#!/bin/sh /etc/rc.common # Copyright (c) 2019 vernesong START=99 STOP=15 LOGTIME=$(date "+%Y-%m-%d %H:%M:%S") CLASH="/etc/openclash/clash" CLASH_CONFIG="/etc/openclash" CRON_FILE="/etc/crontabs/root" CONFIG_FILE=$(uci get openclash.config.config_path 2>/dev/null) LOG_FILE="/tmp/openclash.log" START_LOG="/tmp/openclash_start.log" BACKUP_FILE="/etc/openclash/backup/$(uci get openclash.config.config_path 2>/dev/null |awk -F '/' '{print $5}' 2>/dev/null)" START_BACKUP="/tmp/config.sbak" CHANGE_FILE="/tmp/yaml_change.yaml" SCRIPT_FILE="/tmp/yaml_script.yaml" RULE_PROVIDER_FILE="/tmp/yaml_rule_provider.yaml" RULE_FILE="/tmp/yaml_rules.yaml" DNS_FILE="/tmp/yaml_dns.yaml" PROXY_FILE="/tmp/yaml_proxy.yaml" PROXY_PROVIDER_FILE="/tmp/yaml_proxy_provider.yaml" GROUP_FILE="/tmp/yaml_group.yaml" GAME_RULE_FILE="/tmp/yaml_game_rule_group.yaml" HOSTS_FILE="/etc/openclash/custom/openclash_custom_hosts.list" PROXY_FWMARK="0x162" PROXY_ROUTE_TABLE="0x162" add_cron() { [ -z "$(grep "openclash.sh" "$CRON_FILE" 2>/dev/null)" ] && { [ "$(uci get openclash.config.auto_update 2>/dev/null)" -eq 1 ] && [ "$(uci get openclash.config.config_auto_update_mode 2>/dev/null)" -ne 1 ] && echo "0 $(uci get openclash.config.auto_update_time 2>/dev/null) * * $(uci get openclash.config.config_update_week_time 2>/dev/null) /usr/share/openclash/openclash.sh" >> $CRON_FILE } [ -z "$(grep "openclash_rule.sh" "$CRON_FILE" 2>/dev/null)" ] && { [ "$(uci get openclash.config.other_rule_auto_update 2>/dev/null)" -eq 1 ] && echo "0 $(uci get openclash.config.other_rule_update_day_time 2>/dev/null) * * $(uci get openclash.config.other_rule_update_week_time 2>/dev/null) /usr/share/openclash/openclash_rule.sh" >> $CRON_FILE } [ -z "$(grep "openclash_ipdb.sh" "$CRON_FILE" 2>/dev/null)" ] && { [ "$(uci get openclash.config.geo_auto_update 2>/dev/null)" -eq 1 ] && echo "0 $(uci get openclash.config.geo_update_day_time 2>/dev/null) * * $(uci get openclash.config.geo_update_week_time 2>/dev/null) /usr/share/openclash/openclash_ipdb.sh" >> $CRON_FILE } crontab $CRON_FILE nohup /usr/share/openclash/openclash_watchdog.sh & } del_cron() { sed -i '/openclash.sh/d' $CRON_FILE 2>/dev/null sed -i '/openclash_rule.sh/d' $CRON_FILE 2>/dev/null sed -i '/openclash_ipdb.sh/d' $CRON_FILE 2>/dev/null /etc/init.d/cron restart } change_dns() { if [ "$1" -eq "1" ]; then uci del dhcp.@dnsmasq[-1].server >/dev/null 2>&1 uci add_list dhcp.@dnsmasq[0].server=127.0.0.1#"$dns_port" uci delete dhcp.@dnsmasq[0].resolvfile 2>/dev/null uci set dhcp.@dnsmasq[0].noresolv=1 2>/dev/null uci set openclash.config.redirect_dns=1 else uci delete openclash.config.redirect_dns 2>/dev/null fi if [ "$2" -eq "1" ]; then uci set dhcp.@dnsmasq[0].cachesize=0 2>/dev/null fi uci commit dhcp uci commit openclash } revert_dns() { [ "$1" -eq "0" ] && { if [ "$(uci get openclash.config.dns_revert 2>/dev/null)" != "1" ]; then uci del_list dhcp.@dnsmasq[0].server=127.0.0.1#"$3" >/dev/null 2>&1 uci set openclash.config.dns_revert=1 2>/dev/null fi } [ "$1" -eq "1" ] && { uci del_list dhcp.@dnsmasq[0].server=127.0.0.1#"$3" >/dev/null 2>&1 uci set openclash.config.dns_revert=0 2>/dev/null } [ "$(uci get dhcp.@dnsmasq[0].cachesize 2>/dev/null)" = "0" ] && { uci delete dhcp.@dnsmasq[0].cachesize >/dev/null 2>&1 } if [ -s "/tmp/resolv.conf.d/resolv.conf.auto" ]; then uci set dhcp.@dnsmasq[0].resolvfile=/tmp/resolv.conf.d/resolv.conf.auto >/dev/null 2>&1 elif [ -s "/tmp/resolv.conf.auto" ]; then uci set dhcp.@dnsmasq[0].resolvfile=/tmp/resolv.conf.auto >/dev/null 2>&1 fi uci set dhcp.@dnsmasq[0].noresolv=0 >/dev/null 2>&1 uci commit dhcp uci commit openclash rm -rf /tmp/dnsmasq.d/dnsmasq_openclash.conf >/dev/null 2>&1 } kill_clash() { clash_pids=$(pidof clash|sed 's/$//g') for clash_pid in $clash_pids; do kill -9 "$clash_pid" 2>/dev/null done sleep 1 } field_cut() { local i lines end_len proxy_len=$(sed -n '/^Proxy:/=' "$3" 2>/dev/null |sed -n 1p) provider_len=$(sed -n '/^proxy-providers:/=' "$3" 2>/dev/null) group_len=$(sed -n '/^proxy-groups:/=' "$3" 2>/dev/null) rule_len=$(sed -n '/^rules:/=' "$3" 2>/dev/null) rule_provider_len=$(sed -n '/^rule-providers:/=' "$3" 2>/dev/null) script_len=$(sed -n '/^script:/=' "$3" 2>/dev/null) lines="$proxy_len $provider_len $group_len $rule_len $rule_provider_len $script_len" for i in $lines; do if [ -z "$1" ]; then break fi if [ "$1" -ge "$i" ]; then continue fi if [ "$end_len" -gt "$i" ] || [ -z "$end_len" ]; then end_len="$i" fi done 2>/dev/null if [ -n "$1" ] && [ -z "$end_len" ]; then end_len=$(sed -n '$=' "$3") elif [ -n "$end_len" ]; then end_len=$(expr "$end_len" - 1) fi sed -n "${1},${end_len}p" "$3" > "$2" 2>/dev/null sed -i "${1},${end_len}d" "$3" 2>/dev/null } yml_check() { #格式替换 sed -i 's/\t/ /g' "$3" 2>/dev/null sed -i "s/- \{2,\}/- /g" "$3" 2>/dev/null #检查关键字避免后续操作出错 /usr/share/openclash/yml_field_name_ch.sh "$3" 2>/dev/null #dns [ -z "$(grep "^dns:" "$3")" ] && { sed -i "s/^ \{1,\}dns:/dns:/g" "$3" 2>/dev/null } #创建启动备份 cp "$3" "$5" #创建原始备份 if [ ! -f "$4" ]; then cp "$3" "$4" fi #位置检查 proxy_len=$(sed -n '/^Proxy:/=' "$3" 2>/dev/null |sed -n 1p) provider_len=$(sed -n '/^proxy-providers:/=' "$3" 2>/dev/null) group_len=$(sed -n '/^proxy-groups:/=' "$3" 2>/dev/null) dns_len=$(sed -n '/^dns:/=' "$3" 2>/dev/null) rule_len=$(sed -n '/^rules:/=' "$3" 2>/dev/null) if [ "$dns_len" -ge "$proxy_len" ] || [ "$dns_len" -ge "$rule_len" ] || [ "$dns_len" -ge "$group_len" ]; then kill_clash stop echo "错误: 不支持的配置文件, General 设置部分应位于开头,请根据模板修改后重试!" > $START_LOG echo "${LOGTIME} Unsupported Config, Please Check The General Setting's location And Try-again!" >> $LOG_FILE mv "$START_BACKUP" "$CONFIG_FILE" exit 0 fi 2>/dev/null if [ "$proxy_len" -ge "$rule_len" ]; then kill_clash stop echo "错误: 不支持的配置文件,服务器节点设置部分应位于规则之前,请根据模板修改后重试!" > $START_LOG echo "${LOGTIME} Unsupported Config, Please Check The Proxy Setting's location And Try-again!" >> $LOG_FILE mv "$START_BACKUP" "$CONFIG_FILE" exit 0 fi 2>/dev/null if [ "$group_len" -ge "$rule_len" ] || [ "$proxy_len" -ge "$group_len" ]; then kill_clash stop echo "错误: 不支持的配置文件,策略组设置部分应位于规则之前、节点之后,请根据模板修改后重试!" > $START_LOG echo "${LOGTIME} Unsupported Config, Please Check The Group Setting's location And Try-again!" >> $LOG_FILE mv "$START_BACKUP" "$CONFIG_FILE" exit 0 fi 2>/dev/null #处理proxy_provider位置 if [ "$provider_len" -ge "$proxy_len" ] || [ "$provider_len" -ge "$group_len" ]; then field_cut "$provider_len" "$PROXY_PROVIDER_FILE" "$3" if [ -n "$proxy_len" ]; then sed -i '/^Proxy:/i\proxy-provider-tag' "$3" 2>/dev/null sed -i '/proxy-provider-tag/r/tmp/yaml_proxy_provider.yaml' "$3" 2>/dev/null sed -i '/proxy-provider-tag/d' "$3" 2>/dev/null elif [ -n "$group_len" ]; then sed -i '/^proxy-groups:/i\proxy-provider-tag' "$3" 2>/dev/null sed -i '/proxy-provider-tag/r/tmp/yaml_proxy_provider.yaml' "$3" 2>/dev/null sed -i '/proxy-provider-tag/d' "$3" 2>/dev/null fi fi 2>/dev/null #处理rule_provider位置 rule_provider_len=$(sed -n '/^rule-providers:/=' "$3" 2>/dev/null) if [ -n "$rule_provider_len" ]; then field_cut "$rule_provider_len" "$RULE_PROVIDER_FILE" "$3" fi 2>/dev/null #处理script位置 script_len=$(sed -n '/^script:/=' "$3" 2>/dev/null) if [ -n "$script_len" ]; then field_cut "$script_len" "$SCRIPT_FILE" "$3" fi 2>/dev/null if [ -n "$provider_len" ]; then proxy_provider_mode=1 fi #自定义DNS还原 if [ "$(grep -c '##Custom DNS##' "$3")" -gt 0 ] && [ "$2" = 0 ] && [ -f "$4" ]; then if [ "$proxy_provider_mode" -eq 1 ]; then awk '/^ {0,}nameserver:/,/proxy-providers:/{print}' "$4" | sed '/^proxy-providers:/d' >/tmp/backdns.config 2>/dev/null else awk '/^ {0,}nameserver:/,/Proxy:/{print}' "$4" | sed '/^Proxy:/d' >/tmp/backdns.config 2>/dev/null fi sed -i '/OpenClash-General-Settings/i\Custom DNS End' "$3" 2>/dev/null sed -i '/^ \{0,\}nameserver:/,/^Custom DNS End$/d' "$3" 2>/dev/null sed -i '/##Custom DNS##/r/tmp/bakdns.config' "$3" 2>/dev/null rm -rf /tmp/backdns.config 2>/dev/null fi 2>/dev/null yml_dns_check if [ -n "$(grep "^ \{1,\}port:" "$3")" ] || [ -n "$(grep "^ \{1,\}mode:" "$3")" ] || [ -n "$(grep "^ \{1,\}log-level:" "$3")" ]; then cp "$3" /tmp/config.check 2>/dev/null sed -i '/^dns:/,$d' /tmp/config.check 2>/dev/null sed -i 's/^[ \t]*//' /tmp/config.check 2>/dev/null sed -n '/^dns:/,$p' "$3" >> /tmp/config.check 2>/dev/null mv /tmp/config.check "$3" 2>/dev/null fi #添加标识 sed -i '/OpenClash-General/d' "$3" 2>/dev/null if [ "$proxy_provider_mode" -eq 1 ]; then sed -i '/^proxy-providers:/i\#===================== OpenClash-General-Settings =====================#' "$3" 2>/dev/null else sed -i '/^Proxy:/i\#===================== OpenClash-General-Settings =====================#' "$3" 2>/dev/null fi 2>/dev/null } #检查DNS设置 yml_dns_check() { if [ -z "$(grep '^dns:' "$CONFIG_FILE")" ]; then if [ "$proxy_provider_mode" -eq 1 ]; then sed -i '/^proxy-providers:/i\dns:' "$CONFIG_FILE" 2>/dev/null else sed -i '/^Proxy:/i\dns:' "$CONFIG_FILE" 2>/dev/null fi 2>/dev/null fi if [ -z "$(grep '^ \{0,\}nameserver:' "$CONFIG_FILE")" ]; then if [ "$proxy_provider_mode" -eq 1 ]; then sed -i '/^proxy-providers:/i\ nameserver:' "$CONFIG_FILE" 2>/dev/null else sed -i '/^Proxy:/i\ nameserver:' "$CONFIG_FILE" 2>/dev/null fi 2>/dev/null sed -i "/^ \{0,\}nameserver:/a\ - tls://8.8.8.8:853" "$CONFIG_FILE" 2>/dev/null sed -i "/^ \{0,\}nameserver:/a\ fallback:" "$CONFIG_FILE" 2>/dev/null sed -i "/^ \{0,\}nameserver:/a\ - 114.114.114.114" "$CONFIG_FILE" 2>/dev/null fi dns_port=$(grep "^ \{0,\}listen:" "$CONFIG_FILE" |awk -F ':' '{print $3}' |awk -F '#' '{print $1}' |tr -cd "[0-9]" 2>/dev/null) if [ -z "$dns_port" ] || [ "$dns_port" -eq 53 ]; then dns_port=7874 fi if [ -n "$(grep "^ \{0,\}listen:" "$CONFIG_FILE")" ]; then if [ "$ipv6_enable" != "1" ]; then sed -i "/^ \{0,\}listen:/c\ listen: 127.0.0.1:${dns_port}" "$CONFIG_FILE" 2>/dev/null else sed -i "/^ \{0,\}listen:/c\ listen: 0.0.0.0:${dns_port}" "$CONFIG_FILE" 2>/dev/null fi else if [ "$ipv6_enable" != "1" ]; then sed -i "/^dns:/a\ listen: 127.0.0.1:${dns_port}" "$CONFIG_FILE" 2>/dev/null else sed -i "/^dns:/a\ listen: 0.0.0.0:${dns_port}" "$CONFIG_FILE" 2>/dev/null fi fi 2>/dev/null uci set openclash.config.dns_port="$dns_port" && uci commit openclash } #修改集路径 yml_provider_path() { provider_path_line=$(sed -n '/ \{0,\}path/=' "$1" 2>/dev/null) if [ -n "$provider_path_line" ]; then for n in $provider_path_line; do if [ -n "$(sed -n "${n}p" "$1" |grep "^ \{0,\}#")" ]; then continue fi provider_path=$(sed -n "${n}p" "$1" |sed "s/\'//g" |sed 's/\"//g' |awk -F 'path:' '{print $2}' 2>/dev/null |sed 's/,.*//' 2>/dev/null |sed 's/^ \{0,\}//g' 2>/dev/null |sed 's/ \{0,\}$//g' 2>/dev/null |sed 's/ \{0,\}\}\{0,\}$//g' 2>/dev/null) if [ -z "$(echo "$provider_path" |grep "$2")" ]; then provider_name=$(echo "$provider_path" |awk -F '/' '{print $NF}') sed -i "s#path: ${provider_path}#path: ./${2}/${provider_name}#" "$1" 2>/dev/null sed -i "s#\"${provider_path}#\"./${2}/${provider_name}#" "$1" 2>/dev/null sed -i "s#\'${provider_path}#\'./${2}/${provider_name}#" "$1" 2>/dev/null sed -i "s#\:${provider_path}#\:./${2}/${provider_name}#" "$1" 2>/dev/null uci set openclash.config.config_reload=0 2>/dev/null uci commit openclash fi done fi 2>/dev/null } #检查集文件防止启动失败 yml_provider_check() { provider_path_line=$(sed -n '/ \{0,\}path/=' "$1" 2>/dev/null) local provider_path_exist if [ -n "$provider_path_line" ]; then while ( [ -n "$(pidof clash)" ] && [ "$provider_path_exist" != 1 ] ) do provider_path_exist=1 for n in $provider_path_line; do if [ -n "$(sed -n "${n}p" "$1" |grep "^ \{0,\}#")" ]; then continue fi provider_path=$(sed -n "${n}p" "$1" |sed "s/\'//g" |sed 's/\"//g' |awk -F 'path:' '{print $2}' 2>/dev/null |sed 's/,.*//' 2>/dev/null |sed 's/^ \{0,\}//g' 2>/dev/null |sed 's/ \{0,\}$//g' 2>/dev/null |sed 's/ \{0,\}\}\{0,\}$//g' 2>/dev/null) if [ "$(echo "${provider_path:0:1}")" = "." ]; then provider_path_check="/etc/openclash/$(echo ${provider_path:2})" if [ -f "$provider_path_check" ] && [ "$2" = "proxy_provider" ]; then if [ -z "$(grep "'proxies':" "$provider_path_check")" ] && [ -z "$(grep '"proxies":' "$provider_path_check")" ] && [ -z "$(grep 'proxies:' "$provider_path_check")" ]; then provider_path_exist=0 fi elif [ "$2" = "proxy_provider" ]; then provider_path_exist=0 fi if [ -f "$provider_path_check" ] && [ "$2" = "rule_provider" ]; then if [ -z "$(grep "'payload':" "$provider_path_check")" ] && [ -z "$(grep '"payload":' "$provider_path_check")" ] && [ -z "$(grep 'payload:' "$provider_path_check")" ]; then provider_path_exist=0 fi elif [ "$2" = "rule_provider" ]; then provider_path_exist=0 fi elif [ "$(echo "${provider_path:0:1}")" = "/" ]; then provider_path_check="$provider_path" if [ -f "$provider_path_check" ] && [ "$2" = "proxy_provider" ]; then if [ -z "$(grep "'proxies':" "$provider_path_check")" ] && [ -z "$(grep '"proxies":' "$provider_path_check")" ] && [ -z "$(grep 'proxies:' "$provider_path_check")" ]; then provider_path_exist=0 fi elif [ "$2" = "proxy_provider" ]; then provider_path_exist=0 fi if [ -f "$provider_path_check" ] && [ "$2" = "rule_provider" ]; then if [ -z "$(grep "'payload':" "$provider_path_check")" ] && [ -z "$(grep '"payload":' "$provider_path_check")" ] && [ -z "$(grep 'payload:' "$provider_path_check")" ]; then provider_path_exist=0 fi elif [ "$2" = "rule_provider" ]; then provider_path_exist=0 fi fi done done fi if [ -z "$(pidof clash)" ] && [ "$provider_path_exist" = 0 ]; then kill_clash stop if [ "$2" = "proxy_provider" ]; then echo "错误: 代理集文件下载失败,请到日志页面查看详细错误信息!" >$START_LOG echo "${LOGTIME} Faild to Download Proxy-Provider File, Please Check The Error Info And Try Again" >> $LOG_FILE else echo "错误: 规则集文件下载失败,请到日志页面查看详细错误信息!" >$START_LOG echo "${LOGTIME} Faild to Download Rule-Provider File, Please Check The Error Info And Try Again" >> $LOG_FILE fi sleep 10 echo "" >$START_LOG exit 0 fi } #切割配置文件以分开处理 yml_cut() { cp "$4" "$1" sed -i '/^rules:/,$d' "$1" 2>/dev/null sed -n '/^ \{0,\}nameserver:/,$p' "$1" >"$3" 2>/dev/null if [ "$proxy_provider_mode" -eq 1 ]; then sed -n '/^ \{0,\}proxy-groups:/,$p' "$3" >"$7" 2>/dev/null sed -n '/^ \{0,\}Proxy:/,$p' "$3" >"$5" 2>/dev/null sed -n '/^ \{0,\}proxy-providers:/,$p' "$3" >"$6" 2>/dev/null sed -i '/^ \{0,\}proxy-groups:/,$d' "$5" 2>/dev/null sed -i '/^ \{0,\}Proxy:/,$d' "$6" 2>/dev/null sed -i '/^ \{0,\}proxy-groups:/,$d' "$6" 2>/dev/null else sed -n '/^ \{0,\}proxy-groups:/,$p' "$3" >"$7" 2>/dev/null sed -n '/^ \{0,\}Proxy:/,$p' "$3" >"$5" 2>/dev/null sed -i '/^ \{0,\}proxy-groups:/,$d' "$5" 2>/dev/null fi 2>/dev/null sed -i '/^ \{0,\}nameserver:/,$d' "$1" 2>/dev/null if [ "$proxy_provider_mode" -eq 1 ]; then sed -i '/^ \{0,\}proxy-providers:/,$d' "$3" 2>/dev/null else sed -i '/^ \{0,\}Proxy:/,$d' "$3" 2>/dev/null fi 2>/dev/null sed -n '/^rules:/,$p' "$4" >"$2" 2>/dev/null } #获取自定义DNS设置 yml_dns_get() { local section="$1" local enabled port type ip group dns_type dns_address config_get_bool "enabled" "$section" "enabled" "1" config_get "port" "$section" "port" "" config_get "type" "$section" "type" "" config_get "ip" "$section" "ip" "" config_get "group" "$section" "group" "" if [ "$enabled" = "0" ]; then return fi if [ -z "$ip" ]; then return fi if [ "$type" = "tcp" ]; then dns_type="- tcp://" elif [ "$type" = "tls" ]; then dns_type="- tls://" elif [ "$type" = "udp" ]; then dns_type="- " elif [ "$type" = "https" ]; then dns_type="- https://" fi if [ -n "$port" ] && [ -n "$ip" ]; then dns_address="$ip:$port" elif [ -z "$port" ] && [ -n "$ip" ]; then dns_address="$ip" else return fi if [ -n "$group" ]; then if [ "$group" = "nameserver" ]; then echo " $dns_type$dns_address" >>/etc/openclash/config.namedns else if [ -z "$(grep "fallback:$" /etc/openclash/config.falldns 2>/dev/null)" ]; then echo " fallback:" >/etc/openclash/config.falldns fi echo " $dns_type$dns_address" >>/etc/openclash/config.falldns fi else return fi } #添加自定义DNS设置 yml_dns_custom() { if [ "$1" = 1 ]; then echo " nameserver:" >/etc/openclash/config.namedns config_load "openclash" config_foreach yml_dns_get "dns_servers" sed -i '/^ \{0,\}nameserver:/i\##Custom DNS##' "$2" 2>/dev/null sed -i '/OpenClash-General-Settings/i\Custom DNS End' "$2" 2>/dev/null sed -i '/^ \{0,\}nameserver:/,/^Custom DNS End$/d' "$2" 2>/dev/null sed -i '/##Custom DNS##/r/etc/openclash/config.falldns' "$2" 2>/dev/null sed -i '/##Custom DNS##/r/etc/openclash/config.namedns' "$2" 2>/dev/null rm -rf /etc/openclash/config.namedns 2>/dev/null rm -rf /etc/openclash/config.falldns 2>/dev/null else sed -i "/^ \{0,\}nameserver:/c\ nameserver:" "$2" 2>/dev/null sed -i "/^ \{0,\}fallback:/c\ fallback:" "$2" 2>/dev/null fi #fallback-filter if [ -n "$(grep "^ \{0,\}fallback:" "$2")" ]; then if [ -z "$(grep "^ \{0,\}fallback-filter:" "$2")" ]; then awk '/^ {0,}fallback:/,/OpenClash-General-Settings/{print}' "$2" |sed '1d' |sed '$d' >/tmp/fallback.cache 2>/dev/null sed -i '/cfw-bypass:/,$d' /tmp/fallback.cache 2>/dev/null sed -i '/cfw-latency-timeout:/,$d' /tmp/fallback.cache 2>/dev/null sed -i '/fallback:/,$d' "$2" 2>/dev/null echo " fallback:" >>"$2" sed -i '/ fallback:/a\ - 240.0.0.0/4' "$2" 2>/dev/null sed -i '/ fallback:/a\ ipcidr:' "$2" 2>/dev/null sed -i '/ fallback:/a\ geoip: true' "$2" 2>/dev/null sed -i '/ fallback:/a\ fallback-filter:' "$2" 2>/dev/null sed -i '/ fallback:/r/tmp/fallback.cache' "$2" 2>/dev/null rm -rf /tmp/fallback.cache 2>/dev/null echo "#===================== OpenClash-General-Settings =====================#" >>"$2" else if [ -z "$(grep "^ fallback-filter:" "$2")" ]; then sed -i "/fallback-filter:/c\ fallback-filter:" "$2" 2>/dev/null fi if [ -z "$(grep "^ geoip: true" "$2")" ]; then sed -i "/geoip: true/c\ geoip: true" "$2" 2>/dev/null fi if [ -z "$(grep "^ ipcidr:" "$2")" ]; then sed -i "/ipcidr:/c\ ipcidr:" "$2" 2>/dev/null fi fi if [ -z "$(grep "^ - " "$2")" ]; then sed -i '/^ \{0,\}nameserver:/,/^ \{0,\}fallback-filter:/ {s/^ \{0,\}- / - /}' "$2" 2>/dev/null #修改参数空格 fi if [ -z "$(grep "^ - " "$2")" ]; then sed -i '/^ \{0,\}ipcidr:/,/OpenClash-General-Settings/ {s/^ \{0,\}- / - /}' "$2" 2>/dev/null #修改参数空格 fi #删除fallback-filter else if [ -n "$(grep "^ \{0,\}fallback-filter:" "$2")" ]; then sed -i '/fallback-filter:/,$d' "$2" 2>/dev/null echo "#===================== OpenClash-General-Settings =====================#" >>"$2" fi if [ -n "$(grep "^ \{0,1\}- " "$2")" ]; then #添加参数空格 sed -i "s/^ \{0,\}- / - /" "$2" 2>/dev/null fi fi } #获取认证信息 yml_auth_get() { local section="$1" local enabled username password config_get_bool "enabled" "$section" "enabled" "1" config_get "username" "$section" "username" "" config_get "password" "$section" "password" "" if [ "$enabled" = "0" ]; then return fi if [ -z "$username" ] || [ -z "$password" ]; then return else echo " - $username:$password" >>/etc/openclash/config.auth fi } #添加认证信息 yml_auth_custom() { if [ -n "$(grep "^authentication:" "$1")" ]; then sed -i '/^dns:/i\#authentication' "$1" 2>/dev/null sed -i '/^authentication:/,/^#authentication/d' "$1" 2>/dev/null fi if [ -f /etc/openclash/config.auth ]; then sed -i '/^dns:/i\authentication:' "$1" 2>/dev/null sed -i '/^authentication:/r/etc/openclash/config.auth' "$1" 2>/dev/null mv /etc/openclash/config.auth /tmp/openclash.auth 2>/dev/null else rm -rf /tmp/openclash.auth 2>/dev/null fi } get_rule_file() { if [ -z "$1" ]; then return fi GAME_RULE_FILE_NAME=$(grep "^$1," /etc/openclash/game_rules.list |awk -F ',' '{print $3}' 2>/dev/null) if [ -z "$GAME_RULE_FILE_NAME" ]; then GAME_RULE_FILE_NAME=$(grep "^$1," /etc/openclash/game_rules.list |awk -F ',' '{print $2}' 2>/dev/null) fi GAME_RULE_PATH="/etc/openclash/game_rules/$GAME_RULE_FILE_NAME" sed '/^#/d' "$GAME_RULE_PATH" 2>/dev/null |sed '/^ *$/d' |awk '{print "- IP-CIDR,"$0}' |awk -v tag="$2" '{print $0","'tag'""}' >> $GAME_RULE_FILE 2>/dev/null set_rule_file=1 } yml_game_rule_get() { local section="$1" local enabled group config config_get_bool "enabled" "$section" "enabled" "1" config_get "group" "$section" "group" "" config_get "config" "$section" "config" "" if [ "$enabled" = "0" ]; then return fi if [ -n "$config" ] && [ "$config" != "$CONFIG_NAME" ] && [ "$config" != "all" ]; then return fi if [ -z "$group" ]; then return fi config_list_foreach "$section" "rule_name" get_rule_file "$group" } yml_rule_group_get() { local section="$1" local enabled group config config_get_bool "enabled" "$section" "enabled" "1" config_get "group" "$section" "group" "" config_get "config" "$section" "config" "" if [ "$enabled" = "0" ]; then return fi if [ -n "$config" ] && [ "$config" != "$CONFIG_NAME" ] && [ "$config" != "all" ]; then return fi if [ -z "$group" ]; then return fi /usr/share/openclash/yml_groups_set.sh "$group" } yml_game_custom() { #处理游戏规则 rm -rf $GAME_RULE_FILE 2>/dev/null config_load "openclash" config_foreach yml_game_rule_get "game_config" if [ -n "$(grep "OpenClash-Game-Rules" "$RULE_FILE")" ]; then sed -i '/OpenClash-Game-Rules/,/OpenClash-Game-Rules-End/d' "$RULE_FILE" 2>/dev/null fi sed -i '/OpenClash-Game-Rules/d' "$RULE_FILE" 2>/dev/null sed -i '/OpenClash-Game-Rules-End/d' "$RULE_FILE" 2>/dev/null [ "$set_rule_file" = 1 ] && { if [ -n "$(grep "##Custom Rules 2##" "$RULE_FILE")" ]; then sed -i "/##Custom Rules 2##/i\#===================== OpenClash-Game-Rules =====================#" "$RULE_FILE" 2>/dev/null elif [ -n "$(grep "^ \{0,\}- GEOIP" "$RULE_FILE")" ]; then sed -i '1,/^ \{0,\}- GEOIP,/{/^ \{0,\}- GEOIP,/s/^ \{0,\}- GEOIP,/#===================== OpenClash-Game-Rules =====================#\n&/}' "$RULE_FILE" 2>/dev/null elif [ -n "$(grep "^ \{0,\}- MATCH," "$RULE_FILE")" ]; then sed -i '1,/^ \{0,\}- MATCH,/{/^ \{0,\}- MATCH,/s/^ \{0,\}- MATCH,/#===================== OpenClash-Game-Rules =====================#\n&/}' "$RULE_FILE" 2>/dev/null elif [ -n "$(grep "^ \{0,\}- FINAL," "$RULE_FILE")" ]; then sed -i '1,/^ \{0,\}- FINAL,/{/^ \{0,\}- FINAL,/s/^ \{0,\}- FINAL,/#===================== OpenClash-Game-Rules =====================#\n&/}' "$RULE_FILE" 2>/dev/null else echo "#===================== OpenClash-Game-Rules =====================#" >> "$RULE_FILE" 2>/dev/null fi echo "#===================== OpenClash-Game-Rules-End =====================#" >> $GAME_RULE_FILE sed -i '/OpenClash-Game-Rules/r/tmp/yaml_game_rule_group.yaml' "$RULE_FILE" 2>/dev/null } #合并文件 cat "$CHANGE_FILE" "$DNS_FILE" "$PROXY_PROVIDER_FILE" "$PROXY_FILE" "$GROUP_FILE" "$RULE_PROVIDER_FILE" "$SCRIPT_FILE" "$RULE_FILE" > "$CONFIG_FILE" 2>/dev/null #处理游戏节点与策略组 config_load "openclash" config_foreach yml_rule_group_get "rule_provider_config" config_foreach yml_rule_group_get "game_config" sed -i '/^ \{0,\}proxy-groups:/r/tmp/yaml_groups.yaml' "$CONFIG_FILE" 2>/dev/null sed -i '/^ \{0,\}Proxy:/d' /tmp/yaml_servers.yaml 2>/dev/null sed -i '/^ \{0,\}proxy-providers:/d' /tmp/yaml_provider.yaml 2>/dev/null if [ -z "$(grep "^ \{0,\}Proxy:" "$CONFIG_FILE" 2>/dev/null)" ] && [ -f "/tmp/yaml_servers.yaml" ]; then sed -i '/^ \{0,\}proxy-groups:/i\Proxy:' "$CONFIG_FILE" 2>/dev/null sed -i '/^ \{0,\}Proxy:/r/tmp/yaml_servers.yaml' "$CONFIG_FILE" 2>/dev/null elif [ -f "/tmp/yaml_servers.yaml" ]; then sed -i '/^ \{0,\}Proxy:/r/tmp/yaml_servers.yaml' "$CONFIG_FILE" 2>/dev/null fi if [ -z "$(grep "^ \{0,\}proxy-providers:" "$CONFIG_FILE" 2>/dev/null)" ] && [ -f "/tmp/yaml_provider.yaml" ]; then sed -i '/OpenClash-General-Settings/a\proxy-providers:' "$CONFIG_FILE" 2>/dev/null sed -i '/^ \{0,\}proxy-providers:/r/tmp/yaml_provider.yaml' "$CONFIG_FILE" 2>/dev/null elif [ -f "/tmp/yaml_servers.yaml" ]; then sed -i '/^ \{0,\}proxy-providers:r/tmp/yaml_provider.yaml' "$CONFIG_FILE" 2>/dev/null fi } yml_rule_set_add() { if [ -z "$(grep "rules:" "$RULE_FILE" 2>/dev/null)" ]; then echo "rules:" > "$RULE_FILE" fi if [ "$3" -eq 1 ]; then if [ -z "$(grep "OpenClash-Rule-Set-Extended-End" "$RULE_FILE" 2>/dev/null)" ]; then if [ -n "$(grep "##Custom Rules 2##" "$RULE_FILE")" ]; then sed -i "/##Custom Rules 2##/i\#===================== OpenClash-Rule-Set-Extended-End =====================#" "$RULE_FILE" 2>/dev/null sed -i "/OpenClash-Rule-Set-Extended-End/i\#===================== OpenClash-Rule-Set-Extended =====================#" "$RULE_FILE" 2>/dev/null elif [ -n "$(grep "^ \{0,\}- GEOIP" "$RULE_FILE")" ]; then sed -i '1,/^ \{0,\}- GEOIP,/{/^ \{0,\}- GEOIP,/s/^ \{0,\}- GEOIP,/#===================== OpenClash-Rule-Set-Extended-End =====================#\n&/}' "$RULE_FILE" 2>/dev/null sed -i "/OpenClash-Rule-Set-Extended-End/i\#===================== OpenClash-Rule-Set-Extended =====================#" "$RULE_FILE" 2>/dev/null elif [ -n "$(grep "^ \{0,\}- MATCH," "$RULE_FILE")" ]; then sed -i '1,/^ \{0,\}- MATCH,/{/^ \{0,\}- MATCH,/s/^ \{0,\}- MATCH,/#===================== OpenClash-Rule-Set-Extended-End =====================#\n&/}' "$RULE_FILE" 2>/dev/null sed -i "/OpenClash-Rule-Set-Extended-End/i\#===================== OpenClash-Rule-Set-Extended =====================#" "$RULE_FILE" 2>/dev/null elif [ -n "$(grep "^ \{0,\}- FINAL," "$RULE_FILE")" ]; then sed -i '1,/^ \{0,\}- FINAL,/{/^ \{0,\}- FINAL,/s/^ \{0,\}- FINAL,/#===================== OpenClash-Rule-Set-Extended-End =====================#\n&/}' "$RULE_FILE" 2>/dev/null sed -i "/OpenClash-Rule-Set-Extended-End/i\#===================== OpenClash-Rule-Set-Extended =====================#" "$RULE_FILE" 2>/dev/null else echo "#===================== OpenClash-Rule-Set-Extended =====================#" >> "$RULE_FILE" 2>/dev/null echo "#===================== OpenClash-Rule-Set-Extended-End =====================#" >> "$RULE_FILE" 2>/dev/null fi fi sed -i "/OpenClash-Rule-Set-Extended-End/i\- RULE-SET,${1},${2}" "$RULE_FILE" 2>/dev/null elif [ "$3" -eq 0 ]; then if [ -z "$(grep "OpenClash-Rule-Set-Priority-End" "$RULE_FILE" 2>/dev/null)" ]; then if [ -n "$(grep "##Custom Rules##" "$RULE_FILE" 2>/dev/null)" ]; then sed -i "/##Custom Rules End##/a\#===================== OpenClash-Rule-Set-Priority-End =====================#" "$RULE_FILE" 2>/dev/null sed -i "/##Custom Rules End##/a\#===================== OpenClash-Rule-Set-Priority =====================#" "$RULE_FILE" 2>/dev/null else sed -i "/^rules:/a\#===================== OpenClash-Rule-Set-Priority-End =====================#" "$RULE_FILE" 2>/dev/null sed -i "/^rules:/a\#===================== OpenClash-Rule-Set-Priority =====================#" "$RULE_FILE" 2>/dev/null fi fi sed -i "/OpenClash-Rule-Set-Priority-End/i\- RULE-SET,${1},${2}" "$RULE_FILE" 2>/dev/null fi } yml_gen_rule_provider_file() { if [ -z "$1" ]; then return fi RULE_PROVIDER_FILE_NAME=$(grep "^$1," /etc/openclash/rule_providers.list |awk -F ',' '{print $6}' 2>/dev/null) if [ -z "$RULE_PROVIDER_FILE_NAME" ]; then RULE_PROVIDER_FILE_NAME=$(grep "^$1," /etc/openclash/rule_providers.list |awk -F ',' '{print $5}' 2>/dev/null) fi RULE_PROVIDER_FILE_BEHAVIOR=$(grep -F "$RULE_PROVIDER_FILE_NAME" /etc/openclash/rule_providers.list |awk -F ',' '{print $3}' 2>/dev/null) RULE_PROVIDER_FILE_PATH="/etc/openclash/rule_provider/$RULE_PROVIDER_FILE_NAME" RULE_PROVIDER_FILE_URL="https://raw.githubusercontent.com/$(grep -F "$RULE_PROVIDER_FILE_NAME" /etc/openclash/rule_providers.list |awk -F ',' '{print $4$5}' 2>/dev/null)" if [ -n "$(grep "$RULE_PROVIDER_FILE_URL" $RULE_PROVIDER_FILE)" ]; then return fi if [ -z "$(grep "rule-providers:" $RULE_PROVIDER_FILE 2>/dev/null)" ]; then echo "rule-providers:" > "$RULE_PROVIDER_FILE" fi if [ -z "$(grep "OpenClash-Rule-Providers-Set" $RULE_PROVIDER_FILE 2>/dev/null)" ]; then echo "#===================== OpenClash-Rule-Providers-Set =====================#" >> "$RULE_PROVIDER_FILE" fi cat >> "$RULE_PROVIDER_FILE" <<-EOF $1: type: http behavior: $RULE_PROVIDER_FILE_BEHAVIOR path: $RULE_PROVIDER_FILE_PATH url: $RULE_PROVIDER_FILE_URL EOF if [ -z "$3" ]; then cat >> "$RULE_PROVIDER_FILE" <<-EOF interval=86400 EOF else cat >> "$RULE_PROVIDER_FILE" <<-EOF interval: $3 EOF fi yml_rule_set_add "$1" "$2" "$4" } yml_get_rule_provider() { local section="$1" local enabled group config interval position config_get_bool "enabled" "$section" "enabled" "1" config_get "group" "$section" "group" "" config_get "config" "$section" "config" "" config_get "interval" "$section" "interval" "" config_get "position" "$section" "position" "" if [ "$enabled" = "0" ]; then return fi if [ -n "$config" ] && [ "$config" != "$CONFIG_NAME" ] && [ "$config" != "all" ]; then return fi if [ -z "$group" ]; then return fi config_list_foreach "$section" "rule_name" yml_gen_rule_provider_file "$group" "$interval" "$position" } #处理自定义规则集 yml_set_custom_rule_provider() { local section="$1" local enabled name config type behavior path url interval group position config_get_bool "enabled" "$section" "enabled" "1" config_get "name" "$section" "name" "" config_get "config" "$section" "config" "" config_get "type" "$section" "type" "" config_get "behavior" "$section" "behavior" "" config_get "path" "$section" "path" "" config_get "url" "$section" "url" "" config_get "interval" "$section" "interval" "" config_get "group" "$section" "group" "" config_get "position" "$section" "position" "" if [ "$enabled" = "0" ]; then return fi if [ -n "$(grep "$url" "$RULE_PROVIDER_FILE")" ] && [ -n "$url" ]; then return fi if [ -n "$config" ] && [ "$config" != "$CONFIG_NAME" ] && [ "$config" != "all" ]; then return fi if [ -z "$name" ] || [ -z "$type" ] || [ -z "$behavior" ]; then return fi if [ "$type" = "http" ] && [ -z "$url" ]; then return fi if [ "$path" != "./rule_provider/$name.yaml" ] && [ "$type" = "http" ]; then path="./rule_provider/$name.yaml" elif [ -z "$path" ]; then return fi if [ -n "$(grep "$path" "$RULE_PROVIDER_FILE")" ]; then return fi if [ -z "$interval" ] && [ "$type" = "http" ]; then interval=86400 fi if [ -z "$(grep "rule-providers:" "$RULE_PROVIDER_FILE" 2>/dev/null)" ]; then echo "rule-providers:" > "$RULE_PROVIDER_FILE" fi if [ -z "$(grep "OpenClash-Rule-Providers-Set" "$RULE_PROVIDER_FILE" 2>/dev/null)" ]; then echo "#===================== OpenClash-Rule-Providers-Set =====================#" >> "$RULE_PROVIDER_FILE" fi cat >> "$RULE_PROVIDER_FILE" <<-EOF $name: type: $type behavior: $behavior path: $path EOF if [ "$type" = "http" ]; then cat >> "$RULE_PROVIDER_FILE" <<-EOF url: $url interval: $interval EOF fi yml_rule_set_add "$name" "$group" "$position" } #处理规则集 yml_custom_rule_provider() { if [ -n "$(grep "OpenClash-Rule-Set-Extended-End" "$RULE_FILE")" ]; then sed -i '/OpenClash-Rule-Set-Extended/,/OpenClash-Rule-Set-Extended-End/d' "$RULE_FILE" 2>/dev/null fi if [ -n "$(grep "OpenClash-Rule-Set-Priority-End" "$RULE_FILE")" ]; then sed -i '/OpenClash-Rule-Set-Priority/,/OpenClash-Rule-Set-Priority-End/d' "$RULE_FILE" 2>/dev/null fi if [ -n "$(grep "OpenClash-Rule-Providers-Set" "$RULE_PROVIDER_FILE")" ]; then sed -i '/OpenClash-Rule-Providers-Set/,/OpenClash-Rule-Providers-Set-End/d' "$RULE_PROVIDER_FILE" 2>/dev/null fi sed -i '/OpenClash-Rule-Set/d' "$RULE_FILE" 2>/dev/null sed -i '/OpenClash-Rule-Providers/d' "$RULE_PROVIDER_FILE" 2>/dev/null if [ -z "$(grep "^ type:" $RULE_PROVIDER_FILE 2>/dev/null)" ]; then #处理缩进 sed -i '/^ *$/d' "$RULE_PROVIDER_FILE" 2>/dev/null sed -i 's/\t/ /g' "$RULE_PROVIDER_FILE" 2>/dev/null sed -i 's/^ \{1,\}/ /g' "$RULE_PROVIDER_FILE" 2>/dev/null sed -i 's/^ \{1,\}type:/ type:/g' "$RULE_PROVIDER_FILE" 2>/dev/null sed -i 's/^ \{1,\}behavior:/ behavior:/g' "$RULE_PROVIDER_FILE" 2>/dev/null sed -i 's/^ \{1,\}path:/ path:/g' "$RULE_PROVIDER_FILE" 2>/dev/null sed -i 's/^ \{1,\}url:/ url:/g' "$RULE_PROVIDER_FILE" 2>/dev/null sed -i 's/^ \{1,\}interval:/ interval:/g' "$RULE_PROVIDER_FILE" 2>/dev/null sed -i 's/^ \{1,\}rule-providers:/rule-providers:/g' "$RULE_PROVIDER_FILE" 2>/dev/null fi config_load "openclash" config_foreach yml_get_rule_provider "rule_provider_config" config_foreach yml_set_custom_rule_provider "rule_providers" if [ -n "$(grep "OpenClash-Rule-Providers-Set" $RULE_PROVIDER_FILE 2>/dev/null)" ]; then echo "#===================== OpenClash-Rule-Providers-Set-End =====================#" >> "$RULE_PROVIDER_FILE" fi } lan_ac() { if [ -z "$1" ]; then return fi ipset add "$2" "$1" 2>/dev/null } firewall_redirect_exclude() { local section="$1" local src_dport config_get "src_dport" "$section" "src_dport" "" if [ -z "$src_dport" ]; then return fi if [ -z "$en_mode_tun" ]; then iptables -t mangle -A openclash -p udp --dport "$src_dport" -j RETURN >/dev/null 2>&1 else iptables -t mangle -A openclash -p tcp --dport "$src_dport" -j RETURN >/dev/null 2>&1 iptables -t mangle -A openclash -p udp --dport "$src_dport" -j RETURN >/dev/null 2>&1 fi } #配置文件选择 config_choose() { if [ -z "$CONFIG_FILE" ] || [ ! -f "$CONFIG_FILE" ]; then CONFIG_NAME=$(ls -lt /etc/openclash/config/ | grep -E '.yaml|.yml' | head -n 1 |awk '{print $9}') if [ -n "$CONFIG_NAME" ]; then uci set openclash.config.config_path="/etc/openclash/config/$CONFIG_NAME" uci commit openclash CONFIG_FILE="/etc/openclash/config/$CONFIG_NAME" elif [ -f "/etc/openclash/config.yaml" ]; then mv "/etc/openclash/config.yaml" "/etc/openclash/config/config.yaml" uci set openclash.config.config_path="/etc/openclash/config/config.yaml" uci commit openclash CONFIG_FILE="/etc/openclash/config/config.yaml" elif [ -f "/etc/openclash/config.yml" ]; then mv "/etc/openclash/config.yml" "/etc/openclash/config/config.yaml" uci set openclash.config.config_path="/etc/openclash/config/config.yaml" uci commit openclash CONFIG_FILE="/etc/openclash/config/config.yaml" fi else if [ ! -f "$CONFIG_FILE" ] && [ -f "$BACKUP_FILE" ]; then cp "$BACKUP_FILE" "$CONFIG_FILE" fi fi 2>/dev/null CONFIG_NAME=$(echo "$CONFIG_FILE" |awk -F '/' '{print $5}' 2>/dev/null) } #运行模式处理 do_run_mode() { en_mode=$(uci get openclash.config.en_mode 2>/dev/null) if [ "$en_mode" = "fake-ip-tun" ]; then en_mode_tun="1" en_mode="fake-ip" fi if [ "$en_mode" = "redir-host-tun" ]; then en_mode_tun="1" en_mode="redir-host" fi if [ "$en_mode" = "redir-host-vpn" ]; then en_mode_tun="2" en_mode="redir-host" fi if [ "$en_mode" = "fake-ip-vpn" ]; then en_mode_tun="2" en_mode="fake-ip" fi } do_run_core() { if [ ! -h "/etc/openclash/clash" ] && [ -s "/etc/openclash/clash" ] && [ ! -s "/etc/openclash/core/clash" ]; then mv "/etc/openclash/clash" "/etc/openclash/core/clash" 2>/dev/null fi rm -rf "/etc/openclash/clash" 2>/dev/null if [ "$en_mode_tun" = "1" ]; then ln -s /etc/openclash/core/clash_tun /etc/openclash/clash 2>/dev/null core_type="Tun" fi if [ "$en_mode_tun" = "1" ]; then ln -s /etc/openclash/core/clash_tun /etc/openclash/clash 2>/dev/null core_type="Tun" fi if [ "$en_mode_tun" = "2" ]; then ln -s /etc/openclash/core/clash_game /etc/openclash/clash 2>/dev/null core_type="Game" fi if [ "$en_mode_tun" = "2" ]; then ln -s /etc/openclash/core/clash_game /etc/openclash/clash 2>/dev/null core_type="Game" fi if [ "$proxy_mode" = "Script" ] || [ "$rule_source" = "ConnersHua" ]; then ln -s /etc/openclash/core/clash_tun /etc/openclash/clash 2>/dev/null core_type="Tun" fi if [ -n "$(grep "^ \{0,\}rule-providers:" "$RULE_PROVIDER_FILE" 2>/dev/null)" ] && [ -n "$(grep "^ \{0,\}behavior" "$RULE_PROVIDER_FILE" 2>/dev/null |grep -v "^ \{0,\}#")" ]; then ln -s /etc/openclash/core/clash_tun /etc/openclash/clash 2>/dev/null core_type="Tun" fi if [ ! -f "/etc/openclash/clash" ] && [ -f "/etc/openclash/core/clash" ] && [ -z "$core_type" ]; then ln -s /etc/openclash/core/clash /etc/openclash/clash 2>/dev/null fi #权限检查 [ ! -x "/etc/openclash/core/clash_tun" ] && chmod 4755 /etc/openclash/core/clash_tun 2>/dev/null [ ! -x "/etc/openclash/core/clash_game" ] && chmod 4755 /etc/openclash/core/clash_game 2>/dev/null [ ! -x "/etc/openclash/core/clash" ] && chmod 4755 /etc/openclash/core/clash 2>/dev/null } set_firewall() { if [ "$(iptables -t nat -nL PREROUTING --line-number |grep "udp dpt:53" |grep "0.0.0.0/0 \{0,\}0.0.0.0/0" |wc -l)" -gt 1 ] && [ "$enable_redirect_dns" -eq "1" ]; then echo "发现53端口被劫持,清理防火墙规则..." >$START_LOG pre_lines=$(iptables -nvL PREROUTING -t nat |sed 1,2d |sed -n '/0.0.0.0\/0 \{0,\}0.0.0.0\/0 \{0,\}udp dpt:53/=' 2>/dev/null |sort -rn) for pre_line in $pre_lines; do iptables -t nat -D PREROUTING "$pre_line" >/dev/null 2>&1 done iptables -t nat -A PREROUTING -p udp --dport 53 -j REDIRECT --to-ports 53 >/dev/null 2>&1 sleep 2 fi if [ -z "$(uci get firewall.openclash 2>/dev/null)" ] || [ -z "$(uci get ucitrack.@openclash[-1].init 2>/dev/null)" ]; then uci delete ucitrack.@openclash[-1] >/dev/null 2>&1 uci add ucitrack openclash >/dev/null 2>&1 uci set ucitrack.@openclash[-1].init=openclash >/dev/null 2>&1 uci commit ucitrack >/dev/null 2>&1 uci delete firewall.openclash >/dev/null 2>&1 uci set firewall.openclash=include >/dev/null 2>&1 uci set firewall.openclash.type=script >/dev/null 2>&1 uci set firewall.openclash.path=/var/etc/openclash.include >/dev/null 2>&1 uci set firewall.openclash.reload=1 >/dev/null 2>&1 fi if [ "$(uci get firewall.@defaults[0].forward)" != "ACCEPT" ]; then uci set firewall.@defaults[0].forward=ACCEPT >/dev/null 2>&1 uci commit firewall >/dev/null 2>&1 /etc/init.d/firewall reload >/dev/null 2>&1 fi mkdir -p /var/etc cat > "/var/etc/openclash.include" <<-EOF /etc/init.d/openclash reload >/dev/null 2>&1 EOF #lan_ac if [ "$operation_mode" = "redir-host" ] && [ "$en_mode" = "redir-host" ]; then if [ "$lan_ac_mode" = "0" ] && [ -n "$(uci get openclash.config.lan_ac_black_ips 2>/dev/null)" ]; then ipset create lan_ac_black_ips hash:net config_load "openclash" config_list_foreach "config" "lan_ac_black_ips" lan_ac "lan_ac_black_ips" elif [ "$lan_ac_mode" = "1" ] && [ -n "$(uci get openclash.config.lan_ac_white_ips 2>/dev/null)" ]; then ipset create lan_ac_white_ips hash:net config_load "openclash" config_list_foreach "config" "lan_ac_white_ips" lan_ac "lan_ac_white_ips" fi fi #local ipset create localnetwork hash:net ipset add localnetwork 0.0.0.0/8 ipset add localnetwork 127.0.0.0/8 ipset add localnetwork 10.0.0.0/8 ipset add localnetwork 169.254.0.0/16 ipset add localnetwork 192.168.0.0/16 ipset add localnetwork 224.0.0.0/4 ipset add localnetwork 240.0.0.0/4 ipset add localnetwork 172.16.0.0/12 if [ -n "$wan_ip4" ]; then for wan_ip4s in $wan_ip4; do ipset add localnetwork "$wan_ip4s" 2>/dev/null done fi if [ -z "$en_mode_tun" ]; then #tcp iptables -t nat -N openclash iptables -t nat -F openclash iptables -t nat -A openclash -m set --match-set localnetwork dst -j RETURN iptables -t nat -A openclash -m set --match-set lan_ac_black_ips src -j RETURN >/dev/null 2>&1 iptables -t nat -A openclash -m set ! --match-set lan_ac_white_ips src -j RETURN >/dev/null 2>&1 iptables -t nat -A openclash -p tcp -j REDIRECT --to-ports "$proxy_port" iptables -t nat -I PREROUTING -p tcp -d 8.8.8.8 -j REDIRECT --to-ports "$proxy_port" iptables -t nat -I PREROUTING -p tcp -d 8.8.4.4 -j REDIRECT --to-ports "$proxy_port" iptables -t nat -A PREROUTING -p tcp -j openclash #udp if [ "$enable_udp_proxy" -eq 1 ]; then ip rule add fwmark "$PROXY_FWMARK" table "$PROXY_ROUTE_TABLE" ip route add local 0.0.0.0/0 dev lo table "$PROXY_ROUTE_TABLE" iptables -t mangle -N openclash iptables -t mangle -A openclash -m set --match-set localnetwork dst -j RETURN iptables -t mangle -A openclash -m set --match-set lan_ac_black_ips src -j RETURN >/dev/null 2>&1 iptables -t mangle -A openclash -m set ! --match-set lan_ac_white_ips src -j RETURN >/dev/null 2>&1 iptables -t mangle -A openclash -p udp --dport 53 -j RETURN >/dev/null 2>&1 #端口转发 config_load "firewall" config_foreach firewall_redirect_exclude "redirect" iptables -t mangle -A openclash -p udp -j TPROXY --on-port "$proxy_port" --on-ip 0.0.0.0 --tproxy-mark "$PROXY_FWMARK" iptables -t mangle -A PREROUTING -p udp -j openclash fi if [ "$en_mode" = "fake-ip" ]; then iptables -t nat -N openclash_output iptables -t nat -F openclash_output iptables -t nat -A openclash_output -m set --match-set localnetwork dst -j RETURN iptables -t nat -A openclash_output -p tcp -d 198.18.0.0/16 -j REDIRECT --to-ports "$proxy_port" iptables -t nat -A OUTPUT -p tcp -j openclash_output fi if [ "$ipv6_enable" -eq 1 ]; then #tcp ip6tables -t nat -N openclash if [ -n "$lan_ip6" ]; then for lan_ip6s in $lan_ip6; do ip6tables -t nat -A openclash -d "$lan_ip6s" -j RETURN 2>/dev/null done fi ip6tables -t nat -A openclash -p tcp -j REDIRECT --to-ports "$proxy_port" ip6tables -t nat -A PREROUTING -p tcp -j openclash #udp #if [ "$enable_udp_proxy" -eq 1 ]; then # ip6tables -t mangle -N openclash # if [ -n "$lan_ip6" ]; then # for lan_ip6s in $lan_ip6; do # if [ "$enable_udp_proxy" -eq 1 ]; then # ip6tables -t mangle -A openclash -d "$lan_ip6s" -j RETURN 2>/dev/null # fi # done # fi # ip6tables -t mangle -A openclash -p udp -j TPROXY --on-port "$proxy_port" --tproxy-mark "$PROXY_FWMARK" # ip6tables -t mangle -A PREROUTING -p udp -j openclash #fi fi 2>/dev/null else #TUN模式 #启动TUN if [ "$en_mode_tun" = "2" ]; then ip tuntap add user root mode tun clash0 ip link set clash0 up ip route replace default dev clash0 table "$PROXY_ROUTE_TABLE" elif [ "$en_mode_tun" = "1" ]; then TUN_WAIT=0 while ( [ -n "$(pidof clash)" ] && [ -z "$(ip route list |grep utun)" ] && [ "$TUN_WAIT" -le 3 ] ) do TUN_WAIT=$(expr "$TUN_WAIT" + 1) sleep 2 done ip route replace default dev utun table "$PROXY_ROUTE_TABLE" fi ip rule add fwmark "$PROXY_FWMARK" table "$PROXY_ROUTE_TABLE" #设置防火墙 iptables -t mangle -N openclash_output iptables -t mangle -F openclash_output iptables -t mangle -A openclash_output -m set --match-set localnetwork dst -j RETURN if [ "$en_mode" = "fake-ip" ]; then iptables -t mangle -A openclash_output -d 198.18.0.0/16 -j MARK --set-mark "$PROXY_FWMARK" fi iptables -t mangle -I OUTPUT -j openclash_output iptables -t mangle -N openclash iptables -t mangle -F openclash #端口转发 config_load "firewall" config_foreach firewall_redirect_exclude "redirect" #其他流量 iptables -t mangle -A openclash -m set --match-set lan_ac_black_ips src -j RETURN >/dev/null 2>&1 iptables -t mangle -A openclash -m set ! --match-set lan_ac_white_ips src -j RETURN >/dev/null 2>&1 iptables -t mangle -A openclash -m set ! --match-set localnetwork dst -j MARK --set-mark "$PROXY_FWMARK" iptables -t mangle -I PREROUTING -j openclash iptables -t nat -I PREROUTING -p tcp --dport 53 -j ACCEPT #ipv6 # if [ "$ipv6_enable" -eq 1 ]; then # ip6tables -t mangle -I PREROUTING -j MARK --set-mark "$PROXY_FWMARK" # fi fi } revert_firewall() { rm -rf /var/etc/openclash.include 2>/dev/null #ipv4 ip rule del fwmark "$PROXY_FWMARK" table "$PROXY_ROUTE_TABLE" >/dev/null 2>&1 ip route del local 0.0.0.0/0 dev lo table "$PROXY_ROUTE_TABLE" >/dev/null 2>&1 iptables -t nat -D PREROUTING -p tcp --dport 53 -j ACCEPT >/dev/null 2>&1 out_lines=$(iptables -nvL OUTPUT -t nat |sed 1,2d |sed -n '/openclash/=' 2>/dev/null |sort -rn) for out_line in $out_lines; do iptables -t nat -D OUTPUT "$out_line" >/dev/null 2>&1 done >/dev/null 2>&1 iptables -t nat -D OUTPUT -p tcp -j openclash_output >/dev/null 2>&1 pre_lines=$(iptables -nvL PREROUTING -t nat |sed 1,2d |sed -n '/8\.8\./=' 2>/dev/null |sort -rn) for pre_line in $pre_lines; do iptables -t nat -D PREROUTING "$pre_line" >/dev/null 2>&1 done >/dev/null 2>&1 pre_lines=$(iptables -nvL PREROUTING -t mangle |sed 1,2d |sed -n '/openclash/=' 2>/dev/null |sort -rn) for pre_line in $pre_lines; do iptables -t mangle -D PREROUTING "$pre_line" >/dev/null 2>&1 done >/dev/null 2>&1 iptables -t mangle -D PREROUTING -p udp -j openclash >/dev/null 2>&1 pre_lines=$(iptables -nvL PREROUTING -t nat |sed 1,2d |sed -n '/openclash/=' 2>/dev/null |sort -rn) for pre_line in $pre_lines; do iptables -t nat -D PREROUTING "$pre_line" >/dev/null 2>&1 done >/dev/null 2>&1 iptables -t nat -D PREROUTING -p tcp -j openclash >/dev/null 2>&1 #ipv6 #ip6tables -t mangle -F openclash >/dev/null 2>&1 #ip6tables -t mangle -D PREROUTING -p udp -j openclash >/dev/null 2>&1 #ip6tables -t mangle -X openclash >/dev/null 2>&1 iptables -t nat -F openclash >/dev/null 2>&1 iptables -t nat -X openclash >/dev/null 2>&1 iptables -t nat -F openclash_output >/dev/null 2>&1 iptables -t nat -X openclash_output >/dev/null 2>&1 ip6tables -t nat -F openclash >/dev/null 2>&1 ip6tables -t nat -D PREROUTING -p tcp -j openclash >/dev/null 2>&1 ip6tables -t nat -X openclash >/dev/null 2>&1 #TUN ip route del default dev clash0 table "$PROXY_ROUTE_TABLE" >/dev/null 2>&1 ip route del default dev utun table "$PROXY_ROUTE_TABLE" >/dev/null 2>&1 ip rule del fwmark "$PROXY_FWMARK" table "$PROXY_ROUTE_TABLE" >/dev/null 2>&1 ip link set dev clash0 down >/dev/null 2>&1 ip tuntap del clash0 mode tun >/dev/null 2>&1 iptables -t mangle -D OUTPUT -j openclash_output >/dev/null 2>&1 iptables -t mangle -D PREROUTING -j openclash >/dev/null 2>&1 iptables -t mangle -F openclash >/dev/null 2>&1 iptables -t mangle -X openclash >/dev/null 2>&1 iptables -t mangle -F openclash_output >/dev/null 2>&1 iptables -t mangle -X openclash_output >/dev/null 2>&1 #ip6tables -t mangle -D PREROUTING -j MARK --set-mark "$PROXY_FWMARK" >/dev/null 2>&1 ipset destroy localnetwork >/dev/null 2>&1 ipset destroy lan_ac_white_ips >/dev/null 2>&1 ipset destroy lan_ac_black_ips >/dev/null 2>&1 } get_config() { proxy_mode=$(uci get openclash.config.proxy_mode 2>/dev/null) rule_source=$(uci get openclash.config.rule_source 2>/dev/null) enable_custom_dns=$(uci get openclash.config.enable_custom_dns 2>/dev/null) enable_custom_clash_rules=$(uci get openclash.config.enable_custom_clash_rules 2>/dev/null) da_password=$(uci get openclash.config.dashboard_password 2>/dev/null) cn_port=$(uci get openclash.config.cn_port 2>/dev/null) proxy_port=$(uci get openclash.config.proxy_port 2>/dev/null) ipv6_enable=$(uci get openclash.config.ipv6_enable 2>/dev/null) http_port=$(uci get openclash.config.http_port 2>/dev/null) socks_port=$(uci get openclash.config.socks_port 2>/dev/null) enable_redirect_dns=$(uci get openclash.config.enable_redirect_dns 2>/dev/null) lan_ip=$(uci get network.lan.ipaddr 2>/dev/null |awk -F '/' '{print $1}' 2>/dev/null) wan_ip4=$(ifconfig | grep 'inet addr' | awk '{print $2}' | cut -d: -f2 2>/dev/null) lan_ip6=$(ifconfig | grep 'inet6 addr' | awk '{print $3}' 2>/dev/null) disable_masq_cache=$(uci get openclash.config.disable_masq_cache 2>/dev/null) log_level=$(uci get openclash.config.log_level 2>/dev/null) intranet_allowed=$(uci get openclash.config.intranet_allowed 2>/dev/null) enable_udp_proxy=$(uci get openclash.config.enable_udp_proxy 2>/dev/null) operation_mode=$(uci get openclash.config.operation_mode 2>/dev/null) lan_ac_mode=$(uci get openclash.config.lan_ac_mode 2>/dev/null) enable_rule_proxy=$(uci get openclash.config.enable_rule_proxy 2>/dev/null) stack_type=$(uci get openclash.config.stack_type 2>/dev/null) } start() { #禁止多个实例 status=$(ps|grep -c /etc/init.d/openclash) [ "$status" -gt "3" ] && exit 0 config_choose enable=$(uci get openclash.config.enable 2>/dev/null) if [ "$enable" -eq 1 ] && [ -f "$CONFIG_FILE" ]; then do_run_mode echo "OpenClash 开始启动..." >$START_LOG echo "第一步: 获取配置..." >$START_LOG get_config echo "第二步: 配置文件检查..." >$START_LOG yml_check "$en_mode" "$enable_custom_dns" "$CONFIG_FILE" "$BACKUP_FILE" "$START_BACKUP" if [ -n "$(grep "^ \{0,\}proxy-groups:" "$CONFIG_FILE")" ]; then if [ -z "$(grep "^ \{0,\}Proxy:" "$CONFIG_FILE" 2>/dev/null)" ] && [ -z "$(grep "^ \{0,\}proxy-providers:" "$CONFIG_FILE" 2>/dev/null)" ]; then kill_clash stop echo "错误: 配置文件完整性检查不通过,已自动还原配置文件,请对照模板格式检查修改配置文件!" >$START_LOG mv "$START_BACKUP" "$CONFIG_FILE" sleep 5 echo "" >$START_LOG elif [ -z "$(grep "^ \{0,\}rules:" "$CONFIG_FILE" 2>/dev/null)" ] && [ -z "$(grep "^ \{0,\}script:" "$CONFIG_FILE" 2>/dev/null)" ]; then kill_clash stop echo "错误: 配置文件完整性检查不通过,已自动还原配置文件,请对照模板格式检查修改配置文件!" >$START_LOG mv "$START_BACKUP" "$CONFIG_FILE" sleep 5 echo "" >$START_LOG else echo "第三步: 修改配置文件..." >$START_LOG config_load "openclash" config_foreach yml_auth_get "authentication" yml_auth_custom "$CONFIG_FILE" yml_cut "$CHANGE_FILE" "$RULE_FILE" "$DNS_FILE" "$CONFIG_FILE" "$PROXY_FILE" "$PROXY_PROVIDER_FILE" "$GROUP_FILE" yml_dns_custom "$enable_custom_dns" "$DNS_FILE" /usr/share/openclash/yml_change.sh >/dev/null 2>&1 "$LOGTIME" "$en_mode" "$enable_custom_dns" "$da_password" "$cn_port" "$proxy_port" "$CHANGE_FILE" "$ipv6_enable" "$http_port" "$socks_port" "$lan_ip" "$log_level" "$proxy_mode" "$intranet_allowed" "$en_mode_tun" "$stack_type" & /usr/share/openclash/yml_rules_change.sh >/dev/null 2>&1 "$LOGTIME" "$rule_source" "$enable_custom_clash_rules" "$RULE_FILE" "$set_rule_file" "$en_mode" "$enable_rule_proxy" "$BACKUP_FILE" "$RULE_PROVIDER_FILE" & wait yml_provider_path "$PROXY_PROVIDER_FILE" "proxy_provider" yml_provider_path "$RULE_PROVIDER_FILE" "rule_provider" yml_custom_rule_provider yml_game_custom echo "第四步: DNS设置检查..." >$START_LOG if [ -n "$(sed -n '/^ \{0,\}nameserver:/{n;p}' "$CONFIG_FILE" |grep '^ \{0,\}fallback:')" ] || [ -n "$(sed -n '/^ \{0,\}nameserver:/{n;p}' "$CONFIG_FILE" |grep 'OpenClash-General')" ]; then kill_clash stop echo "错误: 配置文件DNS选项下的Nameserver必须设置服务器,已自动还原配置文件,请重新设置!" >$START_LOG echo "${LOGTIME} Nameserver Must Be Set, Please Change Your Configrations In Config.yaml" >>$LOG_FILE mv "$START_BACKUP" "$CONFIG_FILE" sleep 10 echo "" >$START_LOG else echo "第五步: 启动主程序..." >$START_LOG #检查是否存在核心文件 do_run_core [ ! -f "$CLASH" ] && { kill_clash stop echo "内核文件不存在,开始下载..." >$START_LOG nohup /usr/share/openclash/openclash_core.sh "$core_type" & exit 0 } sed -i "s/^ \{0,\}Proxy:/proxies:/g" "$CONFIG_FILE" 2>/dev/null ulimit -SHn 65535 2>/dev/null config_reload=$(uci get openclash.config.config_reload 2>/dev/null) if [ -n "$(pidof clash)" ] && [ "$core_type" != "Tun" ] && [ "$config_reload" != "0" ]; then curl -s --connect-timeout 5 -m 5 -H 'Content-Type: application/json' -H "Authorization: Bearer ${da_password}" -XPUT http://"$lan_ip":"$cn_port"/configs -d "{\"path\": \"$CONFIG_FILE\"}" 2>/dev/null else kill_clash nohup "$CLASH" -d "$CLASH_CONFIG" -f "$CONFIG_FILE" >> $LOG_FILE 2>&1 & fi uci set openclash.config.config_reload=1 2>/dev/null uci commit openclash #检测proxy_provider配置文件状态 echo "第六步: 等待主程序下载外部文件..." >$START_LOG yml_provider_check "$PROXY_PROVIDER_FILE" "proxy_provider" yml_provider_check "$RULE_PROVIDER_FILE" "rule_provider" echo "第七步: 设置控制面板..." >$START_LOG ln -s /usr/share/openclash/yacd /www/luci-static/openclash 2>/dev/null echo "第八步: 设置防火墙规则..." >$START_LOG set_firewall echo "第九步: 重启 Dnsmasq 程序..." >$START_LOG change_dns "$enable_redirect_dns" "$disable_masq_cache" /etc/init.d/dnsmasq restart >/dev/null 2>&1 if pidof clash >/dev/null; then echo "第十步: 还原策略组节点状态..." >$START_LOG /usr/share/openclash/openclash_history_set.sh echo "第十一步: 添加计划任务,启动进程守护程序..." >$START_LOG add_cron if [ -z "$(uci get dhcp.lan.dhcpv6 2>/dev/null)" ]; then echo "OpenClash 启动成功,请等待服务器上线!" >$START_LOG echo "${LOGTIME} OpenClash Start Successful" >> $LOG_FILE sleep 5 else echo "OpenClash 启动成功,检测到您启用了IPV6的DHCP服务,可能会造成连接异常!" >$START_LOG echo "${LOGTIME} OpenClash Start Successful, Please Note That Network May Abnormal With IPV6's DHCP Server" >> $LOG_FILE sleep 10 fi echo "OpenClash Already Start" echo "" >$START_LOG else if [ "$rule_source" != 0 ] || [ "$enable_custom_clash_rules" != 0 ]; then echo "错误: OpenClash 启动失败,尝试还原第三方规则并重新启动 Clash 主程序..." >$START_LOG echo "${LOGTIME} OpenClash Can Not Start, Try Use Backup Rules Start Again" >> $LOG_FILE mv "$START_BACKUP" /tmp/configrules.bak sed -i -n '/^rules:/,$p' /tmp/configrules.bak sed -i '/^rules:/,$d' "$CONFIG_FILE" 2>/dev/null sed -i '/##Other-rule-providers##/,/##Other-rule-providers-end##/d' "$CONFIG_FILE" 2>/dev/null cat /tmp/configrules.bak >> "$CONFIG_FILE" rm -rf /tmp/configrules.bak nohup "$CLASH" -d "$CLASH_CONFIG" -f "$CONFIG_FILE" >> $LOG_FILE 2>&1 & sleep 3 if pidof clash >/dev/null; then /usr/share/openclash/openclash_history_set.sh add_cron if [ -z "$(uci get dhcp.lan.dhcpv6 2>/dev/null)" ]; then echo "OpenClash 使用备份规则启动成功,请更新、检查变动的规则后重试!" >$START_LOG echo "${LOGTIME} OpenClash Start Successful With Backup Rules Config, Please Check Or Update Other Rules And Retry" >> $LOG_FILE sleep 10 else echo "OpenClash 使用备份规则启动成功,请更新、检查变动的规则后重试!" >$START_LOG echo "${LOGTIME} OpenClash Start Successful With Backup Rules Config, Please Check Or Update Other Rules And Retry" >> $LOG_FILE sleep 5 echo "检测到您启用了IPV6的DHCP服务,可能会造成连接异常!" >$START_LOG echo "${LOGTIME} OpenClash Start Successful, Please Note That Network May Abnormal With IPV6's DHCP Server" >> $LOG_FILE sleep 10 fi echo "OpenClash Already Start" echo "" >$START_LOG else kill_clash stop echo "错误: OpenClash 启动失败,请到日志页面查看详细错误信息!" >$START_LOG echo "${LOGTIME} OpenClash Can Not Start, Please Check The Error Info And Try Again" >> $LOG_FILE sleep 10 echo "" >$START_LOG fi else kill_clash stop echo "错误: OpenClash 启动失败,请到日志页面查看详细错误信息!" >$START_LOG echo "${LOGTIME} OpenClash Can Not Start, Please Check The Error Info And Try Again" >> $LOG_FILE sleep 10 echo "" >$START_LOG fi fi fi fi else nohup "$CLASH" -d "$CLASH_CONFIG" -f "$CONFIG_FILE" >> $LOG_FILE 2>&1 & kill_clash stop echo "错误: 配置文件完整性检查不通过,已自动还原配置文件,请根据日志信息对照模板格式检查修改配置文件!" >$START_LOG mv "$START_BACKUP" "$CONFIG_FILE" sleep 5 echo "" >$START_LOG fi rm -rf $START_BACKUP 2>/dev/null rm -rf /tmp/yaml_* 2>/dev/null else subscribe_info=$(uci get openclash.@config_subscribe[0].address 2>/dev/null) if [ ! -f "$CONFIG_FILE" ] && [ -n "$subscribe_info" ]; then kill_clash stop echo "OpenClash 配置文件不存在,开始下载..." >$START_LOG nohup /usr/share/openclash/openclash.sh & exit 0 elif [ ! -f "$CONFIG_FILE" ]; then kill_clash stop echo "错误: OpenClash 缺少配置文件,请上传或更新配置文件!" >$START_LOG echo "${LOGTIME} Config Not Found" >> $LOG_FILE sleep 5 echo "" >$START_LOG fi fi } stop() { enable=$(uci get openclash.config.enable 2>/dev/null) echo "OpenClash 开始关闭..." >$START_LOG echo "第一步: 备份当前节点状态..." >$START_LOG /usr/share/openclash/openclash_history_get.sh 2>/dev/null echo "第二步: 删除 OpenClash 防火墙规则..." >$START_LOG revert_firewall echo "第三步: 关闭 OpenClash 守护程序..." >$START_LOG watchdog_pids=$(ps |grep openclash_watchdog.sh |grep -v grep |awk '{print $1}' 2>/dev/null) for watchdog_pid in $watchdog_pids; do kill -9 "$watchdog_pid" >/dev/null 2>&1 done echo "第四步: 关闭 Clash 主程序..." >$START_LOG if [ "$enable" -eq 0 ]; then kill_clash fi echo "第五步: 重启 Dnsmasq 程序..." >$START_LOG dns_port=$(uci get openclash.config.dns_port 2>/dev/null) redirect_dns=$(uci get openclash.config.redirect_dns 2>/dev/null) masq_cache=$(uci get openclash.config.masq_cache 2>/dev/null) revert_dns "$redirect_dns" "$masq_cache" "$dns_port" /etc/init.d/dnsmasq restart >/dev/null 2>&1 echo "第六步:删除 OpenClash 残留文件..." >$START_LOG if [ "$enable" -eq 0 ]; then rm -rf $LOG_FILE 2>/dev/null rm -rf /tmp/openclash_debug.log 2>/dev/null rm -rf /www/luci-static/openclash 2>/dev/null rm -rf /tmp/openclash_last_version 2>/dev/null rm -rf /tmp/clash_last_version 2>/dev/null rm -rf /tmp/Proxy_Group 2>/dev/null rm -rf /tmp/rules_name 2>/dev/null echo "OpenClash 关闭成功!" >$START_LOG sleep 5 fi rm -rf /tmp/yaml_* 2>/dev/null rm -rf $START_LOG 2>/dev/null del_cron echo "OpenClash Already Stop" } restart() { stop start } reload() { if pidof clash >/dev/null; then revert_firewall 2>/dev/null do_run_mode 2>/dev/null get_config 2>/dev/null set_firewall 2>/dev/null echo "${LOGTIME} OpenClash Reload After Firewall Restart" >> $LOG_FILE fi }