diff options
| author | Francis Lavoie <lavofr@gmail.com> | 2022-10-05 01:21:23 -0400 | 
|---|---|---|
| committer | GitHub <noreply@github.com> | 2022-10-04 23:21:23 -0600 | 
| commit | ea58d519078916d4cf273628653e348befbaf6c0 (patch) | |
| tree | a11cf24089151799dd64631104dc9e26e6470dc2 /modules/logging | |
| parent | 9e1d964bd6af27cd96a370987a1cadc58933d19a (diff) | |
logging: Perform filtering on arrays of strings (where possible) (#5101)
* logging: Perform filtering on arrays of strings (where possible)
* Add test for ip_mask filter
* Oops, need to continue when it's not an IP
* Test for invalid IPs
Diffstat (limited to 'modules/logging')
| -rw-r--r-- | modules/logging/filters.go | 83 | ||||
| -rw-r--r-- | modules/logging/filters_test.go | 112 | 
2 files changed, 171 insertions, 24 deletions
| diff --git a/modules/logging/filters.go b/modules/logging/filters.go index c2c039a..8cc84c7 100644 --- a/modules/logging/filters.go +++ b/modules/logging/filters.go @@ -23,6 +23,7 @@ import (  	"net/url"  	"regexp"  	"strconv" +	"strings"  	"github.com/caddyserver/caddy/v2"  	"github.com/caddyserver/caddy/v2/caddyconfig/caddyfile" @@ -76,7 +77,10 @@ func hash(s string) string {  }  // HashFilter is a Caddy log field filter that -// replaces the field with the initial 4 bytes of the SHA-256 hash of the content. +// replaces the field with the initial 4 bytes +// of the SHA-256 hash of the content. Operates +// on string fields, or on arrays of strings +// where each string is hashed.  type HashFilter struct {  } @@ -95,7 +99,13 @@ func (f *HashFilter) UnmarshalCaddyfile(d *caddyfile.Dispenser) error {  // Filter filters the input field with the replacement value.  func (f *HashFilter) Filter(in zapcore.Field) zapcore.Field { -	in.String = hash(in.String) +	if array, ok := in.Interface.(caddyhttp.LoggableStringArray); ok { +		for i, s := range array { +			array[i] = hash(s) +		} +	} else { +		in.String = hash(in.String) +	}  	return in  } @@ -131,7 +141,10 @@ func (f *ReplaceFilter) Filter(in zapcore.Field) zapcore.Field {  }  // IPMaskFilter is a Caddy log field filter that -// masks IP addresses. +// masks IP addresses in a string, or in an array +// of strings. The string may be a comma separated +// list of IP addresses, where all of the values +// will be masked.  type IPMaskFilter struct {  	// The IPv4 mask, as an subnet size CIDR.  	IPv4MaskRaw int `json:"ipv4_cidr,omitempty"` @@ -205,27 +218,45 @@ func (m *IPMaskFilter) Provision(ctx caddy.Context) error {  // Filter filters the input field.  func (m IPMaskFilter) Filter(in zapcore.Field) zapcore.Field { -	host, port, err := net.SplitHostPort(in.String) -	if err != nil { -		host = in.String // assume whole thing was IP address -	} -	ipAddr := net.ParseIP(host) -	if ipAddr == nil { -		return in -	} -	mask := m.v4Mask -	if ipAddr.To4() == nil { -		mask = m.v6Mask -	} -	masked := ipAddr.Mask(mask) -	if port == "" { -		in.String = masked.String() +	if array, ok := in.Interface.(caddyhttp.LoggableStringArray); ok { +		for i, s := range array { +			array[i] = m.mask(s) +		}  	} else { -		in.String = net.JoinHostPort(masked.String(), port) +		in.String = m.mask(in.String)  	} +  	return in  } +func (m IPMaskFilter) mask(s string) string { +	output := "" +	for _, value := range strings.Split(s, ",") { +		value = strings.TrimSpace(value) +		host, port, err := net.SplitHostPort(value) +		if err != nil { +			host = value // assume whole thing was IP address +		} +		ipAddr := net.ParseIP(host) +		if ipAddr == nil { +			output += value + ", " +			continue +		} +		mask := m.v4Mask +		if ipAddr.To4() == nil { +			mask = m.v6Mask +		} +		masked := ipAddr.Mask(mask) +		if port == "" { +			output += masked.String() + ", " +			continue +		} + +		output += net.JoinHostPort(masked.String(), port) + ", " +	} +	return strings.TrimSuffix(output, ", ") +} +  type filterAction string  const ( @@ -499,7 +530,10 @@ OUTER:  }  // RegexpFilter is a Caddy log field filter that -// replaces the field matching the provided regexp with the indicated string. +// replaces the field matching the provided regexp +// with the indicated string. If the field is an +// array of strings, each of them will have the +// regexp replacement applied.  type RegexpFilter struct {  	// The regular expression pattern defining what to replace.  	RawRegexp string `json:"regexp,omitempty"` @@ -545,7 +579,13 @@ func (m *RegexpFilter) Provision(ctx caddy.Context) error {  // Filter filters the input field with the replacement value if it matches the regexp.  func (f *RegexpFilter) Filter(in zapcore.Field) zapcore.Field { -	in.String = f.regexp.ReplaceAllString(in.String, f.Value) +	if array, ok := in.Interface.(caddyhttp.LoggableStringArray); ok { +		for i, s := range array { +			array[i] = f.regexp.ReplaceAllString(s, f.Value) +		} +	} else { +		in.String = f.regexp.ReplaceAllString(in.String, f.Value) +	}  	return in  } @@ -576,7 +616,6 @@ func (f *RenameFilter) UnmarshalCaddyfile(d *caddyfile.Dispenser) error {  // Filter renames the input field with the replacement name.  func (f *RenameFilter) Filter(in zapcore.Field) zapcore.Field { -	in.Type = zapcore.StringType  	in.Key = f.Name  	return in  } diff --git a/modules/logging/filters_test.go b/modules/logging/filters_test.go index 2b087f2..e9c3e77 100644 --- a/modules/logging/filters_test.go +++ b/modules/logging/filters_test.go @@ -8,6 +8,81 @@ import (  	"go.uber.org/zap/zapcore"  ) +func TestIPMaskSingleValue(t *testing.T) { +	f := IPMaskFilter{IPv4MaskRaw: 16, IPv6MaskRaw: 32} +	f.Provision(caddy.Context{}) + +	out := f.Filter(zapcore.Field{String: "255.255.255.255"}) +	if out.String != "255.255.0.0" { +		t.Fatalf("field has not been filtered: %s", out.String) +	} + +	out = f.Filter(zapcore.Field{String: "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff"}) +	if out.String != "ffff:ffff::" { +		t.Fatalf("field has not been filtered: %s", out.String) +	} + +	out = f.Filter(zapcore.Field{String: "not-an-ip"}) +	if out.String != "not-an-ip" { +		t.Fatalf("field has been filtered: %s", out.String) +	} +} + +func TestIPMaskCommaValue(t *testing.T) { +	f := IPMaskFilter{IPv4MaskRaw: 16, IPv6MaskRaw: 32} +	f.Provision(caddy.Context{}) + +	out := f.Filter(zapcore.Field{String: "255.255.255.255, 244.244.244.244"}) +	if out.String != "255.255.0.0, 244.244.0.0" { +		t.Fatalf("field has not been filtered: %s", out.String) +	} + +	out = f.Filter(zapcore.Field{String: "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff, ff00:ffff:ffff:ffff:ffff:ffff:ffff:ffff"}) +	if out.String != "ffff:ffff::, ff00:ffff::" { +		t.Fatalf("field has not been filtered: %s", out.String) +	} + +	out = f.Filter(zapcore.Field{String: "not-an-ip, 255.255.255.255"}) +	if out.String != "not-an-ip, 255.255.0.0" { +		t.Fatalf("field has not been filtered: %s", out.String) +	} +} + +func TestIPMaskMultiValue(t *testing.T) { +	f := IPMaskFilter{IPv4MaskRaw: 16, IPv6MaskRaw: 32} +	f.Provision(caddy.Context{}) + +	out := f.Filter(zapcore.Field{Interface: caddyhttp.LoggableStringArray{ +		"255.255.255.255", +		"244.244.244.244", +	}}) +	arr, ok := out.Interface.(caddyhttp.LoggableStringArray) +	if !ok { +		t.Fatalf("field is wrong type: %T", out.Integer) +	} +	if arr[0] != "255.255.0.0" { +		t.Fatalf("field entry 0 has not been filtered: %s", arr[0]) +	} +	if arr[1] != "244.244.0.0" { +		t.Fatalf("field entry 1 has not been filtered: %s", arr[1]) +	} + +	out = f.Filter(zapcore.Field{Interface: caddyhttp.LoggableStringArray{ +		"ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff", +		"ff00:ffff:ffff:ffff:ffff:ffff:ffff:ffff", +	}}) +	arr, ok = out.Interface.(caddyhttp.LoggableStringArray) +	if !ok { +		t.Fatalf("field is wrong type: %T", out.Integer) +	} +	if arr[0] != "ffff:ffff::" { +		t.Fatalf("field entry 0 has not been filtered: %s", arr[0]) +	} +	if arr[1] != "ff00:ffff::" { +		t.Fatalf("field entry 1 has not been filtered: %s", arr[1]) +	} +} +  func TestQueryFilter(t *testing.T) {  	f := QueryFilter{[]queryFilterAction{  		{replaceAction, "foo", "REDACTED"}, @@ -78,7 +153,7 @@ func TestValidateCookieFilter(t *testing.T) {  	}  } -func TestRegexpFilter(t *testing.T) { +func TestRegexpFilterSingleValue(t *testing.T) {  	f := RegexpFilter{RawRegexp: `secret`, Value: "REDACTED"}  	f.Provision(caddy.Context{}) @@ -88,7 +163,24 @@ func TestRegexpFilter(t *testing.T) {  	}  } -func TestHashFilter(t *testing.T) { +func TestRegexpFilterMultiValue(t *testing.T) { +	f := RegexpFilter{RawRegexp: `secret`, Value: "REDACTED"} +	f.Provision(caddy.Context{}) + +	out := f.Filter(zapcore.Field{Interface: caddyhttp.LoggableStringArray{"foo-secret-bar", "bar-secret-foo"}}) +	arr, ok := out.Interface.(caddyhttp.LoggableStringArray) +	if !ok { +		t.Fatalf("field is wrong type: %T", out.Integer) +	} +	if arr[0] != "foo-REDACTED-bar" { +		t.Fatalf("field entry 0 has not been filtered: %s", arr[0]) +	} +	if arr[1] != "bar-REDACTED-foo" { +		t.Fatalf("field entry 1 has not been filtered: %s", arr[1]) +	} +} + +func TestHashFilterSingleValue(t *testing.T) {  	f := HashFilter{}  	out := f.Filter(zapcore.Field{String: "foo"}) @@ -96,3 +188,19 @@ func TestHashFilter(t *testing.T) {  		t.Fatalf("field has not been filtered: %s", out.String)  	}  } + +func TestHashFilterMultiValue(t *testing.T) { +	f := HashFilter{} + +	out := f.Filter(zapcore.Field{Interface: caddyhttp.LoggableStringArray{"foo", "bar"}}) +	arr, ok := out.Interface.(caddyhttp.LoggableStringArray) +	if !ok { +		t.Fatalf("field is wrong type: %T", out.Integer) +	} +	if arr[0] != "2c26b46b" { +		t.Fatalf("field entry 0 has not been filtered: %s", arr[0]) +	} +	if arr[1] != "fcde2b2e" { +		t.Fatalf("field entry 1 has not been filtered: %s", arr[1]) +	} +} | 
