http_sniffer.go 2.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136
  1. package sniffer
  2. import (
  3. "bytes"
  4. "errors"
  5. "fmt"
  6. "net"
  7. "strings"
  8. "github.com/metacubex/mihomo/common/utils"
  9. C "github.com/metacubex/mihomo/constant"
  10. "github.com/metacubex/mihomo/constant/sniffer"
  11. )
  12. var (
  13. // refer to https://pkg.go.dev/net/http@master#pkg-constants
  14. methods = [...]string{"get", "post", "head", "put", "delete", "options", "connect", "patch", "trace"}
  15. errNotHTTPMethod = errors.New("not an HTTP method")
  16. )
  17. type version byte
  18. const (
  19. HTTP1 version = iota
  20. HTTP2
  21. )
  22. type HTTPSniffer struct {
  23. *BaseSniffer
  24. version version
  25. host string
  26. }
  27. var _ sniffer.Sniffer = (*HTTPSniffer)(nil)
  28. func NewHTTPSniffer(snifferConfig SnifferConfig) (*HTTPSniffer, error) {
  29. ports := snifferConfig.Ports
  30. if len(ports) == 0 {
  31. ports = utils.IntRanges[uint16]{utils.NewRange[uint16](80, 80)}
  32. }
  33. return &HTTPSniffer{
  34. BaseSniffer: NewBaseSniffer(ports, C.TCP),
  35. }, nil
  36. }
  37. func (http *HTTPSniffer) Protocol() string {
  38. switch http.version {
  39. case HTTP1:
  40. return "http1"
  41. case HTTP2:
  42. return "http2"
  43. default:
  44. return "unknown"
  45. }
  46. }
  47. func (http *HTTPSniffer) SupportNetwork() C.NetWork {
  48. return C.TCP
  49. }
  50. func (http *HTTPSniffer) SniffData(bytes []byte) (string, error) {
  51. domain, err := SniffHTTP(bytes)
  52. if err == nil {
  53. return *domain, nil
  54. } else {
  55. return "", err
  56. }
  57. }
  58. func beginWithHTTPMethod(b []byte) error {
  59. for _, m := range &methods {
  60. if len(b) >= len(m) && strings.EqualFold(string(b[:len(m)]), m) {
  61. return nil
  62. }
  63. if len(b) < len(m) {
  64. return ErrNoClue
  65. }
  66. }
  67. return errNotHTTPMethod
  68. }
  69. func SniffHTTP(b []byte) (*string, error) {
  70. if err := beginWithHTTPMethod(b); err != nil {
  71. return nil, err
  72. }
  73. _ = &HTTPSniffer{
  74. version: HTTP1,
  75. }
  76. headers := bytes.Split(b, []byte{'\n'})
  77. for i := 1; i < len(headers); i++ {
  78. header := headers[i]
  79. if len(header) == 0 {
  80. break
  81. }
  82. parts := bytes.SplitN(header, []byte{':'}, 2)
  83. if len(parts) != 2 {
  84. continue
  85. }
  86. key := strings.ToLower(string(parts[0]))
  87. if key == "host" {
  88. rawHost := strings.ToLower(string(bytes.TrimSpace(parts[1])))
  89. host, _, err := net.SplitHostPort(rawHost)
  90. if err != nil {
  91. if addrError, ok := err.(*net.AddrError); ok && strings.Contains(addrError.Err, "missing port") {
  92. return parseHost(rawHost)
  93. } else {
  94. return nil, err
  95. }
  96. }
  97. if net.ParseIP(host) != nil {
  98. return nil, fmt.Errorf("host is ip")
  99. }
  100. return &host, nil
  101. }
  102. }
  103. return nil, ErrNoClue
  104. }
  105. func parseHost(host string) (*string, error) {
  106. if strings.HasPrefix(host, "[") && strings.HasSuffix(host, "]") {
  107. if net.ParseIP(host[1:len(host)-1]) != nil {
  108. return nil, fmt.Errorf("host is ip")
  109. }
  110. }
  111. if net.ParseIP(host) != nil {
  112. return nil, fmt.Errorf("host is ip")
  113. }
  114. return &host, nil
  115. }