发布于 2015-08-27 16:51:18 | 214 次阅读 | 评论: 0 | 来源: 网络整理
When you deploy your application, you may be behind a load balancer (e.g. an AWS Elastic Load Balancer) or a reverse proxy (e.g. Varnish for caching).
For the most part, this doesn’t cause any problems with Symfony. But, when
a request passes through a proxy, certain request information is sent using
special X-Forwarded-*
headers. For example, instead of reading the REMOTE_ADDR
header (which will now be the IP address of your reverse proxy), the user’s
true IP will be stored in an X-Forwarded-For
header.
If you don’t configure Symfony to look for these headers, you’ll get incorrect information about the client’s IP address, whether or not the client is connecting via HTTPS, the client’s port and the hostname being requested.
This is no problem, but you do need to tell Symfony that this is happening and which reverse proxy IP addresses will be doing this type of thing:
# app/config/config.yml
# ...
framework:
trusted_proxies: [192.0.0.1, 10.0.0.0/8]
<!-- app/config/config.xml -->
<?xml version="1.0" encoding="UTF-8" ?>
<container xmlns="http://symfony.com/schema/dic/services"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xmlns:framework="http://symfony.com/schema/dic/symfony"
xsi:schemaLocation="http://symfony.com/schema/dic/services http://symfony.com/schema/dic/services/services-1.0.xsd
http://symfony.com/schema/dic/symfony http://symfony.com/schema/dic/symfony/symfony-1.0.xsd">
<framework:config trusted-proxies="192.0.0.1, 10.0.0.0/8">
<!-- ... -->
</framework>
</container>
// app/config/config.php
$container->loadFromExtension('framework', array(
'trusted_proxies' => array('192.0.0.1', '10.0.0.0/8'),
));
In this example, you’re saying that your reverse proxy (or proxies) has
the IP address 192.0.0.1
or matches the range of IP addresses that use
the CIDR notation 10.0.0.0/8
. For more details, see the
framework.trusted_proxies option.
That’s it! Symfony will now look for the correct X-Forwarded-*
headers
to get information like the client’s IP address, host, port and whether or
not the request is using HTTPS.
Some reverse proxies (like Amazon’s Elastic Load Balancers) don’t have a static IP address or even a range that you can target with the CIDR notation. In this case, you’ll need to - very carefully - trust all proxies.
Configure your web server(s) to not respond to traffic from any clients other than your load balancers. For AWS, this can be done with security groups.
Once you’ve guaranteed that traffic will only come from your trusted reverse proxies, configure Symfony to always trust incoming request. This is done inside of your front controller:
// web/app.php
// ...
Request::setTrustedProxies(array($request->server->get('REMOTE_ADDR')));
$response = $kernel->handle($request);
// ...
That’s it! It’s critical that you prevent traffic from all non-trusted sources. If you allow outside traffic, they could “spoof” their true IP address and other information.
Most reverse proxies store information on specific X-Forwarded-*
headers.
But if your reverse proxy uses non-standard header names, you can configure
these (see “Trusting Proxies”).
The code for doing this will need to live in your front controller (e.g. web/app.php
).