1
0
mirror of https://github.com/v2fly/v2ray-core.git synced 2024-06-29 02:35:23 +00:00
v2fly/transport/internet/kcp/listener.go

302 lines
6.5 KiB
Go
Raw Normal View History

2016-06-17 14:51:41 +00:00
package kcp
import (
2016-09-30 14:53:40 +00:00
"crypto/tls"
2016-12-08 15:27:41 +00:00
"io"
2016-06-17 14:51:41 +00:00
"net"
"sync"
"time"
2016-12-08 15:27:41 +00:00
"crypto/cipher"
2016-08-20 18:55:45 +00:00
"v2ray.com/core/common/alloc"
2016-12-08 15:27:41 +00:00
"v2ray.com/core/common/errors"
2016-08-20 18:55:45 +00:00
"v2ray.com/core/common/log"
v2net "v2ray.com/core/common/net"
"v2ray.com/core/proxy"
"v2ray.com/core/transport/internet"
2016-11-27 07:58:31 +00:00
"v2ray.com/core/transport/internet/internal"
2016-09-30 14:53:40 +00:00
v2tls "v2ray.com/core/transport/internet/tls"
2016-08-20 18:55:45 +00:00
"v2ray.com/core/transport/internet/udp"
2016-06-17 14:51:41 +00:00
)
2016-11-27 07:58:31 +00:00
type ConnectionId struct {
Remote v2net.Address
Port v2net.Port
Conv uint16
}
type ServerConnection struct {
id internal.ConnectionId
local net.Addr
remote net.Addr
2016-12-08 15:27:41 +00:00
writer PacketWriter
closer io.Closer
}
func (o *ServerConnection) Overhead() int {
return o.writer.Overhead()
2016-11-27 07:58:31 +00:00
}
func (o *ServerConnection) Read([]byte) (int, error) {
panic("KCP|ServerConnection: Read should not be called.")
}
func (o *ServerConnection) Write(b []byte) (int, error) {
return o.writer.Write(b)
}
func (o *ServerConnection) Close() error {
2016-12-08 15:27:41 +00:00
return o.closer.Close()
2016-11-27 07:58:31 +00:00
}
2016-12-08 15:27:41 +00:00
func (o *ServerConnection) Reset(input func([]Segment)) {
2016-11-27 07:58:31 +00:00
}
func (o *ServerConnection) LocalAddr() net.Addr {
return o.local
}
func (o *ServerConnection) RemoteAddr() net.Addr {
return o.remote
}
func (o *ServerConnection) SetDeadline(time.Time) error {
return nil
}
func (o *ServerConnection) SetReadDeadline(time.Time) error {
return nil
}
func (o *ServerConnection) SetWriteDeadline(time.Time) error {
return nil
}
func (o *ServerConnection) Id() internal.ConnectionId {
return o.id
}
2016-06-17 14:51:41 +00:00
// Listener defines a server listening for connections
type Listener struct {
sync.Mutex
running bool
2016-11-27 07:58:31 +00:00
sessions map[ConnectionId]*Connection
2016-06-18 14:34:04 +00:00
awaitingConns chan *Connection
2016-06-17 14:51:41 +00:00
hub *udp.UDPHub
2016-09-30 14:53:40 +00:00
tlsConfig *tls.Config
2016-10-02 21:43:58 +00:00
config *Config
2016-12-08 15:27:41 +00:00
reader PacketReader
header internet.PacketHeader
security cipher.AEAD
2016-06-17 14:51:41 +00:00
}
2016-09-30 14:53:40 +00:00
func NewListener(address v2net.Address, port v2net.Port, options internet.ListenOptions) (*Listener, error) {
2016-10-02 21:43:58 +00:00
networkSettings, err := options.Stream.GetEffectiveNetworkSettings()
if err != nil {
log.Error("KCP|Listener: Failed to get KCP settings: ", err)
return nil, err
}
kcpSettings := networkSettings.(*Config)
2016-11-27 08:02:27 +00:00
kcpSettings.ConnectionReuse = &ConnectionReuse{Enable: false}
2016-10-02 21:43:58 +00:00
2016-12-08 15:27:41 +00:00
header, err := kcpSettings.GetPackerHeader()
2016-08-06 19:59:22 +00:00
if err != nil {
2016-12-08 15:27:41 +00:00
return nil, errors.Base(err).Message("KCP|Listener: Failed to create packet header.")
}
security, err := kcpSettings.GetSecurity()
if err != nil {
return nil, errors.Base(err).Message("KCP|Listener: Failed to create security.")
2016-08-06 19:59:22 +00:00
}
2016-06-17 14:51:41 +00:00
l := &Listener{
2016-12-08 15:27:41 +00:00
header: header,
security: security,
reader: &KCPPacketReader{
Header: header,
Security: security,
},
2016-11-27 07:58:31 +00:00
sessions: make(map[ConnectionId]*Connection),
2016-06-18 14:34:04 +00:00
awaitingConns: make(chan *Connection, 64),
2016-08-15 20:20:16 +00:00
running: true,
2016-10-02 21:43:58 +00:00
config: kcpSettings,
2016-06-17 14:51:41 +00:00
}
2016-10-16 12:22:21 +00:00
if options.Stream != nil && options.Stream.HasSecuritySettings() {
2016-10-02 21:43:58 +00:00
securitySettings, err := options.Stream.GetEffectiveSecuritySettings()
if err != nil {
2016-10-16 12:22:21 +00:00
log.Error("KCP|Listener: Failed to get security settings: ", err)
2016-10-02 21:43:58 +00:00
return nil, err
}
2016-10-16 12:22:21 +00:00
switch securitySettings := securitySettings.(type) {
case *v2tls.Config:
l.tlsConfig = securitySettings.GetTLSConfig()
}
2016-09-30 14:53:40 +00:00
}
2016-11-18 20:30:03 +00:00
hub, err := udp.ListenUDP(address, port, udp.ListenOption{Callback: l.OnReceive, Concurrency: 2})
2016-06-17 14:51:41 +00:00
if err != nil {
return nil, err
}
l.hub = hub
2016-06-17 15:38:42 +00:00
log.Info("KCP|Listener: listening on ", address, ":", port)
2016-06-17 14:51:41 +00:00
return l, nil
}
2016-11-27 20:39:09 +00:00
func (v *Listener) OnReceive(payload *alloc.Buffer, session *proxy.SessionInfo) {
2016-06-17 14:51:41 +00:00
defer payload.Release()
2016-08-15 15:44:46 +00:00
src := session.Source
2016-12-08 15:27:41 +00:00
segments := v.reader.Read(payload.Bytes())
if len(segments) == 0 {
2016-06-17 15:38:42 +00:00
log.Info("KCP|Listener: discarding invalid payload from ", src)
2016-06-17 14:51:41 +00:00
return
}
2016-12-08 15:27:41 +00:00
2016-11-27 20:39:09 +00:00
if !v.running {
2016-06-17 14:51:41 +00:00
return
}
2016-11-27 20:39:09 +00:00
v.Lock()
defer v.Unlock()
if !v.running {
2016-06-17 14:51:41 +00:00
return
}
if payload.Len() < 4 {
return
}
2016-12-08 15:27:41 +00:00
conv := segments[0].Conversation()
cmd := segments[0].Command()
2016-11-27 07:58:31 +00:00
id := ConnectionId{
Remote: src.Address,
Port: src.Port,
Conv: conv,
}
2016-11-27 20:39:09 +00:00
conn, found := v.sessions[id]
2016-11-27 07:58:31 +00:00
2016-06-17 14:51:41 +00:00
if !found {
2016-07-14 20:10:37 +00:00
if cmd == CommandTerminate {
return
}
2016-06-17 14:51:41 +00:00
writer := &Writer{
2016-11-27 07:58:31 +00:00
id: id,
2016-11-27 20:39:09 +00:00
hub: v.hub,
2016-06-17 14:51:41 +00:00
dest: src,
2016-11-27 20:39:09 +00:00
listener: v,
2016-06-17 14:51:41 +00:00
}
2016-11-27 07:58:31 +00:00
remoteAddr := &net.UDPAddr{
2016-09-20 09:53:05 +00:00
IP: src.Address.IP(),
Port: int(src.Port),
2016-06-17 14:51:41 +00:00
}
2016-11-27 20:39:09 +00:00
localAddr := v.hub.Addr()
2016-11-27 07:58:31 +00:00
sConn := &ServerConnection{
id: internal.NewConnectionId(v2net.LocalHostIP, src),
local: localAddr,
remote: remoteAddr,
2016-12-08 15:27:41 +00:00
writer: &KCPPacketWriter{
Header: v.header,
Writer: writer,
Security: v.security,
},
closer: writer,
2016-11-27 07:58:31 +00:00
}
2016-12-08 15:27:41 +00:00
conn = NewConnection(conv, sConn, v, v.config)
2016-06-17 14:51:41 +00:00
select {
2016-11-27 20:39:09 +00:00
case v.awaitingConns <- conn:
2016-06-17 14:51:41 +00:00
case <-time.After(time.Second * 5):
conn.Close()
return
}
2016-11-27 20:39:09 +00:00
v.sessions[id] = conn
2016-06-17 14:51:41 +00:00
}
2016-12-08 15:27:41 +00:00
conn.Input(segments)
2016-06-17 14:51:41 +00:00
}
2016-11-27 20:39:09 +00:00
func (v *Listener) Remove(id ConnectionId) {
if !v.running {
2016-06-17 14:51:41 +00:00
return
}
2016-11-27 20:39:09 +00:00
v.Lock()
defer v.Unlock()
if !v.running {
2016-06-17 14:51:41 +00:00
return
}
2016-11-27 20:39:09 +00:00
delete(v.sessions, id)
2016-06-17 14:51:41 +00:00
}
// Accept implements the Accept method in the Listener interface; it waits for the next call and returns a generic Conn.
2016-11-27 20:39:09 +00:00
func (v *Listener) Accept() (internet.Connection, error) {
2016-06-17 14:51:41 +00:00
for {
2016-11-27 20:39:09 +00:00
if !v.running {
2016-08-07 13:31:24 +00:00
return nil, ErrClosedListener
2016-06-17 14:51:41 +00:00
}
select {
2016-11-27 20:39:09 +00:00
case conn, open := <-v.awaitingConns:
2016-10-11 10:24:19 +00:00
if !open {
break
}
2016-11-27 20:39:09 +00:00
if v.tlsConfig != nil {
tlsConn := tls.Server(conn, v.tlsConfig)
2016-09-30 14:53:40 +00:00
return v2tls.NewConnection(tlsConn), nil
}
2016-06-17 14:51:41 +00:00
return conn, nil
case <-time.After(time.Second):
}
}
}
// Close stops listening on the UDP address. Already Accepted connections are not closed.
2016-11-27 20:39:09 +00:00
func (v *Listener) Close() error {
if !v.running {
2016-08-07 13:31:24 +00:00
return ErrClosedListener
2016-06-17 14:51:41 +00:00
}
2016-11-27 20:39:09 +00:00
v.Lock()
defer v.Unlock()
2016-06-17 14:51:41 +00:00
2016-11-27 20:39:09 +00:00
v.running = false
close(v.awaitingConns)
for _, conn := range v.sessions {
2016-06-18 19:18:21 +00:00
go conn.Terminate()
}
2016-11-27 20:39:09 +00:00
v.hub.Close()
2016-06-17 14:51:41 +00:00
return nil
}
2016-11-27 20:39:09 +00:00
func (v *Listener) ActiveConnections() int {
v.Lock()
defer v.Unlock()
2016-07-12 21:54:54 +00:00
2016-11-27 20:39:09 +00:00
return len(v.sessions)
2016-07-12 21:54:54 +00:00
}
2016-06-17 14:51:41 +00:00
// Addr returns the listener's network address, The Addr returned is shared by all invocations of Addr, so do not modify it.
2016-11-27 20:39:09 +00:00
func (v *Listener) Addr() net.Addr {
return v.hub.Addr()
2016-06-17 14:51:41 +00:00
}
2016-11-27 20:39:09 +00:00
func (v *Listener) Put(internal.ConnectionId, net.Conn) {}
2016-11-27 07:58:31 +00:00
2016-06-17 14:51:41 +00:00
type Writer struct {
2016-11-27 07:58:31 +00:00
id ConnectionId
2016-06-17 14:51:41 +00:00
dest v2net.Destination
hub *udp.UDPHub
listener *Listener
}
2016-11-27 20:39:09 +00:00
func (v *Writer) Write(payload []byte) (int, error) {
return v.hub.WriteTo(payload, v.dest)
2016-06-17 14:51:41 +00:00
}
2016-11-27 20:39:09 +00:00
func (v *Writer) Close() error {
v.listener.Remove(v.id)
2016-06-17 14:51:41 +00:00
return nil
}
2016-09-30 14:53:40 +00:00
func ListenKCP(address v2net.Address, port v2net.Port, options internet.ListenOptions) (internet.Listener, error) {
return NewListener(address, port, options)
2016-06-17 14:51:41 +00:00
}
func init() {
internet.KCPListenFunc = ListenKCP
}