-
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathutilities.go
202 lines (166 loc) · 5.32 KB
/
utilities.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
package apirouter
import (
"context"
"net"
"net/http"
"regexp"
"strings"
"time"
"github.com/mrz1836/go-parameters"
)
// Unix epoch time
var epoch = time.Unix(0, 0).Format(time.RFC1123)
// Taken from https://github.com/mytrile/nocache
var noCacheHeaders = map[string]string{
"Cache-Control": "no-cache, no-store, no-transform, must-revalidate, private, max-age=0",
"Expires": epoch,
"Pragma": "no-cache",
"X-Accel-Expires": "0",
}
var etagHeaders = []string{
"ETag",
"If-Match",
"If-Modified-Since",
"If-None-Match",
"If-Range",
"If-Unmodified-Since",
}
// filterReplace is the replacement for protected values
var filterReplace = [...]string{"PROTECTED"}
// camelCaseRe camel case regex
var camelCaseRe = regexp.MustCompile(`(?:^[\p{Ll}]|API|JSON|IP|URL|_?\d+|_|[\p{Lu}]+)[\p{Ll}]*`)
// SnakeCase takes a camelCaseWord and breaks it into a camel_case_word
func SnakeCase(str string) string {
words := camelCaseRe.FindAllString(str, -1)
for i := 0; i < len(words); i++ {
words[i] = strings.ToLower(strings.Replace(words[i], "_", "", -1))
}
return strings.Join(words, "_")
}
// FindString returns the index of the first instance of needle in the array or -1 if it could not be found
func FindString(needle string, haystack []string) int {
for i, straw := range haystack {
if needle == straw {
return i
}
}
return -1
}
// FilterMap will filter the parameters and not log parameters with sensitive data. To add more parameters - see the if in the loop.
func FilterMap(params *parameters.Params, filterOutFields []string) (filtered *parameters.Params) {
// Filtered parameters
filtered = new(parameters.Params)
// Map the values
filtered.Values = make(map[string]interface{}, len(params.Values))
// Loop the param values
for k, v := range params.Values {
if isInList(k, filterOutFields) {
filtered.Values[k] = filterReplace[:]
} else {
filtered.Values[k] = v
}
}
return
}
// isInList checks if string is known or not
func isInList(test string, list []string) bool {
for _, a := range list {
if test == a {
return true
}
}
return false
}
// GetParams gets the params from the http request (parsed once on log request)
// Helper method for the parameters package
func GetParams(req *http.Request) *parameters.Params {
return parameters.GetParams(req)
}
// PermitParams will remove all keys that not allowed
// Helper method for the parameters package
func PermitParams(params *parameters.Params, allowedKeys []string) {
params.Permit(allowedKeys)
}
// GetIPFromRequest gets the stored ip from the request if found
func GetIPFromRequest(req *http.Request) (ip string, ok bool) {
ip, ok = req.Context().Value(ipAddressKey).(string)
return
}
// GetRequestID gets the stored request id from the request
func GetRequestID(req *http.Request) (id string, ok bool) {
id, ok = req.Context().Value(requestIDKey).(string)
return
}
// GetClientIPAddress gets the client ip address
func GetClientIPAddress(req *http.Request) string {
// The ip address
var ip string
// Do we have a load balancer
if xForward := req.Header.Get("X-Forwarded-For"); xForward != "" {
// Set the ip as the given forwarded ip
ip = xForward
// Do we have more than one?
if strings.Contains(ip, ",") {
// Set the first ip address (from AWS)
ip = strings.Split(ip, ",")[0]
}
} else {
// Use the client address
ip = strings.Split(req.RemoteAddr, ":")[0]
// Remove bracket if local host
ip = strings.Replace(ip, "[", "", 1)
// Hack if no ip is found
// if len(ip) == 0 {
// ip = "localhost"
// }
}
// Parsing will also validate if it's IPv4 or IPv6
if parsed := net.ParseIP(ip); parsed != nil {
return parsed.String()
}
// IP failed to parse
return ""
}
// SetOnRequest will set the value on the request with the given key
func SetOnRequest(req *http.Request, keyName paramRequestKey, value interface{}) *http.Request {
return req.WithContext(context.WithValue(req.Context(), keyName, value))
}
// SetAuthToken set the authentication token on the request
func SetAuthToken(req *http.Request, authToken string) *http.Request {
return SetOnRequest(req, authTokenKey, authToken)
}
// GetAuthToken gets the stored authentication token from the request
func GetAuthToken(req *http.Request) (token string, ok bool) {
token, ok = req.Context().Value(authTokenKey).(string)
return
}
// SetCustomData set the custom data / user profile / permissions / etc
func SetCustomData(req *http.Request, data interface{}) *http.Request {
return SetOnRequest(req, customDataKey, data)
}
// GetCustomData gets the stored custom data
func GetCustomData(req *http.Request) (data interface{}) {
data = req.Context().Value(customDataKey)
return
}
// NoCache is a simple piece of middleware that sets a number of HTTP headers to prevent
// a router (or subrouter) from being cached by an upstream proxy and/or client.
//
// As per http://wiki.nginx.org/HttpProxyModule - NoCache sets:
//
// Expires: Thu, 01 Jan 1970 00:00:00 UTC
// Cache-Control: no-cache, private, max-age=0
// X-Accel-Expires: 0
// Pragma: no-cache (for HTTP/1.0 proxies/clients)
func NoCache(w http.ResponseWriter, req *http.Request) {
// Delete any ETag headers that may have been set
for _, v := range etagHeaders {
if req.Header.Get(v) != "" {
req.Header.Del(v)
}
}
// Set our NoCache headers
for k, v := range noCacheHeaders {
w.Header().Set(k, v)
}
}