A problem when trying to proxy webdav/svn have is that when you proxy
https to an http backend, COPY requests do not work because of the
Destination: header.
The standard configuration to address this is:
set $destination $http_destination;
if ( $destination ~* ^https(.*)$ ) {
set $destination http$1;
}
proxy_set_header Destination $destination;
However, $http_destination is already urlescaped and becomes escaped
again as part of the capture. This causes filenamess with spaces in
them to become double-escaped (i.e. " " represented by %2520 instead of
%20).
I have not done too much work in the nginx source, so I borrowed very
heavily from the code provided by Kirill K in his patch to urldecode
variable_arguments to create a patch which should allow access to
urldecoded copies of $http_ variables. Changing $http_destination to
$urldecodehttp_destination with the following patch applied appears to
resolve the issue for us.
Any feedback as far as a better way to do this, problems with the code,
or issues that have been overlooked would be appreciated.
I was mostly unsure whether the ngx_palloc code and the “v->len = dst -
v->data;” lines were correct.
Michael
diff -u nginx-0.5.37/src/http/ngx_http_variables.c
nginx-0.5.37-decodepatch/src/http/ngx_http_variables.c
— nginx-0.5.37/src/http/ngx_http_variables.c 2007-12-12
08:57:36.000000000 -0800
+++ nginx-0.5.37-decodepatch/src/http/ngx_http_variables.c 2009-03-26
23:06:26.000000000 -0700
@@ -22,6 +22,8 @@
static ngx_int_t ngx_http_variable_headers(ngx_http_request_t *r,
ngx_http_variable_value_t *v, uintptr_t data);
+static ngx_int_t
ngx_http_variable_unknown_header_in_urldecode(ngx_http_request_t *r,
-
ngx_http_variable_value_t *v, uintptr_t data);
static ngx_int_t ngx_http_variable_unknown_header_in(ngx_http_request_t
*r,
ngx_http_variable_value_t *v, uintptr_t data);
static ngx_int_t
ngx_http_variable_unknown_header_out(ngx_http_request_t *r,
@@ -442,6 +444,17 @@
return NULL;
} -
if (ngx_strncmp(name->data, “urldecodehttp_”, 14) == 0) {
-
if (ngx_http_variable_unknown_header_in_urldecode(r, vv,
(uintptr_t) name)
-
== NGX_OK)
-
{
-
return vv;
-
}
-
return NULL;
-
}
-
if (ngx_strncmp(name->data, “http_”, 5) == 0) {
if (ngx_http_variable_unknown_header_in(r, vv, (uintptr_t)
name)
@@ -632,6 +645,73 @@
static ngx_int_t
+ngx_http_variable_unknown_header_in_urldecode(ngx_http_request_t *r,
- ngx_http_variable_value_t *v, uintptr_t data)
+{ - ngx_str_t *var = (ngx_str_t *) data;
- ngx_list_part_t *part = &r->headers_in.headers.part;
- size_t prefix = sizeof(“urldecodehttp_”) - 1;
- u_char *dst, *src;
- u_char ch;
- ngx_uint_t i, n;
- ngx_table_elt_t *header;
- header = part->elts;
- for (i = 0; /* void */ ; i++) {
-
if (i >= part->nelts) {
-
if (part->next == NULL) {
-
break;
-
}
-
part = part->next;
-
header = part->elts;
-
i = 0;
-
}
-
for (n = 0; n + prefix < var->len && n < header[i].key.len;
n++) {
-
ch = header[i].key.data[n];
-
if (ch >= 'A' && ch <= 'Z') {
-
ch |= 0x20;
-
} else if (ch == '-') {
-
ch = '_';
-
}
-
if (var->data[n + prefix] != ch) {
-
break;
-
}
-
}
-
if (n + prefix == var->len && n == header[i].key.len) {
-
v->data = ngx_palloc(r->pool, header[i].value.len);
-
if (v->data == NULL) {
-
v->not_found = 1;
-
}
-
else {
-
dst = v->data;
-
src = header[i].value.data;
-
ngx_unescape_uri(&dst, &src, header[i].value.len,
NGX_ESCAPE_ARGS);
-
v->len = dst - v->data;
-
v->valid = 1;
-
v->no_cacheable = 0;
-
v->not_found = 0;
-
}
-
return NGX_OK;
-
}
- }
- v->not_found = 1;
- return NGX_OK;
+}
+static ngx_int_t
ngx_http_variable_unknown_header_in(ngx_http_request_t *r,
ngx_http_variable_value_t *v, uintptr_t data)
{
@@ -1351,6 +1431,13 @@
}
}
-
if (ngx_strncmp(v[i].name.data, "urldecodehttp_", 14) == 0) {
-
v[i].get_handler =
ngx_http_variable_unknown_header_in_urldecode;
-
v[i].data = (uintptr_t) &v[i].name;
-
continue;
-
}
-
if (ngx_strncmp(v[i].name.data, "http_", 5) == 0) { v[i].get_handler = ngx_http_variable_unknown_header_in; v[i].data = (uintptr_t) &v[i].name;