mirror of
https://github.com/SagerNet/sing-box.git
synced 2026-04-14 12:48:28 +10:00
Refactor ACME support to certificate provider
This commit is contained in:
98
protocol/tailscale/certificate_provider.go
Normal file
98
protocol/tailscale/certificate_provider.go
Normal file
@@ -0,0 +1,98 @@
|
||||
//go:build with_gvisor
|
||||
|
||||
package tailscale
|
||||
|
||||
import (
|
||||
"context"
|
||||
"crypto/tls"
|
||||
"net"
|
||||
|
||||
"github.com/sagernet/sing-box/adapter"
|
||||
"github.com/sagernet/sing-box/adapter/certificate"
|
||||
"github.com/sagernet/sing-box/common/dialer"
|
||||
C "github.com/sagernet/sing-box/constant"
|
||||
"github.com/sagernet/sing-box/log"
|
||||
"github.com/sagernet/sing-box/option"
|
||||
E "github.com/sagernet/sing/common/exceptions"
|
||||
M "github.com/sagernet/sing/common/metadata"
|
||||
N "github.com/sagernet/sing/common/network"
|
||||
"github.com/sagernet/sing/service"
|
||||
"github.com/sagernet/tailscale/client/local"
|
||||
)
|
||||
|
||||
func RegisterCertificateProvider(registry *certificate.Registry) {
|
||||
certificate.Register[option.TailscaleCertificateProviderOptions](registry, C.TypeTailscale, NewCertificateProvider)
|
||||
}
|
||||
|
||||
var _ adapter.CertificateProviderService = (*CertificateProvider)(nil)
|
||||
|
||||
type CertificateProvider struct {
|
||||
certificate.Adapter
|
||||
endpointTag string
|
||||
endpoint *Endpoint
|
||||
dialer N.Dialer
|
||||
localClient *local.Client
|
||||
}
|
||||
|
||||
func NewCertificateProvider(ctx context.Context, _ log.ContextLogger, tag string, options option.TailscaleCertificateProviderOptions) (adapter.CertificateProviderService, error) {
|
||||
if options.Endpoint == "" {
|
||||
return nil, E.New("missing tailscale endpoint tag")
|
||||
}
|
||||
endpointManager := service.FromContext[adapter.EndpointManager](ctx)
|
||||
if endpointManager == nil {
|
||||
return nil, E.New("missing endpoint manager in context")
|
||||
}
|
||||
rawEndpoint, loaded := endpointManager.Get(options.Endpoint)
|
||||
if !loaded {
|
||||
return nil, E.New("endpoint not found: ", options.Endpoint)
|
||||
}
|
||||
endpoint, isTailscale := rawEndpoint.(*Endpoint)
|
||||
if !isTailscale {
|
||||
return nil, E.New("endpoint is not Tailscale: ", options.Endpoint)
|
||||
}
|
||||
providerDialer, err := dialer.NewWithOptions(dialer.Options{
|
||||
Context: ctx,
|
||||
Options: option.DialerOptions{},
|
||||
RemoteIsDomain: true,
|
||||
})
|
||||
if err != nil {
|
||||
return nil, E.Cause(err, "create tailscale certificate provider dialer")
|
||||
}
|
||||
return &CertificateProvider{
|
||||
Adapter: certificate.NewAdapter(C.TypeTailscale, tag),
|
||||
endpointTag: options.Endpoint,
|
||||
endpoint: endpoint,
|
||||
dialer: providerDialer,
|
||||
}, nil
|
||||
}
|
||||
|
||||
func (p *CertificateProvider) Start(stage adapter.StartStage) error {
|
||||
if stage != adapter.StartStateStart {
|
||||
return nil
|
||||
}
|
||||
localClient, err := p.endpoint.Server().LocalClient()
|
||||
if err != nil {
|
||||
return E.Cause(err, "initialize tailscale local client for endpoint ", p.endpointTag)
|
||||
}
|
||||
originalDial := localClient.Dial
|
||||
localClient.Dial = func(ctx context.Context, network, addr string) (net.Conn, error) {
|
||||
if originalDial != nil && addr == "local-tailscaled.sock:80" {
|
||||
return originalDial(ctx, network, addr)
|
||||
}
|
||||
return p.dialer.DialContext(ctx, network, M.ParseSocksaddr(addr))
|
||||
}
|
||||
p.localClient = localClient
|
||||
return nil
|
||||
}
|
||||
|
||||
func (p *CertificateProvider) Close() error {
|
||||
return nil
|
||||
}
|
||||
|
||||
func (p *CertificateProvider) GetCertificate(clientHello *tls.ClientHelloInfo) (*tls.Certificate, error) {
|
||||
localClient := p.localClient
|
||||
if localClient == nil {
|
||||
return nil, E.New("Tailscale is not ready yet")
|
||||
}
|
||||
return localClient.GetCertificate(clientHello)
|
||||
}
|
||||
Reference in New Issue
Block a user