httpd.go 9.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320
  1. // SPDX-FileCopyrightText: Copyright The Miniflux Authors. All rights reserved.
  2. // SPDX-License-Identifier: Apache-2.0
  3. package httpd // import "miniflux.app/v2/internal/http/server"
  4. import (
  5. "crypto/tls"
  6. "fmt"
  7. "log/slog"
  8. "net"
  9. "net/http"
  10. "os"
  11. "strconv"
  12. "strings"
  13. "time"
  14. "miniflux.app/v2/internal/api"
  15. "miniflux.app/v2/internal/config"
  16. "miniflux.app/v2/internal/fever"
  17. "miniflux.app/v2/internal/googlereader"
  18. "miniflux.app/v2/internal/http/request"
  19. "miniflux.app/v2/internal/storage"
  20. "miniflux.app/v2/internal/ui"
  21. "miniflux.app/v2/internal/version"
  22. "miniflux.app/v2/internal/worker"
  23. "github.com/gorilla/mux"
  24. "github.com/prometheus/client_golang/prometheus/promhttp"
  25. "golang.org/x/crypto/acme"
  26. "golang.org/x/crypto/acme/autocert"
  27. )
  28. func StartWebServer(store *storage.Storage, pool *worker.Pool) *http.Server {
  29. certFile := config.Opts.CertFile()
  30. keyFile := config.Opts.CertKeyFile()
  31. certDomain := config.Opts.CertDomain()
  32. listenAddr := config.Opts.ListenAddr()
  33. server := &http.Server{
  34. ReadTimeout: time.Duration(config.Opts.HTTPServerTimeout()) * time.Second,
  35. WriteTimeout: time.Duration(config.Opts.HTTPServerTimeout()) * time.Second,
  36. IdleTimeout: time.Duration(config.Opts.HTTPServerTimeout()) * time.Second,
  37. Handler: setupHandler(store, pool),
  38. }
  39. switch {
  40. case os.Getenv("LISTEN_PID") == strconv.Itoa(os.Getpid()):
  41. startSystemdSocketServer(server)
  42. case strings.HasPrefix(listenAddr, "/"):
  43. startUnixSocketServer(server, listenAddr)
  44. case certDomain != "":
  45. config.Opts.HTTPS = true
  46. startAutoCertTLSServer(server, certDomain, store)
  47. case certFile != "" && keyFile != "":
  48. config.Opts.HTTPS = true
  49. server.Addr = listenAddr
  50. startTLSServer(server, certFile, keyFile)
  51. default:
  52. server.Addr = listenAddr
  53. startHTTPServer(server)
  54. }
  55. return server
  56. }
  57. func startSystemdSocketServer(server *http.Server) {
  58. go func() {
  59. f := os.NewFile(3, "systemd socket")
  60. listener, err := net.FileListener(f)
  61. if err != nil {
  62. printErrorAndExit(`Unable to create listener from systemd socket: %v`, err)
  63. }
  64. slog.Info(`Starting server using systemd socket`)
  65. if err := server.Serve(listener); err != http.ErrServerClosed {
  66. printErrorAndExit(`Server failed to start: %v`, err)
  67. }
  68. }()
  69. }
  70. func startUnixSocketServer(server *http.Server, socketFile string) {
  71. os.Remove(socketFile)
  72. go func(sock string) {
  73. listener, err := net.Listen("unix", sock)
  74. if err != nil {
  75. printErrorAndExit(`Server failed to start: %v`, err)
  76. }
  77. defer listener.Close()
  78. if err := os.Chmod(sock, 0666); err != nil {
  79. printErrorAndExit(`Unable to change socket permission: %v`, err)
  80. }
  81. slog.Info("Starting server using a Unix socket", slog.String("socket", sock))
  82. if err := server.Serve(listener); err != http.ErrServerClosed {
  83. printErrorAndExit(`Server failed to start: %v`, err)
  84. }
  85. }(socketFile)
  86. }
  87. func tlsConfig() *tls.Config {
  88. // See https://blog.cloudflare.com/exposing-go-on-the-internet/
  89. // And https://wiki.mozilla.org/Security/Server_Side_TLS
  90. return &tls.Config{
  91. MinVersion: tls.VersionTLS12,
  92. CurvePreferences: []tls.CurveID{
  93. tls.CurveP256,
  94. tls.X25519,
  95. },
  96. CipherSuites: []uint16{
  97. tls.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
  98. tls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
  99. tls.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
  100. tls.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,
  101. tls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
  102. tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
  103. },
  104. }
  105. }
  106. func startAutoCertTLSServer(server *http.Server, certDomain string, store *storage.Storage) {
  107. server.Addr = ":https"
  108. certManager := autocert.Manager{
  109. Cache: storage.NewCertificateCache(store),
  110. Prompt: autocert.AcceptTOS,
  111. HostPolicy: autocert.HostWhitelist(certDomain),
  112. }
  113. server.TLSConfig = tlsConfig()
  114. server.TLSConfig.GetCertificate = certManager.GetCertificate
  115. server.TLSConfig.NextProtos = []string{"h2", "http/1.1", acme.ALPNProto}
  116. // Handle http-01 challenge.
  117. s := &http.Server{
  118. Handler: certManager.HTTPHandler(nil),
  119. Addr: ":http",
  120. }
  121. go s.ListenAndServe()
  122. go func() {
  123. slog.Info("Starting TLS server using automatic certificate management",
  124. slog.String("listen_address", server.Addr),
  125. slog.String("domain", certDomain),
  126. )
  127. if err := server.ListenAndServeTLS("", ""); err != http.ErrServerClosed {
  128. printErrorAndExit(`Server failed to start: %v`, err)
  129. }
  130. }()
  131. }
  132. func startTLSServer(server *http.Server, certFile, keyFile string) {
  133. server.TLSConfig = tlsConfig()
  134. go func() {
  135. slog.Info("Starting TLS server using a certificate",
  136. slog.String("listen_address", server.Addr),
  137. slog.String("cert_file", certFile),
  138. slog.String("key_file", keyFile),
  139. )
  140. if err := server.ListenAndServeTLS(certFile, keyFile); err != http.ErrServerClosed {
  141. printErrorAndExit(`Server failed to start: %v`, err)
  142. }
  143. }()
  144. }
  145. func startHTTPServer(server *http.Server) {
  146. go func() {
  147. slog.Info("Starting HTTP server",
  148. slog.String("listen_address", server.Addr),
  149. )
  150. if err := server.ListenAndServe(); err != http.ErrServerClosed {
  151. printErrorAndExit(`Server failed to start: %v`, err)
  152. }
  153. }()
  154. }
  155. func setupHandler(store *storage.Storage, pool *worker.Pool) *mux.Router {
  156. livenessProbe := func(w http.ResponseWriter, r *http.Request) {
  157. w.WriteHeader(http.StatusOK)
  158. w.Write([]byte("OK"))
  159. }
  160. readinessProbe := func(w http.ResponseWriter, r *http.Request) {
  161. if err := store.Ping(); err != nil {
  162. http.Error(w, fmt.Sprintf("Database Connection Error: %q", err), http.StatusServiceUnavailable)
  163. return
  164. }
  165. w.WriteHeader(http.StatusOK)
  166. w.Write([]byte("OK"))
  167. }
  168. router := mux.NewRouter()
  169. // These routes do not take the base path into consideration and are always available at the root of the server.
  170. router.HandleFunc("/liveness", livenessProbe).Name("liveness")
  171. router.HandleFunc("/healthz", livenessProbe).Name("healthz")
  172. router.HandleFunc("/readiness", readinessProbe).Name("readiness")
  173. router.HandleFunc("/readyz", readinessProbe).Name("readyz")
  174. var subrouter *mux.Router
  175. if config.Opts.BasePath() != "" {
  176. subrouter = router.PathPrefix(config.Opts.BasePath()).Subrouter()
  177. } else {
  178. subrouter = router.NewRoute().Subrouter()
  179. }
  180. if config.Opts.HasMaintenanceMode() {
  181. subrouter.Use(func(next http.Handler) http.Handler {
  182. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  183. w.Write([]byte(config.Opts.MaintenanceMessage()))
  184. })
  185. })
  186. }
  187. subrouter.Use(middleware)
  188. fever.Serve(subrouter, store)
  189. googlereader.Serve(subrouter, store)
  190. api.Serve(subrouter, store, pool)
  191. ui.Serve(subrouter, store, pool)
  192. subrouter.HandleFunc("/healthcheck", readinessProbe).Name("healthcheck")
  193. subrouter.HandleFunc("/version", func(w http.ResponseWriter, r *http.Request) {
  194. w.Write([]byte(version.Version))
  195. }).Name("version")
  196. if config.Opts.HasMetricsCollector() {
  197. subrouter.Handle("/metrics", promhttp.Handler()).Name("metrics")
  198. subrouter.Use(func(next http.Handler) http.Handler {
  199. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  200. route := mux.CurrentRoute(r)
  201. // Returns a 404 if the client is not authorized to access the metrics endpoint.
  202. if route.GetName() == "metrics" && !isAllowedToAccessMetricsEndpoint(r) {
  203. slog.Warn("Authentication failed while accessing the metrics endpoint",
  204. slog.String("client_ip", request.ClientIP(r)),
  205. slog.String("client_user_agent", r.UserAgent()),
  206. slog.String("client_remote_addr", r.RemoteAddr),
  207. )
  208. http.NotFound(w, r)
  209. return
  210. }
  211. next.ServeHTTP(w, r)
  212. })
  213. })
  214. }
  215. return router
  216. }
  217. func isAllowedToAccessMetricsEndpoint(r *http.Request) bool {
  218. clientIP := request.ClientIP(r)
  219. if config.Opts.MetricsUsername() != "" && config.Opts.MetricsPassword() != "" {
  220. username, password, authOK := r.BasicAuth()
  221. if !authOK {
  222. slog.Warn("Metrics endpoint accessed without authentication header",
  223. slog.Bool("authentication_failed", true),
  224. slog.String("client_ip", clientIP),
  225. slog.String("client_user_agent", r.UserAgent()),
  226. slog.String("client_remote_addr", r.RemoteAddr),
  227. )
  228. return false
  229. }
  230. if username == "" || password == "" {
  231. slog.Warn("Metrics endpoint accessed with empty username or password",
  232. slog.Bool("authentication_failed", true),
  233. slog.String("client_ip", clientIP),
  234. slog.String("client_user_agent", r.UserAgent()),
  235. slog.String("client_remote_addr", r.RemoteAddr),
  236. )
  237. return false
  238. }
  239. if username != config.Opts.MetricsUsername() || password != config.Opts.MetricsPassword() {
  240. slog.Warn("Metrics endpoint accessed with invalid username or password",
  241. slog.Bool("authentication_failed", true),
  242. slog.String("client_ip", clientIP),
  243. slog.String("client_user_agent", r.UserAgent()),
  244. slog.String("client_remote_addr", r.RemoteAddr),
  245. )
  246. return false
  247. }
  248. }
  249. remoteIP := request.FindRemoteIP(r)
  250. if remoteIP == "@" {
  251. // This indicates a request sent via a Unix socket, always consider these trusted.
  252. return true
  253. }
  254. for _, cidr := range config.Opts.MetricsAllowedNetworks() {
  255. _, network, err := net.ParseCIDR(cidr)
  256. if err != nil {
  257. slog.Error("Metrics endpoint accessed with invalid CIDR",
  258. slog.Bool("authentication_failed", true),
  259. slog.String("client_ip", clientIP),
  260. slog.String("client_user_agent", r.UserAgent()),
  261. slog.String("client_remote_addr", r.RemoteAddr),
  262. slog.String("cidr", cidr),
  263. )
  264. return false
  265. }
  266. // We use r.RemoteAddr in this case because HTTP headers like X-Forwarded-For can be easily spoofed.
  267. // The recommendation is to use HTTP Basic authentication.
  268. if network.Contains(net.ParseIP(remoteIP)) {
  269. return true
  270. }
  271. }
  272. return false
  273. }
  274. func printErrorAndExit(format string, a ...any) {
  275. message := fmt.Sprintf(format, a...)
  276. slog.Error(message)
  277. fmt.Fprintf(os.Stderr, "%v\n", message)
  278. os.Exit(1)
  279. }