2015-01-06 23:15:38 +00:00
|
|
|
#include <cstring>
|
|
|
|
#include <cassert>
|
2014-03-17 22:31:29 +00:00
|
|
|
#include <boost/lexical_cast.hpp>
|
2014-03-29 17:28:19 +00:00
|
|
|
#include <boost/regex.hpp>
|
2015-01-07 18:09:59 +00:00
|
|
|
#include <string>
|
|
|
|
#include <atomic>
|
2014-03-17 22:31:29 +00:00
|
|
|
#include "HTTPProxy.h"
|
2015-02-07 17:34:25 +00:00
|
|
|
#include "util.h"
|
2015-01-06 23:15:38 +00:00
|
|
|
#include "Identity.h"
|
2015-01-07 18:09:59 +00:00
|
|
|
#include "Streaming.h"
|
2015-01-06 23:15:38 +00:00
|
|
|
#include "Destination.h"
|
|
|
|
#include "ClientContext.h"
|
|
|
|
#include "I2PEndian.h"
|
2015-01-07 18:09:59 +00:00
|
|
|
#include "I2PTunnel.h"
|
2014-03-17 22:31:29 +00:00
|
|
|
|
|
|
|
namespace i2p
|
|
|
|
{
|
|
|
|
namespace proxy
|
|
|
|
{
|
2015-01-07 18:09:59 +00:00
|
|
|
static const size_t http_buffer_size = 8192;
|
2015-03-17 15:44:01 +00:00
|
|
|
class HTTPProxyHandler: public i2p::client::I2PServiceHandler, public std::enable_shared_from_this<HTTPProxyHandler>
|
|
|
|
{
|
2015-01-07 18:09:59 +00:00
|
|
|
private:
|
2015-03-17 15:44:01 +00:00
|
|
|
enum state
|
|
|
|
{
|
2015-01-07 18:09:59 +00:00
|
|
|
GET_METHOD,
|
|
|
|
GET_HOSTNAME,
|
|
|
|
GET_HTTPV,
|
|
|
|
GET_HTTPVNL, //TODO: fallback to finding HOst: header if needed
|
|
|
|
DONE
|
|
|
|
};
|
|
|
|
|
|
|
|
void EnterState(state nstate);
|
|
|
|
bool HandleData(uint8_t *http_buff, std::size_t len);
|
|
|
|
void HandleSockRecv(const boost::system::error_code & ecode, std::size_t bytes_transfered);
|
|
|
|
void Terminate();
|
|
|
|
void AsyncSockRead();
|
|
|
|
void HTTPRequestFailed(/*std::string message*/);
|
|
|
|
void ExtractRequest();
|
|
|
|
bool ValidateHTTPRequest();
|
2015-02-07 16:57:16 +00:00
|
|
|
void HandleJumpServices();
|
2015-01-07 18:09:59 +00:00
|
|
|
bool CreateHTTPRequest(uint8_t *http_buff, std::size_t len);
|
|
|
|
void SentHTTPFailed(const boost::system::error_code & ecode);
|
|
|
|
void HandleStreamRequestComplete (std::shared_ptr<i2p::stream::Stream> stream);
|
|
|
|
|
|
|
|
uint8_t m_http_buff[http_buffer_size];
|
2015-04-06 18:41:07 +00:00
|
|
|
std::shared_ptr<boost::asio::ip::tcp::socket> m_sock;
|
2015-01-07 18:09:59 +00:00
|
|
|
std::string m_request; //Data left to be sent
|
|
|
|
std::string m_url; //URL
|
|
|
|
std::string m_method; //Method
|
|
|
|
std::string m_version; //HTTP version
|
|
|
|
std::string m_address; //Address
|
|
|
|
std::string m_path; //Path
|
|
|
|
int m_port; //Port
|
|
|
|
state m_state;//Parsing state
|
|
|
|
|
|
|
|
public:
|
2015-03-17 15:44:01 +00:00
|
|
|
|
2015-04-06 18:41:07 +00:00
|
|
|
HTTPProxyHandler(HTTPProxyServer * parent, std::shared_ptr<boost::asio::ip::tcp::socket> sock) :
|
2015-01-07 18:09:59 +00:00
|
|
|
I2PServiceHandler(parent), m_sock(sock)
|
2015-01-07 21:49:28 +00:00
|
|
|
{ EnterState(GET_METHOD); }
|
2015-01-07 18:09:59 +00:00
|
|
|
~HTTPProxyHandler() { Terminate(); }
|
2015-01-07 21:49:28 +00:00
|
|
|
void Handle () { AsyncSockRead(); }
|
2015-01-07 18:09:59 +00:00
|
|
|
};
|
|
|
|
|
2015-01-06 23:15:38 +00:00
|
|
|
void HTTPProxyHandler::AsyncSockRead()
|
|
|
|
{
|
|
|
|
LogPrint(eLogDebug,"--- HTTP Proxy async sock read");
|
|
|
|
if(m_sock) {
|
|
|
|
m_sock->async_receive(boost::asio::buffer(m_http_buff, http_buffer_size),
|
2015-01-07 20:52:40 +00:00
|
|
|
std::bind(&HTTPProxyHandler::HandleSockRecv, shared_from_this(),
|
2015-01-06 23:15:38 +00:00
|
|
|
std::placeholders::_1, std::placeholders::_2));
|
|
|
|
} else {
|
|
|
|
LogPrint(eLogError,"--- HTTP Proxy no socket for read");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void HTTPProxyHandler::Terminate() {
|
2015-01-07 18:09:59 +00:00
|
|
|
if (Kill()) return;
|
2015-04-06 18:41:07 +00:00
|
|
|
if (m_sock)
|
|
|
|
{
|
2015-01-06 23:15:38 +00:00
|
|
|
LogPrint(eLogDebug,"--- HTTP Proxy close sock");
|
|
|
|
m_sock->close();
|
|
|
|
m_sock = nullptr;
|
2014-03-17 22:31:29 +00:00
|
|
|
}
|
2015-01-07 18:09:59 +00:00
|
|
|
Done(shared_from_this());
|
2015-01-06 23:15:38 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* All hope is lost beyond this point */
|
|
|
|
//TODO: handle this apropriately
|
|
|
|
void HTTPProxyHandler::HTTPRequestFailed(/*HTTPProxyHandler::errTypes error*/)
|
|
|
|
{
|
|
|
|
std::string response = "HTTP/1.0 500 Internal Server Error\r\nContent-type: text/html\r\nContent-length: 0\r\n";
|
|
|
|
boost::asio::async_write(*m_sock, boost::asio::buffer(response,response.size()),
|
2015-01-07 20:52:40 +00:00
|
|
|
std::bind(&HTTPProxyHandler::SentHTTPFailed, shared_from_this(), std::placeholders::_1));
|
2015-01-06 23:15:38 +00:00
|
|
|
}
|
|
|
|
|
2015-03-17 15:44:01 +00:00
|
|
|
void HTTPProxyHandler::EnterState(HTTPProxyHandler::state nstate)
|
|
|
|
{
|
2015-01-06 23:15:38 +00:00
|
|
|
m_state = nstate;
|
2014-03-17 22:31:29 +00:00
|
|
|
}
|
|
|
|
|
2015-01-06 23:15:38 +00:00
|
|
|
void HTTPProxyHandler::ExtractRequest()
|
2014-03-17 22:31:29 +00:00
|
|
|
{
|
2015-01-06 23:15:38 +00:00
|
|
|
LogPrint(eLogDebug,"--- HTTP Proxy method is: ", m_method, "\nRequest is: ", m_url);
|
2014-03-29 17:28:19 +00:00
|
|
|
std::string server="";
|
|
|
|
std::string port="80";
|
|
|
|
boost::regex rHTTP("http://(.*?)(:(\\d+))?(/.*)");
|
|
|
|
boost::smatch m;
|
|
|
|
std::string path;
|
2015-03-17 15:44:01 +00:00
|
|
|
if(boost::regex_search(m_url, m, rHTTP, boost::match_extra))
|
|
|
|
{
|
2014-03-29 17:28:19 +00:00
|
|
|
server=m[1].str();
|
2015-03-17 15:44:01 +00:00
|
|
|
if (m[2].str() != "") port=m[3].str();
|
2014-03-29 17:28:19 +00:00
|
|
|
path=m[4].str();
|
2014-03-17 22:31:29 +00:00
|
|
|
}
|
2015-01-06 23:15:38 +00:00
|
|
|
LogPrint(eLogDebug,"--- HTTP Proxy server is: ",server, " port is: ", port, "\n path is: ",path);
|
|
|
|
m_address = server;
|
|
|
|
m_port = boost::lexical_cast<int>(port);
|
|
|
|
m_path = path;
|
2014-03-17 22:31:29 +00:00
|
|
|
}
|
|
|
|
|
2015-03-17 15:44:01 +00:00
|
|
|
bool HTTPProxyHandler::ValidateHTTPRequest()
|
|
|
|
{
|
|
|
|
if ( m_version != "HTTP/1.0" && m_version != "HTTP/1.1" )
|
|
|
|
{
|
2015-01-06 23:15:38 +00:00
|
|
|
LogPrint(eLogError,"--- HTTP Proxy unsupported version: ", m_version);
|
|
|
|
HTTPRequestFailed(); //TODO: send right stuff
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2015-03-17 15:44:01 +00:00
|
|
|
void HTTPProxyHandler::HandleJumpServices()
|
|
|
|
{
|
2015-02-07 16:57:16 +00:00
|
|
|
static const char * helpermark1 = "?i2paddresshelper=";
|
|
|
|
static const char * helpermark2 = "&i2paddresshelper=";
|
|
|
|
size_t addressHelperPos1 = m_path.rfind (helpermark1);
|
|
|
|
size_t addressHelperPos2 = m_path.rfind (helpermark2);
|
|
|
|
size_t addressHelperPos;
|
|
|
|
if (addressHelperPos1 == std::string::npos)
|
|
|
|
{
|
|
|
|
if (addressHelperPos2 == std::string::npos)
|
|
|
|
return; //Not a jump service
|
|
|
|
else
|
|
|
|
addressHelperPos = addressHelperPos2;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
if (addressHelperPos2 == std::string::npos)
|
|
|
|
addressHelperPos = addressHelperPos1;
|
|
|
|
else if ( addressHelperPos1 > addressHelperPos2 )
|
|
|
|
addressHelperPos = addressHelperPos1;
|
|
|
|
else
|
|
|
|
addressHelperPos = addressHelperPos2;
|
|
|
|
}
|
|
|
|
auto base64 = m_path.substr (addressHelperPos + strlen(helpermark1));
|
2015-02-07 17:34:25 +00:00
|
|
|
base64 = i2p::util::http::urlDecode(base64); //Some of the symbols may be urlencoded
|
2015-02-07 16:57:16 +00:00
|
|
|
LogPrint (eLogDebug,"Jump service for ", m_address, " found at ", base64, ". Inserting to address book");
|
|
|
|
//TODO: this is very dangerous and broken. We should ask the user before doing anything see http://pastethis.i2p/raw/pn5fL4YNJL7OSWj3Sc6N/
|
|
|
|
//TODO: we could redirect the user again to avoid dirtiness in the browser
|
|
|
|
i2p::client::context.GetAddressBook ().InsertAddress (m_address, base64);
|
|
|
|
m_path.erase(addressHelperPos);
|
|
|
|
}
|
|
|
|
|
2015-03-17 15:44:01 +00:00
|
|
|
bool HTTPProxyHandler::CreateHTTPRequest(uint8_t *http_buff, std::size_t len)
|
|
|
|
{
|
2015-01-06 23:15:38 +00:00
|
|
|
ExtractRequest(); //TODO: parse earlier
|
|
|
|
if (!ValidateHTTPRequest()) return false;
|
2015-02-07 16:57:16 +00:00
|
|
|
HandleJumpServices();
|
2015-01-06 23:15:38 +00:00
|
|
|
m_request = m_method;
|
|
|
|
m_request.push_back(' ');
|
|
|
|
m_request += m_path;
|
|
|
|
m_request.push_back(' ');
|
|
|
|
m_request += m_version;
|
|
|
|
m_request.push_back('\r');
|
|
|
|
m_request.push_back('\n');
|
2015-01-07 01:40:30 +00:00
|
|
|
m_request.append("Connection: close\r\n");
|
2015-01-06 23:15:38 +00:00
|
|
|
m_request.append(reinterpret_cast<const char *>(http_buff),len);
|
|
|
|
return true;
|
|
|
|
}
|
2014-03-29 16:03:14 +00:00
|
|
|
|
2015-01-06 23:15:38 +00:00
|
|
|
bool HTTPProxyHandler::HandleData(uint8_t *http_buff, std::size_t len)
|
2014-03-29 22:16:23 +00:00
|
|
|
{
|
2015-01-06 23:15:38 +00:00
|
|
|
assert(len); // This should always be called with a least a byte left to parse
|
2015-03-17 15:44:01 +00:00
|
|
|
while (len > 0)
|
|
|
|
{
|
2015-01-06 23:15:38 +00:00
|
|
|
//TODO: fallback to finding HOst: header if needed
|
2015-03-17 15:44:01 +00:00
|
|
|
switch (m_state)
|
|
|
|
{
|
2015-01-06 23:15:38 +00:00
|
|
|
case GET_METHOD:
|
2015-03-17 15:44:01 +00:00
|
|
|
switch (*http_buff)
|
|
|
|
{
|
2015-01-06 23:15:38 +00:00
|
|
|
case ' ': EnterState(GET_HOSTNAME); break;
|
|
|
|
default: m_method.push_back(*http_buff); break;
|
|
|
|
}
|
2015-03-17 15:44:01 +00:00
|
|
|
break;
|
2015-01-06 23:15:38 +00:00
|
|
|
case GET_HOSTNAME:
|
2015-03-17 15:44:01 +00:00
|
|
|
switch (*http_buff)
|
|
|
|
{
|
2015-01-06 23:15:38 +00:00
|
|
|
case ' ': EnterState(GET_HTTPV); break;
|
|
|
|
default: m_url.push_back(*http_buff); break;
|
|
|
|
}
|
2015-03-17 15:44:01 +00:00
|
|
|
break;
|
2015-01-06 23:15:38 +00:00
|
|
|
case GET_HTTPV:
|
2015-03-17 15:44:01 +00:00
|
|
|
switch (*http_buff)
|
|
|
|
{
|
2015-01-06 23:15:38 +00:00
|
|
|
case '\r': EnterState(GET_HTTPVNL); break;
|
|
|
|
default: m_version.push_back(*http_buff); break;
|
|
|
|
}
|
2015-03-17 15:44:01 +00:00
|
|
|
break;
|
2015-01-06 23:15:38 +00:00
|
|
|
case GET_HTTPVNL:
|
2015-03-17 15:44:01 +00:00
|
|
|
switch (*http_buff)
|
|
|
|
{
|
2015-01-06 23:15:38 +00:00
|
|
|
case '\n': EnterState(DONE); break;
|
|
|
|
default:
|
|
|
|
LogPrint(eLogError,"--- HTTP Proxy rejected invalid request ending with: ", ((int)*http_buff));
|
|
|
|
HTTPRequestFailed(); //TODO: add correct code
|
|
|
|
return false;
|
|
|
|
}
|
2015-03-17 15:44:01 +00:00
|
|
|
break;
|
2015-01-06 23:15:38 +00:00
|
|
|
default:
|
|
|
|
LogPrint(eLogError,"--- HTTP Proxy invalid state: ", m_state);
|
|
|
|
HTTPRequestFailed(); //TODO: add correct code 500
|
|
|
|
return false;
|
2014-09-23 19:38:56 +00:00
|
|
|
}
|
2015-01-06 23:15:38 +00:00
|
|
|
http_buff++;
|
|
|
|
len--;
|
|
|
|
if (m_state == DONE)
|
|
|
|
return CreateHTTPRequest(http_buff,len);
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
void HTTPProxyHandler::HandleSockRecv(const boost::system::error_code & ecode, std::size_t len)
|
|
|
|
{
|
|
|
|
LogPrint(eLogDebug,"--- HTTP Proxy sock recv: ", len);
|
2015-03-17 15:44:01 +00:00
|
|
|
if(ecode)
|
|
|
|
{
|
2015-01-06 23:15:38 +00:00
|
|
|
LogPrint(eLogWarning," --- HTTP Proxy sock recv got error: ", ecode);
|
|
|
|
Terminate();
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2015-03-17 15:44:01 +00:00
|
|
|
if (HandleData(m_http_buff, len))
|
|
|
|
{
|
|
|
|
if (m_state == DONE)
|
|
|
|
{
|
2015-01-06 23:15:38 +00:00
|
|
|
LogPrint(eLogInfo,"--- HTTP Proxy requested: ", m_url);
|
2015-01-07 19:44:24 +00:00
|
|
|
GetOwner()->CreateStream (std::bind (&HTTPProxyHandler::HandleStreamRequestComplete,
|
2015-01-07 20:52:40 +00:00
|
|
|
shared_from_this(), std::placeholders::_1), m_address, m_port);
|
2015-03-17 15:44:01 +00:00
|
|
|
}
|
|
|
|
else
|
2015-01-06 23:15:38 +00:00
|
|
|
AsyncSockRead();
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
void HTTPProxyHandler::SentHTTPFailed(const boost::system::error_code & ecode)
|
|
|
|
{
|
2015-03-17 15:44:01 +00:00
|
|
|
if (!ecode)
|
2015-01-06 23:15:38 +00:00
|
|
|
Terminate();
|
2015-03-17 15:44:01 +00:00
|
|
|
else
|
|
|
|
{
|
2015-01-06 23:15:38 +00:00
|
|
|
LogPrint (eLogError,"--- HTTP Proxy Closing socket after sending failure because: ", ecode.message ());
|
|
|
|
Terminate();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void HTTPProxyHandler::HandleStreamRequestComplete (std::shared_ptr<i2p::stream::Stream> stream)
|
|
|
|
{
|
2015-03-17 15:44:01 +00:00
|
|
|
if (stream)
|
|
|
|
{
|
2015-01-07 18:09:59 +00:00
|
|
|
if (Kill()) return;
|
2015-01-06 23:15:38 +00:00
|
|
|
LogPrint (eLogInfo,"--- HTTP Proxy New I2PTunnel connection");
|
2015-01-07 18:09:59 +00:00
|
|
|
auto connection = std::make_shared<i2p::client::I2PTunnelConnection>(GetOwner(), m_sock, stream);
|
|
|
|
GetOwner()->AddHandler (connection);
|
2015-01-06 23:15:38 +00:00
|
|
|
connection->I2PConnect (reinterpret_cast<const uint8_t*>(m_request.data()), m_request.size());
|
2015-01-07 18:09:59 +00:00
|
|
|
Done(shared_from_this());
|
2015-03-17 15:44:01 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2015-01-06 23:15:38 +00:00
|
|
|
LogPrint (eLogError,"--- HTTP Proxy Issue when creating the stream, check the previous warnings for more info.");
|
|
|
|
HTTPRequestFailed(); // TODO: Send correct error message host unreachable
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-03-17 15:44:01 +00:00
|
|
|
HTTPProxyServer::HTTPProxyServer(int port, std::shared_ptr<i2p::client::ClientDestination> localDestination):
|
|
|
|
TCPIPAcceptor(port, localDestination ? localDestination : i2p::client::context.GetSharedLocalDestination ())
|
2015-01-17 14:42:44 +00:00
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2015-04-06 18:41:07 +00:00
|
|
|
std::shared_ptr<i2p::client::I2PServiceHandler> HTTPProxyServer::CreateHandler(std::shared_ptr<boost::asio::ip::tcp::socket> socket)
|
2015-01-06 23:15:38 +00:00
|
|
|
{
|
2015-01-08 00:35:42 +00:00
|
|
|
return std::make_shared<HTTPProxyHandler> (this, socket);
|
2014-03-29 22:16:23 +00:00
|
|
|
}
|
|
|
|
|
2014-03-17 22:31:29 +00:00
|
|
|
}
|
|
|
|
}
|