2020-10-08 15:06:42 +08:00
|
|
|
package nodes
|
|
|
|
|
|
|
|
|
|
import (
|
2021-01-03 20:18:47 +08:00
|
|
|
"github.com/TeaOSLab/EdgeCommon/pkg/serverconfigs/firewallconfigs"
|
2020-11-09 10:45:44 +08:00
|
|
|
"github.com/TeaOSLab/EdgeNode/internal/iplibrary"
|
2020-12-17 17:36:10 +08:00
|
|
|
"github.com/TeaOSLab/EdgeNode/internal/remotelogs"
|
2020-10-08 15:06:42 +08:00
|
|
|
"github.com/TeaOSLab/EdgeNode/internal/waf"
|
2020-11-09 10:45:44 +08:00
|
|
|
"github.com/iwind/TeaGo/lists"
|
2020-11-02 15:49:30 +08:00
|
|
|
"github.com/iwind/TeaGo/types"
|
2020-10-08 15:06:42 +08:00
|
|
|
"net/http"
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
// 调用WAF
|
|
|
|
|
func (this *HTTPRequest) doWAFRequest() (blocked bool) {
|
2021-01-03 20:18:47 +08:00
|
|
|
// 当前服务的独立设置
|
|
|
|
|
if this.web.FirewallPolicy != nil && this.web.FirewallPolicy.IsOn {
|
2021-01-21 10:45:55 +08:00
|
|
|
blocked, breakChecking := this.checkWAFRequest(this.web.FirewallPolicy)
|
2021-01-03 20:18:47 +08:00
|
|
|
if blocked {
|
2021-01-21 10:45:55 +08:00
|
|
|
return true
|
|
|
|
|
}
|
|
|
|
|
if breakChecking {
|
|
|
|
|
return false
|
2021-01-03 20:18:47 +08:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// 公用的防火墙设置
|
|
|
|
|
if sharedNodeConfig.HTTPFirewallPolicy != nil {
|
2021-01-21 10:45:55 +08:00
|
|
|
blocked, breakChecking := this.checkWAFRequest(sharedNodeConfig.HTTPFirewallPolicy)
|
2021-01-03 20:18:47 +08:00
|
|
|
if blocked {
|
2021-01-21 10:45:55 +08:00
|
|
|
return true
|
|
|
|
|
}
|
|
|
|
|
if breakChecking {
|
|
|
|
|
return false
|
2021-01-03 20:18:47 +08:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return
|
|
|
|
|
}
|
2020-12-17 17:36:10 +08:00
|
|
|
|
2021-01-21 10:45:55 +08:00
|
|
|
func (this *HTTPRequest) checkWAFRequest(firewallPolicy *firewallconfigs.HTTPFirewallPolicy) (blocked bool, breakChecking bool) {
|
2020-11-09 10:45:44 +08:00
|
|
|
// 检查配置是否为空
|
2020-12-17 17:36:10 +08:00
|
|
|
if firewallPolicy == nil || !firewallPolicy.IsOn || firewallPolicy.Inbound == nil || !firewallPolicy.Inbound.IsOn {
|
2020-11-09 10:45:44 +08:00
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// 检查IP白名单
|
|
|
|
|
remoteAddr := this.requestRemoteAddr()
|
2020-12-17 17:36:10 +08:00
|
|
|
inbound := firewallPolicy.Inbound
|
2021-01-03 20:18:47 +08:00
|
|
|
if inbound.AllowListRef != nil && inbound.AllowListRef.IsOn && inbound.AllowListRef.ListId > 0 {
|
|
|
|
|
list := iplibrary.SharedIPListManager.FindList(inbound.AllowListRef.ListId)
|
2020-11-09 10:45:44 +08:00
|
|
|
if list != nil && list.Contains(iplibrary.IP2Long(remoteAddr)) {
|
2021-01-21 10:45:55 +08:00
|
|
|
breakChecking = true
|
2020-11-09 10:45:44 +08:00
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// 检查IP黑名单
|
2021-01-03 20:18:47 +08:00
|
|
|
if inbound.DenyListRef != nil && inbound.DenyListRef.IsOn && inbound.DenyListRef.ListId > 0 {
|
|
|
|
|
list := iplibrary.SharedIPListManager.FindList(inbound.DenyListRef.ListId)
|
2020-11-09 10:45:44 +08:00
|
|
|
if list != nil && list.Contains(iplibrary.IP2Long(remoteAddr)) {
|
|
|
|
|
// TODO 可以配置对封禁的处理方式等
|
2021-01-21 10:45:55 +08:00
|
|
|
// TODO 需要记录日志信息
|
2020-11-09 10:45:44 +08:00
|
|
|
this.writer.WriteHeader(http.StatusForbidden)
|
|
|
|
|
this.writer.Close()
|
|
|
|
|
|
2020-11-09 11:02:29 +08:00
|
|
|
// 停止日志
|
|
|
|
|
this.disableLog = true
|
|
|
|
|
|
2021-01-21 10:45:55 +08:00
|
|
|
return true, false
|
2020-11-09 10:45:44 +08:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// 检查地区封禁
|
|
|
|
|
if iplibrary.SharedLibrary != nil {
|
2020-12-17 17:36:10 +08:00
|
|
|
if firewallPolicy.Inbound.Region != nil && firewallPolicy.Inbound.Region.IsOn {
|
|
|
|
|
regionConfig := firewallPolicy.Inbound.Region
|
2020-11-09 10:45:44 +08:00
|
|
|
if regionConfig.IsNotEmpty() {
|
|
|
|
|
result, err := iplibrary.SharedLibrary.Lookup(remoteAddr)
|
|
|
|
|
if err != nil {
|
2020-12-17 17:36:10 +08:00
|
|
|
remotelogs.Error("REQUEST", "iplibrary lookup failed: "+err.Error())
|
2020-11-09 10:45:44 +08:00
|
|
|
} else if result != nil {
|
|
|
|
|
// 检查国家级别封禁
|
|
|
|
|
if len(regionConfig.DenyCountryIds) > 0 && len(result.Country) > 0 {
|
|
|
|
|
countryId := iplibrary.SharedCountryManager.Lookup(result.Country)
|
|
|
|
|
if countryId > 0 && lists.ContainsInt64(regionConfig.DenyCountryIds, countryId) {
|
|
|
|
|
// TODO 可以配置对封禁的处理方式等
|
2021-01-21 11:00:46 +08:00
|
|
|
// TODO 需要记录日志信息
|
2020-11-09 10:45:44 +08:00
|
|
|
this.writer.WriteHeader(http.StatusForbidden)
|
|
|
|
|
this.writer.Close()
|
2020-11-09 11:02:29 +08:00
|
|
|
|
|
|
|
|
// 停止日志
|
|
|
|
|
this.disableLog = true
|
|
|
|
|
|
2021-01-21 10:45:55 +08:00
|
|
|
return true, false
|
2020-11-09 10:45:44 +08:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// 检查省份封禁
|
|
|
|
|
if len(regionConfig.DenyProvinceIds) > 0 && len(result.Province) > 0 {
|
|
|
|
|
provinceId := iplibrary.SharedProvinceManager.Lookup(result.Province)
|
|
|
|
|
if provinceId > 0 && lists.ContainsInt64(regionConfig.DenyProvinceIds, provinceId) {
|
|
|
|
|
// TODO 可以配置对封禁的处理方式等
|
2021-01-21 11:00:46 +08:00
|
|
|
// TODO 需要记录日志信息
|
2020-11-09 10:45:44 +08:00
|
|
|
this.writer.WriteHeader(http.StatusForbidden)
|
|
|
|
|
this.writer.Close()
|
2020-11-09 11:02:29 +08:00
|
|
|
|
|
|
|
|
// 停止日志
|
|
|
|
|
this.disableLog = true
|
|
|
|
|
|
2021-01-21 10:45:55 +08:00
|
|
|
return true, false
|
2020-11-09 10:45:44 +08:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2020-11-09 11:02:29 +08:00
|
|
|
// 规则测试
|
2020-12-17 17:36:10 +08:00
|
|
|
w := sharedWAFManager.FindWAF(firewallPolicy.Id)
|
2020-10-08 15:06:42 +08:00
|
|
|
if w == nil {
|
|
|
|
|
return
|
|
|
|
|
}
|
2020-11-02 15:49:30 +08:00
|
|
|
goNext, ruleGroup, ruleSet, err := w.MatchRequest(this.RawReq, this.writer)
|
2020-10-08 15:06:42 +08:00
|
|
|
if err != nil {
|
2020-12-17 17:36:10 +08:00
|
|
|
remotelogs.Error("REQUEST", this.rawURI+": "+err.Error())
|
2020-10-08 15:06:42 +08:00
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if ruleSet != nil {
|
|
|
|
|
if ruleSet.Action != waf.ActionAllow {
|
2020-12-17 17:36:10 +08:00
|
|
|
this.firewallPolicyId = firewallPolicy.Id
|
2020-11-02 15:49:30 +08:00
|
|
|
this.firewallRuleGroupId = types.Int64(ruleGroup.Id)
|
|
|
|
|
this.firewallRuleSetId = types.Int64(ruleSet.Id)
|
2020-10-08 15:06:42 +08:00
|
|
|
}
|
2020-11-02 15:49:30 +08:00
|
|
|
|
|
|
|
|
this.logAttrs["waf.action"] = ruleSet.Action
|
2020-10-08 15:06:42 +08:00
|
|
|
}
|
|
|
|
|
|
2021-01-21 10:45:55 +08:00
|
|
|
return !goNext, false
|
2020-10-08 15:06:42 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// call response waf
|
|
|
|
|
func (this *HTTPRequest) doWAFResponse(resp *http.Response) (blocked bool) {
|
2020-12-17 17:36:10 +08:00
|
|
|
firewallPolicy := sharedNodeConfig.HTTPFirewallPolicy
|
|
|
|
|
if firewallPolicy == nil || !firewallPolicy.IsOn || !firewallPolicy.Outbound.IsOn {
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
w := sharedWAFManager.FindWAF(firewallPolicy.Id)
|
2020-10-08 15:06:42 +08:00
|
|
|
if w == nil {
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
2020-11-02 15:49:30 +08:00
|
|
|
goNext, ruleGroup, ruleSet, err := w.MatchResponse(this.RawReq, resp, this.writer)
|
2020-10-08 15:06:42 +08:00
|
|
|
if err != nil {
|
2020-12-17 17:36:10 +08:00
|
|
|
remotelogs.Error("REQUEST", this.rawURI+": "+err.Error())
|
2020-10-08 15:06:42 +08:00
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if ruleSet != nil {
|
|
|
|
|
if ruleSet.Action != waf.ActionAllow {
|
2020-12-17 17:36:10 +08:00
|
|
|
this.firewallPolicyId = firewallPolicy.Id
|
2020-11-02 15:49:30 +08:00
|
|
|
this.firewallRuleGroupId = types.Int64(ruleGroup.Id)
|
|
|
|
|
this.firewallRuleSetId = types.Int64(ruleSet.Id)
|
2020-10-08 15:06:42 +08:00
|
|
|
}
|
2020-11-02 15:49:30 +08:00
|
|
|
|
|
|
|
|
this.logAttrs["waf.action"] = ruleSet.Action
|
2020-10-08 15:06:42 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return !goNext
|
|
|
|
|
}
|