websocket.go 1.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475
  1. package obfs
  2. import (
  3. "context"
  4. "crypto/tls"
  5. "net"
  6. "net/http"
  7. "github.com/metacubex/mihomo/component/ca"
  8. "github.com/metacubex/mihomo/transport/vmess"
  9. )
  10. // Option is options of websocket obfs
  11. type Option struct {
  12. Host string
  13. Port string
  14. Path string
  15. Headers map[string]string
  16. TLS bool
  17. SkipCertVerify bool
  18. Fingerprint string
  19. Mux bool
  20. V2rayHttpUpgrade bool
  21. V2rayHttpUpgradeFastOpen bool
  22. }
  23. // NewV2rayObfs return a HTTPObfs
  24. func NewV2rayObfs(ctx context.Context, conn net.Conn, option *Option) (net.Conn, error) {
  25. header := http.Header{}
  26. for k, v := range option.Headers {
  27. header.Add(k, v)
  28. }
  29. config := &vmess.WebsocketConfig{
  30. Host: option.Host,
  31. Port: option.Port,
  32. Path: option.Path,
  33. V2rayHttpUpgrade: option.V2rayHttpUpgrade,
  34. V2rayHttpUpgradeFastOpen: option.V2rayHttpUpgradeFastOpen,
  35. Headers: header,
  36. }
  37. if option.TLS {
  38. config.TLS = true
  39. tlsConfig := &tls.Config{
  40. ServerName: option.Host,
  41. InsecureSkipVerify: option.SkipCertVerify,
  42. NextProtos: []string{"http/1.1"},
  43. }
  44. var err error
  45. config.TLSConfig, err = ca.GetSpecifiedFingerprintTLSConfig(tlsConfig, option.Fingerprint)
  46. if err != nil {
  47. return nil, err
  48. }
  49. if host := config.Headers.Get("Host"); host != "" {
  50. config.TLSConfig.ServerName = host
  51. }
  52. }
  53. var err error
  54. conn, err = vmess.StreamWebsocketConn(ctx, conn, config)
  55. if err != nil {
  56. return nil, err
  57. }
  58. if option.Mux {
  59. conn = NewMux(conn, MuxOption{
  60. ID: [2]byte{0, 0},
  61. Host: "127.0.0.1",
  62. Port: 0,
  63. })
  64. }
  65. return conn, nil
  66. }