2019-04-25 04:52:08 +07:00
package server
import (
2021-02-22 06:07:06 +07:00
"embed"
"io/fs"
2020-11-06 04:57:03 +07:00
"io/ioutil"
2020-07-16 13:36:37 +07:00
"net"
2021-02-22 06:07:06 +07:00
"net/http"
2019-04-25 04:52:08 +07:00
"os"
2020-11-06 04:57:03 +07:00
"runtime"
2020-06-21 20:40:37 +07:00
"strconv"
2020-11-06 04:57:03 +07:00
"strings"
2019-04-25 04:52:08 +07:00
2020-04-05 19:37:21 +07:00
duoapi "github.com/duosecurity/duo_api_golang"
"github.com/fasthttp/router"
"github.com/valyala/fasthttp"
2020-04-11 11:59:58 +07:00
"github.com/valyala/fasthttp/expvarhandler"
2020-04-28 21:07:20 +07:00
"github.com/valyala/fasthttp/fasthttpadaptor"
2020-04-11 11:59:58 +07:00
"github.com/valyala/fasthttp/pprofhandler"
2020-04-05 19:37:21 +07:00
2019-12-24 09:14:52 +07:00
"github.com/authelia/authelia/internal/configuration/schema"
"github.com/authelia/authelia/internal/duo"
"github.com/authelia/authelia/internal/handlers"
"github.com/authelia/authelia/internal/logging"
"github.com/authelia/authelia/internal/middlewares"
2019-04-25 04:52:08 +07:00
)
2021-02-22 06:07:06 +07:00
//go:embed public_html
var assets embed . FS
2021-05-05 05:06:05 +07:00
func registerRoutes ( configuration schema . Configuration , providers middlewares . Providers ) fasthttp . RequestHandler {
2019-04-25 04:52:08 +07:00
autheliaMiddleware := middlewares . AutheliaMiddleware ( configuration , providers )
2020-06-21 20:40:37 +07:00
rememberMe := strconv . FormatBool ( configuration . Session . RememberMeDuration != "0" )
resetPassword := strconv . FormatBool ( ! configuration . AuthenticationBackend . DisableResetPassword )
2021-02-22 06:07:06 +07:00
embeddedPath , _ := fs . Sub ( assets , "public_html" )
embeddedFS := fasthttpadaptor . NewFastHTTPHandler ( http . FileServer ( http . FS ( embeddedPath ) ) )
2020-05-07 18:29:12 +07:00
rootFiles := [ ] string { "favicon.ico" , "manifest.json" , "robots.txt" }
2020-05-21 09:20:55 +07:00
2021-01-20 19:07:40 +07:00
serveIndexHandler := ServeTemplatedFile ( embeddedAssets , indexFile , configuration . Server . Path , rememberMe , resetPassword , configuration . Session . Name , configuration . Theme )
serveSwaggerHandler := ServeTemplatedFile ( swaggerAssets , indexFile , configuration . Server . Path , rememberMe , resetPassword , configuration . Session . Name , configuration . Theme )
serveSwaggerAPIHandler := ServeTemplatedFile ( swaggerAssets , apiFile , configuration . Server . Path , rememberMe , resetPassword , configuration . Session . Name , configuration . Theme )
2020-06-21 20:40:37 +07:00
2020-05-21 09:20:55 +07:00
r := router . New ( )
2020-06-21 20:40:37 +07:00
r . GET ( "/" , serveIndexHandler )
2021-07-22 10:52:37 +07:00
r . OPTIONS ( "/" , autheliaMiddleware ( handleOPTIONS ) )
2021-01-03 11:28:46 +07:00
r . GET ( "/api/" , serveSwaggerHandler )
r . GET ( "/api/" + apiFile , serveSwaggerAPIHandler )
2020-05-07 18:29:12 +07:00
for _ , f := range rootFiles {
2021-02-22 06:07:06 +07:00
r . GET ( "/" + f , embeddedFS )
2020-05-07 18:29:12 +07:00
}
2021-02-22 06:07:06 +07:00
r . GET ( "/static/{filepath:*}" , embeddedFS )
2021-03-11 14:36:58 +07:00
r . ANY ( "/api/{filepath:*}" , embeddedFS )
2019-04-25 04:52:08 +07:00
2020-11-25 06:20:52 +07:00
r . GET ( "/api/health" , autheliaMiddleware ( handlers . HealthGet ) )
2020-05-21 09:20:55 +07:00
r . GET ( "/api/state" , autheliaMiddleware ( handlers . StateGet ) )
2019-04-25 04:52:08 +07:00
2020-06-21 20:40:37 +07:00
r . GET ( "/api/configuration" , autheliaMiddleware (
middlewares . RequireFirstFactor ( handlers . ConfigurationGet ) ) )
2019-12-07 23:40:42 +07:00
2020-05-21 09:20:55 +07:00
r . GET ( "/api/verify" , autheliaMiddleware ( handlers . VerifyGet ( configuration . AuthenticationBackend ) ) )
r . HEAD ( "/api/verify" , autheliaMiddleware ( handlers . VerifyGet ( configuration . AuthenticationBackend ) ) )
2019-04-25 04:52:08 +07:00
2021-08-02 13:15:38 +07:00
r . POST ( "/api/checks/safe-redirection" , autheliaMiddleware ( handlers . CheckSafeRedirection ) )
2020-05-21 09:20:55 +07:00
r . POST ( "/api/firstfactor" , autheliaMiddleware ( handlers . FirstFactorPost ( 1000 , true ) ) )
r . POST ( "/api/logout" , autheliaMiddleware ( handlers . LogoutPost ) )
2019-04-25 04:52:08 +07:00
2020-04-28 21:07:20 +07:00
// Only register endpoints if forgot password is not disabled.
2020-04-05 06:28:09 +07:00
if ! configuration . AuthenticationBackend . DisableResetPassword {
// Password reset related endpoints.
2020-05-21 09:20:55 +07:00
r . POST ( "/api/reset-password/identity/start" , autheliaMiddleware (
2020-04-05 06:28:09 +07:00
handlers . ResetPasswordIdentityStart ) )
2020-05-21 09:20:55 +07:00
r . POST ( "/api/reset-password/identity/finish" , autheliaMiddleware (
2020-04-05 06:28:09 +07:00
handlers . ResetPasswordIdentityFinish ) )
2020-05-21 09:20:55 +07:00
r . POST ( "/api/reset-password" , autheliaMiddleware (
2020-04-05 06:28:09 +07:00
handlers . ResetPasswordPost ) )
}
2019-04-25 04:52:08 +07:00
2020-04-28 21:07:20 +07:00
// Information about the user.
2020-05-21 09:20:55 +07:00
r . GET ( "/api/user/info" , autheliaMiddleware (
2019-12-07 18:18:22 +07:00
middlewares . RequireFirstFactor ( handlers . UserInfoGet ) ) )
2020-05-21 09:20:55 +07:00
r . POST ( "/api/user/info/2fa_method" , autheliaMiddleware (
2019-12-07 18:18:22 +07:00
middlewares . RequireFirstFactor ( handlers . MethodPreferencePost ) ) )
2019-04-25 04:52:08 +07:00
2020-04-28 21:07:20 +07:00
// TOTP related endpoints.
2020-05-21 09:20:55 +07:00
r . POST ( "/api/secondfactor/totp/identity/start" , autheliaMiddleware (
2019-04-25 04:52:08 +07:00
middlewares . RequireFirstFactor ( handlers . SecondFactorTOTPIdentityStart ) ) )
2020-05-21 09:20:55 +07:00
r . POST ( "/api/secondfactor/totp/identity/finish" , autheliaMiddleware (
2019-04-25 04:52:08 +07:00
middlewares . RequireFirstFactor ( handlers . SecondFactorTOTPIdentityFinish ) ) )
2020-05-21 09:20:55 +07:00
r . POST ( "/api/secondfactor/totp" , autheliaMiddleware (
2020-03-25 08:48:20 +07:00
middlewares . RequireFirstFactor ( handlers . SecondFactorTOTPPost ( & handlers . TOTPVerifierImpl {
Period : uint ( configuration . TOTP . Period ) ,
Skew : uint ( * configuration . TOTP . Skew ) ,
} ) ) ) )
2019-04-25 04:52:08 +07:00
2020-04-28 21:07:20 +07:00
// U2F related endpoints.
2020-05-21 09:20:55 +07:00
r . POST ( "/api/secondfactor/u2f/identity/start" , autheliaMiddleware (
2019-04-25 04:52:08 +07:00
middlewares . RequireFirstFactor ( handlers . SecondFactorU2FIdentityStart ) ) )
2020-05-21 09:20:55 +07:00
r . POST ( "/api/secondfactor/u2f/identity/finish" , autheliaMiddleware (
2019-04-25 04:52:08 +07:00
middlewares . RequireFirstFactor ( handlers . SecondFactorU2FIdentityFinish ) ) )
2020-05-21 09:20:55 +07:00
r . POST ( "/api/secondfactor/u2f/register" , autheliaMiddleware (
2019-04-25 04:52:08 +07:00
middlewares . RequireFirstFactor ( handlers . SecondFactorU2FRegister ) ) )
2020-05-21 09:20:55 +07:00
r . POST ( "/api/secondfactor/u2f/sign_request" , autheliaMiddleware (
2019-04-25 04:52:08 +07:00
middlewares . RequireFirstFactor ( handlers . SecondFactorU2FSignGet ) ) )
2020-02-01 19:54:50 +07:00
2020-05-21 09:20:55 +07:00
r . POST ( "/api/secondfactor/u2f/sign" , autheliaMiddleware (
2020-02-01 19:54:50 +07:00
middlewares . RequireFirstFactor ( handlers . SecondFactorU2FSignPost ( & handlers . U2FVerifierImpl { } ) ) ) )
2019-04-25 04:52:08 +07:00
2020-04-28 21:07:20 +07:00
// Configure DUO api endpoint only if configuration exists.
2019-04-25 04:52:08 +07:00
if configuration . DuoAPI != nil {
var duoAPI duo . API
2020-11-19 08:50:34 +07:00
if os . Getenv ( "ENVIRONMENT" ) == dev {
2019-04-25 04:52:08 +07:00
duoAPI = duo . NewDuoAPI ( duoapi . NewDuoApi (
configuration . DuoAPI . IntegrationKey ,
configuration . DuoAPI . SecretKey ,
configuration . DuoAPI . Hostname , "" , duoapi . SetInsecure ( ) ) )
} else {
duoAPI = duo . NewDuoAPI ( duoapi . NewDuoApi (
configuration . DuoAPI . IntegrationKey ,
configuration . DuoAPI . SecretKey ,
configuration . DuoAPI . Hostname , "" ) )
}
2020-05-21 09:20:55 +07:00
r . POST ( "/api/secondfactor/duo" , autheliaMiddleware (
2019-04-25 04:52:08 +07:00
middlewares . RequireFirstFactor ( handlers . SecondFactorDuoPost ( duoAPI ) ) ) )
}
2021-06-01 11:09:50 +07:00
if configuration . Server . EnablePprof {
2020-05-21 09:20:55 +07:00
r . GET ( "/debug/pprof/{name?}" , pprofhandler . PprofHandler )
2021-06-01 11:09:50 +07:00
}
if configuration . Server . EnableExpvars {
2020-05-21 09:20:55 +07:00
r . GET ( "/debug/vars" , expvarhandler . ExpvarHandler )
2020-04-11 11:59:58 +07:00
}
2020-06-21 20:40:37 +07:00
r . NotFound = serveIndexHandler
2020-05-21 09:20:55 +07:00
handler := middlewares . LogRequestMiddleware ( r . Handler )
if configuration . Server . Path != "" {
handler = middlewares . StripPathMiddleware ( handler )
}
2019-11-30 23:49:52 +07:00
2021-05-05 05:06:05 +07:00
if providers . OpenIDConnect . Fosite != nil {
handlers . RegisterOIDC ( r , autheliaMiddleware )
}
return handler
}
2021-08-03 16:55:21 +07:00
// Start Authelia's internal webserver with the given configuration and providers.
func Start ( configuration schema . Configuration , providers middlewares . Providers ) {
2021-05-05 05:06:05 +07:00
logger := logging . Logger ( )
handler := registerRoutes ( configuration , providers )
2020-04-11 11:59:58 +07:00
server := & fasthttp . Server {
2020-04-30 10:16:41 +07:00
ErrorHandler : autheliaErrorHandler ,
2020-05-21 09:20:55 +07:00
Handler : handler ,
2020-04-30 10:16:41 +07:00
NoDefaultServerHeader : true ,
ReadBufferSize : configuration . Server . ReadBufferSize ,
WriteBufferSize : configuration . Server . WriteBufferSize ,
2020-04-11 11:59:58 +07:00
}
2020-04-30 09:03:05 +07:00
2021-08-02 18:55:30 +07:00
addrPattern := net . JoinHostPort ( configuration . Server . Host , strconv . Itoa ( configuration . Server . Port ) )
2020-07-16 13:36:37 +07:00
listener , err := net . Listen ( "tcp" , addrPattern )
if err != nil {
2021-01-17 06:23:35 +07:00
logger . Fatalf ( "Error initializing listener: %s" , err )
2020-07-16 13:36:37 +07:00
}
2019-04-25 04:52:08 +07:00
2021-05-05 05:06:05 +07:00
// TODO(clems4ever): move that piece to a more related location, probably in the configuration package.
2020-11-06 04:57:03 +07:00
if configuration . AuthenticationBackend . File != nil && configuration . AuthenticationBackend . File . Password . Algorithm == "argon2id" && runtime . GOOS == "linux" {
f , err := ioutil . ReadFile ( "/sys/fs/cgroup/memory/memory.limit_in_bytes" )
if err != nil {
2021-01-17 06:23:35 +07:00
logger . Warnf ( "Error reading hosts memory limit: %s" , err )
2020-11-06 04:57:03 +07:00
} else {
m , _ := strconv . Atoi ( strings . TrimSuffix ( string ( f ) , "\n" ) )
hostMem := float64 ( m ) / 1024 / 1024 / 1024
argonMem := float64 ( configuration . AuthenticationBackend . File . Password . Memory ) / 1024
if hostMem / argonMem <= 2 {
2021-01-17 06:23:35 +07:00
logger . Warnf ( "Authelia's password hashing memory parameter is set to: %gGB this is %g%% of the available memory: %gGB" , argonMem , argonMem / hostMem * 100 , hostMem )
logger . Warn ( "Please read https://www.authelia.com/docs/configuration/authentication/file.html#memory and tune your deployment" )
2020-11-06 04:57:03 +07:00
}
}
}
2021-08-02 18:55:30 +07:00
if configuration . Server . TLS . Certificate != "" && configuration . Server . TLS . Key != "" {
2021-08-03 16:55:21 +07:00
logger . Infof ( "Listening for TLS connections on %s%s" , addrPattern , configuration . Server . Path )
2021-08-02 18:55:30 +07:00
logger . Fatal ( server . ServeTLS ( listener , configuration . Server . TLS . Certificate , configuration . Server . TLS . Key ) )
2020-03-03 14:18:25 +07:00
} else {
2021-08-03 16:55:21 +07:00
logger . Infof ( "Listening for non-TLS connections on %s%s" , addrPattern , configuration . Server . Path )
2021-01-17 06:23:35 +07:00
logger . Fatal ( server . Serve ( listener ) )
2020-03-03 14:18:25 +07:00
}
2019-04-25 04:52:08 +07:00
}