local api = require "luci.model.cbi.passwall.api.api" local ss_encrypt_method_list = { "rc4-md5", "aes-128-cfb", "aes-192-cfb", "aes-256-cfb", "aes-128-ctr", "aes-192-ctr", "aes-256-ctr", "bf-cfb", "camellia-128-cfb", "camellia-192-cfb", "camellia-256-cfb", "salsa20", "chacha20", "chacha20-ietf", -- aead "aes-128-gcm", "aes-192-gcm", "aes-256-gcm", "chacha20-ietf-poly1305", "xchacha20-ietf-poly1305" } local ssr_encrypt_method_list = { "none", "table", "rc2-cfb", "rc4", "rc4-md5", "rc4-md5-6", "aes-128-cfb", "aes-192-cfb", "aes-256-cfb", "aes-128-ctr", "aes-192-ctr", "aes-256-ctr", "bf-cfb", "camellia-128-cfb", "camellia-192-cfb", "camellia-256-cfb", "cast5-cfb", "des-cfb", "idea-cfb", "seed-cfb", "salsa20", "chacha20", "chacha20-ietf" } local ssr_protocol_list = { "origin", "verify_simple", "verify_deflate", "verify_sha1", "auth_simple", "auth_sha1", "auth_sha1_v2", "auth_sha1_v4", "auth_aes128_md5", "auth_aes128_sha1", "auth_chain_a", "auth_chain_b", "auth_chain_c", "auth_chain_d", "auth_chain_e", "auth_chain_f" } local ssr_obfs_list = { "plain", "http_simple", "http_post", "random_head", "tls_simple", "tls1.0_session_auth", "tls1.2_ticket_auth" } local v_ss_encrypt_method_list = { "aes-128-gcm", "aes-256-gcm", "chacha20-poly1305" } local x_ss_encrypt_method_list = { "aes-128-gcm", "aes-256-gcm", "chacha20-poly1305", "xchacha20-poly1305" } local header_type_list = { "none", "srtp", "utp", "wechat-video", "dtls", "wireguard" } local encrypt_methods_ss_aead = { "chacha20-ietf-poly1305", "aes-128-gcm", "aes-256-gcm", } m = Map("passwall_server", translate("Server Config")) m.redirect = api.url("server") s = m:section(NamedSection, arg[1], "user", "") s.addremove = false s.dynamic = false enable = s:option(Flag, "enable", translate("Enable")) enable.default = "1" enable.rmempty = false remarks = s:option(Value, "remarks", translate("Remarks")) remarks.default = translate("Remarks") remarks.rmempty = false type = s:option(ListValue, "type", translate("Type")) if api.is_finded("microsocks") then type:value("Socks", translate("Socks")) end if api.is_finded("ss-server") then type:value("SS", translate("Shadowsocks")) end if api.is_finded("ssr-server") then type:value("SSR", translate("ShadowsocksR")) end if api.is_finded("v2ray") then type:value("V2ray", translate("V2ray")) end if api.is_finded("xray") then type:value("Xray", translate("Xray")) end if api.is_finded("brook") then type:value("Brook", translate("Brook")) end --[[ if api.is_finded("trojan-plus") or api.is_finded("trojan") then type:value("Trojan", translate("Trojan")) end ]]-- if api.is_finded("trojan-plus") then type:value("Trojan-Plus", translate("Trojan-Plus")) end if api.is_finded("trojan-go") then type:value("Trojan-Go", translate("Trojan-Go")) end if api.is_finded("hysteria") then type:value("Hysteria", translate("Hysteria")) end protocol = s:option(ListValue, "protocol", translate("Protocol")) protocol:value("vmess", "Vmess") protocol:value("vless", "VLESS") protocol:value("http", "HTTP") protocol:value("socks", "Socks") protocol:value("shadowsocks", "Shadowsocks") protocol:value("trojan", "Trojan") protocol:value("mtproto", "MTProto") protocol:value("dokodemo-door", "dokodemo-door") protocol:depends("type", "V2ray") protocol:depends("type", "Xray") -- Brook协议 brook_protocol = s:option(ListValue, "brook_protocol", translate("Protocol")) brook_protocol:value("server", "Brook") brook_protocol:value("wsserver", "WebSocket") brook_protocol:depends("type", "Brook") function brook_protocol.cfgvalue(self, section) return m:get(section, "protocol") end function brook_protocol.write(self, section, value) m:set(section, "protocol", value) end --brook_tls = s:option(Flag, "brook_tls", translate("Use TLS")) --brook_tls:depends("brook_protocol", "wsserver") port = s:option(Value, "port", translate("Listen Port")) port.datatype = "port" port.rmempty = false auth = s:option(Flag, "auth", translate("Auth")) auth.validate = function(self, value, t) if value and value == "1" then local user_v = username:formvalue(t) or "" local pass_v = password:formvalue(t) or "" if user_v == "" or pass_v == "" then return nil, translate("Username and Password must be used together!") end end return value end auth:depends("type", "Socks") auth:depends({ type = "V2ray", protocol = "socks" }) auth:depends({ type = "V2ray", protocol = "http" }) auth:depends({ type = "Xray", protocol = "socks" }) auth:depends({ type = "Xray", protocol = "http" }) username = s:option(Value, "username", translate("Username")) username:depends("auth", true) password = s:option(Value, "password", translate("Password")) password.password = true password:depends("auth", true) password:depends("type", "SS") password:depends("type", "SSR") password:depends("type", "Brook") password:depends({ type = "V2ray", protocol = "shadowsocks" }) password:depends({ type = "Xray", protocol = "shadowsocks" }) mtproto_password = s:option(Value, "mtproto_password", translate("Password"), translate("The MTProto protocol must be 32 characters and can only contain characters from 0 to 9 and a to f.")) mtproto_password:depends({ type = "V2ray", protocol = "mtproto" }) mtproto_password:depends({ type = "Xray", protocol = "mtproto" }) mtproto_password.default = arg[1] function mtproto_password.cfgvalue(self, section) return m:get(section, "password") end function mtproto_password.write(self, section, value) m:set(section, "password", value) end d_protocol = s:option(ListValue, "d_protocol", translate("Destination protocol")) d_protocol:value("tcp", "TCP") d_protocol:value("udp", "UDP") d_protocol:value("tcp,udp", "TCP,UDP") d_protocol:depends({ type = "V2ray", protocol = "dokodemo-door" }) d_protocol:depends({ type = "Xray", protocol = "dokodemo-door" }) d_address = s:option(Value, "d_address", translate("Destination address")) d_address:depends({ type = "V2ray", protocol = "dokodemo-door" }) d_address:depends({ type = "Xray", protocol = "dokodemo-door" }) d_port = s:option(Value, "d_port", translate("Destination port")) d_port.datatype = "port" d_port:depends({ type = "V2ray", protocol = "dokodemo-door" }) d_port:depends({ type = "Xray", protocol = "dokodemo-door" }) decryption = s:option(Value, "decryption", translate("Encrypt Method")) decryption.default = "none" decryption:depends({ type = "V2ray", protocol = "vless" }) decryption:depends({ type = "Xray", protocol = "vless" }) hysteria_protocol = s:option(ListValue, "hysteria_protocol", translate("Protocol")) hysteria_protocol:value("udp", "UDP") hysteria_protocol:value("faketcp", "faketcp") hysteria_protocol:value("wechat-video", "wechat-video") hysteria_protocol:depends("type", "Hysteria") function hysteria_protocol.cfgvalue(self, section) return m:get(section, "protocol") end function hysteria_protocol.write(self, section, value) m:set(section, "protocol", value) end hysteria_obfs = s:option(Value, "hysteria_obfs", translate("Obfs Password")) hysteria_obfs:depends("type", "Hysteria") hysteria_auth_type = s:option(ListValue, "hysteria_auth_type", translate("Auth Type")) hysteria_auth_type:value("disable", translate("Disable")) hysteria_auth_type:value("string", translate("STRING")) hysteria_auth_type:depends("type", "Hysteria") hysteria_auth_password = s:option(Value, "hysteria_auth_password", translate("Auth Password")) hysteria_auth_password.password = true hysteria_auth_password:depends("hysteria_auth_type", "string") hysteria_alpn = s:option(Value, "hysteria_alpn", translate("QUIC TLS ALPN")) hysteria_alpn:depends("type", "Hysteria") hysteria_udp = s:option(Flag, "hysteria_udp", translate("UDP")) hysteria_udp.default = "1" hysteria_udp:depends("type", "Hysteria") hysteria_up_mbps = s:option(Value, "hysteria_up_mbps", translate("Max upload Mbps")) hysteria_up_mbps.default = "10" hysteria_up_mbps:depends("type", "Hysteria") hysteria_down_mbps = s:option(Value, "hysteria_down_mbps", translate("Max download Mbps")) hysteria_down_mbps.default = "50" hysteria_down_mbps:depends("type", "Hysteria") hysteria_recv_window_conn = s:option(Value, "hysteria_recv_window_conn", translate("QUIC stream receive window")) hysteria_recv_window_conn:depends("type", "Hysteria") hysteria_recv_window = s:option(Value, "hysteria_recv_window", translate("QUIC connection receive window")) hysteria_recv_window:depends("type", "Hysteria") hysteria_disable_mtu_discovery = s:option(Flag, "hysteria_disable_mtu_discovery", translate("Disable MTU detection")) hysteria_disable_mtu_discovery:depends("type", "Hysteria") ss_encrypt_method = s:option(ListValue, "ss_encrypt_method", translate("Encrypt Method")) for a, t in ipairs(ss_encrypt_method_list) do ss_encrypt_method:value(t) end ss_encrypt_method:depends("type", "SS") function ss_encrypt_method.cfgvalue(self, section) return m:get(section, "method") end function ss_encrypt_method.write(self, section, value) m:set(section, "method", value) end ssr_encrypt_method = s:option(ListValue, "ssr_encrypt_method", translate("Encrypt Method")) for a, t in ipairs(ssr_encrypt_method_list) do ssr_encrypt_method:value(t) end ssr_encrypt_method:depends("type", "SSR") function ssr_encrypt_method.cfgvalue(self, section) return m:get(section, "method") end function ssr_encrypt_method.write(self, section, value) m:set(section, "method", value) end v_ss_encrypt_method = s:option(ListValue, "v_ss_encrypt_method", translate("Encrypt Method")) for a, t in ipairs(v_ss_encrypt_method_list) do v_ss_encrypt_method:value(t) end v_ss_encrypt_method:depends({ type = "V2ray", protocol = "shadowsocks" }) function v_ss_encrypt_method.cfgvalue(self, section) return m:get(section, "method") end function v_ss_encrypt_method.write(self, section, value) m:set(section, "method", value) end x_ss_encrypt_method = s:option(ListValue, "x_ss_encrypt_method", translate("Encrypt Method")) for a, t in ipairs(x_ss_encrypt_method_list) do x_ss_encrypt_method:value(t) end x_ss_encrypt_method:depends({ type = "Xray", protocol = "shadowsocks" }) function x_ss_encrypt_method.cfgvalue(self, section) return m:get(section, "method") end function x_ss_encrypt_method.write(self, section, value) m:set(section, "method", value) end iv_check = s:option(Flag, "iv_check", translate("IV Check")) iv_check:depends({ type = "V2ray", protocol = "shadowsocks" }) iv_check:depends({ type = "Xray", protocol = "shadowsocks" }) ss_network = s:option(ListValue, "ss_network", translate("Transport")) ss_network.default = "tcp,udp" ss_network:value("tcp", "TCP") ss_network:value("udp", "UDP") ss_network:value("tcp,udp", "TCP,UDP") ss_network:depends({ type = "V2ray", protocol = "shadowsocks" }) ss_network:depends({ type = "Xray", protocol = "shadowsocks" }) ssr_protocol = s:option(ListValue, "ssr_protocol", translate("Protocol")) for a, t in ipairs(ssr_protocol_list) do ssr_protocol:value(t) end ssr_protocol:depends("type", "SSR") function ssr_protocol.cfgvalue(self, section) return m:get(section, "protocol") end function ssr_protocol.write(self, section, value) m:set(section, "protocol", value) end protocol_param = s:option(Value, "protocol_param", translate("Protocol_param")) protocol_param:depends("type", "SSR") obfs = s:option(ListValue, "obfs", translate("Obfs")) for a, t in ipairs(ssr_obfs_list) do obfs:value(t) end obfs:depends("type", "SSR") obfs_param = s:option(Value, "obfs_param", translate("Obfs_param")) obfs_param:depends("type", "SSR") timeout = s:option(Value, "timeout", translate("Connection Timeout")) timeout.datatype = "uinteger" timeout.default = 300 timeout:depends("type", "SS") timeout:depends("type", "SSR") udp_forward = s:option(Flag, "udp_forward", translate("UDP Forward")) udp_forward.default = "1" udp_forward.rmempty = false udp_forward:depends("type", "SSR") udp_forward:depends({ type = "V2ray", protocol = "socks" }) udp_forward:depends({ type = "Xray", protocol = "socks" }) uuid = s:option(DynamicList, "uuid", translate("ID") .. "/" .. translate("Password")) for i = 1, 3 do uuid:value(api.gen_uuid(1)) end uuid:depends({ type = "V2ray", protocol = "vmess" }) uuid:depends({ type = "V2ray", protocol = "vless" }) uuid:depends({ type = "V2ray", protocol = "trojan" }) uuid:depends({ type = "Xray", protocol = "vmess" }) uuid:depends({ type = "Xray", protocol = "vless" }) uuid:depends({ type = "Xray", protocol = "trojan" }) uuid:depends("type", "Trojan") uuid:depends("type", "Trojan-Go") uuid:depends("type", "Trojan-Plus") tls = s:option(Flag, "tls", translate("TLS")) tls.default = 0 tls.validate = function(self, value, t) if value then local type = type:formvalue(t) or "" if value == "0" and (type == "Trojan" or type == "Trojan-Plus") then return nil, translate("Original Trojan only supported 'tls', please choose 'tls'.") end if value == "1" then local ca = tls_certificateFile:formvalue(t) or "" local key = tls_keyFile:formvalue(t) or "" if ca == "" or key == "" then return nil, translate("Public key and Private key path can not be empty!") end end return value end end tls:depends({ type = "V2ray", protocol = "vmess" }) tls:depends({ type = "V2ray", protocol = "vless" }) tls:depends({ type = "V2ray", protocol = "socks" }) tls:depends({ type = "V2ray", protocol = "shadowsocks" }) tls:depends({ type = "V2ray", protocol = "trojan" }) tls:depends({ type = "Xray", protocol = "vmess" }) tls:depends({ type = "Xray", protocol = "vless" }) tls:depends({ type = "Xray", protocol = "socks" }) tls:depends({ type = "Xray", protocol = "shadowsocks" }) tls:depends({ type = "Xray", protocol = "trojan" }) tls:depends("type", "Trojan") tls:depends("type", "Trojan-Plus") tls:depends("type", "Trojan-Go") xtls = s:option(Flag, "xtls", translate("XTLS")) xtls.default = 0 xtls:depends({ type = "Xray", protocol = "vless", tls = true }) xtls:depends({ type = "Xray", protocol = "trojan", tls = true }) flow = s:option(Value, "flow", translate("flow")) flow.default = "xtls-rprx-direct" flow:value("xtls-rprx-origin") flow:value("xtls-rprx-direct") flow:depends("xtls", true) alpn = s:option(ListValue, "alpn", translate("alpn")) alpn.default = "h2,http/1.1" alpn:value("h2,http/1.1") alpn:value("h2") alpn:value("http/1.1") alpn:depends({ type = "V2ray", tls = true }) alpn:depends({ type = "Xray", tls = true }) -- [[ TLS部分 ]] -- tls_certificateFile = s:option(FileUpload, "tls_certificateFile", translate("Public key absolute path"), translate("as:") .. "/etc/ssl/fullchain.pem") tls_certificateFile.validate = function(self, value, t) if value and value ~= "" then if not nixio.fs.access(value) then return nil, translate("Can't find this file!") else return value end end return nil end tls_certificateFile.default = "/etc/config/ssl/" .. arg[1] .. ".pem" tls_certificateFile:depends("tls", true) tls_certificateFile:depends("type", "Hysteria") tls_keyFile = s:option(FileUpload, "tls_keyFile", translate("Private key absolute path"), translate("as:") .. "/etc/ssl/private.key") tls_keyFile.validate = function(self, value, t) if value and value ~= "" then if not nixio.fs.access(value) then return nil, translate("Can't find this file!") else return value end end return nil end tls_keyFile.default = "/etc/config/ssl/" .. arg[1] .. ".key" tls_keyFile:depends("tls", true) tls_keyFile:depends("type", "Hysteria") tls_sessionTicket = s:option(Flag, "tls_sessionTicket", translate("Session Ticket")) tls_sessionTicket.default = "0" tls_sessionTicket:depends({ type = "Trojan", tls = true }) tls_sessionTicket:depends({ type = "Trojan-Plus", tls = true }) tls_sessionTicket:depends({ type = "Trojan-Go", tls = true }) transport = s:option(ListValue, "transport", translate("Transport")) transport:value("tcp", "TCP") transport:value("mkcp", "mKCP") transport:value("ws", "WebSocket") transport:value("h2", "HTTP/2") transport:value("ds", "DomainSocket") transport:value("quic", "QUIC") transport:value("grpc", "gRPC") transport:depends({ type = "V2ray", protocol = "vmess" }) transport:depends({ type = "V2ray", protocol = "vless" }) transport:depends({ type = "V2ray", protocol = "socks" }) transport:depends({ type = "V2ray", protocol = "shadowsocks" }) transport:depends({ type = "V2ray", protocol = "trojan" }) transport:depends({ type = "Xray", protocol = "vmess" }) transport:depends({ type = "Xray", protocol = "vless" }) transport:depends({ type = "Xray", protocol = "socks" }) transport:depends({ type = "Xray", protocol = "shadowsocks" }) transport:depends({ type = "Xray", protocol = "trojan" }) trojan_transport = s:option(ListValue, "trojan_transport", translate("Transport")) trojan_transport:value("original", translate("Original")) trojan_transport:value("ws", "WebSocket") trojan_transport.default = "original" trojan_transport:depends("type", "Trojan-Go") trojan_plugin = s:option(ListValue, "plugin_type", translate("Transport Plugin")) trojan_plugin:value("plaintext", "Plain Text") trojan_plugin:value("shadowsocks", "ShadowSocks") trojan_plugin:value("other", "Other") trojan_plugin.default = "plaintext" trojan_plugin:depends({ tls = false, trojan_transport = "original" }) trojan_plugin_cmd = s:option(Value, "plugin_cmd", translate("Plugin Binary")) trojan_plugin_cmd.placeholder = "eg: /usr/bin/v2ray-plugin" trojan_plugin_cmd:depends({ plugin_type = "shadowsocks" }) trojan_plugin_cmd:depends({ plugin_type = "other" }) trojan_plugin_op = s:option(Value, "plugin_option", translate("Plugin Option")) trojan_plugin_op.placeholder = "eg: obfs=http;obfs-host=www.baidu.com" trojan_plugin_op:depends({ plugin_type = "shadowsocks" }) trojan_plugin_op:depends({ plugin_type = "other" }) trojan_plugin_arg = s:option(DynamicList, "plugin_arg", translate("Plugin Option Args")) trojan_plugin_arg.placeholder = "eg: [\"-config\", \"test.json\"]" trojan_plugin_arg:depends({ plugin_type = "shadowsocks" }) trojan_plugin_arg:depends({ plugin_type = "other" }) -- [[ WebSocket部分 ]]-- ws_host = s:option(Value, "ws_host", translate("WebSocket Host")) ws_host:depends("transport", "ws") ws_host:depends("ss_transport", "ws") ws_host:depends("trojan_transport", "ws") ws_path = s:option(Value, "ws_path", translate("WebSocket Path")) ws_path:depends("transport", "ws") ws_path:depends("ss_transport", "ws") ws_path:depends("trojan_transport", "ws") ws_path:depends({ type = "Brook", brook_protocol = "wsserver" }) -- [[ HTTP/2部分 ]]-- h2_host = s:option(Value, "h2_host", translate("HTTP/2 Host")) h2_host:depends("transport", "h2") h2_host:depends("ss_transport", "h2") h2_host:depends("trojan_transport", "h2") h2_path = s:option(Value, "h2_path", translate("HTTP/2 Path")) h2_path:depends("transport", "h2") h2_path:depends("ss_transport", "h2") h2_path:depends("trojan_transport", "h2") -- [[ TCP部分 ]]-- -- TCP伪装 tcp_guise = s:option(ListValue, "tcp_guise", translate("Camouflage Type")) tcp_guise:value("none", "none") tcp_guise:value("http", "http") tcp_guise:depends("transport", "tcp") -- HTTP域名 tcp_guise_http_host = s:option(DynamicList, "tcp_guise_http_host", translate("HTTP Host")) tcp_guise_http_host:depends("tcp_guise", "http") -- HTTP路径 tcp_guise_http_path = s:option(DynamicList, "tcp_guise_http_path", translate("HTTP Path")) tcp_guise_http_path:depends("tcp_guise", "http") -- [[ mKCP部分 ]]-- mkcp_guise = s:option(ListValue, "mkcp_guise", translate("Camouflage Type"), translate('
none: default, no masquerade, data sent is packets with no characteristics.
srtp: disguised as an SRTP packet, it will be recognized as video call data (such as FaceTime).
utp: packets disguised as uTP will be recognized as bittorrent downloaded data.
wechat-video: packets disguised as WeChat video calls.
dtls: disguised as DTLS 1.2 packet.
wireguard: disguised as a WireGuard packet. (not really WireGuard protocol)')) for a, t in ipairs(header_type_list) do mkcp_guise:value(t) end mkcp_guise:depends("transport", "mkcp") mkcp_mtu = s:option(Value, "mkcp_mtu", translate("KCP MTU")) mkcp_mtu.default = "1350" mkcp_mtu:depends("transport", "mkcp") mkcp_tti = s:option(Value, "mkcp_tti", translate("KCP TTI")) mkcp_tti.default = "20" mkcp_tti:depends("transport", "mkcp") mkcp_uplinkCapacity = s:option(Value, "mkcp_uplinkCapacity", translate("KCP uplinkCapacity")) mkcp_uplinkCapacity.default = "5" mkcp_uplinkCapacity:depends("transport", "mkcp") mkcp_downlinkCapacity = s:option(Value, "mkcp_downlinkCapacity", translate("KCP downlinkCapacity")) mkcp_downlinkCapacity.default = "20" mkcp_downlinkCapacity:depends("transport", "mkcp") mkcp_congestion = s:option(Flag, "mkcp_congestion", translate("KCP Congestion")) mkcp_congestion:depends("transport", "mkcp") mkcp_readBufferSize = s:option(Value, "mkcp_readBufferSize", translate("KCP readBufferSize")) mkcp_readBufferSize.default = "1" mkcp_readBufferSize:depends("transport", "mkcp") mkcp_writeBufferSize = s:option(Value, "mkcp_writeBufferSize", translate("KCP writeBufferSize")) mkcp_writeBufferSize.default = "1" mkcp_writeBufferSize:depends("transport", "mkcp") mkcp_seed = s:option(Value, "mkcp_seed", translate("KCP Seed")) mkcp_seed:depends("transport", "mkcp") -- [[ DomainSocket部分 ]]-- ds_path = s:option(Value, "ds_path", "Path", translate("A legal file path. This file must not exist before running.")) ds_path:depends("transport", "ds") -- [[ QUIC部分 ]]-- quic_security = s:option(ListValue, "quic_security", translate("Encrypt Method")) quic_security:value("none") quic_security:value("aes-128-gcm") quic_security:value("chacha20-poly1305") quic_security:depends("transport", "quic") quic_key = s:option(Value, "quic_key", translate("Encrypt Method") .. translate("Key")) quic_key:depends("transport", "quic") quic_guise = s:option(ListValue, "quic_guise", translate("Camouflage Type")) for a, t in ipairs(header_type_list) do quic_guise:value(t) end quic_guise:depends("transport", "quic") -- [[ gRPC部分 ]]-- grpc_serviceName = s:option(Value, "grpc_serviceName", "ServiceName") grpc_serviceName:depends("transport", "grpc") acceptProxyProtocol = s:option(Flag, "acceptProxyProtocol", translate("acceptProxyProtocol"), translate("Whether to receive PROXY protocol, when this node want to be fallback or forwarded by proxy, it must be enable, otherwise it cannot be used.")) acceptProxyProtocol:depends({ type = "V2ray", transport = "tcp" }) acceptProxyProtocol:depends({ type = "V2ray", transport = "ws" }) acceptProxyProtocol:depends({ type = "Xray", transport = "tcp" }) acceptProxyProtocol:depends({ type = "Xray", transport = "ws" }) -- [[ Fallback部分 ]]-- fallback = s:option(Flag, "fallback", translate("Fallback")) fallback:depends({ type = "V2ray", protocol = "vless", transport = "tcp" }) fallback:depends({ type = "V2ray", protocol = "trojan", transport = "tcp" }) fallback:depends({ type = "Xray", protocol = "vless", transport = "tcp" }) fallback:depends({ type = "Xray", protocol = "trojan", transport = "tcp" }) --[[ fallback_alpn = s:option(Value, "fallback_alpn", "Fallback alpn") fallback_alpn:depends("fallback", true) fallback_path = s:option(Value, "fallback_path", "Fallback path") fallback_path:depends("fallback", true) fallback_dest = s:option(Value, "fallback_dest", "Fallback dest") fallback_dest:depends("fallback", true) fallback_xver = s:option(Value, "fallback_xver", "Fallback xver") fallback_xver.default = 0 fallback_xver:depends("fallback", true) ]]-- fallback_list = s:option(DynamicList, "fallback_list", "Fallback", translate("dest,path")) fallback_list:depends("fallback", true) ss_aead = s:option(Flag, "ss_aead", translate("Shadowsocks secondary encryption")) ss_aead:depends("type", "Trojan-Go") ss_aead.default = "0" ss_aead_method = s:option(ListValue, "ss_aead_method", translate("Encrypt Method")) for _, v in ipairs(encrypt_methods_ss_aead) do ss_aead_method:value(v, v) end ss_aead_method.default = "aes-128-gcm" ss_aead_method:depends("ss_aead", true) ss_aead_pwd = s:option(Value, "ss_aead_pwd", translate("Password")) ss_aead_pwd.password = true ss_aead_pwd:depends("ss_aead", true) tcp_fast_open = s:option(Flag, "tcp_fast_open", translate("TCP Fast Open")) tcp_fast_open.default = "0" tcp_fast_open:depends("type", "SS") tcp_fast_open:depends("type", "SSR") tcp_fast_open:depends("type", "Trojan") tcp_fast_open:depends("type", "Trojan-Plus") tcp_fast_open:depends("type", "Trojan-Go") remote_enable = s:option(Flag, "remote_enable", translate("Enable Remote"), translate("You can forward to Nginx/Caddy/V2ray/Xray WebSocket and more.")) remote_enable.default = "1" remote_enable.rmempty = false remote_enable:depends("type", "Trojan") remote_enable:depends("type", "Trojan-Plus") remote_enable:depends("type", "Trojan-Go") remote_address = s:option(Value, "remote_address", translate("Remote Address")) remote_address.default = "127.0.0.1" remote_address:depends("remote_enable", 1) remote_port = s:option(Value, "remote_port", translate("Remote Port")) remote_port.datatype = "port" remote_port.default = "80" remote_port:depends("remote_enable", 1) bind_local = s:option(Flag, "bind_local", translate("Bind Local"), translate("When selected, it can only be accessed locally, It is recommended to turn on when using reverse proxies or be fallback.")) bind_local.default = "0" bind_local:depends("type", "V2ray") bind_local:depends("type", "Xray") accept_lan = s:option(Flag, "accept_lan", translate("Accept LAN Access"), translate("When selected, it can accessed lan , this will not be safe!")) accept_lan.default = "0" accept_lan:depends({ type = "V2ray", protocol = "vmess" }) accept_lan:depends({ type = "V2ray", protocol = "vless" }) accept_lan:depends({ type = "V2ray", protocol = "http" }) accept_lan:depends({ type = "V2ray", protocol = "socks" }) accept_lan:depends({ type = "V2ray", protocol = "shadowsocks" }) accept_lan:depends({ type = "V2ray", protocol = "trojan" }) accept_lan:depends({ type = "Xray", protocol = "vmess" }) accept_lan:depends({ type = "Xray", protocol = "vless" }) accept_lan:depends({ type = "Xray", protocol = "http" }) accept_lan:depends({ type = "Xray", protocol = "socks" }) accept_lan:depends({ type = "Xray", protocol = "shadowsocks" }) accept_lan:depends({ type = "Xray", protocol = "trojan" }) local nodes_table = {} for k, e in ipairs(api.get_valid_nodes()) do if e.node_type == "normal" and (e.type == "V2ray" or e.type == "Xray") then nodes_table[#nodes_table + 1] = { id = e[".name"], remarks = e["remark"] } end end transit_node = s:option(ListValue, "transit_node", translate("transit node")) transit_node:value("nil", translate("Close")) transit_node:value("_socks", translate("Custom Socks")) transit_node:value("_http", translate("Custom HTTP")) for k, v in pairs(nodes_table) do transit_node:value(v.id, v.remarks) end transit_node.default = "nil" transit_node:depends("type", "V2ray") transit_node:depends("type", "Xray") transit_node_address = s:option(Value, "transit_node_address", translate("Address (Support Domain Name)")) transit_node_address:depends("transit_node", "_socks") transit_node_address:depends("transit_node", "_http") transit_node_port = s:option(Value, "transit_node_port", translate("Port")) transit_node_port.datatype = "port" transit_node_port:depends("transit_node", "_socks") transit_node_port:depends("transit_node", "_http") transit_node_username = s:option(Value, "transit_node_username", translate("Username")) transit_node_username:depends("transit_node", "_socks") transit_node_username:depends("transit_node", "_http") transit_node_password = s:option(Value, "transit_node_password", translate("Password")) transit_node_password.password = true transit_node_password:depends("transit_node", "_socks") transit_node_password:depends("transit_node", "_http") log = s:option(Flag, "log", translate("Log")) log.default = "1" log.rmempty = false loglevel = s:option(ListValue, "loglevel", translate("Log Level")) loglevel.default = "warning" loglevel:value("debug") loglevel:value("info") loglevel:value("warning") loglevel:value("error") loglevel:depends({ type = "V2ray", log = true }) loglevel:depends({ type = "Xray", log = true }) trojan_loglevel = s:option(ListValue, "trojan_loglevel", translate("Log Level")) trojan_loglevel.default = "2" trojan_loglevel:value("0", "all") trojan_loglevel:value("1", "info") trojan_loglevel:value("2", "warn") trojan_loglevel:value("3", "error") trojan_loglevel:value("4", "fatal") function trojan_loglevel.cfgvalue(self, section) return m:get(section, "loglevel") end function trojan_loglevel.write(self, section, value) m:set(section, "loglevel", value) end trojan_loglevel:depends({ type = "Trojan", log = true }) trojan_loglevel:depends({ type = "Trojan-Plus", log = true }) trojan_loglevel:depends({ type = "Trojan-Go", log = true }) return m