httpd.go 6.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231
  1. // Copyright 2018 Frédéric Guillot. All rights reserved.
  2. // Use of this source code is governed by the Apache 2.0
  3. // license that can be found in the LICENSE file.
  4. package httpd // import "miniflux.app/service/httpd"
  5. import (
  6. "crypto/tls"
  7. "net"
  8. "net/http"
  9. "os"
  10. "strconv"
  11. "strings"
  12. "time"
  13. "miniflux.app/api"
  14. "miniflux.app/config"
  15. "miniflux.app/fever"
  16. "miniflux.app/http/request"
  17. "miniflux.app/logger"
  18. "miniflux.app/storage"
  19. "miniflux.app/ui"
  20. "miniflux.app/version"
  21. "miniflux.app/worker"
  22. "github.com/gorilla/mux"
  23. "github.com/prometheus/client_golang/prometheus/promhttp"
  24. "golang.org/x/crypto/acme/autocert"
  25. )
  26. // Serve starts a new HTTP server.
  27. func Serve(store *storage.Storage, pool *worker.Pool) *http.Server {
  28. certFile := config.Opts.CertFile()
  29. keyFile := config.Opts.CertKeyFile()
  30. certDomain := config.Opts.CertDomain()
  31. certCache := config.Opts.CertCache()
  32. listenAddr := config.Opts.ListenAddr()
  33. server := &http.Server{
  34. ReadTimeout: 300 * time.Second,
  35. WriteTimeout: 300 * time.Second,
  36. IdleTimeout: 300 * time.Second,
  37. Handler: setupHandler(store, pool),
  38. }
  39. switch {
  40. case os.Getenv("LISTEN_PID") == strconv.Itoa(os.Getpid()):
  41. startSystemdSocketServer(server)
  42. case strings.HasPrefix(listenAddr, "/"):
  43. startUnixSocketServer(server, listenAddr)
  44. case certDomain != "" && certCache != "":
  45. config.Opts.HTTPS = true
  46. startAutoCertTLSServer(server, certDomain, certCache)
  47. case certFile != "" && keyFile != "":
  48. config.Opts.HTTPS = true
  49. server.Addr = listenAddr
  50. startTLSServer(server, certFile, keyFile)
  51. default:
  52. server.Addr = listenAddr
  53. startHTTPServer(server)
  54. }
  55. return server
  56. }
  57. func startSystemdSocketServer(server *http.Server) {
  58. go func() {
  59. f := os.NewFile(3, "systemd socket")
  60. listener, err := net.FileListener(f)
  61. if err != nil {
  62. logger.Fatal(`Unable to create listener from systemd socket: %v`, err)
  63. }
  64. logger.Info(`Listening on systemd socket`)
  65. if err := server.Serve(listener); err != http.ErrServerClosed {
  66. logger.Fatal(`Server failed to start: %v`, err)
  67. }
  68. }()
  69. }
  70. func startUnixSocketServer(server *http.Server, socketFile string) {
  71. os.Remove(socketFile)
  72. go func(sock string) {
  73. listener, err := net.Listen("unix", sock)
  74. if err != nil {
  75. logger.Fatal(`Server failed to start: %v`, err)
  76. }
  77. defer listener.Close()
  78. if err := os.Chmod(sock, 0666); err != nil {
  79. logger.Fatal(`Unable to change socket permission: %v`, err)
  80. }
  81. logger.Info(`Listening on Unix socket %q`, sock)
  82. if err := server.Serve(listener); err != http.ErrServerClosed {
  83. logger.Fatal(`Server failed to start: %v`, err)
  84. }
  85. }(socketFile)
  86. }
  87. func tlsConfig() *tls.Config {
  88. // See https://blog.cloudflare.com/exposing-go-on-the-internet/
  89. // And https://wikia.mozilla.org/Security/Server_Side_TLS
  90. return &tls.Config{
  91. MinVersion: tls.VersionTLS12,
  92. PreferServerCipherSuites: true,
  93. CurvePreferences: []tls.CurveID{
  94. tls.CurveP256,
  95. tls.X25519,
  96. },
  97. CipherSuites: []uint16{
  98. tls.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
  99. tls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
  100. tls.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
  101. tls.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,
  102. tls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
  103. tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
  104. },
  105. }
  106. }
  107. func startAutoCertTLSServer(server *http.Server, certDomain, certCache string) {
  108. server.Addr = ":https"
  109. certManager := autocert.Manager{
  110. Cache: autocert.DirCache(certCache),
  111. Prompt: autocert.AcceptTOS,
  112. HostPolicy: autocert.HostWhitelist(certDomain),
  113. }
  114. server.TLSConfig = tlsConfig()
  115. server.TLSConfig.GetCertificate = certManager.GetCertificate
  116. // Handle http-01 challenge.
  117. s := &http.Server{
  118. Handler: certManager.HTTPHandler(nil),
  119. Addr: ":http",
  120. }
  121. go s.ListenAndServe()
  122. go func() {
  123. logger.Info(`Listening on %q by using auto-configured certificate for %q`, server.Addr, certDomain)
  124. if err := server.ListenAndServeTLS("", ""); err != http.ErrServerClosed {
  125. logger.Fatal(`Server failed to start: %v`, err)
  126. }
  127. }()
  128. }
  129. func startTLSServer(server *http.Server, certFile, keyFile string) {
  130. server.TLSConfig = tlsConfig()
  131. go func() {
  132. logger.Info(`Listening on %q by using certificate %q and key %q`, server.Addr, certFile, keyFile)
  133. if err := server.ListenAndServeTLS(certFile, keyFile); err != http.ErrServerClosed {
  134. logger.Fatal(`Server failed to start: %v`, err)
  135. }
  136. }()
  137. }
  138. func startHTTPServer(server *http.Server) {
  139. go func() {
  140. logger.Info(`Listening on %q without TLS`, server.Addr)
  141. if err := server.ListenAndServe(); err != http.ErrServerClosed {
  142. logger.Fatal(`Server failed to start: %v`, err)
  143. }
  144. }()
  145. }
  146. func setupHandler(store *storage.Storage, pool *worker.Pool) *mux.Router {
  147. router := mux.NewRouter()
  148. if config.Opts.BasePath() != "" {
  149. router = router.PathPrefix(config.Opts.BasePath()).Subrouter()
  150. }
  151. if config.Opts.HasMaintenanceMode() {
  152. router.Use(func(next http.Handler) http.Handler {
  153. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  154. w.Write([]byte(config.Opts.MaintenanceMessage()))
  155. })
  156. })
  157. }
  158. router.Use(middleware)
  159. fever.Serve(router, store)
  160. api.Serve(router, store, pool)
  161. ui.Serve(router, store, pool)
  162. router.HandleFunc("/healthcheck", func(w http.ResponseWriter, r *http.Request) {
  163. w.Write([]byte("OK"))
  164. }).Name("healthcheck")
  165. router.HandleFunc("/version", func(w http.ResponseWriter, r *http.Request) {
  166. w.Write([]byte(version.Version))
  167. }).Name("version")
  168. if config.Opts.HasMetricsCollector() {
  169. router.Handle("/metrics", promhttp.Handler()).Name("metrics")
  170. router.Use(func(next http.Handler) http.Handler {
  171. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  172. route := mux.CurrentRoute(r)
  173. // Returns a 404 if the client is not authorized to access the metrics endpoint.
  174. if route.GetName() == "metrics" && !isAllowedToAccessMetricsEndpoint(r) {
  175. logger.Error(`[Metrics] Client not allowed: %s`, request.ClientIP(r))
  176. http.NotFound(w, r)
  177. return
  178. }
  179. next.ServeHTTP(w, r)
  180. })
  181. })
  182. }
  183. return router
  184. }
  185. func isAllowedToAccessMetricsEndpoint(r *http.Request) bool {
  186. clientIP := net.ParseIP(request.ClientIP(r))
  187. for _, cidr := range config.Opts.MetricsAllowedNetworks() {
  188. _, network, err := net.ParseCIDR(cidr)
  189. if err != nil {
  190. logger.Fatal(`[Metrics] Unable to parse CIDR %v`, err)
  191. }
  192. if network.Contains(clientIP) {
  193. return true
  194. }
  195. }
  196. return false
  197. }