mirror of
				https://github.com/traefik/traefik.git
				synced 2025-10-31 08:21:27 +01:00 
			
		
		
		
	
		
			
				
	
	
		
			64 lines
		
	
	
		
			1.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			64 lines
		
	
	
		
			1.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package ipallowlist
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"errors"
 | |
| 	"fmt"
 | |
| 
 | |
| 	"github.com/traefik/traefik/v3/pkg/config/dynamic"
 | |
| 	"github.com/traefik/traefik/v3/pkg/ip"
 | |
| 	"github.com/traefik/traefik/v3/pkg/middlewares"
 | |
| 	"github.com/traefik/traefik/v3/pkg/tcp"
 | |
| )
 | |
| 
 | |
| const (
 | |
| 	typeName = "IPAllowListerTCP"
 | |
| )
 | |
| 
 | |
| // ipAllowLister is a middleware that provides Checks of the Requesting IP against a set of Allowlists.
 | |
| type ipAllowLister struct {
 | |
| 	next        tcp.Handler
 | |
| 	allowLister *ip.Checker
 | |
| 	name        string
 | |
| }
 | |
| 
 | |
| // New builds a new TCP IPAllowLister given a list of CIDR-Strings to allow.
 | |
| func New(ctx context.Context, next tcp.Handler, config dynamic.TCPIPAllowList, name string) (tcp.Handler, error) {
 | |
| 	logger := middlewares.GetLogger(ctx, name, typeName)
 | |
| 	logger.Debug().Msg("Creating middleware")
 | |
| 
 | |
| 	if len(config.SourceRange) == 0 {
 | |
| 		return nil, errors.New("sourceRange is empty, IPAllowLister not created")
 | |
| 	}
 | |
| 
 | |
| 	checker, err := ip.NewChecker(config.SourceRange)
 | |
| 	if err != nil {
 | |
| 		return nil, fmt.Errorf("cannot parse CIDRs %s: %w", config.SourceRange, err)
 | |
| 	}
 | |
| 
 | |
| 	logger.Debug().Msgf("Setting up IPAllowLister with sourceRange: %s", config.SourceRange)
 | |
| 
 | |
| 	return &ipAllowLister{
 | |
| 		allowLister: checker,
 | |
| 		next:        next,
 | |
| 		name:        name,
 | |
| 	}, nil
 | |
| }
 | |
| 
 | |
| func (al *ipAllowLister) ServeTCP(conn tcp.WriteCloser) {
 | |
| 	logger := middlewares.GetLogger(context.Background(), al.name, typeName)
 | |
| 
 | |
| 	addr := conn.RemoteAddr().String()
 | |
| 
 | |
| 	err := al.allowLister.IsAuthorized(addr)
 | |
| 	if err != nil {
 | |
| 		logger.Error().Err(err).Msgf("Connection from %s rejected", addr)
 | |
| 		conn.Close()
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	logger.Debug().Msgf("Connection from %s accepted", addr)
 | |
| 
 | |
| 	al.next.ServeTCP(conn)
 | |
| }
 |