mirror of https://github.com/v2ray/v2ray-core
				
				
				
			
		
			
				
	
	
		
			174 lines
		
	
	
		
			3.8 KiB
		
	
	
	
		
			Go
		
	
	
			
		
		
	
	
			174 lines
		
	
	
		
			3.8 KiB
		
	
	
	
		
			Go
		
	
	
// Package vmess contains the implementation of VMess protocol and transportation.
 | 
						|
//
 | 
						|
// VMess contains both inbound and outbound connections. VMess inbound is usually used on servers
 | 
						|
// together with 'freedom' to talk to final destination, while VMess outbound is usually used on
 | 
						|
// clients with 'socks' for proxying.
 | 
						|
package vmess
 | 
						|
 | 
						|
//go:generate go run $GOPATH/src/v2ray.com/core/common/errors/errorgen/main.go -pkg vmess -path Proxy,VMess
 | 
						|
 | 
						|
import (
 | 
						|
	"strings"
 | 
						|
	"sync"
 | 
						|
	"time"
 | 
						|
 | 
						|
	"v2ray.com/core/common"
 | 
						|
	"v2ray.com/core/common/protocol"
 | 
						|
	"v2ray.com/core/common/signal"
 | 
						|
)
 | 
						|
 | 
						|
const (
 | 
						|
	updateInterval   = 10 * time.Second
 | 
						|
	cacheDurationSec = 120
 | 
						|
)
 | 
						|
 | 
						|
type user struct {
 | 
						|
	user    *protocol.User
 | 
						|
	account *InternalAccount
 | 
						|
	lastSec protocol.Timestamp
 | 
						|
}
 | 
						|
 | 
						|
type TimedUserValidator struct {
 | 
						|
	sync.RWMutex
 | 
						|
	users    []*user
 | 
						|
	userHash map[[16]byte]indexTimePair
 | 
						|
	hasher   protocol.IDHash
 | 
						|
	baseTime protocol.Timestamp
 | 
						|
	task     *signal.PeriodicTask
 | 
						|
}
 | 
						|
 | 
						|
type indexTimePair struct {
 | 
						|
	user    *user
 | 
						|
	timeInc uint32
 | 
						|
}
 | 
						|
 | 
						|
func NewTimedUserValidator(hasher protocol.IDHash) protocol.UserValidator {
 | 
						|
	tuv := &TimedUserValidator{
 | 
						|
		users:    make([]*user, 0, 16),
 | 
						|
		userHash: make(map[[16]byte]indexTimePair, 1024),
 | 
						|
		hasher:   hasher,
 | 
						|
		baseTime: protocol.Timestamp(time.Now().Unix() - cacheDurationSec*3),
 | 
						|
	}
 | 
						|
	tuv.task = &signal.PeriodicTask{
 | 
						|
		Interval: updateInterval,
 | 
						|
		Execute: func() error {
 | 
						|
			tuv.updateUserHash()
 | 
						|
			return nil
 | 
						|
		},
 | 
						|
	}
 | 
						|
	tuv.task.Start()
 | 
						|
	return tuv
 | 
						|
}
 | 
						|
 | 
						|
func (v *TimedUserValidator) generateNewHashes(nowSec protocol.Timestamp, user *user) {
 | 
						|
	var hashValue [16]byte
 | 
						|
	genHashForID := func(id *protocol.ID) {
 | 
						|
		idHash := v.hasher(id.Bytes())
 | 
						|
		for ts := user.lastSec; ts <= nowSec; ts++ {
 | 
						|
			common.Must2(idHash.Write(ts.Bytes(nil)))
 | 
						|
			idHash.Sum(hashValue[:0])
 | 
						|
			idHash.Reset()
 | 
						|
 | 
						|
			v.userHash[hashValue] = indexTimePair{
 | 
						|
				user:    user,
 | 
						|
				timeInc: uint32(ts - v.baseTime),
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	genHashForID(user.account.ID)
 | 
						|
	for _, id := range user.account.AlterIDs {
 | 
						|
		genHashForID(id)
 | 
						|
	}
 | 
						|
	user.lastSec = nowSec
 | 
						|
}
 | 
						|
 | 
						|
func (v *TimedUserValidator) removeExpiredHashes(expire uint32) {
 | 
						|
	for key, pair := range v.userHash {
 | 
						|
		if pair.timeInc < expire {
 | 
						|
			delete(v.userHash, key)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func (v *TimedUserValidator) updateUserHash() {
 | 
						|
	now := time.Now()
 | 
						|
	nowSec := protocol.Timestamp(now.Unix() + cacheDurationSec)
 | 
						|
	v.Lock()
 | 
						|
	defer v.Unlock()
 | 
						|
 | 
						|
	for _, user := range v.users {
 | 
						|
		v.generateNewHashes(nowSec, user)
 | 
						|
	}
 | 
						|
 | 
						|
	expire := protocol.Timestamp(now.Unix() - cacheDurationSec*3)
 | 
						|
	if expire > v.baseTime {
 | 
						|
		v.removeExpiredHashes(uint32(expire - v.baseTime))
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func (v *TimedUserValidator) Add(u *protocol.User) error {
 | 
						|
	v.Lock()
 | 
						|
	defer v.Unlock()
 | 
						|
 | 
						|
	rawAccount, err := u.GetTypedAccount()
 | 
						|
	if err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
	account := rawAccount.(*InternalAccount)
 | 
						|
 | 
						|
	nowSec := time.Now().Unix()
 | 
						|
 | 
						|
	uu := &user{
 | 
						|
		user:    u,
 | 
						|
		account: account,
 | 
						|
		lastSec: protocol.Timestamp(nowSec - cacheDurationSec),
 | 
						|
	}
 | 
						|
	v.users = append(v.users, uu)
 | 
						|
	v.generateNewHashes(protocol.Timestamp(nowSec+cacheDurationSec), uu)
 | 
						|
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
func (v *TimedUserValidator) Get(userHash []byte) (*protocol.User, protocol.Timestamp, bool) {
 | 
						|
	defer v.RUnlock()
 | 
						|
	v.RLock()
 | 
						|
 | 
						|
	var fixedSizeHash [16]byte
 | 
						|
	copy(fixedSizeHash[:], userHash)
 | 
						|
	pair, found := v.userHash[fixedSizeHash]
 | 
						|
	if found {
 | 
						|
		return pair.user.user, protocol.Timestamp(pair.timeInc) + v.baseTime, true
 | 
						|
	}
 | 
						|
	return nil, 0, false
 | 
						|
}
 | 
						|
 | 
						|
func (v *TimedUserValidator) Remove(email string) bool {
 | 
						|
	v.Lock()
 | 
						|
	defer v.Unlock()
 | 
						|
 | 
						|
	email = strings.ToLower(email)
 | 
						|
	idx := -1
 | 
						|
	for i, u := range v.users {
 | 
						|
		if strings.ToLower(u.user.Email) == email {
 | 
						|
			idx = i
 | 
						|
			break
 | 
						|
		}
 | 
						|
	}
 | 
						|
	if idx == -1 {
 | 
						|
		return false
 | 
						|
	}
 | 
						|
	ulen := len(v.users)
 | 
						|
	if idx < ulen {
 | 
						|
		v.users[idx] = v.users[ulen-1]
 | 
						|
		v.users[ulen-1] = nil
 | 
						|
		v.users = v.users[:ulen-1]
 | 
						|
	}
 | 
						|
	return true
 | 
						|
}
 | 
						|
 | 
						|
// Close implements common.Closable.
 | 
						|
func (v *TimedUserValidator) Close() error {
 | 
						|
	return v.task.Close()
 | 
						|
}
 |