mirror of
https://github.com/drakkan/sftpgo.git
synced 2024-11-22 15:40:23 +00:00
76c08baaa0
on Windows x509.SystemCertPool is not implemented and therefore we end uo with an empty certificate pool if we load the CA certificates unconditionally
164 lines
5.4 KiB
Go
164 lines
5.4 KiB
Go
package httpclient
|
|
|
|
import (
|
|
"crypto/tls"
|
|
"crypto/x509"
|
|
"fmt"
|
|
"net/http"
|
|
"os"
|
|
"path/filepath"
|
|
"time"
|
|
|
|
"github.com/hashicorp/go-retryablehttp"
|
|
|
|
"github.com/drakkan/sftpgo/logger"
|
|
"github.com/drakkan/sftpgo/utils"
|
|
)
|
|
|
|
// TLSKeyPair defines the paths for a TLS key pair
|
|
type TLSKeyPair struct {
|
|
Cert string `json:"cert" mapstructure:"cert"`
|
|
Key string `json:"key" mapstructure:"key"`
|
|
}
|
|
|
|
// Config defines the configuration for HTTP clients.
|
|
// HTTP clients are used for executing hooks such as the ones used for
|
|
// custom actions, external authentication and pre-login user modifications
|
|
type Config struct {
|
|
// Timeout specifies a time limit, in seconds, for a request
|
|
Timeout int64 `json:"timeout" mapstructure:"timeout"`
|
|
// RetryWaitMin defines the minimum waiting time between attempts in seconds
|
|
RetryWaitMin int `json:"retry_wait_min" mapstructure:"retry_wait_min"`
|
|
// RetryWaitMax defines the minimum waiting time between attempts in seconds
|
|
RetryWaitMax int `json:"retry_wait_max" mapstructure:"retry_wait_max"`
|
|
// RetryMax defines the maximum number of attempts
|
|
RetryMax int `json:"retry_max" mapstructure:"retry_max"`
|
|
// CACertificates defines extra CA certificates to trust.
|
|
// The paths can be absolute or relative to the config dir.
|
|
// Adding trusted CA certificates is a convenient way to use self-signed
|
|
// certificates without defeating the purpose of using TLS
|
|
CACertificates []string `json:"ca_certificates" mapstructure:"ca_certificates"`
|
|
// Certificates defines the certificates to use for mutual TLS
|
|
Certificates []TLSKeyPair `json:"certificates" mapstructure:"certificates"`
|
|
// if enabled the HTTP client accepts any TLS certificate presented by
|
|
// the server and any host name in that certificate.
|
|
// In this mode, TLS is susceptible to man-in-the-middle attacks.
|
|
// This should be used only for testing.
|
|
SkipTLSVerify bool `json:"skip_tls_verify" mapstructure:"skip_tls_verify"`
|
|
customTransport *http.Transport
|
|
tlsConfig *tls.Config
|
|
}
|
|
|
|
const logSender = "httpclient"
|
|
|
|
var httpConfig Config
|
|
|
|
// Initialize configures HTTP clients
|
|
func (c *Config) Initialize(configDir string) error {
|
|
rootCAs, err := c.loadCACerts(configDir)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
customTransport := http.DefaultTransport.(*http.Transport).Clone()
|
|
if customTransport.TLSClientConfig != nil {
|
|
customTransport.TLSClientConfig.RootCAs = rootCAs
|
|
} else {
|
|
customTransport.TLSClientConfig = &tls.Config{
|
|
RootCAs: rootCAs,
|
|
NextProtos: []string{"h2", "http/1.1"},
|
|
}
|
|
}
|
|
customTransport.TLSClientConfig.InsecureSkipVerify = c.SkipTLSVerify
|
|
c.customTransport = customTransport
|
|
c.tlsConfig = customTransport.TLSClientConfig
|
|
|
|
err = c.loadCertificates(configDir)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
httpConfig = *c
|
|
return nil
|
|
}
|
|
|
|
// loadCACerts returns system cert pools and try to add the configured
|
|
// CA certificates to it
|
|
func (c *Config) loadCACerts(configDir string) (*x509.CertPool, error) {
|
|
if len(c.CACertificates) == 0 {
|
|
return nil, nil
|
|
}
|
|
rootCAs, err := x509.SystemCertPool()
|
|
if err != nil {
|
|
rootCAs = x509.NewCertPool()
|
|
}
|
|
|
|
for _, ca := range c.CACertificates {
|
|
if !utils.IsFileInputValid(ca) {
|
|
return nil, fmt.Errorf("unable to load invalid CA certificate: %#v", ca)
|
|
}
|
|
if !filepath.IsAbs(ca) {
|
|
ca = filepath.Join(configDir, ca)
|
|
}
|
|
certs, err := os.ReadFile(ca)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("unable to load CA certificate: %v", err)
|
|
}
|
|
if rootCAs.AppendCertsFromPEM(certs) {
|
|
logger.Debug(logSender, "", "CA certificate %#v added to the trusted certificates", ca)
|
|
} else {
|
|
return nil, fmt.Errorf("unable to add CA certificate %#v to the trusted cetificates", ca)
|
|
}
|
|
}
|
|
return rootCAs, nil
|
|
}
|
|
|
|
func (c *Config) loadCertificates(configDir string) error {
|
|
if len(c.Certificates) == 0 {
|
|
return nil
|
|
}
|
|
|
|
for _, keyPair := range c.Certificates {
|
|
cert := keyPair.Cert
|
|
key := keyPair.Key
|
|
if !utils.IsFileInputValid(cert) {
|
|
return fmt.Errorf("unable to load invalid certificate: %#v", cert)
|
|
}
|
|
if !utils.IsFileInputValid(key) {
|
|
return fmt.Errorf("unable to load invalid key: %#v", key)
|
|
}
|
|
if !filepath.IsAbs(cert) {
|
|
cert = filepath.Join(configDir, cert)
|
|
}
|
|
if !filepath.IsAbs(key) {
|
|
key = filepath.Join(configDir, key)
|
|
}
|
|
tlsCert, err := tls.LoadX509KeyPair(cert, key)
|
|
if err != nil {
|
|
return fmt.Errorf("unable to load key pair %#v, %#v: %v", cert, key, err)
|
|
}
|
|
logger.Debug(logSender, "", "client certificate %#v and key %#v successfully loaded", cert, key)
|
|
c.tlsConfig.Certificates = append(c.tlsConfig.Certificates, tlsCert)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// GetHTTPClient returns an HTTP client with the configured parameters
|
|
func GetHTTPClient() *http.Client {
|
|
return &http.Client{
|
|
Timeout: time.Duration(httpConfig.Timeout) * time.Second,
|
|
Transport: httpConfig.customTransport,
|
|
}
|
|
}
|
|
|
|
// GetRetraybleHTTPClient returns an HTTP client that retry a request on error.
|
|
// It uses the configured retry parameters
|
|
func GetRetraybleHTTPClient() *retryablehttp.Client {
|
|
client := retryablehttp.NewClient()
|
|
client.HTTPClient.Timeout = time.Duration(httpConfig.Timeout) * time.Second
|
|
client.HTTPClient.Transport.(*http.Transport).TLSClientConfig = httpConfig.tlsConfig
|
|
client.Logger = &logger.LeveledLogger{Sender: "RetryableHTTPClient"}
|
|
client.RetryWaitMin = time.Duration(httpConfig.RetryWaitMin) * time.Second
|
|
client.RetryWaitMax = time.Duration(httpConfig.RetryWaitMax) * time.Second
|
|
client.RetryMax = httpConfig.RetryMax
|
|
|
|
return client
|
|
}
|