config.go 2.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125
  1. package router
  2. import (
  3. "context"
  4. "net"
  5. v2net "v2ray.com/core/common/net"
  6. )
  7. type Rule struct {
  8. Tag string
  9. Condition Condition
  10. }
  11. func (v *Rule) Apply(ctx context.Context) bool {
  12. return v.Condition.Apply(ctx)
  13. }
  14. func (v *RoutingRule) BuildCondition() (Condition, error) {
  15. conds := NewConditionChan()
  16. if len(v.Domain) > 0 {
  17. anyCond := NewAnyCondition()
  18. for _, domain := range v.Domain {
  19. if domain.Type == Domain_Plain {
  20. anyCond.Add(NewPlainDomainMatcher(domain.Value))
  21. } else {
  22. matcher, err := NewRegexpDomainMatcher(domain.Value)
  23. if err != nil {
  24. return nil, err
  25. }
  26. anyCond.Add(matcher)
  27. }
  28. }
  29. conds.Add(anyCond)
  30. }
  31. if len(v.Cidr) > 0 {
  32. ipv4Net := v2net.NewIPNet()
  33. ipv6Cond := NewAnyCondition()
  34. hasIpv6 := false
  35. for _, ip := range v.Cidr {
  36. switch len(ip.Ip) {
  37. case net.IPv4len:
  38. ipv4Net.AddIP(ip.Ip, byte(ip.Prefix))
  39. case net.IPv6len:
  40. hasIpv6 = true
  41. matcher, err := NewCIDRMatcher(ip.Ip, ip.Prefix, false)
  42. if err != nil {
  43. return nil, err
  44. }
  45. ipv6Cond.Add(matcher)
  46. default:
  47. return nil, newError("invalid IP length").AtError()
  48. }
  49. }
  50. if !ipv4Net.IsEmpty() && hasIpv6 {
  51. cond := NewAnyCondition()
  52. cond.Add(NewIPv4Matcher(ipv4Net, false))
  53. cond.Add(ipv6Cond)
  54. conds.Add(cond)
  55. } else if !ipv4Net.IsEmpty() {
  56. conds.Add(NewIPv4Matcher(ipv4Net, false))
  57. } else if hasIpv6 {
  58. conds.Add(ipv6Cond)
  59. }
  60. }
  61. if v.PortRange != nil {
  62. conds.Add(NewPortMatcher(*v.PortRange))
  63. }
  64. if v.NetworkList != nil {
  65. conds.Add(NewNetworkMatcher(v.NetworkList))
  66. }
  67. if len(v.SourceCidr) > 0 {
  68. ipv4Net := v2net.NewIPNet()
  69. ipv6Cond := NewAnyCondition()
  70. hasIpv6 := false
  71. for _, ip := range v.SourceCidr {
  72. switch len(ip.Ip) {
  73. case net.IPv4len:
  74. ipv4Net.AddIP(ip.Ip, byte(ip.Prefix))
  75. case net.IPv6len:
  76. hasIpv6 = true
  77. matcher, err := NewCIDRMatcher(ip.Ip, ip.Prefix, true)
  78. if err != nil {
  79. return nil, err
  80. }
  81. ipv6Cond.Add(matcher)
  82. default:
  83. return nil, newError("invalid IP length").AtError()
  84. }
  85. }
  86. if !ipv4Net.IsEmpty() && hasIpv6 {
  87. cond := NewAnyCondition()
  88. cond.Add(NewIPv4Matcher(ipv4Net, true))
  89. cond.Add(ipv6Cond)
  90. conds.Add(cond)
  91. } else if !ipv4Net.IsEmpty() {
  92. conds.Add(NewIPv4Matcher(ipv4Net, true))
  93. } else if hasIpv6 {
  94. conds.Add(ipv6Cond)
  95. }
  96. }
  97. if len(v.UserEmail) > 0 {
  98. conds.Add(NewUserMatcher(v.UserEmail))
  99. }
  100. if len(v.InboundTag) > 0 {
  101. conds.Add(NewInboundTagMatcher(v.InboundTag))
  102. }
  103. if conds.Len() == 0 {
  104. return nil, newError("this rule has no effective fields").AtError()
  105. }
  106. return conds, nil
  107. }