site.go 6.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288
  1. package sites
  2. import (
  3. "net/http"
  4. "os"
  5. "github.com/0xJacky/Nginx-UI/internal/cert"
  6. "github.com/0xJacky/Nginx-UI/internal/helper"
  7. "github.com/0xJacky/Nginx-UI/internal/nginx"
  8. "github.com/0xJacky/Nginx-UI/internal/site"
  9. "github.com/0xJacky/Nginx-UI/internal/upstream"
  10. "github.com/0xJacky/Nginx-UI/model"
  11. "github.com/0xJacky/Nginx-UI/query"
  12. "github.com/gin-gonic/gin"
  13. "github.com/uozi-tech/cosy"
  14. "github.com/uozi-tech/cosy/logger"
  15. "gorm.io/gorm/clause"
  16. )
  17. // buildProxyTargets processes proxy targets similar to list.go logic
  18. func buildProxyTargets(fileName string) []site.ProxyTarget {
  19. indexedSite := site.GetIndexedSite(fileName)
  20. // Convert proxy targets, expanding upstream references
  21. var proxyTargets []site.ProxyTarget
  22. upstreamService := upstream.GetUpstreamService()
  23. for _, target := range indexedSite.ProxyTargets {
  24. // Check if target.Host is an upstream name
  25. if upstreamDef, exists := upstreamService.GetUpstreamDefinition(target.Host); exists {
  26. // Replace with upstream servers
  27. for _, server := range upstreamDef.Servers {
  28. proxyTargets = append(proxyTargets, site.ProxyTarget{
  29. Host: server.Host,
  30. Port: server.Port,
  31. Type: server.Type,
  32. })
  33. }
  34. } else {
  35. // Regular proxy target
  36. proxyTargets = append(proxyTargets, site.ProxyTarget{
  37. Host: target.Host,
  38. Port: target.Port,
  39. Type: target.Type,
  40. })
  41. }
  42. }
  43. return proxyTargets
  44. }
  45. func GetSite(c *gin.Context) {
  46. name := helper.UnescapeURL(c.Param("name"))
  47. path := nginx.GetConfPath("sites-available", name)
  48. file, err := os.Stat(path)
  49. if os.IsNotExist(err) {
  50. c.JSON(http.StatusNotFound, gin.H{
  51. "message": "file not found",
  52. })
  53. return
  54. }
  55. s := query.Site
  56. siteModel, err := s.Where(s.Path.Eq(path)).FirstOrCreate()
  57. if err != nil {
  58. cosy.ErrHandler(c, err)
  59. return
  60. }
  61. certModel, err := model.FirstCert(name)
  62. if err != nil {
  63. logger.Warn(err)
  64. }
  65. if siteModel.Advanced {
  66. origContent, err := os.ReadFile(path)
  67. if err != nil {
  68. cosy.ErrHandler(c, err)
  69. return
  70. }
  71. c.JSON(http.StatusOK, site.Site{
  72. ModifiedAt: file.ModTime(),
  73. Site: siteModel,
  74. Name: name,
  75. Config: string(origContent),
  76. AutoCert: certModel.AutoCert == model.AutoCertEnabled,
  77. Filepath: path,
  78. Status: site.GetSiteStatus(name),
  79. ProxyTargets: buildProxyTargets(name),
  80. })
  81. return
  82. }
  83. nginxConfig, err := nginx.ParseNgxConfig(path)
  84. if err != nil {
  85. cosy.ErrHandler(c, err)
  86. return
  87. }
  88. certInfoMap := make(map[int][]*cert.Info)
  89. for serverIdx, server := range nginxConfig.Servers {
  90. for _, directive := range server.Directives {
  91. if directive.Directive == "ssl_certificate" {
  92. pubKey, err := cert.GetCertInfo(directive.Params)
  93. if err != nil {
  94. logger.Error("Failed to get certificate information", err)
  95. continue
  96. }
  97. certInfoMap[serverIdx] = append(certInfoMap[serverIdx], pubKey)
  98. }
  99. }
  100. }
  101. c.JSON(http.StatusOK, site.Site{
  102. Site: siteModel,
  103. ModifiedAt: file.ModTime(),
  104. Name: name,
  105. Config: nginxConfig.FmtCode(),
  106. Tokenized: nginxConfig,
  107. AutoCert: certModel.AutoCert == model.AutoCertEnabled,
  108. CertInfo: certInfoMap,
  109. Filepath: path,
  110. Status: site.GetSiteStatus(name),
  111. ProxyTargets: buildProxyTargets(name),
  112. })
  113. }
  114. func SaveSite(c *gin.Context) {
  115. name := helper.UnescapeURL(c.Param("name"))
  116. var json struct {
  117. Content string `json:"content" binding:"required"`
  118. EnvGroupID uint64 `json:"env_group_id"`
  119. SyncNodeIDs []uint64 `json:"sync_node_ids"`
  120. Overwrite bool `json:"overwrite"`
  121. PostAction string `json:"post_action"`
  122. }
  123. if !cosy.BindAndValid(c, &json) {
  124. return
  125. }
  126. err := site.Save(name, json.Content, json.Overwrite, json.EnvGroupID, json.SyncNodeIDs, json.PostAction)
  127. if err != nil {
  128. cosy.ErrHandler(c, err)
  129. return
  130. }
  131. GetSite(c)
  132. }
  133. func RenameSite(c *gin.Context) {
  134. oldName := helper.UnescapeURL(c.Param("name"))
  135. var json struct {
  136. NewName string `json:"new_name"`
  137. }
  138. if !cosy.BindAndValid(c, &json) {
  139. return
  140. }
  141. err := site.Rename(oldName, json.NewName)
  142. if err != nil {
  143. cosy.ErrHandler(c, err)
  144. return
  145. }
  146. c.JSON(http.StatusOK, gin.H{
  147. "message": "ok",
  148. })
  149. }
  150. func EnableSite(c *gin.Context) {
  151. name := helper.UnescapeURL(c.Param("name"))
  152. // Check if the site is in maintenance mode, if yes, disable maintenance mode first
  153. maintenanceConfigPath := nginx.GetConfPath("sites-enabled", name+site.MaintenanceSuffix)
  154. if _, err := os.Stat(maintenanceConfigPath); err == nil {
  155. // Site is in maintenance mode, disable it first
  156. err := site.DisableMaintenance(name)
  157. if err != nil {
  158. cosy.ErrHandler(c, err)
  159. return
  160. }
  161. }
  162. // Then enable the site normally
  163. err := site.Enable(name)
  164. if err != nil {
  165. cosy.ErrHandler(c, err)
  166. return
  167. }
  168. c.JSON(http.StatusOK, gin.H{
  169. "message": "ok",
  170. })
  171. }
  172. func DisableSite(c *gin.Context) {
  173. name := helper.UnescapeURL(c.Param("name"))
  174. // Check if the site is in maintenance mode, if yes, disable maintenance mode first
  175. maintenanceConfigPath := nginx.GetConfPath("sites-enabled", name+site.MaintenanceSuffix)
  176. if _, err := os.Stat(maintenanceConfigPath); err == nil {
  177. // Site is in maintenance mode, disable it first
  178. err := site.DisableMaintenance(name)
  179. if err != nil {
  180. cosy.ErrHandler(c, err)
  181. return
  182. }
  183. }
  184. // Then disable the site normally
  185. err := site.Disable(name)
  186. if err != nil {
  187. cosy.ErrHandler(c, err)
  188. return
  189. }
  190. c.JSON(http.StatusOK, gin.H{
  191. "message": "ok",
  192. })
  193. }
  194. func DeleteSite(c *gin.Context) {
  195. err := site.Delete(helper.UnescapeURL(c.Param("name")))
  196. if err != nil {
  197. cosy.ErrHandler(c, err)
  198. return
  199. }
  200. c.JSON(http.StatusOK, gin.H{
  201. "message": "ok",
  202. })
  203. }
  204. func BatchUpdateSites(c *gin.Context) {
  205. cosy.Core[model.Site](c).SetValidRules(gin.H{
  206. "env_group_id": "required",
  207. }).SetItemKey("path").
  208. BeforeExecuteHook(func(ctx *cosy.Ctx[model.Site]) {
  209. effectedPath := make([]string, len(ctx.BatchEffectedIDs))
  210. var sites []*model.Site
  211. for i, name := range ctx.BatchEffectedIDs {
  212. path := nginx.GetConfPath("sites-available", name)
  213. effectedPath[i] = path
  214. sites = append(sites, &model.Site{
  215. Path: path,
  216. })
  217. }
  218. s := query.Site
  219. err := s.Clauses(clause.OnConflict{
  220. DoNothing: true,
  221. }).Create(sites...)
  222. if err != nil {
  223. ctx.AbortWithError(err)
  224. return
  225. }
  226. ctx.BatchEffectedIDs = effectedPath
  227. }).BatchModify()
  228. }
  229. func EnableMaintenanceSite(c *gin.Context) {
  230. name := helper.UnescapeURL(c.Param("name"))
  231. // If site is already enabled, disable the normal site first
  232. enabledConfigPath := nginx.GetConfPath("sites-enabled", name)
  233. if _, err := os.Stat(enabledConfigPath); err == nil {
  234. // Site is already enabled, disable normal site first
  235. err := site.Disable(name)
  236. if err != nil {
  237. cosy.ErrHandler(c, err)
  238. return
  239. }
  240. }
  241. // Then enable maintenance mode
  242. err := site.EnableMaintenance(name)
  243. if err != nil {
  244. cosy.ErrHandler(c, err)
  245. return
  246. }
  247. c.JSON(http.StatusOK, gin.H{
  248. "message": "ok",
  249. })
  250. }