mirror of
https://gitclone.com/github.com/MetaCubeX/Clash.Meta
synced 2024-11-14 21:31:16 +08:00
0bb5568de9
* feat: add ssh outbound * fix: Modify the way to get dstAddr --------- Co-authored-by: trevid <trevidmy@gmail.com>
168 lines
4.2 KiB
Go
168 lines
4.2 KiB
Go
package adapter
|
|
|
|
import (
|
|
"fmt"
|
|
|
|
tlsC "github.com/metacubex/mihomo/component/tls"
|
|
|
|
"github.com/metacubex/mihomo/adapter/outbound"
|
|
"github.com/metacubex/mihomo/common/structure"
|
|
C "github.com/metacubex/mihomo/constant"
|
|
)
|
|
|
|
func ParseProxy(mapping map[string]any) (C.Proxy, error) {
|
|
decoder := structure.NewDecoder(structure.Option{TagName: "proxy", WeaklyTypedInput: true, KeyReplacer: structure.DefaultKeyReplacer})
|
|
proxyType, existType := mapping["type"].(string)
|
|
if !existType {
|
|
return nil, fmt.Errorf("missing type")
|
|
}
|
|
|
|
var (
|
|
proxy C.ProxyAdapter
|
|
err error
|
|
)
|
|
switch proxyType {
|
|
case "ss":
|
|
ssOption := &outbound.ShadowSocksOption{ClientFingerprint: tlsC.GetGlobalFingerprint()}
|
|
err = decoder.Decode(mapping, ssOption)
|
|
if err != nil {
|
|
break
|
|
}
|
|
proxy, err = outbound.NewShadowSocks(*ssOption)
|
|
case "ssr":
|
|
ssrOption := &outbound.ShadowSocksROption{}
|
|
err = decoder.Decode(mapping, ssrOption)
|
|
if err != nil {
|
|
break
|
|
}
|
|
proxy, err = outbound.NewShadowSocksR(*ssrOption)
|
|
case "socks5":
|
|
socksOption := &outbound.Socks5Option{}
|
|
err = decoder.Decode(mapping, socksOption)
|
|
if err != nil {
|
|
break
|
|
}
|
|
proxy, err = outbound.NewSocks5(*socksOption)
|
|
case "http":
|
|
httpOption := &outbound.HttpOption{}
|
|
err = decoder.Decode(mapping, httpOption)
|
|
if err != nil {
|
|
break
|
|
}
|
|
proxy, err = outbound.NewHttp(*httpOption)
|
|
case "vmess":
|
|
vmessOption := &outbound.VmessOption{
|
|
HTTPOpts: outbound.HTTPOptions{
|
|
Method: "GET",
|
|
Path: []string{"/"},
|
|
},
|
|
ClientFingerprint: tlsC.GetGlobalFingerprint(),
|
|
}
|
|
|
|
err = decoder.Decode(mapping, vmessOption)
|
|
if err != nil {
|
|
break
|
|
}
|
|
proxy, err = outbound.NewVmess(*vmessOption)
|
|
case "vless":
|
|
vlessOption := &outbound.VlessOption{ClientFingerprint: tlsC.GetGlobalFingerprint()}
|
|
err = decoder.Decode(mapping, vlessOption)
|
|
if err != nil {
|
|
break
|
|
}
|
|
proxy, err = outbound.NewVless(*vlessOption)
|
|
case "snell":
|
|
snellOption := &outbound.SnellOption{}
|
|
err = decoder.Decode(mapping, snellOption)
|
|
if err != nil {
|
|
break
|
|
}
|
|
proxy, err = outbound.NewSnell(*snellOption)
|
|
case "trojan":
|
|
trojanOption := &outbound.TrojanOption{ClientFingerprint: tlsC.GetGlobalFingerprint()}
|
|
err = decoder.Decode(mapping, trojanOption)
|
|
if err != nil {
|
|
break
|
|
}
|
|
proxy, err = outbound.NewTrojan(*trojanOption)
|
|
case "hysteria":
|
|
hyOption := &outbound.HysteriaOption{}
|
|
err = decoder.Decode(mapping, hyOption)
|
|
if err != nil {
|
|
break
|
|
}
|
|
proxy, err = outbound.NewHysteria(*hyOption)
|
|
case "hysteria2":
|
|
hyOption := &outbound.Hysteria2Option{}
|
|
err = decoder.Decode(mapping, hyOption)
|
|
if err != nil {
|
|
break
|
|
}
|
|
proxy, err = outbound.NewHysteria2(*hyOption)
|
|
case "wireguard":
|
|
wgOption := &outbound.WireGuardOption{}
|
|
err = decoder.Decode(mapping, wgOption)
|
|
if err != nil {
|
|
break
|
|
}
|
|
proxy, err = outbound.NewWireGuard(*wgOption)
|
|
case "tuic":
|
|
tuicOption := &outbound.TuicOption{}
|
|
err = decoder.Decode(mapping, tuicOption)
|
|
if err != nil {
|
|
break
|
|
}
|
|
proxy, err = outbound.NewTuic(*tuicOption)
|
|
case "direct":
|
|
directOption := &outbound.DirectOption{}
|
|
err = decoder.Decode(mapping, directOption)
|
|
if err != nil {
|
|
break
|
|
}
|
|
proxy = outbound.NewDirectWithOption(*directOption)
|
|
case "dns":
|
|
dnsOptions := &outbound.DnsOption{}
|
|
err = decoder.Decode(mapping, dnsOptions)
|
|
if err != nil {
|
|
break
|
|
}
|
|
proxy = outbound.NewDnsWithOption(*dnsOptions)
|
|
case "reject":
|
|
rejectOption := &outbound.RejectOption{}
|
|
err = decoder.Decode(mapping, rejectOption)
|
|
if err != nil {
|
|
break
|
|
}
|
|
proxy = outbound.NewRejectWithOption(*rejectOption)
|
|
case "ssh":
|
|
sshOption := &outbound.SshOption{}
|
|
err = decoder.Decode(mapping, sshOption)
|
|
if err != nil {
|
|
break
|
|
}
|
|
proxy, err = outbound.NewSsh(*sshOption)
|
|
default:
|
|
return nil, fmt.Errorf("unsupport proxy type: %s", proxyType)
|
|
}
|
|
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if muxMapping, muxExist := mapping["smux"].(map[string]any); muxExist {
|
|
muxOption := &outbound.SingMuxOption{}
|
|
err = decoder.Decode(muxMapping, muxOption)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if muxOption.Enabled {
|
|
proxy, err = outbound.NewSingMux(*muxOption, proxy, proxy.(outbound.ProxyBase))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
}
|
|
|
|
return NewProxy(proxy), nil
|
|
}
|