1
0

reverseproxy.go 6.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243
  1. package main
  2. import (
  3. "encoding/json"
  4. "log"
  5. "net/http"
  6. "path/filepath"
  7. "strconv"
  8. "strings"
  9. "imuslab.com/arozos/ReverseProxy/mod/dynamicproxy"
  10. )
  11. var (
  12. dynamicProxyRouter *dynamicproxy.Router
  13. )
  14. //Add user customizable reverse proxy
  15. func ReverseProxtInit() {
  16. inboundPort := 80
  17. if sysdb.KeyExists("settings", "inbound") {
  18. sysdb.Read("settings", "inbound", &inboundPort)
  19. log.Println("Serving inbound port ", inboundPort)
  20. } else {
  21. log.Println("Inbound port not set. Using default (80)")
  22. }
  23. useTls := false
  24. if sysdb.KeyExists("settings", "usetls") {
  25. sysdb.Read("settings", "usetls", &useTls)
  26. if useTls {
  27. log.Println("TLS mode enabled. Serving proxxy request with TLS")
  28. } else {
  29. log.Println("TLS mode disabled. Serving proxy request with plain http")
  30. }
  31. } else {
  32. log.Println("Using no TLS for serving proxy domains")
  33. }
  34. dprouter, err := dynamicproxy.NewDynamicProxy(inboundPort, useTls, tlsCertManager)
  35. if err != nil {
  36. log.Println(err.Error())
  37. return
  38. }
  39. dynamicProxyRouter = dprouter
  40. //Load all conf from files
  41. confs, _ := filepath.Glob("./conf/*.config")
  42. for _, conf := range confs {
  43. record, err := LoadReverseProxyConfig(conf)
  44. if err != nil {
  45. log.Println("Failed to load "+filepath.Base(conf), err.Error())
  46. return
  47. }
  48. if record.ProxyType == "root" {
  49. dynamicProxyRouter.SetRootProxy(record.ProxyTarget, record.UseTLS)
  50. } else if record.ProxyType == "subd" {
  51. dynamicProxyRouter.AddSubdomainRoutingService(record.Rootname, record.ProxyTarget, record.UseTLS)
  52. } else if record.ProxyType == "vdir" {
  53. dynamicProxyRouter.AddVirtualDirectoryProxyService(record.Rootname, record.ProxyTarget, record.UseTLS)
  54. } else {
  55. log.Println("Unsupported endpoint type: " + record.ProxyType + ". Skipping " + filepath.Base(conf))
  56. }
  57. }
  58. /*
  59. dynamicProxyRouter.SetRootProxy("192.168.0.107:8080", false)
  60. dynamicProxyRouter.AddSubdomainRoutingService("aroz.localhost", "192.168.0.107:8080/private/AOB/", false)
  61. dynamicProxyRouter.AddSubdomainRoutingService("loopback.localhost", "localhost:8080", false)
  62. dynamicProxyRouter.AddSubdomainRoutingService("git.localhost", "mc.alanyeung.co:3000", false)
  63. dynamicProxyRouter.AddVirtualDirectoryProxyService("/git/server/", "mc.alanyeung.co:3000", false)
  64. */
  65. //Start Service
  66. dynamicProxyRouter.StartProxyService()
  67. log.Println("Dynamic Reverse Proxy service started")
  68. }
  69. func ReverseProxyHandleOnOff(w http.ResponseWriter, r *http.Request) {
  70. enable, _ := mv(r, "enable", true) //Support root, vdir and subd
  71. if enable == "true" {
  72. err := dynamicProxyRouter.StartProxyService()
  73. if err != nil {
  74. sendErrorResponse(w, err.Error())
  75. return
  76. }
  77. } else {
  78. err := dynamicProxyRouter.StopProxyService()
  79. if err != nil {
  80. sendErrorResponse(w, err.Error())
  81. return
  82. }
  83. }
  84. sendOK(w)
  85. }
  86. func ReverseProxyHandleAddEndpoint(w http.ResponseWriter, r *http.Request) {
  87. eptype, err := mv(r, "type", true) //Support root, vdir and subd
  88. if err != nil {
  89. sendErrorResponse(w, "type not defined")
  90. return
  91. }
  92. endpoint, err := mv(r, "ep", true)
  93. if err != nil {
  94. sendErrorResponse(w, "endpoint not defined")
  95. return
  96. }
  97. tls, _ := mv(r, "tls", true)
  98. if tls == "" {
  99. tls = "false"
  100. }
  101. useTLS := (tls == "true")
  102. rootname := ""
  103. if eptype == "vdir" {
  104. vdir, err := mv(r, "rootname", true)
  105. if err != nil {
  106. sendErrorResponse(w, "vdir not defined")
  107. return
  108. }
  109. if !strings.HasPrefix(vdir, "/") {
  110. vdir = "/" + vdir
  111. }
  112. rootname = vdir
  113. dynamicProxyRouter.AddVirtualDirectoryProxyService(vdir, endpoint, useTLS)
  114. } else if eptype == "subd" {
  115. subdomain, err := mv(r, "rootname", true)
  116. if err != nil {
  117. sendErrorResponse(w, "subdomain not defined")
  118. return
  119. }
  120. rootname = subdomain
  121. dynamicProxyRouter.AddSubdomainRoutingService(subdomain, endpoint, useTLS)
  122. } else if eptype == "root" {
  123. rootname = "root"
  124. dynamicProxyRouter.SetRootProxy(endpoint, useTLS)
  125. } else {
  126. //Invalid eptype
  127. sendErrorResponse(w, "Invalid endpoint type")
  128. return
  129. }
  130. //Save it
  131. SaveReverseProxyConfig(eptype, rootname, endpoint, useTLS)
  132. sendOK(w)
  133. }
  134. func DeleteProxyEndpoint(w http.ResponseWriter, r *http.Request) {
  135. ep, err := mv(r, "ep", true)
  136. if err != nil {
  137. sendErrorResponse(w, "Invalid ep given")
  138. }
  139. ptype, err := mv(r, "ptype", true)
  140. if err != nil {
  141. sendErrorResponse(w, "Invalid ptype given")
  142. }
  143. err = dynamicProxyRouter.RemoveProxy(ptype, ep)
  144. if err != nil {
  145. sendErrorResponse(w, err.Error())
  146. }
  147. RemoveReverseProxyConfig(ep)
  148. sendOK(w)
  149. }
  150. func ReverseProxyStatus(w http.ResponseWriter, r *http.Request) {
  151. js, _ := json.Marshal(dynamicProxyRouter)
  152. sendJSONResponse(w, string(js))
  153. }
  154. func ReverseProxyList(w http.ResponseWriter, r *http.Request) {
  155. eptype, err := mv(r, "type", true) //Support root, vdir and subd
  156. if err != nil {
  157. sendErrorResponse(w, "type not defined")
  158. return
  159. }
  160. if eptype == "vdir" {
  161. results := []*dynamicproxy.ProxyEndpoint{}
  162. dynamicProxyRouter.ProxyEndpoints.Range(func(key, value interface{}) bool {
  163. results = append(results, value.(*dynamicproxy.ProxyEndpoint))
  164. return true
  165. })
  166. js, _ := json.Marshal(results)
  167. sendJSONResponse(w, string(js))
  168. } else if eptype == "subd" {
  169. results := []*dynamicproxy.SubdomainEndpoint{}
  170. dynamicProxyRouter.SubdomainEndpoint.Range(func(key, value interface{}) bool {
  171. results = append(results, value.(*dynamicproxy.SubdomainEndpoint))
  172. return true
  173. })
  174. js, _ := json.Marshal(results)
  175. sendJSONResponse(w, string(js))
  176. } else if eptype == "root" {
  177. js, _ := json.Marshal(dynamicProxyRouter.Root)
  178. sendJSONResponse(w, string(js))
  179. } else {
  180. sendErrorResponse(w, "Invalid type given")
  181. }
  182. }
  183. //Handle incoming port set. Change the current proxy incoming port
  184. func HandleIncomingPortSet(w http.ResponseWriter, r *http.Request) {
  185. newIncomingPort, err := mv(r, "incoming", true)
  186. if err != nil {
  187. sendErrorResponse(w, "invalid incoming port given")
  188. return
  189. }
  190. newIncomingPortInt, err := strconv.Atoi(newIncomingPort)
  191. if err != nil {
  192. sendErrorResponse(w, "invalid incoming port given")
  193. return
  194. }
  195. //Stop and change the setting of the reverse proxy service
  196. if dynamicProxyRouter.Running {
  197. dynamicProxyRouter.StopProxyService()
  198. dynamicProxyRouter.ListenPort = newIncomingPortInt
  199. dynamicProxyRouter.StartProxyService()
  200. } else {
  201. //Only change setting but not starting the proxy service
  202. dynamicProxyRouter.ListenPort = newIncomingPortInt
  203. }
  204. sysdb.Write("settings", "inbound", newIncomingPortInt)
  205. sendOK((w))
  206. }