mirror of
				https://github.com/TeaOSLab/EdgeAPI.git
				synced 2025-11-04 16:00:24 +08:00 
			
		
		
		
	
		
			
				
	
	
		
			238 lines
		
	
	
		
			6.2 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			238 lines
		
	
	
		
			6.2 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
package models
 | 
						|
 | 
						|
import (
 | 
						|
	"encoding/json"
 | 
						|
	"github.com/TeaOSLab/EdgeAPI/internal/errors"
 | 
						|
	"github.com/TeaOSLab/EdgeCommon/pkg/serverconfigs/firewallconfigs"
 | 
						|
	_ "github.com/go-sql-driver/mysql"
 | 
						|
	"github.com/iwind/TeaGo/Tea"
 | 
						|
	"github.com/iwind/TeaGo/dbs"
 | 
						|
	"github.com/iwind/TeaGo/maps"
 | 
						|
	"github.com/iwind/TeaGo/types"
 | 
						|
)
 | 
						|
 | 
						|
const (
 | 
						|
	HTTPFirewallRuleSetStateEnabled  = 1 // 已启用
 | 
						|
	HTTPFirewallRuleSetStateDisabled = 0 // 已禁用
 | 
						|
)
 | 
						|
 | 
						|
type HTTPFirewallRuleSetDAO dbs.DAO
 | 
						|
 | 
						|
func NewHTTPFirewallRuleSetDAO() *HTTPFirewallRuleSetDAO {
 | 
						|
	return dbs.NewDAO(&HTTPFirewallRuleSetDAO{
 | 
						|
		DAOObject: dbs.DAOObject{
 | 
						|
			DB:     Tea.Env,
 | 
						|
			Table:  "edgeHTTPFirewallRuleSets",
 | 
						|
			Model:  new(HTTPFirewallRuleSet),
 | 
						|
			PkName: "id",
 | 
						|
		},
 | 
						|
	}).(*HTTPFirewallRuleSetDAO)
 | 
						|
}
 | 
						|
 | 
						|
var SharedHTTPFirewallRuleSetDAO *HTTPFirewallRuleSetDAO
 | 
						|
 | 
						|
func init() {
 | 
						|
	dbs.OnReady(func() {
 | 
						|
		SharedHTTPFirewallRuleSetDAO = NewHTTPFirewallRuleSetDAO()
 | 
						|
	})
 | 
						|
}
 | 
						|
 | 
						|
// Init 初始化
 | 
						|
func (this *HTTPFirewallRuleSetDAO) Init() {
 | 
						|
	_ = this.DAOObject.Init()
 | 
						|
}
 | 
						|
 | 
						|
// EnableHTTPFirewallRuleSet 启用条目
 | 
						|
func (this *HTTPFirewallRuleSetDAO) EnableHTTPFirewallRuleSet(tx *dbs.Tx, id int64) error {
 | 
						|
	_, err := this.Query(tx).
 | 
						|
		Pk(id).
 | 
						|
		Set("state", HTTPFirewallRuleSetStateEnabled).
 | 
						|
		Update()
 | 
						|
	return err
 | 
						|
}
 | 
						|
 | 
						|
// DisableHTTPFirewallRuleSet 禁用条目
 | 
						|
func (this *HTTPFirewallRuleSetDAO) DisableHTTPFirewallRuleSet(tx *dbs.Tx, ruleSetId int64) error {
 | 
						|
	_, err := this.Query(tx).
 | 
						|
		Pk(ruleSetId).
 | 
						|
		Set("state", HTTPFirewallRuleSetStateDisabled).
 | 
						|
		Update()
 | 
						|
	if err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
	return this.NotifyUpdate(tx, ruleSetId)
 | 
						|
}
 | 
						|
 | 
						|
// FindEnabledHTTPFirewallRuleSet 查找启用中的条目
 | 
						|
func (this *HTTPFirewallRuleSetDAO) FindEnabledHTTPFirewallRuleSet(tx *dbs.Tx, id int64) (*HTTPFirewallRuleSet, error) {
 | 
						|
	result, err := this.Query(tx).
 | 
						|
		Pk(id).
 | 
						|
		Attr("state", HTTPFirewallRuleSetStateEnabled).
 | 
						|
		Find()
 | 
						|
	if result == nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
	return result.(*HTTPFirewallRuleSet), err
 | 
						|
}
 | 
						|
 | 
						|
// FindHTTPFirewallRuleSetName 根据主键查找名称
 | 
						|
func (this *HTTPFirewallRuleSetDAO) FindHTTPFirewallRuleSetName(tx *dbs.Tx, id int64) (string, error) {
 | 
						|
	return this.Query(tx).
 | 
						|
		Pk(id).
 | 
						|
		Result("name").
 | 
						|
		FindStringCol("")
 | 
						|
}
 | 
						|
 | 
						|
// ComposeFirewallRuleSet 组合配置
 | 
						|
func (this *HTTPFirewallRuleSetDAO) ComposeFirewallRuleSet(tx *dbs.Tx, setId int64) (*firewallconfigs.HTTPFirewallRuleSet, error) {
 | 
						|
	set, err := this.FindEnabledHTTPFirewallRuleSet(tx, setId)
 | 
						|
	if err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
	if set == nil {
 | 
						|
		return nil, nil
 | 
						|
	}
 | 
						|
	config := &firewallconfigs.HTTPFirewallRuleSet{}
 | 
						|
	config.Id = int64(set.Id)
 | 
						|
	config.IsOn = set.IsOn
 | 
						|
	config.Name = set.Name
 | 
						|
	config.Description = set.Description
 | 
						|
	config.Code = set.Code
 | 
						|
	config.Connector = set.Connector
 | 
						|
	config.IgnoreLocal = set.IgnoreLocal == 1
 | 
						|
 | 
						|
	if IsNotNull(set.Rules) {
 | 
						|
		ruleRefs := []*firewallconfigs.HTTPFirewallRuleRef{}
 | 
						|
		err = json.Unmarshal(set.Rules, &ruleRefs)
 | 
						|
		if err != nil {
 | 
						|
			return nil, err
 | 
						|
		}
 | 
						|
		for _, ruleRef := range ruleRefs {
 | 
						|
			ruleConfig, err := SharedHTTPFirewallRuleDAO.ComposeFirewallRule(tx, ruleRef.RuleId)
 | 
						|
			if err != nil {
 | 
						|
				return nil, err
 | 
						|
			}
 | 
						|
			if ruleConfig != nil {
 | 
						|
				config.RuleRefs = append(config.RuleRefs, ruleRef)
 | 
						|
				config.Rules = append(config.Rules, ruleConfig)
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	var actionConfigs = []*firewallconfigs.HTTPFirewallActionConfig{}
 | 
						|
	if len(set.Actions) > 0 {
 | 
						|
		err = json.Unmarshal(set.Actions, &actionConfigs)
 | 
						|
		if err != nil {
 | 
						|
			return nil, err
 | 
						|
		}
 | 
						|
		config.Actions = actionConfigs
 | 
						|
	}
 | 
						|
 | 
						|
	return config, nil
 | 
						|
}
 | 
						|
 | 
						|
// CreateOrUpdateSetFromConfig 从配置中创建规则集
 | 
						|
func (this *HTTPFirewallRuleSetDAO) CreateOrUpdateSetFromConfig(tx *dbs.Tx, setConfig *firewallconfigs.HTTPFirewallRuleSet) (int64, error) {
 | 
						|
	var op = NewHTTPFirewallRuleSetOperator()
 | 
						|
	op.State = HTTPFirewallRuleSetStateEnabled
 | 
						|
	op.Id = setConfig.Id
 | 
						|
	op.IsOn = setConfig.IsOn
 | 
						|
	op.Name = setConfig.Name
 | 
						|
	op.Description = setConfig.Description
 | 
						|
	op.Connector = setConfig.Connector
 | 
						|
	op.IgnoreLocal = setConfig.IgnoreLocal
 | 
						|
 | 
						|
	if len(setConfig.Actions) == 0 {
 | 
						|
		op.Actions = "[]"
 | 
						|
	} else {
 | 
						|
		actionsJSON, err := json.Marshal(setConfig.Actions)
 | 
						|
		if err != nil {
 | 
						|
			return 0, err
 | 
						|
		}
 | 
						|
		op.Actions = actionsJSON
 | 
						|
	}
 | 
						|
 | 
						|
	op.Code = setConfig.Code
 | 
						|
 | 
						|
	// rules
 | 
						|
	ruleRefs := []*firewallconfigs.HTTPFirewallRuleRef{}
 | 
						|
	for _, ruleConfig := range setConfig.Rules {
 | 
						|
		ruleId, err := SharedHTTPFirewallRuleDAO.CreateOrUpdateRuleFromConfig(tx, ruleConfig)
 | 
						|
		if err != nil {
 | 
						|
			return 0, err
 | 
						|
		}
 | 
						|
		ruleRefs = append(ruleRefs, &firewallconfigs.HTTPFirewallRuleRef{
 | 
						|
			IsOn:   true,
 | 
						|
			RuleId: ruleId,
 | 
						|
		})
 | 
						|
	}
 | 
						|
	ruleRefsJSON, err := json.Marshal(ruleRefs)
 | 
						|
	if err != nil {
 | 
						|
		return 0, err
 | 
						|
	}
 | 
						|
	op.Rules = ruleRefsJSON
 | 
						|
	err = this.Save(tx, op)
 | 
						|
	if err != nil {
 | 
						|
		return 0, err
 | 
						|
	}
 | 
						|
 | 
						|
	// 通知更新
 | 
						|
	if setConfig.Id > 0 {
 | 
						|
		err := this.NotifyUpdate(tx, setConfig.Id)
 | 
						|
		if err != nil {
 | 
						|
			return 0, err
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	return types.Int64(op.Id), nil
 | 
						|
}
 | 
						|
 | 
						|
// UpdateRuleSetIsOn 设置是否启用
 | 
						|
func (this *HTTPFirewallRuleSetDAO) UpdateRuleSetIsOn(tx *dbs.Tx, ruleSetId int64, isOn bool) error {
 | 
						|
	if ruleSetId <= 0 {
 | 
						|
		return errors.New("invalid ruleSetId")
 | 
						|
	}
 | 
						|
	_, err := this.Query(tx).
 | 
						|
		Pk(ruleSetId).
 | 
						|
		Set("isOn", isOn).
 | 
						|
		Update()
 | 
						|
	if err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
	return this.NotifyUpdate(tx, ruleSetId)
 | 
						|
}
 | 
						|
 | 
						|
// FindEnabledRuleSetIdWithRuleId 根据规则查找规则集
 | 
						|
func (this *HTTPFirewallRuleSetDAO) FindEnabledRuleSetIdWithRuleId(tx *dbs.Tx, ruleId int64) (int64, error) {
 | 
						|
	return this.Query(tx).
 | 
						|
		State(HTTPFirewallRuleStateEnabled).
 | 
						|
		Where("JSON_CONTAINS(rules, :jsonQuery)").
 | 
						|
		Param("jsonQuery", maps.Map{"ruleId": ruleId}.AsJSON()).
 | 
						|
		ResultPk().
 | 
						|
		FindInt64Col(0)
 | 
						|
}
 | 
						|
 | 
						|
// CheckUserRuleSet 检查用户
 | 
						|
func (this *HTTPFirewallRuleSetDAO) CheckUserRuleSet(tx *dbs.Tx, userId int64, setId int64) error {
 | 
						|
	groupId, err := SharedHTTPFirewallRuleGroupDAO.FindRuleGroupIdWithRuleSetId(tx, setId)
 | 
						|
	if err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
	if groupId == 0 {
 | 
						|
		return ErrNotFound
 | 
						|
	}
 | 
						|
	return SharedHTTPFirewallRuleGroupDAO.CheckUserRuleGroup(tx, userId, groupId)
 | 
						|
}
 | 
						|
 | 
						|
// NotifyUpdate 通知更新
 | 
						|
func (this *HTTPFirewallRuleSetDAO) NotifyUpdate(tx *dbs.Tx, setId int64) error {
 | 
						|
	groupId, err := SharedHTTPFirewallRuleGroupDAO.FindRuleGroupIdWithRuleSetId(tx, setId)
 | 
						|
	if err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
	if groupId > 0 {
 | 
						|
		return SharedHTTPFirewallRuleGroupDAO.NotifyUpdate(tx, groupId)
 | 
						|
	}
 | 
						|
	return nil
 | 
						|
}
 |