clash/listener/listener.go

930 lines
21 KiB
Go
Raw Normal View History

2022-11-18 14:57:33 +00:00
package listener
2018-07-15 14:23:20 +00:00
import (
2018-11-21 05:47:46 +00:00
"fmt"
2022-07-29 01:08:35 +00:00
"golang.org/x/exp/slices"
2018-11-21 05:47:46 +00:00
"net"
2022-05-03 11:13:37 +00:00
"sort"
2018-11-21 05:47:46 +00:00
"strconv"
2022-11-18 14:57:33 +00:00
"strings"
"sync"
2018-07-15 14:23:20 +00:00
2023-11-03 13:01:45 +00:00
"github.com/metacubex/mihomo/component/ebpf"
C "github.com/metacubex/mihomo/constant"
"github.com/metacubex/mihomo/listener/autoredir"
LC "github.com/metacubex/mihomo/listener/config"
"github.com/metacubex/mihomo/listener/http"
"github.com/metacubex/mihomo/listener/mixed"
"github.com/metacubex/mihomo/listener/redir"
embedSS "github.com/metacubex/mihomo/listener/shadowsocks"
"github.com/metacubex/mihomo/listener/sing_shadowsocks"
"github.com/metacubex/mihomo/listener/sing_tun"
"github.com/metacubex/mihomo/listener/sing_vmess"
"github.com/metacubex/mihomo/listener/socks"
"github.com/metacubex/mihomo/listener/tproxy"
"github.com/metacubex/mihomo/listener/tuic"
LT "github.com/metacubex/mihomo/listener/tunnel"
"github.com/metacubex/mihomo/log"
2022-11-18 14:57:33 +00:00
"github.com/samber/lo"
2018-07-15 14:23:20 +00:00
)
var (
allowLan = false
bindAddress = "*"
2018-11-21 05:47:46 +00:00
socksListener *socks.Listener
socksUDPListener *socks.UDPListener
httpListener *http.Listener
redirListener *redir.Listener
redirUDPListener *tproxy.UDPListener
tproxyListener *tproxy.Listener
tproxyUDPListener *tproxy.UDPListener
mixedListener *mixed.Listener
mixedUDPLister *socks.UDPListener
tunnelTCPListeners = map[string]*LT.Listener{}
tunnelUDPListeners = map[string]*LT.PacketConn{}
2022-12-04 13:53:13 +00:00
inboundListeners = map[string]C.InboundListener{}
tunLister *sing_tun.Listener
shadowSocksListener C.MultiAddrListener
vmessListener *sing_vmess.Listener
2022-11-28 09:09:25 +00:00
tuicListener *tuic.Listener
autoRedirListener *autoredir.Listener
autoRedirProgram *ebpf.TcEBpfProgram
tcProgram *ebpf.TcEBpfProgram
// lock for recreate function
2022-07-29 01:08:35 +00:00
socksMux sync.Mutex
httpMux sync.Mutex
redirMux sync.Mutex
tproxyMux sync.Mutex
mixedMux sync.Mutex
tunnelMux sync.Mutex
2022-12-04 13:53:13 +00:00
inboundMux sync.Mutex
2022-07-29 01:08:35 +00:00
tunMux sync.Mutex
ssMux sync.Mutex
vmessMux sync.Mutex
2022-11-28 09:09:25 +00:00
tuicMux sync.Mutex
2022-07-29 01:08:35 +00:00
autoRedirMux sync.Mutex
tcMux sync.Mutex
2022-11-03 10:56:03 +00:00
LastTunConf LC.Tun
LastTuicConf LC.TuicServer
2018-07-15 14:23:20 +00:00
)
2018-11-21 05:47:46 +00:00
type Ports struct {
Port int `json:"port"`
SocksPort int `json:"socks-port"`
RedirPort int `json:"redir-port"`
TProxyPort int `json:"tproxy-port"`
MixedPort int `json:"mixed-port"`
ShadowSocksConfig string `json:"ss-config"`
VmessConfig string `json:"vmess-config"`
2018-11-21 05:47:46 +00:00
}
func GetTunConf() LC.Tun {
2022-11-03 10:56:03 +00:00
if tunLister == nil {
return LastTunConf
2022-05-03 11:13:37 +00:00
}
2022-11-03 10:56:03 +00:00
return tunLister.Config()
2022-05-03 11:13:37 +00:00
}
func GetTuicConf() LC.TuicServer {
if tuicListener == nil {
return LC.TuicServer{Enable: false}
}
return tuicListener.Config()
}
2018-11-21 05:47:46 +00:00
func AllowLan() bool {
return allowLan
}
func BindAddress() string {
return bindAddress
}
2018-11-21 05:47:46 +00:00
func SetAllowLan(al bool) {
allowLan = al
2018-07-15 14:23:20 +00:00
}
func SetBindAddress(host string) {
bindAddress = host
}
func ReCreateHTTP(port int, tunnel C.Tunnel) {
httpMux.Lock()
defer httpMux.Unlock()
var err error
defer func() {
if err != nil {
log.Errorln("Start HTTP server error: %s", err.Error())
}
}()
addr := genAddr(bindAddress, port, allowLan)
2018-11-21 05:47:46 +00:00
if httpListener != nil {
2021-07-31 16:35:37 +00:00
if httpListener.RawAddress() == addr {
return
2018-11-21 05:47:46 +00:00
}
httpListener.Close()
2018-11-21 05:47:46 +00:00
httpListener = nil
}
if portIsZero(addr) {
return
2018-07-15 14:23:20 +00:00
}
httpListener, err = http.New(addr, tunnel)
2018-07-15 14:23:20 +00:00
if err != nil {
2022-01-04 09:58:50 +00:00
log.Errorln("Start HTTP server error: %s", err.Error())
return
2018-07-15 14:23:20 +00:00
}
2021-06-13 09:23:10 +00:00
log.Infoln("HTTP proxy listening at: %s", httpListener.Address())
2018-07-15 14:23:20 +00:00
}
func ReCreateSocks(port int, tunnel C.Tunnel) {
socksMux.Lock()
defer socksMux.Unlock()
var err error
defer func() {
if err != nil {
log.Errorln("Start SOCKS server error: %s", err.Error())
}
}()
addr := genAddr(bindAddress, port, allowLan)
2018-11-21 05:47:46 +00:00
shouldTCPIgnore := false
shouldUDPIgnore := false
2018-11-21 05:47:46 +00:00
if socksListener != nil {
2021-07-31 16:35:37 +00:00
if socksListener.RawAddress() != addr {
socksListener.Close()
socksListener = nil
} else {
shouldTCPIgnore = true
}
}
if socksUDPListener != nil {
2021-07-31 16:35:37 +00:00
if socksUDPListener.RawAddress() != addr {
socksUDPListener.Close()
socksUDPListener = nil
} else {
shouldUDPIgnore = true
2018-11-21 05:47:46 +00:00
}
}
if shouldTCPIgnore && shouldUDPIgnore {
return
}
2018-11-21 05:47:46 +00:00
if portIsZero(addr) {
return
2018-07-15 14:23:20 +00:00
}
tcpListener, err := socks.New(addr, tunnel)
2018-07-15 14:23:20 +00:00
if err != nil {
return
2018-07-15 14:23:20 +00:00
}
udpListener, err := socks.NewUDP(addr, tunnel)
if err != nil {
tcpListener.Close()
return
}
socksListener = tcpListener
socksUDPListener = udpListener
log.Infoln("SOCKS proxy listening at: %s", socksListener.Address())
2018-07-15 14:23:20 +00:00
}
func ReCreateRedir(port int, tunnel C.Tunnel) {
redirMux.Lock()
defer redirMux.Unlock()
var err error
defer func() {
if err != nil {
log.Errorln("Start Redir server error: %s", err.Error())
}
}()
addr := genAddr(bindAddress, port, allowLan)
2018-11-21 05:47:46 +00:00
if redirListener != nil {
2021-07-31 16:35:37 +00:00
if redirListener.RawAddress() == addr {
return
2018-11-21 05:47:46 +00:00
}
redirListener.Close()
2018-11-21 05:47:46 +00:00
redirListener = nil
}
if redirUDPListener != nil {
2021-07-31 16:35:37 +00:00
if redirUDPListener.RawAddress() == addr {
return
}
redirUDPListener.Close()
redirUDPListener = nil
}
2018-11-21 05:47:46 +00:00
if portIsZero(addr) {
return
2018-08-11 20:00:34 +00:00
}
redirListener, err = redir.New(addr, tunnel)
2018-08-11 20:00:34 +00:00
if err != nil {
return
2018-08-11 20:00:34 +00:00
}
redirUDPListener, err = tproxy.NewUDP(addr, tunnel)
if err != nil {
log.Warnln("Failed to start Redir UDP Listener: %s", err)
}
2021-06-13 09:23:10 +00:00
log.Infoln("Redirect proxy listening at: %s", redirListener.Address())
2018-08-11 20:00:34 +00:00
}
func ReCreateShadowSocks(shadowSocksConfig string, tunnel C.Tunnel) {
ssMux.Lock()
defer ssMux.Unlock()
var err error
defer func() {
if err != nil {
log.Errorln("Start ShadowSocks server error: %s", err.Error())
}
}()
var ssConfig LC.ShadowsocksServer
if addr, cipher, password, err := embedSS.ParseSSURL(shadowSocksConfig); err == nil {
ssConfig = LC.ShadowsocksServer{
2022-12-05 08:29:50 +00:00
Enable: len(shadowSocksConfig) > 0,
Listen: addr,
Password: password,
Cipher: cipher,
Udp: true,
}
}
shouldIgnore := false
if shadowSocksListener != nil {
if shadowSocksListener.Config() != ssConfig.String() {
shadowSocksListener.Close()
shadowSocksListener = nil
} else {
shouldIgnore = true
}
}
if shouldIgnore {
return
}
if !ssConfig.Enable {
return
}
listener, err := sing_shadowsocks.New(ssConfig, tunnel)
if err != nil {
return
}
shadowSocksListener = listener
for _, addr := range shadowSocksListener.AddrList() {
log.Infoln("ShadowSocks proxy listening at: %s", addr.String())
}
return
}
func ReCreateVmess(vmessConfig string, tunnel C.Tunnel) {
vmessMux.Lock()
defer vmessMux.Unlock()
var err error
defer func() {
if err != nil {
log.Errorln("Start Vmess server error: %s", err.Error())
}
}()
var vsConfig LC.VmessServer
if addr, username, password, err := sing_vmess.ParseVmessURL(vmessConfig); err == nil {
vsConfig = LC.VmessServer{
2022-12-05 08:29:50 +00:00
Enable: len(vmessConfig) > 0,
Listen: addr,
Users: []LC.VmessUser{{Username: username, UUID: password, AlterID: 1}},
}
}
shouldIgnore := false
if vmessListener != nil {
if vmessListener.Config() != vsConfig.String() {
vmessListener.Close()
vmessListener = nil
} else {
shouldIgnore = true
}
}
if shouldIgnore {
return
}
if !vsConfig.Enable {
return
}
listener, err := sing_vmess.New(vsConfig, tunnel)
if err != nil {
return
}
vmessListener = listener
for _, addr := range vmessListener.AddrList() {
log.Infoln("Vmess proxy listening at: %s", addr.String())
}
return
}
func ReCreateTuic(config LC.TuicServer, tunnel C.Tunnel) {
2022-11-28 09:09:25 +00:00
tuicMux.Lock()
defer func() {
LastTuicConf = config
tuicMux.Unlock()
}()
2022-11-28 09:09:25 +00:00
shouldIgnore := false
var err error
defer func() {
if err != nil {
log.Errorln("Start Tuic server error: %s", err.Error())
}
}()
if tuicListener != nil {
if tuicListener.Config().String() != config.String() {
tuicListener.Close()
tuicListener = nil
} else {
shouldIgnore = true
}
}
if shouldIgnore {
return
}
if !config.Enable {
return
}
listener, err := tuic.New(config, tunnel)
2022-11-28 09:09:25 +00:00
if err != nil {
return
}
tuicListener = listener
2022-12-04 15:05:13 +00:00
for _, addr := range tuicListener.AddrList() {
log.Infoln("Tuic proxy listening at: %s", addr.String())
}
2022-11-28 09:09:25 +00:00
return
}
func ReCreateTProxy(port int, tunnel C.Tunnel) {
tproxyMux.Lock()
defer tproxyMux.Unlock()
var err error
defer func() {
if err != nil {
log.Errorln("Start TProxy server error: %s", err.Error())
}
}()
addr := genAddr(bindAddress, port, allowLan)
if tproxyListener != nil {
2021-07-31 16:35:37 +00:00
if tproxyListener.RawAddress() == addr {
return
}
tproxyListener.Close()
tproxyListener = nil
}
if tproxyUDPListener != nil {
2021-07-31 16:35:37 +00:00
if tproxyUDPListener.RawAddress() == addr {
return
}
tproxyUDPListener.Close()
tproxyUDPListener = nil
}
if portIsZero(addr) {
return
}
tproxyListener, err = tproxy.New(addr, tunnel)
if err != nil {
return
}
tproxyUDPListener, err = tproxy.NewUDP(addr, tunnel)
if err != nil {
log.Warnln("Failed to start TProxy UDP Listener: %s", err)
}
2021-06-13 09:23:10 +00:00
log.Infoln("TProxy server listening at: %s", tproxyListener.Address())
}
func ReCreateMixed(port int, tunnel C.Tunnel) {
mixedMux.Lock()
defer mixedMux.Unlock()
var err error
defer func() {
if err != nil {
log.Errorln("Start Mixed(http+socks) server error: %s", err.Error())
}
}()
addr := genAddr(bindAddress, port, allowLan)
shouldTCPIgnore := false
shouldUDPIgnore := false
if mixedListener != nil {
2021-07-31 16:35:37 +00:00
if mixedListener.RawAddress() != addr {
mixedListener.Close()
mixedListener = nil
} else {
shouldTCPIgnore = true
}
}
if mixedUDPLister != nil {
2021-07-31 16:35:37 +00:00
if mixedUDPLister.RawAddress() != addr {
mixedUDPLister.Close()
mixedUDPLister = nil
} else {
shouldUDPIgnore = true
}
}
if shouldTCPIgnore && shouldUDPIgnore {
return
}
if portIsZero(addr) {
return
}
mixedListener, err = mixed.New(addr, tunnel)
if err != nil {
return
}
mixedUDPLister, err = socks.NewUDP(addr, tunnel)
if err != nil {
mixedListener.Close()
return
}
log.Infoln("Mixed(http+socks) proxy listening at: %s", mixedListener.Address())
}
func ReCreateTun(tunConf LC.Tun, tunnel C.Tunnel) {
2021-11-17 08:03:47 +00:00
tunMux.Lock()
2022-11-02 15:58:51 +00:00
defer func() {
LastTunConf = tunConf
2022-11-02 15:58:51 +00:00
tunMux.Unlock()
}()
2021-11-17 08:03:47 +00:00
var err error
defer func() {
if err != nil {
2022-03-08 21:08:35 +00:00
log.Errorln("Start TUN listening error: %s", err.Error())
tunConf.Enable = false
}
}()
if !hasTunConfigChange(&tunConf) {
if tunLister != nil {
tunLister.FlushDefaultInterface()
}
2022-05-03 11:13:37 +00:00
return
}
closeTunListener()
2021-11-17 08:03:47 +00:00
2022-03-08 21:08:35 +00:00
if !tunConf.Enable {
return
2021-11-17 08:03:47 +00:00
}
2022-05-03 11:13:37 +00:00
lister, err := sing_tun.New(tunConf, tunnel)
2022-12-08 03:29:39 +00:00
if err != nil {
return
}
tunLister = lister
2022-12-05 09:43:50 +00:00
log.Infoln("[TUN] Tun adapter listening at: %s", tunLister.Address())
2021-11-17 08:03:47 +00:00
}
2022-08-22 15:17:41 +00:00
func ReCreateRedirToTun(ifaceNames []string) {
tcMux.Lock()
defer tcMux.Unlock()
nicArr := ifaceNames
slices.Sort(nicArr)
nicArr = slices.Compact(nicArr)
if tcProgram != nil {
tcProgram.Close()
tcProgram = nil
}
if len(nicArr) == 0 {
return
}
2022-11-03 10:56:03 +00:00
tunConf := GetTunConf()
if !tunConf.Enable {
2022-08-22 15:17:41 +00:00
return
}
2022-11-03 10:56:03 +00:00
program, err := ebpf.NewTcEBpfProgram(nicArr, tunConf.Device)
2022-08-22 15:17:41 +00:00
if err != nil {
log.Errorln("Attached tc ebpf program error: %v", err)
return
}
tcProgram = program
log.Infoln("Attached tc ebpf program to interfaces %v", tcProgram.RawNICs())
}
func ReCreateAutoRedir(ifaceNames []string, tunnel C.Tunnel) {
2022-07-29 01:08:35 +00:00
autoRedirMux.Lock()
defer autoRedirMux.Unlock()
var err error
defer func() {
if err != nil {
2022-08-08 02:21:16 +00:00
if autoRedirListener != nil {
_ = autoRedirListener.Close()
autoRedirListener = nil
2022-07-29 01:08:35 +00:00
}
if autoRedirProgram != nil {
autoRedirProgram.Close()
autoRedirProgram = nil
}
log.Errorln("Start auto redirect server error: %s", err.Error())
}
}()
nicArr := ifaceNames
slices.Sort(nicArr)
nicArr = slices.Compact(nicArr)
2022-08-08 02:21:16 +00:00
if autoRedirListener != nil && autoRedirProgram != nil {
_ = autoRedirListener.Close()
2022-07-29 01:08:35 +00:00
autoRedirProgram.Close()
2022-08-08 02:21:16 +00:00
autoRedirListener = nil
2022-07-29 01:08:35 +00:00
autoRedirProgram = nil
}
if len(nicArr) == 0 {
return
}
defaultRouteInterfaceName, err := ebpf.GetAutoDetectInterface()
2022-07-29 01:08:35 +00:00
if err != nil {
return
}
addr := genAddr("*", C.TcpAutoRedirPort, true)
autoRedirListener, err = autoredir.New(addr, tunnel)
2022-07-29 01:08:35 +00:00
if err != nil {
return
}
autoRedirProgram, err = ebpf.NewRedirEBpfProgram(nicArr, autoRedirListener.TCPAddr().Port(), defaultRouteInterfaceName)
if err != nil {
return
}
autoRedirListener.SetLookupFunc(autoRedirProgram.Lookup)
log.Infoln("Auto redirect proxy listening at: %s, attached tc ebpf program to interfaces %v", autoRedirListener.Address(), autoRedirProgram.RawNICs())
}
func PatchTunnel(tunnels []LC.Tunnel, tunnel C.Tunnel) {
2022-11-18 14:57:33 +00:00
tunnelMux.Lock()
defer tunnelMux.Unlock()
type addrProxy struct {
network string
addr string
target string
proxy string
}
tcpOld := lo.Map(
lo.Keys(tunnelTCPListeners),
func(key string, _ int) addrProxy {
parts := strings.Split(key, "/")
return addrProxy{
network: "tcp",
addr: parts[0],
target: parts[1],
proxy: parts[2],
}
},
)
udpOld := lo.Map(
lo.Keys(tunnelUDPListeners),
func(key string, _ int) addrProxy {
parts := strings.Split(key, "/")
return addrProxy{
network: "udp",
addr: parts[0],
target: parts[1],
proxy: parts[2],
}
},
)
oldElm := lo.Union(tcpOld, udpOld)
newElm := lo.FlatMap(
tunnels,
2022-12-06 02:13:05 +00:00
func(tunnel LC.Tunnel, _ int) []addrProxy {
2022-11-18 14:57:33 +00:00
return lo.Map(
tunnel.Network,
func(network string, _ int) addrProxy {
return addrProxy{
network: network,
addr: tunnel.Address,
target: tunnel.Target,
proxy: tunnel.Proxy,
}
},
)
},
)
needClose, needCreate := lo.Difference(oldElm, newElm)
for _, elm := range needClose {
key := fmt.Sprintf("%s/%s/%s", elm.addr, elm.target, elm.proxy)
if elm.network == "tcp" {
tunnelTCPListeners[key].Close()
delete(tunnelTCPListeners, key)
} else {
tunnelUDPListeners[key].Close()
delete(tunnelUDPListeners, key)
}
}
for _, elm := range needCreate {
key := fmt.Sprintf("%s/%s/%s", elm.addr, elm.target, elm.proxy)
if elm.network == "tcp" {
l, err := LT.New(elm.addr, elm.target, elm.proxy, tunnel)
2022-11-18 14:57:33 +00:00
if err != nil {
2022-11-22 13:01:51 +00:00
log.Errorln("Start tunnel %s error: %s", elm.target, err.Error())
2022-11-18 14:57:33 +00:00
continue
}
tunnelTCPListeners[key] = l
log.Infoln("Tunnel(tcp/%s) proxy %s listening at: %s", elm.target, elm.proxy, tunnelTCPListeners[key].Address())
} else {
l, err := LT.NewUDP(elm.addr, elm.target, elm.proxy, tunnel)
2022-11-18 14:57:33 +00:00
if err != nil {
2022-11-22 13:01:51 +00:00
log.Errorln("Start tunnel %s error: %s", elm.target, err.Error())
2022-11-18 14:57:33 +00:00
continue
}
tunnelUDPListeners[key] = l
log.Infoln("Tunnel(udp/%s) proxy %s listening at: %s", elm.target, elm.proxy, tunnelUDPListeners[key].Address())
}
}
}
func PatchInboundListeners(newListenerMap map[string]C.InboundListener, tunnel C.Tunnel, dropOld bool) {
2022-12-04 13:53:13 +00:00
inboundMux.Lock()
defer inboundMux.Unlock()
for name, newListener := range newListenerMap {
if oldListener, ok := inboundListeners[name]; ok {
if !oldListener.Config().Equal(newListener.Config()) {
_ = oldListener.Close()
} else {
continue
}
}
if err := newListener.Listen(tunnel); err != nil {
2022-12-04 13:53:13 +00:00
log.Errorln("Listener %s listen err: %s", name, err.Error())
continue
}
inboundListeners[name] = newListener
}
if dropOld {
for name, oldListener := range inboundListeners {
if _, ok := newListenerMap[name]; !ok {
_ = oldListener.Close()
delete(inboundListeners, name)
}
}
}
}
2018-11-21 05:47:46 +00:00
// GetPorts return the ports of proxy servers
func GetPorts() *Ports {
ports := &Ports{}
if httpListener != nil {
_, portStr, _ := net.SplitHostPort(httpListener.Address())
2018-11-21 05:47:46 +00:00
port, _ := strconv.Atoi(portStr)
ports.Port = port
}
if socksListener != nil {
_, portStr, _ := net.SplitHostPort(socksListener.Address())
2018-11-21 05:47:46 +00:00
port, _ := strconv.Atoi(portStr)
ports.SocksPort = port
2018-07-15 14:23:20 +00:00
}
2018-11-21 05:47:46 +00:00
if redirListener != nil {
_, portStr, _ := net.SplitHostPort(redirListener.Address())
2018-11-21 05:47:46 +00:00
port, _ := strconv.Atoi(portStr)
ports.RedirPort = port
}
if tproxyListener != nil {
_, portStr, _ := net.SplitHostPort(tproxyListener.Address())
port, _ := strconv.Atoi(portStr)
ports.TProxyPort = port
}
if mixedListener != nil {
_, portStr, _ := net.SplitHostPort(mixedListener.Address())
port, _ := strconv.Atoi(portStr)
ports.MixedPort = port
}
if shadowSocksListener != nil {
ports.ShadowSocksConfig = shadowSocksListener.Config()
}
if vmessListener != nil {
ports.VmessConfig = vmessListener.Config()
}
2018-11-21 05:47:46 +00:00
return ports
}
2018-07-15 14:23:20 +00:00
2018-11-21 05:47:46 +00:00
func portIsZero(addr string) bool {
_, port, err := net.SplitHostPort(addr)
if port == "0" || port == "" || err != nil {
return true
}
return false
2018-07-15 14:23:20 +00:00
}
func genAddr(host string, port int, allowLan bool) string {
2018-11-21 05:47:46 +00:00
if allowLan {
if host == "*" {
return fmt.Sprintf(":%d", port)
}
2021-03-23 17:00:21 +00:00
return fmt.Sprintf("%s:%d", host, port)
2018-11-21 05:47:46 +00:00
}
2018-11-21 05:47:46 +00:00
return fmt.Sprintf("127.0.0.1:%d", port)
2018-07-15 14:23:20 +00:00
}
2021-11-17 08:03:47 +00:00
func hasTunConfigChange(tunConf *LC.Tun) bool {
if LastTunConf.Enable != tunConf.Enable ||
LastTunConf.Device != tunConf.Device ||
LastTunConf.Stack != tunConf.Stack ||
LastTunConf.AutoRoute != tunConf.AutoRoute ||
LastTunConf.AutoDetectInterface != tunConf.AutoDetectInterface ||
LastTunConf.MTU != tunConf.MTU ||
LastTunConf.GSO != tunConf.GSO ||
LastTunConf.GSOMaxSize != tunConf.GSOMaxSize ||
LastTunConf.StrictRoute != tunConf.StrictRoute ||
LastTunConf.EndpointIndependentNat != tunConf.EndpointIndependentNat ||
LastTunConf.UDPTimeout != tunConf.UDPTimeout ||
LastTunConf.FileDescriptor != tunConf.FileDescriptor {
2022-05-03 11:13:37 +00:00
return true
}
if len(LastTunConf.DNSHijack) != len(tunConf.DNSHijack) {
2022-05-03 11:13:37 +00:00
return true
}
sort.Slice(tunConf.DNSHijack, func(i, j int) bool {
2022-12-06 01:04:30 +00:00
return tunConf.DNSHijack[i] < tunConf.DNSHijack[j]
2022-05-03 11:13:37 +00:00
})
sort.Slice(tunConf.Inet4Address, func(i, j int) bool {
2023-10-10 11:49:16 +00:00
return tunConf.Inet4Address[i].String() < tunConf.Inet4Address[j].String()
})
sort.Slice(tunConf.Inet6Address, func(i, j int) bool {
2023-10-10 11:49:16 +00:00
return tunConf.Inet6Address[i].String() < tunConf.Inet6Address[j].String()
})
sort.Slice(tunConf.Inet4RouteAddress, func(i, j int) bool {
2023-10-10 11:49:16 +00:00
return tunConf.Inet4RouteAddress[i].String() < tunConf.Inet4RouteAddress[j].String()
})
sort.Slice(tunConf.Inet6RouteAddress, func(i, j int) bool {
2023-10-10 11:49:16 +00:00
return tunConf.Inet6RouteAddress[i].String() < tunConf.Inet6RouteAddress[j].String()
})
2023-11-02 03:37:40 +00:00
sort.Slice(tunConf.Inet4RouteExcludeAddress, func(i, j int) bool {
return tunConf.Inet4RouteExcludeAddress[i].String() < tunConf.Inet4RouteExcludeAddress[j].String()
})
sort.Slice(tunConf.Inet6RouteExcludeAddress, func(i, j int) bool {
return tunConf.Inet6RouteExcludeAddress[i].String() < tunConf.Inet6RouteExcludeAddress[j].String()
})
sort.Slice(tunConf.IncludeInterface, func(i, j int) bool {
return tunConf.IncludeInterface[i] < tunConf.IncludeInterface[j]
})
sort.Slice(tunConf.ExcludeInterface, func(i, j int) bool {
return tunConf.ExcludeInterface[i] < tunConf.ExcludeInterface[j]
})
sort.Slice(tunConf.IncludeUID, func(i, j int) bool {
return tunConf.IncludeUID[i] < tunConf.IncludeUID[j]
})
sort.Slice(tunConf.IncludeUIDRange, func(i, j int) bool {
return tunConf.IncludeUIDRange[i] < tunConf.IncludeUIDRange[j]
})
sort.Slice(tunConf.ExcludeUID, func(i, j int) bool {
return tunConf.ExcludeUID[i] < tunConf.ExcludeUID[j]
})
sort.Slice(tunConf.ExcludeUIDRange, func(i, j int) bool {
return tunConf.ExcludeUIDRange[i] < tunConf.ExcludeUIDRange[j]
})
sort.Slice(tunConf.IncludeAndroidUser, func(i, j int) bool {
return tunConf.IncludeAndroidUser[i] < tunConf.IncludeAndroidUser[j]
})
sort.Slice(tunConf.IncludePackage, func(i, j int) bool {
return tunConf.IncludePackage[i] < tunConf.IncludePackage[j]
})
sort.Slice(tunConf.ExcludePackage, func(i, j int) bool {
return tunConf.ExcludePackage[i] < tunConf.ExcludePackage[j]
})
2022-05-03 11:13:37 +00:00
if !slices.Equal(tunConf.DNSHijack, LastTunConf.DNSHijack) ||
!slices.Equal(tunConf.Inet4Address, LastTunConf.Inet4Address) ||
!slices.Equal(tunConf.Inet6Address, LastTunConf.Inet6Address) ||
!slices.Equal(tunConf.Inet4RouteAddress, LastTunConf.Inet4RouteAddress) ||
!slices.Equal(tunConf.Inet6RouteAddress, LastTunConf.Inet6RouteAddress) ||
2023-11-02 03:37:40 +00:00
!slices.Equal(tunConf.Inet4RouteExcludeAddress, LastTunConf.Inet4RouteExcludeAddress) ||
!slices.Equal(tunConf.Inet6RouteExcludeAddress, LastTunConf.Inet6RouteExcludeAddress) ||
!slices.Equal(tunConf.IncludeInterface, LastTunConf.IncludeInterface) ||
!slices.Equal(tunConf.ExcludeInterface, LastTunConf.ExcludeInterface) ||
!slices.Equal(tunConf.IncludeUID, LastTunConf.IncludeUID) ||
!slices.Equal(tunConf.IncludeUIDRange, LastTunConf.IncludeUIDRange) ||
!slices.Equal(tunConf.ExcludeUID, LastTunConf.ExcludeUID) ||
!slices.Equal(tunConf.ExcludeUIDRange, LastTunConf.ExcludeUIDRange) ||
!slices.Equal(tunConf.IncludeAndroidUser, LastTunConf.IncludeAndroidUser) ||
!slices.Equal(tunConf.IncludePackage, LastTunConf.IncludePackage) ||
!slices.Equal(tunConf.ExcludePackage, LastTunConf.ExcludePackage) {
2022-05-03 11:13:37 +00:00
return true
}
return false
}
func closeTunListener() {
if tunLister != nil {
tunLister.Close()
tunLister = nil
2021-11-17 08:03:47 +00:00
}
}
2023-09-02 06:10:26 +00:00
func Cleanup() {
closeTunListener()
2021-11-17 08:03:47 +00:00
}