mirror of
https://github.com/pomerium/pomerium.git
synced 2025-04-29 10:26:29 +02:00
- Refactored middleware and request hander logging. - Request refactored to use context.Context. - Add helper (based on Alice) to allow middleware chaining. - Add helper scripts to generate elliptic curve self-signed certificate that can be used to sign JWT. - Changed LetsEncrypt scripts to use acme instead of certbot. - Add script to have LetsEncrypt sign an RSA based certificate. - Add documentation to explain how to verify headers. - Refactored internal/cryptutil signer's code to expect a valid EC priv key. - Changed JWT expiries to use default leeway period. - Update docs and add screenshots. - Replaced logging handler logic to use context.Context. - Removed specific XML error handling. - Refactored handler function signatures to prefer standard go idioms.
151 lines
4.1 KiB
Go
151 lines
4.1 KiB
Go
package https // import "github.com/pomerium/pomerium/internal/https"
|
|
|
|
import (
|
|
"crypto/tls"
|
|
"encoding/base64"
|
|
"fmt"
|
|
"net"
|
|
"net/http"
|
|
"os"
|
|
"path/filepath"
|
|
"time"
|
|
|
|
"github.com/pomerium/pomerium/internal/fileutil"
|
|
)
|
|
|
|
// Options contains the configurations settings for a TLS http server.
|
|
type Options struct {
|
|
// Addr specifies the host and port on which the server should serve
|
|
// HTTPS requests. If empty, ":https" is used.
|
|
Addr string
|
|
|
|
// Cert and Key specifies the base64 encoded TLS certificates to use.
|
|
Cert string
|
|
Key string
|
|
// CertFile and KeyFile specifies the TLS certificates to use.
|
|
CertFile string
|
|
KeyFile string
|
|
}
|
|
|
|
var defaultOptions = &Options{
|
|
Addr: ":https",
|
|
CertFile: filepath.Join(findKeyDir(), "cert.pem"),
|
|
KeyFile: filepath.Join(findKeyDir(), "privkey.pem"),
|
|
}
|
|
|
|
func findKeyDir() string {
|
|
p, err := os.Getwd()
|
|
if err != nil {
|
|
return "."
|
|
}
|
|
return p
|
|
}
|
|
|
|
func (opt *Options) applyDefaults() {
|
|
if opt.Addr == "" {
|
|
opt.Addr = defaultOptions.Addr
|
|
}
|
|
if opt.Cert == "" && opt.CertFile == "" {
|
|
opt.CertFile = defaultOptions.CertFile
|
|
}
|
|
if opt.Key == "" && opt.KeyFile == "" {
|
|
opt.KeyFile = defaultOptions.KeyFile
|
|
}
|
|
}
|
|
|
|
// ListenAndServeTLS serves the provided handlers by HTTPS
|
|
// using the provided options.
|
|
func ListenAndServeTLS(opt *Options, handler http.Handler) error {
|
|
if opt == nil {
|
|
opt = defaultOptions
|
|
} else {
|
|
opt.applyDefaults()
|
|
}
|
|
var cert *tls.Certificate
|
|
var err error
|
|
if opt.Cert != "" && opt.Key != "" {
|
|
cert, err = decodeCertificate(opt.Cert, opt.Key)
|
|
} else {
|
|
cert, err = readCertificateFile(opt.CertFile, opt.KeyFile)
|
|
}
|
|
if err != nil {
|
|
return fmt.Errorf("https: failed loading x509 certificate: %v", err)
|
|
}
|
|
config, err := newDefaultTLSConfig(cert)
|
|
if err != nil {
|
|
return fmt.Errorf("https: setting up TLS config: %v", err)
|
|
}
|
|
ln, err := net.Listen("tcp", opt.Addr)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
ln = tls.NewListener(ln, config)
|
|
|
|
// Set up the main server.
|
|
server := &http.Server{
|
|
ReadHeaderTimeout: 5 * time.Second,
|
|
ReadTimeout: 15 * time.Second,
|
|
// WriteTimeout is set to 0 because it also pertains to
|
|
// streaming replies, e.g., the DirServer.Watch interface.
|
|
WriteTimeout: 0,
|
|
IdleTimeout: 60 * time.Second,
|
|
TLSConfig: config,
|
|
Handler: handler,
|
|
}
|
|
|
|
return server.Serve(ln)
|
|
}
|
|
|
|
func decodeCertificate(cert, key string) (*tls.Certificate, error) {
|
|
decodedCert, err := base64.StdEncoding.DecodeString(cert)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to decode certificate cert %v: %v", decodedCert, err)
|
|
}
|
|
decodedKey, err := base64.StdEncoding.DecodeString(key)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to decode certificate key %v: %v", decodedKey, err)
|
|
}
|
|
x509, err := tls.X509KeyPair(decodedCert, decodedKey)
|
|
return &x509, err
|
|
}
|
|
|
|
func readCertificateFile(certFile, certKeyFile string) (*tls.Certificate, error) {
|
|
certReadable, err := fileutil.IsReadableFile(certFile)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("TLS certificate in %v: %v", certFile, err)
|
|
}
|
|
if !certReadable {
|
|
return nil, fmt.Errorf("certificate file %v not readable", certFile)
|
|
}
|
|
keyReadable, err := fileutil.IsReadableFile(certKeyFile)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("TLS key in %v: %v", certKeyFile, err)
|
|
}
|
|
if !keyReadable {
|
|
return nil, fmt.Errorf("certificate key file %v not readable", certKeyFile)
|
|
}
|
|
cert, err := tls.LoadX509KeyPair(certFile, certKeyFile)
|
|
return &cert, err
|
|
}
|
|
|
|
// newDefaultTLSConfig creates a new TLS config based on the certificate files given.
|
|
// see also:
|
|
// https://wiki.mozilla.org/Security/Server_Side_TLS#Recommended_configurations
|
|
func newDefaultTLSConfig(cert *tls.Certificate) (*tls.Config, error) {
|
|
tlsConfig := &tls.Config{
|
|
CipherSuites: []uint16{
|
|
tls.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
|
|
tls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
|
|
tls.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
|
|
tls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
|
|
tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
|
|
tls.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,
|
|
},
|
|
MinVersion: tls.VersionTLS12,
|
|
PreferServerCipherSuites: true,
|
|
Certificates: []tls.Certificate{*cert},
|
|
}
|
|
tlsConfig.BuildNameToCertificate()
|
|
return tlsConfig, nil
|
|
}
|