mirror of
https://github.com/SagerNet/sing-box.git
synced 2025-07-23 14:34:08 +08:00
Add API to dump AdGuard rules
This commit is contained in:
parent
fc0f5ed83a
commit
bea9048cfe
@ -54,7 +54,7 @@ func convertRuleSet(sourcePath string) error {
|
|||||||
var rules []option.HeadlessRule
|
var rules []option.HeadlessRule
|
||||||
switch flagRuleSetConvertType {
|
switch flagRuleSetConvertType {
|
||||||
case "adguard":
|
case "adguard":
|
||||||
rules, err = adguard.Convert(reader, log.StdLogger())
|
rules, err = adguard.ToOptions(reader, log.StdLogger())
|
||||||
case "":
|
case "":
|
||||||
return E.New("source type is required")
|
return E.New("source type is required")
|
||||||
default:
|
default:
|
||||||
|
@ -6,7 +6,10 @@ import (
|
|||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
"github.com/sagernet/sing-box/common/srs"
|
"github.com/sagernet/sing-box/common/srs"
|
||||||
|
C "github.com/sagernet/sing-box/constant"
|
||||||
"github.com/sagernet/sing-box/log"
|
"github.com/sagernet/sing-box/log"
|
||||||
|
"github.com/sagernet/sing-box/option"
|
||||||
|
E "github.com/sagernet/sing/common/exceptions"
|
||||||
"github.com/sagernet/sing/common/json"
|
"github.com/sagernet/sing/common/json"
|
||||||
|
|
||||||
"github.com/spf13/cobra"
|
"github.com/spf13/cobra"
|
||||||
@ -50,6 +53,11 @@ func decompileRuleSet(sourcePath string) error {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
if hasRule(ruleSet.Options.Rules, func(rule option.DefaultHeadlessRule) bool {
|
||||||
|
return len(rule.AdGuardDomain) > 0
|
||||||
|
}) {
|
||||||
|
return E.New("unable to decompile binary AdGuard rules to rule-set.")
|
||||||
|
}
|
||||||
var outputPath string
|
var outputPath string
|
||||||
if flagRuleSetDecompileOutput == flagRuleSetDecompileDefaultOutput {
|
if flagRuleSetDecompileOutput == flagRuleSetDecompileDefaultOutput {
|
||||||
if strings.HasSuffix(sourcePath, ".srs") {
|
if strings.HasSuffix(sourcePath, ".srs") {
|
||||||
@ -75,3 +83,19 @@ func decompileRuleSet(sourcePath string) error {
|
|||||||
outputFile.Close()
|
outputFile.Close()
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func hasRule(rules []option.HeadlessRule, cond func(rule option.DefaultHeadlessRule) bool) bool {
|
||||||
|
for _, rule := range rules {
|
||||||
|
switch rule.Type {
|
||||||
|
case C.RuleTypeDefault:
|
||||||
|
if cond(rule.DefaultOptions) {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
case C.RuleTypeLogical:
|
||||||
|
if hasRule(rule.LogicalOptions.Rules, cond) {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
@ -2,6 +2,7 @@ package adguard
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"bufio"
|
"bufio"
|
||||||
|
"bytes"
|
||||||
"io"
|
"io"
|
||||||
"net/netip"
|
"net/netip"
|
||||||
"os"
|
"os"
|
||||||
@ -27,7 +28,7 @@ type agdguardRuleLine struct {
|
|||||||
isImportant bool
|
isImportant bool
|
||||||
}
|
}
|
||||||
|
|
||||||
func Convert(reader io.Reader, logger logger.Logger) ([]option.HeadlessRule, error) {
|
func ToOptions(reader io.Reader, logger logger.Logger) ([]option.HeadlessRule, error) {
|
||||||
scanner := bufio.NewScanner(reader)
|
scanner := bufio.NewScanner(reader)
|
||||||
var (
|
var (
|
||||||
ruleLines []agdguardRuleLine
|
ruleLines []agdguardRuleLine
|
||||||
@ -36,45 +37,12 @@ func Convert(reader io.Reader, logger logger.Logger) ([]option.HeadlessRule, err
|
|||||||
parseLine:
|
parseLine:
|
||||||
for scanner.Scan() {
|
for scanner.Scan() {
|
||||||
ruleLine := scanner.Text()
|
ruleLine := scanner.Text()
|
||||||
|
|
||||||
// Empty line
|
|
||||||
if ruleLine == "" {
|
if ruleLine == "" {
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
// Comment (both line comment and in-line comment)
|
if strings.HasPrefix(ruleLine, "!") || strings.HasPrefix(ruleLine, "#") {
|
||||||
if strings.Contains(ruleLine, "!") {
|
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
// Either comment or cosmetic filter
|
|
||||||
if strings.Contains(ruleLine, "#") {
|
|
||||||
ignoredLines++
|
|
||||||
logger.Debug("ignored unsupported cosmetic filter: ", ruleLine)
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
// We don't support URL query anyway
|
|
||||||
if strings.Contains(ruleLine, "?") || strings.Contains(ruleLine, "&") {
|
|
||||||
ignoredLines++
|
|
||||||
logger.Debug("ignored unsupported rule with query: ", ruleLine)
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
// Commonly seen in CSS selectors of cosmetic filters
|
|
||||||
if strings.Contains(ruleLine, "[") || strings.Contains(ruleLine, "]") {
|
|
||||||
ignoredLines++
|
|
||||||
logger.Debug("ignored unsupported cosmetic filter: ", ruleLine)
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
if strings.Contains(ruleLine, "(") || strings.Contains(ruleLine, ")") {
|
|
||||||
ignoredLines++
|
|
||||||
logger.Debug("ignored unsupported cosmetic filter: ", ruleLine)
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
// We don't support $domain modifier
|
|
||||||
if strings.Contains(ruleLine, "~") {
|
|
||||||
ignoredLines++
|
|
||||||
logger.Debug("ignored unsupported rule modifier: ", ruleLine)
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
|
|
||||||
originRuleLine := ruleLine
|
originRuleLine := ruleLine
|
||||||
if M.IsDomainName(ruleLine) {
|
if M.IsDomainName(ruleLine) {
|
||||||
ruleLines = append(ruleLines, agdguardRuleLine{
|
ruleLines = append(ruleLines, agdguardRuleLine{
|
||||||
@ -128,7 +96,7 @@ parseLine:
|
|||||||
}
|
}
|
||||||
if !ignored {
|
if !ignored {
|
||||||
ignoredLines++
|
ignoredLines++
|
||||||
logger.Debug("ignored unsupported rule with modifier: ", paramParts[0], ": ", ruleLine)
|
logger.Debug("ignored unsupported rule with modifier: ", paramParts[0], ": ", originRuleLine)
|
||||||
continue parseLine
|
continue parseLine
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -156,17 +124,35 @@ parseLine:
|
|||||||
ruleLine = ruleLine[1 : len(ruleLine)-1]
|
ruleLine = ruleLine[1 : len(ruleLine)-1]
|
||||||
if ignoreIPCIDRRegexp(ruleLine) {
|
if ignoreIPCIDRRegexp(ruleLine) {
|
||||||
ignoredLines++
|
ignoredLines++
|
||||||
logger.Debug("ignored unsupported rule with IPCIDR regexp: ", ruleLine)
|
logger.Debug("ignored unsupported rule with IPCIDR regexp: ", originRuleLine)
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
isRegexp = true
|
isRegexp = true
|
||||||
} else {
|
} else {
|
||||||
if strings.Contains(ruleLine, "://") {
|
if strings.Contains(ruleLine, "://") {
|
||||||
ruleLine = common.SubstringAfter(ruleLine, "://")
|
ruleLine = common.SubstringAfter(ruleLine, "://")
|
||||||
|
isSuffix = true
|
||||||
}
|
}
|
||||||
if strings.Contains(ruleLine, "/") {
|
if strings.Contains(ruleLine, "/") {
|
||||||
ignoredLines++
|
ignoredLines++
|
||||||
logger.Debug("ignored unsupported rule with path: ", ruleLine)
|
logger.Debug("ignored unsupported rule with path: ", originRuleLine)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if strings.Contains(ruleLine, "?") || strings.Contains(ruleLine, "&") {
|
||||||
|
ignoredLines++
|
||||||
|
logger.Debug("ignored unsupported rule with query: ", originRuleLine)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if strings.Contains(ruleLine, "[") || strings.Contains(ruleLine, "]") ||
|
||||||
|
strings.Contains(ruleLine, "(") || strings.Contains(ruleLine, ")") ||
|
||||||
|
strings.Contains(ruleLine, "!") || strings.Contains(ruleLine, "#") {
|
||||||
|
ignoredLines++
|
||||||
|
logger.Debug("ignored unsupported cosmetic filter: ", originRuleLine)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if strings.Contains(ruleLine, "~") {
|
||||||
|
ignoredLines++
|
||||||
|
logger.Debug("ignored unsupported rule modifier: ", originRuleLine)
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
var domainCheck string
|
var domainCheck string
|
||||||
@ -185,13 +171,13 @@ parseLine:
|
|||||||
_, ipErr := parseADGuardIPCIDRLine(ruleLine)
|
_, ipErr := parseADGuardIPCIDRLine(ruleLine)
|
||||||
if ipErr == nil {
|
if ipErr == nil {
|
||||||
ignoredLines++
|
ignoredLines++
|
||||||
logger.Debug("ignored unsupported rule with IPCIDR: ", ruleLine)
|
logger.Debug("ignored unsupported rule with IPCIDR: ", originRuleLine)
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
if M.ParseSocksaddr(domainCheck).Port != 0 {
|
if M.ParseSocksaddr(domainCheck).Port != 0 {
|
||||||
logger.Debug("ignored unsupported rule with port: ", ruleLine)
|
logger.Debug("ignored unsupported rule with port: ", originRuleLine)
|
||||||
} else {
|
} else {
|
||||||
logger.Debug("ignored unsupported rule with invalid domain: ", ruleLine)
|
logger.Debug("ignored unsupported rule with invalid domain: ", originRuleLine)
|
||||||
}
|
}
|
||||||
ignoredLines++
|
ignoredLines++
|
||||||
continue
|
continue
|
||||||
@ -309,10 +295,112 @@ parseLine:
|
|||||||
},
|
},
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
if ignoredLines > 0 {
|
||||||
logger.Info("parsed rules: ", len(ruleLines), "/", len(ruleLines)+ignoredLines)
|
logger.Info("parsed rules: ", len(ruleLines), "/", len(ruleLines)+ignoredLines)
|
||||||
|
}
|
||||||
return []option.HeadlessRule{currentRule}, nil
|
return []option.HeadlessRule{currentRule}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
var ErrInvalid = E.New("invalid binary AdGuard rule-set")
|
||||||
|
|
||||||
|
func FromOptions(rules []option.HeadlessRule) ([]byte, error) {
|
||||||
|
if len(rules) != 1 {
|
||||||
|
return nil, ErrInvalid
|
||||||
|
}
|
||||||
|
rule := rules[0]
|
||||||
|
var (
|
||||||
|
importantDomain []string
|
||||||
|
importantDomainRegex []string
|
||||||
|
importantExcludeDomain []string
|
||||||
|
importantExcludeDomainRegex []string
|
||||||
|
domain []string
|
||||||
|
domainRegex []string
|
||||||
|
excludeDomain []string
|
||||||
|
excludeDomainRegex []string
|
||||||
|
)
|
||||||
|
parse:
|
||||||
|
for {
|
||||||
|
switch rule.Type {
|
||||||
|
case C.RuleTypeLogical:
|
||||||
|
if !(len(rule.LogicalOptions.Rules) == 2 && rule.LogicalOptions.Rules[0].Type == C.RuleTypeDefault) {
|
||||||
|
return nil, ErrInvalid
|
||||||
|
}
|
||||||
|
if rule.LogicalOptions.Mode == C.LogicalTypeAnd && rule.LogicalOptions.Rules[0].DefaultOptions.Invert {
|
||||||
|
if len(importantExcludeDomain) == 0 && len(importantExcludeDomainRegex) == 0 {
|
||||||
|
importantExcludeDomain = rule.LogicalOptions.Rules[0].DefaultOptions.AdGuardDomain
|
||||||
|
importantExcludeDomainRegex = rule.LogicalOptions.Rules[0].DefaultOptions.DomainRegex
|
||||||
|
if len(importantExcludeDomain)+len(importantExcludeDomainRegex) == 0 {
|
||||||
|
return nil, ErrInvalid
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
excludeDomain = rule.LogicalOptions.Rules[0].DefaultOptions.AdGuardDomain
|
||||||
|
excludeDomainRegex = rule.LogicalOptions.Rules[0].DefaultOptions.DomainRegex
|
||||||
|
if len(excludeDomain)+len(excludeDomainRegex) == 0 {
|
||||||
|
return nil, ErrInvalid
|
||||||
|
}
|
||||||
|
}
|
||||||
|
} else if rule.LogicalOptions.Mode == C.LogicalTypeOr && !rule.LogicalOptions.Rules[0].DefaultOptions.Invert {
|
||||||
|
importantDomain = rule.LogicalOptions.Rules[0].DefaultOptions.AdGuardDomain
|
||||||
|
importantDomainRegex = rule.LogicalOptions.Rules[0].DefaultOptions.DomainRegex
|
||||||
|
if len(importantDomain)+len(importantDomainRegex) == 0 {
|
||||||
|
return nil, ErrInvalid
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
return nil, ErrInvalid
|
||||||
|
}
|
||||||
|
rule = rule.LogicalOptions.Rules[1]
|
||||||
|
case C.RuleTypeDefault:
|
||||||
|
domain = rule.DefaultOptions.AdGuardDomain
|
||||||
|
domainRegex = rule.DefaultOptions.DomainRegex
|
||||||
|
if len(domain)+len(domainRegex) == 0 {
|
||||||
|
return nil, ErrInvalid
|
||||||
|
}
|
||||||
|
break parse
|
||||||
|
}
|
||||||
|
}
|
||||||
|
var output bytes.Buffer
|
||||||
|
for _, ruleLine := range importantDomain {
|
||||||
|
output.WriteString(ruleLine)
|
||||||
|
output.WriteString("$important\n")
|
||||||
|
}
|
||||||
|
for _, ruleLine := range importantDomainRegex {
|
||||||
|
output.WriteString("/")
|
||||||
|
output.WriteString(ruleLine)
|
||||||
|
output.WriteString("/$important\n")
|
||||||
|
|
||||||
|
}
|
||||||
|
for _, ruleLine := range importantExcludeDomain {
|
||||||
|
output.WriteString("@@")
|
||||||
|
output.WriteString(ruleLine)
|
||||||
|
output.WriteString("$important\n")
|
||||||
|
}
|
||||||
|
for _, ruleLine := range importantExcludeDomainRegex {
|
||||||
|
output.WriteString("@@/")
|
||||||
|
output.WriteString(ruleLine)
|
||||||
|
output.WriteString("/$important\n")
|
||||||
|
}
|
||||||
|
for _, ruleLine := range domain {
|
||||||
|
output.WriteString(ruleLine)
|
||||||
|
output.WriteString("\n")
|
||||||
|
}
|
||||||
|
for _, ruleLine := range domainRegex {
|
||||||
|
output.WriteString("/")
|
||||||
|
output.WriteString(ruleLine)
|
||||||
|
output.WriteString("/\n")
|
||||||
|
}
|
||||||
|
for _, ruleLine := range excludeDomain {
|
||||||
|
output.WriteString("@@")
|
||||||
|
output.WriteString(ruleLine)
|
||||||
|
output.WriteString("\n")
|
||||||
|
}
|
||||||
|
for _, ruleLine := range excludeDomainRegex {
|
||||||
|
output.WriteString("@@/")
|
||||||
|
output.WriteString(ruleLine)
|
||||||
|
output.WriteString("/\n")
|
||||||
|
}
|
||||||
|
return output.Bytes(), nil
|
||||||
|
}
|
||||||
|
|
||||||
func ignoreIPCIDRRegexp(ruleLine string) bool {
|
func ignoreIPCIDRRegexp(ruleLine string) bool {
|
||||||
if strings.HasPrefix(ruleLine, "(http?:\\/\\/)") {
|
if strings.HasPrefix(ruleLine, "(http?:\\/\\/)") {
|
||||||
ruleLine = ruleLine[12:]
|
ruleLine = ruleLine[12:]
|
||||||
@ -320,11 +408,9 @@ func ignoreIPCIDRRegexp(ruleLine string) bool {
|
|||||||
ruleLine = ruleLine[13:]
|
ruleLine = ruleLine[13:]
|
||||||
} else if strings.HasPrefix(ruleLine, "^") {
|
} else if strings.HasPrefix(ruleLine, "^") {
|
||||||
ruleLine = ruleLine[1:]
|
ruleLine = ruleLine[1:]
|
||||||
} else {
|
|
||||||
return false
|
|
||||||
}
|
}
|
||||||
_, parseErr := strconv.ParseUint(common.SubstringBefore(ruleLine, "\\."), 10, 8)
|
return common.Error(strconv.ParseUint(common.SubstringBefore(ruleLine, "\\."), 10, 8)) == nil ||
|
||||||
return parseErr == nil
|
common.Error(strconv.ParseUint(common.SubstringBefore(ruleLine, "."), 10, 8)) == nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func parseAdGuardHostLine(ruleLine string) (string, error) {
|
func parseAdGuardHostLine(ruleLine string) (string, error) {
|
||||||
|
@ -14,7 +14,8 @@ import (
|
|||||||
|
|
||||||
func TestConverter(t *testing.T) {
|
func TestConverter(t *testing.T) {
|
||||||
t.Parallel()
|
t.Parallel()
|
||||||
rules, err := Convert(strings.NewReader(`
|
ruleString := `||sagernet.org^$important
|
||||||
|
@@|sing-box.sagernet.org^$important
|
||||||
||example.org^
|
||example.org^
|
||||||
|example.com^
|
|example.com^
|
||||||
example.net^
|
example.net^
|
||||||
@ -22,10 +23,9 @@ example.net^
|
|||||||
||example.edu.tw^
|
||example.edu.tw^
|
||||||
|example.gov
|
|example.gov
|
||||||
example.arpa
|
example.arpa
|
||||||
@@|sagernet.example.org|
|
@@|sagernet.example.org^
|
||||||
||sagernet.org^$important
|
`
|
||||||
@@|sing-box.sagernet.org^$important
|
rules, err := ToOptions(strings.NewReader(ruleString), logger.NOP())
|
||||||
`), logger.NOP())
|
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
require.Len(t, rules, 1)
|
require.Len(t, rules, 1)
|
||||||
rule, err := rule.NewHeadlessRule(context.Background(), rules[0])
|
rule, err := rule.NewHeadlessRule(context.Background(), rules[0])
|
||||||
@ -76,11 +76,14 @@ example.arpa
|
|||||||
Domain: domain,
|
Domain: domain,
|
||||||
}), domain)
|
}), domain)
|
||||||
}
|
}
|
||||||
|
ruleFromOptions, err := FromOptions(rules)
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.Equal(t, ruleString, string(ruleFromOptions))
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestHosts(t *testing.T) {
|
func TestHosts(t *testing.T) {
|
||||||
t.Parallel()
|
t.Parallel()
|
||||||
rules, err := Convert(strings.NewReader(`
|
rules, err := ToOptions(strings.NewReader(`
|
||||||
127.0.0.1 localhost
|
127.0.0.1 localhost
|
||||||
::1 localhost #[IPv6]
|
::1 localhost #[IPv6]
|
||||||
0.0.0.0 google.com
|
0.0.0.0 google.com
|
||||||
@ -111,7 +114,7 @@ func TestHosts(t *testing.T) {
|
|||||||
|
|
||||||
func TestSimpleHosts(t *testing.T) {
|
func TestSimpleHosts(t *testing.T) {
|
||||||
t.Parallel()
|
t.Parallel()
|
||||||
rules, err := Convert(strings.NewReader(`
|
rules, err := ToOptions(strings.NewReader(`
|
||||||
example.com
|
example.com
|
||||||
www.example.org
|
www.example.org
|
||||||
`), logger.NOP())
|
`), logger.NOP())
|
||||||
|
@ -215,16 +215,15 @@ func readDefaultRule(reader varbin.Reader, recover bool) (rule option.DefaultHea
|
|||||||
case ruleItemWIFIBSSID:
|
case ruleItemWIFIBSSID:
|
||||||
rule.WIFIBSSID, err = readRuleItemString(reader)
|
rule.WIFIBSSID, err = readRuleItemString(reader)
|
||||||
case ruleItemAdGuardDomain:
|
case ruleItemAdGuardDomain:
|
||||||
if recover {
|
|
||||||
err = E.New("unable to decompile binary AdGuard rules to rule-set")
|
|
||||||
return
|
|
||||||
}
|
|
||||||
var matcher *domain.AdGuardMatcher
|
var matcher *domain.AdGuardMatcher
|
||||||
matcher, err = domain.ReadAdGuardMatcher(reader)
|
matcher, err = domain.ReadAdGuardMatcher(reader)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
rule.AdGuardDomainMatcher = matcher
|
rule.AdGuardDomainMatcher = matcher
|
||||||
|
if recover {
|
||||||
|
rule.AdGuardDomain = matcher.Dump()
|
||||||
|
}
|
||||||
case ruleItemNetworkType:
|
case ruleItemNetworkType:
|
||||||
rule.NetworkType, err = readRuleItemUint8[option.InterfaceType](reader)
|
rule.NetworkType, err = readRuleItemUint8[option.InterfaceType](reader)
|
||||||
case ruleItemNetworkIsExpensive:
|
case ruleItemNetworkIsExpensive:
|
||||||
|
Loading…
x
Reference in New Issue
Block a user