1
0
mirror of https://github.com/v2fly/v2ray-core.git synced 2024-07-21 12:44:17 -04:00
v2fly/transport/internet/kcp/listener.go
2016-08-07 15:31:24 +02:00

185 lines
4.1 KiB
Go

package kcp
import (
"net"
"sync"
"time"
"github.com/v2ray/v2ray-core/common/alloc"
"github.com/v2ray/v2ray-core/common/log"
v2net "github.com/v2ray/v2ray-core/common/net"
"github.com/v2ray/v2ray-core/common/serial"
"github.com/v2ray/v2ray-core/transport/internet"
"github.com/v2ray/v2ray-core/transport/internet/udp"
)
// Listener defines a server listening for connections
type Listener struct {
sync.Mutex
running bool
authenticator internet.Authenticator
sessions map[string]*Connection
awaitingConns chan *Connection
hub *udp.UDPHub
localAddr *net.UDPAddr
}
func NewListener(address v2net.Address, port v2net.Port) (*Listener, error) {
auth, err := effectiveConfig.GetAuthenticator()
if err != nil {
return nil, err
}
l := &Listener{
authenticator: auth,
sessions: make(map[string]*Connection),
awaitingConns: make(chan *Connection, 64),
localAddr: &net.UDPAddr{
IP: address.IP(),
Port: int(port),
},
running: true,
}
hub, err := udp.ListenUDP(address, port, l.OnReceive)
if err != nil {
return nil, err
}
l.hub = hub
log.Info("KCP|Listener: listening on ", address, ":", port)
return l, nil
}
func (this *Listener) OnReceive(payload *alloc.Buffer, src v2net.Destination) {
defer payload.Release()
if valid := this.authenticator.Open(payload); !valid {
log.Info("KCP|Listener: discarding invalid payload from ", src)
return
}
if !this.running {
return
}
this.Lock()
defer this.Unlock()
if !this.running {
return
}
if payload.Len() < 4 {
return
}
conv := serial.BytesToUint16(payload.Value)
cmd := Command(payload.Value[2])
sourceId := src.NetAddr() + "|" + serial.Uint16ToString(conv)
conn, found := this.sessions[sourceId]
if !found {
if cmd == CommandTerminate {
return
}
log.Debug("KCP|Listener: Creating session with id(", sourceId, ") from ", src)
writer := &Writer{
id: sourceId,
hub: this.hub,
dest: src,
listener: this,
}
srcAddr := &net.UDPAddr{
IP: src.Address().IP(),
Port: int(src.Port()),
}
auth, err := effectiveConfig.GetAuthenticator()
if err != nil {
log.Error("KCP|Listener: Failed to create authenticator: ", err)
}
conn = NewConnection(conv, writer, this.localAddr, srcAddr, auth)
select {
case this.awaitingConns <- conn:
case <-time.After(time.Second * 5):
conn.Close()
return
}
this.sessions[sourceId] = conn
}
conn.Input(payload.Value)
}
func (this *Listener) Remove(dest string) {
if !this.running {
return
}
this.Lock()
defer this.Unlock()
if !this.running {
return
}
log.Debug("KCP|Listener: Removing session ", dest)
delete(this.sessions, dest)
}
// Accept implements the Accept method in the Listener interface; it waits for the next call and returns a generic Conn.
func (this *Listener) Accept() (internet.Connection, error) {
for {
if !this.running {
return nil, ErrClosedListener
}
select {
case conn := <-this.awaitingConns:
return conn, nil
case <-time.After(time.Second):
}
}
}
// Close stops listening on the UDP address. Already Accepted connections are not closed.
func (this *Listener) Close() error {
if !this.running {
return ErrClosedListener
}
this.Lock()
defer this.Unlock()
this.running = false
close(this.awaitingConns)
for _, conn := range this.sessions {
go conn.Terminate()
}
this.hub.Close()
return nil
}
func (this *Listener) ActiveConnections() int {
this.Lock()
defer this.Unlock()
return len(this.sessions)
}
// Addr returns the listener's network address, The Addr returned is shared by all invocations of Addr, so do not modify it.
func (this *Listener) Addr() net.Addr {
return this.localAddr
}
type Writer struct {
id string
dest v2net.Destination
hub *udp.UDPHub
listener *Listener
}
func (this *Writer) Write(payload []byte) (int, error) {
return this.hub.WriteTo(payload, this.dest)
}
func (this *Writer) Close() error {
this.listener.Remove(this.id)
return nil
}
func ListenKCP(address v2net.Address, port v2net.Port) (internet.Listener, error) {
return NewListener(address, port)
}
func init() {
internet.KCPListenFunc = ListenKCP
}