1
0

server.go 4.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144
  1. package v2rayhttpupgrade
  2. import (
  3. "context"
  4. "net"
  5. "net/http"
  6. "os"
  7. "strings"
  8. "github.com/sagernet/sing-box/adapter"
  9. "github.com/sagernet/sing-box/common/tls"
  10. C "github.com/sagernet/sing-box/constant"
  11. "github.com/sagernet/sing-box/log"
  12. "github.com/sagernet/sing-box/option"
  13. "github.com/sagernet/sing-box/transport/v2rayhttp"
  14. "github.com/sagernet/sing/common"
  15. E "github.com/sagernet/sing/common/exceptions"
  16. "github.com/sagernet/sing/common/logger"
  17. M "github.com/sagernet/sing/common/metadata"
  18. N "github.com/sagernet/sing/common/network"
  19. aTLS "github.com/sagernet/sing/common/tls"
  20. sHttp "github.com/sagernet/sing/protocol/http"
  21. )
  22. var _ adapter.V2RayServerTransport = (*Server)(nil)
  23. type Server struct {
  24. ctx context.Context
  25. logger logger.ContextLogger
  26. tlsConfig tls.ServerConfig
  27. handler adapter.V2RayServerTransportHandler
  28. httpServer *http.Server
  29. host string
  30. path string
  31. headers http.Header
  32. }
  33. func NewServer(ctx context.Context, logger logger.ContextLogger, options option.V2RayHTTPUpgradeOptions, tlsConfig tls.ServerConfig, handler adapter.V2RayServerTransportHandler) (*Server, error) {
  34. server := &Server{
  35. ctx: ctx,
  36. tlsConfig: tlsConfig,
  37. handler: handler,
  38. host: options.Host,
  39. path: options.Path,
  40. headers: options.Headers.Build(),
  41. }
  42. if !strings.HasPrefix(server.path, "/") {
  43. server.path = "/" + server.path
  44. }
  45. server.httpServer = &http.Server{
  46. Handler: server,
  47. ReadHeaderTimeout: C.TCPTimeout,
  48. MaxHeaderBytes: http.DefaultMaxHeaderBytes,
  49. BaseContext: func(net.Listener) context.Context {
  50. return ctx
  51. },
  52. ConnContext: func(ctx context.Context, c net.Conn) context.Context {
  53. return log.ContextWithNewID(ctx)
  54. },
  55. TLSNextProto: make(map[string]func(*http.Server, *tls.STDConn, http.Handler)),
  56. }
  57. return server, nil
  58. }
  59. type httpFlusher interface {
  60. FlushError() error
  61. }
  62. func (s *Server) ServeHTTP(writer http.ResponseWriter, request *http.Request) {
  63. host := request.Host
  64. if len(s.host) > 0 && host != s.host {
  65. s.invalidRequest(writer, request, http.StatusBadRequest, E.New("bad host: ", host))
  66. return
  67. }
  68. if request.URL.Path != s.path {
  69. s.invalidRequest(writer, request, http.StatusNotFound, E.New("bad path: ", request.URL.Path))
  70. return
  71. }
  72. if request.Method != http.MethodGet {
  73. s.invalidRequest(writer, request, http.StatusNotFound, E.New("bad method: ", request.Method))
  74. return
  75. }
  76. if !strings.EqualFold(request.Header.Get("Connection"), "upgrade") {
  77. s.invalidRequest(writer, request, http.StatusNotFound, E.New("not a upgrade request"))
  78. return
  79. }
  80. if !strings.EqualFold(request.Header.Get("Upgrade"), "websocket") {
  81. s.invalidRequest(writer, request, http.StatusNotFound, E.New("not a websocket request"))
  82. return
  83. }
  84. if request.Header.Get("Sec-WebSocket-Key") != "" {
  85. s.invalidRequest(writer, request, http.StatusNotFound, E.New("real websocket request received"))
  86. return
  87. }
  88. writer.Header().Set("Connection", "upgrade")
  89. writer.Header().Set("Upgrade", "websocket")
  90. writer.WriteHeader(http.StatusSwitchingProtocols)
  91. if flusher, isFlusher := writer.(httpFlusher); isFlusher {
  92. err := flusher.FlushError()
  93. if err != nil {
  94. s.invalidRequest(writer, request, http.StatusInternalServerError, E.New("flush response"))
  95. }
  96. }
  97. hijacker, canHijack := writer.(http.Hijacker)
  98. if !canHijack {
  99. s.invalidRequest(writer, request, http.StatusInternalServerError, E.New("invalid connection, maybe HTTP/2"))
  100. return
  101. }
  102. conn, _, err := hijacker.Hijack()
  103. if err != nil {
  104. s.invalidRequest(writer, request, http.StatusInternalServerError, E.Cause(err, "hijack failed"))
  105. return
  106. }
  107. s.handler.NewConnectionEx(v2rayhttp.DupContext(request.Context()), conn, sHttp.SourceAddress(request), M.Socksaddr{}, nil)
  108. }
  109. func (s *Server) invalidRequest(writer http.ResponseWriter, request *http.Request, statusCode int, err error) {
  110. if statusCode > 0 {
  111. writer.WriteHeader(statusCode)
  112. }
  113. s.logger.ErrorContext(request.Context(), E.Cause(err, "process connection from ", request.RemoteAddr))
  114. }
  115. func (s *Server) Network() []string {
  116. return []string{N.NetworkTCP}
  117. }
  118. func (s *Server) Serve(listener net.Listener) error {
  119. if s.tlsConfig != nil {
  120. if len(s.tlsConfig.NextProtos()) == 0 {
  121. s.tlsConfig.SetNextProtos([]string{"http/1.1"})
  122. }
  123. listener = aTLS.NewListener(listener, s.tlsConfig)
  124. }
  125. return s.httpServer.Serve(listener)
  126. }
  127. func (s *Server) ServePacket(listener net.PacketConn) error {
  128. return os.ErrInvalid
  129. }
  130. func (s *Server) Close() error {
  131. return common.Close(common.PtrOrNil(s.httpServer))
  132. }