use ipnet::{IpNet, Ipv4Net, Ipv6Net};
use iprange::IpRange;
use regex::bytes::{Regex, RegexBuilder, RegexSet, RegexSetBuilder};
pub use socks5_impl::protocol::Address;
use std::{
borrow::Cow,
collections::HashSet,
fmt,
fs::File,
io::{self, BufRead, BufReader, Error},
net::{IpAddr, SocketAddr},
path::{Path, PathBuf},
str,
};
mod sub_domains_tree;
use sub_domains_tree::SubDomainsTree;
#[derive(Debug, Copy, Clone, Eq, PartialEq)]
pub enum Mode {
BlackList,
WhiteList,
}
#[derive(Clone)]
struct Rules {
ipv4: IpRange<Ipv4Net>,
ipv6: IpRange<Ipv6Net>,
rule_regex: RegexSet,
rule_set: HashSet<String>,
rule_tree: SubDomainsTree,
}
impl fmt::Debug for Rules {
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
write!(f, "Rules {{ ipv4: {:?}, ipv6: {:?}, rule_regex: [", self.ipv4, self.ipv6)?;
let max_len = 2;
let has_more = self.rule_regex.len() > max_len;
for (idx, r) in self.rule_regex.patterns().iter().take(max_len).enumerate() {
if idx > 0 {
f.write_str(", ")?;
}
f.write_str(r)?;
}
if has_more {
f.write_str(", ...")?;
}
write!(f, "], rule_set: [")?;
let has_more = self.rule_set.len() > max_len;
for (idx, r) in self.rule_set.iter().take(max_len).enumerate() {
if idx > 0 {
f.write_str(", ")?;
}
f.write_str(r)?;
}
if has_more {
f.write_str(", ...")?;
}
write!(f, "], rule_tree: {:?} }}", self.rule_tree)
}
}
impl Rules {
fn new(
mut ipv4: IpRange<Ipv4Net>,
mut ipv6: IpRange<Ipv6Net>,
rule_regex: RegexSet,
rule_set: HashSet<String>,
rule_tree: SubDomainsTree,
) -> Rules {
ipv4.simplify();
ipv6.simplify();
Rules {
ipv4,
ipv6,
rule_regex,
rule_set,
rule_tree,
}
}
#[allow(dead_code)]
fn check_address_matched(&self, addr: &Address) -> bool {
match *addr {
Address::SocketAddress(ref saddr) => self.check_ip_matched(&saddr.ip()),
Address::DomainAddress(ref domain, ..) => self.check_host_matched(domain),
}
}
fn check_ip_matched(&self, addr: &IpAddr) -> bool {
match addr {
IpAddr::V4(v4) => {
if self.ipv4.contains(v4) {
return true;
}
let mapped_ipv6 = v4.to_ipv6_mapped();
self.ipv6.contains(&mapped_ipv6)
}
IpAddr::V6(v6) => {
if self.ipv6.contains(v6) {
return true;
}
if let Some(mapped_ipv4) = v6.to_ipv4_mapped() {
return self.ipv4.contains(&mapped_ipv4);
}
false
}
}
}
fn check_host_matched(&self, host: &str) -> bool {
let host = host.trim_end_matches('.'); self.rule_set.contains(host) || self.rule_tree.contains(host) || self.rule_regex.is_match(host.as_bytes())
}
fn is_ip_empty(&self) -> bool {
self.ipv4.is_empty() && self.ipv6.is_empty()
}
fn is_host_empty(&self) -> bool {
self.rule_set.is_empty() && self.rule_tree.is_empty() && self.rule_regex.is_empty()
}
}
struct ParsingRules {
name: &'static str,
ipv4: IpRange<Ipv4Net>,
ipv6: IpRange<Ipv6Net>,
rules_regex: Vec<String>,
rules_set: HashSet<String>,
rules_tree: SubDomainsTree,
}
impl ParsingRules {
fn new(name: &'static str) -> Self {
ParsingRules {
name,
ipv4: IpRange::new(),
ipv6: IpRange::new(),
rules_regex: Vec::new(),
rules_set: HashSet::new(),
rules_tree: SubDomainsTree::new(),
}
}
fn add_ipv4_rule(&mut self, rule: impl Into<Ipv4Net>) {
let rule = rule.into();
self.ipv4.add(rule);
}
fn add_ipv6_rule(&mut self, rule: impl Into<Ipv6Net>) {
let rule = rule.into();
log::trace!("IPV6-RULE {rule}");
self.ipv6.add(rule);
}
fn add_regex_rule(&mut self, mut rule: String) {
static TREE_SET_RULE_EQUIV: std::sync::OnceLock<Regex> = std::sync::OnceLock::new();
let regex = TREE_SET_RULE_EQUIV.get_or_init(|| {
RegexBuilder::new(r#"^(?:(?:\((?:\?:)?\^\|\\\.\)|(?:\^\.(?:\+|\*))?\\\.)((?:[\w-]+(?:\\\.)?)+)|\^((?:[\w-]+(?:\\\.)?)+))\$?$"#)
.unicode(false)
.build()
.unwrap()
});
if let Some(caps) = regex.captures(rule.as_bytes()) {
if let Some(tree_rule) = caps.get(1) {
if let Ok(tree_rule) = str::from_utf8(tree_rule.as_bytes()) {
let tree_rule = tree_rule.replace("\\.", ".");
if self.add_tree_rule_inner(&tree_rule).is_ok() {
return;
}
}
} else if let Some(set_rule) = caps.get(2) {
if let Ok(set_rule) = str::from_utf8(set_rule.as_bytes()) {
let set_rule = set_rule.replace("\\.", ".");
if self.add_set_rule_inner(&set_rule).is_ok() {
return;
}
}
}
}
rule.make_ascii_lowercase();
self.rules_regex.push(rule);
}
#[inline]
fn add_set_rule(&mut self, rule: &str) -> io::Result<()> {
log::trace!("SET-RULE {rule}");
self.add_set_rule_inner(rule)
}
fn add_set_rule_inner(&mut self, rule: &str) -> io::Result<()> {
self.rules_set.insert(self.check_is_ascii(rule)?.to_ascii_lowercase());
Ok(())
}
#[inline]
fn add_tree_rule(&mut self, rule: &str) -> io::Result<()> {
log::trace!("TREE-RULE {rule}");
self.add_tree_rule_inner(rule)
}
fn add_tree_rule_inner(&mut self, rule: &str) -> io::Result<()> {
self.rules_tree.insert(self.check_is_ascii(rule)?);
Ok(())
}
fn check_is_ascii<'a>(&self, str: &'a str) -> io::Result<&'a str> {
if str.is_ascii() {
Ok(str.trim_end_matches('.'))
} else {
Err(Error::other(format!(
"{} parsing error: Unicode not allowed here `{str}`",
self.name
)))
}
}
fn compile_regex(name: &'static str, regex_rules: Vec<String>) -> io::Result<RegexSet> {
const REGEX_SIZE_LIMIT: usize = usize::MAX;
RegexSetBuilder::new(regex_rules)
.size_limit(REGEX_SIZE_LIMIT)
.unicode(false)
.build()
.map_err(|err| Error::other(format!("{name} regex error: {err}")))
}
fn into_rules(self) -> io::Result<Rules> {
Ok(Rules::new(
self.ipv4,
self.ipv6,
Self::compile_regex(self.name, self.rules_regex)?,
self.rules_set,
self.rules_tree,
))
}
}
#[derive(Debug, Clone)]
pub struct AccessControl {
outbound_block: Rules,
black_list: Rules,
white_list: Rules,
mode: Mode,
file_path: PathBuf,
}
impl AccessControl {
pub fn load_from_file<P: AsRef<Path>>(p: P) -> io::Result<AccessControl> {
log::trace!("ACL loading from {:?}", p.as_ref());
let file_path_ref = p.as_ref();
let file_path = file_path_ref.to_path_buf();
let fp = File::open(file_path_ref)?;
let r = BufReader::new(fp);
let mut mode = Mode::BlackList;
let mut outbound_block = ParsingRules::new("[outbound_block_list]");
let mut bypass = ParsingRules::new("[black_list] or [bypass_list]");
let mut proxy = ParsingRules::new("[white_list] or [proxy_list]");
let mut curr = &mut bypass;
log::trace!("ACL parsing start from mode {mode:?} and black_list / bypass_list");
for line in r.lines() {
let line = line?;
if line.is_empty() {
continue;
}
if line.starts_with('#') {
continue;
}
let line = line.trim();
if !line.is_ascii() {
log::warn!("ACL rule {line} containing non-ASCII characters, skipped");
continue;
}
if let Some(rule) = line.strip_prefix("||") {
curr.add_tree_rule(rule)?;
continue;
}
if let Some(rule) = line.strip_prefix('|') {
curr.add_set_rule(rule)?;
continue;
}
match line {
"[reject_all]" | "[bypass_all]" => {
mode = Mode::WhiteList;
log::trace!("switch to mode {mode:?}");
}
"[accept_all]" | "[proxy_all]" => {
mode = Mode::BlackList;
log::trace!("switch to mode {mode:?}");
}
"[outbound_block_list]" => {
curr = &mut outbound_block;
log::trace!("loading outbound_block_list");
}
"[black_list]" | "[bypass_list]" => {
curr = &mut bypass;
log::trace!("loading black_list / bypass_list");
}
"[white_list]" | "[proxy_list]" => {
curr = &mut proxy;
log::trace!("loading white_list / proxy_list");
}
_ => {
match line.parse::<IpNet>() {
Ok(IpNet::V4(v4)) => {
curr.add_ipv4_rule(v4);
}
Ok(IpNet::V6(v6)) => {
curr.add_ipv6_rule(v6);
}
Err(..) => {
match line.parse::<IpAddr>() {
Ok(IpAddr::V4(v4)) => {
curr.add_ipv4_rule(v4);
}
Ok(IpAddr::V6(v6)) => {
curr.add_ipv6_rule(v6);
}
Err(..) => {
curr.add_regex_rule(line.to_owned());
}
}
}
}
}
}
}
Ok(AccessControl {
outbound_block: outbound_block.into_rules()?,
black_list: bypass.into_rules()?,
white_list: proxy.into_rules()?,
mode,
file_path,
})
}
pub fn file_path(&self) -> &Path {
&self.file_path
}
pub fn check_host_in_proxy_list(&self, host: &str) -> Option<bool> {
let host = Self::convert_to_ascii(host);
self.check_ascii_host_in_proxy_list(&host)
}
pub fn check_ascii_host_in_proxy_list(&self, host: &str) -> Option<bool> {
if self.white_list.check_host_matched(host) {
return Some(true);
}
if self.black_list.check_host_matched(host) {
return Some(false);
}
None
}
pub fn is_ip_empty(&self) -> bool {
match self.mode {
Mode::BlackList => self.black_list.is_ip_empty(),
Mode::WhiteList => self.white_list.is_ip_empty(),
}
}
pub fn is_host_empty(&self) -> bool {
self.black_list.is_host_empty() && self.white_list.is_host_empty()
}
pub fn check_ip_in_proxy_list(&self, ip: &IpAddr) -> bool {
match self.mode {
Mode::BlackList => !self.black_list.check_ip_matched(ip),
Mode::WhiteList => self.white_list.check_ip_matched(ip),
}
}
pub fn is_default_in_proxy_list(&self) -> bool {
match self.mode {
Mode::BlackList => true,
Mode::WhiteList => false,
}
}
fn convert_to_ascii(host: &str) -> Cow<'_, str> {
idna::domain_to_ascii(host).map(From::from).unwrap_or_else(|_| host.into())
}
pub async fn check_target_bypassed(&self, addr: &Address) -> bool {
match *addr {
Address::SocketAddress(ref addr) => !self.check_ip_in_proxy_list(&addr.ip()),
Address::DomainAddress(ref host, port) => {
if let Some(value) = self.check_host_in_proxy_list(host) {
return !value;
}
if self.is_ip_empty() {
return !self.is_default_in_proxy_list();
}
if let Ok(vaddr) = dns_resolve(host, port).await {
for addr in vaddr {
if !self.check_ip_in_proxy_list(&addr.ip()) {
return true;
}
}
}
false
}
}
}
pub fn check_client_blocked(&self, addr: &SocketAddr) -> bool {
match self.mode {
Mode::BlackList => {
self.black_list.check_ip_matched(&addr.ip())
}
Mode::WhiteList => {
!self.white_list.check_ip_matched(&addr.ip())
}
}
}
pub async fn check_outbound_blocked(&self, outbound: &Address) -> bool {
match outbound {
Address::SocketAddress(saddr) => self.outbound_block.check_ip_matched(&saddr.ip()),
Address::DomainAddress(host, port) => {
if self.outbound_block.check_host_matched(&Self::convert_to_ascii(host)) {
return true;
}
if let Ok(vaddr) = dns_resolve(host, *port).await {
for addr in vaddr {
if self.outbound_block.check_ip_matched(&addr.ip()) {
return true;
}
}
}
false
}
}
}
}
async fn dns_resolve(domain: &str, port: u16) -> std::io::Result<Vec<std::net::SocketAddr>> {
let addrs = tokio::net::lookup_host((domain, port)).await?;
Ok(addrs.collect())
}
#[tokio::test]
async fn test_dns_resolve() {
let addrs = dns_resolve("baidu.com", 80).await.unwrap();
println!("Resolved addresses: {addrs:?}");
assert!(!addrs.is_empty());
let addrs = dns_resolve("localhost", 80).await.unwrap();
println!("Resolved addresses: {addrs:?}");
assert!(!addrs.is_empty());
let addrs = dns_resolve("123.45.67.89", 65535).await.unwrap();
println!("Resolved addresses: {addrs:?}");
assert!(!addrs.is_empty());
let addrs = dns_resolve("xxxxsasasasd", 65535).await;
assert!(addrs.is_err());
}
#[test]
fn test_acl() {
let acl = AccessControl::load_from_file("shadowsocks.acl").unwrap();
assert!(!acl.is_ip_empty());
assert!(!acl.is_host_empty());
assert!(acl.check_host_in_proxy_list("www.google.com").unwrap());
assert!(!acl.check_host_in_proxy_list("www.baidu.com").unwrap_or_default());
assert!(acl.check_host_in_proxy_list("sex.com").unwrap());
assert!(acl.check_host_in_proxy_list("pornhub.com").unwrap_or_default());
assert!(!acl.check_host_in_proxy_list("example.com").unwrap_or_default());
assert!(acl.check_host_in_proxy_list("youtube.com").unwrap_or_default());
}