2019-07-01 06:07:58 +08:00
|
|
|
// Copyright 2015 Matthew Holt and The Caddy Authors
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
2019-05-05 03:21:20 +08:00
|
|
|
package caddyhttp
|
|
|
|
|
|
|
|
import (
|
2020-07-17 09:25:37 +08:00
|
|
|
"bytes"
|
2020-04-28 04:46:46 +08:00
|
|
|
"context"
|
2020-05-27 05:52:32 +08:00
|
|
|
"crypto/ecdsa"
|
|
|
|
"crypto/ed25519"
|
|
|
|
"crypto/rsa"
|
2020-02-26 10:22:50 +08:00
|
|
|
"crypto/sha256"
|
|
|
|
"crypto/tls"
|
|
|
|
"crypto/x509"
|
2020-05-27 05:52:32 +08:00
|
|
|
"encoding/asn1"
|
2021-10-02 06:27:29 +08:00
|
|
|
"encoding/base64"
|
2020-09-17 05:06:51 +08:00
|
|
|
"encoding/pem"
|
2019-08-10 02:05:47 +08:00
|
|
|
"fmt"
|
2020-07-17 09:25:37 +08:00
|
|
|
"io"
|
2019-05-07 23:56:13 +08:00
|
|
|
"net"
|
2019-05-05 03:21:20 +08:00
|
|
|
"net/http"
|
2022-10-01 03:29:33 +08:00
|
|
|
"net/netip"
|
2019-07-17 02:27:11 +08:00
|
|
|
"net/textproto"
|
2020-06-12 06:19:07 +08:00
|
|
|
"net/url"
|
2019-05-21 00:59:20 +08:00
|
|
|
"path"
|
2019-07-17 02:27:11 +08:00
|
|
|
"strconv"
|
2019-05-05 03:21:20 +08:00
|
|
|
"strings"
|
2021-02-23 02:57:21 +08:00
|
|
|
"time"
|
2019-05-15 04:14:05 +08:00
|
|
|
|
2023-08-14 23:41:15 +08:00
|
|
|
"github.com/google/uuid"
|
2023-12-14 06:40:15 +08:00
|
|
|
"go.uber.org/zap"
|
2023-08-14 23:41:15 +08:00
|
|
|
|
2019-07-03 02:37:06 +08:00
|
|
|
"github.com/caddyserver/caddy/v2"
|
2020-02-26 10:22:50 +08:00
|
|
|
"github.com/caddyserver/caddy/v2/modules/caddytls"
|
2019-05-05 03:21:20 +08:00
|
|
|
)
|
|
|
|
|
2020-04-28 04:46:46 +08:00
|
|
|
// NewTestReplacer creates a replacer for an http.Request
|
|
|
|
// for use in tests that are not in this package
|
|
|
|
func NewTestReplacer(req *http.Request) *caddy.Replacer {
|
|
|
|
repl := caddy.NewReplacer()
|
|
|
|
ctx := context.WithValue(req.Context(), caddy.ReplacerCtxKey, repl)
|
|
|
|
*req = *req.WithContext(ctx)
|
|
|
|
addHTTPVarsToReplacer(repl, req, nil)
|
|
|
|
return repl
|
|
|
|
}
|
|
|
|
|
2019-12-30 04:12:52 +08:00
|
|
|
func addHTTPVarsToReplacer(repl *caddy.Replacer, req *http.Request, w http.ResponseWriter) {
|
2021-02-23 02:57:21 +08:00
|
|
|
SetVar(req.Context(), "start_time", time.Now())
|
2021-12-15 15:17:53 +08:00
|
|
|
SetVar(req.Context(), "uuid", new(requestID))
|
2021-02-23 02:57:21 +08:00
|
|
|
|
2022-08-03 04:39:09 +08:00
|
|
|
httpVars := func(key string) (any, bool) {
|
2019-05-21 00:59:20 +08:00
|
|
|
if req != nil {
|
2019-08-10 02:05:47 +08:00
|
|
|
// query string parameters
|
2020-02-26 10:22:50 +08:00
|
|
|
if strings.HasPrefix(key, reqURIQueryReplPrefix) {
|
|
|
|
vals := req.URL.Query()[key[len(reqURIQueryReplPrefix):]]
|
2019-07-17 02:27:11 +08:00
|
|
|
// always return true, since the query param might
|
|
|
|
// be present only in some requests
|
|
|
|
return strings.Join(vals, ","), true
|
|
|
|
}
|
|
|
|
|
2019-08-10 02:05:47 +08:00
|
|
|
// request header fields
|
2019-07-17 02:27:11 +08:00
|
|
|
if strings.HasPrefix(key, reqHeaderReplPrefix) {
|
|
|
|
field := key[len(reqHeaderReplPrefix):]
|
|
|
|
vals := req.Header[textproto.CanonicalMIMEHeaderKey(field)]
|
|
|
|
// always return true, since the header field might
|
|
|
|
// be present only in some requests
|
|
|
|
return strings.Join(vals, ","), true
|
|
|
|
}
|
|
|
|
|
2019-08-10 02:05:47 +08:00
|
|
|
// cookies
|
2020-02-26 10:22:50 +08:00
|
|
|
if strings.HasPrefix(key, reqCookieReplPrefix) {
|
|
|
|
name := key[len(reqCookieReplPrefix):]
|
2019-07-17 02:27:11 +08:00
|
|
|
for _, cookie := range req.Cookies() {
|
|
|
|
if strings.EqualFold(name, cookie.Name) {
|
|
|
|
// always return true, since the cookie might
|
|
|
|
// be present only in some requests
|
|
|
|
return cookie.Value, true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-03-31 01:49:53 +08:00
|
|
|
// http.request.tls.*
|
2020-02-26 10:22:50 +08:00
|
|
|
if strings.HasPrefix(key, reqTLSReplPrefix) {
|
|
|
|
return getReqTLSReplacement(req, key)
|
|
|
|
}
|
|
|
|
|
2019-07-17 02:27:11 +08:00
|
|
|
switch key {
|
2019-10-11 05:38:30 +08:00
|
|
|
case "http.request.method":
|
|
|
|
return req.Method, true
|
|
|
|
case "http.request.scheme":
|
|
|
|
if req.TLS != nil {
|
|
|
|
return "https", true
|
|
|
|
}
|
|
|
|
return "http", true
|
|
|
|
case "http.request.proto":
|
|
|
|
return req.Proto, true
|
2019-07-17 02:27:11 +08:00
|
|
|
case "http.request.host":
|
2019-05-21 00:59:20 +08:00
|
|
|
host, _, err := net.SplitHostPort(req.Host)
|
|
|
|
if err != nil {
|
2019-07-17 02:27:11 +08:00
|
|
|
return req.Host, true // OK; there probably was no port
|
2019-05-21 00:59:20 +08:00
|
|
|
}
|
2019-07-17 02:27:11 +08:00
|
|
|
return host, true
|
2019-10-11 03:37:08 +08:00
|
|
|
case "http.request.port":
|
|
|
|
_, port, _ := net.SplitHostPort(req.Host)
|
2020-04-09 00:43:08 +08:00
|
|
|
if portNum, err := strconv.Atoi(port); err == nil {
|
|
|
|
return portNum, true
|
|
|
|
}
|
2019-10-11 03:37:08 +08:00
|
|
|
return port, true
|
2019-07-17 02:27:11 +08:00
|
|
|
case "http.request.hostport":
|
|
|
|
return req.Host, true
|
caddyhttp: add http.request.local{,.host,.port} placeholder (#6182)
* caddyhttp: add `http.request.local{,.host,.port}` placeholder
This is the counterpart of `http.request.remote{,.host,.port}`.
`http.request.remote` operates on the remote client's address, while
`http.request.local` operates on the address the connection arrived on.
Take the following example:
- Caddy serving on `203.0.113.1:80`
- Client on `203.0.113.2`
`http.request.remote.host` would return `203.0.113.2` (client IP)
`http.request.local.host` would return `203.0.113.1` (server IP)
`http.request.local.port` would return `80` (server port)
I find this helpful for debugging setups with multiple servers and/or
multiple network paths (multiple IPs, AnyIP, Anycast).
Co-authored-by: networkException <git@nwex.de>
* caddyhttp: add unit test for `http.request.local{,.host,.port}`
* caddyhttp: add integration test for `http.request.local.port`
* caddyhttp: fix `http.request.local.host` placeholder handling with unix sockets
The implementation matches the one of `http.request.remote.host` now and
returns the unix socket path (just like `http.request.local` already did)
instead of an empty string.
---------
Co-authored-by: networkException <git@nwex.de>
2024-03-28 05:36:53 +08:00
|
|
|
case "http.request.local":
|
|
|
|
localAddr, _ := req.Context().Value(http.LocalAddrContextKey).(net.Addr)
|
|
|
|
return localAddr.String(), true
|
|
|
|
case "http.request.local.host":
|
|
|
|
localAddr, _ := req.Context().Value(http.LocalAddrContextKey).(net.Addr)
|
|
|
|
host, _, err := net.SplitHostPort(localAddr.String())
|
|
|
|
if err != nil {
|
|
|
|
// localAddr is host:port for tcp and udp sockets and /unix/socket.path
|
|
|
|
// for unix sockets. net.SplitHostPort only operates on tcp and udp sockets,
|
|
|
|
// not unix sockets and will fail with the latter.
|
|
|
|
// We assume when net.SplitHostPort fails, localAddr is a unix socket and thus
|
|
|
|
// already "split" and save to return.
|
|
|
|
return localAddr, true
|
|
|
|
}
|
|
|
|
return host, true
|
|
|
|
case "http.request.local.port":
|
|
|
|
localAddr, _ := req.Context().Value(http.LocalAddrContextKey).(net.Addr)
|
|
|
|
_, port, _ := net.SplitHostPort(localAddr.String())
|
|
|
|
if portNum, err := strconv.Atoi(port); err == nil {
|
|
|
|
return portNum, true
|
|
|
|
}
|
|
|
|
return port, true
|
2019-10-11 03:37:08 +08:00
|
|
|
case "http.request.remote":
|
|
|
|
return req.RemoteAddr, true
|
|
|
|
case "http.request.remote.host":
|
|
|
|
host, _, err := net.SplitHostPort(req.RemoteAddr)
|
|
|
|
if err != nil {
|
caddyhttp: add http.request.local{,.host,.port} placeholder (#6182)
* caddyhttp: add `http.request.local{,.host,.port}` placeholder
This is the counterpart of `http.request.remote{,.host,.port}`.
`http.request.remote` operates on the remote client's address, while
`http.request.local` operates on the address the connection arrived on.
Take the following example:
- Caddy serving on `203.0.113.1:80`
- Client on `203.0.113.2`
`http.request.remote.host` would return `203.0.113.2` (client IP)
`http.request.local.host` would return `203.0.113.1` (server IP)
`http.request.local.port` would return `80` (server port)
I find this helpful for debugging setups with multiple servers and/or
multiple network paths (multiple IPs, AnyIP, Anycast).
Co-authored-by: networkException <git@nwex.de>
* caddyhttp: add unit test for `http.request.local{,.host,.port}`
* caddyhttp: add integration test for `http.request.local.port`
* caddyhttp: fix `http.request.local.host` placeholder handling with unix sockets
The implementation matches the one of `http.request.remote.host` now and
returns the unix socket path (just like `http.request.local` already did)
instead of an empty string.
---------
Co-authored-by: networkException <git@nwex.de>
2024-03-28 05:36:53 +08:00
|
|
|
// req.RemoteAddr is host:port for tcp and udp sockets and /unix/socket.path
|
|
|
|
// for unix sockets. net.SplitHostPort only operates on tcp and udp sockets,
|
|
|
|
// not unix sockets and will fail with the latter.
|
|
|
|
// We assume when net.SplitHostPort fails, req.RemoteAddr is a unix socket
|
|
|
|
// and thus already "split" and save to return.
|
2019-10-11 03:37:08 +08:00
|
|
|
return req.RemoteAddr, true
|
|
|
|
}
|
|
|
|
return host, true
|
|
|
|
case "http.request.remote.port":
|
|
|
|
_, port, _ := net.SplitHostPort(req.RemoteAddr)
|
2020-04-09 00:43:08 +08:00
|
|
|
if portNum, err := strconv.Atoi(port); err == nil {
|
|
|
|
return portNum, true
|
|
|
|
}
|
2019-10-11 03:37:08 +08:00
|
|
|
return port, true
|
2019-10-11 05:38:30 +08:00
|
|
|
|
|
|
|
// current URI, including any internal rewrites
|
2019-07-17 02:27:11 +08:00
|
|
|
case "http.request.uri":
|
|
|
|
return req.URL.RequestURI(), true
|
|
|
|
case "http.request.uri.path":
|
|
|
|
return req.URL.Path, true
|
|
|
|
case "http.request.uri.path.file":
|
2019-05-21 00:59:20 +08:00
|
|
|
_, file := path.Split(req.URL.Path)
|
2019-07-17 02:27:11 +08:00
|
|
|
return file, true
|
|
|
|
case "http.request.uri.path.dir":
|
2019-05-21 00:59:20 +08:00
|
|
|
dir, _ := path.Split(req.URL.Path)
|
2019-07-17 02:27:11 +08:00
|
|
|
return dir, true
|
2022-09-06 03:53:41 +08:00
|
|
|
case "http.request.uri.path.file.base":
|
|
|
|
return strings.TrimSuffix(path.Base(req.URL.Path), path.Ext(req.URL.Path)), true
|
|
|
|
case "http.request.uri.path.file.ext":
|
|
|
|
return path.Ext(req.URL.Path), true
|
2019-07-17 02:27:11 +08:00
|
|
|
case "http.request.uri.query":
|
|
|
|
return req.URL.RawQuery, true
|
2021-02-23 02:57:21 +08:00
|
|
|
case "http.request.duration":
|
|
|
|
start := GetVar(req.Context(), "start_time").(time.Time)
|
|
|
|
return time.Since(start), true
|
2022-04-12 03:04:05 +08:00
|
|
|
case "http.request.duration_ms":
|
|
|
|
start := GetVar(req.Context(), "start_time").(time.Time)
|
|
|
|
return time.Since(start).Seconds() * 1e3, true // multiply seconds to preserve decimal (see #4666)
|
2023-12-14 06:40:15 +08:00
|
|
|
|
2021-12-15 15:17:53 +08:00
|
|
|
case "http.request.uuid":
|
2023-12-14 06:40:15 +08:00
|
|
|
// fetch the UUID for this request
|
2021-12-15 15:17:53 +08:00
|
|
|
id := GetVar(req.Context(), "uuid").(*requestID)
|
2023-12-14 06:40:15 +08:00
|
|
|
|
|
|
|
// set it to this request's access log
|
|
|
|
extra := req.Context().Value(ExtraLogFieldsCtxKey).(*ExtraLogFields)
|
|
|
|
extra.Set(zap.String("uuid", id.String()))
|
|
|
|
|
2021-12-15 15:17:53 +08:00
|
|
|
return id.String(), true
|
2023-12-14 06:40:15 +08:00
|
|
|
|
2020-07-17 09:25:37 +08:00
|
|
|
case "http.request.body":
|
|
|
|
if req.Body == nil {
|
|
|
|
return "", true
|
|
|
|
}
|
|
|
|
// normally net/http will close the body for us, but since we
|
|
|
|
// are replacing it with a fake one, we have to ensure we close
|
|
|
|
// the real body ourselves when we're done
|
|
|
|
defer req.Body.Close()
|
|
|
|
// read the request body into a buffer (can't pool because we
|
|
|
|
// don't know its lifetime and would have to make a copy anyway)
|
|
|
|
buf := new(bytes.Buffer)
|
2022-03-12 03:34:55 +08:00
|
|
|
_, _ = io.Copy(buf, req.Body) // can't handle error, so just ignore it
|
|
|
|
req.Body = io.NopCloser(buf) // replace real body with buffered data
|
2020-07-17 09:25:37 +08:00
|
|
|
return buf.String(), true
|
2019-10-11 05:38:30 +08:00
|
|
|
|
2022-08-26 03:28:58 +08:00
|
|
|
// original request, before any internal changes
|
2019-10-29 04:39:37 +08:00
|
|
|
case "http.request.orig_method":
|
|
|
|
or, _ := req.Context().Value(OriginalRequestCtxKey).(http.Request)
|
|
|
|
return or.Method, true
|
2019-10-11 05:38:30 +08:00
|
|
|
case "http.request.orig_uri":
|
2019-10-29 04:39:37 +08:00
|
|
|
or, _ := req.Context().Value(OriginalRequestCtxKey).(http.Request)
|
|
|
|
return or.RequestURI, true
|
2019-10-11 05:38:30 +08:00
|
|
|
case "http.request.orig_uri.path":
|
2019-10-29 04:39:37 +08:00
|
|
|
or, _ := req.Context().Value(OriginalRequestCtxKey).(http.Request)
|
|
|
|
return or.URL.Path, true
|
2019-10-11 05:38:30 +08:00
|
|
|
case "http.request.orig_uri.path.file":
|
2019-10-29 04:39:37 +08:00
|
|
|
or, _ := req.Context().Value(OriginalRequestCtxKey).(http.Request)
|
|
|
|
_, file := path.Split(or.URL.Path)
|
2019-10-11 05:38:30 +08:00
|
|
|
return file, true
|
|
|
|
case "http.request.orig_uri.path.dir":
|
2019-10-29 04:39:37 +08:00
|
|
|
or, _ := req.Context().Value(OriginalRequestCtxKey).(http.Request)
|
|
|
|
dir, _ := path.Split(or.URL.Path)
|
2019-10-11 05:38:30 +08:00
|
|
|
return dir, true
|
|
|
|
case "http.request.orig_uri.query":
|
2019-10-29 04:39:37 +08:00
|
|
|
or, _ := req.Context().Value(OriginalRequestCtxKey).(http.Request)
|
|
|
|
return or.URL.RawQuery, true
|
2019-05-22 03:10:14 +08:00
|
|
|
}
|
2019-07-17 02:27:11 +08:00
|
|
|
|
2022-10-01 03:29:33 +08:00
|
|
|
// remote IP range/prefix (e.g. keep top 24 bits of 1.2.3.4 => "1.2.3.0/24")
|
|
|
|
// syntax: "/V4,V6" where V4 = IPv4 bits, and V6 = IPv6 bits; if no comma, then same bit length used for both
|
|
|
|
// (EXPERIMENTAL)
|
|
|
|
if strings.HasPrefix(key, "http.request.remote.host/") {
|
|
|
|
host, _, err := net.SplitHostPort(req.RemoteAddr)
|
|
|
|
if err != nil {
|
|
|
|
host = req.RemoteAddr // assume no port, I guess?
|
|
|
|
}
|
|
|
|
addr, err := netip.ParseAddr(host)
|
|
|
|
if err != nil {
|
|
|
|
return host, true // not an IP address
|
|
|
|
}
|
|
|
|
// extract the bits from the end of the placeholder (start after "/") then split on ","
|
|
|
|
bitsBoth := key[strings.Index(key, "/")+1:]
|
|
|
|
ipv4BitsStr, ipv6BitsStr, cutOK := strings.Cut(bitsBoth, ",")
|
|
|
|
bitsStr := ipv4BitsStr
|
|
|
|
if addr.Is6() && cutOK {
|
|
|
|
bitsStr = ipv6BitsStr
|
|
|
|
}
|
|
|
|
// convert to integer then compute prefix
|
|
|
|
bits, err := strconv.Atoi(bitsStr)
|
|
|
|
if err != nil {
|
|
|
|
return "", true
|
|
|
|
}
|
|
|
|
prefix, err := addr.Prefix(bits)
|
|
|
|
if err != nil {
|
|
|
|
return "", true
|
|
|
|
}
|
|
|
|
return prefix.String(), true
|
|
|
|
}
|
|
|
|
|
2019-08-10 02:05:47 +08:00
|
|
|
// hostname labels
|
2020-02-26 10:22:50 +08:00
|
|
|
if strings.HasPrefix(key, reqHostLabelsReplPrefix) {
|
|
|
|
idxStr := key[len(reqHostLabelsReplPrefix):]
|
2019-07-17 02:27:11 +08:00
|
|
|
idx, err := strconv.Atoi(idxStr)
|
2020-06-12 06:19:07 +08:00
|
|
|
if err != nil || idx < 0 {
|
2019-07-17 02:27:11 +08:00
|
|
|
return "", false
|
|
|
|
}
|
2019-10-15 02:09:43 +08:00
|
|
|
reqHost, _, err := net.SplitHostPort(req.Host)
|
|
|
|
if err != nil {
|
|
|
|
reqHost = req.Host // OK; assume there was no port
|
|
|
|
}
|
|
|
|
hostLabels := strings.Split(reqHost, ".")
|
2020-07-01 01:42:55 +08:00
|
|
|
if idx >= len(hostLabels) {
|
2019-07-17 02:27:11 +08:00
|
|
|
return "", true
|
|
|
|
}
|
2019-10-15 02:09:43 +08:00
|
|
|
return hostLabels[len(hostLabels)-idx-1], true
|
2019-05-21 00:59:20 +08:00
|
|
|
}
|
2019-07-09 06:46:55 +08:00
|
|
|
|
2019-08-10 02:05:47 +08:00
|
|
|
// path parts
|
2020-02-26 10:22:50 +08:00
|
|
|
if strings.HasPrefix(key, reqURIPathReplPrefix) {
|
|
|
|
idxStr := key[len(reqURIPathReplPrefix):]
|
2019-07-17 02:27:11 +08:00
|
|
|
idx, err := strconv.Atoi(idxStr)
|
|
|
|
if err != nil {
|
|
|
|
return "", false
|
|
|
|
}
|
|
|
|
pathParts := strings.Split(req.URL.Path, "/")
|
|
|
|
if len(pathParts) > 0 && pathParts[0] == "" {
|
|
|
|
pathParts = pathParts[1:]
|
|
|
|
}
|
|
|
|
if idx < 0 {
|
|
|
|
return "", false
|
|
|
|
}
|
|
|
|
if idx >= len(pathParts) {
|
|
|
|
return "", true
|
|
|
|
}
|
|
|
|
return pathParts[idx], true
|
2019-07-09 06:46:55 +08:00
|
|
|
}
|
2019-08-10 02:05:47 +08:00
|
|
|
|
2022-10-25 01:57:50 +08:00
|
|
|
// orig uri path parts
|
|
|
|
if strings.HasPrefix(key, reqOrigURIPathReplPrefix) {
|
|
|
|
idxStr := key[len(reqOrigURIPathReplPrefix):]
|
|
|
|
idx, err := strconv.Atoi(idxStr)
|
|
|
|
if err != nil {
|
|
|
|
return "", false
|
|
|
|
}
|
|
|
|
or, _ := req.Context().Value(OriginalRequestCtxKey).(http.Request)
|
|
|
|
pathParts := strings.Split(or.URL.Path, "/")
|
|
|
|
if len(pathParts) > 0 && pathParts[0] == "" {
|
|
|
|
pathParts = pathParts[1:]
|
|
|
|
}
|
|
|
|
if idx < 0 {
|
|
|
|
return "", false
|
|
|
|
}
|
|
|
|
if idx >= len(pathParts) {
|
|
|
|
return "", true
|
|
|
|
}
|
|
|
|
return pathParts[idx], true
|
|
|
|
}
|
|
|
|
|
2019-08-10 02:05:47 +08:00
|
|
|
// middleware variables
|
|
|
|
if strings.HasPrefix(key, varsReplPrefix) {
|
|
|
|
varName := key[len(varsReplPrefix):]
|
2023-01-10 13:08:23 +08:00
|
|
|
raw := GetVar(req.Context(), varName)
|
2020-03-31 01:49:53 +08:00
|
|
|
// variables can be dynamic, so always return true
|
|
|
|
// even when it may not be set; treat as empty then
|
|
|
|
return raw, true
|
2019-08-10 02:05:47 +08:00
|
|
|
}
|
2019-05-17 01:46:17 +08:00
|
|
|
}
|
|
|
|
|
2019-05-21 00:59:20 +08:00
|
|
|
if w != nil {
|
2019-08-10 02:05:47 +08:00
|
|
|
// response header fields
|
2019-07-17 02:27:11 +08:00
|
|
|
if strings.HasPrefix(key, respHeaderReplPrefix) {
|
|
|
|
field := key[len(respHeaderReplPrefix):]
|
|
|
|
vals := w.Header()[textproto.CanonicalMIMEHeaderKey(field)]
|
|
|
|
// always return true, since the header field might
|
|
|
|
// be present only in some responses
|
|
|
|
return strings.Join(vals, ","), true
|
2019-05-21 00:59:20 +08:00
|
|
|
}
|
2019-05-15 04:14:05 +08:00
|
|
|
}
|
2019-05-05 03:21:20 +08:00
|
|
|
|
2022-08-04 01:04:51 +08:00
|
|
|
switch {
|
|
|
|
case key == "http.shutting_down":
|
|
|
|
server := req.Context().Value(ServerCtxKey).(*Server)
|
|
|
|
server.shutdownAtMu.RLock()
|
|
|
|
defer server.shutdownAtMu.RUnlock()
|
|
|
|
return !server.shutdownAt.IsZero(), true
|
|
|
|
case key == "http.time_until_shutdown":
|
|
|
|
server := req.Context().Value(ServerCtxKey).(*Server)
|
|
|
|
server.shutdownAtMu.RLock()
|
|
|
|
defer server.shutdownAtMu.RUnlock()
|
|
|
|
if server.shutdownAt.IsZero() {
|
|
|
|
return nil, true
|
|
|
|
}
|
|
|
|
return time.Until(server.shutdownAt), true
|
|
|
|
}
|
|
|
|
|
2020-03-31 01:49:53 +08:00
|
|
|
return nil, false
|
2019-05-21 00:59:20 +08:00
|
|
|
}
|
2019-05-05 03:21:20 +08:00
|
|
|
|
2019-05-21 00:59:20 +08:00
|
|
|
repl.Map(httpVars)
|
|
|
|
}
|
2019-07-17 02:27:11 +08:00
|
|
|
|
2022-08-03 04:39:09 +08:00
|
|
|
func getReqTLSReplacement(req *http.Request, key string) (any, bool) {
|
2020-02-26 10:22:50 +08:00
|
|
|
if req == nil || req.TLS == nil {
|
2020-03-31 01:49:53 +08:00
|
|
|
return nil, false
|
2020-02-26 10:22:50 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if len(key) < len(reqTLSReplPrefix) {
|
2020-03-31 01:49:53 +08:00
|
|
|
return nil, false
|
2020-02-26 10:22:50 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
field := strings.ToLower(key[len(reqTLSReplPrefix):])
|
|
|
|
|
|
|
|
if strings.HasPrefix(field, "client.") {
|
|
|
|
cert := getTLSPeerCert(req.TLS)
|
|
|
|
if cert == nil {
|
2020-03-31 01:49:53 +08:00
|
|
|
return nil, false
|
2020-02-26 10:22:50 +08:00
|
|
|
}
|
|
|
|
|
2020-06-12 06:19:07 +08:00
|
|
|
// subject alternate names (SANs)
|
|
|
|
if strings.HasPrefix(field, "client.san.") {
|
|
|
|
field = field[len("client.san."):]
|
|
|
|
var fieldName string
|
2022-08-03 04:39:09 +08:00
|
|
|
var fieldValue any
|
2020-06-12 06:19:07 +08:00
|
|
|
switch {
|
|
|
|
case strings.HasPrefix(field, "dns_names"):
|
|
|
|
fieldName = "dns_names"
|
|
|
|
fieldValue = cert.DNSNames
|
|
|
|
case strings.HasPrefix(field, "emails"):
|
|
|
|
fieldName = "emails"
|
|
|
|
fieldValue = cert.EmailAddresses
|
|
|
|
case strings.HasPrefix(field, "ips"):
|
|
|
|
fieldName = "ips"
|
|
|
|
fieldValue = cert.IPAddresses
|
|
|
|
case strings.HasPrefix(field, "uris"):
|
|
|
|
fieldName = "uris"
|
|
|
|
fieldValue = cert.URIs
|
|
|
|
default:
|
|
|
|
return nil, false
|
|
|
|
}
|
|
|
|
field = field[len(fieldName):]
|
|
|
|
|
|
|
|
// if no index was specified, return the whole list
|
|
|
|
if field == "" {
|
|
|
|
return fieldValue, true
|
|
|
|
}
|
|
|
|
if len(field) < 2 || field[0] != '.' {
|
|
|
|
return nil, false
|
|
|
|
}
|
|
|
|
field = field[1:] // trim '.' between field name and index
|
|
|
|
|
|
|
|
// get the numeric index
|
|
|
|
idx, err := strconv.Atoi(field)
|
|
|
|
if err != nil || idx < 0 {
|
|
|
|
return nil, false
|
|
|
|
}
|
|
|
|
|
|
|
|
// access the indexed element and return it
|
|
|
|
switch v := fieldValue.(type) {
|
|
|
|
case []string:
|
|
|
|
if idx >= len(v) {
|
|
|
|
return nil, true
|
|
|
|
}
|
|
|
|
return v[idx], true
|
|
|
|
case []net.IP:
|
|
|
|
if idx >= len(v) {
|
|
|
|
return nil, true
|
|
|
|
}
|
|
|
|
return v[idx], true
|
|
|
|
case []*url.URL:
|
|
|
|
if idx >= len(v) {
|
|
|
|
return nil, true
|
|
|
|
}
|
|
|
|
return v[idx], true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-02-26 10:22:50 +08:00
|
|
|
switch field {
|
|
|
|
case "client.fingerprint":
|
|
|
|
return fmt.Sprintf("%x", sha256.Sum256(cert.Raw)), true
|
2020-05-27 05:52:32 +08:00
|
|
|
case "client.public_key", "client.public_key_sha256":
|
|
|
|
if cert.PublicKey == nil {
|
|
|
|
return nil, true
|
|
|
|
}
|
|
|
|
pubKeyBytes, err := marshalPublicKey(cert.PublicKey)
|
|
|
|
if err != nil {
|
|
|
|
return nil, true
|
|
|
|
}
|
|
|
|
if strings.HasSuffix(field, "_sha256") {
|
|
|
|
return fmt.Sprintf("%x", sha256.Sum256(pubKeyBytes)), true
|
|
|
|
}
|
|
|
|
return fmt.Sprintf("%x", pubKeyBytes), true
|
2020-02-26 10:22:50 +08:00
|
|
|
case "client.issuer":
|
2020-03-31 01:49:53 +08:00
|
|
|
return cert.Issuer, true
|
2020-02-26 10:22:50 +08:00
|
|
|
case "client.serial":
|
2020-03-31 01:49:53 +08:00
|
|
|
return cert.SerialNumber, true
|
2020-02-26 10:22:50 +08:00
|
|
|
case "client.subject":
|
2020-03-31 01:49:53 +08:00
|
|
|
return cert.Subject, true
|
2020-09-17 05:06:51 +08:00
|
|
|
case "client.certificate_pem":
|
|
|
|
block := pem.Block{Type: "CERTIFICATE", Bytes: cert.Raw}
|
|
|
|
return pem.EncodeToMemory(&block), true
|
2021-10-02 06:27:29 +08:00
|
|
|
case "client.certificate_der_base64":
|
|
|
|
return base64.StdEncoding.EncodeToString(cert.Raw), true
|
2020-02-26 10:22:50 +08:00
|
|
|
default:
|
2020-03-31 01:49:53 +08:00
|
|
|
return nil, false
|
2020-02-26 10:22:50 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
switch field {
|
|
|
|
case "version":
|
|
|
|
return caddytls.ProtocolName(req.TLS.Version), true
|
|
|
|
case "cipher_suite":
|
|
|
|
return tls.CipherSuiteName(req.TLS.CipherSuite), true
|
|
|
|
case "resumed":
|
2020-03-31 01:49:53 +08:00
|
|
|
return req.TLS.DidResume, true
|
2020-02-26 10:22:50 +08:00
|
|
|
case "proto":
|
|
|
|
return req.TLS.NegotiatedProtocol, true
|
|
|
|
case "proto_mutual":
|
2020-11-23 05:50:29 +08:00
|
|
|
// req.TLS.NegotiatedProtocolIsMutual is deprecated - it's always true.
|
|
|
|
return true, true
|
2020-02-26 10:22:50 +08:00
|
|
|
case "server_name":
|
|
|
|
return req.TLS.ServerName, true
|
|
|
|
}
|
2020-03-31 01:49:53 +08:00
|
|
|
return nil, false
|
2020-02-26 10:22:50 +08:00
|
|
|
}
|
|
|
|
|
2020-05-27 05:52:32 +08:00
|
|
|
// marshalPublicKey returns the byte encoding of pubKey.
|
2022-08-03 04:39:09 +08:00
|
|
|
func marshalPublicKey(pubKey any) ([]byte, error) {
|
2020-05-27 05:52:32 +08:00
|
|
|
switch key := pubKey.(type) {
|
|
|
|
case *rsa.PublicKey:
|
|
|
|
return asn1.Marshal(key)
|
|
|
|
case *ecdsa.PublicKey:
|
2024-01-26 02:58:19 +08:00
|
|
|
e, err := key.ECDH()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return e.Bytes(), nil
|
2020-05-27 05:52:32 +08:00
|
|
|
case ed25519.PublicKey:
|
|
|
|
return key, nil
|
|
|
|
}
|
|
|
|
return nil, fmt.Errorf("unrecognized public key type: %T", pubKey)
|
|
|
|
}
|
|
|
|
|
2020-02-26 10:22:50 +08:00
|
|
|
// getTLSPeerCert retrieves the first peer certificate from a TLS session.
|
|
|
|
// Returns nil if no peer cert is in use.
|
|
|
|
func getTLSPeerCert(cs *tls.ConnectionState) *x509.Certificate {
|
|
|
|
if len(cs.PeerCertificates) == 0 {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
return cs.PeerCertificates[0]
|
|
|
|
}
|
|
|
|
|
2021-12-15 15:17:53 +08:00
|
|
|
type requestID struct {
|
|
|
|
value string
|
|
|
|
}
|
|
|
|
|
|
|
|
// Lazy generates UUID string or return cached value if present
|
|
|
|
func (rid *requestID) String() string {
|
|
|
|
if rid.value == "" {
|
|
|
|
if id, err := uuid.NewRandom(); err == nil {
|
|
|
|
rid.value = id.String()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return rid.value
|
|
|
|
}
|
|
|
|
|
2019-07-17 02:27:11 +08:00
|
|
|
const (
|
2022-10-25 01:57:50 +08:00
|
|
|
reqCookieReplPrefix = "http.request.cookie."
|
|
|
|
reqHeaderReplPrefix = "http.request.header."
|
|
|
|
reqHostLabelsReplPrefix = "http.request.host.labels."
|
|
|
|
reqTLSReplPrefix = "http.request.tls."
|
|
|
|
reqURIPathReplPrefix = "http.request.uri.path."
|
|
|
|
reqURIQueryReplPrefix = "http.request.uri.query."
|
|
|
|
respHeaderReplPrefix = "http.response.header."
|
|
|
|
varsReplPrefix = "http.vars."
|
|
|
|
reqOrigURIPathReplPrefix = "http.request.orig_uri.path."
|
2019-07-17 02:27:11 +08:00
|
|
|
)
|