mirror of
https://github.com/fatedier/frp.git
synced 2024-12-25 01:27:48 +08:00
235 lines
5.0 KiB
Go
235 lines
5.0 KiB
Go
// Copyright 2017 frp team
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package plugin
|
|
|
|
import (
|
|
"bufio"
|
|
"encoding/base64"
|
|
"io"
|
|
"net"
|
|
"net/http"
|
|
"strings"
|
|
|
|
frpIo "github.com/fatedier/frp/utils/io"
|
|
frpNet "github.com/fatedier/frp/utils/net"
|
|
)
|
|
|
|
const PluginHttpProxy = "http_proxy"
|
|
|
|
func init() {
|
|
Register(PluginHttpProxy, NewHttpProxyPlugin)
|
|
}
|
|
|
|
type HttpProxy struct {
|
|
l *Listener
|
|
s *http.Server
|
|
AuthUser string
|
|
AuthPasswd string
|
|
}
|
|
|
|
func NewHttpProxyPlugin(params map[string]string) (Plugin, error) {
|
|
user := params["plugin_http_user"]
|
|
passwd := params["plugin_http_passwd"]
|
|
listener := NewProxyListener()
|
|
|
|
hp := &HttpProxy{
|
|
l: listener,
|
|
AuthUser: user,
|
|
AuthPasswd: passwd,
|
|
}
|
|
|
|
hp.s = &http.Server{
|
|
Handler: hp,
|
|
}
|
|
|
|
go hp.s.Serve(listener)
|
|
return hp, nil
|
|
}
|
|
|
|
func (hp *HttpProxy) Name() string {
|
|
return PluginHttpProxy
|
|
}
|
|
|
|
func (hp *HttpProxy) Handle(conn io.ReadWriteCloser, realConn frpNet.Conn) {
|
|
wrapConn := frpNet.WrapReadWriteCloserToConn(conn, realConn)
|
|
|
|
sc, rd := frpNet.NewShareConn(wrapConn)
|
|
request, err := http.ReadRequest(bufio.NewReader(rd))
|
|
if err != nil {
|
|
wrapConn.Close()
|
|
return
|
|
}
|
|
|
|
if request.Method == http.MethodConnect {
|
|
hp.handleConnectReq(request, frpIo.WrapReadWriteCloser(rd, wrapConn, nil))
|
|
return
|
|
}
|
|
|
|
hp.l.PutConn(sc)
|
|
return
|
|
}
|
|
|
|
func (hp *HttpProxy) Close() error {
|
|
hp.s.Close()
|
|
hp.l.Close()
|
|
return nil
|
|
}
|
|
|
|
func (hp *HttpProxy) ServeHTTP(rw http.ResponseWriter, req *http.Request) {
|
|
if ok := hp.Auth(req); !ok {
|
|
rw.Header().Set("Proxy-Authenticate", "Basic")
|
|
rw.WriteHeader(http.StatusProxyAuthRequired)
|
|
return
|
|
}
|
|
|
|
if req.Method == http.MethodConnect {
|
|
// deprecated
|
|
// Connect request is handled in Handle function.
|
|
hp.ConnectHandler(rw, req)
|
|
} else {
|
|
hp.HttpHandler(rw, req)
|
|
}
|
|
}
|
|
|
|
func (hp *HttpProxy) HttpHandler(rw http.ResponseWriter, req *http.Request) {
|
|
removeProxyHeaders(req)
|
|
|
|
resp, err := http.DefaultTransport.RoundTrip(req)
|
|
if err != nil {
|
|
http.Error(rw, err.Error(), http.StatusInternalServerError)
|
|
return
|
|
}
|
|
defer resp.Body.Close()
|
|
|
|
copyHeaders(rw.Header(), resp.Header)
|
|
rw.WriteHeader(resp.StatusCode)
|
|
|
|
_, err = io.Copy(rw, resp.Body)
|
|
if err != nil && err != io.EOF {
|
|
return
|
|
}
|
|
}
|
|
|
|
// deprecated
|
|
// Hijack needs to SetReadDeadline on the Conn of the request, but if we use stream compression here,
|
|
// we may always get i/o timeout error.
|
|
func (hp *HttpProxy) ConnectHandler(rw http.ResponseWriter, req *http.Request) {
|
|
hj, ok := rw.(http.Hijacker)
|
|
if !ok {
|
|
rw.WriteHeader(http.StatusInternalServerError)
|
|
return
|
|
}
|
|
|
|
client, _, err := hj.Hijack()
|
|
if err != nil {
|
|
rw.WriteHeader(http.StatusInternalServerError)
|
|
return
|
|
}
|
|
|
|
remote, err := net.Dial("tcp", req.URL.Host)
|
|
if err != nil {
|
|
http.Error(rw, "Failed", http.StatusBadRequest)
|
|
client.Close()
|
|
return
|
|
}
|
|
client.Write([]byte("HTTP/1.1 200 OK\r\n\r\n"))
|
|
|
|
go frpIo.Join(remote, client)
|
|
}
|
|
|
|
func (hp *HttpProxy) Auth(req *http.Request) bool {
|
|
if hp.AuthUser == "" && hp.AuthPasswd == "" {
|
|
return true
|
|
}
|
|
|
|
s := strings.SplitN(req.Header.Get("Proxy-Authorization"), " ", 2)
|
|
if len(s) != 2 {
|
|
return false
|
|
}
|
|
|
|
b, err := base64.StdEncoding.DecodeString(s[1])
|
|
if err != nil {
|
|
return false
|
|
}
|
|
|
|
pair := strings.SplitN(string(b), ":", 2)
|
|
if len(pair) != 2 {
|
|
return false
|
|
}
|
|
|
|
if pair[0] != hp.AuthUser || pair[1] != hp.AuthPasswd {
|
|
return false
|
|
}
|
|
return true
|
|
}
|
|
|
|
func (hp *HttpProxy) handleConnectReq(req *http.Request, rwc io.ReadWriteCloser) {
|
|
defer rwc.Close()
|
|
if ok := hp.Auth(req); !ok {
|
|
res := getBadResponse()
|
|
res.Write(rwc)
|
|
return
|
|
}
|
|
|
|
remote, err := net.Dial("tcp", req.URL.Host)
|
|
if err != nil {
|
|
res := &http.Response{
|
|
StatusCode: 400,
|
|
Proto: "HTTP/1.1",
|
|
ProtoMajor: 1,
|
|
ProtoMinor: 1,
|
|
}
|
|
res.Write(rwc)
|
|
return
|
|
}
|
|
rwc.Write([]byte("HTTP/1.1 200 OK\r\n\r\n"))
|
|
|
|
frpIo.Join(remote, rwc)
|
|
}
|
|
|
|
func copyHeaders(dst, src http.Header) {
|
|
for key, values := range src {
|
|
for _, value := range values {
|
|
dst.Add(key, value)
|
|
}
|
|
}
|
|
}
|
|
|
|
func removeProxyHeaders(req *http.Request) {
|
|
req.RequestURI = ""
|
|
req.Header.Del("Proxy-Connection")
|
|
req.Header.Del("Connection")
|
|
req.Header.Del("Proxy-Authenticate")
|
|
req.Header.Del("Proxy-Authorization")
|
|
req.Header.Del("TE")
|
|
req.Header.Del("Trailers")
|
|
req.Header.Del("Transfer-Encoding")
|
|
req.Header.Del("Upgrade")
|
|
}
|
|
|
|
func getBadResponse() *http.Response {
|
|
header := make(map[string][]string)
|
|
header["Proxy-Authenticate"] = []string{"Basic"}
|
|
res := &http.Response{
|
|
Status: "407 Not authorized",
|
|
StatusCode: 407,
|
|
Proto: "HTTP/1.1",
|
|
ProtoMajor: 1,
|
|
ProtoMinor: 1,
|
|
Header: header,
|
|
}
|
|
return res
|
|
}
|