mirror of
https://github.com/gyurix1968/guacamole-client.git
synced 2025-09-06 05:07:41 +00:00
GUACAMOLE-1855: Merge configuration options for bypassing MFA based on client address.
This commit is contained in:
@@ -130,6 +130,14 @@
|
|||||||
<version>${kotlin.version}</version>
|
<version>${kotlin.version}</version>
|
||||||
</dependency>
|
</dependency>
|
||||||
|
|
||||||
|
<!-- Library for unified IPv4/6 parsing and validation -->
|
||||||
|
<dependency>
|
||||||
|
<groupId>com.github.seancfoley</groupId>
|
||||||
|
<artifactId>ipaddress</artifactId>
|
||||||
|
<version>5.5.0</version>
|
||||||
|
<scope>provided</scope>
|
||||||
|
</dependency>
|
||||||
|
|
||||||
</dependencies>
|
</dependencies>
|
||||||
|
|
||||||
</project>
|
</project>
|
||||||
|
@@ -23,10 +23,13 @@ import com.duosecurity.Client;
|
|||||||
import com.duosecurity.exception.DuoException;
|
import com.duosecurity.exception.DuoException;
|
||||||
import com.duosecurity.model.Token;
|
import com.duosecurity.model.Token;
|
||||||
import com.google.inject.Inject;
|
import com.google.inject.Inject;
|
||||||
|
import inet.ipaddr.IPAddress;
|
||||||
|
import inet.ipaddr.IPAddressString;
|
||||||
import java.net.URI;
|
import java.net.URI;
|
||||||
import java.net.URISyntaxException;
|
import java.net.URISyntaxException;
|
||||||
import java.util.Collections;
|
import java.util.Collections;
|
||||||
import java.util.concurrent.TimeUnit;
|
import java.util.concurrent.TimeUnit;
|
||||||
|
import java.util.List;
|
||||||
import javax.servlet.http.HttpServletRequest;
|
import javax.servlet.http.HttpServletRequest;
|
||||||
import org.apache.guacamole.GuacamoleException;
|
import org.apache.guacamole.GuacamoleException;
|
||||||
import org.apache.guacamole.GuacamoleServerException;
|
import org.apache.guacamole.GuacamoleServerException;
|
||||||
@@ -37,6 +40,7 @@ import org.apache.guacamole.language.TranslatableMessage;
|
|||||||
import org.apache.guacamole.net.auth.AuthenticatedUser;
|
import org.apache.guacamole.net.auth.AuthenticatedUser;
|
||||||
import org.apache.guacamole.net.auth.Credentials;
|
import org.apache.guacamole.net.auth.Credentials;
|
||||||
import org.apache.guacamole.net.auth.credentials.CredentialsInfo;
|
import org.apache.guacamole.net.auth.credentials.CredentialsInfo;
|
||||||
|
import org.apache.guacamole.properties.IPAddressListProperty;
|
||||||
import org.slf4j.Logger;
|
import org.slf4j.Logger;
|
||||||
import org.slf4j.LoggerFactory;
|
import org.slf4j.LoggerFactory;
|
||||||
|
|
||||||
@@ -107,9 +111,41 @@ public class UserVerificationService {
|
|||||||
public void verifyAuthenticatedUser(AuthenticatedUser authenticatedUser)
|
public void verifyAuthenticatedUser(AuthenticatedUser authenticatedUser)
|
||||||
throws GuacamoleException {
|
throws GuacamoleException {
|
||||||
|
|
||||||
// Ignore anonymous users (unverifiable)
|
// Pull the original HTTP request used to authenticate
|
||||||
|
Credentials credentials = authenticatedUser.getCredentials();
|
||||||
|
HttpServletRequest request = credentials.getRequest();
|
||||||
|
IPAddress clientAddr = new IPAddressString(request.getRemoteAddr()).getAddress();
|
||||||
|
|
||||||
|
// Ignore anonymous users
|
||||||
String username = authenticatedUser.getIdentifier();
|
String username = authenticatedUser.getIdentifier();
|
||||||
if (username.equals(AuthenticatedUser.ANONYMOUS_IDENTIFIER))
|
if (username == null || username.equals(AuthenticatedUser.ANONYMOUS_IDENTIFIER))
|
||||||
|
return;
|
||||||
|
|
||||||
|
// Pull address lists to check from configuration. Note that the enforce
|
||||||
|
// list will override the bypass list, which means that, if the client
|
||||||
|
// address happens to be in both lists, Duo MFA will be enforced.
|
||||||
|
List<IPAddress> bypassAddresses = confService.getBypassHosts();
|
||||||
|
List<IPAddress> enforceAddresses = confService.getEnforceHosts();
|
||||||
|
|
||||||
|
// Check if the bypass list contains the client address, and set the
|
||||||
|
// enforce flag to the opposite.
|
||||||
|
boolean enforceHost = !(IPAddressListProperty.addressListContains(bypassAddresses, clientAddr));
|
||||||
|
|
||||||
|
// Only continue processing if the list is not empty
|
||||||
|
if (!enforceAddresses.isEmpty()) {
|
||||||
|
|
||||||
|
// If client address is not available or invalid, MFA will
|
||||||
|
// be enforced.
|
||||||
|
if (clientAddr == null || !clientAddr.isIPAddress())
|
||||||
|
enforceHost = true;
|
||||||
|
|
||||||
|
// Check the enforce list for the client address and set enforcement flag.
|
||||||
|
else
|
||||||
|
enforceHost = IPAddressListProperty.addressListContains(enforceAddresses, clientAddr);
|
||||||
|
}
|
||||||
|
|
||||||
|
// If the enforce flag is not true, bypass Duo MFA.
|
||||||
|
if (!enforceHost)
|
||||||
return;
|
return;
|
||||||
|
|
||||||
// Obtain a Duo client for redirecting the user to the Duo service and
|
// Obtain a Duo client for redirecting the user to the Duo service and
|
||||||
@@ -137,11 +173,6 @@ public class UserVerificationService {
|
|||||||
+ "not currently available (failed health check).", e);
|
+ "not currently available (failed health check).", e);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Pull the original HTTP request used to authenticate, as well as any
|
|
||||||
// associated credentials
|
|
||||||
Credentials credentials = authenticatedUser.getCredentials();
|
|
||||||
HttpServletRequest request = credentials.getRequest();
|
|
||||||
|
|
||||||
// Retrieve signed Duo authentication code and session state from the
|
// Retrieve signed Duo authentication code and session state from the
|
||||||
// request (these will be absent if this is an initial authentication
|
// request (these will be absent if this is an initial authentication
|
||||||
// attempt and not a redirect back from Duo)
|
// attempt and not a redirect back from Duo)
|
||||||
|
@@ -20,10 +20,14 @@
|
|||||||
package org.apache.guacamole.auth.duo.conf;
|
package org.apache.guacamole.auth.duo.conf;
|
||||||
|
|
||||||
import com.google.inject.Inject;
|
import com.google.inject.Inject;
|
||||||
|
import inet.ipaddr.IPAddress;
|
||||||
import java.net.URI;
|
import java.net.URI;
|
||||||
|
import java.util.Collections;
|
||||||
|
import java.util.List;
|
||||||
import org.apache.guacamole.GuacamoleException;
|
import org.apache.guacamole.GuacamoleException;
|
||||||
import org.apache.guacamole.environment.Environment;
|
import org.apache.guacamole.environment.Environment;
|
||||||
import org.apache.guacamole.properties.IntegerGuacamoleProperty;
|
import org.apache.guacamole.properties.IntegerGuacamoleProperty;
|
||||||
|
import org.apache.guacamole.properties.IPAddressListProperty;
|
||||||
import org.apache.guacamole.properties.StringGuacamoleProperty;
|
import org.apache.guacamole.properties.StringGuacamoleProperty;
|
||||||
import org.apache.guacamole.properties.URIGuacamoleProperty;
|
import org.apache.guacamole.properties.URIGuacamoleProperty;
|
||||||
|
|
||||||
@@ -105,6 +109,40 @@ public class ConfigurationService {
|
|||||||
public String getName() { return "duo-auth-timeout"; }
|
public String getName() { return "duo-auth-timeout"; }
|
||||||
|
|
||||||
};
|
};
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The optional property that contains a comma-separated list of IP addresses
|
||||||
|
* or CIDRs for which the MFA requirement should be bypassed. If the Duo
|
||||||
|
* extension is installed, any/all users authenticating from clients that
|
||||||
|
* match this list will be able to successfully log in without fulfilling
|
||||||
|
* the MFA requirement. If this option is omitted or is empty, and the
|
||||||
|
* Duo module is installed, all users from all hosts will have Duo MFA
|
||||||
|
* enforced.
|
||||||
|
*/
|
||||||
|
private static final IPAddressListProperty DUO_BYPASS_HOSTS =
|
||||||
|
new IPAddressListProperty() {
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public String getName() { return "duo-bypass-hosts"; }
|
||||||
|
|
||||||
|
};
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The optional property that contains a comma-separated list of IP addresses
|
||||||
|
* or CIDRs for which the MFA requirement should be explicitly enforced. If
|
||||||
|
* the Duo module is enabled and this property is specified, users that log
|
||||||
|
* in from hosts that match the items in this list will have Duo MFA required,
|
||||||
|
* and all users from hosts that do not match this list will be able to log
|
||||||
|
* in without the MFA requirement. If this option is missing or empty and
|
||||||
|
* the Duo module is installed, MFA will be enforced for all users.
|
||||||
|
*/
|
||||||
|
private static final IPAddressListProperty DUO_ENFORCE_HOSTS =
|
||||||
|
new IPAddressListProperty() {
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public String getName() { return "duo-enforce-hosts"; }
|
||||||
|
|
||||||
|
};
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Returns the hostname of the Duo API endpoint to be used to verify user
|
* Returns the hostname of the Duo API endpoint to be used to verify user
|
||||||
@@ -188,5 +226,43 @@ public class ConfigurationService {
|
|||||||
public int getAuthenticationTimeout() throws GuacamoleException {
|
public int getAuthenticationTimeout() throws GuacamoleException {
|
||||||
return environment.getProperty(DUO_AUTH_TIMEOUT, 5);
|
return environment.getProperty(DUO_AUTH_TIMEOUT, 5);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns the list of IP addresses and subnets defined in guacamole.properties
|
||||||
|
* for which Duo MFA should _not_ be enforced. Users logging in from hosts
|
||||||
|
* contained in this list will be logged in without the MFA requirement.
|
||||||
|
*
|
||||||
|
* @return
|
||||||
|
* A list of IP addresses and subnets for which Duo MFA should not be
|
||||||
|
* enforced.
|
||||||
|
*
|
||||||
|
* @throws GuacamoleException
|
||||||
|
* If guacamole.properties cannot be parsed, or if an invalid IP address
|
||||||
|
* or subnet is specified.
|
||||||
|
*/
|
||||||
|
public List<IPAddress> getBypassHosts() throws GuacamoleException {
|
||||||
|
return environment.getProperty(DUO_BYPASS_HOSTS, Collections.emptyList());
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns the list of IP addresses and subnets defined in guacamole.properties
|
||||||
|
* for which Duo MFA should explicitly be enforced, while logins from all
|
||||||
|
* other hosts should not enforce MFA. Users logging in from hosts
|
||||||
|
* contained in this list will be required to complete the Duo MFA authentication,
|
||||||
|
* while users from all other hosts will be logged in without the MFA requirement.
|
||||||
|
*
|
||||||
|
* @return
|
||||||
|
* A list of IP addresses and subnets for which Duo MFA should be
|
||||||
|
* explicitly enforced.
|
||||||
|
*
|
||||||
|
* @throws GuacamoleException
|
||||||
|
* If guacamole.properties cannot be parsed, or if an invalid IP address
|
||||||
|
* or subnet is specified.
|
||||||
|
*/
|
||||||
|
public List<IPAddress> getEnforceHosts() throws GuacamoleException {
|
||||||
|
return environment.getProperty(DUO_ENFORCE_HOSTS, Collections.emptyList());
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
}
|
}
|
||||||
|
@@ -78,6 +78,7 @@
|
|||||||
<groupId>com.github.seancfoley</groupId>
|
<groupId>com.github.seancfoley</groupId>
|
||||||
<artifactId>ipaddress</artifactId>
|
<artifactId>ipaddress</artifactId>
|
||||||
<version>5.5.0</version>
|
<version>5.5.0</version>
|
||||||
|
<scope>provided</scope>
|
||||||
</dependency>
|
</dependency>
|
||||||
|
|
||||||
<!-- JUnit -->
|
<!-- JUnit -->
|
||||||
|
@@ -177,6 +177,14 @@
|
|||||||
<version>2.1.1</version>
|
<version>2.1.1</version>
|
||||||
<scope>provided</scope>
|
<scope>provided</scope>
|
||||||
</dependency>
|
</dependency>
|
||||||
|
|
||||||
|
<!-- Library for unified IPv4/6 parsing and validation -->
|
||||||
|
<dependency>
|
||||||
|
<groupId>com.github.seancfoley</groupId>
|
||||||
|
<artifactId>ipaddress</artifactId>
|
||||||
|
<version>5.5.0</version>
|
||||||
|
<scope>provided</scope>
|
||||||
|
</dependency>
|
||||||
|
|
||||||
</dependencies>
|
</dependencies>
|
||||||
|
|
||||||
|
@@ -20,10 +20,14 @@
|
|||||||
package org.apache.guacamole.auth.totp.conf;
|
package org.apache.guacamole.auth.totp.conf;
|
||||||
|
|
||||||
import com.google.inject.Inject;
|
import com.google.inject.Inject;
|
||||||
|
import inet.ipaddr.IPAddress;
|
||||||
|
import java.util.Collections;
|
||||||
|
import java.util.List;
|
||||||
import org.apache.guacamole.GuacamoleException;
|
import org.apache.guacamole.GuacamoleException;
|
||||||
import org.apache.guacamole.GuacamoleServerException;
|
import org.apache.guacamole.GuacamoleServerException;
|
||||||
import org.apache.guacamole.environment.Environment;
|
import org.apache.guacamole.environment.Environment;
|
||||||
import org.apache.guacamole.properties.EnumGuacamoleProperty;
|
import org.apache.guacamole.properties.EnumGuacamoleProperty;
|
||||||
|
import org.apache.guacamole.properties.IPAddressListProperty;
|
||||||
import org.apache.guacamole.properties.IntegerGuacamoleProperty;
|
import org.apache.guacamole.properties.IntegerGuacamoleProperty;
|
||||||
import org.apache.guacamole.properties.StringGuacamoleProperty;
|
import org.apache.guacamole.properties.StringGuacamoleProperty;
|
||||||
import org.apache.guacamole.totp.TOTPGenerator;
|
import org.apache.guacamole.totp.TOTPGenerator;
|
||||||
@@ -88,6 +92,36 @@ public class ConfigurationService {
|
|||||||
public String getName() { return "totp-mode"; }
|
public String getName() { return "totp-mode"; }
|
||||||
|
|
||||||
};
|
};
|
||||||
|
|
||||||
|
/**
|
||||||
|
* A property that contains a list of IP addresses and/or subnets for which
|
||||||
|
* MFA via the TOTP module should be bypassed. Users logging in from addresses
|
||||||
|
* contained in this list will not be prompted for a second authentication
|
||||||
|
* factor. If this property is empty or not defined, and the TOTP module
|
||||||
|
* is installed, all users will be prompted for MFA.
|
||||||
|
*/
|
||||||
|
private static final IPAddressListProperty TOTP_BYPASS_HOSTS =
|
||||||
|
new IPAddressListProperty() {
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public String getName() { return "totp-bypass-hosts"; }
|
||||||
|
|
||||||
|
};
|
||||||
|
|
||||||
|
/**
|
||||||
|
* A property that contains a list of IP addresses and/or subnets for which
|
||||||
|
* MFA via the TOTP module should explicitly be enabled. If this property is defined,
|
||||||
|
* and the TOTP module is installed, users logging in from hosts contained
|
||||||
|
* in this list will be prompted for MFA, and users logging in from all
|
||||||
|
* other hosts will not be prompted for MFA.
|
||||||
|
*/
|
||||||
|
private static final IPAddressListProperty TOTP_ENFORCE_HOSTS =
|
||||||
|
new IPAddressListProperty() {
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public String getName() { return "totp-enforce-hosts"; }
|
||||||
|
|
||||||
|
};
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Returns the human-readable name of the entity issuing user accounts. If
|
* Returns the human-readable name of the entity issuing user accounts. If
|
||||||
@@ -158,5 +192,39 @@ public class ConfigurationService {
|
|||||||
public TOTPGenerator.Mode getMode() throws GuacamoleException {
|
public TOTPGenerator.Mode getMode() throws GuacamoleException {
|
||||||
return environment.getProperty(TOTP_MODE, TOTPGenerator.Mode.SHA1);
|
return environment.getProperty(TOTP_MODE, TOTPGenerator.Mode.SHA1);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Return the list of IP addresses and/or subnets for which MFA authentication via the
|
||||||
|
* TOTP module should be bypassed, allowing users from those addresses to log in
|
||||||
|
* without the MFA requirement.
|
||||||
|
*
|
||||||
|
* @return
|
||||||
|
* A list of IP addresses and/or subnets for which MFA authentication
|
||||||
|
* should be bypassed.
|
||||||
|
*
|
||||||
|
* @throws GuacamoleException
|
||||||
|
* If guacamole.properties cannot be parsed, or an invalid IP address
|
||||||
|
* or subnet is specified.
|
||||||
|
*/
|
||||||
|
public List<IPAddress> getBypassHosts() throws GuacamoleException {
|
||||||
|
return environment.getProperty(TOTP_BYPASS_HOSTS, Collections.emptyList());
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Return the list of IP addresses and/or subnets for which MFA authentication via the TOTP
|
||||||
|
* module should be explicitly enabled, requiring users logging in from hosts specified in
|
||||||
|
* the list to complete MFA.
|
||||||
|
*
|
||||||
|
* @return
|
||||||
|
* A list of IP addresses and/or subnets for which MFA authentication
|
||||||
|
* should be explicitly enabled.
|
||||||
|
*
|
||||||
|
* @throws GuacamoleException
|
||||||
|
* If guacamole.properties cannot be parsed, or an invalid IP address
|
||||||
|
* or subnet is specified.
|
||||||
|
*/
|
||||||
|
public List<IPAddress> getEnforceHosts() throws GuacamoleException {
|
||||||
|
return environment.getProperty(TOTP_ENFORCE_HOSTS, Collections.emptyList());
|
||||||
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
@@ -22,9 +22,12 @@ package org.apache.guacamole.auth.totp.user;
|
|||||||
import com.google.common.io.BaseEncoding;
|
import com.google.common.io.BaseEncoding;
|
||||||
import com.google.inject.Inject;
|
import com.google.inject.Inject;
|
||||||
import com.google.inject.Provider;
|
import com.google.inject.Provider;
|
||||||
|
import inet.ipaddr.IPAddress;
|
||||||
|
import inet.ipaddr.IPAddressString;
|
||||||
import java.security.InvalidKeyException;
|
import java.security.InvalidKeyException;
|
||||||
import java.util.Collections;
|
import java.util.Collections;
|
||||||
import java.util.HashMap;
|
import java.util.HashMap;
|
||||||
|
import java.util.List;
|
||||||
import java.util.Map;
|
import java.util.Map;
|
||||||
import java.util.Set;
|
import java.util.Set;
|
||||||
import javax.servlet.http.HttpServletRequest;
|
import javax.servlet.http.HttpServletRequest;
|
||||||
@@ -44,6 +47,7 @@ import org.apache.guacamole.net.auth.User;
|
|||||||
import org.apache.guacamole.net.auth.UserContext;
|
import org.apache.guacamole.net.auth.UserContext;
|
||||||
import org.apache.guacamole.net.auth.UserGroup;
|
import org.apache.guacamole.net.auth.UserGroup;
|
||||||
import org.apache.guacamole.net.auth.credentials.CredentialsInfo;
|
import org.apache.guacamole.net.auth.credentials.CredentialsInfo;
|
||||||
|
import org.apache.guacamole.properties.IPAddressListProperty;
|
||||||
import org.apache.guacamole.totp.TOTPGenerator;
|
import org.apache.guacamole.totp.TOTPGenerator;
|
||||||
import org.slf4j.Logger;
|
import org.slf4j.Logger;
|
||||||
import org.slf4j.LoggerFactory;
|
import org.slf4j.LoggerFactory;
|
||||||
@@ -311,6 +315,45 @@ public class UserVerificationService {
|
|||||||
public void verifyIdentity(UserContext context,
|
public void verifyIdentity(UserContext context,
|
||||||
AuthenticatedUser authenticatedUser) throws GuacamoleException {
|
AuthenticatedUser authenticatedUser) throws GuacamoleException {
|
||||||
|
|
||||||
|
// Pull the original HTTP request used to authenticate
|
||||||
|
Credentials credentials = authenticatedUser.getCredentials();
|
||||||
|
HttpServletRequest request = credentials.getRequest();
|
||||||
|
|
||||||
|
// Get the current client address
|
||||||
|
IPAddress clientAddr = new IPAddressString(request.getRemoteAddr()).getAddress();
|
||||||
|
|
||||||
|
// Ignore anonymous users
|
||||||
|
if (authenticatedUser.getIdentifier().equals(AuthenticatedUser.ANONYMOUS_IDENTIFIER))
|
||||||
|
return;
|
||||||
|
|
||||||
|
// Pull address lists to check from configuration. Note that the enforce
|
||||||
|
// list will override the bypass list, which means that, if the client
|
||||||
|
// address happens to be in both lists, Duo MFA will be enforced.
|
||||||
|
List<IPAddress> bypassAddresses = confService.getBypassHosts();
|
||||||
|
List<IPAddress> enforceAddresses = confService.getEnforceHosts();
|
||||||
|
|
||||||
|
// Check the bypass list for the client address, and set the enforce
|
||||||
|
// flag to the opposite.
|
||||||
|
boolean enforceHost = !(IPAddressListProperty.addressListContains(bypassAddresses, clientAddr));
|
||||||
|
|
||||||
|
// Only continue processing if the list is not empty
|
||||||
|
if (!enforceAddresses.isEmpty()) {
|
||||||
|
|
||||||
|
// If client address is not available or invalid, MFA will
|
||||||
|
// be enforced.
|
||||||
|
if (clientAddr == null || !clientAddr.isIPAddress())
|
||||||
|
enforceHost = true;
|
||||||
|
|
||||||
|
// Check the enforce list and set the flag if the client address
|
||||||
|
// is found in the list.
|
||||||
|
else
|
||||||
|
enforceHost = IPAddressListProperty.addressListContains(enforceAddresses, clientAddr);
|
||||||
|
}
|
||||||
|
|
||||||
|
// If the enforce flag is not true, bypass TOTP MFA.
|
||||||
|
if (!enforceHost)
|
||||||
|
return;
|
||||||
|
|
||||||
// Ignore anonymous users
|
// Ignore anonymous users
|
||||||
String username = authenticatedUser.getIdentifier();
|
String username = authenticatedUser.getIdentifier();
|
||||||
if (username.equals(AuthenticatedUser.ANONYMOUS_IDENTIFIER))
|
if (username.equals(AuthenticatedUser.ANONYMOUS_IDENTIFIER))
|
||||||
@@ -325,10 +368,6 @@ public class UserVerificationService {
|
|||||||
if (key == null)
|
if (key == null)
|
||||||
return;
|
return;
|
||||||
|
|
||||||
// Pull the original HTTP request used to authenticate
|
|
||||||
Credentials credentials = authenticatedUser.getCredentials();
|
|
||||||
HttpServletRequest request = credentials.getRequest();
|
|
||||||
|
|
||||||
// Retrieve TOTP from request
|
// Retrieve TOTP from request
|
||||||
String code = request.getParameter(AuthenticationCodeField.PARAMETER_NAME);
|
String code = request.getParameter(AuthenticationCodeField.PARAMETER_NAME);
|
||||||
|
|
||||||
|
@@ -110,6 +110,13 @@
|
|||||||
<artifactId>jackson-databind</artifactId>
|
<artifactId>jackson-databind</artifactId>
|
||||||
</dependency>
|
</dependency>
|
||||||
|
|
||||||
|
<!-- Library for unified IPv4/6 parsing and validation -->
|
||||||
|
<dependency>
|
||||||
|
<groupId>com.github.seancfoley</groupId>
|
||||||
|
<artifactId>ipaddress</artifactId>
|
||||||
|
<version>5.5.0</version>
|
||||||
|
</dependency>
|
||||||
|
|
||||||
</dependencies>
|
</dependencies>
|
||||||
|
|
||||||
</project>
|
</project>
|
||||||
|
@@ -0,0 +1,113 @@
|
|||||||
|
/*
|
||||||
|
* Licensed to the Apache Software Foundation (ASF) under one
|
||||||
|
* or more contributor license agreements. See the NOTICE file
|
||||||
|
* distributed with this work for additional information
|
||||||
|
* regarding copyright ownership. The ASF licenses this file
|
||||||
|
* to you under the Apache License, Version 2.0 (the
|
||||||
|
* "License"); you may not use this file except in compliance
|
||||||
|
* with the License. You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing,
|
||||||
|
* software distributed under the License is distributed on an
|
||||||
|
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
|
||||||
|
* KIND, either express or implied. See the License for the
|
||||||
|
* specific language governing permissions and limitations
|
||||||
|
* under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package org.apache.guacamole.properties;
|
||||||
|
|
||||||
|
import inet.ipaddr.IPAddress;
|
||||||
|
import inet.ipaddr.IPAddressString;
|
||||||
|
import java.util.ArrayList;
|
||||||
|
import java.util.Arrays;
|
||||||
|
import java.util.Collections;
|
||||||
|
import java.util.List;
|
||||||
|
import java.util.regex.Pattern;
|
||||||
|
import org.apache.guacamole.GuacamoleException;
|
||||||
|
import org.apache.guacamole.GuacamoleServerException;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* A GuacamoleProperty implementation that parses a String for a comma-separated
|
||||||
|
* list of IP addresses and/or IP subnets, both IPv4 and IPv6, and returns the
|
||||||
|
* list of those valid IP addresses/subnets.
|
||||||
|
*/
|
||||||
|
public abstract class IPAddressListProperty implements GuacamoleProperty<List<IPAddress>> {
|
||||||
|
|
||||||
|
/**
|
||||||
|
* A pattern which matches against the delimiters between values. This is
|
||||||
|
* currently simply a comma and any following whitespace. Parts of the
|
||||||
|
* input string which match this pattern will not be included in the parsed
|
||||||
|
* result.
|
||||||
|
*/
|
||||||
|
private static final Pattern DELIMITER_PATTERN = Pattern.compile(",\\s*");
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public List<IPAddress> parseValue(String values) throws GuacamoleException {
|
||||||
|
|
||||||
|
// Null for null
|
||||||
|
if (values == null)
|
||||||
|
return null;
|
||||||
|
|
||||||
|
// Not null, just empty
|
||||||
|
if (values.isEmpty())
|
||||||
|
return Collections.emptyList();
|
||||||
|
|
||||||
|
// Split the string into an array
|
||||||
|
List<String> addrStrings = Arrays.asList(DELIMITER_PATTERN.split(values));
|
||||||
|
List<IPAddress> ipAddresses = new ArrayList<>();
|
||||||
|
|
||||||
|
// Loop through each string
|
||||||
|
for (String addrString : addrStrings) {
|
||||||
|
|
||||||
|
// Convert the string to an IPAddressString for validation
|
||||||
|
IPAddressString ipString = new IPAddressString(addrString);
|
||||||
|
|
||||||
|
// If this isn't a valid address, subnet, etc., throw an exception
|
||||||
|
if (!ipString.isIPAddress())
|
||||||
|
throw new GuacamoleServerException("Invalid IP address specified: " + addrString);
|
||||||
|
|
||||||
|
// Add the address to the list.
|
||||||
|
ipAddresses.add(ipString.getAddress());
|
||||||
|
}
|
||||||
|
|
||||||
|
// Return our list of valid IP addresses and/or subnets
|
||||||
|
return ipAddresses;
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Return true if the provided address list contains the client address,
|
||||||
|
* or false if no match is found.
|
||||||
|
*
|
||||||
|
* @param addrList
|
||||||
|
* The address list to check for matches.
|
||||||
|
*
|
||||||
|
* @param ipAddr
|
||||||
|
* The client address to look for in the list.
|
||||||
|
*
|
||||||
|
* @return
|
||||||
|
* True if the client address is in the provided list, otherwise
|
||||||
|
* false.
|
||||||
|
*/
|
||||||
|
public static boolean addressListContains(List<IPAddress> addrList, IPAddress ipAddr) {
|
||||||
|
|
||||||
|
// If either is null, return false
|
||||||
|
if (ipAddr == null || addrList == null)
|
||||||
|
return false;
|
||||||
|
|
||||||
|
for (IPAddress ipEntry : addrList)
|
||||||
|
|
||||||
|
// If version matches and entry contains it, return true
|
||||||
|
if (ipEntry.getIPVersion().equals(ipAddr.getIPVersion())
|
||||||
|
&& ipEntry.contains(ipAddr))
|
||||||
|
return true;
|
||||||
|
|
||||||
|
// No match, so return false
|
||||||
|
return false;
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
Reference in New Issue
Block a user