add http node settings

This commit is contained in:
ginuerzh
2023-01-29 20:31:13 +08:00
parent 24037aba7b
commit 66234239e4
8 changed files with 120 additions and 26 deletions

View File

@ -286,6 +286,18 @@ type ForwardNodeConfig struct {
Protocol string `yaml:",omitempty" json:"protocol,omitempty"` Protocol string `yaml:",omitempty" json:"protocol,omitempty"`
Bypass string `yaml:",omitempty" json:"bypass,omitempty"` Bypass string `yaml:",omitempty" json:"bypass,omitempty"`
Bypasses []string `yaml:",omitempty" json:"bypasses,omitempty"` Bypasses []string `yaml:",omitempty" json:"bypasses,omitempty"`
HTTP *HTTPNodeConfig `yaml:",omitempty" json:"http,omitempty"`
TLS *TLSNodeConfig `yaml:",omitempty" json:"tls,omitempty"`
}
type HTTPNodeConfig struct {
Host string `yaml:",omitempty" json:"host,omitempty"`
Header map[string]string `yaml:",omitempty" json:"header,omitempty"`
}
type TLSNodeConfig struct {
ServerName string `yaml:"serverName,omitempty" json:"serverName,omitempty"`
Secure bool `yaml:",omitempty" json:"secure,omitempty"`
} }
type DialerConfig struct { type DialerConfig struct {
@ -368,6 +380,8 @@ type NodeConfig struct {
Connector *ConnectorConfig `yaml:",omitempty" json:"connector,omitempty"` Connector *ConnectorConfig `yaml:",omitempty" json:"connector,omitempty"`
Dialer *DialerConfig `yaml:",omitempty" json:"dialer,omitempty"` Dialer *DialerConfig `yaml:",omitempty" json:"dialer,omitempty"`
Metadata map[string]any `yaml:",omitempty" json:"metadata,omitempty"` Metadata map[string]any `yaml:",omitempty" json:"metadata,omitempty"`
HTTP *HTTPNodeConfig `yaml:",omitempty" json:"http,omitempty"`
TLS *TLSNodeConfig `yaml:",omitempty" json:"tls,omitempty"`
} }
type Config struct { type Config struct {

View File

@ -209,7 +209,8 @@ func ParseHop(cfg *config.HopConfig) (chain.Hop, error) {
host = "." + host host = "." + host
} }
} }
node := chain.NewNode(v.Name, v.Addr,
opts := []chain.NodeOption{
chain.TransportNodeOption(tr), chain.TransportNodeOption(tr),
chain.BypassNodeOption(bypass.BypassGroup(bypassList(v.Bypass, v.Bypasses...)...)), chain.BypassNodeOption(bypass.BypassGroup(bypassList(v.Bypass, v.Bypasses...)...)),
chain.ResoloverNodeOption(registry.ResolverRegistry().Get(v.Resolver)), chain.ResoloverNodeOption(registry.ResolverRegistry().Get(v.Resolver)),
@ -217,7 +218,20 @@ func ParseHop(cfg *config.HopConfig) (chain.Hop, error) {
chain.MetadataNodeOption(nm), chain.MetadataNodeOption(nm),
chain.HostNodeOption(host), chain.HostNodeOption(host),
chain.ProtocolNodeOption(v.Protocol), chain.ProtocolNodeOption(v.Protocol),
) }
if v.HTTP != nil {
opts = append(opts, chain.HTTPNodeOption(&chain.HTTPNodeSettings{
Host: v.HTTP.Host,
Header: v.HTTP.Header,
}))
}
if v.TLS != nil {
opts = append(opts, chain.TLSNodeOption(&chain.TLSNodeSettings{
ServerName: v.TLS.ServerName,
Secure: v.TLS.Secure,
}))
}
node := chain.NewNode(v.Name, v.Addr, opts...)
nodes = append(nodes, node) nodes = append(nodes, node)
} }

View File

@ -257,6 +257,8 @@ func parseForwarder(cfg *config.ForwarderConfig) (chain.Hop, error) {
Protocol: node.Protocol, Protocol: node.Protocol,
Bypass: node.Bypass, Bypass: node.Bypass,
Bypasses: node.Bypasses, Bypasses: node.Bypasses,
HTTP: node.HTTP,
TLS: node.TLS,
}, },
) )
} }

View File

@ -1,15 +1,19 @@
package local package local
import ( import (
"bufio"
"context" "context"
"errors" "errors"
"fmt" "fmt"
"io" "io"
"net" "net"
"net/http"
"net/http/httputil"
"time" "time"
"github.com/go-gost/core/chain" "github.com/go-gost/core/chain"
"github.com/go-gost/core/handler" "github.com/go-gost/core/handler"
"github.com/go-gost/core/logger"
md "github.com/go-gost/core/metadata" md "github.com/go-gost/core/metadata"
netpkg "github.com/go-gost/x/internal/net" netpkg "github.com/go-gost/x/internal/net"
"github.com/go-gost/x/internal/util/forward" "github.com/go-gost/x/internal/util/forward"
@ -132,6 +136,31 @@ func (h *forwardHandler) Handle(ctx context.Context, conn net.Conn, opts ...hand
marker.Reset() marker.Reset()
} }
if protocol == forward.ProtoHTTP &&
target.Options().HTTP != nil {
req, err := http.ReadRequest(bufio.NewReader(rw))
if err != nil {
return err
}
httpSettings := target.Options().HTTP
if httpSettings.Host != "" {
req.Host = httpSettings.Host
}
for k, v := range httpSettings.Header {
req.Header.Set(k, v)
}
if log.IsLevelEnabled(logger.TraceLevel) {
dump, _ := httputil.DumpRequest(req, false)
log.Trace(string(dump))
}
if err := req.Write(cc); err != nil {
return err
}
}
t := time.Now() t := time.Now()
log.Debugf("%s <-> %s", conn.RemoteAddr(), target.Addr) log.Debugf("%s <-> %s", conn.RemoteAddr(), target.Addr)
netpkg.Transport(rw, cc) netpkg.Transport(rw, cc)

View File

@ -1,15 +1,19 @@
package remote package remote
import ( import (
"bufio"
"context" "context"
"errors" "errors"
"fmt" "fmt"
"io" "io"
"net" "net"
"net/http"
"net/http/httputil"
"time" "time"
"github.com/go-gost/core/chain" "github.com/go-gost/core/chain"
"github.com/go-gost/core/handler" "github.com/go-gost/core/handler"
"github.com/go-gost/core/logger"
md "github.com/go-gost/core/metadata" md "github.com/go-gost/core/metadata"
netpkg "github.com/go-gost/x/internal/net" netpkg "github.com/go-gost/x/internal/net"
"github.com/go-gost/x/internal/util/forward" "github.com/go-gost/x/internal/util/forward"
@ -124,6 +128,30 @@ func (h *forwardHandler) Handle(ctx context.Context, conn net.Conn, opts ...hand
marker.Reset() marker.Reset()
} }
if protocol == forward.ProtoHTTP &&
target.Options().HTTP != nil {
req, err := http.ReadRequest(bufio.NewReader(rw))
if err != nil {
return err
}
httpSettings := target.Options().HTTP
if httpSettings.Host != "" {
req.Host = httpSettings.Host
}
for k, v := range httpSettings.Header {
req.Header.Set(k, v)
}
if log.IsLevelEnabled(logger.TraceLevel) {
dump, _ := httputil.DumpRequest(req, false)
log.Trace(string(dump))
}
if err := req.Write(cc); err != nil {
return err
}
}
t := time.Now() t := time.Now()
log.Debugf("%s <-> %s", conn.RemoteAddr(), target.Addr) log.Debugf("%s <-> %s", conn.RemoteAddr(), target.Addr)
netpkg.Transport(rw, cc) netpkg.Transport(rw, cc)

View File

@ -199,11 +199,13 @@ func (h *relayHandler) handleTunnel(ctx context.Context, conn net.Conn, tunnelID
Status: relay.StatusOK, Status: relay.StatusOK,
} }
/*
if h.ep == nil { if h.ep == nil {
resp.Status = relay.StatusServiceUnavailable resp.Status = relay.StatusServiceUnavailable
resp.WriteTo(conn) resp.WriteTo(conn)
return return
} }
*/
uuid, err := uuid.NewRandom() uuid, err := uuid.NewRandom()
if err != nil { if err != nil {
@ -214,8 +216,12 @@ func (h *relayHandler) handleTunnel(ctx context.Context, conn net.Conn, tunnelID
connectorID := relay.NewTunnelID(uuid[:]) connectorID := relay.NewTunnelID(uuid[:])
addr := ":0"
if h.ep != nil {
addr = h.ep.Addr().String()
}
af := &relay.AddrFeature{} af := &relay.AddrFeature{}
err = af.ParseFrom(h.ep.Addr().String()) err = af.ParseFrom(addr)
if err != nil { if err != nil {
log.Warn(err) log.Warn(err)
} }

View File

@ -123,9 +123,8 @@ func (h *relayHandler) Handle(ctx context.Context, conn net.Conn, opts ...handle
log.Infof("%s <> %s", conn.RemoteAddr(), conn.LocalAddr()) log.Infof("%s <> %s", conn.RemoteAddr(), conn.LocalAddr())
var tunnelID relay.TunnelID
defer func() { defer func() {
if tunnelID.IsZero() || err != nil { if err != nil {
conn.Close() conn.Close()
} }
log.WithFields(map[string]any{ log.WithFields(map[string]any{
@ -161,6 +160,7 @@ func (h *relayHandler) Handle(ctx context.Context, conn net.Conn, opts ...handle
var user, pass string var user, pass string
var address string var address string
var tunnelID relay.TunnelID
for _, f := range req.Features { for _, f := range req.Features {
switch f.Type() { switch f.Type() {
case relay.FeatureUserAuth: case relay.FeatureUserAuth:
@ -195,20 +195,15 @@ func (h *relayHandler) Handle(ctx context.Context, conn net.Conn, opts ...handle
} }
if h.hop != nil { if h.hop != nil {
/* defer conn.Close()
if address != "" {
resp.Status = relay.StatusForbidden
log.Error("forward mode, CONNECT method is forbidden")
_, err := resp.WriteTo(conn)
return err
}
*/
// forward mode // forward mode
return h.handleForward(ctx, conn, network, log) return h.handleForward(ctx, conn, network, log)
} }
switch req.Cmd & relay.CmdMask { switch req.Cmd & relay.CmdMask {
case relay.CmdConnect: case relay.CmdConnect:
defer conn.Close()
if !tunnelID.IsZero() { if !tunnelID.IsZero() {
return h.handleConnectTunnel(ctx, conn, network, address, tunnelID, log) return h.handleConnectTunnel(ctx, conn, network, address, tunnelID, log)
} }
@ -217,6 +212,8 @@ func (h *relayHandler) Handle(ctx context.Context, conn net.Conn, opts ...handle
if !tunnelID.IsZero() { if !tunnelID.IsZero() {
return h.handleTunnel(ctx, conn, tunnelID, log) return h.handleTunnel(ctx, conn, tunnelID, log)
} }
defer conn.Close()
return h.handleBind(ctx, conn, network, address, log) return h.handleBind(ctx, conn, network, address, log)
default: default:
resp.Status = relay.StatusBadRequest resp.Status = relay.StatusBadRequest

View File

@ -25,6 +25,7 @@ func Sniffing(ctx context.Context, rdw io.ReadWriter) (rw io.ReadWriter, host st
hdr[0] == dissector.Handshake && hdr[0] == dissector.Handshake &&
binary.BigEndian.Uint16(hdr[1:3]) == tls.VersionTLS10 { binary.BigEndian.Uint16(hdr[1:3]) == tls.VersionTLS10 {
rw, host, err = sniffSNI(ctx, rw) rw, host, err = sniffSNI(ctx, rw)
protocol = ProtoTLS
return return
} }
@ -36,6 +37,7 @@ func Sniffing(ctx context.Context, rdw io.ReadWriter) (rw io.ReadWriter, host st
rw = xio.NewReadWriter(io.MultiReader(buf, rw), rw) rw = xio.NewReadWriter(io.MultiReader(buf, rw), rw)
if err == nil { if err == nil {
host = r.Host host = r.Host
protocol = ProtoHTTP
return return
} }
} }
@ -87,11 +89,13 @@ func isHTTP(s string) bool {
} }
const ( const (
SSHv2 = "SSH-2" ProtoHTTP = "http"
ProtoTLS = "tls"
ProtoSSHv2 = "SSH-2"
) )
func sniffProtocol(hdr []byte) string { func sniffProtocol(hdr []byte) string {
if string(hdr) == SSHv2 { if string(hdr) == ProtoSSHv2 {
return "ssh" return "ssh"
} }
return "" return ""