clash/config/config.go

302 lines
7.5 KiB
Go
Raw Normal View History

package config
import (
"fmt"
"io/ioutil"
"os"
"strings"
2018-10-06 05:15:02 +00:00
adapters "github.com/Dreamacro/clash/adapters/outbound"
"github.com/Dreamacro/clash/common/structure"
C "github.com/Dreamacro/clash/constant"
2018-11-21 05:47:46 +00:00
"github.com/Dreamacro/clash/log"
R "github.com/Dreamacro/clash/rules"
2018-11-21 05:47:46 +00:00
T "github.com/Dreamacro/clash/tunnel"
yaml "gopkg.in/yaml.v2"
)
2018-08-11 18:23:46 +00:00
// General config
type General struct {
2018-11-21 05:47:46 +00:00
Port int `json:"port"`
SocksPort int `json:"socks-port"`
RedirPort int `json:"redir-port"`
AllowLan bool `json:"allow-lan"`
Mode T.Mode `json:"mode"`
LogLevel log.LogLevel `json:"log-level"`
ExternalController string `json:"external-controller,omitempty"`
Secret string `json:"secret,omitempty"`
2018-08-11 18:23:46 +00:00
}
2018-11-21 05:47:46 +00:00
type rawConfig struct {
Port int `yaml:"port"`
SocksPort int `yaml:"socks-port"`
RedirPort int `yaml:"redir-port"`
AllowLan bool `yaml:"allow-lan"`
Mode string `yaml:"mode"`
LogLevel string `yaml:"log-level"`
ExternalController string `yaml:"external-controller"`
2018-10-06 05:15:02 +00:00
Secret string `yaml:"secret"`
Proxy []map[string]interface{} `yaml:"Proxy"`
ProxyGroup []map[string]interface{} `yaml:"Proxy Group"`
Rule []string `yaml:"Rule"`
}
// Config is clash config manager
type Config struct {
2018-11-21 05:47:46 +00:00
General *General
Rules []C.Rule
Proxies map[string]C.Proxy
}
2018-11-21 05:47:46 +00:00
func readConfig(path string) (*rawConfig, error) {
if _, err := os.Stat(path); os.IsNotExist(err) {
return nil, err
}
2018-11-21 05:47:46 +00:00
data, err := ioutil.ReadFile(path)
if err != nil {
return nil, err
}
2018-10-14 13:22:58 +00:00
if len(data) == 0 {
return nil, fmt.Errorf("Configuration file %s is empty", C.Path.Config())
}
// config with some default value
2018-11-21 05:47:46 +00:00
rawConfig := &rawConfig{
AllowLan: false,
2018-11-21 05:47:46 +00:00
Mode: T.Rule.String(),
LogLevel: log.INFO.String(),
Rule: []string{},
Proxy: []map[string]interface{}{},
ProxyGroup: []map[string]interface{}{},
}
err = yaml.Unmarshal([]byte(data), &rawConfig)
return rawConfig, err
}
// Parse config
2018-11-21 05:47:46 +00:00
func Parse(path string) (*Config, error) {
config := &Config{}
rawCfg, err := readConfig(path)
if err != nil {
2018-11-21 05:47:46 +00:00
return nil, err
}
2018-11-21 05:47:46 +00:00
general, err := parseGeneral(rawCfg)
if err != nil {
return nil, err
}
2018-11-21 05:47:46 +00:00
config.General = general
2018-11-21 05:47:46 +00:00
proxies, err := parseProxies(rawCfg)
if err != nil {
return nil, err
}
2018-11-21 05:47:46 +00:00
config.Proxies = proxies
2018-11-21 05:47:46 +00:00
rules, err := parseRules(rawCfg)
if err != nil {
2018-11-21 05:47:46 +00:00
return nil, err
}
2018-11-21 05:47:46 +00:00
config.Rules = rules
2018-11-21 05:47:46 +00:00
return config, nil
}
2018-11-21 05:47:46 +00:00
func parseGeneral(cfg *rawConfig) (*General, error) {
port := cfg.Port
socksPort := cfg.SocksPort
redirPort := cfg.RedirPort
allowLan := cfg.AllowLan
logLevelString := cfg.LogLevel
modeString := cfg.Mode
2018-11-21 05:47:46 +00:00
externalController := cfg.ExternalController
secret := cfg.Secret
2018-11-21 05:47:46 +00:00
mode, exist := T.ModeMapping[modeString]
if !exist {
2018-11-21 05:47:46 +00:00
return nil, fmt.Errorf("General.mode value invalid")
}
2018-11-21 05:47:46 +00:00
logLevel, exist := log.LogLevelMapping[logLevelString]
if !exist {
2018-11-21 05:47:46 +00:00
return nil, fmt.Errorf("General.log-level value invalid")
}
2018-11-21 05:47:46 +00:00
general := &General{
Port: port,
SocksPort: socksPort,
RedirPort: redirPort,
AllowLan: allowLan,
Mode: mode,
LogLevel: logLevel,
ExternalController: externalController,
Secret: secret,
}
2018-11-21 05:47:46 +00:00
return general, nil
}
2018-11-21 05:47:46 +00:00
func parseProxies(cfg *rawConfig) (map[string]C.Proxy, error) {
proxies := make(map[string]C.Proxy)
proxiesConfig := cfg.Proxy
groupsConfig := cfg.ProxyGroup
decoder := structure.NewDecoder(structure.Option{TagName: "proxy", WeaklyTypedInput: true})
proxies["DIRECT"] = adapters.NewDirect()
proxies["REJECT"] = adapters.NewReject()
// parse proxy
for idx, mapping := range proxiesConfig {
proxyType, existType := mapping["type"].(string)
2018-10-27 04:57:56 +00:00
if !existType {
2018-11-21 05:47:46 +00:00
return nil, fmt.Errorf("Proxy %d missing type", idx)
}
var proxy C.Proxy
var err error
switch proxyType {
case "ss":
ssOption := &adapters.ShadowSocksOption{}
err = decoder.Decode(mapping, ssOption)
if err != nil {
break
}
proxy, err = adapters.NewShadowSocks(*ssOption)
2018-08-12 05:50:54 +00:00
case "socks5":
socksOption := &adapters.Socks5Option{}
err = decoder.Decode(mapping, socksOption)
2018-09-06 02:53:29 +00:00
if err != nil {
break
2018-09-06 02:53:29 +00:00
}
proxy = adapters.NewSocks5(*socksOption)
case "vmess":
vmessOption := &adapters.VmessOption{}
err = decoder.Decode(mapping, vmessOption)
2018-09-06 02:53:29 +00:00
if err != nil {
break
2018-09-06 02:53:29 +00:00
}
proxy, err = adapters.NewVmess(*vmessOption)
default:
2018-11-21 05:47:46 +00:00
return nil, fmt.Errorf("Unsupport proxy type: %s", proxyType)
}
2018-10-27 04:57:56 +00:00
if err != nil {
2018-11-21 05:47:46 +00:00
return nil, fmt.Errorf("Proxy [%d]: %s", idx, err.Error())
2018-10-27 04:57:56 +00:00
}
if _, exist := proxies[proxy.Name()]; exist {
2018-11-21 05:47:46 +00:00
return nil, fmt.Errorf("Proxy %s is the duplicate name", proxy.Name())
}
2018-10-27 04:57:56 +00:00
proxies[proxy.Name()] = proxy
}
// parse proxy group
for idx, mapping := range groupsConfig {
groupType, existType := mapping["type"].(string)
groupName, existName := mapping["name"].(string)
if !existType && existName {
2018-11-21 05:47:46 +00:00
return nil, fmt.Errorf("ProxyGroup %d: missing type or name", idx)
}
if _, exist := proxies[groupName]; exist {
2018-11-21 05:47:46 +00:00
return nil, fmt.Errorf("ProxyGroup %s: the duplicate name", groupName)
}
var group C.Proxy
var err error
switch groupType {
case "url-test":
urlTestOption := &adapters.URLTestOption{}
err = decoder.Decode(mapping, urlTestOption)
if err != nil {
break
}
ps, err := getProxies(proxies, urlTestOption.Proxies)
if err != nil {
2018-11-21 05:47:46 +00:00
return nil, fmt.Errorf("ProxyGroup %s: %s", groupName, err.Error())
}
group, err = adapters.NewURLTest(*urlTestOption, ps)
case "select":
selectorOption := &adapters.SelectorOption{}
err = decoder.Decode(mapping, selectorOption)
if err != nil {
break
}
ps, err := getProxies(proxies, selectorOption.Proxies)
if err != nil {
2018-11-21 05:47:46 +00:00
return nil, fmt.Errorf("ProxyGroup %s: %s", groupName, err.Error())
}
group, err = adapters.NewSelector(selectorOption.Name, ps)
2018-09-25 16:34:15 +00:00
case "fallback":
fallbackOption := &adapters.FallbackOption{}
err = decoder.Decode(mapping, fallbackOption)
if err != nil {
break
2018-09-25 16:34:15 +00:00
}
ps, err := getProxies(proxies, fallbackOption.Proxies)
if err != nil {
2018-11-21 05:47:46 +00:00
return nil, fmt.Errorf("ProxyGroup %s: %s", groupName, err.Error())
2018-09-25 16:34:15 +00:00
}
group, err = adapters.NewFallback(*fallbackOption, ps)
}
if err != nil {
2018-11-21 05:47:46 +00:00
return nil, fmt.Errorf("Proxy %s: %s", groupName, err.Error())
}
proxies[groupName] = group
}
var ps []C.Proxy
for _, v := range proxies {
ps = append(ps, v)
}
proxies["GLOBAL"], _ = adapters.NewSelector("GLOBAL", ps)
2018-09-25 16:34:15 +00:00
// close old goroutine
2018-11-21 05:47:46 +00:00
for _, proxy := range proxies {
2018-09-25 16:34:15 +00:00
switch raw := proxy.(type) {
case *adapters.URLTest:
raw.Close()
case *adapters.Fallback:
raw.Close()
}
}
2018-11-21 05:47:46 +00:00
return proxies, nil
}
2018-11-21 05:47:46 +00:00
func parseRules(cfg *rawConfig) ([]C.Rule, error) {
rules := []C.Rule{}
rulesConfig := cfg.Rule
// parse rules
for _, line := range rulesConfig {
rule := strings.Split(line, ",")
if len(rule) < 3 {
continue
}
rule = trimArr(rule)
switch rule[0] {
2018-09-09 07:01:46 +00:00
case "DOMAIN":
rules = append(rules, R.NewDomain(rule[1], rule[2]))
case "DOMAIN-SUFFIX":
rules = append(rules, R.NewDomainSuffix(rule[1], rule[2]))
case "DOMAIN-KEYWORD":
rules = append(rules, R.NewDomainKeyword(rule[1], rule[2]))
case "GEOIP":
rules = append(rules, R.NewGEOIP(rule[1], rule[2]))
case "IP-CIDR", "IP-CIDR6":
rules = append(rules, R.NewIPCIDR(rule[1], rule[2]))
case "FINAL":
rules = append(rules, R.NewFinal(rule[2]))
}
}
2018-11-21 05:47:46 +00:00
return rules, nil
}