mirror of
				https://github.com/caddyserver/caddy.git
				synced 2025-11-03 19:17:29 -05:00 
			
		
		
		
	* Overwrite proxy headers based on directive Headers of the request sent by the proxy upstream can now be modified in the following way: Prefix header with `+`: Header will be added if it doesn't exist otherwise, the values will be merge Prefix header with `-': Header will be removed No prefix: Header will be replaced with given value * Add missing formating directive reported by go vet * Overwrite up/down stream proxy headers Add Up/DownStreamHeaders to UpstreamHost Split `proxy_header` option in `proxy` directive into `header_upstream` and `header_downstream`. By splitting into two, it makes it clear in what direction the given headers must be applied. `proxy_header` can still be used (to maintain backward compatability) but its assumed to be `header_upstream` Response headers received by the reverse proxy from the upstream host are updated according the `header_downstream` rules. The update occurs through a func given to the reverse proxy, which is applied once a response is received. Headers (for upstream and downstream) can now be modified in the following way: Prefix header with `+`: Header will be added if it doesn't exist otherwise, the values will be merge Prefix header with `-': Header will be removed No prefix: Header will be replaced with given value Updated branch with changes from master * minor refactor to make intent clearer * Make Up/Down stream headers naming consistent * Fix error descriptions to be more clear * Fix lint issue
		
			
				
	
	
		
			238 lines
		
	
	
		
			6.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			238 lines
		
	
	
		
			6.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// Package proxy is middleware that proxies requests.
 | 
						|
package proxy
 | 
						|
 | 
						|
import (
 | 
						|
	"errors"
 | 
						|
	"net"
 | 
						|
	"net/http"
 | 
						|
	"net/url"
 | 
						|
	"strings"
 | 
						|
	"sync/atomic"
 | 
						|
	"time"
 | 
						|
 | 
						|
	"github.com/mholt/caddy/middleware"
 | 
						|
)
 | 
						|
 | 
						|
var errUnreachable = errors.New("unreachable backend")
 | 
						|
 | 
						|
// Proxy represents a middleware instance that can proxy requests.
 | 
						|
type Proxy struct {
 | 
						|
	Next      middleware.Handler
 | 
						|
	Upstreams []Upstream
 | 
						|
}
 | 
						|
 | 
						|
// Upstream manages a pool of proxy upstream hosts. Select should return a
 | 
						|
// suitable upstream host, or nil if no such hosts are available.
 | 
						|
type Upstream interface {
 | 
						|
	// The path this upstream host should be routed on
 | 
						|
	From() string
 | 
						|
	// Selects an upstream host to be routed to.
 | 
						|
	Select() *UpstreamHost
 | 
						|
	// Checks if subpath is not an ignored path
 | 
						|
	AllowedPath(string) bool
 | 
						|
}
 | 
						|
 | 
						|
// UpstreamHostDownFunc can be used to customize how Down behaves.
 | 
						|
type UpstreamHostDownFunc func(*UpstreamHost) bool
 | 
						|
 | 
						|
// UpstreamHost represents a single proxy upstream
 | 
						|
type UpstreamHost struct {
 | 
						|
	Conns             int64  // must be first field to be 64-bit aligned on 32-bit systems
 | 
						|
	Name              string // hostname of this upstream host
 | 
						|
	ReverseProxy      *ReverseProxy
 | 
						|
	Fails             int32
 | 
						|
	FailTimeout       time.Duration
 | 
						|
	Unhealthy         bool
 | 
						|
	UpstreamHeaders   http.Header
 | 
						|
	DownstreamHeaders http.Header
 | 
						|
	CheckDown         UpstreamHostDownFunc
 | 
						|
	WithoutPathPrefix string
 | 
						|
	MaxConns          int64
 | 
						|
}
 | 
						|
 | 
						|
// Down checks whether the upstream host is down or not.
 | 
						|
// Down will try to use uh.CheckDown first, and will fall
 | 
						|
// back to some default criteria if necessary.
 | 
						|
func (uh *UpstreamHost) Down() bool {
 | 
						|
	if uh.CheckDown == nil {
 | 
						|
		// Default settings
 | 
						|
		return uh.Unhealthy || uh.Fails > 0
 | 
						|
	}
 | 
						|
	return uh.CheckDown(uh)
 | 
						|
}
 | 
						|
 | 
						|
// Full checks whether the upstream host has reached its maximum connections
 | 
						|
func (uh *UpstreamHost) Full() bool {
 | 
						|
	return uh.MaxConns > 0 && uh.Conns >= uh.MaxConns
 | 
						|
}
 | 
						|
 | 
						|
// Available checks whether the upstream host is available for proxying to
 | 
						|
func (uh *UpstreamHost) Available() bool {
 | 
						|
	return !uh.Down() && !uh.Full()
 | 
						|
}
 | 
						|
 | 
						|
// tryDuration is how long to try upstream hosts; failures result in
 | 
						|
// immediate retries until this duration ends or we get a nil host.
 | 
						|
var tryDuration = 60 * time.Second
 | 
						|
 | 
						|
// ServeHTTP satisfies the middleware.Handler interface.
 | 
						|
func (p Proxy) ServeHTTP(w http.ResponseWriter, r *http.Request) (int, error) {
 | 
						|
	for _, upstream := range p.Upstreams {
 | 
						|
		if !middleware.Path(r.URL.Path).Matches(upstream.From()) ||
 | 
						|
			!upstream.AllowedPath(r.URL.Path) {
 | 
						|
			continue
 | 
						|
		}
 | 
						|
 | 
						|
		var replacer middleware.Replacer
 | 
						|
		start := time.Now()
 | 
						|
 | 
						|
		outreq := createUpstreamRequest(r)
 | 
						|
 | 
						|
		// Since Select() should give us "up" hosts, keep retrying
 | 
						|
		// hosts until timeout (or until we get a nil host).
 | 
						|
		for time.Now().Sub(start) < tryDuration {
 | 
						|
			host := upstream.Select()
 | 
						|
			if host == nil {
 | 
						|
				return http.StatusBadGateway, errUnreachable
 | 
						|
			}
 | 
						|
			if rr, ok := w.(*middleware.ResponseRecorder); ok && rr.Replacer != nil {
 | 
						|
				rr.Replacer.Set("upstream", host.Name)
 | 
						|
			}
 | 
						|
 | 
						|
			outreq.Host = host.Name
 | 
						|
			if host.UpstreamHeaders != nil {
 | 
						|
				if replacer == nil {
 | 
						|
					rHost := r.Host
 | 
						|
					replacer = middleware.NewReplacer(r, nil, "")
 | 
						|
					outreq.Host = rHost
 | 
						|
				}
 | 
						|
				if v, ok := host.UpstreamHeaders["Host"]; ok {
 | 
						|
					r.Host = replacer.Replace(v[len(v)-1])
 | 
						|
				}
 | 
						|
				// Modify headers for request that will be sent to the upstream host
 | 
						|
				upHeaders := createHeadersByRules(host.UpstreamHeaders, r.Header, replacer)
 | 
						|
				for k, v := range upHeaders {
 | 
						|
					outreq.Header[k] = v
 | 
						|
				}
 | 
						|
			}
 | 
						|
 | 
						|
			var downHeaderUpdateFn respUpdateFn
 | 
						|
			if host.DownstreamHeaders != nil {
 | 
						|
				if replacer == nil {
 | 
						|
					rHost := r.Host
 | 
						|
					replacer = middleware.NewReplacer(r, nil, "")
 | 
						|
					outreq.Host = rHost
 | 
						|
				}
 | 
						|
				//Creates a function that is used to update headers the response received by the reverse proxy
 | 
						|
				downHeaderUpdateFn = createRespHeaderUpdateFn(host.DownstreamHeaders, replacer)
 | 
						|
			}
 | 
						|
 | 
						|
			proxy := host.ReverseProxy
 | 
						|
			if baseURL, err := url.Parse(host.Name); err == nil {
 | 
						|
				r.Host = baseURL.Host
 | 
						|
				if proxy == nil {
 | 
						|
					proxy = NewSingleHostReverseProxy(baseURL, host.WithoutPathPrefix)
 | 
						|
				}
 | 
						|
			} else if proxy == nil {
 | 
						|
				return http.StatusInternalServerError, err
 | 
						|
			}
 | 
						|
 | 
						|
			atomic.AddInt64(&host.Conns, 1)
 | 
						|
			backendErr := proxy.ServeHTTP(w, outreq, downHeaderUpdateFn)
 | 
						|
			atomic.AddInt64(&host.Conns, -1)
 | 
						|
			if backendErr == nil {
 | 
						|
				return 0, nil
 | 
						|
			}
 | 
						|
			timeout := host.FailTimeout
 | 
						|
			if timeout == 0 {
 | 
						|
				timeout = 10 * time.Second
 | 
						|
			}
 | 
						|
			atomic.AddInt32(&host.Fails, 1)
 | 
						|
			go func(host *UpstreamHost, timeout time.Duration) {
 | 
						|
				time.Sleep(timeout)
 | 
						|
				atomic.AddInt32(&host.Fails, -1)
 | 
						|
			}(host, timeout)
 | 
						|
		}
 | 
						|
		return http.StatusBadGateway, errUnreachable
 | 
						|
	}
 | 
						|
 | 
						|
	return p.Next.ServeHTTP(w, r)
 | 
						|
}
 | 
						|
 | 
						|
// createUpstremRequest shallow-copies r into a new request
 | 
						|
// that can be sent upstream.
 | 
						|
func createUpstreamRequest(r *http.Request) *http.Request {
 | 
						|
	outreq := new(http.Request)
 | 
						|
	*outreq = *r // includes shallow copies of maps, but okay
 | 
						|
 | 
						|
	// Remove hop-by-hop headers to the backend.  Especially
 | 
						|
	// important is "Connection" because we want a persistent
 | 
						|
	// connection, regardless of what the client sent to us.  This
 | 
						|
	// is modifying the same underlying map from r (shallow
 | 
						|
	// copied above) so we only copy it if necessary.
 | 
						|
	for _, h := range hopHeaders {
 | 
						|
		if outreq.Header.Get(h) != "" {
 | 
						|
			outreq.Header = make(http.Header)
 | 
						|
			copyHeader(outreq.Header, r.Header)
 | 
						|
			outreq.Header.Del(h)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	if clientIP, _, err := net.SplitHostPort(r.RemoteAddr); err == nil {
 | 
						|
		// If we aren't the first proxy, retain prior
 | 
						|
		// X-Forwarded-For information as a comma+space
 | 
						|
		// separated list and fold multiple headers into one.
 | 
						|
		if prior, ok := outreq.Header["X-Forwarded-For"]; ok {
 | 
						|
			clientIP = strings.Join(prior, ", ") + ", " + clientIP
 | 
						|
		}
 | 
						|
		outreq.Header.Set("X-Forwarded-For", clientIP)
 | 
						|
	}
 | 
						|
 | 
						|
	return outreq
 | 
						|
}
 | 
						|
 | 
						|
func createRespHeaderUpdateFn(rules http.Header, replacer middleware.Replacer) respUpdateFn {
 | 
						|
	return func(resp *http.Response) {
 | 
						|
		newHeaders := createHeadersByRules(rules, resp.Header, replacer)
 | 
						|
		for h, v := range newHeaders {
 | 
						|
			resp.Header[h] = v
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func createHeadersByRules(rules http.Header, base http.Header, repl middleware.Replacer) http.Header {
 | 
						|
	newHeaders := make(http.Header)
 | 
						|
	for header, values := range rules {
 | 
						|
		if strings.HasPrefix(header, "+") {
 | 
						|
			header = strings.TrimLeft(header, "+")
 | 
						|
			add(newHeaders, header, base[header])
 | 
						|
			applyEach(values, repl.Replace)
 | 
						|
			add(newHeaders, header, values)
 | 
						|
		} else if strings.HasPrefix(header, "-") {
 | 
						|
			base.Del(strings.TrimLeft(header, "-"))
 | 
						|
		} else if _, ok := base[header]; ok {
 | 
						|
			applyEach(values, repl.Replace)
 | 
						|
			for _, v := range values {
 | 
						|
				newHeaders.Set(header, v)
 | 
						|
			}
 | 
						|
		} else {
 | 
						|
			applyEach(values, repl.Replace)
 | 
						|
			add(newHeaders, header, values)
 | 
						|
			add(newHeaders, header, base[header])
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return newHeaders
 | 
						|
}
 | 
						|
 | 
						|
func applyEach(values []string, mapFn func(string) string) {
 | 
						|
	for i, v := range values {
 | 
						|
		values[i] = mapFn(v)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func add(base http.Header, header string, values []string) {
 | 
						|
	for _, v := range values {
 | 
						|
		base.Add(header, v)
 | 
						|
	}
 | 
						|
}
 |