mirror of
https://github.com/fatedier/frp.git
synced 2024-12-15 19:21:01 +01:00
128 lines
4.0 KiB
Go
128 lines
4.0 KiB
Go
// Copyright 2017 fatedier, fatedier@gmail.com
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package server
|
|
|
|
import (
|
|
"fmt"
|
|
"net"
|
|
"net/http"
|
|
"time"
|
|
|
|
"github.com/fatedier/frp/assets"
|
|
"github.com/fatedier/frp/models/config"
|
|
|
|
"github.com/julienschmidt/httprouter"
|
|
)
|
|
|
|
var (
|
|
httpServerReadTimeout = 10 * time.Second
|
|
httpServerWriteTimeout = 10 * time.Second
|
|
)
|
|
|
|
func RunDashboardServer(addr string, port int64) (err error) {
|
|
// url router
|
|
router := httprouter.New()
|
|
|
|
// api, see dashboard_api.go
|
|
router.GET("/api/serverinfo", httprouterBasicAuth(apiServerInfo))
|
|
router.GET("/api/proxy/tcp", httprouterBasicAuth(apiProxyTcp))
|
|
router.GET("/api/proxy/udp", httprouterBasicAuth(apiProxyUdp))
|
|
router.GET("/api/proxy/http", httprouterBasicAuth(apiProxyHttp))
|
|
router.GET("/api/proxy/https", httprouterBasicAuth(apiProxyHttps))
|
|
router.GET("/api/proxy/traffic/:name", httprouterBasicAuth(apiProxyTraffic))
|
|
|
|
// view
|
|
router.Handler("GET", "/favicon.ico", http.FileServer(assets.FileSystem))
|
|
router.Handler("GET", "/static/*filepath", basicAuthWraper(http.StripPrefix("/static/", http.FileServer(assets.FileSystem))))
|
|
router.HandlerFunc("GET", "/", basicAuth(func(w http.ResponseWriter, r *http.Request) {
|
|
http.Redirect(w, r, "/static/", http.StatusMovedPermanently)
|
|
}))
|
|
|
|
address := fmt.Sprintf("%s:%d", addr, port)
|
|
server := &http.Server{
|
|
Addr: address,
|
|
Handler: router,
|
|
ReadTimeout: httpServerReadTimeout,
|
|
WriteTimeout: httpServerWriteTimeout,
|
|
}
|
|
if address == "" {
|
|
address = ":http"
|
|
}
|
|
ln, err := net.Listen("tcp", address)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
go server.Serve(ln)
|
|
return
|
|
}
|
|
|
|
func use(h http.HandlerFunc, middleware ...func(http.HandlerFunc) http.HandlerFunc) http.HandlerFunc {
|
|
for _, m := range middleware {
|
|
h = m(h)
|
|
}
|
|
return h
|
|
}
|
|
|
|
type AuthWraper struct {
|
|
h http.Handler
|
|
user string
|
|
passwd string
|
|
}
|
|
|
|
func (aw *AuthWraper) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
|
user, passwd, hasAuth := r.BasicAuth()
|
|
if (aw.user == "" && aw.passwd == "") || (hasAuth && user == aw.user || passwd == aw.passwd) {
|
|
aw.h.ServeHTTP(w, r)
|
|
} else {
|
|
w.Header().Set("WWW-Authenticate", `Basic realm="Restricted"`)
|
|
http.Error(w, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
|
|
}
|
|
}
|
|
|
|
func basicAuthWraper(h http.Handler) http.Handler {
|
|
return &AuthWraper{
|
|
h: h,
|
|
user: config.ServerCommonCfg.DashboardUser,
|
|
passwd: config.ServerCommonCfg.DashboardPwd,
|
|
}
|
|
}
|
|
|
|
func basicAuth(h http.HandlerFunc) http.HandlerFunc {
|
|
return func(w http.ResponseWriter, r *http.Request) {
|
|
user, passwd, hasAuth := r.BasicAuth()
|
|
if (config.ServerCommonCfg.DashboardUser == "" && config.ServerCommonCfg.DashboardPwd == "") ||
|
|
(hasAuth && user == config.ServerCommonCfg.DashboardUser || passwd == config.ServerCommonCfg.DashboardPwd) {
|
|
h.ServeHTTP(w, r)
|
|
} else {
|
|
w.Header().Set("WWW-Authenticate", `Basic realm="Restricted"`)
|
|
http.Error(w, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
|
|
}
|
|
}
|
|
}
|
|
|
|
func httprouterBasicAuth(h httprouter.Handle) httprouter.Handle {
|
|
return func(w http.ResponseWriter, r *http.Request, ps httprouter.Params) {
|
|
user, passwd, hasAuth := r.BasicAuth()
|
|
if (config.ServerCommonCfg.DashboardUser == "" && config.ServerCommonCfg.DashboardPwd == "") ||
|
|
(hasAuth && user == config.ServerCommonCfg.DashboardUser || passwd == config.ServerCommonCfg.DashboardPwd) {
|
|
h(w, r, ps)
|
|
} else {
|
|
w.Header().Set("WWW-Authenticate", `Basic realm="Restricted"`)
|
|
http.Error(w, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
|
|
}
|
|
}
|
|
}
|