You've already forked oauth2-proxy
mirror of
https://github.com/oauth2-proxy/oauth2-proxy.git
synced 2025-07-13 01:40:48 +02:00
Implements --real-client-ip-header option. (#503)
* Implements -real-client-ip-header option. * The -real-client-ip-header determines what HTTP header is used for determining the "real client IP" of the remote client. * The -real-client-ip-header option supports the following headers: X-Forwarded-For X-ProxyUser-IP and X-Real-IP (default). * Introduces new realClientIPParser interface to allow for multiple polymorphic classes to decide how to determine the real client IP. * TODO: implement the more standard, but more complex `Forwarded` HTTP header. * Corrected order of expected/actual in test cases * Improved error message in getRemoteIP * Add tests for getRemoteIP and getClientString * Add comment explaining splitting of header * Update documentation on -real-client-ip-header w/o -reverse-proxy * Add PR number in changelog. * Fix typo repeated word: "it" Co-Authored-By: Joel Speed <Joel.speed@hotmail.co.uk> * Update extended configuration language * Simplify the language around dependance on -reverse-proxy Co-Authored-By: Joel Speed <Joel.speed@hotmail.co.uk> * Added completions * Reorder real client IP header options * Update CHANGELOG.md * Apply suggestions from code review Co-authored-by: Isabelle COWAN-BERGMAN <Izzette@users.noreply.github.com> Co-authored-by: Joel Speed <Joel.speed@hotmail.co.uk> Co-authored-by: Henry Jenkins <henry@henryjenkins.name>
This commit is contained in:
committed by
GitHub
parent
d0cfca4b73
commit
111d17efde
@ -326,3 +326,46 @@ func TestGCPHealthcheck(t *testing.T) {
|
||||
o.GCPHealthChecks = true
|
||||
assert.Equal(t, nil, o.Validate())
|
||||
}
|
||||
|
||||
func TestRealClientIPHeader(t *testing.T) {
|
||||
var o *Options
|
||||
var err error
|
||||
var expected string
|
||||
|
||||
// Ensure nil if ReverseProxy not set.
|
||||
o = testOptions()
|
||||
o.RealClientIPHeader = "X-Real-IP"
|
||||
assert.Equal(t, nil, o.Validate())
|
||||
assert.Nil(t, o.realClientIPParser)
|
||||
|
||||
// Ensure simple use case works.
|
||||
o = testOptions()
|
||||
o.ReverseProxy = true
|
||||
o.RealClientIPHeader = "X-Forwarded-For"
|
||||
assert.Equal(t, nil, o.Validate())
|
||||
assert.NotNil(t, o.realClientIPParser)
|
||||
|
||||
// Ensure unknown header format process an error.
|
||||
o = testOptions()
|
||||
o.ReverseProxy = true
|
||||
o.RealClientIPHeader = "Forwarded"
|
||||
err = o.Validate()
|
||||
assert.NotEqual(t, nil, err)
|
||||
expected = errorMsg([]string{
|
||||
"real_client_ip_header (Forwarded) not accepted parameter value: the http header key (Forwarded) is either invalid or unsupported",
|
||||
})
|
||||
assert.Equal(t, expected, err.Error())
|
||||
assert.Nil(t, o.realClientIPParser)
|
||||
|
||||
// Ensure invalid header format produces an error.
|
||||
o = testOptions()
|
||||
o.ReverseProxy = true
|
||||
o.RealClientIPHeader = "!934invalidheader-23:"
|
||||
err = o.Validate()
|
||||
assert.NotEqual(t, nil, err)
|
||||
expected = errorMsg([]string{
|
||||
"real_client_ip_header (!934invalidheader-23:) not accepted parameter value: the http header key (!934invalidheader-23:) is either invalid or unsupported",
|
||||
})
|
||||
assert.Equal(t, expected, err.Error())
|
||||
assert.Nil(t, o.realClientIPParser)
|
||||
}
|
||||
|
Reference in New Issue
Block a user