| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128 | 
							- package tcp
 
- import (
 
- 	"context"
 
- 	"crypto/tls"
 
- 	"net"
 
- 	"time"
 
- 	"v2ray.com/core/app/log"
 
- 	"v2ray.com/core/common"
 
- 	"v2ray.com/core/common/errors"
 
- 	v2net "v2ray.com/core/common/net"
 
- 	"v2ray.com/core/common/retry"
 
- 	"v2ray.com/core/transport/internet"
 
- 	"v2ray.com/core/transport/internet/internal"
 
- 	v2tls "v2ray.com/core/transport/internet/tls"
 
- )
 
- var (
 
- 	ErrClosedListener = errors.New("Listener is closed.")
 
- )
 
- type TCPListener struct {
 
- 	ctx        context.Context
 
- 	listener   *net.TCPListener
 
- 	tlsConfig  *tls.Config
 
- 	authConfig internet.ConnectionAuthenticator
 
- 	config     *Config
 
- 	conns      chan<- internet.Connection
 
- }
 
- func ListenTCP(ctx context.Context, address v2net.Address, port v2net.Port, conns chan<- internet.Connection) (internet.Listener, error) {
 
- 	listener, err := net.ListenTCP("tcp", &net.TCPAddr{
 
- 		IP:   address.IP(),
 
- 		Port: int(port),
 
- 	})
 
- 	if err != nil {
 
- 		return nil, err
 
- 	}
 
- 	log.Trace(errors.New("TCP|Listener: Listening on ", address, ":", port))
 
- 	networkSettings := internet.TransportSettingsFromContext(ctx)
 
- 	tcpSettings := networkSettings.(*Config)
 
- 	l := &TCPListener{
 
- 		ctx:      ctx,
 
- 		listener: listener,
 
- 		config:   tcpSettings,
 
- 		conns:    conns,
 
- 	}
 
- 	if securitySettings := internet.SecuritySettingsFromContext(ctx); securitySettings != nil {
 
- 		tlsConfig, ok := securitySettings.(*v2tls.Config)
 
- 		if ok {
 
- 			l.tlsConfig = tlsConfig.GetTLSConfig()
 
- 		}
 
- 	}
 
- 	if tcpSettings.HeaderSettings != nil {
 
- 		headerConfig, err := tcpSettings.HeaderSettings.GetInstance()
 
- 		if err != nil {
 
- 			return nil, errors.New("Internet|TCP: Invalid header settings.").Base(err)
 
- 		}
 
- 		auth, err := internet.CreateConnectionAuthenticator(headerConfig)
 
- 		if err != nil {
 
- 			return nil, errors.New("Internet|TCP: Invalid header settings.").Base(err)
 
- 		}
 
- 		l.authConfig = auth
 
- 	}
 
- 	go l.KeepAccepting()
 
- 	return l, nil
 
- }
 
- func (v *TCPListener) KeepAccepting() {
 
- 	for {
 
- 		select {
 
- 		case <-v.ctx.Done():
 
- 			return
 
- 		default:
 
- 		}
 
- 		var conn net.Conn
 
- 		err := retry.ExponentialBackoff(5, 200).On(func() error {
 
- 			rawConn, err := v.listener.Accept()
 
- 			if err != nil {
 
- 				return err
 
- 			}
 
- 			conn = rawConn
 
- 			return nil
 
- 		})
 
- 		if err != nil {
 
- 			log.Trace(errors.New("TCP|Listener: Failed to accepted raw connections: ", err).AtWarning())
 
- 			continue
 
- 		}
 
- 		if v.tlsConfig != nil {
 
- 			conn = tls.Server(conn, v.tlsConfig)
 
- 		}
 
- 		if v.authConfig != nil {
 
- 			conn = v.authConfig.Server(conn)
 
- 		}
 
- 		select {
 
- 		case v.conns <- internal.NewConnection(internal.ConnectionID{}, conn, v, internal.ReuseConnection(v.config.IsConnectionReuse())):
 
- 		case <-time.After(time.Second * 5):
 
- 			conn.Close()
 
- 		}
 
- 	}
 
- }
 
- func (v *TCPListener) Put(id internal.ConnectionID, conn net.Conn) {
 
- 	select {
 
- 	case v.conns <- internal.NewConnection(internal.ConnectionID{}, conn, v, internal.ReuseConnection(v.config.IsConnectionReuse())):
 
- 	case <-time.After(time.Second * 5):
 
- 		conn.Close()
 
- 	case <-v.ctx.Done():
 
- 		conn.Close()
 
- 	}
 
- }
 
- func (v *TCPListener) Addr() net.Addr {
 
- 	return v.listener.Addr()
 
- }
 
- func (v *TCPListener) Close() error {
 
- 	v.listener.Close()
 
- 	return nil
 
- }
 
- func init() {
 
- 	common.Must(internet.RegisterTransportListener(internet.TransportProtocol_TCP, ListenTCP))
 
- }
 
 
  |