All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.networknt.whitelist.WhitelistHandler Maven / Gradle / Ivy

/*
 * Copyright (c) 2016 Network New Technologies Inc.
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *      http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */

package com.networknt.whitelist;

import com.networknt.config.Config;
import com.networknt.handler.Handler;
import com.networknt.handler.MiddlewareHandler;
import com.networknt.utility.ModuleRegistry;
import io.undertow.Handlers;
import io.undertow.server.HttpHandler;
import io.undertow.server.HttpServerExchange;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;

import java.net.Inet4Address;
import java.net.Inet6Address;
import java.net.InetAddress;
import java.net.InetSocketAddress;
import java.util.Arrays;
import java.util.Map;

public class WhitelistHandler implements MiddlewareHandler {
    private static final Logger logger = LoggerFactory.getLogger(WhitelistHandler.class);
    private static final String INVALID_IP_FOR_PATH = "ERR10049";

    public static WhitelistConfig config;

    private volatile HttpHandler next;

    /**
     * This is the constructor that is not supposed to be used. It should only be called by the test cases
     * to load different configuration for testing.
     * @param configName configuration file name
     */
    @Deprecated
    public WhitelistHandler(String configName) {
        if(logger.isInfoEnabled()) logger.info("WhitelistHandler is constructed.");
        config = WhitelistConfig.load(configName);
    }

    public WhitelistHandler() {
        if(logger.isInfoEnabled()) logger.info("WhitelistHandler is constructed.");
        config = WhitelistConfig.load();
    }

    @Override
    public void handleRequest(final HttpServerExchange exchange) throws Exception {
        if(logger.isDebugEnabled()) logger.debug("WhitelistHandler.handleRequest starts.");
        InetSocketAddress peer = exchange.getSourceAddress();
        String reqPath = exchange.getRequestPath();
        if(logger.isTraceEnabled()) logger.trace("IP = {} request path = {}", peer.toString(), reqPath);
        if (!isAllowed(peer.getAddress(), reqPath)) {
            if(logger.isTraceEnabled()) logger.trace("Invalid IP for the path");
            setExchangeStatus(exchange, INVALID_IP_FOR_PATH, peer.toString(), reqPath);
            exchange.endExchange();
            return;
        }
        if(logger.isDebugEnabled()) logger.debug("WhitelistHandler.handleRequest ends.");
        Handler.next(exchange, next);
    }

    @Override
    public HttpHandler getNext() {
        return next;
    }

    @Override
    public MiddlewareHandler setNext(final HttpHandler next) {
        Handlers.handlerNotNull(next);
        this.next = next;
        return this;
    }

    @Override
    public boolean isEnabled() {
        return config.isEnabled();
    }

    @Override
    public void register() {
        ModuleRegistry.registerModule(WhitelistHandler.class.getName(), config.getMappedConfig(), null);
    }

    @Override
    public void reload() {
        config.reload();
        ModuleRegistry.registerModule(WhitelistHandler.class.getName(), config.getMappedConfig(), null);
        if(logger.isInfoEnabled()) logger.info("WhitelistHandler is reloaded.");
    }

    IpAcl findIpAcl(String reqPath) {
        for(Map.Entry entry: config.getPrefixAcl().entrySet()) {
            if(reqPath.startsWith(entry.getKey())) {
                return entry.getValue();
            }
        }
        return null;
    }
    boolean isAllowed(InetAddress address, String reqPath) {
        boolean isWhitelisted = false;
        if(address instanceof Inet4Address) {
            IpAcl ipAcl = findIpAcl(reqPath);
            if(ipAcl != null) {
                if(logger.isTraceEnabled()) logger.trace("IPv4 address and found a prefix entry for the request path");
                for (PeerMatch rule : ipAcl.getIpv4acl()) {
                    if (rule.matches(address)) {
                        if(logger.isTraceEnabled()) logger.trace("Found matched rule for address and rule isAllow {}", !rule.isDeny());
                        return !rule.isDeny();
                    }
                }
                // the path is defined but the IP is not in the list. Will allow if defaultAllow is false and will reject is defaultAllow is true
                return !config.defaultAllow;
            }
        } else if(address instanceof Inet6Address) {
            IpAcl ipAcl = findIpAcl(reqPath);
            if(ipAcl != null) {
                if(logger.isTraceEnabled()) logger.trace("IPv6 address {} and found a prefix entry for the request path {}", address, reqPath);
                for (PeerMatch rule : ipAcl.getIpv6acl()) {
                    if (rule.matches(address)) {
                        if(logger.isTraceEnabled()) logger.trace("Found matched rule for address and rule isAllow {}", !rule.isDeny());
                        return !rule.isDeny();
                    }
                }
                // the path is defined but the IP is not in the list. Will allow if defaultAllow is false and will reject is defaultAllow is true
                return !config.defaultAllow;
            }
        }
        if(logger.isTraceEnabled()) logger.trace("No matched path is found. isWhitelist is {} and defaultAllow is {}", isWhitelisted, config.defaultAllow);
        return config.defaultAllow;
    }



    abstract static class PeerMatch {

        private final boolean deny;
        private final String pattern;

        protected PeerMatch(final boolean deny, final String pattern) {
            this.deny = deny;
            this.pattern = pattern;
        }

        abstract boolean matches(final InetAddress address);

        boolean isDeny() {
            return deny;
        }

        @Override
        public String toString() {
            return getClass().getSimpleName() + "{" +
                    "deny=" + deny +
                    ", pattern='" + pattern + '\'' +
                    '}';
        }
    }

    static class ExactIpV4PeerMatch extends WhitelistHandler.PeerMatch {

        private final byte[] address;

        protected ExactIpV4PeerMatch(final boolean deny, final String pattern, final byte[] address) {
            super(deny, pattern);
            this.address = address;
        }

        @Override
        boolean matches(final InetAddress address) {
            return Arrays.equals(address.getAddress(), this.address);
        }
    }

    static class ExactIpV6PeerMatch extends WhitelistHandler.PeerMatch {

        private final byte[] address;

        protected ExactIpV6PeerMatch(final boolean deny, final String pattern, final byte[] address) {
            super(deny, pattern);
            this.address = address;
        }

        @Override
        boolean matches(final InetAddress address) {
            return Arrays.equals(address.getAddress(), this.address);
        }
    }

    static class PrefixIpV4PeerMatch extends WhitelistHandler.PeerMatch {

        private final int mask;
        private final int prefix;

        protected PrefixIpV4PeerMatch(final boolean deny, final String pattern, final int mask, final int prefix) {
            super(deny, pattern);
            this.mask = mask;
            this.prefix = prefix;
        }

        @Override
        boolean matches(final InetAddress address) {
            byte[] bytes = address.getAddress();
            if (bytes == null) {
                return false;
            }
            int addressInt = ((bytes[0] & 0xFF) << 24) | ((bytes[1] & 0xFF) << 16) | ((bytes[2] & 0xFF) << 8) | (bytes[3] & 0xFF);
            return (addressInt & mask) == prefix;
        }
    }

    static class PrefixIpV6PeerMatch extends WhitelistHandler.PeerMatch {

        private final byte[] mask;
        private final byte[] prefix;

        protected PrefixIpV6PeerMatch(final boolean deny, final String pattern, final byte[] mask, final byte[] prefix) {
            super(deny, pattern);
            this.mask = mask;
            this.prefix = prefix;
            assert mask.length == prefix.length;
        }

        @Override
        boolean matches(final InetAddress address) {
            byte[] bytes = address.getAddress();
            if (bytes == null) {
                return false;
            }
            if (bytes.length != mask.length) {
                return false;
            }
            for (int i = 0; i < mask.length; ++i) {
                if ((bytes[i] & mask[i]) != prefix[i]) {
                    return false;
                }
            }
            return true;
        }
    }
}




© 2015 - 2025 Weber Informatics LLC | Privacy Policy