httpd.go 4.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173
  1. // Copyright 2018 Frédéric Guillot. All rights reserved.
  2. // Use of this source code is governed by the Apache 2.0
  3. // license that can be found in the LICENSE file.
  4. package httpd // import "miniflux.app/service/httpd"
  5. import (
  6. "crypto/tls"
  7. "net"
  8. "net/http"
  9. "os"
  10. "strconv"
  11. "strings"
  12. "time"
  13. "miniflux.app/api"
  14. "miniflux.app/config"
  15. "miniflux.app/fever"
  16. "miniflux.app/logger"
  17. "miniflux.app/reader/feed"
  18. "miniflux.app/storage"
  19. "miniflux.app/ui"
  20. "miniflux.app/worker"
  21. "github.com/gorilla/mux"
  22. "golang.org/x/crypto/acme/autocert"
  23. )
  24. // Serve starts a new HTTP server.
  25. func Serve(cfg *config.Config, store *storage.Storage, pool *worker.Pool, feedHandler *feed.Handler) *http.Server {
  26. certFile := cfg.CertFile()
  27. keyFile := cfg.KeyFile()
  28. certDomain := cfg.CertDomain()
  29. certCache := cfg.CertCache()
  30. listenAddr := cfg.ListenAddr()
  31. server := &http.Server{
  32. ReadTimeout: 30 * time.Second,
  33. WriteTimeout: 30 * time.Second,
  34. IdleTimeout: 60 * time.Second,
  35. Handler: setupHandler(cfg, store, feedHandler, pool),
  36. }
  37. switch {
  38. case os.Getenv("LISTEN_PID") == strconv.Itoa(os.Getpid()):
  39. startSystemdSocketServer(server)
  40. case strings.HasPrefix(listenAddr, "/"):
  41. startUnixSocketServer(server, listenAddr)
  42. case certDomain != "" && certCache != "":
  43. cfg.IsHTTPS = true
  44. startAutoCertTLSServer(server, certDomain, certCache)
  45. case certFile != "" && keyFile != "":
  46. cfg.IsHTTPS = true
  47. server.Addr = listenAddr
  48. startTLSServer(server, certFile, keyFile)
  49. default:
  50. server.Addr = listenAddr
  51. startHTTPServer(server)
  52. }
  53. return server
  54. }
  55. func startSystemdSocketServer(server *http.Server) {
  56. go func() {
  57. f := os.NewFile(3, "systemd socket")
  58. listener, err := net.FileListener(f)
  59. if err != nil {
  60. logger.Fatal(`Unable to create listener from systemd socket: %v`, err)
  61. }
  62. logger.Info(`Listening on systemd socket`)
  63. if err := server.Serve(listener); err != http.ErrServerClosed {
  64. logger.Fatal(`Server failed to start: %v`, err)
  65. }
  66. }()
  67. }
  68. func startUnixSocketServer(server *http.Server, socketFile string) {
  69. os.Remove(socketFile)
  70. go func(sock string) {
  71. listener, err := net.Listen("unix", sock)
  72. if err != nil {
  73. logger.Fatal(`Server failed to start: %v`, err)
  74. }
  75. defer listener.Close()
  76. if err := os.Chmod(sock, 0666); err != nil {
  77. logger.Fatal(`Unable to change socket permission: %v`, err)
  78. }
  79. logger.Info(`Listening on Unix socket %q`, sock)
  80. if err := server.Serve(listener); err != http.ErrServerClosed {
  81. logger.Fatal(`Server failed to start: %v`, err)
  82. }
  83. }(socketFile)
  84. }
  85. func startAutoCertTLSServer(server *http.Server, certDomain, certCache string) {
  86. server.Addr = ":https"
  87. certManager := autocert.Manager{
  88. Cache: autocert.DirCache(certCache),
  89. Prompt: autocert.AcceptTOS,
  90. HostPolicy: autocert.HostWhitelist(certDomain),
  91. }
  92. // Handle http-01 challenge.
  93. s := &http.Server{
  94. Handler: certManager.HTTPHandler(nil),
  95. Addr: ":http",
  96. }
  97. go s.ListenAndServe()
  98. go func() {
  99. logger.Info(`Listening on %q by using auto-configured certificate for %q`, server.Addr, certDomain)
  100. if err := server.Serve(certManager.Listener()); err != http.ErrServerClosed {
  101. logger.Fatal(`Server failed to start: %v`, err)
  102. }
  103. }()
  104. }
  105. func startTLSServer(server *http.Server, certFile, keyFile string) {
  106. // See https://blog.cloudflare.com/exposing-go-on-the-internet/
  107. // And https://wiki.mozilla.org/Security/Server_Side_TLS
  108. server.TLSConfig = &tls.Config{
  109. MinVersion: tls.VersionTLS12,
  110. PreferServerCipherSuites: true,
  111. CurvePreferences: []tls.CurveID{
  112. tls.CurveP256,
  113. tls.X25519,
  114. },
  115. CipherSuites: []uint16{
  116. tls.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
  117. tls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
  118. tls.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
  119. tls.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,
  120. tls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
  121. tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
  122. },
  123. }
  124. go func() {
  125. logger.Info(`Listening on %q by using certificate %q and key %q`, server.Addr, certFile, keyFile)
  126. if err := server.ListenAndServeTLS(certFile, keyFile); err != http.ErrServerClosed {
  127. logger.Fatal(`Server failed to start: %v`, err)
  128. }
  129. }()
  130. }
  131. func startHTTPServer(server *http.Server) {
  132. go func() {
  133. logger.Info(`Listening on %q without TLS`, server.Addr)
  134. if err := server.ListenAndServe(); err != http.ErrServerClosed {
  135. logger.Fatal(`Server failed to start: %v`, err)
  136. }
  137. }()
  138. }
  139. func setupHandler(cfg *config.Config, store *storage.Storage, feedHandler *feed.Handler, pool *worker.Pool) *mux.Router {
  140. router := mux.NewRouter()
  141. if cfg.BasePath() != "" {
  142. router = router.PathPrefix(cfg.BasePath()).Subrouter()
  143. }
  144. router.Use(newMiddleware(cfg).Serve)
  145. fever.Serve(router, cfg, store)
  146. api.Serve(router, store, feedHandler)
  147. ui.Serve(router, cfg, store, pool, feedHandler)
  148. return router
  149. }