mirror of
https://github.com/fastenhealth/fasten-onprem.git
synced 2026-02-17 07:28:43 -06:00
* add placeholder stylus version * FO-33 - First version encryption * refactor: Refactor check token logic on FE and BE [FO-33] * FO-33 - Run server without token * FO-33 - Optimization design for setup-token page * FO-33 - First change * FO-33 - Resolve undefined appConfig in handlers * FO-33 - Remove encrypt_db from .gitignore * FO-33 - Use literal string for encryption token * FO-33 - Optimization server and handler * FO-33-SSL - add ssl in dockerfile and app * feat: Improve token wizard flow, add get token component and revamp restore token UI [FO-33] * feat: Add redirect to main page button after token is set [FO-33] * FO-33 - optimization run server * feat: Adjust generate token flow, add mandatory download [FO-33] * FO-33 - Validation token connect db * feat: Improve validate token flow, add test token functionality [FO-33] * FO-33 - fix validate token * FO-33 - optimization when token is wrong * FO-33-SSL - Remove mkcert from dockerfile * FO-33-SSL - ignore only crt and key * chore: remove unused var * chore: remove unused volumes * chore: rename var name * chore: rename funct * chore: refactor encryption-key related components and handlers * chore: revert stylus change * chore: remove unused member * chore: revert exportable field * chore: remove running server in a loop. making appEngine reinitialize logic self-contained * misc: cleanup * misc: cleanup * misc: cleanup * misc: cleanup * chore: adjust tests * chore: rename encryption packege to regular random * chore: rename encryption_key * chore: add opt-out for database encryption option * chore: revert useless changes * chore: refactor encryption-status-guard * chore: cleanup * chore: cleanup * chore: cleanup * chore: cleanup * chore: fix config test * chore: send encryption key as json * fix: resolve client routing issue * fix: bug on updating the state on encryption-key/wizard-restore * fix: adjust backend config validation * chore: revert config tests * misc: cleanup * chore: adjust backend tests * chore: fix backend test * chore: refactor encryption-key/wizard-restore flow * chore: adjust the component with a minimalistic test spec * chore: adjust the look of the get-encryption-key-wizard component * chore: change the look of get-encryption-key-wizard component * chore: make default config database.encryption false * chore: revert Dockerfile changes * chore: revert useless changes * chore: add auto-gen certificates when server runs with https option on * chore: adjust ng-cli dev mode options * chore: adjust ng-cli dev options * chore: mount shared certs folder in docker compose * docs: update launching docs * chore: put rootCA-key.pem into shared dir * fix: adjust get-encryption-key component * chore: define clear stanby flag for the server. refactor frontend flow arround the flag * fix: clean broken deps * fix: log messages * fix: encryption-status guard logic * chore: adjust tls-related info * chore: misc --------- Co-authored-by: Mihai Pop @ TSA <hello@techstackapps.com>
487 lines
16 KiB
Go
487 lines
16 KiB
Go
package web
|
|
|
|
import (
|
|
"bytes"
|
|
"context"
|
|
"embed"
|
|
"encoding/json"
|
|
"fmt"
|
|
"io"
|
|
"net/http"
|
|
"runtime"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/fastenhealth/fasten-onprem/backend/pkg"
|
|
"github.com/fastenhealth/fasten-onprem/backend/pkg/config"
|
|
"github.com/fastenhealth/fasten-onprem/backend/pkg/database"
|
|
"github.com/fastenhealth/fasten-onprem/backend/pkg/event_bus"
|
|
"github.com/fastenhealth/fasten-onprem/backend/pkg/models"
|
|
"github.com/fastenhealth/fasten-onprem/backend/pkg/tls"
|
|
"github.com/fastenhealth/fasten-onprem/backend/pkg/web/handler"
|
|
"github.com/fastenhealth/fasten-onprem/backend/pkg/web/middleware"
|
|
"github.com/gin-gonic/gin"
|
|
"github.com/sirupsen/logrus"
|
|
"os"
|
|
)
|
|
|
|
type AppEngine struct {
|
|
Config config.Interface
|
|
Logger *logrus.Entry
|
|
EventBus event_bus.Interface
|
|
deviceRepo database.DatabaseRepository
|
|
StandbyMode bool
|
|
|
|
RelatedVersions map[string]string //related versions metadata provided & embedded by the build process
|
|
Srv *http.Server // Added to manage the HTTP server lifecycle
|
|
}
|
|
|
|
// Reinitialize re-initializes the AppEngine's components, specifically the database and routes.
|
|
func (ae *AppEngine) Reinitialize() error {
|
|
ae.Logger.Info("Reinitializing AppEngine...")
|
|
|
|
// Shutdown existing server if it's running
|
|
if ae.Srv != nil {
|
|
ctx, cancel := context.WithTimeout(context.Background(), 5*time.Second)
|
|
defer cancel()
|
|
if err := ae.Srv.Shutdown(ctx); err != nil {
|
|
ae.Logger.Errorf("Error shutting down existing server: %v", err)
|
|
return err
|
|
}
|
|
ae.Logger.Info("Existing server shut down.")
|
|
}
|
|
|
|
if err := ae.initializeDatabase(); err != nil {
|
|
return err
|
|
}
|
|
|
|
// Re-setup routes
|
|
baseRouterGroup, ginRouter := ae.Setup()
|
|
ae.SetupFrontendRouting(baseRouterGroup, ginRouter)
|
|
|
|
ae.startServer(ginRouter)
|
|
|
|
ae.Logger.Info("AppEngine reinitialized and server restarted.")
|
|
return nil
|
|
}
|
|
|
|
func (ae *AppEngine) Setup() (*gin.RouterGroup, *gin.Engine) {
|
|
r := gin.New()
|
|
|
|
if !ae.StandbyMode {
|
|
r.Use(middleware.RepositoryMiddleware(ae.deviceRepo))
|
|
}
|
|
r.Use(middleware.LoggerMiddleware(ae.Logger))
|
|
r.Use(middleware.ConfigMiddleware(ae.Config))
|
|
r.Use(middleware.EventBusMiddleware(ae.EventBus))
|
|
r.Use(gin.Recovery())
|
|
|
|
basePath := ae.Config.GetString("web.listen.basepath")
|
|
ae.Logger.Debugf("basepath: %s", basePath)
|
|
|
|
base := r.Group(basePath)
|
|
{
|
|
api := base.Group("/api")
|
|
{
|
|
api.GET("/health", func(c *gin.Context) {
|
|
// This function does a quick check to see if the server is up and running
|
|
// it will also determine if we should show the first run wizard
|
|
|
|
firstRunWizard := false
|
|
|
|
if ae.StandbyMode {
|
|
dbPath := ae.Config.GetString("database.location")
|
|
_, err := os.Stat(dbPath)
|
|
if os.IsNotExist(err) {
|
|
firstRunWizard = true
|
|
}
|
|
|
|
c.JSON(http.StatusOK, gin.H{
|
|
"success": true,
|
|
"data": gin.H{
|
|
"first_run_wizard": firstRunWizard,
|
|
"standby_mode": true,
|
|
},
|
|
})
|
|
return
|
|
}
|
|
|
|
//get the count of users in the DB
|
|
databaseRepo := c.MustGet(pkg.ContextKeyTypeDatabase).(database.DatabaseRepository)
|
|
userCount, err := databaseRepo.GetUserCount(c)
|
|
if err != nil {
|
|
c.JSON(http.StatusInternalServerError, gin.H{"success": false})
|
|
return
|
|
}
|
|
|
|
keepAliveMsg := models.NewEventKeepAlive("heartbeat")
|
|
err = ae.EventBus.PublishMessage(keepAliveMsg)
|
|
if err != nil {
|
|
c.JSON(http.StatusInternalServerError, gin.H{"success": false})
|
|
return
|
|
}
|
|
firstRunWizard = userCount == 0
|
|
|
|
c.JSON(http.StatusOK, gin.H{
|
|
"success": true,
|
|
"data": gin.H{
|
|
"first_run_wizard": firstRunWizard,
|
|
"standby_mode": false,
|
|
},
|
|
})
|
|
})
|
|
|
|
// In standby mode, we only want to expose the encryption key setup endpoints
|
|
if ae.StandbyMode {
|
|
encryptionKeyHandler := handler.NewEncryptionKeyHandler(ae.Config, ae.Logger, ae)
|
|
// initial encryption key setup
|
|
api.GET("/encryption-key", encryptionKeyHandler.GetEncryptionKey)
|
|
|
|
// encryption key restore
|
|
api.POST("/encryption-key", encryptionKeyHandler.SetEncryptionKey)
|
|
api.POST("/encryption-key/validate", encryptionKeyHandler.ValidateEncryptionKey)
|
|
} else {
|
|
ae.Logger.Info("Database StandbyMode is off, skipping encryption key setup endpoints.")
|
|
}
|
|
|
|
if !ae.StandbyMode { // Check ae.StandbyMode for non-standby mode
|
|
api.Use(middleware.CacheMiddleware())
|
|
api.POST("/auth/signup", handler.AuthSignup)
|
|
api.POST("/auth/signin", handler.AuthSignin)
|
|
|
|
//whitelisted CORS PROXY
|
|
api.GET("/cors/:endpointId/*proxyPath", handler.CORSProxy)
|
|
api.POST("/cors/:endpointId/*proxyPath", handler.CORSProxy)
|
|
api.OPTIONS("/cors/:endpointId/*proxyPath", handler.CORSProxy)
|
|
|
|
api.GET("/glossary/code", handler.GlossarySearchByCode)
|
|
api.POST("/support/request", handler.SupportRequest)
|
|
api.POST("/support/healthsystem", handler.HealthSystemRequest)
|
|
|
|
secure := api.Group("/secure").Use(middleware.RequireAuth())
|
|
{
|
|
secure.GET("/account/me", handler.GetCurrentUser)
|
|
secure.DELETE("/account/me", handler.DeleteAccount)
|
|
|
|
secure.GET("/summary", handler.GetSummary)
|
|
secure.GET("/summary/ips", handler.GetIPSSummary)
|
|
|
|
secure.POST("/source", handler.CreateReconnectSource)
|
|
secure.POST("/source/manual", handler.CreateManualSource)
|
|
secure.GET("/source", handler.ListSource)
|
|
secure.GET("/source/:sourceId", handler.GetSource)
|
|
secure.DELETE("/source/:sourceId", handler.DeleteSource)
|
|
secure.POST("/source/:sourceId/sync", handler.SourceSync)
|
|
secure.GET("/source/:sourceId/summary", handler.GetSourceSummary)
|
|
secure.GET("/resource/fhir", handler.ListResourceFhir)
|
|
secure.POST("/resource/graph/:graphType", handler.GetResourceFhirGraph)
|
|
secure.GET("/resource/fhir/:sourceId/:resourceId", handler.GetResourceFhir)
|
|
secure.PATCH("/resource/fhir/:resourceType/:resourceId", handler.UpdateResourceFhir)
|
|
secure.DELETE("/resource/fhir/:resourceType/:resourceId", handler.DeleteResourceFhir)
|
|
|
|
secure.POST("/resource/composition", handler.CreateResourceComposition)
|
|
secure.POST("/resource/related", handler.CreateRelatedResources)
|
|
secure.DELETE("/encounter/:encounterId/related/:resourceType/:resourceId", handler.EncounterUnlinkResource)
|
|
|
|
secure.GET("/dashboards", handler.GetDashboard)
|
|
secure.POST("/dashboards", handler.AddDashboardLocation)
|
|
//secure.GET("/dashboard/:dashboardId", handler.GetDashboard)
|
|
|
|
secure.GET("/jobs", handler.ListBackgroundJobs)
|
|
secure.POST("/jobs/error", handler.CreateBackgroundJobError)
|
|
|
|
secure.POST("/query", handler.QueryResourceFhir)
|
|
|
|
secure.GET("/users", handler.GetUsers)
|
|
secure.POST("/users", handler.CreateUser)
|
|
|
|
secure.POST("/practitioners", handler.CreatePractitioner)
|
|
secure.PUT("/practitioners/:practitionerId", handler.UpdatePractitioner)
|
|
secure.GET("/practitioners/:practitionerId/history", handler.GetPractitionerEncounterHistory)
|
|
|
|
// Address book favorite actions
|
|
secure.POST("/user/favorites", handler.AddPractitionerToFavorites)
|
|
secure.DELETE("/user/favorites", handler.RemovePractitionerFromFavorites)
|
|
secure.GET("/user/favorites", handler.GetUserFavoritePractitioners)
|
|
|
|
// Access token management
|
|
secure.GET("/access/token", handler.GetAccessTokens)
|
|
secure.POST("/access/token", handler.CreateAccessToken)
|
|
secure.DELETE("/access/token", handler.DeleteAccessToken)
|
|
|
|
secure.GET("/sync/discovery", handler.GetServerDiscovery)
|
|
|
|
//server-side-events handler (only supported on mac/linux)
|
|
// TODO: causes deadlock on Windows
|
|
if runtime.GOOS != "windows" {
|
|
secure.GET("/events/stream",
|
|
middleware.SSEHeaderMiddleware(),
|
|
handler.SSEEventBusServerHandler(ae.EventBus),
|
|
)
|
|
}
|
|
}
|
|
}
|
|
|
|
if ae.Config.GetBool("web.allow_unsafe_endpoints") {
|
|
//this endpoint lets us request data directly from the source api
|
|
ae.Logger.Warningln("***UNSAFE***")
|
|
ae.Logger.Warningln("***UNSAFE***")
|
|
ae.Logger.Warningln("***UNSAFE***")
|
|
ae.Logger.Warningln("***UNSAFE***")
|
|
ae.Logger.Warningln("***UNSAFE***")
|
|
ae.Logger.Warningf("\"web.allow_unsafe_endpoints\" mode enabled!! This enables developer functionality, including unauthenticated raw api requests")
|
|
ae.Logger.Warningln("***UNSAFE***")
|
|
ae.Logger.Warningln("***UNSAFE***")
|
|
ae.Logger.Warningln("***UNSAFE***")
|
|
ae.Logger.Warningln("***UNSAFE***")
|
|
ae.Logger.Warningln("***UNSAFE***")
|
|
unsafe := api.Group("/unsafe")
|
|
{
|
|
//http://localhost:9090/api/unsafe/testuser1/3508f8cf-6eb9-4e4b-8174-dd69a493a2b4/Patient/smart-1288992
|
|
unsafe.GET("/:username/:sourceId/*path", handler.UnsafeRequestSource)
|
|
unsafe.GET("/:username/graph/:graphType", handler.UnsafeResourceGraph)
|
|
unsafe.GET("/:username/sync/:sourceId", handler.UnsafeSyncResourceNames)
|
|
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
return base, r
|
|
}
|
|
|
|
func (ae *AppEngine) SetupFrontendRouting(base *gin.RouterGroup, router *gin.Engine) *gin.Engine {
|
|
//Static request routing
|
|
base.StaticFS("/web", http.Dir(ae.Config.GetString("web.src.frontend.path")))
|
|
|
|
//redirect base url to /web
|
|
base.GET("/", func(c *gin.Context) {
|
|
c.Redirect(http.StatusFound, ae.Config.GetString("web.listen.basepath")+"/web")
|
|
})
|
|
|
|
//catch-all, serve index page.
|
|
router.NoRoute(func(c *gin.Context) {
|
|
path := c.Request.URL.Path
|
|
if strings.HasPrefix(path, "/api") {
|
|
c.JSON(http.StatusNotFound, gin.H{"success": false, "error": "404 endpoint not found"})
|
|
} else {
|
|
c.File(fmt.Sprintf("%s/index.html", ae.Config.GetString("web.src.frontend.path")))
|
|
}
|
|
})
|
|
return router
|
|
}
|
|
|
|
func (ae *AppEngine) SetupEmbeddedFrontendRouting(embeddedAssetsFS embed.FS, base *gin.RouterGroup, router *gin.Engine) *gin.Engine {
|
|
//Static request routing
|
|
base.StaticFS("/web", http.FS(embeddedAssetsFS))
|
|
|
|
//redirect base url to /web
|
|
base.GET("/", func(c *gin.Context) {
|
|
c.Redirect(http.StatusFound, ae.Config.GetString("web.listen.basepath")+"/web")
|
|
})
|
|
|
|
//catch-all, serve index page.
|
|
router.NoRoute(func(c *gin.Context) {
|
|
path := c.Request.URL.Path
|
|
if strings.HasPrefix(path, "/api") {
|
|
c.JSON(http.StatusNotFound, gin.H{"success": false, "error": "404 endpoint not found"})
|
|
} else {
|
|
ae.Logger.Infof("could not find %s, fallback to index.html", path)
|
|
c.FileFromFS("index.html", http.FS(embeddedAssetsFS))
|
|
}
|
|
})
|
|
return router
|
|
}
|
|
|
|
func (ae *AppEngine) SetupInstallationRegistration() error {
|
|
//check if installation is already registered
|
|
systemSettings, err := ae.deviceRepo.LoadSystemSettings(context.Background())
|
|
if err != nil {
|
|
return fmt.Errorf("an error occurred while loading system settings: %s", err)
|
|
}
|
|
|
|
if systemSettings.InstallationID != "" && systemSettings.InstallationSecret != "" {
|
|
//already setup, exit
|
|
//TODO: future, update fasten-onprem, fasten-sources version
|
|
return nil
|
|
}
|
|
|
|
//setup the installation registration payload
|
|
registrationData := &models.InstallationRegistrationRequest{
|
|
SoftwareArchitecture: runtime.GOARCH,
|
|
SoftwareOS: runtime.GOOS,
|
|
}
|
|
|
|
if ae.RelatedVersions != nil {
|
|
if fastenSourcesVersion, fastenSourcesVersionOk := ae.RelatedVersions["sources"]; fastenSourcesVersionOk {
|
|
registrationData.FastenSourcesVersion = fastenSourcesVersion
|
|
}
|
|
if fastenOnpremVersion, fastenOnpremVersionOk := ae.RelatedVersions["onprem"]; fastenOnpremVersionOk {
|
|
registrationData.FastenOnpremVersion = fastenOnpremVersion
|
|
}
|
|
if fastenDesktopVersion, fastenDesktopVersionOk := ae.RelatedVersions["desktop"]; fastenDesktopVersionOk {
|
|
registrationData.FastenDesktopVersion = fastenDesktopVersion
|
|
}
|
|
}
|
|
|
|
//setup the http request
|
|
registrationDataJson, err := json.Marshal(registrationData)
|
|
if err != nil {
|
|
return fmt.Errorf("an error occurred while serializing installation registration data: %s", err)
|
|
}
|
|
|
|
//send the registration request
|
|
resp, err := http.Post(
|
|
"https://api.platform.fastenhealth.com/v1/installation/register",
|
|
"application/json",
|
|
bytes.NewBuffer(registrationDataJson),
|
|
)
|
|
if err != nil {
|
|
return fmt.Errorf("an error occurred while sending installation registration request: %s", err)
|
|
} else if resp.StatusCode != http.StatusOK {
|
|
return fmt.Errorf("an error occurred while sending installation registration request: %s", resp.Status)
|
|
}
|
|
defer resp.Body.Close()
|
|
|
|
//unmarshal the registration response
|
|
bodyBytes, err := io.ReadAll(resp.Body)
|
|
if err != nil {
|
|
return fmt.Errorf("an error occurred while reading installation registration response: %s", err)
|
|
}
|
|
var registrationResponse models.ResponseWrapperTyped[models.InstallationRegistrationResponse]
|
|
err = json.Unmarshal(bodyBytes, ®istrationResponse)
|
|
if err != nil {
|
|
return fmt.Errorf("an error occurred while unmarshalling installation registration response: %s", err)
|
|
}
|
|
|
|
//now that we have the registration response, store the registration data in the system settings
|
|
systemSettings.InstallationID = registrationResponse.Data.InstallationID
|
|
systemSettings.InstallationSecret = registrationResponse.Data.InstallationSecret
|
|
|
|
ae.Logger.Infof("Saving installation id to settings table: %s", systemSettings.InstallationID)
|
|
|
|
//save the system settings
|
|
err = ae.deviceRepo.SaveSystemSettings(context.Background(), systemSettings)
|
|
if err != nil {
|
|
return fmt.Errorf("an error occurred while saving system settings: %s", err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (ae *AppEngine) Start() error {
|
|
//set the gin mode
|
|
gin.SetMode(gin.ReleaseMode)
|
|
if strings.ToLower(ae.Config.GetString("log.level")) == "debug" {
|
|
gin.SetMode(gin.DebugMode)
|
|
}
|
|
|
|
if err := ae.initializeDatabase(); err != nil {
|
|
return err
|
|
}
|
|
|
|
baseRouterGroup, ginRouter := ae.Setup()
|
|
|
|
// Only setup installation registration if not in StandbyMode
|
|
if !ae.StandbyMode {
|
|
err := ae.SetupInstallationRegistration()
|
|
if err != nil {
|
|
ae.Logger.Panicf("panic occurred:%v", err)
|
|
}
|
|
} else {
|
|
ae.Logger.Warn("Skipping SetupInstallationRegistration because in StandbyMode")
|
|
}
|
|
|
|
r := ae.SetupFrontendRouting(baseRouterGroup, ginRouter)
|
|
|
|
if ae.Config.GetBool("web.listen.https.enabled") {
|
|
certFile, keyFile, err := ae.setupTLS()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
ae.Config.Set("web.listen.https.certFile", certFile)
|
|
ae.Config.Set("web.listen.https.keyFile", keyFile)
|
|
}
|
|
|
|
ae.startServer(r)
|
|
|
|
// Block indefinitely to keep the server running until process termination
|
|
select {}
|
|
}
|
|
|
|
func (ae *AppEngine) startServer(r *gin.Engine) {
|
|
host := ae.Config.GetString("web.listen.host")
|
|
port := ae.Config.GetString("web.listen.port")
|
|
listenAddr := fmt.Sprintf("%s:%s", host, port)
|
|
|
|
ae.Srv = &http.Server{
|
|
Addr: listenAddr,
|
|
Handler: r,
|
|
}
|
|
|
|
go func() {
|
|
if ae.Config.GetBool("web.listen.https.enabled") {
|
|
certFile := ae.Config.GetString("web.listen.https.certFile")
|
|
keyFile := ae.Config.GetString("web.listen.https.keyFile")
|
|
|
|
ae.Logger.Infof("Using HTTPS cert: %s", certFile)
|
|
ae.Logger.Infof("Using HTTPS key: %s", keyFile)
|
|
|
|
if err := ae.Srv.ListenAndServeTLS(certFile, keyFile); err != nil && err != http.ErrServerClosed {
|
|
ae.Logger.Fatalf("listen TLS: %s\n", err)
|
|
}
|
|
} else {
|
|
if err := ae.Srv.ListenAndServe(); err != nil && err != http.ErrServerClosed {
|
|
ae.Logger.Fatalf("listen: %s\n", err)
|
|
}
|
|
}
|
|
}()
|
|
}
|
|
|
|
func (ae *AppEngine) initializeDatabase() error {
|
|
encryptionEnabled := ae.Config.GetBool("database.encryption.enabled")
|
|
encryptionKey := ae.Config.GetString("database.encryption.key")
|
|
|
|
if encryptionEnabled && encryptionKey == "" {
|
|
ae.Logger.Warningf("Encryption key is missing. Starting in STANDBY mode.")
|
|
ae.StandbyMode = true
|
|
// In standby mode, deviceRepo remains nil
|
|
return nil
|
|
}
|
|
|
|
ae.StandbyMode = false
|
|
|
|
// Initialize database if not in standby mode or encryption is disabled
|
|
if encryptionEnabled {
|
|
ae.Logger.Info("Encryption key found. Initializing database.")
|
|
} else {
|
|
ae.Logger.Info("Database encryption is disabled. Initializing database without encryption.")
|
|
}
|
|
|
|
dbRepo, err := database.NewRepository(ae.Config, ae.Logger, ae.EventBus)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to initialize database repository: %w", err)
|
|
}
|
|
ae.deviceRepo = dbRepo
|
|
|
|
return nil
|
|
}
|
|
|
|
func (ae *AppEngine) setupTLS() (string, string, error) {
|
|
certDir := ae.Config.GetString("web.listen.https.certDir")
|
|
if certDir == "" {
|
|
certDir = "certs" // Default certificate directory for server certs and all keys
|
|
}
|
|
sharedDir := ae.Config.GetString("web.listen.https.sharedDir")
|
|
if sharedDir == "" {
|
|
sharedDir = "certs/shared" // Default shared directory for root CA public cert
|
|
}
|
|
|
|
ae.Logger.Infof("Ensuring TLS certificates in: %s", certDir)
|
|
ae.Logger.Infof("Ensuring TLS shared certificates in: %s", sharedDir)
|
|
certFile, keyFile, err := tls.GenerateCertificates(certDir, sharedDir, ae.Logger)
|
|
if err != nil {
|
|
return "", "", fmt.Errorf("failed to setup TLS certificates: %w", err)
|
|
}
|
|
return certFile, keyFile, nil
|
|
}
|