123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421 |
- local m, s, o
- local uci = require "luci.model.uci".cursor()
- -- 获取 LAN IP 地址
- function lanip()
- local lan_ip
- lan_ip = luci.sys.exec("uci -q get network.lan.ipaddr 2>/dev/null | awk -F '/' '{print $1}' | tr -d '\n'")
- if not lan_ip or lan_ip == "" then
- lan_ip = luci.sys.exec("ip address show $(uci -q -p /tmp/state get network.lan.ifname || uci -q -p /tmp/state get network.lan.device) | grep -w 'inet' | grep -Eo 'inet [0-9\.]+' | awk '{print $2}' | head -1 | tr -d '\n'")
- end
- if not lan_ip or lan_ip == "" then
- lan_ip = luci.sys.exec("ip addr show | grep -w 'inet' | grep 'global' | grep -Eo 'inet [0-9\.]+' | awk '{print $2}' | head -n 1 | tr -d '\n'")
- end
- return lan_ip
- end
- local lan_ip = lanip()
- local server_table = {}
- local type_table = {}
- local function is_finded(e)
- return luci.sys.exec(string.format('type -t -p "%s" 2>/dev/null', e)) ~= ""
- end
- uci:foreach("shadowsocksr", "servers", function(s)
- if s.alias then
- server_table[s[".name"]] = "[%s]:%s" % {string.upper(s.v2ray_protocol or s.type), s.alias}
- elseif s.server and s.server_port then
- server_table[s[".name"]] = "[%s]:%s:%s" % {string.upper(s.v2ray_protocol or s.type), s.server, s.server_port}
- end
- if s.type then
- type_table[s[".name"]] = s.type
- end
- end)
- local key_table = {}
- for key, _ in pairs(server_table) do
- table.insert(key_table, key)
- end
- table.sort(key_table)
- m = Map("shadowsocksr")
- -- [[ global ]]--
- s = m:section(TypedSection, "global", translate("Server failsafe auto swith and custom update settings"))
- s.anonymous = true
- -- o = s:option(Flag, "monitor_enable", translate("Enable Process Deamon"))
- -- o.rmempty = false
- -- o.default = "1"
- o = s:option(Flag, "enable_switch", translate("Enable Auto Switch"))
- o.rmempty = false
- o.default = "1"
- o = s:option(Value, "switch_time", translate("Switch check cycly(second)"))
- o.datatype = "uinteger"
- o:depends("enable_switch", "1")
- o.default = 667
- o = s:option(Value, "switch_timeout", translate("Check timout(second)"))
- o.datatype = "uinteger"
- o:depends("enable_switch", "1")
- o.default = 5
- o = s:option(Value, "switch_try_count", translate("Check Try Count"))
- o.datatype = "uinteger"
- o:depends("enable_switch", "1")
- o.default = 3
- o = s:option(Value, "gfwlist_url", translate("gfwlist Update url"))
- o:value("https://fastly.jsdelivr.net/gh/YW5vbnltb3Vz/domain-list-community@release/gfwlist.txt", translate("v2fly/domain-list-community"))
- o:value("https://fastly.jsdelivr.net/gh/Loyalsoldier/v2ray-rules-dat@release/gfw.txt", translate("Loyalsoldier/v2ray-rules-dat"))
- o:value("https://fastly.jsdelivr.net/gh/Loukky/gfwlist-by-loukky/gfwlist.txt", translate("Loukky/gfwlist-by-loukky"))
- o:value("https://fastly.jsdelivr.net/gh/gfwlist/gfwlist/gfwlist.txt", translate("gfwlist/gfwlist"))
- o.default = "https://fastly.jsdelivr.net/gh/YW5vbnltb3Vz/domain-list-community@release/gfwlist.txt"
- o = s:option(Value, "chnroute_url", translate("Chnroute Update url"))
- o:value("https://ispip.clang.cn/all_cn.txt", translate("Clang.CN"))
- o:value("https://ispip.clang.cn/all_cn_cidr.txt", translate("Clang.CN.CIDR"))
- o:value("https://fastly.jsdelivr.net/gh/gaoyifan/china-operator-ip@ip-lists/china.txt", translate("china-operator-ip"))
- o.default = "https://ispip.clang.cn/all_cn.txt"
- o = s:option(Flag, "netflix_enable", translate("Enable Netflix Mode"))
- o.description = translate("When disabled shunt mode, will same time stopped shunt service.")
- o.rmempty = false
- o = s:option(Value, "nfip_url", translate("nfip_url"))
- o:value("https://fastly.jsdelivr.net/gh/QiuSimons/Netflix_IP/NF_only.txt", translate("Netflix IP Only"))
- o:value("https://fastly.jsdelivr.net/gh/QiuSimons/Netflix_IP/getflix.txt", translate("Netflix and AWS"))
- o.default = "https://fastly.jsdelivr.net/gh/QiuSimons/Netflix_IP/NF_only.txt"
- o.description = translate("Customize Netflix IP Url")
- o:depends("netflix_enable", "1")
- o = s:option(ListValue, "shunt_dns_mode", translate("DNS Query Mode For Shunt Mode"))
- if is_finded("dns2socks") then
- o:value("1", translate("Use DNS2SOCKS query and cache"))
- end
- if is_finded("dns2socks-rust") then
- o:value("2", translate("Use DNS2SOCKS-RUST query and cache"))
- end
- if is_finded("mosdns") then
- o:value("3", translate("Use MosDNS query"))
- end
- if is_finded("dnsproxy") then
- o:value("4", translate("Use DNSPROXY query and cache"))
- end
- if is_finded("chinadns-ng") then
- o:value("5", translate("Use ChinaDNS-NG query and cache"))
- end
- o:depends("netflix_enable", "1")
- o.default = 1
- o = s:option(Value, "shunt_dnsserver", translate("Anti-pollution DNS Server For Shunt Mode"))
- o:value("8.8.4.4:53", translate("Google Public DNS (8.8.4.4)"))
- o:value("8.8.8.8:53", translate("Google Public DNS (8.8.8.8)"))
- o:value("208.67.222.222:53", translate("OpenDNS (208.67.222.222)"))
- o:value("208.67.220.220:53", translate("OpenDNS (208.67.220.220)"))
- o:value("209.244.0.3:53", translate("Level 3 Public DNS (209.244.0.3)"))
- o:value("209.244.0.4:53", translate("Level 3 Public DNS (209.244.0.4)"))
- o:value("4.2.2.1:53", translate("Level 3 Public DNS (4.2.2.1)"))
- o:value("4.2.2.2:53", translate("Level 3 Public DNS (4.2.2.2)"))
- o:value("4.2.2.3:53", translate("Level 3 Public DNS (4.2.2.3)"))
- o:value("4.2.2.4:53", translate("Level 3 Public DNS (4.2.2.4)"))
- o:value("1.1.1.1:53", translate("Cloudflare DNS (1.1.1.1)"))
- o:depends("shunt_dns_mode", "1")
- o:depends("shunt_dns_mode", "2")
- o.description = translate("Custom DNS Server format as IP:PORT (default: 8.8.4.4:53)")
- o.datatype = "ip4addrport"
- o = s:option(ListValue, "shunt_mosdns_dnsserver", translate("Anti-pollution DNS Server"))
- o:value("tcp://8.8.4.4:53,tcp://8.8.8.8:53", translate("Google Public DNS"))
- o:value("tcp://208.67.222.222:53,tcp://208.67.220.220:53", translate("OpenDNS"))
- o:value("tcp://209.244.0.3:53,tcp://209.244.0.4:53", translate("Level 3 Public DNS-1 (209.244.0.3-4)"))
- o:value("tcp://4.2.2.1:53,tcp://4.2.2.2:53", translate("Level 3 Public DNS-2 (4.2.2.1-2)"))
- o:value("tcp://4.2.2.3:53,tcp://4.2.2.4:53", translate("Level 3 Public DNS-3 (4.2.2.3-4)"))
- o:value("tcp://1.1.1.1:53,tcp://1.0.0.1:53", translate("Cloudflare DNS"))
- o:depends("shunt_dns_mode", "3")
- o.description = translate("Custom DNS Server for MosDNS")
- o = s:option(Flag, "shunt_mosdns_ipv6", translate("Disable IPv6 In MosDNS Query Mode (Shunt Mode)"))
- o:depends("shunt_dns_mode", "3")
- o.rmempty = false
- o.default = "0"
- if is_finded("dnsproxy") then
- o = s:option(ListValue, "shunt_parse_method", translate("Select DNS parse Mode"))
- o.description = translate(
- "<ul>" ..
- "<li>" .. translate("When use DNS list file, please ensure list file exists and is formatted correctly.") .. "</li>" ..
- "<li>" .. translate("Tips: Dnsproxy DNS Parse List Path:") ..
- " <a href='http://" .. lan_ip .. "/cgi-bin/luci/admin/services/shadowsocksr/control' target='_blank'>" ..
- translate("Click here to view or manage the DNS list file") .. "</a>" .. "</li>" ..
- "</ul>"
- )
- o:value("single_dns", translate("Set Single DNS"))
- o:value("parse_file", translate("Use DNS List File"))
- o:depends("shunt_dns_mode", "4")
- o.rmempty = true
- o.default = "single_dns"
- o = s:option(Value, "dnsproxy_shunt_forward", translate("Anti-pollution DNS Server"))
- o:value("sdns://AgUAAAAAAAAABzguOC40LjQgsKKKE4EwvtIbNjGjagI2607EdKSVHowYZtyvD9iPrkkHOC44LjQuNAovZG5zLXF1ZXJ5", translate("Google DNSCrypt SDNS"))
- o:value("sdns://AgcAAAAAAAAAACC2vD25TAYM7EnyCH8Xw1-0g5OccnTsGH9vQUUH0njRtAxkbnMudHduaWMudHcKL2Rucy1xdWVyeQ", translate("TWNIC-101 DNSCrypt SDNS"))
- o:value("sdns://AgcAAAAAAAAADzE4NS4yMjIuMjIyLjIyMiAOp5Svj-oV-Fz-65-8H2VKHLKJ0egmfEgrdPeAQlUFFA8xODUuMjIyLjIyMi4yMjIKL2Rucy1xdWVyeQ", translate("dns.sb DNSCrypt SDNS"))
- o:value("sdns://AgMAAAAAAAAADTE0OS4xMTIuMTEyLjkgsBkgdEu7dsmrBT4B4Ht-BQ5HPSD3n3vqQ1-v5DydJC8SZG5zOS5xdWFkOS5uZXQ6NDQzCi9kbnMtcXVlcnk", translate("Quad9 DNSCrypt SDNS"))
- o:value("sdns://AQMAAAAAAAAAETk0LjE0MC4xNC4xNDo1NDQzINErR_JS3PLCu_iZEIbq95zkSV2LFsigxDIuUso_OQhzIjIuZG5zY3J5cHQuZGVmYXVsdC5uczEuYWRndWFyZC5jb20", translate("AdGuard DNSCrypt SDNS"))
- o:value("sdns://AgcAAAAAAAAABzEuMC4wLjGgENk8mGSlIfMGXMOlIlCcKvq7AVgcrZxtjon911-ep0cg63Ul-I8NlFj4GplQGb_TTLiczclX57DvMV8Q-JdjgRgSZG5zLmNsb3VkZmxhcmUuY29tCi9kbnMtcXVlcnk", translate("Cloudflare DNSCrypt SDNS"))
- o:value("sdns://AgcAAAAAAAAADjEwNC4xNi4yNDkuMjQ5ABJjbG91ZGZsYXJlLWRucy5jb20KL2Rucy1xdWVyeQ", translate("cloudflare-dns.com DNSCrypt SDNS"))
- o:depends("shunt_parse_method", "single_dns")
- o.description = translate("Custom DNS Server (support: IP:Port or tls://IP:Port or https://IP/dns-query and other format).")
- o = s:option(ListValue, "shunt_upstreams_logic_mode", translate("Defines the upstreams logic mode"))
- o.description = translate(
- "<ul>" ..
- "<li>" .. translate("Defines the upstreams logic mode, possible values: load_balance, parallel, fastest_addr (default: load_balance).") .. "</li>" .. "<li>" .. translate("When two or more DNS servers are deployed, enable this function.") .. "</li>" ..
- "</ul>"
- )
- o:value("load_balance", translate("load_balance"))
- o:value("parallel", translate("parallel"))
- o:value("fastest_addr", translate("fastest_addr"))
- o:depends("shunt_parse_method", "parse_file")
- o.rmempty = true
- o.default = "load_balance"
- o = s:option(Flag, "shunt_dnsproxy_ipv6", translate("Disable IPv6 query mode"))
- o.description = translate("When disabled, all AAAA requests are not resolved.")
- o:depends("shunt_parse_method", "single_dns")
- o:depends("shunt_parse_method", "parse_file")
- o.rmempty = false
- o.default = "1"
- end
- if is_finded("chinadns-ng") then
- o = s:option(Value, "chinadns_ng_shunt_dnsserver", translate("Anti-pollution DNS Server For Shunt Mode"))
- o:value("8.8.4.4:53", translate("Google Public DNS (8.8.4.4)"))
- o:value("8.8.8.8:53", translate("Google Public DNS (8.8.8.8)"))
- o:value("208.67.222.222:53", translate("OpenDNS (208.67.222.222)"))
- o:value("208.67.220.220:53", translate("OpenDNS (208.67.220.220)"))
- o:value("209.244.0.3:53", translate("Level 3 Public DNS (209.244.0.3)"))
- o:value("209.244.0.4:53", translate("Level 3 Public DNS (209.244.0.4)"))
- o:value("4.2.2.1:53", translate("Level 3 Public DNS (4.2.2.1)"))
- o:value("4.2.2.2:53", translate("Level 3 Public DNS (4.2.2.2)"))
- o:value("4.2.2.3:53", translate("Level 3 Public DNS (4.2.2.3)"))
- o:value("4.2.2.4:53", translate("Level 3 Public DNS (4.2.2.4)"))
- o:value("1.1.1.1:53", translate("Cloudflare DNS (1.1.1.1)"))
- o:depends("shunt_dns_mode", "5")
- o.description = translate(
- "<ul>" ..
- "<li>" .. translate("Custom DNS Server format as IP:PORT (default: 8.8.4.4:53)") .. "</li>" ..
- "<li>" .. translate("Muitiple DNS server can saperate with ','") .. "</li>" ..
- "</ul>"
- )
- o = s:option(ListValue, "chinadns_ng_shunt_proto", translate("ChinaDNS-NG shunt query protocol"))
- o:value("none", translate("UDP/TCP upstream"))
- o:value("tcp", translate("TCP upstream"))
- o:value("udp", translate("UDP upstream"))
- o:value("tls", translate("DoT upstream (Need use wolfssl version)"))
- o:depends("shunt_dns_mode", "5")
- end
- o = s:option(Flag, "apple_optimization", translate("Apple domains optimization"), translate("For Apple domains equipped with Chinese mainland CDN, always responsive to Chinese CDN IP addresses"))
- o.rmempty = false
- o.default = "1"
- o = s:option(Value, "apple_url", translate("Apple Domains Update url"))
- o:value("https://fastly.jsdelivr.net/gh/felixonmars/dnsmasq-china-list/apple.china.conf", translate("felixonmars/dnsmasq-china-list"))
- o.default = "https://fastly.jsdelivr.net/gh/felixonmars/dnsmasq-china-list/apple.china.conf"
- o:depends("apple_optimization", "1")
- o = s:option(Value, "apple_dns", translate("Apple Domains DNS"), translate("If empty, Not change Apple domains parsing DNS (Default is empty)"))
- o.rmempty = true
- o.default = ""
- o.datatype = "ip4addr"
- o:depends("apple_optimization", "1")
- o = s:option(Flag, "adblock", translate("Enable adblock"))
- o.rmempty = false
- o = s:option(Value, "adblock_url", translate("adblock_url"))
- o:value("https://raw.githubusercontent.com/neodevpro/neodevhost/master/lite_dnsmasq.conf", translate("NEO DEV HOST Lite"))
- o:value("https://raw.githubusercontent.com/neodevpro/neodevhost/master/dnsmasq.conf", translate("NEO DEV HOST Full"))
- o:value("https://anti-ad.net/anti-ad-for-dnsmasq.conf", translate("anti-AD"))
- o.default = "https://raw.githubusercontent.com/neodevpro/neodevhost/master/lite_dnsmasq.conf"
- o:depends("adblock", "1")
- o.description = translate("Support AdGuardHome and DNSMASQ format list")
- o = s:option(Button, "Reset", translate("Reset to defaults"))
- o.inputstyle = "reload"
- o.write = function()
- luci.sys.call("/etc/init.d/shadowsocksr reset")
- luci.http.redirect(luci.dispatcher.build_url("admin", "services", "shadowsocksr", "servers"))
- end
- -- [[ SOCKS5 Proxy ]]--
- s = m:section(TypedSection, "socks5_proxy", translate("Global SOCKS5 Proxy Server"))
- s.anonymous = true
- -- Enable/Disable Option
- o = s:option(Flag, "enabled", translate("Enable"))
- o.default = 0
- o.rmempty = false
- -- Server Selection
- o = s:option(ListValue, "server", translate("Server"))
- o:value("same", translate("Same as Global Server"))
- for _, key in pairs(key_table) do
- o:value(key, server_table[key])
- end
- o.default = "same"
- o.rmempty = false
- -- Dynamic value handling based on enabled/disabled state
- o.cfgvalue = function(self, section)
- local enabled = m:get(section, "enabled")
- if enabled == "0" then
- return m:get(section, "old_server")
- end
- return Value.cfgvalue(self, section)-- Default to `same` when enabled
- end
- o.write = function(self, section, value)
- local enabled = m:get(section, "enabled")
- if enabled == "0" then
- local old_server = Value.cfgvalue(self, section)
- if old_server ~= "nil" then
- m:set(section, "old_server", old_server)
- end
- m:set(section, "server", "nil")
- else
- m:del(section, "old_server")
- -- Write the value normally when enabled
- Value.write(self, section, value)
- end
- end
- -- Socks Auth
- if is_finded("xray") then
- o = s:option(ListValue, "socks5_auth", translate("Socks5 Auth Mode"), translate("Socks protocol auth methods, default:noauth."))
- o.default = "noauth"
- o:value("noauth", "NOAUTH")
- o:value("password", "PASSWORD")
- o.rmempty = true
- for key, server_type in pairs(type_table) do
- if server_type == "v2ray" then
- -- 如果服务器类型是 v2ray,则设置依赖项显示
- o:depends("server", key)
- end
- end
- o:depends({server = "same", disable = true})
- -- Socks User
- o = s:option(Value, "socks5_user", translate("Socks5 User"), translate("Only when Socks5 Auth Mode is password valid, Mandatory."))
- o.rmempty = true
- o:depends("socks5_auth", "password")
- -- Socks Password
- o = s:option(Value, "socks5_pass", translate("Socks5 Password"), translate("Only when Socks5 Auth Mode is password valid, Not mandatory."))
- o.password = true
- o.rmempty = true
- o:depends("socks5_auth", "password")
- -- Socks Mixed
- o = s:option(Flag, "socks5_mixed", translate("Enabled Mixed"), translate("Mixed as an alias of socks, default:Enabled."))
- o.default = "1"
- o.rmempty = false
- for key, server_type in pairs(type_table) do
- if server_type == "v2ray" then
- -- 如果服务器类型是 v2ray,则设置依赖项显示
- o:depends("server", key)
- end
- end
- o:depends({server = "same", disable = true})
- end
- -- Local Port
- o = s:option(Value, "local_port", translate("Local Port"))
- o.datatype = "port"
- o.default = 1080
- o.rmempty = false
- -- [[ fragmen Settings ]]--
- if is_finded("xray") then
- s = m:section(TypedSection, "global_xray_fragment", translate("Xray Fragment Settings"))
- s.anonymous = true
- o = s:option(Flag, "fragment", translate("Fragment"), translate("TCP fragments, which can deceive the censorship system in some cases, such as bypassing SNI blacklists."))
- o.default = 0
- o = s:option(ListValue, "fragment_packets", translate("Fragment Packets"), translate("\"1-3\" is for segmentation at TCP layer, applying to the beginning 1 to 3 data writes by the client. \"tlshello\" is for TLS client hello packet fragmentation."))
- o.default = "tlshello"
- o:value("tlshello", "tlshello")
- o:value("1-1", "1-1")
- o:value("1-2", "1-2")
- o:value("1-3", "1-3")
- o:value("1-5", "1-5")
- o:depends("fragment", true)
- o = s:option(Value, "fragment_length", translate("Fragment Length"), translate("Fragmented packet length (byte)"))
- o.default = "100-200"
- o:depends("fragment", true)
- o = s:option(Value, "fragment_interval", translate("Fragment Interval"), translate("Fragmentation interval (ms)"))
- o.default = "10-20"
- o:depends("fragment", true)
- o = s:option(Flag, "noise", translate("Noise"), translate("UDP noise, Under some circumstances it can bypass some UDP based protocol restrictions."))
- o.default = 0
- s = m:section(TypedSection, "xray_noise_packets", translate("Xray Noise Packets"))
- s.description = translate(
- "<font style='color:red'>" .. translate("To send noise packets, select \"Noise\" in Xray Settings.") .. "</font>" ..
- "<br/><font><b>" .. translate("For specific usage, see:") .. "</b></font>" ..
- "<a href='https://xtls.github.io/config/outbounds/freedom.html' target='_blank'>" ..
- "<font style='color:green'><b>" .. translate("Click to the page") .. "</b></font></a>")
- s.template = "cbi/tblsection"
- s.sortable = true
- s.anonymous = true
- s.addremove = true
- s.remove = function(self, section)
- for k, v in pairs(self.children) do
- v.rmempty = true
- v.validate = nil
- end
- TypedSection.remove(self, section)
- end
- o = s:option(Flag, "enabled", translate("Enable"))
- o.default = 1
- o.rmempty = false
- o = s:option(ListValue, "type", translate("Type"))
- o.default = "base64"
- o:value("rand", "rand")
- o:value("str", "str")
- o:value("hex", "hex")
- o:value("base64", "base64")
- o = s:option(Value, "domainStrategy", translate("Domain Strategy"))
- o.default = "UseIP"
- o:value("AsIs", "AsIs")
- o:value("UseIP", "UseIP")
- o:value("UseIPv4", "UseIPv4")
- o:value("ForceIP", "ForceIP")
- o:value("ForceIPv4", "ForceIPv4")
- o.rmempty = false
- o = s:option(Value, "packet", translate("Packet"))
- o.datatype = "minlength(1)"
- o.rmempty = false
- o = s:option(Value, "delay", translate("Delay (ms)"))
- o.datatype = "or(uinteger,portrange)"
- o.rmempty = false
- end
- return m
|