2015-08-06 09:09:01 +00:00
|
|
|
from __future__ import (absolute_import, print_function, division)
|
2015-08-29 21:08:16 +00:00
|
|
|
import socket
|
|
|
|
import select
|
2015-09-10 23:39:33 +00:00
|
|
|
import six
|
|
|
|
import sys
|
2015-08-29 21:08:16 +00:00
|
|
|
|
|
|
|
from OpenSSL import SSL
|
2015-08-14 08:41:11 +00:00
|
|
|
|
2015-09-10 09:33:03 +00:00
|
|
|
from netlib.tcp import NetLibError, ssl_read_select
|
2015-08-29 21:08:16 +00:00
|
|
|
from netlib.utils import cleanBin
|
2015-08-29 23:21:58 +00:00
|
|
|
from ..exceptions import ProtocolException
|
2015-08-30 13:27:29 +00:00
|
|
|
from .base import Layer
|
2015-07-24 16:29:13 +00:00
|
|
|
|
|
|
|
|
2015-08-30 13:27:29 +00:00
|
|
|
class RawTCPLayer(Layer):
|
2015-08-29 21:08:16 +00:00
|
|
|
chunk_size = 4096
|
|
|
|
|
|
|
|
def __init__(self, ctx, logging=True):
|
|
|
|
self.logging = logging
|
2015-08-30 13:27:29 +00:00
|
|
|
super(RawTCPLayer, self).__init__(ctx)
|
2015-08-29 21:08:16 +00:00
|
|
|
|
2015-07-24 16:29:13 +00:00
|
|
|
def __call__(self):
|
2015-08-18 13:59:44 +00:00
|
|
|
self.connect()
|
2015-08-29 21:08:16 +00:00
|
|
|
|
|
|
|
buf = memoryview(bytearray(self.chunk_size))
|
|
|
|
|
|
|
|
client = self.client_conn.connection
|
|
|
|
server = self.server_conn.connection
|
|
|
|
conns = [client, server]
|
|
|
|
|
2015-08-08 14:08:57 +00:00
|
|
|
try:
|
2015-08-29 21:08:16 +00:00
|
|
|
while True:
|
2015-09-10 09:33:03 +00:00
|
|
|
r = ssl_read_select(conns, 10)
|
2015-08-29 21:08:16 +00:00
|
|
|
for conn in r:
|
2015-08-29 23:21:58 +00:00
|
|
|
dst = server if conn == client else client
|
2015-08-29 21:08:16 +00:00
|
|
|
|
|
|
|
size = conn.recv_into(buf, self.chunk_size)
|
|
|
|
if not size:
|
|
|
|
conns.remove(conn)
|
|
|
|
# Shutdown connection to the other peer
|
|
|
|
if isinstance(conn, SSL.Connection):
|
|
|
|
# We can't half-close a connection, so we just close everything here.
|
|
|
|
# Sockets will be cleaned up on a higher level.
|
|
|
|
return
|
|
|
|
else:
|
2015-08-29 23:21:58 +00:00
|
|
|
dst.shutdown(socket.SHUT_WR)
|
2015-08-29 21:08:16 +00:00
|
|
|
|
|
|
|
if len(conns) == 0:
|
|
|
|
return
|
|
|
|
continue
|
|
|
|
|
|
|
|
dst.sendall(buf[:size])
|
2015-08-08 14:08:57 +00:00
|
|
|
|
2015-08-29 21:08:16 +00:00
|
|
|
if self.logging:
|
|
|
|
# log messages are prepended with the client address,
|
|
|
|
# hence the "weird" direction string.
|
|
|
|
if dst == server:
|
2015-08-29 23:21:58 +00:00
|
|
|
direction = "-> tcp -> {}".format(repr(self.server_conn.address))
|
2015-08-29 21:08:16 +00:00
|
|
|
else:
|
2015-08-29 23:21:58 +00:00
|
|
|
direction = "<- tcp <- {}".format(repr(self.server_conn.address))
|
2015-08-29 21:08:16 +00:00
|
|
|
data = cleanBin(buf[:size].tobytes())
|
|
|
|
self.log(
|
|
|
|
"{}\r\n{}".format(direction, data),
|
|
|
|
"info"
|
|
|
|
)
|
2015-07-24 16:29:13 +00:00
|
|
|
|
2015-08-29 21:08:16 +00:00
|
|
|
except (socket.error, NetLibError, SSL.Error) as e:
|
2015-09-10 23:39:33 +00:00
|
|
|
six.reraise(
|
|
|
|
ProtocolException,
|
2015-09-11 00:17:04 +00:00
|
|
|
ProtocolException("TCP connection closed unexpectedly: {}".format(repr(e))),
|
2015-09-10 23:39:33 +00:00
|
|
|
sys.exc_info()[2]
|
|
|
|
)
|