dialer.go 8.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335
  1. package splithttp
  2. import (
  3. "context"
  4. gotls "crypto/tls"
  5. "io"
  6. gonet "net"
  7. "net/http"
  8. "net/http/httptrace"
  9. "net/url"
  10. "strconv"
  11. "sync"
  12. "time"
  13. "github.com/xtls/xray-core/common"
  14. "github.com/xtls/xray-core/common/buf"
  15. "github.com/xtls/xray-core/common/net"
  16. "github.com/xtls/xray-core/common/session"
  17. "github.com/xtls/xray-core/common/signal/done"
  18. "github.com/xtls/xray-core/common/signal/semaphore"
  19. "github.com/xtls/xray-core/common/uuid"
  20. "github.com/xtls/xray-core/transport/internet"
  21. "github.com/xtls/xray-core/transport/internet/stat"
  22. "github.com/xtls/xray-core/transport/internet/tls"
  23. "github.com/xtls/xray-core/transport/pipe"
  24. "golang.org/x/net/http2"
  25. )
  26. type dialerConf struct {
  27. net.Destination
  28. *internet.MemoryStreamConfig
  29. }
  30. type reusedClient struct {
  31. download *http.Client
  32. upload *http.Client
  33. isH2 bool
  34. // pool of net.Conn, created using dialUploadConn
  35. uploadRawPool *sync.Pool
  36. dialUploadConn func(ctxInner context.Context) (net.Conn, error)
  37. }
  38. var (
  39. globalDialerMap map[dialerConf]reusedClient
  40. globalDialerAccess sync.Mutex
  41. )
  42. func getHTTPClient(ctx context.Context, dest net.Destination, streamSettings *internet.MemoryStreamConfig) reusedClient {
  43. globalDialerAccess.Lock()
  44. defer globalDialerAccess.Unlock()
  45. if globalDialerMap == nil {
  46. globalDialerMap = make(map[dialerConf]reusedClient)
  47. }
  48. if client, found := globalDialerMap[dialerConf{dest, streamSettings}]; found {
  49. return client
  50. }
  51. tlsConfig := tls.ConfigFromStreamSettings(streamSettings)
  52. var gotlsConfig *gotls.Config
  53. if tlsConfig != nil {
  54. gotlsConfig = tlsConfig.GetTLSConfig(tls.WithDestination(dest))
  55. }
  56. dialContext := func(ctxInner context.Context) (net.Conn, error) {
  57. conn, err := internet.DialSystem(ctxInner, dest, streamSettings.SocketSettings)
  58. if err != nil {
  59. return nil, err
  60. }
  61. if gotlsConfig != nil {
  62. if fingerprint := tls.GetFingerprint(tlsConfig.Fingerprint); fingerprint != nil {
  63. conn = tls.UClient(conn, gotlsConfig, fingerprint)
  64. if err := conn.(*tls.UConn).HandshakeContext(ctxInner); err != nil {
  65. return nil, err
  66. }
  67. } else {
  68. conn = tls.Client(conn, gotlsConfig)
  69. }
  70. }
  71. return conn, nil
  72. }
  73. var uploadTransport http.RoundTripper
  74. var downloadTransport http.RoundTripper
  75. if tlsConfig != nil {
  76. downloadTransport = &http2.Transport{
  77. DialTLSContext: func(ctxInner context.Context, network string, addr string, cfg *gotls.Config) (net.Conn, error) {
  78. return dialContext(ctxInner)
  79. },
  80. IdleConnTimeout: 90 * time.Second,
  81. }
  82. uploadTransport = downloadTransport
  83. } else {
  84. httpDialContext := func(ctxInner context.Context, network string, addr string) (net.Conn, error) {
  85. return dialContext(ctxInner)
  86. }
  87. downloadTransport = &http.Transport{
  88. DialTLSContext: httpDialContext,
  89. DialContext: httpDialContext,
  90. IdleConnTimeout: 90 * time.Second,
  91. // chunked transfer download with keepalives is buggy with
  92. // http.Client and our custom dial context.
  93. DisableKeepAlives: true,
  94. }
  95. // we use uploadRawPool for that
  96. uploadTransport = nil
  97. }
  98. client := reusedClient{
  99. download: &http.Client{
  100. Transport: downloadTransport,
  101. },
  102. upload: &http.Client{
  103. Transport: uploadTransport,
  104. },
  105. isH2: tlsConfig != nil,
  106. uploadRawPool: &sync.Pool{},
  107. dialUploadConn: dialContext,
  108. }
  109. globalDialerMap[dialerConf{dest, streamSettings}] = client
  110. return client
  111. }
  112. func init() {
  113. common.Must(internet.RegisterTransportDialer(protocolName, Dial))
  114. }
  115. func Dial(ctx context.Context, dest net.Destination, streamSettings *internet.MemoryStreamConfig) (stat.Connection, error) {
  116. newError("dialing splithttp to ", dest).WriteToLog(session.ExportIDToError(ctx))
  117. var requestURL url.URL
  118. transportConfiguration := streamSettings.ProtocolSettings.(*Config)
  119. tlsConfig := tls.ConfigFromStreamSettings(streamSettings)
  120. maxConcurrentUploads := transportConfiguration.GetNormalizedMaxConcurrentUploads()
  121. maxUploadSize := transportConfiguration.GetNormalizedMaxUploadSize()
  122. if tlsConfig != nil {
  123. requestURL.Scheme = "https"
  124. } else {
  125. requestURL.Scheme = "http"
  126. }
  127. requestURL.Host = transportConfiguration.Host
  128. if requestURL.Host == "" {
  129. requestURL.Host = dest.NetAddr()
  130. }
  131. requestURL.Path = transportConfiguration.GetNormalizedPath()
  132. httpClient := getHTTPClient(ctx, dest, streamSettings)
  133. var remoteAddr gonet.Addr
  134. var localAddr gonet.Addr
  135. // this is done when the TCP/UDP connection to the server was established,
  136. // and we can unblock the Dial function and print correct net addresses in
  137. // logs
  138. gotConn := done.New()
  139. var downResponse io.ReadCloser
  140. gotDownResponse := done.New()
  141. sessionIdUuid := uuid.New()
  142. sessionId := sessionIdUuid.String()
  143. go func() {
  144. trace := &httptrace.ClientTrace{
  145. GotConn: func(connInfo httptrace.GotConnInfo) {
  146. remoteAddr = connInfo.Conn.RemoteAddr()
  147. localAddr = connInfo.Conn.LocalAddr()
  148. gotConn.Close()
  149. },
  150. }
  151. // in case we hit an error, we want to unblock this part
  152. defer gotConn.Close()
  153. req, err := http.NewRequestWithContext(
  154. httptrace.WithClientTrace(context.WithoutCancel(ctx), trace),
  155. "GET",
  156. requestURL.String()+sessionId,
  157. nil,
  158. )
  159. if err != nil {
  160. newError("failed to construct download http request").Base(err).WriteToLog()
  161. gotDownResponse.Close()
  162. return
  163. }
  164. req.Header = transportConfiguration.GetRequestHeader()
  165. response, err := httpClient.download.Do(req)
  166. gotConn.Close()
  167. if err != nil {
  168. newError("failed to send download http request").Base(err).WriteToLog()
  169. gotDownResponse.Close()
  170. return
  171. }
  172. if response.StatusCode != 200 {
  173. response.Body.Close()
  174. newError("invalid status code on download:", response.Status).WriteToLog()
  175. gotDownResponse.Close()
  176. return
  177. }
  178. // skip "ok" response
  179. trashHeader := []byte{0, 0}
  180. _, err = io.ReadFull(response.Body, trashHeader)
  181. if err != nil {
  182. response.Body.Close()
  183. newError("failed to read initial response").Base(err).WriteToLog()
  184. gotDownResponse.Close()
  185. return
  186. }
  187. downResponse = response.Body
  188. gotDownResponse.Close()
  189. }()
  190. uploadUrl := requestURL.String() + sessionId + "/"
  191. uploadPipeReader, uploadPipeWriter := pipe.New(pipe.WithSizeLimit(maxUploadSize))
  192. go func() {
  193. requestsLimiter := semaphore.New(int(maxConcurrentUploads))
  194. var requestCounter int64
  195. // by offloading the uploads into a buffered pipe, multiple conn.Write
  196. // calls get automatically batched together into larger POST requests.
  197. // without batching, bandwidth is extremely limited.
  198. for {
  199. chunk, err := uploadPipeReader.ReadMultiBuffer()
  200. if err != nil {
  201. break
  202. }
  203. <-requestsLimiter.Wait()
  204. url := uploadUrl + strconv.FormatInt(requestCounter, 10)
  205. requestCounter += 1
  206. go func() {
  207. defer requestsLimiter.Signal()
  208. req, err := http.NewRequest("POST", url, &buf.MultiBufferContainer{MultiBuffer: chunk})
  209. if err != nil {
  210. newError("failed to send upload").Base(err).WriteToLog()
  211. uploadPipeReader.Interrupt()
  212. return
  213. }
  214. req.Header = transportConfiguration.GetRequestHeader()
  215. if httpClient.isH2 {
  216. resp, err := httpClient.upload.Do(req)
  217. if err != nil {
  218. newError("failed to send upload").Base(err).WriteToLog()
  219. uploadPipeReader.Interrupt()
  220. return
  221. }
  222. defer resp.Body.Close()
  223. if resp.StatusCode != 200 {
  224. newError("failed to send upload, bad status code:", resp.Status).WriteToLog()
  225. uploadPipeReader.Interrupt()
  226. return
  227. }
  228. } else {
  229. var err error
  230. var uploadConn any
  231. for i := 0; i < 5; i++ {
  232. uploadConn = httpClient.uploadRawPool.Get()
  233. if uploadConn == nil {
  234. uploadConn, err = httpClient.dialUploadConn(context.WithoutCancel(ctx))
  235. if err != nil {
  236. newError("failed to connect upload").Base(err).WriteToLog()
  237. uploadPipeReader.Interrupt()
  238. return
  239. }
  240. }
  241. err = req.Write(uploadConn.(net.Conn))
  242. if err == nil {
  243. break
  244. }
  245. }
  246. if err != nil {
  247. newError("failed to send upload").Base(err).WriteToLog()
  248. uploadPipeReader.Interrupt()
  249. return
  250. }
  251. httpClient.uploadRawPool.Put(uploadConn)
  252. }
  253. }()
  254. }
  255. }()
  256. // we want to block Dial until we know the remote address of the server,
  257. // for logging purposes
  258. <-gotConn.Wait()
  259. // necessary in order to send larger chunks in upload
  260. bufferedUploadPipeWriter := buf.NewBufferedWriter(uploadPipeWriter)
  261. bufferedUploadPipeWriter.SetBuffered(false)
  262. lazyDownload := &LazyReader{
  263. CreateReader: func() (io.ReadCloser, error) {
  264. <-gotDownResponse.Wait()
  265. if downResponse == nil {
  266. return nil, newError("downResponse failed")
  267. }
  268. return downResponse, nil
  269. },
  270. }
  271. conn := splitConn{
  272. writer: bufferedUploadPipeWriter,
  273. reader: lazyDownload,
  274. remoteAddr: remoteAddr,
  275. localAddr: localAddr,
  276. }
  277. return stat.Connection(&conn), nil
  278. }