addon-dailer
parent
573723b61e
commit
730bd208bb
@ -0,0 +1,54 @@
|
||||
package addon
|
||||
|
||||
import (
|
||||
"time"
|
||||
|
||||
"github.com/lqqyt2423/go-mitmproxy/flow"
|
||||
_log "github.com/sirupsen/logrus"
|
||||
)
|
||||
|
||||
var log = _log.WithField("at", "addon")
|
||||
|
||||
type Addon interface {
|
||||
// HTTP request headers were successfully read. At this point, the body is empty.
|
||||
Requestheaders(*flow.Flow)
|
||||
|
||||
// The full HTTP request has been read.
|
||||
Request(*flow.Flow)
|
||||
|
||||
// HTTP response headers were successfully read. At this point, the body is empty.
|
||||
Responseheaders(*flow.Flow)
|
||||
|
||||
// The full HTTP response has been read.
|
||||
Response(*flow.Flow)
|
||||
}
|
||||
|
||||
// Base do nothing
|
||||
type Base struct{}
|
||||
|
||||
func (addon *Base) Requestheaders(*flow.Flow) {}
|
||||
func (addon *Base) Request(*flow.Flow) {}
|
||||
func (addon *Base) Responseheaders(*flow.Flow) {}
|
||||
func (addon *Base) Response(*flow.Flow) {}
|
||||
|
||||
// Log log http record
|
||||
type Log struct {
|
||||
Base
|
||||
}
|
||||
|
||||
func (addon *Log) Requestheaders(f *flow.Flow) {
|
||||
log := log.WithField("in", "Log")
|
||||
start := time.Now()
|
||||
go func() {
|
||||
<-f.Done()
|
||||
var StatusCode int
|
||||
if f.Response != nil {
|
||||
StatusCode = f.Response.StatusCode
|
||||
}
|
||||
var contentLen int
|
||||
if f.Response != nil && f.Response.Body != nil {
|
||||
contentLen = len(f.Response.Body)
|
||||
}
|
||||
log.Infof("%v %v %v %v - %v ms\n", f.Request.Method, f.Request.URL.String(), StatusCode, contentLen, time.Since(start).Milliseconds())
|
||||
}()
|
||||
}
|
@ -0,0 +1,24 @@
|
||||
package proxy
|
||||
|
||||
import (
|
||||
"net"
|
||||
)
|
||||
|
||||
// 拦截 https 流量通用接口
|
||||
type Interceptor interface {
|
||||
// 初始化
|
||||
Start() error
|
||||
// 针对每个 host 连接
|
||||
Dial(host string) (net.Conn, error)
|
||||
}
|
||||
|
||||
// 直接转发 https 流量
|
||||
type Forward struct{}
|
||||
|
||||
func (i *Forward) Start() error {
|
||||
return nil
|
||||
}
|
||||
|
||||
func (i *Forward) Dial(host string) (net.Conn, error) {
|
||||
return net.Dial("tcp", host)
|
||||
}
|
@ -0,0 +1,213 @@
|
||||
package proxy
|
||||
|
||||
import (
|
||||
"bufio"
|
||||
"crypto/tls"
|
||||
"net"
|
||||
"net/http"
|
||||
"os"
|
||||
"strings"
|
||||
"time"
|
||||
|
||||
mock_conn "github.com/jordwest/mock-conn"
|
||||
"github.com/lqqyt2423/go-mitmproxy/cert"
|
||||
)
|
||||
|
||||
// 模拟了标准库中 server 运行,目的是仅通过当前进程内存转发 socket 数据,不需要经过 tcp 或 unix socket
|
||||
|
||||
// mock net.Listener
|
||||
type listener struct {
|
||||
connChan chan net.Conn
|
||||
}
|
||||
|
||||
func (l *listener) Accept() (net.Conn, error) { return <-l.connChan, nil }
|
||||
func (l *listener) Close() error { return nil }
|
||||
func (l *listener) Addr() net.Addr { return nil }
|
||||
|
||||
type ioRes struct {
|
||||
n int
|
||||
err error
|
||||
}
|
||||
|
||||
// mock net.Conn
|
||||
type conn struct {
|
||||
mock_conn.End
|
||||
host string // remote host
|
||||
readErrChan chan error // Read 方法提前返回时的错误
|
||||
}
|
||||
|
||||
// 建立客户端和服务端通信的通道
|
||||
func newPipes(host string) (client *conn, server *connBuf) {
|
||||
pipes := mock_conn.NewConn()
|
||||
client = &conn{*pipes.Client, host, nil}
|
||||
serverConn := &conn{*pipes.Server, host, make(chan error)}
|
||||
server = newConnBuf(serverConn)
|
||||
return client, server
|
||||
}
|
||||
|
||||
// 当接收到 readErrChan 时,可提前返回
|
||||
func (c *conn) Read(data []byte) (int, error) {
|
||||
select {
|
||||
case err := <-c.readErrChan:
|
||||
return 0, err
|
||||
default:
|
||||
}
|
||||
|
||||
resChan := make(chan *ioRes)
|
||||
done := make(chan struct{})
|
||||
defer close(done)
|
||||
|
||||
go func() {
|
||||
select {
|
||||
case <-done:
|
||||
return
|
||||
default:
|
||||
}
|
||||
|
||||
n, err := c.End.Read(data)
|
||||
select {
|
||||
case resChan <- &ioRes{n, err}:
|
||||
return
|
||||
case <-done:
|
||||
close(resChan)
|
||||
}
|
||||
}()
|
||||
|
||||
select {
|
||||
case res := <-resChan:
|
||||
return res.n, res.err
|
||||
case err := <-c.readErrChan:
|
||||
return 0, err
|
||||
}
|
||||
}
|
||||
|
||||
func (c *conn) SetDeadline(t time.Time) error {
|
||||
if !t.Equal(time.Time{}) {
|
||||
log.WithField("host", c.host).Warnf("SetDeadline %v\n", t)
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
// http server 会在连接快结束时调用此方法
|
||||
func (c *conn) SetReadDeadline(t time.Time) error {
|
||||
if !t.Equal(time.Time{}) {
|
||||
if !t.After(time.Now()) {
|
||||
// 使当前 Read 尽快返回
|
||||
c.readErrChan <- os.ErrDeadlineExceeded
|
||||
} else {
|
||||
log.WithField("host", c.host).Warnf("SetReadDeadline %v\n", t)
|
||||
}
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
func (c *conn) SetWriteDeadline(t time.Time) error {
|
||||
log.WithField("host", c.host).Warnf("SetWriteDeadline %v\n", t)
|
||||
return nil
|
||||
}
|
||||
|
||||
// add Peek method for conn
|
||||
type connBuf struct {
|
||||
*conn
|
||||
r *bufio.Reader
|
||||
}
|
||||
|
||||
func newConnBuf(c *conn) *connBuf {
|
||||
return &connBuf{c, bufio.NewReader(c)}
|
||||
}
|
||||
|
||||
func (b *connBuf) Peek(n int) ([]byte, error) {
|
||||
return b.r.Peek(n)
|
||||
}
|
||||
|
||||
func (b *connBuf) Read(data []byte) (int, error) {
|
||||
return b.r.Read(data)
|
||||
}
|
||||
|
||||
// Middle: man-in-the-middle
|
||||
type Middle struct {
|
||||
Proxy *Proxy
|
||||
CA *cert.CA
|
||||
Listener net.Listener
|
||||
Server *http.Server
|
||||
}
|
||||
|
||||
func NewMiddle(proxy *Proxy) (Interceptor, error) {
|
||||
ca, err := cert.NewCA("")
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
m := &Middle{
|
||||
Proxy: proxy,
|
||||
CA: ca,
|
||||
}
|
||||
|
||||
server := &http.Server{
|
||||
Handler: m,
|
||||
TLSNextProto: make(map[string]func(*http.Server, *tls.Conn, http.Handler)), // disable http2
|
||||
TLSConfig: &tls.Config{
|
||||
GetCertificate: func(chi *tls.ClientHelloInfo) (*tls.Certificate, error) {
|
||||
log.Debugf("Middle GetCertificate ServerName: %v\n", chi.ServerName)
|
||||
return ca.GetCert(chi.ServerName)
|
||||
},
|
||||
},
|
||||
}
|
||||
|
||||
// 每次连接尽快结束,因为连接并无开销
|
||||
server.SetKeepAlivesEnabled(false)
|
||||
|
||||
m.Server = server
|
||||
|
||||
return m, nil
|
||||
}
|
||||
|
||||
func (m *Middle) Start() error {
|
||||
m.Listener = &listener{make(chan net.Conn)}
|
||||
return m.Server.ServeTLS(m.Listener, "", "")
|
||||
}
|
||||
|
||||
func (m *Middle) Dial(host string) (net.Conn, error) {
|
||||
clientConn, serverConn := newPipes(host)
|
||||
go m.intercept(serverConn)
|
||||
return clientConn, nil
|
||||
}
|
||||
|
||||
func (m *Middle) ServeHTTP(res http.ResponseWriter, req *http.Request) {
|
||||
if strings.EqualFold(req.Header.Get("Connection"), "Upgrade") && strings.EqualFold(req.Header.Get("Upgrade"), "websocket") {
|
||||
// wss
|
||||
DefaultWebSocket.WSS(res, req)
|
||||
return
|
||||
}
|
||||
|
||||
if req.URL.Scheme == "" {
|
||||
req.URL.Scheme = "https"
|
||||
}
|
||||
if req.URL.Host == "" {
|
||||
req.URL.Host = req.Host
|
||||
}
|
||||
m.Proxy.ServeHTTP(res, req)
|
||||
}
|
||||
|
||||
// 解析 connect 流量
|
||||
// 如果是 tls 流量,则进入 listener.Accept => Middle.ServeHTTP
|
||||
// 否则很可能是 ws 流量
|
||||
func (m *Middle) intercept(serverConn *connBuf) {
|
||||
log := log.WithField("in", "Middle.intercept").WithField("host", serverConn.host)
|
||||
|
||||
buf, err := serverConn.Peek(3)
|
||||
if err != nil {
|
||||
log.Errorf("Peek error: %v\n", err)
|
||||
serverConn.Close()
|
||||
return
|
||||
}
|
||||
|
||||
if buf[0] == 0x16 && buf[1] == 0x03 && (buf[2] >= 0x0 || buf[2] <= 0x03) {
|
||||
// tls
|
||||
m.Listener.(*listener).connChan <- serverConn
|
||||
} else {
|
||||
// ws
|
||||
DefaultWebSocket.WS(serverConn, serverConn.host)
|
||||
}
|
||||
}
|
@ -1,93 +0,0 @@
|
||||
package proxy
|
||||
|
||||
import (
|
||||
"crypto/tls"
|
||||
"net"
|
||||
"net/http"
|
||||
|
||||
"github.com/lqqyt2423/go-mitmproxy/cert"
|
||||
)
|
||||
|
||||
type Mitm interface {
|
||||
Start() error
|
||||
Dial(host string) (net.Conn, error)
|
||||
}
|
||||
|
||||
// 直接转发 https 流量
|
||||
type MitmForward struct{}
|
||||
|
||||
func (m *MitmForward) Start() error {
|
||||
return nil
|
||||
}
|
||||
|
||||
func (m *MitmForward) Dial(host string) (net.Conn, error) {
|
||||
return net.Dial("tcp", host)
|
||||
}
|
||||
|
||||
// 内部解析 https 流量
|
||||
// 每个连接都会消耗掉两个文件描述符,可能会达到打开文件上限
|
||||
type MitmServer struct {
|
||||
Proxy *Proxy
|
||||
CA *cert.CA
|
||||
Listener net.Listener
|
||||
Server *http.Server
|
||||
}
|
||||
|
||||
func NewMitmServer(proxy *Proxy) (Mitm, error) {
|
||||
ca, err := cert.NewCA("")
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
m := &MitmServer{
|
||||
Proxy: proxy,
|
||||
CA: ca,
|
||||
}
|
||||
|
||||
server := &http.Server{
|
||||
Handler: m,
|
||||
TLSNextProto: make(map[string]func(*http.Server, *tls.Conn, http.Handler)), // disable http2
|
||||
TLSConfig: &tls.Config{
|
||||
GetCertificate: func(chi *tls.ClientHelloInfo) (*tls.Certificate, error) {
|
||||
log.Debugf("MitmServer GetCertificate ServerName: %v\n", chi.ServerName)
|
||||
return ca.GetCert(chi.ServerName)
|
||||
},
|
||||
},
|
||||
}
|
||||
|
||||
// 尽快关闭内部的连接,释放文件描述符
|
||||
server.SetKeepAlivesEnabled(false)
|
||||
|
||||
m.Server = server
|
||||
|
||||
return m, nil
|
||||
}
|
||||
|
||||
func (m *MitmServer) Start() error {
|
||||
ln, err := net.Listen("tcp", "127.0.0.1:") // port number is automatically chosen
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
m.Listener = ln
|
||||
m.Server.Addr = ln.Addr().String()
|
||||
log.Infof("MitmServer Server Addr is %v\n", m.Server.Addr)
|
||||
defer ln.Close()
|
||||
|
||||
return m.Server.ServeTLS(ln, "", "")
|
||||
}
|
||||
|
||||
func (m *MitmServer) Dial(host string) (net.Conn, error) {
|
||||
return net.Dial("tcp", m.Server.Addr)
|
||||
}
|
||||
|
||||
func (m *MitmServer) ServeHTTP(res http.ResponseWriter, req *http.Request) {
|
||||
if req.URL.Scheme == "" {
|
||||
req.URL.Scheme = "https"
|
||||
}
|
||||
|
||||
if req.URL.Host == "" {
|
||||
req.URL.Host = req.Host
|
||||
}
|
||||
|
||||
m.Proxy.ServeHTTP(res, req)
|
||||
}
|
@ -1,269 +0,0 @@
|
||||
package proxy
|
||||
|
||||
import (
|
||||
"bufio"
|
||||
"crypto/tls"
|
||||
"net"
|
||||
"net/http"
|
||||
"net/http/httputil"
|
||||
"os"
|
||||
"strings"
|
||||
"time"
|
||||
|
||||
mock_conn "github.com/jordwest/mock-conn"
|
||||
"github.com/lqqyt2423/go-mitmproxy/cert"
|
||||
)
|
||||
|
||||
// 模拟实现 net
|
||||
|
||||
type listener struct {
|
||||
connChan chan net.Conn
|
||||
}
|
||||
|
||||
func (l *listener) Accept() (net.Conn, error) {
|
||||
return <-l.connChan, nil
|
||||
}
|
||||
|
||||
func (l *listener) Close() error {
|
||||
return nil
|
||||
}
|
||||
|
||||
func (l *listener) Addr() net.Addr {
|
||||
return nil
|
||||
}
|
||||
|
||||
type ioRes struct {
|
||||
n int
|
||||
err error
|
||||
}
|
||||
|
||||
type conn struct {
|
||||
*mock_conn.End
|
||||
|
||||
Host string // remote host
|
||||
readErrChan chan error // Read 方法提前返回时的错误
|
||||
}
|
||||
|
||||
func newConn(end *mock_conn.End, host string) *conn {
|
||||
return &conn{
|
||||
End: end,
|
||||
Host: host,
|
||||
readErrChan: make(chan error),
|
||||
}
|
||||
}
|
||||
|
||||
// 当接收到 readErrChan 时,可提前返回
|
||||
func (c *conn) Read(data []byte) (int, error) {
|
||||
select {
|
||||
case err := <-c.readErrChan:
|
||||
return 0, err
|
||||
default:
|
||||
}
|
||||
|
||||
resChan := make(chan *ioRes)
|
||||
done := make(chan struct{})
|
||||
defer close(done)
|
||||
|
||||
go func() {
|
||||
select {
|
||||
case <-done:
|
||||
return
|
||||
default:
|
||||
}
|
||||
|
||||
n, err := c.End.Read(data)
|
||||
select {
|
||||
case resChan <- &ioRes{n, err}:
|
||||
return
|
||||
case <-done:
|
||||
close(resChan)
|
||||
}
|
||||
}()
|
||||
|
||||
select {
|
||||
case res := <-resChan:
|
||||
return res.n, res.err
|
||||
case err := <-c.readErrChan:
|
||||
return 0, err
|
||||
}
|
||||
}
|
||||
|
||||
func (c *conn) SetDeadline(t time.Time) error {
|
||||
if !t.Equal(time.Time{}) {
|
||||
log.WithField("host", c.Host).Warnf("SetDeadline %v\n", t)
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
// http server 会在连接快结束时调用此方法
|
||||
func (c *conn) SetReadDeadline(t time.Time) error {
|
||||
if !t.Equal(time.Time{}) {
|
||||
if !t.After(time.Now()) {
|
||||
// 使当前 Read 尽快返回
|
||||
c.readErrChan <- os.ErrDeadlineExceeded
|
||||
} else {
|
||||
log.Warnf("SetReadDeadline %v\n", t)
|
||||
}
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
func (c *conn) SetWriteDeadline(t time.Time) error {
|
||||
log.WithField("host", c.Host).Warnf("SetWriteDeadline %v\n", t)
|
||||
return nil
|
||||
}
|
||||
|
||||
// wrap conn for peek
|
||||
type connBuf struct {
|
||||
*conn
|
||||
r *bufio.Reader
|
||||
}
|
||||
|
||||
func newConnBuf(c *conn) *connBuf {
|
||||
return &connBuf{c, bufio.NewReader(c)}
|
||||
}
|
||||
|
||||
func (b *connBuf) Peek(n int) ([]byte, error) {
|
||||
return b.r.Peek(n)
|
||||
}
|
||||
|
||||
func (b *connBuf) Read(data []byte) (int, error) {
|
||||
return b.r.Read(data)
|
||||
}
|
||||
|
||||
type MitmMemory struct {
|
||||
Proxy *Proxy
|
||||
CA *cert.CA
|
||||
Listener net.Listener
|
||||
Server *http.Server
|
||||
}
|
||||
|
||||
func NewMitmMemory(proxy *Proxy) (Mitm, error) {
|
||||
ca, err := cert.NewCA("")
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
m := &MitmMemory{
|
||||
Proxy: proxy,
|
||||
CA: ca,
|
||||
}
|
||||
|
||||
server := &http.Server{
|
||||
Handler: m,
|
||||
TLSNextProto: make(map[string]func(*http.Server, *tls.Conn, http.Handler)), // disable http2
|
||||
TLSConfig: &tls.Config{
|
||||
GetCertificate: func(chi *tls.ClientHelloInfo) (*tls.Certificate, error) {
|
||||
log.Debugf("MitmMemory GetCertificate ServerName: %v\n", chi.ServerName)
|
||||
return ca.GetCert(chi.ServerName)
|
||||
},
|
||||
},
|
||||
}
|
||||
|
||||
// 每次连接尽快结束,因为连接并无开销
|
||||
server.SetKeepAlivesEnabled(false)
|
||||
|
||||
m.Server = server
|
||||
|
||||
return m, nil
|
||||
}
|
||||
|
||||
func (m *MitmMemory) Start() error {
|
||||
ln := &listener{
|
||||
connChan: make(chan net.Conn),
|
||||
}
|
||||
m.Listener = ln
|
||||
return m.Server.ServeTLS(ln, "", "")
|
||||
}
|
||||
|
||||
func (m *MitmMemory) Dial(host string) (net.Conn, error) {
|
||||
log := log.WithField("in", "MitmMemory.Dial").WithField("host", host)
|
||||
pipes := mock_conn.NewConn()
|
||||
|
||||
// 如果是 tls 流量,则进入 listener.Accept => MitmMemory.ServeHTTP
|
||||
// 否则很可能是 ws 流量,直接转发流量
|
||||
go func() {
|
||||
conn := newConn(pipes.Server, host)
|
||||
connb := newConnBuf(conn)
|
||||
buf, err := connb.Peek(3)
|
||||
if err != nil {
|
||||
log.Errorf("Peek error: %v\n", err)
|
||||
connb.Close()
|
||||
return
|
||||
}
|
||||
|
||||
// tls
|
||||
if buf[0] == 0x16 && buf[1] == 0x03 && (buf[2] >= 0x0 || buf[2] <= 0x03) {
|
||||
m.Listener.(*listener).connChan <- connb
|
||||
} else {
|
||||
// websocket ws://
|
||||
log.Debug("begin websocket ws://")
|
||||
defer connb.Close()
|
||||
remoteConn, err := net.Dial("tcp", host)
|
||||
if err != nil {
|
||||
if !ignoreErr(log, err) {
|
||||
log.Error(err)
|
||||
}
|
||||
return
|
||||
}
|
||||
defer remoteConn.Close()
|
||||
transfer(log, connb, remoteConn)
|
||||
}
|
||||
}()
|
||||
|
||||
return newConn(pipes.Client, host), nil
|
||||
}
|
||||
|
||||
func (m *MitmMemory) ServeHTTP(res http.ResponseWriter, req *http.Request) {
|
||||
log := log.WithField("in", "MitmMemory.ServeHTTP").WithField("host", req.Host)
|
||||
|
||||
// websocket wss://
|
||||
if strings.EqualFold(req.Header.Get("Connection"), "Upgrade") && strings.EqualFold(req.Header.Get("Upgrade"), "websocket") {
|
||||
log.Debug("begin websocket wss://")
|
||||
|
||||
upgradeBuf, err := httputil.DumpRequest(req, false)
|
||||
if err != nil {
|
||||
log.Errorf("DumpRequest: %v\n", err)
|
||||
res.WriteHeader(502)
|
||||
return
|
||||
}
|
||||
|
||||
cconn, _, err := res.(http.Hijacker).Hijack()
|
||||
if err != nil {
|
||||
log.Errorf("Hijack: %v\n", err)
|
||||
res.WriteHeader(502)
|
||||
return
|
||||
}
|
||||
defer cconn.Close()
|
||||
|
||||
host := req.Host
|
||||
if !strings.Contains(host, ":") {
|
||||
host = host + ":443"
|
||||
}
|
||||
conn, err := tls.Dial("tcp", host, nil)
|
||||
if err != nil {
|
||||
log.Errorf("tls.Dial: %v\n", err)
|
||||
return
|
||||
}
|
||||
defer conn.Close()
|
||||
|
||||
_, err = conn.Write(upgradeBuf)
|
||||
if err != nil {
|
||||
log.Errorf("wss upgrade: %v\n", err)
|
||||
return
|
||||
}
|
||||
transfer(log, conn, cconn)
|
||||
return
|
||||
}
|
||||
|
||||
if req.URL.Scheme == "" {
|
||||
req.URL.Scheme = "https"
|
||||
}
|
||||
|
||||
if req.URL.Host == "" {
|
||||
req.URL.Host = req.Host
|
||||
}
|
||||
|
||||
m.Proxy.ServeHTTP(res, req)
|
||||
}
|
@ -0,0 +1,65 @@
|
||||
package proxy
|
||||
|
||||
import (
|
||||
"crypto/tls"
|
||||
"net"
|
||||
"net/http"
|
||||
"net/http/httputil"
|
||||
"strings"
|
||||
)
|
||||
|
||||
// 当前仅做了转发 websocket 流量
|
||||
|
||||
type WebSocket struct{}
|
||||
|
||||
var DefaultWebSocket WebSocket
|
||||
|
||||
func (s *WebSocket) WS(conn net.Conn, host string) {
|
||||
log := log.WithField("in", "WebSocket.WS").WithField("host", host)
|
||||
|
||||
defer conn.Close()
|
||||
remoteConn, err := net.Dial("tcp", host)
|
||||
if err != nil {
|
||||
LogErr(log, err)
|
||||
return
|
||||
}
|
||||
defer remoteConn.Close()
|
||||
Transfer(log, conn, remoteConn)
|
||||
}
|
||||
|
||||
func (s *WebSocket) WSS(res http.ResponseWriter, req *http.Request) {
|
||||
log := log.WithField("in", "WebSocket.WSS").WithField("host", req.Host)
|
||||
|
||||
upgradeBuf, err := httputil.DumpRequest(req, false)
|
||||
if err != nil {
|
||||
log.Errorf("DumpRequest: %v\n", err)
|
||||
res.WriteHeader(502)
|
||||
return
|
||||
}
|
||||
|
||||
cconn, _, err := res.(http.Hijacker).Hijack()
|
||||
if err != nil {
|
||||
log.Errorf("Hijack: %v\n", err)
|
||||
res.WriteHeader(502)
|
||||
return
|
||||
}
|
||||
defer cconn.Close()
|
||||
|
||||
host := req.Host
|
||||
if !strings.Contains(host, ":") {
|
||||
host = host + ":443"
|
||||
}
|
||||
conn, err := tls.Dial("tcp", host, nil)
|
||||
if err != nil {
|
||||
log.Errorf("tls.Dial: %v\n", err)
|
||||
return
|
||||
}
|
||||
defer conn.Close()
|
||||
|
||||
_, err = conn.Write(upgradeBuf)
|
||||
if err != nil {
|
||||
log.Errorf("wss upgrade: %v\n", err)
|
||||
return
|
||||
}
|
||||
Transfer(log, conn, cconn)
|
||||
}
|
Loading…
Reference in New Issue