2019-07-01 01:07:58 +03:00
|
|
|
// Copyright 2015 Matthew Holt and The Caddy Authors
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
2019-05-23 22:16:34 +03:00
|
|
|
package rewrite
|
2019-05-21 08:48:43 +03:00
|
|
|
|
|
|
|
import (
|
2020-03-30 20:49:53 +03:00
|
|
|
"fmt"
|
2019-05-21 08:48:43 +03:00
|
|
|
"net/http"
|
|
|
|
"net/url"
|
2021-03-02 04:27:59 +03:00
|
|
|
"regexp"
|
2020-03-30 20:49:53 +03:00
|
|
|
"strconv"
|
2019-05-21 08:48:43 +03:00
|
|
|
"strings"
|
|
|
|
|
2023-08-14 18:41:15 +03:00
|
|
|
"go.uber.org/zap"
|
|
|
|
|
2019-07-02 21:37:06 +03:00
|
|
|
"github.com/caddyserver/caddy/v2"
|
|
|
|
"github.com/caddyserver/caddy/v2/modules/caddyhttp"
|
2019-05-21 08:48:43 +03:00
|
|
|
)
|
|
|
|
|
|
|
|
func init() {
|
2019-08-21 19:46:35 +03:00
|
|
|
caddy.RegisterModule(Rewrite{})
|
2019-05-21 08:48:43 +03:00
|
|
|
}
|
|
|
|
|
2022-08-16 17:48:57 +03:00
|
|
|
// Rewrite is a middleware which can rewrite/mutate HTTP requests.
|
2019-12-23 22:45:35 +03:00
|
|
|
//
|
2022-08-16 17:48:57 +03:00
|
|
|
// The Method and URI properties are "setters" (the request URI
|
|
|
|
// will be overwritten with the given values). Other properties are
|
|
|
|
// "modifiers" (they modify existing values in a differentiable
|
|
|
|
// way). It is atypical to combine the use of setters and
|
2020-01-11 23:47:42 +03:00
|
|
|
// modifiers in a single rewrite.
|
2022-08-16 17:48:57 +03:00
|
|
|
//
|
|
|
|
// To ensure consistent behavior, prefix and suffix stripping is
|
|
|
|
// performed in the URL-decoded (unescaped, normalized) space by
|
|
|
|
// default except for the specific bytes where an escape sequence
|
|
|
|
// is used in the prefix or suffix pattern.
|
|
|
|
//
|
|
|
|
// For all modifiers, paths are cleaned before being modified so that
|
|
|
|
// multiple, consecutive slashes are collapsed into a single slash,
|
|
|
|
// and dot elements are resolved and removed. In the special case
|
|
|
|
// of a prefix, suffix, or substring containing "//" (repeated slashes),
|
|
|
|
// slashes will not be merged while cleaning the path so that
|
|
|
|
// the rewrite can be interpreted literally.
|
2019-05-21 08:48:43 +03:00
|
|
|
type Rewrite struct {
|
2019-12-23 22:45:35 +03:00
|
|
|
// Changes the request's HTTP verb.
|
2019-10-20 04:22:29 +03:00
|
|
|
Method string `json:"method,omitempty"`
|
|
|
|
|
2020-01-11 23:47:42 +03:00
|
|
|
// Changes the request's URI, which consists of path and query string.
|
2019-12-23 22:45:35 +03:00
|
|
|
// Only components of the URI that are specified will be changed.
|
2020-01-11 23:47:42 +03:00
|
|
|
// For example, a value of "/foo.html" or "foo.html" will only change
|
|
|
|
// the path and will preserve any existing query string. Similarly, a
|
|
|
|
// value of "?a=b" will only change the query string and will not affect
|
|
|
|
// the path. Both can also be changed: "/foo?a=b" - this sets both the
|
|
|
|
// path and query string at the same time.
|
|
|
|
//
|
|
|
|
// You can also use placeholders. For example, to preserve the existing
|
|
|
|
// query string, you might use: "?{http.request.uri.query}&a=b". Any
|
|
|
|
// key-value pairs you add to the query string will not overwrite
|
2020-01-17 03:08:52 +03:00
|
|
|
// existing values (individual pairs are append-only).
|
2020-01-11 23:47:42 +03:00
|
|
|
//
|
|
|
|
// To clear the query string, explicitly set an empty one: "?"
|
2019-12-23 22:45:35 +03:00
|
|
|
URI string `json:"uri,omitempty"`
|
|
|
|
|
|
|
|
// Strips the given prefix from the beginning of the URI path.
|
2022-08-16 17:48:57 +03:00
|
|
|
// The prefix should be written in normalized (unescaped) form,
|
|
|
|
// but if an escaping (`%xx`) is used, the path will be required
|
|
|
|
// to have that same escape at that position in order to match.
|
2020-01-11 23:47:42 +03:00
|
|
|
StripPathPrefix string `json:"strip_path_prefix,omitempty"`
|
2019-10-20 04:22:29 +03:00
|
|
|
|
2019-12-23 22:45:35 +03:00
|
|
|
// Strips the given suffix from the end of the URI path.
|
2022-08-16 17:48:57 +03:00
|
|
|
// The suffix should be written in normalized (unescaped) form,
|
|
|
|
// but if an escaping (`%xx`) is used, the path will be required
|
|
|
|
// to have that same escape at that position in order to match.
|
2020-01-11 23:47:42 +03:00
|
|
|
StripPathSuffix string `json:"strip_path_suffix,omitempty"`
|
2019-12-23 22:45:35 +03:00
|
|
|
|
|
|
|
// Performs substring replacements on the URI.
|
2021-03-02 04:27:59 +03:00
|
|
|
URISubstring []substrReplacer `json:"uri_substring,omitempty"`
|
|
|
|
|
|
|
|
// Performs regular expression replacements on the URI path.
|
|
|
|
PathRegexp []*regexReplacer `json:"path_regexp,omitempty"`
|
2019-12-23 22:45:35 +03:00
|
|
|
|
2024-03-06 18:08:46 +03:00
|
|
|
// Mutates the query string of the URI.
|
|
|
|
Query *queryOps `json:"query,omitempty"`
|
|
|
|
|
2019-10-28 23:39:37 +03:00
|
|
|
logger *zap.Logger
|
2019-05-21 08:48:43 +03:00
|
|
|
}
|
|
|
|
|
2019-08-21 19:46:35 +03:00
|
|
|
// CaddyModule returns the Caddy module information.
|
|
|
|
func (Rewrite) CaddyModule() caddy.ModuleInfo {
|
|
|
|
return caddy.ModuleInfo{
|
2019-12-10 23:36:46 +03:00
|
|
|
ID: "http.handlers.rewrite",
|
|
|
|
New: func() caddy.Module { return new(Rewrite) },
|
2019-08-21 19:46:35 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-10-28 23:39:37 +03:00
|
|
|
// Provision sets up rewr.
|
|
|
|
func (rewr *Rewrite) Provision(ctx caddy.Context) error {
|
2022-09-17 01:55:30 +03:00
|
|
|
rewr.logger = ctx.Logger()
|
2021-03-02 04:27:59 +03:00
|
|
|
|
|
|
|
for i, rep := range rewr.PathRegexp {
|
|
|
|
if rep.Find == "" {
|
|
|
|
return fmt.Errorf("path_regexp find cannot be empty")
|
|
|
|
}
|
|
|
|
re, err := regexp.Compile(rep.Find)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("compiling regular expression %d: %v", i, err)
|
|
|
|
}
|
|
|
|
rep.re = re
|
|
|
|
}
|
2024-03-23 08:51:34 +03:00
|
|
|
if rewr.Query != nil {
|
|
|
|
for _, replacementOp := range rewr.Query.Replace {
|
|
|
|
err := replacementOp.Provision(ctx)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("compiling regular expression %s in query rewrite replace operation: %v", replacementOp.SearchRegexp, err)
|
|
|
|
}
|
2024-03-22 05:23:42 +03:00
|
|
|
}
|
|
|
|
}
|
2024-03-23 08:51:34 +03:00
|
|
|
|
2019-10-28 23:39:37 +03:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-05-21 08:48:43 +03:00
|
|
|
func (rewr Rewrite) ServeHTTP(w http.ResponseWriter, r *http.Request, next caddyhttp.Handler) error {
|
2019-12-29 23:12:52 +03:00
|
|
|
repl := r.Context().Value(caddy.ReplacerCtxKey).(*caddy.Replacer)
|
2024-08-30 17:46:51 +03:00
|
|
|
const message = "rewrote request"
|
|
|
|
|
2024-09-13 20:16:37 +03:00
|
|
|
c := rewr.logger.Check(zap.DebugLevel, message)
|
|
|
|
if c == nil {
|
2024-08-30 17:46:51 +03:00
|
|
|
rewr.Rewrite(r, repl)
|
|
|
|
return next.ServeHTTP(w, r)
|
|
|
|
}
|
2019-05-21 08:48:43 +03:00
|
|
|
|
2022-05-06 17:50:26 +03:00
|
|
|
changed := rewr.Rewrite(r, repl)
|
2019-12-13 00:32:35 +03:00
|
|
|
|
|
|
|
if changed {
|
2024-09-13 20:16:37 +03:00
|
|
|
c.Write(
|
|
|
|
zap.Object("request", caddyhttp.LoggableHTTPRequest{Request: r}),
|
2019-12-13 00:32:35 +03:00
|
|
|
zap.String("method", r.Method),
|
|
|
|
zap.String("uri", r.RequestURI),
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
|
|
|
return next.ServeHTTP(w, r)
|
|
|
|
}
|
|
|
|
|
2020-01-11 02:59:57 +03:00
|
|
|
// rewrite performs the rewrites on r using repl, which should
|
|
|
|
// have been obtained from r, but is passed in for efficiency.
|
|
|
|
// It returns true if any changes were made to r.
|
2022-05-06 17:50:26 +03:00
|
|
|
func (rewr Rewrite) Rewrite(r *http.Request, repl *caddy.Replacer) bool {
|
2019-12-13 00:32:35 +03:00
|
|
|
oldMethod := r.Method
|
|
|
|
oldURI := r.RequestURI
|
|
|
|
|
|
|
|
// method
|
2019-05-21 08:48:43 +03:00
|
|
|
if rewr.Method != "" {
|
|
|
|
r.Method = strings.ToUpper(repl.ReplaceAll(rewr.Method, ""))
|
|
|
|
}
|
|
|
|
|
2020-04-01 09:43:40 +03:00
|
|
|
// uri (path, query string and... fragment, because why not)
|
2020-01-11 02:59:57 +03:00
|
|
|
if uri := rewr.URI; uri != "" {
|
|
|
|
// find the bounds of each part of the URI that exist
|
|
|
|
pathStart, qsStart, fragStart := -1, -1, -1
|
|
|
|
pathEnd, qsEnd := -1, -1
|
2022-05-09 20:09:42 +03:00
|
|
|
loop:
|
2020-01-11 02:59:57 +03:00
|
|
|
for i, ch := range uri {
|
|
|
|
switch {
|
|
|
|
case ch == '?' && qsStart < 0:
|
|
|
|
pathEnd, qsStart = i, i+1
|
2022-05-09 20:09:42 +03:00
|
|
|
case ch == '#' && fragStart < 0: // everything after fragment is fragment (very clear in RFC 3986 section 4.2)
|
|
|
|
if qsStart < 0 {
|
|
|
|
pathEnd = i
|
|
|
|
} else {
|
|
|
|
qsEnd = i
|
|
|
|
}
|
|
|
|
fragStart = i + 1
|
|
|
|
break loop
|
|
|
|
case pathStart < 0 && qsStart < 0:
|
2020-01-11 02:59:57 +03:00
|
|
|
pathStart = i
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if pathStart >= 0 && pathEnd < 0 {
|
|
|
|
pathEnd = len(uri)
|
|
|
|
}
|
|
|
|
if qsStart >= 0 && qsEnd < 0 {
|
|
|
|
qsEnd = len(uri)
|
2019-05-21 08:48:43 +03:00
|
|
|
}
|
|
|
|
|
2020-04-01 09:43:40 +03:00
|
|
|
// isolate the three main components of the URI
|
|
|
|
var path, query, frag string
|
|
|
|
if pathStart > -1 {
|
|
|
|
path = uri[pathStart:pathEnd]
|
|
|
|
}
|
|
|
|
if qsStart > -1 {
|
|
|
|
query = uri[qsStart:qsEnd]
|
|
|
|
}
|
|
|
|
if fragStart > -1 {
|
|
|
|
frag = uri[fragStart:]
|
|
|
|
}
|
|
|
|
|
2020-01-15 21:44:21 +03:00
|
|
|
// build components which are specified, and store them
|
|
|
|
// in a temporary variable so that they all read the
|
|
|
|
// same version of the URI
|
|
|
|
var newPath, newQuery, newFrag string
|
2022-01-13 20:17:15 +03:00
|
|
|
|
2020-04-01 09:43:40 +03:00
|
|
|
if path != "" {
|
2023-05-16 18:16:07 +03:00
|
|
|
// replace the `path` placeholder to escaped path
|
|
|
|
pathPlaceholder := "{http.request.uri.path}"
|
|
|
|
if strings.Contains(path, pathPlaceholder) {
|
|
|
|
path = strings.ReplaceAll(path, pathPlaceholder, r.URL.EscapedPath())
|
2022-01-13 20:17:15 +03:00
|
|
|
}
|
|
|
|
|
2020-04-01 09:43:40 +03:00
|
|
|
newPath = repl.ReplaceAll(path, "")
|
2019-05-21 08:48:43 +03:00
|
|
|
}
|
2020-04-01 09:43:40 +03:00
|
|
|
|
|
|
|
// before continuing, we need to check if a query string
|
|
|
|
// snuck into the path component during replacements
|
2022-08-07 07:03:37 +03:00
|
|
|
if before, after, found := strings.Cut(newPath, "?"); found {
|
2020-04-01 09:43:40 +03:00
|
|
|
// recompute; new path contains a query string
|
|
|
|
var injectedQuery string
|
2022-08-07 07:03:37 +03:00
|
|
|
newPath, injectedQuery = before, after
|
2020-04-01 09:43:40 +03:00
|
|
|
// don't overwrite explicitly-configured query string
|
|
|
|
if query == "" {
|
|
|
|
query = injectedQuery
|
|
|
|
}
|
2019-05-21 08:48:43 +03:00
|
|
|
}
|
2020-04-01 09:43:40 +03:00
|
|
|
|
|
|
|
if query != "" {
|
|
|
|
newQuery = buildQueryString(query, repl)
|
|
|
|
}
|
|
|
|
if frag != "" {
|
|
|
|
newFrag = repl.ReplaceAll(frag, "")
|
2020-01-15 21:44:21 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// update the URI with the new components
|
|
|
|
// only after building them
|
|
|
|
if pathStart >= 0 {
|
2023-05-16 18:16:07 +03:00
|
|
|
if path, err := url.PathUnescape(newPath); err != nil {
|
|
|
|
r.URL.Path = newPath
|
|
|
|
} else {
|
|
|
|
r.URL.Path = path
|
|
|
|
}
|
2020-01-15 21:44:21 +03:00
|
|
|
}
|
|
|
|
if qsStart >= 0 {
|
|
|
|
r.URL.RawQuery = newQuery
|
|
|
|
}
|
|
|
|
if fragStart >= 0 {
|
|
|
|
r.URL.Fragment = newFrag
|
2019-05-21 08:48:43 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-10-20 04:22:29 +03:00
|
|
|
// strip path prefix or suffix
|
2020-01-11 23:47:42 +03:00
|
|
|
if rewr.StripPathPrefix != "" {
|
|
|
|
prefix := repl.ReplaceAll(rewr.StripPathPrefix, "")
|
2024-11-05 20:15:31 +03:00
|
|
|
if !strings.HasPrefix(prefix, "/") {
|
|
|
|
prefix = "/" + prefix
|
|
|
|
}
|
2022-08-16 17:48:57 +03:00
|
|
|
mergeSlashes := !strings.Contains(prefix, "//")
|
|
|
|
changePath(r, func(escapedPath string) string {
|
|
|
|
escapedPath = caddyhttp.CleanPath(escapedPath, mergeSlashes)
|
|
|
|
return trimPathPrefix(escapedPath, prefix)
|
|
|
|
})
|
2019-10-20 04:22:29 +03:00
|
|
|
}
|
2020-01-11 23:47:42 +03:00
|
|
|
if rewr.StripPathSuffix != "" {
|
|
|
|
suffix := repl.ReplaceAll(rewr.StripPathSuffix, "")
|
2022-08-16 17:48:57 +03:00
|
|
|
mergeSlashes := !strings.Contains(suffix, "//")
|
|
|
|
changePath(r, func(escapedPath string) string {
|
|
|
|
escapedPath = caddyhttp.CleanPath(escapedPath, mergeSlashes)
|
|
|
|
return reverse(trimPathPrefix(reverse(escapedPath), reverse(suffix)))
|
2021-03-02 04:27:59 +03:00
|
|
|
})
|
2019-10-20 04:22:29 +03:00
|
|
|
}
|
|
|
|
|
2019-12-13 00:32:35 +03:00
|
|
|
// substring replacements in URI
|
|
|
|
for _, rep := range rewr.URISubstring {
|
|
|
|
rep.do(r, repl)
|
2019-10-20 04:22:29 +03:00
|
|
|
}
|
|
|
|
|
2021-03-02 04:27:59 +03:00
|
|
|
// regular expression replacements on the path
|
|
|
|
for _, rep := range rewr.PathRegexp {
|
|
|
|
rep.do(r, repl)
|
|
|
|
}
|
|
|
|
|
2024-03-06 18:08:46 +03:00
|
|
|
// apply query operations
|
|
|
|
if rewr.Query != nil {
|
|
|
|
rewr.Query.do(r, repl)
|
|
|
|
}
|
|
|
|
|
2019-12-13 00:32:35 +03:00
|
|
|
// update the encoded copy of the URI
|
|
|
|
r.RequestURI = r.URL.RequestURI()
|
|
|
|
|
|
|
|
// return true if anything changed
|
|
|
|
return r.Method != oldMethod || r.RequestURI != oldURI
|
|
|
|
}
|
|
|
|
|
2020-01-11 02:59:57 +03:00
|
|
|
// buildQueryString takes an input query string and
|
|
|
|
// performs replacements on each component, returning
|
2020-01-11 21:40:03 +03:00
|
|
|
// the resulting query string. This function appends
|
|
|
|
// duplicate keys rather than replaces.
|
2020-01-11 02:59:57 +03:00
|
|
|
func buildQueryString(qs string, repl *caddy.Replacer) string {
|
|
|
|
var sb strings.Builder
|
2020-01-11 21:40:03 +03:00
|
|
|
|
|
|
|
// first component must be key, which is the same
|
|
|
|
// as if we just wrote a value in previous iteration
|
|
|
|
wroteVal := true
|
2020-01-11 02:59:57 +03:00
|
|
|
|
|
|
|
for len(qs) > 0 {
|
2020-01-11 21:40:03 +03:00
|
|
|
// determine the end of this component, which will be at
|
|
|
|
// the next equal sign or ampersand, whichever comes first
|
2020-01-11 02:59:57 +03:00
|
|
|
nextEq, nextAmp := strings.Index(qs, "="), strings.Index(qs, "&")
|
2020-01-11 21:40:03 +03:00
|
|
|
ampIsNext := nextAmp >= 0 && (nextAmp < nextEq || nextEq < 0)
|
|
|
|
end := len(qs) // assume no delimiter remains...
|
|
|
|
if ampIsNext {
|
|
|
|
end = nextAmp // ...unless ampersand is first...
|
|
|
|
} else if nextEq >= 0 && (nextEq < nextAmp || nextAmp < 0) {
|
|
|
|
end = nextEq // ...or unless equal is first.
|
2020-01-11 02:59:57 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// consume the component and write the result
|
|
|
|
comp := qs[:end]
|
2022-08-02 23:39:09 +03:00
|
|
|
comp, _ = repl.ReplaceFunc(comp, func(name string, val any) (any, error) {
|
2020-01-11 21:40:03 +03:00
|
|
|
if name == "http.request.uri.query" && wroteVal {
|
2020-01-11 02:59:57 +03:00
|
|
|
return val, nil // already escaped
|
|
|
|
}
|
2020-03-30 20:49:53 +03:00
|
|
|
var valStr string
|
|
|
|
switch v := val.(type) {
|
|
|
|
case string:
|
|
|
|
valStr = v
|
|
|
|
case fmt.Stringer:
|
|
|
|
valStr = v.String()
|
|
|
|
case int:
|
|
|
|
valStr = strconv.Itoa(v)
|
|
|
|
default:
|
|
|
|
valStr = fmt.Sprintf("%+v", v)
|
|
|
|
}
|
|
|
|
return url.QueryEscape(valStr), nil
|
2020-01-11 02:59:57 +03:00
|
|
|
})
|
|
|
|
if end < len(qs) {
|
|
|
|
end++ // consume delimiter
|
|
|
|
}
|
|
|
|
qs = qs[end:]
|
|
|
|
|
2020-01-11 21:40:03 +03:00
|
|
|
// if previous iteration wrote a value,
|
|
|
|
// that means we are writing a key
|
|
|
|
if wroteVal {
|
2020-01-15 21:44:21 +03:00
|
|
|
if sb.Len() > 0 && len(comp) > 0 {
|
2020-01-11 21:40:03 +03:00
|
|
|
sb.WriteRune('&')
|
|
|
|
}
|
|
|
|
} else {
|
2020-01-11 02:59:57 +03:00
|
|
|
sb.WriteRune('=')
|
|
|
|
}
|
|
|
|
sb.WriteString(comp)
|
2020-01-11 21:40:03 +03:00
|
|
|
|
|
|
|
// remember for the next iteration that we just wrote a value,
|
|
|
|
// which means the next iteration MUST write a key
|
|
|
|
wroteVal = ampIsNext
|
2020-01-11 02:59:57 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
return sb.String()
|
|
|
|
}
|
|
|
|
|
2022-08-16 17:48:57 +03:00
|
|
|
// trimPathPrefix is like strings.TrimPrefix, but customized for advanced URI
|
|
|
|
// path prefix matching. The string prefix will be trimmed from the beginning
|
|
|
|
// of escapedPath if escapedPath starts with prefix. Rather than a naive 1:1
|
|
|
|
// comparison of each byte to determine if escapedPath starts with prefix,
|
|
|
|
// both strings are iterated in lock-step, and if prefix has a '%' encoding
|
|
|
|
// at a particular position, escapedPath must also have the same encoding
|
|
|
|
// representation for that character. In other words, if the prefix string
|
|
|
|
// uses the escaped form for a character, escapedPath must literally use the
|
|
|
|
// same escape at that position. Otherwise, all character comparisons are
|
|
|
|
// performed in normalized/unescaped space.
|
|
|
|
func trimPathPrefix(escapedPath, prefix string) string {
|
|
|
|
var iPath, iPrefix int
|
|
|
|
for {
|
|
|
|
if iPath >= len(escapedPath) || iPrefix >= len(prefix) {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
|
|
|
|
prefixCh := prefix[iPrefix]
|
|
|
|
ch := string(escapedPath[iPath])
|
|
|
|
|
|
|
|
if ch == "%" && prefixCh != '%' && len(escapedPath) >= iPath+3 {
|
|
|
|
var err error
|
|
|
|
ch, err = url.PathUnescape(escapedPath[iPath : iPath+3])
|
|
|
|
if err != nil {
|
|
|
|
// should be impossible unless EscapedPath() is returning invalid values!
|
|
|
|
return escapedPath
|
|
|
|
}
|
|
|
|
iPath += 2
|
|
|
|
}
|
|
|
|
|
|
|
|
// prefix comparisons are case-insensitive to consistency with
|
|
|
|
// path matcher, which is case-insensitive for good reasons
|
|
|
|
if !strings.EqualFold(ch, string(prefixCh)) {
|
|
|
|
return escapedPath
|
|
|
|
}
|
|
|
|
|
|
|
|
iPath++
|
|
|
|
iPrefix++
|
|
|
|
}
|
|
|
|
|
2022-09-28 09:13:12 +03:00
|
|
|
// if we iterated through the entire prefix, we found it, so trim it
|
|
|
|
if iPath >= len(prefix) {
|
|
|
|
return escapedPath[iPath:]
|
|
|
|
}
|
|
|
|
|
|
|
|
// otherwise we did not find the prefix
|
|
|
|
return escapedPath
|
2022-08-16 17:48:57 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
func reverse(s string) string {
|
|
|
|
r := []rune(s)
|
|
|
|
for i, j := 0, len(r)-1; i < len(r)/2; i, j = i+1, j-1 {
|
|
|
|
r[i], r[j] = r[j], r[i]
|
|
|
|
}
|
|
|
|
return string(r)
|
|
|
|
}
|
|
|
|
|
2021-03-02 04:27:59 +03:00
|
|
|
// substrReplacer describes either a simple and fast substring replacement.
|
|
|
|
type substrReplacer struct {
|
|
|
|
// A substring to find. Supports placeholders.
|
2019-12-13 00:32:35 +03:00
|
|
|
Find string `json:"find,omitempty"`
|
|
|
|
|
2021-03-02 04:27:59 +03:00
|
|
|
// The substring to replace with. Supports placeholders.
|
2019-12-13 00:32:35 +03:00
|
|
|
Replace string `json:"replace,omitempty"`
|
|
|
|
|
|
|
|
// Maximum number of replacements per string.
|
|
|
|
// Set to <= 0 for no limit (default).
|
|
|
|
Limit int `json:"limit,omitempty"`
|
|
|
|
}
|
|
|
|
|
2021-03-02 04:27:59 +03:00
|
|
|
// do performs the substring replacement on r.
|
|
|
|
func (rep substrReplacer) do(r *http.Request, repl *caddy.Replacer) {
|
|
|
|
if rep.Find == "" {
|
2021-01-11 19:18:53 +03:00
|
|
|
return
|
2019-12-13 00:32:35 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
lim := rep.Limit
|
|
|
|
if lim == 0 {
|
|
|
|
lim = -1
|
|
|
|
}
|
|
|
|
|
|
|
|
find := repl.ReplaceAll(rep.Find, "")
|
|
|
|
replace := repl.ReplaceAll(rep.Replace, "")
|
|
|
|
|
2022-08-16 17:48:57 +03:00
|
|
|
mergeSlashes := !strings.Contains(rep.Find, "//")
|
|
|
|
|
2021-03-02 04:27:59 +03:00
|
|
|
changePath(r, func(pathOrRawPath string) string {
|
2022-08-16 17:48:57 +03:00
|
|
|
return strings.Replace(caddyhttp.CleanPath(pathOrRawPath, mergeSlashes), find, replace, lim)
|
2021-03-02 04:27:59 +03:00
|
|
|
})
|
2019-12-13 00:32:35 +03:00
|
|
|
|
2021-01-11 19:18:53 +03:00
|
|
|
r.URL.RawQuery = strings.Replace(r.URL.RawQuery, find, replace, lim)
|
2019-05-21 08:48:43 +03:00
|
|
|
}
|
|
|
|
|
2021-03-02 04:27:59 +03:00
|
|
|
// regexReplacer describes a replacement using a regular expression.
|
|
|
|
type regexReplacer struct {
|
|
|
|
// The regular expression to find.
|
|
|
|
Find string `json:"find,omitempty"`
|
|
|
|
|
|
|
|
// The substring to replace with. Supports placeholders and
|
|
|
|
// regular expression capture groups.
|
|
|
|
Replace string `json:"replace,omitempty"`
|
|
|
|
|
|
|
|
re *regexp.Regexp
|
|
|
|
}
|
|
|
|
|
|
|
|
func (rep regexReplacer) do(r *http.Request, repl *caddy.Replacer) {
|
|
|
|
if rep.Find == "" || rep.re == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
replace := repl.ReplaceAll(rep.Replace, "")
|
|
|
|
changePath(r, func(pathOrRawPath string) string {
|
|
|
|
return rep.re.ReplaceAllString(pathOrRawPath, replace)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func changePath(req *http.Request, newVal func(pathOrRawPath string) string) {
|
2022-08-16 17:48:57 +03:00
|
|
|
req.URL.RawPath = newVal(req.URL.EscapedPath())
|
2021-03-02 04:27:59 +03:00
|
|
|
if p, err := url.PathUnescape(req.URL.RawPath); err == nil && p != "" {
|
|
|
|
req.URL.Path = p
|
|
|
|
} else {
|
|
|
|
req.URL.Path = newVal(req.URL.Path)
|
|
|
|
}
|
2022-08-16 17:48:57 +03:00
|
|
|
// RawPath is only set if it's different from the normalized Path (std lib)
|
|
|
|
if req.URL.RawPath == req.URL.Path {
|
|
|
|
req.URL.RawPath = ""
|
|
|
|
}
|
2021-03-02 04:27:59 +03:00
|
|
|
}
|
|
|
|
|
2024-03-06 18:08:46 +03:00
|
|
|
// queryOps describes the operations to perform on query keys: add, set, rename and delete.
|
|
|
|
type queryOps struct {
|
|
|
|
// Renames a query key from Key to Val, without affecting the value.
|
|
|
|
Rename []queryOpsArguments `json:"rename,omitempty"`
|
|
|
|
|
|
|
|
// Sets query parameters; overwrites a query key with the given value.
|
|
|
|
Set []queryOpsArguments `json:"set,omitempty"`
|
|
|
|
|
|
|
|
// Adds query parameters; does not overwrite an existing query field,
|
|
|
|
// and only appends an additional value for that key if any already exist.
|
|
|
|
Add []queryOpsArguments `json:"add,omitempty"`
|
|
|
|
|
2024-03-22 05:23:42 +03:00
|
|
|
// Replaces query parameters.
|
|
|
|
Replace []*queryOpsReplacement `json:"replace,omitempty"`
|
|
|
|
|
2024-03-06 18:08:46 +03:00
|
|
|
// Deletes a given query key by name.
|
|
|
|
Delete []string `json:"delete,omitempty"`
|
|
|
|
}
|
|
|
|
|
2024-03-22 05:23:42 +03:00
|
|
|
// Provision compiles the query replace operation regex.
|
|
|
|
func (replacement *queryOpsReplacement) Provision(_ caddy.Context) error {
|
|
|
|
if replacement.SearchRegexp != "" {
|
|
|
|
re, err := regexp.Compile(replacement.SearchRegexp)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("replacement for query field '%s': %v", replacement.Key, err)
|
|
|
|
}
|
|
|
|
replacement.re = re
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-03-06 18:08:46 +03:00
|
|
|
func (q *queryOps) do(r *http.Request, repl *caddy.Replacer) {
|
|
|
|
query := r.URL.Query()
|
|
|
|
for _, renameParam := range q.Rename {
|
|
|
|
key := repl.ReplaceAll(renameParam.Key, "")
|
|
|
|
val := repl.ReplaceAll(renameParam.Val, "")
|
|
|
|
if key == "" || val == "" {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
query[val] = query[key]
|
|
|
|
delete(query, key)
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, setParam := range q.Set {
|
|
|
|
key := repl.ReplaceAll(setParam.Key, "")
|
|
|
|
if key == "" {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
val := repl.ReplaceAll(setParam.Val, "")
|
|
|
|
query[key] = []string{val}
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, addParam := range q.Add {
|
|
|
|
key := repl.ReplaceAll(addParam.Key, "")
|
|
|
|
if key == "" {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
val := repl.ReplaceAll(addParam.Val, "")
|
|
|
|
query[key] = append(query[key], val)
|
|
|
|
}
|
|
|
|
|
2024-03-22 05:23:42 +03:00
|
|
|
for _, replaceParam := range q.Replace {
|
|
|
|
key := repl.ReplaceAll(replaceParam.Key, "")
|
|
|
|
search := repl.ReplaceKnown(replaceParam.Search, "")
|
|
|
|
replace := repl.ReplaceKnown(replaceParam.Replace, "")
|
|
|
|
|
|
|
|
// replace all query keys...
|
|
|
|
if key == "*" {
|
|
|
|
for fieldName, vals := range query {
|
|
|
|
for i := range vals {
|
|
|
|
if replaceParam.re != nil {
|
|
|
|
query[fieldName][i] = replaceParam.re.ReplaceAllString(query[fieldName][i], replace)
|
|
|
|
} else {
|
|
|
|
query[fieldName][i] = strings.ReplaceAll(query[fieldName][i], search, replace)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
for fieldName, vals := range query {
|
|
|
|
for i := range vals {
|
|
|
|
if replaceParam.re != nil {
|
|
|
|
query[fieldName][i] = replaceParam.re.ReplaceAllString(query[fieldName][i], replace)
|
|
|
|
} else {
|
|
|
|
query[fieldName][i] = strings.ReplaceAll(query[fieldName][i], search, replace)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-03-06 18:08:46 +03:00
|
|
|
for _, deleteParam := range q.Delete {
|
|
|
|
param := repl.ReplaceAll(deleteParam, "")
|
|
|
|
if param == "" {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
delete(query, param)
|
|
|
|
}
|
|
|
|
|
|
|
|
r.URL.RawQuery = query.Encode()
|
|
|
|
}
|
|
|
|
|
|
|
|
type queryOpsArguments struct {
|
|
|
|
// A key in the query string. Note that query string keys may appear multiple times.
|
|
|
|
Key string `json:"key,omitempty"`
|
|
|
|
|
|
|
|
// The value for the given operation; for add and set, this is
|
|
|
|
// simply the value of the query, and for rename this is the
|
|
|
|
// query key to rename to.
|
|
|
|
Val string `json:"val,omitempty"`
|
|
|
|
}
|
|
|
|
|
2024-03-22 05:23:42 +03:00
|
|
|
type queryOpsReplacement struct {
|
|
|
|
// The key to replace in the query string.
|
|
|
|
Key string `json:"key,omitempty"`
|
|
|
|
|
|
|
|
// The substring to search for.
|
|
|
|
Search string `json:"search,omitempty"`
|
|
|
|
|
|
|
|
// The regular expression to search with.
|
|
|
|
SearchRegexp string `json:"search_regexp,omitempty"`
|
|
|
|
|
|
|
|
// The string with which to replace matches.
|
|
|
|
Replace string `json:"replace,omitempty"`
|
|
|
|
|
|
|
|
re *regexp.Regexp
|
|
|
|
}
|
|
|
|
|
2019-05-21 08:48:43 +03:00
|
|
|
// Interface guard
|
|
|
|
var _ caddyhttp.MiddlewareHandler = (*Rewrite)(nil)
|