akkoma/lib/pleroma/web/endpoint.ex

187 lines
5 KiB
Elixir
Raw Permalink Normal View History

# Pleroma: A lightweight social networking server
# Copyright © 2017-2021 Pleroma Authors <https://pleroma.social/>
# SPDX-License-Identifier: AGPL-3.0-only
2017-03-17 10:09:58 -06:00
defmodule Pleroma.Web.Endpoint do
use Phoenix.Endpoint, otp_app: :pleroma
require Pleroma.Constants
alias Pleroma.Config
socket("/live", Phoenix.LiveView.Socket)
2018-03-30 07:01:53 -06:00
2020-06-24 00:24:29 -06:00
plug(Pleroma.Web.Plugs.SetLocalePlug)
plug(CORSPlug)
2022-12-14 19:02:07 -07:00
plug(Pleroma.Web.Plugs.CSPNoncePlug)
plug(Pleroma.Web.Plugs.HTTPSecurityPlug)
2020-06-24 00:03:48 -06:00
plug(Pleroma.Web.Plugs.UploadedMedia)
2018-03-30 07:01:53 -06:00
@static_cache_control "public, no-cache"
# InstanceStatic needs to be before Plug.Static to be able to override shipped-static files
# If you're adding new paths to `only:` you'll need to configure them in InstanceStatic as well
# Cache-control headers are duplicated in case we turn off etags in the future
2021-01-29 05:24:22 -07:00
plug(
Pleroma.Web.Plugs.InstanceStatic,
at: "/",
from: :pleroma,
only: ["emoji", "images"],
gzip: true,
cache_control_for_etags: "public, max-age=1209600",
headers: %{
"cache-control" => "public, max-age=1209600"
}
)
2020-06-24 01:03:10 -06:00
plug(Pleroma.Web.Plugs.InstanceStatic,
at: "/",
gzip: true,
cache_control_for_etags: @static_cache_control,
headers: %{
"cache-control" => @static_cache_control
}
)
# Careful! No `only` restriction here, as we don't know what frontends contain.
2020-09-02 01:29:36 -06:00
plug(Pleroma.Web.Plugs.FrontendStatic,
at: "/",
frontend_type: :primary,
gzip: true,
cache_control_for_etags: @static_cache_control,
headers: %{
"cache-control" => @static_cache_control
}
)
plug(Plug.Static.IndexHtml, at: "/pleroma/admin/")
2020-09-02 01:29:36 -06:00
plug(Pleroma.Web.Plugs.FrontendStatic,
at: "/pleroma/admin",
frontend_type: :admin,
gzip: true,
cache_control_for_etags: @static_cache_control,
headers: %{
"cache-control" => @static_cache_control
}
)
plug(Plug.Static.IndexHtml, at: "/akkoma/swaggerui")
plug(Pleroma.Web.Plugs.FrontendStatic,
at: "/akkoma/swaggerui",
frontend_type: :swagger,
gzip: true,
2022-07-14 03:48:27 -06:00
if: &Pleroma.Web.Swagger.ui_enabled?/0,
cache_control_for_etags: @static_cache_control,
headers: %{
"cache-control" => @static_cache_control
}
)
plug(Pleroma.Web.Plugs.FrontendStatic,
at: "/",
frontend_type: :mastodon,
gzip: true,
cache_control_for_etags: @static_cache_control,
headers: %{
"cache-control" => @static_cache_control
}
)
2019-07-09 05:30:15 -06:00
# Serve at "/" the static files from "priv/static" directory.
#
# You should set gzip to true if you are running phoenix.digest
# when deploying your static files in production.
2018-03-30 07:01:53 -06:00
plug(
Plug.Static,
at: "/",
from: :pleroma,
only: Pleroma.Web.static_paths(),
# JSON-LD is accepted by some servers for AP objects and activities,
# thus only enable it here instead of a global extension mapping
# (it's our only *.jsonld file anyway)
content_types: %{"litepub-0.1.jsonld" => "application/ld+json"},
# credo:disable-for-previous-line Credo.Check.Readability.MaxLineLength
gzip: true,
cache_control_for_etags: @static_cache_control,
headers: %{
"cache-control" => @static_cache_control
}
2018-03-30 07:01:53 -06:00
)
2017-03-17 10:09:58 -06:00
plug(Plug.Static,
at: "/pleroma/admin/",
from: {:pleroma, "priv/static/adminfe/"}
)
2017-03-17 10:09:58 -06:00
# Code reloading can be explicitly enabled under the
# :code_reloader configuration of your endpoint.
if code_reloading? do
2018-03-30 07:01:53 -06:00
plug(Phoenix.CodeReloader)
2017-03-17 10:09:58 -06:00
end
2020-06-24 00:05:23 -06:00
plug(Pleroma.Web.Plugs.TrailingFormatPlug)
2018-03-30 07:01:53 -06:00
plug(Plug.RequestId)
plug(Plug.Logger, log: :debug)
2017-03-17 10:09:58 -06:00
plug(Plug.Parsers,
parsers: [
:urlencoded,
Pleroma.Web.Plugs.Parsers.Multipart,
:json
],
pass: ["*/*"],
json_decoder: Jason,
length: Config.get([:instance, :upload_limit]),
body_reader: {Pleroma.Web.Plugs.DigestPlug, :read_body, []}
)
2017-03-17 10:09:58 -06:00
2018-03-30 07:01:53 -06:00
plug(Plug.MethodOverride)
plug(Plug.Head)
2017-03-17 10:09:58 -06:00
secure_cookies = Config.get([__MODULE__, :secure_cookie_flag])
2019-03-11 11:37:26 -06:00
cookie_name =
2019-03-11 11:37:26 -06:00
if secure_cookies,
do: "__Host-pleroma_key",
else: "pleroma_key"
extra =
Config.get([__MODULE__, :extra_cookie_attrs])
|> Enum.join(";")
2017-03-17 10:09:58 -06:00
# The session will be stored in the cookie and signed,
# this means its contents can be read but not tampered with.
# Set :encryption_salt if you would also like to encrypt it.
2018-03-30 07:01:53 -06:00
plug(
Plug.Session,
2017-03-17 10:09:58 -06:00
store: :cookie,
key: cookie_name,
signing_salt: Config.get([__MODULE__, :signing_salt], "CqaoopA2"),
2018-08-28 14:34:31 -06:00
http_only: true,
2019-03-11 11:37:26 -06:00
secure: secure_cookies,
extra: extra
2018-03-30 07:01:53 -06:00
)
2017-03-17 10:09:58 -06:00
2020-06-24 00:30:32 -06:00
plug(Pleroma.Web.Plugs.RemoteIp)
2019-01-30 08:32:30 -07:00
2018-03-30 07:01:53 -06:00
plug(Pleroma.Web.Router)
2017-03-17 10:09:58 -06:00
@doc """
Dynamically loads configuration from the system environment
on startup.
It receives the endpoint configuration from the config files
and must return the updated configuration.
"""
def load_from_system_env(config) do
port = System.get_env("PORT") || raise "expected the PORT environment variable to be set"
{:ok, Keyword.put(config, :http, [:inet6, port: port])}
end
def websocket_url do
String.replace_leading(url(), "http", "ws")
end
2017-03-17 10:09:58 -06:00
end