2019-08-22 00:46:35 +08:00
|
|
|
// Copyright 2015 Matthew Holt and The Caddy Authors
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
package httpcaddyfile
|
|
|
|
|
|
|
|
import (
|
|
|
|
"encoding/json"
|
2020-04-03 04:20:30 +08:00
|
|
|
"net"
|
2020-01-16 04:51:12 +08:00
|
|
|
"sort"
|
2020-04-03 04:20:30 +08:00
|
|
|
"strconv"
|
2020-02-26 12:56:43 +08:00
|
|
|
"strings"
|
2019-08-22 00:46:35 +08:00
|
|
|
|
|
|
|
"github.com/caddyserver/caddy/v2"
|
|
|
|
"github.com/caddyserver/caddy/v2/caddyconfig"
|
|
|
|
"github.com/caddyserver/caddy/v2/caddyconfig/caddyfile"
|
|
|
|
"github.com/caddyserver/caddy/v2/modules/caddyhttp"
|
|
|
|
)
|
|
|
|
|
2020-01-17 03:09:54 +08:00
|
|
|
// directiveOrder specifies the order
|
2019-08-22 00:46:35 +08:00
|
|
|
// to apply directives in HTTP routes.
|
2020-03-29 09:07:51 +08:00
|
|
|
//
|
|
|
|
// The root directive goes first in case rewrites or
|
|
|
|
// redirects depend on existence of files, i.e. the
|
|
|
|
// file matcher, which must know the root first.
|
|
|
|
//
|
|
|
|
// The header directive goes second so that headers
|
|
|
|
// can be manipulated before doing redirects.
|
2020-01-17 03:09:54 +08:00
|
|
|
var directiveOrder = []string{
|
2020-06-27 05:12:37 +08:00
|
|
|
"map",
|
2020-03-29 09:07:51 +08:00
|
|
|
"root",
|
|
|
|
|
2020-03-22 23:04:40 +08:00
|
|
|
"header",
|
|
|
|
|
2020-01-18 02:38:49 +08:00
|
|
|
"redir",
|
2019-08-22 00:46:35 +08:00
|
|
|
"rewrite",
|
2020-01-17 08:08:52 +08:00
|
|
|
|
2020-03-22 23:04:40 +08:00
|
|
|
// URI manipulation
|
2020-03-20 01:51:28 +08:00
|
|
|
"uri",
|
2019-08-22 00:46:35 +08:00
|
|
|
"try_files",
|
2020-01-18 02:38:49 +08:00
|
|
|
|
2020-03-22 23:04:40 +08:00
|
|
|
// middleware handlers; some wrap responses
|
2019-10-11 04:37:27 +08:00
|
|
|
"basicauth",
|
2019-09-12 08:48:37 +08:00
|
|
|
"request_header",
|
2019-08-22 00:46:35 +08:00
|
|
|
"encode",
|
|
|
|
"templates",
|
2020-01-17 08:08:52 +08:00
|
|
|
|
2020-07-21 02:28:40 +08:00
|
|
|
// special routing & dispatching directives
|
2020-01-17 08:08:52 +08:00
|
|
|
"handle",
|
2020-05-27 05:27:51 +08:00
|
|
|
"handle_path",
|
2020-06-03 23:59:36 +08:00
|
|
|
"route",
|
2020-07-21 02:28:40 +08:00
|
|
|
"push",
|
2020-01-17 08:08:52 +08:00
|
|
|
|
2020-02-17 13:24:20 +08:00
|
|
|
// handlers that typically respond to requests
|
2019-09-17 01:04:18 +08:00
|
|
|
"respond",
|
2019-08-22 00:46:35 +08:00
|
|
|
"reverse_proxy",
|
2019-09-12 02:02:35 +08:00
|
|
|
"php_fastcgi",
|
2019-08-22 00:46:35 +08:00
|
|
|
"file_server",
|
2020-06-03 23:59:36 +08:00
|
|
|
"acme_server",
|
2019-08-22 00:46:35 +08:00
|
|
|
}
|
|
|
|
|
2020-01-17 08:08:52 +08:00
|
|
|
// directiveIsOrdered returns true if dir is
|
|
|
|
// a known, ordered (sorted) directive.
|
|
|
|
func directiveIsOrdered(dir string) bool {
|
|
|
|
for _, d := range directiveOrder {
|
|
|
|
if d == dir {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2019-08-22 00:46:35 +08:00
|
|
|
// RegisterDirective registers a unique directive dir with an
|
|
|
|
// associated unmarshaling (setup) function. When directive dir
|
|
|
|
// is encountered in a Caddyfile, setupFunc will be called to
|
|
|
|
// unmarshal its tokens.
|
|
|
|
func RegisterDirective(dir string, setupFunc UnmarshalFunc) {
|
|
|
|
if _, ok := registeredDirectives[dir]; ok {
|
|
|
|
panic("directive " + dir + " already registered")
|
|
|
|
}
|
|
|
|
registeredDirectives[dir] = setupFunc
|
|
|
|
}
|
|
|
|
|
|
|
|
// RegisterHandlerDirective is like RegisterDirective, but for
|
|
|
|
// directives which specifically output only an HTTP handler.
|
2019-12-13 06:27:09 +08:00
|
|
|
// Directives registered with this function will always have
|
|
|
|
// an optional matcher token as the first argument.
|
2019-08-22 00:46:35 +08:00
|
|
|
func RegisterHandlerDirective(dir string, setupFunc UnmarshalHandlerFunc) {
|
|
|
|
RegisterDirective(dir, func(h Helper) ([]ConfigValue, error) {
|
|
|
|
if !h.Next() {
|
|
|
|
return nil, h.ArgErr()
|
|
|
|
}
|
|
|
|
|
|
|
|
matcherSet, ok, err := h.MatcherToken()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if ok {
|
2019-11-05 04:43:39 +08:00
|
|
|
// strip matcher token; we don't need to
|
|
|
|
// use the return value here because a
|
|
|
|
// new dispenser should have been made
|
|
|
|
// solely for this directive's tokens,
|
|
|
|
// with no other uses of same slice
|
|
|
|
h.Dispenser.Delete()
|
2019-08-22 00:46:35 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
h.Dispenser.Reset() // pretend this lookahead never happened
|
|
|
|
val, err := setupFunc(h)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return h.NewRoute(matcherSet, val), nil
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2020-05-12 05:00:35 +08:00
|
|
|
// RegisterGlobalOption registers a unique global option opt with
|
|
|
|
// an associated unmarshaling (setup) function. When the global
|
|
|
|
// option opt is encountered in a Caddyfile, setupFunc will be
|
|
|
|
// called to unmarshal its tokens.
|
|
|
|
func RegisterGlobalOption(opt string, setupFunc UnmarshalGlobalFunc) {
|
|
|
|
if _, ok := registeredGlobalOptions[opt]; ok {
|
|
|
|
panic("global option " + opt + " already registered")
|
|
|
|
}
|
|
|
|
registeredGlobalOptions[opt] = setupFunc
|
|
|
|
}
|
|
|
|
|
2019-08-22 00:46:35 +08:00
|
|
|
// Helper is a type which helps setup a value from
|
|
|
|
// Caddyfile tokens.
|
|
|
|
type Helper struct {
|
|
|
|
*caddyfile.Dispenser
|
2020-03-05 00:58:49 +08:00
|
|
|
// State stores intermediate variables during caddyfile adaptation.
|
|
|
|
State map[string]interface{}
|
2020-01-17 02:29:20 +08:00
|
|
|
options map[string]interface{}
|
|
|
|
warnings *[]caddyconfig.Warning
|
|
|
|
matcherDefs map[string]caddy.ModuleMap
|
|
|
|
parentBlock caddyfile.ServerBlock
|
2020-01-17 08:08:52 +08:00
|
|
|
groupCounter counter
|
2019-08-22 05:50:02 +08:00
|
|
|
}
|
|
|
|
|
2019-09-30 23:11:30 +08:00
|
|
|
// Option gets the option keyed by name.
|
|
|
|
func (h Helper) Option(name string) interface{} {
|
|
|
|
return h.options[name]
|
|
|
|
}
|
|
|
|
|
2019-08-22 05:50:02 +08:00
|
|
|
// Caddyfiles returns the list of config files from
|
|
|
|
// which tokens in the current server block were loaded.
|
|
|
|
func (h Helper) Caddyfiles() []string {
|
|
|
|
// first obtain set of names of files involved
|
|
|
|
// in this server block, without duplicates
|
|
|
|
files := make(map[string]struct{})
|
|
|
|
for _, segment := range h.parentBlock.Segments {
|
|
|
|
for _, token := range segment {
|
|
|
|
files[token.File] = struct{}{}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// then convert the set into a slice
|
|
|
|
filesSlice := make([]string, 0, len(files))
|
|
|
|
for file := range files {
|
|
|
|
filesSlice = append(filesSlice, file)
|
|
|
|
}
|
|
|
|
return filesSlice
|
2019-08-22 00:46:35 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// JSON converts val into JSON. Any errors are added to warnings.
|
2019-12-13 06:27:09 +08:00
|
|
|
func (h Helper) JSON(val interface{}) json.RawMessage {
|
2019-08-22 00:46:35 +08:00
|
|
|
return caddyconfig.JSON(val, h.warnings)
|
|
|
|
}
|
|
|
|
|
2020-01-17 08:08:52 +08:00
|
|
|
// MatcherToken assumes the next argument token is (possibly) a matcher,
|
|
|
|
// and if so, returns the matcher set along with a true value. If the next
|
2019-08-22 00:46:35 +08:00
|
|
|
// token is not a matcher, nil and false is returned. Note that a true
|
|
|
|
// value may be returned with a nil matcher set if it is a catch-all.
|
2019-12-11 04:36:46 +08:00
|
|
|
func (h Helper) MatcherToken() (caddy.ModuleMap, bool, error) {
|
2019-08-22 00:46:35 +08:00
|
|
|
if !h.NextArg() {
|
|
|
|
return nil, false, nil
|
|
|
|
}
|
|
|
|
return matcherSetFromMatcherToken(h.Dispenser.Token(), h.matcherDefs, h.warnings)
|
|
|
|
}
|
|
|
|
|
2020-02-28 12:03:45 +08:00
|
|
|
// ExtractMatcherSet is like MatcherToken, except this is a higher-level
|
|
|
|
// method that returns the matcher set described by the matcher token,
|
|
|
|
// or nil if there is none, and deletes the matcher token from the
|
|
|
|
// dispenser and resets it as if this look-ahead never happened. Useful
|
|
|
|
// when wrapping a route (one or more handlers) in a user-defined matcher.
|
|
|
|
func (h Helper) ExtractMatcherSet() (caddy.ModuleMap, error) {
|
|
|
|
matcherSet, hasMatcher, err := h.MatcherToken()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if hasMatcher {
|
|
|
|
h.Dispenser.Delete() // strip matcher token
|
|
|
|
}
|
|
|
|
h.Dispenser.Reset() // pretend this lookahead never happened
|
|
|
|
return matcherSet, nil
|
|
|
|
}
|
|
|
|
|
2019-08-22 00:46:35 +08:00
|
|
|
// NewRoute returns config values relevant to creating a new HTTP route.
|
2019-12-11 04:36:46 +08:00
|
|
|
func (h Helper) NewRoute(matcherSet caddy.ModuleMap,
|
2019-08-22 00:46:35 +08:00
|
|
|
handler caddyhttp.MiddlewareHandler) []ConfigValue {
|
2019-12-13 06:27:09 +08:00
|
|
|
mod, err := caddy.GetModule(caddy.GetModuleID(handler))
|
2019-08-22 00:46:35 +08:00
|
|
|
if err != nil {
|
2019-12-13 06:27:09 +08:00
|
|
|
*h.warnings = append(*h.warnings, caddyconfig.Warning{
|
|
|
|
File: h.File(),
|
|
|
|
Line: h.Line(),
|
|
|
|
Message: err.Error(),
|
|
|
|
})
|
|
|
|
return nil
|
2019-08-22 00:46:35 +08:00
|
|
|
}
|
2019-12-11 04:36:46 +08:00
|
|
|
var matcherSetsRaw []caddy.ModuleMap
|
2019-08-22 00:46:35 +08:00
|
|
|
if matcherSet != nil {
|
|
|
|
matcherSetsRaw = append(matcherSetsRaw, matcherSet)
|
|
|
|
}
|
|
|
|
return []ConfigValue{
|
|
|
|
{
|
|
|
|
Class: "route",
|
|
|
|
Value: caddyhttp.Route{
|
|
|
|
MatcherSetsRaw: matcherSetsRaw,
|
2019-12-11 04:36:46 +08:00
|
|
|
HandlersRaw: []json.RawMessage{caddyconfig.JSONModuleObject(handler, "handler", mod.ID.Name(), h.warnings)},
|
2019-08-22 00:46:35 +08:00
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-01-17 03:09:54 +08:00
|
|
|
// GroupRoutes adds the routes (caddyhttp.Route type) in vals to the
|
|
|
|
// same group, if there is more than one route in vals.
|
2020-01-17 02:29:20 +08:00
|
|
|
func (h Helper) GroupRoutes(vals []ConfigValue) {
|
|
|
|
// ensure there's at least two routes; group of one is pointless
|
|
|
|
var count int
|
|
|
|
for _, v := range vals {
|
|
|
|
if _, ok := v.Value.(caddyhttp.Route); ok {
|
|
|
|
count++
|
|
|
|
if count > 1 {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if count < 2 {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// now that we know the group will have some effect, do it
|
2020-01-17 08:08:52 +08:00
|
|
|
groupName := h.groupCounter.nextGroup()
|
2020-01-17 03:09:54 +08:00
|
|
|
for i := range vals {
|
2020-01-17 02:29:20 +08:00
|
|
|
if route, ok := vals[i].Value.(caddyhttp.Route); ok {
|
2020-01-17 08:08:52 +08:00
|
|
|
route.Group = groupName
|
2020-01-17 02:29:20 +08:00
|
|
|
vals[i].Value = route
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-08-22 00:46:35 +08:00
|
|
|
// NewBindAddresses returns config values relevant to adding
|
|
|
|
// listener bind addresses to the config.
|
|
|
|
func (h Helper) NewBindAddresses(addrs []string) []ConfigValue {
|
|
|
|
return []ConfigValue{{Class: "bind", Value: addrs}}
|
|
|
|
}
|
|
|
|
|
2020-05-27 05:27:51 +08:00
|
|
|
// ParseSegmentAsSubroute parses the segment such that its subdirectives
|
|
|
|
// are themselves treated as directives, from which a subroute is built
|
|
|
|
// and returned.
|
|
|
|
func ParseSegmentAsSubroute(h Helper) (caddyhttp.MiddlewareHandler, error) {
|
2020-08-06 03:42:29 +08:00
|
|
|
allResults, err := parseSegmentAsConfig(h)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return buildSubroute(allResults, h.groupCounter)
|
|
|
|
}
|
|
|
|
|
|
|
|
// parseSegmentAsConfig parses the segment such that its subdirectives
|
|
|
|
// are themselves treated as directives, including named matcher definitions,
|
|
|
|
// and the raw Config structs are returned.
|
|
|
|
func parseSegmentAsConfig(h Helper) ([]ConfigValue, error) {
|
2020-05-27 05:27:51 +08:00
|
|
|
var allResults []ConfigValue
|
|
|
|
|
|
|
|
for h.Next() {
|
|
|
|
// slice the linear list of tokens into top-level segments
|
|
|
|
var segments []caddyfile.Segment
|
|
|
|
for nesting := h.Nesting(); h.NextBlock(nesting); {
|
|
|
|
segments = append(segments, h.NextSegment())
|
|
|
|
}
|
|
|
|
|
|
|
|
// copy existing matcher definitions so we can augment
|
|
|
|
// new ones that are defined only in this scope
|
|
|
|
matcherDefs := make(map[string]caddy.ModuleMap, len(h.matcherDefs))
|
|
|
|
for key, val := range h.matcherDefs {
|
|
|
|
matcherDefs[key] = val
|
|
|
|
}
|
|
|
|
|
|
|
|
// find and extract any embedded matcher definitions in this scope
|
|
|
|
for i, seg := range segments {
|
|
|
|
if strings.HasPrefix(seg.Directive(), matcherPrefix) {
|
|
|
|
err := parseMatcherDefinitions(caddyfile.NewDispenser(seg), matcherDefs)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
segments = append(segments[:i], segments[i+1:]...)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// with matchers ready to go, evaluate each directive's segment
|
|
|
|
for _, seg := range segments {
|
|
|
|
dir := seg.Directive()
|
|
|
|
dirFunc, ok := registeredDirectives[dir]
|
|
|
|
if !ok {
|
|
|
|
return nil, h.Errf("unrecognized directive: %s", dir)
|
|
|
|
}
|
|
|
|
|
|
|
|
subHelper := h
|
|
|
|
subHelper.Dispenser = caddyfile.NewDispenser(seg)
|
|
|
|
subHelper.matcherDefs = matcherDefs
|
|
|
|
|
|
|
|
results, err := dirFunc(subHelper)
|
|
|
|
if err != nil {
|
|
|
|
return nil, h.Errf("parsing caddyfile tokens for '%s': %v", dir, err)
|
|
|
|
}
|
|
|
|
for _, result := range results {
|
|
|
|
result.directive = dir
|
|
|
|
allResults = append(allResults, result)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-08-06 03:42:29 +08:00
|
|
|
return allResults, nil
|
2020-05-27 05:27:51 +08:00
|
|
|
}
|
|
|
|
|
2019-08-22 00:46:35 +08:00
|
|
|
// ConfigValue represents a value to be added to the final
|
|
|
|
// configuration, or a value to be consulted when building
|
|
|
|
// the final configuration.
|
|
|
|
type ConfigValue struct {
|
|
|
|
// The kind of value this is. As the config is
|
|
|
|
// being built, the adapter will look in the
|
|
|
|
// "pile" for values belonging to a certain
|
|
|
|
// class when it is setting up a certain part
|
|
|
|
// of the config. The associated value will be
|
|
|
|
// type-asserted and placed accordingly.
|
|
|
|
Class string
|
|
|
|
|
|
|
|
// The value to be used when building the config.
|
|
|
|
// Generally its type is associated with the
|
|
|
|
// name of the Class.
|
|
|
|
Value interface{}
|
|
|
|
|
|
|
|
directive string
|
|
|
|
}
|
|
|
|
|
2020-01-17 08:08:52 +08:00
|
|
|
func sortRoutes(routes []ConfigValue) {
|
2020-01-17 03:09:54 +08:00
|
|
|
dirPositions := make(map[string]int)
|
|
|
|
for i, dir := range directiveOrder {
|
|
|
|
dirPositions[dir] = i
|
|
|
|
}
|
|
|
|
|
2020-01-17 08:08:52 +08:00
|
|
|
sort.SliceStable(routes, func(i, j int) bool {
|
2020-05-07 09:41:37 +08:00
|
|
|
// if the directives are different, just use the established directive order
|
2020-01-17 08:08:52 +08:00
|
|
|
iDir, jDir := routes[i].directive, routes[j].directive
|
2020-05-07 09:41:37 +08:00
|
|
|
if iDir != jDir {
|
|
|
|
return dirPositions[iDir] < dirPositions[jDir]
|
|
|
|
}
|
2020-01-16 04:51:12 +08:00
|
|
|
|
2020-05-07 09:41:37 +08:00
|
|
|
// directives are the same; sub-sort by path matcher length if there's
|
|
|
|
// only one matcher set and one path (this is a very common case and
|
|
|
|
// usually -- but not always -- helpful/expected, oh well; user can
|
|
|
|
// always take manual control of order using handler or route blocks)
|
|
|
|
iRoute, ok := routes[i].Value.(caddyhttp.Route)
|
|
|
|
if !ok {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
jRoute, ok := routes[j].Value.(caddyhttp.Route)
|
|
|
|
if !ok {
|
|
|
|
return false
|
|
|
|
}
|
2020-02-29 04:38:12 +08:00
|
|
|
|
2020-05-07 09:41:37 +08:00
|
|
|
// decode the path matchers, if there is just one of them
|
|
|
|
var iPM, jPM caddyhttp.MatchPath
|
|
|
|
if len(iRoute.MatcherSetsRaw) == 1 {
|
|
|
|
_ = json.Unmarshal(iRoute.MatcherSetsRaw[0]["path"], &iPM)
|
|
|
|
}
|
|
|
|
if len(jRoute.MatcherSetsRaw) == 1 {
|
|
|
|
_ = json.Unmarshal(jRoute.MatcherSetsRaw[0]["path"], &jPM)
|
2020-01-16 04:51:12 +08:00
|
|
|
}
|
|
|
|
|
2020-05-07 09:41:37 +08:00
|
|
|
// sort by longer path (more specific) first; missing path
|
|
|
|
// matchers or multi-matchers are treated as zero-length paths
|
|
|
|
var iPathLen, jPathLen int
|
|
|
|
if len(iPM) > 0 {
|
|
|
|
iPathLen = len(iPM[0])
|
|
|
|
}
|
|
|
|
if len(jPM) > 0 {
|
|
|
|
jPathLen = len(jPM[0])
|
|
|
|
}
|
|
|
|
return iPathLen > jPathLen
|
2020-01-16 04:51:12 +08:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2020-04-03 04:20:30 +08:00
|
|
|
// serverBlock pairs a Caddyfile server block with
|
|
|
|
// a "pile" of config values, keyed by class name,
|
|
|
|
// as well as its parsed keys for convenience.
|
2019-08-22 00:46:35 +08:00
|
|
|
type serverBlock struct {
|
|
|
|
block caddyfile.ServerBlock
|
|
|
|
pile map[string][]ConfigValue // config values obtained from directives
|
2020-04-03 04:20:30 +08:00
|
|
|
keys []Address
|
|
|
|
}
|
|
|
|
|
|
|
|
// hostsFromKeys returns a list of all the non-empty hostnames found in
|
httpcaddyfile, caddytls: Multiple edge case fixes; add tests
- Create two default automation policies; if the TLS app is used in
isolation with the 'automate' certificate loader, it will now use
an internal issuer for internal-only names, and an ACME issuer for
all other names by default.
- If the HTTP Caddyfile adds an 'automate' loader, it now also adds an
automation policy for any names in that loader that do not qualify
for public certificates so that they will be issued internally. (It
might be nice if this wasn't necessary, but the alternative is to
either make auto-HTTPS logic way more complex by scanning the names in
the 'automate' loader, or to have an automation policy without an
issuer switch between default issuer based on the name being issued
a certificate - I think I like the latter option better, right now we
do something kind of like that but at a level above each individual
automation policies, we do that switch only when no automation
policies match, rather than when a policy without an issuer does
match.)
- Set the default LoggerName rather than a LoggerNames with an empty
host value, which is now taken literally rather than as a catch-all.
- hostsFromKeys, the function that gets a list of hosts from server
block keys, no longer returns an empty string in its resulting slice,
ever.
2020-04-09 04:46:44 +08:00
|
|
|
// the keys of the server block sb. If logger mode is false, a key with
|
|
|
|
// an empty hostname portion will return an empty slice, since that
|
|
|
|
// server block is interpreted to effectively match all hosts. An empty
|
|
|
|
// string is never added to the slice.
|
|
|
|
//
|
|
|
|
// If loggerMode is true, then the non-standard ports of keys will be
|
|
|
|
// joined to the hostnames. This is to effectively match the Host
|
|
|
|
// header of requests that come in for that key.
|
|
|
|
//
|
|
|
|
// The resulting slice is not sorted but will never have duplicates.
|
|
|
|
func (sb serverBlock) hostsFromKeys(loggerMode bool) []string {
|
|
|
|
// ensure each entry in our list is unique
|
2020-04-03 04:20:30 +08:00
|
|
|
hostMap := make(map[string]struct{})
|
|
|
|
for _, addr := range sb.keys {
|
httpcaddyfile, caddytls: Multiple edge case fixes; add tests
- Create two default automation policies; if the TLS app is used in
isolation with the 'automate' certificate loader, it will now use
an internal issuer for internal-only names, and an ACME issuer for
all other names by default.
- If the HTTP Caddyfile adds an 'automate' loader, it now also adds an
automation policy for any names in that loader that do not qualify
for public certificates so that they will be issued internally. (It
might be nice if this wasn't necessary, but the alternative is to
either make auto-HTTPS logic way more complex by scanning the names in
the 'automate' loader, or to have an automation policy without an
issuer switch between default issuer based on the name being issued
a certificate - I think I like the latter option better, right now we
do something kind of like that but at a level above each individual
automation policies, we do that switch only when no automation
policies match, rather than when a policy without an issuer does
match.)
- Set the default LoggerName rather than a LoggerNames with an empty
host value, which is now taken literally rather than as a catch-all.
- hostsFromKeys, the function that gets a list of hosts from server
block keys, no longer returns an empty string in its resulting slice,
ever.
2020-04-09 04:46:44 +08:00
|
|
|
if addr.Host == "" {
|
|
|
|
if !loggerMode {
|
|
|
|
// server block contains a key like ":443", i.e. the host portion
|
|
|
|
// is empty / catch-all, which means to match all hosts
|
|
|
|
return []string{}
|
|
|
|
}
|
|
|
|
// never append an empty string
|
|
|
|
continue
|
2020-04-03 04:20:30 +08:00
|
|
|
}
|
httpcaddyfile, caddytls: Multiple edge case fixes; add tests
- Create two default automation policies; if the TLS app is used in
isolation with the 'automate' certificate loader, it will now use
an internal issuer for internal-only names, and an ACME issuer for
all other names by default.
- If the HTTP Caddyfile adds an 'automate' loader, it now also adds an
automation policy for any names in that loader that do not qualify
for public certificates so that they will be issued internally. (It
might be nice if this wasn't necessary, but the alternative is to
either make auto-HTTPS logic way more complex by scanning the names in
the 'automate' loader, or to have an automation policy without an
issuer switch between default issuer based on the name being issued
a certificate - I think I like the latter option better, right now we
do something kind of like that but at a level above each individual
automation policies, we do that switch only when no automation
policies match, rather than when a policy without an issuer does
match.)
- Set the default LoggerName rather than a LoggerNames with an empty
host value, which is now taken literally rather than as a catch-all.
- hostsFromKeys, the function that gets a list of hosts from server
block keys, no longer returns an empty string in its resulting slice,
ever.
2020-04-09 04:46:44 +08:00
|
|
|
if loggerMode &&
|
2020-04-03 04:20:30 +08:00
|
|
|
addr.Port != "" &&
|
|
|
|
addr.Port != strconv.Itoa(caddyhttp.DefaultHTTPPort) &&
|
|
|
|
addr.Port != strconv.Itoa(caddyhttp.DefaultHTTPSPort) {
|
|
|
|
hostMap[net.JoinHostPort(addr.Host, addr.Port)] = struct{}{}
|
|
|
|
} else {
|
|
|
|
hostMap[addr.Host] = struct{}{}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// convert map to slice
|
|
|
|
sblockHosts := make([]string, 0, len(hostMap))
|
|
|
|
for host := range hostMap {
|
|
|
|
sblockHosts = append(sblockHosts, host)
|
|
|
|
}
|
|
|
|
|
|
|
|
return sblockHosts
|
2019-08-22 00:46:35 +08:00
|
|
|
}
|
|
|
|
|
httpcaddyfile, caddytls: Multiple edge case fixes; add tests
- Create two default automation policies; if the TLS app is used in
isolation with the 'automate' certificate loader, it will now use
an internal issuer for internal-only names, and an ACME issuer for
all other names by default.
- If the HTTP Caddyfile adds an 'automate' loader, it now also adds an
automation policy for any names in that loader that do not qualify
for public certificates so that they will be issued internally. (It
might be nice if this wasn't necessary, but the alternative is to
either make auto-HTTPS logic way more complex by scanning the names in
the 'automate' loader, or to have an automation policy without an
issuer switch between default issuer based on the name being issued
a certificate - I think I like the latter option better, right now we
do something kind of like that but at a level above each individual
automation policies, we do that switch only when no automation
policies match, rather than when a policy without an issuer does
match.)
- Set the default LoggerName rather than a LoggerNames with an empty
host value, which is now taken literally rather than as a catch-all.
- hostsFromKeys, the function that gets a list of hosts from server
block keys, no longer returns an empty string in its resulting slice,
ever.
2020-04-09 04:46:44 +08:00
|
|
|
// hasHostCatchAllKey returns true if sb has a key that
|
|
|
|
// omits a host portion, i.e. it "catches all" hosts.
|
|
|
|
func (sb serverBlock) hasHostCatchAllKey() bool {
|
|
|
|
for _, addr := range sb.keys {
|
|
|
|
if addr.Host == "" {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2019-08-22 00:46:35 +08:00
|
|
|
type (
|
|
|
|
// UnmarshalFunc is a function which can unmarshal Caddyfile
|
|
|
|
// tokens into zero or more config values using a Helper type.
|
|
|
|
// These are passed in a call to RegisterDirective.
|
|
|
|
UnmarshalFunc func(h Helper) ([]ConfigValue, error)
|
|
|
|
|
|
|
|
// UnmarshalHandlerFunc is like UnmarshalFunc, except the
|
|
|
|
// output of the unmarshaling is an HTTP handler. This
|
|
|
|
// function does not need to deal with HTTP request matching
|
|
|
|
// which is abstracted away. Since writing HTTP handlers
|
|
|
|
// with Caddyfile support is very common, this is a more
|
|
|
|
// convenient way to add a handler to the chain since a lot
|
|
|
|
// of the details common to HTTP handlers are taken care of
|
|
|
|
// for you. These are passed to a call to
|
|
|
|
// RegisterHandlerDirective.
|
|
|
|
UnmarshalHandlerFunc func(h Helper) (caddyhttp.MiddlewareHandler, error)
|
2020-05-12 05:00:35 +08:00
|
|
|
|
|
|
|
// UnmarshalGlobalFunc is a function which can unmarshal Caddyfile
|
|
|
|
// tokens into a global option config value using a Helper type.
|
|
|
|
// These are passed in a call to RegisterGlobalOption.
|
|
|
|
UnmarshalGlobalFunc func(d *caddyfile.Dispenser) (interface{}, error)
|
2019-08-22 00:46:35 +08:00
|
|
|
)
|
|
|
|
|
|
|
|
var registeredDirectives = make(map[string]UnmarshalFunc)
|
2020-05-12 05:00:35 +08:00
|
|
|
|
|
|
|
var registeredGlobalOptions = make(map[string]UnmarshalGlobalFunc)
|