hub.go 2.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106
  1. package tcp
  2. import (
  3. "context"
  4. gotls "crypto/tls"
  5. "net"
  6. "v2ray.com/core/app/log"
  7. "v2ray.com/core/common"
  8. v2net "v2ray.com/core/common/net"
  9. "v2ray.com/core/common/retry"
  10. "v2ray.com/core/transport/internet"
  11. "v2ray.com/core/transport/internet/tls"
  12. )
  13. type TCPListener struct {
  14. ctx context.Context
  15. listener *net.TCPListener
  16. tlsConfig *gotls.Config
  17. authConfig internet.ConnectionAuthenticator
  18. config *Config
  19. addConn internet.AddConnection
  20. }
  21. func ListenTCP(ctx context.Context, address v2net.Address, port v2net.Port, addConn internet.AddConnection) (internet.Listener, error) {
  22. listener, err := net.ListenTCP("tcp", &v2net.TCPAddr{
  23. IP: address.IP(),
  24. Port: int(port),
  25. })
  26. if err != nil {
  27. return nil, err
  28. }
  29. log.Trace(newError("listening TCP on ", address, ":", port))
  30. networkSettings := internet.TransportSettingsFromContext(ctx)
  31. tcpSettings := networkSettings.(*Config)
  32. l := &TCPListener{
  33. ctx: ctx,
  34. listener: listener,
  35. config: tcpSettings,
  36. addConn: addConn,
  37. }
  38. if securitySettings := internet.SecuritySettingsFromContext(ctx); securitySettings != nil {
  39. tlsConfig, ok := securitySettings.(*tls.Config)
  40. if ok {
  41. l.tlsConfig = tlsConfig.GetTLSConfig()
  42. }
  43. }
  44. if tcpSettings.HeaderSettings != nil {
  45. headerConfig, err := tcpSettings.HeaderSettings.GetInstance()
  46. if err != nil {
  47. return nil, newError("invalid header settings").Base(err).AtError()
  48. }
  49. auth, err := internet.CreateConnectionAuthenticator(headerConfig)
  50. if err != nil {
  51. return nil, newError("invalid header settings.").Base(err).AtError()
  52. }
  53. l.authConfig = auth
  54. }
  55. go l.KeepAccepting()
  56. return l, nil
  57. }
  58. func (v *TCPListener) KeepAccepting() {
  59. for {
  60. select {
  61. case <-v.ctx.Done():
  62. return
  63. default:
  64. }
  65. var conn net.Conn
  66. err := retry.ExponentialBackoff(5, 200).On(func() error {
  67. rawConn, err := v.listener.Accept()
  68. if err != nil {
  69. return err
  70. }
  71. conn = rawConn
  72. return nil
  73. })
  74. if err != nil {
  75. log.Trace(newError("failed to accepted raw connections").Base(err).AtWarning())
  76. continue
  77. }
  78. if v.tlsConfig != nil {
  79. conn = tls.Server(conn, v.tlsConfig)
  80. }
  81. if v.authConfig != nil {
  82. conn = v.authConfig.Server(conn)
  83. }
  84. v.addConn(context.Background(), internet.Connection(conn))
  85. }
  86. }
  87. func (v *TCPListener) Addr() net.Addr {
  88. return v.listener.Addr()
  89. }
  90. func (v *TCPListener) Close() error {
  91. return v.listener.Close()
  92. }
  93. func init() {
  94. common.Must(internet.RegisterTransportListener(internet.TransportProtocol_TCP, ListenTCP))
  95. }