2015-05-01 20:59:46 +00:00
|
|
|
package server
|
|
|
|
|
|
|
|
import (
|
|
|
|
"log"
|
2016-01-04 18:26:32 +00:00
|
|
|
"net"
|
2015-05-01 20:59:46 +00:00
|
|
|
"net/http"
|
2016-01-04 18:26:32 +00:00
|
|
|
"net/http/httputil"
|
|
|
|
"net/url"
|
|
|
|
"strings"
|
2015-05-01 20:59:46 +00:00
|
|
|
"sync"
|
|
|
|
|
2015-12-11 03:35:48 +00:00
|
|
|
"github.com/khlieng/dispatch/Godeps/_workspace/src/github.com/gorilla/websocket"
|
2016-01-04 18:26:32 +00:00
|
|
|
"github.com/khlieng/dispatch/Godeps/_workspace/src/github.com/spf13/viper"
|
2015-05-01 20:59:46 +00:00
|
|
|
|
2016-01-04 18:26:32 +00:00
|
|
|
"github.com/khlieng/dispatch/letsencrypt"
|
2015-12-11 03:35:48 +00:00
|
|
|
"github.com/khlieng/dispatch/storage"
|
2015-05-01 20:59:46 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
|
|
|
channelStore *storage.ChannelStore
|
|
|
|
sessions map[string]*Session
|
|
|
|
sessionLock sync.Mutex
|
2015-05-15 05:32:32 +00:00
|
|
|
|
2015-05-01 22:20:22 +00:00
|
|
|
upgrader = websocket.Upgrader{
|
|
|
|
ReadBufferSize: 1024,
|
|
|
|
WriteBufferSize: 1024,
|
2015-05-11 03:13:35 +00:00
|
|
|
CheckOrigin: func(r *http.Request) bool {
|
|
|
|
return true
|
|
|
|
},
|
2015-05-01 22:20:22 +00:00
|
|
|
}
|
2015-05-01 20:59:46 +00:00
|
|
|
)
|
|
|
|
|
2016-01-04 18:26:32 +00:00
|
|
|
func Run() {
|
2015-05-01 23:02:21 +00:00
|
|
|
defer storage.Close()
|
2015-05-01 20:59:46 +00:00
|
|
|
|
|
|
|
channelStore = storage.NewChannelStore()
|
|
|
|
sessions = make(map[string]*Session)
|
|
|
|
|
2016-01-04 18:26:32 +00:00
|
|
|
reconnectIRC()
|
|
|
|
startHTTP()
|
2015-05-01 20:59:46 +00:00
|
|
|
|
2016-01-04 18:26:32 +00:00
|
|
|
select {}
|
2015-06-06 23:18:26 +00:00
|
|
|
}
|
2015-05-01 20:59:46 +00:00
|
|
|
|
2016-01-04 18:26:32 +00:00
|
|
|
func startHTTP() {
|
|
|
|
port := viper.GetString("port")
|
2015-05-01 20:59:46 +00:00
|
|
|
|
2016-01-04 18:26:32 +00:00
|
|
|
if viper.GetBool("https.enabled") {
|
|
|
|
var err error
|
|
|
|
portHTTPS := viper.GetString("https.port")
|
|
|
|
redirect := viper.GetBool("https.redirect")
|
|
|
|
|
|
|
|
https := restartableHTTPS{
|
|
|
|
addr: ":" + portHTTPS,
|
|
|
|
handler: http.HandlerFunc(serve),
|
|
|
|
}
|
|
|
|
|
|
|
|
if viper.GetBool("https.redirect") {
|
|
|
|
log.Println("[HTTP] Listening on port", port, "(HTTPS Redirect)")
|
|
|
|
go http.ListenAndServe(":"+port, createHTTPSRedirect(portHTTPS))
|
|
|
|
}
|
|
|
|
|
|
|
|
if certExists() {
|
|
|
|
https.cert = viper.GetString("https.cert")
|
|
|
|
https.key = viper.GetString("https.key")
|
|
|
|
} else if domain := viper.GetString("letsencrypt.domain"); domain != "" {
|
|
|
|
dir := storage.Path.LetsEncrypt()
|
|
|
|
email := viper.GetString("letsencrypt.email")
|
|
|
|
lePort := viper.GetString("letsencrypt.port")
|
|
|
|
|
|
|
|
if viper.GetBool("letsencrypt.proxy") && lePort != "" && (port != "80" || !redirect) {
|
|
|
|
log.Println("[HTTP] Listening on port 80 (Let's Encrypt Proxy))")
|
|
|
|
go http.ListenAndServe(":80", http.HandlerFunc(letsEncryptProxy))
|
|
|
|
}
|
|
|
|
|
|
|
|
https.cert, https.key, err = letsencrypt.Run(dir, domain, email, lePort, https.restart)
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
log.Fatal("Could not locate SSL certificate or private key")
|
|
|
|
}
|
|
|
|
|
|
|
|
log.Println("[HTTPS] Listening on port", portHTTPS)
|
|
|
|
https.start()
|
|
|
|
} else {
|
|
|
|
log.Println("[HTTP] Listening on port", port)
|
|
|
|
log.Fatal(http.ListenAndServe(":"+port, http.HandlerFunc(serve)))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func serve(w http.ResponseWriter, r *http.Request) {
|
2015-06-06 23:18:26 +00:00
|
|
|
if r.Method != "GET" {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if r.URL.Path == "/ws" {
|
|
|
|
upgradeWS(w, r)
|
|
|
|
} else {
|
|
|
|
serveFiles(w, r)
|
|
|
|
}
|
2015-05-01 20:59:46 +00:00
|
|
|
}
|
|
|
|
|
2015-05-01 22:20:22 +00:00
|
|
|
func upgradeWS(w http.ResponseWriter, r *http.Request) {
|
|
|
|
conn, err := upgrader.Upgrade(w, r, nil)
|
|
|
|
if err != nil {
|
|
|
|
log.Println(err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2015-12-29 21:23:07 +00:00
|
|
|
uuid := r.URL.Query().Get("uuid")
|
|
|
|
if uuid != "" {
|
|
|
|
newWSHandler(conn, uuid).run()
|
|
|
|
}
|
2015-05-01 22:20:22 +00:00
|
|
|
}
|
|
|
|
|
2016-01-04 18:26:32 +00:00
|
|
|
func createHTTPSRedirect(portHTTPS string) http.HandlerFunc {
|
|
|
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
if strings.HasPrefix(r.URL.Path, "/.well-known/acme-challenge") {
|
|
|
|
letsEncryptProxy(w, r)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
host, _, err := net.SplitHostPort(r.Host)
|
|
|
|
if err != nil {
|
|
|
|
host = r.Host
|
2015-05-01 20:59:46 +00:00
|
|
|
}
|
2016-01-04 18:26:32 +00:00
|
|
|
|
|
|
|
u := url.URL{
|
|
|
|
Scheme: "https",
|
|
|
|
Host: net.JoinHostPort(host, portHTTPS),
|
|
|
|
Path: r.RequestURI,
|
|
|
|
}
|
|
|
|
|
|
|
|
w.Header().Set("Location", u.String())
|
|
|
|
w.WriteHeader(http.StatusMovedPermanently)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func letsEncryptProxy(w http.ResponseWriter, r *http.Request) {
|
|
|
|
host, _, err := net.SplitHostPort(r.Host)
|
|
|
|
if err != nil {
|
|
|
|
host = r.Host
|
2015-05-01 20:59:46 +00:00
|
|
|
}
|
2016-01-04 18:26:32 +00:00
|
|
|
|
|
|
|
upstream := &url.URL{
|
|
|
|
Scheme: "http",
|
|
|
|
Host: net.JoinHostPort(host, viper.GetString("letsencrypt.port")),
|
|
|
|
}
|
|
|
|
|
|
|
|
httputil.NewSingleHostReverseProxy(upstream).ServeHTTP(w, r)
|
2015-05-01 20:59:46 +00:00
|
|
|
}
|