hub.go 2.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116
  1. package tcp
  2. import (
  3. "context"
  4. "crypto/tls"
  5. "net"
  6. "time"
  7. "v2ray.com/core/app/log"
  8. "v2ray.com/core/common"
  9. v2net "v2ray.com/core/common/net"
  10. "v2ray.com/core/common/retry"
  11. "v2ray.com/core/transport/internet"
  12. v2tls "v2ray.com/core/transport/internet/tls"
  13. )
  14. var (
  15. ErrClosedListener = newError("Listener is closed.")
  16. )
  17. type TCPListener struct {
  18. ctx context.Context
  19. listener *net.TCPListener
  20. tlsConfig *tls.Config
  21. authConfig internet.ConnectionAuthenticator
  22. config *Config
  23. conns chan<- internet.Connection
  24. }
  25. func ListenTCP(ctx context.Context, address v2net.Address, port v2net.Port, conns chan<- internet.Connection) (internet.Listener, error) {
  26. listener, err := net.ListenTCP("tcp", &net.TCPAddr{
  27. IP: address.IP(),
  28. Port: int(port),
  29. })
  30. if err != nil {
  31. return nil, err
  32. }
  33. log.Trace(newError("listening TCP on ", address, ":", port))
  34. networkSettings := internet.TransportSettingsFromContext(ctx)
  35. tcpSettings := networkSettings.(*Config)
  36. l := &TCPListener{
  37. ctx: ctx,
  38. listener: listener,
  39. config: tcpSettings,
  40. conns: conns,
  41. }
  42. if securitySettings := internet.SecuritySettingsFromContext(ctx); securitySettings != nil {
  43. tlsConfig, ok := securitySettings.(*v2tls.Config)
  44. if ok {
  45. l.tlsConfig = tlsConfig.GetTLSConfig()
  46. }
  47. }
  48. if tcpSettings.HeaderSettings != nil {
  49. headerConfig, err := tcpSettings.HeaderSettings.GetInstance()
  50. if err != nil {
  51. return nil, newError("invalid header settings").Base(err).AtError()
  52. }
  53. auth, err := internet.CreateConnectionAuthenticator(headerConfig)
  54. if err != nil {
  55. return nil, newError("invalid header settings.").Base(err).AtError()
  56. }
  57. l.authConfig = auth
  58. }
  59. go l.KeepAccepting()
  60. return l, nil
  61. }
  62. func (v *TCPListener) KeepAccepting() {
  63. for {
  64. select {
  65. case <-v.ctx.Done():
  66. return
  67. default:
  68. }
  69. var conn net.Conn
  70. err := retry.ExponentialBackoff(5, 200).On(func() error {
  71. rawConn, err := v.listener.Accept()
  72. if err != nil {
  73. return err
  74. }
  75. conn = rawConn
  76. return nil
  77. })
  78. if err != nil {
  79. log.Trace(newError("failed to accepted raw connections").Base(err).AtWarning())
  80. continue
  81. }
  82. if v.tlsConfig != nil {
  83. conn = tls.Server(conn, v.tlsConfig)
  84. }
  85. if v.authConfig != nil {
  86. conn = v.authConfig.Server(conn)
  87. }
  88. select {
  89. case v.conns <- internet.Connection(conn):
  90. case <-time.After(time.Second * 5):
  91. conn.Close()
  92. }
  93. }
  94. }
  95. func (v *TCPListener) Addr() net.Addr {
  96. return v.listener.Addr()
  97. }
  98. func (v *TCPListener) Close() error {
  99. v.listener.Close()
  100. return nil
  101. }
  102. func init() {
  103. common.Must(internet.RegisterTransportListener(internet.TransportProtocol_TCP, ListenTCP))
  104. }