Download the PHP package yiisoft/proxy-middleware without Composer
On this page you can find all versions of the php package yiisoft/proxy-middleware. It is possible to download/install these versions without Composer. Possible dependencies are resolved automatically.
Download yiisoft/proxy-middleware
More information about yiisoft/proxy-middleware
Files in yiisoft/proxy-middleware
Package proxy-middleware
Short Description Yii Proxy Middleware
License BSD-3-Clause
Homepage https://www.yiiframework.com/
Informations about the package proxy-middleware
Yii Proxy Middleware
The package provides proxy related middleware classes that implement PSR-15:
TrustedHeaderProtocolResolver
.TrustedHostsNetworkResolver
.
For other miscellaneous middleware, there is a separate package - Yii Middleware.
For more information on how to use middleware in the Yii Framework, see the Yii middleware guide.
Requirements
- PHP 8.0 or higher.
Installation
The package could be installed with Composer:
General usage
TrustedHeaderProtocolResolver
Trusted header protocol resolver sets a server request protocol based on special header you trust
such as X-Forwarded-Proto
.
You can use it if your server is behind a trusted load balancer or a proxy that's always setting the special header itself discarding any header values provided by user.
TrustedHostsNetworkResolver
Scans the entire connection chain and resolves the data from forwarded headers taking into account trusted IPs. Additionally, all items' structure is thoroughly validated because headers' data can't be trusted. The following data is resolved:
- IP.
- Protocol
- Host.
- Port.
- IP identifier - unknown or
obfuscated. Used with
Forwarded
RFC header.
The typical use case is having an application behind a load balancer.
Trusted IPs
A list of trusted IPs from connection chain.
Proxies' IPs including the one in $_SERVER['REMOTE_ADDR']
must be specified here. For example, for
$_SERVER['REMOTE_ADDR']
with value 18.18.18.18
and 2 other proxies - 2.2.2.2
and 8.8.8.8
, the configuration will
be:
The order of IPs is not important.
Forwarded header groups
Header groups to parse the data from. By including headers in this list, they are trusted automatically.
The default is:
which is an alternative/shorter way of writing this:
The accepted values are:
TrustedHostsNetworkResolver::FORWARDED_HEADER_GROUP_RFC
string constant. Parse all data from singleForwarded
header according to RFC 7239.- Array. Parse data from separate forwarded headers with "X" prefix. Unlike with RFC variation, each header stores only
one data unit (for example, IP). Headers with "X" prefix are quite common despite being non-standard:
- X-Forwarded-For - IP.
- X-Forwarded-Proto - protocol.
- X-Forwarded-Host - host.
X-Forwarded-Port
- port.
The header groups are processed in the order they are defined. If the header containing IP is present and is non-empty, this group will be selected and further ones will be ignored.
You can add support for custom headers and/or change priority:
For protocol, it's also possible to resolve non-standard values via mapping:
or via callable:
It's also a good idea to limit default header groups to the only guaranteed sources of data:
Typical forwarded headers
List of headers that are considered related to forwarding.
The default is:
The headers that are present in this list but missing in a matching forwarded header group will be deleted from request because they are potentially not secure and likely were not passed by a proxy server.
For example, with default forwarded header groups' setup used as well:
and with the following request headers passed:
middleware will remove these headers from request:
x-forwarded-for
.x-forwarded-host
.x-forwarded-proto
.x-forwarded-port
.front-end-https
.
because RFC group is matching and the rest can't be trusted. The headers that are not declared as typical forwarded
headers will be left as is (Non-Forwarded
in the example above).
Accessing resolved data
Resolved IP is saved to a special request's attribute:
There is an additional attribute allowing to retrieve all previous validated and trusted connection chain items. It needs explicit configuration:
An example of contents:
Reverse-obfuscating IP identifier
You may extend middleware class and provide reverse-obfuscating logic for obfuscated IP identifiers:
Documentation
- Internals
If you need help or have a question, the Yii Forum is a good place for that. You may also check out other Yii Community Resources.
License
The Yii Proxy Middleware is free software. It is released under the terms of the BSD License.
Please see LICENSE
for more information.
Maintained by Yii Software.
Support the project
Follow updates
All versions of proxy-middleware with dependencies
ext-filter Version *
psr/http-message Version ^1.0|^2.0
psr/http-server-handler Version ^1.0
psr/http-server-middleware Version ^1.0
yiisoft/http Version ^1.2
yiisoft/network-utilities Version ^1.1