mirror of
https://github.com/PurpleI2P/i2pd.git
synced 2024-11-17 21:26:04 +00:00
86e118f2b7
Signed-off-by: R4SAS <r4sas@i2pmail.org>
668 lines
24 KiB
C++
668 lines
24 KiB
C++
/*
|
|
* Copyright (c) 2013-2021, The PurpleI2P Project
|
|
*
|
|
* This file is part of Purple i2pd project and licensed under BSD3
|
|
*
|
|
* See full license text in LICENSE file at top of project tree
|
|
*/
|
|
|
|
#include <cstring>
|
|
#include <cassert>
|
|
#include <string>
|
|
#include <atomic>
|
|
#include <memory>
|
|
#include <set>
|
|
#include <boost/asio.hpp>
|
|
#include <boost/algorithm/string/predicate.hpp>
|
|
#include <mutex>
|
|
|
|
#include "I2PService.h"
|
|
#include "Destination.h"
|
|
#include "HTTPProxy.h"
|
|
#include "util.h"
|
|
#include "Identity.h"
|
|
#include "Streaming.h"
|
|
#include "Destination.h"
|
|
#include "ClientContext.h"
|
|
#include "I2PEndian.h"
|
|
#include "I2PTunnel.h"
|
|
#include "Config.h"
|
|
#include "HTTP.h"
|
|
#include "I18N.h"
|
|
|
|
namespace i2p {
|
|
namespace proxy {
|
|
std::map<std::string, std::string> jumpservices = {
|
|
{ "reg.i2p", "http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/jump/" },
|
|
{ "identiguy.i2p", "http://3mzmrus2oron5fxptw7hw2puho3bnqmw2hqy7nw64dsrrjwdilva.b32.i2p/cgi-bin/query?hostname=" },
|
|
{ "stats.i2p", "http://7tbay5p4kzeekxvyvbf6v7eauazemsnnl2aoyqhg5jzpr5eke7tq.b32.i2p/cgi-bin/jump.cgi?a=" },
|
|
};
|
|
|
|
static const char *pageHead =
|
|
"<head>\r\n"
|
|
" <meta name=\"viewport\" content=\"width=device-width, initial-scale=1.0\">\r\n"
|
|
" <title>I2Pd HTTP proxy</title>\r\n"
|
|
" <style type=\"text/css\">\r\n"
|
|
" body { font: 100%/1.5em sans-serif; margin: 0; padding: 1.5em; background: #FAFAFA; color: #103456; }\r\n"
|
|
" h1 { font-size: 1.7em; color: #894C84; }\r\n"
|
|
" @media screen and (max-width: 980px) { h1 { font-size: 1.7em; text-align: center; color: #894C84; }}\r\n"
|
|
" </style>\r\n"
|
|
"</head>\r\n"
|
|
;
|
|
|
|
bool str_rmatch(std::string & str, const char *suffix) {
|
|
auto pos = str.rfind (suffix);
|
|
if (pos == std::string::npos)
|
|
return false; /* not found */
|
|
if (str.length() == (pos + std::strlen(suffix)))
|
|
return true; /* match */
|
|
return false;
|
|
}
|
|
|
|
class HTTPReqHandler: public i2p::client::I2PServiceHandler, public std::enable_shared_from_this<HTTPReqHandler>
|
|
{
|
|
private:
|
|
|
|
bool HandleRequest();
|
|
void HandleSockRecv(const boost::system::error_code & ecode, std::size_t bytes_transfered);
|
|
void Terminate();
|
|
void AsyncSockRead();
|
|
bool ExtractAddressHelper(i2p::http::URL & url, std::string & b64, bool & confirm);
|
|
void SanitizeHTTPRequest(i2p::http::HTTPReq & req);
|
|
void SentHTTPFailed(const boost::system::error_code & ecode);
|
|
void HandleStreamRequestComplete (std::shared_ptr<i2p::stream::Stream> stream);
|
|
/* error helpers */
|
|
void GenericProxyError(const std::string& title, const std::string& description);
|
|
void GenericProxyInfo(const std::string& title, const std::string& description);
|
|
void HostNotFound(std::string & host);
|
|
void SendProxyError(std::string & content);
|
|
|
|
void ForwardToUpstreamProxy();
|
|
void HandleUpstreamHTTPProxyConnect(const boost::system::error_code & ec);
|
|
void HandleUpstreamSocksProxyConnect(const boost::system::error_code & ec);
|
|
void HTTPConnect(const std::string & host, uint16_t port);
|
|
void HandleHTTPConnectStreamRequestComplete(std::shared_ptr<i2p::stream::Stream> stream);
|
|
|
|
void HandleSocksProxySendHandshake(const boost::system::error_code & ec, std::size_t bytes_transfered);
|
|
void HandleSocksProxyReply(const boost::system::error_code & ec, std::size_t bytes_transfered);
|
|
|
|
typedef std::function<void(boost::asio::ip::tcp::endpoint)> ProxyResolvedHandler;
|
|
|
|
void HandleUpstreamProxyResolved(const boost::system::error_code & ecode, boost::asio::ip::tcp::resolver::iterator itr, ProxyResolvedHandler handler);
|
|
|
|
void SocksProxySuccess();
|
|
void HandoverToUpstreamProxy();
|
|
|
|
uint8_t m_recv_chunk[8192];
|
|
std::string m_recv_buf; // from client
|
|
std::string m_send_buf; // to upstream
|
|
std::shared_ptr<boost::asio::ip::tcp::socket> m_sock;
|
|
std::shared_ptr<boost::asio::ip::tcp::socket> m_proxysock;
|
|
boost::asio::ip::tcp::resolver m_proxy_resolver;
|
|
std::string m_OutproxyUrl;
|
|
bool m_Addresshelper;
|
|
i2p::http::URL m_ProxyURL;
|
|
i2p::http::URL m_RequestURL;
|
|
uint8_t m_socks_buf[255+8]; // for socks request/response
|
|
ssize_t m_req_len;
|
|
i2p::http::URL m_ClientRequestURL;
|
|
i2p::http::HTTPReq m_ClientRequest;
|
|
i2p::http::HTTPRes m_ClientResponse;
|
|
std::stringstream m_ClientRequestBuffer;
|
|
|
|
public:
|
|
|
|
HTTPReqHandler(HTTPProxy * parent, std::shared_ptr<boost::asio::ip::tcp::socket> sock) :
|
|
I2PServiceHandler(parent), m_sock(sock),
|
|
m_proxysock(std::make_shared<boost::asio::ip::tcp::socket>(parent->GetService())),
|
|
m_proxy_resolver(parent->GetService()),
|
|
m_OutproxyUrl(parent->GetOutproxyURL()),
|
|
m_Addresshelper(parent->GetHelperSupport()) {}
|
|
~HTTPReqHandler() { Terminate(); }
|
|
void Handle () { AsyncSockRead(); } /* overload */
|
|
};
|
|
|
|
void HTTPReqHandler::AsyncSockRead()
|
|
{
|
|
LogPrint(eLogDebug, "HTTPProxy: async sock read");
|
|
if (!m_sock) {
|
|
LogPrint(eLogError, "HTTPProxy: no socket for read");
|
|
return;
|
|
}
|
|
m_sock->async_read_some(boost::asio::buffer(m_recv_chunk, sizeof(m_recv_chunk)),
|
|
std::bind(&HTTPReqHandler::HandleSockRecv, shared_from_this(),
|
|
std::placeholders::_1, std::placeholders::_2));
|
|
}
|
|
|
|
void HTTPReqHandler::Terminate() {
|
|
if (Kill()) return;
|
|
if (m_sock)
|
|
{
|
|
LogPrint(eLogDebug, "HTTPProxy: close sock");
|
|
m_sock->close();
|
|
m_sock = nullptr;
|
|
}
|
|
if(m_proxysock)
|
|
{
|
|
LogPrint(eLogDebug, "HTTPProxy: close proxysock");
|
|
if(m_proxysock->is_open())
|
|
m_proxysock->close();
|
|
m_proxysock = nullptr;
|
|
}
|
|
Done(shared_from_this());
|
|
}
|
|
|
|
void HTTPReqHandler::GenericProxyError(const std::string& title, const std::string& description) {
|
|
std::stringstream ss;
|
|
ss << "<h1>" << tr("Proxy error") << ": " << title << "</h1>\r\n";
|
|
ss << "<p>" << description << "</p>\r\n";
|
|
std::string content = ss.str();
|
|
SendProxyError(content);
|
|
}
|
|
|
|
void HTTPReqHandler::GenericProxyInfo(const std::string& title, const std::string& description) {
|
|
std::stringstream ss;
|
|
ss << "<h1>" << tr("Proxy info") << ": " << title << "</h1>\r\n";
|
|
ss << "<p>" << description << "</p>\r\n";
|
|
std::string content = ss.str();
|
|
SendProxyError(content);
|
|
}
|
|
|
|
void HTTPReqHandler::HostNotFound(std::string & host) {
|
|
std::stringstream ss;
|
|
ss << "<h1>" << tr("Proxy error: Host not found") << "</h1>\r\n"
|
|
<< "<p>" << tr("Remote host not found in router's addressbook") << "</p>\r\n"
|
|
<< "<p>" << tr("You may try to find this host on jump services below") << ":</p>\r\n"
|
|
<< "<ul>\r\n";
|
|
for (const auto& js : jumpservices) {
|
|
ss << " <li><a href=\"" << js.second << host << "\">" << js.first << "</a></li>\r\n";
|
|
}
|
|
ss << "</ul>\r\n";
|
|
std::string content = ss.str();
|
|
SendProxyError(content);
|
|
}
|
|
|
|
void HTTPReqHandler::SendProxyError(std::string & content)
|
|
{
|
|
i2p::http::HTTPRes res;
|
|
res.code = 500;
|
|
res.add_header("Content-Type", "text/html; charset=UTF-8");
|
|
res.add_header("Connection", "close");
|
|
std::stringstream ss;
|
|
ss << "<html>\r\n" << pageHead
|
|
<< "<body>" << content << "</body>\r\n"
|
|
<< "</html>\r\n";
|
|
res.body = ss.str();
|
|
std::string response = res.to_string();
|
|
boost::asio::async_write(*m_sock, boost::asio::buffer(response), boost::asio::transfer_all(),
|
|
std::bind(&HTTPReqHandler::SentHTTPFailed, shared_from_this(), std::placeholders::_1));
|
|
}
|
|
|
|
bool HTTPReqHandler::ExtractAddressHelper(i2p::http::URL & url, std::string & b64, bool & confirm)
|
|
{
|
|
confirm = false;
|
|
const char *param = "i2paddresshelper=";
|
|
std::size_t pos = url.query.find(param);
|
|
std::size_t len = std::strlen(param);
|
|
std::map<std::string, std::string> params;
|
|
|
|
|
|
if (pos == std::string::npos)
|
|
return false; /* not found */
|
|
if (!url.parse_query(params))
|
|
return false;
|
|
|
|
std::string value = params["i2paddresshelper"];
|
|
len += value.length();
|
|
b64 = i2p::http::UrlDecode(value);
|
|
// if we need update exists, request formed with update param
|
|
if (params["update"] == "true") { len += std::strlen("&update=true"); confirm = true; }
|
|
if (pos != 0 && url.query[pos-1] == '&') { pos--; len++; } // if helper is not only one query option
|
|
url.query.replace(pos, len, "");
|
|
return true;
|
|
}
|
|
|
|
void HTTPReqHandler::SanitizeHTTPRequest(i2p::http::HTTPReq & req)
|
|
{
|
|
/* drop common headers */
|
|
req.RemoveHeader("Via");
|
|
req.RemoveHeader("From");
|
|
req.RemoveHeader("Forwarded");
|
|
req.RemoveHeader("Accept", "Accept-Encoding"); // Accept*, but Accept-Encoding
|
|
/* drop proxy-disclosing headers */
|
|
req.RemoveHeader("X-Forwarded");
|
|
req.RemoveHeader("Proxy-"); // Proxy-*
|
|
/* replace headers */
|
|
req.UpdateHeader("User-Agent", "MYOB/6.66 (AN/ON)");
|
|
|
|
/**
|
|
* according to i2p ticket #1862:
|
|
* leave Referrer if requested URL with same schema, host and port,
|
|
* otherwise, drop it.
|
|
*/
|
|
if(req.GetHeader("Referrer") != "") {
|
|
i2p::http::URL reqURL; reqURL.parse(req.uri);
|
|
i2p::http::URL refURL; refURL.parse(req.GetHeader("Referrer"));
|
|
if(!boost::iequals(reqURL.schema, refURL.schema) || !boost::iequals(reqURL.host, refURL.host) || reqURL.port != refURL.port)
|
|
req.RemoveHeader("Referrer");
|
|
}
|
|
|
|
/* add headers */
|
|
/* close connection, if not Connection: (U|u)pgrade (for websocket) */
|
|
auto h = req.GetHeader ("Connection");
|
|
auto x = h.find("pgrade");
|
|
if (!(x != std::string::npos && std::tolower(h[x - 1]) == 'u'))
|
|
req.UpdateHeader("Connection", "close");
|
|
}
|
|
|
|
/**
|
|
* @brief Try to parse request from @a m_recv_buf
|
|
* If parsing success, rebuild request and store to @a m_send_buf
|
|
* with remaining data tail
|
|
* @return true on processed request or false if more data needed
|
|
*/
|
|
bool HTTPReqHandler::HandleRequest()
|
|
{
|
|
m_req_len = m_ClientRequest.parse(m_recv_buf);
|
|
|
|
if (m_req_len == 0)
|
|
return false; /* need more data */
|
|
|
|
if (m_req_len < 0) {
|
|
LogPrint(eLogError, "HTTPProxy: unable to parse request");
|
|
GenericProxyError(tr("Invalid request"), tr("Proxy unable to parse your request"));
|
|
return true; /* parse error */
|
|
}
|
|
|
|
/* parsing success, now let's look inside request */
|
|
LogPrint(eLogDebug, "HTTPProxy: requested: ", m_ClientRequest.uri);
|
|
m_RequestURL.parse(m_ClientRequest.uri);
|
|
bool m_Confirm;
|
|
|
|
std::string jump;
|
|
if (ExtractAddressHelper(m_RequestURL, jump, m_Confirm))
|
|
{
|
|
if (!m_Addresshelper)
|
|
{
|
|
LogPrint(eLogWarning, "HTTPProxy: addresshelper request rejected");
|
|
GenericProxyError(tr("Invalid request"), tr("addresshelper is not supported"));
|
|
return true;
|
|
}
|
|
if (!i2p::client::context.GetAddressBook ().FindAddress (m_RequestURL.host) || m_Confirm)
|
|
{
|
|
i2p::client::context.GetAddressBook ().InsertAddress (m_RequestURL.host, jump);
|
|
LogPrint (eLogInfo, "HTTPProxy: added address from addresshelper for ", m_RequestURL.host);
|
|
std::string full_url = m_RequestURL.to_string();
|
|
std::stringstream ss;
|
|
ss << tr("Host") <<" " << m_RequestURL.host << " " << tr("added to router's addressbook from helper") << ". ";
|
|
ss << tr("Click here to proceed:") << " <a href=\"" << full_url << "\">" << tr("Continue") << "</a>.";
|
|
GenericProxyInfo(tr("Addresshelper found"), ss.str());
|
|
return true; /* request processed */
|
|
}
|
|
else
|
|
{
|
|
std::string full_url = m_RequestURL.to_string();
|
|
std::stringstream ss;
|
|
ss << tr("Host") << " " << m_RequestURL.host << " <font color=red>" << tr("already in router's addressbook") << "</font>. ";
|
|
ss << tr("Click here to update record:") << " <a href=\"" << full_url << (full_url.find('?') != std::string::npos ? "&i2paddresshelper=" : "?i2paddresshelper=");
|
|
ss << jump << "&update=true\">" << tr("Continue") << "</a>.";
|
|
GenericProxyInfo(tr("Addresshelper found"), ss.str());
|
|
return true; /* request processed */
|
|
}
|
|
}
|
|
std::string dest_host;
|
|
uint16_t dest_port;
|
|
bool useConnect = false;
|
|
if(m_ClientRequest.method == "CONNECT")
|
|
{
|
|
std::string uri(m_ClientRequest.uri);
|
|
auto pos = uri.find(":");
|
|
if(pos == std::string::npos || pos == uri.size() - 1)
|
|
{
|
|
GenericProxyError(tr("Invalid request"), tr("invalid request uri"));
|
|
return true;
|
|
}
|
|
else
|
|
{
|
|
useConnect = true;
|
|
dest_port = std::stoi(uri.substr(pos+1));
|
|
dest_host = uri.substr(0, pos);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
SanitizeHTTPRequest(m_ClientRequest);
|
|
|
|
dest_host = m_RequestURL.host;
|
|
dest_port = m_RequestURL.port;
|
|
/* always set port, even if missing in request */
|
|
if (!dest_port)
|
|
dest_port = (m_RequestURL.schema == "https") ? 443 : 80;
|
|
/* detect dest_host, set proper 'Host' header in upstream request */
|
|
if (dest_host != "")
|
|
{
|
|
/* absolute url, replace 'Host' header */
|
|
std::string h = dest_host;
|
|
if (dest_port != 0 && dest_port != 80)
|
|
h += ":" + std::to_string(dest_port);
|
|
m_ClientRequest.UpdateHeader("Host", h);
|
|
}
|
|
else
|
|
{
|
|
auto h = m_ClientRequest.GetHeader ("Host");
|
|
if (h.length () > 0)
|
|
{
|
|
/* relative url and 'Host' header provided. transparent proxy mode? */
|
|
i2p::http::URL u;
|
|
std::string t = "http://" + h;
|
|
u.parse(t);
|
|
dest_host = u.host;
|
|
dest_port = u.port;
|
|
}
|
|
else
|
|
{
|
|
/* relative url and missing 'Host' header */
|
|
GenericProxyError(tr("Invalid request"), tr("Can't detect destination host from request"));
|
|
return true;
|
|
}
|
|
}
|
|
}
|
|
/* check dest_host really exists and inside I2P network */
|
|
if (str_rmatch(dest_host, ".i2p")) {
|
|
if (!i2p::client::context.GetAddressBook ().GetAddress (dest_host)) {
|
|
HostNotFound(dest_host);
|
|
return true; /* request processed */
|
|
}
|
|
} else {
|
|
if(m_OutproxyUrl.size()) {
|
|
LogPrint (eLogDebug, "HTTPProxy: use outproxy ", m_OutproxyUrl);
|
|
if(m_ProxyURL.parse(m_OutproxyUrl))
|
|
ForwardToUpstreamProxy();
|
|
else
|
|
GenericProxyError(tr("Outproxy failure"), tr("bad outproxy settings"));
|
|
} else {
|
|
LogPrint (eLogWarning, "HTTPProxy: outproxy failure for ", dest_host, ": no outproxy enabled");
|
|
std::stringstream ss; ss << tr("Host") << " " << dest_host << " " << tr("not inside I2P network, but outproxy is not enabled");
|
|
GenericProxyError(tr("Outproxy failure"), ss.str());
|
|
}
|
|
return true;
|
|
}
|
|
if(useConnect)
|
|
{
|
|
HTTPConnect(dest_host, dest_port);
|
|
return true;
|
|
}
|
|
|
|
/* make relative url */
|
|
m_RequestURL.schema = "";
|
|
m_RequestURL.host = "";
|
|
m_ClientRequest.uri = m_RequestURL.to_string();
|
|
|
|
/* drop original request from recv buffer */
|
|
m_recv_buf.erase(0, m_req_len);
|
|
/* build new buffer from modified request and data from original request */
|
|
m_send_buf = m_ClientRequest.to_string();
|
|
m_send_buf.append(m_recv_buf);
|
|
/* connect to destination */
|
|
LogPrint(eLogDebug, "HTTPProxy: connecting to host ", dest_host, ":", dest_port);
|
|
GetOwner()->CreateStream (std::bind (&HTTPReqHandler::HandleStreamRequestComplete,
|
|
shared_from_this(), std::placeholders::_1), dest_host, dest_port);
|
|
return true;
|
|
}
|
|
|
|
void HTTPReqHandler::ForwardToUpstreamProxy()
|
|
{
|
|
LogPrint(eLogDebug, "HTTPProxy: forward to upstream");
|
|
// build http request
|
|
|
|
m_ClientRequestURL = m_RequestURL;
|
|
LogPrint(eLogDebug, "HTTPProxy: ", m_ClientRequestURL.host);
|
|
m_ClientRequestURL.schema = "";
|
|
m_ClientRequestURL.host = "";
|
|
std::string origURI = m_ClientRequest.uri; // TODO: what do we need to change uri for?
|
|
m_ClientRequest.uri = m_ClientRequestURL.to_string();
|
|
|
|
// update User-Agent to ESR version of Firefox, same as Tor Browser below version 8, for non-HTTPS connections
|
|
if(m_ClientRequest.method != "CONNECT")
|
|
m_ClientRequest.UpdateHeader("User-Agent", "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0");
|
|
|
|
m_ClientRequest.write(m_ClientRequestBuffer);
|
|
m_ClientRequestBuffer << m_recv_buf.substr(m_req_len);
|
|
|
|
// assume http if empty schema
|
|
if (m_ProxyURL.schema == "" || m_ProxyURL.schema == "http")
|
|
{
|
|
// handle upstream http proxy
|
|
if (!m_ProxyURL.port) m_ProxyURL.port = 80;
|
|
if (m_ProxyURL.is_i2p())
|
|
{
|
|
m_ClientRequest.uri = origURI;
|
|
auto auth = i2p::http::CreateBasicAuthorizationString (m_ProxyURL.user, m_ProxyURL.pass);
|
|
if (!auth.empty ())
|
|
{
|
|
// remove existing authorization if any
|
|
m_ClientRequest.RemoveHeader("Proxy-");
|
|
// add own http proxy authorization
|
|
m_ClientRequest.AddHeader("Proxy-Authorization", auth);
|
|
}
|
|
m_send_buf = m_ClientRequest.to_string();
|
|
m_recv_buf.erase(0, m_req_len);
|
|
m_send_buf.append(m_recv_buf);
|
|
GetOwner()->CreateStream (std::bind (&HTTPReqHandler::HandleStreamRequestComplete,
|
|
shared_from_this(), std::placeholders::_1), m_ProxyURL.host, m_ProxyURL.port);
|
|
}
|
|
else
|
|
{
|
|
boost::asio::ip::tcp::resolver::query q(m_ProxyURL.host, std::to_string(m_ProxyURL.port));
|
|
m_proxy_resolver.async_resolve(q, std::bind(&HTTPReqHandler::HandleUpstreamProxyResolved, this, std::placeholders::_1, std::placeholders::_2, [&](boost::asio::ip::tcp::endpoint ep) {
|
|
m_proxysock->async_connect(ep, std::bind(&HTTPReqHandler::HandleUpstreamHTTPProxyConnect, this, std::placeholders::_1));
|
|
}));
|
|
}
|
|
}
|
|
else if (m_ProxyURL.schema == "socks")
|
|
{
|
|
// handle upstream socks proxy
|
|
if (!m_ProxyURL.port) m_ProxyURL.port = 9050; // default to tor default if not specified
|
|
boost::asio::ip::tcp::resolver::query q(m_ProxyURL.host, std::to_string(m_ProxyURL.port));
|
|
m_proxy_resolver.async_resolve(q, std::bind(&HTTPReqHandler::HandleUpstreamProxyResolved, this, std::placeholders::_1, std::placeholders::_2, [&](boost::asio::ip::tcp::endpoint ep) {
|
|
m_proxysock->async_connect(ep, std::bind(&HTTPReqHandler::HandleUpstreamSocksProxyConnect, this, std::placeholders::_1));
|
|
}));
|
|
}
|
|
else
|
|
{
|
|
// unknown type, complain
|
|
GenericProxyError(tr("unknown outproxy url"), m_ProxyURL.to_string());
|
|
}
|
|
}
|
|
|
|
void HTTPReqHandler::HandleUpstreamProxyResolved(const boost::system::error_code & ec, boost::asio::ip::tcp::resolver::iterator it, ProxyResolvedHandler handler)
|
|
{
|
|
if(ec) GenericProxyError(tr("cannot resolve upstream proxy"), ec.message());
|
|
else handler(*it);
|
|
}
|
|
|
|
void HTTPReqHandler::HandleUpstreamSocksProxyConnect(const boost::system::error_code & ec)
|
|
{
|
|
if(!ec) {
|
|
if(m_RequestURL.host.size() > 255) {
|
|
GenericProxyError(tr("hostname too long"), m_RequestURL.host);
|
|
return;
|
|
}
|
|
uint16_t port = m_RequestURL.port;
|
|
if(!port) port = 80;
|
|
LogPrint(eLogDebug, "HTTPProxy: connected to socks upstream");
|
|
|
|
std::string host = m_RequestURL.host;
|
|
std::size_t reqsize = 0;
|
|
m_socks_buf[0] = '\x04';
|
|
m_socks_buf[1] = 1;
|
|
htobe16buf(m_socks_buf+2, port);
|
|
m_socks_buf[4] = 0;
|
|
m_socks_buf[5] = 0;
|
|
m_socks_buf[6] = 0;
|
|
m_socks_buf[7] = 1;
|
|
// user id
|
|
m_socks_buf[8] = 'i';
|
|
m_socks_buf[9] = '2';
|
|
m_socks_buf[10] = 'p';
|
|
m_socks_buf[11] = 'd';
|
|
m_socks_buf[12] = 0;
|
|
reqsize += 13;
|
|
memcpy(m_socks_buf+ reqsize, host.c_str(), host.size());
|
|
reqsize += host.size();
|
|
m_socks_buf[++reqsize] = 0;
|
|
boost::asio::async_write(*m_proxysock, boost::asio::buffer(m_socks_buf, reqsize), boost::asio::transfer_all(), std::bind(&HTTPReqHandler::HandleSocksProxySendHandshake, this, std::placeholders::_1, std::placeholders::_2));
|
|
} else GenericProxyError(tr("cannot connect to upstream socks proxy"), ec.message());
|
|
}
|
|
|
|
void HTTPReqHandler::HandleSocksProxySendHandshake(const boost::system::error_code & ec, std::size_t bytes_transferred)
|
|
{
|
|
LogPrint(eLogDebug, "HTTPProxy: upstream socks handshake sent");
|
|
if(ec) GenericProxyError(tr("Cannot negotiate with socks proxy"), ec.message());
|
|
else m_proxysock->async_read_some(boost::asio::buffer(m_socks_buf, 8), std::bind(&HTTPReqHandler::HandleSocksProxyReply, this, std::placeholders::_1, std::placeholders::_2));
|
|
}
|
|
|
|
void HTTPReqHandler::HandoverToUpstreamProxy()
|
|
{
|
|
LogPrint(eLogDebug, "HTTPProxy: handover to socks proxy");
|
|
auto connection = std::make_shared<i2p::client::TCPIPPipe>(GetOwner(), m_proxysock, m_sock);
|
|
m_sock = nullptr;
|
|
m_proxysock = nullptr;
|
|
GetOwner()->AddHandler(connection);
|
|
connection->Start();
|
|
Terminate();
|
|
}
|
|
|
|
void HTTPReqHandler::HTTPConnect(const std::string & host, uint16_t port)
|
|
{
|
|
LogPrint(eLogDebug, "HTTPProxy: CONNECT ",host, ":", port);
|
|
std::string hostname(host);
|
|
if(str_rmatch(hostname, ".i2p"))
|
|
GetOwner()->CreateStream (std::bind (&HTTPReqHandler::HandleHTTPConnectStreamRequestComplete,
|
|
shared_from_this(), std::placeholders::_1), host, port);
|
|
else
|
|
ForwardToUpstreamProxy();
|
|
}
|
|
|
|
void HTTPReqHandler::HandleHTTPConnectStreamRequestComplete(std::shared_ptr<i2p::stream::Stream> stream)
|
|
{
|
|
if(stream)
|
|
{
|
|
m_ClientResponse.code = 200;
|
|
m_ClientResponse.status = "OK";
|
|
m_send_buf = m_ClientResponse.to_string();
|
|
m_sock->send(boost::asio::buffer(m_send_buf));
|
|
auto connection = std::make_shared<i2p::client::I2PTunnelConnection>(GetOwner(), m_sock, stream);
|
|
GetOwner()->AddHandler(connection);
|
|
connection->I2PConnect();
|
|
m_sock = nullptr;
|
|
Terminate();
|
|
}
|
|
else
|
|
{
|
|
GenericProxyError(tr("CONNECT error"), tr("Failed to Connect"));
|
|
}
|
|
}
|
|
|
|
void HTTPReqHandler::SocksProxySuccess()
|
|
{
|
|
if(m_ClientRequest.method == "CONNECT") {
|
|
m_ClientResponse.code = 200;
|
|
m_send_buf = m_ClientResponse.to_string();
|
|
boost::asio::async_write(*m_sock, boost::asio::buffer(m_send_buf), boost::asio::transfer_all(), [&] (const boost::system::error_code & ec, std::size_t transferred)
|
|
{
|
|
if(ec) GenericProxyError(tr("socks proxy error"), ec.message());
|
|
else HandoverToUpstreamProxy();
|
|
});
|
|
} else {
|
|
m_send_buf = m_ClientRequestBuffer.str();
|
|
LogPrint(eLogDebug, "HTTPProxy: send ", m_send_buf.size(), " bytes");
|
|
boost::asio::async_write(*m_proxysock, boost::asio::buffer(m_send_buf), boost::asio::transfer_all(), [&](const boost::system::error_code & ec, std::size_t transferred)
|
|
{
|
|
if(ec) GenericProxyError(tr("failed to send request to upstream"), ec.message());
|
|
else HandoverToUpstreamProxy();
|
|
});
|
|
}
|
|
}
|
|
|
|
void HTTPReqHandler::HandleSocksProxyReply(const boost::system::error_code & ec, std::size_t bytes_transferred)
|
|
{
|
|
if(!ec)
|
|
{
|
|
if(m_socks_buf[1] == 90) {
|
|
// success
|
|
SocksProxySuccess();
|
|
} else {
|
|
std::stringstream ss;
|
|
ss << "error code: ";
|
|
ss << (int) m_socks_buf[1];
|
|
std::string msg = ss.str();
|
|
GenericProxyError(tr("socks proxy error"), msg);
|
|
}
|
|
}
|
|
else GenericProxyError(tr("No Reply From socks proxy"), ec.message());
|
|
}
|
|
|
|
void HTTPReqHandler::HandleUpstreamHTTPProxyConnect(const boost::system::error_code & ec)
|
|
{
|
|
if(!ec) {
|
|
LogPrint(eLogDebug, "HTTPProxy: connected to http upstream");
|
|
GenericProxyError(tr("cannot connect"), tr("http out proxy not implemented"));
|
|
} else GenericProxyError(tr("cannot connect to upstream http proxy"), ec.message());
|
|
}
|
|
|
|
/* will be called after some data received from client */
|
|
void HTTPReqHandler::HandleSockRecv(const boost::system::error_code & ecode, std::size_t len)
|
|
{
|
|
LogPrint(eLogDebug, "HTTPProxy: sock recv: ", len, " bytes, recv buf: ", m_recv_buf.length(), ", send buf: ", m_send_buf.length());
|
|
if(ecode)
|
|
{
|
|
LogPrint(eLogWarning, "HTTPProxy: sock recv got error: ", ecode);
|
|
Terminate();
|
|
return;
|
|
}
|
|
|
|
m_recv_buf.append(reinterpret_cast<const char *>(m_recv_chunk), len);
|
|
if (HandleRequest()) {
|
|
m_recv_buf.clear();
|
|
return;
|
|
}
|
|
AsyncSockRead();
|
|
}
|
|
|
|
void HTTPReqHandler::SentHTTPFailed(const boost::system::error_code & ecode)
|
|
{
|
|
if (ecode)
|
|
LogPrint (eLogError, "HTTPProxy: Closing socket after sending failure because: ", ecode.message ());
|
|
Terminate();
|
|
}
|
|
|
|
void HTTPReqHandler::HandleStreamRequestComplete (std::shared_ptr<i2p::stream::Stream> stream)
|
|
{
|
|
if (!stream) {
|
|
LogPrint (eLogError, "HTTPProxy: error when creating the stream, check the previous warnings for more info");
|
|
GenericProxyError(tr("Host is down"), tr("Can't create connection to requested host, it may be down. Please try again later."));
|
|
return;
|
|
}
|
|
if (Kill())
|
|
return;
|
|
LogPrint (eLogDebug, "HTTPProxy: Created new I2PTunnel stream, sSID=", stream->GetSendStreamID(), ", rSID=", stream->GetRecvStreamID());
|
|
auto connection = std::make_shared<i2p::client::I2PClientTunnelConnectionHTTP>(GetOwner(), m_sock, stream);
|
|
GetOwner()->AddHandler (connection);
|
|
connection->I2PConnect (reinterpret_cast<const uint8_t*>(m_send_buf.data()), m_send_buf.length());
|
|
Done (shared_from_this());
|
|
}
|
|
|
|
HTTPProxy::HTTPProxy(const std::string& name, const std::string& address, int port, const std::string & outproxy, bool addresshelper, std::shared_ptr<i2p::client::ClientDestination> localDestination):
|
|
TCPIPAcceptor (address, port, localDestination ? localDestination : i2p::client::context.GetSharedLocalDestination ()),
|
|
m_Name (name), m_OutproxyUrl (outproxy), m_Addresshelper (addresshelper)
|
|
{
|
|
}
|
|
|
|
std::shared_ptr<i2p::client::I2PServiceHandler> HTTPProxy::CreateHandler(std::shared_ptr<boost::asio::ip::tcp::socket> socket)
|
|
{
|
|
return std::make_shared<HTTPReqHandler> (this, socket);
|
|
}
|
|
} // http
|
|
} // i2p
|