2018-06-10 22:50:03 +08:00
package tunnel
import (
2019-02-02 20:47:38 +08:00
"fmt"
2018-12-05 21:13:29 +08:00
"net"
2019-12-28 18:44:01 +08:00
"runtime"
2018-06-10 22:50:03 +08:00
"sync"
2018-06-16 21:34:13 +08:00
"time"
2018-06-10 22:50:03 +08:00
2019-12-08 12:17:24 +08:00
"github.com/Dreamacro/clash/adapters/inbound"
"github.com/Dreamacro/clash/adapters/provider"
2019-10-11 20:11:18 +08:00
"github.com/Dreamacro/clash/component/nat"
2020-02-15 21:42:46 +08:00
"github.com/Dreamacro/clash/component/resolver"
2018-06-10 22:50:03 +08:00
C "github.com/Dreamacro/clash/constant"
2018-12-05 21:13:29 +08:00
"github.com/Dreamacro/clash/dns"
2018-11-21 13:47:46 +08:00
"github.com/Dreamacro/clash/log"
2018-06-10 22:50:03 +08:00
2019-02-02 20:47:38 +08:00
channels "gopkg.in/eapache/channels.v1"
2018-06-10 22:50:03 +08:00
)
var (
2020-02-15 21:42:46 +08:00
tcpQueue = channels . NewInfiniteChannel ( )
udpQueue = channels . NewInfiniteChannel ( )
natTable = nat . New ( )
rules [ ] C . Rule
proxies = make ( map [ string ] C . Proxy )
providers map [ string ] provider . ProxyProvider
configMux sync . RWMutex
enhancedMode * dns . Resolver
2019-04-24 12:02:52 +08:00
2018-07-26 00:04:59 +08:00
// Outbound Rule
2020-02-15 21:42:46 +08:00
mode = Rule
// default timeout for UDP session
udpTimeout = 60 * time . Second
)
func init ( ) {
go process ( )
2018-06-10 22:50:03 +08:00
}
2018-07-26 00:04:59 +08:00
// Add request to queue
2020-02-15 21:42:46 +08:00
func Add ( req C . ServerAdapter ) {
tcpQueue . In ( ) <- req
2019-12-28 18:44:01 +08:00
}
// AddPacket add udp Packet to queue
2020-02-15 21:42:46 +08:00
func AddPacket ( packet * inbound . PacketAdapter ) {
udpQueue . In ( ) <- packet
2018-06-10 22:50:03 +08:00
}
2018-11-21 13:47:46 +08:00
// Rules return all rules
2020-02-15 21:42:46 +08:00
func Rules ( ) [ ] C . Rule {
return rules
2018-06-18 11:31:49 +08:00
}
2018-11-21 13:47:46 +08:00
// UpdateRules handle update rules
2020-02-15 21:42:46 +08:00
func UpdateRules ( newRules [ ] C . Rule ) {
configMux . Lock ( )
rules = newRules
configMux . Unlock ( )
2018-11-21 13:47:46 +08:00
}
// Proxies return all proxies
2020-02-15 21:42:46 +08:00
func Proxies ( ) map [ string ] C . Proxy {
return proxies
2018-11-21 13:47:46 +08:00
}
2019-12-08 12:17:24 +08:00
// Providers return all compatible providers
2020-02-15 21:42:46 +08:00
func Providers ( ) map [ string ] provider . ProxyProvider {
return providers
2019-12-08 12:17:24 +08:00
}
2018-11-21 13:47:46 +08:00
// UpdateProxies handle update proxies
2020-02-15 21:42:46 +08:00
func UpdateProxies ( newProxies map [ string ] C . Proxy , newProviders map [ string ] provider . ProxyProvider ) {
configMux . Lock ( )
proxies = newProxies
providers = newProviders
configMux . Unlock ( )
2019-04-24 12:02:52 +08:00
}
2018-11-21 13:47:46 +08:00
// Mode return current mode
2020-02-15 21:42:46 +08:00
func Mode ( ) TunnelMode {
return mode
2018-11-21 13:47:46 +08:00
}
// SetMode change the mode of tunnel
2020-02-15 21:42:46 +08:00
func SetMode ( m TunnelMode ) {
mode = m
}
// SetResolver set custom dns resolver for enhanced mode
func SetResolver ( r * dns . Resolver ) {
enhancedMode = r
2018-06-10 22:50:03 +08:00
}
2019-12-28 18:44:01 +08:00
// processUDP starts a loop to handle udp packet
2020-02-15 21:42:46 +08:00
func processUDP ( ) {
queue := udpQueue . Out ( )
2019-12-28 18:44:01 +08:00
for elm := range queue {
conn := elm . ( * inbound . PacketAdapter )
2020-02-15 21:42:46 +08:00
handleUDPConn ( conn )
2019-12-28 18:44:01 +08:00
}
}
2020-02-15 21:42:46 +08:00
func process ( ) {
2019-12-28 18:44:01 +08:00
numUDPWorkers := 4
if runtime . NumCPU ( ) > numUDPWorkers {
numUDPWorkers = runtime . NumCPU ( )
}
for i := 0 ; i < numUDPWorkers ; i ++ {
2020-02-15 21:42:46 +08:00
go processUDP ( )
2019-12-28 18:44:01 +08:00
}
2019-10-11 20:11:18 +08:00
2020-02-15 21:42:46 +08:00
queue := tcpQueue . Out ( )
2019-10-11 20:11:18 +08:00
for elm := range queue {
2018-06-10 22:50:03 +08:00
conn := elm . ( C . ServerAdapter )
2020-02-15 21:42:46 +08:00
go handleTCPConn ( conn )
2018-06-10 22:50:03 +08:00
}
}
2020-02-15 21:42:46 +08:00
func needLookupIP ( metadata * C . Metadata ) bool {
return enhancedMode != nil && ( enhancedMode . IsMapping ( ) || enhancedMode . FakeIPEnabled ( ) ) && metadata . Host == "" && metadata . DstIP != nil
2019-02-11 15:44:42 +08:00
}
2020-02-15 21:42:46 +08:00
func preHandleMetadata ( metadata * C . Metadata ) error {
2020-02-07 20:53:43 +08:00
// handle IP string on host
2019-10-28 00:02:23 +08:00
if ip := net . ParseIP ( metadata . Host ) ; ip != nil {
metadata . DstIP = ip
}
2019-05-03 00:05:14 +08:00
// preprocess enhanced-mode metadata
2020-02-15 21:42:46 +08:00
if needLookupIP ( metadata ) {
host , exist := enhancedMode . IPToHost ( metadata . DstIP )
2018-12-05 21:13:29 +08:00
if exist {
metadata . Host = host
metadata . AddrType = C . AtypDomainName
2020-02-15 21:42:46 +08:00
if enhancedMode . FakeIPEnabled ( ) {
2019-05-09 21:00:29 +08:00
metadata . DstIP = nil
2020-04-27 21:28:24 +08:00
} else if node := resolver . DefaultHosts . Search ( host ) ; node != nil {
// redir-host should lookup the hosts
metadata . DstIP = node . Data . ( net . IP )
2019-05-03 00:05:14 +08:00
}
2020-02-15 21:42:46 +08:00
} else if enhancedMode . IsFakeIP ( metadata . DstIP ) {
2020-02-07 20:53:43 +08:00
return fmt . Errorf ( "fake DNS record %s missing" , metadata . DstIP )
2018-12-05 21:13:29 +08:00
}
}
2020-02-07 20:53:43 +08:00
return nil
}
2020-02-15 21:42:46 +08:00
func resolveMetadata ( metadata * C . Metadata ) ( C . Proxy , C . Rule , error ) {
2018-07-12 23:28:38 +08:00
var proxy C . Proxy
2019-08-09 01:28:37 +08:00
var rule C . Rule
2020-02-15 21:42:46 +08:00
switch mode {
2018-11-21 13:47:46 +08:00
case Direct :
2020-02-15 21:42:46 +08:00
proxy = proxies [ "DIRECT" ]
2018-11-21 13:47:46 +08:00
case Global :
2020-02-15 21:42:46 +08:00
proxy = proxies [ "GLOBAL" ]
2018-07-12 23:28:38 +08:00
// Rule
default :
2019-02-02 20:47:38 +08:00
var err error
2020-02-15 21:42:46 +08:00
proxy , rule , err = match ( metadata )
2019-02-02 20:47:38 +08:00
if err != nil {
2019-10-11 20:11:18 +08:00
return nil , nil , err
2019-02-02 20:47:38 +08:00
}
2018-07-12 23:28:38 +08:00
}
2019-10-11 20:11:18 +08:00
return proxy , rule , nil
}
2019-02-02 20:47:38 +08:00
2020-02-15 21:42:46 +08:00
func handleUDPConn ( packet * inbound . PacketAdapter ) {
2019-12-28 18:44:01 +08:00
metadata := packet . Metadata ( )
2019-10-11 20:11:18 +08:00
if ! metadata . Valid ( ) {
log . Warnln ( "[Metadata] not valid: %#v" , metadata )
return
2019-07-25 17:47:39 +08:00
}
2020-03-10 20:36:24 +08:00
// make a fAddr if requset ip is fakeip
var fAddr net . Addr
if enhancedMode != nil && enhancedMode . IsFakeIP ( metadata . DstIP ) {
fAddr = metadata . UDPAddr ( )
}
2020-02-15 21:42:46 +08:00
if err := preHandleMetadata ( metadata ) ; err != nil {
2020-02-07 20:53:43 +08:00
log . Debugln ( "[Metadata PreHandle] error: %s" , err )
return
2020-01-31 19:26:33 +08:00
}
2020-01-31 14:43:54 +08:00
key := packet . LocalAddr ( ) . String ( )
2020-02-15 21:42:46 +08:00
pc := natTable . Get ( key )
2019-10-11 20:11:18 +08:00
if pc != nil {
2020-02-17 17:34:19 +08:00
handleUDPToRemote ( packet , pc , metadata )
2019-10-11 20:11:18 +08:00
return
}
lockKey := key + "-lock"
2020-02-15 21:42:46 +08:00
wg , loaded := natTable . GetOrCreateLock ( lockKey )
2019-12-28 18:44:01 +08:00
2019-10-11 20:11:18 +08:00
go func ( ) {
if ! loaded {
wg . Add ( 1 )
2020-02-15 21:42:46 +08:00
proxy , rule , err := resolveMetadata ( metadata )
2019-10-11 20:11:18 +08:00
if err != nil {
2019-12-25 12:01:48 +08:00
log . Warnln ( "[UDP] Parse metadata failed: %s" , err . Error ( ) )
2020-02-15 21:42:46 +08:00
natTable . Delete ( lockKey )
2019-10-11 20:11:18 +08:00
wg . Done ( )
return
}
2020-01-31 14:43:54 +08:00
rawPc , err := proxy . DialUDP ( metadata )
2019-10-11 20:11:18 +08:00
if err != nil {
2019-12-25 12:01:48 +08:00
log . Warnln ( "[UDP] dial %s error: %s" , proxy . Name ( ) , err . Error ( ) )
2020-02-15 21:42:46 +08:00
natTable . Delete ( lockKey )
2019-10-11 20:11:18 +08:00
wg . Done ( )
return
}
2019-10-27 21:44:07 +08:00
pc = newUDPTracker ( rawPc , DefaultManager , metadata , rule )
2019-10-11 20:11:18 +08:00
2020-01-31 14:58:54 +08:00
switch true {
case rule != nil :
2020-07-18 19:22:09 +08:00
log . Infoln ( "[UDP] %s --> %v match %s(%s) using %s" , metadata . SourceAddress ( ) , metadata . String ( ) , rule . RuleType ( ) . String ( ) , rule . Payload ( ) , rawPc . Chains ( ) . String ( ) )
2020-02-15 21:42:46 +08:00
case mode == Global :
2020-01-31 14:58:54 +08:00
log . Infoln ( "[UDP] %s --> %v using GLOBAL" , metadata . SourceAddress ( ) , metadata . String ( ) )
2020-02-15 21:42:46 +08:00
case mode == Direct :
2020-01-31 14:58:54 +08:00
log . Infoln ( "[UDP] %s --> %v using DIRECT" , metadata . SourceAddress ( ) , metadata . String ( ) )
default :
log . Infoln ( "[UDP] %s --> %v doesn't match any rule using DIRECT" , metadata . SourceAddress ( ) , metadata . String ( ) )
2019-10-11 20:11:18 +08:00
}
2020-02-15 21:42:46 +08:00
natTable . Set ( key , pc )
natTable . Delete ( lockKey )
2019-10-11 20:11:18 +08:00
wg . Done ( )
2020-03-10 20:36:24 +08:00
go handleUDPToLocal ( packet . UDPPacket , pc , key , fAddr )
2019-04-24 10:29:29 +08:00
}
2019-10-11 20:11:18 +08:00
wg . Wait ( )
2020-02-15 21:42:46 +08:00
pc := natTable . Get ( key )
2019-10-11 20:11:18 +08:00
if pc != nil {
2020-02-17 17:34:19 +08:00
handleUDPToRemote ( packet , pc , metadata )
2019-08-09 01:28:37 +08:00
}
2019-10-11 20:11:18 +08:00
} ( )
}
2019-08-09 01:28:37 +08:00
2020-02-15 21:42:46 +08:00
func handleTCPConn ( localConn C . ServerAdapter ) {
2019-10-11 20:11:18 +08:00
defer localConn . Close ( )
metadata := localConn . Metadata ( )
if ! metadata . Valid ( ) {
log . Warnln ( "[Metadata] not valid: %#v" , metadata )
return
2019-04-23 23:29:36 +08:00
}
2020-02-15 21:42:46 +08:00
if err := preHandleMetadata ( metadata ) ; err != nil {
2020-02-07 20:53:43 +08:00
log . Debugln ( "[Metadata PreHandle] error: %s" , err )
return
}
2020-02-15 21:42:46 +08:00
proxy , rule , err := resolveMetadata ( metadata )
2019-10-11 20:11:18 +08:00
if err != nil {
log . Warnln ( "Parse metadata failed: %v" , err )
return
}
2019-07-25 17:47:39 +08:00
2019-08-12 14:01:32 +08:00
remoteConn , err := proxy . Dial ( metadata )
2018-06-10 22:50:03 +08:00
if err != nil {
2019-08-10 20:14:24 +08:00
log . Warnln ( "dial %s error: %s" , proxy . Name ( ) , err . Error ( ) )
2018-06-10 22:50:03 +08:00
return
}
2019-10-27 21:44:07 +08:00
remoteConn = newTCPTracker ( remoteConn , DefaultManager , metadata , rule )
2019-08-12 14:01:32 +08:00
defer remoteConn . Close ( )
2018-06-10 22:50:03 +08:00
2020-01-31 14:58:54 +08:00
switch true {
case rule != nil :
2020-07-18 19:22:09 +08:00
log . Infoln ( "[TCP] %s --> %v match %s(%s) using %s" , metadata . SourceAddress ( ) , metadata . String ( ) , rule . RuleType ( ) . String ( ) , rule . Payload ( ) , remoteConn . Chains ( ) . String ( ) )
2020-02-15 21:42:46 +08:00
case mode == Global :
2020-01-31 14:58:54 +08:00
log . Infoln ( "[TCP] %s --> %v using GLOBAL" , metadata . SourceAddress ( ) , metadata . String ( ) )
2020-02-15 21:42:46 +08:00
case mode == Direct :
2020-01-31 14:58:54 +08:00
log . Infoln ( "[TCP] %s --> %v using DIRECT" , metadata . SourceAddress ( ) , metadata . String ( ) )
default :
log . Infoln ( "[TCP] %s --> %v doesn't match any rule using DIRECT" , metadata . SourceAddress ( ) , metadata . String ( ) )
2019-08-09 01:28:37 +08:00
}
2018-07-26 00:04:59 +08:00
switch adapter := localConn . ( type ) {
2019-12-08 12:17:24 +08:00
case * inbound . HTTPAdapter :
2020-02-15 21:42:46 +08:00
handleHTTP ( adapter , remoteConn )
2019-12-08 12:17:24 +08:00
case * inbound . SocketAdapter :
2020-02-15 21:42:46 +08:00
handleSocket ( adapter , remoteConn )
2018-07-26 00:04:59 +08:00
}
2018-06-10 22:50:03 +08:00
}
2020-02-15 21:42:46 +08:00
func shouldResolveIP ( rule C . Rule , metadata * C . Metadata ) bool {
2019-10-28 00:02:23 +08:00
return ! rule . NoResolveIP ( ) && metadata . Host != "" && metadata . DstIP == nil
2019-02-02 20:47:38 +08:00
}
2020-02-15 21:42:46 +08:00
func match ( metadata * C . Metadata ) ( C . Proxy , C . Rule , error ) {
configMux . RLock ( )
defer configMux . RUnlock ( )
2018-06-15 00:49:52 +08:00
2019-04-24 12:02:52 +08:00
var resolved bool
2019-09-11 17:00:55 +08:00
2020-02-15 21:42:46 +08:00
if node := resolver . DefaultHosts . Search ( metadata . Host ) ; node != nil {
2019-09-11 17:00:55 +08:00
ip := node . Data . ( net . IP )
2019-10-27 21:44:07 +08:00
metadata . DstIP = ip
2019-09-11 17:00:55 +08:00
resolved = true
}
2020-02-15 21:42:46 +08:00
for _ , rule := range rules {
if ! resolved && shouldResolveIP ( rule , metadata ) {
ip , err := resolver . ResolveIP ( metadata . Host )
2019-02-02 20:47:38 +08:00
if err != nil {
2019-04-24 12:02:52 +08:00
log . Debugln ( "[DNS] resolve %s error: %s" , metadata . Host , err . Error ( ) )
} else {
log . Debugln ( "[DNS] %s --> %s" , metadata . Host , ip . String ( ) )
2019-10-27 21:44:07 +08:00
metadata . DstIP = ip
2019-02-02 20:47:38 +08:00
}
2019-04-24 12:02:52 +08:00
resolved = true
2019-02-02 20:47:38 +08:00
}
2019-10-28 00:02:23 +08:00
if rule . Match ( metadata ) {
2020-02-15 21:42:46 +08:00
adapter , ok := proxies [ rule . Adapter ( ) ]
2019-04-23 23:29:36 +08:00
if ! ok {
continue
2018-06-10 22:50:03 +08:00
}
2019-04-23 23:29:36 +08:00
if metadata . NetWork == C . UDP && ! adapter . SupportUDP ( ) {
2019-07-25 17:47:39 +08:00
log . Debugln ( "%v UDP is not supported" , adapter . Name ( ) )
2019-04-23 23:29:36 +08:00
continue
}
2019-08-09 01:28:37 +08:00
return adapter , rule , nil
2018-06-10 22:50:03 +08:00
}
}
2020-02-15 21:42:46 +08:00
return proxies [ "DIRECT" ] , nil , nil
2018-06-10 22:50:03 +08:00
}