12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485 |
- package dynamicproxy
- import (
- "net/http"
- "os"
- "strings"
- "imuslab.com/zoraxy/mod/geodb"
- )
- /*
- Server.go
- Main server for dynamic proxy core
- */
- func (h *ProxyHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
- //Check if this ip is in blacklist
- clientIpAddr := geodb.GetRequesterIP(r)
- if h.Parent.Option.GeodbStore.IsBlacklisted(clientIpAddr) {
- w.Header().Set("Content-Type", "text/html; charset=utf-8")
- w.WriteHeader(http.StatusForbidden)
- template, err := os.ReadFile("./web/forbidden.html")
- if err != nil {
- w.Write([]byte("403 - Forbidden"))
- } else {
- w.Write(template)
- }
- h.logRequest(r, false, 403, "blacklist")
- return
- }
- //Check if this is a redirection url
- if h.Parent.Option.RedirectRuleTable.IsRedirectable(r) {
- statusCode := h.Parent.Option.RedirectRuleTable.HandleRedirect(w, r)
- h.logRequest(r, statusCode != 500, statusCode, "redirect")
- return
- }
- //Check if there are external routing rule matches.
- //If yes, route them via external rr
- matchedRoutingRule := h.Parent.GetMatchingRoutingRule(r)
- if matchedRoutingRule != nil {
- //Matching routing rule found. Let the sub-router handle it
- matchedRoutingRule.Route(w, r)
- return
- }
- //Extract request host to see if it is virtual directory or subdomain
- domainOnly := r.Host
- if strings.Contains(r.Host, ":") {
- hostPath := strings.Split(r.Host, ":")
- domainOnly = hostPath[0]
- }
- if strings.Contains(r.Host, ".") {
- //This might be a subdomain. See if there are any subdomain proxy router for this
- //Remove the port if any
- sep := h.Parent.getSubdomainProxyEndpointFromHostname(domainOnly)
- if sep != nil {
- h.subdomainRequest(w, r, sep)
- return
- }
- }
- //Clean up the request URI
- proxyingPath := strings.TrimSpace(r.RequestURI)
- targetProxyEndpoint := h.Parent.getTargetProxyEndpointFromRequestURI(proxyingPath)
- if targetProxyEndpoint != nil {
- h.proxyRequest(w, r, targetProxyEndpoint)
- } else if !strings.HasSuffix(proxyingPath, "/") {
- potentialProxtEndpoint := h.Parent.getTargetProxyEndpointFromRequestURI(proxyingPath + "/")
- if potentialProxtEndpoint != nil {
- //Missing tailing slash. Redirect to target proxy endpoint
- http.Redirect(w, r, r.RequestURI+"/", http.StatusTemporaryRedirect)
- //h.proxyRequest(w, r, potentialProxtEndpoint)
- } else {
- h.proxyRequest(w, r, h.Parent.Root)
- }
- } else {
- h.proxyRequest(w, r, h.Parent.Root)
- }
- }
|