123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180 |
- package v2rayhttp
- import (
- "context"
- "net"
- "net/http"
- "os"
- "strings"
- "time"
- "github.com/sagernet/sing-box/adapter"
- "github.com/sagernet/sing-box/common/tls"
- C "github.com/sagernet/sing-box/constant"
- "github.com/sagernet/sing-box/log"
- "github.com/sagernet/sing-box/option"
- "github.com/sagernet/sing/common"
- "github.com/sagernet/sing/common/buf"
- "github.com/sagernet/sing/common/bufio"
- E "github.com/sagernet/sing/common/exceptions"
- "github.com/sagernet/sing/common/logger"
- M "github.com/sagernet/sing/common/metadata"
- N "github.com/sagernet/sing/common/network"
- aTLS "github.com/sagernet/sing/common/tls"
- sHttp "github.com/sagernet/sing/protocol/http"
- "golang.org/x/net/http2"
- "golang.org/x/net/http2/h2c"
- )
- var _ adapter.V2RayServerTransport = (*Server)(nil)
- type Server struct {
- ctx context.Context
- logger logger.ContextLogger
- tlsConfig tls.ServerConfig
- handler adapter.V2RayServerTransportHandler
- httpServer *http.Server
- h2Server *http2.Server
- h2cHandler http.Handler
- host []string
- path string
- method string
- headers http.Header
- }
- func NewServer(ctx context.Context, logger logger.ContextLogger, options option.V2RayHTTPOptions, tlsConfig tls.ServerConfig, handler adapter.V2RayServerTransportHandler) (*Server, error) {
- server := &Server{
- ctx: ctx,
- tlsConfig: tlsConfig,
- handler: handler,
- h2Server: &http2.Server{
- IdleTimeout: time.Duration(options.IdleTimeout),
- },
- host: options.Host,
- path: options.Path,
- method: options.Method,
- headers: options.Headers.Build(),
- }
- if !strings.HasPrefix(server.path, "/") {
- server.path = "/" + server.path
- }
- server.httpServer = &http.Server{
- Handler: server,
- ReadHeaderTimeout: C.TCPTimeout,
- MaxHeaderBytes: http.DefaultMaxHeaderBytes,
- BaseContext: func(net.Listener) context.Context {
- return ctx
- },
- ConnContext: func(ctx context.Context, c net.Conn) context.Context {
- return log.ContextWithNewID(ctx)
- },
- }
- server.h2cHandler = h2c.NewHandler(server, server.h2Server)
- return server, nil
- }
- func (s *Server) ServeHTTP(writer http.ResponseWriter, request *http.Request) {
- if request.Method == "PRI" && len(request.Header) == 0 && request.URL.Path == "*" && request.Proto == "HTTP/2.0" {
- s.h2cHandler.ServeHTTP(writer, request)
- return
- }
- host := request.Host
- if len(s.host) > 0 && !common.Contains(s.host, host) {
- s.invalidRequest(writer, request, http.StatusBadRequest, E.New("bad host: ", host))
- return
- }
- if !strings.HasPrefix(request.URL.Path, s.path) {
- s.invalidRequest(writer, request, http.StatusNotFound, E.New("bad path: ", request.URL.Path))
- return
- }
- if s.method != "" && request.Method != s.method {
- s.invalidRequest(writer, request, http.StatusNotFound, E.New("bad method: ", request.Method))
- return
- }
- writer.Header().Set("Cache-Control", "no-store")
- for key, values := range s.headers {
- for _, value := range values {
- writer.Header().Set(key, value)
- }
- }
- source := sHttp.SourceAddress(request)
- if h, ok := writer.(http.Hijacker); ok {
- var requestBody *buf.Buffer
- if contentLength := int(request.ContentLength); contentLength > 0 {
- requestBody = buf.NewSize(contentLength)
- _, err := requestBody.ReadFullFrom(request.Body, contentLength)
- if err != nil {
- s.invalidRequest(writer, request, 0, E.Cause(err, "read request"))
- return
- }
- }
- writer.WriteHeader(http.StatusOK)
- writer.(http.Flusher).Flush()
- conn, reader, err := h.Hijack()
- if err != nil {
- s.invalidRequest(writer, request, 0, E.Cause(err, "hijack conn"))
- return
- }
- if cacheLen := reader.Reader.Buffered(); cacheLen > 0 {
- cache := buf.NewSize(cacheLen)
- _, err = cache.ReadFullFrom(reader.Reader, cacheLen)
- if err != nil {
- conn.Close()
- s.invalidRequest(writer, request, 0, E.Cause(err, "read cache"))
- return
- }
- conn = bufio.NewCachedConn(conn, cache)
- }
- if requestBody != nil {
- conn = bufio.NewCachedConn(conn, requestBody)
- }
- s.handler.NewConnectionEx(DupContext(request.Context()), conn, source, M.Socksaddr{}, nil)
- } else {
- writer.WriteHeader(http.StatusOK)
- done := make(chan struct{})
- conn := NewHTTP2Wrapper(&ServerHTTPConn{
- NewHTTPConn(request.Body, writer),
- writer.(http.Flusher),
- })
- s.handler.NewConnectionEx(request.Context(), conn, source, M.Socksaddr{}, N.OnceClose(func(it error) {
- close(done)
- }))
- <-done
- conn.CloseWrapper()
- }
- }
- func (s *Server) invalidRequest(writer http.ResponseWriter, request *http.Request, statusCode int, err error) {
- if statusCode > 0 {
- writer.WriteHeader(statusCode)
- }
- s.logger.ErrorContext(request.Context(), E.Cause(err, "process connection from ", request.RemoteAddr))
- }
- func (s *Server) Network() []string {
- return []string{N.NetworkTCP}
- }
- func (s *Server) Serve(listener net.Listener) error {
- if s.tlsConfig != nil {
- if len(s.tlsConfig.NextProtos()) == 0 {
- s.tlsConfig.SetNextProtos([]string{http2.NextProtoTLS, "http/1.1"})
- } else if !common.Contains(s.tlsConfig.NextProtos(), http2.NextProtoTLS) {
- s.tlsConfig.SetNextProtos(append([]string{"h2"}, s.tlsConfig.NextProtos()...))
- }
- listener = aTLS.NewListener(listener, s.tlsConfig)
- }
- return s.httpServer.Serve(listener)
- }
- func (s *Server) ServePacket(listener net.PacketConn) error {
- return os.ErrInvalid
- }
- func (s *Server) Close() error {
- return common.Close(common.PtrOrNil(s.httpServer))
- }
|