Files
EdgeAPI/internal/db/models/http_firewall_rule_set_dao.go
GoEdgeLab 5a17ae9d79 v1.4.1
2024-07-27 14:15:25 +08:00

286 lines
7.6 KiB
Go

package models
import (
"encoding/json"
"github.com/TeaOSLab/EdgeAPI/internal/errors"
"github.com/TeaOSLab/EdgeCommon/pkg/serverconfigs/firewallconfigs"
_ "github.com/go-sql-driver/mysql"
"github.com/iwind/TeaGo/Tea"
"github.com/iwind/TeaGo/dbs"
"github.com/iwind/TeaGo/maps"
"github.com/iwind/TeaGo/types"
)
const (
HTTPFirewallRuleSetStateEnabled = 1 // 已启用
HTTPFirewallRuleSetStateDisabled = 0 // 已禁用
)
type HTTPFirewallRuleSetDAO dbs.DAO
func NewHTTPFirewallRuleSetDAO() *HTTPFirewallRuleSetDAO {
return dbs.NewDAO(&HTTPFirewallRuleSetDAO{
DAOObject: dbs.DAOObject{
DB: Tea.Env,
Table: "edgeHTTPFirewallRuleSets",
Model: new(HTTPFirewallRuleSet),
PkName: "id",
},
}).(*HTTPFirewallRuleSetDAO)
}
var SharedHTTPFirewallRuleSetDAO *HTTPFirewallRuleSetDAO
func init() {
dbs.OnReady(func() {
SharedHTTPFirewallRuleSetDAO = NewHTTPFirewallRuleSetDAO()
})
}
// Init 初始化
func (this *HTTPFirewallRuleSetDAO) Init() {
_ = this.DAOObject.Init()
}
// EnableHTTPFirewallRuleSet 启用条目
func (this *HTTPFirewallRuleSetDAO) EnableHTTPFirewallRuleSet(tx *dbs.Tx, id int64) error {
_, err := this.Query(tx).
Pk(id).
Set("state", HTTPFirewallRuleSetStateEnabled).
Update()
return err
}
// DisableHTTPFirewallRuleSet 禁用条目
func (this *HTTPFirewallRuleSetDAO) DisableHTTPFirewallRuleSet(tx *dbs.Tx, ruleSetId int64) error {
_, err := this.Query(tx).
Pk(ruleSetId).
Set("state", HTTPFirewallRuleSetStateDisabled).
Update()
if err != nil {
return err
}
return this.NotifyUpdate(tx, ruleSetId)
}
// FindEnabledHTTPFirewallRuleSet 查找启用中的条目
func (this *HTTPFirewallRuleSetDAO) FindEnabledHTTPFirewallRuleSet(tx *dbs.Tx, id int64) (*HTTPFirewallRuleSet, error) {
result, err := this.Query(tx).
Pk(id).
Attr("state", HTTPFirewallRuleSetStateEnabled).
Find()
if result == nil {
return nil, err
}
return result.(*HTTPFirewallRuleSet), err
}
// FindHTTPFirewallRuleSetName 根据主键查找名称
func (this *HTTPFirewallRuleSetDAO) FindHTTPFirewallRuleSetName(tx *dbs.Tx, id int64) (string, error) {
return this.Query(tx).
Pk(id).
Result("name").
FindStringCol("")
}
// ComposeFirewallRuleSet 组合配置
func (this *HTTPFirewallRuleSetDAO) ComposeFirewallRuleSet(tx *dbs.Tx, setId int64, forNode bool) (*firewallconfigs.HTTPFirewallRuleSet, error) {
set, err := this.FindEnabledHTTPFirewallRuleSet(tx, setId)
if err != nil {
return nil, err
}
if set == nil {
return nil, nil
}
var config = &firewallconfigs.HTTPFirewallRuleSet{}
config.Id = int64(set.Id)
config.IsOn = set.IsOn
config.Name = set.Name
config.Description = set.Description
config.Code = set.Code
config.Connector = set.Connector
config.IgnoreLocal = set.IgnoreLocal
config.IgnoreSearchEngine = set.IgnoreSearchEngine
if IsNotNull(set.Rules) {
var ruleRefs = []*firewallconfigs.HTTPFirewallRuleRef{}
err = json.Unmarshal(set.Rules, &ruleRefs)
if err != nil {
return nil, err
}
for _, ruleRef := range ruleRefs {
ruleConfig, err := SharedHTTPFirewallRuleDAO.ComposeFirewallRule(tx, ruleRef.RuleId)
if err != nil {
return nil, err
}
if ruleConfig != nil {
config.RuleRefs = append(config.RuleRefs, ruleRef)
config.Rules = append(config.Rules, ruleConfig)
}
}
}
var actionConfigs = []*firewallconfigs.HTTPFirewallActionConfig{}
if len(set.Actions) > 0 {
err = json.Unmarshal(set.Actions, &actionConfigs)
if err != nil {
return nil, err
}
config.Actions = actionConfigs
}
// 检查各个选项
for _, actionConfig := range actionConfigs {
if actionConfig.Code == firewallconfigs.HTTPFirewallActionRecordIP { // 记录IP动作
if actionConfig.Options != nil {
var ipListId = actionConfig.Options.GetInt64("ipListId")
if ipListId <= 0 { // default list id
if forNode {
actionConfig.Options["ipListId"] = firewallconfigs.FindGlobalListIdWithType(actionConfig.Options.GetString("type"))
}
actionConfig.Options["ipListIsDeleted"] = false
} else {
exists, err := SharedIPListDAO.ExistsEnabledIPList(tx, ipListId)
if err != nil {
return nil, err
}
if !exists {
actionConfig.Options["ipListIsDeleted"] = true
}
}
}
}
}
return config, nil
}
// CreateOrUpdateSetFromConfig 从配置中创建规则集
func (this *HTTPFirewallRuleSetDAO) CreateOrUpdateSetFromConfig(tx *dbs.Tx, setConfig *firewallconfigs.HTTPFirewallRuleSet) (int64, error) {
var op = NewHTTPFirewallRuleSetOperator()
op.State = HTTPFirewallRuleSetStateEnabled
op.Id = setConfig.Id
op.IsOn = setConfig.IsOn
op.Name = setConfig.Name
op.Description = setConfig.Description
op.Connector = setConfig.Connector
op.IgnoreLocal = setConfig.IgnoreLocal
op.IgnoreSearchEngine = setConfig.IgnoreSearchEngine
if len(setConfig.Actions) == 0 {
op.Actions = "[]"
} else {
actionsJSON, err := json.Marshal(setConfig.Actions)
if err != nil {
return 0, err
}
op.Actions = actionsJSON
}
op.Code = setConfig.Code
// rules
ruleRefs := []*firewallconfigs.HTTPFirewallRuleRef{}
for _, ruleConfig := range setConfig.Rules {
ruleId, err := SharedHTTPFirewallRuleDAO.CreateOrUpdateRuleFromConfig(tx, ruleConfig)
if err != nil {
return 0, err
}
ruleRefs = append(ruleRefs, &firewallconfigs.HTTPFirewallRuleRef{
IsOn: true,
RuleId: ruleId,
})
}
ruleRefsJSON, err := json.Marshal(ruleRefs)
if err != nil {
return 0, err
}
op.Rules = ruleRefsJSON
err = this.Save(tx, op)
if err != nil {
return 0, err
}
// 通知更新
if setConfig.Id > 0 {
err := this.NotifyUpdate(tx, setConfig.Id)
if err != nil {
return 0, err
}
}
return types.Int64(op.Id), nil
}
// UpdateRuleSetIsOn 设置是否启用
func (this *HTTPFirewallRuleSetDAO) UpdateRuleSetIsOn(tx *dbs.Tx, ruleSetId int64, isOn bool) error {
if ruleSetId <= 0 {
return errors.New("invalid ruleSetId")
}
_, err := this.Query(tx).
Pk(ruleSetId).
Set("isOn", isOn).
Update()
if err != nil {
return err
}
return this.NotifyUpdate(tx, ruleSetId)
}
// FindEnabledRuleSetIdWithRuleId 根据规则查找规则集
func (this *HTTPFirewallRuleSetDAO) FindEnabledRuleSetIdWithRuleId(tx *dbs.Tx, ruleId int64) (int64, error) {
return this.Query(tx).
State(HTTPFirewallRuleStateEnabled).
Where("JSON_CONTAINS(rules, :jsonQuery)").
Param("jsonQuery", maps.Map{"ruleId": ruleId}.AsJSON()).
ResultPk().
FindInt64Col(0)
}
// FindAllEnabledRuleSetIdsWithIPListId 根据IP名单ID查找对应动作的WAF规则集
func (this *HTTPFirewallRuleSetDAO) FindAllEnabledRuleSetIdsWithIPListId(tx *dbs.Tx, ipListId int64) (setIds []int64, err error) {
ones, err := this.Query(tx).
State(HTTPFirewallRuleStateEnabled).
Where("JSON_CONTAINS(actions, :jsonQuery)").
Param("jsonQuery", maps.Map{
"code": firewallconfigs.HTTPFirewallActionRecordIP,
"options": maps.Map{
"ipListId": ipListId,
},
}.AsJSON()).
ResultPk().
FindAll()
if err != nil {
return nil, err
}
for _, one := range ones {
setIds = append(setIds, int64(one.(*HTTPFirewallRuleSet).Id))
}
return
}
// CheckUserRuleSet 检查用户
func (this *HTTPFirewallRuleSetDAO) CheckUserRuleSet(tx *dbs.Tx, userId int64, setId int64) error {
groupId, err := SharedHTTPFirewallRuleGroupDAO.FindRuleGroupIdWithRuleSetId(tx, setId)
if err != nil {
return err
}
if groupId == 0 {
return ErrNotFound
}
return SharedHTTPFirewallRuleGroupDAO.CheckUserRuleGroup(tx, userId, groupId)
}
// NotifyUpdate 通知更新
func (this *HTTPFirewallRuleSetDAO) NotifyUpdate(tx *dbs.Tx, setId int64) error {
groupId, err := SharedHTTPFirewallRuleGroupDAO.FindRuleGroupIdWithRuleSetId(tx, setId)
if err != nil {
return err
}
if groupId > 0 {
return SharedHTTPFirewallRuleGroupDAO.NotifyUpdate(tx, groupId)
}
return nil
}