Files
virtual-appstore/main.go
jbergner 0bb37614ef
Some checks failed
release-tag / release-image (push) Failing after 38s
build-binaries / build (, amd64, linux) (push) Has been skipped
build-binaries / build (, arm, 7, linux) (push) Has been skipped
build-binaries / build (, arm64, linux) (push) Has been skipped
build-binaries / build (.exe, amd64, windows) (push) Has been skipped
build-binaries / release (push) Has been skipped
init
2025-09-06 20:31:05 +02:00

275 lines
7.1 KiB
Go

package main
import (
"context"
"crypto/tls"
"encoding/json"
"html/template"
"log"
"net"
"net/http"
"os"
"os/signal"
"path/filepath"
"sort"
"strings"
"syscall"
"time"
)
type App struct {
Title string `json:"title"`
URL string `json:"url"`
Icon string `json:"icon"`
Category string `json:"category"`
Color string `json:"color"`
}
type PageData struct {
Title string
Apps []App
Categories []string
Now time.Time
}
func getenv(key, def string) string {
if v := os.Getenv(key); v != "" {
return v
}
return def
}
func must(err error) {
if err != nil {
log.Fatal(err)
}
}
func loadApps(path string) ([]App, []string, error) {
b, err := os.ReadFile(path)
if err != nil {
return nil, nil, err
}
var apps []App
if err := json.Unmarshal(b, &apps); err != nil {
return nil, nil, err
}
sort.Slice(apps, func(i, j int) bool {
return strings.ToLower(apps[i].Title) < strings.ToLower(apps[j].Title)
})
seen := map[string]bool{}
var cats []string
for _, a := range apps {
if a.Category == "" {
continue
}
if !seen[a.Category] {
seen[a.Category] = true
cats = append(cats, a.Category)
}
}
sort.Strings(cats)
return apps, cats, nil
}
func withSecurityHeaders(next http.Handler, hsts bool) http.Handler {
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
w.Header().Set("X-Content-Type-Options", "nosniff")
w.Header().Set("X-Frame-Options", "DENY")
w.Header().Set("Referrer-Policy", "strict-origin-when-cross-origin")
w.Header().Set("X-XSS-Protection", "0")
w.Header().Set("Content-Security-Policy",
"default-src 'self'; img-src 'self' data: https:; style-src 'self' https://fonts.googleapis.com; font-src https://fonts.gstatic.com; script-src 'self';")
if hsts && r.TLS != nil {
w.Header().Set("Strict-Transport-Security", "max-age=15552000; includeSubDomains")
}
next.ServeHTTP(w, r)
})
}
func redirectToHTTPS(httpsAddr string) http.Handler {
hostPort := func(host string) string {
h, _, err := net.SplitHostPort(host)
if err != nil {
return host
}
return h
}
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
host := r.Host
httpsPort := ":8443"
if httpsAddr != "" && httpsAddr != ":8443" {
httpsPort = httpsAddr
}
targetHost := hostPort(host)
if _, _, err := net.SplitHostPort(host); err == nil {
targetHost = hostPort(host) + httpsPort
} else {
if httpsPort != ":8443" {
targetHost = host + httpsPort
}
}
target := "https://" + targetHost + r.URL.RequestURI()
http.Redirect(w, r, target, http.StatusMovedPermanently)
})
}
func main() {
// App-Config
appTitle := getenv("APP_TITLE", "Mein App-Store")
jsonPath := getenv("APPS_JSON", "apps.json")
staticDir := getenv("STATIC_DIR", "static")
tmplDir := getenv("TEMPLATE_DIR", "templates")
// Server-Modus
serverMode := strings.ToLower(getenv("SERVER_MODE", "http")) // "http" | "https"
addr := getenv("ADDR", func() string {
if serverMode == "https" {
return ":8443"
}
return ":8080"
}())
// HTTPS-spezifisch
certFile := getenv("TLS_CERT_FILE", "")
keyFile := getenv("TLS_KEY_FILE", "")
hstsEnabled := getenv("HSTS", "true") == "true"
// Optionaler Redirect (nur wenn SERVER_MODE=https)
redirectAddr := getenv("HTTP_REDIRECT_ADDR", ":8080")
redirectEnabled := getenv("HTTP_REDIRECT_ENABLED", "true") == "true"
// Templates
tmpl := template.Must(template.New("index.html").Funcs(template.FuncMap{
"safeURL": func(u string) template.URL { return template.URL(u) },
"hasPrefix": strings.HasPrefix,
}).ParseFiles(filepath.Join(tmplDir, "index.html")))
readData := func() (PageData, error) {
apps, cats, err := loadApps(jsonPath)
if err != nil {
return PageData{}, err
}
return PageData{
Title: appTitle,
Apps: apps,
Categories: cats,
Now: time.Now(),
}, nil
}
// Handler
mux := http.NewServeMux()
mux.Handle("/static/", http.StripPrefix("/static/", http.FileServer(http.Dir(staticDir))))
mux.HandleFunc("/", func(w http.ResponseWriter, r *http.Request) {
data, err := readData()
if err != nil {
http.Error(w, "Fehler beim Laden der Apps: "+err.Error(), http.StatusInternalServerError)
return
}
w.Header().Set("Content-Type", "text/html; charset=utf-8")
if err := tmpl.ExecuteTemplate(w, "index.html", data); err != nil {
log.Println("template error:", err)
}
})
// Gemeinsame Server-Instanzen
var mainSrv *http.Server
var redirSrv *http.Server
// Graceful Shutdown Verkabelung
stop := make(chan os.Signal, 1)
signal.Notify(stop, os.Interrupt, syscall.SIGTERM)
switch serverMode {
case "https":
// HTTPS mit Security-Headern (inkl. HSTS)
secureHandler := withSecurityHeaders(mux, hstsEnabled)
tlsCfg := &tls.Config{
MinVersion: tls.VersionTLS12,
PreferServerCipherSuites: true,
CurvePreferences: []tls.CurveID{tls.X25519, tls.CurveP256, tls.CurveP384},
CipherSuites: []uint16{
tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
tls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
tls.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,
tls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
tls.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
tls.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
},
}
if certFile == "" || keyFile == "" {
log.Fatal("SERVER_MODE=https, aber TLS_CERT_FILE oder TLS_KEY_FILE fehlt.")
}
mainSrv = &http.Server{
Addr: addr,
Handler: secureHandler,
TLSConfig: tlsCfg,
ReadTimeout: 15 * time.Second,
WriteTimeout: 30 * time.Second,
IdleTimeout: 60 * time.Second,
}
// Optionaler HTTP→HTTPS Redirect
if redirectEnabled && redirectAddr != "" {
redirSrv = &http.Server{
Addr: redirectAddr,
Handler: redirectToHTTPS(addr),
ReadTimeout: 5 * time.Second,
WriteTimeout: 10 * time.Second,
IdleTimeout: 10 * time.Second,
}
go func() {
log.Printf("HTTP Redirect auf %s → HTTPS %s …", redirectAddr, addr)
if err := redirSrv.ListenAndServe(); err != nil && err != http.ErrServerClosed {
log.Printf("Redirect-Server Fehler: %v", err)
}
}()
}
go func() {
log.Printf("HTTPS läuft auf %s …", addr)
if err := mainSrv.ListenAndServeTLS(certFile, keyFile); err != nil && err != http.ErrServerClosed {
log.Fatalf("HTTPS-Server Fehler: %v", err)
}
}()
case "http":
// HTTP ohne HSTS (Security-Header bleiben)
handler := withSecurityHeaders(mux, false)
mainSrv = &http.Server{
Addr: addr,
Handler: handler,
ReadTimeout: 15 * time.Second,
WriteTimeout: 30 * time.Second,
IdleTimeout: 60 * time.Second,
}
go func() {
log.Printf("HTTP läuft auf %s …", addr)
if err := mainSrv.ListenAndServe(); err != nil && err != http.ErrServerClosed {
log.Fatalf("HTTP-Server Fehler: %v", err)
}
}()
default:
log.Fatalf("Ungültiger SERVER_MODE: %q (erwartet: http oder https)", serverMode)
}
// Warten auf Stop-Signal
<-stop
log.Println("Beende …")
ctx, cancel := context.WithTimeout(context.Background(), 10*time.Second)
defer cancel()
if redirSrv != nil {
_ = redirSrv.Shutdown(ctx)
}
if mainSrv != nil {
_ = mainSrv.Shutdown(ctx)
}
log.Println("Sauber beendet.")
}