start.go 7.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295
  1. package main
  2. import (
  3. "log"
  4. "net/http"
  5. "os"
  6. "runtime"
  7. "strconv"
  8. "strings"
  9. "time"
  10. "imuslab.com/zoraxy/mod/access"
  11. "imuslab.com/zoraxy/mod/acme"
  12. "imuslab.com/zoraxy/mod/auth"
  13. "imuslab.com/zoraxy/mod/database"
  14. "imuslab.com/zoraxy/mod/dockerux"
  15. "imuslab.com/zoraxy/mod/dynamicproxy/loadbalance"
  16. "imuslab.com/zoraxy/mod/dynamicproxy/redirection"
  17. "imuslab.com/zoraxy/mod/forwardproxy"
  18. "imuslab.com/zoraxy/mod/ganserv"
  19. "imuslab.com/zoraxy/mod/geodb"
  20. "imuslab.com/zoraxy/mod/info/logger"
  21. "imuslab.com/zoraxy/mod/mdns"
  22. "imuslab.com/zoraxy/mod/netstat"
  23. "imuslab.com/zoraxy/mod/pathrule"
  24. "imuslab.com/zoraxy/mod/sshprox"
  25. "imuslab.com/zoraxy/mod/statistic"
  26. "imuslab.com/zoraxy/mod/statistic/analytic"
  27. "imuslab.com/zoraxy/mod/streamproxy"
  28. "imuslab.com/zoraxy/mod/tlscert"
  29. "imuslab.com/zoraxy/mod/webserv"
  30. )
  31. /*
  32. Startup Sequence
  33. This function starts the startup sequence of all
  34. required modules
  35. */
  36. var (
  37. /*
  38. MDNS related
  39. */
  40. previousmdnsScanResults = []*mdns.NetworkHost{}
  41. mdnsTickerStop chan bool
  42. )
  43. func startupSequence() {
  44. //Create database
  45. db, err := database.NewDatabase("sys.db", false)
  46. if err != nil {
  47. log.Fatal(err)
  48. }
  49. sysdb = db
  50. //Create tables for the database
  51. sysdb.NewTable("settings")
  52. //Create tmp folder and conf folder
  53. os.MkdirAll("./tmp", 0775)
  54. os.MkdirAll("./conf/proxy/", 0775)
  55. //Create an auth agent
  56. sessionKey, err := auth.GetSessionKey(sysdb)
  57. if err != nil {
  58. log.Fatal(err)
  59. }
  60. authAgent = auth.NewAuthenticationAgent(name, []byte(sessionKey), sysdb, true, func(w http.ResponseWriter, r *http.Request) {
  61. //Not logged in. Redirecting to login page
  62. http.Redirect(w, r, ppf("/login.html"), http.StatusTemporaryRedirect)
  63. })
  64. //Create a TLS certificate manager
  65. tlsCertManager, err = tlscert.NewManager("./conf/certs", development)
  66. if err != nil {
  67. panic(err)
  68. }
  69. //Create a system wide logger
  70. l, err := logger.NewLogger("zr", "./log", *logOutputToFile)
  71. if err == nil {
  72. SystemWideLogger = l
  73. } else {
  74. panic(err)
  75. }
  76. //Create a redirection rule table
  77. db.NewTable("redirect")
  78. redirectAllowRegexp := false
  79. db.Read("redirect", "regex", &redirectAllowRegexp)
  80. redirectTable, err = redirection.NewRuleTable("./conf/redirect", redirectAllowRegexp, SystemWideLogger)
  81. if err != nil {
  82. panic(err)
  83. }
  84. //Create a geodb store
  85. geodbStore, err = geodb.NewGeoDb(sysdb, &geodb.StoreOptions{
  86. AllowSlowIpv4LookUp: !*enableHighSpeedGeoIPLookup,
  87. AllowSloeIpv6Lookup: !*enableHighSpeedGeoIPLookup,
  88. })
  89. if err != nil {
  90. panic(err)
  91. }
  92. //Create a load balancer
  93. loadBalancer = loadbalance.NewLoadBalancer(&loadbalance.Options{
  94. Geodb: geodbStore,
  95. Logger: SystemWideLogger,
  96. })
  97. //Create the access controller
  98. accessController, err = access.NewAccessController(&access.Options{
  99. Database: sysdb,
  100. GeoDB: geodbStore,
  101. ConfigFolder: "./conf/access",
  102. })
  103. if err != nil {
  104. panic(err)
  105. }
  106. //Create a statistic collector
  107. statisticCollector, err = statistic.NewStatisticCollector(statistic.CollectorOption{
  108. Database: sysdb,
  109. })
  110. if err != nil {
  111. panic(err)
  112. }
  113. //Start the static web server
  114. staticWebServer = webserv.NewWebServer(&webserv.WebServerOptions{
  115. Sysdb: sysdb,
  116. Port: "5487", //Default Port
  117. WebRoot: *staticWebServerRoot,
  118. EnableDirectoryListing: true,
  119. EnableWebDirManager: *allowWebFileManager,
  120. })
  121. //Restore the web server to previous shutdown state
  122. staticWebServer.RestorePreviousState()
  123. //Create a netstat buffer
  124. netstatBuffers, err = netstat.NewNetStatBuffer(300)
  125. if err != nil {
  126. SystemWideLogger.PrintAndLog("Network", "Failed to load network statistic info", err)
  127. panic(err)
  128. }
  129. /*
  130. Path Rules
  131. This section of starutp script start the path rules where
  132. user can define their own routing logics
  133. */
  134. pathRuleHandler = pathrule.NewPathRuleHandler(&pathrule.Options{
  135. Enabled: false,
  136. ConfigFolder: "./conf/rules/pathrules",
  137. })
  138. /*
  139. MDNS Discovery Service
  140. This discover nearby ArozOS Nodes or other services
  141. that provide mDNS discovery with domain (e.g. Synology NAS)
  142. */
  143. if *allowMdnsScanning {
  144. portInt, err := strconv.Atoi(strings.Split(*webUIPort, ":")[1])
  145. if err != nil {
  146. portInt = 8000
  147. }
  148. hostName := *mdnsName
  149. if hostName == "" {
  150. hostName = "zoraxy_" + nodeUUID
  151. } else {
  152. //Trim off the suffix
  153. hostName = strings.TrimSuffix(hostName, ".local")
  154. }
  155. mdnsScanner, err = mdns.NewMDNS(mdns.NetworkHost{
  156. HostName: hostName,
  157. Port: portInt,
  158. Domain: "zoraxy.arozos.com",
  159. Model: "Network Gateway",
  160. UUID: nodeUUID,
  161. Vendor: "imuslab.com",
  162. BuildVersion: version,
  163. }, "")
  164. if err != nil {
  165. SystemWideLogger.Println("Unable to startup mDNS service. Disabling mDNS services")
  166. } else {
  167. //Start initial scanning
  168. go func() {
  169. hosts := mdnsScanner.Scan(30, "")
  170. previousmdnsScanResults = hosts
  171. SystemWideLogger.Println("mDNS Startup scan completed")
  172. }()
  173. //Create a ticker to update mDNS results every 5 minutes
  174. ticker := time.NewTicker(15 * time.Minute)
  175. stopChan := make(chan bool)
  176. go func() {
  177. for {
  178. select {
  179. case <-stopChan:
  180. ticker.Stop()
  181. case <-ticker.C:
  182. hosts := mdnsScanner.Scan(30, "")
  183. previousmdnsScanResults = hosts
  184. SystemWideLogger.Println("mDNS scan result updated")
  185. }
  186. }
  187. }()
  188. mdnsTickerStop = stopChan
  189. }
  190. }
  191. /*
  192. Global Area Network
  193. Require zerotier token to work
  194. */
  195. usingZtAuthToken := *ztAuthToken
  196. if usingZtAuthToken == "" {
  197. usingZtAuthToken, err = ganserv.TryLoadorAskUserForAuthkey()
  198. if err != nil {
  199. SystemWideLogger.Println("Failed to load ZeroTier controller API authtoken")
  200. }
  201. }
  202. ganManager = ganserv.NewNetworkManager(&ganserv.NetworkManagerOptions{
  203. AuthToken: usingZtAuthToken,
  204. ApiPort: *ztAPIPort,
  205. Database: sysdb,
  206. })
  207. //Create WebSSH Manager
  208. webSshManager = sshprox.NewSSHProxyManager()
  209. //Create TCP Proxy Manager
  210. streamProxyManager = streamproxy.NewStreamProxy(&streamproxy.Options{
  211. Database: sysdb,
  212. AccessControlHandler: accessController.DefaultAccessRule.AllowConnectionAccess,
  213. })
  214. //Create WoL MAC storage table
  215. sysdb.NewTable("wolmac")
  216. //Create an email sender if SMTP config exists
  217. sysdb.NewTable("smtp")
  218. EmailSender = loadSMTPConfig()
  219. //Create an analytic loader
  220. AnalyticLoader = analytic.NewDataLoader(sysdb, statisticCollector)
  221. //Create basic forward proxy
  222. sysdb.NewTable("fwdproxy")
  223. fwdProxyEnabled := false
  224. fwdProxyPort := 5587
  225. sysdb.Read("fwdproxy", "port", &fwdProxyPort)
  226. sysdb.Read("fwdproxy", "enabled", &fwdProxyEnabled)
  227. forwardProxy = forwardproxy.NewForwardProxy(sysdb, fwdProxyPort, SystemWideLogger)
  228. if fwdProxyEnabled {
  229. SystemWideLogger.PrintAndLog("Forward Proxy", "HTTP Forward Proxy Listening on :"+strconv.Itoa(forwardProxy.Port), nil)
  230. forwardProxy.Start()
  231. }
  232. /*
  233. ACME API
  234. Obtaining certificates from ACME Server
  235. */
  236. //Create a table just to store acme related preferences
  237. sysdb.NewTable("acmepref")
  238. acmeHandler = initACME()
  239. acmeAutoRenewer, err = acme.NewAutoRenewer("./conf/acme_conf.json", "./conf/certs/", int64(*acmeAutoRenewInterval), acmeHandler)
  240. if err != nil {
  241. log.Fatal(err)
  242. }
  243. /* Docker UX Optimizer */
  244. if runtime.GOOS == "windows" && *runningInDocker {
  245. SystemWideLogger.PrintAndLog("WARNING", "Invalid start flag combination: docker=true && runtime.GOOS == windows. Running in docker UX development mode.", nil)
  246. }
  247. DockerUXOptimizer = dockerux.NewDockerOptimizer(*runningInDocker, SystemWideLogger)
  248. }
  249. // This sequence start after everything is initialized
  250. func finalSequence() {
  251. //Start ACME renew agent
  252. acmeRegisterSpecialRoutingRule()
  253. //Inject routing rules
  254. registerBuildInRoutingRules()
  255. }