rule_action.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365
  1. package rule
  2. import (
  3. "context"
  4. "net/netip"
  5. "strings"
  6. "sync"
  7. "syscall"
  8. "time"
  9. "github.com/sagernet/sing-box/adapter"
  10. "github.com/sagernet/sing-box/common/dialer"
  11. "github.com/sagernet/sing-box/common/sniff"
  12. C "github.com/sagernet/sing-box/constant"
  13. "github.com/sagernet/sing-box/option"
  14. "github.com/sagernet/sing-dns"
  15. "github.com/sagernet/sing-tun"
  16. "github.com/sagernet/sing/common"
  17. E "github.com/sagernet/sing/common/exceptions"
  18. F "github.com/sagernet/sing/common/format"
  19. "github.com/sagernet/sing/common/logger"
  20. M "github.com/sagernet/sing/common/metadata"
  21. N "github.com/sagernet/sing/common/network"
  22. )
  23. func NewRuleAction(ctx context.Context, logger logger.ContextLogger, action option.RuleAction) (adapter.RuleAction, error) {
  24. switch action.Action {
  25. case "":
  26. return nil, nil
  27. case C.RuleActionTypeRoute:
  28. return &RuleActionRoute{
  29. Outbound: action.RouteOptions.Outbound,
  30. RuleActionRouteOptions: RuleActionRouteOptions{
  31. OverrideAddress: M.ParseSocksaddrHostPort(action.RouteOptions.OverrideAddress, 0),
  32. OverridePort: action.RouteOptions.OverridePort,
  33. NetworkStrategy: C.NetworkStrategy(action.RouteOptions.NetworkStrategy),
  34. FallbackDelay: time.Duration(action.RouteOptions.FallbackDelay),
  35. UDPDisableDomainUnmapping: action.RouteOptions.UDPDisableDomainUnmapping,
  36. UDPConnect: action.RouteOptions.UDPConnect,
  37. },
  38. }, nil
  39. case C.RuleActionTypeRouteOptions:
  40. return &RuleActionRouteOptions{
  41. OverrideAddress: M.ParseSocksaddrHostPort(action.RouteOptionsOptions.OverrideAddress, 0),
  42. OverridePort: action.RouteOptionsOptions.OverridePort,
  43. NetworkStrategy: C.NetworkStrategy(action.RouteOptionsOptions.NetworkStrategy),
  44. FallbackDelay: time.Duration(action.RouteOptionsOptions.FallbackDelay),
  45. UDPDisableDomainUnmapping: action.RouteOptionsOptions.UDPDisableDomainUnmapping,
  46. UDPConnect: action.RouteOptionsOptions.UDPConnect,
  47. UDPTimeout: time.Duration(action.RouteOptionsOptions.UDPTimeout),
  48. }, nil
  49. case C.RuleActionTypeDirect:
  50. directDialer, err := dialer.New(ctx, option.DialerOptions(action.DirectOptions))
  51. if err != nil {
  52. return nil, err
  53. }
  54. var description string
  55. descriptions := action.DirectOptions.Descriptions()
  56. switch len(descriptions) {
  57. case 0:
  58. case 1:
  59. description = F.ToString("(", descriptions[0], ")")
  60. case 2:
  61. description = F.ToString("(", descriptions[0], ",", descriptions[1], ")")
  62. default:
  63. description = F.ToString("(", descriptions[0], ",", descriptions[1], ",...)")
  64. }
  65. return &RuleActionDirect{
  66. Dialer: directDialer,
  67. description: description,
  68. }, nil
  69. case C.RuleActionTypeReject:
  70. return &RuleActionReject{
  71. Method: action.RejectOptions.Method,
  72. NoDrop: action.RejectOptions.NoDrop,
  73. logger: logger,
  74. }, nil
  75. case C.RuleActionTypeHijackDNS:
  76. return &RuleActionHijackDNS{}, nil
  77. case C.RuleActionTypeSniff:
  78. sniffAction := &RuleActionSniff{
  79. snifferNames: action.SniffOptions.Sniffer,
  80. Timeout: time.Duration(action.SniffOptions.Timeout),
  81. }
  82. return sniffAction, sniffAction.build()
  83. case C.RuleActionTypeResolve:
  84. return &RuleActionResolve{
  85. Strategy: dns.DomainStrategy(action.ResolveOptions.Strategy),
  86. Server: action.ResolveOptions.Server,
  87. }, nil
  88. default:
  89. panic(F.ToString("unknown rule action: ", action.Action))
  90. }
  91. }
  92. func NewDNSRuleAction(logger logger.ContextLogger, action option.DNSRuleAction) adapter.RuleAction {
  93. switch action.Action {
  94. case "":
  95. return nil
  96. case C.RuleActionTypeRoute:
  97. return &RuleActionDNSRoute{
  98. Server: action.RouteOptions.Server,
  99. RuleActionDNSRouteOptions: RuleActionDNSRouteOptions{
  100. DisableCache: action.RouteOptions.DisableCache,
  101. RewriteTTL: action.RouteOptions.RewriteTTL,
  102. ClientSubnet: netip.Prefix(common.PtrValueOrDefault(action.RouteOptions.ClientSubnet)),
  103. },
  104. }
  105. case C.RuleActionTypeRouteOptions:
  106. return &RuleActionDNSRouteOptions{
  107. DisableCache: action.RouteOptionsOptions.DisableCache,
  108. RewriteTTL: action.RouteOptionsOptions.RewriteTTL,
  109. ClientSubnet: netip.Prefix(common.PtrValueOrDefault(action.RouteOptionsOptions.ClientSubnet)),
  110. }
  111. case C.RuleActionTypeReject:
  112. return &RuleActionReject{
  113. Method: action.RejectOptions.Method,
  114. NoDrop: action.RejectOptions.NoDrop,
  115. logger: logger,
  116. }
  117. default:
  118. panic(F.ToString("unknown rule action: ", action.Action))
  119. }
  120. }
  121. type RuleActionRoute struct {
  122. Outbound string
  123. RuleActionRouteOptions
  124. }
  125. func (r *RuleActionRoute) Type() string {
  126. return C.RuleActionTypeRoute
  127. }
  128. func (r *RuleActionRoute) String() string {
  129. var descriptions []string
  130. descriptions = append(descriptions, r.Outbound)
  131. if r.UDPDisableDomainUnmapping {
  132. descriptions = append(descriptions, "udp-disable-domain-unmapping")
  133. }
  134. if r.UDPConnect {
  135. descriptions = append(descriptions, "udp-connect")
  136. }
  137. return F.ToString("route(", strings.Join(descriptions, ","), ")")
  138. }
  139. type RuleActionRouteOptions struct {
  140. OverrideAddress M.Socksaddr
  141. OverridePort uint16
  142. NetworkStrategy C.NetworkStrategy
  143. NetworkType []C.InterfaceType
  144. FallbackNetworkType []C.InterfaceType
  145. FallbackDelay time.Duration
  146. UDPDisableDomainUnmapping bool
  147. UDPConnect bool
  148. UDPTimeout time.Duration
  149. }
  150. func (r *RuleActionRouteOptions) Type() string {
  151. return C.RuleActionTypeRouteOptions
  152. }
  153. func (r *RuleActionRouteOptions) String() string {
  154. var descriptions []string
  155. if r.UDPDisableDomainUnmapping {
  156. descriptions = append(descriptions, "udp-disable-domain-unmapping")
  157. }
  158. if r.UDPConnect {
  159. descriptions = append(descriptions, "udp-connect")
  160. }
  161. return F.ToString("route-options(", strings.Join(descriptions, ","), ")")
  162. }
  163. type RuleActionDNSRoute struct {
  164. Server string
  165. RuleActionDNSRouteOptions
  166. }
  167. func (r *RuleActionDNSRoute) Type() string {
  168. return C.RuleActionTypeRoute
  169. }
  170. func (r *RuleActionDNSRoute) String() string {
  171. var descriptions []string
  172. descriptions = append(descriptions, r.Server)
  173. if r.DisableCache {
  174. descriptions = append(descriptions, "disable-cache")
  175. }
  176. if r.RewriteTTL != nil {
  177. descriptions = append(descriptions, F.ToString("rewrite-ttl=", *r.RewriteTTL))
  178. }
  179. if r.ClientSubnet.IsValid() {
  180. descriptions = append(descriptions, F.ToString("client-subnet=", r.ClientSubnet))
  181. }
  182. return F.ToString("route(", strings.Join(descriptions, ","), ")")
  183. }
  184. type RuleActionDNSRouteOptions struct {
  185. DisableCache bool
  186. RewriteTTL *uint32
  187. ClientSubnet netip.Prefix
  188. }
  189. func (r *RuleActionDNSRouteOptions) Type() string {
  190. return C.RuleActionTypeRouteOptions
  191. }
  192. func (r *RuleActionDNSRouteOptions) String() string {
  193. var descriptions []string
  194. if r.DisableCache {
  195. descriptions = append(descriptions, "disable-cache")
  196. }
  197. if r.RewriteTTL != nil {
  198. descriptions = append(descriptions, F.ToString("rewrite-ttl=", *r.RewriteTTL))
  199. }
  200. if r.ClientSubnet.IsValid() {
  201. descriptions = append(descriptions, F.ToString("client-subnet=", r.ClientSubnet))
  202. }
  203. return F.ToString("route-options(", strings.Join(descriptions, ","), ")")
  204. }
  205. type RuleActionDirect struct {
  206. Dialer N.Dialer
  207. description string
  208. }
  209. func (r *RuleActionDirect) Type() string {
  210. return C.RuleActionTypeDirect
  211. }
  212. func (r *RuleActionDirect) String() string {
  213. return "direct" + r.description
  214. }
  215. type RuleActionReject struct {
  216. Method string
  217. NoDrop bool
  218. logger logger.ContextLogger
  219. dropAccess sync.Mutex
  220. dropCounter []time.Time
  221. }
  222. func (r *RuleActionReject) Type() string {
  223. return C.RuleActionTypeReject
  224. }
  225. func (r *RuleActionReject) String() string {
  226. if r.Method == C.RuleActionRejectMethodDefault {
  227. return "reject"
  228. }
  229. return F.ToString("reject(", r.Method, ")")
  230. }
  231. func (r *RuleActionReject) Error(ctx context.Context) error {
  232. var returnErr error
  233. switch r.Method {
  234. case C.RuleActionRejectMethodDefault:
  235. returnErr = syscall.ECONNREFUSED
  236. case C.RuleActionRejectMethodDrop:
  237. return tun.ErrDrop
  238. default:
  239. panic(F.ToString("unknown reject method: ", r.Method))
  240. }
  241. r.dropAccess.Lock()
  242. defer r.dropAccess.Unlock()
  243. timeNow := time.Now()
  244. r.dropCounter = common.Filter(r.dropCounter, func(t time.Time) bool {
  245. return timeNow.Sub(t) <= 30*time.Second
  246. })
  247. r.dropCounter = append(r.dropCounter, timeNow)
  248. if len(r.dropCounter) > 50 {
  249. if ctx != nil {
  250. r.logger.DebugContext(ctx, "dropped due to flooding")
  251. }
  252. return tun.ErrDrop
  253. }
  254. return returnErr
  255. }
  256. type RuleActionHijackDNS struct{}
  257. func (r *RuleActionHijackDNS) Type() string {
  258. return C.RuleActionTypeHijackDNS
  259. }
  260. func (r *RuleActionHijackDNS) String() string {
  261. return "hijack-dns"
  262. }
  263. type RuleActionSniff struct {
  264. snifferNames []string
  265. StreamSniffers []sniff.StreamSniffer
  266. PacketSniffers []sniff.PacketSniffer
  267. Timeout time.Duration
  268. // Deprecated
  269. OverrideDestination bool
  270. }
  271. func (r *RuleActionSniff) Type() string {
  272. return C.RuleActionTypeSniff
  273. }
  274. func (r *RuleActionSniff) build() error {
  275. for _, name := range r.snifferNames {
  276. switch name {
  277. case C.ProtocolTLS:
  278. r.StreamSniffers = append(r.StreamSniffers, sniff.TLSClientHello)
  279. case C.ProtocolHTTP:
  280. r.StreamSniffers = append(r.StreamSniffers, sniff.HTTPHost)
  281. case C.ProtocolQUIC:
  282. r.PacketSniffers = append(r.PacketSniffers, sniff.QUICClientHello)
  283. case C.ProtocolDNS:
  284. r.StreamSniffers = append(r.StreamSniffers, sniff.StreamDomainNameQuery)
  285. r.PacketSniffers = append(r.PacketSniffers, sniff.DomainNameQuery)
  286. case C.ProtocolSTUN:
  287. r.PacketSniffers = append(r.PacketSniffers, sniff.STUNMessage)
  288. case C.ProtocolBitTorrent:
  289. r.StreamSniffers = append(r.StreamSniffers, sniff.BitTorrent)
  290. r.PacketSniffers = append(r.PacketSniffers, sniff.UTP)
  291. r.PacketSniffers = append(r.PacketSniffers, sniff.UDPTracker)
  292. case C.ProtocolDTLS:
  293. r.PacketSniffers = append(r.PacketSniffers, sniff.DTLSRecord)
  294. case C.ProtocolSSH:
  295. r.StreamSniffers = append(r.StreamSniffers, sniff.SSH)
  296. case C.ProtocolRDP:
  297. r.StreamSniffers = append(r.StreamSniffers, sniff.RDP)
  298. default:
  299. return E.New("unknown sniffer: ", name)
  300. }
  301. }
  302. return nil
  303. }
  304. func (r *RuleActionSniff) String() string {
  305. if len(r.snifferNames) == 0 && r.Timeout == 0 {
  306. return "sniff"
  307. } else if len(r.snifferNames) > 0 && r.Timeout == 0 {
  308. return F.ToString("sniff(", strings.Join(r.snifferNames, ","), ")")
  309. } else if len(r.snifferNames) == 0 && r.Timeout > 0 {
  310. return F.ToString("sniff(", r.Timeout.String(), ")")
  311. } else {
  312. return F.ToString("sniff(", strings.Join(r.snifferNames, ","), ",", r.Timeout.String(), ")")
  313. }
  314. }
  315. type RuleActionResolve struct {
  316. Strategy dns.DomainStrategy
  317. Server string
  318. }
  319. func (r *RuleActionResolve) Type() string {
  320. return C.RuleActionTypeResolve
  321. }
  322. func (r *RuleActionResolve) String() string {
  323. if r.Strategy == dns.DomainStrategyAsIS && r.Server == "" {
  324. return F.ToString("resolve")
  325. } else if r.Strategy != dns.DomainStrategyAsIS && r.Server == "" {
  326. return F.ToString("resolve(", option.DomainStrategy(r.Strategy).String(), ")")
  327. } else if r.Strategy == dns.DomainStrategyAsIS && r.Server != "" {
  328. return F.ToString("resolve(", r.Server, ")")
  329. } else {
  330. return F.ToString("resolve(", option.DomainStrategy(r.Strategy).String(), ",", r.Server, ")")
  331. }
  332. }