server.go 8.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305
  1. package http
  2. import (
  3. "io"
  4. "net"
  5. "net/http"
  6. "strconv"
  7. "strings"
  8. "sync"
  9. "v2ray.com/core/app"
  10. "v2ray.com/core/app/dispatcher"
  11. "v2ray.com/core/common"
  12. "v2ray.com/core/common/buf"
  13. "v2ray.com/core/common/bufio"
  14. "v2ray.com/core/common/errors"
  15. "v2ray.com/core/common/log"
  16. v2net "v2ray.com/core/common/net"
  17. "v2ray.com/core/common/serial"
  18. "v2ray.com/core/common/signal"
  19. "v2ray.com/core/proxy"
  20. "v2ray.com/core/transport/internet"
  21. )
  22. // Server is a HTTP proxy server.
  23. type Server struct {
  24. sync.Mutex
  25. accepting bool
  26. packetDispatcher dispatcher.PacketDispatcher
  27. config *ServerConfig
  28. tcpListener *internet.TCPHub
  29. meta *proxy.InboundHandlerMeta
  30. }
  31. // NewServer creates a new HTTP inbound handler.
  32. func NewServer(config *ServerConfig, packetDispatcher dispatcher.PacketDispatcher, meta *proxy.InboundHandlerMeta) *Server {
  33. return &Server{
  34. packetDispatcher: packetDispatcher,
  35. config: config,
  36. meta: meta,
  37. }
  38. }
  39. // Port implements InboundHandler.Port().
  40. func (v *Server) Port() v2net.Port {
  41. return v.meta.Port
  42. }
  43. // Close implements InboundHandler.Close().
  44. func (v *Server) Close() {
  45. v.accepting = false
  46. if v.tcpListener != nil {
  47. v.Lock()
  48. v.tcpListener.Close()
  49. v.tcpListener = nil
  50. v.Unlock()
  51. }
  52. }
  53. // Start implements InboundHandler.Start().
  54. func (v *Server) Start() error {
  55. if v.accepting {
  56. return nil
  57. }
  58. tcpListener, err := internet.ListenTCP(v.meta.Address, v.meta.Port, v.handleConnection, v.meta.StreamSettings)
  59. if err != nil {
  60. log.Error("HTTP: Failed listen on ", v.meta.Address, ":", v.meta.Port, ": ", err)
  61. return err
  62. }
  63. v.Lock()
  64. v.tcpListener = tcpListener
  65. v.Unlock()
  66. v.accepting = true
  67. return nil
  68. }
  69. func parseHost(rawHost string, defaultPort v2net.Port) (v2net.Destination, error) {
  70. port := defaultPort
  71. host, rawPort, err := net.SplitHostPort(rawHost)
  72. if err != nil {
  73. if addrError, ok := err.(*net.AddrError); ok && strings.Contains(addrError.Err, "missing port") {
  74. host = rawHost
  75. } else {
  76. return v2net.Destination{}, err
  77. }
  78. } else {
  79. intPort, err := strconv.Atoi(rawPort)
  80. if err != nil {
  81. return v2net.Destination{}, err
  82. }
  83. port = v2net.Port(intPort)
  84. }
  85. if ip := net.ParseIP(host); ip != nil {
  86. return v2net.TCPDestination(v2net.IPAddress(ip), port), nil
  87. }
  88. return v2net.TCPDestination(v2net.DomainAddress(host), port), nil
  89. }
  90. func (v *Server) handleConnection(conn internet.Connection) {
  91. defer conn.Close()
  92. conn.SetReusable(false)
  93. timedReader := v2net.NewTimeOutReader(v.config.Timeout, conn)
  94. reader := bufio.OriginalReaderSize(timedReader, 2048)
  95. request, err := http.ReadRequest(reader)
  96. if err != nil {
  97. if errors.Cause(err) != io.EOF {
  98. log.Warning("HTTP: Failed to read http request: ", err)
  99. }
  100. return
  101. }
  102. log.Info("HTTP: Request to Method [", request.Method, "] Host [", request.Host, "] with URL [", request.URL, "]")
  103. defaultPort := v2net.Port(80)
  104. if strings.ToLower(request.URL.Scheme) == "https" {
  105. defaultPort = v2net.Port(443)
  106. }
  107. host := request.Host
  108. if len(host) == 0 {
  109. host = request.URL.Host
  110. }
  111. dest, err := parseHost(host, defaultPort)
  112. if err != nil {
  113. log.Warning("HTTP: Malformed proxy host (", host, "): ", err)
  114. return
  115. }
  116. log.Access(conn.RemoteAddr(), request.URL, log.AccessAccepted, "")
  117. session := &proxy.SessionInfo{
  118. Source: v2net.DestinationFromAddr(conn.RemoteAddr()),
  119. Destination: dest,
  120. Inbound: v.meta,
  121. }
  122. if strings.ToUpper(request.Method) == "CONNECT" {
  123. v.handleConnect(request, session, reader, conn)
  124. } else {
  125. v.handlePlainHTTP(request, session, reader, conn)
  126. }
  127. }
  128. func (v *Server) handleConnect(request *http.Request, session *proxy.SessionInfo, reader io.Reader, writer io.Writer) {
  129. response := &http.Response{
  130. Status: "200 OK",
  131. StatusCode: 200,
  132. Proto: "HTTP/1.1",
  133. ProtoMajor: 1,
  134. ProtoMinor: 1,
  135. Header: http.Header(make(map[string][]string)),
  136. Body: nil,
  137. ContentLength: 0,
  138. Close: false,
  139. }
  140. if err := response.Write(writer); err != nil {
  141. log.Warning("HTTP|Server: failed to write back OK response: ", err)
  142. return
  143. }
  144. ray := v.packetDispatcher.DispatchToOutbound(session)
  145. requestDone := signal.ExecuteAsync(func() error {
  146. defer ray.InboundInput().Close()
  147. v2reader := buf.NewReader(reader)
  148. if err := buf.PipeUntilEOF(v2reader, ray.InboundInput()); err != nil {
  149. return err
  150. }
  151. return nil
  152. })
  153. responseDone := signal.ExecuteAsync(func() error {
  154. defer ray.InboundOutput().ForceClose()
  155. v2writer := buf.NewWriter(writer)
  156. if err := buf.PipeUntilEOF(ray.InboundOutput(), v2writer); err != nil {
  157. return err
  158. }
  159. return nil
  160. })
  161. signal.ErrorOrFinish2(requestDone, responseDone)
  162. }
  163. // @VisibleForTesting
  164. func StripHopByHopHeaders(request *http.Request) {
  165. // Strip hop-by-hop header basaed on RFC:
  166. // http://www.w3.org/Protocols/rfc2616/rfc2616-sec13.html#sec13.5.1
  167. // https://www.mnot.net/blog/2011/07/11/what_proxies_must_do
  168. request.Header.Del("Proxy-Connection")
  169. request.Header.Del("Proxy-Authenticate")
  170. request.Header.Del("Proxy-Authorization")
  171. request.Header.Del("TE")
  172. request.Header.Del("Trailers")
  173. request.Header.Del("Transfer-Encoding")
  174. request.Header.Del("Upgrade")
  175. // TODO: support keep-alive
  176. connections := request.Header.Get("Connection")
  177. request.Header.Set("Connection", "close")
  178. if len(connections) == 0 {
  179. return
  180. }
  181. for _, h := range strings.Split(connections, ",") {
  182. request.Header.Del(strings.TrimSpace(h))
  183. }
  184. }
  185. func (v *Server) GenerateResponse(statusCode int, status string) *http.Response {
  186. hdr := http.Header(make(map[string][]string))
  187. hdr.Set("Connection", "close")
  188. return &http.Response{
  189. Status: status,
  190. StatusCode: statusCode,
  191. Proto: "HTTP/1.1",
  192. ProtoMajor: 1,
  193. ProtoMinor: 1,
  194. Header: hdr,
  195. Body: nil,
  196. ContentLength: 0,
  197. Close: true,
  198. }
  199. }
  200. func (v *Server) handlePlainHTTP(request *http.Request, session *proxy.SessionInfo, reader io.Reader, writer io.Writer) {
  201. if len(request.URL.Host) <= 0 {
  202. response := v.GenerateResponse(400, "Bad Request")
  203. response.Write(writer)
  204. return
  205. }
  206. request.Host = request.URL.Host
  207. StripHopByHopHeaders(request)
  208. ray := v.packetDispatcher.DispatchToOutbound(session)
  209. input := ray.InboundInput()
  210. output := ray.InboundOutput()
  211. defer input.Close()
  212. defer output.ForceClose()
  213. requestDone := signal.ExecuteAsync(func() error {
  214. defer input.Close()
  215. requestWriter := bufio.NewWriter(buf.NewBytesWriter(ray.InboundInput()))
  216. err := request.Write(requestWriter)
  217. if err != nil {
  218. return err
  219. }
  220. if err := requestWriter.Flush(); err != nil {
  221. return err
  222. }
  223. return nil
  224. })
  225. responseDone := signal.ExecuteAsync(func() error {
  226. defer output.ForceClose()
  227. responseReader := bufio.OriginalReader(buf.NewBytesReader(ray.InboundOutput()))
  228. response, err := http.ReadResponse(responseReader, request)
  229. if err != nil {
  230. log.Warning("HTTP: Failed to read response: ", err)
  231. response = v.GenerateResponse(503, "Service Unavailable")
  232. }
  233. responseWriter := bufio.NewWriter(writer)
  234. if err := response.Write(responseWriter); err != nil {
  235. return err
  236. }
  237. if err := responseWriter.Flush(); err != nil {
  238. return err
  239. }
  240. return nil
  241. })
  242. if err := signal.ErrorOrFinish2(requestDone, responseDone); err != nil {
  243. log.Info("HTTP|Server: Connecton ending with ", err)
  244. }
  245. }
  246. // ServerFactory is a InboundHandlerFactory.
  247. type ServerFactory struct{}
  248. // StreamCapability implements InboundHandlerFactory.StreamCapability().
  249. func (v *ServerFactory) StreamCapability() v2net.NetworkList {
  250. return v2net.NetworkList{
  251. Network: []v2net.Network{v2net.Network_TCP},
  252. }
  253. }
  254. // Create implements InboundHandlerFactory.Create().
  255. func (v *ServerFactory) Create(space app.Space, rawConfig interface{}, meta *proxy.InboundHandlerMeta) (proxy.InboundHandler, error) {
  256. if !space.HasApp(dispatcher.APP_ID) {
  257. return nil, common.ErrBadConfiguration
  258. }
  259. return NewServer(
  260. rawConfig.(*ServerConfig),
  261. space.GetApp(dispatcher.APP_ID).(dispatcher.PacketDispatcher),
  262. meta), nil
  263. }
  264. func init() {
  265. common.Must(proxy.RegisterInboundHandlerCreator(serial.GetMessageType(new(ServerConfig)), new(ServerFactory)))
  266. }