httpsify.go 2.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104
  1. package main
  2. import (
  3. "io"
  4. "net"
  5. "log"
  6. "flag"
  7. "strings"
  8. "net/http"
  9. "crypto/tls"
  10. "path/filepath"
  11. "github.com/dkumor/acmewrapper"
  12. )
  13. // --------------
  14. const VERSION = "httpsify/v1.0"
  15. var (
  16. port *string = flag.String("port", "443", "the port that will serve the https requests")
  17. cert *string = flag.String("cert", "./cert.pem", "the cert.pem save-path")
  18. key *string = flag.String("key", "./key.pem", "the key.pem save-path")
  19. domains *string = flag.String("domains", "", "a comma separated list of your site(s) domain(s)")
  20. backend *string = flag.String("backend", "", "the backend http server that will serve the terminated requests")
  21. info *string = flag.String("info", "yes", "whether to send information about httpsify or not ^_^")
  22. )
  23. // --------------
  24. func init() {
  25. flag.Parse()
  26. if ( *domains == "" ) {
  27. log.Fatal("err> Please enter your site(s) domain(s)")
  28. }
  29. if ( *backend == "" ) {
  30. log.Fatal("err> Please enter the backend http server")
  31. }
  32. }
  33. // --------------
  34. func main() {
  35. acme, err := acmewrapper.New(acmewrapper.Config{
  36. Domains: strings.Split(*domains, ","),
  37. Address: ":" + *port,
  38. TLSCertFile: *cert,
  39. TLSKeyFile: *key,
  40. RegistrationFile: filepath.Dir(*cert) + "/lets-encrypt-user.reg",
  41. PrivateKeyFile: filepath.Dir(*cert) + "/lets-encrypt-user.pem",
  42. TOSCallback: acmewrapper.TOSAgree,
  43. })
  44. if err!=nil {
  45. log.Fatal("err> "+ err.Error())
  46. }
  47. listener, err := tls.Listen("tcp", ":" + *port, acme.TLSConfig())
  48. if err != nil {
  49. log.Fatal("err> " + err.Error())
  50. }
  51. log.Fatal(http.Serve(listener, http.HandlerFunc(func(w http.ResponseWriter, r *http.Request){
  52. defer r.Body.Close()
  53. req, err := http.NewRequest(r.Method, *backend, r.Body)
  54. if err != nil {
  55. http.Error(w, http.StatusText(504), 504)
  56. return
  57. }
  58. ip, _, _ := net.SplitHostPort(r.RemoteAddr)
  59. for k, v := range r.Header {
  60. for i := 0; i < len(v); i ++ {
  61. if i == 0 {
  62. req.Header.Set(k, v[i])
  63. } else {
  64. req.Header.Add(k, v[i])
  65. }
  66. }
  67. }
  68. req.Host = r.Host
  69. req.Header.Set("Host", r.Host)
  70. req.Header.Set("X-Real-IP", ip)
  71. req.Header.Set("X-Forwarded-For", ip)
  72. req.Header.Set("X-Forwarded-Proto", "https")
  73. req.Header.Set("X-Forwarded-Host", r.Host)
  74. req.Header.Set("X-Forwarded-Port", *port)
  75. res, err := http.DefaultClient.Do(req)
  76. if err != nil {
  77. http.Error(w, http.StatusText(504), 504)
  78. return
  79. }
  80. defer res.Body.Close()
  81. for k, v := range res.Header {
  82. for i := 0; i < len(v); i ++ {
  83. if i == 0 {
  84. w.Header().Set(k, v[i])
  85. } else {
  86. w.Header().Add(k, v[i])
  87. }
  88. }
  89. }
  90. if *info == "yes" {
  91. w.Header().Set("Server", VERSION)
  92. }
  93. w.WriteHeader(res.StatusCode)
  94. io.Copy(w, res.Body)
  95. })))
  96. }