build-sspanel-appprofile.ts 8.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290
  1. import { getAppleCdnDomainsPromise } from './build-apple-cdn';
  2. import { getDomesticAndDirectDomainsRulesetPromise } from './build-domestic-direct-lan-ruleset-dns-mapping-module';
  3. import { readFileIntoProcessedArray } from './lib/fetch-text-by-line';
  4. import { task } from './trace';
  5. import path from 'node:path';
  6. import { ALL as AllStreamServices } from '../Source/stream';
  7. import { getChnCidrPromise } from './build-chn-cidr';
  8. import { getTelegramCIDRPromise } from './build-telegram-cidr';
  9. import { compareAndWriteFile } from './lib/create-file';
  10. import { getMicrosoftCdnRulesetPromise } from './build-microsoft-cdn';
  11. import { isTruthy, nullthrow } from 'foxts/guard';
  12. import { appendArrayInPlace } from 'foxts/append-array-in-place';
  13. import { OUTPUT_INTERNAL_DIR, OUTPUT_SURGE_DIR, SOURCE_DIR } from './constants/dir';
  14. import { ClashOnlyRulesetOutput } from './lib/rules/ruleset';
  15. import { getGlobalRulesetPromise } from './build-global-server-dns-mapping';
  16. const POLICY_GROUPS: Array<[name: string, insertProxy: boolean, insertDirect: boolean]> = [
  17. ['Default Proxy', true, false],
  18. ['Global', true, true],
  19. ['Microsoft & Apple', true, true],
  20. ['Stream', true, false],
  21. ['Steam Download', true, true],
  22. ['Domestic', false, true],
  23. ['Final Match', true, true]
  24. ];
  25. const steamDomainsPromise = readFileIntoProcessedArray(path.join(SOURCE_DIR, 'domainset/game-download.conf'));
  26. /**
  27. * This only generates a simplified version, for under-used users only.
  28. */
  29. export const buildSSPanelUIMAppProfile = task(require.main === module, __filename)(async (span) => {
  30. const streamRules = AllStreamServices.flatMap((i) => i.rules);
  31. const [streamCidrs4, streamCidrs6] = AllStreamServices.reduce<[cidr4: string[], cidr6: string[]]>((acc, i) => {
  32. if (i.ip) {
  33. appendArrayInPlace(acc[0], i.ip.v4);
  34. appendArrayInPlace(acc[1], i.ip.v6);
  35. }
  36. return acc;
  37. }, [[], []]);
  38. const [
  39. [domesticRules, directRules, lanRules],
  40. appleCdnDomains,
  41. [microsoftCdnDomains, microsoftCdnDomainSuffixes],
  42. appleCnRules,
  43. neteaseMusicRules,
  44. microsoftRules,
  45. appleRules,
  46. // streamRules,
  47. steamDomainset,
  48. [globalRules],
  49. telegramRules,
  50. [domesticCidrs4, domesticCidrs6],
  51. // [streamCidrs4, streamCidrs6],
  52. { ipcidr: telegramCidrs4, ipcidr6: telegramCidrs6 },
  53. rawLanCidrs
  54. ] = await Promise.all([
  55. // domestic - domains
  56. getDomesticAndDirectDomainsRulesetPromise(),
  57. getAppleCdnDomainsPromise(),
  58. getMicrosoftCdnRulesetPromise,
  59. readFileIntoProcessedArray(path.join(OUTPUT_SURGE_DIR, 'non_ip/apple_cn.conf')),
  60. readFileIntoProcessedArray(path.join(OUTPUT_SURGE_DIR, 'non_ip/neteasemusic.conf')),
  61. // microsoft & apple - domains
  62. readFileIntoProcessedArray(path.join(OUTPUT_SURGE_DIR, 'non_ip/microsoft.conf')),
  63. readFileIntoProcessedArray(path.join(OUTPUT_SURGE_DIR, 'non_ip/apple_services.conf')),
  64. // steam - domains
  65. steamDomainsPromise,
  66. // global - domains
  67. getGlobalRulesetPromise(),
  68. readFileIntoProcessedArray(path.join(OUTPUT_SURGE_DIR, 'non_ip/telegram.conf')),
  69. // domestic - ip cidr
  70. getChnCidrPromise(),
  71. // global - ip cidr
  72. getTelegramCIDRPromise(),
  73. // lan - ip cidr
  74. readFileIntoProcessedArray(path.join(OUTPUT_SURGE_DIR, 'ip/lan.conf'))
  75. ] as const);
  76. const domestic = new ClashOnlyRulesetOutput(span, '_', 'non_ip')
  77. .addFromRuleset(domesticRules)
  78. .bulkAddDomainSuffix(appleCdnDomains)
  79. .bulkAddDomain(microsoftCdnDomains)
  80. .bulkAddDomainSuffix(microsoftCdnDomainSuffixes)
  81. .addFromRuleset(appleCnRules)
  82. .addFromRuleset(neteaseMusicRules);
  83. const microsoftApple = new ClashOnlyRulesetOutput(span, '_', 'non_ip')
  84. .addFromRuleset(microsoftRules)
  85. .addFromRuleset(appleRules);
  86. const stream = new ClashOnlyRulesetOutput(span, '_', 'non_ip')
  87. .addFromRuleset(streamRules);
  88. const steam = new ClashOnlyRulesetOutput(span, '_', 'non_ip')
  89. .addFromDomainset(steamDomainset);
  90. const global = new ClashOnlyRulesetOutput(span, '_', 'non_ip')
  91. .addFromRuleset(globalRules)
  92. .addFromRuleset(telegramRules);
  93. const direct = new ClashOnlyRulesetOutput(span, '_', 'non_ip')
  94. .addFromRuleset(directRules)
  95. .addFromRuleset(lanRules);
  96. const domesticCidr = new ClashOnlyRulesetOutput(span, '_', 'ip')
  97. .bulkAddCIDR4(domesticCidrs4)
  98. .bulkAddCIDR6(domesticCidrs6);
  99. const streamCidr = new ClashOnlyRulesetOutput(span, '_', 'ip')
  100. .bulkAddCIDR4(streamCidrs4)
  101. .bulkAddCIDR6(streamCidrs6);
  102. const telegramCidr = new ClashOnlyRulesetOutput(span, '_', 'ip')
  103. .bulkAddCIDR4(telegramCidrs4)
  104. .bulkAddCIDR6(telegramCidrs6);
  105. const lanCidrs = new ClashOnlyRulesetOutput(span, '_', 'ip')
  106. .addFromRuleset(rawLanCidrs);
  107. const output = generateAppProfile(
  108. ...(
  109. (await Promise.all([
  110. domestic.compile(),
  111. microsoftApple.compile(),
  112. stream.compile(),
  113. steam.compile(),
  114. global.compile(),
  115. direct.compile(),
  116. domesticCidr.compile(),
  117. streamCidr.compile(),
  118. telegramCidr.compile(),
  119. lanCidrs.compile()
  120. ])).map(output => nullthrow(output[0]))
  121. ) as [
  122. string[], string[], string[], string[], string[],
  123. string[], string[], string[], string[], string[]
  124. ]
  125. );
  126. await compareAndWriteFile(
  127. span,
  128. output,
  129. path.resolve(OUTPUT_INTERNAL_DIR, 'appprofile.php')
  130. );
  131. });
  132. function generateAppProfile(
  133. directDomains: string[],
  134. microsoftAppleDomains: string[],
  135. streamDomains: string[],
  136. steamDomains: string[],
  137. globalDomains: string[],
  138. lanDomains: string[],
  139. directCidrs: string[],
  140. streamCidrs: string[],
  141. globalCidrs: string[],
  142. lanCidrs: string[]
  143. ) {
  144. const redults = [
  145. '<?php',
  146. '',
  147. `// # Build ${new Date().toISOString()}`,
  148. '',
  149. 'declare(strict_types=1);',
  150. '',
  151. '$_ENV[\'Clash_Config\'] = [',
  152. ' \'port\' => 7890,',
  153. ' \'socks-port\' => 7891,',
  154. ' \'allow-lan\' => false,',
  155. ' \'mode\' => \'Rule\',',
  156. ' \'ipv6\' => true,',
  157. ' \'log-level\' => \'error\',',
  158. ' \'external-controller\' => \'0.0.0.0:9090\',',
  159. ' \'tun\' => [',
  160. ' \'enable\' => true,',
  161. ' \'stack\' => \'system\',',
  162. ' \'auto-route\' => true,',
  163. ' \'auto-redir\' => true,',
  164. ' \'auto-detect-interface\' => true,',
  165. ' \'dns-hijack\' => [',
  166. ' \'8.8.8.8:53\',',
  167. ' \'any:53\',',
  168. ' \'tcp://8.8.8.8:53\',',
  169. ' \'tcp://any:53\',',
  170. ' ]',
  171. ' ]',
  172. '];',
  173. '',
  174. `$_ENV['Clash_Group_Indexes'] = [${JSON.stringify(POLICY_GROUPS.reduce<number[]>((acc, [, insertProxy], index) => {
  175. if (insertProxy) {
  176. acc.push(index);
  177. }
  178. return acc;
  179. }, [])).slice(1, -1)}];`,
  180. '$_ENV[\'Clash_Group_Config\'] = [',
  181. ' \'proxy-groups\' => ['
  182. ];
  183. appendArrayInPlace(
  184. redults,
  185. POLICY_GROUPS.flatMap(([name, insertProxy, insertDirect]) => [
  186. ' [',
  187. ` 'name' => '${name}',`,
  188. ' \'type\' => \'select\',',
  189. ' \'proxies\' => [',
  190. insertProxy && name !== 'Default Proxy' && ' \'Default Proxy\',',
  191. insertDirect && ' \'DIRECT\',',
  192. ' ],',
  193. ' ],'
  194. ].filter(isTruthy))
  195. );
  196. appendArrayInPlace(
  197. redults,
  198. [
  199. ' ],',
  200. ' \'rules\' => ['
  201. ]
  202. );
  203. // domestic - domains
  204. appendArrayInPlace(
  205. redults,
  206. directDomains.map(line => ` '${line},Domestic',`)
  207. );
  208. // microsoft & apple - domains
  209. appendArrayInPlace(
  210. redults,
  211. microsoftAppleDomains.map(line => ` '${line},Microsoft & Apple',`)
  212. );
  213. // stream - domains
  214. appendArrayInPlace(
  215. redults,
  216. streamDomains.map(line => ` '${line},Stream',`)
  217. );
  218. // steam download - domains
  219. appendArrayInPlace(
  220. redults,
  221. steamDomains.map(line => ` '${line},Steam Download',`)
  222. );
  223. // global - domains
  224. appendArrayInPlace(
  225. redults,
  226. globalDomains.map(line => ` '${line},Global',`)
  227. );
  228. // microsoft & apple - ip cidr (nope)
  229. // lan - domains
  230. appendArrayInPlace(
  231. redults,
  232. lanDomains.map(line => ` '${line},DIRECT',`)
  233. );
  234. // stream - ip cidr
  235. appendArrayInPlace(
  236. redults,
  237. streamCidrs.map(line => ` '${line},Stream',`)
  238. );
  239. // global - ip cidr
  240. appendArrayInPlace(
  241. redults,
  242. globalCidrs.map(line => ` '${line},Global',`)
  243. );
  244. // domestic - ip cidr
  245. appendArrayInPlace(
  246. redults,
  247. directCidrs.map(line => ` '${line},Domestic',`)
  248. );
  249. // lan - ip cidr
  250. appendArrayInPlace(
  251. redults,
  252. lanCidrs.map(line => ` '${line},DIRECT',`)
  253. );
  254. // match
  255. appendArrayInPlace(
  256. redults,
  257. [
  258. ' \'MATCH,Final Match\',',
  259. ' ],',
  260. '];'
  261. ]
  262. );
  263. return redults;
  264. }