-
-
Notifications
You must be signed in to change notification settings - Fork 5.2k
Adding a new entry about reverse proxies in the framework #4102
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from all commits
18af4e8
c55bc2e
81053ab
89e4d9d
5ab6c4a
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -4,4 +4,5 @@ Request | |
.. toctree:: | ||
:maxdepth: 2 | ||
|
||
load_balancer_reverse_proxy | ||
mime_type |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,103 @@ | ||
How to Configure Symfony to Work behind a Load Balancer or Reverse Proxy | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. [...] or a Reverse Proxy |
||
======================================================================== | ||
|
||
When you deploy your application, you may be behind a load balancer (e.g. | ||
an AWS Elastic Load Balancer) or a reverse proxy (e.g. Varnish for | ||
:doc:`caching</book/http_cache>`). | ||
|
||
For the most part, this doesn't cause any problems with Symfony. But, when | ||
a request passes through a proxy, certain request information is sent using | ||
special ``X-Forwarded-*`` headers. For example, instead of reading the ``REMOTE_ADDR`` | ||
header (which will now be the IP address of your reverse proxy), the user's | ||
true IP will be stored in an ``X-Forwarded-For`` header. | ||
|
||
.. tip:: | ||
|
||
If you're using Symfony's :ref:`AppCache<symfony-gateway-cache>` for caching, | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. add a space before |
||
then you *are* using a reverse proxy with the IP address ``127.0.0.1``. | ||
You'll need to configure that address as a trusted proxy below. | ||
|
||
If you don't configure Symfony to look for these headers, you'll get incorrect | ||
information about the client's IP address, whether or not the client is connecting | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I don't get the need to add this phrase here: "whether or not the client is connecting via HTTPS". There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. OK, I get it now: the "whether is HTTPS or not" phrase is not related to the previous phrase about the IP address. |
||
via HTTPS, the client's port and the hostname being requested. | ||
|
||
Solution: trusted_proxies | ||
------------------------- | ||
|
||
This is no problem, but you *do* need to tell Symfony that this is happening | ||
and which reverse proxy IP addresses will be doing this type of thing: | ||
|
||
.. configuration-block:: | ||
|
||
.. code-block:: yaml | ||
|
||
# app/config/config.yml | ||
# ... | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. standards say that there should be an empty line before this line |
||
framework: | ||
trusted_proxies: [192.0.0.1, 10.0.0.0/8] | ||
|
||
.. code-block:: xml | ||
|
||
<!-- app/config/config.xml --> | ||
<?xml version="1.0" encoding="UTF-8" ?> | ||
<container xmlns="http://symfony.com/schema/dic/services" | ||
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" | ||
xmlns:framework="http://symfony.com/schema/dic/symfony" | ||
xsi:schemaLocation="http://symfony.com/schema/dic/services http://symfony.com/schema/dic/services/services-1.0.xsd | ||
http://symfony.com/schema/dic/symfony http://symfony.com/schema/dic/symfony/symfony-1.0.xsd"> | ||
|
||
<framework:config trusted-proxies="192.0.0.1, 10.0.0.0/8"> | ||
<!-- ... --> | ||
</framework> | ||
</container> | ||
|
||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I like to have the XML complete (meaning to have all elements present that sorround the |
||
.. code-block:: php | ||
|
||
// app/config/config.php | ||
$container->loadFromExtension('framework', array( | ||
'trusted_proxies' => array('192.0.0.1', '10.0.0.0/8'), | ||
)); | ||
|
||
In this example, you're saying that your reverse proxy (or proxies) has | ||
the IP address ``192.0.0.1`` or matches the range of IP addresses that use | ||
the CIDR notation ``10.0.0.0/8``. For more details, see :ref:`reference-framework-trusted-proxies`. | ||
|
||
That's it! Symfony will now look for the correct ``X-Forwarded-*`` headers | ||
to get information like the client's IP address, host, port and whether or | ||
not the request is using HTTPS. | ||
|
||
But what if the IP of my Reverse Proxy Changes Constantly! | ||
---------------------------------------------------------- | ||
|
||
Some reverse proxies (like Amazon's Elastic Load Balancers) don't have a | ||
static IP address or even a range that you can target with the CIDR notation. | ||
In this case, you'll need to - *very carefully* - trust *all* proxies. | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I would change all proxies by any proxy in front of your web servers here all seems like a very strong word :) |
||
|
||
1. Configure your web server(s) to *not* respond to traffic from *any* clients | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Does using There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. you're right - I'll fix that right now! I think There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Yeah, I think so. I just failed with this as well. It's so intuitive, it really should have been supported. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. it seems like this is not fixed, @weaverryan ? And yes, using multiple There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. @weaverryan fixed it in 2b1935b. |
||
other than your load balancers. For AWS, this can be done with `security groups`_. | ||
|
||
1. Once you've guaranteed that traffic will only come from your trusted reverse | ||
proxies, configure Symfony to *always* trust incoming request. This is | ||
done inside of your front controller:: | ||
|
||
// web/app.php | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. this complete code block should be indented with 3 more spaces (3 spaces is now the new outline base in the list, and code blocks need to be indented with 4 spaces so 3 + 4 = 7 spaces, you use 4 spaces now) |
||
// ... | ||
|
||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. this line should be moved above the previous line |
||
Request::setTrustedProxies(array($request->server->get('REMOTE_ADDR'))); | ||
|
||
$response = $kernel->handle($request); | ||
// ... | ||
|
||
That's it! It's critical that you prevent traffic from all non-trusted sources. | ||
If you allow outside traffic, they could "spoof" their true IP address and | ||
other information. | ||
|
||
My Reverse Proxy Uses Non-Standard (not X-Forwarded) Headers | ||
------------------------------------------------------------ | ||
|
||
Most reverse proxies store information on specific ``X-Forwarded-*`` headers. | ||
But if your reverse proxy uses non-standard header names, you can configure | ||
these (:doc:`see reference </components/http_foundation/trusting_proxies>`. | ||
The code for doing this will need to live in your front controller (e.g. ``web/app.php``). | ||
|
||
.. _`security groups`: http://docs.aws.amazon.com/ElasticLoadBalancing/latest/DeveloperGuide/using-elb-security-groups.html |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
"see the reference" instead of "see reference"?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Oh, I think my suggestion was misleading. I just wanted to have this put in parentheses. I wouldn't have changed the label. What I had in mind was this: