dae/component/sniffing/http.go
mzz df76e0d6b9
fix: cannot route for sniffed domain with port (#542)
Co-authored-by: Sumire (菫) <151038614+sumire88@users.noreply.github.com>
2024-06-16 14:47:02 +08:00

68 lines
1.6 KiB
Go

/*
* SPDX-License-Identifier: AGPL-3.0-only
* Copyright (c) 2022-2024, daeuniverse Organization <dae@v2raya.org>
*/
package sniffing
import (
"bufio"
"bytes"
"strings"
"unicode"
"github.com/daeuniverse/dae/common"
)
func (s *Sniffer) SniffHttp() (d string, err error) {
// First byte should be printable.
if s.buf.Len() == 0 || !unicode.IsPrint(rune(s.buf.Bytes()[0])) {
return "", ErrNotApplicable
}
// Search method.
search := s.buf.Bytes()
if len(search) > 12 {
search = search[:12]
}
method, _, found := bytes.Cut(search, []byte(" "))
if !found {
return "", ErrNotApplicable
}
if !common.IsValidHttpMethod(string(method)) {
return "", ErrNotApplicable
}
// Now we assume it is an HTTP packet. We should not return NotApplicableError after here.
// Search Host.
scanner := bufio.NewScanner(bytes.NewReader(s.buf.Bytes()))
// \r\n
scanner.Split(func(data []byte, atEOF bool) (advance int, token []byte, err error) {
if atEOF && len(data) == 0 {
return 0, nil, nil
}
if i := bytes.Index(data, []byte("\r\n")); i >= 0 {
// We have a full newline-terminated line.
return i + 2, data[0:i], nil
}
// If we're at EOF, we have a final, non-terminated line. Return it.
if atEOF {
return len(data), data, nil
}
// Request more data.
return 0, nil, nil
})
for scanner.Scan() && len(scanner.Bytes()) > 0 {
key, value, found := bytes.Cut(scanner.Bytes(), []byte{':'})
if !found {
// Bad key value.
continue
}
if strings.EqualFold(string(key), "host") {
return string(value), nil
}
}
return "", ErrNotFound
}