mirror of https://github.com/dnomd343/XProxy.git
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
183 lines
7.4 KiB
183 lines
7.4 KiB
package config
|
|
|
|
import (
|
|
"XProxy/cmd/asset"
|
|
"XProxy/cmd/common"
|
|
"XProxy/cmd/custom"
|
|
"XProxy/cmd/proxy"
|
|
"XProxy/cmd/radvd"
|
|
"encoding/json"
|
|
log "github.com/sirupsen/logrus"
|
|
"gopkg.in/yaml.v3"
|
|
"net/url"
|
|
)
|
|
|
|
type NetConfig struct {
|
|
Gateway string `yaml:"gateway"` // network gateway
|
|
Address string `yaml:"address"` // network address
|
|
}
|
|
|
|
type RawConfig struct {
|
|
Update asset.Config `yaml:"update" json:"update"`
|
|
Radvd radvd.Config `yaml:"radvd" json:"radvd"`
|
|
Proxy proxy.Config `yaml:"proxy" json:"proxy"`
|
|
Custom custom.Config `yaml:"custom" json:"custom"`
|
|
Network struct {
|
|
Dev string `yaml:"dev" json:"dev"`
|
|
DNS []string `yaml:"dns" json:"dns"`
|
|
ByPass []string `yaml:"bypass" json:"bypass"`
|
|
Exclude []string `yaml:"exclude" json:"exclude"`
|
|
IPv4 NetConfig `yaml:"ipv4" json:"ipv4"`
|
|
IPv6 NetConfig `yaml:"ipv6" json:"ipv6"`
|
|
} `yaml:"network" json:"network"`
|
|
}
|
|
|
|
func configDecode(raw []byte, fileSuffix string) RawConfig {
|
|
var config RawConfig
|
|
log.Debugf("Config raw content -> \n%s", string(raw))
|
|
if fileSuffix == ".json" {
|
|
if err := json.Unmarshal(raw, &config); err != nil { // json format decode
|
|
log.Panicf("Decode config file error -> %v", err)
|
|
}
|
|
} else {
|
|
if err := yaml.Unmarshal(raw, &config); err != nil { // yaml format decode
|
|
log.Panicf("Decode config file error -> %v", err)
|
|
}
|
|
}
|
|
log.Debugf("Decoded configure -> %v", config)
|
|
return config
|
|
}
|
|
|
|
func decodeDev(rawConfig *RawConfig, config *Config) {
|
|
config.Dev = rawConfig.Network.Dev
|
|
if config.Dev == "" {
|
|
setV4 := rawConfig.Network.IPv4.Address != "" || rawConfig.Network.IPv4.Gateway != ""
|
|
setV6 := rawConfig.Network.IPv6.Address != "" || rawConfig.Network.IPv6.Gateway != ""
|
|
if setV4 || setV6 {
|
|
log.Panicf("Missing dev option in network settings")
|
|
}
|
|
}
|
|
log.Debugf("Network device -> %s", config.Dev)
|
|
}
|
|
|
|
func decodeDns(rawConfig *RawConfig, config *Config) {
|
|
for _, address := range rawConfig.Network.DNS { // dns options
|
|
if common.IsIPv4(address, false) || common.IsIPv6(address, false) {
|
|
config.DNS = append(config.DNS, address)
|
|
} else {
|
|
log.Panicf("Invalid DNS server -> %s", address)
|
|
}
|
|
}
|
|
log.Debugf("DNS server -> %v", config.DNS)
|
|
}
|
|
|
|
func decodeBypass(rawConfig *RawConfig, config *Config) {
|
|
for _, address := range rawConfig.Network.ByPass { // bypass options
|
|
if common.IsIPv4(address, true) || common.IsIPv4(address, false) {
|
|
config.IPv4.Bypass = append(config.IPv4.Bypass, address)
|
|
} else if common.IsIPv6(address, true) || common.IsIPv6(address, false) {
|
|
config.IPv6.Bypass = append(config.IPv6.Bypass, address)
|
|
} else {
|
|
log.Panicf("Invalid bypass IP or CIDR -> %s", address)
|
|
}
|
|
}
|
|
log.Debugf("IPv4 bypass -> %s", config.IPv4.Bypass)
|
|
log.Debugf("IPv6 bypass -> %s", config.IPv6.Bypass)
|
|
}
|
|
|
|
func decodeExclude(rawConfig *RawConfig, config *Config) {
|
|
for _, address := range rawConfig.Network.Exclude { // exclude options
|
|
if common.IsIPv4(address, true) || common.IsIPv4(address, false) {
|
|
config.IPv4.Exclude = append(config.IPv4.Exclude, address)
|
|
} else if common.IsIPv6(address, true) || common.IsIPv6(address, false) {
|
|
config.IPv6.Exclude = append(config.IPv6.Exclude, address)
|
|
} else {
|
|
log.Panicf("Invalid exclude IP or CIDR -> %s", address)
|
|
}
|
|
}
|
|
log.Debugf("IPv4 exclude -> %s", config.IPv4.Exclude)
|
|
log.Debugf("IPv6 exclude -> %s", config.IPv6.Exclude)
|
|
}
|
|
|
|
func decodeIPv4(rawConfig *RawConfig, config *Config) {
|
|
config.IPv4.Address = rawConfig.Network.IPv4.Address
|
|
config.IPv4.Gateway = rawConfig.Network.IPv4.Gateway
|
|
if config.IPv4.Address != "" && !common.IsIPv4(config.IPv4.Address, true) {
|
|
log.Panicf("Invalid IPv4 address (CIDR) -> %s", config.IPv4.Address)
|
|
}
|
|
if config.IPv4.Gateway != "" && !common.IsIPv4(config.IPv4.Gateway, false) {
|
|
log.Panicf("Invalid IPv4 gateway -> %s", config.IPv4.Gateway)
|
|
}
|
|
log.Debugf("IPv4 -> address = %s | gateway = %s", config.IPv4.Address, config.IPv4.Gateway)
|
|
}
|
|
|
|
func decodeIPv6(rawConfig *RawConfig, config *Config) {
|
|
config.IPv6.Address = rawConfig.Network.IPv6.Address
|
|
config.IPv6.Gateway = rawConfig.Network.IPv6.Gateway
|
|
if config.IPv6.Address != "" && !common.IsIPv6(config.IPv6.Address, true) {
|
|
log.Panicf("Invalid IPv6 address (CIDR) -> %s", config.IPv6.Address)
|
|
}
|
|
if config.IPv6.Gateway != "" && !common.IsIPv6(config.IPv6.Gateway, false) {
|
|
log.Panicf("Invalid IPv6 gateway -> %s", config.IPv6.Gateway)
|
|
}
|
|
log.Debugf("IPv6 -> address = %s | gateway = %s", config.IPv6.Address, config.IPv6.Gateway)
|
|
}
|
|
|
|
func decodeProxy(rawConfig *RawConfig, config *Config) {
|
|
config.Proxy = rawConfig.Proxy
|
|
if config.Proxy.Core == "" {
|
|
config.Proxy.Core = "xray" // use xray in default
|
|
}
|
|
if config.Proxy.Core != "xray" && config.Proxy.Core != "v2ray" && config.Proxy.Core != "sagray" {
|
|
log.Warningf("Unknown core type -> %s", config.Proxy.Core)
|
|
}
|
|
if config.Proxy.Core != "xray" && config.Proxy.Core != "sagray" && !config.Proxy.Sniff.Redirect {
|
|
log.Warningf("V2fly core couldn't disable redirect in sniff (aka `routeOnly` option)")
|
|
}
|
|
if config.Proxy.Core != "xray" && len(config.Proxy.Sniff.Exclude) != 0 {
|
|
log.Warningf("The exclude list in sniff options can only use for Xray-core")
|
|
}
|
|
log.Debugf("Proxy log level -> %s", config.Proxy.Log)
|
|
log.Debugf("Core type -> %s", config.Proxy.Core)
|
|
log.Debugf("Http inbounds -> %v", config.Proxy.Http)
|
|
log.Debugf("Socks5 inbounds -> %v", config.Proxy.Socks)
|
|
log.Debugf("Add-on inbounds -> %v", config.Proxy.AddOn)
|
|
log.Debugf("Connection sniff -> %t", config.Proxy.Sniff.Enable)
|
|
log.Debugf("Connection redirect -> %t", config.Proxy.Sniff.Redirect)
|
|
log.Debugf("Connection sniff exlcude -> %v", config.Proxy.Sniff.Exclude)
|
|
}
|
|
|
|
func decodeRadvd(rawConfig *RawConfig, config *Config) {
|
|
config.Radvd = rawConfig.Radvd
|
|
if config.Radvd.Enable && config.Radvd.Dev == "" {
|
|
log.Panicf("Radvd enabled without dev option")
|
|
}
|
|
log.Debugf("Radvd log level -> %d", config.Radvd.Log)
|
|
log.Debugf("Radvd network dev -> %s", config.Radvd.Dev)
|
|
log.Debugf("Radvd enable -> %t", config.Radvd.Enable)
|
|
log.Debugf("Radvd options -> %v", config.Radvd.Option)
|
|
log.Debugf("Radvd prefix -> %v", config.Radvd.Prefix)
|
|
log.Debugf("Radvd route -> %v", config.Radvd.Route)
|
|
log.Debugf("Radvd clients -> %v", config.Radvd.Client)
|
|
log.Debugf("Radvd RDNSS -> %v", config.Radvd.RDNSS)
|
|
log.Debugf("Radvd DNSSL -> %v", config.Radvd.DNSSL)
|
|
}
|
|
|
|
func decodeUpdate(rawConfig *RawConfig, config *Config) {
|
|
config.Update = rawConfig.Update
|
|
if config.Update.Proxy != "" {
|
|
_, err := url.Parse(config.Update.Proxy) // check proxy info
|
|
if err != nil {
|
|
log.Panicf("Invalid update proxy -> %s", config.Update.Proxy)
|
|
}
|
|
}
|
|
log.Debugf("Update proxy -> %s", config.Update.Proxy)
|
|
log.Debugf("Update cron -> %s", config.Update.Cron)
|
|
log.Debugf("Update urls -> %v", config.Update.Url)
|
|
}
|
|
|
|
func decodeCustom(rawConfig *RawConfig, config *Config) {
|
|
config.Custom = rawConfig.Custom
|
|
log.Debugf("Custom pre-script -> %v", config.Custom.Pre)
|
|
log.Debugf("Custom post-script -> %v", config.Custom.Post)
|
|
}
|
|
|