package convert import ( "bytes" "encoding/json" "fmt" "net/url" "strconv" "strings" ) // ConvertsV2Ray convert V2Ray subscribe proxies data to clash proxies config func ConvertsV2Ray(buf []byte) ([]map[string]any, error) { data := DecodeBase64(buf) arr := strings.Split(string(data), "\n") proxies := make([]map[string]any, 0, len(arr)) names := make(map[string]int, 200) for _, line := range arr { line = strings.TrimRight(line, " \r") if line == "" { continue } scheme, body, found := strings.Cut(line, "://") if !found { continue } scheme = strings.ToLower(scheme) switch scheme { case "hysteria": urlHysteria, err := url.Parse(line) if err != nil { continue } query := urlHysteria.Query() name := uniqueName(names, urlHysteria.Fragment) hysteria := make(map[string]any, 20) hysteria["name"] = name hysteria["type"] = scheme hysteria["server"] = urlHysteria.Hostname() hysteria["port"] = urlHysteria.Port() hysteria["sni"] = query.Get("peer") hysteria["obfs"] = query.Get("obfs") hysteria["alpn"] = []string{query.Get("alpn")} hysteria["auth_str"] = query.Get("auth") hysteria["protocol"] = query.Get("protocol") up := query.Get("up") down := query.Get("down") if up == "" { up = query.Get("upmbps") } if down == "" { down = query.Get("downmbps") } hysteria["down"] = down hysteria["up"] = up hysteria["skip-cert-verify"], _ = strconv.ParseBool(query.Get("insecure")) proxies = append(proxies, hysteria) case "trojan": urlTrojan, err := url.Parse(line) if err != nil { continue } query := urlTrojan.Query() name := uniqueName(names, urlTrojan.Fragment) trojan := make(map[string]any, 20) trojan["name"] = name trojan["type"] = scheme trojan["server"] = urlTrojan.Hostname() trojan["port"] = urlTrojan.Port() trojan["password"] = urlTrojan.User.Username() trojan["udp"] = true trojan["skip-cert-verify"] = false sni := query.Get("sni") if sni != "" { trojan["sni"] = sni } network := strings.ToLower(query.Get("type")) if network != "" { trojan["network"] = network } switch network { case "ws": headers := make(map[string]any) wsOpts := make(map[string]any) headers["User-Agent"] = RandUserAgent() wsOpts["path"] = query.Get("path") wsOpts["headers"] = headers trojan["ws-opts"] = wsOpts case "grpc": grpcOpts := make(map[string]any) grpcOpts["grpc-service-name"] = query.Get("serviceName") trojan["grpc-opts"] = grpcOpts } proxies = append(proxies, trojan) case "vless": urlVLess, err := url.Parse(line) if err != nil { continue } query := urlVLess.Query() vless := make(map[string]any, 20) handleVShareLink(names, urlVLess, scheme, vless) if flow := query.Get("flow"); flow != "" { vless["flow"] = strings.ToLower(flow) } proxies = append(proxies, vless) case "vmess": // V2RayN-styled share link // https://github.com/2dust/v2rayN/wiki/%E5%88%86%E4%BA%AB%E9%93%BE%E6%8E%A5%E6%A0%BC%E5%BC%8F%E8%AF%B4%E6%98%8E(ver-2) dcBuf, err := tryDecodeBase64([]byte(body)) if err != nil { // Xray VMessAEAD share link urlVMess, err := url.Parse(line) if err != nil { continue } query := urlVMess.Query() vmess := make(map[string]any, 20) handleVShareLink(names, urlVMess, scheme, vmess) vmess["alterId"] = 0 vmess["cipher"] = "auto" if encryption := query.Get("encryption"); encryption != "" { vmess["cipher"] = encryption } proxies = append(proxies, vmess) continue } jsonDc := json.NewDecoder(bytes.NewReader(dcBuf)) values := make(map[string]any, 20) if jsonDc.Decode(&values) != nil { continue } tempName, ok := values["ps"].(string) if !ok { continue } name := uniqueName(names, tempName) vmess := make(map[string]any, 20) vmess["name"] = name vmess["type"] = scheme vmess["server"] = values["add"] vmess["port"] = values["port"] vmess["uuid"] = values["id"] if alterId, ok := values["aid"]; ok { vmess["alterId"] = alterId } else { vmess["alterId"] = 0 } vmess["udp"] = true vmess["xudp"] = true vmess["tls"] = false vmess["skip-cert-verify"] = false vmess["cipher"] = "auto" if cipher, ok := values["scy"]; ok && cipher != "" { vmess["cipher"] = cipher } if sni, ok := values["sni"]; ok && sni != "" { vmess["servername"] = sni } network := strings.ToLower(values["net"].(string)) if values["type"] == "http" { network = "http" } else if network == "http" { network = "h2" } vmess["network"] = network tls := strings.ToLower(values["tls"].(string)) if strings.HasSuffix(tls, "tls") { vmess["tls"] = true } switch network { case "http": headers := make(map[string]any) httpOpts := make(map[string]any) if host, ok := values["host"]; ok && host != "" { headers["Host"] = []string{host.(string)} } httpOpts["path"] = []string{"/"} if path, ok := values["path"]; ok && path != "" { httpOpts["path"] = []string{path.(string)} } httpOpts["headers"] = headers vmess["http-opts"] = httpOpts case "h2": headers := make(map[string]any) h2Opts := make(map[string]any) if host, ok := values["host"]; ok && host != "" { headers["Host"] = []string{host.(string)} } h2Opts["path"] = values["path"] h2Opts["headers"] = headers vmess["h2-opts"] = h2Opts case "ws": headers := make(map[string]any) wsOpts := make(map[string]any) wsOpts["path"] = []string{"/"} if host, ok := values["host"]; ok && host != "" { headers["Host"] = host.(string) } if path, ok := values["path"]; ok && path != "" { wsOpts["path"] = path.(string) } wsOpts["headers"] = headers vmess["ws-opts"] = wsOpts case "grpc": grpcOpts := make(map[string]any) grpcOpts["grpc-service-name"] = values["path"] vmess["grpc-opts"] = grpcOpts } proxies = append(proxies, vmess) case "ss": urlSS, err := url.Parse(line) if err != nil { continue } name := uniqueName(names, urlSS.Fragment) port := urlSS.Port() if port == "" { dcBuf, err := encRaw.DecodeString(urlSS.Host) if err != nil { continue } urlSS, err = url.Parse("ss://" + string(dcBuf)) if err != nil { continue } } var ( cipherRaw = urlSS.User.Username() cipher string password string ) if password, found = urlSS.User.Password(); !found { dcBuf, _ := enc.DecodeString(cipherRaw) cipher, password, found = strings.Cut(string(dcBuf), ":") if !found { continue } err := VerifyMethod(cipher, password) if err != nil { dcBuf, _ := encRaw.DecodeString(cipherRaw) cipher, password, found = strings.Cut(string(dcBuf), ":") } } ss := make(map[string]any, 10) ss["name"] = name ss["type"] = scheme ss["server"] = urlSS.Hostname() ss["port"] = urlSS.Port() ss["cipher"] = cipher ss["password"] = password query := urlSS.Query() ss["udp"] = true if query.Get("udp-over-tcp") == "true" || query.Get("uot") == "1" { ss["udp-over-tcp"] = true } if strings.Contains(query.Get("plugin"), "obfs") { obfsParams := strings.Split(query.Get("plugin"), ";") ss["plugin"] = "obfs" ss["plugin-opts"] = map[string]any{ "host": obfsParams[2][10:], "mode": obfsParams[1][5:], } } proxies = append(proxies, ss) case "ssr": dcBuf, err := encRaw.DecodeString(body) if err != nil { continue } // ssr://host:port:protocol:method:obfs:urlsafebase64pass/?obfsparam=urlsafebase64&protoparam=&remarks=urlsafebase64&group=urlsafebase64&udpport=0&uot=1 before, after, ok := strings.Cut(string(dcBuf), "/?") if !ok { continue } beforeArr := strings.Split(before, ":") if len(beforeArr) != 6 { continue } host := beforeArr[0] port := beforeArr[1] protocol := beforeArr[2] method := beforeArr[3] obfs := beforeArr[4] password := decodeUrlSafe(urlSafe(beforeArr[5])) query, err := url.ParseQuery(urlSafe(after)) if err != nil { continue } remarks := decodeUrlSafe(query.Get("remarks")) name := uniqueName(names, remarks) obfsParam := decodeUrlSafe(query.Get("obfsparam")) protocolParam := query.Get("protoparam") ssr := make(map[string]any, 20) ssr["name"] = name ssr["type"] = scheme ssr["server"] = host ssr["port"] = port ssr["cipher"] = method ssr["password"] = password ssr["obfs"] = obfs ssr["protocol"] = protocol ssr["udp"] = true if obfsParam != "" { ssr["obfs-param"] = obfsParam } if protocolParam != "" { ssr["protocol-param"] = protocolParam } proxies = append(proxies, ssr) } } if len(proxies) == 0 { return nil, fmt.Errorf("convert v2ray subscribe error: format invalid") } return proxies, nil } func uniqueName(names map[string]int, name string) string { if index, ok := names[name]; ok { index++ names[name] = index name = fmt.Sprintf("%s-%02d", name, index) } else { index = 0 names[name] = index } return name }