lets-proxy2 alternatives and similar packages
Based on the "Server Applications" category.
Alternatively, view lets-proxy2 alternatives based on common mentions on social networks and blogs.
-
etcd
Distributed reliable key-value store for the most critical data of a distributed system -
Caddy
Fast and extensible multi-platform HTTP/1-2-3 web server with automatic HTTPS -
consul
Consul is a distributed, highly available, and data center aware solution to connect and configure applications across dynamic, distributed infrastructure. -
Vault
A tool for secrets management, encryption as a service, and privileged access management -
apex
Build, deploy, and manage AWS Lambda functions with ease (with Go support!). -
RoadRunner
🤯 High-performance PHP application server, process manager written in Go and powered with plugins -
SFTPGo
Fully featured and highly configurable SFTP server with optional HTTP/S, FTP/S and WebDAV support - S3, Google Cloud Storage, Azure Blob -
Ponzu
Headless CMS with automatic JSON API. Featuring auto-HTTPS from Let's Encrypt, HTTP/2 Server Push, and flexible server framework written in Go. -
Jocko
Kafka implemented in Golang with built-in coordination (No ZK dep, single binary install, Cloud Native) -
algernon
Small self-contained pure-Go web server with Lua, Teal, Markdown, HTTP/2, QUIC, Redis and PostgreSQL support -
Flagr
Flagr is a feature flagging, A/B testing and dynamic configuration microservice -
discovery
A registry for resilient mid-tier load balancing and failover. -
Key Transparency
A transparent and secure way to look up public keys. -
Trickster
Open Source HTTP Reverse Proxy Cache and Time Series Dashboard Accelerator -
Rendora
dynamic server-side rendering using headless Chrome to effortlessly solve the SEO problem for modern javascript websites -
jackal
💬 Instant messaging server for the Extensible Messaging and Presence Protocol (XMPP). -
Golang API Starter Kit
Go Server/API boilerplate using best practices DDD CQRS ES gRPC -
SDNS
A high-performance, recursive DNS resolver server with DNSSEC support, focused on preserving privacy. -
go-feature-flag
GO Feature Flag is a simple, complete and lightweight self-hosted feature flag solution 100% Open Source. 🎛️ -
Euterpe
Self-hosted music streaming server 🎶 with RESTful API and Web interface. Think of it as your very own Spotify! ☁️🎧 -
goproxy
🦁 goproxy is a proxy server which can forward http or https requests to remote servers./ goproxy 是一个反向代理服务器,支持转发 http/https 请求。 -
Eru
Eru, a simple, stateless, flexible, production-ready orchestrator designed to easily integrate into existing workflows. Can run any virtualization things in long or short time. -
marathon-consul
Integrates Marathon apps with Consul service discovery. -
cortex-tenant
Prometheus remote write proxy that adds Cortex/Mimir tenant ID based on metric labels -
go-proxy-cache
Simple Reverse Proxy with Caching, written in Go, using Redis. -
Simple CRUD App w/ Gorilla/Mux, MariaDB
Simple CRUD Application with Go, Gorilla/mux, MariaDB, Redis. -
simple-jwt-provider
Simple and lightweight provider which exhibits JWTs, supports login, password-reset (via mail) and user management. -
autobd
autobd is an automated, networked and containerized backup solution -
protoxy
A proxy server than converts JSON request bodies to protocol buffers -
go-fitbit
Fitbit API for Go to fetch, add, update and delete data on Fitbit using REST API -
Gin Healthcheck
Lightweight, customizable healthcheck endpoint for Gin Framework
Clean code begins in your IDE with SonarLint
Do you think we are missing an alternative of lets-proxy2 or a related project?
README
Русскоязычное описание ниже (Russian below).
English description
Home page: https://github.com/rekby/lets-proxy2
Features:
- http-01 and tls-alpn-01 validation
- HTTPS (with certificate autoissue) and HTTP reverse proxy
- Zero config for start usage
- Time limit for issue certificate
- Auto include subdomains in certificate (default: domain and www.domain)
- Logging for stderr and/or file
- Self rotate log files (can disable by config)
- Can configure backend in dependence of incoming connection IP:Port
- Custom headers to backend
- Self check domain before issue cert (prevent DoS cert issue attack by requests with bad domains)
- Blacklist/whitelist of domains
- Lock certificates (force to use manual issued certificate without internal checks)
- Optional access to internal metrics with Prometheus format
It is next generation of https://github.com/rekby/lets-proxy, rewrited from scratch.
It is improove logging and internal structure for better test coverage and simpler support. Add config support instead of many command line flags.
A reverse-proxy server to handle https requests transparently. By default Lets-proxy handles https requests to port 443 and proxies them as http to port 80 on the same IP address.
Lets-proxy adds the http headers, X-Forwarded-For
which contains the IP address.
It obtains valid TLS certificates from Let's Encrypt and handles https for free, in an automated way,
including certificate renewal, and without warning in browsers.
The program was created for shared hosting and can handle many thousands of domains per server. It is simple to implement and doesn't need settings to start the program on personal server/vps.
Quick start:
./lets-proxy or lets-proxy.exe
Use --help key for details:
./lets-proxy --help or lets-proxy.exe --help
Русский (Russian):
Сайт программы: https://github.com/rekby/lets-proxy2
Сейчас это тестовая версия, программа в процессе разработчик и она не готова для реального использования.
Возможности:
- Авторизация доменов по протоколам http-01 and tls-alpn-01
- Проксирование HTTPS (с автовыпуском сертификата) and HTTP
- Начать использование можно без настроек
- Ограничение времени на получение сертификата
- Автоматическое получение сертификата для домена и поддоменов (default: domain and www.domain)
- Вывод логов в файл и/или на стандартный вывод ошибок
- Самостоятельная ротация лог-файлов (отключается в настройках)
- Можно настроить адрес перенаправления запроса в заивисмости от адреса приема запроса.
- Настраиваемые дополнительные заголовки для передачи на внутренний сервер
- Самостоятельная проверка возможности выпуска сертификата перед его запросов (для исключения DoS-атак путем запросов с неправильными доменами)
- Белый/чёрный списки доменов для выпуска сертификатов
- Фиксированный сертификат (возможность использовать самостоятельно полученный сертификат, без внутренних проверок и автообновления)
- Опциональный доступ к внутренним метрикам в формате Prometheus
Эта программа - следующая итерация после https://github.com/rekby/lets-proxy, переписанная с нуля.
Улучшено логирование, внутреннее устройство кода - для упрощения тестирования и поддержки/развития. Добавлена поддержка файла настроек вместо огромного списка флагов.
Реверс-прокси сервер для прозрачной обработки https-запросов. Для начала использования достаточно просто запустить его на сервере с
запущенным http-сервером. При этом lets-proxy начнёт слушать порт 433 и передавать запросы на порт 80 с тем же IP-адресом.
К запросу будет добавляться заголовок X-Forwarded-For
с IP-адресом источника запроса.
Сертификаты для работы https получаются в реальном времени от letsencrypt.org. Это правильные
(не самоподписанные) бесплатные сертификаты, которым доверяют браузеры.
Программа разрабатывается для использования на виртуальном хостинге и может работать с тысячами доменов на каждом сервере. С другой стороны она проста и не требует начальных настроек для запуска на персональном сервере.
Быстрый старт:
./lets-proxy или lets-proxy.exe
Used libraries (alphabet ordered):
- http://github.com/gojuno/minimock - for tests
- http://github.com/kardianos/minwinsvc - for run as windows service
- http://github.com/maxatome/go-testdeep - for tests
- http://github.com/mitchellh/gox - for multiply binaries build
- http://github.com/pelletier/go-toml - for config file.
- http://github.com/rekby/zapcontext - for pass logger to/from context
- http://github.com/satori/go.uuid - for generate uuid
- http://go.uber.org/zap - for logging
- http://golang.org/x/crypto - use acme part - for access for lets encrypt server.
- http://golang.org/x/net - use idna part for log domain names
- http://gopkg.in/natefinch/lumberjack.v2 - use for self log rotation.