Files
MWClash/lib/models/generated/clash_config.g.dart
chen08209 cdfb688e62 Add sqlite store
Optimize android quick action

Optimize backup and restore

Optimize more details
2026-01-25 15:56:22 +08:00

444 lines
15 KiB
Dart

// GENERATED CODE - DO NOT MODIFY BY HAND
part of '../clash_config.dart';
// **************************************************************************
// JsonSerializableGenerator
// **************************************************************************
_ProxyGroup _$ProxyGroupFromJson(Map<String, dynamic> json) => _ProxyGroup(
name: json['name'] as String,
type: GroupType.parseProfileType(json['type'] as String),
proxies: (json['proxies'] as List<dynamic>?)
?.map((e) => e as String)
.toList(),
use: (json['use'] as List<dynamic>?)?.map((e) => e as String).toList(),
interval: (json['interval'] as num?)?.toInt(),
lazy: json['lazy'] as bool?,
url: json['url'] as String?,
timeout: (json['timeout'] as num?)?.toInt(),
maxFailedTimes: (json['max-failed-times'] as num?)?.toInt(),
filter: json['filter'] as String?,
excludeFilter: json['expected-filter'] as String?,
excludeType: json['exclude-type'] as String?,
expectedStatus: json['expected-status'],
hidden: json['hidden'] as bool?,
icon: json['icon'] as String?,
);
Map<String, dynamic> _$ProxyGroupToJson(_ProxyGroup instance) =>
<String, dynamic>{
'name': instance.name,
'type': _$GroupTypeEnumMap[instance.type]!,
'proxies': instance.proxies,
'use': instance.use,
'interval': instance.interval,
'lazy': instance.lazy,
'url': instance.url,
'timeout': instance.timeout,
'max-failed-times': instance.maxFailedTimes,
'filter': instance.filter,
'expected-filter': instance.excludeFilter,
'exclude-type': instance.excludeType,
'expected-status': instance.expectedStatus,
'hidden': instance.hidden,
'icon': instance.icon,
};
const _$GroupTypeEnumMap = {
GroupType.Selector: 'Selector',
GroupType.URLTest: 'URLTest',
GroupType.Fallback: 'Fallback',
GroupType.LoadBalance: 'LoadBalance',
GroupType.Relay: 'Relay',
};
_RuleProvider _$RuleProviderFromJson(Map<String, dynamic> json) =>
_RuleProvider(name: json['name'] as String);
Map<String, dynamic> _$RuleProviderToJson(_RuleProvider instance) =>
<String, dynamic>{'name': instance.name};
_Sniffer _$SnifferFromJson(Map<String, dynamic> json) => _Sniffer(
enable: json['enable'] as bool? ?? false,
overrideDest: json['override-destination'] as bool? ?? true,
sniffing:
(json['sniffing'] as List<dynamic>?)?.map((e) => e as String).toList() ??
const [],
forceDomain:
(json['force-domain'] as List<dynamic>?)
?.map((e) => e as String)
.toList() ??
const [],
skipSrcAddress:
(json['skip-src-address'] as List<dynamic>?)
?.map((e) => e as String)
.toList() ??
const [],
skipDstAddress:
(json['skip-dst-address'] as List<dynamic>?)
?.map((e) => e as String)
.toList() ??
const [],
skipDomain:
(json['skip-domain'] as List<dynamic>?)
?.map((e) => e as String)
.toList() ??
const [],
port:
(json['port-whitelist'] as List<dynamic>?)
?.map((e) => e as String)
.toList() ??
const [],
forceDnsMapping: json['force-dns-mapping'] as bool? ?? true,
parsePureIp: json['parse-pure-ip'] as bool? ?? true,
sniff:
(json['sniff'] as Map<String, dynamic>?)?.map(
(k, e) =>
MapEntry(k, SnifferConfig.fromJson(e as Map<String, dynamic>)),
) ??
const {},
);
Map<String, dynamic> _$SnifferToJson(_Sniffer instance) => <String, dynamic>{
'enable': instance.enable,
'override-destination': instance.overrideDest,
'sniffing': instance.sniffing,
'force-domain': instance.forceDomain,
'skip-src-address': instance.skipSrcAddress,
'skip-dst-address': instance.skipDstAddress,
'skip-domain': instance.skipDomain,
'port-whitelist': instance.port,
'force-dns-mapping': instance.forceDnsMapping,
'parse-pure-ip': instance.parsePureIp,
'sniff': instance.sniff,
};
_SnifferConfig _$SnifferConfigFromJson(Map<String, dynamic> json) =>
_SnifferConfig(
ports: json['ports'] == null
? const []
: _formJsonPorts(json['ports'] as List?),
overrideDest: json['override-destination'] as bool?,
);
Map<String, dynamic> _$SnifferConfigToJson(_SnifferConfig instance) =>
<String, dynamic>{
'ports': instance.ports,
'override-destination': instance.overrideDest,
};
_Tun _$TunFromJson(Map<String, dynamic> json) => _Tun(
enable: json['enable'] as bool? ?? false,
device: json['device'] as String? ?? appName,
autoRoute: json['auto-route'] as bool? ?? false,
stack:
$enumDecodeNullable(_$TunStackEnumMap, json['stack']) ?? TunStack.mixed,
dnsHijack:
(json['dns-hijack'] as List<dynamic>?)
?.map((e) => e as String)
.toList() ??
const ['any:53'],
routeAddress:
(json['route-address'] as List<dynamic>?)
?.map((e) => e as String)
.toList() ??
const [],
);
Map<String, dynamic> _$TunToJson(_Tun instance) => <String, dynamic>{
'enable': instance.enable,
'device': instance.device,
'auto-route': instance.autoRoute,
'stack': _$TunStackEnumMap[instance.stack]!,
'dns-hijack': instance.dnsHijack,
'route-address': instance.routeAddress,
};
const _$TunStackEnumMap = {
TunStack.gvisor: 'gvisor',
TunStack.system: 'system',
TunStack.mixed: 'mixed',
};
_FallbackFilter _$FallbackFilterFromJson(
Map<String, dynamic> json,
) => _FallbackFilter(
geoip: json['geoip'] as bool? ?? true,
geoipCode: json['geoip-code'] as String? ?? 'CN',
geosite:
(json['geosite'] as List<dynamic>?)?.map((e) => e as String).toList() ??
const ['gfw'],
ipcidr:
(json['ipcidr'] as List<dynamic>?)?.map((e) => e as String).toList() ??
const ['240.0.0.0/4'],
domain:
(json['domain'] as List<dynamic>?)?.map((e) => e as String).toList() ??
const ['+.google.com', '+.facebook.com', '+.youtube.com'],
);
Map<String, dynamic> _$FallbackFilterToJson(_FallbackFilter instance) =>
<String, dynamic>{
'geoip': instance.geoip,
'geoip-code': instance.geoipCode,
'geosite': instance.geosite,
'ipcidr': instance.ipcidr,
'domain': instance.domain,
};
_Dns _$DnsFromJson(Map<String, dynamic> json) => _Dns(
enable: json['enable'] as bool? ?? true,
listen: json['listen'] as String? ?? '0.0.0.0:1053',
preferH3: json['prefer-h3'] as bool? ?? false,
useHosts: json['use-hosts'] as bool? ?? true,
useSystemHosts: json['use-system-hosts'] as bool? ?? true,
respectRules: json['respect-rules'] as bool? ?? false,
ipv6: json['ipv6'] as bool? ?? false,
defaultNameserver:
(json['default-nameserver'] as List<dynamic>?)
?.map((e) => e as String)
.toList() ??
const ['223.5.5.5'],
enhancedMode:
$enumDecodeNullable(_$DnsModeEnumMap, json['enhanced-mode']) ??
DnsMode.fakeIp,
fakeIpRange: json['fake-ip-range'] as String? ?? '198.18.0.1/16',
fakeIpFilter:
(json['fake-ip-filter'] as List<dynamic>?)
?.map((e) => e as String)
.toList() ??
const ['*.lan', 'localhost.ptlogin2.qq.com'],
nameserverPolicy:
(json['nameserver-policy'] as Map<String, dynamic>?)?.map(
(k, e) => MapEntry(k, e as String),
) ??
const {
'www.baidu.com': '114.114.114.114',
'+.internal.crop.com': '10.0.0.1',
'geosite:cn': 'https://doh.pub/dns-query',
},
nameserver:
(json['nameserver'] as List<dynamic>?)
?.map((e) => e as String)
.toList() ??
const ['https://doh.pub/dns-query', 'https://dns.alidns.com/dns-query'],
fallback:
(json['fallback'] as List<dynamic>?)?.map((e) => e as String).toList() ??
const ['tls://8.8.4.4', 'tls://1.1.1.1'],
proxyServerNameserver:
(json['proxy-server-nameserver'] as List<dynamic>?)
?.map((e) => e as String)
.toList() ??
const ['https://doh.pub/dns-query'],
fallbackFilter: json['fallback-filter'] == null
? const FallbackFilter()
: FallbackFilter.fromJson(
json['fallback-filter'] as Map<String, dynamic>,
),
);
Map<String, dynamic> _$DnsToJson(_Dns instance) => <String, dynamic>{
'enable': instance.enable,
'listen': instance.listen,
'prefer-h3': instance.preferH3,
'use-hosts': instance.useHosts,
'use-system-hosts': instance.useSystemHosts,
'respect-rules': instance.respectRules,
'ipv6': instance.ipv6,
'default-nameserver': instance.defaultNameserver,
'enhanced-mode': _$DnsModeEnumMap[instance.enhancedMode]!,
'fake-ip-range': instance.fakeIpRange,
'fake-ip-filter': instance.fakeIpFilter,
'nameserver-policy': instance.nameserverPolicy,
'nameserver': instance.nameserver,
'fallback': instance.fallback,
'proxy-server-nameserver': instance.proxyServerNameserver,
'fallback-filter': instance.fallbackFilter,
};
const _$DnsModeEnumMap = {
DnsMode.normal: 'normal',
DnsMode.fakeIp: 'fake-ip',
DnsMode.redirHost: 'redir-host',
DnsMode.hosts: 'hosts',
};
_GeoXUrl _$GeoXUrlFromJson(Map<String, dynamic> json) => _GeoXUrl(
mmdb:
json['mmdb'] as String? ??
'https://github.com/MetaCubeX/meta-rules-dat/releases/download/latest/geoip.metadb',
asn:
json['asn'] as String? ??
'https://github.com/MetaCubeX/meta-rules-dat/releases/download/latest/GeoLite2-ASN.mmdb',
geoip:
json['geoip'] as String? ??
'https://github.com/MetaCubeX/meta-rules-dat/releases/download/latest/geoip.dat',
geosite:
json['geosite'] as String? ??
'https://github.com/MetaCubeX/meta-rules-dat/releases/download/latest/geosite.dat',
);
Map<String, dynamic> _$GeoXUrlToJson(_GeoXUrl instance) => <String, dynamic>{
'mmdb': instance.mmdb,
'asn': instance.asn,
'geoip': instance.geoip,
'geosite': instance.geosite,
};
_Rule _$RuleFromJson(Map<String, dynamic> json) => _Rule(
id: (json['id'] as num).toInt(),
value: json['value'] as String,
order: json['order'] as String?,
);
Map<String, dynamic> _$RuleToJson(_Rule instance) => <String, dynamic>{
'id': instance.id,
'value': instance.value,
'order': instance.order,
};
_SubRule _$SubRuleFromJson(Map<String, dynamic> json) =>
_SubRule(name: json['name'] as String);
Map<String, dynamic> _$SubRuleToJson(_SubRule instance) => <String, dynamic>{
'name': instance.name,
};
_ClashConfigSnippet _$ClashConfigSnippetFromJson(Map<String, dynamic> json) =>
_ClashConfigSnippet(
proxyGroups:
(json['proxy-groups'] as List<dynamic>?)
?.map((e) => ProxyGroup.fromJson(e as Map<String, dynamic>))
.toList() ??
const [],
rule: json['rules'] == null ? const [] : _genRule(json['rules'] as List?),
ruleProvider: json['rule-providers'] == null
? const []
: _genRuleProviders(json['rule-providers'] as Map<String, dynamic>),
subRules: json['sub-rules'] == null
? const []
: _genSubRules(json['sub-rules'] as Map<String, dynamic>),
);
Map<String, dynamic> _$ClashConfigSnippetToJson(_ClashConfigSnippet instance) =>
<String, dynamic>{
'proxy-groups': instance.proxyGroups,
'rules': instance.rule,
'rule-providers': instance.ruleProvider,
'sub-rules': instance.subRules,
};
_ClashConfig _$ClashConfigFromJson(Map<String, dynamic> json) => _ClashConfig(
mixedPort: (json['mixed-port'] as num?)?.toInt() ?? defaultMixedPort,
socksPort: (json['socks-port'] as num?)?.toInt() ?? 0,
port: (json['port'] as num?)?.toInt() ?? 0,
redirPort: (json['redir-port'] as num?)?.toInt() ?? 0,
tproxyPort: (json['tproxy-port'] as num?)?.toInt() ?? 0,
mode: $enumDecodeNullable(_$ModeEnumMap, json['mode']) ?? Mode.rule,
allowLan: json['allow-lan'] as bool? ?? false,
logLevel:
$enumDecodeNullable(_$LogLevelEnumMap, json['log-level']) ??
LogLevel.error,
ipv6: json['ipv6'] as bool? ?? false,
findProcessMode:
$enumDecodeNullable(
_$FindProcessModeEnumMap,
json['find-process-mode'],
unknownValue: FindProcessMode.always,
) ??
FindProcessMode.always,
keepAliveInterval:
(json['keep-alive-interval'] as num?)?.toInt() ??
defaultKeepAliveInterval,
unifiedDelay: json['unified-delay'] as bool? ?? true,
tcpConcurrent: json['tcp-concurrent'] as bool? ?? true,
tun: json['tun'] == null
? defaultTun
: Tun.safeFormJson(json['tun'] as Map<String, Object?>?),
dns: json['dns'] == null
? defaultDns
: Dns.safeDnsFromJson(json['dns'] as Map<String, Object?>),
geoXUrl: json['geox-url'] == null
? defaultGeoXUrl
: GeoXUrl.safeFormJson(json['geox-url'] as Map<String, Object?>?),
geodataLoader:
$enumDecodeNullable(_$GeodataLoaderEnumMap, json['geodata-loader']) ??
GeodataLoader.memconservative,
proxyGroups:
(json['proxy-groups'] as List<dynamic>?)
?.map((e) => ProxyGroup.fromJson(e as Map<String, dynamic>))
.toList() ??
const [],
rule:
(json['rule'] as List<dynamic>?)?.map((e) => e as String).toList() ??
const [],
globalUa: json['global-ua'] as String?,
externalController:
$enumDecodeNullable(
_$ExternalControllerStatusEnumMap,
json['external-controller'],
) ??
ExternalControllerStatus.close,
hosts:
(json['hosts'] as Map<String, dynamic>?)?.map(
(k, e) => MapEntry(k, e as String),
) ??
const {},
);
Map<String, dynamic> _$ClashConfigToJson(_ClashConfig instance) =>
<String, dynamic>{
'mixed-port': instance.mixedPort,
'socks-port': instance.socksPort,
'port': instance.port,
'redir-port': instance.redirPort,
'tproxy-port': instance.tproxyPort,
'mode': _$ModeEnumMap[instance.mode]!,
'allow-lan': instance.allowLan,
'log-level': _$LogLevelEnumMap[instance.logLevel]!,
'ipv6': instance.ipv6,
'find-process-mode': _$FindProcessModeEnumMap[instance.findProcessMode]!,
'keep-alive-interval': instance.keepAliveInterval,
'unified-delay': instance.unifiedDelay,
'tcp-concurrent': instance.tcpConcurrent,
'tun': instance.tun,
'dns': instance.dns,
'geox-url': instance.geoXUrl,
'geodata-loader': _$GeodataLoaderEnumMap[instance.geodataLoader]!,
'proxy-groups': instance.proxyGroups,
'rule': instance.rule,
'global-ua': instance.globalUa,
'external-controller':
_$ExternalControllerStatusEnumMap[instance.externalController]!,
'hosts': instance.hosts,
};
const _$ModeEnumMap = {
Mode.rule: 'rule',
Mode.global: 'global',
Mode.direct: 'direct',
};
const _$LogLevelEnumMap = {
LogLevel.debug: 'debug',
LogLevel.info: 'info',
LogLevel.warning: 'warning',
LogLevel.error: 'error',
LogLevel.silent: 'silent',
};
const _$FindProcessModeEnumMap = {
FindProcessMode.always: 'always',
FindProcessMode.off: 'off',
};
const _$GeodataLoaderEnumMap = {
GeodataLoader.standard: 'standard',
GeodataLoader.memconservative: 'memconservative',
};
const _$ExternalControllerStatusEnumMap = {
ExternalControllerStatus.close: '',
ExternalControllerStatus.open: '127.0.0.1:9090',
};