2022-04-16 00:21:08 +08:00
|
|
|
package logic
|
|
|
|
|
|
|
|
import (
|
2022-06-10 13:36:09 +08:00
|
|
|
"fmt"
|
feat: support sub-rule, eg.
rules:
- SUB-RULE,(AND,((NETWORK,TCP),(DOMAIN-KEYWORD,google))),TEST2
- SUB-RULE,(GEOIP,!CN),TEST1
- MATCH,DIRECT
sub-rules:
TEST2:
- MATCH,Proxy
TEST1:
- RULE-SET,Local,DIRECT,no-resolve
- GEOSITE,CN,Domestic
- GEOIP,CN,Domestic
- MATCH,Proxy
2022-09-06 17:30:35 +08:00
|
|
|
C "github.com/Dreamacro/clash/constant"
|
2022-06-10 13:36:09 +08:00
|
|
|
RC "github.com/Dreamacro/clash/rules/common"
|
|
|
|
RP "github.com/Dreamacro/clash/rules/provider"
|
2022-04-16 00:21:08 +08:00
|
|
|
"github.com/stretchr/testify/assert"
|
|
|
|
"testing"
|
|
|
|
)
|
|
|
|
|
2022-09-11 16:19:42 +08:00
|
|
|
func ParseRule(tp, payload, target string, params []string, subRules *map[string][]C.Rule) (parsed C.Rule, parseErr error) {
|
2022-06-10 13:36:09 +08:00
|
|
|
switch tp {
|
|
|
|
case "DOMAIN":
|
|
|
|
parsed = RC.NewDomain(payload, target)
|
|
|
|
case "DOMAIN-SUFFIX":
|
|
|
|
parsed = RC.NewDomainSuffix(payload, target)
|
|
|
|
case "DOMAIN-KEYWORD":
|
|
|
|
parsed = RC.NewDomainKeyword(payload, target)
|
|
|
|
case "GEOSITE":
|
|
|
|
parsed, parseErr = RC.NewGEOSITE(payload, target)
|
|
|
|
case "GEOIP":
|
|
|
|
noResolve := RC.HasNoResolve(params)
|
|
|
|
parsed, parseErr = RC.NewGEOIP(payload, target, noResolve)
|
|
|
|
case "IP-CIDR", "IP-CIDR6":
|
|
|
|
noResolve := RC.HasNoResolve(params)
|
|
|
|
parsed, parseErr = RC.NewIPCIDR(payload, target, RC.WithIPCIDRNoResolve(noResolve))
|
|
|
|
case "SRC-IP-CIDR":
|
|
|
|
parsed, parseErr = RC.NewIPCIDR(payload, target, RC.WithIPCIDRSourceIP(true), RC.WithIPCIDRNoResolve(true))
|
|
|
|
case "IP-SUFFIX":
|
|
|
|
noResolve := RC.HasNoResolve(params)
|
|
|
|
parsed, parseErr = RC.NewIPSuffix(payload, target, false, noResolve)
|
|
|
|
case "SRC-IP-SUFFIX":
|
|
|
|
parsed, parseErr = RC.NewIPSuffix(payload, target, true, true)
|
|
|
|
case "SRC-PORT":
|
|
|
|
parsed, parseErr = RC.NewPort(payload, target, true)
|
|
|
|
case "DST-PORT":
|
|
|
|
parsed, parseErr = RC.NewPort(payload, target, false)
|
|
|
|
case "PROCESS-NAME":
|
|
|
|
parsed, parseErr = RC.NewProcess(payload, target, true)
|
|
|
|
case "PROCESS-PATH":
|
|
|
|
parsed, parseErr = RC.NewProcess(payload, target, false)
|
|
|
|
case "NETWORK":
|
|
|
|
parsed, parseErr = RC.NewNetworkType(payload, target)
|
|
|
|
case "UID":
|
|
|
|
parsed, parseErr = RC.NewUid(payload, target)
|
|
|
|
case "IN-TYPE":
|
|
|
|
parsed, parseErr = RC.NewInType(payload, target)
|
feat: support sub-rule, eg.
rules:
- SUB-RULE,(AND,((NETWORK,TCP),(DOMAIN-KEYWORD,google))),TEST2
- SUB-RULE,(GEOIP,!CN),TEST1
- MATCH,DIRECT
sub-rules:
TEST2:
- MATCH,Proxy
TEST1:
- RULE-SET,Local,DIRECT,no-resolve
- GEOSITE,CN,Domestic
- GEOIP,CN,Domestic
- MATCH,Proxy
2022-09-06 17:30:35 +08:00
|
|
|
case "SUB-RULE":
|
2022-09-11 16:19:42 +08:00
|
|
|
parsed, parseErr = NewSubRule(payload, target, subRules, ParseRule)
|
2022-06-10 13:36:09 +08:00
|
|
|
case "AND":
|
|
|
|
parsed, parseErr = NewAND(payload, target, ParseRule)
|
|
|
|
case "OR":
|
|
|
|
parsed, parseErr = NewOR(payload, target, ParseRule)
|
|
|
|
case "NOT":
|
|
|
|
parsed, parseErr = NewNOT(payload, target, ParseRule)
|
|
|
|
case "RULE-SET":
|
|
|
|
noResolve := RC.HasNoResolve(params)
|
feat: support sub-rule, eg.
rules:
- SUB-RULE,(AND,((NETWORK,TCP),(DOMAIN-KEYWORD,google))),TEST2
- SUB-RULE,(GEOIP,!CN),TEST1
- MATCH,DIRECT
sub-rules:
TEST2:
- MATCH,Proxy
TEST1:
- RULE-SET,Local,DIRECT,no-resolve
- GEOSITE,CN,Domestic
- GEOIP,CN,Domestic
- MATCH,Proxy
2022-09-06 17:30:35 +08:00
|
|
|
parsed, parseErr = RP.NewRuleSet(payload, target, noResolve)
|
2022-06-10 13:36:09 +08:00
|
|
|
case "MATCH":
|
|
|
|
parsed = RC.NewMatch(target)
|
|
|
|
parseErr = nil
|
|
|
|
default:
|
|
|
|
parseErr = fmt.Errorf("unsupported rule type %s", tp)
|
|
|
|
}
|
|
|
|
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2022-04-16 00:21:08 +08:00
|
|
|
func TestAND(t *testing.T) {
|
2022-06-10 13:36:09 +08:00
|
|
|
and, err := NewAND("((DOMAIN,baidu.com),(NETWORK,TCP),(DST-PORT,10001-65535))", "DIRECT", ParseRule)
|
2022-04-16 00:21:08 +08:00
|
|
|
assert.Equal(t, nil, err)
|
|
|
|
assert.Equal(t, "DIRECT", and.adapter)
|
|
|
|
assert.Equal(t, false, and.ShouldResolveIP())
|
2022-09-11 16:19:42 +08:00
|
|
|
m, _ := and.Match(&C.Metadata{
|
2022-11-11 09:19:28 +08:00
|
|
|
Host: "baidu.com",
|
|
|
|
NetWork: C.TCP,
|
|
|
|
DstPort: "20000",
|
feat: support sub-rule, eg.
rules:
- SUB-RULE,(AND,((NETWORK,TCP),(DOMAIN-KEYWORD,google))),TEST2
- SUB-RULE,(GEOIP,!CN),TEST1
- MATCH,DIRECT
sub-rules:
TEST2:
- MATCH,Proxy
TEST1:
- RULE-SET,Local,DIRECT,no-resolve
- GEOSITE,CN,Domestic
- GEOIP,CN,Domestic
- MATCH,Proxy
2022-09-06 17:30:35 +08:00
|
|
|
})
|
|
|
|
assert.Equal(t, true, m)
|
2022-04-16 00:21:08 +08:00
|
|
|
|
2022-06-10 13:36:09 +08:00
|
|
|
and, err = NewAND("(DOMAIN,baidu.com),(NETWORK,TCP),(DST-PORT,10001-65535))", "DIRECT", ParseRule)
|
2022-04-16 00:21:08 +08:00
|
|
|
assert.NotEqual(t, nil, err)
|
|
|
|
|
2022-06-10 13:36:09 +08:00
|
|
|
and, err = NewAND("((AND,(DOMAIN,baidu.com),(NETWORK,TCP)),(NETWORK,TCP),(DST-PORT,10001-65535))", "DIRECT", ParseRule)
|
2022-04-16 00:21:08 +08:00
|
|
|
assert.Equal(t, nil, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestNOT(t *testing.T) {
|
2022-06-10 13:36:09 +08:00
|
|
|
not, err := NewNOT("((DST-PORT,6000-6500))", "REJECT", ParseRule)
|
2022-04-16 00:21:08 +08:00
|
|
|
assert.Equal(t, nil, err)
|
2022-09-11 16:19:42 +08:00
|
|
|
m, _ := not.Match(&C.Metadata{
|
2022-04-16 00:21:08 +08:00
|
|
|
DstPort: "6100",
|
feat: support sub-rule, eg.
rules:
- SUB-RULE,(AND,((NETWORK,TCP),(DOMAIN-KEYWORD,google))),TEST2
- SUB-RULE,(GEOIP,!CN),TEST1
- MATCH,DIRECT
sub-rules:
TEST2:
- MATCH,Proxy
TEST1:
- RULE-SET,Local,DIRECT,no-resolve
- GEOSITE,CN,Domestic
- GEOIP,CN,Domestic
- MATCH,Proxy
2022-09-06 17:30:35 +08:00
|
|
|
})
|
|
|
|
assert.Equal(t, false, m)
|
2022-04-16 00:21:08 +08:00
|
|
|
|
2022-06-10 13:36:09 +08:00
|
|
|
_, err = NewNOT("((DST-PORT,5600-6666),(DOMAIN,baidu.com))", "DIRECT", ParseRule)
|
2022-04-16 00:21:08 +08:00
|
|
|
assert.NotEqual(t, nil, err)
|
|
|
|
|
2022-06-10 13:36:09 +08:00
|
|
|
_, err = NewNOT("(())", "DIRECT", ParseRule)
|
2022-04-16 00:21:08 +08:00
|
|
|
assert.NotEqual(t, nil, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestOR(t *testing.T) {
|
2022-06-10 13:36:09 +08:00
|
|
|
or, err := NewOR("((DOMAIN,baidu.com),(NETWORK,TCP),(DST-PORT,10001-65535))", "DIRECT", ParseRule)
|
2022-04-16 00:21:08 +08:00
|
|
|
assert.Equal(t, nil, err)
|
2022-09-11 16:19:42 +08:00
|
|
|
m, _ := or.Match(&C.Metadata{
|
|
|
|
NetWork: C.TCP,
|
feat: support sub-rule, eg.
rules:
- SUB-RULE,(AND,((NETWORK,TCP),(DOMAIN-KEYWORD,google))),TEST2
- SUB-RULE,(GEOIP,!CN),TEST1
- MATCH,DIRECT
sub-rules:
TEST2:
- MATCH,Proxy
TEST1:
- RULE-SET,Local,DIRECT,no-resolve
- GEOSITE,CN,Domestic
- GEOIP,CN,Domestic
- MATCH,Proxy
2022-09-06 17:30:35 +08:00
|
|
|
})
|
|
|
|
assert.Equal(t, true, m)
|
2022-04-16 00:21:08 +08:00
|
|
|
assert.Equal(t, false, or.ShouldResolveIP())
|
|
|
|
}
|