hub.go 4.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202
  1. package tcp
  2. import (
  3. "crypto/tls"
  4. "errors"
  5. "net"
  6. "sync"
  7. "time"
  8. "v2ray.com/core/common/log"
  9. v2net "v2ray.com/core/common/net"
  10. "v2ray.com/core/transport/internet"
  11. v2tls "v2ray.com/core/transport/internet/tls"
  12. )
  13. var (
  14. ErrClosedListener = errors.New("Listener is closed.")
  15. )
  16. type ConnectionWithError struct {
  17. conn net.Conn
  18. err error
  19. }
  20. type TCPListener struct {
  21. sync.Mutex
  22. acccepting bool
  23. listener *net.TCPListener
  24. awaitingConns chan *ConnectionWithError
  25. tlsConfig *tls.Config
  26. authConfig internet.ConnectionAuthenticator
  27. config *Config
  28. }
  29. func ListenTCP(address v2net.Address, port v2net.Port, options internet.ListenOptions) (internet.Listener, error) {
  30. listener, err := net.ListenTCP("tcp", &net.TCPAddr{
  31. IP: address.IP(),
  32. Port: int(port),
  33. })
  34. if err != nil {
  35. return nil, err
  36. }
  37. networkSettings, err := options.Stream.GetEffectiveNetworkSettings()
  38. if err != nil {
  39. return nil, err
  40. }
  41. tcpSettings := networkSettings.(*Config)
  42. l := &TCPListener{
  43. acccepting: true,
  44. listener: listener,
  45. awaitingConns: make(chan *ConnectionWithError, 32),
  46. config: tcpSettings,
  47. }
  48. if options.Stream != nil && options.Stream.HasSecuritySettings() {
  49. securitySettings, err := options.Stream.GetEffectiveSecuritySettings()
  50. if err != nil {
  51. log.Error("TCP: Failed to get security config: ", err)
  52. return nil, err
  53. }
  54. tlsConfig, ok := securitySettings.(*v2tls.Config)
  55. if ok {
  56. l.tlsConfig = tlsConfig.GetTLSConfig()
  57. }
  58. }
  59. if tcpSettings.HeaderSettings != nil {
  60. headerConfig, err := tcpSettings.HeaderSettings.GetInstance()
  61. if err != nil {
  62. return nil, errors.New("TCP: Failed to get header settings: " + err.Error())
  63. }
  64. auth, err := internet.CreateConnectionAuthenticator(tcpSettings.HeaderSettings.Type, headerConfig)
  65. if err != nil {
  66. return nil, errors.New("TCP: Failed to create header authenticator: " + err.Error())
  67. }
  68. l.authConfig = auth
  69. }
  70. go l.KeepAccepting()
  71. return l, nil
  72. }
  73. func (this *TCPListener) Accept() (internet.Connection, error) {
  74. for this.acccepting {
  75. select {
  76. case connErr, open := <-this.awaitingConns:
  77. if !open {
  78. return nil, ErrClosedListener
  79. }
  80. if connErr.err != nil {
  81. return nil, connErr.err
  82. }
  83. conn := connErr.conn
  84. return NewConnection("", conn, this, this.config), nil
  85. case <-time.After(time.Second * 2):
  86. }
  87. }
  88. return nil, ErrClosedListener
  89. }
  90. func (this *TCPListener) KeepAccepting() {
  91. for this.acccepting {
  92. conn, err := this.listener.Accept()
  93. this.Lock()
  94. if !this.acccepting {
  95. this.Unlock()
  96. break
  97. }
  98. if this.tlsConfig != nil {
  99. conn = tls.Server(conn, this.tlsConfig)
  100. }
  101. if this.authConfig != nil {
  102. conn = this.authConfig.Server(conn)
  103. }
  104. select {
  105. case this.awaitingConns <- &ConnectionWithError{
  106. conn: conn,
  107. err: err,
  108. }:
  109. default:
  110. if conn != nil {
  111. conn.Close()
  112. }
  113. }
  114. this.Unlock()
  115. }
  116. }
  117. func (this *TCPListener) Recycle(dest string, conn net.Conn) {
  118. this.Lock()
  119. defer this.Unlock()
  120. if !this.acccepting {
  121. return
  122. }
  123. select {
  124. case this.awaitingConns <- &ConnectionWithError{conn: conn}:
  125. default:
  126. conn.Close()
  127. }
  128. }
  129. func (this *TCPListener) Addr() net.Addr {
  130. return this.listener.Addr()
  131. }
  132. func (this *TCPListener) Close() error {
  133. this.Lock()
  134. defer this.Unlock()
  135. this.acccepting = false
  136. this.listener.Close()
  137. close(this.awaitingConns)
  138. for connErr := range this.awaitingConns {
  139. if connErr.conn != nil {
  140. go connErr.conn.Close()
  141. }
  142. }
  143. return nil
  144. }
  145. type RawTCPListener struct {
  146. accepting bool
  147. listener *net.TCPListener
  148. }
  149. func (this *RawTCPListener) Accept() (internet.Connection, error) {
  150. conn, err := this.listener.AcceptTCP()
  151. if err != nil {
  152. return nil, err
  153. }
  154. return &RawConnection{
  155. TCPConn: *conn,
  156. }, nil
  157. }
  158. func (this *RawTCPListener) Addr() net.Addr {
  159. return this.listener.Addr()
  160. }
  161. func (this *RawTCPListener) Close() error {
  162. this.accepting = false
  163. this.listener.Close()
  164. return nil
  165. }
  166. func ListenRawTCP(address v2net.Address, port v2net.Port, options internet.ListenOptions) (internet.Listener, error) {
  167. listener, err := net.ListenTCP("tcp", &net.TCPAddr{
  168. IP: address.IP(),
  169. Port: int(port),
  170. })
  171. if err != nil {
  172. return nil, err
  173. }
  174. // TODO: handle listen options
  175. return &RawTCPListener{
  176. accepting: true,
  177. listener: listener,
  178. }, nil
  179. }
  180. func init() {
  181. internet.TCPListenFunc = ListenTCP
  182. internet.RawTCPListenFunc = ListenRawTCP
  183. }