hub.go 3.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129
  1. package tcp
  2. import (
  3. "context"
  4. "crypto/tls"
  5. "net"
  6. "sync"
  7. "time"
  8. "v2ray.com/core/app/log"
  9. "v2ray.com/core/common"
  10. "v2ray.com/core/common/errors"
  11. v2net "v2ray.com/core/common/net"
  12. "v2ray.com/core/transport/internet"
  13. "v2ray.com/core/transport/internet/internal"
  14. v2tls "v2ray.com/core/transport/internet/tls"
  15. )
  16. var (
  17. ErrClosedListener = errors.New("Listener is closed.")
  18. )
  19. type TCPListener struct {
  20. sync.Mutex
  21. acccepting bool
  22. listener *net.TCPListener
  23. tlsConfig *tls.Config
  24. authConfig internet.ConnectionAuthenticator
  25. config *Config
  26. conns chan<- internet.Connection
  27. }
  28. func ListenTCP(ctx context.Context, address v2net.Address, port v2net.Port, conns chan<- internet.Connection) (internet.Listener, error) {
  29. listener, err := net.ListenTCP("tcp", &net.TCPAddr{
  30. IP: address.IP(),
  31. Port: int(port),
  32. })
  33. if err != nil {
  34. return nil, err
  35. }
  36. log.Info("TCP|Listener: Listening on ", address, ":", port)
  37. networkSettings := internet.TransportSettingsFromContext(ctx)
  38. tcpSettings := networkSettings.(*Config)
  39. l := &TCPListener{
  40. acccepting: true,
  41. listener: listener,
  42. config: tcpSettings,
  43. conns: conns,
  44. }
  45. if securitySettings := internet.SecuritySettingsFromContext(ctx); securitySettings != nil {
  46. tlsConfig, ok := securitySettings.(*v2tls.Config)
  47. if ok {
  48. l.tlsConfig = tlsConfig.GetTLSConfig()
  49. }
  50. }
  51. if tcpSettings.HeaderSettings != nil {
  52. headerConfig, err := tcpSettings.HeaderSettings.GetInstance()
  53. if err != nil {
  54. return nil, errors.Base(err).Message("Internet|TCP: Invalid header settings.")
  55. }
  56. auth, err := internet.CreateConnectionAuthenticator(headerConfig)
  57. if err != nil {
  58. return nil, errors.Base(err).Message("Internet|TCP: Invalid header settings.")
  59. }
  60. l.authConfig = auth
  61. }
  62. go l.KeepAccepting()
  63. return l, nil
  64. }
  65. func (v *TCPListener) KeepAccepting() {
  66. for v.acccepting {
  67. conn, err := v.listener.Accept()
  68. v.Lock()
  69. if !v.acccepting {
  70. v.Unlock()
  71. break
  72. }
  73. if err != nil {
  74. log.Warning("TCP|Listener: Failed to accepted raw connections: ", err)
  75. v.Unlock()
  76. continue
  77. }
  78. if v.tlsConfig != nil {
  79. conn = tls.Server(conn, v.tlsConfig)
  80. }
  81. if v.authConfig != nil {
  82. conn = v.authConfig.Server(conn)
  83. }
  84. select {
  85. case v.conns <- internal.NewConnection(internal.ConnectionID{}, conn, v, internal.ReuseConnection(v.config.IsConnectionReuse())):
  86. case <-time.After(time.Second * 5):
  87. conn.Close()
  88. }
  89. v.Unlock()
  90. }
  91. }
  92. func (v *TCPListener) Put(id internal.ConnectionID, conn net.Conn) {
  93. v.Lock()
  94. defer v.Unlock()
  95. if !v.acccepting {
  96. return
  97. }
  98. select {
  99. case v.conns <- internal.NewConnection(internal.ConnectionID{}, conn, v, internal.ReuseConnection(v.config.IsConnectionReuse())):
  100. case <-time.After(time.Second * 5):
  101. conn.Close()
  102. }
  103. }
  104. func (v *TCPListener) Addr() net.Addr {
  105. return v.listener.Addr()
  106. }
  107. func (v *TCPListener) Close() error {
  108. v.Lock()
  109. defer v.Unlock()
  110. v.acccepting = false
  111. v.listener.Close()
  112. return nil
  113. }
  114. func init() {
  115. common.Must(internet.RegisterTransportListener(internet.TransportProtocol_TCP, ListenTCP))
  116. }