You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
237 lines
6.8 KiB
237 lines
6.8 KiB
// Package handlers provides the http functionality for the URL Shortener
|
|
package handlers
|
|
|
|
import (
|
|
"html/template"
|
|
"net/http"
|
|
"time"
|
|
|
|
"github.com/sirupsen/logrus"
|
|
|
|
"github.com/gin-gonic/gin"
|
|
"github.com/mxschmitt/golang-url-shortener/internal/handlers/tmpls"
|
|
"github.com/mxschmitt/golang-url-shortener/internal/stores"
|
|
"github.com/mxschmitt/golang-url-shortener/internal/util"
|
|
"github.com/pkg/errors"
|
|
)
|
|
|
|
// Handler holds the funcs and attributes for the
|
|
// http communication
|
|
type Handler struct {
|
|
store stores.Store
|
|
engine *gin.Engine
|
|
providers []string
|
|
}
|
|
|
|
// DoNotPrivateKeyChecking is used for testing
|
|
var DoNotPrivateKeyChecking = false
|
|
|
|
type loggerEntryWithFields interface {
|
|
WithFields(fields logrus.Fields) *logrus.Entry
|
|
}
|
|
|
|
// Ginrus returns a gin.HandlerFunc (middleware) that logs requests using logrus.
|
|
//
|
|
// Requests with errors are logged using logrus.Error().
|
|
// Requests without errors are logged using logrus.Info().
|
|
//
|
|
// It receives:
|
|
// 1. A time package format string (e.g. time.RFC3339).
|
|
// 2. A boolean stating whether to use UTC time zone or local.
|
|
// 3. Optionally, a list of paths to skip logging for (this is why
|
|
// we are not using upstream github.com/gin-gonic/contrib/ginrus)
|
|
func Ginrus(logger loggerEntryWithFields, timeFormat string, utc bool, notlogged ...string) gin.HandlerFunc {
|
|
var skip map[string]struct{}
|
|
if length := len(notlogged); length > 0 {
|
|
skip = make(map[string]struct{}, length)
|
|
for _, path := range notlogged {
|
|
skip[path] = struct{}{}
|
|
}
|
|
}
|
|
|
|
return func(c *gin.Context) {
|
|
start := time.Now()
|
|
// some evil middlewares modify this values
|
|
path := c.Request.URL.Path
|
|
c.Next()
|
|
|
|
// log only when path is not being skipped
|
|
if _, ok := skip[path]; !ok {
|
|
end := time.Now()
|
|
latency := end.Sub(start)
|
|
if utc {
|
|
end = end.UTC()
|
|
}
|
|
|
|
entry := logger.WithFields(logrus.Fields{
|
|
"status": c.Writer.Status(),
|
|
"method": c.Request.Method,
|
|
"path": path,
|
|
"ip": c.ClientIP(),
|
|
"latency": latency,
|
|
"user-agent": c.Request.UserAgent(),
|
|
"time": end.Format(timeFormat),
|
|
})
|
|
|
|
if len(c.Errors) > 0 {
|
|
// Append error field if this is an erroneous request.
|
|
entry.Error(c.Errors.String())
|
|
} else {
|
|
entry.Info()
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
// New initializes the http handlers
|
|
func New(store stores.Store) (*Handler, error) {
|
|
if !util.GetConfig().EnableDebugMode {
|
|
gin.SetMode(gin.ReleaseMode)
|
|
}
|
|
h := &Handler{
|
|
store: store,
|
|
engine: gin.New(),
|
|
}
|
|
if err := h.setHandlers(); err != nil {
|
|
return nil, errors.Wrap(err, "could not set handlers")
|
|
}
|
|
if util.GetConfig().AuthBackend == "oauth" {
|
|
if !DoNotPrivateKeyChecking {
|
|
if err := util.CheckForPrivateKey(); err != nil {
|
|
return nil, errors.Wrap(err, "could not check for private key")
|
|
}
|
|
}
|
|
h.initOAuth()
|
|
} else if util.GetConfig().AuthBackend == "proxy" {
|
|
h.initProxyAuth()
|
|
}
|
|
return h, nil
|
|
}
|
|
|
|
func (h *Handler) addTemplatesFromFS(files []string) error {
|
|
var t *template.Template
|
|
for _, file := range files {
|
|
fileContent, err := tmpls.FSString(false, "/"+file)
|
|
if err != nil {
|
|
return errors.Wrap(err, "could not read template file")
|
|
}
|
|
if t == nil {
|
|
t, err = template.New(file).Parse(fileContent)
|
|
if err != nil {
|
|
return errors.Wrap(err, "could not create template from file content")
|
|
}
|
|
continue
|
|
}
|
|
if _, err := t.New(file).Parse(fileContent); err != nil {
|
|
return errors.Wrap(err, "could not parse template")
|
|
}
|
|
}
|
|
h.engine.SetHTMLTemplate(t)
|
|
return nil
|
|
}
|
|
|
|
func (h *Handler) setHandlers() error {
|
|
if err := h.addTemplatesFromFS([]string{"token.html", "protected.html"}); err != nil {
|
|
return errors.Wrap(err, "could not add templates from FS")
|
|
}
|
|
// only do web access logs if enabled
|
|
if util.GetConfig().EnableAccessLogs {
|
|
if util.GetConfig().EnableDebugMode {
|
|
// in debug mode, log everything including healthchecks
|
|
h.engine.Use(Ginrus(logrus.StandardLogger(), time.RFC3339, false))
|
|
} else {
|
|
// if we are not in debug mode, do not log healthchecks
|
|
h.engine.Use(Ginrus(logrus.StandardLogger(), time.RFC3339, false, "/ok"))
|
|
}
|
|
}
|
|
protected := h.engine.Group("/api/v1/protected")
|
|
switch util.GetConfig().AuthBackend {
|
|
case "oauth":
|
|
logrus.Info("Using OAuth auth backend: oauth")
|
|
protected.Use(h.oAuthMiddleware)
|
|
case "proxy":
|
|
logrus.Info("Using OAuth auth backend: proxy")
|
|
protected.Use(h.proxyAuthMiddleware)
|
|
default:
|
|
logrus.Fatalf("Auth backend method '%s' is not recognized", util.GetConfig().AuthBackend)
|
|
}
|
|
protected.POST("/create", h.handleCreate)
|
|
protected.POST("/lookup", h.handleLookup)
|
|
protected.GET("/recent", h.handleRecent)
|
|
protected.POST("/visitors", h.handleGetVisitors)
|
|
|
|
h.engine.GET("/api/v1/info", h.handleInfo)
|
|
h.engine.GET("/api/v1/displayURL", h.handleDisplayURL)
|
|
h.engine.GET("/d/:id/:hash", h.handleDelete)
|
|
h.engine.GET("/ok", h.handleHealthcheck)
|
|
|
|
// Handling the shorted URLs, if no one exists, it checks
|
|
// in the filesystem and sets headers for caching
|
|
h.engine.NoRoute(
|
|
h.handleAccess, // look up shortcuts
|
|
func(c *gin.Context) { // no shortcut found, prep response for FS
|
|
c.Header("Vary", "Accept-Encoding")
|
|
c.Header("Cache-Control", "public, max-age=2592000")
|
|
c.Header("ETag", util.VersionInfo.Commit)
|
|
},
|
|
// Pass down to the embedded FS, but let 404s escape via
|
|
// the interceptHandler.
|
|
gin.WrapH(interceptHandler(http.FileServer(FS(false)), customErrorHandler)),
|
|
// not in FS; redirect to root with customURL target filled out
|
|
func(c *gin.Context) {
|
|
// if we get to this point we should not let the client cache
|
|
c.Header("Cache-Control", "no-cache, no-store")
|
|
c.Redirect(http.StatusTemporaryRedirect, "/?customUrl="+c.Request.URL.Path[1:])
|
|
})
|
|
return nil
|
|
}
|
|
|
|
type interceptResponseWriter struct {
|
|
http.ResponseWriter
|
|
errH func(http.ResponseWriter, int)
|
|
}
|
|
|
|
func (w *interceptResponseWriter) WriteHeader(status int) {
|
|
if status >= http.StatusBadRequest {
|
|
w.errH(w.ResponseWriter, status)
|
|
w.errH = nil
|
|
} else {
|
|
w.ResponseWriter.WriteHeader(status)
|
|
}
|
|
}
|
|
|
|
type errorHandler func(http.ResponseWriter, int)
|
|
|
|
func (w *interceptResponseWriter) Write(p []byte) (n int, err error) {
|
|
if w.errH == nil {
|
|
return len(p), nil
|
|
}
|
|
return w.ResponseWriter.Write(p)
|
|
}
|
|
|
|
func interceptHandler(next http.Handler, errH errorHandler) http.Handler {
|
|
if errH == nil {
|
|
errH = customErrorHandler
|
|
}
|
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
next.ServeHTTP(&interceptResponseWriter{w, errH}, r)
|
|
})
|
|
}
|
|
|
|
func customErrorHandler(w http.ResponseWriter, status int) {
|
|
// let 404s fall through: the next NoRoute handler will redirect
|
|
// them back to the main page with the customURL box filled out.
|
|
if status != 404 {
|
|
http.Error(w, "error", status)
|
|
}
|
|
}
|
|
|
|
// Listen starts the http server
|
|
func (h *Handler) Listen() error {
|
|
return h.engine.Run(util.GetConfig().ListenAddr)
|
|
}
|
|
|
|
// CloseStore stops the http server and the closes the db gracefully
|
|
func (h *Handler) CloseStore() error {
|
|
return h.store.Close()
|
|
}
|
|
|