2018-12-23 21:04:54 +01:00
|
|
|
# Pleroma: A lightweight social networking server
|
2020-03-02 06:08:45 +01:00
|
|
|
# Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
|
2018-12-23 21:04:54 +01:00
|
|
|
# SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
|
2017-03-17 17:09:58 +01:00
|
|
|
defmodule Pleroma.Web.Endpoint do
|
|
|
|
use Phoenix.Endpoint, otp_app: :pleroma
|
|
|
|
|
2020-05-01 21:15:43 +02:00
|
|
|
require Pleroma.Constants
|
|
|
|
|
2020-10-27 18:47:56 +01:00
|
|
|
alias Pleroma.Config
|
|
|
|
|
2018-11-16 21:35:08 +01:00
|
|
|
socket("/socket", Pleroma.Web.UserSocket)
|
2018-03-30 15:01:53 +02:00
|
|
|
|
2020-10-22 22:33:52 +02:00
|
|
|
plug(Plug.Telemetry, event_prefix: [:phoenix, :endpoint])
|
|
|
|
|
2020-06-24 08:24:29 +02:00
|
|
|
plug(Pleroma.Web.Plugs.SetLocalePlug)
|
2018-11-10 12:23:50 +01:00
|
|
|
plug(CORSPlug)
|
2020-06-24 09:39:17 +02:00
|
|
|
plug(Pleroma.Web.Plugs.HTTPSecurityPlug)
|
2020-06-24 08:03:48 +02:00
|
|
|
plug(Pleroma.Web.Plugs.UploadedMedia)
|
2018-03-30 15:01:53 +02:00
|
|
|
|
2020-03-11 15:58:25 +01:00
|
|
|
@static_cache_control "public, no-cache"
|
2019-05-24 22:33:55 +02:00
|
|
|
|
2018-12-17 22:50:59 +01:00
|
|
|
# InstanceStatic needs to be before Plug.Static to be able to override shipped-static files
|
|
|
|
# If you're adding new paths to `only:` you'll need to configure them in InstanceStatic as well
|
2019-05-24 22:33:55 +02:00
|
|
|
# Cache-control headers are duplicated in case we turn off etags in the future
|
2020-06-24 09:03:10 +02:00
|
|
|
plug(Pleroma.Web.Plugs.InstanceStatic,
|
2019-05-24 22:33:55 +02:00
|
|
|
at: "/",
|
|
|
|
gzip: true,
|
|
|
|
cache_control_for_etags: @static_cache_control,
|
|
|
|
headers: %{
|
|
|
|
"cache-control" => @static_cache_control
|
|
|
|
}
|
|
|
|
)
|
2018-12-17 22:50:59 +01:00
|
|
|
|
2020-07-28 17:35:16 +02:00
|
|
|
# Careful! No `only` restriction here, as we don't know what frontends contain.
|
2020-09-02 09:29:36 +02:00
|
|
|
plug(Pleroma.Web.Plugs.FrontendStatic,
|
2020-07-28 17:35:16 +02:00
|
|
|
at: "/",
|
|
|
|
frontend_type: :primary,
|
|
|
|
gzip: true,
|
|
|
|
cache_control_for_etags: @static_cache_control,
|
|
|
|
headers: %{
|
|
|
|
"cache-control" => @static_cache_control
|
|
|
|
}
|
|
|
|
)
|
|
|
|
|
2020-07-29 13:03:04 +02:00
|
|
|
plug(Plug.Static.IndexHtml, at: "/pleroma/admin/")
|
|
|
|
|
2020-09-02 09:29:36 +02:00
|
|
|
plug(Pleroma.Web.Plugs.FrontendStatic,
|
2020-07-29 13:03:04 +02:00
|
|
|
at: "/pleroma/admin",
|
|
|
|
frontend_type: :admin,
|
|
|
|
gzip: true,
|
|
|
|
cache_control_for_etags: @static_cache_control,
|
|
|
|
headers: %{
|
|
|
|
"cache-control" => @static_cache_control
|
|
|
|
}
|
|
|
|
)
|
|
|
|
|
2019-07-09 13:30:15 +02:00
|
|
|
# Serve at "/" the static files from "priv/static" directory.
|
|
|
|
#
|
|
|
|
# You should set gzip to true if you are running phoenix.digest
|
|
|
|
# when deploying your static files in production.
|
2018-03-30 15:01:53 +02:00
|
|
|
plug(
|
|
|
|
Plug.Static,
|
|
|
|
at: "/",
|
|
|
|
from: :pleroma,
|
2020-05-01 21:15:43 +02:00
|
|
|
only: Pleroma.Constants.static_only_files(),
|
2019-03-05 05:37:33 +01:00
|
|
|
# credo:disable-for-previous-line Credo.Check.Readability.MaxLineLength
|
2019-05-24 22:33:55 +02:00
|
|
|
gzip: true,
|
|
|
|
cache_control_for_etags: @static_cache_control,
|
|
|
|
headers: %{
|
|
|
|
"cache-control" => @static_cache_control
|
|
|
|
}
|
2018-03-30 15:01:53 +02:00
|
|
|
)
|
2017-03-17 17:09:58 +01:00
|
|
|
|
2019-05-11 03:34:17 +02:00
|
|
|
plug(Plug.Static,
|
|
|
|
at: "/pleroma/admin/",
|
|
|
|
from: {:pleroma, "priv/static/adminfe/"}
|
|
|
|
)
|
|
|
|
|
2017-03-17 17:09:58 +01:00
|
|
|
# Code reloading can be explicitly enabled under the
|
|
|
|
# :code_reloader configuration of your endpoint.
|
|
|
|
if code_reloading? do
|
2018-03-30 15:01:53 +02:00
|
|
|
plug(Phoenix.CodeReloader)
|
2017-03-17 17:09:58 +01:00
|
|
|
end
|
|
|
|
|
2020-06-24 08:05:23 +02:00
|
|
|
plug(Pleroma.Web.Plugs.TrailingFormatPlug)
|
2018-03-30 15:01:53 +02:00
|
|
|
plug(Plug.RequestId)
|
2019-12-09 13:12:24 +01:00
|
|
|
plug(Plug.Logger, log: :debug)
|
2017-03-17 17:09:58 +01:00
|
|
|
|
2020-02-07 17:21:55 +01:00
|
|
|
plug(Plug.Parsers,
|
|
|
|
parsers: [
|
|
|
|
:urlencoded,
|
2020-10-27 18:47:56 +01:00
|
|
|
{:multipart, length: {Config, :get, [[:instance, :upload_limit]]}},
|
2020-02-07 17:21:55 +01:00
|
|
|
:json
|
|
|
|
],
|
|
|
|
pass: ["*/*"],
|
|
|
|
json_decoder: Jason,
|
2020-10-27 18:47:56 +01:00
|
|
|
length: Config.get([:instance, :upload_limit]),
|
2020-02-07 17:21:55 +01:00
|
|
|
body_reader: {Pleroma.Web.Plugs.DigestPlug, :read_body, []}
|
|
|
|
)
|
2017-03-17 17:09:58 +01:00
|
|
|
|
2018-03-30 15:01:53 +02:00
|
|
|
plug(Plug.MethodOverride)
|
|
|
|
plug(Plug.Head)
|
2017-03-17 17:09:58 +01:00
|
|
|
|
2020-10-27 18:47:56 +01:00
|
|
|
secure_cookies = Config.get([__MODULE__, :secure_cookie_flag])
|
2019-03-11 18:37:26 +01:00
|
|
|
|
2018-11-13 00:32:38 +01:00
|
|
|
cookie_name =
|
2019-03-11 18:37:26 +01:00
|
|
|
if secure_cookies,
|
2018-11-13 00:32:38 +01:00
|
|
|
do: "__Host-pleroma_key",
|
|
|
|
else: "pleroma_key"
|
|
|
|
|
2019-04-15 06:33:46 +02:00
|
|
|
extra =
|
2020-10-27 18:47:56 +01:00
|
|
|
Config.get([__MODULE__, :extra_cookie_attrs])
|
2019-04-15 06:33:46 +02:00
|
|
|
|> Enum.join(";")
|
2019-03-15 15:08:03 +01:00
|
|
|
|
2017-03-17 17:09:58 +01:00
|
|
|
# The session will be stored in the cookie and signed,
|
|
|
|
# this means its contents can be read but not tampered with.
|
|
|
|
# Set :encryption_salt if you would also like to encrypt it.
|
2018-03-30 15:01:53 +02:00
|
|
|
plug(
|
|
|
|
Plug.Session,
|
2017-03-17 17:09:58 +01:00
|
|
|
store: :cookie,
|
2018-11-13 00:32:38 +01:00
|
|
|
key: cookie_name,
|
2020-10-27 18:47:56 +01:00
|
|
|
signing_salt: Config.get([__MODULE__, :signing_salt], "CqaoopA2"),
|
2018-08-28 22:34:31 +02:00
|
|
|
http_only: true,
|
2019-03-11 18:37:26 +01:00
|
|
|
secure: secure_cookies,
|
2019-04-15 06:33:46 +02:00
|
|
|
extra: extra
|
2018-03-30 15:01:53 +02:00
|
|
|
)
|
2017-03-17 17:09:58 +01:00
|
|
|
|
2020-06-24 08:30:32 +02:00
|
|
|
plug(Pleroma.Web.Plugs.RemoteIp)
|
2019-01-30 16:32:30 +01:00
|
|
|
|
|
|
|
defmodule Instrumenter do
|
|
|
|
use Prometheus.PhoenixInstrumenter
|
|
|
|
end
|
|
|
|
|
|
|
|
defmodule PipelineInstrumenter do
|
|
|
|
use Prometheus.PlugPipelineInstrumenter
|
|
|
|
end
|
|
|
|
|
|
|
|
defmodule MetricsExporter do
|
|
|
|
use Prometheus.PlugExporter
|
|
|
|
end
|
|
|
|
|
2020-10-27 18:47:56 +01:00
|
|
|
defmodule MetricsExporterCaller do
|
|
|
|
@behaviour Plug
|
|
|
|
|
|
|
|
def init(opts), do: opts
|
|
|
|
|
|
|
|
def call(conn, opts) do
|
|
|
|
prometheus_config = Application.get_env(:prometheus, MetricsExporter, [])
|
|
|
|
ip_whitelist = List.wrap(prometheus_config[:ip_whitelist])
|
|
|
|
|
|
|
|
cond do
|
|
|
|
!prometheus_config[:enabled] ->
|
|
|
|
conn
|
|
|
|
|
|
|
|
ip_whitelist != [] and
|
|
|
|
!Enum.find(ip_whitelist, fn ip ->
|
|
|
|
Pleroma.Helpers.InetHelper.parse_address(ip) == {:ok, conn.remote_ip}
|
|
|
|
end) ->
|
|
|
|
conn
|
|
|
|
|
|
|
|
true ->
|
|
|
|
MetricsExporter.call(conn, opts)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-01-30 16:32:30 +01:00
|
|
|
plug(PipelineInstrumenter)
|
2020-10-27 18:47:56 +01:00
|
|
|
|
|
|
|
plug(MetricsExporterCaller)
|
2019-01-30 16:32:30 +01:00
|
|
|
|
2018-03-30 15:01:53 +02:00
|
|
|
plug(Pleroma.Web.Router)
|
2017-03-17 17:09:58 +01:00
|
|
|
|
|
|
|
@doc """
|
|
|
|
Dynamically loads configuration from the system environment
|
|
|
|
on startup.
|
|
|
|
|
|
|
|
It receives the endpoint configuration from the config files
|
|
|
|
and must return the updated configuration.
|
|
|
|
"""
|
|
|
|
def load_from_system_env(config) do
|
|
|
|
port = System.get_env("PORT") || raise "expected the PORT environment variable to be set"
|
|
|
|
{:ok, Keyword.put(config, :http, [:inet6, port: port])}
|
|
|
|
end
|
2019-02-01 19:56:18 +01:00
|
|
|
|
|
|
|
def websocket_url do
|
2019-02-01 20:35:19 +01:00
|
|
|
String.replace_leading(url(), "http", "ws")
|
2019-02-01 19:56:18 +01:00
|
|
|
end
|
2017-03-17 17:09:58 +01:00
|
|
|
end
|