pcmt/app/echoSettings.go
leo 9eb811169d
All checks were successful
continuous-integration/drone/push Build is passing
feat: bump configuration schema to 0.0.1-rc.2
this entails a couple of breaking changes due to schema evolution. once
the schema is stabilised, backward compatibility promise will be given.

* update config struct and accompanying scructs
* update tests
* update exampleConfig.dhall
* update local dev environment (devenv)
* make settings reflect the config schema changes
* make use of some settings/config updates
2023-05-21 12:44:18 +02:00

136 lines
3.3 KiB
Go

// Copyright 2023 wanderer <a_mirre at utb dot cz>
// SPDX-License-Identifier: AGPL-3.0-only
package app
import (
"encoding/hex"
"net/http"
"github.com/gorilla/sessions"
"github.com/labstack/echo-contrib/session"
"github.com/labstack/echo/v4/middleware"
"golang.org/x/time/rate"
)
// SetEchoSettings sets up the main Echo instance and panics on err.
func (a *App) SetEchoSettings() {
e := a.E()
e.HideBanner = true
e.Use(middleware.Logger())
// e.Use(middleware.LoggerWithConfig(
// middleware.LoggerConfig{
// Format: `{"time":"${time_rfc3339_nano}","id":"${id}","remote_ip":"${remote_ip}",` +
// `"host":"${host}","method":"${method}","uri":"${uri}","user_agent":"${user_agent}",` +
// `"status":${status},"error":"${error}","latency":${latency},"latency_human":"${latency_human}"` +
// `,"bytes_in":${bytes_in},"bytes_out":${bytes_out}}` + "\n",
// CustomTimeFormat: "2006-01-02 15:04:05.00000",
// },
// ))
// logger := zerolog.New(os.Stdout)
// e.Use(middleware.RequestLoggerWithConfig(middleware.RequestLoggerConfig{
// LogURI: true,
// LogStatus: true,
// LogValuesFunc: func(c echo.Context, v middleware.RequestLoggerValues) error {
// logger.Info().
// Str("URI", v.URI).
// Int("status", v.Status).
// Msg("request")
//
// return nil
// },
// }))
if a.setting.HTTPRateLimitEnabled() {
limit := rate.Limit(a.setting.HTTPRateLimit())
e.Use(middleware.RateLimiter(
middleware.NewRateLimiterMemoryStore(limit),
))
}
// TODO: add check for prometheus config setting.
// if true {
// // import "github.com/labstack/echo-contrib/prometheus"
// p := prometheus.NewPrometheus("echo", nil)
// p.Use(e)
// }
e.Use(middleware.Recover())
var (
store *sessions.CookieStore
authSecret []byte
encrSecret []byte
)
if a.setting.SessionAuthIsHex {
b, err := hex.DecodeString(a.setting.SessionCookieAuthSecret())
if err != nil {
panic(err)
}
authSecret = b
}
if a.setting.SessionEncrIsHex {
b, err := hex.DecodeString(a.setting.SessionCookieEncrSecret())
if err != nil {
panic(err)
}
encrSecret = b
}
switch {
case authSecret != nil && encrSecret != nil:
store = sessions.NewCookieStore(
authSecret,
encrSecret,
)
case authSecret != nil && encrSecret == nil:
store = sessions.NewCookieStore(
authSecret,
[]byte(a.setting.SessionCookieEncrSecret()),
)
case authSecret == nil && encrSecret != nil:
store = sessions.NewCookieStore(
[]byte(a.setting.SessionCookieAuthSecret()),
encrSecret,
)
case authSecret == nil && encrSecret == nil:
store = sessions.NewCookieStore(
[]byte(a.setting.SessionCookieAuthSecret()),
[]byte(a.setting.SessionCookieEncrSecret()),
)
}
store.Options.Domain = a.setting.HTTPDomain()
store.Options.HttpOnly = true
store.Options.SameSite = http.SameSiteStrictMode
store.Options.Secure = a.setting.HTTPSecure()
e.Use(session.Middleware(store))
// e.Use(middleware.CSRF())
e.Use(middleware.CSRFWithConfig(middleware.CSRFConfig{
TokenLookup: "cookie:_csrf",
CookiePath: "/",
// CookieDomain: "example.com",
// CookieSecure: true,
CookieHTTPOnly: true,
CookieSameSite: http.SameSiteStrictMode,
}),
)
e.Use(middleware.Secure())
if a.setting.HTTPGzipEnabled() {
e.Use(middleware.GzipWithConfig(middleware.GzipConfig{
Level: a.setting.HTTPGzipLevel(),
}))
}
}