hub.go 2.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117
  1. package tcp
  2. import (
  3. "context"
  4. "crypto/tls"
  5. "net"
  6. "time"
  7. "v2ray.com/core/app/log"
  8. "v2ray.com/core/common"
  9. "v2ray.com/core/common/errors"
  10. v2net "v2ray.com/core/common/net"
  11. "v2ray.com/core/common/retry"
  12. "v2ray.com/core/transport/internet"
  13. v2tls "v2ray.com/core/transport/internet/tls"
  14. )
  15. var (
  16. ErrClosedListener = errors.New("Listener is closed.")
  17. )
  18. type TCPListener struct {
  19. ctx context.Context
  20. listener *net.TCPListener
  21. tlsConfig *tls.Config
  22. authConfig internet.ConnectionAuthenticator
  23. config *Config
  24. conns chan<- internet.Connection
  25. }
  26. func ListenTCP(ctx context.Context, address v2net.Address, port v2net.Port, conns chan<- internet.Connection) (internet.Listener, error) {
  27. listener, err := net.ListenTCP("tcp", &net.TCPAddr{
  28. IP: address.IP(),
  29. Port: int(port),
  30. })
  31. if err != nil {
  32. return nil, err
  33. }
  34. log.Trace(errors.New("TCP|Listener: Listening on ", address, ":", port))
  35. networkSettings := internet.TransportSettingsFromContext(ctx)
  36. tcpSettings := networkSettings.(*Config)
  37. l := &TCPListener{
  38. ctx: ctx,
  39. listener: listener,
  40. config: tcpSettings,
  41. conns: conns,
  42. }
  43. if securitySettings := internet.SecuritySettingsFromContext(ctx); securitySettings != nil {
  44. tlsConfig, ok := securitySettings.(*v2tls.Config)
  45. if ok {
  46. l.tlsConfig = tlsConfig.GetTLSConfig()
  47. }
  48. }
  49. if tcpSettings.HeaderSettings != nil {
  50. headerConfig, err := tcpSettings.HeaderSettings.GetInstance()
  51. if err != nil {
  52. return nil, errors.New("Internet|TCP: Invalid header settings.").Base(err)
  53. }
  54. auth, err := internet.CreateConnectionAuthenticator(headerConfig)
  55. if err != nil {
  56. return nil, errors.New("Internet|TCP: Invalid header settings.").Base(err)
  57. }
  58. l.authConfig = auth
  59. }
  60. go l.KeepAccepting()
  61. return l, nil
  62. }
  63. func (v *TCPListener) KeepAccepting() {
  64. for {
  65. select {
  66. case <-v.ctx.Done():
  67. return
  68. default:
  69. }
  70. var conn net.Conn
  71. err := retry.ExponentialBackoff(5, 200).On(func() error {
  72. rawConn, err := v.listener.Accept()
  73. if err != nil {
  74. return err
  75. }
  76. conn = rawConn
  77. return nil
  78. })
  79. if err != nil {
  80. log.Trace(errors.New("TCP|Listener: Failed to accepted raw connections: ", err).AtWarning())
  81. continue
  82. }
  83. if v.tlsConfig != nil {
  84. conn = tls.Server(conn, v.tlsConfig)
  85. }
  86. if v.authConfig != nil {
  87. conn = v.authConfig.Server(conn)
  88. }
  89. select {
  90. case v.conns <- internet.Connection(conn):
  91. case <-time.After(time.Second * 5):
  92. conn.Close()
  93. }
  94. }
  95. }
  96. func (v *TCPListener) Addr() net.Addr {
  97. return v.listener.Addr()
  98. }
  99. func (v *TCPListener) Close() error {
  100. v.listener.Close()
  101. return nil
  102. }
  103. func init() {
  104. common.Must(internet.RegisterTransportListener(internet.TransportProtocol_TCP, ListenTCP))
  105. }