1
0

server.go 7.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348
  1. package lib
  2. import (
  3. "errors"
  4. "fmt"
  5. "github.com/astaxie/beego"
  6. "github.com/astaxie/beego/session"
  7. "io/ioutil"
  8. "log"
  9. "net"
  10. "net/http"
  11. "strings"
  12. )
  13. var GlobalHostSessions *session.Manager
  14. const (
  15. VERIFY_EER = "vkey"
  16. WORK_MAIN = "main"
  17. WORK_CHAN = "chan"
  18. RES_SIGN = "sign"
  19. RES_MSG = "msg0"
  20. TEST_FLAG = "tst"
  21. CONN_TCP = "tcp"
  22. CONN_UDP = "udp"
  23. Unauthorized_BYTES = `HTTP/1.1 401 Unauthorized
  24. Content-Type: text/plain; charset=utf-8
  25. WWW-Authenticate: Basic realm="easyProxy"
  26. 401 Unauthorized`
  27. )
  28. type HttpModeServer struct {
  29. bridge *Tunnel
  30. httpPort int
  31. enCompress int
  32. deCompress int
  33. vKey string
  34. crypt bool
  35. }
  36. func NewHttpModeServer(httpPort int, bridge *Tunnel, enCompress int, deCompress int, vKey string, crypt bool) *HttpModeServer {
  37. s := new(HttpModeServer)
  38. s.bridge = bridge
  39. s.httpPort = httpPort
  40. s.enCompress = enCompress
  41. s.deCompress = deCompress
  42. s.vKey = vKey
  43. s.crypt = crypt
  44. return s
  45. }
  46. //开始
  47. func (s *HttpModeServer) Start() {
  48. http.HandleFunc("/", func(w http.ResponseWriter, r *http.Request) {
  49. retry:
  50. u := beego.AppConfig.String("basic.user")
  51. p := beego.AppConfig.String("basic.password")
  52. if u != "" && p != "" && !checkAuth(r, u, p) {
  53. w.Header().Set("WWW-Authenticate", `Basic realm="easyProxy""`)
  54. w.WriteHeader(401)
  55. w.Write([]byte("401 Unauthorized\n"))
  56. return
  57. }
  58. err, conn := s.bridge.GetSignal(getverifyval(s.vKey))
  59. if err != nil {
  60. BadRequest(w)
  61. return
  62. }
  63. if err := s.writeRequest(r, conn); err != nil {
  64. log.Println("write request to client error:", err)
  65. conn.Close()
  66. goto retry
  67. return
  68. }
  69. err = s.writeResponse(w, conn)
  70. if err != nil {
  71. log.Println("write response error:", err)
  72. conn.Close()
  73. goto retry
  74. return
  75. }
  76. s.bridge.ReturnSignal(conn, getverifyval(s.vKey))
  77. })
  78. log.Fatalln(http.ListenAndServe(fmt.Sprintf(":%d", s.httpPort), nil))
  79. }
  80. //req转为bytes发送给client端
  81. func (s *HttpModeServer) writeRequest(r *http.Request, conn *Conn) error {
  82. raw, err := EncodeRequest(r)
  83. if err != nil {
  84. return err
  85. }
  86. conn.wSign()
  87. conn.WriteConnInfo(s.enCompress, s.deCompress, s.crypt)
  88. c, err := conn.WriteCompress(raw, s.enCompress)
  89. if err != nil {
  90. return err
  91. }
  92. if c != len(raw) {
  93. return errors.New("写出长度与字节长度不一致。")
  94. }
  95. return nil
  96. }
  97. //从client读取出Response
  98. func (s *HttpModeServer) writeResponse(w http.ResponseWriter, c *Conn) error {
  99. flags, err := c.ReadFlag()
  100. if err != nil {
  101. return err
  102. }
  103. switch flags {
  104. case RES_SIGN:
  105. buf := make([]byte, 1024*1024*32)
  106. n, err := c.ReadFromCompress(buf, s.deCompress)
  107. if err != nil {
  108. return err
  109. }
  110. resp, err := DecodeResponse(buf[:n])
  111. if err != nil {
  112. return err
  113. }
  114. bodyBytes, err := ioutil.ReadAll(resp.Body)
  115. if err != nil {
  116. return err
  117. }
  118. for k, v := range resp.Header {
  119. for _, v2 := range v {
  120. w.Header().Set(k, v2)
  121. }
  122. }
  123. w.WriteHeader(resp.StatusCode)
  124. w.Write(bodyBytes)
  125. case RES_MSG:
  126. BadRequest(w)
  127. return errors.New("客户端请求出错")
  128. default:
  129. BadRequest(w)
  130. return errors.New("无法解析此错误")
  131. }
  132. return nil
  133. }
  134. type process func(c *Conn, s *TunnelModeServer) error
  135. type TunnelModeServer struct {
  136. httpPort int
  137. tunnelTarget string
  138. process process
  139. bridge *Tunnel
  140. listener *net.TCPListener
  141. enCompress int
  142. deCompress int
  143. basicUser string
  144. basicPassword string
  145. vKey string
  146. crypt bool
  147. }
  148. func NewTunnelModeServer(httpPort int, tunnelTarget string, process process, bridge *Tunnel, enCompress, deCompress int, vKey, basicUser, basicPasswd string, crypt bool) *TunnelModeServer {
  149. s := new(TunnelModeServer)
  150. s.httpPort = httpPort
  151. s.bridge = bridge
  152. s.tunnelTarget = tunnelTarget
  153. s.process = process
  154. s.enCompress = enCompress
  155. s.deCompress = deCompress
  156. s.vKey = vKey
  157. s.basicUser = basicUser
  158. s.basicPassword = basicPasswd
  159. s.crypt = crypt
  160. return s
  161. }
  162. //开始
  163. func (s *TunnelModeServer) Start() error {
  164. s.listener, err = net.ListenTCP("tcp", &net.TCPAddr{net.ParseIP("0.0.0.0"), s.httpPort, ""})
  165. if err != nil {
  166. return err
  167. }
  168. for {
  169. conn, err := s.listener.AcceptTCP()
  170. if err != nil {
  171. if strings.Contains(err.Error(), "use of closed network connection") {
  172. break
  173. }
  174. log.Println(err)
  175. continue
  176. }
  177. go s.process(NewConn(conn), s)
  178. }
  179. return nil
  180. }
  181. func (s *TunnelModeServer) auth(r *http.Request, c *Conn) error {
  182. if s.basicUser != "" && s.basicPassword != "" && !checkAuth(r, s.basicUser, s.basicPassword) {
  183. c.Write([]byte(Unauthorized_BYTES))
  184. c.Close()
  185. return errors.New("401 Unauthorized")
  186. }
  187. return nil
  188. }
  189. func (s *TunnelModeServer) Close() error {
  190. return s.listener.Close()
  191. }
  192. //tcp隧道模式
  193. func ProcessTunnel(c *Conn, s *TunnelModeServer) error {
  194. link, err := s.bridge.GetTunnel(getverifyval(s.vKey), s.enCompress, s.deCompress, s.crypt)
  195. if err != nil {
  196. log.Println(err)
  197. c.Close()
  198. return err
  199. }
  200. if _, err := link.WriteHost(CONN_TCP, s.tunnelTarget); err != nil {
  201. link.Close()
  202. c.Close()
  203. log.Println(err)
  204. return err
  205. }
  206. go relay(link, c, s.enCompress, s.crypt)
  207. relay(c, link, s.deCompress, s.crypt)
  208. return nil
  209. }
  210. //http代理模式
  211. func ProcessHttp(c *Conn, s *TunnelModeServer) error {
  212. method, addr, rb, err, r := c.GetHost()
  213. if err != nil {
  214. c.Close()
  215. return err
  216. }
  217. if err := s.auth(r, c); err != nil {
  218. return err
  219. }
  220. link, err := s.bridge.GetTunnel(getverifyval(s.vKey), s.enCompress, s.deCompress, s.crypt)
  221. if err != nil {
  222. log.Println(err)
  223. c.Close()
  224. return err
  225. }
  226. if _, err := link.WriteHost(CONN_TCP, addr); err != nil {
  227. c.Close()
  228. link.Close()
  229. log.Println(err)
  230. return err
  231. }
  232. if method == "CONNECT" {
  233. fmt.Fprint(c, "HTTP/1.1 200 Connection established\r\n")
  234. } else {
  235. link.WriteCompress(rb, s.enCompress)
  236. }
  237. go relay(link, c, s.enCompress, s.crypt)
  238. relay(c, link, s.deCompress, s.crypt)
  239. return nil
  240. }
  241. //多客户端域名代理
  242. func ProcessHost(c *Conn, s *TunnelModeServer) error {
  243. method, addr, rb, err, r := c.GetHost()
  244. if err != nil {
  245. c.Close()
  246. return err
  247. }
  248. if err := s.auth(r, c); err != nil {
  249. return err
  250. }
  251. host, task, err := getKeyByHost(addr)
  252. if err != nil {
  253. c.Close()
  254. return err
  255. }
  256. de, en := getCompressType(task.Compress)
  257. link, err := s.bridge.GetTunnel(getverifyval(host.Vkey), en, de, s.crypt)
  258. if err != nil {
  259. log.Println(err)
  260. c.Close()
  261. return err
  262. }
  263. if _, err := link.WriteHost(CONN_TCP, host.Target); err != nil {
  264. c.Close()
  265. link.Close()
  266. log.Println(err)
  267. return err
  268. }
  269. if method == "CONNECT" {
  270. fmt.Fprint(c, "HTTP/1.1 200 Connection established\r\n")
  271. } else {
  272. link.WriteCompress(rb, en)
  273. }
  274. go relay(link, c, en, s.crypt)
  275. relay(c, link, de, s.crypt)
  276. return nil
  277. }
  278. //web管理方式
  279. type WebServer struct {
  280. bridge *Tunnel
  281. }
  282. //开始
  283. func (s *WebServer) Start() {
  284. InitFromCsv()
  285. p, _ := beego.AppConfig.Int("hostPort")
  286. t := &TaskList{
  287. TcpPort: p,
  288. Mode: "httpHostServer",
  289. Target: "",
  290. VerifyKey: "",
  291. U: "",
  292. P: "",
  293. Compress: "",
  294. Start: 1,
  295. IsRun: 0,
  296. ClientStatus: 0,
  297. }
  298. AddTask(t)
  299. beego.BConfig.WebConfig.Session.SessionOn = true
  300. log.Println("web管理启动,访问端口为", beego.AppConfig.String("httpport"))
  301. beego.Run()
  302. }
  303. func NewWebServer(bridge *Tunnel) *WebServer {
  304. s := new(WebServer)
  305. s.bridge = bridge
  306. return s
  307. }
  308. //host
  309. type HostServer struct {
  310. crypt bool
  311. }
  312. //开始
  313. func (s *HostServer) Start() error {
  314. return nil
  315. }
  316. //TODO:host模式的客户端,无需指定和监听端口等
  317. func NewHostServer(crypt bool) *HostServer {
  318. s := new(HostServer)
  319. s.crypt = crypt
  320. return s
  321. }
  322. func (s *HostServer) Close() error {
  323. return nil
  324. }