Merge pull request #1133 from sofia-riese/patch-1

refactor(setrules): replace recursion with while loop
This commit is contained in:
juewuy
2026-01-16 22:24:49 +08:00
committed by GitHub

View File

@@ -7,138 +7,159 @@ __IS_MODULE_6_CORECONFIG_LOADED=1
YAMLSDIR="$CRASHDIR"/yamls YAMLSDIR="$CRASHDIR"/yamls
JSONSDIR="$CRASHDIR"/jsons JSONSDIR="$CRASHDIR"/jsons
#导入订阅、配置文件相关 # 导入订阅、配置文件相关
setrules(){ #自定义规则 # 自定义规则
set_rule_type(){ setrules() {
echo "-----------------------------------------------"
echo -e "\033[33m请选择规则类型\033[0m" set_rule_type() {
echo $rule_type | awk -F ' ' '{for(i=1;i<=NF;i++){print i" "$i}}' echo "-----------------------------------------------"
echo -e " 0 返回上级菜单" echo -e "\033[33m请选择规则类型\033[0m"
read -p "请输入对应数字 > " num echo "$rule_type" | awk -F ' ' '{for(i=1;i<=NF;i++){print i" "$i}}'
case "$num" in echo -e " 0 返回上级菜单"
0) ;; read -p "请输入对应数字 > " num
[0-9]*) case "$num" in
if [ $num -gt $(echo $rule_type | awk -F " " '{print NF}') ];then "" | 0) ;;
errornum [0-9]*)
else if [ "$num" -gt $(echo $rule_type | awk -F " " '{print NF}') ]; then
rule_type_set=$(echo $rule_type|cut -d' ' -f$num) errornum
echo "-----------------------------------------------" sleep 1
echo -e "\033[33m请输入规则语句可以是域名、泛域名、IP网段或者其他匹配规则类型的内容\033[0m" else
read -p "请输入对应规则 > " rule_state_set rule_type_set=$(echo "$rule_type" | cut -d' ' -f"$num")
[ -n "$rule_state_set" ] && set_group_type || errornum echo "-----------------------------------------------"
fi echo -e "\033[33m请输入规则语句可以是域名、泛域名、IP网段或者其他匹配规则类型的内容\033[0m"
;; read -p "请输入对应规则 > " rule_state_set
*) if [ -n "$rule_state_set" ]; then
errornum set_group_type
;; else
esac errornum
} slepp 1
set_group_type(){ fi
echo "-----------------------------------------------" fi
echo -e "\033[36m请选择具体规则\033[0m" ;;
echo -e "\033[33m此处规则读取自现有配置文件如果你后续更换配置文件时运行出错请尝试重新添加\033[0m" *)
echo $rule_group | awk -F '#' '{for(i=1;i<=NF;i++){print i" "$i}}' errornum
echo -e " 0 返回上级菜单" sleep 1
read -p "请输入对应数字 > " num ;;
case "$num" in esac
0) ;; }
[0-9]*)
if [ $num -gt $(echo $rule_group | awk -F "#" '{print NF}') ];then set_group_type() {
errornum echo "-----------------------------------------------"
else echo -e "\033[36m请选择具体规则\033[0m"
rule_group_set=$(echo $rule_group|cut -d'#' -f$num) echo -e "\033[33m此处规则读取自现有配置文件如果你后续更换配置文件时运行出错请尝试重新添加\033[0m"
rule_all="- ${rule_type_set},${rule_state_set},${rule_group_set}" echo "$rule_group" | awk -F '#' '{for(i=1;i<=NF;i++){print i" "$i}}'
[ -n "$(echo IP-CIDR SRC-IP-CIDR IP-CIDR6|grep "$rule_type_set")" ] && rule_all="${rule_all},no-resolve" echo -e " 0 返回上级菜单"
echo "$rule_all" >> "$YAMLSDIR"/rules.yaml read -p "请输入对应数字 > " num
echo "-----------------------------------------------" case "$num" in
echo -e "\033[32m添加成功\033[0m" "" | 0) ;;
fi [0-9]*)
;; if [ "$num" -gt "$(echo "$rule_group" | awk -F "#" '{print NF}')" ]; then
*) errornum
errornum sleep 1
;; else
esac rule_group_set=$(echo "$rule_group" | cut -d'#' -f"$num")
} rule_all="- ${rule_type_set},${rule_state_set},${rule_group_set}"
del_rule_type(){ echo "IP-CIDR SRC-IP-CIDR IP-CIDR6" | grep -q -- "$rule_type_set" && rule_all="${rule_all},no-resolve"
echo -e "输入对应数字即可移除相应规则:"
sed -i '/^ *$/d; /^#/d' "$YAMLSDIR"/rules.yaml echo "$rule_all" >>"$YAMLSDIR"/rules.yaml
cat "$YAMLSDIR"/rules.yaml | grep -Ev '^#' | awk -F "#" '{print " "NR" "$1$2$3}' echo "-----------------------------------------------"
echo "-----------------------------------------------" echo -e "\033[32m添加成功\033[0m"
echo -e " 0 返回上级菜单" fi
read -p "请输入对应数字 > " num ;;
case "$num" in *)
0) ;; errornum
'') ;; sleep 1
*) ;;
if [ "$num" -le "$(wc -l < "$YAMLSDIR"/rules.yaml)" ];then esac
sed -i "${num}d" "$YAMLSDIR"/rules.yaml }
sleep 1
del_rule_type del_rule_type() {
else while true; do
errornum echo -e "输入对应数字即可移除相应规则:"
fi sed -i '/^ *$/d; /^#/d' "$YAMLSDIR"/rules.yaml
;; cat "$YAMLSDIR"/rules.yaml | grep -Ev '^#' | awk -F "#" '{print " "NR" "$1$2$3}'
esac echo "-----------------------------------------------"
} echo -e " 0 返回上级菜单"
get_rule_group(){ read -p "请输入对应数字 > " num
. "$CRASHDIR"/libs/web_save.sh case "$num" in
get_save http://127.0.0.1:${db_port}/proxies | sed 's/:{/!/g' | awk -F '!' '{for(i=1;i<=NF;i++) print $i}' | grep -aE '"Selector|URLTest|LoadBalance"' | grep -aoE '"name":.*"now":".*",' | awk -F '"' '{print "#"$4}' | tr -d '\n' "" | 0)
} break
echo "-----------------------------------------------" ;;
echo -e "\033[33m你可以在这里快捷管理自定义规则\033[0m" *)
echo -e "如需批量操作,请手动编辑:\033[36m $YAMLSDIR/rules.yaml\033[0m" if [ "$num" -le "$(wc -l <"$YAMLSDIR"/rules.yaml)" ]; then
echo -e "\033[33msingbox和clash共用此处规则可无缝切换\033[0m" sed -i "${num}d" "$YAMLSDIR"/rules.yaml
echo -e "大量规则请尽量使用rule-set功能添加\033[31m此处过量添加可能导致启动卡顿\033[0m" sleep 1
echo "-----------------------------------------------" else
echo -e " 1 新增自定义规则" errornum
echo -e " 2 移除自定义规则" sleep 1
echo -e " 3 清空规则列表" break
echo "$crashcore" | grep -q 'singbox' || echo -e " 4 配置节点绕过: \033[36m$proxies_bypass\033[0m" fi
echo -e " 0 返回上级菜单" ;;
read -p "请输入对应数字 > " num esac
case "$num" in done
0) }
;;
1) get_rule_group() {
rule_type="DOMAIN-SUFFIX DOMAIN-KEYWORD IP-CIDR SRC-IP-CIDR DST-PORT SRC-PORT GEOIP GEOSITE IP-CIDR6 DOMAIN PROCESS-NAME" . "$CRASHDIR"/libs/web_save.sh
rule_group="DIRECT#REJECT$(get_rule_group)" get_save http://127.0.0.1:${db_port}/proxies | sed 's/:{/!/g' | awk -F '!' '{for(i=1;i<=NF;i++) print $i}' | grep -aE '"Selector|URLTest|LoadBalance"' | grep -aoE '"name":.*"now":".*",' | awk -F '"' '{print "#"$4}' | tr -d '\n'
set_rule_type }
setrules
;; while true; do
2) echo "-----------------------------------------------"
echo "-----------------------------------------------" echo -e "\033[33m你可以在这里快捷管理自定义规则\033[0m"
if [ -s "$YAMLSDIR"/rules.yaml ];then echo -e "如需批量操作,请手动编辑:\033[36m $YAMLSDIR/rules.yaml\033[0m"
del_rule_type echo -e "\033[33msingbox和clash共用此处规则可无缝切换\033[0m"
else echo -e "大量规则请尽量使用rule-set功能添加\033[31m此处过量添加可能导致启动卡顿\033[0m"
echo -e "请先添加自定义规则!" echo "-----------------------------------------------"
sleep 1 echo -e " 1 新增自定义规则"
fi echo -e " 2 移除自定义规则"
setrules echo -e " 3 清空规则列表"
;; echo "$crashcore" | grep -q 'singbox' || echo -e " 4 配置节点绕过: \033[36m$proxies_bypass\033[0m"
3) echo -e " 0 返回上级菜单"
read -p "确认清空全部自定义规则?(1/0) > " res read -p "请输入对应数字 > " num
[ "$res" = "1" ] && sed -i '/^\s*[^#]/d' "$YAMLSDIR"/rules.yaml case "$num" in
setrules "" | 0)
;; break
4) ;;
echo "-----------------------------------------------" 1)
if [ "$proxies_bypass" = "OFF" ];then rule_type="DOMAIN-SUFFIX DOMAIN-KEYWORD IP-CIDR SRC-IP-CIDR DST-PORT SRC-PORT GEOIP GEOSITE IP-CIDR6 DOMAIN PROCESS-NAME"
echo -e "\033[33m本功能会自动将当前配置文件中的节点域名或IP设置为直连规则以防止出现双重流量\033[0m" rule_group="DIRECT#REJECT$(get_rule_group)"
echo -e "\033[33m请确保下游设备使用的节点与ShellCrash中使用的节点相同否则无法生效\033[0m" set_rule_type
read -p "启用节点绕过?(1/0) > " res ;;
[ "$res" = "1" ] && proxies_bypass=ON 2)
else echo "-----------------------------------------------"
proxies_bypass=OFF if [ -s "$YAMLSDIR"/rules.yaml ]; then
fi del_rule_type
setconfig proxies_bypass $proxies_bypass else
sleep 1 echo -e "请先添加自定义规则!"
setrules sleep 1
;; fi
*) ;;
errornum 3)
;; read -p "确认清空全部自定义规则?(1/0) > " res
esac [ "$res" = "1" ] && sed -i '/^\s*[^#]/d' "$YAMLSDIR"/rules.yaml
;;
4)
echo "-----------------------------------------------"
if [ "$proxies_bypass" = "OFF" ]; then
echo -e "\033[33m本功能会自动将当前配置文件中的节点域名或IP设置为直连规则以防止出现双重流量\033[0m"
echo -e "\033[33m请确保下游设备使用的节点与ShellCrash中使用的节点相同否则无法生效\033[0m"
read -p "启用节点绕过?(1/0) > " res
[ "$res" = "1" ] && proxies_bypass=ON
else
proxies_bypass=OFF
fi
setconfig proxies_bypass "$proxies_bypass"
sleep 1
;;
*)
errornum
sleep 1
;;
esac
done
} }
setgroups(){ #自定义clash策略组 setgroups(){ #自定义clash策略组
set_group_type(){ set_group_type(){
echo "-----------------------------------------------" echo "-----------------------------------------------"