All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.littleshoot.proxy.impl.ProxyConnection Maven / Gradle / Ivy

Go to download

LittleProxy is a high performance HTTP proxy written in Java and using the Netty networking framework.

There is a newer version: 1.1.2
Show newest version
package org.littleshoot.proxy.impl;

import static org.littleshoot.proxy.impl.ConnectionState.*;
import io.netty.buffer.ByteBuf;
import io.netty.buffer.Unpooled;
import io.netty.channel.Channel;
import io.netty.channel.ChannelFuture;
import io.netty.channel.ChannelHandlerContext;
import io.netty.channel.ChannelInboundHandlerAdapter;
import io.netty.channel.ChannelOutboundHandlerAdapter;
import io.netty.channel.ChannelPipeline;
import io.netty.channel.ChannelPromise;
import io.netty.channel.SimpleChannelInboundHandler;
import io.netty.handler.codec.http.HttpContent;
import io.netty.handler.codec.http.HttpContentDecompressor;
import io.netty.handler.codec.http.HttpObject;
import io.netty.handler.codec.http.HttpObjectAggregator;
import io.netty.handler.codec.http.HttpRequest;
import io.netty.handler.codec.http.HttpResponse;
import io.netty.handler.ssl.SslHandler;
import io.netty.handler.timeout.IdleStateEvent;
import io.netty.util.ReferenceCounted;
import io.netty.util.concurrent.Future;
import io.netty.util.concurrent.GenericFutureListener;
import io.netty.util.concurrent.Promise;

import javax.net.ssl.SSLEngine;

/**
 * 

* Base class for objects that represent a connection to/from our proxy. *

*

* A ProxyConnection models a bidirectional message flow on top of a Netty * {@link Channel}. *

*

* The {@link #read(Object)} method is called whenever a new message arrives on * the underlying socket. *

*

* The {@link #write(Object)} method can be called by anyone wanting to write * data out of the connection. *

*

* ProxyConnection has a lifecycle and its current state within that lifecycle * is recorded as a {@link ConnectionState}. The allowed states and transitions * vary a little depending on the concrete implementation of ProxyConnection. * However, all ProxyConnections share the following lifecycle events: *

* *
    *
  • {@link #connected()} - Once the underlying channel is active, the * ProxyConnection is considered connected and moves into * {@link ConnectionState#AWAITING_INITIAL}. The Channel is recorded at this * time for later referencing.
  • *
  • {@link #disconnected()} - When the underlying channel goes inactive, the * ProxyConnection moves into {@link ConnectionState#DISCONNECTED}
  • *
  • {@link #becameWritable()} - When the underlying channel becomes * writeable, this callback is invoked.
  • *
* *

* By default, incoming data on the underlying channel is automatically read and * passed to the {@link #read(Object)} method. Reading can be stopped and * resumed using {@link #stopReading()} and {@link #resumeReading()}. *

* * @param * the type of "initial" message. This will be either * {@link HttpResponse} or {@link HttpRequest}. */ abstract class ProxyConnection extends SimpleChannelInboundHandler { protected final ProxyConnectionLogger LOG = new ProxyConnectionLogger(this); protected final DefaultHttpProxyServer proxyServer; protected final boolean runsAsSslClient; protected volatile ChannelHandlerContext ctx; protected volatile Channel channel; private volatile ConnectionState currentState; private volatile boolean tunneling = false; protected volatile long lastReadTime = 0; /** * If using encryption, this holds our {@link SSLEngine}. */ protected volatile SSLEngine sslEngine; /** * Construct a new ProxyConnection. * * @param initialState * the state in which this connection starts out * @param proxyServer * the {@link DefaultHttpProxyServer} in which we're running * @param runsAsSslClient * determines whether this connection acts as an SSL client or * server (determines who does the handshake) */ protected ProxyConnection(ConnectionState initialState, DefaultHttpProxyServer proxyServer, boolean runsAsSslClient) { become(initialState); this.proxyServer = proxyServer; this.runsAsSslClient = runsAsSslClient; } /*************************************************************************** * Reading **************************************************************************/ /** * Read is invoked automatically by Netty as messages arrive on the socket. * * @param msg */ protected void read(Object msg) { LOG.debug("Reading: {}", msg); lastReadTime = System.currentTimeMillis(); if (tunneling) { // In tunneling mode, this connection is simply shoveling bytes readRaw((ByteBuf) msg); } else { // If not tunneling, then we are always dealing with HttpObjects. readHTTP((HttpObject) msg); } } /** * Handles reading {@link HttpObject}s. * * @param httpObject */ private void readHTTP(HttpObject httpObject) { ConnectionState nextState = getCurrentState(); switch (getCurrentState()) { case AWAITING_INITIAL: nextState = readHTTPInitial((I) httpObject); break; case AWAITING_CHUNK: HttpContent chunk = (HttpContent) httpObject; readHTTPChunk(chunk); nextState = ProxyUtils.isLastChunk(chunk) ? AWAITING_INITIAL : AWAITING_CHUNK; break; case AWAITING_PROXY_AUTHENTICATION: if (httpObject instanceof HttpRequest) { // Once we get an HttpRequest, try to process it as usual nextState = readHTTPInitial((I) httpObject); } else { // Anything that's not an HttpRequest that came in while // we're pending authentication gets dropped on the floor. This // can happen if the connected host already sent us some chunks // (e.g. from a POST) after an initial request that turned out // to require authentication. } break; case CONNECTING: LOG.warn("Attempted to read from connection that's in the process of connecting. This shouldn't happen."); break; case NEGOTIATING_CONNECT: LOG.debug("Attempted to read from connection that's in the process of negotiating an HTTP CONNECT. This is probably the LastHttpContent of a chunked CONNECT."); break; case AWAITING_CONNECT_OK: LOG.warn("AWAITING_CONNECT_OK should have been handled by ProxyToServerConnection.read()"); break; case HANDSHAKING: LOG.warn( "Attempted to read from connection that's in the process of handshaking. This shouldn't happen.", channel); break; case DISCONNECT_REQUESTED: case DISCONNECTED: LOG.info("Ignoring message since the connection is closed or about to close"); break; } become(nextState); } /** * Implement this to handle reading the initial object (e.g. * {@link HttpRequest} or {@link HttpResponse}). * * @param httpObject * @return */ protected abstract ConnectionState readHTTPInitial(I httpObject); /** * Implement this to handle reading a chunk in a chunked transfer. * * @param chunk */ protected abstract void readHTTPChunk(HttpContent chunk); /** * Implement this to handle reading a raw buffer as they are used in HTTP * tunneling. * * @param buf */ protected abstract void readRaw(ByteBuf buf); /*************************************************************************** * Writing **************************************************************************/ /** * This method is called by users of the ProxyConnection to send stuff out * over the socket. * * @param msg */ void write(Object msg) { if (msg instanceof ReferenceCounted) { LOG.debug("Retaining reference counted message"); ((ReferenceCounted) msg).retain(); } doWrite(msg); } void doWrite(Object msg) { LOG.debug("Writing: {}", msg); try { if (msg instanceof HttpObject) { writeHttp((HttpObject) msg); } else { writeRaw((ByteBuf) msg); } } finally { LOG.debug("Wrote: {}", msg); } } /** * Writes HttpObjects to the connection asynchronously. * * @param httpObject */ protected void writeHttp(HttpObject httpObject) { if (ProxyUtils.isLastChunk(httpObject)) { channel.write(httpObject); LOG.debug("Writing an empty buffer to signal the end of our chunked transfer"); writeToChannel(Unpooled.EMPTY_BUFFER); } else { writeToChannel(httpObject); } } /** * Writes raw buffers to the connection. * * @param buf */ protected void writeRaw(ByteBuf buf) { writeToChannel(buf); } protected ChannelFuture writeToChannel(final Object msg) { return channel.writeAndFlush(msg); } /*************************************************************************** * Lifecycle **************************************************************************/ /** * This method is called as soon as the underlying {@link Channel} is * connected. Note that for proxies with complex {@link ConnectionFlow}s * that include SSL handshaking and other such things, just because the * {@link Channel} is connected doesn't mean that our connection is fully * established. */ protected void connected() { LOG.debug("Connected"); } /** * This method is called as soon as the underlying {@link Channel} becomes * disconnected. */ protected void disconnected() { become(DISCONNECTED); LOG.debug("Disconnected"); } /** * This method is called when the underlying {@link Channel} times out due * to an idle timeout. */ protected void timedOut() { disconnect(); } /** *

* Enables tunneling on this connection by dropping the HTTP related * encoders and decoders, as well as idle timers. *

* *

* Note - the work is done on the {@link ChannelHandlerContext}'s executor * because {@link ChannelPipeline#remove(String)} can deadlock if called * directly. *

*/ protected ConnectionFlowStep StartTunneling = new ConnectionFlowStep( this, NEGOTIATING_CONNECT) { @Override boolean shouldSuppressInitialRequest() { return true; } protected Future execute() { try { ChannelPipeline pipeline = ctx.pipeline(); if (pipeline.get("encoder") != null) { pipeline.remove("encoder"); } if (pipeline.get("responseWrittenMonitor") != null) { pipeline.remove("responseWrittenMonitor"); } if (pipeline.get("decoder") != null) { pipeline.remove("decoder"); } if (pipeline.get("requestReadMonitor") != null) { pipeline.remove("requestReadMonitor"); } tunneling = true; return channel.newSucceededFuture(); } catch (Throwable t) { return channel.newFailedFuture(t); } } }; /** * Encrypts traffic on this connection with SSL/TLS. * * @param sslEngine * the {@link SSLEngine} for doing the encryption * @param authenticateClients * determines whether to authenticate clients or not * @return a Future for when the SSL handshake has completed */ protected Future encrypt(SSLEngine sslEngine, boolean authenticateClients) { return encrypt(ctx.pipeline(), sslEngine, authenticateClients); } /** * Encrypts traffic on this connection with SSL/TLS. * * @param pipeline * the ChannelPipeline on which to enable encryption * @param sslEngine * the {@link SSLEngine} for doing the encryption * @param authenticateClients * determines whether to authenticate clients or not * @return a Future for when the SSL handshake has completed */ protected Future encrypt(ChannelPipeline pipeline, SSLEngine sslEngine, boolean authenticateClients) { LOG.debug("Enabling encryption with SSLEngine: {}", sslEngine); this.sslEngine = sslEngine; sslEngine.setUseClientMode(runsAsSslClient); sslEngine.setNeedClientAuth(authenticateClients); SslHandler handler = new SslHandler(sslEngine); pipeline.addFirst("ssl", handler); return handler.handshakeFuture(); } /** * Encrypts the channel using the provided {@link SSLEngine}. * * @param sslEngine * the {@link SSLEngine} for doing the encryption */ protected ConnectionFlowStep EncryptChannel( final SSLEngine sslEngine) { return new ConnectionFlowStep(this, HANDSHAKING) { @Override boolean shouldExecuteOnEventLoop() { return false; } @Override protected Future execute() { return encrypt(sslEngine, !runsAsSslClient); } }; }; /** * Enables decompression and aggregation of content, which is useful for * certain types of filtering activity. * * @param pipeline * @param numberOfBytesToBuffer */ protected void aggregateContentForFiltering(ChannelPipeline pipeline, int numberOfBytesToBuffer) { pipeline.addLast("inflater", new HttpContentDecompressor()); pipeline.addLast("aggregator", new HttpObjectAggregator( numberOfBytesToBuffer)); } /** * Callback that's invoked if this connection becomes saturated. */ protected void becameSaturated() { LOG.debug("Became saturated"); } /** * Callback that's invoked when this connection becomes writeable again. */ protected void becameWritable() { LOG.debug("Became writeable"); } /** * Override this to handle exceptions that occurred during asynchronous * processing on the {@link Channel}. * * @param cause */ protected void exceptionCaught(Throwable cause) { } /*************************************************************************** * State/Management **************************************************************************/ /** * Disconnects. This will wait for pending writes to be flushed before * disconnecting. * * @return Future for when we're done disconnecting. If we weren't * connected, this returns null. */ Future disconnect() { if (channel == null) { return null; } else { final Promise promise = channel.newPromise(); writeToChannel(Unpooled.EMPTY_BUFFER).addListener( new GenericFutureListener>() { @Override public void operationComplete( Future future) throws Exception { closeChannel(promise); } }); return promise; } } private void closeChannel(final Promise promise) { channel.close().addListener( new GenericFutureListener>() { public void operationComplete( Future future) throws Exception { if (future .isSuccess()) { promise.setSuccess(null); } else { promise.setFailure(future .cause()); } }; }); } /** * Indicates whether or not this connection is saturated (i.e. not * writeable). * * @return */ protected boolean isSaturated() { return !this.channel.isWritable(); } /** * Utility for checking current state. * * @param state * @return */ protected boolean is(ConnectionState state) { return currentState == state; } /** * If this connection is currently in the process of going through a * {@link ConnectionFlow}, this will return true. * * @return */ protected boolean isConnecting() { return currentState.isPartOfConnectionFlow(); } /** * Udpates the current state to the given value. * * @param state */ protected void become(ConnectionState state) { this.currentState = state; } protected ConnectionState getCurrentState() { return currentState; } public boolean isTunneling() { return tunneling; } public SSLEngine getSslEngine() { return sslEngine; } /** * Call this to stop reading. */ protected void stopReading() { LOG.debug("Stopped reading"); this.channel.config().setAutoRead(false); } /** * Call this to resume reading. */ protected void resumeReading() { LOG.debug("Resumed reading"); this.channel.config().setAutoRead(true); } ProxyConnectionLogger getLOG() { return LOG; } /*************************************************************************** * Adapting the Netty API **************************************************************************/ @Override protected final void channelRead0(ChannelHandlerContext ctx, Object msg) throws Exception { read(msg); } @Override public void channelRegistered(ChannelHandlerContext ctx) throws Exception { try { this.ctx = ctx; this.channel = ctx.channel(); this.proxyServer.registerChannel(ctx.channel()); } finally { super.channelRegistered(ctx); } } /** * Only once the Netty Channel is active to we recognize the ProxyConnection * as connected. */ @Override public final void channelActive(ChannelHandlerContext ctx) throws Exception { try { connected(); } finally { super.channelActive(ctx); } } /** * As soon as the Netty Channel is inactive, we recognize the * ProxyConnection as disconnected. */ @Override public void channelInactive(ChannelHandlerContext ctx) throws Exception { try { disconnected(); } finally { super.channelInactive(ctx); } } @Override public final void channelWritabilityChanged(ChannelHandlerContext ctx) throws Exception { LOG.debug("Writability changed. Is writable: {}", channel.isWritable()); try { if (this.channel.isWritable()) { becameWritable(); } else { becameSaturated(); } } finally { super.channelWritabilityChanged(ctx); } } @Override public final void exceptionCaught(ChannelHandlerContext ctx, Throwable cause) throws Exception { exceptionCaught(cause); } /** *

* We're looking for {@link IdleStateEvent}s to see if we need to * disconnect. *

* *

* Note - we don't care what kind of IdleState we got. Thanks to qbast for pointing this out. *

*/ @Override public final void userEventTriggered(ChannelHandlerContext ctx, Object evt) throws Exception { try { if (evt instanceof IdleStateEvent) { LOG.debug("Got idle"); timedOut(); } } finally { super.userEventTriggered(ctx, evt); } } /*************************************************************************** * Activity Tracking/Statistics **************************************************************************/ /** * Utility handler for monitoring bytes read on this connection. */ @Sharable protected abstract class BytesReadMonitor extends ChannelInboundHandlerAdapter { @Override public void channelRead(ChannelHandlerContext ctx, Object msg) throws Exception { try { if (msg instanceof ByteBuf) { bytesRead(((ByteBuf) msg).readableBytes()); } } catch (Throwable t) { LOG.warn("Unable to record bytesRead", t); } finally { super.channelRead(ctx, msg); } } protected abstract void bytesRead(int numberOfBytes); } /** * Utility handler for monitoring requests read on this connection. */ @Sharable protected abstract class RequestReadMonitor extends ChannelInboundHandlerAdapter { @Override public void channelRead(ChannelHandlerContext ctx, Object msg) throws Exception { try { if (msg instanceof HttpRequest) { requestRead((HttpRequest) msg); } } catch (Throwable t) { LOG.warn("Unable to record bytesRead", t); } finally { super.channelRead(ctx, msg); } } protected abstract void requestRead(HttpRequest httpRequest); } /** * Utility handler for monitoring responses read on this connection. */ @Sharable protected abstract class ResponseReadMonitor extends ChannelInboundHandlerAdapter { @Override public void channelRead(ChannelHandlerContext ctx, Object msg) throws Exception { try { if (msg instanceof HttpResponse) { responseRead((HttpResponse) msg); } } catch (Throwable t) { LOG.warn("Unable to record bytesRead", t); } finally { super.channelRead(ctx, msg); } } protected abstract void responseRead(HttpResponse httpResponse); } /** * Utility handler for monitoring bytes written on this connection. */ @Sharable protected abstract class BytesWrittenMonitor extends ChannelOutboundHandlerAdapter { @Override public void write(ChannelHandlerContext ctx, Object msg, ChannelPromise promise) throws Exception { try { if (msg instanceof ByteBuf) { bytesWritten(((ByteBuf) msg).readableBytes()); } } catch (Throwable t) { LOG.warn("Unable to record bytesRead", t); } finally { super.write(ctx, msg, promise); } } protected abstract void bytesWritten(int numberOfBytes); } /** * Utility handler for monitoring requests written on this connection. */ @Sharable protected abstract class RequestWrittenMonitor extends ChannelOutboundHandlerAdapter { @Override public void write(ChannelHandlerContext ctx, Object msg, ChannelPromise promise) throws Exception { try { if (msg instanceof HttpRequest) { requestWritten(((HttpRequest) msg)); } } catch (Throwable t) { LOG.warn("Unable to record bytesRead", t); } finally { super.write(ctx, msg, promise); } } protected abstract void requestWritten(HttpRequest httpRequest); } /** * Utility handler for monitoring responses written on this connection. */ @Sharable protected abstract class ResponseWrittenMonitor extends ChannelOutboundHandlerAdapter { @Override public void write(ChannelHandlerContext ctx, Object msg, ChannelPromise promise) throws Exception { try { if (msg instanceof HttpResponse) { responseWritten(((HttpResponse) msg)); } } catch (Throwable t) { LOG.warn("Unable to record bytesRead", t); } finally { super.write(ctx, msg, promise); } } protected abstract void responseWritten(HttpResponse httpResponse); } }