build-sspanel-appprofile.ts 7.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213
  1. import { getAppleCdnDomainsPromise } from './build-apple-cdn';
  2. import { getDomesticDomainsRulesetPromise } from './build-domestic-ruleset';
  3. import { surgeRulesetToClashClassicalTextRuleset } from './lib/clash';
  4. import { readFileIntoProcessedArray } from './lib/fetch-text-by-line';
  5. import { task } from './trace';
  6. import path from 'path';
  7. import { ALL as AllStreamServices } from '../Source/stream';
  8. import { getChnCidrPromise } from './build-chn-cidr';
  9. import { getTelegramCIDRPromise } from './build-telegram-cidr';
  10. import { compareAndWriteFile } from './lib/create-file';
  11. import { getMicrosoftCdnRulesetPromise } from './build-microsoft-cdn';
  12. const POLICY_GROUPS: Array<[name: string, insertProxy: boolean, insertDirect: boolean]> = [
  13. ['Default Proxy', true, false],
  14. ['Global', true, true],
  15. ['Microsoft & Apple', true, true],
  16. ['Stream', true, false],
  17. ['Domestic', false, true],
  18. ['Final Match', true, true]
  19. ];
  20. const removeNoResolved = (line: string) => line.replace(',no-resolve', '');
  21. /**
  22. * This only generates a simplified version, for under-used users only.
  23. */
  24. export const buildSSPanelUIMAppProfile = task(import.meta.path, async (span) => {
  25. const [
  26. domesticDomains,
  27. appleCdnDomains,
  28. microsoftCdnDomains,
  29. appleCnDomains,
  30. neteaseMusicDomains,
  31. microsoftDomains,
  32. appleDomains,
  33. streamDomains,
  34. globalDomains,
  35. globalPlusDomains,
  36. telegramDomains,
  37. lanDomains,
  38. domesticCidrs,
  39. streamCidrs,
  40. { results: rawTelegramCidrs },
  41. lanCidrs
  42. ] = await Promise.all([
  43. // domestic - domains
  44. getDomesticDomainsRulesetPromise().then(surgeRulesetToClashClassicalTextRuleset),
  45. getAppleCdnDomainsPromise().then(domains => domains.map(domain => `DOMAIN-SUFFIX,${domain}`)),
  46. getMicrosoftCdnRulesetPromise().then(surgeRulesetToClashClassicalTextRuleset),
  47. readFileIntoProcessedArray(path.resolve(import.meta.dir, '../Source/non_ip/apple_cn.conf')),
  48. readFileIntoProcessedArray(path.resolve(import.meta.dir, '../Source/non_ip/neteasemusic.conf')).then(surgeRulesetToClashClassicalTextRuleset),
  49. // microsoft & apple - domains
  50. readFileIntoProcessedArray(path.resolve(import.meta.dir, '../Source/non_ip/microsoft.conf')),
  51. readFileIntoProcessedArray(path.resolve(import.meta.dir, '../Source/non_ip/apple_services.conf')).then(surgeRulesetToClashClassicalTextRuleset),
  52. // stream - domains
  53. surgeRulesetToClashClassicalTextRuleset(AllStreamServices.flatMap((i) => i.rules)),
  54. // global - domains
  55. readFileIntoProcessedArray(path.resolve(import.meta.dir, '../Source/non_ip/global.conf')).then(surgeRulesetToClashClassicalTextRuleset),
  56. readFileIntoProcessedArray(path.resolve(import.meta.dir, '../Source/non_ip/global_plus.conf')).then(surgeRulesetToClashClassicalTextRuleset),
  57. readFileIntoProcessedArray(path.resolve(import.meta.dir, '../Source/non_ip/telegram.conf')).then(surgeRulesetToClashClassicalTextRuleset),
  58. // lan - domains
  59. readFileIntoProcessedArray(path.resolve(import.meta.dir, '../Source/non_ip/lan.conf')),
  60. // domestic - ip cidr
  61. getChnCidrPromise().then(cidrs => cidrs.map(cidr => `IP-CIDR,${cidr}`)),
  62. AllStreamServices.flatMap((i) => (
  63. i.ip
  64. ? [
  65. ...i.ip.v4.map((ip) => `IP-CIDR,${ip}`),
  66. ...i.ip.v6.map((ip) => `IP-CIDR6,${ip}`)
  67. ]
  68. : []
  69. )),
  70. // global - ip cidr
  71. getTelegramCIDRPromise(),
  72. // lan - ip cidr
  73. readFileIntoProcessedArray(path.resolve(import.meta.dir, '../Source/ip/lan.conf'))
  74. ] as const);
  75. const telegramCidrs = rawTelegramCidrs.map(removeNoResolved);
  76. const output = generateAppProfile(
  77. [
  78. ...domesticDomains,
  79. ...appleCdnDomains,
  80. ...microsoftCdnDomains,
  81. ...appleCnDomains,
  82. ...neteaseMusicDomains
  83. ],
  84. [
  85. ...microsoftDomains,
  86. ...appleDomains
  87. ],
  88. streamDomains,
  89. [
  90. ...globalDomains,
  91. ...globalPlusDomains,
  92. ...telegramDomains
  93. ],
  94. lanDomains,
  95. domesticCidrs,
  96. streamCidrs,
  97. [
  98. ...telegramCidrs
  99. ],
  100. lanCidrs
  101. );
  102. await compareAndWriteFile(
  103. span,
  104. output,
  105. path.resolve(import.meta.dir, '../List/internal/appprofile.php')
  106. );
  107. });
  108. if (import.meta.main) {
  109. buildSSPanelUIMAppProfile();
  110. }
  111. const isTruthy = <T>(i: T | 0 | '' | false | null | undefined): i is T => !!i;
  112. function generateAppProfile(
  113. directDomains: string[],
  114. microsoftAppleDomains: string[],
  115. streamDomains: string[],
  116. globalDomains: string[],
  117. lanDomains: string[],
  118. directCidrs: string[],
  119. streamCidrs: string[],
  120. globalCidrs: string[],
  121. lanCidrs: string[]
  122. ) {
  123. const result: string[] = [];
  124. result.push(
  125. '<?php',
  126. '',
  127. `// # Build ${new Date().toISOString()}`,
  128. '',
  129. 'declare(strict_types=1);',
  130. '',
  131. '$_ENV[\'Clash_Config\'] = [',
  132. ' \'port\' => 7890,',
  133. ' \'socks-port\' => 7891,',
  134. ' \'allow-lan\' => false,',
  135. ' \'mode\' => \'Rule\',',
  136. ' \'ipv6\' => true,',
  137. ' \'log-level\' => \'error\',',
  138. ' \'external-controller\' => \'0.0.0.0:9090\',',
  139. ' \'tun\' => [',
  140. ' \'enable\' => true,',
  141. ' \'stack\' => \'system\',',
  142. ' \'auto-route\' => true,',
  143. ' \'auto-redir\' => true,',
  144. ' \'auto-detect-interface\' => true,',
  145. ' \'dns-hijack\' => [',
  146. ' \'8.8.8.8:53\',',
  147. ' \'any:53\',',
  148. ' \'tcp://8.8.8.8:53\',',
  149. ' \'tcp://any:53\',',
  150. ' ]',
  151. ' ]',
  152. '];',
  153. '',
  154. `$_ENV['Clash_Group_Indexes'] = [${JSON.stringify(POLICY_GROUPS.reduce<number[]>((acc, [, insertProxy], index) => {
  155. if (insertProxy) {
  156. acc.push(index);
  157. }
  158. return acc;
  159. }, [])).slice(1, -1)}];`,
  160. '$_ENV[\'Clash_Group_Config\'] = [',
  161. ' \'proxy-groups\' => [',
  162. ...POLICY_GROUPS.flatMap(([name, insertProxy, insertDirect]) => {
  163. return [
  164. ' [',
  165. ` 'name' => '${name}',`,
  166. ' \'type\' => \'select\',',
  167. ' \'proxies\' => [',
  168. insertProxy && name !== 'Default Proxy' && ' \'Default Proxy\',',
  169. insertDirect && ' \'DIRECT\',',
  170. ' ],',
  171. ' ],'
  172. ].filter(isTruthy);
  173. }),
  174. ' ],',
  175. ' \'rules\' => [',
  176. // domestic - domains
  177. ...directDomains.map(line => ` '${line},Domestic',`),
  178. // microsoft & apple - domains
  179. ...microsoftAppleDomains.map(line => ` '${line},Microsoft & Apple',`),
  180. // stream - domains
  181. ...streamDomains.map(line => ` '${line},Stream',`),
  182. // global - domains
  183. ...globalDomains.map(line => ` '${line},Global',`),
  184. // microsoft & apple - ip cidr (nope)
  185. // lan - domains
  186. ...lanDomains.map(line => ` '${line},DIRECT',`),
  187. // stream - ip cidr
  188. ...streamCidrs.map(line => ` '${line},Stream',`),
  189. // global - ip cidr
  190. ...globalCidrs.map(line => ` '${line},Global',`),
  191. // domestic - ip cidr
  192. ...directCidrs.map(line => ` '${line},Domestic',`),
  193. // lan - ip cidr
  194. ...lanCidrs.map(line => ` '${line},DIRECT',`),
  195. // match
  196. ' \'MATCH,Final Match\',',
  197. ' ],',
  198. '];'
  199. );
  200. return result;
  201. }