httpd.go 7.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258
  1. // Copyright 2018 Frédéric Guillot. All rights reserved.
  2. // Use of this source code is governed by the Apache 2.0
  3. // license that can be found in the LICENSE file.
  4. package httpd // import "miniflux.app/service/httpd"
  5. import (
  6. "crypto/tls"
  7. "net"
  8. "net/http"
  9. "os"
  10. "strconv"
  11. "strings"
  12. "time"
  13. "miniflux.app/api"
  14. "miniflux.app/config"
  15. "miniflux.app/fever"
  16. "miniflux.app/googlereader"
  17. "miniflux.app/http/request"
  18. "miniflux.app/logger"
  19. "miniflux.app/storage"
  20. "miniflux.app/ui"
  21. "miniflux.app/version"
  22. "miniflux.app/worker"
  23. "github.com/gorilla/mux"
  24. "github.com/prometheus/client_golang/prometheus/promhttp"
  25. "golang.org/x/crypto/acme"
  26. "golang.org/x/crypto/acme/autocert"
  27. )
  28. // Serve starts a new HTTP server.
  29. func Serve(store *storage.Storage, pool *worker.Pool) *http.Server {
  30. certFile := config.Opts.CertFile()
  31. keyFile := config.Opts.CertKeyFile()
  32. certDomain := config.Opts.CertDomain()
  33. listenAddr := config.Opts.ListenAddr()
  34. server := &http.Server{
  35. ReadTimeout: time.Duration(config.Opts.HTTPServerTimeout()) * time.Second,
  36. WriteTimeout: time.Duration(config.Opts.HTTPServerTimeout()) * time.Second,
  37. IdleTimeout: time.Duration(config.Opts.HTTPServerTimeout()) * time.Second,
  38. Handler: setupHandler(store, pool),
  39. }
  40. switch {
  41. case os.Getenv("LISTEN_PID") == strconv.Itoa(os.Getpid()):
  42. startSystemdSocketServer(server)
  43. case strings.HasPrefix(listenAddr, "/"):
  44. startUnixSocketServer(server, listenAddr)
  45. case certDomain != "":
  46. config.Opts.HTTPS = true
  47. startAutoCertTLSServer(server, certDomain, store)
  48. case certFile != "" && keyFile != "":
  49. config.Opts.HTTPS = true
  50. server.Addr = listenAddr
  51. startTLSServer(server, certFile, keyFile)
  52. default:
  53. server.Addr = listenAddr
  54. startHTTPServer(server)
  55. }
  56. return server
  57. }
  58. func startSystemdSocketServer(server *http.Server) {
  59. go func() {
  60. f := os.NewFile(3, "systemd socket")
  61. listener, err := net.FileListener(f)
  62. if err != nil {
  63. logger.Fatal(`Unable to create listener from systemd socket: %v`, err)
  64. }
  65. logger.Info(`Listening on systemd socket`)
  66. if err := server.Serve(listener); err != http.ErrServerClosed {
  67. logger.Fatal(`Server failed to start: %v`, err)
  68. }
  69. }()
  70. }
  71. func startUnixSocketServer(server *http.Server, socketFile string) {
  72. os.Remove(socketFile)
  73. go func(sock string) {
  74. listener, err := net.Listen("unix", sock)
  75. if err != nil {
  76. logger.Fatal(`Server failed to start: %v`, err)
  77. }
  78. defer listener.Close()
  79. if err := os.Chmod(sock, 0666); err != nil {
  80. logger.Fatal(`Unable to change socket permission: %v`, err)
  81. }
  82. logger.Info(`Listening on Unix socket %q`, sock)
  83. if err := server.Serve(listener); err != http.ErrServerClosed {
  84. logger.Fatal(`Server failed to start: %v`, err)
  85. }
  86. }(socketFile)
  87. }
  88. func tlsConfig() *tls.Config {
  89. // See https://blog.cloudflare.com/exposing-go-on-the-internet/
  90. // And https://wikia.mozilla.org/Security/Server_Side_TLS
  91. return &tls.Config{
  92. MinVersion: tls.VersionTLS12,
  93. PreferServerCipherSuites: true,
  94. CurvePreferences: []tls.CurveID{
  95. tls.CurveP256,
  96. tls.X25519,
  97. },
  98. CipherSuites: []uint16{
  99. tls.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
  100. tls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
  101. tls.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
  102. tls.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,
  103. tls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
  104. tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
  105. },
  106. }
  107. }
  108. func startAutoCertTLSServer(server *http.Server, certDomain string, store *storage.Storage) {
  109. server.Addr = ":https"
  110. certManager := autocert.Manager{
  111. Cache: storage.NewCertificateCache(store),
  112. Prompt: autocert.AcceptTOS,
  113. HostPolicy: autocert.HostWhitelist(certDomain),
  114. }
  115. server.TLSConfig = tlsConfig()
  116. server.TLSConfig.GetCertificate = certManager.GetCertificate
  117. server.TLSConfig.NextProtos = []string{"h2", "http/1.1", acme.ALPNProto}
  118. // Handle http-01 challenge.
  119. s := &http.Server{
  120. Handler: certManager.HTTPHandler(nil),
  121. Addr: ":http",
  122. }
  123. go s.ListenAndServe()
  124. go func() {
  125. logger.Info(`Listening on %q by using auto-configured certificate for %q`, server.Addr, certDomain)
  126. if err := server.ListenAndServeTLS("", ""); err != http.ErrServerClosed {
  127. logger.Fatal(`Server failed to start: %v`, err)
  128. }
  129. }()
  130. }
  131. func startTLSServer(server *http.Server, certFile, keyFile string) {
  132. server.TLSConfig = tlsConfig()
  133. go func() {
  134. logger.Info(`Listening on %q by using certificate %q and key %q`, server.Addr, certFile, keyFile)
  135. if err := server.ListenAndServeTLS(certFile, keyFile); err != http.ErrServerClosed {
  136. logger.Fatal(`Server failed to start: %v`, err)
  137. }
  138. }()
  139. }
  140. func startHTTPServer(server *http.Server) {
  141. go func() {
  142. logger.Info(`Listening on %q without TLS`, server.Addr)
  143. if err := server.ListenAndServe(); err != http.ErrServerClosed {
  144. logger.Fatal(`Server failed to start: %v`, err)
  145. }
  146. }()
  147. }
  148. func setupHandler(store *storage.Storage, pool *worker.Pool) *mux.Router {
  149. router := mux.NewRouter()
  150. if config.Opts.BasePath() != "" {
  151. router = router.PathPrefix(config.Opts.BasePath()).Subrouter()
  152. }
  153. if config.Opts.HasMaintenanceMode() {
  154. router.Use(func(next http.Handler) http.Handler {
  155. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  156. w.Write([]byte(config.Opts.MaintenanceMessage()))
  157. })
  158. })
  159. }
  160. router.Use(middleware)
  161. fever.Serve(router, store)
  162. googlereader.Serve(router, store)
  163. api.Serve(router, store, pool)
  164. ui.Serve(router, store, pool)
  165. router.HandleFunc("/healthcheck", func(w http.ResponseWriter, r *http.Request) {
  166. if err := store.Ping(); err != nil {
  167. http.Error(w, "Database Connection Error", http.StatusInternalServerError)
  168. return
  169. }
  170. w.Write([]byte("OK"))
  171. }).Name("healthcheck")
  172. router.HandleFunc("/version", func(w http.ResponseWriter, r *http.Request) {
  173. w.Write([]byte(version.Version))
  174. }).Name("version")
  175. if config.Opts.HasMetricsCollector() {
  176. router.Handle("/metrics", promhttp.Handler()).Name("metrics")
  177. router.Use(func(next http.Handler) http.Handler {
  178. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  179. route := mux.CurrentRoute(r)
  180. // Returns a 404 if the client is not authorized to access the metrics endpoint.
  181. if route.GetName() == "metrics" && !isAllowedToAccessMetricsEndpoint(r) {
  182. logger.Error(`[Metrics] [ClientIP=%s] Client not allowed (%s)`, request.ClientIP(r), r.RemoteAddr)
  183. http.NotFound(w, r)
  184. return
  185. }
  186. next.ServeHTTP(w, r)
  187. })
  188. })
  189. }
  190. return router
  191. }
  192. func isAllowedToAccessMetricsEndpoint(r *http.Request) bool {
  193. if config.Opts.MetricsUsername() != "" && config.Opts.MetricsPassword() != "" {
  194. clientIP := request.ClientIP(r)
  195. username, password, authOK := r.BasicAuth()
  196. if !authOK {
  197. logger.Info("[Metrics] [ClientIP=%s] No authentication header sent", clientIP)
  198. return false
  199. }
  200. if username == "" || password == "" {
  201. logger.Info("[Metrics] [ClientIP=%s] Empty username or password", clientIP)
  202. return false
  203. }
  204. if username != config.Opts.MetricsUsername() || password != config.Opts.MetricsPassword() {
  205. logger.Error("[Metrics] [ClientIP=%s] Invalid username or password", clientIP)
  206. return false
  207. }
  208. }
  209. for _, cidr := range config.Opts.MetricsAllowedNetworks() {
  210. _, network, err := net.ParseCIDR(cidr)
  211. if err != nil {
  212. logger.Fatal(`[Metrics] Unable to parse CIDR %v`, err)
  213. }
  214. // We use r.RemoteAddr in this case because HTTP headers like X-Forwarded-For can be easily spoofed.
  215. // The recommendation is to use HTTP Basic authentication.
  216. if network.Contains(net.ParseIP(request.FindRemoteIP(r))) {
  217. return true
  218. }
  219. }
  220. return false
  221. }