sing-box/transport/v2raygrpclite/server.go

121 lines
3.3 KiB
Go
Raw Normal View History

2022-08-27 13:05:15 +00:00
package v2raygrpclite
import (
"context"
"fmt"
"net"
"net/http"
"net/url"
"os"
"strings"
"github.com/sagernet/sing-box/adapter"
2022-09-09 10:45:10 +00:00
"github.com/sagernet/sing-box/common/tls"
2022-08-27 13:05:15 +00:00
"github.com/sagernet/sing-box/option"
"github.com/sagernet/sing/common"
E "github.com/sagernet/sing/common/exceptions"
M "github.com/sagernet/sing/common/metadata"
N "github.com/sagernet/sing/common/network"
sHttp "github.com/sagernet/sing/protocol/http"
"golang.org/x/net/http2"
2022-11-09 03:49:01 +00:00
"golang.org/x/net/http2/h2c"
2022-08-27 13:05:15 +00:00
)
var _ adapter.V2RayServerTransport = (*Server)(nil)
type Server struct {
handler N.TCPConnectionHandler
errorHandler E.Handler
httpServer *http.Server
2022-11-09 03:49:01 +00:00
h2Server *http2.Server
h2cHandler http.Handler
2022-08-27 13:05:15 +00:00
path string
}
func (s *Server) Network() []string {
return []string{N.NetworkTCP}
}
func NewServer(ctx context.Context, options option.V2RayGRPCOptions, tlsConfig tls.ServerConfig, handler N.TCPConnectionHandler, errorHandler E.Handler) (*Server, error) {
2022-08-27 13:05:15 +00:00
server := &Server{
handler: handler,
errorHandler: errorHandler,
path: fmt.Sprintf("/%s/Tun", url.QueryEscape(options.ServiceName)),
2022-11-09 03:49:01 +00:00
h2Server: new(http2.Server),
2022-08-27 13:05:15 +00:00
}
2022-09-09 10:45:10 +00:00
server.httpServer = &http.Server{
Handler: server,
}
2022-11-09 03:49:01 +00:00
server.h2cHandler = h2c.NewHandler(server, server.h2Server)
2022-08-27 13:05:15 +00:00
if tlsConfig != nil {
2022-09-09 10:45:10 +00:00
stdConfig, err := tlsConfig.Config()
if err != nil {
return nil, err
2022-08-27 13:05:15 +00:00
}
2022-11-26 06:46:20 +00:00
if len(stdConfig.NextProtos) == 0 {
stdConfig.NextProtos = []string{http2.NextProtoTLS}
2022-09-09 10:45:10 +00:00
}
server.httpServer.TLSConfig = stdConfig
2022-08-27 13:05:15 +00:00
}
2022-09-09 10:45:10 +00:00
return server, nil
2022-08-27 13:05:15 +00:00
}
func (s *Server) ServeHTTP(writer http.ResponseWriter, request *http.Request) {
2022-11-09 03:49:01 +00:00
if request.Method == "PRI" && len(request.Header) == 0 && request.URL.Path == "*" && request.Proto == "HTTP/2.0" {
s.h2cHandler.ServeHTTP(writer, request)
return
}
2022-08-27 13:05:15 +00:00
if request.URL.Path != s.path {
2022-11-09 03:49:01 +00:00
request.Write(os.Stdout)
2022-08-27 13:05:15 +00:00
writer.WriteHeader(http.StatusNotFound)
s.badRequest(request, E.New("bad path: ", request.URL.Path))
return
}
if request.Method != http.MethodPost {
writer.WriteHeader(http.StatusNotFound)
s.badRequest(request, E.New("bad method: ", request.Method))
return
}
if ct := request.Header.Get("Content-Type"); !strings.HasPrefix(ct, "application/grpc") {
writer.WriteHeader(http.StatusNotFound)
s.badRequest(request, E.New("bad content type: ", ct))
return
}
writer.Header().Set("Content-Type", "application/grpc")
writer.Header().Set("TE", "trailers")
writer.WriteHeader(http.StatusOK)
var metadata M.Metadata
metadata.Source = sHttp.SourceAddress(request)
conn := newGunConn(request.Body, writer, writer.(http.Flusher))
s.handler.NewConnection(request.Context(), conn, metadata)
}
func (s *Server) badRequest(request *http.Request, err error) {
s.errorHandler.NewError(request.Context(), E.Cause(err, "process connection from ", request.RemoteAddr))
}
func (s *Server) Serve(listener net.Listener) error {
2022-11-26 06:46:20 +00:00
fixTLSConfig := s.httpServer.TLSConfig == nil
2022-11-09 03:49:01 +00:00
err := http2.ConfigureServer(s.httpServer, s.h2Server)
if err != nil {
return err
}
2022-11-26 06:46:20 +00:00
if fixTLSConfig {
s.httpServer.TLSConfig = nil
}
2022-08-27 13:05:15 +00:00
if s.httpServer.TLSConfig == nil {
return s.httpServer.Serve(listener)
} else {
return s.httpServer.ServeTLS(listener, "", "")
}
}
func (s *Server) ServePacket(listener net.PacketConn) error {
return os.ErrInvalid
}
func (s *Server) Close() error {
return common.Close(common.PtrOrNil(s.httpServer))
}