httpsify.go 2.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106
  1. // httpsify is a transparent blazing fast https offloader with auto certificates renewal .
  2. // this software is published under MIT License .
  3. // by Mohammed Al ashaal <alash3al.xyz> with the help of those opensource libraries [github.com/xenolf/lego, github.com/dkumor/acmewrapper] .
  4. package main
  5. import (
  6. "crypto/tls"
  7. "flag"
  8. "github.com/dkumor/acmewrapper"
  9. "io"
  10. "log"
  11. "net"
  12. "net/http"
  13. "path/filepath"
  14. "strings"
  15. )
  16. // --------------
  17. const VERSION = "httpsify/v1"
  18. var (
  19. port = flag.String("port", "443", "the port that will serve the https requests")
  20. cert = flag.String("cert", "./cert.pem", "the cert.pem save-path")
  21. key = flag.String("key", "./key.pem", "the key.pem save-path")
  22. domains = flag.String("domains", "", "a comma separated list of your site(s) domain(s)")
  23. backend = flag.String("backend", "http://127.0.0.1:80", "the backend http server that will serve the terminated requests")
  24. info = flag.String("info", "yes", "whether to send information about httpsify or not ^_^")
  25. )
  26. // --------------
  27. func init() {
  28. flag.Parse()
  29. if *domains == "" {
  30. log.Fatal("err> Please enter your site(s) domain(s)")
  31. }
  32. }
  33. // --------------
  34. func main() {
  35. acme, err := acmewrapper.New(acmewrapper.Config{
  36. Domains: strings.Split(*domains, ","),
  37. Address: ":" + *port,
  38. TLSCertFile: *cert,
  39. TLSKeyFile: *key,
  40. RegistrationFile: filepath.Dir(*cert) + "/lets-encrypt-user.reg",
  41. PrivateKeyFile: filepath.Dir(*cert) + "/lets-encrypt-user.pem",
  42. TOSCallback: acmewrapper.TOSAgree,
  43. })
  44. if err != nil {
  45. log.Fatal("err> " + err.Error())
  46. }
  47. listener, err := tls.Listen("tcp", ":"+*port, acme.TLSConfig())
  48. if err != nil {
  49. log.Fatal("err> " + err.Error())
  50. }
  51. log.Fatal(http.Serve(listener, http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  52. defer r.Body.Close()
  53. req, err := http.NewRequest(r.Method, *backend, r.Body)
  54. if err != nil {
  55. http.Error(w, http.StatusText(504), 504)
  56. return
  57. }
  58. for k, v := range r.Header {
  59. for i := 0; i < len(v); i++ {
  60. if i == 0 {
  61. req.Header.Set(k, v[i])
  62. } else {
  63. req.Header.Add(k, v[i])
  64. }
  65. }
  66. }
  67. uip, uport, _ := net.SplitHostPort(r.RemoteAddr)
  68. req.Host = r.Host
  69. req.Header.Set("Host", r.Host)
  70. req.Header.Set("X-Real-IP", uip)
  71. req.Header.Set("X-Remote-IP", uip)
  72. req.Header.Set("X-Remote-Port", uport)
  73. req.Header.Set("X-Forwarded-For", uip)
  74. req.Header.Set("X-Forwarded-Proto", "https")
  75. req.Header.Set("X-Forwarded-Host", r.Host)
  76. req.Header.Set("X-Forwarded-Port", *port)
  77. res, err := http.DefaultClient.Do(req)
  78. if err != nil {
  79. http.Error(w, http.StatusText(504), 504)
  80. return
  81. }
  82. defer res.Body.Close()
  83. for k, v := range res.Header {
  84. for i := 0; i < len(v); i++ {
  85. if i == 0 {
  86. w.Header().Set(k, v[i])
  87. } else {
  88. w.Header().Add(k, v[i])
  89. }
  90. }
  91. }
  92. if *info == "yes" {
  93. w.Header().Set("Server", VERSION)
  94. }
  95. w.WriteHeader(res.StatusCode)
  96. io.Copy(w, res.Body)
  97. })))
  98. }