httpd.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355
  1. // SPDX-FileCopyrightText: Copyright The Miniflux Authors. All rights reserved.
  2. // SPDX-License-Identifier: Apache-2.0
  3. package server // import "miniflux.app/v2/internal/http/server"
  4. import (
  5. "crypto/tls"
  6. "fmt"
  7. "log/slog"
  8. "net"
  9. "net/http"
  10. "os"
  11. "strconv"
  12. "strings"
  13. "miniflux.app/v2/internal/api"
  14. "miniflux.app/v2/internal/botauth"
  15. "miniflux.app/v2/internal/config"
  16. "miniflux.app/v2/internal/fever"
  17. "miniflux.app/v2/internal/googlereader"
  18. "miniflux.app/v2/internal/http/request"
  19. "miniflux.app/v2/internal/storage"
  20. "miniflux.app/v2/internal/ui"
  21. "miniflux.app/v2/internal/version"
  22. "miniflux.app/v2/internal/worker"
  23. "github.com/gorilla/mux"
  24. "github.com/prometheus/client_golang/prometheus/promhttp"
  25. "golang.org/x/crypto/acme"
  26. "golang.org/x/crypto/acme/autocert"
  27. )
  28. func StartWebServer(store *storage.Storage, pool *worker.Pool) []*http.Server {
  29. listenAddresses := config.Opts.ListenAddr()
  30. var httpServers []*http.Server
  31. certFile := config.Opts.CertFile()
  32. keyFile := config.Opts.CertKeyFile()
  33. certDomain := config.Opts.CertDomain()
  34. var sharedAutocertTLSConfig *tls.Config
  35. if certDomain != "" {
  36. slog.Debug("Configuring autocert manager and shared TLS config", slog.String("domain", certDomain))
  37. certManager := autocert.Manager{
  38. Cache: storage.NewCertificateCache(store),
  39. Prompt: autocert.AcceptTOS,
  40. HostPolicy: autocert.HostWhitelist(certDomain),
  41. }
  42. sharedAutocertTLSConfig = &tls.Config{}
  43. sharedAutocertTLSConfig.GetCertificate = certManager.GetCertificate
  44. sharedAutocertTLSConfig.NextProtos = []string{"h2", "http/1.1", acme.ALPNProto}
  45. challengeServer := &http.Server{
  46. Handler: certManager.HTTPHandler(nil),
  47. Addr: ":http",
  48. }
  49. slog.Info("Starting ACME HTTP challenge server for autocert", slog.String("address", challengeServer.Addr))
  50. go func() {
  51. if err := challengeServer.ListenAndServe(); err != http.ErrServerClosed {
  52. slog.Error("ACME HTTP challenge server failed", slog.Any("error", err))
  53. }
  54. }()
  55. config.Opts.SetHTTPSValue(true)
  56. httpServers = append(httpServers, challengeServer)
  57. }
  58. for i, listenAddr := range listenAddresses {
  59. server := &http.Server{
  60. ReadTimeout: config.Opts.HTTPServerTimeout(),
  61. WriteTimeout: config.Opts.HTTPServerTimeout(),
  62. IdleTimeout: config.Opts.HTTPServerTimeout(),
  63. Handler: setupHandler(store, pool),
  64. }
  65. if !strings.HasPrefix(listenAddr, "/") && os.Getenv("LISTEN_PID") != strconv.Itoa(os.Getpid()) {
  66. server.Addr = listenAddr
  67. }
  68. shouldAddServer := true
  69. switch {
  70. case os.Getenv("LISTEN_PID") == strconv.Itoa(os.Getpid()):
  71. if i == 0 {
  72. slog.Info("Starting server using systemd socket for the first listen address", slog.String("address_info", listenAddr))
  73. startSystemdSocketServer(server)
  74. } else {
  75. slog.Warn("Systemd socket activation: Only the first listen address is used by systemd. Other addresses ignored.", slog.String("skipped_address", listenAddr))
  76. shouldAddServer = false
  77. }
  78. case strings.HasPrefix(listenAddr, "/"): // Unix socket
  79. startUnixSocketServer(server, listenAddr)
  80. case certDomain != "" && (listenAddr == ":https" || (i == 0 && strings.Contains(listenAddr, ":"))):
  81. server.Addr = listenAddr
  82. startAutoCertTLSServer(server, sharedAutocertTLSConfig)
  83. case certFile != "" && keyFile != "":
  84. server.Addr = listenAddr
  85. startTLSServer(server, certFile, keyFile)
  86. config.Opts.SetHTTPSValue(true)
  87. default:
  88. server.Addr = listenAddr
  89. startHTTPServer(server)
  90. }
  91. if shouldAddServer {
  92. httpServers = append(httpServers, server)
  93. }
  94. }
  95. return httpServers
  96. }
  97. func startSystemdSocketServer(server *http.Server) {
  98. go func() {
  99. f := os.NewFile(3, "systemd socket")
  100. listener, err := net.FileListener(f)
  101. if err != nil {
  102. printErrorAndExit(`Unable to create listener from systemd socket: %v`, err)
  103. }
  104. slog.Info(`Starting server using systemd socket`)
  105. if err := server.Serve(listener); err != http.ErrServerClosed {
  106. printErrorAndExit(`Systemd socket server failed to start: %v`, err)
  107. }
  108. }()
  109. }
  110. func startUnixSocketServer(server *http.Server, socketFile string) {
  111. if err := os.Remove(socketFile); err != nil && !os.IsNotExist(err) {
  112. printErrorAndExit("Unable to remove existing Unix socket %s: %v", socketFile, err)
  113. }
  114. listener, err := net.Listen("unix", socketFile)
  115. if err != nil {
  116. printErrorAndExit(`Server failed to listen on Unix socket %s: %v`, socketFile, err)
  117. }
  118. if err := os.Chmod(socketFile, 0666); err != nil {
  119. printErrorAndExit(`Unable to change socket permission for %s: %v`, socketFile, err)
  120. }
  121. go func() {
  122. certFile := config.Opts.CertFile()
  123. keyFile := config.Opts.CertKeyFile()
  124. if certFile != "" && keyFile != "" {
  125. slog.Info("Starting TLS server using a Unix socket",
  126. slog.String("socket", socketFile),
  127. slog.String("cert_file", certFile),
  128. slog.String("key_file", keyFile),
  129. )
  130. // Ensure HTTPS is marked as true if any listener uses TLS
  131. config.Opts.SetHTTPSValue(true)
  132. if err := server.ServeTLS(listener, certFile, keyFile); err != http.ErrServerClosed {
  133. printErrorAndExit("TLS Unix socket server failed to start on %s: %v", socketFile, err)
  134. }
  135. } else {
  136. slog.Info("Starting server using a Unix socket", slog.String("socket", socketFile))
  137. if err := server.Serve(listener); err != http.ErrServerClosed {
  138. printErrorAndExit("Unix socket server failed to start on %s: %v", socketFile, err)
  139. }
  140. }
  141. }()
  142. }
  143. func startAutoCertTLSServer(server *http.Server, autoTLSConfig *tls.Config) {
  144. if server.TLSConfig == nil {
  145. server.TLSConfig = &tls.Config{}
  146. }
  147. server.TLSConfig.GetCertificate = autoTLSConfig.GetCertificate
  148. server.TLSConfig.NextProtos = autoTLSConfig.NextProtos
  149. go func() {
  150. slog.Info("Starting TLS server using automatic certificate management",
  151. slog.String("listen_address", server.Addr),
  152. )
  153. if err := server.ListenAndServeTLS("", ""); err != http.ErrServerClosed {
  154. printErrorAndExit("Autocert server failed to start on %s: %v", server.Addr, err)
  155. }
  156. }()
  157. }
  158. func startTLSServer(server *http.Server, certFile, keyFile string) {
  159. go func() {
  160. slog.Info("Starting TLS server using a certificate",
  161. slog.String("listen_address", server.Addr),
  162. slog.String("cert_file", certFile),
  163. slog.String("key_file", keyFile),
  164. )
  165. if err := server.ListenAndServeTLS(certFile, keyFile); err != http.ErrServerClosed {
  166. printErrorAndExit("TLS server failed to start on %s: %v", server.Addr, err)
  167. }
  168. }()
  169. }
  170. func startHTTPServer(server *http.Server) {
  171. go func() {
  172. slog.Info("Starting HTTP server",
  173. slog.String("listen_address", server.Addr),
  174. )
  175. if err := server.ListenAndServe(); err != http.ErrServerClosed {
  176. printErrorAndExit("HTTP server failed to start on %s: %v", server.Addr, err)
  177. }
  178. }()
  179. }
  180. func setupHandler(store *storage.Storage, pool *worker.Pool) *mux.Router {
  181. livenessProbe := func(w http.ResponseWriter, r *http.Request) {
  182. w.WriteHeader(http.StatusOK)
  183. w.Write([]byte("OK"))
  184. }
  185. readinessProbe := func(w http.ResponseWriter, r *http.Request) {
  186. if err := store.Ping(); err != nil {
  187. http.Error(w, fmt.Sprintf("Database Connection Error: %q", err), http.StatusServiceUnavailable)
  188. return
  189. }
  190. w.WriteHeader(http.StatusOK)
  191. w.Write([]byte("OK"))
  192. }
  193. router := mux.NewRouter()
  194. // These routes do not take the base path into consideration and are always available at the root of the server.
  195. router.HandleFunc("/liveness", livenessProbe).Name("liveness")
  196. router.HandleFunc("/healthz", livenessProbe).Name("healthz")
  197. router.HandleFunc("/readiness", readinessProbe).Name("readiness")
  198. router.HandleFunc("/readyz", readinessProbe).Name("readyz")
  199. if botauth.GlobalInstance != nil {
  200. router.HandleFunc("/.well-known/http-message-signatures-directory", botauth.GlobalInstance.ServeKeyDirectory).Name("botauth_key_directory")
  201. }
  202. var subrouter *mux.Router
  203. if config.Opts.BasePath() != "" {
  204. subrouter = router.PathPrefix(config.Opts.BasePath()).Subrouter()
  205. } else {
  206. subrouter = router.NewRoute().Subrouter()
  207. }
  208. if config.Opts.HasMaintenanceMode() {
  209. subrouter.Use(func(next http.Handler) http.Handler {
  210. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  211. w.Write([]byte(config.Opts.MaintenanceMessage()))
  212. })
  213. })
  214. }
  215. subrouter.Use(middleware)
  216. fever.Serve(subrouter, store)
  217. googlereader.Serve(subrouter, store)
  218. api.Serve(subrouter, store, pool)
  219. ui.Serve(subrouter, store, pool)
  220. subrouter.HandleFunc("/healthcheck", readinessProbe).Name("healthcheck")
  221. subrouter.HandleFunc("/version", func(w http.ResponseWriter, r *http.Request) {
  222. w.Write([]byte(version.Version))
  223. }).Name("version")
  224. if config.Opts.HasMetricsCollector() {
  225. subrouter.Handle("/metrics", promhttp.Handler()).Name("metrics")
  226. subrouter.Use(func(next http.Handler) http.Handler {
  227. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  228. route := mux.CurrentRoute(r)
  229. // Returns a 404 if the client is not authorized to access the metrics endpoint.
  230. if route.GetName() == "metrics" && !isAllowedToAccessMetricsEndpoint(r) {
  231. slog.Warn("Authentication failed while accessing the metrics endpoint",
  232. slog.String("client_ip", request.ClientIP(r)),
  233. slog.String("client_user_agent", r.UserAgent()),
  234. slog.String("client_remote_addr", r.RemoteAddr),
  235. )
  236. http.NotFound(w, r)
  237. return
  238. }
  239. next.ServeHTTP(w, r)
  240. })
  241. })
  242. }
  243. return router
  244. }
  245. func isAllowedToAccessMetricsEndpoint(r *http.Request) bool {
  246. clientIP := request.ClientIP(r)
  247. if config.Opts.MetricsUsername() != "" && config.Opts.MetricsPassword() != "" {
  248. username, password, authOK := r.BasicAuth()
  249. if !authOK {
  250. slog.Warn("Metrics endpoint accessed without authentication header",
  251. slog.Bool("authentication_failed", true),
  252. slog.String("client_ip", clientIP),
  253. slog.String("client_user_agent", r.UserAgent()),
  254. slog.String("client_remote_addr", r.RemoteAddr),
  255. )
  256. return false
  257. }
  258. if username == "" || password == "" {
  259. slog.Warn("Metrics endpoint accessed with empty username or password",
  260. slog.Bool("authentication_failed", true),
  261. slog.String("client_ip", clientIP),
  262. slog.String("client_user_agent", r.UserAgent()),
  263. slog.String("client_remote_addr", r.RemoteAddr),
  264. )
  265. return false
  266. }
  267. if username != config.Opts.MetricsUsername() || password != config.Opts.MetricsPassword() {
  268. slog.Warn("Metrics endpoint accessed with invalid username or password",
  269. slog.Bool("authentication_failed", true),
  270. slog.String("client_ip", clientIP),
  271. slog.String("client_user_agent", r.UserAgent()),
  272. slog.String("client_remote_addr", r.RemoteAddr),
  273. )
  274. return false
  275. }
  276. }
  277. remoteIP := request.FindRemoteIP(r)
  278. if remoteIP == "@" {
  279. // This indicates a request sent via a Unix socket, always consider these trusted.
  280. return true
  281. }
  282. for _, cidr := range config.Opts.MetricsAllowedNetworks() {
  283. _, network, err := net.ParseCIDR(cidr)
  284. if err != nil {
  285. slog.Error("Metrics endpoint accessed with invalid CIDR",
  286. slog.Bool("authentication_failed", true),
  287. slog.String("client_ip", clientIP),
  288. slog.String("client_user_agent", r.UserAgent()),
  289. slog.String("client_remote_addr", r.RemoteAddr),
  290. slog.String("cidr", cidr),
  291. )
  292. return false
  293. }
  294. // We use r.RemoteAddr in this case because HTTP headers like X-Forwarded-For can be easily spoofed.
  295. // The recommendation is to use HTTP Basic authentication.
  296. if network.Contains(net.ParseIP(remoteIP)) {
  297. return true
  298. }
  299. }
  300. return false
  301. }
  302. func printErrorAndExit(format string, a ...any) {
  303. message := fmt.Sprintf(format, a...)
  304. slog.Error(message)
  305. fmt.Fprintf(os.Stderr, "%v\n", message)
  306. os.Exit(1)
  307. }