proxyRequestHandler.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303
  1. package dynamicproxy
  2. import (
  3. "errors"
  4. "log"
  5. "net"
  6. "net/http"
  7. "net/url"
  8. "path/filepath"
  9. "sort"
  10. "strings"
  11. "imuslab.com/zoraxy/mod/dynamicproxy/dpcore"
  12. "imuslab.com/zoraxy/mod/dynamicproxy/rewrite"
  13. "imuslab.com/zoraxy/mod/netutils"
  14. "imuslab.com/zoraxy/mod/statistic"
  15. "imuslab.com/zoraxy/mod/websocketproxy"
  16. )
  17. // Check if the request URI matches any of the proxy endpoint
  18. func (router *Router) getTargetProxyEndpointFromRequestURI(requestURI string) *ProxyEndpoint {
  19. var targetProxyEndpoint *ProxyEndpoint = nil
  20. router.ProxyEndpoints.Range(func(key, value interface{}) bool {
  21. rootname := key.(string)
  22. if strings.HasPrefix(requestURI, rootname) {
  23. thisProxyEndpoint := value.(*ProxyEndpoint)
  24. targetProxyEndpoint = thisProxyEndpoint
  25. }
  26. return true
  27. })
  28. return targetProxyEndpoint
  29. }
  30. // Get the proxy endpoint from hostname, which might includes checking of wildcard certificates
  31. func (router *Router) getProxyEndpointFromHostname(hostname string) *ProxyEndpoint {
  32. var targetSubdomainEndpoint *ProxyEndpoint = nil
  33. ep, ok := router.ProxyEndpoints.Load(hostname)
  34. if ok {
  35. //Exact hit
  36. targetSubdomainEndpoint = ep.(*ProxyEndpoint)
  37. if !targetSubdomainEndpoint.Disabled {
  38. return targetSubdomainEndpoint
  39. }
  40. }
  41. //No hit. Try with wildcard and alias
  42. matchProxyEndpoints := []*ProxyEndpoint{}
  43. router.ProxyEndpoints.Range(func(k, v interface{}) bool {
  44. ep := v.(*ProxyEndpoint)
  45. match, err := filepath.Match(ep.RootOrMatchingDomain, hostname)
  46. if err != nil {
  47. //Bad pattern. Skip this rule
  48. return true
  49. }
  50. if match {
  51. //Wildcard matches. Skip checking alias
  52. matchProxyEndpoints = append(matchProxyEndpoints, ep)
  53. return true
  54. }
  55. //Wildcard not match. Check for alias
  56. if ep.MatchingDomainAlias != nil && len(ep.MatchingDomainAlias) > 0 {
  57. for _, aliasDomain := range ep.MatchingDomainAlias {
  58. match, err := filepath.Match(aliasDomain, hostname)
  59. if err != nil {
  60. //Bad pattern. Skip this alias
  61. continue
  62. }
  63. if match {
  64. //This alias match
  65. matchProxyEndpoints = append(matchProxyEndpoints, ep)
  66. return true
  67. }
  68. }
  69. }
  70. return true
  71. })
  72. if len(matchProxyEndpoints) == 1 {
  73. //Only 1 match
  74. return matchProxyEndpoints[0]
  75. } else if len(matchProxyEndpoints) > 1 {
  76. //More than one match. Get the best match one
  77. sort.Slice(matchProxyEndpoints, func(i, j int) bool {
  78. return matchProxyEndpoints[i].RootOrMatchingDomain < matchProxyEndpoints[j].RootOrMatchingDomain
  79. })
  80. return matchProxyEndpoints[0]
  81. }
  82. return targetSubdomainEndpoint
  83. }
  84. // Clearn URL Path (without the http:// part) replaces // in a URL to /
  85. func (router *Router) clearnURL(targetUrlOPath string) string {
  86. return strings.ReplaceAll(targetUrlOPath, "//", "/")
  87. }
  88. // Rewrite URL rewrite the prefix part of a virtual directory URL with /
  89. func (router *Router) rewriteURL(rooturl string, requestURL string) string {
  90. rewrittenURL := requestURL
  91. rewrittenURL = strings.TrimPrefix(rewrittenURL, strings.TrimSuffix(rooturl, "/"))
  92. if strings.Contains(rewrittenURL, "//") {
  93. rewrittenURL = router.clearnURL(rewrittenURL)
  94. }
  95. return rewrittenURL
  96. }
  97. // Handle host request
  98. func (h *ProxyHandler) hostRequest(w http.ResponseWriter, r *http.Request, target *ProxyEndpoint) {
  99. r.Header.Set("X-Forwarded-Host", r.Host)
  100. r.Header.Set("X-Forwarded-Server", "zoraxy-"+h.Parent.Option.HostUUID)
  101. /* Load balancing */
  102. selectedUpstream, err := h.Parent.loadBalancer.GetRequestUpstreamTarget(w, r, target.ActiveOrigins, target.UseStickySession)
  103. if err != nil {
  104. http.ServeFile(w, r, "./web/rperror.html")
  105. h.Parent.Option.Logger.PrintAndLog("proxy", "Failed to assign an upstream for this request", err)
  106. h.Parent.logRequest(r, false, 521, "subdomain-http", r.URL.Hostname())
  107. return
  108. }
  109. /* WebSocket automatic proxy */
  110. requestURL := r.URL.String()
  111. if r.Header["Upgrade"] != nil && strings.ToLower(r.Header["Upgrade"][0]) == "websocket" {
  112. //Handle WebSocket request. Forward the custom Upgrade header and rewrite origin
  113. r.Header.Set("Zr-Origin-Upgrade", "websocket")
  114. wsRedirectionEndpoint := selectedUpstream.OriginIpOrDomain
  115. if wsRedirectionEndpoint[len(wsRedirectionEndpoint)-1:] != "/" {
  116. //Append / to the end of the redirection endpoint if not exists
  117. wsRedirectionEndpoint = wsRedirectionEndpoint + "/"
  118. }
  119. if len(requestURL) > 0 && requestURL[:1] == "/" {
  120. //Remove starting / from request URL if exists
  121. requestURL = requestURL[1:]
  122. }
  123. u, _ := url.Parse("ws://" + wsRedirectionEndpoint + requestURL)
  124. if selectedUpstream.RequireTLS {
  125. u, _ = url.Parse("wss://" + wsRedirectionEndpoint + requestURL)
  126. }
  127. h.Parent.logRequest(r, true, 101, "host-websocket", selectedUpstream.OriginIpOrDomain)
  128. wspHandler := websocketproxy.NewProxy(u, websocketproxy.Options{
  129. SkipTLSValidation: selectedUpstream.SkipCertValidations,
  130. SkipOriginCheck: selectedUpstream.SkipWebSocketOriginCheck,
  131. CopyAllHeaders: true,
  132. UserDefinedHeaders: target.HeaderRewriteRules.UserDefinedHeaders,
  133. Logger: h.Parent.Option.Logger,
  134. })
  135. wspHandler.ServeHTTP(w, r)
  136. return
  137. }
  138. originalHostHeader := r.Host
  139. if r.URL != nil {
  140. r.Host = r.URL.Host
  141. } else {
  142. //Fallback when the upstream proxy screw something up in the header
  143. r.URL, _ = url.Parse(originalHostHeader)
  144. }
  145. //Populate the user-defined headers with the values from the request
  146. rewrittenUserDefinedHeaders := rewrite.PopulateRequestHeaderVariables(r, target.HeaderRewriteRules.UserDefinedHeaders)
  147. //Build downstream and upstream header rules
  148. upstreamHeaders, downstreamHeaders := rewrite.SplitUpDownStreamHeaders(&rewrite.HeaderRewriteOptions{
  149. UserDefinedHeaders: rewrittenUserDefinedHeaders,
  150. HSTSMaxAge: target.HeaderRewriteRules.HSTSMaxAge,
  151. HSTSIncludeSubdomains: target.ContainsWildcardName(true),
  152. EnablePermissionPolicyHeader: target.HeaderRewriteRules.EnablePermissionPolicyHeader,
  153. PermissionPolicy: target.HeaderRewriteRules.PermissionPolicy,
  154. })
  155. //Handle the request reverse proxy
  156. statusCode, err := selectedUpstream.ServeHTTP(w, r, &dpcore.ResponseRewriteRuleSet{
  157. ProxyDomain: selectedUpstream.OriginIpOrDomain,
  158. OriginalHost: originalHostHeader,
  159. UseTLS: selectedUpstream.RequireTLS,
  160. NoCache: h.Parent.Option.NoCache,
  161. PathPrefix: "",
  162. UpstreamHeaders: upstreamHeaders,
  163. DownstreamHeaders: downstreamHeaders,
  164. HostHeaderOverwrite: target.HeaderRewriteRules.RequestHostOverwrite,
  165. NoRemoveHopByHop: target.HeaderRewriteRules.DisableHopByHopHeaderRemoval,
  166. Version: target.parent.Option.HostVersion,
  167. })
  168. var dnsError *net.DNSError
  169. if err != nil {
  170. if errors.As(err, &dnsError) {
  171. http.ServeFile(w, r, "./web/hosterror.html")
  172. h.Parent.logRequest(r, false, 404, "host-http", r.URL.Hostname())
  173. } else {
  174. http.ServeFile(w, r, "./web/rperror.html")
  175. //TODO: Take this upstream offline automatically
  176. h.Parent.logRequest(r, false, 521, "host-http", r.URL.Hostname())
  177. }
  178. }
  179. h.Parent.logRequest(r, true, statusCode, "host-http", r.URL.Hostname())
  180. }
  181. // Handle vdir type request
  182. func (h *ProxyHandler) vdirRequest(w http.ResponseWriter, r *http.Request, target *VirtualDirectoryEndpoint) {
  183. rewriteURL := h.Parent.rewriteURL(target.MatchingPath, r.RequestURI)
  184. r.URL, _ = url.Parse(rewriteURL)
  185. r.Header.Set("X-Forwarded-Host", r.Host)
  186. r.Header.Set("X-Forwarded-Server", "zoraxy-"+h.Parent.Option.HostUUID)
  187. if r.Header["Upgrade"] != nil && strings.ToLower(r.Header["Upgrade"][0]) == "websocket" {
  188. //Handle WebSocket request. Forward the custom Upgrade header and rewrite origin
  189. r.Header.Set("Zr-Origin-Upgrade", "websocket")
  190. wsRedirectionEndpoint := target.Domain
  191. if wsRedirectionEndpoint[len(wsRedirectionEndpoint)-1:] != "/" {
  192. wsRedirectionEndpoint = wsRedirectionEndpoint + "/"
  193. }
  194. u, _ := url.Parse("ws://" + wsRedirectionEndpoint + r.URL.String())
  195. if target.RequireTLS {
  196. u, _ = url.Parse("wss://" + wsRedirectionEndpoint + r.URL.String())
  197. }
  198. h.Parent.logRequest(r, true, 101, "vdir-websocket", target.Domain)
  199. wspHandler := websocketproxy.NewProxy(u, websocketproxy.Options{
  200. SkipTLSValidation: target.SkipCertValidations,
  201. SkipOriginCheck: true, //You should not use websocket via virtual directory. But keep this to true for compatibility
  202. CopyAllHeaders: true,
  203. UserDefinedHeaders: target.parent.HeaderRewriteRules.UserDefinedHeaders,
  204. Logger: h.Parent.Option.Logger,
  205. })
  206. wspHandler.ServeHTTP(w, r)
  207. return
  208. }
  209. originalHostHeader := r.Host
  210. if r.URL != nil {
  211. r.Host = r.URL.Host
  212. } else {
  213. //Fallback when the upstream proxy screw something up in the header
  214. r.URL, _ = url.Parse(originalHostHeader)
  215. }
  216. //Populate the user-defined headers with the values from the request
  217. rewrittenUserDefinedHeaders := rewrite.PopulateRequestHeaderVariables(r, target.parent.HeaderRewriteRules.UserDefinedHeaders)
  218. //Build downstream and upstream header rules, use the parent (subdomain) endpoint's headers
  219. upstreamHeaders, downstreamHeaders := rewrite.SplitUpDownStreamHeaders(&rewrite.HeaderRewriteOptions{
  220. UserDefinedHeaders: rewrittenUserDefinedHeaders,
  221. HSTSMaxAge: target.parent.HeaderRewriteRules.HSTSMaxAge,
  222. HSTSIncludeSubdomains: target.parent.ContainsWildcardName(true),
  223. EnablePermissionPolicyHeader: target.parent.HeaderRewriteRules.EnablePermissionPolicyHeader,
  224. PermissionPolicy: target.parent.HeaderRewriteRules.PermissionPolicy,
  225. })
  226. //Handle the virtual directory reverse proxy request
  227. statusCode, err := target.proxy.ServeHTTP(w, r, &dpcore.ResponseRewriteRuleSet{
  228. ProxyDomain: target.Domain,
  229. OriginalHost: originalHostHeader,
  230. UseTLS: target.RequireTLS,
  231. PathPrefix: target.MatchingPath,
  232. UpstreamHeaders: upstreamHeaders,
  233. DownstreamHeaders: downstreamHeaders,
  234. HostHeaderOverwrite: target.parent.HeaderRewriteRules.RequestHostOverwrite,
  235. Version: target.parent.parent.Option.HostVersion,
  236. })
  237. var dnsError *net.DNSError
  238. if err != nil {
  239. if errors.As(err, &dnsError) {
  240. http.ServeFile(w, r, "./web/hosterror.html")
  241. log.Println(err.Error())
  242. h.Parent.logRequest(r, false, 404, "vdir-http", target.Domain)
  243. } else {
  244. http.ServeFile(w, r, "./web/rperror.html")
  245. log.Println(err.Error())
  246. h.Parent.logRequest(r, false, 521, "vdir-http", target.Domain)
  247. }
  248. }
  249. h.Parent.logRequest(r, true, statusCode, "vdir-http", target.Domain)
  250. }
  251. // This logger collect data for the statistical analysis. For log to file logger, check the Logger and LogHTTPRequest handler
  252. func (router *Router) logRequest(r *http.Request, succ bool, statusCode int, forwardType string, target string) {
  253. if router.Option.StatisticCollector != nil {
  254. go func() {
  255. requestInfo := statistic.RequestInfo{
  256. IpAddr: netutils.GetRequesterIP(r),
  257. RequestOriginalCountryISOCode: router.Option.GeodbStore.GetRequesterCountryISOCode(r),
  258. Succ: succ,
  259. StatusCode: statusCode,
  260. ForwardType: forwardType,
  261. Referer: r.Referer(),
  262. UserAgent: r.UserAgent(),
  263. RequestURL: r.Host + r.RequestURI,
  264. Target: target,
  265. }
  266. router.Option.StatisticCollector.RecordRequest(requestInfo)
  267. }()
  268. }
  269. router.Option.Logger.LogHTTPRequest(r, forwardType, statusCode)
  270. }