1
0
mirror of https://github.com/MetaCubeX/mihomo.git synced 2025-09-20 04:25:59 +08:00
Files
mihomo/dns/client.go

129 lines
2.8 KiB
Go
Raw Permalink Normal View History

2018-12-05 21:13:29 +08:00
package dns
import (
"context"
"crypto/tls"
2020-02-17 22:13:15 +08:00
"fmt"
"net"
"strings"
"time"
2018-12-05 21:13:29 +08:00
2023-11-03 21:01:45 +08:00
"github.com/metacubex/mihomo/component/ca"
C "github.com/metacubex/mihomo/constant"
"github.com/metacubex/mihomo/log"
2020-02-09 17:02:48 +08:00
2018-12-05 21:13:29 +08:00
D "github.com/miekg/dns"
)
2019-06-28 12:29:08 +08:00
type client struct {
2025-09-19 21:07:43 +08:00
port string
host string
dialer *dnsDialer
schema string
skipCertVerify bool
2023-01-28 22:33:03 +08:00
}
var _ dnsClient = (*client)(nil)
// Address implements dnsClient
func (c *client) Address() string {
2025-09-19 21:07:43 +08:00
return fmt.Sprintf("%s://%s", c.schema, net.JoinHostPort(c.host, c.port))
2018-12-05 21:13:29 +08:00
}
2021-09-13 23:58:34 +08:00
func (c *client) ExchangeContext(ctx context.Context, m *D.Msg) (*D.Msg, error) {
network := "udp"
2025-09-19 21:07:43 +08:00
if c.schema != "udp" {
network = "tcp"
}
2024-06-15 00:33:03 +08:00
addr := net.JoinHostPort(c.host, c.port)
conn, err := c.dialer.DialContext(ctx, network, addr)
if err != nil {
return nil, err
}
2025-09-19 21:07:43 +08:00
defer conn.Close()
if c.schema == "tls" {
tlsConfig, err := ca.GetTLSConfig(ca.Option{
TLSConfig: &tls.Config{
ServerName: c.host,
InsecureSkipVerify: c.skipCertVerify,
},
})
if err != nil {
return nil, err
}
tlsConn := tls.Client(conn, tlsConfig)
if err := tlsConn.HandshakeContext(ctx); err != nil {
return nil, err
}
conn = tlsConn
}
2020-02-09 17:02:48 +08:00
// miekg/dns ExchangeContext doesn't respond to context cancel.
// this is a workaround
type result struct {
msg *D.Msg
err error
}
ch := make(chan result, 1)
go func() {
2025-09-19 21:07:43 +08:00
dClient := &D.Client{
UDPSize: 4096,
Timeout: 5 * time.Second,
}
dConn := &D.Conn{
2025-09-19 21:07:43 +08:00
Conn: conn,
UDPSize: dClient.UDPSize,
}
2025-09-19 21:07:43 +08:00
msg, _, err := dClient.ExchangeWithConn(m, dConn)
// Resolvers MUST resend queries over TCP if they receive a truncated UDP response (with TC=1 set)!
if msg != nil && msg.Truncated && network == "udp" {
2024-03-23 22:30:19 +08:00
network = "tcp"
log.Debugln("[DNS] Truncated reply from %s:%s for %s over UDP, retrying over TCP", c.host, c.port, m.Question[0].String())
2025-09-19 21:07:43 +08:00
var tcpConn net.Conn
tcpConn, err = c.dialer.DialContext(ctx, network, addr)
2024-03-23 22:30:19 +08:00
if err != nil {
ch <- result{msg, err}
return
}
2025-09-19 21:07:43 +08:00
defer tcpConn.Close()
dConn.Conn = tcpConn
msg, _, err = dClient.ExchangeWithConn(m, dConn)
}
ch <- result{msg, err}
}()
select {
case <-ctx.Done():
return nil, ctx.Err()
case ret := <-ch:
return ret.msg, ret.err
}
2018-12-05 21:13:29 +08:00
}
func (c *client) ResetConnection() {}
func newClient(addr string, resolver *Resolver, netType string, params map[string]string, proxyAdapter C.ProxyAdapter, proxyName string) *client {
host, port, _ := net.SplitHostPort(addr)
c := &client{
port: port,
host: host,
dialer: newDNSDialer(resolver, proxyAdapter, proxyName),
2025-09-19 21:07:43 +08:00
schema: "udp",
}
if strings.HasPrefix(netType, "tcp") {
c.schema = "tcp"
if strings.HasSuffix(netType, "tls") {
c.schema = "tls"
}
}
if params["skip-cert-verify"] == "true" {
2025-09-19 21:07:43 +08:00
c.skipCertVerify = true
}
return c
}