build-sgmodule-always-realip.ts 3.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102
  1. import path from 'node:path';
  2. import { task } from './trace';
  3. import { compareAndWriteFile } from './lib/create-file';
  4. import { DIRECTS, LAN } from '../Source/non_ip/direct';
  5. import type { DNSMapping } from '../Source/non_ip/direct';
  6. import { DOMESTICS, DOH_BOOTSTRAP } from '../Source/non_ip/domestic';
  7. import * as yaml from 'yaml';
  8. import { OUTPUT_INTERNAL_DIR, OUTPUT_MODULES_DIR } from './constants/dir';
  9. import { appendArrayInPlace } from 'foxts/append-array-in-place';
  10. import { SHARED_DESCRIPTION } from './constants/description';
  11. import { createGetDnsMappingRule } from './build-domestic-direct-lan-ruleset-dns-mapping-module';
  12. import { ClashDomainSet } from './lib/writing-strategy/clash';
  13. import { FileOutput } from './lib/rules/base';
  14. const HOSTNAMES = [
  15. // Network Detection, Captive Portal
  16. 'dns.msftncsi.com',
  17. // '*.msftconnecttest.com',
  18. // 'network-test.debian.org',
  19. // 'detectportal.firefox.com',
  20. // Handle SNAT conversation properly
  21. '*.srv.nintendo.net',
  22. '*.stun.playstation.net',
  23. 'xbox.*.microsoft.com',
  24. '*.xboxlive.com',
  25. '*.turn.twilio.com',
  26. '*.stun.twilio.com',
  27. 'stun.syncthing.net',
  28. 'stun.*',
  29. // 'controlplane.tailscale.com',
  30. // NTP
  31. // 'time.*.com', 'time.*.gov', 'time.*.edu.cn', 'time.*.apple.com', 'time?.*.com', 'ntp.*.com', 'ntp?.*.com', '*.time.edu.cn', '*.ntp.org.cn', '*.pool.ntp.org'
  32. // 'time*.cloud.tencent.com', 'ntp?.aliyun.com',
  33. // QQ Login
  34. // 'localhost.*.qq.com'
  35. // 'localhost.ptlogin2.qq.com
  36. // 'localhost.sec.qq.com',
  37. // 'localhost.work.weixin.qq.com',
  38. '*.sslip.io',
  39. '*.nip.io'
  40. ];
  41. export const buildAlwaysRealIPModule = task(require.main === module, __filename)(async (span) => {
  42. const surge: string[] = [];
  43. const clashFakeIpFilter = new FileOutput(span, 'clash_fake_ip_filter')
  44. .withTitle('Sukka\'s Ruleset - Always Real IP Plus')
  45. .withDescription([
  46. ...SHARED_DESCRIPTION,
  47. '',
  48. 'Clash.Meta fake-ip-filter as ruleset'
  49. ])
  50. .withStrategies([
  51. new ClashDomainSet('domainset')
  52. ]);
  53. // Intranet, Router Setup, and mant more
  54. const dataset = [DIRECTS, LAN, DOMESTICS, DOH_BOOTSTRAP].reduce<DNSMapping[]>((acc, item) => {
  55. Object.values(item).forEach((i: DNSMapping) => {
  56. if (i.realip) {
  57. acc.push(i);
  58. }
  59. });
  60. return acc;
  61. }, []);
  62. const getDnsMappingRuleWithoutWildcard = createGetDnsMappingRule(false);
  63. for (const { domains } of dataset) {
  64. clashFakeIpFilter.addFromRuleset(domains.flatMap(getDnsMappingRuleWithoutWildcard));
  65. }
  66. return Promise.all([
  67. compareAndWriteFile(
  68. span,
  69. [
  70. '#!name=[Sukka] Always Real IP Plus',
  71. `#!desc=Last Updated: ${new Date().toISOString()}`,
  72. '',
  73. '[General]',
  74. `always-real-ip = %APPEND% ${HOSTNAMES.concat(surge).join(', ')}`
  75. ],
  76. path.resolve(OUTPUT_MODULES_DIR, 'sukka_common_always_realip.sgmodule')
  77. ),
  78. compareAndWriteFile(
  79. span,
  80. yaml.stringify(
  81. {
  82. dns: {
  83. 'fake-ip-filter': appendArrayInPlace(
  84. /** clash */
  85. dataset.flatMap(({ domains }) => domains.map((domain) => `+.${domain}`)),
  86. HOSTNAMES
  87. )
  88. }
  89. },
  90. { version: '1.1' }
  91. ).split('\n'),
  92. path.join(OUTPUT_INTERNAL_DIR, 'clash_fake_ip_filter.yaml')
  93. )
  94. ]);
  95. });