2020-11-25 11:01:53 +00:00
|
|
|
package tcp
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
gotls "crypto/tls"
|
|
|
|
"strings"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
goxtls "github.com/xtls/go"
|
2020-12-04 01:36:16 +00:00
|
|
|
"github.com/xtls/xray-core/common"
|
|
|
|
"github.com/xtls/xray-core/common/net"
|
|
|
|
"github.com/xtls/xray-core/common/session"
|
|
|
|
"github.com/xtls/xray-core/transport/internet"
|
2021-12-15 00:28:47 +00:00
|
|
|
"github.com/xtls/xray-core/transport/internet/stat"
|
2020-12-04 01:36:16 +00:00
|
|
|
"github.com/xtls/xray-core/transport/internet/tls"
|
|
|
|
"github.com/xtls/xray-core/transport/internet/xtls"
|
2020-11-25 11:01:53 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
// Listener is an internet.Listener that listens for TCP connections.
|
|
|
|
type Listener struct {
|
|
|
|
listener net.Listener
|
|
|
|
tlsConfig *gotls.Config
|
|
|
|
xtlsConfig *goxtls.Config
|
|
|
|
authConfig internet.ConnectionAuthenticator
|
|
|
|
config *Config
|
|
|
|
addConn internet.ConnHandler
|
|
|
|
locker *internet.FileLocker // for unix domain socket
|
|
|
|
}
|
|
|
|
|
|
|
|
// ListenTCP creates a new Listener based on configurations.
|
|
|
|
func ListenTCP(ctx context.Context, address net.Address, port net.Port, streamSettings *internet.MemoryStreamConfig, handler internet.ConnHandler) (internet.Listener, error) {
|
|
|
|
l := &Listener{
|
|
|
|
addConn: handler,
|
|
|
|
}
|
|
|
|
tcpSettings := streamSettings.ProtocolSettings.(*Config)
|
|
|
|
l.config = tcpSettings
|
|
|
|
if l.config != nil {
|
|
|
|
if streamSettings.SocketSettings == nil {
|
|
|
|
streamSettings.SocketSettings = &internet.SocketConfig{}
|
|
|
|
}
|
2022-05-18 07:29:01 +00:00
|
|
|
streamSettings.SocketSettings.AcceptProxyProtocol = l.config.AcceptProxyProtocol || streamSettings.SocketSettings.AcceptProxyProtocol
|
2020-11-25 11:01:53 +00:00
|
|
|
}
|
|
|
|
var listener net.Listener
|
|
|
|
var err error
|
2021-10-19 16:57:14 +00:00
|
|
|
if port == net.Port(0) { // unix
|
2020-11-25 11:01:53 +00:00
|
|
|
listener, err = internet.ListenSystem(ctx, &net.UnixAddr{
|
|
|
|
Name: address.Domain(),
|
|
|
|
Net: "unix",
|
|
|
|
}, streamSettings.SocketSettings)
|
|
|
|
if err != nil {
|
2020-12-24 19:45:35 +00:00
|
|
|
return nil, newError("failed to listen Unix Domain Socket on ", address).Base(err)
|
2020-11-25 11:01:53 +00:00
|
|
|
}
|
|
|
|
newError("listening Unix Domain Socket on ", address).WriteToLog(session.ExportIDToError(ctx))
|
|
|
|
locker := ctx.Value(address.Domain())
|
|
|
|
if locker != nil {
|
|
|
|
l.locker = locker.(*internet.FileLocker)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
listener, err = internet.ListenSystem(ctx, &net.TCPAddr{
|
|
|
|
IP: address.IP(),
|
|
|
|
Port: int(port),
|
|
|
|
}, streamSettings.SocketSettings)
|
|
|
|
if err != nil {
|
|
|
|
return nil, newError("failed to listen TCP on ", address, ":", port).Base(err)
|
|
|
|
}
|
|
|
|
newError("listening TCP on ", address, ":", port).WriteToLog(session.ExportIDToError(ctx))
|
|
|
|
}
|
|
|
|
|
|
|
|
if streamSettings.SocketSettings != nil && streamSettings.SocketSettings.AcceptProxyProtocol {
|
|
|
|
newError("accepting PROXY protocol").AtWarning().WriteToLog(session.ExportIDToError(ctx))
|
|
|
|
}
|
|
|
|
|
|
|
|
l.listener = listener
|
|
|
|
|
|
|
|
if config := tls.ConfigFromStreamSettings(streamSettings); config != nil {
|
2021-02-18 11:50:09 +00:00
|
|
|
l.tlsConfig = config.GetTLSConfig()
|
2020-11-25 11:01:53 +00:00
|
|
|
}
|
|
|
|
if config := xtls.ConfigFromStreamSettings(streamSettings); config != nil {
|
2021-02-18 11:50:09 +00:00
|
|
|
l.xtlsConfig = config.GetXTLSConfig()
|
2020-11-25 11:01:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if tcpSettings.HeaderSettings != nil {
|
|
|
|
headerConfig, err := tcpSettings.HeaderSettings.GetInstance()
|
|
|
|
if err != nil {
|
|
|
|
return nil, newError("invalid header settings").Base(err).AtError()
|
|
|
|
}
|
|
|
|
auth, err := internet.CreateConnectionAuthenticator(headerConfig)
|
|
|
|
if err != nil {
|
|
|
|
return nil, newError("invalid header settings.").Base(err).AtError()
|
|
|
|
}
|
|
|
|
l.authConfig = auth
|
|
|
|
}
|
|
|
|
|
|
|
|
go l.keepAccepting()
|
|
|
|
return l, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (v *Listener) keepAccepting() {
|
|
|
|
for {
|
|
|
|
conn, err := v.listener.Accept()
|
|
|
|
if err != nil {
|
|
|
|
errStr := err.Error()
|
|
|
|
if strings.Contains(errStr, "closed") {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
newError("failed to accepted raw connections").Base(err).AtWarning().WriteToLog()
|
|
|
|
if strings.Contains(errStr, "too many") {
|
|
|
|
time.Sleep(time.Millisecond * 500)
|
|
|
|
}
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
if v.tlsConfig != nil {
|
|
|
|
conn = tls.Server(conn, v.tlsConfig)
|
|
|
|
} else if v.xtlsConfig != nil {
|
|
|
|
conn = xtls.Server(conn, v.xtlsConfig)
|
|
|
|
}
|
|
|
|
if v.authConfig != nil {
|
|
|
|
conn = v.authConfig.Server(conn)
|
|
|
|
}
|
|
|
|
|
2021-09-20 12:11:21 +00:00
|
|
|
v.addConn(stat.Connection(conn))
|
2020-11-25 11:01:53 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Addr implements internet.Listener.Addr.
|
|
|
|
func (v *Listener) Addr() net.Addr {
|
|
|
|
return v.listener.Addr()
|
|
|
|
}
|
|
|
|
|
|
|
|
// Close implements internet.Listener.Close.
|
|
|
|
func (v *Listener) Close() error {
|
|
|
|
if v.locker != nil {
|
|
|
|
v.locker.Release()
|
|
|
|
}
|
|
|
|
return v.listener.Close()
|
|
|
|
}
|
|
|
|
|
|
|
|
func init() {
|
|
|
|
common.Must(internet.RegisterTransportListener(protocolName, ListenTCP))
|
|
|
|
}
|