httpd.go 5.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186
  1. // Copyright 2018 Frédéric Guillot. All rights reserved.
  2. // Use of this source code is governed by the Apache 2.0
  3. // license that can be found in the LICENSE file.
  4. package httpd // import "miniflux.app/service/httpd"
  5. import (
  6. "crypto/tls"
  7. "net"
  8. "net/http"
  9. "os"
  10. "strconv"
  11. "strings"
  12. "time"
  13. "miniflux.app/api"
  14. "miniflux.app/config"
  15. "miniflux.app/fever"
  16. "miniflux.app/logger"
  17. "miniflux.app/reader/feed"
  18. "miniflux.app/storage"
  19. "miniflux.app/ui"
  20. "miniflux.app/version"
  21. "miniflux.app/worker"
  22. "github.com/gorilla/mux"
  23. "golang.org/x/crypto/acme/autocert"
  24. )
  25. // Serve starts a new HTTP server.
  26. func Serve(store *storage.Storage, pool *worker.Pool, feedHandler *feed.Handler) *http.Server {
  27. certFile := config.Opts.CertFile()
  28. keyFile := config.Opts.CertKeyFile()
  29. certDomain := config.Opts.CertDomain()
  30. certCache := config.Opts.CertCache()
  31. listenAddr := config.Opts.ListenAddr()
  32. server := &http.Server{
  33. ReadTimeout: 300 * time.Second,
  34. WriteTimeout: 300 * time.Second,
  35. IdleTimeout: 300 * time.Second,
  36. Handler: setupHandler(store, feedHandler, pool),
  37. }
  38. switch {
  39. case os.Getenv("LISTEN_PID") == strconv.Itoa(os.Getpid()):
  40. startSystemdSocketServer(server)
  41. case strings.HasPrefix(listenAddr, "/"):
  42. startUnixSocketServer(server, listenAddr)
  43. case certDomain != "" && certCache != "":
  44. config.Opts.HTTPS = true
  45. startAutoCertTLSServer(server, certDomain, certCache)
  46. case certFile != "" && keyFile != "":
  47. config.Opts.HTTPS = true
  48. server.Addr = listenAddr
  49. startTLSServer(server, certFile, keyFile)
  50. default:
  51. server.Addr = listenAddr
  52. startHTTPServer(server)
  53. }
  54. return server
  55. }
  56. func startSystemdSocketServer(server *http.Server) {
  57. go func() {
  58. f := os.NewFile(3, "systemd socket")
  59. listener, err := net.FileListener(f)
  60. if err != nil {
  61. logger.Fatal(`Unable to create listener from systemd socket: %v`, err)
  62. }
  63. logger.Info(`Listening on systemd socket`)
  64. if err := server.Serve(listener); err != http.ErrServerClosed {
  65. logger.Fatal(`Server failed to start: %v`, err)
  66. }
  67. }()
  68. }
  69. func startUnixSocketServer(server *http.Server, socketFile string) {
  70. os.Remove(socketFile)
  71. go func(sock string) {
  72. listener, err := net.Listen("unix", sock)
  73. if err != nil {
  74. logger.Fatal(`Server failed to start: %v`, err)
  75. }
  76. defer listener.Close()
  77. if err := os.Chmod(sock, 0666); err != nil {
  78. logger.Fatal(`Unable to change socket permission: %v`, err)
  79. }
  80. logger.Info(`Listening on Unix socket %q`, sock)
  81. if err := server.Serve(listener); err != http.ErrServerClosed {
  82. logger.Fatal(`Server failed to start: %v`, err)
  83. }
  84. }(socketFile)
  85. }
  86. func tlsConfig() *tls.Config {
  87. // See https://blog.cloudflare.com/exposing-go-on-the-internet/
  88. // And https://wikia.mozilla.org/Security/Server_Side_TLS
  89. return &tls.Config{
  90. MinVersion: tls.VersionTLS12,
  91. PreferServerCipherSuites: true,
  92. CurvePreferences: []tls.CurveID{
  93. tls.CurveP256,
  94. tls.X25519,
  95. },
  96. CipherSuites: []uint16{
  97. tls.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
  98. tls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
  99. tls.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
  100. tls.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,
  101. tls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
  102. tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
  103. },
  104. }
  105. }
  106. func startAutoCertTLSServer(server *http.Server, certDomain, certCache string) {
  107. server.Addr = ":https"
  108. certManager := autocert.Manager{
  109. Cache: autocert.DirCache(certCache),
  110. Prompt: autocert.AcceptTOS,
  111. HostPolicy: autocert.HostWhitelist(certDomain),
  112. }
  113. server.TLSConfig = tlsConfig()
  114. server.TLSConfig.GetCertificate = certManager.GetCertificate
  115. // Handle http-01 challenge.
  116. s := &http.Server{
  117. Handler: certManager.HTTPHandler(nil),
  118. Addr: ":http",
  119. }
  120. go s.ListenAndServe()
  121. go func() {
  122. logger.Info(`Listening on %q by using auto-configured certificate for %q`, server.Addr, certDomain)
  123. if err := server.ListenAndServeTLS("", ""); err != http.ErrServerClosed {
  124. logger.Fatal(`Server failed to start: %v`, err)
  125. }
  126. }()
  127. }
  128. func startTLSServer(server *http.Server, certFile, keyFile string) {
  129. server.TLSConfig = tlsConfig()
  130. go func() {
  131. logger.Info(`Listening on %q by using certificate %q and key %q`, server.Addr, certFile, keyFile)
  132. if err := server.ListenAndServeTLS(certFile, keyFile); err != http.ErrServerClosed {
  133. logger.Fatal(`Server failed to start: %v`, err)
  134. }
  135. }()
  136. }
  137. func startHTTPServer(server *http.Server) {
  138. go func() {
  139. logger.Info(`Listening on %q without TLS`, server.Addr)
  140. if err := server.ListenAndServe(); err != http.ErrServerClosed {
  141. logger.Fatal(`Server failed to start: %v`, err)
  142. }
  143. }()
  144. }
  145. func setupHandler(store *storage.Storage, feedHandler *feed.Handler, pool *worker.Pool) *mux.Router {
  146. router := mux.NewRouter()
  147. if config.Opts.BasePath() != "" {
  148. router = router.PathPrefix(config.Opts.BasePath()).Subrouter()
  149. }
  150. router.Use(middleware)
  151. fever.Serve(router, store)
  152. api.Serve(router, store, pool, feedHandler)
  153. ui.Serve(router, store, pool, feedHandler)
  154. router.HandleFunc("/healthcheck", func(w http.ResponseWriter, r *http.Request) {
  155. w.Write([]byte("OK"))
  156. }).Name("healthcheck")
  157. router.HandleFunc("/version", func(w http.ResponseWriter, r *http.Request) {
  158. w.Write([]byte(version.Version))
  159. }).Name("version")
  160. return router
  161. }