Mastodon uses the Sec-Websocket-Protocol header to send the auth token. It is not clear if this is a violation of the RFC, but Mastodon is not the first application in the wild to use this header for authentication purposes. Phoenix does not allow accessing this header, so we work around it temporarily with a minor patch to Phoenix 1.7.14. We will reach out to Phoenix to discuss how to make this use case possible.
196 lines
5.1 KiB
Elixir
196 lines
5.1 KiB
Elixir
# Pleroma: A lightweight social networking server
|
|
# Copyright © 2017-2022 Pleroma Authors <https://pleroma.social/>
|
|
# SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
defmodule Pleroma.Web.Endpoint do
|
|
use Phoenix.Endpoint, otp_app: :pleroma
|
|
|
|
require Pleroma.Constants
|
|
|
|
alias Pleroma.Config
|
|
|
|
socket("/api/v1/streaming", Pleroma.Web.MastodonAPI.WebsocketHandler,
|
|
longpoll: false,
|
|
websocket: [
|
|
path: "/",
|
|
compress: false,
|
|
connect_info: [:sec_websocket_protocol],
|
|
error_handler: {Pleroma.Web.MastodonAPI.WebsocketHandler, :handle_error, []},
|
|
fullsweep_after: 20
|
|
]
|
|
)
|
|
|
|
socket("/socket", Pleroma.Web.UserSocket,
|
|
websocket: [
|
|
path: "/websocket",
|
|
serializer: [
|
|
{Phoenix.Socket.V1.JSONSerializer, "~> 1.0.0"},
|
|
{Phoenix.Socket.V2.JSONSerializer, "~> 2.0.0"}
|
|
],
|
|
timeout: 60_000,
|
|
transport_log: false,
|
|
compress: false,
|
|
fullsweep_after: 20
|
|
],
|
|
longpoll: false
|
|
)
|
|
|
|
socket("/live", Phoenix.LiveView.Socket)
|
|
|
|
plug(Plug.Telemetry, event_prefix: [:phoenix, :endpoint])
|
|
|
|
plug(Pleroma.Web.Plugs.LoggerMetadataPath)
|
|
|
|
plug(Pleroma.Web.Plugs.SetLocalePlug)
|
|
plug(CORSPlug)
|
|
plug(Pleroma.Web.Plugs.HTTPSecurityPlug)
|
|
plug(Pleroma.Web.Plugs.UploadedMedia)
|
|
|
|
@static_cache_control "public, max-age=1209600"
|
|
@static_cache_disabled "public, no-cache"
|
|
|
|
# InstanceStatic needs to be before Plug.Static to be able to override shipped-static files
|
|
# If you're adding new paths to `only:` you'll need to configure them in InstanceStatic as well
|
|
# Cache-control headers are duplicated in case we turn off etags in the future
|
|
plug(
|
|
Pleroma.Web.Plugs.InstanceStatic,
|
|
at: "/",
|
|
from: :pleroma,
|
|
only: ["emoji", "images"],
|
|
gzip: true,
|
|
cache_control_for_etags: @static_cache_control,
|
|
headers: %{
|
|
"cache-control" => @static_cache_control
|
|
}
|
|
)
|
|
|
|
plug(Pleroma.Web.Plugs.InstanceStatic,
|
|
at: "/",
|
|
gzip: true,
|
|
cache_control_for_etags: @static_cache_disabled,
|
|
headers: %{
|
|
"cache-control" => @static_cache_disabled
|
|
}
|
|
)
|
|
|
|
plug(Pleroma.Web.Plugs.FrontendStatic,
|
|
at: "/",
|
|
frontend_type: :primary,
|
|
only: ["index.html"],
|
|
gzip: true,
|
|
cache_control_for_etags: @static_cache_disabled,
|
|
headers: %{
|
|
"cache-control" => @static_cache_disabled
|
|
}
|
|
)
|
|
|
|
plug(Pleroma.Web.Plugs.FrontendStatic,
|
|
at: "/",
|
|
frontend_type: :primary,
|
|
gzip: true,
|
|
cache_control_for_etags: @static_cache_control,
|
|
headers: %{
|
|
"cache-control" => @static_cache_control
|
|
}
|
|
)
|
|
|
|
plug(Plug.Static.IndexHtml, at: "/pleroma/admin/")
|
|
|
|
plug(Pleroma.Web.Plugs.FrontendStatic,
|
|
at: "/pleroma/admin",
|
|
frontend_type: :admin,
|
|
gzip: true,
|
|
cache_control_for_etags: @static_cache_disabled,
|
|
headers: %{
|
|
"cache-control" => @static_cache_disabled
|
|
}
|
|
)
|
|
|
|
# Serve at "/" the static files from "priv/static" directory.
|
|
#
|
|
# You should set gzip to true if you are running phoenix.digest
|
|
# when deploying your static files in production.
|
|
plug(
|
|
Plug.Static,
|
|
at: "/",
|
|
from: :pleroma,
|
|
only: Pleroma.Constants.static_only_files(),
|
|
# credo:disable-for-previous-line Credo.Check.Readability.MaxLineLength
|
|
gzip: true,
|
|
cache_control_for_etags: @static_cache_disabled,
|
|
headers: %{
|
|
"cache-control" => @static_cache_disabled
|
|
}
|
|
)
|
|
|
|
plug(Plug.Static,
|
|
at: "/pleroma/admin/",
|
|
from: {:pleroma, "priv/static/adminfe/"}
|
|
)
|
|
|
|
# Code reloading can be explicitly enabled under the
|
|
# :code_reloader configuration of your endpoint.
|
|
if code_reloading? do
|
|
plug(Phoenix.CodeReloader)
|
|
end
|
|
|
|
plug(Pleroma.Web.Plugs.TrailingFormatPlug)
|
|
plug(Plug.RequestId)
|
|
plug(Plug.Logger, log: :debug)
|
|
|
|
plug(Plug.Parsers,
|
|
parsers: [:urlencoded, Pleroma.Web.Multipart, :json],
|
|
pass: ["*/*"],
|
|
json_decoder: Jason,
|
|
# Note: this is compile-time only, won't work for database-config
|
|
length: Config.get([:instance, :upload_limit]),
|
|
body_reader: {Pleroma.Web.Plugs.DigestPlug, :read_body, []}
|
|
)
|
|
|
|
plug(Plug.MethodOverride)
|
|
plug(Plug.Head)
|
|
|
|
secure_cookies = Config.get([__MODULE__, :secure_cookie_flag])
|
|
|
|
cookie_name =
|
|
if secure_cookies,
|
|
do: "__Host-pleroma_key",
|
|
else: "pleroma_key"
|
|
|
|
extra =
|
|
Config.get([__MODULE__, :extra_cookie_attrs])
|
|
|> Enum.join(";")
|
|
|
|
# The session will be stored in the cookie and signed,
|
|
# this means its contents can be read but not tampered with.
|
|
# Set :encryption_salt if you would also like to encrypt it.
|
|
plug(
|
|
Plug.Session,
|
|
store: :cookie,
|
|
key: cookie_name,
|
|
signing_salt: Config.get([__MODULE__, :signing_salt], "CqaoopA2"),
|
|
http_only: true,
|
|
secure: secure_cookies,
|
|
extra: extra
|
|
)
|
|
|
|
plug(Pleroma.Web.Plugs.RemoteIp)
|
|
|
|
plug(Pleroma.Web.Router)
|
|
|
|
@doc """
|
|
Dynamically loads configuration from the system environment
|
|
on startup.
|
|
|
|
It receives the endpoint configuration from the config files
|
|
and must return the updated configuration.
|
|
"""
|
|
def load_from_system_env(config) do
|
|
port = System.get_env("PORT") || raise "expected the PORT environment variable to be set"
|
|
{:ok, Keyword.put(config, :http, [:inet6, port: port])}
|
|
end
|
|
|
|
def websocket_url do
|
|
String.replace_leading(url(), "http", "ws")
|
|
end
|
|
end
|