hub.go 4.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201
  1. package websocket
  2. import (
  3. "crypto/tls"
  4. "net"
  5. "net/http"
  6. "strconv"
  7. "sync"
  8. "time"
  9. "github.com/gorilla/websocket"
  10. "v2ray.com/core/app/log"
  11. "v2ray.com/core/common"
  12. "v2ray.com/core/common/errors"
  13. v2net "v2ray.com/core/common/net"
  14. "v2ray.com/core/transport/internet"
  15. "v2ray.com/core/transport/internet/internal"
  16. v2tls "v2ray.com/core/transport/internet/tls"
  17. )
  18. var (
  19. ErrClosedListener = errors.New("Listener is closed.")
  20. )
  21. type ConnectionWithError struct {
  22. conn net.Conn
  23. err error
  24. }
  25. type WSListener struct {
  26. sync.Mutex
  27. acccepting bool
  28. awaitingConns chan *ConnectionWithError
  29. listener *StoppableListener
  30. tlsConfig *tls.Config
  31. config *Config
  32. }
  33. func ListenWS(address v2net.Address, port v2net.Port, options internet.ListenOptions) (internet.Listener, error) {
  34. networkSettings, err := options.Stream.GetEffectiveTransportSettings()
  35. if err != nil {
  36. return nil, err
  37. }
  38. wsSettings := networkSettings.(*Config)
  39. l := &WSListener{
  40. acccepting: true,
  41. awaitingConns: make(chan *ConnectionWithError, 32),
  42. config: wsSettings,
  43. }
  44. if options.Stream != nil && options.Stream.HasSecuritySettings() {
  45. securitySettings, err := options.Stream.GetEffectiveSecuritySettings()
  46. if err != nil {
  47. log.Error("WebSocket: Failed to create apply TLS config: ", err)
  48. return nil, err
  49. }
  50. tlsConfig, ok := securitySettings.(*v2tls.Config)
  51. if ok {
  52. l.tlsConfig = tlsConfig.GetTLSConfig()
  53. }
  54. }
  55. err = l.listenws(address, port)
  56. return l, err
  57. }
  58. func (wsl *WSListener) listenws(address v2net.Address, port v2net.Port) error {
  59. http.HandleFunc("/"+wsl.config.Path, func(w http.ResponseWriter, r *http.Request) {
  60. conn, err := wsl.converttovws(w, r)
  61. if err != nil {
  62. log.Warning("WebSocket|Listener: Failed to convert connection: ", err)
  63. return
  64. }
  65. select {
  66. case wsl.awaitingConns <- &ConnectionWithError{
  67. conn: conn,
  68. }:
  69. default:
  70. if conn != nil {
  71. conn.Close()
  72. }
  73. }
  74. return
  75. })
  76. errchan := make(chan error, 1)
  77. listenerfunc := func() error {
  78. ol, err := net.Listen("tcp", address.String()+":"+strconv.Itoa(int(port.Value())))
  79. if err != nil {
  80. return err
  81. }
  82. wsl.listener, err = NewStoppableListener(ol)
  83. if err != nil {
  84. return err
  85. }
  86. return http.Serve(wsl.listener, nil)
  87. }
  88. if wsl.tlsConfig != nil {
  89. listenerfunc = func() error {
  90. var err error
  91. wsl.listener, err = getstopableTLSlistener(wsl.tlsConfig, address.String()+":"+strconv.Itoa(int(port.Value())))
  92. if err != nil {
  93. return err
  94. }
  95. return http.Serve(wsl.listener, nil)
  96. }
  97. }
  98. go func() {
  99. err := listenerfunc()
  100. errchan <- err
  101. }()
  102. var err error
  103. select {
  104. case err = <-errchan:
  105. case <-time.After(time.Second * 5):
  106. //Should this listen fail after 5 sec, it could gone untracked.
  107. }
  108. if err != nil {
  109. log.Error("WebSocket|Listener: Failed to serve: ", err)
  110. }
  111. return err
  112. }
  113. func (wsl *WSListener) converttovws(w http.ResponseWriter, r *http.Request) (*wsconn, error) {
  114. var upgrader = websocket.Upgrader{
  115. ReadBufferSize: 32 * 1024,
  116. WriteBufferSize: 32 * 1024,
  117. }
  118. conn, err := upgrader.Upgrade(w, r, nil)
  119. if err != nil {
  120. return nil, err
  121. }
  122. wrapedConn := &wsconn{wsc: conn, connClosing: false}
  123. wrapedConn.setup()
  124. return wrapedConn, nil
  125. }
  126. func (v *WSListener) Accept() (internet.Connection, error) {
  127. for v.acccepting {
  128. select {
  129. case connErr, open := <-v.awaitingConns:
  130. if !open {
  131. return nil, ErrClosedListener
  132. }
  133. if connErr.err != nil {
  134. return nil, connErr.err
  135. }
  136. return internal.NewConnection(internal.ConnectionID{}, connErr.conn, v, internal.ReuseConnection(v.config.IsConnectionReuse())), nil
  137. case <-time.After(time.Second * 2):
  138. }
  139. }
  140. return nil, ErrClosedListener
  141. }
  142. func (v *WSListener) Put(id internal.ConnectionID, conn net.Conn) {
  143. v.Lock()
  144. defer v.Unlock()
  145. if !v.acccepting {
  146. return
  147. }
  148. select {
  149. case v.awaitingConns <- &ConnectionWithError{conn: conn}:
  150. default:
  151. conn.Close()
  152. }
  153. }
  154. func (v *WSListener) Addr() net.Addr {
  155. return nil
  156. }
  157. func (v *WSListener) Close() error {
  158. v.Lock()
  159. defer v.Unlock()
  160. v.acccepting = false
  161. v.listener.Stop()
  162. close(v.awaitingConns)
  163. for connErr := range v.awaitingConns {
  164. if connErr.conn != nil {
  165. connErr.conn.Close()
  166. }
  167. }
  168. return nil
  169. }
  170. func init() {
  171. common.Must(internet.RegisterTransportListener(internet.TransportProtocol_WebSocket, ListenWS))
  172. }