package server import ( "crypto/tls" "crypto/x509" "fmt" "net" "os" "strconv" "strings" "github.com/sirupsen/logrus" "github.com/valyala/fasthttp" "github.com/authelia/authelia/v4/internal/configuration/schema" "github.com/authelia/authelia/v4/internal/logging" "github.com/authelia/authelia/v4/internal/middlewares" ) // CreateDefaultServer Create Authelia's internal webserver with the given configuration and providers. func CreateDefaultServer(config schema.Configuration, providers middlewares.Providers) (server *fasthttp.Server, listener net.Listener, err error) { if err = providers.Templates.LoadTemplatedAssets(assets); err != nil { return nil, nil, fmt.Errorf("failed to load templated assets") } server = &fasthttp.Server{ ErrorHandler: handleError(), Handler: handleRouter(config, providers), NoDefaultServerHeader: true, ReadBufferSize: config.Server.Buffers.Read, WriteBufferSize: config.Server.Buffers.Write, ReadTimeout: config.Server.Timeouts.Read, WriteTimeout: config.Server.Timeouts.Write, IdleTimeout: config.Server.Timeouts.Idle, Logger: logging.LoggerPrintf(logrus.DebugLevel), } address := net.JoinHostPort(config.Server.Host, strconv.Itoa(config.Server.Port)) var ( connectionType string connectionScheme string ) if config.Server.TLS.Certificate != "" && config.Server.TLS.Key != "" { connectionType, connectionScheme = connTLS, schemeHTTPS if err = server.AppendCert(config.Server.TLS.Certificate, config.Server.TLS.Key); err != nil { return nil, nil, fmt.Errorf("unable to load tls server certificate '%s' or private key '%s': %w", config.Server.TLS.Certificate, config.Server.TLS.Key, err) } if len(config.Server.TLS.ClientCertificates) > 0 { caCertPool := x509.NewCertPool() var cert []byte for _, path := range config.Server.TLS.ClientCertificates { if cert, err = os.ReadFile(path); err != nil { return nil, nil, fmt.Errorf("unable to load tls client certificate '%s': %w", path, err) } caCertPool.AppendCertsFromPEM(cert) } // ClientCAs should never be nil, otherwise the system cert pool is used for client authentication // but we don't want everybody on the Internet to be able to authenticate. server.TLSConfig.ClientCAs = caCertPool server.TLSConfig.ClientAuth = tls.RequireAndVerifyClientCert } if listener, err = tls.Listen("tcp", address, server.TLSConfig.Clone()); err != nil { return nil, nil, fmt.Errorf("unable to initialize tcp listener: %w", err) } } else { connectionType, connectionScheme = connNonTLS, schemeHTTP if listener, err = net.Listen("tcp", address); err != nil { return nil, nil, fmt.Errorf("unable to initialize tcp listener: %w", err) } } if err = writeHealthCheckEnv(config.Server.DisableHealthcheck, connectionScheme, config.Server.Host, config.Server.Path, config.Server.Port); err != nil { return nil, nil, fmt.Errorf("unable to configure healthcheck: %w", err) } paths := []string{"/"} if config.Server.Path != "" { paths = append(paths, config.Server.Path) } logging.Logger().Infof(fmtLogServerInit, "server", connectionType, listener.Addr().String(), strings.Join(paths, "' and '")) return server, listener, nil } // CreateMetricsServer creates a metrics server. func CreateMetricsServer(config schema.TelemetryMetricsConfig) (server *fasthttp.Server, listener net.Listener, err error) { if listener, err = config.Address.Listener(); err != nil { return nil, nil, err } server = &fasthttp.Server{ ErrorHandler: handleError(), NoDefaultServerHeader: true, Handler: handleMetrics(), ReadBufferSize: config.Buffers.Read, WriteBufferSize: config.Buffers.Write, ReadTimeout: config.Timeouts.Read, WriteTimeout: config.Timeouts.Write, IdleTimeout: config.Timeouts.Idle, Logger: logging.LoggerPrintf(logrus.DebugLevel), } logging.Logger().Infof(fmtLogServerInit, "server (metrics)", connNonTLS, listener.Addr().String(), "/metrics") return server, listener, nil }