mirror of
https://github.com/cloudflare/cloudflared.git
synced 2025-07-29 10:09:58 +00:00
TUN-528: Move cloudflared into a separate repo
This commit is contained in:
291
vendor/github.com/mholt/caddy/caddyhttp/staticfiles/fileserver.go
generated
vendored
Normal file
291
vendor/github.com/mholt/caddy/caddyhttp/staticfiles/fileserver.go
generated
vendored
Normal file
@@ -0,0 +1,291 @@
|
||||
// Copyright 2015 Light Code Labs, LLC
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
|
||||
// Package staticfiles provides middleware for serving static files from disk.
|
||||
// Its handler is the default HTTP handler for the HTTP server.
|
||||
//
|
||||
// TODO: Should this package be rolled into the httpserver package?
|
||||
package staticfiles
|
||||
|
||||
import (
|
||||
"math/rand"
|
||||
"net/http"
|
||||
"os"
|
||||
"path"
|
||||
"path/filepath"
|
||||
"runtime"
|
||||
"strconv"
|
||||
"strings"
|
||||
|
||||
"github.com/mholt/caddy"
|
||||
)
|
||||
|
||||
// FileServer implements a production-ready file server
|
||||
// and is the 'default' handler for all requests to Caddy.
|
||||
// It simply loads and serves the URI requested. FileServer
|
||||
// is adapted from the one in net/http by the Go authors.
|
||||
// Significant modifications have been made.
|
||||
//
|
||||
// Original license:
|
||||
//
|
||||
// Copyright 2009 The Go Authors. All rights reserved.
|
||||
// Use of this source code is governed by a BSD-style
|
||||
// license that can be found in the LICENSE file.
|
||||
type FileServer struct {
|
||||
Root http.FileSystem // jailed access to the file system
|
||||
Hide []string // list of files for which to respond with "Not Found"
|
||||
|
||||
// A list of pages that may be understood as the "index" files to directories.
|
||||
// Injected from *SiteConfig.
|
||||
IndexPages []string
|
||||
}
|
||||
|
||||
// ServeHTTP serves static files for r according to fs's configuration.
|
||||
func (fs FileServer) ServeHTTP(w http.ResponseWriter, r *http.Request) (int, error) {
|
||||
return fs.serveFile(w, r)
|
||||
}
|
||||
|
||||
// serveFile writes the specified file to the HTTP response.
|
||||
// name is '/'-separated, not filepath.Separator.
|
||||
func (fs FileServer) serveFile(w http.ResponseWriter, r *http.Request) (int, error) {
|
||||
reqPath := r.URL.Path
|
||||
|
||||
// Prevent absolute path access on Windows.
|
||||
// TODO remove when stdlib http.Dir fixes this.
|
||||
if runtime.GOOS == "windows" && len(reqPath) > 0 && filepath.IsAbs(reqPath[1:]) {
|
||||
return http.StatusNotFound, nil
|
||||
}
|
||||
|
||||
// open the requested file
|
||||
f, err := fs.Root.Open(reqPath)
|
||||
if err != nil {
|
||||
if os.IsNotExist(err) {
|
||||
return http.StatusNotFound, nil
|
||||
} else if os.IsPermission(err) {
|
||||
return http.StatusForbidden, err
|
||||
}
|
||||
// otherwise, maybe the server is under load and ran out of file descriptors?
|
||||
backoff := int(3 + rand.Int31()%3) // 3–5 seconds to prevent a stampede
|
||||
w.Header().Set("Retry-After", strconv.Itoa(backoff))
|
||||
return http.StatusServiceUnavailable, err
|
||||
}
|
||||
defer f.Close()
|
||||
|
||||
// get information about the file
|
||||
d, err := f.Stat()
|
||||
if err != nil {
|
||||
if os.IsNotExist(err) {
|
||||
return http.StatusNotFound, nil
|
||||
} else if os.IsPermission(err) {
|
||||
return http.StatusForbidden, err
|
||||
}
|
||||
// return a different status code than above to distinguish these cases
|
||||
return http.StatusInternalServerError, err
|
||||
}
|
||||
|
||||
// redirect to canonical path (being careful to preserve other parts of URL and
|
||||
// considering cases where a site is defined with a path prefix that gets stripped)
|
||||
urlCopy := *r.URL
|
||||
pathPrefix, _ := r.Context().Value(caddy.CtxKey("path_prefix")).(string)
|
||||
if pathPrefix != "/" {
|
||||
urlCopy.Path = pathPrefix + urlCopy.Path
|
||||
}
|
||||
if urlCopy.Path == "" {
|
||||
urlCopy.Path = "/"
|
||||
}
|
||||
if d.IsDir() {
|
||||
// ensure there is a trailing slash
|
||||
if urlCopy.Path[len(urlCopy.Path)-1] != '/' {
|
||||
for strings.HasPrefix(urlCopy.Path, "//") {
|
||||
// prevent path-based open redirects
|
||||
urlCopy.Path = strings.TrimPrefix(urlCopy.Path, "/")
|
||||
}
|
||||
urlCopy.Path += "/"
|
||||
http.Redirect(w, r, urlCopy.String(), http.StatusMovedPermanently)
|
||||
return http.StatusMovedPermanently, nil
|
||||
}
|
||||
} else {
|
||||
// ensure no trailing slash
|
||||
redir := false
|
||||
if urlCopy.Path[len(urlCopy.Path)-1] == '/' {
|
||||
urlCopy.Path = urlCopy.Path[:len(urlCopy.Path)-1]
|
||||
redir = true
|
||||
}
|
||||
|
||||
// if an index file was explicitly requested, strip file name from the request
|
||||
// ("/foo/index.html" -> "/foo/")
|
||||
var requestPage = path.Base(urlCopy.Path)
|
||||
for _, indexPage := range fs.IndexPages {
|
||||
if requestPage == indexPage {
|
||||
urlCopy.Path = urlCopy.Path[:len(urlCopy.Path)-len(indexPage)]
|
||||
redir = true
|
||||
break
|
||||
}
|
||||
}
|
||||
|
||||
if redir {
|
||||
for strings.HasPrefix(urlCopy.Path, "//") {
|
||||
// prevent path-based open redirects
|
||||
urlCopy.Path = strings.TrimPrefix(urlCopy.Path, "/")
|
||||
}
|
||||
http.Redirect(w, r, urlCopy.String(), http.StatusMovedPermanently)
|
||||
return http.StatusMovedPermanently, nil
|
||||
}
|
||||
}
|
||||
|
||||
// use contents of an index file, if present, for directory requests
|
||||
if d.IsDir() {
|
||||
for _, indexPage := range fs.IndexPages {
|
||||
indexPath := path.Join(reqPath, indexPage)
|
||||
indexFile, err := fs.Root.Open(indexPath)
|
||||
if err != nil {
|
||||
continue
|
||||
}
|
||||
|
||||
indexInfo, err := indexFile.Stat()
|
||||
if err != nil {
|
||||
indexFile.Close()
|
||||
continue
|
||||
}
|
||||
|
||||
// this defer does not leak fds even though we are in a loop,
|
||||
// because previous iterations of the loop must have had an
|
||||
// err, so there's nothing to close from earlier iterations.
|
||||
defer indexFile.Close()
|
||||
|
||||
// close previously-opened file immediately to release fd
|
||||
f.Close()
|
||||
|
||||
// switch to using the index file, and we're done here
|
||||
d = indexInfo
|
||||
f = indexFile
|
||||
reqPath = indexPath
|
||||
break
|
||||
}
|
||||
}
|
||||
|
||||
// return Not Found if we either did not find an index file (and thus are
|
||||
// still a directory) or if this file is supposed to be hidden
|
||||
if d.IsDir() || fs.IsHidden(d) {
|
||||
return http.StatusNotFound, nil
|
||||
}
|
||||
|
||||
etag := calculateEtag(d)
|
||||
|
||||
// look for compressed versions of the file on disk, if the client supports that encoding
|
||||
for _, encoding := range staticEncodingPriority {
|
||||
// see if the client accepts a compressed encoding we offer
|
||||
acceptEncoding := strings.Split(r.Header.Get("Accept-Encoding"), ",")
|
||||
accepted := false
|
||||
for _, acc := range acceptEncoding {
|
||||
if strings.TrimSpace(acc) == encoding {
|
||||
accepted = true
|
||||
break
|
||||
}
|
||||
}
|
||||
|
||||
// if client doesn't support this encoding, don't even bother; try next one
|
||||
if !accepted {
|
||||
continue
|
||||
}
|
||||
|
||||
// see if the compressed version of this file exists
|
||||
encodedFile, err := fs.Root.Open(reqPath + staticEncoding[encoding])
|
||||
if err != nil {
|
||||
continue
|
||||
}
|
||||
|
||||
encodedFileInfo, err := encodedFile.Stat()
|
||||
if err != nil {
|
||||
encodedFile.Close()
|
||||
continue
|
||||
}
|
||||
|
||||
// close the encoded file when we're done, and close the
|
||||
// previously-opened file immediately to release the fd
|
||||
defer encodedFile.Close()
|
||||
f.Close()
|
||||
|
||||
// the encoded file is now what we're serving
|
||||
f = encodedFile
|
||||
etag = calculateEtag(encodedFileInfo)
|
||||
w.Header().Add("Vary", "Accept-Encoding")
|
||||
w.Header().Set("Content-Encoding", encoding)
|
||||
w.Header().Set("Content-Length", strconv.FormatInt(encodedFileInfo.Size(), 10))
|
||||
break
|
||||
}
|
||||
|
||||
// Set the ETag returned to the user-agent. Note that a conditional If-None-Match
|
||||
// request is handled in http.ServeContent below, which checks against this ETag value.
|
||||
w.Header().Set("ETag", etag)
|
||||
|
||||
// Note: Errors generated by ServeContent are written immediately
|
||||
// to the response. This usually only happens if seeking fails (rare).
|
||||
// Its signature does not bubble the error up to us, so we cannot
|
||||
// return it for any logging middleware to record. Oh well.
|
||||
http.ServeContent(w, r, d.Name(), d.ModTime(), f)
|
||||
|
||||
return http.StatusOK, nil
|
||||
}
|
||||
|
||||
// IsHidden checks if file with FileInfo d is on hide list.
|
||||
func (fs FileServer) IsHidden(d os.FileInfo) bool {
|
||||
for _, hiddenPath := range fs.Hide {
|
||||
// TODO: Could these FileInfos be stored instead of their paths, to avoid opening them all the time?
|
||||
if hFile, err := fs.Root.Open(hiddenPath); err == nil {
|
||||
fs, _ := hFile.Stat()
|
||||
hFile.Close()
|
||||
if os.SameFile(d, fs) {
|
||||
return true
|
||||
}
|
||||
}
|
||||
}
|
||||
return false
|
||||
}
|
||||
|
||||
// calculateEtag produces a strong etag by default, although, for
|
||||
// efficiency reasons, it does not actually consume the contents
|
||||
// of the file to make a hash of all the bytes. ¯\_(ツ)_/¯
|
||||
// Prefix the etag with "W/" to convert it into a weak etag.
|
||||
// See: https://tools.ietf.org/html/rfc7232#section-2.3
|
||||
func calculateEtag(d os.FileInfo) string {
|
||||
t := strconv.FormatInt(d.ModTime().Unix(), 36)
|
||||
s := strconv.FormatInt(d.Size(), 36)
|
||||
return `"` + t + s + `"`
|
||||
}
|
||||
|
||||
// DefaultIndexPages is a list of pages that may be understood as
|
||||
// the "index" files to directories.
|
||||
var DefaultIndexPages = []string{
|
||||
"index.html",
|
||||
"index.htm",
|
||||
"index.txt",
|
||||
"default.html",
|
||||
"default.htm",
|
||||
"default.txt",
|
||||
}
|
||||
|
||||
// staticEncoding is a map of content-encoding to a file extension.
|
||||
// If client accepts given encoding (via Accept-Encoding header) and compressed file with given extensions exists
|
||||
// it will be served to the client instead of original one.
|
||||
var staticEncoding = map[string]string{
|
||||
"gzip": ".gz",
|
||||
"br": ".br",
|
||||
}
|
||||
|
||||
// staticEncodingPriority is a list of preferred static encodings (most efficient compression to least one).
|
||||
var staticEncodingPriority = []string{
|
||||
"br",
|
||||
"gzip",
|
||||
}
|
633
vendor/github.com/mholt/caddy/caddyhttp/staticfiles/fileserver_test.go
generated
vendored
Normal file
633
vendor/github.com/mholt/caddy/caddyhttp/staticfiles/fileserver_test.go
generated
vendored
Normal file
@@ -0,0 +1,633 @@
|
||||
// Copyright 2015 Light Code Labs, LLC
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
|
||||
package staticfiles
|
||||
|
||||
import (
|
||||
"context"
|
||||
"errors"
|
||||
"io/ioutil"
|
||||
"net/http"
|
||||
"net/http/httptest"
|
||||
"os"
|
||||
"path/filepath"
|
||||
"strconv"
|
||||
"strings"
|
||||
"testing"
|
||||
"time"
|
||||
|
||||
"github.com/mholt/caddy"
|
||||
)
|
||||
|
||||
// TestServeHTTP covers positive scenarios when serving files.
|
||||
func TestServeHTTP(t *testing.T) {
|
||||
tmpWebRootDir := beforeServeHTTPTest(t)
|
||||
defer afterServeHTTPTest(t, tmpWebRootDir)
|
||||
|
||||
fileserver := FileServer{
|
||||
Root: http.Dir(filepath.Join(tmpWebRootDir, webrootName)),
|
||||
Hide: []string{"dir/hidden.html"},
|
||||
IndexPages: DefaultIndexPages,
|
||||
}
|
||||
|
||||
movedPermanently := "Moved Permanently"
|
||||
|
||||
tests := []struct {
|
||||
url string
|
||||
stripPathPrefix string // for when sites are defined with a path (e.g. "example.com/foo/")
|
||||
acceptEncoding string
|
||||
expectedLocation string
|
||||
expectedStatus int
|
||||
expectedBodyContent string
|
||||
expectedEtag string
|
||||
expectedVary string
|
||||
expectedEncoding string
|
||||
expectedContentLength string
|
||||
}{
|
||||
// Test 0 - access without any path
|
||||
{
|
||||
url: "https://foo",
|
||||
expectedStatus: http.StatusNotFound,
|
||||
},
|
||||
// Test 1 - access root (without index.html)
|
||||
{
|
||||
url: "https://foo/",
|
||||
expectedStatus: http.StatusNotFound,
|
||||
},
|
||||
// Test 2 - access existing file
|
||||
{
|
||||
url: "https://foo/file1.html",
|
||||
expectedStatus: http.StatusOK,
|
||||
expectedBodyContent: testFiles[webrootFile1HTML],
|
||||
expectedEtag: `"2n9cj"`,
|
||||
expectedContentLength: strconv.Itoa(len(testFiles[webrootFile1HTML])),
|
||||
},
|
||||
// Test 3 - access folder with index file with trailing slash
|
||||
{
|
||||
url: "https://foo/dirwithindex/",
|
||||
expectedStatus: http.StatusOK,
|
||||
expectedBodyContent: testFiles[webrootDirwithindexIndexHTML],
|
||||
expectedEtag: `"2n9cw"`,
|
||||
expectedContentLength: strconv.Itoa(len(testFiles[webrootDirwithindexIndexHTML])),
|
||||
},
|
||||
// Test 4 - access folder with index file without trailing slash
|
||||
{
|
||||
url: "https://foo/dirwithindex",
|
||||
expectedStatus: http.StatusMovedPermanently,
|
||||
expectedLocation: "https://foo/dirwithindex/",
|
||||
expectedBodyContent: movedPermanently,
|
||||
},
|
||||
// Test 5 - access folder without index file
|
||||
{
|
||||
url: "https://foo/dir/",
|
||||
expectedStatus: http.StatusNotFound,
|
||||
},
|
||||
// Test 6 - access folder without trailing slash
|
||||
{
|
||||
url: "https://foo/dir",
|
||||
expectedStatus: http.StatusMovedPermanently,
|
||||
expectedLocation: "https://foo/dir/",
|
||||
expectedBodyContent: movedPermanently,
|
||||
},
|
||||
// Test 7 - access file with trailing slash
|
||||
{
|
||||
url: "https://foo/file1.html/",
|
||||
expectedStatus: http.StatusMovedPermanently,
|
||||
expectedLocation: "https://foo/file1.html",
|
||||
expectedBodyContent: movedPermanently,
|
||||
},
|
||||
// Test 8 - access not existing path
|
||||
{
|
||||
url: "https://foo/not_existing",
|
||||
expectedStatus: http.StatusNotFound,
|
||||
},
|
||||
// Test 9 - access a file, marked as hidden
|
||||
{
|
||||
url: "https://foo/dir/hidden.html",
|
||||
expectedStatus: http.StatusNotFound,
|
||||
},
|
||||
// Test 10 - access an index file directly
|
||||
{
|
||||
url: "https://foo/dirwithindex/index.html",
|
||||
expectedStatus: http.StatusMovedPermanently,
|
||||
expectedLocation: "https://foo/dirwithindex/",
|
||||
},
|
||||
// Test 11 - access an index file with a trailing slash
|
||||
{
|
||||
url: "https://foo/dirwithindex/index.html/",
|
||||
expectedStatus: http.StatusMovedPermanently,
|
||||
expectedLocation: "https://foo/dirwithindex/",
|
||||
},
|
||||
// Test 12 - send a request with query params
|
||||
{
|
||||
url: "https://foo/dir?param1=val",
|
||||
expectedStatus: http.StatusMovedPermanently,
|
||||
expectedLocation: "https://foo/dir/?param1=val",
|
||||
expectedBodyContent: movedPermanently,
|
||||
},
|
||||
// Test 13 - attempt to bypass hidden file
|
||||
{
|
||||
url: "https://foo/dir/hidden.html%20",
|
||||
expectedStatus: http.StatusNotFound,
|
||||
},
|
||||
// Test 14 - attempt to bypass hidden file
|
||||
{
|
||||
url: "https://foo/dir/hidden.html.",
|
||||
expectedStatus: http.StatusNotFound,
|
||||
},
|
||||
// Test 15 - attempt to bypass hidden file
|
||||
{
|
||||
url: "https://foo/dir/hidden.html.%20",
|
||||
expectedStatus: http.StatusNotFound,
|
||||
},
|
||||
// Test 16 - attempt to bypass hidden file
|
||||
{
|
||||
url: "https://foo/dir/hidden.html%20.",
|
||||
acceptEncoding: "br, gzip",
|
||||
expectedStatus: http.StatusNotFound,
|
||||
},
|
||||
// Test 17 - serve another file with same name as hidden file.
|
||||
{
|
||||
url: "https://foo/hidden.html",
|
||||
expectedStatus: http.StatusNotFound,
|
||||
},
|
||||
// Test 18 - try to get below the root directory.
|
||||
{
|
||||
url: "https://foo/../unreachable.html",
|
||||
expectedStatus: http.StatusNotFound,
|
||||
},
|
||||
// Test 19 - try to get below the root directory (encoded slashes).
|
||||
{
|
||||
url: "https://foo/..%2funreachable.html",
|
||||
expectedStatus: http.StatusNotFound,
|
||||
},
|
||||
// Test 20 - try to get pre-gzipped file.
|
||||
{
|
||||
url: "https://foo/sub/gzipped.html",
|
||||
acceptEncoding: "gzip",
|
||||
expectedStatus: http.StatusOK,
|
||||
expectedBodyContent: testFiles[webrootSubGzippedHTMLGz],
|
||||
expectedEtag: `"2n9ch"`,
|
||||
expectedVary: "Accept-Encoding",
|
||||
expectedEncoding: "gzip",
|
||||
expectedContentLength: strconv.Itoa(len(testFiles[webrootSubGzippedHTMLGz])),
|
||||
},
|
||||
// Test 21 - try to get pre-brotli encoded file.
|
||||
{
|
||||
url: "https://foo/sub/brotli.html",
|
||||
acceptEncoding: "br,gzip",
|
||||
expectedStatus: http.StatusOK,
|
||||
expectedBodyContent: testFiles[webrootSubBrotliHTMLBr],
|
||||
expectedEtag: `"2n9cg"`,
|
||||
expectedVary: "Accept-Encoding",
|
||||
expectedEncoding: "br",
|
||||
expectedContentLength: strconv.Itoa(len(testFiles[webrootSubBrotliHTMLBr])),
|
||||
},
|
||||
// Test 22 - not allowed to get pre-brotli encoded file.
|
||||
{
|
||||
url: "https://foo/sub/brotli.html",
|
||||
acceptEncoding: "nicebrew", // contains "br" substring but not "br"
|
||||
expectedStatus: http.StatusOK,
|
||||
expectedBodyContent: testFiles[webrootSubBrotliHTML],
|
||||
expectedEtag: `"2n9cd"`,
|
||||
expectedVary: "",
|
||||
expectedEncoding: "",
|
||||
expectedContentLength: strconv.Itoa(len(testFiles[webrootSubBrotliHTML])),
|
||||
},
|
||||
// Test 23 - treat existing file as a directory.
|
||||
{
|
||||
url: "https://foo/file1.html/other",
|
||||
expectedStatus: http.StatusNotFound,
|
||||
},
|
||||
// Test 24 - access folder with index file without trailing slash, with stripped path
|
||||
{
|
||||
url: "https://foo/bar/dirwithindex",
|
||||
stripPathPrefix: "/bar/",
|
||||
expectedStatus: http.StatusMovedPermanently,
|
||||
expectedLocation: "https://foo/bar/dirwithindex/",
|
||||
expectedBodyContent: movedPermanently,
|
||||
},
|
||||
// Test 25 - access folder with index file without trailing slash, with stripped path and query params
|
||||
{
|
||||
url: "https://foo/bar/dirwithindex?param1=val",
|
||||
stripPathPrefix: "/bar/",
|
||||
expectedStatus: http.StatusMovedPermanently,
|
||||
expectedLocation: "https://foo/bar/dirwithindex/?param1=val",
|
||||
expectedBodyContent: movedPermanently,
|
||||
},
|
||||
// Test 26 - site defined with path ("bar"), which has that prefix stripped
|
||||
{
|
||||
url: "https://foo/bar/file1.html/",
|
||||
stripPathPrefix: "/bar/",
|
||||
expectedStatus: http.StatusMovedPermanently,
|
||||
expectedLocation: "https://foo/bar/file1.html",
|
||||
expectedBodyContent: movedPermanently,
|
||||
},
|
||||
{
|
||||
// Test 27 - Check etag
|
||||
url: "https://foo/notindex.html",
|
||||
expectedStatus: http.StatusOK,
|
||||
expectedBodyContent: testFiles[webrootNotIndexHTML],
|
||||
expectedEtag: `"2n9cm"`,
|
||||
expectedContentLength: strconv.Itoa(len(testFiles[webrootNotIndexHTML])),
|
||||
},
|
||||
{
|
||||
// Test 28 - Prevent path-based open redirects (directory)
|
||||
url: "https://foo//example.com%2f..",
|
||||
expectedStatus: http.StatusMovedPermanently,
|
||||
expectedLocation: "https://foo/example.com/../",
|
||||
expectedBodyContent: movedPermanently,
|
||||
},
|
||||
{
|
||||
// Test 29 - Prevent path-based open redirects (file)
|
||||
url: "https://foo//example.com%2f../dirwithindex/index.html",
|
||||
expectedStatus: http.StatusMovedPermanently,
|
||||
expectedLocation: "https://foo/example.com/../dirwithindex/",
|
||||
expectedBodyContent: movedPermanently,
|
||||
},
|
||||
{
|
||||
// Test 29 - Prevent path-based open redirects (extra leading slashes)
|
||||
url: "https://foo///example.com%2f..",
|
||||
expectedStatus: http.StatusMovedPermanently,
|
||||
expectedLocation: "https://foo/example.com/../",
|
||||
expectedBodyContent: movedPermanently,
|
||||
},
|
||||
}
|
||||
|
||||
for i, test := range tests {
|
||||
// set up response writer and request
|
||||
responseRecorder := httptest.NewRecorder()
|
||||
request, err := http.NewRequest("GET", test.url, nil)
|
||||
if err != nil {
|
||||
t.Errorf("Test %d: Error making request: %v", i, err)
|
||||
continue
|
||||
}
|
||||
|
||||
// set the original URL and path prefix on the context
|
||||
ctx := context.WithValue(request.Context(), caddy.CtxKey("original_url"), *request.URL)
|
||||
request = request.WithContext(ctx)
|
||||
ctx = context.WithValue(request.Context(), caddy.CtxKey("path_prefix"), test.stripPathPrefix)
|
||||
request = request.WithContext(ctx)
|
||||
|
||||
request.Header.Add("Accept-Encoding", test.acceptEncoding)
|
||||
|
||||
// simulate cases where a site is defined with a path prefix (e.g. "localhost/foo/")
|
||||
if test.stripPathPrefix != "" {
|
||||
request.URL.Path = strings.TrimPrefix(request.URL.Path, test.stripPathPrefix)
|
||||
}
|
||||
|
||||
// perform the test
|
||||
status, err := fileserver.ServeHTTP(responseRecorder, request)
|
||||
etag := responseRecorder.Header().Get("Etag")
|
||||
body := responseRecorder.Body.String()
|
||||
vary := responseRecorder.Header().Get("Vary")
|
||||
encoding := responseRecorder.Header().Get("Content-Encoding")
|
||||
length := responseRecorder.Header().Get("Content-Length")
|
||||
|
||||
// check if error matches expectations
|
||||
if err != nil {
|
||||
t.Errorf("Test %d: Serving file at %s failed. Error was: %v", i, test.url, err)
|
||||
}
|
||||
|
||||
// check status code
|
||||
if test.expectedStatus != status {
|
||||
t.Errorf("Test %d: Expected status %d, found %d", i, test.expectedStatus, status)
|
||||
}
|
||||
|
||||
// check etag
|
||||
if test.expectedEtag != etag {
|
||||
t.Errorf("Test %d: Expected Etag header %s, found %s", i, test.expectedEtag, etag)
|
||||
}
|
||||
|
||||
// check vary
|
||||
if test.expectedVary != vary {
|
||||
t.Errorf("Test %d: Expected Vary header %s, found %s", i, test.expectedVary, vary)
|
||||
}
|
||||
|
||||
// check content-encoding
|
||||
if test.expectedEncoding != encoding {
|
||||
t.Errorf("Test %d: Expected Content-Encoding header %s, found %s", i, test.expectedEncoding, encoding)
|
||||
}
|
||||
|
||||
// check body content
|
||||
if !strings.Contains(body, test.expectedBodyContent) {
|
||||
t.Errorf("Test %d: Expected body to contain %q, found %q", i, test.expectedBodyContent, body)
|
||||
}
|
||||
|
||||
// check Location header
|
||||
if test.expectedLocation != "" {
|
||||
l := responseRecorder.Header().Get("Location")
|
||||
if test.expectedLocation != l {
|
||||
t.Errorf("Test %d: Expected Location header %q, found %q", i, test.expectedLocation, l)
|
||||
}
|
||||
}
|
||||
|
||||
// check content length
|
||||
if test.expectedContentLength != length {
|
||||
t.Errorf("Test %d: Expected Content-Length header %s, found %s", i, test.expectedContentLength, length)
|
||||
}
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
// beforeServeHTTPTest creates a test directory with the structure, defined in the variable testFiles
|
||||
func beforeServeHTTPTest(t *testing.T) string {
|
||||
tmpdir, err := ioutil.TempDir("", testDirPrefix)
|
||||
if err != nil {
|
||||
t.Fatalf("failed to create test directory: %v", err)
|
||||
}
|
||||
|
||||
fixedTime := time.Unix(123456, 0)
|
||||
|
||||
for relFile, fileContent := range testFiles {
|
||||
absFile := filepath.Join(tmpdir, relFile)
|
||||
|
||||
// make sure the parent directories exist
|
||||
parentDir := filepath.Dir(absFile)
|
||||
_, err = os.Stat(parentDir)
|
||||
if err != nil {
|
||||
os.MkdirAll(parentDir, os.ModePerm)
|
||||
}
|
||||
|
||||
// now create the test files
|
||||
f, err := os.Create(absFile)
|
||||
if err != nil {
|
||||
t.Fatalf("Failed to create test file %s. Error was: %v", absFile, err)
|
||||
}
|
||||
|
||||
// and fill them with content
|
||||
_, err = f.WriteString(fileContent)
|
||||
if err != nil {
|
||||
t.Fatalf("Failed to write to %s. Error was: %v", absFile, err)
|
||||
}
|
||||
f.Close()
|
||||
|
||||
// and set the last modified time
|
||||
err = os.Chtimes(absFile, fixedTime, fixedTime)
|
||||
if err != nil {
|
||||
t.Fatalf("Failed to set file time to %s. Error was: %v", fixedTime, err)
|
||||
}
|
||||
}
|
||||
|
||||
return tmpdir
|
||||
}
|
||||
|
||||
// afterServeHTTPTest removes the test dir and all its content
|
||||
func afterServeHTTPTest(t *testing.T, webroot string) {
|
||||
if !strings.Contains(webroot, testDirPrefix) {
|
||||
t.Fatalf("Cannot clean up after test because webroot is: %s", webroot)
|
||||
}
|
||||
// cleans up everything under the test dir. No need to clean the individual files.
|
||||
err := os.RemoveAll(webroot)
|
||||
if err != nil {
|
||||
t.Fatalf("Failed to clean up test dir %s. Error was: %v", webroot, err)
|
||||
}
|
||||
}
|
||||
|
||||
// failingFS implements the http.FileSystem interface. The Open method always returns the error, assigned to err
|
||||
type failingFS struct {
|
||||
err error // the error to return when Open is called
|
||||
fileImpl http.File // inject the file implementation
|
||||
}
|
||||
|
||||
// Open returns the assigned failingFile and error
|
||||
func (f failingFS) Open(path string) (http.File, error) {
|
||||
return f.fileImpl, f.err
|
||||
}
|
||||
|
||||
// failingFile implements http.File but returns a predefined error on every Stat() method call.
|
||||
type failingFile struct {
|
||||
http.File
|
||||
err error
|
||||
}
|
||||
|
||||
// Stat returns nil FileInfo and the provided error on every call
|
||||
func (ff failingFile) Stat() (os.FileInfo, error) {
|
||||
return nil, ff.err
|
||||
}
|
||||
|
||||
// Close is noop and returns no error
|
||||
func (ff failingFile) Close() error {
|
||||
return nil
|
||||
}
|
||||
|
||||
// TestServeHTTPFailingFS tests error cases where the Open
|
||||
// function fails with various errors.
|
||||
func TestServeHTTPFailingFS(t *testing.T) {
|
||||
tests := []struct {
|
||||
fsErr error
|
||||
expectedStatus int
|
||||
expectedErr error
|
||||
expectedHeaders map[string]string
|
||||
}{
|
||||
{
|
||||
fsErr: os.ErrNotExist,
|
||||
expectedStatus: http.StatusNotFound,
|
||||
expectedErr: nil,
|
||||
},
|
||||
{
|
||||
fsErr: os.ErrPermission,
|
||||
expectedStatus: http.StatusForbidden,
|
||||
expectedErr: os.ErrPermission,
|
||||
},
|
||||
{
|
||||
fsErr: errCustom,
|
||||
expectedStatus: http.StatusServiceUnavailable,
|
||||
expectedErr: errCustom,
|
||||
expectedHeaders: map[string]string{"Retry-After": "5"},
|
||||
},
|
||||
}
|
||||
|
||||
for i, test := range tests {
|
||||
// initialize a file server with the failing FileSystem
|
||||
fileserver := FileServer{Root: failingFS{err: test.fsErr}}
|
||||
|
||||
// prepare the request and response
|
||||
request, err := http.NewRequest("GET", "https://foo/", nil)
|
||||
if err != nil {
|
||||
t.Fatalf("Failed to build request. Error was: %v", err)
|
||||
}
|
||||
responseRecorder := httptest.NewRecorder()
|
||||
|
||||
status, actualErr := fileserver.ServeHTTP(responseRecorder, request)
|
||||
|
||||
// check the status
|
||||
if status != test.expectedStatus {
|
||||
t.Errorf("Test %d: Expected status %d, found %d", i, test.expectedStatus, status)
|
||||
}
|
||||
|
||||
// check the error
|
||||
if actualErr != test.expectedErr {
|
||||
t.Errorf("Test %d: Expected err %v, found %v", i, test.expectedErr, actualErr)
|
||||
}
|
||||
|
||||
// check the headers - a special case for server under load
|
||||
if test.expectedHeaders != nil && len(test.expectedHeaders) > 0 {
|
||||
for expectedKey, expectedVal := range test.expectedHeaders {
|
||||
actualVal := responseRecorder.Header().Get(expectedKey)
|
||||
if expectedVal != actualVal {
|
||||
t.Errorf("Test %d: Expected header %s: %s, found %s", i, expectedKey, expectedVal, actualVal)
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// TestServeHTTPFailingStat tests error cases where the initial Open function succeeds,
|
||||
// but the Stat method on the opened file fails.
|
||||
func TestServeHTTPFailingStat(t *testing.T) {
|
||||
tests := []struct {
|
||||
statErr error
|
||||
expectedStatus int
|
||||
expectedErr error
|
||||
}{
|
||||
{
|
||||
statErr: os.ErrNotExist,
|
||||
expectedStatus: http.StatusNotFound,
|
||||
expectedErr: nil,
|
||||
},
|
||||
{
|
||||
statErr: os.ErrPermission,
|
||||
expectedStatus: http.StatusForbidden,
|
||||
expectedErr: os.ErrPermission,
|
||||
},
|
||||
{
|
||||
statErr: errCustom,
|
||||
expectedStatus: http.StatusInternalServerError,
|
||||
expectedErr: errCustom,
|
||||
},
|
||||
}
|
||||
|
||||
for i, test := range tests {
|
||||
// initialize a file server. The FileSystem will not fail, but calls to the Stat method of the returned File object will
|
||||
fileserver := FileServer{Root: failingFS{err: nil, fileImpl: failingFile{err: test.statErr}}}
|
||||
|
||||
// prepare the request and response
|
||||
request, err := http.NewRequest("GET", "https://foo/", nil)
|
||||
if err != nil {
|
||||
t.Fatalf("Failed to build request. Error was: %v", err)
|
||||
}
|
||||
responseRecorder := httptest.NewRecorder()
|
||||
|
||||
status, actualErr := fileserver.ServeHTTP(responseRecorder, request)
|
||||
|
||||
// check the status
|
||||
if status != test.expectedStatus {
|
||||
t.Errorf("Test %d: Expected status %d, found %d", i, test.expectedStatus, status)
|
||||
}
|
||||
|
||||
// check the error
|
||||
if actualErr != test.expectedErr {
|
||||
t.Errorf("Test %d: Expected err %v, found %v", i, test.expectedErr, actualErr)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// Paths for the fake site used temporarily during testing.
|
||||
var (
|
||||
webrootFile1HTML = filepath.Join(webrootName, "file1.html")
|
||||
webrootNotIndexHTML = filepath.Join(webrootName, "notindex.html")
|
||||
webrootDirFile2HTML = filepath.Join(webrootName, "dir", "file2.html")
|
||||
webrootDirHiddenHTML = filepath.Join(webrootName, "dir", "hidden.html")
|
||||
webrootDirwithindexIndexHTML = filepath.Join(webrootName, "dirwithindex", "index.html")
|
||||
webrootSubGzippedHTML = filepath.Join(webrootName, "sub", "gzipped.html")
|
||||
webrootSubGzippedHTMLGz = filepath.Join(webrootName, "sub", "gzipped.html.gz")
|
||||
webrootSubGzippedHTMLBr = filepath.Join(webrootName, "sub", "gzipped.html.br")
|
||||
webrootSubBrotliHTML = filepath.Join(webrootName, "sub", "brotli.html")
|
||||
webrootSubBrotliHTMLGz = filepath.Join(webrootName, "sub", "brotli.html.gz")
|
||||
webrootSubBrotliHTMLBr = filepath.Join(webrootName, "sub", "brotli.html.br")
|
||||
webrootSubBarDirWithIndexIndexHTML = filepath.Join(webrootName, "bar", "dirwithindex", "index.html")
|
||||
)
|
||||
|
||||
// testFiles is a map with relative paths to test files as keys and file content as values.
|
||||
// The map represents the following structure:
|
||||
// - $TEMP/caddy_testdir/
|
||||
// '-- unreachable.html
|
||||
// '-- webroot/
|
||||
// '---- file1.html
|
||||
// '---- dirwithindex/
|
||||
// '------ index.html
|
||||
// '---- dir/
|
||||
// '------ file2.html
|
||||
// '------ hidden.html
|
||||
var testFiles = map[string]string{
|
||||
"unreachable.html": "<h1>must not leak</h1>",
|
||||
webrootFile1HTML: "<h1>file1.html</h1>",
|
||||
webrootNotIndexHTML: "<h1>notindex.html</h1>",
|
||||
webrootDirFile2HTML: "<h1>dir/file2.html</h1>",
|
||||
webrootDirwithindexIndexHTML: "<h1>dirwithindex/index.html</h1>",
|
||||
webrootDirHiddenHTML: "<h1>dir/hidden.html</h1>",
|
||||
webrootSubGzippedHTML: "<h1>gzipped.html</h1>",
|
||||
webrootSubGzippedHTMLGz: "1.gzipped.html.gz",
|
||||
webrootSubGzippedHTMLBr: "2.gzipped.html.br",
|
||||
webrootSubBrotliHTML: "3.brotli.html",
|
||||
webrootSubBrotliHTMLGz: "4.brotli.html.gz",
|
||||
webrootSubBrotliHTMLBr: "5.brotli.html.br",
|
||||
webrootSubBarDirWithIndexIndexHTML: "<h1>bar/dirwithindex/index.html</h1>",
|
||||
}
|
||||
|
||||
var errCustom = errors.New("custom error")
|
||||
|
||||
const (
|
||||
testDirPrefix = "caddy_fileserver_test"
|
||||
webrootName = "webroot" // name of the folder inside the tmp dir that has the site
|
||||
)
|
||||
|
||||
//-------------------------------------------------------------------------------------------------
|
||||
|
||||
type fileInfo struct {
|
||||
name string
|
||||
size int64
|
||||
mode os.FileMode
|
||||
modTime time.Time
|
||||
isDir bool
|
||||
}
|
||||
|
||||
func (fi fileInfo) Name() string {
|
||||
return fi.name
|
||||
}
|
||||
|
||||
func (fi fileInfo) Size() int64 {
|
||||
return fi.size
|
||||
}
|
||||
|
||||
func (fi fileInfo) Mode() os.FileMode {
|
||||
return fi.mode
|
||||
}
|
||||
|
||||
func (fi fileInfo) ModTime() time.Time {
|
||||
return fi.modTime
|
||||
}
|
||||
|
||||
func (fi fileInfo) IsDir() bool {
|
||||
return fi.isDir
|
||||
}
|
||||
|
||||
func (fi fileInfo) Sys() interface{} {
|
||||
return nil
|
||||
}
|
||||
|
||||
var _ os.FileInfo = fileInfo{}
|
||||
|
||||
func BenchmarkEtag(b *testing.B) {
|
||||
d := fileInfo{
|
||||
size: 1234567890,
|
||||
modTime: time.Now(),
|
||||
}
|
||||
|
||||
b.ResetTimer()
|
||||
for i := 0; i < b.N; i++ {
|
||||
calculateEtag(d)
|
||||
}
|
||||
}
|
Reference in New Issue
Block a user