reverseproxy.go 7.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281
  1. package main
  2. import (
  3. "encoding/json"
  4. "log"
  5. "net/http"
  6. "path/filepath"
  7. "strconv"
  8. "strings"
  9. "imuslab.com/arozos/ReverseProxy/mod/dynamicproxy"
  10. "imuslab.com/arozos/ReverseProxy/mod/utils"
  11. )
  12. var (
  13. dynamicProxyRouter *dynamicproxy.Router
  14. )
  15. // Add user customizable reverse proxy
  16. func ReverseProxtInit() {
  17. inboundPort := 80
  18. if sysdb.KeyExists("settings", "inbound") {
  19. sysdb.Read("settings", "inbound", &inboundPort)
  20. log.Println("Serving inbound port ", inboundPort)
  21. } else {
  22. log.Println("Inbound port not set. Using default (80)")
  23. }
  24. useTls := false
  25. sysdb.Read("settings", "usetls", &useTls)
  26. if useTls {
  27. log.Println("TLS mode enabled. Serving proxxy request with TLS")
  28. } else {
  29. log.Println("TLS mode disabled. Serving proxy request with plain http")
  30. }
  31. forceHttpsRedirect := false
  32. sysdb.Read("settings", "redirect", &forceHttpsRedirect)
  33. if forceHttpsRedirect {
  34. log.Println("Force HTTPS mode enabled")
  35. } else {
  36. log.Println("Force HTTPS mode disabled")
  37. }
  38. dprouter, err := dynamicproxy.NewDynamicProxy(dynamicproxy.RouterOption{
  39. Port: inboundPort,
  40. UseTls: useTls,
  41. ForceHttpsRedirect: forceHttpsRedirect,
  42. TlsManager: tlsCertManager,
  43. RedirectRuleTable: redirectTable,
  44. })
  45. if err != nil {
  46. log.Println(err.Error())
  47. return
  48. }
  49. dynamicProxyRouter = dprouter
  50. //Load all conf from files
  51. confs, _ := filepath.Glob("./conf/*.config")
  52. for _, conf := range confs {
  53. record, err := LoadReverseProxyConfig(conf)
  54. if err != nil {
  55. log.Println("Failed to load "+filepath.Base(conf), err.Error())
  56. return
  57. }
  58. if record.ProxyType == "root" {
  59. dynamicProxyRouter.SetRootProxy(record.ProxyTarget, record.UseTLS)
  60. } else if record.ProxyType == "subd" {
  61. dynamicProxyRouter.AddSubdomainRoutingService(record.Rootname, record.ProxyTarget, record.UseTLS)
  62. } else if record.ProxyType == "vdir" {
  63. dynamicProxyRouter.AddVirtualDirectoryProxyService(record.Rootname, record.ProxyTarget, record.UseTLS)
  64. } else {
  65. log.Println("Unsupported endpoint type: " + record.ProxyType + ". Skipping " + filepath.Base(conf))
  66. }
  67. }
  68. /*
  69. dynamicProxyRouter.SetRootProxy("192.168.0.107:8080", false)
  70. dynamicProxyRouter.AddSubdomainRoutingService("aroz.localhost", "192.168.0.107:8080/private/AOB/", false)
  71. dynamicProxyRouter.AddSubdomainRoutingService("loopback.localhost", "localhost:8080", false)
  72. dynamicProxyRouter.AddSubdomainRoutingService("git.localhost", "mc.alanyeung.co:3000", false)
  73. dynamicProxyRouter.AddVirtualDirectoryProxyService("/git/server/", "mc.alanyeung.co:3000", false)
  74. */
  75. //Start Service
  76. dynamicProxyRouter.StartProxyService()
  77. log.Println("Dynamic Reverse Proxy service started")
  78. }
  79. func ReverseProxyHandleOnOff(w http.ResponseWriter, r *http.Request) {
  80. enable, _ := utils.PostPara(r, "enable") //Support root, vdir and subd
  81. if enable == "true" {
  82. err := dynamicProxyRouter.StartProxyService()
  83. if err != nil {
  84. utils.SendErrorResponse(w, err.Error())
  85. return
  86. }
  87. } else {
  88. err := dynamicProxyRouter.StopProxyService()
  89. if err != nil {
  90. utils.SendErrorResponse(w, err.Error())
  91. return
  92. }
  93. }
  94. utils.SendOK(w)
  95. }
  96. func ReverseProxyHandleAddEndpoint(w http.ResponseWriter, r *http.Request) {
  97. eptype, err := utils.PostPara(r, "type") //Support root, vdir and subd
  98. if err != nil {
  99. utils.SendErrorResponse(w, "type not defined")
  100. return
  101. }
  102. endpoint, err := utils.PostPara(r, "ep")
  103. if err != nil {
  104. utils.SendErrorResponse(w, "endpoint not defined")
  105. return
  106. }
  107. tls, _ := utils.PostPara(r, "tls")
  108. if tls == "" {
  109. tls = "false"
  110. }
  111. useTLS := (tls == "true")
  112. rootname := ""
  113. if eptype == "vdir" {
  114. vdir, err := utils.PostPara(r, "rootname")
  115. if err != nil {
  116. utils.SendErrorResponse(w, "vdir not defined")
  117. return
  118. }
  119. if !strings.HasPrefix(vdir, "/") {
  120. vdir = "/" + vdir
  121. }
  122. rootname = vdir
  123. dynamicProxyRouter.AddVirtualDirectoryProxyService(vdir, endpoint, useTLS)
  124. } else if eptype == "subd" {
  125. subdomain, err := utils.PostPara(r, "rootname")
  126. if err != nil {
  127. utils.SendErrorResponse(w, "subdomain not defined")
  128. return
  129. }
  130. rootname = subdomain
  131. dynamicProxyRouter.AddSubdomainRoutingService(subdomain, endpoint, useTLS)
  132. } else if eptype == "root" {
  133. rootname = "root"
  134. dynamicProxyRouter.SetRootProxy(endpoint, useTLS)
  135. } else {
  136. //Invalid eptype
  137. utils.SendErrorResponse(w, "Invalid endpoint type")
  138. return
  139. }
  140. //Save it
  141. SaveReverseProxyConfig(eptype, rootname, endpoint, useTLS)
  142. utils.SendOK(w)
  143. }
  144. func DeleteProxyEndpoint(w http.ResponseWriter, r *http.Request) {
  145. ep, err := utils.GetPara(r, "ep")
  146. if err != nil {
  147. utils.SendErrorResponse(w, "Invalid ep given")
  148. }
  149. ptype, err := utils.PostPara(r, "ptype")
  150. if err != nil {
  151. utils.SendErrorResponse(w, "Invalid ptype given")
  152. }
  153. err = dynamicProxyRouter.RemoveProxy(ptype, ep)
  154. if err != nil {
  155. utils.SendErrorResponse(w, err.Error())
  156. }
  157. RemoveReverseProxyConfig(ep)
  158. utils.SendOK(w)
  159. }
  160. func ReverseProxyStatus(w http.ResponseWriter, r *http.Request) {
  161. js, _ := json.Marshal(dynamicProxyRouter)
  162. utils.SendJSONResponse(w, string(js))
  163. }
  164. func ReverseProxyList(w http.ResponseWriter, r *http.Request) {
  165. eptype, err := utils.PostPara(r, "type") //Support root, vdir and subd
  166. if err != nil {
  167. utils.SendErrorResponse(w, "type not defined")
  168. return
  169. }
  170. if eptype == "vdir" {
  171. results := []*dynamicproxy.ProxyEndpoint{}
  172. dynamicProxyRouter.ProxyEndpoints.Range(func(key, value interface{}) bool {
  173. results = append(results, value.(*dynamicproxy.ProxyEndpoint))
  174. return true
  175. })
  176. js, _ := json.Marshal(results)
  177. utils.SendJSONResponse(w, string(js))
  178. } else if eptype == "subd" {
  179. results := []*dynamicproxy.SubdomainEndpoint{}
  180. dynamicProxyRouter.SubdomainEndpoint.Range(func(key, value interface{}) bool {
  181. results = append(results, value.(*dynamicproxy.SubdomainEndpoint))
  182. return true
  183. })
  184. js, _ := json.Marshal(results)
  185. utils.SendJSONResponse(w, string(js))
  186. } else if eptype == "root" {
  187. js, _ := json.Marshal(dynamicProxyRouter.Root)
  188. utils.SendJSONResponse(w, string(js))
  189. } else {
  190. utils.SendErrorResponse(w, "Invalid type given")
  191. }
  192. }
  193. // Handle https redirect
  194. func HandleUpdateHttpsRedirect(w http.ResponseWriter, r *http.Request) {
  195. useRedirect, err := utils.GetPara(r, "set")
  196. if err != nil {
  197. currentRedirectToHttps := false
  198. //Load the current status
  199. err = sysdb.Read("settings", "redirect", &currentRedirectToHttps)
  200. if err != nil {
  201. utils.SendErrorResponse(w, err.Error())
  202. return
  203. }
  204. js, _ := json.Marshal(currentRedirectToHttps)
  205. utils.SendJSONResponse(w, string(js))
  206. } else {
  207. if useRedirect == "true" {
  208. sysdb.Write("settings", "redirect", true)
  209. log.Println("Updating force HTTPS redirection to true")
  210. dynamicProxyRouter.UpdateHttpToHttpsRedirectSetting(true)
  211. } else if useRedirect == "false" {
  212. sysdb.Write("settings", "redirect", false)
  213. log.Println("Updating force HTTPS redirection to false")
  214. dynamicProxyRouter.UpdateHttpToHttpsRedirectSetting(false)
  215. }
  216. utils.SendOK(w)
  217. }
  218. }
  219. // Handle incoming port set. Change the current proxy incoming port
  220. func HandleIncomingPortSet(w http.ResponseWriter, r *http.Request) {
  221. newIncomingPort, err := utils.PostPara(r, "incoming")
  222. if err != nil {
  223. utils.SendErrorResponse(w, "invalid incoming port given")
  224. return
  225. }
  226. newIncomingPortInt, err := strconv.Atoi(newIncomingPort)
  227. if err != nil {
  228. utils.SendErrorResponse(w, "invalid incoming port given")
  229. return
  230. }
  231. //Stop and change the setting of the reverse proxy service
  232. if dynamicProxyRouter.Running {
  233. dynamicProxyRouter.StopProxyService()
  234. dynamicProxyRouter.ListenPort = newIncomingPortInt
  235. dynamicProxyRouter.StartProxyService()
  236. } else {
  237. //Only change setting but not starting the proxy service
  238. dynamicProxyRouter.ListenPort = newIncomingPortInt
  239. }
  240. sysdb.Write("settings", "inbound", newIncomingPortInt)
  241. utils.SendOK(w)
  242. }