| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262 |
- package splithttp
- import (
- "context"
- gotls "crypto/tls"
- "io"
- "net/http"
- "net/url"
- "strconv"
- "sync"
- "time"
- "github.com/quic-go/quic-go"
- "github.com/quic-go/quic-go/http3"
- "github.com/xtls/xray-core/common"
- "github.com/xtls/xray-core/common/buf"
- "github.com/xtls/xray-core/common/errors"
- "github.com/xtls/xray-core/common/net"
- "github.com/xtls/xray-core/common/signal/semaphore"
- "github.com/xtls/xray-core/common/uuid"
- "github.com/xtls/xray-core/transport/internet"
- "github.com/xtls/xray-core/transport/internet/browser_dialer"
- "github.com/xtls/xray-core/transport/internet/stat"
- "github.com/xtls/xray-core/transport/internet/tls"
- "github.com/xtls/xray-core/transport/pipe"
- "golang.org/x/net/http2"
- )
- type dialerConf struct {
- net.Destination
- *internet.MemoryStreamConfig
- }
- var (
- globalDialerMap map[dialerConf]DialerClient
- globalDialerAccess sync.Mutex
- )
- func getHTTPClient(ctx context.Context, dest net.Destination, streamSettings *internet.MemoryStreamConfig) DialerClient {
- if browser_dialer.HasBrowserDialer() {
- return &BrowserDialerClient{}
- }
- globalDialerAccess.Lock()
- defer globalDialerAccess.Unlock()
- if globalDialerMap == nil {
- globalDialerMap = make(map[dialerConf]DialerClient)
- }
- if client, found := globalDialerMap[dialerConf{dest, streamSettings}]; found {
- return client
- }
- tlsConfig := tls.ConfigFromStreamSettings(streamSettings)
- isH2 := tlsConfig != nil && !(len(tlsConfig.NextProtocol) == 1 && tlsConfig.NextProtocol[0] == "http/1.1")
- isH3 := tlsConfig != nil && (len(tlsConfig.NextProtocol) == 1 && tlsConfig.NextProtocol[0] == "h3")
- var gotlsConfig *gotls.Config
- if tlsConfig != nil {
- gotlsConfig = tlsConfig.GetTLSConfig(tls.WithDestination(dest))
- }
- dialContext := func(ctxInner context.Context) (net.Conn, error) {
- conn, err := internet.DialSystem(ctxInner, dest, streamSettings.SocketSettings)
- if err != nil {
- return nil, err
- }
- if gotlsConfig != nil {
- if fingerprint := tls.GetFingerprint(tlsConfig.Fingerprint); fingerprint != nil {
- conn = tls.UClient(conn, gotlsConfig, fingerprint)
- if err := conn.(*tls.UConn).HandshakeContext(ctxInner); err != nil {
- return nil, err
- }
- } else {
- conn = tls.Client(conn, gotlsConfig)
- }
- }
- return conn, nil
- }
- var downloadTransport http.RoundTripper
- var uploadTransport http.RoundTripper
- if isH3 {
- dest.Network = net.Network_UDP
- quicConfig := &quic.Config{
- HandshakeIdleTimeout: 10 * time.Second,
- MaxIdleTimeout: 90 * time.Second,
- KeepAlivePeriod: 3 * time.Second,
- Allow0RTT: true,
- }
- roundTripper := &http3.RoundTripper{
- TLSClientConfig: gotlsConfig,
- QUICConfig: quicConfig,
- Dial: func(ctx context.Context, addr string, tlsCfg *gotls.Config, cfg *quic.Config) (quic.EarlyConnection, error) {
- conn, err := internet.DialSystem(ctx, dest, streamSettings.SocketSettings)
- if err != nil {
- return nil, err
- }
- udpAddr, err := net.ResolveUDPAddr("udp", conn.RemoteAddr().String())
- if err != nil {
- return nil, err
- }
- return quic.DialEarly(ctx, conn.(*internet.PacketConnWrapper).Conn.(*net.UDPConn), udpAddr, tlsCfg, cfg)
- },
- }
- downloadTransport = roundTripper
- uploadTransport = roundTripper
- } else if isH2 {
- downloadTransport = &http2.Transport{
- DialTLSContext: func(ctxInner context.Context, network string, addr string, cfg *gotls.Config) (net.Conn, error) {
- return dialContext(ctxInner)
- },
- IdleConnTimeout: 90 * time.Second,
- }
- uploadTransport = downloadTransport
- } else {
- httpDialContext := func(ctxInner context.Context, network string, addr string) (net.Conn, error) {
- return dialContext(ctxInner)
- }
- downloadTransport = &http.Transport{
- DialTLSContext: httpDialContext,
- DialContext: httpDialContext,
- IdleConnTimeout: 90 * time.Second,
- // chunked transfer download with keepalives is buggy with
- // http.Client and our custom dial context.
- DisableKeepAlives: true,
- }
- // we use uploadRawPool for that
- uploadTransport = nil
- }
- client := &DefaultDialerClient{
- transportConfig: streamSettings.ProtocolSettings.(*Config),
- download: &http.Client{
- Transport: downloadTransport,
- },
- upload: &http.Client{
- Transport: uploadTransport,
- },
- isH2: isH2,
- isH3: isH3,
- uploadRawPool: &sync.Pool{},
- dialUploadConn: dialContext,
- }
- globalDialerMap[dialerConf{dest, streamSettings}] = client
- return client
- }
- func init() {
- common.Must(internet.RegisterTransportDialer(protocolName, Dial))
- }
- func Dial(ctx context.Context, dest net.Destination, streamSettings *internet.MemoryStreamConfig) (stat.Connection, error) {
- errors.LogInfo(ctx, "dialing splithttp to ", dest)
- var requestURL url.URL
- transportConfiguration := streamSettings.ProtocolSettings.(*Config)
- tlsConfig := tls.ConfigFromStreamSettings(streamSettings)
- maxConcurrentUploads := transportConfiguration.GetNormalizedMaxConcurrentUploads()
- maxUploadSize := transportConfiguration.GetNormalizedMaxUploadSize()
- if tlsConfig != nil {
- requestURL.Scheme = "https"
- } else {
- requestURL.Scheme = "http"
- }
- requestURL.Host = transportConfiguration.Host
- if requestURL.Host == "" {
- requestURL.Host = dest.NetAddr()
- }
- requestURL.Path = transportConfiguration.GetNormalizedPath()
- httpClient := getHTTPClient(ctx, dest, streamSettings)
- sessionIdUuid := uuid.New()
- sessionId := sessionIdUuid.String()
- baseURL := requestURL.String() + sessionId
- uploadPipeReader, uploadPipeWriter := pipe.New(pipe.WithSizeLimit(maxUploadSize))
- go func() {
- requestsLimiter := semaphore.New(int(maxConcurrentUploads))
- var requestCounter int64
- // by offloading the uploads into a buffered pipe, multiple conn.Write
- // calls get automatically batched together into larger POST requests.
- // without batching, bandwidth is extremely limited.
- for {
- chunk, err := uploadPipeReader.ReadMultiBuffer()
- if err != nil {
- break
- }
- <-requestsLimiter.Wait()
- seq := requestCounter
- requestCounter += 1
- go func() {
- defer requestsLimiter.Signal()
- err := httpClient.SendUploadRequest(
- context.WithoutCancel(ctx),
- baseURL+"/"+strconv.FormatInt(seq, 10),
- &buf.MultiBufferContainer{MultiBuffer: chunk},
- int64(chunk.Len()),
- )
- if err != nil {
- errors.LogInfoInner(ctx, err, "failed to send upload")
- uploadPipeReader.Interrupt()
- }
- }()
- }
- }()
- lazyRawDownload, remoteAddr, localAddr, err := httpClient.OpenDownload(context.WithoutCancel(ctx), baseURL)
- if err != nil {
- return nil, err
- }
- lazyDownload := &LazyReader{
- CreateReader: func() (io.ReadCloser, error) {
- // skip "ooooooooook" response
- trashHeader := []byte{0}
- for {
- _, err := io.ReadFull(lazyRawDownload, trashHeader)
- if err != nil {
- return nil, errors.New("failed to read initial response").Base(err)
- }
- if trashHeader[0] == 'k' {
- break
- }
- }
- return lazyRawDownload, nil
- },
- }
- // necessary in order to send larger chunks in upload
- bufferedUploadPipeWriter := buf.NewBufferedWriter(uploadPipeWriter)
- bufferedUploadPipeWriter.SetBuffered(false)
- conn := splitConn{
- writer: bufferedUploadPipeWriter,
- reader: lazyDownload,
- remoteAddr: remoteAddr,
- localAddr: localAddr,
- }
- return stat.Connection(&conn), nil
- }
|