2019-04-24 21:52:08 +00:00
|
|
|
package server
|
|
|
|
|
|
|
|
import (
|
2022-04-04 23:57:47 +00:00
|
|
|
"crypto/tls"
|
|
|
|
"crypto/x509"
|
2020-07-16 06:36:37 +00:00
|
|
|
"net"
|
2019-04-24 21:52:08 +00:00
|
|
|
"os"
|
2020-06-21 13:40:37 +00:00
|
|
|
"strconv"
|
2022-01-20 23:46:13 +00:00
|
|
|
"time"
|
2019-04-24 21:52:08 +00:00
|
|
|
|
2020-04-05 12:37:21 +00:00
|
|
|
duoapi "github.com/duosecurity/duo_api_golang"
|
|
|
|
"github.com/fasthttp/router"
|
|
|
|
"github.com/valyala/fasthttp"
|
2020-04-11 04:59:58 +00:00
|
|
|
"github.com/valyala/fasthttp/expvarhandler"
|
|
|
|
"github.com/valyala/fasthttp/pprofhandler"
|
2020-04-05 12:37:21 +00:00
|
|
|
|
2021-08-11 01:04:35 +00:00
|
|
|
"github.com/authelia/authelia/v4/internal/configuration/schema"
|
|
|
|
"github.com/authelia/authelia/v4/internal/duo"
|
|
|
|
"github.com/authelia/authelia/v4/internal/handlers"
|
2022-04-05 21:57:23 +00:00
|
|
|
"github.com/authelia/authelia/v4/internal/logging"
|
2021-08-11 01:04:35 +00:00
|
|
|
"github.com/authelia/authelia/v4/internal/middlewares"
|
2022-04-07 00:58:51 +00:00
|
|
|
"github.com/authelia/authelia/v4/internal/oidc"
|
|
|
|
"github.com/authelia/authelia/v4/internal/utils"
|
2019-04-24 21:52:08 +00:00
|
|
|
)
|
|
|
|
|
2022-04-07 00:58:51 +00:00
|
|
|
// TODO: move to its own file and rename configuration -> config.
|
2021-05-04 22:06:05 +00:00
|
|
|
func registerRoutes(configuration schema.Configuration, providers middlewares.Providers) fasthttp.RequestHandler {
|
2022-03-13 02:51:23 +00:00
|
|
|
rememberMe := strconv.FormatBool(configuration.Session.RememberMeDuration != schema.RememberMeDisabled)
|
2020-06-21 13:40:37 +00:00
|
|
|
resetPassword := strconv.FormatBool(!configuration.AuthenticationBackend.DisableResetPassword)
|
|
|
|
|
2022-04-04 07:46:55 +00:00
|
|
|
resetPasswordCustomURL := configuration.AuthenticationBackend.PasswordReset.CustomURL.String()
|
|
|
|
|
2021-12-01 03:32:58 +00:00
|
|
|
duoSelfEnrollment := f
|
|
|
|
if configuration.DuoAPI != nil {
|
|
|
|
duoSelfEnrollment = strconv.FormatBool(configuration.DuoAPI.EnableSelfEnrollment)
|
|
|
|
}
|
|
|
|
|
2021-10-10 10:19:47 +00:00
|
|
|
https := configuration.Server.TLS.Key != "" && configuration.Server.TLS.Certificate != ""
|
|
|
|
|
2022-04-04 07:46:55 +00:00
|
|
|
serveIndexHandler := ServeTemplatedFile(embeddedAssets, indexFile, configuration.Server.AssetPath, duoSelfEnrollment, rememberMe, resetPassword, resetPasswordCustomURL, configuration.Session.Name, configuration.Theme, https)
|
|
|
|
serveSwaggerHandler := ServeTemplatedFile(swaggerAssets, indexFile, configuration.Server.AssetPath, duoSelfEnrollment, rememberMe, resetPassword, resetPasswordCustomURL, configuration.Session.Name, configuration.Theme, https)
|
|
|
|
serveSwaggerAPIHandler := ServeTemplatedFile(swaggerAssets, apiFile, configuration.Server.AssetPath, duoSelfEnrollment, rememberMe, resetPassword, resetPasswordCustomURL, configuration.Session.Name, configuration.Theme, https)
|
2020-06-21 13:40:37 +00:00
|
|
|
|
2022-04-07 00:58:51 +00:00
|
|
|
handlerPublicHTML := newPublicHTMLEmbeddedHandler()
|
|
|
|
handlerLocales := newLocalesEmbeddedHandler()
|
|
|
|
|
|
|
|
autheliaMiddleware := middlewares.AutheliaMiddleware(configuration, providers)
|
|
|
|
|
|
|
|
policyCORSPublicGET := middlewares.NewCORSPolicyBuilder().
|
|
|
|
WithAllowedMethods("OPTIONS", "GET").
|
|
|
|
WithAllowedOrigins("*").
|
|
|
|
Build()
|
|
|
|
|
2020-05-21 02:20:55 +00:00
|
|
|
r := router.New()
|
2022-04-07 00:58:51 +00:00
|
|
|
|
|
|
|
// Static Assets.
|
2022-02-06 13:37:28 +00:00
|
|
|
r.GET("/", autheliaMiddleware(serveIndexHandler))
|
2021-07-22 03:52:37 +00:00
|
|
|
|
2022-04-03 23:58:01 +00:00
|
|
|
for _, f := range rootFiles {
|
2022-04-04 02:15:26 +00:00
|
|
|
r.GET("/"+f, handlerPublicHTML)
|
2022-04-03 23:58:01 +00:00
|
|
|
}
|
|
|
|
|
2022-04-04 02:15:26 +00:00
|
|
|
r.GET("/favicon.ico", middlewares.AssetOverrideMiddleware(configuration.Server.AssetPath, 0, handlerPublicHTML))
|
|
|
|
r.GET("/static/media/logo.png", middlewares.AssetOverrideMiddleware(configuration.Server.AssetPath, 2, handlerPublicHTML))
|
|
|
|
r.GET("/static/{filepath:*}", handlerPublicHTML)
|
|
|
|
|
2022-04-07 00:58:51 +00:00
|
|
|
// Locales.
|
2022-04-04 02:15:26 +00:00
|
|
|
r.GET("/locales/{language:[a-z]{1,3}}-{variant:[a-z0-9-]+}/{namespace:[a-z]+}.json", middlewares.AssetOverrideMiddleware(configuration.Server.AssetPath, 0, handlerLocales))
|
|
|
|
r.GET("/locales/{language:[a-z]{1,3}}/{namespace:[a-z]+}.json", middlewares.AssetOverrideMiddleware(configuration.Server.AssetPath, 0, handlerLocales))
|
2019-04-24 21:52:08 +00:00
|
|
|
|
2022-04-07 00:58:51 +00:00
|
|
|
// Swagger.
|
|
|
|
r.GET("/api/", autheliaMiddleware(serveSwaggerHandler))
|
|
|
|
r.OPTIONS("/api/", policyCORSPublicGET.HandleOPTIONS)
|
|
|
|
r.GET("/api/"+apiFile, policyCORSPublicGET.Middleware(autheliaMiddleware(serveSwaggerAPIHandler)))
|
|
|
|
r.OPTIONS("/api/"+apiFile, policyCORSPublicGET.HandleOPTIONS)
|
|
|
|
|
|
|
|
for _, file := range swaggerFiles {
|
|
|
|
r.GET("/api/"+file, handlerPublicHTML)
|
|
|
|
}
|
|
|
|
|
2020-11-24 23:20:52 +00:00
|
|
|
r.GET("/api/health", autheliaMiddleware(handlers.HealthGet))
|
2020-05-21 02:20:55 +00:00
|
|
|
r.GET("/api/state", autheliaMiddleware(handlers.StateGet))
|
2019-04-24 21:52:08 +00:00
|
|
|
|
2020-06-21 13:40:37 +00:00
|
|
|
r.GET("/api/configuration", autheliaMiddleware(
|
|
|
|
middlewares.RequireFirstFactor(handlers.ConfigurationGet)))
|
2019-12-07 16:40:42 +00:00
|
|
|
|
2022-04-03 11:58:27 +00:00
|
|
|
r.GET("/api/configuration/password-policy", autheliaMiddleware(handlers.PasswordPolicyConfigurationGet))
|
|
|
|
|
2020-05-21 02:20:55 +00:00
|
|
|
r.GET("/api/verify", autheliaMiddleware(handlers.VerifyGet(configuration.AuthenticationBackend)))
|
|
|
|
r.HEAD("/api/verify", autheliaMiddleware(handlers.VerifyGet(configuration.AuthenticationBackend)))
|
2019-04-24 21:52:08 +00:00
|
|
|
|
2021-08-02 06:15:38 +00:00
|
|
|
r.POST("/api/checks/safe-redirection", autheliaMiddleware(handlers.CheckSafeRedirection))
|
|
|
|
|
2022-01-20 23:46:13 +00:00
|
|
|
r.POST("/api/firstfactor", autheliaMiddleware(handlers.FirstFactorPost(middlewares.TimingAttackDelay(10, 250, 85, time.Second))))
|
2020-05-21 02:20:55 +00:00
|
|
|
r.POST("/api/logout", autheliaMiddleware(handlers.LogoutPost))
|
2019-04-24 21:52:08 +00:00
|
|
|
|
2020-04-28 14:07:20 +00:00
|
|
|
// Only register endpoints if forgot password is not disabled.
|
2022-04-04 07:46:55 +00:00
|
|
|
if !configuration.AuthenticationBackend.DisableResetPassword &&
|
|
|
|
configuration.AuthenticationBackend.PasswordReset.CustomURL.String() == "" {
|
2020-04-04 23:28:09 +00:00
|
|
|
// Password reset related endpoints.
|
2020-05-21 02:20:55 +00:00
|
|
|
r.POST("/api/reset-password/identity/start", autheliaMiddleware(
|
2020-04-04 23:28:09 +00:00
|
|
|
handlers.ResetPasswordIdentityStart))
|
2020-05-21 02:20:55 +00:00
|
|
|
r.POST("/api/reset-password/identity/finish", autheliaMiddleware(
|
2020-04-04 23:28:09 +00:00
|
|
|
handlers.ResetPasswordIdentityFinish))
|
2020-05-21 02:20:55 +00:00
|
|
|
r.POST("/api/reset-password", autheliaMiddleware(
|
2020-04-04 23:28:09 +00:00
|
|
|
handlers.ResetPasswordPost))
|
|
|
|
}
|
2019-04-24 21:52:08 +00:00
|
|
|
|
2020-04-28 14:07:20 +00:00
|
|
|
// Information about the user.
|
2020-05-21 02:20:55 +00:00
|
|
|
r.GET("/api/user/info", autheliaMiddleware(
|
2022-03-28 01:26:30 +00:00
|
|
|
middlewares.RequireFirstFactor(handlers.UserInfoGET)))
|
|
|
|
r.POST("/api/user/info", autheliaMiddleware(
|
|
|
|
middlewares.RequireFirstFactor(handlers.UserInfoPOST)))
|
2020-05-21 02:20:55 +00:00
|
|
|
r.POST("/api/user/info/2fa_method", autheliaMiddleware(
|
2019-12-07 11:18:22 +00:00
|
|
|
middlewares.RequireFirstFactor(handlers.MethodPreferencePost)))
|
2022-03-03 11:20:43 +00:00
|
|
|
|
|
|
|
if !configuration.TOTP.Disable {
|
|
|
|
// TOTP related endpoints.
|
|
|
|
r.GET("/api/user/info/totp", autheliaMiddleware(
|
|
|
|
middlewares.RequireFirstFactor(handlers.UserTOTPGet)))
|
|
|
|
|
|
|
|
r.POST("/api/secondfactor/totp/identity/start", autheliaMiddleware(
|
|
|
|
middlewares.RequireFirstFactor(handlers.SecondFactorTOTPIdentityStart)))
|
|
|
|
r.POST("/api/secondfactor/totp/identity/finish", autheliaMiddleware(
|
|
|
|
middlewares.RequireFirstFactor(handlers.SecondFactorTOTPIdentityFinish)))
|
|
|
|
r.POST("/api/secondfactor/totp", autheliaMiddleware(
|
|
|
|
middlewares.RequireFirstFactor(handlers.SecondFactorTOTPPost)))
|
|
|
|
}
|
|
|
|
|
|
|
|
if !configuration.Webauthn.Disable {
|
|
|
|
// Webauthn Endpoints.
|
|
|
|
r.POST("/api/secondfactor/webauthn/identity/start", autheliaMiddleware(
|
|
|
|
middlewares.RequireFirstFactor(handlers.SecondFactorWebauthnIdentityStart)))
|
|
|
|
r.POST("/api/secondfactor/webauthn/identity/finish", autheliaMiddleware(
|
|
|
|
middlewares.RequireFirstFactor(handlers.SecondFactorWebauthnIdentityFinish)))
|
|
|
|
r.POST("/api/secondfactor/webauthn/attestation", autheliaMiddleware(
|
|
|
|
middlewares.RequireFirstFactor(handlers.SecondFactorWebauthnAttestationPOST)))
|
|
|
|
|
|
|
|
r.GET("/api/secondfactor/webauthn/assertion", autheliaMiddleware(
|
|
|
|
middlewares.RequireFirstFactor(handlers.SecondFactorWebauthnAssertionGET)))
|
|
|
|
r.POST("/api/secondfactor/webauthn/assertion", autheliaMiddleware(
|
|
|
|
middlewares.RequireFirstFactor(handlers.SecondFactorWebauthnAssertionPOST)))
|
|
|
|
}
|
2019-04-24 21:52:08 +00:00
|
|
|
|
2020-04-28 14:07:20 +00:00
|
|
|
// Configure DUO api endpoint only if configuration exists.
|
2019-04-24 21:52:08 +00:00
|
|
|
if configuration.DuoAPI != nil {
|
|
|
|
var duoAPI duo.API
|
2020-11-19 01:50:34 +00:00
|
|
|
if os.Getenv("ENVIRONMENT") == dev {
|
2019-04-24 21:52:08 +00:00
|
|
|
duoAPI = duo.NewDuoAPI(duoapi.NewDuoApi(
|
|
|
|
configuration.DuoAPI.IntegrationKey,
|
|
|
|
configuration.DuoAPI.SecretKey,
|
|
|
|
configuration.DuoAPI.Hostname, "", duoapi.SetInsecure()))
|
|
|
|
} else {
|
|
|
|
duoAPI = duo.NewDuoAPI(duoapi.NewDuoApi(
|
|
|
|
configuration.DuoAPI.IntegrationKey,
|
|
|
|
configuration.DuoAPI.SecretKey,
|
|
|
|
configuration.DuoAPI.Hostname, ""))
|
|
|
|
}
|
|
|
|
|
2021-12-01 03:32:58 +00:00
|
|
|
r.GET("/api/secondfactor/duo_devices", autheliaMiddleware(
|
|
|
|
middlewares.RequireFirstFactor(handlers.SecondFactorDuoDevicesGet(duoAPI))))
|
|
|
|
|
2020-05-21 02:20:55 +00:00
|
|
|
r.POST("/api/secondfactor/duo", autheliaMiddleware(
|
2019-04-24 21:52:08 +00:00
|
|
|
middlewares.RequireFirstFactor(handlers.SecondFactorDuoPost(duoAPI))))
|
2021-12-01 03:32:58 +00:00
|
|
|
|
|
|
|
r.POST("/api/secondfactor/duo_device", autheliaMiddleware(
|
|
|
|
middlewares.RequireFirstFactor(handlers.SecondFactorDuoDevicePost)))
|
2019-04-24 21:52:08 +00:00
|
|
|
}
|
|
|
|
|
2021-06-01 04:09:50 +00:00
|
|
|
if configuration.Server.EnablePprof {
|
2020-05-21 02:20:55 +00:00
|
|
|
r.GET("/debug/pprof/{name?}", pprofhandler.PprofHandler)
|
2021-06-01 04:09:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if configuration.Server.EnableExpvars {
|
2020-05-21 02:20:55 +00:00
|
|
|
r.GET("/debug/vars", expvarhandler.ExpvarHandler)
|
2020-04-11 04:59:58 +00:00
|
|
|
}
|
|
|
|
|
2022-04-07 00:58:51 +00:00
|
|
|
if providers.OpenIDConnect.Fosite != nil {
|
|
|
|
r.GET("/api/oidc/consent", autheliaMiddleware(handlers.OpenIDConnectConsentGET))
|
|
|
|
r.POST("/api/oidc/consent", autheliaMiddleware(handlers.OpenIDConnectConsentPOST))
|
|
|
|
|
|
|
|
allowedOrigins := utils.StringSliceFromURLs(configuration.IdentityProviders.OIDC.CORS.AllowedOrigins)
|
|
|
|
|
|
|
|
r.OPTIONS(oidc.WellKnownOpenIDConfigurationPath, policyCORSPublicGET.HandleOPTIONS)
|
|
|
|
r.GET(oidc.WellKnownOpenIDConfigurationPath, policyCORSPublicGET.Middleware(autheliaMiddleware(handlers.OpenIDConnectConfigurationWellKnownGET)))
|
|
|
|
|
|
|
|
r.OPTIONS(oidc.WellKnownOAuthAuthorizationServerPath, policyCORSPublicGET.HandleOPTIONS)
|
|
|
|
r.GET(oidc.WellKnownOAuthAuthorizationServerPath, policyCORSPublicGET.Middleware(autheliaMiddleware(handlers.OAuthAuthorizationServerWellKnownGET)))
|
|
|
|
|
|
|
|
r.OPTIONS(oidc.JWKsPath, policyCORSPublicGET.HandleOPTIONS)
|
|
|
|
r.GET(oidc.JWKsPath, policyCORSPublicGET.Middleware(autheliaMiddleware(handlers.JSONWebKeySetGET)))
|
|
|
|
|
|
|
|
// TODO (james-d-elliott): Remove in GA. This is a legacy implementation of the above endpoint.
|
|
|
|
r.OPTIONS("/api/oidc/jwks", policyCORSPublicGET.HandleOPTIONS)
|
|
|
|
r.GET("/api/oidc/jwks", policyCORSPublicGET.Middleware(autheliaMiddleware(handlers.JSONWebKeySetGET)))
|
|
|
|
|
|
|
|
policyCORSAuthorization := middlewares.NewCORSPolicyBuilder().
|
|
|
|
WithAllowedMethods("OPTIONS", "GET").
|
|
|
|
WithAllowedOrigins(allowedOrigins...).
|
|
|
|
WithEnabled(utils.IsStringInSlice(oidc.AuthorizationEndpoint, configuration.IdentityProviders.OIDC.CORS.Endpoints)).
|
|
|
|
Build()
|
|
|
|
|
|
|
|
r.OPTIONS(oidc.AuthorizationPath, policyCORSAuthorization.HandleOnlyOPTIONS)
|
|
|
|
r.GET(oidc.AuthorizationPath, autheliaMiddleware(middlewares.NewHTTPToAutheliaHandlerAdaptor(handlers.OpenIDConnectAuthorizationGET)))
|
|
|
|
|
|
|
|
// TODO (james-d-elliott): Remove in GA. This is a legacy endpoint.
|
|
|
|
r.OPTIONS("/api/oidc/authorize", policyCORSAuthorization.HandleOnlyOPTIONS)
|
|
|
|
r.GET("/api/oidc/authorize", autheliaMiddleware(middlewares.NewHTTPToAutheliaHandlerAdaptor(handlers.OpenIDConnectAuthorizationGET)))
|
|
|
|
|
|
|
|
policyCORSToken := middlewares.NewCORSPolicyBuilder().
|
|
|
|
WithAllowCredentials(true).
|
|
|
|
WithAllowedMethods("OPTIONS", "POST").
|
|
|
|
WithAllowedOrigins(allowedOrigins...).
|
|
|
|
WithEnabled(utils.IsStringInSlice(oidc.TokenEndpoint, configuration.IdentityProviders.OIDC.CORS.Endpoints)).
|
|
|
|
Build()
|
|
|
|
|
|
|
|
r.OPTIONS(oidc.TokenPath, policyCORSToken.HandleOPTIONS)
|
|
|
|
r.POST(oidc.TokenPath, policyCORSToken.Middleware(autheliaMiddleware(middlewares.NewHTTPToAutheliaHandlerAdaptor(handlers.OpenIDConnectTokenPOST))))
|
|
|
|
|
|
|
|
policyCORSUserinfo := middlewares.NewCORSPolicyBuilder().
|
|
|
|
WithAllowCredentials(true).
|
|
|
|
WithAllowedMethods("OPTIONS", "GET", "POST").
|
|
|
|
WithAllowedOrigins(allowedOrigins...).
|
|
|
|
WithEnabled(utils.IsStringInSlice(oidc.UserinfoEndpoint, configuration.IdentityProviders.OIDC.CORS.Endpoints)).
|
|
|
|
Build()
|
|
|
|
|
|
|
|
r.OPTIONS(oidc.UserinfoPath, policyCORSUserinfo.HandleOPTIONS)
|
|
|
|
r.GET(oidc.UserinfoPath, policyCORSUserinfo.Middleware(autheliaMiddleware(middlewares.NewHTTPToAutheliaHandlerAdaptor(handlers.OpenIDConnectUserinfo))))
|
|
|
|
r.POST(oidc.UserinfoPath, policyCORSUserinfo.Middleware(autheliaMiddleware(middlewares.NewHTTPToAutheliaHandlerAdaptor(handlers.OpenIDConnectUserinfo))))
|
|
|
|
|
|
|
|
policyCORSIntrospection := middlewares.NewCORSPolicyBuilder().
|
|
|
|
WithAllowCredentials(true).
|
|
|
|
WithAllowedMethods("OPTIONS", "POST").
|
|
|
|
WithAllowedOrigins(allowedOrigins...).
|
|
|
|
WithEnabled(utils.IsStringInSlice(oidc.IntrospectionEndpoint, configuration.IdentityProviders.OIDC.CORS.Endpoints)).
|
|
|
|
Build()
|
|
|
|
|
|
|
|
r.OPTIONS(oidc.IntrospectionPath, policyCORSIntrospection.HandleOPTIONS)
|
|
|
|
r.POST(oidc.IntrospectionPath, policyCORSIntrospection.Middleware(autheliaMiddleware(middlewares.NewHTTPToAutheliaHandlerAdaptor(handlers.OAuthIntrospectionPOST))))
|
|
|
|
|
|
|
|
// TODO (james-d-elliott): Remove in GA. This is a legacy implementation of the above endpoint.
|
|
|
|
r.OPTIONS("/api/oidc/introspect", policyCORSIntrospection.HandleOPTIONS)
|
|
|
|
r.POST("/api/oidc/introspect", policyCORSIntrospection.Middleware(autheliaMiddleware(middlewares.NewHTTPToAutheliaHandlerAdaptor(handlers.OAuthIntrospectionPOST))))
|
|
|
|
|
|
|
|
policyCORSRevocation := middlewares.NewCORSPolicyBuilder().
|
|
|
|
WithAllowCredentials(true).
|
|
|
|
WithAllowedMethods("OPTIONS", "POST").
|
|
|
|
WithAllowedOrigins(allowedOrigins...).
|
|
|
|
WithEnabled(utils.IsStringInSlice(oidc.RevocationEndpoint, configuration.IdentityProviders.OIDC.CORS.Endpoints)).
|
|
|
|
Build()
|
|
|
|
|
|
|
|
r.OPTIONS(oidc.RevocationPath, policyCORSRevocation.HandleOPTIONS)
|
|
|
|
r.POST(oidc.RevocationPath, policyCORSRevocation.Middleware(autheliaMiddleware(middlewares.NewHTTPToAutheliaHandlerAdaptor(handlers.OAuthRevocationPOST))))
|
|
|
|
|
|
|
|
// TODO (james-d-elliott): Remove in GA. This is a legacy implementation of the above endpoint.
|
|
|
|
r.OPTIONS("/api/oidc/revoke", policyCORSRevocation.HandleOPTIONS)
|
|
|
|
r.POST("/api/oidc/revoke", policyCORSRevocation.Middleware(autheliaMiddleware(middlewares.NewHTTPToAutheliaHandlerAdaptor(handlers.OAuthRevocationPOST))))
|
|
|
|
}
|
|
|
|
|
|
|
|
r.NotFound = handlerNotFound(autheliaMiddleware(serveIndexHandler))
|
2022-04-03 23:58:01 +00:00
|
|
|
|
|
|
|
r.HandleMethodNotAllowed = true
|
2022-04-07 00:58:51 +00:00
|
|
|
r.MethodNotAllowed = handlerMethodNotAllowed
|
2020-05-21 02:20:55 +00:00
|
|
|
|
|
|
|
handler := middlewares.LogRequestMiddleware(r.Handler)
|
|
|
|
if configuration.Server.Path != "" {
|
2021-08-10 00:31:08 +00:00
|
|
|
handler = middlewares.StripPathMiddleware(configuration.Server.Path, handler)
|
2020-05-21 02:20:55 +00:00
|
|
|
}
|
2019-11-30 16:49:52 +00:00
|
|
|
|
2021-05-04 22:06:05 +00:00
|
|
|
return handler
|
|
|
|
}
|
|
|
|
|
2022-04-04 23:57:47 +00:00
|
|
|
// CreateServer Create Authelia's internal webserver with the given configuration and providers.
|
|
|
|
func CreateServer(configuration schema.Configuration, providers middlewares.Providers) (*fasthttp.Server, net.Listener) {
|
2021-05-04 22:06:05 +00:00
|
|
|
handler := registerRoutes(configuration, providers)
|
|
|
|
|
2020-04-11 04:59:58 +00:00
|
|
|
server := &fasthttp.Server{
|
2022-04-07 00:58:51 +00:00
|
|
|
ErrorHandler: handlerErrors,
|
2020-05-21 02:20:55 +00:00
|
|
|
Handler: handler,
|
2020-04-30 03:16:41 +00:00
|
|
|
NoDefaultServerHeader: true,
|
|
|
|
ReadBufferSize: configuration.Server.ReadBufferSize,
|
|
|
|
WriteBufferSize: configuration.Server.WriteBufferSize,
|
2020-04-11 04:59:58 +00:00
|
|
|
}
|
2022-04-07 00:58:51 +00:00
|
|
|
|
2022-04-04 23:57:47 +00:00
|
|
|
logger := logging.Logger()
|
2020-04-30 02:03:05 +00:00
|
|
|
|
2022-03-25 00:56:23 +00:00
|
|
|
address := net.JoinHostPort(configuration.Server.Host, strconv.Itoa(configuration.Server.Port))
|
2020-07-16 06:36:37 +00:00
|
|
|
|
2022-04-04 23:57:47 +00:00
|
|
|
var (
|
|
|
|
listener net.Listener
|
|
|
|
err error
|
|
|
|
connectionType string
|
|
|
|
connectionScheme string
|
|
|
|
)
|
2019-04-24 21:52:08 +00:00
|
|
|
|
2021-08-02 11:55:30 +00:00
|
|
|
if configuration.Server.TLS.Certificate != "" && configuration.Server.TLS.Key != "" {
|
2022-04-04 23:57:47 +00:00
|
|
|
connectionType, connectionScheme = "TLS", schemeHTTPS
|
|
|
|
|
2022-04-07 00:58:51 +00:00
|
|
|
if err = server.AppendCert(configuration.Server.TLS.Certificate, configuration.Server.TLS.Key); err != nil {
|
2022-04-04 23:57:47 +00:00
|
|
|
logger.Fatalf("unable to load certificate: %v", err)
|
2021-08-05 04:02:07 +00:00
|
|
|
}
|
|
|
|
|
2022-04-04 23:57:47 +00:00
|
|
|
if len(configuration.Server.TLS.ClientCertificates) > 0 {
|
|
|
|
caCertPool := x509.NewCertPool()
|
|
|
|
|
|
|
|
for _, path := range configuration.Server.TLS.ClientCertificates {
|
|
|
|
cert, err := os.ReadFile(path)
|
|
|
|
if err != nil {
|
|
|
|
logger.Fatalf("Cannot read client TLS certificate %s: %s", path, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
caCertPool.AppendCertsFromPEM(cert)
|
|
|
|
}
|
|
|
|
|
|
|
|
// ClientCAs should never be nil, otherwise the system cert pool is used for client authentication
|
|
|
|
// but we don't want everybody on the Internet to be able to authenticate.
|
|
|
|
server.TLSConfig.ClientCAs = caCertPool
|
|
|
|
server.TLSConfig.ClientAuth = tls.RequireAndVerifyClientCert
|
2021-08-10 00:31:08 +00:00
|
|
|
}
|
|
|
|
|
2022-04-07 00:58:51 +00:00
|
|
|
if listener, err = tls.Listen("tcp", address, server.TLSConfig.Clone()); err != nil {
|
2022-04-04 23:57:47 +00:00
|
|
|
logger.Fatalf("Error initializing listener: %s", err)
|
|
|
|
}
|
2020-03-03 07:18:25 +00:00
|
|
|
} else {
|
2022-04-04 23:57:47 +00:00
|
|
|
connectionType, connectionScheme = "non-TLS", schemeHTTP
|
2022-04-07 00:58:51 +00:00
|
|
|
|
|
|
|
if listener, err = net.Listen("tcp", address); err != nil {
|
2022-04-04 23:57:47 +00:00
|
|
|
logger.Fatalf("Error initializing listener: %s", err)
|
2021-08-05 04:02:07 +00:00
|
|
|
}
|
2022-04-04 23:57:47 +00:00
|
|
|
}
|
2021-08-05 04:02:07 +00:00
|
|
|
|
2022-04-04 23:57:47 +00:00
|
|
|
if err = writeHealthCheckEnv(configuration.Server.DisableHealthcheck, connectionScheme, configuration.Server.Host,
|
|
|
|
configuration.Server.Path, configuration.Server.Port); err != nil {
|
|
|
|
logger.Fatalf("Could not configure healthcheck: %v", err)
|
2020-03-03 07:18:25 +00:00
|
|
|
}
|
2022-04-04 23:57:47 +00:00
|
|
|
|
|
|
|
if configuration.Server.Path == "" {
|
2022-04-07 00:58:51 +00:00
|
|
|
logger.Infof("Initializing server for %s connections on '%s' path '/'", connectionType, listener.Addr().String())
|
2022-04-04 23:57:47 +00:00
|
|
|
} else {
|
2022-04-07 00:58:51 +00:00
|
|
|
logger.Infof("Initializing server for %s connections on '%s' paths '/' and '%s'", connectionType, listener.Addr().String(), configuration.Server.Path)
|
2022-04-04 23:57:47 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return server, listener
|
2019-04-24 21:52:08 +00:00
|
|
|
}
|