2019-07-01 06:07:58 +08:00
|
|
|
// Copyright 2015 Matthew Holt and The Caddy Authors
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
2019-05-05 03:21:20 +08:00
|
|
|
package caddyhttp
|
|
|
|
|
|
|
|
import (
|
2020-02-26 10:22:50 +08:00
|
|
|
"crypto/sha256"
|
|
|
|
"crypto/tls"
|
|
|
|
"crypto/x509"
|
2019-08-10 02:05:47 +08:00
|
|
|
"fmt"
|
2019-05-07 23:56:13 +08:00
|
|
|
"net"
|
2019-05-05 03:21:20 +08:00
|
|
|
"net/http"
|
2019-07-17 02:27:11 +08:00
|
|
|
"net/textproto"
|
2019-05-21 00:59:20 +08:00
|
|
|
"path"
|
2019-07-17 02:27:11 +08:00
|
|
|
"strconv"
|
2019-05-05 03:21:20 +08:00
|
|
|
"strings"
|
2019-05-15 04:14:05 +08:00
|
|
|
|
2019-07-03 02:37:06 +08:00
|
|
|
"github.com/caddyserver/caddy/v2"
|
2020-02-26 10:22:50 +08:00
|
|
|
"github.com/caddyserver/caddy/v2/modules/caddytls"
|
2019-05-05 03:21:20 +08:00
|
|
|
)
|
|
|
|
|
2019-12-30 04:12:52 +08:00
|
|
|
func addHTTPVarsToReplacer(repl *caddy.Replacer, req *http.Request, w http.ResponseWriter) {
|
2020-03-31 01:49:53 +08:00
|
|
|
httpVars := func(key string) (interface{}, bool) {
|
2019-05-21 00:59:20 +08:00
|
|
|
if req != nil {
|
2019-08-10 02:05:47 +08:00
|
|
|
// query string parameters
|
2020-02-26 10:22:50 +08:00
|
|
|
if strings.HasPrefix(key, reqURIQueryReplPrefix) {
|
|
|
|
vals := req.URL.Query()[key[len(reqURIQueryReplPrefix):]]
|
2019-07-17 02:27:11 +08:00
|
|
|
// always return true, since the query param might
|
|
|
|
// be present only in some requests
|
|
|
|
return strings.Join(vals, ","), true
|
|
|
|
}
|
|
|
|
|
2019-08-10 02:05:47 +08:00
|
|
|
// request header fields
|
2019-07-17 02:27:11 +08:00
|
|
|
if strings.HasPrefix(key, reqHeaderReplPrefix) {
|
|
|
|
field := key[len(reqHeaderReplPrefix):]
|
|
|
|
vals := req.Header[textproto.CanonicalMIMEHeaderKey(field)]
|
|
|
|
// always return true, since the header field might
|
|
|
|
// be present only in some requests
|
|
|
|
return strings.Join(vals, ","), true
|
|
|
|
}
|
|
|
|
|
2019-08-10 02:05:47 +08:00
|
|
|
// cookies
|
2020-02-26 10:22:50 +08:00
|
|
|
if strings.HasPrefix(key, reqCookieReplPrefix) {
|
|
|
|
name := key[len(reqCookieReplPrefix):]
|
2019-07-17 02:27:11 +08:00
|
|
|
for _, cookie := range req.Cookies() {
|
|
|
|
if strings.EqualFold(name, cookie.Name) {
|
|
|
|
// always return true, since the cookie might
|
|
|
|
// be present only in some requests
|
|
|
|
return cookie.Value, true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-03-31 01:49:53 +08:00
|
|
|
// http.request.tls.*
|
2020-02-26 10:22:50 +08:00
|
|
|
if strings.HasPrefix(key, reqTLSReplPrefix) {
|
|
|
|
return getReqTLSReplacement(req, key)
|
|
|
|
}
|
|
|
|
|
2019-07-17 02:27:11 +08:00
|
|
|
switch key {
|
2019-10-11 05:38:30 +08:00
|
|
|
case "http.request.method":
|
|
|
|
return req.Method, true
|
|
|
|
case "http.request.scheme":
|
|
|
|
if req.TLS != nil {
|
|
|
|
return "https", true
|
|
|
|
}
|
|
|
|
return "http", true
|
|
|
|
case "http.request.proto":
|
|
|
|
return req.Proto, true
|
2019-07-17 02:27:11 +08:00
|
|
|
case "http.request.host":
|
2019-05-21 00:59:20 +08:00
|
|
|
host, _, err := net.SplitHostPort(req.Host)
|
|
|
|
if err != nil {
|
2019-07-17 02:27:11 +08:00
|
|
|
return req.Host, true // OK; there probably was no port
|
2019-05-21 00:59:20 +08:00
|
|
|
}
|
2019-07-17 02:27:11 +08:00
|
|
|
return host, true
|
2019-10-11 03:37:08 +08:00
|
|
|
case "http.request.port":
|
|
|
|
_, port, _ := net.SplitHostPort(req.Host)
|
2020-04-09 00:43:08 +08:00
|
|
|
if portNum, err := strconv.Atoi(port); err == nil {
|
|
|
|
return portNum, true
|
|
|
|
}
|
2019-10-11 03:37:08 +08:00
|
|
|
return port, true
|
2019-07-17 02:27:11 +08:00
|
|
|
case "http.request.hostport":
|
|
|
|
return req.Host, true
|
2019-10-11 03:37:08 +08:00
|
|
|
case "http.request.remote":
|
|
|
|
return req.RemoteAddr, true
|
|
|
|
case "http.request.remote.host":
|
|
|
|
host, _, err := net.SplitHostPort(req.RemoteAddr)
|
|
|
|
if err != nil {
|
|
|
|
return req.RemoteAddr, true
|
|
|
|
}
|
|
|
|
return host, true
|
|
|
|
case "http.request.remote.port":
|
|
|
|
_, port, _ := net.SplitHostPort(req.RemoteAddr)
|
2020-04-09 00:43:08 +08:00
|
|
|
if portNum, err := strconv.Atoi(port); err == nil {
|
|
|
|
return portNum, true
|
|
|
|
}
|
2019-10-11 03:37:08 +08:00
|
|
|
return port, true
|
2019-10-11 05:38:30 +08:00
|
|
|
|
|
|
|
// current URI, including any internal rewrites
|
2019-07-17 02:27:11 +08:00
|
|
|
case "http.request.uri":
|
|
|
|
return req.URL.RequestURI(), true
|
|
|
|
case "http.request.uri.path":
|
|
|
|
return req.URL.Path, true
|
|
|
|
case "http.request.uri.path.file":
|
2019-05-21 00:59:20 +08:00
|
|
|
_, file := path.Split(req.URL.Path)
|
2019-07-17 02:27:11 +08:00
|
|
|
return file, true
|
|
|
|
case "http.request.uri.path.dir":
|
2019-05-21 00:59:20 +08:00
|
|
|
dir, _ := path.Split(req.URL.Path)
|
2019-07-17 02:27:11 +08:00
|
|
|
return dir, true
|
|
|
|
case "http.request.uri.query":
|
|
|
|
return req.URL.RawQuery, true
|
2019-10-11 05:38:30 +08:00
|
|
|
|
2019-10-29 04:39:37 +08:00
|
|
|
// original request, before any internal changes
|
|
|
|
case "http.request.orig_method":
|
|
|
|
or, _ := req.Context().Value(OriginalRequestCtxKey).(http.Request)
|
|
|
|
return or.Method, true
|
2019-10-11 05:38:30 +08:00
|
|
|
case "http.request.orig_uri":
|
2019-10-29 04:39:37 +08:00
|
|
|
or, _ := req.Context().Value(OriginalRequestCtxKey).(http.Request)
|
|
|
|
return or.RequestURI, true
|
2019-10-11 05:38:30 +08:00
|
|
|
case "http.request.orig_uri.path":
|
2019-10-29 04:39:37 +08:00
|
|
|
or, _ := req.Context().Value(OriginalRequestCtxKey).(http.Request)
|
|
|
|
return or.URL.Path, true
|
2019-10-11 05:38:30 +08:00
|
|
|
case "http.request.orig_uri.path.file":
|
2019-10-29 04:39:37 +08:00
|
|
|
or, _ := req.Context().Value(OriginalRequestCtxKey).(http.Request)
|
|
|
|
_, file := path.Split(or.URL.Path)
|
2019-10-11 05:38:30 +08:00
|
|
|
return file, true
|
|
|
|
case "http.request.orig_uri.path.dir":
|
2019-10-29 04:39:37 +08:00
|
|
|
or, _ := req.Context().Value(OriginalRequestCtxKey).(http.Request)
|
|
|
|
dir, _ := path.Split(or.URL.Path)
|
2019-10-11 05:38:30 +08:00
|
|
|
return dir, true
|
|
|
|
case "http.request.orig_uri.query":
|
2019-10-29 04:39:37 +08:00
|
|
|
or, _ := req.Context().Value(OriginalRequestCtxKey).(http.Request)
|
|
|
|
return or.URL.RawQuery, true
|
2019-05-22 03:10:14 +08:00
|
|
|
}
|
2019-07-17 02:27:11 +08:00
|
|
|
|
2019-08-10 02:05:47 +08:00
|
|
|
// hostname labels
|
2020-02-26 10:22:50 +08:00
|
|
|
if strings.HasPrefix(key, reqHostLabelsReplPrefix) {
|
|
|
|
idxStr := key[len(reqHostLabelsReplPrefix):]
|
2019-07-17 02:27:11 +08:00
|
|
|
idx, err := strconv.Atoi(idxStr)
|
|
|
|
if err != nil {
|
|
|
|
return "", false
|
|
|
|
}
|
2019-10-15 02:09:43 +08:00
|
|
|
reqHost, _, err := net.SplitHostPort(req.Host)
|
|
|
|
if err != nil {
|
|
|
|
reqHost = req.Host // OK; assume there was no port
|
|
|
|
}
|
|
|
|
hostLabels := strings.Split(reqHost, ".")
|
2019-07-17 02:27:11 +08:00
|
|
|
if idx < 0 {
|
|
|
|
return "", false
|
|
|
|
}
|
2019-10-15 02:09:43 +08:00
|
|
|
if idx > len(hostLabels) {
|
2019-07-17 02:27:11 +08:00
|
|
|
return "", true
|
|
|
|
}
|
2019-10-15 02:09:43 +08:00
|
|
|
return hostLabels[len(hostLabels)-idx-1], true
|
2019-05-21 00:59:20 +08:00
|
|
|
}
|
2019-07-09 06:46:55 +08:00
|
|
|
|
2019-08-10 02:05:47 +08:00
|
|
|
// path parts
|
2020-02-26 10:22:50 +08:00
|
|
|
if strings.HasPrefix(key, reqURIPathReplPrefix) {
|
|
|
|
idxStr := key[len(reqURIPathReplPrefix):]
|
2019-07-17 02:27:11 +08:00
|
|
|
idx, err := strconv.Atoi(idxStr)
|
|
|
|
if err != nil {
|
|
|
|
return "", false
|
|
|
|
}
|
|
|
|
pathParts := strings.Split(req.URL.Path, "/")
|
|
|
|
if len(pathParts) > 0 && pathParts[0] == "" {
|
|
|
|
pathParts = pathParts[1:]
|
|
|
|
}
|
|
|
|
if idx < 0 {
|
|
|
|
return "", false
|
|
|
|
}
|
|
|
|
if idx >= len(pathParts) {
|
|
|
|
return "", true
|
|
|
|
}
|
|
|
|
return pathParts[idx], true
|
2019-07-09 06:46:55 +08:00
|
|
|
}
|
2019-08-10 02:05:47 +08:00
|
|
|
|
|
|
|
// middleware variables
|
|
|
|
if strings.HasPrefix(key, varsReplPrefix) {
|
|
|
|
varName := key[len(varsReplPrefix):]
|
2019-10-29 04:39:37 +08:00
|
|
|
tbl := req.Context().Value(VarsCtxKey).(map[string]interface{})
|
2020-04-09 05:31:51 +08:00
|
|
|
raw := tbl[varName]
|
2020-03-31 01:49:53 +08:00
|
|
|
// variables can be dynamic, so always return true
|
|
|
|
// even when it may not be set; treat as empty then
|
|
|
|
return raw, true
|
2019-08-10 02:05:47 +08:00
|
|
|
}
|
2019-05-17 01:46:17 +08:00
|
|
|
}
|
|
|
|
|
2019-05-21 00:59:20 +08:00
|
|
|
if w != nil {
|
2019-08-10 02:05:47 +08:00
|
|
|
// response header fields
|
2019-07-17 02:27:11 +08:00
|
|
|
if strings.HasPrefix(key, respHeaderReplPrefix) {
|
|
|
|
field := key[len(respHeaderReplPrefix):]
|
|
|
|
vals := w.Header()[textproto.CanonicalMIMEHeaderKey(field)]
|
|
|
|
// always return true, since the header field might
|
|
|
|
// be present only in some responses
|
|
|
|
return strings.Join(vals, ","), true
|
2019-05-21 00:59:20 +08:00
|
|
|
}
|
2019-05-15 04:14:05 +08:00
|
|
|
}
|
2019-05-05 03:21:20 +08:00
|
|
|
|
2020-03-31 01:49:53 +08:00
|
|
|
return nil, false
|
2019-05-21 00:59:20 +08:00
|
|
|
}
|
2019-05-05 03:21:20 +08:00
|
|
|
|
2019-05-21 00:59:20 +08:00
|
|
|
repl.Map(httpVars)
|
|
|
|
}
|
2019-07-17 02:27:11 +08:00
|
|
|
|
2020-03-31 01:49:53 +08:00
|
|
|
func getReqTLSReplacement(req *http.Request, key string) (interface{}, bool) {
|
2020-02-26 10:22:50 +08:00
|
|
|
if req == nil || req.TLS == nil {
|
2020-03-31 01:49:53 +08:00
|
|
|
return nil, false
|
2020-02-26 10:22:50 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if len(key) < len(reqTLSReplPrefix) {
|
2020-03-31 01:49:53 +08:00
|
|
|
return nil, false
|
2020-02-26 10:22:50 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
field := strings.ToLower(key[len(reqTLSReplPrefix):])
|
|
|
|
|
|
|
|
if strings.HasPrefix(field, "client.") {
|
|
|
|
cert := getTLSPeerCert(req.TLS)
|
|
|
|
if cert == nil {
|
2020-03-31 01:49:53 +08:00
|
|
|
return nil, false
|
2020-02-26 10:22:50 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
switch field {
|
|
|
|
case "client.fingerprint":
|
|
|
|
return fmt.Sprintf("%x", sha256.Sum256(cert.Raw)), true
|
|
|
|
case "client.issuer":
|
2020-03-31 01:49:53 +08:00
|
|
|
return cert.Issuer, true
|
2020-02-26 10:22:50 +08:00
|
|
|
case "client.serial":
|
2020-03-31 01:49:53 +08:00
|
|
|
return cert.SerialNumber, true
|
2020-02-26 10:22:50 +08:00
|
|
|
case "client.subject":
|
2020-03-31 01:49:53 +08:00
|
|
|
return cert.Subject, true
|
2020-02-26 10:22:50 +08:00
|
|
|
default:
|
2020-03-31 01:49:53 +08:00
|
|
|
return nil, false
|
2020-02-26 10:22:50 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
switch field {
|
|
|
|
case "version":
|
|
|
|
return caddytls.ProtocolName(req.TLS.Version), true
|
|
|
|
case "cipher_suite":
|
|
|
|
return tls.CipherSuiteName(req.TLS.CipherSuite), true
|
|
|
|
case "resumed":
|
2020-03-31 01:49:53 +08:00
|
|
|
return req.TLS.DidResume, true
|
2020-02-26 10:22:50 +08:00
|
|
|
case "proto":
|
|
|
|
return req.TLS.NegotiatedProtocol, true
|
|
|
|
case "proto_mutual":
|
2020-03-31 01:49:53 +08:00
|
|
|
return req.TLS.NegotiatedProtocolIsMutual, true
|
2020-02-26 10:22:50 +08:00
|
|
|
case "server_name":
|
|
|
|
return req.TLS.ServerName, true
|
|
|
|
}
|
2020-03-31 01:49:53 +08:00
|
|
|
return nil, false
|
2020-02-26 10:22:50 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// getTLSPeerCert retrieves the first peer certificate from a TLS session.
|
|
|
|
// Returns nil if no peer cert is in use.
|
|
|
|
func getTLSPeerCert(cs *tls.ConnectionState) *x509.Certificate {
|
|
|
|
if len(cs.PeerCertificates) == 0 {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
return cs.PeerCertificates[0]
|
|
|
|
}
|
|
|
|
|
2019-07-17 02:27:11 +08:00
|
|
|
const (
|
2020-02-26 10:22:50 +08:00
|
|
|
reqCookieReplPrefix = "http.request.cookie."
|
|
|
|
reqHeaderReplPrefix = "http.request.header."
|
|
|
|
reqHostLabelsReplPrefix = "http.request.host.labels."
|
|
|
|
reqTLSReplPrefix = "http.request.tls."
|
|
|
|
reqURIPathReplPrefix = "http.request.uri.path."
|
|
|
|
reqURIQueryReplPrefix = "http.request.uri.query."
|
|
|
|
respHeaderReplPrefix = "http.response.header."
|
|
|
|
varsReplPrefix = "http.vars."
|
2019-07-17 02:27:11 +08:00
|
|
|
)
|