mirror of
https://github.com/sub-store-org/Sub-Store.git
synced 2025-08-10 00:52:40 +00:00
Use babel relative import path
This commit is contained in:
@@ -1,8 +1,8 @@
|
||||
import { isIPv4, isIPv6 } from '../../../utils';
|
||||
import { FULL } from '../../../utils/logical';
|
||||
import { getFlag } from '../../../utils/geo';
|
||||
import { isIPv4, isIPv6 } from '@/utils';
|
||||
import { FULL } from '@/utils/logical';
|
||||
import { getFlag } from '@/utils/geo';
|
||||
import lodash from 'lodash';
|
||||
import $ from '../../app';
|
||||
import $ from '@/core/app';
|
||||
|
||||
// force to set some properties (e.g., skip-cert-verify, udp, tfo, etc.)
|
||||
function SetPropertyOperator({ key, value }) {
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
import RULE_PREPROCESSORS from './preprocessors';
|
||||
import RULE_PRODUCERS from './producers';
|
||||
import RULE_PARSERS from './parsers';
|
||||
import $ from '../app';
|
||||
import $ from '@/core/app';
|
||||
|
||||
export const RuleUtils = (function () {
|
||||
function preprocess(raw) {
|
||||
|
||||
@@ -18,6 +18,6 @@ console.log(
|
||||
`,
|
||||
);
|
||||
|
||||
import serve from './restful';
|
||||
import serve from '@/restful';
|
||||
|
||||
serve();
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
/* eslint-disable no-undef */
|
||||
import { ProxyUtils } from '../core/proxy-utils';
|
||||
import { RuleUtils } from '../core/rule-utils';
|
||||
import { ProxyUtils } from '@/core/proxy-utils';
|
||||
import { RuleUtils } from '@/core/rule-utils';
|
||||
|
||||
const RESOURCE_TYPE = {
|
||||
PROXY: 1,
|
||||
|
||||
@@ -1,8 +1,8 @@
|
||||
import { ProxyUtils } from '../core/proxy-utils';
|
||||
import { RuleUtils } from '../core/rule-utils';
|
||||
import download from '../utils/download';
|
||||
import Gist from '../utils/gist';
|
||||
import $ from '../core/app';
|
||||
import { ProxyUtils } from '@/core/proxy-utils';
|
||||
import { RuleUtils } from '@/core/rule-utils';
|
||||
import download from '@/utils/download';
|
||||
import Gist from '@/utils/gist';
|
||||
import $ from '@/core/app';
|
||||
|
||||
import {
|
||||
SUBS_KEY,
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
import { getPlatformFromHeaders, getFlowHeaders } from './subscriptions';
|
||||
import { SUBS_KEY, COLLECTIONS_KEY } from './constants';
|
||||
import { produceArtifact } from './artifacts';
|
||||
import $ from '../core/app';
|
||||
import $ from '@/core/app';
|
||||
|
||||
export default function register($app) {
|
||||
if (!$.read(COLLECTIONS_KEY)) $.write({}, COLLECTIONS_KEY);
|
||||
|
||||
@@ -3,10 +3,10 @@ import {
|
||||
GIST_BACKUP_KEY,
|
||||
GIST_BACKUP_FILE_NAME,
|
||||
} from './constants';
|
||||
import { ENV, HTTP } from '../vendor/open-api';
|
||||
import express from '../vendor/express';
|
||||
import Gist from '../utils/gist';
|
||||
import $ from '../core/app';
|
||||
import { ENV, HTTP } from '@/vendor/open-api';
|
||||
import express from '@/vendor/express';
|
||||
import Gist from '@/utils/gist';
|
||||
import $ from '@/core/app';
|
||||
|
||||
import registerSubscriptionRoutes from './subscriptions';
|
||||
import registerCollectionRoutes from './collections';
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
import { SETTINGS_KEY } from './constants';
|
||||
import $ from '../core/app';
|
||||
import $ from '@/core/app';
|
||||
|
||||
export default function register($app) {
|
||||
if (!$.read(SETTINGS_KEY)) $.write({}, SETTINGS_KEY);
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
import { SUBS_KEY, COLLECTIONS_KEY } from './constants';
|
||||
import { produceArtifact } from './artifacts';
|
||||
import $ from '../core/app';
|
||||
import $ from '@/core/app';
|
||||
|
||||
export default function register($app) {
|
||||
if (!$.read(SUBS_KEY)) $.write({}, SUBS_KEY);
|
||||
|
||||
144
backend/src/test/proxy-parsers/loon.spec.js
Normal file
144
backend/src/test/proxy-parsers/loon.spec.js
Normal file
@@ -0,0 +1,144 @@
|
||||
import getLoonParser from '@/core/proxy-utils/parsers/peggy/loon';
|
||||
import { describe, it } from 'mocha';
|
||||
import testcases from './testcases';
|
||||
import { expect } from 'chai';
|
||||
|
||||
const parser = getLoonParser();
|
||||
|
||||
describe('Loon', function () {
|
||||
describe('shadowsocks', function () {
|
||||
it('test shadowsocks simple', function () {
|
||||
const { input, expected } = testcases.SS.SIMPLE;
|
||||
const proxy = parser.parse(input.Loon);
|
||||
expect(proxy).eql(expected);
|
||||
});
|
||||
it('test shadowsocks obfs + tls', function () {
|
||||
const { input, expected } = testcases.SS.OBFS_TLS;
|
||||
const proxy = parser.parse(input.Loon);
|
||||
expect(proxy).eql(expected);
|
||||
});
|
||||
it('test shadowsocks obfs + http', function () {
|
||||
const { input, expected } = testcases.SS.OBFS_HTTP;
|
||||
const proxy = parser.parse(input.Loon);
|
||||
expect(proxy).eql(expected);
|
||||
});
|
||||
});
|
||||
|
||||
describe('shadowsocksr', function () {
|
||||
it('test shadowsocksr simple', function () {
|
||||
const { input, expected } = testcases.SSR.SIMPLE;
|
||||
const proxy = parser.parse(input.Loon);
|
||||
expect(proxy).eql(expected);
|
||||
});
|
||||
});
|
||||
|
||||
describe('trojan', function () {
|
||||
it('test trojan simple', function () {
|
||||
const { input, expected } = testcases.TROJAN.SIMPLE;
|
||||
const proxy = parser.parse(input.Loon);
|
||||
expect(proxy).eql(expected);
|
||||
});
|
||||
|
||||
it('test trojan + ws', function () {
|
||||
const { input, expected } = testcases.TROJAN.WS;
|
||||
const proxy = parser.parse(input.Loon);
|
||||
expect(proxy).eql(expected);
|
||||
});
|
||||
|
||||
it('test trojan + wss', function () {
|
||||
const { input, expected } = testcases.TROJAN.WSS;
|
||||
const proxy = parser.parse(input.Loon);
|
||||
expect(proxy).eql(expected);
|
||||
});
|
||||
});
|
||||
|
||||
describe('vmess', function () {
|
||||
it('test vmess simple', function () {
|
||||
const { input, expected } = testcases.VMESS.SIMPLE;
|
||||
const proxy = parser.parse(input.Loon);
|
||||
expect(proxy).eql(expected.Loon);
|
||||
});
|
||||
|
||||
it('test vmess + aead', function () {
|
||||
const { input, expected } = testcases.VMESS.AEAD;
|
||||
const proxy = parser.parse(input.Loon);
|
||||
expect(proxy).eql(expected.Loon);
|
||||
});
|
||||
|
||||
it('test vmess + ws', function () {
|
||||
const { input, expected } = testcases.VMESS.WS;
|
||||
const proxy = parser.parse(input.Loon);
|
||||
expect(proxy).eql(expected.Loon);
|
||||
});
|
||||
|
||||
it('test vmess + wss', function () {
|
||||
const { input, expected } = testcases.VMESS.WSS;
|
||||
const proxy = parser.parse(input.Loon);
|
||||
expect(proxy).eql(expected.Loon);
|
||||
});
|
||||
|
||||
it('test vmess + http', function () {
|
||||
const { input, expected } = testcases.VMESS.HTTP;
|
||||
const proxy = parser.parse(input.Loon);
|
||||
expect(proxy).eql(expected.Loon);
|
||||
});
|
||||
|
||||
it('test vmess + http + tls', function () {
|
||||
const { input, expected } = testcases.VMESS.HTTP_TLS;
|
||||
const proxy = parser.parse(input.Loon);
|
||||
expect(proxy).eql(expected.Loon);
|
||||
});
|
||||
});
|
||||
|
||||
describe('vless', function () {
|
||||
it('test vless simple', function () {
|
||||
const { input, expected } = testcases.VLESS.SIMPLE;
|
||||
const proxy = parser.parse(input.Loon);
|
||||
expect(proxy).eql(expected.Loon);
|
||||
});
|
||||
|
||||
it('test vless + ws', function () {
|
||||
const { input, expected } = testcases.VLESS.WS;
|
||||
const proxy = parser.parse(input.Loon);
|
||||
expect(proxy).eql(expected.Loon);
|
||||
});
|
||||
|
||||
it('test vless + wss', function () {
|
||||
const { input, expected } = testcases.VLESS.WSS;
|
||||
const proxy = parser.parse(input.Loon);
|
||||
expect(proxy).eql(expected.Loon);
|
||||
});
|
||||
|
||||
it('test vless + http', function () {
|
||||
const { input, expected } = testcases.VLESS.HTTP;
|
||||
const proxy = parser.parse(input.Loon);
|
||||
expect(proxy).eql(expected.Loon);
|
||||
});
|
||||
|
||||
it('test vless + http + tls', function () {
|
||||
const { input, expected } = testcases.VLESS.HTTP_TLS;
|
||||
const proxy = parser.parse(input.Loon);
|
||||
expect(proxy).eql(expected.Loon);
|
||||
});
|
||||
});
|
||||
|
||||
describe('http(s)', function () {
|
||||
it('test http simple', function () {
|
||||
const { input, expected } = testcases.HTTP.SIMPLE;
|
||||
const proxy = parser.parse(input.Loon);
|
||||
expect(proxy).eql(expected);
|
||||
});
|
||||
|
||||
it('test http with authentication', function () {
|
||||
const { input, expected } = testcases.HTTP.AUTH;
|
||||
const proxy = parser.parse(input.Loon);
|
||||
expect(proxy).eql(expected);
|
||||
});
|
||||
|
||||
it('test https', function () {
|
||||
const { input, expected } = testcases.HTTP.TLS;
|
||||
const proxy = parser.parse(input.Loon);
|
||||
expect(proxy).eql(expected);
|
||||
});
|
||||
});
|
||||
});
|
||||
136
backend/src/test/proxy-parsers/qx.spec.js
Normal file
136
backend/src/test/proxy-parsers/qx.spec.js
Normal file
@@ -0,0 +1,136 @@
|
||||
import getQXParser from '@/core/proxy-utils/parsers/peggy/qx';
|
||||
import { describe, it } from 'mocha';
|
||||
import testcases from './testcases';
|
||||
import { expect } from 'chai';
|
||||
|
||||
const parser = getQXParser();
|
||||
|
||||
describe('QX', function () {
|
||||
describe('shadowsocks', function () {
|
||||
it('test shadowsocks simple', function () {
|
||||
const { input, expected } = testcases.SS.SIMPLE;
|
||||
const proxy = parser.parse(input.QX);
|
||||
expect(proxy).eql(expected);
|
||||
});
|
||||
it('test shadowsocks obfs + tls', function () {
|
||||
const { input, expected } = testcases.SS.OBFS_TLS;
|
||||
const proxy = parser.parse(input.QX);
|
||||
expect(proxy).eql(expected);
|
||||
});
|
||||
it('test shadowsocks obfs + http', function () {
|
||||
const { input, expected } = testcases.SS.OBFS_HTTP;
|
||||
const proxy = parser.parse(input.QX);
|
||||
expect(proxy).eql(expected);
|
||||
});
|
||||
it('test shadowsocks v2ray-plugin + ws', function () {
|
||||
const { input, expected } = testcases.SS.V2RAY_PLUGIN_WS;
|
||||
const proxy = parser.parse(input.QX);
|
||||
expect(proxy).eql(expected);
|
||||
});
|
||||
it('test shadowsocks v2ray-plugin + wss', function () {
|
||||
const { input, expected } = testcases.SS.V2RAY_PLUGIN_WSS;
|
||||
const proxy = parser.parse(input.QX);
|
||||
expect(proxy).eql(expected);
|
||||
});
|
||||
});
|
||||
|
||||
describe('shadowsocksr', function () {
|
||||
it('test shadowsocksr simple', function () {
|
||||
const { input, expected } = testcases.SSR.SIMPLE;
|
||||
const proxy = parser.parse(input.QX);
|
||||
expect(proxy).eql(expected);
|
||||
});
|
||||
});
|
||||
|
||||
describe('trojan', function () {
|
||||
it('test trojan simple', function () {
|
||||
const { input, expected } = testcases.TROJAN.SIMPLE;
|
||||
const proxy = parser.parse(input.QX);
|
||||
expect(proxy).eql(expected);
|
||||
});
|
||||
|
||||
it('test trojan + ws', function () {
|
||||
const { input, expected } = testcases.TROJAN.WS;
|
||||
const proxy = parser.parse(input.QX);
|
||||
expect(proxy).eql(expected);
|
||||
});
|
||||
|
||||
it('test trojan + wss', function () {
|
||||
const { input, expected } = testcases.TROJAN.WSS;
|
||||
const proxy = parser.parse(input.QX);
|
||||
expect(proxy).eql(expected);
|
||||
});
|
||||
});
|
||||
|
||||
describe('vmess', function () {
|
||||
it('test vmess simple', function () {
|
||||
const { input, expected } = testcases.VMESS.SIMPLE;
|
||||
const proxy = parser.parse(input.QX);
|
||||
expect(proxy).eql(expected.QX);
|
||||
});
|
||||
|
||||
it('test vmess aead', function () {
|
||||
const { input, expected } = testcases.VMESS.AEAD;
|
||||
const proxy = parser.parse(input.QX);
|
||||
expect(proxy).eql(expected.QX);
|
||||
});
|
||||
|
||||
it('test vmess + ws', function () {
|
||||
const { input, expected } = testcases.VMESS.WS;
|
||||
const proxy = parser.parse(input.QX);
|
||||
expect(proxy).eql(expected.QX);
|
||||
});
|
||||
|
||||
it('test vmess + wss', function () {
|
||||
const { input, expected } = testcases.VMESS.WSS;
|
||||
const proxy = parser.parse(input.QX);
|
||||
expect(proxy).eql(expected.QX);
|
||||
});
|
||||
|
||||
it('test vmess + http', function () {
|
||||
const { input, expected } = testcases.VMESS.HTTP;
|
||||
const proxy = parser.parse(input.QX);
|
||||
expect(proxy).eql(expected.QX);
|
||||
});
|
||||
});
|
||||
|
||||
describe('http', function () {
|
||||
it('test http simple', function () {
|
||||
const { input, expected } = testcases.HTTP.SIMPLE;
|
||||
const proxy = parser.parse(input.QX);
|
||||
expect(proxy).eql(expected);
|
||||
});
|
||||
|
||||
it('test http with authentication', function () {
|
||||
const { input, expected } = testcases.HTTP.AUTH;
|
||||
const proxy = parser.parse(input.QX);
|
||||
expect(proxy).eql(expected);
|
||||
});
|
||||
|
||||
it('test https', function () {
|
||||
const { input, expected } = testcases.HTTP.TLS;
|
||||
const proxy = parser.parse(input.QX);
|
||||
expect(proxy).eql(expected);
|
||||
});
|
||||
});
|
||||
|
||||
describe('socks5', function () {
|
||||
it('test socks5 simple', function () {
|
||||
const { input, expected } = testcases.SOCKS5.SIMPLE;
|
||||
const proxy = parser.parse(input.QX);
|
||||
expect(proxy).eql(expected);
|
||||
});
|
||||
|
||||
it('test socks5 with authentication', function () {
|
||||
const { input, expected } = testcases.SOCKS5.AUTH;
|
||||
const proxy = parser.parse(input.QX);
|
||||
expect(proxy).eql(expected);
|
||||
});
|
||||
|
||||
it('test socks5 + tls', function () {
|
||||
const { input, expected } = testcases.SOCKS5.TLS;
|
||||
const proxy = parser.parse(input.QX);
|
||||
expect(proxy).eql(expected);
|
||||
});
|
||||
});
|
||||
});
|
||||
132
backend/src/test/proxy-parsers/surge.spec.js
Normal file
132
backend/src/test/proxy-parsers/surge.spec.js
Normal file
@@ -0,0 +1,132 @@
|
||||
import getSurgeParser from '@/core/proxy-utils/parsers/peggy/surge';
|
||||
import { describe, it } from 'mocha';
|
||||
import testcases from './testcases';
|
||||
import { expect } from 'chai';
|
||||
|
||||
const parser = getSurgeParser();
|
||||
|
||||
describe('Surge', function () {
|
||||
describe('shadowsocks', function () {
|
||||
it('test shadowsocks simple', function () {
|
||||
const { input, expected } = testcases.SS.SIMPLE;
|
||||
const proxy = parser.parse(input.Surge);
|
||||
expect(proxy).eql(expected);
|
||||
});
|
||||
it('test shadowsocks obfs + tls', function () {
|
||||
const { input, expected } = testcases.SS.OBFS_TLS;
|
||||
const proxy = parser.parse(input.Surge);
|
||||
expect(proxy).eql(expected);
|
||||
});
|
||||
it('test shadowsocks obfs + http', function () {
|
||||
const { input, expected } = testcases.SS.OBFS_HTTP;
|
||||
const proxy = parser.parse(input.Surge);
|
||||
expect(proxy).eql(expected);
|
||||
});
|
||||
});
|
||||
|
||||
describe('trojan', function () {
|
||||
it('test trojan simple', function () {
|
||||
const { input, expected } = testcases.TROJAN.SIMPLE;
|
||||
const proxy = parser.parse(input.Surge);
|
||||
expect(proxy).eql(expected);
|
||||
});
|
||||
|
||||
it('test trojan + ws', function () {
|
||||
const { input, expected } = testcases.TROJAN.WS;
|
||||
const proxy = parser.parse(input.Surge);
|
||||
expect(proxy).eql(expected);
|
||||
});
|
||||
|
||||
it('test trojan + wss', function () {
|
||||
const { input, expected } = testcases.TROJAN.WSS;
|
||||
const proxy = parser.parse(input.Surge);
|
||||
expect(proxy).eql(expected);
|
||||
});
|
||||
});
|
||||
|
||||
describe('vmess', function () {
|
||||
it('test vmess simple', function () {
|
||||
const { input, expected } = testcases.VMESS.SIMPLE;
|
||||
const proxy = parser.parse(input.Surge);
|
||||
expect(proxy).eql(expected.Surge);
|
||||
});
|
||||
|
||||
it('test vmess aead', function () {
|
||||
const { input, expected } = testcases.VMESS.AEAD;
|
||||
const proxy = parser.parse(input.Surge);
|
||||
expect(proxy).eql(expected.Surge);
|
||||
});
|
||||
|
||||
it('test vmess + ws', function () {
|
||||
const { input, expected } = testcases.VMESS.WS;
|
||||
const proxy = parser.parse(input.Surge);
|
||||
expect(proxy).eql(expected.Surge);
|
||||
});
|
||||
|
||||
it('test vmess + wss', function () {
|
||||
const { input, expected } = testcases.VMESS.WSS;
|
||||
const proxy = parser.parse(input.Surge);
|
||||
expect(proxy).eql(expected.Surge);
|
||||
});
|
||||
});
|
||||
|
||||
describe('http', function () {
|
||||
it('test http simple', function () {
|
||||
const { input, expected } = testcases.HTTP.SIMPLE;
|
||||
const proxy = parser.parse(input.Surge);
|
||||
expect(proxy).eql(expected);
|
||||
});
|
||||
|
||||
it('test http with authentication', function () {
|
||||
const { input, expected } = testcases.HTTP.AUTH;
|
||||
const proxy = parser.parse(input.Surge);
|
||||
expect(proxy).eql(expected);
|
||||
});
|
||||
|
||||
it('test https', function () {
|
||||
const { input, expected } = testcases.HTTP.TLS;
|
||||
const proxy = parser.parse(input.Surge);
|
||||
expect(proxy).eql(expected);
|
||||
});
|
||||
});
|
||||
|
||||
describe('socks5', function () {
|
||||
it('test socks5 simple', function () {
|
||||
const { input, expected } = testcases.SOCKS5.SIMPLE;
|
||||
const proxy = parser.parse(input.Surge);
|
||||
expect(proxy).eql(expected);
|
||||
});
|
||||
|
||||
it('test socks5 with authentication', function () {
|
||||
const { input, expected } = testcases.SOCKS5.AUTH;
|
||||
const proxy = parser.parse(input.Surge);
|
||||
expect(proxy).eql(expected);
|
||||
});
|
||||
|
||||
it('test socks5 + tls', function () {
|
||||
const { input, expected } = testcases.SOCKS5.TLS;
|
||||
const proxy = parser.parse(input.Surge);
|
||||
expect(proxy).eql(expected);
|
||||
});
|
||||
});
|
||||
|
||||
describe('snell', function () {
|
||||
it('test snell simple', function () {
|
||||
const { input, expected } = testcases.SNELL.SIMPLE;
|
||||
const proxy = parser.parse(input.Surge);
|
||||
expect(proxy).eql(expected);
|
||||
});
|
||||
|
||||
it('test snell obfs + http', function () {
|
||||
const { input, expected } = testcases.SNELL.OBFS_HTTP;
|
||||
const proxy = parser.parse(input.Surge);
|
||||
expect(proxy).eql(expected);
|
||||
});
|
||||
|
||||
it('test snell obfs + tls', function () {
|
||||
const { input, expected } = testcases.SNELL.OBFS_TLS;
|
||||
const proxy = parser.parse(input.Surge);
|
||||
expect(proxy).eql(expected);
|
||||
});
|
||||
});
|
||||
});
|
||||
711
backend/src/test/proxy-parsers/testcases.js
Normal file
711
backend/src/test/proxy-parsers/testcases.js
Normal file
@@ -0,0 +1,711 @@
|
||||
function createTestCases() {
|
||||
const name = 'name';
|
||||
const server = 'example.com';
|
||||
const port = 10086;
|
||||
|
||||
const cipher = 'chacha20';
|
||||
|
||||
const username = 'username';
|
||||
const password = 'password';
|
||||
|
||||
const obfs_host = 'obfs.com';
|
||||
const obfs_path = '/resource/file';
|
||||
|
||||
const ssr_protocol = 'auth_chain_b';
|
||||
const ssr_protocol_param = 'def';
|
||||
const ssr_obfs = 'tls1.2_ticket_fastauth';
|
||||
const ssr_obfs_param = 'obfs.com';
|
||||
|
||||
const uuid = '23ad6b10-8d1a-40f7-8ad0-e3e35cd32291';
|
||||
|
||||
const sni = 'sni.com';
|
||||
|
||||
const SS = {
|
||||
SIMPLE: {
|
||||
input: {
|
||||
Loon: `${name}=shadowsocks,${server},${port},${cipher},"${password}"`,
|
||||
QX: `shadowsocks=${server}:${port},method=${cipher},password=${password},tag=${name}`,
|
||||
Surge: `${name}=ss,${server},${port},encrypt-method=${cipher},password=${password}`,
|
||||
},
|
||||
expected: {
|
||||
type: 'ss',
|
||||
name,
|
||||
server,
|
||||
port,
|
||||
cipher,
|
||||
password,
|
||||
},
|
||||
},
|
||||
OBFS_TLS: {
|
||||
input: {
|
||||
Loon: `${name}=shadowsocks,${server},${port},${cipher},"${password}",obfs-name=tls,obfs-uri=${obfs_path},obfs-host=${obfs_host}`,
|
||||
QX: `shadowsocks=${server}:${port},method=${cipher},password=${password},obfs=tls,obfs-host=${obfs_host},obfs-uri=${obfs_path},tag=${name}`,
|
||||
Surge: `${name}=ss,${server},${port},encrypt-method=${cipher},password=${password},obfs=tls,obfs-host=${obfs_host},obfs-uri=${obfs_path}`,
|
||||
},
|
||||
expected: {
|
||||
type: 'ss',
|
||||
name,
|
||||
server,
|
||||
port,
|
||||
cipher,
|
||||
password,
|
||||
plugin: 'obfs',
|
||||
'plugin-opts': {
|
||||
mode: 'tls',
|
||||
path: obfs_path,
|
||||
host: obfs_host,
|
||||
},
|
||||
},
|
||||
},
|
||||
OBFS_HTTP: {
|
||||
input: {
|
||||
Loon: `${name}=shadowsocks,${server},${port},${cipher},"${password}",obfs-name=http,obfs-uri=${obfs_path},obfs-host=${obfs_host}`,
|
||||
QX: `shadowsocks=${server}:${port},method=${cipher},password=${password},obfs=http,obfs-host=${obfs_host},obfs-uri=${obfs_path},tag=${name}`,
|
||||
Surge: `${name}=ss,${server},${port},encrypt-method=${cipher},password=${password},obfs=http,obfs-host=${obfs_host},obfs-uri=${obfs_path}`,
|
||||
},
|
||||
expected: {
|
||||
type: 'ss',
|
||||
name,
|
||||
server,
|
||||
port,
|
||||
cipher,
|
||||
password,
|
||||
plugin: 'obfs',
|
||||
'plugin-opts': {
|
||||
mode: 'http',
|
||||
path: obfs_path,
|
||||
host: obfs_host,
|
||||
},
|
||||
},
|
||||
},
|
||||
V2RAY_PLUGIN_WS: {
|
||||
input: {
|
||||
QX: `shadowsocks=${server}:${port},method=${cipher},password=${password},obfs=ws,obfs-host=${obfs_host},obfs-uri=${obfs_path},tag=${name}`,
|
||||
},
|
||||
expected: {
|
||||
type: 'ss',
|
||||
name,
|
||||
server,
|
||||
port,
|
||||
cipher,
|
||||
password,
|
||||
plugin: 'v2ray-plugin',
|
||||
'plugin-opts': {
|
||||
mode: 'websocket',
|
||||
path: obfs_path,
|
||||
host: obfs_host,
|
||||
},
|
||||
},
|
||||
},
|
||||
V2RAY_PLUGIN_WSS: {
|
||||
input: {
|
||||
QX: `shadowsocks=${server}:${port},method=${cipher},password=${password},obfs=wss,obfs-host=${obfs_host},obfs-uri=${obfs_path},tag=${name}`,
|
||||
},
|
||||
expected: {
|
||||
type: 'ss',
|
||||
name,
|
||||
server,
|
||||
port,
|
||||
cipher,
|
||||
password,
|
||||
plugin: 'v2ray-plugin',
|
||||
'plugin-opts': {
|
||||
mode: 'websocket',
|
||||
path: obfs_path,
|
||||
host: obfs_host,
|
||||
tls: true,
|
||||
},
|
||||
},
|
||||
},
|
||||
};
|
||||
const SSR = {
|
||||
SIMPLE: {
|
||||
input: {
|
||||
QX: `shadowsocks=${server}:${port},method=${cipher},password=${password},ssr-protocol=${ssr_protocol},ssr-protocol-param=${ssr_protocol_param},obfs=${ssr_obfs},obfs-host=${ssr_obfs_param},tag=${name}`,
|
||||
Loon: `${name}=shadowsocksr,${server},${port},${cipher},"${password}",protocol=${ssr_protocol},protocol-param=${ssr_protocol_param},obfs=${ssr_obfs},obfs-param=${ssr_obfs_param}`,
|
||||
},
|
||||
expected: {
|
||||
type: 'ssr',
|
||||
name,
|
||||
server,
|
||||
port,
|
||||
cipher,
|
||||
password,
|
||||
obfs: ssr_obfs,
|
||||
protocol: ssr_protocol,
|
||||
'obfs-param': ssr_obfs_param,
|
||||
'protocol-param': ssr_protocol_param,
|
||||
},
|
||||
},
|
||||
};
|
||||
const TROJAN = {
|
||||
SIMPLE: {
|
||||
input: {
|
||||
QX: `trojan=${server}:${port},password=${password},tag=${name}`,
|
||||
Loon: `${name}=trojan,${server},${port},"${password}"`,
|
||||
Surge: `${name}=trojan,${server},${port},password=${password}`,
|
||||
},
|
||||
expected: {
|
||||
type: 'trojan',
|
||||
name,
|
||||
server,
|
||||
port,
|
||||
password,
|
||||
},
|
||||
},
|
||||
WS: {
|
||||
input: {
|
||||
QX: `trojan=${server}:${port},password=${password},obfs=ws,obfs-host=${obfs_host},obfs-uri=${obfs_path},tag=${name}`,
|
||||
Loon: `${name}=trojan,${server},${port},"${password}",transport=ws,path=${obfs_path},host=${obfs_host}`,
|
||||
Surge: `${name}=trojan,${server},${port},password=${password},ws=true,ws-path=${obfs_path},ws-headers=Host:${obfs_host}`,
|
||||
},
|
||||
expected: {
|
||||
type: 'trojan',
|
||||
name,
|
||||
server,
|
||||
port,
|
||||
password,
|
||||
network: 'ws',
|
||||
'ws-opts': {
|
||||
path: obfs_path,
|
||||
headers: {
|
||||
Host: obfs_host,
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
WSS: {
|
||||
input: {
|
||||
QX: `trojan=${server}:${port},password=${password},obfs=wss,obfs-host=${obfs_host},obfs-uri=${obfs_path},tls-verification=false,tls-host=${sni},tag=${name}`,
|
||||
Loon: `${name}=trojan,${server},${port},"${password}",transport=ws,path=${obfs_path},host=${obfs_host},over-tls=true,tls-name=${sni},skip-cert-verify=true`,
|
||||
Surge: `${name}=trojan,${server},${port},password=${password},ws=true,ws-path=${obfs_path},ws-headers=Host:${obfs_host},skip-cert-verify=true,sni=${sni},tls=true`,
|
||||
},
|
||||
expected: {
|
||||
type: 'trojan',
|
||||
name,
|
||||
server,
|
||||
port,
|
||||
password,
|
||||
network: 'ws',
|
||||
tls: true,
|
||||
'ws-opts': {
|
||||
path: obfs_path,
|
||||
headers: {
|
||||
Host: obfs_host,
|
||||
},
|
||||
},
|
||||
'skip-cert-verify': true,
|
||||
sni,
|
||||
},
|
||||
},
|
||||
};
|
||||
const VMESS = {
|
||||
SIMPLE: {
|
||||
input: {
|
||||
QX: `vmess=${server}:${port},method=${cipher},password=${uuid},tag=${name}`,
|
||||
Loon: `${name}=vmess,${server},${port},${cipher},"${uuid}"`,
|
||||
Surge: `${name}=vmess,${server},${port},username=${uuid}`,
|
||||
},
|
||||
expected: {
|
||||
QX: {
|
||||
type: 'vmess',
|
||||
name,
|
||||
server,
|
||||
port,
|
||||
uuid,
|
||||
cipher,
|
||||
},
|
||||
Loon: {
|
||||
type: 'vmess',
|
||||
name,
|
||||
server,
|
||||
port,
|
||||
uuid,
|
||||
cipher,
|
||||
},
|
||||
Surge: {
|
||||
type: 'vmess',
|
||||
name,
|
||||
server,
|
||||
port,
|
||||
uuid, // Surge lacks support for specifying cipher for vmess protocol!
|
||||
},
|
||||
},
|
||||
},
|
||||
AEAD: {
|
||||
input: {
|
||||
QX: `vmess=${server}:${port},method=${cipher},password=${uuid},aead=true,tag=${name}`,
|
||||
Loon: `${name}=vmess,${server},${port},${cipher},"${uuid}",alterId=0`,
|
||||
Surge: `${name}=vmess,${server},${port},username=${uuid},vmess-aead=true`,
|
||||
},
|
||||
expected: {
|
||||
QX: {
|
||||
type: 'vmess',
|
||||
name,
|
||||
server,
|
||||
port,
|
||||
uuid,
|
||||
cipher,
|
||||
alterId: 0,
|
||||
},
|
||||
Loon: {
|
||||
type: 'vmess',
|
||||
name,
|
||||
server,
|
||||
port,
|
||||
uuid,
|
||||
cipher,
|
||||
alterId: 0,
|
||||
},
|
||||
Surge: {
|
||||
type: 'vmess',
|
||||
name,
|
||||
server,
|
||||
port,
|
||||
uuid, // Surge lacks support for specifying cipher for vmess protocol!
|
||||
alterId: 0,
|
||||
},
|
||||
},
|
||||
},
|
||||
WS: {
|
||||
input: {
|
||||
QX: `vmess=${server}:${port},method=${cipher},password=${uuid},obfs=ws,obfs-host=${obfs_host},obfs-uri=${obfs_path},tag=${name}`,
|
||||
Loon: `${name}=vmess,${server},${port},${cipher},"${uuid}",transport=ws,host=${obfs_host},path=${obfs_path}`,
|
||||
Surge: `${name}=vmess,${server},${port},username=${uuid},ws=true,ws-path=${obfs_path},ws-headers=Host:${obfs_host}`,
|
||||
},
|
||||
expected: {
|
||||
QX: {
|
||||
type: 'vmess',
|
||||
name,
|
||||
server,
|
||||
port,
|
||||
uuid,
|
||||
cipher,
|
||||
network: 'ws',
|
||||
'ws-opts': {
|
||||
path: obfs_path,
|
||||
headers: {
|
||||
Host: obfs_host,
|
||||
},
|
||||
},
|
||||
},
|
||||
Loon: {
|
||||
type: 'vmess',
|
||||
name,
|
||||
server,
|
||||
port,
|
||||
uuid,
|
||||
cipher,
|
||||
network: 'ws',
|
||||
'ws-opts': {
|
||||
path: obfs_path,
|
||||
headers: {
|
||||
Host: obfs_host,
|
||||
},
|
||||
},
|
||||
},
|
||||
Surge: {
|
||||
type: 'vmess',
|
||||
name,
|
||||
server,
|
||||
port,
|
||||
uuid, // Surge lacks support for specifying cipher for vmess protocol!
|
||||
network: 'ws',
|
||||
'ws-opts': {
|
||||
path: obfs_path,
|
||||
headers: {
|
||||
Host: obfs_host,
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
WSS: {
|
||||
input: {
|
||||
QX: `vmess=${server}:${port},method=${cipher},password=${uuid},obfs=wss,obfs-host=${obfs_host},obfs-uri=${obfs_path},tls-verification=false,tls-host=${sni},tag=${name}`,
|
||||
Loon: `${name}=vmess,${server},${port},${cipher},"${uuid}",transport=ws,host=${obfs_host},path=${obfs_path},over-tls=true,tls-name=${sni},skip-cert-verify=true`,
|
||||
Surge: `${name}=vmess,${server},${port},username=${uuid},ws=true,ws-path=${obfs_path},ws-headers=Host:${obfs_host},skip-cert-verify=true,sni=${sni},tls=true`,
|
||||
},
|
||||
expected: {
|
||||
QX: {
|
||||
type: 'vmess',
|
||||
name,
|
||||
server,
|
||||
port,
|
||||
uuid,
|
||||
cipher,
|
||||
network: 'ws',
|
||||
'ws-opts': {
|
||||
path: obfs_path,
|
||||
headers: {
|
||||
Host: obfs_host,
|
||||
},
|
||||
},
|
||||
tls: true,
|
||||
'skip-cert-verify': true,
|
||||
sni,
|
||||
},
|
||||
Loon: {
|
||||
type: 'vmess',
|
||||
name,
|
||||
server,
|
||||
port,
|
||||
uuid,
|
||||
cipher,
|
||||
network: 'ws',
|
||||
'ws-opts': {
|
||||
path: obfs_path,
|
||||
headers: {
|
||||
Host: obfs_host,
|
||||
},
|
||||
},
|
||||
tls: true,
|
||||
'skip-cert-verify': true,
|
||||
sni,
|
||||
},
|
||||
Surge: {
|
||||
type: 'vmess',
|
||||
name,
|
||||
server,
|
||||
port,
|
||||
uuid, // Surge lacks support for specifying cipher for vmess protocol!
|
||||
network: 'ws',
|
||||
'ws-opts': {
|
||||
path: obfs_path,
|
||||
headers: {
|
||||
Host: obfs_host,
|
||||
},
|
||||
},
|
||||
tls: true,
|
||||
'skip-cert-verify': true,
|
||||
sni,
|
||||
},
|
||||
},
|
||||
},
|
||||
HTTP: {
|
||||
input: {
|
||||
QX: `vmess=${server}:${port},method=${cipher},password=${uuid},obfs=http,obfs-host=${obfs_host},obfs-uri=${obfs_path},tag=${name}`,
|
||||
Loon: `${name}=vmess,${server},${port},${cipher},"${uuid}",transport=http,host=${obfs_host},path=${obfs_path}`,
|
||||
},
|
||||
expected: {
|
||||
QX: {
|
||||
type: 'vmess',
|
||||
name,
|
||||
server,
|
||||
port,
|
||||
uuid,
|
||||
cipher,
|
||||
network: 'http',
|
||||
'http-opts': {
|
||||
path: obfs_path,
|
||||
headers: {
|
||||
Host: obfs_host,
|
||||
},
|
||||
},
|
||||
},
|
||||
Loon: {
|
||||
type: 'vmess',
|
||||
name,
|
||||
server,
|
||||
port,
|
||||
uuid,
|
||||
cipher,
|
||||
network: 'http',
|
||||
'http-opts': {
|
||||
path: obfs_path,
|
||||
headers: {
|
||||
Host: obfs_host,
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
HTTP_TLS: {
|
||||
input: {
|
||||
Loon: `${name}=vmess,${server},${port},${cipher},"${uuid}",transport=http,host=${obfs_host},path=${obfs_path},over-tls=true,tls-name=${sni},skip-cert-verify=true`,
|
||||
},
|
||||
expected: {
|
||||
Loon: {
|
||||
type: 'vmess',
|
||||
name,
|
||||
server,
|
||||
port,
|
||||
uuid,
|
||||
cipher,
|
||||
network: 'http',
|
||||
'http-opts': {
|
||||
path: obfs_path,
|
||||
headers: {
|
||||
Host: obfs_host,
|
||||
},
|
||||
},
|
||||
tls: true,
|
||||
'skip-cert-verify': true,
|
||||
sni,
|
||||
},
|
||||
},
|
||||
},
|
||||
};
|
||||
const VLESS = {
|
||||
SIMPLE: {
|
||||
input: {
|
||||
Loon: `${name}=vless,${server},${port},"${uuid}"`,
|
||||
},
|
||||
expected: {
|
||||
Loon: {
|
||||
type: 'vless',
|
||||
name,
|
||||
server,
|
||||
port,
|
||||
uuid,
|
||||
},
|
||||
},
|
||||
},
|
||||
WS: {
|
||||
input: {
|
||||
Loon: `${name}=vless,${server},${port},"${uuid}",transport=ws,host=${obfs_host},path=${obfs_path}`,
|
||||
},
|
||||
expected: {
|
||||
Loon: {
|
||||
type: 'vless',
|
||||
name,
|
||||
server,
|
||||
port,
|
||||
uuid,
|
||||
network: 'ws',
|
||||
'ws-opts': {
|
||||
path: obfs_path,
|
||||
headers: {
|
||||
Host: obfs_host,
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
WSS: {
|
||||
input: {
|
||||
Loon: `${name}=vless,${server},${port},"${uuid}",transport=ws,host=${obfs_host},path=${obfs_path},over-tls=true,tls-name=${sni},skip-cert-verify=true`,
|
||||
},
|
||||
expected: {
|
||||
Loon: {
|
||||
type: 'vless',
|
||||
name,
|
||||
server,
|
||||
port,
|
||||
uuid,
|
||||
network: 'ws',
|
||||
'ws-opts': {
|
||||
path: obfs_path,
|
||||
headers: {
|
||||
Host: obfs_host,
|
||||
},
|
||||
},
|
||||
tls: true,
|
||||
'skip-cert-verify': true,
|
||||
sni,
|
||||
},
|
||||
},
|
||||
},
|
||||
HTTP: {
|
||||
input: {
|
||||
Loon: `${name}=vless,${server},${port},"${uuid}",transport=http,host=${obfs_host},path=${obfs_path}`,
|
||||
},
|
||||
expected: {
|
||||
Loon: {
|
||||
type: 'vless',
|
||||
name,
|
||||
server,
|
||||
port,
|
||||
uuid,
|
||||
network: 'http',
|
||||
'http-opts': {
|
||||
path: obfs_path,
|
||||
headers: {
|
||||
Host: obfs_host,
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
HTTP_TLS: {
|
||||
input: {
|
||||
Loon: `${name}=vless,${server},${port},"${uuid}",transport=http,host=${obfs_host},path=${obfs_path},over-tls=true,tls-name=${sni},skip-cert-verify=true`,
|
||||
},
|
||||
expected: {
|
||||
Loon: {
|
||||
type: 'vless',
|
||||
name,
|
||||
server,
|
||||
port,
|
||||
uuid,
|
||||
network: 'http',
|
||||
'http-opts': {
|
||||
path: obfs_path,
|
||||
headers: {
|
||||
Host: obfs_host,
|
||||
},
|
||||
},
|
||||
tls: true,
|
||||
'skip-cert-verify': true,
|
||||
sni,
|
||||
},
|
||||
},
|
||||
},
|
||||
};
|
||||
const HTTP = {
|
||||
SIMPLE: {
|
||||
input: {
|
||||
Loon: `${name}=http,${server},${port}`,
|
||||
QX: `http=${server}:${port},tag=${name}`,
|
||||
Surge: `${name}=http,${server},${port}`,
|
||||
},
|
||||
expected: {
|
||||
type: 'http',
|
||||
name,
|
||||
server,
|
||||
port,
|
||||
},
|
||||
},
|
||||
AUTH: {
|
||||
input: {
|
||||
Loon: `${name}=http,${server},${port},${username},"${password}"`,
|
||||
QX: `http=${server}:${port},tag=${name},username=${username},password=${password}`,
|
||||
Surge: `${name}=http,${server},${port},${username},${password}`,
|
||||
},
|
||||
expected: {
|
||||
type: 'http',
|
||||
name,
|
||||
server,
|
||||
port,
|
||||
username,
|
||||
password,
|
||||
},
|
||||
},
|
||||
TLS: {
|
||||
input: {
|
||||
Loon: `${name}=https,${server},${port},${username},"${password}",tls-name=${sni},skip-cert-verify=true`,
|
||||
QX: `http=${server}:${port},username=${username},password=${password},over-tls=true,tls-host=${sni},tls-verification=false,tag=${name}`,
|
||||
Surge: `${name}=https,${server},${port},${username},${password},sni=${sni},skip-cert-verify=true`,
|
||||
},
|
||||
expected: {
|
||||
type: 'http',
|
||||
name,
|
||||
server,
|
||||
port,
|
||||
username,
|
||||
password,
|
||||
sni,
|
||||
'skip-cert-verify': true,
|
||||
tls: true,
|
||||
},
|
||||
},
|
||||
};
|
||||
const SOCKS5 = {
|
||||
SIMPLE: {
|
||||
input: {
|
||||
QX: `socks5=${server}:${port},tag=${name}`,
|
||||
Surge: `${name}=socks5,${server},${port}`,
|
||||
},
|
||||
expected: {
|
||||
type: 'socks5',
|
||||
name,
|
||||
server,
|
||||
port,
|
||||
},
|
||||
},
|
||||
AUTH: {
|
||||
input: {
|
||||
QX: `socks5=${server}:${port},tag=${name},username=${username},password=${password}`,
|
||||
Surge: `${name}=socks5,${server},${port},${username},${password}`,
|
||||
},
|
||||
expected: {
|
||||
type: 'socks5',
|
||||
name,
|
||||
server,
|
||||
port,
|
||||
username,
|
||||
password,
|
||||
},
|
||||
},
|
||||
TLS: {
|
||||
input: {
|
||||
QX: `socks5=${server}:${port},username=${username},password=${password},over-tls=true,tls-host=${sni},tls-verification=false,tag=${name}`,
|
||||
Surge: `${name}=socks5-tls,${server},${port},${username},${password},sni=${sni},skip-cert-verify=true`,
|
||||
},
|
||||
expected: {
|
||||
type: 'socks5',
|
||||
name,
|
||||
server,
|
||||
port,
|
||||
username,
|
||||
password,
|
||||
sni,
|
||||
'skip-cert-verify': true,
|
||||
tls: true,
|
||||
},
|
||||
},
|
||||
};
|
||||
const SNELL = {
|
||||
SIMPLE: {
|
||||
input: {
|
||||
Surge: `${name}=snell,${server},${port},psk=${password},version=3`,
|
||||
},
|
||||
expected: {
|
||||
type: 'snell',
|
||||
name,
|
||||
server,
|
||||
port,
|
||||
psk: password,
|
||||
version: 3,
|
||||
},
|
||||
},
|
||||
OBFS_HTTP: {
|
||||
input: {
|
||||
Surge: `${name}=snell,${server},${port},psk=${password},version=3,obfs=http,obfs-host=${obfs_host},obfs-uri=${obfs_path}`,
|
||||
},
|
||||
expected: {
|
||||
type: 'snell',
|
||||
name,
|
||||
server,
|
||||
port,
|
||||
psk: password,
|
||||
version: 3,
|
||||
'obfs-opts': {
|
||||
mode: 'http',
|
||||
host: obfs_host,
|
||||
path: obfs_path,
|
||||
},
|
||||
},
|
||||
},
|
||||
OBFS_TLS: {
|
||||
input: {
|
||||
Surge: `${name}=snell,${server},${port},psk=${password},version=3,obfs=tls,obfs-host=${obfs_host},obfs-uri=${obfs_path}`,
|
||||
},
|
||||
expected: {
|
||||
type: 'snell',
|
||||
name,
|
||||
server,
|
||||
port,
|
||||
psk: password,
|
||||
version: 3,
|
||||
'obfs-opts': {
|
||||
mode: 'tls',
|
||||
host: obfs_host,
|
||||
path: obfs_path,
|
||||
},
|
||||
},
|
||||
},
|
||||
};
|
||||
return {
|
||||
SS,
|
||||
SSR,
|
||||
VMESS,
|
||||
VLESS,
|
||||
TROJAN,
|
||||
HTTP,
|
||||
SOCKS5,
|
||||
SNELL,
|
||||
};
|
||||
}
|
||||
|
||||
export default createTestCases();
|
||||
@@ -1,4 +1,4 @@
|
||||
import { HTTP } from '../vendor/open-api';
|
||||
import { HTTP } from '@/vendor/open-api';
|
||||
|
||||
const cache = new Map();
|
||||
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
import { HTTP } from '../vendor/open-api';
|
||||
import { HTTP } from '@/vendor/open-api';
|
||||
|
||||
/**
|
||||
* Gist backup
|
||||
|
||||
Reference in New Issue
Block a user