hub.go 2.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125
  1. package tcp
  2. import (
  3. "context"
  4. "crypto/tls"
  5. "net"
  6. "sync"
  7. "time"
  8. "v2ray.com/core/app/log"
  9. "v2ray.com/core/common"
  10. "v2ray.com/core/common/errors"
  11. v2net "v2ray.com/core/common/net"
  12. "v2ray.com/core/transport/internet"
  13. "v2ray.com/core/transport/internet/internal"
  14. v2tls "v2ray.com/core/transport/internet/tls"
  15. )
  16. var (
  17. ErrClosedListener = errors.New("Listener is closed.")
  18. )
  19. type TCPListener struct {
  20. sync.Mutex
  21. ctx context.Context
  22. listener *net.TCPListener
  23. tlsConfig *tls.Config
  24. authConfig internet.ConnectionAuthenticator
  25. config *Config
  26. conns chan<- internet.Connection
  27. }
  28. func ListenTCP(ctx context.Context, address v2net.Address, port v2net.Port, conns chan<- internet.Connection) (internet.Listener, error) {
  29. listener, err := net.ListenTCP("tcp", &net.TCPAddr{
  30. IP: address.IP(),
  31. Port: int(port),
  32. })
  33. if err != nil {
  34. return nil, err
  35. }
  36. log.Info("TCP|Listener: Listening on ", address, ":", port)
  37. networkSettings := internet.TransportSettingsFromContext(ctx)
  38. tcpSettings := networkSettings.(*Config)
  39. l := &TCPListener{
  40. ctx: ctx,
  41. listener: listener,
  42. config: tcpSettings,
  43. conns: conns,
  44. }
  45. if securitySettings := internet.SecuritySettingsFromContext(ctx); securitySettings != nil {
  46. tlsConfig, ok := securitySettings.(*v2tls.Config)
  47. if ok {
  48. l.tlsConfig = tlsConfig.GetTLSConfig()
  49. }
  50. }
  51. if tcpSettings.HeaderSettings != nil {
  52. headerConfig, err := tcpSettings.HeaderSettings.GetInstance()
  53. if err != nil {
  54. return nil, errors.Base(err).Message("Internet|TCP: Invalid header settings.")
  55. }
  56. auth, err := internet.CreateConnectionAuthenticator(headerConfig)
  57. if err != nil {
  58. return nil, errors.Base(err).Message("Internet|TCP: Invalid header settings.")
  59. }
  60. l.authConfig = auth
  61. }
  62. go l.KeepAccepting()
  63. return l, nil
  64. }
  65. func (v *TCPListener) KeepAccepting() {
  66. for {
  67. select {
  68. case <-v.ctx.Done():
  69. return
  70. default:
  71. }
  72. conn, err := v.listener.Accept()
  73. v.Lock()
  74. if err != nil {
  75. log.Warning("TCP|Listener: Failed to accepted raw connections: ", err)
  76. v.Unlock()
  77. continue
  78. }
  79. if v.tlsConfig != nil {
  80. conn = tls.Server(conn, v.tlsConfig)
  81. }
  82. if v.authConfig != nil {
  83. conn = v.authConfig.Server(conn)
  84. }
  85. select {
  86. case v.conns <- internal.NewConnection(internal.ConnectionID{}, conn, v, internal.ReuseConnection(v.config.IsConnectionReuse())):
  87. case <-time.After(time.Second * 5):
  88. conn.Close()
  89. }
  90. v.Unlock()
  91. }
  92. }
  93. func (v *TCPListener) Put(id internal.ConnectionID, conn net.Conn) {
  94. select {
  95. case <-v.ctx.Done():
  96. conn.Close()
  97. return
  98. case v.conns <- internal.NewConnection(internal.ConnectionID{}, conn, v, internal.ReuseConnection(v.config.IsConnectionReuse())):
  99. case <-time.After(time.Second * 5):
  100. conn.Close()
  101. }
  102. }
  103. func (v *TCPListener) Addr() net.Addr {
  104. return v.listener.Addr()
  105. }
  106. func (v *TCPListener) Close() error {
  107. v.listener.Close()
  108. return nil
  109. }
  110. func init() {
  111. common.Must(internet.RegisterTransportListener(internet.TransportProtocol_TCP, ListenTCP))
  112. }