mirror of
				https://gitee.com/gitea/gitea
				synced 2025-11-04 08:30:25 +08:00 
			
		
		
		
	Refactor web route (#24080)
The old code is unnecessarily complex, and has many misuses. Old code "wraps" a lot, wrap wrap wrap, it's difficult to understand which kind of handler is used. The new code uses a general approach, we do not need to write all kinds of handlers into the "wrapper", do not need to wrap them again and again. New code, there are only 2 concepts: 1. HandlerProvider: `func (h any) (handlerProvider func (next) http.Handler)`, it can be used as middleware 2. Use HandlerProvider to get the final HandlerFunc, and use it for `r.Get()` And we can decouple the route package from context package (see the TODO). # FAQ ## Is `reflect` safe? Yes, all handlers are checked during startup, see the `preCheckHandler` comment. If any handler is wrong, developers could know it in the first time. ## Does `reflect` affect performance? No. https://github.com/go-gitea/gitea/pull/24080#discussion_r1164825901 1. This reflect code only runs for each web handler call, handler is far more slower: 10ms-50ms 2. The reflect is pretty fast (comparing to other code): 0.000265ms 3. XORM has more reflect operations already
This commit is contained in:
		@@ -103,7 +103,7 @@ func buildAuthGroup() *auth_service.Group {
 | 
			
		||||
func Routes(ctx gocontext.Context) *web.Route {
 | 
			
		||||
	routes := web.NewRoute()
 | 
			
		||||
 | 
			
		||||
	routes.Use(web.WrapWithPrefix("/assets/", web.Wrap(CorsHandler(), public.AssetsHandlerFunc("/assets/")), "AssetsHandler"))
 | 
			
		||||
	routes.Use(web.MiddlewareWithPrefix("/assets/", CorsHandler(), public.AssetsHandlerFunc("/assets/")))
 | 
			
		||||
 | 
			
		||||
	sessioner := session.Sessioner(session.Options{
 | 
			
		||||
		Provider:       setting.SessionConfig.Provider,
 | 
			
		||||
@@ -123,8 +123,8 @@ func Routes(ctx gocontext.Context) *web.Route {
 | 
			
		||||
	routes.Use(Recovery(ctx))
 | 
			
		||||
 | 
			
		||||
	// We use r.Route here over r.Use because this prevents requests that are not for avatars having to go through this additional handler
 | 
			
		||||
	routes.Route("/avatars/*", "GET, HEAD", storageHandler(setting.Avatar.Storage, "avatars", storage.Avatars))
 | 
			
		||||
	routes.Route("/repo-avatars/*", "GET, HEAD", storageHandler(setting.RepoAvatar.Storage, "repo-avatars", storage.RepoAvatars))
 | 
			
		||||
	routes.RouteMethods("/avatars/*", "GET, HEAD", storageHandler(setting.Avatar.Storage, "avatars", storage.Avatars))
 | 
			
		||||
	routes.RouteMethods("/repo-avatars/*", "GET, HEAD", storageHandler(setting.RepoAvatar.Storage, "repo-avatars", storage.RepoAvatars))
 | 
			
		||||
 | 
			
		||||
	// for health check - doesn't need to be passed through gzip handler
 | 
			
		||||
	routes.Head("/", func(w http.ResponseWriter, req *http.Request) {
 | 
			
		||||
@@ -153,7 +153,7 @@ func Routes(ctx gocontext.Context) *web.Route {
 | 
			
		||||
 | 
			
		||||
	if setting.Service.EnableCaptcha {
 | 
			
		||||
		// The captcha http.Handler should only fire on /captcha/* so we can just mount this on that url
 | 
			
		||||
		routes.Route("/captcha/*", "GET,HEAD", append(common, captcha.Captchaer(context.GetImageCaptcha()))...)
 | 
			
		||||
		routes.RouteMethods("/captcha/*", "GET,HEAD", append(common, captcha.Captchaer(context.GetImageCaptcha()))...)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if setting.HasRobotsTxt {
 | 
			
		||||
@@ -856,7 +856,7 @@ func RegisterRoutes(m *web.Route) {
 | 
			
		||||
					m.Post("/delete", org.SecretsDelete)
 | 
			
		||||
				})
 | 
			
		||||
 | 
			
		||||
				m.Route("/delete", "GET,POST", org.SettingsDelete)
 | 
			
		||||
				m.RouteMethods("/delete", "GET,POST", org.SettingsDelete)
 | 
			
		||||
 | 
			
		||||
				m.Group("/packages", func() {
 | 
			
		||||
					m.Get("", org.Packages)
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user