CORS: - Configurable allowed origins (wildcard "*" or specific domains) - Handles OPTIONS preflight with configurable methods, headers, max-age - Exposed headers support for browser API access - Env override: CORS_ALLOWED_ORIGINS Rate Limiting: - In-memory per-IP sliding window counter - Configurable request limit and time window - Background goroutine cleans up stale IP entries - HTTP 429 with Retry-After header when exceeded - Extracts real IP from X-Forwarded-For and X-Real-IP (proxy-aware) - Env overrides: RATE_LIMIT_REQUESTS, RATE_LIMIT_WINDOW, RATE_LIMIT_CLEANUP_INTERVAL - Set requests=0 in config to disable Both wired into main.go as middleware chain: rate_limit → cors → handler. Config example updated with [cors] and [rate_limit] sections. Full test coverage for both middleware packages.
87 lines
2.5 KiB
Go
87 lines
2.5 KiB
Go
package main
|
|
|
|
import (
|
|
"flag"
|
|
"fmt"
|
|
"log"
|
|
"log/slog"
|
|
"net/http"
|
|
"os"
|
|
|
|
"github.com/ashie/gosearch/internal/cache"
|
|
"github.com/ashie/gosearch/internal/config"
|
|
"github.com/ashie/gosearch/internal/httpapi"
|
|
"github.com/ashie/gosearch/internal/middleware"
|
|
"github.com/ashie/gosearch/internal/search"
|
|
)
|
|
|
|
func main() {
|
|
configPath := flag.String("config", "config.toml", "path to config.toml")
|
|
flag.Parse()
|
|
|
|
// Initialize structured logging.
|
|
logger := slog.New(slog.NewJSONHandler(os.Stdout, &slog.HandlerOptions{Level: slog.LevelInfo}))
|
|
slog.SetDefault(logger)
|
|
|
|
cfg, err := config.Load(*configPath)
|
|
if err != nil {
|
|
log.Fatalf("failed to load config: %v", err)
|
|
}
|
|
|
|
// Initialize Valkey cache.
|
|
searchCache := cache.New(cache.Config{
|
|
Address: cfg.Cache.Address,
|
|
Password: cfg.Cache.Password,
|
|
DB: cfg.Cache.DB,
|
|
DefaultTTL: cfg.CacheTTL(),
|
|
}, logger)
|
|
defer searchCache.Close()
|
|
|
|
// Seed env vars from config so existing engine/factory/planner code
|
|
// picks them up without changes. The config layer is the single source
|
|
// of truth; env vars remain as overrides via applyEnvOverrides.
|
|
if len(cfg.Engines.LocalPorted) > 0 {
|
|
os.Setenv("LOCAL_PORTED_ENGINES", cfg.LocalPortedCSV())
|
|
}
|
|
if cfg.Engines.Brave.APIKey != "" {
|
|
os.Setenv("BRAVE_API_KEY", cfg.Engines.Brave.APIKey)
|
|
}
|
|
if cfg.Engines.Brave.AccessToken != "" {
|
|
os.Setenv("BRAVE_ACCESS_TOKEN", cfg.Engines.Brave.AccessToken)
|
|
}
|
|
|
|
svc := search.NewService(search.ServiceConfig{
|
|
UpstreamURL: cfg.Upstream.URL,
|
|
HTTPTimeout: cfg.HTTPTimeout(),
|
|
Cache: searchCache,
|
|
})
|
|
|
|
h := httpapi.NewHandler(svc)
|
|
|
|
mux := http.NewServeMux()
|
|
mux.HandleFunc("/healthz", h.Healthz)
|
|
mux.HandleFunc("/search", h.Search)
|
|
|
|
// Apply middleware: rate limiter → CORS → handler.
|
|
var handler http.Handler = mux
|
|
handler = middleware.CORS(middleware.CORSConfig{
|
|
AllowedOrigins: cfg.CORS.AllowedOrigins,
|
|
AllowedMethods: cfg.CORS.AllowedMethods,
|
|
AllowedHeaders: cfg.CORS.AllowedHeaders,
|
|
ExposedHeaders: cfg.CORS.ExposedHeaders,
|
|
MaxAge: cfg.CORS.MaxAge,
|
|
})(handler)
|
|
handler = middleware.RateLimit(middleware.RateLimitConfig{
|
|
Requests: cfg.RateLimit.Requests,
|
|
Window: cfg.RateLimitWindow(),
|
|
CleanupInterval: cfg.RateLimitCleanupInterval(),
|
|
}, logger)(handler)
|
|
|
|
addr := fmt.Sprintf(":%d", cfg.Server.Port)
|
|
logger.Info("searxng-go starting",
|
|
"addr", addr,
|
|
"cache", searchCache.Enabled(),
|
|
"rate_limit", cfg.RateLimit.Requests > 0,
|
|
)
|
|
log.Fatal(http.ListenAndServe(addr, handler))
|
|
}
|