build-sspanel-appprofile.ts 8.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289
  1. import { getAppleCdnDomainsPromise } from './build-apple-cdn';
  2. import { getDomesticAndDirectDomainsRulesetPromise } from './build-domestic-direct-lan-ruleset-dns-mapping-module';
  3. import { readFileIntoProcessedArray } from './lib/fetch-text-by-line';
  4. import { task } from './trace';
  5. import path from 'node:path';
  6. import { ALL as AllStreamServices } from '../Source/stream';
  7. import { getChnCidrPromise } from './build-chn-cidr';
  8. import { getTelegramCIDRPromise } from './build-telegram-cidr';
  9. import { compareAndWriteFile } from './lib/create-file';
  10. import { getMicrosoftCdnRulesetPromise } from './build-microsoft-cdn';
  11. import { isTruthy, nullthrow } from 'foxts/guard';
  12. import { appendArrayInPlace } from './lib/append-array-in-place';
  13. import { OUTPUT_INTERNAL_DIR, OUTPUT_SURGE_DIR, SOURCE_DIR } from './constants/dir';
  14. import { ClashOnlyRulesetOutput } from './lib/rules/ruleset';
  15. const POLICY_GROUPS: Array<[name: string, insertProxy: boolean, insertDirect: boolean]> = [
  16. ['Default Proxy', true, false],
  17. ['Global', true, true],
  18. ['Microsoft & Apple', true, true],
  19. ['Stream', true, false],
  20. ['Steam Download', true, true],
  21. ['Domestic', false, true],
  22. ['Final Match', true, true]
  23. ];
  24. const steamDomainsPromise = readFileIntoProcessedArray(path.join(SOURCE_DIR, 'domainset/game-download.conf'));
  25. /**
  26. * This only generates a simplified version, for under-used users only.
  27. */
  28. export const buildSSPanelUIMAppProfile = task(require.main === module, __filename)(async (span) => {
  29. const [
  30. [domesticRules, directRules, lanRules],
  31. appleCdnDomains,
  32. [microsoftCdnDomains, microsoftCdnDomainSuffixes],
  33. appleCnRules,
  34. neteaseMusicRules,
  35. microsoftRules,
  36. appleRules,
  37. streamRules,
  38. steamDomainset,
  39. globalRules,
  40. telegramRules,
  41. [domesticCidrs4, domesticCidrs6],
  42. [streamCidrs4, streamCidrs6],
  43. { ipcidr: telegramCidrs4, ipcidr6: telegramCidrs6 },
  44. rawLanCidrs
  45. ] = await Promise.all([
  46. // domestic - domains
  47. getDomesticAndDirectDomainsRulesetPromise(),
  48. getAppleCdnDomainsPromise(),
  49. getMicrosoftCdnRulesetPromise(),
  50. readFileIntoProcessedArray(path.join(OUTPUT_SURGE_DIR, 'non_ip/apple_cn.conf')),
  51. readFileIntoProcessedArray(path.join(OUTPUT_SURGE_DIR, 'non_ip/neteasemusic.conf')),
  52. // microsoft & apple - domains
  53. readFileIntoProcessedArray(path.join(OUTPUT_SURGE_DIR, 'non_ip/microsoft.conf')),
  54. readFileIntoProcessedArray(path.join(OUTPUT_SURGE_DIR, 'non_ip/apple_services.conf')),
  55. // stream - domains
  56. AllStreamServices.flatMap((i) => i.rules),
  57. // steam - domains
  58. steamDomainsPromise,
  59. // global - domains
  60. readFileIntoProcessedArray(path.join(OUTPUT_SURGE_DIR, 'non_ip/global.conf')),
  61. readFileIntoProcessedArray(path.join(OUTPUT_SURGE_DIR, 'non_ip/telegram.conf')),
  62. // domestic - ip cidr
  63. getChnCidrPromise(),
  64. AllStreamServices.reduce<[cidr4: string[], cidr6: string[]]>((acc, i) => {
  65. if (i.ip) {
  66. appendArrayInPlace(acc[0], i.ip.v4);
  67. appendArrayInPlace(acc[1], i.ip.v6);
  68. }
  69. return acc;
  70. }, [[], []]),
  71. // global - ip cidr
  72. getTelegramCIDRPromise(),
  73. // lan - ip cidr
  74. readFileIntoProcessedArray(path.join(OUTPUT_SURGE_DIR, 'ip/lan.conf'))
  75. ] as const);
  76. const domestic = new ClashOnlyRulesetOutput(span, '_', 'non_ip')
  77. .addFromRuleset(domesticRules)
  78. .bulkAddDomainSuffix(appleCdnDomains)
  79. .bulkAddDomain(microsoftCdnDomains)
  80. .bulkAddDomainSuffix(microsoftCdnDomainSuffixes)
  81. .addFromRuleset(appleCnRules)
  82. .addFromRuleset(neteaseMusicRules);
  83. const microsoftApple = new ClashOnlyRulesetOutput(span, '_', 'non_ip')
  84. .addFromRuleset(microsoftRules)
  85. .addFromRuleset(appleRules);
  86. const stream = new ClashOnlyRulesetOutput(span, '_', 'non_ip')
  87. .addFromRuleset(streamRules);
  88. const steam = new ClashOnlyRulesetOutput(span, '_', 'non_ip')
  89. .addFromDomainset(steamDomainset);
  90. const global = new ClashOnlyRulesetOutput(span, '_', 'non_ip')
  91. .addFromRuleset(globalRules)
  92. .addFromRuleset(telegramRules);
  93. const direct = new ClashOnlyRulesetOutput(span, '_', 'non_ip')
  94. .addFromRuleset(directRules)
  95. .addFromRuleset(lanRules);
  96. const domesticCidr = new ClashOnlyRulesetOutput(span, '_', 'ip')
  97. .bulkAddCIDR4(domesticCidrs4)
  98. .bulkAddCIDR6(domesticCidrs6);
  99. const streamCidr = new ClashOnlyRulesetOutput(span, '_', 'ip')
  100. .bulkAddCIDR4(streamCidrs4)
  101. .bulkAddCIDR6(streamCidrs6);
  102. const telegramCidr = new ClashOnlyRulesetOutput(span, '_', 'ip')
  103. .bulkAddCIDR4(telegramCidrs4)
  104. .bulkAddCIDR6(telegramCidrs6);
  105. const lanCidrs = new ClashOnlyRulesetOutput(span, '_', 'ip')
  106. .addFromRuleset(rawLanCidrs);
  107. const output = generateAppProfile(
  108. ...(
  109. (await Promise.all([
  110. domestic.compile(),
  111. microsoftApple.compile(),
  112. stream.compile(),
  113. steam.compile(),
  114. global.compile(),
  115. direct.compile(),
  116. domesticCidr.compile(),
  117. streamCidr.compile(),
  118. telegramCidr.compile(),
  119. lanCidrs.compile()
  120. ])).map(output => nullthrow(output[0]))
  121. ) as [
  122. string[], string[], string[], string[], string[],
  123. string[], string[], string[], string[], string[]
  124. ]
  125. );
  126. await compareAndWriteFile(
  127. span,
  128. output,
  129. path.resolve(OUTPUT_INTERNAL_DIR, 'appprofile.php')
  130. );
  131. });
  132. function generateAppProfile(
  133. directDomains: string[],
  134. microsoftAppleDomains: string[],
  135. streamDomains: string[],
  136. steamDomains: string[],
  137. globalDomains: string[],
  138. lanDomains: string[],
  139. directCidrs: string[],
  140. streamCidrs: string[],
  141. globalCidrs: string[],
  142. lanCidrs: string[]
  143. ) {
  144. const redults = [
  145. '<?php',
  146. '',
  147. `// # Build ${new Date().toISOString()}`,
  148. '',
  149. 'declare(strict_types=1);',
  150. '',
  151. '$_ENV[\'Clash_Config\'] = [',
  152. ' \'port\' => 7890,',
  153. ' \'socks-port\' => 7891,',
  154. ' \'allow-lan\' => false,',
  155. ' \'mode\' => \'Rule\',',
  156. ' \'ipv6\' => true,',
  157. ' \'log-level\' => \'error\',',
  158. ' \'external-controller\' => \'0.0.0.0:9090\',',
  159. ' \'tun\' => [',
  160. ' \'enable\' => true,',
  161. ' \'stack\' => \'system\',',
  162. ' \'auto-route\' => true,',
  163. ' \'auto-redir\' => true,',
  164. ' \'auto-detect-interface\' => true,',
  165. ' \'dns-hijack\' => [',
  166. ' \'8.8.8.8:53\',',
  167. ' \'any:53\',',
  168. ' \'tcp://8.8.8.8:53\',',
  169. ' \'tcp://any:53\',',
  170. ' ]',
  171. ' ]',
  172. '];',
  173. '',
  174. `$_ENV['Clash_Group_Indexes'] = [${JSON.stringify(POLICY_GROUPS.reduce<number[]>((acc, [, insertProxy], index) => {
  175. if (insertProxy) {
  176. acc.push(index);
  177. }
  178. return acc;
  179. }, [])).slice(1, -1)}];`,
  180. '$_ENV[\'Clash_Group_Config\'] = [',
  181. ' \'proxy-groups\' => ['
  182. ];
  183. appendArrayInPlace(
  184. redults,
  185. POLICY_GROUPS.flatMap(([name, insertProxy, insertDirect]) => [
  186. ' [',
  187. ` 'name' => '${name}',`,
  188. ' \'type\' => \'select\',',
  189. ' \'proxies\' => [',
  190. insertProxy && name !== 'Default Proxy' && ' \'Default Proxy\',',
  191. insertDirect && ' \'DIRECT\',',
  192. ' ],',
  193. ' ],'
  194. ].filter(isTruthy))
  195. );
  196. appendArrayInPlace(
  197. redults,
  198. [
  199. ' ],',
  200. ' \'rules\' => ['
  201. ]
  202. );
  203. // domestic - domains
  204. appendArrayInPlace(
  205. redults,
  206. directDomains.map(line => ` '${line},Domestic',`)
  207. );
  208. // microsoft & apple - domains
  209. appendArrayInPlace(
  210. redults,
  211. microsoftAppleDomains.map(line => ` '${line},Microsoft & Apple',`)
  212. );
  213. // stream - domains
  214. appendArrayInPlace(
  215. redults,
  216. streamDomains.map(line => ` '${line},Stream',`)
  217. );
  218. // steam download - domains
  219. appendArrayInPlace(
  220. redults,
  221. steamDomains.map(line => ` '${line},Steam Download',`)
  222. );
  223. // global - domains
  224. appendArrayInPlace(
  225. redults,
  226. globalDomains.map(line => ` '${line},Global',`)
  227. );
  228. // microsoft & apple - ip cidr (nope)
  229. // lan - domains
  230. appendArrayInPlace(
  231. redults,
  232. lanDomains.map(line => ` '${line},DIRECT',`)
  233. );
  234. // stream - ip cidr
  235. appendArrayInPlace(
  236. redults,
  237. streamCidrs.map(line => ` '${line},Stream',`)
  238. );
  239. // global - ip cidr
  240. appendArrayInPlace(
  241. redults,
  242. globalCidrs.map(line => ` '${line},Global',`)
  243. );
  244. // domestic - ip cidr
  245. appendArrayInPlace(
  246. redults,
  247. directCidrs.map(line => ` '${line},Domestic',`)
  248. );
  249. // lan - ip cidr
  250. appendArrayInPlace(
  251. redults,
  252. lanCidrs.map(line => ` '${line},DIRECT',`)
  253. );
  254. // match
  255. appendArrayInPlace(
  256. redults,
  257. [
  258. ' \'MATCH,Final Match\',',
  259. ' ],',
  260. '];'
  261. ]
  262. );
  263. return redults;
  264. }