123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144 |
- package v2rayhttpupgrade
- import (
- "context"
- "net"
- "net/http"
- "os"
- "strings"
- "github.com/sagernet/sing-box/adapter"
- "github.com/sagernet/sing-box/common/tls"
- C "github.com/sagernet/sing-box/constant"
- "github.com/sagernet/sing-box/log"
- "github.com/sagernet/sing-box/option"
- "github.com/sagernet/sing-box/transport/v2rayhttp"
- "github.com/sagernet/sing/common"
- E "github.com/sagernet/sing/common/exceptions"
- "github.com/sagernet/sing/common/logger"
- M "github.com/sagernet/sing/common/metadata"
- N "github.com/sagernet/sing/common/network"
- aTLS "github.com/sagernet/sing/common/tls"
- sHttp "github.com/sagernet/sing/protocol/http"
- )
- var _ adapter.V2RayServerTransport = (*Server)(nil)
- type Server struct {
- ctx context.Context
- logger logger.ContextLogger
- tlsConfig tls.ServerConfig
- handler adapter.V2RayServerTransportHandler
- httpServer *http.Server
- host string
- path string
- headers http.Header
- }
- func NewServer(ctx context.Context, logger logger.ContextLogger, options option.V2RayHTTPUpgradeOptions, tlsConfig tls.ServerConfig, handler adapter.V2RayServerTransportHandler) (*Server, error) {
- server := &Server{
- ctx: ctx,
- tlsConfig: tlsConfig,
- handler: handler,
- host: options.Host,
- path: options.Path,
- headers: options.Headers.Build(),
- }
- if !strings.HasPrefix(server.path, "/") {
- server.path = "/" + server.path
- }
- server.httpServer = &http.Server{
- Handler: server,
- ReadHeaderTimeout: C.TCPTimeout,
- MaxHeaderBytes: http.DefaultMaxHeaderBytes,
- BaseContext: func(net.Listener) context.Context {
- return ctx
- },
- ConnContext: func(ctx context.Context, c net.Conn) context.Context {
- return log.ContextWithNewID(ctx)
- },
- TLSNextProto: make(map[string]func(*http.Server, *tls.STDConn, http.Handler)),
- }
- return server, nil
- }
- type httpFlusher interface {
- FlushError() error
- }
- func (s *Server) ServeHTTP(writer http.ResponseWriter, request *http.Request) {
- host := request.Host
- if len(s.host) > 0 && host != s.host {
- s.invalidRequest(writer, request, http.StatusBadRequest, E.New("bad host: ", host))
- return
- }
- if request.URL.Path != s.path {
- s.invalidRequest(writer, request, http.StatusNotFound, E.New("bad path: ", request.URL.Path))
- return
- }
- if request.Method != http.MethodGet {
- s.invalidRequest(writer, request, http.StatusNotFound, E.New("bad method: ", request.Method))
- return
- }
- if !strings.EqualFold(request.Header.Get("Connection"), "upgrade") {
- s.invalidRequest(writer, request, http.StatusNotFound, E.New("not a upgrade request"))
- return
- }
- if !strings.EqualFold(request.Header.Get("Upgrade"), "websocket") {
- s.invalidRequest(writer, request, http.StatusNotFound, E.New("not a websocket request"))
- return
- }
- if request.Header.Get("Sec-WebSocket-Key") != "" {
- s.invalidRequest(writer, request, http.StatusNotFound, E.New("real websocket request received"))
- return
- }
- writer.Header().Set("Connection", "upgrade")
- writer.Header().Set("Upgrade", "websocket")
- writer.WriteHeader(http.StatusSwitchingProtocols)
- if flusher, isFlusher := writer.(httpFlusher); isFlusher {
- err := flusher.FlushError()
- if err != nil {
- s.invalidRequest(writer, request, http.StatusInternalServerError, E.New("flush response"))
- }
- }
- hijacker, canHijack := writer.(http.Hijacker)
- if !canHijack {
- s.invalidRequest(writer, request, http.StatusInternalServerError, E.New("invalid connection, maybe HTTP/2"))
- return
- }
- conn, _, err := hijacker.Hijack()
- if err != nil {
- s.invalidRequest(writer, request, http.StatusInternalServerError, E.Cause(err, "hijack failed"))
- return
- }
- s.handler.NewConnectionEx(v2rayhttp.DupContext(request.Context()), conn, sHttp.SourceAddress(request), M.Socksaddr{}, nil)
- }
- func (s *Server) invalidRequest(writer http.ResponseWriter, request *http.Request, statusCode int, err error) {
- if statusCode > 0 {
- writer.WriteHeader(statusCode)
- }
- s.logger.ErrorContext(request.Context(), E.Cause(err, "process connection from ", request.RemoteAddr))
- }
- func (s *Server) Network() []string {
- return []string{N.NetworkTCP}
- }
- func (s *Server) Serve(listener net.Listener) error {
- if s.tlsConfig != nil {
- if len(s.tlsConfig.NextProtos()) == 0 {
- s.tlsConfig.SetNextProtos([]string{"http/1.1"})
- }
- listener = aTLS.NewListener(listener, s.tlsConfig)
- }
- return s.httpServer.Serve(listener)
- }
- func (s *Server) ServePacket(listener net.PacketConn) error {
- return os.ErrInvalid
- }
- func (s *Server) Close() error {
- return common.Close(common.PtrOrNil(s.httpServer))
- }
|