server.go 7.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274
  1. // SPDX-FileCopyrightText: Copyright The Miniflux Authors. All rights reserved.
  2. // SPDX-License-Identifier: Apache-2.0
  3. package server // import "miniflux.app/v2/internal/http/server"
  4. import (
  5. "crypto/tls"
  6. "fmt"
  7. "log/slog"
  8. "net"
  9. "net/http"
  10. "os"
  11. "strconv"
  12. "strings"
  13. "miniflux.app/v2/internal/config"
  14. "miniflux.app/v2/internal/storage"
  15. "miniflux.app/v2/internal/worker"
  16. "golang.org/x/crypto/acme"
  17. "golang.org/x/crypto/acme/autocert"
  18. )
  19. func StartWebServer(store *storage.Storage, pool *worker.Pool) []*http.Server {
  20. var servers []*http.Server
  21. autocertTLSConfig, challengeServer := setupAutocert(store)
  22. if challengeServer != nil {
  23. servers = append(servers, challengeServer)
  24. }
  25. certFile := config.Opts.CertFile()
  26. keyFile := config.Opts.CertKeyFile()
  27. certDomain := config.Opts.CertDomain()
  28. targets := determineListenTargets(config.Opts.ListenAddr(), certDomain, certFile, keyFile)
  29. if autocertTLSConfig != nil || anyTLS(targets) {
  30. config.Opts.SetHTTPSValue(true)
  31. }
  32. for _, t := range targets {
  33. srv := &http.Server{
  34. Addr: t.address,
  35. ReadTimeout: config.Opts.HTTPServerTimeout(),
  36. WriteTimeout: config.Opts.HTTPServerTimeout(),
  37. IdleTimeout: config.Opts.HTTPServerTimeout(),
  38. Handler: newRouter(store, pool),
  39. }
  40. switch t.mode {
  41. case modeSystemd:
  42. startSystemdSocketServer(srv)
  43. case modeUnixSocket:
  44. startUnixSocketServer(srv, t.address)
  45. case modeUnixSocketTLS:
  46. startUnixSocketTLSServer(srv, t.address, t.certFile, t.keyFile)
  47. case modeAutocertTLS:
  48. startAutoCertTLSServer(srv, autocertTLSConfig)
  49. case modeTLS:
  50. startTLSServer(srv, t.certFile, t.keyFile)
  51. default:
  52. startHTTPServer(srv)
  53. }
  54. servers = append(servers, srv)
  55. }
  56. return servers
  57. }
  58. type listenerMode int
  59. const (
  60. modeHTTP listenerMode = iota
  61. modeTLS
  62. modeAutocertTLS
  63. modeUnixSocket
  64. modeUnixSocketTLS
  65. modeSystemd
  66. )
  67. type listenTarget struct {
  68. address string
  69. mode listenerMode
  70. certFile string
  71. keyFile string
  72. }
  73. func determineListenTargets(addresses []string, certDomain, certFile, keyFile string) []listenTarget {
  74. isSystemd := os.Getenv("LISTEN_PID") == strconv.Itoa(os.Getpid())
  75. hasCertFiles := certFile != "" && keyFile != ""
  76. hasAutocert := certDomain != ""
  77. var targets []listenTarget
  78. for i, addr := range addresses {
  79. if isSystemd {
  80. if i == 0 {
  81. targets = append(targets, listenTarget{address: addr, mode: modeSystemd})
  82. } else {
  83. slog.Warn("Systemd socket activation: only the first listen address is used, others are ignored",
  84. slog.String("skipped_address", addr),
  85. )
  86. }
  87. continue
  88. }
  89. isUnix := strings.HasPrefix(addr, "/")
  90. switch {
  91. case isUnix && hasCertFiles:
  92. targets = append(targets, listenTarget{address: addr, mode: modeUnixSocketTLS, certFile: certFile, keyFile: keyFile})
  93. case isUnix:
  94. targets = append(targets, listenTarget{address: addr, mode: modeUnixSocket})
  95. case hasAutocert && (addr == ":https" || (i == 0 && strings.Contains(addr, ":"))):
  96. targets = append(targets, listenTarget{address: addr, mode: modeAutocertTLS})
  97. case hasCertFiles:
  98. targets = append(targets, listenTarget{address: addr, mode: modeTLS, certFile: certFile, keyFile: keyFile})
  99. default:
  100. targets = append(targets, listenTarget{address: addr, mode: modeHTTP})
  101. }
  102. }
  103. return targets
  104. }
  105. func anyTLS(targets []listenTarget) bool {
  106. for _, t := range targets {
  107. switch t.mode {
  108. case modeTLS, modeAutocertTLS, modeUnixSocketTLS:
  109. return true
  110. }
  111. }
  112. return false
  113. }
  114. func setupAutocert(store *storage.Storage) (*tls.Config, *http.Server) {
  115. certDomain := config.Opts.CertDomain()
  116. if certDomain == "" {
  117. return nil, nil
  118. }
  119. slog.Debug("Configuring autocert manager", slog.String("domain", certDomain))
  120. certManager := autocert.Manager{
  121. Cache: storage.NewCertificateCache(store),
  122. Prompt: autocert.AcceptTOS,
  123. HostPolicy: autocert.HostWhitelist(certDomain),
  124. }
  125. tlsConfig := &tls.Config{
  126. NextProtos: []string{"h2", "http/1.1", acme.ALPNProto},
  127. }
  128. tlsConfig.GetCertificate = certManager.GetCertificate
  129. challengeServer := &http.Server{
  130. Handler: certManager.HTTPHandler(nil),
  131. Addr: ":http",
  132. }
  133. slog.Info("Starting ACME HTTP challenge server", slog.String("address", challengeServer.Addr))
  134. go func() {
  135. if err := challengeServer.ListenAndServe(); err != http.ErrServerClosed {
  136. slog.Error("ACME HTTP challenge server failed", slog.Any("error", err))
  137. }
  138. }()
  139. return tlsConfig, challengeServer
  140. }
  141. func startSystemdSocketServer(server *http.Server) {
  142. go func() {
  143. f := os.NewFile(3, "systemd socket")
  144. listener, err := net.FileListener(f)
  145. if err != nil {
  146. printErrorAndExit(`Unable to create listener from systemd socket: %v`, err)
  147. }
  148. slog.Info(`Starting server using systemd socket`)
  149. if err := server.Serve(listener); err != http.ErrServerClosed {
  150. printErrorAndExit(`Systemd socket server failed to start: %v`, err)
  151. }
  152. }()
  153. }
  154. func startUnixSocketServer(server *http.Server, socketFile string) {
  155. listener := createUnixSocketListener(socketFile)
  156. go func() {
  157. slog.Info("Starting server using a Unix socket", slog.String("socket", socketFile))
  158. if err := server.Serve(listener); err != http.ErrServerClosed {
  159. printErrorAndExit("Unix socket server failed to start on %s: %v", socketFile, err)
  160. }
  161. }()
  162. }
  163. func startUnixSocketTLSServer(server *http.Server, socketFile, certFile, keyFile string) {
  164. listener := createUnixSocketListener(socketFile)
  165. go func() {
  166. slog.Info("Starting TLS server using a Unix socket",
  167. slog.String("socket", socketFile),
  168. slog.String("cert_file", certFile),
  169. slog.String("key_file", keyFile),
  170. )
  171. if err := server.ServeTLS(listener, certFile, keyFile); err != http.ErrServerClosed {
  172. printErrorAndExit("TLS Unix socket server failed to start on %s: %v", socketFile, err)
  173. }
  174. }()
  175. }
  176. func createUnixSocketListener(socketFile string) net.Listener {
  177. if err := os.Remove(socketFile); err != nil && !os.IsNotExist(err) {
  178. printErrorAndExit("Unable to remove existing Unix socket %s: %v", socketFile, err)
  179. }
  180. listener, err := net.Listen("unix", socketFile)
  181. if err != nil {
  182. printErrorAndExit(`Server failed to listen on Unix socket %s: %v`, socketFile, err)
  183. }
  184. if err := os.Chmod(socketFile, 0666); err != nil {
  185. printErrorAndExit(`Unable to change socket permission for %s: %v`, socketFile, err)
  186. }
  187. return listener
  188. }
  189. func startAutoCertTLSServer(server *http.Server, autoTLSConfig *tls.Config) {
  190. if server.TLSConfig == nil {
  191. server.TLSConfig = &tls.Config{}
  192. }
  193. server.TLSConfig.GetCertificate = autoTLSConfig.GetCertificate
  194. server.TLSConfig.NextProtos = autoTLSConfig.NextProtos
  195. go func() {
  196. slog.Info("Starting TLS server using automatic certificate management",
  197. slog.String("listen_address", server.Addr),
  198. )
  199. if err := server.ListenAndServeTLS("", ""); err != http.ErrServerClosed {
  200. printErrorAndExit("Autocert server failed to start on %s: %v", server.Addr, err)
  201. }
  202. }()
  203. }
  204. func startTLSServer(server *http.Server, certFile, keyFile string) {
  205. go func() {
  206. slog.Info("Starting TLS server using a certificate",
  207. slog.String("listen_address", server.Addr),
  208. slog.String("cert_file", certFile),
  209. slog.String("key_file", keyFile),
  210. )
  211. if err := server.ListenAndServeTLS(certFile, keyFile); err != http.ErrServerClosed {
  212. printErrorAndExit("TLS server failed to start on %s: %v", server.Addr, err)
  213. }
  214. }()
  215. }
  216. func startHTTPServer(server *http.Server) {
  217. go func() {
  218. slog.Info("Starting HTTP server",
  219. slog.String("listen_address", server.Addr),
  220. )
  221. if err := server.ListenAndServe(); err != http.ErrServerClosed {
  222. printErrorAndExit("HTTP server failed to start on %s: %v", server.Addr, err)
  223. }
  224. }()
  225. }
  226. func printErrorAndExit(format string, a ...any) {
  227. message := fmt.Sprintf(format, a...)
  228. slog.Error(message)
  229. fmt.Fprintf(os.Stderr, "%v\n", message)
  230. os.Exit(1)
  231. }