/framework/src/play-server/src/test/scala/play/core/server/common/ForwardedHeaderHandlerSpec.scala

http://github.com/playframework/Play20 · Scala · 422 lines · 390 code · 23 blank · 9 comment · 6 complexity · 92ac63e97e0330c8f8a2518ccce5a577 MD5 · raw file

  1. /*
  2. * Copyright (C) 2009-2016 Lightbend Inc. <https://www.lightbend.com>
  3. */
  4. package play.core.server.common
  5. import java.net.InetAddress
  6. import org.specs2.mutable.Specification
  7. import org.specs2.specification.Scope
  8. import play.api.mvc.Headers
  9. import play.api.{ PlayException, Configuration }
  10. import play.core.server.common.ForwardedHeaderHandler._
  11. class ForwardedHeaderHandlerSpec extends Specification {
  12. "ForwardedHeaderHandler" should {
  13. """not accept a wrong setting as "play.http.forwarded.version" in config""" in {
  14. handler(version("rfc7240")) must throwA[PlayException]
  15. }
  16. "parse rfc7239 entries" in {
  17. val results = processHeaders(version("rfc7239") ++ trustedProxies("192.0.2.60/24"), headers(
  18. """
  19. |Forwarded: for="_gazonk"
  20. |Forwarded: For="[2001:db8:cafe::17]:4711"
  21. |Forwarded: for=192.0.2.60;proto=http;by=203.0.113.43
  22. |Forwarded: for=192.0.2.43, for=198.51.100.17, for=127.0.0.1
  23. |Forwarded: for=192.0.2.61;proto=https
  24. |Forwarded: for=unknown
  25. """.stripMargin
  26. ))
  27. results.length must_== 8
  28. results(0)._1 must_== ForwardedEntry(Some("_gazonk"), None)
  29. results(0)._2 must beLeft
  30. results(0)._3 must beNone
  31. results(1)._1 must_== ForwardedEntry(Some("[2001:db8:cafe::17]:4711"), None)
  32. results(1)._2 must beRight(ConnectionInfo(addr("2001:db8:cafe::17"), false))
  33. results(1)._3 must beSome(false)
  34. results(2)._1 must_== ForwardedEntry(Some("192.0.2.60"), Some("http"))
  35. results(2)._2 must beRight(ConnectionInfo(addr("192.0.2.60"), false))
  36. results(2)._3 must beSome(true)
  37. results(3)._1 must_== ForwardedEntry(Some("192.0.2.43"), None)
  38. results(3)._2 must beRight(ConnectionInfo(addr("192.0.2.43"), false))
  39. results(3)._3 must beSome(true)
  40. results(4)._1 must_== ForwardedEntry(Some("198.51.100.17"), None)
  41. results(4)._2 must beRight(ConnectionInfo(addr("198.51.100.17"), false))
  42. results(4)._3 must beSome(false)
  43. results(5)._1 must_== ForwardedEntry(Some("127.0.0.1"), None)
  44. results(5)._2 must beRight(ConnectionInfo(addr("127.0.0.1"), false))
  45. results(5)._3 must beSome(false)
  46. results(6)._1 must_== ForwardedEntry(Some("192.0.2.61"), Some("https"))
  47. results(6)._2 must beRight(ConnectionInfo(addr("192.0.2.61"), true))
  48. results(6)._3 must beSome(true)
  49. results(7)._1 must_== ForwardedEntry(Some("unknown"), None)
  50. results(7)._2 must beLeft
  51. results(7)._3 must beNone
  52. }
  53. "parse x-forwarded entries" in {
  54. val results = processHeaders(version("x-forwarded") ++ trustedProxies("2001:db8:cafe::17"), headers(
  55. """
  56. |X-Forwarded-For: 192.168.1.1, ::1, [2001:db8:cafe::17], 127.0.0.1
  57. |X-Forwarded-Proto: https, http, https, http
  58. """.stripMargin
  59. ))
  60. results.length must_== 4
  61. results(0)._1 must_== ForwardedEntry(Some("192.168.1.1"), Some("https"))
  62. results(0)._2 must beRight(ConnectionInfo(addr("192.168.1.1"), true))
  63. results(0)._3 must beSome(false)
  64. results(1)._1 must_== ForwardedEntry(Some("::1"), Some("http"))
  65. results(1)._2 must beRight(ConnectionInfo(addr("::1"), false))
  66. results(1)._3 must beSome(false)
  67. results(2)._1 must_== ForwardedEntry(Some("[2001:db8:cafe::17]"), Some("https"))
  68. results(2)._2 must beRight(ConnectionInfo(addr("2001:db8:cafe::17"), true))
  69. results(2)._3 must beSome(true)
  70. results(3)._1 must_== ForwardedEntry(Some("127.0.0.1"), Some("http"))
  71. results(3)._2 must beRight(ConnectionInfo(addr("127.0.0.1"), false))
  72. results(3)._3 must beSome(false)
  73. }
  74. "default to trusting IPv4 and IPv6 localhost with rfc7239 when there is config with default settings" in {
  75. handler(version("rfc7239")).remoteConnection(localhost, false, headers(
  76. """
  77. |Forwarded: for=192.0.2.43;proto=https, for="[::1]"
  78. """.stripMargin)) mustEqual ConnectionInfo(addr("192.0.2.43"), true)
  79. }
  80. "ignore proxy hosts with rfc7239 when no proxies are trusted" in {
  81. handler(version("rfc7239") ++ trustedProxies()).remoteConnection(localhost, false, headers(
  82. """
  83. |Forwarded: for="_gazonk"
  84. |Forwarded: For="[2001:db8:cafe::17]:4711"
  85. |Forwarded: for=192.0.2.60;proto=http;by=203.0.113.43
  86. |Forwarded: for=192.0.2.43, for=198.51.100.17, for=127.0.0.1
  87. """.stripMargin)) mustEqual ConnectionInfo(localhost, false)
  88. }
  89. "get first untrusted proxy host with rfc7239 with ipv4 localhost" in {
  90. handler(version("rfc7239")).remoteConnection(localhost, false, headers(
  91. """
  92. |Forwarded: for="_gazonk"
  93. |Forwarded: For="[2001:db8:cafe::17]:4711"
  94. |Forwarded: for=192.0.2.60;proto=http;by=203.0.113.43
  95. |Forwarded: for=192.0.2.43, for=198.51.100.17, for=127.0.0.1
  96. """.stripMargin)) mustEqual ConnectionInfo(addr("198.51.100.17"), false)
  97. }
  98. "get first untrusted proxy host with rfc7239 with ipv6 localhost" in {
  99. handler(version("rfc7239")).remoteConnection(localhost, false, headers(
  100. """
  101. |Forwarded: for="_gazonk"
  102. |Forwarded: For="[2001:db8:cafe::17]:4711"
  103. |Forwarded: for=192.0.2.60;proto=http;by=203.0.113.43
  104. |Forwarded: for=192.0.2.43, for=[::1]
  105. """.stripMargin)) mustEqual ConnectionInfo(addr("192.0.2.43"), false)
  106. }
  107. "get first untrusted proxy with rfc7239 with trusted proxy subnet" in {
  108. handler(version("rfc7239") ++ trustedProxies("192.168.1.1/24", "127.0.0.1")).remoteConnection(localhost, false, headers(
  109. """
  110. |Forwarded: for="_gazonk"
  111. |Forwarded: For="[2001:db8:cafe::17]:4711"
  112. |Forwarded: for=192.0.2.60;proto=http;by=203.0.113.43
  113. |Forwarded: for=192.168.1.10, for=127.0.0.1
  114. """.stripMargin)) mustEqual ConnectionInfo(addr("192.0.2.60"), false)
  115. }
  116. "get first untrusted proxy protocol with rfc7239 with trusted localhost proxy" in {
  117. handler(version("rfc7239") ++ trustedProxies("127.0.0.1")).remoteConnection(localhost, false, headers(
  118. """
  119. |Forwarded: for="_gazonk"
  120. |Forwarded: For="[2001:db8:cafe::17]:4711"
  121. |Forwarded: for=192.0.2.60;proto=http;by=203.0.113.43
  122. |Forwarded: for=192.168.1.10, for=127.0.0.1
  123. """.stripMargin)) mustEqual ConnectionInfo(addr("192.168.1.10"), false)
  124. }
  125. "get first untrusted proxy protocol with rfc7239 with subnet mask" in {
  126. handler(version("rfc7239") ++ trustedProxies("192.168.1.1/24", "127.0.0.1")).remoteConnection(localhost, false, headers(
  127. """
  128. |Forwarded: for="_gazonk"
  129. |Forwarded: For="[2001:db8:cafe::17]:4711"
  130. |Forwarded: for=192.0.2.60;proto=https;by=203.0.113.43
  131. |Forwarded: for=192.168.1.10, for=127.0.0.1
  132. """.stripMargin)) mustEqual ConnectionInfo(addr("192.0.2.60"), true)
  133. }
  134. "handle IPv6 addresses with rfc7239" in {
  135. handler(version("rfc7239") ++ trustedProxies("127.0.0.1")).remoteConnection(localhost, false, headers(
  136. """
  137. |Forwarded: For=[2001:db8:cafe::17]:4711
  138. """.stripMargin)) mustEqual ConnectionInfo(addr("2001:db8:cafe::17"), false)
  139. }
  140. "handle quoted IPv6 addresses with rfc7239" in {
  141. handler(version("rfc7239") ++ trustedProxies("127.0.0.1")).remoteConnection(localhost, false, headers(
  142. """
  143. |Forwarded: For="[2001:db8:cafe::17]:4711"
  144. """.stripMargin)) mustEqual ConnectionInfo(addr("2001:db8:cafe::17"), false)
  145. }
  146. "ignore obfuscated addresses with rfc7239" in {
  147. handler(version("rfc7239") ++ trustedProxies("192.168.1.1/24", "127.0.0.1")).remoteConnection(localhost, false, headers(
  148. """
  149. |Forwarded: for="_gazonk"
  150. |Forwarded: for=192.168.1.10, for=127.0.0.1
  151. """.stripMargin)) mustEqual ConnectionInfo(addr("192.168.1.10"), false)
  152. }
  153. "ignore unknown addresses with rfc7239" in {
  154. handler(version("rfc7239") ++ trustedProxies("192.168.1.1/24", "127.0.0.1")).remoteConnection(localhost, false, headers(
  155. """
  156. |Forwarded: for=unknown
  157. |Forwarded: for=192.168.1.10, for=127.0.0.1
  158. """.stripMargin)) mustEqual ConnectionInfo(addr("192.168.1.10"), false)
  159. }
  160. "ignore rfc7239 header with empty addresses" in {
  161. handler(version("rfc7239") ++ trustedProxies("192.0.2.43")).remoteConnection(addr("192.0.2.43"), true, headers(
  162. """
  163. |Forwarded: for=""
  164. """.stripMargin)) mustEqual ConnectionInfo(addr("192.0.2.43"), true)
  165. }
  166. "partly ignore rfc7239 header with some empty addresses" in {
  167. handler(version("rfc7239") ++ trustedProxies("192.168.1.1/24", "127.0.0.1")).remoteConnection(localhost, false, headers(
  168. """
  169. |Forwarded: for=, for=
  170. |Forwarded: for=192.168.1.10, for=127.0.0.1
  171. """.stripMargin)) mustEqual ConnectionInfo(addr("192.168.1.10"), false)
  172. }
  173. "ignore rfc7239 header field with missing = sign" in {
  174. handler(version("rfc7239") ++ trustedProxies("192.168.1.1/24", "127.0.0.1")).remoteConnection(localhost, false, headers(
  175. """
  176. |Forwarded: for
  177. |Forwarded: for=192.168.1.10, for=127.0.0.1
  178. """.stripMargin)) mustEqual ConnectionInfo(addr("192.168.1.10"), false)
  179. }
  180. "ignore rfc7239 header field with two == signs" in {
  181. handler(version("rfc7239") ++ trustedProxies("192.168.1.1/24", "127.0.0.1")).remoteConnection(localhost, false, headers(
  182. """
  183. |Forwarded: for==
  184. |Forwarded: for=192.168.1.10, for=127.0.0.1
  185. """.stripMargin)) mustEqual ConnectionInfo(addr("192.168.1.10"), false)
  186. }
  187. // This quotation handling is not RFC-compliant but we want to make sure we
  188. // at least handle the case gracefully.
  189. "don't unquote rfc7239 header field with one \" character" in {
  190. handler(version("rfc7239") ++ trustedProxies("192.168.1.1/24", "127.0.0.1")).remoteConnection(localhost, false, headers(
  191. """
  192. |Forwarded: for==
  193. |Forwarded: for=192.168.1.10, for=127.0.0.1
  194. """.stripMargin)) mustEqual ConnectionInfo(addr("192.168.1.10"), false)
  195. }
  196. // This quotation handling is not RFC-compliant but we want to make sure we
  197. // at least handle the case gracefully.
  198. "unquote and ignore rfc7239 empty quoted header field" in {
  199. handler(version("rfc7239") ++ trustedProxies("192.168.1.1/24", "127.0.0.1")).remoteConnection(localhost, false, headers(
  200. """
  201. |Forwarded: for=""
  202. |Forwarded: for=192.168.1.10, for=127.0.0.1
  203. """.stripMargin)) mustEqual ConnectionInfo(addr("192.168.1.10"), false)
  204. }
  205. // This quotation handling is not RFC-compliant but we want to make sure we
  206. // at least handle the case gracefully.
  207. "kind of unquote rfc7239 header field with three \" characters" in {
  208. handler(version("rfc7239") ++ trustedProxies("192.168.1.1/24", "127.0.0.1")).remoteConnection(localhost, false, headers(
  209. """
  210. |Forwarded: for=""" + '"' + '"' + '"' + """
  211. |Forwarded: for=192.168.1.10, for=127.0.0.1
  212. """.stripMargin)) mustEqual ConnectionInfo(addr("192.168.1.10"), false)
  213. }
  214. "default to trusting IPv4 and IPv6 localhost with x-forwarded when there is no config" in {
  215. noConfigHandler.remoteConnection(localhost, false, headers(
  216. """
  217. |X-Forwarded-For: 192.0.2.43, ::1, 127.0.0.1, [::1]
  218. |X-Forwarded-Proto: https, http, http, https
  219. """.stripMargin)) mustEqual ConnectionInfo(addr("192.0.2.43"), true)
  220. }
  221. "trust IPv4 and IPv6 localhost with x-forwarded when there is config with default settings" in {
  222. handler(version("x-forwarded")).remoteConnection(localhost, false, headers(
  223. """
  224. |X-Forwarded-For: 192.0.2.43, ::1
  225. |X-Forwarded-Proto: https, https
  226. """.stripMargin)) mustEqual ConnectionInfo(addr("192.0.2.43"), true)
  227. }
  228. "get first untrusted proxy with x-forwarded with subnet mask" in {
  229. handler(version("x-forwarded") ++ trustedProxies("192.168.1.1/24", "127.0.0.1")).remoteConnection(localhost, false, headers(
  230. """
  231. |X-Forwarded-For: 203.0.113.43, 192.168.1.43
  232. |X-Forwarded-Proto: https, http
  233. """.stripMargin)) mustEqual ConnectionInfo(addr("203.0.113.43"), true)
  234. }
  235. "not treat the first x-forwarded entry as a proxy even if it is in trustedProxies range" in {
  236. handler(version("x-forwarded") ++ trustedProxies("192.168.1.1/24", "127.0.0.1")).remoteConnection(localhost, true, headers(
  237. """
  238. |X-Forwarded-For: 192.168.1.2, 192.168.1.3
  239. |X-Forwarded-Proto: http, http
  240. """.stripMargin)) mustEqual ConnectionInfo(addr("192.168.1.2"), false)
  241. }
  242. "assume http protocol with x-forwarded when proto list is missing" in {
  243. handler(version("x-forwarded") ++ trustedProxies("192.168.1.1/24", "127.0.0.1")).remoteConnection(localhost, false, headers(
  244. """
  245. |X-Forwarded-For: 203.0.113.43
  246. """.stripMargin)) mustEqual ConnectionInfo(addr("203.0.113.43"), false)
  247. }
  248. "assume http protocol with x-forwarded when proto list is shorter than for list" in {
  249. handler(version("x-forwarded") ++ trustedProxies("192.168.1.1/24", "127.0.0.1")).remoteConnection(localhost, false, headers(
  250. """
  251. |X-Forwarded-For: 203.0.113.43, 192.168.1.43
  252. |X-Forwarded-Proto: https
  253. """.stripMargin)) mustEqual ConnectionInfo(addr("203.0.113.43"), false)
  254. }
  255. "assume http protocol with x-forwarded when proto list is shorter than for list and all addresses are trusted" in {
  256. handler(version("x-forwarded") ++ trustedProxies("0.0.0.0/0")).remoteConnection(localhost, false, headers(
  257. """
  258. |X-Forwarded-For: 203.0.113.43, 192.168.1.43
  259. |X-Forwarded-Proto: https
  260. """.stripMargin)) mustEqual ConnectionInfo(addr("203.0.113.43"), false)
  261. }
  262. "assume http protocol with x-forwarded when proto list is longer than for list" in {
  263. handler(version("x-forwarded") ++ trustedProxies("192.168.1.1/24", "127.0.0.1")).remoteConnection(localhost, false, headers(
  264. """
  265. |X-Forwarded-For: 203.0.113.43, 192.168.1.43
  266. |X-Forwarded-Proto: https, https, https
  267. """.stripMargin)) mustEqual ConnectionInfo(addr("203.0.113.43"), false)
  268. }
  269. "assume http protocol with x-forwarded when proto is unrecognized" in {
  270. handler(version("x-forwarded") ++ trustedProxies("127.0.0.1")).remoteConnection(localhost, false, headers(
  271. """
  272. |X-Forwarded-For: 203.0.113.43
  273. |X-Forwarded-Proto: smtp
  274. """.stripMargin)) mustEqual ConnectionInfo(addr("203.0.113.43"), false)
  275. }
  276. "fall back to connection when single x-forwarded-for entry cannot be parsed" in {
  277. handler(version("x-forwarded") ++ trustedProxies("127.0.0.1")).remoteConnection(localhost, false, headers(
  278. """
  279. |X-Forwarded-For: ???
  280. """.stripMargin)) mustEqual ConnectionInfo(localhost, false)
  281. }
  282. // example from issue #5299
  283. "handle single unquoted IPv6 addresses in x-forwarded-for headers" in {
  284. handler(version("x-forwarded") ++ trustedProxies("127.0.0.1")).remoteConnection(localhost, false, headers(
  285. """
  286. |X-Forwarded-For: ::1
  287. """.stripMargin)) mustEqual ConnectionInfo(addr("::1"), false)
  288. }
  289. // example from RFC 7239 section 7.4
  290. "handle unquoted IPv6 addresses in x-forwarded-for headers" in {
  291. handler(version("x-forwarded") ++ trustedProxies("127.0.0.1", "2001:db8:cafe::17")).remoteConnection(localhost, false, headers(
  292. """
  293. |X-Forwarded-For: 192.0.2.43, 2001:db8:cafe::17
  294. """.stripMargin)) mustEqual ConnectionInfo(addr("192.0.2.43"), false)
  295. }
  296. // We're really forgiving about quoting for X-Forwarded-For headers,
  297. // since there isn't a real spec to follow.
  298. "handle lots of different IPv6 address quoting in x-forwarded-for headers" in {
  299. handler(version("x-forwarded")).remoteConnection(localhost, false, headers(
  300. """
  301. |X-Forwarded-For: 192.0.2.43, "::1", ::1, "[::1]", [::1]
  302. """.stripMargin)) mustEqual ConnectionInfo(addr("192.0.2.43"), false)
  303. }
  304. // We're really forgiving about quoting for X-Forwarded-For headers,
  305. // since there isn't a real spec to follow.
  306. "handle lots of different IPv6 address and proto quoting in x-forwarded-for headers" in {
  307. handler(version("x-forwarded")).remoteConnection(localhost, false, headers(
  308. """
  309. |X-Forwarded-For: 192.0.2.43, "::1", ::1, "[::1]", [::1]
  310. |X-Forwarded-Proto: "https", http, http, "http", http
  311. """.stripMargin)) mustEqual ConnectionInfo(addr("192.0.2.43"), true)
  312. }
  313. "ignore x-forward header with empty addresses" in {
  314. handler(version("x-forwarded") ++ trustedProxies("192.0.2.43")).remoteConnection(addr("192.0.2.43"), true, headers(
  315. """
  316. |X-Forwarded-For: ,,
  317. """.stripMargin)) mustEqual ConnectionInfo(addr("192.0.2.43"), true)
  318. }
  319. "partly ignore x-forward header with some empty addresses" in {
  320. handler(version("x-forwarded")).remoteConnection(localhost, false, headers(
  321. """
  322. |X-Forwarded-For: ,,192.0.2.43
  323. """.stripMargin)) mustEqual ConnectionInfo(addr("192.0.2.43"), false)
  324. }
  325. "return the first address if all addresses are trusted with RFC 7239" in {
  326. handler(version("rfc7239") ++ trustedProxies("192.168.1.1/24", "127.0.0.1")).remoteConnection(localhost, false, headers(
  327. """
  328. |Forwarded: for=192.168.1.12, for=192.168.1.10, for=127.0.0.1
  329. """.stripMargin)) mustEqual ConnectionInfo(addr("192.168.1.12"), false)
  330. }
  331. "return the first address if all addresses are trusted with X-Forwarded-For" in {
  332. handler(version("x-forwarded") ++ trustedProxies("192.168.1.1/24", "127.0.0.1")).remoteConnection(localhost, false, headers(
  333. """
  334. |X-Forwarded-For: 192.168.1.12, "192.168.1.10", 127.0.0.1
  335. |X-Forwarded-Proto: http, http, http
  336. """.stripMargin)) mustEqual ConnectionInfo(addr("192.168.1.12"), false)
  337. }
  338. }
  339. def noConfigHandler =
  340. new ForwardedHeaderHandler(ForwardedHeaderHandlerConfig(None))
  341. def handler(config: Map[String, Any]) =
  342. new ForwardedHeaderHandler(ForwardedHeaderHandlerConfig(Some(Configuration.reference ++ Configuration.from(config))))
  343. def version(s: String) = {
  344. Map("play.http.forwarded.version" -> s)
  345. }
  346. def trustedProxies(s: String*) = {
  347. Map("play.http.forwarded.trustedProxies" -> s)
  348. }
  349. def headers(s: String): Headers = {
  350. def split(s: String, regex: String): Option[(String, String)] = s.split(regex, 2).toList match {
  351. case k :: v :: Nil => Some(k -> v)
  352. case _ => None
  353. }
  354. new Headers(s.split("\n").flatMap(split(_, ":\\s*")))
  355. }
  356. def processHeaders(config: Map[String, Any], headers: Headers): Seq[(ForwardedEntry, Either[String, ConnectionInfo], Option[Boolean])] = {
  357. val configuration = ForwardedHeaderHandlerConfig(Some(Configuration.from(config)))
  358. configuration.forwardedHeaders(headers).map { forwardedEntry =>
  359. val errorOrConnection = configuration.parseEntry(forwardedEntry)
  360. val trusted = errorOrConnection match {
  361. case Left(_) => None
  362. case Right(connection) => Some(configuration.isTrustedProxy(connection))
  363. }
  364. (forwardedEntry, errorOrConnection, trusted)
  365. }
  366. }
  367. def addr(ip: String): InetAddress = InetAddress.getByName(ip)
  368. val localhost: InetAddress = addr("127.0.0.1")
  369. }