2019-06-30 17:07:58 -05:00
|
|
|
// Copyright 2015 Matthew Holt and The Caddy Authors
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
2019-05-04 14:21:20 -05:00
|
|
|
package caddyhttp
|
|
|
|
|
|
|
|
import (
|
2020-04-27 15:46:46 -05:00
|
|
|
"context"
|
2020-05-26 16:52:32 -05:00
|
|
|
"crypto/ecdsa"
|
|
|
|
"crypto/ed25519"
|
|
|
|
"crypto/elliptic"
|
|
|
|
"crypto/rsa"
|
2020-02-25 21:22:50 -05:00
|
|
|
"crypto/sha256"
|
|
|
|
"crypto/tls"
|
|
|
|
"crypto/x509"
|
2020-05-26 16:52:32 -05:00
|
|
|
"encoding/asn1"
|
2019-08-09 13:05:47 -05:00
|
|
|
"fmt"
|
2019-05-07 10:56:13 -05:00
|
|
|
"net"
|
2019-05-04 14:21:20 -05:00
|
|
|
"net/http"
|
2019-07-16 13:27:11 -05:00
|
|
|
"net/textproto"
|
2019-05-20 11:59:20 -05:00
|
|
|
"path"
|
2019-07-16 13:27:11 -05:00
|
|
|
"strconv"
|
2019-05-04 14:21:20 -05:00
|
|
|
"strings"
|
2019-05-14 15:14:05 -05:00
|
|
|
|
2019-07-02 13:37:06 -05:00
|
|
|
"github.com/caddyserver/caddy/v2"
|
2020-02-25 21:22:50 -05:00
|
|
|
"github.com/caddyserver/caddy/v2/modules/caddytls"
|
2019-05-04 14:21:20 -05:00
|
|
|
)
|
|
|
|
|
2020-04-27 15:46:46 -05:00
|
|
|
// NewTestReplacer creates a replacer for an http.Request
|
|
|
|
// for use in tests that are not in this package
|
|
|
|
func NewTestReplacer(req *http.Request) *caddy.Replacer {
|
|
|
|
repl := caddy.NewReplacer()
|
|
|
|
ctx := context.WithValue(req.Context(), caddy.ReplacerCtxKey, repl)
|
|
|
|
*req = *req.WithContext(ctx)
|
|
|
|
addHTTPVarsToReplacer(repl, req, nil)
|
|
|
|
return repl
|
|
|
|
}
|
|
|
|
|
2019-12-29 15:12:52 -05:00
|
|
|
func addHTTPVarsToReplacer(repl *caddy.Replacer, req *http.Request, w http.ResponseWriter) {
|
2020-03-30 12:49:53 -05:00
|
|
|
httpVars := func(key string) (interface{}, bool) {
|
2019-05-20 11:59:20 -05:00
|
|
|
if req != nil {
|
2019-08-09 13:05:47 -05:00
|
|
|
// query string parameters
|
2020-02-25 21:22:50 -05:00
|
|
|
if strings.HasPrefix(key, reqURIQueryReplPrefix) {
|
|
|
|
vals := req.URL.Query()[key[len(reqURIQueryReplPrefix):]]
|
2019-07-16 13:27:11 -05:00
|
|
|
// always return true, since the query param might
|
|
|
|
// be present only in some requests
|
|
|
|
return strings.Join(vals, ","), true
|
|
|
|
}
|
|
|
|
|
2019-08-09 13:05:47 -05:00
|
|
|
// request header fields
|
2019-07-16 13:27:11 -05:00
|
|
|
if strings.HasPrefix(key, reqHeaderReplPrefix) {
|
|
|
|
field := key[len(reqHeaderReplPrefix):]
|
|
|
|
vals := req.Header[textproto.CanonicalMIMEHeaderKey(field)]
|
|
|
|
// always return true, since the header field might
|
|
|
|
// be present only in some requests
|
|
|
|
return strings.Join(vals, ","), true
|
|
|
|
}
|
|
|
|
|
2019-08-09 13:05:47 -05:00
|
|
|
// cookies
|
2020-02-25 21:22:50 -05:00
|
|
|
if strings.HasPrefix(key, reqCookieReplPrefix) {
|
|
|
|
name := key[len(reqCookieReplPrefix):]
|
2019-07-16 13:27:11 -05:00
|
|
|
for _, cookie := range req.Cookies() {
|
|
|
|
if strings.EqualFold(name, cookie.Name) {
|
|
|
|
// always return true, since the cookie might
|
|
|
|
// be present only in some requests
|
|
|
|
return cookie.Value, true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-03-30 12:49:53 -05:00
|
|
|
// http.request.tls.*
|
2020-02-25 21:22:50 -05:00
|
|
|
if strings.HasPrefix(key, reqTLSReplPrefix) {
|
|
|
|
return getReqTLSReplacement(req, key)
|
|
|
|
}
|
|
|
|
|
2019-07-16 13:27:11 -05:00
|
|
|
switch key {
|
2019-10-10 16:38:30 -05:00
|
|
|
case "http.request.method":
|
|
|
|
return req.Method, true
|
|
|
|
case "http.request.scheme":
|
|
|
|
if req.TLS != nil {
|
|
|
|
return "https", true
|
|
|
|
}
|
|
|
|
return "http", true
|
|
|
|
case "http.request.proto":
|
|
|
|
return req.Proto, true
|
2019-07-16 13:27:11 -05:00
|
|
|
case "http.request.host":
|
2019-05-20 11:59:20 -05:00
|
|
|
host, _, err := net.SplitHostPort(req.Host)
|
|
|
|
if err != nil {
|
2019-07-16 13:27:11 -05:00
|
|
|
return req.Host, true // OK; there probably was no port
|
2019-05-20 11:59:20 -05:00
|
|
|
}
|
2019-07-16 13:27:11 -05:00
|
|
|
return host, true
|
2019-10-10 14:37:08 -05:00
|
|
|
case "http.request.port":
|
|
|
|
_, port, _ := net.SplitHostPort(req.Host)
|
2020-04-08 11:43:08 -05:00
|
|
|
if portNum, err := strconv.Atoi(port); err == nil {
|
|
|
|
return portNum, true
|
|
|
|
}
|
2019-10-10 14:37:08 -05:00
|
|
|
return port, true
|
2019-07-16 13:27:11 -05:00
|
|
|
case "http.request.hostport":
|
|
|
|
return req.Host, true
|
2019-10-10 14:37:08 -05:00
|
|
|
case "http.request.remote":
|
|
|
|
return req.RemoteAddr, true
|
|
|
|
case "http.request.remote.host":
|
|
|
|
host, _, err := net.SplitHostPort(req.RemoteAddr)
|
|
|
|
if err != nil {
|
|
|
|
return req.RemoteAddr, true
|
|
|
|
}
|
|
|
|
return host, true
|
|
|
|
case "http.request.remote.port":
|
|
|
|
_, port, _ := net.SplitHostPort(req.RemoteAddr)
|
2020-04-08 11:43:08 -05:00
|
|
|
if portNum, err := strconv.Atoi(port); err == nil {
|
|
|
|
return portNum, true
|
|
|
|
}
|
2019-10-10 14:37:08 -05:00
|
|
|
return port, true
|
2019-10-10 16:38:30 -05:00
|
|
|
|
|
|
|
// current URI, including any internal rewrites
|
2019-07-16 13:27:11 -05:00
|
|
|
case "http.request.uri":
|
|
|
|
return req.URL.RequestURI(), true
|
|
|
|
case "http.request.uri.path":
|
|
|
|
return req.URL.Path, true
|
|
|
|
case "http.request.uri.path.file":
|
2019-05-20 11:59:20 -05:00
|
|
|
_, file := path.Split(req.URL.Path)
|
2019-07-16 13:27:11 -05:00
|
|
|
return file, true
|
|
|
|
case "http.request.uri.path.dir":
|
2019-05-20 11:59:20 -05:00
|
|
|
dir, _ := path.Split(req.URL.Path)
|
2019-07-16 13:27:11 -05:00
|
|
|
return dir, true
|
|
|
|
case "http.request.uri.query":
|
|
|
|
return req.URL.RawQuery, true
|
2019-10-10 16:38:30 -05:00
|
|
|
|
2019-10-28 15:39:37 -05:00
|
|
|
// original request, before any internal changes
|
|
|
|
case "http.request.orig_method":
|
|
|
|
or, _ := req.Context().Value(OriginalRequestCtxKey).(http.Request)
|
|
|
|
return or.Method, true
|
2019-10-10 16:38:30 -05:00
|
|
|
case "http.request.orig_uri":
|
2019-10-28 15:39:37 -05:00
|
|
|
or, _ := req.Context().Value(OriginalRequestCtxKey).(http.Request)
|
|
|
|
return or.RequestURI, true
|
2019-10-10 16:38:30 -05:00
|
|
|
case "http.request.orig_uri.path":
|
2019-10-28 15:39:37 -05:00
|
|
|
or, _ := req.Context().Value(OriginalRequestCtxKey).(http.Request)
|
|
|
|
return or.URL.Path, true
|
2019-10-10 16:38:30 -05:00
|
|
|
case "http.request.orig_uri.path.file":
|
2019-10-28 15:39:37 -05:00
|
|
|
or, _ := req.Context().Value(OriginalRequestCtxKey).(http.Request)
|
|
|
|
_, file := path.Split(or.URL.Path)
|
2019-10-10 16:38:30 -05:00
|
|
|
return file, true
|
|
|
|
case "http.request.orig_uri.path.dir":
|
2019-10-28 15:39:37 -05:00
|
|
|
or, _ := req.Context().Value(OriginalRequestCtxKey).(http.Request)
|
|
|
|
dir, _ := path.Split(or.URL.Path)
|
2019-10-10 16:38:30 -05:00
|
|
|
return dir, true
|
|
|
|
case "http.request.orig_uri.query":
|
2019-10-28 15:39:37 -05:00
|
|
|
or, _ := req.Context().Value(OriginalRequestCtxKey).(http.Request)
|
|
|
|
return or.URL.RawQuery, true
|
2019-05-21 14:10:14 -05:00
|
|
|
}
|
2019-07-16 13:27:11 -05:00
|
|
|
|
2019-08-09 13:05:47 -05:00
|
|
|
// hostname labels
|
2020-02-25 21:22:50 -05:00
|
|
|
if strings.HasPrefix(key, reqHostLabelsReplPrefix) {
|
|
|
|
idxStr := key[len(reqHostLabelsReplPrefix):]
|
2019-07-16 13:27:11 -05:00
|
|
|
idx, err := strconv.Atoi(idxStr)
|
|
|
|
if err != nil {
|
|
|
|
return "", false
|
|
|
|
}
|
2019-10-14 13:09:43 -05:00
|
|
|
reqHost, _, err := net.SplitHostPort(req.Host)
|
|
|
|
if err != nil {
|
|
|
|
reqHost = req.Host // OK; assume there was no port
|
|
|
|
}
|
|
|
|
hostLabels := strings.Split(reqHost, ".")
|
2019-07-16 13:27:11 -05:00
|
|
|
if idx < 0 {
|
|
|
|
return "", false
|
|
|
|
}
|
2019-10-14 13:09:43 -05:00
|
|
|
if idx > len(hostLabels) {
|
2019-07-16 13:27:11 -05:00
|
|
|
return "", true
|
|
|
|
}
|
2019-10-14 13:09:43 -05:00
|
|
|
return hostLabels[len(hostLabels)-idx-1], true
|
2019-05-20 11:59:20 -05:00
|
|
|
}
|
2019-07-08 17:46:55 -05:00
|
|
|
|
2019-08-09 13:05:47 -05:00
|
|
|
// path parts
|
2020-02-25 21:22:50 -05:00
|
|
|
if strings.HasPrefix(key, reqURIPathReplPrefix) {
|
|
|
|
idxStr := key[len(reqURIPathReplPrefix):]
|
2019-07-16 13:27:11 -05:00
|
|
|
idx, err := strconv.Atoi(idxStr)
|
|
|
|
if err != nil {
|
|
|
|
return "", false
|
|
|
|
}
|
|
|
|
pathParts := strings.Split(req.URL.Path, "/")
|
|
|
|
if len(pathParts) > 0 && pathParts[0] == "" {
|
|
|
|
pathParts = pathParts[1:]
|
|
|
|
}
|
|
|
|
if idx < 0 {
|
|
|
|
return "", false
|
|
|
|
}
|
|
|
|
if idx >= len(pathParts) {
|
|
|
|
return "", true
|
|
|
|
}
|
|
|
|
return pathParts[idx], true
|
2019-07-08 17:46:55 -05:00
|
|
|
}
|
2019-08-09 13:05:47 -05:00
|
|
|
|
|
|
|
// middleware variables
|
|
|
|
if strings.HasPrefix(key, varsReplPrefix) {
|
|
|
|
varName := key[len(varsReplPrefix):]
|
2019-10-28 15:39:37 -05:00
|
|
|
tbl := req.Context().Value(VarsCtxKey).(map[string]interface{})
|
2020-04-08 16:31:51 -05:00
|
|
|
raw := tbl[varName]
|
2020-03-30 12:49:53 -05:00
|
|
|
// variables can be dynamic, so always return true
|
|
|
|
// even when it may not be set; treat as empty then
|
|
|
|
return raw, true
|
2019-08-09 13:05:47 -05:00
|
|
|
}
|
2019-05-16 12:46:17 -05:00
|
|
|
}
|
|
|
|
|
2019-05-20 11:59:20 -05:00
|
|
|
if w != nil {
|
2019-08-09 13:05:47 -05:00
|
|
|
// response header fields
|
2019-07-16 13:27:11 -05:00
|
|
|
if strings.HasPrefix(key, respHeaderReplPrefix) {
|
|
|
|
field := key[len(respHeaderReplPrefix):]
|
|
|
|
vals := w.Header()[textproto.CanonicalMIMEHeaderKey(field)]
|
|
|
|
// always return true, since the header field might
|
|
|
|
// be present only in some responses
|
|
|
|
return strings.Join(vals, ","), true
|
2019-05-20 11:59:20 -05:00
|
|
|
}
|
2019-05-14 15:14:05 -05:00
|
|
|
}
|
2019-05-04 14:21:20 -05:00
|
|
|
|
2020-03-30 12:49:53 -05:00
|
|
|
return nil, false
|
2019-05-20 11:59:20 -05:00
|
|
|
}
|
2019-05-04 14:21:20 -05:00
|
|
|
|
2019-05-20 11:59:20 -05:00
|
|
|
repl.Map(httpVars)
|
|
|
|
}
|
2019-07-16 13:27:11 -05:00
|
|
|
|
2020-03-30 12:49:53 -05:00
|
|
|
func getReqTLSReplacement(req *http.Request, key string) (interface{}, bool) {
|
2020-02-25 21:22:50 -05:00
|
|
|
if req == nil || req.TLS == nil {
|
2020-03-30 12:49:53 -05:00
|
|
|
return nil, false
|
2020-02-25 21:22:50 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
if len(key) < len(reqTLSReplPrefix) {
|
2020-03-30 12:49:53 -05:00
|
|
|
return nil, false
|
2020-02-25 21:22:50 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
field := strings.ToLower(key[len(reqTLSReplPrefix):])
|
|
|
|
|
|
|
|
if strings.HasPrefix(field, "client.") {
|
|
|
|
cert := getTLSPeerCert(req.TLS)
|
|
|
|
if cert == nil {
|
2020-03-30 12:49:53 -05:00
|
|
|
return nil, false
|
2020-02-25 21:22:50 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
switch field {
|
|
|
|
case "client.fingerprint":
|
|
|
|
return fmt.Sprintf("%x", sha256.Sum256(cert.Raw)), true
|
2020-05-26 16:52:32 -05:00
|
|
|
case "client.public_key", "client.public_key_sha256":
|
|
|
|
if cert.PublicKey == nil {
|
|
|
|
return nil, true
|
|
|
|
}
|
|
|
|
pubKeyBytes, err := marshalPublicKey(cert.PublicKey)
|
|
|
|
if err != nil {
|
|
|
|
return nil, true
|
|
|
|
}
|
|
|
|
if strings.HasSuffix(field, "_sha256") {
|
|
|
|
return fmt.Sprintf("%x", sha256.Sum256(pubKeyBytes)), true
|
|
|
|
}
|
|
|
|
return fmt.Sprintf("%x", pubKeyBytes), true
|
2020-02-25 21:22:50 -05:00
|
|
|
case "client.issuer":
|
2020-03-30 12:49:53 -05:00
|
|
|
return cert.Issuer, true
|
2020-02-25 21:22:50 -05:00
|
|
|
case "client.serial":
|
2020-03-30 12:49:53 -05:00
|
|
|
return cert.SerialNumber, true
|
2020-02-25 21:22:50 -05:00
|
|
|
case "client.subject":
|
2020-03-30 12:49:53 -05:00
|
|
|
return cert.Subject, true
|
2020-02-25 21:22:50 -05:00
|
|
|
default:
|
2020-03-30 12:49:53 -05:00
|
|
|
return nil, false
|
2020-02-25 21:22:50 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
switch field {
|
|
|
|
case "version":
|
|
|
|
return caddytls.ProtocolName(req.TLS.Version), true
|
|
|
|
case "cipher_suite":
|
|
|
|
return tls.CipherSuiteName(req.TLS.CipherSuite), true
|
|
|
|
case "resumed":
|
2020-03-30 12:49:53 -05:00
|
|
|
return req.TLS.DidResume, true
|
2020-02-25 21:22:50 -05:00
|
|
|
case "proto":
|
|
|
|
return req.TLS.NegotiatedProtocol, true
|
|
|
|
case "proto_mutual":
|
2020-03-30 12:49:53 -05:00
|
|
|
return req.TLS.NegotiatedProtocolIsMutual, true
|
2020-02-25 21:22:50 -05:00
|
|
|
case "server_name":
|
|
|
|
return req.TLS.ServerName, true
|
|
|
|
}
|
2020-03-30 12:49:53 -05:00
|
|
|
return nil, false
|
2020-02-25 21:22:50 -05:00
|
|
|
}
|
|
|
|
|
2020-05-26 16:52:32 -05:00
|
|
|
// marshalPublicKey returns the byte encoding of pubKey.
|
|
|
|
func marshalPublicKey(pubKey interface{}) ([]byte, error) {
|
|
|
|
switch key := pubKey.(type) {
|
|
|
|
case *rsa.PublicKey:
|
|
|
|
return asn1.Marshal(key)
|
|
|
|
case *ecdsa.PublicKey:
|
|
|
|
return elliptic.Marshal(key.Curve, key.X, key.Y), nil
|
|
|
|
case ed25519.PublicKey:
|
|
|
|
return key, nil
|
|
|
|
}
|
|
|
|
return nil, fmt.Errorf("unrecognized public key type: %T", pubKey)
|
|
|
|
}
|
|
|
|
|
2020-02-25 21:22:50 -05:00
|
|
|
// getTLSPeerCert retrieves the first peer certificate from a TLS session.
|
|
|
|
// Returns nil if no peer cert is in use.
|
|
|
|
func getTLSPeerCert(cs *tls.ConnectionState) *x509.Certificate {
|
|
|
|
if len(cs.PeerCertificates) == 0 {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
return cs.PeerCertificates[0]
|
|
|
|
}
|
|
|
|
|
2019-07-16 13:27:11 -05:00
|
|
|
const (
|
2020-02-25 21:22:50 -05:00
|
|
|
reqCookieReplPrefix = "http.request.cookie."
|
|
|
|
reqHeaderReplPrefix = "http.request.header."
|
|
|
|
reqHostLabelsReplPrefix = "http.request.host.labels."
|
|
|
|
reqTLSReplPrefix = "http.request.tls."
|
|
|
|
reqURIPathReplPrefix = "http.request.uri.path."
|
|
|
|
reqURIQueryReplPrefix = "http.request.uri.query."
|
|
|
|
respHeaderReplPrefix = "http.response.header."
|
|
|
|
varsReplPrefix = "http.vars."
|
2019-07-16 13:27:11 -05:00
|
|
|
)
|