summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--modules/caddyhttp/matchers.go199
-rw-r--r--modules/caddyhttp/matchers_test.go346
-rw-r--r--modules/caddyhttp/replacer.go9
-rw-r--r--modules/caddyhttp/responsewriter.go25
-rw-r--r--modules/caddyhttp/routes.go6
5 files changed, 519 insertions, 66 deletions
diff --git a/modules/caddyhttp/matchers.go b/modules/caddyhttp/matchers.go
index 7336a1b..0179dd7 100644
--- a/modules/caddyhttp/matchers.go
+++ b/modules/caddyhttp/matchers.go
@@ -1,8 +1,12 @@
package caddyhttp
import (
+ "fmt"
"log"
"net/http"
+ "net/textproto"
+ "net/url"
+ "regexp"
"strings"
"bitbucket.org/lightcodelabs/caddy2"
@@ -10,15 +14,16 @@ import (
"go.starlark.net/starlark"
)
-// TODO: Matchers should probably support regex of some sort... performance trade-offs?
type (
matchHost []string
matchPath []string
+ matchPathRE struct{ matchRegexp }
matchMethod []string
- matchQuery map[string][]string
- matchHeader map[string][]string
+ matchQuery url.Values
+ matchHeader http.Header
+ matchHeaderRE map[string]*matchRegexp
matchProtocol string
- matchScript string
+ matchStarlark string
)
func init() {
@@ -31,6 +36,10 @@ func init() {
New: func() (interface{}, error) { return matchPath{}, nil },
})
caddy2.RegisterModule(caddy2.Module{
+ Name: "http.matchers.path_regexp",
+ New: func() (interface{}, error) { return new(matchPathRE), nil },
+ })
+ caddy2.RegisterModule(caddy2.Module{
Name: "http.matchers.method",
New: func() (interface{}, error) { return matchMethod{}, nil },
})
@@ -43,44 +52,38 @@ func init() {
New: func() (interface{}, error) { return matchHeader{}, nil },
})
caddy2.RegisterModule(caddy2.Module{
+ Name: "http.matchers.header_regexp",
+ New: func() (interface{}, error) { return matchHeaderRE{}, nil },
+ })
+ caddy2.RegisterModule(caddy2.Module{
Name: "http.matchers.protocol",
New: func() (interface{}, error) { return new(matchProtocol), nil },
})
caddy2.RegisterModule(caddy2.Module{
Name: "http.matchers.caddyscript",
- New: func() (interface{}, error) { return new(matchScript), nil },
+ New: func() (interface{}, error) { return new(matchStarlark), nil },
})
}
-func (m matchScript) Match(r *http.Request) bool {
- input := string(m)
- thread := new(starlark.Thread)
- env := caddyscript.MatcherEnv(r)
- val, err := starlark.Eval(thread, "", input, env)
- if err != nil {
- log.Printf("caddyscript for matcher is invalid: attempting to evaluate expression `%v` error `%v`", input, err)
- return false
- }
-
- return val.String() == "True"
-}
-
-func (m matchProtocol) Match(r *http.Request) bool {
- switch string(m) {
- case "grpc":
- return r.Header.Get("content-type") == "application/grpc"
- case "https":
- return r.TLS != nil
- case "http":
- return r.TLS == nil
- }
-
- return false
-}
-
func (m matchHost) Match(r *http.Request) bool {
+outer:
for _, host := range m {
- if r.Host == host {
+ if strings.Contains(host, "*") {
+ patternParts := strings.Split(host, ".")
+ incomingParts := strings.Split(r.Host, ".")
+ if len(patternParts) != len(incomingParts) {
+ continue
+ }
+ for i := range patternParts {
+ if patternParts[i] == "*" {
+ continue
+ }
+ if !strings.EqualFold(patternParts[i], incomingParts[i]) {
+ continue outer
+ }
+ }
+ return true
+ } else if strings.EqualFold(r.Host, host) {
return true
}
}
@@ -96,6 +99,11 @@ func (m matchPath) Match(r *http.Request) bool {
return false
}
+func (m matchPathRE) Match(r *http.Request) bool {
+ repl := r.Context().Value(ReplacerCtxKey).(*Replacer)
+ return m.match(r.URL.Path, repl, "path_regexp")
+}
+
func (m matchMethod) Match(r *http.Request) bool {
for _, method := range m {
if r.Method == method {
@@ -118,26 +126,139 @@ func (m matchQuery) Match(r *http.Request) bool {
}
func (m matchHeader) Match(r *http.Request) bool {
- for field, vals := range m {
- fieldVals := r.Header[field]
- for _, fieldVal := range fieldVals {
- for _, v := range vals {
- if fieldVal == v {
- return true
+ for field, allowedFieldVals := range m {
+ var match bool
+ actualFieldVals := r.Header[textproto.CanonicalMIMEHeaderKey(field)]
+ fieldVals:
+ for _, actualFieldVal := range actualFieldVals {
+ for _, allowedFieldVal := range allowedFieldVals {
+ if actualFieldVal == allowedFieldVal {
+ match = true
+ break fieldVals
}
}
}
+ if !match {
+ return false
+ }
+ }
+ return true
+}
+
+func (m matchHeaderRE) Match(r *http.Request) bool {
+ for field, rm := range m {
+ repl := r.Context().Value(ReplacerCtxKey).(*Replacer)
+ match := rm.match(r.Header.Get(field), repl, "header_regexp")
+ if !match {
+ return false
+ }
+ }
+ return true
+}
+
+func (m matchHeaderRE) Provision() error {
+ for _, rm := range m {
+ err := rm.Provision()
+ if err != nil {
+ return err
+ }
+ }
+ return nil
+}
+
+func (m matchHeaderRE) Validate() error {
+ for _, rm := range m {
+ err := rm.Validate()
+ if err != nil {
+ return err
+ }
+ }
+ return nil
+}
+
+func (m matchProtocol) Match(r *http.Request) bool {
+ switch string(m) {
+ case "grpc":
+ return r.Header.Get("content-type") == "application/grpc"
+ case "https":
+ return r.TLS != nil
+ case "http":
+ return r.TLS == nil
}
return false
}
+func (m matchStarlark) Match(r *http.Request) bool {
+ input := string(m)
+ thread := new(starlark.Thread)
+ env := caddyscript.MatcherEnv(r)
+ val, err := starlark.Eval(thread, "", input, env)
+ if err != nil {
+ // TODO: Can we detect this in Provision or Validate instead?
+ log.Printf("caddyscript for matcher is invalid: attempting to evaluate expression `%v` error `%v`", input, err)
+ return false
+ }
+ return val.String() == "True"
+}
+
+// matchRegexp is just the fields common among
+// matchers that can use regular expressions.
+type matchRegexp struct {
+ Name string `json:"name"`
+ Pattern string `json:"pattern"`
+ compiled *regexp.Regexp
+}
+
+func (mre *matchRegexp) Provision() error {
+ re, err := regexp.Compile(mre.Pattern)
+ if err != nil {
+ return fmt.Errorf("compiling matcher regexp %s: %v", mre.Pattern, err)
+ }
+ mre.compiled = re
+ return nil
+}
+
+func (mre *matchRegexp) Validate() error {
+ if mre.Name != "" && !wordRE.MatchString(mre.Name) {
+ return fmt.Errorf("invalid regexp name (must contain only word characters): %s", mre.Name)
+ }
+ return nil
+}
+
+func (mre *matchRegexp) match(input string, repl *Replacer, scope string) bool {
+ matches := mre.compiled.FindStringSubmatch(input)
+ if matches == nil {
+ return false
+ }
+
+ // save all capture groups, first by index
+ for i, match := range matches {
+ key := fmt.Sprintf("http.matchers.%s.%s.%d", scope, mre.Name, i)
+ repl.Map(key, match)
+ }
+
+ // then by name
+ for i, name := range mre.compiled.SubexpNames() {
+ if i != 0 && name != "" {
+ key := fmt.Sprintf("http.matchers.%s.%s.%s", scope, mre.Name, name)
+ repl.Map(key, matches[i])
+ }
+ }
+
+ return true
+}
+
+var wordRE = regexp.MustCompile(`\w+`)
+
// Interface guards
var (
_ RouteMatcher = (*matchHost)(nil)
_ RouteMatcher = (*matchPath)(nil)
+ _ RouteMatcher = (*matchPathRE)(nil)
_ RouteMatcher = (*matchMethod)(nil)
_ RouteMatcher = (*matchQuery)(nil)
_ RouteMatcher = (*matchHeader)(nil)
+ _ RouteMatcher = (*matchHeaderRE)(nil)
_ RouteMatcher = (*matchProtocol)(nil)
- _ RouteMatcher = (*matchScript)(nil)
+ _ RouteMatcher = (*matchStarlark)(nil)
)
diff --git a/modules/caddyhttp/matchers_test.go b/modules/caddyhttp/matchers_test.go
new file mode 100644
index 0000000..07c98e3
--- /dev/null
+++ b/modules/caddyhttp/matchers_test.go
@@ -0,0 +1,346 @@
+package caddyhttp
+
+import (
+ "context"
+ "fmt"
+ "net/http"
+ "net/http/httptest"
+ "net/url"
+ "testing"
+)
+
+func TestHostMatcher(t *testing.T) {
+ for i, tc := range []struct {
+ match matchHost
+ input string
+ expect bool
+ }{
+ {
+ match: matchHost{},
+ input: "example.com",
+ expect: false,
+ },
+ {
+ match: matchHost{"example.com"},
+ input: "example.com",
+ expect: true,
+ },
+ {
+ match: matchHost{"example.com"},
+ input: "foo.example.com",
+ expect: false,
+ },
+ {
+ match: matchHost{"example.com"},
+ input: "EXAMPLE.COM",
+ expect: true,
+ },
+ {
+ match: matchHost{"foo.example.com"},
+ input: "foo.example.com",
+ expect: true,
+ },
+ {
+ match: matchHost{"foo.example.com"},
+ input: "bar.example.com",
+ expect: false,
+ },
+ {
+ match: matchHost{"*.example.com"},
+ input: "example.com",
+ expect: false,
+ },
+ {
+ match: matchHost{"*.example.com"},
+ input: "foo.example.com",
+ expect: true,
+ },
+ {
+ match: matchHost{"*.example.com"},
+ input: "foo.bar.example.com",
+ expect: false,
+ },
+ {
+ match: matchHost{"*.example.com", "example.net"},
+ input: "example.net",
+ expect: true,
+ },
+ {
+ match: matchHost{"example.net", "*.example.com"},
+ input: "foo.example.com",
+ expect: true,
+ },
+ {
+ match: matchHost{"*.example.net", "*.*.example.com"},
+ input: "foo.bar.example.com",
+ expect: true,
+ },
+ {
+ match: matchHost{"*.example.net", "sub.*.example.com"},
+ input: "sub.foo.example.com",
+ expect: true,
+ },
+ {
+ match: matchHost{"*.example.net", "sub.*.example.com"},
+ input: "sub.foo.example.net",
+ expect: false,
+ },
+ } {
+ req := &http.Request{Host: tc.input}
+ actual := tc.match.Match(req)
+ if actual != tc.expect {
+ t.Errorf("Test %d %v: Expected %t, got %t for '%s'", i, tc.match, tc.expect, actual, tc.input)
+ continue
+ }
+ }
+}
+
+func TestPathMatcher(t *testing.T) {
+ for i, tc := range []struct {
+ match matchPath
+ input string
+ expect bool
+ }{
+ {
+ match: matchPath{},
+ input: "/",
+ expect: false,
+ },
+ {
+ match: matchPath{"/"},
+ input: "/",
+ expect: true,
+ },
+ {
+ match: matchPath{"/foo/bar"},
+ input: "/",
+ expect: false,
+ },
+ {
+ match: matchPath{"/foo/bar"},
+ input: "/foo/bar",
+ expect: true,
+ },
+ {
+ match: matchPath{"/foo/bar/"},
+ input: "/foo/bar",
+ expect: false,
+ },
+ {
+ match: matchPath{"/foo/bar/", "/other"},
+ input: "/other/",
+ expect: true,
+ },
+ } {
+ req := &http.Request{URL: &url.URL{Path: tc.input}}
+ actual := tc.match.Match(req)
+ if actual != tc.expect {
+ t.Errorf("Test %d %v: Expected %t, got %t for '%s'", i, tc.match, tc.expect, actual, tc.input)
+ continue
+ }
+ }
+}
+
+func TestPathREMatcher(t *testing.T) {
+ for i, tc := range []struct {
+ match matchPathRE
+ input string
+ expect bool
+ expectRepl map[string]string
+ }{
+ {
+ match: matchPathRE{},
+ input: "/",
+ expect: true,
+ },
+ {
+ match: matchPathRE{matchRegexp{Pattern: "/"}},
+ input: "/",
+ expect: true,
+ },
+ {
+ match: matchPathRE{matchRegexp{Pattern: "/foo"}},
+ input: "/foo",
+ expect: true,
+ },
+ {
+ match: matchPathRE{matchRegexp{Pattern: "/foo"}},
+ input: "/foo/",
+ expect: true,
+ },
+ {
+ match: matchPathRE{matchRegexp{Pattern: "/bar"}},
+ input: "/foo/",
+ expect: false,
+ },
+ {
+ match: matchPathRE{matchRegexp{Pattern: "^/bar"}},
+ input: "/foo/bar",
+ expect: false,
+ },
+ {
+ match: matchPathRE{matchRegexp{Pattern: "^/foo/(.*)/baz$", Name: "name"}},
+ input: "/foo/bar/baz",
+ expect: true,
+ expectRepl: map[string]string{"name.1": "bar"},
+ },
+ {
+ match: matchPathRE{matchRegexp{Pattern: "^/foo/(?P<myparam>.*)/baz$", Name: "name"}},
+ input: "/foo/bar/baz",
+ expect: true,
+ expectRepl: map[string]string{"name.myparam": "bar"},
+ },
+ } {
+ // compile the regexp and validate its name
+ err := tc.match.Provision()
+ if err != nil {
+ t.Errorf("Test %d %v: Provisioning: %v", i, tc.match, err)
+ continue
+ }
+ err = tc.match.Validate()
+ if err != nil {
+ t.Errorf("Test %d %v: Validating: %v", i, tc.match, err)
+ continue
+ }
+
+ // set up the fake request and its Replacer
+ req := &http.Request{URL: &url.URL{Path: tc.input}}
+ repl := &Replacer{req: req, resp: httptest.NewRecorder(), custom: make(map[string]string)}
+ ctx := context.WithValue(req.Context(), ReplacerCtxKey, repl)
+ req = req.WithContext(ctx)
+
+ actual := tc.match.Match(req)
+ if actual != tc.expect {
+ t.Errorf("Test %d [%v]: Expected %t, got %t for input '%s'",
+ i, tc.match.Pattern, tc.expect, actual, tc.input)
+ continue
+ }
+
+ for key, expectVal := range tc.expectRepl {
+ placeholder := fmt.Sprintf("{http.matchers.path_regexp.%s}", key)
+ actualVal := repl.Replace(placeholder, "<empty>")
+ if actualVal != expectVal {
+ t.Errorf("Test %d [%v]: Expected placeholder {http.matchers.path_regexp.%s} to be '%s' but got '%s'",
+ i, tc.match.Pattern, key, expectVal, actualVal)
+ continue
+ }
+ }
+ }
+}
+
+func TestHeaderMatcher(t *testing.T) {
+ for i, tc := range []struct {
+ match matchHeader
+ input http.Header // make sure these are canonical cased (std lib will do that in a real request)
+ expect bool
+ }{
+ {
+ match: matchHeader{"Field": []string{"foo"}},
+ input: http.Header{"Field": []string{"foo"}},
+ expect: true,
+ },
+ {
+ match: matchHeader{"Field": []string{"foo", "bar"}},
+ input: http.Header{"Field": []string{"bar"}},
+ expect: true,
+ },
+ {
+ match: matchHeader{"Field": []string{"foo", "bar"}},
+ input: http.Header{"Alakazam": []string{"kapow"}},
+ expect: false,
+ },
+ {
+ match: matchHeader{"Field": []string{"foo", "bar"}},
+ input: http.Header{"Field": []string{"kapow"}},
+ expect: false,
+ },
+ {
+ match: matchHeader{"Field": []string{"foo", "bar"}},
+ input: http.Header{"Field": []string{"kapow", "foo"}},
+ expect: true,
+ },
+ {
+ match: matchHeader{"Field1": []string{"foo"}, "Field2": []string{"bar"}},
+ input: http.Header{"Field1": []string{"foo"}, "Field2": []string{"bar"}},
+ expect: true,
+ },
+ {
+ match: matchHeader{"field1": []string{"foo"}, "field2": []string{"bar"}},
+ input: http.Header{"Field1": []string{"foo"}, "Field2": []string{"bar"}},
+ expect: true,
+ },
+ {
+ match: matchHeader{"field1": []string{"foo"}, "field2": []string{"bar"}},
+ input: http.Header{"Field1": []string{"foo"}, "Field2": []string{"kapow"}},
+ expect: false,
+ },
+ } {
+ req := &http.Request{Header: tc.input}
+ actual := tc.match.Match(req)
+ if actual != tc.expect {
+ t.Errorf("Test %d %v: Expected %t, got %t for '%s'", i, tc.match, tc.expect, actual, tc.input)
+ continue
+ }
+ }
+}
+
+func TestHeaderREMatcher(t *testing.T) {
+ for i, tc := range []struct {
+ match matchHeaderRE
+ input http.Header // make sure these are canonical cased (std lib will do that in a real request)
+ expect bool
+ expectRepl map[string]string
+ }{
+ {
+ match: matchHeaderRE{"Field": &matchRegexp{Pattern: "foo"}},
+ input: http.Header{"Field": []string{"foo"}},
+ expect: true,
+ },
+ {
+ match: matchHeaderRE{"Field": &matchRegexp{Pattern: "$foo^"}},
+ input: http.Header{"Field": []string{"foobar"}},
+ expect: false,
+ },
+ {
+ match: matchHeaderRE{"Field": &matchRegexp{Pattern: "^foo(.*)$", Name: "name"}},
+ input: http.Header{"Field": []string{"foobar"}},
+ expect: true,
+ expectRepl: map[string]string{"name.1": "bar"},
+ },
+ } {
+ // compile the regexp and validate its name
+ err := tc.match.Provision()
+ if err != nil {
+ t.Errorf("Test %d %v: Provisioning: %v", i, tc.match, err)
+ continue
+ }
+ err = tc.match.Validate()
+ if err != nil {
+ t.Errorf("Test %d %v: Validating: %v", i, tc.match, err)
+ continue
+ }
+
+ // set up the fake request and its Replacer
+ req := &http.Request{Header: tc.input, URL: new(url.URL)}
+ repl := &Replacer{req: req, resp: httptest.NewRecorder(), custom: make(map[string]string)}
+ ctx := context.WithValue(req.Context(), ReplacerCtxKey, repl)
+ req = req.WithContext(ctx)
+
+ actual := tc.match.Match(req)
+ if actual != tc.expect {
+ t.Errorf("Test %d [%v]: Expected %t, got %t for input '%s'",
+ i, tc.match, tc.expect, actual, tc.input)
+ continue
+ }
+
+ for key, expectVal := range tc.expectRepl {
+ placeholder := fmt.Sprintf("{http.matchers.header_regexp.%s}", key)
+ actualVal := repl.Replace(placeholder, "<empty>")
+ if actualVal != expectVal {
+ t.Errorf("Test %d [%v]: Expected placeholder {http.matchers.header_regexp.%s} to be '%s' but got '%s'",
+ i, tc.match, key, expectVal, actualVal)
+ continue
+ }
+ }
+ }
+}
diff --git a/modules/caddyhttp/replacer.go b/modules/caddyhttp/replacer.go
index 947de09..644cfc1 100644
--- a/modules/caddyhttp/replacer.go
+++ b/modules/caddyhttp/replacer.go
@@ -8,7 +8,9 @@ import (
)
// Replacer can replace values in strings based
-// on a request and/or response writer.
+// on a request and/or response writer. The zero
+// Replacer is not valid; it must be initialized
+// within this package.
type Replacer struct {
req *http.Request
resp http.ResponseWriter
@@ -75,18 +77,17 @@ func (r *Replacer) defaults() map[string]string {
}(),
}
+ // TODO: why should header fields, cookies, and query params get special treatment like this?
+ // maybe they should be scoped by words like "request.header." just like everything else.
for field, vals := range r.req.Header {
m[">"+strings.ToLower(field)] = strings.Join(vals, ",")
}
-
for field, vals := range r.resp.Header() {
m["<"+strings.ToLower(field)] = strings.Join(vals, ",")
}
-
for _, cookie := range r.req.Cookies() {
m["~"+cookie.Name] = cookie.Value
}
-
for param, vals := range r.req.URL.Query() {
m["?"+param] = strings.Join(vals, ",")
}
diff --git a/modules/caddyhttp/responsewriter.go b/modules/caddyhttp/responsewriter.go
index 8aefd3f..4599fd2 100644
--- a/modules/caddyhttp/responsewriter.go
+++ b/modules/caddyhttp/responsewriter.go
@@ -7,16 +7,13 @@ import (
"net/http"
)
-// TODO: Is this type really required? Wouldn't embedding the
-// default ResponseWriter always work too, when wrapping it?
-
// ResponseWriterWrapper wraps an underlying ResponseWriter and
-// promotes its Pusher/Flusher/CloseNotifier/Hijacker methods
-// as well. To use this type, embed a pointer to it within your
-// own struct type that implements the http.ResponseWriter
-// interface, then call methods on the embedded value. You can
-// make sure your type wraps correctly by asserting that it
-// implements the HTTPInterfaces interface.
+// promotes its Pusher/Flusher/Hijacker methods as well. To use
+// this type, embed a pointer to it within your own struct type
+// that implements the http.ResponseWriter interface, then call
+// methods on the embedded value. You can make sure your type
+// wraps correctly by asserting that it implements the
+// HTTPInterfaces interface.
type ResponseWriterWrapper struct {
http.ResponseWriter
}
@@ -40,15 +37,6 @@ func (rww *ResponseWriterWrapper) Flush() {
}
}
-// CloseNotify implements http.CloseNotifier. It simply calls the underlying
-// ResponseWriter's CloseNotify method if there is one, or panics.
-func (rww *ResponseWriterWrapper) CloseNotify() <-chan bool {
- if cn, ok := rww.ResponseWriter.(http.CloseNotifier); ok {
- return cn.CloseNotify()
- }
- panic("not a close notifier")
-}
-
// Push implements http.Pusher. It simply calls the underlying
// ResponseWriter's Push method if there is one, or returns an error.
func (rww *ResponseWriterWrapper) Push(target string, opts *http.PushOptions) error {
@@ -63,7 +51,6 @@ type HTTPInterfaces interface {
http.ResponseWriter
http.Pusher
http.Flusher
- http.CloseNotifier
http.Hijacker
}
diff --git a/modules/caddyhttp/routes.go b/modules/caddyhttp/routes.go
index cc26436..48a5000 100644
--- a/modules/caddyhttp/routes.go
+++ b/modules/caddyhttp/routes.go
@@ -13,7 +13,7 @@ type serverRoute struct {
Apply []json.RawMessage `json:"apply"`
Respond json.RawMessage `json:"respond"`
- Exclusive bool `json:"exclusive"`
+ Terminal bool `json:"terminal"`
// decoded values
matchers []RouteMatcher
@@ -49,9 +49,7 @@ routeLoop:
if responder == nil {
responder = route.responder
}
- // TODO: Should exclusive apply to only middlewares, or responder too?
- // i.e. what if they haven't set a responder yet, but the first middleware chain is exclusive...
- if route.Exclusive {
+ if route.Terminal {
break
}
}