client.go 3.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119
  1. package v2raygrpc
  2. import (
  3. "context"
  4. "net"
  5. "sync"
  6. "time"
  7. "github.com/sagernet/sing-box/adapter"
  8. "github.com/sagernet/sing-box/common/tls"
  9. "github.com/sagernet/sing-box/option"
  10. "github.com/sagernet/sing/common"
  11. M "github.com/sagernet/sing/common/metadata"
  12. N "github.com/sagernet/sing/common/network"
  13. "golang.org/x/net/http2"
  14. "google.golang.org/grpc"
  15. "google.golang.org/grpc/backoff"
  16. "google.golang.org/grpc/connectivity"
  17. "google.golang.org/grpc/credentials/insecure"
  18. "google.golang.org/grpc/keepalive"
  19. )
  20. var _ adapter.V2RayClientTransport = (*Client)(nil)
  21. type Client struct {
  22. ctx context.Context
  23. dialer N.Dialer
  24. serverAddr string
  25. serviceName string
  26. dialOptions []grpc.DialOption
  27. conn *grpc.ClientConn
  28. connAccess sync.Mutex
  29. }
  30. func NewClient(ctx context.Context, dialer N.Dialer, serverAddr M.Socksaddr, options option.V2RayGRPCOptions, tlsConfig tls.Config) (adapter.V2RayClientTransport, error) {
  31. var dialOptions []grpc.DialOption
  32. if tlsConfig != nil {
  33. if len(tlsConfig.NextProtos()) == 0 {
  34. tlsConfig.SetNextProtos([]string{http2.NextProtoTLS})
  35. }
  36. dialOptions = append(dialOptions, grpc.WithTransportCredentials(NewTLSTransportCredentials(tlsConfig)))
  37. } else {
  38. dialOptions = append(dialOptions, grpc.WithTransportCredentials(insecure.NewCredentials()))
  39. }
  40. if options.IdleTimeout > 0 {
  41. dialOptions = append(dialOptions, grpc.WithKeepaliveParams(keepalive.ClientParameters{
  42. Time: time.Duration(options.IdleTimeout),
  43. Timeout: time.Duration(options.PingTimeout),
  44. PermitWithoutStream: options.PermitWithoutStream,
  45. }))
  46. }
  47. dialOptions = append(dialOptions, grpc.WithConnectParams(grpc.ConnectParams{
  48. Backoff: backoff.Config{
  49. BaseDelay: 500 * time.Millisecond,
  50. Multiplier: 1.5,
  51. Jitter: 0.2,
  52. MaxDelay: 19 * time.Second,
  53. },
  54. MinConnectTimeout: 5 * time.Second,
  55. }))
  56. dialOptions = append(dialOptions, grpc.WithContextDialer(func(ctx context.Context, server string) (net.Conn, error) {
  57. return dialer.DialContext(ctx, N.NetworkTCP, M.ParseSocksaddr(server))
  58. }))
  59. //nolint:staticcheck
  60. dialOptions = append(dialOptions, grpc.WithReturnConnectionError())
  61. return &Client{
  62. ctx: ctx,
  63. dialer: dialer,
  64. serverAddr: serverAddr.String(),
  65. serviceName: options.ServiceName,
  66. dialOptions: dialOptions,
  67. }, nil
  68. }
  69. func (c *Client) connect() (*grpc.ClientConn, error) {
  70. conn := c.conn
  71. if conn != nil && conn.GetState() != connectivity.Shutdown {
  72. return conn, nil
  73. }
  74. c.connAccess.Lock()
  75. defer c.connAccess.Unlock()
  76. conn = c.conn
  77. if conn != nil && conn.GetState() != connectivity.Shutdown {
  78. return conn, nil
  79. }
  80. //nolint:staticcheck
  81. conn, err := grpc.DialContext(c.ctx, c.serverAddr, c.dialOptions...)
  82. if err != nil {
  83. return nil, err
  84. }
  85. c.conn = conn
  86. return conn, nil
  87. }
  88. func (c *Client) DialContext(ctx context.Context) (net.Conn, error) {
  89. clientConn, err := c.connect()
  90. if err != nil {
  91. return nil, err
  92. }
  93. client := NewGunServiceClient(clientConn).(GunServiceCustomNameClient)
  94. ctx, cancel := common.ContextWithCancelCause(ctx)
  95. stream, err := client.TunCustomName(ctx, c.serviceName)
  96. if err != nil {
  97. cancel(err)
  98. return nil, err
  99. }
  100. return NewGRPCConn(stream), nil
  101. }
  102. func (c *Client) Close() error {
  103. c.connAccess.Lock()
  104. defer c.connAccess.Unlock()
  105. if c.conn != nil {
  106. c.conn.Close()
  107. c.conn = nil
  108. }
  109. return nil
  110. }