144 lines
2.9 KiB
Go
144 lines
2.9 KiB
Go
package pht
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"fmt"
|
|
"io"
|
|
"net"
|
|
"net/http"
|
|
"net/http/httputil"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/go-gost/gost/pkg/dialer"
|
|
"github.com/go-gost/gost/pkg/logger"
|
|
md "github.com/go-gost/gost/pkg/metadata"
|
|
"github.com/go-gost/gost/pkg/registry"
|
|
)
|
|
|
|
func init() {
|
|
registry.RegisterDialer("pht", NewDialer)
|
|
registry.RegisterDialer("phts", NewTLSDialer)
|
|
}
|
|
|
|
type phtDialer struct {
|
|
tlsEnabled bool
|
|
md metadata
|
|
logger logger.Logger
|
|
options dialer.Options
|
|
}
|
|
|
|
func NewDialer(opts ...dialer.Option) dialer.Dialer {
|
|
options := dialer.Options{}
|
|
for _, opt := range opts {
|
|
opt(&options)
|
|
}
|
|
|
|
return &phtDialer{
|
|
logger: options.Logger,
|
|
options: options,
|
|
}
|
|
}
|
|
|
|
func NewTLSDialer(opts ...dialer.Option) dialer.Dialer {
|
|
options := dialer.Options{}
|
|
for _, opt := range opts {
|
|
opt(&options)
|
|
}
|
|
|
|
return &phtDialer{
|
|
tlsEnabled: true,
|
|
logger: options.Logger,
|
|
options: options,
|
|
}
|
|
}
|
|
|
|
func (d *phtDialer) Init(md md.Metadata) (err error) {
|
|
return d.parseMetadata(md)
|
|
}
|
|
|
|
func (d *phtDialer) Dial(ctx context.Context, addr string, opts ...dialer.DialOption) (net.Conn, error) {
|
|
tr := &http.Transport{
|
|
// Proxy: http.ProxyFromEnvironment,
|
|
DialContext: (&net.Dialer{
|
|
Timeout: 30 * time.Second,
|
|
KeepAlive: 30 * time.Second,
|
|
}).DialContext,
|
|
ForceAttemptHTTP2: true,
|
|
MaxIdleConns: 100,
|
|
IdleConnTimeout: 90 * time.Second,
|
|
TLSHandshakeTimeout: 10 * time.Second,
|
|
ExpectContinueTimeout: 1 * time.Second,
|
|
}
|
|
if d.tlsEnabled {
|
|
tr.TLSClientConfig = d.options.TLSConfig
|
|
}
|
|
|
|
client := &http.Client{
|
|
Timeout: 60 * time.Second,
|
|
Transport: tr,
|
|
}
|
|
token, err := d.authorize(ctx, client, addr)
|
|
if err != nil {
|
|
d.logger.Error(err)
|
|
return nil, err
|
|
}
|
|
|
|
c := &conn{
|
|
cid: token,
|
|
addr: addr,
|
|
client: client,
|
|
tlsEnabled: d.tlsEnabled,
|
|
rxc: make(chan []byte, 128),
|
|
closed: make(chan struct{}),
|
|
md: d.md,
|
|
logger: d.logger,
|
|
}
|
|
go c.readLoop()
|
|
|
|
return c, nil
|
|
}
|
|
|
|
func (d *phtDialer) authorize(ctx context.Context, client *http.Client, addr string) (token string, err error) {
|
|
var url string
|
|
if d.tlsEnabled {
|
|
url = fmt.Sprintf("https://%s%s", addr, d.md.authorizePath)
|
|
} else {
|
|
url = fmt.Sprintf("http://%s%s", addr, d.md.authorizePath)
|
|
}
|
|
r, err := http.NewRequestWithContext(ctx, http.MethodGet, url, nil)
|
|
if err != nil {
|
|
return
|
|
}
|
|
|
|
if d.logger.IsLevelEnabled(logger.DebugLevel) {
|
|
dump, _ := httputil.DumpRequest(r, false)
|
|
d.logger.Debug(string(dump))
|
|
}
|
|
|
|
resp, err := client.Do(r)
|
|
if err != nil {
|
|
return
|
|
}
|
|
defer resp.Body.Close()
|
|
|
|
if d.logger.IsLevelEnabled(logger.DebugLevel) {
|
|
dump, _ := httputil.DumpResponse(resp, false)
|
|
d.logger.Debug(string(dump))
|
|
}
|
|
|
|
data, err := io.ReadAll(resp.Body)
|
|
if err != nil {
|
|
return
|
|
}
|
|
|
|
if strings.HasPrefix(string(data), "token=") {
|
|
token = strings.TrimPrefix(string(data), "token=")
|
|
}
|
|
if token == "" {
|
|
err = errors.New("authorize failed")
|
|
}
|
|
return
|
|
}
|