subService.go 42 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483
  1. package sub
  2. import (
  3. "encoding/base64"
  4. "fmt"
  5. "maps"
  6. "net"
  7. "net/url"
  8. "slices"
  9. "strings"
  10. "time"
  11. "github.com/gin-gonic/gin"
  12. "github.com/goccy/go-json"
  13. "github.com/mhsanaei/3x-ui/v2/database"
  14. "github.com/mhsanaei/3x-ui/v2/database/model"
  15. "github.com/mhsanaei/3x-ui/v2/logger"
  16. "github.com/mhsanaei/3x-ui/v2/util/common"
  17. "github.com/mhsanaei/3x-ui/v2/util/random"
  18. "github.com/mhsanaei/3x-ui/v2/web/service"
  19. "github.com/mhsanaei/3x-ui/v2/xray"
  20. )
  21. // SubService provides business logic for generating subscription links and managing subscription data.
  22. type SubService struct {
  23. address string
  24. showInfo bool
  25. remarkModel string
  26. datepicker string
  27. inboundService service.InboundService
  28. settingService service.SettingService
  29. }
  30. // NewSubService creates a new subscription service with the given configuration.
  31. func NewSubService(showInfo bool, remarkModel string) *SubService {
  32. return &SubService{
  33. showInfo: showInfo,
  34. remarkModel: remarkModel,
  35. }
  36. }
  37. // GetSubs retrieves subscription links for a given subscription ID and host.
  38. func (s *SubService) GetSubs(subId string, host string) ([]string, int64, xray.ClientTraffic, error) {
  39. s.address = host
  40. var result []string
  41. var traffic xray.ClientTraffic
  42. var lastOnline int64
  43. var clientTraffics []xray.ClientTraffic
  44. inbounds, err := s.getInboundsBySubId(subId)
  45. if err != nil {
  46. return nil, 0, traffic, err
  47. }
  48. if len(inbounds) == 0 {
  49. return nil, 0, traffic, common.NewError("No inbounds found with ", subId)
  50. }
  51. s.datepicker, err = s.settingService.GetDatepicker()
  52. if err != nil {
  53. s.datepicker = "gregorian"
  54. }
  55. for _, inbound := range inbounds {
  56. clients, err := s.inboundService.GetClients(inbound)
  57. if err != nil {
  58. logger.Error("SubService - GetClients: Unable to get clients from inbound")
  59. }
  60. if clients == nil {
  61. continue
  62. }
  63. if len(inbound.Listen) > 0 && inbound.Listen[0] == '@' {
  64. listen, port, streamSettings, err := s.getFallbackMaster(inbound.Listen, inbound.StreamSettings)
  65. if err == nil {
  66. inbound.Listen = listen
  67. inbound.Port = port
  68. inbound.StreamSettings = streamSettings
  69. }
  70. }
  71. for _, client := range clients {
  72. if client.Enable && client.SubID == subId {
  73. link := s.getLink(inbound, client.Email)
  74. result = append(result, link)
  75. ct := s.getClientTraffics(inbound.ClientStats, client.Email)
  76. clientTraffics = append(clientTraffics, ct)
  77. if ct.LastOnline > lastOnline {
  78. lastOnline = ct.LastOnline
  79. }
  80. }
  81. }
  82. }
  83. // Prepare statistics
  84. for index, clientTraffic := range clientTraffics {
  85. if index == 0 {
  86. traffic.Up = clientTraffic.Up
  87. traffic.Down = clientTraffic.Down
  88. traffic.Total = clientTraffic.Total
  89. if clientTraffic.ExpiryTime > 0 {
  90. traffic.ExpiryTime = clientTraffic.ExpiryTime
  91. }
  92. } else {
  93. traffic.Up += clientTraffic.Up
  94. traffic.Down += clientTraffic.Down
  95. if traffic.Total == 0 || clientTraffic.Total == 0 {
  96. traffic.Total = 0
  97. } else {
  98. traffic.Total += clientTraffic.Total
  99. }
  100. if clientTraffic.ExpiryTime != traffic.ExpiryTime {
  101. traffic.ExpiryTime = 0
  102. }
  103. }
  104. }
  105. return result, lastOnline, traffic, nil
  106. }
  107. func (s *SubService) getInboundsBySubId(subId string) ([]*model.Inbound, error) {
  108. db := database.GetDB()
  109. var inbounds []*model.Inbound
  110. // allow "hysteria2" so imports stored with the literal v2 protocol
  111. // string still surface here (#4081)
  112. err := db.Model(model.Inbound{}).Preload("ClientStats").Where(`id in (
  113. SELECT DISTINCT inbounds.id
  114. FROM inbounds,
  115. JSON_EACH(JSON_EXTRACT(inbounds.settings, '$.clients')) AS client
  116. WHERE
  117. protocol in ('vmess','vless','trojan','shadowsocks','hysteria','hysteria2')
  118. AND JSON_EXTRACT(client.value, '$.subId') = ? AND enable = ?
  119. )`, subId, true).Find(&inbounds).Error
  120. if err != nil {
  121. return nil, err
  122. }
  123. return inbounds, nil
  124. }
  125. func (s *SubService) getClientTraffics(traffics []xray.ClientTraffic, email string) xray.ClientTraffic {
  126. for _, traffic := range traffics {
  127. if traffic.Email == email {
  128. return traffic
  129. }
  130. }
  131. return xray.ClientTraffic{}
  132. }
  133. func (s *SubService) getFallbackMaster(dest string, streamSettings string) (string, int, string, error) {
  134. db := database.GetDB()
  135. var inbound *model.Inbound
  136. err := db.Model(model.Inbound{}).
  137. Where("JSON_TYPE(settings, '$.fallbacks') = 'array'").
  138. Where("EXISTS (SELECT * FROM json_each(settings, '$.fallbacks') WHERE json_extract(value, '$.dest') = ?)", dest).
  139. Find(&inbound).Error
  140. if err != nil {
  141. return "", 0, "", err
  142. }
  143. var stream map[string]any
  144. json.Unmarshal([]byte(streamSettings), &stream)
  145. var masterStream map[string]any
  146. json.Unmarshal([]byte(inbound.StreamSettings), &masterStream)
  147. stream["security"] = masterStream["security"]
  148. stream["tlsSettings"] = masterStream["tlsSettings"]
  149. stream["externalProxy"] = masterStream["externalProxy"]
  150. modifiedStream, _ := json.MarshalIndent(stream, "", " ")
  151. return inbound.Listen, inbound.Port, string(modifiedStream), nil
  152. }
  153. func (s *SubService) getLink(inbound *model.Inbound, email string) string {
  154. switch inbound.Protocol {
  155. case "vmess":
  156. return s.genVmessLink(inbound, email)
  157. case "vless":
  158. return s.genVlessLink(inbound, email)
  159. case "trojan":
  160. return s.genTrojanLink(inbound, email)
  161. case "shadowsocks":
  162. return s.genShadowsocksLink(inbound, email)
  163. case "hysteria", "hysteria2":
  164. return s.genHysteriaLink(inbound, email)
  165. }
  166. return ""
  167. }
  168. // Protocol link generators are intentionally ordered as:
  169. // vmess -> vless -> trojan -> shadowsocks -> hysteria.
  170. func (s *SubService) genVmessLink(inbound *model.Inbound, email string) string {
  171. if inbound.Protocol != model.VMESS {
  172. return ""
  173. }
  174. address := s.resolveInboundAddress(inbound)
  175. obj := map[string]any{
  176. "v": "2",
  177. "add": address,
  178. "port": inbound.Port,
  179. "type": "none",
  180. }
  181. stream := unmarshalStreamSettings(inbound.StreamSettings)
  182. network, _ := stream["network"].(string)
  183. applyVmessNetworkParams(stream, network, obj)
  184. if finalmask, ok := stream["finalmask"].(map[string]any); ok {
  185. applyFinalMaskObj(finalmask, obj)
  186. }
  187. security, _ := stream["security"].(string)
  188. obj["tls"] = security
  189. if security == "tls" {
  190. applyVmessTLSParams(stream, obj)
  191. }
  192. clients, _ := s.inboundService.GetClients(inbound)
  193. clientIndex := findClientIndex(clients, email)
  194. obj["id"] = clients[clientIndex].ID
  195. obj["scy"] = clients[clientIndex].Security
  196. externalProxies, _ := stream["externalProxy"].([]any)
  197. if len(externalProxies) > 0 {
  198. return s.buildVmessExternalProxyLinks(externalProxies, obj, inbound, email)
  199. }
  200. obj["ps"] = s.genRemark(inbound, email, "")
  201. return buildVmessLink(obj)
  202. }
  203. func (s *SubService) genVlessLink(inbound *model.Inbound, email string) string {
  204. if inbound.Protocol != model.VLESS {
  205. return ""
  206. }
  207. address := s.resolveInboundAddress(inbound)
  208. stream := unmarshalStreamSettings(inbound.StreamSettings)
  209. clients, _ := s.inboundService.GetClients(inbound)
  210. clientIndex := findClientIndex(clients, email)
  211. uuid := clients[clientIndex].ID
  212. port := inbound.Port
  213. streamNetwork := stream["network"].(string)
  214. params := make(map[string]string)
  215. params["type"] = streamNetwork
  216. // Add encryption parameter for VLESS from inbound settings
  217. var settings map[string]any
  218. json.Unmarshal([]byte(inbound.Settings), &settings)
  219. if encryption, ok := settings["encryption"].(string); ok {
  220. params["encryption"] = encryption
  221. }
  222. applyShareNetworkParams(stream, streamNetwork, params)
  223. if finalmask, ok := stream["finalmask"].(map[string]any); ok {
  224. applyFinalMaskParams(finalmask, params)
  225. }
  226. security, _ := stream["security"].(string)
  227. switch security {
  228. case "tls":
  229. applyShareTLSParams(stream, params)
  230. if streamNetwork == "tcp" && len(clients[clientIndex].Flow) > 0 {
  231. params["flow"] = clients[clientIndex].Flow
  232. }
  233. case "reality":
  234. applyShareRealityParams(stream, params)
  235. if streamNetwork == "tcp" && len(clients[clientIndex].Flow) > 0 {
  236. params["flow"] = clients[clientIndex].Flow
  237. }
  238. default:
  239. params["security"] = "none"
  240. }
  241. externalProxies, _ := stream["externalProxy"].([]any)
  242. if len(externalProxies) > 0 {
  243. return s.buildExternalProxyURLLinks(
  244. externalProxies,
  245. params,
  246. security,
  247. func(dest string, port int) string {
  248. return fmt.Sprintf("vless://%s@%s:%d", uuid, dest, port)
  249. },
  250. func(ep map[string]any) string {
  251. return s.genRemark(inbound, email, ep["remark"].(string))
  252. },
  253. )
  254. }
  255. link := fmt.Sprintf("vless://%s@%s:%d", uuid, address, port)
  256. return buildLinkWithParams(link, params, s.genRemark(inbound, email, ""))
  257. }
  258. func (s *SubService) genTrojanLink(inbound *model.Inbound, email string) string {
  259. if inbound.Protocol != model.Trojan {
  260. return ""
  261. }
  262. address := s.resolveInboundAddress(inbound)
  263. stream := unmarshalStreamSettings(inbound.StreamSettings)
  264. clients, _ := s.inboundService.GetClients(inbound)
  265. clientIndex := findClientIndex(clients, email)
  266. password := clients[clientIndex].Password
  267. port := inbound.Port
  268. streamNetwork := stream["network"].(string)
  269. params := make(map[string]string)
  270. params["type"] = streamNetwork
  271. applyShareNetworkParams(stream, streamNetwork, params)
  272. if finalmask, ok := stream["finalmask"].(map[string]any); ok {
  273. applyFinalMaskParams(finalmask, params)
  274. }
  275. security, _ := stream["security"].(string)
  276. switch security {
  277. case "tls":
  278. applyShareTLSParams(stream, params)
  279. case "reality":
  280. applyShareRealityParams(stream, params)
  281. if streamNetwork == "tcp" && len(clients[clientIndex].Flow) > 0 {
  282. params["flow"] = clients[clientIndex].Flow
  283. }
  284. default:
  285. params["security"] = "none"
  286. }
  287. externalProxies, _ := stream["externalProxy"].([]any)
  288. if len(externalProxies) > 0 {
  289. return s.buildExternalProxyURLLinks(
  290. externalProxies,
  291. params,
  292. security,
  293. func(dest string, port int) string {
  294. return fmt.Sprintf("trojan://%s@%s:%d", password, dest, port)
  295. },
  296. func(ep map[string]any) string {
  297. return s.genRemark(inbound, email, ep["remark"].(string))
  298. },
  299. )
  300. }
  301. link := fmt.Sprintf("trojan://%s@%s:%d", password, address, port)
  302. return buildLinkWithParams(link, params, s.genRemark(inbound, email, ""))
  303. }
  304. func (s *SubService) genShadowsocksLink(inbound *model.Inbound, email string) string {
  305. if inbound.Protocol != model.Shadowsocks {
  306. return ""
  307. }
  308. address := s.resolveInboundAddress(inbound)
  309. stream := unmarshalStreamSettings(inbound.StreamSettings)
  310. clients, _ := s.inboundService.GetClients(inbound)
  311. var settings map[string]any
  312. json.Unmarshal([]byte(inbound.Settings), &settings)
  313. inboundPassword := settings["password"].(string)
  314. method := settings["method"].(string)
  315. clientIndex := findClientIndex(clients, email)
  316. streamNetwork := stream["network"].(string)
  317. params := make(map[string]string)
  318. params["type"] = streamNetwork
  319. applyShareNetworkParams(stream, streamNetwork, params)
  320. if finalmask, ok := stream["finalmask"].(map[string]any); ok {
  321. applyFinalMaskParams(finalmask, params)
  322. }
  323. security, _ := stream["security"].(string)
  324. if security == "tls" {
  325. applyShareTLSParams(stream, params)
  326. }
  327. encPart := fmt.Sprintf("%s:%s", method, clients[clientIndex].Password)
  328. if method[0] == '2' {
  329. encPart = fmt.Sprintf("%s:%s:%s", method, inboundPassword, clients[clientIndex].Password)
  330. }
  331. externalProxies, _ := stream["externalProxy"].([]any)
  332. if len(externalProxies) > 0 {
  333. proxyParams := cloneStringMap(params)
  334. proxyParams["security"] = security
  335. return s.buildExternalProxyURLLinks(
  336. externalProxies,
  337. proxyParams,
  338. security,
  339. func(dest string, port int) string {
  340. return fmt.Sprintf("ss://%s@%s:%d", base64.StdEncoding.EncodeToString([]byte(encPart)), dest, port)
  341. },
  342. func(ep map[string]any) string {
  343. return s.genRemark(inbound, email, ep["remark"].(string))
  344. },
  345. )
  346. }
  347. link := fmt.Sprintf("ss://%s@%s:%d", base64.StdEncoding.EncodeToString([]byte(encPart)), address, inbound.Port)
  348. return buildLinkWithParams(link, params, s.genRemark(inbound, email, ""))
  349. }
  350. func (s *SubService) genHysteriaLink(inbound *model.Inbound, email string) string {
  351. if !model.IsHysteria(inbound.Protocol) {
  352. return ""
  353. }
  354. var stream map[string]any
  355. json.Unmarshal([]byte(inbound.StreamSettings), &stream)
  356. clients, _ := s.inboundService.GetClients(inbound)
  357. clientIndex := -1
  358. for i, client := range clients {
  359. if client.Email == email {
  360. clientIndex = i
  361. break
  362. }
  363. }
  364. auth := clients[clientIndex].Auth
  365. params := make(map[string]string)
  366. params["security"] = "tls"
  367. tlsSetting, _ := stream["tlsSettings"].(map[string]any)
  368. alpns, _ := tlsSetting["alpn"].([]any)
  369. var alpn []string
  370. for _, a := range alpns {
  371. alpn = append(alpn, a.(string))
  372. }
  373. if len(alpn) > 0 {
  374. params["alpn"] = strings.Join(alpn, ",")
  375. }
  376. if sniValue, ok := searchKey(tlsSetting, "serverName"); ok {
  377. params["sni"], _ = sniValue.(string)
  378. }
  379. tlsSettings, _ := searchKey(tlsSetting, "settings")
  380. if tlsSetting != nil {
  381. if fpValue, ok := searchKey(tlsSettings, "fingerprint"); ok {
  382. params["fp"], _ = fpValue.(string)
  383. }
  384. if insecure, ok := searchKey(tlsSettings, "allowInsecure"); ok {
  385. if insecure.(bool) {
  386. params["insecure"] = "1"
  387. }
  388. }
  389. }
  390. // salamander obfs (Hysteria2). The panel-side link generator already
  391. // emits these; keep the subscription output in sync so a client has
  392. // the obfs password to match the server.
  393. if finalmask, ok := stream["finalmask"].(map[string]any); ok {
  394. applyFinalMaskParams(finalmask, params)
  395. if udpMasks, ok := finalmask["udp"].([]any); ok {
  396. for _, m := range udpMasks {
  397. mask, _ := m.(map[string]any)
  398. if mask == nil || mask["type"] != "salamander" {
  399. continue
  400. }
  401. settings, _ := mask["settings"].(map[string]any)
  402. if pw, ok := settings["password"].(string); ok && pw != "" {
  403. params["obfs"] = "salamander"
  404. params["obfs-password"] = pw
  405. break
  406. }
  407. }
  408. }
  409. }
  410. var settings map[string]any
  411. json.Unmarshal([]byte(inbound.Settings), &settings)
  412. version, _ := settings["version"].(float64)
  413. protocol := "hysteria2"
  414. if int(version) == 1 {
  415. protocol = "hysteria"
  416. }
  417. // Fan out one link per External Proxy entry if any. Previously this
  418. // generator ignored `externalProxy` entirely, so the link kept the
  419. // server's own IP/port even when the admin configured an alternate
  420. // endpoint (e.g. a CDN hostname + port that forwards to the node).
  421. // Matches the behaviour of genVlessLink / genTrojanLink / ….
  422. externalProxies, _ := stream["externalProxy"].([]any)
  423. if len(externalProxies) > 0 {
  424. links := make([]string, 0, len(externalProxies))
  425. for _, externalProxy := range externalProxies {
  426. ep, ok := externalProxy.(map[string]any)
  427. if !ok {
  428. continue
  429. }
  430. dest, _ := ep["dest"].(string)
  431. portF, okPort := ep["port"].(float64)
  432. if dest == "" || !okPort {
  433. continue
  434. }
  435. epRemark, _ := ep["remark"].(string)
  436. link := fmt.Sprintf("%s://%s@%s:%d", protocol, auth, dest, int(portF))
  437. u, _ := url.Parse(link)
  438. q := u.Query()
  439. for k, v := range params {
  440. q.Add(k, v)
  441. }
  442. u.RawQuery = q.Encode()
  443. u.Fragment = s.genRemark(inbound, email, epRemark)
  444. links = append(links, u.String())
  445. }
  446. return strings.Join(links, "\n")
  447. }
  448. // No external proxy configured — fall back to the request host.
  449. link := fmt.Sprintf("%s://%s@%s:%d", protocol, auth, s.address, inbound.Port)
  450. url, _ := url.Parse(link)
  451. q := url.Query()
  452. for k, v := range params {
  453. q.Add(k, v)
  454. }
  455. url.RawQuery = q.Encode()
  456. url.Fragment = s.genRemark(inbound, email, "")
  457. return url.String()
  458. }
  459. func (s *SubService) resolveInboundAddress(inbound *model.Inbound) string {
  460. if inbound.Listen == "" || inbound.Listen == "0.0.0.0" || inbound.Listen == "::" || inbound.Listen == "::0" {
  461. return s.address
  462. }
  463. return inbound.Listen
  464. }
  465. func findClientIndex(clients []model.Client, email string) int {
  466. for i, client := range clients {
  467. if client.Email == email {
  468. return i
  469. }
  470. }
  471. return -1
  472. }
  473. func unmarshalStreamSettings(streamSettings string) map[string]any {
  474. var stream map[string]any
  475. json.Unmarshal([]byte(streamSettings), &stream)
  476. return stream
  477. }
  478. func applyPathAndHostParams(settings map[string]any, params map[string]string) {
  479. params["path"] = settings["path"].(string)
  480. if host, ok := settings["host"].(string); ok && len(host) > 0 {
  481. params["host"] = host
  482. } else {
  483. headers, _ := settings["headers"].(map[string]any)
  484. params["host"] = searchHost(headers)
  485. }
  486. }
  487. func applyPathAndHostObj(settings map[string]any, obj map[string]any) {
  488. obj["path"] = settings["path"].(string)
  489. if host, ok := settings["host"].(string); ok && len(host) > 0 {
  490. obj["host"] = host
  491. } else {
  492. headers, _ := settings["headers"].(map[string]any)
  493. obj["host"] = searchHost(headers)
  494. }
  495. }
  496. func applyShareNetworkParams(stream map[string]any, streamNetwork string, params map[string]string) {
  497. switch streamNetwork {
  498. case "tcp":
  499. tcp, _ := stream["tcpSettings"].(map[string]any)
  500. header, _ := tcp["header"].(map[string]any)
  501. typeStr, _ := header["type"].(string)
  502. if typeStr == "http" {
  503. request := header["request"].(map[string]any)
  504. requestPath, _ := request["path"].([]any)
  505. params["path"] = requestPath[0].(string)
  506. headers, _ := request["headers"].(map[string]any)
  507. params["host"] = searchHost(headers)
  508. params["headerType"] = "http"
  509. }
  510. case "kcp":
  511. applyKcpShareParams(stream, params)
  512. case "ws":
  513. ws, _ := stream["wsSettings"].(map[string]any)
  514. applyPathAndHostParams(ws, params)
  515. case "grpc":
  516. grpc, _ := stream["grpcSettings"].(map[string]any)
  517. params["serviceName"] = grpc["serviceName"].(string)
  518. params["authority"], _ = grpc["authority"].(string)
  519. if grpc["multiMode"].(bool) {
  520. params["mode"] = "multi"
  521. }
  522. case "httpupgrade":
  523. httpupgrade, _ := stream["httpupgradeSettings"].(map[string]any)
  524. applyPathAndHostParams(httpupgrade, params)
  525. case "xhttp":
  526. xhttp, _ := stream["xhttpSettings"].(map[string]any)
  527. applyPathAndHostParams(xhttp, params)
  528. params["mode"], _ = xhttp["mode"].(string)
  529. applyXhttpPaddingParams(xhttp, params)
  530. }
  531. }
  532. func applyXhttpPaddingObj(xhttp map[string]any, obj map[string]any) {
  533. // VMess base64 JSON supports arbitrary keys; copy the padding
  534. // settings through so clients can match the server's xhttp
  535. // xPaddingBytes range and, when the admin opted into obfs
  536. // mode, the custom key / header / placement / method.
  537. if xpb, ok := xhttp["xPaddingBytes"].(string); ok && len(xpb) > 0 {
  538. obj["x_padding_bytes"] = xpb
  539. }
  540. if obfs, ok := xhttp["xPaddingObfsMode"].(bool); ok && obfs {
  541. obj["xPaddingObfsMode"] = true
  542. for _, field := range []string{"xPaddingKey", "xPaddingHeader", "xPaddingPlacement", "xPaddingMethod"} {
  543. if v, ok := xhttp[field].(string); ok && len(v) > 0 {
  544. obj[field] = v
  545. }
  546. }
  547. }
  548. }
  549. func applyVmessNetworkParams(stream map[string]any, network string, obj map[string]any) {
  550. obj["net"] = network
  551. switch network {
  552. case "tcp":
  553. tcp, _ := stream["tcpSettings"].(map[string]any)
  554. header, _ := tcp["header"].(map[string]any)
  555. typeStr, _ := header["type"].(string)
  556. obj["type"] = typeStr
  557. if typeStr == "http" {
  558. request := header["request"].(map[string]any)
  559. requestPath, _ := request["path"].([]any)
  560. obj["path"] = requestPath[0].(string)
  561. headers, _ := request["headers"].(map[string]any)
  562. obj["host"] = searchHost(headers)
  563. }
  564. case "kcp":
  565. applyKcpShareObj(stream, obj)
  566. case "ws":
  567. ws, _ := stream["wsSettings"].(map[string]any)
  568. applyPathAndHostObj(ws, obj)
  569. case "grpc":
  570. grpc, _ := stream["grpcSettings"].(map[string]any)
  571. obj["path"] = grpc["serviceName"].(string)
  572. obj["authority"] = grpc["authority"].(string)
  573. if grpc["multiMode"].(bool) {
  574. obj["type"] = "multi"
  575. }
  576. case "httpupgrade":
  577. httpupgrade, _ := stream["httpupgradeSettings"].(map[string]any)
  578. applyPathAndHostObj(httpupgrade, obj)
  579. case "xhttp":
  580. xhttp, _ := stream["xhttpSettings"].(map[string]any)
  581. applyPathAndHostObj(xhttp, obj)
  582. obj["mode"], _ = xhttp["mode"].(string)
  583. applyXhttpPaddingObj(xhttp, obj)
  584. }
  585. }
  586. func applyShareTLSParams(stream map[string]any, params map[string]string) {
  587. params["security"] = "tls"
  588. tlsSetting, _ := stream["tlsSettings"].(map[string]any)
  589. alpns, _ := tlsSetting["alpn"].([]any)
  590. var alpn []string
  591. for _, a := range alpns {
  592. alpn = append(alpn, a.(string))
  593. }
  594. if len(alpn) > 0 {
  595. params["alpn"] = strings.Join(alpn, ",")
  596. }
  597. if sniValue, ok := searchKey(tlsSetting, "serverName"); ok {
  598. params["sni"], _ = sniValue.(string)
  599. }
  600. tlsSettings, _ := searchKey(tlsSetting, "settings")
  601. if tlsSetting != nil {
  602. if fpValue, ok := searchKey(tlsSettings, "fingerprint"); ok {
  603. params["fp"], _ = fpValue.(string)
  604. }
  605. }
  606. }
  607. func applyVmessTLSParams(stream map[string]any, obj map[string]any) {
  608. tlsSetting, _ := stream["tlsSettings"].(map[string]any)
  609. alpns, _ := tlsSetting["alpn"].([]any)
  610. if len(alpns) > 0 {
  611. var alpn []string
  612. for _, a := range alpns {
  613. alpn = append(alpn, a.(string))
  614. }
  615. obj["alpn"] = strings.Join(alpn, ",")
  616. }
  617. if sniValue, ok := searchKey(tlsSetting, "serverName"); ok {
  618. obj["sni"], _ = sniValue.(string)
  619. }
  620. tlsSettings, _ := searchKey(tlsSetting, "settings")
  621. if tlsSetting != nil {
  622. if fpValue, ok := searchKey(tlsSettings, "fingerprint"); ok {
  623. obj["fp"], _ = fpValue.(string)
  624. }
  625. }
  626. }
  627. func applyShareRealityParams(stream map[string]any, params map[string]string) {
  628. params["security"] = "reality"
  629. realitySetting, _ := stream["realitySettings"].(map[string]any)
  630. realitySettings, _ := searchKey(realitySetting, "settings")
  631. if realitySetting != nil {
  632. if sniValue, ok := searchKey(realitySetting, "serverNames"); ok {
  633. sNames, _ := sniValue.([]any)
  634. params["sni"] = sNames[random.Num(len(sNames))].(string)
  635. }
  636. if pbkValue, ok := searchKey(realitySettings, "publicKey"); ok {
  637. params["pbk"], _ = pbkValue.(string)
  638. }
  639. if sidValue, ok := searchKey(realitySetting, "shortIds"); ok {
  640. shortIds, _ := sidValue.([]any)
  641. params["sid"] = shortIds[random.Num(len(shortIds))].(string)
  642. }
  643. if fpValue, ok := searchKey(realitySettings, "fingerprint"); ok {
  644. if fp, ok := fpValue.(string); ok && len(fp) > 0 {
  645. params["fp"] = fp
  646. }
  647. }
  648. if pqvValue, ok := searchKey(realitySettings, "mldsa65Verify"); ok {
  649. if pqv, ok := pqvValue.(string); ok && len(pqv) > 0 {
  650. params["pqv"] = pqv
  651. }
  652. }
  653. params["spx"] = "/" + random.Seq(15)
  654. }
  655. }
  656. func buildVmessLink(obj map[string]any) string {
  657. jsonStr, _ := json.MarshalIndent(obj, "", " ")
  658. return "vmess://" + base64.StdEncoding.EncodeToString(jsonStr)
  659. }
  660. func cloneVmessShareObj(baseObj map[string]any, newSecurity string) map[string]any {
  661. newObj := map[string]any{}
  662. for key, value := range baseObj {
  663. if !(newSecurity == "none" && (key == "alpn" || key == "sni" || key == "fp")) {
  664. newObj[key] = value
  665. }
  666. }
  667. return newObj
  668. }
  669. func (s *SubService) buildVmessExternalProxyLinks(externalProxies []any, baseObj map[string]any, inbound *model.Inbound, email string) string {
  670. var links strings.Builder
  671. for index, externalProxy := range externalProxies {
  672. ep, _ := externalProxy.(map[string]any)
  673. newSecurity, _ := ep["forceTls"].(string)
  674. newObj := cloneVmessShareObj(baseObj, newSecurity)
  675. newObj["ps"] = s.genRemark(inbound, email, ep["remark"].(string))
  676. newObj["add"] = ep["dest"].(string)
  677. newObj["port"] = int(ep["port"].(float64))
  678. if newSecurity != "same" {
  679. newObj["tls"] = newSecurity
  680. }
  681. if index > 0 {
  682. links.WriteString("\n")
  683. }
  684. links.WriteString(buildVmessLink(newObj))
  685. }
  686. return links.String()
  687. }
  688. func buildLinkWithParams(link string, params map[string]string, fragment string) string {
  689. parsedURL, _ := url.Parse(link)
  690. q := parsedURL.Query()
  691. for k, v := range params {
  692. q.Add(k, v)
  693. }
  694. parsedURL.RawQuery = q.Encode()
  695. parsedURL.Fragment = fragment
  696. return parsedURL.String()
  697. }
  698. func buildLinkWithParamsAndSecurity(link string, params map[string]string, fragment, security string, omitTLSFields bool) string {
  699. parsedURL, _ := url.Parse(link)
  700. q := parsedURL.Query()
  701. for k, v := range params {
  702. if k == "security" {
  703. v = security
  704. }
  705. if omitTLSFields && (k == "alpn" || k == "sni" || k == "fp") {
  706. continue
  707. }
  708. q.Add(k, v)
  709. }
  710. parsedURL.RawQuery = q.Encode()
  711. parsedURL.Fragment = fragment
  712. return parsedURL.String()
  713. }
  714. func (s *SubService) buildExternalProxyURLLinks(
  715. externalProxies []any,
  716. params map[string]string,
  717. baseSecurity string,
  718. makeLink func(dest string, port int) string,
  719. makeRemark func(ep map[string]any) string,
  720. ) string {
  721. links := make([]string, 0, len(externalProxies))
  722. for _, externalProxy := range externalProxies {
  723. ep, _ := externalProxy.(map[string]any)
  724. newSecurity, _ := ep["forceTls"].(string)
  725. dest, _ := ep["dest"].(string)
  726. port := int(ep["port"].(float64))
  727. securityToApply := baseSecurity
  728. if newSecurity != "same" {
  729. securityToApply = newSecurity
  730. }
  731. links = append(
  732. links,
  733. buildLinkWithParamsAndSecurity(
  734. makeLink(dest, port),
  735. params,
  736. makeRemark(ep),
  737. securityToApply,
  738. newSecurity == "none",
  739. ),
  740. )
  741. }
  742. return strings.Join(links, "\n")
  743. }
  744. func cloneStringMap(source map[string]string) map[string]string {
  745. cloned := make(map[string]string, len(source))
  746. maps.Copy(cloned, source)
  747. return cloned
  748. }
  749. func (s *SubService) genRemark(inbound *model.Inbound, email string, extra string) string {
  750. separationChar := string(s.remarkModel[0])
  751. orderChars := s.remarkModel[1:]
  752. orders := map[byte]string{
  753. 'i': "",
  754. 'e': "",
  755. 'o': "",
  756. }
  757. if len(email) > 0 {
  758. orders['e'] = email
  759. }
  760. if len(inbound.Remark) > 0 {
  761. orders['i'] = inbound.Remark
  762. }
  763. if len(extra) > 0 {
  764. orders['o'] = extra
  765. }
  766. var remark []string
  767. for i := 0; i < len(orderChars); i++ {
  768. char := orderChars[i]
  769. order, exists := orders[char]
  770. if exists && order != "" {
  771. remark = append(remark, order)
  772. }
  773. }
  774. if s.showInfo {
  775. statsExist := false
  776. var stats xray.ClientTraffic
  777. for _, clientStat := range inbound.ClientStats {
  778. if clientStat.Email == email {
  779. stats = clientStat
  780. statsExist = true
  781. break
  782. }
  783. }
  784. // Get remained days
  785. if statsExist {
  786. if !stats.Enable {
  787. return fmt.Sprintf("⛔️N/A%s%s", separationChar, strings.Join(remark, separationChar))
  788. }
  789. if vol := stats.Total - (stats.Up + stats.Down); vol > 0 {
  790. remark = append(remark, fmt.Sprintf("%s%s", common.FormatTraffic(vol), "📊"))
  791. }
  792. now := time.Now().Unix()
  793. switch exp := stats.ExpiryTime / 1000; {
  794. case exp > 0:
  795. remainingSeconds := exp - now
  796. days := remainingSeconds / 86400
  797. hours := (remainingSeconds % 86400) / 3600
  798. minutes := (remainingSeconds % 3600) / 60
  799. if days > 0 {
  800. if hours > 0 {
  801. remark = append(remark, fmt.Sprintf("%dD,%dH⏳", days, hours))
  802. } else {
  803. remark = append(remark, fmt.Sprintf("%dD⏳", days))
  804. }
  805. } else if hours > 0 {
  806. remark = append(remark, fmt.Sprintf("%dH⏳", hours))
  807. } else {
  808. remark = append(remark, fmt.Sprintf("%dM⏳", minutes))
  809. }
  810. case exp < 0:
  811. days := exp / -86400
  812. hours := (exp % -86400) / 3600
  813. minutes := (exp % -3600) / 60
  814. if days > 0 {
  815. if hours > 0 {
  816. remark = append(remark, fmt.Sprintf("%dD,%dH⏳", days, hours))
  817. } else {
  818. remark = append(remark, fmt.Sprintf("%dD⏳", days))
  819. }
  820. } else if hours > 0 {
  821. remark = append(remark, fmt.Sprintf("%dH⏳", hours))
  822. } else {
  823. remark = append(remark, fmt.Sprintf("%dM⏳", minutes))
  824. }
  825. }
  826. }
  827. }
  828. return strings.Join(remark, separationChar)
  829. }
  830. func searchKey(data any, key string) (any, bool) {
  831. switch val := data.(type) {
  832. case map[string]any:
  833. for k, v := range val {
  834. if k == key {
  835. return v, true
  836. }
  837. if result, ok := searchKey(v, key); ok {
  838. return result, true
  839. }
  840. }
  841. case []any:
  842. for _, v := range val {
  843. if result, ok := searchKey(v, key); ok {
  844. return result, true
  845. }
  846. }
  847. }
  848. return nil, false
  849. }
  850. // applyXhttpPaddingParams copies the xPadding* fields from an xhttpSettings
  851. // map into the URL query params of a vless:// / trojan:// / ss:// link.
  852. //
  853. // Before this helper existed, only path / host / mode were propagated,
  854. // so a server configured with a non-default xPaddingBytes (e.g. 80-600)
  855. // or with xPaddingObfsMode=true + custom xPaddingKey / xPaddingHeader
  856. // would silently diverge from the client: the client kept defaults,
  857. // hit the server, and was rejected by its padding validation
  858. // ("invalid padding" in the inbound log) — the client-visible symptom
  859. // was "xhttp doesn't connect" on OpenWRT / sing-box.
  860. //
  861. // Two encodings are written so every popular client can read at least one:
  862. //
  863. // - x_padding_bytes=<range> — flat param, understood by sing-box and its
  864. // derivatives (Podkop, OpenWRT sing-box, Karing, NekoBox, …).
  865. // - extra=<url-encoded-json> — full xhttp settings blob, which is how
  866. // xray-core clients (v2rayNG, Happ, Furious, Exclave, …) pick up the
  867. // obfs-mode key / header / placement / method.
  868. //
  869. // Anything that doesn't map to a non-empty value is skipped, so simple
  870. // inbounds (no custom padding) produce exactly the same URL as before.
  871. func applyXhttpPaddingParams(xhttp map[string]any, params map[string]string) {
  872. if xhttp == nil {
  873. return
  874. }
  875. if xpb, ok := xhttp["xPaddingBytes"].(string); ok && len(xpb) > 0 {
  876. params["x_padding_bytes"] = xpb
  877. }
  878. extra := map[string]any{}
  879. if xpb, ok := xhttp["xPaddingBytes"].(string); ok && len(xpb) > 0 {
  880. extra["xPaddingBytes"] = xpb
  881. }
  882. if obfs, ok := xhttp["xPaddingObfsMode"].(bool); ok && obfs {
  883. extra["xPaddingObfsMode"] = true
  884. // The obfs-mode-only fields: only populate the ones the admin
  885. // actually set, so xray-core falls back to its own defaults for
  886. // the rest instead of seeing spurious empty strings.
  887. for _, field := range []string{"xPaddingKey", "xPaddingHeader", "xPaddingPlacement", "xPaddingMethod"} {
  888. if v, ok := xhttp[field].(string); ok && len(v) > 0 {
  889. extra[field] = v
  890. }
  891. }
  892. }
  893. if len(extra) > 0 {
  894. if b, err := json.Marshal(extra); err == nil {
  895. params["extra"] = string(b)
  896. }
  897. }
  898. }
  899. var kcpMaskToHeaderType = map[string]string{
  900. "header-dns": "dns",
  901. "header-dtls": "dtls",
  902. "header-srtp": "srtp",
  903. "header-utp": "utp",
  904. "header-wechat": "wechat-video",
  905. "header-wireguard": "wireguard",
  906. }
  907. var validFinalMaskUDPTypes = map[string]struct{}{
  908. "salamander": {},
  909. "mkcp-aes128gcm": {},
  910. "header-dns": {},
  911. "header-dtls": {},
  912. "header-srtp": {},
  913. "header-utp": {},
  914. "header-wechat": {},
  915. "header-wireguard": {},
  916. "mkcp-original": {},
  917. "xdns": {},
  918. "xicmp": {},
  919. "noise": {},
  920. "header-custom": {},
  921. }
  922. var validFinalMaskTCPTypes = map[string]struct{}{
  923. "header-custom": {},
  924. "fragment": {},
  925. "sudoku": {},
  926. }
  927. // applyKcpShareParams reconstructs legacy KCP share-link fields from either
  928. // the historical kcpSettings.header/seed shape or the current finalmask model.
  929. // This keeps subscription output compatible while avoiding panics when older
  930. // keys are absent from modern inbounds.
  931. func applyKcpShareParams(stream map[string]any, params map[string]string) {
  932. extractKcpShareFields(stream).applyToParams(params)
  933. }
  934. func applyKcpShareObj(stream map[string]any, obj map[string]any) {
  935. extractKcpShareFields(stream).applyToObj(obj)
  936. }
  937. type kcpShareFields struct {
  938. headerType string
  939. seed string
  940. mtu int
  941. tti int
  942. }
  943. func (f kcpShareFields) applyToParams(params map[string]string) {
  944. if f.headerType != "" && f.headerType != "none" {
  945. params["headerType"] = f.headerType
  946. }
  947. setStringParam(params, "seed", f.seed)
  948. setIntParam(params, "mtu", f.mtu)
  949. setIntParam(params, "tti", f.tti)
  950. }
  951. func (f kcpShareFields) applyToObj(obj map[string]any) {
  952. if f.headerType != "" && f.headerType != "none" {
  953. obj["type"] = f.headerType
  954. }
  955. setStringField(obj, "path", f.seed)
  956. setIntField(obj, "mtu", f.mtu)
  957. setIntField(obj, "tti", f.tti)
  958. }
  959. func extractKcpShareFields(stream map[string]any) kcpShareFields {
  960. fields := kcpShareFields{headerType: "none"}
  961. if kcp, ok := stream["kcpSettings"].(map[string]any); ok {
  962. if header, ok := kcp["header"].(map[string]any); ok {
  963. if value, ok := header["type"].(string); ok && value != "" {
  964. fields.headerType = value
  965. }
  966. }
  967. if value, ok := kcp["seed"].(string); ok && value != "" {
  968. fields.seed = value
  969. }
  970. if value, ok := readPositiveInt(kcp["mtu"]); ok {
  971. fields.mtu = value
  972. }
  973. if value, ok := readPositiveInt(kcp["tti"]); ok {
  974. fields.tti = value
  975. }
  976. }
  977. for _, rawMask := range normalizedFinalMaskUDPMasks(stream["finalmask"]) {
  978. mask, _ := rawMask.(map[string]any)
  979. if mask == nil {
  980. continue
  981. }
  982. maskType, _ := mask["type"].(string)
  983. if mapped, ok := kcpMaskToHeaderType[maskType]; ok {
  984. fields.headerType = mapped
  985. continue
  986. }
  987. switch maskType {
  988. case "mkcp-original":
  989. fields.seed = ""
  990. case "mkcp-aes128gcm":
  991. fields.seed = ""
  992. settings, _ := mask["settings"].(map[string]any)
  993. if value, ok := settings["password"].(string); ok && value != "" {
  994. fields.seed = value
  995. }
  996. }
  997. }
  998. return fields
  999. }
  1000. func readPositiveInt(value any) (int, bool) {
  1001. switch number := value.(type) {
  1002. case int:
  1003. return number, number > 0
  1004. case int32:
  1005. return int(number), number > 0
  1006. case int64:
  1007. return int(number), number > 0
  1008. case float32:
  1009. parsed := int(number)
  1010. return parsed, parsed > 0
  1011. case float64:
  1012. parsed := int(number)
  1013. return parsed, parsed > 0
  1014. default:
  1015. return 0, false
  1016. }
  1017. }
  1018. func setStringParam(params map[string]string, key, value string) {
  1019. if value == "" {
  1020. delete(params, key)
  1021. return
  1022. }
  1023. params[key] = value
  1024. }
  1025. func setIntParam(params map[string]string, key string, value int) {
  1026. if value <= 0 {
  1027. delete(params, key)
  1028. return
  1029. }
  1030. params[key] = fmt.Sprintf("%d", value)
  1031. }
  1032. func setStringField(obj map[string]any, key, value string) {
  1033. if value == "" {
  1034. delete(obj, key)
  1035. return
  1036. }
  1037. obj[key] = value
  1038. }
  1039. func setIntField(obj map[string]any, key string, value int) {
  1040. if value <= 0 {
  1041. delete(obj, key)
  1042. return
  1043. }
  1044. obj[key] = value
  1045. }
  1046. // applyFinalMaskParams exports the finalmask payload as the compact
  1047. // `fm=<json>` share-link field used by v2rayN-compatible clients.
  1048. func applyFinalMaskParams(finalmask map[string]any, params map[string]string) {
  1049. if fm, ok := marshalFinalMask(finalmask); ok {
  1050. params["fm"] = fm
  1051. }
  1052. }
  1053. func applyFinalMaskObj(finalmask map[string]any, obj map[string]any) {
  1054. if fm, ok := marshalFinalMask(finalmask); ok {
  1055. obj["fm"] = fm
  1056. }
  1057. }
  1058. func marshalFinalMask(finalmask map[string]any) (string, bool) {
  1059. normalized := normalizeFinalMask(finalmask)
  1060. if !hasFinalMaskContent(normalized) {
  1061. return "", false
  1062. }
  1063. b, err := json.Marshal(normalized)
  1064. if err != nil || len(b) == 0 || string(b) == "null" {
  1065. return "", false
  1066. }
  1067. return string(b), true
  1068. }
  1069. func normalizeFinalMask(finalmask map[string]any) map[string]any {
  1070. tcpMasks := normalizedFinalMaskTCPMasks(finalmask)
  1071. udpMasks := normalizedFinalMaskUDPMasks(finalmask)
  1072. quicParams, hasQuicParams := finalmask["quicParams"].(map[string]any)
  1073. if len(tcpMasks) == 0 && len(udpMasks) == 0 && !hasQuicParams {
  1074. return nil
  1075. }
  1076. result := map[string]any{}
  1077. if len(tcpMasks) > 0 {
  1078. result["tcp"] = tcpMasks
  1079. }
  1080. if len(udpMasks) > 0 {
  1081. result["udp"] = udpMasks
  1082. }
  1083. if hasQuicParams && len(quicParams) > 0 {
  1084. result["quicParams"] = quicParams
  1085. }
  1086. return result
  1087. }
  1088. func normalizedFinalMaskTCPMasks(value any) []any {
  1089. finalmask, _ := value.(map[string]any)
  1090. if finalmask == nil {
  1091. return nil
  1092. }
  1093. rawMasks, _ := finalmask["tcp"].([]any)
  1094. if len(rawMasks) == 0 {
  1095. return nil
  1096. }
  1097. normalized := make([]any, 0, len(rawMasks))
  1098. for _, rawMask := range rawMasks {
  1099. mask, _ := rawMask.(map[string]any)
  1100. if mask == nil {
  1101. continue
  1102. }
  1103. maskType, _ := mask["type"].(string)
  1104. if _, ok := validFinalMaskTCPTypes[maskType]; !ok || maskType == "" {
  1105. continue
  1106. }
  1107. normalizedMask := map[string]any{"type": maskType}
  1108. if settings, ok := mask["settings"].(map[string]any); ok && len(settings) > 0 {
  1109. normalizedMask["settings"] = settings
  1110. }
  1111. normalized = append(normalized, normalizedMask)
  1112. }
  1113. if len(normalized) == 0 {
  1114. return nil
  1115. }
  1116. return normalized
  1117. }
  1118. func normalizedFinalMaskUDPMasks(value any) []any {
  1119. finalmask, _ := value.(map[string]any)
  1120. if finalmask == nil {
  1121. return nil
  1122. }
  1123. rawMasks, _ := finalmask["udp"].([]any)
  1124. if len(rawMasks) == 0 {
  1125. return nil
  1126. }
  1127. normalized := make([]any, 0, len(rawMasks))
  1128. for _, rawMask := range rawMasks {
  1129. mask, _ := rawMask.(map[string]any)
  1130. if mask == nil {
  1131. continue
  1132. }
  1133. maskType, _ := mask["type"].(string)
  1134. if _, ok := validFinalMaskUDPTypes[maskType]; !ok || maskType == "" {
  1135. continue
  1136. }
  1137. normalizedMask := map[string]any{"type": maskType}
  1138. if settings, ok := mask["settings"].(map[string]any); ok && len(settings) > 0 {
  1139. normalizedMask["settings"] = settings
  1140. }
  1141. normalized = append(normalized, normalizedMask)
  1142. }
  1143. if len(normalized) == 0 {
  1144. return nil
  1145. }
  1146. return normalized
  1147. }
  1148. func hasFinalMaskContent(value any) bool {
  1149. switch v := value.(type) {
  1150. case nil:
  1151. return false
  1152. case string:
  1153. return len(v) > 0
  1154. case map[string]any:
  1155. for _, item := range v {
  1156. if hasFinalMaskContent(item) {
  1157. return true
  1158. }
  1159. }
  1160. return false
  1161. case []any:
  1162. return slices.ContainsFunc(v, hasFinalMaskContent)
  1163. default:
  1164. return true
  1165. }
  1166. }
  1167. func searchHost(headers any) string {
  1168. data, _ := headers.(map[string]any)
  1169. for k, v := range data {
  1170. if strings.EqualFold(k, "host") {
  1171. switch v.(type) {
  1172. case []any:
  1173. hosts, _ := v.([]any)
  1174. if len(hosts) > 0 {
  1175. return hosts[0].(string)
  1176. } else {
  1177. return ""
  1178. }
  1179. case any:
  1180. return v.(string)
  1181. }
  1182. }
  1183. }
  1184. return ""
  1185. }
  1186. // PageData is a view model for subpage.html
  1187. // PageData contains data for rendering the subscription information page.
  1188. type PageData struct {
  1189. Host string
  1190. BasePath string
  1191. SId string
  1192. Download string
  1193. Upload string
  1194. Total string
  1195. Used string
  1196. Remained string
  1197. Expire int64
  1198. LastOnline int64
  1199. Datepicker string
  1200. DownloadByte int64
  1201. UploadByte int64
  1202. TotalByte int64
  1203. SubUrl string
  1204. SubJsonUrl string
  1205. SubClashUrl string
  1206. Result []string
  1207. }
  1208. // ResolveRequest extracts scheme and host info from request/headers consistently.
  1209. // ResolveRequest extracts scheme, host, and header information from an HTTP request.
  1210. func (s *SubService) ResolveRequest(c *gin.Context) (scheme string, host string, hostWithPort string, hostHeader string) {
  1211. // scheme
  1212. scheme = "http"
  1213. if c.Request.TLS != nil || strings.EqualFold(c.GetHeader("X-Forwarded-Proto"), "https") {
  1214. scheme = "https"
  1215. }
  1216. // base host (no port)
  1217. if h, err := getHostFromXFH(c.GetHeader("X-Forwarded-Host")); err == nil && h != "" {
  1218. host = h
  1219. }
  1220. if host == "" {
  1221. host = c.GetHeader("X-Real-IP")
  1222. }
  1223. if host == "" {
  1224. var err error
  1225. host, _, err = net.SplitHostPort(c.Request.Host)
  1226. if err != nil {
  1227. host = c.Request.Host
  1228. }
  1229. }
  1230. // host:port for URLs
  1231. hostWithPort = c.GetHeader("X-Forwarded-Host")
  1232. if hostWithPort == "" {
  1233. hostWithPort = c.Request.Host
  1234. }
  1235. if hostWithPort == "" {
  1236. hostWithPort = host
  1237. }
  1238. // header display host
  1239. hostHeader = c.GetHeader("X-Forwarded-Host")
  1240. if hostHeader == "" {
  1241. hostHeader = c.GetHeader("X-Real-IP")
  1242. }
  1243. if hostHeader == "" {
  1244. hostHeader = host
  1245. }
  1246. return
  1247. }
  1248. // BuildURLs constructs absolute subscription and JSON subscription URLs for a given subscription ID.
  1249. // It prioritizes configured URIs, then individual settings, and finally falls back to request-derived components.
  1250. func (s *SubService) BuildURLs(scheme, hostWithPort, subPath, subJsonPath, subClashPath, subId string) (subURL, subJsonURL, subClashURL string) {
  1251. if subId == "" {
  1252. return "", "", ""
  1253. }
  1254. configuredSubURI, _ := s.settingService.GetSubURI()
  1255. configuredSubJsonURI, _ := s.settingService.GetSubJsonURI()
  1256. configuredSubClashURI, _ := s.settingService.GetSubClashURI()
  1257. var baseScheme, baseHostWithPort string
  1258. if configuredSubURI == "" || configuredSubJsonURI == "" || configuredSubClashURI == "" {
  1259. baseScheme, baseHostWithPort = s.getBaseSchemeAndHost(scheme, hostWithPort)
  1260. }
  1261. subURL = s.buildSingleURL(configuredSubURI, baseScheme, baseHostWithPort, subPath, subId)
  1262. subJsonURL = s.buildSingleURL(configuredSubJsonURI, baseScheme, baseHostWithPort, subJsonPath, subId)
  1263. subClashURL = s.buildSingleURL(configuredSubClashURI, baseScheme, baseHostWithPort, subClashPath, subId)
  1264. return subURL, subJsonURL, subClashURL
  1265. }
  1266. // getBaseSchemeAndHost determines the base scheme and host from settings or falls back to request values
  1267. func (s *SubService) getBaseSchemeAndHost(requestScheme, requestHostWithPort string) (string, string) {
  1268. subDomain, err := s.settingService.GetSubDomain()
  1269. if err != nil || subDomain == "" {
  1270. return requestScheme, requestHostWithPort
  1271. }
  1272. // Get port and TLS settings
  1273. subPort, _ := s.settingService.GetSubPort()
  1274. subKeyFile, _ := s.settingService.GetSubKeyFile()
  1275. subCertFile, _ := s.settingService.GetSubCertFile()
  1276. // Determine scheme from TLS configuration
  1277. scheme := "http"
  1278. if subKeyFile != "" && subCertFile != "" {
  1279. scheme = "https"
  1280. }
  1281. // Build host:port, always include port for clarity
  1282. hostWithPort := fmt.Sprintf("%s:%d", subDomain, subPort)
  1283. return scheme, hostWithPort
  1284. }
  1285. // buildSingleURL constructs a single URL using configured URI or base components
  1286. func (s *SubService) buildSingleURL(configuredURI, baseScheme, baseHostWithPort, basePath, subId string) string {
  1287. if configuredURI != "" {
  1288. return s.joinPathWithID(configuredURI, subId)
  1289. }
  1290. baseURL := fmt.Sprintf("%s://%s", baseScheme, baseHostWithPort)
  1291. return s.joinPathWithID(baseURL+basePath, subId)
  1292. }
  1293. // joinPathWithID safely joins a base path with a subscription ID
  1294. func (s *SubService) joinPathWithID(basePath, subId string) string {
  1295. if strings.HasSuffix(basePath, "/") {
  1296. return basePath + subId
  1297. }
  1298. return basePath + "/" + subId
  1299. }
  1300. // BuildPageData parses header and prepares the template view model.
  1301. // BuildPageData constructs page data for rendering the subscription information page.
  1302. func (s *SubService) BuildPageData(subId string, hostHeader string, traffic xray.ClientTraffic, lastOnline int64, subs []string, subURL, subJsonURL, subClashURL string, basePath string) PageData {
  1303. download := common.FormatTraffic(traffic.Down)
  1304. upload := common.FormatTraffic(traffic.Up)
  1305. total := "∞"
  1306. used := common.FormatTraffic(traffic.Up + traffic.Down)
  1307. remained := ""
  1308. if traffic.Total > 0 {
  1309. total = common.FormatTraffic(traffic.Total)
  1310. left := max(traffic.Total-(traffic.Up+traffic.Down), 0)
  1311. remained = common.FormatTraffic(left)
  1312. }
  1313. datepicker := s.datepicker
  1314. if datepicker == "" {
  1315. datepicker = "gregorian"
  1316. }
  1317. return PageData{
  1318. Host: hostHeader,
  1319. BasePath: basePath,
  1320. SId: subId,
  1321. Download: download,
  1322. Upload: upload,
  1323. Total: total,
  1324. Used: used,
  1325. Remained: remained,
  1326. Expire: traffic.ExpiryTime / 1000,
  1327. LastOnline: lastOnline,
  1328. Datepicker: datepicker,
  1329. DownloadByte: traffic.Down,
  1330. UploadByte: traffic.Up,
  1331. TotalByte: traffic.Total,
  1332. SubUrl: subURL,
  1333. SubJsonUrl: subJsonURL,
  1334. SubClashUrl: subClashURL,
  1335. Result: subs,
  1336. }
  1337. }
  1338. func getHostFromXFH(s string) (string, error) {
  1339. if strings.Contains(s, ":") {
  1340. realHost, _, err := net.SplitHostPort(s)
  1341. if err != nil {
  1342. return "", err
  1343. }
  1344. return realHost, nil
  1345. }
  1346. return s, nil
  1347. }