server.go 4.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160
  1. package v2rayhttp
  2. import (
  3. "context"
  4. "net"
  5. "net/http"
  6. "os"
  7. "strings"
  8. "github.com/sagernet/sing-box/adapter"
  9. "github.com/sagernet/sing-box/common/tls"
  10. C "github.com/sagernet/sing-box/constant"
  11. "github.com/sagernet/sing-box/option"
  12. "github.com/sagernet/sing/common"
  13. E "github.com/sagernet/sing/common/exceptions"
  14. M "github.com/sagernet/sing/common/metadata"
  15. N "github.com/sagernet/sing/common/network"
  16. sHttp "github.com/sagernet/sing/protocol/http"
  17. "golang.org/x/net/http2"
  18. "golang.org/x/net/http2/h2c"
  19. )
  20. var _ adapter.V2RayServerTransport = (*Server)(nil)
  21. type Server struct {
  22. ctx context.Context
  23. handler adapter.V2RayServerTransportHandler
  24. httpServer *http.Server
  25. h2Server *http2.Server
  26. h2cHandler http.Handler
  27. host []string
  28. path string
  29. method string
  30. headers http.Header
  31. }
  32. func (s *Server) Network() []string {
  33. return []string{N.NetworkTCP}
  34. }
  35. func NewServer(ctx context.Context, options option.V2RayHTTPOptions, tlsConfig tls.ServerConfig, handler adapter.V2RayServerTransportHandler) (*Server, error) {
  36. server := &Server{
  37. ctx: ctx,
  38. handler: handler,
  39. h2Server: new(http2.Server),
  40. host: options.Host,
  41. path: options.Path,
  42. method: options.Method,
  43. headers: make(http.Header),
  44. }
  45. if server.method == "" {
  46. server.method = "PUT"
  47. }
  48. if !strings.HasPrefix(server.path, "/") {
  49. server.path = "/" + server.path
  50. }
  51. for key, value := range options.Headers {
  52. server.headers.Set(key, value)
  53. }
  54. server.httpServer = &http.Server{
  55. Handler: server,
  56. ReadHeaderTimeout: C.TCPTimeout,
  57. MaxHeaderBytes: http.DefaultMaxHeaderBytes,
  58. }
  59. server.h2cHandler = h2c.NewHandler(server, server.h2Server)
  60. if tlsConfig != nil {
  61. stdConfig, err := tlsConfig.Config()
  62. if err != nil {
  63. return nil, err
  64. }
  65. server.httpServer.TLSConfig = stdConfig
  66. }
  67. return server, nil
  68. }
  69. func (s *Server) ServeHTTP(writer http.ResponseWriter, request *http.Request) {
  70. if request.Method == "PRI" && len(request.Header) == 0 && request.URL.Path == "*" && request.Proto == "HTTP/2.0" {
  71. s.h2cHandler.ServeHTTP(writer, request)
  72. return
  73. }
  74. host := request.Host
  75. if len(s.host) > 0 && !common.Contains(s.host, host) {
  76. s.fallbackRequest(request.Context(), writer, request, http.StatusBadRequest, E.New("bad host: ", host))
  77. return
  78. }
  79. if !strings.HasPrefix(request.URL.Path, s.path) {
  80. s.fallbackRequest(request.Context(), writer, request, http.StatusNotFound, E.New("bad path: ", request.URL.Path))
  81. return
  82. }
  83. if request.Method != s.method {
  84. s.fallbackRequest(request.Context(), writer, request, http.StatusNotFound, E.New("bad method: ", request.Method))
  85. return
  86. }
  87. writer.Header().Set("Cache-Control", "no-store")
  88. for key, values := range s.headers {
  89. for _, value := range values {
  90. writer.Header().Set(key, value)
  91. }
  92. }
  93. writer.WriteHeader(http.StatusOK)
  94. writer.(http.Flusher).Flush()
  95. var metadata M.Metadata
  96. metadata.Source = sHttp.SourceAddress(request)
  97. if h, ok := writer.(http.Hijacker); ok {
  98. conn, _, err := h.Hijack()
  99. if err != nil {
  100. s.fallbackRequest(request.Context(), writer, request, http.StatusInternalServerError, E.Cause(err, "hijack conn"))
  101. return
  102. }
  103. s.handler.NewConnection(request.Context(), conn, metadata)
  104. } else {
  105. conn := NewHTTP2Wrapper(&ServerHTTPConn{
  106. NewHTTPConn(request.Body, writer),
  107. writer.(http.Flusher),
  108. })
  109. s.handler.NewConnection(request.Context(), conn, metadata)
  110. conn.CloseWrapper()
  111. }
  112. }
  113. func (s *Server) fallbackRequest(ctx context.Context, writer http.ResponseWriter, request *http.Request, statusCode int, err error) {
  114. conn := NewHTTPConn(request.Body, writer)
  115. fErr := s.handler.FallbackConnection(ctx, &conn, M.Metadata{})
  116. if fErr == nil {
  117. return
  118. } else if fErr == os.ErrInvalid {
  119. fErr = nil
  120. }
  121. writer.WriteHeader(statusCode)
  122. s.handler.NewError(request.Context(), E.Cause(E.Errors(err, E.Cause(fErr, "fallback connection")), "process connection from ", request.RemoteAddr))
  123. }
  124. func (s *Server) Serve(listener net.Listener) error {
  125. fixTLSConfig := s.httpServer.TLSConfig == nil
  126. err := http2.ConfigureServer(s.httpServer, s.h2Server)
  127. if err != nil {
  128. return err
  129. }
  130. if fixTLSConfig {
  131. s.httpServer.TLSConfig = nil
  132. }
  133. if s.httpServer.TLSConfig == nil {
  134. return s.httpServer.Serve(listener)
  135. } else {
  136. return s.httpServer.ServeTLS(listener, "", "")
  137. }
  138. }
  139. func (s *Server) ServePacket(listener net.PacketConn) error {
  140. return os.ErrInvalid
  141. }
  142. func (s *Server) Close() error {
  143. return common.Close(common.PtrOrNil(s.httpServer))
  144. }