mirror of
https://github.com/itdoginfo/podkop.git
synced 2025-12-06 11:36:50 +03:00
Compare commits
580 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
470f11699c | ||
|
|
852b6c043a | ||
|
|
f5cafd5573 | ||
|
|
3562b913a2 | ||
|
|
f4ac9dcc77 | ||
|
|
f5a629afcf | ||
|
|
aea201bf24 | ||
|
|
1313c3b26f | ||
|
|
a3f4e942c3 | ||
|
|
4d8e4c1c13 | ||
|
|
0cb5c2daae | ||
|
|
19fbfff555 | ||
|
|
75a2ed1e29 | ||
|
|
759b6748c6 | ||
|
|
0a27784f85 | ||
|
|
3b95ac2bc3 | ||
|
|
5c51d99d73 | ||
|
|
904b90e012 | ||
|
|
5fb8343cf8 | ||
|
|
014f0f4bdf | ||
|
|
dd44e0156e | ||
|
|
927b8a53b0 | ||
|
|
7ba20905d5 | ||
|
|
5b15a56502 | ||
|
|
c31df68bec | ||
|
|
0a5229f4f6 | ||
|
|
5ecb6ef997 | ||
|
|
340c2b3505 | ||
|
|
515c0be38b | ||
|
|
59c59bcb17 | ||
|
|
e5eff41a0f | ||
|
|
bb1c06951c | ||
|
|
4999840340 | ||
|
|
6c5a271105 | ||
|
|
e336bb831c | ||
|
|
00db99723c | ||
|
|
5439504de7 | ||
|
|
c3072162de | ||
|
|
d021636f85 | ||
|
|
a06aac0613 | ||
|
|
29159243ea | ||
|
|
269123600a | ||
|
|
49add27f81 | ||
|
|
c929c74da5 | ||
|
|
bb91144a91 | ||
|
|
2291d9fb9d | ||
|
|
f722a513d0 | ||
|
|
a71707f174 | ||
|
|
983f05345b | ||
|
|
ee246895de | ||
|
|
27719f90ee | ||
|
|
4a17cf66a3 | ||
|
|
db956452d1 | ||
|
|
4897d3d292 | ||
|
|
0aa0a4a9c8 | ||
|
|
7d082c5def | ||
|
|
8845749517 | ||
|
|
054ed355cf | ||
|
|
304c57edfa | ||
|
|
8dd33cdde2 | ||
|
|
3d3fbe3bfb | ||
|
|
427ea3bc9a | ||
|
|
a7f6a993ac | ||
|
|
074c1a9349 | ||
|
|
b6a6db71a8 | ||
|
|
38fcb59ed7 | ||
|
|
5a2ffcfd38 | ||
|
|
49f12b212d | ||
|
|
489c61baa2 | ||
|
|
d4b5431db4 | ||
|
|
d0ea39abd0 | ||
|
|
d4e754d2eb | ||
|
|
82f9ae4c6a | ||
|
|
775b0073d3 | ||
|
|
b477a8abc0 | ||
|
|
81e0c86060 | ||
|
|
191522f396 | ||
|
|
79cea7a31a | ||
|
|
6c094aceae | ||
|
|
1e8c2b50f7 | ||
|
|
27d2366208 | ||
|
|
c1133827a2 | ||
|
|
a187192a88 | ||
|
|
fe30cf9e55 | ||
|
|
9496a88774 | ||
|
|
f54e92cd7a | ||
|
|
d70a04b144 | ||
|
|
e5be9c3fd1 | ||
|
|
9762b9cca4 | ||
|
|
9d861cf3e0 | ||
|
|
49836e4adc | ||
|
|
5273935d25 | ||
|
|
d03167f49d | ||
|
|
da89c5c7df | ||
|
|
acfc95e86d | ||
|
|
17c1d09aa8 | ||
|
|
c7e21010bd | ||
|
|
f70e2ac557 | ||
|
|
cb4e3036be | ||
|
|
12fc6bd9ac | ||
|
|
2794cad533 | ||
|
|
9b182a3045 | ||
|
|
f07d90a524 | ||
|
|
75fc377c22 | ||
|
|
33ecb771f9 | ||
|
|
86038e2756 | ||
|
|
db91c628c8 | ||
|
|
41ce41945c | ||
|
|
2753a44440 | ||
|
|
cd1a4e2a8e | ||
|
|
7e041da8c6 | ||
|
|
f3f5bca555 | ||
|
|
174f16bc76 | ||
|
|
7c63a35faa | ||
|
|
86a86df982 | ||
|
|
ac445bc227 | ||
|
|
4398e6885b | ||
|
|
9974b42cc2 | ||
|
|
8cd990f8a3 | ||
|
|
c509fd38c7 | ||
|
|
38991a803a | ||
|
|
29c34e31db | ||
|
|
a77e8fae7d | ||
|
|
6d83737336 | ||
|
|
84115e2f3b | ||
|
|
2dbdb9d2c1 | ||
|
|
88c6717152 | ||
|
|
b3986308ce | ||
|
|
a15c3cf171 | ||
|
|
4c91223f85 | ||
|
|
7cf7b1f626 | ||
|
|
a2536534f8 | ||
|
|
c49354fe38 | ||
|
|
6e01e036eb | ||
|
|
7484d0c203 | ||
|
|
0eb4ca4ea9 | ||
|
|
c2d95162b7 | ||
|
|
1fc2947fbc | ||
|
|
ea931d8463 | ||
|
|
e2f36c35d4 | ||
|
|
e8f8dcc5e7 | ||
|
|
1e2174bb80 | ||
|
|
85e515ef15 | ||
|
|
418cdc4366 | ||
|
|
25b0dcaad5 | ||
|
|
cc59e756dd | ||
|
|
210714c499 | ||
|
|
8b6c336584 | ||
|
|
5c543c1608 | ||
|
|
ac274d8796 | ||
|
|
ce1f86ceb7 | ||
|
|
1fd67eefb3 | ||
|
|
e7b726d27c | ||
|
|
adb16e7f74 | ||
|
|
51da8c22fd | ||
|
|
41351dafd2 | ||
|
|
2aee77b9a2 | ||
|
|
2a1a220dc8 | ||
|
|
608caba090 | ||
|
|
04af8c9649 | ||
|
|
88d108e5ab | ||
|
|
8ce6790355 | ||
|
|
8e7b40cf56 | ||
|
|
21fa017443 | ||
|
|
f1954df83b | ||
|
|
8573bd99b5 | ||
|
|
c3f44bd124 | ||
|
|
59e394c4f2 | ||
|
|
c897c90371 | ||
|
|
bcab66f88c | ||
|
|
05a551e5e3 | ||
|
|
1f81ec8403 | ||
|
|
9748178562 | ||
|
|
1411e7d403 | ||
|
|
d81a90bd28 | ||
|
|
82f4720326 | ||
|
|
10f246ea61 | ||
|
|
c0571320f1 | ||
|
|
a658ca5518 | ||
|
|
08709c93c7 | ||
|
|
cf5b2216be | ||
|
|
682913ade0 | ||
|
|
3b2cbd0332 | ||
|
|
8f9dcf2c55 | ||
|
|
91d027b5fe | ||
|
|
f90ab7f468 | ||
|
|
e4bfd447ce | ||
|
|
fbdd759b83 | ||
|
|
2488bc30b1 | ||
|
|
dcc12cf920 | ||
|
|
c99cef9f27 | ||
|
|
8a68f3fcc2 | ||
|
|
ed2994be3a | ||
|
|
77ff5ab781 | ||
|
|
1c80bc5a5e | ||
|
|
f688d74c32 | ||
|
|
7bc50d58d3 | ||
|
|
77ce0c380b | ||
|
|
47d1b349c7 | ||
|
|
e9face1f4a | ||
|
|
e5bf7d9bed | ||
|
|
dd4722f3e1 | ||
|
|
1e945dafe7 | ||
|
|
b080521a58 | ||
|
|
6a96a85773 | ||
|
|
6fb3a36974 | ||
|
|
b3dbee1dbe | ||
|
|
916321578d | ||
|
|
c74d733717 | ||
|
|
433724f762 | ||
|
|
6378aa9910 | ||
|
|
68f5f123ca | ||
|
|
fae43d0471 | ||
|
|
9d6dc45fdb | ||
|
|
9aa5a2d242 | ||
|
|
63dc86fca4 | ||
|
|
4d9cedaf4c | ||
|
|
14e7cbae01 | ||
|
|
c9f610bb1e | ||
|
|
19671c7f67 | ||
|
|
6d1e4091e5 | ||
|
|
96d661c49f | ||
|
|
da8dd06b34 | ||
|
|
2c1bcffb6d | ||
|
|
3040ce7286 | ||
|
|
e025271a14 | ||
|
|
2b8208186d | ||
|
|
17fb11baf0 | ||
|
|
3c1b041b52 | ||
|
|
38acac1a31 | ||
|
|
2939229df3 | ||
|
|
26c3d0bc7e | ||
|
|
b364363b1b | ||
|
|
d85caf0c0c | ||
|
|
65f72e1e04 | ||
|
|
e59ef6dd6f | ||
|
|
05272de650 | ||
|
|
48716e7156 | ||
|
|
f29b97e495 | ||
|
|
41c21cebcd | ||
|
|
238e99a547 | ||
|
|
4f44fcfe99 | ||
|
|
9fd2fb9b6e | ||
|
|
c0591b25b9 | ||
|
|
97fd392334 | ||
|
|
848c784cc0 | ||
|
|
ab971dcd36 | ||
|
|
b8d96f28cd | ||
|
|
f2268fd494 | ||
|
|
19897afcdd | ||
|
|
0e2ea60f01 | ||
|
|
2dc5944961 | ||
|
|
f65de36804 | ||
|
|
19541f8bb3 | ||
|
|
aa42c707fe | ||
|
|
bf96f93987 | ||
|
|
ff9aad8947 | ||
|
|
d9718617bd | ||
|
|
e865c9f324 | ||
|
|
7df8bb5826 | ||
|
|
f960358eb6 | ||
|
|
ba44966c02 | ||
|
|
615241aa37 | ||
|
|
9a3220d226 | ||
|
|
ec8d28857e | ||
|
|
26b49f5bbb | ||
|
|
0a7efb3169 | ||
|
|
468e51ee8e | ||
|
|
3b93a914de | ||
|
|
76c5baf1e2 | ||
|
|
c752c46abf | ||
|
|
1df1defa5e | ||
|
|
3cb4be6427 | ||
|
|
25bfdce5ce | ||
|
|
6d0f097a07 | ||
|
|
5f780955eb | ||
|
|
389def9056 | ||
|
|
e816da5133 | ||
|
|
e57adbe042 | ||
|
|
d78c51360d | ||
|
|
c2357337fc | ||
|
|
bc6490b56e | ||
|
|
2f645d9151 | ||
|
|
94cc65001b | ||
|
|
87caa70e97 | ||
|
|
90d7c60fcb | ||
|
|
3f114b4710 | ||
|
|
b821abe82c | ||
|
|
732cab2ef3 | ||
|
|
3b4ce9e7a3 | ||
|
|
69c4445c85 | ||
|
|
dcebc3d67d | ||
|
|
1be31eaf59 | ||
|
|
023210e0f0 | ||
|
|
5ff832533e | ||
|
|
5d2163515e | ||
|
|
5865706d0c | ||
|
|
aabe1c53dc | ||
|
|
8e91b582ad | ||
|
|
62ce1f5acc | ||
|
|
93727ddeb5 | ||
|
|
98797d93b1 | ||
|
|
66c6e998a2 | ||
|
|
3d9f82b571 | ||
|
|
38d082e236 | ||
|
|
9f5abcae6d | ||
|
|
7836d2c6ec | ||
|
|
f46c934c59 | ||
|
|
23ed10d393 | ||
|
|
26488baad3 | ||
|
|
c79016e456 | ||
|
|
884bbfee42 | ||
|
|
1263b9b1b8 | ||
|
|
23203fd7a1 | ||
|
|
25c887a952 | ||
|
|
e7a3c7adf1 | ||
|
|
3e96b9a1af | ||
|
|
251f94cb88 | ||
|
|
44936c698e | ||
|
|
0faaca12fc | ||
|
|
c6d1f05916 | ||
|
|
57554d518b | ||
|
|
09d761956c | ||
|
|
ada807fec3 | ||
|
|
b28a5f1293 | ||
|
|
2332eae5ff | ||
|
|
a755b6661d | ||
|
|
567ce52253 | ||
|
|
b736360b66 | ||
|
|
3b2a7ba8af | ||
|
|
c96de62d96 | ||
|
|
14b7fbe4f7 | ||
|
|
3d05fe8be4 | ||
|
|
6ddf9d3b24 | ||
|
|
b401243f74 | ||
|
|
407ef404ac | ||
|
|
f2e45bbbb9 | ||
|
|
c2b37a14f4 | ||
|
|
3d029edaea | ||
|
|
b86d6d6294 | ||
|
|
5c48ead9e4 | ||
|
|
53475b5e8a | ||
|
|
59e1d75870 | ||
|
|
3ec6cc4d84 | ||
|
|
3413af9f94 | ||
|
|
76b5ceae5c | ||
|
|
99ccd9fbb3 | ||
|
|
b82c6eb718 | ||
|
|
ccc87d9aa0 | ||
|
|
8bcdee87f5 | ||
|
|
f77ef5626b | ||
|
|
b50a21ded7 | ||
|
|
a831054e5e | ||
|
|
a8dbff816c | ||
|
|
171381fa18 | ||
|
|
b806586a5a | ||
|
|
9e2b192181 | ||
|
|
c5be041664 | ||
|
|
445ad6d3d2 | ||
|
|
9203315107 | ||
|
|
d8d8d79d68 | ||
|
|
615928db4e | ||
|
|
7697754a73 | ||
|
|
25107a0481 | ||
|
|
5f5b1cbe1f | ||
|
|
a278918e77 | ||
|
|
2074ccecce | ||
|
|
06f9bee038 | ||
|
|
febb69d0be | ||
|
|
1a6ee45612 | ||
|
|
891b8f713d | ||
|
|
b96552fb49 | ||
|
|
ce9a7cdc45 | ||
|
|
6071a96e9c | ||
|
|
000d2f8e18 | ||
|
|
e17422a0cf | ||
|
|
2e78b2b4b8 | ||
|
|
b84f3b6782 | ||
|
|
0f66305e50 | ||
|
|
a32a5c600b | ||
|
|
89737efcbc | ||
|
|
4608bc31cd | ||
|
|
d9e9f2dfe4 | ||
|
|
bb9318e96f | ||
|
|
7ff49c3e4e | ||
|
|
134a79cb3b | ||
|
|
560dda8604 | ||
|
|
255c08a6de | ||
|
|
1f3a65347e | ||
|
|
ec936e2369 | ||
|
|
cee934d139 | ||
|
|
a25c6b8013 | ||
|
|
ec3a281cef | ||
|
|
86947e7dee | ||
|
|
ff5d017acc | ||
|
|
22d919657c | ||
|
|
3271f23ae0 | ||
|
|
35ea1a14cf | ||
|
|
51a9cc5934 | ||
|
|
e1df26e62b | ||
|
|
75b8bef0e0 | ||
|
|
1a6b0cac46 | ||
|
|
e49bd91109 | ||
|
|
85642a2585 | ||
|
|
c31785d20e | ||
|
|
a0af04037a | ||
|
|
51fb10e30e | ||
|
|
069ea41ef8 | ||
|
|
7ee92123bc | ||
|
|
5fd0e23cf9 | ||
|
|
9b25669c8f | ||
|
|
4b020671cc | ||
|
|
6222221847 | ||
|
|
6fa215e343 | ||
|
|
a33835415f | ||
|
|
f76c657bd7 | ||
|
|
cceedd6c17 | ||
|
|
8fa1986961 | ||
|
|
8dec59d118 | ||
|
|
c1fac487c7 | ||
|
|
d934bcc5e9 | ||
|
|
fc99bd7aaa | ||
|
|
b6cf73b974 | ||
|
|
6df7c8abf8 | ||
|
|
8eb97a8023 | ||
|
|
cd43449585 | ||
|
|
16c174d624 | ||
|
|
1c02a2208b | ||
|
|
2c93e98755 | ||
|
|
66b179f282 | ||
|
|
4bbaae776c | ||
|
|
e31f313819 | ||
|
|
bd0e33781f | ||
|
|
ade2b844ec | ||
|
|
6f997a6e73 | ||
|
|
744de6aec2 | ||
|
|
ae06de8189 | ||
|
|
1663f6665f | ||
|
|
b005cbe50e | ||
|
|
6c752d59ce | ||
|
|
dbdd0560bf | ||
|
|
aeacd9d8fd | ||
|
|
ded0bff23a | ||
|
|
80ab7caee9 | ||
|
|
516063310a | ||
|
|
c6d72aa781 | ||
|
|
91fa2a2859 | ||
|
|
13e84afcf0 | ||
|
|
88c160d3f8 | ||
|
|
ebd185f633 | ||
|
|
e86bffb720 | ||
|
|
fb65b63639 | ||
|
|
daf7e30ed1 | ||
|
|
dd62ecfbeb | ||
|
|
41cb8cd650 | ||
|
|
b7ad256986 | ||
|
|
f88ffa1893 | ||
|
|
6f604ca765 | ||
|
|
52c6eeae12 | ||
|
|
778f2897bc | ||
|
|
ca7bb77356 | ||
|
|
da8195b795 | ||
|
|
98129720bb | ||
|
|
3c1865c8a3 | ||
|
|
77ac728d47 | ||
|
|
1b5cfa3371 | ||
|
|
590e040958 | ||
|
|
2323d426dd | ||
|
|
9bcc80f2be | ||
|
|
bfde7518fb | ||
|
|
18d466e166 | ||
|
|
a30752d2e9 | ||
|
|
eb18537370 | ||
|
|
aa86445332 | ||
|
|
f1e7bfc377 | ||
|
|
34d524ef51 | ||
|
|
c914d38ff2 | ||
|
|
543b66a6cc | ||
|
|
c046930032 | ||
|
|
12264b6ec0 | ||
|
|
d4b7d77e10 | ||
|
|
7f6cc66eb1 | ||
|
|
532fe10a1a | ||
|
|
b013572644 | ||
|
|
a6a171ef47 | ||
|
|
9e599450f6 | ||
|
|
e31b8b79a4 | ||
|
|
ab5e0afb92 | ||
|
|
2fb89b34b5 | ||
|
|
7ba5ed6347 | ||
|
|
7373b76a8e | ||
|
|
8b1da669bd | ||
|
|
86dafabee9 | ||
|
|
6ba2681cf2 | ||
|
|
45be28a223 | ||
|
|
1c14a3e7d5 | ||
|
|
e4eb4fe67a | ||
|
|
a4fcbfd70a | ||
|
|
5cfb3b14f5 | ||
|
|
b4c6f0a852 | ||
|
|
e66ee9dda6 | ||
|
|
d832be781a | ||
|
|
1d4f25dd45 | ||
|
|
2d05025533 | ||
|
|
63acd224e8 | ||
|
|
00ee716236 | ||
|
|
82c7c290d9 | ||
|
|
3b2c6de384 | ||
|
|
72ceb1046d | ||
|
|
55461a8810 | ||
|
|
2fe12f3f4d | ||
|
|
3c6e8366e1 | ||
|
|
10d74c6a6b | ||
|
|
f5fe9c6c99 | ||
|
|
fab4df338f | ||
|
|
5f50313e3d | ||
|
|
ba1f7781f8 | ||
|
|
4220678feb | ||
|
|
a813379f17 | ||
|
|
4b8223f464 | ||
|
|
c46984b1e1 | ||
|
|
fcb03ff51e | ||
|
|
34ef7e074b | ||
|
|
be1db9626d | ||
|
|
d232023140 | ||
|
|
a5d6b202a9 | ||
|
|
6cf88e319b | ||
|
|
f82503de0e | ||
|
|
f520270864 | ||
|
|
66c7eb0ccb | ||
|
|
52483887f4 | ||
|
|
5195dfa715 | ||
|
|
47699ee0d6 | ||
|
|
b6f1c4e747 | ||
|
|
b3678323ca | ||
|
|
d8a860fb2f | ||
|
|
56e93a3d5f | ||
|
|
1ac1aa8f74 | ||
|
|
79761d9ba7 | ||
|
|
6179306da9 | ||
|
|
8794fc72ed | ||
|
|
20d0d00620 | ||
|
|
9f5e99ab52 | ||
|
|
f4485ba0b5 | ||
|
|
795ea2e384 | ||
|
|
4ba30ea117 | ||
|
|
853af95404 | ||
|
|
cc427cbd8a | ||
|
|
96ea424498 | ||
|
|
0ad4133202 | ||
|
|
b29a187d46 | ||
|
|
adecd707cd | ||
|
|
eba1cbef64 | ||
|
|
ad21de83a9 | ||
|
|
fae0e42722 | ||
|
|
50f702aef9 | ||
|
|
d9c1f2a95c | ||
|
|
ee8bef67ee | ||
|
|
dcc0733b89 | ||
|
|
e154718e90 | ||
|
|
a53adb2df1 | ||
|
|
fe245c31c3 | ||
|
|
ee6bbe3f13 | ||
|
|
f48670018f | ||
|
|
8870a56885 | ||
|
|
8cf9f4b61b | ||
|
|
fea3ae8606 | ||
|
|
2524e08096 | ||
|
|
9754708fc1 | ||
|
|
afe96ff295 | ||
|
|
708cbe5a97 | ||
|
|
65efe20fd2 | ||
|
|
16f737914b | ||
|
|
6b19fbf7d9 | ||
|
|
7b9f7ba605 | ||
|
|
415b5df621 | ||
|
|
0c8896bb6f | ||
|
|
bdcbba1376 | ||
|
|
d070ba5c4e | ||
|
|
c8051bbbc8 |
1
.github/CODEOWNERS
vendored
Normal file
1
.github/CODEOWNERS
vendored
Normal file
@@ -0,0 +1 @@
|
||||
* @itdoginfo
|
||||
74
.github/ISSUE_TEMPLATE/bug_report.yml
vendored
Normal file
74
.github/ISSUE_TEMPLATE/bug_report.yml
vendored
Normal file
@@ -0,0 +1,74 @@
|
||||
---
|
||||
name: 🐛 Сообщение об ошибке
|
||||
description: Создавайте только, если проблема точно не на вашей стороне.
|
||||
title: "[BUG] "
|
||||
labels: ["bug"]
|
||||
assignees: []
|
||||
body:
|
||||
- type: markdown
|
||||
attributes:
|
||||
value: |
|
||||
Спасибо за создание отчета об ошибке!
|
||||
|
||||
Перед отправкой, пожалуйста:
|
||||
- Проверьте [существующие issues](https://github.com/itdoginfo/podkop/issues)
|
||||
- Просмотрите [документацию](https://podkop.net)
|
||||
|
||||
- type: textarea
|
||||
id: description
|
||||
attributes:
|
||||
label: 📝 Описание проблемы
|
||||
description: Четкое и краткое описание того, что не работает
|
||||
placeholder: Опишите проблему
|
||||
validations:
|
||||
required: true
|
||||
|
||||
- type: textarea
|
||||
id: reproduction
|
||||
attributes:
|
||||
label: Шаги для воспроизведения
|
||||
description: Шаги для воспроизведения проблемы. Если вы настраваете что-то по мануалу, приложите ссылку на него.
|
||||
placeholder: |
|
||||
1.
|
||||
2.
|
||||
3.
|
||||
4.
|
||||
validations:
|
||||
required: true
|
||||
|
||||
- type: textarea
|
||||
id: expected
|
||||
attributes:
|
||||
label: ✅ Ожидаемое поведение
|
||||
description: Четкое и краткое описание того, что должно было произойти
|
||||
placeholder: Опишите ожидаемое поведение
|
||||
validations:
|
||||
required: true
|
||||
|
||||
- type: textarea
|
||||
id: environment
|
||||
attributes:
|
||||
label: 🖥️ Информация о системе
|
||||
description: |
|
||||
Информация о вашей системе (заполните всё применимое)
|
||||
value: |
|
||||
- **OpenWrt версия**:
|
||||
- **Podkop версия**:
|
||||
- **Роутер модель**:
|
||||
- **Sing-box версия**:
|
||||
render: markdown
|
||||
validations:
|
||||
required: true
|
||||
|
||||
- type: textarea
|
||||
id: config
|
||||
attributes:
|
||||
label: ⚙️ Конфигурация
|
||||
description: |
|
||||
Релевантные части конфигурации (удалите чувствительную информацию!)
|
||||
placeholder: |
|
||||
Например:
|
||||
- Содержимое /etc/config/podkop
|
||||
- Конфигурация sing-box (если релевантно)
|
||||
- Дополнительные конфиги, которые потребуются wireless/network/dhcp и т.д.
|
||||
render: shell
|
||||
8
.github/ISSUE_TEMPLATE/config.yml
vendored
Normal file
8
.github/ISSUE_TEMPLATE/config.yml
vendored
Normal file
@@ -0,0 +1,8 @@
|
||||
blank_issues_enabled: false
|
||||
contact_links:
|
||||
- name: 💬 Если у вас что-то не работает, прежде всего прочитайте README проекта
|
||||
url: https://github.com/itdoginfo/podkop
|
||||
about: README проекта
|
||||
- name: 📚 Если вы не нашли в README документацию, то вот ссылка на неё
|
||||
url: https://podkop.net
|
||||
about: Официальная документация PodKop
|
||||
68
.github/ISSUE_TEMPLATE/feature_request.yml
vendored
Normal file
68
.github/ISSUE_TEMPLATE/feature_request.yml
vendored
Normal file
@@ -0,0 +1,68 @@
|
||||
---
|
||||
name: ✨ Запрос новой функции
|
||||
description: Предложите новую функцию или улучшение для Podkop
|
||||
title: "[FEATURE] "
|
||||
labels: ["enhancement", "needs-discussion"]
|
||||
assignees: []
|
||||
body:
|
||||
- type: markdown
|
||||
attributes:
|
||||
value: |
|
||||
Спасибо за предложение новой функции!
|
||||
|
||||
Перед отправкой, пожалуйста:
|
||||
- Проверьте [существующие запросы](https://github.com/itdoginfo/podkop/issues?q=is%3Aissue+label%3Aenhancement)
|
||||
- Убедитесь, что функции не существует в [документации](https://podkop.net)
|
||||
|
||||
- type: textarea
|
||||
id: summary
|
||||
attributes:
|
||||
label: Краткое описание
|
||||
description: Краткое описание предлагаемой функции
|
||||
placeholder: В одном предложении опишите, что вы хотите добавить...
|
||||
validations:
|
||||
required: true
|
||||
|
||||
- type: textarea
|
||||
id: problem
|
||||
attributes:
|
||||
label: Проблема, которую решает
|
||||
description: |
|
||||
Описание проблемы или неудобства, которое решит эта функция
|
||||
placeholder: |
|
||||
Сейчас нет возможности [...]
|
||||
validations:
|
||||
required: true
|
||||
|
||||
- type: textarea
|
||||
id: solution
|
||||
attributes:
|
||||
label: 💡 Предлагаемое решение
|
||||
description: Четкое и краткое описание того, что вы хотите реализовать
|
||||
placeholder: |
|
||||
Я хочу, чтобы Podkop мог [...]
|
||||
Предлагаю добавить функцию, которая [...]
|
||||
Можно было бы улучшить [...] путем [...]
|
||||
validations:
|
||||
required: true
|
||||
|
||||
- type: textarea
|
||||
id: alternatives
|
||||
attributes:
|
||||
label: Workaround
|
||||
description: |
|
||||
Опишите альтернативные решения или функции, которые вы рассматривали
|
||||
Есть ли обходные пути, которые вы используете сейчас?
|
||||
placeholder: |
|
||||
Сейчас я решаю это проблему путем [...]
|
||||
Альтернативой могло бы быть [...]
|
||||
Пробовал использовать [...], но это не подходит потому что [...]
|
||||
|
||||
- type: textarea
|
||||
id: implementation
|
||||
attributes:
|
||||
label: Идеи реализации (опционально)
|
||||
description: |
|
||||
Если у вас есть идеи о том, как это можно реализовать, поделитесь ими. Помните про ограничения LuCI.
|
||||
placeholder: |
|
||||
Это можно реализовать с помощью [...]
|
||||
12
.github/pull_request_template.md
vendored
Normal file
12
.github/pull_request_template.md
vendored
Normal file
@@ -0,0 +1,12 @@
|
||||
# Описание изменений
|
||||
|
||||
Краткое описание ваших изменений и их цель.
|
||||
|
||||
## Что изменено
|
||||
|
||||
Детальное описание изменений:
|
||||
-
|
||||
-
|
||||
-
|
||||
|
||||
(Этим вы экономите время ревьювера)
|
||||
24
.github/workflows/build.yml
vendored
24
.github/workflows/build.yml
vendored
@@ -1,5 +1,4 @@
|
||||
name: Build packages
|
||||
|
||||
on:
|
||||
push:
|
||||
tags:
|
||||
@@ -9,15 +8,24 @@ jobs:
|
||||
build:
|
||||
name: Build podkop and luci-app-podkop
|
||||
runs-on: ubuntu-latest
|
||||
|
||||
steps:
|
||||
- uses: actions/checkout@v4.2.1
|
||||
with:
|
||||
fetch-depth: 0
|
||||
|
||||
- name: Extract version
|
||||
id: version
|
||||
run: |
|
||||
VERSION=$(git describe --tags --exact-match 2>/dev/null || echo "dev_$(date +%d%m%Y)")
|
||||
echo "version=$VERSION" >> $GITHUB_OUTPUT
|
||||
|
||||
- name: Build and push
|
||||
uses: docker/build-push-action@v6.9.0
|
||||
with:
|
||||
context: .
|
||||
tags: podkop:ci
|
||||
build-args: |
|
||||
PKG_VERSION=${{ steps.version.outputs.version }}
|
||||
|
||||
- name: Create Docker container
|
||||
run: docker create --name podkop podkop:ci
|
||||
@@ -27,10 +35,20 @@ jobs:
|
||||
docker cp podkop:/builder/bin/packages/x86_64/utilites/. ./bin/
|
||||
docker cp podkop:/builder/bin/packages/x86_64/luci/. ./bin/
|
||||
|
||||
- name: Filter IPK files
|
||||
run: |
|
||||
# Извлекаем версию из тега, убирая префикс 'v'
|
||||
VERSION=${GITHUB_REF#refs/tags/v}
|
||||
|
||||
mkdir -p ./filtered-bin
|
||||
cp ./bin/luci-i18n-podkop-ru_*.ipk "./filtered-bin/luci-i18n-podkop-ru_${VERSION}.ipk"
|
||||
cp ./bin/podkop_*.ipk ./filtered-bin/
|
||||
cp ./bin/luci-app-podkop_*.ipk ./filtered-bin/
|
||||
|
||||
- name: Remove Docker container
|
||||
run: docker rm podkop
|
||||
|
||||
- name: Release
|
||||
uses: softprops/action-gh-release@v2.0.8
|
||||
with:
|
||||
files: ./bin/*.ipk
|
||||
files: ./filtered-bin/*.ipk
|
||||
1
.gitignore
vendored
Normal file
1
.gitignore
vendored
Normal file
@@ -0,0 +1 @@
|
||||
.idea
|
||||
@@ -1,6 +1,7 @@
|
||||
FROM openwrt/sdk:x86_64-v23.05.5
|
||||
FROM itdoginfo/openwrt-sdk:24.10.1
|
||||
|
||||
RUN ./scripts/feeds update -a && mkdir -p /builder/package/feeds/utilites/ && mkdir -p /builder/package/feeds/luci/
|
||||
ARG PKG_VERSION
|
||||
ENV PKG_VERSION=${PKG_VERSION}
|
||||
|
||||
COPY ./podkop /builder/package/feeds/utilites/podkop
|
||||
COPY ./luci-app-podkop /builder/package/feeds/luci/luci-app-podkop
|
||||
|
||||
3
Dockerfile-SDK
Normal file
3
Dockerfile-SDK
Normal file
@@ -0,0 +1,3 @@
|
||||
FROM openwrt/sdk:x86_64-v24.10.1
|
||||
|
||||
RUN ./scripts/feeds update -a && ./scripts/feeds install luci-base && mkdir -p /builder/package/feeds/utilites/ && mkdir -p /builder/package/feeds/luci/
|
||||
211
README.md
211
README.md
@@ -1,190 +1,55 @@
|
||||
Это альфа версия, может не работать. Обсуждение https://t.me/itdogchat - топик Podkop dev
|
||||
# Вещи, которые вам нужно знать перед установкой
|
||||
|
||||
Если у вас установлен Getdomains, то его следует удалить.
|
||||
- Это бета-версия, которая находится в активной разработке. Из версии в версию что-то может меняться.
|
||||
- При возникновении проблем, нужен технически грамотный фидбэк в чат.
|
||||
- При обновлении **обязательно** [сбрасывайте кэш LuCI](https://podkop.net/docs/clear-browser-cache/).
|
||||
- Также при обновлении всегда заходите в конфигурацию и проверяйте свои настройки. Конфигурация может измениться.
|
||||
- Необходимо минимум 25МБ свободного места на роутере. Роутеры с флешками на 16МБ сразу мимо.
|
||||
- При старте программы редактируется конфиг Dnsmasq.
|
||||
- Podkop редактирует конфиг sing-box. Обязательно сохраните ваш конфиг sing-box перед установкой, если он вам нужен.
|
||||
- Информация здесь может быть устаревшей. Все изменения фиксируются в [телеграм-чате](https://t.me/itdogchat/81758/420321).
|
||||
- [Если у вас не что-то не работает.](https://podkop.net/docs/diagnostics/)
|
||||
- Если у вас установлен Getdomains, [его следует удалить](https://github.com/itdoginfo/domain-routing-openwrt?tab=readme-ov-file#%D1%81%D0%BA%D1%80%D0%B8%D0%BF%D1%82-%D0%B4%D0%BB%D1%8F-%D1%83%D0%B4%D0%B0%D0%BB%D0%B5%D0%BD%D0%B8%D1%8F).
|
||||
- Требуется версия OpenWrt 24.10.
|
||||
|
||||
# Удаление GetDomains скриптом
|
||||
```
|
||||
sh <(wget -O - https://raw.githubusercontent.com/itdoginfo/domain-routing-openwrt/refs/heads/master/getdomains-uninstall.sh)
|
||||
```
|
||||
# Документация
|
||||
https://podkop.net/
|
||||
|
||||
Оставляет туннели, зоны, forwarding. А также stubby и dnscrypt. Они не помешают. Конфиг sing-box будет перезаписан в podkop.
|
||||
# Установка Podkop
|
||||
Полная информация в [документации](https://podkop.net/docs/install/)
|
||||
|
||||
# Установка
|
||||
Пакет работает на всех архитектурах.
|
||||
Будет точно работать только на OpenWrt 23.05.
|
||||
|
||||
Нужен dnsmasq-full. В автоматическом режиме ставится сам. Вручную надо поставить [самостоятельно](https://github.com/itdoginfo/podkop/blob/952dd6215a2a83d65937cf9e33534c42809091ed/install.sh#L20).
|
||||
|
||||
## Автоматическая
|
||||
Вкратце, достаточно одного скрипта для установки и обновления:
|
||||
```
|
||||
sh <(wget -O - https://raw.githubusercontent.com/itdoginfo/podkop/refs/heads/main/install.sh)
|
||||
```
|
||||
|
||||
## Вручную
|
||||
Сделать `opkg update`, чтоб установились зависимости.
|
||||
Скачать пакеты `podkop_*.ipk` и `luci-app-podkop_*.ipk` из релиза. `opkg install` сначала первый, потом второй.
|
||||
|
||||
# Удаление
|
||||
```
|
||||
opkg remove luci-app-podkop podkop
|
||||
```
|
||||
|
||||
# Использование
|
||||
Конфиг: /etc/config/podkop
|
||||
|
||||
Luci: Services/podkop
|
||||
|
||||
## Режимы
|
||||
|
||||
### Proxy
|
||||
Для VLESS и Shadowsocks. Другие протоколы тоже будут, кидайте в чат примеры строк без чувствительных данных.
|
||||
Для использования этого режима нужен sing-box:
|
||||
```
|
||||
opkg update && opkg install sing-box
|
||||
```
|
||||
|
||||
В этом режиме просто копируйте строку в **Proxy String** и из неё автоматически настроится sing-box.
|
||||
|
||||
### VPN
|
||||
Здесь у вас должен быть уже настроен WG/OpenVPN/OpenConnect etc, создана Zone и Forwarding.
|
||||
|
||||
Просто выбрать интерфейс из списка.
|
||||
|
||||
## Настройка доменов и подсетей
|
||||
**Domain list enable** - Включить общий список.
|
||||
|
||||
**Delist domains from main list enable** - Выключение заданных доменов из общего списка. Задавать списком.
|
||||
|
||||
**Subnets list enable** - Включить подсети из общего списка, выбрать из предложенных.
|
||||
|
||||
**Custom domains enable** - Добавить свои домены. Задавать списком.
|
||||
|
||||
**Custom subnets enable** - Добавить подсети или IP-адреса. Для подсетей задать маску.
|
||||
|
||||
# Известные баги
|
||||
- [x] Не работает proxy при режимах main vpn, second proxy
|
||||
- [ ] Не всегда отрабатывает ucitrack (применение настроек из luci). Не удаётся повторить
|
||||
|
||||
# ToDo
|
||||
Сделано
|
||||
- [x] Скрипт для автоматической установки.
|
||||
- [x] Подсети дискорда.
|
||||
- [x] Удаление getdomains через скрипт. Кроме туннеля и sing-box.
|
||||
- [x] Дополнительная вкладка для ещё одного туннеля. Домены, подсети.
|
||||
- [x] Улучшение скрипта автоматической установки. Спрашивать про туннели.
|
||||
- [x] Зависимость от dnsmasq-full
|
||||
Этот раздел не означает задачи, которые нужно брать и делать. Это общий список хотелок. Если вы хотите помочь, пожалуйста, спросите сначала в телеграмме.
|
||||
|
||||
Приоритет 1
|
||||
- [x] В nft разделить правило tproxy на маркировку и tproxy
|
||||
- [ ] Нужен дебаг. Restart ucitrack в отдельный скрипт postinst, не отрабатывает.
|
||||
- [x] Весь трафик для устойства пускать в туннель\прокси
|
||||
- [x] Исключение для IP, не ходить в туннель\прокси совсем 0x0
|
||||
- [x] Врубать галочкой yacd в sing-box
|
||||
- [x] Свои списки. Просто список доменов с переносом строки
|
||||
- [x] Свои списки ipv4
|
||||
- [ ] Ntp (порт 123) делать маркировку 0x0. По галке
|
||||
- [ ] Вернуть две цепочки nft
|
||||
Основные задачи в issues.
|
||||
|
||||
Приоритет 2
|
||||
- [ ] Кнопка обновления списка доменов и подсетей
|
||||
- [ ] IPv6
|
||||
- [ ] Придумать автонастройку DNS через stubby итд. Как лучше это реализовать.
|
||||
- [ ] Удаление подсетей CF из domain sets раз в N часов
|
||||
- [ ] Автонастройка wireguard по примеру getdomains
|
||||
- [ ] Автонастройка awg по примеру getdomains
|
||||
## Рефактор
|
||||
- [x] Очевидные повторения в `/usr/bin/podkop` загнать в переменые
|
||||
- [x] Возможно поменять структуру
|
||||
|
||||
Wiki
|
||||
- [ ] Тема
|
||||
- [ ] Изначальное наполнение
|
||||
- [ ] Nginx+acme.sh ansible playbook
|
||||
- [ ] Сборка и деплой через github actions
|
||||
- [ ] Общий мониторинг VM
|
||||
- [ ] Мониторинг tls
|
||||
## Списки
|
||||
- [x] CloudFront
|
||||
- [x] DO
|
||||
- [x] HODCA
|
||||
|
||||
Низкий приоритет
|
||||
- [x] Открытый прокси порт на роутере для браузеров
|
||||
- [ ] Переменная, раз во сколько часов обновлять списки
|
||||
- [ ] Галочка, которая режет доступ к doh серверам
|
||||
## Будущее
|
||||
- [ ] [Подписка](https://github.com/itdoginfo/podkop/issues/118). Здесь нужна реализация, чтоб для каждой секции помимо ручного выбора, был выбор фильтрации по тегу. Например, для main выбираем ключевые слова NL, DE, FI. А для extra секции фильтруем по RU. И создаётся outbound c urltest в которых перечислены outbound из фильтров.
|
||||
- [x] Опция, когда все запросы (с роутера в первую очередь), а не только br-lan идут в прокси. С этим связана #95. Требуется много переделать для nftables.
|
||||
- [ ] Весь трафик в Proxy\VPN. Вопрос, что делать с экстрасекциями в этом случае. FakeIP здесь скорее не нужен, а значит только main секция остаётся. Всё что касается fakeip проверок, придётся выключать в этом режиме.
|
||||
- [x] Поддержка Source format. Нужна расшифровка в json и если присуствуют подсети, заносить их в custom subnet nftset.
|
||||
- [x] Переделывание функции формирования кастомных списков в JSON. Обрабатывать сразу скопом, а не по одному.
|
||||
- [ ] При успешном запуске переходит в фоновый режим и следит за состоянием sing-box. Если вдруг идёт exit 1, выполняется dnsmasq restore и снова следит за состоянием. Вопрос в том, как это искусcтвенно провернуть. Попробовать положить прокси и посмотреть, останется ли работать DNS в этом случае. И здесь, вероятно, можно обойтись триггером в init.d. [Issue](https://github.com/itdoginfo/podkop/issues/111)
|
||||
- [x] Формирование конфига sing-box в /tmp
|
||||
- [ ] Галочка, которая режет доступ к doh серверам.
|
||||
- [ ] IPv6. Только после наполнения Wiki.
|
||||
|
||||
Рефактор
|
||||
- [ ] Формирование json для sing-box на уровне jq, а не шаблонов
|
||||
## Тесты
|
||||
- [ ] Unit тесты (BATS)
|
||||
- [ ] Интеграционые тесты бекенда (OpenWrt rootfs + BATS)
|
||||
- [ ] RU перевод
|
||||
- [ ] Handle для sing-box
|
||||
- [ ] Handle для dnsmasq
|
||||
|
||||
Хз как сделать
|
||||
- [ ] Добавить label от конфига vless\ss\etc в luci. Хз как
|
||||
|
||||
# Разработка
|
||||
Есть два варианта:
|
||||
- Просто поставить пакет на роутер или виртуалку и прям редактировать через SFTP (opkg install openssh-sftp-server)
|
||||
- SDK, чтоб собирать пакеты
|
||||
|
||||
Для сборки пакетов нужен SDK, один из вариантов скачать прям файл и разархивировать
|
||||
https://downloads.openwrt.org/releases/23.05.5/targets/x86/64/
|
||||
Нужен файл с SDK в имени
|
||||
|
||||
```
|
||||
wget https://downloads.openwrt.org/releases/23.05.5/targets/x86/64/openwrt-sdk-23.05.5-x86-64_gcc-12.3.0_musl.Linux-x86_64.tar.xz
|
||||
tar xf openwrt-sdk-23.05.5-x86-64_gcc-12.3.0_musl.Linux-x86_64.tar.xz
|
||||
mv openwrt-sdk-23.05.5-x86-64_gcc-12.3.0_musl.Linux-x86_64 SDK
|
||||
```
|
||||
Последнее для удобства.
|
||||
|
||||
Создаём директорию для пакета
|
||||
```
|
||||
mkdir package/utilites
|
||||
```
|
||||
|
||||
Симлинк из репозитория
|
||||
```
|
||||
ln -s ~/podkop/podkop package/utilites/podkop
|
||||
ln -s ~/podkop/luci-app-podkop package/luci-app-podkop
|
||||
```
|
||||
|
||||
В первый раз для сборки luci-app необходимо обновить пакеты
|
||||
```
|
||||
./scripts/feeds update -a
|
||||
```
|
||||
|
||||
Для make можно добавить флаг -j N, где N - количество ядер для сборки. Первый раз пройдёт быстрее.
|
||||
|
||||
При первом make выводится менюшка, можно просто save, exit и всё. Первый раз долго грузит зависимости.
|
||||
|
||||
Сборка пакета. Сами пакеты собираются быстро.
|
||||
```
|
||||
make package/podkop/{clean,compile} V=s
|
||||
```
|
||||
|
||||
Также для luci
|
||||
```
|
||||
make package/luci-app-podkop/{clean,compile} V=s
|
||||
```
|
||||
|
||||
.ipk лежат в `bin/packages/x86_64/base/`
|
||||
|
||||
## Ошибки
|
||||
```
|
||||
Makefile:17: /SDK/feeds/luci/luci.mk: No such file or directory
|
||||
make[2]: *** No rule to make target '/SDK/feeds/luci/luci.mk'. Stop.
|
||||
time: package/luci/luci-app-podkop/clean#0.00#0.00#0.00
|
||||
ERROR: package/luci/luci-app-podkop failed to build.
|
||||
make[1]: *** [package/Makefile:129: package/luci/luci-app-podkop/clean] Error 1
|
||||
make[1]: Leaving directory '/SDK'
|
||||
make: *** [/SDK/include/toplevel.mk:226: package/luci-app-podkop/clean] Error 2
|
||||
```
|
||||
|
||||
Не загружены пакеты для luci
|
||||
|
||||
## make зависимости
|
||||
https://openwrt.org/docs/guide-developer/toolchain/install-buildsystem
|
||||
|
||||
Ubuntu
|
||||
```
|
||||
sudo apt update
|
||||
sudo apt install build-essential clang flex bison g++ gawk \
|
||||
gcc-multilib g++-multilib gettext git libncurses-dev libssl-dev \
|
||||
python3-distutils rsync unzip zlib1g-dev file wget
|
||||
```
|
||||
[](https://deepwiki.com/itdoginfo/podkop)
|
||||
68
String-example.md
Normal file
68
String-example.md
Normal file
@@ -0,0 +1,68 @@
|
||||
# Shadowsocks
|
||||
Тут всё просто
|
||||
|
||||
## Shadowsocks-old
|
||||
```
|
||||
ss://YWVzLTI1Ni1nY206RmJwUDJnSStPczJKK1kzdkVhTnVuOUZ2ZjJZYUhNUlN1L1BBdEVqMks1VT0@example.com:80?type=tcp#example-ss-old
|
||||
```
|
||||
|
||||
## Shadowsocks-2022
|
||||
```
|
||||
ss://2022-blake3-aes-128-gcm:5NgF%2B9eM8h4OnrTbHp%2B8UA%3D%3D%3Am8tbs5aKLYG7dN9f3xsiKA%3D%3D@example.com:80#example-ss2022
|
||||
```
|
||||
|
||||
```
|
||||
ss://MjAyMi1ibGFrZTMtYWVzLTEyOC1nY206Y21lZklCdDhwMTJaZm1QWUplMnNCNThRd3R3NXNKeVpUV0Z6ZENKV2taOD06eEJHZUxiMWNPTjFIeE9CenF6UlN0VFdhUUh6YWM2cFhRVFNZd2dVV2R1RT0@example.com:81?type=tcp#example-ss2022
|
||||
```
|
||||
Может быть без `?type=tcp`
|
||||
|
||||
# VLESS
|
||||
|
||||
## Reality
|
||||
```
|
||||
vless://8100b6eb-3fd1-4e73-8ccf-b4ac961232d6@example.com:443?type=tcp&security=reality&pbk=ARQzddtXPJZHinwkPbgVpah9uwPTuzdjU9GpbUkQJkc&fp=chrome&sni=sni.server.com&sid=6cabf01472a3&spx=%2F&flow=xtls-rprx-vision#vless-reality
|
||||
```
|
||||
|
||||
```
|
||||
vless://8100b6eb-3fd1-4e73-8ccf-b4ac961232d6@123.123.123.123:2082?security=reality&sni=sni.server.com&alpn=h2,http/1.1&allowInsecure=1&fp=chrome&pbk=ARQzddtXPJZHinwkPbgVpah9uwPTuzdjU9GpbUkQJkc&sid=6cabf01472a3&type=grpc&encryption=none#vless-reality-strange
|
||||
```
|
||||
|
||||
## TLS
|
||||
1.
|
||||
```
|
||||
vless://8100b6eb-3fd1-4e73-8ccf-b4ac961232d6@example.com:443?type=tcp&security=tls&fp=&alpn=h3%2Ch2%2Chttp%2F1.1#vless-tls
|
||||
```
|
||||
|
||||
2.
|
||||
```
|
||||
vless://8100b6eb-3fd1-4e73-8ccf-b4ac961232d6@example.com:443?security=tls&sni=sni.server.com&fp=chrome&type=tcp&flow=xtls-rprx-vision&encryption=none#vless-tls-withot-alpn
|
||||
```
|
||||
3.
|
||||
```
|
||||
vless://8100b6eb-3fd1-4e73-8ccf-b4ac961232d6@example.com:443/?type=ws&encryption=none&path=%2Fwebsocket&security=tls&sni=sni.server.com&fp=chrome#vless-tls-ws
|
||||
```
|
||||
|
||||
4.
|
||||
```
|
||||
vless://8100b6eb-3fd1-4e73-8ccf-b4ac961232d6@example.com:443?security=tls&sni=sni.server.com&type=ws&path=/?ed%3D2560&host=sni.server.com&encryption=none#vless-tls-ws-2
|
||||
```
|
||||
|
||||
5.
|
||||
```
|
||||
vless://8100b6eb-3fd1-4e73-8ccf-b4ac961232d6@example.com:443?security=tls&sni=sni.server.com&fp=chrome&type=ws&path=/websocket&encryption=none#vless-tls-ws-3
|
||||
```
|
||||
|
||||
6.
|
||||
```
|
||||
vless://8100b6eb-3fd1-4e73-8ccf-b4ac961232d6@example.com:443/?type=ws&encryption=none&path=%2Fwebsocket&security=tls&sni=sni.server.com&fp=chrome#vless-tls-ws-4
|
||||
```
|
||||
|
||||
7.
|
||||
```
|
||||
vless://8100b6eb-3fd1-4e73-8ccf-b4ac961232d6@sub.example.com:443?type=ws&path=%2Fdir%2Fpath&host=sub.example.com&security=tls#configname
|
||||
```
|
||||
|
||||
## No security
|
||||
```
|
||||
vless://8100b6eb-3fd1-4e73-8ccf-b4ac961232d6@example.com:443?type=tcp&security=none#vless-tls-no-encrypt
|
||||
```
|
||||
215
install.sh
215
install.sh
@@ -1,83 +1,172 @@
|
||||
#!/bin/sh
|
||||
|
||||
REPO="https://api.github.com/repos/itdoginfo/podkop/releases/latest"
|
||||
|
||||
DOWNLOAD_DIR="/tmp/podkop"
|
||||
COUNT=3
|
||||
|
||||
rm -rf "$DOWNLOAD_DIR"
|
||||
mkdir -p "$DOWNLOAD_DIR"
|
||||
|
||||
wget -qO- "$REPO" | grep -o 'https://[^"]*\.ipk' | while read -r url; do
|
||||
filename=$(basename "$url")
|
||||
echo "Download $filename..."
|
||||
wget -q -O "$DOWNLOAD_DIR/$filename" "$url"
|
||||
done
|
||||
msg() {
|
||||
printf "\033[32;1m%s\033[0m\n" "$1"
|
||||
}
|
||||
|
||||
echo "opkg update"
|
||||
opkg update
|
||||
main() {
|
||||
check_system
|
||||
sing_box
|
||||
|
||||
if opkg list-installed | grep -q dnsmasq-full; then
|
||||
echo "dnsmasq-full already installed"
|
||||
else
|
||||
echo "Installed dnsmasq-full"
|
||||
cd /tmp/ && opkg download dnsmasq-full
|
||||
opkg remove dnsmasq && opkg install dnsmasq-full --cache /tmp/
|
||||
/usr/sbin/ntpd -q -p 194.190.168.1 -p 216.239.35.0 -p 216.239.35.4 -p 162.159.200.1 -p 162.159.200.123
|
||||
|
||||
[ -f /etc/config/dhcp-opkg ] && cp /etc/config/dhcp /etc/config/dhcp-old && mv /etc/config/dhcp-opkg /etc/config/dhcp
|
||||
fi
|
||||
opkg update || { echo "opkg update failed"; exit 1; }
|
||||
|
||||
if [ -f "/etc/init.d/podkop" ]; then
|
||||
msg "Podkop is already installed. Upgraded..."
|
||||
else
|
||||
msg "Installed podkop..."
|
||||
fi
|
||||
|
||||
if command -v curl &> /dev/null; then
|
||||
check_response=$(curl -s "https://api.github.com/repos/itdoginfo/podkop/releases/latest")
|
||||
|
||||
echo "What type of VPN or proxy will be used?"
|
||||
echo "1) VLESS, Shadowsocks (A sing-box will be installed)"
|
||||
echo "2) Wireguard"
|
||||
echo "3) AmneziaWG"
|
||||
echo "4) OpenVPN"
|
||||
echo "5) OpenConnect"
|
||||
echo "6) Skip this step"
|
||||
if echo "$check_response" | grep -q 'API rate limit '; then
|
||||
msg "You've reached rate limit from GitHub. Repeat in five minutes."
|
||||
exit 1
|
||||
fi
|
||||
fi
|
||||
|
||||
while true; do
|
||||
read -r -p '' TUNNEL
|
||||
case $TUNNEL in
|
||||
download_success=0
|
||||
while read -r url; do
|
||||
filename=$(basename "$url")
|
||||
filepath="$DOWNLOAD_DIR/$filename"
|
||||
|
||||
attempt=0
|
||||
while [ $attempt -lt $COUNT ]; do
|
||||
msg "Download $filename (count $((attempt+1)))..."
|
||||
if wget -q -O "$filepath" "$url"; then
|
||||
if [ -s "$filepath" ]; then
|
||||
msg "$filename successfully downloaded"
|
||||
download_success=1
|
||||
break
|
||||
fi
|
||||
fi
|
||||
msg "Download error $filename. Retry..."
|
||||
rm -f "$filepath"
|
||||
attempt=$((attempt+1))
|
||||
done
|
||||
|
||||
if [ $attempt -eq $COUNT ]; then
|
||||
msg "Failed to download $filename after $COUNT attempts"
|
||||
fi
|
||||
done < <(wget -qO- "$REPO" | grep -o 'https://[^"[:space:]]*\.ipk')
|
||||
|
||||
if [ $download_success -eq 0 ]; then
|
||||
msg "No packages were downloaded successfully"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
for pkg in podkop luci-app-podkop; do
|
||||
file=$(ls "$DOWNLOAD_DIR" | grep "^$pkg" | head -n 1)
|
||||
if [ -n "$file" ]; then
|
||||
msg "Installing $file"
|
||||
opkg install "$DOWNLOAD_DIR/$file"
|
||||
sleep 3
|
||||
fi
|
||||
done
|
||||
|
||||
1)
|
||||
opkg install sing-box
|
||||
break
|
||||
;;
|
||||
ru=$(ls "$DOWNLOAD_DIR" | grep "luci-i18n-podkop-ru" | head -n 1)
|
||||
if [ -n "$ru" ]; then
|
||||
if opkg list-installed | grep -q luci-i18n-podkop-ru; then
|
||||
msg "Upgraded ru translation..."
|
||||
opkg remove luci-i18n-podkop*
|
||||
opkg install "$DOWNLOAD_DIR/$ru"
|
||||
else
|
||||
msg "Русский язык интерфейса ставим? y/n (Need a Russian translation?)"
|
||||
while true; do
|
||||
read -r -p '' RUS
|
||||
case $RUS in
|
||||
y)
|
||||
opkg remove luci-i18n-podkop*
|
||||
opkg install "$DOWNLOAD_DIR/$ru"
|
||||
break
|
||||
;;
|
||||
n)
|
||||
break
|
||||
;;
|
||||
*)
|
||||
echo "Введите y или n"
|
||||
;;
|
||||
esac
|
||||
done
|
||||
fi
|
||||
fi
|
||||
|
||||
2)
|
||||
opkg install wireguard-tools luci-proto-wireguard luci-app-wireguard
|
||||
printf "\e[1;32mUse these instructions to configure https://itdog.info/nastrojka-klienta-wireguard-na-openwrt/\e[0m\n"
|
||||
break
|
||||
;;
|
||||
find "$DOWNLOAD_DIR" -type f -name '*podkop*' -exec rm {} \;
|
||||
}
|
||||
|
||||
3)
|
||||
echo "As long as it's not automated"
|
||||
printf "\e[1;32mUse script from here https://github.com/Slava-Shchipunov/awg-openwrt\e[0m\n"
|
||||
break
|
||||
;;
|
||||
check_system() {
|
||||
# Get router model
|
||||
MODEL=$(cat /tmp/sysinfo/model)
|
||||
msg "Router model: $MODEL"
|
||||
|
||||
4)
|
||||
opkg install opkg install openvpn-openssl luci-app-openvpn
|
||||
printf "\e[1;32mUse these instructions to configure https://itdog.info/nastrojka-klienta-openvpn-na-openwrt/\e[0m\n"
|
||||
break
|
||||
;;
|
||||
# Check OpenWrt version
|
||||
openwrt_version=$(cat /etc/openwrt_release | grep DISTRIB_RELEASE | cut -d"'" -f2 | cut -d'.' -f1)
|
||||
if [ "$openwrt_version" = "23" ]; then
|
||||
msg "OpenWrt 23.05 не поддерживается начиная с podkop 0.5.0"
|
||||
msg "Для OpenWrt 23.05 используйте podkop версии 0.4.11 или устанавливайте зависимости и podkop вручную"
|
||||
msg "Подробности: https://podkop.net/docs/install/#%d1%83%d1%81%d1%82%d0%b0%d0%bd%d0%be%d0%b2%d0%ba%d0%b0-%d0%bd%d0%b0-2305"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
5)
|
||||
opkg install opkg install openconnect luci-proto-openconnect
|
||||
printf "\e[1;32mUse these instructions to configure https://itdog.info/nastrojka-klienta-openconnect-na-openwrt/\e[0m\n"
|
||||
break
|
||||
;;
|
||||
# Check available space
|
||||
AVAILABLE_SPACE=$(df /overlay | awk 'NR==2 {print $4}')
|
||||
REQUIRED_SPACE=15360 # 15MB in KB
|
||||
|
||||
6)
|
||||
echo "Skip"
|
||||
break
|
||||
;;
|
||||
if [ "$AVAILABLE_SPACE" -lt "$REQUIRED_SPACE" ]; then
|
||||
msg "Error: Insufficient space in flash"
|
||||
msg "Available: $((AVAILABLE_SPACE/1024))MB"
|
||||
msg "Required: $((REQUIRED_SPACE/1024))MB"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
*)
|
||||
echo "Choose from the following options"
|
||||
;;
|
||||
esac
|
||||
done
|
||||
if ! nslookup google.com >/dev/null 2>&1; then
|
||||
msg "DNS not working"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
echo "Installed podkop..."
|
||||
opkg install $DOWNLOAD_DIR/podkop*.ipk
|
||||
opkg install $DOWNLOAD_DIR/luci-app-podkop*.ipk
|
||||
if opkg list-installed | grep -q https-dns-proxy; then
|
||||
msg "Сonflicting package detected: https-dns-proxy. Remove?"
|
||||
|
||||
rm -f $DOWNLOAD_DIR/podkop*.ipk $DOWNLOAD_DIR/luci-app-podkop*.ipk
|
||||
while true; do
|
||||
read -r -p '' DNSPROXY
|
||||
case $DNSPROXY in
|
||||
|
||||
yes|y|Y|yes)
|
||||
opkg remove --force-depends luci-app-https-dns-proxy https-dns-proxy luci-i18n-https-dns-proxy*
|
||||
break
|
||||
;;
|
||||
*)
|
||||
msg "Exit"
|
||||
exit 1
|
||||
;;
|
||||
esac
|
||||
done
|
||||
fi
|
||||
}
|
||||
|
||||
sing_box() {
|
||||
if ! opkg list-installed | grep -q "^sing-box"; then
|
||||
return
|
||||
fi
|
||||
|
||||
sing_box_version=$(sing-box version | head -n 1 | awk '{print $3}')
|
||||
required_version="1.12.4"
|
||||
|
||||
if [ "$(echo -e "$sing_box_version\n$required_version" | sort -V | head -n 1)" != "$required_version" ]; then
|
||||
msg "sing-box version $sing_box_version is older than required $required_version"
|
||||
msg "Removing old version..."
|
||||
service podkop stop
|
||||
opkg remove sing-box --force-depends
|
||||
fi
|
||||
}
|
||||
|
||||
main
|
||||
|
||||
@@ -1,19 +1,22 @@
|
||||
# See /LICENSE for more information.
|
||||
# This is free software, licensed under the GNU General Public License v2.
|
||||
|
||||
include $(TOPDIR)/rules.mk
|
||||
|
||||
PKG_NAME:=luci-app-podkop
|
||||
PKG_VERSION:=0.1.8
|
||||
|
||||
PKG_VERSION := $(if $(PKG_VERSION),$(PKG_VERSION),dev_$(shell date +%d%m%Y))
|
||||
|
||||
PKG_RELEASE:=1
|
||||
|
||||
LUCI_TITLE:=LuCI podkop app
|
||||
LUCI_DEPENDS:=+luci-base +podkop
|
||||
LUCI_PKGARCH:=all
|
||||
LUCI_LANG.ru:=Русский (Russian)
|
||||
LUCI_LANG.en:=English
|
||||
|
||||
PKG_LICENSE:=GPL-2.0-or-later
|
||||
PKG_MAINTAINER:=ITDog <podkop@itdog.info>
|
||||
|
||||
LUCI_LANGUAGES:=en ru
|
||||
|
||||
include $(TOPDIR)/feeds/luci/luci.mk
|
||||
|
||||
# call BuildPackage - OpenWrt buildroot signature
|
||||
@@ -0,0 +1,230 @@
|
||||
'use strict';
|
||||
'require form';
|
||||
'require baseclass';
|
||||
'require view.podkop.constants as constants';
|
||||
'require tools.widgets as widgets';
|
||||
|
||||
function createAdditionalSection(mainSection, network) {
|
||||
let o = mainSection.tab('additional', _('Additional Settings'));
|
||||
|
||||
o = mainSection.taboption('additional', form.Flag, 'yacd', _('Yacd enable'), '<a href="http://openwrt.lan:9090/ui" target="_blank">openwrt.lan:9090/ui</a>');
|
||||
o.default = '0';
|
||||
o.rmempty = false;
|
||||
o.ucisection = 'main';
|
||||
|
||||
o = mainSection.taboption('additional', form.Flag, 'exclude_ntp', _('Exclude NTP'), _('Allows you to exclude NTP protocol traffic from the tunnel'));
|
||||
o.default = '0';
|
||||
o.rmempty = false;
|
||||
o.ucisection = 'main';
|
||||
|
||||
o = mainSection.taboption('additional', form.Flag, 'quic_disable', _('QUIC disable'), _('For issues with the video stream'));
|
||||
o.default = '0';
|
||||
o.rmempty = false;
|
||||
o.ucisection = 'main';
|
||||
|
||||
o = mainSection.taboption('additional', form.ListValue, 'update_interval', _('List Update Frequency'), _('Select how often the lists will be updated'));
|
||||
Object.entries(constants.UPDATE_INTERVAL_OPTIONS).forEach(([key, label]) => {
|
||||
o.value(key, _(label));
|
||||
});
|
||||
o.default = '1d';
|
||||
o.rmempty = false;
|
||||
o.ucisection = 'main';
|
||||
|
||||
o = mainSection.taboption('additional', form.ListValue, 'dns_type', _('DNS Protocol Type'), _('Select DNS protocol to use'));
|
||||
o.value('doh', _('DNS over HTTPS (DoH)'));
|
||||
o.value('dot', _('DNS over TLS (DoT)'));
|
||||
o.value('udp', _('UDP (Unprotected DNS)'));
|
||||
o.default = 'udp';
|
||||
o.rmempty = false;
|
||||
o.ucisection = 'main';
|
||||
|
||||
o = mainSection.taboption('additional', form.Value, 'dns_server', _('DNS Server'), _('Select or enter DNS server address'));
|
||||
Object.entries(constants.DNS_SERVER_OPTIONS).forEach(([key, label]) => {
|
||||
o.value(key, _(label));
|
||||
});
|
||||
o.default = '8.8.8.8';
|
||||
o.rmempty = false;
|
||||
o.ucisection = 'main';
|
||||
o.validate = function (section_id, value) {
|
||||
if (!value) {
|
||||
return _('DNS server address cannot be empty');
|
||||
}
|
||||
|
||||
const ipRegex = /^((25[0-5]|(2[0-4]|1\d|[1-9]|)\d)\.?\b){4}(:[0-9]{1,5})?$/;
|
||||
const domainRegex = /^(?:https:\/\/)?([a-zA-Z0-9]+(-[a-zA-Z0-9]+)*\.)+[a-zA-Z]{2,63}(:[0-9]{1,5})?(\/[^?#\s]*)?$/;
|
||||
|
||||
if (!ipRegex.test(value) && !domainRegex.test(value)) {
|
||||
return _('Invalid DNS server format. Examples: 8.8.8.8 or dns.example.com or dns.example.com/nicedns for DoH');
|
||||
}
|
||||
|
||||
return true;
|
||||
};
|
||||
|
||||
o = mainSection.taboption('additional', form.Value, 'bootstrap_dns_server', _('Bootstrap DNS server'), _('The DNS server used to look up the IP address of an upstream DNS server'));
|
||||
o.value('77.88.8.8', '77.88.8.8 (Yandex DNS)');
|
||||
o.value('77.88.8.1', '77.88.8.1 (Yandex DNS)');
|
||||
o.value('1.1.1.1', '1.1.1.1 (Cloudflare DNS)');
|
||||
o.value('1.0.0.1', '1.0.0.1 (Cloudflare DNS)');
|
||||
o.value('8.8.8.8', '8.8.8.8 (Google DNS)');
|
||||
o.value('8.8.4.4', '8.8.4.4 (Google DNS)');
|
||||
o.value('9.9.9.9', '9.9.9.9 (Quad9 DNS)');
|
||||
o.value('9.9.9.11', '9.9.9.11 (Quad9 DNS)');
|
||||
o.default = '77.88.8.8';
|
||||
o.rmempty = false;
|
||||
o.ucisection = 'main';
|
||||
o.validate = function (section_id, value) {
|
||||
if (!value) {
|
||||
return _('DNS server address cannot be empty');
|
||||
}
|
||||
|
||||
const ipRegex = /^((25[0-5]|(2[0-4]|1\d|[1-9]|)\d)\.?\b){4}(:[0-9]{1,5})?$/;
|
||||
|
||||
if (!ipRegex.test(value)) {
|
||||
return _('Invalid DNS server format. Example: 8.8.8.8');
|
||||
}
|
||||
|
||||
return true;
|
||||
};
|
||||
|
||||
o = mainSection.taboption('additional', form.Value, 'dns_rewrite_ttl', _('DNS Rewrite TTL'), _('Time in seconds for DNS record caching (default: 60)'));
|
||||
o.default = '60';
|
||||
o.rmempty = false;
|
||||
o.ucisection = 'main';
|
||||
o.validate = function (section_id, value) {
|
||||
if (!value) {
|
||||
return _('TTL value cannot be empty');
|
||||
}
|
||||
|
||||
const ttl = parseInt(value);
|
||||
if (isNaN(ttl) || ttl < 0) {
|
||||
return _('TTL must be a positive number');
|
||||
}
|
||||
|
||||
return true;
|
||||
};
|
||||
|
||||
o = mainSection.taboption('additional', form.ListValue, 'config_path', _('Config File Path'), _('Select path for sing-box config file. Change this ONLY if you know what you are doing'));
|
||||
o.value('/etc/sing-box/config.json', 'Flash (/etc/sing-box/config.json)');
|
||||
o.value('/tmp/sing-box/config.json', 'RAM (/tmp/sing-box/config.json)');
|
||||
o.default = '/etc/sing-box/config.json';
|
||||
o.rmempty = false;
|
||||
o.ucisection = 'main';
|
||||
|
||||
o = mainSection.taboption('additional', form.Value, 'cache_path', _('Cache File Path'), _('Select or enter path for sing-box cache file. Change this ONLY if you know what you are doing'));
|
||||
o.value('/tmp/sing-box/cache.db', 'RAM (/tmp/sing-box/cache.db)');
|
||||
o.value('/usr/share/sing-box/cache.db', 'Flash (/usr/share/sing-box/cache.db)');
|
||||
o.default = '/tmp/sing-box/cache.db';
|
||||
o.rmempty = false;
|
||||
o.ucisection = 'main';
|
||||
o.validate = function (section_id, value) {
|
||||
if (!value) {
|
||||
return _('Cache file path cannot be empty');
|
||||
}
|
||||
|
||||
if (!value.startsWith('/')) {
|
||||
return _('Path must be absolute (start with /)');
|
||||
}
|
||||
|
||||
if (!value.endsWith('cache.db')) {
|
||||
return _('Path must end with cache.db');
|
||||
}
|
||||
|
||||
const parts = value.split('/').filter(Boolean);
|
||||
if (parts.length < 2) {
|
||||
return _('Path must contain at least one directory (like /tmp/cache.db)');
|
||||
}
|
||||
|
||||
return true;
|
||||
};
|
||||
|
||||
o = mainSection.taboption('additional', widgets.DeviceSelect, 'iface', _('Source Network Interface'), _('Select the network interface from which the traffic will originate'));
|
||||
o.ucisection = 'main';
|
||||
o.default = 'br-lan';
|
||||
o.noaliases = true;
|
||||
o.nobridges = false;
|
||||
o.noinactive = false;
|
||||
o.multiple = true;
|
||||
o.filter = function (section_id, value) {
|
||||
if (['wan', 'phy0-ap0', 'phy1-ap0', 'pppoe-wan'].indexOf(value) !== -1) {
|
||||
return false;
|
||||
}
|
||||
|
||||
var device = this.devices.filter(function (dev) {
|
||||
return dev.getName() === value;
|
||||
})[0];
|
||||
|
||||
if (device) {
|
||||
var type = device.getType();
|
||||
return type !== 'wifi' && type !== 'wireless' && !type.includes('wlan');
|
||||
}
|
||||
|
||||
return true;
|
||||
};
|
||||
|
||||
o = mainSection.taboption('additional', form.Flag, 'mon_restart_ifaces', _('Interface monitoring'), _('Interface monitoring for bad WAN'));
|
||||
o.default = '0';
|
||||
o.rmempty = false;
|
||||
o.ucisection = 'main';
|
||||
|
||||
o = mainSection.taboption('additional', widgets.NetworkSelect, 'restart_ifaces', _('Interface for monitoring'), _('Select the WAN interfaces to be monitored'));
|
||||
o.ucisection = 'main';
|
||||
o.depends('mon_restart_ifaces', '1');
|
||||
o.multiple = true;
|
||||
o.filter = function (section_id, value) {
|
||||
return ['lan', 'loopback'].indexOf(value) === -1 && !value.startsWith('@');
|
||||
};
|
||||
|
||||
o = mainSection.taboption('additional', form.Value, 'procd_reload_delay', _('Interface Monitoring Delay'), _('Delay in milliseconds before reloading podkop after interface UP'));
|
||||
o.ucisection = 'main';
|
||||
o.depends('mon_restart_ifaces', '1');
|
||||
o.default = '2000';
|
||||
o.rmempty = false;
|
||||
o.validate = function (section_id, value) {
|
||||
if (!value) {
|
||||
return _('Delay value cannot be empty');
|
||||
}
|
||||
return true;
|
||||
};
|
||||
|
||||
o = mainSection.taboption('additional', form.Flag, 'dont_touch_dhcp', _('Dont touch my DHCP!'), _('Podkop will not change the DHCP config'));
|
||||
o.default = '0';
|
||||
o.rmempty = false;
|
||||
o.ucisection = 'main';
|
||||
|
||||
o = mainSection.taboption('additional', form.Flag, 'detour', _('Proxy download of lists'), _('Downloading all lists via main Proxy/VPN'));
|
||||
o.default = '0';
|
||||
o.rmempty = false;
|
||||
o.ucisection = 'main';
|
||||
|
||||
// Extra IPs and exclusions (main section)
|
||||
o = mainSection.taboption('basic', form.Flag, 'exclude_from_ip_enabled', _('IP for exclusion'), _('Specify local IP addresses that will never use the configured route'));
|
||||
o.default = '0';
|
||||
o.rmempty = false;
|
||||
o.ucisection = 'main';
|
||||
|
||||
o = mainSection.taboption('basic', form.DynamicList, 'exclude_traffic_ip', _('Local IPs'), _('Enter valid IPv4 addresses'));
|
||||
o.placeholder = 'IP';
|
||||
o.depends('exclude_from_ip_enabled', '1');
|
||||
o.rmempty = false;
|
||||
o.ucisection = 'main';
|
||||
o.validate = function (section_id, value) {
|
||||
if (!value || value.length === 0) return true;
|
||||
const ipRegex = /^(\d{1,3}\.){3}\d{1,3}$/;
|
||||
if (!ipRegex.test(value)) return _('Invalid IP format. Use format: X.X.X.X (like 192.168.1.1)');
|
||||
const ipParts = value.split('.');
|
||||
for (const part of ipParts) {
|
||||
const num = parseInt(part);
|
||||
if (num < 0 || num > 255) return _('IP address parts must be between 0 and 255');
|
||||
}
|
||||
return true;
|
||||
};
|
||||
|
||||
o = mainSection.taboption('basic', form.Flag, 'socks5', _('Mixed enable'), _('Browser port: 2080'));
|
||||
o.default = '0';
|
||||
o.rmempty = false;
|
||||
o.ucisection = 'main';
|
||||
}
|
||||
|
||||
return baseclass.extend({
|
||||
createAdditionalSection
|
||||
});
|
||||
@@ -0,0 +1,594 @@
|
||||
'use strict';
|
||||
'require baseclass';
|
||||
'require form';
|
||||
'require ui';
|
||||
'require network';
|
||||
'require view.podkop.constants as constants';
|
||||
'require tools.widgets as widgets';
|
||||
|
||||
function validateUrl(url, protocols = ['http:', 'https:']) {
|
||||
try {
|
||||
const parsedUrl = new URL(url);
|
||||
if (!protocols.includes(parsedUrl.protocol)) {
|
||||
return _('URL must use one of the following protocols: ') + protocols.join(', ');
|
||||
}
|
||||
return true;
|
||||
} catch (e) {
|
||||
return _('Invalid URL format');
|
||||
}
|
||||
}
|
||||
|
||||
function createConfigSection(section, map, network) {
|
||||
const s = section;
|
||||
|
||||
let o = s.tab('basic', _('Basic Settings'));
|
||||
|
||||
o = s.taboption('basic', form.ListValue, 'mode', _('Connection Type'), _('Select between VPN and Proxy connection methods for traffic routing'));
|
||||
o.value('proxy', ('Proxy'));
|
||||
o.value('vpn', ('VPN'));
|
||||
o.value('block', ('Block'));
|
||||
o.ucisection = s.section;
|
||||
|
||||
o = s.taboption('basic', form.ListValue, 'proxy_config_type', _('Configuration Type'), _('Select how to configure the proxy'));
|
||||
o.value('url', _('Connection URL'));
|
||||
o.value('outbound', _('Outbound Config'));
|
||||
o.value('urltest', _('URLTest'));
|
||||
o.default = 'url';
|
||||
o.depends('mode', 'proxy');
|
||||
o.ucisection = s.section;
|
||||
|
||||
o = s.taboption('basic', form.TextValue, 'proxy_string', _('Proxy Configuration URL'), '');
|
||||
o.depends('proxy_config_type', 'url');
|
||||
o.rows = 5;
|
||||
o.rmempty = false;
|
||||
o.ucisection = s.section;
|
||||
o.sectionDescriptions = new Map();
|
||||
o.placeholder = 'vless://uuid@server:port?type=tcp&security=tls#main\n// backup ss://method:pass@server:port\n// backup2 vless://uuid@server:port?type=grpc&security=reality#alt';
|
||||
|
||||
o.renderWidget = function (section_id, option_index, cfgvalue) {
|
||||
const original = form.TextValue.prototype.renderWidget.apply(this, [section_id, option_index, cfgvalue]);
|
||||
const container = E('div', {});
|
||||
container.appendChild(original);
|
||||
|
||||
if (cfgvalue) {
|
||||
try {
|
||||
const activeConfig = cfgvalue.split('\n')
|
||||
.map(line => line.trim())
|
||||
.find(line => line && !line.startsWith('//'));
|
||||
|
||||
if (activeConfig) {
|
||||
if (activeConfig.includes('#')) {
|
||||
const label = activeConfig.split('#').pop();
|
||||
if (label && label.trim()) {
|
||||
const decodedLabel = decodeURIComponent(label);
|
||||
const descDiv = E('div', { 'class': 'cbi-value-description' }, _('Current config: ') + decodedLabel);
|
||||
container.appendChild(descDiv);
|
||||
} else {
|
||||
const descDiv = E('div', { 'class': 'cbi-value-description' }, _('Config without description'));
|
||||
container.appendChild(descDiv);
|
||||
}
|
||||
} else {
|
||||
const descDiv = E('div', { 'class': 'cbi-value-description' }, _('Config without description'));
|
||||
container.appendChild(descDiv);
|
||||
}
|
||||
}
|
||||
} catch (e) {
|
||||
console.error('Error parsing config label:', e);
|
||||
const descDiv = E('div', { 'class': 'cbi-value-description' }, _('Config without description'));
|
||||
container.appendChild(descDiv);
|
||||
}
|
||||
} else {
|
||||
const defaultDesc = E('div', { 'class': 'cbi-value-description' },
|
||||
_('Enter connection string starting with vless:// or ss:// for proxy configuration. Add comments with // for backup configs'));
|
||||
container.appendChild(defaultDesc);
|
||||
}
|
||||
|
||||
return container;
|
||||
};
|
||||
|
||||
o.validate = function (section_id, value) {
|
||||
if (!value || value.length === 0) {
|
||||
return true;
|
||||
}
|
||||
|
||||
try {
|
||||
const activeConfig = value.split('\n')
|
||||
.map(line => line.trim())
|
||||
.find(line => line && !line.startsWith('//'));
|
||||
|
||||
if (!activeConfig) {
|
||||
return _('No active configuration found. At least one non-commented line is required.');
|
||||
}
|
||||
|
||||
if (!activeConfig.startsWith('vless://') && !activeConfig.startsWith('ss://')) {
|
||||
return _('URL must start with vless:// or ss://');
|
||||
}
|
||||
|
||||
if (activeConfig.startsWith('ss://')) {
|
||||
let encrypted_part;
|
||||
try {
|
||||
let mainPart = activeConfig.includes('?') ? activeConfig.split('?')[0] : activeConfig.split('#')[0];
|
||||
encrypted_part = mainPart.split('/')[2].split('@')[0];
|
||||
try {
|
||||
let decoded = atob(encrypted_part);
|
||||
if (!decoded.includes(':')) {
|
||||
if (!encrypted_part.includes(':') && !encrypted_part.includes('-')) {
|
||||
return _('Invalid Shadowsocks URL format: missing method and password separator ":"');
|
||||
}
|
||||
}
|
||||
} catch (e) {
|
||||
if (!encrypted_part.includes(':') && !encrypted_part.includes('-')) {
|
||||
return _('Invalid Shadowsocks URL format: missing method and password separator ":"');
|
||||
}
|
||||
}
|
||||
} catch (e) {
|
||||
return _('Invalid Shadowsocks URL format');
|
||||
}
|
||||
|
||||
try {
|
||||
let serverPart = activeConfig.split('@')[1];
|
||||
if (!serverPart) return _('Invalid Shadowsocks URL: missing server address');
|
||||
let [server, portAndRest] = serverPart.split(':');
|
||||
if (!server) return _('Invalid Shadowsocks URL: missing server');
|
||||
let port = portAndRest ? portAndRest.split(/[?#]/)[0] : null;
|
||||
if (!port) return _('Invalid Shadowsocks URL: missing port');
|
||||
let portNum = parseInt(port);
|
||||
if (isNaN(portNum) || portNum < 1 || portNum > 65535) {
|
||||
return _('Invalid port number. Must be between 1 and 65535');
|
||||
}
|
||||
} catch (e) {
|
||||
return _('Invalid Shadowsocks URL: missing or invalid server/port format');
|
||||
}
|
||||
}
|
||||
|
||||
if (activeConfig.startsWith('vless://')) {
|
||||
let uuid = activeConfig.split('/')[2].split('@')[0];
|
||||
if (!uuid || uuid.length === 0) return _('Invalid VLESS URL: missing UUID');
|
||||
|
||||
try {
|
||||
let serverPart = activeConfig.split('@')[1];
|
||||
if (!serverPart) return _('Invalid VLESS URL: missing server address');
|
||||
let [server, portAndRest] = serverPart.split(':');
|
||||
if (!server) return _('Invalid VLESS URL: missing server');
|
||||
let port = portAndRest ? portAndRest.split(/[/?#]/)[0] : null;
|
||||
if (!port) return _('Invalid VLESS URL: missing port');
|
||||
let portNum = parseInt(port);
|
||||
if (isNaN(portNum) || portNum < 1 || portNum > 65535) {
|
||||
return _('Invalid port number. Must be between 1 and 65535');
|
||||
}
|
||||
} catch (e) {
|
||||
return _('Invalid VLESS URL: missing or invalid server/port format');
|
||||
}
|
||||
|
||||
let queryString = activeConfig.split('?')[1];
|
||||
if (!queryString) return _('Invalid VLESS URL: missing query parameters');
|
||||
|
||||
let params = new URLSearchParams(queryString.split('#')[0]);
|
||||
let type = params.get('type');
|
||||
const validTypes = ['tcp', 'raw', 'udp', 'grpc', 'http', 'ws'];
|
||||
if (!type || !validTypes.includes(type)) {
|
||||
return _('Invalid VLESS URL: type must be one of tcp, raw, udp, grpc, http, ws');
|
||||
}
|
||||
|
||||
let security = params.get('security');
|
||||
const validSecurities = ['tls', 'reality', 'none'];
|
||||
if (!security || !validSecurities.includes(security)) {
|
||||
return _('Invalid VLESS URL: security must be one of tls, reality, none');
|
||||
}
|
||||
|
||||
if (security === 'reality') {
|
||||
if (!params.get('pbk')) return _('Invalid VLESS URL: missing pbk parameter for reality security');
|
||||
if (!params.get('fp')) return _('Invalid VLESS URL: missing fp parameter for reality security');
|
||||
}
|
||||
}
|
||||
|
||||
return true;
|
||||
} catch (e) {
|
||||
console.error('Validation error:', e);
|
||||
return _('Invalid URL format: ') + e.message;
|
||||
}
|
||||
};
|
||||
|
||||
o = s.taboption('basic', form.TextValue, 'outbound_json', _('Outbound Configuration'), _('Enter complete outbound configuration in JSON format'));
|
||||
o.depends('proxy_config_type', 'outbound');
|
||||
o.rows = 10;
|
||||
o.ucisection = s.section;
|
||||
o.validate = function (section_id, value) {
|
||||
if (!value || value.length === 0) return true;
|
||||
try {
|
||||
const parsed = JSON.parse(value);
|
||||
if (!parsed.type || !parsed.server || !parsed.server_port) {
|
||||
return _('JSON must contain at least type, server and server_port fields');
|
||||
}
|
||||
return true;
|
||||
} catch (e) {
|
||||
return _('Invalid JSON format');
|
||||
}
|
||||
};
|
||||
|
||||
o = s.taboption('basic', form.DynamicList, 'urltest_proxy_links', _('URLTest Proxy Links'));
|
||||
o.depends('proxy_config_type', 'urltest');
|
||||
o.placeholder = 'vless:// or ss:// link';
|
||||
o.rmempty = false;
|
||||
|
||||
o = s.taboption('basic', form.Flag, 'ss_uot', _('Shadowsocks UDP over TCP'), _('Apply for SS2022'));
|
||||
o.default = '0';
|
||||
o.depends('mode', 'proxy');
|
||||
o.rmempty = false;
|
||||
o.ucisection = s.section;
|
||||
|
||||
o = s.taboption('basic', widgets.DeviceSelect, 'interface', _('Network Interface'), _('Select network interface for VPN connection'));
|
||||
o.depends('mode', 'vpn');
|
||||
o.ucisection = s.section;
|
||||
o.noaliases = true;
|
||||
o.nobridges = false;
|
||||
o.noinactive = false;
|
||||
o.filter = function (section_id, value) {
|
||||
if (['br-lan', 'eth0', 'eth1', 'wan', 'phy0-ap0', 'phy1-ap0', 'pppoe-wan', 'lan'].indexOf(value) !== -1) {
|
||||
return false;
|
||||
}
|
||||
|
||||
var device = this.devices.filter(function (dev) {
|
||||
return dev.getName() === value;
|
||||
})[0];
|
||||
|
||||
if (device) {
|
||||
var type = device.getType();
|
||||
return type !== 'wifi' && type !== 'wireless' && !type.includes('wlan');
|
||||
}
|
||||
|
||||
return true;
|
||||
};
|
||||
|
||||
o = s.taboption('basic', form.Flag, 'domain_resolver_enabled', _('Domain Resolver'), _('Enable built-in DNS resolver for domains handled by this section'));
|
||||
o.default = '0';
|
||||
o.rmempty = false;
|
||||
o.depends('mode', 'vpn');
|
||||
o.ucisection = s.section;
|
||||
|
||||
o = s.taboption('basic', form.ListValue, 'domain_resolver_dns_type', _('DNS Protocol Type'), _('Select the DNS protocol type for the domain resolver'));
|
||||
o.value('doh', _('DNS over HTTPS (DoH)'));
|
||||
o.value('dot', _('DNS over TLS (DoT)'));
|
||||
o.value('udp', _('UDP (Unprotected DNS)'));
|
||||
o.default = 'udp';
|
||||
o.rmempty = false;
|
||||
o.depends('domain_resolver_enabled', '1');
|
||||
o.ucisection = s.section;
|
||||
|
||||
o = s.taboption('basic', form.Value, 'domain_resolver_dns_server', _('DNS Server'), _('Select or enter DNS server address'));
|
||||
Object.entries(constants.DNS_SERVER_OPTIONS).forEach(([key, label]) => {
|
||||
o.value(key, _(label));
|
||||
});
|
||||
o.default = '8.8.8.8';
|
||||
o.rmempty = false;
|
||||
o.depends('domain_resolver_enabled', '1');
|
||||
o.ucisection = s.section;
|
||||
o.validate = function (section_id, value) {
|
||||
if (!value) {
|
||||
return _('DNS server address cannot be empty');
|
||||
}
|
||||
|
||||
const ipRegex = /^((25[0-5]|(2[0-4]|1\d|[1-9]|)\d)\.?\b){4}(:[0-9]{1,5})?$/;
|
||||
const domainRegex = /^(?:https:\/\/)?([a-zA-Z0-9]+(-[a-zA-Z0-9]+)*\.)+[a-zA-Z]{2,63}(:[0-9]{1,5})?(\/[^?#\s]*)?$/;
|
||||
|
||||
if (!ipRegex.test(value) && !domainRegex.test(value)) {
|
||||
return _('Invalid DNS server format. Examples: 8.8.8.8 or dns.example.com or dns.example.com/nicedns for DoH');
|
||||
}
|
||||
|
||||
return true;
|
||||
};
|
||||
|
||||
o = s.taboption('basic', form.Flag, 'community_lists_enabled', _('Community Lists'));
|
||||
o.default = '0';
|
||||
o.rmempty = false;
|
||||
o.ucisection = s.section;
|
||||
|
||||
o = s.taboption('basic', form.DynamicList, 'community_lists', _('Service List'), _('Select predefined service for routing') + ' <a href="https://github.com/itdoginfo/allow-domains" target="_blank">github.com/itdoginfo/allow-domains</a>');
|
||||
o.placeholder = 'Service list';
|
||||
Object.entries(constants.DOMAIN_LIST_OPTIONS).forEach(([key, label]) => {
|
||||
o.value(key, _(label));
|
||||
});
|
||||
o.depends('community_lists_enabled', '1');
|
||||
o.rmempty = false;
|
||||
o.ucisection = s.section;
|
||||
|
||||
let lastValues = [];
|
||||
let isProcessing = false;
|
||||
|
||||
o.onchange = function (ev, section_id, value) {
|
||||
if (isProcessing) return;
|
||||
isProcessing = true;
|
||||
|
||||
try {
|
||||
const values = Array.isArray(value) ? value : [value];
|
||||
let newValues = [...values];
|
||||
let notifications = [];
|
||||
|
||||
const selectedRegionalOptions = constants.REGIONAL_OPTIONS.filter(opt => newValues.includes(opt));
|
||||
|
||||
if (selectedRegionalOptions.length > 1) {
|
||||
const lastSelected = selectedRegionalOptions[selectedRegionalOptions.length - 1];
|
||||
const removedRegions = selectedRegionalOptions.slice(0, -1);
|
||||
newValues = newValues.filter(v => v === lastSelected || !constants.REGIONAL_OPTIONS.includes(v));
|
||||
notifications.push(E('p', { class: 'alert-message warning' }, [
|
||||
E('strong', {}, _('Regional options cannot be used together')), E('br'),
|
||||
_('Warning: %s cannot be used together with %s. Previous selections have been removed.')
|
||||
.format(removedRegions.join(', '), lastSelected)
|
||||
]));
|
||||
}
|
||||
|
||||
if (newValues.includes('russia_inside')) {
|
||||
const removedServices = newValues.filter(v => !constants.ALLOWED_WITH_RUSSIA_INSIDE.includes(v));
|
||||
if (removedServices.length > 0) {
|
||||
newValues = newValues.filter(v => constants.ALLOWED_WITH_RUSSIA_INSIDE.includes(v));
|
||||
notifications.push(E('p', { class: 'alert-message warning' }, [
|
||||
E('strong', {}, _('Russia inside restrictions')), E('br'),
|
||||
_('Warning: Russia inside can only be used with %s. %s already in Russia inside and have been removed from selection.')
|
||||
.format(
|
||||
constants.ALLOWED_WITH_RUSSIA_INSIDE.map(key => constants.DOMAIN_LIST_OPTIONS[key]).filter(label => label !== 'Russia inside').join(', '),
|
||||
removedServices.join(', ')
|
||||
)
|
||||
]));
|
||||
}
|
||||
}
|
||||
|
||||
if (JSON.stringify(newValues.sort()) !== JSON.stringify(values.sort())) {
|
||||
this.getUIElement(section_id).setValue(newValues);
|
||||
}
|
||||
|
||||
notifications.forEach(notification => ui.addNotification(null, notification));
|
||||
lastValues = newValues;
|
||||
} catch (e) {
|
||||
console.error('Error in onchange handler:', e);
|
||||
} finally {
|
||||
isProcessing = false;
|
||||
}
|
||||
};
|
||||
|
||||
o = s.taboption('basic', form.ListValue, 'user_domain_list_type', _('User Domain List Type'), _('Select how to add your custom domains'));
|
||||
o.value('disabled', _('Disabled'));
|
||||
o.value('dynamic', _('Dynamic List'));
|
||||
o.value('text', _('Text List'));
|
||||
o.default = 'disabled';
|
||||
o.rmempty = false;
|
||||
o.ucisection = s.section;
|
||||
|
||||
o = s.taboption('basic', form.DynamicList, 'user_domains', _('User Domains'), _('Enter domain names without protocols (example: sub.example.com or example.com)'));
|
||||
o.placeholder = 'Domains list';
|
||||
o.depends('user_domain_list_type', 'dynamic');
|
||||
o.rmempty = false;
|
||||
o.ucisection = s.section;
|
||||
o.validate = function (section_id, value) {
|
||||
if (!value || value.length === 0) return true;
|
||||
const domainRegex = /^(?!-)[A-Za-z0-9-]+([-.][A-Za-z0-9-]+)*(\.[A-Za-z]{2,})?$/;
|
||||
if (!domainRegex.test(value)) {
|
||||
return _('Invalid domain format. Enter domain without protocol (example: sub.example.com or ru)');
|
||||
}
|
||||
return true;
|
||||
};
|
||||
|
||||
o = s.taboption('basic', form.TextValue, 'user_domains_text', _('User Domains List'), _('Enter domain names separated by comma, space or newline. You can add comments after //'));
|
||||
o.placeholder = 'example.com, sub.example.com\n// Social networks\ndomain.com test.com // personal domains';
|
||||
o.depends('user_domain_list_type', 'text');
|
||||
o.rows = 8;
|
||||
o.rmempty = false;
|
||||
o.ucisection = s.section;
|
||||
o.validate = function (section_id, value) {
|
||||
if (!value || value.length === 0) return true;
|
||||
|
||||
const domainRegex = /^(?!-)[A-Za-z0-9-]+([-.][A-Za-z0-9-]+)*(\.[A-Za-z]{2,})?$/;
|
||||
const lines = value.split(/\n/).map(line => line.trim());
|
||||
let hasValidDomain = false;
|
||||
|
||||
for (const line of lines) {
|
||||
// Skip empty lines
|
||||
if (!line) continue;
|
||||
|
||||
// Extract domain part (before any //)
|
||||
const domainPart = line.split('//')[0].trim();
|
||||
|
||||
// Skip if line is empty after removing comments
|
||||
if (!domainPart) continue;
|
||||
|
||||
// Process each domain in the line (separated by comma or space)
|
||||
const domains = domainPart.split(/[,\s]+/).map(d => d.trim()).filter(d => d.length > 0);
|
||||
|
||||
for (const domain of domains) {
|
||||
if (!domainRegex.test(domain)) {
|
||||
return _('Invalid domain format: %s. Enter domain without protocol').format(domain);
|
||||
}
|
||||
hasValidDomain = true;
|
||||
}
|
||||
}
|
||||
|
||||
if (!hasValidDomain) {
|
||||
return _('At least one valid domain must be specified. Comments-only content is not allowed.');
|
||||
}
|
||||
|
||||
return true;
|
||||
};
|
||||
|
||||
o = s.taboption('basic', form.Flag, 'local_domain_lists_enabled', _('Local Domain Lists'), _('Use the list from the router filesystem'));
|
||||
o.default = '0';
|
||||
o.rmempty = false;
|
||||
o.ucisection = s.section;
|
||||
|
||||
o = s.taboption('basic', form.DynamicList, 'local_domain_lists', _('Local Domain List Paths'), _('Enter the list file path'));
|
||||
o.placeholder = '/path/file.lst';
|
||||
o.depends('local_domain_lists_enabled', '1');
|
||||
o.rmempty = false;
|
||||
o.ucisection = s.section;
|
||||
o.validate = function (section_id, value) {
|
||||
if (!value || value.length === 0) return true;
|
||||
const pathRegex = /^\/[a-zA-Z0-9_\-\/\.]+$/;
|
||||
if (!pathRegex.test(value)) {
|
||||
return _('Invalid path format. Path must start with "/" and contain valid characters');
|
||||
}
|
||||
return true;
|
||||
};
|
||||
|
||||
o = s.taboption('basic', form.Flag, 'remote_domain_lists_enabled', _('Remote Domain Lists'), _('Download and use domain lists from remote URLs'));
|
||||
o.default = '0';
|
||||
o.rmempty = false;
|
||||
o.ucisection = s.section;
|
||||
|
||||
o = s.taboption('basic', form.DynamicList, 'remote_domain_lists', _('Remote Domain URLs'), _('Enter full URLs starting with http:// or https://'));
|
||||
o.placeholder = 'URL';
|
||||
o.depends('remote_domain_lists_enabled', '1');
|
||||
o.rmempty = false;
|
||||
o.ucisection = s.section;
|
||||
o.validate = function (section_id, value) {
|
||||
if (!value || value.length === 0) return true;
|
||||
return validateUrl(value);
|
||||
};
|
||||
|
||||
o = s.taboption('basic', form.Flag, 'local_subnet_lists_enabled', _('Local Subnet Lists'), _('Use the list from the router filesystem'));
|
||||
o.default = '0';
|
||||
o.rmempty = false;
|
||||
o.ucisection = s.section;
|
||||
|
||||
o = s.taboption('basic', form.DynamicList, 'local_subnet_lists', _('Local Subnet List Paths'), _('Enter the list file path'));
|
||||
o.placeholder = '/path/file.lst';
|
||||
o.depends('local_subnet_lists_enabled', '1');
|
||||
o.rmempty = false;
|
||||
o.ucisection = s.section;
|
||||
o.validate = function (section_id, value) {
|
||||
if (!value || value.length === 0) return true;
|
||||
const pathRegex = /^\/[a-zA-Z0-9_\-\/\.]+$/;
|
||||
if (!pathRegex.test(value)) {
|
||||
return _('Invalid path format. Path must start with "/" and contain valid characters');
|
||||
}
|
||||
return true;
|
||||
};
|
||||
|
||||
o = s.taboption('basic', form.ListValue, 'user_subnet_list_type', _('User Subnet List Type'), _('Select how to add your custom subnets'));
|
||||
o.value('disabled', _('Disabled'));
|
||||
o.value('dynamic', _('Dynamic List'));
|
||||
o.value('text', _('Text List (comma/space/newline separated)'));
|
||||
o.default = 'disabled';
|
||||
o.rmempty = false;
|
||||
o.ucisection = s.section;
|
||||
|
||||
o = s.taboption('basic', form.DynamicList, 'user_subnets', _('User Subnets'), _('Enter subnets in CIDR notation (example: 103.21.244.0/22) or single IP addresses'));
|
||||
o.placeholder = 'IP or subnet';
|
||||
o.depends('user_subnet_list_type', 'dynamic');
|
||||
o.rmempty = false;
|
||||
o.ucisection = s.section;
|
||||
o.validate = function (section_id, value) {
|
||||
if (!value || value.length === 0) return true;
|
||||
const subnetRegex = /^(\d{1,3}\.){3}\d{1,3}(\/\d{1,2})?$/;
|
||||
if (!subnetRegex.test(value)) return _('Invalid format. Use format: X.X.X.X or X.X.X.X/Y');
|
||||
const [ip, cidr] = value.split('/');
|
||||
if (ip === "0.0.0.0") {
|
||||
return _('IP address 0.0.0.0 is not allowed');
|
||||
}
|
||||
const ipParts = ip.split('.');
|
||||
for (const part of ipParts) {
|
||||
const num = parseInt(part);
|
||||
if (num < 0 || num > 255) return _('IP address parts must be between 0 and 255');
|
||||
}
|
||||
if (cidr !== undefined) {
|
||||
const cidrNum = parseInt(cidr);
|
||||
if (cidrNum < 0 || cidrNum > 32) return _('CIDR must be between 0 and 32');
|
||||
}
|
||||
return true;
|
||||
};
|
||||
|
||||
o = s.taboption('basic', form.TextValue, 'user_subnets_text', _('User Subnets List'), _('Enter subnets in CIDR notation or single IP addresses, separated by comma, space or newline. You can add comments after //'));
|
||||
o.placeholder = '103.21.244.0/22\n// Google DNS\n8.8.8.8\n1.1.1.1/32, 9.9.9.9 // Cloudflare and Quad9';
|
||||
o.depends('user_subnet_list_type', 'text');
|
||||
o.rows = 10;
|
||||
o.rmempty = false;
|
||||
o.ucisection = s.section;
|
||||
o.validate = function (section_id, value) {
|
||||
if (!value || value.length === 0) return true;
|
||||
|
||||
const subnetRegex = /^(\d{1,3}\.){3}\d{1,3}(\/\d{1,2})?$/;
|
||||
const lines = value.split(/\n/).map(line => line.trim());
|
||||
let hasValidSubnet = false;
|
||||
|
||||
for (const line of lines) {
|
||||
// Skip empty lines
|
||||
if (!line) continue;
|
||||
|
||||
// Extract subnet part (before any //)
|
||||
const subnetPart = line.split('//')[0].trim();
|
||||
|
||||
// Skip if line is empty after removing comments
|
||||
if (!subnetPart) continue;
|
||||
|
||||
// Process each subnet in the line (separated by comma or space)
|
||||
const subnets = subnetPart.split(/[,\s]+/).map(s => s.trim()).filter(s => s.length > 0);
|
||||
|
||||
for (const subnet of subnets) {
|
||||
if (!subnetRegex.test(subnet)) {
|
||||
return _('Invalid format: %s. Use format: X.X.X.X or X.X.X.X/Y').format(subnet);
|
||||
}
|
||||
|
||||
const [ip, cidr] = subnet.split('/');
|
||||
const ipParts = ip.split('.');
|
||||
for (const part of ipParts) {
|
||||
const num = parseInt(part);
|
||||
if (num < 0 || num > 255) {
|
||||
return _('IP parts must be between 0 and 255 in: %s').format(subnet);
|
||||
}
|
||||
}
|
||||
|
||||
if (cidr !== undefined) {
|
||||
const cidrNum = parseInt(cidr);
|
||||
if (cidrNum < 0 || cidrNum > 32) {
|
||||
return _('CIDR must be between 0 and 32 in: %s').format(subnet);
|
||||
}
|
||||
}
|
||||
hasValidSubnet = true;
|
||||
}
|
||||
}
|
||||
|
||||
if (!hasValidSubnet) {
|
||||
return _('At least one valid subnet or IP must be specified. Comments-only content is not allowed.');
|
||||
}
|
||||
|
||||
return true;
|
||||
};
|
||||
|
||||
o = s.taboption('basic', form.Flag, 'remote_subnet_lists_enabled', _('Remote Subnet Lists'), _('Download and use subnet lists from remote URLs'));
|
||||
o.default = '0';
|
||||
o.rmempty = false;
|
||||
o.ucisection = s.section;
|
||||
|
||||
o = s.taboption('basic', form.DynamicList, 'remote_subnet_lists', _('Remote Subnet URLs'), _('Enter full URLs starting with http:// or https://'));
|
||||
o.placeholder = 'URL';
|
||||
o.depends('remote_subnet_lists_enabled', '1');
|
||||
o.rmempty = false;
|
||||
o.ucisection = s.section;
|
||||
o.validate = function (section_id, value) {
|
||||
if (!value || value.length === 0) return true;
|
||||
return validateUrl(value);
|
||||
};
|
||||
|
||||
o = s.taboption('basic', form.Flag, 'all_traffic_from_ip_enabled', _('IP for full redirection'), _('Specify local IP addresses whose traffic will always use the configured route'));
|
||||
o.default = '0';
|
||||
o.rmempty = false;
|
||||
o.ucisection = s.section;
|
||||
|
||||
o = s.taboption('basic', form.DynamicList, 'all_traffic_ip', _('Local IPs'), _('Enter valid IPv4 addresses'));
|
||||
o.placeholder = 'IP';
|
||||
o.depends('all_traffic_from_ip_enabled', '1');
|
||||
o.rmempty = false;
|
||||
o.ucisection = s.section;
|
||||
o.validate = function (section_id, value) {
|
||||
if (!value || value.length === 0) return true;
|
||||
const ipRegex = /^(\d{1,3}\.){3}\d{1,3}$/;
|
||||
if (!ipRegex.test(value)) return _('Invalid IP format. Use format: X.X.X.X (like 192.168.1.1)');
|
||||
const ipParts = value.split('.');
|
||||
for (const part of ipParts) {
|
||||
const num = parseInt(part);
|
||||
if (num < 0 || num > 255) return _('IP address parts must be between 0 and 255');
|
||||
}
|
||||
return true;
|
||||
};
|
||||
}
|
||||
|
||||
return baseclass.extend({
|
||||
createConfigSection
|
||||
});
|
||||
@@ -0,0 +1,113 @@
|
||||
'use strict';
|
||||
'require baseclass';
|
||||
|
||||
const STATUS_COLORS = {
|
||||
SUCCESS: '#4caf50',
|
||||
ERROR: '#f44336',
|
||||
WARNING: '#ff9800'
|
||||
};
|
||||
|
||||
const FAKEIP_CHECK_DOMAIN = 'fakeip.podkop.fyi';
|
||||
const IP_CHECK_DOMAIN = 'ip.podkop.fyi';
|
||||
|
||||
const REGIONAL_OPTIONS = ['russia_inside', 'russia_outside', 'ukraine_inside'];
|
||||
const ALLOWED_WITH_RUSSIA_INSIDE = [
|
||||
'russia_inside',
|
||||
'meta',
|
||||
'twitter',
|
||||
'discord',
|
||||
'telegram',
|
||||
'cloudflare',
|
||||
'google_ai',
|
||||
'google_play',
|
||||
'hetzner',
|
||||
'ovh',
|
||||
'hodca',
|
||||
'digitalocean',
|
||||
'cloudfront'
|
||||
];
|
||||
|
||||
const DOMAIN_LIST_OPTIONS = {
|
||||
russia_inside: 'Russia inside',
|
||||
russia_outside: 'Russia outside',
|
||||
ukraine_inside: 'Ukraine',
|
||||
geoblock: 'Geo Block',
|
||||
block: 'Block',
|
||||
porn: 'Porn',
|
||||
news: 'News',
|
||||
anime: 'Anime',
|
||||
youtube: 'Youtube',
|
||||
discord: 'Discord',
|
||||
meta: 'Meta',
|
||||
twitter: 'Twitter (X)',
|
||||
hdrezka: 'HDRezka',
|
||||
tiktok: 'Tik-Tok',
|
||||
telegram: 'Telegram',
|
||||
cloudflare: 'Cloudflare',
|
||||
google_ai: 'Google AI',
|
||||
google_play: 'Google Play',
|
||||
hodca: 'H.O.D.C.A',
|
||||
hetzner: 'Hetzner ASN',
|
||||
ovh: 'OVH ASN',
|
||||
digitalocean: 'Digital Ocean ASN',
|
||||
cloudfront: 'CloudFront ASN'
|
||||
};
|
||||
|
||||
const UPDATE_INTERVAL_OPTIONS = {
|
||||
'1h': 'Every hour',
|
||||
'3h': 'Every 3 hours',
|
||||
'12h': 'Every 12 hours',
|
||||
'1d': 'Every day',
|
||||
'3d': 'Every 3 days'
|
||||
};
|
||||
|
||||
const DNS_SERVER_OPTIONS = {
|
||||
'1.1.1.1': '1.1.1.1 (Cloudflare)',
|
||||
'8.8.8.8': '8.8.8.8 (Google)',
|
||||
'9.9.9.9': '9.9.9.9 (Quad9)',
|
||||
'dns.adguard-dns.com': 'dns.adguard-dns.com (AdGuard Default)',
|
||||
'unfiltered.adguard-dns.com': 'unfiltered.adguard-dns.com (AdGuard Unfiltered)',
|
||||
'family.adguard-dns.com': 'family.adguard-dns.com (AdGuard Family)'
|
||||
};
|
||||
|
||||
const DIAGNOSTICS_UPDATE_INTERVAL = 10000; // 10 seconds
|
||||
const CACHE_TIMEOUT = DIAGNOSTICS_UPDATE_INTERVAL - 1000; // 9 seconds
|
||||
const ERROR_POLL_INTERVAL = 10000; // 10 seconds
|
||||
const COMMAND_TIMEOUT = 10000; // 10 seconds
|
||||
const FETCH_TIMEOUT = 10000; // 10 seconds
|
||||
const BUTTON_FEEDBACK_TIMEOUT = 1000; // 1 second
|
||||
const DIAGNOSTICS_INITIAL_DELAY = 100; // 100 milliseconds
|
||||
|
||||
// Интервалы планирования команд в диагностике (в миллисекундах)
|
||||
const COMMAND_SCHEDULING = {
|
||||
P0_PRIORITY: 0, // Наивысший приоритет (без задержки)
|
||||
P1_PRIORITY: 100, // Очень высокий приоритет
|
||||
P2_PRIORITY: 300, // Высокий приоритет
|
||||
P3_PRIORITY: 500, // Выше среднего
|
||||
P4_PRIORITY: 700, // Стандартный приоритет
|
||||
P5_PRIORITY: 900, // Ниже среднего
|
||||
P6_PRIORITY: 1100, // Низкий приоритет
|
||||
P7_PRIORITY: 1300, // Очень низкий приоритет
|
||||
P8_PRIORITY: 1500, // Фоновое выполнение
|
||||
P9_PRIORITY: 1700, // Выполнение в режиме простоя
|
||||
P10_PRIORITY: 1900 // Наименьший приоритет
|
||||
};
|
||||
|
||||
return baseclass.extend({
|
||||
STATUS_COLORS,
|
||||
FAKEIP_CHECK_DOMAIN,
|
||||
IP_CHECK_DOMAIN,
|
||||
REGIONAL_OPTIONS,
|
||||
ALLOWED_WITH_RUSSIA_INSIDE,
|
||||
DOMAIN_LIST_OPTIONS,
|
||||
UPDATE_INTERVAL_OPTIONS,
|
||||
DNS_SERVER_OPTIONS,
|
||||
DIAGNOSTICS_UPDATE_INTERVAL,
|
||||
ERROR_POLL_INTERVAL,
|
||||
COMMAND_TIMEOUT,
|
||||
FETCH_TIMEOUT,
|
||||
BUTTON_FEEDBACK_TIMEOUT,
|
||||
DIAGNOSTICS_INITIAL_DELAY,
|
||||
COMMAND_SCHEDULING,
|
||||
CACHE_TIMEOUT
|
||||
});
|
||||
@@ -0,0 +1,887 @@
|
||||
'use strict';
|
||||
'require baseclass';
|
||||
'require form';
|
||||
'require ui';
|
||||
'require uci';
|
||||
'require fs';
|
||||
'require view.podkop.constants as constants';
|
||||
'require view.podkop.utils as utils';
|
||||
|
||||
// Cache system for network requests
|
||||
const fetchCache = {};
|
||||
|
||||
// Helper function to fetch with cache
|
||||
async function cachedFetch(url, options = {}) {
|
||||
const cacheKey = url;
|
||||
const currentTime = Date.now();
|
||||
|
||||
// If we have a valid cached response, return it
|
||||
if (fetchCache[cacheKey] && currentTime - fetchCache[cacheKey].timestamp < constants.CACHE_TIMEOUT) {
|
||||
console.log(`Using cached response for ${url}`);
|
||||
return Promise.resolve(fetchCache[cacheKey].response.clone());
|
||||
}
|
||||
|
||||
// Otherwise, make a new request
|
||||
try {
|
||||
const response = await fetch(url, options);
|
||||
|
||||
// Cache the response
|
||||
fetchCache[cacheKey] = {
|
||||
response: response.clone(),
|
||||
timestamp: currentTime
|
||||
};
|
||||
|
||||
return response;
|
||||
} catch (error) {
|
||||
throw error;
|
||||
}
|
||||
}
|
||||
|
||||
// Helper functions for command execution with prioritization - Using from utils.js now
|
||||
function safeExec(command, args, priority, callback, timeout = constants.COMMAND_TIMEOUT) {
|
||||
return utils.safeExec(command, args, priority, callback, timeout);
|
||||
}
|
||||
|
||||
// Helper functions for handling checks
|
||||
function runCheck(checkFunction, priority, callback) {
|
||||
// Default to highest priority execution if priority is not provided or invalid
|
||||
let schedulingDelay = constants.COMMAND_SCHEDULING.P0_PRIORITY;
|
||||
|
||||
// If priority is a string, try to get the corresponding delay value
|
||||
if (typeof priority === 'string' && constants.COMMAND_SCHEDULING[priority] !== undefined) {
|
||||
schedulingDelay = constants.COMMAND_SCHEDULING[priority];
|
||||
}
|
||||
|
||||
const executeCheck = async () => {
|
||||
try {
|
||||
const result = await checkFunction();
|
||||
if (callback && typeof callback === 'function') {
|
||||
callback(result);
|
||||
}
|
||||
return result;
|
||||
} catch (error) {
|
||||
if (callback && typeof callback === 'function') {
|
||||
callback({ error });
|
||||
}
|
||||
return { error };
|
||||
}
|
||||
};
|
||||
|
||||
if (callback && typeof callback === 'function') {
|
||||
setTimeout(executeCheck, schedulingDelay);
|
||||
return;
|
||||
} else {
|
||||
return executeCheck();
|
||||
}
|
||||
}
|
||||
|
||||
function runAsyncTask(taskFunction, priority) {
|
||||
// Default to highest priority execution if priority is not provided or invalid
|
||||
let schedulingDelay = constants.COMMAND_SCHEDULING.P0_PRIORITY;
|
||||
|
||||
// If priority is a string, try to get the corresponding delay value
|
||||
if (typeof priority === 'string' && constants.COMMAND_SCHEDULING[priority] !== undefined) {
|
||||
schedulingDelay = constants.COMMAND_SCHEDULING[priority];
|
||||
}
|
||||
|
||||
setTimeout(async () => {
|
||||
try {
|
||||
await taskFunction();
|
||||
} catch (error) {
|
||||
console.error('Async task error:', error);
|
||||
}
|
||||
}, schedulingDelay);
|
||||
}
|
||||
|
||||
// Helper Functions for UI and formatting
|
||||
function createStatus(state, message, color) {
|
||||
return {
|
||||
state,
|
||||
message: _(message),
|
||||
color: constants.STATUS_COLORS[color]
|
||||
};
|
||||
}
|
||||
|
||||
function formatDiagnosticOutput(output) {
|
||||
if (typeof output !== 'string') return '';
|
||||
return output.trim()
|
||||
.replace(/\x1b\[[0-9;]*m/g, '')
|
||||
.replace(/\r\n/g, '\n')
|
||||
.replace(/\r/g, '\n');
|
||||
}
|
||||
|
||||
function copyToClipboard(text, button) {
|
||||
const textarea = document.createElement('textarea');
|
||||
textarea.value = text;
|
||||
document.body.appendChild(textarea);
|
||||
textarea.select();
|
||||
try {
|
||||
document.execCommand('copy');
|
||||
const originalText = button.textContent;
|
||||
button.textContent = _('Copied!');
|
||||
setTimeout(() => button.textContent = originalText, constants.BUTTON_FEEDBACK_TIMEOUT);
|
||||
} catch (err) {
|
||||
ui.addNotification(null, E('p', {}, _('Failed to copy: ') + err.message));
|
||||
}
|
||||
document.body.removeChild(textarea);
|
||||
}
|
||||
|
||||
// IP masking function
|
||||
function maskIP(ip) {
|
||||
if (!ip) return '';
|
||||
const parts = ip.split('.');
|
||||
if (parts.length !== 4) return ip;
|
||||
return ['XX', 'XX', 'XX', parts[3]].join('.');
|
||||
}
|
||||
|
||||
// Status Check Functions
|
||||
async function checkFakeIP() {
|
||||
try {
|
||||
const controller = new AbortController();
|
||||
const timeoutId = setTimeout(() => controller.abort(), constants.FETCH_TIMEOUT);
|
||||
|
||||
try {
|
||||
const response = await cachedFetch(`https://${constants.FAKEIP_CHECK_DOMAIN}/check`, { signal: controller.signal });
|
||||
const data = await response.json();
|
||||
clearTimeout(timeoutId);
|
||||
|
||||
if (data.fakeip === true) {
|
||||
return createStatus('working', 'working', 'SUCCESS');
|
||||
} else {
|
||||
return createStatus('not_working', 'not working', 'ERROR');
|
||||
}
|
||||
} catch (fetchError) {
|
||||
clearTimeout(timeoutId);
|
||||
const message = fetchError.name === 'AbortError' ? 'timeout' : 'check error';
|
||||
return createStatus('error', message, 'WARNING');
|
||||
}
|
||||
} catch (error) {
|
||||
return createStatus('error', 'check error', 'WARNING');
|
||||
}
|
||||
}
|
||||
|
||||
async function checkFakeIPCLI() {
|
||||
try {
|
||||
return new Promise((resolve) => {
|
||||
safeExec('nslookup', ['-timeout=2', constants.FAKEIP_CHECK_DOMAIN, '127.0.0.42'], 'P0_PRIORITY', result => {
|
||||
if (result.stdout && result.stdout.includes('198.18')) {
|
||||
resolve(createStatus('working', 'working on router', 'SUCCESS'));
|
||||
} else {
|
||||
resolve(createStatus('not_working', 'not working on router', 'ERROR'));
|
||||
}
|
||||
});
|
||||
});
|
||||
} catch (error) {
|
||||
return createStatus('error', 'CLI check error', 'WARNING');
|
||||
}
|
||||
}
|
||||
|
||||
function checkDNSAvailability() {
|
||||
return new Promise(async (resolve) => {
|
||||
try {
|
||||
safeExec('/usr/bin/podkop', ['check_dns_available'], 'P0_PRIORITY', dnsStatusResult => {
|
||||
if (!dnsStatusResult || !dnsStatusResult.stdout) {
|
||||
return resolve({
|
||||
remote: createStatus('error', 'DNS check timeout', 'WARNING'),
|
||||
local: createStatus('error', 'DNS check timeout', 'WARNING')
|
||||
});
|
||||
}
|
||||
|
||||
try {
|
||||
const dnsStatus = JSON.parse(dnsStatusResult.stdout);
|
||||
|
||||
const remoteStatus = dnsStatus.is_available ?
|
||||
createStatus('available', `${dnsStatus.dns_type.toUpperCase()} (${dnsStatus.dns_server}) available`, 'SUCCESS') :
|
||||
createStatus('unavailable', `${dnsStatus.dns_type.toUpperCase()} (${dnsStatus.dns_server}) unavailable`, 'ERROR');
|
||||
|
||||
const localStatus = dnsStatus.local_dns_working ?
|
||||
createStatus('available', 'Router DNS working', 'SUCCESS') :
|
||||
createStatus('unavailable', 'Router DNS not working', 'ERROR');
|
||||
|
||||
return resolve({
|
||||
remote: remoteStatus,
|
||||
local: localStatus
|
||||
});
|
||||
} catch (parseError) {
|
||||
return resolve({
|
||||
remote: createStatus('error', 'DNS check parse error', 'WARNING'),
|
||||
local: createStatus('error', 'DNS check parse error', 'WARNING')
|
||||
});
|
||||
}
|
||||
});
|
||||
} catch (error) {
|
||||
return resolve({
|
||||
remote: createStatus('error', 'DNS check error', 'WARNING'),
|
||||
local: createStatus('error', 'DNS check error', 'WARNING')
|
||||
});
|
||||
}
|
||||
});
|
||||
}
|
||||
|
||||
async function checkBypass() {
|
||||
try {
|
||||
const controller = new AbortController();
|
||||
const timeoutId = setTimeout(() => controller.abort(), constants.FETCH_TIMEOUT);
|
||||
|
||||
try {
|
||||
const response1 = await cachedFetch(`https://${constants.FAKEIP_CHECK_DOMAIN}/check`, { signal: controller.signal });
|
||||
const data1 = await response1.json();
|
||||
|
||||
const response2 = await cachedFetch(`https://${constants.IP_CHECK_DOMAIN}/check`, { signal: controller.signal });
|
||||
const data2 = await response2.json();
|
||||
|
||||
clearTimeout(timeoutId);
|
||||
|
||||
if (data1.IP && data2.IP) {
|
||||
if (data1.IP !== data2.IP) {
|
||||
return createStatus('working', 'working', 'SUCCESS');
|
||||
} else {
|
||||
return createStatus('not_working', 'same IP for both domains', 'ERROR');
|
||||
}
|
||||
} else {
|
||||
return createStatus('error', 'check error (no IP)', 'WARNING');
|
||||
}
|
||||
} catch (fetchError) {
|
||||
clearTimeout(timeoutId);
|
||||
const message = fetchError.name === 'AbortError' ? 'timeout' : 'check error';
|
||||
return createStatus('error', message, 'WARNING');
|
||||
}
|
||||
} catch (error) {
|
||||
return createStatus('error', 'check error', 'WARNING');
|
||||
}
|
||||
}
|
||||
|
||||
// Modal Functions
|
||||
function createModalContent(title, content) {
|
||||
return [
|
||||
E('div', {
|
||||
'class': 'panel-body',
|
||||
style: 'max-height: 70vh; overflow-y: auto; margin: 1em 0; padding: 1.5em; ' +
|
||||
'font-family: monospace; white-space: pre-wrap; word-wrap: break-word; ' +
|
||||
'line-height: 1.5; font-size: 14px;'
|
||||
}, [
|
||||
E('pre', { style: 'margin: 0;' }, content)
|
||||
]),
|
||||
E('div', {
|
||||
'class': 'right',
|
||||
style: 'margin-top: 1em;'
|
||||
}, [
|
||||
E('button', {
|
||||
'class': 'btn',
|
||||
'click': ev => copyToClipboard('```txt\n' + content + '\n```', ev.target)
|
||||
}, _('Copy to Clipboard')),
|
||||
E('button', {
|
||||
'class': 'btn',
|
||||
'click': ui.hideModal
|
||||
}, _('Close'))
|
||||
])
|
||||
];
|
||||
}
|
||||
|
||||
function showConfigModal(command, title) {
|
||||
// Create and show modal immediately with loading state
|
||||
const modalContent = E('div', { 'class': 'panel-body' }, [
|
||||
E('div', {
|
||||
'class': 'panel-body',
|
||||
style: 'max-height: 70vh; overflow-y: auto; margin: 1em 0; padding: 1.5em; ' +
|
||||
'font-family: monospace; white-space: pre-wrap; word-wrap: break-word; ' +
|
||||
'line-height: 1.5; font-size: 14px;'
|
||||
}, [
|
||||
E('pre', {
|
||||
'id': 'modal-content-pre',
|
||||
style: 'margin: 0;'
|
||||
}, _('Loading...'))
|
||||
]),
|
||||
E('div', {
|
||||
'class': 'right',
|
||||
style: 'margin-top: 1em;'
|
||||
}, [
|
||||
E('button', {
|
||||
'class': 'btn',
|
||||
'id': 'copy-button',
|
||||
'click': ev => copyToClipboard('```txt\n' + document.getElementById('modal-content-pre').innerText + '\n```', ev.target)
|
||||
}, _('Copy to Clipboard')),
|
||||
E('button', {
|
||||
'class': 'btn',
|
||||
'click': ui.hideModal
|
||||
}, _('Close'))
|
||||
])
|
||||
]);
|
||||
|
||||
ui.showModal(_(title), modalContent);
|
||||
|
||||
// Function to update modal content
|
||||
const updateModalContent = (content) => {
|
||||
const pre = document.getElementById('modal-content-pre');
|
||||
if (pre) {
|
||||
pre.textContent = content;
|
||||
}
|
||||
};
|
||||
|
||||
try {
|
||||
let formattedOutput = '';
|
||||
|
||||
if (command === 'global_check') {
|
||||
safeExec('/usr/bin/podkop', [command], 'P0_PRIORITY', res => {
|
||||
formattedOutput = formatDiagnosticOutput(res.stdout || _('No output'));
|
||||
|
||||
try {
|
||||
const controller = new AbortController();
|
||||
const timeoutId = setTimeout(() => controller.abort(), constants.FETCH_TIMEOUT);
|
||||
|
||||
cachedFetch(`https://${constants.FAKEIP_CHECK_DOMAIN}/check`, { signal: controller.signal })
|
||||
.then(response => response.json())
|
||||
.then(data => {
|
||||
clearTimeout(timeoutId);
|
||||
|
||||
if (data.fakeip === true) {
|
||||
formattedOutput += '\n✅ ' + _('FakeIP is working in browser!') + '\n';
|
||||
} else {
|
||||
formattedOutput += '\n❌ ' + _('FakeIP is not working in browser') + '\n';
|
||||
formattedOutput += _('Check DNS server on current device (PC, phone)') + '\n';
|
||||
formattedOutput += _('Its must be router!') + '\n';
|
||||
}
|
||||
|
||||
// Bypass check
|
||||
cachedFetch(`https://${constants.FAKEIP_CHECK_DOMAIN}/check`, { signal: controller.signal })
|
||||
.then(bypassResponse => bypassResponse.json())
|
||||
.then(bypassData => {
|
||||
cachedFetch(`https://${constants.IP_CHECK_DOMAIN}/check`, { signal: controller.signal })
|
||||
.then(bypassResponse2 => bypassResponse2.json())
|
||||
.then(bypassData2 => {
|
||||
formattedOutput += '━━━━━━━━━━━━━━━━━━━━━━━━━━━\n';
|
||||
|
||||
if (bypassData.IP && bypassData2.IP && bypassData.IP !== bypassData2.IP) {
|
||||
formattedOutput += '✅ ' + _('Proxy working correctly') + '\n';
|
||||
formattedOutput += _('Direct IP: ') + maskIP(bypassData.IP) + '\n';
|
||||
formattedOutput += _('Proxy IP: ') + maskIP(bypassData2.IP) + '\n';
|
||||
} else if (bypassData.IP === bypassData2.IP) {
|
||||
formattedOutput += '❌ ' + _('Proxy is not working - same IP for both domains') + '\n';
|
||||
formattedOutput += _('IP: ') + maskIP(bypassData.IP) + '\n';
|
||||
} else {
|
||||
formattedOutput += '❌ ' + _('Proxy check failed') + '\n';
|
||||
}
|
||||
|
||||
updateModalContent(formattedOutput);
|
||||
})
|
||||
.catch(error => {
|
||||
formattedOutput += '\n❌ ' + _('Check failed: ') + (error.name === 'AbortError' ? _('timeout') : error.message) + '\n';
|
||||
updateModalContent(formattedOutput);
|
||||
});
|
||||
})
|
||||
.catch(error => {
|
||||
formattedOutput += '\n❌ ' + _('Check failed: ') + (error.name === 'AbortError' ? _('timeout') : error.message) + '\n';
|
||||
updateModalContent(formattedOutput);
|
||||
});
|
||||
})
|
||||
.catch(error => {
|
||||
formattedOutput += '\n❌ ' + _('Check failed: ') + (error.name === 'AbortError' ? _('timeout') : error.message) + '\n';
|
||||
updateModalContent(formattedOutput);
|
||||
});
|
||||
} catch (error) {
|
||||
formattedOutput += '\n❌ ' + _('Check failed: ') + error.message + '\n';
|
||||
updateModalContent(formattedOutput);
|
||||
}
|
||||
});
|
||||
} else {
|
||||
safeExec('/usr/bin/podkop', [command], 'P0_PRIORITY', res => {
|
||||
formattedOutput = formatDiagnosticOutput(res.stdout || _('No output'));
|
||||
updateModalContent(formattedOutput);
|
||||
});
|
||||
}
|
||||
} catch (error) {
|
||||
updateModalContent(_('Error: ') + error.message);
|
||||
}
|
||||
}
|
||||
|
||||
// Button Factory
|
||||
const ButtonFactory = {
|
||||
createButton: function (config) {
|
||||
return E('button', {
|
||||
'class': `btn ${config.additionalClass || ''}`.trim(),
|
||||
'click': config.onClick,
|
||||
'style': config.style || ''
|
||||
}, _(config.label));
|
||||
},
|
||||
|
||||
createActionButton: function (config) {
|
||||
return this.createButton({
|
||||
label: config.label,
|
||||
additionalClass: `cbi-button-${config.type || ''}`,
|
||||
onClick: () => safeExec('/usr/bin/podkop', [config.action], 'P0_PRIORITY')
|
||||
.then(() => config.reload && location.reload()),
|
||||
style: config.style
|
||||
});
|
||||
},
|
||||
|
||||
createInitActionButton: function (config) {
|
||||
return this.createButton({
|
||||
label: config.label,
|
||||
additionalClass: `cbi-button-${config.type || ''}`,
|
||||
onClick: () => safeExec('/etc/init.d/podkop', [config.action], 'P0_PRIORITY')
|
||||
.then(() => config.reload && location.reload()),
|
||||
style: config.style
|
||||
});
|
||||
},
|
||||
|
||||
createModalButton: function (config) {
|
||||
return this.createButton({
|
||||
label: config.label,
|
||||
onClick: () => showConfigModal(config.command, config.title),
|
||||
additionalClass: `cbi-button-${config.type || ''}`,
|
||||
style: config.style
|
||||
});
|
||||
}
|
||||
};
|
||||
|
||||
// Create a loading placeholder for status text
|
||||
function createLoadingStatusText() {
|
||||
return E('span', { 'class': 'loading-indicator' }, _('Loading...'));
|
||||
}
|
||||
|
||||
// Create the status section with buttons loaded immediately but status indicators loading asynchronously
|
||||
let createStatusSection = async function () {
|
||||
// Get initial podkop status
|
||||
let initialPodkopStatus = { enabled: false };
|
||||
try {
|
||||
const result = await fs.exec('/usr/bin/podkop', ['get_status']);
|
||||
if (result && result.stdout) {
|
||||
const status = JSON.parse(result.stdout);
|
||||
initialPodkopStatus.enabled = status.enabled === 1;
|
||||
}
|
||||
} catch (e) {
|
||||
console.error('Error getting initial podkop status:', e);
|
||||
}
|
||||
|
||||
return E('div', { 'class': 'cbi-section' }, [
|
||||
E('div', { 'class': 'table', style: 'display: flex; gap: 20px;' }, [
|
||||
// Podkop Status Panel
|
||||
E('div', { 'id': 'podkop-status-panel', 'class': 'panel', 'style': 'flex: 1; padding: 15px;' }, [
|
||||
E('div', { 'class': 'panel-heading' }, [
|
||||
E('strong', {}, _('Podkop Status')),
|
||||
E('br'),
|
||||
E('span', { 'id': 'podkop-status-text' }, createLoadingStatusText())
|
||||
]),
|
||||
E('div', { 'class': 'panel-body', 'style': 'display: flex; flex-direction: column; gap: 8px;' }, [
|
||||
ButtonFactory.createActionButton({
|
||||
label: 'Restart Podkop',
|
||||
type: 'apply',
|
||||
action: 'restart',
|
||||
reload: true
|
||||
}),
|
||||
ButtonFactory.createActionButton({
|
||||
label: 'Stop Podkop',
|
||||
type: 'apply',
|
||||
action: 'stop',
|
||||
reload: true
|
||||
}),
|
||||
// Autostart button - create with initial state
|
||||
ButtonFactory.createInitActionButton({
|
||||
label: initialPodkopStatus.enabled ? 'Disable Autostart' : 'Enable Autostart',
|
||||
type: initialPodkopStatus.enabled ? 'remove' : 'apply',
|
||||
action: initialPodkopStatus.enabled ? 'disable' : 'enable',
|
||||
reload: true
|
||||
}),
|
||||
ButtonFactory.createModalButton({
|
||||
label: _('Global check'),
|
||||
command: 'global_check',
|
||||
title: _('Click here for all the info')
|
||||
}),
|
||||
ButtonFactory.createModalButton({
|
||||
label: 'View Logs',
|
||||
command: 'check_logs',
|
||||
title: 'Podkop Logs'
|
||||
}),
|
||||
ButtonFactory.createModalButton({
|
||||
label: _('Update Lists'),
|
||||
command: 'list_update',
|
||||
title: _('Lists Update Results')
|
||||
})
|
||||
])
|
||||
]),
|
||||
|
||||
// Sing-box Status Panel
|
||||
E('div', { 'id': 'singbox-status-panel', 'class': 'panel', 'style': 'flex: 1; padding: 15px;' }, [
|
||||
E('div', { 'class': 'panel-heading' }, [
|
||||
E('strong', {}, _('Sing-box Status')),
|
||||
E('br'),
|
||||
E('span', { 'id': 'singbox-status-text' }, createLoadingStatusText())
|
||||
]),
|
||||
E('div', { 'class': 'panel-body', 'style': 'display: flex; flex-direction: column; gap: 8px;' }, [
|
||||
ButtonFactory.createModalButton({
|
||||
label: 'Show Config',
|
||||
command: 'show_sing_box_config',
|
||||
title: 'Sing-box Configuration'
|
||||
}),
|
||||
ButtonFactory.createModalButton({
|
||||
label: 'View Logs',
|
||||
command: 'check_sing_box_logs',
|
||||
title: 'Sing-box Logs'
|
||||
}),
|
||||
ButtonFactory.createModalButton({
|
||||
label: 'Check Connections',
|
||||
command: 'check_sing_box_connections',
|
||||
title: 'Active Connections'
|
||||
}),
|
||||
ButtonFactory.createModalButton({
|
||||
label: _('Check NFT Rules'),
|
||||
command: 'check_nft',
|
||||
title: _('NFT Rules')
|
||||
}),
|
||||
ButtonFactory.createModalButton({
|
||||
label: _('Check DNSMasq'),
|
||||
command: 'check_dnsmasq',
|
||||
title: _('DNSMasq Configuration')
|
||||
})
|
||||
])
|
||||
]),
|
||||
|
||||
// FakeIP Status Panel
|
||||
E('div', { 'id': 'fakeip-status-panel', 'class': 'panel', 'style': 'flex: 1; padding: 15px;' }, [
|
||||
E('div', { 'class': 'panel-heading' }, [
|
||||
E('strong', {}, _('FakeIP Status'))
|
||||
]),
|
||||
E('div', { 'class': 'panel-body', 'style': 'display: flex; flex-direction: column; gap: 8px;' }, [
|
||||
E('div', { style: 'margin-bottom: 5px;' }, [
|
||||
E('div', {}, [
|
||||
E('span', { 'id': 'fakeip-browser-status' }, createLoadingStatusText())
|
||||
]),
|
||||
E('div', {}, [
|
||||
E('span', { 'id': 'fakeip-router-status' }, createLoadingStatusText())
|
||||
])
|
||||
]),
|
||||
E('div', { style: 'margin-bottom: 5px;' }, [
|
||||
E('div', {}, [
|
||||
E('strong', {}, _('DNS Status')),
|
||||
E('br'),
|
||||
E('span', { 'id': 'dns-remote-status' }, createLoadingStatusText()),
|
||||
E('br'),
|
||||
E('span', { 'id': 'dns-local-status' }, createLoadingStatusText())
|
||||
])
|
||||
]),
|
||||
E('div', { style: 'margin-bottom: 5px;' }, [
|
||||
E('div', {}, [
|
||||
E('strong', { 'id': 'config-name-text' }, _('Main config')),
|
||||
E('br'),
|
||||
E('span', { 'id': 'bypass-status' }, createLoadingStatusText())
|
||||
])
|
||||
])
|
||||
])
|
||||
]),
|
||||
|
||||
// Version Information Panel
|
||||
E('div', { 'id': 'version-info-panel', 'class': 'panel', 'style': 'flex: 1; padding: 15px;' }, [
|
||||
E('div', { 'class': 'panel-heading' }, [
|
||||
E('strong', {}, _('Version Information'))
|
||||
]),
|
||||
E('div', { 'class': 'panel-body' }, [
|
||||
E('div', { 'style': 'margin-top: 10px; font-family: monospace; white-space: pre-wrap;' }, [
|
||||
E('strong', {}, _('Podkop: ')), E('span', { 'id': 'podkop-version' }, _('Loading...')), '\n',
|
||||
E('strong', {}, _('LuCI App: ')), E('span', { 'id': 'luci-version' }, _('Loading...')), '\n',
|
||||
E('strong', {}, _('Sing-box: ')), E('span', { 'id': 'singbox-version' }, _('Loading...')), '\n',
|
||||
E('strong', {}, _('OpenWrt Version: ')), E('span', { 'id': 'openwrt-version' }, _('Loading...')), '\n',
|
||||
E('strong', {}, _('Device Model: ')), E('span', { 'id': 'device-model' }, _('Loading...'))
|
||||
])
|
||||
])
|
||||
])
|
||||
])
|
||||
]);
|
||||
};
|
||||
|
||||
// Global variables for tracking state
|
||||
let diagnosticsUpdateTimer = null;
|
||||
let isInitialCheck = true;
|
||||
showConfigModal.busy = false;
|
||||
|
||||
function startDiagnosticsUpdates() {
|
||||
if (diagnosticsUpdateTimer) {
|
||||
clearInterval(diagnosticsUpdateTimer);
|
||||
}
|
||||
|
||||
// Immediately update when started
|
||||
updateDiagnostics();
|
||||
|
||||
// Then set up periodic updates
|
||||
diagnosticsUpdateTimer = setInterval(updateDiagnostics, constants.DIAGNOSTICS_UPDATE_INTERVAL);
|
||||
}
|
||||
|
||||
function stopDiagnosticsUpdates() {
|
||||
if (diagnosticsUpdateTimer) {
|
||||
clearInterval(diagnosticsUpdateTimer);
|
||||
diagnosticsUpdateTimer = null;
|
||||
}
|
||||
}
|
||||
|
||||
// Update individual text element with new content
|
||||
function updateTextElement(elementId, content) {
|
||||
const element = document.getElementById(elementId);
|
||||
if (element) {
|
||||
element.innerHTML = '';
|
||||
element.appendChild(content);
|
||||
}
|
||||
}
|
||||
|
||||
async function updateDiagnostics() {
|
||||
// Podkop Status check
|
||||
safeExec('/usr/bin/podkop', ['get_status'], 'P0_PRIORITY', result => {
|
||||
try {
|
||||
const parsedPodkopStatus = JSON.parse(result.stdout || '{"enabled":0,"status":"error"}');
|
||||
|
||||
// Update Podkop status text
|
||||
updateTextElement('podkop-status-text',
|
||||
E('span', {
|
||||
'style': `color: ${parsedPodkopStatus.enabled ? constants.STATUS_COLORS.SUCCESS : constants.STATUS_COLORS.ERROR}`
|
||||
}, [
|
||||
parsedPodkopStatus.enabled ? '✔ Autostart enabled' : '✘ Autostart disabled'
|
||||
])
|
||||
);
|
||||
|
||||
// Update autostart button
|
||||
const autostartButton = parsedPodkopStatus.enabled ?
|
||||
ButtonFactory.createInitActionButton({
|
||||
label: 'Disable Autostart',
|
||||
type: 'remove',
|
||||
action: 'disable',
|
||||
reload: true
|
||||
}) :
|
||||
ButtonFactory.createInitActionButton({
|
||||
label: 'Enable Autostart',
|
||||
type: 'apply',
|
||||
action: 'enable',
|
||||
reload: true
|
||||
});
|
||||
|
||||
// Find the autostart button and replace it
|
||||
const panel = document.getElementById('podkop-status-panel');
|
||||
if (panel) {
|
||||
const buttons = panel.querySelectorAll('.cbi-button');
|
||||
if (buttons.length >= 3) {
|
||||
buttons[2].parentNode.replaceChild(autostartButton, buttons[2]);
|
||||
}
|
||||
}
|
||||
} catch (error) {
|
||||
updateTextElement('podkop-status-text',
|
||||
E('span', { 'style': `color: ${constants.STATUS_COLORS.ERROR}` }, '✘ Error')
|
||||
);
|
||||
}
|
||||
});
|
||||
|
||||
// Sing-box Status check
|
||||
safeExec('/usr/bin/podkop', ['get_sing_box_status'], 'P0_PRIORITY', result => {
|
||||
try {
|
||||
const parsedSingboxStatus = JSON.parse(result.stdout || '{"running":0,"enabled":0,"status":"error"}');
|
||||
|
||||
// Update Sing-box status text
|
||||
updateTextElement('singbox-status-text',
|
||||
E('span', {
|
||||
'style': `color: ${parsedSingboxStatus.running && !parsedSingboxStatus.enabled ?
|
||||
constants.STATUS_COLORS.SUCCESS : constants.STATUS_COLORS.ERROR}`
|
||||
}, [
|
||||
parsedSingboxStatus.running && !parsedSingboxStatus.enabled ?
|
||||
'✔ running' : '✘ ' + parsedSingboxStatus.status
|
||||
])
|
||||
);
|
||||
} catch (error) {
|
||||
updateTextElement('singbox-status-text',
|
||||
E('span', { 'style': `color: ${constants.STATUS_COLORS.ERROR}` }, '✘ Error')
|
||||
);
|
||||
}
|
||||
});
|
||||
|
||||
// Version Information checks
|
||||
safeExec('/usr/bin/podkop', ['show_version'], 'P2_PRIORITY', result => {
|
||||
updateTextElement('podkop-version',
|
||||
document.createTextNode(result.stdout ? result.stdout.trim() : _('Unknown'))
|
||||
);
|
||||
});
|
||||
|
||||
safeExec('/usr/bin/podkop', ['show_luci_version'], 'P2_PRIORITY', result => {
|
||||
updateTextElement('luci-version',
|
||||
document.createTextNode(result.stdout ? result.stdout.trim() : _('Unknown'))
|
||||
);
|
||||
});
|
||||
|
||||
safeExec('/usr/bin/podkop', ['show_sing_box_version'], 'P2_PRIORITY', result => {
|
||||
updateTextElement('singbox-version',
|
||||
document.createTextNode(result.stdout ? result.stdout.trim() : _('Unknown'))
|
||||
);
|
||||
});
|
||||
|
||||
safeExec('/usr/bin/podkop', ['show_system_info'], 'P2_PRIORITY', result => {
|
||||
if (result.stdout) {
|
||||
updateTextElement('openwrt-version',
|
||||
document.createTextNode(result.stdout.split('\n')[1].trim())
|
||||
);
|
||||
updateTextElement('device-model',
|
||||
document.createTextNode(result.stdout.split('\n')[4].trim())
|
||||
);
|
||||
} else {
|
||||
updateTextElement('openwrt-version', document.createTextNode(_('Unknown')));
|
||||
updateTextElement('device-model', document.createTextNode(_('Unknown')));
|
||||
}
|
||||
});
|
||||
|
||||
// FakeIP and DNS status checks
|
||||
runCheck(checkFakeIP, 'P3_PRIORITY', result => {
|
||||
updateTextElement('fakeip-browser-status',
|
||||
E('span', { style: `color: ${result.error ? constants.STATUS_COLORS.WARNING : result.color}` }, [
|
||||
result.error ? '! ' : result.state === 'working' ? '✔ ' : result.state === 'not_working' ? '✘ ' : '! ',
|
||||
result.error ? 'check error' : result.state === 'working' ? _('works in browser') : _('does not work in browser')
|
||||
])
|
||||
);
|
||||
});
|
||||
|
||||
runCheck(checkFakeIPCLI, 'P8_PRIORITY', result => {
|
||||
updateTextElement('fakeip-router-status',
|
||||
E('span', { style: `color: ${result.error ? constants.STATUS_COLORS.WARNING : result.color}` }, [
|
||||
result.error ? '! ' : result.state === 'working' ? '✔ ' : result.state === 'not_working' ? '✘ ' : '! ',
|
||||
result.error ? 'check error' : result.state === 'working' ? _('works on router') : _('does not work on router')
|
||||
])
|
||||
);
|
||||
});
|
||||
|
||||
runCheck(checkDNSAvailability, 'P4_PRIORITY', result => {
|
||||
if (result.error) {
|
||||
updateTextElement('dns-remote-status',
|
||||
E('span', { style: `color: ${constants.STATUS_COLORS.WARNING}` }, '! DNS check error')
|
||||
);
|
||||
updateTextElement('dns-local-status',
|
||||
E('span', { style: `color: ${constants.STATUS_COLORS.WARNING}` }, '! DNS check error')
|
||||
);
|
||||
} else {
|
||||
updateTextElement('dns-remote-status',
|
||||
E('span', { style: `color: ${result.remote.color}` }, [
|
||||
result.remote.state === 'available' ? '✔ ' : result.remote.state === 'unavailable' ? '✘ ' : '! ',
|
||||
result.remote.message
|
||||
])
|
||||
);
|
||||
|
||||
updateTextElement('dns-local-status',
|
||||
E('span', { style: `color: ${result.local.color}` }, [
|
||||
result.local.state === 'available' ? '✔ ' : result.local.state === 'unavailable' ? '✘ ' : '! ',
|
||||
result.local.message
|
||||
])
|
||||
);
|
||||
}
|
||||
});
|
||||
|
||||
runCheck(checkBypass, 'P1_PRIORITY', result => {
|
||||
updateTextElement('bypass-status',
|
||||
E('span', { style: `color: ${result.error ? constants.STATUS_COLORS.WARNING : result.color}` }, [
|
||||
result.error ? '! ' : result.state === 'working' ? '✔ ' : result.state === 'not_working' ? '✘ ' : '! ',
|
||||
result.error ? 'check error' : result.message
|
||||
])
|
||||
);
|
||||
}, 'P1_PRIORITY');
|
||||
|
||||
// Config name
|
||||
runAsyncTask(async () => {
|
||||
try {
|
||||
let configName = _('Main config');
|
||||
const data = await uci.load('podkop');
|
||||
const proxyString = uci.get('podkop', 'main', 'proxy_string');
|
||||
|
||||
if (proxyString) {
|
||||
const activeConfig = proxyString.split('\n')
|
||||
.map(line => line.trim())
|
||||
.find(line => line && !line.startsWith('//'));
|
||||
|
||||
if (activeConfig) {
|
||||
if (activeConfig.includes('#')) {
|
||||
const label = activeConfig.split('#').pop();
|
||||
if (label && label.trim()) {
|
||||
configName = _('Config: ') + decodeURIComponent(label);
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
updateTextElement('config-name-text', document.createTextNode(configName));
|
||||
} catch (e) {
|
||||
console.error('Error getting config name from UCI:', e);
|
||||
}
|
||||
}, 'P1_PRIORITY');
|
||||
}
|
||||
|
||||
function createDiagnosticsSection(mainSection) {
|
||||
let o = mainSection.tab('diagnostics', _('Diagnostics'));
|
||||
|
||||
o = mainSection.taboption('diagnostics', form.DummyValue, '_status');
|
||||
o.rawhtml = true;
|
||||
o.cfgvalue = () => E('div', {
|
||||
id: 'diagnostics-status',
|
||||
'data-loading': 'true'
|
||||
});
|
||||
}
|
||||
|
||||
function setupDiagnosticsEventHandlers(node) {
|
||||
const titleDiv = E('h2', { 'class': 'cbi-map-title' }, _('Podkop'));
|
||||
node.insertBefore(titleDiv, node.firstChild);
|
||||
|
||||
// Function to initialize diagnostics
|
||||
function initDiagnostics(container) {
|
||||
if (container && container.hasAttribute('data-loading')) {
|
||||
container.innerHTML = '';
|
||||
showConfigModal.busy = false;
|
||||
createStatusSection().then(section => {
|
||||
container.appendChild(section);
|
||||
startDiagnosticsUpdates();
|
||||
// Start error polling when diagnostics tab is active
|
||||
utils.startErrorPolling();
|
||||
});
|
||||
}
|
||||
}
|
||||
|
||||
document.addEventListener('visibilitychange', function () {
|
||||
const diagnosticsContainer = document.getElementById('diagnostics-status');
|
||||
const diagnosticsTab = document.querySelector('.cbi-tab[data-tab="diagnostics"]');
|
||||
|
||||
if (document.hidden || !diagnosticsTab || !diagnosticsTab.classList.contains('cbi-tab-active')) {
|
||||
stopDiagnosticsUpdates();
|
||||
// Don't stop error polling here - it's managed in podkop.js for all tabs
|
||||
} else if (diagnosticsContainer && diagnosticsContainer.hasAttribute('data-loading')) {
|
||||
startDiagnosticsUpdates();
|
||||
// Ensure error polling is running when diagnostics tab is active
|
||||
utils.startErrorPolling();
|
||||
}
|
||||
});
|
||||
|
||||
setTimeout(() => {
|
||||
const diagnosticsContainer = document.getElementById('diagnostics-status');
|
||||
const diagnosticsTab = document.querySelector('.cbi-tab[data-tab="diagnostics"]');
|
||||
const otherTabs = document.querySelectorAll('.cbi-tab:not([data-tab="diagnostics"])');
|
||||
|
||||
// Check for direct page load case
|
||||
const noActiveTabsExist = !Array.from(otherTabs).some(tab => tab.classList.contains('cbi-tab-active'));
|
||||
|
||||
if (diagnosticsContainer && diagnosticsTab && (diagnosticsTab.classList.contains('cbi-tab-active') || noActiveTabsExist)) {
|
||||
initDiagnostics(diagnosticsContainer);
|
||||
}
|
||||
|
||||
const tabs = node.querySelectorAll('.cbi-tabmenu');
|
||||
if (tabs.length > 0) {
|
||||
tabs[0].addEventListener('click', function (e) {
|
||||
const tab = e.target.closest('.cbi-tab');
|
||||
if (tab) {
|
||||
const tabName = tab.getAttribute('data-tab');
|
||||
if (tabName === 'diagnostics') {
|
||||
const container = document.getElementById('diagnostics-status');
|
||||
container.setAttribute('data-loading', 'true');
|
||||
initDiagnostics(container);
|
||||
} else {
|
||||
stopDiagnosticsUpdates();
|
||||
// Don't stop error polling - it should continue on all tabs
|
||||
}
|
||||
}
|
||||
});
|
||||
}
|
||||
}, constants.DIAGNOSTICS_INITIAL_DELAY);
|
||||
|
||||
node.classList.add('fade-in');
|
||||
return node;
|
||||
}
|
||||
|
||||
return baseclass.extend({
|
||||
createDiagnosticsSection,
|
||||
setupDiagnosticsEventHandlers
|
||||
});
|
||||
@@ -1,224 +1,93 @@
|
||||
'use strict';
|
||||
'require view';
|
||||
'require form';
|
||||
'require ui';
|
||||
'require network';
|
||||
'require view.podkop.configSection as configSection';
|
||||
'require view.podkop.diagnosticTab as diagnosticTab';
|
||||
'require view.podkop.additionalTab as additionalTab';
|
||||
'require view.podkop.utils as utils';
|
||||
|
||||
return view.extend({
|
||||
async render() {
|
||||
var m, s, o;
|
||||
document.head.insertAdjacentHTML('beforeend', `
|
||||
<style>
|
||||
.cbi-value {
|
||||
margin-bottom: 10px !important;
|
||||
}
|
||||
|
||||
m = new form.Map('podkop', _('Podkop configuration'));
|
||||
#diagnostics-status .table > div {
|
||||
background: var(--background-color-primary);
|
||||
border: 1px solid var(--border-color-medium);
|
||||
border-radius: var(--border-radius);
|
||||
}
|
||||
|
||||
#diagnostics-status .table > div pre,
|
||||
#diagnostics-status .table > div div[style*="monospace"] {
|
||||
color: var(--color-text-primary);
|
||||
}
|
||||
|
||||
s = m.section(form.TypedSection, 'main');
|
||||
s.anonymous = true;
|
||||
#diagnostics-status .alert-message {
|
||||
background: var(--background-color-primary);
|
||||
border-color: var(--border-color-medium);
|
||||
}
|
||||
|
||||
o = s.tab('main', _('Main'));
|
||||
#cbi-podkop:has(.cbi-tab-disabled[data-tab="basic"]) #cbi-podkop-extra {
|
||||
display: none;
|
||||
}
|
||||
</style>
|
||||
`);
|
||||
|
||||
o = s.taboption('main', form.ListValue, 'mode', _('Mode'), _('Select VPN or Proxy'));
|
||||
o.value('vpn', ('VPN'));
|
||||
o.value('proxy', ('Proxy'));
|
||||
const m = new form.Map('podkop', '', null, ['main', 'extra']);
|
||||
|
||||
o = s.taboption('main', form.Value, 'proxy_string', _('Proxy String'), _('String vless:// or ss://'));
|
||||
o.depends('mode', 'proxy');
|
||||
// Main Section
|
||||
const mainSection = m.section(form.TypedSection, 'main');
|
||||
mainSection.anonymous = true;
|
||||
configSection.createConfigSection(mainSection, m, network);
|
||||
|
||||
// Get all interface
|
||||
o = s.taboption('main', form.ListValue, 'interface', _('Interface'), _('Specify the interface'));
|
||||
o.depends('mode', 'vpn');
|
||||
// Additional Settings Tab (main section)
|
||||
additionalTab.createAdditionalSection(mainSection, network);
|
||||
|
||||
try {
|
||||
const devices = await network.getDevices();
|
||||
// Diagnostics Tab (main section)
|
||||
diagnosticTab.createDiagnosticsSection(mainSection);
|
||||
const map_promise = m.render().then(node => {
|
||||
// Set up diagnostics event handlers
|
||||
diagnosticTab.setupDiagnosticsEventHandlers(node);
|
||||
|
||||
const excludeInterfaces = ['br-lan', 'eth0', 'eth1', 'wan', 'phy0-ap0', 'phy1-ap0'];
|
||||
// Start critical error polling for all tabs
|
||||
utils.startErrorPolling();
|
||||
|
||||
devices.forEach(function (device) {
|
||||
if (device.dev && device.dev.name) {
|
||||
const deviceName = device.dev.name;
|
||||
const isExcluded = excludeInterfaces.includes(deviceName) || /^lan\d+$/.test(deviceName);
|
||||
|
||||
if (!isExcluded) {
|
||||
o.value(deviceName, deviceName);
|
||||
// Add event listener to keep error polling active when switching tabs
|
||||
const tabs = node.querySelectorAll('.cbi-tabmenu');
|
||||
if (tabs.length > 0) {
|
||||
tabs[0].addEventListener('click', function (e) {
|
||||
const tab = e.target.closest('.cbi-tab');
|
||||
if (tab) {
|
||||
// Ensure error polling continues when switching tabs
|
||||
utils.startErrorPolling();
|
||||
}
|
||||
});
|
||||
}
|
||||
|
||||
// Add visibility change handler to manage error polling
|
||||
document.addEventListener('visibilitychange', function () {
|
||||
if (document.hidden) {
|
||||
utils.stopErrorPolling();
|
||||
} else {
|
||||
console.warn('Device name is undefined or empty');
|
||||
utils.startErrorPolling();
|
||||
}
|
||||
});
|
||||
} catch (error) {
|
||||
console.error('Error fetching devices:', error);
|
||||
}
|
||||
|
||||
o = s.taboption('main', form.Flag, 'domain_list_enabled', _('Domain list enable'), _('<a href="https://github.com/itdoginfo/allow-domains" target="_blank">github.com/itdoginfo/allow-domains</a>'));
|
||||
o.default = '0';
|
||||
o.rmempty = false;
|
||||
return node;
|
||||
});
|
||||
|
||||
o = s.taboption('main', form.ListValue, 'domain_list', _('Domain list'), _('Select a list'));
|
||||
o.placeholder = 'placeholder';
|
||||
o.value('ru_inside', 'Russia inside');
|
||||
o.value('ru_outside', 'Russia outside');
|
||||
o.value('ua', 'Ukraine');
|
||||
o.depends('domain_list_enabled', '1');
|
||||
o.rmempty = false;
|
||||
// Extra Section
|
||||
const extraSection = m.section(form.TypedSection, 'extra', _('Extra configurations'));
|
||||
extraSection.anonymous = false;
|
||||
extraSection.addremove = true;
|
||||
extraSection.addbtntitle = _('Add Section');
|
||||
extraSection.multiple = true;
|
||||
configSection.createConfigSection(extraSection, m, network);
|
||||
|
||||
o = s.taboption('main', form.Flag, 'delist_domains_enabled', _('Delist domains from main list enable'));
|
||||
o.default = '0';
|
||||
o.rmempty = false;
|
||||
|
||||
o = s.taboption('main', form.DynamicList, 'delist_domains', _('Delist domains'), _('Domains to be excluded'));
|
||||
o.placeholder = 'Delist domains';
|
||||
o.depends('delist_domains_enabled', '1');
|
||||
o.rmempty = false;
|
||||
|
||||
o = s.taboption('main', form.Flag, 'subnets_list_enabled', _('Subnets list enable'));
|
||||
o.default = '0';
|
||||
o.rmempty = false;
|
||||
|
||||
o = s.taboption('main', form.DynamicList, 'subnets', _('Subnets specify option'));
|
||||
o.placeholder = 'Subnet list';
|
||||
o.value('twitter', 'Twitter(x.com)');
|
||||
o.value('meta', 'Meta');
|
||||
o.value('discord', 'Discord(voice)');
|
||||
o.depends('subnets_list_enabled', '1');
|
||||
o.rmempty = false;
|
||||
|
||||
o = s.taboption('main', form.Flag, 'custom_domains_list_enabled', _('Custom domains enable'));
|
||||
o.default = '0';
|
||||
o.rmempty = false;
|
||||
|
||||
o = s.taboption('main', form.DynamicList, 'custom_domains', _('Your domains'));
|
||||
o.placeholder = 'Domains list';
|
||||
o.depends('custom_domains_list_enabled', '1');
|
||||
o.rmempty = false;
|
||||
|
||||
o = s.taboption('main', form.Flag, 'custom_download_domains_list_enabled', _('URL domains enable'));
|
||||
o.default = '0';
|
||||
o.rmempty = false;
|
||||
|
||||
o = s.taboption('main', form.DynamicList, 'custom_download_domains', _('Your URL domains'));
|
||||
o.placeholder = 'URL';
|
||||
o.depends('custom_download_domains_list_enabled', '1');
|
||||
o.rmempty = false;
|
||||
|
||||
o = s.taboption('main', form.Flag, 'custom_subnets_list_enabled', _('Custom subnets enable'));
|
||||
o.default = '0';
|
||||
o.rmempty = false;
|
||||
|
||||
o = s.taboption('main', form.DynamicList, 'custom_subnets', _('Your subnet'));
|
||||
o.placeholder = 'Subnets list';
|
||||
o.depends('custom_subnets_list_enabled', '1');
|
||||
o.rmempty = false;
|
||||
|
||||
o = s.taboption('main', form.Flag, 'custom_download_subnets_list_enabled', _('URL subnets enable'));
|
||||
o.default = '0';
|
||||
o.rmempty = false;
|
||||
|
||||
o = s.taboption('main', form.DynamicList, 'custom_download_subnets', _('Your URL subnet'));
|
||||
o.placeholder = 'URL';
|
||||
o.depends('custom_download_subnets_list_enabled', '1');
|
||||
o.rmempty = false;
|
||||
|
||||
o = s.taboption('main', form.Flag, 'all_traffic_from_ip_enabled', _('IP for full redirection'));
|
||||
o.default = '0';
|
||||
o.rmempty = false;
|
||||
|
||||
o = s.taboption('main', form.DynamicList, 'all_traffic_ip', _('Local IPs'));
|
||||
o.placeholder = 'IP';
|
||||
o.depends('all_traffic_from_ip_enabled', '1');
|
||||
o.rmempty = false;
|
||||
|
||||
o = s.taboption('main', form.Flag, 'exclude_from_ip_enabled', _('IP for full exclude'));
|
||||
o.default = '0';
|
||||
o.rmempty = false;
|
||||
|
||||
o = s.taboption('main', form.DynamicList, 'exclude_traffic_ip', _('Local IPs'));
|
||||
o.placeholder = 'IP';
|
||||
o.depends('exclude_from_ip_enabled', '1');
|
||||
o.rmempty = false;
|
||||
|
||||
o = s.taboption('main', form.Flag, 'yacd', _('Yacd enable'), _('http://openwrt.lan:9090:/ui'));
|
||||
o.default = '0';
|
||||
o.depends('mode', 'proxy');
|
||||
o.rmempty = false;
|
||||
|
||||
o = s.taboption('main', form.Flag, 'socks5', _('Mixed enable'), _('Browser port: 2080'));
|
||||
o.default = '0';
|
||||
o.depends('mode', 'proxy');
|
||||
o.rmempty = false;
|
||||
|
||||
// Second section
|
||||
s = m.section(form.TypedSection, 'second');
|
||||
s.anonymous = true;
|
||||
|
||||
o = s.tab('second', _('Second'));
|
||||
|
||||
o = s.taboption('second', form.Flag, 'second_enable', _('Second enable'));
|
||||
o.default = '0';
|
||||
o.rmempty = false;
|
||||
|
||||
o = s.taboption('second', form.ListValue, 'mode', _('Mode'), _('Select VPN or Proxy'));
|
||||
o.value('vpn', ('VPN'));
|
||||
o.value('proxy', ('Proxy'));
|
||||
o.depends('second_enable', '1');
|
||||
|
||||
o = s.taboption('second', form.Value, 'proxy_string', _('Proxy String'), _('String vless:// or ss://'));
|
||||
o.depends('mode', 'proxy');
|
||||
|
||||
// Get all interface
|
||||
o = s.taboption('second', form.ListValue, 'interface', _('Interface'), _('Specify the interface'));
|
||||
o.depends('mode', 'vpn');
|
||||
|
||||
try {
|
||||
const devices = await network.getDevices();
|
||||
|
||||
const excludeInterfaces = ['br-lan', 'eth0', 'eth1', 'wan', 'phy0-ap0', 'phy1-ap0'];
|
||||
|
||||
devices.forEach(function (device) {
|
||||
if (device.dev && device.dev.name) {
|
||||
const deviceName = device.dev.name;
|
||||
const isExcluded = excludeInterfaces.includes(deviceName) || /^lan\d+$/.test(deviceName);
|
||||
|
||||
if (!isExcluded) {
|
||||
o.value(deviceName, deviceName);
|
||||
}
|
||||
} else {
|
||||
console.warn('Device name is undefined or empty');
|
||||
}
|
||||
});
|
||||
} catch (error) {
|
||||
console.error('Error fetching devices:', error);
|
||||
}
|
||||
|
||||
o = s.taboption('second', form.Flag, 'domain_service_enabled', _('Domain service enable'));
|
||||
o.default = '0';
|
||||
o.rmempty = false;
|
||||
o.depends('second_enable', '1');
|
||||
|
||||
o = s.taboption('second', form.ListValue, 'service_list', _('Service list'), _('Select a list'));
|
||||
o.placeholder = 'placeholder';
|
||||
o.value('youtube', 'Youtube');
|
||||
o.depends('domain_service_enabled', '1');
|
||||
o.rmempty = false;
|
||||
|
||||
o = s.taboption('second', form.Flag, 'custom_domains_list_enabled', _('Custom domains enable'));
|
||||
o.default = '0';
|
||||
o.rmempty = false;
|
||||
o.depends('second_enable', '1');
|
||||
|
||||
o = s.taboption('second', form.DynamicList, 'custom_domains', _('Your domains'));
|
||||
o.placeholder = 'Domains list';
|
||||
o.depends('custom_domains_list_enabled', '1');
|
||||
o.rmempty = false;
|
||||
|
||||
o = s.taboption('second', form.Flag, 'custom_subnets_list_enabled', _('Custom subnets enable'));
|
||||
o.default = '0';
|
||||
o.rmempty = false;
|
||||
o.depends('second_enable', '1');
|
||||
|
||||
o = s.taboption('second', form.DynamicList, 'custom_subnets', _('Your subnet'));
|
||||
o.placeholder = 'Subnets list';
|
||||
o.depends('custom_subnets_list_enabled', '1');
|
||||
o.rmempty = false;
|
||||
|
||||
return m.render();
|
||||
return map_promise;
|
||||
}
|
||||
});
|
||||
@@ -0,0 +1,152 @@
|
||||
'use strict';
|
||||
'require baseclass';
|
||||
'require ui';
|
||||
'require fs';
|
||||
'require view.podkop.constants as constants';
|
||||
|
||||
// Flag to track if this is the first error check
|
||||
let isInitialCheck = true;
|
||||
|
||||
// Set to track which errors we've already seen
|
||||
const lastErrorsSet = new Set();
|
||||
|
||||
// Timer for periodic error polling
|
||||
let errorPollTimer = null;
|
||||
|
||||
// Helper function to fetch errors from the podkop command
|
||||
async function getPodkopErrors() {
|
||||
return new Promise(resolve => {
|
||||
safeExec('/usr/bin/podkop', ['check_logs'], 'P0_PRIORITY', result => {
|
||||
if (!result || !result.stdout) return resolve([]);
|
||||
|
||||
const logs = result.stdout.split('\n');
|
||||
const errors = logs.filter(log =>
|
||||
log.includes('[critical]')
|
||||
);
|
||||
|
||||
resolve(errors);
|
||||
});
|
||||
});
|
||||
}
|
||||
|
||||
// Show error notification to the user
|
||||
function showErrorNotification(error, isMultiple = false) {
|
||||
const notificationContent = E('div', { 'class': 'alert-message error' }, [
|
||||
E('pre', { 'class': 'error-log' }, error)
|
||||
]);
|
||||
|
||||
ui.addNotification(null, notificationContent);
|
||||
}
|
||||
|
||||
// Helper function for command execution with prioritization
|
||||
function safeExec(command, args, priority, callback, timeout = constants.COMMAND_TIMEOUT) {
|
||||
// Default to highest priority execution if priority is not provided or invalid
|
||||
let schedulingDelay = constants.COMMAND_SCHEDULING.P0_PRIORITY;
|
||||
|
||||
// If priority is a string, try to get the corresponding delay value
|
||||
if (typeof priority === 'string' && constants.COMMAND_SCHEDULING[priority] !== undefined) {
|
||||
schedulingDelay = constants.COMMAND_SCHEDULING[priority];
|
||||
}
|
||||
|
||||
const executeCommand = async () => {
|
||||
try {
|
||||
const controller = new AbortController();
|
||||
const timeoutId = setTimeout(() => controller.abort(), timeout);
|
||||
|
||||
const result = await Promise.race([
|
||||
fs.exec(command, args),
|
||||
new Promise((_, reject) => {
|
||||
controller.signal.addEventListener('abort', () => {
|
||||
reject(new Error('Command execution timed out'));
|
||||
});
|
||||
})
|
||||
]);
|
||||
|
||||
clearTimeout(timeoutId);
|
||||
|
||||
if (callback && typeof callback === 'function') {
|
||||
callback(result);
|
||||
}
|
||||
|
||||
return result;
|
||||
} catch (error) {
|
||||
console.warn(`Command execution failed or timed out: ${command} ${args.join(' ')}`);
|
||||
const errorResult = { stdout: '', stderr: error.message, error: error };
|
||||
|
||||
if (callback && typeof callback === 'function') {
|
||||
callback(errorResult);
|
||||
}
|
||||
|
||||
return errorResult;
|
||||
}
|
||||
};
|
||||
|
||||
if (callback && typeof callback === 'function') {
|
||||
setTimeout(executeCommand, schedulingDelay);
|
||||
return;
|
||||
}
|
||||
else {
|
||||
return executeCommand();
|
||||
}
|
||||
}
|
||||
|
||||
// Check for critical errors and show notifications
|
||||
async function checkForCriticalErrors() {
|
||||
try {
|
||||
const errors = await getPodkopErrors();
|
||||
|
||||
if (errors && errors.length > 0) {
|
||||
// Filter out errors we've already seen
|
||||
const newErrors = errors.filter(error => !lastErrorsSet.has(error));
|
||||
|
||||
if (newErrors.length > 0) {
|
||||
// On initial check, just store errors without showing notifications
|
||||
if (!isInitialCheck) {
|
||||
// Show each new error as a notification
|
||||
newErrors.forEach(error => {
|
||||
showErrorNotification(error, newErrors.length > 1);
|
||||
});
|
||||
}
|
||||
|
||||
// Add new errors to our set of seen errors
|
||||
newErrors.forEach(error => lastErrorsSet.add(error));
|
||||
}
|
||||
}
|
||||
|
||||
// After first check, mark as no longer initial
|
||||
isInitialCheck = false;
|
||||
} catch (error) {
|
||||
console.error('Error checking for critical messages:', error);
|
||||
}
|
||||
}
|
||||
|
||||
// Start polling for errors at regular intervals
|
||||
function startErrorPolling() {
|
||||
if (errorPollTimer) {
|
||||
clearInterval(errorPollTimer);
|
||||
}
|
||||
|
||||
// Reset initial check flag to make sure we show errors
|
||||
isInitialCheck = false;
|
||||
|
||||
// Immediately check for errors on start
|
||||
checkForCriticalErrors();
|
||||
|
||||
// Then set up periodic checks
|
||||
errorPollTimer = setInterval(checkForCriticalErrors, constants.ERROR_POLL_INTERVAL);
|
||||
}
|
||||
|
||||
// Stop polling for errors
|
||||
function stopErrorPolling() {
|
||||
if (errorPollTimer) {
|
||||
clearInterval(errorPollTimer);
|
||||
errorPollTimer = null;
|
||||
}
|
||||
}
|
||||
|
||||
return baseclass.extend({
|
||||
startErrorPolling,
|
||||
stopErrorPolling,
|
||||
checkForCriticalErrors,
|
||||
safeExec
|
||||
});
|
||||
30
luci-app-podkop/msgmerge.sh
Normal file
30
luci-app-podkop/msgmerge.sh
Normal file
@@ -0,0 +1,30 @@
|
||||
#!/bin/bash
|
||||
set -euo pipefail
|
||||
|
||||
PODIR="po"
|
||||
POTFILE="$PODIR/templates/podkop.pot"
|
||||
WIDTH=120
|
||||
|
||||
if [ $# -ne 1 ]; then
|
||||
echo "Usage: $0 <language_code> (e.g., ru, de, fr)"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
LANG="$1"
|
||||
POFILE="$PODIR/$LANG/podkop.po"
|
||||
|
||||
if [ ! -f "$POTFILE" ]; then
|
||||
echo "Template $POTFILE not found. Run xgettext first."
|
||||
exit 1
|
||||
fi
|
||||
|
||||
if [ -f "$POFILE" ]; then
|
||||
echo "Updating $POFILE"
|
||||
msgmerge --update --width="$WIDTH" --no-location "$POFILE" "$POTFILE"
|
||||
else
|
||||
echo "Creating new $POFILE using msginit"
|
||||
mkdir -p "$PODIR/$LANG"
|
||||
msginit --no-translator --no-location --locale="$LANG" --width="$WIDTH" --input="$POTFILE" --output-file="$POFILE"
|
||||
fi
|
||||
|
||||
echo "Translation file for $LANG updated."
|
||||
627
luci-app-podkop/po/ru/podkop.po
Normal file
627
luci-app-podkop/po/ru/podkop.po
Normal file
@@ -0,0 +1,627 @@
|
||||
# Russian translations for PODKOP package.
|
||||
# Copyright (C) 2025 THE PODKOP'S COPYRIGHT HOLDER
|
||||
# This file is distributed under the same license as the PODKOP package.
|
||||
# Automatically generated, 2025.
|
||||
#
|
||||
msgid ""
|
||||
msgstr ""
|
||||
"Project-Id-Version: PODKOP\n"
|
||||
"Report-Msgid-Bugs-To: \n"
|
||||
"POT-Creation-Date: 2025-10-02 19:37+0500\n"
|
||||
"PO-Revision-Date: 2025-09-30 15:18+0500\n"
|
||||
"Last-Translator: Automatically generated\n"
|
||||
"Language-Team: none\n"
|
||||
"Language: ru\n"
|
||||
"MIME-Version: 1.0\n"
|
||||
"Content-Type: text/plain; charset=UTF-8\n"
|
||||
"Content-Transfer-Encoding: 8bit\n"
|
||||
"Plural-Forms: nplurals=3; plural=(n%10==1 && n%100!=11 ? 0 : n%10>=2 && n%10<=4 && (n%100<10 || n%100>=20) ? 1 : 2);\n"
|
||||
|
||||
msgid "Additional Settings"
|
||||
msgstr "Дополнительные настройки"
|
||||
|
||||
msgid "Yacd enable"
|
||||
msgstr "Включить Yacd"
|
||||
|
||||
msgid "Exclude NTP"
|
||||
msgstr "Исключить NTP"
|
||||
|
||||
msgid "Allows you to exclude NTP protocol traffic from the tunnel"
|
||||
msgstr "Позволяет исключить направление трафика NTP-протокола в туннель"
|
||||
|
||||
msgid "QUIC disable"
|
||||
msgstr "Отключить QUIC"
|
||||
|
||||
msgid "For issues with the video stream"
|
||||
msgstr "Для проблем с видеопотоком"
|
||||
|
||||
msgid "List Update Frequency"
|
||||
msgstr "Частота обновления списков"
|
||||
|
||||
msgid "Select how often the lists will be updated"
|
||||
msgstr "Выберите как часто будут обновляться списки"
|
||||
|
||||
msgid "DNS Protocol Type"
|
||||
msgstr "Тип DNS протокола"
|
||||
|
||||
msgid "Select DNS protocol to use"
|
||||
msgstr "Выберите протокол DNS"
|
||||
|
||||
msgid "DNS over HTTPS (DoH)"
|
||||
msgstr "DNS через HTTPS (DoH)"
|
||||
|
||||
msgid "DNS over TLS (DoT)"
|
||||
msgstr "DNS через TLS (DoT)"
|
||||
|
||||
msgid "UDP (Unprotected DNS)"
|
||||
msgstr "UDP (Незащищённый DNS)"
|
||||
|
||||
msgid "DNS Server"
|
||||
msgstr "DNS-сервер"
|
||||
|
||||
msgid "Select or enter DNS server address"
|
||||
msgstr "Выберите или введите адрес DNS-сервера"
|
||||
|
||||
msgid "DNS server address cannot be empty"
|
||||
msgstr "Адрес DNS-сервера не может быть пустым"
|
||||
|
||||
msgid "Invalid DNS server format. Examples: 8.8.8.8 or dns.example.com or dns.example.com/nicedns for DoH"
|
||||
msgstr "Неверный формат DNS-сервера. Примеры: 8.8.8.8 или dns.example.com или dns.example.com/nicedns для DoH"
|
||||
|
||||
msgid "Bootstrap DNS server"
|
||||
msgstr "Bootstrap DNS-сервер"
|
||||
|
||||
msgid "The DNS server used to look up the IP address of an upstream DNS server"
|
||||
msgstr "DNS-сервер, используемый для поиска IP-адреса вышестоящего DNS-сервера"
|
||||
|
||||
msgid "Invalid DNS server format. Example: 8.8.8.8"
|
||||
msgstr "Неверный формат DNS-сервера. Пример: 8.8.8.8"
|
||||
|
||||
msgid "DNS Rewrite TTL"
|
||||
msgstr "Перезапись TTL для DNS"
|
||||
|
||||
msgid "Time in seconds for DNS record caching (default: 60)"
|
||||
msgstr "Время в секундах для кэширования DNS записей (по умолчанию: 60)"
|
||||
|
||||
msgid "TTL value cannot be empty"
|
||||
msgstr "Значение TTL не может быть пустым"
|
||||
|
||||
msgid "TTL must be a positive number"
|
||||
msgstr "TTL должно быть положительным числом"
|
||||
|
||||
msgid "Config File Path"
|
||||
msgstr "Путь к файлу конфигурации"
|
||||
|
||||
msgid "Select path for sing-box config file. Change this ONLY if you know what you are doing"
|
||||
msgstr "Выберите путь к файлу конфигурации sing-box. Изменяйте это, ТОЛЬКО если вы знаете, что делаете"
|
||||
|
||||
msgid "Cache File Path"
|
||||
msgstr "Путь к файлу кэша"
|
||||
|
||||
msgid "Select or enter path for sing-box cache file. Change this ONLY if you know what you are doing"
|
||||
msgstr "Выберите или введите путь к файлу кеша sing-box. Изменяйте это, ТОЛЬКО если вы знаете, что делаете"
|
||||
|
||||
msgid "Cache file path cannot be empty"
|
||||
msgstr "Путь к файлу кэша не может быть пустым"
|
||||
|
||||
msgid "Path must be absolute (start with /)"
|
||||
msgstr "Путь должен быть абсолютным (начинаться с /)"
|
||||
|
||||
msgid "Path must end with cache.db"
|
||||
msgstr "Путь должен заканчиваться на cache.db"
|
||||
|
||||
msgid "Path must contain at least one directory (like /tmp/cache.db)"
|
||||
msgstr "Путь должен содержать хотя бы одну директорию (например /tmp/cache.db)"
|
||||
|
||||
msgid "Source Network Interface"
|
||||
msgstr "Сетевой интерфейс источника"
|
||||
|
||||
msgid "Select the network interface from which the traffic will originate"
|
||||
msgstr "Выберите сетевой интерфейс, с которого будет исходить трафик"
|
||||
|
||||
msgid "Interface monitoring"
|
||||
msgstr "Мониторинг интерфейсов"
|
||||
|
||||
msgid "Interface monitoring for bad WAN"
|
||||
msgstr "Мониторинг интерфейсов для плохого WAN"
|
||||
|
||||
msgid "Interface for monitoring"
|
||||
msgstr "Интерфейс для мониторинга"
|
||||
|
||||
msgid "Select the WAN interfaces to be monitored"
|
||||
msgstr "Выберите WAN интерфейсы для мониторинга"
|
||||
|
||||
msgid "Interface Monitoring Delay"
|
||||
msgstr "Задержка при мониторинге интерфейсов"
|
||||
|
||||
msgid "Delay in milliseconds before reloading podkop after interface UP"
|
||||
msgstr "Задержка в миллисекундах перед перезагрузкой podkop после поднятия интерфейса"
|
||||
|
||||
msgid "Delay value cannot be empty"
|
||||
msgstr "Значение задержки не может быть пустым"
|
||||
|
||||
msgid "Dont touch my DHCP!"
|
||||
msgstr "Не трогать мой DHCP!"
|
||||
|
||||
msgid "Podkop will not change the DHCP config"
|
||||
msgstr "Podkop не будет изменять конфигурацию DHCP"
|
||||
|
||||
msgid "Proxy download of lists"
|
||||
msgstr "Загрузка списков через прокси"
|
||||
|
||||
msgid "Downloading all lists via main Proxy/VPN"
|
||||
msgstr "Загрузка всех списков через основной прокси/VPN"
|
||||
|
||||
msgid "IP for exclusion"
|
||||
msgstr "IP для исключения"
|
||||
|
||||
msgid "Specify local IP addresses that will never use the configured route"
|
||||
msgstr "Укажите локальные IP-адреса, которые никогда не будут использовать настроенный маршрут"
|
||||
|
||||
msgid "Local IPs"
|
||||
msgstr "Локальные IP адреса"
|
||||
|
||||
msgid "Enter valid IPv4 addresses"
|
||||
msgstr "Введите действительные IPv4-адреса"
|
||||
|
||||
msgid "Invalid IP format. Use format: X.X.X.X (like 192.168.1.1)"
|
||||
msgstr "Неверный формат IP. Используйте формат: X.X.X.X (например: 192.168.1.1)"
|
||||
|
||||
msgid "IP address parts must be between 0 and 255"
|
||||
msgstr "Части IP-адреса должны быть между 0 и 255"
|
||||
|
||||
msgid "Mixed enable"
|
||||
msgstr "Включить смешанный режим"
|
||||
|
||||
msgid "Browser port: 2080"
|
||||
msgstr "Порт браузера: 2080"
|
||||
|
||||
msgid "URL must use one of the following protocols: "
|
||||
msgstr "URL должен использовать один из следующих протоколов: "
|
||||
|
||||
msgid "Invalid URL format"
|
||||
msgstr "Неверный формат URL"
|
||||
|
||||
msgid "Basic Settings"
|
||||
msgstr "Основные настройки"
|
||||
|
||||
msgid "Connection Type"
|
||||
msgstr "Тип подключения"
|
||||
|
||||
msgid "Select between VPN and Proxy connection methods for traffic routing"
|
||||
msgstr "Выберите между VPN и Proxy методами для маршрутизации трафика"
|
||||
|
||||
msgid "Configuration Type"
|
||||
msgstr "Тип конфигурации"
|
||||
|
||||
msgid "Select how to configure the proxy"
|
||||
msgstr "Выберите способ настройки прокси"
|
||||
|
||||
msgid "Connection URL"
|
||||
msgstr "URL подключения"
|
||||
|
||||
msgid "Outbound Config"
|
||||
msgstr "Конфигурация Outbound"
|
||||
|
||||
msgid "URLTest"
|
||||
msgstr "URLTest"
|
||||
|
||||
msgid "Proxy Configuration URL"
|
||||
msgstr "URL конфигурации прокси"
|
||||
|
||||
msgid "Current config: "
|
||||
msgstr "Текущая конфигурация: "
|
||||
|
||||
msgid "Config without description"
|
||||
msgstr "Конфигурация без описания"
|
||||
|
||||
msgid ""
|
||||
"Enter connection string starting with vless:// or ss:// for proxy configuration. Add comments with // for backup "
|
||||
"configs"
|
||||
msgstr ""
|
||||
"Введите строку подключения, начинающуюся с vless:// или ss:// для настройки прокси. Добавляйте комментарии с // для "
|
||||
"сохранения других конфигураций"
|
||||
|
||||
msgid "No active configuration found. At least one non-commented line is required."
|
||||
msgstr "Активная конфигурация не найдена. Требуется хотя бы одна незакомментированная строка."
|
||||
|
||||
msgid "URL must start with vless:// or ss://"
|
||||
msgstr "URL должен начинаться с vless:// или ss://"
|
||||
|
||||
msgid "Invalid Shadowsocks URL format: missing method and password separator \":\""
|
||||
msgstr "Неверный формат URL Shadowsocks: отсутствует разделитель метода и пароля \":\""
|
||||
|
||||
msgid "Invalid Shadowsocks URL format"
|
||||
msgstr "Неверный формат URL Shadowsocks"
|
||||
|
||||
msgid "Invalid Shadowsocks URL: missing server address"
|
||||
msgstr "Неверный URL Shadowsocks: отсутствует адрес сервера"
|
||||
|
||||
msgid "Invalid Shadowsocks URL: missing server"
|
||||
msgstr "Неверный URL Shadowsocks: отсутствует сервер"
|
||||
|
||||
msgid "Invalid Shadowsocks URL: missing port"
|
||||
msgstr "Неверный URL Shadowsocks: отсутствует порт"
|
||||
|
||||
msgid "Invalid port number. Must be between 1 and 65535"
|
||||
msgstr "Неверный номер порта. Должен быть между 1 и 65535"
|
||||
|
||||
msgid "Invalid Shadowsocks URL: missing or invalid server/port format"
|
||||
msgstr "Неверный URL Shadowsocks: отсутствует или неверный формат сервера/порта"
|
||||
|
||||
msgid "Invalid VLESS URL: missing UUID"
|
||||
msgstr "Неверный URL VLESS: отсутствует UUID"
|
||||
|
||||
msgid "Invalid VLESS URL: missing server address"
|
||||
msgstr "Неверный URL VLESS: отсутствует адрес сервера"
|
||||
|
||||
msgid "Invalid VLESS URL: missing server"
|
||||
msgstr "Неверный URL VLESS: отсутствует сервер"
|
||||
|
||||
msgid "Invalid VLESS URL: missing port"
|
||||
msgstr "Неверный URL VLESS: отсутствует порт"
|
||||
|
||||
msgid "Invalid VLESS URL: missing or invalid server/port format"
|
||||
msgstr "Неверный URL VLESS: отсутствует или неверный формат сервера/порта"
|
||||
|
||||
msgid "Invalid VLESS URL: missing query parameters"
|
||||
msgstr "Неверный URL VLESS: отсутствуют параметры запроса"
|
||||
|
||||
msgid "Invalid VLESS URL: type must be one of tcp, raw, udp, grpc, http, ws"
|
||||
msgstr "Неверный URL VLESS: тип должен быть одним из tcp, raw, udp, grpc, http, ws"
|
||||
|
||||
msgid "Invalid VLESS URL: security must be one of tls, reality, none"
|
||||
msgstr "Неверный URL VLESS: security должен быть одним из tls, reality, none"
|
||||
|
||||
msgid "Invalid VLESS URL: missing pbk parameter for reality security"
|
||||
msgstr "Неверный URL VLESS: отсутствует параметр pbk для security reality"
|
||||
|
||||
msgid "Invalid VLESS URL: missing fp parameter for reality security"
|
||||
msgstr "Неверный URL VLESS: отсутствует параметр fp для security reality"
|
||||
|
||||
msgid "Invalid URL format: "
|
||||
msgstr "Неверный формат URL: "
|
||||
|
||||
msgid "Outbound Configuration"
|
||||
msgstr "Конфигурация исходящего соединения"
|
||||
|
||||
msgid "Enter complete outbound configuration in JSON format"
|
||||
msgstr "Введите полную конфигурацию исходящего соединения в формате JSON"
|
||||
|
||||
msgid "JSON must contain at least type, server and server_port fields"
|
||||
msgstr "JSON должен содержать как минимум поля type, server и server_port"
|
||||
|
||||
msgid "Invalid JSON format"
|
||||
msgstr "Неверный формат JSON"
|
||||
|
||||
msgid "URLTest Proxy Links"
|
||||
msgstr "Ссылки прокси для URLTest"
|
||||
|
||||
msgid "Shadowsocks UDP over TCP"
|
||||
msgstr "Shadowsocks UDP через TCP"
|
||||
|
||||
msgid "Apply for SS2022"
|
||||
msgstr "Применить для SS2022"
|
||||
|
||||
msgid "Network Interface"
|
||||
msgstr "Сетевой интерфейс"
|
||||
|
||||
msgid "Select network interface for VPN connection"
|
||||
msgstr "Выберите сетевой интерфейс для VPN подключения"
|
||||
|
||||
msgid "Domain Resolver"
|
||||
msgstr "Резолвер доменов"
|
||||
|
||||
msgid "Enable built-in DNS resolver for domains handled by this section"
|
||||
msgstr "Включить встроенный DNS-резолвер для доменов, обрабатываемых в этом разделе"
|
||||
|
||||
msgid "Select the DNS protocol type for the domain resolver"
|
||||
msgstr "Выберите протокол DNS для резолвера доменов"
|
||||
|
||||
msgid "Community Lists"
|
||||
msgstr "Списки сообщества"
|
||||
|
||||
msgid "Service List"
|
||||
msgstr "Список сервисов"
|
||||
|
||||
msgid "Select predefined service for routing"
|
||||
msgstr "Выберите предустановленные сервисы для маршрутизации"
|
||||
|
||||
msgid "Regional options cannot be used together"
|
||||
msgstr "Нельзя использовать несколько региональных опций"
|
||||
|
||||
#, javascript-format
|
||||
msgid "Warning: %s cannot be used together with %s. Previous selections have been removed."
|
||||
msgstr "Предупреждение: %s нельзя использовать вместе с %s. Предыдущие варианты были удалены."
|
||||
|
||||
msgid "Russia inside restrictions"
|
||||
msgstr "Ограничения Russia inside"
|
||||
|
||||
#, javascript-format
|
||||
msgid ""
|
||||
"Warning: Russia inside can only be used with %s. %s already in Russia inside and have been removed from selection."
|
||||
msgstr ""
|
||||
"Внимание: \"Russia inside\" может использоваться только с %s. %s уже находится в \"Russia inside\" и был удален из "
|
||||
"выбора."
|
||||
|
||||
msgid "User Domain List Type"
|
||||
msgstr "Тип пользовательского списка доменов"
|
||||
|
||||
msgid "Select how to add your custom domains"
|
||||
msgstr "Выберите способ добавления пользовательских доменов"
|
||||
|
||||
msgid "Disabled"
|
||||
msgstr "Отключено"
|
||||
|
||||
msgid "Dynamic List"
|
||||
msgstr "Динамический список"
|
||||
|
||||
msgid "Text List"
|
||||
msgstr "Текстовый список"
|
||||
|
||||
msgid "User Domains"
|
||||
msgstr "Пользовательские домены"
|
||||
|
||||
msgid "Enter domain names without protocols (example: sub.example.com or example.com)"
|
||||
msgstr "Введите доменные имена без указания протоколов (например: sub.example.com или example.com)"
|
||||
|
||||
msgid "Invalid domain format. Enter domain without protocol (example: sub.example.com or ru)"
|
||||
msgstr "Введите имена доменов без протоколов (пример: sub.example.com или example.com)"
|
||||
|
||||
msgid "User Domains List"
|
||||
msgstr "Список пользовательских доменов"
|
||||
|
||||
msgid "Enter domain names separated by comma, space or newline. You can add comments after //"
|
||||
msgstr ""
|
||||
"Введите имена доменов, разделяя их запятой, пробелом или с новой строки. Вы можете добавлять комментарии после //"
|
||||
|
||||
#, javascript-format
|
||||
msgid "Invalid domain format: %s. Enter domain without protocol"
|
||||
msgstr "Неверный формат домена: %s. Введите домен без протокола"
|
||||
|
||||
msgid "At least one valid domain must be specified. Comments-only content is not allowed."
|
||||
msgstr ""
|
||||
"Должен быть указан хотя бы один действительный домен. Содержимое, состоящее только из комментариев, не допускается."
|
||||
|
||||
msgid "Local Domain Lists"
|
||||
msgstr "Локальные списки доменов"
|
||||
|
||||
msgid "Use the list from the router filesystem"
|
||||
msgstr "Использовать список из файловой системы роутера"
|
||||
|
||||
msgid "Local Domain List Paths"
|
||||
msgstr "Пути к локальным спискам доменов"
|
||||
|
||||
msgid "Enter the list file path"
|
||||
msgstr "Введите путь к файлу списка"
|
||||
|
||||
msgid "Invalid path format. Path must start with \"/\" and contain valid characters"
|
||||
msgstr "Неверный формат пути. Путь должен начинаться с \"/\" и содержать допустимые символы"
|
||||
|
||||
msgid "Remote Domain Lists"
|
||||
msgstr "Удаленные списки доменов"
|
||||
|
||||
msgid "Download and use domain lists from remote URLs"
|
||||
msgstr "Загрузка и использование списков доменов с удаленных URL"
|
||||
|
||||
msgid "Remote Domain URLs"
|
||||
msgstr "URL удаленных доменов"
|
||||
|
||||
msgid "Enter full URLs starting with http:// or https://"
|
||||
msgstr "Введите полные URL, начинающиеся с http:// или https://"
|
||||
|
||||
msgid "Local Subnet Lists"
|
||||
msgstr "Локальные списки подсетей"
|
||||
|
||||
msgid "Local Subnet List Paths"
|
||||
msgstr "Пути к локальным спискам подсетей"
|
||||
|
||||
msgid "User Subnet List Type"
|
||||
msgstr "Тип пользовательского списка подсетей"
|
||||
|
||||
msgid "Select how to add your custom subnets"
|
||||
msgstr "Выберите способ добавления пользовательских подсетей"
|
||||
|
||||
msgid "Text List (comma/space/newline separated)"
|
||||
msgstr "Текстовый список (разделенный запятыми/пробелами/новыми строками)"
|
||||
|
||||
msgid "User Subnets"
|
||||
msgstr "Пользовательские подсети"
|
||||
|
||||
msgid "Enter subnets in CIDR notation (example: 103.21.244.0/22) or single IP addresses"
|
||||
msgstr "Введите подсети в нотации CIDR (пример: 103.21.244.0/22) или отдельные IP-адреса"
|
||||
|
||||
msgid "Invalid format. Use format: X.X.X.X or X.X.X.X/Y"
|
||||
msgstr "Неверный формат. Используйте формат: X.X.X.X или X.X.X.X/Y"
|
||||
|
||||
msgid "IP address 0.0.0.0 is not allowed"
|
||||
msgstr "IP адрес не может быть 0.0.0.0"
|
||||
|
||||
msgid "CIDR must be between 0 and 32"
|
||||
msgstr "CIDR должен быть между 0 и 32"
|
||||
|
||||
msgid "User Subnets List"
|
||||
msgstr "Список пользовательских подсетей"
|
||||
|
||||
msgid ""
|
||||
"Enter subnets in CIDR notation or single IP addresses, separated by comma, space or newline. You can add comments "
|
||||
"after //"
|
||||
msgstr ""
|
||||
"Введите подсети в нотации CIDR или отдельные IP-адреса, разделенные запятой, пробелом или новой строкой. Вы можете "
|
||||
"добавлять комментарии после //"
|
||||
|
||||
#, javascript-format
|
||||
msgid "Invalid format: %s. Use format: X.X.X.X or X.X.X.X/Y"
|
||||
msgstr "Неверный формат: %s. Используйте формат: X.X.X.X или X.X.X.X/Y"
|
||||
|
||||
#, javascript-format
|
||||
msgid "IP parts must be between 0 and 255 in: %s"
|
||||
msgstr "Части IP-адреса должны быть между 0 и 255 в: %s"
|
||||
|
||||
#, javascript-format
|
||||
msgid "CIDR must be between 0 and 32 in: %s"
|
||||
msgstr "CIDR должен быть между 0 и 32 в: %s"
|
||||
|
||||
msgid "At least one valid subnet or IP must be specified. Comments-only content is not allowed."
|
||||
msgstr ""
|
||||
"Должна быть указана хотя бы одна действительная подсеть или IP. Содержимое, состоящее только из комментариев, не "
|
||||
"допускается."
|
||||
|
||||
msgid "Remote Subnet Lists"
|
||||
msgstr "Удаленные списки подсетей"
|
||||
|
||||
msgid "Download and use subnet lists from remote URLs"
|
||||
msgstr "Загрузка и использование списков подсетей с удаленных URL"
|
||||
|
||||
msgid "Remote Subnet URLs"
|
||||
msgstr "URL удаленных подсетей"
|
||||
|
||||
msgid "IP for full redirection"
|
||||
msgstr "IP для полного перенаправления"
|
||||
|
||||
msgid "Specify local IP addresses whose traffic will always use the configured route"
|
||||
msgstr "Укажите локальные IP-адреса, трафик которых всегда будет использовать настроенный маршрут"
|
||||
|
||||
msgid "Copied!"
|
||||
msgstr "Скопировано!"
|
||||
|
||||
msgid "Failed to copy: "
|
||||
msgstr "Не удалось скопировать: "
|
||||
|
||||
msgid "Copy to Clipboard"
|
||||
msgstr "Копировать в буфер обмена"
|
||||
|
||||
msgid "Close"
|
||||
msgstr "Закрыть"
|
||||
|
||||
msgid "Loading..."
|
||||
msgstr "Загрузка..."
|
||||
|
||||
msgid "No output"
|
||||
msgstr "Нет вывода"
|
||||
|
||||
msgid "FakeIP is working in browser!"
|
||||
msgstr "FakeIP работает в браузере!"
|
||||
|
||||
msgid "FakeIP is not working in browser"
|
||||
msgstr "FakeIP не работает в браузере"
|
||||
|
||||
msgid "Check DNS server on current device (PC, phone)"
|
||||
msgstr "Проверьте DNS сервер на текущем устройстве (ПК, телефон)"
|
||||
|
||||
msgid "Its must be router!"
|
||||
msgstr "Это должен быть роутер!"
|
||||
|
||||
msgid "Proxy working correctly"
|
||||
msgstr "Прокси работает корректно"
|
||||
|
||||
msgid "Direct IP: "
|
||||
msgstr "Прямой IP: "
|
||||
|
||||
msgid "Proxy IP: "
|
||||
msgstr "Прокси IP: "
|
||||
|
||||
msgid "Proxy is not working - same IP for both domains"
|
||||
msgstr "Прокси не работает - одинаковый IP для обоих доменов"
|
||||
|
||||
msgid "IP: "
|
||||
msgstr "IP: "
|
||||
|
||||
msgid "Proxy check failed"
|
||||
msgstr "Проверка прокси не удалась"
|
||||
|
||||
msgid "Check failed: "
|
||||
msgstr "Проверка не удалась: "
|
||||
|
||||
msgid "timeout"
|
||||
msgstr "таймаут"
|
||||
|
||||
msgid "Error: "
|
||||
msgstr "Ошибка: "
|
||||
|
||||
msgid "Podkop Status"
|
||||
msgstr "Статус Podkop"
|
||||
|
||||
msgid "Global check"
|
||||
msgstr "Глобальная проверка"
|
||||
|
||||
msgid "Click here for all the info"
|
||||
msgstr "Нажмите для просмотра всей информации"
|
||||
|
||||
msgid "Update Lists"
|
||||
msgstr "Обновить списки"
|
||||
|
||||
msgid "Lists Update Results"
|
||||
msgstr "Результаты обновления списков"
|
||||
|
||||
msgid "Sing-box Status"
|
||||
msgstr "Статус Sing-box"
|
||||
|
||||
msgid "Check NFT Rules"
|
||||
msgstr "Проверить правила NFT"
|
||||
|
||||
msgid "NFT Rules"
|
||||
msgstr "Правила NFT"
|
||||
|
||||
msgid "Check DNSMasq"
|
||||
msgstr "Проверить DNSMasq"
|
||||
|
||||
msgid "DNSMasq Configuration"
|
||||
msgstr "Конфигурация DNSMasq"
|
||||
|
||||
msgid "FakeIP Status"
|
||||
msgstr "Статус FakeIP"
|
||||
|
||||
msgid "DNS Status"
|
||||
msgstr "Статус DNS"
|
||||
|
||||
msgid "Main config"
|
||||
msgstr "Основная конфигурация"
|
||||
|
||||
msgid "Version Information"
|
||||
msgstr "Информация о версии"
|
||||
|
||||
msgid "Podkop: "
|
||||
msgstr "Podkop: "
|
||||
|
||||
msgid "LuCI App: "
|
||||
msgstr "LuCI App: "
|
||||
|
||||
msgid "Sing-box: "
|
||||
msgstr "Sing-box: "
|
||||
|
||||
msgid "OpenWrt Version: "
|
||||
msgstr "Версия OpenWrt: "
|
||||
|
||||
msgid "Device Model: "
|
||||
msgstr "Модель устройства: "
|
||||
|
||||
msgid "Unknown"
|
||||
msgstr "Неизвестно"
|
||||
|
||||
msgid "works in browser"
|
||||
msgstr "работает в браузере"
|
||||
|
||||
msgid "does not work in browser"
|
||||
msgstr "не работает в браузере"
|
||||
|
||||
msgid "works on router"
|
||||
msgstr "не работает в браузере"
|
||||
|
||||
msgid "does not work on router"
|
||||
msgstr "не работает на роутере"
|
||||
|
||||
msgid "Config: "
|
||||
msgstr "Конфигурация: "
|
||||
|
||||
msgid "Diagnostics"
|
||||
msgstr "Диагностика"
|
||||
|
||||
msgid "Podkop"
|
||||
msgstr "Podkop"
|
||||
|
||||
msgid "Extra configurations"
|
||||
msgstr "Дополнительные конфигурации"
|
||||
|
||||
msgid "Add Section"
|
||||
msgstr "Добавить раздел"
|
||||
856
luci-app-podkop/po/templates/podkop.pot
Normal file
856
luci-app-podkop/po/templates/podkop.pot
Normal file
@@ -0,0 +1,856 @@
|
||||
# SOME DESCRIPTIVE TITLE.
|
||||
# Copyright (C) YEAR THE PACKAGE'S COPYRIGHT HOLDER
|
||||
# This file is distributed under the same license as the PODKOP package.
|
||||
# FIRST AUTHOR <EMAIL@ADDRESS>, YEAR.
|
||||
#
|
||||
#, fuzzy
|
||||
msgid ""
|
||||
msgstr ""
|
||||
"Project-Id-Version: PODKOP\n"
|
||||
"Report-Msgid-Bugs-To: \n"
|
||||
"POT-Creation-Date: 2025-10-02 19:37+0500\n"
|
||||
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
|
||||
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
|
||||
"Language-Team: LANGUAGE <LL@li.org>\n"
|
||||
"Language: \n"
|
||||
"MIME-Version: 1.0\n"
|
||||
"Content-Type: text/plain; charset=CHARSET\n"
|
||||
"Content-Transfer-Encoding: 8bit\n"
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:8
|
||||
msgid "Additional Settings"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:10
|
||||
msgid "Yacd enable"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:15
|
||||
msgid "Exclude NTP"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:15
|
||||
msgid "Allows you to exclude NTP protocol traffic from the tunnel"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:20
|
||||
msgid "QUIC disable"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:20
|
||||
msgid "For issues with the video stream"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:25
|
||||
msgid "List Update Frequency"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:25
|
||||
msgid "Select how often the lists will be updated"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:33
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:249
|
||||
msgid "DNS Protocol Type"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:33
|
||||
msgid "Select DNS protocol to use"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:34
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:250
|
||||
msgid "DNS over HTTPS (DoH)"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:35
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:251
|
||||
msgid "DNS over TLS (DoT)"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:36
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:252
|
||||
msgid "UDP (Unprotected DNS)"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:41
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:258
|
||||
msgid "DNS Server"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:41
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:258
|
||||
msgid "Select or enter DNS server address"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:50
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:77
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:268
|
||||
msgid "DNS server address cannot be empty"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:57
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:275
|
||||
msgid "Invalid DNS server format. Examples: 8.8.8.8 or dns.example.com or dns.example.com/nicedns for DoH"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:63
|
||||
msgid "Bootstrap DNS server"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:63
|
||||
msgid "The DNS server used to look up the IP address of an upstream DNS server"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:83
|
||||
msgid "Invalid DNS server format. Example: 8.8.8.8"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:89
|
||||
msgid "DNS Rewrite TTL"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:89
|
||||
msgid "Time in seconds for DNS record caching (default: 60)"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:95
|
||||
msgid "TTL value cannot be empty"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:100
|
||||
msgid "TTL must be a positive number"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:106
|
||||
msgid "Config File Path"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:106
|
||||
msgid "Select path for sing-box config file. Change this ONLY if you know what you are doing"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:113
|
||||
msgid "Cache File Path"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:113
|
||||
msgid "Select or enter path for sing-box cache file. Change this ONLY if you know what you are doing"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:121
|
||||
msgid "Cache file path cannot be empty"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:125
|
||||
msgid "Path must be absolute (start with /)"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:129
|
||||
msgid "Path must end with cache.db"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:134
|
||||
msgid "Path must contain at least one directory (like /tmp/cache.db)"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:140
|
||||
msgid "Source Network Interface"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:140
|
||||
msgid "Select the network interface from which the traffic will originate"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:164
|
||||
msgid "Interface monitoring"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:164
|
||||
msgid "Interface monitoring for bad WAN"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:169
|
||||
msgid "Interface for monitoring"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:169
|
||||
msgid "Select the WAN interfaces to be monitored"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:177
|
||||
msgid "Interface Monitoring Delay"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:177
|
||||
msgid "Delay in milliseconds before reloading podkop after interface UP"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:184
|
||||
msgid "Delay value cannot be empty"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:189
|
||||
msgid "Dont touch my DHCP!"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:189
|
||||
msgid "Podkop will not change the DHCP config"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:194
|
||||
msgid "Proxy download of lists"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:194
|
||||
msgid "Downloading all lists via main Proxy/VPN"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:200
|
||||
msgid "IP for exclusion"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:200
|
||||
msgid "Specify local IP addresses that will never use the configured route"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:205
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:574
|
||||
msgid "Local IPs"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:205
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:574
|
||||
msgid "Enter valid IPv4 addresses"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:213
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:582
|
||||
msgid "Invalid IP format. Use format: X.X.X.X (like 192.168.1.1)"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:217
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:488
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:586
|
||||
msgid "IP address parts must be between 0 and 255"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:222
|
||||
msgid "Mixed enable"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/additionalTab.js:222
|
||||
msgid "Browser port: 2080"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:13
|
||||
msgid "URL must use one of the following protocols: "
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:17
|
||||
msgid "Invalid URL format"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:24
|
||||
msgid "Basic Settings"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:26
|
||||
msgid "Connection Type"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:26
|
||||
msgid "Select between VPN and Proxy connection methods for traffic routing"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:32
|
||||
msgid "Configuration Type"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:32
|
||||
msgid "Select how to configure the proxy"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:33
|
||||
msgid "Connection URL"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:34
|
||||
msgid "Outbound Config"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:35
|
||||
msgid "URLTest"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:40
|
||||
msgid "Proxy Configuration URL"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:64
|
||||
msgid "Current config: "
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:67
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:71
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:77
|
||||
msgid "Config without description"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:82
|
||||
msgid ""
|
||||
"Enter connection string starting with vless:// or ss:// for proxy configuration. Add comments with // for backup "
|
||||
"configs"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:100
|
||||
msgid "No active configuration found. At least one non-commented line is required."
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:104
|
||||
msgid "URL must start with vless:// or ss://"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:116
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:121
|
||||
msgid "Invalid Shadowsocks URL format: missing method and password separator \":\""
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:125
|
||||
msgid "Invalid Shadowsocks URL format"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:130
|
||||
msgid "Invalid Shadowsocks URL: missing server address"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:132
|
||||
msgid "Invalid Shadowsocks URL: missing server"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:134
|
||||
msgid "Invalid Shadowsocks URL: missing port"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:137
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:157
|
||||
msgid "Invalid port number. Must be between 1 and 65535"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:140
|
||||
msgid "Invalid Shadowsocks URL: missing or invalid server/port format"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:146
|
||||
msgid "Invalid VLESS URL: missing UUID"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:150
|
||||
msgid "Invalid VLESS URL: missing server address"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:152
|
||||
msgid "Invalid VLESS URL: missing server"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:154
|
||||
msgid "Invalid VLESS URL: missing port"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:160
|
||||
msgid "Invalid VLESS URL: missing or invalid server/port format"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:164
|
||||
msgid "Invalid VLESS URL: missing query parameters"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:170
|
||||
msgid "Invalid VLESS URL: type must be one of tcp, raw, udp, grpc, http, ws"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:176
|
||||
msgid "Invalid VLESS URL: security must be one of tls, reality, none"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:180
|
||||
msgid "Invalid VLESS URL: missing pbk parameter for reality security"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:181
|
||||
msgid "Invalid VLESS URL: missing fp parameter for reality security"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:188
|
||||
msgid "Invalid URL format: "
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:192
|
||||
msgid "Outbound Configuration"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:192
|
||||
msgid "Enter complete outbound configuration in JSON format"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:201
|
||||
msgid "JSON must contain at least type, server and server_port fields"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:205
|
||||
msgid "Invalid JSON format"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:209
|
||||
msgid "URLTest Proxy Links"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:214
|
||||
msgid "Shadowsocks UDP over TCP"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:214
|
||||
msgid "Apply for SS2022"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:220
|
||||
msgid "Network Interface"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:220
|
||||
msgid "Select network interface for VPN connection"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:243
|
||||
msgid "Domain Resolver"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:243
|
||||
msgid "Enable built-in DNS resolver for domains handled by this section"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:249
|
||||
msgid "Select the DNS protocol type for the domain resolver"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:281
|
||||
msgid "Community Lists"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:286
|
||||
msgid "Service List"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:286
|
||||
msgid "Select predefined service for routing"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:314
|
||||
msgid "Regional options cannot be used together"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:315
|
||||
#, javascript-format
|
||||
msgid "Warning: %s cannot be used together with %s. Previous selections have been removed."
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:325
|
||||
msgid "Russia inside restrictions"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:326
|
||||
#, javascript-format
|
||||
msgid ""
|
||||
"Warning: Russia inside can only be used with %s. %s already in Russia inside and have been removed from selection."
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:348
|
||||
msgid "User Domain List Type"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:348
|
||||
msgid "Select how to add your custom domains"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:349
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:465
|
||||
msgid "Disabled"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:350
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:466
|
||||
msgid "Dynamic List"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:351
|
||||
msgid "Text List"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:356
|
||||
msgid "User Domains"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:356
|
||||
msgid "Enter domain names without protocols (example: sub.example.com or example.com)"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:365
|
||||
msgid "Invalid domain format. Enter domain without protocol (example: sub.example.com or ru)"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:370
|
||||
msgid "User Domains List"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:370
|
||||
msgid "Enter domain names separated by comma, space or newline. You can add comments after //"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:398
|
||||
#, javascript-format
|
||||
msgid "Invalid domain format: %s. Enter domain without protocol"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:405
|
||||
msgid "At least one valid domain must be specified. Comments-only content is not allowed."
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:411
|
||||
msgid "Local Domain Lists"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:411
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:445
|
||||
msgid "Use the list from the router filesystem"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:416
|
||||
msgid "Local Domain List Paths"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:416
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:450
|
||||
msgid "Enter the list file path"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:425
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:459
|
||||
msgid "Invalid path format. Path must start with \"/\" and contain valid characters"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:430
|
||||
msgid "Remote Domain Lists"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:430
|
||||
msgid "Download and use domain lists from remote URLs"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:435
|
||||
msgid "Remote Domain URLs"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:435
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:559
|
||||
msgid "Enter full URLs starting with http:// or https://"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:445
|
||||
msgid "Local Subnet Lists"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:450
|
||||
msgid "Local Subnet List Paths"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:464
|
||||
msgid "User Subnet List Type"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:464
|
||||
msgid "Select how to add your custom subnets"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:467
|
||||
msgid "Text List (comma/space/newline separated)"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:472
|
||||
msgid "User Subnets"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:472
|
||||
msgid "Enter subnets in CIDR notation (example: 103.21.244.0/22) or single IP addresses"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:480
|
||||
msgid "Invalid format. Use format: X.X.X.X or X.X.X.X/Y"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:483
|
||||
msgid "IP address 0.0.0.0 is not allowed"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:492
|
||||
msgid "CIDR must be between 0 and 32"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:497
|
||||
msgid "User Subnets List"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:497
|
||||
msgid ""
|
||||
"Enter subnets in CIDR notation or single IP addresses, separated by comma, space or newline. You can add comments "
|
||||
"after //"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:525
|
||||
#, javascript-format
|
||||
msgid "Invalid format: %s. Use format: X.X.X.X or X.X.X.X/Y"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:533
|
||||
#, javascript-format
|
||||
msgid "IP parts must be between 0 and 255 in: %s"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:540
|
||||
#, javascript-format
|
||||
msgid "CIDR must be between 0 and 32 in: %s"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:548
|
||||
msgid "At least one valid subnet or IP must be specified. Comments-only content is not allowed."
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:554
|
||||
msgid "Remote Subnet Lists"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:554
|
||||
msgid "Download and use subnet lists from remote URLs"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:559
|
||||
msgid "Remote Subnet URLs"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:569
|
||||
msgid "IP for full redirection"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/configSection.js:569
|
||||
msgid "Specify local IP addresses whose traffic will always use the configured route"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:121
|
||||
msgid "Copied!"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:124
|
||||
msgid "Failed to copy: "
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:272
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:303
|
||||
msgid "Copy to Clipboard"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:276
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:307
|
||||
msgid "Close"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:293
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:439
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:579
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:580
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:581
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:582
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:583
|
||||
msgid "Loading..."
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:326
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:388
|
||||
msgid "No output"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:338
|
||||
msgid "FakeIP is working in browser!"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:340
|
||||
msgid "FakeIP is not working in browser"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:341
|
||||
msgid "Check DNS server on current device (PC, phone)"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:342
|
||||
msgid "Its must be router!"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:355
|
||||
msgid "Proxy working correctly"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:356
|
||||
msgid "Direct IP: "
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:357
|
||||
msgid "Proxy IP: "
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:359
|
||||
msgid "Proxy is not working - same IP for both domains"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:360
|
||||
msgid "IP: "
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:362
|
||||
msgid "Proxy check failed"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:368
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:373
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:378
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:382
|
||||
msgid "Check failed: "
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:368
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:373
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:378
|
||||
msgid "timeout"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:393
|
||||
msgid "Error: "
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:461
|
||||
msgid "Podkop Status"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:486
|
||||
msgid "Global check"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:488
|
||||
msgid "Click here for all the info"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:496
|
||||
msgid "Update Lists"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:498
|
||||
msgid "Lists Update Results"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:506
|
||||
msgid "Sing-box Status"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:527
|
||||
msgid "Check NFT Rules"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:529
|
||||
msgid "NFT Rules"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:532
|
||||
msgid "Check DNSMasq"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:534
|
||||
msgid "DNSMasq Configuration"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:542
|
||||
msgid "FakeIP Status"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:555
|
||||
msgid "DNS Status"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:564
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:780
|
||||
msgid "Main config"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:575
|
||||
msgid "Version Information"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:579
|
||||
msgid "Podkop: "
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:580
|
||||
msgid "LuCI App: "
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:581
|
||||
msgid "Sing-box: "
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:582
|
||||
msgid "OpenWrt Version: "
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:583
|
||||
msgid "Device Model: "
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:694
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:700
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:706
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:719
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:720
|
||||
msgid "Unknown"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:729
|
||||
msgid "works in browser"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:729
|
||||
msgid "does not work in browser"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:738
|
||||
msgid "works on router"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:738
|
||||
msgid "does not work on router"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:793
|
||||
msgid "Config: "
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:807
|
||||
msgid "Diagnostics"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/diagnosticTab.js:818
|
||||
msgid "Podkop"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/podkop.js:84
|
||||
msgid "Extra configurations"
|
||||
msgstr ""
|
||||
|
||||
#: htdocs/luci-static/resources/view/podkop/podkop.js:87
|
||||
msgid "Add Section"
|
||||
msgstr ""
|
||||
10
luci-app-podkop/root/etc/uci-defaults/50_luci-podkop
Normal file
10
luci-app-podkop/root/etc/uci-defaults/50_luci-podkop
Normal file
@@ -0,0 +1,10 @@
|
||||
#!/bin/sh
|
||||
|
||||
rm -f /var/luci-indexcache*
|
||||
rm -f /tmp/luci-indexcache*
|
||||
|
||||
[ -x /etc/init.d/rpcd ] && /etc/init.d/rpcd reload
|
||||
|
||||
logger -t "podkop" "$timestamp uci-defaults script executed"
|
||||
|
||||
exit 0
|
||||
@@ -2,10 +2,17 @@
|
||||
"luci-app-podkop": {
|
||||
"description": "Grant UCI and RPC access to LuCI app podkop",
|
||||
"read": {
|
||||
"file": {
|
||||
"/etc/init.d/podkop": [
|
||||
"exec"
|
||||
],
|
||||
"/usr/bin/podkop": [
|
||||
"exec"
|
||||
]
|
||||
},
|
||||
"ubus": {
|
||||
"luci.podkop": [
|
||||
"get_sample1",
|
||||
"get_sample2"
|
||||
"service": [
|
||||
"list"
|
||||
]
|
||||
},
|
||||
"uci": [
|
||||
@@ -18,4 +25,4 @@
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
25
luci-app-podkop/xgettext.sh
Normal file
25
luci-app-podkop/xgettext.sh
Normal file
@@ -0,0 +1,25 @@
|
||||
#!/bin/bash
|
||||
|
||||
SRC_DIR="htdocs/luci-static/resources/view/podkop"
|
||||
OUT_POT="po/templates/podkop.pot"
|
||||
ENCODING="UTF-8"
|
||||
WIDTH=120
|
||||
|
||||
mapfile -t FILES < <(find "$SRC_DIR" -type f -name "*.js")
|
||||
if [ ${#FILES[@]} -eq 0 ]; then
|
||||
echo "No JS files found in $SRC_DIR"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
mkdir -p "$(dirname "$OUT_POT")"
|
||||
|
||||
echo "Generating POT template from JS files in $SRC_DIR"
|
||||
xgettext --language=JavaScript \
|
||||
--keyword=_ \
|
||||
--from-code="$ENCODING" \
|
||||
--output="$OUT_POT" \
|
||||
--width="$WIDTH" \
|
||||
--package-name="PODKOP" \
|
||||
"${FILES[@]}"
|
||||
|
||||
echo "POT template generated: $OUT_POT"
|
||||
@@ -1,7 +1,9 @@
|
||||
include $(TOPDIR)/rules.mk
|
||||
|
||||
PKG_NAME:=podkop
|
||||
PKG_VERSION:=0.1.8
|
||||
|
||||
PKG_VERSION := $(if $(PKG_VERSION),$(PKG_VERSION),dev_$(shell date +%d%m%Y))
|
||||
|
||||
PKG_RELEASE:=1
|
||||
|
||||
PKG_MAINTAINER:=ITDog <podkop@itdog.info>
|
||||
@@ -12,9 +14,10 @@ include $(INCLUDE_DIR)/package.mk
|
||||
define Package/podkop
|
||||
SECTION:=net
|
||||
CATEGORY:=Network
|
||||
DEPENDS:=+dnsmasq-full +curl +jq +kmod-nft-tproxy +coreutils-base64
|
||||
DEPENDS:=+sing-box +curl +jq +kmod-nft-tproxy +coreutils-base64
|
||||
CONFLICTS:=https-dns-proxy nextdns luci-app-passwall luci-app-passwall2
|
||||
TITLE:=Domain routing app
|
||||
URL:=https://itdog.info
|
||||
URL:=https://podkop.net
|
||||
PKGARCH:=all
|
||||
endef
|
||||
|
||||
@@ -28,25 +31,13 @@ endef
|
||||
define Build/Compile
|
||||
endef
|
||||
|
||||
define Package/podkop/postinst
|
||||
#!/bin/sh
|
||||
|
||||
if ! uci show ucitrack | grep -q 'podkop'; then
|
||||
uci add ucitrack podkop
|
||||
uci set ucitrack.@podkop[-1].init=podkop
|
||||
uci commit ucitrack
|
||||
|
||||
/etc/init.d/ucitrack restart
|
||||
fi
|
||||
|
||||
exit 0
|
||||
endef
|
||||
|
||||
define Package/podkop/prerm
|
||||
#!/bin/sh
|
||||
|
||||
grep -q "105 podkop" /etc/iproute2/rt_tables && sed -i "/105 podkop/d" /etc/iproute2/rt_tables
|
||||
|
||||
/etc/init.d/podkop stop
|
||||
|
||||
exit 0
|
||||
endef
|
||||
|
||||
@@ -62,11 +53,11 @@ define Package/podkop/install
|
||||
$(INSTALL_DIR) $(1)/etc/config
|
||||
$(INSTALL_CONF) ./files/etc/config/podkop $(1)/etc/config/podkop
|
||||
|
||||
$(INSTALL_DIR) $(1)/etc/podkop
|
||||
$(INSTALL_DATA) ./files/etc/podkop/* $(1)/etc/podkop/
|
||||
$(INSTALL_DIR) $(1)/usr/bin
|
||||
$(INSTALL_BIN) ./files/usr/bin/podkop $(1)/usr/bin/podkop
|
||||
|
||||
$(INSTALL_DIR) $(1)/etc/hotplug.d/iface
|
||||
$(INSTALL_DATA) ./files/etc/hotplug.d/iface/50-podkop $(1)/etc/hotplug.d/iface/50-podkop
|
||||
$(INSTALL_DIR) $(1)/usr/lib/podkop
|
||||
$(CP) ./files/usr/lib/* $(1)/usr/lib/podkop/
|
||||
endef
|
||||
|
||||
$(eval $(call BuildPackage,podkop))
|
||||
|
||||
@@ -1,36 +1,47 @@
|
||||
config main 'main'
|
||||
option mode 'proxy'
|
||||
option interface 'wg0'
|
||||
#option interface ''
|
||||
option proxy_config_type 'url'
|
||||
#option outbound_json ''
|
||||
option proxy_string ''
|
||||
option domain_list_enabled '1'
|
||||
option domain_list 'ru_inside'
|
||||
option subnets_list_enabled '0'
|
||||
list subnets 'twitter'
|
||||
option custom_domains_list_enabled '0'
|
||||
list custom_domains ''
|
||||
option custom_download_domains_list_enabled '0'
|
||||
list custom_download_domains ''
|
||||
option custom_subnets_list_enabled '0'
|
||||
list custom_subnets ''
|
||||
option custom_download_subnets_list_enabled '0'
|
||||
list custom_download_subnets ''
|
||||
option community_lists_enabled '1'
|
||||
list community_lists 'russia_inside'
|
||||
option user_domain_list_type 'disabled'
|
||||
#list user_domains ''
|
||||
#option user_domains_text ''
|
||||
option local_domain_lists_enabled '0'
|
||||
#list local_domain_lists ''
|
||||
option remote_domain_lists_enabled '0'
|
||||
#list remote_domain_lists ''
|
||||
option user_subnet_list_type 'disable'
|
||||
#list user_subnets ''
|
||||
#option user_subnets_text ''
|
||||
option local_subnet_lists_enabled '0'
|
||||
#list local_subnet_lists ''
|
||||
option remote_subnet_lists_enabled '0'
|
||||
#list remote_subnet_lists ''
|
||||
option all_traffic_from_ip_enabled '0'
|
||||
list all_traffic_ip ''
|
||||
option delist_domains_enabled '0'
|
||||
list delist_domains ''
|
||||
#list all_traffic_ip ''
|
||||
option exclude_from_ip_enabled '0'
|
||||
list exclude_traffic_ip ''
|
||||
#list exclude_traffic_ip ''
|
||||
option yacd '0'
|
||||
option socks5 '0'
|
||||
|
||||
config second 'second'
|
||||
option second_enable '0'
|
||||
option mode 'proxy'
|
||||
option interface 'wg1'
|
||||
option proxy_string ''
|
||||
option domain_list_enabled '0'
|
||||
list domains 'youtube'
|
||||
option custom_domains_list_enabled '0'
|
||||
list custom_domains 'ifconfig.io'
|
||||
option custom_subnets_list_enabled '0'
|
||||
list custom_subnets ''
|
||||
option exclude_ntp '0'
|
||||
option quic_disable '0'
|
||||
option dont_touch_dhcp '0'
|
||||
option update_interval '1d'
|
||||
option dns_type 'udp'
|
||||
option dns_server '8.8.8.8'
|
||||
option split_dns_enabled '1'
|
||||
option split_dns_type 'udp'
|
||||
option split_dns_server '1.1.1.1'
|
||||
option dns_rewrite_ttl '60'
|
||||
option config_path '/etc/sing-box/config.json'
|
||||
option cache_path '/tmp/sing-box/cache.db'
|
||||
list iface 'br-lan'
|
||||
option mon_restart_ifaces '0'
|
||||
#list restart_ifaces 'wan'
|
||||
option procd_reload_delay '2000'
|
||||
option ss_uot '0'
|
||||
option detour '0'
|
||||
option shutdown_correctly '1'
|
||||
@@ -1,3 +0,0 @@
|
||||
#!/bin/sh
|
||||
|
||||
/etc/init.d/podkop add_route_interface
|
||||
@@ -1,914 +1,50 @@
|
||||
#!/bin/sh /etc/rc.common
|
||||
|
||||
START=99
|
||||
USE_PROCD=1
|
||||
|
||||
script=$(readlink "$initscript")
|
||||
NAME="$(basename ${script:-$initscript})"
|
||||
config_load "$NAME"
|
||||
|
||||
EXTRA_COMMANDS="list_update add_route_interface version"
|
||||
EXTRA_HELP=" list_update Updating domain and subnet lists
|
||||
version Show version
|
||||
add_route_interface Adding route for interface
|
||||
sing_box_config_vless For test vless string"
|
||||
start_service() {
|
||||
echo "Start podkop"
|
||||
|
||||
cron_job="0 4 * * * /etc/init.d/podkop list_update"
|
||||
config_get mon_restart_ifaces "main" "mon_restart_ifaces"
|
||||
config_get restart_ifaces "main" "restart_ifaces"
|
||||
|
||||
start() {
|
||||
log "Start podkop"
|
||||
|
||||
dnsmasqfull
|
||||
ucitrack
|
||||
routing_table_create
|
||||
add_mark
|
||||
|
||||
config_get mode "main" "mode"
|
||||
case "$mode" in
|
||||
"vpn")
|
||||
log "VPN mode"
|
||||
log "You are using VPN mode, make sure you have installed all the necessary packages, configured, created the zone and forwarding."
|
||||
config_get interface "main" "interface" "0"
|
||||
if [ -n "$interface" ]; then
|
||||
add_route_interface "$interface" "podkop"
|
||||
else
|
||||
log "Interface undefined"
|
||||
fi
|
||||
|
||||
config_get_bool second_enable "second" "second_enable" "0"
|
||||
config_get mode "second" "mode" "0"
|
||||
if [ "$second_enable" -eq "1" ] && [ "$mode" = "proxy" ]; then
|
||||
config_get proxy_string second "proxy_string"
|
||||
if [[ "$proxy_string" =~ ^ss:// ]]; then
|
||||
sing_box_config_shadowsocks "$proxy_string" "1603"
|
||||
elif [[ "$proxy_string" =~ ^vless:// ]]; then
|
||||
sing_box_config_vless "$proxy_string" "1603"
|
||||
else
|
||||
log "Unsupported proxy type: $proxy_string"
|
||||
exit 1
|
||||
fi
|
||||
add_route_tproxy podkop2
|
||||
sing_box_config_check
|
||||
sing_box_uci
|
||||
/etc/init.d/sing-box restart
|
||||
/etc/init.d/sing-box enable
|
||||
fi
|
||||
|
||||
if [ "$second_enable" -eq "1" ] && [ "$mode" = "vpn" ]; then
|
||||
log "VPN mode for second"
|
||||
config_get interface "second" "interface" "0"
|
||||
if [ -n "$interface" ]; then
|
||||
add_route_interface "$interface" "podkop2"
|
||||
else
|
||||
log "Interface undefined"
|
||||
fi
|
||||
fi
|
||||
;;
|
||||
"proxy")
|
||||
log "Proxy mode"
|
||||
if ! command -v sing-box >/dev/null 2>&1; then
|
||||
log "Sing-box isn't installed. Proxy mode works with sing-box"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
# Main - proxy, Second - proxy
|
||||
config_get_bool second_enable "second" "second_enable" "0"
|
||||
config_get mode "second" "mode" "0"
|
||||
if [ "$second_enable" -eq "1" ] && [ "$mode" = "proxy" ]; then
|
||||
log "Two proxy enable"
|
||||
outbound_main=$(mktemp)
|
||||
outbound_second=$(mktemp)
|
||||
|
||||
config_get proxy_string main "proxy_string"
|
||||
if [[ "$proxy_string" =~ ^ss:// ]]; then
|
||||
sing_box_config_outbound_shadowsocks "$proxy_string" "$outbound_main" main
|
||||
elif [[ "$proxy_string" =~ ^vless:// ]]; then
|
||||
sing_box_config_outbound_vless "$proxy_string" "$outbound_main" main
|
||||
else
|
||||
log "Unsupported proxy type: $proxy_string"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
config_get proxy_string second "proxy_string"
|
||||
if [[ "$proxy_string" =~ ^ss:// ]]; then
|
||||
sing_box_config_outbound_shadowsocks "$proxy_string" "$outbound_second" second
|
||||
elif [[ "$proxy_string" =~ ^vless:// ]]; then
|
||||
sing_box_config_outbound_vless "$proxy_string" "$outbound_second" second
|
||||
else
|
||||
log "Unsupported proxy type: $proxy_string"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
jq --argjson outbounds "$(jq -s '{"outbounds": (.[0].outbounds + .[1].outbounds)}' "$outbound_main" "$outbound_second")" \
|
||||
'.outbounds += $outbounds.outbounds' /etc/podkop/sing-box-two-proxy-template.json >/etc/sing-box/config.json
|
||||
|
||||
rm -f "$outbound_main" "$outbound_second"
|
||||
|
||||
add_route_tproxy podkop
|
||||
add_route_tproxy podkop2
|
||||
fi
|
||||
|
||||
# Main proxy, second disable/vpn
|
||||
config_get_bool second_enable "second" "second_enable" "0"
|
||||
config_get mode "second" "mode" "0"
|
||||
if [ "$second_enable" -eq "0" ] || [ "$mode" = "vpn" ]; then
|
||||
config_get proxy_string main "proxy_string"
|
||||
if [[ "$proxy_string" =~ ^ss:// ]]; then
|
||||
sing_box_config_shadowsocks "$proxy_string" "1602"
|
||||
elif [[ "$proxy_string" =~ ^vless:// ]]; then
|
||||
sing_box_config_vless "$proxy_string" "1602"
|
||||
else
|
||||
log "Unsupported proxy type: $proxy_string"
|
||||
exit 1
|
||||
fi
|
||||
add_route_tproxy podkop
|
||||
fi
|
||||
|
||||
sing_box_config_check
|
||||
sing_box_uci
|
||||
/etc/init.d/sing-box restart
|
||||
/etc/init.d/sing-box enable
|
||||
|
||||
# Main proxy, Second VPN
|
||||
config_get_bool second_enable "second" "second_enable" "0"
|
||||
config_get mode "second" "mode" "0"
|
||||
if [ "$second_enable" -eq "1" ] && [ "$mode" = "vpn" ]; then
|
||||
log "VPN mode for seconds"
|
||||
log "You are using VPN mode, make sure you have installed all the necessary packages, configured, created the zone and forwarding."
|
||||
config_get interface "second" "interface" "0"
|
||||
if [ -n "$interface" ]; then
|
||||
add_route_interface "$interface" "podkop2"
|
||||
else
|
||||
log "Interface undefined"
|
||||
fi
|
||||
fi
|
||||
;;
|
||||
*)
|
||||
log "Requires *vpn* or *proxy* value"
|
||||
exit 1
|
||||
;;
|
||||
esac
|
||||
|
||||
list_update
|
||||
|
||||
if [ "$domain_list_enabled" -eq 1 ] || [ "$subnets_list_enabled" -eq 1 ]; then
|
||||
add_cron_job
|
||||
fi
|
||||
|
||||
config_get_bool all_traffic_from_ip_enabled "main" "all_traffic_from_ip_enabled" "0"
|
||||
if [ "$all_traffic_from_ip_enabled" -eq 1 ]; then
|
||||
log "Adding an IP to redirect all traffic"
|
||||
config_list_foreach main all_traffic_ip list_all_traffic_from_ip
|
||||
fi
|
||||
|
||||
config_get_bool exclude_from_ip_enabled "main" "exclude_from_ip_enabled" "0"
|
||||
if [ "$exclude_from_ip_enabled" -eq 1 ]; then
|
||||
log "Adding an IP for exclusion"
|
||||
config_list_foreach main exclude_traffic_ip list_exclude_traffic_from_ip
|
||||
fi
|
||||
|
||||
config_get_bool yacd "main" "yacd" "0"
|
||||
if [ "$yacd" -eq 1 ]; then
|
||||
log "Yacd enable"
|
||||
jq '.experimental.clash_api = {
|
||||
"external_ui": "ui",
|
||||
"external_controller": "0.0.0.0:9090"
|
||||
}' /etc/sing-box/config.json >/tmp/sing-box-config-tmp.json && mv /tmp/sing-box-config-tmp.json /etc/sing-box/config.json
|
||||
/etc/init.d/sing-box restart
|
||||
fi
|
||||
|
||||
config_get_bool socks5 "main" "socks5" "0"
|
||||
if [ "$socks5" -eq 1 ]; then
|
||||
log "Socks5 local enable port 2080"
|
||||
jq '.inbounds += [{
|
||||
"type": "mixed",
|
||||
"listen": "0.0.0.0",
|
||||
"listen_port": 2080,
|
||||
"set_system_proxy": false
|
||||
}]' /etc/sing-box/config.json >/tmp/sing-box-config-tmp.json && mv /tmp/sing-box-config-tmp.json /etc/sing-box/config.json
|
||||
/etc/init.d/sing-box restart
|
||||
fi
|
||||
procd_open_instance
|
||||
procd_set_param command /usr/bin/podkop start
|
||||
[ "$mon_restart_ifaces" = "1" ] && [ -n "$restart_ifaces" ] && procd_set_param netdev $restart_ifaces
|
||||
procd_set_param stdout 1
|
||||
procd_set_param stderr 1
|
||||
procd_close_instance
|
||||
}
|
||||
|
||||
stop() {
|
||||
log "Stopping the podkop"
|
||||
rm -f /tmp/dnsmasq.d/podkop*
|
||||
remove_cron_job
|
||||
|
||||
log "Flush nft"
|
||||
if nft list table inet PodkopTable >/dev/null 2>&1; then
|
||||
nft delete table inet PodkopTable
|
||||
fi
|
||||
|
||||
log "Flush ip rule"
|
||||
if ip rule list | grep -q "podkop"; then
|
||||
ip rule del fwmark 0x105 table podkop priority 105
|
||||
fi
|
||||
|
||||
if ip rule list | grep -q "podkop2"; then
|
||||
ip rule del fwmark 0x106 table podkop2 priority 106
|
||||
fi
|
||||
|
||||
log "Flush ip route"
|
||||
if ip route list table podkop; then
|
||||
ip route flush table podkop
|
||||
fi
|
||||
|
||||
if ip route list table podkop2; then
|
||||
ip route flush table podkop2
|
||||
fi
|
||||
|
||||
log "Stop sing-box"
|
||||
config_get mode_main "main" "mode" "0"
|
||||
config_get mode_second "second" "mode" "0"
|
||||
|
||||
if [ "$mode_main" = "proxy" ] || [ "$mode_second" = "proxy" ]; then
|
||||
/etc/init.d/sing-box stop
|
||||
/etc/init.d/sing-box disable
|
||||
fi
|
||||
stop_service() {
|
||||
/usr/bin/podkop stop
|
||||
}
|
||||
|
||||
restart() {
|
||||
stop
|
||||
start
|
||||
reload_service() {
|
||||
/usr/bin/podkop reload > /dev/null 2>&1
|
||||
}
|
||||
|
||||
reload() {
|
||||
stop
|
||||
start
|
||||
}
|
||||
service_triggers() {
|
||||
echo "service_triggers start"
|
||||
|
||||
version() {
|
||||
echo VERSION_FROM_MAKEFILE
|
||||
}
|
||||
config_get mon_restart_ifaces "main" "mon_restart_ifaces"
|
||||
config_get restart_ifaces "main" "restart_ifaces"
|
||||
config_get procd_reload_delay "main" "procd_reload_delay" "2000"
|
||||
|
||||
log() {
|
||||
local message="$1"
|
||||
local timestamp=$(date +"%Y-%m-%d %H:%M:%S")
|
||||
local CYAN="\033[0;36m"
|
||||
local GREEN="\033[0;32m"
|
||||
local RESET="\033[0m"
|
||||
PROCD_RELOAD_DELAY=$procd_reload_delay
|
||||
|
||||
echo -e "${CYAN}[$timestamp]${RESET} ${GREEN}$message${RESET}"
|
||||
}
|
||||
procd_open_trigger
|
||||
procd_add_config_trigger "config.change" "$NAME" "$initscript" restart 'on_config_change'
|
||||
|
||||
add_cron_job() {
|
||||
if ! crontab -l | grep -q "podkop"; then
|
||||
#echo "$cron_job" >>/etc/crontabs/root
|
||||
crontab -l | {
|
||||
cat
|
||||
echo "$cron_job"
|
||||
} | crontab -
|
||||
log "The cron job has been created"
|
||||
fi
|
||||
}
|
||||
|
||||
remove_cron_job() {
|
||||
sed -i "\|podkop|d" /etc/crontabs/root
|
||||
log "The cron job removed"
|
||||
}
|
||||
|
||||
list_update() {
|
||||
config_get_bool domain_list_enabled "main" "domain_list_enabled" "0"
|
||||
if [ "$domain_list_enabled" -eq 1 ]; then
|
||||
log "Adding a common domains list"
|
||||
add_set "podkop_domains" "main"
|
||||
config_get domain_list main "domain_list"
|
||||
lists_domains_download "$domain_list"
|
||||
dnsmasq_config_check podkop-domains.lst
|
||||
fi
|
||||
|
||||
config_get_bool custom_domains_list_enabled "main" "custom_domains_list_enabled" "0"
|
||||
if [ "$custom_domains_list_enabled" -eq 1 ]; then
|
||||
log "Adding a custom domains list"
|
||||
add_set "podkop_domains" "main"
|
||||
rm -f /tmp/dnsmasq.d/podkop-custom-domains.lst
|
||||
config_list_foreach main custom_domains "list_custom_domains_create" "podkop"
|
||||
dnsmasq_config_check podkop-custom-domains.lst
|
||||
fi
|
||||
|
||||
config_get_bool custom_download_domains_list_enabled "main" "custom_download_domains_list_enabled" "0"
|
||||
if [ "$custom_download_domains_list_enabled" -eq 1 ]; then
|
||||
log "Adding a custom domains list from URL"
|
||||
add_set "podkop_domains" "main"
|
||||
config_list_foreach main custom_download_domains "list_custom_download_domains_create" "podkop"
|
||||
fi
|
||||
|
||||
config_get_bool delist_domains_enabled "main" "delist_domains_enabled" "0"
|
||||
if [ "$delist_domains_enabled" -eq 1 ] && [ "$domain_list_enabled" -eq 1 ]; then
|
||||
log "Exclude domains from the common list"
|
||||
config_list_foreach main delist_domains "list_delist_domains"
|
||||
dnsmasq_config_check podkop-domains.lst
|
||||
fi
|
||||
|
||||
if [ "$domain_list_enabled" -eq 1 ] || [ "$custom_domains_list_enabled" -eq 1 ]; then
|
||||
/etc/init.d/dnsmasq restart
|
||||
fi
|
||||
|
||||
config_get_bool custom_domains_list_enabled "second" "custom_domains_list_enabled" "0"
|
||||
if [ "$custom_domains_list_enabled" -eq 1 ]; then
|
||||
log "Adding a custom domains list. Second podkop"
|
||||
add_set "podkop2_domains" "second"
|
||||
rm -f /tmp/dnsmasq.d/podkop2-custom-domains.lst
|
||||
config_list_foreach second custom_domains "list_delist_domains"
|
||||
config_list_foreach second custom_domains "list_custom_domains_create" "podkop2"
|
||||
dnsmasq_config_check podkop2-custom-domains.lst
|
||||
fi
|
||||
|
||||
config_get_bool domain_service_enabled "second" "domain_service_enabled" "0"
|
||||
if [ "$domain_service_enabled" -eq 1 ]; then
|
||||
log "Adding a service for podkop2"
|
||||
add_set "podkop2_domains" "second"
|
||||
config_get service_list second "service_list"
|
||||
lists_services_download "$service_list"
|
||||
config_list_foreach second custom_domains "list_delist_domains"
|
||||
dnsmasq_config_check podkop2-domains.lst
|
||||
fi
|
||||
|
||||
if [ "$custom_domains_list_enabled" -eq 1 ] || [ "$domain_service_enabled" -eq 1 ]; then
|
||||
/etc/init.d/dnsmasq restart
|
||||
fi
|
||||
|
||||
config_get_bool subnets_list_enabled "main" "subnets_list_enabled" "0"
|
||||
if [ "$subnets_list_enabled" -eq 1 ]; then
|
||||
log "Adding a subnets from list"
|
||||
mkdir -p /tmp/podkop
|
||||
add_set "podkop_subnets" "main"
|
||||
config_list_foreach main subnets "list_subnets_download"
|
||||
fi
|
||||
|
||||
config_get_bool custom_download_subnets_list_enabled "main" "custom_download_subnets_list_enabled" "0"
|
||||
if [ "$custom_download_subnets_list_enabled" -eq 1 ]; then
|
||||
log "Adding a subnets from URL"
|
||||
mkdir -p /tmp/podkop
|
||||
add_set "podkop_subnets" "main"
|
||||
config_list_foreach main custom_download_subnets "list_subnets_download"
|
||||
fi
|
||||
|
||||
config_get_bool custom_subnets_list_enabled "main" "custom_subnets_list_enabled" "0"
|
||||
if [ "$custom_subnets_list_enabled" -eq 1 ]; then
|
||||
log "Adding a custom subnets list"
|
||||
add_set "podkop_subnets" "main"
|
||||
config_list_foreach main custom_subnets "list_custom_subnets_create" "podkop"
|
||||
fi
|
||||
|
||||
config_get_bool custom_subnets_list_enabled "second" "custom_subnets_list_enabled" "0"
|
||||
if [ "$custom_subnets_list_enabled" -eq 1 ]; then
|
||||
log "Adding a custom subnets list. Second"
|
||||
add_set "podkop2_subnets" "second"
|
||||
config_list_foreach second custom_subnets "list_custom_subnets_create" "podkop2"
|
||||
fi
|
||||
}
|
||||
|
||||
dnsmasqfull() {
|
||||
if /usr/sbin/dnsmasq -v | grep -q "no-nftset"; then
|
||||
log "Dnsmasq-full is not installed. Future: link only"
|
||||
log "Use script or:"
|
||||
log "cd /tmp/ && /bin/opkg download dnsmasq-full && /bin/opkg remove dnsmasq && /bin/opkg install dnsmasq-full --cache /tmp/ && cp /etc/config/dhcp /etc/config/dhcp-old && mv /etc/config/dhcp-opkg /etc/config/dhcp"
|
||||
exit 1
|
||||
fi
|
||||
}
|
||||
|
||||
ucitrack() {
|
||||
if grep -q "podkop" /etc/config/ucitrack; then
|
||||
log "ucitrack config ok"
|
||||
else
|
||||
log "ucitrack config not found"
|
||||
fi
|
||||
}
|
||||
|
||||
routing_table_create() {
|
||||
grep -q "105 podkop" /etc/iproute2/rt_tables || echo '105 podkop' >>/etc/iproute2/rt_tables
|
||||
config_get_bool second_enable "second" "second_enable" "0"
|
||||
if [ "$second_enable" -eq 1 ]; then
|
||||
grep -q "106 podkop2" /etc/iproute2/rt_tables || echo '106 podkop2' >>/etc/iproute2/rt_tables
|
||||
fi
|
||||
}
|
||||
|
||||
add_set() {
|
||||
local set_name="$1"
|
||||
local connect="$2"
|
||||
|
||||
nft add table inet PodkopTable
|
||||
log "Create set $set_name"
|
||||
nft add chain inet PodkopTable mangle { type filter hook prerouting priority mangle \; policy accept \;}
|
||||
nft add set inet PodkopTable "$set_name" { type ipv4_addr\; flags interval\; auto-merge\; }
|
||||
config_get mode "$connect" "mode"
|
||||
case "$mode" in
|
||||
"vpn")
|
||||
if ! nft list chain inet PodkopTable mangle | grep -q "ip daddr @"$set_name" meta mark set"; then
|
||||
if [ "$connect" = "main" ]; then
|
||||
nft add rule inet PodkopTable mangle ip daddr @"$set_name" meta mark set 0x105 counter
|
||||
elif [ "$connect" = "second" ]; then
|
||||
nft add rule inet PodkopTable mangle ip daddr @"$set_name" meta mark set 0x106 counter
|
||||
fi
|
||||
fi
|
||||
;;
|
||||
|
||||
"proxy")
|
||||
#nft add chain inet PodkopTable mangle { type filter hook prerouting priority mangle \; }
|
||||
#nft add chain inet PodkopTable proxy { type filter hook prerouting priority mangle \; }
|
||||
if nft list table inet PodkopTable | grep -q "ip daddr @"$set_name" meta l4proto"; then
|
||||
log "Nft rule tproxy exists"
|
||||
else
|
||||
log "Added nft rule tproxy"
|
||||
if [ "$connect" = "main" ]; then
|
||||
nft add rule inet PodkopTable mangle ip daddr @"$set_name" meta l4proto tcp meta mark set 0x105 counter
|
||||
nft add rule inet PodkopTable mangle ip daddr @"$set_name" meta l4proto udp meta mark set 0x105 counter
|
||||
nft add rule inet PodkopTable mangle iifname "br-lan" meta mark 0x105 meta l4proto tcp tproxy ip to :1602 counter
|
||||
nft add rule inet PodkopTable mangle iifname "br-lan" meta mark 0x105 meta l4proto udp tproxy ip to :1602 counter
|
||||
elif [ "$connect" = "second" ]; then
|
||||
nft add rule inet PodkopTable mangle ip daddr @"$set_name" meta l4proto tcp meta mark set 0x106 counter
|
||||
nft add rule inet PodkopTable mangle ip daddr @"$set_name" meta l4proto udp meta mark set 0x106 counter
|
||||
nft add rule inet PodkopTable mangle iifname "br-lan" meta mark 0x106 meta l4proto tcp tproxy ip to :1603 counter
|
||||
nft add rule inet PodkopTable mangle iifname "br-lan" meta mark 0x106 meta l4proto udp tproxy ip to :1603 counter
|
||||
fi
|
||||
fi
|
||||
;;
|
||||
|
||||
*)
|
||||
log "Requires *vpn* or *proxy* value"
|
||||
exit 1
|
||||
;;
|
||||
esac
|
||||
}
|
||||
|
||||
add_route_interface() {
|
||||
local interface="$1"
|
||||
local table="$2"
|
||||
local retry_count=0
|
||||
local max_retries=20
|
||||
|
||||
if ! ip link show "$interface" >/dev/null 2>&1; then
|
||||
log "Interface "$interface" does not exist, not possible to create a route"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
if ip route show table $table | grep -q "^default dev"; then
|
||||
log "Route for "$interface" exists"
|
||||
return 0
|
||||
fi
|
||||
|
||||
log "Added route for "$interface""
|
||||
while [ $retry_count -lt $max_retries ]; do
|
||||
if ip route add table $table default dev "$interface" 2>&1 | grep -q "Network is down"; then
|
||||
log "Error: Network is down. Let's try again in 3 seconds"
|
||||
sleep 3
|
||||
retry_count=$((retry_count + 1))
|
||||
else
|
||||
log "Route for "$interface" added"
|
||||
return 0
|
||||
fi
|
||||
done
|
||||
|
||||
log "The maximum number of attempts has been exceeded. Failed to add a route."
|
||||
exit 1
|
||||
}
|
||||
|
||||
add_route_tproxy() {
|
||||
local table=$1
|
||||
if ! ip route list table $table | grep -q "local default dev lo scope host"; then
|
||||
log "Added route for tproxy"
|
||||
ip route add local 0.0.0.0/0 dev lo table $table
|
||||
else
|
||||
log "Route for tproxy exists"
|
||||
fi
|
||||
}
|
||||
|
||||
add_mark() {
|
||||
if ! ip rule list | grep -q "from all fwmark 0x105 lookup podkop"; then
|
||||
log "Create marking rule"
|
||||
ip -4 rule add fwmark 0x105 table podkop priority 105
|
||||
else
|
||||
log "Marking rule exist"
|
||||
fi
|
||||
|
||||
config_get_bool second_enable "second" "second_enable" "0"
|
||||
if [ "$second_enable" -eq 1 ]; then
|
||||
if ! ip rule list | grep -q "from all fwmark 0x106 lookup podkop2"; then
|
||||
log "Create marking rule for podkop second"
|
||||
ip -4 rule add fwmark 0x106 table podkop2 priority 106
|
||||
else
|
||||
log "Podkop second marking rule exist"
|
||||
fi
|
||||
fi
|
||||
}
|
||||
|
||||
lists_domains_download() {
|
||||
local URL="$1"
|
||||
|
||||
RU_INSIDE_DOMAINS=https://raw.githubusercontent.com/itdoginfo/allow-domains/main/Russia/inside-dnsmasq-nfset.lst
|
||||
RU_OUTSIDE_DOMAINS=https://raw.githubusercontent.com/itdoginfo/allow-domains/main/Russia/outside-dnsmasq-nfset.lst
|
||||
UA_DOMAINS=https://raw.githubusercontent.com/itdoginfo/allow-domains/main/Ukraine/inside-dnsmasq-nfset.lst
|
||||
|
||||
case "$URL" in
|
||||
"ru_inside")
|
||||
URL=$RU_INSIDE_DOMAINS
|
||||
;;
|
||||
"ru_outside")
|
||||
URL=$RU_OUTSIDE_DOMAINS
|
||||
;;
|
||||
"ua")
|
||||
URL=$UA_DOMAINS
|
||||
;;
|
||||
*)
|
||||
log "Unidentified list of domains"
|
||||
exit 1
|
||||
;;
|
||||
esac
|
||||
|
||||
count=0
|
||||
while true; do
|
||||
if curl -m 3 github.com; then
|
||||
curl -f $URL --output /tmp/dnsmasq.d/podkop-domains.lst
|
||||
sed -i 's/fw4#vpn_domains/PodkopTable#podkop_domains/g' /tmp/dnsmasq.d/podkop-domains.lst
|
||||
return 0
|
||||
else
|
||||
log "GitHub is not available. Check the internet availability [$count sec]"
|
||||
count=$((count + 1))
|
||||
fi
|
||||
|
||||
if [ $count -lt 30 ]; then
|
||||
sleep_interval=1
|
||||
elif [ $count -ge 30 ] && [ $count -lt 60 ]; then
|
||||
sleep_interval=5
|
||||
elif [ $count -ge 60 ] && [ $count -lt 90 ]; then
|
||||
sleep_interval=10
|
||||
else
|
||||
sleep_interval=30
|
||||
fi
|
||||
|
||||
sleep $sleep_interval
|
||||
done
|
||||
}
|
||||
|
||||
lists_services_download() {
|
||||
local URL="$1"
|
||||
|
||||
YOUTUBE=https://raw.githubusercontent.com/itdoginfo/allow-domains/refs/heads/main/Services/youtube.lst
|
||||
|
||||
case "$URL" in
|
||||
"youtube")
|
||||
URL=$YOUTUBE
|
||||
;;
|
||||
*)
|
||||
log "Unidentified list of domains"
|
||||
exit 1
|
||||
;;
|
||||
esac
|
||||
|
||||
count=0
|
||||
while true; do
|
||||
if curl -m 3 github.com; then
|
||||
curl -f $URL --output /tmp/dnsmasq.d/podkop2-domains.lst
|
||||
delist_downloaded_domains
|
||||
sed -i 's/.*/nftset=\/&\/4#inet#PodkopTable#podkop2_domains/g' /tmp/dnsmasq.d/podkop2-domains.lst
|
||||
return 0
|
||||
else
|
||||
log "GitHub is not available. Check the internet availability [$count sec]"
|
||||
count=$((count + 1))
|
||||
fi
|
||||
|
||||
if [ $count -lt 30 ]; then
|
||||
sleep_interval=1
|
||||
elif [ $count -ge 30 ] && [ $count -lt 60 ]; then
|
||||
sleep_interval=5
|
||||
elif [ $count -ge 60 ] && [ $count -lt 90 ]; then
|
||||
sleep_interval=10
|
||||
else
|
||||
sleep_interval=30
|
||||
fi
|
||||
|
||||
sleep $sleep_interval
|
||||
done
|
||||
}
|
||||
|
||||
list_subnets_download() {
|
||||
TWITTER_SUBNETS=https://raw.githubusercontent.com/itdoginfo/allow-domains/main/Subnets/IPv4/Twitter.lst
|
||||
META_SUBNETS=https://raw.githubusercontent.com/itdoginfo/allow-domains/main/Subnets/IPv4/Meta.lst
|
||||
DISCORD_SUBNETS=https://raw.githubusercontent.com/itdoginfo/allow-domains/refs/heads/main/Subnets/IPv4/Discord.lst
|
||||
local URL="$1"
|
||||
|
||||
case "$URL" in
|
||||
"twitter")
|
||||
URL=$TWITTER_SUBNETS
|
||||
;;
|
||||
"meta")
|
||||
URL=$META_SUBNETS
|
||||
;;
|
||||
"discord")
|
||||
URL=$DISCORD_SUBNETS
|
||||
;;
|
||||
*)
|
||||
log "Custom URL for subnet"
|
||||
if curl --output /dev/null --silent --head --fail "$URL"; then
|
||||
log "URL is valid"
|
||||
else
|
||||
log "URL $URL is not valid"
|
||||
fi
|
||||
;;
|
||||
esac
|
||||
|
||||
local filename=$(basename "$URL")
|
||||
curl -f "$URL" --output "/tmp/podkop/$filename"
|
||||
while IFS= read -r subnet; do
|
||||
nft add element inet PodkopTable podkop_subnets { $subnet }
|
||||
done <"/tmp/podkop/$filename"
|
||||
}
|
||||
|
||||
list_custom_domains_create() {
|
||||
local domain="$1"
|
||||
local name="$2"
|
||||
echo "nftset=/$domain/4#inet#PodkopTable#${name}_domains" >>"/tmp/dnsmasq.d/${name}-custom-domains.lst"
|
||||
log "$domain added to the list"
|
||||
}
|
||||
|
||||
list_custom_download_domains_create() {
|
||||
local URL="$1"
|
||||
local name="$2"
|
||||
local filename=$(basename "$URL")
|
||||
local config="/tmp/dnsmasq.d/${name}-${filename}.lst"
|
||||
|
||||
rm -f $config
|
||||
curl -f "$URL" --output "/tmp/podkop/${filename}"
|
||||
while IFS= read -r domain; do
|
||||
echo "nftset=/$domain/4#inet#PodkopTable#${name}_domains" >>$config
|
||||
done <"/tmp/podkop/$filename"
|
||||
dnsmasq_config_check ${name}-${filename}.lst
|
||||
}
|
||||
|
||||
list_custom_subnets_create() {
|
||||
local subnet="$1"
|
||||
local name="$2"
|
||||
nft add element inet PodkopTable ${name}_subnets { $subnet }
|
||||
}
|
||||
|
||||
list_all_traffic_from_ip() {
|
||||
local ip="$1"
|
||||
if ! nft list chain inet PodkopTable mangle | grep -q "ip saddr $ip"; then
|
||||
nft insert rule inet PodkopTable mangle ip saddr $ip meta mark set 0x105 counter
|
||||
fi
|
||||
}
|
||||
|
||||
list_exclude_traffic_from_ip() {
|
||||
local ip="$1"
|
||||
if ! nft list chain inet PodkopTable mangle | grep -q "ip saddr $ip"; then
|
||||
nft insert rule inet PodkopTable mangle ip saddr $ip meta mark set 0x0 counter
|
||||
fi
|
||||
}
|
||||
|
||||
list_delist_domains() {
|
||||
local domain="$1"
|
||||
|
||||
if [ -f "/tmp/dnsmasq.d/podkop-domains.lst" ]; then
|
||||
sed -i "/$domain/d" /tmp/dnsmasq.d/podkop-domains.lst
|
||||
nft flush set inet PodkopTable podkop_domains
|
||||
log "Strings containing '$domain' have been excluded from the list"
|
||||
else
|
||||
log "Config /tmp/dnsmasq.d/podkop-domains.lst not exists"
|
||||
fi
|
||||
}
|
||||
|
||||
delist_downloaded_domains() {
|
||||
local domains="/tmp/dnsmasq.d/podkop2-domains.lst"
|
||||
|
||||
if [ -f "$domains" ]; then
|
||||
while IFS= read -r line; do
|
||||
list_delist_domains "$line"
|
||||
done <"$domains"
|
||||
else
|
||||
log "$domains not found"
|
||||
fi
|
||||
}
|
||||
|
||||
dnsmasq_config_check() {
|
||||
local config="$1"
|
||||
if ! /usr/sbin/dnsmasq --conf-file=/tmp/dnsmasq.d/$config --test 2>&1 | grep -q "syntax check OK"; then
|
||||
log "Dnsmasq config $config contains errors. Break"
|
||||
exit 1
|
||||
fi
|
||||
}
|
||||
|
||||
sing_box_uci() {
|
||||
local config="/etc/config/sing-box"
|
||||
if grep -q "option enabled '0'" "$config" ||
|
||||
grep -q "option user 'sing-box'" "$config"; then
|
||||
sed -i \
|
||||
-e "s/option enabled '0'/option enabled '1'/" \
|
||||
-e "s/option user 'sing-box'/option user 'root'/" $config
|
||||
log "Change sing-box UCI config"
|
||||
else
|
||||
log "Sing-box UCI config OK"
|
||||
fi
|
||||
}
|
||||
|
||||
sing_box_config_shadowsocks() {
|
||||
local STRING="$1"
|
||||
local listen_port="$2"
|
||||
|
||||
local encrypted_part=$(echo "$STRING" | cut -d'/' -f3 | cut -d'@' -f1 | base64 --decode)
|
||||
local method=$(echo "$encrypted_part" | cut -d':' -f1)
|
||||
local password=$(echo "$encrypted_part" | cut -d':' -f2-)
|
||||
|
||||
local server=$(echo "$STRING" | cut -d'@' -f2 | cut -d':' -f1)
|
||||
local port=$(echo "$STRING" | sed -n 's|.*:\([0-9]\+\).*|\1|p')
|
||||
local label=$(echo "$STRING" | cut -d'#' -f2)
|
||||
|
||||
template_config="/etc/podkop/sing-box-shadowsocks-template.json"
|
||||
|
||||
jq --arg server "$server" \
|
||||
--arg port "$port" \
|
||||
--arg method "$method" \
|
||||
--arg password "$password" \
|
||||
--arg listen_port "$listen_port" \
|
||||
'.inbounds[] |=
|
||||
if .type == "tproxy" then
|
||||
.listen_port = ($listen_port | tonumber)
|
||||
else
|
||||
.
|
||||
end |
|
||||
.outbounds[] |=
|
||||
if .type == "shadowsocks" then
|
||||
.server = $server |
|
||||
.server_port = ($port | tonumber) |
|
||||
.method = $method |
|
||||
.password = $password
|
||||
else
|
||||
.
|
||||
end' "$template_config" >/etc/sing-box/config.json
|
||||
}
|
||||
|
||||
sing_box_config_vless() {
|
||||
local STRING="$1"
|
||||
local listen_port="$2"
|
||||
|
||||
get_param() {
|
||||
echo "$STRING" | sed -n "s/.*[?&]$1=\([^&?#]*\).*/\1/p"
|
||||
}
|
||||
|
||||
uuid=$(echo "$STRING" | cut -d'/' -f3 | cut -d'@' -f1)
|
||||
server=$(echo "$STRING" | cut -d'@' -f2 | cut -d':' -f1)
|
||||
port=$(echo "$STRING" | cut -d'@' -f2 | cut -d':' -f2 | cut -d'?' -f1 | awk -F'/' '{print $1}')
|
||||
|
||||
type=$(get_param "type")
|
||||
flow=$(get_param "flow")
|
||||
sni=$(get_param "sni")
|
||||
fp=$(get_param "fp")
|
||||
security=$(get_param "security")
|
||||
pbk=$(get_param "pbk")
|
||||
sid=$(get_param "sid")
|
||||
encoding=$(get_param "packetEncoding")
|
||||
alpn=$(echo "$(get_param "alpn" | sed 's/%2C/,/g; s/%2F/\//g')" | jq -R -s -c 'split(",")' | sed 's/\\n//g')
|
||||
label=$(echo "$STRING" | cut -d'#' -f2)
|
||||
|
||||
template_config="/etc/podkop/sing-box-vless-template.json"
|
||||
|
||||
jq --arg server "$server" \
|
||||
--arg port "$port" \
|
||||
--arg uuid "$uuid" \
|
||||
--arg type "$type" \
|
||||
--arg flow "$flow" \
|
||||
--arg sni "$sni" \
|
||||
--arg fp "$fp" \
|
||||
--arg security "$security" \
|
||||
--arg pbk "$pbk" \
|
||||
--arg sid "$sid" \
|
||||
--argjson alpn "$alpn" \
|
||||
--arg encoding "$encoding" \
|
||||
--arg listen_port "$listen_port" \
|
||||
'.inbounds[] |=
|
||||
if .type == "tproxy" then
|
||||
.listen_port = ($listen_port | tonumber)
|
||||
else
|
||||
.
|
||||
end |
|
||||
.outbounds[] |=
|
||||
(.server = $server |
|
||||
.server_port = ($port | tonumber) |
|
||||
.uuid = $uuid |
|
||||
if $security == "reality" then
|
||||
if $flow == "" then del(.flow) else .flow = $flow end |
|
||||
if $encoding == "" then del(.packet_encoding) else .packet_encoding = $encoding end |
|
||||
.tls.server_name = $sni |
|
||||
.tls.utls.fingerprint = $fp |
|
||||
.tls.reality.public_key = $pbk |
|
||||
.tls.reality.short_id = $sid
|
||||
elif $security == "tls" then
|
||||
.tls.alpn = $alpn |
|
||||
.tls.server_name = $sni |
|
||||
del(.flow) |
|
||||
del(.tls.utls) |
|
||||
del(.tls.reality)
|
||||
elif $security == "" or $security == "none" then
|
||||
del(.flow) |
|
||||
del(.tls)
|
||||
else
|
||||
.
|
||||
end)' "$template_config" >/etc/sing-box/config.json
|
||||
}
|
||||
|
||||
# make one function for full and outbound only
|
||||
sing_box_config_outbound_shadowsocks() {
|
||||
local STRING="$1"
|
||||
local outbound="$2"
|
||||
local name="$3"
|
||||
|
||||
local encrypted_part=$(echo "$STRING" | cut -d'/' -f3 | cut -d'@' -f1 | base64 --decode)
|
||||
local method=$(echo "$encrypted_part" | cut -d':' -f1)
|
||||
local password=$(echo "$encrypted_part" | cut -d':' -f2-)
|
||||
|
||||
local server=$(echo "$STRING" | cut -d'@' -f2 | cut -d':' -f1)
|
||||
local port=$(echo "$STRING" | cut -d':' -f3 | cut -d'#' -f1)
|
||||
label=$(echo "$STRING" | cut -d'#' -f2)
|
||||
|
||||
template_config="/etc/podkop/sing-box-shadowsocks-outbound-template.json"
|
||||
|
||||
jq --arg server "$server" \
|
||||
--arg port "$port" \
|
||||
--arg method "$method" \
|
||||
--arg password "$password" \
|
||||
--arg tag "$name" \
|
||||
'.outbounds[] |=
|
||||
if .type == "shadowsocks" then
|
||||
.server = $server |
|
||||
.server_port = ($port | tonumber) |
|
||||
.method = $method |
|
||||
.password = $password |
|
||||
.tag = $tag
|
||||
else
|
||||
.
|
||||
end' "$template_config" >$outbound
|
||||
}
|
||||
|
||||
sing_box_config_outbound_vless() {
|
||||
local STRING="$1"
|
||||
local outbound="$2"
|
||||
local name="$3"
|
||||
|
||||
get_param() {
|
||||
echo "$STRING" | sed -n "s/.*[?&]$1=\([^&?#]*\).*/\1/p"
|
||||
}
|
||||
|
||||
uuid=$(echo "$STRING" | cut -d'/' -f3 | cut -d'@' -f1)
|
||||
server=$(echo "$STRING" | cut -d'@' -f2 | cut -d':' -f1)
|
||||
port=$(echo "$STRING" | cut -d'@' -f2 | cut -d':' -f2 | cut -d'?' -f1 | awk -F'/' '{print $1}')
|
||||
|
||||
type=$(get_param "type")
|
||||
flow=$(get_param "flow")
|
||||
sni=$(get_param "sni")
|
||||
fp=$(get_param "fp")
|
||||
security=$(get_param "security")
|
||||
pbk=$(get_param "pbk")
|
||||
sid=$(get_param "sid")
|
||||
alpn=$(echo "$(get_param "alpn" | sed 's/%2C/,/g; s/%2F/\//g')" | jq -R -s -c 'split(",")' | sed 's/\\n//g')
|
||||
encoding=$(get_param "packetEncoding")
|
||||
label=$(echo "$STRING" | cut -d'#' -f2)
|
||||
|
||||
template_config="/etc/podkop/sing-box-vless-outbound-template.json"
|
||||
|
||||
jq --arg server "$server" \
|
||||
--arg port "$port" \
|
||||
--arg uuid "$uuid" \
|
||||
--arg type "$type" \
|
||||
--arg flow "$flow" \
|
||||
--arg sni "$sni" \
|
||||
--arg fp "$fp" \
|
||||
--arg security "$security" \
|
||||
--arg pbk "$pbk" \
|
||||
--arg sid "$sid" \
|
||||
--argjson alpn "$alpn" \
|
||||
--arg encoding "$encoding" \
|
||||
--arg tag "$name" \
|
||||
'.outbounds[] |=
|
||||
(.server = $server |
|
||||
.server_port = ($port | tonumber) |
|
||||
.uuid = $uuid |
|
||||
if $security == "reality" then
|
||||
if $flow == "" then del(.flow) else .flow = $flow end |
|
||||
if $encoding == "" then del(.packet_encoding) else .packet_encoding = $encoding end |
|
||||
.tls.server_name = $sni |
|
||||
.tls.utls.fingerprint = $fp |
|
||||
.tls.reality.public_key = $pbk |
|
||||
.tls.reality.short_id = $sid |
|
||||
.tag = $tag
|
||||
elif $security == "tls" then
|
||||
.tls.alpn = $alpn |
|
||||
.tls.server_name = $sni |
|
||||
del(.flow) |
|
||||
del(.tls.utls) |
|
||||
del(.tls.reality) |
|
||||
.tag = $tag
|
||||
elif $security == "" or $security == "none" then
|
||||
del(.flow) |
|
||||
del(.tls) |
|
||||
.tag = $tag
|
||||
else
|
||||
.
|
||||
end)' "$template_config" >$outbound
|
||||
}
|
||||
|
||||
sing_box_config_check() {
|
||||
if ! sing-box -c /etc/sing-box/config.json check >/dev/null 2>&1; then
|
||||
log "Sing-box configuration is invalid"
|
||||
exit 1
|
||||
fi
|
||||
}
|
||||
if [ "$mon_restart_ifaces" = "1" ]; then
|
||||
for iface in $restart_ifaces; do
|
||||
procd_add_interface_trigger "interface.*.up" "$iface" /etc/init.d/podkop reload
|
||||
done
|
||||
fi
|
||||
procd_close_trigger
|
||||
}
|
||||
@@ -1,16 +0,0 @@
|
||||
{
|
||||
"outbounds": [
|
||||
{
|
||||
"type": "shadowsocks",
|
||||
"server": "$HOST",
|
||||
"server_port": "$PORT",
|
||||
"method": "$METHOD",
|
||||
"password": "$PASS",
|
||||
"udp_over_tcp": {
|
||||
"enabled": true,
|
||||
"version": 2
|
||||
},
|
||||
"tag": "$TAG"
|
||||
}
|
||||
]
|
||||
}
|
||||
@@ -1,29 +0,0 @@
|
||||
{
|
||||
"log": {
|
||||
"level": "warn"
|
||||
},
|
||||
"inbounds": [
|
||||
{
|
||||
"type": "tproxy",
|
||||
"listen": "::",
|
||||
"listen_port": 1602,
|
||||
"sniff": false
|
||||
}
|
||||
],
|
||||
"outbounds": [
|
||||
{
|
||||
"type": "shadowsocks",
|
||||
"server": "$HOST",
|
||||
"server_port": "$PORT",
|
||||
"method": "$METHOD",
|
||||
"password": "$PASS",
|
||||
"udp_over_tcp": {
|
||||
"enabled": true,
|
||||
"version": 2
|
||||
}
|
||||
}
|
||||
],
|
||||
"route": {
|
||||
"auto_detect_interface": true
|
||||
}
|
||||
}
|
||||
@@ -1,35 +0,0 @@
|
||||
{
|
||||
"log": {
|
||||
"level": "warn"
|
||||
},
|
||||
"inbounds": [
|
||||
{
|
||||
"type": "tproxy",
|
||||
"listen": "::",
|
||||
"listen_port": 1602,
|
||||
"sniff": false,
|
||||
"tag": "main"
|
||||
},
|
||||
{
|
||||
"type": "tproxy",
|
||||
"listen": "::",
|
||||
"listen_port": 1603,
|
||||
"sniff": false,
|
||||
"tag": "second"
|
||||
}
|
||||
],
|
||||
"outbounds": [],
|
||||
"route": {
|
||||
"rules": [
|
||||
{
|
||||
"inbound": "main",
|
||||
"outbound": "main"
|
||||
},
|
||||
{
|
||||
"inbound": "second",
|
||||
"outbound": "second"
|
||||
}
|
||||
],
|
||||
"auto_detect_interface": true
|
||||
}
|
||||
}
|
||||
@@ -1,26 +0,0 @@
|
||||
{
|
||||
"outbounds": [
|
||||
{
|
||||
"type": "vless",
|
||||
"server": "$HOST",
|
||||
"server_port": "$PORT",
|
||||
"uuid": "$UUID",
|
||||
"flow": "xtls-rprx-vision",
|
||||
"tls": {
|
||||
"enabled": true,
|
||||
"insecure": false,
|
||||
"server_name": "$FAKE_SERVER",
|
||||
"utls": {
|
||||
"enabled": true,
|
||||
"fingerprint": "chrome"
|
||||
},
|
||||
"reality": {
|
||||
"enabled": true,
|
||||
"public_key": "$PUBLIC_KEY",
|
||||
"short_id": "$SHORT_ID"
|
||||
}
|
||||
},
|
||||
"tag": "$TAG"
|
||||
}
|
||||
]
|
||||
}
|
||||
@@ -1,39 +0,0 @@
|
||||
{
|
||||
"log": {
|
||||
"level": "warn"
|
||||
},
|
||||
"inbounds": [
|
||||
{
|
||||
"type": "tproxy",
|
||||
"listen": "::",
|
||||
"listen_port": 1602,
|
||||
"sniff": false
|
||||
}
|
||||
],
|
||||
"outbounds": [
|
||||
{
|
||||
"type": "vless",
|
||||
"server": "$HOST",
|
||||
"server_port": "$PORT",
|
||||
"uuid": "$UUID",
|
||||
"flow": "xtls-rprx-vision",
|
||||
"tls": {
|
||||
"enabled": true,
|
||||
"insecure": false,
|
||||
"server_name": "$FAKE_SERVER",
|
||||
"utls": {
|
||||
"enabled": true,
|
||||
"fingerprint": "chrome"
|
||||
},
|
||||
"reality": {
|
||||
"enabled": true,
|
||||
"public_key": "$PUBLIC_KEY",
|
||||
"short_id": "$SHORT_ID"
|
||||
}
|
||||
}
|
||||
}
|
||||
],
|
||||
"route": {
|
||||
"auto_detect_interface": true
|
||||
}
|
||||
}
|
||||
2217
podkop/files/usr/bin/podkop
Executable file
2217
podkop/files/usr/bin/podkop
Executable file
File diff suppressed because it is too large
Load Diff
68
podkop/files/usr/lib/constants.sh
Normal file
68
podkop/files/usr/lib/constants.sh
Normal file
@@ -0,0 +1,68 @@
|
||||
# shellcheck disable=SC2034
|
||||
|
||||
## Common
|
||||
PODKOP_CONFIG="/etc/config/podkop"
|
||||
RESOLV_CONF="/etc/resolv.conf"
|
||||
DNS_RESOLVERS="1.1.1.1 1.0.0.1 8.8.8.8 8.8.4.4 9.9.9.9 9.9.9.11 94.140.14.14 94.140.15.15 208.67.220.220 208.67.222.222 77.88.8.1 77.88.8.8"
|
||||
CHECK_PROXY_IP_DOMAIN="ip.podkop.fyi"
|
||||
FAKEIP_TEST_DOMAIN="fakeip.podkop.fyi"
|
||||
TMP_SING_BOX_FOLDER="/tmp/sing-box"
|
||||
TMP_RULESET_FOLDER="$TMP_SING_BOX_FOLDER/rulesets"
|
||||
CLOUDFLARE_OCTETS="8.47 162.159 188.114" # Endpoints https://github.com/ampetelin/warp-endpoint-checker
|
||||
JQ_REQUIRED_VERSION="1.7.1"
|
||||
COREUTILS_BASE64_REQUIRED_VERSION="9.7"
|
||||
|
||||
## nft
|
||||
NFT_TABLE_NAME="PodkopTable"
|
||||
NFT_LOCALV4_SET_NAME="localv4"
|
||||
NFT_COMMON_SET_NAME="podkop_subnets"
|
||||
NFT_DISCORD_SET_NAME="podkop_discord_subnets"
|
||||
NFT_INTERFACE_SET_NAME="interfaces"
|
||||
|
||||
## sing-box
|
||||
SB_REQUIRED_VERSION="1.12.0"
|
||||
# Log
|
||||
SB_DEFAULT_LOG_LEVEL="warn"
|
||||
# DNS
|
||||
SB_DNS_SERVER_TAG="dns-server"
|
||||
SB_FAKEIP_DNS_SERVER_TAG="fakeip-server"
|
||||
SB_FAKEIP_INET4_RANGE="198.18.0.0/15"
|
||||
SB_BOOTSTRAP_SERVER_TAG="bootstrap-dns-server"
|
||||
SB_FAKEIP_DNS_RULE_TAG="fakeip-dns-rule-tag"
|
||||
SB_INVERT_FAKEIP_DNS_RULE_TAG="invert-fakeip-dns-rule-tag"
|
||||
# Inbounds
|
||||
SB_TPROXY_INBOUND_TAG="tproxy-in"
|
||||
SB_TPROXY_INBOUND_ADDRESS="127.0.0.1"
|
||||
SB_TPROXY_INBOUND_PORT=1602
|
||||
SB_DNS_INBOUND_TAG="dns-in"
|
||||
SB_DNS_INBOUND_ADDRESS="127.0.0.42"
|
||||
SB_DNS_INBOUND_PORT=53
|
||||
SB_MIXED_INBOUND_TAG="mixed-in"
|
||||
SB_MIXED_INBOUND_ADDRESS="0.0.0.0" # TODO(ampetelin): maybe to determine address?
|
||||
SB_MIXED_INBOUND_PORT=2080
|
||||
SB_SERVICE_MIXED_INBOUND_TAG="service-mixed-in"
|
||||
SB_SERVICE_MIXED_INBOUND_ADDRESS="127.0.0.1"
|
||||
SB_SERVICE_MIXED_INBOUND_PORT=4534
|
||||
# Outbounds
|
||||
SB_DIRECT_OUTBOUND_TAG="direct-out"
|
||||
SB_MAIN_OUTBOUND_TAG="main-out"
|
||||
# Route
|
||||
SB_REJECT_RULE_TAG="reject-rule-tag"
|
||||
|
||||
## Lists
|
||||
GITHUB_RAW_URL="https://raw.githubusercontent.com/itdoginfo/allow-domains/main"
|
||||
SRS_MAIN_URL="https://github.com/itdoginfo/allow-domains/releases/latest/download"
|
||||
DOMAINS_RU_INSIDE="${GITHUB_RAW_URL}/Russia/inside-dnsmasq-nfset.lst"
|
||||
DOMAINS_RU_OUTSIDE="${GITHUB_RAW_URL}/Russia/outside-dnsmasq-nfset.lst"
|
||||
DOMAINS_UA="${GITHUB_RAW_URL}/Ukraine/inside-dnsmasq-nfset.lst"
|
||||
DOMAINS_YOUTUBE="${GITHUB_RAW_URL}/Services/youtube.lst"
|
||||
SUBNETS_TWITTER="${GITHUB_RAW_URL}/Subnets/IPv4/twitter.lst"
|
||||
SUBNETS_META="${GITHUB_RAW_URL}/Subnets/IPv4/meta.lst"
|
||||
SUBNETS_DISCORD="${GITHUB_RAW_URL}/Subnets/IPv4/discord.lst"
|
||||
SUBNETS_TELERAM="${GITHUB_RAW_URL}/Subnets/IPv4/telegram.lst"
|
||||
SUBNETS_CLOUDFLARE="${GITHUB_RAW_URL}/Subnets/IPv4/cloudflare.lst"
|
||||
SUBNETS_HETZNER="${GITHUB_RAW_URL}/Subnets/IPv4/hetzner.lst"
|
||||
SUBNETS_OVH="${GITHUB_RAW_URL}/Subnets/IPv4/ovh.lst"
|
||||
SUBNETS_DIGITALOCEAN="${GITHUB_RAW_URL}/Subnets/IPv4/digitalocean.lst"
|
||||
SUBNETS_CLOUDFRONT="${GITHUB_RAW_URL}/Subnets/IPv4/cloudfront.lst"
|
||||
COMMUNITY_SERVICES="russia_inside russia_outside ukraine_inside geoblock block porn news anime youtube hdrezka tiktok google_ai google_play hodca discord meta twitter cloudflare cloudfront digitalocean hetzner ovh telegram"
|
||||
14
podkop/files/usr/lib/helpers.jq
Normal file
14
podkop/files/usr/lib/helpers.jq
Normal file
@@ -0,0 +1,14 @@
|
||||
def extend_key_value(current_value; new_value):
|
||||
if (current_value | type) == "array" then
|
||||
if (new_value | type) == "array" then
|
||||
current_value + new_value
|
||||
else
|
||||
current_value + [new_value]
|
||||
end
|
||||
else
|
||||
if (new_value | type) == "array" then
|
||||
[current_value] + new_value
|
||||
else
|
||||
[current_value, new_value]
|
||||
end
|
||||
end;
|
||||
402
podkop/files/usr/lib/helpers.sh
Normal file
402
podkop/files/usr/lib/helpers.sh
Normal file
@@ -0,0 +1,402 @@
|
||||
# Check if string is valid IPv4
|
||||
is_ipv4() {
|
||||
local ip="$1"
|
||||
local regex="^((25[0-5]|(2[0-4]|1\d|[1-9]|)\d)\.?\b){4}$"
|
||||
[[ "$ip" =~ $regex ]]
|
||||
}
|
||||
|
||||
# Check if string is valid IPv4 with CIDR mask
|
||||
is_ipv4_cidr() {
|
||||
local ip="$1"
|
||||
local regex="^((25[0-5]|(2[0-4]|1\d|[1-9]|)\d)\.?\b){4}(\/(3[0-2]|2[0-9]|1[0-9]|[0-9]))$"
|
||||
[[ "$ip" =~ $regex ]]
|
||||
}
|
||||
|
||||
is_ipv4_ip_or_ipv4_cidr() {
|
||||
is_ipv4 "$1" || is_ipv4_cidr "$1"
|
||||
}
|
||||
|
||||
is_domain() {
|
||||
local str="$1"
|
||||
local regex='^[a-z0-9]([a-z0-9-]*[a-z0-9])?(\.[a-z0-9]([a-z0-9-]*[a-z0-9])?)*$'
|
||||
|
||||
[[ "$str" =~ $regex ]]
|
||||
}
|
||||
|
||||
is_domain_suffix() {
|
||||
local str="$1"
|
||||
local normalized="${str#.}"
|
||||
|
||||
is_domain "$normalized"
|
||||
}
|
||||
|
||||
# Checks if the given string is a valid base64-encoded sequence
|
||||
is_base64() {
|
||||
local str="$1"
|
||||
|
||||
if echo "$str" | base64 -d > /dev/null 2>&1; then
|
||||
return 0
|
||||
fi
|
||||
return 1
|
||||
}
|
||||
|
||||
# Checks if the given string looks like a Shadowsocks userinfo
|
||||
is_shadowsocks_userinfo_format() {
|
||||
local str="$1"
|
||||
local regex='^[^:]+:[^:]+(:[^:]+)?$'
|
||||
|
||||
[[ "$str" =~ $regex ]]
|
||||
}
|
||||
|
||||
# Compares the current package version with the required minimum
|
||||
is_min_package_version() {
|
||||
local current="$1"
|
||||
local required="$2"
|
||||
|
||||
local lowest
|
||||
lowest="$(printf '%s\n' "$current" "$required" | sort -V | head -n1)"
|
||||
|
||||
[ "$lowest" = "$required" ]
|
||||
}
|
||||
|
||||
# Checks if the given file exists
|
||||
file_exists() {
|
||||
local filepath="$1"
|
||||
|
||||
if [[ -f "$filepath" ]]; then
|
||||
return 0
|
||||
else
|
||||
return 1
|
||||
fi
|
||||
}
|
||||
|
||||
# Checks if a service script exists in /etc/init.d
|
||||
service_exists() {
|
||||
local service="$1"
|
||||
|
||||
if [ -x "/etc/init.d/$service" ]; then
|
||||
return 0
|
||||
else
|
||||
return 1
|
||||
fi
|
||||
}
|
||||
|
||||
# Returns the inbound tag name by appending the postfix to the given section
|
||||
get_inbound_tag_by_section() {
|
||||
local section="$1"
|
||||
local postfix="in"
|
||||
|
||||
echo "$section-$postfix"
|
||||
}
|
||||
|
||||
# Returns the outbound tag name by appending the postfix to the given section
|
||||
get_outbound_tag_by_section() {
|
||||
local section="$1"
|
||||
local postfix="out"
|
||||
|
||||
echo "$section-$postfix"
|
||||
}
|
||||
|
||||
# Constructs and returns a domain resolver tag by appending a fixed postfix to the given section
|
||||
get_domain_resolver_tag() {
|
||||
local section="$1"
|
||||
local postfix="domain-resolver"
|
||||
|
||||
echo "$section-$postfix"
|
||||
}
|
||||
|
||||
# Constructs and returns a ruleset tag using section, name, optional type, and a fixed postfix
|
||||
get_ruleset_tag() {
|
||||
local section="$1"
|
||||
local name="$2"
|
||||
local type="$3"
|
||||
local postfix="ruleset"
|
||||
|
||||
if [ -n "$type" ]; then
|
||||
echo "$section-$name-$type-$postfix"
|
||||
else
|
||||
echo "$section-$name-$postfix"
|
||||
fi
|
||||
}
|
||||
|
||||
# Determines the ruleset format based on the file extension (json → source, srs → binary)
|
||||
get_ruleset_format_by_file_extension() {
|
||||
local file_extension="$1"
|
||||
|
||||
local format
|
||||
case "$file_extension" in
|
||||
json) format="source" ;;
|
||||
srs) format="binary" ;;
|
||||
*)
|
||||
log "Unsupported file extension: .$file_extension"
|
||||
return 1
|
||||
;;
|
||||
esac
|
||||
|
||||
echo "$format"
|
||||
}
|
||||
|
||||
# Converts a comma-separated string into a JSON array string
|
||||
comma_string_to_json_array() {
|
||||
local input="$1"
|
||||
|
||||
if [ -z "$input" ]; then
|
||||
echo "[]"
|
||||
return
|
||||
fi
|
||||
|
||||
local replaced="${input//,/\",\"}"
|
||||
|
||||
echo "[\"$replaced\"]"
|
||||
}
|
||||
|
||||
# Decodes a URL-encoded string
|
||||
url_decode() {
|
||||
local encoded="$1"
|
||||
printf '%b' "$(echo "$encoded" | sed 's/+/ /g; s/%/\\x/g')"
|
||||
}
|
||||
|
||||
# Extracts the userinfo (username[:password]) part from a URL
|
||||
url_get_userinfo() {
|
||||
local url="$1"
|
||||
echo "$url" | sed -n -e 's#^[^:/?]*://##' -e '/@/!d' -e 's/@.*//p'
|
||||
}
|
||||
|
||||
# Extracts the host part from a URL
|
||||
url_get_host() {
|
||||
local url="$1"
|
||||
echo "$url" | sed -n -e 's#^[^:/?]*://##' -e 's#^[^/]*@##' -e 's#\([:/].*\|$\)##p'
|
||||
}
|
||||
|
||||
# Extracts the port number from a URL
|
||||
url_get_port() {
|
||||
local url="$1"
|
||||
echo "$url" | sed -n -e 's#^[^:/?]*://##' -e 's#^[^/]*@##' -e 's#^[^/]*:\([0-9][0-9]*\).*#\1#p'
|
||||
}
|
||||
|
||||
# Extracts the path from a URL (without query or fragment; returns "/" if empty)
|
||||
url_get_path() {
|
||||
local url="$1"
|
||||
echo "$url" | sed -n -e 's#^[^:/?]*://##' -e 's#^[^/]*##' -e 's#\([^?]*\).*#\1#p'
|
||||
}
|
||||
|
||||
# Extracts the value of a specific query parameter from a URL
|
||||
url_get_query_param() {
|
||||
local url="$1"
|
||||
local param="$2"
|
||||
|
||||
local raw
|
||||
raw=$(echo "$url" | sed -n "s/.*[?&]$param=\([^&?#]*\).*/\1/p")
|
||||
|
||||
[ -z "$raw" ] && echo "" && return
|
||||
|
||||
echo "$raw"
|
||||
}
|
||||
|
||||
# Extracts the basename (filename without extension) from a URL
|
||||
url_get_basename() {
|
||||
local url="$1"
|
||||
|
||||
local filename="${url##*/}"
|
||||
local basename="${filename%%.*}"
|
||||
|
||||
echo "$basename"
|
||||
}
|
||||
|
||||
# Extracts and returns the file extension from the given URL
|
||||
url_get_file_extension() {
|
||||
local url="$1"
|
||||
|
||||
local basename="${url##*/}"
|
||||
case "$basename" in
|
||||
*.*) echo "${basename##*.}" ;;
|
||||
*) echo "" ;;
|
||||
esac
|
||||
}
|
||||
|
||||
# Remove url fragment (everything after the first '#')
|
||||
url_strip_fragment() {
|
||||
local url="$1"
|
||||
|
||||
echo "${url%%#*}"
|
||||
}
|
||||
|
||||
# Decodes and returns a base64-encoded string
|
||||
base64_decode() {
|
||||
local str="$1"
|
||||
local decoded_url
|
||||
|
||||
decoded_url="$(echo "$str" | base64 -d 2> /dev/null)"
|
||||
|
||||
echo "$decoded_url"
|
||||
}
|
||||
|
||||
# Generates a unique 16-character ID based on the current timestamp and a random number
|
||||
gen_id() {
|
||||
printf '%s%s' "$(date +%s)" "$RANDOM" | md5sum | cut -c1-16
|
||||
}
|
||||
|
||||
# Adds a missing UCI option with the given value if it does not exist
|
||||
migration_add_new_option() {
|
||||
local package="$1"
|
||||
local section="$2"
|
||||
local option="$3"
|
||||
local value="$4"
|
||||
|
||||
local current
|
||||
current="$(uci -q get "$package.$section.$option")"
|
||||
if [ -z "$current" ]; then
|
||||
log "Adding missing option '$option' with value '$value'"
|
||||
uci set "$package.$section.$option=$value"
|
||||
uci commit "$package"
|
||||
return 0
|
||||
else
|
||||
return 1
|
||||
fi
|
||||
}
|
||||
|
||||
# Migrates a configuration key in an OpenWrt config file from old_key_name to new_key_name
|
||||
migration_rename_config_key() {
|
||||
local config="$1"
|
||||
local key_type="$2"
|
||||
local old_key_name="$3"
|
||||
local new_key_name="$4"
|
||||
|
||||
if grep -q "$key_type $old_key_name" "$config"; then
|
||||
log "Deprecated $key_type found: $old_key_name migrating to $new_key_name"
|
||||
sed -i "s/$key_type $old_key_name/$key_type $new_key_name/g" "$config"
|
||||
fi
|
||||
}
|
||||
|
||||
# Download URL content directly
|
||||
download_to_stream() {
|
||||
local url="$1"
|
||||
local http_proxy_address="$2"
|
||||
local retries="${3:-3}"
|
||||
local wait="${4:-2}"
|
||||
|
||||
for attempt in $(seq 1 "$retries"); do
|
||||
if [ -n "$http_proxy_address" ]; then
|
||||
http_proxy="http://$http_proxy_address" https_proxy="http://$http_proxy_address" wget -qO- "$url" | sed 's/\r$//' && break
|
||||
else
|
||||
wget -qO- "$url" | sed 's/\r$//' && break
|
||||
fi
|
||||
|
||||
log "Attempt $attempt/$retries to download $url failed" "warn"
|
||||
sleep "$wait"
|
||||
done
|
||||
}
|
||||
|
||||
# Download URL to file
|
||||
download_to_file() {
|
||||
local url="$1"
|
||||
local filepath="$2"
|
||||
local http_proxy_address="$3"
|
||||
local retries="${4:-3}"
|
||||
local wait="${5:-2}"
|
||||
|
||||
for attempt in $(seq 1 "$retries"); do
|
||||
if [ -n "$http_proxy_address" ]; then
|
||||
http_proxy="http://$http_proxy_address" https_proxy="http://$http_proxy_address" wget -O "$filepath" "$url" && break
|
||||
else
|
||||
wget -O "$filepath" "$url" && break
|
||||
fi
|
||||
|
||||
log "Attempt $attempt/$retries to download $url failed" "warn"
|
||||
sleep "$wait"
|
||||
done
|
||||
|
||||
if grep -q $'\r' "$filepath"; then
|
||||
log "Downloaded file has Windows line endings (CRLF). Converting to Unix (LF)"
|
||||
sed -i 's/\r$//' "$filepath"
|
||||
fi
|
||||
}
|
||||
|
||||
# Decompiles a sing-box SRS binary file into a JSON ruleset file
|
||||
decompile_srs_file() {
|
||||
local binary_filepath="$1"
|
||||
local output_filepath="$2"
|
||||
|
||||
log "Decompiling $binary_filepath to $output_filepath" "debug"
|
||||
|
||||
if ! file_exists "$binary_filepath"; then
|
||||
log "File $binary_filepath not found" "error"
|
||||
return 1
|
||||
fi
|
||||
|
||||
sing-box rule-set decompile "$binary_filepath" -o "$output_filepath"
|
||||
if [[ $? -ne 0 ]]; then
|
||||
log "Decompilation command failed for $binary_filepath" "error"
|
||||
return 1
|
||||
fi
|
||||
}
|
||||
|
||||
#######################################
|
||||
# Parses a whitespace-separated string, validates items as either domains
|
||||
# or IPv4 addresses/subnets, and returns a comma-separated string of valid items.
|
||||
# Arguments:
|
||||
# $1 - Input string (space-separated list of items)
|
||||
# $2 - Type of validation ("domains" or "subnets")
|
||||
# Outputs:
|
||||
# Comma-separated string of valid domains or subnets
|
||||
#######################################
|
||||
parse_domain_or_subnet_string_to_commas_string() {
|
||||
local string="$1"
|
||||
local type="$2"
|
||||
|
||||
tmpfile=$(mktemp)
|
||||
printf "%s\n" "$string" | sed 's/\/\/.*//' | tr ', ' '\n' | grep -v '^$' > "$tmpfile"
|
||||
|
||||
result="$(parse_domain_or_subnet_file_to_comma_string "$tmpfile" "$type")"
|
||||
rm -f "$tmpfile"
|
||||
|
||||
echo "$result"
|
||||
}
|
||||
|
||||
#######################################
|
||||
# Parses a file line by line, validates entries as either domains or subnets,
|
||||
# and returns a single comma-separated string of valid items.
|
||||
# Arguments:
|
||||
# $1 - Path to the input file
|
||||
# $2 - Type of validation ("domains" or "subnets")
|
||||
# Outputs:
|
||||
# Comma-separated string of valid domains or subnets
|
||||
#######################################
|
||||
parse_domain_or_subnet_file_to_comma_string() {
|
||||
local filepath="$1"
|
||||
local type="$2"
|
||||
|
||||
local result
|
||||
while IFS= read -r line; do
|
||||
line=$(echo "$line" | sed 's/^[[:space:]]*//;s/[[:space:]]*$//')
|
||||
|
||||
[ -z "$line" ] && continue
|
||||
|
||||
case "$type" in
|
||||
domains)
|
||||
if ! is_domain_suffix "$line"; then
|
||||
log "'$line' is not a valid domain" "debug"
|
||||
continue
|
||||
fi
|
||||
;;
|
||||
subnets)
|
||||
if ! is_ipv4 "$line" && ! is_ipv4_cidr "$line"; then
|
||||
log "'$line' is not IPv4 or IPv4 CIDR" "debug"
|
||||
continue
|
||||
fi
|
||||
;;
|
||||
*)
|
||||
log "Unknown type: $type" "error"
|
||||
return 1
|
||||
;;
|
||||
esac
|
||||
|
||||
if [ -z "$result" ]; then
|
||||
result="$line"
|
||||
else
|
||||
result="$result,$line"
|
||||
fi
|
||||
done < "$filepath"
|
||||
|
||||
echo "$result"
|
||||
}
|
||||
30
podkop/files/usr/lib/logging.sh
Normal file
30
podkop/files/usr/lib/logging.sh
Normal file
@@ -0,0 +1,30 @@
|
||||
COLOR_CYAN="\033[0;36m"
|
||||
COLOR_GREEN="\033[0;32m"
|
||||
COLOR_RESET="\033[0m"
|
||||
|
||||
log() {
|
||||
local message="$1"
|
||||
local level="$2"
|
||||
|
||||
if [ "$level" == "" ]; then
|
||||
level="info"
|
||||
fi
|
||||
|
||||
logger -t "podkop" "[$level] $message"
|
||||
}
|
||||
|
||||
nolog() {
|
||||
local message="$1"
|
||||
local timestamp
|
||||
timestamp=$(date +"%Y-%m-%d %H:%M:%S")
|
||||
|
||||
echo -e "${COLOR_CYAN}[$timestamp]${COLOR_RESET} ${COLOR_GREEN}$message${COLOR_RESET}"
|
||||
}
|
||||
|
||||
echolog() {
|
||||
local message="$1"
|
||||
local level="$2"
|
||||
|
||||
log "$message" "$level"
|
||||
nolog "$message"
|
||||
}
|
||||
30
podkop/files/usr/lib/nft.sh
Normal file
30
podkop/files/usr/lib/nft.sh
Normal file
@@ -0,0 +1,30 @@
|
||||
# Create an nftables table in the inet family
|
||||
nft_create_table() {
|
||||
local name="$1"
|
||||
|
||||
nft add table inet "$name"
|
||||
}
|
||||
|
||||
# Create a set within a table for storing IPv4 addresses
|
||||
nft_create_ipv4_set() {
|
||||
local table="$1"
|
||||
local name="$2"
|
||||
|
||||
nft add set inet "$table" "$name" '{ type ipv4_addr; flags interval; auto-merge; }'
|
||||
}
|
||||
|
||||
nft_create_ifname_set() {
|
||||
local table="$1"
|
||||
local name="$2"
|
||||
|
||||
nft add set inet "$table" "$name" '{ type ifname; flags interval; }'
|
||||
}
|
||||
|
||||
# Add one or more elements to a set
|
||||
nft_add_set_elements() {
|
||||
local table="$1"
|
||||
local set="$2"
|
||||
local elements="$3"
|
||||
|
||||
nft add element inet "$table" "$set" "{ $elements }"
|
||||
}
|
||||
233
podkop/files/usr/lib/sing_box_config_facade.sh
Normal file
233
podkop/files/usr/lib/sing_box_config_facade.sh
Normal file
@@ -0,0 +1,233 @@
|
||||
PODKOP_LIB="/usr/lib/podkop"
|
||||
. "$PODKOP_LIB/helpers.sh"
|
||||
. "$PODKOP_LIB/sing_box_config_manager.sh"
|
||||
|
||||
sing_box_cf_add_dns_server() {
|
||||
local config="$1"
|
||||
local type="$2"
|
||||
local tag="$3"
|
||||
local server="$4"
|
||||
local domain_resolver="$5"
|
||||
local detour="$6"
|
||||
|
||||
local server_address server_port
|
||||
server_address=$(url_get_host "$server")
|
||||
server_port=$(url_get_port "$server")
|
||||
|
||||
case "$type" in
|
||||
udp)
|
||||
[ -z "$server_port" ] && server_port=53
|
||||
config=$(sing_box_cm_add_udp_dns_server "$config" "$tag" "$server_address" "$server_port" "$domain_resolver" \
|
||||
"$detour")
|
||||
;;
|
||||
dot)
|
||||
[ -z "$server_port" ] && server_port=853
|
||||
config=$(sing_box_cm_add_tls_dns_server "$config" "$tag" "$server_address" "$server_port" "$domain_resolver" \
|
||||
"$detour")
|
||||
;;
|
||||
doh)
|
||||
[ -z "$server_port" ] && server_port=443
|
||||
local path headers
|
||||
path=$(url_get_path "$server")
|
||||
headers="" # TODO(ampetelin): implement it if necessary
|
||||
config=$(sing_box_cm_add_https_dns_server "$config" "$tag" "$server_address" "$server_port" "$path" "$headers" \
|
||||
"$domain_resolver" "$detour")
|
||||
;;
|
||||
*)
|
||||
log "Unsupported DNS server type: $type"
|
||||
exit 1
|
||||
;;
|
||||
esac
|
||||
|
||||
echo "$config"
|
||||
}
|
||||
|
||||
sing_box_cf_add_mixed_inbound_and_route_rule() {
|
||||
local config="$1"
|
||||
local tag="$2"
|
||||
local listen_address="$3"
|
||||
local listen_port="$4"
|
||||
local outbound="$5"
|
||||
|
||||
config=$(sing_box_cm_add_mixed_inbound "$config" "$tag" "$listen_address" "$listen_port")
|
||||
config=$(sing_box_cm_add_route_rule "$config" "" "$tag" "$outbound")
|
||||
|
||||
echo "$config"
|
||||
}
|
||||
|
||||
sing_box_cf_add_proxy_outbound() {
|
||||
local config="$1"
|
||||
local section="$2"
|
||||
local url="$3"
|
||||
local udp_over_tcp="$4"
|
||||
|
||||
url=$(url_decode "$url")
|
||||
url=$(url_strip_fragment "$url")
|
||||
|
||||
local scheme="${url%%://*}"
|
||||
case "$scheme" in
|
||||
vless)
|
||||
local tag host port uuid flow packet_encoding
|
||||
tag=$(get_outbound_tag_by_section "$section")
|
||||
host=$(url_get_host "$url")
|
||||
port=$(url_get_port "$url")
|
||||
uuid=$(url_get_userinfo "$url")
|
||||
flow=$(url_get_query_param "$url" "flow")
|
||||
packet_encoding=$(url_get_query_param "$url" "packetEncoding")
|
||||
|
||||
config=$(sing_box_cm_add_vless_outbound "$config" "$tag" "$host" "$port" "$uuid" "$flow" "" "$packet_encoding")
|
||||
|
||||
local transport
|
||||
transport=$(url_get_query_param "$url" "type")
|
||||
case "$transport" in
|
||||
tcp | raw) ;;
|
||||
ws)
|
||||
local ws_path ws_host ws_early_data
|
||||
ws_path=$(url_get_query_param "$url" "path")
|
||||
ws_host=$(url_get_query_param "$url" "host")
|
||||
ws_early_data=$(url_get_query_param "$url" "ed")
|
||||
|
||||
config=$(sing_box_cm_set_vless_ws_transport "$config" "$tag" "$ws_path" "$ws_host" "$ws_early_data")
|
||||
;;
|
||||
grpc)
|
||||
# TODO(ampetelin): Add handling of optional gRPC parameters; example links are needed.
|
||||
config=$(sing_box_cm_set_vless_grpc_transport "$config" "$tag")
|
||||
;;
|
||||
*)
|
||||
log "Unknown transport '$transport' detected." "error"
|
||||
;;
|
||||
esac
|
||||
|
||||
local security
|
||||
security=$(url_get_query_param "$url" "security")
|
||||
case "$security" in
|
||||
tls | reality)
|
||||
local sni insecure alpn fingerprint public_key short_id
|
||||
sni=$(url_get_query_param "$url" "sni")
|
||||
insecure=$(url_get_query_param "$url" "allowInsecure")
|
||||
alpn=$(comma_string_to_json_array "$(url_get_query_param "$url" "alpn")")
|
||||
fingerprint=$(url_get_query_param "$url" "fp")
|
||||
public_key=$(url_get_query_param "$url" "pbk")
|
||||
short_id=$(url_get_query_param "$url" "sid")
|
||||
|
||||
config=$(
|
||||
sing_box_cm_set_vless_tls \
|
||||
"$config" \
|
||||
"$tag" \
|
||||
"$sni" \
|
||||
"$([ "$insecure" == "1" ] && echo true)" \
|
||||
"$([ "$alpn" == "[]" ] && echo null || echo "$alpn")" \
|
||||
"$fingerprint" \
|
||||
"$public_key" \
|
||||
"$short_id"
|
||||
)
|
||||
;;
|
||||
none) ;;
|
||||
*)
|
||||
log "Unknown security '$security' detected." "error"
|
||||
;;
|
||||
esac
|
||||
;;
|
||||
ss)
|
||||
local userinfo tag host port method password udp_over_tcp
|
||||
|
||||
userinfo=$(url_get_userinfo "$url")
|
||||
if ! is_shadowsocks_userinfo_format "$userinfo"; then
|
||||
userinfo=$(base64_decode "$userinfo")
|
||||
if [ $? -ne 0 ]; then
|
||||
log "Cannot decode shadowsocks userinfo or it does not match the expected format. Aborted." "fatal"
|
||||
exit 1
|
||||
fi
|
||||
fi
|
||||
|
||||
tag=$(get_outbound_tag_by_section "$section")
|
||||
host=$(url_get_host "$url")
|
||||
port=$(url_get_port "$url")
|
||||
method="${userinfo%%:*}"
|
||||
password="${userinfo#*:}"
|
||||
|
||||
config=$(
|
||||
sing_box_cm_add_shadowsocks_outbound \
|
||||
"$config" \
|
||||
"$tag" \
|
||||
"$host" \
|
||||
"$port" \
|
||||
"$method" \
|
||||
"$password" \
|
||||
"" \
|
||||
"$([ "$udp_over_tcp" == "1" ] && echo 2)" # if udp_over_tcp is enabled, enable version 2
|
||||
)
|
||||
;;
|
||||
*)
|
||||
log "Unsupported proxy $scheme type"
|
||||
exit 1
|
||||
;;
|
||||
esac
|
||||
|
||||
echo "$config"
|
||||
}
|
||||
|
||||
sing_box_cf_add_json_outbound() {
|
||||
local config="$1"
|
||||
local section="$2"
|
||||
local json_outbound="$3"
|
||||
|
||||
local tag
|
||||
tag=$(get_outbound_tag_by_section "$section")
|
||||
|
||||
config=$(sing_box_cm_add_raw_outbound "$config" "$tag" "$json_outbound")
|
||||
|
||||
echo "$config"
|
||||
}
|
||||
|
||||
sing_box_cf_add_interface_outbound() {
|
||||
local config="$1"
|
||||
local section="$2"
|
||||
local interface_name="$3"
|
||||
|
||||
local tag
|
||||
tag=$(get_outbound_tag_by_section "$section")
|
||||
|
||||
config=$(sing_box_cm_add_interface_outbound "$config" "$tag" "$interface_name")
|
||||
|
||||
echo "$config"
|
||||
}
|
||||
|
||||
sing_box_cf_proxy_domain() {
|
||||
local config="$1"
|
||||
local inbound="$2"
|
||||
local domain="$3"
|
||||
local outbound="$4"
|
||||
|
||||
tag="$(gen_id)"
|
||||
config=$(sing_box_cm_add_route_rule "$config" "$tag" "$inbound" "$outbound")
|
||||
config=$(sing_box_cm_patch_route_rule "$config" "$tag" "domain" "$domain")
|
||||
|
||||
echo "$config"
|
||||
}
|
||||
|
||||
sing_box_cf_override_domain_port() {
|
||||
local config="$1"
|
||||
local domain="$2"
|
||||
local port="$3"
|
||||
|
||||
tag="$(gen_id)"
|
||||
config=$(sing_box_cm_add_options_route_rule "$config" "$tag")
|
||||
config=$(sing_box_cm_patch_route_rule "$config" "$tag" "domain" "$domain")
|
||||
config=$(sing_box_cm_patch_route_rule "$config" "$tag" "override_port" "$port")
|
||||
|
||||
echo "$config"
|
||||
}
|
||||
|
||||
sing_box_cf_add_single_key_reject_rule() {
|
||||
local config="$1"
|
||||
local inbound="$2"
|
||||
local key="$3"
|
||||
local value="$4"
|
||||
|
||||
tag="$(gen_id)"
|
||||
config=$(sing_box_cm_add_reject_route_rule "$config" "$tag" "$inbound")
|
||||
config=$(sing_box_cm_patch_route_rule "$config" "$tag" "$key" "$value")
|
||||
|
||||
echo "$config"
|
||||
}
|
||||
1391
podkop/files/usr/lib/sing_box_config_manager.sh
Normal file
1391
podkop/files/usr/lib/sing_box_config_manager.sh
Normal file
File diff suppressed because it is too large
Load Diff
Reference in New Issue
Block a user