server.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484
  1. package clashapi
  2. import (
  3. "bytes"
  4. "context"
  5. "errors"
  6. "net"
  7. "net/http"
  8. "os"
  9. "strings"
  10. "time"
  11. "github.com/sagernet/sing-box/adapter"
  12. "github.com/sagernet/sing-box/common/json"
  13. "github.com/sagernet/sing-box/common/urltest"
  14. C "github.com/sagernet/sing-box/constant"
  15. "github.com/sagernet/sing-box/experimental"
  16. "github.com/sagernet/sing-box/experimental/clashapi/cachefile"
  17. "github.com/sagernet/sing-box/experimental/clashapi/trafficontrol"
  18. "github.com/sagernet/sing-box/log"
  19. "github.com/sagernet/sing-box/option"
  20. "github.com/sagernet/sing/common"
  21. E "github.com/sagernet/sing/common/exceptions"
  22. F "github.com/sagernet/sing/common/format"
  23. N "github.com/sagernet/sing/common/network"
  24. "github.com/sagernet/sing/service"
  25. "github.com/sagernet/sing/service/filemanager"
  26. "github.com/sagernet/websocket"
  27. "github.com/go-chi/chi/v5"
  28. "github.com/go-chi/cors"
  29. "github.com/go-chi/render"
  30. )
  31. func init() {
  32. experimental.RegisterClashServerConstructor(NewServer)
  33. }
  34. var _ adapter.ClashServer = (*Server)(nil)
  35. type Server struct {
  36. ctx context.Context
  37. router adapter.Router
  38. logger log.Logger
  39. httpServer *http.Server
  40. trafficManager *trafficontrol.Manager
  41. urlTestHistory *urltest.HistoryStorage
  42. mode string
  43. modeList []string
  44. modeUpdateHook chan<- struct{}
  45. storeMode bool
  46. storeSelected bool
  47. storeFakeIP bool
  48. cacheFilePath string
  49. cacheID string
  50. cacheFile adapter.ClashCacheFile
  51. externalController bool
  52. externalUI string
  53. externalUIDownloadURL string
  54. externalUIDownloadDetour string
  55. }
  56. func NewServer(ctx context.Context, router adapter.Router, logFactory log.ObservableFactory, options option.ClashAPIOptions) (adapter.ClashServer, error) {
  57. trafficManager := trafficontrol.NewManager()
  58. chiRouter := chi.NewRouter()
  59. server := &Server{
  60. ctx: ctx,
  61. router: router,
  62. logger: logFactory.NewLogger("clash-api"),
  63. httpServer: &http.Server{
  64. Addr: options.ExternalController,
  65. Handler: chiRouter,
  66. },
  67. trafficManager: trafficManager,
  68. modeList: options.ModeList,
  69. externalController: options.ExternalController != "",
  70. storeMode: options.StoreMode,
  71. storeSelected: options.StoreSelected,
  72. storeFakeIP: options.StoreFakeIP,
  73. externalUIDownloadURL: options.ExternalUIDownloadURL,
  74. externalUIDownloadDetour: options.ExternalUIDownloadDetour,
  75. }
  76. server.urlTestHistory = service.PtrFromContext[urltest.HistoryStorage](ctx)
  77. if server.urlTestHistory == nil {
  78. server.urlTestHistory = urltest.NewHistoryStorage()
  79. }
  80. defaultMode := "Rule"
  81. if options.DefaultMode != "" {
  82. defaultMode = options.DefaultMode
  83. }
  84. if !common.Contains(server.modeList, defaultMode) {
  85. server.modeList = append(server.modeList, defaultMode)
  86. }
  87. server.mode = defaultMode
  88. if options.StoreMode || options.StoreSelected || options.StoreFakeIP || options.ExternalController == "" {
  89. cachePath := os.ExpandEnv(options.CacheFile)
  90. if cachePath == "" {
  91. cachePath = "cache.db"
  92. }
  93. if foundPath, loaded := C.FindPath(cachePath); loaded {
  94. cachePath = foundPath
  95. } else {
  96. cachePath = filemanager.BasePath(ctx, cachePath)
  97. }
  98. server.cacheFilePath = cachePath
  99. server.cacheID = options.CacheID
  100. }
  101. cors := cors.New(cors.Options{
  102. AllowedOrigins: []string{"*"},
  103. AllowedMethods: []string{"GET", "POST", "PUT", "PATCH", "DELETE"},
  104. AllowedHeaders: []string{"Content-Type", "Authorization"},
  105. MaxAge: 300,
  106. })
  107. chiRouter.Use(cors.Handler)
  108. chiRouter.Group(func(r chi.Router) {
  109. r.Use(authentication(options.Secret))
  110. r.Get("/", hello(options.ExternalUI != ""))
  111. r.Get("/logs", getLogs(logFactory))
  112. r.Get("/traffic", traffic(trafficManager))
  113. r.Get("/version", version)
  114. r.Mount("/configs", configRouter(server, logFactory))
  115. r.Mount("/proxies", proxyRouter(server, router))
  116. r.Mount("/rules", ruleRouter(router))
  117. r.Mount("/connections", connectionRouter(router, trafficManager))
  118. r.Mount("/providers/proxies", proxyProviderRouter())
  119. r.Mount("/providers/rules", ruleProviderRouter())
  120. r.Mount("/script", scriptRouter())
  121. r.Mount("/profile", profileRouter())
  122. r.Mount("/cache", cacheRouter(router))
  123. r.Mount("/dns", dnsRouter(router))
  124. server.setupMetaAPI(r)
  125. })
  126. if options.ExternalUI != "" {
  127. server.externalUI = filemanager.BasePath(ctx, os.ExpandEnv(options.ExternalUI))
  128. chiRouter.Group(func(r chi.Router) {
  129. fs := http.StripPrefix("/ui", http.FileServer(http.Dir(server.externalUI)))
  130. r.Get("/ui", http.RedirectHandler("/ui/", http.StatusTemporaryRedirect).ServeHTTP)
  131. r.Get("/ui/*", func(w http.ResponseWriter, r *http.Request) {
  132. fs.ServeHTTP(w, r)
  133. })
  134. })
  135. }
  136. return server, nil
  137. }
  138. func (s *Server) PreStart() error {
  139. if s.cacheFilePath != "" {
  140. cacheFile, err := cachefile.Open(s.cacheFilePath, s.cacheID)
  141. if err != nil {
  142. return E.Cause(err, "open cache file")
  143. }
  144. s.cacheFile = cacheFile
  145. if s.storeMode {
  146. mode := s.cacheFile.LoadMode()
  147. if common.Any(s.modeList, func(it string) bool {
  148. return strings.EqualFold(it, mode)
  149. }) {
  150. s.mode = mode
  151. }
  152. }
  153. }
  154. return nil
  155. }
  156. func (s *Server) Start() error {
  157. if s.externalController {
  158. s.checkAndDownloadExternalUI()
  159. listener, err := net.Listen("tcp", s.httpServer.Addr)
  160. if err != nil {
  161. return E.Cause(err, "external controller listen error")
  162. }
  163. s.logger.Info("restful api listening at ", listener.Addr())
  164. go func() {
  165. err = s.httpServer.Serve(listener)
  166. if err != nil && !errors.Is(err, http.ErrServerClosed) {
  167. s.logger.Error("external controller serve error: ", err)
  168. }
  169. }()
  170. }
  171. return nil
  172. }
  173. func (s *Server) Close() error {
  174. return common.Close(
  175. common.PtrOrNil(s.httpServer),
  176. s.trafficManager,
  177. s.cacheFile,
  178. s.urlTestHistory,
  179. )
  180. }
  181. func (s *Server) Mode() string {
  182. return s.mode
  183. }
  184. func (s *Server) ModeList() []string {
  185. return s.modeList
  186. }
  187. func (s *Server) SetModeUpdateHook(hook chan<- struct{}) {
  188. s.modeUpdateHook = hook
  189. }
  190. func (s *Server) SetMode(newMode string) {
  191. if !common.Contains(s.modeList, newMode) {
  192. newMode = common.Find(s.modeList, func(it string) bool {
  193. return strings.EqualFold(it, newMode)
  194. })
  195. }
  196. if !common.Contains(s.modeList, newMode) {
  197. return
  198. }
  199. if newMode == s.mode {
  200. return
  201. }
  202. s.mode = newMode
  203. if s.modeUpdateHook != nil {
  204. select {
  205. case s.modeUpdateHook <- struct{}{}:
  206. default:
  207. }
  208. }
  209. s.router.ClearDNSCache()
  210. if s.storeMode {
  211. err := s.cacheFile.StoreMode(newMode)
  212. if err != nil {
  213. s.logger.Error(E.Cause(err, "save mode"))
  214. }
  215. }
  216. s.logger.Info("updated mode: ", newMode)
  217. }
  218. func (s *Server) StoreSelected() bool {
  219. return s.storeSelected
  220. }
  221. func (s *Server) StoreFakeIP() bool {
  222. return s.storeFakeIP
  223. }
  224. func (s *Server) CacheFile() adapter.ClashCacheFile {
  225. return s.cacheFile
  226. }
  227. func (s *Server) HistoryStorage() *urltest.HistoryStorage {
  228. return s.urlTestHistory
  229. }
  230. func (s *Server) TrafficManager() *trafficontrol.Manager {
  231. return s.trafficManager
  232. }
  233. func (s *Server) RoutedConnection(ctx context.Context, conn net.Conn, metadata adapter.InboundContext, matchedRule adapter.Rule) (net.Conn, adapter.Tracker) {
  234. tracker := trafficontrol.NewTCPTracker(conn, s.trafficManager, castMetadata(metadata), s.router, matchedRule)
  235. return tracker, tracker
  236. }
  237. func (s *Server) RoutedPacketConnection(ctx context.Context, conn N.PacketConn, metadata adapter.InboundContext, matchedRule adapter.Rule) (N.PacketConn, adapter.Tracker) {
  238. tracker := trafficontrol.NewUDPTracker(conn, s.trafficManager, castMetadata(metadata), s.router, matchedRule)
  239. return tracker, tracker
  240. }
  241. func castMetadata(metadata adapter.InboundContext) trafficontrol.Metadata {
  242. var inbound string
  243. if metadata.Inbound != "" {
  244. inbound = metadata.InboundType + "/" + metadata.Inbound
  245. } else {
  246. inbound = metadata.InboundType
  247. }
  248. var domain string
  249. if metadata.Domain != "" {
  250. domain = metadata.Domain
  251. } else {
  252. domain = metadata.Destination.Fqdn
  253. }
  254. var processPath string
  255. if metadata.ProcessInfo != nil {
  256. if metadata.ProcessInfo.ProcessPath != "" {
  257. processPath = metadata.ProcessInfo.ProcessPath
  258. } else if metadata.ProcessInfo.PackageName != "" {
  259. processPath = metadata.ProcessInfo.PackageName
  260. }
  261. if processPath == "" {
  262. if metadata.ProcessInfo.UserId != -1 {
  263. processPath = F.ToString(metadata.ProcessInfo.UserId)
  264. }
  265. } else if metadata.ProcessInfo.User != "" {
  266. processPath = F.ToString(processPath, " (", metadata.ProcessInfo.User, ")")
  267. } else if metadata.ProcessInfo.UserId != -1 {
  268. processPath = F.ToString(processPath, " (", metadata.ProcessInfo.UserId, ")")
  269. }
  270. }
  271. return trafficontrol.Metadata{
  272. NetWork: metadata.Network,
  273. Type: inbound,
  274. SrcIP: metadata.Source.Addr,
  275. DstIP: metadata.Destination.Addr,
  276. SrcPort: F.ToString(metadata.Source.Port),
  277. DstPort: F.ToString(metadata.Destination.Port),
  278. Host: domain,
  279. DNSMode: "normal",
  280. ProcessPath: processPath,
  281. }
  282. }
  283. func authentication(serverSecret string) func(next http.Handler) http.Handler {
  284. return func(next http.Handler) http.Handler {
  285. fn := func(w http.ResponseWriter, r *http.Request) {
  286. if serverSecret == "" {
  287. next.ServeHTTP(w, r)
  288. return
  289. }
  290. // Browser websocket not support custom header
  291. if websocket.IsWebSocketUpgrade(r) && r.URL.Query().Get("token") != "" {
  292. token := r.URL.Query().Get("token")
  293. if token != serverSecret {
  294. render.Status(r, http.StatusUnauthorized)
  295. render.JSON(w, r, ErrUnauthorized)
  296. return
  297. }
  298. next.ServeHTTP(w, r)
  299. return
  300. }
  301. header := r.Header.Get("Authorization")
  302. bearer, token, found := strings.Cut(header, " ")
  303. hasInvalidHeader := bearer != "Bearer"
  304. hasInvalidSecret := !found || token != serverSecret
  305. if hasInvalidHeader || hasInvalidSecret {
  306. render.Status(r, http.StatusUnauthorized)
  307. render.JSON(w, r, ErrUnauthorized)
  308. return
  309. }
  310. next.ServeHTTP(w, r)
  311. }
  312. return http.HandlerFunc(fn)
  313. }
  314. }
  315. func hello(redirect bool) func(w http.ResponseWriter, r *http.Request) {
  316. return func(w http.ResponseWriter, r *http.Request) {
  317. if redirect {
  318. http.Redirect(w, r, "/ui/", http.StatusTemporaryRedirect)
  319. } else {
  320. render.JSON(w, r, render.M{"hello": "clash"})
  321. }
  322. }
  323. }
  324. var upgrader = websocket.Upgrader{
  325. CheckOrigin: func(r *http.Request) bool {
  326. return true
  327. },
  328. }
  329. type Traffic struct {
  330. Up int64 `json:"up"`
  331. Down int64 `json:"down"`
  332. }
  333. func traffic(trafficManager *trafficontrol.Manager) func(w http.ResponseWriter, r *http.Request) {
  334. return func(w http.ResponseWriter, r *http.Request) {
  335. var wsConn *websocket.Conn
  336. if websocket.IsWebSocketUpgrade(r) {
  337. var err error
  338. wsConn, err = upgrader.Upgrade(w, r, nil)
  339. if err != nil {
  340. return
  341. }
  342. }
  343. if wsConn == nil {
  344. w.Header().Set("Content-Type", "application/json")
  345. render.Status(r, http.StatusOK)
  346. }
  347. tick := time.NewTicker(time.Second)
  348. defer tick.Stop()
  349. buf := &bytes.Buffer{}
  350. var err error
  351. for range tick.C {
  352. buf.Reset()
  353. up, down := trafficManager.Now()
  354. if err := json.NewEncoder(buf).Encode(Traffic{
  355. Up: up,
  356. Down: down,
  357. }); err != nil {
  358. break
  359. }
  360. if wsConn == nil {
  361. _, err = w.Write(buf.Bytes())
  362. w.(http.Flusher).Flush()
  363. } else {
  364. err = wsConn.WriteMessage(websocket.TextMessage, buf.Bytes())
  365. }
  366. if err != nil {
  367. break
  368. }
  369. }
  370. }
  371. }
  372. type Log struct {
  373. Type string `json:"type"`
  374. Payload string `json:"payload"`
  375. }
  376. func getLogs(logFactory log.ObservableFactory) func(w http.ResponseWriter, r *http.Request) {
  377. return func(w http.ResponseWriter, r *http.Request) {
  378. levelText := r.URL.Query().Get("level")
  379. if levelText == "" {
  380. levelText = "info"
  381. }
  382. level, ok := log.ParseLevel(levelText)
  383. if ok != nil {
  384. render.Status(r, http.StatusBadRequest)
  385. render.JSON(w, r, ErrBadRequest)
  386. return
  387. }
  388. subscription, done, err := logFactory.Subscribe()
  389. if err != nil {
  390. render.Status(r, http.StatusNoContent)
  391. return
  392. }
  393. defer logFactory.UnSubscribe(subscription)
  394. var wsConn *websocket.Conn
  395. if websocket.IsWebSocketUpgrade(r) {
  396. var err error
  397. wsConn, err = upgrader.Upgrade(w, r, nil)
  398. if err != nil {
  399. return
  400. }
  401. }
  402. if wsConn == nil {
  403. w.Header().Set("Content-Type", "application/json")
  404. render.Status(r, http.StatusOK)
  405. }
  406. buf := &bytes.Buffer{}
  407. var logEntry log.Entry
  408. for {
  409. select {
  410. case <-done:
  411. return
  412. case logEntry = <-subscription:
  413. }
  414. if logEntry.Level > level {
  415. continue
  416. }
  417. buf.Reset()
  418. err = json.NewEncoder(buf).Encode(Log{
  419. Type: log.FormatLevel(logEntry.Level),
  420. Payload: logEntry.Message,
  421. })
  422. if err != nil {
  423. break
  424. }
  425. if wsConn == nil {
  426. _, err = w.Write(buf.Bytes())
  427. w.(http.Flusher).Flush()
  428. } else {
  429. err = wsConn.WriteMessage(websocket.TextMessage, buf.Bytes())
  430. }
  431. if err != nil {
  432. break
  433. }
  434. }
  435. }
  436. }
  437. func version(w http.ResponseWriter, r *http.Request) {
  438. render.JSON(w, r, render.M{"version": "sing-box " + C.Version, "premium": true, "meta": true})
  439. }