feat: add linsters
This commit is contained in:
parent
f459018eae
commit
ae17141588
49 changed files with 1018 additions and 306 deletions
|
@ -10,9 +10,15 @@ import (
|
||||||
|
|
||||||
// NewHTTP receive normal http request and return HTTPContext
|
// NewHTTP receive normal http request and return HTTPContext
|
||||||
func NewHTTP(target socks5.Addr, source net.Addr, conn net.Conn) *context.ConnContext {
|
func NewHTTP(target socks5.Addr, source net.Addr, conn net.Conn) *context.ConnContext {
|
||||||
|
return NewHTTPWithInfos(target, source, conn, "", "")
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewHTTPWithInfos(target socks5.Addr, source net.Addr, conn net.Conn, inName, preferRulesName string) *context.ConnContext {
|
||||||
metadata := parseSocksAddr(target)
|
metadata := parseSocksAddr(target)
|
||||||
metadata.NetWork = C.TCP
|
metadata.NetWork = C.TCP
|
||||||
metadata.Type = C.HTTP
|
metadata.Type = C.HTTP
|
||||||
|
metadata.InName = inName
|
||||||
|
metadata.PreferRulesName = preferRulesName
|
||||||
if ip, port, err := parseAddr(source.String()); err == nil {
|
if ip, port, err := parseAddr(source.String()); err == nil {
|
||||||
metadata.SrcIP = ip
|
metadata.SrcIP = ip
|
||||||
metadata.SrcPort = port
|
metadata.SrcPort = port
|
||||||
|
|
|
@ -10,8 +10,14 @@ import (
|
||||||
|
|
||||||
// NewHTTPS receive CONNECT request and return ConnContext
|
// NewHTTPS receive CONNECT request and return ConnContext
|
||||||
func NewHTTPS(request *http.Request, conn net.Conn) *context.ConnContext {
|
func NewHTTPS(request *http.Request, conn net.Conn) *context.ConnContext {
|
||||||
|
return NewHTTPSWithInfos(request, conn, "", "")
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewHTTPSWithInfos(request *http.Request, conn net.Conn, inName, preferRulesName string) *context.ConnContext {
|
||||||
metadata := parseHTTPAddr(request)
|
metadata := parseHTTPAddr(request)
|
||||||
metadata.Type = C.HTTPS
|
metadata.Type = C.HTTPS
|
||||||
|
metadata.PreferRulesName = preferRulesName
|
||||||
|
metadata.InName = inName
|
||||||
if ip, port, err := parseAddr(conn.RemoteAddr().String()); err == nil {
|
if ip, port, err := parseAddr(conn.RemoteAddr().String()); err == nil {
|
||||||
metadata.SrcIP = ip
|
metadata.SrcIP = ip
|
||||||
metadata.SrcPort = port
|
metadata.SrcPort = port
|
||||||
|
|
|
@ -5,22 +5,14 @@ import (
|
||||||
"github.com/Dreamacro/clash/transport/socks5"
|
"github.com/Dreamacro/clash/transport/socks5"
|
||||||
)
|
)
|
||||||
|
|
||||||
// PacketAdapter is a UDP Packet adapter for socks/redir/tun
|
|
||||||
type PacketAdapter struct {
|
|
||||||
C.UDPPacket
|
|
||||||
metadata *C.Metadata
|
|
||||||
}
|
|
||||||
|
|
||||||
// Metadata returns destination metadata
|
|
||||||
func (s *PacketAdapter) Metadata() *C.Metadata {
|
|
||||||
return s.metadata
|
|
||||||
}
|
|
||||||
|
|
||||||
// NewPacket is PacketAdapter generator
|
func NewPacketWithInfos(target socks5.Addr, packet C.UDPPacket, source C.Type, inName , preferRulesName string) *C.PacketAdapter {
|
||||||
func NewPacket(target socks5.Addr, packet C.UDPPacket, source C.Type) *PacketAdapter {
|
|
||||||
metadata := parseSocksAddr(target)
|
metadata := parseSocksAddr(target)
|
||||||
metadata.NetWork = C.UDP
|
metadata.NetWork = C.UDP
|
||||||
metadata.Type = source
|
metadata.Type = source
|
||||||
|
metadata.InName = inName
|
||||||
|
metadata.PreferRulesName = preferRulesName
|
||||||
if ip, port, err := parseAddr(packet.LocalAddr().String()); err == nil {
|
if ip, port, err := parseAddr(packet.LocalAddr().String()); err == nil {
|
||||||
metadata.SrcIP = ip
|
metadata.SrcIP = ip
|
||||||
metadata.SrcPort = port
|
metadata.SrcPort = port
|
||||||
|
@ -32,8 +24,13 @@ func NewPacket(target socks5.Addr, packet C.UDPPacket, source C.Type) *PacketAda
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
return &PacketAdapter{
|
return C.NewPacketAdapter(
|
||||||
UDPPacket: packet,
|
packet,
|
||||||
metadata: metadata,
|
metadata,
|
||||||
}
|
)
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewPacket is PacketAdapter generator
|
||||||
|
func NewPacket(target socks5.Addr, packet C.UDPPacket, source C.Type) *C.PacketAdapter {
|
||||||
|
return NewPacketWithInfos(target, packet, source, "", "")
|
||||||
}
|
}
|
||||||
|
|
|
@ -9,12 +9,14 @@ import (
|
||||||
"github.com/Dreamacro/clash/transport/socks5"
|
"github.com/Dreamacro/clash/transport/socks5"
|
||||||
)
|
)
|
||||||
|
|
||||||
// NewSocket receive TCP inbound and return ConnContext
|
func NewSocketWithInfos(target socks5.Addr, conn net.Conn, source C.Type, inName , preferRulesName string) *context.ConnContext {
|
||||||
func NewSocket(target socks5.Addr, conn net.Conn, source C.Type) *context.ConnContext {
|
|
||||||
metadata := parseSocksAddr(target)
|
metadata := parseSocksAddr(target)
|
||||||
metadata.NetWork = C.TCP
|
metadata.NetWork = C.TCP
|
||||||
metadata.Type = source
|
metadata.Type = source
|
||||||
|
metadata.PreferRulesName = preferRulesName
|
||||||
|
metadata.InName = inName
|
||||||
remoteAddr := conn.RemoteAddr()
|
remoteAddr := conn.RemoteAddr()
|
||||||
|
|
||||||
// Filter when net.Addr interface is nil
|
// Filter when net.Addr interface is nil
|
||||||
if remoteAddr != nil {
|
if remoteAddr != nil {
|
||||||
if ip, port, err := parseAddr(remoteAddr.String()); err == nil {
|
if ip, port, err := parseAddr(remoteAddr.String()); err == nil {
|
||||||
|
@ -34,6 +36,11 @@ func NewSocket(target socks5.Addr, conn net.Conn, source C.Type) *context.ConnCo
|
||||||
return context.NewConnContext(conn, metadata)
|
return context.NewConnContext(conn, metadata)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// NewSocket receive TCP inbound and return ConnContext
|
||||||
|
func NewSocket(target socks5.Addr, conn net.Conn, source C.Type) *context.ConnContext {
|
||||||
|
return NewSocketWithInfos(target, conn, source, "", "")
|
||||||
|
}
|
||||||
|
|
||||||
func NewInner(conn net.Conn, dst string, host string) *context.ConnContext {
|
func NewInner(conn net.Conn, dst string, host string) *context.ConnContext {
|
||||||
metadata := &C.Metadata{}
|
metadata := &C.Metadata{}
|
||||||
metadata.NetWork = C.TCP
|
metadata.NetWork = C.TCP
|
||||||
|
|
195
config/config.go
195
config/config.go
|
@ -15,9 +15,11 @@ import (
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"github.com/Dreamacro/clash/common/utils"
|
"github.com/Dreamacro/clash/common/utils"
|
||||||
|
"github.com/Dreamacro/clash/listener/sing_tun"
|
||||||
|
"github.com/Dreamacro/clash/listener/tunnel"
|
||||||
R "github.com/Dreamacro/clash/rules"
|
R "github.com/Dreamacro/clash/rules"
|
||||||
RP "github.com/Dreamacro/clash/rules/provider"
|
RP "github.com/Dreamacro/clash/rules/provider"
|
||||||
|
L "github.com/Dreamacro/clash/listener"
|
||||||
"github.com/Dreamacro/clash/adapter"
|
"github.com/Dreamacro/clash/adapter"
|
||||||
"github.com/Dreamacro/clash/adapter/outbound"
|
"github.com/Dreamacro/clash/adapter/outbound"
|
||||||
"github.com/Dreamacro/clash/adapter/outboundgroup"
|
"github.com/Dreamacro/clash/adapter/outboundgroup"
|
||||||
|
@ -30,13 +32,11 @@ import (
|
||||||
"github.com/Dreamacro/clash/component/trie"
|
"github.com/Dreamacro/clash/component/trie"
|
||||||
C "github.com/Dreamacro/clash/constant"
|
C "github.com/Dreamacro/clash/constant"
|
||||||
providerTypes "github.com/Dreamacro/clash/constant/provider"
|
providerTypes "github.com/Dreamacro/clash/constant/provider"
|
||||||
"github.com/Dreamacro/clash/constant/sniffer"
|
|
||||||
snifferTypes "github.com/Dreamacro/clash/constant/sniffer"
|
snifferTypes "github.com/Dreamacro/clash/constant/sniffer"
|
||||||
"github.com/Dreamacro/clash/dns"
|
"github.com/Dreamacro/clash/dns"
|
||||||
"github.com/Dreamacro/clash/log"
|
"github.com/Dreamacro/clash/log"
|
||||||
T "github.com/Dreamacro/clash/tunnel"
|
T "github.com/Dreamacro/clash/tunnel"
|
||||||
|
|
||||||
"github.com/samber/lo"
|
|
||||||
"gopkg.in/yaml.v3"
|
"gopkg.in/yaml.v3"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -149,11 +149,11 @@ type Tun struct {
|
||||||
RedirectToTun []string `yaml:"-" json:"-"`
|
RedirectToTun []string `yaml:"-" json:"-"`
|
||||||
|
|
||||||
MTU uint32 `yaml:"mtu" json:"mtu,omitempty"`
|
MTU uint32 `yaml:"mtu" json:"mtu,omitempty"`
|
||||||
Inet4Address []ListenPrefix `yaml:"inet4-address" json:"inet4-address,omitempty"`
|
Inet4Address []sing_tun.ListenPrefix `yaml:"inet4-address" json:"inet4-address,omitempty"`
|
||||||
Inet6Address []ListenPrefix `yaml:"inet6-address" json:"inet6-address,omitempty"`
|
Inet6Address []sing_tun.ListenPrefix `yaml:"inet6-address" json:"inet6-address,omitempty"`
|
||||||
StrictRoute bool `yaml:"strict-route" json:"strict-route,omitempty"`
|
StrictRoute bool `yaml:"strict-route" json:"strict-route,omitempty"`
|
||||||
Inet4RouteAddress []ListenPrefix `yaml:"inet4-route-address" json:"inet4-route-address,omitempty"`
|
Inet4RouteAddress []sing_tun.ListenPrefix `yaml:"inet4-route-address" json:"inet4-route-address,omitempty"`
|
||||||
Inet6RouteAddress []ListenPrefix `yaml:"inet6-route-address" json:"inet6-route-address,omitempty"`
|
Inet6RouteAddress []sing_tun.ListenPrefix `yaml:"inet6-route-address" json:"inet6-route-address,omitempty"`
|
||||||
IncludeUID []uint32 `yaml:"include-uid" json:"include-uid,omitempty"`
|
IncludeUID []uint32 `yaml:"include-uid" json:"include-uid,omitempty"`
|
||||||
IncludeUIDRange []string `yaml:"include-uid-range" json:"include-uid-range,omitempty"`
|
IncludeUIDRange []string `yaml:"include-uid-range" json:"include-uid-range,omitempty"`
|
||||||
ExcludeUID []uint32 `yaml:"exclude-uid" json:"exclude-uid,omitempty"`
|
ExcludeUID []uint32 `yaml:"exclude-uid" json:"exclude-uid,omitempty"`
|
||||||
|
@ -165,56 +165,6 @@ type Tun struct {
|
||||||
UDPTimeout int64 `yaml:"udp-timeout" json:"udp-timeout,omitempty"`
|
UDPTimeout int64 `yaml:"udp-timeout" json:"udp-timeout,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
type ListenPrefix netip.Prefix
|
|
||||||
|
|
||||||
func (p ListenPrefix) MarshalJSON() ([]byte, error) {
|
|
||||||
prefix := netip.Prefix(p)
|
|
||||||
if !prefix.IsValid() {
|
|
||||||
return json.Marshal(nil)
|
|
||||||
}
|
|
||||||
return json.Marshal(prefix.String())
|
|
||||||
}
|
|
||||||
|
|
||||||
func (p ListenPrefix) MarshalYAML() (interface{}, error) {
|
|
||||||
prefix := netip.Prefix(p)
|
|
||||||
if !prefix.IsValid() {
|
|
||||||
return nil, nil
|
|
||||||
}
|
|
||||||
return prefix.String(), nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (p *ListenPrefix) UnmarshalJSON(bytes []byte) error {
|
|
||||||
var value string
|
|
||||||
err := json.Unmarshal(bytes, &value)
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
prefix, err := netip.ParsePrefix(value)
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
*p = ListenPrefix(prefix)
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (p *ListenPrefix) UnmarshalYAML(node *yaml.Node) error {
|
|
||||||
var value string
|
|
||||||
err := node.Decode(&value)
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
prefix, err := netip.ParsePrefix(value)
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
*p = ListenPrefix(prefix)
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (p ListenPrefix) Build() netip.Prefix {
|
|
||||||
return netip.Prefix(p)
|
|
||||||
}
|
|
||||||
|
|
||||||
// IPTables config
|
// IPTables config
|
||||||
type IPTables struct {
|
type IPTables struct {
|
||||||
Enable bool `yaml:"enable" json:"enable"`
|
Enable bool `yaml:"enable" json:"enable"`
|
||||||
|
@ -224,7 +174,7 @@ type IPTables struct {
|
||||||
|
|
||||||
type Sniffer struct {
|
type Sniffer struct {
|
||||||
Enable bool
|
Enable bool
|
||||||
Sniffers []sniffer.Type
|
Sniffers []snifferTypes.Type
|
||||||
Reverses *trie.DomainTrie[struct{}]
|
Reverses *trie.DomainTrie[struct{}]
|
||||||
ForceDomain *trie.DomainTrie[struct{}]
|
ForceDomain *trie.DomainTrie[struct{}]
|
||||||
SkipDomain *trie.DomainTrie[struct{}]
|
SkipDomain *trie.DomainTrie[struct{}]
|
||||||
|
@ -233,7 +183,6 @@ type Sniffer struct {
|
||||||
ParsePureIp bool
|
ParsePureIp bool
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
// Experimental config
|
// Experimental config
|
||||||
type Experimental struct {
|
type Experimental struct {
|
||||||
Fingerprints []string `yaml:"fingerprints"`
|
Fingerprints []string `yaml:"fingerprints"`
|
||||||
|
@ -248,12 +197,13 @@ type Config struct {
|
||||||
Hosts *trie.DomainTrie[netip.Addr]
|
Hosts *trie.DomainTrie[netip.Addr]
|
||||||
Profile *Profile
|
Profile *Profile
|
||||||
Rules []C.Rule
|
Rules []C.Rule
|
||||||
SubRules *map[string][]C.Rule
|
SubRules map[string][]C.Rule
|
||||||
Users []auth.AuthUser
|
Users []auth.AuthUser
|
||||||
Proxies map[string]C.Proxy
|
Proxies map[string]C.Proxy
|
||||||
|
Listeners map[string]C.NewListener
|
||||||
Providers map[string]providerTypes.ProxyProvider
|
Providers map[string]providerTypes.ProxyProvider
|
||||||
RuleProviders map[string]providerTypes.RuleProvider
|
RuleProviders map[string]providerTypes.RuleProvider
|
||||||
Tunnels []Tunnel
|
Tunnels []tunnel.Tunnel
|
||||||
Sniffer *Sniffer
|
Sniffer *Sniffer
|
||||||
TLS *TLS
|
TLS *TLS
|
||||||
}
|
}
|
||||||
|
@ -294,10 +244,10 @@ type RawTun struct {
|
||||||
|
|
||||||
MTU uint32 `yaml:"mtu" json:"mtu,omitempty"`
|
MTU uint32 `yaml:"mtu" json:"mtu,omitempty"`
|
||||||
//Inet4Address []ListenPrefix `yaml:"inet4-address" json:"inet4_address,omitempty"`
|
//Inet4Address []ListenPrefix `yaml:"inet4-address" json:"inet4_address,omitempty"`
|
||||||
Inet6Address []ListenPrefix `yaml:"inet6-address" json:"inet6_address,omitempty"`
|
Inet6Address []sing_tun.ListenPrefix `yaml:"inet6-address" json:"inet6_address,omitempty"`
|
||||||
StrictRoute bool `yaml:"strict-route" json:"strict_route,omitempty"`
|
StrictRoute bool `yaml:"strict-route" json:"strict_route,omitempty"`
|
||||||
Inet4RouteAddress []ListenPrefix `yaml:"inet4_route_address" json:"inet4_route_address,omitempty"`
|
Inet4RouteAddress []sing_tun.ListenPrefix `yaml:"inet4_route_address" json:"inet4_route_address,omitempty"`
|
||||||
Inet6RouteAddress []ListenPrefix `yaml:"inet6_route_address" json:"inet6_route_address,omitempty"`
|
Inet6RouteAddress []sing_tun.ListenPrefix `yaml:"inet6_route_address" json:"inet6_route_address,omitempty"`
|
||||||
IncludeUID []uint32 `yaml:"include-uid" json:"include_uid,omitempty"`
|
IncludeUID []uint32 `yaml:"include-uid" json:"include_uid,omitempty"`
|
||||||
IncludeUIDRange []string `yaml:"include-uid-range" json:"include_uid_range,omitempty"`
|
IncludeUIDRange []string `yaml:"include-uid-range" json:"include_uid_range,omitempty"`
|
||||||
ExcludeUID []uint32 `yaml:"exclude-uid" json:"exclude_uid,omitempty"`
|
ExcludeUID []uint32 `yaml:"exclude-uid" json:"exclude_uid,omitempty"`
|
||||||
|
@ -322,65 +272,6 @@ type RawTuicServer struct {
|
||||||
MaxUdpRelayPacketSize int `yaml:"max-udp-relay-packet-size" json:"max-udp-relay-packet-size,omitempty"`
|
MaxUdpRelayPacketSize int `yaml:"max-udp-relay-packet-size" json:"max-udp-relay-packet-size,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
type tunnel struct {
|
|
||||||
Network []string `yaml:"network"`
|
|
||||||
Address string `yaml:"address"`
|
|
||||||
Target string `yaml:"target"`
|
|
||||||
Proxy string `yaml:"proxy"`
|
|
||||||
}
|
|
||||||
|
|
||||||
type Tunnel tunnel
|
|
||||||
|
|
||||||
// UnmarshalYAML implements yaml.Unmarshaler
|
|
||||||
func (t *Tunnel) UnmarshalYAML(unmarshal func(any) error) error {
|
|
||||||
var tp string
|
|
||||||
if err := unmarshal(&tp); err != nil {
|
|
||||||
var inner tunnel
|
|
||||||
if err := unmarshal(&inner); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
*t = Tunnel(inner)
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// parse udp/tcp,address,target,proxy
|
|
||||||
parts := lo.Map(strings.Split(tp, ","), func(s string, _ int) string {
|
|
||||||
return strings.TrimSpace(s)
|
|
||||||
})
|
|
||||||
if len(parts) != 3 && len(parts) != 4 {
|
|
||||||
return fmt.Errorf("invalid tunnel config %s", tp)
|
|
||||||
}
|
|
||||||
network := strings.Split(parts[0], "/")
|
|
||||||
|
|
||||||
// validate network
|
|
||||||
for _, n := range network {
|
|
||||||
switch n {
|
|
||||||
case "tcp", "udp":
|
|
||||||
default:
|
|
||||||
return fmt.Errorf("invalid tunnel network %s", n)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// validate address and target
|
|
||||||
address := parts[1]
|
|
||||||
target := parts[2]
|
|
||||||
for _, addr := range []string{address, target} {
|
|
||||||
if _, _, err := net.SplitHostPort(addr); err != nil {
|
|
||||||
return fmt.Errorf("invalid tunnel target or address %s", addr)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
*t = Tunnel(tunnel{
|
|
||||||
Network: network,
|
|
||||||
Address: address,
|
|
||||||
Target: target,
|
|
||||||
})
|
|
||||||
if len(parts) == 4 {
|
|
||||||
t.Proxy = parts[3]
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
type RawConfig struct {
|
type RawConfig struct {
|
||||||
Port int `yaml:"port"`
|
Port int `yaml:"port"`
|
||||||
|
@ -404,7 +295,7 @@ type RawConfig struct {
|
||||||
Secret string `yaml:"secret"`
|
Secret string `yaml:"secret"`
|
||||||
Interface string `yaml:"interface-name"`
|
Interface string `yaml:"interface-name"`
|
||||||
RoutingMark int `yaml:"routing-mark"`
|
RoutingMark int `yaml:"routing-mark"`
|
||||||
Tunnels []Tunnel `yaml:"tunnels"`
|
Tunnels []tunnel.Tunnel `yaml:"tunnels"`
|
||||||
GeodataMode bool `yaml:"geodata-mode"`
|
GeodataMode bool `yaml:"geodata-mode"`
|
||||||
GeodataLoader string `yaml:"geodata-loader"`
|
GeodataLoader string `yaml:"geodata-loader"`
|
||||||
TCPConcurrent bool `yaml:"tcp-concurrent" json:"tcp-concurrent"`
|
TCPConcurrent bool `yaml:"tcp-concurrent" json:"tcp-concurrent"`
|
||||||
|
@ -427,6 +318,7 @@ type RawConfig struct {
|
||||||
Rule []string `yaml:"rules"`
|
Rule []string `yaml:"rules"`
|
||||||
SubRules map[string][]string `yaml:"sub-rules"`
|
SubRules map[string][]string `yaml:"sub-rules"`
|
||||||
RawTLS TLS `yaml:"tls"`
|
RawTLS TLS `yaml:"tls"`
|
||||||
|
Listeners []map[string]any `yaml:"listeners"`
|
||||||
}
|
}
|
||||||
|
|
||||||
type RawGeoXUrl struct {
|
type RawGeoXUrl struct {
|
||||||
|
@ -492,7 +384,7 @@ func UnmarshalRawConfig(buf []byte) (*RawConfig, error) {
|
||||||
DNSHijack: []string{"0.0.0.0:53"}, // default hijack all dns query
|
DNSHijack: []string{"0.0.0.0:53"}, // default hijack all dns query
|
||||||
AutoRoute: true,
|
AutoRoute: true,
|
||||||
AutoDetectInterface: true,
|
AutoDetectInterface: true,
|
||||||
Inet6Address: []ListenPrefix{ListenPrefix(netip.MustParsePrefix("fdfe:dcba:9876::1/126"))},
|
Inet6Address: []sing_tun.ListenPrefix{sing_tun.ListenPrefix(netip.MustParsePrefix("fdfe:dcba:9876::1/126"))},
|
||||||
},
|
},
|
||||||
TuicServer: RawTuicServer{
|
TuicServer: RawTuicServer{
|
||||||
Enable: false,
|
Enable: false,
|
||||||
|
@ -576,7 +468,7 @@ func ParseRawConfig(rawCfg *RawConfig) (*Config, error) {
|
||||||
config.Experimental = &rawCfg.Experimental
|
config.Experimental = &rawCfg.Experimental
|
||||||
config.Profile = &rawCfg.Profile
|
config.Profile = &rawCfg.Profile
|
||||||
config.IPTables = &rawCfg.IPTables
|
config.IPTables = &rawCfg.IPTables
|
||||||
config.TLS=&rawCfg.RawTLS
|
config.TLS = &rawCfg.RawTLS
|
||||||
|
|
||||||
general, err := parseGeneral(rawCfg)
|
general, err := parseGeneral(rawCfg)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -585,7 +477,6 @@ func ParseRawConfig(rawCfg *RawConfig) (*Config, error) {
|
||||||
config.General = general
|
config.General = general
|
||||||
|
|
||||||
dialer.DefaultInterface.Store(config.General.Interface)
|
dialer.DefaultInterface.Store(config.General.Interface)
|
||||||
|
|
||||||
proxies, providers, err := parseProxies(rawCfg)
|
proxies, providers, err := parseProxies(rawCfg)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
|
@ -593,6 +484,12 @@ func ParseRawConfig(rawCfg *RawConfig) (*Config, error) {
|
||||||
config.Proxies = proxies
|
config.Proxies = proxies
|
||||||
config.Providers = providers
|
config.Providers = providers
|
||||||
|
|
||||||
|
listener, err := parseListeners(rawCfg)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
config.Listeners = listener
|
||||||
|
|
||||||
subRules, ruleProviders, err := parseSubRules(rawCfg, proxies)
|
subRules, ruleProviders, err := parseSubRules(rawCfg, proxies)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
|
@ -645,7 +542,6 @@ func ParseRawConfig(rawCfg *RawConfig) (*Config, error) {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
elapsedTime := time.Since(startTime) / time.Millisecond // duration in ms
|
elapsedTime := time.Since(startTime) / time.Millisecond // duration in ms
|
||||||
log.Infoln("Initial configuration complete, total time: %dms", elapsedTime) //Segment finished in xxm
|
log.Infoln("Initial configuration complete, total time: %dms", elapsedTime) //Segment finished in xxm
|
||||||
|
|
||||||
|
@ -799,9 +695,27 @@ func parseProxies(cfg *RawConfig) (proxies map[string]C.Proxy, providersMap map[
|
||||||
return proxies, providersMap, nil
|
return proxies, providersMap, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func parseSubRules(cfg *RawConfig, proxies map[string]C.Proxy) (subRules *map[string][]C.Rule, ruleProviders map[string]providerTypes.RuleProvider, err error) {
|
func parseListeners(cfg *RawConfig) (listeners map[string]C.NewListener, err error) {
|
||||||
|
listeners = make(map[string]C.NewListener)
|
||||||
|
for index, mapping := range cfg.Listeners {
|
||||||
|
listener, err := L.ParseListener(mapping)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("proxy %d: %w", index, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if _, exist := mapping[listener.Name()]; exist {
|
||||||
|
return nil, fmt.Errorf("listener %s is the duplicate name", listener.Name())
|
||||||
|
}
|
||||||
|
|
||||||
|
listeners[listener.Name()] = listener
|
||||||
|
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func parseSubRules(cfg *RawConfig, proxies map[string]C.Proxy) (subRules map[string][]C.Rule, ruleProviders map[string]providerTypes.RuleProvider, err error) {
|
||||||
ruleProviders = map[string]providerTypes.RuleProvider{}
|
ruleProviders = map[string]providerTypes.RuleProvider{}
|
||||||
subRules = &map[string][]C.Rule{}
|
subRules = map[string][]C.Rule{}
|
||||||
log.Infoln("Geodata Loader mode: %s", geodata.LoaderName())
|
log.Infoln("Geodata Loader mode: %s", geodata.LoaderName())
|
||||||
// parse rule provider
|
// parse rule provider
|
||||||
for name, mapping := range cfg.RuleProvider {
|
for name, mapping := range cfg.RuleProvider {
|
||||||
|
@ -815,6 +729,9 @@ func parseSubRules(cfg *RawConfig, proxies map[string]C.Proxy) (subRules *map[st
|
||||||
}
|
}
|
||||||
|
|
||||||
for name, rawRules := range cfg.SubRules {
|
for name, rawRules := range cfg.SubRules {
|
||||||
|
if len(name) == 0 {
|
||||||
|
return nil, nil, fmt.Errorf("sub-rule name is empty")
|
||||||
|
}
|
||||||
var rules []C.Rule
|
var rules []C.Rule
|
||||||
for idx, line := range rawRules {
|
for idx, line := range rawRules {
|
||||||
rawRule := trimArr(strings.Split(line, ","))
|
rawRule := trimArr(strings.Split(line, ","))
|
||||||
|
@ -860,7 +777,7 @@ func parseSubRules(cfg *RawConfig, proxies map[string]C.Proxy) (subRules *map[st
|
||||||
|
|
||||||
rules = append(rules, parsed)
|
rules = append(rules, parsed)
|
||||||
}
|
}
|
||||||
(*subRules)[name] = rules
|
subRules[name] = rules
|
||||||
}
|
}
|
||||||
|
|
||||||
if err = verifySubRule(subRules); err != nil {
|
if err = verifySubRule(subRules); err != nil {
|
||||||
|
@ -870,8 +787,8 @@ func parseSubRules(cfg *RawConfig, proxies map[string]C.Proxy) (subRules *map[st
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
func verifySubRule(subRules *map[string][]C.Rule) error {
|
func verifySubRule(subRules map[string][]C.Rule) error {
|
||||||
for name := range *subRules {
|
for name := range subRules {
|
||||||
err := verifySubRuleCircularReferences(name, subRules, []string{})
|
err := verifySubRuleCircularReferences(name, subRules, []string{})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
|
@ -880,7 +797,7 @@ func verifySubRule(subRules *map[string][]C.Rule) error {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func verifySubRuleCircularReferences(n string, subRules *map[string][]C.Rule, arr []string) error {
|
func verifySubRuleCircularReferences(n string, subRules map[string][]C.Rule, arr []string) error {
|
||||||
isInArray := func(v string, array []string) bool {
|
isInArray := func(v string, array []string) bool {
|
||||||
for _, c := range array {
|
for _, c := range array {
|
||||||
if v == c {
|
if v == c {
|
||||||
|
@ -891,9 +808,9 @@ func verifySubRuleCircularReferences(n string, subRules *map[string][]C.Rule, ar
|
||||||
}
|
}
|
||||||
|
|
||||||
arr = append(arr, n)
|
arr = append(arr, n)
|
||||||
for i, rule := range (*subRules)[n] {
|
for i, rule := range subRules[n] {
|
||||||
if rule.RuleType() == C.SubRules {
|
if rule.RuleType() == C.SubRules {
|
||||||
if _, ok := (*subRules)[rule.Adapter()]; !ok {
|
if _, ok := subRules[rule.Adapter()]; !ok {
|
||||||
return fmt.Errorf("sub-rule[%d:%s] error: [%s] not found", i, n, rule.Adapter())
|
return fmt.Errorf("sub-rule[%d:%s] error: [%s] not found", i, n, rule.Adapter())
|
||||||
}
|
}
|
||||||
if isInArray(rule.Adapter(), arr) {
|
if isInArray(rule.Adapter(), arr) {
|
||||||
|
@ -909,7 +826,7 @@ func verifySubRuleCircularReferences(n string, subRules *map[string][]C.Rule, ar
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func parseRules(cfg *RawConfig, proxies map[string]C.Proxy, subRules *map[string][]C.Rule) ([]C.Rule, error) {
|
func parseRules(cfg *RawConfig, proxies map[string]C.Proxy, subRules map[string][]C.Rule) ([]C.Rule, error) {
|
||||||
var rules []C.Rule
|
var rules []C.Rule
|
||||||
rulesConfig := cfg.Rule
|
rulesConfig := cfg.Rule
|
||||||
|
|
||||||
|
@ -948,7 +865,7 @@ func parseRules(cfg *RawConfig, proxies map[string]C.Proxy, subRules *map[string
|
||||||
if _, ok := proxies[target]; !ok {
|
if _, ok := proxies[target]; !ok {
|
||||||
if ruleName != "SUB-RULE" {
|
if ruleName != "SUB-RULE" {
|
||||||
return nil, fmt.Errorf("rules[%d] [%s] error: proxy [%s] not found", idx, line, target)
|
return nil, fmt.Errorf("rules[%d] [%s] error: proxy [%s] not found", idx, line, target)
|
||||||
} else if _, ok = (*subRules)[target]; !ok {
|
} else if _, ok = subRules[target]; !ok {
|
||||||
return nil, fmt.Errorf("rules[%d] [%s] error: sub-rule [%s] not found", idx, line, target)
|
return nil, fmt.Errorf("rules[%d] [%s] error: sub-rule [%s] not found", idx, line, target)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -1315,7 +1232,7 @@ func parseTun(rawTun RawTun, general *General) error {
|
||||||
RedirectToTun: rawTun.RedirectToTun,
|
RedirectToTun: rawTun.RedirectToTun,
|
||||||
|
|
||||||
MTU: rawTun.MTU,
|
MTU: rawTun.MTU,
|
||||||
Inet4Address: []ListenPrefix{ListenPrefix(tunAddressPrefix)},
|
Inet4Address: []sing_tun.ListenPrefix{sing_tun.ListenPrefix(tunAddressPrefix)},
|
||||||
Inet6Address: rawTun.Inet6Address,
|
Inet6Address: rawTun.Inet6Address,
|
||||||
StrictRoute: rawTun.StrictRoute,
|
StrictRoute: rawTun.StrictRoute,
|
||||||
Inet4RouteAddress: rawTun.Inet4RouteAddress,
|
Inet4RouteAddress: rawTun.Inet4RouteAddress,
|
||||||
|
|
|
@ -13,3 +13,29 @@ type AdvanceListener interface {
|
||||||
Config() string
|
Config() string
|
||||||
HandleConn(conn net.Conn, in chan<- ConnContext)
|
HandleConn(conn net.Conn, in chan<- ConnContext)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
type NewListener interface {
|
||||||
|
Name() string
|
||||||
|
ReCreate(tcpIn chan<- ConnContext,udpIn chan<-*PacketAdapter) error
|
||||||
|
Close() error
|
||||||
|
Address() string
|
||||||
|
RawAddress() string
|
||||||
|
}
|
||||||
|
|
||||||
|
// PacketAdapter is a UDP Packet adapter for socks/redir/tun
|
||||||
|
type PacketAdapter struct {
|
||||||
|
UDPPacket
|
||||||
|
metadata *Metadata
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewPacketAdapter(udppacket UDPPacket,metadata *Metadata)*PacketAdapter{
|
||||||
|
return &PacketAdapter{
|
||||||
|
udppacket,
|
||||||
|
metadata,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Metadata returns destination metadata
|
||||||
|
func (s *PacketAdapter) Metadata() *Metadata {
|
||||||
|
return s.metadata
|
||||||
|
}
|
|
@ -132,6 +132,8 @@ type Metadata struct {
|
||||||
ProcessPath string `json:"processPath"`
|
ProcessPath string `json:"processPath"`
|
||||||
SpecialProxy string `json:"specialProxy"`
|
SpecialProxy string `json:"specialProxy"`
|
||||||
RemoteDst string `json:"remoteDestination"`
|
RemoteDst string `json:"remoteDestination"`
|
||||||
|
InName string `jsson:"-"`
|
||||||
|
PreferRulesName string
|
||||||
}
|
}
|
||||||
|
|
||||||
func (m *Metadata) RemoteAddress() string {
|
func (m *Metadata) RemoteAddress() string {
|
||||||
|
|
|
@ -662,3 +662,36 @@ sub-rules:
|
||||||
tls:
|
tls:
|
||||||
certificate: string # 证书 PEM 格式,或者 证书的路径
|
certificate: string # 证书 PEM 格式,或者 证书的路径
|
||||||
private-key: string # 证书对应的私钥 PEM 格式,或者私钥路径
|
private-key: string # 证书对应的私钥 PEM 格式,或者私钥路径
|
||||||
|
|
||||||
|
# 流量入站
|
||||||
|
listeners:
|
||||||
|
- name: socks5-in-1
|
||||||
|
type: socks
|
||||||
|
port: 10808
|
||||||
|
#listen: 0.0.0.0 # 默认监听 0.0.0.0
|
||||||
|
# rule: sub-rule-name1 # 默认使用 rules,如果未找到 sub-rule 则直接使用 rules
|
||||||
|
# udp: false # 默认 true
|
||||||
|
- name: http-in-1
|
||||||
|
type: http
|
||||||
|
port: 10809
|
||||||
|
listen: 0.0.0.0
|
||||||
|
# rule: sub-rule
|
||||||
|
- name: mixed-in-1
|
||||||
|
type: mixed # HTTP(S) 和 SOCKS 代理混合
|
||||||
|
port: 10810
|
||||||
|
listen: 0.0.0.0
|
||||||
|
# rule: sub-rule
|
||||||
|
# udp: false # 默认 true
|
||||||
|
|
||||||
|
- name: reidr-in-1
|
||||||
|
type: redir
|
||||||
|
port: 10811
|
||||||
|
listen: 0.0.0.0
|
||||||
|
# rule: sub-rule
|
||||||
|
|
||||||
|
- name: tproxy-in-1
|
||||||
|
type: tproxy
|
||||||
|
port: 10812
|
||||||
|
listen: 0.0.0.0
|
||||||
|
# udp: false # 默认 true
|
||||||
|
# rule: sub-rule
|
||||||
|
|
|
@ -8,7 +8,6 @@ import (
|
||||||
"sync"
|
"sync"
|
||||||
|
|
||||||
"github.com/Dreamacro/clash/adapter"
|
"github.com/Dreamacro/clash/adapter"
|
||||||
"github.com/Dreamacro/clash/adapter/inbound"
|
|
||||||
"github.com/Dreamacro/clash/adapter/outboundgroup"
|
"github.com/Dreamacro/clash/adapter/outboundgroup"
|
||||||
"github.com/Dreamacro/clash/component/auth"
|
"github.com/Dreamacro/clash/component/auth"
|
||||||
"github.com/Dreamacro/clash/component/dialer"
|
"github.com/Dreamacro/clash/component/dialer"
|
||||||
|
@ -26,8 +25,12 @@ import (
|
||||||
"github.com/Dreamacro/clash/dns"
|
"github.com/Dreamacro/clash/dns"
|
||||||
"github.com/Dreamacro/clash/listener"
|
"github.com/Dreamacro/clash/listener"
|
||||||
authStore "github.com/Dreamacro/clash/listener/auth"
|
authStore "github.com/Dreamacro/clash/listener/auth"
|
||||||
|
"github.com/Dreamacro/clash/adapter/inbound"
|
||||||
"github.com/Dreamacro/clash/listener/inner"
|
"github.com/Dreamacro/clash/listener/inner"
|
||||||
|
"github.com/Dreamacro/clash/listener/sing_tun"
|
||||||
"github.com/Dreamacro/clash/listener/tproxy"
|
"github.com/Dreamacro/clash/listener/tproxy"
|
||||||
|
"github.com/Dreamacro/clash/listener/tuic"
|
||||||
|
T "github.com/Dreamacro/clash/listener/tunnel"
|
||||||
"github.com/Dreamacro/clash/log"
|
"github.com/Dreamacro/clash/log"
|
||||||
"github.com/Dreamacro/clash/tunnel"
|
"github.com/Dreamacro/clash/tunnel"
|
||||||
)
|
)
|
||||||
|
@ -77,7 +80,7 @@ func ApplyConfig(cfg *config.Config, force bool) {
|
||||||
preUpdateExperimental(cfg)
|
preUpdateExperimental(cfg)
|
||||||
updateUsers(cfg.Users)
|
updateUsers(cfg.Users)
|
||||||
updateProxies(cfg.Proxies, cfg.Providers)
|
updateProxies(cfg.Proxies, cfg.Providers)
|
||||||
updateRules(cfg.Rules, cfg.RuleProviders)
|
updateRules(cfg.Rules, cfg.SubRules, cfg.RuleProviders)
|
||||||
updateSniffer(cfg.Sniffer)
|
updateSniffer(cfg.Sniffer)
|
||||||
updateHosts(cfg.Hosts)
|
updateHosts(cfg.Hosts)
|
||||||
initInnerTcp()
|
initInnerTcp()
|
||||||
|
@ -86,6 +89,7 @@ func ApplyConfig(cfg *config.Config, force bool) {
|
||||||
updateProfile(cfg)
|
updateProfile(cfg)
|
||||||
loadRuleProvider(cfg.RuleProviders)
|
loadRuleProvider(cfg.RuleProviders)
|
||||||
updateGeneral(cfg.General, force)
|
updateGeneral(cfg.General, force)
|
||||||
|
updateListeners(cfg.Listeners)
|
||||||
updateIPTables(cfg)
|
updateIPTables(cfg)
|
||||||
updateTun(cfg.General)
|
updateTun(cfg.General)
|
||||||
updateExperimental(cfg)
|
updateExperimental(cfg)
|
||||||
|
@ -122,8 +126,8 @@ func GetGeneral() *config.General {
|
||||||
LogLevel: log.Level(),
|
LogLevel: log.Level(),
|
||||||
IPv6: !resolver.DisableIPv6,
|
IPv6: !resolver.DisableIPv6,
|
||||||
GeodataLoader: G.LoaderName(),
|
GeodataLoader: G.LoaderName(),
|
||||||
Tun: listener.GetTunConf(),
|
Tun: config.Tun(listener.GetTunConf()),
|
||||||
TuicServer: listener.GetTuicConf(),
|
TuicServer: config.TuicServer(listener.GetTuicConf()),
|
||||||
Interface: dialer.DefaultInterface.Load(),
|
Interface: dialer.DefaultInterface.Load(),
|
||||||
Sniffing: tunnel.IsSniffing(),
|
Sniffing: tunnel.IsSniffing(),
|
||||||
TCPConcurrent: dialer.GetDial(),
|
TCPConcurrent: dialer.GetDial(),
|
||||||
|
@ -132,6 +136,16 @@ func GetGeneral() *config.General {
|
||||||
return general
|
return general
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func updateListeners(listeners map[string]C.NewListener) {
|
||||||
|
tcpIn := tunnel.TCPIn()
|
||||||
|
udpIn := tunnel.UDPIn()
|
||||||
|
for _, listener := range listeners {
|
||||||
|
if err := listener.ReCreate(tcpIn, udpIn); err != nil {
|
||||||
|
log.Errorln("Listener %s listen err: %s", listener.Name(), err.Error())
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
func updateExperimental(c *config.Config) {
|
func updateExperimental(c *config.Config) {
|
||||||
runtime.GC()
|
runtime.GC()
|
||||||
}
|
}
|
||||||
|
@ -203,8 +217,8 @@ func updateProxies(proxies map[string]C.Proxy, providers map[string]provider.Pro
|
||||||
tunnel.UpdateProxies(proxies, providers)
|
tunnel.UpdateProxies(proxies, providers)
|
||||||
}
|
}
|
||||||
|
|
||||||
func updateRules(rules []C.Rule, ruleProviders map[string]provider.RuleProvider) {
|
func updateRules(rules []C.Rule, subRules map[string][]C.Rule, ruleProviders map[string]provider.RuleProvider) {
|
||||||
tunnel.UpdateRules(rules, ruleProviders)
|
tunnel.UpdateRules(rules, subRules, ruleProviders)
|
||||||
}
|
}
|
||||||
|
|
||||||
func loadProvider(pv provider.Provider) {
|
func loadProvider(pv provider.Provider) {
|
||||||
|
@ -267,7 +281,7 @@ func updateTun(general *config.General) {
|
||||||
if general == nil {
|
if general == nil {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
listener.ReCreateTun(general.Tun, tunnel.TCPIn(), tunnel.UDPIn())
|
listener.ReCreateTun(sing_tun.Tun(general.Tun), tunnel.TCPIn(), tunnel.UDPIn())
|
||||||
listener.ReCreateRedirToTun(general.Tun.RedirectToTun)
|
listener.ReCreateRedirToTun(general.Tun.RedirectToTun)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -294,7 +308,7 @@ func updateSniffer(sniffer *config.Sniffer) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func updateTunnels(tunnels []config.Tunnel) {
|
func updateTunnels(tunnels []T.Tunnel) {
|
||||||
listener.PatchTunnel(tunnels, tunnel.TCPIn(), tunnel.UDPIn())
|
listener.PatchTunnel(tunnels, tunnel.TCPIn(), tunnel.UDPIn())
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -353,7 +367,7 @@ func updateGeneral(general *config.General, force bool) {
|
||||||
listener.ReCreateMixed(general.MixedPort, tcpIn, udpIn)
|
listener.ReCreateMixed(general.MixedPort, tcpIn, udpIn)
|
||||||
listener.ReCreateShadowSocks(general.ShadowSocksConfig, tcpIn, udpIn)
|
listener.ReCreateShadowSocks(general.ShadowSocksConfig, tcpIn, udpIn)
|
||||||
listener.ReCreateVmess(general.VmessConfig, tcpIn, udpIn)
|
listener.ReCreateVmess(general.VmessConfig, tcpIn, udpIn)
|
||||||
listener.ReCreateTuic(general.TuicServer, tcpIn, udpIn)
|
listener.ReCreateTuic(tuic.TuicServer(general.TuicServer), tcpIn, udpIn)
|
||||||
}
|
}
|
||||||
|
|
||||||
func updateUsers(users []auth.AuthUser) {
|
func updateUsers(users []auth.AuthUser) {
|
||||||
|
|
|
@ -13,6 +13,8 @@ import (
|
||||||
C "github.com/Dreamacro/clash/constant"
|
C "github.com/Dreamacro/clash/constant"
|
||||||
"github.com/Dreamacro/clash/hub/executor"
|
"github.com/Dreamacro/clash/hub/executor"
|
||||||
P "github.com/Dreamacro/clash/listener"
|
P "github.com/Dreamacro/clash/listener"
|
||||||
|
"github.com/Dreamacro/clash/listener/sing_tun"
|
||||||
|
"github.com/Dreamacro/clash/listener/tuic"
|
||||||
"github.com/Dreamacro/clash/log"
|
"github.com/Dreamacro/clash/log"
|
||||||
"github.com/Dreamacro/clash/tunnel"
|
"github.com/Dreamacro/clash/tunnel"
|
||||||
|
|
||||||
|
@ -67,10 +69,10 @@ type tunSchema struct {
|
||||||
|
|
||||||
MTU *uint32 `yaml:"mtu" json:"mtu,omitempty"`
|
MTU *uint32 `yaml:"mtu" json:"mtu,omitempty"`
|
||||||
//Inet4Address *[]config.ListenPrefix `yaml:"inet4-address" json:"inet4-address,omitempty"`
|
//Inet4Address *[]config.ListenPrefix `yaml:"inet4-address" json:"inet4-address,omitempty"`
|
||||||
Inet6Address *[]config.ListenPrefix `yaml:"inet6-address" json:"inet6-address,omitempty"`
|
Inet6Address *[]sing_tun.ListenPrefix `yaml:"inet6-address" json:"inet6-address,omitempty"`
|
||||||
StrictRoute *bool `yaml:"strict-route" json:"strict-route,omitempty"`
|
StrictRoute *bool `yaml:"strict-route" json:"strict-route,omitempty"`
|
||||||
Inet4RouteAddress *[]config.ListenPrefix `yaml:"inet4-route-address" json:"inet4-route-address,omitempty"`
|
Inet4RouteAddress *[]sing_tun.ListenPrefix `yaml:"inet4-route-address" json:"inet4-route-address,omitempty"`
|
||||||
Inet6RouteAddress *[]config.ListenPrefix `yaml:"inet6-route-address" json:"inet6-route-address,omitempty"`
|
Inet6RouteAddress *[]sing_tun.ListenPrefix `yaml:"inet6-route-address" json:"inet6-route-address,omitempty"`
|
||||||
IncludeUID *[]uint32 `yaml:"include-uid" json:"include-uid,omitempty"`
|
IncludeUID *[]uint32 `yaml:"include-uid" json:"include-uid,omitempty"`
|
||||||
IncludeUIDRange *[]string `yaml:"include-uid-range" json:"include-uid-range,omitempty"`
|
IncludeUIDRange *[]string `yaml:"include-uid-range" json:"include-uid-range,omitempty"`
|
||||||
ExcludeUID *[]uint32 `yaml:"exclude-uid" json:"exclude-uid,omitempty"`
|
ExcludeUID *[]uint32 `yaml:"exclude-uid" json:"exclude-uid,omitempty"`
|
||||||
|
@ -116,7 +118,7 @@ func pointerOrDefaultString(p *string, def string) string {
|
||||||
return def
|
return def
|
||||||
}
|
}
|
||||||
|
|
||||||
func pointerOrDefaultTun(p *tunSchema, def config.Tun) config.Tun {
|
func pointerOrDefaultTun(p *tunSchema, def sing_tun.Tun) sing_tun.Tun {
|
||||||
if p != nil {
|
if p != nil {
|
||||||
def.Enable = p.Enable
|
def.Enable = p.Enable
|
||||||
if p.Device != nil {
|
if p.Device != nil {
|
||||||
|
@ -174,7 +176,7 @@ func pointerOrDefaultTun(p *tunSchema, def config.Tun) config.Tun {
|
||||||
return def
|
return def
|
||||||
}
|
}
|
||||||
|
|
||||||
func pointerOrDefaultTuicServer(p *tuicServerSchema, def config.TuicServer) config.TuicServer {
|
func pointerOrDefaultTuicServer(p *tuicServerSchema, def tuic.TuicServer) tuic.TuicServer {
|
||||||
if p != nil {
|
if p != nil {
|
||||||
def.Enable = p.Enable
|
def.Enable = p.Enable
|
||||||
if p.Listen != nil {
|
if p.Listen != nil {
|
||||||
|
|
|
@ -14,6 +14,8 @@ type Listener struct {
|
||||||
listener net.Listener
|
listener net.Listener
|
||||||
addr string
|
addr string
|
||||||
closed bool
|
closed bool
|
||||||
|
name string
|
||||||
|
preferRulesName string
|
||||||
lookupFunc func(netip.AddrPort) (socks5.Addr, error)
|
lookupFunc func(netip.AddrPort) (socks5.Addr, error)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -56,10 +58,14 @@ func (l *Listener) handleRedir(conn net.Conn, in chan<- C.ConnContext) {
|
||||||
|
|
||||||
_ = conn.(*net.TCPConn).SetKeepAlive(true)
|
_ = conn.(*net.TCPConn).SetKeepAlive(true)
|
||||||
|
|
||||||
in <- inbound.NewSocket(target, conn, C.REDIR)
|
in <- inbound.NewSocketWithInfos(target, conn, C.REDIR,l.name,l.preferRulesName)
|
||||||
}
|
}
|
||||||
|
|
||||||
func New(addr string, in chan<- C.ConnContext) (*Listener, error) {
|
func New(addr string, in chan<- C.ConnContext) (*Listener, error) {
|
||||||
|
return NewWithInfos(addr,"DEFAULT-REDIR","",in)
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewWithInfos(addr ,name,preferRulesName string, in chan<- C.ConnContext) (*Listener, error) {
|
||||||
l, err := net.Listen("tcp", addr)
|
l, err := net.Listen("tcp", addr)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
|
@ -67,6 +73,8 @@ func New(addr string, in chan<- C.ConnContext) (*Listener, error) {
|
||||||
rl := &Listener{
|
rl := &Listener{
|
||||||
listener: l,
|
listener: l,
|
||||||
addr: addr,
|
addr: addr,
|
||||||
|
name:name,
|
||||||
|
preferRulesName: preferRulesName,
|
||||||
}
|
}
|
||||||
|
|
||||||
go func() {
|
go func() {
|
||||||
|
|
|
@ -12,7 +12,7 @@ import (
|
||||||
"github.com/Dreamacro/clash/transport/socks5"
|
"github.com/Dreamacro/clash/transport/socks5"
|
||||||
)
|
)
|
||||||
|
|
||||||
func newClient(source net.Addr, in chan<- C.ConnContext) *http.Client {
|
func newClient(source net.Addr,name,preferRulesName string, in chan<- C.ConnContext) *http.Client {
|
||||||
return &http.Client{
|
return &http.Client{
|
||||||
Transport: &http.Transport{
|
Transport: &http.Transport{
|
||||||
// from http.DefaultTransport
|
// from http.DefaultTransport
|
||||||
|
@ -32,7 +32,7 @@ func newClient(source net.Addr, in chan<- C.ConnContext) *http.Client {
|
||||||
|
|
||||||
left, right := net.Pipe()
|
left, right := net.Pipe()
|
||||||
|
|
||||||
in <- inbound.NewHTTP(dstAddr, source, right)
|
in <- inbound.NewHTTPWithInfos(dstAddr, source, right,name,preferRulesName)
|
||||||
|
|
||||||
return left, nil
|
return left, nil
|
||||||
},
|
},
|
||||||
|
|
|
@ -14,8 +14,8 @@ import (
|
||||||
"github.com/Dreamacro/clash/log"
|
"github.com/Dreamacro/clash/log"
|
||||||
)
|
)
|
||||||
|
|
||||||
func HandleConn(c net.Conn, in chan<- C.ConnContext, cache *cache.LruCache[string, bool]) {
|
func HandleConn(name, preferRulesName string, c net.Conn, in chan<- C.ConnContext, cache *cache.LruCache[string, bool]) {
|
||||||
client := newClient(c.RemoteAddr(), in)
|
client := newClient(c.RemoteAddr(), name, preferRulesName, in)
|
||||||
defer client.CloseIdleConnections()
|
defer client.CloseIdleConnections()
|
||||||
|
|
||||||
conn := N.NewBufferedConn(c)
|
conn := N.NewBufferedConn(c)
|
||||||
|
@ -48,7 +48,7 @@ func HandleConn(c net.Conn, in chan<- C.ConnContext, cache *cache.LruCache[strin
|
||||||
break // close connection
|
break // close connection
|
||||||
}
|
}
|
||||||
|
|
||||||
in <- inbound.NewHTTPS(request, conn)
|
in <- inbound.NewHTTPSWithInfos(request, conn, name, preferRulesName)
|
||||||
|
|
||||||
return // hijack connection
|
return // hijack connection
|
||||||
}
|
}
|
||||||
|
@ -61,7 +61,7 @@ func HandleConn(c net.Conn, in chan<- C.ConnContext, cache *cache.LruCache[strin
|
||||||
request.RequestURI = ""
|
request.RequestURI = ""
|
||||||
|
|
||||||
if isUpgradeRequest(request) {
|
if isUpgradeRequest(request) {
|
||||||
handleUpgrade(conn, request, in)
|
handleUpgrade(name, preferRulesName, conn, request, in)
|
||||||
|
|
||||||
return // hijack connection
|
return // hijack connection
|
||||||
}
|
}
|
||||||
|
|
|
@ -12,6 +12,8 @@ type Listener struct {
|
||||||
listener net.Listener
|
listener net.Listener
|
||||||
addr string
|
addr string
|
||||||
closed bool
|
closed bool
|
||||||
|
name string
|
||||||
|
preferRulesName string
|
||||||
}
|
}
|
||||||
|
|
||||||
// RawAddress implements C.Listener
|
// RawAddress implements C.Listener
|
||||||
|
@ -31,10 +33,14 @@ func (l *Listener) Close() error {
|
||||||
}
|
}
|
||||||
|
|
||||||
func New(addr string, in chan<- C.ConnContext) (*Listener, error) {
|
func New(addr string, in chan<- C.ConnContext) (*Listener, error) {
|
||||||
return NewWithAuthenticate(addr, in, true)
|
return NewWithAuthenticate(addr,"DEFAULT-HTTP","", in, true)
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewWithAuthenticate(addr string, in chan<- C.ConnContext, authenticate bool) (*Listener, error) {
|
func NewWithInfos(addr ,name ,preferRulesName string,in chan<-C.ConnContext)(*Listener,error){
|
||||||
|
return NewWithAuthenticate(addr,name,preferRulesName,in,true)
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewWithAuthenticate(addr,name,preferRulesName string, in chan<- C.ConnContext, authenticate bool) (*Listener, error) {
|
||||||
l, err := inbound.Listen("tcp", addr)
|
l, err := inbound.Listen("tcp", addr)
|
||||||
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -48,6 +54,8 @@ func NewWithAuthenticate(addr string, in chan<- C.ConnContext, authenticate bool
|
||||||
|
|
||||||
hl := &Listener{
|
hl := &Listener{
|
||||||
listener: l,
|
listener: l,
|
||||||
|
name: name,
|
||||||
|
preferRulesName: preferRulesName,
|
||||||
addr: addr,
|
addr: addr,
|
||||||
}
|
}
|
||||||
go func() {
|
go func() {
|
||||||
|
@ -59,7 +67,7 @@ func NewWithAuthenticate(addr string, in chan<- C.ConnContext, authenticate bool
|
||||||
}
|
}
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
go HandleConn(conn, in, c)
|
go HandleConn(hl.name,hl.preferRulesName,conn, in, c)
|
||||||
}
|
}
|
||||||
}()
|
}()
|
||||||
|
|
||||||
|
|
|
@ -25,7 +25,7 @@ func isUpgradeRequest(req *http.Request) bool {
|
||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
|
|
||||||
func handleUpgrade(conn net.Conn, request *http.Request, in chan<- C.ConnContext) {
|
func handleUpgrade(name,preferRulesName string,conn net.Conn, request *http.Request, in chan<- C.ConnContext) {
|
||||||
defer conn.Close()
|
defer conn.Close()
|
||||||
|
|
||||||
removeProxyHeaders(request.Header)
|
removeProxyHeaders(request.Header)
|
||||||
|
@ -43,7 +43,7 @@ func handleUpgrade(conn net.Conn, request *http.Request, in chan<- C.ConnContext
|
||||||
|
|
||||||
left, right := net.Pipe()
|
left, right := net.Pipe()
|
||||||
|
|
||||||
in <- inbound.NewHTTP(dstAddr, conn.RemoteAddr(), right)
|
in <- inbound.NewHTTPWithInfos(dstAddr, conn.RemoteAddr(), right,name,preferRulesName)
|
||||||
|
|
||||||
var bufferedLeft *N.BufferedConn
|
var bufferedLeft *N.BufferedConn
|
||||||
if request.TLS != nil {
|
if request.TLS != nil {
|
||||||
|
|
66
listener/inbound/base.go
Normal file
66
listener/inbound/base.go
Normal file
|
@ -0,0 +1,66 @@
|
||||||
|
package inbound
|
||||||
|
|
||||||
|
import (
|
||||||
|
"net"
|
||||||
|
"net/netip"
|
||||||
|
"strconv"
|
||||||
|
|
||||||
|
C "github.com/Dreamacro/clash/constant"
|
||||||
|
)
|
||||||
|
|
||||||
|
type Base struct {
|
||||||
|
name string
|
||||||
|
preferRulesName string
|
||||||
|
listenAddr netip.Addr
|
||||||
|
port int
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewBase(options *BaseOption) (*Base, error) {
|
||||||
|
if options.Listen == "" {
|
||||||
|
options.Listen = "0.0.0.0"
|
||||||
|
}
|
||||||
|
addr, err := netip.ParseAddr(options.Listen)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return &Base{
|
||||||
|
name: options.Name,
|
||||||
|
listenAddr: addr,
|
||||||
|
preferRulesName: options.PreferRulesName,
|
||||||
|
port: options.Port,
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Address implements constant.NewListener
|
||||||
|
func (b *Base) Address() string {
|
||||||
|
return b.RawAddress()
|
||||||
|
}
|
||||||
|
|
||||||
|
// Close implements constant.NewListener
|
||||||
|
func (*Base) Close() error {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Name implements constant.NewListener
|
||||||
|
func (b *Base) Name() string {
|
||||||
|
return b.name
|
||||||
|
}
|
||||||
|
|
||||||
|
// RawAddress implements constant.NewListener
|
||||||
|
func (b *Base) RawAddress() string {
|
||||||
|
return net.JoinHostPort(b.listenAddr.String(), strconv.Itoa(int(b.port)))
|
||||||
|
}
|
||||||
|
|
||||||
|
// ReCreate implements constant.NewListener
|
||||||
|
func (*Base) ReCreate(tcpIn chan<- C.ConnContext, udpIn chan<- *C.PacketAdapter) error {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
type BaseOption struct {
|
||||||
|
Name string `inbound:"name"`
|
||||||
|
Listen string `inbound:"listen,omitempty"`
|
||||||
|
Port int `inbound:"port"`
|
||||||
|
PreferRulesName string `inbound:"rule,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
var _ C.NewListener = (*Base)(nil)
|
52
listener/inbound/http.go
Normal file
52
listener/inbound/http.go
Normal file
|
@ -0,0 +1,52 @@
|
||||||
|
package inbound
|
||||||
|
|
||||||
|
import (
|
||||||
|
C "github.com/Dreamacro/clash/constant"
|
||||||
|
"github.com/Dreamacro/clash/listener/http"
|
||||||
|
"github.com/Dreamacro/clash/log"
|
||||||
|
)
|
||||||
|
|
||||||
|
type HTTPOption struct {
|
||||||
|
BaseOption
|
||||||
|
}
|
||||||
|
type HTTP struct {
|
||||||
|
*Base
|
||||||
|
l *http.Listener
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewHTTP(options *HTTPOption) (*HTTP, error) {
|
||||||
|
base, err := NewBase(&options.BaseOption)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return &HTTP{
|
||||||
|
Base: base,
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Address implements constant.NewListener
|
||||||
|
func (h *HTTP) Address() string {
|
||||||
|
return h.l.Address()
|
||||||
|
}
|
||||||
|
|
||||||
|
// ReCreate implements constant.NewListener
|
||||||
|
func (h *HTTP) ReCreate(tcpIn chan<- C.ConnContext, udpIn chan<- *C.PacketAdapter) error {
|
||||||
|
var err error
|
||||||
|
_ = h.Close()
|
||||||
|
h.l, err = http.NewWithInfos(h.RawAddress(), h.name, h.preferRulesName, tcpIn)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
log.Infoln("HTTP[%s] proxy listening at: %s", h.Name(), h.Address())
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Close implements constant.NewListener
|
||||||
|
func (h *HTTP) Close() error {
|
||||||
|
if h.l != nil {
|
||||||
|
return h.l.Close()
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
var _ C.NewListener = (*HTTP)(nil)
|
79
listener/inbound/mixed.go
Normal file
79
listener/inbound/mixed.go
Normal file
|
@ -0,0 +1,79 @@
|
||||||
|
package inbound
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
C "github.com/Dreamacro/clash/constant"
|
||||||
|
"github.com/Dreamacro/clash/log"
|
||||||
|
|
||||||
|
"github.com/Dreamacro/clash/listener/mixed"
|
||||||
|
"github.com/Dreamacro/clash/listener/socks"
|
||||||
|
)
|
||||||
|
|
||||||
|
type MixedOption struct {
|
||||||
|
BaseOption
|
||||||
|
UDP *bool `inbound:"udp,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type Mixed struct {
|
||||||
|
*Base
|
||||||
|
l *mixed.Listener
|
||||||
|
lUDP *socks.UDPListener
|
||||||
|
udp bool
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewMixed(options *MixedOption) (*Mixed, error) {
|
||||||
|
base, err := NewBase(&options.BaseOption)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return &Mixed{
|
||||||
|
Base: base,
|
||||||
|
udp: options.UDP == nil || *options.UDP,
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Address implements constant.NewListener
|
||||||
|
func (m *Mixed) Address() string {
|
||||||
|
return m.l.Address()
|
||||||
|
}
|
||||||
|
|
||||||
|
// ReCreate implements constant.NewListener
|
||||||
|
func (m *Mixed) ReCreate(tcpIn chan<- C.ConnContext, udpIn chan<- *C.PacketAdapter) error {
|
||||||
|
var err error
|
||||||
|
_ = m.Close()
|
||||||
|
m.l, err = mixed.NewWithInfos(m.RawAddress(), m.name, m.preferRulesName, tcpIn)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if m.udp {
|
||||||
|
m.lUDP, err = socks.NewUDPWithInfos(m.Address(), m.name, m.preferRulesName, udpIn)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
log.Infoln("Mixed(http+socks)[%s] proxy listening at: %s", m.Name(), m.Address())
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Close implements constant.NewListener
|
||||||
|
func (m *Mixed) Close() error {
|
||||||
|
var err error
|
||||||
|
if m.l != nil {
|
||||||
|
if tcpErr := m.l.Close(); tcpErr != nil {
|
||||||
|
err = tcpErr
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if m.udp && m.lUDP != nil {
|
||||||
|
if udpErr := m.lUDP.Close(); udpErr != nil {
|
||||||
|
if err == nil {
|
||||||
|
err = udpErr
|
||||||
|
} else {
|
||||||
|
return fmt.Errorf("close tcp err: %s, close udp err: %s", err.Error(), udpErr.Error())
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
var _ C.NewListener = (*Mixed)(nil)
|
53
listener/inbound/redir.go
Normal file
53
listener/inbound/redir.go
Normal file
|
@ -0,0 +1,53 @@
|
||||||
|
package inbound
|
||||||
|
|
||||||
|
import (
|
||||||
|
C "github.com/Dreamacro/clash/constant"
|
||||||
|
"github.com/Dreamacro/clash/listener/redir"
|
||||||
|
"github.com/Dreamacro/clash/log"
|
||||||
|
)
|
||||||
|
|
||||||
|
type RedirOption struct {
|
||||||
|
BaseOption
|
||||||
|
}
|
||||||
|
|
||||||
|
type Redir struct {
|
||||||
|
*Base
|
||||||
|
l *redir.Listener
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewRedir(options *RedirOption) (*Redir, error) {
|
||||||
|
base, err := NewBase(&options.BaseOption)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return &Redir{
|
||||||
|
Base: base,
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Address implements constant.NewListener
|
||||||
|
func (r *Redir) Address() string {
|
||||||
|
return r.l.Address()
|
||||||
|
}
|
||||||
|
|
||||||
|
// ReCreate implements constant.NewListener
|
||||||
|
func (r *Redir) ReCreate(tcpIn chan<- C.ConnContext, udpIn chan<- *C.PacketAdapter) error {
|
||||||
|
var err error
|
||||||
|
_ = r.Close()
|
||||||
|
r.l, err = redir.NewWithInfos(r.Address(), r.name, r.preferRulesName, tcpIn)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
log.Infoln("Redir[%s] proxy listening at: %s", r.Name(), r.Address())
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Close implements constant.NewListener
|
||||||
|
func (r *Redir) Close() error {
|
||||||
|
if r.l != nil {
|
||||||
|
r.l.Close()
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
var _ C.NewListener = (*Redir)(nil)
|
81
listener/inbound/socks.go
Normal file
81
listener/inbound/socks.go
Normal file
|
@ -0,0 +1,81 @@
|
||||||
|
package inbound
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"sync"
|
||||||
|
|
||||||
|
C "github.com/Dreamacro/clash/constant"
|
||||||
|
"github.com/Dreamacro/clash/listener/socks"
|
||||||
|
"github.com/Dreamacro/clash/log"
|
||||||
|
)
|
||||||
|
|
||||||
|
type SocksOption struct {
|
||||||
|
BaseOption
|
||||||
|
UDP *bool `inbound:"udp,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type Socks struct {
|
||||||
|
*Base
|
||||||
|
mux sync.Mutex
|
||||||
|
udp bool
|
||||||
|
stl *socks.Listener
|
||||||
|
sul *socks.UDPListener
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewSocks(options *SocksOption) (*Socks, error) {
|
||||||
|
base, err := NewBase(&options.BaseOption)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return &Socks{
|
||||||
|
Base: base,
|
||||||
|
udp: options.UDP == nil || *options.UDP,
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Close implements constant.NewListener
|
||||||
|
func (s *Socks) Close() error {
|
||||||
|
var err error
|
||||||
|
if s.stl != nil {
|
||||||
|
if tcpErr := s.stl.Close(); tcpErr != nil {
|
||||||
|
err = tcpErr
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if s.udp && s.sul != nil {
|
||||||
|
if udpErr := s.sul.Close(); udpErr != nil {
|
||||||
|
if err == nil {
|
||||||
|
err = udpErr
|
||||||
|
} else {
|
||||||
|
return fmt.Errorf("close tcp err: %s, close udp err: %s", err.Error(), udpErr.Error())
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Address implements constant.NewListener
|
||||||
|
func (s *Socks) Address() string {
|
||||||
|
return s.stl.Address()
|
||||||
|
}
|
||||||
|
|
||||||
|
// ReCreate implements constant.NewListener
|
||||||
|
func (s *Socks) ReCreate(tcpIn chan<- C.ConnContext, udpIn chan<- *C.PacketAdapter) error {
|
||||||
|
s.mux.Lock()
|
||||||
|
defer s.mux.Unlock()
|
||||||
|
var err error
|
||||||
|
_ = s.Close()
|
||||||
|
if s.stl, err = socks.NewWithInfos(s.RawAddress(), s.name, s.preferRulesName, tcpIn); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if s.udp {
|
||||||
|
if s.sul, err = socks.NewUDPWithInfos(s.RawAddress(), s.name, s.preferRulesName, udpIn); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Infoln("SOCKS[%s] proxy listening at: %s", s.Name(), s.Address())
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
var _ C.NewListener = (*Socks)(nil)
|
84
listener/inbound/tproxy.go
Normal file
84
listener/inbound/tproxy.go
Normal file
|
@ -0,0 +1,84 @@
|
||||||
|
package inbound
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
C "github.com/Dreamacro/clash/constant"
|
||||||
|
"github.com/Dreamacro/clash/listener/tproxy"
|
||||||
|
"github.com/Dreamacro/clash/log"
|
||||||
|
)
|
||||||
|
|
||||||
|
type TProxyOption struct {
|
||||||
|
BaseOption
|
||||||
|
UDP *bool `inbound:"udp,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type TProxy struct {
|
||||||
|
*Base
|
||||||
|
lUDP *tproxy.UDPListener
|
||||||
|
lTCP *tproxy.Listener
|
||||||
|
udp bool
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewTProxy(options *TProxyOption) (*TProxy, error) {
|
||||||
|
base, err := NewBase(&options.BaseOption)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return &TProxy{
|
||||||
|
Base: base,
|
||||||
|
udp: options.UDP == nil || *options.UDP,
|
||||||
|
}, nil
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
// Address implements constant.NewListener
|
||||||
|
func (t *TProxy) Address() string {
|
||||||
|
return t.lTCP.Address()
|
||||||
|
}
|
||||||
|
|
||||||
|
// ReCreate implements constant.NewListener
|
||||||
|
func (t *TProxy) ReCreate(tcpIn chan<- C.ConnContext, udpIn chan<- *C.PacketAdapter) error {
|
||||||
|
var err error
|
||||||
|
_ = t.Close()
|
||||||
|
t.lTCP, err = tproxy.NewWithInfos(t.RawAddress(), t.name, t.preferRulesName, tcpIn)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if t.udp {
|
||||||
|
if t.lUDP != nil {
|
||||||
|
t.lUDP, err = tproxy.NewUDPWithInfos(t.Address(), t.name, t.preferRulesName, udpIn)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
log.Infoln("TProxy[%s] proxy listening at: %s", t.Name(), t.Address())
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Close implements constant.NewListener
|
||||||
|
func (t *TProxy) Close() error {
|
||||||
|
var tcpErr error
|
||||||
|
var udpErr error
|
||||||
|
if t.lTCP != nil {
|
||||||
|
tcpErr = t.lTCP.Close()
|
||||||
|
}
|
||||||
|
if t.lUDP != nil {
|
||||||
|
udpErr = t.lUDP.Close()
|
||||||
|
}
|
||||||
|
|
||||||
|
if tcpErr != nil && udpErr != nil {
|
||||||
|
return fmt.Errorf("tcp close err: %s and udp close err: %s", tcpErr, udpErr)
|
||||||
|
}
|
||||||
|
if tcpErr != nil {
|
||||||
|
return tcpErr
|
||||||
|
}
|
||||||
|
if udpErr != nil {
|
||||||
|
return udpErr
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
var _ C.NewListener = (*TProxy)(nil)
|
|
@ -9,9 +9,7 @@ import (
|
||||||
"strings"
|
"strings"
|
||||||
"sync"
|
"sync"
|
||||||
|
|
||||||
"github.com/Dreamacro/clash/adapter/inbound"
|
|
||||||
"github.com/Dreamacro/clash/component/ebpf"
|
"github.com/Dreamacro/clash/component/ebpf"
|
||||||
"github.com/Dreamacro/clash/config"
|
|
||||||
C "github.com/Dreamacro/clash/constant"
|
C "github.com/Dreamacro/clash/constant"
|
||||||
"github.com/Dreamacro/clash/listener/autoredir"
|
"github.com/Dreamacro/clash/listener/autoredir"
|
||||||
"github.com/Dreamacro/clash/listener/http"
|
"github.com/Dreamacro/clash/listener/http"
|
||||||
|
@ -66,8 +64,8 @@ var (
|
||||||
autoRedirMux sync.Mutex
|
autoRedirMux sync.Mutex
|
||||||
tcMux sync.Mutex
|
tcMux sync.Mutex
|
||||||
|
|
||||||
LastTunConf config.Tun
|
LastTunConf sing_tun.Tun
|
||||||
LastTuicConf config.TuicServer
|
LastTuicConf tuic.TuicServer
|
||||||
)
|
)
|
||||||
|
|
||||||
type Ports struct {
|
type Ports struct {
|
||||||
|
@ -80,18 +78,18 @@ type Ports struct {
|
||||||
VmessConfig string `json:"vmess-config"`
|
VmessConfig string `json:"vmess-config"`
|
||||||
}
|
}
|
||||||
|
|
||||||
func GetTunConf() config.Tun {
|
func GetTunConf() sing_tun.Tun {
|
||||||
if tunLister == nil {
|
if tunLister == nil {
|
||||||
return config.Tun{
|
return sing_tun.Tun{
|
||||||
Enable: false,
|
Enable: false,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
return tunLister.Config()
|
return tunLister.Config()
|
||||||
}
|
}
|
||||||
|
|
||||||
func GetTuicConf() config.TuicServer {
|
func GetTuicConf() tuic.TuicServer {
|
||||||
if tuicListener == nil {
|
if tuicListener == nil {
|
||||||
return config.TuicServer{Enable: false}
|
return tuic.TuicServer{Enable: false}
|
||||||
}
|
}
|
||||||
return tuicListener.Config()
|
return tuicListener.Config()
|
||||||
}
|
}
|
||||||
|
@ -146,7 +144,7 @@ func ReCreateHTTP(port int, tcpIn chan<- C.ConnContext) {
|
||||||
log.Infoln("HTTP proxy listening at: %s", httpListener.Address())
|
log.Infoln("HTTP proxy listening at: %s", httpListener.Address())
|
||||||
}
|
}
|
||||||
|
|
||||||
func ReCreateSocks(port int, tcpIn chan<- C.ConnContext, udpIn chan<- *inbound.PacketAdapter) {
|
func ReCreateSocks(port int, tcpIn chan<- C.ConnContext, udpIn chan<- *C.PacketAdapter) {
|
||||||
socksMux.Lock()
|
socksMux.Lock()
|
||||||
defer socksMux.Unlock()
|
defer socksMux.Unlock()
|
||||||
|
|
||||||
|
@ -205,7 +203,7 @@ func ReCreateSocks(port int, tcpIn chan<- C.ConnContext, udpIn chan<- *inbound.P
|
||||||
log.Infoln("SOCKS proxy listening at: %s", socksListener.Address())
|
log.Infoln("SOCKS proxy listening at: %s", socksListener.Address())
|
||||||
}
|
}
|
||||||
|
|
||||||
func ReCreateRedir(port int, tcpIn chan<- C.ConnContext, udpIn chan<- *inbound.PacketAdapter) {
|
func ReCreateRedir(port int, tcpIn chan<- C.ConnContext, udpIn chan<- *C.PacketAdapter) {
|
||||||
redirMux.Lock()
|
redirMux.Lock()
|
||||||
defer redirMux.Unlock()
|
defer redirMux.Unlock()
|
||||||
|
|
||||||
|
@ -251,7 +249,7 @@ func ReCreateRedir(port int, tcpIn chan<- C.ConnContext, udpIn chan<- *inbound.P
|
||||||
log.Infoln("Redirect proxy listening at: %s", redirListener.Address())
|
log.Infoln("Redirect proxy listening at: %s", redirListener.Address())
|
||||||
}
|
}
|
||||||
|
|
||||||
func ReCreateShadowSocks(shadowSocksConfig string, tcpIn chan<- C.ConnContext, udpIn chan<- *inbound.PacketAdapter) {
|
func ReCreateShadowSocks(shadowSocksConfig string, tcpIn chan<- C.ConnContext, udpIn chan<- *C.PacketAdapter) {
|
||||||
ssMux.Lock()
|
ssMux.Lock()
|
||||||
defer ssMux.Unlock()
|
defer ssMux.Unlock()
|
||||||
|
|
||||||
|
@ -291,7 +289,7 @@ func ReCreateShadowSocks(shadowSocksConfig string, tcpIn chan<- C.ConnContext, u
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
func ReCreateVmess(vmessConfig string, tcpIn chan<- C.ConnContext, udpIn chan<- *inbound.PacketAdapter) {
|
func ReCreateVmess(vmessConfig string, tcpIn chan<- C.ConnContext, udpIn chan<- *C.PacketAdapter) {
|
||||||
vmessMux.Lock()
|
vmessMux.Lock()
|
||||||
defer vmessMux.Unlock()
|
defer vmessMux.Unlock()
|
||||||
|
|
||||||
|
@ -331,7 +329,7 @@ func ReCreateVmess(vmessConfig string, tcpIn chan<- C.ConnContext, udpIn chan<-
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
func ReCreateTuic(config config.TuicServer, tcpIn chan<- C.ConnContext, udpIn chan<- *inbound.PacketAdapter) {
|
func ReCreateTuic(config tuic.TuicServer, tcpIn chan<- C.ConnContext, udpIn chan<- *C.PacketAdapter) {
|
||||||
tuicMux.Lock()
|
tuicMux.Lock()
|
||||||
defer func() {
|
defer func() {
|
||||||
LastTuicConf = config
|
LastTuicConf = config
|
||||||
|
@ -373,7 +371,7 @@ func ReCreateTuic(config config.TuicServer, tcpIn chan<- C.ConnContext, udpIn ch
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
func ReCreateTProxy(port int, tcpIn chan<- C.ConnContext, udpIn chan<- *inbound.PacketAdapter) {
|
func ReCreateTProxy(port int, tcpIn chan<- C.ConnContext, udpIn chan<- *C.PacketAdapter) {
|
||||||
tproxyMux.Lock()
|
tproxyMux.Lock()
|
||||||
defer tproxyMux.Unlock()
|
defer tproxyMux.Unlock()
|
||||||
|
|
||||||
|
@ -419,7 +417,7 @@ func ReCreateTProxy(port int, tcpIn chan<- C.ConnContext, udpIn chan<- *inbound.
|
||||||
log.Infoln("TProxy server listening at: %s", tproxyListener.Address())
|
log.Infoln("TProxy server listening at: %s", tproxyListener.Address())
|
||||||
}
|
}
|
||||||
|
|
||||||
func ReCreateMixed(port int, tcpIn chan<- C.ConnContext, udpIn chan<- *inbound.PacketAdapter) {
|
func ReCreateMixed(port int, tcpIn chan<- C.ConnContext, udpIn chan<- *C.PacketAdapter) {
|
||||||
mixedMux.Lock()
|
mixedMux.Lock()
|
||||||
defer mixedMux.Unlock()
|
defer mixedMux.Unlock()
|
||||||
|
|
||||||
|
@ -474,7 +472,7 @@ func ReCreateMixed(port int, tcpIn chan<- C.ConnContext, udpIn chan<- *inbound.P
|
||||||
log.Infoln("Mixed(http+socks) proxy listening at: %s", mixedListener.Address())
|
log.Infoln("Mixed(http+socks) proxy listening at: %s", mixedListener.Address())
|
||||||
}
|
}
|
||||||
|
|
||||||
func ReCreateTun(tunConf config.Tun, tcpIn chan<- C.ConnContext, udpIn chan<- *inbound.PacketAdapter) {
|
func ReCreateTun(tunConf sing_tun.Tun, tcpIn chan<- C.ConnContext, udpIn chan<- *C.PacketAdapter) {
|
||||||
tunMux.Lock()
|
tunMux.Lock()
|
||||||
defer func() {
|
defer func() {
|
||||||
LastTunConf = tunConf
|
LastTunConf = tunConf
|
||||||
|
@ -538,7 +536,7 @@ func ReCreateRedirToTun(ifaceNames []string) {
|
||||||
log.Infoln("Attached tc ebpf program to interfaces %v", tcProgram.RawNICs())
|
log.Infoln("Attached tc ebpf program to interfaces %v", tcProgram.RawNICs())
|
||||||
}
|
}
|
||||||
|
|
||||||
func ReCreateAutoRedir(ifaceNames []string, tcpIn chan<- C.ConnContext, _ chan<- *inbound.PacketAdapter) {
|
func ReCreateAutoRedir(ifaceNames []string, tcpIn chan<- C.ConnContext, _ chan<- *C.PacketAdapter) {
|
||||||
autoRedirMux.Lock()
|
autoRedirMux.Lock()
|
||||||
defer autoRedirMux.Unlock()
|
defer autoRedirMux.Unlock()
|
||||||
|
|
||||||
|
@ -594,7 +592,7 @@ func ReCreateAutoRedir(ifaceNames []string, tcpIn chan<- C.ConnContext, _ chan<-
|
||||||
log.Infoln("Auto redirect proxy listening at: %s, attached tc ebpf program to interfaces %v", autoRedirListener.Address(), autoRedirProgram.RawNICs())
|
log.Infoln("Auto redirect proxy listening at: %s, attached tc ebpf program to interfaces %v", autoRedirListener.Address(), autoRedirProgram.RawNICs())
|
||||||
}
|
}
|
||||||
|
|
||||||
func PatchTunnel(tunnels []config.Tunnel, tcpIn chan<- C.ConnContext, udpIn chan<- *inbound.PacketAdapter) {
|
func PatchTunnel(tunnels []tunnel.Tunnel, tcpIn chan<- C.ConnContext, udpIn chan<- *C.PacketAdapter) {
|
||||||
tunnelMux.Lock()
|
tunnelMux.Lock()
|
||||||
defer tunnelMux.Unlock()
|
defer tunnelMux.Unlock()
|
||||||
|
|
||||||
|
@ -633,7 +631,7 @@ func PatchTunnel(tunnels []config.Tunnel, tcpIn chan<- C.ConnContext, udpIn chan
|
||||||
|
|
||||||
newElm := lo.FlatMap(
|
newElm := lo.FlatMap(
|
||||||
tunnels,
|
tunnels,
|
||||||
func(tunnel config.Tunnel, _ int) []addrProxy {
|
func(tunnel tunnel.Tunnel, _ int) []addrProxy {
|
||||||
return lo.Map(
|
return lo.Map(
|
||||||
tunnel.Network,
|
tunnel.Network,
|
||||||
func(network string, _ int) addrProxy {
|
func(network string, _ int) addrProxy {
|
||||||
|
@ -747,7 +745,7 @@ func genAddr(host string, port int, allowLan bool) string {
|
||||||
return fmt.Sprintf("127.0.0.1:%d", port)
|
return fmt.Sprintf("127.0.0.1:%d", port)
|
||||||
}
|
}
|
||||||
|
|
||||||
func hasTunConfigChange(tunConf *config.Tun) bool {
|
func hasTunConfigChange(tunConf *sing_tun.Tun) bool {
|
||||||
if LastTunConf.Enable != tunConf.Enable ||
|
if LastTunConf.Enable != tunConf.Enable ||
|
||||||
LastTunConf.Device != tunConf.Device ||
|
LastTunConf.Device != tunConf.Device ||
|
||||||
LastTunConf.Stack != tunConf.Stack ||
|
LastTunConf.Stack != tunConf.Stack ||
|
||||||
|
@ -835,5 +833,5 @@ func Cleanup(wait bool) {
|
||||||
tunLister.Close()
|
tunLister.Close()
|
||||||
tunLister = nil
|
tunLister = nil
|
||||||
}
|
}
|
||||||
LastTunConf = config.Tun{}
|
LastTunConf = sing_tun.Tun{}
|
||||||
}
|
}
|
||||||
|
|
|
@ -16,7 +16,8 @@ import (
|
||||||
type Listener struct {
|
type Listener struct {
|
||||||
listener net.Listener
|
listener net.Listener
|
||||||
addr string
|
addr string
|
||||||
|
name string
|
||||||
|
preferRulesName string
|
||||||
cache *cache.LruCache[string, bool]
|
cache *cache.LruCache[string, bool]
|
||||||
closed bool
|
closed bool
|
||||||
}
|
}
|
||||||
|
@ -38,6 +39,10 @@ func (l *Listener) Close() error {
|
||||||
}
|
}
|
||||||
|
|
||||||
func New(addr string, in chan<- C.ConnContext) (*Listener, error) {
|
func New(addr string, in chan<- C.ConnContext) (*Listener, error) {
|
||||||
|
return NewWithInfos(addr, "DEFAULT-MIXED", "", in)
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewWithInfos(addr, name, preferRulesName string, in chan<- C.ConnContext) (*Listener, error) {
|
||||||
l, err := inbound.Listen("tcp", addr)
|
l, err := inbound.Listen("tcp", addr)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
|
@ -46,6 +51,8 @@ func New(addr string, in chan<- C.ConnContext) (*Listener, error) {
|
||||||
ml := &Listener{
|
ml := &Listener{
|
||||||
listener: l,
|
listener: l,
|
||||||
addr: addr,
|
addr: addr,
|
||||||
|
name: name,
|
||||||
|
preferRulesName: preferRulesName,
|
||||||
cache: cache.New[string, bool](cache.WithAge[string, bool](30)),
|
cache: cache.New[string, bool](cache.WithAge[string, bool](30)),
|
||||||
}
|
}
|
||||||
go func() {
|
go func() {
|
||||||
|
@ -57,14 +64,14 @@ func New(addr string, in chan<- C.ConnContext) (*Listener, error) {
|
||||||
}
|
}
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
go handleConn(c, in, ml.cache)
|
go handleConn(ml.name, ml.preferRulesName, c, in, ml.cache)
|
||||||
}
|
}
|
||||||
}()
|
}()
|
||||||
|
|
||||||
return ml, nil
|
return ml, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func handleConn(conn net.Conn, in chan<- C.ConnContext, cache *cache.LruCache[string, bool]) {
|
func handleConn(name, preferRulesName string, conn net.Conn, in chan<- C.ConnContext, cache *cache.LruCache[string, bool]) {
|
||||||
conn.(*net.TCPConn).SetKeepAlive(true)
|
conn.(*net.TCPConn).SetKeepAlive(true)
|
||||||
|
|
||||||
bufConn := N.NewBufferedConn(conn)
|
bufConn := N.NewBufferedConn(conn)
|
||||||
|
@ -75,10 +82,10 @@ func handleConn(conn net.Conn, in chan<- C.ConnContext, cache *cache.LruCache[st
|
||||||
|
|
||||||
switch head[0] {
|
switch head[0] {
|
||||||
case socks4.Version:
|
case socks4.Version:
|
||||||
socks.HandleSocks4(bufConn, in)
|
socks.HandleSocks4(name, preferRulesName, bufConn, in)
|
||||||
case socks5.Version:
|
case socks5.Version:
|
||||||
socks.HandleSocks5(bufConn, in)
|
socks.HandleSocks5(name, preferRulesName, bufConn, in)
|
||||||
default:
|
default:
|
||||||
http.HandleConn(bufConn, in, cache)
|
http.HandleConn(name, preferRulesName, bufConn, in, cache)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
50
listener/parse.go
Normal file
50
listener/parse.go
Normal file
|
@ -0,0 +1,50 @@
|
||||||
|
package listener
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"github.com/Dreamacro/clash/common/structure"
|
||||||
|
C "github.com/Dreamacro/clash/constant"
|
||||||
|
IN "github.com/Dreamacro/clash/listener/inbound"
|
||||||
|
)
|
||||||
|
|
||||||
|
var keyReplacer = strings.NewReplacer("_", "-")
|
||||||
|
|
||||||
|
func ParseListener(mapping map[string]any) (C.NewListener, error) {
|
||||||
|
decoder := structure.NewDecoder(structure.Option{TagName: "inbound", WeaklyTypedInput: true, KeyReplacer: keyReplacer})
|
||||||
|
proxyType, existType := mapping["type"].(string)
|
||||||
|
if !existType {
|
||||||
|
return nil, fmt.Errorf("missing type")
|
||||||
|
}
|
||||||
|
|
||||||
|
var (
|
||||||
|
listener C.NewListener
|
||||||
|
err error
|
||||||
|
)
|
||||||
|
switch proxyType {
|
||||||
|
case "socks":
|
||||||
|
socksOption := &IN.SocksOption{}
|
||||||
|
decoder.Decode(mapping, socksOption)
|
||||||
|
listener, err = IN.NewSocks(socksOption)
|
||||||
|
case "http":
|
||||||
|
httpOption := &IN.HTTPOption{}
|
||||||
|
decoder.Decode(mapping, httpOption)
|
||||||
|
listener, err = IN.NewHTTP(httpOption)
|
||||||
|
case "tproxy":
|
||||||
|
tproxyOption := &IN.TProxyOption{}
|
||||||
|
decoder.Decode(mapping, tproxyOption)
|
||||||
|
listener, err = IN.NewTProxy(tproxyOption)
|
||||||
|
case "redir":
|
||||||
|
redirOption := &IN.RedirOption{}
|
||||||
|
decoder.Decode(mapping, redirOption)
|
||||||
|
listener, err = IN.NewRedir(redirOption)
|
||||||
|
case "mixed":
|
||||||
|
mixedOption := &IN.MixedOption{}
|
||||||
|
decoder.Decode(mapping, mixedOption)
|
||||||
|
listener, err = IN.NewMixed(mixedOption)
|
||||||
|
default:
|
||||||
|
return nil, fmt.Errorf("unsupport proxy type: %s", proxyType)
|
||||||
|
}
|
||||||
|
return listener, err
|
||||||
|
}
|
|
@ -11,6 +11,8 @@ type Listener struct {
|
||||||
listener net.Listener
|
listener net.Listener
|
||||||
addr string
|
addr string
|
||||||
closed bool
|
closed bool
|
||||||
|
name string
|
||||||
|
preferRulesName string
|
||||||
}
|
}
|
||||||
|
|
||||||
// RawAddress implements C.Listener
|
// RawAddress implements C.Listener
|
||||||
|
@ -30,6 +32,10 @@ func (l *Listener) Close() error {
|
||||||
}
|
}
|
||||||
|
|
||||||
func New(addr string, in chan<- C.ConnContext) (*Listener, error) {
|
func New(addr string, in chan<- C.ConnContext) (*Listener, error) {
|
||||||
|
return NewWithInfos(addr,"DEFAULT-REDIR","",in)
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewWithInfos(addr,name,preferRulesName string, in chan<- C.ConnContext) (*Listener, error) {
|
||||||
l, err := net.Listen("tcp", addr)
|
l, err := net.Listen("tcp", addr)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
|
@ -37,6 +43,8 @@ func New(addr string, in chan<- C.ConnContext) (*Listener, error) {
|
||||||
rl := &Listener{
|
rl := &Listener{
|
||||||
listener: l,
|
listener: l,
|
||||||
addr: addr,
|
addr: addr,
|
||||||
|
name: name,
|
||||||
|
preferRulesName: preferRulesName,
|
||||||
}
|
}
|
||||||
|
|
||||||
go func() {
|
go func() {
|
||||||
|
@ -48,19 +56,18 @@ func New(addr string, in chan<- C.ConnContext) (*Listener, error) {
|
||||||
}
|
}
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
go handleRedir(c, in)
|
go handleRedir(rl.name,rl.preferRulesName,c, in)
|
||||||
}
|
}
|
||||||
}()
|
}()
|
||||||
|
|
||||||
return rl, nil
|
return rl, nil
|
||||||
}
|
}
|
||||||
|
func handleRedir(name,preferRulesName string,conn net.Conn, in chan<- C.ConnContext) {
|
||||||
func handleRedir(conn net.Conn, in chan<- C.ConnContext) {
|
|
||||||
target, err := parserPacket(conn)
|
target, err := parserPacket(conn)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
conn.Close()
|
conn.Close()
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
conn.(*net.TCPConn).SetKeepAlive(true)
|
conn.(*net.TCPConn).SetKeepAlive(true)
|
||||||
in <- inbound.NewSocket(target, conn, C.REDIR)
|
in <- inbound.NewSocketWithInfos(target, conn, C.REDIR,name,preferRulesName)
|
||||||
}
|
}
|
||||||
|
|
|
@ -21,7 +21,7 @@ type Listener struct {
|
||||||
|
|
||||||
var _listener *Listener
|
var _listener *Listener
|
||||||
|
|
||||||
func New(config string, tcpIn chan<- C.ConnContext, udpIn chan<- *inbound.PacketAdapter) (*Listener, error) {
|
func New(config string, tcpIn chan<- C.ConnContext, udpIn chan<- *C.PacketAdapter) (*Listener, error) {
|
||||||
addr, cipher, password, err := ParseSSURL(config)
|
addr, cipher, password, err := ParseSSURL(config)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
|
|
|
@ -17,7 +17,7 @@ type UDPListener struct {
|
||||||
closed bool
|
closed bool
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewUDP(addr string, pickCipher core.Cipher, in chan<- *inbound.PacketAdapter) (*UDPListener, error) {
|
func NewUDP(addr string, pickCipher core.Cipher, in chan<- *C.PacketAdapter) (*UDPListener, error) {
|
||||||
l, err := net.ListenPacket("udp", addr)
|
l, err := net.ListenPacket("udp", addr)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
|
@ -53,7 +53,7 @@ func (l *UDPListener) Close() error {
|
||||||
return l.packetConn.Close()
|
return l.packetConn.Close()
|
||||||
}
|
}
|
||||||
|
|
||||||
func handleSocksUDP(pc net.PacketConn, in chan<- *inbound.PacketAdapter, buf []byte, addr net.Addr) {
|
func handleSocksUDP(pc net.PacketConn, in chan<- *C.PacketAdapter, buf []byte, addr net.Addr) {
|
||||||
tgtAddr := socks5.SplitAddr(buf)
|
tgtAddr := socks5.SplitAddr(buf)
|
||||||
if tgtAddr == nil {
|
if tgtAddr == nil {
|
||||||
// Unresolved UDP packet, return buffer to the pool
|
// Unresolved UDP packet, return buffer to the pool
|
||||||
|
|
|
@ -24,7 +24,7 @@ const UDPTimeout = 5 * time.Minute
|
||||||
|
|
||||||
type ListenerHandler struct {
|
type ListenerHandler struct {
|
||||||
TcpIn chan<- C.ConnContext
|
TcpIn chan<- C.ConnContext
|
||||||
UdpIn chan<- *inbound.PacketAdapter
|
UdpIn chan<- *C.PacketAdapter
|
||||||
Type C.Type
|
Type C.Type
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -32,7 +32,7 @@ type Listener struct {
|
||||||
|
|
||||||
var _listener *Listener
|
var _listener *Listener
|
||||||
|
|
||||||
func New(config string, tcpIn chan<- C.ConnContext, udpIn chan<- *inbound.PacketAdapter) (C.AdvanceListener, error) {
|
func New(config string, tcpIn chan<- C.ConnContext, udpIn chan<- *C.PacketAdapter) (C.AdvanceListener, error) {
|
||||||
addr, cipher, password, err := embedSS.ParseSSURL(config)
|
addr, cipher, password, err := embedSS.ParseSSURL(config)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
|
|
|
@ -8,10 +8,8 @@ import (
|
||||||
"strconv"
|
"strconv"
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
"github.com/Dreamacro/clash/adapter/inbound"
|
|
||||||
"github.com/Dreamacro/clash/component/dialer"
|
"github.com/Dreamacro/clash/component/dialer"
|
||||||
"github.com/Dreamacro/clash/component/iface"
|
"github.com/Dreamacro/clash/component/iface"
|
||||||
"github.com/Dreamacro/clash/config"
|
|
||||||
C "github.com/Dreamacro/clash/constant"
|
C "github.com/Dreamacro/clash/constant"
|
||||||
"github.com/Dreamacro/clash/listener/sing"
|
"github.com/Dreamacro/clash/listener/sing"
|
||||||
"github.com/Dreamacro/clash/log"
|
"github.com/Dreamacro/clash/log"
|
||||||
|
@ -27,7 +25,7 @@ var InterfaceName = "Meta"
|
||||||
|
|
||||||
type Listener struct {
|
type Listener struct {
|
||||||
closed bool
|
closed bool
|
||||||
options config.Tun
|
options Tun
|
||||||
handler *ListenerHandler
|
handler *ListenerHandler
|
||||||
tunName string
|
tunName string
|
||||||
|
|
||||||
|
@ -65,7 +63,7 @@ func CalculateInterfaceName(name string) (tunName string) {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
func New(options config.Tun, tcpIn chan<- C.ConnContext, udpIn chan<- *inbound.PacketAdapter) (l *Listener, err error) {
|
func New(options Tun, tcpIn chan<- C.ConnContext, udpIn chan<- *C.PacketAdapter) (l *Listener, err error) {
|
||||||
tunName := options.Device
|
tunName := options.Device
|
||||||
if tunName == "" {
|
if tunName == "" {
|
||||||
tunName = CalculateInterfaceName(InterfaceName)
|
tunName = CalculateInterfaceName(InterfaceName)
|
||||||
|
@ -163,12 +161,12 @@ func New(options config.Tun, tcpIn chan<- C.ConnContext, udpIn chan<- *inbound.P
|
||||||
tunOptions := tun.Options{
|
tunOptions := tun.Options{
|
||||||
Name: tunName,
|
Name: tunName,
|
||||||
MTU: tunMTU,
|
MTU: tunMTU,
|
||||||
Inet4Address: common.Map(options.Inet4Address, config.ListenPrefix.Build),
|
Inet4Address: common.Map(options.Inet4Address, ListenPrefix.Build),
|
||||||
Inet6Address: common.Map(options.Inet6Address, config.ListenPrefix.Build),
|
Inet6Address: common.Map(options.Inet6Address, ListenPrefix.Build),
|
||||||
AutoRoute: options.AutoRoute,
|
AutoRoute: options.AutoRoute,
|
||||||
StrictRoute: options.StrictRoute,
|
StrictRoute: options.StrictRoute,
|
||||||
Inet4RouteAddress: common.Map(options.Inet4RouteAddress, config.ListenPrefix.Build),
|
Inet4RouteAddress: common.Map(options.Inet4RouteAddress, ListenPrefix.Build),
|
||||||
Inet6RouteAddress: common.Map(options.Inet6RouteAddress, config.ListenPrefix.Build),
|
Inet6RouteAddress: common.Map(options.Inet6RouteAddress, ListenPrefix.Build),
|
||||||
IncludeUID: includeUID,
|
IncludeUID: includeUID,
|
||||||
ExcludeUID: excludeUID,
|
ExcludeUID: excludeUID,
|
||||||
IncludeAndroidUser: options.IncludeAndroidUser,
|
IncludeAndroidUser: options.IncludeAndroidUser,
|
||||||
|
@ -284,6 +282,6 @@ func (l *Listener) Close() {
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (l *Listener) Config() config.Tun {
|
func (l *Listener) Config() Tun {
|
||||||
return l.options
|
return l.options
|
||||||
}
|
}
|
||||||
|
|
85
listener/sing_tun/tun.go
Normal file
85
listener/sing_tun/tun.go
Normal file
|
@ -0,0 +1,85 @@
|
||||||
|
package sing_tun
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"net/netip"
|
||||||
|
|
||||||
|
C "github.com/Dreamacro/clash/constant"
|
||||||
|
"gopkg.in/yaml.v3"
|
||||||
|
)
|
||||||
|
|
||||||
|
type ListenPrefix netip.Prefix
|
||||||
|
|
||||||
|
func (p ListenPrefix) MarshalJSON() ([]byte, error) {
|
||||||
|
prefix := netip.Prefix(p)
|
||||||
|
if !prefix.IsValid() {
|
||||||
|
return json.Marshal(nil)
|
||||||
|
}
|
||||||
|
return json.Marshal(prefix.String())
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p ListenPrefix) MarshalYAML() (interface{}, error) {
|
||||||
|
prefix := netip.Prefix(p)
|
||||||
|
if !prefix.IsValid() {
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
return prefix.String(), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *ListenPrefix) UnmarshalJSON(bytes []byte) error {
|
||||||
|
var value string
|
||||||
|
err := json.Unmarshal(bytes, &value)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
prefix, err := netip.ParsePrefix(value)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
*p = ListenPrefix(prefix)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *ListenPrefix) UnmarshalYAML(node *yaml.Node) error {
|
||||||
|
var value string
|
||||||
|
err := node.Decode(&value)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
prefix, err := netip.ParsePrefix(value)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
*p = ListenPrefix(prefix)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p ListenPrefix) Build() netip.Prefix {
|
||||||
|
return netip.Prefix(p)
|
||||||
|
}
|
||||||
|
|
||||||
|
type Tun struct {
|
||||||
|
Enable bool
|
||||||
|
Device string
|
||||||
|
Stack C.TUNStack
|
||||||
|
DNSHijack []netip.AddrPort
|
||||||
|
AutoRoute bool
|
||||||
|
AutoDetectInterface bool
|
||||||
|
RedirectToTun []string
|
||||||
|
|
||||||
|
MTU uint32
|
||||||
|
Inet4Address []ListenPrefix
|
||||||
|
Inet6Address []ListenPrefix
|
||||||
|
StrictRoute bool
|
||||||
|
Inet4RouteAddress []ListenPrefix
|
||||||
|
Inet6RouteAddress []ListenPrefix
|
||||||
|
IncludeUID []uint32
|
||||||
|
IncludeUIDRange []string
|
||||||
|
ExcludeUID []uint32
|
||||||
|
ExcludeUIDRange []string
|
||||||
|
IncludeAndroidUser []int
|
||||||
|
IncludePackage []string
|
||||||
|
ExcludePackage []string
|
||||||
|
EndpointIndependentNat bool
|
||||||
|
UDPTimeout int64
|
||||||
|
}
|
|
@ -24,7 +24,7 @@ type Listener struct {
|
||||||
|
|
||||||
var _listener *Listener
|
var _listener *Listener
|
||||||
|
|
||||||
func New(config string, tcpIn chan<- C.ConnContext, udpIn chan<- *inbound.PacketAdapter) (*Listener, error) {
|
func New(config string, tcpIn chan<- C.ConnContext, udpIn chan<- *C.PacketAdapter) (*Listener, error) {
|
||||||
addr, username, password, err := parseVmessURL(config)
|
addr, username, password, err := parseVmessURL(config)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
|
|
|
@ -16,6 +16,8 @@ type Listener struct {
|
||||||
listener net.Listener
|
listener net.Listener
|
||||||
addr string
|
addr string
|
||||||
closed bool
|
closed bool
|
||||||
|
preferRulesName string
|
||||||
|
name string
|
||||||
}
|
}
|
||||||
|
|
||||||
// RawAddress implements C.Listener
|
// RawAddress implements C.Listener
|
||||||
|
@ -35,6 +37,10 @@ func (l *Listener) Close() error {
|
||||||
}
|
}
|
||||||
|
|
||||||
func New(addr string, in chan<- C.ConnContext) (*Listener, error) {
|
func New(addr string, in chan<- C.ConnContext) (*Listener, error) {
|
||||||
|
return NewWithInfos(addr,"DEFAULT-SOCKS","",in)
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewWithInfos(addr,name,preferRulesName string, in chan<- C.ConnContext) (*Listener, error) {
|
||||||
l, err := inbound.Listen("tcp", addr)
|
l, err := inbound.Listen("tcp", addr)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
|
@ -43,6 +49,8 @@ func New(addr string, in chan<- C.ConnContext) (*Listener, error) {
|
||||||
sl := &Listener{
|
sl := &Listener{
|
||||||
listener: l,
|
listener: l,
|
||||||
addr: addr,
|
addr: addr,
|
||||||
|
name: name,
|
||||||
|
preferRulesName: preferRulesName,
|
||||||
}
|
}
|
||||||
go func() {
|
go func() {
|
||||||
for {
|
for {
|
||||||
|
@ -53,14 +61,14 @@ func New(addr string, in chan<- C.ConnContext) (*Listener, error) {
|
||||||
}
|
}
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
go handleSocks(c, in)
|
go handleSocks(sl.name,sl.preferRulesName,c, in)
|
||||||
}
|
}
|
||||||
}()
|
}()
|
||||||
|
|
||||||
return sl, nil
|
return sl, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func handleSocks(conn net.Conn, in chan<- C.ConnContext) {
|
func handleSocks(name,preferRulesName string,conn net.Conn, in chan<- C.ConnContext) {
|
||||||
conn.(*net.TCPConn).SetKeepAlive(true)
|
conn.(*net.TCPConn).SetKeepAlive(true)
|
||||||
bufConn := N.NewBufferedConn(conn)
|
bufConn := N.NewBufferedConn(conn)
|
||||||
head, err := bufConn.Peek(1)
|
head, err := bufConn.Peek(1)
|
||||||
|
@ -71,24 +79,24 @@ func handleSocks(conn net.Conn, in chan<- C.ConnContext) {
|
||||||
|
|
||||||
switch head[0] {
|
switch head[0] {
|
||||||
case socks4.Version:
|
case socks4.Version:
|
||||||
HandleSocks4(bufConn, in)
|
HandleSocks4(name,preferRulesName,bufConn, in)
|
||||||
case socks5.Version:
|
case socks5.Version:
|
||||||
HandleSocks5(bufConn, in)
|
HandleSocks5(name,preferRulesName,bufConn, in)
|
||||||
default:
|
default:
|
||||||
conn.Close()
|
conn.Close()
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func HandleSocks4(conn net.Conn, in chan<- C.ConnContext) {
|
func HandleSocks4(name,preferRulesName string, conn net.Conn, in chan<- C.ConnContext) {
|
||||||
addr, _, err := socks4.ServerHandshake(conn, authStore.Authenticator())
|
addr, _, err := socks4.ServerHandshake(conn, authStore.Authenticator())
|
||||||
if err != nil {
|
if err != nil {
|
||||||
conn.Close()
|
conn.Close()
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
in <- inbound.NewSocket(socks5.ParseAddr(addr), conn, C.SOCKS4)
|
in <- inbound.NewSocketWithInfos(socks5.ParseAddr(addr), conn, C.SOCKS4,name,preferRulesName)
|
||||||
}
|
}
|
||||||
|
|
||||||
func HandleSocks5(conn net.Conn, in chan<- C.ConnContext) {
|
func HandleSocks5(name,preferRulesName string,conn net.Conn, in chan<- C.ConnContext) {
|
||||||
target, command, err := socks5.ServerHandshake(conn, authStore.Authenticator())
|
target, command, err := socks5.ServerHandshake(conn, authStore.Authenticator())
|
||||||
if err != nil {
|
if err != nil {
|
||||||
conn.Close()
|
conn.Close()
|
||||||
|
@ -99,5 +107,5 @@ func HandleSocks5(conn net.Conn, in chan<- C.ConnContext) {
|
||||||
io.Copy(io.Discard, conn)
|
io.Copy(io.Discard, conn)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
in <- inbound.NewSocket(target, conn, C.SOCKS5)
|
in <- inbound.NewSocketWithInfos(target, conn, C.SOCKS5,name,preferRulesName)
|
||||||
}
|
}
|
||||||
|
|
|
@ -15,6 +15,8 @@ type UDPListener struct {
|
||||||
packetConn net.PacketConn
|
packetConn net.PacketConn
|
||||||
addr string
|
addr string
|
||||||
closed bool
|
closed bool
|
||||||
|
name string
|
||||||
|
preferRulesName string
|
||||||
}
|
}
|
||||||
|
|
||||||
// RawAddress implements C.Listener
|
// RawAddress implements C.Listener
|
||||||
|
@ -33,7 +35,11 @@ func (l *UDPListener) Close() error {
|
||||||
return l.packetConn.Close()
|
return l.packetConn.Close()
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewUDP(addr string, in chan<- *inbound.PacketAdapter) (*UDPListener, error) {
|
func NewUDP(addr string, in chan<- *C.PacketAdapter) (*UDPListener, error) {
|
||||||
|
return NewUDPWithInfos(addr,"DEFAULT-SOCKS","",in)
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewUDPWithInfos(addr,name ,preferRulesName string, in chan<- *C.PacketAdapter) (*UDPListener, error) {
|
||||||
l, err := net.ListenPacket("udp", addr)
|
l, err := net.ListenPacket("udp", addr)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
|
@ -46,6 +52,8 @@ func NewUDP(addr string, in chan<- *inbound.PacketAdapter) (*UDPListener, error)
|
||||||
sl := &UDPListener{
|
sl := &UDPListener{
|
||||||
packetConn: l,
|
packetConn: l,
|
||||||
addr: addr,
|
addr: addr,
|
||||||
|
preferRulesName: preferRulesName,
|
||||||
|
name: name,
|
||||||
}
|
}
|
||||||
go func() {
|
go func() {
|
||||||
for {
|
for {
|
||||||
|
@ -58,14 +66,14 @@ func NewUDP(addr string, in chan<- *inbound.PacketAdapter) (*UDPListener, error)
|
||||||
}
|
}
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
handleSocksUDP(l, in, buf[:n], remoteAddr)
|
handleSocksUDP(sl.name,sl.preferRulesName,l, in, buf[:n], remoteAddr)
|
||||||
}
|
}
|
||||||
}()
|
}()
|
||||||
|
|
||||||
return sl, nil
|
return sl, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func handleSocksUDP(pc net.PacketConn, in chan<- *inbound.PacketAdapter, buf []byte, addr net.Addr) {
|
func handleSocksUDP(name,preferRulesName string,pc net.PacketConn, in chan<- *C.PacketAdapter, buf []byte, addr net.Addr) {
|
||||||
target, payload, err := socks5.DecodeUDPPacket(buf)
|
target, payload, err := socks5.DecodeUDPPacket(buf)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
// Unresolved UDP packet, return buffer to the pool
|
// Unresolved UDP packet, return buffer to the pool
|
||||||
|
@ -79,7 +87,7 @@ func handleSocksUDP(pc net.PacketConn, in chan<- *inbound.PacketAdapter, buf []b
|
||||||
bufRef: buf,
|
bufRef: buf,
|
||||||
}
|
}
|
||||||
select {
|
select {
|
||||||
case in <- inbound.NewPacket(target, packet, C.SOCKS5):
|
case in <- inbound.NewPacketWithInfos(target, packet, C.SOCKS5,name,preferRulesName):
|
||||||
default:
|
default:
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -12,6 +12,8 @@ type Listener struct {
|
||||||
listener net.Listener
|
listener net.Listener
|
||||||
addr string
|
addr string
|
||||||
closed bool
|
closed bool
|
||||||
|
name string
|
||||||
|
preferRulesName string
|
||||||
}
|
}
|
||||||
|
|
||||||
// RawAddress implements C.Listener
|
// RawAddress implements C.Listener
|
||||||
|
@ -30,13 +32,17 @@ func (l *Listener) Close() error {
|
||||||
return l.listener.Close()
|
return l.listener.Close()
|
||||||
}
|
}
|
||||||
|
|
||||||
func (l *Listener) handleTProxy(conn net.Conn, in chan<- C.ConnContext) {
|
func (l *Listener) handleTProxy(name,preferRulesName string ,conn net.Conn, in chan<- C.ConnContext) {
|
||||||
target := socks5.ParseAddrToSocksAddr(conn.LocalAddr())
|
target := socks5.ParseAddrToSocksAddr(conn.LocalAddr())
|
||||||
conn.(*net.TCPConn).SetKeepAlive(true)
|
conn.(*net.TCPConn).SetKeepAlive(true)
|
||||||
in <- inbound.NewSocket(target, conn, C.TPROXY)
|
in <- inbound.NewSocketWithInfos(target, conn, C.TPROXY,name,preferRulesName)
|
||||||
}
|
}
|
||||||
|
|
||||||
func New(addr string, in chan<- C.ConnContext) (*Listener, error) {
|
func New(addr string, in chan<- C.ConnContext) (*Listener, error) {
|
||||||
|
return NewWithInfos(addr,"DEFAULT-TPROXY","",in)
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewWithInfos(addr,name,preferRulesName string, in chan<- C.ConnContext) (*Listener, error) {
|
||||||
l, err := net.Listen("tcp", addr)
|
l, err := net.Listen("tcp", addr)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
|
@ -56,6 +62,8 @@ func New(addr string, in chan<- C.ConnContext) (*Listener, error) {
|
||||||
rl := &Listener{
|
rl := &Listener{
|
||||||
listener: l,
|
listener: l,
|
||||||
addr: addr,
|
addr: addr,
|
||||||
|
name: name,
|
||||||
|
preferRulesName: preferRulesName,
|
||||||
}
|
}
|
||||||
|
|
||||||
go func() {
|
go func() {
|
||||||
|
@ -67,7 +75,7 @@ func New(addr string, in chan<- C.ConnContext) (*Listener, error) {
|
||||||
}
|
}
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
go rl.handleTProxy(c, in)
|
go rl.handleTProxy(rl.name,rl.preferRulesName,c, in)
|
||||||
}
|
}
|
||||||
}()
|
}()
|
||||||
|
|
||||||
|
|
|
@ -14,6 +14,8 @@ type UDPListener struct {
|
||||||
packetConn net.PacketConn
|
packetConn net.PacketConn
|
||||||
addr string
|
addr string
|
||||||
closed bool
|
closed bool
|
||||||
|
name string
|
||||||
|
preferRulesName string
|
||||||
}
|
}
|
||||||
|
|
||||||
// RawAddress implements C.Listener
|
// RawAddress implements C.Listener
|
||||||
|
@ -32,7 +34,11 @@ func (l *UDPListener) Close() error {
|
||||||
return l.packetConn.Close()
|
return l.packetConn.Close()
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewUDP(addr string, in chan<- *inbound.PacketAdapter) (*UDPListener, error) {
|
func NewUDP(addr string, in chan<- *C.PacketAdapter) (*UDPListener, error) {
|
||||||
|
return NewUDPWithInfos(addr, "DEFAULT-TPROXY", "", in)
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewUDPWithInfos(addr, name, preferRulesName string, in chan<- *C.PacketAdapter) (*UDPListener, error) {
|
||||||
l, err := net.ListenPacket("udp", addr)
|
l, err := net.ListenPacket("udp", addr)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
|
@ -77,14 +83,14 @@ func NewUDP(addr string, in chan<- *inbound.PacketAdapter) (*UDPListener, error)
|
||||||
// try to unmap 4in6 address
|
// try to unmap 4in6 address
|
||||||
lAddr = netip.AddrPortFrom(lAddr.Addr().Unmap(), lAddr.Port())
|
lAddr = netip.AddrPortFrom(lAddr.Addr().Unmap(), lAddr.Port())
|
||||||
}
|
}
|
||||||
handlePacketConn(l, in, buf[:n], lAddr, rAddr)
|
handlePacketConn(rl.name, rl.preferRulesName, l, in, buf[:n], lAddr, rAddr)
|
||||||
}
|
}
|
||||||
}()
|
}()
|
||||||
|
|
||||||
return rl, nil
|
return rl, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func handlePacketConn(pc net.PacketConn, in chan<- *inbound.PacketAdapter, buf []byte, lAddr, rAddr netip.AddrPort) {
|
func handlePacketConn(name, preferRulesName string, pc net.PacketConn, in chan<- *C.PacketAdapter, buf []byte, lAddr, rAddr netip.AddrPort) {
|
||||||
target := socks5.AddrFromStdAddrPort(rAddr)
|
target := socks5.AddrFromStdAddrPort(rAddr)
|
||||||
pkt := &packet{
|
pkt := &packet{
|
||||||
pc: pc,
|
pc: pc,
|
||||||
|
@ -92,7 +98,7 @@ func handlePacketConn(pc net.PacketConn, in chan<- *inbound.PacketAdapter, buf [
|
||||||
buf: buf,
|
buf: buf,
|
||||||
}
|
}
|
||||||
select {
|
select {
|
||||||
case in <- inbound.NewPacket(target, pkt, C.TPROXY):
|
case in <- inbound.NewPacketWithInfos(target, pkt, C.TPROXY, name, preferRulesName):
|
||||||
default:
|
default:
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -2,29 +2,47 @@ package tuic
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"crypto/tls"
|
"crypto/tls"
|
||||||
|
"encoding/json"
|
||||||
"net"
|
"net"
|
||||||
"strings"
|
"strings"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"github.com/metacubex/quic-go"
|
"github.com/metacubex/quic-go"
|
||||||
|
|
||||||
"github.com/Dreamacro/clash/adapter/inbound"
|
|
||||||
"github.com/Dreamacro/clash/common/sockopt"
|
"github.com/Dreamacro/clash/common/sockopt"
|
||||||
"github.com/Dreamacro/clash/config"
|
|
||||||
C "github.com/Dreamacro/clash/constant"
|
C "github.com/Dreamacro/clash/constant"
|
||||||
|
"github.com/Dreamacro/clash/adapter/inbound"
|
||||||
"github.com/Dreamacro/clash/log"
|
"github.com/Dreamacro/clash/log"
|
||||||
"github.com/Dreamacro/clash/transport/socks5"
|
"github.com/Dreamacro/clash/transport/socks5"
|
||||||
"github.com/Dreamacro/clash/transport/tuic"
|
"github.com/Dreamacro/clash/transport/tuic"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
type TuicServer struct {
|
||||||
|
Enable bool
|
||||||
|
Listen string
|
||||||
|
Token []string
|
||||||
|
Certificate string
|
||||||
|
PrivateKey string
|
||||||
|
CongestionController string
|
||||||
|
MaxIdleTime int
|
||||||
|
AuthenticationTimeout int
|
||||||
|
ALPN []string
|
||||||
|
MaxUdpRelayPacketSize int
|
||||||
|
}
|
||||||
|
|
||||||
|
func (t TuicServer) String() string {
|
||||||
|
b, _ := json.Marshal(t)
|
||||||
|
return string(b)
|
||||||
|
}
|
||||||
|
|
||||||
type Listener struct {
|
type Listener struct {
|
||||||
closed bool
|
closed bool
|
||||||
config config.TuicServer
|
config TuicServer
|
||||||
udpListeners []net.PacketConn
|
udpListeners []net.PacketConn
|
||||||
servers []*tuic.Server
|
servers []*tuic.Server
|
||||||
}
|
}
|
||||||
|
|
||||||
func New(config config.TuicServer, tcpIn chan<- C.ConnContext, udpIn chan<- *inbound.PacketAdapter) (*Listener, error) {
|
func New(config TuicServer, tcpIn chan<- C.ConnContext, udpIn chan<- *C.PacketAdapter) (*Listener, error) {
|
||||||
cert, err := tls.LoadX509KeyPair(config.Certificate, config.PrivateKey)
|
cert, err := tls.LoadX509KeyPair(config.Certificate, config.PrivateKey)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
|
@ -122,6 +140,6 @@ func (l *Listener) Close() {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (l *Listener) Config() config.TuicServer {
|
func (l *Listener) Config() TuicServer {
|
||||||
return l.config
|
return l.config
|
||||||
}
|
}
|
||||||
|
|
69
listener/tunnel/tunnel.go
Normal file
69
listener/tunnel/tunnel.go
Normal file
|
@ -0,0 +1,69 @@
|
||||||
|
package tunnel
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"net"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"github.com/samber/lo"
|
||||||
|
)
|
||||||
|
|
||||||
|
type tunnel struct {
|
||||||
|
Network []string `yaml:"network"`
|
||||||
|
Address string `yaml:"address"`
|
||||||
|
Target string `yaml:"target"`
|
||||||
|
Proxy string `yaml:"proxy"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type Tunnel tunnel
|
||||||
|
|
||||||
|
// UnmarshalYAML implements yaml.Unmarshaler
|
||||||
|
func (t *Tunnel) UnmarshalYAML(unmarshal func(any) error) error {
|
||||||
|
var tp string
|
||||||
|
if err := unmarshal(&tp); err != nil {
|
||||||
|
var inner tunnel
|
||||||
|
if err := unmarshal(&inner); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
*t = Tunnel(inner)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// parse udp/tcp,address,target,proxy
|
||||||
|
parts := lo.Map(strings.Split(tp, ","), func(s string, _ int) string {
|
||||||
|
return strings.TrimSpace(s)
|
||||||
|
})
|
||||||
|
if len(parts) != 3 && len(parts) != 4 {
|
||||||
|
return fmt.Errorf("invalid tunnel config %s", tp)
|
||||||
|
}
|
||||||
|
network := strings.Split(parts[0], "/")
|
||||||
|
|
||||||
|
// validate network
|
||||||
|
for _, n := range network {
|
||||||
|
switch n {
|
||||||
|
case "tcp", "udp":
|
||||||
|
default:
|
||||||
|
return fmt.Errorf("invalid tunnel network %s", n)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// validate address and target
|
||||||
|
address := parts[1]
|
||||||
|
target := parts[2]
|
||||||
|
for _, addr := range []string{address, target} {
|
||||||
|
if _, _, err := net.SplitHostPort(addr); err != nil {
|
||||||
|
return fmt.Errorf("invalid tunnel target or address %s", addr)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
*t = Tunnel(tunnel{
|
||||||
|
Network: network,
|
||||||
|
Address: address,
|
||||||
|
Target: target,
|
||||||
|
})
|
||||||
|
if len(parts) == 4 {
|
||||||
|
t.Proxy = parts[3]
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
|
@ -34,7 +34,7 @@ func (l *PacketConn) Close() error {
|
||||||
return l.conn.Close()
|
return l.conn.Close()
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewUDP(addr, target, proxy string, in chan<- *inbound.PacketAdapter) (*PacketConn, error) {
|
func NewUDP(addr, target, proxy string, in chan<- *C.PacketAdapter) (*PacketConn, error) {
|
||||||
l, err := net.ListenPacket("udp", addr)
|
l, err := net.ListenPacket("udp", addr)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
|
@ -69,7 +69,7 @@ func NewUDP(addr, target, proxy string, in chan<- *inbound.PacketAdapter) (*Pack
|
||||||
return sl, nil
|
return sl, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (l *PacketConn) handleUDP(pc net.PacketConn, in chan<- *inbound.PacketAdapter, buf []byte, addr net.Addr) {
|
func (l *PacketConn) handleUDP(pc net.PacketConn, in chan<- *C.PacketAdapter, buf []byte, addr net.Addr) {
|
||||||
packet := &packet{
|
packet := &packet{
|
||||||
pc: pc,
|
pc: pc,
|
||||||
rAddr: addr,
|
rAddr: addr,
|
||||||
|
|
|
@ -20,7 +20,7 @@ func (A *AND) ShouldFindProcess() bool {
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewAND(payload string, adapter string,
|
func NewAND(payload string, adapter string,
|
||||||
parse func(tp, payload, target string, params []string, subRules *map[string][]C.Rule) (parsed C.Rule, parseErr error)) (*AND, error) {
|
parse func(tp, payload, target string, params []string, subRules map[string][]C.Rule) (parsed C.Rule, parseErr error)) (*AND, error) {
|
||||||
and := &AND{Base: &common.Base{}, payload: payload, adapter: adapter}
|
and := &AND{Base: &common.Base{}, payload: payload, adapter: adapter}
|
||||||
rules, err := ParseRuleByPayload(payload, parse)
|
rules, err := ParseRuleByPayload(payload, parse)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
|
|
@ -9,7 +9,7 @@ import (
|
||||||
_ "unsafe"
|
_ "unsafe"
|
||||||
)
|
)
|
||||||
|
|
||||||
func ParseRuleByPayload(payload string, parseRule func(tp, payload, target string, params []string, subRules *map[string][]C.Rule) (parsed C.Rule, parseErr error)) ([]C.Rule, error) {
|
func ParseRuleByPayload(payload string, parseRule func(tp, payload, target string, params []string, subRules map[string][]C.Rule) (parsed C.Rule, parseErr error)) ([]C.Rule, error) {
|
||||||
regex, err := regexp.Compile("\\(.*\\)")
|
regex, err := regexp.Compile("\\(.*\\)")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
|
@ -59,7 +59,7 @@ func payloadToRule(subPayload string, parseRule func(tp, payload, target string,
|
||||||
return parseRule(tp, param[0], "", param[1:])
|
return parseRule(tp, param[0], "", param[1:])
|
||||||
}
|
}
|
||||||
|
|
||||||
func parseLogicSubRule(parseRule func(tp, payload, target string, params []string, subRules *map[string][]C.Rule) (parsed C.Rule, parseErr error)) func(tp, payload, target string, params []string) (parsed C.Rule, parseErr error) {
|
func parseLogicSubRule(parseRule func(tp, payload, target string, params []string, subRules map[string][]C.Rule) (parsed C.Rule, parseErr error)) func(tp, payload, target string, params []string) (parsed C.Rule, parseErr error) {
|
||||||
return func(tp, payload, target string, params []string) (parsed C.Rule, parseErr error) {
|
return func(tp, payload, target string, params []string) (parsed C.Rule, parseErr error) {
|
||||||
switch tp {
|
switch tp {
|
||||||
case "MATCH", "SUB-RULE":
|
case "MATCH", "SUB-RULE":
|
||||||
|
|
|
@ -17,7 +17,7 @@ func (not *NOT) ShouldFindProcess() bool {
|
||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewNOT(payload string, adapter string, parse func(tp, payload, target string, params []string, subRules *map[string][]C.Rule) (parsed C.Rule, parseErr error)) (*NOT, error) {
|
func NewNOT(payload string, adapter string, parse func(tp, payload, target string, params []string, subRules map[string][]C.Rule) (parsed C.Rule, parseErr error)) (*NOT, error) {
|
||||||
not := &NOT{Base: &common.Base{}, adapter: adapter}
|
not := &NOT{Base: &common.Base{}, adapter: adapter}
|
||||||
rule, err := ParseRuleByPayload(payload, parse)
|
rule, err := ParseRuleByPayload(payload, parse)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
|
|
@ -45,7 +45,7 @@ func (or *OR) ShouldResolveIP() bool {
|
||||||
return or.needIP
|
return or.needIP
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewOR(payload string, adapter string, parse func(tp, payload, target string, params []string, subRules *map[string][]C.Rule) (parsed C.Rule, parseErr error)) (*OR, error) {
|
func NewOR(payload string, adapter string, parse func(tp, payload, target string, params []string, subRules map[string][]C.Rule) (parsed C.Rule, parseErr error)) (*OR, error) {
|
||||||
or := &OR{Base: &common.Base{}, payload: payload, adapter: adapter}
|
or := &OR{Base: &common.Base{}, payload: payload, adapter: adapter}
|
||||||
rules, err := ParseRuleByPayload(payload, parse)
|
rules, err := ParseRuleByPayload(payload, parse)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
|
|
@ -12,13 +12,13 @@ type SubRule struct {
|
||||||
payload string
|
payload string
|
||||||
payloadRule C.Rule
|
payloadRule C.Rule
|
||||||
subName string
|
subName string
|
||||||
subRules *map[string][]C.Rule
|
subRules map[string][]C.Rule
|
||||||
shouldFindProcess *bool
|
shouldFindProcess *bool
|
||||||
shouldResolveIP *bool
|
shouldResolveIP *bool
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewSubRule(payload, subName string, sub *map[string][]C.Rule,
|
func NewSubRule(payload, subName string, sub map[string][]C.Rule,
|
||||||
parse func(tp, payload, target string, params []string, subRules *map[string][]C.Rule) (parsed C.Rule, parseErr error)) (*SubRule, error) {
|
parse func(tp, payload, target string, params []string, subRules map[string][]C.Rule) (parsed C.Rule, parseErr error)) (*SubRule, error) {
|
||||||
payloadRule, err := ParseRuleByPayload(fmt.Sprintf("(%s)", payload), parse)
|
payloadRule, err := ParseRuleByPayload(fmt.Sprintf("(%s)", payload), parse)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
|
@ -45,8 +45,8 @@ func (r *SubRule) Match(metadata *C.Metadata) (bool, string) {
|
||||||
return match(metadata, r.subName, r.subRules)
|
return match(metadata, r.subName, r.subRules)
|
||||||
}
|
}
|
||||||
|
|
||||||
func match(metadata *C.Metadata, name string, subRules *map[string][]C.Rule) (bool, string) {
|
func match(metadata *C.Metadata, name string, subRules map[string][]C.Rule) (bool, string) {
|
||||||
for _, rule := range (*subRules)[name] {
|
for _, rule := range subRules[name] {
|
||||||
if m, a := rule.Match(metadata); m {
|
if m, a := rule.Match(metadata); m {
|
||||||
if rule.RuleType() == C.SubRules {
|
if rule.RuleType() == C.SubRules {
|
||||||
match(metadata, rule.Adapter(), subRules)
|
match(metadata, rule.Adapter(), subRules)
|
||||||
|
@ -61,7 +61,7 @@ func match(metadata *C.Metadata, name string, subRules *map[string][]C.Rule) (bo
|
||||||
func (r *SubRule) ShouldResolveIP() bool {
|
func (r *SubRule) ShouldResolveIP() bool {
|
||||||
if r.shouldResolveIP == nil {
|
if r.shouldResolveIP == nil {
|
||||||
s := false
|
s := false
|
||||||
for _, rule := range (*r.subRules)[r.subName] {
|
for _, rule := range r.subRules[r.subName] {
|
||||||
s = s || rule.ShouldResolveIP()
|
s = s || rule.ShouldResolveIP()
|
||||||
}
|
}
|
||||||
r.shouldResolveIP = &s
|
r.shouldResolveIP = &s
|
||||||
|
@ -73,7 +73,7 @@ func (r *SubRule) ShouldResolveIP() bool {
|
||||||
func (r *SubRule) ShouldFindProcess() bool {
|
func (r *SubRule) ShouldFindProcess() bool {
|
||||||
if r.shouldFindProcess == nil {
|
if r.shouldFindProcess == nil {
|
||||||
s := false
|
s := false
|
||||||
for _, rule := range (*r.subRules)[r.subName] {
|
for _, rule := range r.subRules[r.subName] {
|
||||||
s = s || rule.ShouldFindProcess()
|
s = s || rule.ShouldFindProcess()
|
||||||
}
|
}
|
||||||
r.shouldFindProcess = &s
|
r.shouldFindProcess = &s
|
||||||
|
|
|
@ -8,7 +8,7 @@ import (
|
||||||
RP "github.com/Dreamacro/clash/rules/provider"
|
RP "github.com/Dreamacro/clash/rules/provider"
|
||||||
)
|
)
|
||||||
|
|
||||||
func ParseRule(tp, payload, target string, params []string, subRules *map[string][]C.Rule) (parsed C.Rule, parseErr error) {
|
func ParseRule(tp, payload, target string, params []string, subRules map[string][]C.Rule) (parsed C.Rule, parseErr error) {
|
||||||
switch tp {
|
switch tp {
|
||||||
case "DOMAIN":
|
case "DOMAIN":
|
||||||
parsed = RC.NewDomain(payload, target)
|
parsed = RC.NewDomain(payload, target)
|
||||||
|
|
|
@ -66,7 +66,7 @@ func ruleParse(ruleRaw string) (string, string, []string) {
|
||||||
return "", "", nil
|
return "", "", nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewClassicalStrategy(parse func(tp, payload, target string, params []string, subRules *map[string][]C.Rule) (parsed C.Rule, parseErr error)) *classicalStrategy {
|
func NewClassicalStrategy(parse func(tp, payload, target string, params []string, subRules map[string][]C.Rule) (parsed C.Rule, parseErr error)) *classicalStrategy {
|
||||||
return &classicalStrategy{rules: []C.Rule{}, parse: func(tp, payload, target string, params []string) (parsed C.Rule, parseErr error) {
|
return &classicalStrategy{rules: []C.Rule{}, parse: func(tp, payload, target string, params []string) (parsed C.Rule, parseErr error) {
|
||||||
switch tp {
|
switch tp {
|
||||||
case "MATCH", "SUB-RULE":
|
case "MATCH", "SUB-RULE":
|
||||||
|
|
|
@ -17,7 +17,7 @@ type ruleProviderSchema struct {
|
||||||
Interval int `provider:"interval,omitempty"`
|
Interval int `provider:"interval,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
func ParseRuleProvider(name string, mapping map[string]interface{}, parse func(tp, payload, target string, params []string, subRules *map[string][]C.Rule) (parsed C.Rule, parseErr error)) (P.RuleProvider, error) {
|
func ParseRuleProvider(name string, mapping map[string]interface{}, parse func(tp, payload, target string, params []string, subRules map[string][]C.Rule) (parsed C.Rule, parseErr error)) (P.RuleProvider, error) {
|
||||||
schema := &ruleProviderSchema{}
|
schema := &ruleProviderSchema{}
|
||||||
decoder := structure.NewDecoder(structure.Option{TagName: "provider", WeaklyTypedInput: true})
|
decoder := structure.NewDecoder(structure.Option{TagName: "provider", WeaklyTypedInput: true})
|
||||||
if err := decoder.Decode(mapping, schema); err != nil {
|
if err := decoder.Decode(mapping, schema); err != nil {
|
||||||
|
|
|
@ -103,7 +103,7 @@ func (rp *ruleSetProvider) MarshalJSON() ([]byte, error) {
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewRuleSetProvider(name string, behavior P.RuleType, interval time.Duration, vehicle P.Vehicle,
|
func NewRuleSetProvider(name string, behavior P.RuleType, interval time.Duration, vehicle P.Vehicle,
|
||||||
parse func(tp, payload, target string, params []string, subRules *map[string][]C.Rule) (parsed C.Rule, parseErr error)) P.RuleProvider {
|
parse func(tp, payload, target string, params []string, subRules map[string][]C.Rule) (parsed C.Rule, parseErr error)) P.RuleProvider {
|
||||||
rp := &ruleSetProvider{
|
rp := &ruleSetProvider{
|
||||||
behavior: behavior,
|
behavior: behavior,
|
||||||
}
|
}
|
||||||
|
@ -126,7 +126,7 @@ func NewRuleSetProvider(name string, behavior P.RuleType, interval time.Duration
|
||||||
return wrapper
|
return wrapper
|
||||||
}
|
}
|
||||||
|
|
||||||
func newStrategy(behavior P.RuleType, parse func(tp, payload, target string, params []string, subRules *map[string][]C.Rule) (parsed C.Rule, parseErr error)) ruleStrategy {
|
func newStrategy(behavior P.RuleType, parse func(tp, payload, target string, params []string, subRules map[string][]C.Rule) (parsed C.Rule, parseErr error)) ruleStrategy {
|
||||||
switch behavior {
|
switch behavior {
|
||||||
case P.Domain:
|
case P.Domain:
|
||||||
strategy := NewDomainStrategy()
|
strategy := NewDomainStrategy()
|
||||||
|
|
|
@ -13,7 +13,6 @@ import (
|
||||||
|
|
||||||
"github.com/jpillora/backoff"
|
"github.com/jpillora/backoff"
|
||||||
|
|
||||||
"github.com/Dreamacro/clash/adapter/inbound"
|
|
||||||
"github.com/Dreamacro/clash/component/nat"
|
"github.com/Dreamacro/clash/component/nat"
|
||||||
P "github.com/Dreamacro/clash/component/process"
|
P "github.com/Dreamacro/clash/component/process"
|
||||||
"github.com/Dreamacro/clash/component/resolver"
|
"github.com/Dreamacro/clash/component/resolver"
|
||||||
|
@ -27,9 +26,10 @@ import (
|
||||||
|
|
||||||
var (
|
var (
|
||||||
tcpQueue = make(chan C.ConnContext, 200)
|
tcpQueue = make(chan C.ConnContext, 200)
|
||||||
udpQueue = make(chan *inbound.PacketAdapter, 200)
|
udpQueue = make(chan *C.PacketAdapter, 200)
|
||||||
natTable = nat.New()
|
natTable = nat.New()
|
||||||
rules []C.Rule
|
rules []C.Rule
|
||||||
|
subRules map[string][]C.Rule
|
||||||
proxies = make(map[string]C.Proxy)
|
proxies = make(map[string]C.Proxy)
|
||||||
providers map[string]provider.ProxyProvider
|
providers map[string]provider.ProxyProvider
|
||||||
ruleProviders map[string]provider.RuleProvider
|
ruleProviders map[string]provider.RuleProvider
|
||||||
|
@ -77,7 +77,7 @@ func TCPIn() chan<- C.ConnContext {
|
||||||
}
|
}
|
||||||
|
|
||||||
// UDPIn return fan-in udp queue
|
// UDPIn return fan-in udp queue
|
||||||
func UDPIn() chan<- *inbound.PacketAdapter {
|
func UDPIn() chan<- *C.PacketAdapter {
|
||||||
return udpQueue
|
return udpQueue
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -87,10 +87,11 @@ func Rules() []C.Rule {
|
||||||
}
|
}
|
||||||
|
|
||||||
// UpdateRules handle update rules
|
// UpdateRules handle update rules
|
||||||
func UpdateRules(newRules []C.Rule, rp map[string]provider.RuleProvider) {
|
func UpdateRules(newRules []C.Rule, newSubRule map[string][]C.Rule, rp map[string]provider.RuleProvider) {
|
||||||
configMux.Lock()
|
configMux.Lock()
|
||||||
rules = newRules
|
rules = newRules
|
||||||
ruleProviders = rp
|
ruleProviders = rp
|
||||||
|
subRules = newSubRule
|
||||||
configMux.Unlock()
|
configMux.Unlock()
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -216,7 +217,7 @@ func resolveMetadata(ctx C.PlainContext, metadata *C.Metadata) (proxy C.Proxy, r
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
func handleUDPConn(packet *inbound.PacketAdapter) {
|
func handleUDPConn(packet *C.PacketAdapter) {
|
||||||
metadata := packet.Metadata()
|
metadata := packet.Metadata()
|
||||||
if !metadata.Valid() {
|
if !metadata.Valid() {
|
||||||
log.Warnln("[Metadata] not valid: %#v", metadata)
|
log.Warnln("[Metadata] not valid: %#v", metadata)
|
||||||
|
@ -435,7 +436,7 @@ func match(metadata *C.Metadata) (C.Proxy, C.Rule, error) {
|
||||||
resolved = true
|
resolved = true
|
||||||
}
|
}
|
||||||
|
|
||||||
for _, rule := range rules {
|
for _, rule := range getRules(metadata) {
|
||||||
if !resolved && shouldResolveIP(rule, metadata) {
|
if !resolved && shouldResolveIP(rule, metadata) {
|
||||||
func() {
|
func() {
|
||||||
ctx, cancel := context.WithTimeout(context.Background(), resolver.DefaultDNSTimeout)
|
ctx, cancel := context.WithTimeout(context.Background(), resolver.DefaultDNSTimeout)
|
||||||
|
@ -495,6 +496,14 @@ func match(metadata *C.Metadata) (C.Proxy, C.Rule, error) {
|
||||||
return proxies["DIRECT"], nil, nil
|
return proxies["DIRECT"], nil, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func getRules(metadata *C.Metadata) []C.Rule {
|
||||||
|
if sr, ok := subRules[metadata.PreferRulesName]; ok {
|
||||||
|
return sr
|
||||||
|
} else {
|
||||||
|
return rules
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
func retry[T any](ctx context.Context, ft func(context.Context) (T, error), fe func(err error)) (t T, err error) {
|
func retry[T any](ctx context.Context, ft func(context.Context) (T, error), fe func(err error)) (t T, err error) {
|
||||||
b := &backoff.Backoff{
|
b := &backoff.Backoff{
|
||||||
Min: 10 * time.Millisecond,
|
Min: 10 * time.Millisecond,
|
||||||
|
|
Loading…
Reference in a new issue