rule_dns.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377
  1. package rule
  2. import (
  3. "context"
  4. "github.com/sagernet/sing-box/adapter"
  5. C "github.com/sagernet/sing-box/constant"
  6. "github.com/sagernet/sing-box/experimental/deprecated"
  7. "github.com/sagernet/sing-box/log"
  8. "github.com/sagernet/sing-box/option"
  9. "github.com/sagernet/sing/common"
  10. E "github.com/sagernet/sing/common/exceptions"
  11. "github.com/sagernet/sing/service"
  12. )
  13. func NewDNSRule(ctx context.Context, logger log.ContextLogger, options option.DNSRule, checkServer bool) (adapter.DNSRule, error) {
  14. switch options.Type {
  15. case "", C.RuleTypeDefault:
  16. if !options.DefaultOptions.IsValid() {
  17. return nil, E.New("missing conditions")
  18. }
  19. switch options.DefaultOptions.Action {
  20. case "", C.RuleActionTypeRoute:
  21. if options.DefaultOptions.RouteOptions.Server == "" && checkServer {
  22. return nil, E.New("missing server field")
  23. }
  24. }
  25. return NewDefaultDNSRule(ctx, logger, options.DefaultOptions)
  26. case C.RuleTypeLogical:
  27. if !options.LogicalOptions.IsValid() {
  28. return nil, E.New("missing conditions")
  29. }
  30. switch options.LogicalOptions.Action {
  31. case "", C.RuleActionTypeRoute:
  32. if options.LogicalOptions.RouteOptions.Server == "" && checkServer {
  33. return nil, E.New("missing server field")
  34. }
  35. }
  36. return NewLogicalDNSRule(ctx, logger, options.LogicalOptions)
  37. default:
  38. return nil, E.New("unknown rule type: ", options.Type)
  39. }
  40. }
  41. var _ adapter.DNSRule = (*DefaultDNSRule)(nil)
  42. type DefaultDNSRule struct {
  43. abstractDefaultRule
  44. }
  45. func NewDefaultDNSRule(ctx context.Context, logger log.ContextLogger, options option.DefaultDNSRule) (*DefaultDNSRule, error) {
  46. rule := &DefaultDNSRule{
  47. abstractDefaultRule: abstractDefaultRule{
  48. invert: options.Invert,
  49. action: NewDNSRuleAction(logger, options.DNSRuleAction),
  50. },
  51. }
  52. if len(options.Inbound) > 0 {
  53. item := NewInboundRule(options.Inbound)
  54. rule.items = append(rule.items, item)
  55. rule.allItems = append(rule.allItems, item)
  56. }
  57. router := service.FromContext[adapter.Router](ctx)
  58. networkManager := service.FromContext[adapter.NetworkManager](ctx)
  59. if options.IPVersion > 0 {
  60. switch options.IPVersion {
  61. case 4, 6:
  62. item := NewIPVersionItem(options.IPVersion == 6)
  63. rule.items = append(rule.items, item)
  64. rule.allItems = append(rule.allItems, item)
  65. default:
  66. return nil, E.New("invalid ip version: ", options.IPVersion)
  67. }
  68. }
  69. if len(options.QueryType) > 0 {
  70. item := NewQueryTypeItem(options.QueryType)
  71. rule.items = append(rule.items, item)
  72. rule.allItems = append(rule.allItems, item)
  73. }
  74. if len(options.Network) > 0 {
  75. item := NewNetworkItem(options.Network)
  76. rule.items = append(rule.items, item)
  77. rule.allItems = append(rule.allItems, item)
  78. }
  79. if len(options.AuthUser) > 0 {
  80. item := NewAuthUserItem(options.AuthUser)
  81. rule.items = append(rule.items, item)
  82. rule.allItems = append(rule.allItems, item)
  83. }
  84. if len(options.Protocol) > 0 {
  85. item := NewProtocolItem(options.Protocol)
  86. rule.items = append(rule.items, item)
  87. rule.allItems = append(rule.allItems, item)
  88. }
  89. if len(options.Domain) > 0 || len(options.DomainSuffix) > 0 {
  90. item, err := NewDomainItem(options.Domain, options.DomainSuffix)
  91. if err != nil {
  92. return nil, err
  93. }
  94. rule.destinationAddressItems = append(rule.destinationAddressItems, item)
  95. rule.allItems = append(rule.allItems, item)
  96. }
  97. if len(options.DomainKeyword) > 0 {
  98. item := NewDomainKeywordItem(options.DomainKeyword)
  99. rule.destinationAddressItems = append(rule.destinationAddressItems, item)
  100. rule.allItems = append(rule.allItems, item)
  101. }
  102. if len(options.DomainRegex) > 0 {
  103. item, err := NewDomainRegexItem(options.DomainRegex)
  104. if err != nil {
  105. return nil, E.Cause(err, "domain_regex")
  106. }
  107. rule.destinationAddressItems = append(rule.destinationAddressItems, item)
  108. rule.allItems = append(rule.allItems, item)
  109. }
  110. if len(options.Geosite) > 0 {
  111. return nil, E.New("geosite database is deprecated in sing-box 1.8.0 and removed in sing-box 1.12.0")
  112. }
  113. if len(options.SourceGeoIP) > 0 {
  114. return nil, E.New("geoip database is deprecated in sing-box 1.8.0 and removed in sing-box 1.12.0")
  115. }
  116. if len(options.GeoIP) > 0 {
  117. return nil, E.New("geoip database is deprecated in sing-box 1.8.0 and removed in sing-box 1.12.0")
  118. }
  119. if len(options.SourceIPCIDR) > 0 {
  120. item, err := NewIPCIDRItem(true, options.SourceIPCIDR)
  121. if err != nil {
  122. return nil, E.Cause(err, "source_ip_cidr")
  123. }
  124. rule.sourceAddressItems = append(rule.sourceAddressItems, item)
  125. rule.allItems = append(rule.allItems, item)
  126. }
  127. if len(options.IPCIDR) > 0 {
  128. item, err := NewIPCIDRItem(false, options.IPCIDR)
  129. if err != nil {
  130. return nil, E.Cause(err, "ip_cidr")
  131. }
  132. rule.destinationIPCIDRItems = append(rule.destinationIPCIDRItems, item)
  133. rule.allItems = append(rule.allItems, item)
  134. }
  135. if options.SourceIPIsPrivate {
  136. item := NewIPIsPrivateItem(true)
  137. rule.sourceAddressItems = append(rule.sourceAddressItems, item)
  138. rule.allItems = append(rule.allItems, item)
  139. }
  140. if options.IPIsPrivate {
  141. item := NewIPIsPrivateItem(false)
  142. rule.destinationIPCIDRItems = append(rule.destinationIPCIDRItems, item)
  143. rule.allItems = append(rule.allItems, item)
  144. }
  145. if options.IPAcceptAny {
  146. item := NewIPAcceptAnyItem()
  147. rule.destinationIPCIDRItems = append(rule.destinationIPCIDRItems, item)
  148. rule.allItems = append(rule.allItems, item)
  149. }
  150. if len(options.SourcePort) > 0 {
  151. item := NewPortItem(true, options.SourcePort)
  152. rule.sourcePortItems = append(rule.sourcePortItems, item)
  153. rule.allItems = append(rule.allItems, item)
  154. }
  155. if len(options.SourcePortRange) > 0 {
  156. item, err := NewPortRangeItem(true, options.SourcePortRange)
  157. if err != nil {
  158. return nil, E.Cause(err, "source_port_range")
  159. }
  160. rule.sourcePortItems = append(rule.sourcePortItems, item)
  161. rule.allItems = append(rule.allItems, item)
  162. }
  163. if len(options.Port) > 0 {
  164. item := NewPortItem(false, options.Port)
  165. rule.destinationPortItems = append(rule.destinationPortItems, item)
  166. rule.allItems = append(rule.allItems, item)
  167. }
  168. if len(options.PortRange) > 0 {
  169. item, err := NewPortRangeItem(false, options.PortRange)
  170. if err != nil {
  171. return nil, E.Cause(err, "port_range")
  172. }
  173. rule.destinationPortItems = append(rule.destinationPortItems, item)
  174. rule.allItems = append(rule.allItems, item)
  175. }
  176. if len(options.ProcessName) > 0 {
  177. item := NewProcessItem(options.ProcessName)
  178. rule.items = append(rule.items, item)
  179. rule.allItems = append(rule.allItems, item)
  180. }
  181. if len(options.ProcessPath) > 0 {
  182. item := NewProcessPathItem(options.ProcessPath)
  183. rule.items = append(rule.items, item)
  184. rule.allItems = append(rule.allItems, item)
  185. }
  186. if len(options.ProcessPathRegex) > 0 {
  187. item, err := NewProcessPathRegexItem(options.ProcessPathRegex)
  188. if err != nil {
  189. return nil, E.Cause(err, "process_path_regex")
  190. }
  191. rule.items = append(rule.items, item)
  192. rule.allItems = append(rule.allItems, item)
  193. }
  194. if len(options.PackageName) > 0 {
  195. item := NewPackageNameItem(options.PackageName)
  196. rule.items = append(rule.items, item)
  197. rule.allItems = append(rule.allItems, item)
  198. }
  199. if len(options.User) > 0 {
  200. item := NewUserItem(options.User)
  201. rule.items = append(rule.items, item)
  202. rule.allItems = append(rule.allItems, item)
  203. }
  204. if len(options.UserID) > 0 {
  205. item := NewUserIDItem(options.UserID)
  206. rule.items = append(rule.items, item)
  207. rule.allItems = append(rule.allItems, item)
  208. }
  209. if len(options.Outbound) > 0 {
  210. item := NewOutboundRule(ctx, options.Outbound)
  211. rule.items = append(rule.items, item)
  212. rule.allItems = append(rule.allItems, item)
  213. }
  214. if options.ClashMode != "" {
  215. item := NewClashModeItem(ctx, options.ClashMode)
  216. rule.items = append(rule.items, item)
  217. rule.allItems = append(rule.allItems, item)
  218. }
  219. if len(options.NetworkType) > 0 {
  220. item := NewNetworkTypeItem(networkManager, common.Map(options.NetworkType, option.InterfaceType.Build))
  221. rule.items = append(rule.items, item)
  222. rule.allItems = append(rule.allItems, item)
  223. }
  224. if options.NetworkIsExpensive {
  225. item := NewNetworkIsExpensiveItem(networkManager)
  226. rule.items = append(rule.items, item)
  227. rule.allItems = append(rule.allItems, item)
  228. }
  229. if options.NetworkIsConstrained {
  230. item := NewNetworkIsConstrainedItem(networkManager)
  231. rule.items = append(rule.items, item)
  232. rule.allItems = append(rule.allItems, item)
  233. }
  234. if len(options.WIFISSID) > 0 {
  235. item := NewWIFISSIDItem(networkManager, options.WIFISSID)
  236. rule.items = append(rule.items, item)
  237. rule.allItems = append(rule.allItems, item)
  238. }
  239. if len(options.WIFIBSSID) > 0 {
  240. item := NewWIFIBSSIDItem(networkManager, options.WIFIBSSID)
  241. rule.items = append(rule.items, item)
  242. rule.allItems = append(rule.allItems, item)
  243. }
  244. if len(options.RuleSet) > 0 {
  245. var matchSource bool
  246. if options.RuleSetIPCIDRMatchSource {
  247. matchSource = true
  248. } else
  249. //nolint:staticcheck
  250. if options.Deprecated_RulesetIPCIDRMatchSource {
  251. matchSource = true
  252. deprecated.Report(ctx, deprecated.OptionBadMatchSource)
  253. }
  254. item := NewRuleSetItem(router, options.RuleSet, matchSource, options.RuleSetIPCIDRAcceptEmpty)
  255. rule.items = append(rule.items, item)
  256. rule.allItems = append(rule.allItems, item)
  257. }
  258. return rule, nil
  259. }
  260. func (r *DefaultDNSRule) Action() adapter.RuleAction {
  261. return r.action
  262. }
  263. func (r *DefaultDNSRule) WithAddressLimit() bool {
  264. if len(r.destinationIPCIDRItems) > 0 {
  265. return true
  266. }
  267. for _, rawRule := range r.items {
  268. ruleSet, isRuleSet := rawRule.(*RuleSetItem)
  269. if !isRuleSet {
  270. continue
  271. }
  272. if ruleSet.ContainsDestinationIPCIDRRule() {
  273. return true
  274. }
  275. }
  276. return false
  277. }
  278. func (r *DefaultDNSRule) Match(metadata *adapter.InboundContext) bool {
  279. metadata.IgnoreDestinationIPCIDRMatch = true
  280. defer func() {
  281. metadata.IgnoreDestinationIPCIDRMatch = false
  282. }()
  283. return r.abstractDefaultRule.Match(metadata)
  284. }
  285. func (r *DefaultDNSRule) MatchAddressLimit(metadata *adapter.InboundContext) bool {
  286. return r.abstractDefaultRule.Match(metadata)
  287. }
  288. var _ adapter.DNSRule = (*LogicalDNSRule)(nil)
  289. type LogicalDNSRule struct {
  290. abstractLogicalRule
  291. }
  292. func NewLogicalDNSRule(ctx context.Context, logger log.ContextLogger, options option.LogicalDNSRule) (*LogicalDNSRule, error) {
  293. r := &LogicalDNSRule{
  294. abstractLogicalRule: abstractLogicalRule{
  295. rules: make([]adapter.HeadlessRule, len(options.Rules)),
  296. invert: options.Invert,
  297. action: NewDNSRuleAction(logger, options.DNSRuleAction),
  298. },
  299. }
  300. switch options.Mode {
  301. case C.LogicalTypeAnd:
  302. r.mode = C.LogicalTypeAnd
  303. case C.LogicalTypeOr:
  304. r.mode = C.LogicalTypeOr
  305. default:
  306. return nil, E.New("unknown logical mode: ", options.Mode)
  307. }
  308. for i, subRule := range options.Rules {
  309. rule, err := NewDNSRule(ctx, logger, subRule, false)
  310. if err != nil {
  311. return nil, E.Cause(err, "sub rule[", i, "]")
  312. }
  313. r.rules[i] = rule
  314. }
  315. return r, nil
  316. }
  317. func (r *LogicalDNSRule) Action() adapter.RuleAction {
  318. return r.action
  319. }
  320. func (r *LogicalDNSRule) WithAddressLimit() bool {
  321. for _, rawRule := range r.rules {
  322. switch rule := rawRule.(type) {
  323. case *DefaultDNSRule:
  324. if rule.WithAddressLimit() {
  325. return true
  326. }
  327. case *LogicalDNSRule:
  328. if rule.WithAddressLimit() {
  329. return true
  330. }
  331. }
  332. }
  333. return false
  334. }
  335. func (r *LogicalDNSRule) Match(metadata *adapter.InboundContext) bool {
  336. if r.mode == C.LogicalTypeAnd {
  337. return common.All(r.rules, func(it adapter.HeadlessRule) bool {
  338. metadata.ResetRuleCache()
  339. return it.(adapter.DNSRule).Match(metadata)
  340. }) != r.invert
  341. } else {
  342. return common.Any(r.rules, func(it adapter.HeadlessRule) bool {
  343. metadata.ResetRuleCache()
  344. return it.(adapter.DNSRule).Match(metadata)
  345. }) != r.invert
  346. }
  347. }
  348. func (r *LogicalDNSRule) MatchAddressLimit(metadata *adapter.InboundContext) bool {
  349. if r.mode == C.LogicalTypeAnd {
  350. return common.All(r.rules, func(it adapter.HeadlessRule) bool {
  351. metadata.ResetRuleCache()
  352. return it.(adapter.DNSRule).MatchAddressLimit(metadata)
  353. }) != r.invert
  354. } else {
  355. return common.Any(r.rules, func(it adapter.HeadlessRule) bool {
  356. metadata.ResetRuleCache()
  357. return it.(adapter.DNSRule).MatchAddressLimit(metadata)
  358. }) != r.invert
  359. }
  360. }