@@ -61,8 +61,8 @@ public void remoteAddressIsNull() throws Exception {
6161
6262 HttpHeaders headers = filter .filter (request .getHeaders (), MockServerWebExchange .from (request ));
6363
64- assertThat (headers ).doesNotContainKeys (X_FORWARDED_FOR_HEADER )
65- . containsKeys ( X_FORWARDED_HOST_HEADER , X_FORWARDED_PORT_HEADER , X_FORWARDED_PROTO_HEADER );
64+ assertThat (headers ).doesNotContainKeys (X_FORWARDED_FOR_HEADER ). containsKeys ( X_FORWARDED_HOST_HEADER ,
65+ X_FORWARDED_PORT_HEADER , X_FORWARDED_PROTO_HEADER );
6666
6767 assertThat (headers .getFirst (X_FORWARDED_HOST_HEADER )).isEqualTo ("localhost:8080" );
6868 assertThat (headers .getFirst (X_FORWARDED_PORT_HEADER )).isEqualTo ("8080" );
@@ -322,36 +322,34 @@ public void nullValuesSkipped() throws Exception {
322322 @ Test
323323 public void trustedProxiesConditionMatches () {
324324 new ReactiveWebApplicationContextRunner ()
325- .withConfiguration (AutoConfigurations .of (WebFluxAutoConfiguration .class ,
326- ReactiveWebServerFactoryAutoConfiguration .class , GatewayAutoConfiguration .class ))
327- .withPropertyValues (GatewayProperties .PREFIX + ".trusted-proxies=11\\ .0\\ .0\\ ..*" )
328- .run (context -> {
329- assertThat (context ).hasSingleBean (XForwardedHeadersFilter .class );
330- });
325+ .withConfiguration (AutoConfigurations .of (WebFluxAutoConfiguration .class ,
326+ ReactiveWebServerFactoryAutoConfiguration .class , GatewayAutoConfiguration .class ))
327+ .withPropertyValues (GatewayProperties .PREFIX + ".trusted-proxies=11\\ .0\\ .0\\ ..*" ).run (context -> {
328+ assertThat (context ).hasSingleBean (XForwardedHeadersFilter .class );
329+ });
331330 }
332331
333332 @ Test
334333 public void trustedProxiesConditionDoesNotMatch () {
335334 new ReactiveWebApplicationContextRunner ()
336- .withConfiguration (AutoConfigurations .of (WebFluxAutoConfiguration .class ,
337- ReactiveWebServerFactoryAutoConfiguration .class , GatewayAutoConfiguration .class ))
338- .run (context -> {
339- assertThat (context ).doesNotHaveBean (XForwardedHeadersFilter .class );
340- });
335+ .withConfiguration (AutoConfigurations .of (WebFluxAutoConfiguration .class ,
336+ ReactiveWebServerFactoryAutoConfiguration .class , GatewayAutoConfiguration .class ))
337+ .run (context -> {
338+ assertThat (context ).doesNotHaveBean (XForwardedHeadersFilter .class );
339+ });
341340 }
342341
343342 @ Test
344343 public void emptyTrustedProxiesFails () {
345344 Assertions .assertThatThrownBy (() -> new XForwardedHeadersFilter ("" ))
346- .isInstanceOf (IllegalArgumentException .class );
345+ .isInstanceOf (IllegalArgumentException .class );
347346 }
348347
349348 @ Test
350349 public void xForwardedHeadersNotTrusted () throws Exception {
351350 MockServerHttpRequest request = MockServerHttpRequest .get ("http://localhost:8080/get" )
352- .remoteAddress (new InetSocketAddress (InetAddress .getByName ("10.0.0.1" ), 80 ))
353- .header (HttpHeaders .HOST , "myhost" )
354- .build ();
351+ .remoteAddress (new InetSocketAddress (InetAddress .getByName ("10.0.0.1" ), 80 ))
352+ .header (HttpHeaders .HOST , "myhost" ).build ();
355353
356354 XForwardedHeadersFilter filter = new XForwardedHeadersFilter ("11\\ .0\\ .0\\ ..*" );
357355
@@ -366,11 +364,9 @@ public void xForwardedHeadersNotTrusted() throws Exception {
366364 @ Test
367365 public void untrustedXForwardedForNotAppended () throws Exception {
368366 MockServerHttpRequest request = MockServerHttpRequest .get ("http://localhost:8080/get" )
369- .remoteAddress (new InetSocketAddress (InetAddress .getByName ("10.0.0.1" ), 80 ))
370- .header (HttpHeaders .HOST , "myhost" )
371- .header (X_FORWARDED_FOR_HEADER , "127.0.0.1" )
372- .header (X_FORWARDED_FOR_HEADER , "10.0.0.10" )
373- .build ();
367+ .remoteAddress (new InetSocketAddress (InetAddress .getByName ("10.0.0.1" ), 80 ))
368+ .header (HttpHeaders .HOST , "myhost" ).header (X_FORWARDED_FOR_HEADER , "127.0.0.1" )
369+ .header (X_FORWARDED_FOR_HEADER , "10.0.0.10" ).build ();
374370
375371 XForwardedHeadersFilter filter = new XForwardedHeadersFilter ("10\\ .0\\ .0\\ ..*" );
376372
@@ -379,16 +375,14 @@ public void untrustedXForwardedForNotAppended() throws Exception {
379375 assertThat (headers ).containsKeys (X_FORWARDED_FOR_HEADER , X_FORWARDED_HOST_HEADER , X_FORWARDED_PORT_HEADER ,
380376 X_FORWARDED_PROTO_HEADER );
381377
382- assertThat (headers .getFirst (X_FORWARDED_FOR_HEADER )).doesNotContain ("127.0.0.1" )
383- . contains ( "10.0.0.1" , "10.0.0.10" );
378+ assertThat (headers .getFirst (X_FORWARDED_FOR_HEADER )).doesNotContain ("127.0.0.1" ). contains ( "10.0.0.1" ,
379+ "10.0.0.10" );
384380 }
385381
386382 @ Test
387383 public void remoteAdddressIsNullUnTrustedProxyNotAppended () {
388384 MockServerHttpRequest request = MockServerHttpRequest .get ("http://localhost:8080/get" )
389- .header (HttpHeaders .HOST , "myhost" )
390- .header (X_FORWARDED_FOR_HEADER , "127.0.0.1" )
391- .build ();
385+ .header (HttpHeaders .HOST , "myhost" ).header (X_FORWARDED_FOR_HEADER , "127.0.0.1" ).build ();
392386
393387 XForwardedHeadersFilter filter = new XForwardedHeadersFilter ("10\\ .0\\ .0\\ ..*" );
394388
0 commit comments