router.go 42 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350
  1. package route
  2. import (
  3. "context"
  4. "errors"
  5. "net"
  6. "net/netip"
  7. "net/url"
  8. "os"
  9. "os/user"
  10. "runtime"
  11. "strings"
  12. "time"
  13. "github.com/sagernet/sing-box/adapter"
  14. "github.com/sagernet/sing-box/common/conntrack"
  15. "github.com/sagernet/sing-box/common/dialer"
  16. "github.com/sagernet/sing-box/common/geoip"
  17. "github.com/sagernet/sing-box/common/geosite"
  18. "github.com/sagernet/sing-box/common/process"
  19. "github.com/sagernet/sing-box/common/sniff"
  20. "github.com/sagernet/sing-box/common/taskmonitor"
  21. C "github.com/sagernet/sing-box/constant"
  22. "github.com/sagernet/sing-box/experimental/libbox/platform"
  23. "github.com/sagernet/sing-box/log"
  24. "github.com/sagernet/sing-box/option"
  25. "github.com/sagernet/sing-box/outbound"
  26. "github.com/sagernet/sing-box/transport/fakeip"
  27. "github.com/sagernet/sing-dns"
  28. "github.com/sagernet/sing-mux"
  29. "github.com/sagernet/sing-tun"
  30. "github.com/sagernet/sing-vmess"
  31. "github.com/sagernet/sing/common"
  32. "github.com/sagernet/sing/common/buf"
  33. "github.com/sagernet/sing/common/bufio"
  34. "github.com/sagernet/sing/common/bufio/deadline"
  35. "github.com/sagernet/sing/common/control"
  36. E "github.com/sagernet/sing/common/exceptions"
  37. F "github.com/sagernet/sing/common/format"
  38. M "github.com/sagernet/sing/common/metadata"
  39. N "github.com/sagernet/sing/common/network"
  40. "github.com/sagernet/sing/common/ntp"
  41. "github.com/sagernet/sing/common/task"
  42. "github.com/sagernet/sing/common/uot"
  43. "github.com/sagernet/sing/common/winpowrprof"
  44. "github.com/sagernet/sing/service"
  45. "github.com/sagernet/sing/service/pause"
  46. )
  47. var _ adapter.Router = (*Router)(nil)
  48. type Router struct {
  49. ctx context.Context
  50. logger log.ContextLogger
  51. dnsLogger log.ContextLogger
  52. inboundByTag map[string]adapter.Inbound
  53. outbounds []adapter.Outbound
  54. outboundByTag map[string]adapter.Outbound
  55. rules []adapter.Rule
  56. defaultDetour string
  57. defaultOutboundForConnection adapter.Outbound
  58. defaultOutboundForPacketConnection adapter.Outbound
  59. needGeoIPDatabase bool
  60. needGeositeDatabase bool
  61. geoIPOptions option.GeoIPOptions
  62. geositeOptions option.GeositeOptions
  63. geoIPReader *geoip.Reader
  64. geositeReader *geosite.Reader
  65. geositeCache map[string]adapter.Rule
  66. needFindProcess bool
  67. dnsClient *dns.Client
  68. defaultDomainStrategy dns.DomainStrategy
  69. dnsRules []adapter.DNSRule
  70. ruleSets []adapter.RuleSet
  71. ruleSetMap map[string]adapter.RuleSet
  72. defaultTransport dns.Transport
  73. transports []dns.Transport
  74. transportMap map[string]dns.Transport
  75. transportDomainStrategy map[dns.Transport]dns.DomainStrategy
  76. dnsReverseMapping *DNSReverseMapping
  77. fakeIPStore adapter.FakeIPStore
  78. interfaceFinder *control.DefaultInterfaceFinder
  79. autoDetectInterface bool
  80. defaultInterface string
  81. defaultMark uint32
  82. autoRedirectOutputMark uint32
  83. networkMonitor tun.NetworkUpdateMonitor
  84. interfaceMonitor tun.DefaultInterfaceMonitor
  85. packageManager tun.PackageManager
  86. powerListener winpowrprof.EventListener
  87. processSearcher process.Searcher
  88. timeService *ntp.Service
  89. pauseManager pause.Manager
  90. clashServer adapter.ClashServer
  91. v2rayServer adapter.V2RayServer
  92. platformInterface platform.Interface
  93. needWIFIState bool
  94. needPackageManager bool
  95. wifiState adapter.WIFIState
  96. started bool
  97. }
  98. func NewRouter(
  99. ctx context.Context,
  100. logFactory log.Factory,
  101. options option.RouteOptions,
  102. dnsOptions option.DNSOptions,
  103. ntpOptions option.NTPOptions,
  104. inbounds []option.Inbound,
  105. platformInterface platform.Interface,
  106. ) (*Router, error) {
  107. router := &Router{
  108. ctx: ctx,
  109. logger: logFactory.NewLogger("router"),
  110. dnsLogger: logFactory.NewLogger("dns"),
  111. outboundByTag: make(map[string]adapter.Outbound),
  112. rules: make([]adapter.Rule, 0, len(options.Rules)),
  113. dnsRules: make([]adapter.DNSRule, 0, len(dnsOptions.Rules)),
  114. ruleSetMap: make(map[string]adapter.RuleSet),
  115. needGeoIPDatabase: hasRule(options.Rules, isGeoIPRule) || hasDNSRule(dnsOptions.Rules, isGeoIPDNSRule),
  116. needGeositeDatabase: hasRule(options.Rules, isGeositeRule) || hasDNSRule(dnsOptions.Rules, isGeositeDNSRule),
  117. geoIPOptions: common.PtrValueOrDefault(options.GeoIP),
  118. geositeOptions: common.PtrValueOrDefault(options.Geosite),
  119. geositeCache: make(map[string]adapter.Rule),
  120. needFindProcess: hasRule(options.Rules, isProcessRule) || hasDNSRule(dnsOptions.Rules, isProcessDNSRule) || options.FindProcess,
  121. defaultDetour: options.Final,
  122. defaultDomainStrategy: dns.DomainStrategy(dnsOptions.Strategy),
  123. interfaceFinder: control.NewDefaultInterfaceFinder(),
  124. autoDetectInterface: options.AutoDetectInterface,
  125. defaultInterface: options.DefaultInterface,
  126. defaultMark: options.DefaultMark,
  127. pauseManager: service.FromContext[pause.Manager](ctx),
  128. platformInterface: platformInterface,
  129. needWIFIState: hasRule(options.Rules, isWIFIRule) || hasDNSRule(dnsOptions.Rules, isWIFIDNSRule),
  130. needPackageManager: common.Any(inbounds, func(inbound option.Inbound) bool {
  131. return len(inbound.TunOptions.IncludePackage) > 0 || len(inbound.TunOptions.ExcludePackage) > 0
  132. }),
  133. }
  134. router.dnsClient = dns.NewClient(dns.ClientOptions{
  135. DisableCache: dnsOptions.DNSClientOptions.DisableCache,
  136. DisableExpire: dnsOptions.DNSClientOptions.DisableExpire,
  137. IndependentCache: dnsOptions.DNSClientOptions.IndependentCache,
  138. RDRC: func() dns.RDRCStore {
  139. cacheFile := service.FromContext[adapter.CacheFile](ctx)
  140. if cacheFile == nil {
  141. return nil
  142. }
  143. if !cacheFile.StoreRDRC() {
  144. return nil
  145. }
  146. return cacheFile
  147. },
  148. Logger: router.dnsLogger,
  149. })
  150. for i, ruleOptions := range options.Rules {
  151. routeRule, err := NewRule(router, router.logger, ruleOptions, true)
  152. if err != nil {
  153. return nil, E.Cause(err, "parse rule[", i, "]")
  154. }
  155. router.rules = append(router.rules, routeRule)
  156. }
  157. for i, dnsRuleOptions := range dnsOptions.Rules {
  158. dnsRule, err := NewDNSRule(router, router.logger, dnsRuleOptions, true)
  159. if err != nil {
  160. return nil, E.Cause(err, "parse dns rule[", i, "]")
  161. }
  162. router.dnsRules = append(router.dnsRules, dnsRule)
  163. }
  164. for i, ruleSetOptions := range options.RuleSet {
  165. if _, exists := router.ruleSetMap[ruleSetOptions.Tag]; exists {
  166. return nil, E.New("duplicate rule-set tag: ", ruleSetOptions.Tag)
  167. }
  168. ruleSet, err := NewRuleSet(ctx, router, router.logger, ruleSetOptions)
  169. if err != nil {
  170. return nil, E.Cause(err, "parse rule-set[", i, "]")
  171. }
  172. router.ruleSets = append(router.ruleSets, ruleSet)
  173. router.ruleSetMap[ruleSetOptions.Tag] = ruleSet
  174. }
  175. transports := make([]dns.Transport, len(dnsOptions.Servers))
  176. dummyTransportMap := make(map[string]dns.Transport)
  177. transportMap := make(map[string]dns.Transport)
  178. transportTags := make([]string, len(dnsOptions.Servers))
  179. transportTagMap := make(map[string]bool)
  180. transportDomainStrategy := make(map[dns.Transport]dns.DomainStrategy)
  181. for i, server := range dnsOptions.Servers {
  182. var tag string
  183. if server.Tag != "" {
  184. tag = server.Tag
  185. } else {
  186. tag = F.ToString(i)
  187. }
  188. if transportTagMap[tag] {
  189. return nil, E.New("duplicate dns server tag: ", tag)
  190. }
  191. transportTags[i] = tag
  192. transportTagMap[tag] = true
  193. }
  194. ctx = adapter.ContextWithRouter(ctx, router)
  195. for {
  196. lastLen := len(dummyTransportMap)
  197. for i, server := range dnsOptions.Servers {
  198. tag := transportTags[i]
  199. if _, exists := dummyTransportMap[tag]; exists {
  200. continue
  201. }
  202. var detour N.Dialer
  203. if server.Detour == "" {
  204. detour = dialer.NewRouter(router)
  205. } else {
  206. detour = dialer.NewDetour(router, server.Detour)
  207. }
  208. switch server.Address {
  209. case "local":
  210. default:
  211. serverURL, _ := url.Parse(server.Address)
  212. var serverAddress string
  213. if serverURL != nil {
  214. serverAddress = serverURL.Hostname()
  215. }
  216. if serverAddress == "" {
  217. serverAddress = server.Address
  218. }
  219. notIpAddress := !M.ParseSocksaddr(serverAddress).Addr.IsValid()
  220. if server.AddressResolver != "" {
  221. if !transportTagMap[server.AddressResolver] {
  222. return nil, E.New("parse dns server[", tag, "]: address resolver not found: ", server.AddressResolver)
  223. }
  224. if upstream, exists := dummyTransportMap[server.AddressResolver]; exists {
  225. detour = dns.NewDialerWrapper(detour, router.dnsClient, upstream, dns.DomainStrategy(server.AddressStrategy), time.Duration(server.AddressFallbackDelay))
  226. } else {
  227. continue
  228. }
  229. } else if notIpAddress && strings.Contains(server.Address, ".") {
  230. return nil, E.New("parse dns server[", tag, "]: missing address_resolver")
  231. }
  232. }
  233. var clientSubnet netip.Prefix
  234. if server.ClientSubnet != nil {
  235. clientSubnet = server.ClientSubnet.Build()
  236. } else if dnsOptions.ClientSubnet != nil {
  237. clientSubnet = dnsOptions.ClientSubnet.Build()
  238. }
  239. transport, err := dns.CreateTransport(dns.TransportOptions{
  240. Context: ctx,
  241. Logger: logFactory.NewLogger(F.ToString("dns/transport[", tag, "]")),
  242. Name: tag,
  243. Dialer: detour,
  244. Address: server.Address,
  245. ClientSubnet: clientSubnet,
  246. })
  247. if err != nil {
  248. return nil, E.Cause(err, "parse dns server[", tag, "]")
  249. }
  250. transports[i] = transport
  251. dummyTransportMap[tag] = transport
  252. if server.Tag != "" {
  253. transportMap[server.Tag] = transport
  254. }
  255. strategy := dns.DomainStrategy(server.Strategy)
  256. if strategy != dns.DomainStrategyAsIS {
  257. transportDomainStrategy[transport] = strategy
  258. }
  259. }
  260. if len(transports) == len(dummyTransportMap) {
  261. break
  262. }
  263. if lastLen != len(dummyTransportMap) {
  264. continue
  265. }
  266. unresolvedTags := common.MapIndexed(common.FilterIndexed(dnsOptions.Servers, func(index int, server option.DNSServerOptions) bool {
  267. _, exists := dummyTransportMap[transportTags[index]]
  268. return !exists
  269. }), func(index int, server option.DNSServerOptions) string {
  270. return transportTags[index]
  271. })
  272. if len(unresolvedTags) == 0 {
  273. panic(F.ToString("unexpected unresolved dns servers: ", len(transports), " ", len(dummyTransportMap), " ", len(transportMap)))
  274. }
  275. return nil, E.New("found circular reference in dns servers: ", strings.Join(unresolvedTags, " "))
  276. }
  277. var defaultTransport dns.Transport
  278. if dnsOptions.Final != "" {
  279. defaultTransport = dummyTransportMap[dnsOptions.Final]
  280. if defaultTransport == nil {
  281. return nil, E.New("default dns server not found: ", dnsOptions.Final)
  282. }
  283. }
  284. if defaultTransport == nil {
  285. if len(transports) == 0 {
  286. transports = append(transports, common.Must1(dns.CreateTransport(dns.TransportOptions{
  287. Context: ctx,
  288. Name: "local",
  289. Address: "local",
  290. Dialer: common.Must1(dialer.NewDefault(router, option.DialerOptions{})),
  291. })))
  292. }
  293. defaultTransport = transports[0]
  294. }
  295. if _, isFakeIP := defaultTransport.(adapter.FakeIPTransport); isFakeIP {
  296. return nil, E.New("default DNS server cannot be fakeip")
  297. }
  298. router.defaultTransport = defaultTransport
  299. router.transports = transports
  300. router.transportMap = transportMap
  301. router.transportDomainStrategy = transportDomainStrategy
  302. if dnsOptions.ReverseMapping {
  303. router.dnsReverseMapping = NewDNSReverseMapping()
  304. }
  305. if fakeIPOptions := dnsOptions.FakeIP; fakeIPOptions != nil && dnsOptions.FakeIP.Enabled {
  306. var inet4Range netip.Prefix
  307. var inet6Range netip.Prefix
  308. if fakeIPOptions.Inet4Range != nil {
  309. inet4Range = *fakeIPOptions.Inet4Range
  310. }
  311. if fakeIPOptions.Inet6Range != nil {
  312. inet6Range = *fakeIPOptions.Inet6Range
  313. }
  314. router.fakeIPStore = fakeip.NewStore(ctx, router.logger, inet4Range, inet6Range)
  315. }
  316. usePlatformDefaultInterfaceMonitor := platformInterface != nil && platformInterface.UsePlatformDefaultInterfaceMonitor()
  317. needInterfaceMonitor := options.AutoDetectInterface || common.Any(inbounds, func(inbound option.Inbound) bool {
  318. return inbound.HTTPOptions.SetSystemProxy || inbound.MixedOptions.SetSystemProxy || inbound.TunOptions.AutoRoute
  319. })
  320. if !usePlatformDefaultInterfaceMonitor {
  321. networkMonitor, err := tun.NewNetworkUpdateMonitor(router.logger)
  322. if !((err != nil && !needInterfaceMonitor) || errors.Is(err, os.ErrInvalid)) {
  323. if err != nil {
  324. return nil, err
  325. }
  326. router.networkMonitor = networkMonitor
  327. networkMonitor.RegisterCallback(func() {
  328. _ = router.interfaceFinder.Update()
  329. })
  330. interfaceMonitor, err := tun.NewDefaultInterfaceMonitor(router.networkMonitor, router.logger, tun.DefaultInterfaceMonitorOptions{
  331. OverrideAndroidVPN: options.OverrideAndroidVPN,
  332. UnderNetworkExtension: platformInterface != nil && platformInterface.UnderNetworkExtension(),
  333. })
  334. if err != nil {
  335. return nil, E.New("auto_detect_interface unsupported on current platform")
  336. }
  337. interfaceMonitor.RegisterCallback(router.notifyNetworkUpdate)
  338. router.interfaceMonitor = interfaceMonitor
  339. }
  340. } else {
  341. interfaceMonitor := platformInterface.CreateDefaultInterfaceMonitor(router.logger)
  342. interfaceMonitor.RegisterCallback(router.notifyNetworkUpdate)
  343. router.interfaceMonitor = interfaceMonitor
  344. }
  345. if ntpOptions.Enabled {
  346. ntpDialer, err := dialer.New(router, ntpOptions.DialerOptions)
  347. if err != nil {
  348. return nil, E.Cause(err, "create NTP service")
  349. }
  350. timeService := ntp.NewService(ntp.Options{
  351. Context: ctx,
  352. Dialer: ntpDialer,
  353. Logger: logFactory.NewLogger("ntp"),
  354. Server: ntpOptions.ServerOptions.Build(),
  355. Interval: time.Duration(ntpOptions.Interval),
  356. WriteToSystem: ntpOptions.WriteToSystem,
  357. })
  358. service.MustRegister[ntp.TimeService](ctx, timeService)
  359. router.timeService = timeService
  360. }
  361. return router, nil
  362. }
  363. func (r *Router) Initialize(inbounds []adapter.Inbound, outbounds []adapter.Outbound, defaultOutbound func() adapter.Outbound) error {
  364. inboundByTag := make(map[string]adapter.Inbound)
  365. for _, inbound := range inbounds {
  366. inboundByTag[inbound.Tag()] = inbound
  367. }
  368. outboundByTag := make(map[string]adapter.Outbound)
  369. for _, detour := range outbounds {
  370. outboundByTag[detour.Tag()] = detour
  371. }
  372. var defaultOutboundForConnection adapter.Outbound
  373. var defaultOutboundForPacketConnection adapter.Outbound
  374. if r.defaultDetour != "" {
  375. detour, loaded := outboundByTag[r.defaultDetour]
  376. if !loaded {
  377. return E.New("default detour not found: ", r.defaultDetour)
  378. }
  379. if common.Contains(detour.Network(), N.NetworkTCP) {
  380. defaultOutboundForConnection = detour
  381. }
  382. if common.Contains(detour.Network(), N.NetworkUDP) {
  383. defaultOutboundForPacketConnection = detour
  384. }
  385. }
  386. if defaultOutboundForConnection == nil {
  387. for _, detour := range outbounds {
  388. if common.Contains(detour.Network(), N.NetworkTCP) {
  389. defaultOutboundForConnection = detour
  390. break
  391. }
  392. }
  393. }
  394. if defaultOutboundForPacketConnection == nil {
  395. for _, detour := range outbounds {
  396. if common.Contains(detour.Network(), N.NetworkUDP) {
  397. defaultOutboundForPacketConnection = detour
  398. break
  399. }
  400. }
  401. }
  402. if defaultOutboundForConnection == nil || defaultOutboundForPacketConnection == nil {
  403. detour := defaultOutbound()
  404. if defaultOutboundForConnection == nil {
  405. defaultOutboundForConnection = detour
  406. }
  407. if defaultOutboundForPacketConnection == nil {
  408. defaultOutboundForPacketConnection = detour
  409. }
  410. outbounds = append(outbounds, detour)
  411. outboundByTag[detour.Tag()] = detour
  412. }
  413. r.inboundByTag = inboundByTag
  414. r.outbounds = outbounds
  415. r.defaultOutboundForConnection = defaultOutboundForConnection
  416. r.defaultOutboundForPacketConnection = defaultOutboundForPacketConnection
  417. r.outboundByTag = outboundByTag
  418. for i, rule := range r.rules {
  419. if _, loaded := outboundByTag[rule.Outbound()]; !loaded {
  420. return E.New("outbound not found for rule[", i, "]: ", rule.Outbound())
  421. }
  422. }
  423. return nil
  424. }
  425. func (r *Router) Outbounds() []adapter.Outbound {
  426. if !r.started {
  427. return nil
  428. }
  429. return r.outbounds
  430. }
  431. func (r *Router) PreStart() error {
  432. monitor := taskmonitor.New(r.logger, C.StartTimeout)
  433. if r.interfaceMonitor != nil {
  434. monitor.Start("initialize interface monitor")
  435. err := r.interfaceMonitor.Start()
  436. monitor.Finish()
  437. if err != nil {
  438. return err
  439. }
  440. }
  441. if r.networkMonitor != nil {
  442. monitor.Start("initialize network monitor")
  443. err := r.networkMonitor.Start()
  444. monitor.Finish()
  445. if err != nil {
  446. return err
  447. }
  448. }
  449. if r.fakeIPStore != nil {
  450. monitor.Start("initialize fakeip store")
  451. err := r.fakeIPStore.Start()
  452. monitor.Finish()
  453. if err != nil {
  454. return err
  455. }
  456. }
  457. return nil
  458. }
  459. func (r *Router) Start() error {
  460. monitor := taskmonitor.New(r.logger, C.StartTimeout)
  461. if r.needGeoIPDatabase {
  462. monitor.Start("initialize geoip database")
  463. err := r.prepareGeoIPDatabase()
  464. monitor.Finish()
  465. if err != nil {
  466. return err
  467. }
  468. }
  469. if r.needGeositeDatabase {
  470. monitor.Start("initialize geosite database")
  471. err := r.prepareGeositeDatabase()
  472. monitor.Finish()
  473. if err != nil {
  474. return err
  475. }
  476. }
  477. if r.needGeositeDatabase {
  478. for _, rule := range r.rules {
  479. err := rule.UpdateGeosite()
  480. if err != nil {
  481. r.logger.Error("failed to initialize geosite: ", err)
  482. }
  483. }
  484. for _, rule := range r.dnsRules {
  485. err := rule.UpdateGeosite()
  486. if err != nil {
  487. r.logger.Error("failed to initialize geosite: ", err)
  488. }
  489. }
  490. err := common.Close(r.geositeReader)
  491. if err != nil {
  492. return err
  493. }
  494. r.geositeCache = nil
  495. r.geositeReader = nil
  496. }
  497. if runtime.GOOS == "windows" {
  498. powerListener, err := winpowrprof.NewEventListener(r.notifyWindowsPowerEvent)
  499. if err == nil {
  500. r.powerListener = powerListener
  501. } else {
  502. r.logger.Warn("initialize power listener: ", err)
  503. }
  504. }
  505. if r.powerListener != nil {
  506. monitor.Start("start power listener")
  507. err := r.powerListener.Start()
  508. monitor.Finish()
  509. if err != nil {
  510. return E.Cause(err, "start power listener")
  511. }
  512. }
  513. monitor.Start("initialize DNS client")
  514. r.dnsClient.Start()
  515. monitor.Finish()
  516. if C.IsAndroid && r.platformInterface == nil {
  517. monitor.Start("initialize package manager")
  518. packageManager, err := tun.NewPackageManager(tun.PackageManagerOptions{
  519. Callback: r,
  520. Logger: r.logger,
  521. })
  522. monitor.Finish()
  523. if err != nil {
  524. return E.Cause(err, "create package manager")
  525. }
  526. if r.needPackageManager {
  527. monitor.Start("start package manager")
  528. err = packageManager.Start()
  529. monitor.Finish()
  530. if err != nil {
  531. return E.Cause(err, "start package manager")
  532. }
  533. }
  534. r.packageManager = packageManager
  535. }
  536. for i, rule := range r.dnsRules {
  537. monitor.Start("initialize DNS rule[", i, "]")
  538. err := rule.Start()
  539. monitor.Finish()
  540. if err != nil {
  541. return E.Cause(err, "initialize DNS rule[", i, "]")
  542. }
  543. }
  544. for i, transport := range r.transports {
  545. monitor.Start("initialize DNS transport[", i, "]")
  546. err := transport.Start()
  547. monitor.Finish()
  548. if err != nil {
  549. return E.Cause(err, "initialize DNS server[", i, "]")
  550. }
  551. }
  552. if r.timeService != nil {
  553. monitor.Start("initialize time service")
  554. err := r.timeService.Start()
  555. monitor.Finish()
  556. if err != nil {
  557. return E.Cause(err, "initialize time service")
  558. }
  559. }
  560. return nil
  561. }
  562. func (r *Router) Close() error {
  563. monitor := taskmonitor.New(r.logger, C.StopTimeout)
  564. var err error
  565. for i, rule := range r.rules {
  566. monitor.Start("close rule[", i, "]")
  567. err = E.Append(err, rule.Close(), func(err error) error {
  568. return E.Cause(err, "close rule[", i, "]")
  569. })
  570. monitor.Finish()
  571. }
  572. for i, rule := range r.dnsRules {
  573. monitor.Start("close dns rule[", i, "]")
  574. err = E.Append(err, rule.Close(), func(err error) error {
  575. return E.Cause(err, "close dns rule[", i, "]")
  576. })
  577. monitor.Finish()
  578. }
  579. for i, transport := range r.transports {
  580. monitor.Start("close dns transport[", i, "]")
  581. err = E.Append(err, transport.Close(), func(err error) error {
  582. return E.Cause(err, "close dns transport[", i, "]")
  583. })
  584. monitor.Finish()
  585. }
  586. if r.geoIPReader != nil {
  587. monitor.Start("close geoip reader")
  588. err = E.Append(err, r.geoIPReader.Close(), func(err error) error {
  589. return E.Cause(err, "close geoip reader")
  590. })
  591. monitor.Finish()
  592. }
  593. if r.interfaceMonitor != nil {
  594. monitor.Start("close interface monitor")
  595. err = E.Append(err, r.interfaceMonitor.Close(), func(err error) error {
  596. return E.Cause(err, "close interface monitor")
  597. })
  598. monitor.Finish()
  599. }
  600. if r.networkMonitor != nil {
  601. monitor.Start("close network monitor")
  602. err = E.Append(err, r.networkMonitor.Close(), func(err error) error {
  603. return E.Cause(err, "close network monitor")
  604. })
  605. monitor.Finish()
  606. }
  607. if r.packageManager != nil {
  608. monitor.Start("close package manager")
  609. err = E.Append(err, r.packageManager.Close(), func(err error) error {
  610. return E.Cause(err, "close package manager")
  611. })
  612. monitor.Finish()
  613. }
  614. if r.powerListener != nil {
  615. monitor.Start("close power listener")
  616. err = E.Append(err, r.powerListener.Close(), func(err error) error {
  617. return E.Cause(err, "close power listener")
  618. })
  619. monitor.Finish()
  620. }
  621. if r.timeService != nil {
  622. monitor.Start("close time service")
  623. err = E.Append(err, r.timeService.Close(), func(err error) error {
  624. return E.Cause(err, "close time service")
  625. })
  626. monitor.Finish()
  627. }
  628. if r.fakeIPStore != nil {
  629. monitor.Start("close fakeip store")
  630. err = E.Append(err, r.fakeIPStore.Close(), func(err error) error {
  631. return E.Cause(err, "close fakeip store")
  632. })
  633. monitor.Finish()
  634. }
  635. return err
  636. }
  637. func (r *Router) PostStart() error {
  638. monitor := taskmonitor.New(r.logger, C.StopTimeout)
  639. if len(r.ruleSets) > 0 {
  640. monitor.Start("initialize rule-set")
  641. ruleSetStartContext := NewRuleSetStartContext()
  642. var ruleSetStartGroup task.Group
  643. for i, ruleSet := range r.ruleSets {
  644. ruleSetInPlace := ruleSet
  645. ruleSetStartGroup.Append0(func(ctx context.Context) error {
  646. err := ruleSetInPlace.StartContext(ctx, ruleSetStartContext)
  647. if err != nil {
  648. return E.Cause(err, "initialize rule-set[", i, "]")
  649. }
  650. return nil
  651. })
  652. }
  653. ruleSetStartGroup.Concurrency(5)
  654. ruleSetStartGroup.FastFail()
  655. err := ruleSetStartGroup.Run(r.ctx)
  656. monitor.Finish()
  657. if err != nil {
  658. return err
  659. }
  660. ruleSetStartContext.Close()
  661. }
  662. needFindProcess := r.needFindProcess
  663. needWIFIState := r.needWIFIState
  664. for _, ruleSet := range r.ruleSets {
  665. metadata := ruleSet.Metadata()
  666. if metadata.ContainsProcessRule {
  667. needFindProcess = true
  668. }
  669. if metadata.ContainsWIFIRule {
  670. needWIFIState = true
  671. }
  672. }
  673. if C.IsAndroid && r.platformInterface == nil && !r.needPackageManager {
  674. if needFindProcess {
  675. monitor.Start("start package manager")
  676. err := r.packageManager.Start()
  677. monitor.Finish()
  678. if err != nil {
  679. return E.Cause(err, "start package manager")
  680. }
  681. } else {
  682. r.packageManager = nil
  683. }
  684. }
  685. if needFindProcess {
  686. if r.platformInterface != nil {
  687. r.processSearcher = r.platformInterface
  688. } else {
  689. monitor.Start("initialize process searcher")
  690. searcher, err := process.NewSearcher(process.Config{
  691. Logger: r.logger,
  692. PackageManager: r.packageManager,
  693. })
  694. monitor.Finish()
  695. if err != nil {
  696. if err != os.ErrInvalid {
  697. r.logger.Warn(E.Cause(err, "create process searcher"))
  698. }
  699. } else {
  700. r.processSearcher = searcher
  701. }
  702. }
  703. }
  704. if needWIFIState && r.platformInterface != nil {
  705. monitor.Start("initialize WIFI state")
  706. r.needWIFIState = true
  707. r.interfaceMonitor.RegisterCallback(func(_ int) {
  708. r.updateWIFIState()
  709. })
  710. r.updateWIFIState()
  711. monitor.Finish()
  712. }
  713. for i, rule := range r.rules {
  714. monitor.Start("initialize rule[", i, "]")
  715. err := rule.Start()
  716. monitor.Finish()
  717. if err != nil {
  718. return E.Cause(err, "initialize rule[", i, "]")
  719. }
  720. }
  721. for _, ruleSet := range r.ruleSets {
  722. monitor.Start("post start rule_set[", ruleSet.Name(), "]")
  723. err := ruleSet.PostStart()
  724. monitor.Finish()
  725. if err != nil {
  726. return E.Cause(err, "post start rule_set[", ruleSet.Name(), "]")
  727. }
  728. }
  729. r.started = true
  730. return nil
  731. }
  732. func (r *Router) Cleanup() error {
  733. for _, ruleSet := range r.ruleSetMap {
  734. ruleSet.Cleanup()
  735. }
  736. runtime.GC()
  737. return nil
  738. }
  739. func (r *Router) Outbound(tag string) (adapter.Outbound, bool) {
  740. outbound, loaded := r.outboundByTag[tag]
  741. return outbound, loaded
  742. }
  743. func (r *Router) DefaultOutbound(network string) (adapter.Outbound, error) {
  744. if network == N.NetworkTCP {
  745. if r.defaultOutboundForConnection == nil {
  746. return nil, E.New("missing default outbound for TCP connections")
  747. }
  748. return r.defaultOutboundForConnection, nil
  749. } else {
  750. if r.defaultOutboundForPacketConnection == nil {
  751. return nil, E.New("missing default outbound for UDP connections")
  752. }
  753. return r.defaultOutboundForPacketConnection, nil
  754. }
  755. }
  756. func (r *Router) FakeIPStore() adapter.FakeIPStore {
  757. return r.fakeIPStore
  758. }
  759. func (r *Router) RuleSet(tag string) (adapter.RuleSet, bool) {
  760. ruleSet, loaded := r.ruleSetMap[tag]
  761. return ruleSet, loaded
  762. }
  763. func (r *Router) NeedWIFIState() bool {
  764. return r.needWIFIState
  765. }
  766. func (r *Router) RouteConnection(ctx context.Context, conn net.Conn, metadata adapter.InboundContext) error {
  767. if r.pauseManager.IsDevicePaused() {
  768. return E.New("reject connection to ", metadata.Destination, " while device paused")
  769. }
  770. if metadata.InboundDetour != "" {
  771. if metadata.LastInbound == metadata.InboundDetour {
  772. return E.New("routing loop on detour: ", metadata.InboundDetour)
  773. }
  774. detour := r.inboundByTag[metadata.InboundDetour]
  775. if detour == nil {
  776. return E.New("inbound detour not found: ", metadata.InboundDetour)
  777. }
  778. injectable, isInjectable := detour.(adapter.InjectableInbound)
  779. if !isInjectable {
  780. return E.New("inbound detour is not injectable: ", metadata.InboundDetour)
  781. }
  782. if !common.Contains(injectable.Network(), N.NetworkTCP) {
  783. return E.New("inject: TCP unsupported")
  784. }
  785. metadata.LastInbound = metadata.Inbound
  786. metadata.Inbound = metadata.InboundDetour
  787. metadata.InboundDetour = ""
  788. err := injectable.NewConnection(ctx, conn, metadata)
  789. if err != nil {
  790. return E.Cause(err, "inject ", detour.Tag())
  791. }
  792. return nil
  793. }
  794. conntrack.KillerCheck()
  795. metadata.Network = N.NetworkTCP
  796. switch metadata.Destination.Fqdn {
  797. case mux.Destination.Fqdn:
  798. return E.New("global multiplex is deprecated since sing-box v1.7.0, enable multiplex in inbound options instead.")
  799. case vmess.MuxDestination.Fqdn:
  800. return E.New("global multiplex (v2ray legacy) not supported since sing-box v1.7.0.")
  801. case uot.MagicAddress:
  802. return E.New("global UoT not supported since sing-box v1.7.0.")
  803. case uot.LegacyMagicAddress:
  804. return E.New("global UoT (legacy) not supported since sing-box v1.7.0.")
  805. }
  806. if r.fakeIPStore != nil && r.fakeIPStore.Contains(metadata.Destination.Addr) {
  807. domain, loaded := r.fakeIPStore.Lookup(metadata.Destination.Addr)
  808. if !loaded {
  809. return E.New("missing fakeip context")
  810. }
  811. metadata.OriginDestination = metadata.Destination
  812. metadata.Destination = M.Socksaddr{
  813. Fqdn: domain,
  814. Port: metadata.Destination.Port,
  815. }
  816. metadata.FakeIP = true
  817. r.logger.DebugContext(ctx, "found fakeip domain: ", domain)
  818. }
  819. if deadline.NeedAdditionalReadDeadline(conn) {
  820. conn = deadline.NewConn(conn)
  821. }
  822. if metadata.InboundOptions.SniffEnabled && !sniff.Skip(metadata) {
  823. buffer := buf.NewPacket()
  824. err := sniff.PeekStream(
  825. ctx,
  826. &metadata,
  827. conn,
  828. buffer,
  829. time.Duration(metadata.InboundOptions.SniffTimeout),
  830. sniff.TLSClientHello,
  831. sniff.HTTPHost,
  832. sniff.StreamDomainNameQuery,
  833. sniff.SSH,
  834. sniff.BitTorrent,
  835. )
  836. if err == nil {
  837. if metadata.InboundOptions.SniffOverrideDestination && M.IsDomainName(metadata.Domain) {
  838. metadata.Destination = M.Socksaddr{
  839. Fqdn: metadata.Domain,
  840. Port: metadata.Destination.Port,
  841. }
  842. }
  843. if metadata.Domain != "" {
  844. r.logger.DebugContext(ctx, "sniffed protocol: ", metadata.Protocol, ", domain: ", metadata.Domain)
  845. } else {
  846. r.logger.DebugContext(ctx, "sniffed protocol: ", metadata.Protocol)
  847. }
  848. }
  849. if !buffer.IsEmpty() {
  850. conn = bufio.NewCachedConn(conn, buffer)
  851. } else {
  852. buffer.Release()
  853. }
  854. }
  855. if r.dnsReverseMapping != nil && metadata.Domain == "" {
  856. domain, loaded := r.dnsReverseMapping.Query(metadata.Destination.Addr)
  857. if loaded {
  858. metadata.Domain = domain
  859. r.logger.DebugContext(ctx, "found reserve mapped domain: ", metadata.Domain)
  860. }
  861. }
  862. if metadata.Destination.IsFqdn() && dns.DomainStrategy(metadata.InboundOptions.DomainStrategy) != dns.DomainStrategyAsIS {
  863. addresses, err := r.Lookup(adapter.WithContext(ctx, &metadata), metadata.Destination.Fqdn, dns.DomainStrategy(metadata.InboundOptions.DomainStrategy))
  864. if err != nil {
  865. return err
  866. }
  867. metadata.DestinationAddresses = addresses
  868. r.dnsLogger.DebugContext(ctx, "resolved [", strings.Join(F.MapToString(metadata.DestinationAddresses), " "), "]")
  869. }
  870. if metadata.Destination.IsIPv4() {
  871. metadata.IPVersion = 4
  872. } else if metadata.Destination.IsIPv6() {
  873. metadata.IPVersion = 6
  874. }
  875. ctx, matchedRule, detour, err := r.match(ctx, &metadata, r.defaultOutboundForConnection)
  876. if err != nil {
  877. return err
  878. }
  879. if !common.Contains(detour.Network(), N.NetworkTCP) {
  880. return E.New("missing supported outbound, closing connection")
  881. }
  882. if r.clashServer != nil {
  883. trackerConn, tracker := r.clashServer.RoutedConnection(ctx, conn, metadata, matchedRule)
  884. defer tracker.Leave()
  885. conn = trackerConn
  886. }
  887. if r.v2rayServer != nil {
  888. if statsService := r.v2rayServer.StatsService(); statsService != nil {
  889. conn = statsService.RoutedConnection(metadata.Inbound, detour.Tag(), metadata.User, conn)
  890. }
  891. }
  892. return detour.NewConnection(ctx, conn, metadata)
  893. }
  894. func (r *Router) RoutePacketConnection(ctx context.Context, conn N.PacketConn, metadata adapter.InboundContext) error {
  895. if r.pauseManager.IsDevicePaused() {
  896. return E.New("reject packet connection to ", metadata.Destination, " while device paused")
  897. }
  898. if metadata.InboundDetour != "" {
  899. if metadata.LastInbound == metadata.InboundDetour {
  900. return E.New("routing loop on detour: ", metadata.InboundDetour)
  901. }
  902. detour := r.inboundByTag[metadata.InboundDetour]
  903. if detour == nil {
  904. return E.New("inbound detour not found: ", metadata.InboundDetour)
  905. }
  906. injectable, isInjectable := detour.(adapter.InjectableInbound)
  907. if !isInjectable {
  908. return E.New("inbound detour is not injectable: ", metadata.InboundDetour)
  909. }
  910. if !common.Contains(injectable.Network(), N.NetworkUDP) {
  911. return E.New("inject: UDP unsupported")
  912. }
  913. metadata.LastInbound = metadata.Inbound
  914. metadata.Inbound = metadata.InboundDetour
  915. metadata.InboundDetour = ""
  916. err := injectable.NewPacketConnection(ctx, conn, metadata)
  917. if err != nil {
  918. return E.Cause(err, "inject ", detour.Tag())
  919. }
  920. return nil
  921. }
  922. conntrack.KillerCheck()
  923. metadata.Network = N.NetworkUDP
  924. if r.fakeIPStore != nil && r.fakeIPStore.Contains(metadata.Destination.Addr) {
  925. domain, loaded := r.fakeIPStore.Lookup(metadata.Destination.Addr)
  926. if !loaded {
  927. return E.New("missing fakeip context")
  928. }
  929. metadata.OriginDestination = metadata.Destination
  930. metadata.Destination = M.Socksaddr{
  931. Fqdn: domain,
  932. Port: metadata.Destination.Port,
  933. }
  934. metadata.FakeIP = true
  935. r.logger.DebugContext(ctx, "found fakeip domain: ", domain)
  936. }
  937. // Currently we don't have deadline usages for UDP connections
  938. /*if deadline.NeedAdditionalReadDeadline(conn) {
  939. conn = deadline.NewPacketConn(bufio.NewNetPacketConn(conn))
  940. }*/
  941. if metadata.InboundOptions.SniffEnabled || metadata.Destination.Addr.IsUnspecified() {
  942. var bufferList []*buf.Buffer
  943. for {
  944. var (
  945. buffer = buf.NewPacket()
  946. destination M.Socksaddr
  947. done = make(chan struct{})
  948. err error
  949. )
  950. go func() {
  951. sniffTimeout := C.ReadPayloadTimeout
  952. if metadata.InboundOptions.SniffTimeout > 0 {
  953. sniffTimeout = time.Duration(metadata.InboundOptions.SniffTimeout)
  954. }
  955. conn.SetReadDeadline(time.Now().Add(sniffTimeout))
  956. destination, err = conn.ReadPacket(buffer)
  957. conn.SetReadDeadline(time.Time{})
  958. close(done)
  959. }()
  960. select {
  961. case <-done:
  962. case <-ctx.Done():
  963. conn.Close()
  964. return ctx.Err()
  965. }
  966. if err != nil {
  967. buffer.Release()
  968. if !errors.Is(err, os.ErrDeadlineExceeded) {
  969. return err
  970. }
  971. } else {
  972. if metadata.Destination.Addr.IsUnspecified() {
  973. metadata.Destination = destination
  974. }
  975. if metadata.InboundOptions.SniffEnabled {
  976. if len(bufferList) > 0 {
  977. err = sniff.PeekPacket(
  978. ctx,
  979. &metadata,
  980. buffer.Bytes(),
  981. sniff.QUICClientHello,
  982. )
  983. } else {
  984. err = sniff.PeekPacket(
  985. ctx, &metadata,
  986. buffer.Bytes(),
  987. sniff.DomainNameQuery,
  988. sniff.QUICClientHello,
  989. sniff.STUNMessage,
  990. sniff.UTP,
  991. sniff.UDPTracker,
  992. sniff.DTLSRecord)
  993. }
  994. if E.IsMulti(err, sniff.ErrClientHelloFragmented) && len(bufferList) == 0 {
  995. bufferList = append(bufferList, buffer)
  996. r.logger.DebugContext(ctx, "attempt to sniff fragmented QUIC client hello")
  997. continue
  998. }
  999. if metadata.Protocol != "" {
  1000. if metadata.InboundOptions.SniffOverrideDestination && M.IsDomainName(metadata.Domain) {
  1001. metadata.Destination = M.Socksaddr{
  1002. Fqdn: metadata.Domain,
  1003. Port: metadata.Destination.Port,
  1004. }
  1005. }
  1006. if metadata.Domain != "" && metadata.Client != "" {
  1007. r.logger.DebugContext(ctx, "sniffed packet protocol: ", metadata.Protocol, ", domain: ", metadata.Domain, ", client: ", metadata.Client)
  1008. } else if metadata.Domain != "" {
  1009. r.logger.DebugContext(ctx, "sniffed packet protocol: ", metadata.Protocol, ", domain: ", metadata.Domain)
  1010. } else if metadata.Client != "" {
  1011. r.logger.DebugContext(ctx, "sniffed packet protocol: ", metadata.Protocol, ", client: ", metadata.Client)
  1012. } else {
  1013. r.logger.DebugContext(ctx, "sniffed packet protocol: ", metadata.Protocol)
  1014. }
  1015. }
  1016. }
  1017. conn = bufio.NewCachedPacketConn(conn, buffer, destination)
  1018. }
  1019. for _, cachedBuffer := range common.Reverse(bufferList) {
  1020. conn = bufio.NewCachedPacketConn(conn, cachedBuffer, destination)
  1021. }
  1022. break
  1023. }
  1024. }
  1025. if r.dnsReverseMapping != nil && metadata.Domain == "" {
  1026. domain, loaded := r.dnsReverseMapping.Query(metadata.Destination.Addr)
  1027. if loaded {
  1028. metadata.Domain = domain
  1029. r.logger.DebugContext(ctx, "found reserve mapped domain: ", metadata.Domain)
  1030. }
  1031. }
  1032. if metadata.Destination.IsFqdn() && dns.DomainStrategy(metadata.InboundOptions.DomainStrategy) != dns.DomainStrategyAsIS {
  1033. addresses, err := r.Lookup(adapter.WithContext(ctx, &metadata), metadata.Destination.Fqdn, dns.DomainStrategy(metadata.InboundOptions.DomainStrategy))
  1034. if err != nil {
  1035. return err
  1036. }
  1037. metadata.DestinationAddresses = addresses
  1038. r.dnsLogger.DebugContext(ctx, "resolved [", strings.Join(F.MapToString(metadata.DestinationAddresses), " "), "]")
  1039. }
  1040. if metadata.Destination.IsIPv4() {
  1041. metadata.IPVersion = 4
  1042. } else if metadata.Destination.IsIPv6() {
  1043. metadata.IPVersion = 6
  1044. }
  1045. ctx, matchedRule, detour, err := r.match(ctx, &metadata, r.defaultOutboundForPacketConnection)
  1046. if err != nil {
  1047. return err
  1048. }
  1049. if !common.Contains(detour.Network(), N.NetworkUDP) {
  1050. return E.New("missing supported outbound, closing packet connection")
  1051. }
  1052. if r.clashServer != nil {
  1053. trackerConn, tracker := r.clashServer.RoutedPacketConnection(ctx, conn, metadata, matchedRule)
  1054. defer tracker.Leave()
  1055. conn = trackerConn
  1056. }
  1057. if r.v2rayServer != nil {
  1058. if statsService := r.v2rayServer.StatsService(); statsService != nil {
  1059. conn = statsService.RoutedPacketConnection(metadata.Inbound, detour.Tag(), metadata.User, conn)
  1060. }
  1061. }
  1062. if metadata.FakeIP {
  1063. conn = bufio.NewNATPacketConn(bufio.NewNetPacketConn(conn), metadata.OriginDestination, metadata.Destination)
  1064. }
  1065. return detour.NewPacketConnection(ctx, conn, metadata)
  1066. }
  1067. func (r *Router) match(ctx context.Context, metadata *adapter.InboundContext, defaultOutbound adapter.Outbound) (context.Context, adapter.Rule, adapter.Outbound, error) {
  1068. matchRule, matchOutbound := r.match0(ctx, metadata, defaultOutbound)
  1069. if contextOutbound, loaded := outbound.TagFromContext(ctx); loaded {
  1070. if contextOutbound == matchOutbound.Tag() {
  1071. return nil, nil, nil, E.New("connection loopback in outbound/", matchOutbound.Type(), "[", matchOutbound.Tag(), "]")
  1072. }
  1073. }
  1074. ctx = outbound.ContextWithTag(ctx, matchOutbound.Tag())
  1075. return ctx, matchRule, matchOutbound, nil
  1076. }
  1077. func (r *Router) match0(ctx context.Context, metadata *adapter.InboundContext, defaultOutbound adapter.Outbound) (adapter.Rule, adapter.Outbound) {
  1078. if r.processSearcher != nil {
  1079. var originDestination netip.AddrPort
  1080. if metadata.OriginDestination.IsValid() {
  1081. originDestination = metadata.OriginDestination.AddrPort()
  1082. } else if metadata.Destination.IsIP() {
  1083. originDestination = metadata.Destination.AddrPort()
  1084. }
  1085. processInfo, err := process.FindProcessInfo(r.processSearcher, ctx, metadata.Network, metadata.Source.AddrPort(), originDestination)
  1086. if err != nil {
  1087. r.logger.InfoContext(ctx, "failed to search process: ", err)
  1088. } else {
  1089. if processInfo.ProcessPath != "" {
  1090. r.logger.InfoContext(ctx, "found process path: ", processInfo.ProcessPath)
  1091. } else if processInfo.PackageName != "" {
  1092. r.logger.InfoContext(ctx, "found package name: ", processInfo.PackageName)
  1093. } else if processInfo.UserId != -1 {
  1094. if /*needUserName &&*/ true {
  1095. osUser, _ := user.LookupId(F.ToString(processInfo.UserId))
  1096. if osUser != nil {
  1097. processInfo.User = osUser.Username
  1098. }
  1099. }
  1100. if processInfo.User != "" {
  1101. r.logger.InfoContext(ctx, "found user: ", processInfo.User)
  1102. } else {
  1103. r.logger.InfoContext(ctx, "found user id: ", processInfo.UserId)
  1104. }
  1105. }
  1106. metadata.ProcessInfo = processInfo
  1107. }
  1108. }
  1109. for i, rule := range r.rules {
  1110. metadata.ResetRuleCache()
  1111. if rule.Match(metadata) {
  1112. detour := rule.Outbound()
  1113. r.logger.DebugContext(ctx, "match[", i, "] ", rule.String(), " => ", detour)
  1114. if outbound, loaded := r.Outbound(detour); loaded {
  1115. return rule, outbound
  1116. }
  1117. r.logger.ErrorContext(ctx, "outbound not found: ", detour)
  1118. }
  1119. }
  1120. return nil, defaultOutbound
  1121. }
  1122. func (r *Router) InterfaceFinder() control.InterfaceFinder {
  1123. return r.interfaceFinder
  1124. }
  1125. func (r *Router) UpdateInterfaces() error {
  1126. if r.platformInterface == nil || !r.platformInterface.UsePlatformInterfaceGetter() {
  1127. return r.interfaceFinder.Update()
  1128. } else {
  1129. interfaces, err := r.platformInterface.Interfaces()
  1130. if err != nil {
  1131. return err
  1132. }
  1133. r.interfaceFinder.UpdateInterfaces(interfaces)
  1134. return nil
  1135. }
  1136. }
  1137. func (r *Router) AutoDetectInterface() bool {
  1138. return r.autoDetectInterface
  1139. }
  1140. func (r *Router) AutoDetectInterfaceFunc() control.Func {
  1141. if r.platformInterface != nil && r.platformInterface.UsePlatformAutoDetectInterfaceControl() {
  1142. return r.platformInterface.AutoDetectInterfaceControl()
  1143. } else {
  1144. if r.interfaceMonitor == nil {
  1145. return nil
  1146. }
  1147. return control.BindToInterfaceFunc(r.InterfaceFinder(), func(network string, address string) (interfaceName string, interfaceIndex int, err error) {
  1148. remoteAddr := M.ParseSocksaddr(address).Addr
  1149. if C.IsLinux {
  1150. interfaceName, interfaceIndex = r.InterfaceMonitor().DefaultInterface(remoteAddr)
  1151. if interfaceIndex == -1 {
  1152. err = tun.ErrNoRoute
  1153. }
  1154. } else {
  1155. interfaceIndex = r.InterfaceMonitor().DefaultInterfaceIndex(remoteAddr)
  1156. if interfaceIndex == -1 {
  1157. err = tun.ErrNoRoute
  1158. }
  1159. }
  1160. return
  1161. })
  1162. }
  1163. }
  1164. func (r *Router) RegisterAutoRedirectOutputMark(mark uint32) error {
  1165. if r.autoRedirectOutputMark > 0 {
  1166. return E.New("only one auto-redirect can be configured")
  1167. }
  1168. r.autoRedirectOutputMark = mark
  1169. return nil
  1170. }
  1171. func (r *Router) AutoRedirectOutputMark() uint32 {
  1172. return r.autoRedirectOutputMark
  1173. }
  1174. func (r *Router) DefaultInterface() string {
  1175. return r.defaultInterface
  1176. }
  1177. func (r *Router) DefaultMark() uint32 {
  1178. return r.defaultMark
  1179. }
  1180. func (r *Router) Rules() []adapter.Rule {
  1181. return r.rules
  1182. }
  1183. func (r *Router) WIFIState() adapter.WIFIState {
  1184. return r.wifiState
  1185. }
  1186. func (r *Router) NetworkMonitor() tun.NetworkUpdateMonitor {
  1187. return r.networkMonitor
  1188. }
  1189. func (r *Router) InterfaceMonitor() tun.DefaultInterfaceMonitor {
  1190. return r.interfaceMonitor
  1191. }
  1192. func (r *Router) PackageManager() tun.PackageManager {
  1193. return r.packageManager
  1194. }
  1195. func (r *Router) ClashServer() adapter.ClashServer {
  1196. return r.clashServer
  1197. }
  1198. func (r *Router) SetClashServer(server adapter.ClashServer) {
  1199. r.clashServer = server
  1200. }
  1201. func (r *Router) V2RayServer() adapter.V2RayServer {
  1202. return r.v2rayServer
  1203. }
  1204. func (r *Router) SetV2RayServer(server adapter.V2RayServer) {
  1205. r.v2rayServer = server
  1206. }
  1207. func (r *Router) OnPackagesUpdated(packages int, sharedUsers int) {
  1208. r.logger.Info("updated packages list: ", packages, " packages, ", sharedUsers, " shared users")
  1209. }
  1210. func (r *Router) NewError(ctx context.Context, err error) {
  1211. common.Close(err)
  1212. if E.IsClosedOrCanceled(err) {
  1213. r.logger.DebugContext(ctx, "connection closed: ", err)
  1214. return
  1215. }
  1216. r.logger.ErrorContext(ctx, err)
  1217. }
  1218. func (r *Router) notifyNetworkUpdate(event int) {
  1219. if event == tun.EventNoRoute {
  1220. r.pauseManager.NetworkPause()
  1221. r.logger.Error("missing default interface")
  1222. } else {
  1223. r.pauseManager.NetworkWake()
  1224. if C.IsAndroid && r.platformInterface == nil {
  1225. var vpnStatus string
  1226. if r.interfaceMonitor.AndroidVPNEnabled() {
  1227. vpnStatus = "enabled"
  1228. } else {
  1229. vpnStatus = "disabled"
  1230. }
  1231. r.logger.Info("updated default interface ", r.interfaceMonitor.DefaultInterfaceName(netip.IPv4Unspecified()), ", index ", r.interfaceMonitor.DefaultInterfaceIndex(netip.IPv4Unspecified()), ", vpn ", vpnStatus)
  1232. } else {
  1233. r.logger.Info("updated default interface ", r.interfaceMonitor.DefaultInterfaceName(netip.IPv4Unspecified()), ", index ", r.interfaceMonitor.DefaultInterfaceIndex(netip.IPv4Unspecified()))
  1234. }
  1235. }
  1236. if !r.started {
  1237. return
  1238. }
  1239. _ = r.ResetNetwork()
  1240. }
  1241. func (r *Router) ResetNetwork() error {
  1242. conntrack.Close()
  1243. for _, outbound := range r.outbounds {
  1244. listener, isListener := outbound.(adapter.InterfaceUpdateListener)
  1245. if isListener {
  1246. listener.InterfaceUpdated()
  1247. }
  1248. }
  1249. for _, transport := range r.transports {
  1250. transport.Reset()
  1251. }
  1252. return nil
  1253. }
  1254. func (r *Router) updateWIFIState() {
  1255. if r.platformInterface == nil {
  1256. return
  1257. }
  1258. state := r.platformInterface.ReadWIFIState()
  1259. if state != r.wifiState {
  1260. r.wifiState = state
  1261. if state.SSID == "" && state.BSSID == "" {
  1262. r.logger.Info("updated WIFI state: disconnected")
  1263. } else {
  1264. r.logger.Info("updated WIFI state: SSID=", state.SSID, ", BSSID=", state.BSSID)
  1265. }
  1266. }
  1267. }
  1268. func (r *Router) notifyWindowsPowerEvent(event int) {
  1269. switch event {
  1270. case winpowrprof.EVENT_SUSPEND:
  1271. r.pauseManager.DevicePause()
  1272. _ = r.ResetNetwork()
  1273. case winpowrprof.EVENT_RESUME:
  1274. if !r.pauseManager.IsDevicePaused() {
  1275. return
  1276. }
  1277. fallthrough
  1278. case winpowrprof.EVENT_RESUME_AUTOMATIC:
  1279. r.pauseManager.DeviceWake()
  1280. _ = r.ResetNetwork()
  1281. }
  1282. }