You cannot select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

233 lines
4.3 KiB
Go

package proxy
import (
"crypto/tls"
"io"
"net"
"net/http"
"os"
"strings"
"sync"
"time"
_log "github.com/sirupsen/logrus"
)
var log = _log.WithField("at", "proxy")
var ignoreErr = func(log *_log.Entry, err error) bool {
errs := err.Error()
strs := []string{
"read: connection reset by peer",
"write: broken pipe",
"i/o timeout",
"net/http: TLS handshake timeout",
"io: read/write on closed pipe",
}
for _, str := range strs {
if strings.Contains(errs, str) {
log.Debug(str)
return true
}
}
return false
}
type Options struct {
Addr string
}
type Proxy struct {
Server *http.Server
Client *http.Client
Mitm Mitm
}
func (proxy *Proxy) Start() error {
errChan := make(chan error)
go func() {
log.Infof("Proxy start listen at %v\n", proxy.Server.Addr)
err := proxy.Server.ListenAndServe()
errChan <- err
}()
go func() {
err := proxy.Mitm.Start()
errChan <- err
}()
err := <-errChan
return err
}
func (proxy *Proxy) ServeHTTP(res http.ResponseWriter, req *http.Request) {
if req.Method == "CONNECT" {
proxy.handleConnect(res, req)
return
}
log := log.WithFields(_log.Fields{
"in": "ServeHTTP",
"url": req.URL,
"method": req.Method,
})
if !req.URL.IsAbs() || req.URL.Host == "" {
res.WriteHeader(400)
_, err := io.WriteString(res, "此为代理服务器,不能直接发起请求")
if err != nil {
log.Error(err)
}
return
}
start := time.Now()
proxyReq, err := http.NewRequest(req.Method, req.URL.String(), req.Body)
if err != nil {
log.Error(err)
res.WriteHeader(502)
return
}
for key, value := range req.Header {
for _, v := range value {
proxyReq.Header.Add(key, v)
}
}
proxyRes, err := proxy.Client.Do(proxyReq)
if err != nil {
if !ignoreErr(log, err) {
log.Error(err)
}
res.WriteHeader(502)
return
}
defer proxyRes.Body.Close()
for key, value := range proxyRes.Header {
for _, v := range value {
res.Header().Add(key, v)
}
}
res.WriteHeader(proxyRes.StatusCode)
_, err = io.Copy(res, proxyRes.Body)
if err != nil && !ignoreErr(log, err) {
log.Error(err)
return
}
log.Infof("status code: %v cost %v ms\n", proxyRes.StatusCode, time.Since(start).Milliseconds())
}
func (proxy *Proxy) handleConnect(res http.ResponseWriter, req *http.Request) {
log := log.WithFields(_log.Fields{
"in": "handleConnect",
"host": req.Host,
})
log.Debug("CONNECT")
conn, err := proxy.Mitm.Dial(req.Host)
if err != nil {
log.Error(err)
res.WriteHeader(502)
return
}
defer conn.Close()
cconn, _, err := res.(http.Hijacker).Hijack()
if err != nil {
log.Error(err)
res.WriteHeader(502)
return
}
defer cconn.Close()
_, err = io.WriteString(cconn, "HTTP/1.1 200 Connection Established\r\n\r\n")
if err != nil {
log.Error(err)
return
}
done := make(chan struct{})
go func() {
_, err := io.Copy(conn, cconn)
if err != nil && !ignoreErr(log, err) {
log.Error(err)
}
close(done)
}()
_, err = io.Copy(cconn, conn)
if err != nil && !ignoreErr(log, err) {
log.Error(err)
}
<-done
}
func NewProxy(opts *Options) (*Proxy, error) {
proxy := new(Proxy)
proxy.Server = &http.Server{
Addr: opts.Addr,
Handler: proxy,
}
proxy.Client = &http.Client{
Transport: &http.Transport{
Proxy: http.ProxyFromEnvironment,
DialContext: (&net.Dialer{
Timeout: 30 * time.Second,
KeepAlive: 30 * time.Second,
DualStack: true,
}).DialContext,
MaxIdleConns: 100,
IdleConnTimeout: 90 * time.Second,
TLSHandshakeTimeout: 10 * time.Second,
ExpectContinueTimeout: 1 * time.Second,
ForceAttemptHTTP2: false, // disable http2
DisableCompression: true,
TLSClientConfig: &tls.Config{
KeyLogWriter: GetTlsKeyLogWriter(),
},
},
}
mitm, err := NewMitmMemory(proxy)
if err != nil {
return nil, err
}
proxy.Mitm = mitm
return proxy, nil
}
var tlsKeyLogWriter io.Writer
var tlsKeyLogOnce sync.Once
// Wireshark 解析 https 设置
func GetTlsKeyLogWriter() io.Writer {
tlsKeyLogOnce.Do(func() {
logfile := os.Getenv("SSLKEYLOGFILE")
if logfile == "" {
return
}
writer, err := os.OpenFile(logfile, os.O_WRONLY|os.O_CREATE|os.O_APPEND, 0666)
if err != nil {
log.WithField("in", "GetTlsKeyLogWriter").Debug(err)
return
}
tlsKeyLogWriter = writer
})
return tlsKeyLogWriter
}