Hunter0x7c7
2022-08-11 a82f9cb69f63aaeba40c024960deda7d75b9fece
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
package sniffer
 
import (
    "strings"
 
    "github.com/v2fly/v2ray-core/v5/app/proxyman"
    "github.com/v2fly/v2ray-core/v5/infra/conf/cfgcommon"
)
 
//go:generate go run github.com/v2fly/v2ray-core/v5/common/errors/errorgen
 
type SniffingConfig struct {
    Enabled      bool                  `json:"enabled"`
    DestOverride *cfgcommon.StringList `json:"destOverride"`
    MetadataOnly bool                  `json:"metadataOnly"`
}
 
// Build implements Buildable.
func (c *SniffingConfig) Build() (*proxyman.SniffingConfig, error) {
    var p []string
    if c.DestOverride != nil {
        for _, domainOverride := range *c.DestOverride {
            switch strings.ToLower(domainOverride) {
            case "http":
                p = append(p, "http")
            case "tls", "https", "ssl":
                p = append(p, "tls")
            case "quic":
                p = append(p, "quic")
            case "fakedns":
                p = append(p, "fakedns")
            case "fakedns+others":
                p = append(p, "fakedns+others")
            default:
                return nil, newError("unknown protocol: ", domainOverride)
            }
        }
    }
 
    return &proxyman.SniffingConfig{
        Enabled:             c.Enabled,
        DestinationOverride: p,
        MetadataOnly:        c.MetadataOnly,
    }, nil
}