123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126 |
- package transport
- import (
- "context"
- "sync"
- "github.com/sagernet/sing-box/adapter"
- "github.com/sagernet/sing-box/common/dialer"
- "github.com/sagernet/sing-box/common/tls"
- C "github.com/sagernet/sing-box/constant"
- "github.com/sagernet/sing-box/dns"
- "github.com/sagernet/sing-box/log"
- "github.com/sagernet/sing-box/option"
- "github.com/sagernet/sing/common"
- E "github.com/sagernet/sing/common/exceptions"
- "github.com/sagernet/sing/common/logger"
- M "github.com/sagernet/sing/common/metadata"
- N "github.com/sagernet/sing/common/network"
- "github.com/sagernet/sing/common/x/list"
- mDNS "github.com/miekg/dns"
- )
- var _ adapter.DNSTransport = (*TLSTransport)(nil)
- func RegisterTLS(registry *dns.TransportRegistry) {
- dns.RegisterTransport[option.RemoteTLSDNSServerOptions](registry, C.DNSTypeTLS, NewTLS)
- }
- type TLSTransport struct {
- dns.TransportAdapter
- logger logger.ContextLogger
- dialer tls.Dialer
- serverAddr M.Socksaddr
- tlsConfig tls.Config
- access sync.Mutex
- connections list.List[*tlsDNSConn]
- }
- type tlsDNSConn struct {
- tls.Conn
- queryId uint16
- }
- func NewTLS(ctx context.Context, logger log.ContextLogger, tag string, options option.RemoteTLSDNSServerOptions) (adapter.DNSTransport, error) {
- transportDialer, err := dns.NewRemoteDialer(ctx, options.RemoteDNSServerOptions)
- if err != nil {
- return nil, err
- }
- tlsOptions := common.PtrValueOrDefault(options.TLS)
- tlsOptions.Enabled = true
- tlsConfig, err := tls.NewClient(ctx, logger, options.Server, tlsOptions)
- if err != nil {
- return nil, err
- }
- serverAddr := options.DNSServerAddressOptions.Build()
- if serverAddr.Port == 0 {
- serverAddr.Port = 853
- }
- if !serverAddr.IsValid() {
- return nil, E.New("invalid server address: ", serverAddr)
- }
- return NewTLSRaw(logger, dns.NewTransportAdapterWithRemoteOptions(C.DNSTypeTLS, tag, options.RemoteDNSServerOptions), transportDialer, serverAddr, tlsConfig), nil
- }
- func NewTLSRaw(logger logger.ContextLogger, adapter dns.TransportAdapter, dialer N.Dialer, serverAddr M.Socksaddr, tlsConfig tls.Config) *TLSTransport {
- return &TLSTransport{
- TransportAdapter: adapter,
- logger: logger,
- dialer: tls.NewDialer(dialer, tlsConfig),
- serverAddr: serverAddr,
- tlsConfig: tlsConfig,
- }
- }
- func (t *TLSTransport) Start(stage adapter.StartStage) error {
- if stage != adapter.StartStateStart {
- return nil
- }
- return dialer.InitializeDetour(t.dialer)
- }
- func (t *TLSTransport) Close() error {
- t.access.Lock()
- defer t.access.Unlock()
- for connection := t.connections.Front(); connection != nil; connection = connection.Next() {
- connection.Value.Close()
- }
- t.connections.Init()
- return nil
- }
- func (t *TLSTransport) Exchange(ctx context.Context, message *mDNS.Msg) (*mDNS.Msg, error) {
- t.access.Lock()
- conn := t.connections.PopFront()
- t.access.Unlock()
- if conn != nil {
- response, err := t.exchange(message, conn)
- if err == nil {
- return response, nil
- }
- }
- tlsConn, err := t.dialer.DialTLSContext(ctx, t.serverAddr)
- if err != nil {
- return nil, err
- }
- return t.exchange(message, &tlsDNSConn{Conn: tlsConn})
- }
- func (t *TLSTransport) exchange(message *mDNS.Msg, conn *tlsDNSConn) (*mDNS.Msg, error) {
- conn.queryId++
- err := WriteMessage(conn, conn.queryId, message)
- if err != nil {
- conn.Close()
- return nil, E.Cause(err, "write request")
- }
- response, err := ReadMessage(conn)
- if err != nil {
- conn.Close()
- return nil, E.Cause(err, "read response")
- }
- t.access.Lock()
- t.connections.PushBack(conn)
- t.access.Unlock()
- return response, nil
- }
|