network.go 6.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223
  1. package main
  2. import (
  3. "net/http"
  4. "strconv"
  5. "imuslab.com/arozos/mod/common"
  6. network "imuslab.com/arozos/mod/network"
  7. mdns "imuslab.com/arozos/mod/network/mdns"
  8. "imuslab.com/arozos/mod/network/netstat"
  9. ssdp "imuslab.com/arozos/mod/network/ssdp"
  10. upnp "imuslab.com/arozos/mod/network/upnp"
  11. "imuslab.com/arozos/mod/network/websocket"
  12. prout "imuslab.com/arozos/mod/prouter"
  13. "imuslab.com/arozos/mod/www"
  14. )
  15. var (
  16. MDNS *mdns.MDNSHost
  17. UPNP *upnp.UPnPClient
  18. SSDP *ssdp.SSDPHost
  19. WebSocketRouter *websocket.Router
  20. )
  21. func NetworkServiceInit() {
  22. systemWideLogger.PrintAndLog("Network", "Starting ArOZ Network Services", nil)
  23. //Create a router that allow users with System Setting access to access these api endpoints
  24. router := prout.NewModuleRouter(prout.RouterOption{
  25. ModuleName: "System Setting",
  26. AdminOnly: false,
  27. UserHandler: userHandler,
  28. DeniedHandler: func(w http.ResponseWriter, r *http.Request) {
  29. common.SendErrorResponse(w, "Permission Denied")
  30. },
  31. })
  32. /*
  33. Standard Network Utilties
  34. */
  35. //Register handler endpoints
  36. if *allow_hardware_management {
  37. router.HandleFunc("/system/network/getNICinfo", network.GetNICInfo)
  38. router.HandleFunc("/system/network/getPing", network.GetPing)
  39. //Register as a system setting
  40. registerSetting(settingModule{
  41. Name: "Network Info",
  42. Desc: "System Information",
  43. IconPath: "SystemAO/network/img/ethernet.png",
  44. Group: "Network",
  45. StartDir: "SystemAO/network/hardware.html",
  46. })
  47. }
  48. router.HandleFunc("/system/network/getNICUsage", netstat.HandleGetNetworkInterfaceStats)
  49. //Start the services that depends on network interface
  50. StartNetworkServices()
  51. //Start the port forward configuration interface
  52. portForwardInit()
  53. //Start userhomepage if enabled
  54. //Handle user webroot routings if homepage is enabled
  55. if *allow_homepage {
  56. userWwwHandler = www.NewWebRootHandler(www.Options{
  57. UserHandler: userHandler,
  58. Database: sysdb,
  59. AgiGateway: AGIGateway,
  60. })
  61. router.HandleFunc("/system/network/www/toggle", userWwwHandler.HandleToggleHomepage)
  62. router.HandleFunc("/system/network/www/webRoot", userWwwHandler.HandleSetWebRoot)
  63. //Register as a system setting
  64. registerSetting(settingModule{
  65. Name: "Personal Page",
  66. Desc: "Personal Web Page",
  67. IconPath: "SystemAO/www/img/homepage.png",
  68. Group: "Network",
  69. StartDir: "SystemAO/www/config.html",
  70. })
  71. }
  72. userRouter := prout.NewModuleRouter(prout.RouterOption{
  73. AdminOnly: false,
  74. UserHandler: userHandler,
  75. DeniedHandler: func(w http.ResponseWriter, r *http.Request) {
  76. common.SendErrorResponse(w, "Permission Denied")
  77. },
  78. })
  79. WebSocketRouter = websocket.NewRouter()
  80. userRouter.HandleFunc("/system/ws", WebSocketRouter.HandleWebSocketRouting)
  81. }
  82. func StartNetworkServices() {
  83. /*
  84. MDNS Services
  85. */
  86. if *allow_mdns {
  87. m, err := mdns.NewMDNS(mdns.NetworkHost{
  88. HostName: *host_name + "_" + deviceUUID, //To handle more than one identical model within the same network, this must be unique
  89. Port: *listen_port,
  90. Domain: "arozos.com",
  91. Model: deviceModel,
  92. UUID: deviceUUID,
  93. Vendor: deviceVendor,
  94. BuildVersion: build_version,
  95. MinorVersion: internal_version,
  96. })
  97. if err != nil {
  98. systemWideLogger.PrintAndLog("Network", "MDNS Startup Failed. Running in Offline Mode.", err)
  99. } else {
  100. MDNS = m
  101. }
  102. }
  103. /*
  104. SSDP Discovery Services
  105. */
  106. if *allow_ssdp {
  107. //Get outbound ip
  108. obip, err := network.GetOutboundIP()
  109. if err != nil {
  110. systemWideLogger.PrintAndLog("Network", "SSDP Startup Failed. Running in Offline Mode.", err)
  111. } else {
  112. thisIp := obip.String()
  113. adv, err := ssdp.NewSSDPHost(thisIp, *listen_port, "system/ssdp.xml", ssdp.SSDPOption{
  114. URLBase: "http://" + thisIp + ":" + strconv.Itoa(*listen_port), //This must be http if used as local hosting devices
  115. Hostname: *host_name,
  116. Vendor: deviceVendor,
  117. VendorURL: deviceVendorURL,
  118. ModelName: deviceModel,
  119. ModelDesc: deviceModelDesc,
  120. UUID: deviceUUID,
  121. Serial: "generic",
  122. })
  123. if err != nil {
  124. systemWideLogger.PrintAndLog("Network", "SSDP Startup Failed. Running in Offline Mode.", err)
  125. } else {
  126. //OK! Start SSDP Service
  127. SSDP = adv
  128. SSDP.Start()
  129. }
  130. }
  131. }
  132. /*
  133. UPNP / Setup automatic port forwarding
  134. */
  135. if *allow_upnp {
  136. var u *upnp.UPnPClient
  137. var err error = nil
  138. if *use_tls {
  139. u, err = upnp.NewUPNPClient(*tls_listen_port, *host_name+"-https")
  140. } else {
  141. u, err = upnp.NewUPNPClient(*listen_port, *host_name+"-http")
  142. }
  143. if err != nil {
  144. systemWideLogger.PrintAndLog("Network", "UPnP Startup Failed: "+err.Error(), err)
  145. } else {
  146. //Bind the http port if running in https and http server is not disabled
  147. if *use_tls && !*disable_http {
  148. u.ForwardPort(*listen_port, *host_name+"-http")
  149. }
  150. UPNP = u
  151. //Register nightly listener for upnp renew
  152. nightlyManager.RegisterNightlyTask(func() {
  153. UPNP.RenewForwardRules()
  154. })
  155. //Show a tip for success port forward
  156. connectionEndpoint := UPNP.ExternalIP + ":" + strconv.Itoa(*listen_port)
  157. obip, err := network.GetOutboundIP()
  158. obipstring := "[Outbound IP]"
  159. if err != nil {
  160. } else {
  161. obipstring = obip.String()
  162. }
  163. localEndpoint := obipstring + ":" + strconv.Itoa(*listen_port)
  164. systemWideLogger.PrintAndLog("Network", "Automatic Port Forwarding Completed. Forwarding all request from "+connectionEndpoint+" to "+localEndpoint, nil)
  165. }
  166. }
  167. }
  168. func StopNetworkServices() {
  169. //systemWideLogger.PrintAndLog("Shutting Down Network Services...",nil)
  170. //Shutdown uPNP service if enabled
  171. if *allow_upnp {
  172. systemWideLogger.PrintAndLog("System", "<!> Shutting down uPNP service", nil)
  173. UPNP.Close()
  174. }
  175. //Shutdown SSDP service if enabled
  176. if *allow_ssdp {
  177. systemWideLogger.PrintAndLog("System", "<!> Shutting down SSDP service", nil)
  178. SSDP.Close()
  179. }
  180. //Shutdown MDNS if enabled
  181. if *allow_mdns {
  182. systemWideLogger.PrintAndLog("System", "<!> Shutting down MDNS service", nil)
  183. MDNS.Close()
  184. }
  185. }