2019-07-01 01:07:58 +03:00
|
|
|
// Copyright 2015 Matthew Holt and The Caddy Authors
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
2019-05-04 19:49:50 +03:00
|
|
|
package reverseproxy
|
|
|
|
|
|
|
|
import (
|
2019-11-16 03:15:33 +03:00
|
|
|
"bytes"
|
2019-05-04 19:49:50 +03:00
|
|
|
"context"
|
2019-09-03 07:01:02 +03:00
|
|
|
"encoding/json"
|
2019-05-04 19:49:50 +03:00
|
|
|
"fmt"
|
2019-11-16 03:15:33 +03:00
|
|
|
"io"
|
|
|
|
"io/ioutil"
|
2019-05-04 19:49:50 +03:00
|
|
|
"net"
|
|
|
|
"net/http"
|
2019-09-03 21:10:11 +03:00
|
|
|
"regexp"
|
2019-09-14 22:25:26 +03:00
|
|
|
"strconv"
|
2019-05-04 19:49:50 +03:00
|
|
|
"strings"
|
2019-11-16 03:15:33 +03:00
|
|
|
"sync"
|
2019-05-04 19:49:50 +03:00
|
|
|
"time"
|
|
|
|
|
2019-09-03 07:01:02 +03:00
|
|
|
"github.com/caddyserver/caddy/v2"
|
|
|
|
"github.com/caddyserver/caddy/v2/modules/caddyhttp"
|
2019-09-14 22:25:26 +03:00
|
|
|
"github.com/caddyserver/caddy/v2/modules/caddyhttp/headers"
|
2019-10-30 01:02:40 +03:00
|
|
|
"go.uber.org/zap"
|
2019-05-04 19:49:50 +03:00
|
|
|
"golang.org/x/net/http/httpguts"
|
|
|
|
)
|
|
|
|
|
2019-09-03 07:01:02 +03:00
|
|
|
func init() {
|
|
|
|
caddy.RegisterModule(Handler{})
|
2019-05-04 19:49:50 +03:00
|
|
|
}
|
|
|
|
|
2019-09-04 01:56:09 +03:00
|
|
|
// Handler implements a highly configurable and production-ready reverse proxy.
|
2019-12-29 23:16:34 +03:00
|
|
|
//
|
2019-12-23 22:45:35 +03:00
|
|
|
// Upon proxying, this module sets the following placeholders (which can be used
|
|
|
|
// both within and after this handler):
|
|
|
|
//
|
2019-12-29 23:16:34 +03:00
|
|
|
// Placeholder | Description
|
|
|
|
// ------------|-------------
|
|
|
|
// `{http.reverse_proxy.upstream.address}` | The full address to the upstream as given in the config
|
|
|
|
// `{http.reverse_proxy.upstream.hostport}` | The host:port of the upstream
|
|
|
|
// `{http.reverse_proxy.upstream.host}` | The host of the upstream
|
|
|
|
// `{http.reverse_proxy.upstream.port}` | The port of the upstream
|
|
|
|
// `{http.reverse_proxy.upstream.requests}` | The approximate current number of requests to the upstream
|
|
|
|
// `{http.reverse_proxy.upstream.max_requests}` | The maximum approximate number of requests allowed to the upstream
|
|
|
|
// `{http.reverse_proxy.upstream.fails}` | The number of recent failed requests to the upstream
|
2019-09-03 07:01:02 +03:00
|
|
|
type Handler struct {
|
2019-12-23 22:45:35 +03:00
|
|
|
// Configures the method of transport for the proxy. A transport
|
|
|
|
// is what performs the actual "round trip" to the backend.
|
|
|
|
// The default transport is plaintext HTTP.
|
|
|
|
TransportRaw json.RawMessage `json:"transport,omitempty" caddy:"namespace=http.reverse_proxy.transport inline_key=protocol"`
|
|
|
|
|
|
|
|
// A circuit breaker may be used to relieve pressure on a backend
|
|
|
|
// that is beginning to exhibit symptoms of stress or latency.
|
|
|
|
// By default, there is no circuit breaker.
|
|
|
|
CBRaw json.RawMessage `json:"circuit_breaker,omitempty" caddy:"namespace=http.reverse_proxy.circuit_breakers inline_key=type"`
|
|
|
|
|
|
|
|
// Load balancing distributes load/requests between backends.
|
|
|
|
LoadBalancing *LoadBalancing `json:"load_balancing,omitempty"`
|
|
|
|
|
|
|
|
// Health checks update the status of backends, whether they are
|
|
|
|
// up or down. Down backends will not be proxied to.
|
|
|
|
HealthChecks *HealthChecks `json:"health_checks,omitempty"`
|
|
|
|
|
|
|
|
// Upstreams is the list of backends to proxy to.
|
|
|
|
Upstreams UpstreamPool `json:"upstreams,omitempty"`
|
|
|
|
|
|
|
|
// TODO: figure out good defaults and write docs for this
|
|
|
|
// (see https://github.com/caddyserver/caddy/issues/1460)
|
|
|
|
FlushInterval caddy.Duration `json:"flush_interval,omitempty"`
|
|
|
|
|
|
|
|
// Headers manipulates headers between Caddy and the backend.
|
|
|
|
Headers *headers.Handler `json:"headers,omitempty"`
|
|
|
|
|
|
|
|
// If true, the entire request body will be read and buffered
|
|
|
|
// in memory before being proxied to the backend. This should
|
|
|
|
// be avoided if at all possible for performance reasons.
|
|
|
|
BufferRequests bool `json:"buffer_requests,omitempty"`
|
2019-09-03 07:01:02 +03:00
|
|
|
|
|
|
|
Transport http.RoundTripper `json:"-"`
|
2019-09-04 04:06:54 +03:00
|
|
|
CB CircuitBreaker `json:"-"`
|
2019-10-30 01:02:40 +03:00
|
|
|
|
|
|
|
logger *zap.Logger
|
2019-09-03 07:01:02 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// CaddyModule returns the Caddy module information.
|
|
|
|
func (Handler) CaddyModule() caddy.ModuleInfo {
|
|
|
|
return caddy.ModuleInfo{
|
2019-12-10 23:36:46 +03:00
|
|
|
ID: "http.handlers.reverse_proxy",
|
|
|
|
New: func() caddy.Module { return new(Handler) },
|
2019-05-04 19:49:50 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-09-04 01:56:09 +03:00
|
|
|
// Provision ensures that h is set up properly before use.
|
2019-09-03 07:01:02 +03:00
|
|
|
func (h *Handler) Provision(ctx caddy.Context) error {
|
2019-10-30 01:02:40 +03:00
|
|
|
h.logger = ctx.Logger(h)
|
|
|
|
|
2019-09-04 04:06:54 +03:00
|
|
|
// start by loading modules
|
2019-09-03 07:01:02 +03:00
|
|
|
if h.TransportRaw != nil {
|
2019-12-10 23:36:46 +03:00
|
|
|
mod, err := ctx.LoadModule(h, "TransportRaw")
|
2019-09-03 07:01:02 +03:00
|
|
|
if err != nil {
|
2019-12-10 23:36:46 +03:00
|
|
|
return fmt.Errorf("loading transport: %v", err)
|
2019-05-04 19:49:50 +03:00
|
|
|
}
|
2019-12-10 23:36:46 +03:00
|
|
|
h.Transport = mod.(http.RoundTripper)
|
2019-09-03 07:01:02 +03:00
|
|
|
}
|
|
|
|
if h.LoadBalancing != nil && h.LoadBalancing.SelectionPolicyRaw != nil {
|
2019-12-10 23:36:46 +03:00
|
|
|
mod, err := ctx.LoadModule(h.LoadBalancing, "SelectionPolicyRaw")
|
2019-09-03 07:01:02 +03:00
|
|
|
if err != nil {
|
2019-12-10 23:36:46 +03:00
|
|
|
return fmt.Errorf("loading load balancing selection policy: %s", err)
|
2019-05-04 19:49:50 +03:00
|
|
|
}
|
2019-12-10 23:36:46 +03:00
|
|
|
h.LoadBalancing.SelectionPolicy = mod.(Selector)
|
2019-05-04 19:49:50 +03:00
|
|
|
}
|
2019-09-04 04:06:54 +03:00
|
|
|
if h.CBRaw != nil {
|
2019-12-10 23:36:46 +03:00
|
|
|
mod, err := ctx.LoadModule(h, "CBRaw")
|
2019-09-04 04:06:54 +03:00
|
|
|
if err != nil {
|
2019-12-10 23:36:46 +03:00
|
|
|
return fmt.Errorf("loading circuit breaker: %s", err)
|
2019-09-04 04:06:54 +03:00
|
|
|
}
|
2019-12-10 23:36:46 +03:00
|
|
|
h.CB = mod.(CircuitBreaker)
|
2019-09-04 04:06:54 +03:00
|
|
|
}
|
2019-05-04 19:49:50 +03:00
|
|
|
|
2019-10-11 23:25:39 +03:00
|
|
|
// set up transport
|
2019-09-03 07:01:02 +03:00
|
|
|
if h.Transport == nil {
|
2019-09-05 22:14:39 +03:00
|
|
|
t := &HTTPTransport{
|
|
|
|
KeepAlive: &KeepAlive{
|
2019-10-12 08:57:11 +03:00
|
|
|
ProbeInterval: caddy.Duration(30 * time.Second),
|
|
|
|
IdleConnTimeout: caddy.Duration(2 * time.Minute),
|
|
|
|
MaxIdleConnsPerHost: 32,
|
2019-09-05 22:14:39 +03:00
|
|
|
},
|
|
|
|
DialTimeout: caddy.Duration(10 * time.Second),
|
|
|
|
}
|
|
|
|
err := t.Provision(ctx)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("provisioning default transport: %v", err)
|
|
|
|
}
|
|
|
|
h.Transport = t
|
2019-05-04 19:49:50 +03:00
|
|
|
}
|
|
|
|
|
2019-10-11 23:25:39 +03:00
|
|
|
// set up load balancing
|
2019-09-03 07:01:02 +03:00
|
|
|
if h.LoadBalancing == nil {
|
|
|
|
h.LoadBalancing = new(LoadBalancing)
|
|
|
|
}
|
|
|
|
if h.LoadBalancing.SelectionPolicy == nil {
|
|
|
|
h.LoadBalancing.SelectionPolicy = RandomSelection{}
|
|
|
|
}
|
|
|
|
if h.LoadBalancing.TryDuration > 0 && h.LoadBalancing.TryInterval == 0 {
|
|
|
|
// a non-zero try_duration with a zero try_interval
|
|
|
|
// will always spin the CPU for try_duration if the
|
2019-09-03 21:10:11 +03:00
|
|
|
// upstream is local or low-latency; avoid that by
|
|
|
|
// defaulting to a sane wait period between attempts
|
2019-09-03 07:01:02 +03:00
|
|
|
h.LoadBalancing.TryInterval = caddy.Duration(250 * time.Millisecond)
|
2019-05-04 19:49:50 +03:00
|
|
|
}
|
2019-12-10 23:36:46 +03:00
|
|
|
lbMatcherSets, err := ctx.LoadModule(h.LoadBalancing, "RetryMatchRaw")
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
err = h.LoadBalancing.RetryMatch.FromInterface(lbMatcherSets)
|
2019-10-06 01:22:05 +03:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2019-05-04 19:49:50 +03:00
|
|
|
|
2019-10-11 23:25:39 +03:00
|
|
|
// set up upstreams
|
2019-09-03 07:01:02 +03:00
|
|
|
for _, upstream := range h.Upstreams {
|
2019-10-11 23:25:39 +03:00
|
|
|
// create or get the host representation for this upstream
|
|
|
|
var host Host = new(upstreamHost)
|
2020-03-27 23:29:01 +03:00
|
|
|
existingHost, loaded := hosts.LoadOrStore(upstream.String(), host)
|
2019-10-11 23:25:39 +03:00
|
|
|
if loaded {
|
|
|
|
host = existingHost.(Host)
|
2019-09-12 03:53:44 +03:00
|
|
|
}
|
2019-10-11 23:25:39 +03:00
|
|
|
upstream.Host = host
|
|
|
|
|
|
|
|
// give it the circuit breaker, if any
|
|
|
|
upstream.cb = h.CB
|
|
|
|
|
|
|
|
// if the passive health checker has a non-zero UnhealthyRequestCount
|
|
|
|
// but the upstream has no MaxRequests set (they are the same thing,
|
|
|
|
// but the passive health checker is a default value for for upstreams
|
|
|
|
// without MaxRequests), copy the value into this upstream, since the
|
|
|
|
// value in the upstream (MaxRequests) is what is used during
|
|
|
|
// availability checks
|
2019-10-30 01:02:40 +03:00
|
|
|
if h.HealthChecks != nil && h.HealthChecks.Passive != nil {
|
|
|
|
h.HealthChecks.Passive.logger = h.logger.Named("health_checker.passive")
|
|
|
|
if h.HealthChecks.Passive.UnhealthyRequestCount > 0 &&
|
|
|
|
upstream.MaxRequests == 0 {
|
|
|
|
upstream.MaxRequests = h.HealthChecks.Passive.UnhealthyRequestCount
|
|
|
|
}
|
2019-09-03 07:01:02 +03:00
|
|
|
}
|
2019-05-04 19:49:50 +03:00
|
|
|
|
2019-10-11 23:25:39 +03:00
|
|
|
// upstreams need independent access to the passive
|
|
|
|
// health check policy because passive health checks
|
|
|
|
// run without access to h.
|
|
|
|
if h.HealthChecks != nil {
|
|
|
|
upstream.healthCheckPolicy = h.HealthChecks.Passive
|
2019-09-03 07:01:02 +03:00
|
|
|
}
|
2019-05-04 19:49:50 +03:00
|
|
|
}
|
2019-09-03 07:01:02 +03:00
|
|
|
|
2020-02-24 00:30:52 +03:00
|
|
|
// if active health checks are enabled, configure them and start a worker
|
|
|
|
if h.HealthChecks != nil &&
|
|
|
|
h.HealthChecks.Active != nil &&
|
|
|
|
(h.HealthChecks.Active.Path != "" || h.HealthChecks.Active.Port != 0) {
|
|
|
|
h.HealthChecks.Active.logger = h.logger.Named("health_checker.active")
|
|
|
|
|
|
|
|
timeout := time.Duration(h.HealthChecks.Active.Timeout)
|
|
|
|
if timeout == 0 {
|
|
|
|
timeout = 5 * time.Second
|
|
|
|
}
|
|
|
|
|
|
|
|
h.HealthChecks.Active.stopChan = make(chan struct{})
|
|
|
|
h.HealthChecks.Active.httpClient = &http.Client{
|
|
|
|
Timeout: timeout,
|
|
|
|
Transport: h.Transport,
|
|
|
|
}
|
|
|
|
|
|
|
|
if h.HealthChecks.Active.Interval == 0 {
|
|
|
|
h.HealthChecks.Active.Interval = caddy.Duration(30 * time.Second)
|
|
|
|
}
|
|
|
|
|
|
|
|
if h.HealthChecks.Active.ExpectBody != "" {
|
|
|
|
var err error
|
|
|
|
h.HealthChecks.Active.bodyRegexp, err = regexp.Compile(h.HealthChecks.Active.ExpectBody)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("expect_body: compiling regular expression: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
go h.activeHealthChecker()
|
|
|
|
}
|
|
|
|
|
2019-09-03 07:01:02 +03:00
|
|
|
return nil
|
2019-05-04 19:49:50 +03:00
|
|
|
}
|
|
|
|
|
2019-09-03 21:10:11 +03:00
|
|
|
// Cleanup cleans up the resources made by h during provisioning.
|
2019-09-03 07:01:02 +03:00
|
|
|
func (h *Handler) Cleanup() error {
|
2019-09-03 21:10:11 +03:00
|
|
|
// stop the active health checker
|
|
|
|
if h.HealthChecks != nil &&
|
|
|
|
h.HealthChecks.Active != nil &&
|
|
|
|
h.HealthChecks.Active.stopChan != nil {
|
2020-02-24 00:30:52 +03:00
|
|
|
// TODO: consider using context cancellation, could be much simpler
|
2019-09-03 21:10:11 +03:00
|
|
|
close(h.HealthChecks.Active.stopChan)
|
|
|
|
}
|
|
|
|
|
2019-10-11 00:38:30 +03:00
|
|
|
// TODO: Close keepalive connections on reload? https://github.com/caddyserver/caddy/pull/2507/files#diff-70219fd88fe3f36834f474ce6537ed26R762
|
|
|
|
|
2019-09-03 21:10:11 +03:00
|
|
|
// remove hosts from our config from the pool
|
2019-09-03 07:01:02 +03:00
|
|
|
for _, upstream := range h.Upstreams {
|
2020-03-27 23:29:01 +03:00
|
|
|
hosts.Delete(upstream.String())
|
2019-05-04 19:49:50 +03:00
|
|
|
}
|
2019-09-03 21:10:11 +03:00
|
|
|
|
2019-09-03 07:01:02 +03:00
|
|
|
return nil
|
2019-05-04 19:49:50 +03:00
|
|
|
}
|
|
|
|
|
2019-09-03 07:01:02 +03:00
|
|
|
func (h *Handler) ServeHTTP(w http.ResponseWriter, r *http.Request, next caddyhttp.Handler) error {
|
2019-12-29 23:12:52 +03:00
|
|
|
repl := r.Context().Value(caddy.ReplacerCtxKey).(*caddy.Replacer)
|
2019-09-14 22:25:26 +03:00
|
|
|
|
2019-11-16 03:15:33 +03:00
|
|
|
// if enabled, buffer client request;
|
|
|
|
// this should only be enabled if the
|
|
|
|
// upstream requires it and does not
|
|
|
|
// work with "slow clients" (gunicorn,
|
|
|
|
// etc.) - this obviously has a perf
|
|
|
|
// overhead and makes the proxy at
|
|
|
|
// risk of exhausting memory and more
|
2019-12-05 02:28:13 +03:00
|
|
|
// susceptible to slowloris attacks,
|
2019-11-16 03:15:33 +03:00
|
|
|
// so it is strongly recommended to
|
|
|
|
// only use this feature if absolutely
|
|
|
|
// required, if read timeouts are set,
|
|
|
|
// and if body size is limited
|
|
|
|
if h.BufferRequests {
|
|
|
|
buf := bufPool.Get().(*bytes.Buffer)
|
|
|
|
buf.Reset()
|
|
|
|
defer bufPool.Put(buf)
|
|
|
|
io.Copy(buf, r.Body)
|
|
|
|
r.Body.Close()
|
|
|
|
r.Body = ioutil.NopCloser(buf)
|
|
|
|
}
|
|
|
|
|
2019-09-03 07:01:02 +03:00
|
|
|
// prepare the request for proxying; this is needed only once
|
|
|
|
err := h.prepareRequest(r)
|
|
|
|
if err != nil {
|
|
|
|
return caddyhttp.Error(http.StatusInternalServerError,
|
|
|
|
fmt.Errorf("preparing request for upstream round-trip: %v", err))
|
2019-05-04 19:49:50 +03:00
|
|
|
}
|
|
|
|
|
2019-09-14 22:25:26 +03:00
|
|
|
// we will need the original headers and Host
|
|
|
|
// value if header operations are configured
|
|
|
|
reqHeader := r.Header
|
|
|
|
reqHost := r.Host
|
|
|
|
|
2019-09-03 07:01:02 +03:00
|
|
|
start := time.Now()
|
|
|
|
|
|
|
|
var proxyErr error
|
|
|
|
for {
|
|
|
|
// choose an available upstream
|
|
|
|
upstream := h.LoadBalancing.SelectionPolicy.Select(h.Upstreams, r)
|
|
|
|
if upstream == nil {
|
|
|
|
if proxyErr == nil {
|
2019-09-14 22:25:26 +03:00
|
|
|
proxyErr = fmt.Errorf("no upstreams available")
|
2019-09-03 07:01:02 +03:00
|
|
|
}
|
2019-10-06 01:22:05 +03:00
|
|
|
if !h.LoadBalancing.tryAgain(start, proxyErr, r) {
|
2019-09-03 07:01:02 +03:00
|
|
|
break
|
2019-05-04 19:49:50 +03:00
|
|
|
}
|
2019-09-03 07:01:02 +03:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2019-10-11 23:25:39 +03:00
|
|
|
// the dial address may vary per-request if placeholders are
|
|
|
|
// used, so perform those replacements here; the resulting
|
|
|
|
// DialInfo struct should have valid network address syntax
|
2020-03-24 19:53:53 +03:00
|
|
|
dialInfo, err := upstream.fillDialInfo(r)
|
2019-10-11 23:25:39 +03:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("making dial info: %v", err)
|
|
|
|
}
|
|
|
|
|
2019-09-05 22:14:39 +03:00
|
|
|
// attach to the request information about how to dial the upstream;
|
|
|
|
// this is necessary because the information cannot be sufficiently
|
|
|
|
// or satisfactorily represented in a URL
|
http: Change routes to sequential matcher evaluation (#2967)
Previously, all matchers in a route would be evaluated before any
handlers were executed, and a composite route of the matching routes
would be created. This made rewrites especially tricky, since the only
way to defer later matchers' evaluation was to wrap them in a subroute,
or to invoke a "rehandle" which often caused bugs.
Instead, this new sequential design evaluates each route's matchers then
its handlers in lock-step; matcher-handlers-matcher-handlers...
If the first matching route consists of a rewrite, then the second route
will be evaluated against the rewritten request, rather than the original
one, and so on.
This should do away with any need for rehandling.
I've also taken this opportunity to avoid adding new values to the
request context in the handler chain, as this creates a copy of the
Request struct, which may possibly lead to bugs like it has in the past
(see PR #1542, PR #1481, and maybe issue #2463). We now add all the
expected context values in the top-level handler at the server, then
any new values can be added to the variable table via the VarsCtxKey
context key, or just the GetVar/SetVar functions. In particular, we are
using this facility to convey dial information in the reverse proxy.
Had to be careful in one place as the middleware compilation logic has
changed, and moved a bit. We no longer compile a middleware chain per-
request; instead, we can compile it at provision-time, and defer only the
evaluation of matchers to request-time, which should slightly improve
performance. Doing this, however, we take advantage of multiple function
closures, and we also changed the use of HandlerFunc (function pointer)
to Handler (interface)... this led to a situation where, if we aren't
careful, allows one request routed a certain way to permanently change
the "next" handler for all/most other requests! We avoid this by making
a copy of the interface value (which is a lightweight pointer copy) and
using exclusively that within our wrapped handlers. This way, the
original stack frame is preserved in a "read-only" fashion. The comments
in the code describe this phenomenon.
This may very well be a breaking change for some configurations, however
I do not expect it to impact many people. I will make it clear in the
release notes that this change has occurred.
2020-01-09 20:00:13 +03:00
|
|
|
caddyhttp.SetVar(r.Context(), dialInfoVarKey, dialInfo)
|
2019-09-05 22:14:39 +03:00
|
|
|
|
2019-09-14 22:25:26 +03:00
|
|
|
// set placeholders with information about this upstream
|
2019-12-13 00:31:20 +03:00
|
|
|
repl.Set("http.reverse_proxy.upstream.address", dialInfo.String())
|
|
|
|
repl.Set("http.reverse_proxy.upstream.hostport", dialInfo.Address)
|
|
|
|
repl.Set("http.reverse_proxy.upstream.host", dialInfo.Host)
|
|
|
|
repl.Set("http.reverse_proxy.upstream.port", dialInfo.Port)
|
|
|
|
repl.Set("http.reverse_proxy.upstream.requests", strconv.Itoa(upstream.Host.NumRequests()))
|
|
|
|
repl.Set("http.reverse_proxy.upstream.max_requests", strconv.Itoa(upstream.MaxRequests))
|
|
|
|
repl.Set("http.reverse_proxy.upstream.fails", strconv.Itoa(upstream.Host.Fails()))
|
2019-09-14 22:25:26 +03:00
|
|
|
|
|
|
|
// mutate request headers according to this upstream;
|
|
|
|
// because we're in a retry loop, we have to copy
|
|
|
|
// headers (and the r.Host value) from the original
|
|
|
|
// so that each retry is identical to the first
|
|
|
|
if h.Headers != nil && h.Headers.Request != nil {
|
|
|
|
r.Header = make(http.Header)
|
|
|
|
copyHeader(r.Header, reqHeader)
|
|
|
|
r.Host = reqHost
|
|
|
|
h.Headers.Request.ApplyToRequest(r)
|
|
|
|
}
|
|
|
|
|
2019-09-03 07:01:02 +03:00
|
|
|
// proxy the request to that upstream
|
2019-10-11 23:25:39 +03:00
|
|
|
proxyErr = h.reverseProxy(w, r, dialInfo)
|
2019-09-04 04:10:09 +03:00
|
|
|
if proxyErr == nil || proxyErr == context.Canceled {
|
|
|
|
// context.Canceled happens when the downstream client
|
2019-10-06 01:22:05 +03:00
|
|
|
// cancels the request, which is not our failure
|
2019-09-03 07:01:02 +03:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// remember this failure (if enabled)
|
|
|
|
h.countFailure(upstream)
|
|
|
|
|
|
|
|
// if we've tried long enough, break
|
2019-10-06 01:22:05 +03:00
|
|
|
if !h.LoadBalancing.tryAgain(start, proxyErr, r) {
|
2019-09-03 07:01:02 +03:00
|
|
|
break
|
|
|
|
}
|
2019-05-04 19:49:50 +03:00
|
|
|
}
|
|
|
|
|
2019-09-03 07:01:02 +03:00
|
|
|
return caddyhttp.Error(http.StatusBadGateway, proxyErr)
|
|
|
|
}
|
|
|
|
|
|
|
|
// prepareRequest modifies req so that it is ready to be proxied,
|
|
|
|
// except for directing to a specific upstream. This method mutates
|
|
|
|
// headers and other necessary properties of the request and should
|
|
|
|
// be done just once (before proxying) regardless of proxy retries.
|
|
|
|
// This assumes that no mutations of the request are performed
|
|
|
|
// by h during or after proxying.
|
|
|
|
func (h Handler) prepareRequest(req *http.Request) error {
|
2019-11-06 02:29:10 +03:00
|
|
|
// most of this is borrowed from the Go std lib reverse proxy
|
2019-09-05 22:14:39 +03:00
|
|
|
|
2019-05-04 19:49:50 +03:00
|
|
|
if req.ContentLength == 0 {
|
2019-09-03 07:01:02 +03:00
|
|
|
req.Body = nil // Issue golang/go#16036: nil Body for http.Transport retries
|
2019-05-04 19:49:50 +03:00
|
|
|
}
|
|
|
|
|
2019-09-03 07:01:02 +03:00
|
|
|
req.Close = false
|
2019-05-04 19:49:50 +03:00
|
|
|
|
2019-09-03 07:01:02 +03:00
|
|
|
// if User-Agent is not set by client, then explicitly
|
|
|
|
// disable it so it's not set to default value by std lib
|
|
|
|
if _, ok := req.Header["User-Agent"]; !ok {
|
|
|
|
req.Header.Set("User-Agent", "")
|
|
|
|
}
|
|
|
|
|
|
|
|
reqUpType := upgradeType(req.Header)
|
|
|
|
removeConnectionHeaders(req.Header)
|
2019-05-04 19:49:50 +03:00
|
|
|
|
|
|
|
// Remove hop-by-hop headers to the backend. Especially
|
|
|
|
// important is "Connection" because we want a persistent
|
|
|
|
// connection, regardless of what the client sent to us.
|
|
|
|
for _, h := range hopHeaders {
|
2019-09-03 07:01:02 +03:00
|
|
|
hv := req.Header.Get(h)
|
2019-05-04 19:49:50 +03:00
|
|
|
if hv == "" {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if h == "Te" && hv == "trailers" {
|
2019-09-03 07:01:02 +03:00
|
|
|
// Issue golang/go#21096: tell backend applications that
|
2019-05-04 19:49:50 +03:00
|
|
|
// care about trailer support that we support
|
|
|
|
// trailers. (We do, but we don't go out of
|
|
|
|
// our way to advertise that unless the
|
|
|
|
// incoming client request thought it was
|
|
|
|
// worth mentioning)
|
|
|
|
continue
|
|
|
|
}
|
2019-09-03 07:01:02 +03:00
|
|
|
req.Header.Del(h)
|
2019-05-04 19:49:50 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// After stripping all the hop-by-hop connection headers above, add back any
|
|
|
|
// necessary for protocol upgrades, such as for websockets.
|
|
|
|
if reqUpType != "" {
|
2019-09-03 07:01:02 +03:00
|
|
|
req.Header.Set("Connection", "Upgrade")
|
|
|
|
req.Header.Set("Upgrade", reqUpType)
|
2019-05-04 19:49:50 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
if clientIP, _, err := net.SplitHostPort(req.RemoteAddr); err == nil {
|
|
|
|
// If we aren't the first proxy retain prior
|
|
|
|
// X-Forwarded-For information as a comma+space
|
|
|
|
// separated list and fold multiple headers into one.
|
2019-09-03 07:01:02 +03:00
|
|
|
if prior, ok := req.Header["X-Forwarded-For"]; ok {
|
2019-05-04 19:49:50 +03:00
|
|
|
clientIP = strings.Join(prior, ", ") + ", " + clientIP
|
|
|
|
}
|
2019-09-03 07:01:02 +03:00
|
|
|
req.Header.Set("X-Forwarded-For", clientIP)
|
2019-05-04 19:49:50 +03:00
|
|
|
}
|
|
|
|
|
2019-09-03 07:01:02 +03:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-09-04 01:56:09 +03:00
|
|
|
// reverseProxy performs a round-trip to the given backend and processes the response with the client.
|
|
|
|
// (This method is mostly the beginning of what was borrowed from the net/http/httputil package in the
|
|
|
|
// Go standard library which was used as the foundation.)
|
2019-10-11 23:25:39 +03:00
|
|
|
func (h *Handler) reverseProxy(rw http.ResponseWriter, req *http.Request, di DialInfo) error {
|
|
|
|
di.Upstream.Host.CountRequest(1)
|
|
|
|
defer di.Upstream.Host.CountRequest(-1)
|
2019-09-03 07:01:02 +03:00
|
|
|
|
|
|
|
// point the request to this upstream
|
2019-10-11 23:25:39 +03:00
|
|
|
h.directRequest(req, di)
|
2019-09-03 07:01:02 +03:00
|
|
|
|
|
|
|
// do the round-trip
|
|
|
|
start := time.Now()
|
|
|
|
res, err := h.Transport.RoundTrip(req)
|
2019-12-10 23:36:46 +03:00
|
|
|
duration := time.Since(start)
|
2019-05-04 19:49:50 +03:00
|
|
|
if err != nil {
|
2019-09-03 07:01:02 +03:00
|
|
|
return err
|
2019-05-04 19:49:50 +03:00
|
|
|
}
|
|
|
|
|
2019-11-06 02:27:51 +03:00
|
|
|
h.logger.Debug("upstream roundtrip",
|
2020-03-27 23:29:01 +03:00
|
|
|
zap.String("upstream", di.Upstream.String()),
|
2019-11-06 02:27:51 +03:00
|
|
|
zap.Object("request", caddyhttp.LoggableHTTPRequest{Request: req}),
|
|
|
|
zap.Object("headers", caddyhttp.LoggableHTTPHeader(res.Header)),
|
2019-12-10 23:36:46 +03:00
|
|
|
zap.Duration("duration", duration),
|
2019-11-06 02:27:51 +03:00
|
|
|
zap.Int("status", res.StatusCode),
|
|
|
|
)
|
|
|
|
|
2019-09-04 04:06:54 +03:00
|
|
|
// update circuit breaker on current conditions
|
2019-10-11 23:25:39 +03:00
|
|
|
if di.Upstream.cb != nil {
|
2019-12-10 23:36:46 +03:00
|
|
|
di.Upstream.cb.RecordMetric(res.StatusCode, duration)
|
2019-09-04 04:06:54 +03:00
|
|
|
}
|
|
|
|
|
2019-09-03 07:01:02 +03:00
|
|
|
// perform passive health checks (if enabled)
|
|
|
|
if h.HealthChecks != nil && h.HealthChecks.Passive != nil {
|
|
|
|
// strike if the status code matches one that is "bad"
|
|
|
|
for _, badStatus := range h.HealthChecks.Passive.UnhealthyStatus {
|
|
|
|
if caddyhttp.StatusCodeMatches(res.StatusCode, badStatus) {
|
2019-10-11 23:25:39 +03:00
|
|
|
h.countFailure(di.Upstream)
|
2019-09-03 07:01:02 +03:00
|
|
|
}
|
2019-05-04 19:49:50 +03:00
|
|
|
}
|
|
|
|
|
2019-09-03 07:01:02 +03:00
|
|
|
// strike if the roundtrip took too long
|
|
|
|
if h.HealthChecks.Passive.UnhealthyLatency > 0 &&
|
2019-12-10 23:36:46 +03:00
|
|
|
duration >= time.Duration(h.HealthChecks.Passive.UnhealthyLatency) {
|
2019-10-11 23:25:39 +03:00
|
|
|
h.countFailure(di.Upstream)
|
2019-09-03 07:01:02 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Deal with 101 Switching Protocols responses: (WebSocket, h2c, etc)
|
|
|
|
if res.StatusCode == http.StatusSwitchingProtocols {
|
|
|
|
h.handleUpgradeResponse(rw, req, res)
|
|
|
|
return nil
|
2019-05-04 19:49:50 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
removeConnectionHeaders(res.Header)
|
|
|
|
|
|
|
|
for _, h := range hopHeaders {
|
|
|
|
res.Header.Del(h)
|
|
|
|
}
|
|
|
|
|
|
|
|
copyHeader(rw.Header(), res.Header)
|
|
|
|
|
|
|
|
// The "Trailer" header isn't included in the Transport's response,
|
|
|
|
// at least for *http.Transport. Build it up from Trailer.
|
|
|
|
announcedTrailers := len(res.Trailer)
|
|
|
|
if announcedTrailers > 0 {
|
|
|
|
trailerKeys := make([]string, 0, len(res.Trailer))
|
|
|
|
for k := range res.Trailer {
|
|
|
|
trailerKeys = append(trailerKeys, k)
|
|
|
|
}
|
|
|
|
rw.Header().Add("Trailer", strings.Join(trailerKeys, ", "))
|
|
|
|
}
|
|
|
|
|
2019-09-14 22:25:26 +03:00
|
|
|
// apply any response header operations
|
|
|
|
if h.Headers != nil && h.Headers.Response != nil {
|
|
|
|
if h.Headers.Response.Require == nil ||
|
|
|
|
h.Headers.Response.Require.Match(res.StatusCode, rw.Header()) {
|
2019-12-29 23:12:52 +03:00
|
|
|
repl := req.Context().Value(caddy.ReplacerCtxKey).(*caddy.Replacer)
|
2019-09-14 22:25:26 +03:00
|
|
|
h.Headers.Response.ApplyTo(rw.Header(), repl)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-10-28 23:39:37 +03:00
|
|
|
// TODO: there should be an option to return an error if the response
|
|
|
|
// matches some criteria; would solve https://github.com/caddyserver/caddy/issues/1447
|
|
|
|
// by allowing the backend to determine whether this server should treat
|
|
|
|
// a 400+ status code as an error -- but we might need to be careful that
|
|
|
|
// we do not affect the health status of the backend... still looking into
|
|
|
|
// that; if we need to avoid that, we should return a particular error type
|
|
|
|
// that the caller of this function checks for and only applies health
|
|
|
|
// status changes if the error is not this special type
|
|
|
|
|
2019-05-04 19:49:50 +03:00
|
|
|
rw.WriteHeader(res.StatusCode)
|
|
|
|
|
2019-09-03 07:01:02 +03:00
|
|
|
err = h.copyResponse(rw, res.Body, h.flushInterval(req, res))
|
2019-05-04 19:49:50 +03:00
|
|
|
if err != nil {
|
|
|
|
defer res.Body.Close()
|
|
|
|
// Since we're streaming the response, if we run into an error all we can do
|
2019-09-03 07:01:02 +03:00
|
|
|
// is abort the request. Issue golang/go#23643: ReverseProxy should use ErrAbortHandler
|
2019-05-04 19:49:50 +03:00
|
|
|
// on read error while copying body.
|
2019-09-03 07:01:02 +03:00
|
|
|
// TODO: Look into whether we want to panic at all in our case...
|
2019-05-04 19:49:50 +03:00
|
|
|
if !shouldPanicOnCopyError(req) {
|
2019-09-03 07:01:02 +03:00
|
|
|
// p.logf("suppressing panic for copyResponse error in test; copy error: %v", err)
|
|
|
|
return err
|
2019-05-04 19:49:50 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
panic(http.ErrAbortHandler)
|
|
|
|
}
|
|
|
|
res.Body.Close() // close now, instead of defer, to populate res.Trailer
|
|
|
|
|
|
|
|
if len(res.Trailer) > 0 {
|
|
|
|
// Force chunking if we saw a response trailer.
|
|
|
|
// This prevents net/http from calculating the length for short
|
|
|
|
// bodies and adding a Content-Length.
|
|
|
|
if fl, ok := rw.(http.Flusher); ok {
|
|
|
|
fl.Flush()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(res.Trailer) == announcedTrailers {
|
|
|
|
copyHeader(rw.Header(), res.Trailer)
|
2019-09-03 07:01:02 +03:00
|
|
|
return nil
|
2019-05-04 19:49:50 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
for k, vv := range res.Trailer {
|
|
|
|
k = http.TrailerPrefix + k
|
|
|
|
for _, v := range vv {
|
|
|
|
rw.Header().Add(k, v)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-09-03 07:01:02 +03:00
|
|
|
return nil
|
2019-05-04 19:49:50 +03:00
|
|
|
}
|
|
|
|
|
2019-09-03 07:01:02 +03:00
|
|
|
// tryAgain takes the time that the handler was initially invoked
|
2019-10-06 01:22:05 +03:00
|
|
|
// as well as any error currently obtained, and the request being
|
|
|
|
// tried, and returns true if another attempt should be made at
|
|
|
|
// proxying the request. If true is returned, it has already blocked
|
|
|
|
// long enough before the next retry (i.e. no more sleeping is
|
|
|
|
// needed). If false is returned, the handler should stop trying to
|
|
|
|
// proxy the request.
|
|
|
|
func (lb LoadBalancing) tryAgain(start time.Time, proxyErr error, req *http.Request) bool {
|
2019-09-03 07:01:02 +03:00
|
|
|
// if we've tried long enough, break
|
2019-10-06 01:22:05 +03:00
|
|
|
if time.Since(start) >= time.Duration(lb.TryDuration) {
|
2019-09-03 07:01:02 +03:00
|
|
|
return false
|
2019-05-04 19:49:50 +03:00
|
|
|
}
|
2019-10-06 01:22:05 +03:00
|
|
|
|
|
|
|
// if the error occurred while dialing (i.e. a connection
|
|
|
|
// could not even be established to the upstream), then it
|
|
|
|
// should be safe to retry, since without a connection, no
|
|
|
|
// HTTP request can be transmitted; but if the error is not
|
|
|
|
// specifically a dialer error, we need to be careful
|
|
|
|
if _, ok := proxyErr.(DialError); proxyErr != nil && !ok {
|
|
|
|
// if the error occurred after a connection was established,
|
|
|
|
// we have to assume the upstream received the request, and
|
|
|
|
// retries need to be carefully decided, because some requests
|
|
|
|
// are not idempotent
|
|
|
|
if lb.RetryMatch == nil && req.Method != "GET" {
|
|
|
|
// by default, don't retry requests if they aren't GET
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
if !lb.RetryMatch.AnyMatch(req) {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-09-03 07:01:02 +03:00
|
|
|
// otherwise, wait and try the next available host
|
2019-10-06 01:22:05 +03:00
|
|
|
time.Sleep(time.Duration(lb.TryInterval))
|
2019-09-03 07:01:02 +03:00
|
|
|
return true
|
2019-05-04 19:49:50 +03:00
|
|
|
}
|
|
|
|
|
2019-10-11 23:25:39 +03:00
|
|
|
// directRequest modifies only req.URL so that it points to the upstream
|
|
|
|
// in the given DialInfo. It must modify ONLY the request URL.
|
|
|
|
func (h Handler) directRequest(req *http.Request, di DialInfo) {
|
2019-09-05 22:14:39 +03:00
|
|
|
if req.URL.Host == "" {
|
2019-09-12 03:53:44 +03:00
|
|
|
// we need a host, so set the upstream's host address
|
2019-10-11 23:25:39 +03:00
|
|
|
reqHost := di.Address
|
2019-09-12 03:53:44 +03:00
|
|
|
|
2019-10-11 23:25:39 +03:00
|
|
|
// if the port equates to the scheme, strip the port because
|
2019-09-12 03:53:44 +03:00
|
|
|
// it's weird to make a request like http://example.com:80/.
|
2019-10-11 23:25:39 +03:00
|
|
|
if (req.URL.Scheme == "http" && di.Port == "80") ||
|
|
|
|
(req.URL.Scheme == "https" && di.Port == "443") {
|
|
|
|
reqHost = di.Host
|
2019-09-12 03:53:44 +03:00
|
|
|
}
|
|
|
|
|
2019-10-11 23:25:39 +03:00
|
|
|
req.URL.Host = reqHost
|
2019-05-04 19:49:50 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-09-03 07:01:02 +03:00
|
|
|
// shouldPanicOnCopyError reports whether the reverse proxy should
|
|
|
|
// panic with http.ErrAbortHandler. This is the right thing to do by
|
|
|
|
// default, but Go 1.10 and earlier did not, so existing unit tests
|
|
|
|
// weren't expecting panics. Only panic in our own tests, or when
|
|
|
|
// running under the HTTP server.
|
|
|
|
// TODO: I don't know if we want this at all...
|
|
|
|
func shouldPanicOnCopyError(req *http.Request) bool {
|
|
|
|
// if inOurTests {
|
|
|
|
// // Our tests know to handle this panic.
|
|
|
|
// return true
|
|
|
|
// }
|
|
|
|
if req.Context().Value(http.ServerContextKey) != nil {
|
|
|
|
// We seem to be running under an HTTP server, so
|
|
|
|
// it'll recover the panic.
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
// Otherwise act like Go 1.10 and earlier to not break
|
|
|
|
// existing tests.
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
func copyHeader(dst, src http.Header) {
|
|
|
|
for k, vv := range src {
|
|
|
|
for _, v := range vv {
|
|
|
|
dst.Add(k, v)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func cloneHeader(h http.Header) http.Header {
|
|
|
|
h2 := make(http.Header, len(h))
|
|
|
|
for k, vv := range h {
|
|
|
|
vv2 := make([]string, len(vv))
|
|
|
|
copy(vv2, vv)
|
|
|
|
h2[k] = vv2
|
|
|
|
}
|
|
|
|
return h2
|
|
|
|
}
|
|
|
|
|
2019-05-04 19:49:50 +03:00
|
|
|
func upgradeType(h http.Header) string {
|
|
|
|
if !httpguts.HeaderValuesContainsToken(h["Connection"], "Upgrade") {
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
return strings.ToLower(h.Get("Upgrade"))
|
|
|
|
}
|
|
|
|
|
2019-09-03 07:01:02 +03:00
|
|
|
func singleJoiningSlash(a, b string) string {
|
|
|
|
aslash := strings.HasSuffix(a, "/")
|
|
|
|
bslash := strings.HasPrefix(b, "/")
|
|
|
|
switch {
|
|
|
|
case aslash && bslash:
|
|
|
|
return a + b[1:]
|
|
|
|
case !aslash && !bslash:
|
|
|
|
return a + "/" + b
|
2019-05-04 19:49:50 +03:00
|
|
|
}
|
2019-09-03 07:01:02 +03:00
|
|
|
return a + b
|
|
|
|
}
|
2019-05-04 19:49:50 +03:00
|
|
|
|
2019-09-03 07:01:02 +03:00
|
|
|
// removeConnectionHeaders removes hop-by-hop headers listed in the "Connection" header of h.
|
|
|
|
// See RFC 7230, section 6.1
|
|
|
|
func removeConnectionHeaders(h http.Header) {
|
|
|
|
if c := h.Get("Connection"); c != "" {
|
|
|
|
for _, f := range strings.Split(c, ",") {
|
|
|
|
if f = strings.TrimSpace(f); f != "" {
|
|
|
|
h.Del(f)
|
|
|
|
}
|
|
|
|
}
|
2019-05-04 19:49:50 +03:00
|
|
|
}
|
2019-09-03 07:01:02 +03:00
|
|
|
}
|
|
|
|
|
2019-09-04 01:56:09 +03:00
|
|
|
// LoadBalancing has parameters related to load balancing.
|
2019-09-03 07:01:02 +03:00
|
|
|
type LoadBalancing struct {
|
2019-12-23 22:45:35 +03:00
|
|
|
// A selection policy is how to choose an available backend.
|
|
|
|
// The default policy is random selection.
|
|
|
|
SelectionPolicyRaw json.RawMessage `json:"selection_policy,omitempty" caddy:"namespace=http.reverse_proxy.selection_policies inline_key=policy"`
|
|
|
|
|
|
|
|
// How long to try selecting available backends for each request
|
|
|
|
// if the next available host is down. By default, this retry is
|
|
|
|
// disabled. Clients will wait for up to this long while the load
|
|
|
|
// balancer tries to find an available upstream host.
|
|
|
|
TryDuration caddy.Duration `json:"try_duration,omitempty"`
|
|
|
|
|
|
|
|
// How long to wait between selecting the next host from the pool. Default
|
|
|
|
// is 250ms. Only relevant when a request to an upstream host fails. Be
|
|
|
|
// aware that setting this to 0 with a non-zero try_duration can cause the
|
|
|
|
// CPU to spin if all backends are down and latency is very low.
|
|
|
|
TryInterval caddy.Duration `json:"try_interval,omitempty"`
|
|
|
|
|
|
|
|
// A list of matcher sets that restricts with which requests retries are
|
|
|
|
// allowed. A request must match any of the given matcher sets in order
|
|
|
|
// to be retried if the connection to the upstream succeeded but the
|
|
|
|
// subsequent round-trip failed. If the connection to the upstream failed,
|
|
|
|
// a retry is always allowed. If unspecified, only GET requests will be
|
|
|
|
// allowed to be retried. Note that a retry is done with the next available
|
|
|
|
// host according to the load balancing policy.
|
|
|
|
RetryMatchRaw caddyhttp.RawMatcherSets `json:"retry_match,omitempty" caddy:"namespace=http.matchers"`
|
2019-09-03 07:01:02 +03:00
|
|
|
|
2019-10-06 01:22:05 +03:00
|
|
|
SelectionPolicy Selector `json:"-"`
|
|
|
|
RetryMatch caddyhttp.MatcherSets `json:"-"`
|
2019-09-03 07:01:02 +03:00
|
|
|
}
|
|
|
|
|
2019-09-04 01:56:09 +03:00
|
|
|
// Selector selects an available upstream from the pool.
|
2019-09-03 07:01:02 +03:00
|
|
|
type Selector interface {
|
2019-09-04 01:56:09 +03:00
|
|
|
Select(UpstreamPool, *http.Request) *Upstream
|
2019-09-03 07:01:02 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// Hop-by-hop headers. These are removed when sent to the backend.
|
|
|
|
// As of RFC 7230, hop-by-hop headers are required to appear in the
|
|
|
|
// Connection header field. These are the headers defined by the
|
|
|
|
// obsoleted RFC 2616 (section 13.5.1) and are used for backward
|
|
|
|
// compatibility.
|
|
|
|
var hopHeaders = []string{
|
2020-03-20 15:54:28 +03:00
|
|
|
"Alt-Svc",
|
2019-09-03 07:01:02 +03:00
|
|
|
"Connection",
|
|
|
|
"Proxy-Connection", // non-standard but still sent by libcurl and rejected by e.g. google
|
|
|
|
"Keep-Alive",
|
|
|
|
"Proxy-Authenticate",
|
|
|
|
"Proxy-Authorization",
|
|
|
|
"Te", // canonicalized version of "TE"
|
|
|
|
"Trailer", // not Trailers per URL above; https://www.rfc-editor.org/errata_search.php?eid=4522
|
|
|
|
"Transfer-Encoding",
|
|
|
|
"Upgrade",
|
|
|
|
}
|
|
|
|
|
2019-10-06 01:22:05 +03:00
|
|
|
// DialError is an error that specifically occurs
|
|
|
|
// in a call to Dial or DialContext.
|
|
|
|
type DialError struct {
|
|
|
|
error
|
|
|
|
}
|
|
|
|
|
2019-11-16 03:15:33 +03:00
|
|
|
var bufPool = sync.Pool{
|
|
|
|
New: func() interface{} {
|
|
|
|
return new(bytes.Buffer)
|
|
|
|
},
|
|
|
|
}
|
2019-09-03 21:10:11 +03:00
|
|
|
|
2019-09-03 07:01:02 +03:00
|
|
|
// Interface guards
|
|
|
|
var (
|
|
|
|
_ caddy.Provisioner = (*Handler)(nil)
|
|
|
|
_ caddy.CleanerUpper = (*Handler)(nil)
|
2019-09-04 01:56:09 +03:00
|
|
|
_ caddyhttp.MiddlewareHandler = (*Handler)(nil)
|
2019-09-03 07:01:02 +03:00
|
|
|
)
|