build-sgmodule-always-realip.ts 3.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899
  1. import path from 'node:path';
  2. import { task } from './trace';
  3. import { compareAndWriteFile, DomainsetOutput } from './lib/create-file';
  4. import { DIRECTS, LAN } from '../Source/non_ip/direct';
  5. import type { DNSMapping } from '../Source/non_ip/direct';
  6. import { DOMESTICS, DOH_BOOTSTRAP } from '../Source/non_ip/domestic';
  7. import * as yaml from 'yaml';
  8. import { OUTPUT_INTERNAL_DIR, OUTPUT_MODULES_DIR } from './constants/dir';
  9. import { appendArrayInPlace } from './lib/append-array-in-place';
  10. import { SHARED_DESCRIPTION } from './constants/description';
  11. import { createGetDnsMappingRule } from './build-domestic-direct-lan-ruleset-dns-mapping-module';
  12. import { ClashDomainSet } from './lib/writing-strategy/clash';
  13. const HOSTNAMES = [
  14. // Network Detection, Captive Portal
  15. 'dns.msftncsi.com',
  16. // '*.msftconnecttest.com',
  17. // 'network-test.debian.org',
  18. // 'detectportal.firefox.com',
  19. // Handle SNAT conversation properly
  20. '*.srv.nintendo.net',
  21. '*.stun.playstation.net',
  22. 'xbox.*.microsoft.com',
  23. '*.xboxlive.com',
  24. '*.turn.twilio.com',
  25. '*.stun.twilio.com',
  26. 'stun.syncthing.net',
  27. 'stun.*'
  28. // 'controlplane.tailscale.com',
  29. // NTP
  30. // 'time.*.com', 'time.*.gov', 'time.*.edu.cn', 'time.*.apple.com', 'time?.*.com', 'ntp.*.com', 'ntp?.*.com', '*.time.edu.cn', '*.ntp.org.cn', '*.pool.ntp.org'
  31. // 'time*.cloud.tencent.com', 'ntp?.aliyun.com',
  32. // QQ Login
  33. // 'localhost.*.qq.com'
  34. // 'localhost.ptlogin2.qq.com
  35. // 'localhost.sec.qq.com',
  36. // 'localhost.work.weixin.qq.com',
  37. ];
  38. export const buildAlwaysRealIPModule = task(require.main === module, __filename)(async (span) => {
  39. const surge: string[] = [];
  40. const clashFakeIpFilter = new DomainsetOutput(span, 'clash_fake_ip_filter')
  41. .withTitle('Sukka\'s Ruleset - Always Real IP Plus')
  42. .withDescription([
  43. ...SHARED_DESCRIPTION,
  44. '',
  45. 'Clash.Meta fake-ip-filter as ruleset'
  46. ])
  47. .replaceStrategies([
  48. new ClashDomainSet('domainset')
  49. ]);
  50. // Intranet, Router Setup, and mant more
  51. const dataset = [DIRECTS, LAN, DOMESTICS, DOH_BOOTSTRAP].reduce<DNSMapping[]>((acc, item) => {
  52. Object.values(item).forEach((i: DNSMapping) => {
  53. if (i.realip) {
  54. acc.push(i);
  55. }
  56. });
  57. return acc;
  58. }, []);
  59. const getDnsMappingRuleWithoutWildcard = createGetDnsMappingRule(false);
  60. for (const { domains } of dataset) {
  61. clashFakeIpFilter.addFromRuleset(domains.flatMap(getDnsMappingRuleWithoutWildcard));
  62. }
  63. return Promise.all([
  64. compareAndWriteFile(
  65. span,
  66. [
  67. '#!name=[Sukka] Always Real IP Plus',
  68. `#!desc=Last Updated: ${new Date().toISOString()}`,
  69. '',
  70. '[General]',
  71. `always-real-ip = %APPEND% ${HOSTNAMES.concat(surge).join(', ')}`
  72. ],
  73. path.resolve(OUTPUT_MODULES_DIR, 'sukka_common_always_realip.sgmodule')
  74. ),
  75. compareAndWriteFile(
  76. span,
  77. yaml.stringify(
  78. {
  79. dns: {
  80. 'fake-ip-filter': appendArrayInPlace(
  81. /** clash */
  82. dataset.flatMap(({ domains }) => domains.map((domain) => `+.${domain}`)),
  83. HOSTNAMES
  84. )
  85. }
  86. },
  87. { version: '1.1' }
  88. ).split('\n'),
  89. path.join(OUTPUT_INTERNAL_DIR, 'clash_fake_ip_filter.yaml')
  90. )
  91. ]);
  92. });