- auth.Mount(env, key) wraps csrf.Protect with locked D-14/D-24 options - auth.LoadKeyFromEnv() reads SESSION_SECRET, hex-decodes, validates 32 bytes; fails fast on error - ui.CSRFField(token) templ component renders hidden _csrf input - Layout, LoginPage/Fragment, SignupPage/Fragment, Index all embed @ui.CSRFField(csrfToken) - Handlers thread csrf.Token(r) into every page/fragment render call - NewRouter mounts auth.Mount after ResolveSession, before all route groups (D-24) - main.go calls auth.LoadKeyFromEnv(); logs.Fatalf on missing/invalid SESSION_SECRET - SESSION_SECRET documented in .env.example with openssl rand -hex 32 instruction - go.mod: gorilla/csrf v1.7.3 (direct); prior tests updated with getCSRFToken helper - All Plan 04/05/06 tests updated to acquire and submit valid _csrf tokens
87 lines
3.4 KiB
Go
87 lines
3.4 KiB
Go
package web
|
|
|
|
import (
|
|
"context"
|
|
"log/slog"
|
|
"net/http"
|
|
"time"
|
|
|
|
"backend/internal/auth"
|
|
|
|
"github.com/go-chi/chi/v5"
|
|
chimw "github.com/go-chi/chi/v5/middleware"
|
|
)
|
|
|
|
// Pinger is the contract /healthz uses to probe the data plane. *pgxpool.Pool
|
|
// satisfies this interface out of the box, which is why cmd/web passes the
|
|
// pool directly to NewRouter (no adapter required).
|
|
type Pinger interface {
|
|
Ping(ctx context.Context) error
|
|
}
|
|
|
|
// NewRouter constructs the chi router with the middleware stack locked by
|
|
// CONTEXT D-24:
|
|
//
|
|
// 1. RequestIDMiddleware (UUIDv4 — NOT chi's base32 RequestID)
|
|
// 2. chi RealIP
|
|
// 3. SlogLoggerMiddleware (REPLACES chi's middleware.Logger — Pitfall 6)
|
|
// 4. chi Recoverer (after Logger so panics carry request_id)
|
|
// 5. auth.ResolveSession (reads session cookie, attaches user to context) — D-24
|
|
// 6. auth.Mount (gorilla/csrf — MUST come after ResolveSession, before routes) — D-24, Pitfall 7
|
|
//
|
|
// Routes: GET / · GET /healthz · GET /demo/time · GET /static/*
|
|
// GET /signup (auth pages, behind RedirectIfAuthed) · POST /signup.
|
|
// staticDir is the on-disk path served at /static/*; path traversal is
|
|
// blocked by http.Dir's default behavior (T-01-08).
|
|
//
|
|
// deps.Store may be nil during unit tests for Phase 1 routes (those routes
|
|
// never exercise session resolution). ResolveSession guards against nil Store.
|
|
//
|
|
// csrfKey is the 32-byte CSRF authentication key loaded from SESSION_SECRET.
|
|
// env is the runtime environment string (e.g. "dev", "development", "production").
|
|
// When env == "dev", the CSRF cookie Secure flag is disabled for plain-HTTP
|
|
// local development (D-15, D-24).
|
|
// trustedOrigins is an optional list of additional origins for the CSRF
|
|
// referer check (used in integration tests to allow localhost requests without
|
|
// a Referer header). In production, pass no extra args — leave empty.
|
|
func NewRouter(pinger Pinger, staticDir string, deps AuthDeps, csrfKey []byte, env string, trustedOrigins ...string) http.Handler {
|
|
r := chi.NewRouter()
|
|
r.Use(RequestIDMiddleware)
|
|
r.Use(chimw.RealIP)
|
|
r.Use(SlogLoggerMiddleware(slog.Default()))
|
|
r.Use(chimw.Recoverer)
|
|
// D-24 locked order: ResolveSession BEFORE csrf.Protect (auth.Mount).
|
|
r.Use(auth.ResolveSession(deps.Store))
|
|
// D-24: gorilla/csrf runs after ResolveSession and before all route groups (Pitfall 7).
|
|
r.Use(auth.Mount(env, csrfKey, trustedOrigins...))
|
|
|
|
// Auth pages — redirect to / if already authenticated.
|
|
r.Group(func(r chi.Router) {
|
|
r.Use(auth.RedirectIfAuthed)
|
|
r.Get("/signup", SignupPageHandler())
|
|
r.Get("/login", LoginPageHandler())
|
|
})
|
|
|
|
// Signup and login POSTs are intentionally outside the RedirectIfAuthed group:
|
|
// an authed user submitting the form directly should still get a useful
|
|
// response; the GET guard handles the common case.
|
|
r.Post("/signup", SignupPostHandler(deps))
|
|
r.Post("/login", LoginPostHandler(deps))
|
|
|
|
// Protected routes — require an authenticated session (D-23, AUTH-05).
|
|
// RequireAuth checks the context set by ResolveSession above and redirects
|
|
// unauthenticated requests to /login (HTMX: HX-Redirect, plain: 303).
|
|
r.Group(func(r chi.Router) {
|
|
r.Use(auth.RequireAuth)
|
|
r.Get("/", IndexHandler())
|
|
r.Post("/logout", LogoutHandler(deps))
|
|
})
|
|
|
|
r.Get("/healthz", HealthzHandler(pinger))
|
|
r.Get("/demo/time", DemoTimeHandler(func() time.Time { return time.Now() }))
|
|
|
|
fs := http.StripPrefix("/static/", http.FileServer(http.Dir(staticDir)))
|
|
r.Get("/static/*", fs.ServeHTTP)
|
|
|
|
return r
|
|
}
|