(frontend_cache_purging)=
Many websites use a frontend cache such as Varnish, Squid, Cloudflare or CloudFront to gain extra performance. The downside of using a frontend cache though is that they don't respond well to updating content and will often keep an old version of a page cached after it has been updated.
This document describes how to configure Wagtail to purge old versions of pages from a frontend cache whenever a page gets updated.
Firstly, add "wagtail.contrib.frontend_cache"
to your INSTALLED_APPS
:
INSTALLED_APPS = [
...
"wagtail.contrib.frontend_cache"
]
The wagtailfrontendcache
module provides a set of signal handlers which will automatically purge the cache whenever a page is published or deleted. These signal handlers are automatically registered when the wagtail.contrib.frontend_cache
app is loaded.
Add a new item into the WAGTAILFRONTENDCACHE
setting and set the BACKEND
parameter to wagtail.contrib.frontend_cache.backends.HTTPBackend
. This backend requires an extra parameter LOCATION
which points to where the cache is running (this must be a direct connection to the server and cannot go through another proxy).
# settings.py
WAGTAILFRONTENDCACHE = {
'varnish': {
'BACKEND': 'wagtail.contrib.frontend_cache.backends.HTTPBackend',
'LOCATION': 'http://localhost:8000',
},
}
WAGTAILFRONTENDCACHE_LANGUAGES = []
Set WAGTAILFRONTENDCACHE_LANGUAGES
to a list of languages (typically equal to [l[0] for l in settings.LANGUAGES]
) to also purge the urls for each language of a purging url. This setting needs settings.USE_I18N
to be True
to work. Its default is an empty list.
Finally, make sure you have configured your frontend cache to accept PURGE requests:
(frontendcache_cloudflare)=
Firstly, you need to register an account with Cloudflare if you haven't already got one. You can do this here: Cloudflare Sign up.
Add an item into the WAGTAILFRONTENDCACHE
and set the BACKEND
parameter to wagtail.contrib.frontend_cache.backends.CloudflareBackend
.
This backend can be configured to use an account-wide API key, or an API token with restricted access.
To use an account-wide API key, find the key as described in the Cloudflare documentation and specify EMAIL
and API_KEY
parameters.
To use a limited API token, create a token configured with the 'Zone, Cache Purge' permission and specify the BEARER_TOKEN
parameter.
A ZONEID
parameter will need to be set for either option. To find the ZONEID
for your domain, read the Cloudflare API Documentation.
With an API key:
# settings.py
WAGTAILFRONTENDCACHE = {
'cloudflare': {
'BACKEND': 'wagtail.contrib.frontend_cache.backends.CloudflareBackend',
'EMAIL': 'your-cloudflare-email-address@example.com',
'API_KEY': 'your cloudflare api key',
'ZONEID': 'your cloudflare domain zone id',
},
}
With an API token:
# settings.py
WAGTAILFRONTENDCACHE = {
'cloudflare': {
'BACKEND': 'wagtail.contrib.frontend_cache.backends.CloudflareBackend',
'BEARER_TOKEN': 'your cloudflare bearer token',
'ZONEID': 'your cloudflare domain zone id',
},
}
(frontendcache_aws_cloudfront)=
Within Amazon Web Services you will need at least one CloudFront web distribution. If you don't have one, you can get one here: CloudFront getting started
Add an item into the WAGTAILFRONTENDCACHE
and set the BACKEND
parameter to wagtail.contrib.frontend_cache.backends.CloudfrontBackend
. This backend requires one extra parameter, DISTRIBUTION_ID
(your CloudFront generated distribution id).
WAGTAILFRONTENDCACHE = {
'cloudfront': {
'BACKEND': 'wagtail.contrib.frontend_cache.backends.CloudfrontBackend',
'DISTRIBUTION_ID': 'your-distribution-id',
},
}
6.2
Previous versions allowed passing a dict for `DISTRIBUTION_ID` to allow specifying different distribution IDs for different hostnames. This is now deprecated; instead, multiple distribution IDs should be defined as [multiple backends](frontendcache_multiple_backends), with a `HOSTNAMES` parameter to define the hostnames associated with each one.
boto3
will attempt to discover credentials itself. You can read more about this here: Boto 3 Docs. The user will need a policy similar to:
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "AllowWagtailFrontendInvalidation",
"Effect": "Allow",
"Action": "cloudfront:CreateInvalidation",
"Resource": "arn:aws:cloudfront::<account id>:distribution/<distribution id>"
}
]
}
To specify credentials manually, pass them as additional parameters:
WAGTAILFRONTENDCACHE = {
'cloudfront': {
'BACKEND': 'wagtail.contrib.frontend_cache.backends.CloudfrontBackend',
'DISTRIBUTION_ID': 'your-distribution-id',
'AWS_ACCESS_KEY_ID': os.environ['FRONTEND_CACHE_AWS_ACCESS_KEY_ID'],
'AWS_SECRET_ACCESS_KEY': os.environ['FRONTEND_CACHE_AWS_SECRET_ACCESS_KEY'],
'AWS_SESSION_TOKEN': os.environ['FRONTEND_CACHE_AWS_SESSION_TOKEN']
},
}
With Azure CDN you will need a CDN profile with an endpoint configured.
The third-party dependencies of this backend are:
PyPI Package | Essential | Reason |
---|---|---|
azure-mgmt-cdn |
Yes (v10.0 or above) | Interacting with the CDN service. |
azure-identity |
No | Obtaining credentials. It's optional if you want to specify your own credential using a CREDENTIALS setting (more details below). |
azure-mgmt-resource |
No | For obtaining the subscription ID. Redundant if you want to explicitly specify a SUBSCRIPTION_ID setting (more details below). |
Add an item into the WAGTAILFRONTENDCACHE
and set the BACKEND
parameter to wagtail.contrib.frontend_cache.backends.AzureCdnBackend
. This backend requires the following settings to be set:
RESOURCE_GROUP_NAME
- the resource group that your CDN profile is in.CDN_PROFILE_NAME
- the profile name of the CDN service that you want to use.CDN_ENDPOINT_NAME
- the name of the endpoint you want to be purged.
WAGTAILFRONTENDCACHE = {
'azure_cdn': {
'BACKEND': 'wagtail.contrib.frontend_cache.backends.AzureCdnBackend',
'RESOURCE_GROUP_NAME': 'MY-WAGTAIL-RESOURCE-GROUP',
'CDN_PROFILE_NAME': 'wagtailio',
'CDN_ENDPOINT_NAME': 'wagtailio-cdn-endpoint-123',
},
}
By default the credentials will use azure.identity.DefaultAzureCredential
. To modify the credential object used, please use CREDENTIALS
setting. Read about your options on the Azure documentation.
from azure.common.credentials import ServicePrincipalCredentials
WAGTAILFRONTENDCACHE = {
'azure_cdn': {
'BACKEND': 'wagtail.contrib.frontend_cache.backends.AzureCdnBackend',
'RESOURCE_GROUP_NAME': 'MY-WAGTAIL-RESOURCE-GROUP',
'CDN_PROFILE_NAME': 'wagtailio',
'CDN_ENDPOINT_NAME': 'wagtailio-cdn-endpoint-123',
'CREDENTIALS': ServicePrincipalCredentials(
client_id='your client id',
secret='your client secret',
)
},
}
Another option that can be set is SUBSCRIPTION_ID
. By default the first encountered subscription will be used, but if your credential has access to more subscriptions, you should set this to an explicit value.
With Azure Front Door you will need a Front Door instance with caching enabled.
The third-party dependencies of this backend are:
PyPI Package | Essential | Reason |
---|---|---|
azure-mgmt-frontdoor |
Yes (v1.0 or above) | Interacting with the Front Door service. |
azure-identity |
No | Obtaining credentials. It's optional if you want to specify your own credential using a CREDENTIALS setting (more details below). |
azure-mgmt-resource |
No | For obtaining the subscription ID. Redundant if you want to explicitly specify a SUBSCRIPTION_ID setting (more details below). |
Add an item into the WAGTAILFRONTENDCACHE
and set the BACKEND
parameter to wagtail.contrib.frontend_cache.backends.AzureFrontDoorBackend
. This backend requires the following settings to be set:
RESOURCE_GROUP_NAME
- the resource group that your Front Door instance is part of.FRONT_DOOR_NAME
- your configured Front Door instance name.
WAGTAILFRONTENDCACHE = {
'azure_front_door': {
'BACKEND': 'wagtail.contrib.frontend_cache.backends.AzureFrontDoorBackend',
'RESOURCE_GROUP_NAME': 'MY-WAGTAIL-RESOURCE-GROUP',
'FRONT_DOOR_NAME': 'wagtail-io-front-door',
},
}
By default the credentials will use azure.identity.DefaultAzureCredential
. To modify the credential object used, please use CREDENTIALS
setting. Read about your options on the Azure documentation.
from azure.common.credentials import ServicePrincipalCredentials
WAGTAILFRONTENDCACHE = {
'azure_front_door': {
'BACKEND': 'wagtail.contrib.frontend_cache.backends.AzureFrontDoorBackend',
'RESOURCE_GROUP_NAME': 'MY-WAGTAIL-RESOURCE-GROUP',
'FRONT_DOOR_NAME': 'wagtail-io-front-door',
'CREDENTIALS': ServicePrincipalCredentials(
client_id='your client id',
secret='your client secret',
)
},
}
Another option that can be set is SUBSCRIPTION_ID
. By default the first encountered subscription will be used, but if your credential has access to more subscriptions, you should set this to an explicit value.
(frontendcache_multiple_backends)=
Multiple backends can be configured by adding multiple entries in WAGTAILFRONTENDCACHE
.
By default, a backend will attempt to invalidate all invalidation requests. To only invalidate certain hostnames, specify them in HOSTNAMES
:
WAGTAILFRONTENDCACHE = {
'main-site': {
'BACKEND': 'wagtail.contrib.frontend_cache.backends.HTTPBackend',
'LOCATION': 'http://localhost:8000',
'HOSTNAMES': ['example.com']
},
'cdn': {
'BACKEND': 'wagtail.contrib.frontend_cache.backends.CloudflareBackend',
'BEARER_TOKEN': 'your cloudflare bearer token',
'ZONEID': 'your cloudflare domain zone id',
'HOSTNAMES': ['cdn.example.com']
},
}
In the above example, invalidations for cdn.example.com/foo
will be invalidated by Cloudflare, whilst example.com/foo
will be invalidated with the main-site
backend. This allows different configuration to be used for each backend, for example by changing the ZONEID
for the Cloudflare backend:
WAGTAILFRONTENDCACHE = {
'main-site': {
'BACKEND': 'wagtail.contrib.frontend_cache.backends.CloudflareBackend',
'BEARER_TOKEN': os.environ["CLOUDFLARE_BEARER_TOKEN"],
'ZONEID': 'example.com zone id',
'HOSTNAMES': ['example.com']
},
'other-site': {
'BACKEND': 'wagtail.contrib.frontend_cache.backends.CloudflareBackend',
'BEARER_TOKEN': os.environ["CLOUDFLARE_BEARER_TOKEN"],
'ZONEID': 'example.net zone id',
'HOSTNAMES': ['example.net']
},
}
In most cases, absolute URLs with ``www`` prefixed domain names should be used in your mapping. Only drop the ``www`` prefix if you're absolutely sure you're not using it (for example a subdomain).
Much like Django's ALLOWED_HOSTS
, values in HOSTNAMES
starting with a .
can be used as a subdomain wildcard.
By default, Wagtail will only purge one URL per page. If your page has more than one URL to be purged, you will need to override the get_cached_paths
method on your page type.
class BlogIndexPage(Page):
def get_blog_items(self):
# This returns a Django paginator of blog items in this section
return Paginator(self.get_children().live().type(BlogPage), 10)
def get_cached_paths(self):
# Yield the main URL
yield '/'
# Yield one URL per page in the paginator to make sure all pages are purged
for page_number in range(1, self.get_blog_items().num_pages + 1):
yield '/?page=' + str(page_number)
Pages that list other pages (such as a blog index) may need to be purged as well so any changes to a blog page are also reflected on the index (for example, a blog post was added, deleted or its title/thumbnail was changed).
To purge these pages, we need to write a signal handler that listens for
Wagtail's page_published
and page_unpublished
signals for blog pages
(note, page_published
is called both when a page is created and updated).
This signal handler would trigger the invalidation of the index page using the
PurgeBatch
class which is used to construct and dispatch invalidation requests.
# models.py
from django.dispatch import receiver
from django.db.models.signals import pre_delete
from wagtail.signals import page_published
from wagtail.contrib.frontend_cache.utils import PurgeBatch
...
def blog_page_changed(blog_page):
# Find all the live BlogIndexPages that contain this blog_page
batch = PurgeBatch()
for blog_index in BlogIndexPage.objects.live():
if blog_page in blog_index.get_blog_items().object_list:
batch.add_page(blog_index)
# Purge all the blog indexes we found in a single request
batch.purge()
@receiver(page_published, sender=BlogPage)
def blog_published_handler(instance, **kwargs):
blog_page_changed(instance)
@receiver(pre_delete, sender=BlogPage)
def blog_deleted_handler(instance, **kwargs):
blog_page_changed(instance)
(frontend_cache_invalidating_urls)=
The PurgeBatch
class provides a .add_url(url)
and a .add_urls(urls)
for adding individual URLs to the purge batch.
For example, this could be useful for purging a single page on a blog index:
from wagtail.contrib.frontend_cache.utils import PurgeBatch
# Purge the first page of the blog index
batch = PurgeBatch()
batch.add_url(blog_index.url + '?page=1')
batch.purge()
PurgeBatch
classAll of the methods available on PurgeBatch
are listed below:
.. automodule:: wagtail.contrib.frontend_cache.utils
.. autoclass:: PurgeBatch
.. automethod:: add_url
.. automethod:: add_urls
.. automethod:: add_page
.. automethod:: add_pages
.. automethod:: purge