outbound.go 6.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213
  1. package tor
  2. import (
  3. "context"
  4. "net"
  5. "os"
  6. "path/filepath"
  7. "strings"
  8. "github.com/sagernet/sing-box/adapter"
  9. "github.com/sagernet/sing-box/adapter/outbound"
  10. "github.com/sagernet/sing-box/common/dialer"
  11. "github.com/sagernet/sing-box/common/proxybridge"
  12. C "github.com/sagernet/sing-box/constant"
  13. "github.com/sagernet/sing-box/log"
  14. "github.com/sagernet/sing-box/option"
  15. "github.com/sagernet/sing/common"
  16. E "github.com/sagernet/sing/common/exceptions"
  17. F "github.com/sagernet/sing/common/format"
  18. "github.com/sagernet/sing/common/logger"
  19. M "github.com/sagernet/sing/common/metadata"
  20. N "github.com/sagernet/sing/common/network"
  21. "github.com/sagernet/sing/common/rw"
  22. "github.com/sagernet/sing/protocol/socks"
  23. "github.com/cretz/bine/control"
  24. "github.com/cretz/bine/tor"
  25. )
  26. func RegisterOutbound(registry *outbound.Registry) {
  27. outbound.Register[option.TorOutboundOptions](registry, C.TypeTor, NewOutbound)
  28. }
  29. type Outbound struct {
  30. outbound.Adapter
  31. ctx context.Context
  32. logger logger.ContextLogger
  33. proxy *proxybridge.Bridge
  34. startConf *tor.StartConf
  35. options map[string]string
  36. events chan control.Event
  37. instance *tor.Tor
  38. socksClient *socks.Client
  39. }
  40. func NewOutbound(ctx context.Context, router adapter.Router, logger log.ContextLogger, tag string, options option.TorOutboundOptions) (adapter.Outbound, error) {
  41. var startConf tor.StartConf
  42. startConf.DataDir = os.ExpandEnv(options.DataDirectory)
  43. startConf.TempDataDirBase = os.TempDir()
  44. startConf.ExtraArgs = options.ExtraArgs
  45. if options.DataDirectory != "" {
  46. dataDirAbs, _ := filepath.Abs(startConf.DataDir)
  47. if geoIPPath := filepath.Join(dataDirAbs, "geoip"); rw.IsFile(geoIPPath) && !common.Contains(options.ExtraArgs, "--GeoIPFile") {
  48. options.ExtraArgs = append(options.ExtraArgs, "--GeoIPFile", geoIPPath)
  49. }
  50. if geoIP6Path := filepath.Join(dataDirAbs, "geoip6"); rw.IsFile(geoIP6Path) && !common.Contains(options.ExtraArgs, "--GeoIPv6File") {
  51. options.ExtraArgs = append(options.ExtraArgs, "--GeoIPv6File", geoIP6Path)
  52. }
  53. }
  54. if options.ExecutablePath != "" {
  55. startConf.ExePath = options.ExecutablePath
  56. startConf.ProcessCreator = nil
  57. startConf.UseEmbeddedControlConn = false
  58. }
  59. if startConf.DataDir != "" {
  60. torrcFile := filepath.Join(startConf.DataDir, "torrc")
  61. err := rw.MkdirParent(torrcFile)
  62. if err != nil {
  63. return nil, err
  64. }
  65. if !rw.IsFile(torrcFile) {
  66. err := os.WriteFile(torrcFile, []byte(""), 0o600)
  67. if err != nil {
  68. return nil, err
  69. }
  70. }
  71. startConf.TorrcFile = torrcFile
  72. }
  73. outboundDialer, err := dialer.New(ctx, options.DialerOptions, false)
  74. if err != nil {
  75. return nil, err
  76. }
  77. proxy, err := proxybridge.New(ctx, logger, "proxy", outboundDialer)
  78. if err != nil {
  79. return nil, err
  80. }
  81. return &Outbound{
  82. Adapter: outbound.NewAdapterWithDialerOptions(C.TypeTor, tag, []string{N.NetworkTCP}, options.DialerOptions),
  83. ctx: ctx,
  84. logger: logger,
  85. proxy: proxy,
  86. startConf: &startConf,
  87. options: options.Options,
  88. }, nil
  89. }
  90. func (t *Outbound) Start() error {
  91. err := t.start()
  92. if err != nil {
  93. t.Close()
  94. }
  95. return err
  96. }
  97. var torLogEvents = []control.EventCode{
  98. control.EventCodeLogDebug,
  99. control.EventCodeLogErr,
  100. control.EventCodeLogInfo,
  101. control.EventCodeLogNotice,
  102. control.EventCodeLogWarn,
  103. }
  104. func (t *Outbound) start() error {
  105. torInstance, err := tor.Start(t.ctx, t.startConf)
  106. if err != nil {
  107. return E.New(strings.ToLower(err.Error()))
  108. }
  109. t.instance = torInstance
  110. t.events = make(chan control.Event, 8)
  111. err = torInstance.Control.AddEventListener(t.events, torLogEvents...)
  112. if err != nil {
  113. return err
  114. }
  115. go t.recvLoop()
  116. proxyPort := "127.0.0.1:" + F.ToString(t.proxy.Port())
  117. proxyUsername := t.proxy.Username()
  118. proxyPassword := t.proxy.Password()
  119. t.logger.Trace("created upstream proxy at ", proxyPort)
  120. t.logger.Trace("upstream proxy username ", proxyUsername)
  121. t.logger.Trace("upstream proxy password ", proxyPassword)
  122. confOptions := []*control.KeyVal{
  123. control.NewKeyVal("Socks5Proxy", proxyPort),
  124. control.NewKeyVal("Socks5ProxyUsername", proxyUsername),
  125. control.NewKeyVal("Socks5ProxyPassword", proxyPassword),
  126. }
  127. err = torInstance.Control.ResetConf(confOptions...)
  128. if err != nil {
  129. return err
  130. }
  131. if len(t.options) > 0 {
  132. for key, value := range t.options {
  133. switch key {
  134. case "Socks5Proxy",
  135. "Socks5ProxyUsername",
  136. "Socks5ProxyPassword":
  137. continue
  138. }
  139. err = torInstance.Control.SetConf(control.NewKeyVal(key, value))
  140. if err != nil {
  141. return E.Cause(err, "set ", key, "=", value)
  142. }
  143. }
  144. }
  145. err = torInstance.EnableNetwork(t.ctx, true)
  146. if err != nil {
  147. return err
  148. }
  149. info, err := torInstance.Control.GetInfo("net/listeners/socks")
  150. if err != nil {
  151. return err
  152. }
  153. if len(info) != 1 || info[0].Key != "net/listeners/socks" {
  154. return E.New("get socks proxy address")
  155. }
  156. t.logger.Trace("obtained tor socks5 address ", info[0].Val)
  157. // TODO: set password for tor socks5 server if supported
  158. t.socksClient = socks.NewClient(N.SystemDialer, M.ParseSocksaddr(info[0].Val), socks.Version5, "", "")
  159. return nil
  160. }
  161. func (t *Outbound) recvLoop() {
  162. for rawEvent := range t.events {
  163. switch event := rawEvent.(type) {
  164. case *control.LogEvent:
  165. event.Raw = strings.ToLower(event.Raw)
  166. switch event.Severity {
  167. case control.EventCodeLogDebug, control.EventCodeLogInfo:
  168. t.logger.Trace(event.Raw)
  169. case control.EventCodeLogNotice:
  170. if strings.Contains(event.Raw, "disablenetwork") || strings.Contains(event.Raw, "socks listener") {
  171. t.logger.Trace(event.Raw)
  172. continue
  173. }
  174. t.logger.Info(event.Raw)
  175. case control.EventCodeLogWarn:
  176. t.logger.Warn(event.Raw)
  177. case control.EventCodeLogErr:
  178. t.logger.Error(event.Raw)
  179. }
  180. }
  181. }
  182. }
  183. func (t *Outbound) Close() error {
  184. err := common.Close(
  185. common.PtrOrNil(t.proxy),
  186. common.PtrOrNil(t.instance),
  187. )
  188. if t.events != nil {
  189. close(t.events)
  190. t.events = nil
  191. }
  192. return err
  193. }
  194. func (t *Outbound) DialContext(ctx context.Context, network string, destination M.Socksaddr) (net.Conn, error) {
  195. t.logger.InfoContext(ctx, "outbound connection to ", destination)
  196. return t.socksClient.DialContext(ctx, network, destination)
  197. }
  198. func (t *Outbound) ListenPacket(ctx context.Context, destination M.Socksaddr) (net.PacketConn, error) {
  199. return nil, os.ErrInvalid
  200. }