UNPKG

@fastify/proxy-addr

Version:

Determine address of proxied request

418 lines (358 loc) 12.8 kB
'use strict' const test = require('tape') const proxyaddr = require('..') test('req should be required', function (t) { t.throws(proxyaddr, /req.*required/u) t.end() }) test('trust should be required', function (t) { const req = createReq('127.0.0.1') t.throws(proxyaddr.bind(null, req), /trust.*required/u) t.end() }) test('trust should accept a function', function (t) { const req = createReq('127.0.0.1') t.doesNotThrow(proxyaddr.bind(null, req, all)) t.end() }) test('trust should accept an array', function (t) { const req = createReq('127.0.0.1') t.doesNotThrow(proxyaddr.bind(null, req, [])) t.end() }) test('trust should accept a string', function (t) { const req = createReq('127.0.0.1') t.doesNotThrow(proxyaddr.bind(null, req, '127.0.0.1')) t.end() }) test('trust should reject a number', function (t) { const req = createReq('127.0.0.1') t.throws(proxyaddr.bind(null, req, 42), /unsupported trust argument/u) t.end() }) test('trust should accept IPv4', function (t) { const req = createReq('127.0.0.1') t.doesNotThrow(proxyaddr.bind(null, req, '127.0.0.1')) t.end() }) test('trust should accept IPv6', function (t) { const req = createReq('127.0.0.1') t.doesNotThrow(proxyaddr.bind(null, req, '::1')) t.end() }) test('trust should accept IPv4-style IPv6', function (t) { const req = createReq('127.0.0.1') t.doesNotThrow(proxyaddr.bind(null, req, '::ffff:127.0.0.1')) t.end() }) test('trust should accept pre-defined names', function (t) { const req = createReq('127.0.0.1') t.doesNotThrow(proxyaddr.bind(null, req, 'loopback')) t.end() }) test('trust should accept pre-defined names in array', function (t) { const req = createReq('127.0.0.1') t.doesNotThrow(proxyaddr.bind(null, req, ['loopback', '10.0.0.1'])) t.end() }) test('trust should not alter input array', function (t) { const arr = ['loopback', '10.0.0.1'] const req = createReq('127.0.0.1') t.doesNotThrow(proxyaddr.bind(null, req, arr)) t.same(arr, ['loopback', '10.0.0.1']) t.end() }) test('trust should reject non-IP', function (t) { const req = createReq('127.0.0.1') t.throws(proxyaddr.bind(null, req, 'blargh'), /invalid IP address/u) t.throws(proxyaddr.bind(null, req, '10.0.300.1'), /invalid IP address/u) t.throws(proxyaddr.bind(null, req, '::ffff:30.168.1.9000'), /invalid IP address/u) t.throws(proxyaddr.bind(null, req, '-1'), /invalid IP address/u) t.end() }) test('trust should reject bad CIDR', function (t) { const req = createReq('127.0.0.1') t.throws(proxyaddr.bind(null, req, '10.0.0.1/internet'), /invalid range on address/u) t.throws(proxyaddr.bind(null, req, '10.0.0.1/6000'), /invalid range on address/u) t.throws(proxyaddr.bind(null, req, '::1/6000'), /invalid range on address/u) t.throws(proxyaddr.bind(null, req, '::ffff:a00:2/136'), /invalid range on address/u) t.throws(proxyaddr.bind(null, req, '::ffff:a00:2/-1'), /invalid range on address/u) t.end() }) test('trust should reject bad netmask', function (t) { const req = createReq('127.0.0.1') t.throws(proxyaddr.bind(null, req, '10.0.0.1/255.0.255.0'), /invalid range on address/u) t.throws(proxyaddr.bind(null, req, '10.0.0.1/ffc0::'), /invalid range on address/u) t.throws(proxyaddr.bind(null, req, 'fe80::/ffc0::'), /invalid range on address/u) t.throws(proxyaddr.bind(null, req, 'fe80::/255.255.255.0'), /invalid range on address/u) t.throws(proxyaddr.bind(null, req, '::ffff:a00:2/255.255.255.0'), /invalid range on address/u) t.end() }) test('trust should be invoked as trust(addr, i)', function (t) { const log = [] const req = createReq('127.0.0.1', { 'x-forwarded-for': '192.168.0.1, 10.0.0.1' }) proxyaddr(req, function (addr, i) { return log.push(Array.prototype.slice.call(arguments)) }) t.same(log, [ ['127.0.0.1', 0], ['10.0.0.1', 1] ]) t.end() }) test('with all trusted should return socket address wtesth no headers', function (t) { const req = createReq('127.0.0.1') t.equal(proxyaddr(req, all), '127.0.0.1') t.end() }) test('with all trusted should return header value', function (t) { const req = createReq('127.0.0.1', { 'x-forwarded-for': '10.0.0.1' }) t.equal(proxyaddr(req, all), '10.0.0.1') t.end() }) test('with all trusted should return furthest header value', function (t) { const req = createReq('127.0.0.1', { 'x-forwarded-for': '10.0.0.1, 10.0.0.2' }) t.equal(proxyaddr(req, all), '10.0.0.1') t.end() }) test('with none trusted should return socket address wtesth no headers', function (t) { const req = createReq('127.0.0.1') t.equal(proxyaddr(req, none), '127.0.0.1') t.end() }) test('with none trusted should return socket address wtesth headers', function (t) { const req = createReq('127.0.0.1', { 'x-forwarded-for': '10.0.0.1, 10.0.0.2' }) t.equal(proxyaddr(req, none), '127.0.0.1') t.end() }) test('with some trusted should return socket address wtesth no headers', function (t) { const req = createReq('127.0.0.1') t.equal(proxyaddr(req, trust10x), '127.0.0.1') t.end() }) test('with some trusted should return socket address when not trusted', function (t) { const req = createReq('127.0.0.1', { 'x-forwarded-for': '10.0.0.1, 10.0.0.2' }) t.equal(proxyaddr(req, trust10x), '127.0.0.1') t.end() }) test('with some trusted should return header when socket trusted', function (t) { const req = createReq('10.0.0.1', { 'x-forwarded-for': '192.168.0.1' }) t.equal(proxyaddr(req, trust10x), '192.168.0.1') t.end() }) test('with some trusted should return first untrusted after trusted', function (t) { const req = createReq('10.0.0.1', { 'x-forwarded-for': '192.168.0.1, 10.0.0.2' }) t.equal(proxyaddr(req, trust10x), '192.168.0.1') t.end() }) test('with some trusted should not skip untrusted', function (t) { const req = createReq('10.0.0.1', { 'x-forwarded-for': '10.0.0.3, 192.168.0.1, 10.0.0.2' }) t.equal(proxyaddr(req, trust10x), '192.168.0.1') t.end() }) test('when given array should accept ltesteral IP addresses', function (t) { const req = createReq('10.0.0.1', { 'x-forwarded-for': '192.168.0.1, 10.0.0.2' }) t.equal(proxyaddr(req, ['10.0.0.1', '10.0.0.2']), '192.168.0.1') t.end() }) test('when given array should not trust non-IP addresses', function (t) { const req = createReq('10.0.0.1', { 'x-forwarded-for': '192.168.0.1, 10.0.0.2, localhost' }) t.equal(proxyaddr(req, ['10.0.0.1', '10.0.0.2']), 'localhost') t.end() }) test('when given array should return socket address if none match', function (t) { const req = createReq('10.0.0.1', { 'x-forwarded-for': '192.168.0.1, 10.0.0.2' }) t.equal(proxyaddr(req, ['127.0.0.1', '192.168.0.100']), '10.0.0.1') t.end() }) test('when array empty should return socket address ', function (t) { const req = createReq('127.0.0.1') t.equal(proxyaddr(req, []), '127.0.0.1') t.end() }) test('when array empty should return socket address wtesth headers', function (t) { const req = createReq('127.0.0.1', { 'x-forwarded-for': '10.0.0.1, 10.0.0.2' }) t.equal(proxyaddr(req, []), '127.0.0.1') t.end() }) test('when given IPv4 addresses should accept ltesteral IP addresses', function (t) { const req = createReq('10.0.0.1', { 'x-forwarded-for': '192.168.0.1, 10.0.0.2' }) t.equal(proxyaddr(req, ['10.0.0.1', '10.0.0.2']), '192.168.0.1') t.end() }) test('when given IPv4 addresses should accept CIDR notation', function (t) { const req = createReq('10.0.0.1', { 'x-forwarded-for': '192.168.0.1, 10.0.0.200' }) t.equal(proxyaddr(req, '10.0.0.2/26'), '10.0.0.200') t.end() }) test('when given IPv4 addresses should accept netmask notation', function (t) { const req = createReq('10.0.0.1', { 'x-forwarded-for': '192.168.0.1, 10.0.0.200' }) t.equal(proxyaddr(req, '10.0.0.2/255.255.255.192'), '10.0.0.200') t.end() }) test('when given IPv6 addresses should accept ltesteral IP addresses', function (t) { const req = createReq('fe80::1', { 'x-forwarded-for': '2002:c000:203::1, fe80::2' }) t.equal(proxyaddr(req, ['fe80::1', 'fe80::2']), '2002:c000:203::1') t.end() }) test('when given IPv6 addresses should accept CIDR notation', function (t) { const req = createReq('fe80::1', { 'x-forwarded-for': '2002:c000:203::1, fe80::ff00' }) t.equal(proxyaddr(req, 'fe80::/125'), 'fe80::ff00') t.end() }) test('with IP version mixed should match respective versions', function (t) { const req = createReq('::1', { 'x-forwarded-for': '2002:c000:203::1' }) t.equal(proxyaddr(req, ['127.0.0.1', '::1']), '2002:c000:203::1') t.end() }) test('with IP version mixed should not match IPv4 to IPv6', function (t) { const req = createReq('::1', { 'x-forwarded-for': '2002:c000:203::1' }) t.equal(proxyaddr(req, '127.0.0.1'), '::1') t.end() }) test('when IPv4-mapped IPv6 addresses should match IPv4 trust to IPv6 request', function (t) { const req = createReq('::ffff:a00:1', { 'x-forwarded-for': '192.168.0.1, 10.0.0.2' }) t.equal(proxyaddr(req, ['10.0.0.1', '10.0.0.2']), '192.168.0.1') t.end() }) test('when IPv4-mapped IPv6 addresses should match IPv4 netmask trust to IPv6 request', function (t) { const req = createReq('::ffff:a00:1', { 'x-forwarded-for': '192.168.0.1, 10.0.0.2' }) t.equal(proxyaddr(req, ['10.0.0.1/16']), '192.168.0.1') t.end() }) test('when IPv4-mapped IPv6 addresses should match IPv6 trust to IPv4 request', function (t) { const req = createReq('10.0.0.1', { 'x-forwarded-for': '192.168.0.1, 10.0.0.2' }) t.equal(proxyaddr(req, ['::ffff:a00:1', '::ffff:a00:2']), '192.168.0.1') t.end() }) test('when IPv4-mapped IPv6 addresses should match CIDR notation for IPv4-mapped address', function (t) { const req = createReq('10.0.0.1', { 'x-forwarded-for': '192.168.0.1, 10.0.0.200' }) t.equal(proxyaddr(req, '::ffff:a00:2/122'), '10.0.0.200') t.end() }) test('when IPv4-mapped IPv6 addresses should match CIDR notation for IPv4-mapped address mixed wtesth IPv6 CIDR', function (t) { const req = createReq('10.0.0.1', { 'x-forwarded-for': '192.168.0.1, 10.0.0.200' }) t.equal(proxyaddr(req, ['::ffff:a00:2/122', 'fe80::/125']), '10.0.0.200') t.end() }) test('when IPv4-mapped IPv6 addresses should match CIDR notation for IPv4-mapped address mixed wtesth IPv4 addresses', function (t) { const req = createReq('10.0.0.1', { 'x-forwarded-for': '192.168.0.1, 10.0.0.200' }) t.equal(proxyaddr(req, ['::ffff:a00:2/122', '127.0.0.1']), '10.0.0.200') t.end() }) test('when given predefined names should accept single pre-defined name', function (t) { const req = createReq('fe80::1', { 'x-forwarded-for': '2002:c000:203::1, fe80::2' }) t.equal(proxyaddr(req, 'linklocal'), '2002:c000:203::1') t.end() }) test('when given predefined names should accept multiple pre-defined names', function (t) { const req = createReq('::1', { 'x-forwarded-for': '2002:c000:203::1, fe80::2' }) t.equal(proxyaddr(req, ['loopback', 'linklocal']), '2002:c000:203::1') t.end() }) test('when header contains non-ip addresses should stop at first non-ip after trusted', function (t) { const req = createReq('127.0.0.1', { 'x-forwarded-for': 'myrouter, 127.0.0.1, proxy' }) t.equal(proxyaddr(req, '127.0.0.1'), 'proxy') t.end() }) test('when header contains non-ip addresses should stop at first malformed ip after trusted', function (t) { const req = createReq('127.0.0.1', { 'x-forwarded-for': 'myrouter, 127.0.0.1, ::8:8:8:8:8:8:8:8:8' }) t.equal(proxyaddr(req, '127.0.0.1'), '::8:8:8:8:8:8:8:8:8') t.end() }) test('when header contains non-ip addresses should provide all values to function', function (t) { const log = [] const req = createReq('127.0.0.1', { 'x-forwarded-for': 'myrouter, 127.0.0.1, proxy' }) proxyaddr(req, function (addr, i) { return log.push(Array.prototype.slice.call(arguments)) }) t.same(log, [ ['127.0.0.1', 0], ['proxy', 1], ['127.0.0.1', 2] ]) t.end() }) test('when socket address undefined should return undefined as address', function (t) { const req = createReq(undefined) t.equal(proxyaddr(req, '127.0.0.1'), undefined) t.end() }) test('when socket address undefined should return undefined even wtesth trusted headers', function (t) { const req = createReq(undefined, { 'x-forwarded-for': '127.0.0.1, 10.0.0.1' }) t.equal(proxyaddr(req, '127.0.0.1'), undefined) t.end() }) function createReq (socketAddr, headers) { return { socket: { remoteAddress: socketAddr }, headers: headers || {} } } function all () { return true } function none () { return false } function trust10x (addr) { return /^10\./u.test(addr) }