rule_default.go 9.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297
  1. package rule
  2. import (
  3. "context"
  4. "github.com/sagernet/sing-box/adapter"
  5. C "github.com/sagernet/sing-box/constant"
  6. "github.com/sagernet/sing-box/experimental/deprecated"
  7. "github.com/sagernet/sing-box/log"
  8. "github.com/sagernet/sing-box/option"
  9. "github.com/sagernet/sing/common"
  10. E "github.com/sagernet/sing/common/exceptions"
  11. "github.com/sagernet/sing/service"
  12. )
  13. func NewRule(ctx context.Context, logger log.ContextLogger, options option.Rule, checkOutbound bool) (adapter.Rule, error) {
  14. switch options.Type {
  15. case "", C.RuleTypeDefault:
  16. if !options.DefaultOptions.IsValid() {
  17. return nil, E.New("missing conditions")
  18. }
  19. switch options.DefaultOptions.Action {
  20. case "", C.RuleActionTypeRoute:
  21. if options.DefaultOptions.RouteOptions.Outbound == "" && checkOutbound {
  22. return nil, E.New("missing outbound field")
  23. }
  24. }
  25. return NewDefaultRule(ctx, logger, options.DefaultOptions)
  26. case C.RuleTypeLogical:
  27. if !options.LogicalOptions.IsValid() {
  28. return nil, E.New("missing conditions")
  29. }
  30. switch options.LogicalOptions.Action {
  31. case "", C.RuleActionTypeRoute:
  32. if options.LogicalOptions.RouteOptions.Outbound == "" && checkOutbound {
  33. return nil, E.New("missing outbound field")
  34. }
  35. }
  36. return NewLogicalRule(ctx, logger, options.LogicalOptions)
  37. default:
  38. return nil, E.New("unknown rule type: ", options.Type)
  39. }
  40. }
  41. var _ adapter.Rule = (*DefaultRule)(nil)
  42. type DefaultRule struct {
  43. abstractDefaultRule
  44. }
  45. type RuleItem interface {
  46. Match(metadata *adapter.InboundContext) bool
  47. String() string
  48. }
  49. func NewDefaultRule(ctx context.Context, logger log.ContextLogger, options option.DefaultRule) (*DefaultRule, error) {
  50. action, err := NewRuleAction(ctx, logger, options.RuleAction)
  51. if err != nil {
  52. return nil, E.Cause(err, "action")
  53. }
  54. rule := &DefaultRule{
  55. abstractDefaultRule{
  56. invert: options.Invert,
  57. action: action,
  58. },
  59. }
  60. router := service.FromContext[adapter.Router](ctx)
  61. networkManager := service.FromContext[adapter.NetworkManager](ctx)
  62. if len(options.Inbound) > 0 {
  63. item := NewInboundRule(options.Inbound)
  64. rule.items = append(rule.items, item)
  65. rule.allItems = append(rule.allItems, item)
  66. }
  67. if options.IPVersion > 0 {
  68. switch options.IPVersion {
  69. case 4, 6:
  70. item := NewIPVersionItem(options.IPVersion == 6)
  71. rule.items = append(rule.items, item)
  72. rule.allItems = append(rule.allItems, item)
  73. default:
  74. return nil, E.New("invalid ip version: ", options.IPVersion)
  75. }
  76. }
  77. if len(options.Network) > 0 {
  78. item := NewNetworkItem(options.Network)
  79. rule.items = append(rule.items, item)
  80. rule.allItems = append(rule.allItems, item)
  81. }
  82. if len(options.AuthUser) > 0 {
  83. item := NewAuthUserItem(options.AuthUser)
  84. rule.items = append(rule.items, item)
  85. rule.allItems = append(rule.allItems, item)
  86. }
  87. if len(options.Protocol) > 0 {
  88. item := NewProtocolItem(options.Protocol)
  89. rule.items = append(rule.items, item)
  90. rule.allItems = append(rule.allItems, item)
  91. }
  92. if len(options.Client) > 0 {
  93. item := NewClientItem(options.Client)
  94. rule.items = append(rule.items, item)
  95. rule.allItems = append(rule.allItems, item)
  96. }
  97. if len(options.Domain) > 0 || len(options.DomainSuffix) > 0 {
  98. item := NewDomainItem(options.Domain, options.DomainSuffix)
  99. rule.destinationAddressItems = append(rule.destinationAddressItems, item)
  100. rule.allItems = append(rule.allItems, item)
  101. }
  102. if len(options.DomainKeyword) > 0 {
  103. item := NewDomainKeywordItem(options.DomainKeyword)
  104. rule.destinationAddressItems = append(rule.destinationAddressItems, item)
  105. rule.allItems = append(rule.allItems, item)
  106. }
  107. if len(options.DomainRegex) > 0 {
  108. item, err := NewDomainRegexItem(options.DomainRegex)
  109. if err != nil {
  110. return nil, E.Cause(err, "domain_regex")
  111. }
  112. rule.destinationAddressItems = append(rule.destinationAddressItems, item)
  113. rule.allItems = append(rule.allItems, item)
  114. }
  115. if len(options.Geosite) > 0 {
  116. return nil, E.New("geosite database is deprecated in sing-box 1.8.0 and removed in sing-box 1.12.0")
  117. }
  118. if len(options.SourceGeoIP) > 0 {
  119. return nil, E.New("geoip database is deprecated in sing-box 1.8.0 and removed in sing-box 1.12.0")
  120. }
  121. if len(options.GeoIP) > 0 {
  122. return nil, E.New("geoip database is deprecated in sing-box 1.8.0 and removed in sing-box 1.12.0")
  123. }
  124. if len(options.SourceIPCIDR) > 0 {
  125. item, err := NewIPCIDRItem(true, options.SourceIPCIDR)
  126. if err != nil {
  127. return nil, E.Cause(err, "source_ip_cidr")
  128. }
  129. rule.sourceAddressItems = append(rule.sourceAddressItems, item)
  130. rule.allItems = append(rule.allItems, item)
  131. }
  132. if options.SourceIPIsPrivate {
  133. item := NewIPIsPrivateItem(true)
  134. rule.sourceAddressItems = append(rule.sourceAddressItems, item)
  135. rule.allItems = append(rule.allItems, item)
  136. }
  137. if len(options.IPCIDR) > 0 {
  138. item, err := NewIPCIDRItem(false, options.IPCIDR)
  139. if err != nil {
  140. return nil, E.Cause(err, "ipcidr")
  141. }
  142. rule.destinationIPCIDRItems = append(rule.destinationIPCIDRItems, item)
  143. rule.allItems = append(rule.allItems, item)
  144. }
  145. if options.IPIsPrivate {
  146. item := NewIPIsPrivateItem(false)
  147. rule.destinationIPCIDRItems = append(rule.destinationIPCIDRItems, item)
  148. rule.allItems = append(rule.allItems, item)
  149. }
  150. if len(options.SourcePort) > 0 {
  151. item := NewPortItem(true, options.SourcePort)
  152. rule.sourcePortItems = append(rule.sourcePortItems, item)
  153. rule.allItems = append(rule.allItems, item)
  154. }
  155. if len(options.SourcePortRange) > 0 {
  156. item, err := NewPortRangeItem(true, options.SourcePortRange)
  157. if err != nil {
  158. return nil, E.Cause(err, "source_port_range")
  159. }
  160. rule.sourcePortItems = append(rule.sourcePortItems, item)
  161. rule.allItems = append(rule.allItems, item)
  162. }
  163. if len(options.Port) > 0 {
  164. item := NewPortItem(false, options.Port)
  165. rule.destinationPortItems = append(rule.destinationPortItems, item)
  166. rule.allItems = append(rule.allItems, item)
  167. }
  168. if len(options.PortRange) > 0 {
  169. item, err := NewPortRangeItem(false, options.PortRange)
  170. if err != nil {
  171. return nil, E.Cause(err, "port_range")
  172. }
  173. rule.destinationPortItems = append(rule.destinationPortItems, item)
  174. rule.allItems = append(rule.allItems, item)
  175. }
  176. if len(options.ProcessName) > 0 {
  177. item := NewProcessItem(options.ProcessName)
  178. rule.items = append(rule.items, item)
  179. rule.allItems = append(rule.allItems, item)
  180. }
  181. if len(options.ProcessPath) > 0 {
  182. item := NewProcessPathItem(options.ProcessPath)
  183. rule.items = append(rule.items, item)
  184. rule.allItems = append(rule.allItems, item)
  185. }
  186. if len(options.ProcessPathRegex) > 0 {
  187. item, err := NewProcessPathRegexItem(options.ProcessPathRegex)
  188. if err != nil {
  189. return nil, E.Cause(err, "process_path_regex")
  190. }
  191. rule.items = append(rule.items, item)
  192. rule.allItems = append(rule.allItems, item)
  193. }
  194. if len(options.PackageName) > 0 {
  195. item := NewPackageNameItem(options.PackageName)
  196. rule.items = append(rule.items, item)
  197. rule.allItems = append(rule.allItems, item)
  198. }
  199. if len(options.User) > 0 {
  200. item := NewUserItem(options.User)
  201. rule.items = append(rule.items, item)
  202. rule.allItems = append(rule.allItems, item)
  203. }
  204. if len(options.UserID) > 0 {
  205. item := NewUserIDItem(options.UserID)
  206. rule.items = append(rule.items, item)
  207. rule.allItems = append(rule.allItems, item)
  208. }
  209. if options.ClashMode != "" {
  210. item := NewClashModeItem(ctx, options.ClashMode)
  211. rule.items = append(rule.items, item)
  212. rule.allItems = append(rule.allItems, item)
  213. }
  214. if len(options.NetworkType) > 0 {
  215. item := NewNetworkTypeItem(networkManager, common.Map(options.NetworkType, option.InterfaceType.Build))
  216. rule.items = append(rule.items, item)
  217. rule.allItems = append(rule.allItems, item)
  218. }
  219. if options.NetworkIsExpensive {
  220. item := NewNetworkIsExpensiveItem(networkManager)
  221. rule.items = append(rule.items, item)
  222. rule.allItems = append(rule.allItems, item)
  223. }
  224. if options.NetworkIsConstrained {
  225. item := NewNetworkIsConstrainedItem(networkManager)
  226. rule.items = append(rule.items, item)
  227. rule.allItems = append(rule.allItems, item)
  228. }
  229. if len(options.WIFISSID) > 0 {
  230. item := NewWIFISSIDItem(networkManager, options.WIFISSID)
  231. rule.items = append(rule.items, item)
  232. rule.allItems = append(rule.allItems, item)
  233. }
  234. if len(options.WIFIBSSID) > 0 {
  235. item := NewWIFIBSSIDItem(networkManager, options.WIFIBSSID)
  236. rule.items = append(rule.items, item)
  237. rule.allItems = append(rule.allItems, item)
  238. }
  239. if len(options.RuleSet) > 0 {
  240. var matchSource bool
  241. if options.RuleSetIPCIDRMatchSource {
  242. matchSource = true
  243. } else
  244. //nolint:staticcheck
  245. if options.Deprecated_RulesetIPCIDRMatchSource {
  246. matchSource = true
  247. deprecated.Report(ctx, deprecated.OptionBadMatchSource)
  248. }
  249. item := NewRuleSetItem(router, options.RuleSet, matchSource, false)
  250. rule.items = append(rule.items, item)
  251. rule.allItems = append(rule.allItems, item)
  252. }
  253. return rule, nil
  254. }
  255. var _ adapter.Rule = (*LogicalRule)(nil)
  256. type LogicalRule struct {
  257. abstractLogicalRule
  258. }
  259. func NewLogicalRule(ctx context.Context, logger log.ContextLogger, options option.LogicalRule) (*LogicalRule, error) {
  260. action, err := NewRuleAction(ctx, logger, options.RuleAction)
  261. if err != nil {
  262. return nil, E.Cause(err, "action")
  263. }
  264. rule := &LogicalRule{
  265. abstractLogicalRule{
  266. rules: make([]adapter.HeadlessRule, len(options.Rules)),
  267. invert: options.Invert,
  268. action: action,
  269. },
  270. }
  271. switch options.Mode {
  272. case C.LogicalTypeAnd:
  273. rule.mode = C.LogicalTypeAnd
  274. case C.LogicalTypeOr:
  275. rule.mode = C.LogicalTypeOr
  276. default:
  277. return nil, E.New("unknown logical mode: ", options.Mode)
  278. }
  279. for i, subOptions := range options.Rules {
  280. subRule, err := NewRule(ctx, logger, subOptions, false)
  281. if err != nil {
  282. return nil, E.Cause(err, "sub rule[", i, "]")
  283. }
  284. rule.rules[i] = subRule
  285. }
  286. return rule, nil
  287. }