mirror of
https://github.com/SagerNet/sing-box.git
synced 2026-04-13 20:28:32 +10:00
99 lines
3.0 KiB
Go
99 lines
3.0 KiB
Go
//go:build with_gvisor
|
|
|
|
package tailscale
|
|
|
|
import (
|
|
"context"
|
|
"crypto/tls"
|
|
"net"
|
|
|
|
"github.com/sagernet/sing-box/adapter"
|
|
"github.com/sagernet/sing-box/adapter/certificate"
|
|
"github.com/sagernet/sing-box/common/dialer"
|
|
C "github.com/sagernet/sing-box/constant"
|
|
"github.com/sagernet/sing-box/log"
|
|
"github.com/sagernet/sing-box/option"
|
|
E "github.com/sagernet/sing/common/exceptions"
|
|
M "github.com/sagernet/sing/common/metadata"
|
|
N "github.com/sagernet/sing/common/network"
|
|
"github.com/sagernet/sing/service"
|
|
"github.com/sagernet/tailscale/client/local"
|
|
)
|
|
|
|
func RegisterCertificateProvider(registry *certificate.Registry) {
|
|
certificate.Register[option.TailscaleCertificateProviderOptions](registry, C.TypeTailscale, NewCertificateProvider)
|
|
}
|
|
|
|
var _ adapter.CertificateProviderService = (*CertificateProvider)(nil)
|
|
|
|
type CertificateProvider struct {
|
|
certificate.Adapter
|
|
endpointTag string
|
|
endpoint *Endpoint
|
|
dialer N.Dialer
|
|
localClient *local.Client
|
|
}
|
|
|
|
func NewCertificateProvider(ctx context.Context, _ log.ContextLogger, tag string, options option.TailscaleCertificateProviderOptions) (adapter.CertificateProviderService, error) {
|
|
if options.Endpoint == "" {
|
|
return nil, E.New("missing tailscale endpoint tag")
|
|
}
|
|
endpointManager := service.FromContext[adapter.EndpointManager](ctx)
|
|
if endpointManager == nil {
|
|
return nil, E.New("missing endpoint manager in context")
|
|
}
|
|
rawEndpoint, loaded := endpointManager.Get(options.Endpoint)
|
|
if !loaded {
|
|
return nil, E.New("endpoint not found: ", options.Endpoint)
|
|
}
|
|
endpoint, isTailscale := rawEndpoint.(*Endpoint)
|
|
if !isTailscale {
|
|
return nil, E.New("endpoint is not Tailscale: ", options.Endpoint)
|
|
}
|
|
providerDialer, err := dialer.NewWithOptions(dialer.Options{
|
|
Context: ctx,
|
|
Options: option.DialerOptions{},
|
|
RemoteIsDomain: true,
|
|
})
|
|
if err != nil {
|
|
return nil, E.Cause(err, "create tailscale certificate provider dialer")
|
|
}
|
|
return &CertificateProvider{
|
|
Adapter: certificate.NewAdapter(C.TypeTailscale, tag),
|
|
endpointTag: options.Endpoint,
|
|
endpoint: endpoint,
|
|
dialer: providerDialer,
|
|
}, nil
|
|
}
|
|
|
|
func (p *CertificateProvider) Start(stage adapter.StartStage) error {
|
|
if stage != adapter.StartStateStart {
|
|
return nil
|
|
}
|
|
localClient, err := p.endpoint.Server().LocalClient()
|
|
if err != nil {
|
|
return E.Cause(err, "initialize tailscale local client for endpoint ", p.endpointTag)
|
|
}
|
|
originalDial := localClient.Dial
|
|
localClient.Dial = func(ctx context.Context, network, addr string) (net.Conn, error) {
|
|
if originalDial != nil && addr == "local-tailscaled.sock:80" {
|
|
return originalDial(ctx, network, addr)
|
|
}
|
|
return p.dialer.DialContext(ctx, network, M.ParseSocksaddr(addr))
|
|
}
|
|
p.localClient = localClient
|
|
return nil
|
|
}
|
|
|
|
func (p *CertificateProvider) Close() error {
|
|
return nil
|
|
}
|
|
|
|
func (p *CertificateProvider) GetCertificate(clientHello *tls.ClientHelloInfo) (*tls.Certificate, error) {
|
|
localClient := p.localClient
|
|
if localClient == nil {
|
|
return nil, E.New("Tailscale is not ready yet")
|
|
}
|
|
return localClient.GetCertificate(clientHello)
|
|
}
|