Actix Middleware for IP filter. Support glob pattern.
```rust use actixweb::{App, HttpServer, HttpRequest, web, middleware}; use actixip_filter::IPFilter;
async fn index(req: HttpRequest) -> &'static str { "Hello world" }
async fn main() -> std::io::Result<()> { HttpServer::new(|| App::new() // enable logger .wrap(middleware::Logger::default()) // setup ip filters .wrap( IPFilter::new() .allow(vec!["172.??.6*.12"]) .block(vec!["192.168.1.222"]) ) // register simple route, handle all methods .service(web::resource("/").to(index)) ) .bind("0.0.0.0:8080")?; Ok(()) } ```
You can limit the allow/block actions to a certain set of patterns representing URL paths.
The following code will only allow/block to paths matching the patterns /my/path*
and
/my/other/*.csv
.
```rust use actixweb::{App, HttpServer, HttpRequest, web, middleware}; use actixip_filter::IPFilter;
async fn iamprotected() -> &'static str { "I am a protected resource" }
async fn iamunprotected() -> &'static str { "I am NOT a protected resource" }
async fn main() -> std::io::Result<()> {
HttpServer::new(|| App::new()
// enable logger
.wrap(middleware::Logger::default())
// setup ip filters
.wrap(
IPFilter::new()
.allow(vec!["172.??.6*.12"])
.block(vec!["192.168.1.222"])
.limit_to(vec!["/my/path/*"])
)
// register simple protected route
.service(web::resource("/my/path/resource").to(i_am_protected))
// register simple unprotected route
.service(web::resource("/other/path/resource").to(i_am_unprotected))
)
.bind("0.0.0.0:8000");
Ok(())
} ```
You can add an allow handler and a block handler. These handlers will be called whenever a request succeeds at passing an ip filter (allow handler) or it is blocked (block handler). This last allows you to customize the error response. The callbacks will not be called on unprotected paths.
The allow handler must take three positional arguments and no return type:
```rust use actixipfilter::IPFilter; use actix_web::dev::ServiceRequest;
fn myallowhandler(flt: &IPFilter, ip: &str, req: &ServiceRequest) { //Do smth } ```
The parameters passed to the functions are borrows of the IPFilter
, the ip of the request and
the request.
You can attach the handler to an IPFilter
like this:
```rust use actixweb::{App, HttpServer, HttpRequest, web, middleware}; use actixipfilter::IPFilter; use actixweb::dev::ServiceRequest;
fn myallowhandler(flt: &IPFilter, ip: &str, req: &ServiceRequest) { //Do smth }
async fn iamprotected() -> &'static str { "I am a protected resource" }
async fn iamunprotected() -> &'static str { "I am NOT a protected resource" }
async fn main() -> std::io::Result<()> {
HttpServer::new(|| App::new()
// enable logger
.wrap(middleware::Logger::default())
// setup ip filters
.wrap(
IPFilter::new()
.allow(vec!["172.??.6*.12"])
.block(vec!["192.168.1.222"])
.limit_to(vec!["/my/path/*"])
.on_allow(my_allow_handler)
)
// register simple protected route
.service(web::resource("/my/path/resource").to(i_am_protected))
// register simple unprotected route
.service(web::resource("/other/path/resource").to(i_am_unprotected))
)
.bind("0.0.0.0:8000");
Ok(())
} ```
The allow handler must take three positional arguments and and optional body response as a response:
```rust use actixipfilter::IPFilter; use actixweb::dev::ServiceRequest; use actixweb::HttpResponse;
fn myblockhandler(flt: &IPFilter, ip: &str, req: &ServiceRequest) -> Option
The parameters passed to the functions are borrows of the IPFilter
, the ip of the request and
the request.
If the handler returns None, then the default error response is used.
You can attach the handler to an IPFilter
like this:
```rust use actixweb::{App, HttpServer, HttpRequest, web, middleware}; use actixipfilter::IPFilter; use actixweb::dev::ServiceRequest; use actix_web::HttpResponse;
fn myblockhandler(flt: &IPFilter, ip: &str, req: &ServiceRequest) -> Option
async fn iamprotected() -> &'static str { "I am a protected resource" }
async fn iamunprotected() -> &'static str { "I am NOT a protected resource" }
async fn main() -> std::io::Result<()> {
HttpServer::new(|| App::new()
// enable logger
.wrap(middleware::Logger::default())
// setup ip filters
.wrap(
IPFilter::new()
.allow(vec!["172.??.6*.12"])
.block(vec!["192.168.1.222"])
.limit_to(vec!["/my/path/*"])
.on_block(my_block_handler)
)
// register simple protected route
.service(web::resource("/my/path/resource").to(i_am_protected))
// register simple unprotected route
.service(web::resource("/other/path/resource").to(i_am_unprotected))
)
.bind("0.0.0.0:8000");
Ok(())
} ```
License: MIT