2014-08-29 21:49:50 +04:00
|
|
|
// Copyright 2014 Manu Martinez-Almeida. All rights reserved.
|
|
|
|
// Use of this source code is governed by a MIT style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
2014-06-18 03:42:34 +04:00
|
|
|
package gin
|
|
|
|
|
|
|
|
import (
|
2018-11-06 05:28:51 +03:00
|
|
|
"fmt"
|
2014-06-18 03:42:34 +04:00
|
|
|
"html/template"
|
2015-05-19 01:45:08 +03:00
|
|
|
"net"
|
2014-06-18 03:42:34 +04:00
|
|
|
"net/http"
|
2015-05-19 01:45:08 +03:00
|
|
|
"os"
|
2019-02-27 14:56:29 +03:00
|
|
|
"path"
|
2021-04-06 06:37:25 +03:00
|
|
|
"strings"
|
2014-07-06 23:09:23 +04:00
|
|
|
"sync"
|
2015-03-23 06:41:29 +03:00
|
|
|
|
2020-01-17 19:32:50 +03:00
|
|
|
"github.com/gin-gonic/gin/internal/bytesconv"
|
2015-03-23 06:41:29 +03:00
|
|
|
"github.com/gin-gonic/gin/render"
|
2014-06-18 03:42:34 +04:00
|
|
|
)
|
|
|
|
|
2018-09-17 10:08:11 +03:00
|
|
|
const defaultMultipartMemory = 32 << 20 // 32 MB
|
2015-05-22 17:55:16 +03:00
|
|
|
|
2017-09-28 17:54:37 +03:00
|
|
|
var (
|
2020-05-04 06:40:41 +03:00
|
|
|
default404Body = []byte("404 page not found")
|
|
|
|
default405Body = []byte("405 method not allowed")
|
2017-09-28 17:54:37 +03:00
|
|
|
)
|
2014-06-18 03:42:34 +04:00
|
|
|
|
2021-06-24 03:58:10 +03:00
|
|
|
var defaultPlatform string
|
2020-05-04 06:40:41 +03:00
|
|
|
|
2018-09-15 10:21:54 +03:00
|
|
|
// HandlerFunc defines the handler used by gin middleware as return value.
|
2015-06-26 17:05:09 +03:00
|
|
|
type HandlerFunc func(*Context)
|
2018-09-15 10:21:54 +03:00
|
|
|
|
|
|
|
// HandlersChain defines a HandlerFunc array.
|
2015-06-26 17:05:09 +03:00
|
|
|
type HandlersChain []HandlerFunc
|
|
|
|
|
2019-10-31 06:13:39 +03:00
|
|
|
// Last returns the last handler in the chain. ie. the last handler is the main one.
|
2015-06-26 17:05:09 +03:00
|
|
|
func (c HandlersChain) Last() HandlerFunc {
|
2017-07-06 17:49:54 +03:00
|
|
|
if length := len(c); length > 0 {
|
2015-06-26 17:05:09 +03:00
|
|
|
return c[length-1]
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2018-09-15 10:21:54 +03:00
|
|
|
// RouteInfo represents a request route's specification which contains method and path and its handler.
|
2017-07-05 10:47:36 +03:00
|
|
|
type RouteInfo struct {
|
2018-10-23 05:56:33 +03:00
|
|
|
Method string
|
|
|
|
Path string
|
|
|
|
Handler string
|
|
|
|
HandlerFunc HandlerFunc
|
2017-07-05 10:47:36 +03:00
|
|
|
}
|
2014-06-18 03:42:34 +04:00
|
|
|
|
2018-09-15 10:21:54 +03:00
|
|
|
// RoutesInfo defines a RouteInfo array.
|
2017-07-05 10:47:36 +03:00
|
|
|
type RoutesInfo []RouteInfo
|
|
|
|
|
2021-06-24 03:58:10 +03:00
|
|
|
// Trusted platforms
|
|
|
|
const (
|
|
|
|
// When running on Google App Engine. Trust X-Appengine-Remote-Addr
|
|
|
|
// for determining the client's IP
|
|
|
|
PlatformGoogleAppEngine = "google-app-engine"
|
|
|
|
// When using Cloudflare's CDN. Trust CF-Connecting-IP for determining
|
|
|
|
// the client's IP
|
|
|
|
PlatformCloudflare = "cloudflare"
|
|
|
|
)
|
|
|
|
|
2017-07-05 10:47:36 +03:00
|
|
|
// Engine is the framework's instance, it contains the muxer, middleware and configuration settings.
|
|
|
|
// Create an instance of Engine, by using New() or Default()
|
|
|
|
type Engine struct {
|
|
|
|
RouterGroup
|
|
|
|
|
|
|
|
// Enables automatic redirection if the current route can't be matched but a
|
|
|
|
// handler for the path with (without) the trailing slash exists.
|
|
|
|
// For example if /foo/ is requested but a route only exists for /foo, the
|
|
|
|
// client is redirected to /foo with http status code 301 for GET requests
|
|
|
|
// and 307 for all other request methods.
|
|
|
|
RedirectTrailingSlash bool
|
|
|
|
|
|
|
|
// If enabled, the router tries to fix the current request path, if no
|
|
|
|
// handle is registered for it.
|
|
|
|
// First superfluous path elements like ../ or // are removed.
|
|
|
|
// Afterwards the router does a case-insensitive lookup of the cleaned path.
|
|
|
|
// If a handle can be found for this route, the router makes a redirection
|
|
|
|
// to the corrected path with status code 301 for GET requests and 307 for
|
|
|
|
// all other request methods.
|
|
|
|
// For example /FOO and /..//Foo could be redirected to /foo.
|
|
|
|
// RedirectTrailingSlash is independent of this option.
|
|
|
|
RedirectFixedPath bool
|
|
|
|
|
|
|
|
// If enabled, the router checks if another method is allowed for the
|
|
|
|
// current route, if the current request can not be routed.
|
|
|
|
// If this is the case, the request is answered with 'Method Not Allowed'
|
|
|
|
// and HTTP status code 405.
|
|
|
|
// If no other Method is allowed, the request is delegated to the NotFound
|
|
|
|
// handler.
|
|
|
|
HandleMethodNotAllowed bool
|
|
|
|
|
2021-04-06 06:37:25 +03:00
|
|
|
// If enabled, client IP will be parsed from the request's headers that
|
|
|
|
// match those stored at `(*gin.Engine).RemoteIPHeaders`. If no IP was
|
|
|
|
// fetched, it falls back to the IP obtained from
|
|
|
|
// `(*gin.Context).Request.RemoteAddr`.
|
|
|
|
ForwardedByClientIP bool
|
|
|
|
|
|
|
|
// List of headers used to obtain the client IP when
|
|
|
|
// `(*gin.Engine).ForwardedByClientIP` is `true` and
|
|
|
|
// `(*gin.Context).Request.RemoteAddr` is matched by at least one of the
|
|
|
|
// network origins of `(*gin.Engine).TrustedProxies`.
|
|
|
|
RemoteIPHeaders []string
|
|
|
|
|
|
|
|
// List of network origins (IPv4 addresses, IPv4 CIDRs, IPv6 addresses or
|
|
|
|
// IPv6 CIDRs) from which to trust request's headers that contain
|
|
|
|
// alternative client IP when `(*gin.Engine).ForwardedByClientIP` is
|
|
|
|
// `true`.
|
|
|
|
TrustedProxies []string
|
|
|
|
|
2021-06-24 03:58:10 +03:00
|
|
|
// If set to a constant of value gin.Platform*, trusts the headers set by
|
|
|
|
// that platform, for example to determine the client IP
|
|
|
|
TrustedPlatform string
|
|
|
|
|
|
|
|
// DEPRECATED: USE `TrustedPlatform` WITH VALUE `gin.GoogleAppEngine` INSTEAD
|
2021-04-06 06:37:25 +03:00
|
|
|
// #726 #755 If enabled, it will trust some headers starting with
|
2017-07-05 10:47:36 +03:00
|
|
|
// 'X-AppEngine...' for better integration with that PaaS.
|
|
|
|
AppEngine bool
|
|
|
|
|
|
|
|
// If enabled, the url.RawPath will be used to find parameters.
|
|
|
|
UseRawPath bool
|
2017-09-28 17:54:37 +03:00
|
|
|
|
2017-07-05 10:47:36 +03:00
|
|
|
// If true, the path value will be unescaped.
|
|
|
|
// If UseRawPath is false (by default), the UnescapePathValues effectively is true,
|
|
|
|
// as url.Path gonna be used, which is already unescaped.
|
|
|
|
UnescapePathValues bool
|
2017-09-07 06:45:16 +03:00
|
|
|
|
|
|
|
// Value of 'maxMemory' param that is given to http.Request's ParseMultipartForm
|
|
|
|
// method call.
|
|
|
|
MaxMultipartMemory int64
|
2017-11-29 05:50:14 +03:00
|
|
|
|
2019-11-28 19:02:02 +03:00
|
|
|
// RemoveExtraSlash a parameter can be parsed from the URL even with extra slashes.
|
|
|
|
// See the PR #1817 and issue #1644
|
|
|
|
RemoveExtraSlash bool
|
|
|
|
|
2017-11-29 05:50:14 +03:00
|
|
|
delims render.Delims
|
2020-05-05 08:55:57 +03:00
|
|
|
secureJSONPrefix string
|
2017-11-29 05:50:14 +03:00
|
|
|
HTMLRender render.HTMLRender
|
|
|
|
FuncMap template.FuncMap
|
|
|
|
allNoRoute HandlersChain
|
|
|
|
allNoMethod HandlersChain
|
|
|
|
noRoute HandlersChain
|
|
|
|
noMethod HandlersChain
|
|
|
|
pool sync.Pool
|
|
|
|
trees methodTrees
|
2020-05-10 08:22:25 +03:00
|
|
|
maxParams uint16
|
2021-04-06 06:37:25 +03:00
|
|
|
trustedCIDRs []*net.IPNet
|
2017-07-05 10:47:36 +03:00
|
|
|
}
|
2014-06-18 03:42:34 +04:00
|
|
|
|
2015-07-02 21:24:54 +03:00
|
|
|
var _ IRouter = &Engine{}
|
2015-06-26 17:01:35 +03:00
|
|
|
|
2015-07-02 21:24:54 +03:00
|
|
|
// New returns a new blank Engine instance without any middleware attached.
|
|
|
|
// By default the configuration is:
|
|
|
|
// - RedirectTrailingSlash: true
|
|
|
|
// - RedirectFixedPath: false
|
|
|
|
// - HandleMethodNotAllowed: false
|
|
|
|
// - ForwardedByClientIP: true
|
2017-02-28 13:29:41 +03:00
|
|
|
// - UseRawPath: false
|
|
|
|
// - UnescapePathValues: true
|
2014-07-06 23:09:23 +04:00
|
|
|
func New() *Engine {
|
2015-07-02 21:24:54 +03:00
|
|
|
debugPrintWARNINGNew()
|
2015-03-31 22:39:06 +03:00
|
|
|
engine := &Engine{
|
2015-04-07 13:22:38 +03:00
|
|
|
RouterGroup: RouterGroup{
|
2015-05-16 19:08:19 +03:00
|
|
|
Handlers: nil,
|
2015-07-08 05:27:23 +03:00
|
|
|
basePath: "/",
|
2015-06-11 02:02:38 +03:00
|
|
|
root: true,
|
2015-04-07 13:22:38 +03:00
|
|
|
},
|
2017-06-30 22:22:40 +03:00
|
|
|
FuncMap: template.FuncMap{},
|
2015-03-31 22:39:06 +03:00
|
|
|
RedirectTrailingSlash: true,
|
2015-05-30 15:45:13 +03:00
|
|
|
RedirectFixedPath: false,
|
|
|
|
HandleMethodNotAllowed: false,
|
2015-06-07 14:51:13 +03:00
|
|
|
ForwardedByClientIP: true,
|
2021-04-06 06:37:25 +03:00
|
|
|
RemoteIPHeaders: []string{"X-Forwarded-For", "X-Real-IP"},
|
|
|
|
TrustedProxies: []string{"0.0.0.0/0"},
|
2021-06-24 03:58:10 +03:00
|
|
|
TrustedPlatform: defaultPlatform,
|
2017-02-28 13:29:41 +03:00
|
|
|
UseRawPath: false,
|
2019-11-28 19:02:02 +03:00
|
|
|
RemoveExtraSlash: false,
|
2017-02-28 13:29:41 +03:00
|
|
|
UnescapePathValues: true,
|
2017-09-07 06:45:16 +03:00
|
|
|
MaxMultipartMemory: defaultMultipartMemory,
|
2015-06-07 14:51:13 +03:00
|
|
|
trees: make(methodTrees, 0, 9),
|
2017-08-02 18:00:10 +03:00
|
|
|
delims: render.Delims{Left: "{{", Right: "}}"},
|
2020-05-05 08:55:57 +03:00
|
|
|
secureJSONPrefix: "while(1);",
|
2015-03-31 22:39:06 +03:00
|
|
|
}
|
2015-04-07 13:22:38 +03:00
|
|
|
engine.RouterGroup.engine = engine
|
2014-10-08 23:37:26 +04:00
|
|
|
engine.pool.New = func() interface{} {
|
2015-03-25 21:33:17 +03:00
|
|
|
return engine.allocateContext()
|
2014-07-02 22:17:57 +04:00
|
|
|
}
|
2014-06-18 03:42:34 +04:00
|
|
|
return engine
|
|
|
|
}
|
|
|
|
|
2015-07-02 21:24:54 +03:00
|
|
|
// Default returns an Engine instance with the Logger and Recovery middleware already attached.
|
2014-06-18 03:42:34 +04:00
|
|
|
func Default() *Engine {
|
2017-09-29 06:58:57 +03:00
|
|
|
debugPrintWARNINGDefault()
|
2014-06-18 03:42:34 +04:00
|
|
|
engine := New()
|
2016-01-26 20:35:56 +03:00
|
|
|
engine.Use(Logger(), Recovery())
|
2014-06-18 03:42:34 +04:00
|
|
|
return engine
|
|
|
|
}
|
|
|
|
|
2015-06-07 14:51:13 +03:00
|
|
|
func (engine *Engine) allocateContext() *Context {
|
2020-05-10 08:22:25 +03:00
|
|
|
v := make(Params, 0, engine.maxParams)
|
|
|
|
return &Context{engine: engine, params: &v}
|
2015-03-25 21:33:17 +03:00
|
|
|
}
|
|
|
|
|
2018-09-15 10:21:54 +03:00
|
|
|
// Delims sets template left and right delims and returns a Engine instance.
|
2017-05-29 11:03:49 +03:00
|
|
|
func (engine *Engine) Delims(left, right string) *Engine {
|
2017-08-02 18:00:10 +03:00
|
|
|
engine.delims = render.Delims{Left: left, Right: right}
|
2017-05-29 11:03:49 +03:00
|
|
|
return engine
|
|
|
|
}
|
|
|
|
|
2020-05-05 08:55:57 +03:00
|
|
|
// SecureJsonPrefix sets the secureJSONPrefix used in Context.SecureJSON.
|
2017-07-07 20:21:30 +03:00
|
|
|
func (engine *Engine) SecureJsonPrefix(prefix string) *Engine {
|
2020-05-05 08:55:57 +03:00
|
|
|
engine.secureJSONPrefix = prefix
|
2017-07-07 20:21:30 +03:00
|
|
|
return engine
|
|
|
|
}
|
|
|
|
|
2017-12-29 12:10:28 +03:00
|
|
|
// LoadHTMLGlob loads HTML files identified by glob pattern
|
|
|
|
// and associates the result with HTML renderer.
|
2014-07-15 19:41:56 +04:00
|
|
|
func (engine *Engine) LoadHTMLGlob(pattern string) {
|
2017-09-28 17:54:37 +03:00
|
|
|
left := engine.delims.Left
|
|
|
|
right := engine.delims.Right
|
2018-07-02 06:06:56 +03:00
|
|
|
templ := template.Must(template.New("").Delims(left, right).Funcs(engine.FuncMap).ParseGlob(pattern))
|
2017-09-28 17:54:37 +03:00
|
|
|
|
2014-10-08 23:37:26 +04:00
|
|
|
if IsDebugging() {
|
2018-07-02 06:06:56 +03:00
|
|
|
debugPrintLoadTemplate(templ)
|
2017-06-30 22:22:40 +03:00
|
|
|
engine.HTMLRender = render.HTMLDebug{Glob: pattern, FuncMap: engine.FuncMap, Delims: engine.delims}
|
2017-07-18 04:11:53 +03:00
|
|
|
return
|
2014-08-21 03:04:35 +04:00
|
|
|
}
|
2017-07-19 15:49:18 +03:00
|
|
|
|
2017-07-18 04:11:53 +03:00
|
|
|
engine.SetHTMLTemplate(templ)
|
2014-07-15 19:41:56 +04:00
|
|
|
}
|
|
|
|
|
2017-12-29 12:10:28 +03:00
|
|
|
// LoadHTMLFiles loads a slice of HTML files
|
|
|
|
// and associates the result with HTML renderer.
|
2014-07-15 19:41:56 +04:00
|
|
|
func (engine *Engine) LoadHTMLFiles(files ...string) {
|
2014-10-08 23:37:26 +04:00
|
|
|
if IsDebugging() {
|
2017-06-30 22:22:40 +03:00
|
|
|
engine.HTMLRender = render.HTMLDebug{Files: files, FuncMap: engine.FuncMap, Delims: engine.delims}
|
2017-07-18 04:11:53 +03:00
|
|
|
return
|
2014-08-21 03:04:35 +04:00
|
|
|
}
|
2017-07-19 15:49:18 +03:00
|
|
|
|
2017-07-18 04:11:53 +03:00
|
|
|
templ := template.Must(template.New("").Delims(engine.delims.Left, engine.delims.Right).Funcs(engine.FuncMap).ParseFiles(files...))
|
|
|
|
engine.SetHTMLTemplate(templ)
|
2014-08-21 03:04:35 +04:00
|
|
|
}
|
|
|
|
|
2017-12-29 12:10:28 +03:00
|
|
|
// SetHTMLTemplate associate a template with HTML renderer.
|
2014-08-21 03:04:35 +04:00
|
|
|
func (engine *Engine) SetHTMLTemplate(templ *template.Template) {
|
2015-06-12 19:09:44 +03:00
|
|
|
if len(engine.trees) > 0 {
|
2015-07-02 21:24:54 +03:00
|
|
|
debugPrintWARNINGSetHTMLTemplate()
|
2015-06-12 19:09:44 +03:00
|
|
|
}
|
2017-05-29 11:03:49 +03:00
|
|
|
|
2017-06-30 22:22:40 +03:00
|
|
|
engine.HTMLRender = render.HTMLProduction{Template: templ.Funcs(engine.FuncMap)}
|
|
|
|
}
|
|
|
|
|
2017-12-29 12:10:28 +03:00
|
|
|
// SetFuncMap sets the FuncMap used for template.FuncMap.
|
2017-06-30 22:22:40 +03:00
|
|
|
func (engine *Engine) SetFuncMap(funcMap template.FuncMap) {
|
|
|
|
engine.FuncMap = funcMap
|
2014-06-18 03:42:34 +04:00
|
|
|
}
|
|
|
|
|
2016-04-15 02:16:46 +03:00
|
|
|
// NoRoute adds handlers for NoRoute. It return a 404 code by default.
|
2014-07-18 01:42:23 +04:00
|
|
|
func (engine *Engine) NoRoute(handlers ...HandlerFunc) {
|
2014-07-18 02:29:44 +04:00
|
|
|
engine.noRoute = handlers
|
2014-10-08 23:37:26 +04:00
|
|
|
engine.rebuild404Handlers()
|
2014-07-18 02:29:44 +04:00
|
|
|
}
|
|
|
|
|
2017-08-16 06:55:50 +03:00
|
|
|
// NoMethod sets the handlers called when... TODO.
|
2015-03-09 02:37:27 +03:00
|
|
|
func (engine *Engine) NoMethod(handlers ...HandlerFunc) {
|
|
|
|
engine.noMethod = handlers
|
|
|
|
engine.rebuild405Handlers()
|
|
|
|
}
|
|
|
|
|
2019-03-05 04:41:37 +03:00
|
|
|
// Use attaches a global middleware to the router. ie. the middleware attached though Use() will be
|
2015-05-29 22:03:41 +03:00
|
|
|
// included in the handlers chain for every single request. Even 404, 405, static files...
|
|
|
|
// For example, this is the right place for a logger or error management middleware.
|
2015-08-16 19:38:13 +03:00
|
|
|
func (engine *Engine) Use(middleware ...HandlerFunc) IRoutes {
|
2015-07-03 21:12:01 +03:00
|
|
|
engine.RouterGroup.Use(middleware...)
|
2014-10-08 23:37:26 +04:00
|
|
|
engine.rebuild404Handlers()
|
2015-03-09 02:37:27 +03:00
|
|
|
engine.rebuild405Handlers()
|
2015-06-11 02:02:38 +03:00
|
|
|
return engine
|
2014-10-08 23:37:26 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
func (engine *Engine) rebuild404Handlers() {
|
2015-03-25 18:53:58 +03:00
|
|
|
engine.allNoRoute = engine.combineHandlers(engine.noRoute)
|
2015-03-09 02:37:27 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
func (engine *Engine) rebuild405Handlers() {
|
2015-03-25 18:53:58 +03:00
|
|
|
engine.allNoMethod = engine.combineHandlers(engine.noMethod)
|
2014-06-18 03:42:34 +04:00
|
|
|
}
|
|
|
|
|
2015-05-20 00:22:35 +03:00
|
|
|
func (engine *Engine) addRoute(method, path string, handlers HandlersChain) {
|
2016-01-28 02:35:09 +03:00
|
|
|
assert1(path[0] == '/', "path must begin with '/'")
|
2017-09-28 19:22:35 +03:00
|
|
|
assert1(method != "", "HTTP method can not be empty")
|
2016-01-28 02:35:09 +03:00
|
|
|
assert1(len(handlers) > 0, "there must be at least one handler")
|
2015-04-09 13:15:02 +03:00
|
|
|
|
2016-01-28 02:35:09 +03:00
|
|
|
debugPrintRoute(method, path, handlers)
|
2020-05-10 08:22:25 +03:00
|
|
|
|
2015-06-04 02:54:36 +03:00
|
|
|
root := engine.trees.get(method)
|
2015-03-31 22:39:06 +03:00
|
|
|
if root == nil {
|
|
|
|
root = new(node)
|
2019-05-26 03:20:21 +03:00
|
|
|
root.fullPath = "/"
|
2016-01-28 02:35:09 +03:00
|
|
|
engine.trees = append(engine.trees, methodTree{method: method, root: root})
|
2015-03-31 22:39:06 +03:00
|
|
|
}
|
|
|
|
root.addRoute(path, handlers)
|
2020-05-10 08:22:25 +03:00
|
|
|
|
|
|
|
// Update maxParams
|
|
|
|
if paramsCount := countParams(path); paramsCount > engine.maxParams {
|
|
|
|
engine.maxParams = paramsCount
|
|
|
|
}
|
2015-03-09 02:37:27 +03:00
|
|
|
}
|
|
|
|
|
2015-07-02 21:24:54 +03:00
|
|
|
// Routes returns a slice of registered routes, including some useful information, such as:
|
|
|
|
// the http method, path and the handler name.
|
2015-06-18 18:17:22 +03:00
|
|
|
func (engine *Engine) Routes() (routes RoutesInfo) {
|
2015-06-07 05:20:39 +03:00
|
|
|
for _, tree := range engine.trees {
|
2015-06-07 14:49:36 +03:00
|
|
|
routes = iterate("", tree.method, routes, tree.root)
|
2015-06-07 05:20:39 +03:00
|
|
|
}
|
|
|
|
return routes
|
|
|
|
}
|
|
|
|
|
2015-06-18 18:17:22 +03:00
|
|
|
func iterate(path, method string, routes RoutesInfo, root *node) RoutesInfo {
|
2015-06-07 05:20:39 +03:00
|
|
|
path += root.path
|
2015-06-07 14:49:36 +03:00
|
|
|
if len(root.handlers) > 0 {
|
2018-10-23 05:56:33 +03:00
|
|
|
handlerFunc := root.handlers.Last()
|
2015-06-07 14:49:36 +03:00
|
|
|
routes = append(routes, RouteInfo{
|
2018-10-23 05:56:33 +03:00
|
|
|
Method: method,
|
|
|
|
Path: path,
|
|
|
|
Handler: nameOfFunction(handlerFunc),
|
|
|
|
HandlerFunc: handlerFunc,
|
2015-06-07 14:49:36 +03:00
|
|
|
})
|
2015-06-07 05:20:39 +03:00
|
|
|
}
|
2015-07-02 19:42:33 +03:00
|
|
|
for _, child := range root.children {
|
|
|
|
routes = iterate(path, method, routes, child)
|
2015-06-07 05:20:39 +03:00
|
|
|
}
|
|
|
|
return routes
|
|
|
|
}
|
|
|
|
|
2015-07-02 21:24:54 +03:00
|
|
|
// Run attaches the router to a http.Server and starts listening and serving HTTP requests.
|
2015-05-29 22:03:41 +03:00
|
|
|
// It is a shortcut for http.ListenAndServe(addr, router)
|
2015-11-04 11:03:57 +03:00
|
|
|
// Note: this method will block the calling goroutine indefinitely unless an error happens.
|
2015-08-16 17:19:51 +03:00
|
|
|
func (engine *Engine) Run(addr ...string) (err error) {
|
2015-05-19 01:45:08 +03:00
|
|
|
defer func() { debugPrintError(err) }()
|
2015-05-09 04:34:43 +03:00
|
|
|
|
2021-05-25 08:47:35 +03:00
|
|
|
err = engine.parseTrustedProxies()
|
2021-04-06 06:37:25 +03:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2021-05-25 08:47:35 +03:00
|
|
|
|
2015-08-16 17:19:51 +03:00
|
|
|
address := resolveAddress(addr)
|
|
|
|
debugPrint("Listening and serving HTTP on %s\n", address)
|
|
|
|
err = http.ListenAndServe(address, engine)
|
2015-05-09 04:34:43 +03:00
|
|
|
return
|
2015-04-07 13:22:38 +03:00
|
|
|
}
|
|
|
|
|
2021-04-06 06:37:25 +03:00
|
|
|
func (engine *Engine) prepareTrustedCIDRs() ([]*net.IPNet, error) {
|
|
|
|
if engine.TrustedProxies == nil {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
cidr := make([]*net.IPNet, 0, len(engine.TrustedProxies))
|
|
|
|
for _, trustedProxy := range engine.TrustedProxies {
|
|
|
|
if !strings.Contains(trustedProxy, "/") {
|
|
|
|
ip := parseIP(trustedProxy)
|
|
|
|
if ip == nil {
|
|
|
|
return cidr, &net.ParseError{Type: "IP address", Text: trustedProxy}
|
|
|
|
}
|
|
|
|
|
|
|
|
switch len(ip) {
|
|
|
|
case net.IPv4len:
|
|
|
|
trustedProxy += "/32"
|
|
|
|
case net.IPv6len:
|
|
|
|
trustedProxy += "/128"
|
|
|
|
}
|
|
|
|
}
|
|
|
|
_, cidrNet, err := net.ParseCIDR(trustedProxy)
|
|
|
|
if err != nil {
|
|
|
|
return cidr, err
|
|
|
|
}
|
|
|
|
cidr = append(cidr, cidrNet)
|
|
|
|
}
|
|
|
|
return cidr, nil
|
|
|
|
}
|
|
|
|
|
2021-05-25 08:47:35 +03:00
|
|
|
// SetTrustedProxies set Engine.TrustedProxies
|
|
|
|
func (engine *Engine) SetTrustedProxies(trustedProxies []string) error {
|
|
|
|
engine.TrustedProxies = trustedProxies
|
|
|
|
return engine.parseTrustedProxies()
|
|
|
|
}
|
|
|
|
|
|
|
|
// parseTrustedProxies parse Engine.TrustedProxies to Engine.trustedCIDRs
|
|
|
|
func (engine *Engine) parseTrustedProxies() error {
|
|
|
|
trustedCIDRs, err := engine.prepareTrustedCIDRs()
|
|
|
|
engine.trustedCIDRs = trustedCIDRs
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2021-04-06 06:37:25 +03:00
|
|
|
// parseIP parse a string representation of an IP and returns a net.IP with the
|
|
|
|
// minimum byte representation or nil if input is invalid.
|
|
|
|
func parseIP(ip string) net.IP {
|
|
|
|
parsedIP := net.ParseIP(ip)
|
|
|
|
|
|
|
|
if ipv4 := parsedIP.To4(); ipv4 != nil {
|
|
|
|
// return ip in a 4-byte representation
|
|
|
|
return ipv4
|
|
|
|
}
|
|
|
|
|
|
|
|
// return ip in a 16-byte representation or nil
|
|
|
|
return parsedIP
|
|
|
|
}
|
|
|
|
|
2015-07-02 21:24:54 +03:00
|
|
|
// RunTLS attaches the router to a http.Server and starts listening and serving HTTPS (secure) requests.
|
2015-05-29 22:03:41 +03:00
|
|
|
// It is a shortcut for http.ListenAndServeTLS(addr, certFile, keyFile, router)
|
2015-11-04 11:03:57 +03:00
|
|
|
// Note: this method will block the calling goroutine indefinitely unless an error happens.
|
2017-08-14 07:21:05 +03:00
|
|
|
func (engine *Engine) RunTLS(addr, certFile, keyFile string) (err error) {
|
2015-04-07 13:22:38 +03:00
|
|
|
debugPrint("Listening and serving HTTPS on %s\n", addr)
|
2015-05-19 01:45:08 +03:00
|
|
|
defer func() { debugPrintError(err) }()
|
2015-05-09 04:34:43 +03:00
|
|
|
|
2021-05-25 08:47:35 +03:00
|
|
|
err = engine.parseTrustedProxies()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2015-05-28 04:02:53 +03:00
|
|
|
err = http.ListenAndServeTLS(addr, certFile, keyFile, engine)
|
2015-05-09 04:34:43 +03:00
|
|
|
return
|
2015-04-07 13:22:38 +03:00
|
|
|
}
|
|
|
|
|
2015-07-02 21:24:54 +03:00
|
|
|
// RunUnix attaches the router to a http.Server and starts listening and serving HTTP requests
|
|
|
|
// through the specified unix socket (ie. a file).
|
2015-11-04 11:03:57 +03:00
|
|
|
// Note: this method will block the calling goroutine indefinitely unless an error happens.
|
2015-05-19 01:45:08 +03:00
|
|
|
func (engine *Engine) RunUnix(file string) (err error) {
|
|
|
|
debugPrint("Listening and serving HTTP on unix:/%s", file)
|
|
|
|
defer func() { debugPrintError(err) }()
|
|
|
|
|
2021-05-25 08:47:35 +03:00
|
|
|
err = engine.parseTrustedProxies()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2015-05-19 01:48:19 +03:00
|
|
|
listener, err := net.Listen("unix", file)
|
2015-05-19 01:45:08 +03:00
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
defer listener.Close()
|
2020-03-16 17:36:15 +03:00
|
|
|
defer os.Remove(file)
|
|
|
|
|
2015-05-19 01:45:08 +03:00
|
|
|
err = http.Serve(listener, engine)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2018-11-06 05:28:51 +03:00
|
|
|
// RunFd attaches the router to a http.Server and starts listening and serving HTTP requests
|
|
|
|
// through the specified file descriptor.
|
|
|
|
// Note: this method will block the calling goroutine indefinitely unless an error happens.
|
|
|
|
func (engine *Engine) RunFd(fd int) (err error) {
|
|
|
|
debugPrint("Listening and serving HTTP on fd@%d", fd)
|
|
|
|
defer func() { debugPrintError(err) }()
|
|
|
|
|
2021-05-25 08:47:35 +03:00
|
|
|
err = engine.parseTrustedProxies()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2018-11-06 05:28:51 +03:00
|
|
|
f := os.NewFile(uintptr(fd), fmt.Sprintf("fd@%d", fd))
|
|
|
|
listener, err := net.FileListener(f)
|
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
defer listener.Close()
|
2019-09-30 04:12:22 +03:00
|
|
|
err = engine.RunListener(listener)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// RunListener attaches the router to a http.Server and starts listening and serving HTTP requests
|
|
|
|
// through the specified net.Listener
|
|
|
|
func (engine *Engine) RunListener(listener net.Listener) (err error) {
|
|
|
|
debugPrint("Listening and serving HTTP on listener what's bind with address@%s", listener.Addr())
|
|
|
|
defer func() { debugPrintError(err) }()
|
2021-05-25 08:47:35 +03:00
|
|
|
|
|
|
|
err = engine.parseTrustedProxies()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2018-11-06 05:28:51 +03:00
|
|
|
err = http.Serve(listener, engine)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-07-06 04:28:16 +03:00
|
|
|
// ServeHTTP conforms to the http.Handler interface.
|
2015-03-31 22:39:06 +03:00
|
|
|
func (engine *Engine) ServeHTTP(w http.ResponseWriter, req *http.Request) {
|
2015-05-18 21:50:46 +03:00
|
|
|
c := engine.pool.Get().(*Context)
|
|
|
|
c.writermem.reset(w)
|
|
|
|
c.Request = req
|
|
|
|
c.reset()
|
2015-04-07 13:22:38 +03:00
|
|
|
|
2015-05-28 04:22:34 +03:00
|
|
|
engine.handleHTTPRequest(c)
|
|
|
|
|
2015-05-18 21:50:46 +03:00
|
|
|
engine.pool.Put(c)
|
2015-04-07 13:22:38 +03:00
|
|
|
}
|
|
|
|
|
2017-07-06 04:28:16 +03:00
|
|
|
// HandleContext re-enter a context that has been rewritten.
|
2018-05-30 04:19:04 +03:00
|
|
|
// This can be done by setting c.Request.URL.Path to your new target.
|
2017-02-10 17:44:55 +03:00
|
|
|
// Disclaimer: You can loop yourself to death with this, use wisely.
|
|
|
|
func (engine *Engine) HandleContext(c *Context) {
|
2019-02-18 04:35:08 +03:00
|
|
|
oldIndexValue := c.index
|
2017-02-10 17:44:55 +03:00
|
|
|
c.reset()
|
|
|
|
engine.handleHTTPRequest(c)
|
2019-02-18 04:35:08 +03:00
|
|
|
|
|
|
|
c.index = oldIndexValue
|
2017-02-10 17:44:55 +03:00
|
|
|
}
|
|
|
|
|
2017-09-28 17:54:37 +03:00
|
|
|
func (engine *Engine) handleHTTPRequest(c *Context) {
|
|
|
|
httpMethod := c.Request.Method
|
2019-03-05 04:41:37 +03:00
|
|
|
rPath := c.Request.URL.Path
|
2017-08-25 04:00:49 +03:00
|
|
|
unescape := false
|
2017-09-28 17:54:37 +03:00
|
|
|
if engine.UseRawPath && len(c.Request.URL.RawPath) > 0 {
|
2019-03-05 04:41:37 +03:00
|
|
|
rPath = c.Request.URL.RawPath
|
2017-02-28 13:29:41 +03:00
|
|
|
unescape = engine.UnescapePathValues
|
|
|
|
}
|
2019-11-28 19:02:02 +03:00
|
|
|
|
|
|
|
if engine.RemoveExtraSlash {
|
|
|
|
rPath = cleanPath(rPath)
|
|
|
|
}
|
2015-04-07 13:22:38 +03:00
|
|
|
|
|
|
|
// Find root of the tree for the given HTTP method
|
2015-05-29 22:03:28 +03:00
|
|
|
t := engine.trees
|
|
|
|
for i, tl := 0, len(t); i < tl; i++ {
|
2018-08-12 16:17:57 +03:00
|
|
|
if t[i].method != httpMethod {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
root := t[i].root
|
|
|
|
// Find route in tree
|
2020-05-10 08:22:25 +03:00
|
|
|
value := root.getValue(rPath, c.params, unescape)
|
|
|
|
if value.params != nil {
|
|
|
|
c.Params = *value.params
|
|
|
|
}
|
2019-05-26 03:20:21 +03:00
|
|
|
if value.handlers != nil {
|
|
|
|
c.handlers = value.handlers
|
|
|
|
c.fullPath = value.fullPath
|
2018-08-12 16:17:57 +03:00
|
|
|
c.Next()
|
|
|
|
c.writermem.WriteHeaderNow()
|
|
|
|
return
|
|
|
|
}
|
2019-03-05 04:41:37 +03:00
|
|
|
if httpMethod != "CONNECT" && rPath != "/" {
|
2019-05-26 03:20:21 +03:00
|
|
|
if value.tsr && engine.RedirectTrailingSlash {
|
2018-08-12 16:17:57 +03:00
|
|
|
redirectTrailingSlash(c)
|
2015-04-07 13:22:38 +03:00
|
|
|
return
|
2017-06-13 06:36:05 +03:00
|
|
|
}
|
2018-08-12 16:17:57 +03:00
|
|
|
if engine.RedirectFixedPath && redirectFixedPath(c, root, engine.RedirectFixedPath) {
|
|
|
|
return
|
2015-04-07 13:22:38 +03:00
|
|
|
}
|
2015-03-31 22:39:06 +03:00
|
|
|
}
|
2018-08-12 16:17:57 +03:00
|
|
|
break
|
2015-03-31 22:39:06 +03:00
|
|
|
}
|
|
|
|
|
2015-04-07 13:22:38 +03:00
|
|
|
if engine.HandleMethodNotAllowed {
|
2015-05-29 22:03:28 +03:00
|
|
|
for _, tree := range engine.trees {
|
2018-08-12 16:17:57 +03:00
|
|
|
if tree.method == httpMethod {
|
|
|
|
continue
|
|
|
|
}
|
2019-05-26 03:20:21 +03:00
|
|
|
if value := tree.root.getValue(rPath, nil, unescape); value.handlers != nil {
|
2018-08-12 16:17:57 +03:00
|
|
|
c.handlers = engine.allNoMethod
|
|
|
|
serveError(c, http.StatusMethodNotAllowed, default405Body)
|
|
|
|
return
|
2015-04-07 13:22:38 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2017-09-28 17:54:37 +03:00
|
|
|
c.handlers = engine.allNoRoute
|
2018-06-26 12:21:32 +03:00
|
|
|
serveError(c, http.StatusNotFound, default404Body)
|
2014-06-18 03:42:34 +04:00
|
|
|
}
|
|
|
|
|
2015-05-30 16:55:19 +03:00
|
|
|
var mimePlain = []string{MIMEPlain}
|
|
|
|
|
|
|
|
func serveError(c *Context, code int, defaultMessage []byte) {
|
|
|
|
c.writermem.status = code
|
|
|
|
c.Next()
|
2018-08-12 16:17:57 +03:00
|
|
|
if c.writermem.Written() {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if c.writermem.Status() == code {
|
|
|
|
c.writermem.Header()["Content-Type"] = mimePlain
|
2019-01-18 04:32:53 +03:00
|
|
|
_, err := c.Writer.Write(defaultMessage)
|
|
|
|
if err != nil {
|
|
|
|
debugPrint("cannot write message to writer during serve error: %v", err)
|
|
|
|
}
|
2018-08-12 16:17:57 +03:00
|
|
|
return
|
2015-05-30 16:55:19 +03:00
|
|
|
}
|
2018-08-12 16:17:57 +03:00
|
|
|
c.writermem.WriteHeaderNow()
|
2015-05-30 16:55:19 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
func redirectTrailingSlash(c *Context) {
|
2015-04-07 13:22:38 +03:00
|
|
|
req := c.Request
|
2019-02-27 14:56:29 +03:00
|
|
|
p := req.URL.Path
|
|
|
|
if prefix := path.Clean(c.Request.Header.Get("X-Forwarded-Prefix")); prefix != "." {
|
|
|
|
p = prefix + "/" + req.URL.Path
|
|
|
|
}
|
|
|
|
req.URL.Path = p + "/"
|
|
|
|
if length := len(p); length > 1 && p[length-1] == '/' {
|
|
|
|
req.URL.Path = p[:length-1]
|
2015-05-30 16:55:19 +03:00
|
|
|
}
|
2019-11-26 03:19:30 +03:00
|
|
|
redirectRequest(c)
|
2015-05-30 16:55:19 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
func redirectFixedPath(c *Context, root *node, trailingSlash bool) bool {
|
|
|
|
req := c.Request
|
2019-03-05 04:41:37 +03:00
|
|
|
rPath := req.URL.Path
|
2015-05-30 16:55:19 +03:00
|
|
|
|
2019-03-05 04:41:37 +03:00
|
|
|
if fixedPath, ok := root.findCaseInsensitivePath(cleanPath(rPath), trailingSlash); ok {
|
2020-01-17 19:32:50 +03:00
|
|
|
req.URL.Path = bytesconv.BytesToString(fixedPath)
|
2019-11-26 03:19:30 +03:00
|
|
|
redirectRequest(c)
|
2015-04-07 13:22:38 +03:00
|
|
|
return true
|
|
|
|
}
|
|
|
|
return false
|
2014-06-18 03:42:34 +04:00
|
|
|
}
|
2019-11-26 03:19:30 +03:00
|
|
|
|
|
|
|
func redirectRequest(c *Context) {
|
|
|
|
req := c.Request
|
|
|
|
rPath := req.URL.Path
|
|
|
|
rURL := req.URL.String()
|
|
|
|
|
|
|
|
code := http.StatusMovedPermanently // Permanent redirect, request with GET method
|
2019-11-29 02:50:49 +03:00
|
|
|
if req.Method != http.MethodGet {
|
2019-11-26 03:19:30 +03:00
|
|
|
code = http.StatusTemporaryRedirect
|
|
|
|
}
|
|
|
|
debugPrint("redirecting request %d: %s --> %s", code, rPath, rURL)
|
|
|
|
http.Redirect(c.Writer, req, rURL, code)
|
|
|
|
c.writermem.WriteHeaderNow()
|
|
|
|
}
|