rule_dns.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380
  1. package route
  2. import (
  3. "context"
  4. "net/netip"
  5. "github.com/sagernet/sing-box/adapter"
  6. C "github.com/sagernet/sing-box/constant"
  7. "github.com/sagernet/sing-box/experimental/deprecated"
  8. "github.com/sagernet/sing-box/log"
  9. "github.com/sagernet/sing-box/option"
  10. "github.com/sagernet/sing/common"
  11. E "github.com/sagernet/sing/common/exceptions"
  12. )
  13. func NewDNSRule(ctx context.Context, router adapter.Router, logger log.ContextLogger, options option.DNSRule, checkServer bool) (adapter.DNSRule, error) {
  14. switch options.Type {
  15. case "", C.RuleTypeDefault:
  16. if !options.DefaultOptions.IsValid() {
  17. return nil, E.New("missing conditions")
  18. }
  19. if options.DefaultOptions.Server == "" && checkServer {
  20. return nil, E.New("missing server field")
  21. }
  22. return NewDefaultDNSRule(ctx, router, logger, options.DefaultOptions)
  23. case C.RuleTypeLogical:
  24. if !options.LogicalOptions.IsValid() {
  25. return nil, E.New("missing conditions")
  26. }
  27. if options.LogicalOptions.Server == "" && checkServer {
  28. return nil, E.New("missing server field")
  29. }
  30. return NewLogicalDNSRule(ctx, router, logger, options.LogicalOptions)
  31. default:
  32. return nil, E.New("unknown rule type: ", options.Type)
  33. }
  34. }
  35. var _ adapter.DNSRule = (*DefaultDNSRule)(nil)
  36. type DefaultDNSRule struct {
  37. abstractDefaultRule
  38. disableCache bool
  39. rewriteTTL *uint32
  40. clientSubnet *netip.Prefix
  41. }
  42. func NewDefaultDNSRule(ctx context.Context, router adapter.Router, logger log.ContextLogger, options option.DefaultDNSRule) (*DefaultDNSRule, error) {
  43. rule := &DefaultDNSRule{
  44. abstractDefaultRule: abstractDefaultRule{
  45. invert: options.Invert,
  46. outbound: options.Server,
  47. },
  48. disableCache: options.DisableCache,
  49. rewriteTTL: options.RewriteTTL,
  50. clientSubnet: (*netip.Prefix)(options.ClientSubnet),
  51. }
  52. if len(options.Inbound) > 0 {
  53. item := NewInboundRule(options.Inbound)
  54. rule.items = append(rule.items, item)
  55. rule.allItems = append(rule.allItems, item)
  56. }
  57. if options.IPVersion > 0 {
  58. switch options.IPVersion {
  59. case 4, 6:
  60. item := NewIPVersionItem(options.IPVersion == 6)
  61. rule.items = append(rule.items, item)
  62. rule.allItems = append(rule.allItems, item)
  63. default:
  64. return nil, E.New("invalid ip version: ", options.IPVersion)
  65. }
  66. }
  67. if len(options.QueryType) > 0 {
  68. item := NewQueryTypeItem(options.QueryType)
  69. rule.items = append(rule.items, item)
  70. rule.allItems = append(rule.allItems, item)
  71. }
  72. if len(options.Network) > 0 {
  73. item := NewNetworkItem(options.Network)
  74. rule.items = append(rule.items, item)
  75. rule.allItems = append(rule.allItems, item)
  76. }
  77. if len(options.AuthUser) > 0 {
  78. item := NewAuthUserItem(options.AuthUser)
  79. rule.items = append(rule.items, item)
  80. rule.allItems = append(rule.allItems, item)
  81. }
  82. if len(options.Protocol) > 0 {
  83. item := NewProtocolItem(options.Protocol)
  84. rule.items = append(rule.items, item)
  85. rule.allItems = append(rule.allItems, item)
  86. }
  87. if len(options.Domain) > 0 || len(options.DomainSuffix) > 0 {
  88. item := NewDomainItem(options.Domain, options.DomainSuffix)
  89. rule.destinationAddressItems = append(rule.destinationAddressItems, item)
  90. rule.allItems = append(rule.allItems, item)
  91. }
  92. if len(options.DomainKeyword) > 0 {
  93. item := NewDomainKeywordItem(options.DomainKeyword)
  94. rule.destinationAddressItems = append(rule.destinationAddressItems, item)
  95. rule.allItems = append(rule.allItems, item)
  96. }
  97. if len(options.DomainRegex) > 0 {
  98. item, err := NewDomainRegexItem(options.DomainRegex)
  99. if err != nil {
  100. return nil, E.Cause(err, "domain_regex")
  101. }
  102. rule.destinationAddressItems = append(rule.destinationAddressItems, item)
  103. rule.allItems = append(rule.allItems, item)
  104. }
  105. if len(options.Geosite) > 0 {
  106. item := NewGeositeItem(router, logger, options.Geosite)
  107. rule.destinationAddressItems = append(rule.destinationAddressItems, item)
  108. rule.allItems = append(rule.allItems, item)
  109. }
  110. if len(options.SourceGeoIP) > 0 {
  111. item := NewGeoIPItem(router, logger, true, options.SourceGeoIP)
  112. rule.sourceAddressItems = append(rule.sourceAddressItems, item)
  113. rule.allItems = append(rule.allItems, item)
  114. }
  115. if len(options.GeoIP) > 0 {
  116. item := NewGeoIPItem(router, logger, false, options.GeoIP)
  117. rule.destinationIPCIDRItems = append(rule.destinationIPCIDRItems, item)
  118. rule.allItems = append(rule.allItems, item)
  119. }
  120. if len(options.SourceIPCIDR) > 0 {
  121. item, err := NewIPCIDRItem(true, options.SourceIPCIDR)
  122. if err != nil {
  123. return nil, E.Cause(err, "source_ip_cidr")
  124. }
  125. rule.sourceAddressItems = append(rule.sourceAddressItems, item)
  126. rule.allItems = append(rule.allItems, item)
  127. }
  128. if len(options.IPCIDR) > 0 {
  129. item, err := NewIPCIDRItem(false, options.IPCIDR)
  130. if err != nil {
  131. return nil, E.Cause(err, "ip_cidr")
  132. }
  133. rule.destinationIPCIDRItems = append(rule.destinationIPCIDRItems, item)
  134. rule.allItems = append(rule.allItems, item)
  135. }
  136. if options.SourceIPIsPrivate {
  137. item := NewIPIsPrivateItem(true)
  138. rule.sourceAddressItems = append(rule.sourceAddressItems, item)
  139. rule.allItems = append(rule.allItems, item)
  140. }
  141. if options.IPIsPrivate {
  142. item := NewIPIsPrivateItem(false)
  143. rule.destinationIPCIDRItems = append(rule.destinationIPCIDRItems, item)
  144. rule.allItems = append(rule.allItems, item)
  145. }
  146. if len(options.SourcePort) > 0 {
  147. item := NewPortItem(true, options.SourcePort)
  148. rule.sourcePortItems = append(rule.sourcePortItems, item)
  149. rule.allItems = append(rule.allItems, item)
  150. }
  151. if len(options.SourcePortRange) > 0 {
  152. item, err := NewPortRangeItem(true, options.SourcePortRange)
  153. if err != nil {
  154. return nil, E.Cause(err, "source_port_range")
  155. }
  156. rule.sourcePortItems = append(rule.sourcePortItems, item)
  157. rule.allItems = append(rule.allItems, item)
  158. }
  159. if len(options.Port) > 0 {
  160. item := NewPortItem(false, options.Port)
  161. rule.destinationPortItems = append(rule.destinationPortItems, item)
  162. rule.allItems = append(rule.allItems, item)
  163. }
  164. if len(options.PortRange) > 0 {
  165. item, err := NewPortRangeItem(false, options.PortRange)
  166. if err != nil {
  167. return nil, E.Cause(err, "port_range")
  168. }
  169. rule.destinationPortItems = append(rule.destinationPortItems, item)
  170. rule.allItems = append(rule.allItems, item)
  171. }
  172. if len(options.ProcessName) > 0 {
  173. item := NewProcessItem(options.ProcessName)
  174. rule.items = append(rule.items, item)
  175. rule.allItems = append(rule.allItems, item)
  176. }
  177. if len(options.ProcessPath) > 0 {
  178. item := NewProcessPathItem(options.ProcessPath)
  179. rule.items = append(rule.items, item)
  180. rule.allItems = append(rule.allItems, item)
  181. }
  182. if len(options.ProcessPathRegex) > 0 {
  183. item, err := NewProcessPathRegexItem(options.ProcessPathRegex)
  184. if err != nil {
  185. return nil, E.Cause(err, "process_path_regex")
  186. }
  187. rule.items = append(rule.items, item)
  188. rule.allItems = append(rule.allItems, item)
  189. }
  190. if len(options.PackageName) > 0 {
  191. item := NewPackageNameItem(options.PackageName)
  192. rule.items = append(rule.items, item)
  193. rule.allItems = append(rule.allItems, item)
  194. }
  195. if len(options.User) > 0 {
  196. item := NewUserItem(options.User)
  197. rule.items = append(rule.items, item)
  198. rule.allItems = append(rule.allItems, item)
  199. }
  200. if len(options.UserID) > 0 {
  201. item := NewUserIDItem(options.UserID)
  202. rule.items = append(rule.items, item)
  203. rule.allItems = append(rule.allItems, item)
  204. }
  205. if len(options.Outbound) > 0 {
  206. item := NewOutboundRule(options.Outbound)
  207. rule.items = append(rule.items, item)
  208. rule.allItems = append(rule.allItems, item)
  209. }
  210. if options.ClashMode != "" {
  211. item := NewClashModeItem(router, options.ClashMode)
  212. rule.items = append(rule.items, item)
  213. rule.allItems = append(rule.allItems, item)
  214. }
  215. if len(options.WIFISSID) > 0 {
  216. item := NewWIFISSIDItem(router, options.WIFISSID)
  217. rule.items = append(rule.items, item)
  218. rule.allItems = append(rule.allItems, item)
  219. }
  220. if len(options.WIFIBSSID) > 0 {
  221. item := NewWIFIBSSIDItem(router, options.WIFIBSSID)
  222. rule.items = append(rule.items, item)
  223. rule.allItems = append(rule.allItems, item)
  224. }
  225. if len(options.RuleSet) > 0 {
  226. var matchSource bool
  227. if options.RuleSetIPCIDRMatchSource {
  228. matchSource = true
  229. } else
  230. //nolint:staticcheck
  231. if options.Deprecated_RulesetIPCIDRMatchSource {
  232. matchSource = true
  233. deprecated.Report(ctx, deprecated.OptionBadMatchSource)
  234. }
  235. item := NewRuleSetItem(router, options.RuleSet, matchSource, options.RuleSetIPCIDRAcceptEmpty)
  236. rule.items = append(rule.items, item)
  237. rule.allItems = append(rule.allItems, item)
  238. }
  239. return rule, nil
  240. }
  241. func (r *DefaultDNSRule) DisableCache() bool {
  242. return r.disableCache
  243. }
  244. func (r *DefaultDNSRule) RewriteTTL() *uint32 {
  245. return r.rewriteTTL
  246. }
  247. func (r *DefaultDNSRule) ClientSubnet() *netip.Prefix {
  248. return r.clientSubnet
  249. }
  250. func (r *DefaultDNSRule) WithAddressLimit() bool {
  251. if len(r.destinationIPCIDRItems) > 0 {
  252. return true
  253. }
  254. for _, rawRule := range r.items {
  255. ruleSet, isRuleSet := rawRule.(*RuleSetItem)
  256. if !isRuleSet {
  257. continue
  258. }
  259. if ruleSet.ContainsDestinationIPCIDRRule() {
  260. return true
  261. }
  262. }
  263. return false
  264. }
  265. func (r *DefaultDNSRule) Match(metadata *adapter.InboundContext) bool {
  266. metadata.IgnoreDestinationIPCIDRMatch = true
  267. defer func() {
  268. metadata.IgnoreDestinationIPCIDRMatch = false
  269. }()
  270. return r.abstractDefaultRule.Match(metadata)
  271. }
  272. func (r *DefaultDNSRule) MatchAddressLimit(metadata *adapter.InboundContext) bool {
  273. return r.abstractDefaultRule.Match(metadata)
  274. }
  275. var _ adapter.DNSRule = (*LogicalDNSRule)(nil)
  276. type LogicalDNSRule struct {
  277. abstractLogicalRule
  278. disableCache bool
  279. rewriteTTL *uint32
  280. clientSubnet *netip.Prefix
  281. }
  282. func NewLogicalDNSRule(ctx context.Context, router adapter.Router, logger log.ContextLogger, options option.LogicalDNSRule) (*LogicalDNSRule, error) {
  283. r := &LogicalDNSRule{
  284. abstractLogicalRule: abstractLogicalRule{
  285. rules: make([]adapter.HeadlessRule, len(options.Rules)),
  286. invert: options.Invert,
  287. outbound: options.Server,
  288. },
  289. disableCache: options.DisableCache,
  290. rewriteTTL: options.RewriteTTL,
  291. clientSubnet: (*netip.Prefix)(options.ClientSubnet),
  292. }
  293. switch options.Mode {
  294. case C.LogicalTypeAnd:
  295. r.mode = C.LogicalTypeAnd
  296. case C.LogicalTypeOr:
  297. r.mode = C.LogicalTypeOr
  298. default:
  299. return nil, E.New("unknown logical mode: ", options.Mode)
  300. }
  301. for i, subRule := range options.Rules {
  302. rule, err := NewDNSRule(ctx, router, logger, subRule, false)
  303. if err != nil {
  304. return nil, E.Cause(err, "sub rule[", i, "]")
  305. }
  306. r.rules[i] = rule
  307. }
  308. return r, nil
  309. }
  310. func (r *LogicalDNSRule) DisableCache() bool {
  311. return r.disableCache
  312. }
  313. func (r *LogicalDNSRule) RewriteTTL() *uint32 {
  314. return r.rewriteTTL
  315. }
  316. func (r *LogicalDNSRule) ClientSubnet() *netip.Prefix {
  317. return r.clientSubnet
  318. }
  319. func (r *LogicalDNSRule) WithAddressLimit() bool {
  320. for _, rawRule := range r.rules {
  321. switch rule := rawRule.(type) {
  322. case *DefaultDNSRule:
  323. if rule.WithAddressLimit() {
  324. return true
  325. }
  326. case *LogicalDNSRule:
  327. if rule.WithAddressLimit() {
  328. return true
  329. }
  330. }
  331. }
  332. return false
  333. }
  334. func (r *LogicalDNSRule) Match(metadata *adapter.InboundContext) bool {
  335. if r.mode == C.LogicalTypeAnd {
  336. return common.All(r.rules, func(it adapter.HeadlessRule) bool {
  337. metadata.ResetRuleCache()
  338. return it.(adapter.DNSRule).Match(metadata)
  339. }) != r.invert
  340. } else {
  341. return common.Any(r.rules, func(it adapter.HeadlessRule) bool {
  342. metadata.ResetRuleCache()
  343. return it.(adapter.DNSRule).Match(metadata)
  344. }) != r.invert
  345. }
  346. }
  347. func (r *LogicalDNSRule) MatchAddressLimit(metadata *adapter.InboundContext) bool {
  348. if r.mode == C.LogicalTypeAnd {
  349. return common.All(r.rules, func(it adapter.HeadlessRule) bool {
  350. metadata.ResetRuleCache()
  351. return it.(adapter.DNSRule).MatchAddressLimit(metadata)
  352. }) != r.invert
  353. } else {
  354. return common.Any(r.rules, func(it adapter.HeadlessRule) bool {
  355. metadata.ResetRuleCache()
  356. return it.(adapter.DNSRule).MatchAddressLimit(metadata)
  357. }) != r.invert
  358. }
  359. }