2020-11-25 11:01:53 +00:00
|
|
|
package internet
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2021-06-14 12:30:46 +00:00
|
|
|
"os"
|
2020-11-25 11:01:53 +00:00
|
|
|
"runtime"
|
2021-06-14 12:30:46 +00:00
|
|
|
"strconv"
|
|
|
|
"strings"
|
2020-11-25 11:01:53 +00:00
|
|
|
"syscall"
|
2022-07-31 13:55:40 +00:00
|
|
|
"time"
|
2020-11-25 11:01:53 +00:00
|
|
|
|
|
|
|
"github.com/pires/go-proxyproto"
|
2020-12-04 01:36:16 +00:00
|
|
|
"github.com/xtls/xray-core/common/net"
|
|
|
|
"github.com/xtls/xray-core/common/session"
|
2020-11-25 11:01:53 +00:00
|
|
|
)
|
|
|
|
|
2021-10-19 16:57:14 +00:00
|
|
|
var effectiveListener = DefaultListener{}
|
2020-11-25 11:01:53 +00:00
|
|
|
|
|
|
|
type controller func(network, address string, fd uintptr) error
|
|
|
|
|
|
|
|
type DefaultListener struct {
|
|
|
|
controllers []controller
|
|
|
|
}
|
|
|
|
|
|
|
|
func getControlFunc(ctx context.Context, sockopt *SocketConfig, controllers []controller) func(network, address string, c syscall.RawConn) error {
|
|
|
|
return func(network, address string, c syscall.RawConn) error {
|
|
|
|
return c.Control(func(fd uintptr) {
|
|
|
|
if sockopt != nil {
|
|
|
|
if err := applyInboundSocketOptions(network, fd, sockopt); err != nil {
|
|
|
|
newError("failed to apply socket options to incoming connection").Base(err).WriteToLog(session.ExportIDToError(ctx))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
setReusePort(fd)
|
|
|
|
|
|
|
|
for _, controller := range controllers {
|
|
|
|
if err := controller(network, address, fd); err != nil {
|
|
|
|
newError("failed to apply external controller").Base(err).WriteToLog(session.ExportIDToError(ctx))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-06-14 12:30:46 +00:00
|
|
|
func (dl *DefaultListener) Listen(ctx context.Context, addr net.Addr, sockopt *SocketConfig) (l net.Listener, err error) {
|
2020-11-25 11:01:53 +00:00
|
|
|
var lc net.ListenConfig
|
|
|
|
var network, address string
|
2021-06-14 12:30:46 +00:00
|
|
|
|
2020-11-25 11:01:53 +00:00
|
|
|
switch addr := addr.(type) {
|
|
|
|
case *net.TCPAddr:
|
|
|
|
network = addr.Network()
|
|
|
|
address = addr.String()
|
|
|
|
lc.Control = getControlFunc(ctx, sockopt, dl.controllers)
|
2022-11-11 06:20:19 +00:00
|
|
|
if sockopt != nil && (sockopt.TcpKeepAliveInterval != 0 || sockopt.TcpKeepAliveIdle != 0) {
|
2022-07-31 13:55:40 +00:00
|
|
|
lc.KeepAlive = time.Duration(-1)
|
|
|
|
}
|
2020-11-25 11:01:53 +00:00
|
|
|
case *net.UnixAddr:
|
|
|
|
lc.Control = nil
|
|
|
|
network = addr.Network()
|
|
|
|
address = addr.Name
|
2021-06-14 12:30:46 +00:00
|
|
|
|
|
|
|
if s := strings.Split(address, ","); len(s) == 2 {
|
|
|
|
address = s[0]
|
|
|
|
perm, perr := strconv.ParseUint(s[1], 8, 32)
|
|
|
|
if perr != nil {
|
|
|
|
return nil, newError("failed to parse permission: " + s[1]).Base(perr)
|
|
|
|
}
|
|
|
|
|
|
|
|
defer func(file string, permission os.FileMode) {
|
|
|
|
if err == nil {
|
|
|
|
cerr := os.Chmod(address, permission)
|
|
|
|
if cerr != nil {
|
|
|
|
err = newError("failed to set permission for " + file).Base(cerr)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}(address, os.FileMode(perm))
|
|
|
|
}
|
|
|
|
|
2020-12-24 19:45:35 +00:00
|
|
|
if (runtime.GOOS == "linux" || runtime.GOOS == "android") && address[0] == '@' {
|
2020-11-25 11:01:53 +00:00
|
|
|
// linux abstract unix domain socket is lockfree
|
|
|
|
if len(address) > 1 && address[1] == '@' {
|
|
|
|
// but may need padding to work with haproxy
|
|
|
|
fullAddr := make([]byte, len(syscall.RawSockaddrUnix{}.Path))
|
|
|
|
copy(fullAddr, address[1:])
|
|
|
|
address = string(fullAddr)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
// normal unix domain socket needs lock
|
|
|
|
locker := &FileLocker{
|
|
|
|
path: address + ".lock",
|
|
|
|
}
|
|
|
|
err := locker.Acquire()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
ctx = context.WithValue(ctx, address, locker)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
l, err = lc.Listen(ctx, network, address)
|
|
|
|
if sockopt != nil && sockopt.AcceptProxyProtocol {
|
|
|
|
policyFunc := func(upstream net.Addr) (proxyproto.Policy, error) { return proxyproto.REQUIRE, nil }
|
|
|
|
l = &proxyproto.Listener{Listener: l, Policy: policyFunc}
|
|
|
|
}
|
|
|
|
return l, err
|
|
|
|
}
|
|
|
|
|
|
|
|
func (dl *DefaultListener) ListenPacket(ctx context.Context, addr net.Addr, sockopt *SocketConfig) (net.PacketConn, error) {
|
|
|
|
var lc net.ListenConfig
|
|
|
|
|
|
|
|
lc.Control = getControlFunc(ctx, sockopt, dl.controllers)
|
|
|
|
|
|
|
|
return lc.ListenPacket(ctx, addr.Network(), addr.String())
|
|
|
|
}
|
|
|
|
|
|
|
|
// RegisterListenerController adds a controller to the effective system listener.
|
|
|
|
// The controller can be used to operate on file descriptors before they are put into use.
|
|
|
|
//
|
|
|
|
// xray:api:beta
|
|
|
|
func RegisterListenerController(controller func(network, address string, fd uintptr) error) error {
|
|
|
|
if controller == nil {
|
|
|
|
return newError("nil listener controller")
|
|
|
|
}
|
|
|
|
|
|
|
|
effectiveListener.controllers = append(effectiveListener.controllers, controller)
|
|
|
|
return nil
|
|
|
|
}
|