hub.go 2.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105
  1. package tcp
  2. import (
  3. "context"
  4. gotls "crypto/tls"
  5. "v2ray.com/core/app/log"
  6. "v2ray.com/core/common"
  7. "v2ray.com/core/common/net"
  8. "v2ray.com/core/common/retry"
  9. "v2ray.com/core/transport/internet"
  10. "v2ray.com/core/transport/internet/tls"
  11. )
  12. type TCPListener struct {
  13. ctx context.Context
  14. listener *net.TCPListener
  15. tlsConfig *gotls.Config
  16. authConfig internet.ConnectionAuthenticator
  17. config *Config
  18. addConn internet.AddConnection
  19. }
  20. func ListenTCP(ctx context.Context, address net.Address, port net.Port, addConn internet.AddConnection) (internet.Listener, error) {
  21. listener, err := net.ListenTCP("tcp", &net.TCPAddr{
  22. IP: address.IP(),
  23. Port: int(port),
  24. })
  25. if err != nil {
  26. return nil, err
  27. }
  28. log.Trace(newError("listening TCP on ", address, ":", port))
  29. networkSettings := internet.TransportSettingsFromContext(ctx)
  30. tcpSettings := networkSettings.(*Config)
  31. l := &TCPListener{
  32. ctx: ctx,
  33. listener: listener,
  34. config: tcpSettings,
  35. addConn: addConn,
  36. }
  37. if securitySettings := internet.SecuritySettingsFromContext(ctx); securitySettings != nil {
  38. tlsConfig, ok := securitySettings.(*tls.Config)
  39. if ok {
  40. l.tlsConfig = tlsConfig.GetTLSConfig()
  41. }
  42. }
  43. if tcpSettings.HeaderSettings != nil {
  44. headerConfig, err := tcpSettings.HeaderSettings.GetInstance()
  45. if err != nil {
  46. return nil, newError("invalid header settings").Base(err).AtError()
  47. }
  48. auth, err := internet.CreateConnectionAuthenticator(headerConfig)
  49. if err != nil {
  50. return nil, newError("invalid header settings.").Base(err).AtError()
  51. }
  52. l.authConfig = auth
  53. }
  54. go l.KeepAccepting()
  55. return l, nil
  56. }
  57. func (v *TCPListener) KeepAccepting() {
  58. for {
  59. select {
  60. case <-v.ctx.Done():
  61. return
  62. default:
  63. }
  64. var conn net.Conn
  65. err := retry.ExponentialBackoff(5, 200).On(func() error {
  66. rawConn, err := v.listener.Accept()
  67. if err != nil {
  68. return err
  69. }
  70. conn = rawConn
  71. return nil
  72. })
  73. if err != nil {
  74. log.Trace(newError("failed to accepted raw connections").Base(err).AtWarning())
  75. continue
  76. }
  77. if v.tlsConfig != nil {
  78. conn = tls.Server(conn, v.tlsConfig)
  79. }
  80. if v.authConfig != nil {
  81. conn = v.authConfig.Server(conn)
  82. }
  83. v.addConn(context.Background(), internet.Connection(conn))
  84. }
  85. }
  86. func (v *TCPListener) Addr() net.Addr {
  87. return v.listener.Addr()
  88. }
  89. func (v *TCPListener) Close() error {
  90. return v.listener.Close()
  91. }
  92. func init() {
  93. common.Must(internet.RegisterTransportListener(internet.TransportProtocol_TCP, ListenTCP))
  94. }