subService.go 43 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537
  1. package sub
  2. import (
  3. "encoding/base64"
  4. "fmt"
  5. "maps"
  6. "net"
  7. "net/url"
  8. "slices"
  9. "strings"
  10. "time"
  11. "github.com/gin-gonic/gin"
  12. "github.com/goccy/go-json"
  13. "github.com/mhsanaei/3x-ui/v2/database"
  14. "github.com/mhsanaei/3x-ui/v2/database/model"
  15. "github.com/mhsanaei/3x-ui/v2/logger"
  16. "github.com/mhsanaei/3x-ui/v2/util/common"
  17. "github.com/mhsanaei/3x-ui/v2/util/random"
  18. "github.com/mhsanaei/3x-ui/v2/web/service"
  19. "github.com/mhsanaei/3x-ui/v2/xray"
  20. )
  21. // SubService provides business logic for generating subscription links and managing subscription data.
  22. type SubService struct {
  23. address string
  24. showInfo bool
  25. remarkModel string
  26. datepicker string
  27. inboundService service.InboundService
  28. settingService service.SettingService
  29. }
  30. // NewSubService creates a new subscription service with the given configuration.
  31. func NewSubService(showInfo bool, remarkModel string) *SubService {
  32. return &SubService{
  33. showInfo: showInfo,
  34. remarkModel: remarkModel,
  35. }
  36. }
  37. // GetSubs retrieves subscription links for a given subscription ID and host.
  38. func (s *SubService) GetSubs(subId string, host string) ([]string, int64, xray.ClientTraffic, error) {
  39. s.address = host
  40. var result []string
  41. var traffic xray.ClientTraffic
  42. var lastOnline int64
  43. var hasEnabledClient bool
  44. var clientTraffics []xray.ClientTraffic
  45. inbounds, err := s.getInboundsBySubId(subId)
  46. if err != nil {
  47. return nil, 0, traffic, err
  48. }
  49. if len(inbounds) == 0 {
  50. return nil, 0, traffic, common.NewError("No inbounds found with ", subId)
  51. }
  52. s.datepicker, err = s.settingService.GetDatepicker()
  53. if err != nil {
  54. s.datepicker = "gregorian"
  55. }
  56. for _, inbound := range inbounds {
  57. clients, err := s.inboundService.GetClients(inbound)
  58. if err != nil {
  59. logger.Error("SubService - GetClients: Unable to get clients from inbound")
  60. }
  61. if clients == nil {
  62. continue
  63. }
  64. if len(inbound.Listen) > 0 && inbound.Listen[0] == '@' {
  65. listen, port, streamSettings, err := s.getFallbackMaster(inbound.Listen, inbound.StreamSettings)
  66. if err == nil {
  67. inbound.Listen = listen
  68. inbound.Port = port
  69. inbound.StreamSettings = streamSettings
  70. }
  71. }
  72. for _, client := range clients {
  73. if client.SubID == subId {
  74. if client.Enable {
  75. hasEnabledClient = true
  76. }
  77. link := s.getLink(inbound, client.Email)
  78. result = append(result, link)
  79. ct := s.getClientTraffics(inbound.ClientStats, client.Email)
  80. clientTraffics = append(clientTraffics, ct)
  81. if ct.LastOnline > lastOnline {
  82. lastOnline = ct.LastOnline
  83. }
  84. }
  85. }
  86. }
  87. // Prepare statistics
  88. for index, clientTraffic := range clientTraffics {
  89. if index == 0 {
  90. traffic.Up = clientTraffic.Up
  91. traffic.Down = clientTraffic.Down
  92. traffic.Total = clientTraffic.Total
  93. if clientTraffic.ExpiryTime > 0 {
  94. traffic.ExpiryTime = clientTraffic.ExpiryTime
  95. }
  96. } else {
  97. traffic.Up += clientTraffic.Up
  98. traffic.Down += clientTraffic.Down
  99. if traffic.Total == 0 || clientTraffic.Total == 0 {
  100. traffic.Total = 0
  101. } else {
  102. traffic.Total += clientTraffic.Total
  103. }
  104. if clientTraffic.ExpiryTime != traffic.ExpiryTime {
  105. traffic.ExpiryTime = 0
  106. }
  107. }
  108. }
  109. traffic.Enable = hasEnabledClient
  110. return result, lastOnline, traffic, nil
  111. }
  112. func (s *SubService) getInboundsBySubId(subId string) ([]*model.Inbound, error) {
  113. db := database.GetDB()
  114. var inbounds []*model.Inbound
  115. // allow "hysteria2" so imports stored with the literal v2 protocol
  116. // string still surface here (#4081)
  117. err := db.Model(model.Inbound{}).Preload("ClientStats").Where(`id in (
  118. SELECT DISTINCT inbounds.id
  119. FROM inbounds,
  120. JSON_EACH(JSON_EXTRACT(inbounds.settings, '$.clients')) AS client
  121. WHERE
  122. protocol in ('vmess','vless','trojan','shadowsocks','hysteria','hysteria2')
  123. AND JSON_EXTRACT(client.value, '$.subId') = ? AND enable = ?
  124. )`, subId, true).Find(&inbounds).Error
  125. if err != nil {
  126. return nil, err
  127. }
  128. return inbounds, nil
  129. }
  130. func (s *SubService) getClientTraffics(traffics []xray.ClientTraffic, email string) xray.ClientTraffic {
  131. for _, traffic := range traffics {
  132. if traffic.Email == email {
  133. return traffic
  134. }
  135. }
  136. return xray.ClientTraffic{}
  137. }
  138. func (s *SubService) getFallbackMaster(dest string, streamSettings string) (string, int, string, error) {
  139. db := database.GetDB()
  140. var inbound *model.Inbound
  141. err := db.Model(model.Inbound{}).
  142. Where("JSON_TYPE(settings, '$.fallbacks') = 'array'").
  143. Where("EXISTS (SELECT * FROM json_each(settings, '$.fallbacks') WHERE json_extract(value, '$.dest') = ?)", dest).
  144. Find(&inbound).Error
  145. if err != nil {
  146. return "", 0, "", err
  147. }
  148. var stream map[string]any
  149. json.Unmarshal([]byte(streamSettings), &stream)
  150. var masterStream map[string]any
  151. json.Unmarshal([]byte(inbound.StreamSettings), &masterStream)
  152. stream["security"] = masterStream["security"]
  153. stream["tlsSettings"] = masterStream["tlsSettings"]
  154. stream["externalProxy"] = masterStream["externalProxy"]
  155. modifiedStream, _ := json.MarshalIndent(stream, "", " ")
  156. return inbound.Listen, inbound.Port, string(modifiedStream), nil
  157. }
  158. func (s *SubService) getLink(inbound *model.Inbound, email string) string {
  159. switch inbound.Protocol {
  160. case "vmess":
  161. return s.genVmessLink(inbound, email)
  162. case "vless":
  163. return s.genVlessLink(inbound, email)
  164. case "trojan":
  165. return s.genTrojanLink(inbound, email)
  166. case "shadowsocks":
  167. return s.genShadowsocksLink(inbound, email)
  168. case "hysteria", "hysteria2":
  169. return s.genHysteriaLink(inbound, email)
  170. }
  171. return ""
  172. }
  173. // Protocol link generators are intentionally ordered as:
  174. // vmess -> vless -> trojan -> shadowsocks -> hysteria.
  175. func (s *SubService) genVmessLink(inbound *model.Inbound, email string) string {
  176. if inbound.Protocol != model.VMESS {
  177. return ""
  178. }
  179. address := s.resolveInboundAddress(inbound)
  180. obj := map[string]any{
  181. "v": "2",
  182. "add": address,
  183. "port": inbound.Port,
  184. "type": "none",
  185. }
  186. stream := unmarshalStreamSettings(inbound.StreamSettings)
  187. network, _ := stream["network"].(string)
  188. applyVmessNetworkParams(stream, network, obj)
  189. if finalmask, ok := stream["finalmask"].(map[string]any); ok {
  190. applyFinalMaskObj(finalmask, obj)
  191. }
  192. security, _ := stream["security"].(string)
  193. obj["tls"] = security
  194. if security == "tls" {
  195. applyVmessTLSParams(stream, obj)
  196. }
  197. clients, _ := s.inboundService.GetClients(inbound)
  198. clientIndex := findClientIndex(clients, email)
  199. obj["id"] = clients[clientIndex].ID
  200. obj["scy"] = clients[clientIndex].Security
  201. externalProxies, _ := stream["externalProxy"].([]any)
  202. if len(externalProxies) > 0 {
  203. return s.buildVmessExternalProxyLinks(externalProxies, obj, inbound, email)
  204. }
  205. obj["ps"] = s.genRemark(inbound, email, "")
  206. return buildVmessLink(obj)
  207. }
  208. func (s *SubService) genVlessLink(inbound *model.Inbound, email string) string {
  209. if inbound.Protocol != model.VLESS {
  210. return ""
  211. }
  212. address := s.resolveInboundAddress(inbound)
  213. stream := unmarshalStreamSettings(inbound.StreamSettings)
  214. clients, _ := s.inboundService.GetClients(inbound)
  215. clientIndex := findClientIndex(clients, email)
  216. uuid := clients[clientIndex].ID
  217. port := inbound.Port
  218. streamNetwork := stream["network"].(string)
  219. params := make(map[string]string)
  220. params["type"] = streamNetwork
  221. // Add encryption parameter for VLESS from inbound settings
  222. var settings map[string]any
  223. json.Unmarshal([]byte(inbound.Settings), &settings)
  224. if encryption, ok := settings["encryption"].(string); ok {
  225. params["encryption"] = encryption
  226. }
  227. applyShareNetworkParams(stream, streamNetwork, params)
  228. if finalmask, ok := stream["finalmask"].(map[string]any); ok {
  229. applyFinalMaskParams(finalmask, params)
  230. }
  231. security, _ := stream["security"].(string)
  232. switch security {
  233. case "tls":
  234. applyShareTLSParams(stream, params)
  235. if streamNetwork == "tcp" && len(clients[clientIndex].Flow) > 0 {
  236. params["flow"] = clients[clientIndex].Flow
  237. }
  238. case "reality":
  239. applyShareRealityParams(stream, params)
  240. if streamNetwork == "tcp" && len(clients[clientIndex].Flow) > 0 {
  241. params["flow"] = clients[clientIndex].Flow
  242. }
  243. default:
  244. params["security"] = "none"
  245. }
  246. externalProxies, _ := stream["externalProxy"].([]any)
  247. if len(externalProxies) > 0 {
  248. return s.buildExternalProxyURLLinks(
  249. externalProxies,
  250. params,
  251. security,
  252. func(dest string, port int) string {
  253. return fmt.Sprintf("vless://%s@%s:%d", uuid, dest, port)
  254. },
  255. func(ep map[string]any) string {
  256. return s.genRemark(inbound, email, ep["remark"].(string))
  257. },
  258. )
  259. }
  260. link := fmt.Sprintf("vless://%s@%s:%d", uuid, address, port)
  261. return buildLinkWithParams(link, params, s.genRemark(inbound, email, ""))
  262. }
  263. func (s *SubService) genTrojanLink(inbound *model.Inbound, email string) string {
  264. if inbound.Protocol != model.Trojan {
  265. return ""
  266. }
  267. address := s.resolveInboundAddress(inbound)
  268. stream := unmarshalStreamSettings(inbound.StreamSettings)
  269. clients, _ := s.inboundService.GetClients(inbound)
  270. clientIndex := findClientIndex(clients, email)
  271. password := clients[clientIndex].Password
  272. port := inbound.Port
  273. streamNetwork := stream["network"].(string)
  274. params := make(map[string]string)
  275. params["type"] = streamNetwork
  276. applyShareNetworkParams(stream, streamNetwork, params)
  277. if finalmask, ok := stream["finalmask"].(map[string]any); ok {
  278. applyFinalMaskParams(finalmask, params)
  279. }
  280. security, _ := stream["security"].(string)
  281. switch security {
  282. case "tls":
  283. applyShareTLSParams(stream, params)
  284. case "reality":
  285. applyShareRealityParams(stream, params)
  286. if streamNetwork == "tcp" && len(clients[clientIndex].Flow) > 0 {
  287. params["flow"] = clients[clientIndex].Flow
  288. }
  289. default:
  290. params["security"] = "none"
  291. }
  292. externalProxies, _ := stream["externalProxy"].([]any)
  293. if len(externalProxies) > 0 {
  294. return s.buildExternalProxyURLLinks(
  295. externalProxies,
  296. params,
  297. security,
  298. func(dest string, port int) string {
  299. return fmt.Sprintf("trojan://%s@%s:%d", password, dest, port)
  300. },
  301. func(ep map[string]any) string {
  302. return s.genRemark(inbound, email, ep["remark"].(string))
  303. },
  304. )
  305. }
  306. link := fmt.Sprintf("trojan://%s@%s:%d", password, address, port)
  307. return buildLinkWithParams(link, params, s.genRemark(inbound, email, ""))
  308. }
  309. func (s *SubService) genShadowsocksLink(inbound *model.Inbound, email string) string {
  310. if inbound.Protocol != model.Shadowsocks {
  311. return ""
  312. }
  313. address := s.resolveInboundAddress(inbound)
  314. stream := unmarshalStreamSettings(inbound.StreamSettings)
  315. clients, _ := s.inboundService.GetClients(inbound)
  316. var settings map[string]any
  317. json.Unmarshal([]byte(inbound.Settings), &settings)
  318. inboundPassword := settings["password"].(string)
  319. method := settings["method"].(string)
  320. clientIndex := findClientIndex(clients, email)
  321. streamNetwork := stream["network"].(string)
  322. params := make(map[string]string)
  323. params["type"] = streamNetwork
  324. applyShareNetworkParams(stream, streamNetwork, params)
  325. if finalmask, ok := stream["finalmask"].(map[string]any); ok {
  326. applyFinalMaskParams(finalmask, params)
  327. }
  328. security, _ := stream["security"].(string)
  329. if security == "tls" {
  330. applyShareTLSParams(stream, params)
  331. }
  332. encPart := fmt.Sprintf("%s:%s", method, clients[clientIndex].Password)
  333. if method[0] == '2' {
  334. encPart = fmt.Sprintf("%s:%s:%s", method, inboundPassword, clients[clientIndex].Password)
  335. }
  336. externalProxies, _ := stream["externalProxy"].([]any)
  337. if len(externalProxies) > 0 {
  338. proxyParams := cloneStringMap(params)
  339. proxyParams["security"] = security
  340. return s.buildExternalProxyURLLinks(
  341. externalProxies,
  342. proxyParams,
  343. security,
  344. func(dest string, port int) string {
  345. return fmt.Sprintf("ss://%s@%s:%d", base64.StdEncoding.EncodeToString([]byte(encPart)), dest, port)
  346. },
  347. func(ep map[string]any) string {
  348. return s.genRemark(inbound, email, ep["remark"].(string))
  349. },
  350. )
  351. }
  352. link := fmt.Sprintf("ss://%s@%s:%d", base64.StdEncoding.EncodeToString([]byte(encPart)), address, inbound.Port)
  353. return buildLinkWithParams(link, params, s.genRemark(inbound, email, ""))
  354. }
  355. func (s *SubService) genHysteriaLink(inbound *model.Inbound, email string) string {
  356. if !model.IsHysteria(inbound.Protocol) {
  357. return ""
  358. }
  359. var stream map[string]any
  360. json.Unmarshal([]byte(inbound.StreamSettings), &stream)
  361. clients, _ := s.inboundService.GetClients(inbound)
  362. clientIndex := -1
  363. for i, client := range clients {
  364. if client.Email == email {
  365. clientIndex = i
  366. break
  367. }
  368. }
  369. auth := clients[clientIndex].Auth
  370. params := make(map[string]string)
  371. params["security"] = "tls"
  372. tlsSetting, _ := stream["tlsSettings"].(map[string]any)
  373. alpns, _ := tlsSetting["alpn"].([]any)
  374. var alpn []string
  375. for _, a := range alpns {
  376. alpn = append(alpn, a.(string))
  377. }
  378. if len(alpn) > 0 {
  379. params["alpn"] = strings.Join(alpn, ",")
  380. }
  381. if sniValue, ok := searchKey(tlsSetting, "serverName"); ok {
  382. params["sni"], _ = sniValue.(string)
  383. }
  384. tlsSettings, _ := searchKey(tlsSetting, "settings")
  385. if tlsSetting != nil {
  386. if fpValue, ok := searchKey(tlsSettings, "fingerprint"); ok {
  387. params["fp"], _ = fpValue.(string)
  388. }
  389. if insecure, ok := searchKey(tlsSettings, "allowInsecure"); ok {
  390. if insecure.(bool) {
  391. params["insecure"] = "1"
  392. }
  393. }
  394. }
  395. // salamander obfs (Hysteria2). The panel-side link generator already
  396. // emits these; keep the subscription output in sync so a client has
  397. // the obfs password to match the server.
  398. if finalmask, ok := stream["finalmask"].(map[string]any); ok {
  399. applyFinalMaskParams(finalmask, params)
  400. if udpMasks, ok := finalmask["udp"].([]any); ok {
  401. for _, m := range udpMasks {
  402. mask, _ := m.(map[string]any)
  403. if mask == nil || mask["type"] != "salamander" {
  404. continue
  405. }
  406. settings, _ := mask["settings"].(map[string]any)
  407. if pw, ok := settings["password"].(string); ok && pw != "" {
  408. params["obfs"] = "salamander"
  409. params["obfs-password"] = pw
  410. break
  411. }
  412. }
  413. }
  414. }
  415. var settings map[string]any
  416. json.Unmarshal([]byte(inbound.Settings), &settings)
  417. version, _ := settings["version"].(float64)
  418. protocol := "hysteria2"
  419. if int(version) == 1 {
  420. protocol = "hysteria"
  421. }
  422. // Fan out one link per External Proxy entry if any. Previously this
  423. // generator ignored `externalProxy` entirely, so the link kept the
  424. // server's own IP/port even when the admin configured an alternate
  425. // endpoint (e.g. a CDN hostname + port that forwards to the node).
  426. // Matches the behaviour of genVlessLink / genTrojanLink / ….
  427. externalProxies, _ := stream["externalProxy"].([]any)
  428. if len(externalProxies) > 0 {
  429. links := make([]string, 0, len(externalProxies))
  430. for _, externalProxy := range externalProxies {
  431. ep, ok := externalProxy.(map[string]any)
  432. if !ok {
  433. continue
  434. }
  435. dest, _ := ep["dest"].(string)
  436. portF, okPort := ep["port"].(float64)
  437. if dest == "" || !okPort {
  438. continue
  439. }
  440. epRemark, _ := ep["remark"].(string)
  441. link := fmt.Sprintf("%s://%s@%s:%d", protocol, auth, dest, int(portF))
  442. u, _ := url.Parse(link)
  443. q := u.Query()
  444. for k, v := range params {
  445. q.Add(k, v)
  446. }
  447. u.RawQuery = q.Encode()
  448. u.Fragment = s.genRemark(inbound, email, epRemark)
  449. links = append(links, u.String())
  450. }
  451. return strings.Join(links, "\n")
  452. }
  453. // No external proxy configured — fall back to the request host.
  454. link := fmt.Sprintf("%s://%s@%s:%d", protocol, auth, s.address, inbound.Port)
  455. url, _ := url.Parse(link)
  456. q := url.Query()
  457. for k, v := range params {
  458. q.Add(k, v)
  459. }
  460. url.RawQuery = q.Encode()
  461. url.Fragment = s.genRemark(inbound, email, "")
  462. return url.String()
  463. }
  464. func (s *SubService) resolveInboundAddress(inbound *model.Inbound) string {
  465. if inbound.Listen == "" || inbound.Listen == "0.0.0.0" || inbound.Listen == "::" || inbound.Listen == "::0" {
  466. return s.address
  467. }
  468. return inbound.Listen
  469. }
  470. func findClientIndex(clients []model.Client, email string) int {
  471. for i, client := range clients {
  472. if client.Email == email {
  473. return i
  474. }
  475. }
  476. return -1
  477. }
  478. func unmarshalStreamSettings(streamSettings string) map[string]any {
  479. var stream map[string]any
  480. json.Unmarshal([]byte(streamSettings), &stream)
  481. return stream
  482. }
  483. func applyPathAndHostParams(settings map[string]any, params map[string]string) {
  484. params["path"] = settings["path"].(string)
  485. if host, ok := settings["host"].(string); ok && len(host) > 0 {
  486. params["host"] = host
  487. } else {
  488. headers, _ := settings["headers"].(map[string]any)
  489. params["host"] = searchHost(headers)
  490. }
  491. }
  492. func applyPathAndHostObj(settings map[string]any, obj map[string]any) {
  493. obj["path"] = settings["path"].(string)
  494. if host, ok := settings["host"].(string); ok && len(host) > 0 {
  495. obj["host"] = host
  496. } else {
  497. headers, _ := settings["headers"].(map[string]any)
  498. obj["host"] = searchHost(headers)
  499. }
  500. }
  501. func applyShareNetworkParams(stream map[string]any, streamNetwork string, params map[string]string) {
  502. switch streamNetwork {
  503. case "tcp":
  504. tcp, _ := stream["tcpSettings"].(map[string]any)
  505. header, _ := tcp["header"].(map[string]any)
  506. typeStr, _ := header["type"].(string)
  507. if typeStr == "http" {
  508. request := header["request"].(map[string]any)
  509. requestPath, _ := request["path"].([]any)
  510. params["path"] = requestPath[0].(string)
  511. headers, _ := request["headers"].(map[string]any)
  512. params["host"] = searchHost(headers)
  513. params["headerType"] = "http"
  514. }
  515. case "kcp":
  516. applyKcpShareParams(stream, params)
  517. case "ws":
  518. ws, _ := stream["wsSettings"].(map[string]any)
  519. applyPathAndHostParams(ws, params)
  520. case "grpc":
  521. grpc, _ := stream["grpcSettings"].(map[string]any)
  522. params["serviceName"] = grpc["serviceName"].(string)
  523. params["authority"], _ = grpc["authority"].(string)
  524. if grpc["multiMode"].(bool) {
  525. params["mode"] = "multi"
  526. }
  527. case "httpupgrade":
  528. httpupgrade, _ := stream["httpupgradeSettings"].(map[string]any)
  529. applyPathAndHostParams(httpupgrade, params)
  530. case "xhttp":
  531. xhttp, _ := stream["xhttpSettings"].(map[string]any)
  532. applyXhttpExtraParams(xhttp, params)
  533. }
  534. }
  535. // applyXhttpExtraObj copies the bidirectional xhttp settings into the
  536. // VMess base64 JSON link object. VMess supports arbitrary keys, so we
  537. // flatten the SplitHTTPConfig "extra" fields directly onto obj.
  538. func applyXhttpExtraObj(xhttp map[string]any, obj map[string]any) {
  539. if xpb, ok := xhttp["xPaddingBytes"].(string); ok && len(xpb) > 0 {
  540. obj["x_padding_bytes"] = xpb
  541. }
  542. maps.Copy(obj, buildXhttpExtra(xhttp))
  543. }
  544. func applyVmessNetworkParams(stream map[string]any, network string, obj map[string]any) {
  545. obj["net"] = network
  546. switch network {
  547. case "tcp":
  548. tcp, _ := stream["tcpSettings"].(map[string]any)
  549. header, _ := tcp["header"].(map[string]any)
  550. typeStr, _ := header["type"].(string)
  551. obj["type"] = typeStr
  552. if typeStr == "http" {
  553. request := header["request"].(map[string]any)
  554. requestPath, _ := request["path"].([]any)
  555. obj["path"] = requestPath[0].(string)
  556. headers, _ := request["headers"].(map[string]any)
  557. obj["host"] = searchHost(headers)
  558. }
  559. case "kcp":
  560. applyKcpShareObj(stream, obj)
  561. case "ws":
  562. ws, _ := stream["wsSettings"].(map[string]any)
  563. applyPathAndHostObj(ws, obj)
  564. case "grpc":
  565. grpc, _ := stream["grpcSettings"].(map[string]any)
  566. obj["path"] = grpc["serviceName"].(string)
  567. obj["authority"] = grpc["authority"].(string)
  568. if grpc["multiMode"].(bool) {
  569. obj["type"] = "multi"
  570. }
  571. case "httpupgrade":
  572. httpupgrade, _ := stream["httpupgradeSettings"].(map[string]any)
  573. applyPathAndHostObj(httpupgrade, obj)
  574. case "xhttp":
  575. xhttp, _ := stream["xhttpSettings"].(map[string]any)
  576. applyPathAndHostObj(xhttp, obj)
  577. if mode, ok := xhttp["mode"].(string); ok {
  578. obj["mode"] = mode
  579. }
  580. applyXhttpExtraObj(xhttp, obj)
  581. }
  582. }
  583. func applyShareTLSParams(stream map[string]any, params map[string]string) {
  584. params["security"] = "tls"
  585. tlsSetting, _ := stream["tlsSettings"].(map[string]any)
  586. alpns, _ := tlsSetting["alpn"].([]any)
  587. var alpn []string
  588. for _, a := range alpns {
  589. alpn = append(alpn, a.(string))
  590. }
  591. if len(alpn) > 0 {
  592. params["alpn"] = strings.Join(alpn, ",")
  593. }
  594. if sniValue, ok := searchKey(tlsSetting, "serverName"); ok {
  595. params["sni"], _ = sniValue.(string)
  596. }
  597. tlsSettings, _ := searchKey(tlsSetting, "settings")
  598. if tlsSetting != nil {
  599. if fpValue, ok := searchKey(tlsSettings, "fingerprint"); ok {
  600. params["fp"], _ = fpValue.(string)
  601. }
  602. }
  603. }
  604. func applyVmessTLSParams(stream map[string]any, obj map[string]any) {
  605. tlsSetting, _ := stream["tlsSettings"].(map[string]any)
  606. alpns, _ := tlsSetting["alpn"].([]any)
  607. if len(alpns) > 0 {
  608. var alpn []string
  609. for _, a := range alpns {
  610. alpn = append(alpn, a.(string))
  611. }
  612. obj["alpn"] = strings.Join(alpn, ",")
  613. }
  614. if sniValue, ok := searchKey(tlsSetting, "serverName"); ok {
  615. obj["sni"], _ = sniValue.(string)
  616. }
  617. tlsSettings, _ := searchKey(tlsSetting, "settings")
  618. if tlsSetting != nil {
  619. if fpValue, ok := searchKey(tlsSettings, "fingerprint"); ok {
  620. obj["fp"], _ = fpValue.(string)
  621. }
  622. }
  623. }
  624. func applyShareRealityParams(stream map[string]any, params map[string]string) {
  625. params["security"] = "reality"
  626. realitySetting, _ := stream["realitySettings"].(map[string]any)
  627. realitySettings, _ := searchKey(realitySetting, "settings")
  628. if realitySetting != nil {
  629. if sniValue, ok := searchKey(realitySetting, "serverNames"); ok {
  630. sNames, _ := sniValue.([]any)
  631. params["sni"] = sNames[random.Num(len(sNames))].(string)
  632. }
  633. if pbkValue, ok := searchKey(realitySettings, "publicKey"); ok {
  634. params["pbk"], _ = pbkValue.(string)
  635. }
  636. if sidValue, ok := searchKey(realitySetting, "shortIds"); ok {
  637. shortIds, _ := sidValue.([]any)
  638. params["sid"] = shortIds[random.Num(len(shortIds))].(string)
  639. }
  640. if fpValue, ok := searchKey(realitySettings, "fingerprint"); ok {
  641. if fp, ok := fpValue.(string); ok && len(fp) > 0 {
  642. params["fp"] = fp
  643. }
  644. }
  645. if pqvValue, ok := searchKey(realitySettings, "mldsa65Verify"); ok {
  646. if pqv, ok := pqvValue.(string); ok && len(pqv) > 0 {
  647. params["pqv"] = pqv
  648. }
  649. }
  650. params["spx"] = "/" + random.Seq(15)
  651. }
  652. }
  653. func buildVmessLink(obj map[string]any) string {
  654. jsonStr, _ := json.MarshalIndent(obj, "", " ")
  655. return "vmess://" + base64.StdEncoding.EncodeToString(jsonStr)
  656. }
  657. func cloneVmessShareObj(baseObj map[string]any, newSecurity string) map[string]any {
  658. newObj := map[string]any{}
  659. for key, value := range baseObj {
  660. if !(newSecurity == "none" && (key == "alpn" || key == "sni" || key == "fp")) {
  661. newObj[key] = value
  662. }
  663. }
  664. return newObj
  665. }
  666. func (s *SubService) buildVmessExternalProxyLinks(externalProxies []any, baseObj map[string]any, inbound *model.Inbound, email string) string {
  667. var links strings.Builder
  668. for index, externalProxy := range externalProxies {
  669. ep, _ := externalProxy.(map[string]any)
  670. newSecurity, _ := ep["forceTls"].(string)
  671. newObj := cloneVmessShareObj(baseObj, newSecurity)
  672. newObj["ps"] = s.genRemark(inbound, email, ep["remark"].(string))
  673. newObj["add"] = ep["dest"].(string)
  674. newObj["port"] = int(ep["port"].(float64))
  675. if newSecurity != "same" {
  676. newObj["tls"] = newSecurity
  677. }
  678. if index > 0 {
  679. links.WriteString("\n")
  680. }
  681. links.WriteString(buildVmessLink(newObj))
  682. }
  683. return links.String()
  684. }
  685. func buildLinkWithParams(link string, params map[string]string, fragment string) string {
  686. parsedURL, _ := url.Parse(link)
  687. q := parsedURL.Query()
  688. for k, v := range params {
  689. q.Add(k, v)
  690. }
  691. parsedURL.RawQuery = q.Encode()
  692. parsedURL.Fragment = fragment
  693. return parsedURL.String()
  694. }
  695. func buildLinkWithParamsAndSecurity(link string, params map[string]string, fragment, security string, omitTLSFields bool) string {
  696. parsedURL, _ := url.Parse(link)
  697. q := parsedURL.Query()
  698. for k, v := range params {
  699. if k == "security" {
  700. v = security
  701. }
  702. if omitTLSFields && (k == "alpn" || k == "sni" || k == "fp") {
  703. continue
  704. }
  705. q.Add(k, v)
  706. }
  707. parsedURL.RawQuery = q.Encode()
  708. parsedURL.Fragment = fragment
  709. return parsedURL.String()
  710. }
  711. func (s *SubService) buildExternalProxyURLLinks(
  712. externalProxies []any,
  713. params map[string]string,
  714. baseSecurity string,
  715. makeLink func(dest string, port int) string,
  716. makeRemark func(ep map[string]any) string,
  717. ) string {
  718. links := make([]string, 0, len(externalProxies))
  719. for _, externalProxy := range externalProxies {
  720. ep, _ := externalProxy.(map[string]any)
  721. newSecurity, _ := ep["forceTls"].(string)
  722. dest, _ := ep["dest"].(string)
  723. port := int(ep["port"].(float64))
  724. securityToApply := baseSecurity
  725. if newSecurity != "same" {
  726. securityToApply = newSecurity
  727. }
  728. links = append(
  729. links,
  730. buildLinkWithParamsAndSecurity(
  731. makeLink(dest, port),
  732. params,
  733. makeRemark(ep),
  734. securityToApply,
  735. newSecurity == "none",
  736. ),
  737. )
  738. }
  739. return strings.Join(links, "\n")
  740. }
  741. func cloneStringMap(source map[string]string) map[string]string {
  742. cloned := make(map[string]string, len(source))
  743. maps.Copy(cloned, source)
  744. return cloned
  745. }
  746. func (s *SubService) genRemark(inbound *model.Inbound, email string, extra string) string {
  747. separationChar := string(s.remarkModel[0])
  748. orderChars := s.remarkModel[1:]
  749. orders := map[byte]string{
  750. 'i': "",
  751. 'e': "",
  752. 'o': "",
  753. }
  754. if len(email) > 0 {
  755. orders['e'] = email
  756. }
  757. if len(inbound.Remark) > 0 {
  758. orders['i'] = inbound.Remark
  759. }
  760. if len(extra) > 0 {
  761. orders['o'] = extra
  762. }
  763. var remark []string
  764. for i := 0; i < len(orderChars); i++ {
  765. char := orderChars[i]
  766. order, exists := orders[char]
  767. if exists && order != "" {
  768. remark = append(remark, order)
  769. }
  770. }
  771. if s.showInfo {
  772. statsExist := false
  773. var stats xray.ClientTraffic
  774. for _, clientStat := range inbound.ClientStats {
  775. if clientStat.Email == email {
  776. stats = clientStat
  777. statsExist = true
  778. break
  779. }
  780. }
  781. // Get remained days
  782. if statsExist {
  783. if !stats.Enable {
  784. return fmt.Sprintf("⛔️N/A%s%s", separationChar, strings.Join(remark, separationChar))
  785. }
  786. if vol := stats.Total - (stats.Up + stats.Down); vol > 0 {
  787. remark = append(remark, fmt.Sprintf("%s%s", common.FormatTraffic(vol), "📊"))
  788. }
  789. now := time.Now().Unix()
  790. switch exp := stats.ExpiryTime / 1000; {
  791. case exp > 0:
  792. remainingSeconds := exp - now
  793. days := remainingSeconds / 86400
  794. hours := (remainingSeconds % 86400) / 3600
  795. minutes := (remainingSeconds % 3600) / 60
  796. if days > 0 {
  797. if hours > 0 {
  798. remark = append(remark, fmt.Sprintf("%dD,%dH⏳", days, hours))
  799. } else {
  800. remark = append(remark, fmt.Sprintf("%dD⏳", days))
  801. }
  802. } else if hours > 0 {
  803. remark = append(remark, fmt.Sprintf("%dH⏳", hours))
  804. } else {
  805. remark = append(remark, fmt.Sprintf("%dM⏳", minutes))
  806. }
  807. case exp < 0:
  808. days := exp / -86400
  809. hours := (exp % -86400) / 3600
  810. minutes := (exp % -3600) / 60
  811. if days > 0 {
  812. if hours > 0 {
  813. remark = append(remark, fmt.Sprintf("%dD,%dH⏳", days, hours))
  814. } else {
  815. remark = append(remark, fmt.Sprintf("%dD⏳", days))
  816. }
  817. } else if hours > 0 {
  818. remark = append(remark, fmt.Sprintf("%dH⏳", hours))
  819. } else {
  820. remark = append(remark, fmt.Sprintf("%dM⏳", minutes))
  821. }
  822. }
  823. }
  824. }
  825. return strings.Join(remark, separationChar)
  826. }
  827. func searchKey(data any, key string) (any, bool) {
  828. switch val := data.(type) {
  829. case map[string]any:
  830. for k, v := range val {
  831. if k == key {
  832. return v, true
  833. }
  834. if result, ok := searchKey(v, key); ok {
  835. return result, true
  836. }
  837. }
  838. case []any:
  839. for _, v := range val {
  840. if result, ok := searchKey(v, key); ok {
  841. return result, true
  842. }
  843. }
  844. }
  845. return nil, false
  846. }
  847. // buildXhttpExtra walks an xhttpSettings map and returns the JSON blob
  848. // that goes into the URL's `extra` param (or, for VMess, the link
  849. // object). Carries ONLY the bidirectional fields from xray-core's
  850. // SplitHTTPConfig — i.e. the ones the server enforces and the client
  851. // must match. Strictly one-sided fields are excluded:
  852. //
  853. // - server-only (noSSEHeader, scMaxBufferedPosts, scStreamUpServerSecs,
  854. // serverMaxHeaderBytes) — client wouldn't read them, so emitting
  855. // them just bloats the URL.
  856. // - client-only (headers, uplinkHTTPMethod, uplinkChunkSize,
  857. // noGRPCHeader, scMinPostsIntervalMs, xmux, downloadSettings) — the
  858. // inbound config doesn't have them; the client configures them
  859. // locally.
  860. //
  861. // Truthy-only guards keep default inbounds emitting the same compact URL
  862. // they did before this helper grew.
  863. func buildXhttpExtra(xhttp map[string]any) map[string]any {
  864. if xhttp == nil {
  865. return nil
  866. }
  867. extra := map[string]any{}
  868. if xpb, ok := xhttp["xPaddingBytes"].(string); ok && len(xpb) > 0 {
  869. extra["xPaddingBytes"] = xpb
  870. }
  871. if obfs, ok := xhttp["xPaddingObfsMode"].(bool); ok && obfs {
  872. extra["xPaddingObfsMode"] = true
  873. for _, field := range []string{"xPaddingKey", "xPaddingHeader", "xPaddingPlacement", "xPaddingMethod"} {
  874. if v, ok := xhttp[field].(string); ok && len(v) > 0 {
  875. extra[field] = v
  876. }
  877. }
  878. }
  879. stringFields := []string{
  880. "sessionPlacement", "sessionKey",
  881. "seqPlacement", "seqKey",
  882. "uplinkDataPlacement", "uplinkDataKey",
  883. "scMaxEachPostBytes",
  884. }
  885. for _, field := range stringFields {
  886. if v, ok := xhttp[field].(string); ok && len(v) > 0 {
  887. extra[field] = v
  888. }
  889. }
  890. // Headers — emitted as the {name: value} map upstream's struct
  891. // expects. The server runtime ignores this field, but the client
  892. // (consuming the share link) honors it. Drop any "host" entry —
  893. // host already wins as a top-level URL param.
  894. if rawHeaders, ok := xhttp["headers"].(map[string]any); ok && len(rawHeaders) > 0 {
  895. out := map[string]any{}
  896. for k, v := range rawHeaders {
  897. if strings.EqualFold(k, "host") {
  898. continue
  899. }
  900. out[k] = v
  901. }
  902. if len(out) > 0 {
  903. extra["headers"] = out
  904. }
  905. }
  906. if len(extra) == 0 {
  907. return nil
  908. }
  909. return extra
  910. }
  911. // applyXhttpExtraParams emits the full xhttp config into the URL query
  912. // params of a vless:// / trojan:// / ss:// link. Sets path/host/mode at
  913. // top level (xray's Build() always lets these win over `extra`) and packs
  914. // everything else into a JSON `extra` param. Also writes the flat
  915. // `x_padding_bytes` param sing-box-family clients understand.
  916. //
  917. // Without this, the admin's custom xPaddingBytes / sessionKey / etc. never
  918. // reach the client and handshakes are silently rejected with
  919. // `invalid padding (...) length: 0` — the client-visible symptom is
  920. // "xhttp doesn't connect" on OpenWRT / sing-box.
  921. //
  922. // Two encodings are written so every popular client can read at least one:
  923. //
  924. // - x_padding_bytes=<range> — flat param, understood by sing-box and its
  925. // derivatives (Podkop, OpenWRT sing-box, Karing, NekoBox, …).
  926. // - extra=<url-encoded-json> — full xhttp settings blob, which is how
  927. // xray-core clients (v2rayNG, Happ, Furious, Exclave, …) pick up the
  928. // bidirectional fields beyond path/host/mode.
  929. func applyXhttpExtraParams(xhttp map[string]any, params map[string]string) {
  930. if xhttp == nil {
  931. return
  932. }
  933. applyPathAndHostParams(xhttp, params)
  934. if mode, ok := xhttp["mode"].(string); ok {
  935. params["mode"] = mode
  936. }
  937. if xpb, ok := xhttp["xPaddingBytes"].(string); ok && len(xpb) > 0 {
  938. params["x_padding_bytes"] = xpb
  939. }
  940. extra := buildXhttpExtra(xhttp)
  941. if extra != nil {
  942. if b, err := json.Marshal(extra); err == nil {
  943. params["extra"] = string(b)
  944. }
  945. }
  946. }
  947. var kcpMaskToHeaderType = map[string]string{
  948. "header-dns": "dns",
  949. "header-dtls": "dtls",
  950. "header-srtp": "srtp",
  951. "header-utp": "utp",
  952. "header-wechat": "wechat-video",
  953. "header-wireguard": "wireguard",
  954. }
  955. var validFinalMaskUDPTypes = map[string]struct{}{
  956. "salamander": {},
  957. "mkcp-aes128gcm": {},
  958. "header-dns": {},
  959. "header-dtls": {},
  960. "header-srtp": {},
  961. "header-utp": {},
  962. "header-wechat": {},
  963. "header-wireguard": {},
  964. "mkcp-original": {},
  965. "xdns": {},
  966. "xicmp": {},
  967. "noise": {},
  968. "header-custom": {},
  969. }
  970. var validFinalMaskTCPTypes = map[string]struct{}{
  971. "header-custom": {},
  972. "fragment": {},
  973. "sudoku": {},
  974. }
  975. // applyKcpShareParams reconstructs legacy KCP share-link fields from either
  976. // the historical kcpSettings.header/seed shape or the current finalmask model.
  977. // This keeps subscription output compatible while avoiding panics when older
  978. // keys are absent from modern inbounds.
  979. func applyKcpShareParams(stream map[string]any, params map[string]string) {
  980. extractKcpShareFields(stream).applyToParams(params)
  981. }
  982. func applyKcpShareObj(stream map[string]any, obj map[string]any) {
  983. extractKcpShareFields(stream).applyToObj(obj)
  984. }
  985. type kcpShareFields struct {
  986. headerType string
  987. seed string
  988. mtu int
  989. tti int
  990. }
  991. func (f kcpShareFields) applyToParams(params map[string]string) {
  992. if f.headerType != "" && f.headerType != "none" {
  993. params["headerType"] = f.headerType
  994. }
  995. setStringParam(params, "seed", f.seed)
  996. setIntParam(params, "mtu", f.mtu)
  997. setIntParam(params, "tti", f.tti)
  998. }
  999. func (f kcpShareFields) applyToObj(obj map[string]any) {
  1000. if f.headerType != "" && f.headerType != "none" {
  1001. obj["type"] = f.headerType
  1002. }
  1003. setStringField(obj, "path", f.seed)
  1004. setIntField(obj, "mtu", f.mtu)
  1005. setIntField(obj, "tti", f.tti)
  1006. }
  1007. func extractKcpShareFields(stream map[string]any) kcpShareFields {
  1008. fields := kcpShareFields{headerType: "none"}
  1009. if kcp, ok := stream["kcpSettings"].(map[string]any); ok {
  1010. if header, ok := kcp["header"].(map[string]any); ok {
  1011. if value, ok := header["type"].(string); ok && value != "" {
  1012. fields.headerType = value
  1013. }
  1014. }
  1015. if value, ok := kcp["seed"].(string); ok && value != "" {
  1016. fields.seed = value
  1017. }
  1018. if value, ok := readPositiveInt(kcp["mtu"]); ok {
  1019. fields.mtu = value
  1020. }
  1021. if value, ok := readPositiveInt(kcp["tti"]); ok {
  1022. fields.tti = value
  1023. }
  1024. }
  1025. for _, rawMask := range normalizedFinalMaskUDPMasks(stream["finalmask"]) {
  1026. mask, _ := rawMask.(map[string]any)
  1027. if mask == nil {
  1028. continue
  1029. }
  1030. maskType, _ := mask["type"].(string)
  1031. if mapped, ok := kcpMaskToHeaderType[maskType]; ok {
  1032. fields.headerType = mapped
  1033. continue
  1034. }
  1035. switch maskType {
  1036. case "mkcp-original":
  1037. fields.seed = ""
  1038. case "mkcp-aes128gcm":
  1039. fields.seed = ""
  1040. settings, _ := mask["settings"].(map[string]any)
  1041. if value, ok := settings["password"].(string); ok && value != "" {
  1042. fields.seed = value
  1043. }
  1044. }
  1045. }
  1046. return fields
  1047. }
  1048. func readPositiveInt(value any) (int, bool) {
  1049. switch number := value.(type) {
  1050. case int:
  1051. return number, number > 0
  1052. case int32:
  1053. return int(number), number > 0
  1054. case int64:
  1055. return int(number), number > 0
  1056. case float32:
  1057. parsed := int(number)
  1058. return parsed, parsed > 0
  1059. case float64:
  1060. parsed := int(number)
  1061. return parsed, parsed > 0
  1062. default:
  1063. return 0, false
  1064. }
  1065. }
  1066. func setStringParam(params map[string]string, key, value string) {
  1067. if value == "" {
  1068. delete(params, key)
  1069. return
  1070. }
  1071. params[key] = value
  1072. }
  1073. func setIntParam(params map[string]string, key string, value int) {
  1074. if value <= 0 {
  1075. delete(params, key)
  1076. return
  1077. }
  1078. params[key] = fmt.Sprintf("%d", value)
  1079. }
  1080. func setStringField(obj map[string]any, key, value string) {
  1081. if value == "" {
  1082. delete(obj, key)
  1083. return
  1084. }
  1085. obj[key] = value
  1086. }
  1087. func setIntField(obj map[string]any, key string, value int) {
  1088. if value <= 0 {
  1089. delete(obj, key)
  1090. return
  1091. }
  1092. obj[key] = value
  1093. }
  1094. // applyFinalMaskParams exports the finalmask payload as the compact
  1095. // `fm=<json>` share-link field used by v2rayN-compatible clients.
  1096. func applyFinalMaskParams(finalmask map[string]any, params map[string]string) {
  1097. if fm, ok := marshalFinalMask(finalmask); ok {
  1098. params["fm"] = fm
  1099. }
  1100. }
  1101. func applyFinalMaskObj(finalmask map[string]any, obj map[string]any) {
  1102. if fm, ok := marshalFinalMask(finalmask); ok {
  1103. obj["fm"] = fm
  1104. }
  1105. }
  1106. func marshalFinalMask(finalmask map[string]any) (string, bool) {
  1107. normalized := normalizeFinalMask(finalmask)
  1108. if !hasFinalMaskContent(normalized) {
  1109. return "", false
  1110. }
  1111. b, err := json.Marshal(normalized)
  1112. if err != nil || len(b) == 0 || string(b) == "null" {
  1113. return "", false
  1114. }
  1115. return string(b), true
  1116. }
  1117. func normalizeFinalMask(finalmask map[string]any) map[string]any {
  1118. tcpMasks := normalizedFinalMaskTCPMasks(finalmask)
  1119. udpMasks := normalizedFinalMaskUDPMasks(finalmask)
  1120. quicParams, hasQuicParams := finalmask["quicParams"].(map[string]any)
  1121. if len(tcpMasks) == 0 && len(udpMasks) == 0 && !hasQuicParams {
  1122. return nil
  1123. }
  1124. result := map[string]any{}
  1125. if len(tcpMasks) > 0 {
  1126. result["tcp"] = tcpMasks
  1127. }
  1128. if len(udpMasks) > 0 {
  1129. result["udp"] = udpMasks
  1130. }
  1131. if hasQuicParams && len(quicParams) > 0 {
  1132. result["quicParams"] = quicParams
  1133. }
  1134. return result
  1135. }
  1136. func normalizedFinalMaskTCPMasks(value any) []any {
  1137. finalmask, _ := value.(map[string]any)
  1138. if finalmask == nil {
  1139. return nil
  1140. }
  1141. rawMasks, _ := finalmask["tcp"].([]any)
  1142. if len(rawMasks) == 0 {
  1143. return nil
  1144. }
  1145. normalized := make([]any, 0, len(rawMasks))
  1146. for _, rawMask := range rawMasks {
  1147. mask, _ := rawMask.(map[string]any)
  1148. if mask == nil {
  1149. continue
  1150. }
  1151. maskType, _ := mask["type"].(string)
  1152. if _, ok := validFinalMaskTCPTypes[maskType]; !ok || maskType == "" {
  1153. continue
  1154. }
  1155. normalizedMask := map[string]any{"type": maskType}
  1156. if settings, ok := mask["settings"].(map[string]any); ok && len(settings) > 0 {
  1157. normalizedMask["settings"] = settings
  1158. }
  1159. normalized = append(normalized, normalizedMask)
  1160. }
  1161. if len(normalized) == 0 {
  1162. return nil
  1163. }
  1164. return normalized
  1165. }
  1166. func normalizedFinalMaskUDPMasks(value any) []any {
  1167. finalmask, _ := value.(map[string]any)
  1168. if finalmask == nil {
  1169. return nil
  1170. }
  1171. rawMasks, _ := finalmask["udp"].([]any)
  1172. if len(rawMasks) == 0 {
  1173. return nil
  1174. }
  1175. normalized := make([]any, 0, len(rawMasks))
  1176. for _, rawMask := range rawMasks {
  1177. mask, _ := rawMask.(map[string]any)
  1178. if mask == nil {
  1179. continue
  1180. }
  1181. maskType, _ := mask["type"].(string)
  1182. if _, ok := validFinalMaskUDPTypes[maskType]; !ok || maskType == "" {
  1183. continue
  1184. }
  1185. normalizedMask := map[string]any{"type": maskType}
  1186. if settings, ok := mask["settings"].(map[string]any); ok && len(settings) > 0 {
  1187. normalizedMask["settings"] = settings
  1188. }
  1189. normalized = append(normalized, normalizedMask)
  1190. }
  1191. if len(normalized) == 0 {
  1192. return nil
  1193. }
  1194. return normalized
  1195. }
  1196. func hasFinalMaskContent(value any) bool {
  1197. switch v := value.(type) {
  1198. case nil:
  1199. return false
  1200. case string:
  1201. return len(v) > 0
  1202. case map[string]any:
  1203. for _, item := range v {
  1204. if hasFinalMaskContent(item) {
  1205. return true
  1206. }
  1207. }
  1208. return false
  1209. case []any:
  1210. return slices.ContainsFunc(v, hasFinalMaskContent)
  1211. default:
  1212. return true
  1213. }
  1214. }
  1215. func searchHost(headers any) string {
  1216. data, _ := headers.(map[string]any)
  1217. for k, v := range data {
  1218. if strings.EqualFold(k, "host") {
  1219. switch v.(type) {
  1220. case []any:
  1221. hosts, _ := v.([]any)
  1222. if len(hosts) > 0 {
  1223. return hosts[0].(string)
  1224. } else {
  1225. return ""
  1226. }
  1227. case any:
  1228. return v.(string)
  1229. }
  1230. }
  1231. }
  1232. return ""
  1233. }
  1234. // PageData is a view model for subpage.html
  1235. // PageData contains data for rendering the subscription information page.
  1236. type PageData struct {
  1237. Host string
  1238. BasePath string
  1239. SId string
  1240. Enabled bool
  1241. Download string
  1242. Upload string
  1243. Total string
  1244. Used string
  1245. Remained string
  1246. Expire int64
  1247. LastOnline int64
  1248. Datepicker string
  1249. DownloadByte int64
  1250. UploadByte int64
  1251. TotalByte int64
  1252. SubUrl string
  1253. SubJsonUrl string
  1254. SubClashUrl string
  1255. Result []string
  1256. }
  1257. // ResolveRequest extracts scheme and host info from request/headers consistently.
  1258. // ResolveRequest extracts scheme, host, and header information from an HTTP request.
  1259. func (s *SubService) ResolveRequest(c *gin.Context) (scheme string, host string, hostWithPort string, hostHeader string) {
  1260. // scheme
  1261. scheme = "http"
  1262. if c.Request.TLS != nil || strings.EqualFold(c.GetHeader("X-Forwarded-Proto"), "https") {
  1263. scheme = "https"
  1264. }
  1265. // base host (no port)
  1266. if h, err := getHostFromXFH(c.GetHeader("X-Forwarded-Host")); err == nil && h != "" {
  1267. host = h
  1268. }
  1269. if host == "" {
  1270. host = c.GetHeader("X-Real-IP")
  1271. }
  1272. if host == "" {
  1273. var err error
  1274. host, _, err = net.SplitHostPort(c.Request.Host)
  1275. if err != nil {
  1276. host = c.Request.Host
  1277. }
  1278. }
  1279. // host:port for URLs
  1280. hostWithPort = c.GetHeader("X-Forwarded-Host")
  1281. if hostWithPort == "" {
  1282. hostWithPort = c.Request.Host
  1283. }
  1284. if hostWithPort == "" {
  1285. hostWithPort = host
  1286. }
  1287. // header display host
  1288. hostHeader = c.GetHeader("X-Forwarded-Host")
  1289. if hostHeader == "" {
  1290. hostHeader = c.GetHeader("X-Real-IP")
  1291. }
  1292. if hostHeader == "" {
  1293. hostHeader = host
  1294. }
  1295. return
  1296. }
  1297. // BuildURLs constructs absolute subscription and JSON subscription URLs for a given subscription ID.
  1298. // It prioritizes configured URIs, then individual settings, and finally falls back to request-derived components.
  1299. func (s *SubService) BuildURLs(scheme, hostWithPort, subPath, subJsonPath, subClashPath, subId string) (subURL, subJsonURL, subClashURL string) {
  1300. if subId == "" {
  1301. return "", "", ""
  1302. }
  1303. configuredSubURI, _ := s.settingService.GetSubURI()
  1304. configuredSubJsonURI, _ := s.settingService.GetSubJsonURI()
  1305. configuredSubClashURI, _ := s.settingService.GetSubClashURI()
  1306. var baseScheme, baseHostWithPort string
  1307. if configuredSubURI == "" || configuredSubJsonURI == "" || configuredSubClashURI == "" {
  1308. baseScheme, baseHostWithPort = s.getBaseSchemeAndHost(scheme, hostWithPort)
  1309. }
  1310. subURL = s.buildSingleURL(configuredSubURI, baseScheme, baseHostWithPort, subPath, subId)
  1311. subJsonURL = s.buildSingleURL(configuredSubJsonURI, baseScheme, baseHostWithPort, subJsonPath, subId)
  1312. subClashURL = s.buildSingleURL(configuredSubClashURI, baseScheme, baseHostWithPort, subClashPath, subId)
  1313. return subURL, subJsonURL, subClashURL
  1314. }
  1315. // getBaseSchemeAndHost determines the base scheme and host from settings or falls back to request values
  1316. func (s *SubService) getBaseSchemeAndHost(requestScheme, requestHostWithPort string) (string, string) {
  1317. subDomain, err := s.settingService.GetSubDomain()
  1318. if err != nil || subDomain == "" {
  1319. return requestScheme, requestHostWithPort
  1320. }
  1321. // Get port and TLS settings
  1322. subPort, _ := s.settingService.GetSubPort()
  1323. subKeyFile, _ := s.settingService.GetSubKeyFile()
  1324. subCertFile, _ := s.settingService.GetSubCertFile()
  1325. // Determine scheme from TLS configuration
  1326. scheme := "http"
  1327. if subKeyFile != "" && subCertFile != "" {
  1328. scheme = "https"
  1329. }
  1330. // Build host:port, always include port for clarity
  1331. hostWithPort := fmt.Sprintf("%s:%d", subDomain, subPort)
  1332. return scheme, hostWithPort
  1333. }
  1334. // buildSingleURL constructs a single URL using configured URI or base components
  1335. func (s *SubService) buildSingleURL(configuredURI, baseScheme, baseHostWithPort, basePath, subId string) string {
  1336. if configuredURI != "" {
  1337. return s.joinPathWithID(configuredURI, subId)
  1338. }
  1339. baseURL := fmt.Sprintf("%s://%s", baseScheme, baseHostWithPort)
  1340. return s.joinPathWithID(baseURL+basePath, subId)
  1341. }
  1342. // joinPathWithID safely joins a base path with a subscription ID
  1343. func (s *SubService) joinPathWithID(basePath, subId string) string {
  1344. if strings.HasSuffix(basePath, "/") {
  1345. return basePath + subId
  1346. }
  1347. return basePath + "/" + subId
  1348. }
  1349. // BuildPageData parses header and prepares the template view model.
  1350. // BuildPageData constructs page data for rendering the subscription information page.
  1351. func (s *SubService) BuildPageData(subId string, hostHeader string, traffic xray.ClientTraffic, lastOnline int64, subs []string, subURL, subJsonURL, subClashURL string, basePath string) PageData {
  1352. download := common.FormatTraffic(traffic.Down)
  1353. upload := common.FormatTraffic(traffic.Up)
  1354. total := "∞"
  1355. used := common.FormatTraffic(traffic.Up + traffic.Down)
  1356. remained := ""
  1357. if traffic.Total > 0 {
  1358. total = common.FormatTraffic(traffic.Total)
  1359. left := max(traffic.Total-(traffic.Up+traffic.Down), 0)
  1360. remained = common.FormatTraffic(left)
  1361. }
  1362. datepicker := s.datepicker
  1363. if datepicker == "" {
  1364. datepicker = "gregorian"
  1365. }
  1366. return PageData{
  1367. Host: hostHeader,
  1368. BasePath: basePath,
  1369. SId: subId,
  1370. Enabled: traffic.Enable,
  1371. Download: download,
  1372. Upload: upload,
  1373. Total: total,
  1374. Used: used,
  1375. Remained: remained,
  1376. Expire: traffic.ExpiryTime / 1000,
  1377. LastOnline: lastOnline,
  1378. Datepicker: datepicker,
  1379. DownloadByte: traffic.Down,
  1380. UploadByte: traffic.Up,
  1381. TotalByte: traffic.Total,
  1382. SubUrl: subURL,
  1383. SubJsonUrl: subJsonURL,
  1384. SubClashUrl: subClashURL,
  1385. Result: subs,
  1386. }
  1387. }
  1388. func getHostFromXFH(s string) (string, error) {
  1389. if strings.Contains(s, ":") {
  1390. realHost, _, err := net.SplitHostPort(s)
  1391. if err != nil {
  1392. return "", err
  1393. }
  1394. return realHost, nil
  1395. }
  1396. return s, nil
  1397. }