mirror of
https://github.com/alibaba/anyproxy.git
synced 2025-04-20 17:34:21 +00:00
865 lines
27 KiB
JavaScript
865 lines
27 KiB
JavaScript
'use strict';
|
||
|
||
const http = require('http'),
|
||
https = require('https'),
|
||
net = require('net'),
|
||
url = require('url'),
|
||
zlib = require('zlib'),
|
||
color = require('colorful'),
|
||
Buffer = require('buffer').Buffer,
|
||
util = require('./util'),
|
||
Stream = require('stream'),
|
||
logUtil = require('./log'),
|
||
co = require('co'),
|
||
WebSocket = require('ws'),
|
||
HttpsServerMgr = require('./httpsServerMgr'),
|
||
brotliTorb = require('brotli'),
|
||
Readable = require('stream').Readable;
|
||
|
||
const requestErrorHandler = require('./requestErrorHandler');
|
||
|
||
// to fix issue with TLS cache, refer to: https://github.com/nodejs/node/issues/8368
|
||
https.globalAgent.maxCachedSessions = 0;
|
||
|
||
const DEFAULT_CHUNK_COLLECT_THRESHOLD = 20 * 1024 * 1024; // about 20 mb
|
||
|
||
class CommonReadableStream extends Readable {
|
||
constructor(config) {
|
||
super({
|
||
highWaterMark: DEFAULT_CHUNK_COLLECT_THRESHOLD * 5
|
||
});
|
||
}
|
||
_read(size) {
|
||
|
||
}
|
||
}
|
||
|
||
/*
|
||
* get error response for exception scenarios
|
||
*/
|
||
const getErrorResponse = (error, fullUrl) => {
|
||
// default error response
|
||
const errorResponse = {
|
||
statusCode: 500,
|
||
header: {
|
||
'Content-Type': 'text/html; charset=utf-8',
|
||
'Proxy-Error': true,
|
||
'Proxy-Error-Message': error || 'null'
|
||
},
|
||
body: requestErrorHandler.getErrorContent(error, fullUrl)
|
||
};
|
||
|
||
return errorResponse;
|
||
}
|
||
|
||
/**
|
||
* fetch remote response
|
||
*
|
||
* @param {string} protocol
|
||
* @param {object} options options of http.request
|
||
* @param {buffer} reqData request body
|
||
* @param {object} config
|
||
* @param {boolean} config.dangerouslyIgnoreUnauthorized
|
||
* @param {boolean} config.chunkSizeThreshold
|
||
* @returns
|
||
*/
|
||
function fetchRemoteResponse(protocol, options, reqData, config) {
|
||
reqData = reqData || '';
|
||
return new Promise((resolve, reject) => {
|
||
delete options.headers['content-length']; // will reset the content-length after rule
|
||
delete options.headers['Content-Length'];
|
||
delete options.headers['Transfer-Encoding'];
|
||
delete options.headers['transfer-encoding'];
|
||
|
||
if (config.dangerouslyIgnoreUnauthorized) {
|
||
options.rejectUnauthorized = false;
|
||
}
|
||
|
||
if (!config.chunkSizeThreshold) {
|
||
throw new Error('chunkSizeThreshold is required');
|
||
}
|
||
|
||
//send request
|
||
const proxyReq = (/https/i.test(protocol) ? https : http).request(options, (res) => {
|
||
res.headers = util.getHeaderFromRawHeaders(res.rawHeaders);
|
||
//deal response header
|
||
const statusCode = res.statusCode;
|
||
const resHeader = res.headers;
|
||
let resDataChunks = []; // array of data chunks or stream
|
||
const rawResChunks = []; // the original response chunks
|
||
let resDataStream = null;
|
||
let resSize = 0;
|
||
const finishCollecting = () => {
|
||
new Promise((fulfill, rejectParsing) => {
|
||
if (resDataStream) {
|
||
fulfill(resDataStream);
|
||
} else {
|
||
const serverResData = Buffer.concat(resDataChunks);
|
||
const originContentLen = util.getByteSize(serverResData);
|
||
// remove gzip related header, and ungzip the content
|
||
// note there are other compression types like deflate
|
||
const contentEncoding = resHeader['content-encoding'] || resHeader['Content-Encoding'];
|
||
const ifServerGzipped = /gzip/i.test(contentEncoding);
|
||
const isServerDeflated = /deflate/i.test(contentEncoding);
|
||
const isBrotlied = /br/i.test(contentEncoding);
|
||
|
||
/**
|
||
* when the content is unzipped, update the header content
|
||
*/
|
||
const refactContentEncoding = () => {
|
||
if (contentEncoding) {
|
||
resHeader['x-anyproxy-origin-content-encoding'] = contentEncoding;
|
||
delete resHeader['content-encoding'];
|
||
delete resHeader['Content-Encoding'];
|
||
}
|
||
}
|
||
|
||
// set origin content length into header
|
||
resHeader['x-anyproxy-origin-content-length'] = originContentLen;
|
||
|
||
// only do unzip when there is res data
|
||
if (ifServerGzipped && originContentLen) {
|
||
refactContentEncoding();
|
||
zlib.gunzip(serverResData, (err, buff) => { // TODO test case to cover
|
||
if (err) {
|
||
rejectParsing(err);
|
||
} else {
|
||
fulfill(buff);
|
||
}
|
||
});
|
||
} else if (isServerDeflated && originContentLen) {
|
||
refactContentEncoding();
|
||
zlib.inflateRaw(serverResData, (err, buff) => { // TODO test case to cover
|
||
if (err) {
|
||
rejectParsing(err);
|
||
} else {
|
||
fulfill(buff);
|
||
}
|
||
});
|
||
} else if (isBrotlied && originContentLen) {
|
||
refactContentEncoding();
|
||
|
||
try {
|
||
// an Unit8Array returned by decompression
|
||
const result = brotliTorb.decompress(serverResData);
|
||
fulfill(Buffer.from(result));
|
||
} catch (e) {
|
||
rejectParsing(e);
|
||
}
|
||
} else {
|
||
fulfill(serverResData);
|
||
}
|
||
}
|
||
}).then((serverResData) => {
|
||
resolve({
|
||
statusCode,
|
||
header: resHeader,
|
||
body: serverResData,
|
||
rawBody: rawResChunks,
|
||
_res: res,
|
||
});
|
||
}).catch((e) => {
|
||
reject(e);
|
||
});
|
||
};
|
||
|
||
//deal response data
|
||
res.on('data', (chunk) => {
|
||
rawResChunks.push(chunk);
|
||
if (resDataStream) { // stream mode
|
||
resDataStream.push(chunk);
|
||
} else { // dataChunks
|
||
resSize += chunk.length;
|
||
resDataChunks.push(chunk);
|
||
|
||
// stop collecting, convert to stream mode
|
||
if (resSize >= config.chunkSizeThreshold) {
|
||
resDataStream = new CommonReadableStream();
|
||
while (resDataChunks.length) {
|
||
resDataStream.push(resDataChunks.shift());
|
||
}
|
||
resDataChunks = null;
|
||
finishCollecting();
|
||
}
|
||
}
|
||
});
|
||
|
||
res.on('end', () => {
|
||
if (resDataStream) {
|
||
resDataStream.push(null); // indicate the stream is end
|
||
} else {
|
||
finishCollecting();
|
||
}
|
||
});
|
||
res.on('error', (error) => {
|
||
logUtil.printLog('error happend in response:' + error, logUtil.T_ERR);
|
||
reject(error);
|
||
});
|
||
});
|
||
|
||
proxyReq.on('error', reject);
|
||
proxyReq.end(reqData);
|
||
});
|
||
}
|
||
|
||
/**
|
||
* get request info from the ws client, includes:
|
||
host
|
||
port
|
||
path
|
||
protocol ws/wss
|
||
|
||
@param @required wsClient the ws client of WebSocket
|
||
*
|
||
*/
|
||
function getWsReqInfo(wsClient) {
|
||
const upgradeReq = wsClient.upgradeReq || {};
|
||
const header = upgradeReq.headers || {};
|
||
const host = header.host;
|
||
const hostName = host.split(':')[0];
|
||
const port = host.split(':')[1];
|
||
|
||
// TODO 如果是windows机器,url是不是全路径?需要对其过滤,取出
|
||
const path = upgradeReq.url || '/';
|
||
|
||
const isEncript = true && upgradeReq.connection && upgradeReq.connection.encrypted;
|
||
return {
|
||
hostName: hostName,
|
||
port: port,
|
||
path: path,
|
||
protocol: isEncript ? 'wss' : 'ws'
|
||
};
|
||
}
|
||
/**
|
||
* get a request handler for http/https server
|
||
*
|
||
* @param {RequestHandler} reqHandlerCtx
|
||
* @param {object} userRule
|
||
* @param {Recorder} recorder
|
||
* @returns
|
||
*/
|
||
function getUserReqHandler(userRule, recorder) {
|
||
const reqHandlerCtx = this
|
||
|
||
return function (req, userRes) {
|
||
/*
|
||
note
|
||
req.url is wired
|
||
in http server: http://www.example.com/a/b/c
|
||
in https server: /a/b/c
|
||
*/
|
||
|
||
const host = req.headers.host;
|
||
const protocol = (!!req.connection.encrypted && !(/^http:/).test(req.url)) ? 'https' : 'http';
|
||
const fullUrl = protocol === 'http' ? req.url : (protocol + '://' + host + req.url);
|
||
|
||
const urlPattern = url.parse(fullUrl);
|
||
const path = urlPattern.path;
|
||
const chunkSizeThreshold = DEFAULT_CHUNK_COLLECT_THRESHOLD;
|
||
|
||
let resourceInfo = null;
|
||
let resourceInfoId = -1;
|
||
let reqData;
|
||
let requestDetail;
|
||
|
||
// refer to https://github.com/alibaba/anyproxy/issues/103
|
||
// construct the original headers as the reqheaders
|
||
req.headers = util.getHeaderFromRawHeaders(req.rawHeaders);
|
||
|
||
logUtil.printLog(color.green(`received request to: ${req.method} ${host}${path}`));
|
||
|
||
/**
|
||
* fetch complete req data
|
||
*/
|
||
const fetchReqData = () => new Promise((resolve) => {
|
||
const postData = [];
|
||
req.on('data', (chunk) => {
|
||
postData.push(chunk);
|
||
});
|
||
req.on('end', () => {
|
||
reqData = Buffer.concat(postData);
|
||
resolve();
|
||
});
|
||
});
|
||
|
||
/**
|
||
* prepare detailed request info
|
||
*/
|
||
const prepareRequestDetail = () => {
|
||
const options = {
|
||
hostname: urlPattern.hostname || req.headers.host,
|
||
port: urlPattern.port || req.port || (/https/.test(protocol) ? 443 : 80),
|
||
path,
|
||
method: req.method,
|
||
headers: req.headers
|
||
};
|
||
|
||
requestDetail = {
|
||
requestOptions: options,
|
||
protocol,
|
||
url: fullUrl,
|
||
requestData: reqData,
|
||
_req: req
|
||
};
|
||
|
||
return Promise.resolve();
|
||
};
|
||
|
||
/**
|
||
* send response to client
|
||
*
|
||
* @param {object} finalResponseData
|
||
* @param {number} finalResponseData.statusCode
|
||
* @param {object} finalResponseData.header
|
||
* @param {buffer|string} finalResponseData.body
|
||
*/
|
||
const sendFinalResponse = (finalResponseData) => {
|
||
const responseInfo = finalResponseData.response;
|
||
const resHeader = responseInfo.header;
|
||
const responseBody = responseInfo.body || '';
|
||
|
||
const transferEncoding = resHeader['transfer-encoding'] || resHeader['Transfer-Encoding'] || '';
|
||
const contentLength = resHeader['content-length'] || resHeader['Content-Length'];
|
||
const connection = resHeader.Connection || resHeader.connection;
|
||
if (contentLength) {
|
||
delete resHeader['content-length'];
|
||
delete resHeader['Content-Length'];
|
||
}
|
||
|
||
// set proxy-connection
|
||
if (connection) {
|
||
resHeader['x-anyproxy-origin-connection'] = connection;
|
||
delete resHeader.connection;
|
||
delete resHeader.Connection;
|
||
}
|
||
|
||
if (!responseInfo) {
|
||
throw new Error('failed to get response info');
|
||
} else if (!responseInfo.statusCode) {
|
||
throw new Error('failed to get response status code')
|
||
} else if (!responseInfo.header) {
|
||
throw new Error('filed to get response header');
|
||
}
|
||
// if there is no transfer-encoding, set the content-length
|
||
if (!global._throttle
|
||
&& transferEncoding !== 'chunked'
|
||
&& !(responseBody instanceof CommonReadableStream)
|
||
) {
|
||
resHeader['Content-Length'] = util.getByteSize(responseBody);
|
||
}
|
||
|
||
userRes.writeHead(responseInfo.statusCode, resHeader);
|
||
|
||
if (global._throttle) {
|
||
if (responseBody instanceof CommonReadableStream) {
|
||
responseBody.pipe(global._throttle.throttle()).pipe(userRes);
|
||
} else {
|
||
const thrStream = new Stream();
|
||
thrStream.pipe(global._throttle.throttle()).pipe(userRes);
|
||
thrStream.emit('data', responseBody);
|
||
thrStream.emit('end');
|
||
}
|
||
} else {
|
||
if (responseBody instanceof CommonReadableStream) {
|
||
responseBody.pipe(userRes);
|
||
} else {
|
||
userRes.end(responseBody);
|
||
}
|
||
}
|
||
|
||
return responseInfo;
|
||
}
|
||
|
||
// fetch complete request data
|
||
co(fetchReqData)
|
||
.then(prepareRequestDetail)
|
||
|
||
.then(() => {
|
||
// record request info
|
||
if (recorder) {
|
||
resourceInfo = {
|
||
host,
|
||
method: req.method,
|
||
path,
|
||
protocol,
|
||
url: protocol + '://' + host + path,
|
||
req,
|
||
startTime: new Date().getTime()
|
||
};
|
||
resourceInfoId = recorder.appendRecord(resourceInfo);
|
||
}
|
||
|
||
try {
|
||
resourceInfo.reqBody = reqData.toString(); //TODO: deal reqBody in webInterface.js
|
||
recorder && recorder.updateRecord(resourceInfoId, resourceInfo);
|
||
} catch (e) { }
|
||
})
|
||
|
||
// invoke rule before sending request
|
||
.then(co.wrap(function *() {
|
||
const userModifiedInfo = (yield userRule.beforeSendRequest(Object.assign({}, requestDetail))) || {};
|
||
const finalReqDetail = {};
|
||
['protocol', 'requestOptions', 'requestData', 'response'].map((key) => {
|
||
finalReqDetail[key] = userModifiedInfo[key] || requestDetail[key]
|
||
});
|
||
return finalReqDetail;
|
||
}))
|
||
|
||
// route user config
|
||
.then(co.wrap(function *(userConfig) {
|
||
if (userConfig.response) {
|
||
// user-assigned local response
|
||
userConfig._directlyPassToRespond = true;
|
||
return userConfig;
|
||
} else if (userConfig.requestOptions) {
|
||
const remoteResponse = yield fetchRemoteResponse(userConfig.protocol, userConfig.requestOptions, userConfig.requestData, {
|
||
dangerouslyIgnoreUnauthorized: reqHandlerCtx.dangerouslyIgnoreUnauthorized,
|
||
chunkSizeThreshold,
|
||
});
|
||
return {
|
||
response: {
|
||
statusCode: remoteResponse.statusCode,
|
||
header: remoteResponse.header,
|
||
body: remoteResponse.body,
|
||
rawBody: remoteResponse.rawBody
|
||
},
|
||
_res: remoteResponse._res,
|
||
};
|
||
} else {
|
||
throw new Error('lost response or requestOptions, failed to continue');
|
||
}
|
||
}))
|
||
|
||
// invoke rule before responding to client
|
||
.then(co.wrap(function *(responseData) {
|
||
if (responseData._directlyPassToRespond) {
|
||
return responseData;
|
||
} else if (responseData.response.body && responseData.response.body instanceof CommonReadableStream) { // in stream mode
|
||
return responseData;
|
||
} else {
|
||
// TODO: err etimeout
|
||
return (yield userRule.beforeSendResponse(Object.assign({}, requestDetail), Object.assign({}, responseData))) || responseData;
|
||
}
|
||
}))
|
||
|
||
.catch(co.wrap(function *(error) {
|
||
logUtil.printLog(util.collectErrorLog(error), logUtil.T_ERR);
|
||
|
||
let errorResponse = getErrorResponse(error, fullUrl);
|
||
|
||
// call user rule
|
||
try {
|
||
const userResponse = yield userRule.onError(Object.assign({}, requestDetail), error);
|
||
if (userResponse && userResponse.response && userResponse.response.header) {
|
||
errorResponse = userResponse.response;
|
||
}
|
||
} catch (e) {}
|
||
|
||
return {
|
||
response: errorResponse
|
||
};
|
||
}))
|
||
.then(sendFinalResponse)
|
||
|
||
//update record info
|
||
.then((responseInfo) => {
|
||
resourceInfo.endTime = new Date().getTime();
|
||
resourceInfo.res = { //construct a self-defined res object
|
||
statusCode: responseInfo.statusCode,
|
||
headers: responseInfo.header,
|
||
};
|
||
|
||
resourceInfo.statusCode = responseInfo.statusCode;
|
||
resourceInfo.resHeader = responseInfo.header;
|
||
resourceInfo.resBody = responseInfo.body instanceof CommonReadableStream ? '(big stream)' : (responseInfo.body || '');
|
||
resourceInfo.length = resourceInfo.resBody.length;
|
||
|
||
// console.info('===> resbody in record', resourceInfo);
|
||
|
||
recorder && recorder.updateRecord(resourceInfoId, resourceInfo);
|
||
})
|
||
.catch((e) => {
|
||
logUtil.printLog(color.green('Send final response failed:' + e.message), logUtil.T_ERR);
|
||
});
|
||
}
|
||
}
|
||
|
||
/**
|
||
* get a handler for CONNECT request
|
||
*
|
||
* @param {RequestHandler} reqHandlerCtx
|
||
* @param {object} userRule
|
||
* @param {Recorder} recorder
|
||
* @param {object} httpsServerMgr
|
||
* @returns
|
||
*/
|
||
function getConnectReqHandler(userRule, recorder, httpsServerMgr) {
|
||
const reqHandlerCtx = this; reqHandlerCtx.conns = new Map(); reqHandlerCtx.cltSockets = new Map()
|
||
|
||
return function (req, cltSocket, head) {
|
||
const host = req.url.split(':')[0],
|
||
targetPort = req.url.split(':')[1];
|
||
let shouldIntercept;
|
||
let interceptWsRequest = false;
|
||
let requestDetail;
|
||
let resourceInfo = null;
|
||
let resourceInfoId = -1;
|
||
const requestStream = new CommonReadableStream();
|
||
|
||
/*
|
||
1. write HTTP/1.1 200 to client
|
||
2. get request data
|
||
3. tell if it is a websocket request
|
||
4.1 if (websocket || do_not_intercept) --> pipe to target server
|
||
4.2 else --> pipe to local server and do man-in-the-middle attack
|
||
*/
|
||
co(function *() {
|
||
// determine whether to use the man-in-the-middle server
|
||
logUtil.printLog(color.green('received https CONNECT request ' + host));
|
||
requestDetail = {
|
||
host: req.url,
|
||
_req: req
|
||
};
|
||
// the return value in default rule is null
|
||
// so if the value is null, will take it as final value
|
||
shouldIntercept = yield userRule.beforeDealHttpsRequest(requestDetail);
|
||
|
||
// otherwise, will take the passed in option
|
||
if (shouldIntercept === null) {
|
||
shouldIntercept = reqHandlerCtx.forceProxyHttps;
|
||
}
|
||
})
|
||
.then(() =>
|
||
new Promise((resolve) => {
|
||
// mark socket connection as established, to detect the request protocol
|
||
cltSocket.write('HTTP/' + req.httpVersion + ' 200 OK\r\n\r\n', 'UTF-8', resolve);
|
||
})
|
||
)
|
||
.then(() =>
|
||
new Promise((resolve, reject) => {
|
||
let resolved = false;
|
||
cltSocket.on('data', (chunk) => {
|
||
requestStream.push(chunk);
|
||
if (!resolved) {
|
||
resolved = true;
|
||
try {
|
||
const chunkString = chunk.toString();
|
||
if (chunkString.indexOf('GET ') === 0) {
|
||
shouldIntercept = false; // websocket, do not intercept
|
||
|
||
// if there is '/do-not-proxy' in the request, do not intercept the websocket
|
||
// to avoid AnyProxy itself be proxied
|
||
if (reqHandlerCtx.wsIntercept && chunkString.indexOf('GET /do-not-proxy') !== 0) {
|
||
interceptWsRequest = true;
|
||
}
|
||
}
|
||
} catch (e) {
|
||
console.error(e);
|
||
}
|
||
resolve();
|
||
}
|
||
});
|
||
cltSocket.on('end', () => {
|
||
requestStream.push(null);
|
||
});
|
||
})
|
||
)
|
||
.then((result) => {
|
||
// log and recorder
|
||
if (shouldIntercept) {
|
||
logUtil.printLog('will forward to local https server');
|
||
} else {
|
||
logUtil.printLog('will bypass the man-in-the-middle proxy');
|
||
}
|
||
|
||
//record
|
||
if (recorder) {
|
||
resourceInfo = {
|
||
host,
|
||
method: req.method,
|
||
path: '',
|
||
url: 'https://' + host,
|
||
req,
|
||
startTime: new Date().getTime()
|
||
};
|
||
resourceInfoId = recorder.appendRecord(resourceInfo);
|
||
}
|
||
})
|
||
.then(() => {
|
||
// determine the request target
|
||
if (!shouldIntercept) {
|
||
// server info from the original request
|
||
const originServer = {
|
||
host,
|
||
port: (targetPort === 80) ? 443 : targetPort
|
||
}
|
||
|
||
const localHttpServer = {
|
||
host: 'localhost',
|
||
port: reqHandlerCtx.httpServerPort
|
||
}
|
||
|
||
// for ws request, redirect them to local ws server
|
||
return interceptWsRequest ? localHttpServer : originServer;
|
||
} else {
|
||
return httpsServerMgr.getSharedHttpsServer(host).then(serverInfo => ({ host: serverInfo.host, port: serverInfo.port }));
|
||
}
|
||
})
|
||
.then((serverInfo) => {
|
||
if (!serverInfo.port || !serverInfo.host) {
|
||
throw new Error('failed to get https server info');
|
||
}
|
||
|
||
return new Promise((resolve, reject) => {
|
||
const conn = net.connect(serverInfo.port, serverInfo.host, () => {
|
||
//throttle for direct-foward https
|
||
if (global._throttle && !shouldIntercept) {
|
||
requestStream.pipe(conn);
|
||
conn.pipe(global._throttle.throttle()).pipe(cltSocket);
|
||
} else {
|
||
requestStream.pipe(conn);
|
||
conn.pipe(cltSocket);
|
||
}
|
||
|
||
resolve();
|
||
});
|
||
|
||
conn.on('error', (e) => {
|
||
reject(e);
|
||
});
|
||
|
||
reqHandlerCtx.conns.set(serverInfo.host + ':' + serverInfo.port, conn)
|
||
reqHandlerCtx.cltSockets.set(serverInfo.host + ':' + serverInfo.port, cltSocket)
|
||
});
|
||
})
|
||
.then(() => {
|
||
if (recorder) {
|
||
resourceInfo.endTime = new Date().getTime();
|
||
resourceInfo.statusCode = '200';
|
||
resourceInfo.resHeader = {};
|
||
resourceInfo.resBody = '';
|
||
resourceInfo.length = 0;
|
||
|
||
recorder && recorder.updateRecord(resourceInfoId, resourceInfo);
|
||
}
|
||
})
|
||
.catch(co.wrap(function *(error) {
|
||
logUtil.printLog(util.collectErrorLog(error), logUtil.T_ERR);
|
||
|
||
try {
|
||
yield userRule.onConnectError(requestDetail, error);
|
||
} catch (e) { }
|
||
|
||
try {
|
||
let errorHeader = 'Proxy-Error: true\r\n';
|
||
errorHeader += 'Proxy-Error-Message: ' + (error || 'null') + '\r\n';
|
||
errorHeader += 'Content-Type: text/html\r\n';
|
||
cltSocket.write('HTTP/1.1 502\r\n' + errorHeader + '\r\n\r\n');
|
||
} catch (e) { }
|
||
}));
|
||
}
|
||
}
|
||
|
||
/**
|
||
* get a websocket event handler
|
||
@param @required {object} wsClient
|
||
*/
|
||
function getWsHandler(userRule, recorder, wsClient) {
|
||
const self = this;
|
||
try {
|
||
let resourceInfoId = -1;
|
||
const resourceInfo = {
|
||
wsMessages: [] // all ws messages go through AnyProxy
|
||
};
|
||
const clientMsgQueue = [];
|
||
const serverInfo = getWsReqInfo(wsClient);
|
||
const wsUrl = `${serverInfo.protocol}://${serverInfo.hostName}:${serverInfo.port}${serverInfo.path}`;
|
||
const proxyWs = new WebSocket(wsUrl, '', {
|
||
rejectUnauthorized: !self.dangerouslyIgnoreUnauthorized
|
||
});
|
||
|
||
if (recorder) {
|
||
Object.assign(resourceInfo, {
|
||
host: serverInfo.hostName,
|
||
method: 'WebSocket',
|
||
path: serverInfo.path,
|
||
url: wsUrl,
|
||
req: wsClient.upgradeReq || {},
|
||
startTime: new Date().getTime()
|
||
});
|
||
resourceInfoId = recorder.appendRecord(resourceInfo);
|
||
}
|
||
|
||
/**
|
||
* store the messages before the proxy ws is ready
|
||
*/
|
||
const sendProxyMessage = (event) => {
|
||
const message = event.data;
|
||
if (proxyWs.readyState === 1) {
|
||
// if there still are msg queue consuming, keep it going
|
||
if (clientMsgQueue.length > 0) {
|
||
clientMsgQueue.push(message);
|
||
} else {
|
||
proxyWs.send(message);
|
||
}
|
||
} else {
|
||
clientMsgQueue.push(message);
|
||
}
|
||
}
|
||
|
||
/**
|
||
* consume the message in queue when the proxy ws is not ready yet
|
||
* will handle them from the first one-by-one
|
||
*/
|
||
const consumeMsgQueue = () => {
|
||
while (clientMsgQueue.length > 0) {
|
||
const message = clientMsgQueue.shift();
|
||
proxyWs.send(message);
|
||
}
|
||
}
|
||
|
||
/**
|
||
* When the source ws is closed, we need to close the target websocket.
|
||
* If the source ws is normally closed, that is, the code is reserved, we need to transfrom them
|
||
*/
|
||
const getCloseFromOriginEvent = (event) => {
|
||
const code = event.code || '';
|
||
const reason = event.reason || '';
|
||
let targetCode = '';
|
||
let targetReason = '';
|
||
if (code >= 1004 && code <= 1006) {
|
||
targetCode = 1000; // normal closure
|
||
targetReason = `Normally closed. The origin ws is closed at code: ${code} and reason: ${reason}`;
|
||
} else {
|
||
targetCode = code;
|
||
targetReason = reason;
|
||
}
|
||
|
||
return {
|
||
code: targetCode,
|
||
reason: targetReason
|
||
}
|
||
}
|
||
|
||
/**
|
||
* consruct a message Record from message event
|
||
* @param @required {event} messageEvent the event from websockt.onmessage
|
||
* @param @required {boolean} isToServer whether the message is to or from server
|
||
*
|
||
*/
|
||
const recordMessage = (messageEvent, isToServer) => {
|
||
const message = {
|
||
time: Date.now(),
|
||
message: messageEvent.data,
|
||
isToServer: isToServer
|
||
};
|
||
|
||
// resourceInfo.wsMessages.push(message);
|
||
recorder && recorder.updateRecordWsMessage(resourceInfoId, message);
|
||
};
|
||
|
||
proxyWs.onopen = () => {
|
||
consumeMsgQueue();
|
||
}
|
||
|
||
// this event is fired when the connection is build and headers is returned
|
||
proxyWs.on('headers', (headers, response) => {
|
||
resourceInfo.endTime = new Date().getTime();
|
||
resourceInfo.res = { //construct a self-defined res object
|
||
statusCode: response.statusCode,
|
||
headers: headers,
|
||
};
|
||
|
||
resourceInfo.statusCode = response.statusCode;
|
||
resourceInfo.resHeader = headers;
|
||
resourceInfo.resBody = '';
|
||
resourceInfo.length = resourceInfo.resBody.length;
|
||
|
||
recorder && recorder.updateRecord(resourceInfoId, resourceInfo);
|
||
});
|
||
|
||
proxyWs.onerror = (e) => {
|
||
// https://developer.mozilla.org/en-US/docs/Web/API/CloseEvent#Status_codes
|
||
wsClient.close(1001, e.message);
|
||
proxyWs.close(1001);
|
||
}
|
||
|
||
proxyWs.onmessage = (event) => {
|
||
recordMessage(event, false);
|
||
wsClient.readyState === 1 && wsClient.send(event.data);
|
||
}
|
||
|
||
proxyWs.onclose = (event) => {
|
||
logUtil.debug(`proxy ws closed with code: ${event.code} and reason: ${event.reason}`);
|
||
const targetCloseInfo = getCloseFromOriginEvent(event);
|
||
wsClient.readyState !== 3 && wsClient.close(targetCloseInfo.code, targetCloseInfo.reason);
|
||
}
|
||
|
||
wsClient.onmessage = (event) => {
|
||
recordMessage(event, true);
|
||
sendProxyMessage(event);
|
||
}
|
||
|
||
wsClient.onclose = (event) => {
|
||
logUtil.debug(`original ws closed with code: ${event.code} and reason: ${event.reason}`);
|
||
const targetCloseInfo = getCloseFromOriginEvent(event);
|
||
proxyWs.readyState !== 3 && proxyWs.close(targetCloseInfo.code, targetCloseInfo.reason);
|
||
}
|
||
} catch (e) {
|
||
logUtil.debug('WebSocket Proxy Error:' + e.message);
|
||
logUtil.debug(e.stack);
|
||
console.error(e);
|
||
}
|
||
}
|
||
|
||
class RequestHandler {
|
||
|
||
/**
|
||
* Creates an instance of RequestHandler.
|
||
*
|
||
* @param {object} config
|
||
* @param {boolean} config.forceProxyHttps proxy all https requests
|
||
* @param {boolean} config.dangerouslyIgnoreUnauthorized
|
||
@param {number} config.httpServerPort the http port AnyProxy do the proxy
|
||
* @param {object} rule
|
||
* @param {Recorder} recorder
|
||
*
|
||
* @memberOf RequestHandler
|
||
*/
|
||
constructor(config, rule, recorder) {
|
||
const reqHandlerCtx = this;
|
||
this.forceProxyHttps = false;
|
||
this.dangerouslyIgnoreUnauthorized = false;
|
||
this.httpServerPort = '';
|
||
this.wsIntercept = false;
|
||
|
||
if (config.forceProxyHttps) {
|
||
this.forceProxyHttps = true;
|
||
}
|
||
|
||
if (config.dangerouslyIgnoreUnauthorized) {
|
||
this.dangerouslyIgnoreUnauthorized = true;
|
||
}
|
||
|
||
if (config.wsIntercept) {
|
||
this.wsIntercept = config.wsIntercept;
|
||
}
|
||
|
||
this.httpServerPort = config.httpServerPort;
|
||
const default_rule = util.freshRequire('./rule_default');
|
||
const userRule = util.merge(default_rule, rule);
|
||
|
||
reqHandlerCtx.userRequestHandler = getUserReqHandler.apply(reqHandlerCtx, [userRule, recorder]);
|
||
reqHandlerCtx.wsHandler = getWsHandler.bind(this, userRule, recorder);
|
||
|
||
reqHandlerCtx.httpsServerMgr = new HttpsServerMgr({
|
||
handler: reqHandlerCtx.userRequestHandler,
|
||
wsHandler: reqHandlerCtx.wsHandler // websocket
|
||
});
|
||
|
||
this.connectReqHandler = getConnectReqHandler.apply(reqHandlerCtx, [userRule, recorder, reqHandlerCtx.httpsServerMgr]);
|
||
}
|
||
}
|
||
|
||
module.exports = RequestHandler;
|