Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(engine): add trustedproxies and remoteIP #2632
feat(engine): add trustedproxies and remoteIP #2632
Changes from all commits
de0f9eb
b343e7e
b7a35bf
d0bf406
31a2afa
c9ea8ec
39b372f
e14a43c
55ad88a
6f562ea
ffe7ac0
2d426b6
fc99953
15f576c
ba157c9
a598663
7e649c3
0876678
56fbadc
feaee20
2d7fc06
3483d2c
65711ec
9018d58
File filter
Filter by extension
Conversations
Jump to
There are no files selected for viewing
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
suggestion, thanks!
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
refactored it a little bit, review again... now thee logic is better separated between validating the trusted proxy and parsing the header, also a nw AP
allows to even implement your own logic, or trust othe headers that might not be even related with IP!
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Do you expect that HTTP proxy running on
c.RemoteIP()
resetsX-Forwarded-For
? Because if it appends, then we can't inherit trustiness ofc.RemoteIP()
to all other proxies.There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If we trust proxy
40.40.40.40
, but not trust30.30.30.30
(proxy it is or not), then ClientIP should be30.30.30.30
as20.20.20.20
was set by somebody untrusted.Please do not forget that
X-Forwarded-For
is appended, so it should be processed right-to-left: