hub.go 4.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203
  1. package websocket
  2. import (
  3. "crypto/tls"
  4. "net"
  5. "net/http"
  6. "strconv"
  7. "sync"
  8. "time"
  9. "v2ray.com/core/common"
  10. "v2ray.com/core/common/errors"
  11. "v2ray.com/core/common/log"
  12. v2net "v2ray.com/core/common/net"
  13. "v2ray.com/core/transport/internet"
  14. v2tls "v2ray.com/core/transport/internet/tls"
  15. "github.com/gorilla/websocket"
  16. "v2ray.com/core/transport/internet/internal"
  17. )
  18. var (
  19. ErrClosedListener = errors.New("Listener is closed.")
  20. )
  21. type ConnectionWithError struct {
  22. conn net.Conn
  23. err error
  24. }
  25. type WSListener struct {
  26. sync.Mutex
  27. acccepting bool
  28. awaitingConns chan *ConnectionWithError
  29. listener *StoppableListener
  30. tlsConfig *tls.Config
  31. config *Config
  32. }
  33. func ListenWS(address v2net.Address, port v2net.Port, options internet.ListenOptions) (internet.Listener, error) {
  34. networkSettings, err := options.Stream.GetEffectiveTransportSettings()
  35. if err != nil {
  36. return nil, err
  37. }
  38. wsSettings := networkSettings.(*Config)
  39. l := &WSListener{
  40. acccepting: true,
  41. awaitingConns: make(chan *ConnectionWithError, 32),
  42. config: wsSettings,
  43. }
  44. if options.Stream != nil && options.Stream.HasSecuritySettings() {
  45. securitySettings, err := options.Stream.GetEffectiveSecuritySettings()
  46. if err != nil {
  47. log.Error("WebSocket: Failed to create apply TLS config: ", err)
  48. return nil, err
  49. }
  50. tlsConfig, ok := securitySettings.(*v2tls.Config)
  51. if ok {
  52. l.tlsConfig = tlsConfig.GetTLSConfig()
  53. }
  54. }
  55. err = l.listenws(address, port)
  56. return l, err
  57. }
  58. func (wsl *WSListener) listenws(address v2net.Address, port v2net.Port) error {
  59. http.HandleFunc("/"+wsl.config.Path, func(w http.ResponseWriter, r *http.Request) {
  60. con, err := wsl.converttovws(w, r)
  61. if err != nil {
  62. log.Warning("WebSocket|Listener: Failed to convert connection: ", err)
  63. return
  64. }
  65. select {
  66. case wsl.awaitingConns <- &ConnectionWithError{
  67. conn: con,
  68. }:
  69. default:
  70. if con != nil {
  71. con.Close()
  72. }
  73. }
  74. return
  75. })
  76. errchan := make(chan error)
  77. listenerfunc := func() error {
  78. ol, err := net.Listen("tcp", address.String()+":"+strconv.Itoa(int(port.Value())))
  79. if err != nil {
  80. return err
  81. }
  82. wsl.listener, err = NewStoppableListener(ol)
  83. if err != nil {
  84. return err
  85. }
  86. return http.Serve(wsl.listener, nil)
  87. }
  88. if wsl.tlsConfig != nil {
  89. listenerfunc = func() error {
  90. var err error
  91. wsl.listener, err = getstopableTLSlistener(wsl.tlsConfig, address.String()+":"+strconv.Itoa(int(port.Value())))
  92. if err != nil {
  93. return err
  94. }
  95. return http.Serve(wsl.listener, nil)
  96. }
  97. }
  98. go func() {
  99. err := listenerfunc()
  100. errchan <- err
  101. return
  102. }()
  103. var err error
  104. select {
  105. case err = <-errchan:
  106. case <-time.After(time.Second * 2):
  107. //Should this listen fail after 2 sec, it could gone untracked.
  108. }
  109. if err != nil {
  110. log.Error("WebSocket|Listener: Failed to serve: ", err)
  111. }
  112. return err
  113. }
  114. func (wsl *WSListener) converttovws(w http.ResponseWriter, r *http.Request) (*wsconn, error) {
  115. var upgrader = websocket.Upgrader{
  116. ReadBufferSize: 32 * 1024,
  117. WriteBufferSize: 32 * 1024,
  118. }
  119. conn, err := upgrader.Upgrade(w, r, nil)
  120. if err != nil {
  121. return nil, err
  122. }
  123. wrapedConn := &wsconn{wsc: conn, connClosing: false}
  124. wrapedConn.setup()
  125. return wrapedConn, nil
  126. }
  127. func (v *WSListener) Accept() (internet.Connection, error) {
  128. for v.acccepting {
  129. select {
  130. case connErr, open := <-v.awaitingConns:
  131. if !open {
  132. return nil, ErrClosedListener
  133. }
  134. if connErr.err != nil {
  135. return nil, connErr.err
  136. }
  137. return internal.NewConnection(internal.ConnectionID{}, connErr.conn.(*wsconn), v, internal.ReuseConnection(v.config.IsConnectionReuse())), nil
  138. case <-time.After(time.Second * 2):
  139. }
  140. }
  141. return nil, ErrClosedListener
  142. }
  143. func (v *WSListener) Put(id internal.ConnectionID, conn net.Conn) {
  144. v.Lock()
  145. defer v.Unlock()
  146. if !v.acccepting {
  147. return
  148. }
  149. select {
  150. case v.awaitingConns <- &ConnectionWithError{conn: conn}:
  151. default:
  152. conn.Close()
  153. }
  154. }
  155. func (v *WSListener) Addr() net.Addr {
  156. return nil
  157. }
  158. func (v *WSListener) Close() error {
  159. v.Lock()
  160. defer v.Unlock()
  161. v.acccepting = false
  162. v.listener.Stop()
  163. close(v.awaitingConns)
  164. for connErr := range v.awaitingConns {
  165. if connErr.conn != nil {
  166. connErr.conn.Close()
  167. }
  168. }
  169. return nil
  170. }
  171. func init() {
  172. common.Must(internet.RegisterTransportListener(internet.TransportProtocol_WebSocket, ListenWS))
  173. }