mirror of
https://github.com/MetaCubeX/mihomo.git
synced 2024-11-16 11:42:43 +08:00
495 lines
12 KiB
Go
495 lines
12 KiB
Go
package convert
|
|
|
|
import (
|
|
"bytes"
|
|
"encoding/base64"
|
|
"encoding/json"
|
|
"fmt"
|
|
"net/url"
|
|
"strconv"
|
|
"strings"
|
|
|
|
"github.com/metacubex/mihomo/log"
|
|
)
|
|
|
|
// ConvertsV2Ray convert V2Ray subscribe proxies data to mihomo proxies config
|
|
func ConvertsV2Ray(buf []byte) ([]map[string]any, error) {
|
|
data := DecodeBase64(buf)
|
|
|
|
arr := strings.Split(string(data), "\n")
|
|
|
|
proxies := make([]map[string]any, 0, len(arr))
|
|
names := make(map[string]int, 200)
|
|
|
|
for _, line := range arr {
|
|
line = strings.TrimRight(line, " \r")
|
|
if line == "" {
|
|
continue
|
|
}
|
|
|
|
scheme, body, found := strings.Cut(line, "://")
|
|
if !found {
|
|
continue
|
|
}
|
|
|
|
scheme = strings.ToLower(scheme)
|
|
switch scheme {
|
|
case "hysteria":
|
|
urlHysteria, err := url.Parse(line)
|
|
if err != nil {
|
|
continue
|
|
}
|
|
|
|
query := urlHysteria.Query()
|
|
name := uniqueName(names, urlHysteria.Fragment)
|
|
hysteria := make(map[string]any, 20)
|
|
|
|
hysteria["name"] = name
|
|
hysteria["type"] = scheme
|
|
hysteria["server"] = urlHysteria.Hostname()
|
|
hysteria["port"] = urlHysteria.Port()
|
|
hysteria["sni"] = query.Get("peer")
|
|
hysteria["obfs"] = query.Get("obfs")
|
|
if alpn := query.Get("alpn"); alpn != "" {
|
|
hysteria["alpn"] = strings.Split(alpn, ",")
|
|
}
|
|
hysteria["auth_str"] = query.Get("auth")
|
|
hysteria["protocol"] = query.Get("protocol")
|
|
up := query.Get("up")
|
|
down := query.Get("down")
|
|
if up == "" {
|
|
up = query.Get("upmbps")
|
|
}
|
|
if down == "" {
|
|
down = query.Get("downmbps")
|
|
}
|
|
hysteria["down"] = down
|
|
hysteria["up"] = up
|
|
hysteria["skip-cert-verify"], _ = strconv.ParseBool(query.Get("insecure"))
|
|
|
|
proxies = append(proxies, hysteria)
|
|
case "hysteria2":
|
|
urlHysteria2, err := url.Parse(line)
|
|
if err != nil {
|
|
continue
|
|
}
|
|
|
|
query := urlHysteria2.Query()
|
|
name := uniqueName(names, urlHysteria2.Fragment)
|
|
hysteria2 := make(map[string]any, 20)
|
|
|
|
hysteria2["name"] = name
|
|
hysteria2["type"] = scheme
|
|
hysteria2["server"] = urlHysteria2.Hostname()
|
|
if port := urlHysteria2.Port(); port != "" {
|
|
hysteria2["port"] = port
|
|
} else {
|
|
hysteria2["port"] = "443"
|
|
}
|
|
hysteria2["obfs"] = query.Get("obfs")
|
|
hysteria2["obfs-password"] = query.Get("obfs-password")
|
|
hysteria2["sni"] = query.Get("sni")
|
|
hysteria2["skip-cert-verify"], _ = strconv.ParseBool(query.Get("insecure"))
|
|
if alpn := query.Get("alpn"); alpn != "" {
|
|
hysteria2["alpn"] = strings.Split(alpn, ",")
|
|
}
|
|
if auth := urlHysteria2.User.String(); auth != "" {
|
|
hysteria2["password"] = auth
|
|
}
|
|
hysteria2["fingerprint"] = query.Get("pinSHA256")
|
|
hysteria2["down"] = query.Get("down")
|
|
hysteria2["up"] = query.Get("up")
|
|
|
|
proxies = append(proxies, hysteria2)
|
|
case "tuic":
|
|
// A temporary unofficial TUIC share link standard
|
|
// Modified from https://github.com/daeuniverse/dae/discussions/182
|
|
// Changes:
|
|
// 1. Support TUICv4, just replace uuid:password with token
|
|
// 2. Remove `allow_insecure` field
|
|
urlTUIC, err := url.Parse(line)
|
|
if err != nil {
|
|
continue
|
|
}
|
|
query := urlTUIC.Query()
|
|
|
|
tuic := make(map[string]any, 20)
|
|
tuic["name"] = uniqueName(names, urlTUIC.Fragment)
|
|
tuic["type"] = scheme
|
|
tuic["server"] = urlTUIC.Hostname()
|
|
tuic["port"] = urlTUIC.Port()
|
|
tuic["udp"] = true
|
|
password, v5 := urlTUIC.User.Password()
|
|
if v5 {
|
|
tuic["uuid"] = urlTUIC.User.Username()
|
|
tuic["password"] = password
|
|
} else {
|
|
tuic["token"] = urlTUIC.User.Username()
|
|
}
|
|
if cc := query.Get("congestion_control"); cc != "" {
|
|
tuic["congestion-controller"] = cc
|
|
}
|
|
if alpn := query.Get("alpn"); alpn != "" {
|
|
tuic["alpn"] = strings.Split(alpn, ",")
|
|
}
|
|
if sni := query.Get("sni"); sni != "" {
|
|
tuic["sni"] = sni
|
|
}
|
|
if query.Get("disable_sni") == "1" {
|
|
tuic["disable-sni"] = true
|
|
}
|
|
if udpRelayMode := query.Get("udp_relay_mode"); udpRelayMode != "" {
|
|
tuic["udp-relay-mode"] = udpRelayMode
|
|
}
|
|
|
|
case "trojan":
|
|
urlTrojan, err := url.Parse(line)
|
|
if err != nil {
|
|
continue
|
|
}
|
|
|
|
query := urlTrojan.Query()
|
|
|
|
name := uniqueName(names, urlTrojan.Fragment)
|
|
trojan := make(map[string]any, 20)
|
|
|
|
trojan["name"] = name
|
|
trojan["type"] = scheme
|
|
trojan["server"] = urlTrojan.Hostname()
|
|
trojan["port"] = urlTrojan.Port()
|
|
trojan["password"] = urlTrojan.User.Username()
|
|
trojan["udp"] = true
|
|
trojan["skip-cert-verify"], _ = strconv.ParseBool(query.Get("allowInsecure"))
|
|
|
|
if sni := query.Get("sni"); sni != "" {
|
|
trojan["sni"] = sni
|
|
}
|
|
if alpn := query.Get("alpn"); alpn != "" {
|
|
trojan["alpn"] = strings.Split(alpn, ",")
|
|
}
|
|
|
|
network := strings.ToLower(query.Get("type"))
|
|
if network != "" {
|
|
trojan["network"] = network
|
|
}
|
|
|
|
switch network {
|
|
case "ws":
|
|
headers := make(map[string]any)
|
|
wsOpts := make(map[string]any)
|
|
|
|
headers["User-Agent"] = RandUserAgent()
|
|
|
|
wsOpts["path"] = query.Get("path")
|
|
wsOpts["headers"] = headers
|
|
|
|
trojan["ws-opts"] = wsOpts
|
|
|
|
case "grpc":
|
|
grpcOpts := make(map[string]any)
|
|
grpcOpts["grpc-service-name"] = query.Get("serviceName")
|
|
trojan["grpc-opts"] = grpcOpts
|
|
}
|
|
|
|
if fingerprint := query.Get("fp"); fingerprint == "" {
|
|
trojan["client-fingerprint"] = "chrome"
|
|
} else {
|
|
trojan["client-fingerprint"] = fingerprint
|
|
}
|
|
|
|
proxies = append(proxies, trojan)
|
|
|
|
case "vless":
|
|
urlVLess, err := url.Parse(line)
|
|
if err != nil {
|
|
continue
|
|
}
|
|
query := urlVLess.Query()
|
|
vless := make(map[string]any, 20)
|
|
err = handleVShareLink(names, urlVLess, scheme, vless)
|
|
if err != nil {
|
|
log.Warnln("error:%s line:%s", err.Error(), line)
|
|
continue
|
|
}
|
|
if flow := query.Get("flow"); flow != "" {
|
|
vless["flow"] = strings.ToLower(flow)
|
|
}
|
|
proxies = append(proxies, vless)
|
|
|
|
case "vmess":
|
|
// V2RayN-styled share link
|
|
// https://github.com/2dust/v2rayN/wiki/%E5%88%86%E4%BA%AB%E9%93%BE%E6%8E%A5%E6%A0%BC%E5%BC%8F%E8%AF%B4%E6%98%8E(ver-2)
|
|
dcBuf, err := tryDecodeBase64([]byte(body))
|
|
if err != nil {
|
|
// Xray VMessAEAD share link
|
|
urlVMess, err := url.Parse(line)
|
|
if err != nil {
|
|
continue
|
|
}
|
|
query := urlVMess.Query()
|
|
vmess := make(map[string]any, 20)
|
|
err = handleVShareLink(names, urlVMess, scheme, vmess)
|
|
if err != nil {
|
|
log.Warnln("error:%s line:%s", err.Error(), line)
|
|
continue
|
|
}
|
|
vmess["alterId"] = 0
|
|
vmess["cipher"] = "auto"
|
|
if encryption := query.Get("encryption"); encryption != "" {
|
|
vmess["cipher"] = encryption
|
|
}
|
|
proxies = append(proxies, vmess)
|
|
continue
|
|
}
|
|
|
|
jsonDc := json.NewDecoder(bytes.NewReader(dcBuf))
|
|
values := make(map[string]any, 20)
|
|
|
|
if jsonDc.Decode(&values) != nil {
|
|
continue
|
|
}
|
|
tempName, ok := values["ps"].(string)
|
|
if !ok {
|
|
continue
|
|
}
|
|
name := uniqueName(names, tempName)
|
|
vmess := make(map[string]any, 20)
|
|
|
|
vmess["name"] = name
|
|
vmess["type"] = scheme
|
|
vmess["server"] = values["add"]
|
|
vmess["port"] = values["port"]
|
|
vmess["uuid"] = values["id"]
|
|
if alterId, ok := values["aid"]; ok {
|
|
vmess["alterId"] = alterId
|
|
} else {
|
|
vmess["alterId"] = 0
|
|
}
|
|
vmess["udp"] = true
|
|
vmess["xudp"] = true
|
|
vmess["tls"] = false
|
|
vmess["skip-cert-verify"] = false
|
|
|
|
vmess["cipher"] = "auto"
|
|
if cipher, ok := values["scy"]; ok && cipher != "" {
|
|
vmess["cipher"] = cipher
|
|
}
|
|
|
|
if sni, ok := values["sni"]; ok && sni != "" {
|
|
vmess["servername"] = sni
|
|
}
|
|
|
|
network, _ := values["net"].(string)
|
|
network = strings.ToLower(network)
|
|
if values["type"] == "http" {
|
|
network = "http"
|
|
} else if network == "http" {
|
|
network = "h2"
|
|
}
|
|
vmess["network"] = network
|
|
|
|
tls, ok := values["tls"].(string)
|
|
if ok {
|
|
tls = strings.ToLower(tls)
|
|
if strings.HasSuffix(tls, "tls") {
|
|
vmess["tls"] = true
|
|
}
|
|
if alpn, ok := values["alpn"].(string); ok {
|
|
vmess["alpn"] = strings.Split(alpn, ",")
|
|
}
|
|
}
|
|
|
|
switch network {
|
|
case "http":
|
|
headers := make(map[string]any)
|
|
httpOpts := make(map[string]any)
|
|
if host, ok := values["host"]; ok && host != "" {
|
|
headers["Host"] = []string{host.(string)}
|
|
}
|
|
httpOpts["path"] = []string{"/"}
|
|
if path, ok := values["path"]; ok && path != "" {
|
|
httpOpts["path"] = []string{path.(string)}
|
|
}
|
|
httpOpts["headers"] = headers
|
|
|
|
vmess["http-opts"] = httpOpts
|
|
|
|
case "h2":
|
|
headers := make(map[string]any)
|
|
h2Opts := make(map[string]any)
|
|
if host, ok := values["host"]; ok && host != "" {
|
|
headers["Host"] = []string{host.(string)}
|
|
}
|
|
|
|
h2Opts["path"] = values["path"]
|
|
h2Opts["headers"] = headers
|
|
|
|
vmess["h2-opts"] = h2Opts
|
|
|
|
case "ws":
|
|
headers := make(map[string]any)
|
|
wsOpts := make(map[string]any)
|
|
wsOpts["path"] = []string{"/"}
|
|
if host, ok := values["host"]; ok && host != "" {
|
|
headers["Host"] = host.(string)
|
|
}
|
|
if path, ok := values["path"]; ok && path != "" {
|
|
wsOpts["path"] = path.(string)
|
|
}
|
|
wsOpts["headers"] = headers
|
|
vmess["ws-opts"] = wsOpts
|
|
|
|
case "grpc":
|
|
grpcOpts := make(map[string]any)
|
|
grpcOpts["grpc-service-name"] = values["path"]
|
|
vmess["grpc-opts"] = grpcOpts
|
|
}
|
|
|
|
proxies = append(proxies, vmess)
|
|
|
|
case "ss":
|
|
urlSS, err := url.Parse(line)
|
|
if err != nil {
|
|
continue
|
|
}
|
|
|
|
name := uniqueName(names, urlSS.Fragment)
|
|
port := urlSS.Port()
|
|
|
|
if port == "" {
|
|
dcBuf, err := encRaw.DecodeString(urlSS.Host)
|
|
if err != nil {
|
|
continue
|
|
}
|
|
|
|
urlSS, err = url.Parse("ss://" + string(dcBuf))
|
|
if err != nil {
|
|
continue
|
|
}
|
|
}
|
|
|
|
var (
|
|
cipherRaw = urlSS.User.Username()
|
|
cipher string
|
|
password string
|
|
)
|
|
cipher = cipherRaw
|
|
if password, found = urlSS.User.Password(); !found {
|
|
dcBuf, err := base64.RawURLEncoding.DecodeString(cipherRaw)
|
|
if err != nil {
|
|
dcBuf, _ = enc.DecodeString(cipherRaw)
|
|
}
|
|
cipher, password, found = strings.Cut(string(dcBuf), ":")
|
|
if !found {
|
|
continue
|
|
}
|
|
err = VerifyMethod(cipher, password)
|
|
if err != nil {
|
|
dcBuf, _ = encRaw.DecodeString(cipherRaw)
|
|
cipher, password, found = strings.Cut(string(dcBuf), ":")
|
|
}
|
|
}
|
|
|
|
ss := make(map[string]any, 10)
|
|
|
|
ss["name"] = name
|
|
ss["type"] = scheme
|
|
ss["server"] = urlSS.Hostname()
|
|
ss["port"] = urlSS.Port()
|
|
ss["cipher"] = cipher
|
|
ss["password"] = password
|
|
query := urlSS.Query()
|
|
ss["udp"] = true
|
|
if query.Get("udp-over-tcp") == "true" || query.Get("uot") == "1" {
|
|
ss["udp-over-tcp"] = true
|
|
}
|
|
if strings.Contains(query.Get("plugin"), "obfs") {
|
|
obfsParams := strings.Split(query.Get("plugin"), ";")
|
|
ss["plugin"] = "obfs"
|
|
ss["plugin-opts"] = map[string]any{
|
|
"host": obfsParams[2][10:],
|
|
"mode": obfsParams[1][5:],
|
|
}
|
|
}
|
|
proxies = append(proxies, ss)
|
|
|
|
case "ssr":
|
|
dcBuf, err := encRaw.DecodeString(body)
|
|
if err != nil {
|
|
continue
|
|
}
|
|
|
|
// ssr://host:port:protocol:method:obfs:urlsafebase64pass/?obfsparam=urlsafebase64&protoparam=&remarks=urlsafebase64&group=urlsafebase64&udpport=0&uot=1
|
|
|
|
before, after, ok := strings.Cut(string(dcBuf), "/?")
|
|
if !ok {
|
|
continue
|
|
}
|
|
|
|
beforeArr := strings.Split(before, ":")
|
|
|
|
if len(beforeArr) != 6 {
|
|
continue
|
|
}
|
|
|
|
host := beforeArr[0]
|
|
port := beforeArr[1]
|
|
protocol := beforeArr[2]
|
|
method := beforeArr[3]
|
|
obfs := beforeArr[4]
|
|
password := decodeUrlSafe(urlSafe(beforeArr[5]))
|
|
|
|
query, err := url.ParseQuery(urlSafe(after))
|
|
if err != nil {
|
|
continue
|
|
}
|
|
|
|
remarks := decodeUrlSafe(query.Get("remarks"))
|
|
name := uniqueName(names, remarks)
|
|
|
|
obfsParam := decodeUrlSafe(query.Get("obfsparam"))
|
|
protocolParam := query.Get("protoparam")
|
|
|
|
ssr := make(map[string]any, 20)
|
|
|
|
ssr["name"] = name
|
|
ssr["type"] = scheme
|
|
ssr["server"] = host
|
|
ssr["port"] = port
|
|
ssr["cipher"] = method
|
|
ssr["password"] = password
|
|
ssr["obfs"] = obfs
|
|
ssr["protocol"] = protocol
|
|
ssr["udp"] = true
|
|
|
|
if obfsParam != "" {
|
|
ssr["obfs-param"] = obfsParam
|
|
}
|
|
|
|
if protocolParam != "" {
|
|
ssr["protocol-param"] = protocolParam
|
|
}
|
|
|
|
proxies = append(proxies, ssr)
|
|
}
|
|
}
|
|
|
|
if len(proxies) == 0 {
|
|
return nil, fmt.Errorf("convert v2ray subscribe error: format invalid")
|
|
}
|
|
|
|
return proxies, nil
|
|
}
|
|
|
|
func uniqueName(names map[string]int, name string) string {
|
|
if index, ok := names[name]; ok {
|
|
index++
|
|
names[name] = index
|
|
name = fmt.Sprintf("%s-%02d", name, index)
|
|
} else {
|
|
index = 0
|
|
names[name] = index
|
|
}
|
|
return name
|
|
}
|