2024-10-23 05:25:30 +00:00
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
2024-11-11 19:55:01 +00:00
|
|
|
"context"
|
2024-10-23 05:25:30 +00:00
|
|
|
"fmt"
|
|
|
|
"net/http"
|
2024-11-11 19:55:01 +00:00
|
|
|
|
|
|
|
"github.com/justinas/nosurf"
|
2024-10-23 05:25:30 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
func (app *application) logRequest (next http.Handler) http.Handler {
|
|
|
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
var (
|
|
|
|
ip = r.RemoteAddr
|
|
|
|
proto = r.Proto
|
|
|
|
method = r.Method
|
|
|
|
uri = r.URL.RequestURI()
|
|
|
|
)
|
|
|
|
app.logger.Info("received request", "ip", ip, "proto", proto, "method", method, "uri", uri)
|
|
|
|
next.ServeHTTP(w, r)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func commonHeaders (next http.Handler) http.Handler {
|
|
|
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
w.Header().Set("Content-Security-Policy", "default-src 'self'; style-src 'self' fonts.googleapis.com; font-src fonts.gstatic.com")
|
|
|
|
w.Header().Set("Referrer-Policy", "origin-when-cross-origin")
|
|
|
|
w.Header().Set("X-Content-Type-Options", "nosniff")
|
2024-11-11 19:55:01 +00:00
|
|
|
// w.Header().Set("X-Frame-Options", "deny")
|
2024-10-23 05:25:30 +00:00
|
|
|
w.Header().Set("X-XSS-Protection", "0")
|
|
|
|
next.ServeHTTP(w, r)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func (app *application) recoverPanic(next http.Handler) http.Handler {
|
|
|
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
defer func() {
|
|
|
|
if err := recover(); err != nil {
|
|
|
|
w.Header().Set("Connection", "close")
|
|
|
|
app.serverError(w, r, fmt.Errorf("%s", err))
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
next.ServeHTTP(w, r)
|
|
|
|
})
|
|
|
|
}
|
2024-11-11 19:55:01 +00:00
|
|
|
|
|
|
|
func (app *application) requireAuthentication(next http.Handler) http.Handler {
|
|
|
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
if !app.isAuthenticated(r) {
|
|
|
|
http.Redirect(w, r, "/users/login", http.StatusSeeOther)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
w.Header().Add("Cache-Control", "no-store")
|
|
|
|
next.ServeHTTP(w, r)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func noSurf(next http.Handler) http.Handler {
|
|
|
|
csrfHandler := nosurf.New(next)
|
|
|
|
csrfHandler.SetBaseCookie(http.Cookie{
|
|
|
|
HttpOnly: true,
|
|
|
|
Path: "/",
|
|
|
|
Secure: true,
|
|
|
|
})
|
|
|
|
|
|
|
|
return csrfHandler
|
|
|
|
}
|
|
|
|
|
|
|
|
func (app *application) authenticate(next http.Handler) http.Handler {
|
|
|
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
id := app.sessionManager.GetInt64(r.Context(), "authenticatedUserId")
|
|
|
|
if id == 0 {
|
|
|
|
next.ServeHTTP(w, r)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
exists, err := app.users.Exists(id)
|
|
|
|
if err != nil {
|
|
|
|
app.serverError(w, r, err)
|
|
|
|
return
|
|
|
|
}
|
2024-12-15 17:23:53 +00:00
|
|
|
user, err := app.users.GetById(id)
|
|
|
|
if err != nil {
|
|
|
|
app.serverError(w, r, err)
|
|
|
|
return
|
|
|
|
}
|
2024-11-11 19:55:01 +00:00
|
|
|
if exists {
|
|
|
|
ctx := context.WithValue(r.Context(), isAuthenticatedContextKey, true)
|
2024-12-15 17:23:53 +00:00
|
|
|
ctx = context.WithValue(ctx, userNameContextKey, user)
|
2024-11-11 19:55:01 +00:00
|
|
|
r = r.WithContext(ctx)
|
|
|
|
}
|
|
|
|
next.ServeHTTP(w, r)
|
|
|
|
})
|
|
|
|
}
|