2019-04-25 04:52:08 +07:00
|
|
|
package server
|
|
|
|
|
|
|
|
import (
|
2022-04-05 06:57:47 +07:00
|
|
|
"crypto/tls"
|
|
|
|
"crypto/x509"
|
2020-07-16 13:36:37 +07:00
|
|
|
"net"
|
2019-04-25 04:52:08 +07:00
|
|
|
"os"
|
2020-06-21 20:40:37 +07:00
|
|
|
"strconv"
|
2019-04-25 04:52:08 +07:00
|
|
|
|
2020-04-05 19:37:21 +07:00
|
|
|
"github.com/valyala/fasthttp"
|
|
|
|
|
2021-08-11 08:04:35 +07:00
|
|
|
"github.com/authelia/authelia/v4/internal/configuration/schema"
|
2022-04-06 04:57:23 +07:00
|
|
|
"github.com/authelia/authelia/v4/internal/logging"
|
2021-08-11 08:04:35 +07:00
|
|
|
"github.com/authelia/authelia/v4/internal/middlewares"
|
2019-04-25 04:52:08 +07:00
|
|
|
)
|
|
|
|
|
2022-04-05 06:57:47 +07:00
|
|
|
// CreateServer Create Authelia's internal webserver with the given configuration and providers.
|
2022-04-08 11:13:47 +07:00
|
|
|
func CreateServer(config schema.Configuration, providers middlewares.Providers) (*fasthttp.Server, net.Listener) {
|
2020-04-11 11:59:58 +07:00
|
|
|
server := &fasthttp.Server{
|
2022-04-08 11:13:47 +07:00
|
|
|
ErrorHandler: handlerError(),
|
|
|
|
Handler: getHandler(config, providers),
|
2020-04-30 10:16:41 +07:00
|
|
|
NoDefaultServerHeader: true,
|
2022-04-08 11:13:47 +07:00
|
|
|
ReadBufferSize: config.Server.ReadBufferSize,
|
|
|
|
WriteBufferSize: config.Server.WriteBufferSize,
|
2020-04-11 11:59:58 +07:00
|
|
|
}
|
2022-04-07 07:58:51 +07:00
|
|
|
|
2022-04-05 06:57:47 +07:00
|
|
|
logger := logging.Logger()
|
2020-04-30 09:03:05 +07:00
|
|
|
|
2022-04-08 11:13:47 +07:00
|
|
|
address := net.JoinHostPort(config.Server.Host, strconv.Itoa(config.Server.Port))
|
2020-07-16 13:36:37 +07:00
|
|
|
|
2022-04-05 06:57:47 +07:00
|
|
|
var (
|
|
|
|
listener net.Listener
|
|
|
|
err error
|
|
|
|
connectionType string
|
|
|
|
connectionScheme string
|
|
|
|
)
|
2019-04-25 04:52:08 +07:00
|
|
|
|
2022-04-08 11:13:47 +07:00
|
|
|
if config.Server.TLS.Certificate != "" && config.Server.TLS.Key != "" {
|
2022-04-05 06:57:47 +07:00
|
|
|
connectionType, connectionScheme = "TLS", schemeHTTPS
|
|
|
|
|
2022-04-08 11:13:47 +07:00
|
|
|
if err = server.AppendCert(config.Server.TLS.Certificate, config.Server.TLS.Key); err != nil {
|
2022-04-05 06:57:47 +07:00
|
|
|
logger.Fatalf("unable to load certificate: %v", err)
|
2021-08-05 11:02:07 +07:00
|
|
|
}
|
|
|
|
|
2022-04-08 11:13:47 +07:00
|
|
|
if len(config.Server.TLS.ClientCertificates) > 0 {
|
2022-04-05 06:57:47 +07:00
|
|
|
caCertPool := x509.NewCertPool()
|
|
|
|
|
2022-04-08 11:13:47 +07:00
|
|
|
for _, path := range config.Server.TLS.ClientCertificates {
|
2022-04-05 06:57:47 +07:00
|
|
|
cert, err := os.ReadFile(path)
|
|
|
|
if err != nil {
|
|
|
|
logger.Fatalf("Cannot read client TLS certificate %s: %s", path, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
caCertPool.AppendCertsFromPEM(cert)
|
|
|
|
}
|
|
|
|
|
|
|
|
// ClientCAs should never be nil, otherwise the system cert pool is used for client authentication
|
|
|
|
// but we don't want everybody on the Internet to be able to authenticate.
|
|
|
|
server.TLSConfig.ClientCAs = caCertPool
|
|
|
|
server.TLSConfig.ClientAuth = tls.RequireAndVerifyClientCert
|
2021-08-10 07:31:08 +07:00
|
|
|
}
|
|
|
|
|
2022-04-07 07:58:51 +07:00
|
|
|
if listener, err = tls.Listen("tcp", address, server.TLSConfig.Clone()); err != nil {
|
2022-04-05 06:57:47 +07:00
|
|
|
logger.Fatalf("Error initializing listener: %s", err)
|
|
|
|
}
|
2020-03-03 14:18:25 +07:00
|
|
|
} else {
|
2022-04-05 06:57:47 +07:00
|
|
|
connectionType, connectionScheme = "non-TLS", schemeHTTP
|
2022-04-07 07:58:51 +07:00
|
|
|
|
|
|
|
if listener, err = net.Listen("tcp", address); err != nil {
|
2022-04-05 06:57:47 +07:00
|
|
|
logger.Fatalf("Error initializing listener: %s", err)
|
2021-08-05 11:02:07 +07:00
|
|
|
}
|
2022-04-05 06:57:47 +07:00
|
|
|
}
|
2021-08-05 11:02:07 +07:00
|
|
|
|
2022-04-08 11:13:47 +07:00
|
|
|
if err = writeHealthCheckEnv(config.Server.DisableHealthcheck, connectionScheme, config.Server.Host,
|
|
|
|
config.Server.Path, config.Server.Port); err != nil {
|
2022-04-05 06:57:47 +07:00
|
|
|
logger.Fatalf("Could not configure healthcheck: %v", err)
|
2020-03-03 14:18:25 +07:00
|
|
|
}
|
2022-04-05 06:57:47 +07:00
|
|
|
|
2022-04-08 11:13:47 +07:00
|
|
|
if config.Server.Path == "" {
|
2022-04-07 07:58:51 +07:00
|
|
|
logger.Infof("Initializing server for %s connections on '%s' path '/'", connectionType, listener.Addr().String())
|
2022-04-05 06:57:47 +07:00
|
|
|
} else {
|
2022-04-08 11:13:47 +07:00
|
|
|
logger.Infof("Initializing server for %s connections on '%s' paths '/' and '%s'", connectionType, listener.Addr().String(), config.Server.Path)
|
2022-04-05 06:57:47 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
return server, listener
|
2019-04-25 04:52:08 +07:00
|
|
|
}
|