feat: v0.2.0-rc

This commit is contained in:
2024-03-30 16:08:19 +08:00
parent 0d2a845a26
commit 9eb06c5135
3 changed files with 54 additions and 50 deletions

View File

@@ -33,6 +33,7 @@ impl ProxyApp {
}
}
// just only support IPv4
async fn lookup_ipv4(&self, hostname: &str) -> Option<String> {
let ips = self.tokio_async_resolver.ipv4_lookup(hostname).await;
log::debug!("lookup {} --> {:#?}", hostname, ips);
@@ -59,13 +60,12 @@ impl ProxyApp {
fn print_headers(buffer: &mut String, headers: &HeaderMap<HeaderValue>) {
let header_len = headers.len();
headers.iter().enumerate().for_each(|(i, (n, v))| {
buffer.push_str(
&format!("{}: {}{}",
n.as_str(),
v.to_str().unwrap_or("ERROR!BAD-VALUE!"),
if i < header_len - 1 { "\n" } else { "" }
)
);
buffer.push_str(&format!(
"{}: {}{}",
n.as_str(),
v.to_str().unwrap_or("ERROR!BAD-VALUE!"),
if i < header_len - 1 { "\n" } else { "" }
));
});
}
}

View File

@@ -34,6 +34,7 @@ pub fn issue_certificate(intermediate_certificate: &Certificate, domain: &str) -
}
fn parse_pkcs8(pem: &str) -> String {
// KeyPair only support PKCS#8 private key with public key, though public key is optional
{
use p256::{pkcs8::{DecodePrivateKey, EncodePrivateKey, LineEnding}, SecretKey};
let secret_key = SecretKey::from_pkcs8_pem(pem);

View File

@@ -6,7 +6,7 @@ use pingora::{
use pretty_env_logger::env_logger::Builder;
use structopt::StructOpt;
use crate::config::ProxyConfig;
use crate::config::{ProxyConfig, ProxyGroup};
use crate::service::HostConfig;
mod app;
@@ -25,44 +25,7 @@ pub fn main() {
panic!("Load proxy_config.json failed: {}", e);
});
let mut services: Vec<Box<dyn Service>> = vec![];
for group in &proxy_config.groups {
let listen_address = format!("0.0.0.0:{}", group.port);
let mut host_configs = vec![];
if let Some(proxy_map) = &group.proxy_map {
for (hostname, proxy_item) in proxy_map {
host_configs.push(HostConfig {
proxy_addr: proxy_item.address.clone(),
proxy_tls: proxy_item.tls.unwrap_or(false),
proxy_hostname: proxy_item.sni.clone().unwrap_or_else(|| hostname.clone()),
});
}
}
let lookup_tls = group.lookup_dns.unwrap_or(false);
log::info!("Listen at: {}, tls: {}, lookup_tls: {}", listen_address, group.tls.is_some(), lookup_tls);
match &group.tls {
None => {
let proxy_service_tcp = service::proxy_service_tcp(
&my_server.configuration,
&listen_address,
lookup_tls,
host_configs,
);
services.push(Box::new(proxy_service_tcp));
}
Some(proxy_tls) => {
let proxy_service_ssl = service::proxy_service_tls(
&my_server.configuration,
&listen_address,
lookup_tls,
&proxy_tls,
host_configs,
);
services.push(Box::new(proxy_service_ssl));
}
}
}
let mut services = build_services(&my_server, &proxy_config);
if let Some(true) = proxy_config.prometheus {
let mut prometheus_service_http = ListeningService::prometheus_http_service();
prometheus_service_http.add_tcp("127.0.0.1:6150");
@@ -78,9 +41,49 @@ fn init_logger() {
let mut builder = Builder::new();
builder.filter_level(LevelFilter::Info);
let _ = builder.try_init();
}
// if std::env::var("RUST_LOG").is_err() {
// std::env::set_var("RUST_LOG", "pingora_reverse_proxy=debug");
// }
// pretty_env_logger::init_timed();
fn build_services(server: &Server, proxy_config: &ProxyConfig) -> Vec<Box<dyn Service>> {
let mut services: Vec<Box<dyn Service>> = vec![];
for group in &proxy_config.groups {
let listen_address = format!("0.0.0.0:{}", group.port);
let host_configs = build_host_configs(group);
let lookup_tls = group.lookup_dns.unwrap_or(false);
log::info!("Listen at: {}, tls: {}, lookup_tls: {}", listen_address, group.tls.is_some(), lookup_tls);
match &group.tls {
None => {
services.push(Box::new(service::proxy_service_tcp(
&server.configuration,
&listen_address,
lookup_tls,
host_configs,
)));
}
Some(proxy_tls) => {
services.push(Box::new(service::proxy_service_tls(
&server.configuration,
&listen_address,
lookup_tls,
&proxy_tls,
host_configs,
)));
}
}
}
services
}
fn build_host_configs(group: &ProxyGroup) -> Vec<HostConfig> {
let mut host_configs = vec![];
if let Some(proxy_map) = &group.proxy_map {
for (hostname, proxy_item) in proxy_map {
host_configs.push(HostConfig {
proxy_addr: proxy_item.address.clone(),
proxy_tls: proxy_item.tls.unwrap_or(false),
proxy_hostname: proxy_item.sni.clone().unwrap_or_else(|| hostname.clone()),
});
}
}
host_configs
}