2020-02-28 01:03:05 +08:00
|
|
|
<?php
|
|
|
|
|
|
|
|
namespace App\Services;
|
|
|
|
|
2020-04-25 19:44:47 +08:00
|
|
|
use App\Models\ServerLog;
|
2020-10-04 14:21:09 +08:00
|
|
|
use App\Models\ServerShadowsocks;
|
2020-02-28 01:03:05 +08:00
|
|
|
use App\Models\User;
|
2020-03-10 13:11:31 +08:00
|
|
|
use App\Models\Server;
|
2020-06-12 00:18:35 +08:00
|
|
|
use App\Models\ServerTrojan;
|
|
|
|
use App\Utils\CacheKey;
|
|
|
|
use App\Utils\Helper;
|
2020-10-04 14:21:09 +08:00
|
|
|
use App\Utils\URLSchemes;
|
2020-06-12 00:18:35 +08:00
|
|
|
use Illuminate\Support\Facades\Cache;
|
2020-02-28 01:03:05 +08:00
|
|
|
|
|
|
|
class ServerService
|
|
|
|
{
|
2020-03-10 13:11:31 +08:00
|
|
|
|
2020-06-12 01:31:00 +08:00
|
|
|
CONST V2RAY_CONFIG = '{"api":{"services":["HandlerService","StatsService"],"tag":"api"},"dns":{},"stats":{},"inbound":{"port":443,"protocol":"vmess","settings":{"clients":[]},"sniffing":{"enabled":true,"destOverride":["http","tls"]},"streamSettings":{"network":"tcp"},"tag":"proxy"},"inboundDetour":[{"listen":"0.0.0.0","port":23333,"protocol":"dokodemo-door","settings":{"address":"0.0.0.0"},"tag":"api"}],"log":{"loglevel":"debug","access":"access.log","error":"error.log"},"outbound":{"protocol":"freedom","settings":{}},"outboundDetour":[{"protocol":"blackhole","settings":{},"tag":"block"}],"routing":{"rules":[{"inboundTag":"api","outboundTag":"api","type":"field"}]},"policy":{"levels":{"0":{"handshake":4,"connIdle":300,"uplinkOnly":5,"downlinkOnly":30,"statsUserUplink":true,"statsUserDownlink":true}}}}';
|
2020-06-12 02:06:56 +08:00
|
|
|
CONST TROJAN_CONFIG = '{"run_type":"server","local_addr":"0.0.0.0","local_port":443,"remote_addr":"www.taobao.com","remote_port":80,"password":[],"ssl":{"cert":"server.crt","key":"server.key","sni":"domain.com"},"api":{"enabled":true,"api_addr":"127.0.0.1","api_port":10000}}';
|
2020-06-12 00:18:35 +08:00
|
|
|
public function getVmess(User $user, $all = false):array
|
|
|
|
{
|
|
|
|
$vmess = [];
|
|
|
|
$model = Server::orderBy('sort', 'ASC');
|
|
|
|
if (!$all) {
|
|
|
|
$model->where('show', 1);
|
|
|
|
}
|
|
|
|
$vmesss = $model->get();
|
|
|
|
foreach ($vmesss as $k => $v) {
|
2020-10-04 14:21:09 +08:00
|
|
|
$vmesss[$k]['protocol_type'] = 'vmess';
|
2020-06-12 00:18:35 +08:00
|
|
|
$groupId = json_decode($vmesss[$k]['group_id']);
|
|
|
|
if (in_array($user->group_id, $groupId)) {
|
2020-10-04 14:21:09 +08:00
|
|
|
$vmesss[$k]['link'] = URLSchemes::buildVmess($vmesss[$k], $user);
|
2020-06-12 00:18:35 +08:00
|
|
|
if ($vmesss[$k]['parent_id']) {
|
2020-07-03 15:24:10 +08:00
|
|
|
$vmesss[$k]['last_check_at'] = Cache::get(CacheKey::get('SERVER_V2RAY_LAST_CHECK_AT', $vmesss[$k]['parent_id']));
|
2020-06-12 00:18:35 +08:00
|
|
|
} else {
|
2020-07-03 15:24:10 +08:00
|
|
|
$vmesss[$k]['last_check_at'] = Cache::get(CacheKey::get('SERVER_V2RAY_LAST_CHECK_AT', $vmesss[$k]['id']));
|
2020-06-12 00:18:35 +08:00
|
|
|
}
|
|
|
|
array_push($vmess, $vmesss[$k]);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
return $vmess;
|
|
|
|
}
|
|
|
|
|
|
|
|
public function getTrojan(User $user, $all = false)
|
|
|
|
{
|
|
|
|
$trojan = [];
|
|
|
|
$model = ServerTrojan::orderBy('sort', 'ASC');
|
|
|
|
if (!$all) {
|
|
|
|
$model->where('show', 1);
|
|
|
|
}
|
|
|
|
$trojans = $model->get();
|
|
|
|
foreach ($trojans as $k => $v) {
|
2020-10-04 14:21:09 +08:00
|
|
|
$trojans[$k]['protocol_type'] = 'trojan';
|
2020-06-12 00:18:35 +08:00
|
|
|
$groupId = json_decode($trojans[$k]['group_id']);
|
2020-10-04 14:21:09 +08:00
|
|
|
$trojans[$k]['link'] = URLSchemes::buildTrojan($trojans[$k], $user);
|
2020-06-12 00:18:35 +08:00
|
|
|
if (in_array($user->group_id, $groupId)) {
|
2020-07-03 15:24:10 +08:00
|
|
|
if ($trojans[$k]['parent_id']) {
|
|
|
|
$trojans[$k]['last_check_at'] = Cache::get(CacheKey::get('SERVER_TROJAN_LAST_CHECK_AT', $trojans[$k]['parent_id']));
|
|
|
|
} else {
|
|
|
|
$trojans[$k]['last_check_at'] = Cache::get(CacheKey::get('SERVER_TROJAN_LAST_CHECK_AT', $trojans[$k]['id']));
|
|
|
|
}
|
2020-06-12 00:18:35 +08:00
|
|
|
array_push($trojan, $trojans[$k]);
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
return $trojan;
|
|
|
|
}
|
|
|
|
|
2020-10-04 14:21:09 +08:00
|
|
|
public function getShadowsocks(User $user, $all = false)
|
|
|
|
{
|
|
|
|
$shadowsocks = [];
|
|
|
|
$model = ServerShadowsocks::orderBy('sort', 'ASC');
|
|
|
|
if (!$all) {
|
|
|
|
$model->where('show', 1);
|
|
|
|
}
|
|
|
|
$shadowsockss = $model->get();
|
|
|
|
foreach ($shadowsockss as $k => $v) {
|
|
|
|
$shadowsockss[$k]['protocol_type'] = 'shadowsocks';
|
|
|
|
$groupId = json_decode($shadowsockss[$k]['group_id']);
|
|
|
|
$shadowsockss[$k]['link'] = URLSchemes::buildShadowsocks($shadowsockss[$k], $user);
|
|
|
|
if (in_array($user->group_id, $groupId)) {
|
|
|
|
if ($shadowsockss[$k]['parent_id']) {
|
|
|
|
$shadowsockss[$k]['last_check_at'] = Cache::get(CacheKey::get('SERVER_TROJAN_LAST_CHECK_AT', $shadowsockss[$k]['parent_id']));
|
|
|
|
} else {
|
|
|
|
$shadowsockss[$k]['last_check_at'] = Cache::get(CacheKey::get('SERVER_TROJAN_LAST_CHECK_AT', $shadowsockss[$k]['id']));
|
|
|
|
}
|
|
|
|
array_push($shadowsocks, $shadowsockss[$k]);
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
return $shadowsocks;
|
|
|
|
}
|
|
|
|
|
2020-06-12 00:18:35 +08:00
|
|
|
public function getAllServers(User $user, $all = false)
|
|
|
|
{
|
|
|
|
return [
|
2020-10-04 14:21:09 +08:00
|
|
|
'shadowsocks' => $this->getShadowsocks($user, $all),
|
2020-06-12 00:18:35 +08:00
|
|
|
'vmess' => $this->getVmess($user, $all),
|
|
|
|
'trojan' => $this->getTrojan($user, $all)
|
|
|
|
];
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2020-02-28 01:03:05 +08:00
|
|
|
public function getAvailableUsers($groupId)
|
|
|
|
{
|
|
|
|
return User::whereIn('group_id', $groupId)
|
|
|
|
->whereRaw('u + d < transfer_enable')
|
|
|
|
->where(function ($query) {
|
|
|
|
$query->where('expired_at', '>=', time())
|
2020-03-01 23:29:49 +08:00
|
|
|
->orWhere('expired_at', NULL);
|
2020-02-28 01:03:05 +08:00
|
|
|
})
|
2020-03-02 20:47:52 +08:00
|
|
|
->where('banned', 0)
|
2020-02-28 01:03:05 +08:00
|
|
|
->select([
|
|
|
|
'id',
|
|
|
|
'email',
|
|
|
|
't',
|
|
|
|
'u',
|
|
|
|
'd',
|
|
|
|
'transfer_enable',
|
2020-06-08 01:08:07 +08:00
|
|
|
'uuid',
|
2020-02-28 01:03:05 +08:00
|
|
|
'v2ray_alter_id',
|
|
|
|
'v2ray_level'
|
|
|
|
])
|
|
|
|
->get();
|
|
|
|
}
|
2020-03-10 13:11:31 +08:00
|
|
|
|
2020-06-12 00:18:35 +08:00
|
|
|
public function getVmessConfig(int $nodeId, int $localPort)
|
2020-03-10 13:11:31 +08:00
|
|
|
{
|
|
|
|
$server = Server::find($nodeId);
|
|
|
|
if (!$server) {
|
|
|
|
abort(500, '节点不存在');
|
|
|
|
}
|
2020-06-12 01:31:00 +08:00
|
|
|
$json = json_decode(self::V2RAY_CONFIG);
|
2020-05-30 14:43:18 +08:00
|
|
|
$json->log->loglevel = config('v2board.server_log_level', 'none');
|
2020-03-10 13:11:31 +08:00
|
|
|
$json->inboundDetour[0]->port = (int)$localPort;
|
|
|
|
$json->inbound->port = (int)$server->server_port;
|
|
|
|
$json->inbound->streamSettings->network = $server->network;
|
2020-03-31 00:36:01 +08:00
|
|
|
$this->setDns($server, $json);
|
2020-03-31 00:22:49 +08:00
|
|
|
$this->setNetwork($server, $json);
|
|
|
|
$this->setRule($server, $json);
|
|
|
|
$this->setTls($server, $json);
|
2020-03-30 23:40:55 +08:00
|
|
|
|
|
|
|
return $json;
|
|
|
|
}
|
|
|
|
|
2020-06-12 01:31:00 +08:00
|
|
|
public function getTrojanConfig(int $nodeId, int $localPort)
|
|
|
|
{
|
|
|
|
$server = ServerTrojan::find($nodeId);
|
|
|
|
if (!$server) {
|
|
|
|
abort(500, '节点不存在');
|
|
|
|
}
|
|
|
|
|
|
|
|
$json = json_decode(self::TROJAN_CONFIG);
|
2020-06-18 20:25:53 +08:00
|
|
|
$json->local_port = $server->server_port;
|
2020-07-01 15:23:39 +08:00
|
|
|
$json->ssl->sni = $server->server_name ? $server->server_name : $server->host;
|
2020-07-02 21:41:14 +08:00
|
|
|
$json->ssl->cert = "/root/.cert/server.crt";
|
|
|
|
$json->ssl->key = "/root/.cert/server.key";
|
2020-06-12 01:31:00 +08:00
|
|
|
$json->api->api_port = $localPort;
|
|
|
|
return $json;
|
|
|
|
}
|
|
|
|
|
2020-03-30 23:40:55 +08:00
|
|
|
private function setDns(Server $server, object $json)
|
|
|
|
{
|
|
|
|
if ($server->dnsSettings) {
|
2020-03-31 00:34:25 +08:00
|
|
|
$dns = json_decode($server->dnsSettings);
|
2020-04-07 02:47:12 +08:00
|
|
|
if (isset($dns->servers)) {
|
|
|
|
array_push($dns->servers, '1.1.1.1');
|
|
|
|
array_push($dns->servers, 'localhost');
|
|
|
|
}
|
2020-03-31 00:36:01 +08:00
|
|
|
$json->dns = $dns;
|
2020-04-06 18:05:58 +08:00
|
|
|
$json->outbound->settings->domainStrategy = 'UseIP';
|
2020-03-30 23:40:55 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
private function setNetwork(Server $server, object $json)
|
|
|
|
{
|
2020-03-10 13:11:31 +08:00
|
|
|
if ($server->networkSettings) {
|
|
|
|
switch ($server->network) {
|
|
|
|
case 'tcp':
|
|
|
|
$json->inbound->streamSettings->tcpSettings = json_decode($server->networkSettings);
|
|
|
|
break;
|
|
|
|
case 'kcp':
|
|
|
|
$json->inbound->streamSettings->kcpSettings = json_decode($server->networkSettings);
|
|
|
|
break;
|
|
|
|
case 'ws':
|
|
|
|
$json->inbound->streamSettings->wsSettings = json_decode($server->networkSettings);
|
|
|
|
break;
|
|
|
|
case 'http':
|
|
|
|
$json->inbound->streamSettings->httpSettings = json_decode($server->networkSettings);
|
|
|
|
break;
|
|
|
|
case 'domainsocket':
|
|
|
|
$json->inbound->streamSettings->dsSettings = json_decode($server->networkSettings);
|
|
|
|
break;
|
|
|
|
case 'quic':
|
|
|
|
$json->inbound->streamSettings->quicSettings = json_decode($server->networkSettings);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2020-03-30 23:40:55 +08:00
|
|
|
}
|
2020-03-10 13:11:31 +08:00
|
|
|
|
2020-03-31 00:22:07 +08:00
|
|
|
private function setRule(Server $server, object $json)
|
2020-03-30 23:40:55 +08:00
|
|
|
{
|
2020-07-26 17:17:35 +08:00
|
|
|
$domainRules = array_filter(explode(PHP_EOL, config('v2board.server_v2ray_domain')));
|
|
|
|
$protocolRules = array_filter(explode(PHP_EOL, config('v2board.server_v2ray_protocol')));
|
2020-03-10 13:11:31 +08:00
|
|
|
if ($server->ruleSettings) {
|
2020-07-26 17:17:35 +08:00
|
|
|
$ruleSettings = json_decode($server->ruleSettings);
|
2020-03-10 13:11:31 +08:00
|
|
|
// domain
|
2020-07-26 17:17:35 +08:00
|
|
|
if (isset($ruleSettings->domain)) {
|
|
|
|
$ruleSettings->domain = array_filter($ruleSettings->domain);
|
|
|
|
if (!empty($ruleSettings->domain)) {
|
|
|
|
$domainRules = array_merge($domainRules, $ruleSettings->domain);
|
2020-07-22 23:45:00 +08:00
|
|
|
}
|
2020-03-10 13:11:31 +08:00
|
|
|
}
|
|
|
|
// protocol
|
2020-07-26 17:17:35 +08:00
|
|
|
if (isset($ruleSettings->protocol)) {
|
|
|
|
$ruleSettings->protocol = array_filter($ruleSettings->protocol);
|
|
|
|
if (!empty($ruleSettings->protocol)) {
|
|
|
|
$protocolRules = array_merge($protocolRules, $ruleSettings->protocol);
|
2020-07-22 23:45:00 +08:00
|
|
|
}
|
2020-03-10 13:11:31 +08:00
|
|
|
}
|
|
|
|
}
|
2020-07-26 17:17:35 +08:00
|
|
|
if (!empty($domainRules)) {
|
|
|
|
$domainObj = new \StdClass();
|
|
|
|
$domainObj->type = 'field';
|
|
|
|
$domainObj->domain = $domainRules;
|
|
|
|
$domainObj->outboundTag = 'block';
|
|
|
|
array_push($json->routing->rules, $domainObj);
|
|
|
|
}
|
|
|
|
if (!empty($protocolRules)) {
|
|
|
|
$protocolObj = new \StdClass();
|
|
|
|
$protocolObj->type = 'field';
|
|
|
|
$protocolObj->protocol = $protocolRules;
|
|
|
|
$protocolObj->outboundTag = 'block';
|
|
|
|
array_push($json->routing->rules, $protocolObj);
|
|
|
|
}
|
2020-07-31 15:03:12 +08:00
|
|
|
if (empty($domainRules) && empty($protocolRules)) {
|
2020-07-31 15:11:35 +08:00
|
|
|
$json->inbound->sniffing->enabled = false;
|
2020-07-31 15:03:12 +08:00
|
|
|
}
|
2020-03-30 23:40:55 +08:00
|
|
|
}
|
2020-03-10 13:11:31 +08:00
|
|
|
|
2020-03-30 23:40:55 +08:00
|
|
|
private function setTls(Server $server, object $json)
|
|
|
|
{
|
2020-03-10 13:11:31 +08:00
|
|
|
if ((int)$server->tls) {
|
2020-03-10 13:30:30 +08:00
|
|
|
$tlsSettings = json_decode($server->tlsSettings);
|
2020-03-10 13:11:31 +08:00
|
|
|
$json->inbound->streamSettings->security = 'tls';
|
|
|
|
$tls = (object)[
|
2020-07-02 21:41:14 +08:00
|
|
|
'certificateFile' => '/root/.cert/server.crt',
|
|
|
|
'keyFile' => '/root/.cert/server.key'
|
2020-03-10 13:11:31 +08:00
|
|
|
];
|
|
|
|
$json->inbound->streamSettings->tlsSettings = new \StdClass();
|
2020-03-10 13:30:30 +08:00
|
|
|
if (isset($tlsSettings->serverName)) {
|
|
|
|
$json->inbound->streamSettings->tlsSettings->serverName = (string)$tlsSettings->serverName;
|
|
|
|
}
|
|
|
|
if (isset($tlsSettings->allowInsecure)) {
|
|
|
|
$json->inbound->streamSettings->tlsSettings->allowInsecure = (int)$tlsSettings->allowInsecure ? true : false;
|
|
|
|
}
|
2020-03-10 13:11:31 +08:00
|
|
|
$json->inbound->streamSettings->tlsSettings->certificates[0] = $tls;
|
|
|
|
}
|
|
|
|
}
|
2020-04-25 19:44:47 +08:00
|
|
|
|
2020-06-11 20:47:02 +08:00
|
|
|
public function log(int $userId, int $serverId, int $u, int $d, float $rate, string $method)
|
2020-04-25 19:44:47 +08:00
|
|
|
{
|
2020-05-11 17:19:58 +08:00
|
|
|
if (($u + $d) <= 10240) return;
|
|
|
|
$timestamp = strtotime(date('Y-m-d H:0'));
|
|
|
|
$serverLog = ServerLog::where('log_at', '>=', $timestamp)
|
|
|
|
->where('log_at', '<', $timestamp + 3600)
|
|
|
|
->where('server_id', $serverId)
|
|
|
|
->where('user_id', $userId)
|
|
|
|
->where('rate', $rate)
|
2020-06-11 20:47:02 +08:00
|
|
|
->where('method', $method)
|
2020-05-11 17:19:58 +08:00
|
|
|
->first();
|
|
|
|
if ($serverLog) {
|
|
|
|
$serverLog->u = $serverLog->u + $u;
|
2020-05-11 18:27:36 +08:00
|
|
|
$serverLog->d = $serverLog->d + $d;
|
2020-05-11 17:19:58 +08:00
|
|
|
$serverLog->save();
|
|
|
|
} else {
|
|
|
|
$serverLog = new ServerLog();
|
|
|
|
$serverLog->user_id = $userId;
|
|
|
|
$serverLog->server_id = $serverId;
|
|
|
|
$serverLog->u = $u;
|
|
|
|
$serverLog->d = $d;
|
|
|
|
$serverLog->rate = $rate;
|
|
|
|
$serverLog->log_at = $timestamp;
|
2020-06-11 20:47:02 +08:00
|
|
|
$serverLog->method = $method;
|
2020-05-11 17:19:58 +08:00
|
|
|
$serverLog->save();
|
|
|
|
}
|
2020-04-25 19:44:47 +08:00
|
|
|
}
|
2020-02-28 01:03:05 +08:00
|
|
|
}
|