mirror of
https://github.com/yusing/godoxy.git
synced 2025-05-20 20:52:33 +02:00
279 lines
7.2 KiB
Go
Executable file
279 lines
7.2 KiB
Go
Executable file
package route
|
|
|
|
import (
|
|
"errors"
|
|
"fmt"
|
|
"net/http"
|
|
"strings"
|
|
"sync"
|
|
|
|
"github.com/rs/zerolog"
|
|
"github.com/yusing/go-proxy/internal/docker/idlewatcher"
|
|
E "github.com/yusing/go-proxy/internal/error"
|
|
gphttp "github.com/yusing/go-proxy/internal/net/http"
|
|
"github.com/yusing/go-proxy/internal/net/http/loadbalancer"
|
|
"github.com/yusing/go-proxy/internal/net/http/middleware"
|
|
"github.com/yusing/go-proxy/internal/net/http/middleware/errorpage"
|
|
"github.com/yusing/go-proxy/internal/proxy/entry"
|
|
PT "github.com/yusing/go-proxy/internal/proxy/fields"
|
|
"github.com/yusing/go-proxy/internal/task"
|
|
F "github.com/yusing/go-proxy/internal/utils/functional"
|
|
"github.com/yusing/go-proxy/internal/watcher/health"
|
|
)
|
|
|
|
type (
|
|
HTTPRoute struct {
|
|
*entry.ReverseProxyEntry
|
|
|
|
HealthMon health.HealthMonitor `json:"health,omitempty"`
|
|
|
|
loadBalancer *loadbalancer.LoadBalancer
|
|
server *loadbalancer.Server
|
|
handler http.Handler
|
|
rp *gphttp.ReverseProxy
|
|
|
|
task task.Task
|
|
|
|
l zerolog.Logger
|
|
}
|
|
|
|
SubdomainKey = PT.Alias
|
|
|
|
ReverseProxyHandler struct {
|
|
*gphttp.ReverseProxy
|
|
}
|
|
)
|
|
|
|
var (
|
|
findMuxFunc = findMuxAnyDomain
|
|
|
|
httpRoutes = F.NewMapOf[string, *HTTPRoute]()
|
|
httpRoutesMu sync.Mutex
|
|
// globalMux = http.NewServeMux() // TODO: support regex subdomain matching.
|
|
)
|
|
|
|
func (rp ReverseProxyHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
|
rp.ReverseProxy.ServeHTTP(w, r)
|
|
}
|
|
|
|
func GetReverseProxies() F.Map[string, *HTTPRoute] {
|
|
return httpRoutes
|
|
}
|
|
|
|
func SetFindMuxDomains(domains []string) {
|
|
if len(domains) == 0 {
|
|
findMuxFunc = findMuxAnyDomain
|
|
} else {
|
|
findMuxFunc = findMuxByDomains(domains)
|
|
}
|
|
}
|
|
|
|
func NewHTTPRoute(entry *entry.ReverseProxyEntry) (impl, E.Error) {
|
|
var trans *http.Transport
|
|
|
|
if entry.NoTLSVerify {
|
|
trans = gphttp.DefaultTransportNoTLS.Clone()
|
|
} else {
|
|
trans = gphttp.DefaultTransport.Clone()
|
|
}
|
|
|
|
rp := gphttp.NewReverseProxy(string(entry.Alias), entry.URL, trans)
|
|
|
|
if len(entry.Middlewares) > 0 {
|
|
err := middleware.PatchReverseProxy(string(entry.Alias), rp, entry.Middlewares)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
|
|
r := &HTTPRoute{
|
|
ReverseProxyEntry: entry,
|
|
rp: rp,
|
|
l: logger.With().
|
|
Str("type", string(entry.Scheme)).
|
|
Str("name", string(entry.Alias)).
|
|
Logger(),
|
|
}
|
|
return r, nil
|
|
}
|
|
|
|
func (r *HTTPRoute) String() string {
|
|
return string(r.Alias)
|
|
}
|
|
|
|
// Start implements task.TaskStarter.
|
|
func (r *HTTPRoute) Start(providerSubtask task.Task) E.Error {
|
|
if entry.ShouldNotServe(r) {
|
|
providerSubtask.Finish("should not serve")
|
|
return nil
|
|
}
|
|
|
|
httpRoutesMu.Lock()
|
|
defer httpRoutesMu.Unlock()
|
|
|
|
if !entry.UseHealthCheck(r) && (entry.UseLoadBalance(r) || entry.UseIdleWatcher(r)) {
|
|
r.l.Error().Msg("healthCheck.disabled cannot be false when loadbalancer or idlewatcher is enabled")
|
|
if r.HealthCheck == nil {
|
|
r.HealthCheck = new(health.HealthCheckConfig)
|
|
}
|
|
r.HealthCheck.Disable = false
|
|
}
|
|
|
|
switch {
|
|
case entry.UseIdleWatcher(r):
|
|
wakerTask := providerSubtask.Parent().Subtask("waker for " + string(r.Alias))
|
|
waker, err := idlewatcher.NewHTTPWaker(wakerTask, r.ReverseProxyEntry, r.rp)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
r.handler = waker
|
|
r.HealthMon = waker
|
|
case entry.UseHealthCheck(r):
|
|
r.HealthMon = health.NewHTTPHealthMonitor(r.TargetURL(), r.HealthCheck, r.rp.Transport)
|
|
}
|
|
r.task = providerSubtask
|
|
|
|
if r.handler == nil {
|
|
switch {
|
|
case len(r.PathPatterns) == 1 && r.PathPatterns[0] == "/":
|
|
r.handler = ReverseProxyHandler{r.rp}
|
|
default:
|
|
mux := http.NewServeMux()
|
|
for _, p := range r.PathPatterns {
|
|
mux.HandleFunc(string(p), r.rp.ServeHTTP)
|
|
}
|
|
r.handler = mux
|
|
}
|
|
}
|
|
|
|
if r.HealthMon != nil {
|
|
healthMonTask := r.task.Subtask("health monitor")
|
|
if err := r.HealthMon.Start(healthMonTask); err != nil {
|
|
E.LogWarn("health monitor error", err, &r.l)
|
|
healthMonTask.Finish(err)
|
|
}
|
|
}
|
|
|
|
if entry.UseLoadBalance(r) {
|
|
r.addToLoadBalancer()
|
|
} else {
|
|
httpRoutes.Store(string(r.Alias), r)
|
|
r.task.OnFinished("remove from route table", func() {
|
|
httpRoutes.Delete(string(r.Alias))
|
|
})
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// Finish implements task.TaskFinisher.
|
|
func (r *HTTPRoute) Finish(reason any) {
|
|
r.task.Finish(reason)
|
|
}
|
|
|
|
func (r *HTTPRoute) addToLoadBalancer() {
|
|
var lb *loadbalancer.LoadBalancer
|
|
linked, ok := httpRoutes.Load(r.LoadBalance.Link)
|
|
if ok {
|
|
lb = linked.loadBalancer
|
|
lb.UpdateConfigIfNeeded(r.LoadBalance)
|
|
if linked.Raw.Homepage == nil && r.Raw.Homepage != nil {
|
|
linked.Raw.Homepage = r.Raw.Homepage
|
|
}
|
|
} else {
|
|
lb = loadbalancer.New(r.LoadBalance)
|
|
lbTask := r.task.Parent().Subtask("loadbalancer " + r.LoadBalance.Link)
|
|
lbTask.OnCancel("remove lb from routes", func() {
|
|
httpRoutes.Delete(r.LoadBalance.Link)
|
|
})
|
|
lb.Start(lbTask)
|
|
linked = &HTTPRoute{
|
|
ReverseProxyEntry: &entry.ReverseProxyEntry{
|
|
Raw: &entry.RawEntry{
|
|
Homepage: r.Raw.Homepage,
|
|
},
|
|
Alias: PT.Alias(lb.Link),
|
|
},
|
|
HealthMon: lb,
|
|
loadBalancer: lb,
|
|
handler: lb,
|
|
}
|
|
httpRoutes.Store(r.LoadBalance.Link, linked)
|
|
}
|
|
r.loadBalancer = lb
|
|
r.server = loadbalancer.NewServer(r.task.String(), r.rp.TargetURL, r.LoadBalance.Weight, r.handler, r.HealthMon)
|
|
lb.AddServer(r.server)
|
|
r.task.OnCancel("remove server from lb", func() {
|
|
lb.RemoveServer(r.server)
|
|
})
|
|
}
|
|
|
|
func ProxyHandler(w http.ResponseWriter, r *http.Request) {
|
|
mux, err := findMuxFunc(r.Host)
|
|
if err == nil {
|
|
mux.ServeHTTP(w, r)
|
|
return
|
|
}
|
|
// Why use StatusNotFound instead of StatusBadRequest or StatusBadGateway?
|
|
// On nginx, when route for domain does not exist, it returns StatusBadGateway.
|
|
// Then scraper / scanners will know the subdomain is invalid.
|
|
// With StatusNotFound, they won't know whether it's the path, or the subdomain that is invalid.
|
|
if !middleware.ServeStaticErrorPageFile(w, r) {
|
|
logger.Err(err).Str("method", r.Method).Str("url", r.URL.String()).Msg("request")
|
|
errorPage, ok := errorpage.GetErrorPageByStatus(http.StatusNotFound)
|
|
if ok {
|
|
w.WriteHeader(http.StatusNotFound)
|
|
w.Header().Set("Content-Type", "text/html; charset=utf-8")
|
|
if _, err := w.Write(errorPage); err != nil {
|
|
logger.Err(err).Msg("failed to write error page")
|
|
}
|
|
} else {
|
|
http.Error(w, err.Error(), http.StatusNotFound)
|
|
}
|
|
}
|
|
}
|
|
|
|
func findMuxAnyDomain(host string) (http.Handler, error) {
|
|
hostSplit := strings.Split(host, ".")
|
|
n := len(hostSplit)
|
|
switch {
|
|
case n == 3:
|
|
host = hostSplit[0]
|
|
case n > 3:
|
|
var builder strings.Builder
|
|
builder.Grow(2*n - 3)
|
|
builder.WriteString(hostSplit[0])
|
|
for _, part := range hostSplit[:n-2] {
|
|
builder.WriteRune('.')
|
|
builder.WriteString(part)
|
|
}
|
|
host = builder.String()
|
|
default:
|
|
return nil, errors.New("missing subdomain in url")
|
|
}
|
|
if r, ok := httpRoutes.Load(host); ok {
|
|
return r.handler, nil
|
|
}
|
|
return nil, fmt.Errorf("no such route: %s", host)
|
|
}
|
|
|
|
func findMuxByDomains(domains []string) func(host string) (http.Handler, error) {
|
|
return func(host string) (http.Handler, error) {
|
|
var subdomain string
|
|
|
|
for _, domain := range domains {
|
|
if strings.HasSuffix(host, domain) {
|
|
subdomain = strings.TrimSuffix(host, domain)
|
|
break
|
|
}
|
|
}
|
|
|
|
if subdomain != "" { // matched
|
|
if r, ok := httpRoutes.Load(subdomain); ok {
|
|
return r.handler, nil
|
|
}
|
|
return nil, fmt.Errorf("no such route: %s", subdomain)
|
|
}
|
|
return nil, fmt.Errorf("%s does not match any base domain", host)
|
|
}
|
|
}
|