| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125 | 
							- package router
 
- import (
 
- 	"context"
 
- 	"net"
 
- 	v2net "v2ray.com/core/common/net"
 
- )
 
- type Rule struct {
 
- 	Tag       string
 
- 	Condition Condition
 
- }
 
- func (r *Rule) Apply(ctx context.Context) bool {
 
- 	return r.Condition.Apply(ctx)
 
- }
 
- func (rr *RoutingRule) BuildCondition() (Condition, error) {
 
- 	conds := NewConditionChan()
 
- 	if len(rr.Domain) > 0 {
 
- 		anyCond := NewAnyCondition()
 
- 		for _, domain := range rr.Domain {
 
- 			if domain.Type == Domain_Plain {
 
- 				anyCond.Add(NewPlainDomainMatcher(domain.Value))
 
- 			} else {
 
- 				matcher, err := NewRegexpDomainMatcher(domain.Value)
 
- 				if err != nil {
 
- 					return nil, err
 
- 				}
 
- 				anyCond.Add(matcher)
 
- 			}
 
- 		}
 
- 		conds.Add(anyCond)
 
- 	}
 
- 	if len(rr.Cidr) > 0 {
 
- 		ipv4Net := v2net.NewIPNet()
 
- 		ipv6Cond := NewAnyCondition()
 
- 		hasIpv6 := false
 
- 		for _, ip := range rr.Cidr {
 
- 			switch len(ip.Ip) {
 
- 			case net.IPv4len:
 
- 				ipv4Net.AddIP(ip.Ip, byte(ip.Prefix))
 
- 			case net.IPv6len:
 
- 				hasIpv6 = true
 
- 				matcher, err := NewCIDRMatcher(ip.Ip, ip.Prefix, false)
 
- 				if err != nil {
 
- 					return nil, err
 
- 				}
 
- 				ipv6Cond.Add(matcher)
 
- 			default:
 
- 				return nil, newError("invalid IP length").AtError()
 
- 			}
 
- 		}
 
- 		if !ipv4Net.IsEmpty() && hasIpv6 {
 
- 			cond := NewAnyCondition()
 
- 			cond.Add(NewIPv4Matcher(ipv4Net, false))
 
- 			cond.Add(ipv6Cond)
 
- 			conds.Add(cond)
 
- 		} else if !ipv4Net.IsEmpty() {
 
- 			conds.Add(NewIPv4Matcher(ipv4Net, false))
 
- 		} else if hasIpv6 {
 
- 			conds.Add(ipv6Cond)
 
- 		}
 
- 	}
 
- 	if rr.PortRange != nil {
 
- 		conds.Add(NewPortMatcher(*rr.PortRange))
 
- 	}
 
- 	if rr.NetworkList != nil {
 
- 		conds.Add(NewNetworkMatcher(rr.NetworkList))
 
- 	}
 
- 	if len(rr.SourceCidr) > 0 {
 
- 		ipv4Net := v2net.NewIPNet()
 
- 		ipv6Cond := NewAnyCondition()
 
- 		hasIpv6 := false
 
- 		for _, ip := range rr.SourceCidr {
 
- 			switch len(ip.Ip) {
 
- 			case net.IPv4len:
 
- 				ipv4Net.AddIP(ip.Ip, byte(ip.Prefix))
 
- 			case net.IPv6len:
 
- 				hasIpv6 = true
 
- 				matcher, err := NewCIDRMatcher(ip.Ip, ip.Prefix, true)
 
- 				if err != nil {
 
- 					return nil, err
 
- 				}
 
- 				ipv6Cond.Add(matcher)
 
- 			default:
 
- 				return nil, newError("invalid IP length").AtError()
 
- 			}
 
- 		}
 
- 		if !ipv4Net.IsEmpty() && hasIpv6 {
 
- 			cond := NewAnyCondition()
 
- 			cond.Add(NewIPv4Matcher(ipv4Net, true))
 
- 			cond.Add(ipv6Cond)
 
- 			conds.Add(cond)
 
- 		} else if !ipv4Net.IsEmpty() {
 
- 			conds.Add(NewIPv4Matcher(ipv4Net, true))
 
- 		} else if hasIpv6 {
 
- 			conds.Add(ipv6Cond)
 
- 		}
 
- 	}
 
- 	if len(rr.UserEmail) > 0 {
 
- 		conds.Add(NewUserMatcher(rr.UserEmail))
 
- 	}
 
- 	if len(rr.InboundTag) > 0 {
 
- 		conds.Add(NewInboundTagMatcher(rr.InboundTag))
 
- 	}
 
- 	if conds.Len() == 0 {
 
- 		return nil, newError("this rule has no effective fields").AtError()
 
- 	}
 
- 	return conds, nil
 
- }
 
 
  |