Can nginx location blocks match a URL query string?
For example, what location block might match HTTP GET request
GET /git/sample-repository/info/refs?service=git-receive-pack HTTP/1.1
Can nginx location blocks match a URL query string?
For example, what location block might match HTTP GET request
GET /git/sample-repository/info/refs?service=git-receive-pack HTTP/1.1
Can nginx location blocks match a URL query string?
Short answer: No.
Long answer: There is a workaround if we have only a handful of such location blocks.
Here's a sample workaround for 3 location blocks that need to match specific query strings:
server {
#... common definitions such as server, root
location / {
error_page 418 = @queryone;
error_page 419 = @querytwo;
error_page 420 = @querythree;
if ( $query_string = "service=git-receive-pack" ) { return 418; }
if ( $args ~ "service=git-upload-pack" ) { return 419; }
if ( $arg_somerandomfield = "somerandomvaluetomatch" ) { return 420; }
# do the remaining stuff
# ex: try_files $uri =404;
}
location @queryone {
# do stuff when queryone matches
}
location @querytwo {
# do stuff when querytwo matches
}
location @querythree {
# do stuff when querythree matches
}
}
You may use $query_string, $args or $arg_fieldname. All will do the job. You may know more about error_page in the official docs.
Warning: Please be sure not to use the standard HTTP codes.
$args ~ "service=git-send-pack" instead of $args = "service=git-send-pack"? This form accommodates multiple query parameters.
– Derek Mahar
Oct 28 '16 at 21:52
if and $arg_fieldname, but uses rewrite instead of error_page and location @name. Note that in that example, my attempts at using @name for the replacement parameter in rewrite were unsuccessful.
– Derek Mahar
Oct 28 '16 at 21:57
map feature for this purpose, which is faster.
– Tero Kilkanen
Oct 29 '16 at 10:24
map.
– Derek Mahar
Oct 31 '16 at 20:05
error_page directive can be misleading. If a query parameter is set, that should not be considered as an error. I wonder if there is another nginx directive to be used instead of error_page.
– W.M.
Sep 09 '17 at 16:33
error_page usage to safely change the location was directly inspired by https://www.nginx.com/resources/wiki/start/topics/depth/ifisevil/#what-to-do-instead . Probably, there will be an alternative way to do this in the future, that doesn't mislead.
– Pothi Kalimuthu
Sep 11 '17 at 04:22
query parameter by a url path one like this feedback/{auth_key} instead of /feedback?auth_key=abc. This way I don't need to use if, I can define location pattern using regex and that's it.
– W.M.
Sep 11 '17 at 16:26
$query_string or $args won't match a url like /example/service=git-receive-pack, even though once rewritten it has that query, in this case $request_uri seems to be the only option
– ᴍᴇʜᴏᴠ
Sep 06 '18 at 19:44
I know this question is over a year old, but I've spent the last few days destroying my brain over a similar problem. I wanted different authentication and handling rules for public and private repos, including pushing and pulling. This is what I finally came up with, so I figured I'd share. I know if is a tricky directive, but this seems to work for me just fine:
# pattern for all repos, public or private, followed by username and reponame
location ~ ^(?:\/(private))?\/([A-Za-z0-9]+)\/([A-Za-z0-9]+)\.git(\/.*)?$ {
# if this is a pull request
if ( $arg_service = "git-upload-pack" ) {
# rewrite url with a prefix
rewrite ^ /upload$uri;
}
# if this is a push request
if ( $arg_service = "git-receive-pack" ) {
# rewrite url with a prefix
rewrite ^ /receive$uri;
}
}
# for pulling public repos
location ~ ^\/upload(\/([A-Za-z0-9]+)\/([A-Za-z0-9]+)\.git(\/.*)?)$ {
# auth_basic "git";
# ^ if you want
# ...
# fastcgi_pass unix:/var/run/fcgiwrap.socket;
# ...
}
# for pushing public repos
location ~ ^\/receive(\/([A-Za-z0-9]+)\/([A-Za-z0-9]+)\.git(\/.*)?)$ {
# auth_basic "git";
# ^ if you want
# ...
# fastcgi_pass unix:/var/run/fcgiwrap.socket;
# ...
}
# for pulling private repos
location ~ ^\/upload\/private(\/([A-Za-z0-9]+)\/([A-Za-z0-9]+)\.git(\/.*)?)$ {
# auth_basic "git";
# ^ if you want
# ...
# fastcgi_pass unix:/var/run/fcgiwrap.socket;
# ...
}
# for pushing private repos
location ~ ^\/receive\/private(\/([A-Za-z0-9]+)\/([A-Za-z0-9]+)\.git(\/.*)?)$ {
# auth_basic "git";
# ^ if you want
# ...
# fastcgi_pass unix:/var/run/fcgiwrap.socket;
# ...
}
\w instead of [A-Za-z0-9_] to diminish verbosity.
– Stphane
Nov 29 '20 at 22:41
\w wouldn't work in my case. I upvoted the comment anyway, and I agree that this would be better in general.
– Jared Brandt
Sep 10 '23 at 20:09
There is another way this can be done, if you are using nginx as a proxy.
set a variable in the server block:
set $nocache="0";
Inside the location block, add the if:
if ( $arg_<query string to match> = "<query string value>") { set $nocache "1"; }
And add two new proxy directives:
proxy_cache_bypass $nocache ;
proxy_no_cache $nocache ;
it will always forward to the upstream server with no cache
?)? – Derek Mahar Oct 28 '16 at 17:05rewriteregular expression matches$request_uri. – Derek Mahar Oct 28 '16 at 18:25