Files
EdgeNode/internal/waf/action_record_ip.go

192 lines
5.2 KiB
Go
Raw Normal View History

2021-07-18 15:51:49 +08:00
package waf
import (
"github.com/TeaOSLab/EdgeCommon/pkg/rpc/pb"
"github.com/TeaOSLab/EdgeCommon/pkg/serverconfigs/firewallconfigs"
teaconst "github.com/TeaOSLab/EdgeNode/internal/const"
2021-07-18 15:51:49 +08:00
"github.com/TeaOSLab/EdgeNode/internal/events"
"github.com/TeaOSLab/EdgeNode/internal/goman"
2021-07-18 15:51:49 +08:00
"github.com/TeaOSLab/EdgeNode/internal/remotelogs"
"github.com/TeaOSLab/EdgeNode/internal/rpc"
"github.com/TeaOSLab/EdgeNode/internal/waf/requests"
"github.com/iwind/TeaGo/types"
2021-07-18 15:51:49 +08:00
"net/http"
"strings"
"time"
)
type recordIPTask struct {
ip string
listId int64
expiresAt int64
2021-07-18 15:51:49 +08:00
level string
serverId int64
2022-01-10 19:54:10 +08:00
reason string
sourceServerId int64
sourceHTTPFirewallPolicyId int64
sourceHTTPFirewallRuleGroupId int64
sourceHTTPFirewallRuleSetId int64
2021-07-18 15:51:49 +08:00
}
2023-03-31 21:37:15 +08:00
var recordIPTaskChan = make(chan *recordIPTask, 2048)
2021-07-18 15:51:49 +08:00
func init() {
if !teaconst.IsMain {
return
}
2021-07-18 15:51:49 +08:00
events.On(events.EventLoaded, func() {
goman.New(func() {
2021-07-18 15:51:49 +08:00
rpcClient, err := rpc.SharedRPC()
if err != nil {
remotelogs.Error("WAF_RECORD_IP_ACTION", "create rpc client failed: "+err.Error())
return
}
2023-03-31 21:37:15 +08:00
const maxItems = 512 // 每次上传的最大IP数
for {
2023-04-01 20:51:49 +08:00
var pbItemMap = map[string]*pb.CreateIPItemsRequest_IPItem{} // ip => IPItem
2023-03-31 21:37:15 +08:00
func() {
for {
select {
case task := <-recordIPTaskChan:
var ipType = "ipv4"
if strings.Contains(task.ip, ":") {
ipType = "ipv6"
}
var reason = task.reason
if len(reason) == 0 {
reason = "触发WAF规则自动加入"
}
2023-04-01 20:51:49 +08:00
pbItemMap[task.ip] = &pb.CreateIPItemsRequest_IPItem{
2023-03-31 21:37:15 +08:00
IpListId: task.listId,
IpFrom: task.ip,
IpTo: "",
ExpiredAt: task.expiresAt,
Reason: reason,
Type: ipType,
EventLevel: task.level,
ServerId: task.serverId,
SourceNodeId: teaconst.NodeId,
SourceServerId: task.sourceServerId,
SourceHTTPFirewallPolicyId: task.sourceHTTPFirewallPolicyId,
SourceHTTPFirewallRuleGroupId: task.sourceHTTPFirewallRuleGroupId,
SourceHTTPFirewallRuleSetId: task.sourceHTTPFirewallRuleSetId,
2023-04-01 20:51:49 +08:00
}
2023-03-31 21:37:15 +08:00
2023-04-01 20:51:49 +08:00
if len(pbItemMap) >= maxItems {
2023-03-31 21:37:15 +08:00
return
}
default:
return
}
}
}()
2023-04-01 20:51:49 +08:00
if len(pbItemMap) > 0 {
var pbItems = []*pb.CreateIPItemsRequest_IPItem{}
for _, pbItem := range pbItemMap {
pbItems = append(pbItems, pbItem)
}
2023-03-31 21:37:15 +08:00
_, err = rpcClient.IPItemRPC.CreateIPItems(rpcClient.Context(), &pb.CreateIPItemsRequest{IpItems: pbItems})
if err != nil {
remotelogs.Error("WAF_RECORD_IP_ACTION", "create ip item failed: "+err.Error())
}
} else {
time.Sleep(1 * time.Second)
2021-07-18 15:51:49 +08:00
}
}
})
2021-07-18 15:51:49 +08:00
})
}
type RecordIPAction struct {
BaseAction
Type string `yaml:"type" json:"type"`
IPListId int64 `yaml:"ipListId" json:"ipListId"`
Level string `yaml:"level" json:"level"`
Timeout int32 `yaml:"timeout" json:"timeout"`
2021-10-18 20:08:43 +08:00
Scope string `yaml:"scope" json:"scope"`
2021-07-18 15:51:49 +08:00
}
func (this *RecordIPAction) Init(waf *WAF) error {
return nil
}
func (this *RecordIPAction) Code() string {
return ActionRecordIP
}
func (this *RecordIPAction) IsAttack() bool {
return this.Type == "black"
}
func (this *RecordIPAction) WillChange() bool {
return this.Type == "black"
}
func (this *RecordIPAction) Perform(waf *WAF, group *RuleGroup, set *RuleSet, request requests.Request, writer http.ResponseWriter) (continueRequest bool, goNextSet bool) {
2021-07-18 15:51:49 +08:00
// 是否在本地白名单中
if SharedIPWhiteList.Contains("set:"+types.String(set.Id), this.Scope, request.WAFServerId(), request.WAFRemoteIP()) {
return true, false
2021-07-18 15:51:49 +08:00
}
var timeout = this.Timeout
var isForever = false
2021-07-18 15:51:49 +08:00
if timeout <= 0 {
isForever = true
2021-07-18 15:51:49 +08:00
timeout = 86400 // 1天
}
var expiresAt = time.Now().Unix() + int64(timeout)
2021-07-18 15:51:49 +08:00
if this.Type == "black" {
request.ProcessResponseHeaders(writer.Header(), http.StatusForbidden)
writer.WriteHeader(http.StatusForbidden)
request.WAFClose()
2021-07-18 15:51:49 +08:00
2021-10-18 20:08:43 +08:00
// 先加入本地的黑名单
SharedIPBlackList.Add(IPTypeAll, this.Scope, request.WAFServerId(), request.WAFRemoteIP(), expiresAt)
2021-07-18 15:51:49 +08:00
} else {
// 加入本地白名单
SharedIPWhiteList.Add("set:"+types.String(set.Id), this.Scope, request.WAFServerId(), request.WAFRemoteIP(), expiresAt)
2021-07-18 15:51:49 +08:00
}
// 上报
if this.IPListId > 0 {
var serverId int64
if this.Scope == firewallconfigs.FirewallScopeService {
serverId = request.WAFServerId()
}
var realExpiresAt = expiresAt
if isForever {
realExpiresAt = 0
}
2021-07-18 15:51:49 +08:00
select {
case recordIPTaskChan <- &recordIPTask{
ip: request.WAFRemoteIP(),
listId: this.IPListId,
expiresAt: realExpiresAt,
level: this.Level,
serverId: serverId,
sourceServerId: request.WAFServerId(),
sourceHTTPFirewallPolicyId: waf.Id,
sourceHTTPFirewallRuleGroupId: group.Id,
sourceHTTPFirewallRuleSetId: set.Id,
2021-07-18 15:51:49 +08:00
}:
default:
}
}
return this.Type != "black", false
2021-07-18 15:51:49 +08:00
}