package convert import ( "bytes" "encoding/base64" "encoding/json" "fmt" "net/url" "strconv" "strings" "github.com/metacubex/mihomo/log" ) // ConvertsV2Ray convert V2Ray subscribe proxies data to mihomo proxies config func ConvertsV2Ray(buf []byte) ([]map[string]any, error) { data := DecodeBase64(buf) arr := strings.Split(string(data), "\n") proxies := make([]map[string]any, 0, len(arr)) names := make(map[string]int, 200) for _, line := range arr { line = strings.TrimRight(line, " \r") if line == "" { continue } scheme, body, found := strings.Cut(line, "://") if !found { continue } scheme = strings.ToLower(scheme) switch scheme { case "hysteria": urlHysteria, err := url.Parse(line) if err != nil { continue } query := urlHysteria.Query() name := uniqueName(names, urlHysteria.Fragment) hysteria := make(map[string]any, 20) hysteria["name"] = name hysteria["type"] = scheme hysteria["server"] = urlHysteria.Hostname() hysteria["port"] = urlHysteria.Port() hysteria["sni"] = query.Get("peer") hysteria["obfs"] = query.Get("obfs") if alpn := query.Get("alpn"); alpn != "" { hysteria["alpn"] = strings.Split(alpn, ",") } hysteria["auth_str"] = query.Get("auth") hysteria["protocol"] = query.Get("protocol") up := query.Get("up") down := query.Get("down") if up == "" { up = query.Get("upmbps") } if down == "" { down = query.Get("downmbps") } hysteria["down"] = down hysteria["up"] = up hysteria["skip-cert-verify"], _ = strconv.ParseBool(query.Get("insecure")) proxies = append(proxies, hysteria) case "hysteria2": urlHysteria2, err := url.Parse(line) if err != nil { continue } query := urlHysteria2.Query() name := uniqueName(names, urlHysteria2.Fragment) hysteria2 := make(map[string]any, 20) hysteria2["name"] = name hysteria2["type"] = scheme hysteria2["server"] = urlHysteria2.Hostname() if port := urlHysteria2.Port(); port != "" { hysteria2["port"] = port } else { hysteria2["port"] = "443" } hysteria2["obfs"] = query.Get("obfs") hysteria2["obfs-password"] = query.Get("obfs-password") hysteria2["sni"] = query.Get("sni") hysteria2["skip-cert-verify"], _ = strconv.ParseBool(query.Get("insecure")) if alpn := query.Get("alpn"); alpn != "" { hysteria2["alpn"] = strings.Split(alpn, ",") } if auth := urlHysteria2.User.String(); auth != "" { hysteria2["password"] = auth } hysteria2["fingerprint"] = query.Get("pinSHA256") hysteria2["down"] = query.Get("down") hysteria2["up"] = query.Get("up") proxies = append(proxies, hysteria2) case "tuic": // A temporary unofficial TUIC share link standard // Modified from https://github.com/daeuniverse/dae/discussions/182 // Changes: // 1. Support TUICv4, just replace uuid:password with token // 2. Remove `allow_insecure` field urlTUIC, err := url.Parse(line) if err != nil { continue } query := urlTUIC.Query() tuic := make(map[string]any, 20) tuic["name"] = uniqueName(names, urlTUIC.Fragment) tuic["type"] = scheme tuic["server"] = urlTUIC.Hostname() tuic["port"] = urlTUIC.Port() tuic["udp"] = true password, v5 := urlTUIC.User.Password() if v5 { tuic["uuid"] = urlTUIC.User.Username() tuic["password"] = password } else { tuic["token"] = urlTUIC.User.Username() } if cc := query.Get("congestion_control"); cc != "" { tuic["congestion-controller"] = cc } if alpn := query.Get("alpn"); alpn != "" { tuic["alpn"] = strings.Split(alpn, ",") } if sni := query.Get("sni"); sni != "" { tuic["sni"] = sni } if query.Get("disable_sni") == "1" { tuic["disable-sni"] = true } if udpRelayMode := query.Get("udp_relay_mode"); udpRelayMode != "" { tuic["udp-relay-mode"] = udpRelayMode } proxies = append(proxies, tuic) case "trojan": urlTrojan, err := url.Parse(line) if err != nil { continue } query := urlTrojan.Query() name := uniqueName(names, urlTrojan.Fragment) trojan := make(map[string]any, 20) trojan["name"] = name trojan["type"] = scheme trojan["server"] = urlTrojan.Hostname() trojan["port"] = urlTrojan.Port() trojan["password"] = urlTrojan.User.Username() trojan["udp"] = true trojan["skip-cert-verify"], _ = strconv.ParseBool(query.Get("allowInsecure")) if sni := query.Get("sni"); sni != "" { trojan["sni"] = sni } if alpn := query.Get("alpn"); alpn != "" { trojan["alpn"] = strings.Split(alpn, ",") } network := strings.ToLower(query.Get("type")) if network != "" { trojan["network"] = network } switch network { case "ws": headers := make(map[string]any) wsOpts := make(map[string]any) headers["User-Agent"] = RandUserAgent() wsOpts["path"] = query.Get("path") wsOpts["headers"] = headers trojan["ws-opts"] = wsOpts case "grpc": grpcOpts := make(map[string]any) grpcOpts["grpc-service-name"] = query.Get("serviceName") trojan["grpc-opts"] = grpcOpts } if fingerprint := query.Get("fp"); fingerprint == "" { trojan["client-fingerprint"] = "chrome" } else { trojan["client-fingerprint"] = fingerprint } proxies = append(proxies, trojan) case "vless": urlVLess, err := url.Parse(line) if err != nil { continue } query := urlVLess.Query() vless := make(map[string]any, 20) err = handleVShareLink(names, urlVLess, scheme, vless) if err != nil { log.Warnln("error:%s line:%s", err.Error(), line) continue } if flow := query.Get("flow"); flow != "" { vless["flow"] = strings.ToLower(flow) } proxies = append(proxies, vless) case "vmess": // V2RayN-styled share link // https://github.com/2dust/v2rayN/wiki/%E5%88%86%E4%BA%AB%E9%93%BE%E6%8E%A5%E6%A0%BC%E5%BC%8F%E8%AF%B4%E6%98%8E(ver-2) dcBuf, err := tryDecodeBase64([]byte(body)) if err != nil { // Xray VMessAEAD share link urlVMess, err := url.Parse(line) if err != nil { continue } query := urlVMess.Query() vmess := make(map[string]any, 20) err = handleVShareLink(names, urlVMess, scheme, vmess) if err != nil { log.Warnln("error:%s line:%s", err.Error(), line) continue } vmess["alterId"] = 0 vmess["cipher"] = "auto" if encryption := query.Get("encryption"); encryption != "" { vmess["cipher"] = encryption } proxies = append(proxies, vmess) continue } jsonDc := json.NewDecoder(bytes.NewReader(dcBuf)) values := make(map[string]any, 20) if jsonDc.Decode(&values) != nil { continue } tempName, ok := values["ps"].(string) if !ok { continue } name := uniqueName(names, tempName) vmess := make(map[string]any, 20) vmess["name"] = name vmess["type"] = scheme vmess["server"] = values["add"] vmess["port"] = values["port"] vmess["uuid"] = values["id"] if alterId, ok := values["aid"]; ok { vmess["alterId"] = alterId } else { vmess["alterId"] = 0 } vmess["udp"] = true vmess["xudp"] = true vmess["tls"] = false vmess["skip-cert-verify"] = false vmess["cipher"] = "auto" if cipher, ok := values["scy"]; ok && cipher != "" { vmess["cipher"] = cipher } if sni, ok := values["sni"]; ok && sni != "" { vmess["servername"] = sni } network, _ := values["net"].(string) network = strings.ToLower(network) if values["type"] == "http" { network = "http" } else if network == "http" { network = "h2" } vmess["network"] = network tls, ok := values["tls"].(string) if ok { tls = strings.ToLower(tls) if strings.HasSuffix(tls, "tls") { vmess["tls"] = true } if alpn, ok := values["alpn"].(string); ok { vmess["alpn"] = strings.Split(alpn, ",") } } switch network { case "http": headers := make(map[string]any) httpOpts := make(map[string]any) if host, ok := values["host"]; ok && host != "" { headers["Host"] = []string{host.(string)} } httpOpts["path"] = []string{"/"} if path, ok := values["path"]; ok && path != "" { httpOpts["path"] = []string{path.(string)} } httpOpts["headers"] = headers vmess["http-opts"] = httpOpts case "h2": headers := make(map[string]any) h2Opts := make(map[string]any) if host, ok := values["host"]; ok && host != "" { headers["Host"] = []string{host.(string)} } h2Opts["path"] = values["path"] h2Opts["headers"] = headers vmess["h2-opts"] = h2Opts case "ws": headers := make(map[string]any) wsOpts := make(map[string]any) wsOpts["path"] = []string{"/"} if host, ok := values["host"]; ok && host != "" { headers["Host"] = host.(string) } if path, ok := values["path"]; ok && path != "" { wsOpts["path"] = path.(string) } wsOpts["headers"] = headers vmess["ws-opts"] = wsOpts case "grpc": grpcOpts := make(map[string]any) grpcOpts["grpc-service-name"] = values["path"] vmess["grpc-opts"] = grpcOpts } proxies = append(proxies, vmess) case "ss": urlSS, err := url.Parse(line) if err != nil { continue } name := uniqueName(names, urlSS.Fragment) port := urlSS.Port() if port == "" { dcBuf, err := encRaw.DecodeString(urlSS.Host) if err != nil { continue } urlSS, err = url.Parse("ss://" + string(dcBuf)) if err != nil { continue } } var ( cipherRaw = urlSS.User.Username() cipher string password string ) cipher = cipherRaw if password, found = urlSS.User.Password(); !found { dcBuf, err := base64.RawURLEncoding.DecodeString(cipherRaw) if err != nil { dcBuf, _ = enc.DecodeString(cipherRaw) } cipher, password, found = strings.Cut(string(dcBuf), ":") if !found { continue } err = VerifyMethod(cipher, password) if err != nil { dcBuf, _ = encRaw.DecodeString(cipherRaw) cipher, password, found = strings.Cut(string(dcBuf), ":") } } ss := make(map[string]any, 10) ss["name"] = name ss["type"] = scheme ss["server"] = urlSS.Hostname() ss["port"] = urlSS.Port() ss["cipher"] = cipher ss["password"] = password query := urlSS.Query() ss["udp"] = true if query.Get("udp-over-tcp") == "true" || query.Get("uot") == "1" { ss["udp-over-tcp"] = true } if strings.Contains(query.Get("plugin"), "obfs") { obfsParams := strings.Split(query.Get("plugin"), ";") ss["plugin"] = "obfs" ss["plugin-opts"] = map[string]any{ "host": obfsParams[2][10:], "mode": obfsParams[1][5:], } } proxies = append(proxies, ss) case "ssr": dcBuf, err := encRaw.DecodeString(body) if err != nil { continue } // ssr://host:port:protocol:method:obfs:urlsafebase64pass/?obfsparam=urlsafebase64&protoparam=&remarks=urlsafebase64&group=urlsafebase64&udpport=0&uot=1 before, after, ok := strings.Cut(string(dcBuf), "/?") if !ok { continue } beforeArr := strings.Split(before, ":") if len(beforeArr) != 6 { continue } host := beforeArr[0] port := beforeArr[1] protocol := beforeArr[2] method := beforeArr[3] obfs := beforeArr[4] password := decodeUrlSafe(urlSafe(beforeArr[5])) query, err := url.ParseQuery(urlSafe(after)) if err != nil { continue } remarks := decodeUrlSafe(query.Get("remarks")) name := uniqueName(names, remarks) obfsParam := decodeUrlSafe(query.Get("obfsparam")) protocolParam := query.Get("protoparam") ssr := make(map[string]any, 20) ssr["name"] = name ssr["type"] = scheme ssr["server"] = host ssr["port"] = port ssr["cipher"] = method ssr["password"] = password ssr["obfs"] = obfs ssr["protocol"] = protocol ssr["udp"] = true if obfsParam != "" { ssr["obfs-param"] = obfsParam } if protocolParam != "" { ssr["protocol-param"] = protocolParam } proxies = append(proxies, ssr) } } if len(proxies) == 0 { return nil, fmt.Errorf("convert v2ray subscribe error: format invalid") } return proxies, nil } func uniqueName(names map[string]int, name string) string { if index, ok := names[name]; ok { index++ names[name] = index name = fmt.Sprintf("%s-%02d", name, index) } else { index = 0 names[name] = index } return name }