* api: allow API requests as managed outpost's account when using secret_key Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * root: load secret key from env Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * outposts: make listener IP configurable Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * outpost/proxy: run outpost in background and pass requests conditionally Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * outpost: unify branding to embedded Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * web/admin: fix embedded outpost not being editable Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * web: fix mismatched host detection Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * tests/e2e: fix LDAP test not including user for embedded outpost Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * tests/e2e: fix user matching Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * api: add tests for secret_key auth Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * root: load environment variables using github.com/Netflix/go-env Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org>
		
			
				
	
	
		
			63 lines
		
	
	
		
			1.5 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			63 lines
		
	
	
		
			1.5 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
package proxy
 | 
						|
 | 
						|
import (
 | 
						|
	"crypto/tls"
 | 
						|
	"fmt"
 | 
						|
	"net"
 | 
						|
	"sync"
 | 
						|
 | 
						|
	"github.com/pires/go-proxyproto"
 | 
						|
)
 | 
						|
 | 
						|
func (s *Server) getCertificates(info *tls.ClientHelloInfo) (*tls.Certificate, error) {
 | 
						|
	handler, ok := s.Handlers[info.ServerName]
 | 
						|
	if !ok {
 | 
						|
		s.logger.WithField("server-name", info.ServerName).Debug("Handler does not exist")
 | 
						|
		return &s.defaultCert, nil
 | 
						|
	}
 | 
						|
	if handler.cert == nil {
 | 
						|
		s.logger.WithField("server-name", info.ServerName).Debug("Handler does not have a certificate")
 | 
						|
		return &s.defaultCert, nil
 | 
						|
	}
 | 
						|
	return handler.cert, nil
 | 
						|
}
 | 
						|
 | 
						|
// ServeHTTPS constructs a net.Listener and starts handling HTTPS requests
 | 
						|
func (s *Server) ServeHTTPS() {
 | 
						|
	listenAddress := fmt.Sprintf(s.Listen, 4443)
 | 
						|
	config := &tls.Config{
 | 
						|
		MinVersion:     tls.VersionTLS12,
 | 
						|
		MaxVersion:     tls.VersionTLS12,
 | 
						|
		GetCertificate: s.getCertificates,
 | 
						|
	}
 | 
						|
 | 
						|
	ln, err := net.Listen("tcp", listenAddress)
 | 
						|
	if err != nil {
 | 
						|
		s.logger.Fatalf("FATAL: listen (%s) failed - %s", listenAddress, err)
 | 
						|
	}
 | 
						|
	s.logger.Printf("listening on %s", ln.Addr())
 | 
						|
 | 
						|
	proxyListener := &proxyproto.Listener{Listener: tcpKeepAliveListener{ln.(*net.TCPListener)}}
 | 
						|
	defer proxyListener.Close()
 | 
						|
 | 
						|
	tlsListener := tls.NewListener(proxyListener, config)
 | 
						|
	s.serve(tlsListener)
 | 
						|
	s.logger.Printf("closing %s", tlsListener.Addr())
 | 
						|
}
 | 
						|
 | 
						|
func (s *Server) Start() error {
 | 
						|
	wg := sync.WaitGroup{}
 | 
						|
	wg.Add(2)
 | 
						|
	go func() {
 | 
						|
		defer wg.Done()
 | 
						|
		s.logger.Debug("Starting HTTP Server...")
 | 
						|
		s.ServeHTTP()
 | 
						|
	}()
 | 
						|
	go func() {
 | 
						|
		defer wg.Done()
 | 
						|
		s.logger.Debug("Starting HTTPs Server...")
 | 
						|
		s.ServeHTTPS()
 | 
						|
	}()
 | 
						|
	return nil
 | 
						|
}
 |