nodelistparser 1.3.0 → 1.3.2-beta.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -113,6 +113,9 @@ declare namespace index$4 {
113
113
 
114
114
  declare function decode(config: Record<string, any>): SupportedConfig;
115
115
  declare function encode(config: SupportedConfig): {
116
+ name: string;
117
+ server: string;
118
+ port: number;
116
119
  tfo: boolean | undefined;
117
120
  'dialer-proxy': string | undefined;
118
121
  plugin?: string | undefined;
@@ -129,148 +132,80 @@ declare function encode(config: SupportedConfig): {
129
132
  mode?: undefined;
130
133
  uri?: undefined;
131
134
  } | undefined;
132
- name: string;
133
135
  type: string;
134
- server: string;
135
- port: number;
136
136
  cipher: string;
137
137
  password: string;
138
138
  udp: boolean;
139
- alterId?: undefined;
140
- tls?: undefined;
141
- uuid?: undefined;
142
- servername?: undefined;
143
- 'ws-path'?: undefined;
144
- 'ws-headers'?: undefined;
145
- 'ws-opts'?: undefined;
146
- network?: undefined;
147
- ports?: undefined;
148
- down?: undefined;
149
- 'skip-cert-verify'?: undefined;
150
139
  } | {
151
- tfo: boolean | undefined;
152
- 'dialer-proxy': string | undefined;
153
140
  name: string;
154
- type: string;
155
141
  server: string;
156
142
  port: number;
143
+ tfo: boolean | undefined;
144
+ 'dialer-proxy': string | undefined;
145
+ type: string;
157
146
  password: string;
158
147
  sni: string | undefined;
159
148
  'skip-cert-verify': boolean;
160
149
  udp: boolean;
161
- alterId?: undefined;
162
- tls?: undefined;
163
- uuid?: undefined;
164
- servername?: undefined;
165
- 'ws-path'?: undefined;
166
- 'ws-headers'?: undefined;
167
- cipher?: undefined;
168
- 'ws-opts'?: undefined;
169
- network?: undefined;
170
- ports?: undefined;
171
- down?: undefined;
172
150
  } | {
151
+ name: string;
152
+ server: string;
153
+ port: number;
173
154
  tfo: boolean | undefined;
174
155
  'dialer-proxy': string | undefined;
175
156
  'skip-cert-verify': boolean;
176
157
  udp: boolean;
177
158
  version: number;
178
159
  token: string;
179
- name: string;
180
160
  type: string;
181
- server: string;
182
- port: number;
183
161
  sni: string | undefined;
184
162
  uuid: string;
185
163
  alpn: string[];
186
- alterId?: undefined;
187
- tls?: undefined;
188
- servername?: undefined;
189
- 'ws-path'?: undefined;
190
- 'ws-headers'?: undefined;
191
- cipher?: undefined;
192
- 'ws-opts'?: undefined;
193
- network?: undefined;
194
- ports?: undefined;
195
- password?: undefined;
196
- down?: undefined;
197
164
  } | {
165
+ name: string;
166
+ server: string;
167
+ port: number;
198
168
  tfo: boolean | undefined;
199
169
  'dialer-proxy': string | undefined;
200
170
  'skip-cert-verify': boolean;
201
171
  udp: boolean;
202
172
  version: number;
203
173
  password: string;
204
- name: string;
205
174
  type: string;
206
- server: string;
207
- port: number;
208
175
  sni: string | undefined;
209
176
  uuid: string;
210
177
  alpn: string[];
211
- alterId?: undefined;
212
- tls?: undefined;
213
- servername?: undefined;
214
- 'ws-path'?: undefined;
215
- 'ws-headers'?: undefined;
216
- cipher?: undefined;
217
- 'ws-opts'?: undefined;
218
- network?: undefined;
219
- ports?: undefined;
220
- down?: undefined;
221
178
  } | {
222
- tfo: boolean | undefined;
223
- 'dialer-proxy': string | undefined;
224
179
  name: string;
225
- type: string;
226
180
  server: string;
227
181
  port: number;
182
+ tfo: boolean | undefined;
183
+ 'dialer-proxy': string | undefined;
184
+ type: string;
228
185
  username: string;
229
186
  password: string;
230
187
  udp: boolean;
231
- alterId?: undefined;
232
- tls?: undefined;
233
- uuid?: undefined;
234
- servername?: undefined;
235
- 'ws-path'?: undefined;
236
- 'ws-headers'?: undefined;
237
- cipher?: undefined;
238
- 'ws-opts'?: undefined;
239
- network?: undefined;
240
- ports?: undefined;
241
- down?: undefined;
242
- 'skip-cert-verify'?: undefined;
243
188
  } | {
244
- tfo: boolean | undefined;
245
- 'dialer-proxy': string | undefined;
246
189
  name: string;
247
- type: string;
248
190
  server: string;
249
191
  port: number;
192
+ tfo: boolean | undefined;
193
+ 'dialer-proxy': string | undefined;
194
+ type: string;
250
195
  username: string;
251
196
  password: string;
252
- alterId?: undefined;
253
- tls?: undefined;
254
- udp?: undefined;
255
- uuid?: undefined;
256
- servername?: undefined;
257
- 'ws-path'?: undefined;
258
- 'ws-headers'?: undefined;
259
- cipher?: undefined;
260
- 'ws-opts'?: undefined;
261
- network?: undefined;
262
- ports?: undefined;
263
- down?: undefined;
264
- 'skip-cert-verify'?: undefined;
265
197
  } | {
198
+ name: string;
199
+ server: string;
200
+ port: number;
201
+ tfo: boolean | undefined;
202
+ 'dialer-proxy': string | undefined;
266
203
  alterId: number | undefined;
267
204
  tls: boolean;
268
205
  udp: boolean;
269
206
  uuid: string;
270
- name: string;
271
207
  servername: string | undefined;
272
208
  'ws-path': string | undefined;
273
- server: string;
274
209
  'ws-headers': Record<string, string> | undefined;
275
210
  cipher: string;
276
211
  'ws-opts': {
@@ -278,31 +213,18 @@ declare function encode(config: SupportedConfig): {
278
213
  headers: Record<string, string> | undefined;
279
214
  };
280
215
  type: string;
281
- port: number;
282
216
  network: string;
283
- ports?: undefined;
284
- password?: undefined;
285
- down?: undefined;
286
- 'skip-cert-verify'?: undefined;
287
217
  } | {
288
218
  name: string;
289
- type: string;
290
219
  server: string;
291
220
  port: number;
292
- ports: string | undefined;
221
+ tfo: boolean | undefined;
222
+ 'dialer-proxy': string | undefined;
223
+ type: string;
224
+ ports: string;
293
225
  password: string;
294
226
  down: string;
295
227
  'skip-cert-verify': boolean;
296
- alterId?: undefined;
297
- tls?: undefined;
298
- udp?: undefined;
299
- uuid?: undefined;
300
- servername?: undefined;
301
- 'ws-path'?: undefined;
302
- 'ws-headers'?: undefined;
303
- cipher?: undefined;
304
- 'ws-opts'?: undefined;
305
- network?: undefined;
306
228
  };
307
229
 
308
230
  declare const index$3_decode: typeof decode;
package/dist/cjs/index.js CHANGED
@@ -1 +1 @@
1
- var e=require("foxts/guard"),s=require("foxts/string-join"),r=require("node:buffer");const t=Number,o=e=>e.split(",").map(e=>e.trim());function p(e){let s=e.indexOf("=");return -1===s?["",""]:[e.slice(0,s).trim(),e.slice(s+1).trim()]}const n=new Set(["udp-relay","tfo","reuse","skip-cert-verify","tls","vmess-aead","ws"]),a=new Set(["version","download-bandwidth","port-hopping-interval","udp-port","shadow-tls-version"]),i=new Set([]),d=new Set(["username","password","sni","encrypt-method","psk","obfs","obfs-host","uuid","alpn","block-quic","ws-path","ws-headers","port-hopping","token","underlying-proxy","shadow-tls-password","shadow-tls-sni"]),u=Symbol("unsupported");function l(e){return e.split(",").reduce((e,s)=>{let[r,t]=s.split(":");return e[r.trim()]=t.trim(),e},{})}function w(e){let s,r,[o,p]=e.split("://");if("ss"!==o)throw Error(`[ss.decodeOne] Unsupported type: ${o}`);let[n,a]=p.split("@");n.includes(":")?[s,r]=n.split(":"):[s,r]=atob(n).split(":");let[i,d]=a.split(":"),[u,l]=d.split("#"),[w,c]=u.split("/"),h=null;if(c)try{h=new URLSearchParams(c).get("plugin")}catch(s){let e=Error(`[ss.decodeOne] Invalid plugins: ${c}`);throw e.cause=s,e}let y=(h?.split(";")??[]).reduce((e,s)=>{let[r,t]=s.split("=");return e[r]=t,e},{});return{raw:e,type:"ss",name:decodeURIComponent(l),server:i,port:t(w),cipher:s,password:r,udp:!0,obfs:"obfs-local"in y&&"obfs"in y&&("http"===y.obfs||"tls"===y.obfs)?y.obfs:void 0,obfsHost:"obfs-host"in y?y["obfs-host"]:void 0}}function c(e){return atob(e).replaceAll("\r\n","\n").split("\n").filter(Boolean)}const h=new TextDecoder;exports.clash={__proto__:null,decode:function(e){if(!("type"in e)||"string"!=typeof e.type)throw TypeError("Missing or invalid type field");let s=JSON.stringify(e);switch(e.type){case"http":return{type:"http",name:e.name,server:e.server,port:Number(e.port),username:e.username,password:e.password,underlyingProxy:e["dialer-proxy"],raw:s};case"ss":return{type:"ss",name:e.name,server:e.server,port:Number(e.port),cipher:e.cipher,password:e.password,udp:e.udp||!1,obfs:"obfs"===e.plugin?e["plugin-opts"].mode:void 0,underlyingProxy:e["dialer-proxy"],shadowTlsSni:"shadow-tls"===e.plugin?e["plugin-opts"].host:void 0,shadowTlsPassword:"shadow-tls"===e.plugin?e["plugin-opts"].password:void 0,shadowTlsVersion:"shadow-tls"===e.plugin?e["plugin-opts"].version:void 0,raw:s};case"socks5":return{type:"socks5",name:e.name,server:e.server,port:Number(e.port),username:e.username,password:e.password,udp:e.udp||!1,underlyingProxy:e["dialer-proxy"],raw:s};case"trojan":return{type:"trojan",name:e.name,server:e.server,port:Number(e.port),password:e.password,sni:e.sni,skipCertVerify:e["skip-cert-verify"]||!1,udp:e.udp||!1,underlyingProxy:e["dialer-proxy"],raw:s};case"vmess":return{type:"vmess",name:e.name,server:e.server,port:Number(e.port),username:e.uuid,vmessAead:1===e.alterId||"1"===e.alterId,sni:e.servername,ws:"ws"===e.network,wsPath:e["ws-path"],wsHeaders:e["ws-headers"]?Object.entries(e["ws-headers"]).map(([e,s])=>`${e}:${s}`).join(", "):void 0,tls:e.tls||!1,udp:e.udp??!0,underlyingProxy:e["dialer-proxy"],raw:s,skipCertVerify:e["skip-cert-verify"]||!1};default:throw TypeError(`Unsupported type: ${e.type} (clash decode)`)}},encode:function(s){let r={tfo:s.tfo,"dialer-proxy":s.underlyingProxy};switch(s.type){case"ss":if(s.shadowTlsPassword&&(s.udp||s.udpPort))throw Error("Clash doesn't support plain UDP for Shadow TLS (clash encode)");return{name:s.name,type:"ss",server:s.server,port:s.port,cipher:s.cipher,password:s.password,udp:s.udp,...s.obfs?{plugin:"obfs","plugin-opts":{mode:s.obfs,host:s.obfsHost,uri:s.obfsUri}}:{},...s.shadowTlsPassword?{plugin:"shadow-tls","plugin-opts":{host:s.shadowTlsSni,password:s.shadowTlsPassword,version:s.shadowTlsVersion}}:{},...r};case"trojan":return{name:s.name,type:"trojan",server:s.server,port:s.port,password:s.password,sni:s.sni,"skip-cert-verify":s.skipCertVerify,udp:s.udp,...r};case"tuic":case"tuic-v5":return{name:s.name,type:"tuic",server:s.server,port:s.port,sni:s.sni,uuid:s.uuid,alpn:s.alpn.split(",").map(e=>e.trim()),..."tuic"===s.type?{token:s.token}:{password:s.password},"skip-cert-verify":s.skipCertVerify,udp:!0,version:"tuic"===s.type?4:"tuic-v5"===s.type?5:e.never(s),...r};case"socks5":return{name:s.name,type:"socks5",server:s.server,port:s.port,username:s.username,password:s.password,udp:s.udp,...r};case"http":return{name:s.name,type:"http",server:s.server,port:s.port,username:s.username,password:s.password,...r};case"vmess":return{alterId:s.vmessAead?0:void 0,tls:s.tls,udp:s.udp,uuid:s.username,name:s.name,servername:s.sni,"ws-path":s.wsPath,server:s.server,"ws-headers":s.wsHeaders?l(s.wsHeaders):void 0,cipher:"auto","ws-opts":{path:s.wsPath,headers:s.wsHeaders?l(s.wsHeaders):void 0},type:"vmess",port:s.port,network:s.ws?"ws":"tcp"};case"hysteria2":return{name:s.name,type:"hysteria2",server:s.server,port:s.port,ports:s.portHopping,password:s.password,down:s.downloadBandwidth+" Mbps","skip-cert-verify":s.skipCertVerify};default:throw TypeError(`Unsupported type: ${s.type} (clash encode)`)}}},exports.ss={__proto__:null,decodeBase64Multiline:c,decodeMultiline:function(e){return c(e).map(e=>w(e))},decodeOne:w},exports.surge={__proto__:null,decode:function(e){let[s,r]=p(e),[l,w,c,...h]=o(r),y=t(c),m=Object.fromEntries(h.map(e=>{let[s,r]=p(e);return n.has(s)?[s,"true"===r]:a.has(s)?[s,t(r)]:i.has(s)?[s,o(r)]:d.has(s)?'"'===r[0]&&r.endsWith('"')||"'"===r[0]&&r.endsWith("'")?[s,r.slice(1,-1)]:[s,r]:[s,u]})),v={raw:e,name:s,server:w,port:y,tfo:m.tfo,blockQuic:m["block-quic"],underlyingProxy:m["underlying-proxy"]},f={sni:m.sni,skipCertVerify:m["skip-cert-verify"]};switch(l){case"snell":return{type:"snell",psk:m.psk,version:m.version,reuse:m.reuse,...v};case"ss":{let e=m["shadow-tls-password"],s=m["shadow-tls-sni"],r=m["shadow-tls-version"];return{type:"ss",cipher:m["encrypt-method"],password:m.password,udp:m["udp-relay"],obfs:m.obfs,obfsHost:m["obfs-host"],obfsUri:m["obfs-uri"],udpPort:m["udp-port"],shadowTlsPassword:e,shadowTlsSni:s,shadowTlsVersion:r,...v}}case"trojan":return{type:"trojan",password:m.password,udp:m["udp-relay"],...f,...v};case"tuic":return{type:"tuic",uuid:m.uuid,alpn:m.alpn,token:m.token,...f,...v};case"tuic-v5":return{type:"tuic-v5",uuid:m.uuid,alpn:m.alpn,password:m.password,...f,...v};case"socks5":return{type:"socks5",username:h[0],password:h[1],udp:m["udp-relay"],...v};case"http":return{type:"http",username:h[0],password:h[1],...v};case"vmess":return{type:"vmess",username:m.username,tls:m.tls,vmessAead:m["vmess-aead"],ws:m.ws,wsPath:m["ws-path"],wsHeaders:m["ws-headers"],udp:m["udp-relay"],...f,...v};case"hysteria2":return{type:"hysteria2",password:m.password,skipCertVerify:m["skip-cert-verify"],downloadBandwidth:m["download-bandwidth"],portHopping:m["port-hopping"],portHoppingInterval:m["port-hopping-interval"],...v};default:throw TypeError(`Unsupported type: ${l} (surge decode)`)}},encode:function(r){let t=[r.tfo&&"tfo=true",r.blockQuic&&`block-quic=${r.blockQuic}`,r.underlyingProxy&&`underlying-proxy=${r.underlyingProxy}`];switch(r.type){case"snell":return s.stringJoin([`${r.name} = snell, ${r.server}, ${r.port}, psk=${r.psk}, version=${r.version}, reuse=${r.reuse}`,...t],", ");case"ss":return s.stringJoin([`${r.name} = ss, ${r.server}, ${r.port}, encrypt-method=${r.cipher}, password=${r.password}`,r.shadowTlsPassword&&`shadow-tls-password=${r.shadowTlsPassword}`,r.shadowTlsSni&&`shadow-tls-sni=${r.shadowTlsSni}`,r.shadowTlsVersion&&`shadow-tls-version=${r.shadowTlsVersion}`,r.udp&&"udp-relay=true",r.udpPort&&`udp-port=${r.udpPort}`,r.obfs&&`obfs=${r.obfs}`,r.obfsHost&&`obfs-host=${r.obfsHost}`,r.obfsUri&&`obfs-uri=${r.obfsUri}`,...t],", ");case"trojan":return s.stringJoin([`${r.name} = trojan, ${r.server}, ${r.port}, password=${r.password}`,r.sni&&`sni=${r.sni}`,r.skipCertVerify&&"skip-cert-verify=true",...t,r.udp&&"udp-relay=true"],", ");case"tuic":return s.stringJoin([`${r.name} = tuic, ${r.server}, ${r.port}, sni=${r.sni}, uuid=${r.uuid}, alpn=${r.alpn}, token=${r.token}`,...t],", ");case"socks5":return s.stringJoin([`${r.name} = socks5, ${r.server}, ${r.port}, ${r.username}, ${r.password}`,r.udp&&"udp-relay=true",...t],", ");case"http":return s.stringJoin([`${r.name} = http, ${r.server}, ${r.port}, ${r.username}, ${r.password}`,...t],", ");case"vmess":return s.stringJoin([`${r.name} = vmess, ${r.server}, ${r.port}`,`username=${r.username}`,`tls=${r.tls}`,`vmess-aead=${r.vmessAead}`,"ws=true",r.wsPath&&`ws-path=${"/"===r.wsPath[0]?r.wsPath:`/${r.wsPath}`}`,r.wsHeaders&&`ws-headers=${r.wsHeaders}`,`skip-cert-verify=${r.skipCertVerify}`,`tfo=${r.tfo}`,`udp-relay=${r.udp}`],", ");case"hysteria2":return s.stringJoin([`${r.name} = hysteria2, ${r.server}, ${r.port}`,`password=${r.password}`,`download-bandwidth=${r.downloadBandwidth}`,r.portHopping&&`port-hopping="${r.portHopping}"`,r.portHoppingInterval&&`port-hopping-interval=${r.portHoppingInterval}`,`skip-cert-verify=${r.skipCertVerify}`,...t],", ");case"tuic-v5":return s.stringJoin([`${r.name} = tuic-v5, ${r.server}, ${r.port}`,`password=${r.password}`,`uuid=${r.uuid}`,`alpn=${r.alpn}`,`skip-cert-verify=${r.skipCertVerify}`,`sni=${r.sni}`,...t],", ");default:e.never(r,"type (surge encode)")}}},exports.trojan={__proto__:null,parse:function(e){let s=new URL(e),r=s.username,t=s.hostname,o=Number.parseInt(s.port,10);return{raw:e,name:decodeURIComponent(s.hash.slice(1)),type:"trojan",server:t,port:o,password:r,udp:!0,sni:s.searchParams.get("sni")??t,skipCertVerify:!0}}},exports.vmess={__proto__:null,parse:function(e){let s=JSON.parse(h.decode(r.Buffer.from(e.slice(8),"base64"))),t=s.ps,o=s.path;return{raw:e,name:t,server:s.add,port:Number.parseInt(s.port,10),type:"vmess",username:s.id,tls:s.tls,vmessAead:"0"===s.aid,sni:s.sni,ws:"ws"===s.net,wsPath:"/"===o[0]?o:`/${o}`,wsHeaders:s.sni||s.host?`Host:${s.sni||s.host}`:s.add,skipCertVerify:!0,udp:!0}}};
1
+ var s=require("foxts/guard"),e=require("foxts/string-join"),r=require("node:buffer");const t=Number,o=s=>s.split(",").map(s=>s.trim());function p(s){let e=s.indexOf("=");return -1===e?["",""]:[s.slice(0,e).trim(),s.slice(e+1).trim()]}const n=new Set(["udp-relay","tfo","reuse","skip-cert-verify","tls","vmess-aead","ws"]),a=new Set(["version","download-bandwidth","port-hopping-interval","udp-port","shadow-tls-version"]),i=new Set([]),d=new Set(["username","password","sni","encrypt-method","psk","obfs","obfs-host","uuid","alpn","block-quic","ws-path","ws-headers","port-hopping","token","underlying-proxy","shadow-tls-password","shadow-tls-sni"]),u=Symbol("unsupported");function l(s){return s.split(",").reduce((s,e)=>{let[r,t]=e.split(":");return s[r.trim()]=t.trim(),s},{})}function w(s){let e,r,[o,p]=s.split("://");if("ss"!==o)throw Error(`[ss.decodeOne] Unsupported type: ${o}`);let[n,a]=p.split("@");n.includes(":")?[e,r]=n.split(":"):[e,r]=atob(n).split(":");let[i,d]=a.split(":"),[u,l]=d.split("#"),[w,c]=u.split("/"),h=null;if(c)try{h=new URLSearchParams(c).get("plugin")}catch(e){let s=Error(`[ss.decodeOne] Invalid plugins: ${c}`);throw s.cause=e,s}let y=(h?.split(";")??[]).reduce((s,e)=>{let[r,t]=e.split("=");return s[r]=t,s},{});return{raw:s,type:"ss",name:decodeURIComponent(l),server:i,port:t(w),cipher:e,password:r,udp:!0,obfs:"obfs-local"in y&&"obfs"in y&&("http"===y.obfs||"tls"===y.obfs)?y.obfs:void 0,obfsHost:"obfs-host"in y?y["obfs-host"]:void 0}}function c(s){return atob(s).replaceAll("\r\n","\n").split("\n").filter(Boolean)}const h=new TextDecoder;exports.clash={__proto__:null,decode:function(s){if(!("type"in s)||"string"!=typeof s.type)throw TypeError("Missing or invalid type field");let e=JSON.stringify(s);switch(s.type){case"http":return{type:"http",name:s.name,server:s.server,port:Number(s.port),username:s.username,password:s.password,underlyingProxy:s["dialer-proxy"],raw:e};case"ss":return{type:"ss",name:s.name,server:s.server,port:Number(s.port),cipher:s.cipher,password:s.password,udp:s.udp||!1,obfs:"obfs"===s.plugin?s["plugin-opts"].mode:void 0,underlyingProxy:s["dialer-proxy"],shadowTlsSni:"shadow-tls"===s.plugin?s["plugin-opts"].host:void 0,shadowTlsPassword:"shadow-tls"===s.plugin?s["plugin-opts"].password:void 0,shadowTlsVersion:"shadow-tls"===s.plugin?s["plugin-opts"].version:void 0,raw:e};case"socks5":return{type:"socks5",name:s.name,server:s.server,port:Number(s.port),username:s.username,password:s.password,udp:s.udp||!1,underlyingProxy:s["dialer-proxy"],raw:e};case"trojan":return{type:"trojan",name:s.name,server:s.server,port:Number(s.port),password:s.password,sni:s.sni,skipCertVerify:s["skip-cert-verify"]||!1,udp:s.udp||!1,underlyingProxy:s["dialer-proxy"],raw:e};case"vmess":return{type:"vmess",name:s.name,server:s.server,port:Number(s.port),username:s.uuid,vmessAead:1===s.alterId||"1"===s.alterId,sni:s.servername,ws:"ws"===s.network,wsPath:s["ws-path"],wsHeaders:s["ws-headers"]?Object.entries(s["ws-headers"]).map(([s,e])=>`${s}:${e}`).join(", "):void 0,tls:s.tls||!1,udp:s.udp??!0,underlyingProxy:s["dialer-proxy"],raw:e,skipCertVerify:s["skip-cert-verify"]||!1};default:throw TypeError(`Unsupported type: ${s.type} (clash decode)`)}},encode:function(e){let r={name:e.name,server:e.server,port:e.port,tfo:e.tfo,"dialer-proxy":e.underlyingProxy};switch(e.type){case"ss":if(e.shadowTlsPassword&&(e.udp||e.udpPort))throw Error("Clash doesn't support plain UDP for Shadow TLS (clash encode)");return{type:"ss",cipher:e.cipher,password:e.password,udp:e.udp,...e.obfs?{plugin:"obfs","plugin-opts":{mode:e.obfs,host:e.obfsHost,uri:e.obfsUri}}:{},...e.shadowTlsPassword?{plugin:"shadow-tls","plugin-opts":{host:e.shadowTlsSni,password:e.shadowTlsPassword,version:e.shadowTlsVersion}}:{},...r};case"trojan":return{type:"trojan",password:e.password,sni:e.sni,"skip-cert-verify":e.skipCertVerify,udp:e.udp,...r};case"tuic":case"tuic-v5":return{type:"tuic",sni:e.sni,uuid:e.uuid,alpn:e.alpn.split(",").map(s=>s.trim()),..."tuic"===e.type?{token:e.token}:{password:e.password},"skip-cert-verify":e.skipCertVerify,udp:!0,version:"tuic"===e.type?4:"tuic-v5"===e.type?5:s.never(e),...r};case"socks5":return{type:"socks5",username:e.username,password:e.password,udp:e.udp,...r};case"http":return{type:"http",username:e.username,password:e.password,...r};case"vmess":return{alterId:e.vmessAead?0:void 0,tls:e.tls,udp:e.udp,uuid:e.username,servername:e.sni,"ws-path":e.wsPath,"ws-headers":e.wsHeaders?l(e.wsHeaders):void 0,cipher:"auto","ws-opts":{path:e.wsPath,headers:e.wsHeaders?l(e.wsHeaders):void 0},type:"vmess",network:e.ws?"ws":"tcp",...r};case"hysteria2":return{type:"hysteria2",ports:e.port+","+e.portHopping,password:e.password,down:e.downloadBandwidth+" Mbps","skip-cert-verify":e.skipCertVerify,...r};default:throw TypeError(`Unsupported type: ${e.type} (clash encode)`)}}},exports.ss={__proto__:null,decodeBase64Multiline:c,decodeMultiline:function(s){return c(s).map(s=>w(s))},decodeOne:w},exports.surge={__proto__:null,decode:function(s){let[e,r]=p(s),[l,w,c,...h]=o(r),y=t(c),f=Object.fromEntries(h.map(s=>{let[e,r]=p(s);return n.has(e)?[e,"true"===r]:a.has(e)?[e,t(r)]:i.has(e)?[e,o(r)]:d.has(e)?'"'===r[0]&&r.endsWith('"')||"'"===r[0]&&r.endsWith("'")?[e,r.slice(1,-1)]:[e,r]:[e,u]})),m={raw:s,name:e,server:w,port:y,tfo:f.tfo,blockQuic:f["block-quic"],underlyingProxy:f["underlying-proxy"]},v={sni:f.sni,skipCertVerify:f["skip-cert-verify"]};switch(l){case"snell":return{type:"snell",psk:f.psk,version:f.version,reuse:f.reuse,...m};case"ss":{let s=f["shadow-tls-password"],e=f["shadow-tls-sni"],r=f["shadow-tls-version"];return{type:"ss",cipher:f["encrypt-method"],password:f.password,udp:f["udp-relay"],obfs:f.obfs,obfsHost:f["obfs-host"],obfsUri:f["obfs-uri"],udpPort:f["udp-port"],shadowTlsPassword:s,shadowTlsSni:e,shadowTlsVersion:r,...m}}case"trojan":return{type:"trojan",password:f.password,udp:f["udp-relay"],...v,...m};case"tuic":return{type:"tuic",uuid:f.uuid,alpn:f.alpn,token:f.token,...v,...m};case"tuic-v5":return{type:"tuic-v5",uuid:f.uuid,alpn:f.alpn,password:f.password,...v,...m};case"socks5":return{type:"socks5",username:h[0],password:h[1],udp:f["udp-relay"],...m};case"http":return{type:"http",username:h[0],password:h[1],...m};case"vmess":return{type:"vmess",username:f.username,tls:f.tls,vmessAead:f["vmess-aead"],ws:f.ws,wsPath:f["ws-path"],wsHeaders:f["ws-headers"],udp:f["udp-relay"],...v,...m};case"hysteria2":return{type:"hysteria2",password:f.password,skipCertVerify:f["skip-cert-verify"],downloadBandwidth:f["download-bandwidth"],portHopping:f["port-hopping"],portHoppingInterval:f["port-hopping-interval"],...m};default:throw TypeError(`Unsupported type: ${l} (surge decode)`)}},encode:function(r){let t=[r.tfo&&"tfo=true",r.blockQuic&&`block-quic=${r.blockQuic}`,r.underlyingProxy&&`underlying-proxy=${r.underlyingProxy}`];switch(r.type){case"snell":return e.stringJoin([`${r.name} = snell, ${r.server}, ${r.port}, psk=${r.psk}, version=${r.version}, reuse=${r.reuse}`,...t],", ");case"ss":return e.stringJoin([`${r.name} = ss, ${r.server}, ${r.port}, encrypt-method=${r.cipher}, password=${r.password}`,r.shadowTlsPassword&&`shadow-tls-password=${r.shadowTlsPassword}`,r.shadowTlsSni&&`shadow-tls-sni=${r.shadowTlsSni}`,r.shadowTlsVersion&&`shadow-tls-version=${r.shadowTlsVersion}`,r.udp&&"udp-relay=true",r.udpPort&&`udp-port=${r.udpPort}`,r.obfs&&`obfs=${r.obfs}`,r.obfsHost&&`obfs-host=${r.obfsHost}`,r.obfsUri&&`obfs-uri=${r.obfsUri}`,...t],", ");case"trojan":return e.stringJoin([`${r.name} = trojan, ${r.server}, ${r.port}, password=${r.password}`,r.sni&&`sni=${r.sni}`,r.skipCertVerify&&"skip-cert-verify=true",...t,r.udp&&"udp-relay=true"],", ");case"tuic":return e.stringJoin([`${r.name} = tuic, ${r.server}, ${r.port}, sni=${r.sni}, uuid=${r.uuid}, alpn=${r.alpn}, token=${r.token}`,...t],", ");case"socks5":return e.stringJoin([`${r.name} = socks5, ${r.server}, ${r.port}, ${r.username}, ${r.password}`,r.udp&&"udp-relay=true",...t],", ");case"http":return e.stringJoin([`${r.name} = http, ${r.server}, ${r.port}, ${r.username}, ${r.password}`,...t],", ");case"vmess":return e.stringJoin([`${r.name} = vmess, ${r.server}, ${r.port}`,`username=${r.username}`,`tls=${r.tls}`,`vmess-aead=${r.vmessAead}`,"ws=true",r.wsPath&&`ws-path=${"/"===r.wsPath[0]?r.wsPath:`/${r.wsPath}`}`,r.wsHeaders&&`ws-headers=${r.wsHeaders}`,`skip-cert-verify=${r.skipCertVerify}`,`tfo=${r.tfo}`,`udp-relay=${r.udp}`],", ");case"hysteria2":return e.stringJoin([`${r.name} = hysteria2, ${r.server}, ${r.port}`,`password=${r.password}`,`download-bandwidth=${r.downloadBandwidth}`,r.portHopping&&`port-hopping="${r.portHopping}"`,r.portHoppingInterval&&`port-hopping-interval=${r.portHoppingInterval}`,`skip-cert-verify=${r.skipCertVerify}`,...t],", ");case"tuic-v5":return e.stringJoin([`${r.name} = tuic-v5, ${r.server}, ${r.port}`,`password=${r.password}`,`uuid=${r.uuid}`,`alpn=${r.alpn}`,`skip-cert-verify=${r.skipCertVerify}`,`sni=${r.sni}`,...t],", ");default:s.never(r,"type (surge encode)")}}},exports.trojan={__proto__:null,parse:function(s){let e=new URL(s),r=e.username,t=e.hostname,o=Number.parseInt(e.port,10);return{raw:s,name:decodeURIComponent(e.hash.slice(1)),type:"trojan",server:t,port:o,password:r,udp:!0,sni:e.searchParams.get("sni")??t,skipCertVerify:!0}}},exports.vmess={__proto__:null,parse:function(s){let e=JSON.parse(h.decode(r.Buffer.from(s.slice(8),"base64"))),t=e.ps,o=e.path;return{raw:s,name:t,server:e.add,port:Number.parseInt(e.port,10),type:"vmess",username:e.id,tls:e.tls,vmessAead:"0"===e.aid,sni:e.sni,ws:"ws"===e.net,wsPath:"/"===o[0]?o:`/${o}`,wsHeaders:e.sni||e.host?`Host:${e.sni||e.host}`:e.add,skipCertVerify:!0,udp:!0}}};
@@ -113,6 +113,9 @@ declare namespace index$4 {
113
113
 
114
114
  declare function decode(config: Record<string, any>): SupportedConfig;
115
115
  declare function encode(config: SupportedConfig): {
116
+ name: string;
117
+ server: string;
118
+ port: number;
116
119
  tfo: boolean | undefined;
117
120
  'dialer-proxy': string | undefined;
118
121
  plugin?: string | undefined;
@@ -129,148 +132,80 @@ declare function encode(config: SupportedConfig): {
129
132
  mode?: undefined;
130
133
  uri?: undefined;
131
134
  } | undefined;
132
- name: string;
133
135
  type: string;
134
- server: string;
135
- port: number;
136
136
  cipher: string;
137
137
  password: string;
138
138
  udp: boolean;
139
- alterId?: undefined;
140
- tls?: undefined;
141
- uuid?: undefined;
142
- servername?: undefined;
143
- 'ws-path'?: undefined;
144
- 'ws-headers'?: undefined;
145
- 'ws-opts'?: undefined;
146
- network?: undefined;
147
- ports?: undefined;
148
- down?: undefined;
149
- 'skip-cert-verify'?: undefined;
150
139
  } | {
151
- tfo: boolean | undefined;
152
- 'dialer-proxy': string | undefined;
153
140
  name: string;
154
- type: string;
155
141
  server: string;
156
142
  port: number;
143
+ tfo: boolean | undefined;
144
+ 'dialer-proxy': string | undefined;
145
+ type: string;
157
146
  password: string;
158
147
  sni: string | undefined;
159
148
  'skip-cert-verify': boolean;
160
149
  udp: boolean;
161
- alterId?: undefined;
162
- tls?: undefined;
163
- uuid?: undefined;
164
- servername?: undefined;
165
- 'ws-path'?: undefined;
166
- 'ws-headers'?: undefined;
167
- cipher?: undefined;
168
- 'ws-opts'?: undefined;
169
- network?: undefined;
170
- ports?: undefined;
171
- down?: undefined;
172
150
  } | {
151
+ name: string;
152
+ server: string;
153
+ port: number;
173
154
  tfo: boolean | undefined;
174
155
  'dialer-proxy': string | undefined;
175
156
  'skip-cert-verify': boolean;
176
157
  udp: boolean;
177
158
  version: number;
178
159
  token: string;
179
- name: string;
180
160
  type: string;
181
- server: string;
182
- port: number;
183
161
  sni: string | undefined;
184
162
  uuid: string;
185
163
  alpn: string[];
186
- alterId?: undefined;
187
- tls?: undefined;
188
- servername?: undefined;
189
- 'ws-path'?: undefined;
190
- 'ws-headers'?: undefined;
191
- cipher?: undefined;
192
- 'ws-opts'?: undefined;
193
- network?: undefined;
194
- ports?: undefined;
195
- password?: undefined;
196
- down?: undefined;
197
164
  } | {
165
+ name: string;
166
+ server: string;
167
+ port: number;
198
168
  tfo: boolean | undefined;
199
169
  'dialer-proxy': string | undefined;
200
170
  'skip-cert-verify': boolean;
201
171
  udp: boolean;
202
172
  version: number;
203
173
  password: string;
204
- name: string;
205
174
  type: string;
206
- server: string;
207
- port: number;
208
175
  sni: string | undefined;
209
176
  uuid: string;
210
177
  alpn: string[];
211
- alterId?: undefined;
212
- tls?: undefined;
213
- servername?: undefined;
214
- 'ws-path'?: undefined;
215
- 'ws-headers'?: undefined;
216
- cipher?: undefined;
217
- 'ws-opts'?: undefined;
218
- network?: undefined;
219
- ports?: undefined;
220
- down?: undefined;
221
178
  } | {
222
- tfo: boolean | undefined;
223
- 'dialer-proxy': string | undefined;
224
179
  name: string;
225
- type: string;
226
180
  server: string;
227
181
  port: number;
182
+ tfo: boolean | undefined;
183
+ 'dialer-proxy': string | undefined;
184
+ type: string;
228
185
  username: string;
229
186
  password: string;
230
187
  udp: boolean;
231
- alterId?: undefined;
232
- tls?: undefined;
233
- uuid?: undefined;
234
- servername?: undefined;
235
- 'ws-path'?: undefined;
236
- 'ws-headers'?: undefined;
237
- cipher?: undefined;
238
- 'ws-opts'?: undefined;
239
- network?: undefined;
240
- ports?: undefined;
241
- down?: undefined;
242
- 'skip-cert-verify'?: undefined;
243
188
  } | {
244
- tfo: boolean | undefined;
245
- 'dialer-proxy': string | undefined;
246
189
  name: string;
247
- type: string;
248
190
  server: string;
249
191
  port: number;
192
+ tfo: boolean | undefined;
193
+ 'dialer-proxy': string | undefined;
194
+ type: string;
250
195
  username: string;
251
196
  password: string;
252
- alterId?: undefined;
253
- tls?: undefined;
254
- udp?: undefined;
255
- uuid?: undefined;
256
- servername?: undefined;
257
- 'ws-path'?: undefined;
258
- 'ws-headers'?: undefined;
259
- cipher?: undefined;
260
- 'ws-opts'?: undefined;
261
- network?: undefined;
262
- ports?: undefined;
263
- down?: undefined;
264
- 'skip-cert-verify'?: undefined;
265
197
  } | {
198
+ name: string;
199
+ server: string;
200
+ port: number;
201
+ tfo: boolean | undefined;
202
+ 'dialer-proxy': string | undefined;
266
203
  alterId: number | undefined;
267
204
  tls: boolean;
268
205
  udp: boolean;
269
206
  uuid: string;
270
- name: string;
271
207
  servername: string | undefined;
272
208
  'ws-path': string | undefined;
273
- server: string;
274
209
  'ws-headers': Record<string, string> | undefined;
275
210
  cipher: string;
276
211
  'ws-opts': {
@@ -278,31 +213,18 @@ declare function encode(config: SupportedConfig): {
278
213
  headers: Record<string, string> | undefined;
279
214
  };
280
215
  type: string;
281
- port: number;
282
216
  network: string;
283
- ports?: undefined;
284
- password?: undefined;
285
- down?: undefined;
286
- 'skip-cert-verify'?: undefined;
287
217
  } | {
288
218
  name: string;
289
- type: string;
290
219
  server: string;
291
220
  port: number;
292
- ports: string | undefined;
221
+ tfo: boolean | undefined;
222
+ 'dialer-proxy': string | undefined;
223
+ type: string;
224
+ ports: string;
293
225
  password: string;
294
226
  down: string;
295
227
  'skip-cert-verify': boolean;
296
- alterId?: undefined;
297
- tls?: undefined;
298
- udp?: undefined;
299
- uuid?: undefined;
300
- servername?: undefined;
301
- 'ws-path'?: undefined;
302
- 'ws-headers'?: undefined;
303
- cipher?: undefined;
304
- 'ws-opts'?: undefined;
305
- network?: undefined;
306
228
  };
307
229
 
308
230
  declare const index$3_decode: typeof decode;
package/dist/es/index.mjs CHANGED
@@ -1 +1 @@
1
- import{never as e}from"foxts/guard";import{stringJoin as s}from"foxts/string-join";import{Buffer as r}from"node:buffer";let t=Number,o=e=>e.split(",").map(e=>e.trim());function p(e){let s=e.indexOf("=");return -1===s?["",""]:[e.slice(0,s).trim(),e.slice(s+1).trim()]}let n=new Set(["udp-relay","tfo","reuse","skip-cert-verify","tls","vmess-aead","ws"]),a=new Set(["version","download-bandwidth","port-hopping-interval","udp-port","shadow-tls-version"]),i=new Set([]),d=new Set(["username","password","sni","encrypt-method","psk","obfs","obfs-host","uuid","alpn","block-quic","ws-path","ws-headers","port-hopping","token","underlying-proxy","shadow-tls-password","shadow-tls-sni"]),u=Symbol("unsupported");var l={__proto__:null,decode:function(e){let[s,r]=p(e),[l,w,c,...h]=o(r),y=t(c),m=Object.fromEntries(h.map(e=>{let[s,r]=p(e);return n.has(s)?[s,"true"===r]:a.has(s)?[s,t(r)]:i.has(s)?[s,o(r)]:d.has(s)?'"'===r[0]&&r.endsWith('"')||"'"===r[0]&&r.endsWith("'")?[s,r.slice(1,-1)]:[s,r]:[s,u]})),v={raw:e,name:s,server:w,port:y,tfo:m.tfo,blockQuic:m["block-quic"],underlyingProxy:m["underlying-proxy"]},f={sni:m.sni,skipCertVerify:m["skip-cert-verify"]};switch(l){case"snell":return{type:"snell",psk:m.psk,version:m.version,reuse:m.reuse,...v};case"ss":{let e=m["shadow-tls-password"],s=m["shadow-tls-sni"],r=m["shadow-tls-version"];return{type:"ss",cipher:m["encrypt-method"],password:m.password,udp:m["udp-relay"],obfs:m.obfs,obfsHost:m["obfs-host"],obfsUri:m["obfs-uri"],udpPort:m["udp-port"],shadowTlsPassword:e,shadowTlsSni:s,shadowTlsVersion:r,...v}}case"trojan":return{type:"trojan",password:m.password,udp:m["udp-relay"],...f,...v};case"tuic":return{type:"tuic",uuid:m.uuid,alpn:m.alpn,token:m.token,...f,...v};case"tuic-v5":return{type:"tuic-v5",uuid:m.uuid,alpn:m.alpn,password:m.password,...f,...v};case"socks5":return{type:"socks5",username:h[0],password:h[1],udp:m["udp-relay"],...v};case"http":return{type:"http",username:h[0],password:h[1],...v};case"vmess":return{type:"vmess",username:m.username,tls:m.tls,vmessAead:m["vmess-aead"],ws:m.ws,wsPath:m["ws-path"],wsHeaders:m["ws-headers"],udp:m["udp-relay"],...f,...v};case"hysteria2":return{type:"hysteria2",password:m.password,skipCertVerify:m["skip-cert-verify"],downloadBandwidth:m["download-bandwidth"],portHopping:m["port-hopping"],portHoppingInterval:m["port-hopping-interval"],...v};default:throw TypeError(`Unsupported type: ${l} (surge decode)`)}},encode:function(r){let t=[r.tfo&&"tfo=true",r.blockQuic&&`block-quic=${r.blockQuic}`,r.underlyingProxy&&`underlying-proxy=${r.underlyingProxy}`];switch(r.type){case"snell":return s([`${r.name} = snell, ${r.server}, ${r.port}, psk=${r.psk}, version=${r.version}, reuse=${r.reuse}`,...t],", ");case"ss":return s([`${r.name} = ss, ${r.server}, ${r.port}, encrypt-method=${r.cipher}, password=${r.password}`,r.shadowTlsPassword&&`shadow-tls-password=${r.shadowTlsPassword}`,r.shadowTlsSni&&`shadow-tls-sni=${r.shadowTlsSni}`,r.shadowTlsVersion&&`shadow-tls-version=${r.shadowTlsVersion}`,r.udp&&"udp-relay=true",r.udpPort&&`udp-port=${r.udpPort}`,r.obfs&&`obfs=${r.obfs}`,r.obfsHost&&`obfs-host=${r.obfsHost}`,r.obfsUri&&`obfs-uri=${r.obfsUri}`,...t],", ");case"trojan":return s([`${r.name} = trojan, ${r.server}, ${r.port}, password=${r.password}`,r.sni&&`sni=${r.sni}`,r.skipCertVerify&&"skip-cert-verify=true",...t,r.udp&&"udp-relay=true"],", ");case"tuic":return s([`${r.name} = tuic, ${r.server}, ${r.port}, sni=${r.sni}, uuid=${r.uuid}, alpn=${r.alpn}, token=${r.token}`,...t],", ");case"socks5":return s([`${r.name} = socks5, ${r.server}, ${r.port}, ${r.username}, ${r.password}`,r.udp&&"udp-relay=true",...t],", ");case"http":return s([`${r.name} = http, ${r.server}, ${r.port}, ${r.username}, ${r.password}`,...t],", ");case"vmess":return s([`${r.name} = vmess, ${r.server}, ${r.port}`,`username=${r.username}`,`tls=${r.tls}`,`vmess-aead=${r.vmessAead}`,"ws=true",r.wsPath&&`ws-path=${"/"===r.wsPath[0]?r.wsPath:`/${r.wsPath}`}`,r.wsHeaders&&`ws-headers=${r.wsHeaders}`,`skip-cert-verify=${r.skipCertVerify}`,`tfo=${r.tfo}`,`udp-relay=${r.udp}`],", ");case"hysteria2":return s([`${r.name} = hysteria2, ${r.server}, ${r.port}`,`password=${r.password}`,`download-bandwidth=${r.downloadBandwidth}`,r.portHopping&&`port-hopping="${r.portHopping}"`,r.portHoppingInterval&&`port-hopping-interval=${r.portHoppingInterval}`,`skip-cert-verify=${r.skipCertVerify}`,...t],", ");case"tuic-v5":return s([`${r.name} = tuic-v5, ${r.server}, ${r.port}`,`password=${r.password}`,`uuid=${r.uuid}`,`alpn=${r.alpn}`,`skip-cert-verify=${r.skipCertVerify}`,`sni=${r.sni}`,...t],", ");default:e(r,"type (surge encode)")}}};function w(e){return e.split(",").reduce((e,s)=>{let[r,t]=s.split(":");return e[r.trim()]=t.trim(),e},{})}var c={__proto__:null,decode:function(e){if(!("type"in e)||"string"!=typeof e.type)throw TypeError("Missing or invalid type field");let s=JSON.stringify(e);switch(e.type){case"http":return{type:"http",name:e.name,server:e.server,port:Number(e.port),username:e.username,password:e.password,underlyingProxy:e["dialer-proxy"],raw:s};case"ss":return{type:"ss",name:e.name,server:e.server,port:Number(e.port),cipher:e.cipher,password:e.password,udp:e.udp||!1,obfs:"obfs"===e.plugin?e["plugin-opts"].mode:void 0,underlyingProxy:e["dialer-proxy"],shadowTlsSni:"shadow-tls"===e.plugin?e["plugin-opts"].host:void 0,shadowTlsPassword:"shadow-tls"===e.plugin?e["plugin-opts"].password:void 0,shadowTlsVersion:"shadow-tls"===e.plugin?e["plugin-opts"].version:void 0,raw:s};case"socks5":return{type:"socks5",name:e.name,server:e.server,port:Number(e.port),username:e.username,password:e.password,udp:e.udp||!1,underlyingProxy:e["dialer-proxy"],raw:s};case"trojan":return{type:"trojan",name:e.name,server:e.server,port:Number(e.port),password:e.password,sni:e.sni,skipCertVerify:e["skip-cert-verify"]||!1,udp:e.udp||!1,underlyingProxy:e["dialer-proxy"],raw:s};case"vmess":return{type:"vmess",name:e.name,server:e.server,port:Number(e.port),username:e.uuid,vmessAead:1===e.alterId||"1"===e.alterId,sni:e.servername,ws:"ws"===e.network,wsPath:e["ws-path"],wsHeaders:e["ws-headers"]?Object.entries(e["ws-headers"]).map(([e,s])=>`${e}:${s}`).join(", "):void 0,tls:e.tls||!1,udp:e.udp??!0,underlyingProxy:e["dialer-proxy"],raw:s,skipCertVerify:e["skip-cert-verify"]||!1};default:throw TypeError(`Unsupported type: ${e.type} (clash decode)`)}},encode:function(s){let r={tfo:s.tfo,"dialer-proxy":s.underlyingProxy};switch(s.type){case"ss":if(s.shadowTlsPassword&&(s.udp||s.udpPort))throw Error("Clash doesn't support plain UDP for Shadow TLS (clash encode)");return{name:s.name,type:"ss",server:s.server,port:s.port,cipher:s.cipher,password:s.password,udp:s.udp,...s.obfs?{plugin:"obfs","plugin-opts":{mode:s.obfs,host:s.obfsHost,uri:s.obfsUri}}:{},...s.shadowTlsPassword?{plugin:"shadow-tls","plugin-opts":{host:s.shadowTlsSni,password:s.shadowTlsPassword,version:s.shadowTlsVersion}}:{},...r};case"trojan":return{name:s.name,type:"trojan",server:s.server,port:s.port,password:s.password,sni:s.sni,"skip-cert-verify":s.skipCertVerify,udp:s.udp,...r};case"tuic":case"tuic-v5":return{name:s.name,type:"tuic",server:s.server,port:s.port,sni:s.sni,uuid:s.uuid,alpn:s.alpn.split(",").map(e=>e.trim()),..."tuic"===s.type?{token:s.token}:{password:s.password},"skip-cert-verify":s.skipCertVerify,udp:!0,version:"tuic"===s.type?4:"tuic-v5"===s.type?5:e(s),...r};case"socks5":return{name:s.name,type:"socks5",server:s.server,port:s.port,username:s.username,password:s.password,udp:s.udp,...r};case"http":return{name:s.name,type:"http",server:s.server,port:s.port,username:s.username,password:s.password,...r};case"vmess":return{alterId:s.vmessAead?0:void 0,tls:s.tls,udp:s.udp,uuid:s.username,name:s.name,servername:s.sni,"ws-path":s.wsPath,server:s.server,"ws-headers":s.wsHeaders?w(s.wsHeaders):void 0,cipher:"auto","ws-opts":{path:s.wsPath,headers:s.wsHeaders?w(s.wsHeaders):void 0},type:"vmess",port:s.port,network:s.ws?"ws":"tcp"};case"hysteria2":return{name:s.name,type:"hysteria2",server:s.server,port:s.port,ports:s.portHopping,password:s.password,down:s.downloadBandwidth+" Mbps","skip-cert-verify":s.skipCertVerify};default:throw TypeError(`Unsupported type: ${s.type} (clash encode)`)}}};function h(e){let s,r,[o,p]=e.split("://");if("ss"!==o)throw Error(`[ss.decodeOne] Unsupported type: ${o}`);let[n,a]=p.split("@");n.includes(":")?[s,r]=n.split(":"):[s,r]=atob(n).split(":");let[i,d]=a.split(":"),[u,l]=d.split("#"),[w,c]=u.split("/"),h=null;if(c)try{h=new URLSearchParams(c).get("plugin")}catch(s){let e=Error(`[ss.decodeOne] Invalid plugins: ${c}`);throw e.cause=s,e}let y=(h?.split(";")??[]).reduce((e,s)=>{let[r,t]=s.split("=");return e[r]=t,e},{});return{raw:e,type:"ss",name:decodeURIComponent(l),server:i,port:t(w),cipher:s,password:r,udp:!0,obfs:"obfs-local"in y&&"obfs"in y&&("http"===y.obfs||"tls"===y.obfs)?y.obfs:void 0,obfsHost:"obfs-host"in y?y["obfs-host"]:void 0}}function y(e){return atob(e).replaceAll("\r\n","\n").split("\n").filter(Boolean)}var m={__proto__:null,decodeBase64Multiline:y,decodeMultiline:function(e){return y(e).map(e=>h(e))},decodeOne:h},v={__proto__:null,parse:function(e){let s=new URL(e),r=s.username,t=s.hostname,o=Number.parseInt(s.port,10);return{raw:e,name:decodeURIComponent(s.hash.slice(1)),type:"trojan",server:t,port:o,password:r,udp:!0,sni:s.searchParams.get("sni")??t,skipCertVerify:!0}}};let f=new TextDecoder;var $={__proto__:null,parse:function(e){let s=JSON.parse(f.decode(r.from(e.slice(8),"base64"))),t=s.ps,o=s.path;return{raw:e,name:t,server:s.add,port:Number.parseInt(s.port,10),type:"vmess",username:s.id,tls:s.tls,vmessAead:"0"===s.aid,sni:s.sni,ws:"ws"===s.net,wsPath:"/"===o[0]?o:`/${o}`,wsHeaders:s.sni||s.host?`Host:${s.sni||s.host}`:s.add,skipCertVerify:!0,udp:!0}}};export{c as clash,m as ss,l as surge,v as trojan,$ as vmess};
1
+ import{never as s}from"foxts/guard";import{stringJoin as e}from"foxts/string-join";import{Buffer as r}from"node:buffer";let t=Number,o=s=>s.split(",").map(s=>s.trim());function p(s){let e=s.indexOf("=");return -1===e?["",""]:[s.slice(0,e).trim(),s.slice(e+1).trim()]}let n=new Set(["udp-relay","tfo","reuse","skip-cert-verify","tls","vmess-aead","ws"]),a=new Set(["version","download-bandwidth","port-hopping-interval","udp-port","shadow-tls-version"]),i=new Set([]),d=new Set(["username","password","sni","encrypt-method","psk","obfs","obfs-host","uuid","alpn","block-quic","ws-path","ws-headers","port-hopping","token","underlying-proxy","shadow-tls-password","shadow-tls-sni"]),u=Symbol("unsupported");var l={__proto__:null,decode:function(s){let[e,r]=p(s),[l,w,c,...h]=o(r),y=t(c),m=Object.fromEntries(h.map(s=>{let[e,r]=p(s);return n.has(e)?[e,"true"===r]:a.has(e)?[e,t(r)]:i.has(e)?[e,o(r)]:d.has(e)?'"'===r[0]&&r.endsWith('"')||"'"===r[0]&&r.endsWith("'")?[e,r.slice(1,-1)]:[e,r]:[e,u]})),f={raw:s,name:e,server:w,port:y,tfo:m.tfo,blockQuic:m["block-quic"],underlyingProxy:m["underlying-proxy"]},v={sni:m.sni,skipCertVerify:m["skip-cert-verify"]};switch(l){case"snell":return{type:"snell",psk:m.psk,version:m.version,reuse:m.reuse,...f};case"ss":{let s=m["shadow-tls-password"],e=m["shadow-tls-sni"],r=m["shadow-tls-version"];return{type:"ss",cipher:m["encrypt-method"],password:m.password,udp:m["udp-relay"],obfs:m.obfs,obfsHost:m["obfs-host"],obfsUri:m["obfs-uri"],udpPort:m["udp-port"],shadowTlsPassword:s,shadowTlsSni:e,shadowTlsVersion:r,...f}}case"trojan":return{type:"trojan",password:m.password,udp:m["udp-relay"],...v,...f};case"tuic":return{type:"tuic",uuid:m.uuid,alpn:m.alpn,token:m.token,...v,...f};case"tuic-v5":return{type:"tuic-v5",uuid:m.uuid,alpn:m.alpn,password:m.password,...v,...f};case"socks5":return{type:"socks5",username:h[0],password:h[1],udp:m["udp-relay"],...f};case"http":return{type:"http",username:h[0],password:h[1],...f};case"vmess":return{type:"vmess",username:m.username,tls:m.tls,vmessAead:m["vmess-aead"],ws:m.ws,wsPath:m["ws-path"],wsHeaders:m["ws-headers"],udp:m["udp-relay"],...v,...f};case"hysteria2":return{type:"hysteria2",password:m.password,skipCertVerify:m["skip-cert-verify"],downloadBandwidth:m["download-bandwidth"],portHopping:m["port-hopping"],portHoppingInterval:m["port-hopping-interval"],...f};default:throw TypeError(`Unsupported type: ${l} (surge decode)`)}},encode:function(r){let t=[r.tfo&&"tfo=true",r.blockQuic&&`block-quic=${r.blockQuic}`,r.underlyingProxy&&`underlying-proxy=${r.underlyingProxy}`];switch(r.type){case"snell":return e([`${r.name} = snell, ${r.server}, ${r.port}, psk=${r.psk}, version=${r.version}, reuse=${r.reuse}`,...t],", ");case"ss":return e([`${r.name} = ss, ${r.server}, ${r.port}, encrypt-method=${r.cipher}, password=${r.password}`,r.shadowTlsPassword&&`shadow-tls-password=${r.shadowTlsPassword}`,r.shadowTlsSni&&`shadow-tls-sni=${r.shadowTlsSni}`,r.shadowTlsVersion&&`shadow-tls-version=${r.shadowTlsVersion}`,r.udp&&"udp-relay=true",r.udpPort&&`udp-port=${r.udpPort}`,r.obfs&&`obfs=${r.obfs}`,r.obfsHost&&`obfs-host=${r.obfsHost}`,r.obfsUri&&`obfs-uri=${r.obfsUri}`,...t],", ");case"trojan":return e([`${r.name} = trojan, ${r.server}, ${r.port}, password=${r.password}`,r.sni&&`sni=${r.sni}`,r.skipCertVerify&&"skip-cert-verify=true",...t,r.udp&&"udp-relay=true"],", ");case"tuic":return e([`${r.name} = tuic, ${r.server}, ${r.port}, sni=${r.sni}, uuid=${r.uuid}, alpn=${r.alpn}, token=${r.token}`,...t],", ");case"socks5":return e([`${r.name} = socks5, ${r.server}, ${r.port}, ${r.username}, ${r.password}`,r.udp&&"udp-relay=true",...t],", ");case"http":return e([`${r.name} = http, ${r.server}, ${r.port}, ${r.username}, ${r.password}`,...t],", ");case"vmess":return e([`${r.name} = vmess, ${r.server}, ${r.port}`,`username=${r.username}`,`tls=${r.tls}`,`vmess-aead=${r.vmessAead}`,"ws=true",r.wsPath&&`ws-path=${"/"===r.wsPath[0]?r.wsPath:`/${r.wsPath}`}`,r.wsHeaders&&`ws-headers=${r.wsHeaders}`,`skip-cert-verify=${r.skipCertVerify}`,`tfo=${r.tfo}`,`udp-relay=${r.udp}`],", ");case"hysteria2":return e([`${r.name} = hysteria2, ${r.server}, ${r.port}`,`password=${r.password}`,`download-bandwidth=${r.downloadBandwidth}`,r.portHopping&&`port-hopping="${r.portHopping}"`,r.portHoppingInterval&&`port-hopping-interval=${r.portHoppingInterval}`,`skip-cert-verify=${r.skipCertVerify}`,...t],", ");case"tuic-v5":return e([`${r.name} = tuic-v5, ${r.server}, ${r.port}`,`password=${r.password}`,`uuid=${r.uuid}`,`alpn=${r.alpn}`,`skip-cert-verify=${r.skipCertVerify}`,`sni=${r.sni}`,...t],", ");default:s(r,"type (surge encode)")}}};function w(s){return s.split(",").reduce((s,e)=>{let[r,t]=e.split(":");return s[r.trim()]=t.trim(),s},{})}var c={__proto__:null,decode:function(s){if(!("type"in s)||"string"!=typeof s.type)throw TypeError("Missing or invalid type field");let e=JSON.stringify(s);switch(s.type){case"http":return{type:"http",name:s.name,server:s.server,port:Number(s.port),username:s.username,password:s.password,underlyingProxy:s["dialer-proxy"],raw:e};case"ss":return{type:"ss",name:s.name,server:s.server,port:Number(s.port),cipher:s.cipher,password:s.password,udp:s.udp||!1,obfs:"obfs"===s.plugin?s["plugin-opts"].mode:void 0,underlyingProxy:s["dialer-proxy"],shadowTlsSni:"shadow-tls"===s.plugin?s["plugin-opts"].host:void 0,shadowTlsPassword:"shadow-tls"===s.plugin?s["plugin-opts"].password:void 0,shadowTlsVersion:"shadow-tls"===s.plugin?s["plugin-opts"].version:void 0,raw:e};case"socks5":return{type:"socks5",name:s.name,server:s.server,port:Number(s.port),username:s.username,password:s.password,udp:s.udp||!1,underlyingProxy:s["dialer-proxy"],raw:e};case"trojan":return{type:"trojan",name:s.name,server:s.server,port:Number(s.port),password:s.password,sni:s.sni,skipCertVerify:s["skip-cert-verify"]||!1,udp:s.udp||!1,underlyingProxy:s["dialer-proxy"],raw:e};case"vmess":return{type:"vmess",name:s.name,server:s.server,port:Number(s.port),username:s.uuid,vmessAead:1===s.alterId||"1"===s.alterId,sni:s.servername,ws:"ws"===s.network,wsPath:s["ws-path"],wsHeaders:s["ws-headers"]?Object.entries(s["ws-headers"]).map(([s,e])=>`${s}:${e}`).join(", "):void 0,tls:s.tls||!1,udp:s.udp??!0,underlyingProxy:s["dialer-proxy"],raw:e,skipCertVerify:s["skip-cert-verify"]||!1};default:throw TypeError(`Unsupported type: ${s.type} (clash decode)`)}},encode:function(e){let r={name:e.name,server:e.server,port:e.port,tfo:e.tfo,"dialer-proxy":e.underlyingProxy};switch(e.type){case"ss":if(e.shadowTlsPassword&&(e.udp||e.udpPort))throw Error("Clash doesn't support plain UDP for Shadow TLS (clash encode)");return{type:"ss",cipher:e.cipher,password:e.password,udp:e.udp,...e.obfs?{plugin:"obfs","plugin-opts":{mode:e.obfs,host:e.obfsHost,uri:e.obfsUri}}:{},...e.shadowTlsPassword?{plugin:"shadow-tls","plugin-opts":{host:e.shadowTlsSni,password:e.shadowTlsPassword,version:e.shadowTlsVersion}}:{},...r};case"trojan":return{type:"trojan",password:e.password,sni:e.sni,"skip-cert-verify":e.skipCertVerify,udp:e.udp,...r};case"tuic":case"tuic-v5":return{type:"tuic",sni:e.sni,uuid:e.uuid,alpn:e.alpn.split(",").map(s=>s.trim()),..."tuic"===e.type?{token:e.token}:{password:e.password},"skip-cert-verify":e.skipCertVerify,udp:!0,version:"tuic"===e.type?4:"tuic-v5"===e.type?5:s(e),...r};case"socks5":return{type:"socks5",username:e.username,password:e.password,udp:e.udp,...r};case"http":return{type:"http",username:e.username,password:e.password,...r};case"vmess":return{alterId:e.vmessAead?0:void 0,tls:e.tls,udp:e.udp,uuid:e.username,servername:e.sni,"ws-path":e.wsPath,"ws-headers":e.wsHeaders?w(e.wsHeaders):void 0,cipher:"auto","ws-opts":{path:e.wsPath,headers:e.wsHeaders?w(e.wsHeaders):void 0},type:"vmess",network:e.ws?"ws":"tcp",...r};case"hysteria2":return{type:"hysteria2",ports:e.port+","+e.portHopping,password:e.password,down:e.downloadBandwidth+" Mbps","skip-cert-verify":e.skipCertVerify,...r};default:throw TypeError(`Unsupported type: ${e.type} (clash encode)`)}}};function h(s){let e,r,[o,p]=s.split("://");if("ss"!==o)throw Error(`[ss.decodeOne] Unsupported type: ${o}`);let[n,a]=p.split("@");n.includes(":")?[e,r]=n.split(":"):[e,r]=atob(n).split(":");let[i,d]=a.split(":"),[u,l]=d.split("#"),[w,c]=u.split("/"),h=null;if(c)try{h=new URLSearchParams(c).get("plugin")}catch(e){let s=Error(`[ss.decodeOne] Invalid plugins: ${c}`);throw s.cause=e,s}let y=(h?.split(";")??[]).reduce((s,e)=>{let[r,t]=e.split("=");return s[r]=t,s},{});return{raw:s,type:"ss",name:decodeURIComponent(l),server:i,port:t(w),cipher:e,password:r,udp:!0,obfs:"obfs-local"in y&&"obfs"in y&&("http"===y.obfs||"tls"===y.obfs)?y.obfs:void 0,obfsHost:"obfs-host"in y?y["obfs-host"]:void 0}}function y(s){return atob(s).replaceAll("\r\n","\n").split("\n").filter(Boolean)}var m={__proto__:null,decodeBase64Multiline:y,decodeMultiline:function(s){return y(s).map(s=>h(s))},decodeOne:h},f={__proto__:null,parse:function(s){let e=new URL(s),r=e.username,t=e.hostname,o=Number.parseInt(e.port,10);return{raw:s,name:decodeURIComponent(e.hash.slice(1)),type:"trojan",server:t,port:o,password:r,udp:!0,sni:e.searchParams.get("sni")??t,skipCertVerify:!0}}};let v=new TextDecoder;var $={__proto__:null,parse:function(s){let e=JSON.parse(v.decode(r.from(s.slice(8),"base64"))),t=e.ps,o=e.path;return{raw:s,name:t,server:e.add,port:Number.parseInt(e.port,10),type:"vmess",username:e.id,tls:e.tls,vmessAead:"0"===e.aid,sni:e.sni,ws:"ws"===e.net,wsPath:"/"===o[0]?o:`/${o}`,wsHeaders:e.sni||e.host?`Host:${e.sni||e.host}`:e.add,skipCertVerify:!0,udp:!0}}};export{c as clash,m as ss,l as surge,f as trojan,$ as vmess};
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "nodelistparser",
3
- "version": "1.3.0",
3
+ "version": "1.3.2-beta.1",
4
4
  "description": "Surge / Mihomo (Clash.Meta) nodelist / proxy provider parser and generator.",
5
5
  "repository": {
6
6
  "type": "git",
@@ -34,21 +34,21 @@
34
34
  "author": "Sukka <https://skk.moe>",
35
35
  "license": "MIT",
36
36
  "dependencies": {
37
- "foxts": "^3.11.1"
37
+ "foxts": "^3.13.0"
38
38
  },
39
39
  "devDependencies": {
40
- "@eslint-sukka/node": "^6.23.1",
41
- "@swc-node/register": "^1.10.10",
42
- "@swc/core": "^1.13.3",
40
+ "@eslint-sukka/node": "^7.1.1",
41
+ "@swc-node/register": "^1.11.1",
42
+ "@swc/core": "^1.13.5",
43
43
  "@types/mocha": "^10.0.10",
44
- "@types/node": "^22.17.1",
44
+ "@types/node": "^24.5.2",
45
45
  "bumpp": "^10.2.3",
46
46
  "bunchee": "^6.6.0",
47
- "eslint": "^9.33.0",
48
- "eslint-config-sukka": "^6.23.1",
49
- "eslint-formatter-sukka": "^6.23.1",
50
- "expect": "^30.0.5",
51
- "mocha": "^11.7.1",
47
+ "eslint": "^9.36.0",
48
+ "eslint-config-sukka": "^7.1.1",
49
+ "eslint-formatter-sukka": "^7.1.1",
50
+ "expect": "^30.1.2",
51
+ "mocha": "^11.7.2",
52
52
  "typescript": "^5.9.2"
53
53
  },
54
54
  "scripts": {