2019-05-20 19:59:20 +03:00
|
|
|
package caddyhttp
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"fmt"
|
|
|
|
"log"
|
2019-05-22 23:14:26 +03:00
|
|
|
"net"
|
2019-05-20 19:59:20 +03:00
|
|
|
"net/http"
|
2019-05-21 06:21:33 +03:00
|
|
|
"strconv"
|
2019-05-20 19:59:20 +03:00
|
|
|
|
2019-06-14 20:58:28 +03:00
|
|
|
"github.com/caddyserver/caddy"
|
|
|
|
"github.com/caddyserver/caddy/modules/caddytls"
|
2019-05-20 19:59:20 +03:00
|
|
|
)
|
|
|
|
|
|
|
|
// Server is an HTTP server.
|
|
|
|
type Server struct {
|
2019-06-26 19:49:32 +03:00
|
|
|
Listen []string `json:"listen,omitempty"`
|
|
|
|
ReadTimeout caddy.Duration `json:"read_timeout,omitempty"`
|
|
|
|
ReadHeaderTimeout caddy.Duration `json:"read_header_timeout,omitempty"`
|
|
|
|
WriteTimeout caddy.Duration `json:"write_timeout,omitempty"`
|
|
|
|
IdleTimeout caddy.Duration `json:"idle_timeout,omitempty"`
|
|
|
|
MaxHeaderBytes int `json:"max_header_bytes,omitempty"`
|
|
|
|
Routes RouteList `json:"routes,omitempty"`
|
|
|
|
Errors *HTTPErrorConfig `json:"errors,omitempty"`
|
|
|
|
TLSConnPolicies caddytls.ConnectionPolicies `json:"tls_connection_policies,omitempty"`
|
|
|
|
AutoHTTPS *AutoHTTPSConfig `json:"automatic_https,omitempty"`
|
|
|
|
MaxRehandles int `json:"max_rehandles,omitempty"`
|
2019-05-20 19:59:20 +03:00
|
|
|
|
|
|
|
tlsApp *caddytls.TLS
|
|
|
|
}
|
|
|
|
|
|
|
|
// ServeHTTP is the entry point for all HTTP requests.
|
|
|
|
func (s *Server) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
|
|
|
if s.tlsApp.HandleHTTPChallenge(w, r) {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-05-21 08:48:43 +03:00
|
|
|
// set up the context for the request
|
2019-06-14 20:58:28 +03:00
|
|
|
repl := caddy.NewReplacer()
|
|
|
|
ctx := context.WithValue(r.Context(), caddy.ReplacerCtxKey, repl)
|
2019-06-18 20:13:12 +03:00
|
|
|
ctx = context.WithValue(ctx, ServerCtxKey, s)
|
2019-05-20 19:59:20 +03:00
|
|
|
ctx = context.WithValue(ctx, TableCtxKey, make(map[string]interface{})) // TODO: Implement this
|
|
|
|
r = r.WithContext(ctx)
|
|
|
|
|
2019-05-21 08:48:43 +03:00
|
|
|
// once the pointer to the request won't change
|
|
|
|
// anymore, finish setting up the replacer
|
|
|
|
addHTTPVarsToReplacer(repl, r, w)
|
|
|
|
|
2019-05-20 19:59:20 +03:00
|
|
|
// build and execute the main handler chain
|
2019-05-21 08:48:43 +03:00
|
|
|
stack, w := s.Routes.BuildCompositeRoute(w, r)
|
2019-05-20 19:59:20 +03:00
|
|
|
err := s.executeCompositeRoute(w, r, stack)
|
|
|
|
if err != nil {
|
2019-05-21 06:21:33 +03:00
|
|
|
// add the raw error value to the request context
|
|
|
|
// so it can be accessed by error handlers
|
2019-05-20 19:59:20 +03:00
|
|
|
c := context.WithValue(r.Context(), ErrorCtxKey, err)
|
|
|
|
r = r.WithContext(c)
|
2019-05-21 06:21:33 +03:00
|
|
|
|
|
|
|
// add error values to the replacer
|
|
|
|
repl.Set("http.error", err.Error())
|
|
|
|
if handlerErr, ok := err.(HandlerError); ok {
|
|
|
|
repl.Set("http.error.status_code", strconv.Itoa(handlerErr.StatusCode))
|
|
|
|
repl.Set("http.error.status_text", http.StatusText(handlerErr.StatusCode))
|
|
|
|
repl.Set("http.error.message", handlerErr.Message)
|
|
|
|
repl.Set("http.error.trace", handlerErr.Trace)
|
|
|
|
repl.Set("http.error.id", handlerErr.ID)
|
|
|
|
}
|
2019-05-20 19:59:20 +03:00
|
|
|
|
2019-05-23 23:42:14 +03:00
|
|
|
if s.Errors != nil && len(s.Errors.Routes) > 0 {
|
2019-05-21 08:48:43 +03:00
|
|
|
errStack, w := s.Errors.Routes.BuildCompositeRoute(w, r)
|
2019-05-20 19:59:20 +03:00
|
|
|
err := s.executeCompositeRoute(w, r, errStack)
|
|
|
|
if err != nil {
|
|
|
|
// TODO: what should we do if the error handler has an error?
|
2019-06-21 23:36:26 +03:00
|
|
|
log.Printf("[ERROR] [%s %s] handling error: %v", r.Method, r.RequestURI, err)
|
2019-05-20 19:59:20 +03:00
|
|
|
}
|
2019-05-23 23:42:14 +03:00
|
|
|
} else {
|
|
|
|
// TODO: polish the default error handling
|
2019-06-21 23:36:26 +03:00
|
|
|
log.Printf("[ERROR] [%s %s] %v", r.Method, r.RequestURI, err)
|
2019-05-23 23:42:14 +03:00
|
|
|
if handlerErr, ok := err.(HandlerError); ok {
|
|
|
|
w.WriteHeader(handlerErr.StatusCode)
|
2019-05-29 03:52:21 +03:00
|
|
|
} else {
|
|
|
|
w.WriteHeader(http.StatusInternalServerError)
|
2019-05-23 23:42:14 +03:00
|
|
|
}
|
2019-05-20 19:59:20 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// executeCompositeRoute executes stack with w and r. This function handles
|
|
|
|
// the special ErrRehandle error value, which reprocesses requests through
|
|
|
|
// the stack again. Any error value returned from this function would be an
|
|
|
|
// actual error that needs to be handled.
|
|
|
|
func (s *Server) executeCompositeRoute(w http.ResponseWriter, r *http.Request, stack Handler) error {
|
|
|
|
var err error
|
|
|
|
for i := -1; i <= s.MaxRehandles; i++ {
|
|
|
|
// we started the counter at -1 because we
|
|
|
|
// always want to run this at least once
|
|
|
|
err = stack.ServeHTTP(w, r)
|
|
|
|
if err != ErrRehandle {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
if i >= s.MaxRehandles-1 {
|
|
|
|
return fmt.Errorf("too many rehandles")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2019-05-22 23:14:26 +03:00
|
|
|
func (s *Server) listenersUseAnyPortOtherThan(otherPort int) bool {
|
|
|
|
for _, lnAddr := range s.Listen {
|
|
|
|
_, addrs, err := parseListenAddr(lnAddr)
|
|
|
|
if err == nil {
|
|
|
|
for _, a := range addrs {
|
|
|
|
_, port, err := net.SplitHostPort(a)
|
|
|
|
if err == nil && port != strconv.Itoa(otherPort) {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2019-06-26 19:49:32 +03:00
|
|
|
// AutoHTTPSConfig is used to disable automatic HTTPS
|
|
|
|
// or certain aspects of it for a specific server.
|
|
|
|
type AutoHTTPSConfig struct {
|
|
|
|
// If true, automatic HTTPS will be entirely disabled.
|
|
|
|
Disabled bool `json:"disable,omitempty"`
|
|
|
|
|
|
|
|
// If true, only automatic HTTP->HTTPS redirects will
|
|
|
|
// be disabled.
|
|
|
|
DisableRedir bool `json:"disable_redirects,omitempty"`
|
|
|
|
|
|
|
|
// Hosts/domain names listed here will not be included
|
|
|
|
// in automatic HTTPS (they will not have certificates
|
|
|
|
// loaded nor redirects applied).
|
|
|
|
Skip []string `json:"skip,omitempty"`
|
2019-06-26 19:57:18 +03:00
|
|
|
|
|
|
|
// Hosts/domain names listed here will still be enabled
|
|
|
|
// for automatic HTTPS (unless in the Skip list), except
|
|
|
|
// that certificates will not be provisioned and managed
|
|
|
|
// for these names.
|
|
|
|
SkipCerts []string `json:"skip_certificates,omitempty"`
|
2019-06-26 19:49:32 +03:00
|
|
|
}
|
|
|
|
|
2019-06-26 19:57:18 +03:00
|
|
|
// Skipped returns true if name is in skipSlice, which
|
|
|
|
// should be one of the Skip* fields on ahc.
|
|
|
|
func (ahc AutoHTTPSConfig) Skipped(name string, skipSlice []string) bool {
|
|
|
|
for _, n := range skipSlice {
|
2019-06-26 19:49:32 +03:00
|
|
|
if name == n {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
// HTTPErrorConfig determines how to handle errors
|
|
|
|
// from the HTTP handlers.
|
|
|
|
type HTTPErrorConfig struct {
|
2019-05-22 21:32:36 +03:00
|
|
|
Routes RouteList `json:"routes,omitempty"`
|
2019-05-20 19:59:20 +03:00
|
|
|
}
|
|
|
|
|
2019-06-26 19:49:32 +03:00
|
|
|
// Context keys for HTTP request context values.
|
|
|
|
const (
|
|
|
|
// For referencing the server instance
|
|
|
|
ServerCtxKey caddy.CtxKey = "server"
|
2019-06-18 20:13:12 +03:00
|
|
|
|
2019-06-26 19:49:32 +03:00
|
|
|
// For the request's variable table (TODO: implement this)
|
|
|
|
TableCtxKey caddy.CtxKey = "table"
|
|
|
|
)
|