123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392 |
- package rule
- import (
- "context"
- "github.com/sagernet/sing-box/adapter"
- C "github.com/sagernet/sing-box/constant"
- "github.com/sagernet/sing-box/experimental/deprecated"
- "github.com/sagernet/sing-box/log"
- "github.com/sagernet/sing-box/option"
- "github.com/sagernet/sing/common"
- E "github.com/sagernet/sing/common/exceptions"
- "github.com/sagernet/sing/service"
- )
- func NewDNSRule(ctx context.Context, logger log.ContextLogger, options option.DNSRule, checkServer bool) (adapter.DNSRule, error) {
- switch options.Type {
- case "", C.RuleTypeDefault:
- if !options.DefaultOptions.IsValid() {
- return nil, E.New("missing conditions")
- }
- switch options.DefaultOptions.Action {
- case "", C.RuleActionTypeRoute:
- if options.DefaultOptions.RouteOptions.Server == "" && checkServer {
- return nil, E.New("missing server field")
- }
- }
- return NewDefaultDNSRule(ctx, logger, options.DefaultOptions)
- case C.RuleTypeLogical:
- if !options.LogicalOptions.IsValid() {
- return nil, E.New("missing conditions")
- }
- switch options.LogicalOptions.Action {
- case "", C.RuleActionTypeRoute:
- if options.LogicalOptions.RouteOptions.Server == "" && checkServer {
- return nil, E.New("missing server field")
- }
- }
- return NewLogicalDNSRule(ctx, logger, options.LogicalOptions)
- default:
- return nil, E.New("unknown rule type: ", options.Type)
- }
- }
- var _ adapter.DNSRule = (*DefaultDNSRule)(nil)
- type DefaultDNSRule struct {
- abstractDefaultRule
- }
- func NewDefaultDNSRule(ctx context.Context, logger log.ContextLogger, options option.DefaultDNSRule) (*DefaultDNSRule, error) {
- rule := &DefaultDNSRule{
- abstractDefaultRule: abstractDefaultRule{
- invert: options.Invert,
- action: NewDNSRuleAction(logger, options.DNSRuleAction),
- },
- }
- if len(options.Inbound) > 0 {
- item := NewInboundRule(options.Inbound)
- rule.items = append(rule.items, item)
- rule.allItems = append(rule.allItems, item)
- }
- router := service.FromContext[adapter.Router](ctx)
- networkManager := service.FromContext[adapter.NetworkManager](ctx)
- if options.IPVersion > 0 {
- switch options.IPVersion {
- case 4, 6:
- item := NewIPVersionItem(options.IPVersion == 6)
- rule.items = append(rule.items, item)
- rule.allItems = append(rule.allItems, item)
- default:
- return nil, E.New("invalid ip version: ", options.IPVersion)
- }
- }
- if len(options.QueryType) > 0 {
- item := NewQueryTypeItem(options.QueryType)
- rule.items = append(rule.items, item)
- rule.allItems = append(rule.allItems, item)
- }
- if len(options.Network) > 0 {
- item := NewNetworkItem(options.Network)
- rule.items = append(rule.items, item)
- rule.allItems = append(rule.allItems, item)
- }
- if len(options.AuthUser) > 0 {
- item := NewAuthUserItem(options.AuthUser)
- rule.items = append(rule.items, item)
- rule.allItems = append(rule.allItems, item)
- }
- if len(options.Protocol) > 0 {
- item := NewProtocolItem(options.Protocol)
- rule.items = append(rule.items, item)
- rule.allItems = append(rule.allItems, item)
- }
- if len(options.Domain) > 0 || len(options.DomainSuffix) > 0 {
- item, err := NewDomainItem(options.Domain, options.DomainSuffix)
- if err != nil {
- return nil, err
- }
- rule.destinationAddressItems = append(rule.destinationAddressItems, item)
- rule.allItems = append(rule.allItems, item)
- }
- if len(options.DomainKeyword) > 0 {
- item := NewDomainKeywordItem(options.DomainKeyword)
- rule.destinationAddressItems = append(rule.destinationAddressItems, item)
- rule.allItems = append(rule.allItems, item)
- }
- if len(options.DomainRegex) > 0 {
- item, err := NewDomainRegexItem(options.DomainRegex)
- if err != nil {
- return nil, E.Cause(err, "domain_regex")
- }
- rule.destinationAddressItems = append(rule.destinationAddressItems, item)
- rule.allItems = append(rule.allItems, item)
- }
- if len(options.Geosite) > 0 {
- return nil, E.New("geosite database is deprecated in sing-box 1.8.0 and removed in sing-box 1.12.0")
- }
- if len(options.SourceGeoIP) > 0 {
- return nil, E.New("geoip database is deprecated in sing-box 1.8.0 and removed in sing-box 1.12.0")
- }
- if len(options.GeoIP) > 0 {
- return nil, E.New("geoip database is deprecated in sing-box 1.8.0 and removed in sing-box 1.12.0")
- }
- if len(options.SourceIPCIDR) > 0 {
- item, err := NewIPCIDRItem(true, options.SourceIPCIDR)
- if err != nil {
- return nil, E.Cause(err, "source_ip_cidr")
- }
- rule.sourceAddressItems = append(rule.sourceAddressItems, item)
- rule.allItems = append(rule.allItems, item)
- }
- if len(options.IPCIDR) > 0 {
- item, err := NewIPCIDRItem(false, options.IPCIDR)
- if err != nil {
- return nil, E.Cause(err, "ip_cidr")
- }
- rule.destinationIPCIDRItems = append(rule.destinationIPCIDRItems, item)
- rule.allItems = append(rule.allItems, item)
- }
- if options.SourceIPIsPrivate {
- item := NewIPIsPrivateItem(true)
- rule.sourceAddressItems = append(rule.sourceAddressItems, item)
- rule.allItems = append(rule.allItems, item)
- }
- if options.IPIsPrivate {
- item := NewIPIsPrivateItem(false)
- rule.destinationIPCIDRItems = append(rule.destinationIPCIDRItems, item)
- rule.allItems = append(rule.allItems, item)
- }
- if options.IPAcceptAny {
- item := NewIPAcceptAnyItem()
- rule.destinationIPCIDRItems = append(rule.destinationIPCIDRItems, item)
- rule.allItems = append(rule.allItems, item)
- }
- if len(options.SourcePort) > 0 {
- item := NewPortItem(true, options.SourcePort)
- rule.sourcePortItems = append(rule.sourcePortItems, item)
- rule.allItems = append(rule.allItems, item)
- }
- if len(options.SourcePortRange) > 0 {
- item, err := NewPortRangeItem(true, options.SourcePortRange)
- if err != nil {
- return nil, E.Cause(err, "source_port_range")
- }
- rule.sourcePortItems = append(rule.sourcePortItems, item)
- rule.allItems = append(rule.allItems, item)
- }
- if len(options.Port) > 0 {
- item := NewPortItem(false, options.Port)
- rule.destinationPortItems = append(rule.destinationPortItems, item)
- rule.allItems = append(rule.allItems, item)
- }
- if len(options.PortRange) > 0 {
- item, err := NewPortRangeItem(false, options.PortRange)
- if err != nil {
- return nil, E.Cause(err, "port_range")
- }
- rule.destinationPortItems = append(rule.destinationPortItems, item)
- rule.allItems = append(rule.allItems, item)
- }
- if len(options.ProcessName) > 0 {
- item := NewProcessItem(options.ProcessName)
- rule.items = append(rule.items, item)
- rule.allItems = append(rule.allItems, item)
- }
- if len(options.ProcessPath) > 0 {
- item := NewProcessPathItem(options.ProcessPath)
- rule.items = append(rule.items, item)
- rule.allItems = append(rule.allItems, item)
- }
- if len(options.ProcessPathRegex) > 0 {
- item, err := NewProcessPathRegexItem(options.ProcessPathRegex)
- if err != nil {
- return nil, E.Cause(err, "process_path_regex")
- }
- rule.items = append(rule.items, item)
- rule.allItems = append(rule.allItems, item)
- }
- if len(options.PackageName) > 0 {
- item := NewPackageNameItem(options.PackageName)
- rule.items = append(rule.items, item)
- rule.allItems = append(rule.allItems, item)
- }
- if len(options.User) > 0 {
- item := NewUserItem(options.User)
- rule.items = append(rule.items, item)
- rule.allItems = append(rule.allItems, item)
- }
- if len(options.UserID) > 0 {
- item := NewUserIDItem(options.UserID)
- rule.items = append(rule.items, item)
- rule.allItems = append(rule.allItems, item)
- }
- if len(options.Outbound) > 0 {
- item := NewOutboundRule(ctx, options.Outbound)
- rule.items = append(rule.items, item)
- rule.allItems = append(rule.allItems, item)
- }
- if options.ClashMode != "" {
- item := NewClashModeItem(ctx, options.ClashMode)
- rule.items = append(rule.items, item)
- rule.allItems = append(rule.allItems, item)
- }
- if len(options.NetworkType) > 0 {
- item := NewNetworkTypeItem(networkManager, common.Map(options.NetworkType, option.InterfaceType.Build))
- rule.items = append(rule.items, item)
- rule.allItems = append(rule.allItems, item)
- }
- if options.NetworkIsExpensive {
- item := NewNetworkIsExpensiveItem(networkManager)
- rule.items = append(rule.items, item)
- rule.allItems = append(rule.allItems, item)
- }
- if options.NetworkIsConstrained {
- item := NewNetworkIsConstrainedItem(networkManager)
- rule.items = append(rule.items, item)
- rule.allItems = append(rule.allItems, item)
- }
- if len(options.WIFISSID) > 0 {
- item := NewWIFISSIDItem(networkManager, options.WIFISSID)
- rule.items = append(rule.items, item)
- rule.allItems = append(rule.allItems, item)
- }
- if len(options.WIFIBSSID) > 0 {
- item := NewWIFIBSSIDItem(networkManager, options.WIFIBSSID)
- rule.items = append(rule.items, item)
- rule.allItems = append(rule.allItems, item)
- }
- if options.InterfaceAddress != nil && options.InterfaceAddress.Size() > 0 {
- item := NewInterfaceAddressItem(networkManager, options.InterfaceAddress)
- rule.items = append(rule.items, item)
- rule.allItems = append(rule.allItems, item)
- }
- if options.NetworkInterfaceAddress != nil && options.NetworkInterfaceAddress.Size() > 0 {
- item := NewNetworkInterfaceAddressItem(networkManager, options.NetworkInterfaceAddress)
- rule.items = append(rule.items, item)
- rule.allItems = append(rule.allItems, item)
- }
- if len(options.DefaultInterfaceAddress) > 0 {
- item := NewDefaultInterfaceAddressItem(networkManager, options.DefaultInterfaceAddress)
- rule.items = append(rule.items, item)
- rule.allItems = append(rule.allItems, item)
- }
- if len(options.RuleSet) > 0 {
- var matchSource bool
- if options.RuleSetIPCIDRMatchSource {
- matchSource = true
- } else
- //nolint:staticcheck
- if options.Deprecated_RulesetIPCIDRMatchSource {
- matchSource = true
- deprecated.Report(ctx, deprecated.OptionBadMatchSource)
- }
- item := NewRuleSetItem(router, options.RuleSet, matchSource, options.RuleSetIPCIDRAcceptEmpty)
- rule.items = append(rule.items, item)
- rule.allItems = append(rule.allItems, item)
- }
- return rule, nil
- }
- func (r *DefaultDNSRule) Action() adapter.RuleAction {
- return r.action
- }
- func (r *DefaultDNSRule) WithAddressLimit() bool {
- if len(r.destinationIPCIDRItems) > 0 {
- return true
- }
- for _, rawRule := range r.items {
- ruleSet, isRuleSet := rawRule.(*RuleSetItem)
- if !isRuleSet {
- continue
- }
- if ruleSet.ContainsDestinationIPCIDRRule() {
- return true
- }
- }
- return false
- }
- func (r *DefaultDNSRule) Match(metadata *adapter.InboundContext) bool {
- metadata.IgnoreDestinationIPCIDRMatch = true
- defer func() {
- metadata.IgnoreDestinationIPCIDRMatch = false
- }()
- return r.abstractDefaultRule.Match(metadata)
- }
- func (r *DefaultDNSRule) MatchAddressLimit(metadata *adapter.InboundContext) bool {
- return r.abstractDefaultRule.Match(metadata)
- }
- var _ adapter.DNSRule = (*LogicalDNSRule)(nil)
- type LogicalDNSRule struct {
- abstractLogicalRule
- }
- func NewLogicalDNSRule(ctx context.Context, logger log.ContextLogger, options option.LogicalDNSRule) (*LogicalDNSRule, error) {
- r := &LogicalDNSRule{
- abstractLogicalRule: abstractLogicalRule{
- rules: make([]adapter.HeadlessRule, len(options.Rules)),
- invert: options.Invert,
- action: NewDNSRuleAction(logger, options.DNSRuleAction),
- },
- }
- switch options.Mode {
- case C.LogicalTypeAnd:
- r.mode = C.LogicalTypeAnd
- case C.LogicalTypeOr:
- r.mode = C.LogicalTypeOr
- default:
- return nil, E.New("unknown logical mode: ", options.Mode)
- }
- for i, subRule := range options.Rules {
- rule, err := NewDNSRule(ctx, logger, subRule, false)
- if err != nil {
- return nil, E.Cause(err, "sub rule[", i, "]")
- }
- r.rules[i] = rule
- }
- return r, nil
- }
- func (r *LogicalDNSRule) Action() adapter.RuleAction {
- return r.action
- }
- func (r *LogicalDNSRule) WithAddressLimit() bool {
- for _, rawRule := range r.rules {
- switch rule := rawRule.(type) {
- case *DefaultDNSRule:
- if rule.WithAddressLimit() {
- return true
- }
- case *LogicalDNSRule:
- if rule.WithAddressLimit() {
- return true
- }
- }
- }
- return false
- }
- func (r *LogicalDNSRule) Match(metadata *adapter.InboundContext) bool {
- if r.mode == C.LogicalTypeAnd {
- return common.All(r.rules, func(it adapter.HeadlessRule) bool {
- metadata.ResetRuleCache()
- return it.(adapter.DNSRule).Match(metadata)
- }) != r.invert
- } else {
- return common.Any(r.rules, func(it adapter.HeadlessRule) bool {
- metadata.ResetRuleCache()
- return it.(adapter.DNSRule).Match(metadata)
- }) != r.invert
- }
- }
- func (r *LogicalDNSRule) MatchAddressLimit(metadata *adapter.InboundContext) bool {
- if r.mode == C.LogicalTypeAnd {
- return common.All(r.rules, func(it adapter.HeadlessRule) bool {
- metadata.ResetRuleCache()
- return it.(adapter.DNSRule).MatchAddressLimit(metadata)
- }) != r.invert
- } else {
- return common.Any(r.rules, func(it adapter.HeadlessRule) bool {
- metadata.ResetRuleCache()
- return it.(adapter.DNSRule).MatchAddressLimit(metadata)
- }) != r.invert
- }
- }
|