158 lines
4.4 KiB
Go
158 lines
4.4 KiB
Go
package main
|
|
|
|
import (
|
|
"flag"
|
|
"fmt"
|
|
"net/http"
|
|
"os"
|
|
|
|
"github.com/facebookgo/httpdown"
|
|
"github.com/jmhodges/clock"
|
|
|
|
"github.com/letsencrypt/boulder/cmd"
|
|
"github.com/letsencrypt/boulder/core"
|
|
"github.com/letsencrypt/boulder/features"
|
|
"github.com/letsencrypt/boulder/goodkey"
|
|
bgrpc "github.com/letsencrypt/boulder/grpc"
|
|
blog "github.com/letsencrypt/boulder/log"
|
|
"github.com/letsencrypt/boulder/metrics"
|
|
rapb "github.com/letsencrypt/boulder/ra/proto"
|
|
"github.com/letsencrypt/boulder/rpc"
|
|
"github.com/letsencrypt/boulder/wfe"
|
|
)
|
|
|
|
const clientName = "WFE"
|
|
|
|
type config struct {
|
|
WFE struct {
|
|
cmd.ServiceConfig
|
|
BaseURL string
|
|
ListenAddress string
|
|
|
|
AllowOrigins []string
|
|
|
|
CertCacheDuration cmd.ConfigDuration
|
|
CertNoCacheExpirationWindow cmd.ConfigDuration
|
|
IndexCacheDuration cmd.ConfigDuration
|
|
IssuerCacheDuration cmd.ConfigDuration
|
|
|
|
ShutdownStopTimeout cmd.ConfigDuration
|
|
ShutdownKillTimeout cmd.ConfigDuration
|
|
|
|
SubscriberAgreementURL string
|
|
|
|
AcceptRevocationReason bool
|
|
AllowAuthzDeactivation bool
|
|
|
|
RAService *cmd.GRPCClientConfig
|
|
|
|
Features map[string]bool
|
|
}
|
|
|
|
Statsd cmd.StatsdConfig
|
|
|
|
SubscriberAgreementURL string
|
|
|
|
Syslog cmd.SyslogConfig
|
|
|
|
Common struct {
|
|
BaseURL string
|
|
IssuerCert string
|
|
}
|
|
}
|
|
|
|
func setupWFE(c config, logger blog.Logger, stats metrics.Scope) (core.RegistrationAuthority, *rpc.StorageAuthorityClient) {
|
|
amqpConf := c.WFE.AMQP
|
|
var rac core.RegistrationAuthority
|
|
if c.WFE.RAService != nil {
|
|
conn, err := bgrpc.ClientSetup(c.WFE.RAService, stats)
|
|
cmd.FailOnError(err, "Failed to load credentials and create gRPC connection to RA")
|
|
rac = bgrpc.NewRegistrationAuthorityClient(rapb.NewRegistrationAuthorityClient(conn), c.WFE.RAService.Timeout.Duration)
|
|
} else {
|
|
var err error
|
|
rac, err = rpc.NewRegistrationAuthorityClient(clientName, amqpConf, stats)
|
|
cmd.FailOnError(err, "Unable to create RA AMQP client")
|
|
}
|
|
|
|
sac, err := rpc.NewStorageAuthorityClient(clientName, amqpConf, stats)
|
|
cmd.FailOnError(err, "Unable to create SA client")
|
|
|
|
return rac, sac
|
|
}
|
|
|
|
func main() {
|
|
configFile := flag.String("config", "", "File path to the configuration file for this service")
|
|
flag.Parse()
|
|
if *configFile == "" {
|
|
flag.Usage()
|
|
os.Exit(1)
|
|
}
|
|
|
|
var c config
|
|
err := cmd.ReadConfigFile(*configFile, &c)
|
|
cmd.FailOnError(err, "Reading JSON config file into config structure")
|
|
|
|
err = features.Set(c.WFE.Features)
|
|
cmd.FailOnError(err, "Failed to set feature flags")
|
|
|
|
stats, logger := cmd.StatsAndLogging(c.Statsd, c.Syslog)
|
|
scope := metrics.NewStatsdScope(stats, "WFE")
|
|
defer logger.AuditPanic()
|
|
logger.Info(cmd.VersionString(clientName))
|
|
|
|
wfe, err := wfe.NewWebFrontEndImpl(scope, clock.Default(), goodkey.NewKeyPolicy(), logger)
|
|
cmd.FailOnError(err, "Unable to create WFE")
|
|
rac, sac := setupWFE(c, logger, scope)
|
|
wfe.RA = rac
|
|
wfe.SA = sac
|
|
|
|
// TODO: remove this check once the production config uses the SubscriberAgreementURL in the wfe section
|
|
if c.WFE.SubscriberAgreementURL != "" {
|
|
wfe.SubscriberAgreementURL = c.WFE.SubscriberAgreementURL
|
|
} else {
|
|
wfe.SubscriberAgreementURL = c.SubscriberAgreementURL
|
|
}
|
|
|
|
wfe.AllowOrigins = c.WFE.AllowOrigins
|
|
wfe.AcceptRevocationReason = c.WFE.AcceptRevocationReason
|
|
wfe.AllowAuthzDeactivation = c.WFE.AllowAuthzDeactivation
|
|
|
|
wfe.CertCacheDuration = c.WFE.CertCacheDuration.Duration
|
|
wfe.CertNoCacheExpirationWindow = c.WFE.CertNoCacheExpirationWindow.Duration
|
|
wfe.IndexCacheDuration = c.WFE.IndexCacheDuration.Duration
|
|
wfe.IssuerCacheDuration = c.WFE.IssuerCacheDuration.Duration
|
|
|
|
wfe.IssuerCert, err = cmd.LoadCert(c.Common.IssuerCert)
|
|
cmd.FailOnError(err, fmt.Sprintf("Couldn't read issuer cert [%s]", c.Common.IssuerCert))
|
|
|
|
logger.Info(fmt.Sprintf("WFE using key policy: %#v", goodkey.NewKeyPolicy()))
|
|
|
|
// Set up paths
|
|
wfe.BaseURL = c.Common.BaseURL
|
|
h := wfe.Handler()
|
|
|
|
httpMonitor := metrics.NewHTTPMonitor(scope, h)
|
|
|
|
logger.Info(fmt.Sprintf("Server running, listening on %s...\n", c.WFE.ListenAddress))
|
|
srv := &http.Server{
|
|
Addr: c.WFE.ListenAddress,
|
|
Handler: httpMonitor,
|
|
}
|
|
|
|
go cmd.DebugServer(c.WFE.DebugAddr)
|
|
go cmd.ProfileCmd(scope)
|
|
|
|
hd := &httpdown.HTTP{
|
|
StopTimeout: c.WFE.ShutdownStopTimeout.Duration,
|
|
KillTimeout: c.WFE.ShutdownKillTimeout.Duration,
|
|
Stats: metrics.NewFBAdapter(scope, clock.Default()),
|
|
}
|
|
hdSrv, err := hd.ListenAndServe(srv)
|
|
cmd.FailOnError(err, "Error starting HTTP server")
|
|
|
|
go cmd.CatchSignals(logger, func() { _ = hdSrv.Stop() })
|
|
|
|
forever := make(chan struct{}, 1)
|
|
<-forever
|
|
}
|