4
0

httpd.go 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321
  1. // SPDX-FileCopyrightText: Copyright The Miniflux Authors. All rights reserved.
  2. // SPDX-License-Identifier: Apache-2.0
  3. package server // import "miniflux.app/v2/internal/http/server"
  4. import (
  5. "crypto/tls"
  6. "fmt"
  7. "log/slog"
  8. "net"
  9. "net/http"
  10. "os"
  11. "strconv"
  12. "strings"
  13. "miniflux.app/v2/internal/api"
  14. "miniflux.app/v2/internal/config"
  15. "miniflux.app/v2/internal/fever"
  16. "miniflux.app/v2/internal/googlereader"
  17. "miniflux.app/v2/internal/http/request"
  18. "miniflux.app/v2/internal/storage"
  19. "miniflux.app/v2/internal/ui"
  20. "miniflux.app/v2/internal/worker"
  21. "github.com/gorilla/mux"
  22. "github.com/prometheus/client_golang/prometheus/promhttp"
  23. "golang.org/x/crypto/acme"
  24. "golang.org/x/crypto/acme/autocert"
  25. )
  26. func StartWebServer(store *storage.Storage, pool *worker.Pool) []*http.Server {
  27. listenAddresses := config.Opts.ListenAddr()
  28. var httpServers []*http.Server
  29. certFile := config.Opts.CertFile()
  30. keyFile := config.Opts.CertKeyFile()
  31. certDomain := config.Opts.CertDomain()
  32. var sharedAutocertTLSConfig *tls.Config
  33. if certDomain != "" {
  34. slog.Debug("Configuring autocert manager and shared TLS config", slog.String("domain", certDomain))
  35. certManager := autocert.Manager{
  36. Cache: storage.NewCertificateCache(store),
  37. Prompt: autocert.AcceptTOS,
  38. HostPolicy: autocert.HostWhitelist(certDomain),
  39. }
  40. sharedAutocertTLSConfig = &tls.Config{}
  41. sharedAutocertTLSConfig.GetCertificate = certManager.GetCertificate
  42. sharedAutocertTLSConfig.NextProtos = []string{"h2", "http/1.1", acme.ALPNProto}
  43. challengeServer := &http.Server{
  44. Handler: certManager.HTTPHandler(nil),
  45. Addr: ":http",
  46. }
  47. slog.Info("Starting ACME HTTP challenge server for autocert", slog.String("address", challengeServer.Addr))
  48. go func() {
  49. if err := challengeServer.ListenAndServe(); err != http.ErrServerClosed {
  50. slog.Error("ACME HTTP challenge server failed", slog.Any("error", err))
  51. }
  52. }()
  53. config.Opts.SetHTTPSValue(true)
  54. httpServers = append(httpServers, challengeServer)
  55. }
  56. for i, listenAddr := range listenAddresses {
  57. server := &http.Server{
  58. ReadTimeout: config.Opts.HTTPServerTimeout(),
  59. WriteTimeout: config.Opts.HTTPServerTimeout(),
  60. IdleTimeout: config.Opts.HTTPServerTimeout(),
  61. Handler: setupHandler(store, pool),
  62. }
  63. isUNIXSocket := strings.HasPrefix(listenAddr, "/")
  64. isListenPID := os.Getenv("LISTEN_PID") == strconv.Itoa(os.Getpid())
  65. if !isUNIXSocket && !isListenPID {
  66. server.Addr = listenAddr
  67. }
  68. switch {
  69. case isListenPID:
  70. if i == 0 {
  71. slog.Info("Starting server using systemd socket for the first listen address", slog.String("address_info", listenAddr))
  72. startSystemdSocketServer(server)
  73. } else {
  74. slog.Warn("Systemd socket activation: Only the first listen address is used by systemd. Other addresses are ignored.", slog.String("skipped_address", listenAddr))
  75. continue
  76. }
  77. case isUNIXSocket:
  78. startUnixSocketServer(server, listenAddr)
  79. case certDomain != "" && (listenAddr == ":https" || (i == 0 && strings.Contains(listenAddr, ":"))):
  80. server.Addr = listenAddr
  81. startAutoCertTLSServer(server, sharedAutocertTLSConfig)
  82. case certFile != "" && keyFile != "":
  83. server.Addr = listenAddr
  84. startTLSServer(server, certFile, keyFile)
  85. config.Opts.SetHTTPSValue(true)
  86. default:
  87. server.Addr = listenAddr
  88. startHTTPServer(server)
  89. }
  90. httpServers = append(httpServers, server)
  91. }
  92. return httpServers
  93. }
  94. func startSystemdSocketServer(server *http.Server) {
  95. go func() {
  96. f := os.NewFile(3, "systemd socket")
  97. listener, err := net.FileListener(f)
  98. if err != nil {
  99. printErrorAndExit(`Unable to create listener from systemd socket: %v`, err)
  100. }
  101. slog.Info(`Starting server using systemd socket`)
  102. if err := server.Serve(listener); err != http.ErrServerClosed {
  103. printErrorAndExit(`Systemd socket server failed to start: %v`, err)
  104. }
  105. }()
  106. }
  107. func startUnixSocketServer(server *http.Server, socketFile string) {
  108. if err := os.Remove(socketFile); err != nil && !os.IsNotExist(err) {
  109. printErrorAndExit("Unable to remove existing Unix socket %s: %v", socketFile, err)
  110. }
  111. listener, err := net.Listen("unix", socketFile)
  112. if err != nil {
  113. printErrorAndExit(`Server failed to listen on Unix socket %s: %v`, socketFile, err)
  114. }
  115. if err := os.Chmod(socketFile, 0666); err != nil {
  116. printErrorAndExit(`Unable to change socket permission for %s: %v`, socketFile, err)
  117. }
  118. go func() {
  119. certFile := config.Opts.CertFile()
  120. keyFile := config.Opts.CertKeyFile()
  121. if certFile != "" && keyFile != "" {
  122. slog.Info("Starting TLS server using a Unix socket",
  123. slog.String("socket", socketFile),
  124. slog.String("cert_file", certFile),
  125. slog.String("key_file", keyFile),
  126. )
  127. // Ensure HTTPS is marked as true if any listener uses TLS
  128. config.Opts.SetHTTPSValue(true)
  129. if err := server.ServeTLS(listener, certFile, keyFile); err != http.ErrServerClosed {
  130. printErrorAndExit("TLS Unix socket server failed to start on %s: %v", socketFile, err)
  131. }
  132. } else {
  133. slog.Info("Starting server using a Unix socket", slog.String("socket", socketFile))
  134. if err := server.Serve(listener); err != http.ErrServerClosed {
  135. printErrorAndExit("Unix socket server failed to start on %s: %v", socketFile, err)
  136. }
  137. }
  138. }()
  139. }
  140. func startAutoCertTLSServer(server *http.Server, autoTLSConfig *tls.Config) {
  141. if server.TLSConfig == nil {
  142. server.TLSConfig = &tls.Config{}
  143. }
  144. server.TLSConfig.GetCertificate = autoTLSConfig.GetCertificate
  145. server.TLSConfig.NextProtos = autoTLSConfig.NextProtos
  146. go func() {
  147. slog.Info("Starting TLS server using automatic certificate management",
  148. slog.String("listen_address", server.Addr),
  149. )
  150. if err := server.ListenAndServeTLS("", ""); err != http.ErrServerClosed {
  151. printErrorAndExit("Autocert server failed to start on %s: %v", server.Addr, err)
  152. }
  153. }()
  154. }
  155. func startTLSServer(server *http.Server, certFile, keyFile string) {
  156. go func() {
  157. slog.Info("Starting TLS server using a certificate",
  158. slog.String("listen_address", server.Addr),
  159. slog.String("cert_file", certFile),
  160. slog.String("key_file", keyFile),
  161. )
  162. if err := server.ListenAndServeTLS(certFile, keyFile); err != http.ErrServerClosed {
  163. printErrorAndExit("TLS server failed to start on %s: %v", server.Addr, err)
  164. }
  165. }()
  166. }
  167. func startHTTPServer(server *http.Server) {
  168. go func() {
  169. slog.Info("Starting HTTP server",
  170. slog.String("listen_address", server.Addr),
  171. )
  172. if err := server.ListenAndServe(); err != http.ErrServerClosed {
  173. printErrorAndExit("HTTP server failed to start on %s: %v", server.Addr, err)
  174. }
  175. }()
  176. }
  177. func setupHandler(store *storage.Storage, pool *worker.Pool) *mux.Router {
  178. livenessProbe := func(w http.ResponseWriter, r *http.Request) {
  179. w.WriteHeader(http.StatusOK)
  180. w.Write([]byte("OK"))
  181. }
  182. readinessProbe := func(w http.ResponseWriter, r *http.Request) {
  183. if err := store.Ping(); err != nil {
  184. http.Error(w, fmt.Sprintf("Database Connection Error: %q", err), http.StatusServiceUnavailable)
  185. return
  186. }
  187. w.WriteHeader(http.StatusOK)
  188. w.Write([]byte("OK"))
  189. }
  190. router := mux.NewRouter()
  191. // These routes do not take the base path into consideration and are always available at the root of the server.
  192. router.HandleFunc("/liveness", livenessProbe).Name("liveness")
  193. router.HandleFunc("/healthz", livenessProbe).Name("healthz")
  194. router.HandleFunc("/readiness", readinessProbe).Name("readiness")
  195. router.HandleFunc("/readyz", readinessProbe).Name("readyz")
  196. var subrouter *mux.Router
  197. if config.Opts.BasePath() != "" {
  198. subrouter = router.PathPrefix(config.Opts.BasePath()).Subrouter()
  199. } else {
  200. subrouter = router.NewRoute().Subrouter()
  201. }
  202. if config.Opts.HasMaintenanceMode() {
  203. subrouter.Use(func(next http.Handler) http.Handler {
  204. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  205. w.Write([]byte(config.Opts.MaintenanceMessage()))
  206. })
  207. })
  208. }
  209. subrouter.Use(middleware)
  210. fever.Serve(subrouter, store)
  211. googlereader.Serve(subrouter, store)
  212. if config.Opts.HasAPI() {
  213. api.Serve(subrouter, store, pool)
  214. }
  215. ui.Serve(subrouter, store, pool)
  216. subrouter.HandleFunc("/healthcheck", readinessProbe).Name("healthcheck")
  217. if config.Opts.HasMetricsCollector() {
  218. subrouter.Handle("/metrics", promhttp.Handler()).Name("metrics")
  219. subrouter.Use(func(next http.Handler) http.Handler {
  220. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  221. route := mux.CurrentRoute(r)
  222. // Returns a 404 if the client is not authorized to access the metrics endpoint.
  223. if route.GetName() == "metrics" && !isAllowedToAccessMetricsEndpoint(r) {
  224. slog.Warn("Authentication failed while accessing the metrics endpoint",
  225. slog.String("client_ip", request.ClientIP(r)),
  226. slog.String("client_user_agent", r.UserAgent()),
  227. slog.String("client_remote_addr", r.RemoteAddr),
  228. )
  229. http.NotFound(w, r)
  230. return
  231. }
  232. next.ServeHTTP(w, r)
  233. })
  234. })
  235. }
  236. return router
  237. }
  238. func isAllowedToAccessMetricsEndpoint(r *http.Request) bool {
  239. clientIP := request.ClientIP(r)
  240. if config.Opts.MetricsUsername() != "" && config.Opts.MetricsPassword() != "" {
  241. username, password, authOK := r.BasicAuth()
  242. if !authOK {
  243. slog.Warn("Metrics endpoint accessed without authentication header",
  244. slog.Bool("authentication_failed", true),
  245. slog.String("client_ip", clientIP),
  246. slog.String("client_user_agent", r.UserAgent()),
  247. slog.String("client_remote_addr", r.RemoteAddr),
  248. )
  249. return false
  250. }
  251. if username == "" || password == "" {
  252. slog.Warn("Metrics endpoint accessed with empty username or password",
  253. slog.Bool("authentication_failed", true),
  254. slog.String("client_ip", clientIP),
  255. slog.String("client_user_agent", r.UserAgent()),
  256. slog.String("client_remote_addr", r.RemoteAddr),
  257. )
  258. return false
  259. }
  260. if username != config.Opts.MetricsUsername() || password != config.Opts.MetricsPassword() {
  261. slog.Warn("Metrics endpoint accessed with invalid username or password",
  262. slog.Bool("authentication_failed", true),
  263. slog.String("client_ip", clientIP),
  264. slog.String("client_user_agent", r.UserAgent()),
  265. slog.String("client_remote_addr", r.RemoteAddr),
  266. )
  267. return false
  268. }
  269. }
  270. remoteIP := request.FindRemoteIP(r)
  271. return request.IsTrustedIP(remoteIP, config.Opts.MetricsAllowedNetworks())
  272. }
  273. func printErrorAndExit(format string, a ...any) {
  274. message := fmt.Sprintf(format, a...)
  275. slog.Error(message)
  276. fmt.Fprintf(os.Stderr, "%v\n", message)
  277. os.Exit(1)
  278. }