From 1a36f37fe40dd5485a1cd6d93bd043d64c247f7c Mon Sep 17 00:00:00 2001 From: GoEdgeLab Date: Tue, 2 Feb 2021 15:31:01 +0800 Subject: [PATCH] =?UTF-8?q?=E5=8F=96=E6=B6=88WAF=E8=A7=84=E5=88=99?= =?UTF-8?q?=E9=87=8C=E7=9A=84=E9=BB=91=E7=99=BD=E5=90=8D=E5=8D=95?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- .../firewallconfigs/http_firewall_template.go | 58 ------------------- 1 file changed, 58 deletions(-) diff --git a/pkg/serverconfigs/firewallconfigs/http_firewall_template.go b/pkg/serverconfigs/firewallconfigs/http_firewall_template.go index 2d9ef53..2f8d440 100644 --- a/pkg/serverconfigs/firewallconfigs/http_firewall_template.go +++ b/pkg/serverconfigs/firewallconfigs/http_firewall_template.go @@ -13,64 +13,6 @@ func HTTPFirewallTemplate() *HTTPFirewallPolicy { policy.Inbound = &HTTPFirewallInboundConfig{} policy.Outbound = &HTTPFirewallOutboundConfig{} - // black list - { - group := &HTTPFirewallRuleGroup{} - group.IsOn = false - group.Name = "白名单" - group.Code = "whiteList" - group.Description = "在此名单中的IP地址可以直接跳过防火墙设置" - - { - - set := &HTTPFirewallRuleSet{} - set.IsOn = true - set.Name = "IP白名单" - set.Code = "9001" - set.Connector = HTTPFirewallRuleConnectorOr - set.Action = HTTPFirewallActionAllow - set.AddRule(&HTTPFirewallRule{ - IsOn: true, - Param: "${remoteAddr}", - Operator: HTTPFirewallRuleOperatorMatch, - Value: `127\.0\.0\.1|0\.0\.0\.0`, - IsCaseInsensitive: false, - }) - group.AddRuleSet(set) - } - - policy.Inbound.Groups = append(policy.Inbound.Groups, group) - } - - // black list - { - group := &HTTPFirewallRuleGroup{} - group.IsOn = false - group.Name = "黑名单" - group.Code = "blackList" - group.Description = "在此名单中的IP地址直接阻止" - - { - - set := &HTTPFirewallRuleSet{} - set.IsOn = true - set.Name = "IP黑名单" - set.Code = "10001" - set.Connector = HTTPFirewallRuleConnectorOr - set.Action = HTTPFirewallActionBlock - set.AddRule(&HTTPFirewallRule{ - IsOn: true, - Param: "${remoteAddr}", - Operator: HTTPFirewallRuleOperatorMatch, - Value: `1\.1\.1\.1|2\.2\.2\.2`, - IsCaseInsensitive: false, - }) - group.AddRuleSet(set) - } - - policy.Inbound.Groups = append(policy.Inbound.Groups, group) - } - // xss { group := &HTTPFirewallRuleGroup{}