httpsify.go 3.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109
  1. // httpsify is a transparent blazing fast https offloader with auto certificates renewal .
  2. // this software is published under MIT License .
  3. // by Mohammed Al ashaal <alash3al.xyz> with the help of those opensource libraries [github.com/xenolf/lego, github.com/dkumor/acmewrapper] .
  4. package main
  5. import (
  6. "io"
  7. "net"
  8. "log"
  9. "flag"
  10. "strings"
  11. "net/http"
  12. "crypto/tls"
  13. "path/filepath"
  14. "github.com/dkumor/acmewrapper"
  15. )
  16. // --------------
  17. const VERSION = "httpsify/v1"
  18. var (
  19. port *string = flag.String("port", "443", "the port that will serve the https requests")
  20. cert *string = flag.String("cert", "./cert.pem", "the cert.pem save-path")
  21. key *string = flag.String("key", "./key.pem", "the key.pem save-path")
  22. domains *string = flag.String("domains", "", "a comma separated list of your site(s) domain(s)")
  23. backend *string = flag.String("backend", "", "the backend http server that will serve the terminated requests")
  24. info *string = flag.String("info", "yes", "whether to send information about httpsify or not ^_^")
  25. )
  26. // --------------
  27. func init() {
  28. flag.Parse()
  29. if ( *domains == "" ) {
  30. log.Fatal("err> Please enter your site(s) domain(s)")
  31. }
  32. if ( *backend == "" ) {
  33. log.Fatal("err> Please enter the backend http server")
  34. }
  35. }
  36. // --------------
  37. func main() {
  38. acme, err := acmewrapper.New(acmewrapper.Config{
  39. Domains: strings.Split(*domains, ","),
  40. Address: ":" + *port,
  41. TLSCertFile: *cert,
  42. TLSKeyFile: *key,
  43. RegistrationFile: filepath.Dir(*cert) + "/lets-encrypt-user.reg",
  44. PrivateKeyFile: filepath.Dir(*cert) + "/lets-encrypt-user.pem",
  45. TOSCallback: acmewrapper.TOSAgree,
  46. })
  47. if err!=nil {
  48. log.Fatal("err> "+ err.Error())
  49. }
  50. listener, err := tls.Listen("tcp", ":" + *port, acme.TLSConfig())
  51. if err != nil {
  52. log.Fatal("err> " + err.Error())
  53. }
  54. log.Fatal(http.Serve(listener, http.HandlerFunc(func(w http.ResponseWriter, r *http.Request){
  55. defer r.Body.Close()
  56. req, err := http.NewRequest(r.Method, *backend, r.Body)
  57. if err != nil {
  58. http.Error(w, http.StatusText(504), 504)
  59. return
  60. }
  61. for k, v := range r.Header {
  62. for i := 0; i < len(v); i ++ {
  63. if i == 0 {
  64. req.Header.Set(k, v[i])
  65. } else {
  66. req.Header.Add(k, v[i])
  67. }
  68. }
  69. }
  70. uip, uport, _ := net.SplitHostPort(r.RemoteAddr)
  71. req.Host = r.Host
  72. req.Header.Set("Host", r.Host)
  73. req.Header.Set("X-Real-IP", uip)
  74. req.Header.Set("X-Remote-IP", uip)
  75. req.Header.Set("X-Remote-Port", uport)
  76. req.Header.Set("X-Forwarded-For", uip)
  77. req.Header.Set("X-Forwarded-Proto", "https")
  78. req.Header.Set("X-Forwarded-Host", r.Host)
  79. req.Header.Set("X-Forwarded-Port", *port)
  80. res, err := http.DefaultClient.Do(req)
  81. if err != nil {
  82. http.Error(w, http.StatusText(504), 504)
  83. return
  84. }
  85. defer res.Body.Close()
  86. for k, v := range res.Header {
  87. for i := 0; i < len(v); i ++ {
  88. if i == 0 {
  89. w.Header().Set(k, v[i])
  90. } else {
  91. w.Header().Add(k, v[i])
  92. }
  93. }
  94. }
  95. if *info == "yes" {
  96. w.Header().Set("Server", VERSION)
  97. }
  98. w.WriteHeader(res.StatusCode)
  99. io.Copy(w, res.Body)
  100. })))
  101. }