2019-10-04 06:00:41 +08:00
|
|
|
// Copyright 2015 Matthew Holt and The Caddy Authors
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
package reverseproxy
|
|
|
|
|
|
|
|
import (
|
|
|
|
"encoding/json"
|
|
|
|
"flag"
|
2019-11-01 01:34:54 +08:00
|
|
|
"fmt"
|
2019-10-04 06:00:41 +08:00
|
|
|
"net/http"
|
2020-04-28 05:53:38 +08:00
|
|
|
"strconv"
|
2019-10-04 06:00:41 +08:00
|
|
|
|
|
|
|
"github.com/caddyserver/caddy/v2"
|
|
|
|
"github.com/caddyserver/caddy/v2/caddyconfig"
|
2020-04-28 05:53:38 +08:00
|
|
|
"github.com/caddyserver/caddy/v2/caddyconfig/httpcaddyfile"
|
2019-10-04 06:00:41 +08:00
|
|
|
caddycmd "github.com/caddyserver/caddy/v2/cmd"
|
|
|
|
"github.com/caddyserver/caddy/v2/modules/caddyhttp"
|
|
|
|
"github.com/caddyserver/caddy/v2/modules/caddyhttp/headers"
|
2022-05-30 04:33:01 +08:00
|
|
|
"github.com/caddyserver/caddy/v2/modules/caddytls"
|
2019-10-04 06:00:41 +08:00
|
|
|
)
|
|
|
|
|
|
|
|
func init() {
|
|
|
|
caddycmd.RegisterCommand(caddycmd.Command{
|
|
|
|
Name: "reverse-proxy",
|
|
|
|
Func: cmdReverseProxy,
|
2020-02-28 11:52:41 +08:00
|
|
|
Usage: "[--from <addr>] [--to <addr>] [--change-host-header]",
|
2019-10-04 06:00:41 +08:00
|
|
|
Short: "A quick and production-ready reverse proxy",
|
|
|
|
Long: `
|
|
|
|
A simple but production-ready reverse proxy. Useful for quick deployments,
|
|
|
|
demos, and development.
|
|
|
|
|
2020-04-28 05:53:38 +08:00
|
|
|
Simply shuttles HTTP(S) traffic from the --from address to the --to address.
|
2022-09-16 02:35:38 +08:00
|
|
|
Multiple --to addresses may be specified by repeating the flag.
|
2019-10-04 06:00:41 +08:00
|
|
|
|
2020-04-28 05:53:38 +08:00
|
|
|
Unless otherwise specified in the addresses, the --from address will be
|
|
|
|
assumed to be HTTPS if a hostname is given, and the --to address will be
|
|
|
|
assumed to be HTTP.
|
|
|
|
|
|
|
|
If the --from address has a host or IP, Caddy will attempt to serve the
|
|
|
|
proxy over HTTPS with a certificate (unless overridden by the HTTP scheme
|
|
|
|
or port).
|
2020-02-28 11:52:41 +08:00
|
|
|
|
|
|
|
If --change-host-header is set, the Host header on the request will be modified
|
|
|
|
from its original incoming value to the address of the upstream. (Otherwise, by
|
|
|
|
default, all incoming headers are passed through unmodified.)
|
2019-10-04 06:00:41 +08:00
|
|
|
`,
|
|
|
|
Flags: func() *flag.FlagSet {
|
2020-06-22 12:40:54 +08:00
|
|
|
fs := flag.NewFlagSet("reverse-proxy", flag.ExitOnError)
|
2020-04-28 05:53:38 +08:00
|
|
|
fs.String("from", "localhost", "Address on which to receive traffic")
|
2022-09-16 02:35:38 +08:00
|
|
|
fs.Var(&reverseProxyCmdTo, "to", "Upstream address(es) to which traffic should be sent")
|
2020-02-28 11:52:41 +08:00
|
|
|
fs.Bool("change-host-header", false, "Set upstream Host header to address of upstream")
|
2021-10-12 06:15:00 +08:00
|
|
|
fs.Bool("insecure", false, "Disable TLS verification (WARNING: DISABLES SECURITY BY NOT VERIFYING SSL CERTIFICATES!)")
|
2022-05-30 04:33:01 +08:00
|
|
|
fs.Bool("internal-certs", false, "Use internal CA for issuing certs")
|
2019-10-04 06:00:41 +08:00
|
|
|
return fs
|
|
|
|
}(),
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func cmdReverseProxy(fs caddycmd.Flags) (int, error) {
|
2020-05-22 03:09:49 +08:00
|
|
|
caddy.TrapSignals()
|
|
|
|
|
2019-10-04 06:00:41 +08:00
|
|
|
from := fs.String("from")
|
2020-02-28 11:52:41 +08:00
|
|
|
changeHost := fs.Bool("change-host-header")
|
2020-05-13 00:43:18 +08:00
|
|
|
insecure := fs.Bool("insecure")
|
2022-05-30 04:33:01 +08:00
|
|
|
internalCerts := fs.Bool("internal-certs")
|
2019-10-04 06:00:41 +08:00
|
|
|
|
2020-04-28 05:53:38 +08:00
|
|
|
httpPort := strconv.Itoa(caddyhttp.DefaultHTTPPort)
|
|
|
|
httpsPort := strconv.Itoa(caddyhttp.DefaultHTTPSPort)
|
|
|
|
|
2022-09-16 02:35:38 +08:00
|
|
|
if len(reverseProxyCmdTo) == 0 {
|
2020-04-28 05:53:38 +08:00
|
|
|
return caddy.ExitCodeFailedStartup, fmt.Errorf("--to is required")
|
2019-10-04 06:00:41 +08:00
|
|
|
}
|
|
|
|
|
2020-04-28 05:53:38 +08:00
|
|
|
// set up the downstream address; assume missing information from given parts
|
|
|
|
fromAddr, err := httpcaddyfile.ParseAddress(from)
|
|
|
|
if err != nil {
|
|
|
|
return caddy.ExitCodeFailedStartup, fmt.Errorf("invalid downstream address %s: %v", from, err)
|
|
|
|
}
|
|
|
|
if fromAddr.Path != "" {
|
|
|
|
return caddy.ExitCodeFailedStartup, fmt.Errorf("paths are not allowed: %s", from)
|
2019-10-04 06:00:41 +08:00
|
|
|
}
|
2020-04-28 05:53:38 +08:00
|
|
|
if fromAddr.Scheme == "" {
|
|
|
|
if fromAddr.Port == httpPort || fromAddr.Host == "" {
|
|
|
|
fromAddr.Scheme = "http"
|
|
|
|
} else {
|
|
|
|
fromAddr.Scheme = "https"
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if fromAddr.Port == "" {
|
|
|
|
if fromAddr.Scheme == "http" {
|
|
|
|
fromAddr.Port = httpPort
|
|
|
|
} else if fromAddr.Scheme == "https" {
|
|
|
|
fromAddr.Port = httpsPort
|
|
|
|
}
|
2019-11-01 01:34:54 +08:00
|
|
|
}
|
2019-10-04 06:00:41 +08:00
|
|
|
|
2020-04-28 05:53:38 +08:00
|
|
|
// set up the upstream address; assume missing information from given parts
|
2022-09-16 02:35:38 +08:00
|
|
|
// mixing schemes isn't supported, so use first defined (if available)
|
|
|
|
toAddresses := make([]string, len(reverseProxyCmdTo))
|
|
|
|
var toScheme string
|
|
|
|
for i, toLoc := range reverseProxyCmdTo {
|
|
|
|
addr, scheme, err := parseUpstreamDialAddress(toLoc)
|
|
|
|
if err != nil {
|
|
|
|
return caddy.ExitCodeFailedStartup, fmt.Errorf("invalid upstream address %s: %v", toLoc, err)
|
|
|
|
}
|
|
|
|
if scheme != "" && toScheme != "" {
|
|
|
|
toScheme = scheme
|
|
|
|
}
|
|
|
|
toAddresses[i] = addr
|
2019-10-04 06:00:41 +08:00
|
|
|
}
|
2019-11-05 03:18:42 +08:00
|
|
|
|
2020-04-28 05:53:38 +08:00
|
|
|
// proceed to build the handler and server
|
2019-10-04 06:00:41 +08:00
|
|
|
ht := HTTPTransport{}
|
2022-03-06 07:34:19 +08:00
|
|
|
if toScheme == "https" {
|
2019-10-04 06:00:41 +08:00
|
|
|
ht.TLS = new(TLSConfig)
|
2020-05-13 00:43:18 +08:00
|
|
|
if insecure {
|
|
|
|
ht.TLS.InsecureSkipVerify = true
|
|
|
|
}
|
2019-10-04 06:00:41 +08:00
|
|
|
}
|
|
|
|
|
2022-09-16 02:35:38 +08:00
|
|
|
upstreamPool := UpstreamPool{}
|
|
|
|
for _, toAddr := range toAddresses {
|
|
|
|
upstreamPool = append(upstreamPool, &Upstream{
|
|
|
|
Dial: toAddr,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2019-10-04 06:00:41 +08:00
|
|
|
handler := Handler{
|
|
|
|
TransportRaw: caddyconfig.JSONModuleObject(ht, "protocol", "http", nil),
|
2022-09-16 02:35:38 +08:00
|
|
|
Upstreams: upstreamPool,
|
2020-02-28 11:52:41 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if changeHost {
|
|
|
|
handler.Headers = &headers.Handler{
|
2019-10-04 06:00:41 +08:00
|
|
|
Request: &headers.HeaderOps{
|
|
|
|
Set: http.Header{
|
2020-02-28 11:52:41 +08:00
|
|
|
"Host": []string{"{http.reverse_proxy.upstream.hostport}"},
|
2019-10-04 06:00:41 +08:00
|
|
|
},
|
|
|
|
},
|
2020-02-28 11:52:41 +08:00
|
|
|
}
|
2019-10-04 06:00:41 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
route := caddyhttp.Route{
|
|
|
|
HandlersRaw: []json.RawMessage{
|
|
|
|
caddyconfig.JSONModuleObject(handler, "handler", "reverse_proxy", nil),
|
|
|
|
},
|
|
|
|
}
|
2020-04-28 05:53:38 +08:00
|
|
|
if fromAddr.Host != "" {
|
2019-12-11 04:36:46 +08:00
|
|
|
route.MatcherSetsRaw = []caddy.ModuleMap{
|
2020-04-10 03:22:05 +08:00
|
|
|
{
|
2020-04-28 05:53:38 +08:00
|
|
|
"host": caddyconfig.JSON(caddyhttp.MatchHost{fromAddr.Host}, nil),
|
2019-10-04 06:00:41 +08:00
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
server := &caddyhttp.Server{
|
|
|
|
Routes: caddyhttp.RouteList{route},
|
2020-04-28 05:53:38 +08:00
|
|
|
Listen: []string{":" + fromAddr.Port},
|
2019-10-04 06:00:41 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
httpApp := caddyhttp.App{
|
|
|
|
Servers: map[string]*caddyhttp.Server{"proxy": server},
|
|
|
|
}
|
|
|
|
|
2022-05-30 04:33:01 +08:00
|
|
|
appsRaw := caddy.ModuleMap{
|
|
|
|
"http": caddyconfig.JSON(httpApp, nil),
|
|
|
|
}
|
|
|
|
if internalCerts && fromAddr.Host != "" {
|
|
|
|
tlsApp := caddytls.TLS{
|
|
|
|
Automation: &caddytls.AutomationConfig{
|
|
|
|
Policies: []*caddytls.AutomationPolicy{{
|
|
|
|
Subjects: []string{fromAddr.Host},
|
|
|
|
IssuersRaw: []json.RawMessage{json.RawMessage(`{"module":"internal"}`)},
|
|
|
|
}},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
appsRaw["tls"] = caddyconfig.JSON(tlsApp, nil)
|
|
|
|
}
|
|
|
|
|
2022-08-02 03:36:22 +08:00
|
|
|
var false bool
|
2019-10-04 06:00:41 +08:00
|
|
|
cfg := &caddy.Config{
|
2022-08-02 03:36:22 +08:00
|
|
|
Admin: &caddy.AdminConfig{Disabled: true,
|
|
|
|
Config: &caddy.ConfigSettings{
|
|
|
|
Persist: &false,
|
|
|
|
},
|
|
|
|
},
|
2022-05-30 04:33:01 +08:00
|
|
|
AppsRaw: appsRaw,
|
2019-10-04 06:00:41 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
err = caddy.Run(cfg)
|
|
|
|
if err != nil {
|
|
|
|
return caddy.ExitCodeFailedStartup, err
|
|
|
|
}
|
|
|
|
|
2022-09-16 02:35:38 +08:00
|
|
|
for _, to := range toAddresses {
|
|
|
|
fmt.Printf("Caddy proxying %s -> %s\n", fromAddr.String(), to)
|
|
|
|
}
|
|
|
|
if len(toAddresses) > 1 {
|
|
|
|
fmt.Println("Load balancing policy: random")
|
|
|
|
}
|
2019-10-04 06:00:41 +08:00
|
|
|
|
|
|
|
select {}
|
|
|
|
}
|
2022-09-16 02:35:38 +08:00
|
|
|
|
|
|
|
// reverseProxyCmdTo holds the parsed values from repeated use of the --to flag.
|
|
|
|
var reverseProxyCmdTo caddycmd.StringSlice
|