converter.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534
  1. package convert
  2. import (
  3. "bytes"
  4. "encoding/base64"
  5. "encoding/json"
  6. "fmt"
  7. "net/url"
  8. "strconv"
  9. "strings"
  10. "github.com/metacubex/mihomo/log"
  11. )
  12. // ConvertsV2Ray convert V2Ray subscribe proxies data to mihomo proxies config
  13. func ConvertsV2Ray(buf []byte) ([]map[string]any, error) {
  14. data := DecodeBase64(buf)
  15. arr := strings.Split(string(data), "\n")
  16. proxies := make([]map[string]any, 0, len(arr))
  17. names := make(map[string]int, 200)
  18. for _, line := range arr {
  19. line = strings.TrimRight(line, " \r")
  20. if line == "" {
  21. continue
  22. }
  23. scheme, body, found := strings.Cut(line, "://")
  24. if !found {
  25. continue
  26. }
  27. scheme = strings.ToLower(scheme)
  28. switch scheme {
  29. case "hysteria":
  30. urlHysteria, err := url.Parse(line)
  31. if err != nil {
  32. continue
  33. }
  34. query := urlHysteria.Query()
  35. name := uniqueName(names, urlHysteria.Fragment)
  36. hysteria := make(map[string]any, 20)
  37. hysteria["name"] = name
  38. hysteria["type"] = scheme
  39. hysteria["server"] = urlHysteria.Hostname()
  40. hysteria["port"] = urlHysteria.Port()
  41. hysteria["sni"] = query.Get("peer")
  42. hysteria["obfs"] = query.Get("obfs")
  43. if alpn := query.Get("alpn"); alpn != "" {
  44. hysteria["alpn"] = strings.Split(alpn, ",")
  45. }
  46. hysteria["auth_str"] = query.Get("auth")
  47. hysteria["protocol"] = query.Get("protocol")
  48. up := query.Get("up")
  49. down := query.Get("down")
  50. if up == "" {
  51. up = query.Get("upmbps")
  52. }
  53. if down == "" {
  54. down = query.Get("downmbps")
  55. }
  56. hysteria["down"] = down
  57. hysteria["up"] = up
  58. hysteria["skip-cert-verify"], _ = strconv.ParseBool(query.Get("insecure"))
  59. proxies = append(proxies, hysteria)
  60. case "hysteria2", "hy2":
  61. urlHysteria2, err := url.Parse(line)
  62. if err != nil {
  63. continue
  64. }
  65. query := urlHysteria2.Query()
  66. name := uniqueName(names, urlHysteria2.Fragment)
  67. hysteria2 := make(map[string]any, 20)
  68. hysteria2["name"] = name
  69. hysteria2["type"] = "hysteria2"
  70. hysteria2["server"] = urlHysteria2.Hostname()
  71. if port := urlHysteria2.Port(); port != "" {
  72. hysteria2["port"] = port
  73. } else {
  74. hysteria2["port"] = "443"
  75. }
  76. hysteria2["obfs"] = query.Get("obfs")
  77. hysteria2["obfs-password"] = query.Get("obfs-password")
  78. hysteria2["sni"] = query.Get("sni")
  79. hysteria2["skip-cert-verify"], _ = strconv.ParseBool(query.Get("insecure"))
  80. if alpn := query.Get("alpn"); alpn != "" {
  81. hysteria2["alpn"] = strings.Split(alpn, ",")
  82. }
  83. if auth := urlHysteria2.User.String(); auth != "" {
  84. hysteria2["password"] = auth
  85. }
  86. hysteria2["fingerprint"] = query.Get("pinSHA256")
  87. hysteria2["down"] = query.Get("down")
  88. hysteria2["up"] = query.Get("up")
  89. proxies = append(proxies, hysteria2)
  90. case "tuic":
  91. // A temporary unofficial TUIC share link standard
  92. // Modified from https://github.com/daeuniverse/dae/discussions/182
  93. // Changes:
  94. // 1. Support TUICv4, just replace uuid:password with token
  95. // 2. Remove `allow_insecure` field
  96. urlTUIC, err := url.Parse(line)
  97. if err != nil {
  98. continue
  99. }
  100. query := urlTUIC.Query()
  101. tuic := make(map[string]any, 20)
  102. tuic["name"] = uniqueName(names, urlTUIC.Fragment)
  103. tuic["type"] = scheme
  104. tuic["server"] = urlTUIC.Hostname()
  105. tuic["port"] = urlTUIC.Port()
  106. tuic["udp"] = true
  107. password, v5 := urlTUIC.User.Password()
  108. if v5 {
  109. tuic["uuid"] = urlTUIC.User.Username()
  110. tuic["password"] = password
  111. } else {
  112. tuic["token"] = urlTUIC.User.Username()
  113. }
  114. if cc := query.Get("congestion_control"); cc != "" {
  115. tuic["congestion-controller"] = cc
  116. }
  117. if alpn := query.Get("alpn"); alpn != "" {
  118. tuic["alpn"] = strings.Split(alpn, ",")
  119. }
  120. if sni := query.Get("sni"); sni != "" {
  121. tuic["sni"] = sni
  122. }
  123. if query.Get("disable_sni") == "1" {
  124. tuic["disable-sni"] = true
  125. }
  126. if udpRelayMode := query.Get("udp_relay_mode"); udpRelayMode != "" {
  127. tuic["udp-relay-mode"] = udpRelayMode
  128. }
  129. proxies = append(proxies, tuic)
  130. case "trojan":
  131. urlTrojan, err := url.Parse(line)
  132. if err != nil {
  133. continue
  134. }
  135. query := urlTrojan.Query()
  136. name := uniqueName(names, urlTrojan.Fragment)
  137. trojan := make(map[string]any, 20)
  138. trojan["name"] = name
  139. trojan["type"] = scheme
  140. trojan["server"] = urlTrojan.Hostname()
  141. trojan["port"] = urlTrojan.Port()
  142. trojan["password"] = urlTrojan.User.Username()
  143. trojan["udp"] = true
  144. trojan["skip-cert-verify"], _ = strconv.ParseBool(query.Get("allowInsecure"))
  145. if sni := query.Get("sni"); sni != "" {
  146. trojan["sni"] = sni
  147. }
  148. if alpn := query.Get("alpn"); alpn != "" {
  149. trojan["alpn"] = strings.Split(alpn, ",")
  150. }
  151. network := strings.ToLower(query.Get("type"))
  152. if network != "" {
  153. trojan["network"] = network
  154. }
  155. switch network {
  156. case "ws":
  157. headers := make(map[string]any)
  158. wsOpts := make(map[string]any)
  159. headers["User-Agent"] = RandUserAgent()
  160. wsOpts["path"] = query.Get("path")
  161. wsOpts["headers"] = headers
  162. trojan["ws-opts"] = wsOpts
  163. case "grpc":
  164. grpcOpts := make(map[string]any)
  165. grpcOpts["grpc-service-name"] = query.Get("serviceName")
  166. trojan["grpc-opts"] = grpcOpts
  167. }
  168. if fingerprint := query.Get("fp"); fingerprint == "" {
  169. trojan["client-fingerprint"] = "chrome"
  170. } else {
  171. trojan["client-fingerprint"] = fingerprint
  172. }
  173. proxies = append(proxies, trojan)
  174. case "vless":
  175. urlVLess, err := url.Parse(line)
  176. if err != nil {
  177. continue
  178. }
  179. query := urlVLess.Query()
  180. vless := make(map[string]any, 20)
  181. err = handleVShareLink(names, urlVLess, scheme, vless)
  182. if err != nil {
  183. log.Warnln("error:%s line:%s", err.Error(), line)
  184. continue
  185. }
  186. if flow := query.Get("flow"); flow != "" {
  187. vless["flow"] = strings.ToLower(flow)
  188. }
  189. proxies = append(proxies, vless)
  190. case "vmess":
  191. // V2RayN-styled share link
  192. // https://github.com/2dust/v2rayN/wiki/%E5%88%86%E4%BA%AB%E9%93%BE%E6%8E%A5%E6%A0%BC%E5%BC%8F%E8%AF%B4%E6%98%8E(ver-2)
  193. dcBuf, err := tryDecodeBase64([]byte(body))
  194. if err != nil {
  195. // Xray VMessAEAD share link
  196. urlVMess, err := url.Parse(line)
  197. if err != nil {
  198. continue
  199. }
  200. query := urlVMess.Query()
  201. vmess := make(map[string]any, 20)
  202. err = handleVShareLink(names, urlVMess, scheme, vmess)
  203. if err != nil {
  204. log.Warnln("error:%s line:%s", err.Error(), line)
  205. continue
  206. }
  207. vmess["alterId"] = 0
  208. vmess["cipher"] = "auto"
  209. if encryption := query.Get("encryption"); encryption != "" {
  210. vmess["cipher"] = encryption
  211. }
  212. proxies = append(proxies, vmess)
  213. continue
  214. }
  215. jsonDc := json.NewDecoder(bytes.NewReader(dcBuf))
  216. values := make(map[string]any, 20)
  217. if jsonDc.Decode(&values) != nil {
  218. continue
  219. }
  220. tempName, ok := values["ps"].(string)
  221. if !ok {
  222. continue
  223. }
  224. name := uniqueName(names, tempName)
  225. vmess := make(map[string]any, 20)
  226. vmess["name"] = name
  227. vmess["type"] = scheme
  228. vmess["server"] = values["add"]
  229. vmess["port"] = values["port"]
  230. vmess["uuid"] = values["id"]
  231. if alterId, ok := values["aid"]; ok {
  232. vmess["alterId"] = alterId
  233. } else {
  234. vmess["alterId"] = 0
  235. }
  236. vmess["udp"] = true
  237. vmess["xudp"] = true
  238. vmess["tls"] = false
  239. vmess["skip-cert-verify"] = false
  240. vmess["cipher"] = "auto"
  241. if cipher, ok := values["scy"]; ok && cipher != "" {
  242. vmess["cipher"] = cipher
  243. }
  244. if sni, ok := values["sni"]; ok && sni != "" {
  245. vmess["servername"] = sni
  246. }
  247. network, _ := values["net"].(string)
  248. network = strings.ToLower(network)
  249. if values["type"] == "http" {
  250. network = "http"
  251. } else if network == "http" {
  252. network = "h2"
  253. }
  254. vmess["network"] = network
  255. tls, ok := values["tls"].(string)
  256. if ok {
  257. tls = strings.ToLower(tls)
  258. if strings.HasSuffix(tls, "tls") {
  259. vmess["tls"] = true
  260. }
  261. if alpn, ok := values["alpn"].(string); ok {
  262. vmess["alpn"] = strings.Split(alpn, ",")
  263. }
  264. }
  265. switch network {
  266. case "http":
  267. headers := make(map[string]any)
  268. httpOpts := make(map[string]any)
  269. if host, ok := values["host"]; ok && host != "" {
  270. headers["Host"] = []string{host.(string)}
  271. }
  272. httpOpts["path"] = []string{"/"}
  273. if path, ok := values["path"]; ok && path != "" {
  274. httpOpts["path"] = []string{path.(string)}
  275. }
  276. httpOpts["headers"] = headers
  277. vmess["http-opts"] = httpOpts
  278. case "h2":
  279. headers := make(map[string]any)
  280. h2Opts := make(map[string]any)
  281. if host, ok := values["host"]; ok && host != "" {
  282. headers["Host"] = []string{host.(string)}
  283. }
  284. h2Opts["path"] = values["path"]
  285. h2Opts["headers"] = headers
  286. vmess["h2-opts"] = h2Opts
  287. case "ws", "httpupgrade":
  288. headers := make(map[string]any)
  289. wsOpts := make(map[string]any)
  290. wsOpts["path"] = "/"
  291. if host, ok := values["host"]; ok && host != "" {
  292. headers["Host"] = host.(string)
  293. }
  294. if path, ok := values["path"]; ok && path != "" {
  295. path := path.(string)
  296. pathURL, err := url.Parse(path)
  297. if err == nil {
  298. query := pathURL.Query()
  299. if earlyData := query.Get("ed"); earlyData != "" {
  300. med, err := strconv.Atoi(earlyData)
  301. if err == nil {
  302. switch network {
  303. case "ws":
  304. wsOpts["max-early-data"] = med
  305. wsOpts["early-data-header-name"] = "Sec-WebSocket-Protocol"
  306. case "httpupgrade":
  307. wsOpts["v2ray-http-upgrade-fast-open"] = true
  308. }
  309. query.Del("ed")
  310. pathURL.RawQuery = query.Encode()
  311. path = pathURL.String()
  312. }
  313. }
  314. if earlyDataHeader := query.Get("eh"); earlyDataHeader != "" {
  315. wsOpts["early-data-header-name"] = earlyDataHeader
  316. }
  317. }
  318. wsOpts["path"] = path
  319. }
  320. wsOpts["headers"] = headers
  321. vmess["ws-opts"] = wsOpts
  322. case "grpc":
  323. grpcOpts := make(map[string]any)
  324. grpcOpts["grpc-service-name"] = values["path"]
  325. vmess["grpc-opts"] = grpcOpts
  326. }
  327. proxies = append(proxies, vmess)
  328. case "ss":
  329. urlSS, err := url.Parse(line)
  330. if err != nil {
  331. continue
  332. }
  333. name := uniqueName(names, urlSS.Fragment)
  334. port := urlSS.Port()
  335. if port == "" {
  336. dcBuf, err := encRaw.DecodeString(urlSS.Host)
  337. if err != nil {
  338. continue
  339. }
  340. urlSS, err = url.Parse("ss://" + string(dcBuf))
  341. if err != nil {
  342. continue
  343. }
  344. }
  345. var (
  346. cipherRaw = urlSS.User.Username()
  347. cipher string
  348. password string
  349. )
  350. cipher = cipherRaw
  351. if password, found = urlSS.User.Password(); !found {
  352. dcBuf, err := base64.RawURLEncoding.DecodeString(cipherRaw)
  353. if err != nil {
  354. dcBuf, _ = enc.DecodeString(cipherRaw)
  355. }
  356. cipher, password, found = strings.Cut(string(dcBuf), ":")
  357. if !found {
  358. continue
  359. }
  360. err = VerifyMethod(cipher, password)
  361. if err != nil {
  362. dcBuf, _ = encRaw.DecodeString(cipherRaw)
  363. cipher, password, found = strings.Cut(string(dcBuf), ":")
  364. }
  365. }
  366. ss := make(map[string]any, 10)
  367. ss["name"] = name
  368. ss["type"] = scheme
  369. ss["server"] = urlSS.Hostname()
  370. ss["port"] = urlSS.Port()
  371. ss["cipher"] = cipher
  372. ss["password"] = password
  373. query := urlSS.Query()
  374. ss["udp"] = true
  375. if query.Get("udp-over-tcp") == "true" || query.Get("uot") == "1" {
  376. ss["udp-over-tcp"] = true
  377. }
  378. plugin := query.Get("plugin")
  379. if strings.Contains(plugin, ";") {
  380. pluginInfo, _ := url.ParseQuery("pluginName=" + strings.ReplaceAll(plugin, ";", "&"))
  381. pluginName := pluginInfo.Get("pluginName")
  382. if strings.Contains(pluginName, "obfs") {
  383. ss["plugin"] = "obfs"
  384. ss["plugin-opts"] = map[string]any{
  385. "mode": pluginInfo.Get("obfs"),
  386. "host": pluginInfo.Get("obfs-host"),
  387. }
  388. } else if strings.Contains(pluginName, "v2ray-plugin") {
  389. ss["plugin"] = "v2ray-plugin"
  390. ss["plugin-opts"] = map[string]any{
  391. "mode": pluginInfo.Get("mode"),
  392. "host": pluginInfo.Get("host"),
  393. "path": pluginInfo.Get("path"),
  394. "tls": strings.Contains(plugin, "tls"),
  395. }
  396. }
  397. }
  398. proxies = append(proxies, ss)
  399. case "ssr":
  400. dcBuf, err := encRaw.DecodeString(body)
  401. if err != nil {
  402. continue
  403. }
  404. // ssr://host:port:protocol:method:obfs:urlsafebase64pass/?obfsparam=urlsafebase64&protoparam=&remarks=urlsafebase64&group=urlsafebase64&udpport=0&uot=1
  405. before, after, ok := strings.Cut(string(dcBuf), "/?")
  406. if !ok {
  407. continue
  408. }
  409. beforeArr := strings.Split(before, ":")
  410. if len(beforeArr) != 6 {
  411. continue
  412. }
  413. host := beforeArr[0]
  414. port := beforeArr[1]
  415. protocol := beforeArr[2]
  416. method := beforeArr[3]
  417. obfs := beforeArr[4]
  418. password := decodeUrlSafe(urlSafe(beforeArr[5]))
  419. query, err := url.ParseQuery(urlSafe(after))
  420. if err != nil {
  421. continue
  422. }
  423. remarks := decodeUrlSafe(query.Get("remarks"))
  424. name := uniqueName(names, remarks)
  425. obfsParam := decodeUrlSafe(query.Get("obfsparam"))
  426. protocolParam := query.Get("protoparam")
  427. ssr := make(map[string]any, 20)
  428. ssr["name"] = name
  429. ssr["type"] = scheme
  430. ssr["server"] = host
  431. ssr["port"] = port
  432. ssr["cipher"] = method
  433. ssr["password"] = password
  434. ssr["obfs"] = obfs
  435. ssr["protocol"] = protocol
  436. ssr["udp"] = true
  437. if obfsParam != "" {
  438. ssr["obfs-param"] = obfsParam
  439. }
  440. if protocolParam != "" {
  441. ssr["protocol-param"] = protocolParam
  442. }
  443. proxies = append(proxies, ssr)
  444. }
  445. }
  446. if len(proxies) == 0 {
  447. return nil, fmt.Errorf("convert v2ray subscribe error: format invalid")
  448. }
  449. return proxies, nil
  450. }
  451. func uniqueName(names map[string]int, name string) string {
  452. if index, ok := names[name]; ok {
  453. index++
  454. names[name] = index
  455. name = fmt.Sprintf("%s-%02d", name, index)
  456. } else {
  457. index = 0
  458. names[name] = index
  459. }
  460. return name
  461. }