mirror of
https://github.com/openp2p-cn/openp2p.git
synced 2025-10-05 16:47:32 +08:00
140 lines
3.7 KiB
Go
140 lines
3.7 KiB
Go
package openp2p
|
|
|
|
import (
|
|
"context"
|
|
"crypto/rand"
|
|
"crypto/rsa"
|
|
"crypto/tls"
|
|
"crypto/x509"
|
|
"encoding/pem"
|
|
"fmt"
|
|
"math/big"
|
|
"net"
|
|
"sync"
|
|
"time"
|
|
|
|
"github.com/quic-go/quic-go"
|
|
)
|
|
|
|
// quic.DialContext do not support version 44,disable it
|
|
var quicVersion []quic.VersionNumber
|
|
|
|
type underlayQUIC struct {
|
|
listener quic.Listener
|
|
writeMtx *sync.Mutex
|
|
quic.Stream
|
|
quic.Connection
|
|
}
|
|
|
|
func (conn *underlayQUIC) Protocol() string {
|
|
return "quic"
|
|
}
|
|
|
|
func (conn *underlayQUIC) ReadBuffer() (*openP2PHeader, []byte, error) {
|
|
return DefaultReadBuffer(conn)
|
|
}
|
|
|
|
func (conn *underlayQUIC) WriteBytes(mainType uint16, subType uint16, data []byte) error {
|
|
return DefaultWriteBytes(conn, mainType, subType, data)
|
|
}
|
|
|
|
func (conn *underlayQUIC) WriteBuffer(data []byte) error {
|
|
return DefaultWriteBuffer(conn, data)
|
|
}
|
|
|
|
func (conn *underlayQUIC) WriteMessage(mainType uint16, subType uint16, packet interface{}) error {
|
|
return DefaultWriteMessage(conn, mainType, subType, packet)
|
|
}
|
|
|
|
func (conn *underlayQUIC) Close() error {
|
|
conn.Stream.CancelRead(1)
|
|
conn.Connection.CloseWithError(0, "")
|
|
conn.CloseListener()
|
|
return nil
|
|
}
|
|
func (conn *underlayQUIC) WLock() {
|
|
conn.writeMtx.Lock()
|
|
}
|
|
func (conn *underlayQUIC) WUnlock() {
|
|
conn.writeMtx.Unlock()
|
|
}
|
|
func (conn *underlayQUIC) CloseListener() {
|
|
if conn.listener != nil {
|
|
conn.listener.Close()
|
|
}
|
|
}
|
|
|
|
func (conn *underlayQUIC) Accept() error {
|
|
ctx, cancel := context.WithTimeout(context.Background(), UnderlayConnectTimeout)
|
|
defer cancel()
|
|
sess, err := conn.listener.Accept(ctx)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
stream, err := sess.AcceptStream(context.Background())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
conn.Stream = stream
|
|
conn.Connection = sess
|
|
return nil
|
|
}
|
|
|
|
func listenQuic(addr string, idleTimeout time.Duration) (*underlayQUIC, error) {
|
|
gLog.Println(LvDEBUG, "quic listen on ", addr)
|
|
listener, err := quic.ListenAddr(addr, generateTLSConfig(),
|
|
&quic.Config{Versions: quicVersion, MaxIdleTimeout: idleTimeout, DisablePathMTUDiscovery: true})
|
|
if err != nil {
|
|
return nil, fmt.Errorf("quic.ListenAddr error:%s", err)
|
|
}
|
|
ul := &underlayQUIC{listener: listener, writeMtx: &sync.Mutex{}}
|
|
err = ul.Accept()
|
|
if err != nil {
|
|
ul.CloseListener()
|
|
return nil, fmt.Errorf("accept quic error:%s", err)
|
|
}
|
|
return ul, nil
|
|
}
|
|
|
|
func dialQuic(conn *net.UDPConn, remoteAddr *net.UDPAddr, idleTimeout time.Duration) (*underlayQUIC, error) {
|
|
tlsConf := &tls.Config{
|
|
InsecureSkipVerify: true,
|
|
NextProtos: []string{"openp2pv1"},
|
|
}
|
|
Connection, err := quic.DialContext(context.Background(), conn, remoteAddr, conn.LocalAddr().String(), tlsConf,
|
|
&quic.Config{Versions: quicVersion, MaxIdleTimeout: idleTimeout, DisablePathMTUDiscovery: true})
|
|
if err != nil {
|
|
return nil, fmt.Errorf("quic.DialContext error:%s", err)
|
|
}
|
|
stream, err := Connection.OpenStreamSync(context.Background())
|
|
if err != nil {
|
|
return nil, fmt.Errorf("OpenStreamSync error:%s", err)
|
|
}
|
|
qConn := &underlayQUIC{nil, &sync.Mutex{}, stream, Connection}
|
|
return qConn, nil
|
|
}
|
|
|
|
// Setup a bare-bones TLS config for the server
|
|
func generateTLSConfig() *tls.Config {
|
|
key, err := rsa.GenerateKey(rand.Reader, 1024)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
template := x509.Certificate{SerialNumber: big.NewInt(1)}
|
|
certDER, err := x509.CreateCertificate(rand.Reader, &template, &template, &key.PublicKey, key)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
keyPEM := pem.EncodeToMemory(&pem.Block{Type: "RSA PRIVATE KEY", Bytes: x509.MarshalPKCS1PrivateKey(key)})
|
|
certPEM := pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: certDER})
|
|
|
|
tlsCert, err := tls.X509KeyPair(certPEM, keyPEM)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
return &tls.Config{
|
|
Certificates: []tls.Certificate{tlsCert},
|
|
NextProtos: []string{"openp2pv1"},
|
|
}
|
|
}
|