A simple reverse proxy for use with Hyper and Tokio
Go to file
Christof Weickhardt 48ccbc1099 feat: update ci
2022-04-20 22:26:53 -03:00
.github/workflows feat: update ci 2022-04-20 22:26:53 -03:00
src moving code around 2022-04-13 22:58:56 -03:00
tests perf: remove headers inline 2022-04-13 19:56:16 -03:00
.gitignore port lib to hyper 0.13 and future 0.3 2020-05-04 00:18:27 -03:00
.travis.yml Initial commit 2017-07-15 16:28:59 +10:00
Cargo.toml feat: use rustls 2022-04-13 22:13:02 -03:00
LICENSE Initial commit 2017-07-15 16:28:59 +10:00
README.md feat: use rustls 2022-04-13 22:13:02 -03:00

hyper-reverse-proxy

License CI docs version

A simple reverse proxy, to be used with Hyper.

The implementation ensures that Hop-by-hop headers are stripped correctly in both directions, and adds the client's IP address to a comma-space-separated list of forwarding addresses in the X-Forwarded-For header.

The implementation is based on Go's httputil.ReverseProxy.

Example

Add these dependencies to your Cargo.toml file.

[dependencies]
hyper-reverse-proxy = "0.5"
hyper = { version = "0.14", features = ["full"] }
tokio = { version = "1", features = ["full"] }

The following example will set up a reverse proxy listening on 127.0.0.1:13900, and will proxy these calls:

  • "/target/first" will be proxied to http://127.0.0.1:13901

  • "/target/second" will be proxied to http://127.0.0.1:13902

  • All other URLs will be handled by debug_request function, that will display request information.

use hyper::server::conn::AddrStream;
use hyper::{Body, Request, Response, Server, StatusCode};
use hyper::service::{service_fn, make_service_fn};
use std::{convert::Infallible, net::SocketAddr};
use std::net::IpAddr;

fn debug_request(req: Request<Body>) -> Result<Response<Body>, Infallible>  {
    let body_str = format!("{:?}", req);
    Ok(Response::new(Body::from(body_str)))
}

async fn handle(client_ip: IpAddr, req: Request<Body>) -> Result<Response<Body>, Infallible> {
    if req.uri().path().starts_with("/target/first") {
        // will forward requests to port 13901
        match hyper_reverse_proxy::call(client_ip, "http://127.0.0.1:13901", req).await {
            Ok(response) => {Ok(response)}
            Err(_error) => {Ok(Response::builder()
                                  .status(StatusCode::INTERNAL_SERVER_ERROR)
                                  .body(Body::empty())
                                  .unwrap())}
        }
    } else if req.uri().path().starts_with("/target/second") {
        // will forward requests to port 13902
        match hyper_reverse_proxy::call(client_ip, "http://127.0.0.1:13902", req).await {
            Ok(response) => {Ok(response)}
            Err(_error) => {Ok(Response::builder()
                                  .status(StatusCode::INTERNAL_SERVER_ERROR)
                                  .body(Body::empty())
                                  .unwrap())}
        }
    } else {
        debug_request(req)
    }
}

#[tokio::main]
async fn main() {
    let bind_addr = "127.0.0.1:8000";
    let addr:SocketAddr = bind_addr.parse().expect("Could not parse ip:port.");

    let make_svc = make_service_fn(|conn: &AddrStream| {
        let remote_addr = conn.remote_addr().ip();
        async move {
            Ok::<_, Infallible>(service_fn(move |req| handle(remote_addr, req)))
        }
    });

    let server = Server::bind(&addr).serve(make_svc);

    println!("Running server on {:?}", addr);

    if let Err(e) = server.await {
        eprintln!("server error: {}", e);
    }
}

Security

Handling outgoing requests can be a security nightmare. This crate includes some features to reduce some of the risks. Everthing uses rustls benieth, a rust implementation for tls, faster and more secure as openssl

HTTPS

By default the https feature is enabled which will allow you to request resources over https. This does not limit to only https traffic, if you would like so add the feature https-only to your Cargo.toml for this crate.

TLS 1.2

By default tls 1.2 is disabled in favor of tls 1.3. As not yet all services support it tls 1.2 can be enabled via the tls-1-2 feature.

DNSSEC

By default if you enable https (which is enabled by default) dnssec is enabled.

HTTP/2

While http/3 might be just around the corner. http/2 support can be enabled using the http2 feature.

DoT & DoH

By default none of them are enabled. If you would like to enabled them, you can do so using the features doh and dot.

Recommendations:

  • If you need to monitor network activities in relation to accessed ports, use dot
  • If you are out in the wild and have no need to monitor based on ports, use doh as it will blend in with other https traffic

It is highly recommended to use one of them.

Currently only includes dns queries as esni or ech is still in draft by the ietf