Welcome to mirror list, hosted at ThFree Co, Russian Federation.

github.com/MHSanaei/3x-ui.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorlolka1333 <xtrafcyz@gmail.com>2026-05-05 18:27:49 +0300
committerGitHub <noreply@github.com>2026-05-05 18:27:49 +0300
commit8177f6dc667f2edca66073e433baf5cff36cda41 (patch)
tree7fddbec4848c3c0ab0fc39e3dc45703c368e9340 /web/controller
parent77d94b25d054bd6cf7ace029571db9c58ae87fa9 (diff)
ws/inbounds: realtime fixes + perf for 10k+ client inbounds (#4123)HEADmain
* ws/inbounds: realtime fixes + perf for 10k+ client inbounds - hub: dedup, throttle, panic-restart, deadlock fix, race tests - client: backoff cap + slow-retry instead of giving up - broadcast: delta-only payload, count-based invalidate fallback - filter: fix empty online list (Inbound has no .id, use dbInbound.toInbound) - perf: O(N²)→O(N) traffic merge, bulk delete, /setEnable endpoint - traffic: monotonic all_time + UI clamp + propagate in delta handler - session: persist on update/logout (fixes logout-after-password-change) - ui: protocol tags flex, traffic bar normalize * Remove hub_test.go file * fix: ws hub, inbound service, and frontend correctness - propagate DelInbound error on disable path in SetInboundEnable - skip empty emails in updateClientTraffics to avoid constraint violations - use consistent IN ? clause, drop redundant ErrRecordNotFound guards - Hub.Unregister: direct removeClient fallback when channel is full - applyClientStatsDelta: O(1) email lookup via per-inbound Map cache - WS payload size check: Blob.size instead of .length for real byte count * fix: chunk large IN ? queries and fix IPv6 same-origin check * fix: chunk large IN ? queries and fix IPv6 same-origin check * fix: unify clientStats cache, throttle clarity, hub constants * fix(ui): align traffic/expiry cell columns across all rows * style(ui): redesign outbounds table for visual consistency * style(ui): redesign routing table for visual consistency * fix: * fix: * fix: * fix: * fix: * fix: font * refactor: simplify outbound tone functions for consistency and maintainability --------- Co-authored-by: lolka1333 <test123@gmail.com>
Diffstat (limited to 'web/controller')
-rw-r--r--web/controller/inbound.go76
-rw-r--r--web/controller/index.go11
-rw-r--r--web/controller/setting.go4
-rw-r--r--web/controller/websocket.go135
4 files changed, 122 insertions, 104 deletions
diff --git a/web/controller/inbound.go b/web/controller/inbound.go
index ee024cc6..5b8ad38b 100644
--- a/web/controller/inbound.go
+++ b/web/controller/inbound.go
@@ -27,6 +27,34 @@ func NewInboundController(g *gin.RouterGroup) *InboundController {
return a
}
+// broadcastInboundsUpdateClientLimit is the threshold past which we skip the
+// full-list push over WebSocket and signal the frontend to re-fetch via REST.
+// Mirrors the same heuristic used by the periodic traffic job.
+const broadcastInboundsUpdateClientLimit = 5000
+
+// broadcastInboundsUpdate fetches and broadcasts the inbound list for userId.
+// At scale (10k+ clients) the marshaled JSON exceeds the WS payload ceiling,
+// so we send an invalidate signal instead — frontend re-fetches via REST.
+// Skipped entirely when no WebSocket clients are connected.
+func (a *InboundController) broadcastInboundsUpdate(userId int) {
+ if !websocket.HasClients() {
+ return
+ }
+ inbounds, err := a.inboundService.GetInbounds(userId)
+ if err != nil {
+ return
+ }
+ totalClients := 0
+ for _, ib := range inbounds {
+ totalClients += len(ib.ClientStats)
+ }
+ if totalClients > broadcastInboundsUpdateClientLimit {
+ websocket.BroadcastInvalidate(websocket.MessageTypeInbounds)
+ return
+ }
+ websocket.BroadcastInbounds(inbounds)
+}
+
// initRouter initializes the routes for inbound-related operations.
func (a *InboundController) initRouter(g *gin.RouterGroup) {
@@ -38,6 +66,7 @@ func (a *InboundController) initRouter(g *gin.RouterGroup) {
g.POST("/add", a.addInbound)
g.POST("/del/:id", a.delInbound)
g.POST("/update/:id", a.updateInbound)
+ g.POST("/setEnable/:id", a.setInboundEnable)
g.POST("/clientIps/:email", a.getClientIps)
g.POST("/clearClientIps/:email", a.clearClientIps)
g.POST("/addClient", a.addInboundClient)
@@ -134,9 +163,7 @@ func (a *InboundController) addInbound(c *gin.Context) {
if needRestart {
a.xrayService.SetToNeedRestart()
}
- // Broadcast inbounds update via WebSocket
- inbounds, _ := a.inboundService.GetInbounds(user.Id)
- websocket.BroadcastInbounds(inbounds)
+ a.broadcastInboundsUpdate(user.Id)
}
// delInbound deletes an inbound configuration by its ID.
@@ -155,10 +182,8 @@ func (a *InboundController) delInbound(c *gin.Context) {
if needRestart {
a.xrayService.SetToNeedRestart()
}
- // Broadcast inbounds update via WebSocket
user := session.GetLoginUser(c)
- inbounds, _ := a.inboundService.GetInbounds(user.Id)
- websocket.BroadcastInbounds(inbounds)
+ a.broadcastInboundsUpdate(user.Id)
}
// updateInbound updates an existing inbound configuration.
@@ -185,10 +210,43 @@ func (a *InboundController) updateInbound(c *gin.Context) {
if needRestart {
a.xrayService.SetToNeedRestart()
}
- // Broadcast inbounds update via WebSocket
user := session.GetLoginUser(c)
- inbounds, _ := a.inboundService.GetInbounds(user.Id)
- websocket.BroadcastInbounds(inbounds)
+ a.broadcastInboundsUpdate(user.Id)
+}
+
+// setInboundEnable flips only the enable flag of an inbound. This is a
+// dedicated endpoint because the regular update path serialises the entire
+// settings JSON (every client) — far too heavy for an interactive switch
+// on inbounds with thousands of clients. Frontend optimistically updates
+// the UI; we just persist + sync xray + nudge other open admin sessions.
+func (a *InboundController) setInboundEnable(c *gin.Context) {
+ id, err := strconv.Atoi(c.Param("id"))
+ if err != nil {
+ jsonMsg(c, I18nWeb(c, "pages.inbounds.toasts.inboundUpdateSuccess"), err)
+ return
+ }
+ type form struct {
+ Enable bool `json:"enable" form:"enable"`
+ }
+ var f form
+ if err := c.ShouldBind(&f); err != nil {
+ jsonMsg(c, I18nWeb(c, "somethingWentWrong"), err)
+ return
+ }
+ needRestart, err := a.inboundService.SetInboundEnable(id, f.Enable)
+ if err != nil {
+ jsonMsg(c, I18nWeb(c, "somethingWentWrong"), err)
+ return
+ }
+ jsonMsg(c, I18nWeb(c, "pages.inbounds.toasts.inboundUpdateSuccess"), nil)
+ if needRestart {
+ a.xrayService.SetToNeedRestart()
+ }
+ // Cross-admin sync: lightweight invalidate signal (a few hundred bytes)
+ // instead of fetching + serialising the whole inbound list. Other open
+ // sessions re-fetch via REST. The toggling admin's own UI already
+ // updated optimistically.
+ websocket.BroadcastInvalidate(websocket.MessageTypeInbounds)
}
// getClientIps retrieves the IP addresses associated with a client by email.
diff --git a/web/controller/index.go b/web/controller/index.go
index 1325bed5..14791543 100644
--- a/web/controller/index.go
+++ b/web/controller/index.go
@@ -10,7 +10,6 @@ import (
"github.com/mhsanaei/3x-ui/v2/web/service"
"github.com/mhsanaei/3x-ui/v2/web/session"
- "github.com/gin-contrib/sessions"
"github.com/gin-gonic/gin"
)
@@ -95,9 +94,8 @@ func (a *IndexController) login(c *gin.Context) {
logger.Infof("%s logged in successfully, Ip Address: %s\n", safeUser, getRemoteIp(c))
a.tgbot.UserLoginNotify(safeUser, ``, getRemoteIp(c), timeStr, 1)
- session.SetLoginUser(c, user)
- if err := sessions.Default(c).Save(); err != nil {
- logger.Warning("Unable to save session: ", err)
+ if err := session.SetLoginUser(c, user); err != nil {
+ logger.Warning("Unable to save session:", err)
return
}
@@ -111,9 +109,8 @@ func (a *IndexController) logout(c *gin.Context) {
if user != nil {
logger.Infof("%s logged out successfully", user.Username)
}
- session.ClearSession(c)
- if err := sessions.Default(c).Save(); err != nil {
- logger.Warning("Unable to save session after clearing:", err)
+ if err := session.ClearSession(c); err != nil {
+ logger.Warning("Unable to clear session on logout:", err)
}
c.Redirect(http.StatusTemporaryRedirect, c.GetString("base_path"))
}
diff --git a/web/controller/setting.go b/web/controller/setting.go
index fc5486bc..263dbe32 100644
--- a/web/controller/setting.go
+++ b/web/controller/setting.go
@@ -99,7 +99,9 @@ func (a *SettingController) updateUser(c *gin.Context) {
if err == nil {
user.Username = form.NewUsername
user.Password, _ = crypto.HashPasswordAsBcrypt(form.NewPassword)
- session.SetLoginUser(c, user)
+ if saveErr := session.SetLoginUser(c, user); saveErr != nil {
+ err = saveErr
+ }
}
jsonMsg(c, I18nWeb(c, "pages.settings.toasts.modifyUser"), err)
}
diff --git a/web/controller/websocket.go b/web/controller/websocket.go
index dfb59709..2e9fbca0 100644
--- a/web/controller/websocket.go
+++ b/web/controller/websocket.go
@@ -1,7 +1,9 @@
package controller
import (
+ "net"
"net/http"
+ "net/url"
"strings"
"time"
@@ -16,105 +18,80 @@ import (
)
const (
- // Time allowed to write a message to the peer
- writeWait = 10 * time.Second
-
- // Time allowed to read the next pong message from the peer
- pongWait = 60 * time.Second
-
- // Send pings to peer with this period (must be less than pongWait)
- pingPeriod = (pongWait * 9) / 10
-
- // Maximum message size allowed from peer
- maxMessageSize = 512
+ writeWait = 10 * time.Second
+ pongWait = 60 * time.Second
+ pingPeriod = (pongWait * 9) / 10
+ clientReadLimit = 512
)
var upgrader = ws.Upgrader{
ReadBufferSize: 32768,
WriteBufferSize: 32768,
- EnableCompression: true, // Negotiate permessage-deflate compression if the client supports it
-
- CheckOrigin: func(r *http.Request) bool {
- // Check origin for security
- origin := r.Header.Get("Origin")
- if origin == "" {
- // Allow connections without Origin header (same-origin requests)
- return true
- }
- // Get the host from the request
- host := r.Host
- // Extract scheme and host from origin
- originURL := origin
- // Simple check: origin should match the request host
- // This prevents cross-origin WebSocket hijacking
- if strings.HasPrefix(originURL, "http://") || strings.HasPrefix(originURL, "https://") {
- // Extract host from origin
- originHost := strings.TrimPrefix(strings.TrimPrefix(originURL, "http://"), "https://")
- if idx := strings.Index(originHost, "/"); idx != -1 {
- originHost = originHost[:idx]
- }
- if idx := strings.Index(originHost, ":"); idx != -1 {
- originHost = originHost[:idx]
- }
- // Compare hosts (without port)
- requestHost := host
- if idx := strings.Index(requestHost, ":"); idx != -1 {
- requestHost = requestHost[:idx]
- }
- return originHost == requestHost || originHost == "" || requestHost == ""
- }
+ EnableCompression: true,
+ CheckOrigin: checkSameOrigin,
+}
+
+// checkSameOrigin allows requests with no Origin header (same-origin or non-browser
+// clients) and otherwise requires the Origin hostname to match the request hostname.
+// Comparison is case-insensitive (RFC 7230 §2.7.3) and ignores port differences
+// (the panel often sits behind a reverse proxy on a different port).
+func checkSameOrigin(r *http.Request) bool {
+ origin := r.Header.Get("Origin")
+ if origin == "" {
+ return true
+ }
+ u, err := url.Parse(origin)
+ if err != nil || u.Hostname() == "" {
return false
- },
+ }
+ host, _, err := net.SplitHostPort(r.Host)
+ if err != nil {
+ // IPv6 literals without a port arrive as "[::1]"; net.SplitHostPort
+ // fails in that case while url.Hostname() returns the address without
+ // brackets. Strip them so same-origin checks pass for bare IPv6 hosts.
+ host = r.Host
+ if len(host) >= 2 && host[0] == '[' && host[len(host)-1] == ']' {
+ host = host[1 : len(host)-1]
+ }
+ }
+ return strings.EqualFold(u.Hostname(), host)
}
-// WebSocketController handles WebSocket connections for real-time updates
+// WebSocketController handles WebSocket connections for real-time updates.
type WebSocketController struct {
BaseController
hub *websocket.Hub
}
-// NewWebSocketController creates a new WebSocket controller
+// NewWebSocketController creates a new WebSocket controller.
func NewWebSocketController(hub *websocket.Hub) *WebSocketController {
- return &WebSocketController{
- hub: hub,
- }
+ return &WebSocketController{hub: hub}
}
-// HandleWebSocket handles WebSocket connections
+// HandleWebSocket upgrades the HTTP connection and starts the read/write pumps.
func (w *WebSocketController) HandleWebSocket(c *gin.Context) {
- // Check authentication
if !session.IsLogin(c) {
logger.Warningf("Unauthorized WebSocket connection attempt from %s", getRemoteIp(c))
c.AbortWithStatus(http.StatusUnauthorized)
return
}
- // Upgrade connection to WebSocket
conn, err := upgrader.Upgrade(c.Writer, c.Request, nil)
if err != nil {
logger.Error("Failed to upgrade WebSocket connection:", err)
return
}
- // Create client
- clientID := uuid.New().String()
- client := &websocket.Client{
- ID: clientID,
- Hub: w.hub,
- Send: make(chan []byte, 512), // Increased from 256 to 512 to prevent overflow
- Topics: make(map[websocket.MessageType]bool),
- }
-
- // Register client
+ client := websocket.NewClient(uuid.New().String())
w.hub.Register(client)
- logger.Debugf("WebSocket client %s registered from %s", clientID, getRemoteIp(c))
+ logger.Debugf("WebSocket client %s registered from %s", client.ID, getRemoteIp(c))
- // Start goroutines for reading and writing
go w.writePump(client, conn)
go w.readPump(client, conn)
}
-// readPump pumps messages from the WebSocket connection to the hub
+// readPump consumes inbound frames so the gorilla deadline/pong machinery keeps
+// running. Clients send no commands today; frames are discarded.
func (w *WebSocketController) readPump(client *websocket.Client, conn *ws.Conn) {
defer func() {
if r := common.Recover("WebSocket readPump panic"); r != nil {
@@ -124,35 +101,23 @@ func (w *WebSocketController) readPump(client *websocket.Client, conn *ws.Conn)
conn.Close()
}()
+ conn.SetReadLimit(clientReadLimit)
conn.SetReadDeadline(time.Now().Add(pongWait))
conn.SetPongHandler(func(string) error {
- conn.SetReadDeadline(time.Now().Add(pongWait))
- return nil
+ return conn.SetReadDeadline(time.Now().Add(pongWait))
})
- conn.SetReadLimit(maxMessageSize)
for {
- _, message, err := conn.ReadMessage()
- if err != nil {
+ if _, _, err := conn.ReadMessage(); err != nil {
if ws.IsUnexpectedCloseError(err, ws.CloseGoingAway, ws.CloseAbnormalClosure) {
logger.Debugf("WebSocket read error for client %s: %v", client.ID, err)
}
- break
- }
-
- // Validate message size
- if len(message) > maxMessageSize {
- logger.Warningf("WebSocket message from client %s exceeds max size: %d bytes", client.ID, len(message))
- continue
+ return
}
-
- // Handle incoming messages (e.g., subscription requests)
- // For now, we'll just log them
- logger.Debugf("Received WebSocket message from client %s: %s", client.ID, string(message))
}
}
-// writePump pumps messages from the hub to the WebSocket connection
+// writePump pushes hub messages to the connection and emits keepalive pings.
func (w *WebSocketController) writePump(client *websocket.Client, conn *ws.Conn) {
ticker := time.NewTicker(pingPeriod)
defer func() {
@@ -165,17 +130,13 @@ func (w *WebSocketController) writePump(client *websocket.Client, conn *ws.Conn)
for {
select {
- case message, ok := <-client.Send:
+ case msg, ok := <-client.Send:
conn.SetWriteDeadline(time.Now().Add(writeWait))
if !ok {
- // Hub closed the channel
conn.WriteMessage(ws.CloseMessage, []byte{})
return
}
-
- // Send each message individually (no batching)
- // This ensures each JSON message is sent separately and can be parsed correctly
- if err := conn.WriteMessage(ws.TextMessage, message); err != nil {
+ if err := conn.WriteMessage(ws.TextMessage, msg); err != nil {
logger.Debugf("WebSocket write error for client %s: %v", client.ID, err)
return
}