mirror of
https://github.com/TeaOSLab/EdgeAdmin.git
synced 2025-11-04 13:10:26 +08:00
121 lines
2.9 KiB
Go
121 lines
2.9 KiB
Go
package waf
|
|
|
|
import (
|
|
"encoding/json"
|
|
"github.com/TeaOSLab/EdgeAdmin/internal/ttlcache"
|
|
"github.com/TeaOSLab/EdgeAdmin/internal/web/actions/actionutils"
|
|
"github.com/TeaOSLab/EdgeAdmin/internal/web/models"
|
|
"github.com/TeaOSLab/EdgeCommon/pkg/serverconfigs/firewallconfigs"
|
|
"github.com/iwind/TeaGo/actions"
|
|
"github.com/iwind/TeaGo/rands"
|
|
"time"
|
|
)
|
|
|
|
type ExportAction struct {
|
|
actionutils.ParentAction
|
|
}
|
|
|
|
func (this *ExportAction) Init() {
|
|
this.Nav("", "", "export")
|
|
}
|
|
|
|
func (this *ExportAction) RunGet(params struct {
|
|
FirewallPolicyId int64
|
|
}) {
|
|
policy, err := models.SharedHTTPFirewallPolicyDAO.FindEnabledPolicyConfig(this.AdminContext(), params.FirewallPolicyId)
|
|
if err != nil {
|
|
this.ErrorPage(err)
|
|
return
|
|
}
|
|
if policy == nil {
|
|
this.NotFound("firewallPolicy", policy.Id)
|
|
return
|
|
}
|
|
|
|
inboundGroups := []*firewallconfigs.HTTPFirewallRuleGroup{}
|
|
outboundGroups := []*firewallconfigs.HTTPFirewallRuleGroup{}
|
|
if policy.Inbound != nil {
|
|
for _, g := range policy.Inbound.Groups {
|
|
if g.IsOn {
|
|
inboundGroups = append(inboundGroups, g)
|
|
}
|
|
}
|
|
}
|
|
if policy.Outbound != nil {
|
|
for _, g := range policy.Outbound.Groups {
|
|
if g.IsOn {
|
|
outboundGroups = append(outboundGroups, g)
|
|
}
|
|
}
|
|
}
|
|
this.Data["inboundGroups"] = inboundGroups
|
|
this.Data["outboundGroups"] = outboundGroups
|
|
|
|
this.Show()
|
|
}
|
|
|
|
func (this *ExportAction) RunPost(params struct {
|
|
FirewallPolicyId int64
|
|
InboundGroupIds []int64
|
|
OutboundGroupIds []int64
|
|
|
|
Must *actions.Must
|
|
CSRF *actionutils.CSRF
|
|
}) {
|
|
defer this.CreateLogInfo("导出WAF策略 %d", params.FirewallPolicyId)
|
|
|
|
policy, err := models.SharedHTTPFirewallPolicyDAO.FindEnabledPolicyConfig(this.AdminContext(), params.FirewallPolicyId)
|
|
if err != nil {
|
|
this.ErrorPage(err)
|
|
return
|
|
}
|
|
if policy == nil {
|
|
this.NotFound("firewallPolicy", policy.Id)
|
|
return
|
|
}
|
|
|
|
// inbound
|
|
newInboundGroups := []*firewallconfigs.HTTPFirewallRuleGroup{}
|
|
for _, inboundGroupId := range params.InboundGroupIds {
|
|
group := policy.FindRuleGroup(inboundGroupId)
|
|
if group != nil {
|
|
newInboundGroups = append(newInboundGroups, group)
|
|
}
|
|
}
|
|
if policy.Inbound == nil {
|
|
policy.Inbound = &firewallconfigs.HTTPFirewallInboundConfig{
|
|
IsOn: true,
|
|
}
|
|
}
|
|
policy.Inbound.Groups = newInboundGroups
|
|
policy.Inbound.GroupRefs = nil
|
|
|
|
// outbound
|
|
newOutboundGroups := []*firewallconfigs.HTTPFirewallRuleGroup{}
|
|
for _, outboundGroupId := range params.OutboundGroupIds {
|
|
group := policy.FindRuleGroup(outboundGroupId)
|
|
if group != nil {
|
|
newOutboundGroups = append(newOutboundGroups, group)
|
|
}
|
|
}
|
|
if policy.Outbound == nil {
|
|
policy.Outbound = &firewallconfigs.HTTPFirewallOutboundConfig{
|
|
IsOn: true,
|
|
}
|
|
}
|
|
policy.Outbound.Groups = newOutboundGroups
|
|
policy.Outbound.GroupRefs = nil
|
|
|
|
configJSON, err := json.Marshal(policy)
|
|
if err != nil {
|
|
this.ErrorPage(err)
|
|
return
|
|
}
|
|
|
|
key := "waf." + rands.HexString(32)
|
|
ttlcache.DefaultCache.Write(key, configJSON, time.Now().Unix()+600)
|
|
|
|
this.Data["key"] = key
|
|
this.Success()
|
|
}
|