mirror of
https://github.com/TeaOSLab/EdgeAPI.git
synced 2025-11-03 06:24:03 +08:00
285 lines
7.6 KiB
Go
285 lines
7.6 KiB
Go
package models
|
|
|
|
import (
|
|
"encoding/json"
|
|
"github.com/TeaOSLab/EdgeAPI/internal/errors"
|
|
"github.com/TeaOSLab/EdgeCommon/pkg/serverconfigs/firewallconfigs"
|
|
_ "github.com/go-sql-driver/mysql"
|
|
"github.com/iwind/TeaGo/Tea"
|
|
"github.com/iwind/TeaGo/dbs"
|
|
"github.com/iwind/TeaGo/maps"
|
|
"github.com/iwind/TeaGo/types"
|
|
)
|
|
|
|
const (
|
|
HTTPFirewallRuleSetStateEnabled = 1 // 已启用
|
|
HTTPFirewallRuleSetStateDisabled = 0 // 已禁用
|
|
)
|
|
|
|
type HTTPFirewallRuleSetDAO dbs.DAO
|
|
|
|
func NewHTTPFirewallRuleSetDAO() *HTTPFirewallRuleSetDAO {
|
|
return dbs.NewDAO(&HTTPFirewallRuleSetDAO{
|
|
DAOObject: dbs.DAOObject{
|
|
DB: Tea.Env,
|
|
Table: "edgeHTTPFirewallRuleSets",
|
|
Model: new(HTTPFirewallRuleSet),
|
|
PkName: "id",
|
|
},
|
|
}).(*HTTPFirewallRuleSetDAO)
|
|
}
|
|
|
|
var SharedHTTPFirewallRuleSetDAO *HTTPFirewallRuleSetDAO
|
|
|
|
func init() {
|
|
dbs.OnReady(func() {
|
|
SharedHTTPFirewallRuleSetDAO = NewHTTPFirewallRuleSetDAO()
|
|
})
|
|
}
|
|
|
|
// Init 初始化
|
|
func (this *HTTPFirewallRuleSetDAO) Init() {
|
|
_ = this.DAOObject.Init()
|
|
}
|
|
|
|
// EnableHTTPFirewallRuleSet 启用条目
|
|
func (this *HTTPFirewallRuleSetDAO) EnableHTTPFirewallRuleSet(tx *dbs.Tx, id int64) error {
|
|
_, err := this.Query(tx).
|
|
Pk(id).
|
|
Set("state", HTTPFirewallRuleSetStateEnabled).
|
|
Update()
|
|
return err
|
|
}
|
|
|
|
// DisableHTTPFirewallRuleSet 禁用条目
|
|
func (this *HTTPFirewallRuleSetDAO) DisableHTTPFirewallRuleSet(tx *dbs.Tx, ruleSetId int64) error {
|
|
_, err := this.Query(tx).
|
|
Pk(ruleSetId).
|
|
Set("state", HTTPFirewallRuleSetStateDisabled).
|
|
Update()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return this.NotifyUpdate(tx, ruleSetId)
|
|
}
|
|
|
|
// FindEnabledHTTPFirewallRuleSet 查找启用中的条目
|
|
func (this *HTTPFirewallRuleSetDAO) FindEnabledHTTPFirewallRuleSet(tx *dbs.Tx, id int64) (*HTTPFirewallRuleSet, error) {
|
|
result, err := this.Query(tx).
|
|
Pk(id).
|
|
Attr("state", HTTPFirewallRuleSetStateEnabled).
|
|
Find()
|
|
if result == nil {
|
|
return nil, err
|
|
}
|
|
return result.(*HTTPFirewallRuleSet), err
|
|
}
|
|
|
|
// FindHTTPFirewallRuleSetName 根据主键查找名称
|
|
func (this *HTTPFirewallRuleSetDAO) FindHTTPFirewallRuleSetName(tx *dbs.Tx, id int64) (string, error) {
|
|
return this.Query(tx).
|
|
Pk(id).
|
|
Result("name").
|
|
FindStringCol("")
|
|
}
|
|
|
|
// ComposeFirewallRuleSet 组合配置
|
|
func (this *HTTPFirewallRuleSetDAO) ComposeFirewallRuleSet(tx *dbs.Tx, setId int64, forNode bool) (*firewallconfigs.HTTPFirewallRuleSet, error) {
|
|
set, err := this.FindEnabledHTTPFirewallRuleSet(tx, setId)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if set == nil {
|
|
return nil, nil
|
|
}
|
|
var config = &firewallconfigs.HTTPFirewallRuleSet{}
|
|
config.Id = int64(set.Id)
|
|
config.IsOn = set.IsOn
|
|
config.Name = set.Name
|
|
config.Description = set.Description
|
|
config.Code = set.Code
|
|
config.Connector = set.Connector
|
|
config.IgnoreLocal = set.IgnoreLocal
|
|
config.IgnoreSearchEngine = set.IgnoreSearchEngine
|
|
|
|
if IsNotNull(set.Rules) {
|
|
var ruleRefs = []*firewallconfigs.HTTPFirewallRuleRef{}
|
|
err = json.Unmarshal(set.Rules, &ruleRefs)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
for _, ruleRef := range ruleRefs {
|
|
ruleConfig, err := SharedHTTPFirewallRuleDAO.ComposeFirewallRule(tx, ruleRef.RuleId)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if ruleConfig != nil {
|
|
config.RuleRefs = append(config.RuleRefs, ruleRef)
|
|
config.Rules = append(config.Rules, ruleConfig)
|
|
}
|
|
}
|
|
}
|
|
|
|
var actionConfigs = []*firewallconfigs.HTTPFirewallActionConfig{}
|
|
if len(set.Actions) > 0 {
|
|
err = json.Unmarshal(set.Actions, &actionConfigs)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
config.Actions = actionConfigs
|
|
}
|
|
|
|
// 检查各个选项
|
|
for _, actionConfig := range actionConfigs {
|
|
if actionConfig.Code == firewallconfigs.HTTPFirewallActionRecordIP { // 记录IP动作
|
|
if actionConfig.Options != nil {
|
|
var ipListId = actionConfig.Options.GetInt64("ipListId")
|
|
if ipListId <= 0 { // default list id
|
|
if forNode {
|
|
actionConfig.Options["ipListId"] = firewallconfigs.FindGlobalListIdWithType(actionConfig.Options.GetString("type"))
|
|
}
|
|
actionConfig.Options["ipListIsDeleted"] = false
|
|
} else {
|
|
exists, err := SharedIPListDAO.ExistsEnabledIPList(tx, ipListId)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if !exists {
|
|
actionConfig.Options["ipListIsDeleted"] = true
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
return config, nil
|
|
}
|
|
|
|
// CreateOrUpdateSetFromConfig 从配置中创建规则集
|
|
func (this *HTTPFirewallRuleSetDAO) CreateOrUpdateSetFromConfig(tx *dbs.Tx, setConfig *firewallconfigs.HTTPFirewallRuleSet) (int64, error) {
|
|
var op = NewHTTPFirewallRuleSetOperator()
|
|
op.State = HTTPFirewallRuleSetStateEnabled
|
|
op.Id = setConfig.Id
|
|
op.IsOn = setConfig.IsOn
|
|
op.Name = setConfig.Name
|
|
op.Description = setConfig.Description
|
|
op.Connector = setConfig.Connector
|
|
op.IgnoreLocal = setConfig.IgnoreLocal
|
|
op.IgnoreSearchEngine = setConfig.IgnoreSearchEngine
|
|
|
|
if len(setConfig.Actions) == 0 {
|
|
op.Actions = "[]"
|
|
} else {
|
|
actionsJSON, err := json.Marshal(setConfig.Actions)
|
|
if err != nil {
|
|
return 0, err
|
|
}
|
|
op.Actions = actionsJSON
|
|
}
|
|
|
|
op.Code = setConfig.Code
|
|
|
|
// rules
|
|
ruleRefs := []*firewallconfigs.HTTPFirewallRuleRef{}
|
|
for _, ruleConfig := range setConfig.Rules {
|
|
ruleId, err := SharedHTTPFirewallRuleDAO.CreateOrUpdateRuleFromConfig(tx, ruleConfig)
|
|
if err != nil {
|
|
return 0, err
|
|
}
|
|
ruleRefs = append(ruleRefs, &firewallconfigs.HTTPFirewallRuleRef{
|
|
IsOn: true,
|
|
RuleId: ruleId,
|
|
})
|
|
}
|
|
ruleRefsJSON, err := json.Marshal(ruleRefs)
|
|
if err != nil {
|
|
return 0, err
|
|
}
|
|
op.Rules = ruleRefsJSON
|
|
err = this.Save(tx, op)
|
|
if err != nil {
|
|
return 0, err
|
|
}
|
|
|
|
// 通知更新
|
|
if setConfig.Id > 0 {
|
|
err := this.NotifyUpdate(tx, setConfig.Id)
|
|
if err != nil {
|
|
return 0, err
|
|
}
|
|
}
|
|
|
|
return types.Int64(op.Id), nil
|
|
}
|
|
|
|
// UpdateRuleSetIsOn 设置是否启用
|
|
func (this *HTTPFirewallRuleSetDAO) UpdateRuleSetIsOn(tx *dbs.Tx, ruleSetId int64, isOn bool) error {
|
|
if ruleSetId <= 0 {
|
|
return errors.New("invalid ruleSetId")
|
|
}
|
|
_, err := this.Query(tx).
|
|
Pk(ruleSetId).
|
|
Set("isOn", isOn).
|
|
Update()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return this.NotifyUpdate(tx, ruleSetId)
|
|
}
|
|
|
|
// FindEnabledRuleSetIdWithRuleId 根据规则查找规则集
|
|
func (this *HTTPFirewallRuleSetDAO) FindEnabledRuleSetIdWithRuleId(tx *dbs.Tx, ruleId int64) (int64, error) {
|
|
return this.Query(tx).
|
|
State(HTTPFirewallRuleStateEnabled).
|
|
Where("JSON_CONTAINS(rules, :jsonQuery)").
|
|
Param("jsonQuery", maps.Map{"ruleId": ruleId}.AsJSON()).
|
|
ResultPk().
|
|
FindInt64Col(0)
|
|
}
|
|
|
|
// FindAllEnabledRuleSetIdsWithIPListId 根据IP名单ID查找对应动作的WAF规则集
|
|
func (this *HTTPFirewallRuleSetDAO) FindAllEnabledRuleSetIdsWithIPListId(tx *dbs.Tx, ipListId int64) (setIds []int64, err error) {
|
|
ones, err := this.Query(tx).
|
|
State(HTTPFirewallRuleStateEnabled).
|
|
Where("JSON_CONTAINS(actions, :jsonQuery)").
|
|
Param("jsonQuery", maps.Map{
|
|
"code": firewallconfigs.HTTPFirewallActionRecordIP,
|
|
"options": maps.Map{
|
|
"ipListId": ipListId,
|
|
},
|
|
}.AsJSON()).
|
|
ResultPk().
|
|
FindAll()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
for _, one := range ones {
|
|
setIds = append(setIds, int64(one.(*HTTPFirewallRuleSet).Id))
|
|
}
|
|
return
|
|
}
|
|
|
|
// CheckUserRuleSet 检查用户
|
|
func (this *HTTPFirewallRuleSetDAO) CheckUserRuleSet(tx *dbs.Tx, userId int64, setId int64) error {
|
|
groupId, err := SharedHTTPFirewallRuleGroupDAO.FindRuleGroupIdWithRuleSetId(tx, setId)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if groupId == 0 {
|
|
return ErrNotFound
|
|
}
|
|
return SharedHTTPFirewallRuleGroupDAO.CheckUserRuleGroup(tx, userId, groupId)
|
|
}
|
|
|
|
// NotifyUpdate 通知更新
|
|
func (this *HTTPFirewallRuleSetDAO) NotifyUpdate(tx *dbs.Tx, setId int64) error {
|
|
groupId, err := SharedHTTPFirewallRuleGroupDAO.FindRuleGroupIdWithRuleSetId(tx, setId)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if groupId > 0 {
|
|
return SharedHTTPFirewallRuleGroupDAO.NotifyUpdate(tx, groupId)
|
|
}
|
|
return nil
|
|
}
|