check_client_ip_job.go 6.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315
  1. package job
  2. import (
  3. "bufio"
  4. "encoding/json"
  5. "io"
  6. "log"
  7. "os"
  8. "os/exec"
  9. "regexp"
  10. "sort"
  11. "time"
  12. "slices"
  13. "x-ui/database"
  14. "x-ui/database/model"
  15. "x-ui/logger"
  16. "x-ui/xray"
  17. )
  18. type CheckClientIpJob struct {
  19. lastClear int64
  20. disAllowedIps []string
  21. }
  22. var job *CheckClientIpJob
  23. func NewCheckClientIpJob() *CheckClientIpJob {
  24. job = new(CheckClientIpJob)
  25. return job
  26. }
  27. func (j *CheckClientIpJob) Run() {
  28. if j.lastClear == 0 {
  29. j.lastClear = time.Now().Unix()
  30. }
  31. shouldClearAccessLog := false
  32. iplimitActive := j.hasLimitIp()
  33. f2bInstalled := j.checkFail2BanInstalled()
  34. isAccessLogAvailable := j.checkAccessLogAvailable(iplimitActive)
  35. if iplimitActive {
  36. if f2bInstalled && isAccessLogAvailable {
  37. shouldClearAccessLog = j.processLogFile()
  38. } else {
  39. if !f2bInstalled {
  40. logger.Warning("[LimitIP] Fail2Ban is not installed, Please install Fail2Ban from the x-ui bash menu.")
  41. }
  42. }
  43. }
  44. if shouldClearAccessLog || (isAccessLogAvailable && time.Now().Unix()-j.lastClear > 3600) {
  45. j.clearAccessLog()
  46. }
  47. }
  48. func (j *CheckClientIpJob) clearAccessLog() {
  49. logAccessP, err := os.OpenFile(xray.GetAccessPersistentLogPath(), os.O_CREATE|os.O_APPEND|os.O_WRONLY, 0o644)
  50. j.checkError(err)
  51. accessLogPath, err := xray.GetAccessLogPath()
  52. j.checkError(err)
  53. file, err := os.Open(accessLogPath)
  54. j.checkError(err)
  55. _, err = io.Copy(logAccessP, file)
  56. j.checkError(err)
  57. logAccessP.Close()
  58. file.Close()
  59. err = os.Truncate(accessLogPath, 0)
  60. j.checkError(err)
  61. j.lastClear = time.Now().Unix()
  62. }
  63. func (j *CheckClientIpJob) hasLimitIp() bool {
  64. db := database.GetDB()
  65. var inbounds []*model.Inbound
  66. err := db.Model(model.Inbound{}).Find(&inbounds).Error
  67. if err != nil {
  68. return false
  69. }
  70. for _, inbound := range inbounds {
  71. if inbound.Settings == "" {
  72. continue
  73. }
  74. settings := map[string][]model.Client{}
  75. json.Unmarshal([]byte(inbound.Settings), &settings)
  76. clients := settings["clients"]
  77. for _, client := range clients {
  78. limitIp := client.LimitIP
  79. if limitIp > 0 {
  80. return true
  81. }
  82. }
  83. }
  84. return false
  85. }
  86. func (j *CheckClientIpJob) processLogFile() bool {
  87. ipRegex := regexp.MustCompile(`from (?:tcp:|udp:)?\[?([0-9a-fA-F\.:]+)\]?:\d+ accepted`)
  88. emailRegex := regexp.MustCompile(`email: (.+)$`)
  89. accessLogPath, _ := xray.GetAccessLogPath()
  90. file, _ := os.Open(accessLogPath)
  91. defer file.Close()
  92. inboundClientIps := make(map[string]map[string]struct{}, 100)
  93. scanner := bufio.NewScanner(file)
  94. for scanner.Scan() {
  95. line := scanner.Text()
  96. ipMatches := ipRegex.FindStringSubmatch(line)
  97. if len(ipMatches) < 2 {
  98. continue
  99. }
  100. ip := ipMatches[1]
  101. if ip == "127.0.0.1" || ip == "::1" {
  102. continue
  103. }
  104. emailMatches := emailRegex.FindStringSubmatch(line)
  105. if len(emailMatches) < 2 {
  106. continue
  107. }
  108. email := emailMatches[1]
  109. if _, exists := inboundClientIps[email]; !exists {
  110. inboundClientIps[email] = make(map[string]struct{})
  111. }
  112. inboundClientIps[email][ip] = struct{}{}
  113. }
  114. shouldCleanLog := false
  115. for email, uniqueIps := range inboundClientIps {
  116. ips := make([]string, 0, len(uniqueIps))
  117. for ip := range uniqueIps {
  118. ips = append(ips, ip)
  119. }
  120. sort.Strings(ips)
  121. clientIpsRecord, err := j.getInboundClientIps(email)
  122. if err != nil {
  123. j.addInboundClientIps(email, ips)
  124. continue
  125. }
  126. shouldCleanLog = j.updateInboundClientIps(clientIpsRecord, email, ips) || shouldCleanLog
  127. }
  128. return shouldCleanLog
  129. }
  130. func (j *CheckClientIpJob) checkFail2BanInstalled() bool {
  131. cmd := "fail2ban-client"
  132. args := []string{"-h"}
  133. err := exec.Command(cmd, args...).Run()
  134. return err == nil
  135. }
  136. func (j *CheckClientIpJob) checkAccessLogAvailable(iplimitActive bool) bool {
  137. accessLogPath, err := xray.GetAccessLogPath()
  138. if err != nil {
  139. return false
  140. }
  141. if accessLogPath == "none" || accessLogPath == "" {
  142. if iplimitActive {
  143. logger.Warning("[LimitIP] Access log path is not set, Please configure the access log path in Xray configs.")
  144. }
  145. return false
  146. }
  147. return true
  148. }
  149. func (j *CheckClientIpJob) checkError(e error) {
  150. if e != nil {
  151. logger.Warning("client ip job err:", e)
  152. }
  153. }
  154. func (j *CheckClientIpJob) contains(s []string, str string) bool {
  155. return slices.Contains(s, str)
  156. }
  157. func (j *CheckClientIpJob) getInboundClientIps(clientEmail string) (*model.InboundClientIps, error) {
  158. db := database.GetDB()
  159. InboundClientIps := &model.InboundClientIps{}
  160. err := db.Model(model.InboundClientIps{}).Where("client_email = ?", clientEmail).First(InboundClientIps).Error
  161. if err != nil {
  162. return nil, err
  163. }
  164. return InboundClientIps, nil
  165. }
  166. func (j *CheckClientIpJob) addInboundClientIps(clientEmail string, ips []string) error {
  167. inboundClientIps := &model.InboundClientIps{}
  168. jsonIps, err := json.Marshal(ips)
  169. j.checkError(err)
  170. inboundClientIps.ClientEmail = clientEmail
  171. inboundClientIps.Ips = string(jsonIps)
  172. db := database.GetDB()
  173. tx := db.Begin()
  174. defer func() {
  175. if err == nil {
  176. tx.Commit()
  177. } else {
  178. tx.Rollback()
  179. }
  180. }()
  181. err = tx.Save(inboundClientIps).Error
  182. if err != nil {
  183. return err
  184. }
  185. return nil
  186. }
  187. func (j *CheckClientIpJob) updateInboundClientIps(inboundClientIps *model.InboundClientIps, clientEmail string, ips []string) bool {
  188. jsonIps, err := json.Marshal(ips)
  189. if err != nil {
  190. logger.Error("failed to marshal IPs to JSON:", err)
  191. return false
  192. }
  193. inboundClientIps.ClientEmail = clientEmail
  194. inboundClientIps.Ips = string(jsonIps)
  195. inbound, err := j.getInboundByEmail(clientEmail)
  196. if err != nil {
  197. logger.Errorf("failed to fetch inbound settings for email %s: %s", clientEmail, err)
  198. return false
  199. }
  200. if inbound.Settings == "" {
  201. logger.Debug("wrong data:", inbound)
  202. return false
  203. }
  204. settings := map[string][]model.Client{}
  205. json.Unmarshal([]byte(inbound.Settings), &settings)
  206. clients := settings["clients"]
  207. shouldCleanLog := false
  208. j.disAllowedIps = []string{}
  209. logIpFile, err := os.OpenFile(xray.GetIPLimitLogPath(), os.O_CREATE|os.O_APPEND|os.O_WRONLY, 0644)
  210. if err != nil {
  211. logger.Errorf("failed to open IP limit log file: %s", err)
  212. return false
  213. }
  214. defer logIpFile.Close()
  215. log.SetOutput(logIpFile)
  216. log.SetFlags(log.LstdFlags)
  217. for _, client := range clients {
  218. if client.Email == clientEmail {
  219. limitIp := client.LimitIP
  220. if limitIp > 0 && inbound.Enable {
  221. shouldCleanLog = true
  222. if limitIp < len(ips) {
  223. j.disAllowedIps = append(j.disAllowedIps, ips[limitIp:]...)
  224. for i := limitIp; i < len(ips); i++ {
  225. log.Printf("[LIMIT_IP] Email = %s || SRC = %s", clientEmail, ips[i])
  226. }
  227. }
  228. }
  229. }
  230. }
  231. sort.Strings(j.disAllowedIps)
  232. if len(j.disAllowedIps) > 0 {
  233. logger.Debug("disAllowedIps:", j.disAllowedIps)
  234. }
  235. db := database.GetDB()
  236. err = db.Save(inboundClientIps).Error
  237. if err != nil {
  238. logger.Error("failed to save inboundClientIps:", err)
  239. return false
  240. }
  241. return shouldCleanLog
  242. }
  243. func (j *CheckClientIpJob) getInboundByEmail(clientEmail string) (*model.Inbound, error) {
  244. db := database.GetDB()
  245. inbound := &model.Inbound{}
  246. err := db.Model(&model.Inbound{}).Where("settings LIKE ?", "%"+clientEmail+"%").First(inbound).Error
  247. if err != nil {
  248. return nil, err
  249. }
  250. return inbound, nil
  251. }