about summary refs log tree commit diff stats
path: root/internal/server/tls.go
blob: f7f8c075bd3b04c9286def263b0320a59ccd4a69 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
package server

import (
	"context"
	"crypto/tls"
	"crypto/x509"
	"net"
	"net/http"
	"strconv"
	"website/internal/log"

	"github.com/ardanlabs/conf/v3"
	"github.com/caddyserver/caddy/v2"
	"github.com/caddyserver/certmagic"
	certmagic_redis "github.com/pberkel/caddy-storage-redis"
	"github.com/pkg/errors"
)

type redisConfig struct {
	Address       string `conf:"required"`
	Username      string `conf:"default:default"`
	Password      string `conf:"required"`
	EncryptionKey string `conf:"required"`
	KeyPrefix     string `conf:"default:certmagic"`
}

func (s *Server) serveTLS() (err error) {
	cfg := certmagic.NewDefault()
	cfg.DefaultServerName = s.config.Domains[0]

	certmagic.DefaultACME.Agreed = true
	certmagic.DefaultACME.Email = s.config.Email

	if s.runtimeConfig.Development {
		ca := s.runtimeConfig.ACMECA
		if ca == "" {
			return errors.New("can't enable tls in development without an ACME_CA")
		}

		cp, err := x509.SystemCertPool()
		if err != nil {
			log.Warn("could not get system certificate pool", "error", err)
			cp = x509.NewCertPool()
		}

		if cacert := s.runtimeConfig.ACMECACert; cacert != "" {
			cp.AppendCertsFromPEM([]byte(cacert))
		}

		// caddy's ACME server (step-ca) doesn't specify an OCSP server
		cfg.OCSP.DisableStapling = true

		cfg.Issuers[0] = certmagic.NewACMEIssuer(cfg, certmagic.ACMEIssuer{
			CA:                      s.runtimeConfig.ACMECA,
			TrustedRoots:            cp,
			DisableTLSALPNChallenge: true,
			ListenHost:              s.runtimeConfig.ListenAddress,
			AltHTTPPort:             s.runtimeConfig.Port,
			AltTLSALPNPort:          s.runtimeConfig.TLSPort,
		})
	} else {
		rc := &redisConfig{}
		_, err = conf.Parse("REDIS", rc)
		if err != nil {
			return errors.Wrap(err, "could not parse redis config")
		}

		rs := certmagic_redis.New()
		rs.Address = []string{rc.Address}
		rs.Username = rc.Username
		rs.Password = rc.Password
		rs.EncryptionKey = rc.EncryptionKey
		rs.KeyPrefix = rc.KeyPrefix

		cfg.Storage = rs
		err = rs.Provision(caddy.Context{
			Context: context.Background(),
		})
		if err != nil {
			return errors.Wrap(err, "could not provision redis storage")
		}
	}

	log.Debug(
		"starting certmagic",
		"http_port",
		certmagic.HTTPPort,
		"https_port",
		certmagic.HTTPSPort,
	)
	err = cfg.ManageSync(context.TODO(), s.config.Domains)
	if err != nil {
		return errors.Wrap(err, "could not enable TLS")
	}
	tlsConfig := cfg.TLSConfig()
	tlsConfig.NextProtos = append([]string{"h2", "http/1.1"}, tlsConfig.NextProtos...)

	sln, err := tls.Listen(
		"tcp",
		net.JoinHostPort(s.runtimeConfig.ListenAddress, strconv.Itoa(s.runtimeConfig.TLSPort)),
		tlsConfig,
	)
	if err != nil {
		return errors.Wrap(err, "could not bind tls socket")
	}

	ln, err := net.Listen(
		"tcp",
		net.JoinHostPort(s.runtimeConfig.ListenAddress, strconv.Itoa(s.runtimeConfig.Port)),
	)
	if err != nil {
		return errors.Wrap(err, "could not bind plain socket")
	}

	go func(ln net.Listener) {
		redirecter := http.NewServeMux()
		redirecter.HandleFunc("/", s.redirectHandler)
		err := http.Serve(ln, redirecter)
		if err != nil && !errors.Is(err, http.ErrServerClosed) {
			log.Error("error in http handler", "error", err)
		}
	}(ln)

	return s.Serve(sln)
}