 f01bc20d44
			
		
	
	f01bc20d44
	
	
	
		
			
			* api: allow API requests as managed outpost's account when using secret_key Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * root: load secret key from env Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * outposts: make listener IP configurable Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * outpost/proxy: run outpost in background and pass requests conditionally Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * outpost: unify branding to embedded Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * web/admin: fix embedded outpost not being editable Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * web: fix mismatched host detection Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * tests/e2e: fix LDAP test not including user for embedded outpost Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * tests/e2e: fix user matching Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * api: add tests for secret_key auth Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * root: load environment variables using github.com/Netflix/go-env Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org>
		
			
				
	
	
		
			63 lines
		
	
	
		
			1.5 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			63 lines
		
	
	
		
			1.5 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package proxy
 | |
| 
 | |
| import (
 | |
| 	"crypto/tls"
 | |
| 	"fmt"
 | |
| 	"net"
 | |
| 	"sync"
 | |
| 
 | |
| 	"github.com/pires/go-proxyproto"
 | |
| )
 | |
| 
 | |
| func (s *Server) getCertificates(info *tls.ClientHelloInfo) (*tls.Certificate, error) {
 | |
| 	handler, ok := s.Handlers[info.ServerName]
 | |
| 	if !ok {
 | |
| 		s.logger.WithField("server-name", info.ServerName).Debug("Handler does not exist")
 | |
| 		return &s.defaultCert, nil
 | |
| 	}
 | |
| 	if handler.cert == nil {
 | |
| 		s.logger.WithField("server-name", info.ServerName).Debug("Handler does not have a certificate")
 | |
| 		return &s.defaultCert, nil
 | |
| 	}
 | |
| 	return handler.cert, nil
 | |
| }
 | |
| 
 | |
| // ServeHTTPS constructs a net.Listener and starts handling HTTPS requests
 | |
| func (s *Server) ServeHTTPS() {
 | |
| 	listenAddress := fmt.Sprintf(s.Listen, 4443)
 | |
| 	config := &tls.Config{
 | |
| 		MinVersion:     tls.VersionTLS12,
 | |
| 		MaxVersion:     tls.VersionTLS12,
 | |
| 		GetCertificate: s.getCertificates,
 | |
| 	}
 | |
| 
 | |
| 	ln, err := net.Listen("tcp", listenAddress)
 | |
| 	if err != nil {
 | |
| 		s.logger.Fatalf("FATAL: listen (%s) failed - %s", listenAddress, err)
 | |
| 	}
 | |
| 	s.logger.Printf("listening on %s", ln.Addr())
 | |
| 
 | |
| 	proxyListener := &proxyproto.Listener{Listener: tcpKeepAliveListener{ln.(*net.TCPListener)}}
 | |
| 	defer proxyListener.Close()
 | |
| 
 | |
| 	tlsListener := tls.NewListener(proxyListener, config)
 | |
| 	s.serve(tlsListener)
 | |
| 	s.logger.Printf("closing %s", tlsListener.Addr())
 | |
| }
 | |
| 
 | |
| func (s *Server) Start() error {
 | |
| 	wg := sync.WaitGroup{}
 | |
| 	wg.Add(2)
 | |
| 	go func() {
 | |
| 		defer wg.Done()
 | |
| 		s.logger.Debug("Starting HTTP Server...")
 | |
| 		s.ServeHTTP()
 | |
| 	}()
 | |
| 	go func() {
 | |
| 		defer wg.Done()
 | |
| 		s.logger.Debug("Starting HTTPs Server...")
 | |
| 		s.ServeHTTPS()
 | |
| 	}()
 | |
| 	return nil
 | |
| }
 |