server.go 4.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147
  1. package v2rayhttp
  2. import (
  3. "context"
  4. "net"
  5. "net/http"
  6. "os"
  7. "strings"
  8. "github.com/sagernet/sing-box/adapter"
  9. "github.com/sagernet/sing-box/common/tls"
  10. C "github.com/sagernet/sing-box/constant"
  11. "github.com/sagernet/sing-box/option"
  12. "github.com/sagernet/sing/common"
  13. E "github.com/sagernet/sing/common/exceptions"
  14. M "github.com/sagernet/sing/common/metadata"
  15. N "github.com/sagernet/sing/common/network"
  16. aTLS "github.com/sagernet/sing/common/tls"
  17. sHttp "github.com/sagernet/sing/protocol/http"
  18. "golang.org/x/net/http2"
  19. "golang.org/x/net/http2/h2c"
  20. )
  21. var _ adapter.V2RayServerTransport = (*Server)(nil)
  22. type Server struct {
  23. ctx context.Context
  24. tlsConfig tls.ServerConfig
  25. handler adapter.V2RayServerTransportHandler
  26. httpServer *http.Server
  27. h2Server *http2.Server
  28. h2cHandler http.Handler
  29. host []string
  30. path string
  31. method string
  32. headers http.Header
  33. }
  34. func (s *Server) Network() []string {
  35. return []string{N.NetworkTCP}
  36. }
  37. func NewServer(ctx context.Context, options option.V2RayHTTPOptions, tlsConfig tls.ServerConfig, handler adapter.V2RayServerTransportHandler) (*Server, error) {
  38. server := &Server{
  39. ctx: ctx,
  40. tlsConfig: tlsConfig,
  41. handler: handler,
  42. h2Server: new(http2.Server),
  43. host: options.Host,
  44. path: options.Path,
  45. method: options.Method,
  46. headers: make(http.Header),
  47. }
  48. if server.method == "" {
  49. server.method = "PUT"
  50. }
  51. if !strings.HasPrefix(server.path, "/") {
  52. server.path = "/" + server.path
  53. }
  54. for key, value := range options.Headers {
  55. server.headers.Set(key, value)
  56. }
  57. server.httpServer = &http.Server{
  58. Handler: server,
  59. ReadHeaderTimeout: C.TCPTimeout,
  60. MaxHeaderBytes: http.DefaultMaxHeaderBytes,
  61. }
  62. server.h2cHandler = h2c.NewHandler(server, server.h2Server)
  63. return server, nil
  64. }
  65. func (s *Server) ServeHTTP(writer http.ResponseWriter, request *http.Request) {
  66. if request.Method == "PRI" && len(request.Header) == 0 && request.URL.Path == "*" && request.Proto == "HTTP/2.0" {
  67. s.h2cHandler.ServeHTTP(writer, request)
  68. return
  69. }
  70. host := request.Host
  71. if len(s.host) > 0 && !common.Contains(s.host, host) {
  72. s.fallbackRequest(request.Context(), writer, request, http.StatusBadRequest, E.New("bad host: ", host))
  73. return
  74. }
  75. if !strings.HasPrefix(request.URL.Path, s.path) {
  76. s.fallbackRequest(request.Context(), writer, request, http.StatusNotFound, E.New("bad path: ", request.URL.Path))
  77. return
  78. }
  79. if request.Method != s.method {
  80. s.fallbackRequest(request.Context(), writer, request, http.StatusNotFound, E.New("bad method: ", request.Method))
  81. return
  82. }
  83. writer.Header().Set("Cache-Control", "no-store")
  84. for key, values := range s.headers {
  85. for _, value := range values {
  86. writer.Header().Set(key, value)
  87. }
  88. }
  89. writer.WriteHeader(http.StatusOK)
  90. writer.(http.Flusher).Flush()
  91. var metadata M.Metadata
  92. metadata.Source = sHttp.SourceAddress(request)
  93. if h, ok := writer.(http.Hijacker); ok {
  94. conn, _, err := h.Hijack()
  95. if err != nil {
  96. s.fallbackRequest(request.Context(), writer, request, http.StatusInternalServerError, E.Cause(err, "hijack conn"))
  97. return
  98. }
  99. s.handler.NewConnection(request.Context(), conn, metadata)
  100. } else {
  101. conn := NewHTTP2Wrapper(&ServerHTTPConn{
  102. NewHTTPConn(request.Body, writer),
  103. writer.(http.Flusher),
  104. })
  105. s.handler.NewConnection(request.Context(), conn, metadata)
  106. conn.CloseWrapper()
  107. }
  108. }
  109. func (s *Server) fallbackRequest(ctx context.Context, writer http.ResponseWriter, request *http.Request, statusCode int, err error) {
  110. conn := NewHTTPConn(request.Body, writer)
  111. fErr := s.handler.FallbackConnection(ctx, &conn, M.Metadata{})
  112. if fErr == nil {
  113. return
  114. } else if fErr == os.ErrInvalid {
  115. fErr = nil
  116. }
  117. writer.WriteHeader(statusCode)
  118. s.handler.NewError(request.Context(), E.Cause(E.Errors(err, E.Cause(fErr, "fallback connection")), "process connection from ", request.RemoteAddr))
  119. }
  120. func (s *Server) Serve(listener net.Listener) error {
  121. if s.tlsConfig != nil {
  122. listener = aTLS.NewListener(listener, s.tlsConfig)
  123. }
  124. return s.httpServer.Serve(listener)
  125. }
  126. func (s *Server) ServePacket(listener net.PacketConn) error {
  127. return os.ErrInvalid
  128. }
  129. func (s *Server) Close() error {
  130. return common.Close(common.PtrOrNil(s.httpServer))
  131. }