aboutsummaryrefslogtreecommitdiff
path: root/net/shadowsocks-libev/files/ss-rules/chain.uc
diff options
context:
space:
mode:
Diffstat (limited to 'net/shadowsocks-libev/files/ss-rules/chain.uc')
-rw-r--r--net/shadowsocks-libev/files/ss-rules/chain.uc122
1 files changed, 122 insertions, 0 deletions
diff --git a/net/shadowsocks-libev/files/ss-rules/chain.uc b/net/shadowsocks-libev/files/ss-rules/chain.uc
new file mode 100644
index 0000000..3047f16
--- /dev/null
+++ b/net/shadowsocks-libev/files/ss-rules/chain.uc
@@ -0,0 +1,122 @@
+{%
+function get_local_verdict() {
+ let v = o_local_default;
+ if (v == "checkdst") {
+ return "goto ss_rules_dst_" + proto;
+ } else if (v == "forward") {
+ return "goto ss_rules_forward_" + proto;
+ } else {
+ return null;
+ }
+}
+
+function get_src_default_verdict() {
+ let v = o_src_default;
+ if (v == "checkdst") {
+ return "goto ss_rules_dst_" + proto;
+ } else if (v == "forward") {
+ return "goto ss_rules_forward_" + proto;
+ } else {
+ return "accept";
+ }
+}
+
+function get_dst_default_verdict() {
+ let v = o_dst_default;
+ if (v == "forward") {
+ return "goto ss_rules_forward_" + proto;
+ } else {
+ return "accept";
+ }
+}
+
+function get_ifnames() {
+ let res = [];
+ for (let ifname in split(o_ifnames, /[ \t\n]/)) {
+ ifname = trim(ifname);
+ if (ifname) push(res, ifname);
+ }
+ return res;
+}
+
+let type, hook, priority, redir_port;
+if (proto == "tcp") {
+ type = "nat";
+ hook = "prerouting";
+ priority = -1;
+ redir_port = o_redir_tcp_port;
+} else if (proto == "udp") {
+ type = "filter";
+ hook = "prerouting";
+ priority = "mangle";
+ redir_port = o_redir_udp_port;
+ if (system("
+ set -o errexit
+ iprr() {
+ while ip $1 rule del fwmark 1 lookup 100 2>/dev/null; do true; done
+ ip $1 rule add fwmark 1 lookup 100
+ ip $1 route flush table 100 2>/dev/null || true
+ ip $1 route add local default dev lo table 100
+ }
+ iprr -4
+ iprr -6
+ ") != 0) {
+ return ;
+ }
+} else {
+ return;
+}
+
+%}
+{% if (redir_port): %}
+
+chain ss_rules_pre_{{ proto }} {
+ type {{ type }} hook {{ hook }} priority {{ priority }};
+ meta l4proto {{ proto }}{%- let ifnames=get_ifnames(); if (length(ifnames)): %} iifname { {{join(", ", ifnames)}} }{% endif %} goto ss_rules_pre_src_{{ proto }};
+}
+
+chain ss_rules_pre_src_{{ proto }} {
+ ip daddr @ss_rules_dst_bypass_ accept;
+ ip6 daddr @ss_rules6_dst_bypass_ accept;
+ goto ss_rules_src_{{ proto }};
+}
+
+chain ss_rules_src_{{ proto }} {
+ ip saddr @ss_rules_src_bypass accept;
+ ip saddr @ss_rules_src_forward goto ss_rules_forward_{{ proto }};
+ ip saddr @ss_rules_src_checkdst goto ss_rules_dst_{{ proto }};
+ ip6 saddr @ss_rules6_src_bypass accept;
+ ip6 saddr @ss_rules6_src_forward goto ss_rules_forward_{{ proto }};
+ ip6 saddr @ss_rules6_src_checkdst goto ss_rules_dst_{{ proto }};
+ {{ get_src_default_verdict() }};
+}
+
+chain ss_rules_dst_{{ proto }} {
+ ip daddr @ss_rules_dst_bypass accept;
+ ip daddr @ss_rules_dst_forward goto ss_rules_forward_{{ proto }};
+ ip6 daddr @ss_rules6_dst_bypass accept;
+ ip6 daddr @ss_rules6_dst_forward goto ss_rules_forward_{{ proto }};
+ {{ get_dst_default_verdict() }};
+}
+
+{% if (proto == "tcp"): %}
+chain ss_rules_forward_{{ proto }} {
+ meta l4proto tcp {{ o_nft_tcp_extra }} redirect to :{{ redir_port }};
+}
+{% let local_verdict = get_local_verdict(); if (local_verdict): %}
+chain ss_rules_local_out {
+ type {{ type }} hook output priority -1;
+ meta l4proto != tcp accept;
+ ip daddr @ss_rules_dst_bypass_ accept;
+ ip daddr @ss_rules_dst_bypass accept;
+ ip6 daddr @ss_rules6_dst_bypass_ accept;
+ ip6 daddr @ss_rules6_dst_bypass accept;
+ {{ local_verdict }};
+}
+{% endif %}
+{% elif (proto == "udp"): %}
+chain ss_rules_forward_{{ proto }} {
+ meta l4proto udp {{ o_nft_udp_extra }} meta mark set 1 tproxy to :{{ redir_port }};
+}
+{% endif %}
+{% endif %}