build-domestic-direct-lan-ruleset-dns-mapping-module.ts 5.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160
  1. // @ts-check
  2. import path from 'node:path';
  3. import { DOMESTICS } from '../Source/non_ip/domestic';
  4. import { DIRECTS, LANS } from '../Source/non_ip/direct';
  5. import { readFileIntoProcessedArray } from './lib/fetch-text-by-line';
  6. import { compareAndWriteFile } from './lib/create-file';
  7. import { task } from './trace';
  8. import { SHARED_DESCRIPTION } from './lib/constants';
  9. import { createMemoizedPromise } from './lib/memo-promise';
  10. import * as yaml from 'yaml';
  11. import { appendArrayInPlace } from './lib/append-array-in-place';
  12. import { OUTPUT_INTERNAL_DIR, OUTPUT_MODULES_DIR, SOURCE_DIR } from './constants/dir';
  13. import { RulesetOutput } from './lib/create-file';
  14. function getRule(domain: string): string[] {
  15. const results: string[] = [];
  16. if (domain[0] === '$' || domain[0] === '+') {
  17. results.push(`DOMAIN-SUFFIX,${domain.slice(1)}`);
  18. } else if (domain.includes('?')) {
  19. results.push(
  20. `DOMAIN-WILDCARD,${domain}`,
  21. `DOMAIN-WILDCARD,*.${domain}`
  22. );
  23. } else {
  24. results.push(`DOMAIN-SUFFIX,${domain}`);
  25. }
  26. return results;
  27. }
  28. export const getDomesticAndDirectDomainsRulesetPromise = createMemoizedPromise(async () => {
  29. const domestics = await readFileIntoProcessedArray(path.join(SOURCE_DIR, 'non_ip/domestic.conf'));
  30. const directs = await readFileIntoProcessedArray(path.resolve(SOURCE_DIR, 'non_ip/direct.conf'));
  31. const lans: string[] = [];
  32. Object.entries(DOMESTICS).forEach(([, { domains }]) => {
  33. appendArrayInPlace(domestics, domains.flatMap(getRule));
  34. });
  35. Object.entries(DIRECTS).forEach(([, { domains }]) => {
  36. appendArrayInPlace(directs, domains.flatMap(getRule));
  37. });
  38. Object.entries(LANS).forEach(([, { domains }]) => {
  39. appendArrayInPlace(lans, domains.flatMap(getRule));
  40. });
  41. return [domestics, directs, lans] as const;
  42. });
  43. export const buildDomesticRuleset = task(require.main === module, __filename)(async (span) => {
  44. const [domestics, directs, lans] = await getDomesticAndDirectDomainsRulesetPromise();
  45. const dataset = Object.entries(DOMESTICS);
  46. appendArrayInPlace(dataset, Object.entries(DIRECTS));
  47. appendArrayInPlace(dataset, Object.entries(LANS));
  48. return Promise.all([
  49. new RulesetOutput(span, 'domestic', 'non_ip')
  50. .withTitle('Sukka\'s Ruleset - Domestic Domains')
  51. .withDescription([
  52. ...SHARED_DESCRIPTION,
  53. '',
  54. 'This file contains known addresses that are avaliable in the Mainland China.'
  55. ])
  56. .addFromRuleset(domestics)
  57. .write(),
  58. new RulesetOutput(span, 'direct', 'non_ip')
  59. .withTitle('Sukka\'s Ruleset - Direct Rules')
  60. .withDescription([
  61. ...SHARED_DESCRIPTION,
  62. '',
  63. 'This file contains domains and process that should not be proxied.'
  64. ])
  65. .addFromRuleset(directs)
  66. .write(),
  67. new RulesetOutput(span, 'lan', 'non_ip')
  68. .withTitle('Sukka\'s Ruleset - LAN')
  69. .withDescription([
  70. ...SHARED_DESCRIPTION,
  71. '',
  72. 'This file includes rules for LAN DOMAIN and reserved TLDs.'
  73. ])
  74. .addFromRuleset(lans)
  75. .write(),
  76. compareAndWriteFile(
  77. span,
  78. [
  79. '#!name=[Sukka] Local DNS Mapping',
  80. `#!desc=Last Updated: ${new Date().toISOString()}`,
  81. '',
  82. '[Host]',
  83. ...dataset.flatMap(([, { domains, dns, hosts }]) => [
  84. ...Object.entries(hosts).flatMap(([dns, ips]: [dns: string, ips: string[]]) => `${dns} = ${ips.join(', ')}`),
  85. ...domains.flatMap((domain) => {
  86. if (domain[0] === '$') {
  87. return [
  88. `${domain.slice(1)} = server:${dns}`
  89. ];
  90. }
  91. if (domain[0] === '+') {
  92. return [
  93. `*.${domain.slice(1)} = server:${dns}`
  94. ];
  95. }
  96. return [
  97. `${domain} = server:${dns}`,
  98. `*.${domain} = server:${dns}`
  99. ];
  100. })
  101. ])
  102. ],
  103. path.resolve(OUTPUT_MODULES_DIR, 'sukka_local_dns_mapping.sgmodule')
  104. ),
  105. compareAndWriteFile(
  106. span,
  107. yaml.stringify(
  108. {
  109. dns: {
  110. 'nameserver-policy': dataset.reduce<Record<string, string | string[]>>(
  111. (acc, [, { domains, dns }]) => {
  112. domains.forEach((domain) => {
  113. let domainWildcard = domain;
  114. if (domain[0] === '$') {
  115. domainWildcard = domain.slice(1);
  116. } else if (domain[0] === '+') {
  117. domainWildcard = `*.${domain.slice(1)}`;
  118. } else {
  119. domainWildcard = `+.${domain}`;
  120. }
  121. acc[domainWildcard] = dns === 'system'
  122. ? [
  123. 'system://',
  124. 'system',
  125. 'dhcp://system'
  126. ]
  127. : dns;
  128. });
  129. return acc;
  130. },
  131. {}
  132. )
  133. },
  134. hosts: dataset.reduce<Record<string, string>>(
  135. (acc, [, { domains, dns, ...rest }]) => {
  136. if ('hosts' in rest) {
  137. Object.assign(acc, rest.hosts);
  138. }
  139. return acc;
  140. },
  141. {}
  142. )
  143. },
  144. { version: '1.1' }
  145. ).split('\n'),
  146. path.join(OUTPUT_INTERNAL_DIR, 'clash_nameserver_policy.yaml')
  147. )
  148. ]);
  149. });