clash/hub/executor/executor.go

402 lines
9.3 KiB
Go
Raw Normal View History

2018-11-21 05:47:46 +00:00
package executor
import (
"fmt"
2021-12-04 09:41:13 +00:00
"net"
2022-04-12 12:20:04 +00:00
"net/netip"
"os"
2021-12-04 09:41:13 +00:00
"runtime"
"strconv"
2020-06-18 10:11:02 +00:00
"sync"
2021-06-10 06:05:56 +00:00
"github.com/Dreamacro/clash/adapter"
"github.com/Dreamacro/clash/adapter/outboundgroup"
"github.com/Dreamacro/clash/component/auth"
"github.com/Dreamacro/clash/component/dialer"
2022-02-04 16:51:06 +00:00
G "github.com/Dreamacro/clash/component/geodata"
"github.com/Dreamacro/clash/component/iface"
"github.com/Dreamacro/clash/component/profile"
"github.com/Dreamacro/clash/component/profile/cachefile"
"github.com/Dreamacro/clash/component/resolver"
SNI "github.com/Dreamacro/clash/component/sniffer"
"github.com/Dreamacro/clash/component/trie"
2018-11-21 05:47:46 +00:00
"github.com/Dreamacro/clash/config"
C "github.com/Dreamacro/clash/constant"
"github.com/Dreamacro/clash/constant/provider"
2018-12-05 13:13:29 +00:00
"github.com/Dreamacro/clash/dns"
2021-06-13 09:23:10 +00:00
P "github.com/Dreamacro/clash/listener"
authStore "github.com/Dreamacro/clash/listener/auth"
2021-07-01 14:49:29 +00:00
"github.com/Dreamacro/clash/listener/tproxy"
2018-11-21 05:47:46 +00:00
"github.com/Dreamacro/clash/log"
"github.com/Dreamacro/clash/tunnel"
2018-11-21 05:47:46 +00:00
)
2021-10-10 15:44:09 +00:00
var mux sync.Mutex
2020-06-18 10:11:02 +00:00
func readConfig(path string) ([]byte, error) {
if _, err := os.Stat(path); os.IsNotExist(err) {
return nil, err
}
2021-10-09 12:35:06 +00:00
data, err := os.ReadFile(path)
if err != nil {
return nil, err
}
if len(data) == 0 {
2020-08-25 14:19:59 +00:00
return nil, fmt.Errorf("configuration file %s is empty", path)
}
return data, err
}
2018-11-21 05:47:46 +00:00
// Parse config with default config path
func Parse() (*config.Config, error) {
return ParseWithPath(C.Path.Config())
}
// ParseWithPath parse config with custom config path
func ParseWithPath(path string) (*config.Config, error) {
buf, err := readConfig(path)
if err != nil {
return nil, err
}
return ParseWithBytes(buf)
}
// ParseWithBytes config with buffer
func ParseWithBytes(buf []byte) (*config.Config, error) {
return config.Parse(buf)
2018-11-21 05:47:46 +00:00
}
// ApplyConfig dispatch configure to all parts
2018-11-30 09:42:40 +00:00
func ApplyConfig(cfg *config.Config, force bool) {
2020-06-18 10:11:02 +00:00
mux.Lock()
defer mux.Unlock()
updateUsers(cfg.Users)
updateProxies(cfg.Proxies, cfg.Providers)
updateRules(cfg.Rules, cfg.RuleProviders)
2022-04-16 00:29:38 +00:00
updateSniffer(cfg.Sniffer)
updateDNS(cfg.DNS, cfg.Tun)
2022-03-21 11:47:21 +00:00
updateGeneral(cfg.General, force)
updateIPTables(cfg)
updateTun(cfg.Tun, cfg.DNS)
updateExperimental(cfg)
2022-03-21 11:38:36 +00:00
updateHosts(cfg.Hosts)
loadProvider(cfg.RuleProviders, cfg.Providers)
2022-01-21 14:38:02 +00:00
updateProfile(cfg)
2022-03-05 10:04:04 +00:00
log.SetLevel(cfg.General.LogLevel)
2018-11-21 05:47:46 +00:00
}
func GetGeneral() *config.General {
ports := P.GetPorts()
2022-03-19 18:39:48 +00:00
var authenticator []string
2019-06-27 12:45:12 +00:00
if auth := authStore.Authenticator(); auth != nil {
authenticator = auth.Users()
}
general := &config.General{
2020-06-18 10:11:02 +00:00
Inbound: config.Inbound{
Port: ports.Port,
SocksPort: ports.SocksPort,
RedirPort: ports.RedirPort,
TProxyPort: ports.TProxyPort,
2020-06-18 10:11:02 +00:00
MixedPort: ports.MixedPort,
Authentication: authenticator,
AllowLan: P.AllowLan(),
BindAddress: P.BindAddress(),
},
2022-02-04 16:51:06 +00:00
Mode: tunnel.Mode(),
LogLevel: log.Level(),
IPv6: !resolver.DisableIPv6,
GeodataLoader: G.LoaderName(),
2018-11-21 05:47:46 +00:00
}
2019-06-27 12:45:12 +00:00
return general
2018-11-21 05:47:46 +00:00
}
func updateExperimental(c *config.Config) {}
2022-03-08 21:08:35 +00:00
func updateDNS(c *config.DNS, t *config.Tun) {
cfg := dns.Config{
2018-12-05 13:13:29 +00:00
Main: c.NameServer,
Fallback: c.Fallback,
IPv6: c.IPv6,
EnhancedMode: c.EnhancedMode,
2019-05-02 16:05:14 +00:00
Pool: c.FakeIPRange,
Hosts: c.Hosts,
2019-09-15 05:36:45 +00:00
FallbackFilter: dns.FallbackFilter{
2021-08-25 07:15:13 +00:00
GeoIP: c.FallbackFilter.GeoIP,
GeoIPCode: c.FallbackFilter.GeoIPCode,
IPCIDR: c.FallbackFilter.IPCIDR,
Domain: c.FallbackFilter.Domain,
2021-11-17 08:03:47 +00:00
GeoSite: c.FallbackFilter.GeoSite,
2019-09-15 05:36:45 +00:00
},
2022-03-27 16:44:13 +00:00
Default: c.DefaultNameserver,
Policy: c.NameServerPolicy,
ProxyServer: c.ProxyServerNameserver,
}
r := dns.NewResolver(cfg)
2022-03-27 16:44:13 +00:00
pr := dns.NewProxyServerHostResolver(r)
m := dns.NewEnhancer(cfg)
// reuse cache of old host mapper
if old := resolver.DefaultHostMapper; old != nil {
m.PatchFrom(old.(*dns.ResolverEnhancer))
}
resolver.DefaultResolver = r
resolver.DefaultHostMapper = m
2022-03-27 16:44:13 +00:00
if pr.HasProxyServer() {
resolver.ProxyServerHostResolver = pr
}
2022-03-08 21:08:35 +00:00
if t.Enable {
2021-11-17 08:03:47 +00:00
resolver.DefaultLocalServer = dns.NewLocalServer(r, m)
}
if c.Enable {
dns.ReCreateServer(c.Listen, r, m)
2022-03-08 21:08:35 +00:00
} else {
if !t.Enable {
resolver.DefaultResolver = nil
resolver.DefaultHostMapper = nil
resolver.DefaultLocalServer = nil
2022-03-27 16:44:13 +00:00
resolver.ProxyServerHostResolver = nil
2022-03-08 21:08:35 +00:00
}
dns.ReCreateServer("", nil, nil)
2022-01-04 09:58:50 +00:00
}
2018-12-05 13:13:29 +00:00
}
2022-04-12 12:20:04 +00:00
func updateHosts(tree *trie.DomainTrie[netip.Addr]) {
resolver.DefaultHosts = tree
2019-09-11 09:00:55 +00:00
}
2019-12-08 04:17:24 +00:00
func updateProxies(proxies map[string]C.Proxy, providers map[string]provider.ProxyProvider) {
tunnel.UpdateProxies(proxies, providers)
2018-11-21 05:47:46 +00:00
}
2021-12-02 14:56:17 +00:00
func updateRules(rules []C.Rule, ruleProviders map[string]*provider.RuleProvider) {
tunnel.UpdateRules(rules, ruleProviders)
2018-11-21 05:47:46 +00:00
}
func loadProvider(ruleProviders map[string]*provider.RuleProvider, proxyProviders map[string]provider.ProxyProvider) {
load := func(pv provider.Provider) {
if pv.VehicleType() == provider.Compatible {
log.Infoln("Start initial compatible provider %s", pv.Name())
} else {
log.Infoln("Start initial provider %s", (pv).Name())
}
if err := (pv).Initial(); err != nil {
switch pv.Type() {
case provider.Proxy:
{
log.Warnln("initial proxy provider %s error: %v", (pv).Name(), err)
}
case provider.Rule:
{
log.Warnln("initial rule provider %s error: %v", (pv).Name(), err)
}
}
}
}
for _, proxyProvider := range proxyProviders {
load(proxyProvider)
}
for _, ruleProvider := range ruleProviders {
load(*ruleProvider)
}
}
func updateTun(tun *config.Tun, dns *config.DNS) {
P.ReCreateTun(tun, dns, tunnel.TCPIn(), tunnel.UDPIn())
2022-03-08 21:08:35 +00:00
}
2022-04-12 12:20:04 +00:00
func updateSniffer(sniffer *config.Sniffer) {
if sniffer.Enable {
dispatcher, err := SNI.NewSnifferDispatcher(sniffer.Sniffers, sniffer.ForceDomain, sniffer.SkipSNI)
2022-04-12 12:20:04 +00:00
if err != nil {
log.Warnln("initial sniffer failed, err:%v", err)
}
tunnel.UpdateSniffer(dispatcher)
2022-04-12 12:20:04 +00:00
log.Infoln("Sniffer is loaded and working")
} else {
dispatcher, err := SNI.NewCloseSnifferDispatcher()
if err != nil {
log.Warnln("initial sniffer failed, err:%v", err)
}
tunnel.UpdateSniffer(dispatcher)
log.Infoln("Sniffer is closed")
2022-04-12 12:20:04 +00:00
}
}
func updateGeneral(general *config.General, force bool) {
2022-03-19 18:39:48 +00:00
log.SetLevel(general.LogLevel)
tunnel.SetMode(general.Mode)
2020-06-18 10:11:02 +00:00
resolver.DisableIPv6 = !general.IPv6
2022-03-19 18:39:48 +00:00
adapter.UnifiedDelay.Store(general.UnifiedDelay)
dialer.DefaultInterface.Store(general.Interface)
2022-03-19 18:39:48 +00:00
2022-03-08 21:08:35 +00:00
if dialer.DefaultInterface.Load() != "" {
log.Infoln("Use interface name: %s", general.Interface)
}
2022-03-19 18:39:48 +00:00
dialer.DefaultRoutingMark.Store(int32(general.RoutingMark))
if general.RoutingMark > 0 {
log.Infoln("Use routing mark: %#x", general.RoutingMark)
2022-03-02 21:02:17 +00:00
}
2021-11-17 08:03:47 +00:00
iface.FlushCache()
2020-06-18 10:11:02 +00:00
if !force {
return
}
2018-12-03 15:41:40 +00:00
2022-03-14 18:20:19 +00:00
geodataLoader := general.GeodataLoader
G.SetLoader(geodataLoader)
2018-11-21 05:47:46 +00:00
allowLan := general.AllowLan
P.SetAllowLan(allowLan)
bindAddress := general.BindAddress
P.SetBindAddress(bindAddress)
2021-06-13 09:23:10 +00:00
tcpIn := tunnel.TCPIn()
udpIn := tunnel.UDPIn()
P.ReCreateHTTP(general.Port, tcpIn)
P.ReCreateSocks(general.SocksPort, tcpIn, udpIn)
P.ReCreateRedir(general.RedirPort, tcpIn, udpIn)
P.ReCreateTProxy(general.TProxyPort, tcpIn, udpIn)
P.ReCreateMixed(general.MixedPort, tcpIn, udpIn)
2018-11-21 05:47:46 +00:00
}
func updateUsers(users []auth.AuthUser) {
authenticator := auth.NewAuthenticator(users)
authStore.SetAuthenticator(authenticator)
if authenticator != nil {
log.Infoln("Authentication of local server updated")
}
}
func updateProfile(cfg *config.Config) {
profileCfg := cfg.Profile
profile.StoreSelected.Store(profileCfg.StoreSelected)
if profileCfg.StoreSelected {
patchSelectGroup(cfg.Proxies)
}
}
func patchSelectGroup(proxies map[string]C.Proxy) {
mapping := cachefile.Cache().SelectedMap()
if mapping == nil {
return
}
for name, proxy := range proxies {
2021-06-10 06:05:56 +00:00
outbound, ok := proxy.(*adapter.Proxy)
if !ok {
continue
}
selector, ok := outbound.ProxyAdapter.(*outboundgroup.Selector)
if !ok {
continue
}
selected, exist := mapping[name]
if !exist {
continue
}
selector.Set(selected)
}
}
2021-11-17 08:03:47 +00:00
func updateIPTables(cfg *config.Config) {
tproxy.CleanupTProxyIPTables()
2022-03-08 21:08:35 +00:00
iptables := cfg.IPTables
if runtime.GOOS != "linux" || !iptables.Enable {
2022-03-08 21:08:35 +00:00
return
}
var err error
defer func() {
if err != nil {
log.Errorln("[IPTABLES] setting iptables failed: %s", err.Error())
2022-03-08 21:08:35 +00:00
os.Exit(2)
}
}()
if cfg.Tun.Enable {
err = fmt.Errorf("when tun is enabled, iptables cannot be set automatically")
return
}
var (
inboundInterface = "lo"
2022-03-23 03:04:43 +00:00
bypass = iptables.Bypass
tProxyPort = cfg.General.TProxyPort
dnsCfg = cfg.DNS
)
if tProxyPort == 0 {
err = fmt.Errorf("tproxy-port must be greater than zero")
2022-03-08 21:08:35 +00:00
return
}
if !dnsCfg.Enable {
err = fmt.Errorf("DNS server must be enable")
2021-12-04 09:41:13 +00:00
return
}
_, dnsPortStr, err := net.SplitHostPort(dnsCfg.Listen)
if err != nil {
err = fmt.Errorf("DNS server must be correct")
2021-07-01 14:49:29 +00:00
return
2021-12-04 09:41:13 +00:00
}
dnsPort, err := strconv.ParseUint(dnsPortStr, 10, 16)
2021-12-04 09:41:13 +00:00
if err != nil {
err = fmt.Errorf("DNS server must be correct")
2021-07-01 14:49:29 +00:00
return
}
if iptables.InboundInterface != "" {
inboundInterface = iptables.InboundInterface
2021-12-04 09:41:13 +00:00
}
2022-03-05 10:04:04 +00:00
if dialer.DefaultRoutingMark.Load() == 0 {
dialer.DefaultRoutingMark.Store(2158)
2021-12-04 09:41:13 +00:00
}
2022-03-05 10:04:04 +00:00
2022-03-23 03:04:43 +00:00
err = tproxy.SetTProxyIPTables(inboundInterface, bypass, uint16(tProxyPort), uint16(dnsPort))
if err != nil {
return
}
log.Infoln("[IPTABLES] Setting iptables completed")
2021-12-04 09:41:13 +00:00
}
2021-11-17 08:03:47 +00:00
2022-03-27 19:25:55 +00:00
func Shutdown() {
P.Cleanup()
tproxy.CleanupTProxyIPTables()
2022-04-12 21:55:08 +00:00
resolver.StoreFakePoolSate()
2022-03-27 19:25:55 +00:00
log.Warnln("Clash shutting down")
2021-11-17 08:03:47 +00:00
}