mirror of
https://akkoma.dev/AkkomaGang/akkoma.git
synced 2024-11-27 08:16:16 +00:00
7d350b73f5
Fixes a lot of warnings like the following while running the testsuite: warning: passing a {module, function, args} tuple to Plug.Parsers.MULTIPART is deprecated. Please see Plug.Parsers.MULTIPART module docs for better approaches to configuration This might mean no more dynamic configuration but there seems to be the same limitation two lines underneath anyway.
202 lines
5.1 KiB
Elixir
202 lines
5.1 KiB
Elixir
# Pleroma: A lightweight social networking server
|
|
# Copyright © 2017-2021 Pleroma Authors <https://pleroma.social/>
|
|
# SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
defmodule Pleroma.Web.Endpoint do
|
|
use Phoenix.Endpoint, otp_app: :pleroma
|
|
|
|
require Pleroma.Constants
|
|
|
|
alias Pleroma.Config
|
|
|
|
socket("/socket", Pleroma.Web.UserSocket)
|
|
|
|
plug(Plug.Telemetry, event_prefix: [:phoenix, :endpoint])
|
|
|
|
plug(Pleroma.Web.Plugs.SetLocalePlug)
|
|
plug(CORSPlug)
|
|
plug(Pleroma.Web.Plugs.HTTPSecurityPlug)
|
|
plug(Pleroma.Web.Plugs.UploadedMedia)
|
|
|
|
@static_cache_control "public, no-cache"
|
|
|
|
# InstanceStatic needs to be before Plug.Static to be able to override shipped-static files
|
|
# If you're adding new paths to `only:` you'll need to configure them in InstanceStatic as well
|
|
# Cache-control headers are duplicated in case we turn off etags in the future
|
|
plug(
|
|
Pleroma.Web.Plugs.InstanceStatic,
|
|
at: "/",
|
|
from: :pleroma,
|
|
only: ["emoji", "images"],
|
|
gzip: true,
|
|
cache_control_for_etags: "public, max-age=1209600",
|
|
headers: %{
|
|
"cache-control" => "public, max-age=1209600"
|
|
}
|
|
)
|
|
|
|
plug(Pleroma.Web.Plugs.InstanceStatic,
|
|
at: "/",
|
|
gzip: true,
|
|
cache_control_for_etags: @static_cache_control,
|
|
headers: %{
|
|
"cache-control" => @static_cache_control
|
|
}
|
|
)
|
|
|
|
# Careful! No `only` restriction here, as we don't know what frontends contain.
|
|
plug(Pleroma.Web.Plugs.FrontendStatic,
|
|
at: "/",
|
|
frontend_type: :primary,
|
|
gzip: true,
|
|
cache_control_for_etags: @static_cache_control,
|
|
headers: %{
|
|
"cache-control" => @static_cache_control
|
|
}
|
|
)
|
|
|
|
plug(Plug.Static.IndexHtml, at: "/pleroma/admin/")
|
|
|
|
plug(Pleroma.Web.Plugs.FrontendStatic,
|
|
at: "/pleroma/admin",
|
|
frontend_type: :admin,
|
|
gzip: true,
|
|
cache_control_for_etags: @static_cache_control,
|
|
headers: %{
|
|
"cache-control" => @static_cache_control
|
|
}
|
|
)
|
|
|
|
# Serve at "/" the static files from "priv/static" directory.
|
|
#
|
|
# You should set gzip to true if you are running phoenix.digest
|
|
# when deploying your static files in production.
|
|
plug(
|
|
Plug.Static,
|
|
at: "/",
|
|
from: :pleroma,
|
|
only: Pleroma.Constants.static_only_files(),
|
|
# credo:disable-for-previous-line Credo.Check.Readability.MaxLineLength
|
|
gzip: true,
|
|
cache_control_for_etags: @static_cache_control,
|
|
headers: %{
|
|
"cache-control" => @static_cache_control
|
|
}
|
|
)
|
|
|
|
plug(Plug.Static,
|
|
at: "/pleroma/admin/",
|
|
from: {:pleroma, "priv/static/adminfe/"}
|
|
)
|
|
|
|
# Code reloading can be explicitly enabled under the
|
|
# :code_reloader configuration of your endpoint.
|
|
if code_reloading? do
|
|
plug(Phoenix.CodeReloader)
|
|
end
|
|
|
|
plug(Pleroma.Web.Plugs.TrailingFormatPlug)
|
|
plug(Plug.RequestId)
|
|
plug(Plug.Logger, log: :debug)
|
|
|
|
plug(Plug.Parsers,
|
|
parsers: [
|
|
:urlencoded,
|
|
{:multipart, length: Config.get([:instance, :upload_limit])},
|
|
:json
|
|
],
|
|
pass: ["*/*"],
|
|
json_decoder: Jason,
|
|
length: Config.get([:instance, :upload_limit]),
|
|
body_reader: {Pleroma.Web.Plugs.DigestPlug, :read_body, []}
|
|
)
|
|
|
|
plug(Plug.MethodOverride)
|
|
plug(Plug.Head)
|
|
|
|
secure_cookies = Config.get([__MODULE__, :secure_cookie_flag])
|
|
|
|
cookie_name =
|
|
if secure_cookies,
|
|
do: "__Host-pleroma_key",
|
|
else: "pleroma_key"
|
|
|
|
extra =
|
|
Config.get([__MODULE__, :extra_cookie_attrs])
|
|
|> Enum.join(";")
|
|
|
|
# The session will be stored in the cookie and signed,
|
|
# this means its contents can be read but not tampered with.
|
|
# Set :encryption_salt if you would also like to encrypt it.
|
|
plug(
|
|
Plug.Session,
|
|
store: :cookie,
|
|
key: cookie_name,
|
|
signing_salt: Config.get([__MODULE__, :signing_salt], "CqaoopA2"),
|
|
http_only: true,
|
|
secure: secure_cookies,
|
|
extra: extra
|
|
)
|
|
|
|
plug(Pleroma.Web.Plugs.RemoteIp)
|
|
|
|
defmodule Instrumenter do
|
|
use Prometheus.PhoenixInstrumenter
|
|
end
|
|
|
|
defmodule PipelineInstrumenter do
|
|
use Prometheus.PlugPipelineInstrumenter
|
|
end
|
|
|
|
defmodule MetricsExporter do
|
|
use Prometheus.PlugExporter
|
|
end
|
|
|
|
defmodule MetricsExporterCaller do
|
|
@behaviour Plug
|
|
|
|
def init(opts), do: opts
|
|
|
|
def call(conn, opts) do
|
|
prometheus_config = Application.get_env(:prometheus, MetricsExporter, [])
|
|
ip_whitelist = List.wrap(prometheus_config[:ip_whitelist])
|
|
|
|
cond do
|
|
!prometheus_config[:enabled] ->
|
|
conn
|
|
|
|
ip_whitelist != [] and
|
|
!Enum.find(ip_whitelist, fn ip ->
|
|
Pleroma.Helpers.InetHelper.parse_address(ip) == {:ok, conn.remote_ip}
|
|
end) ->
|
|
conn
|
|
|
|
true ->
|
|
MetricsExporter.call(conn, opts)
|
|
end
|
|
end
|
|
end
|
|
|
|
plug(PipelineInstrumenter)
|
|
|
|
plug(MetricsExporterCaller)
|
|
|
|
plug(Pleroma.Web.Router)
|
|
|
|
@doc """
|
|
Dynamically loads configuration from the system environment
|
|
on startup.
|
|
|
|
It receives the endpoint configuration from the config files
|
|
and must return the updated configuration.
|
|
"""
|
|
def load_from_system_env(config) do
|
|
port = System.get_env("PORT") || raise "expected the PORT environment variable to be set"
|
|
{:ok, Keyword.put(config, :http, [:inet6, port: port])}
|
|
end
|
|
|
|
def websocket_url do
|
|
String.replace_leading(url(), "http", "ws")
|
|
end
|
|
end
|