server.go 4.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144
  1. package v2raywebsocket
  2. import (
  3. "context"
  4. "encoding/base64"
  5. "net"
  6. "net/http"
  7. "os"
  8. "strings"
  9. "github.com/sagernet/sing-box/adapter"
  10. "github.com/sagernet/sing-box/common/tls"
  11. C "github.com/sagernet/sing-box/constant"
  12. "github.com/sagernet/sing-box/option"
  13. "github.com/sagernet/sing-box/transport/v2rayhttp"
  14. "github.com/sagernet/sing/common"
  15. "github.com/sagernet/sing/common/buf"
  16. "github.com/sagernet/sing/common/bufio"
  17. E "github.com/sagernet/sing/common/exceptions"
  18. M "github.com/sagernet/sing/common/metadata"
  19. N "github.com/sagernet/sing/common/network"
  20. sHttp "github.com/sagernet/sing/protocol/http"
  21. "github.com/sagernet/websocket"
  22. )
  23. var _ adapter.V2RayServerTransport = (*Server)(nil)
  24. type Server struct {
  25. ctx context.Context
  26. handler adapter.V2RayServerTransportHandler
  27. httpServer *http.Server
  28. path string
  29. maxEarlyData uint32
  30. earlyDataHeaderName string
  31. }
  32. func NewServer(ctx context.Context, options option.V2RayWebsocketOptions, tlsConfig tls.ServerConfig, handler adapter.V2RayServerTransportHandler) (*Server, error) {
  33. server := &Server{
  34. ctx: ctx,
  35. handler: handler,
  36. path: options.Path,
  37. maxEarlyData: options.MaxEarlyData,
  38. earlyDataHeaderName: options.EarlyDataHeaderName,
  39. }
  40. if !strings.HasPrefix(server.path, "/") {
  41. server.path = "/" + server.path
  42. }
  43. server.httpServer = &http.Server{
  44. Handler: server,
  45. ReadHeaderTimeout: C.TCPTimeout,
  46. MaxHeaderBytes: http.DefaultMaxHeaderBytes,
  47. }
  48. if tlsConfig != nil {
  49. stdConfig, err := tlsConfig.Config()
  50. if err != nil {
  51. return nil, err
  52. }
  53. server.httpServer.TLSConfig = stdConfig
  54. }
  55. return server, nil
  56. }
  57. var upgrader = websocket.Upgrader{
  58. HandshakeTimeout: C.TCPTimeout,
  59. CheckOrigin: func(r *http.Request) bool {
  60. return true
  61. },
  62. }
  63. func (s *Server) ServeHTTP(writer http.ResponseWriter, request *http.Request) {
  64. if s.maxEarlyData == 0 || s.earlyDataHeaderName != "" {
  65. if request.URL.Path != s.path {
  66. s.fallbackRequest(request.Context(), writer, request, http.StatusNotFound, E.New("bad path: ", request.URL.Path))
  67. return
  68. }
  69. }
  70. var (
  71. earlyData []byte
  72. err error
  73. conn net.Conn
  74. )
  75. if s.earlyDataHeaderName == "" {
  76. if strings.HasPrefix(request.URL.RequestURI(), s.path) {
  77. earlyDataStr := request.URL.RequestURI()[len(s.path):]
  78. earlyData, err = base64.RawURLEncoding.DecodeString(earlyDataStr)
  79. } else {
  80. s.fallbackRequest(request.Context(), writer, request, http.StatusNotFound, E.New("bad path: ", request.URL.Path))
  81. return
  82. }
  83. } else {
  84. earlyDataStr := request.Header.Get(s.earlyDataHeaderName)
  85. if earlyDataStr != "" {
  86. earlyData, err = base64.RawURLEncoding.DecodeString(earlyDataStr)
  87. }
  88. }
  89. if err != nil {
  90. s.fallbackRequest(request.Context(), writer, request, http.StatusBadRequest, E.Cause(err, "decode early data"))
  91. return
  92. }
  93. wsConn, err := upgrader.Upgrade(writer, request, nil)
  94. if err != nil {
  95. s.fallbackRequest(request.Context(), writer, request, http.StatusBadRequest, E.Cause(err, "upgrade websocket connection"))
  96. return
  97. }
  98. var metadata M.Metadata
  99. metadata.Source = sHttp.SourceAddress(request)
  100. conn = NewServerConn(wsConn, metadata.Source.TCPAddr())
  101. if len(earlyData) > 0 {
  102. conn = bufio.NewCachedConn(conn, buf.As(earlyData))
  103. }
  104. s.handler.NewConnection(request.Context(), conn, metadata)
  105. }
  106. func (s *Server) fallbackRequest(ctx context.Context, writer http.ResponseWriter, request *http.Request, statusCode int, err error) {
  107. conn := v2rayhttp.NewHTTPConn(request.Body, writer)
  108. fErr := s.handler.FallbackConnection(ctx, &conn, M.Metadata{})
  109. if fErr == nil {
  110. return
  111. } else if fErr == os.ErrInvalid {
  112. fErr = nil
  113. }
  114. writer.WriteHeader(statusCode)
  115. s.handler.NewError(request.Context(), E.Cause(E.Errors(err, E.Cause(fErr, "fallback connection")), "process connection from ", request.RemoteAddr))
  116. }
  117. func (s *Server) Network() []string {
  118. return []string{N.NetworkTCP}
  119. }
  120. func (s *Server) Serve(listener net.Listener) error {
  121. if s.httpServer.TLSConfig == nil {
  122. return s.httpServer.Serve(listener)
  123. } else {
  124. return s.httpServer.ServeTLS(listener, "", "")
  125. }
  126. }
  127. func (s *Server) ServePacket(listener net.PacketConn) error {
  128. return os.ErrInvalid
  129. }
  130. func (s *Server) Close() error {
  131. return common.Close(common.PtrOrNil(s.httpServer))
  132. }