hub.go 3.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128
  1. package tcp
  2. import (
  3. "context"
  4. "crypto/tls"
  5. "net"
  6. "time"
  7. "v2ray.com/core/app/log"
  8. "v2ray.com/core/common"
  9. "v2ray.com/core/common/errors"
  10. v2net "v2ray.com/core/common/net"
  11. "v2ray.com/core/common/retry"
  12. "v2ray.com/core/transport/internet"
  13. "v2ray.com/core/transport/internet/internal"
  14. v2tls "v2ray.com/core/transport/internet/tls"
  15. )
  16. var (
  17. ErrClosedListener = errors.New("Listener is closed.")
  18. )
  19. type TCPListener struct {
  20. ctx context.Context
  21. listener *net.TCPListener
  22. tlsConfig *tls.Config
  23. authConfig internet.ConnectionAuthenticator
  24. config *Config
  25. conns chan<- internet.Connection
  26. }
  27. func ListenTCP(ctx context.Context, address v2net.Address, port v2net.Port, conns chan<- internet.Connection) (internet.Listener, error) {
  28. listener, err := net.ListenTCP("tcp", &net.TCPAddr{
  29. IP: address.IP(),
  30. Port: int(port),
  31. })
  32. if err != nil {
  33. return nil, err
  34. }
  35. log.Info("TCP|Listener: Listening on ", address, ":", port)
  36. networkSettings := internet.TransportSettingsFromContext(ctx)
  37. tcpSettings := networkSettings.(*Config)
  38. l := &TCPListener{
  39. ctx: ctx,
  40. listener: listener,
  41. config: tcpSettings,
  42. conns: conns,
  43. }
  44. if securitySettings := internet.SecuritySettingsFromContext(ctx); securitySettings != nil {
  45. tlsConfig, ok := securitySettings.(*v2tls.Config)
  46. if ok {
  47. l.tlsConfig = tlsConfig.GetTLSConfig()
  48. }
  49. }
  50. if tcpSettings.HeaderSettings != nil {
  51. headerConfig, err := tcpSettings.HeaderSettings.GetInstance()
  52. if err != nil {
  53. return nil, errors.New("Internet|TCP: Invalid header settings.").Base(err)
  54. }
  55. auth, err := internet.CreateConnectionAuthenticator(headerConfig)
  56. if err != nil {
  57. return nil, errors.New("Internet|TCP: Invalid header settings.").Base(err)
  58. }
  59. l.authConfig = auth
  60. }
  61. go l.KeepAccepting()
  62. return l, nil
  63. }
  64. func (v *TCPListener) KeepAccepting() {
  65. for {
  66. select {
  67. case <-v.ctx.Done():
  68. return
  69. default:
  70. }
  71. var conn net.Conn
  72. err := retry.ExponentialBackoff(5, 200).On(func() error {
  73. rawConn, err := v.listener.Accept()
  74. if err != nil {
  75. return err
  76. }
  77. conn = rawConn
  78. return nil
  79. })
  80. if err != nil {
  81. log.Warning("TCP|Listener: Failed to accepted raw connections: ", err)
  82. continue
  83. }
  84. if v.tlsConfig != nil {
  85. conn = tls.Server(conn, v.tlsConfig)
  86. }
  87. if v.authConfig != nil {
  88. conn = v.authConfig.Server(conn)
  89. }
  90. select {
  91. case v.conns <- internal.NewConnection(internal.ConnectionID{}, conn, v, internal.ReuseConnection(v.config.IsConnectionReuse())):
  92. case <-time.After(time.Second * 5):
  93. conn.Close()
  94. }
  95. }
  96. }
  97. func (v *TCPListener) Put(id internal.ConnectionID, conn net.Conn) {
  98. select {
  99. case v.conns <- internal.NewConnection(internal.ConnectionID{}, conn, v, internal.ReuseConnection(v.config.IsConnectionReuse())):
  100. case <-time.After(time.Second * 5):
  101. conn.Close()
  102. case <-v.ctx.Done():
  103. conn.Close()
  104. }
  105. }
  106. func (v *TCPListener) Addr() net.Addr {
  107. return v.listener.Addr()
  108. }
  109. func (v *TCPListener) Close() error {
  110. v.listener.Close()
  111. return nil
  112. }
  113. func init() {
  114. common.Must(internet.RegisterTransportListener(internet.TransportProtocol_TCP, ListenTCP))
  115. }