1 package PVE
::Service
::pveproxy
;
16 use PVE
::API2
::Formatter
::Standard
;
17 use PVE
::API2
::Formatter
::HTML
;
27 use base
qw(PVE::Daemon);
29 my $cmdline = [$0, @ARGV];
31 my %daemon_options = (
33 restart_on_error
=> 5,
35 leave_children_open_on_reload
=> 1,
38 pidfile
=> '/var/run/pveproxy/pveproxy.pid',
41 my $daemon = __PACKAGE__-
>new('pveproxy', $cmdline, %daemon_options);
46 my ($result_hash, $alias, $subdir) = @_;
48 $result_hash->{$alias} = $subdir;
51 my $dir = $File::Find
::dir
;
52 if ($dir =~m!^$subdir(.*)$!) {
53 my $name = "$alias$1/";
54 $result_hash->{$name} = "$dir/";
58 find
({wanted
=> $wanted, follow
=> 0, no_chdir
=> 1}, $subdir);
64 # we use same ALLOW/DENY/POLICY as pveproxy
65 my $proxyconf = PVE
::API2Tools
::read_proxy_config
();
67 my $accept_lock_fn = "/var/lock/pveproxy.lck";
69 my $lockfh = IO
::File-
>new(">>${accept_lock_fn}") ||
70 die "unable to open lock file '${accept_lock_fn}' - $!\n";
72 my $family = PVE
::Tools
::get_host_address_family
($self->{nodename
});
73 my $socket = $self->create_reusable_socket(8006, undef, $family);
75 $ext5_dir_exists = (-d
'/usr/share/pve-manager/ext5');
79 add_dirs
($dirs, '/pve2/locale/', '/usr/share/pve-manager/locale/');
80 add_dirs
($dirs, '/pve2/touch/', '/usr/share/pve-manager/touch/');
81 add_dirs
($dirs, '/pve2/ext4/', '/usr/share/pve-manager/ext4/');
83 if ($ext5_dir_exists) { # only add ext5 dirs if it was build
84 add_dirs
($dirs, '/pve2/ext5/', '/usr/share/pve-manager/ext5/');
85 add_dirs
($dirs, '/pve2/manager5/', '/usr/share/pve-manager/manager5/');
88 add_dirs
($dirs, '/pve2/images/' => '/usr/share/pve-manager/images/');
89 add_dirs
($dirs, '/pve2/css/' => '/usr/share/pve-manager/css/');
90 add_dirs
($dirs, '/pve2/js/' => '/usr/share/pve-manager/js/');
91 add_dirs
($dirs, '/vncterm/' => '/usr/share/vncterm/');
92 add_dirs
($dirs, '/novnc/' => '/usr/share/novnc-pve/');
94 $self->{server_config
} = {
95 base_handler_class
=> 'PVE::API2',
99 lockfile
=> $accept_lock_fn,
102 debug
=> $self->{debug
},
103 trusted_env
=> 0, # not trusted, anyone can connect
104 logfile
=> '/var/log/pveproxy/access.log',
105 allow_from
=> $proxyconf->{ALLOW_FROM
},
106 deny_from
=> $proxyconf->{DENY_FROM
},
107 policy
=> $proxyconf->{POLICY
},
109 # Note: older versions are considered insecure, for example
110 # search for "Poodle"-Attac
114 cipher_list
=> $proxyconf->{CIPHERS
} || 'HIGH:MEDIUM:!aNULL:!MD5',
115 key_file
=> '/etc/pve/local/pve-ssl.key',
116 cert_file
=> '/etc/pve/local/pve-ssl.pem',
118 # Note: there is no authentication for those pages and dirs!
121 # avoid authentication when accessing favicon
123 file
=> '/usr/share/pve-manager/images/favicon.ico',
133 my $server = PVE
::HTTPServer-
>new(%{$self->{server_config
}});
137 $daemon->register_start_command();
138 $daemon->register_restart_command(1);
139 $daemon->register_stop_command();
140 $daemon->register_status_command();
143 start
=> [ __PACKAGE__
, 'start', []],
144 restart
=> [ __PACKAGE__
, 'restart', []],
145 stop
=> [ __PACKAGE__
, 'stop', []],
146 status
=> [ __PACKAGE__
, 'status', [], undef, sub { print shift . "\n";} ],
154 return 1 if $ua =~ m/(iPhone|iPod|Windows Phone)/;
156 if ($ua =~ m/Mobile(\/|\s
)/) {
157 return 1 if $ua =~ m/(BlackBerry|BB)/;
158 return 1 if ($ua =~ m/(Android)/) && ($ua !~ m/(Silk)/);
164 # NOTE: Requests to those pages are not authenticated
165 # so we must be very careful here
168 my ($server, $r, $args) = @_;
174 if (my $cookie = $r->header('Cookie')) {
175 if (my $newlang = ($cookie =~ /(?:^|\s)PVELangCookie=([^;]*)/)[0]) {
176 if ($newlang =~ m/^[a-z]{2,3}(_[A-Z]{2,3})?$/) {
180 my $ticket = PVE
::REST
::extract_auth_cookie
($cookie);
181 if (($username = PVE
::AccessControl
::verify_ticket
($ticket, 1))) {
182 $token = PVE
::AccessControl
::assemble_csrf_prevention_token
($username);
186 $username = '' if !$username;
188 my $mobile = is_phone
($r->header('User-Agent')) ?
1 : 0;
190 if (defined($args->{mobile
})) {
191 $mobile = $args->{mobile
} ?
1 : 0;
195 if (defined($args->{ext5
})) {
196 $ext5 = $args->{ext5
} ?
1 : 0;
201 if (defined($args->{console
}) && $args->{novnc
}) {
202 $page = PVE
::NoVncIndex
::get_index
($lang, $username, $token, $args->{console
});
204 $page = PVE
::TouchIndex
::get_index
($lang, $username, $token, $args->{console
});
205 } elsif ($ext5 && $ext5_dir_exists) {
206 $page = PVE
::ExtJSIndex5
::get_index
($lang, $username, $token, $args->{console
});
208 $page = PVE
::ExtJSIndex
::get_index
($lang, $username, $token, $args->{console
});
210 my $headers = HTTP
::Headers-
>new(Content_Type
=> "text/html; charset=utf-8");
211 my $resp = HTTP
::Response-
>new(200, "OK", $headers, $page);
222 pveproxy - the PVE API proxy server
230 This is the REST API proxy server, listening on port 8006. This is usually
231 started as service using:
233 # service pveproxy start
235 =head1 Host based access control
237 It is possible to configure apache2 like access control lists. Values are read
238 from file /etc/default/pveproxy. For example:
240 ALLOW_FROM="10.0.0.1-10.0.0.5,192.168.0.0/22"
244 IP addresses can be specified using any syntax understoop by Net::IP. The
245 name 'all' is an alias for '0/0'.
247 The default policy is 'allow'.
249 Match | POLICY=deny | POLICY=allow
250 ---------------------------|-------------|------------
251 Match Allow only | allow | allow
252 Match Deny only | deny | deny
253 No match | deny | allow
254 Match Both Allow & Deny | deny | allow
256 =head1 SSL Cipher Suite
258 You can define the chiper list in /etc/default/pveproxy, for example
260 CIPHERS="HIGH:MEDIUM:!aNULL:!MD5"
262 Above is the default. See the ciphers(1) man page from the openssl
263 package for list of all available options.
267 /etc/default/pveproxy
269 =include pve_copyright