diff --git a/scripts/menus/common.sh b/scripts/menus/common.sh index 60668807..983c787c 100644 --- a/scripts/menus/common.sh +++ b/scripts/menus/common.sh @@ -50,8 +50,15 @@ list_box() { done } -# ================================================= +common_success() { + msg_alert "\033[32m$COMMON_SUCCESS\033[0m" +} +common_failed() { + msg_alert "\033[32m$COMMON_FAILED\033[0m" +} + +# ================================================= common_back() { content_line "0) $COMMON_BACK" separator_line "=" @@ -78,7 +85,3 @@ cancel_back() { content_line "$COMMON_CANCEL" sleep 1 } - -common_success() { - msg_alert "\033[32m$COMMON_SUCCESS\033[0m" -} diff --git a/scripts/menus/override.sh b/scripts/menus/override.sh index ad950dc3..785469b0 100644 --- a/scripts/menus/override.sh +++ b/scripts/menus/override.sh @@ -9,32 +9,36 @@ override() { while true; do [ -z "$rule_link" ] && rule_link=1 [ -z "$server_link" ] && server_link=1 - echo "-----------------------------------------------" - echo -e "\033[30;47m 欢迎使用配置文件覆写功能!\033[0m" - echo "-----------------------------------------------" - echo -e " 1 自定义\033[32m端口及秘钥\033[0m" - echo -e " 2 管理\033[36m自定义规则\033[0m" + comp_box "\033[30;47m 欢迎使用配置文件覆写功能!\033[0m" + content_line "1) 自定义\033[32m端口及秘钥\033[0m" + content_line "2) 管理\033[36m自定义规则\033[0m" echo "$crashcore" | grep -q 'singbox' || { - echo -e " 3 管理\033[33m自定义节点\033[0m" - echo -e " 4 管理\033[36m自定义策略组\033[0m" + content_line "3) 管理\033[33m自定义节点\033[0m" + content_line "4) 管理\033[36m自定义策略组\033[0m" } - echo -e " 5 \033[32m自定义\033[0m高级功能" - [ "$disoverride" != 1 ] && echo -e " 9 \033[33m禁用\033[0m配置文件覆写" - echo "-----------------------------------------------" - [ "$inuserguide" = 1 ] || echo -e " 0 返回上级菜单" - read -p "请输入对应数字 > " num + content_line "5) \033[32m自定义\033[0m高级功能" + [ "$disoverride" != 1 ] && content_line "9) \033[33m禁用\033[0m配置文件覆写" + content_line "" + [ "$inuserguide" = 1 ] || content_line "0) 返回上级菜单" + separator_line "=" + read -r -p "请输入对应数字> " num case "$num" in "" | 0) break ;; 1) if [ -n "$(pidof CrashCore)" ]; then - echo "-----------------------------------------------" - echo -e "\033[33m检测到服务正在运行,需要先停止服务!\033[0m" - read -p "是否停止服务?(1/0) > " res + comp_box "\033[33m检测到服务正在运行,需要先停止服务!\033[0m" \ + "" \ + "是否停止服务?" + btm_box "1) 是" \ + "0) 否,返回上级菜单" + read -r -p "$COMMON_INPUT> " res if [ "$res" = "1" ]; then "$CRASHDIR"/start.sh stop setport + else + continue fi else setport @@ -50,117 +54,129 @@ override() { setgroups ;; 5) - echo "$crashcore" | grep -q 'singbox' && set_singbox_adv || set_clash_adv + if echo "$crashcore" | grep -q 'singbox'; then + set_singbox_adv + else + set_clash_adv + fi sleep 3 ;; 9) - echo "-----------------------------------------------" - echo -e "\033[33m此功能可能会导致严重问题!启用后脚本中大部分功能都将禁用!!!\033[0m" - echo -e "如果你不是非常了解$crashcore的运行机制,切勿开启!\033[0m" - echo -e "\033[33m继续后如出现任何问题,请务必自行解决,一切提问恕不受理!\033[0m" - echo "-----------------------------------------------" + comp_box "\033[33m此功能可能会导致严重问题!启用后脚本中大部分功能都将禁用!!!\033[0m" \ + "如果你不是非常了解$crashcore的运行机制,切勿开启!\033[0m" \ + "\033[33m继续后如出现任何问题,请务必自行解决,一切提问恕不受理!\033[0m" sleep 2 - read -p "我确认遇到问题可以自行解决[1/0] > " res + btm_box "1) 我确认遇到问题可以自行解决" \ + "0) 返回上级菜单" + read -r -p "$COMMON_INPUT> " res [ "$res" = '1' ] && { disoverride=1 - setconfig disoverride $disoverride - echo "-----------------------------------------------" - echo -e "\033[32m设置成功!\033[0m" + if setconfig disoverride $disoverride; then + common_success + else + common_failed + fi } ;; *) errornum - sleep 1 - break ;; esac done } -setrules() { # 自定义规则 - +# 自定义规则 +setrules() { set_rule_type() { - echo "-----------------------------------------------" - echo -e "\033[33m请选择规则类型\033[0m" - echo "$rule_type" | awk -F ' ' '{for(i=1;i<=NF;i++){print i" "$i}}' - echo -e " 0 返回上级菜单" - read -p "请输入对应数字 > " num + comp_box "\033[33m请选择规则类型:\033[0m" + printf '%s\n' "$rule_type" | + awk '{for (i = 1; i <= NF; i++) print i") " $i}' | + while IFS= read -r line; do + content_line "$line" + done + content_line "" + content_line "0) 返回上级菜单" + separator_line "=" + read -r -p "请输入对应数字> " num case "$num" in "" | 0) ;; [0-9]*) if [ "$num" -gt $(echo $rule_type | awk -F " " '{print NF}') ]; then errornum - sleep 1 else rule_type_set=$(echo "$rule_type" | cut -d' ' -f"$num") - echo "-----------------------------------------------" - echo -e "\033[33m请输入规则语句,可以是域名、泛域名、IP网段或者其他匹配规则类型的内容\033[0m" - read -p "请输入对应规则 > " rule_state_set + comp_box "\033[33m请输入规则语句,\n可以是域名、泛域名、IP网段或者其他匹配规则类型的内容\033[0m" + read -r -p "请输入对应规则> " rule_state_set if [ -n "$rule_state_set" ]; then set_group_type else errornum - slepp 1 fi fi ;; *) errornum - sleep 1 ;; esac } set_group_type() { - echo "-----------------------------------------------" - echo -e "\033[36m请选择具体规则\033[0m" - echo -e "\033[33m此处规则读取自现有配置文件,如果你后续更换配置文件时运行出错,请尝试重新添加\033[0m" - echo "$rule_group" | awk -F '#' '{for(i=1;i<=NF;i++){print i" "$i}}' - echo -e " 0 返回上级菜单" - read -p "请输入对应数字 > " num + comp_box "\033[36m请选择具体规则\033[0m" \ + "\033[33m此处规则读取自现有配置文件,如果你后续更换配置文件时运行出错,请尝试重新添加\033[0m" + printf '%s\n' "$rule_group" | + awk -F '#' '{for (i = 1; i <= NF; i++) print i") " $i}' | + while IFS= read -r line; do + content_line "$line" + done + content_line "" + content_line "0) 返回上级菜单" + separator_line "=" + read -r -p "请输入对应数字> " num case "$num" in "" | 0) ;; [0-9]*) if [ "$num" -gt "$(echo "$rule_group" | awk -F "#" '{print NF}')" ]; then errornum - sleep 1 else rule_group_set=$(echo "$rule_group" | cut -d'#' -f"$num") rule_all="- ${rule_type_set},${rule_state_set},${rule_group_set}" echo "IP-CIDR SRC-IP-CIDR IP-CIDR6" | grep -q -- "$rule_type_set" && rule_all="${rule_all},no-resolve" - echo "$rule_all" >>"$YAMLSDIR"/rules.yaml - echo "-----------------------------------------------" - echo -e "\033[32m添加成功!\033[0m" + msg_alert "\033[32m添加成功!\033[0m" fi ;; *) errornum - sleep 1 ;; esac } del_rule_type() { while true; do - echo -e "输入对应数字即可移除相应规则:" + comp_box "输入对应数字即可移除相应规则:" sed -i '/^ *$/d; /^#/d' "$YAMLSDIR"/rules.yaml - cat "$YAMLSDIR"/rules.yaml | grep -Ev '^#' | awk -F "#" '{print " "NR" "$1$2$3}' - echo "-----------------------------------------------" - echo -e " 0 返回上级菜单" - read -p "请输入对应数字 > " num + awk -F '#' '!/^#/ {print NR") "$1 $2 $3}' "$YAMLSDIR/rules.yaml" | + while IFS= read -r line; do + content_line "$line" + done + content_line "" + content_line "0) 返回上级菜单" + separator_line "=" + read -r -p "请输入对应数字> " num case "$num" in "" | 0) break ;; *) if [ "$num" -le "$(wc -l <"$YAMLSDIR"/rules.yaml)" ]; then - sed -i "${num}d" "$YAMLSDIR"/rules.yaml + if sed -i "${num}d" "$YAMLSDIR"/rules.yaml; then + common_success + else + common_failed + fi sleep 1 else errornum - sleep 1 - break fi ;; esac @@ -173,18 +189,18 @@ setrules() { # 自定义规则 } while true; do - echo "-----------------------------------------------" - echo -e "\033[33m你可以在这里快捷管理自定义规则\033[0m" - echo -e "如需批量操作,请手动编辑:\033[36m $YAMLSDIR/rules.yaml\033[0m" - echo -e "\033[33msingbox和clash共用此处规则,可无缝切换!\033[0m" - echo -e "大量规则请尽量使用rule-set功能添加,\033[31m此处过量添加可能导致启动卡顿!\033[0m" - echo "-----------------------------------------------" - echo -e " 1 新增自定义规则" - echo -e " 2 移除自定义规则" - echo -e " 3 清空规则列表" - echo "$crashcore" | grep -q 'singbox' || echo -e " 4 配置节点绕过: \033[36m$proxies_bypass\033[0m" - echo -e " 0 返回上级菜单" - read -p "请输入对应数字 > " num + comp_box "\033[33m你可以在这里快捷管理自定义规则\033[0m" \ + "如需批量操作,请手动编辑:\033[36m $YAMLSDIR/rules.yaml\033[0m" \ + "\033[33msingbox和clash共用此处规则,可无缝切换!\033[0m" \ + "大量规则请尽量使用rule-set功能添加,\n\033[31m此处过量添加可能导致启动卡顿!\033[0m" + content_line "1) 新增自定义规则" + content_line "2) 移除自定义规则" + content_line "3) 清空规则列表" + echo "$crashcore" | grep -q 'singbox' || content_line "4) 配置节点绕过: \033[36m$proxies_bypass\033[0m" + content_line "" + content_line "0) 返回上级菜单" + separator_line "=" + read -r -p "请输入对应数字> " num case "$num" in "" | 0) break @@ -195,56 +211,81 @@ setrules() { # 自定义规则 set_rule_type ;; 2) - echo "-----------------------------------------------" if [ -s "$YAMLSDIR"/rules.yaml ]; then del_rule_type else - echo -e "请先添加自定义规则!" - sleep 1 + msg_alert "请先添加自定义规则!" fi ;; 3) - read -p "确认清空全部自定义规则?(1/0) > " res - [ "$res" = "1" ] && sed -i '/^\s*[^#]/d' "$YAMLSDIR"/rules.yaml + comp_box "是否确认清空全部自定义规则:" + btm_box "1) 是" \ + "0) 否,返回上级菜单" + read -r -p "$COMMON_INPUT> " res + if [ "$res" = "1" ]; then + if sed -i '/^\s*[^#]/d' "$YAMLSDIR"/rules.yaml; then + common_success + else + common_failed + fi + fi ;; 4) - echo "-----------------------------------------------" if [ "$proxies_bypass" = "OFF" ]; then - echo -e "\033[33m本功能会自动将当前配置文件中的节点域名或IP设置为直连规则以防止出现双重流量!\033[0m" - echo -e "\033[33m请确保下游设备使用的节点与ShellCrash中使用的节点相同,否则无法生效!\033[0m" - read -p "启用节点绕过?(1/0) > " res - [ "$res" = "1" ] && proxies_bypass=ON + comp_box "\033[33m本功能会自动将当前配置文件中的节点域名或IP设置为直连规则以防止出现双重流量!\033[0m" \ + "\033[33m请确保下游设备使用的节点与ShellCrash中使用的节点相同,否则无法生效!\033[0m" + btm_box "是否启用节点绕过?" \ + "" \ + "1) 是" \ + "0) 否,返回上级菜单" + read -r -p "$COMMON_INPUT> " res + if [ "$res" = "1" ]; then + proxies_bypass=ON + else + continue + fi else proxies_bypass=OFF fi - setconfig proxies_bypass "$proxies_bypass" - sleep 1 + + if setconfig proxies_bypass "$proxies_bypass"; then + common_success + else + common_failed + fi ;; *) errornum - sleep 1 ;; esac done } -setgroups() { # 自定义clash策略组 +# 自定义clash策略组 +setgroups() { set_group_type() { - echo "-----------------------------------------------" - echo -e "\033[33m注意策略组名称必须和【自定义规则】或【自定义节点】功能中指定的策略组一致!\033[0m" - echo -e "\033[33m建议先创建策略组,之后可在【自定义规则】或【自定义节点】功能中智能指定\033[0m" - echo -e "\033[33m如需在当前策略组下添加节点,请手动编辑$YAMLSDIR/proxy-groups.yaml\033[0m" - read -r -p "请输入自定义策略组名称(不支持纯数字且不要包含特殊字符!) > " new_group_name + comp_box "\033[33m注意策略组名称必须和【自定义规则】或【自定义节点】功能中指定的策略组一致!\033[0m" \ + "\033[33m建议先创建策略组,之后可在【自定义规则】或【自定义节点】功能中智能指定\033[0m" \ + "\033[33m如需在当前策略组下添加节点,请手动编辑$YAMLSDIR/proxy-groups.yaml\033[0m" + btm_box "\033[32m请直接输入自定义策略组名称\033[0m\n(不支持纯数字且不要包含特殊字符!)" \ + "或输入 0 返回上级菜单" + read -r -p "请输入> " new_group_name - echo "-----------------------------------------------" - echo -e "\033[32m请选择策略组【$new_group_name】的类型!\033[0m" - echo "$group_type_cn" | awk '{for(i=1;i<=NF;i++){print i" "$i}}' - read -r -p "请输入对应数字 > " num + comp_box "\033[32m请选择策略组【$new_group_name】的类型:\033[0m" + printf '%s\n' "$group_type_cn" | + awk '{for (i = 1; i <= NF; i++) print i") " $i}' | + while IFS= read -r line; do + content_line "$line" + done + separator_line "=" + read -r -p "请输入对应数字> " num new_group_type=$(echo "$group_type" | awk '{print $'"$num"'}') if [ "$num" = "1" ]; then unset new_group_url interval else - read -r -p "请输入测速地址,回车则默认使用https://www.gstatic.com/generate_204 > " new_group_url + comp_box "请输入测速地址" \ + "或直接回车使用默认地址:https://www.gstatic.com/generate_204" + read -r -p "请输入> " new_group_url [ -z "$new_group_url" ] && new_group_url=https://www.gstatic.com/generate_204 new_group_url="url: '$new_group_url'" interval="interval: 300" @@ -260,20 +301,22 @@ setgroups() { # 自定义clash策略组 - DIRECT EOF sed -i "/^ *$/d" "$YAMLSDIR"/proxy-groups.yaml - echo "-----------------------------------------------" - echo -e "\033[32m添加成功!\033[0m" + msg_alert "\033[32m添加成功!\033[0m" } set_group_add() { - echo "-----------------------------------------------" - echo -e "\033[36m请选择想要将本策略添加到的策略组\033[0m" - echo -e "\033[32m如需添加到多个策略组,请一次性输入多个数字并用空格隔开\033[0m" - echo "-----------------------------------------------" - echo "$proxy_group" | awk -F '#' '{for(i=1;i<=NF;i++){print i" "$i}}' - echo "-----------------------------------------------" - echo -e " 0 跳过添加" - read -r -p "请输入对应数字(多个用空格隔开) > " char + comp_box "\033[36m请选择想要将本策略添加到的策略组\033[0m" \ + "\033[32m如需添加到多个策略组,请一次性输入多个数字并用空格隔开\033[0m" + printf '%s\n' "$proxy_group" | + awk -F '#' '{for (i = 1; i <= NF; i++) print i") " $i}' | + while IFS= read -r line; do + content_line "$line" + done + content_line "" + content_line "0) 跳过添加" + separator_line "=" + read -r -p "请输入对应数字(多个用空格分隔)> " char case "$char" in "" | 0) ;; *) @@ -286,22 +329,21 @@ EOF unset rule_group_add else errornum - sleep 1 fi ;; esac } while true; do - echo "-----------------------------------------------" - echo -e "\033[33m你可以在这里快捷管理自定义策略组\033[0m" - echo -e "\033[36m如需修改或批量操作,请手动编辑:$YAMLSDIR/proxy-groups.yaml\033[0m" - echo "-----------------------------------------------" - echo -e " 1 添加自定义策略组" - echo -e " 2 查看自定义策略组" - echo -e " 3 清空自定义策略组" - echo -e " 0 返回上级菜单" - read -r -p "请输入对应数字 > " num + comp_box "\033[33m你可以在这里快捷管理自定义策略组\033[0m" \ + "\033[36m如需修改或批量操作,请手动编辑:$YAMLSDIR/proxy-groups.yaml\033[0m" + content_line "1) 添加自定义策略组" + content_line "2) 查看自定义策略组" + content_line "3) 清空自定义策略组" + content_line "" + content_line "0) 返回上级菜单" + separator_line "=" + read -r -p "请输入对应数字> " num case "$num" in "" | 0) break @@ -313,48 +355,68 @@ EOF set_group_type ;; 2) - echo "-----------------------------------------------" + line_break + echo "===========================================================" cat "$YAMLSDIR"/proxy-groups.yaml + echo "" + echo "===========================================================" ;; 3) - read -p "确认清空全部自定义策略组?(1/0) > " res - [ "$res" = "1" ] && echo '#用于添加自定义策略组' >"$YAMLSDIR"/proxy-groups.yaml + comp_box "是否确认清空全部自定义策略组?" + btm_box "1) 是" \ + "0) 否,返回上级菜单" + read -r -p "$COMMON_INPUT> " res + if [ "$res" = "1" ]; then + if echo '#用于添加自定义策略组' >"$YAMLSDIR"/proxy-groups.yaml; then + common_success + else + common_failed + fi + fi ;; *) errornum - sleep 1 ;; esac done } -setproxies() { # 自定义clash节点 +# 自定义clash节点 +setproxies() { + set_proxy_type() { - echo "-----------------------------------------------" - echo -e "\033[33m注意节点格式必须是单行,不包括括号,name:必须写在最前,例如:\033[0m" - echo -e "\033[36m【name: \"test\", server: 192.168.1.1, port: 12345, type: socks5, udp: true】\033[0m" - echo -e "更多写法请参考:\033[32m https://juewuy.github.io/ \033[0m" - read -r -p "请输入节点 > " proxy_state_set - if echo "$proxy_state_set" | grep -q "#"; then - echo -e "\033[33m绝对禁止包含【#】号!!!\033[0m" - elif echo "$proxy_state_set" | grep -Eq "^name:"; then - set_group_add - else - errornum - sleep 1 - fi + while true; do + comp_box "\033[33m注意\n节点格式必须是单行、不包括括号、“name:”为开头,例如:\033[0m" \ + "\033[36m【name: \"test\", server: 192.168.1.1, port: 12345, type: socks5, udp: true】\033[0m" \ + "更多写法请参考:\033[32mhttps://juewuy.github.io/\033[0m" + btm_box "\033[36m请直接输入自定义节点\033[0m" \ + "或输入 0 返回上级菜单" + read -r -p "请输入> " proxy_state_set + if [ "$proxy_state_set" = 0 ]; then + break + elif echo "$proxy_state_set" | grep -q "#"; then + msg_alert "\033[33m绝对禁止包含【#】号!\033[0m" + elif echo "$proxy_state_set" | grep -Eq "^name:"; then + set_group_add + else + errornum + fi + done } set_group_add() { - echo "-----------------------------------------------" - echo -e "\033[36m请选择想要将节点添加到的策略组\033[0m" - echo -e "\033[32m如需添加到多个策略组,请一次性输入多个数字并用空格隔开\033[0m" - echo -e "\033[33m如需自定义策略组,请先使用【管理自定义策略组功能】添加\033[0m" - echo "-----------------------------------------------" - echo "$proxy_group" | awk -F '#' '{for(i=1;i<=NF;i++){print i" "$i}}' - echo "-----------------------------------------------" - echo -e " 0 返回上级菜单" - read -r -p "请输入对应数字(多个用空格隔开) > " char + comp_box "\033[36m请选择想要将节点添加到的策略组\033[0m" \ + "\033[32m如需添加到多个策略组,请一次性输入多个数字并用空格隔开\033[0m" \ + "\033[33m如需自定义策略组,请先使用【管理自定义策略组功能】添加\033[0m" + printf '%s\n' "$proxy_group" | + awk -F '#' '{for (i = 1; i <= NF; i++) print i") " $i}' | + while IFS= read -r line; do + content_line "$line" + done + content_line "" + content_line "0) 返回上级菜单" + separator_line "=" + read -r -p "请输入对应数字(多个用空格分隔)> " char case "$char" in "" | 0) ;; *) @@ -364,28 +426,26 @@ setproxies() { # 自定义clash节点 done if [ -n "$rule_group_add" ]; then echo "- {$proxy_state_set}$rule_group_add" >>"$YAMLSDIR"/proxies.yaml - echo "-----------------------------------------------" - echo -e "\033[32m添加成功!\033[0m" + msg_alert "\033[32m添加成功!\033[0m" unset rule_group_add else errornum - sleep 1 fi ;; esac } while true; do - echo "-----------------------------------------------" - echo -e "\033[33m你可以在这里快捷管理自定义节点\033[0m" - echo -e "\033[36m如需批量操作,请手动编辑:$YAMLSDIR/proxies.yaml\033[0m" - echo "-----------------------------------------------" - echo -e " 1 添加自定义节点" - echo -e " 2 管理自定义节点" - echo -e " 3 清空自定义节点" - echo -e " 4 配置节点绕过: \033[36m$proxies_bypass\033[0m" - echo -e " 0 返回上级菜单" - read -r -p "请输入对应数字 > " num + comp_box "\033[33m你可以在这里快捷管理自定义节点\033[0m" \ + "\033[36m如需批量操作,请手动编辑:$YAMLSDIR/proxies.yaml\033[0m" + content_line "1) 添加自定义节点" + content_line "2) 管理自定义节点" + content_line "3) 清空自定义节点" + content_line "4) 配置节点绕过: \033[36m$proxies_bypass\033[0m" + content_line "" + content_line "0) 返回上级菜单" + separator_line "=" + read -r -p "请输入对应数字> " num case "$num" in "" | 0) break @@ -396,35 +456,64 @@ setproxies() { # 自定义clash节点 set_proxy_type ;; 2) - echo "-----------------------------------------------" sed -i '/^ *$/d' "$YAMLSDIR"/proxies.yaml 2>/dev/null if [ -s "$YAMLSDIR"/proxies.yaml ]; then - echo -e "当前已添加的自定义节点为:" - cat "$YAMLSDIR"/proxies.yaml | grep -Ev '^#' | awk -F '[,,}]' '{print NR, $1, $NF}' | sed 's/- {//g' - echo "-----------------------------------------------" - echo -e "\033[33m输入节点对应数字可以移除对应节点\033[0m" - read -r -p "请输入对应数字 > " num - if [ "$num" -le $(cat "$YAMLSDIR"/proxies.yaml | grep -Ev '^#' | wc -l) ]; then - sed -i "$num{/^\s*[^#]/d}" "$YAMLSDIR"/proxies.yaml + comp_box "\033[33m输入节点对应数字可以移除对应节点\033[0m" \ + "当前已添加的自定义节点为:" + grep -Ev '^#' "$YAMLSDIR/proxies.yaml" | + awk -F '[,}]' '{print NR") " $1 " " $NF}' | + sed 's/- {//g' | + while IFS= read -r line; do + content_line "$line" + done + content_line "" + content_line "0) 返回上级菜单" + separator_line "=" + read -r -p "请输入对应数字> " num + if [ "$num" = 0 ]; then + continue + elif [ "$num" -le $(cat "$YAMLSDIR"/proxies.yaml | grep -Ev '^#' | wc -l) ]; then + if sed -i "$num{/^\s*[^#]/d}" "$YAMLSDIR"/proxies.yaml; then + common_success + else + common_failed + fi else errornum fi else - echo -e "请先添加自定义节点!" - sleep 1 + msg_alert "请先添加自定义节点!" fi ;; 3) - read -r -p "确认清空全部自定义节点?(1/0) > " res - [ "$res" = "1" ] && sed -i '/^\s*[^#]/d' "$YAMLSDIR"/proxies.yaml 2>/dev/null + comp_box "是否确认清空全部自定义节点?" + btm_box "1) 是" \ + "0) 否,返回上级菜单" + read -r -p "$COMMON_INPUT> " res + if [ "$res" = "1" ]; then + if sed -i '/^\s*[^#]/d' "$YAMLSDIR"/proxies.yaml 2>/dev/null; then + common_success + else + common_failed + fi + else + continue + fi ;; 4) - echo "-----------------------------------------------" if [ "$proxies_bypass" = "OFF" ]; then - echo -e "\033[33m本功能会自动将当前配置文件中的节点域名或IP设置为直连规则以防止出现双重流量!\033[0m" - echo -e "\033[33m请确保下游设备使用的节点与ShellCrash中使用的节点相同,否则无法生效!\033[0m" - read -r -p "启用节点绕过?(1/0) > " res - [ "$res" = "1" ] && proxies_bypass=ON + comp_box "\033[33m本功能会自动将当前配置文件中的节点域名或IP设置为直连规则以防止出现双重流量!\033[0m" \ + "\033[33m请确保下游设备使用的节点与ShellCrash中使用的节点相同,否则无法生效!\033[0m" + btm_box "是否确定启用节点绕过:" \ + "" \ + "1) 是" \ + "0) 否,返回上级菜单" + read -r -p "$COMMON_INPUT> " res + if [ "$res" = "1" ]; then + proxies_bypass=ON + else + continue + fi else proxies_bypass=OFF fi @@ -435,19 +524,19 @@ setproxies() { # 自定义clash节点 ;; *) errornum - sleep 1 ;; esac done } -set_clash_adv(){ #自定义clash高级规则 - [ ! -f "$YAMLSDIR"/user.yaml ] && cat > "$YAMLSDIR"/user.yaml <"$YAMLSDIR"/user.yaml < "$YAMLSDIR"/others.yaml <"$YAMLSDIR"/others.yaml <