server.go 4.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139
  1. package v2rayhttpupgrade
  2. import (
  3. "context"
  4. "net"
  5. "net/http"
  6. "os"
  7. "strings"
  8. "github.com/sagernet/sing-box/adapter"
  9. "github.com/sagernet/sing-box/common/tls"
  10. C "github.com/sagernet/sing-box/constant"
  11. "github.com/sagernet/sing-box/option"
  12. "github.com/sagernet/sing/common"
  13. E "github.com/sagernet/sing/common/exceptions"
  14. M "github.com/sagernet/sing/common/metadata"
  15. N "github.com/sagernet/sing/common/network"
  16. aTLS "github.com/sagernet/sing/common/tls"
  17. sHttp "github.com/sagernet/sing/protocol/http"
  18. )
  19. var _ adapter.V2RayServerTransport = (*Server)(nil)
  20. type Server struct {
  21. ctx context.Context
  22. tlsConfig tls.ServerConfig
  23. handler adapter.V2RayServerTransportHandler
  24. httpServer *http.Server
  25. host string
  26. path string
  27. headers http.Header
  28. }
  29. func NewServer(ctx context.Context, options option.V2RayHTTPUpgradeOptions, tlsConfig tls.ServerConfig, handler adapter.V2RayServerTransportHandler) (*Server, error) {
  30. server := &Server{
  31. ctx: ctx,
  32. tlsConfig: tlsConfig,
  33. handler: handler,
  34. host: options.Host,
  35. path: options.Path,
  36. headers: options.Headers.Build(),
  37. }
  38. if !strings.HasPrefix(server.path, "/") {
  39. server.path = "/" + server.path
  40. }
  41. server.httpServer = &http.Server{
  42. Handler: server,
  43. ReadHeaderTimeout: C.TCPTimeout,
  44. MaxHeaderBytes: http.DefaultMaxHeaderBytes,
  45. BaseContext: func(net.Listener) context.Context {
  46. return ctx
  47. },
  48. TLSNextProto: make(map[string]func(*http.Server, *tls.STDConn, http.Handler)),
  49. }
  50. return server, nil
  51. }
  52. type httpFlusher interface {
  53. FlushError() error
  54. }
  55. func (s *Server) ServeHTTP(writer http.ResponseWriter, request *http.Request) {
  56. host := request.Host
  57. if len(s.host) > 0 && host != s.host {
  58. s.invalidRequest(writer, request, http.StatusBadRequest, E.New("bad host: ", host))
  59. return
  60. }
  61. if request.URL.Path != s.path {
  62. s.invalidRequest(writer, request, http.StatusNotFound, E.New("bad path: ", request.URL.Path))
  63. return
  64. }
  65. if request.Method != http.MethodGet {
  66. s.invalidRequest(writer, request, http.StatusNotFound, E.New("bad method: ", request.Method))
  67. return
  68. }
  69. if !strings.EqualFold(request.Header.Get("Connection"), "upgrade") {
  70. s.invalidRequest(writer, request, http.StatusNotFound, E.New("not a upgrade request"))
  71. return
  72. }
  73. if !strings.EqualFold(request.Header.Get("Upgrade"), "websocket") {
  74. s.invalidRequest(writer, request, http.StatusNotFound, E.New("not a websocket request"))
  75. return
  76. }
  77. if request.Header.Get("Sec-WebSocket-Key") != "" {
  78. s.invalidRequest(writer, request, http.StatusNotFound, E.New("real websocket request received"))
  79. return
  80. }
  81. writer.Header().Set("Connection", "upgrade")
  82. writer.Header().Set("Upgrade", "websocket")
  83. writer.WriteHeader(http.StatusSwitchingProtocols)
  84. if flusher, isFlusher := writer.(httpFlusher); isFlusher {
  85. err := flusher.FlushError()
  86. if err != nil {
  87. s.invalidRequest(writer, request, http.StatusInternalServerError, E.New("flush response"))
  88. }
  89. }
  90. hijacker, canHijack := writer.(http.Hijacker)
  91. if !canHijack {
  92. s.invalidRequest(writer, request, http.StatusInternalServerError, E.New("invalid connection, maybe HTTP/2"))
  93. return
  94. }
  95. conn, _, err := hijacker.Hijack()
  96. if err != nil {
  97. s.invalidRequest(writer, request, http.StatusInternalServerError, E.Cause(err, "hijack failed"))
  98. return
  99. }
  100. var metadata M.Metadata
  101. metadata.Source = sHttp.SourceAddress(request)
  102. s.handler.NewConnection(request.Context(), conn, metadata)
  103. }
  104. func (s *Server) invalidRequest(writer http.ResponseWriter, request *http.Request, statusCode int, err error) {
  105. if statusCode > 0 {
  106. writer.WriteHeader(statusCode)
  107. }
  108. s.handler.NewError(request.Context(), E.Cause(err, "process connection from ", request.RemoteAddr))
  109. }
  110. func (s *Server) Network() []string {
  111. return []string{N.NetworkTCP}
  112. }
  113. func (s *Server) Serve(listener net.Listener) error {
  114. if s.tlsConfig != nil {
  115. if len(s.tlsConfig.NextProtos()) == 0 {
  116. s.tlsConfig.SetNextProtos([]string{"http/1.1"})
  117. }
  118. listener = aTLS.NewListener(listener, s.tlsConfig)
  119. }
  120. return s.httpServer.Serve(listener)
  121. }
  122. func (s *Server) ServePacket(listener net.PacketConn) error {
  123. return os.ErrInvalid
  124. }
  125. func (s *Server) Close() error {
  126. return common.Close(common.PtrOrNil(s.httpServer))
  127. }