sing-box/route/rule/rule_dns.go

362 lines
11 KiB
Go
Raw Normal View History

2024-10-21 15:38:34 +00:00
package rule
2022-07-07 13:47:21 +00:00
import (
2024-10-18 01:58:03 +00:00
"context"
2022-07-07 13:47:21 +00:00
"github.com/sagernet/sing-box/adapter"
C "github.com/sagernet/sing-box/constant"
2024-10-18 01:58:03 +00:00
"github.com/sagernet/sing-box/experimental/deprecated"
2022-07-07 13:47:21 +00:00
"github.com/sagernet/sing-box/log"
"github.com/sagernet/sing-box/option"
"github.com/sagernet/sing/common"
2022-07-08 15:03:57 +00:00
E "github.com/sagernet/sing/common/exceptions"
2024-11-10 04:11:21 +00:00
"github.com/sagernet/sing/service"
2022-07-07 13:47:21 +00:00
)
2024-11-10 04:11:21 +00:00
func NewDNSRule(ctx context.Context, logger log.ContextLogger, options option.DNSRule, checkServer bool) (adapter.DNSRule, error) {
2022-07-07 13:47:21 +00:00
switch options.Type {
case "", C.RuleTypeDefault:
if !options.DefaultOptions.IsValid() {
return nil, E.New("missing conditions")
}
2024-10-21 15:38:34 +00:00
switch options.DefaultOptions.Action {
case "", C.RuleActionTypeRoute:
if options.DefaultOptions.RouteOptions.Server == "" && checkServer {
return nil, E.New("missing server field")
}
2022-07-07 13:47:21 +00:00
}
2024-11-10 04:11:21 +00:00
return NewDefaultDNSRule(ctx, logger, options.DefaultOptions)
2022-07-07 13:47:21 +00:00
case C.RuleTypeLogical:
if !options.LogicalOptions.IsValid() {
return nil, E.New("missing conditions")
}
2024-10-21 15:38:34 +00:00
switch options.LogicalOptions.Action {
case "", C.RuleActionTypeRoute:
if options.LogicalOptions.RouteOptions.Server == "" && checkServer {
return nil, E.New("missing server field")
}
2022-07-07 13:47:21 +00:00
}
2024-11-10 04:11:21 +00:00
return NewLogicalDNSRule(ctx, logger, options.LogicalOptions)
2022-07-07 13:47:21 +00:00
default:
return nil, E.New("unknown rule type: ", options.Type)
}
}
2022-07-24 06:05:06 +00:00
var _ adapter.DNSRule = (*DefaultDNSRule)(nil)
2022-07-07 13:47:21 +00:00
type DefaultDNSRule struct {
2023-06-07 12:28:21 +00:00
abstractDefaultRule
2022-07-19 14:16:49 +00:00
}
2024-11-10 04:11:21 +00:00
func NewDefaultDNSRule(ctx context.Context, logger log.ContextLogger, options option.DefaultDNSRule) (*DefaultDNSRule, error) {
2022-07-07 13:47:21 +00:00
rule := &DefaultDNSRule{
2023-06-07 12:28:21 +00:00
abstractDefaultRule: abstractDefaultRule{
2024-10-21 15:38:34 +00:00
invert: options.Invert,
2024-11-06 09:23:00 +00:00
action: NewDNSRuleAction(logger, options.DNSRuleAction),
2023-06-07 12:28:21 +00:00
},
2022-07-07 13:47:21 +00:00
}
if len(options.Inbound) > 0 {
item := NewInboundRule(options.Inbound)
rule.items = append(rule.items, item)
2022-07-10 06:22:28 +00:00
rule.allItems = append(rule.allItems, item)
2022-07-07 13:47:21 +00:00
}
2024-11-10 04:11:21 +00:00
router := service.FromContext[adapter.Router](ctx)
networkManager := service.FromContext[adapter.NetworkManager](ctx)
2022-08-16 15:46:05 +00:00
if options.IPVersion > 0 {
switch options.IPVersion {
case 4, 6:
item := NewIPVersionItem(options.IPVersion == 6)
rule.items = append(rule.items, item)
rule.allItems = append(rule.allItems, item)
default:
return nil, E.New("invalid ip version: ", options.IPVersion)
}
}
2023-02-08 08:18:40 +00:00
if len(options.QueryType) > 0 {
item := NewQueryTypeItem(options.QueryType)
rule.items = append(rule.items, item)
rule.allItems = append(rule.allItems, item)
}
2023-06-07 12:28:21 +00:00
if len(options.Network) > 0 {
item := NewNetworkItem(options.Network)
rule.items = append(rule.items, item)
rule.allItems = append(rule.allItems, item)
2022-07-07 13:47:21 +00:00
}
if len(options.AuthUser) > 0 {
item := NewAuthUserItem(options.AuthUser)
2022-07-17 07:11:26 +00:00
rule.items = append(rule.items, item)
rule.allItems = append(rule.allItems, item)
}
2022-07-07 13:47:21 +00:00
if len(options.Protocol) > 0 {
2022-07-20 01:41:44 +00:00
item := NewProtocolItem(options.Protocol)
2022-07-07 13:47:21 +00:00
rule.items = append(rule.items, item)
2022-07-10 06:22:28 +00:00
rule.allItems = append(rule.allItems, item)
2022-07-07 13:47:21 +00:00
}
if len(options.Domain) > 0 || len(options.DomainSuffix) > 0 {
item := NewDomainItem(options.Domain, options.DomainSuffix)
2022-09-14 14:03:26 +00:00
rule.destinationAddressItems = append(rule.destinationAddressItems, item)
2022-07-10 06:22:28 +00:00
rule.allItems = append(rule.allItems, item)
2022-07-07 13:47:21 +00:00
}
if len(options.DomainKeyword) > 0 {
item := NewDomainKeywordItem(options.DomainKeyword)
2022-09-14 14:03:26 +00:00
rule.destinationAddressItems = append(rule.destinationAddressItems, item)
2022-07-10 06:22:28 +00:00
rule.allItems = append(rule.allItems, item)
2022-07-07 13:47:21 +00:00
}
if len(options.DomainRegex) > 0 {
item, err := NewDomainRegexItem(options.DomainRegex)
if err != nil {
return nil, E.Cause(err, "domain_regex")
}
2022-09-14 14:03:26 +00:00
rule.destinationAddressItems = append(rule.destinationAddressItems, item)
2022-07-10 06:22:28 +00:00
rule.allItems = append(rule.allItems, item)
2022-07-07 13:47:21 +00:00
}
if len(options.Geosite) > 0 {
item := NewGeositeItem(router, logger, options.Geosite)
2022-09-14 14:03:26 +00:00
rule.destinationAddressItems = append(rule.destinationAddressItems, item)
2022-07-10 06:22:28 +00:00
rule.allItems = append(rule.allItems, item)
2022-07-07 13:47:21 +00:00
}
if len(options.SourceGeoIP) > 0 {
item := NewGeoIPItem(router, logger, true, options.SourceGeoIP)
2022-09-14 14:03:26 +00:00
rule.sourceAddressItems = append(rule.sourceAddressItems, item)
2022-07-10 06:22:28 +00:00
rule.allItems = append(rule.allItems, item)
2022-07-07 13:47:21 +00:00
}
if len(options.GeoIP) > 0 {
item := NewGeoIPItem(router, logger, false, options.GeoIP)
rule.destinationIPCIDRItems = append(rule.destinationIPCIDRItems, item)
rule.allItems = append(rule.allItems, item)
}
2022-07-07 13:47:21 +00:00
if len(options.SourceIPCIDR) > 0 {
item, err := NewIPCIDRItem(true, options.SourceIPCIDR)
if err != nil {
2024-01-14 05:01:57 +00:00
return nil, E.Cause(err, "source_ip_cidr")
2022-07-07 13:47:21 +00:00
}
2022-09-14 14:03:26 +00:00
rule.sourceAddressItems = append(rule.sourceAddressItems, item)
2022-07-10 06:22:28 +00:00
rule.allItems = append(rule.allItems, item)
2022-07-07 13:47:21 +00:00
}
if len(options.IPCIDR) > 0 {
item, err := NewIPCIDRItem(false, options.IPCIDR)
if err != nil {
return nil, E.Cause(err, "ip_cidr")
}
rule.destinationIPCIDRItems = append(rule.destinationIPCIDRItems, item)
rule.allItems = append(rule.allItems, item)
}
if options.SourceIPIsPrivate {
item := NewIPIsPrivateItem(true)
rule.sourceAddressItems = append(rule.sourceAddressItems, item)
rule.allItems = append(rule.allItems, item)
}
if options.IPIsPrivate {
item := NewIPIsPrivateItem(false)
rule.destinationIPCIDRItems = append(rule.destinationIPCIDRItems, item)
rule.allItems = append(rule.allItems, item)
}
2022-07-07 13:47:21 +00:00
if len(options.SourcePort) > 0 {
item := NewPortItem(true, options.SourcePort)
2022-09-14 14:03:26 +00:00
rule.sourcePortItems = append(rule.sourcePortItems, item)
2022-07-10 06:22:28 +00:00
rule.allItems = append(rule.allItems, item)
2022-07-07 13:47:21 +00:00
}
if len(options.SourcePortRange) > 0 {
item, err := NewPortRangeItem(true, options.SourcePortRange)
if err != nil {
return nil, E.Cause(err, "source_port_range")
}
2022-09-14 14:03:26 +00:00
rule.sourcePortItems = append(rule.sourcePortItems, item)
rule.allItems = append(rule.allItems, item)
}
2022-07-07 13:47:21 +00:00
if len(options.Port) > 0 {
item := NewPortItem(false, options.Port)
2022-09-14 14:03:26 +00:00
rule.destinationPortItems = append(rule.destinationPortItems, item)
2022-07-10 06:22:28 +00:00
rule.allItems = append(rule.allItems, item)
2022-07-07 13:47:21 +00:00
}
if len(options.PortRange) > 0 {
item, err := NewPortRangeItem(false, options.PortRange)
if err != nil {
return nil, E.Cause(err, "port_range")
}
2022-09-14 14:03:26 +00:00
rule.destinationPortItems = append(rule.destinationPortItems, item)
rule.allItems = append(rule.allItems, item)
}
if len(options.ProcessName) > 0 {
item := NewProcessItem(options.ProcessName)
rule.items = append(rule.items, item)
rule.allItems = append(rule.allItems, item)
}
if len(options.ProcessPath) > 0 {
item := NewProcessPathItem(options.ProcessPath)
rule.items = append(rule.items, item)
rule.allItems = append(rule.allItems, item)
}
2024-09-15 03:42:57 +00:00
if len(options.ProcessPathRegex) > 0 {
item, err := NewProcessPathRegexItem(options.ProcessPathRegex)
if err != nil {
return nil, E.Cause(err, "process_path_regex")
}
rule.items = append(rule.items, item)
rule.allItems = append(rule.allItems, item)
}
if len(options.PackageName) > 0 {
item := NewPackageNameItem(options.PackageName)
rule.items = append(rule.items, item)
rule.allItems = append(rule.allItems, item)
}
if len(options.User) > 0 {
item := NewUserItem(options.User)
rule.items = append(rule.items, item)
rule.allItems = append(rule.allItems, item)
}
if len(options.UserID) > 0 {
item := NewUserIDItem(options.UserID)
rule.items = append(rule.items, item)
rule.allItems = append(rule.allItems, item)
}
2022-07-07 13:47:21 +00:00
if len(options.Outbound) > 0 {
item := NewOutboundRule(options.Outbound)
rule.items = append(rule.items, item)
2022-07-10 06:22:28 +00:00
rule.allItems = append(rule.allItems, item)
2022-07-07 13:47:21 +00:00
}
2022-09-10 06:09:47 +00:00
if options.ClashMode != "" {
clashServer := service.FromContext[adapter.ClashServer](ctx)
item := NewClashModeItem(clashServer, options.ClashMode)
2022-09-10 06:09:47 +00:00
rule.items = append(rule.items, item)
rule.allItems = append(rule.allItems, item)
}
if len(options.WIFISSID) > 0 {
2024-11-10 04:11:21 +00:00
item := NewWIFISSIDItem(networkManager, options.WIFISSID)
rule.items = append(rule.items, item)
rule.allItems = append(rule.allItems, item)
}
if len(options.WIFIBSSID) > 0 {
2024-11-10 04:11:21 +00:00
item := NewWIFIBSSIDItem(networkManager, options.WIFIBSSID)
rule.items = append(rule.items, item)
rule.allItems = append(rule.allItems, item)
}
2023-12-01 05:24:12 +00:00
if len(options.RuleSet) > 0 {
2024-10-18 01:58:03 +00:00
var matchSource bool
if options.RuleSetIPCIDRMatchSource {
matchSource = true
} else
//nolint:staticcheck
if options.Deprecated_RulesetIPCIDRMatchSource {
matchSource = true
deprecated.Report(ctx, deprecated.OptionBadMatchSource)
}
item := NewRuleSetItem(router, options.RuleSet, matchSource, options.RuleSetIPCIDRAcceptEmpty)
2023-12-01 05:24:12 +00:00
rule.items = append(rule.items, item)
rule.allItems = append(rule.allItems, item)
}
2022-07-07 13:47:21 +00:00
return rule, nil
}
2024-10-21 15:38:34 +00:00
func (r *DefaultDNSRule) Action() adapter.RuleAction {
return r.action
}
func (r *DefaultDNSRule) WithAddressLimit() bool {
if len(r.destinationIPCIDRItems) > 0 {
return true
}
for _, rawRule := range r.items {
ruleSet, isRuleSet := rawRule.(*RuleSetItem)
if !isRuleSet {
continue
}
if ruleSet.ContainsDestinationIPCIDRRule() {
return true
}
}
return false
}
func (r *DefaultDNSRule) Match(metadata *adapter.InboundContext) bool {
metadata.IgnoreDestinationIPCIDRMatch = true
defer func() {
metadata.IgnoreDestinationIPCIDRMatch = false
}()
return r.abstractDefaultRule.Match(metadata)
}
func (r *DefaultDNSRule) MatchAddressLimit(metadata *adapter.InboundContext) bool {
return r.abstractDefaultRule.Match(metadata)
}
2022-07-24 06:05:06 +00:00
var _ adapter.DNSRule = (*LogicalDNSRule)(nil)
2022-07-07 13:47:21 +00:00
type LogicalDNSRule struct {
2023-06-07 12:28:21 +00:00
abstractLogicalRule
2022-07-24 06:05:06 +00:00
}
2024-11-10 04:11:21 +00:00
func NewLogicalDNSRule(ctx context.Context, logger log.ContextLogger, options option.LogicalDNSRule) (*LogicalDNSRule, error) {
2022-07-24 06:05:06 +00:00
r := &LogicalDNSRule{
2023-06-07 12:28:21 +00:00
abstractLogicalRule: abstractLogicalRule{
2024-10-21 15:38:34 +00:00
rules: make([]adapter.HeadlessRule, len(options.Rules)),
invert: options.Invert,
2024-11-06 09:23:00 +00:00
action: NewDNSRuleAction(logger, options.DNSRuleAction),
2023-06-07 12:28:21 +00:00
},
2022-07-24 06:05:06 +00:00
}
switch options.Mode {
case C.LogicalTypeAnd:
r.mode = C.LogicalTypeAnd
case C.LogicalTypeOr:
r.mode = C.LogicalTypeOr
default:
return nil, E.New("unknown logical mode: ", options.Mode)
}
for i, subRule := range options.Rules {
2024-11-10 04:11:21 +00:00
rule, err := NewDNSRule(ctx, logger, subRule, false)
2022-07-24 06:05:06 +00:00
if err != nil {
return nil, E.Cause(err, "sub rule[", i, "]")
}
r.rules[i] = rule
}
return r, nil
2022-07-07 13:47:21 +00:00
}
2024-10-21 15:38:34 +00:00
func (r *LogicalDNSRule) Action() adapter.RuleAction {
return r.action
}
func (r *LogicalDNSRule) WithAddressLimit() bool {
for _, rawRule := range r.rules {
switch rule := rawRule.(type) {
case *DefaultDNSRule:
if rule.WithAddressLimit() {
return true
}
case *LogicalDNSRule:
if rule.WithAddressLimit() {
return true
}
}
}
return false
}
func (r *LogicalDNSRule) Match(metadata *adapter.InboundContext) bool {
if r.mode == C.LogicalTypeAnd {
return common.All(r.rules, func(it adapter.HeadlessRule) bool {
metadata.ResetRuleCache()
return it.(adapter.DNSRule).Match(metadata)
}) != r.invert
} else {
return common.Any(r.rules, func(it adapter.HeadlessRule) bool {
metadata.ResetRuleCache()
return it.(adapter.DNSRule).Match(metadata)
}) != r.invert
}
}
func (r *LogicalDNSRule) MatchAddressLimit(metadata *adapter.InboundContext) bool {
if r.mode == C.LogicalTypeAnd {
return common.All(r.rules, func(it adapter.HeadlessRule) bool {
metadata.ResetRuleCache()
return it.(adapter.DNSRule).MatchAddressLimit(metadata)
}) != r.invert
} else {
return common.Any(r.rules, func(it adapter.HeadlessRule) bool {
metadata.ResetRuleCache()
return it.(adapter.DNSRule).MatchAddressLimit(metadata)
}) != r.invert
}
}