server.go 4.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145
  1. package v2raywebsocket
  2. import (
  3. "context"
  4. "encoding/base64"
  5. "net"
  6. "net/http"
  7. "os"
  8. "strings"
  9. "github.com/sagernet/sing-box/adapter"
  10. "github.com/sagernet/sing-box/common/tls"
  11. C "github.com/sagernet/sing-box/constant"
  12. "github.com/sagernet/sing-box/log"
  13. "github.com/sagernet/sing-box/option"
  14. "github.com/sagernet/sing-box/transport/v2rayhttp"
  15. "github.com/sagernet/sing/common"
  16. "github.com/sagernet/sing/common/buf"
  17. "github.com/sagernet/sing/common/bufio"
  18. E "github.com/sagernet/sing/common/exceptions"
  19. "github.com/sagernet/sing/common/logger"
  20. M "github.com/sagernet/sing/common/metadata"
  21. N "github.com/sagernet/sing/common/network"
  22. aTLS "github.com/sagernet/sing/common/tls"
  23. sHttp "github.com/sagernet/sing/protocol/http"
  24. "github.com/sagernet/ws"
  25. )
  26. var _ adapter.V2RayServerTransport = (*Server)(nil)
  27. type Server struct {
  28. ctx context.Context
  29. logger logger.ContextLogger
  30. tlsConfig tls.ServerConfig
  31. handler adapter.V2RayServerTransportHandler
  32. httpServer *http.Server
  33. path string
  34. maxEarlyData uint32
  35. earlyDataHeaderName string
  36. upgrader ws.HTTPUpgrader
  37. }
  38. func NewServer(ctx context.Context, logger logger.ContextLogger, options option.V2RayWebsocketOptions, tlsConfig tls.ServerConfig, handler adapter.V2RayServerTransportHandler) (*Server, error) {
  39. server := &Server{
  40. ctx: ctx,
  41. logger: logger,
  42. tlsConfig: tlsConfig,
  43. handler: handler,
  44. path: options.Path,
  45. maxEarlyData: options.MaxEarlyData,
  46. earlyDataHeaderName: options.EarlyDataHeaderName,
  47. upgrader: ws.HTTPUpgrader{
  48. Timeout: C.TCPTimeout,
  49. Header: options.Headers.Build(),
  50. },
  51. }
  52. if !strings.HasPrefix(server.path, "/") {
  53. server.path = "/" + server.path
  54. }
  55. server.httpServer = &http.Server{
  56. Handler: server,
  57. ReadHeaderTimeout: C.TCPTimeout,
  58. MaxHeaderBytes: http.DefaultMaxHeaderBytes,
  59. BaseContext: func(net.Listener) context.Context {
  60. return ctx
  61. },
  62. ConnContext: func(ctx context.Context, c net.Conn) context.Context {
  63. return log.ContextWithNewID(ctx)
  64. },
  65. }
  66. return server, nil
  67. }
  68. func (s *Server) ServeHTTP(writer http.ResponseWriter, request *http.Request) {
  69. if s.maxEarlyData == 0 || s.earlyDataHeaderName != "" {
  70. if request.URL.Path != s.path {
  71. s.invalidRequest(writer, request, http.StatusNotFound, E.New("bad path: ", request.URL.Path))
  72. return
  73. }
  74. }
  75. var (
  76. earlyData []byte
  77. err error
  78. conn net.Conn
  79. )
  80. if s.earlyDataHeaderName == "" {
  81. if strings.HasPrefix(request.URL.RequestURI(), s.path) {
  82. earlyDataStr := request.URL.RequestURI()[len(s.path):]
  83. earlyData, err = base64.RawURLEncoding.DecodeString(earlyDataStr)
  84. } else {
  85. s.invalidRequest(writer, request, http.StatusNotFound, E.New("bad path: ", request.URL.Path))
  86. return
  87. }
  88. } else {
  89. if request.URL.Path != s.path {
  90. s.invalidRequest(writer, request, http.StatusNotFound, E.New("bad path: ", request.URL.Path))
  91. return
  92. }
  93. earlyDataStr := request.Header.Get(s.earlyDataHeaderName)
  94. if earlyDataStr != "" {
  95. earlyData, err = base64.RawURLEncoding.DecodeString(earlyDataStr)
  96. }
  97. }
  98. if err != nil {
  99. s.invalidRequest(writer, request, http.StatusBadRequest, E.Cause(err, "decode early data"))
  100. return
  101. }
  102. wsConn, _, _, err := ws.UpgradeHTTP(request, writer)
  103. if err != nil {
  104. s.invalidRequest(writer, request, 0, E.Cause(err, "upgrade websocket connection"))
  105. return
  106. }
  107. source := sHttp.SourceAddress(request)
  108. conn = NewConn(wsConn, source, ws.StateServerSide)
  109. if len(earlyData) > 0 {
  110. conn = bufio.NewCachedConn(conn, buf.As(earlyData))
  111. }
  112. s.handler.NewConnectionEx(v2rayhttp.DupContext(request.Context()), conn, source, M.Socksaddr{}, nil)
  113. }
  114. func (s *Server) invalidRequest(writer http.ResponseWriter, request *http.Request, statusCode int, err error) {
  115. if statusCode > 0 {
  116. writer.WriteHeader(statusCode)
  117. }
  118. s.logger.ErrorContext(request.Context(), E.Cause(err, "process connection from ", request.RemoteAddr))
  119. }
  120. func (s *Server) Network() []string {
  121. return []string{N.NetworkTCP}
  122. }
  123. func (s *Server) Serve(listener net.Listener) error {
  124. if s.tlsConfig != nil {
  125. listener = aTLS.NewListener(listener, s.tlsConfig)
  126. }
  127. return s.httpServer.Serve(listener)
  128. }
  129. func (s *Server) ServePacket(listener net.PacketConn) error {
  130. return os.ErrInvalid
  131. }
  132. func (s *Server) Close() error {
  133. return common.Close(common.PtrOrNil(s.httpServer))
  134. }