/transport/server/play-server/src/test/scala/play/core/server/common/ForwardedHeaderHandlerSpec.scala

http://github.com/playframework/Play20 · Scala · 528 lines · 494 code · 25 blank · 9 comment · 6 complexity · 3463fd5d6fd2131b78c273c899053753 MD5 · raw file

  1. /*
  2. * Copyright (C) Lightbend Inc. <https://www.lightbend.com>
  3. */
  4. package play.core.server.common
  5. import java.net.InetAddress
  6. import com.google.common.net.InetAddresses
  7. import org.specs2.mutable.Specification
  8. import play.api.mvc.Headers
  9. import org.specs2.mutable.Specification
  10. import play.api.mvc.Headers
  11. import play.api.mvc.request.RemoteConnection
  12. import play.api.Configuration
  13. import play.api.PlayException
  14. import play.core.server.common.ForwardedHeaderHandler._
  15. class ForwardedHeaderHandlerSpec extends Specification {
  16. "ForwardedHeaderHandler" should {
  17. """not accept a wrong setting as "play.http.forwarded.version" in config""" in {
  18. handler(version("rfc7240")) must throwA[PlayException]
  19. }
  20. "parse rfc7239 entries" in {
  21. val results = processHeaders(
  22. version("rfc7239") ++ trustedProxies("192.0.2.60/24"),
  23. headers(
  24. """
  25. |Forwarded: for="_gazonk"
  26. |Forwarded: For="[2001:db8:cafe::17]:4711"
  27. |Forwarded: for=192.0.2.60;proto=http;by=203.0.113.43
  28. |Forwarded: for=192.0.2.43, for=198.51.100.17, for=127.0.0.1
  29. |Forwarded: for=192.0.2.61;proto=https
  30. |Forwarded: for=unknown
  31. |Forwarded: For="[::ffff:192.168.0.9]";proto=https
  32. """.stripMargin
  33. )
  34. )
  35. results.length must_== 9
  36. results(0)._1 must_== ForwardedEntry(Some("_gazonk"), None)
  37. results(0)._2 must beLeft
  38. results(0)._3 must beNone
  39. results(1)._1 must_== ForwardedEntry(Some("[2001:db8:cafe::17]:4711"), None)
  40. results(1)._2 must beRight(ParsedForwardedEntry(addr("2001:db8:cafe::17"), false))
  41. results(1)._3 must beSome(false)
  42. results(2)._1 must_== ForwardedEntry(Some("192.0.2.60"), Some("http"))
  43. results(2)._2 must beRight(ParsedForwardedEntry(addr("192.0.2.60"), false))
  44. results(2)._3 must beSome(true)
  45. results(3)._1 must_== ForwardedEntry(Some("192.0.2.43"), None)
  46. results(3)._2 must beRight(ParsedForwardedEntry(addr("192.0.2.43"), false))
  47. results(3)._3 must beSome(true)
  48. results(4)._1 must_== ForwardedEntry(Some("198.51.100.17"), None)
  49. results(4)._2 must beRight(ParsedForwardedEntry(addr("198.51.100.17"), false))
  50. results(4)._3 must beSome(false)
  51. results(5)._1 must_== ForwardedEntry(Some("127.0.0.1"), None)
  52. results(5)._2 must beRight(ParsedForwardedEntry(addr("127.0.0.1"), false))
  53. results(5)._3 must beSome(false)
  54. results(6)._1 must_== ForwardedEntry(Some("192.0.2.61"), Some("https"))
  55. results(6)._2 must beRight(ParsedForwardedEntry(addr("192.0.2.61"), true))
  56. results(6)._3 must beSome(true)
  57. results(7)._1 must_== ForwardedEntry(Some("unknown"), None)
  58. results(7)._2 must beLeft
  59. results(7)._3 must beNone
  60. results(8)._1 must_== ForwardedEntry(Some("[::ffff:192.168.0.9]"), Some("https"))
  61. results(8)._2 must beRight(ParsedForwardedEntry(addr("::ffff:192.168.0.9"), true))
  62. results(8)._3 must beSome(false)
  63. }
  64. "parse x-forwarded entries" in {
  65. val results = processHeaders(
  66. version("x-forwarded") ++ trustedProxies("2001:db8:cafe::17"),
  67. headers(
  68. """
  69. |X-Forwarded-For: 192.168.1.1, ::1, [2001:db8:cafe::17], 127.0.0.1, ::ffff:123.123.123.123
  70. |X-Forwarded-Proto: https, http, https, http, https
  71. """.stripMargin
  72. )
  73. )
  74. results.length must_== 5
  75. results(0)._1 must_== ForwardedEntry(Some("192.168.1.1"), Some("https"))
  76. results(0)._2 must beRight(ParsedForwardedEntry(addr("192.168.1.1"), true))
  77. results(0)._3 must beSome(false)
  78. results(1)._1 must_== ForwardedEntry(Some("::1"), Some("http"))
  79. results(1)._2 must beRight(ParsedForwardedEntry(addr("::1"), false))
  80. results(1)._3 must beSome(false)
  81. results(2)._1 must_== ForwardedEntry(Some("[2001:db8:cafe::17]"), Some("https"))
  82. results(2)._2 must beRight(ParsedForwardedEntry(addr("2001:db8:cafe::17"), true))
  83. results(2)._3 must beSome(true)
  84. results(3)._1 must_== ForwardedEntry(Some("127.0.0.1"), Some("http"))
  85. results(3)._2 must beRight(ParsedForwardedEntry(addr("127.0.0.1"), false))
  86. results(3)._3 must beSome(false)
  87. results(4)._1 must_== ForwardedEntry(Some("::ffff:123.123.123.123"), Some("https"))
  88. results(4)._2 must beRight(ParsedForwardedEntry(addr("::ffff:123.123.123.123"), true))
  89. results(4)._3 must beSome(false)
  90. }
  91. "default to trusting IPv4 and IPv6 localhost with rfc7239 when there is config with default settings" in {
  92. remoteConnectionToLocalhost(
  93. version("rfc7239"),
  94. """
  95. |Forwarded: for=192.0.2.43;proto=https, for="[::1]"
  96. """.stripMargin
  97. ) mustEqual RemoteConnection("192.0.2.43", true, None)
  98. }
  99. "ignore proxy hosts with rfc7239 when no proxies are trusted" in {
  100. remoteConnectionToLocalhost(
  101. version("rfc7239") ++ trustedProxies(),
  102. """
  103. |Forwarded: for="_gazonk"
  104. |Forwarded: For="[2001:db8:cafe::17]:4711"
  105. |Forwarded: for=192.0.2.60;proto=http;by=203.0.113.43
  106. |Forwarded: for=192.0.2.43, for=198.51.100.17, for=127.0.0.1
  107. """.stripMargin
  108. ) mustEqual RemoteConnection(localhost, false, None)
  109. }
  110. "get first untrusted proxy host with rfc7239 with ipv4 localhost" in {
  111. remoteConnectionToLocalhost(
  112. version("rfc7239"),
  113. """
  114. |Forwarded: for="_gazonk"
  115. |Forwarded: For="[2001:db8:cafe::17]:4711"
  116. |Forwarded: for=192.0.2.60;proto=http;by=203.0.113.43
  117. |Forwarded: for=192.0.2.43, for=198.51.100.17, for=127.0.0.1
  118. """.stripMargin
  119. ) mustEqual RemoteConnection("198.51.100.17", false, None)
  120. }
  121. "get first untrusted proxy host with rfc7239 with ipv6 localhost" in {
  122. remoteConnectionToLocalhost(
  123. version("rfc7239"),
  124. """
  125. |Forwarded: for="_gazonk"
  126. |Forwarded: For="[2001:db8:cafe::17]:4711"
  127. |Forwarded: for=192.0.2.60;proto=http;by=203.0.113.43
  128. |Forwarded: for=192.0.2.43, for=[::1]
  129. """.stripMargin
  130. ) mustEqual RemoteConnection("192.0.2.43", false, None)
  131. }
  132. "get first untrusted proxy with rfc7239 with trusted proxy subnet" in {
  133. remoteConnectionToLocalhost(
  134. version("rfc7239") ++ trustedProxies("192.168.1.1/24", "127.0.0.1"),
  135. """
  136. |Forwarded: for="_gazonk"
  137. |Forwarded: For="[2001:db8:cafe::17]:4711"
  138. |Forwarded: for=192.0.2.60;proto=http;by=203.0.113.43
  139. |Forwarded: for=192.168.1.10, for=127.0.0.1
  140. """.stripMargin
  141. ) mustEqual RemoteConnection("192.0.2.60", false, None)
  142. }
  143. "get first untrusted proxy protocol with rfc7239 with trusted localhost proxy" in {
  144. remoteConnectionToLocalhost(
  145. version("rfc7239") ++ trustedProxies("127.0.0.1"),
  146. """
  147. |Forwarded: for="_gazonk"
  148. |Forwarded: For="[2001:db8:cafe::17]:4711"
  149. |Forwarded: for=192.0.2.60;proto=http;by=203.0.113.43
  150. |Forwarded: for=192.168.1.10, for=127.0.0.1
  151. """.stripMargin
  152. ) mustEqual RemoteConnection("192.168.1.10", false, None)
  153. }
  154. "get first untrusted proxy protocol with rfc7239 with subnet mask" in {
  155. remoteConnectionToLocalhost(
  156. version("rfc7239") ++ trustedProxies("192.168.1.1/24", "127.0.0.1"),
  157. """
  158. |Forwarded: for="_gazonk"
  159. |Forwarded: For="[2001:db8:cafe::17]:4711"
  160. |Forwarded: for=192.0.2.60;proto=https;by=203.0.113.43
  161. |Forwarded: for=192.168.1.10, for=127.0.0.1
  162. """.stripMargin
  163. ) mustEqual RemoteConnection("192.0.2.60", true, None)
  164. }
  165. "handle IPv6 addresses with rfc7239" in {
  166. remoteConnectionToLocalhost(
  167. version("rfc7239") ++ trustedProxies("127.0.0.1"),
  168. """
  169. |Forwarded: For=[2001:db8:cafe::17]:4711
  170. """.stripMargin
  171. ) mustEqual RemoteConnection("2001:db8:cafe::17", false, None)
  172. }
  173. "handle quoted IPv6 addresses with rfc7239" in {
  174. remoteConnectionToLocalhost(
  175. version("rfc7239") ++ trustedProxies("127.0.0.1"),
  176. """
  177. |Forwarded: For="[2001:db8:cafe::17]:4711"
  178. """.stripMargin
  179. ) mustEqual RemoteConnection("2001:db8:cafe::17", false, None)
  180. }
  181. "handle quoted IPv4-mapped IPv6 addresses with rfc7239" in {
  182. handler(version("rfc7239") ++ trustedProxies("fe80::1", "::ffff:123.123.123.123"))
  183. .forwardedConnection(
  184. RemoteConnection("fe80::1", false, None),
  185. headers("""
  186. |Forwarded: For="[::ffff:99.99.99.99]:4711"
  187. |Forwarded: For="[::ffff:123.123.123.123]"
  188. """.stripMargin)
  189. ) mustEqual RemoteConnection(addr("::ffff:99.99.99.99"), false, None)
  190. }
  191. "ignore obfuscated addresses with rfc7239" in {
  192. remoteConnectionToLocalhost(
  193. version("rfc7239") ++ trustedProxies("192.168.1.1/24", "127.0.0.1"),
  194. """
  195. |Forwarded: for="_gazonk"
  196. |Forwarded: for=192.168.1.10, for=127.0.0.1
  197. """.stripMargin
  198. ) mustEqual RemoteConnection("192.168.1.10", false, None)
  199. }
  200. "ignore unknown addresses with rfc7239" in {
  201. remoteConnectionToLocalhost(
  202. version("rfc7239") ++ trustedProxies("192.168.1.1/24", "127.0.0.1"),
  203. """
  204. |Forwarded: for=unknown
  205. |Forwarded: for=192.168.1.10, for=127.0.0.1
  206. """.stripMargin
  207. ) mustEqual RemoteConnection("192.168.1.10", false, None)
  208. }
  209. "ignore rfc7239 header with empty addresses" in {
  210. handler(version("rfc7239") ++ trustedProxies("192.0.2.43"))
  211. .forwardedConnection(
  212. RemoteConnection("192.0.2.43", true, None),
  213. headers("""
  214. |Forwarded: for=""
  215. """.stripMargin)
  216. ) mustEqual RemoteConnection("192.0.2.43", true, None)
  217. }
  218. "partly ignore rfc7239 header with some empty addresses" in {
  219. remoteConnectionToLocalhost(
  220. version("rfc7239") ++ trustedProxies("192.168.1.1/24", "127.0.0.1"),
  221. """
  222. |Forwarded: for=, for=
  223. |Forwarded: for=192.168.1.10, for=127.0.0.1
  224. """.stripMargin
  225. ) mustEqual RemoteConnection("192.168.1.10", false, None)
  226. }
  227. "ignore rfc7239 header field with missing = sign" in {
  228. remoteConnectionToLocalhost(
  229. version("rfc7239") ++ trustedProxies("192.168.1.1/24", "127.0.0.1"),
  230. """
  231. |Forwarded: for
  232. |Forwarded: for=192.168.1.10, for=127.0.0.1
  233. """.stripMargin
  234. ) mustEqual RemoteConnection("192.168.1.10", false, None)
  235. }
  236. "ignore rfc7239 header field with two == signs" in {
  237. remoteConnectionToLocalhost(
  238. version("rfc7239") ++ trustedProxies("192.168.1.1/24", "127.0.0.1"),
  239. """
  240. |Forwarded: for==
  241. |Forwarded: for=192.168.1.10, for=127.0.0.1
  242. """.stripMargin
  243. ) mustEqual RemoteConnection("192.168.1.10", false, None)
  244. }
  245. // This quotation handling is not RFC-compliant but we want to make sure we
  246. // at least handle the case gracefully.
  247. "don't unquote rfc7239 header field with one \" character" in {
  248. remoteConnectionToLocalhost(
  249. version("rfc7239") ++ trustedProxies("192.168.1.1/24", "127.0.0.1"),
  250. """
  251. |Forwarded: for==
  252. |Forwarded: for=192.168.1.10, for=127.0.0.1
  253. """.stripMargin
  254. ) mustEqual RemoteConnection("192.168.1.10", false, None)
  255. }
  256. // This quotation handling is not RFC-compliant but we want to make sure we
  257. // at least handle the case gracefully.
  258. "unquote and ignore rfc7239 empty quoted header field" in {
  259. remoteConnectionToLocalhost(
  260. version("rfc7239") ++ trustedProxies("192.168.1.1/24", "127.0.0.1"),
  261. """
  262. |Forwarded: for=""
  263. |Forwarded: for=192.168.1.10, for=127.0.0.1
  264. """.stripMargin
  265. ) mustEqual RemoteConnection("192.168.1.10", false, None)
  266. }
  267. // This quotation handling is not RFC-compliant but we want to make sure we
  268. // at least handle the case gracefully.
  269. "kind of unquote rfc7239 header field with three \" characters" in {
  270. remoteConnectionToLocalhost(
  271. version("rfc7239") ++ trustedProxies("192.168.1.1/24", "127.0.0.1"),
  272. """
  273. |Forwarded: for=""" + '"' + '"' + '"' + """
  274. |Forwarded: for=192.168.1.10, for=127.0.0.1
  275. """.stripMargin
  276. ) mustEqual RemoteConnection("192.168.1.10", false, None)
  277. }
  278. "default to trusting IPv4 and IPv6 localhost with x-forwarded when there is no config" in {
  279. noConfigHandler.forwardedConnection(
  280. RemoteConnection(localhost, false, None),
  281. headers("""
  282. |X-Forwarded-For: 192.0.2.43, ::1, 127.0.0.1, [::1]
  283. |X-Forwarded-Proto: https, http, http, https
  284. """.stripMargin)
  285. ) mustEqual RemoteConnection("192.0.2.43", true, None)
  286. }
  287. "trust IPv4 and IPv6 localhost with x-forwarded when there is config with default settings" in {
  288. remoteConnectionToLocalhost(
  289. version("x-forwarded"),
  290. """
  291. |X-Forwarded-For: 192.0.2.43, ::1
  292. |X-Forwarded-Proto: https, https
  293. """.stripMargin
  294. ) mustEqual RemoteConnection("192.0.2.43", true, None)
  295. }
  296. "get first untrusted proxy with x-forwarded with subnet mask" in {
  297. remoteConnectionToLocalhost(
  298. version("x-forwarded") ++ trustedProxies("192.168.1.1/24", "127.0.0.1"),
  299. """
  300. |X-Forwarded-For: 203.0.113.43, 192.168.1.43
  301. |X-Forwarded-Proto: https, http
  302. """.stripMargin
  303. ) mustEqual RemoteConnection("203.0.113.43", true, None)
  304. }
  305. "not treat the first x-forwarded entry as a proxy even if it is in trustedProxies range" in {
  306. handler(version("x-forwarded") ++ trustedProxies("192.168.1.1/24", "127.0.0.1"))
  307. .forwardedConnection(
  308. RemoteConnection(localhost, true, None),
  309. headers("""
  310. |X-Forwarded-For: 192.168.1.2, 192.168.1.3
  311. |X-Forwarded-Proto: http, http
  312. """.stripMargin)
  313. ) mustEqual RemoteConnection("192.168.1.2", false, None)
  314. }
  315. "assume http protocol with x-forwarded when proto list is missing" in {
  316. remoteConnectionToLocalhost(
  317. version("x-forwarded") ++ trustedProxies("192.168.1.1/24", "127.0.0.1"),
  318. """
  319. |X-Forwarded-For: 203.0.113.43
  320. """.stripMargin
  321. ) mustEqual RemoteConnection("203.0.113.43", false, None)
  322. }
  323. "assume http protocol with x-forwarded when proto list is shorter than for list" in {
  324. remoteConnectionToLocalhost(
  325. version("x-forwarded") ++ trustedProxies("192.168.1.1/24", "127.0.0.1"),
  326. """
  327. |X-Forwarded-For: 203.0.113.43, 192.168.1.43
  328. |X-Forwarded-Proto: https
  329. """.stripMargin
  330. ) mustEqual RemoteConnection("203.0.113.43", false, None)
  331. }
  332. "assume http protocol with x-forwarded when proto list is shorter than for list and all addresses are trusted" in {
  333. remoteConnectionToLocalhost(
  334. version("x-forwarded") ++ trustedProxies("0.0.0.0/0"),
  335. """
  336. |X-Forwarded-For: 203.0.113.43, 192.168.1.43
  337. |X-Forwarded-Proto: https
  338. """.stripMargin
  339. ) mustEqual RemoteConnection("203.0.113.43", false, None)
  340. }
  341. "assume http protocol with x-forwarded when proto list is longer than for list" in {
  342. remoteConnectionToLocalhost(
  343. version("x-forwarded") ++ trustedProxies("192.168.1.1/24", "127.0.0.1"),
  344. """
  345. |X-Forwarded-For: 203.0.113.43, 192.168.1.43
  346. |X-Forwarded-Proto: https, https, https
  347. """.stripMargin
  348. ) mustEqual RemoteConnection("203.0.113.43", false, None)
  349. }
  350. "assume http protocol with x-forwarded when proto is unrecognized" in {
  351. remoteConnectionToLocalhost(
  352. version("x-forwarded") ++ trustedProxies("127.0.0.1"),
  353. """
  354. |X-Forwarded-For: 203.0.113.43
  355. |X-Forwarded-Proto: smtp
  356. """.stripMargin
  357. ) mustEqual RemoteConnection("203.0.113.43", false, None)
  358. }
  359. "fall back to connection when single x-forwarded-for entry cannot be parsed" in {
  360. remoteConnectionToLocalhost(
  361. version("x-forwarded") ++ trustedProxies("127.0.0.1"),
  362. """
  363. |X-Forwarded-For: ???
  364. """.stripMargin
  365. ) mustEqual RemoteConnection(localhost, false, None)
  366. }
  367. // example from issue #5299
  368. "handle single unquoted IPv6 addresses in x-forwarded-for headers" in {
  369. remoteConnectionToLocalhost(
  370. version("x-forwarded") ++ trustedProxies("127.0.0.1"),
  371. """
  372. |X-Forwarded-For: ::1
  373. """.stripMargin
  374. ) mustEqual RemoteConnection("::1", false, None)
  375. }
  376. // example from RFC 7239 section 7.4
  377. "handle unquoted IPv6 addresses in x-forwarded-for headers" in {
  378. remoteConnectionToLocalhost(
  379. version("x-forwarded") ++ trustedProxies("127.0.0.1", "2001:db8:cafe::17"),
  380. """
  381. |X-Forwarded-For: 192.0.2.43, 2001:db8:cafe::17
  382. """.stripMargin
  383. ) mustEqual RemoteConnection("192.0.2.43", false, None)
  384. }
  385. // We're really forgiving about quoting for X-Forwarded-For headers,
  386. // since there isn't a real spec to follow.
  387. "handle lots of different IPv6 address quoting in x-forwarded-for headers" in {
  388. remoteConnectionToLocalhost(
  389. version("x-forwarded"),
  390. """
  391. |X-Forwarded-For: 192.0.2.43, "::1", ::1, "[::1]", [::1]
  392. """.stripMargin
  393. ) mustEqual RemoteConnection("192.0.2.43", false, None)
  394. }
  395. // We're really forgiving about quoting for X-Forwarded-For headers,
  396. // since there isn't a real spec to follow.
  397. "handle lots of different IPv6 address and proto quoting in x-forwarded-for headers" in {
  398. remoteConnectionToLocalhost(
  399. version("x-forwarded"),
  400. """
  401. |X-Forwarded-For: 192.0.2.43, "::1", ::1, "[::1]", [::1]
  402. |X-Forwarded-Proto: "https", http, http, "http", http
  403. """.stripMargin
  404. ) mustEqual RemoteConnection("192.0.2.43", true, None)
  405. }
  406. "ignore x-forward header with empty addresses" in {
  407. handler(version("x-forwarded") ++ trustedProxies("192.0.2.43"))
  408. .forwardedConnection(
  409. RemoteConnection("192.0.2.43", true, None),
  410. headers("""
  411. |X-Forwarded-For: ,,
  412. """.stripMargin)
  413. ) mustEqual RemoteConnection("192.0.2.43", true, None)
  414. }
  415. "partly ignore x-forward header with some empty addresses" in {
  416. remoteConnectionToLocalhost(version("x-forwarded"), """
  417. |X-Forwarded-For: ,,192.0.2.43
  418. """.stripMargin) mustEqual RemoteConnection("192.0.2.43", false, None)
  419. }
  420. "return the first address if all addresses are trusted with RFC 7239" in {
  421. remoteConnectionToLocalhost(
  422. version("rfc7239") ++ trustedProxies("192.168.1.1/24", "127.0.0.1"),
  423. """
  424. |Forwarded: for=192.168.1.12, for=192.168.1.10, for=127.0.0.1
  425. """.stripMargin
  426. ) mustEqual RemoteConnection("192.168.1.12", false, None)
  427. }
  428. "return the first address if all addresses are trusted with X-Forwarded-For" in {
  429. remoteConnectionToLocalhost(
  430. version("x-forwarded") ++ trustedProxies("192.168.1.1/24", "127.0.0.1"),
  431. """
  432. |X-Forwarded-For: 192.168.1.12, "192.168.1.10", 127.0.0.1
  433. |X-Forwarded-Proto: http, http, http
  434. """.stripMargin
  435. ) mustEqual RemoteConnection("192.168.1.12", false, None)
  436. }
  437. }
  438. def noConfigHandler =
  439. new ForwardedHeaderHandler(ForwardedHeaderHandlerConfig(None))
  440. def handler(config: Map[String, Any]) =
  441. new ForwardedHeaderHandler(
  442. ForwardedHeaderHandlerConfig(Some(Configuration.from(config).withFallback(Configuration.reference)))
  443. )
  444. def remoteConnectionToLocalhost(config: Map[String, Any], headersText: String): RemoteConnection =
  445. handler(config).forwardedConnection(RemoteConnection("127.0.0.1", false, None), headers(headersText))
  446. def version(s: String) = {
  447. Map("play.http.forwarded.version" -> s)
  448. }
  449. def trustedProxies(s: String*) = {
  450. Map("play.http.forwarded.trustedProxies" -> s)
  451. }
  452. def headers(s: String): Headers = {
  453. def split(s: String, regex: String): Option[(String, String)] = s.split(regex, 2).toList match {
  454. case k :: v :: Nil => Some(k -> v)
  455. case _ => None
  456. }
  457. new Headers(s.split("\r?\n").toSeq.flatMap(split(_, ":\\s*")))
  458. }
  459. def processHeaders(
  460. config: Map[String, Any],
  461. headers: Headers
  462. ): Seq[(ForwardedEntry, Either[String, ParsedForwardedEntry], Option[Boolean])] = {
  463. val configuration = ForwardedHeaderHandlerConfig(Some(Configuration.from(config)))
  464. configuration.forwardedHeaders(headers).map { forwardedEntry =>
  465. val errorOrConnection = configuration.parseEntry(forwardedEntry)
  466. val trusted = errorOrConnection match {
  467. case Left(_) => None
  468. case Right(connection) => Some(configuration.isTrustedProxy(connection.address))
  469. }
  470. (forwardedEntry, errorOrConnection, trusted)
  471. }
  472. }
  473. def addr(ip: String): InetAddress = InetAddresses.forString(ip)
  474. val localhost: InetAddress = addr("127.0.0.1")
  475. }