1
0
mirror of https://github.com/v2fly/v2ray-core.git synced 2024-06-29 02:35:23 +00:00
v2fly/transport/internet/kcp/listener.go

210 lines
4.4 KiB
Go
Raw Normal View History

2016-06-17 14:51:41 +00:00
package kcp
import (
2017-02-24 00:05:16 +00:00
"context"
2017-01-13 23:27:45 +00:00
"crypto/cipher"
2016-09-30 14:53:40 +00:00
"crypto/tls"
2016-06-17 14:51:41 +00:00
"sync"
2017-02-10 15:42:24 +00:00
"v2ray.com/core/app/log"
2017-01-03 14:16:48 +00:00
"v2ray.com/core/common"
2016-12-09 10:35:27 +00:00
"v2ray.com/core/common/buf"
"v2ray.com/core/common/net"
2016-08-20 18:55:45 +00:00
"v2ray.com/core/transport/internet"
2016-09-30 14:53:40 +00:00
v2tls "v2ray.com/core/transport/internet/tls"
2016-08-20 18:55:45 +00:00
"v2ray.com/core/transport/internet/udp"
2016-06-17 14:51:41 +00:00
)
2016-12-21 14:37:16 +00:00
type ConnectionID struct {
Remote net.Address
Port net.Port
2016-11-27 07:58:31 +00:00
Conv uint16
}
2016-06-17 14:51:41 +00:00
// Listener defines a server listening for connections
type Listener struct {
sync.Mutex
2017-02-27 14:13:22 +00:00
ctx context.Context
2017-02-26 13:38:41 +00:00
sessions map[ConnectionID]*Connection
hub *udp.Hub
tlsConfig *tls.Config
config *Config
reader PacketReader
header internet.PacketHeader
security cipher.AEAD
2017-05-08 22:01:15 +00:00
addConn internet.AddConnection
2016-06-17 14:51:41 +00:00
}
func NewListener(ctx context.Context, address net.Address, port net.Port, addConn internet.AddConnection) (*Listener, error) {
2017-02-24 00:05:16 +00:00
networkSettings := internet.TransportSettingsFromContext(ctx)
2016-10-02 21:43:58 +00:00
kcpSettings := networkSettings.(*Config)
2016-12-08 15:27:41 +00:00
header, err := kcpSettings.GetPackerHeader()
2016-08-06 19:59:22 +00:00
if err != nil {
2017-04-09 11:30:46 +00:00
return nil, newError("failed to create packet header").Base(err).AtError()
2016-12-08 15:27:41 +00:00
}
security, err := kcpSettings.GetSecurity()
if err != nil {
2017-04-09 11:30:46 +00:00
return nil, newError("failed to create security").Base(err).AtError()
2016-08-06 19:59:22 +00:00
}
2016-06-17 14:51:41 +00:00
l := &Listener{
2016-12-08 15:27:41 +00:00
header: header,
security: security,
reader: &KCPPacketReader{
Header: header,
Security: security,
},
2017-02-26 13:38:41 +00:00
sessions: make(map[ConnectionID]*Connection),
2017-02-27 14:13:22 +00:00
ctx: ctx,
2017-02-26 13:38:41 +00:00
config: kcpSettings,
2017-05-08 22:01:15 +00:00
addConn: addConn,
2016-06-17 14:51:41 +00:00
}
2017-02-24 00:05:16 +00:00
securitySettings := internet.SecuritySettingsFromContext(ctx)
if securitySettings != nil {
2016-10-16 12:22:21 +00:00
switch securitySettings := securitySettings.(type) {
case *v2tls.Config:
l.tlsConfig = securitySettings.GetTLSConfig()
}
2016-09-30 14:53:40 +00:00
}
2016-11-18 20:30:03 +00:00
hub, err := udp.ListenUDP(address, port, udp.ListenOption{Callback: l.OnReceive, Concurrency: 2})
2016-06-17 14:51:41 +00:00
if err != nil {
return nil, err
}
2017-02-17 23:04:25 +00:00
l.Lock()
2016-06-17 14:51:41 +00:00
l.hub = hub
2017-02-17 23:04:25 +00:00
l.Unlock()
2017-04-09 11:30:46 +00:00
log.Trace(newError("listening on ", address, ":", port))
2016-06-17 14:51:41 +00:00
return l, nil
}
func (v *Listener) OnReceive(payload *buf.Buffer, src net.Destination, originalDest net.Destination) {
2016-06-17 14:51:41 +00:00
defer payload.Release()
2016-12-08 15:27:41 +00:00
segments := v.reader.Read(payload.Bytes())
if len(segments) == 0 {
2017-04-09 11:30:46 +00:00
log.Trace(newError("discarding invalid payload from ", src))
2016-06-17 14:51:41 +00:00
return
}
2016-12-08 15:27:41 +00:00
2017-02-27 14:13:22 +00:00
v.Lock()
defer v.Unlock()
2017-02-17 23:04:25 +00:00
select {
2017-02-27 14:13:22 +00:00
case <-v.ctx.Done():
2016-06-17 14:51:41 +00:00
return
2017-02-17 23:04:25 +00:00
default:
2016-06-17 14:51:41 +00:00
}
2017-02-17 23:04:25 +00:00
if v.hub == nil {
2016-06-17 14:51:41 +00:00
return
}
2017-02-27 14:13:22 +00:00
2016-12-08 15:27:41 +00:00
conv := segments[0].Conversation()
cmd := segments[0].Command()
2016-12-21 14:37:16 +00:00
id := ConnectionID{
2016-11-27 07:58:31 +00:00
Remote: src.Address,
Port: src.Port,
Conv: conv,
}
2016-11-27 20:39:09 +00:00
conn, found := v.sessions[id]
2016-11-27 07:58:31 +00:00
2016-06-17 14:51:41 +00:00
if !found {
2016-07-14 20:10:37 +00:00
if cmd == CommandTerminate {
return
}
2016-06-17 14:51:41 +00:00
writer := &Writer{
2016-11-27 07:58:31 +00:00
id: id,
2016-11-27 20:39:09 +00:00
hub: v.hub,
2016-06-17 14:51:41 +00:00
dest: src,
2016-11-27 20:39:09 +00:00
listener: v,
2016-06-17 14:51:41 +00:00
}
2016-11-27 07:58:31 +00:00
remoteAddr := &net.UDPAddr{
2016-09-20 09:53:05 +00:00
IP: src.Address.IP(),
Port: int(src.Port),
2016-06-17 14:51:41 +00:00
}
2016-11-27 20:39:09 +00:00
localAddr := v.hub.Addr()
2017-12-14 22:24:40 +00:00
conn = NewConnection(ConnMetadata{
LocalAddr: localAddr,
RemoteAddr: remoteAddr,
Conversation: conv,
2017-12-03 20:29:27 +00:00
}, &KCPPacketWriter{
Header: v.header,
Security: v.security,
Writer: writer,
}, writer, v.config)
2017-02-26 13:38:41 +00:00
var netConn internet.Connection = conn
if v.tlsConfig != nil {
tlsConn := tls.Server(conn, v.tlsConfig)
netConn = tlsConn
2017-02-26 13:38:41 +00:00
}
2017-05-08 22:01:15 +00:00
if !v.addConn(context.Background(), netConn) {
2016-06-17 14:51:41 +00:00
return
}
2016-11-27 20:39:09 +00:00
v.sessions[id] = conn
2016-06-17 14:51:41 +00:00
}
2016-12-08 15:27:41 +00:00
conn.Input(segments)
2016-06-17 14:51:41 +00:00
}
2016-12-21 14:37:16 +00:00
func (v *Listener) Remove(id ConnectionID) {
2017-02-17 23:04:25 +00:00
select {
2017-02-27 14:13:22 +00:00
case <-v.ctx.Done():
2016-06-17 14:51:41 +00:00
return
2017-02-17 23:04:25 +00:00
default:
v.Lock()
delete(v.sessions, id)
v.Unlock()
2016-06-17 14:51:41 +00:00
}
}
// Close stops listening on the UDP address. Already Accepted connections are not closed.
2016-11-27 20:39:09 +00:00
func (v *Listener) Close() error {
2017-02-27 14:13:22 +00:00
v.hub.Close()
2017-02-17 23:28:50 +00:00
v.Lock()
defer v.Unlock()
2016-06-17 14:51:41 +00:00
2016-11-27 20:39:09 +00:00
for _, conn := range v.sessions {
2016-06-18 19:18:21 +00:00
go conn.Terminate()
}
2016-06-17 14:51:41 +00:00
return nil
}
2016-11-27 20:39:09 +00:00
func (v *Listener) ActiveConnections() int {
v.Lock()
defer v.Unlock()
2016-07-12 21:54:54 +00:00
2016-11-27 20:39:09 +00:00
return len(v.sessions)
2016-07-12 21:54:54 +00:00
}
2016-06-17 14:51:41 +00:00
// Addr returns the listener's network address, The Addr returned is shared by all invocations of Addr, so do not modify it.
2016-11-27 20:39:09 +00:00
func (v *Listener) Addr() net.Addr {
return v.hub.Addr()
2016-06-17 14:51:41 +00:00
}
type Writer struct {
2016-12-21 14:37:16 +00:00
id ConnectionID
dest net.Destination
2016-12-21 14:48:39 +00:00
hub *udp.Hub
2016-06-17 14:51:41 +00:00
listener *Listener
}
2016-11-27 20:39:09 +00:00
func (v *Writer) Write(payload []byte) (int, error) {
return v.hub.WriteTo(payload, v.dest)
2016-06-17 14:51:41 +00:00
}
2016-11-27 20:39:09 +00:00
func (v *Writer) Close() error {
v.listener.Remove(v.id)
2016-06-17 14:51:41 +00:00
return nil
}
func ListenKCP(ctx context.Context, address net.Address, port net.Port, addConn internet.AddConnection) (internet.Listener, error) {
2017-05-08 22:01:15 +00:00
return NewListener(ctx, address, port, addConn)
2016-06-17 14:51:41 +00:00
}
func init() {
common.Must(internet.RegisterTransportListener(internet.TransportProtocol_MKCP, ListenKCP))
2016-06-17 14:51:41 +00:00
}