rule_dns.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374
  1. package rule
  2. import (
  3. "context"
  4. "github.com/sagernet/sing-box/adapter"
  5. C "github.com/sagernet/sing-box/constant"
  6. "github.com/sagernet/sing-box/experimental/deprecated"
  7. "github.com/sagernet/sing-box/log"
  8. "github.com/sagernet/sing-box/option"
  9. "github.com/sagernet/sing/common"
  10. E "github.com/sagernet/sing/common/exceptions"
  11. "github.com/sagernet/sing/service"
  12. )
  13. func NewDNSRule(ctx context.Context, logger log.ContextLogger, options option.DNSRule, checkServer bool) (adapter.DNSRule, error) {
  14. switch options.Type {
  15. case "", C.RuleTypeDefault:
  16. if !options.DefaultOptions.IsValid() {
  17. return nil, E.New("missing conditions")
  18. }
  19. switch options.DefaultOptions.Action {
  20. case "", C.RuleActionTypeRoute:
  21. if options.DefaultOptions.RouteOptions.Server == "" && checkServer {
  22. return nil, E.New("missing server field")
  23. }
  24. }
  25. return NewDefaultDNSRule(ctx, logger, options.DefaultOptions)
  26. case C.RuleTypeLogical:
  27. if !options.LogicalOptions.IsValid() {
  28. return nil, E.New("missing conditions")
  29. }
  30. switch options.LogicalOptions.Action {
  31. case "", C.RuleActionTypeRoute:
  32. if options.LogicalOptions.RouteOptions.Server == "" && checkServer {
  33. return nil, E.New("missing server field")
  34. }
  35. }
  36. return NewLogicalDNSRule(ctx, logger, options.LogicalOptions)
  37. default:
  38. return nil, E.New("unknown rule type: ", options.Type)
  39. }
  40. }
  41. var _ adapter.DNSRule = (*DefaultDNSRule)(nil)
  42. type DefaultDNSRule struct {
  43. abstractDefaultRule
  44. }
  45. func NewDefaultDNSRule(ctx context.Context, logger log.ContextLogger, options option.DefaultDNSRule) (*DefaultDNSRule, error) {
  46. rule := &DefaultDNSRule{
  47. abstractDefaultRule: abstractDefaultRule{
  48. invert: options.Invert,
  49. action: NewDNSRuleAction(logger, options.DNSRuleAction),
  50. },
  51. }
  52. if len(options.Inbound) > 0 {
  53. item := NewInboundRule(options.Inbound)
  54. rule.items = append(rule.items, item)
  55. rule.allItems = append(rule.allItems, item)
  56. }
  57. router := service.FromContext[adapter.Router](ctx)
  58. networkManager := service.FromContext[adapter.NetworkManager](ctx)
  59. if options.IPVersion > 0 {
  60. switch options.IPVersion {
  61. case 4, 6:
  62. item := NewIPVersionItem(options.IPVersion == 6)
  63. rule.items = append(rule.items, item)
  64. rule.allItems = append(rule.allItems, item)
  65. default:
  66. return nil, E.New("invalid ip version: ", options.IPVersion)
  67. }
  68. }
  69. if len(options.QueryType) > 0 {
  70. item := NewQueryTypeItem(options.QueryType)
  71. rule.items = append(rule.items, item)
  72. rule.allItems = append(rule.allItems, item)
  73. }
  74. if len(options.Network) > 0 {
  75. item := NewNetworkItem(options.Network)
  76. rule.items = append(rule.items, item)
  77. rule.allItems = append(rule.allItems, item)
  78. }
  79. if len(options.AuthUser) > 0 {
  80. item := NewAuthUserItem(options.AuthUser)
  81. rule.items = append(rule.items, item)
  82. rule.allItems = append(rule.allItems, item)
  83. }
  84. if len(options.Protocol) > 0 {
  85. item := NewProtocolItem(options.Protocol)
  86. rule.items = append(rule.items, item)
  87. rule.allItems = append(rule.allItems, item)
  88. }
  89. if len(options.Domain) > 0 || len(options.DomainSuffix) > 0 {
  90. item := NewDomainItem(options.Domain, options.DomainSuffix)
  91. rule.destinationAddressItems = append(rule.destinationAddressItems, item)
  92. rule.allItems = append(rule.allItems, item)
  93. }
  94. if len(options.DomainKeyword) > 0 {
  95. item := NewDomainKeywordItem(options.DomainKeyword)
  96. rule.destinationAddressItems = append(rule.destinationAddressItems, item)
  97. rule.allItems = append(rule.allItems, item)
  98. }
  99. if len(options.DomainRegex) > 0 {
  100. item, err := NewDomainRegexItem(options.DomainRegex)
  101. if err != nil {
  102. return nil, E.Cause(err, "domain_regex")
  103. }
  104. rule.destinationAddressItems = append(rule.destinationAddressItems, item)
  105. rule.allItems = append(rule.allItems, item)
  106. }
  107. if len(options.Geosite) > 0 {
  108. return nil, E.New("geosite database is deprecated in sing-box 1.8.0 and removed in sing-box 1.12.0")
  109. }
  110. if len(options.SourceGeoIP) > 0 {
  111. return nil, E.New("geoip database is deprecated in sing-box 1.8.0 and removed in sing-box 1.12.0")
  112. }
  113. if len(options.GeoIP) > 0 {
  114. return nil, E.New("geoip database is deprecated in sing-box 1.8.0 and removed in sing-box 1.12.0")
  115. }
  116. if len(options.SourceIPCIDR) > 0 {
  117. item, err := NewIPCIDRItem(true, options.SourceIPCIDR)
  118. if err != nil {
  119. return nil, E.Cause(err, "source_ip_cidr")
  120. }
  121. rule.sourceAddressItems = append(rule.sourceAddressItems, item)
  122. rule.allItems = append(rule.allItems, item)
  123. }
  124. if len(options.IPCIDR) > 0 {
  125. item, err := NewIPCIDRItem(false, options.IPCIDR)
  126. if err != nil {
  127. return nil, E.Cause(err, "ip_cidr")
  128. }
  129. rule.destinationIPCIDRItems = append(rule.destinationIPCIDRItems, item)
  130. rule.allItems = append(rule.allItems, item)
  131. }
  132. if options.SourceIPIsPrivate {
  133. item := NewIPIsPrivateItem(true)
  134. rule.sourceAddressItems = append(rule.sourceAddressItems, item)
  135. rule.allItems = append(rule.allItems, item)
  136. }
  137. if options.IPIsPrivate {
  138. item := NewIPIsPrivateItem(false)
  139. rule.destinationIPCIDRItems = append(rule.destinationIPCIDRItems, item)
  140. rule.allItems = append(rule.allItems, item)
  141. }
  142. if options.IPAcceptAny {
  143. item := NewIPAcceptAnyItem()
  144. rule.destinationIPCIDRItems = append(rule.destinationIPCIDRItems, item)
  145. rule.allItems = append(rule.allItems, item)
  146. }
  147. if len(options.SourcePort) > 0 {
  148. item := NewPortItem(true, options.SourcePort)
  149. rule.sourcePortItems = append(rule.sourcePortItems, item)
  150. rule.allItems = append(rule.allItems, item)
  151. }
  152. if len(options.SourcePortRange) > 0 {
  153. item, err := NewPortRangeItem(true, options.SourcePortRange)
  154. if err != nil {
  155. return nil, E.Cause(err, "source_port_range")
  156. }
  157. rule.sourcePortItems = append(rule.sourcePortItems, item)
  158. rule.allItems = append(rule.allItems, item)
  159. }
  160. if len(options.Port) > 0 {
  161. item := NewPortItem(false, options.Port)
  162. rule.destinationPortItems = append(rule.destinationPortItems, item)
  163. rule.allItems = append(rule.allItems, item)
  164. }
  165. if len(options.PortRange) > 0 {
  166. item, err := NewPortRangeItem(false, options.PortRange)
  167. if err != nil {
  168. return nil, E.Cause(err, "port_range")
  169. }
  170. rule.destinationPortItems = append(rule.destinationPortItems, item)
  171. rule.allItems = append(rule.allItems, item)
  172. }
  173. if len(options.ProcessName) > 0 {
  174. item := NewProcessItem(options.ProcessName)
  175. rule.items = append(rule.items, item)
  176. rule.allItems = append(rule.allItems, item)
  177. }
  178. if len(options.ProcessPath) > 0 {
  179. item := NewProcessPathItem(options.ProcessPath)
  180. rule.items = append(rule.items, item)
  181. rule.allItems = append(rule.allItems, item)
  182. }
  183. if len(options.ProcessPathRegex) > 0 {
  184. item, err := NewProcessPathRegexItem(options.ProcessPathRegex)
  185. if err != nil {
  186. return nil, E.Cause(err, "process_path_regex")
  187. }
  188. rule.items = append(rule.items, item)
  189. rule.allItems = append(rule.allItems, item)
  190. }
  191. if len(options.PackageName) > 0 {
  192. item := NewPackageNameItem(options.PackageName)
  193. rule.items = append(rule.items, item)
  194. rule.allItems = append(rule.allItems, item)
  195. }
  196. if len(options.User) > 0 {
  197. item := NewUserItem(options.User)
  198. rule.items = append(rule.items, item)
  199. rule.allItems = append(rule.allItems, item)
  200. }
  201. if len(options.UserID) > 0 {
  202. item := NewUserIDItem(options.UserID)
  203. rule.items = append(rule.items, item)
  204. rule.allItems = append(rule.allItems, item)
  205. }
  206. if len(options.Outbound) > 0 {
  207. item := NewOutboundRule(ctx, options.Outbound)
  208. rule.items = append(rule.items, item)
  209. rule.allItems = append(rule.allItems, item)
  210. }
  211. if options.ClashMode != "" {
  212. item := NewClashModeItem(ctx, options.ClashMode)
  213. rule.items = append(rule.items, item)
  214. rule.allItems = append(rule.allItems, item)
  215. }
  216. if len(options.NetworkType) > 0 {
  217. item := NewNetworkTypeItem(networkManager, common.Map(options.NetworkType, option.InterfaceType.Build))
  218. rule.items = append(rule.items, item)
  219. rule.allItems = append(rule.allItems, item)
  220. }
  221. if options.NetworkIsExpensive {
  222. item := NewNetworkIsExpensiveItem(networkManager)
  223. rule.items = append(rule.items, item)
  224. rule.allItems = append(rule.allItems, item)
  225. }
  226. if options.NetworkIsConstrained {
  227. item := NewNetworkIsConstrainedItem(networkManager)
  228. rule.items = append(rule.items, item)
  229. rule.allItems = append(rule.allItems, item)
  230. }
  231. if len(options.WIFISSID) > 0 {
  232. item := NewWIFISSIDItem(networkManager, options.WIFISSID)
  233. rule.items = append(rule.items, item)
  234. rule.allItems = append(rule.allItems, item)
  235. }
  236. if len(options.WIFIBSSID) > 0 {
  237. item := NewWIFIBSSIDItem(networkManager, options.WIFIBSSID)
  238. rule.items = append(rule.items, item)
  239. rule.allItems = append(rule.allItems, item)
  240. }
  241. if len(options.RuleSet) > 0 {
  242. var matchSource bool
  243. if options.RuleSetIPCIDRMatchSource {
  244. matchSource = true
  245. } else
  246. //nolint:staticcheck
  247. if options.Deprecated_RulesetIPCIDRMatchSource {
  248. matchSource = true
  249. deprecated.Report(ctx, deprecated.OptionBadMatchSource)
  250. }
  251. item := NewRuleSetItem(router, options.RuleSet, matchSource, options.RuleSetIPCIDRAcceptEmpty)
  252. rule.items = append(rule.items, item)
  253. rule.allItems = append(rule.allItems, item)
  254. }
  255. return rule, nil
  256. }
  257. func (r *DefaultDNSRule) Action() adapter.RuleAction {
  258. return r.action
  259. }
  260. func (r *DefaultDNSRule) WithAddressLimit() bool {
  261. if len(r.destinationIPCIDRItems) > 0 {
  262. return true
  263. }
  264. for _, rawRule := range r.items {
  265. ruleSet, isRuleSet := rawRule.(*RuleSetItem)
  266. if !isRuleSet {
  267. continue
  268. }
  269. if ruleSet.ContainsDestinationIPCIDRRule() {
  270. return true
  271. }
  272. }
  273. return false
  274. }
  275. func (r *DefaultDNSRule) Match(metadata *adapter.InboundContext) bool {
  276. metadata.IgnoreDestinationIPCIDRMatch = true
  277. defer func() {
  278. metadata.IgnoreDestinationIPCIDRMatch = false
  279. }()
  280. return r.abstractDefaultRule.Match(metadata)
  281. }
  282. func (r *DefaultDNSRule) MatchAddressLimit(metadata *adapter.InboundContext) bool {
  283. return r.abstractDefaultRule.Match(metadata)
  284. }
  285. var _ adapter.DNSRule = (*LogicalDNSRule)(nil)
  286. type LogicalDNSRule struct {
  287. abstractLogicalRule
  288. }
  289. func NewLogicalDNSRule(ctx context.Context, logger log.ContextLogger, options option.LogicalDNSRule) (*LogicalDNSRule, error) {
  290. r := &LogicalDNSRule{
  291. abstractLogicalRule: abstractLogicalRule{
  292. rules: make([]adapter.HeadlessRule, len(options.Rules)),
  293. invert: options.Invert,
  294. action: NewDNSRuleAction(logger, options.DNSRuleAction),
  295. },
  296. }
  297. switch options.Mode {
  298. case C.LogicalTypeAnd:
  299. r.mode = C.LogicalTypeAnd
  300. case C.LogicalTypeOr:
  301. r.mode = C.LogicalTypeOr
  302. default:
  303. return nil, E.New("unknown logical mode: ", options.Mode)
  304. }
  305. for i, subRule := range options.Rules {
  306. rule, err := NewDNSRule(ctx, logger, subRule, false)
  307. if err != nil {
  308. return nil, E.Cause(err, "sub rule[", i, "]")
  309. }
  310. r.rules[i] = rule
  311. }
  312. return r, nil
  313. }
  314. func (r *LogicalDNSRule) Action() adapter.RuleAction {
  315. return r.action
  316. }
  317. func (r *LogicalDNSRule) WithAddressLimit() bool {
  318. for _, rawRule := range r.rules {
  319. switch rule := rawRule.(type) {
  320. case *DefaultDNSRule:
  321. if rule.WithAddressLimit() {
  322. return true
  323. }
  324. case *LogicalDNSRule:
  325. if rule.WithAddressLimit() {
  326. return true
  327. }
  328. }
  329. }
  330. return false
  331. }
  332. func (r *LogicalDNSRule) Match(metadata *adapter.InboundContext) bool {
  333. if r.mode == C.LogicalTypeAnd {
  334. return common.All(r.rules, func(it adapter.HeadlessRule) bool {
  335. metadata.ResetRuleCache()
  336. return it.(adapter.DNSRule).Match(metadata)
  337. }) != r.invert
  338. } else {
  339. return common.Any(r.rules, func(it adapter.HeadlessRule) bool {
  340. metadata.ResetRuleCache()
  341. return it.(adapter.DNSRule).Match(metadata)
  342. }) != r.invert
  343. }
  344. }
  345. func (r *LogicalDNSRule) MatchAddressLimit(metadata *adapter.InboundContext) bool {
  346. if r.mode == C.LogicalTypeAnd {
  347. return common.All(r.rules, func(it adapter.HeadlessRule) bool {
  348. metadata.ResetRuleCache()
  349. return it.(adapter.DNSRule).MatchAddressLimit(metadata)
  350. }) != r.invert
  351. } else {
  352. return common.Any(r.rules, func(it adapter.HeadlessRule) bool {
  353. metadata.ResetRuleCache()
  354. return it.(adapter.DNSRule).MatchAddressLimit(metadata)
  355. }) != r.invert
  356. }
  357. }