github.com/kelleygo/clashcore@v1.0.2/listener/listener.go (about) 1 package listener 2 3 import ( 4 "fmt" 5 "golang.org/x/exp/slices" 6 "net" 7 "sort" 8 "strconv" 9 "strings" 10 "sync" 11 12 "github.com/kelleygo/clashcore/component/ebpf" 13 C "github.com/kelleygo/clashcore/constant" 14 "github.com/kelleygo/clashcore/listener/autoredir" 15 LC "github.com/kelleygo/clashcore/listener/config" 16 "github.com/kelleygo/clashcore/listener/http" 17 "github.com/kelleygo/clashcore/listener/mixed" 18 "github.com/kelleygo/clashcore/listener/redir" 19 embedSS "github.com/kelleygo/clashcore/listener/shadowsocks" 20 "github.com/kelleygo/clashcore/listener/sing_shadowsocks" 21 "github.com/kelleygo/clashcore/listener/sing_tun" 22 "github.com/kelleygo/clashcore/listener/sing_vmess" 23 "github.com/kelleygo/clashcore/listener/socks" 24 "github.com/kelleygo/clashcore/listener/tproxy" 25 "github.com/kelleygo/clashcore/listener/tuic" 26 LT "github.com/kelleygo/clashcore/listener/tunnel" 27 "github.com/kelleygo/clashcore/log" 28 29 "github.com/samber/lo" 30 ) 31 32 var ( 33 allowLan = false 34 bindAddress = "*" 35 36 socksListener *socks.Listener 37 socksUDPListener *socks.UDPListener 38 httpListener *http.Listener 39 redirListener *redir.Listener 40 redirUDPListener *tproxy.UDPListener 41 tproxyListener *tproxy.Listener 42 tproxyUDPListener *tproxy.UDPListener 43 mixedListener *mixed.Listener 44 mixedUDPLister *socks.UDPListener 45 tunnelTCPListeners = map[string]*LT.Listener{} 46 tunnelUDPListeners = map[string]*LT.PacketConn{} 47 inboundListeners = map[string]C.InboundListener{} 48 tunLister *sing_tun.Listener 49 shadowSocksListener C.MultiAddrListener 50 vmessListener *sing_vmess.Listener 51 tuicListener *tuic.Listener 52 autoRedirListener *autoredir.Listener 53 autoRedirProgram *ebpf.TcEBpfProgram 54 tcProgram *ebpf.TcEBpfProgram 55 56 // lock for recreate function 57 socksMux sync.Mutex 58 httpMux sync.Mutex 59 redirMux sync.Mutex 60 tproxyMux sync.Mutex 61 mixedMux sync.Mutex 62 tunnelMux sync.Mutex 63 inboundMux sync.Mutex 64 tunMux sync.Mutex 65 ssMux sync.Mutex 66 vmessMux sync.Mutex 67 tuicMux sync.Mutex 68 autoRedirMux sync.Mutex 69 tcMux sync.Mutex 70 71 LastTunConf LC.Tun 72 LastTuicConf LC.TuicServer 73 ) 74 75 type Ports struct { 76 Port int `json:"port"` 77 SocksPort int `json:"socks-port"` 78 RedirPort int `json:"redir-port"` 79 TProxyPort int `json:"tproxy-port"` 80 MixedPort int `json:"mixed-port"` 81 ShadowSocksConfig string `json:"ss-config"` 82 VmessConfig string `json:"vmess-config"` 83 } 84 85 func GetTunConf() LC.Tun { 86 if tunLister == nil { 87 return LastTunConf 88 } 89 return tunLister.Config() 90 } 91 92 func GetTuicConf() LC.TuicServer { 93 if tuicListener == nil { 94 return LC.TuicServer{Enable: false} 95 } 96 return tuicListener.Config() 97 } 98 99 func AllowLan() bool { 100 return allowLan 101 } 102 103 func BindAddress() string { 104 return bindAddress 105 } 106 107 func SetAllowLan(al bool) { 108 allowLan = al 109 } 110 111 func SetBindAddress(host string) { 112 bindAddress = host 113 } 114 115 func ReCreateHTTP(port int, tunnel C.Tunnel) { 116 httpMux.Lock() 117 defer httpMux.Unlock() 118 119 var err error 120 defer func() { 121 if err != nil { 122 log.Errorln("Start HTTP server error: %s", err.Error()) 123 } 124 }() 125 126 addr := genAddr(bindAddress, port, allowLan) 127 128 if httpListener != nil { 129 if httpListener.RawAddress() == addr { 130 return 131 } 132 httpListener.Close() 133 httpListener = nil 134 } 135 136 if portIsZero(addr) { 137 return 138 } 139 140 httpListener, err = http.New(addr, tunnel) 141 if err != nil { 142 log.Errorln("Start HTTP server error: %s", err.Error()) 143 return 144 } 145 146 log.Infoln("HTTP proxy listening at: %s", httpListener.Address()) 147 } 148 149 func ReCreateSocks(port int, tunnel C.Tunnel) { 150 socksMux.Lock() 151 defer socksMux.Unlock() 152 153 var err error 154 defer func() { 155 if err != nil { 156 log.Errorln("Start SOCKS server error: %s", err.Error()) 157 } 158 }() 159 160 addr := genAddr(bindAddress, port, allowLan) 161 162 shouldTCPIgnore := false 163 shouldUDPIgnore := false 164 165 if socksListener != nil { 166 if socksListener.RawAddress() != addr { 167 socksListener.Close() 168 socksListener = nil 169 } else { 170 shouldTCPIgnore = true 171 } 172 } 173 174 if socksUDPListener != nil { 175 if socksUDPListener.RawAddress() != addr { 176 socksUDPListener.Close() 177 socksUDPListener = nil 178 } else { 179 shouldUDPIgnore = true 180 } 181 } 182 183 if shouldTCPIgnore && shouldUDPIgnore { 184 return 185 } 186 187 if portIsZero(addr) { 188 return 189 } 190 191 tcpListener, err := socks.New(addr, tunnel) 192 if err != nil { 193 return 194 } 195 196 udpListener, err := socks.NewUDP(addr, tunnel) 197 if err != nil { 198 tcpListener.Close() 199 return 200 } 201 202 socksListener = tcpListener 203 socksUDPListener = udpListener 204 205 log.Infoln("SOCKS proxy listening at: %s", socksListener.Address()) 206 } 207 208 func ReCreateRedir(port int, tunnel C.Tunnel) { 209 redirMux.Lock() 210 defer redirMux.Unlock() 211 212 var err error 213 defer func() { 214 if err != nil { 215 log.Errorln("Start Redir server error: %s", err.Error()) 216 } 217 }() 218 219 addr := genAddr(bindAddress, port, allowLan) 220 221 if redirListener != nil { 222 if redirListener.RawAddress() == addr { 223 return 224 } 225 redirListener.Close() 226 redirListener = nil 227 } 228 229 if redirUDPListener != nil { 230 if redirUDPListener.RawAddress() == addr { 231 return 232 } 233 redirUDPListener.Close() 234 redirUDPListener = nil 235 } 236 237 if portIsZero(addr) { 238 return 239 } 240 241 redirListener, err = redir.New(addr, tunnel) 242 if err != nil { 243 return 244 } 245 246 redirUDPListener, err = tproxy.NewUDP(addr, tunnel) 247 if err != nil { 248 log.Warnln("Failed to start Redir UDP Listener: %s", err) 249 } 250 251 log.Infoln("Redirect proxy listening at: %s", redirListener.Address()) 252 } 253 254 func ReCreateShadowSocks(shadowSocksConfig string, tunnel C.Tunnel) { 255 ssMux.Lock() 256 defer ssMux.Unlock() 257 258 var err error 259 defer func() { 260 if err != nil { 261 log.Errorln("Start ShadowSocks server error: %s", err.Error()) 262 } 263 }() 264 265 var ssConfig LC.ShadowsocksServer 266 if addr, cipher, password, err := embedSS.ParseSSURL(shadowSocksConfig); err == nil { 267 ssConfig = LC.ShadowsocksServer{ 268 Enable: len(shadowSocksConfig) > 0, 269 Listen: addr, 270 Password: password, 271 Cipher: cipher, 272 Udp: true, 273 } 274 } 275 276 shouldIgnore := false 277 278 if shadowSocksListener != nil { 279 if shadowSocksListener.Config() != ssConfig.String() { 280 shadowSocksListener.Close() 281 shadowSocksListener = nil 282 } else { 283 shouldIgnore = true 284 } 285 } 286 287 if shouldIgnore { 288 return 289 } 290 291 if !ssConfig.Enable { 292 return 293 } 294 295 listener, err := sing_shadowsocks.New(ssConfig, tunnel) 296 if err != nil { 297 return 298 } 299 300 shadowSocksListener = listener 301 302 for _, addr := range shadowSocksListener.AddrList() { 303 log.Infoln("ShadowSocks proxy listening at: %s", addr.String()) 304 } 305 return 306 } 307 308 func ReCreateVmess(vmessConfig string, tunnel C.Tunnel) { 309 vmessMux.Lock() 310 defer vmessMux.Unlock() 311 312 var err error 313 defer func() { 314 if err != nil { 315 log.Errorln("Start Vmess server error: %s", err.Error()) 316 } 317 }() 318 319 var vsConfig LC.VmessServer 320 if addr, username, password, err := sing_vmess.ParseVmessURL(vmessConfig); err == nil { 321 vsConfig = LC.VmessServer{ 322 Enable: len(vmessConfig) > 0, 323 Listen: addr, 324 Users: []LC.VmessUser{{Username: username, UUID: password, AlterID: 1}}, 325 } 326 } 327 328 shouldIgnore := false 329 330 if vmessListener != nil { 331 if vmessListener.Config() != vsConfig.String() { 332 vmessListener.Close() 333 vmessListener = nil 334 } else { 335 shouldIgnore = true 336 } 337 } 338 339 if shouldIgnore { 340 return 341 } 342 343 if !vsConfig.Enable { 344 return 345 } 346 347 listener, err := sing_vmess.New(vsConfig, tunnel) 348 if err != nil { 349 return 350 } 351 352 vmessListener = listener 353 354 for _, addr := range vmessListener.AddrList() { 355 log.Infoln("Vmess proxy listening at: %s", addr.String()) 356 } 357 return 358 } 359 360 func ReCreateTuic(config LC.TuicServer, tunnel C.Tunnel) { 361 tuicMux.Lock() 362 defer func() { 363 LastTuicConf = config 364 tuicMux.Unlock() 365 }() 366 shouldIgnore := false 367 368 var err error 369 defer func() { 370 if err != nil { 371 log.Errorln("Start Tuic server error: %s", err.Error()) 372 } 373 }() 374 375 if tuicListener != nil { 376 if tuicListener.Config().String() != config.String() { 377 tuicListener.Close() 378 tuicListener = nil 379 } else { 380 shouldIgnore = true 381 } 382 } 383 384 if shouldIgnore { 385 return 386 } 387 388 if !config.Enable { 389 return 390 } 391 392 listener, err := tuic.New(config, tunnel) 393 if err != nil { 394 return 395 } 396 397 tuicListener = listener 398 399 for _, addr := range tuicListener.AddrList() { 400 log.Infoln("Tuic proxy listening at: %s", addr.String()) 401 } 402 return 403 } 404 405 func ReCreateTProxy(port int, tunnel C.Tunnel) { 406 tproxyMux.Lock() 407 defer tproxyMux.Unlock() 408 409 var err error 410 defer func() { 411 if err != nil { 412 log.Errorln("Start TProxy server error: %s", err.Error()) 413 } 414 }() 415 416 addr := genAddr(bindAddress, port, allowLan) 417 418 if tproxyListener != nil { 419 if tproxyListener.RawAddress() == addr { 420 return 421 } 422 tproxyListener.Close() 423 tproxyListener = nil 424 } 425 426 if tproxyUDPListener != nil { 427 if tproxyUDPListener.RawAddress() == addr { 428 return 429 } 430 tproxyUDPListener.Close() 431 tproxyUDPListener = nil 432 } 433 434 if portIsZero(addr) { 435 return 436 } 437 438 tproxyListener, err = tproxy.New(addr, tunnel) 439 if err != nil { 440 return 441 } 442 443 tproxyUDPListener, err = tproxy.NewUDP(addr, tunnel) 444 if err != nil { 445 log.Warnln("Failed to start TProxy UDP Listener: %s", err) 446 } 447 448 log.Infoln("TProxy server listening at: %s", tproxyListener.Address()) 449 } 450 451 func ReCreateMixed(port int, tunnel C.Tunnel) { 452 mixedMux.Lock() 453 defer mixedMux.Unlock() 454 455 var err error 456 defer func() { 457 if err != nil { 458 log.Errorln("Start Mixed(http+socks) server error: %s", err.Error()) 459 } 460 }() 461 462 addr := genAddr(bindAddress, port, allowLan) 463 464 shouldTCPIgnore := false 465 shouldUDPIgnore := false 466 467 if mixedListener != nil { 468 if mixedListener.RawAddress() != addr { 469 mixedListener.Close() 470 mixedListener = nil 471 } else { 472 shouldTCPIgnore = true 473 } 474 } 475 if mixedUDPLister != nil { 476 if mixedUDPLister.RawAddress() != addr { 477 mixedUDPLister.Close() 478 mixedUDPLister = nil 479 } else { 480 shouldUDPIgnore = true 481 } 482 } 483 484 if shouldTCPIgnore && shouldUDPIgnore { 485 return 486 } 487 488 if portIsZero(addr) { 489 return 490 } 491 492 mixedListener, err = mixed.New(addr, tunnel) 493 if err != nil { 494 return 495 } 496 497 mixedUDPLister, err = socks.NewUDP(addr, tunnel) 498 if err != nil { 499 mixedListener.Close() 500 return 501 } 502 503 log.Infoln("Mixed(http+socks) proxy listening at: %s", mixedListener.Address()) 504 } 505 506 func ReCreateTun(tunConf LC.Tun, tunnel C.Tunnel) { 507 tunMux.Lock() 508 defer func() { 509 LastTunConf = tunConf 510 tunMux.Unlock() 511 }() 512 513 var err error 514 defer func() { 515 if err != nil { 516 log.Errorln("Start TUN listening error: %s", err.Error()) 517 tunConf.Enable = false 518 } 519 }() 520 521 if !hasTunConfigChange(&tunConf) { 522 if tunLister != nil { 523 tunLister.FlushDefaultInterface() 524 } 525 return 526 } 527 528 closeTunListener() 529 530 if !tunConf.Enable { 531 return 532 } 533 534 lister, err := sing_tun.New(tunConf, tunnel) 535 if err != nil { 536 return 537 } 538 tunLister = lister 539 540 log.Infoln("[TUN] Tun adapter listening at: %s", tunLister.Address()) 541 } 542 543 func ReCreateRedirToTun(ifaceNames []string) { 544 tcMux.Lock() 545 defer tcMux.Unlock() 546 547 nicArr := ifaceNames 548 slices.Sort(nicArr) 549 nicArr = slices.Compact(nicArr) 550 551 if tcProgram != nil { 552 tcProgram.Close() 553 tcProgram = nil 554 } 555 556 if len(nicArr) == 0 { 557 return 558 } 559 560 tunConf := GetTunConf() 561 562 if !tunConf.Enable { 563 return 564 } 565 566 program, err := ebpf.NewTcEBpfProgram(nicArr, tunConf.Device) 567 if err != nil { 568 log.Errorln("Attached tc ebpf program error: %v", err) 569 return 570 } 571 tcProgram = program 572 573 log.Infoln("Attached tc ebpf program to interfaces %v", tcProgram.RawNICs()) 574 } 575 576 func ReCreateAutoRedir(ifaceNames []string, tunnel C.Tunnel) { 577 autoRedirMux.Lock() 578 defer autoRedirMux.Unlock() 579 580 var err error 581 defer func() { 582 if err != nil { 583 if autoRedirListener != nil { 584 _ = autoRedirListener.Close() 585 autoRedirListener = nil 586 } 587 if autoRedirProgram != nil { 588 autoRedirProgram.Close() 589 autoRedirProgram = nil 590 } 591 log.Errorln("Start auto redirect server error: %s", err.Error()) 592 } 593 }() 594 595 nicArr := ifaceNames 596 slices.Sort(nicArr) 597 nicArr = slices.Compact(nicArr) 598 599 if autoRedirListener != nil && autoRedirProgram != nil { 600 _ = autoRedirListener.Close() 601 autoRedirProgram.Close() 602 autoRedirListener = nil 603 autoRedirProgram = nil 604 } 605 606 if len(nicArr) == 0 { 607 return 608 } 609 610 defaultRouteInterfaceName, err := ebpf.GetAutoDetectInterface() 611 if err != nil { 612 return 613 } 614 615 addr := genAddr("*", C.TcpAutoRedirPort, true) 616 617 autoRedirListener, err = autoredir.New(addr, tunnel) 618 if err != nil { 619 return 620 } 621 622 autoRedirProgram, err = ebpf.NewRedirEBpfProgram(nicArr, autoRedirListener.TCPAddr().Port(), defaultRouteInterfaceName) 623 if err != nil { 624 return 625 } 626 627 autoRedirListener.SetLookupFunc(autoRedirProgram.Lookup) 628 629 log.Infoln("Auto redirect proxy listening at: %s, attached tc ebpf program to interfaces %v", autoRedirListener.Address(), autoRedirProgram.RawNICs()) 630 } 631 632 func PatchTunnel(tunnels []LC.Tunnel, tunnel C.Tunnel) { 633 tunnelMux.Lock() 634 defer tunnelMux.Unlock() 635 636 type addrProxy struct { 637 network string 638 addr string 639 target string 640 proxy string 641 } 642 643 tcpOld := lo.Map( 644 lo.Keys(tunnelTCPListeners), 645 func(key string, _ int) addrProxy { 646 parts := strings.Split(key, "/") 647 return addrProxy{ 648 network: "tcp", 649 addr: parts[0], 650 target: parts[1], 651 proxy: parts[2], 652 } 653 }, 654 ) 655 udpOld := lo.Map( 656 lo.Keys(tunnelUDPListeners), 657 func(key string, _ int) addrProxy { 658 parts := strings.Split(key, "/") 659 return addrProxy{ 660 network: "udp", 661 addr: parts[0], 662 target: parts[1], 663 proxy: parts[2], 664 } 665 }, 666 ) 667 oldElm := lo.Union(tcpOld, udpOld) 668 669 newElm := lo.FlatMap( 670 tunnels, 671 func(tunnel LC.Tunnel, _ int) []addrProxy { 672 return lo.Map( 673 tunnel.Network, 674 func(network string, _ int) addrProxy { 675 return addrProxy{ 676 network: network, 677 addr: tunnel.Address, 678 target: tunnel.Target, 679 proxy: tunnel.Proxy, 680 } 681 }, 682 ) 683 }, 684 ) 685 686 needClose, needCreate := lo.Difference(oldElm, newElm) 687 688 for _, elm := range needClose { 689 key := fmt.Sprintf("%s/%s/%s", elm.addr, elm.target, elm.proxy) 690 if elm.network == "tcp" { 691 tunnelTCPListeners[key].Close() 692 delete(tunnelTCPListeners, key) 693 } else { 694 tunnelUDPListeners[key].Close() 695 delete(tunnelUDPListeners, key) 696 } 697 } 698 699 for _, elm := range needCreate { 700 key := fmt.Sprintf("%s/%s/%s", elm.addr, elm.target, elm.proxy) 701 if elm.network == "tcp" { 702 l, err := LT.New(elm.addr, elm.target, elm.proxy, tunnel) 703 if err != nil { 704 log.Errorln("Start tunnel %s error: %s", elm.target, err.Error()) 705 continue 706 } 707 tunnelTCPListeners[key] = l 708 log.Infoln("Tunnel(tcp/%s) proxy %s listening at: %s", elm.target, elm.proxy, tunnelTCPListeners[key].Address()) 709 } else { 710 l, err := LT.NewUDP(elm.addr, elm.target, elm.proxy, tunnel) 711 if err != nil { 712 log.Errorln("Start tunnel %s error: %s", elm.target, err.Error()) 713 continue 714 } 715 tunnelUDPListeners[key] = l 716 log.Infoln("Tunnel(udp/%s) proxy %s listening at: %s", elm.target, elm.proxy, tunnelUDPListeners[key].Address()) 717 } 718 } 719 } 720 721 func PatchInboundListeners(newListenerMap map[string]C.InboundListener, tunnel C.Tunnel, dropOld bool) { 722 inboundMux.Lock() 723 defer inboundMux.Unlock() 724 725 for name, newListener := range newListenerMap { 726 if oldListener, ok := inboundListeners[name]; ok { 727 if !oldListener.Config().Equal(newListener.Config()) { 728 _ = oldListener.Close() 729 } else { 730 continue 731 } 732 } 733 if err := newListener.Listen(tunnel); err != nil { 734 log.Errorln("Listener %s listen err: %s", name, err.Error()) 735 continue 736 } 737 inboundListeners[name] = newListener 738 } 739 740 if dropOld { 741 for name, oldListener := range inboundListeners { 742 if _, ok := newListenerMap[name]; !ok { 743 _ = oldListener.Close() 744 delete(inboundListeners, name) 745 } 746 } 747 } 748 } 749 750 // GetPorts return the ports of proxy servers 751 func GetPorts() *Ports { 752 ports := &Ports{} 753 754 if httpListener != nil { 755 _, portStr, _ := net.SplitHostPort(httpListener.Address()) 756 port, _ := strconv.Atoi(portStr) 757 ports.Port = port 758 } 759 760 if socksListener != nil { 761 _, portStr, _ := net.SplitHostPort(socksListener.Address()) 762 port, _ := strconv.Atoi(portStr) 763 ports.SocksPort = port 764 } 765 766 if redirListener != nil { 767 _, portStr, _ := net.SplitHostPort(redirListener.Address()) 768 port, _ := strconv.Atoi(portStr) 769 ports.RedirPort = port 770 } 771 772 if tproxyListener != nil { 773 _, portStr, _ := net.SplitHostPort(tproxyListener.Address()) 774 port, _ := strconv.Atoi(portStr) 775 ports.TProxyPort = port 776 } 777 778 if mixedListener != nil { 779 _, portStr, _ := net.SplitHostPort(mixedListener.Address()) 780 port, _ := strconv.Atoi(portStr) 781 ports.MixedPort = port 782 } 783 784 if shadowSocksListener != nil { 785 ports.ShadowSocksConfig = shadowSocksListener.Config() 786 } 787 788 if vmessListener != nil { 789 ports.VmessConfig = vmessListener.Config() 790 } 791 792 return ports 793 } 794 795 func portIsZero(addr string) bool { 796 _, port, err := net.SplitHostPort(addr) 797 if port == "0" || port == "" || err != nil { 798 return true 799 } 800 return false 801 } 802 803 func genAddr(host string, port int, allowLan bool) string { 804 if allowLan { 805 if host == "*" { 806 return fmt.Sprintf(":%d", port) 807 } 808 return fmt.Sprintf("%s:%d", host, port) 809 } 810 811 return fmt.Sprintf("127.0.0.1:%d", port) 812 } 813 814 func hasTunConfigChange(tunConf *LC.Tun) bool { 815 if LastTunConf.Enable != tunConf.Enable || 816 LastTunConf.Device != tunConf.Device || 817 LastTunConf.Stack != tunConf.Stack || 818 LastTunConf.AutoRoute != tunConf.AutoRoute || 819 LastTunConf.AutoDetectInterface != tunConf.AutoDetectInterface || 820 LastTunConf.MTU != tunConf.MTU || 821 LastTunConf.GSO != tunConf.GSO || 822 LastTunConf.GSOMaxSize != tunConf.GSOMaxSize || 823 LastTunConf.StrictRoute != tunConf.StrictRoute || 824 LastTunConf.EndpointIndependentNat != tunConf.EndpointIndependentNat || 825 LastTunConf.UDPTimeout != tunConf.UDPTimeout || 826 LastTunConf.FileDescriptor != tunConf.FileDescriptor || 827 LastTunConf.TableIndex != tunConf.TableIndex { 828 return true 829 } 830 831 if len(LastTunConf.DNSHijack) != len(tunConf.DNSHijack) { 832 return true 833 } 834 835 sort.Slice(tunConf.DNSHijack, func(i, j int) bool { 836 return tunConf.DNSHijack[i] < tunConf.DNSHijack[j] 837 }) 838 839 sort.Slice(tunConf.Inet4Address, func(i, j int) bool { 840 return tunConf.Inet4Address[i].String() < tunConf.Inet4Address[j].String() 841 }) 842 843 sort.Slice(tunConf.Inet6Address, func(i, j int) bool { 844 return tunConf.Inet6Address[i].String() < tunConf.Inet6Address[j].String() 845 }) 846 847 sort.Slice(tunConf.Inet4RouteAddress, func(i, j int) bool { 848 return tunConf.Inet4RouteAddress[i].String() < tunConf.Inet4RouteAddress[j].String() 849 }) 850 851 sort.Slice(tunConf.Inet6RouteAddress, func(i, j int) bool { 852 return tunConf.Inet6RouteAddress[i].String() < tunConf.Inet6RouteAddress[j].String() 853 }) 854 855 sort.Slice(tunConf.Inet4RouteExcludeAddress, func(i, j int) bool { 856 return tunConf.Inet4RouteExcludeAddress[i].String() < tunConf.Inet4RouteExcludeAddress[j].String() 857 }) 858 859 sort.Slice(tunConf.Inet6RouteExcludeAddress, func(i, j int) bool { 860 return tunConf.Inet6RouteExcludeAddress[i].String() < tunConf.Inet6RouteExcludeAddress[j].String() 861 }) 862 863 sort.Slice(tunConf.IncludeInterface, func(i, j int) bool { 864 return tunConf.IncludeInterface[i] < tunConf.IncludeInterface[j] 865 }) 866 867 sort.Slice(tunConf.ExcludeInterface, func(i, j int) bool { 868 return tunConf.ExcludeInterface[i] < tunConf.ExcludeInterface[j] 869 }) 870 871 sort.Slice(tunConf.IncludeUID, func(i, j int) bool { 872 return tunConf.IncludeUID[i] < tunConf.IncludeUID[j] 873 }) 874 875 sort.Slice(tunConf.IncludeUIDRange, func(i, j int) bool { 876 return tunConf.IncludeUIDRange[i] < tunConf.IncludeUIDRange[j] 877 }) 878 879 sort.Slice(tunConf.ExcludeUID, func(i, j int) bool { 880 return tunConf.ExcludeUID[i] < tunConf.ExcludeUID[j] 881 }) 882 883 sort.Slice(tunConf.ExcludeUIDRange, func(i, j int) bool { 884 return tunConf.ExcludeUIDRange[i] < tunConf.ExcludeUIDRange[j] 885 }) 886 887 sort.Slice(tunConf.IncludeAndroidUser, func(i, j int) bool { 888 return tunConf.IncludeAndroidUser[i] < tunConf.IncludeAndroidUser[j] 889 }) 890 891 sort.Slice(tunConf.IncludePackage, func(i, j int) bool { 892 return tunConf.IncludePackage[i] < tunConf.IncludePackage[j] 893 }) 894 895 sort.Slice(tunConf.ExcludePackage, func(i, j int) bool { 896 return tunConf.ExcludePackage[i] < tunConf.ExcludePackage[j] 897 }) 898 899 if !slices.Equal(tunConf.DNSHijack, LastTunConf.DNSHijack) || 900 !slices.Equal(tunConf.Inet4Address, LastTunConf.Inet4Address) || 901 !slices.Equal(tunConf.Inet6Address, LastTunConf.Inet6Address) || 902 !slices.Equal(tunConf.Inet4RouteAddress, LastTunConf.Inet4RouteAddress) || 903 !slices.Equal(tunConf.Inet6RouteAddress, LastTunConf.Inet6RouteAddress) || 904 !slices.Equal(tunConf.Inet4RouteExcludeAddress, LastTunConf.Inet4RouteExcludeAddress) || 905 !slices.Equal(tunConf.Inet6RouteExcludeAddress, LastTunConf.Inet6RouteExcludeAddress) || 906 !slices.Equal(tunConf.IncludeInterface, LastTunConf.IncludeInterface) || 907 !slices.Equal(tunConf.ExcludeInterface, LastTunConf.ExcludeInterface) || 908 !slices.Equal(tunConf.IncludeUID, LastTunConf.IncludeUID) || 909 !slices.Equal(tunConf.IncludeUIDRange, LastTunConf.IncludeUIDRange) || 910 !slices.Equal(tunConf.ExcludeUID, LastTunConf.ExcludeUID) || 911 !slices.Equal(tunConf.ExcludeUIDRange, LastTunConf.ExcludeUIDRange) || 912 !slices.Equal(tunConf.IncludeAndroidUser, LastTunConf.IncludeAndroidUser) || 913 !slices.Equal(tunConf.IncludePackage, LastTunConf.IncludePackage) || 914 !slices.Equal(tunConf.ExcludePackage, LastTunConf.ExcludePackage) { 915 return true 916 } 917 918 return false 919 } 920 921 func closeTunListener() { 922 if tunLister != nil { 923 tunLister.Close() 924 tunLister = nil 925 } 926 } 927 928 func Cleanup() { 929 closeTunListener() 930 }