diff options
author | Jonas Schäfer <jonas@wielicki.name> | 2020-05-14 14:59:59 +0200 |
---|---|---|
committer | Jonas Schäfer <jonas@wielicki.name> | 2020-05-14 14:59:59 +0200 |
commit | d6de70d19f5a657070684ca1d3c68dd966412cf6 (patch) | |
tree | 43ffe2cb2884fd27138095cb199f851d20694fbc /plugins/mod_http.lua | |
parent | 84f9f4973c41a8094bc935ca5f08c47d7ac672c7 (diff) | |
download | prosody-d6de70d19f5a657070684ca1d3c68dd966412cf6.tar.gz prosody-d6de70d19f5a657070684ca1d3c68dd966412cf6.zip |
mod_http: Add documentation to the non-obvious logic of get_ip_from_request
Because docs are good.
Diffstat (limited to 'plugins/mod_http.lua')
-rw-r--r-- | plugins/mod_http.lua | 7 |
1 files changed, 7 insertions, 0 deletions
diff --git a/plugins/mod_http.lua b/plugins/mod_http.lua index c3e19bb3..b89ff21c 100644 --- a/plugins/mod_http.lua +++ b/plugins/mod_http.lua @@ -208,6 +208,13 @@ local function get_ip_from_request(request) local ip = request.conn:ip(); local forwarded_for = request.headers.x_forwarded_for; if forwarded_for then + -- This logic looks weird at first, but it makes sense. + -- The for loop will take the last non-trusted-proxy IP from `forwarded_for`. + -- We append the original request IP to the header. Then, since the last IP wins, there are two cases: + -- Case a) The original request IP is *not* in trusted proxies, in which case the X-Forwarded-For header will, effectively, be ineffective; the original request IP will win because it overrides any other IP in the header. + -- Case b) The original request IP is in trusted proxies. In that case, the if branch in the for loop will skip the last IP, causing it to be ignored. The second-to-last IP will be taken instead. + -- Case c) If the second-to-last IP is also a trusted proxy, it will also be ignored, iteratively, up to the last IP which isn’t in trusted proxies. + -- Case d) If all IPs are in trusted proxies, something went obviously wrong and the logic never overwrites `ip`, leaving it at the original request IP. forwarded_for = forwarded_for..", "..ip; for forwarded_ip in forwarded_for:gmatch("[^%s,]+") do if not trusted_proxies[forwarded_ip] then |