| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238 | package xrayimport (	"context"	"encoding/json"	"fmt"	"regexp"	"time"	"x-ui/logger"	"x-ui/util/common"	"github.com/xtls/xray-core/app/proxyman/command"	statsService "github.com/xtls/xray-core/app/stats/command"	"github.com/xtls/xray-core/common/protocol"	"github.com/xtls/xray-core/common/serial"	"github.com/xtls/xray-core/infra/conf"	"github.com/xtls/xray-core/proxy/shadowsocks"	"github.com/xtls/xray-core/proxy/shadowsocks_2022"	"github.com/xtls/xray-core/proxy/trojan"	"github.com/xtls/xray-core/proxy/vless"	"github.com/xtls/xray-core/proxy/vmess"	"google.golang.org/grpc"	"google.golang.org/grpc/credentials/insecure")type XrayAPI struct {	HandlerServiceClient *command.HandlerServiceClient	StatsServiceClient   *statsService.StatsServiceClient	grpcClient           *grpc.ClientConn	isConnected          bool}func (x *XrayAPI) Init(apiPort int) (err error) {	if apiPort == 0 {		return common.NewError("xray api port wrong:", apiPort)	}	x.grpcClient, err = grpc.Dial(fmt.Sprintf("127.0.0.1:%v", apiPort), grpc.WithTransportCredentials(insecure.NewCredentials()))	if err != nil {		return err	}	x.isConnected = true	hsClient := command.NewHandlerServiceClient(x.grpcClient)	ssClient := statsService.NewStatsServiceClient(x.grpcClient)	x.HandlerServiceClient = &hsClient	x.StatsServiceClient = &ssClient	return}func (x *XrayAPI) Close() {	if x.grpcClient != nil {		x.grpcClient.Close()	}	x.HandlerServiceClient = nil	x.StatsServiceClient = nil	x.isConnected = false}func (x *XrayAPI) AddInbound(inbound []byte) error {	client := *x.HandlerServiceClient	conf := new(conf.InboundDetourConfig)	err := json.Unmarshal(inbound, conf)	if err != nil {		logger.Debug("Failed to unmarshal inbound:", err)		return err	}	config, err := conf.Build()	if err != nil {		logger.Debug("Failed to build inbound Detur:", err)		return err	}	inboundConfig := command.AddInboundRequest{Inbound: config}	_, err = client.AddInbound(context.Background(), &inboundConfig)	return err}func (x *XrayAPI) DelInbound(tag string) error {	client := *x.HandlerServiceClient	_, err := client.RemoveInbound(context.Background(), &command.RemoveInboundRequest{		Tag: tag,	})	return err}func (x *XrayAPI) AddUser(Protocol string, inboundTag string, user map[string]interface{}) error {	var account *serial.TypedMessage	switch Protocol {	case "vmess":		account = serial.ToTypedMessage(&vmess.Account{			Id: user["id"].(string),		})	case "vless":		account = serial.ToTypedMessage(&vless.Account{			Id:   user["id"].(string),			Flow: user["flow"].(string),		})	case "trojan":		account = serial.ToTypedMessage(&trojan.Account{			Password: user["password"].(string),		})	case "shadowsocks":		var ssCipherType shadowsocks.CipherType		switch user["cipher"].(string) {		case "aes-128-gcm":			ssCipherType = shadowsocks.CipherType_AES_128_GCM		case "aes-256-gcm":			ssCipherType = shadowsocks.CipherType_AES_256_GCM		case "chacha20-poly1305", "chacha20-ietf-poly1305":			ssCipherType = shadowsocks.CipherType_CHACHA20_POLY1305		case "xchacha20-poly1305", "xchacha20-ietf-poly1305":			ssCipherType = shadowsocks.CipherType_XCHACHA20_POLY1305		default:			ssCipherType = shadowsocks.CipherType_NONE		}		if ssCipherType != shadowsocks.CipherType_NONE {			account = serial.ToTypedMessage(&shadowsocks.Account{				Password:   user["password"].(string),				CipherType: ssCipherType,			})		} else {			account = serial.ToTypedMessage(&shadowsocks_2022.User{				Key:   user["password"].(string),				Email: user["email"].(string),			})		}	default:		return nil	}	client := *x.HandlerServiceClient	_, err := client.AlterInbound(context.Background(), &command.AlterInboundRequest{		Tag: inboundTag,		Operation: serial.ToTypedMessage(&command.AddUserOperation{			User: &protocol.User{				Email:   user["email"].(string),				Account: account,			},		}),	})	return err}func (x *XrayAPI) RemoveUser(inboundTag string, email string) error {	client := *x.HandlerServiceClient	_, err := client.AlterInbound(context.Background(), &command.AlterInboundRequest{		Tag: inboundTag,		Operation: serial.ToTypedMessage(&command.RemoveUserOperation{			Email: email,		}),	})	return err}func (x *XrayAPI) GetTraffic(reset bool) ([]*Traffic, []*ClientTraffic, error) {	if x.grpcClient == nil {		return nil, nil, common.NewError("xray api is not initialized")	}	var trafficRegex = regexp.MustCompile("(inbound|outbound)>>>([^>]+)>>>traffic>>>(downlink|uplink)")	var ClientTrafficRegex = regexp.MustCompile("(user)>>>([^>]+)>>>traffic>>>(downlink|uplink)")	client := *x.StatsServiceClient	ctx, cancel := context.WithTimeout(context.Background(), time.Second*10)	defer cancel()	request := &statsService.QueryStatsRequest{		Reset_: reset,	}	resp, err := client.QueryStats(ctx, request)	if err != nil {		return nil, nil, err	}	tagTrafficMap := map[string]*Traffic{}	emailTrafficMap := map[string]*ClientTraffic{}	clientTraffics := make([]*ClientTraffic, 0)	traffics := make([]*Traffic, 0)	for _, stat := range resp.GetStat() {		matchs := trafficRegex.FindStringSubmatch(stat.Name)		if len(matchs) < 3 {			matchs := ClientTrafficRegex.FindStringSubmatch(stat.Name)			if len(matchs) < 3 {				continue			} else {				isUser := matchs[1] == "user"				email := matchs[2]				isDown := matchs[3] == "downlink"				if !isUser {					continue				}				traffic, ok := emailTrafficMap[email]				if !ok {					traffic = &ClientTraffic{						Email: email,					}					emailTrafficMap[email] = traffic					clientTraffics = append(clientTraffics, traffic)				}				if isDown {					traffic.Down = stat.Value				} else {					traffic.Up = stat.Value				}			}			continue		}		isInbound := matchs[1] == "inbound"		tag := matchs[2]		isDown := matchs[3] == "downlink"		if tag == "api" {			continue		}		traffic, ok := tagTrafficMap[tag]		if !ok {			traffic = &Traffic{				IsInbound: isInbound,				Tag:       tag,			}			tagTrafficMap[tag] = traffic			traffics = append(traffics, traffic)		}		if isDown {			traffic.Down = stat.Value		} else {			traffic.Up = stat.Value		}	}	return traffics, clientTraffics, nil}
 |