Files
sing-box-extended/protocol/warp/endpoint.go
2026-05-02 14:54:26 +03:00

228 lines
6.5 KiB
Go

package warp
import (
"context"
"encoding/json"
"math/rand"
"net"
"net/netip"
"strings"
"time"
"github.com/sagernet/sing-box/adapter"
"github.com/sagernet/sing-box/adapter/endpoint"
"github.com/sagernet/sing-box/common/cloudflare"
C "github.com/sagernet/sing-box/constant"
"github.com/sagernet/sing-box/log"
"github.com/sagernet/sing-box/option"
"github.com/sagernet/sing-box/protocol/wireguard"
"github.com/sagernet/sing/common"
E "github.com/sagernet/sing/common/exceptions"
"github.com/sagernet/sing/common/json/badoption"
M "github.com/sagernet/sing/common/metadata"
N "github.com/sagernet/sing/common/network"
"github.com/sagernet/sing/service"
"golang.zx2c4.com/wireguard/wgctrl/wgtypes"
)
func RegisterEndpoint(registry *endpoint.Registry) {
endpoint.Register[option.WARPEndpointOptions](registry, C.TypeWARP, NewEndpoint)
}
type Endpoint struct {
endpoint.Adapter
ctx context.Context
options option.WARPEndpointOptions
endpoint adapter.Endpoint
startHandler func()
await chan struct{}
}
func NewEndpoint(ctx context.Context, router adapter.Router, logger log.ContextLogger, tag string, options option.WARPEndpointOptions) (adapter.Endpoint, error) {
var dependencies []string
if options.Detour != "" {
dependencies = append(dependencies, options.Detour)
}
if options.Profile.Detour != "" {
dependencies = append(dependencies, options.Profile.Detour)
}
endpoint := &Endpoint{
Adapter: endpoint.NewAdapter(C.TypeWARP, tag, []string{N.NetworkTCP, N.NetworkUDP}, dependencies),
ctx: ctx,
options: options,
await: make(chan struct{}),
}
endpoint.startHandler = func() {
defer close(endpoint.await)
cacheFile := service.FromContext[adapter.CacheFile](ctx)
var config *Config
var err error
if !options.Profile.Recreate && cacheFile != nil && cacheFile.StoreWARPConfig() {
savedProfile := cacheFile.LoadWARPConfig(tag)
if savedProfile != nil {
if err = json.Unmarshal(savedProfile.Content, &config); err != nil {
logger.ErrorContext(ctx, err)
return
}
}
}
if config == nil {
config, err = endpoint.createConfig()
if err != nil {
logger.ErrorContext(ctx, err)
return
}
if cacheFile != nil && cacheFile.StoreWARPConfig() {
content, err := json.Marshal(config)
if err != nil {
logger.ErrorContext(ctx, err)
return
}
cacheFile.SaveWARPConfig(tag, &adapter.SavedBinary{
LastUpdated: time.Now(),
Content: content,
LastEtag: "",
})
}
}
peer := config.Peers[0]
hostParts := strings.Split(peer.Endpoint.Host, ":")
endpoint.endpoint, err = wireguard.NewEndpoint(
ctx,
router,
logger,
tag,
option.WireGuardEndpointOptions{
System: options.System,
Name: options.Name,
ListenPort: options.ListenPort,
UDPTimeout: options.UDPTimeout,
Workers: options.Workers,
PreallocatedBuffersPerPool: options.PreallocatedBuffersPerPool,
DisablePauses: options.DisablePauses,
Amnezia: options.Amnezia,
DialerOptions: options.DialerOptions,
Address: badoption.Listable[netip.Prefix]{
netip.MustParsePrefix(config.Interface.Addresses.V4 + "/32"),
netip.MustParsePrefix(config.Interface.Addresses.V6 + "/128"),
},
PrivateKey: config.PrivateKey,
Peers: []option.WireGuardPeer{
{
Address: hostParts[0],
Port: uint16(peer.Endpoint.Ports[rand.Intn(len(peer.Endpoint.Ports))]),
PublicKey: peer.PublicKey,
AllowedIPs: badoption.Listable[netip.Prefix]{
netip.MustParsePrefix("0.0.0.0/0"),
netip.MustParsePrefix("::/0"),
},
PersistentKeepaliveInterval: options.PersistentKeepaliveInterval,
Reserved: options.Reserved,
},
},
MTU: 1280,
},
)
if err != nil {
logger.ErrorContext(ctx, err)
return
}
if err = endpoint.endpoint.Start(adapter.StartStateStart); err != nil {
logger.ErrorContext(ctx, err)
return
}
if err = endpoint.endpoint.Start(adapter.StartStatePostStart); err != nil {
logger.ErrorContext(ctx, err)
return
}
}
return endpoint, nil
}
func (w *Endpoint) Start(stage adapter.StartStage) error {
if stage != adapter.StartStatePostStart {
return nil
}
go w.startHandler()
return nil
}
func (w *Endpoint) Close() error {
if err := w.isEndpointInitialized(w.ctx); err != nil {
return err
}
return common.Close(w.endpoint)
}
func (w *Endpoint) DialContext(ctx context.Context, network string, destination M.Socksaddr) (net.Conn, error) {
if err := w.isEndpointInitialized(ctx); err != nil {
return nil, err
}
return w.endpoint.DialContext(ctx, network, destination)
}
func (w *Endpoint) ListenPacket(ctx context.Context, destination M.Socksaddr) (net.PacketConn, error) {
if err := w.isEndpointInitialized(ctx); err != nil {
return nil, err
}
return w.endpoint.ListenPacket(ctx, destination)
}
func (w *Endpoint) isEndpointInitialized(ctx context.Context) error {
select {
case <-w.await:
case <-ctx.Done():
return ctx.Err()
}
if w.endpoint == nil {
return E.New("endpoint not initialized")
}
return nil
}
func (w *Endpoint) createConfig() (*Config, error) {
opts := make([]cloudflare.CloudflareApiOption, 0, 1)
if w.options.Profile.Detour != "" {
detour, ok := service.FromContext[adapter.OutboundManager](w.ctx).Outbound(w.options.Profile.Detour)
if !ok {
return nil, E.New("outbound detour not found: ", w.options.Profile.Detour)
}
opts = append(opts, cloudflare.WithDialContext(func(ctx context.Context, network, addr string) (net.Conn, error) {
return detour.DialContext(ctx, network, M.ParseSocksaddr(addr))
}))
}
var privateKey wgtypes.Key
var err error
if w.options.Profile.PrivateKey != "" {
privateKey, err = wgtypes.ParseKey(w.options.Profile.PrivateKey)
if err != nil {
return nil, err
}
} else {
privateKey, err = wgtypes.GeneratePrivateKey()
if err != nil {
return nil, err
}
}
api := cloudflare.NewCloudflareApi(opts...)
var profile *cloudflare.CloudflareProfile
if w.options.Profile.AuthToken != "" && w.options.Profile.ID != "" {
profile, err = api.GetProfile(w.ctx, w.options.Profile.AuthToken, w.options.Profile.ID)
if err != nil {
return nil, err
}
} else {
profile, err = api.CreateProfile(w.ctx, privateKey.PublicKey().String())
if err != nil {
return nil, err
}
}
return &Config{
PrivateKey: privateKey.String(),
Interface: profile.Config.Interface,
Peers: profile.Config.Peers,
}, nil
}