@@ -2,6 +2,7 @@ import type { Span } from '@opentelemetry/api'
2
2
import type { NextConfigComplete } from 'next/dist/server/config-shared.js'
3
3
4
4
import { encodeBlobKey } from '../shared/blobkey.js'
5
+ import type { NetlifyCachedRouteValue } from '../shared/cache-types.cjs'
5
6
6
7
import { getLogger , RequestContext } from './handlers/request-context.cjs'
7
8
import type { RuntimeTracer } from './handlers/tracer.cjs'
@@ -208,6 +209,19 @@ export const adjustDateHeader = async ({
208
209
headers . set ( 'date' , lastModifiedDate . toUTCString ( ) )
209
210
}
210
211
212
+ function setCacheControlFromRequestContext (
213
+ headers : Headers ,
214
+ revalidate : NetlifyCachedRouteValue [ 'revalidate' ] ,
215
+ ) {
216
+ const cdnCacheControl =
217
+ // if we are serving already stale response, instruct edge to not attempt to cache that response
218
+ headers . get ( 'x-nextjs-cache' ) === 'STALE'
219
+ ? 'public, max-age=0, must-revalidate, durable'
220
+ : `s-maxage=${ revalidate === false ? 31536000 : revalidate } , stale-while-revalidate=31536000, durable`
221
+
222
+ headers . set ( 'netlify-cdn-cache-control' , cdnCacheControl )
223
+ }
224
+
211
225
/**
212
226
* Ensure stale-while-revalidate and s-maxage don't leak to the client, but
213
227
* assume the user knows what they are doing if CDN cache controls are set
@@ -225,13 +239,7 @@ export const setCacheControlHeaders = (
225
239
! headers . has ( 'netlify-cdn-cache-control' )
226
240
) {
227
241
// handle CDN Cache Control on Route Handler responses
228
- const cdnCacheControl =
229
- // if we are serving already stale response, instruct edge to not attempt to cache that response
230
- headers . get ( 'x-nextjs-cache' ) === 'STALE'
231
- ? 'public, max-age=0, must-revalidate, durable'
232
- : `s-maxage=${ requestContext . routeHandlerRevalidate === false ? 31536000 : requestContext . routeHandlerRevalidate } , stale-while-revalidate=31536000, durable`
233
-
234
- headers . set ( 'netlify-cdn-cache-control' , cdnCacheControl )
242
+ setCacheControlFromRequestContext ( headers , requestContext . routeHandlerRevalidate )
235
243
return
236
244
}
237
245
@@ -242,11 +250,25 @@ export const setCacheControlHeaders = (
242
250
. log ( 'NetlifyHeadersHandler.trailingSlashRedirect' )
243
251
}
244
252
245
- if ( status === 404 && request . url . endsWith ( '.php' ) ) {
246
- // temporary CDN Cache Control handling for bot probes on PHP files
247
- // https://linear.app/netlify/issue/FRB-1344/prevent-excessive-ssr-invocations-due-to-404-routes
248
- headers . set ( 'cache-control' , 'public, max-age=0, must-revalidate' )
249
- headers . set ( 'netlify-cdn-cache-control' , `max-age=31536000, durable` )
253
+ if ( status === 404 ) {
254
+ if ( request . url . endsWith ( '.php' ) ) {
255
+ // temporary CDN Cache Control handling for bot probes on PHP files
256
+ // https://linear.app/netlify/issue/FRB-1344/prevent-excessive-ssr-invocations-due-to-404-routes
257
+ headers . set ( 'cache-control' , 'public, max-age=0, must-revalidate' )
258
+ headers . set ( 'netlify-cdn-cache-control' , `max-age=31536000, durable` )
259
+ return
260
+ }
261
+
262
+ if (
263
+ typeof requestContext . pageHandlerRevalidate !== 'undefined' &&
264
+ [ 'GET' , 'HEAD' ] . includes ( request . method ) &&
265
+ ! headers . has ( 'cdn-cache-control' ) &&
266
+ ! headers . has ( 'netlify-cdn-cache-control' )
267
+ ) {
268
+ // handle CDN Cache Control on 404 Page responses
269
+ setCacheControlFromRequestContext ( headers , requestContext . pageHandlerRevalidate )
270
+ return
271
+ }
250
272
}
251
273
252
274
const cacheControl = headers . get ( 'cache-control' )
0 commit comments