server.go 4.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143
  1. package v2rayhttpupgrade
  2. import (
  3. "context"
  4. "net"
  5. "net/http"
  6. "os"
  7. "strings"
  8. "github.com/sagernet/sing-box/adapter"
  9. "github.com/sagernet/sing-box/common/tls"
  10. C "github.com/sagernet/sing-box/constant"
  11. "github.com/sagernet/sing-box/log"
  12. "github.com/sagernet/sing-box/option"
  13. "github.com/sagernet/sing/common"
  14. E "github.com/sagernet/sing/common/exceptions"
  15. "github.com/sagernet/sing/common/logger"
  16. M "github.com/sagernet/sing/common/metadata"
  17. N "github.com/sagernet/sing/common/network"
  18. aTLS "github.com/sagernet/sing/common/tls"
  19. sHttp "github.com/sagernet/sing/protocol/http"
  20. )
  21. var _ adapter.V2RayServerTransport = (*Server)(nil)
  22. type Server struct {
  23. ctx context.Context
  24. logger logger.ContextLogger
  25. tlsConfig tls.ServerConfig
  26. handler adapter.V2RayServerTransportHandler
  27. httpServer *http.Server
  28. host string
  29. path string
  30. headers http.Header
  31. }
  32. func NewServer(ctx context.Context, logger logger.ContextLogger, options option.V2RayHTTPUpgradeOptions, tlsConfig tls.ServerConfig, handler adapter.V2RayServerTransportHandler) (*Server, error) {
  33. server := &Server{
  34. ctx: ctx,
  35. tlsConfig: tlsConfig,
  36. handler: handler,
  37. host: options.Host,
  38. path: options.Path,
  39. headers: options.Headers.Build(),
  40. }
  41. if !strings.HasPrefix(server.path, "/") {
  42. server.path = "/" + server.path
  43. }
  44. server.httpServer = &http.Server{
  45. Handler: server,
  46. ReadHeaderTimeout: C.TCPTimeout,
  47. MaxHeaderBytes: http.DefaultMaxHeaderBytes,
  48. BaseContext: func(net.Listener) context.Context {
  49. return ctx
  50. },
  51. ConnContext: func(ctx context.Context, c net.Conn) context.Context {
  52. return log.ContextWithNewID(ctx)
  53. },
  54. TLSNextProto: make(map[string]func(*http.Server, *tls.STDConn, http.Handler)),
  55. }
  56. return server, nil
  57. }
  58. type httpFlusher interface {
  59. FlushError() error
  60. }
  61. func (s *Server) ServeHTTP(writer http.ResponseWriter, request *http.Request) {
  62. host := request.Host
  63. if len(s.host) > 0 && host != s.host {
  64. s.invalidRequest(writer, request, http.StatusBadRequest, E.New("bad host: ", host))
  65. return
  66. }
  67. if request.URL.Path != s.path {
  68. s.invalidRequest(writer, request, http.StatusNotFound, E.New("bad path: ", request.URL.Path))
  69. return
  70. }
  71. if request.Method != http.MethodGet {
  72. s.invalidRequest(writer, request, http.StatusNotFound, E.New("bad method: ", request.Method))
  73. return
  74. }
  75. if !strings.EqualFold(request.Header.Get("Connection"), "upgrade") {
  76. s.invalidRequest(writer, request, http.StatusNotFound, E.New("not a upgrade request"))
  77. return
  78. }
  79. if !strings.EqualFold(request.Header.Get("Upgrade"), "websocket") {
  80. s.invalidRequest(writer, request, http.StatusNotFound, E.New("not a websocket request"))
  81. return
  82. }
  83. if request.Header.Get("Sec-WebSocket-Key") != "" {
  84. s.invalidRequest(writer, request, http.StatusNotFound, E.New("real websocket request received"))
  85. return
  86. }
  87. writer.Header().Set("Connection", "upgrade")
  88. writer.Header().Set("Upgrade", "websocket")
  89. writer.WriteHeader(http.StatusSwitchingProtocols)
  90. if flusher, isFlusher := writer.(httpFlusher); isFlusher {
  91. err := flusher.FlushError()
  92. if err != nil {
  93. s.invalidRequest(writer, request, http.StatusInternalServerError, E.New("flush response"))
  94. }
  95. }
  96. hijacker, canHijack := writer.(http.Hijacker)
  97. if !canHijack {
  98. s.invalidRequest(writer, request, http.StatusInternalServerError, E.New("invalid connection, maybe HTTP/2"))
  99. return
  100. }
  101. conn, _, err := hijacker.Hijack()
  102. if err != nil {
  103. s.invalidRequest(writer, request, http.StatusInternalServerError, E.Cause(err, "hijack failed"))
  104. return
  105. }
  106. s.handler.NewConnectionEx(request.Context(), conn, sHttp.SourceAddress(request), M.Socksaddr{}, nil)
  107. }
  108. func (s *Server) invalidRequest(writer http.ResponseWriter, request *http.Request, statusCode int, err error) {
  109. if statusCode > 0 {
  110. writer.WriteHeader(statusCode)
  111. }
  112. s.logger.ErrorContext(request.Context(), E.Cause(err, "process connection from ", request.RemoteAddr))
  113. }
  114. func (s *Server) Network() []string {
  115. return []string{N.NetworkTCP}
  116. }
  117. func (s *Server) Serve(listener net.Listener) error {
  118. if s.tlsConfig != nil {
  119. if len(s.tlsConfig.NextProtos()) == 0 {
  120. s.tlsConfig.SetNextProtos([]string{"http/1.1"})
  121. }
  122. listener = aTLS.NewListener(listener, s.tlsConfig)
  123. }
  124. return s.httpServer.Serve(listener)
  125. }
  126. func (s *Server) ServePacket(listener net.PacketConn) error {
  127. return os.ErrInvalid
  128. }
  129. func (s *Server) Close() error {
  130. return common.Close(common.PtrOrNil(s.httpServer))
  131. }