go get -u github.com/go-pkgz/rest
Adds info to every response header:
- App-Name - application name
- App-Version - application version
- Org - organization
- M-Host - host name from instance-level
$MHOST
env
Responds with pong
on GET /ping
. Also, responds to anything with /ping
suffix, like /v2/ping
.
Example for both:
> http GET https://remark42.radio-t.com/ping
HTTP/1.1 200 OK
Date: Sun, 15 Jul 2018 19:40:31 GMT
Content-Type: text/plain
Content-Length: 4
Connection: keep-alive
App-Name: remark42
App-Version: master-ed92a0b-20180630-15:59:56
Org: Umputun
pong
Responds with the status 200 if all health checks passed, 503 if any failed. Both health path and check functions passed by consumer. For production usage this middleware should be used with throttler/limiter and, optionally, with some auth middlewares
Example of usage:
check1 := func(ctx context.Context) (name string, err error) {
// do some check, for example check DB connection
return "check1", nil // all good, passed
}
check2 := func(ctx context.Context) (name string, err error) {
// do some other check, for example ping an external service
return "check2", errors.New("some error") // check failed
}
router := chi.NewRouter()
router.Use(rest.Health("/health", check1, check2))
example of the actual call and response:
> http GET https://example.com/health
HTTP/1.1 503 Service Unavailable
Date: Sun, 15 Jul 2018 19:40:31 GMT
Content-Type: application/json; charset=utf-8
Content-Length: 36
[
{"name":"check1","status":"ok"},
{"name":"check2","status":"failed","error":"some error"}
]
this middleware is pretty basic, but can be used for simple health checks. For more complex cases, like async/cached health checks see alexliesenfeld/health
Logs request, request handling time and response. Log record fields in order of occurrence:
- Request's HTTP method
- Requested URL (with sanitized query)
- Remote IP
- Response's HTTP status code
- Response body size
- Request handling time
- Userinfo associated with the request (optional)
- Request subject (optional)
- Request ID (if
X-Request-ID
present) - Request body (optional)
remote IP can be masked with user defined function
example: 019/03/05 17:26:12.976 [INFO] GET - /api/v1/find?site=remark - 8e228e9cfece - 200 (115) - 4.47784618s
Recoverer is a middleware that recovers from panics, logs the panic (and a backtrace), and returns an HTTP 500 (Internal Server Error) status if possible. It prevents server crashes in case of panic in one of the controllers.
OnlyFrom middleware allows access from a limited list of source IPs.
Such IPs can be defined as complete ip (like 192.168.1.12), prefix (129.168.) or CIDR (192.168.0.0/16).
The middleware will respond with StatusForbidden
(403) if the request comes from a different IP.
It supports both IPv4 and IPv6 and checks the usual headers like X-Forwarded-For
and X-Real-IP
and the remote address.
Note: headers should be trusted and set by a proxy, otherwise it is possible to spoof them.
Metrics middleware responds to GET /metrics with list of expvar. Optionally allows a restricted list of source ips.
BlackWords middleware doesn't allow user-defined words in the request body.
SizeLimit middleware checks if body size is above the limit and returns StatusRequestEntityTooLarge
(413)
The Trace
middleware is designed to add request tracing functionality. It looks for the X-Request-ID
header in
the incoming HTTP request. If not found, a random ID is generated. This trace ID is then set in the response headers
and added to the request's context.
Adds the HTTP Deprecation response header, see draft-ietf-httpapi-deprecation-header-02
BasicAuth middleware requires basic auth and matches user & passwd with client-provided checker. In case if no basic auth headers returns
StatusUnauthorized
, in case if checker failed - StatusForbidden
The Rewrite
middleware is designed to rewrite the URL path based on a given rule, similar to how URL rewriting is done in nginx. It supports regular expressions for pattern matching and prevents multiple rewrites.
For example, Rewrite("^/sites/(.*)/settings/$", "/sites/settings/$1")
will change request's URL from /sites/id1/settings/
to /sites/settings/id1
Sets a number of HTTP headers to prevent a router (handler's) response from being cached by an upstream proxy and/or client.
Sets headers (passed as key:value) to requests. I.e. rest.Headers("Server:MyServer", "X-Blah:Foo")
Compresses response with gzip.
RealIP is a middleware that sets a http.Request's RemoteAddr to the results of parsing either the X-Forwarded-For or X-Real-IP headers.
Maybe middleware allows changing the flow of the middleware stack execution depending on the return value of maybeFn(request). This is useful, for example, to skip a middleware handler if a request does not satisfy the maybeFn logic.
Reject is a middleware that rejects requests with a given status code and message based on a user-defined function. This is useful, for example, to reject requests to a particular resource based on a request header, or to implement a conditional request handler based on service parameters.
example with chi router:
router := chi.NewRouter()
rejectFn := func(r *http.Request) (bool) {
return r.Header.Get("X-Request-Id") == "" // reject if no X-Request-Id header
}
router.Use(rest.Reject(http.StatusBadRequest, "X-Request-Id header is required", rejectFn))
The package provides several BasicAuth middleware implementations for different authentication needs:
The base middleware that requires basic auth and matches user & passwd with a client-provided checker function.
checkFn := func(user, passwd string) bool {
return user == "admin" && passwd == "secret"
}
router.Use(rest.BasicAuth(checkFn))
A simpler version comparing user & password with provided values directly.
router.Use(rest.BasicAuthWithUserPasswd("admin", "secret"))
Matches username and bcrypt-hashed password. Useful when storing hashed passwords.
hash, err := rest.GenerateBcryptHash("secret")
if err != nil {
// handle error
}
router.Use(rest.BasicAuthWithBcryptHash("admin", hash))
Similar to bcrypt version but uses Argon2id hash with a separate salt. Both hash and salt are base64 encoded.
hash, salt, err := rest.GenerateArgon2Hash("secret")
if err != nil {
// handle error
}
router.Use(rest.BasicAuthWithArgon2Hash("admin", hash, salt))
Similar to BasicAuthWithUserPasswd but adds browser's authentication prompt by setting the WWW-Authenticate header.
router.Use(rest.BasicAuthWithPrompt("admin", "secret"))
All BasicAuth middlewares:
- Return
StatusUnauthorized
(401) if no auth header provided - Return
StatusForbidden
(403) if credentials check failed - Add IsAuthorized flag to the request context, retrievable with
rest.IsAuthorized(r.Context())
- Use constant-time comparison to prevent timing attacks
- Support secure password hashing with bcrypt and Argon2id
Benchmarks middleware allows measuring the time of request handling, number of requests per second and report aggregated metrics. This middleware keeps track of the request in the memory and keep up to 900 points (15 minutes, data-point per second).
To retrieve the data user should call Stats(d duration)
method.
The duration
is the time window for which the benchmark data should be returned.
It can be any duration from 1s to 15m. Note: all the time data is in microseconds.
example with chi router:
router := chi.NewRouter()
bench = rest.NewBenchmarks()
router.Use(bench.Middleware)
...
router.Get("/bench", func(w http.ResponseWriter, r *http.Request) {
resp := struct {
OneMin rest.BenchmarkStats `json:"1min"`
FiveMin rest.BenchmarkStats `json:"5min"`
FifteenMin rest.BenchmarkStats `json:"15min"`
}{
bench.Stats(time.Minute),
bench.Stats(time.Minute * 5),
bench.Stats(time.Minute * 15),
}
render.JSON(w, r, resp)
})
rest.Wrap
- converts a list of middlewares to nested handlers calls (in reverse order)rest.JSON
- map alias, just for conveniencetype JSON map[string]interface{}
rest.RenderJSON
- renders json response frominterface{}
rest.RenderJSONFromBytes
- renders json response from[]byte
rest.RenderJSONWithHTML
- renders json response with html tags and forcedcharset=utf-8
rest.SendErrorJSON
- makes{error: blah, details: blah}
json body and responds with given error code. Also, adds context to the logged messagerest.NewErrorLogger
- creates a struct providing shorter form of logger callrest.FileServer
- creates a file server for static assets with directory listing disabledrealip.Get
- returns client's IP addressrest.ParseFromTo
- parses "from" and "to" request's query params with various formatsrest.DecodeJSON
- decodes request body to the provided structrest.EncodeJSON
- encodes response body from the provided struct, setsContent-Type
toapplication/json
and sends the status code
Profiler is a convenient sub-router used for mounting net/http/pprof, i.e.
func MyService() http.Handler {
r := chi.NewRouter()
// ..middlewares
r.Mount("/debug", middleware.Profiler())
// ..routes
return r
}
It exposes a bunch of /pprof/*
endpoints as well as /vars
. Builtin support for onlyIps
allows restricting access, which is important if it runs on a publicly exposed port. However, counting on IP check only is not that reliable way to limit request and for production use it would be better to add some sort of auth (for example provided BasicAuth
middleware) or run with a separate http server, exposed to internal ip/port only.