mirror of
https://gitclone.com/github.com/MetaCubeX/Clash.Meta
synced 2024-11-15 13:41:23 +08:00
176eb3926b
# Conflicts: # .github/workflows/Alpha.yml # .github/workflows/codeql-analysis.yml # .github/workflows/docker.yml # .github/workflows/linter.yml # .github/workflows/stale.yml # Makefile # README.md # adapter/outbound/vless.go # component/dialer/dialer.go # component/geodata/geodata.go # component/geodata/router/condition.go # config/config.go # config/initial.go # constant/metadata.go # constant/path.go # constant/rule.go # constant/rule_extra.go # dns/filters.go # go.mod # go.sum # hub/executor/executor.go # hub/route/configs.go # listener/listener.go # listener/tun/dev/dev.go # listener/tun/dev/dev_darwin.go # listener/tun/dev/dev_linux.go # listener/tun/dev/dev_windows.go # listener/tun/dev/dev_windows_extra.go # listener/tun/dev/wintun/dll_windows.go # listener/tun/dev/wintun/session_windows.go # listener/tun/ipstack/gvisor/tun.go # listener/tun/ipstack/gvisor/tundns.go # listener/tun/ipstack/stack_adapter.go # listener/tun/ipstack/system/tun.go # listener/tun/tun_adapter.go # main.go # rule/base.go # rule/common/process.go # rule/geoip.go # rule/parser.go # rule/port.go # test/go.mod # test/go.sum # test/vless_test.go # transport/vless/xtls.go # tunnel/tunnel.go
84 lines
1.8 KiB
Go
84 lines
1.8 KiB
Go
package common
|
|
|
|
import (
|
|
"fmt"
|
|
"strconv"
|
|
"strings"
|
|
|
|
"github.com/Dreamacro/clash/common/cache"
|
|
"github.com/Dreamacro/clash/component/process"
|
|
C "github.com/Dreamacro/clash/constant"
|
|
"github.com/Dreamacro/clash/log"
|
|
)
|
|
|
|
var processCache = cache.NewLRUCache(cache.WithAge(2), cache.WithSize(64))
|
|
|
|
type Process struct {
|
|
adapter string
|
|
process string
|
|
ruleExtra *C.RuleExtra
|
|
}
|
|
|
|
func (ps *Process) RuleType() C.RuleType {
|
|
return C.Process
|
|
}
|
|
|
|
func (ps *Process) Match(metadata *C.Metadata) bool {
|
|
if metadata.Process != "" {
|
|
return strings.EqualFold(metadata.Process, ps.process)
|
|
}
|
|
// ignore match in proxy type "tproxy"
|
|
//if metadata.Type == C.TPROXY || !C.AutoIptables {
|
|
|
|
if metadata.Type == C.TPROXY || C.AutoIptables == "Enable" {
|
|
return false
|
|
}
|
|
|
|
key := fmt.Sprintf("%s:%s:%s", metadata.NetWork.String(), metadata.SrcIP.String(), metadata.SrcPort)
|
|
cached, hit := processCache.Get(key)
|
|
if !hit {
|
|
srcPort, err := strconv.Atoi(metadata.SrcPort)
|
|
if err != nil {
|
|
processCache.Set(key, "")
|
|
return false
|
|
}
|
|
|
|
name, err := process.FindProcessName(metadata.NetWork.String(), metadata.SrcIP, srcPort)
|
|
if err != nil {
|
|
log.Debugln("[Rule] find process name %s error: %s", C.Process.String(), err.Error())
|
|
}
|
|
|
|
processCache.Set(key, name)
|
|
|
|
cached = name
|
|
}
|
|
|
|
metadata.Process = cached.(string)
|
|
|
|
return strings.EqualFold(metadata.Process, ps.process)
|
|
}
|
|
|
|
func (ps *Process) Adapter() string {
|
|
return ps.adapter
|
|
}
|
|
|
|
func (ps *Process) Payload() string {
|
|
return ps.process
|
|
}
|
|
|
|
func (ps *Process) ShouldResolveIP() bool {
|
|
return false
|
|
}
|
|
|
|
func (ps *Process) RuleExtra() *C.RuleExtra {
|
|
return ps.ruleExtra
|
|
}
|
|
|
|
func NewProcess(process string, adapter string, ruleExtra *C.RuleExtra) (*Process, error) {
|
|
return &Process{
|
|
adapter: adapter,
|
|
process: process,
|
|
ruleExtra: ruleExtra,
|
|
}, nil
|
|
}
|