-
Notifications
You must be signed in to change notification settings - Fork 558
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Add ClientVPN connection handler sample to README
- Loading branch information
Showing
2 changed files
with
61 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,59 @@ | ||
# Sample Function | ||
|
||
The following is a sample Lambda function that receives a Client VPN connection handler request as an input and then validates the IP address input and checks whether the connection source IP is on the allowed list defined as a map inside the function. If the source IP matches an allowed IP address it allows the access, otherwise an error message is presented to the user. Debug logs are generated to CloudWatch Logs. (Note that by default anything written to Console will be logged as CloudWatch Logs events.) | ||
|
||
```go | ||
import ( | ||
"fmt" | ||
"log" | ||
"net" | ||
|
||
"encoding/json" | ||
|
||
"github.com/aws/aws-lambda-go/events" | ||
"github.com/aws/aws-lambda-go/lambda" | ||
) | ||
|
||
var ( | ||
AllowedIPs = map[string]bool{ | ||
"10.11.12.13": true, | ||
} | ||
) | ||
|
||
func handler(request events.ClientVPNConnectionHandlerRequest) (events.ClientVPNConnectionHandlerResponse, error) { | ||
requestJson, _ := json.MarshalIndent(request, "", " ") | ||
log.Printf("REQUEST: %s", requestJson) | ||
|
||
sourceIP := request.PublicIP | ||
if net.ParseIP(sourceIP) == nil { | ||
return events.ClientVPNConnectionHandlerResponse{}, fmt.Errorf("Invalid parameter PublicIP passed in request: '%s'", sourceIP) | ||
} | ||
|
||
log.Printf("SOURCE IP: %s", sourceIP) | ||
|
||
postureCompliance := []string{} | ||
|
||
allowed, ok := AllowedIPs[sourceIP] | ||
if !ok { | ||
allowed = false | ||
postureCompliance = []string{"BlockedSourceIP"} | ||
} | ||
|
||
if allowed { | ||
log.Printf("Allowing access from: %s", sourceIP) | ||
} else { | ||
log.Printf("Blocking access from: %s", sourceIP) | ||
} | ||
|
||
return events.ClientVPNConnectionHandlerResponse{ | ||
Allow: allowed, | ||
ErrorMsgOnFailedPostureCompliance: "You're accessing from a blocked IP range.", | ||
PostureComplianceStatuses: postureCompliance, | ||
SchemaVersion: "v1", | ||
}, nil | ||
} | ||
|
||
func main() { | ||
lambda.Start(handler) | ||
} | ||
``` |