2020-11-25 11:01:53 +00:00
|
|
|
package internet
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"syscall"
|
|
|
|
"time"
|
|
|
|
|
2023-04-23 11:31:41 +00:00
|
|
|
"github.com/sagernet/sing/common/control"
|
2020-12-04 01:36:16 +00:00
|
|
|
"github.com/xtls/xray-core/common/net"
|
|
|
|
"github.com/xtls/xray-core/common/session"
|
2021-03-06 16:29:17 +00:00
|
|
|
"github.com/xtls/xray-core/features/dns"
|
|
|
|
"github.com/xtls/xray-core/features/outbound"
|
2020-11-25 11:01:53 +00:00
|
|
|
)
|
|
|
|
|
2021-10-19 16:57:14 +00:00
|
|
|
var effectiveSystemDialer SystemDialer = &DefaultSystemDialer{}
|
2020-11-25 11:01:53 +00:00
|
|
|
|
|
|
|
type SystemDialer interface {
|
|
|
|
Dial(ctx context.Context, source net.Address, destination net.Destination, sockopt *SocketConfig) (net.Conn, error)
|
|
|
|
}
|
|
|
|
|
|
|
|
type DefaultSystemDialer struct {
|
2023-04-23 11:31:41 +00:00
|
|
|
controllers []control.Func
|
2021-03-06 16:29:17 +00:00
|
|
|
dns dns.Client
|
|
|
|
obm outbound.Manager
|
2020-11-25 11:01:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func resolveSrcAddr(network net.Network, src net.Address) net.Addr {
|
|
|
|
if src == nil || src == net.AnyIP {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
if network == net.Network_TCP {
|
|
|
|
return &net.TCPAddr{
|
|
|
|
IP: src.IP(),
|
|
|
|
Port: 0,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return &net.UDPAddr{
|
|
|
|
IP: src.IP(),
|
|
|
|
Port: 0,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func hasBindAddr(sockopt *SocketConfig) bool {
|
|
|
|
return sockopt != nil && len(sockopt.BindAddress) > 0 && sockopt.BindPort > 0
|
|
|
|
}
|
|
|
|
|
|
|
|
func (d *DefaultSystemDialer) Dial(ctx context.Context, src net.Address, dest net.Destination, sockopt *SocketConfig) (net.Conn, error) {
|
2021-03-06 16:29:17 +00:00
|
|
|
newError("dialing to " + dest.String()).AtDebug().WriteToLog()
|
|
|
|
|
2020-11-25 11:01:53 +00:00
|
|
|
if dest.Network == net.Network_UDP && !hasBindAddr(sockopt) {
|
|
|
|
srcAddr := resolveSrcAddr(net.Network_UDP, src)
|
|
|
|
if srcAddr == nil {
|
|
|
|
srcAddr = &net.UDPAddr{
|
|
|
|
IP: []byte{0, 0, 0, 0},
|
|
|
|
Port: 0,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
packetConn, err := ListenSystemPacket(ctx, srcAddr, sockopt)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
destAddr, err := net.ResolveUDPAddr("udp", dest.NetAddr())
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2020-12-23 13:06:21 +00:00
|
|
|
return &PacketConnWrapper{
|
2021-09-19 06:14:03 +00:00
|
|
|
Conn: packetConn,
|
|
|
|
Dest: destAddr,
|
2020-11-25 11:01:53 +00:00
|
|
|
}, nil
|
|
|
|
}
|
2022-07-31 13:55:40 +00:00
|
|
|
goStdKeepAlive := time.Duration(0)
|
2022-11-11 06:20:19 +00:00
|
|
|
if sockopt != nil && (sockopt.TcpKeepAliveInterval != 0 || sockopt.TcpKeepAliveIdle != 0) {
|
2022-07-31 13:55:40 +00:00
|
|
|
goStdKeepAlive = time.Duration(-1)
|
|
|
|
}
|
2020-11-25 11:01:53 +00:00
|
|
|
dialer := &net.Dialer{
|
|
|
|
Timeout: time.Second * 16,
|
|
|
|
LocalAddr: resolveSrcAddr(dest.Network, src),
|
2022-07-31 13:55:40 +00:00
|
|
|
KeepAlive: goStdKeepAlive,
|
2020-11-25 11:01:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if sockopt != nil || len(d.controllers) > 0 {
|
2023-09-07 17:32:27 +00:00
|
|
|
if sockopt != nil && sockopt.TcpMptcp {
|
|
|
|
dialer.SetMultipathTCP(true)
|
|
|
|
}
|
2020-11-25 11:01:53 +00:00
|
|
|
dialer.Control = func(network, address string, c syscall.RawConn) error {
|
2023-04-23 11:31:41 +00:00
|
|
|
for _, ctl := range d.controllers {
|
|
|
|
if err := ctl(network, address, c); err != nil {
|
|
|
|
newError("failed to apply external controller").Base(err).WriteToLog(session.ExportIDToError(ctx))
|
|
|
|
}
|
|
|
|
}
|
2020-11-25 11:01:53 +00:00
|
|
|
return c.Control(func(fd uintptr) {
|
|
|
|
if sockopt != nil {
|
|
|
|
if err := applyOutboundSocketOptions(network, address, fd, sockopt); err != nil {
|
|
|
|
newError("failed to apply socket options").Base(err).WriteToLog(session.ExportIDToError(ctx))
|
|
|
|
}
|
|
|
|
if dest.Network == net.Network_UDP && hasBindAddr(sockopt) {
|
|
|
|
if err := bindAddr(fd, sockopt.BindAddress, sockopt.BindPort); err != nil {
|
|
|
|
newError("failed to bind source address to ", sockopt.BindAddress).Base(err).WriteToLog(session.ExportIDToError(ctx))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return dialer.DialContext(ctx, dest.Network.SystemString(), dest.NetAddr())
|
|
|
|
}
|
|
|
|
|
2020-12-23 13:06:21 +00:00
|
|
|
type PacketConnWrapper struct {
|
2021-09-19 06:14:03 +00:00
|
|
|
Conn net.PacketConn
|
|
|
|
Dest net.Addr
|
2020-11-25 11:01:53 +00:00
|
|
|
}
|
|
|
|
|
2020-12-23 13:06:21 +00:00
|
|
|
func (c *PacketConnWrapper) Close() error {
|
2021-09-19 06:14:03 +00:00
|
|
|
return c.Conn.Close()
|
2020-11-25 11:01:53 +00:00
|
|
|
}
|
|
|
|
|
2020-12-23 13:06:21 +00:00
|
|
|
func (c *PacketConnWrapper) LocalAddr() net.Addr {
|
2021-09-19 06:14:03 +00:00
|
|
|
return c.Conn.LocalAddr()
|
2020-11-25 11:01:53 +00:00
|
|
|
}
|
|
|
|
|
2020-12-23 13:06:21 +00:00
|
|
|
func (c *PacketConnWrapper) RemoteAddr() net.Addr {
|
2021-09-19 06:14:03 +00:00
|
|
|
return c.Dest
|
2020-11-25 11:01:53 +00:00
|
|
|
}
|
|
|
|
|
2020-12-23 13:06:21 +00:00
|
|
|
func (c *PacketConnWrapper) Write(p []byte) (int, error) {
|
2021-09-19 06:14:03 +00:00
|
|
|
return c.Conn.WriteTo(p, c.Dest)
|
2020-11-25 11:01:53 +00:00
|
|
|
}
|
|
|
|
|
2020-12-23 13:06:21 +00:00
|
|
|
func (c *PacketConnWrapper) Read(p []byte) (int, error) {
|
2021-09-19 06:14:03 +00:00
|
|
|
n, _, err := c.Conn.ReadFrom(p)
|
2020-11-25 11:01:53 +00:00
|
|
|
return n, err
|
|
|
|
}
|
|
|
|
|
2020-12-23 13:06:21 +00:00
|
|
|
func (c *PacketConnWrapper) WriteTo(p []byte, d net.Addr) (int, error) {
|
2021-09-19 06:14:03 +00:00
|
|
|
return c.Conn.WriteTo(p, d)
|
2020-12-23 13:06:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (c *PacketConnWrapper) ReadFrom(p []byte) (int, net.Addr, error) {
|
2021-09-19 06:14:03 +00:00
|
|
|
return c.Conn.ReadFrom(p)
|
2020-12-23 13:06:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (c *PacketConnWrapper) SetDeadline(t time.Time) error {
|
2021-09-19 06:14:03 +00:00
|
|
|
return c.Conn.SetDeadline(t)
|
2020-11-25 11:01:53 +00:00
|
|
|
}
|
|
|
|
|
2020-12-23 13:06:21 +00:00
|
|
|
func (c *PacketConnWrapper) SetReadDeadline(t time.Time) error {
|
2021-09-19 06:14:03 +00:00
|
|
|
return c.Conn.SetReadDeadline(t)
|
2020-11-25 11:01:53 +00:00
|
|
|
}
|
|
|
|
|
2020-12-23 13:06:21 +00:00
|
|
|
func (c *PacketConnWrapper) SetWriteDeadline(t time.Time) error {
|
2021-09-19 06:14:03 +00:00
|
|
|
return c.Conn.SetWriteDeadline(t)
|
2020-11-25 11:01:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type SystemDialerAdapter interface {
|
|
|
|
Dial(network string, address string) (net.Conn, error)
|
|
|
|
}
|
|
|
|
|
|
|
|
type SimpleSystemDialer struct {
|
|
|
|
adapter SystemDialerAdapter
|
|
|
|
}
|
|
|
|
|
|
|
|
func WithAdapter(dialer SystemDialerAdapter) SystemDialer {
|
|
|
|
return &SimpleSystemDialer{
|
|
|
|
adapter: dialer,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (v *SimpleSystemDialer) Dial(ctx context.Context, src net.Address, dest net.Destination, sockopt *SocketConfig) (net.Conn, error) {
|
|
|
|
return v.adapter.Dial(dest.Network.SystemString(), dest.NetAddr())
|
|
|
|
}
|
|
|
|
|
|
|
|
// UseAlternativeSystemDialer replaces the current system dialer with a given one.
|
|
|
|
// Caller must ensure there is no race condition.
|
|
|
|
//
|
|
|
|
// xray:api:stable
|
|
|
|
func UseAlternativeSystemDialer(dialer SystemDialer) {
|
|
|
|
if dialer == nil {
|
2021-10-12 15:32:45 +00:00
|
|
|
dialer = &DefaultSystemDialer{}
|
2020-11-25 11:01:53 +00:00
|
|
|
}
|
|
|
|
effectiveSystemDialer = dialer
|
|
|
|
}
|
|
|
|
|
|
|
|
// RegisterDialerController adds a controller to the effective system dialer.
|
|
|
|
// The controller can be used to operate on file descriptors before they are put into use.
|
|
|
|
// It only works when effective dialer is the default dialer.
|
|
|
|
//
|
|
|
|
// xray:api:beta
|
2023-04-23 11:31:41 +00:00
|
|
|
func RegisterDialerController(ctl control.Func) error {
|
2020-11-25 11:01:53 +00:00
|
|
|
if ctl == nil {
|
|
|
|
return newError("nil listener controller")
|
|
|
|
}
|
|
|
|
|
|
|
|
dialer, ok := effectiveSystemDialer.(*DefaultSystemDialer)
|
|
|
|
if !ok {
|
|
|
|
return newError("RegisterListenerController not supported in custom dialer")
|
|
|
|
}
|
|
|
|
|
|
|
|
dialer.controllers = append(dialer.controllers, ctl)
|
|
|
|
return nil
|
|
|
|
}
|