mirror of
https://github.com/1f349/violet.git
synced 2024-11-22 03:11:44 +00:00
314 lines
8.8 KiB
Go
314 lines
8.8 KiB
Go
package target
|
|
|
|
import (
|
|
"fmt"
|
|
"github.com/1f349/violet/proxy"
|
|
"github.com/1f349/violet/utils"
|
|
"github.com/google/uuid"
|
|
websocket2 "github.com/gorilla/websocket"
|
|
"github.com/rs/cors"
|
|
"golang.org/x/net/http/httpguts"
|
|
"io"
|
|
"log"
|
|
"net"
|
|
"net/http"
|
|
"net/textproto"
|
|
"net/url"
|
|
"path"
|
|
"strings"
|
|
)
|
|
|
|
// serveApiCors outputs the cors headers to make APIs work.
|
|
var serveApiCors = cors.New(cors.Options{
|
|
AllowedOrigins: []string{"*"}, // allow all origins for api requests
|
|
AllowedHeaders: []string{"Content-Type", "Authorization"},
|
|
AllowedMethods: []string{
|
|
http.MethodGet,
|
|
http.MethodHead,
|
|
http.MethodPost,
|
|
http.MethodPut,
|
|
http.MethodPatch,
|
|
http.MethodDelete,
|
|
http.MethodConnect,
|
|
},
|
|
AllowCredentials: true,
|
|
})
|
|
|
|
// Route is a target used by the router to manage forwarding traffic to an
|
|
// internal server using the specified configuration.
|
|
type Route struct {
|
|
Src string `json:"src"` // request source
|
|
Dst string `json:"dst"` // proxy destination
|
|
Flags Flags `json:"flags"` // extra flags
|
|
Headers http.Header `json:"-"` // extra headers
|
|
Proxy *proxy.HybridTransport `json:"-"` // reverse proxy handler
|
|
}
|
|
|
|
type RouteWithActive struct {
|
|
Route
|
|
Active bool `json:"active"`
|
|
}
|
|
|
|
func (r Route) HasFlag(flag Flags) bool {
|
|
return r.Flags&flag != 0
|
|
}
|
|
|
|
// UpdateHeaders takes an existing set of headers and overwrites them with the
|
|
// extra headers.
|
|
func (r Route) UpdateHeaders(header http.Header) {
|
|
for k, v := range r.Headers {
|
|
header[k] = v
|
|
}
|
|
}
|
|
|
|
// ServeHTTP responds with the data proxied from the internal server to the
|
|
// response writer provided.
|
|
func (r Route) ServeHTTP(rw http.ResponseWriter, req *http.Request) {
|
|
if r.HasFlag(FlagCors) {
|
|
// wraps with CORS handler
|
|
serveApiCors.Handler(http.HandlerFunc(r.internalServeHTTP)).ServeHTTP(rw, req)
|
|
} else {
|
|
r.internalServeHTTP(rw, req)
|
|
}
|
|
}
|
|
|
|
// internalServeHTTP is an internal method which handles configuring the request
|
|
// for the reverse proxy handler.
|
|
func (r Route) internalServeHTTP(rw http.ResponseWriter, req *http.Request) {
|
|
// set the scheme and port using defaults if the port is 0
|
|
scheme := "http"
|
|
if r.HasFlag(FlagSecureMode) {
|
|
scheme = "https"
|
|
}
|
|
|
|
// split the host and path
|
|
host, p := utils.SplitHostPath(r.Dst)
|
|
|
|
// if not Abs then join with the ending of the current path
|
|
if !r.HasFlag(FlagAbs) {
|
|
p = path.Join(p, req.URL.Path)
|
|
|
|
// replace the trailing slash that path.Join() strips off
|
|
if strings.HasSuffix(req.URL.Path, "/") {
|
|
p += "/"
|
|
}
|
|
}
|
|
|
|
// fix empty path
|
|
if p == "" {
|
|
p = "/"
|
|
}
|
|
|
|
// create a new URL
|
|
u := &url.URL{
|
|
Scheme: scheme,
|
|
Host: host,
|
|
Path: p,
|
|
RawQuery: req.URL.RawQuery,
|
|
}
|
|
|
|
// close the incoming body after use
|
|
if req.Body != nil {
|
|
defer req.Body.Close()
|
|
}
|
|
|
|
// create the internal request
|
|
req2, err := http.NewRequest(req.Method, u.String(), req.Body)
|
|
if err != nil {
|
|
log.Printf("[ServeRoute::ServeHTTP()] Error generating new request: %s\n", err)
|
|
utils.RespondVioletError(rw, http.StatusBadGateway, "error generating new request")
|
|
return
|
|
}
|
|
|
|
// loops over the incoming request headers
|
|
for k, v := range req.Header {
|
|
// ignore host header
|
|
if k == "Host" {
|
|
continue
|
|
}
|
|
// copy header into the internal request
|
|
req2.Header[k] = v
|
|
}
|
|
|
|
// if extra route headers are set
|
|
if r.Headers != nil {
|
|
// loop over headers
|
|
for k, v := range r.Headers {
|
|
// copy header into the internal request
|
|
req2.Header[k] = v
|
|
}
|
|
}
|
|
|
|
// if forward host is enabled then send the host
|
|
if r.HasFlag(FlagForwardHost) {
|
|
req2.Host = req.Host
|
|
}
|
|
|
|
// adds extra request metadata
|
|
if r.internalReverseProxyMeta(rw, req, req2) {
|
|
return
|
|
}
|
|
|
|
// switch to websocket handler
|
|
// internally the http hijack method is called
|
|
if r.HasFlag(FlagWebsocket) && websocket2.IsWebSocketUpgrade(req2) {
|
|
r.Proxy.ConnectWebsocket(rw, req2)
|
|
return
|
|
}
|
|
|
|
req2.Header.Set("X-Violet-Loop-Detect", "1")
|
|
|
|
// serve request with reverse proxy
|
|
var resp *http.Response
|
|
if r.HasFlag(FlagIgnoreCert) {
|
|
resp, err = r.Proxy.InsecureRoundTrip(req2)
|
|
} else {
|
|
resp, err = r.Proxy.SecureRoundTrip(req2)
|
|
}
|
|
if err != nil {
|
|
log.Printf("[ServeRoute::ServeHTTP()] Error receiving internal round trip response: %s\n", err)
|
|
utils.RespondVioletError(rw, http.StatusBadGateway, "error receiving internal round trip response")
|
|
return
|
|
}
|
|
if resp.StatusCode == http.StatusLoopDetected {
|
|
u := uuid.New()
|
|
log.Printf("[ServeRoute::ServeHTTP()] Loop Detected: %s %s '%s' -> '%s'\n", u, req.Method, req.URL.String(), req2.URL.String())
|
|
utils.RespondVioletError(rw, http.StatusLoopDetected, "error loop detected: "+u.String())
|
|
return
|
|
}
|
|
|
|
// copy headers and status code
|
|
copyHeader(rw.Header(), resp.Header)
|
|
rw.WriteHeader(resp.StatusCode)
|
|
|
|
// copy body
|
|
if resp.Body != nil {
|
|
_, err := io.Copy(rw, resp.Body)
|
|
if err != nil {
|
|
return
|
|
}
|
|
}
|
|
}
|
|
|
|
// internalReverseProxyMeta is mainly built from code copied from httputil.ReverseProxy,
|
|
// due to the highly custom nature of this reverse proxy software we use a copy
|
|
// of the code instead of the full httputil implementation to prevent overhead
|
|
// from the more generic implementation
|
|
func (r Route) internalReverseProxyMeta(rw http.ResponseWriter, req, req2 *http.Request) bool {
|
|
if req.ContentLength == 0 {
|
|
req2.Body = nil // Issue 16036: nil Body for http.Transport retries
|
|
}
|
|
if req2.Header == nil {
|
|
req2.Header = make(http.Header) // Issue 33142: historical behavior was to always allocate
|
|
}
|
|
|
|
reqUpType := upgradeType(req2.Header)
|
|
if !asciiIsPrint(reqUpType) {
|
|
utils.RespondVioletError(rw, http.StatusBadRequest, fmt.Sprintf("client tried to switch to invalid protocol %q", reqUpType))
|
|
return true
|
|
}
|
|
removeHopByHopHeaders(req2.Header)
|
|
|
|
// Issue 21096: tell backend applications that care about trailer support
|
|
// that we support trailers. (We do, but we don't go out of our way to
|
|
// advertise that unless the incoming client request thought it was worth
|
|
// mentioning.) Note that we look at req.Header, not outreq.Header, since
|
|
// the latter has passed through removeHopByHopHeaders.
|
|
if httpguts.HeaderValuesContainsToken(req.Header["Te"], "trailers") {
|
|
req2.Header.Set("Te", "trailers")
|
|
}
|
|
|
|
// After stripping all the hop-by-hop connection headers above, add back any
|
|
// necessary for protocol upgrades, such as for websockets.
|
|
if reqUpType != "" {
|
|
req2.Header.Set("Connection", "Upgrade")
|
|
req2.Header.Set("Upgrade", reqUpType)
|
|
}
|
|
|
|
if r.HasFlag(FlagForwardAddr) {
|
|
if clientIP, _, err := net.SplitHostPort(req.RemoteAddr); err == nil {
|
|
// If we aren't the first proxy retain prior
|
|
// X-Forwarded-For information as a comma+space
|
|
// separated list and fold multiple headers into one.
|
|
prior, ok := req2.Header["X-Forwarded-For"]
|
|
omit := ok && prior == nil // Issue 38079: nil now means don't populate the header
|
|
if len(prior) > 0 {
|
|
clientIP = strings.Join(prior, ", ") + ", " + clientIP
|
|
}
|
|
if !omit {
|
|
req2.Header.Set("X-Forwarded-For", clientIP)
|
|
}
|
|
}
|
|
}
|
|
|
|
return false
|
|
}
|
|
|
|
// String outputs a debug string for the route.
|
|
func (r Route) String() string {
|
|
return fmt.Sprintf("%#v", r)
|
|
}
|
|
|
|
// copyHeader copies all headers from src to dst
|
|
func copyHeader(dst, src http.Header) {
|
|
for k, vv := range src {
|
|
for _, v := range vv {
|
|
dst.Add(k, v)
|
|
}
|
|
}
|
|
}
|
|
|
|
// updateType returns the value of upgrade from http.Header
|
|
func upgradeType(h http.Header) string {
|
|
if !httpguts.HeaderValuesContainsToken(h["Connection"], "Upgrade") {
|
|
return ""
|
|
}
|
|
return h.Get("Upgrade")
|
|
}
|
|
|
|
// IsPrint returns whether s is ASCII and printable according to
|
|
// https://tools.ietf.org/html/rfc20#section-4.2.
|
|
func asciiIsPrint(s string) bool {
|
|
for i := 0; i < len(s); i++ {
|
|
if s[i] < ' ' || s[i] > '~' {
|
|
return false
|
|
}
|
|
}
|
|
return true
|
|
}
|
|
|
|
// Hop-by-hop headers. These are removed when sent to the backend.
|
|
// As of RFC 7230, hop-by-hop headers are required to appear in the
|
|
// Connection header field. These are the headers defined by the
|
|
// obsoleted RFC 2616 (section 13.5.1) and are used for backward
|
|
// compatibility.
|
|
var hopHeaders = []string{
|
|
"Connection",
|
|
"Proxy-Connection", // non-standard but still sent by libcurl and rejected by e.g. google
|
|
"Keep-Alive",
|
|
"Proxy-Authenticate",
|
|
"Proxy-Authorization",
|
|
"Te", // canonicalized version of "TE"
|
|
"Trailer", // not Trailers per URL above; https://www.rfc-editor.org/errata_search.php?eid=4522
|
|
"Transfer-Encoding",
|
|
"Upgrade",
|
|
}
|
|
|
|
// removeHopByHopHeaders removes the hop-by-hop headers defined in hopHeaders
|
|
func removeHopByHopHeaders(h http.Header) {
|
|
// RFC 7230, section 6.1: Remove headers listed in the "Connection" header.
|
|
for _, f := range h["Connection"] {
|
|
for _, sf := range strings.Split(f, ",") {
|
|
if sf = textproto.TrimString(sf); sf != "" {
|
|
h.Del(sf)
|
|
}
|
|
}
|
|
}
|
|
// RFC 2616, section 13.5.1: Remove a set of known hop-by-hop headers.
|
|
// This behavior is superseded by the RFC 7230 Connection header, but
|
|
// preserve it for backwards compatibility.
|
|
for _, f := range hopHeaders {
|
|
h.Del(f)
|
|
}
|
|
}
|