rule_dns.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378
  1. package rule
  2. import (
  3. "context"
  4. "github.com/sagernet/sing-box/adapter"
  5. C "github.com/sagernet/sing-box/constant"
  6. "github.com/sagernet/sing-box/experimental/deprecated"
  7. "github.com/sagernet/sing-box/log"
  8. "github.com/sagernet/sing-box/option"
  9. "github.com/sagernet/sing/common"
  10. E "github.com/sagernet/sing/common/exceptions"
  11. "github.com/sagernet/sing/service"
  12. )
  13. func NewDNSRule(ctx context.Context, logger log.ContextLogger, options option.DNSRule, checkServer bool) (adapter.DNSRule, error) {
  14. switch options.Type {
  15. case "", C.RuleTypeDefault:
  16. if !options.DefaultOptions.IsValid() {
  17. return nil, E.New("missing conditions")
  18. }
  19. switch options.DefaultOptions.Action {
  20. case "", C.RuleActionTypeRoute:
  21. if options.DefaultOptions.RouteOptions.Server == "" && checkServer {
  22. return nil, E.New("missing server field")
  23. }
  24. }
  25. return NewDefaultDNSRule(ctx, logger, options.DefaultOptions)
  26. case C.RuleTypeLogical:
  27. if !options.LogicalOptions.IsValid() {
  28. return nil, E.New("missing conditions")
  29. }
  30. switch options.LogicalOptions.Action {
  31. case "", C.RuleActionTypeRoute:
  32. if options.LogicalOptions.RouteOptions.Server == "" && checkServer {
  33. return nil, E.New("missing server field")
  34. }
  35. }
  36. return NewLogicalDNSRule(ctx, logger, options.LogicalOptions)
  37. default:
  38. return nil, E.New("unknown rule type: ", options.Type)
  39. }
  40. }
  41. var _ adapter.DNSRule = (*DefaultDNSRule)(nil)
  42. type DefaultDNSRule struct {
  43. abstractDefaultRule
  44. }
  45. func NewDefaultDNSRule(ctx context.Context, logger log.ContextLogger, options option.DefaultDNSRule) (*DefaultDNSRule, error) {
  46. rule := &DefaultDNSRule{
  47. abstractDefaultRule: abstractDefaultRule{
  48. invert: options.Invert,
  49. action: NewDNSRuleAction(logger, options.DNSRuleAction),
  50. },
  51. }
  52. if len(options.Inbound) > 0 {
  53. item := NewInboundRule(options.Inbound)
  54. rule.items = append(rule.items, item)
  55. rule.allItems = append(rule.allItems, item)
  56. }
  57. router := service.FromContext[adapter.Router](ctx)
  58. networkManager := service.FromContext[adapter.NetworkManager](ctx)
  59. if options.IPVersion > 0 {
  60. switch options.IPVersion {
  61. case 4, 6:
  62. item := NewIPVersionItem(options.IPVersion == 6)
  63. rule.items = append(rule.items, item)
  64. rule.allItems = append(rule.allItems, item)
  65. default:
  66. return nil, E.New("invalid ip version: ", options.IPVersion)
  67. }
  68. }
  69. if len(options.QueryType) > 0 {
  70. item := NewQueryTypeItem(options.QueryType)
  71. rule.items = append(rule.items, item)
  72. rule.allItems = append(rule.allItems, item)
  73. }
  74. if len(options.Network) > 0 {
  75. item := NewNetworkItem(options.Network)
  76. rule.items = append(rule.items, item)
  77. rule.allItems = append(rule.allItems, item)
  78. }
  79. if len(options.AuthUser) > 0 {
  80. item := NewAuthUserItem(options.AuthUser)
  81. rule.items = append(rule.items, item)
  82. rule.allItems = append(rule.allItems, item)
  83. }
  84. if len(options.Protocol) > 0 {
  85. item := NewProtocolItem(options.Protocol)
  86. rule.items = append(rule.items, item)
  87. rule.allItems = append(rule.allItems, item)
  88. }
  89. if len(options.Domain) > 0 || len(options.DomainSuffix) > 0 {
  90. item, err := NewDomainItem(options.Domain, options.DomainSuffix)
  91. if err != nil {
  92. return nil, err
  93. }
  94. rule.destinationAddressItems = append(rule.destinationAddressItems, item)
  95. rule.allItems = append(rule.allItems, item)
  96. }
  97. if len(options.DomainKeyword) > 0 {
  98. item := NewDomainKeywordItem(options.DomainKeyword)
  99. rule.destinationAddressItems = append(rule.destinationAddressItems, item)
  100. rule.allItems = append(rule.allItems, item)
  101. }
  102. if len(options.DomainRegex) > 0 {
  103. item, err := NewDomainRegexItem(options.DomainRegex)
  104. if err != nil {
  105. return nil, E.Cause(err, "domain_regex")
  106. }
  107. rule.destinationAddressItems = append(rule.destinationAddressItems, item)
  108. rule.allItems = append(rule.allItems, item)
  109. }
  110. if len(options.Geosite) > 0 {
  111. item := NewGeositeItem(router, logger, options.Geosite)
  112. rule.destinationAddressItems = append(rule.destinationAddressItems, item)
  113. rule.allItems = append(rule.allItems, item)
  114. }
  115. if len(options.SourceGeoIP) > 0 {
  116. item := NewGeoIPItem(router, logger, true, options.SourceGeoIP)
  117. rule.sourceAddressItems = append(rule.sourceAddressItems, item)
  118. rule.allItems = append(rule.allItems, item)
  119. }
  120. if len(options.GeoIP) > 0 {
  121. item := NewGeoIPItem(router, logger, false, options.GeoIP)
  122. rule.destinationIPCIDRItems = append(rule.destinationIPCIDRItems, item)
  123. rule.allItems = append(rule.allItems, item)
  124. }
  125. if len(options.SourceIPCIDR) > 0 {
  126. item, err := NewIPCIDRItem(true, options.SourceIPCIDR)
  127. if err != nil {
  128. return nil, E.Cause(err, "source_ip_cidr")
  129. }
  130. rule.sourceAddressItems = append(rule.sourceAddressItems, item)
  131. rule.allItems = append(rule.allItems, item)
  132. }
  133. if len(options.IPCIDR) > 0 {
  134. item, err := NewIPCIDRItem(false, options.IPCIDR)
  135. if err != nil {
  136. return nil, E.Cause(err, "ip_cidr")
  137. }
  138. rule.destinationIPCIDRItems = append(rule.destinationIPCIDRItems, item)
  139. rule.allItems = append(rule.allItems, item)
  140. }
  141. if options.SourceIPIsPrivate {
  142. item := NewIPIsPrivateItem(true)
  143. rule.sourceAddressItems = append(rule.sourceAddressItems, item)
  144. rule.allItems = append(rule.allItems, item)
  145. }
  146. if options.IPIsPrivate {
  147. item := NewIPIsPrivateItem(false)
  148. rule.destinationIPCIDRItems = append(rule.destinationIPCIDRItems, item)
  149. rule.allItems = append(rule.allItems, item)
  150. }
  151. if len(options.SourcePort) > 0 {
  152. item := NewPortItem(true, options.SourcePort)
  153. rule.sourcePortItems = append(rule.sourcePortItems, item)
  154. rule.allItems = append(rule.allItems, item)
  155. }
  156. if len(options.SourcePortRange) > 0 {
  157. item, err := NewPortRangeItem(true, options.SourcePortRange)
  158. if err != nil {
  159. return nil, E.Cause(err, "source_port_range")
  160. }
  161. rule.sourcePortItems = append(rule.sourcePortItems, item)
  162. rule.allItems = append(rule.allItems, item)
  163. }
  164. if len(options.Port) > 0 {
  165. item := NewPortItem(false, options.Port)
  166. rule.destinationPortItems = append(rule.destinationPortItems, item)
  167. rule.allItems = append(rule.allItems, item)
  168. }
  169. if len(options.PortRange) > 0 {
  170. item, err := NewPortRangeItem(false, options.PortRange)
  171. if err != nil {
  172. return nil, E.Cause(err, "port_range")
  173. }
  174. rule.destinationPortItems = append(rule.destinationPortItems, item)
  175. rule.allItems = append(rule.allItems, item)
  176. }
  177. if len(options.ProcessName) > 0 {
  178. item := NewProcessItem(options.ProcessName)
  179. rule.items = append(rule.items, item)
  180. rule.allItems = append(rule.allItems, item)
  181. }
  182. if len(options.ProcessPath) > 0 {
  183. item := NewProcessPathItem(options.ProcessPath)
  184. rule.items = append(rule.items, item)
  185. rule.allItems = append(rule.allItems, item)
  186. }
  187. if len(options.ProcessPathRegex) > 0 {
  188. item, err := NewProcessPathRegexItem(options.ProcessPathRegex)
  189. if err != nil {
  190. return nil, E.Cause(err, "process_path_regex")
  191. }
  192. rule.items = append(rule.items, item)
  193. rule.allItems = append(rule.allItems, item)
  194. }
  195. if len(options.PackageName) > 0 {
  196. item := NewPackageNameItem(options.PackageName)
  197. rule.items = append(rule.items, item)
  198. rule.allItems = append(rule.allItems, item)
  199. }
  200. if len(options.User) > 0 {
  201. item := NewUserItem(options.User)
  202. rule.items = append(rule.items, item)
  203. rule.allItems = append(rule.allItems, item)
  204. }
  205. if len(options.UserID) > 0 {
  206. item := NewUserIDItem(options.UserID)
  207. rule.items = append(rule.items, item)
  208. rule.allItems = append(rule.allItems, item)
  209. }
  210. if len(options.Outbound) > 0 {
  211. item := NewOutboundRule(options.Outbound)
  212. rule.items = append(rule.items, item)
  213. rule.allItems = append(rule.allItems, item)
  214. }
  215. if options.ClashMode != "" {
  216. item := NewClashModeItem(ctx, options.ClashMode)
  217. rule.items = append(rule.items, item)
  218. rule.allItems = append(rule.allItems, item)
  219. }
  220. if len(options.NetworkType) > 0 {
  221. item := NewNetworkTypeItem(networkManager, common.Map(options.NetworkType, option.InterfaceType.Build))
  222. rule.items = append(rule.items, item)
  223. rule.allItems = append(rule.allItems, item)
  224. }
  225. if options.NetworkIsExpensive {
  226. item := NewNetworkIsExpensiveItem(networkManager)
  227. rule.items = append(rule.items, item)
  228. rule.allItems = append(rule.allItems, item)
  229. }
  230. if options.NetworkIsConstrained {
  231. item := NewNetworkIsConstrainedItem(networkManager)
  232. rule.items = append(rule.items, item)
  233. rule.allItems = append(rule.allItems, item)
  234. }
  235. if len(options.WIFISSID) > 0 {
  236. item := NewWIFISSIDItem(networkManager, options.WIFISSID)
  237. rule.items = append(rule.items, item)
  238. rule.allItems = append(rule.allItems, item)
  239. }
  240. if len(options.WIFIBSSID) > 0 {
  241. item := NewWIFIBSSIDItem(networkManager, options.WIFIBSSID)
  242. rule.items = append(rule.items, item)
  243. rule.allItems = append(rule.allItems, item)
  244. }
  245. if len(options.RuleSet) > 0 {
  246. var matchSource bool
  247. if options.RuleSetIPCIDRMatchSource {
  248. matchSource = true
  249. } else
  250. //nolint:staticcheck
  251. if options.Deprecated_RulesetIPCIDRMatchSource {
  252. matchSource = true
  253. deprecated.Report(ctx, deprecated.OptionBadMatchSource)
  254. }
  255. item := NewRuleSetItem(router, options.RuleSet, matchSource, options.RuleSetIPCIDRAcceptEmpty)
  256. rule.items = append(rule.items, item)
  257. rule.allItems = append(rule.allItems, item)
  258. }
  259. return rule, nil
  260. }
  261. func (r *DefaultDNSRule) Action() adapter.RuleAction {
  262. return r.action
  263. }
  264. func (r *DefaultDNSRule) WithAddressLimit() bool {
  265. if len(r.destinationIPCIDRItems) > 0 {
  266. return true
  267. }
  268. for _, rawRule := range r.items {
  269. ruleSet, isRuleSet := rawRule.(*RuleSetItem)
  270. if !isRuleSet {
  271. continue
  272. }
  273. if ruleSet.ContainsDestinationIPCIDRRule() {
  274. return true
  275. }
  276. }
  277. return false
  278. }
  279. func (r *DefaultDNSRule) Match(metadata *adapter.InboundContext) bool {
  280. metadata.IgnoreDestinationIPCIDRMatch = true
  281. defer func() {
  282. metadata.IgnoreDestinationIPCIDRMatch = false
  283. }()
  284. return r.abstractDefaultRule.Match(metadata)
  285. }
  286. func (r *DefaultDNSRule) MatchAddressLimit(metadata *adapter.InboundContext) bool {
  287. return r.abstractDefaultRule.Match(metadata)
  288. }
  289. var _ adapter.DNSRule = (*LogicalDNSRule)(nil)
  290. type LogicalDNSRule struct {
  291. abstractLogicalRule
  292. }
  293. func NewLogicalDNSRule(ctx context.Context, logger log.ContextLogger, options option.LogicalDNSRule) (*LogicalDNSRule, error) {
  294. r := &LogicalDNSRule{
  295. abstractLogicalRule: abstractLogicalRule{
  296. rules: make([]adapter.HeadlessRule, len(options.Rules)),
  297. invert: options.Invert,
  298. action: NewDNSRuleAction(logger, options.DNSRuleAction),
  299. },
  300. }
  301. switch options.Mode {
  302. case C.LogicalTypeAnd:
  303. r.mode = C.LogicalTypeAnd
  304. case C.LogicalTypeOr:
  305. r.mode = C.LogicalTypeOr
  306. default:
  307. return nil, E.New("unknown logical mode: ", options.Mode)
  308. }
  309. for i, subRule := range options.Rules {
  310. rule, err := NewDNSRule(ctx, logger, subRule, false)
  311. if err != nil {
  312. return nil, E.Cause(err, "sub rule[", i, "]")
  313. }
  314. r.rules[i] = rule
  315. }
  316. return r, nil
  317. }
  318. func (r *LogicalDNSRule) Action() adapter.RuleAction {
  319. return r.action
  320. }
  321. func (r *LogicalDNSRule) WithAddressLimit() bool {
  322. for _, rawRule := range r.rules {
  323. switch rule := rawRule.(type) {
  324. case *DefaultDNSRule:
  325. if rule.WithAddressLimit() {
  326. return true
  327. }
  328. case *LogicalDNSRule:
  329. if rule.WithAddressLimit() {
  330. return true
  331. }
  332. }
  333. }
  334. return false
  335. }
  336. func (r *LogicalDNSRule) Match(metadata *adapter.InboundContext) bool {
  337. if r.mode == C.LogicalTypeAnd {
  338. return common.All(r.rules, func(it adapter.HeadlessRule) bool {
  339. metadata.ResetRuleCache()
  340. return it.(adapter.DNSRule).Match(metadata)
  341. }) != r.invert
  342. } else {
  343. return common.Any(r.rules, func(it adapter.HeadlessRule) bool {
  344. metadata.ResetRuleCache()
  345. return it.(adapter.DNSRule).Match(metadata)
  346. }) != r.invert
  347. }
  348. }
  349. func (r *LogicalDNSRule) MatchAddressLimit(metadata *adapter.InboundContext) bool {
  350. if r.mode == C.LogicalTypeAnd {
  351. return common.All(r.rules, func(it adapter.HeadlessRule) bool {
  352. metadata.ResetRuleCache()
  353. return it.(adapter.DNSRule).MatchAddressLimit(metadata)
  354. }) != r.invert
  355. } else {
  356. return common.Any(r.rules, func(it adapter.HeadlessRule) bool {
  357. metadata.ResetRuleCache()
  358. return it.(adapter.DNSRule).MatchAddressLimit(metadata)
  359. }) != r.invert
  360. }
  361. }