| 
									
										
										
										
											2019-09-09 12:23:27 -06:00
										 |  |  | // Copyright 2015 Matthew Holt and The Caddy Authors | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // Licensed under the Apache License, Version 2.0 (the "License"); | 
					
						
							|  |  |  | // you may not use this file except in compliance with the License. | 
					
						
							|  |  |  | // You may obtain a copy of the License at | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | //     http://www.apache.org/licenses/LICENSE-2.0 | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // Unless required by applicable law or agreed to in writing, software | 
					
						
							|  |  |  | // distributed under the License is distributed on an "AS IS" BASIS, | 
					
						
							|  |  |  | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
					
						
							|  |  |  | // See the License for the specific language governing permissions and | 
					
						
							|  |  |  | // limitations under the License. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | package reverseproxy | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | import ( | 
					
						
							| 
									
										
										
										
											2020-02-27 20:56:24 -07:00
										 |  |  | 	"net" | 
					
						
							| 
									
										
										
										
											2019-09-09 12:23:27 -06:00
										 |  |  | 	"net/http" | 
					
						
							| 
									
										
										
										
											2020-02-27 20:56:24 -07:00
										 |  |  | 	"net/url" | 
					
						
							|  |  |  | 	"reflect" | 
					
						
							| 
									
										
										
										
											2019-09-09 12:23:27 -06:00
										 |  |  | 	"strconv" | 
					
						
							|  |  |  | 	"strings" | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	"github.com/caddyserver/caddy/v2" | 
					
						
							|  |  |  | 	"github.com/caddyserver/caddy/v2/caddyconfig" | 
					
						
							|  |  |  | 	"github.com/caddyserver/caddy/v2/caddyconfig/caddyfile" | 
					
						
							|  |  |  | 	"github.com/caddyserver/caddy/v2/caddyconfig/httpcaddyfile" | 
					
						
							|  |  |  | 	"github.com/caddyserver/caddy/v2/modules/caddyhttp" | 
					
						
							| 
									
										
										
										
											2019-09-20 13:13:49 -06:00
										 |  |  | 	"github.com/caddyserver/caddy/v2/modules/caddyhttp/headers" | 
					
						
							| 
									
										
										
										
											2019-09-09 12:23:27 -06:00
										 |  |  | 	"github.com/dustin/go-humanize" | 
					
						
							|  |  |  | ) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | func init() { | 
					
						
							|  |  |  | 	httpcaddyfile.RegisterHandlerDirective("reverse_proxy", parseCaddyfile) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | func parseCaddyfile(h httpcaddyfile.Helper) (caddyhttp.MiddlewareHandler, error) { | 
					
						
							|  |  |  | 	rp := new(Handler) | 
					
						
							|  |  |  | 	err := rp.UnmarshalCaddyfile(h.Dispenser) | 
					
						
							|  |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return nil, err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	return rp, nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // UnmarshalCaddyfile sets up the handler from Caddyfile tokens. Syntax: | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | //     reverse_proxy [<matcher>] [<upstreams...>] { | 
					
						
							|  |  |  | //         # upstreams | 
					
						
							|  |  |  | //         to <upstreams...> | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | //         # load balancing | 
					
						
							|  |  |  | //         lb_policy <name> [<options...>] | 
					
						
							|  |  |  | //         lb_try_duration <duration> | 
					
						
							|  |  |  | //         lb_try_interval <interval> | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | //         # active health checking | 
					
						
							|  |  |  | //         health_path <path> | 
					
						
							|  |  |  | //         health_port <port> | 
					
						
							|  |  |  | //         health_interval <interval> | 
					
						
							|  |  |  | //         health_timeout <duration> | 
					
						
							|  |  |  | //         health_status <status> | 
					
						
							|  |  |  | //         health_body <regexp> | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | //         # passive health checking | 
					
						
							|  |  |  | //         max_fails <num> | 
					
						
							|  |  |  | //         fail_duration <duration> | 
					
						
							|  |  |  | //         max_conns <num> | 
					
						
							|  |  |  | //         unhealthy_status <status> | 
					
						
							|  |  |  | //         unhealthy_latency <duration> | 
					
						
							|  |  |  | // | 
					
						
							| 
									
										
										
										
											2019-11-27 11:51:32 -07:00
										 |  |  | //         # streaming | 
					
						
							|  |  |  | //         flush_interval <duration> | 
					
						
							|  |  |  | // | 
					
						
							| 
									
										
										
										
											2019-09-20 13:13:49 -06:00
										 |  |  | //         # header manipulation | 
					
						
							|  |  |  | //         header_up   [+|-]<field> [<value|regexp> [<replacement>]] | 
					
						
							|  |  |  | //         header_down [+|-]<field> [<value|regexp> [<replacement>]] | 
					
						
							|  |  |  | // | 
					
						
							| 
									
										
										
										
											2019-09-09 12:23:27 -06:00
										 |  |  | //         # round trip | 
					
						
							|  |  |  | //         transport <name> { | 
					
						
							|  |  |  | //             ... | 
					
						
							|  |  |  | //         } | 
					
						
							|  |  |  | //     } | 
					
						
							|  |  |  | // | 
					
						
							| 
									
										
										
										
											2020-02-27 20:56:24 -07:00
										 |  |  | // Proxy upstream addresses should be network dial addresses such | 
					
						
							|  |  |  | // as `host:port`, or a URL such as `scheme://host:port`. Scheme | 
					
						
							|  |  |  | // and port may be inferred from other parts of the address/URL; if | 
					
						
							|  |  |  | // either are missing, defaults to HTTP. | 
					
						
							| 
									
										
										
										
											2019-09-09 12:23:27 -06:00
										 |  |  | func (h *Handler) UnmarshalCaddyfile(d *caddyfile.Dispenser) error { | 
					
						
							| 
									
										
										
										
											2020-02-27 20:56:24 -07:00
										 |  |  | 	// currently, all backends must use the same scheme/protocol (the | 
					
						
							|  |  |  | 	// underlying JSON does not yet support per-backend transports) | 
					
						
							|  |  |  | 	var commonScheme string | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// we'll wait until the very end of parsing before | 
					
						
							|  |  |  | 	// validating and encoding the transport | 
					
						
							|  |  |  | 	var transport http.RoundTripper | 
					
						
							|  |  |  | 	var transportModuleName string | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// TODO: the logic in this function is kind of sensitive, we need | 
					
						
							|  |  |  | 	// to write tests before making any more changes to it | 
					
						
							|  |  |  | 	upstreamDialAddress := func(upstreamAddr string) (string, error) { | 
					
						
							| 
									
										
										
										
											2020-02-28 08:57:59 -07:00
										 |  |  | 		var network, scheme, host, port string | 
					
						
							| 
									
										
										
										
											2020-02-27 20:56:24 -07:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2020-02-28 08:57:59 -07:00
										 |  |  | 		if strings.Contains(upstreamAddr, "://") { | 
					
						
							| 
									
										
										
										
											2020-05-26 16:13:15 -04:00
										 |  |  | 			// we get a parsing error if a placeholder is specified | 
					
						
							|  |  |  | 			// so we return a more user-friendly error message instead | 
					
						
							|  |  |  | 			// to explain what to do instead | 
					
						
							|  |  |  | 			if strings.Contains(upstreamAddr, "{") { | 
					
						
							|  |  |  | 				return "", d.Err("due to parsing difficulties, placeholders are not allowed when an upstream address contains a scheme") | 
					
						
							|  |  |  | 			} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2020-02-28 08:57:59 -07:00
										 |  |  | 			toURL, err := url.Parse(upstreamAddr) | 
					
						
							|  |  |  | 			if err != nil { | 
					
						
							|  |  |  | 				return "", d.Errf("parsing upstream URL: %v", err) | 
					
						
							|  |  |  | 			} | 
					
						
							| 
									
										
										
										
											2020-02-27 20:56:24 -07:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2020-02-28 08:57:59 -07:00
										 |  |  | 			// there is currently no way to perform a URL rewrite between choosing | 
					
						
							|  |  |  | 			// a backend and proxying to it, so we cannot allow extra components | 
					
						
							|  |  |  | 			// in backend URLs | 
					
						
							|  |  |  | 			if toURL.Path != "" || toURL.RawQuery != "" || toURL.Fragment != "" { | 
					
						
							|  |  |  | 				return "", d.Err("for now, URLs for proxy upstreams only support scheme, host, and port components") | 
					
						
							|  |  |  | 			} | 
					
						
							| 
									
										
										
										
											2020-02-27 20:56:24 -07:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2020-02-28 08:57:59 -07:00
										 |  |  | 			// ensure the port and scheme aren't in conflict | 
					
						
							|  |  |  | 			urlPort := toURL.Port() | 
					
						
							|  |  |  | 			if toURL.Scheme == "http" && urlPort == "443" { | 
					
						
							|  |  |  | 				return "", d.Err("upstream address has conflicting scheme (http://) and port (:443, the HTTPS port)") | 
					
						
							|  |  |  | 			} | 
					
						
							|  |  |  | 			if toURL.Scheme == "https" && urlPort == "80" { | 
					
						
							|  |  |  | 				return "", d.Err("upstream address has conflicting scheme (https://) and port (:80, the HTTP port)") | 
					
						
							|  |  |  | 			} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			// if port is missing, attempt to infer from scheme | 
					
						
							|  |  |  | 			if toURL.Port() == "" { | 
					
						
							|  |  |  | 				var toPort string | 
					
						
							|  |  |  | 				switch toURL.Scheme { | 
					
						
							|  |  |  | 				case "", "http": | 
					
						
							|  |  |  | 					toPort = "80" | 
					
						
							|  |  |  | 				case "https": | 
					
						
							|  |  |  | 					toPort = "443" | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				toURL.Host = net.JoinHostPort(toURL.Hostname(), toPort) | 
					
						
							|  |  |  | 			} | 
					
						
							| 
									
										
										
										
											2020-02-27 20:56:24 -07:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2020-02-28 08:57:59 -07:00
										 |  |  | 			scheme, host, port = toURL.Scheme, toURL.Hostname(), toURL.Port() | 
					
						
							|  |  |  | 		} else { | 
					
						
							|  |  |  | 			// extract network manually, since caddy.ParseNetworkAddress() will always add one | 
					
						
							|  |  |  | 			if idx := strings.Index(upstreamAddr, "/"); idx >= 0 { | 
					
						
							|  |  |  | 				network = strings.ToLower(strings.TrimSpace(upstreamAddr[:idx])) | 
					
						
							|  |  |  | 				upstreamAddr = upstreamAddr[idx+1:] | 
					
						
							|  |  |  | 			} | 
					
						
							|  |  |  | 			var err error | 
					
						
							|  |  |  | 			host, port, err = net.SplitHostPort(upstreamAddr) | 
					
						
							|  |  |  | 			if err != nil { | 
					
						
							|  |  |  | 				host = upstreamAddr | 
					
						
							| 
									
										
										
										
											2020-02-27 20:56:24 -07:00
										 |  |  | 			} | 
					
						
							| 
									
										
										
										
											2020-10-01 22:53:19 +03:00
										 |  |  | 			if port == "" { | 
					
						
							|  |  |  | 				port = "80" | 
					
						
							|  |  |  | 			} | 
					
						
							| 
									
										
										
										
											2020-02-27 20:56:24 -07:00
										 |  |  | 		} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		// the underlying JSON does not yet support different | 
					
						
							|  |  |  | 		// transports (protocols or schemes) to each backend, | 
					
						
							|  |  |  | 		// so we remember the last one we see and compare them | 
					
						
							| 
									
										
										
										
											2020-02-28 08:57:59 -07:00
										 |  |  | 		if commonScheme != "" && scheme != commonScheme { | 
					
						
							| 
									
										
										
										
											2020-02-27 20:56:24 -07:00
										 |  |  | 			return "", d.Errf("for now, all proxy upstreams must use the same scheme (transport protocol); expecting '%s://' but got '%s://'", | 
					
						
							| 
									
										
										
										
											2020-02-28 08:57:59 -07:00
										 |  |  | 				commonScheme, scheme) | 
					
						
							| 
									
										
										
										
											2020-02-27 20:56:24 -07:00
										 |  |  | 		} | 
					
						
							| 
									
										
										
										
											2020-02-28 08:57:59 -07:00
										 |  |  | 		commonScheme = scheme | 
					
						
							| 
									
										
										
										
											2020-02-27 20:56:24 -07:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2020-02-28 08:57:59 -07:00
										 |  |  | 		// for simplest possible config, we only need to include | 
					
						
							|  |  |  | 		// the network portion if the user specified one | 
					
						
							|  |  |  | 		if network != "" { | 
					
						
							|  |  |  | 			return caddy.JoinNetworkAddress(network, host, port), nil | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 		return net.JoinHostPort(host, port), nil | 
					
						
							| 
									
										
										
										
											2020-02-27 20:56:24 -07:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2020-03-24 10:53:53 -06:00
										 |  |  | 	// appendUpstream creates an upstream for address and adds | 
					
						
							|  |  |  | 	// it to the list. If the address starts with "srv+" it is | 
					
						
							|  |  |  | 	// treated as a SRV-based upstream, and any port will be | 
					
						
							|  |  |  | 	// dropped. | 
					
						
							|  |  |  | 	appendUpstream := func(address string) error { | 
					
						
							|  |  |  | 		isSRV := strings.HasPrefix(address, "srv+") | 
					
						
							|  |  |  | 		if isSRV { | 
					
						
							|  |  |  | 			address = strings.TrimPrefix(address, "srv+") | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 		dialAddr, err := upstreamDialAddress(address) | 
					
						
							|  |  |  | 		if err != nil { | 
					
						
							|  |  |  | 			return err | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 		if isSRV { | 
					
						
							|  |  |  | 			if host, _, err := net.SplitHostPort(dialAddr); err == nil { | 
					
						
							|  |  |  | 				dialAddr = host | 
					
						
							|  |  |  | 			} | 
					
						
							|  |  |  | 			h.Upstreams = append(h.Upstreams, &Upstream{LookupSRV: dialAddr}) | 
					
						
							|  |  |  | 		} else { | 
					
						
							|  |  |  | 			h.Upstreams = append(h.Upstreams, &Upstream{Dial: dialAddr}) | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 		return nil | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-09-09 12:23:27 -06:00
										 |  |  | 	for d.Next() { | 
					
						
							|  |  |  | 		for _, up := range d.RemainingArgs() { | 
					
						
							| 
									
										
										
										
											2020-03-24 10:53:53 -06:00
										 |  |  | 			err := appendUpstream(up) | 
					
						
							| 
									
										
										
										
											2020-02-27 20:56:24 -07:00
										 |  |  | 			if err != nil { | 
					
						
							|  |  |  | 				return err | 
					
						
							|  |  |  | 			} | 
					
						
							| 
									
										
										
										
											2019-09-09 12:23:27 -06:00
										 |  |  | 		} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-09-10 19:21:52 -06:00
										 |  |  | 		for d.NextBlock(0) { | 
					
						
							| 
									
										
										
										
											2019-09-09 12:23:27 -06:00
										 |  |  | 			switch d.Val() { | 
					
						
							|  |  |  | 			case "to": | 
					
						
							|  |  |  | 				args := d.RemainingArgs() | 
					
						
							|  |  |  | 				if len(args) == 0 { | 
					
						
							|  |  |  | 					return d.ArgErr() | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				for _, up := range args { | 
					
						
							| 
									
										
										
										
											2020-03-24 10:53:53 -06:00
										 |  |  | 					err := appendUpstream(up) | 
					
						
							| 
									
										
										
										
											2020-02-27 20:56:24 -07:00
										 |  |  | 					if err != nil { | 
					
						
							|  |  |  | 						return err | 
					
						
							|  |  |  | 					} | 
					
						
							| 
									
										
										
										
											2019-09-09 12:23:27 -06:00
										 |  |  | 				} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			case "lb_policy": | 
					
						
							|  |  |  | 				if !d.NextArg() { | 
					
						
							|  |  |  | 					return d.ArgErr() | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				if h.LoadBalancing != nil && h.LoadBalancing.SelectionPolicyRaw != nil { | 
					
						
							|  |  |  | 					return d.Err("load balancing selection policy already specified") | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				name := d.Val() | 
					
						
							| 
									
										
										
										
											2019-12-12 14:31:20 -07:00
										 |  |  | 				mod, err := caddy.GetModule("http.reverse_proxy.selection_policies." + name) | 
					
						
							| 
									
										
										
										
											2019-09-09 12:23:27 -06:00
										 |  |  | 				if err != nil { | 
					
						
							| 
									
										
										
										
											2019-12-10 13:36:46 -07:00
										 |  |  | 					return d.Errf("getting load balancing policy module '%s': %v", mod, err) | 
					
						
							| 
									
										
										
										
											2019-09-09 12:23:27 -06:00
										 |  |  | 				} | 
					
						
							|  |  |  | 				unm, ok := mod.New().(caddyfile.Unmarshaler) | 
					
						
							|  |  |  | 				if !ok { | 
					
						
							| 
									
										
										
										
											2019-12-10 13:36:46 -07:00
										 |  |  | 					return d.Errf("load balancing policy module '%s' is not a Caddyfile unmarshaler", mod) | 
					
						
							| 
									
										
										
										
											2019-09-09 12:23:27 -06:00
										 |  |  | 				} | 
					
						
							| 
									
										
										
										
											2020-02-14 11:00:16 -07:00
										 |  |  | 				err = unm.UnmarshalCaddyfile(d.NewFromNextSegment()) | 
					
						
							| 
									
										
										
										
											2019-09-09 12:23:27 -06:00
										 |  |  | 				if err != nil { | 
					
						
							|  |  |  | 					return err | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				sel, ok := unm.(Selector) | 
					
						
							|  |  |  | 				if !ok { | 
					
						
							| 
									
										
										
										
											2019-12-10 13:36:46 -07:00
										 |  |  | 					return d.Errf("module %s is not a Selector", mod) | 
					
						
							| 
									
										
										
										
											2019-09-09 12:23:27 -06:00
										 |  |  | 				} | 
					
						
							|  |  |  | 				if h.LoadBalancing == nil { | 
					
						
							|  |  |  | 					h.LoadBalancing = new(LoadBalancing) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				h.LoadBalancing.SelectionPolicyRaw = caddyconfig.JSONModuleObject(sel, "policy", name, nil) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			case "lb_try_duration": | 
					
						
							|  |  |  | 				if !d.NextArg() { | 
					
						
							|  |  |  | 					return d.ArgErr() | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				if h.LoadBalancing == nil { | 
					
						
							|  |  |  | 					h.LoadBalancing = new(LoadBalancing) | 
					
						
							|  |  |  | 				} | 
					
						
							| 
									
										
										
										
											2020-05-11 18:41:11 -04:00
										 |  |  | 				dur, err := caddy.ParseDuration(d.Val()) | 
					
						
							| 
									
										
										
										
											2019-09-09 12:23:27 -06:00
										 |  |  | 				if err != nil { | 
					
						
							|  |  |  | 					return d.Errf("bad duration value %s: %v", d.Val(), err) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				h.LoadBalancing.TryDuration = caddy.Duration(dur) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			case "lb_try_interval": | 
					
						
							|  |  |  | 				if !d.NextArg() { | 
					
						
							|  |  |  | 					return d.ArgErr() | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				if h.LoadBalancing == nil { | 
					
						
							|  |  |  | 					h.LoadBalancing = new(LoadBalancing) | 
					
						
							|  |  |  | 				} | 
					
						
							| 
									
										
										
										
											2020-05-11 18:41:11 -04:00
										 |  |  | 				dur, err := caddy.ParseDuration(d.Val()) | 
					
						
							| 
									
										
										
										
											2019-09-09 12:23:27 -06:00
										 |  |  | 				if err != nil { | 
					
						
							|  |  |  | 					return d.Errf("bad interval value '%s': %v", d.Val(), err) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				h.LoadBalancing.TryInterval = caddy.Duration(dur) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			case "health_path": | 
					
						
							|  |  |  | 				if !d.NextArg() { | 
					
						
							|  |  |  | 					return d.ArgErr() | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				if h.HealthChecks == nil { | 
					
						
							|  |  |  | 					h.HealthChecks = new(HealthChecks) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				if h.HealthChecks.Active == nil { | 
					
						
							|  |  |  | 					h.HealthChecks.Active = new(ActiveHealthChecks) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				h.HealthChecks.Active.Path = d.Val() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			case "health_port": | 
					
						
							|  |  |  | 				if !d.NextArg() { | 
					
						
							|  |  |  | 					return d.ArgErr() | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				if h.HealthChecks == nil { | 
					
						
							|  |  |  | 					h.HealthChecks = new(HealthChecks) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				if h.HealthChecks.Active == nil { | 
					
						
							|  |  |  | 					h.HealthChecks.Active = new(ActiveHealthChecks) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				portNum, err := strconv.Atoi(d.Val()) | 
					
						
							|  |  |  | 				if err != nil { | 
					
						
							|  |  |  | 					return d.Errf("bad port number '%s': %v", d.Val(), err) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				h.HealthChecks.Active.Port = portNum | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			case "health_interval": | 
					
						
							|  |  |  | 				if !d.NextArg() { | 
					
						
							|  |  |  | 					return d.ArgErr() | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				if h.HealthChecks == nil { | 
					
						
							|  |  |  | 					h.HealthChecks = new(HealthChecks) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				if h.HealthChecks.Active == nil { | 
					
						
							|  |  |  | 					h.HealthChecks.Active = new(ActiveHealthChecks) | 
					
						
							|  |  |  | 				} | 
					
						
							| 
									
										
										
										
											2020-05-11 18:41:11 -04:00
										 |  |  | 				dur, err := caddy.ParseDuration(d.Val()) | 
					
						
							| 
									
										
										
										
											2019-09-09 12:23:27 -06:00
										 |  |  | 				if err != nil { | 
					
						
							|  |  |  | 					return d.Errf("bad interval value %s: %v", d.Val(), err) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				h.HealthChecks.Active.Interval = caddy.Duration(dur) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			case "health_timeout": | 
					
						
							|  |  |  | 				if !d.NextArg() { | 
					
						
							|  |  |  | 					return d.ArgErr() | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				if h.HealthChecks == nil { | 
					
						
							|  |  |  | 					h.HealthChecks = new(HealthChecks) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				if h.HealthChecks.Active == nil { | 
					
						
							|  |  |  | 					h.HealthChecks.Active = new(ActiveHealthChecks) | 
					
						
							|  |  |  | 				} | 
					
						
							| 
									
										
										
										
											2020-05-11 18:41:11 -04:00
										 |  |  | 				dur, err := caddy.ParseDuration(d.Val()) | 
					
						
							| 
									
										
										
										
											2019-09-09 12:23:27 -06:00
										 |  |  | 				if err != nil { | 
					
						
							|  |  |  | 					return d.Errf("bad timeout value %s: %v", d.Val(), err) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				h.HealthChecks.Active.Timeout = caddy.Duration(dur) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			case "health_status": | 
					
						
							|  |  |  | 				if !d.NextArg() { | 
					
						
							|  |  |  | 					return d.ArgErr() | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				if h.HealthChecks == nil { | 
					
						
							|  |  |  | 					h.HealthChecks = new(HealthChecks) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				if h.HealthChecks.Active == nil { | 
					
						
							|  |  |  | 					h.HealthChecks.Active = new(ActiveHealthChecks) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				val := d.Val() | 
					
						
							|  |  |  | 				if len(val) == 3 && strings.HasSuffix(val, "xx") { | 
					
						
							|  |  |  | 					val = val[:1] | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				statusNum, err := strconv.Atoi(val[:1]) | 
					
						
							|  |  |  | 				if err != nil { | 
					
						
							|  |  |  | 					return d.Errf("bad status value '%s': %v", d.Val(), err) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				h.HealthChecks.Active.ExpectStatus = statusNum | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			case "health_body": | 
					
						
							|  |  |  | 				if !d.NextArg() { | 
					
						
							|  |  |  | 					return d.ArgErr() | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				if h.HealthChecks == nil { | 
					
						
							|  |  |  | 					h.HealthChecks = new(HealthChecks) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				if h.HealthChecks.Active == nil { | 
					
						
							|  |  |  | 					h.HealthChecks.Active = new(ActiveHealthChecks) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				h.HealthChecks.Active.ExpectBody = d.Val() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			case "max_fails": | 
					
						
							|  |  |  | 				if !d.NextArg() { | 
					
						
							|  |  |  | 					return d.ArgErr() | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				if h.HealthChecks == nil { | 
					
						
							|  |  |  | 					h.HealthChecks = new(HealthChecks) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				if h.HealthChecks.Passive == nil { | 
					
						
							|  |  |  | 					h.HealthChecks.Passive = new(PassiveHealthChecks) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				maxFails, err := strconv.Atoi(d.Val()) | 
					
						
							|  |  |  | 				if err != nil { | 
					
						
							|  |  |  | 					return d.Errf("invalid maximum fail count '%s': %v", d.Val(), err) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				h.HealthChecks.Passive.MaxFails = maxFails | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			case "fail_duration": | 
					
						
							|  |  |  | 				if !d.NextArg() { | 
					
						
							|  |  |  | 					return d.ArgErr() | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				if h.HealthChecks == nil { | 
					
						
							|  |  |  | 					h.HealthChecks = new(HealthChecks) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				if h.HealthChecks.Passive == nil { | 
					
						
							|  |  |  | 					h.HealthChecks.Passive = new(PassiveHealthChecks) | 
					
						
							|  |  |  | 				} | 
					
						
							| 
									
										
										
										
											2020-05-11 18:41:11 -04:00
										 |  |  | 				dur, err := caddy.ParseDuration(d.Val()) | 
					
						
							| 
									
										
										
										
											2019-09-09 12:23:27 -06:00
										 |  |  | 				if err != nil { | 
					
						
							|  |  |  | 					return d.Errf("bad duration value '%s': %v", d.Val(), err) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				h.HealthChecks.Passive.FailDuration = caddy.Duration(dur) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			case "unhealthy_request_count": | 
					
						
							|  |  |  | 				if !d.NextArg() { | 
					
						
							|  |  |  | 					return d.ArgErr() | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				if h.HealthChecks == nil { | 
					
						
							|  |  |  | 					h.HealthChecks = new(HealthChecks) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				if h.HealthChecks.Passive == nil { | 
					
						
							|  |  |  | 					h.HealthChecks.Passive = new(PassiveHealthChecks) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				maxConns, err := strconv.Atoi(d.Val()) | 
					
						
							|  |  |  | 				if err != nil { | 
					
						
							|  |  |  | 					return d.Errf("invalid maximum connection count '%s': %v", d.Val(), err) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				h.HealthChecks.Passive.UnhealthyRequestCount = maxConns | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			case "unhealthy_status": | 
					
						
							|  |  |  | 				args := d.RemainingArgs() | 
					
						
							|  |  |  | 				if len(args) == 0 { | 
					
						
							|  |  |  | 					return d.ArgErr() | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				if h.HealthChecks == nil { | 
					
						
							|  |  |  | 					h.HealthChecks = new(HealthChecks) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				if h.HealthChecks.Passive == nil { | 
					
						
							|  |  |  | 					h.HealthChecks.Passive = new(PassiveHealthChecks) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				for _, arg := range args { | 
					
						
							|  |  |  | 					if len(arg) == 3 && strings.HasSuffix(arg, "xx") { | 
					
						
							|  |  |  | 						arg = arg[:1] | 
					
						
							|  |  |  | 					} | 
					
						
							|  |  |  | 					statusNum, err := strconv.Atoi(arg[:1]) | 
					
						
							|  |  |  | 					if err != nil { | 
					
						
							|  |  |  | 						return d.Errf("bad status value '%s': %v", d.Val(), err) | 
					
						
							|  |  |  | 					} | 
					
						
							|  |  |  | 					h.HealthChecks.Passive.UnhealthyStatus = append(h.HealthChecks.Passive.UnhealthyStatus, statusNum) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			case "unhealthy_latency": | 
					
						
							|  |  |  | 				if !d.NextArg() { | 
					
						
							|  |  |  | 					return d.ArgErr() | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				if h.HealthChecks == nil { | 
					
						
							|  |  |  | 					h.HealthChecks = new(HealthChecks) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				if h.HealthChecks.Passive == nil { | 
					
						
							|  |  |  | 					h.HealthChecks.Passive = new(PassiveHealthChecks) | 
					
						
							|  |  |  | 				} | 
					
						
							| 
									
										
										
										
											2020-05-11 18:41:11 -04:00
										 |  |  | 				dur, err := caddy.ParseDuration(d.Val()) | 
					
						
							| 
									
										
										
										
											2019-09-09 12:23:27 -06:00
										 |  |  | 				if err != nil { | 
					
						
							|  |  |  | 					return d.Errf("bad duration value '%s': %v", d.Val(), err) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				h.HealthChecks.Passive.UnhealthyLatency = caddy.Duration(dur) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-11-27 11:51:32 -07:00
										 |  |  | 			case "flush_interval": | 
					
						
							|  |  |  | 				if !d.NextArg() { | 
					
						
							|  |  |  | 					return d.ArgErr() | 
					
						
							|  |  |  | 				} | 
					
						
							| 
									
										
										
										
											2020-01-22 09:34:16 -07:00
										 |  |  | 				if fi, err := strconv.Atoi(d.Val()); err == nil { | 
					
						
							|  |  |  | 					h.FlushInterval = caddy.Duration(fi) | 
					
						
							|  |  |  | 				} else { | 
					
						
							| 
									
										
										
										
											2020-05-11 18:41:11 -04:00
										 |  |  | 					dur, err := caddy.ParseDuration(d.Val()) | 
					
						
							| 
									
										
										
										
											2020-01-22 09:34:16 -07:00
										 |  |  | 					if err != nil { | 
					
						
							|  |  |  | 						return d.Errf("bad duration value '%s': %v", d.Val(), err) | 
					
						
							|  |  |  | 					} | 
					
						
							|  |  |  | 					h.FlushInterval = caddy.Duration(dur) | 
					
						
							| 
									
										
										
										
											2019-11-27 11:51:32 -07:00
										 |  |  | 				} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2020-09-08 12:37:46 -04:00
										 |  |  | 			case "buffer_requests": | 
					
						
							|  |  |  | 				if d.NextArg() { | 
					
						
							|  |  |  | 					return d.ArgErr() | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				h.BufferRequests = true | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-09-20 13:13:49 -06:00
										 |  |  | 			case "header_up": | 
					
						
							|  |  |  | 				if h.Headers == nil { | 
					
						
							|  |  |  | 					h.Headers = new(headers.Handler) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				if h.Headers.Request == nil { | 
					
						
							|  |  |  | 					h.Headers.Request = new(headers.HeaderOps) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				args := d.RemainingArgs() | 
					
						
							|  |  |  | 				switch len(args) { | 
					
						
							|  |  |  | 				case 1: | 
					
						
							|  |  |  | 					headers.CaddyfileHeaderOp(h.Headers.Request, args[0], "", "") | 
					
						
							|  |  |  | 				case 2: | 
					
						
							|  |  |  | 					headers.CaddyfileHeaderOp(h.Headers.Request, args[0], args[1], "") | 
					
						
							|  |  |  | 				case 3: | 
					
						
							|  |  |  | 					headers.CaddyfileHeaderOp(h.Headers.Request, args[0], args[1], args[2]) | 
					
						
							|  |  |  | 				default: | 
					
						
							|  |  |  | 					return d.ArgErr() | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			case "header_down": | 
					
						
							|  |  |  | 				if h.Headers == nil { | 
					
						
							|  |  |  | 					h.Headers = new(headers.Handler) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				if h.Headers.Response == nil { | 
					
						
							|  |  |  | 					h.Headers.Response = &headers.RespHeaderOps{ | 
					
						
							|  |  |  | 						HeaderOps: new(headers.HeaderOps), | 
					
						
							|  |  |  | 					} | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				args := d.RemainingArgs() | 
					
						
							|  |  |  | 				switch len(args) { | 
					
						
							|  |  |  | 				case 1: | 
					
						
							|  |  |  | 					headers.CaddyfileHeaderOp(h.Headers.Response.HeaderOps, args[0], "", "") | 
					
						
							|  |  |  | 				case 2: | 
					
						
							|  |  |  | 					headers.CaddyfileHeaderOp(h.Headers.Response.HeaderOps, args[0], args[1], "") | 
					
						
							|  |  |  | 				case 3: | 
					
						
							|  |  |  | 					headers.CaddyfileHeaderOp(h.Headers.Response.HeaderOps, args[0], args[1], args[2]) | 
					
						
							|  |  |  | 				default: | 
					
						
							|  |  |  | 					return d.ArgErr() | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-09-09 12:23:27 -06:00
										 |  |  | 			case "transport": | 
					
						
							|  |  |  | 				if !d.NextArg() { | 
					
						
							|  |  |  | 					return d.ArgErr() | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				if h.TransportRaw != nil { | 
					
						
							|  |  |  | 					return d.Err("transport already specified") | 
					
						
							|  |  |  | 				} | 
					
						
							| 
									
										
										
										
											2020-02-27 20:56:24 -07:00
										 |  |  | 				transportModuleName = d.Val() | 
					
						
							|  |  |  | 				mod, err := caddy.GetModule("http.reverse_proxy.transport." + transportModuleName) | 
					
						
							| 
									
										
										
										
											2019-09-09 12:23:27 -06:00
										 |  |  | 				if err != nil { | 
					
						
							| 
									
										
										
										
											2019-12-10 13:36:46 -07:00
										 |  |  | 					return d.Errf("getting transport module '%s': %v", mod, err) | 
					
						
							| 
									
										
										
										
											2019-09-09 12:23:27 -06:00
										 |  |  | 				} | 
					
						
							|  |  |  | 				unm, ok := mod.New().(caddyfile.Unmarshaler) | 
					
						
							|  |  |  | 				if !ok { | 
					
						
							| 
									
										
										
										
											2019-12-10 13:36:46 -07:00
										 |  |  | 					return d.Errf("transport module '%s' is not a Caddyfile unmarshaler", mod) | 
					
						
							| 
									
										
										
										
											2019-09-09 12:23:27 -06:00
										 |  |  | 				} | 
					
						
							| 
									
										
										
										
											2020-02-14 11:00:16 -07:00
										 |  |  | 				err = unm.UnmarshalCaddyfile(d.NewFromNextSegment()) | 
					
						
							| 
									
										
										
										
											2019-09-09 12:23:27 -06:00
										 |  |  | 				if err != nil { | 
					
						
							|  |  |  | 					return err | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				rt, ok := unm.(http.RoundTripper) | 
					
						
							|  |  |  | 				if !ok { | 
					
						
							| 
									
										
										
										
											2019-12-10 13:36:46 -07:00
										 |  |  | 					return d.Errf("module %s is not a RoundTripper", mod) | 
					
						
							| 
									
										
										
										
											2019-09-09 12:23:27 -06:00
										 |  |  | 				} | 
					
						
							| 
									
										
										
										
											2020-02-27 20:56:24 -07:00
										 |  |  | 				transport = rt | 
					
						
							| 
									
										
										
										
											2019-09-09 12:23:27 -06:00
										 |  |  | 
 | 
					
						
							|  |  |  | 			default: | 
					
						
							|  |  |  | 				return d.Errf("unrecognized subdirective %s", d.Val()) | 
					
						
							|  |  |  | 			} | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2020-02-27 20:56:24 -07:00
										 |  |  | 	// if the scheme inferred from the backends' addresses is | 
					
						
							|  |  |  | 	// HTTPS, we will need a non-nil transport to enable TLS | 
					
						
							|  |  |  | 	if commonScheme == "https" && transport == nil { | 
					
						
							|  |  |  | 		transport = new(HTTPTransport) | 
					
						
							|  |  |  | 		transportModuleName = "http" | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// verify transport configuration, and finally encode it | 
					
						
							|  |  |  | 	if transport != nil { | 
					
						
							| 
									
										
										
										
											2020-04-07 08:31:52 -06:00
										 |  |  | 		if te, ok := transport.(TLSTransport); ok { | 
					
						
							|  |  |  | 			if commonScheme == "https" && !te.TLSEnabled() { | 
					
						
							|  |  |  | 				err := te.EnableTLS(new(TLSConfig)) | 
					
						
							|  |  |  | 				if err != nil { | 
					
						
							|  |  |  | 					return err | 
					
						
							|  |  |  | 				} | 
					
						
							| 
									
										
										
										
											2020-02-27 20:56:24 -07:00
										 |  |  | 			} | 
					
						
							| 
									
										
										
										
											2020-04-07 08:31:52 -06:00
										 |  |  | 			if commonScheme == "http" && te.TLSEnabled() { | 
					
						
							| 
									
										
										
										
											2020-02-27 20:56:24 -07:00
										 |  |  | 				return d.Errf("upstream address scheme is HTTP but transport is configured for HTTP+TLS (HTTPS)") | 
					
						
							|  |  |  | 			} | 
					
						
							| 
									
										
										
										
											2020-04-07 08:31:52 -06:00
										 |  |  | 		} else if commonScheme == "https" { | 
					
						
							|  |  |  | 			return d.Errf("upstreams are configured for HTTPS but transport module does not support TLS: %T", transport) | 
					
						
							| 
									
										
										
										
											2020-02-27 20:56:24 -07:00
										 |  |  | 		} | 
					
						
							| 
									
										
										
										
											2020-07-17 15:18:32 -04:00
										 |  |  | 
 | 
					
						
							|  |  |  | 		// no need to encode empty default transport | 
					
						
							|  |  |  | 		if !reflect.DeepEqual(transport, new(HTTPTransport)) { | 
					
						
							| 
									
										
										
										
											2020-02-27 20:56:24 -07:00
										 |  |  | 			h.TransportRaw = caddyconfig.JSONModuleObject(transport, "protocol", transportModuleName, nil) | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-09-09 12:23:27 -06:00
										 |  |  | 	return nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // UnmarshalCaddyfile deserializes Caddyfile tokens into h. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | //     transport http { | 
					
						
							|  |  |  | //         read_buffer  <size> | 
					
						
							|  |  |  | //         write_buffer <size> | 
					
						
							|  |  |  | //         dial_timeout <duration> | 
					
						
							|  |  |  | //         tls_client_auth <cert_file> <key_file> | 
					
						
							|  |  |  | //         tls_insecure_skip_verify | 
					
						
							|  |  |  | //         tls_timeout <duration> | 
					
						
							| 
									
										
										
										
											2020-01-07 11:07:42 -08:00
										 |  |  | //         tls_trusted_ca_certs <cert_files...> | 
					
						
							| 
									
										
										
										
											2019-09-09 12:23:27 -06:00
										 |  |  | //         keepalive [off|<duration>] | 
					
						
							|  |  |  | //         keepalive_idle_conns <max_count> | 
					
						
							| 
									
										
										
										
											2020-05-05 12:33:21 -06:00
										 |  |  | //         versions <versions...> | 
					
						
							| 
									
										
										
										
											2019-09-09 12:23:27 -06:00
										 |  |  | //     } | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | func (h *HTTPTransport) UnmarshalCaddyfile(d *caddyfile.Dispenser) error { | 
					
						
							| 
									
										
										
										
											2019-09-11 18:53:44 -06:00
										 |  |  | 	for d.Next() { | 
					
						
							|  |  |  | 		for d.NextBlock(0) { | 
					
						
							|  |  |  | 			switch d.Val() { | 
					
						
							|  |  |  | 			case "read_buffer": | 
					
						
							|  |  |  | 				if !d.NextArg() { | 
					
						
							|  |  |  | 					return d.ArgErr() | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				size, err := humanize.ParseBytes(d.Val()) | 
					
						
							|  |  |  | 				if err != nil { | 
					
						
							|  |  |  | 					return d.Errf("invalid read buffer size '%s': %v", d.Val(), err) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				h.ReadBufferSize = int(size) | 
					
						
							| 
									
										
										
										
											2019-09-09 12:23:27 -06:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-09-11 18:53:44 -06:00
										 |  |  | 			case "write_buffer": | 
					
						
							|  |  |  | 				if !d.NextArg() { | 
					
						
							|  |  |  | 					return d.ArgErr() | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				size, err := humanize.ParseBytes(d.Val()) | 
					
						
							|  |  |  | 				if err != nil { | 
					
						
							|  |  |  | 					return d.Errf("invalid write buffer size '%s': %v", d.Val(), err) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				h.WriteBufferSize = int(size) | 
					
						
							| 
									
										
										
										
											2019-09-09 12:23:27 -06:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-09-11 18:53:44 -06:00
										 |  |  | 			case "dial_timeout": | 
					
						
							|  |  |  | 				if !d.NextArg() { | 
					
						
							|  |  |  | 					return d.ArgErr() | 
					
						
							|  |  |  | 				} | 
					
						
							| 
									
										
										
										
											2020-05-11 18:41:11 -04:00
										 |  |  | 				dur, err := caddy.ParseDuration(d.Val()) | 
					
						
							| 
									
										
										
										
											2019-09-11 18:53:44 -06:00
										 |  |  | 				if err != nil { | 
					
						
							|  |  |  | 					return d.Errf("bad timeout value '%s': %v", d.Val(), err) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				h.DialTimeout = caddy.Duration(dur) | 
					
						
							| 
									
										
										
										
											2019-09-09 12:23:27 -06:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-09-11 18:53:44 -06:00
										 |  |  | 			case "tls_client_auth": | 
					
						
							|  |  |  | 				if h.TLS == nil { | 
					
						
							|  |  |  | 					h.TLS = new(TLSConfig) | 
					
						
							|  |  |  | 				} | 
					
						
							| 
									
										
										
										
											2020-06-08 10:30:26 -06:00
										 |  |  | 				args := d.RemainingArgs() | 
					
						
							|  |  |  | 				switch len(args) { | 
					
						
							|  |  |  | 				case 1: | 
					
						
							|  |  |  | 					h.TLS.ClientCertificateAutomate = args[0] | 
					
						
							|  |  |  | 				case 2: | 
					
						
							|  |  |  | 					h.TLS.ClientCertificateFile = args[0] | 
					
						
							|  |  |  | 					h.TLS.ClientCertificateKeyFile = args[1] | 
					
						
							|  |  |  | 				default: | 
					
						
							|  |  |  | 					return d.ArgErr() | 
					
						
							|  |  |  | 				} | 
					
						
							| 
									
										
										
										
											2019-09-09 12:23:27 -06:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-09-11 18:53:44 -06:00
										 |  |  | 			case "tls": | 
					
						
							|  |  |  | 				if h.TLS == nil { | 
					
						
							|  |  |  | 					h.TLS = new(TLSConfig) | 
					
						
							|  |  |  | 				} | 
					
						
							| 
									
										
										
										
											2019-09-11 18:46:32 -06:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-09-11 18:53:44 -06:00
										 |  |  | 			case "tls_insecure_skip_verify": | 
					
						
							|  |  |  | 				if d.NextArg() { | 
					
						
							|  |  |  | 					return d.ArgErr() | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				if h.TLS == nil { | 
					
						
							|  |  |  | 					h.TLS = new(TLSConfig) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				h.TLS.InsecureSkipVerify = true | 
					
						
							| 
									
										
										
										
											2019-09-09 12:23:27 -06:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-09-11 18:53:44 -06:00
										 |  |  | 			case "tls_timeout": | 
					
						
							|  |  |  | 				if !d.NextArg() { | 
					
						
							|  |  |  | 					return d.ArgErr() | 
					
						
							|  |  |  | 				} | 
					
						
							| 
									
										
										
										
											2020-05-11 18:41:11 -04:00
										 |  |  | 				dur, err := caddy.ParseDuration(d.Val()) | 
					
						
							| 
									
										
										
										
											2019-09-11 18:53:44 -06:00
										 |  |  | 				if err != nil { | 
					
						
							|  |  |  | 					return d.Errf("bad timeout value '%s': %v", d.Val(), err) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				if h.TLS == nil { | 
					
						
							|  |  |  | 					h.TLS = new(TLSConfig) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				h.TLS.HandshakeTimeout = caddy.Duration(dur) | 
					
						
							| 
									
										
										
										
											2019-09-09 12:23:27 -06:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2020-01-07 11:07:42 -08:00
										 |  |  | 			case "tls_trusted_ca_certs": | 
					
						
							|  |  |  | 				args := d.RemainingArgs() | 
					
						
							|  |  |  | 				if len(args) == 0 { | 
					
						
							|  |  |  | 					return d.ArgErr() | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				if h.TLS == nil { | 
					
						
							|  |  |  | 					h.TLS = new(TLSConfig) | 
					
						
							|  |  |  | 				} | 
					
						
							| 
									
										
										
										
											2020-01-22 09:34:16 -07:00
										 |  |  | 				h.TLS.RootCAPEMFiles = args | 
					
						
							| 
									
										
										
										
											2020-01-07 11:07:42 -08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2020-05-05 14:39:39 -04:00
										 |  |  | 			case "tls_server_name": | 
					
						
							|  |  |  | 				if !d.NextArg() { | 
					
						
							|  |  |  | 					return d.ArgErr() | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				if h.TLS == nil { | 
					
						
							|  |  |  | 					h.TLS = new(TLSConfig) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				h.TLS.ServerName = d.Val() | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-09-11 18:53:44 -06:00
										 |  |  | 			case "keepalive": | 
					
						
							|  |  |  | 				if !d.NextArg() { | 
					
						
							|  |  |  | 					return d.ArgErr() | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				if h.KeepAlive == nil { | 
					
						
							|  |  |  | 					h.KeepAlive = new(KeepAlive) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				if d.Val() == "off" { | 
					
						
							|  |  |  | 					var disable bool | 
					
						
							|  |  |  | 					h.KeepAlive.Enabled = &disable | 
					
						
							| 
									
										
										
										
											2019-10-11 14:25:39 -06:00
										 |  |  | 					break | 
					
						
							| 
									
										
										
										
											2019-09-11 18:53:44 -06:00
										 |  |  | 				} | 
					
						
							| 
									
										
										
										
											2020-05-11 18:41:11 -04:00
										 |  |  | 				dur, err := caddy.ParseDuration(d.Val()) | 
					
						
							| 
									
										
										
										
											2019-09-11 18:53:44 -06:00
										 |  |  | 				if err != nil { | 
					
						
							|  |  |  | 					return d.Errf("bad duration value '%s': %v", d.Val(), err) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				h.KeepAlive.IdleConnTimeout = caddy.Duration(dur) | 
					
						
							| 
									
										
										
										
											2019-09-09 12:23:27 -06:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-09-11 18:53:44 -06:00
										 |  |  | 			case "keepalive_idle_conns": | 
					
						
							|  |  |  | 				if !d.NextArg() { | 
					
						
							|  |  |  | 					return d.ArgErr() | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				num, err := strconv.Atoi(d.Val()) | 
					
						
							|  |  |  | 				if err != nil { | 
					
						
							|  |  |  | 					return d.Errf("bad integer value '%s': %v", d.Val(), err) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				if h.KeepAlive == nil { | 
					
						
							|  |  |  | 					h.KeepAlive = new(KeepAlive) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				h.KeepAlive.MaxIdleConns = num | 
					
						
							| 
									
										
										
										
											2019-10-11 14:25:39 -06:00
										 |  |  | 				h.KeepAlive.MaxIdleConnsPerHost = num | 
					
						
							| 
									
										
										
										
											2019-09-09 12:23:27 -06:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2020-05-05 12:33:21 -06:00
										 |  |  | 			case "versions": | 
					
						
							|  |  |  | 				h.Versions = d.RemainingArgs() | 
					
						
							|  |  |  | 				if len(h.Versions) == 0 { | 
					
						
							|  |  |  | 					return d.ArgErr() | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2020-08-01 01:30:20 +08:00
										 |  |  | 			case "compression": | 
					
						
							|  |  |  | 				if d.NextArg() { | 
					
						
							|  |  |  | 					if d.Val() == "off" { | 
					
						
							|  |  |  | 						var disable bool | 
					
						
							|  |  |  | 						h.Compression = &disable | 
					
						
							|  |  |  | 					} | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-09-11 18:53:44 -06:00
										 |  |  | 			default: | 
					
						
							|  |  |  | 				return d.Errf("unrecognized subdirective %s", d.Val()) | 
					
						
							|  |  |  | 			} | 
					
						
							| 
									
										
										
										
											2019-09-09 12:23:27 -06:00
										 |  |  | 		} | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	return nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // Interface guards | 
					
						
							|  |  |  | var ( | 
					
						
							|  |  |  | 	_ caddyfile.Unmarshaler = (*Handler)(nil) | 
					
						
							|  |  |  | 	_ caddyfile.Unmarshaler = (*HTTPTransport)(nil) | 
					
						
							|  |  |  | ) |