httpsify.go 2.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596
  1. package main
  2. import (
  3. "io"
  4. "net"
  5. "log"
  6. "flag"
  7. "strings"
  8. "net/http"
  9. "crypto/tls"
  10. "path/filepath"
  11. "github.com/dkumor/acmewrapper"
  12. )
  13. // --------------
  14. var (
  15. port *string = flag.String("port", "443", "the port that will serve the https requests")
  16. cert *string = flag.String("cert", "./cert.pem", "the cert.pem save-path")
  17. key *string = flag.String("key", "./key.pem", "the key.pem save-path")
  18. domains *string = flag.String("domains", "", "a comma separated list of your site(s) domain(s)")
  19. backend *string = flag.String("backend", "", "the backend http server that will serve the terminated requests")
  20. )
  21. // --------------
  22. func init() {
  23. flag.Parse()
  24. if ( *domains == "" ) {
  25. log.Fatal("err> Please enter your site(s) domain(s)")
  26. }
  27. if ( *backend == "" ) {
  28. log.Fatal("err> Please enter the backend http server")
  29. }
  30. }
  31. // --------------
  32. func main() {
  33. acme, err := acmewrapper.New(acmewrapper.Config{
  34. Domains: strings.Split(*domains, ","),
  35. Address: ":" + *port,
  36. TLSCertFile: *cert,
  37. TLSKeyFile: *key,
  38. RegistrationFile: filepath.Dir(*cert) + "/lets-encrypt-user.reg",
  39. PrivateKeyFile: filepath.Dir(*cert) + "/lets-encrypt-user.pem",
  40. TOSCallback: acmewrapper.TOSAgree,
  41. })
  42. if err!=nil {
  43. log.Fatal("err> "+ err.Error())
  44. }
  45. listener, err := tls.Listen("tcp", ":" + *port, acme.TLSConfig())
  46. if err != nil {
  47. log.Fatal("err> " + err.Error())
  48. }
  49. log.Fatal(http.Serve(listener, http.HandlerFunc(func(w http.ResponseWriter, r *http.Request){
  50. defer r.Body.Close()
  51. req, err := http.NewRequest(r.Method, *backend, r.Body)
  52. if err != nil {
  53. http.Error(w, http.StatusText(504), 504)
  54. return
  55. }
  56. ip, _, _ := net.SplitHostPort(r.RemoteAddr)
  57. for k, v := range r.Header {
  58. for i := 0; i < len(v); i ++ {
  59. if i == 0 {
  60. req.Header.Set(k, v[i])
  61. } else {
  62. req.Header.Add(k, v[i])
  63. }
  64. }
  65. }
  66. req.Header.Set("X-Real-IP", ip)
  67. req.Header.Set("X-Forwarded-For", ip)
  68. req.Header.Set("X-Forwarded-Proto", "https")
  69. req.Header.Set("X-Forwarded-Host", r.Host)
  70. req.Header.Set("X-Forwarded-Port", *port)
  71. res, err := http.DefaultClient.Do(req)
  72. if err != nil {
  73. http.Error(w, http.StatusText(504), 504)
  74. return
  75. }
  76. defer res.Body.Close()
  77. for k, v := range res.Header {
  78. for i := 0; i < len(v); i ++ {
  79. if i == 0 {
  80. w.Header().Set(k, v[i])
  81. } else {
  82. w.Header().Add(k, v[i])
  83. }
  84. }
  85. }
  86. w.WriteHeader(res.StatusCode)
  87. io.Copy(w, res.Body)
  88. })))
  89. }