mirror of
https://github.com/cwinfo/matterbridge.git
synced 2024-11-30 01:31:36 +00:00
138 lines
3.7 KiB
Go
138 lines
3.7 KiB
Go
|
package echo
|
||
|
|
||
|
import (
|
||
|
"net"
|
||
|
"net/http"
|
||
|
"strings"
|
||
|
)
|
||
|
|
||
|
type ipChecker struct {
|
||
|
trustLoopback bool
|
||
|
trustLinkLocal bool
|
||
|
trustPrivateNet bool
|
||
|
trustExtraRanges []*net.IPNet
|
||
|
}
|
||
|
|
||
|
// TrustOption is config for which IP address to trust
|
||
|
type TrustOption func(*ipChecker)
|
||
|
|
||
|
// TrustLoopback configures if you trust loopback address (default: true).
|
||
|
func TrustLoopback(v bool) TrustOption {
|
||
|
return func(c *ipChecker) {
|
||
|
c.trustLoopback = v
|
||
|
}
|
||
|
}
|
||
|
|
||
|
// TrustLinkLocal configures if you trust link-local address (default: true).
|
||
|
func TrustLinkLocal(v bool) TrustOption {
|
||
|
return func(c *ipChecker) {
|
||
|
c.trustLinkLocal = v
|
||
|
}
|
||
|
}
|
||
|
|
||
|
// TrustPrivateNet configures if you trust private network address (default: true).
|
||
|
func TrustPrivateNet(v bool) TrustOption {
|
||
|
return func(c *ipChecker) {
|
||
|
c.trustPrivateNet = v
|
||
|
}
|
||
|
}
|
||
|
|
||
|
// TrustIPRange add trustable IP ranges using CIDR notation.
|
||
|
func TrustIPRange(ipRange *net.IPNet) TrustOption {
|
||
|
return func(c *ipChecker) {
|
||
|
c.trustExtraRanges = append(c.trustExtraRanges, ipRange)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func newIPChecker(configs []TrustOption) *ipChecker {
|
||
|
checker := &ipChecker{trustLoopback: true, trustLinkLocal: true, trustPrivateNet: true}
|
||
|
for _, configure := range configs {
|
||
|
configure(checker)
|
||
|
}
|
||
|
return checker
|
||
|
}
|
||
|
|
||
|
func isPrivateIPRange(ip net.IP) bool {
|
||
|
if ip4 := ip.To4(); ip4 != nil {
|
||
|
return ip4[0] == 10 ||
|
||
|
ip4[0] == 172 && ip4[1]&0xf0 == 16 ||
|
||
|
ip4[0] == 192 && ip4[1] == 168
|
||
|
}
|
||
|
return len(ip) == net.IPv6len && ip[0]&0xfe == 0xfc
|
||
|
}
|
||
|
|
||
|
func (c *ipChecker) trust(ip net.IP) bool {
|
||
|
if c.trustLoopback && ip.IsLoopback() {
|
||
|
return true
|
||
|
}
|
||
|
if c.trustLinkLocal && ip.IsLinkLocalUnicast() {
|
||
|
return true
|
||
|
}
|
||
|
if c.trustPrivateNet && isPrivateIPRange(ip) {
|
||
|
return true
|
||
|
}
|
||
|
for _, trustedRange := range c.trustExtraRanges {
|
||
|
if trustedRange.Contains(ip) {
|
||
|
return true
|
||
|
}
|
||
|
}
|
||
|
return false
|
||
|
}
|
||
|
|
||
|
// IPExtractor is a function to extract IP addr from http.Request.
|
||
|
// Set appropriate one to Echo#IPExtractor.
|
||
|
// See https://echo.labstack.com/guide/ip-address for more details.
|
||
|
type IPExtractor func(*http.Request) string
|
||
|
|
||
|
// ExtractIPDirect extracts IP address using actual IP address.
|
||
|
// Use this if your server faces to internet directory (i.e.: uses no proxy).
|
||
|
func ExtractIPDirect() IPExtractor {
|
||
|
return func(req *http.Request) string {
|
||
|
ra, _, _ := net.SplitHostPort(req.RemoteAddr)
|
||
|
return ra
|
||
|
}
|
||
|
}
|
||
|
|
||
|
// ExtractIPFromRealIPHeader extracts IP address using x-real-ip header.
|
||
|
// Use this if you put proxy which uses this header.
|
||
|
func ExtractIPFromRealIPHeader(options ...TrustOption) IPExtractor {
|
||
|
checker := newIPChecker(options)
|
||
|
return func(req *http.Request) string {
|
||
|
directIP := ExtractIPDirect()(req)
|
||
|
realIP := req.Header.Get(HeaderXRealIP)
|
||
|
if realIP != "" {
|
||
|
if ip := net.ParseIP(directIP); ip != nil && checker.trust(ip) {
|
||
|
return realIP
|
||
|
}
|
||
|
}
|
||
|
return directIP
|
||
|
}
|
||
|
}
|
||
|
|
||
|
// ExtractIPFromXFFHeader extracts IP address using x-forwarded-for header.
|
||
|
// Use this if you put proxy which uses this header.
|
||
|
// This returns nearest untrustable IP. If all IPs are trustable, returns furthest one (i.e.: XFF[0]).
|
||
|
func ExtractIPFromXFFHeader(options ...TrustOption) IPExtractor {
|
||
|
checker := newIPChecker(options)
|
||
|
return func(req *http.Request) string {
|
||
|
directIP := ExtractIPDirect()(req)
|
||
|
xffs := req.Header[HeaderXForwardedFor]
|
||
|
if len(xffs) == 0 {
|
||
|
return directIP
|
||
|
}
|
||
|
ips := append(strings.Split(strings.Join(xffs, ","), ","), directIP)
|
||
|
for i := len(ips) - 1; i >= 0; i-- {
|
||
|
ip := net.ParseIP(strings.TrimSpace(ips[i]))
|
||
|
if ip == nil {
|
||
|
// Unable to parse IP; cannot trust entire records
|
||
|
return directIP
|
||
|
}
|
||
|
if !checker.trust(ip) {
|
||
|
return ip.String()
|
||
|
}
|
||
|
}
|
||
|
// All of the IPs are trusted; return first element because it is furthest from server (best effort strategy).
|
||
|
return strings.TrimSpace(ips[0])
|
||
|
}
|
||
|
}
|