matterbridge/vendor/github.com/labstack/echo/v4/echo.go

1010 lines
34 KiB
Go
Raw Normal View History

2017-02-18 23:00:46 +01:00
/*
Package echo implements high performance, minimalist Go web framework.
Example:
2023-01-28 22:57:53 +01:00
package main
2017-02-18 23:00:46 +01:00
2023-01-28 22:57:53 +01:00
import (
"net/http"
2017-02-18 23:00:46 +01:00
2023-01-28 22:57:53 +01:00
"github.com/labstack/echo/v4"
"github.com/labstack/echo/v4/middleware"
)
2017-02-18 23:00:46 +01:00
2023-01-28 22:57:53 +01:00
// Handler
func hello(c echo.Context) error {
return c.String(http.StatusOK, "Hello, World!")
}
2017-02-18 23:00:46 +01:00
2023-01-28 22:57:53 +01:00
func main() {
// Echo instance
e := echo.New()
2017-02-18 23:00:46 +01:00
2023-01-28 22:57:53 +01:00
// Middleware
e.Use(middleware.Logger())
e.Use(middleware.Recover())
2017-02-18 23:00:46 +01:00
2023-01-28 22:57:53 +01:00
// Routes
e.GET("/", hello)
2017-02-18 23:00:46 +01:00
2023-01-28 22:57:53 +01:00
// Start server
e.Logger.Fatal(e.Start(":1323"))
}
2017-02-18 23:00:46 +01:00
Learn more at https://echo.labstack.com
*/
package echo
import (
stdContext "context"
2017-02-18 23:00:46 +01:00
"crypto/tls"
"errors"
"fmt"
"io"
2017-06-06 00:01:05 +02:00
stdLog "log"
2017-02-18 23:00:46 +01:00
"net"
"net/http"
2023-01-28 22:57:53 +01:00
"os"
2017-02-18 23:00:46 +01:00
"reflect"
"runtime"
"sync"
"time"
"github.com/labstack/gommon/color"
"github.com/labstack/gommon/log"
2019-06-16 23:33:25 +02:00
"golang.org/x/crypto/acme"
2017-02-18 23:00:46 +01:00
"golang.org/x/crypto/acme/autocert"
2020-05-24 00:06:21 +02:00
"golang.org/x/net/http2"
"golang.org/x/net/http2/h2c"
2017-02-18 23:00:46 +01:00
)
type (
// Echo is the top-level framework instance.
2023-01-28 22:57:53 +01:00
//
// Goroutine safety: Do not mutate Echo instance fields after server has started. Accessing these
// fields from handlers/middlewares and changing field values at the same time leads to data-races.
// Adding new routes after the server has been started is also not safe!
2017-02-18 23:00:46 +01:00
Echo struct {
2022-03-12 19:41:07 +01:00
filesystem
2019-06-16 23:33:25 +02:00
common
2021-03-20 22:40:23 +01:00
// startupMutex is mutex to lock Echo instance access during server configuration and startup. Useful for to get
// listener address info (on which interface/port was listener binded) without having data races.
2023-01-28 22:57:53 +01:00
startupMutex sync.RWMutex
colorer *color.Color
// premiddleware are middlewares that are run before routing is done. In case a pre-middleware returns
// an error the router is not executed and the request will end up in the global error handler.
premiddleware []MiddlewareFunc
middleware []MiddlewareFunc
maxParam *int
router *Router
routers map[string]*Router
pool sync.Pool
StdLogger *stdLog.Logger
2017-02-18 23:00:46 +01:00
Server *http.Server
TLSServer *http.Server
Listener net.Listener
TLSListener net.Listener
2017-12-07 23:00:56 +01:00
AutoTLSManager autocert.Manager
2017-02-18 23:00:46 +01:00
DisableHTTP2 bool
Debug bool
2017-06-06 00:01:05 +02:00
HideBanner bool
2018-02-21 00:48:10 +01:00
HidePort bool
2017-02-18 23:00:46 +01:00
HTTPErrorHandler HTTPErrorHandler
Binder Binder
2021-07-31 18:27:55 +02:00
JSONSerializer JSONSerializer
2017-02-18 23:00:46 +01:00
Validator Validator
Renderer Renderer
Logger Logger
2020-05-24 00:06:21 +02:00
IPExtractor IPExtractor
2021-03-20 22:40:23 +01:00
ListenerNetwork string
2023-01-28 22:57:53 +01:00
// OnAddRouteHandler is called when Echo adds new route to specific host router.
OnAddRouteHandler func(host string, route Route, handler HandlerFunc, middleware []MiddlewareFunc)
2017-02-18 23:00:46 +01:00
}
// Route contains a handler and information for matching against requests.
Route struct {
2017-12-07 23:00:56 +01:00
Method string `json:"method"`
Path string `json:"path"`
Name string `json:"name"`
2017-02-18 23:00:46 +01:00
}
// HTTPError represents an error that occurred while handling a request.
HTTPError struct {
2019-09-07 22:46:58 +02:00
Code int `json:"-"`
Message interface{} `json:"message"`
Internal error `json:"-"` // Stores the error returned by an external dependency
2017-02-18 23:00:46 +01:00
}
// MiddlewareFunc defines a function to process middleware.
2022-03-12 19:41:07 +01:00
MiddlewareFunc func(next HandlerFunc) HandlerFunc
2017-02-18 23:00:46 +01:00
// HandlerFunc defines a function to serve HTTP requests.
2022-03-12 19:41:07 +01:00
HandlerFunc func(c Context) error
2017-02-18 23:00:46 +01:00
// HTTPErrorHandler is a centralized HTTP error handler.
2023-01-28 22:57:53 +01:00
HTTPErrorHandler func(err error, c Context)
2017-02-18 23:00:46 +01:00
// Validator is the interface that wraps the Validate function.
Validator interface {
Validate(i interface{}) error
}
2021-07-31 18:27:55 +02:00
// JSONSerializer is the interface that encodes and decodes JSON to and from interfaces.
JSONSerializer interface {
Serialize(c Context, i interface{}, indent string) error
Deserialize(c Context, i interface{}) error
}
2017-02-18 23:00:46 +01:00
// Renderer is the interface that wraps the Render function.
Renderer interface {
Render(io.Writer, string, interface{}, Context) error
}
// Map defines a generic map of type `map[string]interface{}`.
Map map[string]interface{}
2019-06-16 23:33:25 +02:00
// Common struct for Echo & Group.
common struct{}
2017-02-18 23:00:46 +01:00
)
// HTTP methods
// NOTE: Deprecated, please use the stdlib constants directly instead.
2017-02-18 23:00:46 +01:00
const (
CONNECT = http.MethodConnect
DELETE = http.MethodDelete
GET = http.MethodGet
HEAD = http.MethodHead
OPTIONS = http.MethodOptions
PATCH = http.MethodPatch
POST = http.MethodPost
// PROPFIND = "PROPFIND"
PUT = http.MethodPut
TRACE = http.MethodTrace
2017-02-18 23:00:46 +01:00
)
// MIME types
const (
MIMEApplicationJSON = "application/json"
MIMEApplicationJSONCharsetUTF8 = MIMEApplicationJSON + "; " + charsetUTF8
MIMEApplicationJavaScript = "application/javascript"
MIMEApplicationJavaScriptCharsetUTF8 = MIMEApplicationJavaScript + "; " + charsetUTF8
MIMEApplicationXML = "application/xml"
MIMEApplicationXMLCharsetUTF8 = MIMEApplicationXML + "; " + charsetUTF8
2017-06-06 00:01:05 +02:00
MIMETextXML = "text/xml"
MIMETextXMLCharsetUTF8 = MIMETextXML + "; " + charsetUTF8
2017-02-18 23:00:46 +01:00
MIMEApplicationForm = "application/x-www-form-urlencoded"
MIMEApplicationProtobuf = "application/protobuf"
MIMEApplicationMsgpack = "application/msgpack"
MIMETextHTML = "text/html"
MIMETextHTMLCharsetUTF8 = MIMETextHTML + "; " + charsetUTF8
MIMETextPlain = "text/plain"
MIMETextPlainCharsetUTF8 = MIMETextPlain + "; " + charsetUTF8
MIMEMultipartForm = "multipart/form-data"
MIMEOctetStream = "application/octet-stream"
)
const (
charsetUTF8 = "charset=UTF-8"
// PROPFIND Method can be used on collection and property resources.
PROPFIND = "PROPFIND"
2019-06-16 23:33:25 +02:00
// REPORT Method can be used to get information about a resource, see rfc 3253
REPORT = "REPORT"
// RouteNotFound is special method type for routes handling "route not found" (404) cases
RouteNotFound = "echo_route_not_found"
2017-02-18 23:00:46 +01:00
)
// Headers
const (
2022-03-12 19:41:07 +01:00
HeaderAccept = "Accept"
HeaderAcceptEncoding = "Accept-Encoding"
// HeaderAllow is the name of the "Allow" header field used to list the set of methods
// advertised as supported by the target resource. Returning an Allow header is mandatory
// for status 405 (method not found) and useful for the OPTIONS method in responses.
// See RFC 7231: https://datatracker.ietf.org/doc/html/rfc7231#section-7.4.1
2017-06-06 00:01:05 +02:00
HeaderAllow = "Allow"
HeaderAuthorization = "Authorization"
HeaderContentDisposition = "Content-Disposition"
HeaderContentEncoding = "Content-Encoding"
HeaderContentLength = "Content-Length"
HeaderContentType = "Content-Type"
HeaderCookie = "Cookie"
HeaderSetCookie = "Set-Cookie"
HeaderIfModifiedSince = "If-Modified-Since"
HeaderLastModified = "Last-Modified"
HeaderLocation = "Location"
2022-03-12 19:41:07 +01:00
HeaderRetryAfter = "Retry-After"
2017-06-06 00:01:05 +02:00
HeaderUpgrade = "Upgrade"
HeaderVary = "Vary"
HeaderWWWAuthenticate = "WWW-Authenticate"
HeaderXForwardedFor = "X-Forwarded-For"
HeaderXForwardedProto = "X-Forwarded-Proto"
HeaderXForwardedProtocol = "X-Forwarded-Protocol"
HeaderXForwardedSsl = "X-Forwarded-Ssl"
HeaderXUrlScheme = "X-Url-Scheme"
HeaderXHTTPMethodOverride = "X-HTTP-Method-Override"
2022-03-12 19:41:07 +01:00
HeaderXRealIP = "X-Real-Ip"
HeaderXRequestID = "X-Request-Id"
HeaderXCorrelationID = "X-Correlation-Id"
HeaderXRequestedWith = "X-Requested-With"
2017-06-06 00:01:05 +02:00
HeaderServer = "Server"
HeaderOrigin = "Origin"
2022-03-12 19:41:07 +01:00
HeaderCacheControl = "Cache-Control"
HeaderConnection = "Connection"
2017-06-06 00:01:05 +02:00
// Access control
2017-02-18 23:00:46 +01:00
HeaderAccessControlRequestMethod = "Access-Control-Request-Method"
HeaderAccessControlRequestHeaders = "Access-Control-Request-Headers"
HeaderAccessControlAllowOrigin = "Access-Control-Allow-Origin"
HeaderAccessControlAllowMethods = "Access-Control-Allow-Methods"
HeaderAccessControlAllowHeaders = "Access-Control-Allow-Headers"
HeaderAccessControlAllowCredentials = "Access-Control-Allow-Credentials"
HeaderAccessControlExposeHeaders = "Access-Control-Expose-Headers"
HeaderAccessControlMaxAge = "Access-Control-Max-Age"
// Security
2019-06-16 23:33:25 +02:00
HeaderStrictTransportSecurity = "Strict-Transport-Security"
HeaderXContentTypeOptions = "X-Content-Type-Options"
HeaderXXSSProtection = "X-XSS-Protection"
HeaderXFrameOptions = "X-Frame-Options"
HeaderContentSecurityPolicy = "Content-Security-Policy"
HeaderContentSecurityPolicyReportOnly = "Content-Security-Policy-Report-Only"
HeaderXCSRFToken = "X-CSRF-Token"
2019-09-07 22:46:58 +02:00
HeaderReferrerPolicy = "Referrer-Policy"
2017-02-18 23:00:46 +01:00
)
2017-06-06 00:01:05 +02:00
const (
// Version of Echo
Version = "4.10.2"
2017-06-06 00:01:05 +02:00
website = "https://echo.labstack.com"
// http://patorjk.com/software/taag/#p=display&f=Small%20Slant&t=Echo
banner = `
____ __
/ __/___/ / ___
/ _// __/ _ \/ _ \
/___/\__/_//_/\___/ %s
High performance, minimalist Go web framework
%s
____________________________________O/_______
O\
`
)
2017-02-18 23:00:46 +01:00
var (
methods = [...]string{
http.MethodConnect,
http.MethodDelete,
http.MethodGet,
http.MethodHead,
http.MethodOptions,
http.MethodPatch,
http.MethodPost,
PROPFIND,
http.MethodPut,
http.MethodTrace,
2019-06-16 23:33:25 +02:00
REPORT,
2017-02-18 23:00:46 +01:00
}
)
// Errors
var (
ErrBadRequest = NewHTTPError(http.StatusBadRequest) // HTTP 400 Bad Request
ErrUnauthorized = NewHTTPError(http.StatusUnauthorized) // HTTP 401 Unauthorized
ErrPaymentRequired = NewHTTPError(http.StatusPaymentRequired) // HTTP 402 Payment Required
ErrForbidden = NewHTTPError(http.StatusForbidden) // HTTP 403 Forbidden
ErrNotFound = NewHTTPError(http.StatusNotFound) // HTTP 404 Not Found
ErrMethodNotAllowed = NewHTTPError(http.StatusMethodNotAllowed) // HTTP 405 Method Not Allowed
ErrNotAcceptable = NewHTTPError(http.StatusNotAcceptable) // HTTP 406 Not Acceptable
ErrProxyAuthRequired = NewHTTPError(http.StatusProxyAuthRequired) // HTTP 407 Proxy AuthRequired
ErrRequestTimeout = NewHTTPError(http.StatusRequestTimeout) // HTTP 408 Request Timeout
ErrConflict = NewHTTPError(http.StatusConflict) // HTTP 409 Conflict
ErrGone = NewHTTPError(http.StatusGone) // HTTP 410 Gone
ErrLengthRequired = NewHTTPError(http.StatusLengthRequired) // HTTP 411 Length Required
ErrPreconditionFailed = NewHTTPError(http.StatusPreconditionFailed) // HTTP 412 Precondition Failed
ErrStatusRequestEntityTooLarge = NewHTTPError(http.StatusRequestEntityTooLarge) // HTTP 413 Payload Too Large
ErrRequestURITooLong = NewHTTPError(http.StatusRequestURITooLong) // HTTP 414 URI Too Long
ErrUnsupportedMediaType = NewHTTPError(http.StatusUnsupportedMediaType) // HTTP 415 Unsupported Media Type
ErrRequestedRangeNotSatisfiable = NewHTTPError(http.StatusRequestedRangeNotSatisfiable) // HTTP 416 Range Not Satisfiable
ErrExpectationFailed = NewHTTPError(http.StatusExpectationFailed) // HTTP 417 Expectation Failed
ErrTeapot = NewHTTPError(http.StatusTeapot) // HTTP 418 I'm a teapot
ErrMisdirectedRequest = NewHTTPError(http.StatusMisdirectedRequest) // HTTP 421 Misdirected Request
ErrUnprocessableEntity = NewHTTPError(http.StatusUnprocessableEntity) // HTTP 422 Unprocessable Entity
ErrLocked = NewHTTPError(http.StatusLocked) // HTTP 423 Locked
ErrFailedDependency = NewHTTPError(http.StatusFailedDependency) // HTTP 424 Failed Dependency
ErrTooEarly = NewHTTPError(http.StatusTooEarly) // HTTP 425 Too Early
ErrUpgradeRequired = NewHTTPError(http.StatusUpgradeRequired) // HTTP 426 Upgrade Required
ErrPreconditionRequired = NewHTTPError(http.StatusPreconditionRequired) // HTTP 428 Precondition Required
ErrTooManyRequests = NewHTTPError(http.StatusTooManyRequests) // HTTP 429 Too Many Requests
ErrRequestHeaderFieldsTooLarge = NewHTTPError(http.StatusRequestHeaderFieldsTooLarge) // HTTP 431 Request Header Fields Too Large
ErrUnavailableForLegalReasons = NewHTTPError(http.StatusUnavailableForLegalReasons) // HTTP 451 Unavailable For Legal Reasons
ErrInternalServerError = NewHTTPError(http.StatusInternalServerError) // HTTP 500 Internal Server Error
ErrNotImplemented = NewHTTPError(http.StatusNotImplemented) // HTTP 501 Not Implemented
ErrBadGateway = NewHTTPError(http.StatusBadGateway) // HTTP 502 Bad Gateway
ErrServiceUnavailable = NewHTTPError(http.StatusServiceUnavailable) // HTTP 503 Service Unavailable
ErrGatewayTimeout = NewHTTPError(http.StatusGatewayTimeout) // HTTP 504 Gateway Timeout
ErrHTTPVersionNotSupported = NewHTTPError(http.StatusHTTPVersionNotSupported) // HTTP 505 HTTP Version Not Supported
ErrVariantAlsoNegotiates = NewHTTPError(http.StatusVariantAlsoNegotiates) // HTTP 506 Variant Also Negotiates
ErrInsufficientStorage = NewHTTPError(http.StatusInsufficientStorage) // HTTP 507 Insufficient Storage
ErrLoopDetected = NewHTTPError(http.StatusLoopDetected) // HTTP 508 Loop Detected
ErrNotExtended = NewHTTPError(http.StatusNotExtended) // HTTP 510 Not Extended
ErrNetworkAuthenticationRequired = NewHTTPError(http.StatusNetworkAuthenticationRequired) // HTTP 511 Network Authentication Required
ErrValidatorNotRegistered = errors.New("validator not registered")
ErrRendererNotRegistered = errors.New("renderer not registered")
ErrInvalidRedirectCode = errors.New("invalid redirect status code")
ErrCookieNotFound = errors.New("cookie not found")
ErrInvalidCertOrKeyType = errors.New("invalid cert or key type, must be string or []byte")
ErrInvalidListenerNetwork = errors.New("invalid listener network")
2017-02-18 23:00:46 +01:00
)
// Error handlers
var (
NotFoundHandler = func(c Context) error {
return ErrNotFound
}
MethodNotAllowedHandler = func(c Context) error {
2022-03-12 19:41:07 +01:00
// See RFC 7231 section 7.4.1: An origin server MUST generate an Allow field in a 405 (Method Not Allowed)
// response and MAY do so in any other response. For disabled resources an empty Allow header may be returned
routerAllowMethods, ok := c.Get(ContextKeyHeaderAllow).(string)
if ok && routerAllowMethods != "" {
c.Response().Header().Set(HeaderAllow, routerAllowMethods)
}
2017-02-18 23:00:46 +01:00
return ErrMethodNotAllowed
}
)
// New creates an instance of Echo.
func New() (e *Echo) {
e = &Echo{
2022-03-12 19:41:07 +01:00
filesystem: createFilesystem(),
Server: new(http.Server),
TLSServer: new(http.Server),
2017-02-18 23:00:46 +01:00
AutoTLSManager: autocert.Manager{
Prompt: autocert.AcceptTOS,
},
2021-03-20 22:40:23 +01:00
Logger: log.New("echo"),
colorer: color.New(),
maxParam: new(int),
ListenerNetwork: "tcp",
2017-02-18 23:00:46 +01:00
}
e.Server.Handler = e
e.TLSServer.Handler = e
e.HTTPErrorHandler = e.DefaultHTTPErrorHandler
e.Binder = &DefaultBinder{}
2021-07-31 18:27:55 +02:00
e.JSONSerializer = &DefaultJSONSerializer{}
2017-12-07 23:00:56 +01:00
e.Logger.SetLevel(log.ERROR)
e.StdLogger = stdLog.New(e.Logger.Output(), e.Logger.Prefix()+": ", 0)
2017-02-18 23:00:46 +01:00
e.pool.New = func() interface{} {
return e.NewContext(nil, nil)
}
e.router = NewRouter(e)
2019-06-16 23:33:25 +02:00
e.routers = map[string]*Router{}
2017-02-18 23:00:46 +01:00
return
}
// NewContext returns a Context instance.
func (e *Echo) NewContext(r *http.Request, w http.ResponseWriter) Context {
return &context{
request: r,
response: NewResponse(w, e),
store: make(Map),
echo: e,
pvalues: make([]string, *e.maxParam),
handler: NotFoundHandler,
}
}
2019-06-16 23:33:25 +02:00
// Router returns the default router.
2017-02-18 23:00:46 +01:00
func (e *Echo) Router() *Router {
return e.router
}
2019-06-16 23:33:25 +02:00
// Routers returns the map of host => router.
func (e *Echo) Routers() map[string]*Router {
return e.routers
}
2017-02-18 23:00:46 +01:00
// DefaultHTTPErrorHandler is the default HTTP error handler. It sends a JSON response
// with status code.
//
// NOTE: In case errors happens in middleware call-chain that is returning from handler (which did not return an error).
// When handler has already sent response (ala c.JSON()) and there is error in middleware that is returning from
// handler. Then the error that global error handler received will be ignored because we have already "commited" the
// response and status code header has been sent to the client.
2017-02-18 23:00:46 +01:00
func (e *Echo) DefaultHTTPErrorHandler(err error, c Context) {
if c.Response().Committed {
return
}
2019-09-07 22:46:58 +02:00
he, ok := err.(*HTTPError)
if ok {
if he.Internal != nil {
2019-09-07 22:46:58 +02:00
if herr, ok := he.Internal.(*HTTPError); ok {
he = herr
}
2017-12-07 23:00:56 +01:00
}
2017-02-18 23:00:46 +01:00
} else {
2019-09-07 22:46:58 +02:00
he = &HTTPError{
Code: http.StatusInternalServerError,
Message: http.StatusText(http.StatusInternalServerError),
}
2017-02-18 23:00:46 +01:00
}
2020-01-09 21:02:56 +01:00
// Issue #1426
code := he.Code
message := he.Message
2021-03-20 22:40:23 +01:00
if m, ok := he.Message.(string); ok {
if e.Debug {
message = Map{"message": m, "error": err.Error()}
} else {
message = Map{"message": m}
}
2017-02-18 23:00:46 +01:00
}
2017-12-07 23:00:56 +01:00
// Send response
if c.Request().Method == http.MethodHead { // Issue #608
err = c.NoContent(he.Code)
} else {
err = c.JSON(code, message)
}
if err != nil {
e.Logger.Error(err)
2017-02-18 23:00:46 +01:00
}
}
// Pre adds middleware to the chain which is run before router.
func (e *Echo) Pre(middleware ...MiddlewareFunc) {
e.premiddleware = append(e.premiddleware, middleware...)
}
// Use adds middleware to the chain which is run after router.
func (e *Echo) Use(middleware ...MiddlewareFunc) {
e.middleware = append(e.middleware, middleware...)
}
// CONNECT registers a new CONNECT route for a path with matching handler in the
// router with optional route-level middleware.
2017-12-07 23:00:56 +01:00
func (e *Echo) CONNECT(path string, h HandlerFunc, m ...MiddlewareFunc) *Route {
return e.Add(http.MethodConnect, path, h, m...)
2017-02-18 23:00:46 +01:00
}
// DELETE registers a new DELETE route for a path with matching handler in the router
// with optional route-level middleware.
2017-12-07 23:00:56 +01:00
func (e *Echo) DELETE(path string, h HandlerFunc, m ...MiddlewareFunc) *Route {
return e.Add(http.MethodDelete, path, h, m...)
2017-02-18 23:00:46 +01:00
}
// GET registers a new GET route for a path with matching handler in the router
// with optional route-level middleware.
2017-12-07 23:00:56 +01:00
func (e *Echo) GET(path string, h HandlerFunc, m ...MiddlewareFunc) *Route {
return e.Add(http.MethodGet, path, h, m...)
2017-02-18 23:00:46 +01:00
}
// HEAD registers a new HEAD route for a path with matching handler in the
// router with optional route-level middleware.
2017-12-07 23:00:56 +01:00
func (e *Echo) HEAD(path string, h HandlerFunc, m ...MiddlewareFunc) *Route {
return e.Add(http.MethodHead, path, h, m...)
2017-02-18 23:00:46 +01:00
}
// OPTIONS registers a new OPTIONS route for a path with matching handler in the
// router with optional route-level middleware.
2017-12-07 23:00:56 +01:00
func (e *Echo) OPTIONS(path string, h HandlerFunc, m ...MiddlewareFunc) *Route {
return e.Add(http.MethodOptions, path, h, m...)
2017-02-18 23:00:46 +01:00
}
// PATCH registers a new PATCH route for a path with matching handler in the
// router with optional route-level middleware.
2017-12-07 23:00:56 +01:00
func (e *Echo) PATCH(path string, h HandlerFunc, m ...MiddlewareFunc) *Route {
return e.Add(http.MethodPatch, path, h, m...)
2017-02-18 23:00:46 +01:00
}
// POST registers a new POST route for a path with matching handler in the
// router with optional route-level middleware.
2017-12-07 23:00:56 +01:00
func (e *Echo) POST(path string, h HandlerFunc, m ...MiddlewareFunc) *Route {
return e.Add(http.MethodPost, path, h, m...)
2017-02-18 23:00:46 +01:00
}
// PUT registers a new PUT route for a path with matching handler in the
// router with optional route-level middleware.
2017-12-07 23:00:56 +01:00
func (e *Echo) PUT(path string, h HandlerFunc, m ...MiddlewareFunc) *Route {
return e.Add(http.MethodPut, path, h, m...)
2017-02-18 23:00:46 +01:00
}
// TRACE registers a new TRACE route for a path with matching handler in the
// router with optional route-level middleware.
2017-12-07 23:00:56 +01:00
func (e *Echo) TRACE(path string, h HandlerFunc, m ...MiddlewareFunc) *Route {
return e.Add(http.MethodTrace, path, h, m...)
2017-02-18 23:00:46 +01:00
}
// RouteNotFound registers a special-case route which is executed when no other route is found (i.e. HTTP 404 cases)
// for current request URL.
// Path supports static and named/any parameters just like other http method is defined. Generally path is ended with
// wildcard/match-any character (`/*`, `/download/*` etc).
//
// Example: `e.RouteNotFound("/*", func(c echo.Context) error { return c.NoContent(http.StatusNotFound) })`
func (e *Echo) RouteNotFound(path string, h HandlerFunc, m ...MiddlewareFunc) *Route {
return e.Add(RouteNotFound, path, h, m...)
}
// Any registers a new route for all HTTP methods (supported by Echo) and path with matching handler
2017-02-18 23:00:46 +01:00
// in the router with optional route-level middleware.
//
// Note: this method only adds specific set of supported HTTP methods as handler and is not true
// "catch-any-arbitrary-method" way of matching requests.
2017-12-07 23:00:56 +01:00
func (e *Echo) Any(path string, handler HandlerFunc, middleware ...MiddlewareFunc) []*Route {
2018-02-21 00:48:10 +01:00
routes := make([]*Route, len(methods))
for i, m := range methods {
routes[i] = e.Add(m, path, handler, middleware...)
2017-02-18 23:00:46 +01:00
}
2017-12-07 23:00:56 +01:00
return routes
2017-02-18 23:00:46 +01:00
}
// Match registers a new route for multiple HTTP methods and path with matching
// handler in the router with optional route-level middleware.
2017-12-07 23:00:56 +01:00
func (e *Echo) Match(methods []string, path string, handler HandlerFunc, middleware ...MiddlewareFunc) []*Route {
2018-02-21 00:48:10 +01:00
routes := make([]*Route, len(methods))
for i, m := range methods {
routes[i] = e.Add(m, path, handler, middleware...)
2017-02-18 23:00:46 +01:00
}
2017-12-07 23:00:56 +01:00
return routes
2017-02-18 23:00:46 +01:00
}
2019-06-16 23:33:25 +02:00
func (common) file(path, file string, get func(string, HandlerFunc, ...MiddlewareFunc) *Route,
m ...MiddlewareFunc) *Route {
return get(path, func(c Context) error {
return c.File(file)
}, m...)
2017-02-18 23:00:46 +01:00
}
// File registers a new route with path to serve a static file with optional route-level middleware.
func (e *Echo) File(path, file string, m ...MiddlewareFunc) *Route {
2019-06-16 23:33:25 +02:00
return e.file(path, file, e.GET, m...)
2017-02-18 23:00:46 +01:00
}
2023-01-28 22:57:53 +01:00
func (e *Echo) add(host, method, path string, handler HandlerFunc, middlewares ...MiddlewareFunc) *Route {
2019-06-16 23:33:25 +02:00
router := e.findRouter(host)
2023-01-28 22:57:53 +01:00
//FIXME: when handler+middleware are both nil ... make it behave like handler removal
name := handlerName(handler)
route := router.add(method, path, name, func(c Context) error {
h := applyMiddleware(handler, middlewares...)
2017-02-18 23:00:46 +01:00
return h(c)
})
2023-01-28 22:57:53 +01:00
if e.OnAddRouteHandler != nil {
e.OnAddRouteHandler(host, *route, handler, middlewares)
2017-02-18 23:00:46 +01:00
}
2023-01-28 22:57:53 +01:00
return route
2017-02-18 23:00:46 +01:00
}
2019-06-16 23:33:25 +02:00
// Add registers a new route for an HTTP method and path with matching handler
// in the router with optional route-level middleware.
func (e *Echo) Add(method, path string, handler HandlerFunc, middleware ...MiddlewareFunc) *Route {
return e.add("", method, path, handler, middleware...)
}
// Host creates a new router group for the provided host and optional host-level middleware.
func (e *Echo) Host(name string, m ...MiddlewareFunc) (g *Group) {
e.routers[name] = NewRouter(e)
g = &Group{host: name, echo: e}
g.Use(m...)
return
}
2017-02-18 23:00:46 +01:00
// Group creates a new router group with prefix and optional group-level middleware.
func (e *Echo) Group(prefix string, m ...MiddlewareFunc) (g *Group) {
g = &Group{prefix: prefix, echo: e}
g.Use(m...)
return
}
2023-01-28 22:57:53 +01:00
// URI generates an URI from handler.
2017-02-18 23:00:46 +01:00
func (e *Echo) URI(handler HandlerFunc, params ...interface{}) string {
2017-12-07 23:00:56 +01:00
name := handlerName(handler)
return e.Reverse(name, params...)
}
// URL is an alias for `URI` function.
func (e *Echo) URL(h HandlerFunc, params ...interface{}) string {
return e.URI(h, params...)
}
// Reverse generates an URL from route name and provided parameters.
func (e *Echo) Reverse(name string, params ...interface{}) string {
2023-01-28 22:57:53 +01:00
return e.router.Reverse(name, params...)
2017-02-18 23:00:46 +01:00
}
2023-01-28 22:57:53 +01:00
// Routes returns the registered routes for default router.
// In case when Echo serves multiple hosts/domains use `e.Routers()["domain2.site"].Routes()` to get specific host routes.
2017-06-06 00:01:05 +02:00
func (e *Echo) Routes() []*Route {
2023-01-28 22:57:53 +01:00
return e.router.Routes()
2017-02-18 23:00:46 +01:00
}
// AcquireContext returns an empty `Context` instance from the pool.
// You must return the context by calling `ReleaseContext()`.
func (e *Echo) AcquireContext() Context {
return e.pool.Get().(Context)
}
// ReleaseContext returns the `Context` instance back to the pool.
// You must call it after `AcquireContext()`.
func (e *Echo) ReleaseContext(c Context) {
e.pool.Put(c)
}
// ServeHTTP implements `http.Handler` interface, which serves HTTP requests.
func (e *Echo) ServeHTTP(w http.ResponseWriter, r *http.Request) {
// Acquire context
c := e.pool.Get().(*context)
c.Reset(r, w)
2023-01-28 22:57:53 +01:00
var h HandlerFunc
if e.premiddleware == nil {
2020-09-04 23:29:13 +02:00
e.findRouter(r.Host).Find(r.Method, GetPath(r), c)
h = c.Handler()
2019-06-16 23:33:25 +02:00
h = applyMiddleware(h, e.middleware...)
} else {
h = func(c Context) error {
2020-09-04 23:29:13 +02:00
e.findRouter(r.Host).Find(r.Method, GetPath(r), c)
h := c.Handler()
2019-06-16 23:33:25 +02:00
h = applyMiddleware(h, e.middleware...)
return h(c)
}
2019-06-16 23:33:25 +02:00
h = applyMiddleware(h, e.premiddleware...)
2017-02-18 23:00:46 +01:00
}
// Execute chain
if err := h(c); err != nil {
e.HTTPErrorHandler(err, c)
}
// Release context
e.pool.Put(c)
2017-02-18 23:00:46 +01:00
}
// Start starts an HTTP server.
func (e *Echo) Start(address string) error {
2021-03-20 22:40:23 +01:00
e.startupMutex.Lock()
2017-02-18 23:00:46 +01:00
e.Server.Addr = address
2021-03-20 22:40:23 +01:00
if err := e.configureServer(e.Server); err != nil {
e.startupMutex.Unlock()
return err
}
e.startupMutex.Unlock()
return e.Server.Serve(e.Listener)
2017-02-18 23:00:46 +01:00
}
// StartTLS starts an HTTPS server.
2019-06-16 23:33:25 +02:00
// If `certFile` or `keyFile` is `string` the values are treated as file paths.
// If `certFile` or `keyFile` is `[]byte` the values are treated as the certificate or key as-is.
func (e *Echo) StartTLS(address string, certFile, keyFile interface{}) (err error) {
2021-03-20 22:40:23 +01:00
e.startupMutex.Lock()
2019-06-16 23:33:25 +02:00
var cert []byte
if cert, err = filepathOrContent(certFile); err != nil {
2021-03-20 22:40:23 +01:00
e.startupMutex.Unlock()
2019-06-16 23:33:25 +02:00
return
}
var key []byte
if key, err = filepathOrContent(keyFile); err != nil {
2021-03-20 22:40:23 +01:00
e.startupMutex.Unlock()
2019-06-16 23:33:25 +02:00
return
2017-02-18 23:00:46 +01:00
}
2019-06-16 23:33:25 +02:00
2017-02-18 23:00:46 +01:00
s := e.TLSServer
s.TLSConfig = new(tls.Config)
s.TLSConfig.Certificates = make([]tls.Certificate, 1)
2019-06-16 23:33:25 +02:00
if s.TLSConfig.Certificates[0], err = tls.X509KeyPair(cert, key); err != nil {
2021-03-20 22:40:23 +01:00
e.startupMutex.Unlock()
2017-02-18 23:00:46 +01:00
return
}
2019-06-16 23:33:25 +02:00
2021-03-20 22:40:23 +01:00
e.configureTLS(address)
if err := e.configureServer(s); err != nil {
e.startupMutex.Unlock()
return err
}
e.startupMutex.Unlock()
return s.Serve(e.TLSListener)
2017-02-18 23:00:46 +01:00
}
2019-06-16 23:33:25 +02:00
func filepathOrContent(fileOrContent interface{}) (content []byte, err error) {
switch v := fileOrContent.(type) {
case string:
2023-01-28 22:57:53 +01:00
return os.ReadFile(v)
2019-06-16 23:33:25 +02:00
case []byte:
return v, nil
default:
return nil, ErrInvalidCertOrKeyType
}
}
2017-02-18 23:00:46 +01:00
// StartAutoTLS starts an HTTPS server using certificates automatically installed from https://letsencrypt.org.
func (e *Echo) StartAutoTLS(address string) error {
2021-03-20 22:40:23 +01:00
e.startupMutex.Lock()
2017-02-18 23:00:46 +01:00
s := e.TLSServer
s.TLSConfig = new(tls.Config)
s.TLSConfig.GetCertificate = e.AutoTLSManager.GetCertificate
2019-06-16 23:33:25 +02:00
s.TLSConfig.NextProtos = append(s.TLSConfig.NextProtos, acme.ALPNProto)
2021-03-20 22:40:23 +01:00
e.configureTLS(address)
if err := e.configureServer(s); err != nil {
e.startupMutex.Unlock()
return err
}
e.startupMutex.Unlock()
return s.Serve(e.TLSListener)
2017-02-18 23:00:46 +01:00
}
2021-03-20 22:40:23 +01:00
func (e *Echo) configureTLS(address string) {
2017-02-18 23:00:46 +01:00
s := e.TLSServer
s.Addr = address
if !e.DisableHTTP2 {
s.TLSConfig.NextProtos = append(s.TLSConfig.NextProtos, "h2")
}
}
// StartServer starts a custom http server.
func (e *Echo) StartServer(s *http.Server) (err error) {
2021-03-20 22:40:23 +01:00
e.startupMutex.Lock()
if err := e.configureServer(s); err != nil {
e.startupMutex.Unlock()
return err
}
if s.TLSConfig != nil {
e.startupMutex.Unlock()
return s.Serve(e.TLSListener)
}
e.startupMutex.Unlock()
return s.Serve(e.Listener)
}
2022-04-01 00:23:19 +02:00
func (e *Echo) configureServer(s *http.Server) error {
2017-02-18 23:00:46 +01:00
// Setup
e.colorer.SetOutput(e.Logger.Output())
s.ErrorLog = e.StdLogger
2017-06-06 00:01:05 +02:00
s.Handler = e
if e.Debug {
e.Logger.SetLevel(log.DEBUG)
}
if !e.HideBanner {
e.colorer.Printf(banner, e.colorer.Red("v"+Version), e.colorer.Blue(website))
2017-06-06 00:01:05 +02:00
}
2017-02-18 23:00:46 +01:00
if s.TLSConfig == nil {
if e.Listener == nil {
2022-04-01 00:23:19 +02:00
l, err := newListener(s.Addr, e.ListenerNetwork)
2017-02-18 23:00:46 +01:00
if err != nil {
return err
}
2022-04-01 00:23:19 +02:00
e.Listener = l
2017-02-18 23:00:46 +01:00
}
2018-02-21 00:48:10 +01:00
if !e.HidePort {
2017-06-06 00:01:05 +02:00
e.colorer.Printf("⇨ http server started on %s\n", e.colorer.Green(e.Listener.Addr()))
}
2021-03-20 22:40:23 +01:00
return nil
2017-02-18 23:00:46 +01:00
}
if e.TLSListener == nil {
2021-03-20 22:40:23 +01:00
l, err := newListener(s.Addr, e.ListenerNetwork)
2017-02-18 23:00:46 +01:00
if err != nil {
return err
}
e.TLSListener = tls.NewListener(l, s.TLSConfig)
}
2018-02-21 00:48:10 +01:00
if !e.HidePort {
2017-06-06 00:01:05 +02:00
e.colorer.Printf("⇨ https server started on %s\n", e.colorer.Green(e.TLSListener.Addr()))
}
2021-03-20 22:40:23 +01:00
return nil
}
// ListenerAddr returns net.Addr for Listener
func (e *Echo) ListenerAddr() net.Addr {
e.startupMutex.RLock()
defer e.startupMutex.RUnlock()
if e.Listener == nil {
return nil
}
return e.Listener.Addr()
}
// TLSListenerAddr returns net.Addr for TLSListener
func (e *Echo) TLSListenerAddr() net.Addr {
e.startupMutex.RLock()
defer e.startupMutex.RUnlock()
if e.TLSListener == nil {
return nil
}
return e.TLSListener.Addr()
2017-02-18 23:00:46 +01:00
}
2020-05-24 00:06:21 +02:00
// StartH2CServer starts a custom http/2 server with h2c (HTTP/2 Cleartext).
2022-04-01 00:23:19 +02:00
func (e *Echo) StartH2CServer(address string, h2s *http2.Server) error {
2021-03-20 22:40:23 +01:00
e.startupMutex.Lock()
2020-05-24 00:06:21 +02:00
// Setup
s := e.Server
s.Addr = address
e.colorer.SetOutput(e.Logger.Output())
s.ErrorLog = e.StdLogger
s.Handler = h2c.NewHandler(e, h2s)
if e.Debug {
e.Logger.SetLevel(log.DEBUG)
}
if !e.HideBanner {
e.colorer.Printf(banner, e.colorer.Red("v"+Version), e.colorer.Blue(website))
}
if e.Listener == nil {
2022-04-01 00:23:19 +02:00
l, err := newListener(s.Addr, e.ListenerNetwork)
2020-05-24 00:06:21 +02:00
if err != nil {
2021-03-20 22:40:23 +01:00
e.startupMutex.Unlock()
2020-05-24 00:06:21 +02:00
return err
}
2022-04-01 00:23:19 +02:00
e.Listener = l
2020-05-24 00:06:21 +02:00
}
if !e.HidePort {
e.colorer.Printf("⇨ http server started on %s\n", e.colorer.Green(e.Listener.Addr()))
}
2021-03-20 22:40:23 +01:00
e.startupMutex.Unlock()
2020-05-24 00:06:21 +02:00
return s.Serve(e.Listener)
}
// Close immediately stops the server.
// It internally calls `http.Server#Close()`.
func (e *Echo) Close() error {
2021-03-20 22:40:23 +01:00
e.startupMutex.Lock()
defer e.startupMutex.Unlock()
if err := e.TLSServer.Close(); err != nil {
return err
}
return e.Server.Close()
}
// Shutdown stops the server gracefully.
// It internally calls `http.Server#Shutdown()`.
func (e *Echo) Shutdown(ctx stdContext.Context) error {
2021-03-20 22:40:23 +01:00
e.startupMutex.Lock()
defer e.startupMutex.Unlock()
if err := e.TLSServer.Shutdown(ctx); err != nil {
return err
}
return e.Server.Shutdown(ctx)
}
2017-02-18 23:00:46 +01:00
// NewHTTPError creates a new HTTPError instance.
func NewHTTPError(code int, message ...interface{}) *HTTPError {
he := &HTTPError{Code: code, Message: http.StatusText(code)}
if len(message) > 0 {
he.Message = message[0]
}
return he
}
// Error makes it compatible with `error` interface.
func (he *HTTPError) Error() string {
2020-05-24 00:06:21 +02:00
if he.Internal == nil {
return fmt.Sprintf("code=%d, message=%v", he.Code, he.Message)
}
2019-09-07 22:46:58 +02:00
return fmt.Sprintf("code=%d, message=%v, internal=%v", he.Code, he.Message, he.Internal)
2017-02-18 23:00:46 +01:00
}
// SetInternal sets error to HTTPError.Internal
func (he *HTTPError) SetInternal(err error) *HTTPError {
he.Internal = err
return he
}
2023-01-28 22:57:53 +01:00
// WithInternal returns clone of HTTPError with err set to HTTPError.Internal field
func (he *HTTPError) WithInternal(err error) *HTTPError {
return &HTTPError{
Code: he.Code,
Message: he.Message,
Internal: err,
}
}
2020-09-04 23:29:13 +02:00
// Unwrap satisfies the Go 1.13 error wrapper interface.
func (he *HTTPError) Unwrap() error {
return he.Internal
}
2017-02-18 23:00:46 +01:00
// WrapHandler wraps `http.Handler` into `echo.HandlerFunc`.
func WrapHandler(h http.Handler) HandlerFunc {
return func(c Context) error {
h.ServeHTTP(c.Response(), c.Request())
return nil
}
}
// WrapMiddleware wraps `func(http.Handler) http.Handler` into `echo.MiddlewareFunc`
func WrapMiddleware(m func(http.Handler) http.Handler) MiddlewareFunc {
return func(next HandlerFunc) HandlerFunc {
return func(c Context) (err error) {
m(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
c.SetRequest(r)
2019-09-07 22:46:58 +02:00
c.SetResponse(NewResponse(w, c.Echo()))
2017-02-18 23:00:46 +01:00
err = next(c)
})).ServeHTTP(c.Response(), c.Request())
return
}
}
}
2020-09-04 23:29:13 +02:00
// GetPath returns RawPath, if it's empty returns Path from URL
2021-03-20 22:40:23 +01:00
// Difference between RawPath and Path is:
2023-01-28 22:57:53 +01:00
// - Path is where request path is stored. Value is stored in decoded form: /%47%6f%2f becomes /Go/.
// - RawPath is an optional field which only gets set if the default encoding is different from Path.
2020-09-04 23:29:13 +02:00
func GetPath(r *http.Request) string {
path := r.URL.RawPath
if path == "" {
path = r.URL.Path
}
return path
}
2019-06-16 23:33:25 +02:00
func (e *Echo) findRouter(host string) *Router {
if len(e.routers) > 0 {
if r, ok := e.routers[host]; ok {
return r
}
}
return e.router
}
2017-02-18 23:00:46 +01:00
func handlerName(h HandlerFunc) string {
t := reflect.ValueOf(h).Type()
if t.Kind() == reflect.Func {
return runtime.FuncForPC(reflect.ValueOf(h).Pointer()).Name()
}
return t.String()
}
// // PathUnescape is wraps `url.PathUnescape`
// func PathUnescape(s string) (string, error) {
// return url.PathUnescape(s)
// }
2017-02-18 23:00:46 +01:00
// tcpKeepAliveListener sets TCP keep-alive timeouts on accepted
// connections. It's used by ListenAndServe and ListenAndServeTLS so
// dead TCP connections (e.g. closing laptop mid-download) eventually
// go away.
type tcpKeepAliveListener struct {
*net.TCPListener
}
func (ln tcpKeepAliveListener) Accept() (c net.Conn, err error) {
2019-06-16 23:33:25 +02:00
if c, err = ln.AcceptTCP(); err != nil {
return
} else if err = c.(*net.TCPConn).SetKeepAlive(true); err != nil {
return
2017-02-18 23:00:46 +01:00
}
2020-05-24 00:06:21 +02:00
// Ignore error from setting the KeepAlivePeriod as some systems, such as
// OpenBSD, do not support setting TCP_USER_TIMEOUT on IPPROTO_TCP
_ = c.(*net.TCPConn).SetKeepAlivePeriod(3 * time.Minute)
2019-06-16 23:33:25 +02:00
return
2017-02-18 23:00:46 +01:00
}
2021-03-20 22:40:23 +01:00
func newListener(address, network string) (*tcpKeepAliveListener, error) {
if network != "tcp" && network != "tcp4" && network != "tcp6" {
return nil, ErrInvalidListenerNetwork
}
l, err := net.Listen(network, address)
2017-02-18 23:00:46 +01:00
if err != nil {
return nil, err
}
return &tcpKeepAliveListener{l.(*net.TCPListener)}, nil
}
2019-06-16 23:33:25 +02:00
func applyMiddleware(h HandlerFunc, middleware ...MiddlewareFunc) HandlerFunc {
for i := len(middleware) - 1; i >= 0; i-- {
h = middleware[i](h)
}
return h
}