1
0
mirror of https://github.com/bitwarden/server.git synced 2024-11-22 12:15:36 +01:00
bitwarden-server/util/Setup/NginxConfigBuilder.cs

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

146 lines
5.3 KiB
C#
Raw Normal View History

namespace Bit.Setup;
2022-08-29 22:06:55 +02:00
2017-10-24 04:45:59 +02:00
public class NginxConfigBuilder
{
2018-03-29 19:43:52 +02:00
private const string ConfFile = "/bitwarden/nginx/default.conf";
2017-10-24 04:45:59 +02:00
private const string DefaultContentSecurityPolicy = "default-src 'self'; " +
"script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; " +
"img-src 'self' data: https://haveibeenpwned.com; " +
"child-src 'self' https://*.duosecurity.com https://*.duofederal.com; " +
"frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; " +
"connect-src 'self' wss://{0} https://api.pwnedpasswords.com " +
"https://api.2fa.directory; object-src 'self' blob:;";
2018-08-30 17:35:44 +02:00
private readonly Context _context;
2017-10-24 04:45:59 +02:00
2018-08-30 17:35:44 +02:00
public NginxConfigBuilder(Context context)
2017-10-24 04:45:59 +02:00
{
2018-08-30 17:35:44 +02:00
_context = context;
2017-10-24 04:45:59 +02:00
}
public void BuildForInstaller()
2022-08-29 22:06:55 +02:00
{
2018-08-30 17:35:44 +02:00
var model = new TemplateModel(_context);
if (model.Ssl && !_context.Config.SslManagedLetsEncrypt)
2017-10-24 04:45:59 +02:00
{
2018-08-30 17:35:44 +02:00
var sslPath = _context.Install.SelfSignedCert ?
$"/etc/ssl/self/{model.Domain}" : $"/etc/ssl/{model.Domain}";
_context.Config.SslCertificatePath = model.CertificatePath =
string.Concat(sslPath, "/", "certificate.crt");
_context.Config.SslKeyPath = model.KeyPath =
2018-08-30 17:35:44 +02:00
string.Concat(sslPath, "/", "private.key");
if (_context.Install.Trusted)
2018-08-30 17:35:44 +02:00
{
_context.Config.SslCaPath = model.CaPath =
string.Concat(sslPath, "/", "ca.crt");
}
if (_context.Install.DiffieHellman)
{
2018-08-30 17:35:44 +02:00
_context.Config.SslDiffieHellmanPath = model.DiffieHellmanPath =
string.Concat(sslPath, "/", "dhparam.pem");
}
2017-10-24 04:45:59 +02:00
}
2018-08-30 17:35:44 +02:00
Build(model);
2022-08-29 22:06:55 +02:00
}
2017-10-24 04:45:59 +02:00
public void BuildForUpdater()
2022-08-29 22:06:55 +02:00
{
2018-08-30 17:35:44 +02:00
var model = new TemplateModel(_context);
Build(model);
2022-08-29 22:06:55 +02:00
}
2017-10-24 04:45:59 +02:00
private void Build(TemplateModel model)
2022-08-29 22:06:55 +02:00
{
2017-10-24 04:45:59 +02:00
Directory.CreateDirectory("/bitwarden/nginx/");
Helpers.WriteLine(_context, "Building nginx config.");
if (!_context.Config.GenerateNginxConfig)
2017-10-24 04:45:59 +02:00
{
2018-08-30 17:35:44 +02:00
Helpers.WriteLine(_context, "...skipped");
return;
2017-10-24 04:45:59 +02:00
}
2018-08-30 17:35:44 +02:00
var template = Helpers.ReadTemplate("NginxConfig");
using (var sw = File.CreateText(ConfFile))
2017-10-24 04:45:59 +02:00
{
2018-08-30 17:35:44 +02:00
sw.WriteLine(template(model));
}
2022-08-29 22:06:55 +02:00
}
2018-08-30 17:35:44 +02:00
public class TemplateModel
2022-08-29 22:06:55 +02:00
{
2018-08-30 17:35:44 +02:00
public TemplateModel() { }
2017-10-24 04:45:59 +02:00
2018-08-30 17:35:44 +02:00
public TemplateModel(Context context)
{
Captcha = context.Config.Captcha;
Ssl = context.Config.Ssl;
2018-08-30 17:35:44 +02:00
EnableKeyConnector = context.Config.EnableKeyConnector;
[EC-261] SCIM (#2105) * scim project stub * some scim models and v2 controllers * implement some v2 scim endpoints * fix spacing * api key auth * EC-261 - SCIM Org API Key and connection type config * EC-261 - Fix lint errors/formatting * updates for okta implementation testing * fix var ref * updates from testing with Okta * implement scim context via provider parsing * support single and list of ids for add/remove groups * log ops not handled * touch up scim context * group list filtering * EC-261 - Additional SCIM provider types * EC-265 - UseScim flag and license update * EC-265 - SCIM provider type of default (0) * EC-265 - Add Scim URL and update connection validation * EC-265 - Model validation and cleanup for SCIM keys * implement scim org connection * EC-265 - Ensure ServiceUrl is not persisted to DB * EC-265 - Exclude provider type from DB if not configured * EC-261 - EF Migrations for SCIM * add docker builds for scim * EC-261 - Fix failing permissions tests * EC-261 - Fix unit tests and pgsql migrations * Formatting fixes from linter * EC-265 - Remove service URL from scim config * EC-265 - Fix unit tests, removed wayward validation * EC-265 - Require self-hosted for billing sync org conn * EC-265 - Fix formatting issues - whitespace * EC-261 - PR feedback and cleanup * scim constants rename * no scim settings right now * update project name * delete package lock * update appsettings configs for scim * use default scim provider for context Co-authored-by: Kyle Spearrin <kyle.spearrin@gmail.com>
2022-07-14 21:58:48 +02:00
EnableScim = context.Config.EnableScim;
2018-08-30 17:35:44 +02:00
Domain = context.Config.Domain;
Url = context.Config.Url;
2019-04-26 18:26:54 +02:00
RealIps = context.Config.RealIps;
var csp = DefaultContentSecurityPolicy;
if (!string.IsNullOrWhiteSpace(context.Config.NginxHeaderContentSecurityPolicy))
{
csp = context.Config.NginxHeaderContentSecurityPolicy;
}
ContentSecurityPolicy = string.Format(csp, Domain);
2018-08-30 17:35:44 +02:00
if (Ssl)
{
if (context.Config.SslManagedLetsEncrypt)
2017-10-24 04:45:59 +02:00
{
2018-08-30 17:35:44 +02:00
var sslPath = $"/etc/letsencrypt/live/{Domain}";
CertificatePath = CaPath = string.Concat(sslPath, "/", "fullchain.pem");
KeyPath = string.Concat(sslPath, "/", "privkey.pem");
DiffieHellmanPath = string.Concat(sslPath, "/", "dhparam.pem");
}
else
{
CertificatePath = context.Config.SslCertificatePath;
2018-08-30 17:35:44 +02:00
KeyPath = context.Config.SslKeyPath;
CaPath = context.Config.SslCaPath;
DiffieHellmanPath = context.Config.SslDiffieHellmanPath;
}
2022-08-29 22:06:55 +02:00
}
if (!string.IsNullOrWhiteSpace(context.Config.SslCiphersuites))
{
SslCiphers = context.Config.SslCiphersuites;
}
else
{
SslCiphers = "ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:" +
"ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:" +
"ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:" +
"ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256";
2017-10-24 04:45:59 +02:00
}
2018-08-30 17:35:44 +02:00
if (!string.IsNullOrWhiteSpace(context.Config.SslVersions))
{
SslProtocols = context.Config.SslVersions;
}
else
{
SslProtocols = "TLSv1.2";
2019-04-26 18:26:54 +02:00
}
2017-10-24 04:45:59 +02:00
}
2022-08-29 22:06:55 +02:00
public bool Captcha { get; set; }
2018-08-30 17:35:44 +02:00
public bool Ssl { get; set; }
public bool EnableKeyConnector { get; set; }
public bool EnableScim { get; set; }
public string Domain { get; set; }
public string Url { get; set; }
public string CertificatePath { get; set; }
2018-08-30 17:35:44 +02:00
public string KeyPath { get; set; }
public string CaPath { get; set; }
public string DiffieHellmanPath { get; set; }
public string SslCiphers { get; set; }
2019-04-26 18:26:54 +02:00
public string SslProtocols { get; set; }
public string ContentSecurityPolicy { get; set; }
public List<string> RealIps { get; set; }
2017-10-24 04:45:59 +02:00
}
}