2022-02-09 14:01:19 +00:00
|
|
|
package start
|
|
|
|
|
|
|
|
import (
|
2022-02-14 16:22:30 +00:00
|
|
|
"context"
|
2022-06-24 12:38:22 +00:00
|
|
|
"crypto/tls"
|
2022-02-09 14:01:19 +00:00
|
|
|
_ "embed"
|
2022-02-14 16:22:30 +00:00
|
|
|
"fmt"
|
2023-05-11 07:24:44 +00:00
|
|
|
"math"
|
2022-02-14 16:22:30 +00:00
|
|
|
"net/http"
|
|
|
|
"os"
|
|
|
|
"os/signal"
|
|
|
|
"syscall"
|
|
|
|
"time"
|
2022-02-09 14:01:19 +00:00
|
|
|
|
2023-02-15 01:52:11 +00:00
|
|
|
clockpkg "github.com/benbjohnson/clock"
|
2023-07-12 17:46:50 +00:00
|
|
|
"github.com/common-nighthawk/go-figure"
|
|
|
|
"github.com/fatih/color"
|
2022-02-14 16:22:30 +00:00
|
|
|
"github.com/gorilla/mux"
|
2022-02-09 14:01:19 +00:00
|
|
|
"github.com/spf13/cobra"
|
2022-02-14 16:22:30 +00:00
|
|
|
"github.com/spf13/viper"
|
2022-04-26 23:01:45 +00:00
|
|
|
"github.com/zitadel/logging"
|
2023-10-19 10:34:00 +00:00
|
|
|
"github.com/zitadel/oidc/v3/pkg/op"
|
2023-04-19 08:46:02 +00:00
|
|
|
"github.com/zitadel/saml/pkg/provider"
|
2022-02-14 16:22:30 +00:00
|
|
|
"golang.org/x/net/http2"
|
|
|
|
"golang.org/x/net/http2/h2c"
|
|
|
|
|
2023-07-12 17:46:50 +00:00
|
|
|
"github.com/zitadel/zitadel/cmd/build"
|
2022-06-27 10:32:34 +00:00
|
|
|
"github.com/zitadel/zitadel/cmd/key"
|
|
|
|
cmd_tls "github.com/zitadel/zitadel/cmd/tls"
|
2023-09-29 08:21:32 +00:00
|
|
|
"github.com/zitadel/zitadel/feature"
|
2023-02-15 01:52:11 +00:00
|
|
|
"github.com/zitadel/zitadel/internal/actions"
|
2022-04-26 23:01:45 +00:00
|
|
|
admin_es "github.com/zitadel/zitadel/internal/admin/repository/eventsourcing"
|
|
|
|
"github.com/zitadel/zitadel/internal/api"
|
|
|
|
"github.com/zitadel/zitadel/internal/api/assets"
|
|
|
|
internal_authz "github.com/zitadel/zitadel/internal/api/authz"
|
|
|
|
"github.com/zitadel/zitadel/internal/api/grpc/admin"
|
|
|
|
"github.com/zitadel/zitadel/internal/api/grpc/auth"
|
|
|
|
"github.com/zitadel/zitadel/internal/api/grpc/management"
|
2023-07-10 13:27:00 +00:00
|
|
|
oidc_v2 "github.com/zitadel/zitadel/internal/api/grpc/oidc/v2"
|
2023-08-11 14:19:14 +00:00
|
|
|
"github.com/zitadel/zitadel/internal/api/grpc/org/v2"
|
2023-04-11 13:37:42 +00:00
|
|
|
"github.com/zitadel/zitadel/internal/api/grpc/session/v2"
|
2023-05-11 09:23:40 +00:00
|
|
|
"github.com/zitadel/zitadel/internal/api/grpc/settings/v2"
|
2022-04-26 23:01:45 +00:00
|
|
|
"github.com/zitadel/zitadel/internal/api/grpc/system"
|
2023-09-29 09:26:14 +00:00
|
|
|
user_v2 "github.com/zitadel/zitadel/internal/api/grpc/user/v2"
|
2022-05-31 11:11:49 +00:00
|
|
|
http_util "github.com/zitadel/zitadel/internal/api/http"
|
2022-04-26 23:01:45 +00:00
|
|
|
"github.com/zitadel/zitadel/internal/api/http/middleware"
|
2023-05-24 18:29:58 +00:00
|
|
|
"github.com/zitadel/zitadel/internal/api/idp"
|
2022-04-26 23:01:45 +00:00
|
|
|
"github.com/zitadel/zitadel/internal/api/oidc"
|
2023-05-05 08:25:02 +00:00
|
|
|
"github.com/zitadel/zitadel/internal/api/robots_txt"
|
2023-02-15 01:52:11 +00:00
|
|
|
"github.com/zitadel/zitadel/internal/api/saml"
|
2022-04-26 23:01:45 +00:00
|
|
|
"github.com/zitadel/zitadel/internal/api/ui/console"
|
|
|
|
"github.com/zitadel/zitadel/internal/api/ui/login"
|
|
|
|
auth_es "github.com/zitadel/zitadel/internal/auth/repository/eventsourcing"
|
|
|
|
"github.com/zitadel/zitadel/internal/authz"
|
|
|
|
authz_repo "github.com/zitadel/zitadel/internal/authz/repository"
|
2023-06-20 16:23:28 +00:00
|
|
|
authz_es "github.com/zitadel/zitadel/internal/authz/repository/eventsourcing/eventstore"
|
2022-04-26 23:01:45 +00:00
|
|
|
"github.com/zitadel/zitadel/internal/command"
|
2023-04-24 17:40:31 +00:00
|
|
|
"github.com/zitadel/zitadel/internal/crypto"
|
2022-04-26 23:01:45 +00:00
|
|
|
cryptoDB "github.com/zitadel/zitadel/internal/crypto/database"
|
|
|
|
"github.com/zitadel/zitadel/internal/database"
|
2023-05-05 15:34:53 +00:00
|
|
|
"github.com/zitadel/zitadel/internal/domain"
|
2022-04-26 23:01:45 +00:00
|
|
|
"github.com/zitadel/zitadel/internal/eventstore"
|
2023-10-19 10:19:10 +00:00
|
|
|
old_es "github.com/zitadel/zitadel/internal/eventstore/repository/sql"
|
|
|
|
new_es "github.com/zitadel/zitadel/internal/eventstore/v3"
|
2022-04-26 23:01:45 +00:00
|
|
|
"github.com/zitadel/zitadel/internal/id"
|
2023-02-15 01:52:11 +00:00
|
|
|
"github.com/zitadel/zitadel/internal/logstore"
|
|
|
|
"github.com/zitadel/zitadel/internal/logstore/emitters/access"
|
|
|
|
"github.com/zitadel/zitadel/internal/logstore/emitters/execution"
|
|
|
|
"github.com/zitadel/zitadel/internal/logstore/emitters/stdout"
|
2023-09-15 14:58:45 +00:00
|
|
|
"github.com/zitadel/zitadel/internal/logstore/record"
|
|
|
|
"github.com/zitadel/zitadel/internal/net"
|
2022-04-26 23:01:45 +00:00
|
|
|
"github.com/zitadel/zitadel/internal/notification"
|
|
|
|
"github.com/zitadel/zitadel/internal/query"
|
|
|
|
"github.com/zitadel/zitadel/internal/static"
|
|
|
|
"github.com/zitadel/zitadel/internal/webauthn"
|
|
|
|
"github.com/zitadel/zitadel/openapi"
|
2022-02-09 14:01:19 +00:00
|
|
|
)
|
|
|
|
|
2023-04-24 17:40:31 +00:00
|
|
|
func New(server chan<- *Server) *cobra.Command {
|
2022-02-14 16:22:30 +00:00
|
|
|
start := &cobra.Command{
|
2022-02-09 14:01:19 +00:00
|
|
|
Use: "start",
|
|
|
|
Short: "starts ZITADEL instance",
|
|
|
|
Long: `starts ZITADEL.
|
|
|
|
Requirements:
|
|
|
|
- cockroachdb`,
|
|
|
|
RunE: func(cmd *cobra.Command, args []string) error {
|
2022-06-24 12:38:22 +00:00
|
|
|
err := cmd_tls.ModeFromFlag(cmd)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2022-03-28 08:05:09 +00:00
|
|
|
config := MustNewConfig(viper.GetViper())
|
2022-04-04 08:10:57 +00:00
|
|
|
masterKey, err := key.MasterKey(cmd)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2022-03-28 08:05:09 +00:00
|
|
|
|
2023-04-24 17:40:31 +00:00
|
|
|
return startZitadel(config, masterKey, server)
|
2022-02-09 14:01:19 +00:00
|
|
|
},
|
|
|
|
}
|
2022-02-14 16:22:30 +00:00
|
|
|
|
2022-03-28 08:05:09 +00:00
|
|
|
startFlags(start)
|
2022-03-14 06:55:09 +00:00
|
|
|
|
2022-02-14 16:22:30 +00:00
|
|
|
return start
|
|
|
|
}
|
|
|
|
|
2023-04-24 17:40:31 +00:00
|
|
|
type Server struct {
|
|
|
|
Config *Config
|
|
|
|
DB *database.DB
|
|
|
|
KeyStorage crypto.KeyStorage
|
|
|
|
Keys *encryptionKeys
|
|
|
|
Eventstore *eventstore.Eventstore
|
|
|
|
Queries *query.Queries
|
|
|
|
AuthzRepo authz_repo.Repository
|
|
|
|
Storage static.Storage
|
|
|
|
Commands *command.Commands
|
|
|
|
Router *mux.Router
|
|
|
|
TLSConfig *tls.Config
|
|
|
|
Shutdown chan<- os.Signal
|
|
|
|
}
|
|
|
|
|
|
|
|
func startZitadel(config *Config, masterKey string, server chan<- *Server) error {
|
2023-07-12 17:46:50 +00:00
|
|
|
showBasicInformation(config)
|
|
|
|
|
2022-02-14 16:22:30 +00:00
|
|
|
ctx := context.Background()
|
|
|
|
|
2023-10-19 10:19:10 +00:00
|
|
|
zitadelDBClient, err := database.Connect(config.Database, false, false)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("cannot start client for projection: %w", err)
|
|
|
|
}
|
|
|
|
esPusherDBClient, err := database.Connect(config.Database, false, true)
|
2022-02-14 16:22:30 +00:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("cannot start client for projection: %w", err)
|
|
|
|
}
|
2022-03-14 06:55:09 +00:00
|
|
|
|
2023-10-19 10:19:10 +00:00
|
|
|
keyStorage, err := cryptoDB.NewKeyStorage(zitadelDBClient, masterKey)
|
2022-03-14 06:55:09 +00:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("cannot start key storage: %w", err)
|
|
|
|
}
|
|
|
|
keys, err := ensureEncryptionKeys(config.EncryptionKeys, keyStorage)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2023-10-19 10:19:10 +00:00
|
|
|
config.Eventstore.Pusher = new_es.NewEventstore(esPusherDBClient)
|
|
|
|
config.Eventstore.Querier = old_es.NewCRDB(zitadelDBClient)
|
|
|
|
eventstoreClient := eventstore.NewEventstore(config.Eventstore)
|
2022-02-16 15:49:17 +00:00
|
|
|
|
2023-05-05 15:34:53 +00:00
|
|
|
sessionTokenVerifier := internal_authz.SessionTokenVerifier(keys.OIDC)
|
|
|
|
|
|
|
|
queries, err := query.StartQueries(
|
|
|
|
ctx,
|
|
|
|
eventstoreClient,
|
2023-10-19 10:19:10 +00:00
|
|
|
zitadelDBClient,
|
2023-05-05 15:34:53 +00:00
|
|
|
config.Projections,
|
|
|
|
config.SystemDefaults,
|
|
|
|
keys.IDPConfig,
|
|
|
|
keys.OTP,
|
|
|
|
keys.OIDC,
|
|
|
|
keys.SAML,
|
|
|
|
config.InternalAuthZ.RolePermissionMappings,
|
|
|
|
sessionTokenVerifier,
|
2023-06-20 16:23:28 +00:00
|
|
|
func(q *query.Queries) domain.PermissionCheck {
|
|
|
|
return func(ctx context.Context, permission, orgID, resourceID string) (err error) {
|
|
|
|
return internal_authz.CheckPermission(ctx, &authz_es.UserMembershipRepo{Queries: q}, config.InternalAuthZ.RolePermissionMappings, permission, orgID, resourceID)
|
|
|
|
}
|
|
|
|
},
|
2023-10-25 11:42:00 +00:00
|
|
|
config.AuditLogRetention,
|
2023-10-19 10:19:10 +00:00
|
|
|
config.SystemAPIUsers,
|
2023-05-05 15:34:53 +00:00
|
|
|
)
|
2022-02-14 16:22:30 +00:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("cannot start queries: %w", err)
|
|
|
|
}
|
|
|
|
|
2023-10-19 10:19:10 +00:00
|
|
|
authZRepo, err := authz.Start(queries, eventstoreClient, zitadelDBClient, keys.OIDC, config.ExternalSecure)
|
2022-02-14 16:22:30 +00:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("error starting authz repo: %w", err)
|
|
|
|
}
|
2023-05-05 15:34:53 +00:00
|
|
|
permissionCheck := func(ctx context.Context, permission, orgID, resourceID string) (err error) {
|
|
|
|
return internal_authz.CheckPermission(ctx, authZRepo, config.InternalAuthZ.RolePermissionMappings, permission, orgID, resourceID)
|
|
|
|
}
|
2022-04-06 06:13:40 +00:00
|
|
|
|
2023-10-19 10:19:10 +00:00
|
|
|
storage, err := config.AssetStorage.NewStorage(zitadelDBClient.DB)
|
2022-04-06 06:13:40 +00:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("cannot start asset storage client: %w", err)
|
|
|
|
}
|
2022-04-25 08:01:17 +00:00
|
|
|
webAuthNConfig := &webauthn.Config{
|
|
|
|
DisplayName: config.WebAuthNName,
|
|
|
|
ExternalSecure: config.ExternalSecure,
|
2022-02-14 16:22:30 +00:00
|
|
|
}
|
2022-04-25 09:16:36 +00:00
|
|
|
commands, err := command.StartCommands(
|
|
|
|
eventstoreClient,
|
|
|
|
config.SystemDefaults,
|
|
|
|
config.InternalAuthZ.RolePermissionMappings,
|
|
|
|
storage,
|
|
|
|
webAuthNConfig,
|
2022-04-28 08:30:41 +00:00
|
|
|
config.ExternalDomain,
|
2022-04-25 09:16:36 +00:00
|
|
|
config.ExternalSecure,
|
|
|
|
config.ExternalPort,
|
|
|
|
keys.IDPConfig,
|
|
|
|
keys.OTP,
|
|
|
|
keys.SMTP,
|
|
|
|
keys.SMS,
|
|
|
|
keys.User,
|
|
|
|
keys.DomainVerification,
|
|
|
|
keys.OIDC,
|
2022-09-12 16:18:08 +00:00
|
|
|
keys.SAML,
|
|
|
|
&http.Client{},
|
2023-05-05 15:34:53 +00:00
|
|
|
permissionCheck,
|
|
|
|
sessionTokenVerifier,
|
2023-07-10 13:27:00 +00:00
|
|
|
config.OIDC.DefaultAccessTokenLifetime,
|
|
|
|
config.OIDC.DefaultRefreshTokenExpiration,
|
|
|
|
config.OIDC.DefaultRefreshTokenIdleExpiration,
|
2023-08-23 08:04:29 +00:00
|
|
|
config.DefaultInstance.SecretGenerators,
|
2022-04-25 09:16:36 +00:00
|
|
|
)
|
2022-02-14 16:22:30 +00:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("cannot start commands: %w", err)
|
|
|
|
}
|
|
|
|
|
2023-02-15 01:52:11 +00:00
|
|
|
clock := clockpkg.New()
|
2023-09-15 14:58:45 +00:00
|
|
|
actionsExecutionStdoutEmitter, err := logstore.NewEmitter[*record.ExecutionLog](ctx, clock, &logstore.EmitterConfig{Enabled: config.LogStore.Execution.Stdout.Enabled}, stdout.NewStdoutEmitter[*record.ExecutionLog]())
|
2023-02-15 01:52:11 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2023-10-19 10:19:10 +00:00
|
|
|
actionsExecutionDBEmitter, err := logstore.NewEmitter[*record.ExecutionLog](ctx, clock, config.Quotas.Execution, execution.NewDatabaseLogStorage(zitadelDBClient, commands, queries))
|
2023-02-15 01:52:11 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2023-09-15 14:58:45 +00:00
|
|
|
actionsLogstoreSvc := logstore.New(queries, actionsExecutionDBEmitter, actionsExecutionStdoutEmitter)
|
2023-02-15 01:52:11 +00:00
|
|
|
actions.SetLogstoreService(actionsLogstoreSvc)
|
|
|
|
|
2023-08-24 09:41:52 +00:00
|
|
|
notification.Start(
|
|
|
|
ctx,
|
|
|
|
config.Projections.Customizations["notifications"],
|
|
|
|
config.Projections.Customizations["notificationsquotas"],
|
|
|
|
config.Projections.Customizations["telemetry"],
|
|
|
|
*config.Telemetry,
|
|
|
|
config.ExternalDomain,
|
|
|
|
config.ExternalPort,
|
|
|
|
config.ExternalSecure,
|
|
|
|
commands,
|
|
|
|
queries,
|
|
|
|
eventstoreClient,
|
|
|
|
config.Login.DefaultOTPEmailURLV2,
|
|
|
|
config.SystemDefaults.Notifications.FileSystemPath,
|
|
|
|
keys.User,
|
|
|
|
keys.SMTP,
|
|
|
|
keys.SMS,
|
|
|
|
)
|
2022-02-14 16:22:30 +00:00
|
|
|
|
|
|
|
router := mux.NewRouter()
|
2022-06-24 12:38:22 +00:00
|
|
|
tlsConfig, err := config.TLS.Config()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2023-05-05 15:34:53 +00:00
|
|
|
err = startAPIs(
|
|
|
|
ctx,
|
|
|
|
clock,
|
|
|
|
router,
|
|
|
|
commands,
|
|
|
|
queries,
|
|
|
|
eventstoreClient,
|
2023-10-19 10:19:10 +00:00
|
|
|
zitadelDBClient,
|
2023-05-05 15:34:53 +00:00
|
|
|
config,
|
|
|
|
storage,
|
|
|
|
authZRepo,
|
|
|
|
keys,
|
|
|
|
permissionCheck,
|
|
|
|
)
|
2022-02-14 16:22:30 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2023-04-24 17:40:31 +00:00
|
|
|
|
|
|
|
shutdown := make(chan os.Signal, 1)
|
|
|
|
signal.Notify(shutdown, os.Interrupt, syscall.SIGTERM)
|
|
|
|
|
|
|
|
if server != nil {
|
|
|
|
server <- &Server{
|
|
|
|
Config: config,
|
2023-10-19 10:19:10 +00:00
|
|
|
DB: zitadelDBClient,
|
2023-04-24 17:40:31 +00:00
|
|
|
KeyStorage: keyStorage,
|
|
|
|
Keys: keys,
|
|
|
|
Eventstore: eventstoreClient,
|
|
|
|
Queries: queries,
|
|
|
|
AuthzRepo: authZRepo,
|
|
|
|
Storage: storage,
|
|
|
|
Commands: commands,
|
|
|
|
Router: router,
|
|
|
|
TLSConfig: tlsConfig,
|
|
|
|
Shutdown: shutdown,
|
|
|
|
}
|
|
|
|
close(server)
|
|
|
|
}
|
|
|
|
|
|
|
|
return listen(ctx, router, config.Port, tlsConfig, shutdown)
|
2022-02-14 16:22:30 +00:00
|
|
|
}
|
|
|
|
|
2023-02-15 01:52:11 +00:00
|
|
|
func startAPIs(
|
|
|
|
ctx context.Context,
|
|
|
|
clock clockpkg.Clock,
|
|
|
|
router *mux.Router,
|
|
|
|
commands *command.Commands,
|
|
|
|
queries *query.Queries,
|
|
|
|
eventstore *eventstore.Eventstore,
|
2023-02-27 21:36:43 +00:00
|
|
|
dbClient *database.DB,
|
2023-02-15 01:52:11 +00:00
|
|
|
config *Config,
|
|
|
|
store static.Storage,
|
|
|
|
authZRepo authz_repo.Repository,
|
|
|
|
keys *encryptionKeys,
|
2023-05-05 15:34:53 +00:00
|
|
|
permissionCheck domain.PermissionCheck,
|
2023-02-15 01:52:11 +00:00
|
|
|
) error {
|
2022-02-14 16:22:30 +00:00
|
|
|
repo := struct {
|
|
|
|
authz_repo.Repository
|
|
|
|
*query.Queries
|
|
|
|
}{
|
|
|
|
authZRepo,
|
|
|
|
queries,
|
|
|
|
}
|
2023-10-25 12:09:15 +00:00
|
|
|
oidcPrefixes := []string{"/.well-known/openid-configuration", "/oidc/v1", "/oauth/v2"}
|
2023-10-10 13:20:53 +00:00
|
|
|
// always set the origin in the context if available in the http headers, no matter for what protocol
|
|
|
|
router.Use(middleware.OriginHandler)
|
2023-10-25 12:09:15 +00:00
|
|
|
// adds used HTTPPathPattern and RequestMethod to context
|
|
|
|
router.Use(middleware.ActivityHandler(append(oidcPrefixes, saml.HandlerPrefix, admin.GatewayPathPrefix(), management.GatewayPathPrefix())))
|
2022-06-24 12:38:22 +00:00
|
|
|
verifier := internal_authz.Start(repo, http_util.BuildHTTP(config.ExternalDomain, config.ExternalPort, config.ExternalSecure), config.SystemAPIUsers)
|
|
|
|
tlsConfig, err := config.TLS.Config()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2023-02-15 01:52:11 +00:00
|
|
|
|
2023-09-15 14:58:45 +00:00
|
|
|
accessStdoutEmitter, err := logstore.NewEmitter[*record.AccessLog](ctx, clock, &logstore.EmitterConfig{Enabled: config.LogStore.Access.Stdout.Enabled}, stdout.NewStdoutEmitter[*record.AccessLog]())
|
2023-02-15 01:52:11 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2023-09-15 14:58:45 +00:00
|
|
|
accessDBEmitter, err := logstore.NewEmitter[*record.AccessLog](ctx, clock, &config.Quotas.Access.EmitterConfig, access.NewDatabaseLogStorage(dbClient, commands, queries))
|
2023-02-15 01:52:11 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2023-09-15 14:58:45 +00:00
|
|
|
accessSvc := logstore.New[*record.AccessLog](queries, accessDBEmitter, accessStdoutEmitter)
|
2023-05-11 07:24:44 +00:00
|
|
|
exhaustedCookieHandler := http_util.NewCookieHandler(
|
|
|
|
http_util.WithUnsecure(),
|
|
|
|
http_util.WithNonHttpOnly(),
|
|
|
|
http_util.WithMaxAge(int(math.Floor(config.Quotas.Access.ExhaustedCookieMaxAge.Seconds()))),
|
|
|
|
)
|
2023-09-15 14:58:45 +00:00
|
|
|
limitingAccessInterceptor := middleware.NewAccessInterceptor(accessSvc, exhaustedCookieHandler, &config.Quotas.Access.AccessConfig)
|
2023-05-15 06:51:02 +00:00
|
|
|
apis, err := api.New(ctx, config.Port, router, queries, verifier, config.InternalAuthZ, tlsConfig, config.HTTP2HostHeader, config.HTTP1HostHeader, limitingAccessInterceptor)
|
2023-04-11 13:37:42 +00:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("error creating api %w", err)
|
|
|
|
}
|
2023-10-19 10:19:10 +00:00
|
|
|
|
|
|
|
config.Auth.Spooler.Client = dbClient
|
|
|
|
config.Auth.Spooler.Eventstore = eventstore
|
|
|
|
authRepo, err := auth_es.Start(ctx, config.Auth, config.SystemDefaults, commands, queries, dbClient, eventstore, keys.OIDC, keys.User)
|
2022-02-14 16:22:30 +00:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("error starting auth repo: %w", err)
|
|
|
|
}
|
2023-10-19 10:19:10 +00:00
|
|
|
|
|
|
|
config.Admin.Spooler.Client = dbClient
|
|
|
|
config.Admin.Spooler.Eventstore = eventstore
|
|
|
|
err = admin_es.Start(ctx, config.Admin, store, dbClient)
|
2022-02-14 16:22:30 +00:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("error starting admin repo: %w", err)
|
|
|
|
}
|
2023-10-19 10:19:10 +00:00
|
|
|
|
|
|
|
if err := apis.RegisterServer(ctx, system.CreateServer(commands, queries, config.Database.DatabaseName(), config.DefaultInstance, config.ExternalDomain)); err != nil {
|
2022-02-14 16:22:30 +00:00
|
|
|
return err
|
|
|
|
}
|
2023-10-19 10:19:10 +00:00
|
|
|
if err := apis.RegisterServer(ctx, admin.CreateServer(config.Database.DatabaseName(), commands, queries, config.SystemDefaults, config.ExternalSecure, keys.User, config.AuditLogRetention)); err != nil {
|
2022-02-14 16:22:30 +00:00
|
|
|
return err
|
|
|
|
}
|
2023-10-25 11:42:00 +00:00
|
|
|
if err := apis.RegisterServer(ctx, management.CreateServer(commands, queries, config.SystemDefaults, keys.User, config.ExternalSecure)); err != nil {
|
2022-04-21 10:37:39 +00:00
|
|
|
return err
|
|
|
|
}
|
2023-10-25 11:42:00 +00:00
|
|
|
if err := apis.RegisterServer(ctx, auth.CreateServer(commands, queries, authRepo, config.SystemDefaults, keys.User, config.ExternalSecure)); err != nil {
|
2022-02-14 16:22:30 +00:00
|
|
|
return err
|
|
|
|
}
|
2023-09-29 09:26:14 +00:00
|
|
|
if err := apis.RegisterService(ctx, user_v2.CreateServer(commands, queries, keys.User, keys.IDPConfig, idp.CallbackURL(config.ExternalSecure), idp.SAMLRootURL(config.ExternalSecure))); err != nil {
|
2023-04-11 13:37:42 +00:00
|
|
|
return err
|
|
|
|
}
|
2023-05-05 15:34:53 +00:00
|
|
|
if err := apis.RegisterService(ctx, session.CreateServer(commands, queries, permissionCheck)); err != nil {
|
2023-04-11 13:37:42 +00:00
|
|
|
return err
|
|
|
|
}
|
2023-07-10 13:27:00 +00:00
|
|
|
|
2023-05-11 09:23:40 +00:00
|
|
|
if err := apis.RegisterService(ctx, settings.CreateServer(commands, queries, config.ExternalSecure)); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2023-08-11 14:19:14 +00:00
|
|
|
if err := apis.RegisterService(ctx, org.CreateServer(commands, queries, permissionCheck)); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2022-05-02 15:26:54 +00:00
|
|
|
instanceInterceptor := middleware.InstanceInterceptor(queries, config.HTTP1HostHeader, login.IgnoreInstanceEndpoints...)
|
2022-08-16 05:04:36 +00:00
|
|
|
assetsCache := middleware.AssetsCacheInterceptor(config.AssetStorage.Cache.MaxAge, config.AssetStorage.Cache.SharedMaxAge)
|
2023-05-11 07:24:44 +00:00
|
|
|
apis.RegisterHandlerOnPrefix(assets.HandlerPrefix, assets.NewHandler(commands, verifier, config.InternalAuthZ, id.SonyFlakeGenerator(), store, queries, middleware.CallDurationHandler, instanceInterceptor.Handler, assetsCache.Handler, limitingAccessInterceptor.Handle))
|
2022-02-14 16:22:30 +00:00
|
|
|
|
2023-05-24 18:29:58 +00:00
|
|
|
apis.RegisterHandlerOnPrefix(idp.HandlerPrefix, idp.NewHandler(commands, queries, keys.IDPConfig, config.ExternalSecure, instanceInterceptor.Handler))
|
|
|
|
|
2023-09-29 09:26:14 +00:00
|
|
|
userAgentInterceptor, err := middleware.NewUserAgentHandler(config.UserAgentCookie, keys.UserAgentCookieKey, id.SonyFlakeGenerator(), config.ExternalSecure, login.EndpointResources, login.EndpointExternalLoginCallbackFormPost, login.EndpointSAMLACS)
|
2022-02-14 16:22:30 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2023-05-05 08:25:02 +00:00
|
|
|
// robots.txt handler
|
|
|
|
robotsTxtHandler, err := robots_txt.Start()
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("unable to start robots txt handler: %w", err)
|
|
|
|
}
|
|
|
|
apis.RegisterHandlerOnPrefix(robots_txt.HandlerPrefix, robotsTxtHandler)
|
|
|
|
|
2023-02-15 01:52:11 +00:00
|
|
|
// TODO: Record openapi access logs?
|
2022-02-14 16:22:30 +00:00
|
|
|
openAPIHandler, err := openapi.Start()
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("unable to start openapi handler: %w", err)
|
|
|
|
}
|
2023-04-11 13:37:42 +00:00
|
|
|
apis.RegisterHandlerOnPrefix(openapi.HandlerPrefix, openAPIHandler)
|
2022-02-14 16:22:30 +00:00
|
|
|
|
2023-09-15 14:58:45 +00:00
|
|
|
oidcProvider, err := oidc.NewProvider(config.OIDC, login.DefaultLoggedOutPath, config.ExternalSecure, commands, queries, authRepo, keys.OIDC, keys.OIDCKey, eventstore, dbClient, userAgentInterceptor, instanceInterceptor.Handler, limitingAccessInterceptor)
|
2022-06-07 08:04:51 +00:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("unable to start oidc provider: %w", err)
|
|
|
|
}
|
2023-10-25 12:09:15 +00:00
|
|
|
apis.RegisterHandlerPrefixes(oidcProvider.HttpHandler(), oidcPrefixes...)
|
2022-06-07 08:04:51 +00:00
|
|
|
|
2023-09-15 14:58:45 +00:00
|
|
|
samlProvider, err := saml.NewProvider(config.SAML, config.ExternalSecure, commands, queries, authRepo, keys.OIDC, keys.SAML, eventstore, dbClient, instanceInterceptor.Handler, userAgentInterceptor, limitingAccessInterceptor)
|
2022-09-12 16:18:08 +00:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("unable to start saml provider: %w", err)
|
|
|
|
}
|
2023-04-11 13:37:42 +00:00
|
|
|
apis.RegisterHandlerOnPrefix(saml.HandlerPrefix, samlProvider.HttpHandler())
|
2022-09-12 16:18:08 +00:00
|
|
|
|
2023-05-15 06:51:02 +00:00
|
|
|
c, err := console.Start(config.Console, config.ExternalSecure, oidcProvider.IssuerFromRequest, middleware.CallDurationHandler, instanceInterceptor.Handler, limitingAccessInterceptor, config.CustomerPortal)
|
2022-02-14 16:22:30 +00:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("unable to start console: %w", err)
|
|
|
|
}
|
2023-04-11 13:37:42 +00:00
|
|
|
apis.RegisterHandlerOnPrefix(console.HandlerPrefix, c)
|
2022-02-14 16:22:30 +00:00
|
|
|
|
2023-09-29 08:21:32 +00:00
|
|
|
l, err := login.CreateLogin(
|
|
|
|
config.Login,
|
|
|
|
commands,
|
|
|
|
queries,
|
|
|
|
authRepo,
|
|
|
|
store,
|
|
|
|
console.HandlerPrefix+"/",
|
|
|
|
op.AuthCallbackURL(oidcProvider),
|
|
|
|
provider.AuthCallbackURL(samlProvider),
|
|
|
|
config.ExternalSecure,
|
|
|
|
userAgentInterceptor,
|
|
|
|
op.NewIssuerInterceptor(oidcProvider.IssuerFromRequest).Handler,
|
|
|
|
provider.NewIssuerInterceptor(samlProvider.IssuerFromRequest).Handler,
|
|
|
|
instanceInterceptor.Handler,
|
|
|
|
assetsCache.Handler,
|
|
|
|
limitingAccessInterceptor.WithoutLimiting().Handle,
|
|
|
|
keys.User,
|
|
|
|
keys.IDPConfig,
|
|
|
|
keys.CSRFCookieKey,
|
|
|
|
feature.NewCheck(eventstore),
|
|
|
|
)
|
2022-02-14 16:22:30 +00:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("unable to start login: %w", err)
|
|
|
|
}
|
2023-04-11 13:37:42 +00:00
|
|
|
apis.RegisterHandlerOnPrefix(login.HandlerPrefix, l.Handler())
|
2023-04-19 08:46:02 +00:00
|
|
|
apis.HandleFunc(login.EndpointDeviceAuth, login.RedirectDeviceAuthToPrefix)
|
2022-02-14 16:22:30 +00:00
|
|
|
|
2023-07-10 13:27:00 +00:00
|
|
|
// After OIDC provider so that the callback endpoint can be used
|
|
|
|
if err := apis.RegisterService(ctx, oidc_v2.CreateServer(commands, queries, oidcProvider, config.ExternalSecure)); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2023-04-11 13:37:42 +00:00
|
|
|
// handle grpc at last to be able to handle the root, because grpc and gateway require a lot of different prefixes
|
|
|
|
apis.RouteGRPC()
|
2022-02-14 16:22:30 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2023-04-24 17:40:31 +00:00
|
|
|
func listen(ctx context.Context, router *mux.Router, port uint16, tlsConfig *tls.Config, shutdown <-chan os.Signal) error {
|
2022-02-14 16:22:30 +00:00
|
|
|
http2Server := &http2.Server{}
|
2022-06-24 12:38:22 +00:00
|
|
|
http1Server := &http.Server{Handler: h2c.NewHandler(router, http2Server), TLSConfig: tlsConfig}
|
2023-05-02 16:24:24 +00:00
|
|
|
|
2023-09-15 14:58:45 +00:00
|
|
|
lc := net.ListenConfig()
|
2023-05-02 16:24:24 +00:00
|
|
|
lis, err := lc.Listen(ctx, "tcp", fmt.Sprintf(":%d", port))
|
2022-02-14 16:22:30 +00:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("tcp listener on %d failed: %w", port, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
errCh := make(chan error)
|
|
|
|
|
|
|
|
go func() {
|
|
|
|
logging.Infof("server is listening on %s", lis.Addr().String())
|
2022-06-24 12:38:22 +00:00
|
|
|
if tlsConfig != nil {
|
|
|
|
//we don't need to pass the files here, because we already initialized the TLS config on the server
|
|
|
|
errCh <- http1Server.ServeTLS(lis, "", "")
|
|
|
|
} else {
|
|
|
|
errCh <- http1Server.Serve(lis)
|
|
|
|
}
|
2022-02-14 16:22:30 +00:00
|
|
|
}()
|
|
|
|
|
|
|
|
select {
|
|
|
|
case err := <-errCh:
|
|
|
|
return fmt.Errorf("error starting server: %w", err)
|
|
|
|
case <-shutdown:
|
|
|
|
ctx, cancel := context.WithTimeout(ctx, 5*time.Second)
|
|
|
|
defer cancel()
|
|
|
|
return shutdownServer(ctx, http1Server)
|
|
|
|
case <-ctx.Done():
|
|
|
|
return shutdownServer(ctx, http1Server)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func shutdownServer(ctx context.Context, server *http.Server) error {
|
|
|
|
err := server.Shutdown(ctx)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("could not shutdown gracefully: %w", err)
|
|
|
|
}
|
|
|
|
logging.New().Info("server shutdown gracefully")
|
|
|
|
return nil
|
|
|
|
}
|
2023-07-12 17:46:50 +00:00
|
|
|
|
|
|
|
func showBasicInformation(startConfig *Config) {
|
2023-07-25 05:12:13 +00:00
|
|
|
fmt.Println(color.MagentaString(figure.NewFigure("ZITADEL", "", true).String()))
|
2023-07-12 17:46:50 +00:00
|
|
|
http := "http"
|
|
|
|
if startConfig.TLS.Enabled || startConfig.ExternalSecure {
|
|
|
|
http = "https"
|
|
|
|
}
|
|
|
|
|
|
|
|
consoleURL := fmt.Sprintf("%s://%s:%v/ui/console\n", http, startConfig.ExternalDomain, startConfig.ExternalPort)
|
|
|
|
healthCheckURL := fmt.Sprintf("%s://%s:%v/debug/healthz\n", http, startConfig.ExternalDomain, startConfig.ExternalPort)
|
|
|
|
|
|
|
|
insecure := !startConfig.TLS.Enabled && !startConfig.ExternalSecure
|
|
|
|
|
|
|
|
fmt.Printf(" ===============================================================\n\n")
|
|
|
|
fmt.Printf(" Version : %s\n", build.Version())
|
|
|
|
fmt.Printf(" TLS enabled : %v\n", startConfig.TLS.Enabled)
|
|
|
|
fmt.Printf(" External Secure : %v\n", startConfig.ExternalSecure)
|
|
|
|
fmt.Printf(" Console URL : %s", color.BlueString(consoleURL))
|
|
|
|
fmt.Printf(" Health Check URL : %s", color.BlueString(healthCheckURL))
|
|
|
|
if insecure {
|
|
|
|
fmt.Printf("\n %s: you're using plain http without TLS. Be aware this is \n", color.RedString("Warning"))
|
|
|
|
fmt.Printf(" not a secure setup and should only be used for test systems. \n")
|
|
|
|
fmt.Printf(" Visit: %s \n", color.CyanString("https://zitadel.com/docs/self-hosting/manage/tls_modes"))
|
|
|
|
}
|
|
|
|
fmt.Printf("\n ===============================================================\n\n")
|
|
|
|
}
|