mirror of
				https://codeberg.org/forgejo/forgejo.git
				synced 2025-10-31 06:21:11 +00:00 
			
		
		
		
	## Checklist The [contributor guide](https://forgejo.org/docs/next/contributor/) contains information that will be helpful to first time contributors. There also are a few [conditions for merging Pull Requests in Forgejo repositories](https://codeberg.org/forgejo/governance/src/branch/main/PullRequestsAgreement.md). You are also welcome to join the [Forgejo development chatroom](https://matrix.to/#/#forgejo-development:matrix.org). ### Tests - I added test coverage for Go changes... - [ ] in their respective `*_test.go` for unit tests. - [ ] in the `tests/integration` directory if it involves interactions with a live Forgejo server. - I added test coverage for JavaScript changes... - [ ] in `web_src/js/*.test.js` if it can be unit tested. - [ ] in `tests/e2e/*.test.e2e.js` if it requires interactions with a live Forgejo server (see also the [developer guide for JavaScript testing](https://codeberg.org/forgejo/forgejo/src/branch/forgejo/tests/e2e/README.md#end-to-end-tests)). ### Documentation - [ ] I created a pull request [to the documentation](https://codeberg.org/forgejo/docs) to explain to Forgejo users how to use this change. - [x] I did not document these changes and I do not expect someone else to do it. ### Release notes - [ ] I do not want this change to show in the release notes. - [x] I want the title to show in the release notes with a link to this pull request. - [ ] I want the content of the `release-notes/<pull request number>.md` to be be used for the release notes instead of the title. Reviewed-on: https://codeberg.org/forgejo/forgejo/pulls/7409 Reviewed-by: Gusted <gusted@noreply.codeberg.org> Co-authored-by: Gwendolyn <me@gwendolyn.dev> Co-committed-by: Gwendolyn <me@gwendolyn.dev>
		
			
				
	
	
		
			140 lines
		
	
	
	
		
			4.4 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			140 lines
		
	
	
	
		
			4.4 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright 2020 The Gitea Authors. All rights reserved.
 | |
| // SPDX-License-Identifier: MIT
 | |
| 
 | |
| package cmd
 | |
| 
 | |
| import (
 | |
| 	"crypto/x509"
 | |
| 	"encoding/pem"
 | |
| 	"fmt"
 | |
| 	"net/http"
 | |
| 	"os"
 | |
| 	"strconv"
 | |
| 	"strings"
 | |
| 
 | |
| 	"forgejo.org/modules/graceful"
 | |
| 	"forgejo.org/modules/log"
 | |
| 	"forgejo.org/modules/process"
 | |
| 	"forgejo.org/modules/setting"
 | |
| 
 | |
| 	"github.com/caddyserver/certmagic"
 | |
| )
 | |
| 
 | |
| func getCARoot(path string) (*x509.CertPool, error) {
 | |
| 	r, err := os.ReadFile(path)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	block, _ := pem.Decode(r)
 | |
| 	if block == nil {
 | |
| 		return nil, fmt.Errorf("no PEM found in the file %s", path)
 | |
| 	}
 | |
| 	caRoot, err := x509.ParseCertificate(block.Bytes)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	certPool := x509.NewCertPool()
 | |
| 	certPool.AddCert(caRoot)
 | |
| 	return certPool, nil
 | |
| }
 | |
| 
 | |
| func runACME(listenAddr string, m http.Handler) error {
 | |
| 	// If HTTP Challenge enabled, needs to be serving on port 80. For TLSALPN needs 443.
 | |
| 	// Due to docker port mapping this can't be checked programmatically
 | |
| 	// TODO: these are placeholders until we add options for each in settings with appropriate warning
 | |
| 	enableHTTPChallenge := true
 | |
| 	enableTLSALPNChallenge := true
 | |
| 	altHTTPPort := 0
 | |
| 	altTLSALPNPort := 0
 | |
| 
 | |
| 	if p, err := strconv.Atoi(setting.PortToRedirect); err == nil {
 | |
| 		altHTTPPort = p
 | |
| 	}
 | |
| 	if p, err := strconv.Atoi(setting.HTTPPort); err == nil {
 | |
| 		altTLSALPNPort = p
 | |
| 	}
 | |
| 
 | |
| 	certmagic.Default.Storage = &certmagic.FileStorage{Path: setting.AcmeLiveDirectory}
 | |
| 
 | |
| 	// Try to use private CA root if provided, otherwise defaults to system's trust
 | |
| 	var certPool *x509.CertPool
 | |
| 	if setting.AcmeCARoot != "" {
 | |
| 		var err error
 | |
| 		certPool, err = getCARoot(setting.AcmeCARoot)
 | |
| 		if err != nil {
 | |
| 			log.Warn("Failed to parse CA Root certificate, using default CA trust: %v", err)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	certmagic.DefaultACME = certmagic.ACMEIssuer{
 | |
| 		CA:                      setting.AcmeURL,
 | |
| 		TrustedRoots:            certPool,
 | |
| 		Email:                   setting.AcmeEmail,
 | |
| 		Agreed:                  setting.AcmeTOS,
 | |
| 		DisableHTTPChallenge:    !enableHTTPChallenge,
 | |
| 		DisableTLSALPNChallenge: !enableTLSALPNChallenge,
 | |
| 		ListenHost:              setting.HTTPAddr,
 | |
| 		AltTLSALPNPort:          altTLSALPNPort,
 | |
| 		AltHTTPPort:             altHTTPPort,
 | |
| 	}
 | |
| 
 | |
| 	magic := certmagic.NewDefault()
 | |
| 
 | |
| 	myACME := certmagic.NewACMEIssuer(magic, certmagic.DefaultACME)
 | |
| 
 | |
| 	magic.Issuers = []certmagic.Issuer{myACME}
 | |
| 
 | |
| 	// this obtains certificates or renews them if necessary
 | |
| 	err := magic.ManageSync(graceful.GetManager().HammerContext(), []string{setting.Domain})
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	tlsConfig := magic.TLSConfig()
 | |
| 	tlsConfig.NextProtos = append(tlsConfig.NextProtos, "h2")
 | |
| 
 | |
| 	if version := toTLSVersion(setting.SSLMinimumVersion); version != 0 {
 | |
| 		tlsConfig.MinVersion = version
 | |
| 	}
 | |
| 	if version := toTLSVersion(setting.SSLMaximumVersion); version != 0 {
 | |
| 		tlsConfig.MaxVersion = version
 | |
| 	}
 | |
| 
 | |
| 	// Set curve preferences
 | |
| 	if curves := toCurvePreferences(setting.SSLCurvePreferences); len(curves) > 0 {
 | |
| 		tlsConfig.CurvePreferences = curves
 | |
| 	}
 | |
| 
 | |
| 	// Set cipher suites
 | |
| 	if ciphers := toTLSCiphers(setting.SSLCipherSuites); len(ciphers) > 0 {
 | |
| 		tlsConfig.CipherSuites = ciphers
 | |
| 	}
 | |
| 
 | |
| 	if enableHTTPChallenge {
 | |
| 		go func() {
 | |
| 			_, _, finished := process.GetManager().AddTypedContext(graceful.GetManager().HammerContext(), "Web: ACME HTTP challenge server", process.SystemProcessType, true)
 | |
| 			defer finished()
 | |
| 
 | |
| 			log.Info("Running Let's Encrypt handler on %s", setting.HTTPAddr+":"+setting.PortToRedirect)
 | |
| 			// all traffic coming into HTTP will be redirect to HTTPS automatically (LE HTTP-01 validation happens here)
 | |
| 			err := runHTTP("tcp", setting.HTTPAddr+":"+setting.PortToRedirect, "Let's Encrypt HTTP Challenge", myACME.HTTPChallengeHandler(http.HandlerFunc(runLetsEncryptFallbackHandler)), setting.RedirectorUseProxyProtocol)
 | |
| 			if err != nil {
 | |
| 				log.Fatal("Failed to start the Let's Encrypt handler on port %s: %v", setting.PortToRedirect, err)
 | |
| 			}
 | |
| 		}()
 | |
| 	}
 | |
| 
 | |
| 	return runHTTPSWithTLSConfig("tcp", listenAddr, "Web", tlsConfig, m, setting.UseProxyProtocol, setting.ProxyProtocolTLSBridging)
 | |
| }
 | |
| 
 | |
| func runLetsEncryptFallbackHandler(w http.ResponseWriter, r *http.Request) {
 | |
| 	if r.Method != "GET" && r.Method != "HEAD" {
 | |
| 		http.Error(w, "Use HTTPS", http.StatusBadRequest)
 | |
| 		return
 | |
| 	}
 | |
| 	// Remove the trailing slash at the end of setting.AppURL, the request
 | |
| 	// URI always contains a leading slash, which would result in a double
 | |
| 	// slash
 | |
| 	target := strings.TrimSuffix(setting.AppURL, "/") + r.URL.RequestURI()
 | |
| 	http.Redirect(w, r, target, http.StatusTemporaryRedirect)
 | |
| }
 |