mirror of
https://github.com/caddyserver/caddy.git
synced 2025-03-23 05:49:27 +01:00
logging: Perform filtering on arrays of strings (where possible) (#5101)
* logging: Perform filtering on arrays of strings (where possible) * Add test for ip_mask filter * Oops, need to continue when it's not an IP * Test for invalid IPs
This commit is contained in:
parent
9e1d964bd6
commit
ea58d51907
2 changed files with 171 additions and 24 deletions
|
@ -23,6 +23,7 @@ import (
|
||||||
"net/url"
|
"net/url"
|
||||||
"regexp"
|
"regexp"
|
||||||
"strconv"
|
"strconv"
|
||||||
|
"strings"
|
||||||
|
|
||||||
"github.com/caddyserver/caddy/v2"
|
"github.com/caddyserver/caddy/v2"
|
||||||
"github.com/caddyserver/caddy/v2/caddyconfig/caddyfile"
|
"github.com/caddyserver/caddy/v2/caddyconfig/caddyfile"
|
||||||
|
@ -76,7 +77,10 @@ func hash(s string) string {
|
||||||
}
|
}
|
||||||
|
|
||||||
// HashFilter is a Caddy log field filter that
|
// HashFilter is a Caddy log field filter that
|
||||||
// replaces the field with the initial 4 bytes of the SHA-256 hash of the content.
|
// replaces the field with the initial 4 bytes
|
||||||
|
// of the SHA-256 hash of the content. Operates
|
||||||
|
// on string fields, or on arrays of strings
|
||||||
|
// where each string is hashed.
|
||||||
type HashFilter struct {
|
type HashFilter struct {
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -95,7 +99,13 @@ func (f *HashFilter) UnmarshalCaddyfile(d *caddyfile.Dispenser) error {
|
||||||
|
|
||||||
// Filter filters the input field with the replacement value.
|
// Filter filters the input field with the replacement value.
|
||||||
func (f *HashFilter) Filter(in zapcore.Field) zapcore.Field {
|
func (f *HashFilter) Filter(in zapcore.Field) zapcore.Field {
|
||||||
in.String = hash(in.String)
|
if array, ok := in.Interface.(caddyhttp.LoggableStringArray); ok {
|
||||||
|
for i, s := range array {
|
||||||
|
array[i] = hash(s)
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
in.String = hash(in.String)
|
||||||
|
}
|
||||||
return in
|
return in
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -131,7 +141,10 @@ func (f *ReplaceFilter) Filter(in zapcore.Field) zapcore.Field {
|
||||||
}
|
}
|
||||||
|
|
||||||
// IPMaskFilter is a Caddy log field filter that
|
// IPMaskFilter is a Caddy log field filter that
|
||||||
// masks IP addresses.
|
// masks IP addresses in a string, or in an array
|
||||||
|
// of strings. The string may be a comma separated
|
||||||
|
// list of IP addresses, where all of the values
|
||||||
|
// will be masked.
|
||||||
type IPMaskFilter struct {
|
type IPMaskFilter struct {
|
||||||
// The IPv4 mask, as an subnet size CIDR.
|
// The IPv4 mask, as an subnet size CIDR.
|
||||||
IPv4MaskRaw int `json:"ipv4_cidr,omitempty"`
|
IPv4MaskRaw int `json:"ipv4_cidr,omitempty"`
|
||||||
|
@ -205,27 +218,45 @@ func (m *IPMaskFilter) Provision(ctx caddy.Context) error {
|
||||||
|
|
||||||
// Filter filters the input field.
|
// Filter filters the input field.
|
||||||
func (m IPMaskFilter) Filter(in zapcore.Field) zapcore.Field {
|
func (m IPMaskFilter) Filter(in zapcore.Field) zapcore.Field {
|
||||||
host, port, err := net.SplitHostPort(in.String)
|
if array, ok := in.Interface.(caddyhttp.LoggableStringArray); ok {
|
||||||
if err != nil {
|
for i, s := range array {
|
||||||
host = in.String // assume whole thing was IP address
|
array[i] = m.mask(s)
|
||||||
}
|
}
|
||||||
ipAddr := net.ParseIP(host)
|
|
||||||
if ipAddr == nil {
|
|
||||||
return in
|
|
||||||
}
|
|
||||||
mask := m.v4Mask
|
|
||||||
if ipAddr.To4() == nil {
|
|
||||||
mask = m.v6Mask
|
|
||||||
}
|
|
||||||
masked := ipAddr.Mask(mask)
|
|
||||||
if port == "" {
|
|
||||||
in.String = masked.String()
|
|
||||||
} else {
|
} else {
|
||||||
in.String = net.JoinHostPort(masked.String(), port)
|
in.String = m.mask(in.String)
|
||||||
}
|
}
|
||||||
|
|
||||||
return in
|
return in
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (m IPMaskFilter) mask(s string) string {
|
||||||
|
output := ""
|
||||||
|
for _, value := range strings.Split(s, ",") {
|
||||||
|
value = strings.TrimSpace(value)
|
||||||
|
host, port, err := net.SplitHostPort(value)
|
||||||
|
if err != nil {
|
||||||
|
host = value // assume whole thing was IP address
|
||||||
|
}
|
||||||
|
ipAddr := net.ParseIP(host)
|
||||||
|
if ipAddr == nil {
|
||||||
|
output += value + ", "
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
mask := m.v4Mask
|
||||||
|
if ipAddr.To4() == nil {
|
||||||
|
mask = m.v6Mask
|
||||||
|
}
|
||||||
|
masked := ipAddr.Mask(mask)
|
||||||
|
if port == "" {
|
||||||
|
output += masked.String() + ", "
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
output += net.JoinHostPort(masked.String(), port) + ", "
|
||||||
|
}
|
||||||
|
return strings.TrimSuffix(output, ", ")
|
||||||
|
}
|
||||||
|
|
||||||
type filterAction string
|
type filterAction string
|
||||||
|
|
||||||
const (
|
const (
|
||||||
|
@ -499,7 +530,10 @@ OUTER:
|
||||||
}
|
}
|
||||||
|
|
||||||
// RegexpFilter is a Caddy log field filter that
|
// RegexpFilter is a Caddy log field filter that
|
||||||
// replaces the field matching the provided regexp with the indicated string.
|
// replaces the field matching the provided regexp
|
||||||
|
// with the indicated string. If the field is an
|
||||||
|
// array of strings, each of them will have the
|
||||||
|
// regexp replacement applied.
|
||||||
type RegexpFilter struct {
|
type RegexpFilter struct {
|
||||||
// The regular expression pattern defining what to replace.
|
// The regular expression pattern defining what to replace.
|
||||||
RawRegexp string `json:"regexp,omitempty"`
|
RawRegexp string `json:"regexp,omitempty"`
|
||||||
|
@ -545,7 +579,13 @@ func (m *RegexpFilter) Provision(ctx caddy.Context) error {
|
||||||
|
|
||||||
// Filter filters the input field with the replacement value if it matches the regexp.
|
// Filter filters the input field with the replacement value if it matches the regexp.
|
||||||
func (f *RegexpFilter) Filter(in zapcore.Field) zapcore.Field {
|
func (f *RegexpFilter) Filter(in zapcore.Field) zapcore.Field {
|
||||||
in.String = f.regexp.ReplaceAllString(in.String, f.Value)
|
if array, ok := in.Interface.(caddyhttp.LoggableStringArray); ok {
|
||||||
|
for i, s := range array {
|
||||||
|
array[i] = f.regexp.ReplaceAllString(s, f.Value)
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
in.String = f.regexp.ReplaceAllString(in.String, f.Value)
|
||||||
|
}
|
||||||
|
|
||||||
return in
|
return in
|
||||||
}
|
}
|
||||||
|
@ -576,7 +616,6 @@ func (f *RenameFilter) UnmarshalCaddyfile(d *caddyfile.Dispenser) error {
|
||||||
|
|
||||||
// Filter renames the input field with the replacement name.
|
// Filter renames the input field with the replacement name.
|
||||||
func (f *RenameFilter) Filter(in zapcore.Field) zapcore.Field {
|
func (f *RenameFilter) Filter(in zapcore.Field) zapcore.Field {
|
||||||
in.Type = zapcore.StringType
|
|
||||||
in.Key = f.Name
|
in.Key = f.Name
|
||||||
return in
|
return in
|
||||||
}
|
}
|
||||||
|
|
|
@ -8,6 +8,81 @@ import (
|
||||||
"go.uber.org/zap/zapcore"
|
"go.uber.org/zap/zapcore"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
func TestIPMaskSingleValue(t *testing.T) {
|
||||||
|
f := IPMaskFilter{IPv4MaskRaw: 16, IPv6MaskRaw: 32}
|
||||||
|
f.Provision(caddy.Context{})
|
||||||
|
|
||||||
|
out := f.Filter(zapcore.Field{String: "255.255.255.255"})
|
||||||
|
if out.String != "255.255.0.0" {
|
||||||
|
t.Fatalf("field has not been filtered: %s", out.String)
|
||||||
|
}
|
||||||
|
|
||||||
|
out = f.Filter(zapcore.Field{String: "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff"})
|
||||||
|
if out.String != "ffff:ffff::" {
|
||||||
|
t.Fatalf("field has not been filtered: %s", out.String)
|
||||||
|
}
|
||||||
|
|
||||||
|
out = f.Filter(zapcore.Field{String: "not-an-ip"})
|
||||||
|
if out.String != "not-an-ip" {
|
||||||
|
t.Fatalf("field has been filtered: %s", out.String)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestIPMaskCommaValue(t *testing.T) {
|
||||||
|
f := IPMaskFilter{IPv4MaskRaw: 16, IPv6MaskRaw: 32}
|
||||||
|
f.Provision(caddy.Context{})
|
||||||
|
|
||||||
|
out := f.Filter(zapcore.Field{String: "255.255.255.255, 244.244.244.244"})
|
||||||
|
if out.String != "255.255.0.0, 244.244.0.0" {
|
||||||
|
t.Fatalf("field has not been filtered: %s", out.String)
|
||||||
|
}
|
||||||
|
|
||||||
|
out = f.Filter(zapcore.Field{String: "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff, ff00:ffff:ffff:ffff:ffff:ffff:ffff:ffff"})
|
||||||
|
if out.String != "ffff:ffff::, ff00:ffff::" {
|
||||||
|
t.Fatalf("field has not been filtered: %s", out.String)
|
||||||
|
}
|
||||||
|
|
||||||
|
out = f.Filter(zapcore.Field{String: "not-an-ip, 255.255.255.255"})
|
||||||
|
if out.String != "not-an-ip, 255.255.0.0" {
|
||||||
|
t.Fatalf("field has not been filtered: %s", out.String)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestIPMaskMultiValue(t *testing.T) {
|
||||||
|
f := IPMaskFilter{IPv4MaskRaw: 16, IPv6MaskRaw: 32}
|
||||||
|
f.Provision(caddy.Context{})
|
||||||
|
|
||||||
|
out := f.Filter(zapcore.Field{Interface: caddyhttp.LoggableStringArray{
|
||||||
|
"255.255.255.255",
|
||||||
|
"244.244.244.244",
|
||||||
|
}})
|
||||||
|
arr, ok := out.Interface.(caddyhttp.LoggableStringArray)
|
||||||
|
if !ok {
|
||||||
|
t.Fatalf("field is wrong type: %T", out.Integer)
|
||||||
|
}
|
||||||
|
if arr[0] != "255.255.0.0" {
|
||||||
|
t.Fatalf("field entry 0 has not been filtered: %s", arr[0])
|
||||||
|
}
|
||||||
|
if arr[1] != "244.244.0.0" {
|
||||||
|
t.Fatalf("field entry 1 has not been filtered: %s", arr[1])
|
||||||
|
}
|
||||||
|
|
||||||
|
out = f.Filter(zapcore.Field{Interface: caddyhttp.LoggableStringArray{
|
||||||
|
"ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff",
|
||||||
|
"ff00:ffff:ffff:ffff:ffff:ffff:ffff:ffff",
|
||||||
|
}})
|
||||||
|
arr, ok = out.Interface.(caddyhttp.LoggableStringArray)
|
||||||
|
if !ok {
|
||||||
|
t.Fatalf("field is wrong type: %T", out.Integer)
|
||||||
|
}
|
||||||
|
if arr[0] != "ffff:ffff::" {
|
||||||
|
t.Fatalf("field entry 0 has not been filtered: %s", arr[0])
|
||||||
|
}
|
||||||
|
if arr[1] != "ff00:ffff::" {
|
||||||
|
t.Fatalf("field entry 1 has not been filtered: %s", arr[1])
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
func TestQueryFilter(t *testing.T) {
|
func TestQueryFilter(t *testing.T) {
|
||||||
f := QueryFilter{[]queryFilterAction{
|
f := QueryFilter{[]queryFilterAction{
|
||||||
{replaceAction, "foo", "REDACTED"},
|
{replaceAction, "foo", "REDACTED"},
|
||||||
|
@ -78,7 +153,7 @@ func TestValidateCookieFilter(t *testing.T) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestRegexpFilter(t *testing.T) {
|
func TestRegexpFilterSingleValue(t *testing.T) {
|
||||||
f := RegexpFilter{RawRegexp: `secret`, Value: "REDACTED"}
|
f := RegexpFilter{RawRegexp: `secret`, Value: "REDACTED"}
|
||||||
f.Provision(caddy.Context{})
|
f.Provision(caddy.Context{})
|
||||||
|
|
||||||
|
@ -88,7 +163,24 @@ func TestRegexpFilter(t *testing.T) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestHashFilter(t *testing.T) {
|
func TestRegexpFilterMultiValue(t *testing.T) {
|
||||||
|
f := RegexpFilter{RawRegexp: `secret`, Value: "REDACTED"}
|
||||||
|
f.Provision(caddy.Context{})
|
||||||
|
|
||||||
|
out := f.Filter(zapcore.Field{Interface: caddyhttp.LoggableStringArray{"foo-secret-bar", "bar-secret-foo"}})
|
||||||
|
arr, ok := out.Interface.(caddyhttp.LoggableStringArray)
|
||||||
|
if !ok {
|
||||||
|
t.Fatalf("field is wrong type: %T", out.Integer)
|
||||||
|
}
|
||||||
|
if arr[0] != "foo-REDACTED-bar" {
|
||||||
|
t.Fatalf("field entry 0 has not been filtered: %s", arr[0])
|
||||||
|
}
|
||||||
|
if arr[1] != "bar-REDACTED-foo" {
|
||||||
|
t.Fatalf("field entry 1 has not been filtered: %s", arr[1])
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestHashFilterSingleValue(t *testing.T) {
|
||||||
f := HashFilter{}
|
f := HashFilter{}
|
||||||
|
|
||||||
out := f.Filter(zapcore.Field{String: "foo"})
|
out := f.Filter(zapcore.Field{String: "foo"})
|
||||||
|
@ -96,3 +188,19 @@ func TestHashFilter(t *testing.T) {
|
||||||
t.Fatalf("field has not been filtered: %s", out.String)
|
t.Fatalf("field has not been filtered: %s", out.String)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestHashFilterMultiValue(t *testing.T) {
|
||||||
|
f := HashFilter{}
|
||||||
|
|
||||||
|
out := f.Filter(zapcore.Field{Interface: caddyhttp.LoggableStringArray{"foo", "bar"}})
|
||||||
|
arr, ok := out.Interface.(caddyhttp.LoggableStringArray)
|
||||||
|
if !ok {
|
||||||
|
t.Fatalf("field is wrong type: %T", out.Integer)
|
||||||
|
}
|
||||||
|
if arr[0] != "2c26b46b" {
|
||||||
|
t.Fatalf("field entry 0 has not been filtered: %s", arr[0])
|
||||||
|
}
|
||||||
|
if arr[1] != "fcde2b2e" {
|
||||||
|
t.Fatalf("field entry 1 has not been filtered: %s", arr[1])
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
Loading…
Add table
Reference in a new issue