httpd.go 8.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297
  1. // SPDX-FileCopyrightText: Copyright The Miniflux Authors. All rights reserved.
  2. // SPDX-License-Identifier: Apache-2.0
  3. package httpd // import "miniflux.app/v2/internal/http/server"
  4. import (
  5. "fmt"
  6. "log/slog"
  7. "net"
  8. "net/http"
  9. "os"
  10. "strconv"
  11. "strings"
  12. "time"
  13. "miniflux.app/v2/internal/api"
  14. "miniflux.app/v2/internal/config"
  15. "miniflux.app/v2/internal/fever"
  16. "miniflux.app/v2/internal/googlereader"
  17. "miniflux.app/v2/internal/http/request"
  18. "miniflux.app/v2/internal/storage"
  19. "miniflux.app/v2/internal/ui"
  20. "miniflux.app/v2/internal/version"
  21. "miniflux.app/v2/internal/worker"
  22. "github.com/gorilla/mux"
  23. "github.com/prometheus/client_golang/prometheus/promhttp"
  24. "golang.org/x/crypto/acme"
  25. "golang.org/x/crypto/acme/autocert"
  26. )
  27. func StartWebServer(store *storage.Storage, pool *worker.Pool) *http.Server {
  28. certFile := config.Opts.CertFile()
  29. keyFile := config.Opts.CertKeyFile()
  30. certDomain := config.Opts.CertDomain()
  31. listenAddr := config.Opts.ListenAddr()
  32. server := &http.Server{
  33. ReadTimeout: time.Duration(config.Opts.HTTPServerTimeout()) * time.Second,
  34. WriteTimeout: time.Duration(config.Opts.HTTPServerTimeout()) * time.Second,
  35. IdleTimeout: time.Duration(config.Opts.HTTPServerTimeout()) * time.Second,
  36. Handler: setupHandler(store, pool),
  37. }
  38. switch {
  39. case os.Getenv("LISTEN_PID") == strconv.Itoa(os.Getpid()):
  40. startSystemdSocketServer(server)
  41. case strings.HasPrefix(listenAddr, "/"):
  42. startUnixSocketServer(server, listenAddr)
  43. case certDomain != "":
  44. config.Opts.HTTPS = true
  45. startAutoCertTLSServer(server, certDomain, store)
  46. case certFile != "" && keyFile != "":
  47. config.Opts.HTTPS = true
  48. server.Addr = listenAddr
  49. startTLSServer(server, certFile, keyFile)
  50. default:
  51. server.Addr = listenAddr
  52. startHTTPServer(server)
  53. }
  54. return server
  55. }
  56. func startSystemdSocketServer(server *http.Server) {
  57. go func() {
  58. f := os.NewFile(3, "systemd socket")
  59. listener, err := net.FileListener(f)
  60. if err != nil {
  61. printErrorAndExit(`Unable to create listener from systemd socket: %v`, err)
  62. }
  63. slog.Info(`Starting server using systemd socket`)
  64. if err := server.Serve(listener); err != http.ErrServerClosed {
  65. printErrorAndExit(`Server failed to start: %v`, err)
  66. }
  67. }()
  68. }
  69. func startUnixSocketServer(server *http.Server, socketFile string) {
  70. os.Remove(socketFile)
  71. go func(sock string) {
  72. listener, err := net.Listen("unix", sock)
  73. if err != nil {
  74. printErrorAndExit(`Server failed to start: %v`, err)
  75. }
  76. defer listener.Close()
  77. if err := os.Chmod(sock, 0666); err != nil {
  78. printErrorAndExit(`Unable to change socket permission: %v`, err)
  79. }
  80. slog.Info("Starting server using a Unix socket", slog.String("socket", sock))
  81. if err := server.Serve(listener); err != http.ErrServerClosed {
  82. printErrorAndExit(`Server failed to start: %v`, err)
  83. }
  84. }(socketFile)
  85. }
  86. func startAutoCertTLSServer(server *http.Server, certDomain string, store *storage.Storage) {
  87. server.Addr = ":https"
  88. certManager := autocert.Manager{
  89. Cache: storage.NewCertificateCache(store),
  90. Prompt: autocert.AcceptTOS,
  91. HostPolicy: autocert.HostWhitelist(certDomain),
  92. }
  93. server.TLSConfig.GetCertificate = certManager.GetCertificate
  94. server.TLSConfig.NextProtos = []string{"h2", "http/1.1", acme.ALPNProto}
  95. // Handle http-01 challenge.
  96. s := &http.Server{
  97. Handler: certManager.HTTPHandler(nil),
  98. Addr: ":http",
  99. }
  100. go s.ListenAndServe()
  101. go func() {
  102. slog.Info("Starting TLS server using automatic certificate management",
  103. slog.String("listen_address", server.Addr),
  104. slog.String("domain", certDomain),
  105. )
  106. if err := server.ListenAndServeTLS("", ""); err != http.ErrServerClosed {
  107. printErrorAndExit(`Server failed to start: %v`, err)
  108. }
  109. }()
  110. }
  111. func startTLSServer(server *http.Server, certFile, keyFile string) {
  112. go func() {
  113. slog.Info("Starting TLS server using a certificate",
  114. slog.String("listen_address", server.Addr),
  115. slog.String("cert_file", certFile),
  116. slog.String("key_file", keyFile),
  117. )
  118. if err := server.ListenAndServeTLS(certFile, keyFile); err != http.ErrServerClosed {
  119. printErrorAndExit(`Server failed to start: %v`, err)
  120. }
  121. }()
  122. }
  123. func startHTTPServer(server *http.Server) {
  124. go func() {
  125. slog.Info("Starting HTTP server",
  126. slog.String("listen_address", server.Addr),
  127. )
  128. if err := server.ListenAndServe(); err != http.ErrServerClosed {
  129. printErrorAndExit(`Server failed to start: %v`, err)
  130. }
  131. }()
  132. }
  133. func setupHandler(store *storage.Storage, pool *worker.Pool) *mux.Router {
  134. livenessProbe := func(w http.ResponseWriter, r *http.Request) {
  135. w.WriteHeader(http.StatusOK)
  136. w.Write([]byte("OK"))
  137. }
  138. readinessProbe := func(w http.ResponseWriter, r *http.Request) {
  139. if err := store.Ping(); err != nil {
  140. http.Error(w, fmt.Sprintf("Database Connection Error: %q", err), http.StatusServiceUnavailable)
  141. return
  142. }
  143. w.WriteHeader(http.StatusOK)
  144. w.Write([]byte("OK"))
  145. }
  146. router := mux.NewRouter()
  147. // These routes do not take the base path into consideration and are always available at the root of the server.
  148. router.HandleFunc("/liveness", livenessProbe).Name("liveness")
  149. router.HandleFunc("/healthz", livenessProbe).Name("healthz")
  150. router.HandleFunc("/readiness", readinessProbe).Name("readiness")
  151. router.HandleFunc("/readyz", readinessProbe).Name("readyz")
  152. var subrouter *mux.Router
  153. if config.Opts.BasePath() != "" {
  154. subrouter = router.PathPrefix(config.Opts.BasePath()).Subrouter()
  155. } else {
  156. subrouter = router.NewRoute().Subrouter()
  157. }
  158. if config.Opts.HasMaintenanceMode() {
  159. subrouter.Use(func(next http.Handler) http.Handler {
  160. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  161. w.Write([]byte(config.Opts.MaintenanceMessage()))
  162. })
  163. })
  164. }
  165. subrouter.Use(middleware)
  166. fever.Serve(subrouter, store)
  167. googlereader.Serve(subrouter, store)
  168. api.Serve(subrouter, store, pool)
  169. ui.Serve(subrouter, store, pool)
  170. subrouter.HandleFunc("/healthcheck", readinessProbe).Name("healthcheck")
  171. subrouter.HandleFunc("/version", func(w http.ResponseWriter, r *http.Request) {
  172. w.Write([]byte(version.Version))
  173. }).Name("version")
  174. if config.Opts.HasMetricsCollector() {
  175. subrouter.Handle("/metrics", promhttp.Handler()).Name("metrics")
  176. subrouter.Use(func(next http.Handler) http.Handler {
  177. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  178. route := mux.CurrentRoute(r)
  179. // Returns a 404 if the client is not authorized to access the metrics endpoint.
  180. if route.GetName() == "metrics" && !isAllowedToAccessMetricsEndpoint(r) {
  181. slog.Warn("Authentication failed while accessing the metrics endpoint",
  182. slog.String("client_ip", request.ClientIP(r)),
  183. slog.String("client_user_agent", r.UserAgent()),
  184. slog.String("client_remote_addr", r.RemoteAddr),
  185. )
  186. http.NotFound(w, r)
  187. return
  188. }
  189. next.ServeHTTP(w, r)
  190. })
  191. })
  192. }
  193. return router
  194. }
  195. func isAllowedToAccessMetricsEndpoint(r *http.Request) bool {
  196. clientIP := request.ClientIP(r)
  197. if config.Opts.MetricsUsername() != "" && config.Opts.MetricsPassword() != "" {
  198. username, password, authOK := r.BasicAuth()
  199. if !authOK {
  200. slog.Warn("Metrics endpoint accessed without authentication header",
  201. slog.Bool("authentication_failed", true),
  202. slog.String("client_ip", clientIP),
  203. slog.String("client_user_agent", r.UserAgent()),
  204. slog.String("client_remote_addr", r.RemoteAddr),
  205. )
  206. return false
  207. }
  208. if username == "" || password == "" {
  209. slog.Warn("Metrics endpoint accessed with empty username or password",
  210. slog.Bool("authentication_failed", true),
  211. slog.String("client_ip", clientIP),
  212. slog.String("client_user_agent", r.UserAgent()),
  213. slog.String("client_remote_addr", r.RemoteAddr),
  214. )
  215. return false
  216. }
  217. if username != config.Opts.MetricsUsername() || password != config.Opts.MetricsPassword() {
  218. slog.Warn("Metrics endpoint accessed with invalid username or password",
  219. slog.Bool("authentication_failed", true),
  220. slog.String("client_ip", clientIP),
  221. slog.String("client_user_agent", r.UserAgent()),
  222. slog.String("client_remote_addr", r.RemoteAddr),
  223. )
  224. return false
  225. }
  226. }
  227. remoteIP := request.FindRemoteIP(r)
  228. if remoteIP == "@" {
  229. // This indicates a request sent via a Unix socket, always consider these trusted.
  230. return true
  231. }
  232. for _, cidr := range config.Opts.MetricsAllowedNetworks() {
  233. _, network, err := net.ParseCIDR(cidr)
  234. if err != nil {
  235. slog.Error("Metrics endpoint accessed with invalid CIDR",
  236. slog.Bool("authentication_failed", true),
  237. slog.String("client_ip", clientIP),
  238. slog.String("client_user_agent", r.UserAgent()),
  239. slog.String("client_remote_addr", r.RemoteAddr),
  240. slog.String("cidr", cidr),
  241. )
  242. return false
  243. }
  244. // We use r.RemoteAddr in this case because HTTP headers like X-Forwarded-For can be easily spoofed.
  245. // The recommendation is to use HTTP Basic authentication.
  246. if network.Contains(net.ParseIP(remoteIP)) {
  247. return true
  248. }
  249. }
  250. return false
  251. }
  252. func printErrorAndExit(format string, a ...any) {
  253. message := fmt.Sprintf(format, a...)
  254. slog.Error(message)
  255. fmt.Fprintf(os.Stderr, "%v\n", message)
  256. os.Exit(1)
  257. }