@@ -3,8 +3,8 @@ use std::collections::BTreeMap;
3
3
use async_trait:: async_trait;
4
4
use cidr:: IpCidr ;
5
5
use pingora:: ErrorType ;
6
- use pingora_proxy:: Session ;
7
6
use pingora_core:: { protocols:: l4:: socket:: SocketAddr , Error , Result } ;
7
+ use pingora_proxy:: Session ;
8
8
9
9
use crate :: proxy:: { extract_val, RiverContext } ;
10
10
@@ -13,11 +13,7 @@ use crate::proxy::{extract_val, RiverContext};
13
13
#[ async_trait]
14
14
pub trait RequestFilterMod : Send + Sync {
15
15
/// See [ProxyHttp::request_filter] for more details
16
- async fn request_filter (
17
- & self ,
18
- session : & mut Session ,
19
- ctx : & mut RiverContext ,
20
- ) -> Result < bool > ;
16
+ async fn request_filter ( & self , session : & mut Session , ctx : & mut RiverContext ) -> Result < bool > ;
21
17
}
22
18
23
19
pub struct CidrRangeFilter {
@@ -37,11 +33,11 @@ impl CidrRangeFilter {
37
33
match addr. parse :: < IpCidr > ( ) {
38
34
Ok ( a) => {
39
35
blocks. push ( a) ;
40
- } ,
36
+ }
41
37
Err ( _) => {
42
38
tracing:: error!( "Failed to parse '{addr}' as a valid CIDR notation range" ) ;
43
39
return Err ( Error :: new ( ErrorType :: Custom ( "Invalid configuration" ) ) ) ;
44
- } ,
40
+ }
45
41
} ;
46
42
}
47
43
@@ -51,11 +47,7 @@ impl CidrRangeFilter {
51
47
52
48
#[ async_trait]
53
49
impl RequestFilterMod for CidrRangeFilter {
54
- async fn request_filter (
55
- & self ,
56
- session : & mut Session ,
57
- _ctx : & mut RiverContext ,
58
- ) -> Result < bool > {
50
+ async fn request_filter ( & self , session : & mut Session , _ctx : & mut RiverContext ) -> Result < bool > {
59
51
let Some ( addr) = session. downstream_session . client_addr ( ) else {
60
52
// Unable to determine source address, assuming it should be blocked
61
53
return Err ( Error :: new_down ( ErrorType :: Custom ( "Missing Client Address" ) ) ) ;
0 commit comments