Compare commits
4 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
68f5f123ca | ||
|
|
fae43d0471 | ||
|
|
9d6dc45fdb | ||
|
|
9aa5a2d242 |
@@ -37,7 +37,5 @@ sh <(wget -qO- https://raw.githubusercontent.com/itdoginfo/podkop/refs/heads/mai
|
||||
- [ ] IPv6. Только после наполнения Wiki
|
||||
|
||||
Рефактор
|
||||
- [ ] Handle для sing-box
|
||||
- [ ] Handle для dnsmasq
|
||||
- [ ] Unit тесты (BATS)
|
||||
- [ ] Интеграционые тесты бекенда (OpenWrt rootfs + BATS)
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
include $(TOPDIR)/rules.mk
|
||||
|
||||
PKG_NAME:=luci-app-podkop
|
||||
PKG_VERSION:=0.3.45
|
||||
PKG_VERSION:=0.3.47
|
||||
PKG_RELEASE:=1
|
||||
|
||||
LUCI_TITLE:=LuCI podkop app
|
||||
|
||||
@@ -87,6 +87,7 @@ function createConfigSection(section, map, network) {
|
||||
o = s.taboption('basic', form.ListValue, 'mode', _('Connection Type'), _('Select between VPN and Proxy connection methods for traffic routing'));
|
||||
o.value('proxy', ('Proxy'));
|
||||
o.value('vpn', ('VPN'));
|
||||
o.value('block', ('Block'));
|
||||
o.ucisection = s.section;
|
||||
|
||||
o = s.taboption('basic', form.ListValue, 'proxy_config_type', _('Configuration Type'), _('Select how to configure the proxy'));
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
include $(TOPDIR)/rules.mk
|
||||
|
||||
PKG_NAME:=podkop
|
||||
PKG_VERSION:=0.3.45
|
||||
PKG_VERSION:=0.3.47
|
||||
PKG_RELEASE:=1
|
||||
|
||||
PKG_MAINTAINER:=ITDog <podkop@itdog.info>
|
||||
@@ -15,7 +15,7 @@ define Package/podkop
|
||||
DEPENDS:=+sing-box +curl +jq +kmod-nft-tproxy +coreutils-base64
|
||||
CONFLICTS:=https-dns-proxy
|
||||
TITLE:=Domain routing app
|
||||
URL:=https://itdog.info
|
||||
URL:=https://podkop.net
|
||||
PKGARCH:=all
|
||||
endef
|
||||
|
||||
|
||||
@@ -67,7 +67,10 @@ start_main() {
|
||||
|
||||
config_foreach process_validate_service
|
||||
|
||||
sleep 3
|
||||
# Sync time for DoH/DoT
|
||||
/usr/sbin/ntpd -q -p 194.190.168.1 -p 216.239.35.0 -p 216.239.35.4 -p 162.159.200.1 -p 162.159.200.123
|
||||
|
||||
sleep 2
|
||||
|
||||
mkdir -p /tmp/podkop
|
||||
|
||||
@@ -160,7 +163,7 @@ stop_main() {
|
||||
|
||||
if [ -f /var/run/podkop_list_update.pid ]; then
|
||||
pid=$(cat /var/run/podkop_list_update.pid)
|
||||
if kill -0 "$pid"; then
|
||||
if kill -0 "$pid" 2>/dev/null; then
|
||||
kill "$pid" 2>/dev/null
|
||||
log "Stopped list_update"
|
||||
fi
|
||||
@@ -375,8 +378,6 @@ save_dnsmasq_config() {
|
||||
|
||||
dnsmasq_add_resolver() {
|
||||
log "Save dnsmasq config"
|
||||
save_dnsmasq_config "dhcp.@dnsmasq[0].noresolv" "dhcp.@dnsmasq[0].podkop_noresolv"
|
||||
save_dnsmasq_config "dhcp.@dnsmasq[0].cachesize" "dhcp.@dnsmasq[0].podkop_cachesize"
|
||||
|
||||
uci -q delete dhcp.@dnsmasq[0].podkop_server
|
||||
for server in $(uci get dhcp.@dnsmasq[0].server 2>/dev/null); do
|
||||
@@ -388,6 +389,9 @@ dnsmasq_add_resolver() {
|
||||
fi
|
||||
done
|
||||
|
||||
save_dnsmasq_config "dhcp.@dnsmasq[0].noresolv" "dhcp.@dnsmasq[0].podkop_noresolv"
|
||||
save_dnsmasq_config "dhcp.@dnsmasq[0].cachesize" "dhcp.@dnsmasq[0].podkop_cachesize"
|
||||
|
||||
log "Configure dnsmasq for sing-box"
|
||||
uci set dhcp.@dnsmasq[0].noresolv="1"
|
||||
uci set dhcp.@dnsmasq[0].cachesize="0"
|
||||
@@ -939,6 +943,9 @@ sing_box_outdound() {
|
||||
fi
|
||||
fi
|
||||
;;
|
||||
"block")
|
||||
log "Block mode"
|
||||
;;
|
||||
*)
|
||||
log "Requires *vpn* or *proxy* value"
|
||||
return
|
||||
@@ -1219,8 +1226,8 @@ sing_box_config_vless() {
|
||||
if [ $? -eq 0 ]; then
|
||||
log "Config VLESS created successfully"
|
||||
else
|
||||
log "Error: VLESS invalid JSON config generated"
|
||||
return 1
|
||||
log "[critical] Error: VLESS invalid JSON config generated"
|
||||
exit 1
|
||||
fi
|
||||
}
|
||||
|
||||
@@ -1458,6 +1465,32 @@ sing_box_rules() {
|
||||
local rule_set="$1"
|
||||
local outbound="$2"
|
||||
|
||||
config_get mode "$section" "mode"
|
||||
|
||||
if [[ "$mode" == "block" ]]; then
|
||||
# Action reject
|
||||
# Check if there is an rule with reject"
|
||||
local rule_exists=$(jq -r '.route.rules[] | select(.inbound == ["tproxy-in"] and .action == "reject")' "$SING_BOX_CONFIG")
|
||||
|
||||
if [[ -n "$rule_exists" ]]; then
|
||||
# If a rule for rejectexists, add a new rule_set to the existing rule
|
||||
jq \
|
||||
--arg rule_set "$rule_set" \
|
||||
'(.route.rules[] | select(.inbound == ["tproxy-in"] and .action == "reject") .rule_set) += [$rule_set]' \
|
||||
"$SING_BOX_CONFIG" > /tmp/sing-box-config-tmp.json && mv /tmp/sing-box-config-tmp.json "$SING_BOX_CONFIG"
|
||||
else
|
||||
# If there is no rule for reject, create a new one with rule_set
|
||||
jq \
|
||||
--arg rule_set "$rule_set" \
|
||||
'.route.rules += [{
|
||||
"inbound": ["tproxy-in"],
|
||||
"rule_set": [$rule_set],
|
||||
"action": "reject"
|
||||
}]' "$SING_BOX_CONFIG" > /tmp/sing-box-config-tmp.json && mv /tmp/sing-box-config-tmp.json "$SING_BOX_CONFIG"
|
||||
fi
|
||||
return
|
||||
else
|
||||
# Action route
|
||||
# Check if there is an outbound rule for "tproxy-in"
|
||||
local rule_exists=$(jq -r '.route.rules[] | select(.outbound == "'"$outbound"'" and .inbound == ["tproxy-in"])' "$SING_BOX_CONFIG")
|
||||
|
||||
@@ -1480,6 +1513,7 @@ sing_box_rules() {
|
||||
"action": "route"
|
||||
}]' "$SING_BOX_CONFIG" >/tmp/sing-box-config-tmp.json && mv /tmp/sing-box-config-tmp.json "$SING_BOX_CONFIG"
|
||||
fi
|
||||
fi
|
||||
}
|
||||
|
||||
sing_box_quic_reject() {
|
||||
|
||||
Reference in New Issue
Block a user