2020-11-25 13:01:53 +02:00
package http
import (
"bufio"
2022-12-15 13:15:43 +02:00
"bytes"
2020-11-25 13:01:53 +02:00
"context"
"encoding/base64"
"io"
"net/http"
"net/url"
"sync"
2022-12-15 13:15:43 +02:00
"text/template"
2020-11-25 13:01:53 +02:00
2020-12-04 03:36:16 +02:00
"github.com/xtls/xray-core/common"
"github.com/xtls/xray-core/common/buf"
"github.com/xtls/xray-core/common/bytespool"
"github.com/xtls/xray-core/common/net"
"github.com/xtls/xray-core/common/protocol"
"github.com/xtls/xray-core/common/retry"
"github.com/xtls/xray-core/common/session"
"github.com/xtls/xray-core/common/signal"
"github.com/xtls/xray-core/common/task"
"github.com/xtls/xray-core/core"
"github.com/xtls/xray-core/features/policy"
"github.com/xtls/xray-core/transport"
"github.com/xtls/xray-core/transport/internet"
2021-12-15 02:28:47 +02:00
"github.com/xtls/xray-core/transport/internet/stat"
2020-12-04 03:36:16 +02:00
"github.com/xtls/xray-core/transport/internet/tls"
2022-05-18 10:29:01 +03:00
"golang.org/x/net/http2"
2020-11-25 13:01:53 +02:00
)
type Client struct {
serverPicker protocol . ServerPicker
policyManager policy . Manager
2022-12-15 13:15:43 +02:00
header [ ] * Header
2020-11-25 13:01:53 +02:00
}
type h2Conn struct {
rawConn net . Conn
h2Conn * http2 . ClientConn
}
var (
cachedH2Mutex sync . Mutex
cachedH2Conns map [ net . Destination ] h2Conn
)
// NewClient create a new http client based on the given config.
func NewClient ( ctx context . Context , config * ClientConfig ) ( * Client , error ) {
serverList := protocol . NewServerList ( )
for _ , rec := range config . Server {
s , err := protocol . NewServerSpecFromPB ( rec )
if err != nil {
return nil , newError ( "failed to get server spec" ) . Base ( err )
}
serverList . AddServer ( s )
}
if serverList . Size ( ) == 0 {
return nil , newError ( "0 target server" )
}
v := core . MustFromContext ( ctx )
return & Client {
serverPicker : protocol . NewRoundRobinServerPicker ( serverList ) ,
policyManager : v . GetFeature ( policy . ManagerType ( ) ) . ( policy . Manager ) ,
2022-12-15 13:15:43 +02:00
header : config . Header ,
2020-11-25 13:01:53 +02:00
} , nil
}
// Process implements proxy.Outbound.Process. We first create a socket tunnel via HTTP CONNECT method, then redirect all inbound traffic to that tunnel.
func ( c * Client ) Process ( ctx context . Context , link * transport . Link , dialer internet . Dialer ) error {
2024-05-14 04:52:24 +03:00
outbounds := session . OutboundsFromContext ( ctx )
ob := outbounds [ len ( outbounds ) - 1 ]
if ! ob . Target . IsValid ( ) {
2020-11-25 13:01:53 +02:00
return newError ( "target not specified." )
}
2024-05-14 04:52:24 +03:00
ob . Name = "http"
ob . CanSpliceCopy = 2
target := ob . Target
2020-11-25 13:01:53 +02:00
targetAddr := target . NetAddr ( )
if target . Network == net . Network_UDP {
return newError ( "UDP is not supported by HTTP outbound" )
}
var user * protocol . MemoryUser
2021-09-20 15:11:21 +03:00
var conn stat . Connection
2020-11-25 13:01:53 +02:00
mbuf , _ := link . Reader . ReadMultiBuffer ( )
len := mbuf . Len ( )
firstPayload := bytespool . Alloc ( len )
mbuf , _ = buf . SplitBytes ( mbuf , firstPayload )
firstPayload = firstPayload [ : len ]
buf . ReleaseMulti ( mbuf )
defer bytespool . Free ( firstPayload )
2022-12-15 13:15:43 +02:00
header , err := fillRequestHeader ( ctx , c . header )
if err != nil {
return newError ( "failed to fill out header" ) . Base ( err )
}
2020-11-25 13:01:53 +02:00
if err := retry . ExponentialBackoff ( 5 , 100 ) . On ( func ( ) error {
server := c . serverPicker . PickServer ( )
dest := server . Destination ( )
user = server . PickUser ( )
2022-12-15 13:15:43 +02:00
netConn , err := setUpHTTPTunnel ( ctx , dest , targetAddr , user , dialer , header , firstPayload )
2020-11-25 13:01:53 +02:00
if netConn != nil {
if _ , ok := netConn . ( * http2Conn ) ; ! ok {
if _ , err := netConn . Write ( firstPayload ) ; err != nil {
netConn . Close ( )
return err
}
}
2021-09-20 15:11:21 +03:00
conn = stat . Connection ( netConn )
2020-11-25 13:01:53 +02:00
}
return err
} ) ; err != nil {
return newError ( "failed to find an available destination" ) . Base ( err )
}
defer func ( ) {
if err := conn . Close ( ) ; err != nil {
newError ( "failed to closed connection" ) . Base ( err ) . WriteToLog ( session . ExportIDToError ( ctx ) )
}
} ( )
p := c . policyManager . ForLevel ( 0 )
if user != nil {
p = c . policyManager . ForLevel ( user . Level )
}
2023-04-06 13:21:35 +03:00
var newCtx context . Context
var newCancel context . CancelFunc
if session . TimeoutOnlyFromContext ( ctx ) {
newCtx , newCancel = context . WithCancel ( context . Background ( ) )
}
2020-11-25 13:01:53 +02:00
ctx , cancel := context . WithCancel ( ctx )
2023-04-06 13:21:35 +03:00
timer := signal . CancelAfterInactivity ( ctx , func ( ) {
cancel ( )
if newCancel != nil {
newCancel ( )
}
} , p . Timeouts . ConnectionIdle )
2020-11-25 13:01:53 +02:00
requestFunc := func ( ) error {
defer timer . SetTimeout ( p . Timeouts . DownlinkOnly )
return buf . Copy ( link . Reader , buf . NewWriter ( conn ) , buf . UpdateActivity ( timer ) )
}
responseFunc := func ( ) error {
defer timer . SetTimeout ( p . Timeouts . UplinkOnly )
return buf . Copy ( buf . NewReader ( conn ) , link . Writer , buf . UpdateActivity ( timer ) )
}
2023-04-06 13:21:35 +03:00
if newCtx != nil {
ctx = newCtx
}
2021-10-19 19:57:14 +03:00
responseDonePost := task . OnSuccess ( responseFunc , task . Close ( link . Writer ) )
2020-11-25 13:01:53 +02:00
if err := task . Run ( ctx , requestFunc , responseDonePost ) ; err != nil {
return newError ( "connection ends" ) . Base ( err )
}
return nil
}
2022-12-15 13:15:43 +02:00
// fillRequestHeader will fill out the template of the headers
func fillRequestHeader ( ctx context . Context , header [ ] * Header ) ( [ ] * Header , error ) {
if len ( header ) == 0 {
return header , nil
}
inbound := session . InboundFromContext ( ctx )
2024-05-14 04:52:24 +03:00
outbounds := session . OutboundsFromContext ( ctx )
ob := outbounds [ len ( outbounds ) - 1 ]
2022-12-15 13:15:43 +02:00
2024-05-14 04:52:24 +03:00
if inbound == nil || ob == nil {
2023-07-16 00:58:08 +03:00
return nil , newError ( "missing inbound or outbound metadata from context" )
}
2022-12-15 13:15:43 +02:00
data := struct {
Source net . Destination
Target net . Destination
} {
Source : inbound . Source ,
2024-05-14 04:52:24 +03:00
Target : ob . Target ,
2022-12-15 13:15:43 +02:00
}
filled := make ( [ ] * Header , len ( header ) )
for i , h := range header {
tmpl , err := template . New ( h . Key ) . Parse ( h . Value )
if err != nil {
return nil , err
}
var buf bytes . Buffer
if err = tmpl . Execute ( & buf , data ) ; err != nil {
return nil , err
}
filled [ i ] = & Header { Key : h . Key , Value : buf . String ( ) }
}
return filled , nil
}
2020-11-25 13:01:53 +02:00
// setUpHTTPTunnel will create a socket tunnel via HTTP CONNECT method
2022-12-15 13:15:43 +02:00
func setUpHTTPTunnel ( ctx context . Context , dest net . Destination , target string , user * protocol . MemoryUser , dialer internet . Dialer , header [ ] * Header , firstPayload [ ] byte ) ( net . Conn , error ) {
2020-11-25 13:01:53 +02:00
req := & http . Request {
Method : http . MethodConnect ,
URL : & url . URL { Host : target } ,
Header : make ( http . Header ) ,
Host : target ,
}
if user != nil && user . Account != nil {
account := user . Account . ( * Account )
auth := account . GetUsername ( ) + ":" + account . GetPassword ( )
req . Header . Set ( "Proxy-Authorization" , "Basic " + base64 . StdEncoding . EncodeToString ( [ ] byte ( auth ) ) )
}
2022-12-15 13:15:43 +02:00
for _ , h := range header {
req . Header . Set ( h . Key , h . Value )
}
2020-11-25 13:01:53 +02:00
connectHTTP1 := func ( rawConn net . Conn ) ( net . Conn , error ) {
req . Header . Set ( "Proxy-Connection" , "Keep-Alive" )
err := req . Write ( rawConn )
if err != nil {
rawConn . Close ( )
return nil , err
}
resp , err := http . ReadResponse ( bufio . NewReader ( rawConn ) , req )
if err != nil {
rawConn . Close ( )
return nil , err
}
2020-12-24 21:45:35 +02:00
defer resp . Body . Close ( )
2020-11-25 13:01:53 +02:00
if resp . StatusCode != http . StatusOK {
rawConn . Close ( )
return nil , newError ( "Proxy responded with non 200 code: " + resp . Status )
}
return rawConn , nil
}
connectHTTP2 := func ( rawConn net . Conn , h2clientConn * http2 . ClientConn ) ( net . Conn , error ) {
pr , pw := io . Pipe ( )
req . Body = pr
var pErr error
var wg sync . WaitGroup
wg . Add ( 1 )
go func ( ) {
_ , pErr = pw . Write ( firstPayload )
wg . Done ( )
} ( )
resp , err := h2clientConn . RoundTrip ( req )
if err != nil {
rawConn . Close ( )
return nil , err
}
wg . Wait ( )
if pErr != nil {
rawConn . Close ( )
return nil , pErr
}
if resp . StatusCode != http . StatusOK {
rawConn . Close ( )
return nil , newError ( "Proxy responded with non 200 code: " + resp . Status )
}
return newHTTP2Conn ( rawConn , pw , resp . Body ) , nil
}
cachedH2Mutex . Lock ( )
cachedConn , cachedConnFound := cachedH2Conns [ dest ]
cachedH2Mutex . Unlock ( )
if cachedConnFound {
rc , cc := cachedConn . rawConn , cachedConn . h2Conn
if cc . CanTakeNewRequest ( ) {
proxyConn , err := connectHTTP2 ( rc , cc )
if err != nil {
return nil , err
}
return proxyConn , nil
}
}
rawConn , err := dialer . Dial ( ctx , dest )
if err != nil {
return nil , err
}
iConn := rawConn
2021-09-20 15:11:21 +03:00
if statConn , ok := iConn . ( * stat . CounterConnection ) ; ok {
2020-11-25 13:01:53 +02:00
iConn = statConn . Connection
}
nextProto := ""
if tlsConn , ok := iConn . ( * tls . Conn ) ; ok {
2024-02-03 13:45:37 +02:00
if err := tlsConn . HandshakeContext ( ctx ) ; err != nil {
2020-11-25 13:01:53 +02:00
rawConn . Close ( )
return nil , err
}
nextProto = tlsConn . ConnectionState ( ) . NegotiatedProtocol
}
switch nextProto {
case "" , "http/1.1" :
return connectHTTP1 ( rawConn )
case "h2" :
t := http2 . Transport { }
h2clientConn , err := t . NewClientConn ( rawConn )
if err != nil {
rawConn . Close ( )
return nil , err
}
proxyConn , err := connectHTTP2 ( rawConn , h2clientConn )
if err != nil {
rawConn . Close ( )
return nil , err
}
cachedH2Mutex . Lock ( )
if cachedH2Conns == nil {
cachedH2Conns = make ( map [ net . Destination ] h2Conn )
}
cachedH2Conns [ dest ] = h2Conn {
rawConn : rawConn ,
h2Conn : h2clientConn ,
}
cachedH2Mutex . Unlock ( )
return proxyConn , err
default :
return nil , newError ( "negotiated unsupported application layer protocol: " + nextProto )
}
}
func newHTTP2Conn ( c net . Conn , pipedReqBody * io . PipeWriter , respBody io . ReadCloser ) net . Conn {
return & http2Conn { Conn : c , in : pipedReqBody , out : respBody }
}
type http2Conn struct {
net . Conn
in * io . PipeWriter
out io . ReadCloser
}
func ( h * http2Conn ) Read ( p [ ] byte ) ( n int , err error ) {
return h . out . Read ( p )
}
func ( h * http2Conn ) Write ( p [ ] byte ) ( n int , err error ) {
return h . in . Write ( p )
}
func ( h * http2Conn ) Close ( ) error {
h . in . Close ( )
return h . out . Close ( )
}
func init ( ) {
common . Must ( common . RegisterConfig ( ( * ClientConfig ) ( nil ) , func ( ctx context . Context , config interface { } ) ( interface { } , error ) {
return NewClient ( ctx , config . ( * ClientConfig ) )
} ) )
}