glider/proxy/ws/server.go

205 lines
4.5 KiB
Go
Raw Normal View History

2020-10-19 20:45:57 +08:00
package ws
import (
"crypto/tls"
2020-10-19 20:45:57 +08:00
"errors"
"fmt"
2020-10-19 20:45:57 +08:00
"io"
"net"
"net/textproto"
"strings"
"github.com/nadoo/glider/log"
"github.com/nadoo/glider/pool"
"github.com/nadoo/glider/proxy"
)
// NewWSServer returns a ws transport server.
func NewWSServer(s string, p proxy.Proxy) (proxy.Server, error) {
2021-07-07 19:05:26 +08:00
schemes := strings.SplitN(s, ",", 2)
w, err := NewWS(schemes[0], nil, p, false)
2020-10-19 20:45:57 +08:00
if err != nil {
return nil, fmt.Errorf("[ws] create instance error: %s", err)
2020-10-19 20:45:57 +08:00
}
2021-07-07 19:05:26 +08:00
if len(schemes) > 1 {
w.server, err = proxy.ServerFromURL(schemes[1], p)
if err != nil {
return nil, err
}
2020-10-19 20:45:57 +08:00
}
return w, nil
}
// NewWSSServer returns a wss transport server.
func NewWSSServer(s string, p proxy.Proxy) (proxy.Server, error) {
schemes := strings.SplitN(s, ",", 2)
w, err := NewWS(schemes[0], nil, p, true)
if err != nil {
return nil, fmt.Errorf("[wss] create instance error: %s", err)
}
if len(schemes) > 1 {
w.server, err = proxy.ServerFromURL(schemes[1], p)
if err != nil {
return nil, err
}
}
if w.certFile == "" || w.keyFile == "" {
return nil, errors.New("[wss] cert and key file path must be spcified")
}
cert, err := tls.LoadX509KeyPair(w.certFile, w.keyFile)
if err != nil {
return nil, fmt.Errorf("[ws] unable to load cert: %s, key %s, error: %s",
w.certFile, w.keyFile, err)
}
w.tlsConfig = &tls.Config{
Certificates: []tls.Certificate{cert},
MinVersion: tls.VersionTLS12,
}
return w, nil
}
2020-10-19 20:45:57 +08:00
// ListenAndServe listens on server's addr and serves connections.
func (s *WS) ListenAndServe() {
l, err := net.Listen("tcp", s.addr)
if err != nil {
log.F("[ws] failed to listen on %s: %v", s.addr, err)
return
}
defer l.Close()
log.F("[ws] listening TCP on %s, with TLS: %v", s.addr, s.withTLS)
2020-10-19 20:45:57 +08:00
for {
c, err := l.Accept()
if err != nil {
log.F("[ws] failed to accept: %v", err)
continue
}
go s.Serve(c)
}
}
// Serve serves a connection.
func (s *WS) Serve(cc net.Conn) {
if s.withTLS {
tlsConn := tls.Server(cc, s.tlsConfig)
2021-11-29 00:00:22 +08:00
if err := tlsConn.Handshake(); err != nil {
tlsConn.Close()
log.F("[ws] error in tls handshake: %s", err)
return
}
cc = tlsConn
}
c, err := s.NewServerConn(cc)
if err != nil {
2021-11-29 00:00:22 +08:00
c.Close()
log.F("[ws] handshake error: %s", err)
return
}
2020-10-19 20:45:57 +08:00
if s.server != nil {
s.server.Serve(c)
return
}
defer c.Close()
rc, dialer, err := s.proxy.Dial("tcp", "")
if err != nil {
log.F("[ws] %s <-> %s via %s, error in dial: %v", c.RemoteAddr(), s.addr, dialer.Addr(), err)
s.proxy.Record(dialer, false)
return
}
defer rc.Close()
log.F("[ws] %s <-> %s", c.RemoteAddr(), dialer.Addr())
if err = proxy.Relay(c, rc); err != nil {
log.F("[ws] %s <-> %s, relay error: %v", c.RemoteAddr(), dialer.Addr(), err)
// record remote conn failure only
if !strings.Contains(err.Error(), s.addr) {
s.proxy.Record(dialer, false)
2020-10-19 20:45:57 +08:00
}
}
2020-10-19 20:45:57 +08:00
}
// ServerConn is a connection to ws client.
type ServerConn struct {
net.Conn
reader io.Reader
writer io.Writer
}
// NewServerConn creates a new ws server connection.
func (s *WS) NewServerConn(rc net.Conn) (*ServerConn, error) {
sc := &ServerConn{Conn: rc}
2021-11-29 00:00:22 +08:00
return sc, sc.Handshake(s.host, s.path)
2020-10-19 20:45:57 +08:00
}
// Handshake handshakes with the client.
func (c *ServerConn) Handshake(host, path string) error {
2020-11-03 22:52:50 +08:00
br := pool.GetBufReader(c.Conn)
defer pool.PutBufReader(br)
tpr := textproto.NewReader(br)
2020-10-19 20:45:57 +08:00
line, err := tpr.ReadLine()
if err != nil {
return err
}
_, path, _, ok := parseFirstLine(line)
if !ok || path != path {
return errors.New("[ws] error in ws handshake parseFirstLine: " + line)
2020-10-19 20:45:57 +08:00
}
reqHeader, err := tpr.ReadMIMEHeader()
if err != nil {
return err
}
// NOTE: in server mode, we do not validate the request Host now, check it.
// if reqHeader.Get("Host") != host {
// return fmt.Errorf("[ws] got wrong host: %s, expected: %s", reqHeader.Get("Host"), host)
// }
2020-10-19 20:45:57 +08:00
clientKey := reqHeader.Get("Sec-WebSocket-Key")
serverKey := computeServerKey(clientKey)
2020-11-03 22:52:50 +08:00
buf := pool.GetBytesBuffer()
defer pool.PutBytesBuffer(buf)
2020-10-19 20:45:57 +08:00
buf.WriteString("HTTP/1.1 101 Switching Protocols\r\n")
buf.WriteString("Upgrade: websocket\r\n")
buf.WriteString("Connection: Upgrade\r\n")
buf.WriteString("Sec-WebSocket-Accept: " + serverKey + "\r\n")
buf.WriteString(("\r\n"))
_, err = c.Conn.Write(buf.Bytes())
return err
}
func (c *ServerConn) Write(b []byte) (n int, err error) {
if c.writer == nil {
2020-10-20 20:28:35 +08:00
c.writer = FrameWriter(c.Conn, true)
2020-10-19 20:45:57 +08:00
}
return c.writer.Write(b)
}
func (c *ServerConn) Read(b []byte) (n int, err error) {
if c.reader == nil {
2020-10-20 20:28:35 +08:00
c.reader = FrameReader(c.Conn, true)
2020-10-19 20:45:57 +08:00
}
return c.reader.Read(b)
}