server.go 4.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145
  1. package v2rayhttpupgrade
  2. import (
  3. "context"
  4. "net"
  5. "net/http"
  6. "os"
  7. "strings"
  8. "github.com/sagernet/sing-box/adapter"
  9. "github.com/sagernet/sing-box/common/tls"
  10. C "github.com/sagernet/sing-box/constant"
  11. "github.com/sagernet/sing-box/log"
  12. "github.com/sagernet/sing-box/option"
  13. "github.com/sagernet/sing-box/transport/v2rayhttp"
  14. "github.com/sagernet/sing/common"
  15. E "github.com/sagernet/sing/common/exceptions"
  16. "github.com/sagernet/sing/common/logger"
  17. M "github.com/sagernet/sing/common/metadata"
  18. N "github.com/sagernet/sing/common/network"
  19. aTLS "github.com/sagernet/sing/common/tls"
  20. sHttp "github.com/sagernet/sing/protocol/http"
  21. )
  22. var _ adapter.V2RayServerTransport = (*Server)(nil)
  23. type Server struct {
  24. ctx context.Context
  25. logger logger.ContextLogger
  26. tlsConfig tls.ServerConfig
  27. handler adapter.V2RayServerTransportHandler
  28. httpServer *http.Server
  29. host string
  30. path string
  31. headers http.Header
  32. }
  33. func NewServer(ctx context.Context, logger logger.ContextLogger, options option.V2RayHTTPUpgradeOptions, tlsConfig tls.ServerConfig, handler adapter.V2RayServerTransportHandler) (*Server, error) {
  34. server := &Server{
  35. ctx: ctx,
  36. logger: logger,
  37. tlsConfig: tlsConfig,
  38. handler: handler,
  39. host: options.Host,
  40. path: options.Path,
  41. headers: options.Headers.Build(),
  42. }
  43. if !strings.HasPrefix(server.path, "/") {
  44. server.path = "/" + server.path
  45. }
  46. server.httpServer = &http.Server{
  47. Handler: server,
  48. ReadHeaderTimeout: C.TCPTimeout,
  49. MaxHeaderBytes: http.DefaultMaxHeaderBytes,
  50. BaseContext: func(net.Listener) context.Context {
  51. return ctx
  52. },
  53. ConnContext: func(ctx context.Context, c net.Conn) context.Context {
  54. return log.ContextWithNewID(ctx)
  55. },
  56. TLSNextProto: make(map[string]func(*http.Server, *tls.STDConn, http.Handler)),
  57. }
  58. return server, nil
  59. }
  60. type httpFlusher interface {
  61. FlushError() error
  62. }
  63. func (s *Server) ServeHTTP(writer http.ResponseWriter, request *http.Request) {
  64. host := request.Host
  65. if len(s.host) > 0 && host != s.host {
  66. s.invalidRequest(writer, request, http.StatusBadRequest, E.New("bad host: ", host))
  67. return
  68. }
  69. if request.URL.Path != s.path {
  70. s.invalidRequest(writer, request, http.StatusNotFound, E.New("bad path: ", request.URL.Path))
  71. return
  72. }
  73. if request.Method != http.MethodGet {
  74. s.invalidRequest(writer, request, http.StatusNotFound, E.New("bad method: ", request.Method))
  75. return
  76. }
  77. if !strings.EqualFold(request.Header.Get("Connection"), "upgrade") {
  78. s.invalidRequest(writer, request, http.StatusNotFound, E.New("not a upgrade request"))
  79. return
  80. }
  81. if !strings.EqualFold(request.Header.Get("Upgrade"), "websocket") {
  82. s.invalidRequest(writer, request, http.StatusNotFound, E.New("not a websocket request"))
  83. return
  84. }
  85. if request.Header.Get("Sec-WebSocket-Key") != "" {
  86. s.invalidRequest(writer, request, http.StatusNotFound, E.New("real websocket request received"))
  87. return
  88. }
  89. writer.Header().Set("Connection", "upgrade")
  90. writer.Header().Set("Upgrade", "websocket")
  91. writer.WriteHeader(http.StatusSwitchingProtocols)
  92. if flusher, isFlusher := writer.(httpFlusher); isFlusher {
  93. err := flusher.FlushError()
  94. if err != nil {
  95. s.invalidRequest(writer, request, http.StatusInternalServerError, E.New("flush response"))
  96. }
  97. }
  98. hijacker, canHijack := writer.(http.Hijacker)
  99. if !canHijack {
  100. s.invalidRequest(writer, request, http.StatusInternalServerError, E.New("invalid connection, maybe HTTP/2"))
  101. return
  102. }
  103. conn, _, err := hijacker.Hijack()
  104. if err != nil {
  105. s.invalidRequest(writer, request, http.StatusInternalServerError, E.Cause(err, "hijack failed"))
  106. return
  107. }
  108. s.handler.NewConnectionEx(v2rayhttp.DupContext(request.Context()), conn, sHttp.SourceAddress(request), M.Socksaddr{}, nil)
  109. }
  110. func (s *Server) invalidRequest(writer http.ResponseWriter, request *http.Request, statusCode int, err error) {
  111. if statusCode > 0 {
  112. writer.WriteHeader(statusCode)
  113. }
  114. s.logger.ErrorContext(request.Context(), E.Cause(err, "process connection from ", request.RemoteAddr))
  115. }
  116. func (s *Server) Network() []string {
  117. return []string{N.NetworkTCP}
  118. }
  119. func (s *Server) Serve(listener net.Listener) error {
  120. if s.tlsConfig != nil {
  121. if len(s.tlsConfig.NextProtos()) == 0 {
  122. s.tlsConfig.SetNextProtos([]string{"http/1.1"})
  123. }
  124. listener = aTLS.NewListener(listener, s.tlsConfig)
  125. }
  126. return s.httpServer.Serve(listener)
  127. }
  128. func (s *Server) ServePacket(listener net.PacketConn) error {
  129. return os.ErrInvalid
  130. }
  131. func (s *Server) Close() error {
  132. return common.Close(common.PtrOrNil(s.httpServer))
  133. }