hub.go 2.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103
  1. package tcp
  2. import (
  3. "context"
  4. gotls "crypto/tls"
  5. "v2ray.com/core/app/log"
  6. "v2ray.com/core/common"
  7. "v2ray.com/core/common/net"
  8. "v2ray.com/core/common/retry"
  9. "v2ray.com/core/transport/internet"
  10. "v2ray.com/core/transport/internet/tls"
  11. )
  12. type TCPListener struct {
  13. listener *net.TCPListener
  14. tlsConfig *gotls.Config
  15. authConfig internet.ConnectionAuthenticator
  16. config *Config
  17. addConn internet.AddConnection
  18. }
  19. func ListenTCP(ctx context.Context, address net.Address, port net.Port, addConn internet.AddConnection) (internet.Listener, error) {
  20. listener, err := net.ListenTCP("tcp", &net.TCPAddr{
  21. IP: address.IP(),
  22. Port: int(port),
  23. })
  24. if err != nil {
  25. return nil, err
  26. }
  27. log.Trace(newError("listening TCP on ", address, ":", port))
  28. networkSettings := internet.TransportSettingsFromContext(ctx)
  29. tcpSettings := networkSettings.(*Config)
  30. l := &TCPListener{
  31. listener: listener,
  32. config: tcpSettings,
  33. addConn: addConn,
  34. }
  35. if securitySettings := internet.SecuritySettingsFromContext(ctx); securitySettings != nil {
  36. tlsConfig, ok := securitySettings.(*tls.Config)
  37. if ok {
  38. l.tlsConfig = tlsConfig.GetTLSConfig()
  39. }
  40. }
  41. if tcpSettings.HeaderSettings != nil {
  42. headerConfig, err := tcpSettings.HeaderSettings.GetInstance()
  43. if err != nil {
  44. return nil, newError("invalid header settings").Base(err).AtError()
  45. }
  46. auth, err := internet.CreateConnectionAuthenticator(headerConfig)
  47. if err != nil {
  48. return nil, newError("invalid header settings.").Base(err).AtError()
  49. }
  50. l.authConfig = auth
  51. }
  52. go l.KeepAccepting(ctx)
  53. return l, nil
  54. }
  55. func (v *TCPListener) KeepAccepting(ctx context.Context) {
  56. for {
  57. select {
  58. case <-ctx.Done():
  59. return
  60. default:
  61. }
  62. var conn net.Conn
  63. err := retry.ExponentialBackoff(5, 200).On(func() error {
  64. rawConn, err := v.listener.Accept()
  65. if err != nil {
  66. return err
  67. }
  68. conn = rawConn
  69. return nil
  70. })
  71. if err != nil {
  72. log.Trace(newError("failed to accepted raw connections").Base(err).AtWarning())
  73. continue
  74. }
  75. if v.tlsConfig != nil {
  76. conn = tls.Server(conn, v.tlsConfig)
  77. }
  78. if v.authConfig != nil {
  79. conn = v.authConfig.Server(conn)
  80. }
  81. v.addConn(context.Background(), internet.Connection(conn))
  82. }
  83. }
  84. func (v *TCPListener) Addr() net.Addr {
  85. return v.listener.Addr()
  86. }
  87. func (v *TCPListener) Close() error {
  88. return v.listener.Close()
  89. }
  90. func init() {
  91. common.Must(internet.RegisterTransportListener(internet.TransportProtocol_TCP, ListenTCP))
  92. }