/******************************************************************************* * Copyright (c) 2011, 2016 Eurotech and/or its affiliates * * All rights reserved. This program and the accompanying materials * are made available under the terms of the Eclipse Public License v1.0 * which accompanies this distribution, and is available at * http://www.eclipse.org/legal/epl-v10.html * * Contributors: * Eurotech *******************************************************************************/ package org.eclipse.kura.net.firewall; import org.eclipse.kura.net.IP4Address; import org.eclipse.kura.net.IPAddress; import org.eclipse.kura.net.NetProtocol; import org.eclipse.kura.net.NetworkPair; /** * The base class for firewall port forward configurations * * @author eurotech * * @param <T> */ public abstract class FirewallPortForwardConfigIP<T extends IPAddress> implements FirewallPortForwardConfig { /** The interface name on which this configuration will listen for inbound connections **/ private String inboundIface; /** The interface name on which packet will be forwarded */ private String outboundIface; /** The LAN address to forward to **/ private IP4Address address; /** The protocol (TCP or UDP) to listen for and forward **/ private NetProtocol protocol; /** The inbound (WAN) port to listen on **/ private int inPort; /** The outbound (LAN) port to listen on **/ private int outPort; /** use masquerading */ private boolean masquerade; /** The (optional) permitted network for inbound connections **/ private NetworkPair<T> permittedNetwork; /** The (optional) permitted MAC address for inbound connections **/ private String permittedMac; /** The (options) permitted source port range for inbound connections **/ private String sourcePortRange; /** * Creates and empty port forward configuration */ public FirewallPortForwardConfigIP() { super(); } /** * Creates a complete port forward configuration * * @param inboundIface * The interface name on which this configuration will listen for inbound connections * @param outboundIface * The inetrface name on which packet will be forwarded * @param address * The LAN address to forward to * @param protocol * The protocol (TCP or UDP) to listen for and forward * @param inPort * The inbound (WAN) port to listen on * @param outPort * The outbound (LAN) port to listen on * @param masquerade * Use masquerade * @param permittedNetwork * The (optional) permitted network for inbound connections * @param permittedMac * The (optional) permitted MAC address for inbound connections * @param sourcePortRange * The (options) permitted source port range for inbound connections */ public FirewallPortForwardConfigIP(String inboundIface, String outboundIface, IP4Address address, NetProtocol protocol, int inPort, int outPort, boolean masquerade, NetworkPair<T> permittedNetwork, String permittedMac, String sourcePortRange) { super(); this.inboundIface = inboundIface; this.outboundIface = outboundIface; this.address = address; this.protocol = protocol; this.inPort = inPort; this.outPort = outPort; this.masquerade = masquerade; this.permittedNetwork = permittedNetwork; this.permittedMac = permittedMac; this.sourcePortRange = sourcePortRange; } @Override public String getInboundInterface() { return this.inboundIface; } public void setInboundInterface(String interfaceName) { this.inboundIface = interfaceName; } @Override public String getOutboundInterface() { return this.outboundIface; } public void setOutboundInterface(String interfaceName) { this.outboundIface = interfaceName; } @Override public IP4Address getAddress() { return this.address; } public void setAddress(IP4Address address) { this.address = address; } @Override public NetProtocol getProtocol() { return this.protocol; } public void setProtocol(NetProtocol protocol) { this.protocol = protocol; } @Override public int getInPort() { return this.inPort; } public void setInPort(int inPort) { this.inPort = inPort; } @Override public int getOutPort() { return this.outPort; } public void setOutPort(int outPort) { this.outPort = outPort; } @Override public boolean isMasquerade() { return this.masquerade; } public void setMasquerade(boolean masquerade) { this.masquerade = masquerade; } @Override public NetworkPair<T> getPermittedNetwork() { return this.permittedNetwork; } public void setPermittedNetwork(NetworkPair<T> permittedNetwork) { this.permittedNetwork = permittedNetwork; } @Override public String getPermittedMac() { return this.permittedMac; } public void setPermittedMac(String permittedMac) { this.permittedMac = permittedMac; } @Override public String getSourcePortRange() { return this.sourcePortRange; } public void setSourcePortRange(String sourcePortRange) { this.sourcePortRange = sourcePortRange; } @Override public int hashCode() { final int prime = 31; int result = 1; result = prime * result + (this.address == null ? 0 : this.address.hashCode()); result = prime * result + this.inPort; result = prime * result + (this.inboundIface == null ? 0 : this.inboundIface.hashCode()); result = prime * result + (this.outboundIface == null ? 0 : this.outboundIface.hashCode()); result = prime * result + (this.masquerade ? 1231 : 1237); result = prime * result + this.outPort; result = prime * result + (this.permittedMac == null ? 0 : this.permittedMac.hashCode()); result = prime * result + (this.permittedNetwork == null ? 0 : this.permittedNetwork.hashCode()); result = prime * result + (this.protocol == null ? 0 : this.protocol.hashCode()); result = prime * result + (this.sourcePortRange == null ? 0 : this.sourcePortRange.hashCode()); return result; } @Override public boolean equals(Object obj) { if (this == obj) { return true; } if (obj == null) { return false; } if (getClass() != obj.getClass()) { return false; } @SuppressWarnings("rawtypes") FirewallPortForwardConfigIP other = (FirewallPortForwardConfigIP) obj; if (this.address == null) { if (other.address != null) { return false; } } else if (!this.address.equals(other.address)) { return false; } if (this.inPort != other.inPort) { return false; } if (this.inboundIface == null) { if (other.inboundIface != null) { return false; } } else if (!this.inboundIface.equals(other.inboundIface)) { return false; } if (this.outboundIface == null) { if (other.outboundIface != null) { return false; } } else if (!this.outboundIface.equals(other.outboundIface)) { return false; } if (this.outPort != other.outPort) { return false; } if (this.masquerade != other.masquerade) { return false; } if (this.permittedMac == null) { if (other.permittedMac != null) { return false; } } else if (!this.permittedMac.equals(other.permittedMac)) { return false; } if (this.permittedNetwork == null) { if (other.permittedNetwork != null) { return false; } } else if (!this.permittedNetwork.equals(other.permittedNetwork)) { return false; } if (this.protocol != other.protocol) { return false; } if (this.sourcePortRange == null) { if (other.sourcePortRange != null) { return false; } } else if (!this.sourcePortRange.equals(other.sourcePortRange)) { return false; } return true; } @Override public boolean isValid() { if (this.inboundIface == null || this.inboundIface.trim().isEmpty()) { return false; } if (this.outboundIface == null || this.outboundIface.trim().isEmpty()) { return false; } if (this.address == null) { return false; } if (this.inPort < 0 || this.inPort > 65535 || this.outPort < 0 || this.outPort > 65535) { return false; } if (this.protocol == null || !this.protocol.equals(NetProtocol.tcp) || !this.protocol.equals(NetProtocol.udp)) { return false; } // TODO - add checks for optional parameters to make sure if they are not null they are valid return true; } @Override public String toString() { StringBuilder builder = new StringBuilder(); builder.append("FirewallPortForwardConfigIP [inboundIface="); builder.append(this.inboundIface); builder.append(", outboundIface="); builder.append(this.outboundIface); builder.append(", address="); builder.append(this.address); builder.append(", protocol="); builder.append(this.protocol); builder.append(", inPort="); builder.append(this.inPort); builder.append(", outPort="); builder.append(this.outPort); builder.append(", permittedNetwork="); builder.append(this.permittedNetwork); builder.append(", permittedMac="); builder.append(this.permittedMac); builder.append(", sourcePortRange="); builder.append(this.sourcePortRange); builder.append("]"); return builder.toString(); } }