pages-server/cmd/main.go

153 lines
4.7 KiB
Go
Raw Permalink Normal View History

2021-12-03 01:12:51 +00:00
package cmd
import (
2021-12-05 17:26:54 +00:00
"context"
2021-12-03 01:12:51 +00:00
"crypto/tls"
"fmt"
"net"
"net/http"
"os"
2021-12-03 02:05:38 +00:00
"strings"
2021-12-05 17:26:54 +00:00
"time"
2021-12-03 01:12:51 +00:00
"github.com/rs/zerolog"
2021-12-03 02:05:38 +00:00
"github.com/rs/zerolog/log"
2021-12-03 01:12:51 +00:00
"github.com/urfave/cli/v2"
2021-12-03 03:15:48 +00:00
"codeberg.org/codeberg/pages/server/cache"
2021-12-05 14:21:05 +00:00
"codeberg.org/codeberg/pages/server/certificates"
"codeberg.org/codeberg/pages/server/gitea"
"codeberg.org/codeberg/pages/server/handler"
2021-12-03 01:12:51 +00:00
)
// AllowedCorsDomains lists the domains for which Cross-Origin Resource Sharing is allowed.
2021-12-03 02:05:38 +00:00
// TODO: make it a flag
var AllowedCorsDomains = []string{
"fonts.codeberg.org",
"design.codeberg.org",
2021-12-03 01:12:51 +00:00
}
// BlacklistedPaths specifies forbidden path prefixes for all Codeberg Pages.
2021-12-04 20:59:04 +00:00
// TODO: Make it a flag too
var BlacklistedPaths = []string{
"/.well-known/acme-challenge/",
2021-12-03 01:12:51 +00:00
}
// Serve sets up and starts the web server.
func Serve(ctx *cli.Context) error {
// Initialize the logger.
logLevel, err := zerolog.ParseLevel(ctx.String("log-level"))
if err != nil {
return err
}
log.Logger = zerolog.New(zerolog.ConsoleWriter{Out: os.Stderr}).With().Timestamp().Logger().Level(logLevel)
giteaRoot := ctx.String("gitea-root")
2021-12-03 02:05:38 +00:00
giteaAPIToken := ctx.String("gitea-api-token")
rawDomain := ctx.String("raw-domain")
defaultBranches := ctx.StringSlice("pages-branch")
mainDomainSuffix := ctx.String("pages-domain")
2021-12-03 02:05:38 +00:00
rawInfoPage := ctx.String("raw-info-page")
listeningHost := ctx.String("host")
listeningSSLPort := ctx.Uint("port")
listeningSSLAddress := fmt.Sprintf("%s:%d", listeningHost, listeningSSLPort)
listeningHTTPAddress := fmt.Sprintf("%s:%d", listeningHost, ctx.Uint("http-port"))
2021-12-03 02:34:50 +00:00
enableHTTPServer := ctx.Bool("enable-http-server")
2021-12-03 02:05:38 +00:00
allowedCorsDomains := AllowedCorsDomains
if rawDomain != "" {
allowedCorsDomains = append(allowedCorsDomains, rawDomain)
2021-12-03 02:05:38 +00:00
}
// Make sure MainDomain has a trailing dot
if !strings.HasPrefix(mainDomainSuffix, ".") {
mainDomainSuffix = "." + mainDomainSuffix
2021-12-03 01:12:51 +00:00
}
if len(defaultBranches) == 0 {
return fmt.Errorf("no default branches set (PAGES_BRANCHES)")
}
// Init ssl cert database
certDB, closeFn, err := openCertDB(ctx)
if err != nil {
return err
}
defer closeFn()
2021-12-05 14:02:44 +00:00
keyCache := cache.NewKeyValueCache()
challengeCache := cache.NewKeyValueCache()
// canonicalDomainCache stores canonical domains
canonicalDomainCache := cache.NewKeyValueCache()
2021-12-05 14:02:44 +00:00
// dnsLookupCache stores DNS lookups for custom domains
dnsLookupCache := cache.NewKeyValueCache()
// redirectsCache stores redirects in _redirects files
redirectsCache := cache.NewKeyValueCache()
// clientResponseCache stores responses from the Gitea server
clientResponseCache := cache.NewKeyValueCache()
2021-12-05 14:02:44 +00:00
giteaClient, err := gitea.NewClient(giteaRoot, giteaAPIToken, clientResponseCache, ctx.Bool("enable-symlink-support"), ctx.Bool("enable-lfs-support"))
if err != nil {
return fmt.Errorf("could not create new gitea client: %v", err)
}
acmeClient, err := createAcmeClient(ctx, enableHTTPServer, challengeCache)
if err != nil {
return err
}
if err := certificates.SetupMainDomainCertificates(mainDomainSuffix, acmeClient, certDB); err != nil {
return err
}
// Create listener for SSL connections
log.Info().Msgf("Create TCP listener for SSL on %s", listeningSSLAddress)
listener, err := net.Listen("tcp", listeningSSLAddress)
2021-12-03 01:12:51 +00:00
if err != nil {
return fmt.Errorf("couldn't create listener: %v", err)
2021-12-03 01:12:51 +00:00
}
// Setup listener for SSL connections
2021-12-05 14:21:05 +00:00
listener = tls.NewListener(listener, certificates.TLSConfig(mainDomainSuffix,
giteaClient,
acmeClient,
defaultBranches[0],
2021-12-05 14:02:44 +00:00
keyCache, challengeCache, dnsLookupCache, canonicalDomainCache,
2021-12-05 18:02:26 +00:00
certDB))
2021-12-03 03:15:48 +00:00
2021-12-05 17:26:54 +00:00
interval := 12 * time.Hour
certMaintainCtx, cancelCertMaintain := context.WithCancel(context.Background())
defer cancelCertMaintain()
go certificates.MaintainCertDB(certMaintainCtx, interval, acmeClient, mainDomainSuffix, certDB)
2021-12-03 02:34:50 +00:00
if enableHTTPServer {
// Create handler for http->https redirect and http acme challenges
httpHandler := certificates.SetupHTTPACMEChallengeServer(challengeCache, listeningSSLPort)
// Create listener for http and start listening
go func() {
log.Info().Msgf("Start HTTP server listening on %s", listeningHTTPAddress)
err := http.ListenAndServe(listeningHTTPAddress, httpHandler)
2021-12-03 01:12:51 +00:00
if err != nil {
log.Panic().Err(err).Msg("Couldn't start HTTP fastServer")
2021-12-03 01:12:51 +00:00
}
}()
2021-12-03 01:12:51 +00:00
}
// Create ssl handler based on settings
sslHandler := handler.Handler(mainDomainSuffix, rawDomain,
giteaClient,
rawInfoPage,
BlacklistedPaths, allowedCorsDomains,
defaultBranches,
dnsLookupCache, canonicalDomainCache, redirectsCache)
// Start the ssl listener
log.Info().Msgf("Start SSL server using TCP listener on %s", listener.Addr())
if err := http.Serve(listener, sslHandler); err != nil {
log.Panic().Err(err).Msg("Couldn't start fastServer")
2021-12-03 01:12:51 +00:00
}
return nil
}