1
0

start.go 9.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333
  1. package main
  2. import (
  3. "log"
  4. "net/http"
  5. "os"
  6. "runtime"
  7. "strconv"
  8. "strings"
  9. "time"
  10. "imuslab.com/zoraxy/mod/access"
  11. "imuslab.com/zoraxy/mod/acme"
  12. "imuslab.com/zoraxy/mod/auth"
  13. "imuslab.com/zoraxy/mod/database"
  14. "imuslab.com/zoraxy/mod/dockerux"
  15. "imuslab.com/zoraxy/mod/dynamicproxy/loadbalance"
  16. "imuslab.com/zoraxy/mod/dynamicproxy/redirection"
  17. "imuslab.com/zoraxy/mod/forwardproxy"
  18. "imuslab.com/zoraxy/mod/ganserv"
  19. "imuslab.com/zoraxy/mod/geodb"
  20. "imuslab.com/zoraxy/mod/info/logger"
  21. "imuslab.com/zoraxy/mod/info/logviewer"
  22. "imuslab.com/zoraxy/mod/mdns"
  23. "imuslab.com/zoraxy/mod/netstat"
  24. "imuslab.com/zoraxy/mod/pathrule"
  25. "imuslab.com/zoraxy/mod/sshprox"
  26. "imuslab.com/zoraxy/mod/statistic"
  27. "imuslab.com/zoraxy/mod/statistic/analytic"
  28. "imuslab.com/zoraxy/mod/streamproxy"
  29. "imuslab.com/zoraxy/mod/tlscert"
  30. "imuslab.com/zoraxy/mod/webserv"
  31. )
  32. /*
  33. Startup Sequence
  34. This function starts the startup sequence of all
  35. required modules. Their startup sequences are inter-dependent
  36. and must be started in a specific order.
  37. Don't touch this function unless you know what you are doing
  38. */
  39. var (
  40. /*
  41. MDNS related
  42. */
  43. previousmdnsScanResults = []*mdns.NetworkHost{}
  44. mdnsTickerStop chan bool
  45. )
  46. func startupSequence() {
  47. //Start a system wide logger and log viewer
  48. l, err := logger.NewLogger(LOG_PREFIX, LOG_FOLDER)
  49. if err == nil {
  50. SystemWideLogger = l
  51. } else {
  52. panic(err)
  53. }
  54. LogViewer = logviewer.NewLogViewer(&logviewer.ViewerOption{
  55. RootFolder: LOG_FOLDER,
  56. Extension: LOG_EXTENSION,
  57. })
  58. //Create database
  59. db, err := database.NewDatabase(DATABASE_PATH, false)
  60. if err != nil {
  61. log.Fatal(err)
  62. }
  63. sysdb = db
  64. //Create tables for the database
  65. sysdb.NewTable("settings")
  66. //Create tmp folder and conf folder
  67. os.MkdirAll(TMP_FOLDER, 0775)
  68. os.MkdirAll(CONF_HTTP_PROXY, 0775)
  69. //Create an auth agent
  70. sessionKey, err := auth.GetSessionKey(sysdb, SystemWideLogger)
  71. if err != nil {
  72. log.Fatal(err)
  73. }
  74. authAgent = auth.NewAuthenticationAgent(SYSTEM_NAME, []byte(sessionKey), sysdb, true, SystemWideLogger, func(w http.ResponseWriter, r *http.Request) {
  75. //Not logged in. Redirecting to login page
  76. http.Redirect(w, r, ppf("/login.html"), http.StatusTemporaryRedirect)
  77. })
  78. //Create a TLS certificate manager
  79. tlsCertManager, err = tlscert.NewManager(CONF_CERT_STORE, DEVELOPMENT_BUILD, SystemWideLogger)
  80. if err != nil {
  81. panic(err)
  82. }
  83. //Create a redirection rule table
  84. db.NewTable("redirect")
  85. redirectAllowRegexp := false
  86. db.Read("redirect", "regex", &redirectAllowRegexp)
  87. redirectTable, err = redirection.NewRuleTable(CONF_REDIRECTION, redirectAllowRegexp, SystemWideLogger)
  88. if err != nil {
  89. panic(err)
  90. }
  91. //Create a geodb store
  92. geodbStore, err = geodb.NewGeoDb(sysdb, &geodb.StoreOptions{
  93. AllowSlowIpv4LookUp: !*enableHighSpeedGeoIPLookup,
  94. AllowSlowIpv6Lookup: !*enableHighSpeedGeoIPLookup,
  95. SlowLookupCacheClearInterval: GEODB_CACHE_CLEAR_INTERVAL * time.Minute,
  96. })
  97. if err != nil {
  98. panic(err)
  99. }
  100. //Create a load balancer
  101. loadBalancer = loadbalance.NewLoadBalancer(&loadbalance.Options{
  102. SystemUUID: nodeUUID,
  103. Geodb: geodbStore,
  104. Logger: SystemWideLogger,
  105. })
  106. //Create the access controller
  107. accessController, err = access.NewAccessController(&access.Options{
  108. Database: sysdb,
  109. GeoDB: geodbStore,
  110. ConfigFolder: CONF_ACCESS_RULE,
  111. })
  112. if err != nil {
  113. panic(err)
  114. }
  115. /*
  116. //Create an SSO handler
  117. ssoHandler, err = sso.NewSSOHandler(&sso.SSOConfig{
  118. SystemUUID: nodeUUID,
  119. PortalServerPort: 5488,
  120. AuthURL: "http://auth.localhost",
  121. Database: sysdb,
  122. Logger: SystemWideLogger,
  123. })
  124. if err != nil {
  125. log.Fatal(err)
  126. }
  127. //Restore the SSO handler to previous state before shutdown
  128. ssoHandler.RestorePreviousRunningState()
  129. */
  130. //Create a statistic collector
  131. statisticCollector, err = statistic.NewStatisticCollector(statistic.CollectorOption{
  132. Database: sysdb,
  133. })
  134. if err != nil {
  135. panic(err)
  136. }
  137. //Start the static web server
  138. staticWebServer = webserv.NewWebServer(&webserv.WebServerOptions{
  139. Sysdb: sysdb,
  140. Port: strconv.Itoa(WEBSERV_DEFAULT_PORT), //Default Port
  141. WebRoot: *staticWebServerRoot,
  142. EnableDirectoryListing: true,
  143. EnableWebDirManager: *allowWebFileManager,
  144. Logger: SystemWideLogger,
  145. })
  146. //Restore the web server to previous shutdown state
  147. staticWebServer.RestorePreviousState()
  148. //Create a netstat buffer
  149. netstatBuffers, err = netstat.NewNetStatBuffer(300, SystemWideLogger)
  150. if err != nil {
  151. SystemWideLogger.PrintAndLog("Network", "Failed to load network statistic info", err)
  152. panic(err)
  153. }
  154. /*
  155. Path Rules
  156. This section of starutp script start the path rules where
  157. user can define their own routing logics
  158. */
  159. pathRuleHandler = pathrule.NewPathRuleHandler(&pathrule.Options{
  160. Enabled: false,
  161. ConfigFolder: CONF_PATH_RULE,
  162. })
  163. /*
  164. MDNS Discovery Service
  165. This discover nearby ArozOS Nodes or other services
  166. that provide mDNS discovery with domain (e.g. Synology NAS)
  167. */
  168. if *allowMdnsScanning {
  169. portInt, err := strconv.Atoi(strings.Split(*webUIPort, ":")[1])
  170. if err != nil {
  171. portInt = 8000
  172. }
  173. hostName := *mdnsName
  174. if hostName == "" {
  175. hostName = MDNS_HOSTNAME_PREFIX + nodeUUID
  176. } else {
  177. //Trim off the suffix
  178. hostName = strings.TrimSuffix(hostName, ".local")
  179. }
  180. mdnsScanner, err = mdns.NewMDNS(mdns.NetworkHost{
  181. HostName: hostName,
  182. Port: portInt,
  183. Domain: MDNS_IDENTIFY_DOMAIN,
  184. Model: MDNS_IDENTIFY_DEVICE_TYPE,
  185. UUID: nodeUUID,
  186. Vendor: MDNS_IDENTIFY_VENDOR,
  187. BuildVersion: SYSTEM_VERSION,
  188. }, "")
  189. if err != nil {
  190. SystemWideLogger.Println("Unable to startup mDNS service. Disabling mDNS services")
  191. } else {
  192. //Start initial scanning
  193. go func() {
  194. hosts := mdnsScanner.Scan(MDNS_SCAN_TIMEOUT, "")
  195. previousmdnsScanResults = hosts
  196. SystemWideLogger.Println("mDNS Startup scan completed")
  197. }()
  198. //Create a ticker to update mDNS results every 5 minutes
  199. ticker := time.NewTicker(MDNS_SCAN_UPDATE_INTERVAL * time.Minute)
  200. stopChan := make(chan bool)
  201. go func() {
  202. for {
  203. select {
  204. case <-stopChan:
  205. ticker.Stop()
  206. case <-ticker.C:
  207. hosts := mdnsScanner.Scan(MDNS_SCAN_TIMEOUT, "")
  208. previousmdnsScanResults = hosts
  209. SystemWideLogger.Println("mDNS scan result updated")
  210. }
  211. }
  212. }()
  213. mdnsTickerStop = stopChan
  214. }
  215. }
  216. /*
  217. Global Area Network
  218. Require zerotier token to work
  219. */
  220. usingZtAuthToken := *ztAuthToken
  221. if usingZtAuthToken == "" {
  222. usingZtAuthToken, err = ganserv.TryLoadorAskUserForAuthkey()
  223. if err != nil {
  224. SystemWideLogger.Println("Failed to load ZeroTier controller API authtoken")
  225. }
  226. }
  227. ganManager = ganserv.NewNetworkManager(&ganserv.NetworkManagerOptions{
  228. AuthToken: usingZtAuthToken,
  229. ApiPort: *ztAPIPort,
  230. Database: sysdb,
  231. })
  232. //Create WebSSH Manager
  233. webSshManager = sshprox.NewSSHProxyManager()
  234. //Create TCP Proxy Manager
  235. streamProxyManager, err = streamproxy.NewStreamProxy(&streamproxy.Options{
  236. AccessControlHandler: accessController.DefaultAccessRule.AllowConnectionAccess,
  237. ConfigStore: CONF_STREAM_PROXY,
  238. Logger: SystemWideLogger,
  239. })
  240. if err != nil {
  241. panic(err)
  242. }
  243. //Create WoL MAC storage table
  244. sysdb.NewTable("wolmac")
  245. //Create an email sender if SMTP config exists
  246. sysdb.NewTable("smtp")
  247. EmailSender = loadSMTPConfig()
  248. //Create an analytic loader
  249. AnalyticLoader = analytic.NewDataLoader(sysdb, statisticCollector)
  250. //Create basic forward proxy
  251. sysdb.NewTable("fwdproxy")
  252. fwdProxyEnabled := false
  253. fwdProxyPort := 5587
  254. sysdb.Read("fwdproxy", "port", &fwdProxyPort)
  255. sysdb.Read("fwdproxy", "enabled", &fwdProxyEnabled)
  256. forwardProxy = forwardproxy.NewForwardProxy(sysdb, fwdProxyPort, SystemWideLogger)
  257. if fwdProxyEnabled {
  258. SystemWideLogger.PrintAndLog("Forward Proxy", "HTTP Forward Proxy Listening on :"+strconv.Itoa(forwardProxy.Port), nil)
  259. forwardProxy.Start()
  260. }
  261. /*
  262. ACME API
  263. Obtaining certificates from ACME Server
  264. */
  265. //Create a table just to store acme related preferences
  266. sysdb.NewTable("acmepref")
  267. acmeHandler = initACME()
  268. acmeAutoRenewer, err = acme.NewAutoRenewer(
  269. ACME_AUTORENEW_CONFIG_PATH,
  270. CONF_CERT_STORE,
  271. int64(*acmeAutoRenewInterval),
  272. *acmeCertAutoRenewDays,
  273. acmeHandler,
  274. SystemWideLogger,
  275. )
  276. if err != nil {
  277. log.Fatal(err)
  278. }
  279. /* Docker UX Optimizer */
  280. if runtime.GOOS == "windows" && *runningInDocker {
  281. SystemWideLogger.PrintAndLog("warning", "Invalid start flag combination: docker=true && runtime.GOOS == windows. Running in docker UX development mode.", nil)
  282. }
  283. DockerUXOptimizer = dockerux.NewDockerOptimizer(*runningInDocker, SystemWideLogger)
  284. }
  285. // This sequence start after everything is initialized
  286. func finalSequence() {
  287. //Start ACME renew agent
  288. acmeRegisterSpecialRoutingRule()
  289. //Inject routing rules
  290. registerBuildInRoutingRules()
  291. }