mirror of
				https://github.com/caddyserver/caddy.git
				synced 2025-10-31 10:37:24 -04:00 
			
		
		
		
	
		
			Some checks failed
		
		
	
	Tests / test (./cmd/caddy/caddy, ~1.25.0, ubuntu-latest, 0, 1.25, linux) (push) Failing after 42s
				
			Tests / test (s390x on IBM Z) (push) Has been skipped
				
			Tests / goreleaser-check (push) Has been skipped
				
			Cross-Build / build (~1.25.0, 1.25, aix) (push) Failing after 17s
				
			Cross-Build / build (~1.25.0, 1.25, darwin) (push) Failing after 15s
				
			Cross-Build / build (~1.25.0, 1.25, dragonfly) (push) Failing after 13s
				
			Cross-Build / build (~1.25.0, 1.25, freebsd) (push) Failing after 14s
				
			Cross-Build / build (~1.25.0, 1.25, illumos) (push) Failing after 15s
				
			Cross-Build / build (~1.25.0, 1.25, linux) (push) Failing after 14s
				
			Cross-Build / build (~1.25.0, 1.25, netbsd) (push) Failing after 13s
				
			Cross-Build / build (~1.25.0, 1.25, openbsd) (push) Failing after 13s
				
			Cross-Build / build (~1.25.0, 1.25, solaris) (push) Failing after 13s
				
			Cross-Build / build (~1.25.0, 1.25, windows) (push) Failing after 13s
				
			Lint / lint (ubuntu-latest, linux) (push) Failing after 13s
				
			Lint / govulncheck (push) Successful in 1m33s
				
			Lint / dependency-review (push) Failing after 13s
				
			OpenSSF Scorecard supply-chain security / Scorecard analysis (push) Failing after 14s
				
			Tests / test (./cmd/caddy/caddy, ~1.25.0, macos-14, 0, 1.25, mac) (push) Has been cancelled
				
			Tests / test (./cmd/caddy/caddy.exe, ~1.25.0, windows-latest, True, 1.25, windows) (push) Has been cancelled
				
			Lint / lint (macos-14, mac) (push) Has been cancelled
				
			Lint / lint (windows-latest, windows) (push) Has been cancelled
				
			* logging: fix multiple regexp filters on same field (fixes #7049) * fix: add proper error handling in MultiRegexpFilter tests * fix: resolve linter and test issues - Fix GCI import formatting issues - Fix MultiRegexpFilter input size limit test by ensuring output doesn't exceed max length after each operation - All tests now pass and linter issues resolved * fix: update integration test for proper JSON encoding - Fix expected JSON output to use Unicode escape sequence for ampersand character - Integration tests now pass
		
			
				
	
	
		
			903 lines
		
	
	
		
			24 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			903 lines
		
	
	
		
			24 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright 2015 Matthew Holt and The Caddy Authors
 | |
| //
 | |
| // Licensed under the Apache License, Version 2.0 (the "License");
 | |
| // you may not use this file except in compliance with the License.
 | |
| // You may obtain a copy of the License at
 | |
| //
 | |
| //     http://www.apache.org/licenses/LICENSE-2.0
 | |
| //
 | |
| // Unless required by applicable law or agreed to in writing, software
 | |
| // distributed under the License is distributed on an "AS IS" BASIS,
 | |
| // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| // See the License for the specific language governing permissions and
 | |
| // limitations under the License.
 | |
| 
 | |
| package logging
 | |
| 
 | |
| import (
 | |
| 	"crypto/sha256"
 | |
| 	"errors"
 | |
| 	"fmt"
 | |
| 	"net"
 | |
| 	"net/http"
 | |
| 	"net/url"
 | |
| 	"regexp"
 | |
| 	"strconv"
 | |
| 	"strings"
 | |
| 
 | |
| 	"go.uber.org/zap/zapcore"
 | |
| 
 | |
| 	"github.com/caddyserver/caddy/v2"
 | |
| 	"github.com/caddyserver/caddy/v2/caddyconfig/caddyfile"
 | |
| 	"github.com/caddyserver/caddy/v2/modules/caddyhttp"
 | |
| )
 | |
| 
 | |
| func init() {
 | |
| 	caddy.RegisterModule(DeleteFilter{})
 | |
| 	caddy.RegisterModule(HashFilter{})
 | |
| 	caddy.RegisterModule(ReplaceFilter{})
 | |
| 	caddy.RegisterModule(IPMaskFilter{})
 | |
| 	caddy.RegisterModule(QueryFilter{})
 | |
| 	caddy.RegisterModule(CookieFilter{})
 | |
| 	caddy.RegisterModule(RegexpFilter{})
 | |
| 	caddy.RegisterModule(RenameFilter{})
 | |
| 	caddy.RegisterModule(MultiRegexpFilter{})
 | |
| }
 | |
| 
 | |
| // LogFieldFilter can filter (or manipulate)
 | |
| // a field in a log entry.
 | |
| type LogFieldFilter interface {
 | |
| 	Filter(zapcore.Field) zapcore.Field
 | |
| }
 | |
| 
 | |
| // DeleteFilter is a Caddy log field filter that
 | |
| // deletes the field.
 | |
| type DeleteFilter struct{}
 | |
| 
 | |
| // CaddyModule returns the Caddy module information.
 | |
| func (DeleteFilter) CaddyModule() caddy.ModuleInfo {
 | |
| 	return caddy.ModuleInfo{
 | |
| 		ID:  "caddy.logging.encoders.filter.delete",
 | |
| 		New: func() caddy.Module { return new(DeleteFilter) },
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // UnmarshalCaddyfile sets up the module from Caddyfile tokens.
 | |
| func (DeleteFilter) UnmarshalCaddyfile(d *caddyfile.Dispenser) error {
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // Filter filters the input field.
 | |
| func (DeleteFilter) Filter(in zapcore.Field) zapcore.Field {
 | |
| 	in.Type = zapcore.SkipType
 | |
| 	return in
 | |
| }
 | |
| 
 | |
| // hash returns the first 4 bytes of the SHA-256 hash of the given data as hexadecimal
 | |
| func hash(s string) string {
 | |
| 	return fmt.Sprintf("%.4x", sha256.Sum256([]byte(s)))
 | |
| }
 | |
| 
 | |
| // HashFilter is a Caddy log field filter that
 | |
| // replaces the field with the initial 4 bytes
 | |
| // of the SHA-256 hash of the content. Operates
 | |
| // on string fields, or on arrays of strings
 | |
| // where each string is hashed.
 | |
| type HashFilter struct{}
 | |
| 
 | |
| // CaddyModule returns the Caddy module information.
 | |
| func (HashFilter) CaddyModule() caddy.ModuleInfo {
 | |
| 	return caddy.ModuleInfo{
 | |
| 		ID:  "caddy.logging.encoders.filter.hash",
 | |
| 		New: func() caddy.Module { return new(HashFilter) },
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // UnmarshalCaddyfile sets up the module from Caddyfile tokens.
 | |
| func (f *HashFilter) UnmarshalCaddyfile(d *caddyfile.Dispenser) error {
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // Filter filters the input field with the replacement value.
 | |
| func (f *HashFilter) Filter(in zapcore.Field) zapcore.Field {
 | |
| 	if array, ok := in.Interface.(caddyhttp.LoggableStringArray); ok {
 | |
| 		newArray := make(caddyhttp.LoggableStringArray, len(array))
 | |
| 		for i, s := range array {
 | |
| 			newArray[i] = hash(s)
 | |
| 		}
 | |
| 		in.Interface = newArray
 | |
| 	} else {
 | |
| 		in.String = hash(in.String)
 | |
| 	}
 | |
| 
 | |
| 	return in
 | |
| }
 | |
| 
 | |
| // ReplaceFilter is a Caddy log field filter that
 | |
| // replaces the field with the indicated string.
 | |
| type ReplaceFilter struct {
 | |
| 	Value string `json:"value,omitempty"`
 | |
| }
 | |
| 
 | |
| // CaddyModule returns the Caddy module information.
 | |
| func (ReplaceFilter) CaddyModule() caddy.ModuleInfo {
 | |
| 	return caddy.ModuleInfo{
 | |
| 		ID:  "caddy.logging.encoders.filter.replace",
 | |
| 		New: func() caddy.Module { return new(ReplaceFilter) },
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // UnmarshalCaddyfile sets up the module from Caddyfile tokens.
 | |
| func (f *ReplaceFilter) UnmarshalCaddyfile(d *caddyfile.Dispenser) error {
 | |
| 	d.Next() // consume filter name
 | |
| 	if d.NextArg() {
 | |
| 		f.Value = d.Val()
 | |
| 	}
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // Filter filters the input field with the replacement value.
 | |
| func (f *ReplaceFilter) Filter(in zapcore.Field) zapcore.Field {
 | |
| 	in.Type = zapcore.StringType
 | |
| 	in.String = f.Value
 | |
| 	return in
 | |
| }
 | |
| 
 | |
| // IPMaskFilter is a Caddy log field filter that
 | |
| // masks IP addresses in a string, or in an array
 | |
| // of strings. The string may be a comma separated
 | |
| // list of IP addresses, where all of the values
 | |
| // will be masked.
 | |
| type IPMaskFilter struct {
 | |
| 	// The IPv4 mask, as an subnet size CIDR.
 | |
| 	IPv4MaskRaw int `json:"ipv4_cidr,omitempty"`
 | |
| 
 | |
| 	// The IPv6 mask, as an subnet size CIDR.
 | |
| 	IPv6MaskRaw int `json:"ipv6_cidr,omitempty"`
 | |
| 
 | |
| 	v4Mask net.IPMask
 | |
| 	v6Mask net.IPMask
 | |
| }
 | |
| 
 | |
| // CaddyModule returns the Caddy module information.
 | |
| func (IPMaskFilter) CaddyModule() caddy.ModuleInfo {
 | |
| 	return caddy.ModuleInfo{
 | |
| 		ID:  "caddy.logging.encoders.filter.ip_mask",
 | |
| 		New: func() caddy.Module { return new(IPMaskFilter) },
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // UnmarshalCaddyfile sets up the module from Caddyfile tokens.
 | |
| func (m *IPMaskFilter) UnmarshalCaddyfile(d *caddyfile.Dispenser) error {
 | |
| 	d.Next() // consume filter name
 | |
| 
 | |
| 	args := d.RemainingArgs()
 | |
| 	if len(args) > 2 {
 | |
| 		return d.Errf("too many arguments")
 | |
| 	}
 | |
| 	if len(args) > 0 {
 | |
| 		val, err := strconv.Atoi(args[0])
 | |
| 		if err != nil {
 | |
| 			return d.Errf("error parsing %s: %v", args[0], err)
 | |
| 		}
 | |
| 		m.IPv4MaskRaw = val
 | |
| 
 | |
| 		if len(args) > 1 {
 | |
| 			val, err := strconv.Atoi(args[1])
 | |
| 			if err != nil {
 | |
| 				return d.Errf("error parsing %s: %v", args[1], err)
 | |
| 			}
 | |
| 			m.IPv6MaskRaw = val
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	for d.NextBlock(0) {
 | |
| 		switch d.Val() {
 | |
| 		case "ipv4":
 | |
| 			if !d.NextArg() {
 | |
| 				return d.ArgErr()
 | |
| 			}
 | |
| 			val, err := strconv.Atoi(d.Val())
 | |
| 			if err != nil {
 | |
| 				return d.Errf("error parsing %s: %v", d.Val(), err)
 | |
| 			}
 | |
| 			m.IPv4MaskRaw = val
 | |
| 
 | |
| 		case "ipv6":
 | |
| 			if !d.NextArg() {
 | |
| 				return d.ArgErr()
 | |
| 			}
 | |
| 			val, err := strconv.Atoi(d.Val())
 | |
| 			if err != nil {
 | |
| 				return d.Errf("error parsing %s: %v", d.Val(), err)
 | |
| 			}
 | |
| 			m.IPv6MaskRaw = val
 | |
| 
 | |
| 		default:
 | |
| 			return d.Errf("unrecognized subdirective %s", d.Val())
 | |
| 		}
 | |
| 	}
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // Provision parses m's IP masks, from integers.
 | |
| func (m *IPMaskFilter) Provision(ctx caddy.Context) error {
 | |
| 	parseRawToMask := func(rawField int, bitLen int) net.IPMask {
 | |
| 		if rawField == 0 {
 | |
| 			return nil
 | |
| 		}
 | |
| 
 | |
| 		// we assume the int is a subnet size CIDR
 | |
| 		// e.g. "16" being equivalent to masking the last
 | |
| 		// two bytes of an ipv4 address, like "255.255.0.0"
 | |
| 		return net.CIDRMask(rawField, bitLen)
 | |
| 	}
 | |
| 
 | |
| 	m.v4Mask = parseRawToMask(m.IPv4MaskRaw, 32)
 | |
| 	m.v6Mask = parseRawToMask(m.IPv6MaskRaw, 128)
 | |
| 
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // Filter filters the input field.
 | |
| func (m IPMaskFilter) Filter(in zapcore.Field) zapcore.Field {
 | |
| 	if array, ok := in.Interface.(caddyhttp.LoggableStringArray); ok {
 | |
| 		newArray := make(caddyhttp.LoggableStringArray, len(array))
 | |
| 		for i, s := range array {
 | |
| 			newArray[i] = m.mask(s)
 | |
| 		}
 | |
| 		in.Interface = newArray
 | |
| 	} else {
 | |
| 		in.String = m.mask(in.String)
 | |
| 	}
 | |
| 
 | |
| 	return in
 | |
| }
 | |
| 
 | |
| func (m IPMaskFilter) mask(s string) string {
 | |
| 	output := ""
 | |
| 	for value := range strings.SplitSeq(s, ",") {
 | |
| 		value = strings.TrimSpace(value)
 | |
| 		host, port, err := net.SplitHostPort(value)
 | |
| 		if err != nil {
 | |
| 			host = value // assume whole thing was IP address
 | |
| 		}
 | |
| 		ipAddr := net.ParseIP(host)
 | |
| 		if ipAddr == nil {
 | |
| 			output += value + ", "
 | |
| 			continue
 | |
| 		}
 | |
| 		mask := m.v4Mask
 | |
| 		if ipAddr.To4() == nil {
 | |
| 			mask = m.v6Mask
 | |
| 		}
 | |
| 		masked := ipAddr.Mask(mask)
 | |
| 		if port == "" {
 | |
| 			output += masked.String() + ", "
 | |
| 			continue
 | |
| 		}
 | |
| 
 | |
| 		output += net.JoinHostPort(masked.String(), port) + ", "
 | |
| 	}
 | |
| 	return strings.TrimSuffix(output, ", ")
 | |
| }
 | |
| 
 | |
| type filterAction string
 | |
| 
 | |
| const (
 | |
| 	// Replace value(s).
 | |
| 	replaceAction filterAction = "replace"
 | |
| 
 | |
| 	// Hash value(s).
 | |
| 	hashAction filterAction = "hash"
 | |
| 
 | |
| 	// Delete.
 | |
| 	deleteAction filterAction = "delete"
 | |
| )
 | |
| 
 | |
| func (a filterAction) IsValid() error {
 | |
| 	switch a {
 | |
| 	case replaceAction, deleteAction, hashAction:
 | |
| 		return nil
 | |
| 	}
 | |
| 
 | |
| 	return errors.New("invalid action type")
 | |
| }
 | |
| 
 | |
| type queryFilterAction struct {
 | |
| 	// `replace` to replace the value(s) associated with the parameter(s), `hash` to replace them with the 4 initial bytes of the SHA-256 of their content or `delete` to remove them entirely.
 | |
| 	Type filterAction `json:"type"`
 | |
| 
 | |
| 	// The name of the query parameter.
 | |
| 	Parameter string `json:"parameter"`
 | |
| 
 | |
| 	// The value to use as replacement if the action is `replace`.
 | |
| 	Value string `json:"value,omitempty"`
 | |
| }
 | |
| 
 | |
| // QueryFilter is a Caddy log field filter that filters
 | |
| // query parameters from a URL.
 | |
| //
 | |
| // This filter updates the logged URL string to remove, replace or hash
 | |
| // query parameters containing sensitive data. For instance, it can be
 | |
| // used to redact any kind of secrets which were passed as query parameters,
 | |
| // such as OAuth access tokens, session IDs, magic link tokens, etc.
 | |
| type QueryFilter struct {
 | |
| 	// A list of actions to apply to the query parameters of the URL.
 | |
| 	Actions []queryFilterAction `json:"actions"`
 | |
| }
 | |
| 
 | |
| // Validate checks that action types are correct.
 | |
| func (f *QueryFilter) Validate() error {
 | |
| 	for _, a := range f.Actions {
 | |
| 		if err := a.Type.IsValid(); err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // CaddyModule returns the Caddy module information.
 | |
| func (QueryFilter) CaddyModule() caddy.ModuleInfo {
 | |
| 	return caddy.ModuleInfo{
 | |
| 		ID:  "caddy.logging.encoders.filter.query",
 | |
| 		New: func() caddy.Module { return new(QueryFilter) },
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // UnmarshalCaddyfile sets up the module from Caddyfile tokens.
 | |
| func (m *QueryFilter) UnmarshalCaddyfile(d *caddyfile.Dispenser) error {
 | |
| 	d.Next() // consume filter name
 | |
| 	for d.NextBlock(0) {
 | |
| 		qfa := queryFilterAction{}
 | |
| 		switch d.Val() {
 | |
| 		case "replace":
 | |
| 			if !d.NextArg() {
 | |
| 				return d.ArgErr()
 | |
| 			}
 | |
| 
 | |
| 			qfa.Type = replaceAction
 | |
| 			qfa.Parameter = d.Val()
 | |
| 
 | |
| 			if !d.NextArg() {
 | |
| 				return d.ArgErr()
 | |
| 			}
 | |
| 			qfa.Value = d.Val()
 | |
| 
 | |
| 		case "hash":
 | |
| 			if !d.NextArg() {
 | |
| 				return d.ArgErr()
 | |
| 			}
 | |
| 
 | |
| 			qfa.Type = hashAction
 | |
| 			qfa.Parameter = d.Val()
 | |
| 
 | |
| 		case "delete":
 | |
| 			if !d.NextArg() {
 | |
| 				return d.ArgErr()
 | |
| 			}
 | |
| 
 | |
| 			qfa.Type = deleteAction
 | |
| 			qfa.Parameter = d.Val()
 | |
| 
 | |
| 		default:
 | |
| 			return d.Errf("unrecognized subdirective %s", d.Val())
 | |
| 		}
 | |
| 
 | |
| 		m.Actions = append(m.Actions, qfa)
 | |
| 	}
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // Filter filters the input field.
 | |
| func (m QueryFilter) Filter(in zapcore.Field) zapcore.Field {
 | |
| 	if array, ok := in.Interface.(caddyhttp.LoggableStringArray); ok {
 | |
| 		newArray := make(caddyhttp.LoggableStringArray, len(array))
 | |
| 		for i, s := range array {
 | |
| 			newArray[i] = m.processQueryString(s)
 | |
| 		}
 | |
| 		in.Interface = newArray
 | |
| 	} else {
 | |
| 		in.String = m.processQueryString(in.String)
 | |
| 	}
 | |
| 
 | |
| 	return in
 | |
| }
 | |
| 
 | |
| func (m QueryFilter) processQueryString(s string) string {
 | |
| 	u, err := url.Parse(s)
 | |
| 	if err != nil {
 | |
| 		return s
 | |
| 	}
 | |
| 
 | |
| 	q := u.Query()
 | |
| 	for _, a := range m.Actions {
 | |
| 		switch a.Type {
 | |
| 		case replaceAction:
 | |
| 			for i := range q[a.Parameter] {
 | |
| 				q[a.Parameter][i] = a.Value
 | |
| 			}
 | |
| 
 | |
| 		case hashAction:
 | |
| 			for i := range q[a.Parameter] {
 | |
| 				q[a.Parameter][i] = hash(a.Value)
 | |
| 			}
 | |
| 
 | |
| 		case deleteAction:
 | |
| 			q.Del(a.Parameter)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	u.RawQuery = q.Encode()
 | |
| 	return u.String()
 | |
| }
 | |
| 
 | |
| type cookieFilterAction struct {
 | |
| 	// `replace` to replace the value of the cookie, `hash` to replace it with the 4 initial bytes of the SHA-256 of its content or `delete` to remove it entirely.
 | |
| 	Type filterAction `json:"type"`
 | |
| 
 | |
| 	// The name of the cookie.
 | |
| 	Name string `json:"name"`
 | |
| 
 | |
| 	// The value to use as replacement if the action is `replace`.
 | |
| 	Value string `json:"value,omitempty"`
 | |
| }
 | |
| 
 | |
| // CookieFilter is a Caddy log field filter that filters
 | |
| // cookies.
 | |
| //
 | |
| // This filter updates the logged HTTP header string
 | |
| // to remove, replace or hash cookies containing sensitive data. For instance,
 | |
| // it can be used to redact any kind of secrets, such as session IDs.
 | |
| //
 | |
| // If several actions are configured for the same cookie name, only the first
 | |
| // will be applied.
 | |
| type CookieFilter struct {
 | |
| 	// A list of actions to apply to the cookies.
 | |
| 	Actions []cookieFilterAction `json:"actions"`
 | |
| }
 | |
| 
 | |
| // Validate checks that action types are correct.
 | |
| func (f *CookieFilter) Validate() error {
 | |
| 	for _, a := range f.Actions {
 | |
| 		if err := a.Type.IsValid(); err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // CaddyModule returns the Caddy module information.
 | |
| func (CookieFilter) CaddyModule() caddy.ModuleInfo {
 | |
| 	return caddy.ModuleInfo{
 | |
| 		ID:  "caddy.logging.encoders.filter.cookie",
 | |
| 		New: func() caddy.Module { return new(CookieFilter) },
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // UnmarshalCaddyfile sets up the module from Caddyfile tokens.
 | |
| func (m *CookieFilter) UnmarshalCaddyfile(d *caddyfile.Dispenser) error {
 | |
| 	d.Next() // consume filter name
 | |
| 	for d.NextBlock(0) {
 | |
| 		cfa := cookieFilterAction{}
 | |
| 		switch d.Val() {
 | |
| 		case "replace":
 | |
| 			if !d.NextArg() {
 | |
| 				return d.ArgErr()
 | |
| 			}
 | |
| 
 | |
| 			cfa.Type = replaceAction
 | |
| 			cfa.Name = d.Val()
 | |
| 
 | |
| 			if !d.NextArg() {
 | |
| 				return d.ArgErr()
 | |
| 			}
 | |
| 			cfa.Value = d.Val()
 | |
| 
 | |
| 		case "hash":
 | |
| 			if !d.NextArg() {
 | |
| 				return d.ArgErr()
 | |
| 			}
 | |
| 
 | |
| 			cfa.Type = hashAction
 | |
| 			cfa.Name = d.Val()
 | |
| 
 | |
| 		case "delete":
 | |
| 			if !d.NextArg() {
 | |
| 				return d.ArgErr()
 | |
| 			}
 | |
| 
 | |
| 			cfa.Type = deleteAction
 | |
| 			cfa.Name = d.Val()
 | |
| 
 | |
| 		default:
 | |
| 			return d.Errf("unrecognized subdirective %s", d.Val())
 | |
| 		}
 | |
| 
 | |
| 		m.Actions = append(m.Actions, cfa)
 | |
| 	}
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // Filter filters the input field.
 | |
| func (m CookieFilter) Filter(in zapcore.Field) zapcore.Field {
 | |
| 	cookiesSlice, ok := in.Interface.(caddyhttp.LoggableStringArray)
 | |
| 	if !ok {
 | |
| 		return in
 | |
| 	}
 | |
| 
 | |
| 	// using a dummy Request to make use of the Cookies() function to parse it
 | |
| 	originRequest := http.Request{Header: http.Header{"Cookie": cookiesSlice}}
 | |
| 	cookies := originRequest.Cookies()
 | |
| 	transformedRequest := http.Request{Header: make(http.Header)}
 | |
| 
 | |
| OUTER:
 | |
| 	for _, c := range cookies {
 | |
| 		for _, a := range m.Actions {
 | |
| 			if c.Name != a.Name {
 | |
| 				continue
 | |
| 			}
 | |
| 
 | |
| 			switch a.Type {
 | |
| 			case replaceAction:
 | |
| 				c.Value = a.Value
 | |
| 				transformedRequest.AddCookie(c)
 | |
| 				continue OUTER
 | |
| 
 | |
| 			case hashAction:
 | |
| 				c.Value = hash(c.Value)
 | |
| 				transformedRequest.AddCookie(c)
 | |
| 				continue OUTER
 | |
| 
 | |
| 			case deleteAction:
 | |
| 				continue OUTER
 | |
| 			}
 | |
| 		}
 | |
| 
 | |
| 		transformedRequest.AddCookie(c)
 | |
| 	}
 | |
| 
 | |
| 	in.Interface = caddyhttp.LoggableStringArray(transformedRequest.Header["Cookie"])
 | |
| 
 | |
| 	return in
 | |
| }
 | |
| 
 | |
| // RegexpFilter is a Caddy log field filter that
 | |
| // replaces the field matching the provided regexp
 | |
| // with the indicated string. If the field is an
 | |
| // array of strings, each of them will have the
 | |
| // regexp replacement applied.
 | |
| type RegexpFilter struct {
 | |
| 	// The regular expression pattern defining what to replace.
 | |
| 	RawRegexp string `json:"regexp,omitempty"`
 | |
| 
 | |
| 	// The value to use as replacement
 | |
| 	Value string `json:"value,omitempty"`
 | |
| 
 | |
| 	regexp *regexp.Regexp
 | |
| }
 | |
| 
 | |
| // CaddyModule returns the Caddy module information.
 | |
| func (RegexpFilter) CaddyModule() caddy.ModuleInfo {
 | |
| 	return caddy.ModuleInfo{
 | |
| 		ID:  "caddy.logging.encoders.filter.regexp",
 | |
| 		New: func() caddy.Module { return new(RegexpFilter) },
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // UnmarshalCaddyfile sets up the module from Caddyfile tokens.
 | |
| func (f *RegexpFilter) UnmarshalCaddyfile(d *caddyfile.Dispenser) error {
 | |
| 	d.Next() // consume filter name
 | |
| 	if d.NextArg() {
 | |
| 		f.RawRegexp = d.Val()
 | |
| 	}
 | |
| 	if d.NextArg() {
 | |
| 		f.Value = d.Val()
 | |
| 	}
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // Provision compiles m's regexp.
 | |
| func (m *RegexpFilter) Provision(ctx caddy.Context) error {
 | |
| 	r, err := regexp.Compile(m.RawRegexp)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	m.regexp = r
 | |
| 
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // Filter filters the input field with the replacement value if it matches the regexp.
 | |
| func (f *RegexpFilter) Filter(in zapcore.Field) zapcore.Field {
 | |
| 	if array, ok := in.Interface.(caddyhttp.LoggableStringArray); ok {
 | |
| 		newArray := make(caddyhttp.LoggableStringArray, len(array))
 | |
| 		for i, s := range array {
 | |
| 			newArray[i] = f.regexp.ReplaceAllString(s, f.Value)
 | |
| 		}
 | |
| 		in.Interface = newArray
 | |
| 	} else {
 | |
| 		in.String = f.regexp.ReplaceAllString(in.String, f.Value)
 | |
| 	}
 | |
| 
 | |
| 	return in
 | |
| }
 | |
| 
 | |
| // regexpFilterOperation represents a single regexp operation
 | |
| // within a MultiRegexpFilter.
 | |
| type regexpFilterOperation struct {
 | |
| 	// The regular expression pattern defining what to replace.
 | |
| 	RawRegexp string `json:"regexp,omitempty"`
 | |
| 
 | |
| 	// The value to use as replacement
 | |
| 	Value string `json:"value,omitempty"`
 | |
| 
 | |
| 	regexp *regexp.Regexp
 | |
| }
 | |
| 
 | |
| // MultiRegexpFilter is a Caddy log field filter that
 | |
| // can apply multiple regular expression replacements to
 | |
| // the same field. This filter processes operations in the
 | |
| // order they are defined, applying each regexp replacement
 | |
| // sequentially to the result of the previous operation.
 | |
| //
 | |
| // This allows users to define multiple regexp filters for
 | |
| // the same field without them overwriting each other.
 | |
| //
 | |
| // Security considerations:
 | |
| // - Uses Go's regexp package (RE2 engine) which is safe from ReDoS attacks
 | |
| // - Validates all patterns during provisioning
 | |
| // - Limits the maximum number of operations to prevent resource exhaustion
 | |
| // - Sanitizes input to prevent injection attacks
 | |
| type MultiRegexpFilter struct {
 | |
| 	// A list of regexp operations to apply in sequence.
 | |
| 	// Maximum of 50 operations allowed for security and performance.
 | |
| 	Operations []regexpFilterOperation `json:"operations"`
 | |
| }
 | |
| 
 | |
| // Security constants
 | |
| const (
 | |
| 	maxRegexpOperations = 50   // Maximum operations to prevent resource exhaustion
 | |
| 	maxPatternLength    = 1000 // Maximum pattern length to prevent abuse
 | |
| )
 | |
| 
 | |
| // CaddyModule returns the Caddy module information.
 | |
| func (MultiRegexpFilter) CaddyModule() caddy.ModuleInfo {
 | |
| 	return caddy.ModuleInfo{
 | |
| 		ID:  "caddy.logging.encoders.filter.multi_regexp",
 | |
| 		New: func() caddy.Module { return new(MultiRegexpFilter) },
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // UnmarshalCaddyfile sets up the module from Caddyfile tokens.
 | |
| // Syntax:
 | |
| //
 | |
| //	multi_regexp {
 | |
| //	    regexp <pattern> <replacement>
 | |
| //	    regexp <pattern> <replacement>
 | |
| //	    ...
 | |
| //	}
 | |
| func (f *MultiRegexpFilter) UnmarshalCaddyfile(d *caddyfile.Dispenser) error {
 | |
| 	d.Next() // consume filter name
 | |
| 	for d.NextBlock(0) {
 | |
| 		switch d.Val() {
 | |
| 		case "regexp":
 | |
| 			// Security check: limit number of operations
 | |
| 			if len(f.Operations) >= maxRegexpOperations {
 | |
| 				return d.Errf("too many regexp operations (maximum %d allowed)", maxRegexpOperations)
 | |
| 			}
 | |
| 
 | |
| 			op := regexpFilterOperation{}
 | |
| 			if !d.NextArg() {
 | |
| 				return d.ArgErr()
 | |
| 			}
 | |
| 			op.RawRegexp = d.Val()
 | |
| 
 | |
| 			// Security validation: check pattern length
 | |
| 			if len(op.RawRegexp) > maxPatternLength {
 | |
| 				return d.Errf("regexp pattern too long (maximum %d characters)", maxPatternLength)
 | |
| 			}
 | |
| 
 | |
| 			// Security validation: basic pattern validation
 | |
| 			if op.RawRegexp == "" {
 | |
| 				return d.Errf("regexp pattern cannot be empty")
 | |
| 			}
 | |
| 
 | |
| 			if !d.NextArg() {
 | |
| 				return d.ArgErr()
 | |
| 			}
 | |
| 			op.Value = d.Val()
 | |
| 			f.Operations = append(f.Operations, op)
 | |
| 		default:
 | |
| 			return d.Errf("unrecognized subdirective %s", d.Val())
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// Security check: ensure at least one operation is defined
 | |
| 	if len(f.Operations) == 0 {
 | |
| 		return d.Err("multi_regexp filter requires at least one regexp operation")
 | |
| 	}
 | |
| 
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // Provision compiles all regexp patterns with security validation.
 | |
| func (f *MultiRegexpFilter) Provision(ctx caddy.Context) error {
 | |
| 	// Security check: validate operation count
 | |
| 	if len(f.Operations) > maxRegexpOperations {
 | |
| 		return fmt.Errorf("too many regexp operations: %d (maximum %d allowed)", len(f.Operations), maxRegexpOperations)
 | |
| 	}
 | |
| 
 | |
| 	if len(f.Operations) == 0 {
 | |
| 		return fmt.Errorf("multi_regexp filter requires at least one operation")
 | |
| 	}
 | |
| 
 | |
| 	for i := range f.Operations {
 | |
| 		// Security validation: pattern length check
 | |
| 		if len(f.Operations[i].RawRegexp) > maxPatternLength {
 | |
| 			return fmt.Errorf("regexp pattern %d too long: %d characters (maximum %d)", i, len(f.Operations[i].RawRegexp), maxPatternLength)
 | |
| 		}
 | |
| 
 | |
| 		// Security validation: empty pattern check
 | |
| 		if f.Operations[i].RawRegexp == "" {
 | |
| 			return fmt.Errorf("regexp pattern %d cannot be empty", i)
 | |
| 		}
 | |
| 
 | |
| 		// Compile and validate the pattern (uses RE2 engine - safe from ReDoS)
 | |
| 		r, err := regexp.Compile(f.Operations[i].RawRegexp)
 | |
| 		if err != nil {
 | |
| 			return fmt.Errorf("compiling regexp pattern %d (%s): %v", i, f.Operations[i].RawRegexp, err)
 | |
| 		}
 | |
| 		f.Operations[i].regexp = r
 | |
| 	}
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // Validate ensures the filter is properly configured with security checks.
 | |
| func (f *MultiRegexpFilter) Validate() error {
 | |
| 	if len(f.Operations) == 0 {
 | |
| 		return fmt.Errorf("multi_regexp filter requires at least one operation")
 | |
| 	}
 | |
| 
 | |
| 	if len(f.Operations) > maxRegexpOperations {
 | |
| 		return fmt.Errorf("too many regexp operations: %d (maximum %d allowed)", len(f.Operations), maxRegexpOperations)
 | |
| 	}
 | |
| 
 | |
| 	for i, op := range f.Operations {
 | |
| 		if op.RawRegexp == "" {
 | |
| 			return fmt.Errorf("regexp pattern %d cannot be empty", i)
 | |
| 		}
 | |
| 		if len(op.RawRegexp) > maxPatternLength {
 | |
| 			return fmt.Errorf("regexp pattern %d too long: %d characters (maximum %d)", i, len(op.RawRegexp), maxPatternLength)
 | |
| 		}
 | |
| 		if op.regexp == nil {
 | |
| 			return fmt.Errorf("regexp pattern %d not compiled (call Provision first)", i)
 | |
| 		}
 | |
| 	}
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // Filter applies all regexp operations sequentially to the input field.
 | |
| // Input is sanitized and validated for security.
 | |
| func (f *MultiRegexpFilter) Filter(in zapcore.Field) zapcore.Field {
 | |
| 	if array, ok := in.Interface.(caddyhttp.LoggableStringArray); ok {
 | |
| 		newArray := make(caddyhttp.LoggableStringArray, len(array))
 | |
| 		for i, s := range array {
 | |
| 			newArray[i] = f.processString(s)
 | |
| 		}
 | |
| 		in.Interface = newArray
 | |
| 	} else {
 | |
| 		in.String = f.processString(in.String)
 | |
| 	}
 | |
| 
 | |
| 	return in
 | |
| }
 | |
| 
 | |
| // processString applies all regexp operations to a single string with input validation.
 | |
| func (f *MultiRegexpFilter) processString(s string) string {
 | |
| 	// Security: validate input string length to prevent resource exhaustion
 | |
| 	const maxInputLength = 1000000 // 1MB max input size
 | |
| 	if len(s) > maxInputLength {
 | |
| 		// Log warning but continue processing (truncated)
 | |
| 		s = s[:maxInputLength]
 | |
| 	}
 | |
| 
 | |
| 	result := s
 | |
| 	for _, op := range f.Operations {
 | |
| 		// Each regexp operation is applied sequentially
 | |
| 		// Using RE2 engine which is safe from ReDoS attacks
 | |
| 		result = op.regexp.ReplaceAllString(result, op.Value)
 | |
| 
 | |
| 		// Ensure result doesn't exceed max length after each operation
 | |
| 		if len(result) > maxInputLength {
 | |
| 			result = result[:maxInputLength]
 | |
| 		}
 | |
| 	}
 | |
| 	return result
 | |
| }
 | |
| 
 | |
| // AddOperation adds a single regexp operation to the filter with validation.
 | |
| // This is used when merging multiple RegexpFilter instances.
 | |
| func (f *MultiRegexpFilter) AddOperation(rawRegexp, value string) error {
 | |
| 	// Security checks
 | |
| 	if len(f.Operations) >= maxRegexpOperations {
 | |
| 		return fmt.Errorf("cannot add operation: maximum %d operations allowed", maxRegexpOperations)
 | |
| 	}
 | |
| 
 | |
| 	if rawRegexp == "" {
 | |
| 		return fmt.Errorf("regexp pattern cannot be empty")
 | |
| 	}
 | |
| 
 | |
| 	if len(rawRegexp) > maxPatternLength {
 | |
| 		return fmt.Errorf("regexp pattern too long: %d characters (maximum %d)", len(rawRegexp), maxPatternLength)
 | |
| 	}
 | |
| 
 | |
| 	f.Operations = append(f.Operations, regexpFilterOperation{
 | |
| 		RawRegexp: rawRegexp,
 | |
| 		Value:     value,
 | |
| 	})
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // RenameFilter is a Caddy log field filter that
 | |
| // renames the field's key with the indicated name.
 | |
| type RenameFilter struct {
 | |
| 	Name string `json:"name,omitempty"`
 | |
| }
 | |
| 
 | |
| // CaddyModule returns the Caddy module information.
 | |
| func (RenameFilter) CaddyModule() caddy.ModuleInfo {
 | |
| 	return caddy.ModuleInfo{
 | |
| 		ID:  "caddy.logging.encoders.filter.rename",
 | |
| 		New: func() caddy.Module { return new(RenameFilter) },
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // UnmarshalCaddyfile sets up the module from Caddyfile tokens.
 | |
| func (f *RenameFilter) UnmarshalCaddyfile(d *caddyfile.Dispenser) error {
 | |
| 	d.Next() // consume filter name
 | |
| 	if d.NextArg() {
 | |
| 		f.Name = d.Val()
 | |
| 	}
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // Filter renames the input field with the replacement name.
 | |
| func (f *RenameFilter) Filter(in zapcore.Field) zapcore.Field {
 | |
| 	in.Key = f.Name
 | |
| 	return in
 | |
| }
 | |
| 
 | |
| // Interface guards
 | |
| var (
 | |
| 	_ LogFieldFilter = (*DeleteFilter)(nil)
 | |
| 	_ LogFieldFilter = (*HashFilter)(nil)
 | |
| 	_ LogFieldFilter = (*ReplaceFilter)(nil)
 | |
| 	_ LogFieldFilter = (*IPMaskFilter)(nil)
 | |
| 	_ LogFieldFilter = (*QueryFilter)(nil)
 | |
| 	_ LogFieldFilter = (*CookieFilter)(nil)
 | |
| 	_ LogFieldFilter = (*RegexpFilter)(nil)
 | |
| 	_ LogFieldFilter = (*RenameFilter)(nil)
 | |
| 	_ LogFieldFilter = (*MultiRegexpFilter)(nil)
 | |
| 
 | |
| 	_ caddyfile.Unmarshaler = (*DeleteFilter)(nil)
 | |
| 	_ caddyfile.Unmarshaler = (*HashFilter)(nil)
 | |
| 	_ caddyfile.Unmarshaler = (*ReplaceFilter)(nil)
 | |
| 	_ caddyfile.Unmarshaler = (*IPMaskFilter)(nil)
 | |
| 	_ caddyfile.Unmarshaler = (*QueryFilter)(nil)
 | |
| 	_ caddyfile.Unmarshaler = (*CookieFilter)(nil)
 | |
| 	_ caddyfile.Unmarshaler = (*RegexpFilter)(nil)
 | |
| 	_ caddyfile.Unmarshaler = (*RenameFilter)(nil)
 | |
| 	_ caddyfile.Unmarshaler = (*MultiRegexpFilter)(nil)
 | |
| 
 | |
| 	_ caddy.Provisioner = (*IPMaskFilter)(nil)
 | |
| 	_ caddy.Provisioner = (*RegexpFilter)(nil)
 | |
| 	_ caddy.Provisioner = (*MultiRegexpFilter)(nil)
 | |
| 
 | |
| 	_ caddy.Validator = (*QueryFilter)(nil)
 | |
| 	_ caddy.Validator = (*MultiRegexpFilter)(nil)
 | |
| )
 |