Source code
GitHub
# File railties/lib/rails/application/default_middleware_stack.rb, line 14
def build_stack
ActionDispatch::MiddlewareStack.new do |middleware|
unless Array(config.hosts).empty?
middleware.use ::ActionDispatch::HostAuthorization, config.hosts, **config.host_authorization
end
if config.assume_ssl
middleware.use ::ActionDispatch::AssumeSSL
end
if config.force_ssl
middleware.use ::ActionDispatch::SSL, **config.ssl_options,
ssl_default_redirect_status: config.action_dispatch.ssl_default_redirect_status
end
middleware.use ::Rack::Sendfile, config.action_dispatch.x_sendfile_header
if config.public_file_server.enabled
headers = config.public_file_server.headers || {}
middleware.use ::ActionDispatch::Static, paths["public"].first, index: config.public_file_server.index_name, headers: headers
end
if rack_cache = load_rack_cache
require "action_dispatch/http/rack_cache"
middleware.use ::Rack::Cache, rack_cache
end
if config.allow_concurrency == false
# User has explicitly opted out of concurrent request
# handling: presumably their code is not threadsafe
middleware.use ::Rack::Lock
end
middleware.use ::ActionDispatch::Executor, app.executor
middleware.use ::ActionDispatch::ServerTiming if config.server_timing
middleware.use ::Rack::Runtime
middleware.use ::Rack::MethodOverride unless config.api_only
middleware.use ::ActionDispatch::RequestId, header: config.action_dispatch.request_id_header
middleware.use ::ActionDispatch::RemoteIp, config.action_dispatch.ip_spoofing_check, config.action_dispatch.trusted_proxies
middleware.use ::Rails::Rack::Logger, config.log_tags
middleware.use ::ActionDispatch::ShowExceptions, show_exceptions_app
middleware.use ::ActionDispatch::DebugExceptions, app, config.debug_exception_response_format
if config.consider_all_requests_local
middleware.use ::ActionDispatch::ActionableExceptions
end
if config.reloading_enabled?
middleware.use ::ActionDispatch::Reloader, app.reloader
end
middleware.use ::ActionDispatch::Callbacks
middleware.use ::ActionDispatch::Cookies unless config.api_only
if !config.api_only && config.session_store
if config.force_ssl && config.ssl_options.fetch(:secure_cookies, true) && !config.session_options.key?(:secure)
config.session_options[:secure] = true
end
middleware.use config.session_store, config.session_options
end
unless config.api_only
middleware.use ::ActionDispatch::Flash
middleware.use ::ActionDispatch::ContentSecurityPolicy::Middleware
middleware.use ::ActionDispatch::PermissionsPolicy::Middleware
end
middleware.use ::Rack::Head
middleware.use ::Rack::ConditionalGet
middleware.use ::Rack::ETag, "no-cache"
middleware.use ::Rack::TempfileReaper unless config.api_only
if config.respond_to?(:active_record)
if selector_options = config.active_record.database_selector
resolver = config.active_record.database_resolver
context = config.active_record.database_resolver_context
middleware.use ::ActiveRecord::Middleware::DatabaseSelector, resolver, context, selector_options
end
if shard_resolver = config.active_record.shard_resolver
options = config.active_record.shard_selector || {}
middleware.use ::ActiveRecord::Middleware::ShardSelector, shard_resolver, options
end
end
end
end