mirror of
https://github.com/0rangebananaspy/authelia.git
synced 2024-09-14 22:47:21 +07:00
828f565290
This is going to be the v4. Expected improvements: - More reliable due to static typing. - Bump of performance. - Improvement of logging. - Authelia can be shipped as a single binary. - Will likely work on ARM architecture.
103 lines
4.0 KiB
Go
103 lines
4.0 KiB
Go
package server
|
|
|
|
import (
|
|
"fmt"
|
|
"os"
|
|
|
|
"github.com/clems4ever/authelia/configuration/schema"
|
|
"github.com/clems4ever/authelia/duo"
|
|
"github.com/clems4ever/authelia/handlers"
|
|
"github.com/clems4ever/authelia/logging"
|
|
"github.com/clems4ever/authelia/middlewares"
|
|
duoapi "github.com/duosecurity/duo_api_golang"
|
|
"github.com/fasthttp/router"
|
|
"github.com/valyala/fasthttp"
|
|
)
|
|
|
|
// StartServer start Authelia server with the given configuration and providers.
|
|
func StartServer(configuration schema.Configuration, providers middlewares.Providers) {
|
|
router := router.New()
|
|
|
|
autheliaMiddleware := middlewares.AutheliaMiddleware(configuration, providers)
|
|
|
|
publicDir := os.Getenv("PUBLIC_DIR")
|
|
if publicDir == "" {
|
|
publicDir = "./public_html"
|
|
}
|
|
fmt.Println("Selected public_html directory is ", publicDir)
|
|
|
|
router.GET("/", fasthttp.FSHandler(publicDir, 0))
|
|
router.ServeFiles("/static/*filepath", publicDir+"/static")
|
|
|
|
router.GET("/api/state", autheliaMiddleware(handlers.StateGet))
|
|
|
|
router.GET("/api/verify", autheliaMiddleware(handlers.VerifyGet))
|
|
|
|
router.POST("/api/firstfactor", autheliaMiddleware(handlers.FirstFactorPost))
|
|
router.POST("/api/logout", autheliaMiddleware(handlers.LogoutPost))
|
|
|
|
// Password reset related endpoints.
|
|
router.POST("/api/reset-password/identity/start", autheliaMiddleware(
|
|
handlers.ResetPasswordIdentityStart))
|
|
router.POST("/api/reset-password/identity/finish", autheliaMiddleware(
|
|
handlers.ResetPasswordIdentityFinish))
|
|
router.POST("/api/reset-password", autheliaMiddleware(
|
|
handlers.ResetPasswordPost))
|
|
|
|
// 2FA preferences and settings related endpoints.
|
|
router.GET("/api/secondfactor/available", autheliaMiddleware(
|
|
middlewares.RequireFirstFactor(handlers.SecondFactorAvailableMethodsGet)))
|
|
|
|
router.GET("/api/secondfactor/preferences", autheliaMiddleware(
|
|
middlewares.RequireFirstFactor(handlers.SecondFactorPreferencesGet)))
|
|
router.POST("/api/secondfactor/preferences", autheliaMiddleware(
|
|
middlewares.RequireFirstFactor(handlers.SecondFactorPreferencesPost)))
|
|
|
|
// TOTP related endpoints
|
|
router.POST("/api/secondfactor/totp/identity/start", autheliaMiddleware(
|
|
middlewares.RequireFirstFactor(handlers.SecondFactorTOTPIdentityStart)))
|
|
router.POST("/api/secondfactor/totp/identity/finish", autheliaMiddleware(
|
|
middlewares.RequireFirstFactor(handlers.SecondFactorTOTPIdentityFinish)))
|
|
router.POST("/api/secondfactor/totp", autheliaMiddleware(
|
|
middlewares.RequireFirstFactor(handlers.SecondFactorTOTPPost)))
|
|
|
|
// U2F related endpoints
|
|
router.POST("/api/secondfactor/u2f/identity/start", autheliaMiddleware(
|
|
middlewares.RequireFirstFactor(handlers.SecondFactorU2FIdentityStart)))
|
|
router.POST("/api/secondfactor/u2f/identity/finish", autheliaMiddleware(
|
|
middlewares.RequireFirstFactor(handlers.SecondFactorU2FIdentityFinish)))
|
|
|
|
router.POST("/api/secondfactor/u2f/register", autheliaMiddleware(
|
|
middlewares.RequireFirstFactor(handlers.SecondFactorU2FRegister)))
|
|
|
|
router.POST("/api/secondfactor/u2f/sign_request", autheliaMiddleware(
|
|
middlewares.RequireFirstFactor(handlers.SecondFactorU2FSignGet)))
|
|
router.POST("/api/secondfactor/u2f/sign", autheliaMiddleware(
|
|
middlewares.RequireFirstFactor(handlers.SecondFactorU2FSignPost)))
|
|
|
|
// Configure DUO api endpoint only if configuration exists
|
|
if configuration.DuoAPI != nil {
|
|
var duoAPI duo.API
|
|
if os.Getenv("ENVIRONMENT") == "dev" {
|
|
duoAPI = duo.NewDuoAPI(duoapi.NewDuoApi(
|
|
configuration.DuoAPI.IntegrationKey,
|
|
configuration.DuoAPI.SecretKey,
|
|
configuration.DuoAPI.Hostname, "", duoapi.SetInsecure()))
|
|
} else {
|
|
duoAPI = duo.NewDuoAPI(duoapi.NewDuoApi(
|
|
configuration.DuoAPI.IntegrationKey,
|
|
configuration.DuoAPI.SecretKey,
|
|
configuration.DuoAPI.Hostname, ""))
|
|
}
|
|
|
|
router.POST("/api/secondfactor/duo", autheliaMiddleware(
|
|
middlewares.RequireFirstFactor(handlers.SecondFactorDuoPost(duoAPI))))
|
|
}
|
|
|
|
portPattern := fmt.Sprintf(":%d", configuration.Port)
|
|
logging.Logger().Infof("Authelia is listening on %s", portPattern)
|
|
|
|
logging.Logger().Fatal(fasthttp.ListenAndServe(portPattern,
|
|
middlewares.LogRequestMiddleware(router.Handler)))
|
|
}
|