mirror of
https://github.com/opencloud-eu/opencloud.git
synced 2026-01-02 02:11:18 -06:00
67 lines
1.7 KiB
Go
67 lines
1.7 KiB
Go
package http
|
|
|
|
import (
|
|
"crypto/tls"
|
|
"os"
|
|
|
|
svc "github.com/owncloud/ocis/ocis-pkg/service/http"
|
|
"github.com/owncloud/ocis/proxy/pkg/crypto"
|
|
)
|
|
|
|
// Server initializes the http service and server.
|
|
func Server(opts ...Option) (svc.Service, error) {
|
|
options := newOptions(opts...)
|
|
l := options.Logger
|
|
httpCfg := options.Config.HTTP
|
|
|
|
var cer tls.Certificate
|
|
var certErr error
|
|
|
|
var tlsConfig *tls.Config
|
|
if options.Config.HTTP.TLS {
|
|
if httpCfg.TLSCert == "" || httpCfg.TLSKey == "" {
|
|
l.Warn().Msgf("No tls certificate provided, using a generated one")
|
|
_, certErr := os.Stat("./server.crt")
|
|
_, keyErr := os.Stat("./server.key")
|
|
|
|
if os.IsNotExist(certErr) || os.IsNotExist(keyErr) {
|
|
// GenCert has side effects as it writes 2 files to the binary running location
|
|
if err := crypto.GenCert(l); err != nil {
|
|
l.Fatal().Err(err).Msgf("Could not generate test-certificate")
|
|
os.Exit(1)
|
|
}
|
|
}
|
|
|
|
httpCfg.TLSCert = "server.crt"
|
|
httpCfg.TLSKey = "server.key"
|
|
}
|
|
|
|
cer, certErr = tls.LoadX509KeyPair(httpCfg.TLSCert, httpCfg.TLSKey)
|
|
if certErr != nil {
|
|
options.Logger.Fatal().Err(certErr).Msg("Could not setup TLS")
|
|
os.Exit(1)
|
|
}
|
|
|
|
tlsConfig = &tls.Config{Certificates: []tls.Certificate{cer}}
|
|
}
|
|
chain := options.Middlewares.Then(options.Handler)
|
|
|
|
service := svc.NewService(
|
|
svc.Name(options.Config.Service.Name),
|
|
svc.TLSConfig(tlsConfig),
|
|
svc.Logger(options.Logger),
|
|
svc.Namespace(options.Config.Service.Namespace),
|
|
svc.Version(options.Config.Service.Version),
|
|
svc.Address(options.Config.HTTP.Addr),
|
|
svc.Context(options.Context),
|
|
svc.Flags(options.Flags...),
|
|
svc.Handler(chain),
|
|
)
|
|
|
|
if err := service.Init(); err != nil {
|
|
l.Fatal().Err(err).Msgf("Error initializing")
|
|
}
|
|
|
|
return service, nil
|
|
}
|