rule_dns.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392
  1. package rule
  2. import (
  3. "context"
  4. "github.com/sagernet/sing-box/adapter"
  5. C "github.com/sagernet/sing-box/constant"
  6. "github.com/sagernet/sing-box/experimental/deprecated"
  7. "github.com/sagernet/sing-box/log"
  8. "github.com/sagernet/sing-box/option"
  9. "github.com/sagernet/sing/common"
  10. E "github.com/sagernet/sing/common/exceptions"
  11. "github.com/sagernet/sing/service"
  12. )
  13. func NewDNSRule(ctx context.Context, logger log.ContextLogger, options option.DNSRule, checkServer bool) (adapter.DNSRule, error) {
  14. switch options.Type {
  15. case "", C.RuleTypeDefault:
  16. if !options.DefaultOptions.IsValid() {
  17. return nil, E.New("missing conditions")
  18. }
  19. switch options.DefaultOptions.Action {
  20. case "", C.RuleActionTypeRoute:
  21. if options.DefaultOptions.RouteOptions.Server == "" && checkServer {
  22. return nil, E.New("missing server field")
  23. }
  24. }
  25. return NewDefaultDNSRule(ctx, logger, options.DefaultOptions)
  26. case C.RuleTypeLogical:
  27. if !options.LogicalOptions.IsValid() {
  28. return nil, E.New("missing conditions")
  29. }
  30. switch options.LogicalOptions.Action {
  31. case "", C.RuleActionTypeRoute:
  32. if options.LogicalOptions.RouteOptions.Server == "" && checkServer {
  33. return nil, E.New("missing server field")
  34. }
  35. }
  36. return NewLogicalDNSRule(ctx, logger, options.LogicalOptions)
  37. default:
  38. return nil, E.New("unknown rule type: ", options.Type)
  39. }
  40. }
  41. var _ adapter.DNSRule = (*DefaultDNSRule)(nil)
  42. type DefaultDNSRule struct {
  43. abstractDefaultRule
  44. }
  45. func NewDefaultDNSRule(ctx context.Context, logger log.ContextLogger, options option.DefaultDNSRule) (*DefaultDNSRule, error) {
  46. rule := &DefaultDNSRule{
  47. abstractDefaultRule: abstractDefaultRule{
  48. invert: options.Invert,
  49. action: NewDNSRuleAction(logger, options.DNSRuleAction),
  50. },
  51. }
  52. if len(options.Inbound) > 0 {
  53. item := NewInboundRule(options.Inbound)
  54. rule.items = append(rule.items, item)
  55. rule.allItems = append(rule.allItems, item)
  56. }
  57. router := service.FromContext[adapter.Router](ctx)
  58. networkManager := service.FromContext[adapter.NetworkManager](ctx)
  59. if options.IPVersion > 0 {
  60. switch options.IPVersion {
  61. case 4, 6:
  62. item := NewIPVersionItem(options.IPVersion == 6)
  63. rule.items = append(rule.items, item)
  64. rule.allItems = append(rule.allItems, item)
  65. default:
  66. return nil, E.New("invalid ip version: ", options.IPVersion)
  67. }
  68. }
  69. if len(options.QueryType) > 0 {
  70. item := NewQueryTypeItem(options.QueryType)
  71. rule.items = append(rule.items, item)
  72. rule.allItems = append(rule.allItems, item)
  73. }
  74. if len(options.Network) > 0 {
  75. item := NewNetworkItem(options.Network)
  76. rule.items = append(rule.items, item)
  77. rule.allItems = append(rule.allItems, item)
  78. }
  79. if len(options.AuthUser) > 0 {
  80. item := NewAuthUserItem(options.AuthUser)
  81. rule.items = append(rule.items, item)
  82. rule.allItems = append(rule.allItems, item)
  83. }
  84. if len(options.Protocol) > 0 {
  85. item := NewProtocolItem(options.Protocol)
  86. rule.items = append(rule.items, item)
  87. rule.allItems = append(rule.allItems, item)
  88. }
  89. if len(options.Domain) > 0 || len(options.DomainSuffix) > 0 {
  90. item, err := NewDomainItem(options.Domain, options.DomainSuffix)
  91. if err != nil {
  92. return nil, err
  93. }
  94. rule.destinationAddressItems = append(rule.destinationAddressItems, item)
  95. rule.allItems = append(rule.allItems, item)
  96. }
  97. if len(options.DomainKeyword) > 0 {
  98. item := NewDomainKeywordItem(options.DomainKeyword)
  99. rule.destinationAddressItems = append(rule.destinationAddressItems, item)
  100. rule.allItems = append(rule.allItems, item)
  101. }
  102. if len(options.DomainRegex) > 0 {
  103. item, err := NewDomainRegexItem(options.DomainRegex)
  104. if err != nil {
  105. return nil, E.Cause(err, "domain_regex")
  106. }
  107. rule.destinationAddressItems = append(rule.destinationAddressItems, item)
  108. rule.allItems = append(rule.allItems, item)
  109. }
  110. if len(options.Geosite) > 0 {
  111. return nil, E.New("geosite database is deprecated in sing-box 1.8.0 and removed in sing-box 1.12.0")
  112. }
  113. if len(options.SourceGeoIP) > 0 {
  114. return nil, E.New("geoip database is deprecated in sing-box 1.8.0 and removed in sing-box 1.12.0")
  115. }
  116. if len(options.GeoIP) > 0 {
  117. return nil, E.New("geoip database is deprecated in sing-box 1.8.0 and removed in sing-box 1.12.0")
  118. }
  119. if len(options.SourceIPCIDR) > 0 {
  120. item, err := NewIPCIDRItem(true, options.SourceIPCIDR)
  121. if err != nil {
  122. return nil, E.Cause(err, "source_ip_cidr")
  123. }
  124. rule.sourceAddressItems = append(rule.sourceAddressItems, item)
  125. rule.allItems = append(rule.allItems, item)
  126. }
  127. if len(options.IPCIDR) > 0 {
  128. item, err := NewIPCIDRItem(false, options.IPCIDR)
  129. if err != nil {
  130. return nil, E.Cause(err, "ip_cidr")
  131. }
  132. rule.destinationIPCIDRItems = append(rule.destinationIPCIDRItems, item)
  133. rule.allItems = append(rule.allItems, item)
  134. }
  135. if options.SourceIPIsPrivate {
  136. item := NewIPIsPrivateItem(true)
  137. rule.sourceAddressItems = append(rule.sourceAddressItems, item)
  138. rule.allItems = append(rule.allItems, item)
  139. }
  140. if options.IPIsPrivate {
  141. item := NewIPIsPrivateItem(false)
  142. rule.destinationIPCIDRItems = append(rule.destinationIPCIDRItems, item)
  143. rule.allItems = append(rule.allItems, item)
  144. }
  145. if options.IPAcceptAny {
  146. item := NewIPAcceptAnyItem()
  147. rule.destinationIPCIDRItems = append(rule.destinationIPCIDRItems, item)
  148. rule.allItems = append(rule.allItems, item)
  149. }
  150. if len(options.SourcePort) > 0 {
  151. item := NewPortItem(true, options.SourcePort)
  152. rule.sourcePortItems = append(rule.sourcePortItems, item)
  153. rule.allItems = append(rule.allItems, item)
  154. }
  155. if len(options.SourcePortRange) > 0 {
  156. item, err := NewPortRangeItem(true, options.SourcePortRange)
  157. if err != nil {
  158. return nil, E.Cause(err, "source_port_range")
  159. }
  160. rule.sourcePortItems = append(rule.sourcePortItems, item)
  161. rule.allItems = append(rule.allItems, item)
  162. }
  163. if len(options.Port) > 0 {
  164. item := NewPortItem(false, options.Port)
  165. rule.destinationPortItems = append(rule.destinationPortItems, item)
  166. rule.allItems = append(rule.allItems, item)
  167. }
  168. if len(options.PortRange) > 0 {
  169. item, err := NewPortRangeItem(false, options.PortRange)
  170. if err != nil {
  171. return nil, E.Cause(err, "port_range")
  172. }
  173. rule.destinationPortItems = append(rule.destinationPortItems, item)
  174. rule.allItems = append(rule.allItems, item)
  175. }
  176. if len(options.ProcessName) > 0 {
  177. item := NewProcessItem(options.ProcessName)
  178. rule.items = append(rule.items, item)
  179. rule.allItems = append(rule.allItems, item)
  180. }
  181. if len(options.ProcessPath) > 0 {
  182. item := NewProcessPathItem(options.ProcessPath)
  183. rule.items = append(rule.items, item)
  184. rule.allItems = append(rule.allItems, item)
  185. }
  186. if len(options.ProcessPathRegex) > 0 {
  187. item, err := NewProcessPathRegexItem(options.ProcessPathRegex)
  188. if err != nil {
  189. return nil, E.Cause(err, "process_path_regex")
  190. }
  191. rule.items = append(rule.items, item)
  192. rule.allItems = append(rule.allItems, item)
  193. }
  194. if len(options.PackageName) > 0 {
  195. item := NewPackageNameItem(options.PackageName)
  196. rule.items = append(rule.items, item)
  197. rule.allItems = append(rule.allItems, item)
  198. }
  199. if len(options.User) > 0 {
  200. item := NewUserItem(options.User)
  201. rule.items = append(rule.items, item)
  202. rule.allItems = append(rule.allItems, item)
  203. }
  204. if len(options.UserID) > 0 {
  205. item := NewUserIDItem(options.UserID)
  206. rule.items = append(rule.items, item)
  207. rule.allItems = append(rule.allItems, item)
  208. }
  209. if len(options.Outbound) > 0 {
  210. item := NewOutboundRule(ctx, options.Outbound)
  211. rule.items = append(rule.items, item)
  212. rule.allItems = append(rule.allItems, item)
  213. }
  214. if options.ClashMode != "" {
  215. item := NewClashModeItem(ctx, options.ClashMode)
  216. rule.items = append(rule.items, item)
  217. rule.allItems = append(rule.allItems, item)
  218. }
  219. if len(options.NetworkType) > 0 {
  220. item := NewNetworkTypeItem(networkManager, common.Map(options.NetworkType, option.InterfaceType.Build))
  221. rule.items = append(rule.items, item)
  222. rule.allItems = append(rule.allItems, item)
  223. }
  224. if options.NetworkIsExpensive {
  225. item := NewNetworkIsExpensiveItem(networkManager)
  226. rule.items = append(rule.items, item)
  227. rule.allItems = append(rule.allItems, item)
  228. }
  229. if options.NetworkIsConstrained {
  230. item := NewNetworkIsConstrainedItem(networkManager)
  231. rule.items = append(rule.items, item)
  232. rule.allItems = append(rule.allItems, item)
  233. }
  234. if len(options.WIFISSID) > 0 {
  235. item := NewWIFISSIDItem(networkManager, options.WIFISSID)
  236. rule.items = append(rule.items, item)
  237. rule.allItems = append(rule.allItems, item)
  238. }
  239. if len(options.WIFIBSSID) > 0 {
  240. item := NewWIFIBSSIDItem(networkManager, options.WIFIBSSID)
  241. rule.items = append(rule.items, item)
  242. rule.allItems = append(rule.allItems, item)
  243. }
  244. if options.InterfaceAddress != nil && options.InterfaceAddress.Size() > 0 {
  245. item := NewInterfaceAddressItem(networkManager, options.InterfaceAddress)
  246. rule.items = append(rule.items, item)
  247. rule.allItems = append(rule.allItems, item)
  248. }
  249. if options.NetworkInterfaceAddress != nil && options.NetworkInterfaceAddress.Size() > 0 {
  250. item := NewNetworkInterfaceAddressItem(networkManager, options.NetworkInterfaceAddress)
  251. rule.items = append(rule.items, item)
  252. rule.allItems = append(rule.allItems, item)
  253. }
  254. if len(options.DefaultInterfaceAddress) > 0 {
  255. item := NewDefaultInterfaceAddressItem(networkManager, options.DefaultInterfaceAddress)
  256. rule.items = append(rule.items, item)
  257. rule.allItems = append(rule.allItems, item)
  258. }
  259. if len(options.RuleSet) > 0 {
  260. var matchSource bool
  261. if options.RuleSetIPCIDRMatchSource {
  262. matchSource = true
  263. } else
  264. //nolint:staticcheck
  265. if options.Deprecated_RulesetIPCIDRMatchSource {
  266. matchSource = true
  267. deprecated.Report(ctx, deprecated.OptionBadMatchSource)
  268. }
  269. item := NewRuleSetItem(router, options.RuleSet, matchSource, options.RuleSetIPCIDRAcceptEmpty)
  270. rule.items = append(rule.items, item)
  271. rule.allItems = append(rule.allItems, item)
  272. }
  273. return rule, nil
  274. }
  275. func (r *DefaultDNSRule) Action() adapter.RuleAction {
  276. return r.action
  277. }
  278. func (r *DefaultDNSRule) WithAddressLimit() bool {
  279. if len(r.destinationIPCIDRItems) > 0 {
  280. return true
  281. }
  282. for _, rawRule := range r.items {
  283. ruleSet, isRuleSet := rawRule.(*RuleSetItem)
  284. if !isRuleSet {
  285. continue
  286. }
  287. if ruleSet.ContainsDestinationIPCIDRRule() {
  288. return true
  289. }
  290. }
  291. return false
  292. }
  293. func (r *DefaultDNSRule) Match(metadata *adapter.InboundContext) bool {
  294. metadata.IgnoreDestinationIPCIDRMatch = true
  295. defer func() {
  296. metadata.IgnoreDestinationIPCIDRMatch = false
  297. }()
  298. return r.abstractDefaultRule.Match(metadata)
  299. }
  300. func (r *DefaultDNSRule) MatchAddressLimit(metadata *adapter.InboundContext) bool {
  301. return r.abstractDefaultRule.Match(metadata)
  302. }
  303. var _ adapter.DNSRule = (*LogicalDNSRule)(nil)
  304. type LogicalDNSRule struct {
  305. abstractLogicalRule
  306. }
  307. func NewLogicalDNSRule(ctx context.Context, logger log.ContextLogger, options option.LogicalDNSRule) (*LogicalDNSRule, error) {
  308. r := &LogicalDNSRule{
  309. abstractLogicalRule: abstractLogicalRule{
  310. rules: make([]adapter.HeadlessRule, len(options.Rules)),
  311. invert: options.Invert,
  312. action: NewDNSRuleAction(logger, options.DNSRuleAction),
  313. },
  314. }
  315. switch options.Mode {
  316. case C.LogicalTypeAnd:
  317. r.mode = C.LogicalTypeAnd
  318. case C.LogicalTypeOr:
  319. r.mode = C.LogicalTypeOr
  320. default:
  321. return nil, E.New("unknown logical mode: ", options.Mode)
  322. }
  323. for i, subRule := range options.Rules {
  324. rule, err := NewDNSRule(ctx, logger, subRule, false)
  325. if err != nil {
  326. return nil, E.Cause(err, "sub rule[", i, "]")
  327. }
  328. r.rules[i] = rule
  329. }
  330. return r, nil
  331. }
  332. func (r *LogicalDNSRule) Action() adapter.RuleAction {
  333. return r.action
  334. }
  335. func (r *LogicalDNSRule) WithAddressLimit() bool {
  336. for _, rawRule := range r.rules {
  337. switch rule := rawRule.(type) {
  338. case *DefaultDNSRule:
  339. if rule.WithAddressLimit() {
  340. return true
  341. }
  342. case *LogicalDNSRule:
  343. if rule.WithAddressLimit() {
  344. return true
  345. }
  346. }
  347. }
  348. return false
  349. }
  350. func (r *LogicalDNSRule) Match(metadata *adapter.InboundContext) bool {
  351. if r.mode == C.LogicalTypeAnd {
  352. return common.All(r.rules, func(it adapter.HeadlessRule) bool {
  353. metadata.ResetRuleCache()
  354. return it.(adapter.DNSRule).Match(metadata)
  355. }) != r.invert
  356. } else {
  357. return common.Any(r.rules, func(it adapter.HeadlessRule) bool {
  358. metadata.ResetRuleCache()
  359. return it.(adapter.DNSRule).Match(metadata)
  360. }) != r.invert
  361. }
  362. }
  363. func (r *LogicalDNSRule) MatchAddressLimit(metadata *adapter.InboundContext) bool {
  364. if r.mode == C.LogicalTypeAnd {
  365. return common.All(r.rules, func(it adapter.HeadlessRule) bool {
  366. metadata.ResetRuleCache()
  367. return it.(adapter.DNSRule).MatchAddressLimit(metadata)
  368. }) != r.invert
  369. } else {
  370. return common.Any(r.rules, func(it adapter.HeadlessRule) bool {
  371. metadata.ResetRuleCache()
  372. return it.(adapter.DNSRule).MatchAddressLimit(metadata)
  373. }) != r.invert
  374. }
  375. }