mirror of
https://github.com/SagerNet/sing-box.git
synced 2024-12-13 00:28:49 +00:00
325 lines
8.9 KiB
Go
325 lines
8.9 KiB
Go
package rule
|
|
|
|
import (
|
|
"context"
|
|
"net/netip"
|
|
"strings"
|
|
"sync"
|
|
"syscall"
|
|
"time"
|
|
|
|
"github.com/sagernet/sing-box/adapter"
|
|
"github.com/sagernet/sing-box/common/dialer"
|
|
"github.com/sagernet/sing-box/common/sniff"
|
|
C "github.com/sagernet/sing-box/constant"
|
|
"github.com/sagernet/sing-box/option"
|
|
"github.com/sagernet/sing-dns"
|
|
"github.com/sagernet/sing-tun"
|
|
"github.com/sagernet/sing/common"
|
|
E "github.com/sagernet/sing/common/exceptions"
|
|
F "github.com/sagernet/sing/common/format"
|
|
"github.com/sagernet/sing/common/logger"
|
|
N "github.com/sagernet/sing/common/network"
|
|
)
|
|
|
|
func NewRuleAction(router adapter.Router, logger logger.ContextLogger, action option.RuleAction) (adapter.RuleAction, error) {
|
|
switch action.Action {
|
|
case "":
|
|
return nil, nil
|
|
case C.RuleActionTypeRoute:
|
|
return &RuleActionRoute{
|
|
Outbound: action.RouteOptions.Outbound,
|
|
}, nil
|
|
case C.RuleActionTypeRouteOptions:
|
|
return &RuleActionRouteOptions{
|
|
UDPDisableDomainUnmapping: action.RouteOptionsOptions.UDPDisableDomainUnmapping,
|
|
UDPConnect: action.RouteOptionsOptions.UDPConnect,
|
|
}, nil
|
|
case C.RuleActionTypeDirect:
|
|
directDialer, err := dialer.New(router, option.DialerOptions(action.DirectOptions))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
var description string
|
|
descriptions := action.DirectOptions.Descriptions()
|
|
switch len(descriptions) {
|
|
case 0:
|
|
case 1:
|
|
description = F.ToString("(", descriptions[0], ")")
|
|
case 2:
|
|
description = F.ToString("(", descriptions[0], ",", descriptions[1], ")")
|
|
default:
|
|
description = F.ToString("(", descriptions[0], ",", descriptions[1], ",...)")
|
|
}
|
|
return &RuleActionDirect{
|
|
Dialer: directDialer,
|
|
description: description,
|
|
}, nil
|
|
case C.RuleActionTypeReject:
|
|
return &RuleActionReject{
|
|
Method: action.RejectOptions.Method,
|
|
NoDrop: action.RejectOptions.NoDrop,
|
|
logger: logger,
|
|
}, nil
|
|
case C.RuleActionTypeHijackDNS:
|
|
return &RuleActionHijackDNS{}, nil
|
|
case C.RuleActionTypeSniff:
|
|
sniffAction := &RuleActionSniff{
|
|
snifferNames: action.SniffOptions.Sniffer,
|
|
Timeout: time.Duration(action.SniffOptions.Timeout),
|
|
}
|
|
return sniffAction, sniffAction.build()
|
|
case C.RuleActionTypeResolve:
|
|
return &RuleActionResolve{
|
|
Strategy: dns.DomainStrategy(action.ResolveOptions.Strategy),
|
|
Server: action.ResolveOptions.Server,
|
|
}, nil
|
|
default:
|
|
panic(F.ToString("unknown rule action: ", action.Action))
|
|
}
|
|
}
|
|
|
|
func NewDNSRuleAction(logger logger.ContextLogger, action option.DNSRuleAction) adapter.RuleAction {
|
|
switch action.Action {
|
|
case "":
|
|
return nil
|
|
case C.RuleActionTypeRoute:
|
|
return &RuleActionDNSRoute{
|
|
Server: action.RouteOptions.Server,
|
|
DisableCache: action.RouteOptions.DisableCache,
|
|
RewriteTTL: action.RouteOptions.RewriteTTL,
|
|
ClientSubnet: action.RouteOptions.ClientSubnet.Build(),
|
|
}
|
|
case C.RuleActionTypeRouteOptions:
|
|
return &RuleActionDNSRouteOptions{
|
|
DisableCache: action.RouteOptionsOptions.DisableCache,
|
|
RewriteTTL: action.RouteOptionsOptions.RewriteTTL,
|
|
ClientSubnet: action.RouteOptionsOptions.ClientSubnet.Build(),
|
|
}
|
|
case C.RuleActionTypeReject:
|
|
return &RuleActionReject{
|
|
Method: action.RejectOptions.Method,
|
|
NoDrop: action.RejectOptions.NoDrop,
|
|
logger: logger,
|
|
}
|
|
default:
|
|
panic(F.ToString("unknown rule action: ", action.Action))
|
|
}
|
|
}
|
|
|
|
type RuleActionRoute struct {
|
|
Outbound string
|
|
}
|
|
|
|
func (r *RuleActionRoute) Type() string {
|
|
return C.RuleActionTypeRoute
|
|
}
|
|
|
|
func (r *RuleActionRoute) String() string {
|
|
return F.ToString("route(", r.Outbound, ")")
|
|
}
|
|
|
|
type RuleActionRouteOptions struct {
|
|
UDPDisableDomainUnmapping bool
|
|
UDPConnect bool
|
|
}
|
|
|
|
func (r *RuleActionRouteOptions) Type() string {
|
|
return C.RuleActionTypeRouteOptions
|
|
}
|
|
|
|
func (r *RuleActionRouteOptions) String() string {
|
|
var descriptions []string
|
|
if r.UDPDisableDomainUnmapping {
|
|
descriptions = append(descriptions, "udp-disable-domain-unmapping")
|
|
}
|
|
if r.UDPConnect {
|
|
descriptions = append(descriptions, "udp-connect")
|
|
}
|
|
return F.ToString("route-options(", strings.Join(descriptions, ","), ")")
|
|
}
|
|
|
|
type RuleActionDNSRoute struct {
|
|
Server string
|
|
DisableCache bool
|
|
RewriteTTL *uint32
|
|
ClientSubnet netip.Prefix
|
|
}
|
|
|
|
func (r *RuleActionDNSRoute) Type() string {
|
|
return C.RuleActionTypeRoute
|
|
}
|
|
|
|
func (r *RuleActionDNSRoute) String() string {
|
|
return F.ToString("route(", r.Server, ")")
|
|
}
|
|
|
|
type RuleActionDNSRouteOptions struct {
|
|
DisableCache bool
|
|
RewriteTTL *uint32
|
|
ClientSubnet netip.Prefix
|
|
}
|
|
|
|
func (r *RuleActionDNSRouteOptions) Type() string {
|
|
return C.RuleActionTypeRouteOptions
|
|
}
|
|
|
|
func (r *RuleActionDNSRouteOptions) String() string {
|
|
var descriptions []string
|
|
if r.DisableCache {
|
|
descriptions = append(descriptions, "disable-cache")
|
|
}
|
|
if r.RewriteTTL != nil {
|
|
descriptions = append(descriptions, F.ToString("rewrite-ttl(", *r.RewriteTTL, ")"))
|
|
}
|
|
if r.ClientSubnet.IsValid() {
|
|
descriptions = append(descriptions, F.ToString("client-subnet(", r.ClientSubnet, ")"))
|
|
}
|
|
return F.ToString("route-options(", strings.Join(descriptions, ","), ")")
|
|
}
|
|
|
|
type RuleActionDirect struct {
|
|
Dialer N.Dialer
|
|
description string
|
|
}
|
|
|
|
func (r *RuleActionDirect) Type() string {
|
|
return C.RuleActionTypeDirect
|
|
}
|
|
|
|
func (r *RuleActionDirect) String() string {
|
|
return "direct" + r.description
|
|
}
|
|
|
|
type RuleActionReject struct {
|
|
Method string
|
|
NoDrop bool
|
|
logger logger.ContextLogger
|
|
dropAccess sync.Mutex
|
|
dropCounter []time.Time
|
|
}
|
|
|
|
func (r *RuleActionReject) Type() string {
|
|
return C.RuleActionTypeReject
|
|
}
|
|
|
|
func (r *RuleActionReject) String() string {
|
|
if r.Method == C.RuleActionRejectMethodDefault {
|
|
return "reject"
|
|
}
|
|
return F.ToString("reject(", r.Method, ")")
|
|
}
|
|
|
|
func (r *RuleActionReject) Error(ctx context.Context) error {
|
|
var returnErr error
|
|
switch r.Method {
|
|
case C.RuleActionRejectMethodDefault:
|
|
returnErr = syscall.ECONNREFUSED
|
|
case C.RuleActionRejectMethodDrop:
|
|
return tun.ErrDrop
|
|
default:
|
|
panic(F.ToString("unknown reject method: ", r.Method))
|
|
}
|
|
r.dropAccess.Lock()
|
|
defer r.dropAccess.Unlock()
|
|
timeNow := time.Now()
|
|
r.dropCounter = common.Filter(r.dropCounter, func(t time.Time) bool {
|
|
return timeNow.Sub(t) <= 30*time.Second
|
|
})
|
|
r.dropCounter = append(r.dropCounter, timeNow)
|
|
if len(r.dropCounter) > 50 {
|
|
if ctx != nil {
|
|
r.logger.DebugContext(ctx, "dropped due to flooding")
|
|
}
|
|
return tun.ErrDrop
|
|
}
|
|
return returnErr
|
|
}
|
|
|
|
type RuleActionHijackDNS struct{}
|
|
|
|
func (r *RuleActionHijackDNS) Type() string {
|
|
return C.RuleActionTypeHijackDNS
|
|
}
|
|
|
|
func (r *RuleActionHijackDNS) String() string {
|
|
return "hijack-dns"
|
|
}
|
|
|
|
type RuleActionSniff struct {
|
|
snifferNames []string
|
|
StreamSniffers []sniff.StreamSniffer
|
|
PacketSniffers []sniff.PacketSniffer
|
|
Timeout time.Duration
|
|
// Deprecated
|
|
OverrideDestination bool
|
|
}
|
|
|
|
func (r *RuleActionSniff) Type() string {
|
|
return C.RuleActionTypeSniff
|
|
}
|
|
|
|
func (r *RuleActionSniff) build() error {
|
|
for _, name := range r.snifferNames {
|
|
switch name {
|
|
case C.ProtocolTLS:
|
|
r.StreamSniffers = append(r.StreamSniffers, sniff.TLSClientHello)
|
|
case C.ProtocolHTTP:
|
|
r.StreamSniffers = append(r.StreamSniffers, sniff.HTTPHost)
|
|
case C.ProtocolQUIC:
|
|
r.PacketSniffers = append(r.PacketSniffers, sniff.QUICClientHello)
|
|
case C.ProtocolDNS:
|
|
r.StreamSniffers = append(r.StreamSniffers, sniff.StreamDomainNameQuery)
|
|
r.PacketSniffers = append(r.PacketSniffers, sniff.DomainNameQuery)
|
|
case C.ProtocolSTUN:
|
|
r.PacketSniffers = append(r.PacketSniffers, sniff.STUNMessage)
|
|
case C.ProtocolBitTorrent:
|
|
r.StreamSniffers = append(r.StreamSniffers, sniff.BitTorrent)
|
|
r.PacketSniffers = append(r.PacketSniffers, sniff.UTP)
|
|
r.PacketSniffers = append(r.PacketSniffers, sniff.UDPTracker)
|
|
case C.ProtocolDTLS:
|
|
r.PacketSniffers = append(r.PacketSniffers, sniff.DTLSRecord)
|
|
case C.ProtocolSSH:
|
|
r.StreamSniffers = append(r.StreamSniffers, sniff.SSH)
|
|
case C.ProtocolRDP:
|
|
r.StreamSniffers = append(r.StreamSniffers, sniff.RDP)
|
|
default:
|
|
return E.New("unknown sniffer: ", name)
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (r *RuleActionSniff) String() string {
|
|
if len(r.snifferNames) == 0 && r.Timeout == 0 {
|
|
return "sniff"
|
|
} else if len(r.snifferNames) > 0 && r.Timeout == 0 {
|
|
return F.ToString("sniff(", strings.Join(r.snifferNames, ","), ")")
|
|
} else if len(r.snifferNames) == 0 && r.Timeout > 0 {
|
|
return F.ToString("sniff(", r.Timeout.String(), ")")
|
|
} else {
|
|
return F.ToString("sniff(", strings.Join(r.snifferNames, ","), ",", r.Timeout.String(), ")")
|
|
}
|
|
}
|
|
|
|
type RuleActionResolve struct {
|
|
Strategy dns.DomainStrategy
|
|
Server string
|
|
}
|
|
|
|
func (r *RuleActionResolve) Type() string {
|
|
return C.RuleActionTypeResolve
|
|
}
|
|
|
|
func (r *RuleActionResolve) String() string {
|
|
if r.Strategy == dns.DomainStrategyAsIS && r.Server == "" {
|
|
return F.ToString("resolve")
|
|
} else if r.Strategy != dns.DomainStrategyAsIS && r.Server == "" {
|
|
return F.ToString("resolve(", option.DomainStrategy(r.Strategy).String(), ")")
|
|
} else if r.Strategy == dns.DomainStrategyAsIS && r.Server != "" {
|
|
return F.ToString("resolve(", r.Server, ")")
|
|
} else {
|
|
return F.ToString("resolve(", option.DomainStrategy(r.Strategy).String(), ",", r.Server, ")")
|
|
}
|
|
}
|