http3.go 4.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172
  1. package quic
  2. import (
  3. "bytes"
  4. "context"
  5. "io"
  6. "net"
  7. "net/http"
  8. "net/url"
  9. "strconv"
  10. "github.com/sagernet/quic-go"
  11. "github.com/sagernet/quic-go/http3"
  12. "github.com/sagernet/sing-box/adapter"
  13. "github.com/sagernet/sing-box/common/tls"
  14. C "github.com/sagernet/sing-box/constant"
  15. "github.com/sagernet/sing-box/dns"
  16. "github.com/sagernet/sing-box/dns/transport"
  17. "github.com/sagernet/sing-box/log"
  18. "github.com/sagernet/sing-box/option"
  19. "github.com/sagernet/sing/common"
  20. "github.com/sagernet/sing/common/buf"
  21. "github.com/sagernet/sing/common/bufio"
  22. E "github.com/sagernet/sing/common/exceptions"
  23. "github.com/sagernet/sing/common/logger"
  24. N "github.com/sagernet/sing/common/network"
  25. sHTTP "github.com/sagernet/sing/protocol/http"
  26. mDNS "github.com/miekg/dns"
  27. )
  28. var _ adapter.DNSTransport = (*HTTP3Transport)(nil)
  29. func RegisterHTTP3Transport(registry *dns.TransportRegistry) {
  30. dns.RegisterTransport[option.RemoteHTTPSDNSServerOptions](registry, C.DNSTypeHTTP3, NewHTTP3)
  31. }
  32. type HTTP3Transport struct {
  33. dns.TransportAdapter
  34. logger logger.ContextLogger
  35. dialer N.Dialer
  36. destination *url.URL
  37. headers http.Header
  38. transport *http3.Transport
  39. }
  40. func NewHTTP3(ctx context.Context, logger log.ContextLogger, tag string, options option.RemoteHTTPSDNSServerOptions) (adapter.DNSTransport, error) {
  41. transportDialer, err := dns.NewRemoteDialer(ctx, options.RemoteDNSServerOptions)
  42. if err != nil {
  43. return nil, err
  44. }
  45. tlsOptions := common.PtrValueOrDefault(options.TLS)
  46. tlsOptions.Enabled = true
  47. tlsConfig, err := tls.NewClient(ctx, logger, options.Server, tlsOptions)
  48. if err != nil {
  49. return nil, err
  50. }
  51. stdConfig, err := tlsConfig.STDConfig()
  52. if err != nil {
  53. return nil, err
  54. }
  55. headers := options.Headers.Build()
  56. host := headers.Get("Host")
  57. if host != "" {
  58. headers.Del("Host")
  59. } else {
  60. if tlsConfig.ServerName() != "" {
  61. host = tlsConfig.ServerName()
  62. } else {
  63. host = options.Server
  64. }
  65. }
  66. destinationURL := url.URL{
  67. Scheme: "https",
  68. Host: host,
  69. }
  70. if destinationURL.Host == "" {
  71. destinationURL.Host = options.Server
  72. }
  73. if options.ServerPort != 0 && options.ServerPort != 443 {
  74. destinationURL.Host = net.JoinHostPort(destinationURL.Host, strconv.Itoa(int(options.ServerPort)))
  75. }
  76. path := options.Path
  77. if path == "" {
  78. path = "/dns-query"
  79. }
  80. err = sHTTP.URLSetPath(&destinationURL, path)
  81. if err != nil {
  82. return nil, err
  83. }
  84. serverAddr := options.DNSServerAddressOptions.Build()
  85. if serverAddr.Port == 0 {
  86. serverAddr.Port = 443
  87. }
  88. if !serverAddr.IsValid() {
  89. return nil, E.New("invalid server address: ", serverAddr)
  90. }
  91. return &HTTP3Transport{
  92. TransportAdapter: dns.NewTransportAdapterWithRemoteOptions(C.DNSTypeHTTP3, tag, options.RemoteDNSServerOptions),
  93. logger: logger,
  94. dialer: transportDialer,
  95. destination: &destinationURL,
  96. headers: headers,
  97. transport: &http3.Transport{
  98. Dial: func(ctx context.Context, addr string, tlsCfg *tls.STDConfig, cfg *quic.Config) (*quic.Conn, error) {
  99. conn, dialErr := transportDialer.DialContext(ctx, N.NetworkUDP, serverAddr)
  100. if dialErr != nil {
  101. return nil, dialErr
  102. }
  103. return quic.DialEarly(ctx, bufio.NewUnbindPacketConn(conn), conn.RemoteAddr(), tlsCfg, cfg)
  104. },
  105. TLSClientConfig: stdConfig,
  106. },
  107. }, nil
  108. }
  109. func (t *HTTP3Transport) Start(stage adapter.StartStage) error {
  110. return nil
  111. }
  112. func (t *HTTP3Transport) Close() error {
  113. return t.transport.Close()
  114. }
  115. func (t *HTTP3Transport) Exchange(ctx context.Context, message *mDNS.Msg) (*mDNS.Msg, error) {
  116. exMessage := *message
  117. exMessage.Id = 0
  118. exMessage.Compress = true
  119. requestBuffer := buf.NewSize(1 + message.Len())
  120. rawMessage, err := exMessage.PackBuffer(requestBuffer.FreeBytes())
  121. if err != nil {
  122. requestBuffer.Release()
  123. return nil, err
  124. }
  125. request, err := http.NewRequestWithContext(ctx, http.MethodPost, t.destination.String(), bytes.NewReader(rawMessage))
  126. if err != nil {
  127. requestBuffer.Release()
  128. return nil, err
  129. }
  130. request.Header = t.headers.Clone()
  131. request.Header.Set("Content-Type", transport.MimeType)
  132. request.Header.Set("Accept", transport.MimeType)
  133. response, err := t.transport.RoundTrip(request)
  134. requestBuffer.Release()
  135. if err != nil {
  136. return nil, err
  137. }
  138. defer response.Body.Close()
  139. if response.StatusCode != http.StatusOK {
  140. return nil, E.New("unexpected status: ", response.Status)
  141. }
  142. var responseMessage mDNS.Msg
  143. if response.ContentLength > 0 {
  144. responseBuffer := buf.NewSize(int(response.ContentLength))
  145. _, err = responseBuffer.ReadFullFrom(response.Body, int(response.ContentLength))
  146. if err != nil {
  147. return nil, err
  148. }
  149. err = responseMessage.Unpack(responseBuffer.Bytes())
  150. responseBuffer.Release()
  151. } else {
  152. rawMessage, err = io.ReadAll(response.Body)
  153. if err != nil {
  154. return nil, err
  155. }
  156. err = responseMessage.Unpack(rawMessage)
  157. }
  158. if err != nil {
  159. return nil, err
  160. }
  161. return &responseMessage, nil
  162. }