mirror of
https://github.com/livebook-dev/livebook.git
synced 2024-11-16 04:46:46 +08:00
1fab2f54bf
Closes #983.
125 lines
3.6 KiB
Elixir
125 lines
3.6 KiB
Elixir
defmodule LivebookWeb.Endpoint do
|
|
use Phoenix.Endpoint, otp_app: :livebook
|
|
|
|
# The session will be stored in the cookie and signed,
|
|
# this means its contents can be read but not tampered with.
|
|
# Set :encryption_salt if you would also like to encrypt it.
|
|
@session_options [
|
|
store: :cookie,
|
|
key: "_livebook_key",
|
|
signing_salt: "deadbook",
|
|
same_site: "Lax"
|
|
]
|
|
|
|
# Don't check the origin as we don't know how the web app is gonna be accessed.
|
|
# It runs locally, but may be exposed via IP or domain name. The WebSocket
|
|
# connection is already protected from CSWSH by using CSRF token.
|
|
@websocket_options [
|
|
check_origin: false,
|
|
connect_info: [:user_agent, :uri, session: @session_options]
|
|
]
|
|
|
|
socket "/live", Phoenix.LiveView.Socket, websocket: @websocket_options
|
|
socket "/socket", LivebookWeb.Socket, websocket: @websocket_options
|
|
|
|
# We use Escript for distributing Livebook, so we don't have access to the static
|
|
# files at runtime in the prod environment. To overcome this we load contents of
|
|
# those files at compilation time, so that they become a part of the executable
|
|
# and can be served from memory.
|
|
defmodule AssetsMemoryProvider do
|
|
use LivebookWeb.MemoryProvider,
|
|
from: Path.expand("../../static", __DIR__),
|
|
gzip: true
|
|
end
|
|
|
|
defmodule AssetsFileSystemProvider do
|
|
use LivebookWeb.FileSystemProvider,
|
|
from: "tmp/static_dev"
|
|
end
|
|
|
|
# Serve static files at "/"
|
|
|
|
if code_reloading? do
|
|
# In development we use assets from tmp/static_dev (rebuilt dynamically on every change).
|
|
# Note that this directory doesn't contain predefined files (e.g. images), so we also
|
|
# use `AssetsMemoryProvider` to serve those from static/.
|
|
plug LivebookWeb.StaticPlug,
|
|
at: "/",
|
|
file_provider: AssetsFileSystemProvider,
|
|
gzip: false
|
|
end
|
|
|
|
plug LivebookWeb.StaticPlug,
|
|
at: "/",
|
|
file_provider: AssetsMemoryProvider,
|
|
gzip: true
|
|
|
|
plug :force_ssl
|
|
|
|
# Code reloading can be explicitly enabled under the
|
|
# :code_reloader configuration of your endpoint.
|
|
if code_reloading? do
|
|
socket "/phoenix/live_reload/socket", Phoenix.LiveReloader.Socket
|
|
plug Phoenix.LiveReloader
|
|
plug Phoenix.CodeReloader
|
|
end
|
|
|
|
plug Phoenix.LiveDashboard.RequestLogger,
|
|
param_key: "request_logger",
|
|
cookie_key: "request_logger"
|
|
|
|
plug Plug.RequestId
|
|
plug Plug.Telemetry, event_prefix: [:phoenix, :endpoint]
|
|
|
|
plug Plug.Parsers,
|
|
parsers: [:urlencoded, :multipart, :json],
|
|
pass: ["*/*"],
|
|
json_decoder: Phoenix.json_library()
|
|
|
|
plug Plug.MethodOverride
|
|
plug Plug.Head
|
|
plug Plug.Session, @session_options
|
|
|
|
# Run custom plugs from the app configuration
|
|
plug LivebookWeb.ConfiguredPlug
|
|
|
|
plug LivebookWeb.Router
|
|
|
|
@plug_ssl Plug.SSL.init(host: {Application, :get_env, [:livebook, :force_ssl_host, nil]})
|
|
def force_ssl(conn, _opts) do
|
|
force_ssl_host = Application.get_env(:livebook, :force_ssl_host, nil)
|
|
|
|
if force_ssl_host do
|
|
Plug.SSL.call(conn, @plug_ssl)
|
|
else
|
|
conn
|
|
end
|
|
end
|
|
|
|
def access_struct_url() do
|
|
base =
|
|
case struct_url() do
|
|
%URI{scheme: "https", port: 0} = uri ->
|
|
%{uri | port: Livebook.Utils.get_port(__MODULE__.HTTPS, 433)}
|
|
|
|
%URI{scheme: "http", port: 0} = uri ->
|
|
%{uri | port: Livebook.Utils.get_port(__MODULE__.HTTP, 80)}
|
|
|
|
%URI{} = uri ->
|
|
uri
|
|
end
|
|
|
|
base = update_in(base.path, &(&1 || "/"))
|
|
|
|
if Livebook.Config.auth_mode() == :token do
|
|
token = Application.fetch_env!(:livebook, :token)
|
|
%{base | query: "token=" <> token}
|
|
else
|
|
base
|
|
end
|
|
end
|
|
|
|
def access_url do
|
|
URI.to_string(access_struct_url())
|
|
end
|
|
end
|