reverseproxy.go 4.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163
  1. package main
  2. import (
  3. "encoding/json"
  4. "log"
  5. "net/http"
  6. module "imuslab.com/arozos/mod/modules"
  7. "imuslab.com/arozos/mod/network/dynamicproxy"
  8. prout "imuslab.com/arozos/mod/prouter"
  9. )
  10. var (
  11. dynamicProxyRouter *dynamicproxy.Router
  12. )
  13. //Add user customizable reverse proxy
  14. func ReverseProxtInit() {
  15. dprouter, err := dynamicproxy.NewDynamicProxy(80)
  16. if err != nil {
  17. log.Println(err.Error())
  18. return
  19. }
  20. dynamicProxyRouter = dprouter
  21. //Register the module
  22. moduleHandler.RegisterModule(module.ModuleInfo{
  23. Name: "Reverse Proxy",
  24. Desc: "Setup reverse proxy to other nearby services",
  25. Group: "System Settings",
  26. IconPath: "SystemAO/reverse_proxy/img/small_icon.png",
  27. Version: "1.0",
  28. StartDir: "SystemAO/reverse_proxy/index.html",
  29. SupportFW: true,
  30. InitFWSize: []int{1080, 580},
  31. LaunchFWDir: "SystemAO/reverse_proxy/index.html",
  32. SupportEmb: false,
  33. })
  34. //Register HybridBackup storage restore endpoints
  35. router := prout.NewModuleRouter(prout.RouterOption{
  36. ModuleName: "Reverse Proxy",
  37. AdminOnly: false,
  38. UserHandler: userHandler,
  39. DeniedHandler: func(w http.ResponseWriter, r *http.Request) {
  40. sendErrorResponse(w, "Permission Denied")
  41. },
  42. })
  43. router.HandleFunc("/system/proxy/enable", ReverseProxyHandleOnOff)
  44. router.HandleFunc("/system/proxy/add", ReverseProxyHandleAddEndpoint)
  45. router.HandleFunc("/system/proxy/status", ReverseProxyStatus)
  46. router.HandleFunc("/system/proxy/list", ReverseProxyList)
  47. /*
  48. dynamicProxyRouter.SetRootProxy("192.168.0.107:8080", false)
  49. dynamicProxyRouter.AddSubdomainRoutingService("loopback.localhost", "localhost:8080", false)
  50. dynamicProxyRouter.StartProxyService()
  51. go func() {
  52. time.Sleep(10 * time.Second)
  53. dynamicProxyRouter.StopProxyService()
  54. fmt.Println("Proxy stopped")
  55. }()
  56. log.Println("Dynamic Proxy service started")
  57. */
  58. }
  59. func ReverseProxyHandleOnOff(w http.ResponseWriter, r *http.Request) {
  60. enable, _ := mv(r, "enable", true) //Support root, vdir and subd
  61. if enable == "true" {
  62. err := dynamicProxyRouter.StartProxyService()
  63. if err != nil {
  64. sendErrorResponse(w, err.Error())
  65. return
  66. }
  67. } else {
  68. err := dynamicProxyRouter.StopProxyService()
  69. if err != nil {
  70. sendErrorResponse(w, err.Error())
  71. return
  72. }
  73. }
  74. sendOK(w)
  75. }
  76. func ReverseProxyHandleAddEndpoint(w http.ResponseWriter, r *http.Request) {
  77. eptype, err := mv(r, "type", true) //Support root, vdir and subd
  78. if err != nil {
  79. sendErrorResponse(w, "type not defined")
  80. return
  81. }
  82. endpoint, err := mv(r, "ep", true)
  83. if err != nil {
  84. sendErrorResponse(w, "endpoint not defined")
  85. return
  86. }
  87. tls, _ := mv(r, "tls", true)
  88. if tls == "" {
  89. tls = "false"
  90. }
  91. useTLS := (tls == "true")
  92. if eptype == "vdir" {
  93. vdir, err := mv(r, "vdir", true)
  94. if err != nil {
  95. sendErrorResponse(w, "vdir not defined")
  96. return
  97. }
  98. dynamicProxyRouter.AddProxyService(vdir, endpoint, useTLS)
  99. } else if eptype == "subd" {
  100. subdomain, err := mv(r, "subdomain", true)
  101. if err != nil {
  102. sendErrorResponse(w, "subdomain not defined")
  103. return
  104. }
  105. dynamicProxyRouter.AddSubdomainRoutingService(subdomain, endpoint, useTLS)
  106. } else if eptype == "root" {
  107. dynamicProxyRouter.SetRootProxy(endpoint, useTLS)
  108. }
  109. sendOK(w)
  110. }
  111. func ReverseProxyStatus(w http.ResponseWriter, r *http.Request) {
  112. js, _ := json.Marshal(dynamicProxyRouter)
  113. sendJSONResponse(w, string(js))
  114. }
  115. func ReverseProxyList(w http.ResponseWriter, r *http.Request) {
  116. eptype, err := mv(r, "type", true) //Support root, vdir and subd
  117. if err != nil {
  118. sendErrorResponse(w, "type not defined")
  119. return
  120. }
  121. if eptype == "vdir" {
  122. results := []*dynamicproxy.ProxyEndpoint{}
  123. dynamicProxyRouter.ProxyEndpoints.Range(func(key, value interface{}) bool {
  124. results = append(results, value.(*dynamicproxy.ProxyEndpoint))
  125. return true
  126. })
  127. js, _ := json.Marshal(results)
  128. sendJSONResponse(w, string(js))
  129. } else if eptype == "subd" {
  130. results := []*dynamicproxy.SubdomainEndpoint{}
  131. dynamicProxyRouter.SubdomainEndpoint.Range(func(key, value interface{}) bool {
  132. results = append(results, value.(*dynamicproxy.SubdomainEndpoint))
  133. return true
  134. })
  135. js, _ := json.Marshal(results)
  136. sendJSONResponse(w, string(js))
  137. } else {
  138. sendErrorResponse(w, "Invalid type given")
  139. }
  140. }