v2ray-core/app/router/config.go

131 lines
2.7 KiB
Go
Raw Normal View History

2015-12-07 22:47:47 +01:00
package router
2015-11-14 14:24:56 +01:00
2016-10-12 16:11:13 +02:00
import (
"context"
2016-10-12 16:11:13 +02:00
"net"
v2net "v2ray.com/core/common/net"
)
type Rule struct {
Tag string
Condition Condition
}
2017-05-08 11:48:41 +02:00
func (r *Rule) Apply(ctx context.Context) bool {
return r.Condition.Apply(ctx)
2016-10-12 16:11:13 +02:00
}
2017-05-08 11:48:41 +02:00
func (rr *RoutingRule) BuildCondition() (Condition, error) {
2016-10-12 16:11:13 +02:00
conds := NewConditionChan()
2017-05-08 11:48:41 +02:00
if len(rr.Domain) > 0 {
2016-10-12 16:11:13 +02:00
anyCond := NewAnyCondition()
2017-05-08 11:48:41 +02:00
for _, domain := range rr.Domain {
2017-05-08 12:18:13 +02:00
switch domain.Type {
case Domain_Plain:
2016-10-12 16:11:13 +02:00
anyCond.Add(NewPlainDomainMatcher(domain.Value))
2017-05-08 12:18:13 +02:00
case Domain_Regex:
2016-10-12 16:11:13 +02:00
matcher, err := NewRegexpDomainMatcher(domain.Value)
if err != nil {
return nil, err
}
anyCond.Add(matcher)
2017-05-08 12:18:13 +02:00
case Domain_Domain:
anyCond.Add(NewSubDomainMatcher(domain.Value))
default:
panic("Unknown domain type.")
2016-10-12 16:11:13 +02:00
}
}
conds.Add(anyCond)
}
2017-05-08 11:48:41 +02:00
if len(rr.Cidr) > 0 {
2016-10-18 16:42:22 +02:00
ipv4Net := v2net.NewIPNet()
2016-10-12 16:11:13 +02:00
ipv6Cond := NewAnyCondition()
hasIpv6 := false
2017-05-08 11:48:41 +02:00
for _, ip := range rr.Cidr {
2016-10-12 16:11:13 +02:00
switch len(ip.Ip) {
case net.IPv4len:
2016-10-18 16:42:22 +02:00
ipv4Net.AddIP(ip.Ip, byte(ip.Prefix))
2016-10-12 16:11:13 +02:00
case net.IPv6len:
hasIpv6 = true
2016-10-18 23:01:39 +02:00
matcher, err := NewCIDRMatcher(ip.Ip, ip.Prefix, false)
2016-10-12 16:11:13 +02:00
if err != nil {
return nil, err
}
ipv6Cond.Add(matcher)
default:
2017-04-09 15:04:04 +02:00
return nil, newError("invalid IP length").AtError()
2016-10-12 16:11:13 +02:00
}
}
2016-10-18 16:42:22 +02:00
if !ipv4Net.IsEmpty() && hasIpv6 {
2016-10-12 16:11:13 +02:00
cond := NewAnyCondition()
2016-10-18 23:01:39 +02:00
cond.Add(NewIPv4Matcher(ipv4Net, false))
2016-10-12 16:11:13 +02:00
cond.Add(ipv6Cond)
conds.Add(cond)
2016-10-18 16:42:22 +02:00
} else if !ipv4Net.IsEmpty() {
2016-10-18 23:01:39 +02:00
conds.Add(NewIPv4Matcher(ipv4Net, false))
2016-10-12 16:11:13 +02:00
} else if hasIpv6 {
conds.Add(ipv6Cond)
}
}
2017-05-08 11:48:41 +02:00
if rr.PortRange != nil {
conds.Add(NewPortMatcher(*rr.PortRange))
2016-10-12 16:11:13 +02:00
}
2017-05-08 11:48:41 +02:00
if rr.NetworkList != nil {
conds.Add(NewNetworkMatcher(rr.NetworkList))
2016-10-12 16:11:13 +02:00
}
2017-05-08 11:48:41 +02:00
if len(rr.SourceCidr) > 0 {
2016-10-18 23:01:39 +02:00
ipv4Net := v2net.NewIPNet()
ipv6Cond := NewAnyCondition()
hasIpv6 := false
2017-05-08 11:48:41 +02:00
for _, ip := range rr.SourceCidr {
2016-10-18 23:01:39 +02:00
switch len(ip.Ip) {
case net.IPv4len:
ipv4Net.AddIP(ip.Ip, byte(ip.Prefix))
case net.IPv6len:
hasIpv6 = true
matcher, err := NewCIDRMatcher(ip.Ip, ip.Prefix, true)
if err != nil {
return nil, err
}
ipv6Cond.Add(matcher)
default:
2017-04-09 15:04:04 +02:00
return nil, newError("invalid IP length").AtError()
2016-10-18 23:01:39 +02:00
}
}
if !ipv4Net.IsEmpty() && hasIpv6 {
cond := NewAnyCondition()
cond.Add(NewIPv4Matcher(ipv4Net, true))
cond.Add(ipv6Cond)
conds.Add(cond)
} else if !ipv4Net.IsEmpty() {
conds.Add(NewIPv4Matcher(ipv4Net, true))
} else if hasIpv6 {
conds.Add(ipv6Cond)
}
}
2017-05-08 11:48:41 +02:00
if len(rr.UserEmail) > 0 {
conds.Add(NewUserMatcher(rr.UserEmail))
2016-10-18 23:01:39 +02:00
}
2017-05-08 11:48:41 +02:00
if len(rr.InboundTag) > 0 {
conds.Add(NewInboundTagMatcher(rr.InboundTag))
2016-11-13 21:23:34 +01:00
}
2016-10-12 16:11:13 +02:00
if conds.Len() == 0 {
2017-04-09 15:04:04 +02:00
return nil, newError("this rule has no effective fields").AtError()
2016-10-12 16:11:13 +02:00
}
return conds, nil
2015-11-14 14:24:56 +01:00
}