Note: The primary documentation for Dito will be migrated to an mdBook format. Please be patient 🙂
Dito is an advanced, highly extensible reverse proxy server written in Go. It features a robust plugin-based architecture, custom certificate handling for backend connections, dynamic configuration reloading, and more. Plugins can manage their own dependencies and provide custom middleware functionality.
- Layer 7 Reverse Proxy: Handles HTTP and HTTPS requests efficiently.
- WebSockets Support: Proxy WebSocket connections with ease.
- Dynamic Configuration Reloading (hot reload): Update configurations without restarting the server.
- Extensible Plugin System: Enhance Dito’s functionality with custom Go plugins that can:
- Add authentication mechanisms
- Implement caching strategies
- Apply rate limiting
- Transform requests/responses
- Add custom logging
- And much more!
- Plugin Security: Plugins are signed using Ed25519 keys, and Dito verifies these signatures at startup.
- Custom TLS Certificate Management: Support for mTLS and custom certificates for backend connections.
- Header Manipulation: Add or remove HTTP headers as needed.
- Advanced Logging: Asynchronous logging with customizable verbosity and performance optimizations.
- Custom Transport Configuration: Fine-tune HTTP transport settings per location or globally.
- Response Body Size Limits: Control maximum response body sizes globally and per location with proper error handling (413 status code).
- Response Buffering Control: Enable or disable response buffering per location for optimal performance.
- Prometheus Metrics: Monitor performance and behavior with detailed metrics.
dito/
├── cmd/ # Entry points (main application & plugin-signer)
├── app/ # Core application logic
├── config/ # Configuration loader & hot-reload
├── handlers/ # Request routing & proxy handlers
├── middlewares/ # Built-in middlewares (plugins can add more)
├── plugin/ # Plugin loading, signing, and verification
├── plugins/ # Plugin implementations
├── transport/ # HTTP transport configuration
├── websocket/ # WebSocket proxy support
├── writer/ # Response writers and buffering
├── metrics/ # Prometheus metrics
├── logging/ # Structured logging
├── deployments/ # Deployment configurations
│ ├── kubernetes/ # Basic Kubernetes deployments
│ ├── openshift/ # OpenShift production deployments
│ └── docker/ # Docker Compose for development
├── configs/ # Configuration files and templates
│ └── templates/ # Configuration templates
├── scripts/ # Deployment and utility scripts
└── bin/ # Built binaries and runtime files
├── plugins/ # Example and community plugins
├── transport/ # HTTP transport customization
├── websockets/ # WebSocket support
├── writer/ # Custom response writers
├── logging/ # Logging utilities
└── metrics/ # Prometheus metrics collection
Ensure you have Go (>= 1.21) and make
installed.
# Clone repo
git clone https://github.com/andrearaponi/dito.git && cd dito
# One-command setup & start
make quick-start
This will:
- Build all binaries (Dito & plugin-signer)
- Generate Ed25519 keys
- Build & sign plugins
- Update config with correct paths & hashes
- Start the Dito server
# 1. Clone repo
git clone https://github.com/andrearaponi/dito.git && cd dito
# 2. Setup (build, keys, plugins, config)
make setup
# 3. Start server
make run
Category | Command | Description |
---|---|---|
🚀 Quick | quick-start |
Clean, setup everything and start (recommended) |
setup |
Full development setup (build, keys, plugins, config) | |
setup-prod |
Full production setup (persistent keys, prod config) | |
run |
Start the Dito server | |
fix-config |
Quick command to fix configuration after setup | |
🔨 Build | build |
Build Dito binary only |
build-plugins |
Build all plugins | |
build-plugin-signer |
Build plugin-signer tool | |
🔑 Security | generate-keys |
Generate Ed25519 key pair for development |
generate-prod-keys |
Generate persistent Ed25519 key pair for production | |
sign-plugins |
Sign all plugins with development keys | |
sign-plugins-prod |
Sign all plugins with production keys | |
update-config |
Update bin/config.yaml with development key paths/hashes | |
update-prod-config |
Update bin/config-prod.yaml with production key paths/hashes | |
update-k8s-config |
Create configs/config-prod-k8s.yaml for Kubernetes deployment | |
🚀 OpenShift | deploy-ocp |
Complete OpenShift production deployment |
deploy-ocp-dev |
Quick development deployment to OpenShift | |
status-ocp |
Check OpenShift deployment status | |
logs-ocp |
View OpenShift deployment logs | |
clean-ocp |
Clean up OpenShift resources | |
🔍 Debug | debug-config |
Debug configuration issues |
help |
Show all commands with detailed descriptions | |
🧹 Cleanup | clean |
Remove all build artifacts |
clean-plugins |
Clean plugin binaries only | |
🧪 Development | test |
Run tests |
vet |
Run go vet | |
fmt |
Format code | |
sonar |
Run SonarQube analysis |
-
Build Dito:
go build -o bin/dito ./cmd/dito/main.go
(Note: Ensure the path to
main.go
is correct, e.g.,./cmd/dito/main.go
ifmain.go
is incmd/dito/
) -
Build plugin-signer:
cd cmd/plugin-signer && go build -o ../../bin/plugin-signer . && cd ../..
-
Generate keys:
./bin/plugin-signer generate-keys
(This will create keys in the current directory, presumably
bin/
if run from there, or the project root. Move them tobin/
if needed or specify paths) -
Build plugins:
find plugins -mindepth 1 -maxdepth 1 -type d -exec sh -c 'cd "$1" && go build -buildmode=plugin -o "$(basename "$1").so"' sh {} \;
-
Sign plugins:
find plugins -name "*.so" -exec ./bin/plugin-signer sign {} \;
(Ensure
plugin-signer
can find the private keys; you might need to specify-privateKey path/to/key
) -
Update
config.yaml
(ensurepublic_key_path
&public_key_hash
are correct). -
Run Dito:
./bin/dito
Start with default config:
make run
Or directly:
./bin/dito -f /path/to/custom-config.yaml -enable-profiler
- Template:
cmd/config.yaml
(or the correct path to your template) - Runtime:
bin/config.yaml
(auto-updated bymake setup
ormake quick-start
)
Key fields:
port: '8081'
hot_reload: true
metrics:
enabled: true
path: "/metrics"
logging:
enabled: true
verbose: false
level: "info"
plugins:
directory: "./plugins" # Relative to where Dito is run, or absolute path
public_key_path: "./ed25519_public.key" # Relative to where Dito is run, or absolute path
public_key_hash: "<SHA256_HASH>" # The SHA256 hash of the public key
transport:
http:
idle_conn_timeout: 90s
max_idle_conns: 1000
max_idle_conns_per_host: 200
max_conns_per_host: 0
tls_handshake_timeout: 2s
response_header_timeout: 2s
expect_continue_timeout: 500ms
disable_compression: false
dial_timeout: 2s
keep_alive: 30s
force_http2: true
locations:
- path: "^/test-ws$"
target_url: "wss://echo.websocket.org"
enable_websocket: true
replace_path: true
- path: "^/dito$"
target_url: "https://httpbin.org/get"
replace_path: true
transport:
http:
disable_compression: true
additional_headers:
X-Custom: "true"
excluded_headers:
- Cookie
middlewares:
- hello-plugin # Plugin name as defined in its directory
Dito provides flexible response body size limits that can be configured both globally and per location to prevent memory issues and control resource usage.
Set default limits for all locations in the main configuration:
# Global response limits configuration
response_limits:
max_response_body_size: 100000 # 100KB default limit for all locations
Override global limits for specific locations with custom settings:
locations:
- path: "^/api/small"
target_url: "https://api.example.com"
max_response_body_size: 1024 # 1KB limit for this specific endpoint
disable_response_buffering: false # Enable response buffering (default)
- path: "^/api/large"
target_url: "https://api.example.com"
max_response_body_size: 52428800 # 50MB limit for large responses
disable_response_buffering: true # Disable buffering for streaming
- Automatic Error Handling: Returns proper
413 Request Entity Too Large
status code when limits are exceeded - JSON Error Responses: Provides structured error messages with limit details
- Early Detection: Checks
Content-Length
header before processing to fail fast - Streaming Support: Works with both buffered and unbuffered responses
- Logging: Comprehensive warning logs when limits are exceeded
- Zero Downtime: Limits can be updated via hot reload without server restart
When a response exceeds the configured limit, Dito returns a standardized JSON error:
{
"error": {
"code": 413,
"message": "Response body size exceeds limit",
"details": {
"limit_bytes": 90,
"path": "/api/endpoint"
}
}
}
The disable_response_buffering
option controls how responses are handled:
-
false
(default): Responses are buffered in memory before sending to client- Better for small responses
- Allows Content-Length to be set accurately
- Enables proper error handling when limits are exceeded
-
true
: Responses are streamed directly to client- Better for large responses or real-time data
- Lower memory usage
- Cannot recover if response exceeds limit mid-stream
Dito uses Go plugins (.so files). Each plugin must:
- Be in its own subdirectory under
plugins/
. - Contain:
<plugin-name>.so
<plugin-name>.so.sig
(signature file)config.yaml
(plugin-specific config, optional but common)
- Mandatory: Dito will not start without valid plugin signing.
- Uses Ed25519 digital signatures.
Steps (if done manually):
-
Generate key pair:
./bin/plugin-signer generate-keys -privateKey ed25519_private.key -publicKey ed25519_public.key
(Save these keys securely, e.g., in
bin/
or a dedicated directory) -
Compute public key hash:
shasum -a 256 ed25519_public.key | awk '{print $1}'
(Ensure the path to
ed25519_public.key
is correct) -
Update Dito's
config.yaml
withpublic_key_path
(e.g.,./bin/ed25519_public.key
) and the computedpublic_key_hash
. -
Sign plugin:
./bin/plugin-signer sign -plugin path/to/plugin.so -privateKey path/to/ed25519_private.key
(This will create a
.sig
file next to the plugin's.so
file)
public key integrity validation failed
: Regenerate hash and update config. Ensure the hash exactly matches the specified public key file.failed to read public key
: Check public key file path inconfig.yaml
& file permissions.plugin signature verification failed
: Re-sign with correct private key. Ensure public key inconfig.yaml
matches the private key used for signing.
This allows for fine-grained control over how Dito connects to backend services, including:
- Timeouts and Connection Limits: Configure timeouts and maximum connections to handle backend service behavior.
- TLS Settings: Manage TLS handshake timeouts and enforce HTTP/2 if needed.
- Custom Certificates: Specify client certificates for mTLS connections to backends.
Dito supports WebSocket proxying, allowing you to seamlessly forward WebSocket connections to your backend servers. This can be configured per location, enabling WebSocket support on specific routes.
To enable WebSocket support, add enable_websocket: true
to the location configuration. Here’s an example:
# List of location configurations for proxying requests.
locations:
- path: "^/test-ws$" # Regex pattern to match the request path.
target_url: "wss://echo.websocket.org" # The target URL to which the request will be proxied.
enable_websocket: true # Enable WebSocket support for this location.
replace_path: true # Replace the matched path with the target URL.
Future versions of Dito will include more advanced WebSocket features, such as:
- Enhanced TLS Support: Configurable TLS settings for secure WebSocket connections, allowing for encrypted communication and improved security.
- Comprehensive Error Handling: Improved resilience and error management for WebSocket connections to ensure stability during unexpected interruptions.
- Detailed Metrics: Real-time metrics for WebSocket traffic, enabling better performance monitoring and insight into connection stability and throughput.
These features aim to provide full control, security, and reliability for WebSocket connections in Dito, enhancing the overall communication experience.
Dito supports mTLS (mutual TLS) for secure connections to backends. You can specify:
cert_file
: The client certificate.key_file
: The client private key.ca_file
: The certificate authority (CA) for verifying the backend.
Dito supports monitoring through Prometheus by exposing various metrics related to the proxy's performance and behavior. The metrics are accessible at the configured path (default is /metrics
).
Dito provides both custom metrics and standard metrics from the Go runtime and Prometheus libraries:
http_requests_total
: Total number of HTTP requests processed, partitioned by method, path, and status code.http_request_duration_seconds
: Duration of HTTP requests in seconds, with predefined buckets.active_connections
: Number of active connections currently being handled by the proxy.data_transferred_bytes_total
: Total amount of data transferred in bytes, partitioned by direction (inbound
oroutbound
).
- Go runtime metrics: Metrics such as memory usage, garbage collection statistics, and the number of goroutines, which are automatically exposed by the Go Prometheus client library. Examples include:
go_goroutines
: Number of goroutines currently running.go_memstats_alloc_bytes
: Number of bytes allocated in the heap.go_gc_duration_seconds
: Duration of garbage collection cycles.
- Prometheus HTTP handler metrics: Metrics related to the Prometheus HTTP handler itself, such as:
promhttp_metric_handler_requests_total
: Total number of HTTP requests handled by the metrics endpoint.promhttp_metric_handler_requests_in_flight
: Current number of scrapes being served.
To enable metrics, make sure the following section is present in the config.yaml
file:
metrics:
enabled: true # Enable or disable metrics.
path: "/metrics" # The path on which the metrics will be exposed.
If you encounter any issues while using Dito, please follow these steps to open an issue on the GitHub repository:
-
Go Version: Specify the version of Go you are using.
- You can find your Go version by running
go version
in your terminal.
- You can find your Go version by running
-
Error Details: Provide a detailed description of the error or issue you encountered. Include:
- The exact error message.
- The steps you took to produce the error.
- Any relevant logs or console outputs.
-
Configuration File: Include the
config.yaml
file you are using.- This will help us understand the context in which the issue occurred and allow us to replicate the problem.
- Fork the repo.
- Create your feature branch (
git checkout -b feature/AmazingFeature
). - Commit your changes (
git commit -m 'Add some AmazingFeature'
). - Push to the branch (
git push origin feature/AmazingFeature
). - Open a Pull Request.
Dito is fully containerized and optimized for OpenShift Container Platform (OCP) with enterprise-grade security and deployment practices.
For a complete OpenShift deployment with automatic key management and configuration:
# Make the deployment script executable
chmod +x scripts/deploy-ocp.sh
# Deploy with defaults (namespace: dito, version: v2.0.0-production)
./scripts/deploy-ocp.sh
# Deploy to custom namespace with specific version
./scripts/deploy-ocp.sh -n my-dito -v latest
# Force key regeneration
./scripts/deploy-ocp.sh -f
# Only update configuration (no deployment)
./scripts/deploy-ocp.sh -c
# Only deploy (skip config/key generation)
./scripts/deploy-ocp.sh -d
# Build for OpenShift with automatic registry login and push
./docker-build.sh
# Or with custom settings
VERSION=v2.1.0 NAMESPACE=my-dito ./docker-build.sh
# Generate persistent production keys (only if they don't exist)
make generate-prod-keys
# Create namespace
oc new-project dito
# Create Secret for keys
oc create secret generic dito-keys \
--from-file=ed25519_public.key=bin/ed25519_public_prod.key \
--from-file=ed25519_private.key=bin/ed25519_private_prod.key
# Create ConfigMap for application config
# First, create Kubernetes-specific config from template
HASH=$(shasum -a 256 bin/ed25519_public_prod.key | awk '{print $1}')
sed "s/PLACEHOLDER_HASH_TO_BE_REPLACED/$HASH/" configs/templates/application.yaml > configs/config-prod-k8s.yaml
oc create configmap dito-config \
--from-file=config.yaml=configs/config-prod-k8s.yaml
# Deploy the application
oc apply -f deployments/openshift/production-deployment.yaml
File | Use Case | Features |
---|---|---|
deployments/kubernetes/basic-deployment.yaml |
Basic deployment | Simple setup, minimal security |
deployments/openshift/production-deployment.yaml |
Production deployment | Plugin signing, proper secrets, health checks |
- Non-root execution: Runs as user ID 1001
- Read-only root filesystem: Prevents runtime modifications
- Dropped capabilities: Minimal privilege model
- Security contexts: OpenShift security context constraints
- External key generation: Keys never stored in container images
- Runtime plugin signing: Plugins signed during pod initialization
- Secure secret mounting: Keys mounted as Kubernetes Secrets
- Proper file permissions: Keys accessible only to application user
Dito supports multiple configuration approaches:
- Template-based: Use
configs/templates/application.yaml
with hash substitution - Environment-specific: Separate configs for dev/prod/staging in
configs/
- ConfigMap injection: Runtime configuration via Kubernetes ConfigMaps
- Hot-reload: Dynamic configuration updates without restarts
See configs/README.md
for detailed configuration management.
This project is licensed under the Apache License 2.0. See the LICENSE file for details.
Made with ❤️