@Override public HttpHandler wrap(HttpHandler handler) { IPAddressAccessControlHandler res = new IPAddressAccessControlHandler(handler, failureStatus); for(Holder match: peerMatches) { if(match.deny) { res.addDeny(match.rule); } else { res.addAllow(match.rule); } } res.setDefaultAllow(defaultAllow); return res; } }
private void createServer() { logger.log(Level.FINE, "Locked to build server..."); OAuthTokenInterceptor extractingHttpHandler = new ExtractingTokenInterceptor(ioQueue); IPAddressAccessControlHandler ipAddressAccessControlHandler = new IPAddressAccessControlHandler(); ipAddressAccessControlHandler.setDefaultAllow(false); for (InetAddress inetAddress : allowedClients) { ipAddressAccessControlHandler.addAllow(inetAddress.getHostAddress()); } server = Undertow.builder() .addHttpListener(port, "localhost") .setHandler(ipAddressAccessControlHandler) .setHandler(Handlers.path() .addExactPath(createPath(extractingHttpHandler.getPathPrefix()), extractingHttpHandler) .addExactPath(createPath(interceptor.getPathPrefix()), interceptor) ) .build(); logger.log(Level.INFO, "Starting token web listener..."); server.start(); }
@Override public HttpHandler wrap(HttpHandler handler) { IPAddressAccessControlHandler res = new IPAddressAccessControlHandler(handler, failureStatus); for(Holder match: peerMatches) { if(match.deny) { res.addDeny(match.rule); } else { res.addAllow(match.rule); } } res.setDefaultAllow(defaultAllow); return res; } }
@Override public HttpHandler wrap(HttpHandler handler) { IPAddressAccessControlHandler res = new IPAddressAccessControlHandler(handler, failureStatus); for(Holder match: peerMatches) { if(match.deny) { res.addDeny(match.rule); } else { res.addAllow(match.rule); } } res.setDefaultAllow(defaultAllow); return res; } }