Add ACL support to the server #25
Labels
No labels
Compat/Breaking
Kind/Bug
Kind/Documentation
Kind/Enhancement
Kind/Feature
Kind/Security
Kind/Testing
Priority
Critical
Priority
High
Priority
Low
Priority
Medium
Reviewed
Confirmed
Reviewed
Duplicate
Reviewed
Invalid
Reviewed
Won't Fix
Status
Abandoned
Status
Blocked
Status
Need More Info
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Depends on
#42 WIP: Add ACL support to the server (closes #25)
luca0N/lanbassador
Reference
luca0N/lanbassador#25
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Add basic access-control list (ACL) support to the server, so that users are able to restrict WebSocket access from specific IP addresses.
This issue is slightly related to #26, which was created specifically for addressing authentication (whereas this issue covers TCP/IP-level ACL only).
I have been thinking about how to approach this. I think that a simple configuration file could have some options that would allow server administrators to specify CIDR ranges for allowlisting and denylisting. For instance:
Even though this is easy to implement, there seems to be several Go packages that already handle CIDR notations, so they could be used in the project.
Another way to implement this would be to have a database with a preferences table, in which we could save the exact same information. I believe a configuration file would be a better approach, even if databases will be used regardless due to #26, because, otherwise, administrators would have to either use the web app to set up ACLs, or a command-line utility would have to be created, which would then add/modify the relevant records in the server database. Having administrators directly modify the database is bad UX.