2019-04-01 05:41:29 +03:00
|
|
|
package caddyhttp
|
|
|
|
|
|
|
|
import (
|
2019-06-04 22:42:54 +03:00
|
|
|
"encoding/json"
|
2019-05-11 06:07:02 +03:00
|
|
|
"fmt"
|
2019-04-03 18:47:27 +03:00
|
|
|
"log"
|
2019-06-04 22:42:54 +03:00
|
|
|
"net"
|
2019-04-01 05:41:29 +03:00
|
|
|
"net/http"
|
2019-05-11 06:07:02 +03:00
|
|
|
"net/textproto"
|
|
|
|
"net/url"
|
2019-05-20 19:59:20 +03:00
|
|
|
"path"
|
|
|
|
"path/filepath"
|
2019-05-11 06:07:02 +03:00
|
|
|
"regexp"
|
2019-04-01 05:41:29 +03:00
|
|
|
"strings"
|
|
|
|
|
2019-06-14 20:58:28 +03:00
|
|
|
"github.com/caddyserver/caddy"
|
|
|
|
"github.com/caddyserver/caddy/pkg/caddyscript"
|
2019-04-03 18:47:27 +03:00
|
|
|
"go.starlark.net/starlark"
|
|
|
|
)
|
|
|
|
|
|
|
|
type (
|
2019-05-22 22:13:39 +03:00
|
|
|
// MatchHost matches requests by the Host value.
|
|
|
|
MatchHost []string
|
|
|
|
|
|
|
|
// MatchPath matches requests by the URI's path.
|
|
|
|
MatchPath []string
|
|
|
|
|
|
|
|
// MatchPathRE matches requests by a regular expression on the URI's path.
|
|
|
|
MatchPathRE struct{ MatchRegexp }
|
|
|
|
|
|
|
|
// MatchMethod matches requests by the method.
|
|
|
|
MatchMethod []string
|
|
|
|
|
|
|
|
// MatchQuery matches requests by URI's query string.
|
|
|
|
MatchQuery url.Values
|
|
|
|
|
|
|
|
// MatchHeader matches requests by header fields.
|
|
|
|
MatchHeader http.Header
|
|
|
|
|
|
|
|
// MatchHeaderRE matches requests by a regular expression on header fields.
|
|
|
|
MatchHeaderRE map[string]*MatchRegexp
|
|
|
|
|
|
|
|
// MatchProtocol matches requests by protocol.
|
|
|
|
MatchProtocol string
|
|
|
|
|
2019-06-04 22:42:54 +03:00
|
|
|
// MatchRemoteIP matches requests by client IP (or CIDR range).
|
|
|
|
MatchRemoteIP struct {
|
|
|
|
Ranges []string `json:"ranges,omitempty"`
|
|
|
|
|
|
|
|
cidrs []*net.IPNet
|
|
|
|
}
|
|
|
|
|
|
|
|
// MatchNegate matches requests by negating its matchers' results.
|
|
|
|
MatchNegate struct {
|
|
|
|
matchersRaw map[string]json.RawMessage
|
|
|
|
|
|
|
|
matchers MatcherSet
|
|
|
|
}
|
|
|
|
|
2019-05-22 22:13:39 +03:00
|
|
|
// MatchStarlarkExpr matches requests by evaluating a Starlark expression.
|
2019-05-22 21:32:36 +03:00
|
|
|
MatchStarlarkExpr string
|
2019-05-22 22:13:39 +03:00
|
|
|
|
|
|
|
// MatchTable matches requests by values in the table.
|
|
|
|
MatchTable string // TODO: finish implementing
|
2019-04-01 05:41:29 +03:00
|
|
|
)
|
|
|
|
|
|
|
|
func init() {
|
2019-06-14 20:58:28 +03:00
|
|
|
caddy.RegisterModule(caddy.Module{
|
2019-04-01 05:41:29 +03:00
|
|
|
Name: "http.matchers.host",
|
2019-06-04 22:42:54 +03:00
|
|
|
New: func() interface{} { return new(MatchHost) },
|
2019-04-01 05:41:29 +03:00
|
|
|
})
|
2019-06-14 20:58:28 +03:00
|
|
|
caddy.RegisterModule(caddy.Module{
|
2019-04-01 05:41:29 +03:00
|
|
|
Name: "http.matchers.path",
|
2019-06-04 22:42:54 +03:00
|
|
|
New: func() interface{} { return new(MatchPath) },
|
2019-04-01 05:41:29 +03:00
|
|
|
})
|
2019-06-14 20:58:28 +03:00
|
|
|
caddy.RegisterModule(caddy.Module{
|
2019-05-11 06:07:02 +03:00
|
|
|
Name: "http.matchers.path_regexp",
|
2019-05-22 21:32:36 +03:00
|
|
|
New: func() interface{} { return new(MatchPathRE) },
|
2019-05-11 06:07:02 +03:00
|
|
|
})
|
2019-06-14 20:58:28 +03:00
|
|
|
caddy.RegisterModule(caddy.Module{
|
2019-04-01 05:41:29 +03:00
|
|
|
Name: "http.matchers.method",
|
2019-06-04 22:42:54 +03:00
|
|
|
New: func() interface{} { return new(MatchMethod) },
|
2019-04-01 05:41:29 +03:00
|
|
|
})
|
2019-06-14 20:58:28 +03:00
|
|
|
caddy.RegisterModule(caddy.Module{
|
2019-04-01 05:41:29 +03:00
|
|
|
Name: "http.matchers.query",
|
2019-06-04 22:42:54 +03:00
|
|
|
New: func() interface{} { return new(MatchQuery) },
|
2019-04-01 05:41:29 +03:00
|
|
|
})
|
2019-06-14 20:58:28 +03:00
|
|
|
caddy.RegisterModule(caddy.Module{
|
2019-04-01 05:41:29 +03:00
|
|
|
Name: "http.matchers.header",
|
2019-06-04 22:42:54 +03:00
|
|
|
New: func() interface{} { return new(MatchHeader) },
|
2019-04-01 05:41:29 +03:00
|
|
|
})
|
2019-06-14 20:58:28 +03:00
|
|
|
caddy.RegisterModule(caddy.Module{
|
2019-05-11 06:07:02 +03:00
|
|
|
Name: "http.matchers.header_regexp",
|
2019-06-04 22:42:54 +03:00
|
|
|
New: func() interface{} { return new(MatchHeaderRE) },
|
2019-05-11 06:07:02 +03:00
|
|
|
})
|
2019-06-14 20:58:28 +03:00
|
|
|
caddy.RegisterModule(caddy.Module{
|
2019-04-03 18:47:27 +03:00
|
|
|
Name: "http.matchers.protocol",
|
2019-05-22 21:32:36 +03:00
|
|
|
New: func() interface{} { return new(MatchProtocol) },
|
2019-04-03 18:47:27 +03:00
|
|
|
})
|
2019-06-14 20:58:28 +03:00
|
|
|
caddy.RegisterModule(caddy.Module{
|
2019-06-04 22:42:54 +03:00
|
|
|
Name: "http.matchers.remote_ip",
|
|
|
|
New: func() interface{} { return new(MatchRemoteIP) },
|
|
|
|
})
|
2019-06-14 20:58:28 +03:00
|
|
|
caddy.RegisterModule(caddy.Module{
|
2019-06-04 22:42:54 +03:00
|
|
|
Name: "http.matchers.not",
|
|
|
|
New: func() interface{} { return new(MatchNegate) },
|
|
|
|
})
|
2019-06-14 20:58:28 +03:00
|
|
|
caddy.RegisterModule(caddy.Module{
|
2019-05-20 19:59:20 +03:00
|
|
|
Name: "http.matchers.starlark_expr",
|
2019-05-22 21:32:36 +03:00
|
|
|
New: func() interface{} { return new(MatchStarlarkExpr) },
|
2019-04-03 18:47:27 +03:00
|
|
|
})
|
2019-04-01 05:41:29 +03:00
|
|
|
}
|
|
|
|
|
2019-05-22 22:13:39 +03:00
|
|
|
// Match returns true if r matches m.
|
2019-05-22 21:32:36 +03:00
|
|
|
func (m MatchHost) Match(r *http.Request) bool {
|
2019-06-21 05:24:46 +03:00
|
|
|
reqHost, _, err := net.SplitHostPort(r.Host)
|
|
|
|
if err != nil {
|
|
|
|
// OK; probably didn't have a port
|
|
|
|
reqHost = r.Host
|
|
|
|
}
|
|
|
|
|
2019-05-11 06:07:02 +03:00
|
|
|
outer:
|
2019-04-01 05:41:29 +03:00
|
|
|
for _, host := range m {
|
2019-05-11 06:07:02 +03:00
|
|
|
if strings.Contains(host, "*") {
|
|
|
|
patternParts := strings.Split(host, ".")
|
2019-06-21 05:24:46 +03:00
|
|
|
incomingParts := strings.Split(reqHost, ".")
|
2019-05-11 06:07:02 +03:00
|
|
|
if len(patternParts) != len(incomingParts) {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
for i := range patternParts {
|
|
|
|
if patternParts[i] == "*" {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if !strings.EqualFold(patternParts[i], incomingParts[i]) {
|
|
|
|
continue outer
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
2019-06-21 05:24:46 +03:00
|
|
|
} else if strings.EqualFold(reqHost, host) {
|
2019-04-01 05:41:29 +03:00
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
2019-06-21 05:24:46 +03:00
|
|
|
|
2019-04-01 05:41:29 +03:00
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2019-05-22 22:13:39 +03:00
|
|
|
// Match returns true if r matches m.
|
2019-05-22 21:32:36 +03:00
|
|
|
func (m MatchPath) Match(r *http.Request) bool {
|
2019-05-20 19:59:20 +03:00
|
|
|
for _, matchPath := range m {
|
|
|
|
compare := r.URL.Path
|
|
|
|
if strings.HasPrefix(matchPath, "*") {
|
|
|
|
compare = path.Base(compare)
|
|
|
|
}
|
|
|
|
// can ignore error here because we can't handle it anyway
|
|
|
|
matches, _ := filepath.Match(matchPath, compare)
|
|
|
|
if matches {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
if strings.HasPrefix(r.URL.Path, matchPath) {
|
2019-04-01 05:41:29 +03:00
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2019-05-22 22:13:39 +03:00
|
|
|
// Match returns true if r matches m.
|
2019-05-22 21:32:36 +03:00
|
|
|
func (m MatchPathRE) Match(r *http.Request) bool {
|
2019-06-14 20:58:28 +03:00
|
|
|
repl := r.Context().Value(caddy.ReplacerCtxKey).(caddy.Replacer)
|
2019-05-22 22:13:39 +03:00
|
|
|
return m.MatchRegexp.Match(r.URL.Path, repl, "path_regexp")
|
2019-05-11 06:07:02 +03:00
|
|
|
}
|
|
|
|
|
2019-05-22 22:13:39 +03:00
|
|
|
// Match returns true if r matches m.
|
2019-05-22 21:32:36 +03:00
|
|
|
func (m MatchMethod) Match(r *http.Request) bool {
|
2019-04-01 05:41:29 +03:00
|
|
|
for _, method := range m {
|
|
|
|
if r.Method == method {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2019-05-22 22:13:39 +03:00
|
|
|
// Match returns true if r matches m.
|
2019-05-22 21:32:36 +03:00
|
|
|
func (m MatchQuery) Match(r *http.Request) bool {
|
2019-04-01 05:41:29 +03:00
|
|
|
for param, vals := range m {
|
|
|
|
paramVal := r.URL.Query().Get(param)
|
|
|
|
for _, v := range vals {
|
|
|
|
if paramVal == v {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2019-05-22 22:13:39 +03:00
|
|
|
// Match returns true if r matches m.
|
2019-05-22 21:32:36 +03:00
|
|
|
func (m MatchHeader) Match(r *http.Request) bool {
|
2019-05-11 06:07:02 +03:00
|
|
|
for field, allowedFieldVals := range m {
|
|
|
|
var match bool
|
|
|
|
actualFieldVals := r.Header[textproto.CanonicalMIMEHeaderKey(field)]
|
|
|
|
fieldVals:
|
|
|
|
for _, actualFieldVal := range actualFieldVals {
|
|
|
|
for _, allowedFieldVal := range allowedFieldVals {
|
|
|
|
if actualFieldVal == allowedFieldVal {
|
|
|
|
match = true
|
|
|
|
break fieldVals
|
2019-04-01 05:41:29 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2019-05-11 06:07:02 +03:00
|
|
|
if !match {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2019-05-22 22:13:39 +03:00
|
|
|
// Match returns true if r matches m.
|
2019-05-22 21:32:36 +03:00
|
|
|
func (m MatchHeaderRE) Match(r *http.Request) bool {
|
2019-05-11 06:07:02 +03:00
|
|
|
for field, rm := range m {
|
2019-06-14 20:58:28 +03:00
|
|
|
repl := r.Context().Value(caddy.ReplacerCtxKey).(caddy.Replacer)
|
2019-05-22 22:13:39 +03:00
|
|
|
match := rm.Match(r.Header.Get(field), repl, "header_regexp")
|
2019-05-11 06:07:02 +03:00
|
|
|
if !match {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2019-05-22 22:13:39 +03:00
|
|
|
// Provision compiles m's regular expressions.
|
2019-05-22 21:32:36 +03:00
|
|
|
func (m MatchHeaderRE) Provision() error {
|
2019-05-11 06:07:02 +03:00
|
|
|
for _, rm := range m {
|
|
|
|
err := rm.Provision()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-05-22 22:13:39 +03:00
|
|
|
// Validate validates m's regular expressions.
|
2019-05-22 21:32:36 +03:00
|
|
|
func (m MatchHeaderRE) Validate() error {
|
2019-05-11 06:07:02 +03:00
|
|
|
for _, rm := range m {
|
|
|
|
err := rm.Validate()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-05-22 22:13:39 +03:00
|
|
|
// Match returns true if r matches m.
|
2019-05-22 21:32:36 +03:00
|
|
|
func (m MatchProtocol) Match(r *http.Request) bool {
|
2019-05-11 06:07:02 +03:00
|
|
|
switch string(m) {
|
|
|
|
case "grpc":
|
|
|
|
return r.Header.Get("content-type") == "application/grpc"
|
|
|
|
case "https":
|
|
|
|
return r.TLS != nil
|
|
|
|
case "http":
|
|
|
|
return r.TLS == nil
|
2019-04-01 05:41:29 +03:00
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2019-06-04 22:42:54 +03:00
|
|
|
// UnmarshalJSON unmarshals data into m's unexported map field.
|
|
|
|
// This is done because we cannot embed the map directly into
|
|
|
|
// the struct, but we need a struct because we need another
|
|
|
|
// field just for the provisioned modules.
|
|
|
|
func (m *MatchNegate) UnmarshalJSON(data []byte) error {
|
|
|
|
return json.Unmarshal(data, &m.matchersRaw)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Provision loads the matcher modules to be negated.
|
2019-06-14 20:58:28 +03:00
|
|
|
func (m *MatchNegate) Provision(ctx caddy.Context) error {
|
2019-06-04 22:42:54 +03:00
|
|
|
for modName, rawMsg := range m.matchersRaw {
|
|
|
|
val, err := ctx.LoadModule("http.matchers."+modName, rawMsg)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("loading matcher module '%s': %v", modName, err)
|
|
|
|
}
|
|
|
|
m.matchers = append(m.matchers, val.(RequestMatcher))
|
|
|
|
}
|
|
|
|
m.matchersRaw = nil // allow GC to deallocate - TODO: Does this help?
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Match returns true if r matches m. Since this matcher negates the
|
|
|
|
// embedded matchers, false is returned if any of its matchers match.
|
|
|
|
func (m MatchNegate) Match(r *http.Request) bool {
|
|
|
|
return !m.matchers.Match(r)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Provision parses m's IP ranges, either from IP or CIDR expressions.
|
2019-06-14 20:58:28 +03:00
|
|
|
func (m *MatchRemoteIP) Provision(ctx caddy.Context) error {
|
2019-06-04 22:42:54 +03:00
|
|
|
for _, str := range m.Ranges {
|
|
|
|
if strings.Contains(str, "/") {
|
|
|
|
_, ipNet, err := net.ParseCIDR(str)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("parsing CIDR expression: %v", err)
|
|
|
|
}
|
|
|
|
m.cidrs = append(m.cidrs, ipNet)
|
|
|
|
} else {
|
|
|
|
ip := net.ParseIP(str)
|
|
|
|
if ip == nil {
|
|
|
|
return fmt.Errorf("invalid IP address: %s", str)
|
|
|
|
}
|
|
|
|
mask := len(ip) * 8
|
|
|
|
m.cidrs = append(m.cidrs, &net.IPNet{
|
|
|
|
IP: ip,
|
|
|
|
Mask: net.CIDRMask(mask, mask),
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m MatchRemoteIP) getClientIP(r *http.Request) (net.IP, error) {
|
|
|
|
var remote string
|
|
|
|
if fwdFor := r.Header.Get("X-Forwarded-For"); fwdFor != "" {
|
|
|
|
remote = strings.TrimSpace(strings.Split(fwdFor, ",")[0])
|
|
|
|
}
|
|
|
|
if remote == "" {
|
|
|
|
remote = r.RemoteAddr
|
|
|
|
}
|
|
|
|
|
|
|
|
ipStr, _, err := net.SplitHostPort(remote)
|
|
|
|
if err != nil {
|
|
|
|
ipStr = remote // OK; probably didn't have a port
|
|
|
|
}
|
|
|
|
|
|
|
|
ip := net.ParseIP(ipStr)
|
|
|
|
if ip == nil {
|
|
|
|
return nil, fmt.Errorf("invalid client IP address: %s", ipStr)
|
|
|
|
}
|
|
|
|
|
|
|
|
return ip, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Match returns true if r matches m.
|
|
|
|
func (m MatchRemoteIP) Match(r *http.Request) bool {
|
|
|
|
clientIP, err := m.getClientIP(r)
|
|
|
|
if err != nil {
|
|
|
|
log.Printf("[ERROR] remote_ip matcher: %v", err)
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
for _, ipRange := range m.cidrs {
|
|
|
|
if ipRange.Contains(clientIP) {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2019-05-22 22:13:39 +03:00
|
|
|
// Match returns true if r matches m.
|
2019-05-22 21:32:36 +03:00
|
|
|
func (m MatchStarlarkExpr) Match(r *http.Request) bool {
|
2019-05-11 06:07:02 +03:00
|
|
|
input := string(m)
|
|
|
|
thread := new(starlark.Thread)
|
|
|
|
env := caddyscript.MatcherEnv(r)
|
|
|
|
val, err := starlark.Eval(thread, "", input, env)
|
|
|
|
if err != nil {
|
|
|
|
// TODO: Can we detect this in Provision or Validate instead?
|
|
|
|
log.Printf("caddyscript for matcher is invalid: attempting to evaluate expression `%v` error `%v`", input, err)
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
return val.String() == "True"
|
|
|
|
}
|
|
|
|
|
2019-05-22 22:13:39 +03:00
|
|
|
// MatchRegexp is an embeddable type for matching
|
|
|
|
// using regular expressions.
|
|
|
|
type MatchRegexp struct {
|
2019-05-11 06:07:02 +03:00
|
|
|
Name string `json:"name"`
|
|
|
|
Pattern string `json:"pattern"`
|
|
|
|
compiled *regexp.Regexp
|
|
|
|
}
|
|
|
|
|
2019-05-22 22:13:39 +03:00
|
|
|
// Provision compiles the regular expression.
|
|
|
|
func (mre *MatchRegexp) Provision() error {
|
2019-05-11 06:07:02 +03:00
|
|
|
re, err := regexp.Compile(mre.Pattern)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("compiling matcher regexp %s: %v", mre.Pattern, err)
|
|
|
|
}
|
|
|
|
mre.compiled = re
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-05-22 22:13:39 +03:00
|
|
|
// Validate ensures mre is set up correctly.
|
|
|
|
func (mre *MatchRegexp) Validate() error {
|
2019-05-11 06:07:02 +03:00
|
|
|
if mre.Name != "" && !wordRE.MatchString(mre.Name) {
|
|
|
|
return fmt.Errorf("invalid regexp name (must contain only word characters): %s", mre.Name)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-05-22 22:13:39 +03:00
|
|
|
// Match returns true if input matches the compiled regular
|
|
|
|
// expression in mre. It sets values on the replacer repl
|
|
|
|
// associated with capture groups, using the given scope
|
|
|
|
// (namespace). Capture groups stored to repl will take on
|
|
|
|
// the name "http.matchers.<scope>.<mre.Name>.<N>" where
|
|
|
|
// <N> is the name or number of the capture group.
|
2019-06-14 20:58:28 +03:00
|
|
|
func (mre *MatchRegexp) Match(input string, repl caddy.Replacer, scope string) bool {
|
2019-05-11 06:07:02 +03:00
|
|
|
matches := mre.compiled.FindStringSubmatch(input)
|
|
|
|
if matches == nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
// save all capture groups, first by index
|
|
|
|
for i, match := range matches {
|
2019-05-21 22:03:52 +03:00
|
|
|
key := fmt.Sprintf("http.matchers.%s.%s.%d", scope, mre.Name, i)
|
2019-05-20 19:59:20 +03:00
|
|
|
repl.Set(key, match)
|
2019-05-11 06:07:02 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// then by name
|
|
|
|
for i, name := range mre.compiled.SubexpNames() {
|
|
|
|
if i != 0 && name != "" {
|
2019-05-21 22:03:52 +03:00
|
|
|
key := fmt.Sprintf("http.matchers.%s.%s.%s", scope, mre.Name, name)
|
2019-05-20 19:59:20 +03:00
|
|
|
repl.Set(key, matches[i])
|
2019-05-11 06:07:02 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2019-05-29 03:53:08 +03:00
|
|
|
// ResponseMatcher is a type which can determine if a given response
|
|
|
|
// status code and its headers match some criteria.
|
|
|
|
type ResponseMatcher struct {
|
|
|
|
// If set, one of these status codes would be required.
|
|
|
|
// A one-digit status can be used to represent all codes
|
|
|
|
// in that class (e.g. 3 for all 3xx codes).
|
|
|
|
StatusCode []int `json:"status_code,omitempty"`
|
|
|
|
|
|
|
|
// If set, each header specified must be one of the specified values.
|
|
|
|
Headers http.Header `json:"headers,omitempty"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// Match returns true if the given statusCode and hdr match rm.
|
|
|
|
func (rm ResponseMatcher) Match(statusCode int, hdr http.Header) bool {
|
|
|
|
if !rm.matchStatusCode(statusCode) {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
return rm.matchHeaders(hdr)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (rm ResponseMatcher) matchStatusCode(statusCode int) bool {
|
|
|
|
if rm.StatusCode == nil {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
for _, code := range rm.StatusCode {
|
|
|
|
if statusCode == code {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
if code < 100 && statusCode >= code*100 && statusCode < (code+1)*100 {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
func (rm ResponseMatcher) matchHeaders(hdr http.Header) bool {
|
|
|
|
for field, allowedFieldVals := range rm.Headers {
|
|
|
|
var match bool
|
|
|
|
actualFieldVals := hdr[textproto.CanonicalMIMEHeaderKey(field)]
|
|
|
|
fieldVals:
|
|
|
|
for _, actualFieldVal := range actualFieldVals {
|
|
|
|
for _, allowedFieldVal := range allowedFieldVals {
|
|
|
|
if actualFieldVal == allowedFieldVal {
|
|
|
|
match = true
|
|
|
|
break fieldVals
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if !match {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2019-05-11 06:07:02 +03:00
|
|
|
var wordRE = regexp.MustCompile(`\w+`)
|
|
|
|
|
2019-04-12 05:42:55 +03:00
|
|
|
// Interface guards
|
2019-04-01 05:41:29 +03:00
|
|
|
var (
|
2019-06-21 05:24:46 +03:00
|
|
|
_ RequestMatcher = (*MatchHost)(nil)
|
|
|
|
_ RequestMatcher = (*MatchPath)(nil)
|
|
|
|
_ RequestMatcher = (*MatchPathRE)(nil)
|
|
|
|
_ RequestMatcher = (*MatchMethod)(nil)
|
|
|
|
_ RequestMatcher = (*MatchQuery)(nil)
|
|
|
|
_ RequestMatcher = (*MatchHeader)(nil)
|
|
|
|
_ RequestMatcher = (*MatchHeaderRE)(nil)
|
|
|
|
_ RequestMatcher = (*MatchProtocol)(nil)
|
|
|
|
_ RequestMatcher = (*MatchRemoteIP)(nil)
|
2019-06-14 20:58:28 +03:00
|
|
|
_ caddy.Provisioner = (*MatchRemoteIP)(nil)
|
2019-06-21 05:24:46 +03:00
|
|
|
_ RequestMatcher = (*MatchNegate)(nil)
|
2019-06-14 20:58:28 +03:00
|
|
|
_ caddy.Provisioner = (*MatchNegate)(nil)
|
2019-06-21 05:24:46 +03:00
|
|
|
_ RequestMatcher = (*MatchStarlarkExpr)(nil)
|
2019-04-01 05:41:29 +03:00
|
|
|
)
|