102 lines
2.7 KiB
Go
102 lines
2.7 KiB
Go
package redirect
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"net"
|
|
"net/http"
|
|
"strings"
|
|
|
|
"github.com/traefik/traefik/v3/pkg/config/dynamic"
|
|
"github.com/traefik/traefik/v3/pkg/middlewares"
|
|
)
|
|
|
|
const (
|
|
typeSchemeName = "RedirectScheme"
|
|
uriPattern = `^(https?:\/\/)?(\[[\w:.]+\]|[\w\._-]+)?(:\d+)?(.*)$`
|
|
xForwardedProto = "X-Forwarded-Proto"
|
|
)
|
|
|
|
type redirectScheme struct {
|
|
http.Handler
|
|
|
|
name string
|
|
}
|
|
|
|
// NewRedirectScheme creates a new RedirectScheme middleware.
|
|
func NewRedirectScheme(ctx context.Context, next http.Handler, conf dynamic.RedirectScheme, name string) (http.Handler, error) {
|
|
logger := middlewares.GetLogger(ctx, name, typeSchemeName)
|
|
logger.Debug().Msg("Creating middleware")
|
|
logger.Debug().Msgf("Setting up redirection to %s %s", conf.Scheme, conf.Port)
|
|
|
|
if len(conf.Scheme) == 0 {
|
|
return nil, errors.New("you must provide a target scheme")
|
|
}
|
|
|
|
port := ""
|
|
if len(conf.Port) > 0 && !(conf.Scheme == schemeHTTP && conf.Port == "80" || conf.Scheme == schemeHTTPS && conf.Port == "443") {
|
|
port = ":" + conf.Port
|
|
}
|
|
|
|
rs := &redirectScheme{name: name}
|
|
|
|
handler, err := newRedirect(next, uriPattern, conf.Scheme+"://${2}"+port+"${4}", conf.Permanent, rs.clientRequestURL, name)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
rs.Handler = handler
|
|
|
|
return rs, nil
|
|
}
|
|
|
|
func (r *redirectScheme) clientRequestURL(req *http.Request) string {
|
|
scheme := schemeHTTP
|
|
host, port, err := net.SplitHostPort(req.Host)
|
|
if err != nil {
|
|
host = req.Host
|
|
} else {
|
|
port = ":" + port
|
|
}
|
|
uri := req.RequestURI
|
|
|
|
if match := uriRegexp.FindStringSubmatch(req.RequestURI); len(match) > 0 {
|
|
scheme = match[1]
|
|
|
|
if len(match[2]) > 0 {
|
|
host = match[2]
|
|
}
|
|
|
|
if len(match[3]) > 0 {
|
|
port = match[3]
|
|
}
|
|
|
|
uri = match[4]
|
|
}
|
|
|
|
if req.TLS != nil {
|
|
scheme = schemeHTTPS
|
|
}
|
|
|
|
if xProto := req.Header.Get(xForwardedProto); xProto != "" {
|
|
// When the initial request is a connection upgrade request,
|
|
// X-Forwarded-Proto header might have been set by a previous hop to ws(s),
|
|
// even though the actual protocol used so far is HTTP(s).
|
|
// Given that we're in a middleware that is only used in the context of HTTP(s) requests,
|
|
// the only possible valid schemes are one of "http" or "https", so we convert back to them.
|
|
switch {
|
|
case strings.EqualFold(xProto, schemeHTTP), strings.EqualFold(xProto, "ws"):
|
|
scheme = schemeHTTP
|
|
case strings.EqualFold(xProto, schemeHTTPS), strings.EqualFold(xProto, "wss"):
|
|
scheme = schemeHTTPS
|
|
default:
|
|
middlewares.GetLogger(req.Context(), r.name, typeSchemeName).Debug().Msgf("Invalid X-Forwarded-Proto: %s", xProto)
|
|
}
|
|
}
|
|
|
|
if scheme == schemeHTTP && port == ":80" || scheme == schemeHTTPS && port == ":443" {
|
|
port = ""
|
|
}
|
|
|
|
return strings.Join([]string{scheme, "://", host, port, uri}, "")
|
|
}
|