1
0
mirror of https://github.com/v2fly/v2ray-core.git synced 2024-07-19 19:54:28 -04:00
v2fly/transport/internet/tcp/hub.go

106 lines
2.4 KiB
Go
Raw Normal View History

2016-06-14 16:54:08 -04:00
package tcp
import (
2017-02-23 19:05:16 -05:00
"context"
2017-04-20 05:00:15 -04:00
gotls "crypto/tls"
2017-01-03 08:53:59 -05:00
2017-02-10 10:42:24 -05:00
"v2ray.com/core/app/log"
2017-01-03 09:16:48 -05:00
"v2ray.com/core/common"
2017-08-29 08:32:54 -04:00
"v2ray.com/core/common/net"
"v2ray.com/core/common/retry"
2016-08-20 14:55:45 -04:00
"v2ray.com/core/transport/internet"
2017-04-20 05:00:15 -04:00
"v2ray.com/core/transport/internet/tls"
2016-06-14 16:54:08 -04:00
)
type TCPListener struct {
2017-02-27 09:13:22 -05:00
ctx context.Context
2017-02-26 08:38:41 -05:00
listener *net.TCPListener
2017-04-20 05:00:15 -04:00
tlsConfig *gotls.Config
2017-02-26 08:38:41 -05:00
authConfig internet.ConnectionAuthenticator
config *Config
2017-05-08 18:01:15 -04:00
addConn internet.AddConnection
2016-06-14 16:54:08 -04:00
}
2017-08-29 08:32:54 -04:00
func ListenTCP(ctx context.Context, address net.Address, port net.Port, addConn internet.AddConnection) (internet.Listener, error) {
listener, err := net.ListenTCP("tcp", &net.TCPAddr{
2016-06-14 16:54:08 -04:00
IP: address.IP(),
Port: int(port),
})
if err != nil {
return nil, err
}
2017-04-09 07:30:46 -04:00
log.Trace(newError("listening TCP on ", address, ":", port))
2017-02-23 19:05:16 -05:00
networkSettings := internet.TransportSettingsFromContext(ctx)
2016-10-02 17:43:58 -04:00
tcpSettings := networkSettings.(*Config)
2016-06-14 16:54:08 -04:00
l := &TCPListener{
2017-02-27 09:13:22 -05:00
ctx: ctx,
listener: listener,
config: tcpSettings,
2017-05-08 18:01:15 -04:00
addConn: addConn,
2016-06-14 16:54:08 -04:00
}
2017-02-23 19:05:16 -05:00
if securitySettings := internet.SecuritySettingsFromContext(ctx); securitySettings != nil {
2017-04-20 05:00:15 -04:00
tlsConfig, ok := securitySettings.(*tls.Config)
2016-10-16 08:22:21 -04:00
if ok {
l.tlsConfig = tlsConfig.GetTLSConfig()
}
2016-09-30 10:53:40 -04:00
}
2016-11-02 17:26:21 -04:00
if tcpSettings.HeaderSettings != nil {
headerConfig, err := tcpSettings.HeaderSettings.GetInstance()
if err != nil {
2017-04-09 07:30:46 -04:00
return nil, newError("invalid header settings").Base(err).AtError()
2016-11-02 17:26:21 -04:00
}
2017-01-12 16:47:10 -05:00
auth, err := internet.CreateConnectionAuthenticator(headerConfig)
2016-11-02 17:26:21 -04:00
if err != nil {
2017-04-09 07:30:46 -04:00
return nil, newError("invalid header settings.").Base(err).AtError()
2016-11-02 17:26:21 -04:00
}
l.authConfig = auth
}
2016-06-14 16:54:08 -04:00
go l.KeepAccepting()
return l, nil
}
2016-11-27 15:39:09 -05:00
func (v *TCPListener) KeepAccepting() {
2017-02-27 09:13:22 -05:00
for {
select {
case <-v.ctx.Done():
return
default:
}
var conn net.Conn
err := retry.ExponentialBackoff(5, 200).On(func() error {
rawConn, err := v.listener.Accept()
if err != nil {
return err
}
conn = rawConn
return nil
})
2017-02-26 08:38:41 -05:00
if err != nil {
2017-04-09 07:30:46 -04:00
log.Trace(newError("failed to accepted raw connections").Base(err).AtWarning())
2017-02-26 08:38:41 -05:00
continue
}
2017-02-26 08:38:41 -05:00
if v.tlsConfig != nil {
2016-11-27 15:39:09 -05:00
conn = tls.Server(conn, v.tlsConfig)
2016-10-31 19:41:46 -04:00
}
2017-02-26 08:38:41 -05:00
if v.authConfig != nil {
2016-11-27 15:39:09 -05:00
conn = v.authConfig.Server(conn)
2016-11-02 17:26:21 -04:00
}
2017-05-08 18:01:15 -04:00
v.addConn(context.Background(), internet.Connection(conn))
2016-06-14 16:54:08 -04:00
}
}
2016-11-27 15:39:09 -05:00
func (v *TCPListener) Addr() net.Addr {
return v.listener.Addr()
2016-06-14 16:54:08 -04:00
}
2016-11-27 15:39:09 -05:00
func (v *TCPListener) Close() error {
2017-04-20 08:37:53 -04:00
return v.listener.Close()
2016-06-14 16:54:08 -04:00
}
func init() {
common.Must(internet.RegisterTransportListener(internet.TransportProtocol_TCP, ListenTCP))
2016-06-14 16:54:08 -04:00
}