http.go 7.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294
  1. package proxy
  2. import (
  3. "bufio"
  4. "bytes"
  5. "crypto/tls"
  6. "github.com/cnlh/nps/bridge"
  7. "github.com/cnlh/nps/lib/common"
  8. "github.com/cnlh/nps/lib/conn"
  9. "github.com/cnlh/nps/lib/file"
  10. "github.com/cnlh/nps/server/connection"
  11. "github.com/cnlh/nps/vender/github.com/astaxie/beego"
  12. "github.com/cnlh/nps/vender/github.com/astaxie/beego/logs"
  13. "io"
  14. "net"
  15. "net/http"
  16. "net/http/httputil"
  17. "net/url"
  18. "os"
  19. "path/filepath"
  20. "strconv"
  21. "sync"
  22. )
  23. type httpServer struct {
  24. BaseServer
  25. httpPort int //http端口
  26. httpsPort int //https监听端口
  27. pemPath string
  28. keyPath string
  29. httpServer *http.Server
  30. httpsServer *http.Server
  31. httpsListener net.Listener
  32. }
  33. func NewHttp(bridge *bridge.Bridge, c *file.Tunnel) *httpServer {
  34. httpPort, _ := beego.AppConfig.Int("http_proxy_port")
  35. httpsPort, _ := beego.AppConfig.Int("https_proxy_port")
  36. pemPath := beego.AppConfig.String("pem_path")
  37. keyPath := beego.AppConfig.String("key_path")
  38. return &httpServer{
  39. BaseServer: BaseServer{
  40. task: c,
  41. bridge: bridge,
  42. Mutex: sync.Mutex{},
  43. },
  44. httpPort: httpPort,
  45. httpsPort: httpsPort,
  46. pemPath: pemPath,
  47. keyPath: keyPath,
  48. }
  49. }
  50. func (s *httpServer) processHttps(c net.Conn) {
  51. buf := make([]byte, 2048)
  52. n, err := c.Read(buf)
  53. if err != nil {
  54. return
  55. }
  56. var host *file.Host
  57. file.GetCsvDb().Hosts.Range(func(key, value interface{}) bool {
  58. v := value.(*file.Host)
  59. if v.Scheme != "https" && v.Scheme != "all" {
  60. return true
  61. }
  62. if bytes.Index(buf[:n], []byte(v.Host)) >= 0 && (host == nil || len(host.Host) < len(v.Host)) {
  63. host = v
  64. return false
  65. }
  66. return true
  67. })
  68. if host == nil {
  69. logs.Error("new https connection can't be parsed!", c.RemoteAddr().String())
  70. c.Close()
  71. return
  72. }
  73. var targetAddr string
  74. r := new(http.Request)
  75. r.RequestURI = "/"
  76. r.URL = new(url.URL)
  77. r.URL.Scheme = "https"
  78. r.Host = host.Host
  79. if err := s.CheckFlowAndConnNum(host.Client); err != nil {
  80. logs.Warn("client id %d, host id %d, error %s, when https connection", host.Client.Id, host.Id, err.Error())
  81. c.Close()
  82. return
  83. }
  84. defer host.Client.AddConn()
  85. if err = s.auth(r, conn.NewConn(c), host.Client.Cnf.U, host.Client.Cnf.P); err != nil {
  86. logs.Warn("auth error", err, r.RemoteAddr)
  87. return
  88. }
  89. if targetAddr, err = host.Target.GetRandomTarget(); err != nil {
  90. logs.Warn(err.Error())
  91. }
  92. logs.Trace("new https connection,clientId %d,host %s,remote address %s", host.Client.Id, r.Host, c.RemoteAddr().String())
  93. s.DealClient(conn.NewConn(c), host.Client, targetAddr, buf[:n], common.CONN_TCP, nil, host.Flow)
  94. }
  95. func (s *httpServer) Start() error {
  96. var err error
  97. if s.errorContent, err = common.ReadAllFromFile(filepath.Join(common.GetRunPath(), "web", "static", "page", "error.html")); err != nil {
  98. s.errorContent = []byte("easyProxy 404")
  99. }
  100. if s.httpPort > 0 {
  101. s.httpServer = s.NewServer(s.httpPort, "http")
  102. go func() {
  103. l, err := connection.GetHttpListener()
  104. if err != nil {
  105. logs.Error(err)
  106. os.Exit(0)
  107. }
  108. err = s.httpServer.Serve(l)
  109. if err != nil {
  110. logs.Error(err)
  111. os.Exit(0)
  112. }
  113. }()
  114. }
  115. if s.httpsPort > 0 {
  116. s.httpsServer = s.NewServer(s.httpsPort, "https")
  117. go func() {
  118. s.httpsListener, err = connection.GetHttpsListener()
  119. if err != nil {
  120. logs.Error(err)
  121. os.Exit(0)
  122. }
  123. if b, err := beego.AppConfig.Bool("https_just_proxy"); err == nil && b {
  124. for {
  125. c, err := s.httpsListener.Accept()
  126. if err != nil {
  127. logs.Error(err)
  128. break
  129. }
  130. go s.processHttps(c)
  131. }
  132. } else {
  133. if !common.FileExists(s.pemPath) {
  134. logs.Error("ssl certFile %s exist", s.keyPath)
  135. os.Exit(0)
  136. }
  137. if !common.FileExists(s.keyPath) {
  138. logs.Error("ssl keyFile %s exist", s.keyPath)
  139. os.Exit(0)
  140. }
  141. err = s.httpsServer.ServeTLS(s.httpsListener, s.pemPath, s.keyPath)
  142. if err != nil {
  143. logs.Error(err)
  144. os.Exit(0)
  145. }
  146. }
  147. }()
  148. }
  149. return nil
  150. }
  151. func (s *httpServer) Close() error {
  152. if s.httpsListener != nil {
  153. s.httpsListener.Close()
  154. }
  155. if s.httpsServer != nil {
  156. s.httpsServer.Close()
  157. }
  158. if s.httpServer != nil {
  159. s.httpServer.Close()
  160. }
  161. return nil
  162. }
  163. func (s *httpServer) handleTunneling(w http.ResponseWriter, r *http.Request) {
  164. hijacker, ok := w.(http.Hijacker)
  165. if !ok {
  166. http.Error(w, "Hijacking not supported", http.StatusInternalServerError)
  167. return
  168. }
  169. c, _, err := hijacker.Hijack()
  170. if err != nil {
  171. http.Error(w, err.Error(), http.StatusServiceUnavailable)
  172. }
  173. s.process(conn.NewConn(c), r)
  174. }
  175. func (s *httpServer) process(c *conn.Conn, r *http.Request) {
  176. var (
  177. isConn = true
  178. host *file.Host
  179. target net.Conn
  180. lastHost *file.Host
  181. err error
  182. connClient io.ReadWriteCloser
  183. scheme = r.URL.Scheme
  184. lk *conn.Link
  185. targetAddr string
  186. wg sync.WaitGroup
  187. )
  188. if host, err = file.GetCsvDb().GetInfoByHost(r.Host, r); err != nil {
  189. logs.Notice("the url %s %s %s can't be parsed!", r.URL.Scheme, r.Host, r.RequestURI)
  190. goto end
  191. }
  192. if err := s.CheckFlowAndConnNum(host.Client); err != nil {
  193. logs.Warn("client id %d, host id %d, error %s, when https connection", host.Client.Id, host.Id, err.Error())
  194. c.Close()
  195. return
  196. }
  197. defer host.Client.AddConn()
  198. logs.Trace("new %s connection,clientId %d,host %s,url %s,remote address %s", r.URL.Scheme, host.Client.Id, r.Host, r.URL, r.RemoteAddr)
  199. lastHost = host
  200. for {
  201. start:
  202. if isConn {
  203. if err = s.auth(r, c, host.Client.Cnf.U, host.Client.Cnf.P); err != nil {
  204. logs.Warn("auth error", err, r.RemoteAddr)
  205. break
  206. }
  207. if targetAddr, err = host.Target.GetRandomTarget(); err != nil {
  208. logs.Warn(err.Error())
  209. break
  210. }
  211. lk = conn.NewLink(common.CONN_TCP, targetAddr, host.Client.Cnf.Crypt, host.Client.Cnf.Compress, r.RemoteAddr)
  212. if target, err = s.bridge.SendLinkInfo(host.Client.Id, lk, c.Conn.RemoteAddr().String(), nil); err != nil {
  213. logs.Notice("connect to target %s error %s", lk.Host, err)
  214. break
  215. }
  216. connClient = conn.GetConn(target, lk.Crypt, lk.Compress, host.Client.Rate, true)
  217. isConn = false
  218. go func() {
  219. wg.Add(1)
  220. w, _ := common.CopyBuffer(c, connClient)
  221. host.Flow.Add(0, w)
  222. c.Close()
  223. target.Close()
  224. wg.Done()
  225. }()
  226. } else {
  227. r, err = http.ReadRequest(bufio.NewReader(c))
  228. if err != nil {
  229. break
  230. }
  231. r.URL.Scheme = scheme
  232. //What happened ,Why one character less???
  233. if r.Method == "ET" {
  234. r.Method = "GET"
  235. }
  236. if r.Method == "OST" {
  237. r.Method = "POST"
  238. }
  239. logs.Trace("new %s connection,clientId %d,host %s,url %s,remote address %s", r.URL.Scheme, host.Client.Id, r.Host, r.URL, r.RemoteAddr)
  240. if hostTmp, err := file.GetCsvDb().GetInfoByHost(r.Host, r); err != nil {
  241. logs.Notice("the url %s %s %s can't be parsed!", r.URL.Scheme, r.Host, r.RequestURI)
  242. break
  243. } else if host != lastHost {
  244. host = hostTmp
  245. lastHost = host
  246. isConn = true
  247. goto start
  248. }
  249. }
  250. //根据设定,修改header和host
  251. common.ChangeHostAndHeader(r, host.HostChange, host.HeaderChange, c.Conn.RemoteAddr().String())
  252. b, err := httputil.DumpRequest(r, false)
  253. if err != nil {
  254. break
  255. }
  256. logs.Trace("%s request, method %s, host %s, url %s, remote address %s, target %s", r.URL.Scheme, r.Method, r.Host, r.RequestURI, r.RemoteAddr, lk.Host)
  257. //write
  258. connClient.Write(b)
  259. if bodyLen, err := common.CopyBuffer(connClient, r.Body); err != nil {
  260. break
  261. } else {
  262. host.Flow.Add(int64(len(b))+bodyLen, 0)
  263. }
  264. }
  265. end:
  266. if isConn {
  267. s.writeConnFail(c.Conn)
  268. }
  269. c.Close()
  270. if target != nil {
  271. target.Close()
  272. }
  273. wg.Wait()
  274. }
  275. func (s *httpServer) NewServer(port int, scheme string) *http.Server {
  276. return &http.Server{
  277. Addr: ":" + strconv.Itoa(port),
  278. Handler: http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  279. r.URL.Scheme = scheme
  280. s.handleTunneling(w, r)
  281. }),
  282. // Disable HTTP/2.
  283. TLSNextProto: make(map[string]func(*http.Server, *tls.Conn, http.Handler)),
  284. }
  285. }