1
0
mirror of https://github.com/v2fly/v2ray-core.git synced 2024-08-26 22:34:20 -04:00
v2fly/transport/internet/kcp/dialer.go

153 lines
3.3 KiB
Go
Raw Normal View History

2016-06-14 16:54:08 -04:00
package kcp
import (
"context"
2017-01-13 18:27:45 -05:00
"crypto/cipher"
2016-09-30 10:53:40 -04:00
"crypto/tls"
2016-11-27 02:58:31 -05:00
"sync"
2016-07-12 12:54:16 -04:00
"sync/atomic"
2016-12-08 10:27:41 -05:00
2017-02-10 10:42:24 -05:00
"v2ray.com/core/app/log"
2017-01-03 09:16:48 -05:00
"v2ray.com/core/common"
2016-12-09 05:35:27 -05:00
"v2ray.com/core/common/buf"
2016-08-20 14:55:45 -04:00
"v2ray.com/core/common/dice"
"v2ray.com/core/common/net"
2016-08-20 14:55:45 -04:00
"v2ray.com/core/transport/internet"
2016-09-30 10:53:40 -04:00
v2tls "v2ray.com/core/transport/internet/tls"
2016-06-14 16:54:08 -04:00
)
2016-07-12 12:54:16 -04:00
var (
2017-04-27 05:54:15 -04:00
globalConv = uint32(dice.RollUint16())
2016-07-12 12:54:16 -04:00
)
2016-11-27 02:58:31 -05:00
type ClientConnection struct {
2016-12-08 10:27:41 -05:00
sync.RWMutex
2016-11-27 02:58:31 -05:00
net.Conn
2016-12-08 10:27:41 -05:00
input func([]Segment)
reader PacketReader
writer PacketWriter
}
2017-04-13 16:17:58 -04:00
func (c *ClientConnection) Overhead() int {
c.RLock()
defer c.RUnlock()
if c.writer == nil {
2016-12-08 10:27:41 -05:00
return 0
}
2017-04-13 16:17:58 -04:00
return c.writer.Overhead()
2016-12-08 10:27:41 -05:00
}
2017-04-21 09:36:05 -04:00
// Write implements io.Writer.
2017-04-13 16:17:58 -04:00
func (c *ClientConnection) Write(b []byte) (int, error) {
c.RLock()
defer c.RUnlock()
2016-12-08 10:27:41 -05:00
2017-04-13 16:17:58 -04:00
if c.writer == nil {
2016-12-08 10:27:41 -05:00
return len(b), nil
}
2017-04-13 16:17:58 -04:00
return c.writer.Write(b)
2016-11-27 02:58:31 -05:00
}
2017-04-13 16:17:58 -04:00
func (*ClientConnection) Read([]byte) (int, error) {
2016-11-27 02:58:31 -05:00
panic("KCP|ClientConnection: Read should not be called.")
}
2017-04-13 16:17:58 -04:00
func (c *ClientConnection) Close() error {
return c.Conn.Close()
2016-11-27 02:58:31 -05:00
}
2017-04-13 16:17:58 -04:00
func (c *ClientConnection) Reset(inputCallback func([]Segment)) {
c.Lock()
c.input = inputCallback
c.Unlock()
2016-12-08 10:27:41 -05:00
}
2017-04-13 16:17:58 -04:00
func (c *ClientConnection) ResetSecurity(header internet.PacketHeader, security cipher.AEAD) {
c.Lock()
if c.reader == nil {
c.reader = new(KCPPacketReader)
2016-12-08 10:27:41 -05:00
}
2017-04-13 16:17:58 -04:00
c.reader.(*KCPPacketReader).Header = header
c.reader.(*KCPPacketReader).Security = security
if c.writer == nil {
c.writer = new(KCPPacketWriter)
2016-12-08 10:27:41 -05:00
}
2017-04-13 16:17:58 -04:00
c.writer.(*KCPPacketWriter).Header = header
c.writer.(*KCPPacketWriter).Security = security
c.writer.(*KCPPacketWriter).Writer = c.Conn
2016-12-08 10:27:41 -05:00
2017-04-13 16:17:58 -04:00
c.Unlock()
2016-11-27 02:58:31 -05:00
}
2017-04-13 16:17:58 -04:00
func (c *ClientConnection) Run() {
2017-04-15 15:19:21 -04:00
payload := buf.New()
2016-11-27 02:58:31 -05:00
defer payload.Release()
for {
2017-04-13 16:17:58 -04:00
err := payload.Reset(buf.ReadFrom(c.Conn))
2016-11-27 02:58:31 -05:00
if err != nil {
payload.Release()
return
}
2017-04-13 16:17:58 -04:00
c.RLock()
if c.input != nil {
segments := c.reader.Read(payload.Bytes())
2016-12-08 10:27:41 -05:00
if len(segments) > 0 {
2017-04-13 16:17:58 -04:00
c.input(segments)
2016-12-08 10:27:41 -05:00
}
2016-11-27 02:58:31 -05:00
}
2017-04-13 16:17:58 -04:00
c.RUnlock()
2016-11-27 02:58:31 -05:00
}
}
func DialKCP(ctx context.Context, dest net.Destination) (internet.Connection, error) {
dest.Network = net.Network_UDP
2017-04-09 07:30:46 -04:00
log.Trace(newError("dialing mKCP to ", dest))
2016-11-27 02:58:31 -05:00
src := internet.DialerSourceFromContext(ctx)
rawConn, err := internet.DialSystem(ctx, src, dest)
if err != nil {
2017-04-14 08:58:32 -04:00
return nil, newError("failed to dial to dest: ", err).AtWarning().Base(err)
}
conn := &ClientConnection{
Conn: rawConn,
2016-06-14 16:54:08 -04:00
}
go conn.Run()
2016-06-14 18:30:11 -04:00
kcpSettings := internet.TransportSettingsFromContext(ctx).(*Config)
2016-10-02 17:43:58 -04:00
2016-12-08 10:27:41 -05:00
header, err := kcpSettings.GetPackerHeader()
2016-08-06 15:59:22 -04:00
if err != nil {
2017-04-09 07:30:46 -04:00
return nil, newError("failed to create packet header").Base(err)
2016-12-08 10:27:41 -05:00
}
security, err := kcpSettings.GetSecurity()
if err != nil {
2017-04-09 07:30:46 -04:00
return nil, newError("failed to create security").Base(err)
2016-08-06 15:59:22 -04:00
}
conn.ResetSecurity(header, security)
2016-07-12 12:54:16 -04:00
conv := uint16(atomic.AddUint32(&globalConv, 1))
session := NewConnection(conv, conn, kcpSettings)
2016-06-17 10:51:41 -04:00
2016-09-30 10:53:40 -04:00
var iConn internet.Connection
iConn = session
if securitySettings := internet.SecuritySettingsFromContext(ctx); securitySettings != nil {
2016-10-16 08:22:21 -04:00
switch securitySettings := securitySettings.(type) {
case *v2tls.Config:
if dest.Address.Family().IsDomain() {
2017-10-26 05:43:02 -04:00
securitySettings.OverrideServerNameIfEmpty(dest.Address.Domain())
2016-10-16 08:22:21 -04:00
}
2017-10-26 05:43:02 -04:00
config := securitySettings.GetTLSConfig()
2016-12-20 07:03:20 -05:00
tlsConn := tls.Client(iConn, config)
iConn = tlsConn
2016-09-30 10:53:40 -04:00
}
}
return iConn, nil
2016-06-14 16:54:08 -04:00
}
func init() {
common.Must(internet.RegisterTransportDialer(internet.TransportProtocol_MKCP, DialKCP))
2016-06-14 16:54:08 -04:00
}