server.go 2.8 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495
  1. // Copyright 2018 Frédéric Guillot. All rights reserved.
  2. // Use of this source code is governed by the Apache 2.0
  3. // license that can be found in the LICENSE file.
  4. package daemon // import "miniflux.app/daemon"
  5. import (
  6. "crypto/tls"
  7. "net/http"
  8. "time"
  9. "miniflux.app/config"
  10. "miniflux.app/locale"
  11. "miniflux.app/logger"
  12. "miniflux.app/reader/feed"
  13. "miniflux.app/scheduler"
  14. "miniflux.app/storage"
  15. "golang.org/x/crypto/acme/autocert"
  16. )
  17. func newServer(cfg *config.Config, store *storage.Storage, pool *scheduler.WorkerPool, feedHandler *feed.Handler, translator *locale.Translator) *http.Server {
  18. certFile := cfg.CertFile()
  19. keyFile := cfg.KeyFile()
  20. certDomain := cfg.CertDomain()
  21. certCache := cfg.CertCache()
  22. server := &http.Server{
  23. ReadTimeout: 30 * time.Second,
  24. WriteTimeout: 30 * time.Second,
  25. IdleTimeout: 60 * time.Second,
  26. Addr: cfg.ListenAddr(),
  27. Handler: routes(cfg, store, feedHandler, pool, translator),
  28. }
  29. if certDomain != "" && certCache != "" {
  30. cfg.IsHTTPS = true
  31. server.Addr = ":https"
  32. certManager := autocert.Manager{
  33. Cache: autocert.DirCache(certCache),
  34. Prompt: autocert.AcceptTOS,
  35. HostPolicy: autocert.HostWhitelist(certDomain),
  36. }
  37. // Handle http-01 challenge.
  38. s := &http.Server{
  39. Handler: certManager.HTTPHandler(nil),
  40. Addr: ":http",
  41. }
  42. go s.ListenAndServe()
  43. go func() {
  44. logger.Info(`Listening on "%s" by using auto-configured certificate for "%s"`, server.Addr, certDomain)
  45. if err := server.Serve(certManager.Listener()); err != http.ErrServerClosed {
  46. logger.Fatal(`Server failed to start: %v`, err)
  47. }
  48. }()
  49. } else if certFile != "" && keyFile != "" {
  50. cfg.IsHTTPS = true
  51. // See https://blog.cloudflare.com/exposing-go-on-the-internet/
  52. // And https://wiki.mozilla.org/Security/Server_Side_TLS
  53. server.TLSConfig = &tls.Config{
  54. MinVersion: tls.VersionTLS12,
  55. PreferServerCipherSuites: true,
  56. CurvePreferences: []tls.CurveID{
  57. tls.CurveP256,
  58. tls.X25519,
  59. },
  60. CipherSuites: []uint16{
  61. tls.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
  62. tls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
  63. tls.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
  64. tls.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,
  65. tls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
  66. tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
  67. },
  68. }
  69. go func() {
  70. logger.Info(`Listening on "%s" by using certificate "%s" and key "%s"`, server.Addr, certFile, keyFile)
  71. if err := server.ListenAndServeTLS(certFile, keyFile); err != http.ErrServerClosed {
  72. logger.Fatal(`Server failed to start: %v`, err)
  73. }
  74. }()
  75. } else {
  76. go func() {
  77. logger.Info(`Listening on "%s" without TLS`, server.Addr)
  78. if err := server.ListenAndServe(); err != http.ErrServerClosed {
  79. logger.Fatal(`Server failed to start: %v`, err)
  80. }
  81. }()
  82. }
  83. return server
  84. }