rule_action.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397
  1. package rule
  2. import (
  3. "context"
  4. "net/netip"
  5. "strings"
  6. "sync"
  7. "syscall"
  8. "time"
  9. "github.com/sagernet/sing-box/adapter"
  10. "github.com/sagernet/sing-box/common/dialer"
  11. "github.com/sagernet/sing-box/common/sniff"
  12. C "github.com/sagernet/sing-box/constant"
  13. "github.com/sagernet/sing-box/option"
  14. "github.com/sagernet/sing-tun"
  15. "github.com/sagernet/sing/common"
  16. E "github.com/sagernet/sing/common/exceptions"
  17. F "github.com/sagernet/sing/common/format"
  18. "github.com/sagernet/sing/common/logger"
  19. M "github.com/sagernet/sing/common/metadata"
  20. N "github.com/sagernet/sing/common/network"
  21. )
  22. func NewRuleAction(ctx context.Context, logger logger.ContextLogger, action option.RuleAction) (adapter.RuleAction, error) {
  23. switch action.Action {
  24. case "":
  25. return nil, nil
  26. case C.RuleActionTypeRoute:
  27. return &RuleActionRoute{
  28. Outbound: action.RouteOptions.Outbound,
  29. RuleActionRouteOptions: RuleActionRouteOptions{
  30. OverrideAddress: M.ParseSocksaddrHostPort(action.RouteOptions.OverrideAddress, 0),
  31. OverridePort: action.RouteOptions.OverridePort,
  32. NetworkStrategy: (*C.NetworkStrategy)(action.RouteOptions.NetworkStrategy),
  33. FallbackDelay: time.Duration(action.RouteOptions.FallbackDelay),
  34. UDPDisableDomainUnmapping: action.RouteOptions.UDPDisableDomainUnmapping,
  35. UDPConnect: action.RouteOptions.UDPConnect,
  36. TLSFragment: action.RouteOptions.TLSFragment,
  37. TLSFragmentFallbackDelay: time.Duration(action.RouteOptions.TLSFragmentFallbackDelay),
  38. },
  39. }, nil
  40. case C.RuleActionTypeRouteOptions:
  41. return &RuleActionRouteOptions{
  42. OverrideAddress: M.ParseSocksaddrHostPort(action.RouteOptionsOptions.OverrideAddress, 0),
  43. OverridePort: action.RouteOptionsOptions.OverridePort,
  44. NetworkStrategy: (*C.NetworkStrategy)(action.RouteOptionsOptions.NetworkStrategy),
  45. FallbackDelay: time.Duration(action.RouteOptionsOptions.FallbackDelay),
  46. UDPDisableDomainUnmapping: action.RouteOptionsOptions.UDPDisableDomainUnmapping,
  47. UDPConnect: action.RouteOptionsOptions.UDPConnect,
  48. UDPTimeout: time.Duration(action.RouteOptionsOptions.UDPTimeout),
  49. TLSFragment: action.RouteOptionsOptions.TLSFragment,
  50. TLSFragmentFallbackDelay: time.Duration(action.RouteOptionsOptions.TLSFragmentFallbackDelay),
  51. }, nil
  52. case C.RuleActionTypeDirect:
  53. directDialer, err := dialer.New(ctx, option.DialerOptions(action.DirectOptions), false)
  54. if err != nil {
  55. return nil, err
  56. }
  57. var description string
  58. descriptions := action.DirectOptions.Descriptions()
  59. switch len(descriptions) {
  60. case 0:
  61. case 1:
  62. description = F.ToString("(", descriptions[0], ")")
  63. case 2:
  64. description = F.ToString("(", descriptions[0], ",", descriptions[1], ")")
  65. default:
  66. description = F.ToString("(", descriptions[0], ",", descriptions[1], ",...)")
  67. }
  68. return &RuleActionDirect{
  69. Dialer: directDialer,
  70. description: description,
  71. }, nil
  72. case C.RuleActionTypeReject:
  73. return &RuleActionReject{
  74. Method: action.RejectOptions.Method,
  75. NoDrop: action.RejectOptions.NoDrop,
  76. logger: logger,
  77. }, nil
  78. case C.RuleActionTypeHijackDNS:
  79. return &RuleActionHijackDNS{}, nil
  80. case C.RuleActionTypeSniff:
  81. sniffAction := &RuleActionSniff{
  82. snifferNames: action.SniffOptions.Sniffer,
  83. Timeout: time.Duration(action.SniffOptions.Timeout),
  84. }
  85. return sniffAction, sniffAction.build()
  86. case C.RuleActionTypeResolve:
  87. return &RuleActionResolve{
  88. Strategy: C.DomainStrategy(action.ResolveOptions.Strategy),
  89. Server: action.ResolveOptions.Server,
  90. }, nil
  91. default:
  92. panic(F.ToString("unknown rule action: ", action.Action))
  93. }
  94. }
  95. func NewDNSRuleAction(logger logger.ContextLogger, action option.DNSRuleAction) adapter.RuleAction {
  96. switch action.Action {
  97. case "":
  98. return nil
  99. case C.RuleActionTypeRoute:
  100. return &RuleActionDNSRoute{
  101. Server: action.RouteOptions.Server,
  102. RuleActionDNSRouteOptions: RuleActionDNSRouteOptions{
  103. Strategy: C.DomainStrategy(action.RouteOptions.Strategy),
  104. DisableCache: action.RouteOptions.DisableCache,
  105. RewriteTTL: action.RouteOptions.RewriteTTL,
  106. ClientSubnet: netip.Prefix(common.PtrValueOrDefault(action.RouteOptions.ClientSubnet)),
  107. },
  108. }
  109. case C.RuleActionTypeRouteOptions:
  110. return &RuleActionDNSRouteOptions{
  111. Strategy: C.DomainStrategy(action.RouteOptionsOptions.Strategy),
  112. DisableCache: action.RouteOptionsOptions.DisableCache,
  113. RewriteTTL: action.RouteOptionsOptions.RewriteTTL,
  114. ClientSubnet: netip.Prefix(common.PtrValueOrDefault(action.RouteOptionsOptions.ClientSubnet)),
  115. }
  116. case C.RuleActionTypeReject:
  117. return &RuleActionReject{
  118. Method: action.RejectOptions.Method,
  119. NoDrop: action.RejectOptions.NoDrop,
  120. logger: logger,
  121. }
  122. default:
  123. panic(F.ToString("unknown rule action: ", action.Action))
  124. }
  125. }
  126. type RuleActionRoute struct {
  127. Outbound string
  128. RuleActionRouteOptions
  129. }
  130. func (r *RuleActionRoute) Type() string {
  131. return C.RuleActionTypeRoute
  132. }
  133. func (r *RuleActionRoute) String() string {
  134. var descriptions []string
  135. descriptions = append(descriptions, r.Outbound)
  136. if r.UDPDisableDomainUnmapping {
  137. descriptions = append(descriptions, "udp-disable-domain-unmapping")
  138. }
  139. if r.UDPConnect {
  140. descriptions = append(descriptions, "udp-connect")
  141. }
  142. if r.TLSFragment {
  143. descriptions = append(descriptions, "tls-fragment")
  144. }
  145. return F.ToString("route(", strings.Join(descriptions, ","), ")")
  146. }
  147. type RuleActionRouteOptions struct {
  148. OverrideAddress M.Socksaddr
  149. OverridePort uint16
  150. NetworkStrategy *C.NetworkStrategy
  151. NetworkType []C.InterfaceType
  152. FallbackNetworkType []C.InterfaceType
  153. FallbackDelay time.Duration
  154. UDPDisableDomainUnmapping bool
  155. UDPConnect bool
  156. UDPTimeout time.Duration
  157. TLSFragment bool
  158. TLSFragmentFallbackDelay time.Duration
  159. }
  160. func (r *RuleActionRouteOptions) Type() string {
  161. return C.RuleActionTypeRouteOptions
  162. }
  163. func (r *RuleActionRouteOptions) String() string {
  164. var descriptions []string
  165. if r.OverrideAddress.IsValid() {
  166. descriptions = append(descriptions, F.ToString("override-address=", r.OverrideAddress.AddrString()))
  167. }
  168. if r.OverridePort > 0 {
  169. descriptions = append(descriptions, F.ToString("override-port=", r.OverridePort))
  170. }
  171. if r.NetworkStrategy != nil {
  172. descriptions = append(descriptions, F.ToString("network-strategy=", r.NetworkStrategy))
  173. }
  174. if r.NetworkType != nil {
  175. descriptions = append(descriptions, F.ToString("network-type=", strings.Join(common.Map(r.NetworkType, C.InterfaceType.String), ",")))
  176. }
  177. if r.FallbackNetworkType != nil {
  178. descriptions = append(descriptions, F.ToString("fallback-network-type="+strings.Join(common.Map(r.NetworkType, C.InterfaceType.String), ",")))
  179. }
  180. if r.FallbackDelay > 0 {
  181. descriptions = append(descriptions, F.ToString("fallback-delay=", r.FallbackDelay.String()))
  182. }
  183. if r.UDPDisableDomainUnmapping {
  184. descriptions = append(descriptions, "udp-disable-domain-unmapping")
  185. }
  186. if r.UDPConnect {
  187. descriptions = append(descriptions, "udp-connect")
  188. }
  189. if r.UDPTimeout > 0 {
  190. descriptions = append(descriptions, "udp-timeout")
  191. }
  192. return F.ToString("route-options(", strings.Join(descriptions, ","), ")")
  193. }
  194. type RuleActionDNSRoute struct {
  195. Server string
  196. RuleActionDNSRouteOptions
  197. }
  198. func (r *RuleActionDNSRoute) Type() string {
  199. return C.RuleActionTypeRoute
  200. }
  201. func (r *RuleActionDNSRoute) String() string {
  202. var descriptions []string
  203. descriptions = append(descriptions, r.Server)
  204. if r.DisableCache {
  205. descriptions = append(descriptions, "disable-cache")
  206. }
  207. if r.RewriteTTL != nil {
  208. descriptions = append(descriptions, F.ToString("rewrite-ttl=", *r.RewriteTTL))
  209. }
  210. if r.ClientSubnet.IsValid() {
  211. descriptions = append(descriptions, F.ToString("client-subnet=", r.ClientSubnet))
  212. }
  213. return F.ToString("route(", strings.Join(descriptions, ","), ")")
  214. }
  215. type RuleActionDNSRouteOptions struct {
  216. Strategy C.DomainStrategy
  217. DisableCache bool
  218. RewriteTTL *uint32
  219. ClientSubnet netip.Prefix
  220. }
  221. func (r *RuleActionDNSRouteOptions) Type() string {
  222. return C.RuleActionTypeRouteOptions
  223. }
  224. func (r *RuleActionDNSRouteOptions) String() string {
  225. var descriptions []string
  226. if r.DisableCache {
  227. descriptions = append(descriptions, "disable-cache")
  228. }
  229. if r.RewriteTTL != nil {
  230. descriptions = append(descriptions, F.ToString("rewrite-ttl=", *r.RewriteTTL))
  231. }
  232. if r.ClientSubnet.IsValid() {
  233. descriptions = append(descriptions, F.ToString("client-subnet=", r.ClientSubnet))
  234. }
  235. return F.ToString("route-options(", strings.Join(descriptions, ","), ")")
  236. }
  237. type RuleActionDirect struct {
  238. Dialer N.Dialer
  239. description string
  240. }
  241. func (r *RuleActionDirect) Type() string {
  242. return C.RuleActionTypeDirect
  243. }
  244. func (r *RuleActionDirect) String() string {
  245. return "direct" + r.description
  246. }
  247. type RuleActionReject struct {
  248. Method string
  249. NoDrop bool
  250. logger logger.ContextLogger
  251. dropAccess sync.Mutex
  252. dropCounter []time.Time
  253. }
  254. func (r *RuleActionReject) Type() string {
  255. return C.RuleActionTypeReject
  256. }
  257. func (r *RuleActionReject) String() string {
  258. if r.Method == C.RuleActionRejectMethodDefault {
  259. return "reject"
  260. }
  261. return F.ToString("reject(", r.Method, ")")
  262. }
  263. func (r *RuleActionReject) Error(ctx context.Context) error {
  264. var returnErr error
  265. switch r.Method {
  266. case C.RuleActionRejectMethodDefault:
  267. returnErr = syscall.ECONNREFUSED
  268. case C.RuleActionRejectMethodDrop:
  269. return tun.ErrDrop
  270. default:
  271. panic(F.ToString("unknown reject method: ", r.Method))
  272. }
  273. r.dropAccess.Lock()
  274. defer r.dropAccess.Unlock()
  275. timeNow := time.Now()
  276. r.dropCounter = common.Filter(r.dropCounter, func(t time.Time) bool {
  277. return timeNow.Sub(t) <= 30*time.Second
  278. })
  279. r.dropCounter = append(r.dropCounter, timeNow)
  280. if len(r.dropCounter) > 50 {
  281. if ctx != nil {
  282. r.logger.DebugContext(ctx, "dropped due to flooding")
  283. }
  284. return tun.ErrDrop
  285. }
  286. return returnErr
  287. }
  288. type RuleActionHijackDNS struct{}
  289. func (r *RuleActionHijackDNS) Type() string {
  290. return C.RuleActionTypeHijackDNS
  291. }
  292. func (r *RuleActionHijackDNS) String() string {
  293. return "hijack-dns"
  294. }
  295. type RuleActionSniff struct {
  296. snifferNames []string
  297. StreamSniffers []sniff.StreamSniffer
  298. PacketSniffers []sniff.PacketSniffer
  299. Timeout time.Duration
  300. // Deprecated
  301. OverrideDestination bool
  302. }
  303. func (r *RuleActionSniff) Type() string {
  304. return C.RuleActionTypeSniff
  305. }
  306. func (r *RuleActionSniff) build() error {
  307. for _, name := range r.snifferNames {
  308. switch name {
  309. case C.ProtocolTLS:
  310. r.StreamSniffers = append(r.StreamSniffers, sniff.TLSClientHello)
  311. case C.ProtocolHTTP:
  312. r.StreamSniffers = append(r.StreamSniffers, sniff.HTTPHost)
  313. case C.ProtocolQUIC:
  314. r.PacketSniffers = append(r.PacketSniffers, sniff.QUICClientHello)
  315. case C.ProtocolDNS:
  316. r.StreamSniffers = append(r.StreamSniffers, sniff.StreamDomainNameQuery)
  317. r.PacketSniffers = append(r.PacketSniffers, sniff.DomainNameQuery)
  318. case C.ProtocolSTUN:
  319. r.PacketSniffers = append(r.PacketSniffers, sniff.STUNMessage)
  320. case C.ProtocolBitTorrent:
  321. r.StreamSniffers = append(r.StreamSniffers, sniff.BitTorrent)
  322. r.PacketSniffers = append(r.PacketSniffers, sniff.UTP)
  323. r.PacketSniffers = append(r.PacketSniffers, sniff.UDPTracker)
  324. case C.ProtocolDTLS:
  325. r.PacketSniffers = append(r.PacketSniffers, sniff.DTLSRecord)
  326. case C.ProtocolSSH:
  327. r.StreamSniffers = append(r.StreamSniffers, sniff.SSH)
  328. case C.ProtocolRDP:
  329. r.StreamSniffers = append(r.StreamSniffers, sniff.RDP)
  330. default:
  331. return E.New("unknown sniffer: ", name)
  332. }
  333. }
  334. return nil
  335. }
  336. func (r *RuleActionSniff) String() string {
  337. if len(r.snifferNames) == 0 && r.Timeout == 0 {
  338. return "sniff"
  339. } else if len(r.snifferNames) > 0 && r.Timeout == 0 {
  340. return F.ToString("sniff(", strings.Join(r.snifferNames, ","), ")")
  341. } else if len(r.snifferNames) == 0 && r.Timeout > 0 {
  342. return F.ToString("sniff(", r.Timeout.String(), ")")
  343. } else {
  344. return F.ToString("sniff(", strings.Join(r.snifferNames, ","), ",", r.Timeout.String(), ")")
  345. }
  346. }
  347. type RuleActionResolve struct {
  348. Strategy C.DomainStrategy
  349. Server string
  350. }
  351. func (r *RuleActionResolve) Type() string {
  352. return C.RuleActionTypeResolve
  353. }
  354. func (r *RuleActionResolve) String() string {
  355. if r.Strategy == C.DomainStrategyAsIS && r.Server == "" {
  356. return F.ToString("resolve")
  357. } else if r.Strategy != C.DomainStrategyAsIS && r.Server == "" {
  358. return F.ToString("resolve(", option.DomainStrategy(r.Strategy).String(), ")")
  359. } else if r.Strategy == C.DomainStrategyAsIS && r.Server != "" {
  360. return F.ToString("resolve(", r.Server, ")")
  361. } else {
  362. return F.ToString("resolve(", option.DomainStrategy(r.Strategy).String(), ",", r.Server, ")")
  363. }
  364. }