db31cfbd7f
# Conflicts: # .github/workflows/codeql-analysis.yml # .github/workflows/linter.yml # .github/workflows/release.yml # Makefile # README.md # adapter/outbound/vless.go # component/geodata/memconservative/cache.go # component/geodata/router/condition.go # component/geodata/router/condition_geoip.go # component/geodata/standard/standard.go # component/geodata/utils.go # config/config.go # config/initial.go # constant/metadata.go # constant/path.go # constant/rule.go # constant/rule_extra.go # dns/client.go # dns/filters.go # dns/resolver.go # go.mod # go.sum # hub/executor/executor.go # hub/route/configs.go # listener/listener.go # listener/tproxy/tproxy_linux_iptables.go # listener/tun/dev/dev.go # listener/tun/dev/dev_darwin.go # listener/tun/dev/dev_linux.go # listener/tun/dev/dev_windows.go # listener/tun/dev/wintun/config.go # listener/tun/dev/wintun/dll_windows.go # listener/tun/dev/wintun/session_windows.go # listener/tun/dev/wintun/wintun_windows.go # listener/tun/ipstack/commons/dns.go # listener/tun/ipstack/gvisor/tun.go # listener/tun/ipstack/gvisor/tundns.go # listener/tun/ipstack/gvisor/utils.go # listener/tun/ipstack/stack_adapter.go # listener/tun/ipstack/system/dns.go # listener/tun/ipstack/system/tcp.go # listener/tun/ipstack/system/tun.go # listener/tun/tun_adapter.go # main.go # rule/common/base.go # rule/common/domain.go # rule/common/domain_keyword.go # rule/common/domain_suffix.go # rule/common/final.go # rule/common/geoip.go # rule/common/geosite.go # rule/common/ipcidr.go # rule/common/port.go # rule/parser.go # rule/process.go # test/go.mod # test/go.sum # transport/vless/xtls.go # tunnel/tunnel.go
84 lines
1.3 KiB
Go
84 lines
1.3 KiB
Go
package common
|
|
|
|
import (
|
|
"errors"
|
|
"net"
|
|
"strings"
|
|
|
|
C "github.com/Dreamacro/clash/constant"
|
|
)
|
|
|
|
var (
|
|
errPayload = errors.New("payload error")
|
|
|
|
noResolve = "no-resolve"
|
|
)
|
|
|
|
type Base struct {
|
|
ruleExtra *C.RuleExtra
|
|
}
|
|
|
|
func (b *Base) RuleExtra() *C.RuleExtra {
|
|
return b.ruleExtra
|
|
}
|
|
|
|
func (b *Base) SetRuleExtra(re *C.RuleExtra) {
|
|
b.ruleExtra = re
|
|
}
|
|
|
|
func (b *Base) ShouldFindProcess() bool {
|
|
return false
|
|
}
|
|
|
|
func HasNoResolve(params []string) bool {
|
|
for _, p := range params {
|
|
if p == noResolve {
|
|
return true
|
|
}
|
|
}
|
|
return false
|
|
}
|
|
|
|
func FindNetwork(params []string) C.NetWork {
|
|
for _, p := range params {
|
|
if strings.EqualFold(p, "tcp") {
|
|
return C.TCP
|
|
} else if strings.EqualFold(p, "udp") {
|
|
return C.UDP
|
|
}
|
|
}
|
|
return C.ALLNet
|
|
}
|
|
|
|
func FindSourceIPs(params []string) []*net.IPNet {
|
|
var ips []*net.IPNet
|
|
for _, p := range params {
|
|
if p == noResolve || len(p) < 7 {
|
|
continue
|
|
}
|
|
_, ipnet, err := net.ParseCIDR(p)
|
|
if err != nil {
|
|
continue
|
|
}
|
|
ips = append(ips, ipnet)
|
|
}
|
|
|
|
if len(ips) > 0 {
|
|
return ips
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func FindProcessName(params []string) []string {
|
|
var processNames []string
|
|
for _, p := range params {
|
|
if strings.HasPrefix(p, "P:") {
|
|
processNames = append(processNames, strings.TrimPrefix(p, "P:"))
|
|
}
|
|
}
|
|
|
|
if len(processNames) > 0 {
|
|
return processNames
|
|
}
|
|
return nil
|
|
}
|