rule_default.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348
  1. package rule
  2. import (
  3. "context"
  4. "github.com/sagernet/sing-box/adapter"
  5. C "github.com/sagernet/sing-box/constant"
  6. "github.com/sagernet/sing-box/log"
  7. "github.com/sagernet/sing-box/option"
  8. "github.com/sagernet/sing/common"
  9. E "github.com/sagernet/sing/common/exceptions"
  10. "github.com/sagernet/sing/service"
  11. )
  12. func NewRule(ctx context.Context, logger log.ContextLogger, options option.Rule, checkOutbound bool) (adapter.Rule, error) {
  13. switch options.Type {
  14. case "", C.RuleTypeDefault:
  15. if !options.DefaultOptions.IsValid() {
  16. return nil, E.New("missing conditions")
  17. }
  18. switch options.DefaultOptions.Action {
  19. case "", C.RuleActionTypeRoute:
  20. if options.DefaultOptions.RouteOptions.Outbound == "" && checkOutbound {
  21. return nil, E.New("missing outbound field")
  22. }
  23. }
  24. return NewDefaultRule(ctx, logger, options.DefaultOptions)
  25. case C.RuleTypeLogical:
  26. if !options.LogicalOptions.IsValid() {
  27. return nil, E.New("missing conditions")
  28. }
  29. switch options.LogicalOptions.Action {
  30. case "", C.RuleActionTypeRoute:
  31. if options.LogicalOptions.RouteOptions.Outbound == "" && checkOutbound {
  32. return nil, E.New("missing outbound field")
  33. }
  34. }
  35. return NewLogicalRule(ctx, logger, options.LogicalOptions)
  36. default:
  37. return nil, E.New("unknown rule type: ", options.Type)
  38. }
  39. }
  40. var _ adapter.Rule = (*DefaultRule)(nil)
  41. type DefaultRule struct {
  42. abstractDefaultRule
  43. }
  44. func (r *DefaultRule) matchStates(metadata *adapter.InboundContext) ruleMatchStateSet {
  45. return r.abstractDefaultRule.matchStates(metadata)
  46. }
  47. type RuleItem interface {
  48. Match(metadata *adapter.InboundContext) bool
  49. String() string
  50. }
  51. func NewDefaultRule(ctx context.Context, logger log.ContextLogger, options option.DefaultRule) (*DefaultRule, error) {
  52. action, err := NewRuleAction(ctx, logger, options.RuleAction)
  53. if err != nil {
  54. return nil, E.Cause(err, "action")
  55. }
  56. rule := &DefaultRule{
  57. abstractDefaultRule{
  58. invert: options.Invert,
  59. action: action,
  60. },
  61. }
  62. router := service.FromContext[adapter.Router](ctx)
  63. networkManager := service.FromContext[adapter.NetworkManager](ctx)
  64. if len(options.Inbound) > 0 {
  65. item := NewInboundRule(options.Inbound)
  66. rule.items = append(rule.items, item)
  67. rule.allItems = append(rule.allItems, item)
  68. }
  69. if options.IPVersion > 0 {
  70. switch options.IPVersion {
  71. case 4, 6:
  72. item := NewIPVersionItem(options.IPVersion == 6)
  73. rule.items = append(rule.items, item)
  74. rule.allItems = append(rule.allItems, item)
  75. default:
  76. return nil, E.New("invalid ip version: ", options.IPVersion)
  77. }
  78. }
  79. if len(options.Network) > 0 {
  80. item := NewNetworkItem(options.Network)
  81. rule.items = append(rule.items, item)
  82. rule.allItems = append(rule.allItems, item)
  83. }
  84. if len(options.AuthUser) > 0 {
  85. item := NewAuthUserItem(options.AuthUser)
  86. rule.items = append(rule.items, item)
  87. rule.allItems = append(rule.allItems, item)
  88. }
  89. if len(options.Protocol) > 0 {
  90. item := NewProtocolItem(options.Protocol)
  91. rule.items = append(rule.items, item)
  92. rule.allItems = append(rule.allItems, item)
  93. }
  94. if len(options.Client) > 0 {
  95. item := NewClientItem(options.Client)
  96. rule.items = append(rule.items, item)
  97. rule.allItems = append(rule.allItems, item)
  98. }
  99. if len(options.Domain) > 0 || len(options.DomainSuffix) > 0 {
  100. item, err := NewDomainItem(options.Domain, options.DomainSuffix)
  101. if err != nil {
  102. return nil, err
  103. }
  104. rule.destinationAddressItems = append(rule.destinationAddressItems, item)
  105. rule.allItems = append(rule.allItems, item)
  106. }
  107. if len(options.DomainKeyword) > 0 {
  108. item := NewDomainKeywordItem(options.DomainKeyword)
  109. rule.destinationAddressItems = append(rule.destinationAddressItems, item)
  110. rule.allItems = append(rule.allItems, item)
  111. }
  112. if len(options.DomainRegex) > 0 {
  113. item, err := NewDomainRegexItem(options.DomainRegex)
  114. if err != nil {
  115. return nil, err
  116. }
  117. rule.destinationAddressItems = append(rule.destinationAddressItems, item)
  118. rule.allItems = append(rule.allItems, item)
  119. }
  120. if len(options.Geosite) > 0 {
  121. return nil, E.New("geosite database is deprecated in sing-box 1.8.0 and removed in sing-box 1.12.0")
  122. }
  123. if len(options.SourceGeoIP) > 0 {
  124. return nil, E.New("geoip database is deprecated in sing-box 1.8.0 and removed in sing-box 1.12.0")
  125. }
  126. if len(options.GeoIP) > 0 {
  127. return nil, E.New("geoip database is deprecated in sing-box 1.8.0 and removed in sing-box 1.12.0")
  128. }
  129. if len(options.SourceIPCIDR) > 0 {
  130. item, err := NewIPCIDRItem(true, options.SourceIPCIDR)
  131. if err != nil {
  132. return nil, E.Cause(err, "source_ip_cidr")
  133. }
  134. rule.sourceAddressItems = append(rule.sourceAddressItems, item)
  135. rule.allItems = append(rule.allItems, item)
  136. }
  137. if options.SourceIPIsPrivate {
  138. item := NewIPIsPrivateItem(true)
  139. rule.sourceAddressItems = append(rule.sourceAddressItems, item)
  140. rule.allItems = append(rule.allItems, item)
  141. }
  142. if len(options.IPCIDR) > 0 {
  143. item, err := NewIPCIDRItem(false, options.IPCIDR)
  144. if err != nil {
  145. return nil, E.Cause(err, "ipcidr")
  146. }
  147. rule.destinationIPCIDRItems = append(rule.destinationIPCIDRItems, item)
  148. rule.allItems = append(rule.allItems, item)
  149. }
  150. if options.IPIsPrivate {
  151. item := NewIPIsPrivateItem(false)
  152. rule.destinationIPCIDRItems = append(rule.destinationIPCIDRItems, item)
  153. rule.allItems = append(rule.allItems, item)
  154. }
  155. if len(options.SourcePort) > 0 {
  156. item := NewPortItem(true, options.SourcePort)
  157. rule.sourcePortItems = append(rule.sourcePortItems, item)
  158. rule.allItems = append(rule.allItems, item)
  159. }
  160. if len(options.SourcePortRange) > 0 {
  161. item, err := NewPortRangeItem(true, options.SourcePortRange)
  162. if err != nil {
  163. return nil, E.Cause(err, "source_port_range")
  164. }
  165. rule.sourcePortItems = append(rule.sourcePortItems, item)
  166. rule.allItems = append(rule.allItems, item)
  167. }
  168. if len(options.Port) > 0 {
  169. item := NewPortItem(false, options.Port)
  170. rule.destinationPortItems = append(rule.destinationPortItems, item)
  171. rule.allItems = append(rule.allItems, item)
  172. }
  173. if len(options.PortRange) > 0 {
  174. item, err := NewPortRangeItem(false, options.PortRange)
  175. if err != nil {
  176. return nil, E.Cause(err, "port_range")
  177. }
  178. rule.destinationPortItems = append(rule.destinationPortItems, item)
  179. rule.allItems = append(rule.allItems, item)
  180. }
  181. if len(options.ProcessName) > 0 {
  182. item := NewProcessItem(options.ProcessName)
  183. rule.items = append(rule.items, item)
  184. rule.allItems = append(rule.allItems, item)
  185. }
  186. if len(options.ProcessPath) > 0 {
  187. item := NewProcessPathItem(options.ProcessPath)
  188. rule.items = append(rule.items, item)
  189. rule.allItems = append(rule.allItems, item)
  190. }
  191. if len(options.ProcessPathRegex) > 0 {
  192. item, err := NewProcessPathRegexItem(options.ProcessPathRegex)
  193. if err != nil {
  194. return nil, E.Cause(err, "process_path_regex")
  195. }
  196. rule.items = append(rule.items, item)
  197. rule.allItems = append(rule.allItems, item)
  198. }
  199. if len(options.PackageName) > 0 {
  200. item := NewPackageNameItem(options.PackageName)
  201. rule.items = append(rule.items, item)
  202. rule.allItems = append(rule.allItems, item)
  203. }
  204. if len(options.PackageNameRegex) > 0 {
  205. item, err := NewPackageNameRegexItem(options.PackageNameRegex)
  206. if err != nil {
  207. return nil, E.Cause(err, "package_name_regex")
  208. }
  209. rule.items = append(rule.items, item)
  210. rule.allItems = append(rule.allItems, item)
  211. }
  212. if len(options.User) > 0 {
  213. item := NewUserItem(options.User)
  214. rule.items = append(rule.items, item)
  215. rule.allItems = append(rule.allItems, item)
  216. }
  217. if len(options.UserID) > 0 {
  218. item := NewUserIDItem(options.UserID)
  219. rule.items = append(rule.items, item)
  220. rule.allItems = append(rule.allItems, item)
  221. }
  222. if options.ClashMode != "" {
  223. item := NewClashModeItem(ctx, options.ClashMode)
  224. rule.items = append(rule.items, item)
  225. rule.allItems = append(rule.allItems, item)
  226. }
  227. if len(options.NetworkType) > 0 {
  228. item := NewNetworkTypeItem(networkManager, common.Map(options.NetworkType, option.InterfaceType.Build))
  229. rule.items = append(rule.items, item)
  230. rule.allItems = append(rule.allItems, item)
  231. }
  232. if options.NetworkIsExpensive {
  233. item := NewNetworkIsExpensiveItem(networkManager)
  234. rule.items = append(rule.items, item)
  235. rule.allItems = append(rule.allItems, item)
  236. }
  237. if options.NetworkIsConstrained {
  238. item := NewNetworkIsConstrainedItem(networkManager)
  239. rule.items = append(rule.items, item)
  240. rule.allItems = append(rule.allItems, item)
  241. }
  242. if len(options.WIFISSID) > 0 {
  243. item := NewWIFISSIDItem(networkManager, options.WIFISSID)
  244. rule.items = append(rule.items, item)
  245. rule.allItems = append(rule.allItems, item)
  246. }
  247. if len(options.WIFIBSSID) > 0 {
  248. item := NewWIFIBSSIDItem(networkManager, options.WIFIBSSID)
  249. rule.items = append(rule.items, item)
  250. rule.allItems = append(rule.allItems, item)
  251. }
  252. if options.InterfaceAddress != nil && options.InterfaceAddress.Size() > 0 {
  253. item := NewInterfaceAddressItem(networkManager, options.InterfaceAddress)
  254. rule.items = append(rule.items, item)
  255. rule.allItems = append(rule.allItems, item)
  256. }
  257. if options.NetworkInterfaceAddress != nil && options.NetworkInterfaceAddress.Size() > 0 {
  258. item := NewNetworkInterfaceAddressItem(networkManager, options.NetworkInterfaceAddress)
  259. rule.items = append(rule.items, item)
  260. rule.allItems = append(rule.allItems, item)
  261. }
  262. if len(options.DefaultInterfaceAddress) > 0 {
  263. item := NewDefaultInterfaceAddressItem(networkManager, options.DefaultInterfaceAddress)
  264. rule.items = append(rule.items, item)
  265. rule.allItems = append(rule.allItems, item)
  266. }
  267. if len(options.SourceMACAddress) > 0 {
  268. item := NewSourceMACAddressItem(options.SourceMACAddress)
  269. rule.items = append(rule.items, item)
  270. rule.allItems = append(rule.allItems, item)
  271. }
  272. if len(options.SourceHostname) > 0 {
  273. item := NewSourceHostnameItem(options.SourceHostname)
  274. rule.items = append(rule.items, item)
  275. rule.allItems = append(rule.allItems, item)
  276. }
  277. if len(options.PreferredBy) > 0 {
  278. item := NewPreferredByItem(ctx, options.PreferredBy)
  279. rule.items = append(rule.items, item)
  280. rule.allItems = append(rule.allItems, item)
  281. }
  282. if len(options.RuleSet) > 0 {
  283. //nolint:staticcheck
  284. if options.Deprecated_RulesetIPCIDRMatchSource {
  285. return nil, E.New("rule_set_ipcidr_match_source is deprecated in sing-box 1.10.0 and removed in sing-box 1.11.0")
  286. }
  287. var matchSource bool
  288. if options.RuleSetIPCIDRMatchSource {
  289. matchSource = true
  290. }
  291. item := NewRuleSetItem(router, options.RuleSet, matchSource, false)
  292. rule.ruleSetItem = item
  293. rule.allItems = append(rule.allItems, item)
  294. }
  295. return rule, nil
  296. }
  297. var _ adapter.Rule = (*LogicalRule)(nil)
  298. type LogicalRule struct {
  299. abstractLogicalRule
  300. }
  301. func (r *LogicalRule) matchStates(metadata *adapter.InboundContext) ruleMatchStateSet {
  302. return r.abstractLogicalRule.matchStates(metadata)
  303. }
  304. func NewLogicalRule(ctx context.Context, logger log.ContextLogger, options option.LogicalRule) (*LogicalRule, error) {
  305. action, err := NewRuleAction(ctx, logger, options.RuleAction)
  306. if err != nil {
  307. return nil, E.Cause(err, "action")
  308. }
  309. rule := &LogicalRule{
  310. abstractLogicalRule{
  311. rules: make([]adapter.HeadlessRule, len(options.Rules)),
  312. invert: options.Invert,
  313. action: action,
  314. },
  315. }
  316. switch options.Mode {
  317. case C.LogicalTypeAnd:
  318. rule.mode = C.LogicalTypeAnd
  319. case C.LogicalTypeOr:
  320. rule.mode = C.LogicalTypeOr
  321. default:
  322. return nil, E.New("unknown logical mode: ", options.Mode)
  323. }
  324. for i, subOptions := range options.Rules {
  325. err = validateNoNestedRuleActions(subOptions, true)
  326. if err != nil {
  327. return nil, E.Cause(err, "sub rule[", i, "]")
  328. }
  329. subRule, err := NewRule(ctx, logger, subOptions, false)
  330. if err != nil {
  331. return nil, E.Cause(err, "sub rule[", i, "]")
  332. }
  333. rule.rules[i] = subRule
  334. }
  335. return rule, nil
  336. }