update 2024-02-04 23:34:26
This commit is contained in:
parent
eea5e9bf49
commit
d80262d823
|
@ -31,6 +31,7 @@ events {
|
|||
#dynamic_conf conf/nginx_dynamic.conf 10;
|
||||
#dynamic_log logs/dynamic.log info;
|
||||
|
||||
|
||||
rtmp {
|
||||
log_format log_bandwidth '{"app":"$app","name":"$name","bitrate":$bitrate,"args":"$args","timestamp":$ntp,"ts":"$time_local","type":"$command","remote_addr":"$remote_addr","domain":"$domain"}';
|
||||
access_log logs/bandwidth.log log_bandwidth trunc=60s;
|
||||
|
|
|
@ -39,6 +39,8 @@ Fork this repository and:
|
|||
## Changelog since 3.3.0
|
||||
|
||||
* 2024-01-19 chore: bump version
|
||||
* 2024-01-24 feat: add alias to LAN Hosts Access Control
|
||||
* 2024-02-04 fix: avoid firewall restart failure & some minor adjustments
|
||||
|
||||
## Changelog since 3.2.0
|
||||
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
include $(TOPDIR)/rules.mk
|
||||
|
||||
PKG_NAME:=luci-app-xray
|
||||
PKG_VERSION:=3.3.0
|
||||
PKG_VERSION:=3.3.1
|
||||
PKG_RELEASE:=1
|
||||
|
||||
PKG_LICENSE:=MPLv2
|
||||
|
|
|
@ -5,8 +5,6 @@ STOP=15
|
|||
USE_PROCD=1
|
||||
NAME=xray_core
|
||||
|
||||
FIREWALL_INCLUDE="/usr/share/xray/firewall_include.ut"
|
||||
|
||||
setup_firewall() {
|
||||
ip rule add fwmark 251 lookup 251
|
||||
ip route add local default dev lo table 251
|
||||
|
@ -14,7 +12,7 @@ setup_firewall() {
|
|||
ip -6 route add local default dev lo table 251
|
||||
|
||||
logger -st xray[$$] -p4 "Generating firewall4 rules..."
|
||||
/usr/bin/utpl ${FIREWALL_INCLUDE} > /var/etc/xray/firewall_include.nft
|
||||
/usr/bin/utpl /usr/share/xray/firewall_include.ut > /var/etc/xray/01_firewall_include.nft
|
||||
|
||||
logger -st xray[$$] -p4 "Triggering firewall4 restart..."
|
||||
/etc/init.d/firewall restart
|
||||
|
@ -27,7 +25,7 @@ flush_firewall() {
|
|||
ip -6 route del local default dev lo table 251
|
||||
|
||||
logger -st xray[$$] -p4 "Flushing firewall4 rules..."
|
||||
rm -f /var/etc/xray/firewall_include.nft
|
||||
rm -f /var/etc/xray/*.nft
|
||||
|
||||
logger -st xray[$$] -p4 "Triggering firewall4 restart..."
|
||||
/etc/init.d/firewall restart
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
#!/usr/bin/ucode
|
||||
"use strict";
|
||||
|
||||
import { popen, stat } from "fs";
|
||||
import { open, popen, stat } from "fs";
|
||||
import { connect } from "ubus";
|
||||
|
||||
function network_dump() {
|
||||
|
@ -48,24 +48,44 @@ function gen_tp_spec_dv4_dg(dg) {
|
|||
return "";
|
||||
}
|
||||
if (length(dg) > 0) {
|
||||
return `flush set inet fw4 tp_spec_dv4_dg\nadd element inet fw4 tp_spec_dv4_dg { ${join(", ", dg)} }\n`;
|
||||
return `set tp_spec_dv4_dg {
|
||||
type ipv4_addr
|
||||
size 16
|
||||
flags interval
|
||||
elements = { ${join(", ", dg)} }
|
||||
}\n`;
|
||||
}
|
||||
return "";
|
||||
}
|
||||
|
||||
function gen_tp_spec_dv6_dg(pd) {
|
||||
if (length(pd) > 0) {
|
||||
return `flush set inet fw4 tp_spec_dv6_dg\nadd element inet fw4 tp_spec_dv6_dg { ${join(", ", pd)} }\n`;
|
||||
return `set tp_spec_dv6_dg {
|
||||
type ipv6_addr
|
||||
size 16
|
||||
flags interval
|
||||
elements = { ${join(", ", pd)} }
|
||||
}\n`;
|
||||
}
|
||||
return "";
|
||||
}
|
||||
|
||||
function update_nft(dg, pd) {
|
||||
const process = popen("nft -f -", "w");
|
||||
process.write(gen_tp_spec_dv4_dg(dg));
|
||||
process.write(gen_tp_spec_dv6_dg(pd));
|
||||
process.flush();
|
||||
process.close();
|
||||
function generate_include(rule_dg, rule_pd, file_path) {
|
||||
const handle = open(file_path, "w");
|
||||
handle.write(rule_dg);
|
||||
handle.write(rule_pd);
|
||||
handle.flush();
|
||||
handle.close();
|
||||
}
|
||||
|
||||
function update_nft(rule_dg, rule_pd) {
|
||||
const handle = popen("nft -f -", "w");
|
||||
handle.write(`table inet fw4 {
|
||||
${rule_dg}
|
||||
${rule_pd}
|
||||
}`);
|
||||
handle.flush();
|
||||
handle.close();
|
||||
}
|
||||
|
||||
function restart_dnsmasq_if_necessary() {
|
||||
|
@ -82,6 +102,9 @@ if (log == "") {
|
|||
print("default gateway not available, please wait for interface ready");
|
||||
} else {
|
||||
print(`default gateway available at ${log}\n`);
|
||||
update_nft(dg, pd);
|
||||
const rule_dg = gen_tp_spec_dv4_dg(dg);
|
||||
const rule_pd = gen_tp_spec_dv6_dg(pd);
|
||||
update_nft(rule_dg, rule_pd);
|
||||
generate_include(rule_dg, rule_pd, "/var/etc/xray/02_default_gateway_include.nft");
|
||||
}
|
||||
restart_dnsmasq_if_necessary();
|
||||
|
|
|
@ -127,7 +127,8 @@
|
|||
|
||||
set tp_spec_dv4_sp {
|
||||
type ipv4_addr
|
||||
flags constant,interval
|
||||
size 32
|
||||
flags interval
|
||||
elements = { 0.0.0.0/8, 10.0.0.0/8,
|
||||
100.64.0.0/10, 127.0.0.0/8,
|
||||
169.254.0.0/16, 172.16.0.0/12,
|
||||
|
@ -137,7 +138,8 @@
|
|||
|
||||
set tp_spec_dv6_sp {
|
||||
type ipv6_addr
|
||||
flags constant,interval
|
||||
size 32
|
||||
flags interval
|
||||
elements = { ::,
|
||||
::1,
|
||||
::ffff:0.0.0.0/96,
|
||||
|
@ -156,7 +158,7 @@
|
|||
{% if (length(tp_spec_sm4_bp) > 0): %}
|
||||
set tp_spec_sm4_bp {
|
||||
type ether_addr
|
||||
flags constant
|
||||
size {{ length(tp_spec_sm4_bp) * 2 + 1 }}
|
||||
elements = { {{ join(", ", tp_spec_sm4_bp) }} }
|
||||
}
|
||||
{% endif %}
|
||||
|
@ -164,7 +166,7 @@
|
|||
{% if (length(tp_spec_sm6_bp) > 0): %}
|
||||
set tp_spec_sm6_bp {
|
||||
type ether_addr
|
||||
flags constant
|
||||
size {{ length(tp_spec_sm6_bp) * 2 + 1 }}
|
||||
elements = { {{ join(", ", tp_spec_sm6_bp) }} }
|
||||
}
|
||||
{% endif %}
|
||||
|
@ -172,7 +174,7 @@
|
|||
{% if (length(tp_spec_sm4_tp) > 0): %}
|
||||
set tp_spec_sm4_tp {
|
||||
type ether_addr
|
||||
flags constant
|
||||
size {{ length(tp_spec_sm4_tp) * 2 + 1 }}
|
||||
elements = { {{ join(", ", tp_spec_sm4_tp) }} }
|
||||
}
|
||||
{% endif %}
|
||||
|
@ -180,7 +182,7 @@
|
|||
{% if (length(tp_spec_sm6_tp) > 0): %}
|
||||
set tp_spec_sm6_tp {
|
||||
type ether_addr
|
||||
flags constant
|
||||
size {{ length(tp_spec_sm6_tp) * 2 + 1 }}
|
||||
elements = { {{ join(", ", tp_spec_sm6_tp) }} }
|
||||
}
|
||||
{% endif %}
|
||||
|
@ -188,7 +190,7 @@
|
|||
{% for (let i in extra_inbound_tcp_v4_map): %}
|
||||
set tp_spec_sm4_ft_{{ i }} {
|
||||
type ether_addr
|
||||
flags constant
|
||||
size {{ length(extra_inbound_tcp_v4_map) * 2 + 1 }}
|
||||
elements = { {{ join(", ", extra_inbound_tcp_v4_map[i]) }} }
|
||||
}
|
||||
{% endfor %}
|
||||
|
@ -196,7 +198,7 @@
|
|||
{% for (let i in extra_inbound_udp_v4_map): %}
|
||||
set tp_spec_sm4_fu_{{ i }} {
|
||||
type ether_addr
|
||||
flags constant
|
||||
size {{ length(extra_inbound_udp_v4_map) * 2 + 1 }}
|
||||
elements = { {{ join(", ", extra_inbound_udp_v4_map[i]) }} }
|
||||
}
|
||||
{% endfor %}
|
||||
|
@ -204,7 +206,7 @@
|
|||
{% for (let i in extra_inbound_tcp_v6_map): %}
|
||||
set tp_spec_sm6_ft_{{ i }} {
|
||||
type ether_addr
|
||||
flags constant
|
||||
size {{ length(extra_inbound_tcp_v6_map) * 2 + 1 }}
|
||||
elements = { {{ join(", ", extra_inbound_tcp_v6_map[i]) }} }
|
||||
}
|
||||
{% endfor %}
|
||||
|
@ -212,7 +214,7 @@
|
|||
{% for (let i in extra_inbound_udp_v6_map): %}
|
||||
set tp_spec_sm6_fu_{{ i }} {
|
||||
type ether_addr
|
||||
flags constant
|
||||
size {{ length(extra_inbound_udp_v6_map) * 2 + 1 }}
|
||||
elements = { {{ join(", ", extra_inbound_udp_v6_map[i]) }} }
|
||||
}
|
||||
{% endfor %}
|
||||
|
@ -220,7 +222,7 @@
|
|||
{% if (length(manual_tproxy_source_ips) > 0): %}
|
||||
set tp_spec_dv4_mt {
|
||||
type ipv4_addr
|
||||
flags constant, interval
|
||||
size {{ length(manual_tproxy_source_ips) * 2 + 1 }}
|
||||
elements = { {{ join(", ", manual_tproxy_source_ips) }} }
|
||||
}
|
||||
{% endif %}
|
||||
|
@ -228,8 +230,8 @@
|
|||
{% if (length(wan_bp_ips_v4) > 0): %}
|
||||
set tp_spec_dv4_bp {
|
||||
type ipv4_addr
|
||||
size {{ length(wan_bp_ips_v4) }}
|
||||
flags constant, interval
|
||||
size {{ length(wan_bp_ips_v4) * 2 + 1 }}
|
||||
flags interval
|
||||
elements = { {{ join(", ", wan_bp_ips_v4)}} }
|
||||
}
|
||||
{% endif %}
|
||||
|
@ -237,8 +239,8 @@
|
|||
{% if (length(wan_bp_ips_v6) > 0): %}
|
||||
set tp_spec_dv6_bp {
|
||||
type ipv6_addr
|
||||
size {{ length(wan_bp_ips_v6) }}
|
||||
flags constant, interval
|
||||
size {{ length(wan_bp_ips_v6) * 2 + 1 }}
|
||||
flags interval
|
||||
elements = { {{ join(", ", wan_bp_ips_v6)}} }
|
||||
}
|
||||
{% endif %}
|
||||
|
@ -246,8 +248,8 @@
|
|||
{% if (length(wan_fw_ips_v4) > 0): %}
|
||||
set tp_spec_dv4_fw {
|
||||
type ipv4_addr
|
||||
size {{ length(wan_fw_ips_v4) }}
|
||||
flags constant, interval
|
||||
size {{ length(wan_fw_ips_v4) * 2 + 1 }}
|
||||
flags interval
|
||||
elements = { {{ join(", ", wan_fw_ips_v4)}} }
|
||||
}
|
||||
{% endif %}
|
||||
|
@ -255,8 +257,8 @@
|
|||
{% if (length(wan_fw_ips_v6) > 0): %}
|
||||
set tp_spec_dv6_fw {
|
||||
type ipv6_addr
|
||||
size {{ length(wan_fw_ips_v6) }}
|
||||
flags constant, interval
|
||||
size {{ length(wan_fw_ips_v6) * 2 + 1 }}
|
||||
flags interval
|
||||
elements = { {{ join(", ", wan_fw_ips_v6)}} }
|
||||
}
|
||||
{% endif %}
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
include $(TOPDIR)/rules.mk
|
||||
|
||||
PKG_NAME:=luci-app-xray-status
|
||||
PKG_VERSION:=3.3.0
|
||||
PKG_VERSION:=3.3.1
|
||||
PKG_RELEASE:=1
|
||||
|
||||
PKG_LICENSE:=MPLv2
|
||||
|
|
Loading…
Reference in New Issue