Documentation ¶
Overview ¶
Package whitelist implements IP whitelisting for various types of connections. Two types of access control lists (ACLs) are supported: host-based and network-based.
Index ¶
- func DumpBasic(wl *Basic) []byte
- func HTTPRequestLookup(req *http.Request) (net.IP, error)
- func NetConnLookup(conn net.Conn) (net.IP, error)
- func NewHandler(allow, deny http.Handler, acl ACL) (http.Handler, error)
- type ACL
- type Basic
- type BasicNet
- type Handler
- type HandlerFunc
- type HostACL
- type HostStub
- type NetACL
- type NetStub
- Bugs
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
func HTTPRequestLookup ¶
HTTPRequestLookup extracts an IP from the remote address in a *http.Request. A single *http.Request should be passed to Address.
func NetConnLookup ¶
NetConnLookup extracts an IP from the remote address in the net.Conn. A single net.Conn should be passed to Address.
func NewHandler ¶
NewHandler returns a new whitelisting-wrapped HTTP handler. The allow handler should contain a handler that will be called if the request is whitelisted; the deny handler should contain a handler that will be called in the request is not whitelisted.
Types ¶
type ACL ¶
type ACL interface { // Permitted takes an IP address, and returns true if the // IP address is whitelisted (e.g. permitted access). Permitted(net.IP) bool }
An ACL stores a list of permitted IP addresses, and handles concurrency as needed.
type Basic ¶
type Basic struct {
// contains filtered or unexported fields
}
Basic implements a basic map-backed whitelister that uses an RWMutex for conccurency. IPv4 addresses are treated differently than an IPv6 address; namely, the IPv4 localhost will not match the IPv6 localhost.
func (*Basic) MarshalJSON ¶
MarshalJSON serialises a host whitelist to a comma-separated list of hosts, implementing the json.Marshaler interface.
func (*Basic) UnmarshalJSON ¶
UnmarshalJSON implements the json.Unmarshaler interface for host whitelists, taking a comma-separated string of hosts.
type BasicNet ¶
type BasicNet struct {
// contains filtered or unexported fields
}
BasicNet implements a basic map-backed network whitelist using locks for concurrency. It must be initialised with one of the constructor functions. This particular implementation is unoptimised and will not scale.
func NewBasicNet ¶
func NewBasicNet() *BasicNet
NewBasicNet constructs a new basic network-based whitelist.
func (*BasicNet) Add ¶
Add adds a new network to the whitelist. Caveat: overlapping networks won't be detected.
func (*BasicNet) MarshalJSON ¶
MarshalJSON serialises a network whitelist to a comma-separated list of networks.
func (*BasicNet) UnmarshalJSON ¶
UnmarshalJSON implements the json.Unmarshaler interface for network whitelists, taking a comma-separated string of networks.
type Handler ¶
type Handler struct {
// contains filtered or unexported fields
}
Handler wraps an HTTP handler with IP whitelisting.
type HandlerFunc ¶
type HandlerFunc struct {
// contains filtered or unexported fields
}
A HandlerFunc contains a pair of http.HandleFunc-handler functions that will be called depending on whether a request is allowed or denied.
func NewHandlerFunc ¶
func NewHandlerFunc(allow, deny func(http.ResponseWriter, *http.Request), acl ACL) (*HandlerFunc, error)
NewHandlerFunc returns a new basic whitelisting handler.
func (*HandlerFunc) ServeHTTP ¶
func (h *HandlerFunc) ServeHTTP(w http.ResponseWriter, req *http.Request)
ServeHTTP checks the incoming request to see whether it is permitted, and calls the appropriate handle function.
type HostACL ¶
type HostACL interface { ACL // Add takes an IP address and adds it to the whitelist so // that it is now permitted. Add(net.IP) // Remove takes an IP address and drops it from the whitelist // so that it is no longer permitted. Remove(net.IP) }
A HostACL stores a list of permitted hosts.
type HostStub ¶
type HostStub struct{}
HostStub allows host whitelisting to be added into a system's flow without doing anything yet. All operations result in warning log messages being printed to stderr. There is no mechanism for squelching these messages short of modifying the log package's default logger.
type NetACL ¶
type NetACL interface { ACL // Add takes an IP network and adds it to the whitelist so // that it is now permitted. Add(*net.IPNet) // Remove takes an IP network and drops it from the whitelist // so that it is no longer permitted. Remove(*net.IPNet) }
A NetACL stores a list of permitted IP networks.
type NetStub ¶
type NetStub struct{}
NetStub allows network whitelisting to be added into a system's flow without doing anything yet. All operations result in warning log messages being printed to stderr. There is no mechanism for squelching these messages short of modifying the log package's default logger.
Notes ¶
Bugs ¶
overlapping networks aren't detected.