https.go 5.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204
  1. package transport
  2. import (
  3. "bytes"
  4. "context"
  5. "io"
  6. "net"
  7. "net/http"
  8. "net/url"
  9. "strconv"
  10. "github.com/sagernet/sing-box/adapter"
  11. "github.com/sagernet/sing-box/common/tls"
  12. C "github.com/sagernet/sing-box/constant"
  13. "github.com/sagernet/sing-box/dns"
  14. "github.com/sagernet/sing-box/log"
  15. "github.com/sagernet/sing-box/option"
  16. "github.com/sagernet/sing/common"
  17. "github.com/sagernet/sing/common/buf"
  18. E "github.com/sagernet/sing/common/exceptions"
  19. "github.com/sagernet/sing/common/logger"
  20. M "github.com/sagernet/sing/common/metadata"
  21. N "github.com/sagernet/sing/common/network"
  22. aTLS "github.com/sagernet/sing/common/tls"
  23. sHTTP "github.com/sagernet/sing/protocol/http"
  24. mDNS "github.com/miekg/dns"
  25. "golang.org/x/net/http2"
  26. )
  27. const MimeType = "application/dns-message"
  28. var _ adapter.DNSTransport = (*HTTPSTransport)(nil)
  29. func RegisterHTTPS(registry *dns.TransportRegistry) {
  30. dns.RegisterTransport[option.RemoteHTTPSDNSServerOptions](registry, C.DNSTypeHTTPS, NewHTTPS)
  31. }
  32. type HTTPSTransport struct {
  33. dns.TransportAdapter
  34. logger logger.ContextLogger
  35. dialer N.Dialer
  36. destination *url.URL
  37. headers http.Header
  38. transport *http.Transport
  39. }
  40. func NewHTTPS(ctx context.Context, logger log.ContextLogger, tag string, options option.RemoteHTTPSDNSServerOptions) (adapter.DNSTransport, error) {
  41. transportDialer, err := dns.NewRemoteDialer(ctx, options.RemoteDNSServerOptions)
  42. if err != nil {
  43. return nil, err
  44. }
  45. tlsOptions := common.PtrValueOrDefault(options.TLS)
  46. tlsOptions.Enabled = true
  47. tlsConfig, err := tls.NewClient(ctx, options.Server, tlsOptions)
  48. if err != nil {
  49. return nil, err
  50. }
  51. if common.Error(tlsConfig.Config()) == nil && !common.Contains(tlsConfig.NextProtos(), http2.NextProtoTLS) {
  52. tlsConfig.SetNextProtos(append(tlsConfig.NextProtos(), http2.NextProtoTLS))
  53. }
  54. if !common.Contains(tlsConfig.NextProtos(), "http/1.1") {
  55. tlsConfig.SetNextProtos(append(tlsConfig.NextProtos(), "http/1.1"))
  56. }
  57. headers := options.Headers.Build()
  58. host := headers.Get("Host")
  59. if host != "" {
  60. headers.Del("Host")
  61. } else {
  62. if tlsConfig.ServerName() != "" {
  63. host = tlsConfig.ServerName()
  64. } else {
  65. host = options.Server
  66. }
  67. }
  68. destinationURL := url.URL{
  69. Scheme: "https",
  70. Host: host,
  71. }
  72. if destinationURL.Host == "" {
  73. destinationURL.Host = options.Server
  74. }
  75. if options.ServerPort != 0 && options.ServerPort != 443 {
  76. destinationURL.Host = net.JoinHostPort(destinationURL.Host, strconv.Itoa(int(options.ServerPort)))
  77. }
  78. path := options.Path
  79. if path == "" {
  80. path = "/dns-query"
  81. }
  82. err = sHTTP.URLSetPath(&destinationURL, path)
  83. if err != nil {
  84. return nil, err
  85. }
  86. serverAddr := options.DNSServerAddressOptions.Build()
  87. if serverAddr.Port == 0 {
  88. serverAddr.Port = 443
  89. }
  90. return NewHTTPSRaw(
  91. dns.NewTransportAdapterWithRemoteOptions(C.DNSTypeHTTPS, tag, options.RemoteDNSServerOptions),
  92. logger,
  93. transportDialer,
  94. &destinationURL,
  95. headers,
  96. serverAddr,
  97. tlsConfig,
  98. ), nil
  99. }
  100. func NewHTTPSRaw(
  101. adapter dns.TransportAdapter,
  102. logger log.ContextLogger,
  103. dialer N.Dialer,
  104. destination *url.URL,
  105. headers http.Header,
  106. serverAddr M.Socksaddr,
  107. tlsConfig tls.Config,
  108. ) *HTTPSTransport {
  109. var transport *http.Transport
  110. if tlsConfig != nil {
  111. transport = &http.Transport{
  112. ForceAttemptHTTP2: true,
  113. DialTLSContext: func(ctx context.Context, network, addr string) (net.Conn, error) {
  114. tcpConn, hErr := dialer.DialContext(ctx, network, serverAddr)
  115. if hErr != nil {
  116. return nil, hErr
  117. }
  118. tlsConn, hErr := aTLS.ClientHandshake(ctx, tcpConn, tlsConfig)
  119. if hErr != nil {
  120. tcpConn.Close()
  121. return nil, hErr
  122. }
  123. return tlsConn, nil
  124. },
  125. }
  126. } else {
  127. transport = &http.Transport{
  128. DialContext: func(ctx context.Context, network, addr string) (net.Conn, error) {
  129. return dialer.DialContext(ctx, network, serverAddr)
  130. },
  131. }
  132. }
  133. return &HTTPSTransport{
  134. TransportAdapter: adapter,
  135. logger: logger,
  136. dialer: dialer,
  137. destination: destination,
  138. headers: headers,
  139. transport: transport,
  140. }
  141. }
  142. func (t *HTTPSTransport) Reset() {
  143. t.transport.CloseIdleConnections()
  144. t.transport = t.transport.Clone()
  145. }
  146. func (t *HTTPSTransport) Exchange(ctx context.Context, message *mDNS.Msg) (*mDNS.Msg, error) {
  147. exMessage := *message
  148. exMessage.Id = 0
  149. exMessage.Compress = true
  150. requestBuffer := buf.NewSize(1 + message.Len())
  151. rawMessage, err := exMessage.PackBuffer(requestBuffer.FreeBytes())
  152. if err != nil {
  153. requestBuffer.Release()
  154. return nil, err
  155. }
  156. request, err := http.NewRequestWithContext(ctx, http.MethodPost, t.destination.String(), bytes.NewReader(rawMessage))
  157. if err != nil {
  158. requestBuffer.Release()
  159. return nil, err
  160. }
  161. request.Header = t.headers.Clone()
  162. request.Header.Set("Content-Type", MimeType)
  163. request.Header.Set("Accept", MimeType)
  164. response, err := t.transport.RoundTrip(request)
  165. requestBuffer.Release()
  166. if err != nil {
  167. return nil, err
  168. }
  169. defer response.Body.Close()
  170. if response.StatusCode != http.StatusOK {
  171. return nil, E.New("unexpected status: ", response.Status)
  172. }
  173. var responseMessage mDNS.Msg
  174. if response.ContentLength > 0 {
  175. responseBuffer := buf.NewSize(int(response.ContentLength))
  176. _, err = responseBuffer.ReadFullFrom(response.Body, int(response.ContentLength))
  177. if err != nil {
  178. return nil, err
  179. }
  180. err = responseMessage.Unpack(responseBuffer.Bytes())
  181. responseBuffer.Release()
  182. } else {
  183. rawMessage, err = io.ReadAll(response.Body)
  184. if err != nil {
  185. return nil, err
  186. }
  187. err = responseMessage.Unpack(rawMessage)
  188. }
  189. if err != nil {
  190. return nil, err
  191. }
  192. return &responseMessage, nil
  193. }