network.go 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539
  1. package main
  2. import (
  3. "encoding/json"
  4. "fmt"
  5. "net/http"
  6. "strconv"
  7. "strings"
  8. "imuslab.com/arozos/mod/fileservers"
  9. "imuslab.com/arozos/mod/fileservers/servers/dirserv"
  10. "imuslab.com/arozos/mod/fileservers/servers/ftpserv"
  11. "imuslab.com/arozos/mod/fileservers/servers/nfsserv"
  12. "imuslab.com/arozos/mod/fileservers/servers/sftpserv"
  13. "imuslab.com/arozos/mod/fileservers/servers/webdavserv"
  14. network "imuslab.com/arozos/mod/network"
  15. mdns "imuslab.com/arozos/mod/network/mdns"
  16. "imuslab.com/arozos/mod/network/netstat"
  17. ssdp "imuslab.com/arozos/mod/network/ssdp"
  18. upnp "imuslab.com/arozos/mod/network/upnp"
  19. "imuslab.com/arozos/mod/network/websocket"
  20. "imuslab.com/arozos/mod/permission"
  21. prout "imuslab.com/arozos/mod/prouter"
  22. "imuslab.com/arozos/mod/utils"
  23. "imuslab.com/arozos/mod/www"
  24. )
  25. var (
  26. //Network Services Managers
  27. MDNS *mdns.MDNSHost
  28. UPNP *upnp.UPnPClient
  29. SSDP *ssdp.SSDPHost
  30. WebSocketRouter *websocket.Router
  31. //File Server Managers
  32. FTPManager *ftpserv.Manager
  33. WebDAVManager *webdavserv.Manager
  34. SFTPManager *sftpserv.Manager
  35. NFSManager *nfsserv.Manager
  36. DirListManager *dirserv.Manager
  37. )
  38. func NetworkServiceInit() {
  39. systemWideLogger.PrintAndLog("Network", "Starting ArOZ Network Services", nil)
  40. //Create a router that allow users with System Setting access to access these api endpoints
  41. router := prout.NewModuleRouter(prout.RouterOption{
  42. ModuleName: "System Setting",
  43. AdminOnly: false,
  44. UserHandler: userHandler,
  45. DeniedHandler: func(w http.ResponseWriter, r *http.Request) {
  46. utils.SendErrorResponse(w, "Permission Denied")
  47. },
  48. })
  49. /*
  50. Standard Network Utilties
  51. */
  52. //Register handler endpoints
  53. if *allow_hardware_management {
  54. router.HandleFunc("/system/network/getNICinfo", network.GetNICInfo)
  55. router.HandleFunc("/system/network/getPing", network.GetPing)
  56. //Register as a system setting
  57. registerSetting(settingModule{
  58. Name: "Network Info",
  59. Desc: "Network Information",
  60. IconPath: "SystemAO/network/img/ethernet.png",
  61. Group: "Network",
  62. StartDir: "SystemAO/network/hardware.html",
  63. })
  64. }
  65. router.HandleFunc("/system/network/getNICUsage", netstat.HandleGetNetworkInterfaceStats)
  66. //Start the services that depends on network interface
  67. StartNetworkServices()
  68. //Start the port forward configuration interface
  69. portForwardInit()
  70. //Start userhomepage if enabled
  71. //Handle user webroot routings if homepage is enabled
  72. if *allow_homepage {
  73. userWwwHandler = www.NewWebRootHandler(www.Options{
  74. UserHandler: userHandler,
  75. Database: sysdb,
  76. AgiGateway: AGIGateway,
  77. })
  78. router.HandleFunc("/system/network/www/toggle", userWwwHandler.HandleToggleHomepage)
  79. router.HandleFunc("/system/network/www/webRoot", userWwwHandler.HandleSetWebRoot)
  80. //Register as a system setting
  81. registerSetting(settingModule{
  82. Name: "Personal Page",
  83. Desc: "Personal Web Page",
  84. IconPath: "SystemAO/www/img/homepage.png",
  85. Group: "Network",
  86. StartDir: "SystemAO/www/config.html",
  87. })
  88. }
  89. userRouter := prout.NewModuleRouter(prout.RouterOption{
  90. AdminOnly: false,
  91. UserHandler: userHandler,
  92. DeniedHandler: func(w http.ResponseWriter, r *http.Request) {
  93. utils.SendErrorResponse(w, "Permission Denied")
  94. },
  95. })
  96. WebSocketRouter = websocket.NewRouter()
  97. userRouter.HandleFunc("/system/ws", WebSocketRouter.HandleWebSocketRouting)
  98. }
  99. func StartNetworkServices() {
  100. /*
  101. MDNS Services
  102. */
  103. if *allow_mdns {
  104. m, err := mdns.NewMDNS(mdns.NetworkHost{
  105. HostName: *host_name + "_" + deviceUUID, //To handle more than one identical model within the same network, this must be unique
  106. Port: *listen_port,
  107. Domain: "arozos.com",
  108. Model: deviceModel,
  109. UUID: deviceUUID,
  110. Vendor: deviceVendor,
  111. BuildVersion: build_version,
  112. MinorVersion: internal_version,
  113. }, *force_mac)
  114. if err != nil {
  115. systemWideLogger.PrintAndLog("Network", "MDNS Startup Failed. Running in Offline Mode.", err)
  116. } else {
  117. MDNS = m
  118. }
  119. }
  120. /*
  121. SSDP Discovery Services
  122. */
  123. if *allow_ssdp {
  124. //Get outbound ip
  125. obip, err := network.GetOutboundIP()
  126. if err != nil {
  127. systemWideLogger.PrintAndLog("Network", "SSDP Startup Failed. Running in Offline Mode.", err)
  128. } else {
  129. thisIp := obip.String()
  130. adv, err := ssdp.NewSSDPHost(thisIp, *listen_port, "system/ssdp.xml", ssdp.SSDPOption{
  131. URLBase: "http://" + thisIp + ":" + strconv.Itoa(*listen_port), //This must be http if used as local hosting devices
  132. Hostname: *host_name,
  133. Vendor: deviceVendor,
  134. VendorURL: deviceVendorURL,
  135. ModelName: deviceModel,
  136. ModelDesc: deviceModelDesc,
  137. UUID: deviceUUID,
  138. Serial: "generic",
  139. })
  140. if err != nil {
  141. systemWideLogger.PrintAndLog("Network", "SSDP Startup Failed. Running in Offline Mode.", err)
  142. } else {
  143. //OK! Start SSDP Service
  144. SSDP = adv
  145. SSDP.Start()
  146. }
  147. }
  148. }
  149. /*
  150. UPNP / Setup automatic port forwarding
  151. */
  152. if *allow_upnp {
  153. var u *upnp.UPnPClient
  154. var err error = nil
  155. if *use_tls {
  156. u, err = upnp.NewUPNPClient(*tls_listen_port, *host_name+"-https")
  157. } else {
  158. u, err = upnp.NewUPNPClient(*listen_port, *host_name+"-http")
  159. }
  160. if err != nil {
  161. systemWideLogger.PrintAndLog("Network", "UPnP Startup Failed: "+err.Error(), err)
  162. } else {
  163. //Bind the http port if running in https and http server is not disabled
  164. if *use_tls && !*disable_http {
  165. u.ForwardPort(*listen_port, *host_name+"-http")
  166. }
  167. UPNP = u
  168. //Register nightly listener for upnp renew
  169. nightlyManager.RegisterNightlyTask(func() {
  170. UPNP.RenewForwardRules()
  171. })
  172. //Show a tip for success port forward
  173. connectionEndpoint := UPNP.ExternalIP + ":" + strconv.Itoa(*listen_port)
  174. obip, err := network.GetOutboundIP()
  175. obipstring := "[Outbound IP]"
  176. if err != nil {
  177. } else {
  178. obipstring = obip.String()
  179. }
  180. localEndpoint := obipstring + ":" + strconv.Itoa(*listen_port)
  181. systemWideLogger.PrintAndLog("Network", "Automatic Port Forwarding Completed. Forwarding all request from "+connectionEndpoint+" to "+localEndpoint, nil)
  182. }
  183. }
  184. }
  185. func StopNetworkServices() {
  186. //systemWideLogger.PrintAndLog("Shutting Down Network Services...",nil)
  187. //Shutdown uPNP service if enabled
  188. if *allow_upnp {
  189. systemWideLogger.PrintAndLog("System", "<!> Shutting down uPNP service", nil)
  190. UPNP.Close()
  191. }
  192. //Shutdown SSDP service if enabled
  193. if *allow_ssdp {
  194. systemWideLogger.PrintAndLog("System", "<!> Shutting down SSDP service", nil)
  195. SSDP.Close()
  196. }
  197. //Shutdown MDNS if enabled
  198. if *allow_mdns {
  199. systemWideLogger.PrintAndLog("System", "<!> Shutting down MDNS service", nil)
  200. MDNS.Close()
  201. }
  202. }
  203. /*
  204. File Server Services
  205. */
  206. var networkFileServerDaemon []*fileservers.Server = []*fileservers.Server{}
  207. // Initiate all File Server services
  208. func FileServerInit() {
  209. //Register System Setting
  210. registerSetting(settingModule{
  211. Name: "File Servers",
  212. Desc: "Network File Transfer Servers",
  213. IconPath: "SystemAO/disk/smart/img/small_icon.png",
  214. Group: "Network",
  215. StartDir: "SystemAO/disk/services.html",
  216. RequireAdmin: false,
  217. })
  218. //Create request routers
  219. adminRouter := prout.NewModuleRouter(prout.RouterOption{
  220. ModuleName: "System Setting",
  221. AdminOnly: true,
  222. UserHandler: userHandler,
  223. DeniedHandler: func(w http.ResponseWriter, r *http.Request) {
  224. errorHandlePermissionDenied(w, r)
  225. },
  226. })
  227. router := prout.NewModuleRouter(prout.RouterOption{
  228. ModuleName: "System Setting",
  229. AdminOnly: false,
  230. UserHandler: userHandler,
  231. DeniedHandler: func(w http.ResponseWriter, r *http.Request) {
  232. utils.SendErrorResponse(w, "Permission Denied")
  233. },
  234. })
  235. /* Create File Server Managers */
  236. //WebDAV
  237. webdavPort := *listen_port
  238. if *use_tls {
  239. webdavPort = *tls_listen_port
  240. }
  241. WebDAVManager = webdavserv.NewWebDAVManager(&webdavserv.ManagerOption{
  242. Sysdb: sysdb,
  243. Hostname: *host_name,
  244. TmpDir: *tmp_directory,
  245. Port: webdavPort,
  246. UseTls: *use_tls,
  247. UserHandler: userHandler,
  248. })
  249. //FTP
  250. FTPManager = ftpserv.NewFTPManager(&ftpserv.ManagerOption{
  251. Hostname: *host_name,
  252. TmpFolder: *tmp_directory,
  253. Logger: systemWideLogger,
  254. UserManager: userHandler,
  255. FtpServer: nil,
  256. Sysdb: sysdb,
  257. Upnp: UPNP,
  258. AllowUpnp: *allow_upnp,
  259. })
  260. //SFTP
  261. SFTPManager = sftpserv.NewSFTPServer(&sftpserv.ManagerOption{
  262. Hostname: *host_name,
  263. Upnp: UPNP,
  264. UserManager: userHandler,
  265. KeyFile: "system/auth/id_rsa.key",
  266. Logger: systemWideLogger,
  267. Sysdb: sysdb,
  268. })
  269. listeningPort := *listen_port
  270. if *use_tls {
  271. listeningPort = *tls_listen_port
  272. }
  273. DirListManager = dirserv.NewDirectoryServer(&dirserv.Option{
  274. Sysdb: sysdb,
  275. ServerPort: listeningPort,
  276. UserManager: userHandler,
  277. ServerUUID: deviceUUID,
  278. })
  279. //NFS
  280. NFSManager = nfsserv.NewNfsServer(nfsserv.Option{
  281. UserManager: userHandler,
  282. ListeningPort: 2049,
  283. AllowAccessGroup: []*permission.PermissionGroup{},
  284. Logger: nil,
  285. })
  286. err := NFSManager.Start()
  287. if err != nil {
  288. fmt.Println(err.Error())
  289. }
  290. //Register Endpoints
  291. //WebDAV
  292. http.HandleFunc("/system/network/webdav/list", WebDAVManager.HandleConnectionList)
  293. router.HandleFunc("/system/network/webdav/edit", WebDAVManager.HandlePermissionEdit)
  294. router.HandleFunc("/system/network/webdav/clear", WebDAVManager.HandleClearAllPending)
  295. router.HandleFunc("/system/network/webdav/status", WebDAVManager.HandleStatusChange)
  296. //SFTP
  297. adminRouter.HandleFunc("/system/storage/sftp/port", SFTPManager.HandleListeningPort)
  298. adminRouter.HandleFunc("/system/storage/sftp/upnp", SFTPManager.HandleToogleUPnP)
  299. adminRouter.HandleFunc("/system/storage/sftp/users", SFTPManager.HandleGetConnectedClients)
  300. //FTP
  301. //adminRouter.HandleFunc("/system/storage/ftp/start", FTPManager.HandleFTPServerStart)
  302. //adminRouter.HandleFunc("/system/storage/ftp/stop", FTPManager.HandleFTPServerStop)
  303. adminRouter.HandleFunc("/system/storage/ftp/upnp", FTPManager.HandleFTPUPnP)
  304. adminRouter.HandleFunc("/system/storage/ftp/status", FTPManager.HandleFTPServerStatus)
  305. adminRouter.HandleFunc("/system/storage/ftp/updateGroups", FTPManager.HandleFTPAccessUpdate)
  306. adminRouter.HandleFunc("/system/storage/ftp/setPort", FTPManager.HandleFTPSetPort)
  307. adminRouter.HandleFunc("/system/storage/ftp/passivemode", FTPManager.HandleFTPPassiveModeSettings)
  308. networkFileServerDaemon = append(networkFileServerDaemon, &fileservers.Server{
  309. ID: "webdav",
  310. Name: "WebDAV",
  311. Desc: "WebDAV Server",
  312. IconPath: "img/system/network-folder-blue.svg",
  313. DefaultPorts: []int{},
  314. Ports: []int{},
  315. ForwardPortIfUpnp: false,
  316. ConnInstrPage: "SystemAO/disk/instr/webdav.html",
  317. ConfigPage: "SystemAO/disk/webdav.html",
  318. EnableCheck: WebDAVManager.GetWebDavEnabled,
  319. ToggleFunc: WebDAVManager.WebDavToogle,
  320. GetEndpoints: WebDAVManager.WebDavGetEndpoints,
  321. })
  322. networkFileServerDaemon = append(networkFileServerDaemon, &fileservers.Server{
  323. ID: "sftp",
  324. Name: "SFTP",
  325. Desc: "SSH File Transfer Protocol Server",
  326. IconPath: "img/system/network-folder-sftp.svg",
  327. DefaultPorts: []int{2022},
  328. Ports: []int{},
  329. ForwardPortIfUpnp: true,
  330. ConnInstrPage: "SystemAO/disk/instr/sftp.html",
  331. ConfigPage: "SystemAO/disk/sftp.html",
  332. EnableCheck: SFTPManager.IsEnabled,
  333. ToggleFunc: SFTPManager.ServerToggle,
  334. GetEndpoints: SFTPManager.GetEndpoints,
  335. })
  336. networkFileServerDaemon = append(networkFileServerDaemon, &fileservers.Server{
  337. ID: "ftp",
  338. Name: "FTP",
  339. Desc: "File Transfer Protocol Server",
  340. IconPath: "img/system/network-folder.svg",
  341. DefaultPorts: []int{21, 22, 23},
  342. Ports: []int{},
  343. ForwardPortIfUpnp: true,
  344. ConnInstrPage: "SystemAO/disk/instr/ftp.html",
  345. ConfigPage: "SystemAO/disk/ftp.html",
  346. EnableCheck: FTPManager.IsFtpServerEnabled,
  347. ToggleFunc: FTPManager.FTPServerToggle,
  348. GetEndpoints: FTPManager.FTPGetEndpoints,
  349. })
  350. networkFileServerDaemon = append(networkFileServerDaemon, &fileservers.Server{
  351. ID: "dirserv",
  352. Name: "Directory Server",
  353. Desc: "Web file viewer for legacy devices",
  354. IconPath: "img/system/network-dirserv.svg",
  355. DefaultPorts: []int{},
  356. Ports: []int{},
  357. ForwardPortIfUpnp: false,
  358. ConnInstrPage: "SystemAO/disk/instr/dirserv.html",
  359. ConfigPage: "SystemAO/disk/dirserv.html",
  360. EnableCheck: DirListManager.DirServerEnabled,
  361. ToggleFunc: DirListManager.Toggle,
  362. GetEndpoints: DirListManager.ListEndpoints,
  363. })
  364. router.HandleFunc("/system/network/server/list", NetworkHandleGetFileServerServiceList)
  365. router.HandleFunc("/system/network/server/endpoints", NetworkHandleGetFileServerEndpoints)
  366. router.HandleFunc("/system/network/server/status", NetworkHandleGetFileServerStatus)
  367. adminRouter.HandleFunc("/system/network/server/toggle", NetworkHandleFileServerToggle)
  368. }
  369. // Toggle the target File Server Services
  370. func NetworkHandleFileServerToggle(w http.ResponseWriter, r *http.Request) {
  371. servid, err := utils.PostPara(r, "id")
  372. if err != nil {
  373. utils.SendErrorResponse(w, "invalid service id given")
  374. return
  375. }
  376. newState, err := utils.PostPara(r, "enable")
  377. if err != nil {
  378. utils.SendErrorResponse(w, "undefined enable state")
  379. return
  380. }
  381. targetfserv := fileservers.GetFileServerById(networkFileServerDaemon, servid)
  382. if targetfserv == nil {
  383. utils.SendErrorResponse(w, "target service not exists")
  384. return
  385. }
  386. if newState == "true" {
  387. //Start up the target service
  388. err = targetfserv.ToggleFunc(true)
  389. if err != nil {
  390. utils.SendErrorResponse(w, "startup failed: "+err.Error())
  391. return
  392. }
  393. } else if newState == "false" {
  394. err = targetfserv.ToggleFunc(false)
  395. if err != nil {
  396. utils.SendErrorResponse(w, "shutdown failed: "+err.Error())
  397. return
  398. }
  399. } else {
  400. utils.SendErrorResponse(w, "unknown state keyword")
  401. return
  402. }
  403. }
  404. // Return a list of supported File Server Services
  405. func NetworkHandleGetFileServerServiceList(w http.ResponseWriter, r *http.Request) {
  406. js, _ := json.Marshal(networkFileServerDaemon)
  407. utils.SendJSONResponse(w, string(js))
  408. }
  409. // Get the status of a file server type.
  410. func NetworkHandleGetFileServerStatus(w http.ResponseWriter, r *http.Request) {
  411. servid, _ := utils.GetPara(r, "id")
  412. if servid == "" {
  413. //List all state in map
  414. result := map[string]bool{}
  415. for _, fserv := range networkFileServerDaemon {
  416. result[fserv.ID] = fserv.EnableCheck()
  417. }
  418. js, _ := json.Marshal(result)
  419. utils.SendJSONResponse(w, string(js))
  420. } else {
  421. //ID is defined. Get the target server and return its status
  422. targetfserv := fileservers.GetFileServerById(networkFileServerDaemon, servid)
  423. if targetfserv == nil {
  424. utils.SendErrorResponse(w, "target file server type not found")
  425. return
  426. }
  427. js, _ := json.Marshal(targetfserv.EnableCheck())
  428. utils.SendJSONResponse(w, string(js))
  429. }
  430. }
  431. // Get a list of endpoint usable by this service
  432. func NetworkHandleGetFileServerEndpoints(w http.ResponseWriter, r *http.Request) {
  433. userinfo, err := userHandler.GetUserInfoFromRequest(w, r)
  434. if err != nil {
  435. utils.SendErrorResponse(w, "user not logged in")
  436. return
  437. }
  438. targetServerTypeID, _ := utils.GetPara(r, "fserv")
  439. targetServerTypeID = strings.TrimSpace(targetServerTypeID)
  440. if targetServerTypeID == "" {
  441. //List all the endpoints
  442. results := map[string][]*fileservers.Endpoint{}
  443. for _, fser := range networkFileServerDaemon {
  444. if fser.GetEndpoints == nil {
  445. results[fser.ID] = []*fileservers.Endpoint{}
  446. continue
  447. }
  448. thisEndpoints := fser.GetEndpoints(userinfo)
  449. results[fser.ID] = thisEndpoints
  450. }
  451. js, _ := json.Marshal(results)
  452. utils.SendJSONResponse(w, string(js))
  453. } else {
  454. //List the target endpoint
  455. for _, fser := range networkFileServerDaemon {
  456. if targetServerTypeID == fser.ID {
  457. thisEndpoints := fser.GetEndpoints(userinfo)
  458. js, _ := json.Marshal(thisEndpoints)
  459. utils.SendJSONResponse(w, string(js))
  460. return
  461. }
  462. }
  463. utils.SendErrorResponse(w, "target service not found")
  464. }
  465. }