support the configure of url in "http" section

This commit is contained in:
XueBing 2016-12-18 22:40:58 +08:00
parent 47db75e921
commit edf4bc431d
10 changed files with 227 additions and 106 deletions

View File

@ -63,7 +63,8 @@
listen_port: "<<< .ListenPort >>>", listen_port: "<<< .ListenPort >>>",
current_conns: <<< .CurrentConns >>> , current_conns: <<< .CurrentConns >>> ,
domains: [ <<< range.CustomDomains >>> "<<< . >>>", <<< end >>> ], domains: [ <<< range.CustomDomains >>> "<<< . >>>", <<< end >>> ],
stat: "<<< .Status >>>", locations: [ <<< range.Locations >>> "<<< . >>>", <<< end >>> ],
stat: "<<< .StatusDesc >>>",
use_encryption: "<<< .UseEncryption >>>", use_encryption: "<<< .UseEncryption >>>",
use_gzip: "<<< .UseGzip >>>", use_gzip: "<<< .UseGzip >>>",
privilege_mode: "<<< .PrivilegeMode >>>", privilege_mode: "<<< .PrivilegeMode >>>",
@ -222,6 +223,10 @@
newrow += "<tr class='info_detail'><td colspan='4'>Domains</td><td colspan='4'>" + newrow += "<tr class='info_detail'><td colspan='4'>Domains</td><td colspan='4'>" +
alldata[index].domains[domainindex] + "</td><tr>"; alldata[index].domains[domainindex] + "</td><tr>";
} }
for (var locindex in alldata[index].locations) {
newrow += "<tr class='info_detail'><td colspan='4'>Locations</td><td colspan='4'>" +
alldata[index].locations[locindex] + "</td><tr>";
}
newrow += "<tr class='info_detail'><td colspan='4'>Ip</td><td colspan='4'>" + alldata[index].bind_addr + "</td><tr>"; newrow += "<tr class='info_detail'><td colspan='4'>Ip</td><td colspan='4'>" + alldata[index].bind_addr + "</td><tr>";
newrow += "<tr class='info_detail'><td colspan='4'>Status</td><td colspan='4'>" + alldata[index].stat + "</td><tr>"; newrow += "<tr class='info_detail'><td colspan='4'>Status</td><td colspan='4'>" + alldata[index].stat + "</td><tr>";
newrow += "<tr class='info_detail'><td colspan='4'>Encryption</td><td colspan='4'>" + alldata[index].use_encryption + "</td><tr>"; newrow += "<tr class='info_detail'><td colspan='4'>Encryption</td><td colspan='4'>" + alldata[index].use_encryption + "</td><tr>";

View File

@ -313,7 +313,8 @@ func doLogin(req *msg.ControlReq, c *conn.Conn) (ret int64, info string) {
} }
// update metric's proxy status // update metric's proxy status
metric.SetProxyInfo(s.Name, s.Type, s.BindAddr, s.UseEncryption, s.UseGzip, s.PrivilegeMode, s.CustomDomains, s.ListenPort) //metric.SetProxyInfo(s.Name, s.Type, s.BindAddr, s.UseEncryption, s.UseGzip, s.PrivilegeMode, s.CustomDomains, s.ListenPort)
metric.SetProxyInfo(*s.ProxyServerConf)
// start proxy and listen for user connections, no block // start proxy and listen for user connections, no block
err := s.Start(c) err := s.Start(c)

View File

@ -15,16 +15,26 @@
package config package config
type BaseConf struct { type BaseConf struct {
Name string Name string `json:"name"`
AuthToken string AuthToken string `json:"-"`
Type string Type string `json:"type"`
UseEncryption bool UseEncryption bool `json:"use_encryption"`
UseGzip bool UseGzip bool `json:"use_gzip"`
PrivilegeMode bool PrivilegeMode bool `json:"privilege_mode"`
PrivilegeToken string PrivilegeToken string `json:"-"`
PoolCount int64 PoolCount int64 `json:"pool_count"`
HostHeaderRewrite string HostHeaderRewrite string `json:"host_header_rewrite"`
HttpUserName string HttpUserName string `json:"http_username"`
HttpPassWord string HttpPassWord string `json:"-"`
SubDomain string SubDomain string `json:"subdomain"`
}
type ProxyServerConf struct {
BaseConf
BindAddr string `json:"bind_addr"`
ListenPort int64 `json:"bind_port"`
CustomDomains []string `json:"custom_domains"`
Locations []string `json:"custom_locations"`
Status int64 `json:"status"`
} }

View File

@ -19,6 +19,7 @@ import (
"sync" "sync"
"time" "time"
"github.com/fatedier/frp/src/models/config"
"github.com/fatedier/frp/src/models/consts" "github.com/fatedier/frp/src/models/consts"
) )
@ -29,15 +30,8 @@ var (
) )
type ServerMetric struct { type ServerMetric struct {
Name string `json:"name"` config.ProxyServerConf
Type string `json:"type"` StatusDesc string `json:"status_desc"`
BindAddr string `json:"bind_addr"`
ListenPort int64 `json:"listen_port"`
CustomDomains []string `json:"custom_domains"`
Status string `json:"status"`
UseEncryption bool `json:"use_encryption"`
UseGzip bool `json:"use_gzip"`
PrivilegeMode bool `json:"privilege_mode"`
// statistics // statistics
CurrentConns int64 `json:"current_conns"` CurrentConns int64 `json:"current_conns"`
@ -110,24 +104,16 @@ func GetProxyMetrics(proxyName string) *ServerMetric {
} }
} }
func SetProxyInfo(proxyName string, proxyType, bindAddr string, func SetProxyInfo(p config.ProxyServerConf) {
useEncryption, useGzip, privilegeMode bool, customDomains []string,
listenPort int64) {
smMutex.Lock() smMutex.Lock()
info, ok := ServerMetricInfoMap[proxyName] info, ok := ServerMetricInfoMap[p.Name]
if !ok { if !ok {
info = &ServerMetric{} info = &ServerMetric{}
info.Daily = make([]*DailyServerStats, 0) info.Daily = make([]*DailyServerStats, 0)
} }
info.Name = proxyName
info.Type = proxyType info.ProxyServerConf = p
info.UseEncryption = useEncryption ServerMetricInfoMap[p.Name] = info
info.UseGzip = useGzip
info.PrivilegeMode = privilegeMode
info.BindAddr = bindAddr
info.ListenPort = listenPort
info.CustomDomains = customDomains
ServerMetricInfoMap[proxyName] = info
smMutex.Unlock() smMutex.Unlock()
} }
@ -137,7 +123,7 @@ func SetStatus(proxyName string, status int64) {
smMutex.RUnlock() smMutex.RUnlock()
if ok { if ok {
metric.mutex.Lock() metric.mutex.Lock()
metric.Status = consts.StatusStr[status] metric.StatusDesc = consts.StatusStr[status]
metric.mutex.Unlock() metric.mutex.Unlock()
} }
} }

View File

@ -296,6 +296,12 @@ func loadProxyConf(confFile string) (proxyServers map[string]*ProxyServer, err e
} else { } else {
return proxyServers, fmt.Errorf("Parse conf error: proxy [%s] custom_domains must be set when type equals http", proxyServer.Name) return proxyServers, fmt.Errorf("Parse conf error: proxy [%s] custom_domains must be set when type equals http", proxyServer.Name)
} }
//location
locStr, loc_ok := section["custom_location"]
if loc_ok {
proxyServer.Locations = strings.Split(locStr, ",")
}
} else if proxyServer.Type == "https" { } else if proxyServer.Type == "https" {
// for https // for https
proxyServer.ListenPort = VhostHttpsPort proxyServer.ListenPort = VhostHttpsPort
@ -318,9 +324,8 @@ func loadProxyConf(confFile string) (proxyServers map[string]*ProxyServer, err e
} }
// set metric statistics of all proxies // set metric statistics of all proxies
for name, p := range proxyServers { for _, p := range proxyServers {
metric.SetProxyInfo(name, p.Type, p.BindAddr, p.UseEncryption, p.UseGzip, metric.SetProxyInfo(*p.ProxyServerConf)
p.PrivilegeMode, p.CustomDomains, p.ListenPort)
} }
return proxyServers, nil return proxyServers, nil
} }
@ -381,8 +386,7 @@ func CreateProxy(s *ProxyServer) error {
} }
} }
ProxyServers[s.Name] = s ProxyServers[s.Name] = s
metric.SetProxyInfo(s.Name, s.Type, s.BindAddr, s.UseEncryption, s.UseGzip, metric.SetProxyInfo(*s.ProxyServerConf)
s.PrivilegeMode, s.CustomDomains, s.ListenPort)
s.Init() s.Init()
return nil return nil
} }

View File

@ -33,13 +33,9 @@ type Listener interface {
} }
type ProxyServer struct { type ProxyServer struct {
config.BaseConf *config.ProxyServerConf
BindAddr string
ListenPort int64
CustomDomains []string
Status int64 CtlConn *conn.Conn `json:"-"` // control connection with frpc
CtlConn *conn.Conn // control connection with frpc
listeners []Listener // accept new connection from remote users listeners []Listener // accept new connection from remote users
ctlMsgChan chan int64 // every time accept a new user conn, put "1" to the channel ctlMsgChan chan int64 // every time accept a new user conn, put "1" to the channel
workConnChan chan *conn.Conn // get new work conns from control goroutine workConnChan chan *conn.Conn // get new work conns from control goroutine
@ -48,8 +44,9 @@ type ProxyServer struct {
} }
func NewProxyServer() (p *ProxyServer) { func NewProxyServer() (p *ProxyServer) {
psc := &config.ProxyServerConf{CustomDomains: make([]string, 0)}
p = &ProxyServer{ p = &ProxyServer{
CustomDomains: make([]string, 0), ProxyServerConf: psc,
} }
return p return p
} }
@ -101,6 +98,15 @@ func (p *ProxyServer) Compare(p2 *ProxyServer) bool {
return false return false
} }
} }
if len(p.Locations) != len(p2.Locations) {
return false
}
for i, _ := range p.Locations {
if p.Locations[i] != p2.Locations[i] {
return false
}
}
return true return true
} }
@ -123,27 +129,13 @@ func (p *ProxyServer) Start(c *conn.Conn) (err error) {
} }
p.listeners = append(p.listeners, l) p.listeners = append(p.listeners, l)
} else if p.Type == "http" { } else if p.Type == "http" {
for _, domain := range p.CustomDomains { ls := VhostHttpMuxer.Listen(p.ProxyServerConf)
l, err := VhostHttpMuxer.Listen(domain, p.HostHeaderRewrite, p.HttpUserName, p.HttpPassWord) for _, l := range ls {
if err != nil {
return err
}
p.listeners = append(p.listeners, l) p.listeners = append(p.listeners, l)
} }
if p.SubDomain != "" {
l, err := VhostHttpMuxer.Listen(p.SubDomain, p.HostHeaderRewrite, p.HttpUserName, p.HttpPassWord)
if err != nil {
return err
}
p.listeners = append(p.listeners, l)
}
} else if p.Type == "https" { } else if p.Type == "https" {
for _, domain := range p.CustomDomains { ls := VhostHttpsMuxer.Listen(p.ProxyServerConf)
l, err := VhostHttpsMuxer.Listen(domain, p.HostHeaderRewrite, p.HttpUserName, p.HttpPassWord) for _, l := range ls {
if err != nil {
return err
}
p.listeners = append(p.listeners, l) p.listeners = append(p.listeners, l)
} }
} }

View File

@ -45,6 +45,8 @@ func GetHttpRequestInfo(c *conn.Conn) (_ net.Conn, _ map[string]string, err erro
// hostName // hostName
tmpArr := strings.Split(request.Host, ":") tmpArr := strings.Split(request.Host, ":")
reqInfoMap["Host"] = tmpArr[0] reqInfoMap["Host"] = tmpArr[0]
reqInfoMap["Path"] = request.URL.Path
reqInfoMap["Scheme"] = request.URL.Scheme
// Authorization // Authorization
authStr := request.Header.Get("Authorization") authStr := request.Header.Get("Authorization")

View File

@ -186,5 +186,6 @@ func GetHttpsHostname(c *conn.Conn) (sc net.Conn, _ map[string]string, err error
return sc, reqInfoMap, err return sc, reqInfoMap, err
} }
reqInfoMap["Host"] = host reqInfoMap["Host"] = host
reqInfoMap["Scheme"] = "https"
return sc, reqInfoMap, nil return sc, reqInfoMap, nil
} }

107
src/utils/vhost/router.go Normal file
View File

@ -0,0 +1,107 @@
package vhost
import (
"sort"
"strings"
"sync"
)
type VhostRouters struct {
RouterByDomain map[string][]*VhostRouter
mutex sync.RWMutex
}
type VhostRouter struct {
name string
domain string
location string
listener *Listener
}
func NewVhostRouters() *VhostRouters {
return &VhostRouters{
RouterByDomain: make(map[string][]*VhostRouter),
}
}
//sort by location
type ByLocation []*VhostRouter
func (a ByLocation) Len() int {
return len(a)
}
func (a ByLocation) Swap(i, j int) {
a[i], a[j] = a[j], a[i]
}
func (a ByLocation) Less(i, j int) bool {
return strings.Compare(a[i].location, a[j].location) < 0
}
func (r *VhostRouters) add(name, domain string, locations []string, l *Listener) {
r.mutex.Lock()
defer r.mutex.Unlock()
vrs, found := r.RouterByDomain[domain]
if !found {
vrs = make([]*VhostRouter, 0)
}
for _, loc := range locations {
vr := &VhostRouter{
name: name,
domain: domain,
location: loc,
listener: l,
}
vrs = append(vrs, vr)
}
sort.Reverse(ByLocation(vrs))
r.RouterByDomain[domain] = vrs
}
func (r *VhostRouters) del(l *Listener) {
r.mutex.Lock()
defer r.mutex.Unlock()
vrs, found := r.RouterByDomain[l.domain]
if !found {
return
}
for i, vr := range vrs {
if vr.listener == l {
if len(vrs) > i+1 {
r.RouterByDomain[l.domain] = append(vrs[:i], vrs[i+1:]...)
} else {
r.RouterByDomain[l.domain] = vrs[:i]
}
}
}
}
func (r *VhostRouters) get(rname string) (vr *VhostRouter, exist bool) {
r.mutex.RLock()
defer r.mutex.RUnlock()
var domain, url string
tmparray := strings.SplitN(rname, ":", 2)
if len(tmparray) == 2 {
domain = tmparray[0]
url = tmparray[1]
}
vrs, exist := r.RouterByDomain[domain]
if !exist {
return
}
//can't support load balance,will to do
for _, vr = range vrs {
if strings.HasPrefix(url, vr.location) {
return vr, true
}
}
return
}

View File

@ -21,7 +21,9 @@ import (
"sync" "sync"
"time" "time"
"github.com/fatedier/frp/src/models/config"
"github.com/fatedier/frp/src/utils/conn" "github.com/fatedier/frp/src/utils/conn"
"github.com/fatedier/frp/src/utils/log"
) )
type muxFunc func(*conn.Conn) (net.Conn, map[string]string, error) type muxFunc func(*conn.Conn) (net.Conn, map[string]string, error)
@ -29,71 +31,77 @@ type httpAuthFunc func(*conn.Conn, string, string, string) (bool, error)
type hostRewriteFunc func(*conn.Conn, string) (net.Conn, error) type hostRewriteFunc func(*conn.Conn, string) (net.Conn, error)
type VhostMuxer struct { type VhostMuxer struct {
listener *conn.Listener listener *conn.Listener
timeout time.Duration timeout time.Duration
vhostFunc muxFunc vhostFunc muxFunc
authFunc httpAuthFunc authFunc httpAuthFunc
rewriteFunc hostRewriteFunc rewriteFunc hostRewriteFunc
registryMap map[string]*Listener registryRouter *VhostRouters
mutex sync.RWMutex mutex sync.RWMutex
} }
func NewVhostMuxer(listener *conn.Listener, vhostFunc muxFunc, authFunc httpAuthFunc, rewriteFunc hostRewriteFunc, timeout time.Duration) (mux *VhostMuxer, err error) { func NewVhostMuxer(listener *conn.Listener, vhostFunc muxFunc, authFunc httpAuthFunc, rewriteFunc hostRewriteFunc, timeout time.Duration) (mux *VhostMuxer, err error) {
mux = &VhostMuxer{ mux = &VhostMuxer{
listener: listener, listener: listener,
timeout: timeout, timeout: timeout,
vhostFunc: vhostFunc, vhostFunc: vhostFunc,
authFunc: authFunc, authFunc: authFunc,
rewriteFunc: rewriteFunc, rewriteFunc: rewriteFunc,
registryMap: make(map[string]*Listener), registryRouter: NewVhostRouters(),
} }
go mux.run() go mux.run()
return mux, nil return mux, nil
} }
// listen for a new domain name, if rewriteHost is not empty and rewriteFunc is not nil, then rewrite the host header to rewriteHost // listen for a new domain name, if rewriteHost is not empty and rewriteFunc is not nil, then rewrite the host header to rewriteHost
func (v *VhostMuxer) Listen(name string, rewriteHost, userName, passWord string) (l *Listener, err error) { func (v *VhostMuxer) Listen(p *config.ProxyServerConf) (ls []*Listener) {
v.mutex.Lock() v.mutex.Lock()
defer v.mutex.Unlock() defer v.mutex.Unlock()
if _, exist := v.registryMap[name]; exist {
return nil, fmt.Errorf("domain name %s is already bound", name)
}
l = &Listener{ ls = make([]*Listener, 0)
name: name, for _, domain := range p.CustomDomains {
rewriteHost: rewriteHost, l := &Listener{
userName: userName, name: p.Name,
passWord: passWord, domain: domain,
mux: v, locations: p.Locations,
accept: make(chan *conn.Conn), rewriteHost: p.HostHeaderRewrite,
userName: p.HttpUserName,
passWord: p.HttpPassWord,
mux: v,
accept: make(chan *conn.Conn),
}
v.registryRouter.add(p.Name, domain, p.Locations, l)
ls = append(ls, l)
} }
v.registryMap[name] = l return ls
return l, nil
} }
func (v *VhostMuxer) getListener(name string) (l *Listener, exist bool) { func (v *VhostMuxer) getListener(name string) (l *Listener, exist bool) {
v.mutex.RLock() v.mutex.RLock()
defer v.mutex.RUnlock() defer v.mutex.RUnlock()
// first we check the full hostname
// if not exist, then check the wildcard_domain such as *.example.com // // first we check the full hostname
l, exist = v.registryMap[name] vr, found := v.registryRouter.get(name)
if exist { if found {
return l, exist return vr.listener, true
} }
//if not exist, then check the wildcard_domain such as *.example.com
domainSplit := strings.Split(name, ".") domainSplit := strings.Split(name, ".")
if len(domainSplit) < 3 { if len(domainSplit) < 3 {
log.Warn("can't found the router for %s", name)
return l, false return l, false
} }
domainSplit[0] = "*" domainSplit[0] = "*"
name = strings.Join(domainSplit, ".") name = strings.Join(domainSplit, ".")
l, exist = v.registryMap[name]
return l, exist
}
func (v *VhostMuxer) unRegister(name string) { vr, found = v.registryRouter.get(name)
v.mutex.Lock() if !found {
defer v.mutex.Unlock() log.Warn("can't found the router for %s", name)
delete(v.registryMap, name) return
}
return vr.listener, true
} }
func (v *VhostMuxer) run() { func (v *VhostMuxer) run() {
@ -120,6 +128,9 @@ func (v *VhostMuxer) handle(c *conn.Conn) {
name := strings.ToLower(reqInfoMap["Host"]) name := strings.ToLower(reqInfoMap["Host"])
// get listener by hostname // get listener by hostname
if reqInfoMap["Scheme"] == "http" {
name = name + ":" + reqInfoMap["Path"]
}
l, ok := v.getListener(name) l, ok := v.getListener(name)
if !ok { if !ok {
c.Close() c.Close()
@ -150,6 +161,8 @@ func (v *VhostMuxer) handle(c *conn.Conn) {
type Listener struct { type Listener struct {
name string name string
domain string
locations []string
rewriteHost string rewriteHost string
userName string userName string
passWord string passWord string
@ -177,7 +190,7 @@ func (l *Listener) Accept() (*conn.Conn, error) {
} }
func (l *Listener) Close() error { func (l *Listener) Close() error {
l.mux.unRegister(l.name) l.mux.registryRouter.del(l)
close(l.accept) close(l.accept)
return nil return nil
} }