router.go 43 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366
  1. package route
  2. import (
  3. "context"
  4. "errors"
  5. "net"
  6. "net/netip"
  7. "net/url"
  8. "os"
  9. "os/user"
  10. "runtime"
  11. "strings"
  12. "syscall"
  13. "time"
  14. "github.com/sagernet/sing-box/adapter"
  15. "github.com/sagernet/sing-box/common/conntrack"
  16. "github.com/sagernet/sing-box/common/dialer"
  17. "github.com/sagernet/sing-box/common/geoip"
  18. "github.com/sagernet/sing-box/common/geosite"
  19. "github.com/sagernet/sing-box/common/process"
  20. "github.com/sagernet/sing-box/common/sniff"
  21. "github.com/sagernet/sing-box/common/taskmonitor"
  22. C "github.com/sagernet/sing-box/constant"
  23. "github.com/sagernet/sing-box/experimental/libbox/platform"
  24. "github.com/sagernet/sing-box/log"
  25. "github.com/sagernet/sing-box/option"
  26. "github.com/sagernet/sing-box/outbound"
  27. "github.com/sagernet/sing-box/transport/fakeip"
  28. "github.com/sagernet/sing-dns"
  29. "github.com/sagernet/sing-mux"
  30. "github.com/sagernet/sing-tun"
  31. "github.com/sagernet/sing-vmess"
  32. "github.com/sagernet/sing/common"
  33. "github.com/sagernet/sing/common/buf"
  34. "github.com/sagernet/sing/common/bufio"
  35. "github.com/sagernet/sing/common/bufio/deadline"
  36. "github.com/sagernet/sing/common/control"
  37. E "github.com/sagernet/sing/common/exceptions"
  38. F "github.com/sagernet/sing/common/format"
  39. M "github.com/sagernet/sing/common/metadata"
  40. N "github.com/sagernet/sing/common/network"
  41. "github.com/sagernet/sing/common/ntp"
  42. "github.com/sagernet/sing/common/task"
  43. "github.com/sagernet/sing/common/uot"
  44. "github.com/sagernet/sing/common/winpowrprof"
  45. "github.com/sagernet/sing/service"
  46. "github.com/sagernet/sing/service/pause"
  47. )
  48. var _ adapter.Router = (*Router)(nil)
  49. type Router struct {
  50. ctx context.Context
  51. logger log.ContextLogger
  52. dnsLogger log.ContextLogger
  53. inboundByTag map[string]adapter.Inbound
  54. outbounds []adapter.Outbound
  55. outboundByTag map[string]adapter.Outbound
  56. rules []adapter.Rule
  57. defaultDetour string
  58. defaultOutboundForConnection adapter.Outbound
  59. defaultOutboundForPacketConnection adapter.Outbound
  60. needGeoIPDatabase bool
  61. needGeositeDatabase bool
  62. geoIPOptions option.GeoIPOptions
  63. geositeOptions option.GeositeOptions
  64. geoIPReader *geoip.Reader
  65. geositeReader *geosite.Reader
  66. geositeCache map[string]adapter.Rule
  67. needFindProcess bool
  68. dnsClient *dns.Client
  69. defaultDomainStrategy dns.DomainStrategy
  70. dnsRules []adapter.DNSRule
  71. ruleSets []adapter.RuleSet
  72. ruleSetMap map[string]adapter.RuleSet
  73. defaultTransport dns.Transport
  74. transports []dns.Transport
  75. transportMap map[string]dns.Transport
  76. transportDomainStrategy map[dns.Transport]dns.DomainStrategy
  77. dnsReverseMapping *DNSReverseMapping
  78. fakeIPStore adapter.FakeIPStore
  79. interfaceFinder *control.DefaultInterfaceFinder
  80. autoDetectInterface bool
  81. defaultInterface string
  82. defaultMark uint32
  83. autoRedirectOutputMark uint32
  84. networkMonitor tun.NetworkUpdateMonitor
  85. interfaceMonitor tun.DefaultInterfaceMonitor
  86. packageManager tun.PackageManager
  87. powerListener winpowrprof.EventListener
  88. processSearcher process.Searcher
  89. timeService *ntp.Service
  90. pauseManager pause.Manager
  91. clashServer adapter.ClashServer
  92. v2rayServer adapter.V2RayServer
  93. platformInterface platform.Interface
  94. needWIFIState bool
  95. needPackageManager bool
  96. wifiState adapter.WIFIState
  97. started bool
  98. }
  99. func NewRouter(
  100. ctx context.Context,
  101. logFactory log.Factory,
  102. options option.RouteOptions,
  103. dnsOptions option.DNSOptions,
  104. ntpOptions option.NTPOptions,
  105. inbounds []option.Inbound,
  106. platformInterface platform.Interface,
  107. ) (*Router, error) {
  108. router := &Router{
  109. ctx: ctx,
  110. logger: logFactory.NewLogger("router"),
  111. dnsLogger: logFactory.NewLogger("dns"),
  112. outboundByTag: make(map[string]adapter.Outbound),
  113. rules: make([]adapter.Rule, 0, len(options.Rules)),
  114. dnsRules: make([]adapter.DNSRule, 0, len(dnsOptions.Rules)),
  115. ruleSetMap: make(map[string]adapter.RuleSet),
  116. needGeoIPDatabase: hasRule(options.Rules, isGeoIPRule) || hasDNSRule(dnsOptions.Rules, isGeoIPDNSRule),
  117. needGeositeDatabase: hasRule(options.Rules, isGeositeRule) || hasDNSRule(dnsOptions.Rules, isGeositeDNSRule),
  118. geoIPOptions: common.PtrValueOrDefault(options.GeoIP),
  119. geositeOptions: common.PtrValueOrDefault(options.Geosite),
  120. geositeCache: make(map[string]adapter.Rule),
  121. needFindProcess: hasRule(options.Rules, isProcessRule) || hasDNSRule(dnsOptions.Rules, isProcessDNSRule) || options.FindProcess,
  122. defaultDetour: options.Final,
  123. defaultDomainStrategy: dns.DomainStrategy(dnsOptions.Strategy),
  124. interfaceFinder: control.NewDefaultInterfaceFinder(),
  125. autoDetectInterface: options.AutoDetectInterface,
  126. defaultInterface: options.DefaultInterface,
  127. defaultMark: options.DefaultMark,
  128. pauseManager: service.FromContext[pause.Manager](ctx),
  129. platformInterface: platformInterface,
  130. needWIFIState: hasRule(options.Rules, isWIFIRule) || hasDNSRule(dnsOptions.Rules, isWIFIDNSRule),
  131. needPackageManager: common.Any(inbounds, func(inbound option.Inbound) bool {
  132. return len(inbound.TunOptions.IncludePackage) > 0 || len(inbound.TunOptions.ExcludePackage) > 0
  133. }),
  134. }
  135. router.dnsClient = dns.NewClient(dns.ClientOptions{
  136. DisableCache: dnsOptions.DNSClientOptions.DisableCache,
  137. DisableExpire: dnsOptions.DNSClientOptions.DisableExpire,
  138. IndependentCache: dnsOptions.DNSClientOptions.IndependentCache,
  139. RDRC: func() dns.RDRCStore {
  140. cacheFile := service.FromContext[adapter.CacheFile](ctx)
  141. if cacheFile == nil {
  142. return nil
  143. }
  144. if !cacheFile.StoreRDRC() {
  145. return nil
  146. }
  147. return cacheFile
  148. },
  149. Logger: router.dnsLogger,
  150. })
  151. for i, ruleOptions := range options.Rules {
  152. routeRule, err := NewRule(ctx, router, router.logger, ruleOptions, true)
  153. if err != nil {
  154. return nil, E.Cause(err, "parse rule[", i, "]")
  155. }
  156. router.rules = append(router.rules, routeRule)
  157. }
  158. for i, dnsRuleOptions := range dnsOptions.Rules {
  159. dnsRule, err := NewDNSRule(ctx, router, router.logger, dnsRuleOptions, true)
  160. if err != nil {
  161. return nil, E.Cause(err, "parse dns rule[", i, "]")
  162. }
  163. router.dnsRules = append(router.dnsRules, dnsRule)
  164. }
  165. for i, ruleSetOptions := range options.RuleSet {
  166. if _, exists := router.ruleSetMap[ruleSetOptions.Tag]; exists {
  167. return nil, E.New("duplicate rule-set tag: ", ruleSetOptions.Tag)
  168. }
  169. ruleSet, err := NewRuleSet(ctx, router, router.logger, ruleSetOptions)
  170. if err != nil {
  171. return nil, E.Cause(err, "parse rule-set[", i, "]")
  172. }
  173. router.ruleSets = append(router.ruleSets, ruleSet)
  174. router.ruleSetMap[ruleSetOptions.Tag] = ruleSet
  175. }
  176. transports := make([]dns.Transport, len(dnsOptions.Servers))
  177. dummyTransportMap := make(map[string]dns.Transport)
  178. transportMap := make(map[string]dns.Transport)
  179. transportTags := make([]string, len(dnsOptions.Servers))
  180. transportTagMap := make(map[string]bool)
  181. transportDomainStrategy := make(map[dns.Transport]dns.DomainStrategy)
  182. for i, server := range dnsOptions.Servers {
  183. var tag string
  184. if server.Tag != "" {
  185. tag = server.Tag
  186. } else {
  187. tag = F.ToString(i)
  188. }
  189. if transportTagMap[tag] {
  190. return nil, E.New("duplicate dns server tag: ", tag)
  191. }
  192. transportTags[i] = tag
  193. transportTagMap[tag] = true
  194. }
  195. ctx = adapter.ContextWithRouter(ctx, router)
  196. for {
  197. lastLen := len(dummyTransportMap)
  198. for i, server := range dnsOptions.Servers {
  199. tag := transportTags[i]
  200. if _, exists := dummyTransportMap[tag]; exists {
  201. continue
  202. }
  203. var detour N.Dialer
  204. if server.Detour == "" {
  205. detour = dialer.NewRouter(router)
  206. } else {
  207. detour = dialer.NewDetour(router, server.Detour)
  208. }
  209. var serverProtocol string
  210. switch server.Address {
  211. case "local":
  212. serverProtocol = "local"
  213. default:
  214. serverURL, _ := url.Parse(server.Address)
  215. var serverAddress string
  216. if serverURL != nil {
  217. if serverURL.Scheme == "" {
  218. serverProtocol = "udp"
  219. } else {
  220. serverProtocol = serverURL.Scheme
  221. }
  222. serverAddress = serverURL.Hostname()
  223. }
  224. if serverAddress == "" {
  225. serverAddress = server.Address
  226. }
  227. notIpAddress := !M.ParseSocksaddr(serverAddress).Addr.IsValid()
  228. if server.AddressResolver != "" {
  229. if !transportTagMap[server.AddressResolver] {
  230. return nil, E.New("parse dns server[", tag, "]: address resolver not found: ", server.AddressResolver)
  231. }
  232. if upstream, exists := dummyTransportMap[server.AddressResolver]; exists {
  233. detour = dns.NewDialerWrapper(detour, router.dnsClient, upstream, dns.DomainStrategy(server.AddressStrategy), time.Duration(server.AddressFallbackDelay))
  234. } else {
  235. continue
  236. }
  237. } else if notIpAddress && strings.Contains(server.Address, ".") {
  238. return nil, E.New("parse dns server[", tag, "]: missing address_resolver")
  239. }
  240. }
  241. var clientSubnet netip.Prefix
  242. if server.ClientSubnet != nil {
  243. clientSubnet = server.ClientSubnet.Build()
  244. } else if dnsOptions.ClientSubnet != nil {
  245. clientSubnet = dnsOptions.ClientSubnet.Build()
  246. }
  247. if serverProtocol == "" {
  248. serverProtocol = "transport"
  249. }
  250. transport, err := dns.CreateTransport(dns.TransportOptions{
  251. Context: ctx,
  252. Logger: logFactory.NewLogger(F.ToString("dns/", serverProtocol, "[", tag, "]")),
  253. Name: tag,
  254. Dialer: detour,
  255. Address: server.Address,
  256. ClientSubnet: clientSubnet,
  257. })
  258. if err != nil {
  259. return nil, E.Cause(err, "parse dns server[", tag, "]")
  260. }
  261. transports[i] = transport
  262. dummyTransportMap[tag] = transport
  263. if server.Tag != "" {
  264. transportMap[server.Tag] = transport
  265. }
  266. strategy := dns.DomainStrategy(server.Strategy)
  267. if strategy != dns.DomainStrategyAsIS {
  268. transportDomainStrategy[transport] = strategy
  269. }
  270. }
  271. if len(transports) == len(dummyTransportMap) {
  272. break
  273. }
  274. if lastLen != len(dummyTransportMap) {
  275. continue
  276. }
  277. unresolvedTags := common.MapIndexed(common.FilterIndexed(dnsOptions.Servers, func(index int, server option.DNSServerOptions) bool {
  278. _, exists := dummyTransportMap[transportTags[index]]
  279. return !exists
  280. }), func(index int, server option.DNSServerOptions) string {
  281. return transportTags[index]
  282. })
  283. if len(unresolvedTags) == 0 {
  284. panic(F.ToString("unexpected unresolved dns servers: ", len(transports), " ", len(dummyTransportMap), " ", len(transportMap)))
  285. }
  286. return nil, E.New("found circular reference in dns servers: ", strings.Join(unresolvedTags, " "))
  287. }
  288. var defaultTransport dns.Transport
  289. if dnsOptions.Final != "" {
  290. defaultTransport = dummyTransportMap[dnsOptions.Final]
  291. if defaultTransport == nil {
  292. return nil, E.New("default dns server not found: ", dnsOptions.Final)
  293. }
  294. }
  295. if defaultTransport == nil {
  296. if len(transports) == 0 {
  297. transports = append(transports, common.Must1(dns.CreateTransport(dns.TransportOptions{
  298. Context: ctx,
  299. Name: "local",
  300. Address: "local",
  301. Dialer: common.Must1(dialer.NewDefault(router, option.DialerOptions{})),
  302. })))
  303. }
  304. defaultTransport = transports[0]
  305. }
  306. if _, isFakeIP := defaultTransport.(adapter.FakeIPTransport); isFakeIP {
  307. return nil, E.New("default DNS server cannot be fakeip")
  308. }
  309. router.defaultTransport = defaultTransport
  310. router.transports = transports
  311. router.transportMap = transportMap
  312. router.transportDomainStrategy = transportDomainStrategy
  313. if dnsOptions.ReverseMapping {
  314. router.dnsReverseMapping = NewDNSReverseMapping()
  315. }
  316. if fakeIPOptions := dnsOptions.FakeIP; fakeIPOptions != nil && dnsOptions.FakeIP.Enabled {
  317. var inet4Range netip.Prefix
  318. var inet6Range netip.Prefix
  319. if fakeIPOptions.Inet4Range != nil {
  320. inet4Range = *fakeIPOptions.Inet4Range
  321. }
  322. if fakeIPOptions.Inet6Range != nil {
  323. inet6Range = *fakeIPOptions.Inet6Range
  324. }
  325. router.fakeIPStore = fakeip.NewStore(ctx, router.logger, inet4Range, inet6Range)
  326. }
  327. usePlatformDefaultInterfaceMonitor := platformInterface != nil && platformInterface.UsePlatformDefaultInterfaceMonitor()
  328. needInterfaceMonitor := options.AutoDetectInterface || common.Any(inbounds, func(inbound option.Inbound) bool {
  329. return inbound.HTTPOptions.SetSystemProxy || inbound.MixedOptions.SetSystemProxy || inbound.TunOptions.AutoRoute
  330. })
  331. if !usePlatformDefaultInterfaceMonitor {
  332. networkMonitor, err := tun.NewNetworkUpdateMonitor(router.logger)
  333. if !((err != nil && !needInterfaceMonitor) || errors.Is(err, os.ErrInvalid)) {
  334. if err != nil {
  335. return nil, err
  336. }
  337. router.networkMonitor = networkMonitor
  338. interfaceMonitor, err := tun.NewDefaultInterfaceMonitor(router.networkMonitor, router.logger, tun.DefaultInterfaceMonitorOptions{
  339. InterfaceFinder: router.interfaceFinder,
  340. OverrideAndroidVPN: options.OverrideAndroidVPN,
  341. UnderNetworkExtension: platformInterface != nil && platformInterface.UnderNetworkExtension(),
  342. })
  343. if err != nil {
  344. return nil, E.New("auto_detect_interface unsupported on current platform")
  345. }
  346. interfaceMonitor.RegisterCallback(router.notifyNetworkUpdate)
  347. router.interfaceMonitor = interfaceMonitor
  348. }
  349. } else {
  350. interfaceMonitor := platformInterface.CreateDefaultInterfaceMonitor(router.logger)
  351. interfaceMonitor.RegisterCallback(router.notifyNetworkUpdate)
  352. router.interfaceMonitor = interfaceMonitor
  353. }
  354. if ntpOptions.Enabled {
  355. ntpDialer, err := dialer.New(router, ntpOptions.DialerOptions)
  356. if err != nil {
  357. return nil, E.Cause(err, "create NTP service")
  358. }
  359. timeService := ntp.NewService(ntp.Options{
  360. Context: ctx,
  361. Dialer: ntpDialer,
  362. Logger: logFactory.NewLogger("ntp"),
  363. Server: ntpOptions.ServerOptions.Build(),
  364. Interval: time.Duration(ntpOptions.Interval),
  365. WriteToSystem: ntpOptions.WriteToSystem,
  366. })
  367. service.MustRegister[ntp.TimeService](ctx, timeService)
  368. router.timeService = timeService
  369. }
  370. return router, nil
  371. }
  372. func (r *Router) Initialize(inbounds []adapter.Inbound, outbounds []adapter.Outbound, defaultOutbound func() adapter.Outbound) error {
  373. inboundByTag := make(map[string]adapter.Inbound)
  374. for _, inbound := range inbounds {
  375. inboundByTag[inbound.Tag()] = inbound
  376. }
  377. outboundByTag := make(map[string]adapter.Outbound)
  378. for _, detour := range outbounds {
  379. outboundByTag[detour.Tag()] = detour
  380. }
  381. var defaultOutboundForConnection adapter.Outbound
  382. var defaultOutboundForPacketConnection adapter.Outbound
  383. if r.defaultDetour != "" {
  384. detour, loaded := outboundByTag[r.defaultDetour]
  385. if !loaded {
  386. return E.New("default detour not found: ", r.defaultDetour)
  387. }
  388. if common.Contains(detour.Network(), N.NetworkTCP) {
  389. defaultOutboundForConnection = detour
  390. }
  391. if common.Contains(detour.Network(), N.NetworkUDP) {
  392. defaultOutboundForPacketConnection = detour
  393. }
  394. }
  395. if defaultOutboundForConnection == nil {
  396. for _, detour := range outbounds {
  397. if common.Contains(detour.Network(), N.NetworkTCP) {
  398. defaultOutboundForConnection = detour
  399. break
  400. }
  401. }
  402. }
  403. if defaultOutboundForPacketConnection == nil {
  404. for _, detour := range outbounds {
  405. if common.Contains(detour.Network(), N.NetworkUDP) {
  406. defaultOutboundForPacketConnection = detour
  407. break
  408. }
  409. }
  410. }
  411. if defaultOutboundForConnection == nil || defaultOutboundForPacketConnection == nil {
  412. detour := defaultOutbound()
  413. if defaultOutboundForConnection == nil {
  414. defaultOutboundForConnection = detour
  415. }
  416. if defaultOutboundForPacketConnection == nil {
  417. defaultOutboundForPacketConnection = detour
  418. }
  419. outbounds = append(outbounds, detour)
  420. outboundByTag[detour.Tag()] = detour
  421. }
  422. r.inboundByTag = inboundByTag
  423. r.outbounds = outbounds
  424. r.defaultOutboundForConnection = defaultOutboundForConnection
  425. r.defaultOutboundForPacketConnection = defaultOutboundForPacketConnection
  426. r.outboundByTag = outboundByTag
  427. for i, rule := range r.rules {
  428. if _, loaded := outboundByTag[rule.Outbound()]; !loaded {
  429. return E.New("outbound not found for rule[", i, "]: ", rule.Outbound())
  430. }
  431. }
  432. return nil
  433. }
  434. func (r *Router) Outbounds() []adapter.Outbound {
  435. if !r.started {
  436. return nil
  437. }
  438. return r.outbounds
  439. }
  440. func (r *Router) PreStart() error {
  441. monitor := taskmonitor.New(r.logger, C.StartTimeout)
  442. if r.interfaceMonitor != nil {
  443. monitor.Start("initialize interface monitor")
  444. err := r.interfaceMonitor.Start()
  445. monitor.Finish()
  446. if err != nil {
  447. return err
  448. }
  449. }
  450. if r.networkMonitor != nil {
  451. monitor.Start("initialize network monitor")
  452. err := r.networkMonitor.Start()
  453. monitor.Finish()
  454. if err != nil {
  455. return err
  456. }
  457. }
  458. if r.fakeIPStore != nil {
  459. monitor.Start("initialize fakeip store")
  460. err := r.fakeIPStore.Start()
  461. monitor.Finish()
  462. if err != nil {
  463. return err
  464. }
  465. }
  466. return nil
  467. }
  468. func (r *Router) Start() error {
  469. monitor := taskmonitor.New(r.logger, C.StartTimeout)
  470. if r.needGeoIPDatabase {
  471. monitor.Start("initialize geoip database")
  472. err := r.prepareGeoIPDatabase()
  473. monitor.Finish()
  474. if err != nil {
  475. return err
  476. }
  477. }
  478. if r.needGeositeDatabase {
  479. monitor.Start("initialize geosite database")
  480. err := r.prepareGeositeDatabase()
  481. monitor.Finish()
  482. if err != nil {
  483. return err
  484. }
  485. }
  486. if r.needGeositeDatabase {
  487. for _, rule := range r.rules {
  488. err := rule.UpdateGeosite()
  489. if err != nil {
  490. r.logger.Error("failed to initialize geosite: ", err)
  491. }
  492. }
  493. for _, rule := range r.dnsRules {
  494. err := rule.UpdateGeosite()
  495. if err != nil {
  496. r.logger.Error("failed to initialize geosite: ", err)
  497. }
  498. }
  499. err := common.Close(r.geositeReader)
  500. if err != nil {
  501. return err
  502. }
  503. r.geositeCache = nil
  504. r.geositeReader = nil
  505. }
  506. if runtime.GOOS == "windows" {
  507. powerListener, err := winpowrprof.NewEventListener(r.notifyWindowsPowerEvent)
  508. if err == nil {
  509. r.powerListener = powerListener
  510. } else {
  511. r.logger.Warn("initialize power listener: ", err)
  512. }
  513. }
  514. if r.powerListener != nil {
  515. monitor.Start("start power listener")
  516. err := r.powerListener.Start()
  517. monitor.Finish()
  518. if err != nil {
  519. return E.Cause(err, "start power listener")
  520. }
  521. }
  522. monitor.Start("initialize DNS client")
  523. r.dnsClient.Start()
  524. monitor.Finish()
  525. if C.IsAndroid && r.platformInterface == nil {
  526. monitor.Start("initialize package manager")
  527. packageManager, err := tun.NewPackageManager(tun.PackageManagerOptions{
  528. Callback: r,
  529. Logger: r.logger,
  530. })
  531. monitor.Finish()
  532. if err != nil {
  533. return E.Cause(err, "create package manager")
  534. }
  535. if r.needPackageManager {
  536. monitor.Start("start package manager")
  537. err = packageManager.Start()
  538. monitor.Finish()
  539. if err != nil {
  540. return E.Cause(err, "start package manager")
  541. }
  542. }
  543. r.packageManager = packageManager
  544. }
  545. for i, rule := range r.dnsRules {
  546. monitor.Start("initialize DNS rule[", i, "]")
  547. err := rule.Start()
  548. monitor.Finish()
  549. if err != nil {
  550. return E.Cause(err, "initialize DNS rule[", i, "]")
  551. }
  552. }
  553. for i, transport := range r.transports {
  554. monitor.Start("initialize DNS transport[", i, "]")
  555. err := transport.Start()
  556. monitor.Finish()
  557. if err != nil {
  558. return E.Cause(err, "initialize DNS server[", i, "]")
  559. }
  560. }
  561. if r.timeService != nil {
  562. monitor.Start("initialize time service")
  563. err := r.timeService.Start()
  564. monitor.Finish()
  565. if err != nil {
  566. return E.Cause(err, "initialize time service")
  567. }
  568. }
  569. return nil
  570. }
  571. func (r *Router) Close() error {
  572. monitor := taskmonitor.New(r.logger, C.StopTimeout)
  573. var err error
  574. for i, rule := range r.rules {
  575. monitor.Start("close rule[", i, "]")
  576. err = E.Append(err, rule.Close(), func(err error) error {
  577. return E.Cause(err, "close rule[", i, "]")
  578. })
  579. monitor.Finish()
  580. }
  581. for i, rule := range r.dnsRules {
  582. monitor.Start("close dns rule[", i, "]")
  583. err = E.Append(err, rule.Close(), func(err error) error {
  584. return E.Cause(err, "close dns rule[", i, "]")
  585. })
  586. monitor.Finish()
  587. }
  588. for i, transport := range r.transports {
  589. monitor.Start("close dns transport[", i, "]")
  590. err = E.Append(err, transport.Close(), func(err error) error {
  591. return E.Cause(err, "close dns transport[", i, "]")
  592. })
  593. monitor.Finish()
  594. }
  595. if r.geoIPReader != nil {
  596. monitor.Start("close geoip reader")
  597. err = E.Append(err, r.geoIPReader.Close(), func(err error) error {
  598. return E.Cause(err, "close geoip reader")
  599. })
  600. monitor.Finish()
  601. }
  602. if r.interfaceMonitor != nil {
  603. monitor.Start("close interface monitor")
  604. err = E.Append(err, r.interfaceMonitor.Close(), func(err error) error {
  605. return E.Cause(err, "close interface monitor")
  606. })
  607. monitor.Finish()
  608. }
  609. if r.networkMonitor != nil {
  610. monitor.Start("close network monitor")
  611. err = E.Append(err, r.networkMonitor.Close(), func(err error) error {
  612. return E.Cause(err, "close network monitor")
  613. })
  614. monitor.Finish()
  615. }
  616. if r.packageManager != nil {
  617. monitor.Start("close package manager")
  618. err = E.Append(err, r.packageManager.Close(), func(err error) error {
  619. return E.Cause(err, "close package manager")
  620. })
  621. monitor.Finish()
  622. }
  623. if r.powerListener != nil {
  624. monitor.Start("close power listener")
  625. err = E.Append(err, r.powerListener.Close(), func(err error) error {
  626. return E.Cause(err, "close power listener")
  627. })
  628. monitor.Finish()
  629. }
  630. if r.timeService != nil {
  631. monitor.Start("close time service")
  632. err = E.Append(err, r.timeService.Close(), func(err error) error {
  633. return E.Cause(err, "close time service")
  634. })
  635. monitor.Finish()
  636. }
  637. if r.fakeIPStore != nil {
  638. monitor.Start("close fakeip store")
  639. err = E.Append(err, r.fakeIPStore.Close(), func(err error) error {
  640. return E.Cause(err, "close fakeip store")
  641. })
  642. monitor.Finish()
  643. }
  644. return err
  645. }
  646. func (r *Router) PostStart() error {
  647. monitor := taskmonitor.New(r.logger, C.StopTimeout)
  648. var cacheContext *adapter.HTTPStartContext
  649. if len(r.ruleSets) > 0 {
  650. monitor.Start("initialize rule-set")
  651. cacheContext = adapter.NewHTTPStartContext()
  652. var ruleSetStartGroup task.Group
  653. for i, ruleSet := range r.ruleSets {
  654. ruleSetInPlace := ruleSet
  655. ruleSetStartGroup.Append0(func(ctx context.Context) error {
  656. err := ruleSetInPlace.StartContext(ctx, cacheContext)
  657. if err != nil {
  658. return E.Cause(err, "initialize rule-set[", i, "]")
  659. }
  660. return nil
  661. })
  662. }
  663. ruleSetStartGroup.Concurrency(5)
  664. ruleSetStartGroup.FastFail()
  665. err := ruleSetStartGroup.Run(r.ctx)
  666. monitor.Finish()
  667. if err != nil {
  668. return err
  669. }
  670. }
  671. if cacheContext != nil {
  672. cacheContext.Close()
  673. }
  674. needFindProcess := r.needFindProcess
  675. needWIFIState := r.needWIFIState
  676. for _, ruleSet := range r.ruleSets {
  677. metadata := ruleSet.Metadata()
  678. if metadata.ContainsProcessRule {
  679. needFindProcess = true
  680. }
  681. if metadata.ContainsWIFIRule {
  682. needWIFIState = true
  683. }
  684. }
  685. if C.IsAndroid && r.platformInterface == nil && !r.needPackageManager {
  686. if needFindProcess {
  687. monitor.Start("start package manager")
  688. err := r.packageManager.Start()
  689. monitor.Finish()
  690. if err != nil {
  691. return E.Cause(err, "start package manager")
  692. }
  693. } else {
  694. r.packageManager = nil
  695. }
  696. }
  697. if needFindProcess {
  698. if r.platformInterface != nil {
  699. r.processSearcher = r.platformInterface
  700. } else {
  701. monitor.Start("initialize process searcher")
  702. searcher, err := process.NewSearcher(process.Config{
  703. Logger: r.logger,
  704. PackageManager: r.packageManager,
  705. })
  706. monitor.Finish()
  707. if err != nil {
  708. if err != os.ErrInvalid {
  709. r.logger.Warn(E.Cause(err, "create process searcher"))
  710. }
  711. } else {
  712. r.processSearcher = searcher
  713. }
  714. }
  715. }
  716. if needWIFIState && r.platformInterface != nil {
  717. monitor.Start("initialize WIFI state")
  718. r.needWIFIState = true
  719. r.interfaceMonitor.RegisterCallback(func(_ int) {
  720. r.updateWIFIState()
  721. })
  722. r.updateWIFIState()
  723. monitor.Finish()
  724. }
  725. for i, rule := range r.rules {
  726. monitor.Start("initialize rule[", i, "]")
  727. err := rule.Start()
  728. monitor.Finish()
  729. if err != nil {
  730. return E.Cause(err, "initialize rule[", i, "]")
  731. }
  732. }
  733. for _, ruleSet := range r.ruleSets {
  734. monitor.Start("post start rule_set[", ruleSet.Name(), "]")
  735. err := ruleSet.PostStart()
  736. monitor.Finish()
  737. if err != nil {
  738. return E.Cause(err, "post start rule_set[", ruleSet.Name(), "]")
  739. }
  740. }
  741. r.started = true
  742. return nil
  743. }
  744. func (r *Router) Cleanup() error {
  745. for _, ruleSet := range r.ruleSetMap {
  746. ruleSet.Cleanup()
  747. }
  748. runtime.GC()
  749. return nil
  750. }
  751. func (r *Router) Outbound(tag string) (adapter.Outbound, bool) {
  752. outbound, loaded := r.outboundByTag[tag]
  753. return outbound, loaded
  754. }
  755. func (r *Router) DefaultOutbound(network string) (adapter.Outbound, error) {
  756. if network == N.NetworkTCP {
  757. if r.defaultOutboundForConnection == nil {
  758. return nil, E.New("missing default outbound for TCP connections")
  759. }
  760. return r.defaultOutboundForConnection, nil
  761. } else {
  762. if r.defaultOutboundForPacketConnection == nil {
  763. return nil, E.New("missing default outbound for UDP connections")
  764. }
  765. return r.defaultOutboundForPacketConnection, nil
  766. }
  767. }
  768. func (r *Router) FakeIPStore() adapter.FakeIPStore {
  769. return r.fakeIPStore
  770. }
  771. func (r *Router) RuleSet(tag string) (adapter.RuleSet, bool) {
  772. ruleSet, loaded := r.ruleSetMap[tag]
  773. return ruleSet, loaded
  774. }
  775. func (r *Router) NeedWIFIState() bool {
  776. return r.needWIFIState
  777. }
  778. func (r *Router) RouteConnection(ctx context.Context, conn net.Conn, metadata adapter.InboundContext) error {
  779. if r.pauseManager.IsDevicePaused() {
  780. return E.New("reject connection to ", metadata.Destination, " while device paused")
  781. }
  782. if metadata.InboundDetour != "" {
  783. if metadata.LastInbound == metadata.InboundDetour {
  784. return E.New("routing loop on detour: ", metadata.InboundDetour)
  785. }
  786. detour := r.inboundByTag[metadata.InboundDetour]
  787. if detour == nil {
  788. return E.New("inbound detour not found: ", metadata.InboundDetour)
  789. }
  790. injectable, isInjectable := detour.(adapter.InjectableInbound)
  791. if !isInjectable {
  792. return E.New("inbound detour is not injectable: ", metadata.InboundDetour)
  793. }
  794. if !common.Contains(injectable.Network(), N.NetworkTCP) {
  795. return E.New("inject: TCP unsupported")
  796. }
  797. metadata.LastInbound = metadata.Inbound
  798. metadata.Inbound = metadata.InboundDetour
  799. metadata.InboundDetour = ""
  800. err := injectable.NewConnection(ctx, conn, metadata)
  801. if err != nil {
  802. return E.Cause(err, "inject ", detour.Tag())
  803. }
  804. return nil
  805. }
  806. conntrack.KillerCheck()
  807. metadata.Network = N.NetworkTCP
  808. switch metadata.Destination.Fqdn {
  809. case mux.Destination.Fqdn:
  810. return E.New("global multiplex is deprecated since sing-box v1.7.0, enable multiplex in inbound options instead.")
  811. case vmess.MuxDestination.Fqdn:
  812. return E.New("global multiplex (v2ray legacy) not supported since sing-box v1.7.0.")
  813. case uot.MagicAddress:
  814. return E.New("global UoT not supported since sing-box v1.7.0.")
  815. case uot.LegacyMagicAddress:
  816. return E.New("global UoT (legacy) not supported since sing-box v1.7.0.")
  817. }
  818. if r.fakeIPStore != nil && r.fakeIPStore.Contains(metadata.Destination.Addr) {
  819. domain, loaded := r.fakeIPStore.Lookup(metadata.Destination.Addr)
  820. if !loaded {
  821. return E.New("missing fakeip context")
  822. }
  823. metadata.OriginDestination = metadata.Destination
  824. metadata.Destination = M.Socksaddr{
  825. Fqdn: domain,
  826. Port: metadata.Destination.Port,
  827. }
  828. metadata.FakeIP = true
  829. r.logger.DebugContext(ctx, "found fakeip domain: ", domain)
  830. }
  831. if deadline.NeedAdditionalReadDeadline(conn) {
  832. conn = deadline.NewConn(conn)
  833. }
  834. if metadata.InboundOptions.SniffEnabled && !sniff.Skip(metadata) {
  835. buffer := buf.NewPacket()
  836. err := sniff.PeekStream(
  837. ctx,
  838. &metadata,
  839. conn,
  840. buffer,
  841. time.Duration(metadata.InboundOptions.SniffTimeout),
  842. sniff.TLSClientHello,
  843. sniff.HTTPHost,
  844. sniff.StreamDomainNameQuery,
  845. sniff.SSH,
  846. sniff.BitTorrent,
  847. )
  848. if err == nil {
  849. if metadata.InboundOptions.SniffOverrideDestination && M.IsDomainName(metadata.Domain) {
  850. metadata.Destination = M.Socksaddr{
  851. Fqdn: metadata.Domain,
  852. Port: metadata.Destination.Port,
  853. }
  854. }
  855. if metadata.Domain != "" {
  856. r.logger.DebugContext(ctx, "sniffed protocol: ", metadata.Protocol, ", domain: ", metadata.Domain)
  857. } else {
  858. r.logger.DebugContext(ctx, "sniffed protocol: ", metadata.Protocol)
  859. }
  860. }
  861. if !buffer.IsEmpty() {
  862. conn = bufio.NewCachedConn(conn, buffer)
  863. } else {
  864. buffer.Release()
  865. }
  866. }
  867. if r.dnsReverseMapping != nil && metadata.Domain == "" {
  868. domain, loaded := r.dnsReverseMapping.Query(metadata.Destination.Addr)
  869. if loaded {
  870. metadata.Domain = domain
  871. r.logger.DebugContext(ctx, "found reserve mapped domain: ", metadata.Domain)
  872. }
  873. }
  874. if metadata.Destination.IsFqdn() && dns.DomainStrategy(metadata.InboundOptions.DomainStrategy) != dns.DomainStrategyAsIS {
  875. addresses, err := r.Lookup(adapter.WithContext(ctx, &metadata), metadata.Destination.Fqdn, dns.DomainStrategy(metadata.InboundOptions.DomainStrategy))
  876. if err != nil {
  877. return err
  878. }
  879. metadata.DestinationAddresses = addresses
  880. r.dnsLogger.DebugContext(ctx, "resolved [", strings.Join(F.MapToString(metadata.DestinationAddresses), " "), "]")
  881. }
  882. if metadata.Destination.IsIPv4() {
  883. metadata.IPVersion = 4
  884. } else if metadata.Destination.IsIPv6() {
  885. metadata.IPVersion = 6
  886. }
  887. ctx, matchedRule, detour, err := r.match(ctx, &metadata, r.defaultOutboundForConnection)
  888. if err != nil {
  889. return err
  890. }
  891. if !common.Contains(detour.Network(), N.NetworkTCP) {
  892. return E.New("missing supported outbound, closing connection")
  893. }
  894. if r.clashServer != nil {
  895. trackerConn, tracker := r.clashServer.RoutedConnection(ctx, conn, metadata, matchedRule)
  896. defer tracker.Leave()
  897. conn = trackerConn
  898. }
  899. if r.v2rayServer != nil {
  900. if statsService := r.v2rayServer.StatsService(); statsService != nil {
  901. conn = statsService.RoutedConnection(metadata.Inbound, detour.Tag(), metadata.User, conn)
  902. }
  903. }
  904. return detour.NewConnection(ctx, conn, metadata)
  905. }
  906. func (r *Router) RoutePacketConnection(ctx context.Context, conn N.PacketConn, metadata adapter.InboundContext) error {
  907. if r.pauseManager.IsDevicePaused() {
  908. return E.New("reject packet connection to ", metadata.Destination, " while device paused")
  909. }
  910. if metadata.InboundDetour != "" {
  911. if metadata.LastInbound == metadata.InboundDetour {
  912. return E.New("routing loop on detour: ", metadata.InboundDetour)
  913. }
  914. detour := r.inboundByTag[metadata.InboundDetour]
  915. if detour == nil {
  916. return E.New("inbound detour not found: ", metadata.InboundDetour)
  917. }
  918. injectable, isInjectable := detour.(adapter.InjectableInbound)
  919. if !isInjectable {
  920. return E.New("inbound detour is not injectable: ", metadata.InboundDetour)
  921. }
  922. if !common.Contains(injectable.Network(), N.NetworkUDP) {
  923. return E.New("inject: UDP unsupported")
  924. }
  925. metadata.LastInbound = metadata.Inbound
  926. metadata.Inbound = metadata.InboundDetour
  927. metadata.InboundDetour = ""
  928. err := injectable.NewPacketConnection(ctx, conn, metadata)
  929. if err != nil {
  930. return E.Cause(err, "inject ", detour.Tag())
  931. }
  932. return nil
  933. }
  934. conntrack.KillerCheck()
  935. metadata.Network = N.NetworkUDP
  936. if r.fakeIPStore != nil && r.fakeIPStore.Contains(metadata.Destination.Addr) {
  937. domain, loaded := r.fakeIPStore.Lookup(metadata.Destination.Addr)
  938. if !loaded {
  939. return E.New("missing fakeip context")
  940. }
  941. metadata.OriginDestination = metadata.Destination
  942. metadata.Destination = M.Socksaddr{
  943. Fqdn: domain,
  944. Port: metadata.Destination.Port,
  945. }
  946. metadata.FakeIP = true
  947. r.logger.DebugContext(ctx, "found fakeip domain: ", domain)
  948. }
  949. // Currently we don't have deadline usages for UDP connections
  950. /*if deadline.NeedAdditionalReadDeadline(conn) {
  951. conn = deadline.NewPacketConn(bufio.NewNetPacketConn(conn))
  952. }*/
  953. if metadata.InboundOptions.SniffEnabled || metadata.Destination.Addr.IsUnspecified() {
  954. var bufferList []*buf.Buffer
  955. for {
  956. var (
  957. buffer = buf.NewPacket()
  958. destination M.Socksaddr
  959. done = make(chan struct{})
  960. err error
  961. )
  962. go func() {
  963. sniffTimeout := C.ReadPayloadTimeout
  964. if metadata.InboundOptions.SniffTimeout > 0 {
  965. sniffTimeout = time.Duration(metadata.InboundOptions.SniffTimeout)
  966. }
  967. conn.SetReadDeadline(time.Now().Add(sniffTimeout))
  968. destination, err = conn.ReadPacket(buffer)
  969. conn.SetReadDeadline(time.Time{})
  970. close(done)
  971. }()
  972. select {
  973. case <-done:
  974. case <-ctx.Done():
  975. conn.Close()
  976. return ctx.Err()
  977. }
  978. if err != nil {
  979. buffer.Release()
  980. if !errors.Is(err, os.ErrDeadlineExceeded) {
  981. return err
  982. }
  983. } else {
  984. if metadata.Destination.Addr.IsUnspecified() {
  985. metadata.Destination = destination
  986. }
  987. if metadata.InboundOptions.SniffEnabled {
  988. if len(bufferList) > 0 {
  989. err = sniff.PeekPacket(
  990. ctx,
  991. &metadata,
  992. buffer.Bytes(),
  993. sniff.QUICClientHello,
  994. )
  995. } else {
  996. err = sniff.PeekPacket(
  997. ctx, &metadata,
  998. buffer.Bytes(),
  999. sniff.DomainNameQuery,
  1000. sniff.QUICClientHello,
  1001. sniff.STUNMessage,
  1002. sniff.UTP,
  1003. sniff.UDPTracker,
  1004. sniff.DTLSRecord)
  1005. }
  1006. if E.IsMulti(err, sniff.ErrClientHelloFragmented) && len(bufferList) == 0 {
  1007. bufferList = append(bufferList, buffer)
  1008. r.logger.DebugContext(ctx, "attempt to sniff fragmented QUIC client hello")
  1009. continue
  1010. }
  1011. if metadata.Protocol != "" {
  1012. if metadata.InboundOptions.SniffOverrideDestination && M.IsDomainName(metadata.Domain) {
  1013. metadata.Destination = M.Socksaddr{
  1014. Fqdn: metadata.Domain,
  1015. Port: metadata.Destination.Port,
  1016. }
  1017. }
  1018. if metadata.Domain != "" && metadata.Client != "" {
  1019. r.logger.DebugContext(ctx, "sniffed packet protocol: ", metadata.Protocol, ", domain: ", metadata.Domain, ", client: ", metadata.Client)
  1020. } else if metadata.Domain != "" {
  1021. r.logger.DebugContext(ctx, "sniffed packet protocol: ", metadata.Protocol, ", domain: ", metadata.Domain)
  1022. } else if metadata.Client != "" {
  1023. r.logger.DebugContext(ctx, "sniffed packet protocol: ", metadata.Protocol, ", client: ", metadata.Client)
  1024. } else {
  1025. r.logger.DebugContext(ctx, "sniffed packet protocol: ", metadata.Protocol)
  1026. }
  1027. }
  1028. }
  1029. conn = bufio.NewCachedPacketConn(conn, buffer, destination)
  1030. }
  1031. for _, cachedBuffer := range common.Reverse(bufferList) {
  1032. conn = bufio.NewCachedPacketConn(conn, cachedBuffer, destination)
  1033. }
  1034. break
  1035. }
  1036. }
  1037. if r.dnsReverseMapping != nil && metadata.Domain == "" {
  1038. domain, loaded := r.dnsReverseMapping.Query(metadata.Destination.Addr)
  1039. if loaded {
  1040. metadata.Domain = domain
  1041. r.logger.DebugContext(ctx, "found reserve mapped domain: ", metadata.Domain)
  1042. }
  1043. }
  1044. if metadata.Destination.IsFqdn() && dns.DomainStrategy(metadata.InboundOptions.DomainStrategy) != dns.DomainStrategyAsIS {
  1045. addresses, err := r.Lookup(adapter.WithContext(ctx, &metadata), metadata.Destination.Fqdn, dns.DomainStrategy(metadata.InboundOptions.DomainStrategy))
  1046. if err != nil {
  1047. return err
  1048. }
  1049. metadata.DestinationAddresses = addresses
  1050. r.dnsLogger.DebugContext(ctx, "resolved [", strings.Join(F.MapToString(metadata.DestinationAddresses), " "), "]")
  1051. }
  1052. if metadata.Destination.IsIPv4() {
  1053. metadata.IPVersion = 4
  1054. } else if metadata.Destination.IsIPv6() {
  1055. metadata.IPVersion = 6
  1056. }
  1057. ctx, matchedRule, detour, err := r.match(ctx, &metadata, r.defaultOutboundForPacketConnection)
  1058. if err != nil {
  1059. return err
  1060. }
  1061. if !common.Contains(detour.Network(), N.NetworkUDP) {
  1062. return E.New("missing supported outbound, closing packet connection")
  1063. }
  1064. if r.clashServer != nil {
  1065. trackerConn, tracker := r.clashServer.RoutedPacketConnection(ctx, conn, metadata, matchedRule)
  1066. defer tracker.Leave()
  1067. conn = trackerConn
  1068. }
  1069. if r.v2rayServer != nil {
  1070. if statsService := r.v2rayServer.StatsService(); statsService != nil {
  1071. conn = statsService.RoutedPacketConnection(metadata.Inbound, detour.Tag(), metadata.User, conn)
  1072. }
  1073. }
  1074. if metadata.FakeIP {
  1075. conn = bufio.NewNATPacketConn(bufio.NewNetPacketConn(conn), metadata.OriginDestination, metadata.Destination)
  1076. }
  1077. return detour.NewPacketConnection(ctx, conn, metadata)
  1078. }
  1079. func (r *Router) match(ctx context.Context, metadata *adapter.InboundContext, defaultOutbound adapter.Outbound) (context.Context, adapter.Rule, adapter.Outbound, error) {
  1080. matchRule, matchOutbound := r.match0(ctx, metadata, defaultOutbound)
  1081. if contextOutbound, loaded := outbound.TagFromContext(ctx); loaded {
  1082. if contextOutbound == matchOutbound.Tag() {
  1083. return nil, nil, nil, E.New("connection loopback in outbound/", matchOutbound.Type(), "[", matchOutbound.Tag(), "]")
  1084. }
  1085. }
  1086. ctx = outbound.ContextWithTag(ctx, matchOutbound.Tag())
  1087. return ctx, matchRule, matchOutbound, nil
  1088. }
  1089. func (r *Router) match0(ctx context.Context, metadata *adapter.InboundContext, defaultOutbound adapter.Outbound) (adapter.Rule, adapter.Outbound) {
  1090. if r.processSearcher != nil {
  1091. var originDestination netip.AddrPort
  1092. if metadata.OriginDestination.IsValid() {
  1093. originDestination = metadata.OriginDestination.AddrPort()
  1094. } else if metadata.Destination.IsIP() {
  1095. originDestination = metadata.Destination.AddrPort()
  1096. }
  1097. processInfo, err := process.FindProcessInfo(r.processSearcher, ctx, metadata.Network, metadata.Source.AddrPort(), originDestination)
  1098. if err != nil {
  1099. r.logger.InfoContext(ctx, "failed to search process: ", err)
  1100. } else {
  1101. if processInfo.ProcessPath != "" {
  1102. r.logger.InfoContext(ctx, "found process path: ", processInfo.ProcessPath)
  1103. } else if processInfo.PackageName != "" {
  1104. r.logger.InfoContext(ctx, "found package name: ", processInfo.PackageName)
  1105. } else if processInfo.UserId != -1 {
  1106. if /*needUserName &&*/ true {
  1107. osUser, _ := user.LookupId(F.ToString(processInfo.UserId))
  1108. if osUser != nil {
  1109. processInfo.User = osUser.Username
  1110. }
  1111. }
  1112. if processInfo.User != "" {
  1113. r.logger.InfoContext(ctx, "found user: ", processInfo.User)
  1114. } else {
  1115. r.logger.InfoContext(ctx, "found user id: ", processInfo.UserId)
  1116. }
  1117. }
  1118. metadata.ProcessInfo = processInfo
  1119. }
  1120. }
  1121. for i, rule := range r.rules {
  1122. metadata.ResetRuleCache()
  1123. if rule.Match(metadata) {
  1124. detour := rule.Outbound()
  1125. r.logger.DebugContext(ctx, "match[", i, "] ", rule.String(), " => ", detour)
  1126. if outbound, loaded := r.Outbound(detour); loaded {
  1127. return rule, outbound
  1128. }
  1129. r.logger.ErrorContext(ctx, "outbound not found: ", detour)
  1130. }
  1131. }
  1132. return nil, defaultOutbound
  1133. }
  1134. func (r *Router) InterfaceFinder() control.InterfaceFinder {
  1135. return r.interfaceFinder
  1136. }
  1137. func (r *Router) UpdateInterfaces() error {
  1138. if r.platformInterface == nil || !r.platformInterface.UsePlatformInterfaceGetter() {
  1139. return r.interfaceFinder.Update()
  1140. } else {
  1141. interfaces, err := r.platformInterface.Interfaces()
  1142. if err != nil {
  1143. return err
  1144. }
  1145. r.interfaceFinder.UpdateInterfaces(interfaces)
  1146. return nil
  1147. }
  1148. }
  1149. func (r *Router) AutoDetectInterface() bool {
  1150. return r.autoDetectInterface
  1151. }
  1152. func (r *Router) AutoDetectInterfaceFunc() control.Func {
  1153. if r.platformInterface != nil && r.platformInterface.UsePlatformAutoDetectInterfaceControl() {
  1154. return func(network, address string, conn syscall.RawConn) error {
  1155. return control.Raw(conn, func(fd uintptr) error {
  1156. return r.platformInterface.AutoDetectInterfaceControl(int(fd))
  1157. })
  1158. }
  1159. } else {
  1160. if r.interfaceMonitor == nil {
  1161. return nil
  1162. }
  1163. return control.BindToInterfaceFunc(r.InterfaceFinder(), func(network string, address string) (interfaceName string, interfaceIndex int, err error) {
  1164. remoteAddr := M.ParseSocksaddr(address).Addr
  1165. if C.IsLinux {
  1166. interfaceName, interfaceIndex = r.InterfaceMonitor().DefaultInterface(remoteAddr)
  1167. if interfaceIndex == -1 {
  1168. err = tun.ErrNoRoute
  1169. }
  1170. } else {
  1171. interfaceIndex = r.InterfaceMonitor().DefaultInterfaceIndex(remoteAddr)
  1172. if interfaceIndex == -1 {
  1173. err = tun.ErrNoRoute
  1174. }
  1175. }
  1176. return
  1177. })
  1178. }
  1179. }
  1180. func (r *Router) RegisterAutoRedirectOutputMark(mark uint32) error {
  1181. if r.autoRedirectOutputMark > 0 {
  1182. return E.New("only one auto-redirect can be configured")
  1183. }
  1184. r.autoRedirectOutputMark = mark
  1185. return nil
  1186. }
  1187. func (r *Router) AutoRedirectOutputMark() uint32 {
  1188. return r.autoRedirectOutputMark
  1189. }
  1190. func (r *Router) DefaultInterface() string {
  1191. return r.defaultInterface
  1192. }
  1193. func (r *Router) DefaultMark() uint32 {
  1194. return r.defaultMark
  1195. }
  1196. func (r *Router) Rules() []adapter.Rule {
  1197. return r.rules
  1198. }
  1199. func (r *Router) WIFIState() adapter.WIFIState {
  1200. return r.wifiState
  1201. }
  1202. func (r *Router) NetworkMonitor() tun.NetworkUpdateMonitor {
  1203. return r.networkMonitor
  1204. }
  1205. func (r *Router) InterfaceMonitor() tun.DefaultInterfaceMonitor {
  1206. return r.interfaceMonitor
  1207. }
  1208. func (r *Router) PackageManager() tun.PackageManager {
  1209. return r.packageManager
  1210. }
  1211. func (r *Router) ClashServer() adapter.ClashServer {
  1212. return r.clashServer
  1213. }
  1214. func (r *Router) SetClashServer(server adapter.ClashServer) {
  1215. r.clashServer = server
  1216. }
  1217. func (r *Router) V2RayServer() adapter.V2RayServer {
  1218. return r.v2rayServer
  1219. }
  1220. func (r *Router) SetV2RayServer(server adapter.V2RayServer) {
  1221. r.v2rayServer = server
  1222. }
  1223. func (r *Router) OnPackagesUpdated(packages int, sharedUsers int) {
  1224. r.logger.Info("updated packages list: ", packages, " packages, ", sharedUsers, " shared users")
  1225. }
  1226. func (r *Router) NewError(ctx context.Context, err error) {
  1227. common.Close(err)
  1228. if E.IsClosedOrCanceled(err) {
  1229. r.logger.DebugContext(ctx, "connection closed: ", err)
  1230. return
  1231. }
  1232. r.logger.ErrorContext(ctx, err)
  1233. }
  1234. func (r *Router) notifyNetworkUpdate(event int) {
  1235. if event == tun.EventNoRoute {
  1236. r.pauseManager.NetworkPause()
  1237. r.logger.Error("missing default interface")
  1238. } else {
  1239. r.pauseManager.NetworkWake()
  1240. if C.IsAndroid && r.platformInterface == nil {
  1241. var vpnStatus string
  1242. if r.interfaceMonitor.AndroidVPNEnabled() {
  1243. vpnStatus = "enabled"
  1244. } else {
  1245. vpnStatus = "disabled"
  1246. }
  1247. r.logger.Info("updated default interface ", r.interfaceMonitor.DefaultInterfaceName(netip.IPv4Unspecified()), ", index ", r.interfaceMonitor.DefaultInterfaceIndex(netip.IPv4Unspecified()), ", vpn ", vpnStatus)
  1248. } else {
  1249. r.logger.Info("updated default interface ", r.interfaceMonitor.DefaultInterfaceName(netip.IPv4Unspecified()), ", index ", r.interfaceMonitor.DefaultInterfaceIndex(netip.IPv4Unspecified()))
  1250. }
  1251. }
  1252. if !r.started {
  1253. return
  1254. }
  1255. _ = r.ResetNetwork()
  1256. }
  1257. func (r *Router) ResetNetwork() error {
  1258. conntrack.Close()
  1259. for _, outbound := range r.outbounds {
  1260. listener, isListener := outbound.(adapter.InterfaceUpdateListener)
  1261. if isListener {
  1262. listener.InterfaceUpdated()
  1263. }
  1264. }
  1265. for _, transport := range r.transports {
  1266. transport.Reset()
  1267. }
  1268. return nil
  1269. }
  1270. func (r *Router) updateWIFIState() {
  1271. if r.platformInterface == nil {
  1272. return
  1273. }
  1274. state := r.platformInterface.ReadWIFIState()
  1275. if state != r.wifiState {
  1276. r.wifiState = state
  1277. if state.SSID == "" && state.BSSID == "" {
  1278. r.logger.Info("updated WIFI state: disconnected")
  1279. } else {
  1280. r.logger.Info("updated WIFI state: SSID=", state.SSID, ", BSSID=", state.BSSID)
  1281. }
  1282. }
  1283. }
  1284. func (r *Router) notifyWindowsPowerEvent(event int) {
  1285. switch event {
  1286. case winpowrprof.EVENT_SUSPEND:
  1287. r.pauseManager.DevicePause()
  1288. _ = r.ResetNetwork()
  1289. case winpowrprof.EVENT_RESUME:
  1290. if !r.pauseManager.IsDevicePaused() {
  1291. return
  1292. }
  1293. fallthrough
  1294. case winpowrprof.EVENT_RESUME_AUTOMATIC:
  1295. r.pauseManager.DeviceWake()
  1296. _ = r.ResetNetwork()
  1297. }
  1298. }