconv.ParseUint(port, 10, 16); err == nil {
uint16Port = uint16(port)
}
if ip, err := netip.ParseAddr(host); err != nil {
m.Host = host
m.DstIP = netip.Addr{}
} else {
m.Host = ""
m.DstIP = ip.Unmap()
}
m.DstPort = uint16Port
return nil
}