Added cluster support

pull/5/head
Jim Heising 2016-12-26 15:00:28 -08:00
parent bd56f59f64
commit 2fcc382b38
2 changed files with 133 additions and 146 deletions

View File

@ -6,3 +6,4 @@ exports.max_request_length = 100000; // The maximum length of characters allowed
exports.enable_rate_limiting = true;
exports.max_requests_per_second = 10; // The maximum number of requests per second to allow from a given IP.
exports.blacklist_hostname_regex = /^(10\.|192\.|127\.|localhost$)/i; // Good for limiting access to internal IP addresses and hosts.
exports.cluster_process_count = Number(process.env.CLUSTER_PROCESS_COUNT) || require("os").cpus().length;

View File

@ -2,40 +2,34 @@ var http = require('http');
var config = require("./config");
var url = require("url");
var request = require("request");
var cluster = require('cluster');
var throttle = require("tokenthrottle")({rate: config.max_requests_per_second});
var publicAddressFinder = require("public-address");
var publicIP;
// Get our public IP address
publicAddressFinder(function(err, data){
if(!err && data)
{
publicAddressFinder(function (err, data) {
if (!err && data) {
publicIP = data.address;
}
});
function addCORSHeaders(req, res)
{
if (req.method.toUpperCase() === "OPTIONS")
{
if(req.headers["access-control-request-headers"])
{
function addCORSHeaders(req, res) {
if (req.method.toUpperCase() === "OPTIONS") {
if (req.headers["access-control-request-headers"]) {
res.setHeader("Access-Control-Allow-Headers", req.headers["access-control-request-headers"]);
}
if(req.headers["access-control-request-method"])
{
if (req.headers["access-control-request-method"]) {
res.setHeader("Access-Control-Allow-Methods", req.headers["access-control-request-method"]);
}
}
if(req.headers["origin"])
{
if (req.headers["origin"]) {
res.setHeader("Access-Control-Allow-Origin", req.headers["origin"]);
}
else
{
else {
res.setHeader("Access-Control-Allow-Origin", "*");
}
}
@ -58,13 +52,11 @@ function getClientAddress(req) {
|| req.connection.remoteAddress;
}
function processRequest(req, res)
{
function processRequest(req, res) {
addCORSHeaders(req, res);
// Return options pre-flight requests right away
if (req.method.toUpperCase() === "OPTIONS")
{
if (req.method.toUpperCase() === "OPTIONS") {
return writeResponse(res, 204);
}
@ -81,14 +73,12 @@ function processRequest(req, res)
}
// We don't support relative links
if(!remoteURL.host)
{
if (!remoteURL.host) {
return writeResponse(res, 404, "relative URLS are not supported");
}
// Naughty, naughty— deny requests to blacklisted hosts
if(config.blacklist_hostname_regex.test(remoteURL.hostname))
{
if (config.blacklist_hostname_regex.test(remoteURL.hostname)) {
return writeResponse(res, 400, "naughty, naughty...");
}
@ -97,21 +87,18 @@ function processRequest(req, res)
return writeResponse(res, 400, "only http and https are supported");
}
if(publicIP)
{
if (publicIP) {
// Add an X-Forwarded-For header
if(req.headers["x-forwarded-for"])
{
if (req.headers["x-forwarded-for"]) {
req.headers["x-forwarded-for"] += ", " + publicIP;
}
else
{
else {
req.headers["x-forwarded-for"] = req.clientIP + ", " + publicIP;
}
}
// Make sure the host header is to the URL we're requesting, not thingproxy
if(req.headers["host"]) {
if (req.headers["host"]) {
req.headers["host"] = remoteURL.host;
}
@ -120,17 +107,15 @@ function processRequest(req, res)
headers: req.headers,
method: req.method,
timeout: config.proxy_request_timeout_ms,
strictSSL : false
strictSSL: false
});
proxyRequest.on('error', function(err){
proxyRequest.on('error', function (err) {
if(err.code === "ENOTFOUND")
{
if (err.code === "ENOTFOUND") {
return writeResponse(res, 502, "host cannot be found.")
}
else
{
else {
console.log("Proxy Request Error: " + err.toString());
return writeResponse(res, 500);
}
@ -140,12 +125,11 @@ function processRequest(req, res)
var requestSize = 0;
var proxyResponseSize = 0;
req.pipe(proxyRequest).on('data', function(data){
req.pipe(proxyRequest).on('data', function (data) {
requestSize += data.length;
if(requestSize >= config.max_request_length)
{
if (requestSize >= config.max_request_length) {
proxyRequest.end();
return sendTooBigResponse(res);
}
@ -155,8 +139,7 @@ function processRequest(req, res)
proxyResponseSize += data.length;
if(proxyResponseSize >= config.max_request_length)
{
if (proxyResponseSize >= config.max_request_length) {
proxyRequest.end();
return sendTooBigResponse(res);
}
@ -167,11 +150,17 @@ function processRequest(req, res)
}
}
http.createServer(function (req, res) {
if (cluster.isMaster) {
for (var i = 0; i < config.cluster_process_count; i++) {
cluster.fork();
}
}
else
{
http.createServer(function (req, res) {
// Process AWS health checks
if(req.url === "/health")
{
if (req.url === "/health") {
return writeResponse(res, 200);
}
@ -180,27 +169,24 @@ http.createServer(function (req, res) {
req.clientIP = clientIP;
// Log our request
if(config.enable_logging)
{
if (config.enable_logging) {
console.log("%s %s %s", (new Date()).toJSON(), clientIP, req.method, req.url);
}
if(config.enable_rate_limiting)
{
throttle.rateLimit(clientIP, function(err, limited) {
if (limited)
{
if (config.enable_rate_limiting) {
throttle.rateLimit(clientIP, function (err, limited) {
if (limited) {
return writeResponse(res, 429, "enhance your calm");
}
processRequest(req, res);
})
}
else
{
else {
processRequest(req, res);
}
}).listen(config.port);
}).listen(config.port);
console.log("thingproxy.freeboard.io started");
console.log("thingproxy.freeboard.io process started (PID " + process.pid + ")");
}