2017-12-13 03:27:43 +08:00
|
|
|
// Copyright 2017 fatedier, fatedier@gmail.com
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
package vhost
|
|
|
|
|
|
|
|
import (
|
2017-12-13 04:28:58 +08:00
|
|
|
"bytes"
|
2017-12-13 03:27:43 +08:00
|
|
|
"context"
|
2021-01-18 21:49:44 +08:00
|
|
|
"encoding/base64"
|
2017-12-13 03:27:43 +08:00
|
|
|
"errors"
|
2019-03-15 16:22:41 +08:00
|
|
|
"fmt"
|
2017-12-13 03:27:43 +08:00
|
|
|
"log"
|
|
|
|
"net"
|
|
|
|
"net/http"
|
|
|
|
"strings"
|
|
|
|
"time"
|
|
|
|
|
2020-09-23 13:49:14 +08:00
|
|
|
frpLog "github.com/fatedier/frp/pkg/util/log"
|
|
|
|
"github.com/fatedier/frp/pkg/util/util"
|
2018-05-08 02:13:30 +08:00
|
|
|
|
|
|
|
"github.com/fatedier/golib/pool"
|
2017-12-13 03:27:43 +08:00
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
2019-07-31 00:41:58 +08:00
|
|
|
ErrNoDomain = errors.New("no such domain")
|
2017-12-13 03:27:43 +08:00
|
|
|
)
|
|
|
|
|
2020-05-24 17:48:37 +08:00
|
|
|
type HTTPReverseProxyOptions struct {
|
2018-08-08 11:18:38 +08:00
|
|
|
ResponseHeaderTimeoutS int64
|
|
|
|
}
|
|
|
|
|
2020-05-24 17:48:37 +08:00
|
|
|
type HTTPReverseProxy struct {
|
2019-07-31 00:41:58 +08:00
|
|
|
proxy *ReverseProxy
|
2020-05-24 17:48:37 +08:00
|
|
|
vhostRouter *Routers
|
2017-12-13 03:27:43 +08:00
|
|
|
|
2018-08-08 11:18:38 +08:00
|
|
|
responseHeaderTimeout time.Duration
|
2017-12-13 03:27:43 +08:00
|
|
|
}
|
|
|
|
|
2020-05-24 17:48:37 +08:00
|
|
|
func NewHTTPReverseProxy(option HTTPReverseProxyOptions, vhostRouter *Routers) *HTTPReverseProxy {
|
2018-08-08 11:18:38 +08:00
|
|
|
if option.ResponseHeaderTimeoutS <= 0 {
|
|
|
|
option.ResponseHeaderTimeoutS = 60
|
|
|
|
}
|
2020-05-24 17:48:37 +08:00
|
|
|
rp := &HTTPReverseProxy{
|
2018-08-08 11:18:38 +08:00
|
|
|
responseHeaderTimeout: time.Duration(option.ResponseHeaderTimeoutS) * time.Second,
|
2019-07-31 00:41:58 +08:00
|
|
|
vhostRouter: vhostRouter,
|
2017-12-13 03:27:43 +08:00
|
|
|
}
|
|
|
|
proxy := &ReverseProxy{
|
|
|
|
Director: func(req *http.Request) {
|
|
|
|
req.URL.Scheme = "http"
|
2020-05-24 17:48:37 +08:00
|
|
|
url := req.Context().Value(RouteInfoURL).(string)
|
2022-02-09 15:19:35 +08:00
|
|
|
oldHost, _ := util.CanonicalHost(req.Context().Value(RouteInfoHost).(string))
|
2021-01-18 21:49:44 +08:00
|
|
|
rc := rp.GetRouteConfig(oldHost, url)
|
|
|
|
if rc != nil {
|
|
|
|
if rc.RewriteHost != "" {
|
|
|
|
req.Host = rc.RewriteHost
|
|
|
|
}
|
|
|
|
// Set {domain}.{location} as URL host here to let http transport reuse connections.
|
|
|
|
req.URL.Host = rc.Domain + "." + base64.StdEncoding.EncodeToString([]byte(rc.Location))
|
2018-05-20 23:22:07 +08:00
|
|
|
|
2021-01-18 21:49:44 +08:00
|
|
|
for k, v := range rc.Headers {
|
|
|
|
req.Header.Set(k, v)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
req.URL.Host = req.Host
|
2018-05-20 23:22:07 +08:00
|
|
|
}
|
2021-01-18 21:49:44 +08:00
|
|
|
|
2017-12-13 03:27:43 +08:00
|
|
|
},
|
|
|
|
Transport: &http.Transport{
|
2018-08-08 11:18:38 +08:00
|
|
|
ResponseHeaderTimeout: rp.responseHeaderTimeout,
|
2021-01-18 21:49:44 +08:00
|
|
|
IdleConnTimeout: 60 * time.Second,
|
2017-12-13 03:27:43 +08:00
|
|
|
DialContext: func(ctx context.Context, network, addr string) (net.Conn, error) {
|
2020-05-24 17:48:37 +08:00
|
|
|
url := ctx.Value(RouteInfoURL).(string)
|
2022-02-09 15:19:35 +08:00
|
|
|
host, _ := util.CanonicalHost(ctx.Value(RouteInfoHost).(string))
|
2020-05-24 17:48:37 +08:00
|
|
|
remote := ctx.Value(RouteInfoRemote).(string)
|
2019-04-10 10:51:01 +08:00
|
|
|
return rp.CreateConnection(host, url, remote)
|
2017-12-13 03:27:43 +08:00
|
|
|
},
|
|
|
|
},
|
|
|
|
BufferPool: newWrapPool(),
|
|
|
|
ErrorLog: log.New(newWrapLogger(), "", 0),
|
2019-08-06 16:49:22 +08:00
|
|
|
ErrorHandler: func(rw http.ResponseWriter, req *http.Request, err error) {
|
2019-08-06 17:37:38 +08:00
|
|
|
frpLog.Warn("do http proxy request error: %v", err)
|
2019-08-06 16:49:22 +08:00
|
|
|
rw.WriteHeader(http.StatusNotFound)
|
|
|
|
rw.Write(getNotFoundPageContent())
|
|
|
|
},
|
2017-12-13 03:27:43 +08:00
|
|
|
}
|
|
|
|
rp.proxy = proxy
|
|
|
|
return rp
|
|
|
|
}
|
|
|
|
|
2019-07-31 00:41:58 +08:00
|
|
|
// Register register the route config to reverse proxy
|
|
|
|
// reverse proxy will use CreateConnFn from routeCfg to create a connection to the remote service
|
2020-05-24 17:48:37 +08:00
|
|
|
func (rp *HTTPReverseProxy) Register(routeCfg RouteConfig) error {
|
2019-07-31 00:41:58 +08:00
|
|
|
err := rp.vhostRouter.Add(routeCfg.Domain, routeCfg.Location, &routeCfg)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
2017-12-13 03:27:43 +08:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-07-31 00:41:58 +08:00
|
|
|
// UnRegister unregister route config by domain and location
|
2020-05-24 17:48:37 +08:00
|
|
|
func (rp *HTTPReverseProxy) UnRegister(domain string, location string) {
|
2017-12-13 03:27:43 +08:00
|
|
|
rp.vhostRouter.Del(domain, location)
|
|
|
|
}
|
|
|
|
|
2021-01-18 21:49:44 +08:00
|
|
|
func (rp *HTTPReverseProxy) GetRouteConfig(domain string, location string) *RouteConfig {
|
|
|
|
vr, ok := rp.getVhost(domain, location)
|
|
|
|
if ok {
|
|
|
|
return vr.payload.(*RouteConfig)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-05-24 17:48:37 +08:00
|
|
|
func (rp *HTTPReverseProxy) GetRealHost(domain string, location string) (host string) {
|
2017-12-13 03:27:43 +08:00
|
|
|
vr, ok := rp.getVhost(domain, location)
|
|
|
|
if ok {
|
2020-05-24 17:48:37 +08:00
|
|
|
host = vr.payload.(*RouteConfig).RewriteHost
|
2017-12-13 03:27:43 +08:00
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-05-24 17:48:37 +08:00
|
|
|
func (rp *HTTPReverseProxy) GetHeaders(domain string, location string) (headers map[string]string) {
|
2018-05-20 23:22:07 +08:00
|
|
|
vr, ok := rp.getVhost(domain, location)
|
|
|
|
if ok {
|
2020-05-24 17:48:37 +08:00
|
|
|
headers = vr.payload.(*RouteConfig).Headers
|
2018-05-20 23:22:07 +08:00
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-07-31 00:41:58 +08:00
|
|
|
// CreateConnection create a new connection by route config
|
2020-05-24 17:48:37 +08:00
|
|
|
func (rp *HTTPReverseProxy) CreateConnection(domain string, location string, remoteAddr string) (net.Conn, error) {
|
2017-12-13 03:27:43 +08:00
|
|
|
vr, ok := rp.getVhost(domain, location)
|
|
|
|
if ok {
|
2020-05-24 17:48:37 +08:00
|
|
|
fn := vr.payload.(*RouteConfig).CreateConnFn
|
2017-12-13 03:27:43 +08:00
|
|
|
if fn != nil {
|
2019-04-10 10:51:01 +08:00
|
|
|
return fn(remoteAddr)
|
2017-12-13 03:27:43 +08:00
|
|
|
}
|
|
|
|
}
|
2019-03-15 16:22:41 +08:00
|
|
|
return nil, fmt.Errorf("%v: %s %s", ErrNoDomain, domain, location)
|
2017-12-13 03:27:43 +08:00
|
|
|
}
|
|
|
|
|
2020-05-24 17:48:37 +08:00
|
|
|
func (rp *HTTPReverseProxy) CheckAuth(domain, location, user, passwd string) bool {
|
2017-12-13 23:44:27 +08:00
|
|
|
vr, ok := rp.getVhost(domain, location)
|
|
|
|
if ok {
|
2020-05-24 17:48:37 +08:00
|
|
|
checkUser := vr.payload.(*RouteConfig).Username
|
|
|
|
checkPasswd := vr.payload.(*RouteConfig).Password
|
2017-12-13 23:44:27 +08:00
|
|
|
if (checkUser != "" || checkPasswd != "") && (checkUser != user || checkPasswd != passwd) {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2019-07-31 00:41:58 +08:00
|
|
|
// getVhost get vhost router by domain and location
|
2020-05-24 17:48:37 +08:00
|
|
|
func (rp *HTTPReverseProxy) getVhost(domain string, location string) (vr *Router, ok bool) {
|
2017-12-13 03:27:43 +08:00
|
|
|
// first we check the full hostname
|
|
|
|
// if not exist, then check the wildcard_domain such as *.example.com
|
|
|
|
vr, ok = rp.vhostRouter.Get(domain, location)
|
|
|
|
if ok {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
domainSplit := strings.Split(domain, ".")
|
|
|
|
if len(domainSplit) < 3 {
|
2019-03-15 16:22:41 +08:00
|
|
|
return nil, false
|
|
|
|
}
|
|
|
|
|
|
|
|
for {
|
|
|
|
if len(domainSplit) < 3 {
|
|
|
|
return nil, false
|
|
|
|
}
|
|
|
|
|
|
|
|
domainSplit[0] = "*"
|
|
|
|
domain = strings.Join(domainSplit, ".")
|
|
|
|
vr, ok = rp.vhostRouter.Get(domain, location)
|
|
|
|
if ok {
|
|
|
|
return vr, true
|
|
|
|
}
|
|
|
|
domainSplit = domainSplit[1:]
|
2017-12-13 03:27:43 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-05-24 17:48:37 +08:00
|
|
|
func (rp *HTTPReverseProxy) ServeHTTP(rw http.ResponseWriter, req *http.Request) {
|
2022-02-09 15:19:35 +08:00
|
|
|
domain, _ := util.CanonicalHost(req.Host)
|
2017-12-13 23:44:27 +08:00
|
|
|
location := req.URL.Path
|
|
|
|
user, passwd, _ := req.BasicAuth()
|
|
|
|
if !rp.CheckAuth(domain, location, user, passwd) {
|
|
|
|
rw.Header().Set("WWW-Authenticate", `Basic realm="Restricted"`)
|
|
|
|
http.Error(rw, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
|
|
|
|
return
|
|
|
|
}
|
2017-12-13 03:27:43 +08:00
|
|
|
rp.proxy.ServeHTTP(rw, req)
|
|
|
|
}
|
|
|
|
|
|
|
|
type wrapPool struct{}
|
|
|
|
|
|
|
|
func newWrapPool() *wrapPool { return &wrapPool{} }
|
|
|
|
|
|
|
|
func (p *wrapPool) Get() []byte { return pool.GetBuf(32 * 1024) }
|
|
|
|
|
|
|
|
func (p *wrapPool) Put(buf []byte) { pool.PutBuf(buf) }
|
|
|
|
|
|
|
|
type wrapLogger struct{}
|
|
|
|
|
|
|
|
func newWrapLogger() *wrapLogger { return &wrapLogger{} }
|
|
|
|
|
|
|
|
func (l *wrapLogger) Write(p []byte) (n int, err error) {
|
2017-12-13 04:28:58 +08:00
|
|
|
frpLog.Warn("%s", string(bytes.TrimRight(p, "\n")))
|
2017-12-13 03:27:43 +08:00
|
|
|
return len(p), nil
|
|
|
|
}
|