aboutsummaryrefslogtreecommitdiffhomepage
path: root/patches/server/0696-Add-support-for-Proxy-Protocol.patch
diff options
context:
space:
mode:
Diffstat (limited to 'patches/server/0696-Add-support-for-Proxy-Protocol.patch')
-rw-r--r--patches/server/0696-Add-support-for-Proxy-Protocol.patch65
1 files changed, 65 insertions, 0 deletions
diff --git a/patches/server/0696-Add-support-for-Proxy-Protocol.patch b/patches/server/0696-Add-support-for-Proxy-Protocol.patch
new file mode 100644
index 0000000000..5d35c10858
--- /dev/null
+++ b/patches/server/0696-Add-support-for-Proxy-Protocol.patch
@@ -0,0 +1,65 @@
+From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
+From: PanSzelescik <[email protected]>
+Date: Thu, 7 Apr 2022 16:13:39 +0200
+Subject: [PATCH] Add support for Proxy Protocol
+
+
+diff --git a/build.gradle.kts b/build.gradle.kts
+index 38585b7f0b8e1e287b37820924a1b0d464fe9e99..25001d6cf4f70bd01ab304625b49ec45f5b1f525 100644
+--- a/build.gradle.kts
++++ b/build.gradle.kts
+@@ -28,6 +28,7 @@ dependencies {
+ log4jPlugins.annotationProcessorConfigurationName("org.apache.logging.log4j:log4j-core:2.19.0") // Paper - Needed to generate meta for our Log4j plugins
+ runtimeOnly(log4jPlugins.output)
+ alsoShade(log4jPlugins.output)
++ implementation("io.netty:netty-codec-haproxy:4.1.97.Final") // Paper - Add support for proxy protocol
+ // Paper end
+ implementation("org.apache.logging.log4j:log4j-iostreams:2.22.1") // Paper - remove exclusion
+ implementation("org.ow2.asm:asm-commons:9.7.1")
+diff --git a/src/main/java/net/minecraft/server/network/ServerConnectionListener.java b/src/main/java/net/minecraft/server/network/ServerConnectionListener.java
+index c63c194c44646e6bc1a59426552787011fc2ced5..c62df32af11636ad408b584fcc590590ce4fb0d0 100644
+--- a/src/main/java/net/minecraft/server/network/ServerConnectionListener.java
++++ b/src/main/java/net/minecraft/server/network/ServerConnectionListener.java
+@@ -104,6 +104,12 @@ public class ServerConnectionListener {
+ ServerConnectionListener.LOGGER.info("Using default channel type");
+ }
+
++ // Paper start - Warn people with console access that HAProxy is in use.
++ if (io.papermc.paper.configuration.GlobalConfiguration.get().proxies.proxyProtocol) {
++ ServerConnectionListener.LOGGER.warn("Using HAProxy, please ensure the server port is adequately firewalled.");
++ }
++ // Paper end - Warn people with console access that HAProxy is in use.
++
+ this.channels.add(((ServerBootstrap) ((ServerBootstrap) (new ServerBootstrap()).channel(oclass)).childHandler(new ChannelInitializer<Channel>() {
+ protected void initChannel(Channel channel) {
+ try {
+@@ -123,6 +129,29 @@ public class ServerConnectionListener {
+ Connection object = j > 0 ? new RateKickingConnection(j) : new Connection(PacketFlow.SERVERBOUND); // CraftBukkit - decompile error
+
+ //ServerConnectionListener.this.connections.add(object); // Paper
++ // Paper start - Add support for Proxy Protocol
++ if (io.papermc.paper.configuration.GlobalConfiguration.get().proxies.proxyProtocol) {
++ channel.pipeline().addAfter("timeout", "haproxy-decoder", new io.netty.handler.codec.haproxy.HAProxyMessageDecoder());
++ channel.pipeline().addAfter("haproxy-decoder", "haproxy-handler", new ChannelInboundHandlerAdapter() {
++ @Override
++ public void channelRead(ChannelHandlerContext ctx, Object msg) throws Exception {
++ if (msg instanceof io.netty.handler.codec.haproxy.HAProxyMessage message) {
++ if (message.command() == io.netty.handler.codec.haproxy.HAProxyCommand.PROXY) {
++ String realaddress = message.sourceAddress();
++ int realport = message.sourcePort();
++
++ SocketAddress socketaddr = new java.net.InetSocketAddress(realaddress, realport);
++
++ Connection connection = (Connection) channel.pipeline().get("packet_handler");
++ connection.address = socketaddr;
++ }
++ } else {
++ super.channelRead(ctx, msg);
++ }
++ }
++ });
++ }
++ // Paper end - Add support for proxy protocol
+ pending.add(object); // Paper - prevent blocking on adding a new connection while the server is ticking
+ ((Connection) object).configurePacketHandler(channelpipeline);
+ ((Connection) object).setListenerForServerboundHandshake(new ServerHandshakePacketListenerImpl(ServerConnectionListener.this.server, (Connection) object));