start.go 7.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295
  1. package main
  2. import (
  3. "log"
  4. "net/http"
  5. "os"
  6. "runtime"
  7. "strconv"
  8. "strings"
  9. "time"
  10. "imuslab.com/zoraxy/mod/access"
  11. "imuslab.com/zoraxy/mod/acme"
  12. "imuslab.com/zoraxy/mod/auth"
  13. "imuslab.com/zoraxy/mod/database"
  14. "imuslab.com/zoraxy/mod/dockerux"
  15. "imuslab.com/zoraxy/mod/dynamicproxy/loadbalance"
  16. "imuslab.com/zoraxy/mod/dynamicproxy/redirection"
  17. "imuslab.com/zoraxy/mod/forwardproxy"
  18. "imuslab.com/zoraxy/mod/ganserv"
  19. "imuslab.com/zoraxy/mod/geodb"
  20. "imuslab.com/zoraxy/mod/info/logger"
  21. "imuslab.com/zoraxy/mod/mdns"
  22. "imuslab.com/zoraxy/mod/netstat"
  23. "imuslab.com/zoraxy/mod/pathrule"
  24. "imuslab.com/zoraxy/mod/sshprox"
  25. "imuslab.com/zoraxy/mod/statistic"
  26. "imuslab.com/zoraxy/mod/statistic/analytic"
  27. "imuslab.com/zoraxy/mod/streamproxy"
  28. "imuslab.com/zoraxy/mod/tlscert"
  29. "imuslab.com/zoraxy/mod/webserv"
  30. )
  31. /*
  32. Startup Sequence
  33. This function starts the startup sequence of all
  34. required modules
  35. */
  36. var (
  37. /*
  38. MDNS related
  39. */
  40. previousmdnsScanResults = []*mdns.NetworkHost{}
  41. mdnsTickerStop chan bool
  42. )
  43. func startupSequence() {
  44. //Create database
  45. db, err := database.NewDatabase("sys.db", false)
  46. if err != nil {
  47. log.Fatal(err)
  48. }
  49. sysdb = db
  50. //Create tables for the database
  51. sysdb.NewTable("settings")
  52. //Create tmp folder and conf folder
  53. os.MkdirAll("./tmp", 0775)
  54. os.MkdirAll("./conf/proxy/", 0775)
  55. //Create an auth agent
  56. sessionKey, err := auth.GetSessionKey(sysdb)
  57. if err != nil {
  58. log.Fatal(err)
  59. }
  60. authAgent = auth.NewAuthenticationAgent(name, []byte(sessionKey), sysdb, true, func(w http.ResponseWriter, r *http.Request) {
  61. //Not logged in. Redirecting to login page
  62. http.Redirect(w, r, ppf("/login.html"), http.StatusTemporaryRedirect)
  63. })
  64. //Create a TLS certificate manager
  65. tlsCertManager, err = tlscert.NewManager("./conf/certs", development)
  66. if err != nil {
  67. panic(err)
  68. }
  69. //Create a system wide logger
  70. l, err := logger.NewLogger("zr", "./log", *logOutputToFile)
  71. if err == nil {
  72. SystemWideLogger = l
  73. } else {
  74. panic(err)
  75. }
  76. //Create a redirection rule table
  77. db.NewTable("redirect")
  78. redirectAllowRegexp := false
  79. db.Read("redirect", "regex", &redirectAllowRegexp)
  80. redirectTable, err = redirection.NewRuleTable("./conf/redirect", redirectAllowRegexp, SystemWideLogger)
  81. if err != nil {
  82. panic(err)
  83. }
  84. //Create a geodb store
  85. geodbStore, err = geodb.NewGeoDb(sysdb, &geodb.StoreOptions{
  86. AllowSlowIpv4LookUp: !*enableHighSpeedGeoIPLookup,
  87. AllowSloeIpv6Lookup: !*enableHighSpeedGeoIPLookup,
  88. })
  89. if err != nil {
  90. panic(err)
  91. }
  92. //Create a load balance route manager
  93. loadbalancer = loadbalance.NewRouteManager(&loadbalance.Options{
  94. Geodb: geodbStore,
  95. }, SystemWideLogger)
  96. //Create the access controller
  97. accessController, err = access.NewAccessController(&access.Options{
  98. Database: sysdb,
  99. GeoDB: geodbStore,
  100. ConfigFolder: "./conf/access",
  101. })
  102. if err != nil {
  103. panic(err)
  104. }
  105. //Create a statistic collector
  106. statisticCollector, err = statistic.NewStatisticCollector(statistic.CollectorOption{
  107. Database: sysdb,
  108. })
  109. if err != nil {
  110. panic(err)
  111. }
  112. //Start the static web server
  113. staticWebServer = webserv.NewWebServer(&webserv.WebServerOptions{
  114. Sysdb: sysdb,
  115. Port: "5487", //Default Port
  116. WebRoot: *staticWebServerRoot,
  117. EnableDirectoryListing: true,
  118. EnableWebDirManager: *allowWebFileManager,
  119. })
  120. //Restore the web server to previous shutdown state
  121. staticWebServer.RestorePreviousState()
  122. //Create a netstat buffer
  123. netstatBuffers, err = netstat.NewNetStatBuffer(300)
  124. if err != nil {
  125. SystemWideLogger.PrintAndLog("Network", "Failed to load network statistic info", err)
  126. panic(err)
  127. }
  128. /*
  129. Path Rules
  130. This section of starutp script start the path rules where
  131. user can define their own routing logics
  132. */
  133. pathRuleHandler = pathrule.NewPathRuleHandler(&pathrule.Options{
  134. Enabled: false,
  135. ConfigFolder: "./conf/rules/pathrules",
  136. })
  137. /*
  138. MDNS Discovery Service
  139. This discover nearby ArozOS Nodes or other services
  140. that provide mDNS discovery with domain (e.g. Synology NAS)
  141. */
  142. if *allowMdnsScanning {
  143. portInt, err := strconv.Atoi(strings.Split(*webUIPort, ":")[1])
  144. if err != nil {
  145. portInt = 8000
  146. }
  147. hostName := *mdnsName
  148. if hostName == "" {
  149. hostName = "zoraxy_" + nodeUUID
  150. } else {
  151. //Trim off the suffix
  152. hostName = strings.TrimSuffix(hostName, ".local")
  153. }
  154. mdnsScanner, err = mdns.NewMDNS(mdns.NetworkHost{
  155. HostName: hostName,
  156. Port: portInt,
  157. Domain: "zoraxy.arozos.com",
  158. Model: "Network Gateway",
  159. UUID: nodeUUID,
  160. Vendor: "imuslab.com",
  161. BuildVersion: version,
  162. }, "")
  163. if err != nil {
  164. SystemWideLogger.Println("Unable to startup mDNS service. Disabling mDNS services")
  165. } else {
  166. //Start initial scanning
  167. go func() {
  168. hosts := mdnsScanner.Scan(30, "")
  169. previousmdnsScanResults = hosts
  170. SystemWideLogger.Println("mDNS Startup scan completed")
  171. }()
  172. //Create a ticker to update mDNS results every 5 minutes
  173. ticker := time.NewTicker(15 * time.Minute)
  174. stopChan := make(chan bool)
  175. go func() {
  176. for {
  177. select {
  178. case <-stopChan:
  179. ticker.Stop()
  180. case <-ticker.C:
  181. hosts := mdnsScanner.Scan(30, "")
  182. previousmdnsScanResults = hosts
  183. SystemWideLogger.Println("mDNS scan result updated")
  184. }
  185. }
  186. }()
  187. mdnsTickerStop = stopChan
  188. }
  189. }
  190. /*
  191. Global Area Network
  192. Require zerotier token to work
  193. */
  194. usingZtAuthToken := *ztAuthToken
  195. if usingZtAuthToken == "" {
  196. usingZtAuthToken, err = ganserv.TryLoadorAskUserForAuthkey()
  197. if err != nil {
  198. SystemWideLogger.Println("Failed to load ZeroTier controller API authtoken")
  199. }
  200. }
  201. ganManager = ganserv.NewNetworkManager(&ganserv.NetworkManagerOptions{
  202. AuthToken: usingZtAuthToken,
  203. ApiPort: *ztAPIPort,
  204. Database: sysdb,
  205. })
  206. //Create WebSSH Manager
  207. webSshManager = sshprox.NewSSHProxyManager()
  208. //Create TCP Proxy Manager
  209. streamProxyManager = streamproxy.NewStreamProxy(&streamproxy.Options{
  210. Database: sysdb,
  211. AccessControlHandler: accessController.DefaultAccessRule.AllowConnectionAccess,
  212. })
  213. //Create WoL MAC storage table
  214. sysdb.NewTable("wolmac")
  215. //Create an email sender if SMTP config exists
  216. sysdb.NewTable("smtp")
  217. EmailSender = loadSMTPConfig()
  218. //Create an analytic loader
  219. AnalyticLoader = analytic.NewDataLoader(sysdb, statisticCollector)
  220. //Create basic forward proxy
  221. sysdb.NewTable("fwdproxy")
  222. fwdProxyEnabled := false
  223. fwdProxyPort := 5587
  224. sysdb.Read("fwdproxy", "port", &fwdProxyPort)
  225. sysdb.Read("fwdproxy", "enabled", &fwdProxyEnabled)
  226. forwardProxy = forwardproxy.NewForwardProxy(sysdb, fwdProxyPort, SystemWideLogger)
  227. if fwdProxyEnabled {
  228. SystemWideLogger.PrintAndLog("Forward Proxy", "HTTP Forward Proxy Listening on :"+strconv.Itoa(forwardProxy.Port), nil)
  229. forwardProxy.Start()
  230. }
  231. /*
  232. ACME API
  233. Obtaining certificates from ACME Server
  234. */
  235. //Create a table just to store acme related preferences
  236. sysdb.NewTable("acmepref")
  237. acmeHandler = initACME()
  238. acmeAutoRenewer, err = acme.NewAutoRenewer("./conf/acme_conf.json", "./conf/certs/", int64(*acmeAutoRenewInterval), acmeHandler)
  239. if err != nil {
  240. log.Fatal(err)
  241. }
  242. /* Docker UX Optimizer */
  243. if runtime.GOOS == "windows" && *runningInDocker {
  244. SystemWideLogger.PrintAndLog("WARNING", "Invalid start flag combination: docker=true && runtime.GOOS == windows. Running in docker UX development mode.", nil)
  245. }
  246. DockerUXOptimizer = dockerux.NewDockerOptimizer(*runningInDocker, SystemWideLogger)
  247. }
  248. // This sequence start after everything is initialized
  249. func finalSequence() {
  250. //Start ACME renew agent
  251. acmeRegisterSpecialRoutingRule()
  252. //Inject routing rules
  253. registerBuildInRoutingRules()
  254. }