dnsforward: allowed clients local
This commit is contained in:
@@ -30,6 +30,9 @@ NOTE: Add new changes BELOW THIS COMMENT.
|
|||||||
|
|
||||||
### Fixed
|
### Fixed
|
||||||
|
|
||||||
|
- Locally served address are now ignored from allowed/blocked clients access
|
||||||
|
lists. These addresses are always allowed ([#5799]).
|
||||||
|
|
||||||
- Unquoted IPv6 bind hosts with trailing colons erroneously considered
|
- Unquoted IPv6 bind hosts with trailing colons erroneously considered
|
||||||
unspecified addresses are now properly validated ([#5752]).
|
unspecified addresses are now properly validated ([#5752]).
|
||||||
|
|
||||||
@@ -42,6 +45,7 @@ NOTE: Add new changes BELOW THIS COMMENT.
|
|||||||
|
|
||||||
[#1577]: https://github.com/AdguardTeam/AdGuardHome/issues/1577
|
[#1577]: https://github.com/AdguardTeam/AdGuardHome/issues/1577
|
||||||
[#5716]: https://github.com/AdguardTeam/AdGuardHome/issues/5716
|
[#5716]: https://github.com/AdguardTeam/AdGuardHome/issues/5716
|
||||||
|
[#5799]: https://github.com/AdguardTeam/AdGuardHome/issues/5799
|
||||||
|
|
||||||
<!--
|
<!--
|
||||||
NOTE: Add new changes ABOVE THIS COMMENT.
|
NOTE: Add new changes ABOVE THIS COMMENT.
|
||||||
|
|||||||
@@ -10,6 +10,7 @@ import (
|
|||||||
"github.com/AdguardTeam/AdGuardHome/internal/aghalg"
|
"github.com/AdguardTeam/AdGuardHome/internal/aghalg"
|
||||||
"github.com/AdguardTeam/AdGuardHome/internal/aghhttp"
|
"github.com/AdguardTeam/AdGuardHome/internal/aghhttp"
|
||||||
"github.com/AdguardTeam/golibs/log"
|
"github.com/AdguardTeam/golibs/log"
|
||||||
|
"github.com/AdguardTeam/golibs/netutil"
|
||||||
"github.com/AdguardTeam/golibs/stringutil"
|
"github.com/AdguardTeam/golibs/stringutil"
|
||||||
"github.com/AdguardTeam/urlfilter"
|
"github.com/AdguardTeam/urlfilter"
|
||||||
"github.com/AdguardTeam/urlfilter/filterlist"
|
"github.com/AdguardTeam/urlfilter/filterlist"
|
||||||
@@ -138,9 +139,13 @@ func (a *accessManager) isBlockedHost(host string, qt rules.RRType) (ok bool) {
|
|||||||
return ok
|
return ok
|
||||||
}
|
}
|
||||||
|
|
||||||
// isBlockedIP returns the status of the IP address blocking as well as the rule
|
// isBlockedIP returns the status of the IP address blocking as well as the
|
||||||
// that blocked it.
|
// rule that blocked it. Locally served addresses are always allowed.
|
||||||
func (a *accessManager) isBlockedIP(ip netip.Addr) (blocked bool, rule string) {
|
func (a *accessManager) isBlockedIP(ip netip.Addr) (blocked bool, rule string) {
|
||||||
|
if netutil.IsLocallyServedAddr(ip) {
|
||||||
|
return false, ""
|
||||||
|
}
|
||||||
|
|
||||||
blocked = true
|
blocked = true
|
||||||
ips := a.blockedIPs
|
ips := a.blockedIPs
|
||||||
ipnets := a.blockedNets
|
ipnets := a.blockedNets
|
||||||
|
|||||||
@@ -103,7 +103,7 @@ func TestIsBlockedHost(t *testing.T) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestIsBlockedIP(t *testing.T) {
|
func TestAccessManager_IsBlockedIP_allow(t *testing.T) {
|
||||||
clients := []string{
|
clients := []string{
|
||||||
"1.2.3.4",
|
"1.2.3.4",
|
||||||
"5.6.7.8/24",
|
"5.6.7.8/24",
|
||||||
@@ -112,49 +112,93 @@ func TestIsBlockedIP(t *testing.T) {
|
|||||||
allowCtx, err := newAccessCtx(clients, nil, nil)
|
allowCtx, err := newAccessCtx(clients, nil, nil)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
testCases := []struct {
|
||||||
|
ip netip.Addr
|
||||||
|
want assert.BoolAssertionFunc
|
||||||
|
name string
|
||||||
|
wantRule string
|
||||||
|
}{{
|
||||||
|
ip: netip.MustParseAddr("1.2.3.4"),
|
||||||
|
name: "match_ip",
|
||||||
|
wantRule: "1.2.3.4",
|
||||||
|
want: assert.False,
|
||||||
|
}, {
|
||||||
|
ip: netip.MustParseAddr("5.6.7.100"),
|
||||||
|
name: "match_cidr",
|
||||||
|
wantRule: "5.6.7.8/24",
|
||||||
|
want: assert.False,
|
||||||
|
}, {
|
||||||
|
ip: netip.MustParseAddr("9.2.3.4"),
|
||||||
|
name: "no_match_ip",
|
||||||
|
wantRule: "",
|
||||||
|
want: assert.True,
|
||||||
|
}, {
|
||||||
|
ip: netip.MustParseAddr("9.6.7.100"),
|
||||||
|
name: "no_match_cidr",
|
||||||
|
wantRule: "",
|
||||||
|
want: assert.True,
|
||||||
|
}, {
|
||||||
|
ip: netip.MustParseAddr("127.0.0.1"),
|
||||||
|
name: "locally_served_ip",
|
||||||
|
wantRule: "",
|
||||||
|
want: assert.False,
|
||||||
|
}}
|
||||||
|
|
||||||
|
for _, tc := range testCases {
|
||||||
|
t.Run(tc.name, func(t *testing.T) {
|
||||||
|
blocked, rule := allowCtx.isBlockedIP(tc.ip)
|
||||||
|
tc.want(t, blocked)
|
||||||
|
assert.Equal(t, tc.wantRule, rule)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestAccessManager_IsBlockedIP_block(t *testing.T) {
|
||||||
|
clients := []string{
|
||||||
|
"1.2.3.4",
|
||||||
|
"5.6.7.8/24",
|
||||||
|
}
|
||||||
|
|
||||||
blockCtx, err := newAccessCtx(nil, clients, nil)
|
blockCtx, err := newAccessCtx(nil, clients, nil)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|
||||||
testCases := []struct {
|
testCases := []struct {
|
||||||
ip netip.Addr
|
ip netip.Addr
|
||||||
name string
|
want assert.BoolAssertionFunc
|
||||||
wantRule string
|
name string
|
||||||
wantBlocked bool
|
wantRule string
|
||||||
}{{
|
}{{
|
||||||
ip: netip.MustParseAddr("1.2.3.4"),
|
ip: netip.MustParseAddr("1.2.3.4"),
|
||||||
name: "match_ip",
|
name: "match_ip",
|
||||||
wantRule: "1.2.3.4",
|
wantRule: "1.2.3.4",
|
||||||
wantBlocked: true,
|
want: assert.True,
|
||||||
}, {
|
}, {
|
||||||
ip: netip.MustParseAddr("5.6.7.100"),
|
ip: netip.MustParseAddr("5.6.7.100"),
|
||||||
name: "match_cidr",
|
name: "match_cidr",
|
||||||
wantRule: "5.6.7.8/24",
|
wantRule: "5.6.7.8/24",
|
||||||
wantBlocked: true,
|
want: assert.True,
|
||||||
}, {
|
}, {
|
||||||
ip: netip.MustParseAddr("9.2.3.4"),
|
ip: netip.MustParseAddr("9.2.3.4"),
|
||||||
name: "no_match_ip",
|
name: "no_match_ip",
|
||||||
wantRule: "",
|
wantRule: "",
|
||||||
wantBlocked: false,
|
want: assert.False,
|
||||||
}, {
|
}, {
|
||||||
ip: netip.MustParseAddr("9.6.7.100"),
|
ip: netip.MustParseAddr("9.6.7.100"),
|
||||||
name: "no_match_cidr",
|
name: "no_match_cidr",
|
||||||
wantRule: "",
|
wantRule: "",
|
||||||
wantBlocked: false,
|
want: assert.False,
|
||||||
|
}, {
|
||||||
|
ip: netip.MustParseAddr("127.0.0.1"),
|
||||||
|
name: "locally_served_ip",
|
||||||
|
wantRule: "",
|
||||||
|
want: assert.False,
|
||||||
}}
|
}}
|
||||||
|
|
||||||
t.Run("allow", func(t *testing.T) {
|
for _, tc := range testCases {
|
||||||
for _, tc := range testCases {
|
t.Run(tc.name, func(t *testing.T) {
|
||||||
blocked, rule := allowCtx.isBlockedIP(tc.ip)
|
|
||||||
assert.Equal(t, !tc.wantBlocked, blocked)
|
|
||||||
assert.Equal(t, tc.wantRule, rule)
|
|
||||||
}
|
|
||||||
})
|
|
||||||
|
|
||||||
t.Run("block", func(t *testing.T) {
|
|
||||||
for _, tc := range testCases {
|
|
||||||
blocked, rule := blockCtx.isBlockedIP(tc.ip)
|
blocked, rule := blockCtx.isBlockedIP(tc.ip)
|
||||||
assert.Equal(t, tc.wantBlocked, blocked)
|
tc.want(t, blocked)
|
||||||
assert.Equal(t, tc.wantRule, rule)
|
assert.Equal(t, tc.wantRule, rule)
|
||||||
}
|
})
|
||||||
})
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -700,10 +700,12 @@ func (s *Server) IsBlockedClient(ip netip.Addr, clientID string) (blocked bool,
|
|||||||
blockedByIP := false
|
blockedByIP := false
|
||||||
if ip != (netip.Addr{}) {
|
if ip != (netip.Addr{}) {
|
||||||
blockedByIP, rule = s.access.isBlockedIP(ip)
|
blockedByIP, rule = s.access.isBlockedIP(ip)
|
||||||
|
log.Debug("by ip %v", blockedByIP)
|
||||||
}
|
}
|
||||||
|
|
||||||
allowlistMode := s.access.allowlistMode()
|
allowlistMode := s.access.allowlistMode()
|
||||||
blockedByClientID := s.access.isBlockedClientID(clientID)
|
blockedByClientID := s.access.isBlockedClientID(clientID)
|
||||||
|
log.Debug("by client id %v", blockedByClientID)
|
||||||
|
|
||||||
// Allow if at least one of the checks allows in allowlist mode, but block
|
// Allow if at least one of the checks allows in allowlist mode, but block
|
||||||
// if at least one of the checks blocks in blocklist mode.
|
// if at least one of the checks blocks in blocklist mode.
|
||||||
|
|||||||
Reference in New Issue
Block a user