2019-07-01 06:07:58 +08:00
|
|
|
// Copyright 2015 Matthew Holt and The Caddy Authors
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
2019-05-21 00:59:20 +08:00
|
|
|
package caddyhttp
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"fmt"
|
|
|
|
"log"
|
2019-05-23 04:14:26 +08:00
|
|
|
"net"
|
2019-05-21 00:59:20 +08:00
|
|
|
"net/http"
|
2019-05-21 11:21:33 +08:00
|
|
|
"strconv"
|
2019-06-27 06:03:29 +08:00
|
|
|
"strings"
|
2019-05-21 00:59:20 +08:00
|
|
|
|
2019-07-03 02:37:06 +08:00
|
|
|
"github.com/caddyserver/caddy/v2"
|
|
|
|
"github.com/caddyserver/caddy/v2/modules/caddytls"
|
2019-05-21 00:59:20 +08:00
|
|
|
)
|
|
|
|
|
|
|
|
// Server is an HTTP server.
|
|
|
|
type Server struct {
|
2019-06-27 00:49:32 +08:00
|
|
|
Listen []string `json:"listen,omitempty"`
|
|
|
|
ReadTimeout caddy.Duration `json:"read_timeout,omitempty"`
|
|
|
|
ReadHeaderTimeout caddy.Duration `json:"read_header_timeout,omitempty"`
|
|
|
|
WriteTimeout caddy.Duration `json:"write_timeout,omitempty"`
|
|
|
|
IdleTimeout caddy.Duration `json:"idle_timeout,omitempty"`
|
|
|
|
MaxHeaderBytes int `json:"max_header_bytes,omitempty"`
|
|
|
|
Routes RouteList `json:"routes,omitempty"`
|
|
|
|
Errors *HTTPErrorConfig `json:"errors,omitempty"`
|
|
|
|
TLSConnPolicies caddytls.ConnectionPolicies `json:"tls_connection_policies,omitempty"`
|
|
|
|
AutoHTTPS *AutoHTTPSConfig `json:"automatic_https,omitempty"`
|
2019-07-12 12:02:47 +08:00
|
|
|
MaxRehandles *int `json:"max_rehandles,omitempty"`
|
2019-06-27 06:03:29 +08:00
|
|
|
StrictSNIHost bool `json:"strict_sni_host,omitempty"` // TODO: see if we can turn this on by default when clientauth is configured
|
2019-05-21 00:59:20 +08:00
|
|
|
|
|
|
|
tlsApp *caddytls.TLS
|
|
|
|
}
|
|
|
|
|
|
|
|
// ServeHTTP is the entry point for all HTTP requests.
|
|
|
|
func (s *Server) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
2019-06-29 09:28:47 +08:00
|
|
|
w.Header().Set("Server", "Caddy")
|
|
|
|
|
2019-05-21 00:59:20 +08:00
|
|
|
if s.tlsApp.HandleHTTPChallenge(w, r) {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-05-21 13:48:43 +08:00
|
|
|
// set up the context for the request
|
2019-06-15 01:58:28 +08:00
|
|
|
repl := caddy.NewReplacer()
|
|
|
|
ctx := context.WithValue(r.Context(), caddy.ReplacerCtxKey, repl)
|
2019-06-19 01:13:12 +08:00
|
|
|
ctx = context.WithValue(ctx, ServerCtxKey, s)
|
2019-08-10 02:05:47 +08:00
|
|
|
ctx = context.WithValue(ctx, VarCtxKey, make(map[string]interface{}))
|
2019-05-21 00:59:20 +08:00
|
|
|
r = r.WithContext(ctx)
|
|
|
|
|
2019-05-21 13:48:43 +08:00
|
|
|
// once the pointer to the request won't change
|
|
|
|
// anymore, finish setting up the replacer
|
|
|
|
addHTTPVarsToReplacer(repl, r, w)
|
|
|
|
|
2019-05-21 00:59:20 +08:00
|
|
|
// build and execute the main handler chain
|
2019-07-12 12:02:47 +08:00
|
|
|
err := s.executeCompositeRoute(w, r, s.Routes)
|
2019-05-21 00:59:20 +08:00
|
|
|
if err != nil {
|
2019-05-21 11:21:33 +08:00
|
|
|
// add the raw error value to the request context
|
|
|
|
// so it can be accessed by error handlers
|
2019-05-21 00:59:20 +08:00
|
|
|
c := context.WithValue(r.Context(), ErrorCtxKey, err)
|
|
|
|
r = r.WithContext(c)
|
2019-05-21 11:21:33 +08:00
|
|
|
|
|
|
|
// add error values to the replacer
|
|
|
|
repl.Set("http.error", err.Error())
|
|
|
|
if handlerErr, ok := err.(HandlerError); ok {
|
|
|
|
repl.Set("http.error.status_code", strconv.Itoa(handlerErr.StatusCode))
|
|
|
|
repl.Set("http.error.status_text", http.StatusText(handlerErr.StatusCode))
|
|
|
|
repl.Set("http.error.message", handlerErr.Message)
|
|
|
|
repl.Set("http.error.trace", handlerErr.Trace)
|
|
|
|
repl.Set("http.error.id", handlerErr.ID)
|
|
|
|
}
|
2019-05-21 00:59:20 +08:00
|
|
|
|
2019-05-24 04:42:14 +08:00
|
|
|
if s.Errors != nil && len(s.Errors.Routes) > 0 {
|
2019-07-12 12:02:47 +08:00
|
|
|
err := s.executeCompositeRoute(w, r, s.Errors.Routes)
|
2019-05-21 00:59:20 +08:00
|
|
|
if err != nil {
|
|
|
|
// TODO: what should we do if the error handler has an error?
|
2019-06-22 04:36:26 +08:00
|
|
|
log.Printf("[ERROR] [%s %s] handling error: %v", r.Method, r.RequestURI, err)
|
2019-05-21 00:59:20 +08:00
|
|
|
}
|
2019-05-24 04:42:14 +08:00
|
|
|
} else {
|
|
|
|
// TODO: polish the default error handling
|
2019-06-22 04:36:26 +08:00
|
|
|
log.Printf("[ERROR] [%s %s] %v", r.Method, r.RequestURI, err)
|
2019-05-24 04:42:14 +08:00
|
|
|
if handlerErr, ok := err.(HandlerError); ok {
|
|
|
|
w.WriteHeader(handlerErr.StatusCode)
|
2019-05-29 08:52:21 +08:00
|
|
|
} else {
|
|
|
|
w.WriteHeader(http.StatusInternalServerError)
|
2019-05-24 04:42:14 +08:00
|
|
|
}
|
2019-05-21 00:59:20 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-07-12 12:02:47 +08:00
|
|
|
// executeCompositeRoute compiles a composite route from routeList and executes
|
|
|
|
// it using w and r. This function handles the sentinel ErrRehandle error value,
|
|
|
|
// which reprocesses requests through the stack again. Any error value returned
|
|
|
|
// from this function would be an actual error that needs to be handled.
|
|
|
|
func (s *Server) executeCompositeRoute(w http.ResponseWriter, r *http.Request, routeList RouteList) error {
|
|
|
|
maxRehandles := 0
|
|
|
|
if s.MaxRehandles != nil {
|
|
|
|
maxRehandles = *s.MaxRehandles
|
|
|
|
}
|
2019-05-21 00:59:20 +08:00
|
|
|
var err error
|
2019-07-12 12:02:47 +08:00
|
|
|
for i := -1; i <= maxRehandles; i++ {
|
2019-05-21 00:59:20 +08:00
|
|
|
// we started the counter at -1 because we
|
|
|
|
// always want to run this at least once
|
2019-07-12 12:02:47 +08:00
|
|
|
|
|
|
|
// the purpose of rehandling is often to give
|
|
|
|
// matchers a chance to re-evaluate on the
|
|
|
|
// changed version of the request, so compile
|
|
|
|
// the handler stack anew in each iteration
|
|
|
|
stack := routeList.BuildCompositeRoute(r)
|
|
|
|
stack = s.wrapPrimaryRoute(stack)
|
|
|
|
|
|
|
|
// only loop if rehandling is required
|
2019-05-21 00:59:20 +08:00
|
|
|
err = stack.ServeHTTP(w, r)
|
|
|
|
if err != ErrRehandle {
|
|
|
|
break
|
|
|
|
}
|
2019-07-12 12:02:47 +08:00
|
|
|
if i >= maxRehandles-1 {
|
2019-05-21 00:59:20 +08:00
|
|
|
return fmt.Errorf("too many rehandles")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2019-06-27 06:03:29 +08:00
|
|
|
// wrapPrimaryRoute wraps stack (a compiled middleware handler chain)
|
|
|
|
// in s.enforcementHandler which performs crucial security checks, etc.
|
|
|
|
func (s *Server) wrapPrimaryRoute(stack Handler) Handler {
|
|
|
|
return HandlerFunc(func(w http.ResponseWriter, r *http.Request) error {
|
|
|
|
return s.enforcementHandler(w, r, stack)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
// enforcementHandler is an implicit middleware which performs
|
|
|
|
// standard checks before executing the HTTP middleware chain.
|
|
|
|
func (s *Server) enforcementHandler(w http.ResponseWriter, r *http.Request, next Handler) error {
|
|
|
|
// enforce strict host matching, which ensures that the SNI
|
|
|
|
// value (if any), matches the Host header; essential for
|
|
|
|
// servers that rely on TLS ClientAuth sharing a listener
|
|
|
|
// with servers that do not; if not enforced, client could
|
|
|
|
// bypass by sending benign SNI then restricted Host header
|
|
|
|
if s.StrictSNIHost && r.TLS != nil {
|
|
|
|
hostname, _, err := net.SplitHostPort(r.Host)
|
|
|
|
if err != nil {
|
|
|
|
hostname = r.Host // OK; probably lacked port
|
|
|
|
}
|
|
|
|
if strings.ToLower(r.TLS.ServerName) != strings.ToLower(hostname) {
|
|
|
|
err := fmt.Errorf("strict host matching: TLS ServerName (%s) and HTTP Host (%s) values differ",
|
|
|
|
r.TLS.ServerName, hostname)
|
|
|
|
r.Close = true
|
|
|
|
return Error(http.StatusForbidden, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return next.ServeHTTP(w, r)
|
|
|
|
}
|
|
|
|
|
2019-07-10 02:58:39 +08:00
|
|
|
// listenersUseAnyPortOtherThan returns true if there are any
|
|
|
|
// listeners in s that use a port which is not otherPort.
|
2019-05-23 04:14:26 +08:00
|
|
|
func (s *Server) listenersUseAnyPortOtherThan(otherPort int) bool {
|
|
|
|
for _, lnAddr := range s.Listen {
|
2019-09-06 03:14:39 +08:00
|
|
|
_, addrs, err := caddy.ParseNetworkAddress(lnAddr)
|
2019-05-23 04:14:26 +08:00
|
|
|
if err == nil {
|
|
|
|
for _, a := range addrs {
|
|
|
|
_, port, err := net.SplitHostPort(a)
|
|
|
|
if err == nil && port != strconv.Itoa(otherPort) {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2019-06-27 00:49:32 +08:00
|
|
|
// AutoHTTPSConfig is used to disable automatic HTTPS
|
|
|
|
// or certain aspects of it for a specific server.
|
|
|
|
type AutoHTTPSConfig struct {
|
|
|
|
// If true, automatic HTTPS will be entirely disabled.
|
|
|
|
Disabled bool `json:"disable,omitempty"`
|
|
|
|
|
|
|
|
// If true, only automatic HTTP->HTTPS redirects will
|
|
|
|
// be disabled.
|
|
|
|
DisableRedir bool `json:"disable_redirects,omitempty"`
|
|
|
|
|
|
|
|
// Hosts/domain names listed here will not be included
|
|
|
|
// in automatic HTTPS (they will not have certificates
|
|
|
|
// loaded nor redirects applied).
|
|
|
|
Skip []string `json:"skip,omitempty"`
|
2019-06-27 00:57:18 +08:00
|
|
|
|
|
|
|
// Hosts/domain names listed here will still be enabled
|
|
|
|
// for automatic HTTPS (unless in the Skip list), except
|
|
|
|
// that certificates will not be provisioned and managed
|
|
|
|
// for these names.
|
|
|
|
SkipCerts []string `json:"skip_certificates,omitempty"`
|
2019-08-10 02:05:47 +08:00
|
|
|
|
|
|
|
// By default, automatic HTTPS will obtain and renew
|
|
|
|
// certificates for qualifying hostnames. However, if
|
|
|
|
// a certificate with a matching SAN is already loaded
|
|
|
|
// into the cache, certificate management will not be
|
|
|
|
// enabled. To force automated certificate management
|
|
|
|
// regardless of loaded certificates, set this to true.
|
|
|
|
IgnoreLoadedCerts bool `json:"ignore_loaded_certificates,omitempty"`
|
2019-06-27 00:49:32 +08:00
|
|
|
}
|
|
|
|
|
2019-06-27 00:57:18 +08:00
|
|
|
// Skipped returns true if name is in skipSlice, which
|
|
|
|
// should be one of the Skip* fields on ahc.
|
|
|
|
func (ahc AutoHTTPSConfig) Skipped(name string, skipSlice []string) bool {
|
|
|
|
for _, n := range skipSlice {
|
2019-06-27 00:49:32 +08:00
|
|
|
if name == n {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
// HTTPErrorConfig determines how to handle errors
|
|
|
|
// from the HTTP handlers.
|
|
|
|
type HTTPErrorConfig struct {
|
2019-05-23 02:32:36 +08:00
|
|
|
Routes RouteList `json:"routes,omitempty"`
|
2019-05-21 00:59:20 +08:00
|
|
|
}
|
|
|
|
|
2019-06-27 00:49:32 +08:00
|
|
|
// Context keys for HTTP request context values.
|
|
|
|
const (
|
|
|
|
// For referencing the server instance
|
|
|
|
ServerCtxKey caddy.CtxKey = "server"
|
2019-06-19 01:13:12 +08:00
|
|
|
|
2019-08-10 02:05:47 +08:00
|
|
|
// For the request's variable table
|
|
|
|
VarCtxKey caddy.CtxKey = "vars"
|
2019-06-27 00:49:32 +08:00
|
|
|
)
|