mirror of
https://github.com/bingohuang/docker-labs.git
synced 2025-07-14 01:57:32 +08:00
166 lines
5.4 KiB
Go
166 lines
5.4 KiB
Go
package main
|
|
|
|
import (
|
|
"crypto/tls"
|
|
"fmt"
|
|
"log"
|
|
"net/http"
|
|
"os"
|
|
"regexp"
|
|
"strings"
|
|
|
|
"github.com/franela/play-with-docker/config"
|
|
"github.com/franela/play-with-docker/handlers"
|
|
"github.com/franela/play-with-docker/services"
|
|
"github.com/franela/play-with-docker/templates"
|
|
gh "github.com/gorilla/handlers"
|
|
"github.com/gorilla/mux"
|
|
"github.com/miekg/dns"
|
|
"github.com/prometheus/client_golang/prometheus/promhttp"
|
|
"github.com/urfave/negroni"
|
|
"github.com/yhat/wsutil"
|
|
)
|
|
|
|
func main() {
|
|
|
|
config.ParseFlags()
|
|
|
|
bypassCaptcha := len(os.Getenv("GOOGLE_RECAPTCHA_DISABLED")) > 0
|
|
|
|
// Start the DNS server
|
|
dnsServer := &dns.Server{Addr: ":53", Net: "udp"}
|
|
dns.HandleFunc(".", handleDnsRequest)
|
|
go func() {
|
|
err := dnsServer.ListenAndServe()
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
}()
|
|
|
|
server := services.CreateWSServer()
|
|
server.On("connection", handlers.WS)
|
|
server.On("error", handlers.WSError)
|
|
|
|
err := services.LoadSessionsFromDisk()
|
|
if err != nil && !os.IsNotExist(err) {
|
|
log.Fatal("Error decoding sessions from disk ", err)
|
|
}
|
|
|
|
r := mux.NewRouter()
|
|
corsRouter := mux.NewRouter()
|
|
|
|
// Reverse proxy (needs to be the first route, to make sure it is the first thing we check)
|
|
proxyHandler := handlers.NewMultipleHostReverseProxy()
|
|
websocketProxyHandler := handlers.NewMultipleHostWebsocketReverseProxy()
|
|
|
|
proxyMultiplexer := func(rw http.ResponseWriter, r *http.Request) {
|
|
if wsutil.IsWebSocketRequest(r) {
|
|
websocketProxyHandler.ServeHTTP(rw, r)
|
|
} else {
|
|
proxyHandler.ServeHTTP(rw, r)
|
|
}
|
|
}
|
|
|
|
corsHandler := gh.CORS(gh.AllowCredentials(), gh.AllowedHeaders([]string{"x-requested-with", "content-type"}), gh.AllowedOrigins([]string{"*"}))
|
|
|
|
// Specific routes
|
|
r.Host(`{subdomain:.*}{node:pwd[0-9]{1,3}_[0-9]{1,3}_[0-9]{1,3}_[0-9]{1,3}}-{port:[0-9]*}.{tld:.*}`).HandlerFunc(proxyMultiplexer)
|
|
r.Host(`{subdomain:.*}{node:pwd[0-9]{1,3}_[0-9]{1,3}_[0-9]{1,3}_[0-9]{1,3}}.{tld:.*}`).HandlerFunc(proxyMultiplexer)
|
|
r.HandleFunc("/ping", handlers.Ping).Methods("GET")
|
|
corsRouter.HandleFunc("/sessions/{sessionId}", handlers.GetSession).Methods("GET")
|
|
corsRouter.HandleFunc("/sessions/{sessionId}/instances", handlers.NewInstance).Methods("POST")
|
|
corsRouter.HandleFunc("/sessions/{sessionId}/instances/{instanceName}", handlers.DeleteInstance).Methods("DELETE")
|
|
r.HandleFunc("/sessions/{sessionId}/instances/{instanceName}/keys", handlers.SetKeys).Methods("POST")
|
|
|
|
h := func(w http.ResponseWriter, r *http.Request) {
|
|
http.ServeFile(w, r, "./www/index.html")
|
|
}
|
|
|
|
r.HandleFunc("/p/{sessionId}", h).Methods("GET")
|
|
r.PathPrefix("/assets").Handler(http.FileServer(http.Dir("./www")))
|
|
r.HandleFunc("/robots.txt", func(rw http.ResponseWriter, r *http.Request) {
|
|
http.ServeFile(rw, r, "www/robots.txt")
|
|
})
|
|
r.HandleFunc("/sdk.js", func(rw http.ResponseWriter, r *http.Request) {
|
|
http.ServeFile(rw, r, "www/sdk.js")
|
|
})
|
|
|
|
corsRouter.Handle("/sessions/{sessionId}/ws/", server)
|
|
r.Handle("/metrics", promhttp.Handler())
|
|
|
|
// Generic routes
|
|
r.HandleFunc("/", func(rw http.ResponseWriter, r *http.Request) {
|
|
if bypassCaptcha {
|
|
http.ServeFile(rw, r, "./www/bypass.html")
|
|
} else {
|
|
welcome, tmplErr := templates.GetWelcomeTemplate()
|
|
if tmplErr != nil {
|
|
log.Fatal(tmplErr)
|
|
}
|
|
rw.Write(welcome)
|
|
}
|
|
}).Methods("GET")
|
|
|
|
corsRouter.HandleFunc("/", handlers.NewSession).Methods("POST")
|
|
|
|
n := negroni.Classic()
|
|
r.PathPrefix("/").Handler(negroni.New(negroni.Wrap(corsHandler(corsRouter))))
|
|
n.UseHandler(r)
|
|
|
|
go func() {
|
|
log.Println("Listening on port " + config.PortNumber)
|
|
log.Fatal(http.ListenAndServe("0.0.0.0:"+config.PortNumber, n))
|
|
}()
|
|
|
|
ssl := mux.NewRouter()
|
|
sslProxyHandler := handlers.NewSSLDaemonHandler()
|
|
ssl.Host(`{subdomain:.*}{node:pwd[0-9]{1,3}_[0-9]{1,3}_[0-9]{1,3}_[0-9]{1,3}}-2375.{tld:.*}`).Handler(sslProxyHandler)
|
|
log.Println("Listening TLS on port " + config.SSLPortNumber)
|
|
|
|
s := &http.Server{Addr: "0.0.0.0:" + config.SSLPortNumber, Handler: ssl}
|
|
s.TLSConfig = &tls.Config{}
|
|
s.TLSConfig.GetCertificate = func(clientHello *tls.ClientHelloInfo) (*tls.Certificate, error) {
|
|
|
|
chunks := strings.Split(clientHello.ServerName, ".")
|
|
chunks = strings.Split(chunks[0], "-")
|
|
ip := strings.Replace(strings.TrimPrefix(chunks[0], "pwd"), "_", ".", -1)
|
|
i := services.FindInstanceByIP(ip)
|
|
if i == nil {
|
|
return nil, fmt.Errorf("Instance %s doesn't exist", clientHello.ServerName)
|
|
}
|
|
if i.GetCertificate() == nil {
|
|
return nil, fmt.Errorf("Instance %s doesn't have a certificate", clientHello.ServerName)
|
|
}
|
|
return i.GetCertificate(), nil
|
|
}
|
|
log.Fatal(s.ListenAndServeTLS("", ""))
|
|
}
|
|
|
|
var dnsFilter = regexp.MustCompile(`pwd[0-9]{1,3}_[0-9]{1,3}_[0-9]{1,3}_[0-9]{1,3}`)
|
|
|
|
func handleDnsRequest(w dns.ResponseWriter, r *dns.Msg) {
|
|
if len(r.Question) > 0 && dnsFilter.MatchString(r.Question[0].Name) {
|
|
// this is something we know about and we should try to handle
|
|
question := r.Question[0].Name
|
|
domainChunks := strings.Split(question, ".")
|
|
tldChunks := strings.Split(strings.TrimPrefix(domainChunks[0], "pwd"), "-")
|
|
ip := strings.Replace(tldChunks[0], "_", ".", -1)
|
|
|
|
m := new(dns.Msg)
|
|
m.SetReply(r)
|
|
m.Authoritative = true
|
|
m.RecursionAvailable = true
|
|
a, err := dns.NewRR(fmt.Sprintf("%s 60 IN A %s", question, ip))
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
m.Answer = append(m.Answer, a)
|
|
w.WriteMsg(m)
|
|
return
|
|
} else {
|
|
// we have no information about this and we are not a recursive dns server, so we just fail so the client can fallback to the next dns server it has configured
|
|
dns.HandleFailed(w, r)
|
|
return
|
|
}
|
|
}
|