]>
git.ipfire.org Git - thirdparty/squid.git/blob - src/HttpHeaderTools.cc
2 * Copyright (C) 1996-2016 The Squid Software Foundation and contributors
4 * Squid software is distributed under GPLv2+ license and includes
5 * contributions from numerous individuals and organizations.
6 * Please see the COPYING and CONTRIBUTORS files for details.
9 /* DEBUG: section 66 HTTP Header Tools */
12 #include "acl/FilledChecklist.h"
13 #include "acl/Gadgets.h"
14 #include "base/EnumIterator.h"
15 #include "client_side.h"
16 #include "client_side_request.h"
17 #include "comm/Connection.h"
18 #include "compat/strtoll.h"
19 #include "ConfigParser.h"
22 #include "http/RegisteredHeaders.h"
23 #include "http/Stream.h"
24 #include "HttpHdrContRange.h"
25 #include "HttpHeader.h"
26 #include "HttpHeaderFieldInfo.h"
27 #include "HttpHeaderTools.h"
28 #include "HttpRequest.h"
30 #include "SquidConfig.h"
35 #include "ssl/support.h"
42 static void httpHeaderPutStrvf(HttpHeader
* hdr
, Http::HdrType id
, const char *fmt
, va_list vargs
);
43 static void httpHdrAdd(HttpHeader
*heads
, HttpRequest
*request
, const AccessLogEntryPointer
&al
, HeaderWithAclList
&headersAdd
);
46 httpHeaderMaskInit(HttpHeaderMask
* mask
, int value
)
48 memset(mask
, value
, sizeof(*mask
));
51 /* same as httpHeaderPutStr, but formats the string using snprintf first */
53 httpHeaderPutStrf(HttpHeader
* hdr
, Http::HdrType id
, const char *fmt
,...)
58 httpHeaderPutStrvf(hdr
, id
, fmt
, args
);
62 /* used by httpHeaderPutStrf */
64 httpHeaderPutStrvf(HttpHeader
* hdr
, Http::HdrType id
, const char *fmt
, va_list vargs
)
68 mb
.vappendf(fmt
, vargs
);
69 hdr
->putStr(id
, mb
.buf
);
73 /** wrapper arrounf PutContRange */
75 httpHeaderAddContRange(HttpHeader
* hdr
, HttpHdrRangeSpec spec
, int64_t ent_len
)
77 HttpHdrContRange
*cr
= httpHdrContRangeCreate();
78 assert(hdr
&& ent_len
>= 0);
79 httpHdrContRangeSet(cr
, spec
, ent_len
);
80 hdr
->putContRange(cr
);
85 * return true if a given directive is found in at least one of
86 * the "connection" header-fields note: if Http::HdrType::PROXY_CONNECTION is
87 * present we ignore Http::HdrType::CONNECTION.
90 httpHeaderHasConnDir(const HttpHeader
* hdr
, const char *directive
)
94 /* what type of header do we have? */
96 #if USE_HTTP_VIOLATIONS
97 if (hdr
->has(Http::HdrType::PROXY_CONNECTION
))
98 list
= hdr
->getList(Http::HdrType::PROXY_CONNECTION
);
101 if (hdr
->has(Http::HdrType::CONNECTION
))
102 list
= hdr
->getList(Http::HdrType::CONNECTION
);
106 res
= strListIsMember(&list
, directive
, ',');
113 /** handy to printf prefixes of potentially very long buffers */
115 getStringPrefix(const char *str
, size_t sz
)
117 #define SHORT_PREFIX_SIZE 512
118 LOCAL_ARRAY(char, buf
, SHORT_PREFIX_SIZE
);
119 xstrncpy(buf
, str
, (sz
+1 > SHORT_PREFIX_SIZE
) ? SHORT_PREFIX_SIZE
: sz
);
124 * parses an int field, complains if soemthing went wrong, returns true on
128 httpHeaderParseInt(const char *start
, int *value
)
131 *value
= atoi(start
);
133 if (!*value
&& !xisdigit(*start
)) {
134 debugs(66, 2, "failed to parse an int header field near '" << start
<< "'");
142 httpHeaderParseOffset(const char *start
, int64_t * value
)
145 int64_t res
= strtoll(start
, NULL
, 10);
146 if (!res
&& EINVAL
== errno
) { /* maybe not portable? */
147 debugs(66, 7, "failed to parse offset in " << start
);
151 debugs(66, 7, "offset " << start
<< " parsed as " << res
);
156 * Parses a quoted-string field (RFC 2616 section 2.2), complains if
157 * something went wrong, returns non-zero on success.
158 * Un-escapes quoted-pair characters found within the string.
159 * start should point at the first double-quote.
162 httpHeaderParseQuotedString(const char *start
, const int len
, String
*val
)
164 const char *end
, *pos
;
167 debugs(66, 2, HERE
<< "failed to parse a quoted-string header field near '" << start
<< "'");
172 while (*pos
!= '"' && len
> (pos
-start
)) {
176 if ((pos
-start
) > len
|| *pos
!= '\n') {
177 debugs(66, 2, HERE
<< "failed to parse a quoted-string header field with '\\r' octet " << (start
-pos
)
178 << " bytes into '" << start
<< "'");
186 if ( (pos
-start
) > len
|| (*pos
!= ' ' && *pos
!= '\t')) {
187 debugs(66, 2, HERE
<< "failed to parse multiline quoted-string header field '" << start
<< "'");
191 // TODO: replace the entire LWS with a space
194 debugs(66, 2, HERE
<< "len < pos-start => " << len
<< " < " << (pos
-start
));
198 bool quoted
= (*pos
== '\\');
201 if (!*pos
|| (pos
-start
) > len
) {
202 debugs(66, 2, HERE
<< "failed to parse a quoted-string header field near '" << start
<< "'");
208 while (end
< (start
+len
) && *end
!= '\\' && *end
!= '\"' && (unsigned char)*end
> 0x1F && *end
!= 0x7F)
210 if (((unsigned char)*end
<= 0x1F && *end
!= '\r' && *end
!= '\n') || *end
== 0x7F) {
211 debugs(66, 2, HERE
<< "failed to parse a quoted-string header field with CTL octet " << (start
-pos
)
212 << " bytes into '" << start
<< "'");
216 val
->append(pos
, end
-pos
);
221 debugs(66, 2, HERE
<< "failed to parse a quoted-string header field which did not end with \" ");
225 /* Make sure it's defined even if empty "" */
226 if (!val
->termedBuf())
227 val
->limitInit("", 0);
232 httpHeaderQuoteString(const char *raw
)
236 // TODO: Optimize by appending a sequence of characters instead of a char.
237 // This optimization may be easier with Tokenizer after raw becomes SBuf.
239 // RFC 7230 says a "sender SHOULD NOT generate a quoted-pair in a
240 // quoted-string except where necessary" (i.e., DQUOTE and backslash)
241 bool needInnerQuote
= false;
242 for (const char *s
= raw
; !needInnerQuote
&& *s
; ++s
)
243 needInnerQuote
= *s
== '"' || *s
== '\\';
246 quotedStr
.append('"');
248 if (needInnerQuote
) {
249 for (const char *s
= raw
; *s
; ++s
) {
250 if (*s
== '"' || *s
== '\\')
251 quotedStr
.append('\\');
252 quotedStr
.append(*s
);
255 quotedStr
.append(raw
);
258 quotedStr
.append('"');
263 * Checks the anonymizer (header_access) configuration.
265 * \retval 0 Header is explicitly blocked for removal
266 * \retval 1 Header is explicitly allowed
267 * \retval 1 Header has been replaced, the current version can be used.
268 * \retval 1 Header has no access controls to test
271 httpHdrMangle(HttpHeaderEntry
* e
, HttpRequest
* request
, HeaderManglers
*hms
)
277 const headerMangler
*hm
= hms
->find(*e
);
279 /* mangler or checklist went away. default allow */
280 if (!hm
|| !hm
->access_list
) {
281 debugs(66, 7, "couldn't find mangler or access list. Allowing");
285 ACLFilledChecklist
checklist(hm
->access_list
, request
, NULL
);
287 if (checklist
.fastCheck() == ACCESS_ALLOWED
) {
288 /* aclCheckFast returns true for allow. */
289 debugs(66, 7, "checklist for mangler is positive. Mangle");
291 } else if (NULL
== hm
->replacement
) {
292 /* It was denied, and we don't have any replacement */
293 debugs(66, 7, "checklist denied, we have no replacement. Pass");
296 /* It was denied, but we have a replacement. Replace the
297 * header on the fly, and return that the new header
300 debugs(66, 7, "checklist denied but we have replacement. Replace");
301 e
->value
= hm
->replacement
;
308 /** Mangles headers for a list of headers. */
310 httpHdrMangleList(HttpHeader
*l
, HttpRequest
*request
, const AccessLogEntryPointer
&al
, req_or_rep_t req_or_rep
)
313 HttpHeaderPos p
= HttpHeaderInitPos
;
315 /* check with anonymizer tables */
316 HeaderManglers
*hms
= nullptr;
317 HeaderWithAclList
*headersAdd
= nullptr;
319 switch (req_or_rep
) {
321 hms
= Config
.request_header_access
;
322 headersAdd
= Config
.request_header_add
;
325 hms
= Config
.reply_header_access
;
326 headersAdd
= Config
.reply_header_add
;
331 int headers_deleted
= 0;
332 while ((e
= l
->getEntry(&p
))) {
333 if (0 == httpHdrMangle(e
, request
, hms
))
334 l
->delAt(p
, headers_deleted
);
341 if (headersAdd
&& !headersAdd
->empty()) {
342 httpHdrAdd(l
, request
, al
, *headersAdd
);
347 void header_mangler_clean(headerMangler
&m
)
349 aclDestroyAccessList(&m
.access_list
);
350 safe_free(m
.replacement
);
354 void header_mangler_dump_access(StoreEntry
* entry
, const char *option
,
355 const headerMangler
&m
, const char *name
)
357 if (m
.access_list
!= NULL
) {
358 storeAppendPrintf(entry
, "%s ", option
);
359 dump_acl_access(entry
, name
, m
.access_list
);
364 void header_mangler_dump_replacement(StoreEntry
* entry
, const char *option
,
365 const headerMangler
&m
, const char *name
)
368 storeAppendPrintf(entry
, "%s %s %s\n", option
, name
, m
.replacement
);
371 HeaderManglers::HeaderManglers()
373 memset(known
, 0, sizeof(known
));
374 memset(&all
, 0, sizeof(all
));
377 HeaderManglers::~HeaderManglers()
379 for (auto i
: WholeEnum
<Http::HdrType
>())
380 header_mangler_clean(known
[i
]);
382 for (auto i
: custom
)
383 header_mangler_clean(i
.second
);
385 header_mangler_clean(all
);
389 HeaderManglers::dumpAccess(StoreEntry
* entry
, const char *name
) const
391 for (auto id
: WholeEnum
<Http::HdrType
>())
392 header_mangler_dump_access(entry
, name
, known
[id
], Http::HeaderLookupTable
.lookup(id
).name
);
394 for (auto i
: custom
)
395 header_mangler_dump_access(entry
, name
, i
.second
, i
.first
.c_str());
397 header_mangler_dump_access(entry
, name
, all
, "All");
401 HeaderManglers::dumpReplacement(StoreEntry
* entry
, const char *name
) const
403 for (auto id
: WholeEnum
<Http::HdrType
>()) {
404 header_mangler_dump_replacement(entry
, name
, known
[id
], Http::HeaderLookupTable
.lookup(id
).name
);
407 for (auto i
: custom
) {
408 header_mangler_dump_replacement(entry
, name
, i
.second
, i
.first
.c_str());
411 header_mangler_dump_replacement(entry
, name
, all
, "All");
415 HeaderManglers::track(const char *name
)
417 if (strcmp(name
, "All") == 0)
420 const Http::HdrType id
= Http::HeaderLookupTable
.lookup(SBuf(name
)).id
;
422 if (id
!= Http::HdrType::BAD_HDR
)
425 if (strcmp(name
, "Other") == 0)
426 return &known
[Http::HdrType::OTHER
];
428 return &custom
[name
];
432 HeaderManglers::setReplacement(const char *name
, const char *value
)
434 // for backword compatibility, we allow replacements to be configured
435 // for headers w/o access rules, but such replacements are ignored
436 headerMangler
*m
= track(name
);
438 safe_free(m
->replacement
); // overwrite old value if any
439 m
->replacement
= xstrdup(value
);
442 const headerMangler
*
443 HeaderManglers::find(const HttpHeaderEntry
&e
) const
445 // a known header with a configured ACL list
446 if (e
.id
!= Http::HdrType::OTHER
&& Http::any_HdrType_enum_value(e
.id
) &&
447 known
[e
.id
].access_list
)
451 if (e
.id
== Http::HdrType::OTHER
) {
452 // does it have an ACL list configured?
453 // Optimize: use a name type that we do not need to convert to here
454 const ManglersByName::const_iterator i
= custom
.find(e
.name
.termedBuf());
455 if (i
!= custom
.end())
459 // Next-to-last resort: "Other" rules match any custom header
460 if (e
.id
== Http::HdrType::OTHER
&& known
[Http::HdrType::OTHER
].access_list
)
461 return &known
[Http::HdrType::OTHER
];
463 // Last resort: "All" rules match any header
471 httpHdrAdd(HttpHeader
*heads
, HttpRequest
*request
, const AccessLogEntryPointer
&al
, HeaderWithAclList
&headersAdd
)
473 ACLFilledChecklist
checklist(NULL
, request
, NULL
);
475 for (HeaderWithAclList::const_iterator hwa
= headersAdd
.begin(); hwa
!= headersAdd
.end(); ++hwa
) {
476 if (!hwa
->aclList
|| checklist
.fastCheck(hwa
->aclList
) == ACCESS_ALLOWED
) {
477 const char *fieldValue
= NULL
;
482 hwa
->valueFormat
->assemble(mb
, al
, 0);
483 fieldValue
= mb
.content();
486 fieldValue
= hwa
->fieldValue
.c_str();
489 if (!fieldValue
|| fieldValue
[0] == '\0')
492 HttpHeaderEntry
*e
= new HttpHeaderEntry(hwa
->fieldId
, hwa
->fieldName
.c_str(),