mirror of
https://github.com/TeaOSLab/EdgeNode.git
synced 2026-01-01 19:16:35 +08:00
实现WAF
This commit is contained in:
175
internal/nodes/waf_manager.go
Normal file
175
internal/nodes/waf_manager.go
Normal file
@@ -0,0 +1,175 @@
|
||||
package nodes
|
||||
|
||||
import (
|
||||
"github.com/TeaOSLab/EdgeCommon/pkg/serverconfigs/firewallconfigs"
|
||||
"github.com/TeaOSLab/EdgeNode/internal/errors"
|
||||
"github.com/TeaOSLab/EdgeNode/internal/waf"
|
||||
"github.com/iwind/TeaGo/logs"
|
||||
"strconv"
|
||||
"sync"
|
||||
)
|
||||
|
||||
var sharedWAFManager = NewWAFManager()
|
||||
|
||||
// WAF管理器
|
||||
type WAFManager struct {
|
||||
mapping map[int64]*waf.WAF // policyId => WAF
|
||||
locker sync.RWMutex
|
||||
}
|
||||
|
||||
// 获取新对象
|
||||
func NewWAFManager() *WAFManager {
|
||||
return &WAFManager{
|
||||
mapping: map[int64]*waf.WAF{},
|
||||
}
|
||||
}
|
||||
|
||||
// 更新策略
|
||||
func (this *WAFManager) UpdatePolicies(policies []*firewallconfigs.HTTPFirewallPolicy) {
|
||||
this.locker.Lock()
|
||||
defer this.locker.Unlock()
|
||||
|
||||
m := map[int64]*waf.WAF{}
|
||||
for _, p := range policies {
|
||||
w, err := this.convertWAF(p)
|
||||
if err != nil {
|
||||
logs.Println("[WAF]initialize policy '" + strconv.FormatInt(p.Id, 10) + "' failed: " + err.Error())
|
||||
continue
|
||||
}
|
||||
if w == nil {
|
||||
continue
|
||||
}
|
||||
m[p.Id] = w
|
||||
}
|
||||
this.mapping = m
|
||||
}
|
||||
|
||||
// 查找WAF
|
||||
func (this *WAFManager) FindWAF(policyId int64) *waf.WAF {
|
||||
this.locker.RLock()
|
||||
w, _ := this.mapping[policyId]
|
||||
this.locker.RUnlock()
|
||||
return w
|
||||
}
|
||||
|
||||
// 判断是否包含int64
|
||||
func (this *WAFManager) containsInt64(values []int64, value int64) bool {
|
||||
for _, v := range values {
|
||||
if v == value {
|
||||
return true
|
||||
}
|
||||
}
|
||||
return false
|
||||
}
|
||||
|
||||
// 将Policy转换为WAF
|
||||
func (this *WAFManager) convertWAF(policy *firewallconfigs.HTTPFirewallPolicy) (*waf.WAF, error) {
|
||||
if policy == nil {
|
||||
return nil, errors.New("policy should not be nil")
|
||||
}
|
||||
w := &waf.WAF{
|
||||
Id: strconv.FormatInt(policy.Id, 10),
|
||||
IsOn: policy.IsOn,
|
||||
Name: policy.Name,
|
||||
}
|
||||
|
||||
// inbound
|
||||
if policy.Inbound != nil && policy.Inbound.IsOn {
|
||||
for _, group := range policy.Inbound.Groups {
|
||||
g := &waf.RuleGroup{
|
||||
Id: strconv.FormatInt(group.Id, 10),
|
||||
IsOn: group.IsOn,
|
||||
Name: group.Name,
|
||||
Description: group.Description,
|
||||
Code: group.Code,
|
||||
IsInbound: true,
|
||||
}
|
||||
|
||||
// rule sets
|
||||
for _, set := range group.Sets {
|
||||
s := &waf.RuleSet{
|
||||
Id: strconv.FormatInt(set.Id, 10),
|
||||
Code: set.Code,
|
||||
IsOn: set.IsOn,
|
||||
Name: set.Name,
|
||||
Description: set.Description,
|
||||
Connector: set.Connector,
|
||||
Action: set.Action,
|
||||
ActionOptions: set.ActionOptions,
|
||||
}
|
||||
|
||||
// rules
|
||||
for _, rule := range set.Rules {
|
||||
r := &waf.Rule{
|
||||
Description: rule.Description,
|
||||
Param: rule.Param,
|
||||
Operator: rule.Operator,
|
||||
Value: rule.Value,
|
||||
IsCaseInsensitive: rule.IsCaseInsensitive,
|
||||
CheckpointOptions: rule.CheckpointOptions,
|
||||
}
|
||||
s.Rules = append(s.Rules, r)
|
||||
}
|
||||
|
||||
g.RuleSets = append(g.RuleSets, s)
|
||||
}
|
||||
|
||||
w.Inbound = append(w.Inbound, g)
|
||||
}
|
||||
}
|
||||
|
||||
// outbound
|
||||
if policy.Outbound != nil && policy.Outbound.IsOn {
|
||||
for _, group := range policy.Outbound.Groups {
|
||||
g := &waf.RuleGroup{
|
||||
Id: strconv.FormatInt(group.Id, 10),
|
||||
IsOn: group.IsOn,
|
||||
Name: group.Name,
|
||||
Description: group.Description,
|
||||
Code: group.Code,
|
||||
IsInbound: true,
|
||||
}
|
||||
|
||||
// rule sets
|
||||
for _, set := range group.Sets {
|
||||
s := &waf.RuleSet{
|
||||
Id: strconv.FormatInt(set.Id, 10),
|
||||
Code: set.Code,
|
||||
IsOn: set.IsOn,
|
||||
Name: set.Name,
|
||||
Description: set.Description,
|
||||
Connector: set.Connector,
|
||||
Action: set.Action,
|
||||
ActionOptions: set.ActionOptions,
|
||||
}
|
||||
|
||||
// rules
|
||||
for _, rule := range set.Rules {
|
||||
r := &waf.Rule{
|
||||
Description: rule.Description,
|
||||
Param: rule.Param,
|
||||
Operator: rule.Operator,
|
||||
Value: rule.Value,
|
||||
IsCaseInsensitive: rule.IsCaseInsensitive,
|
||||
CheckpointOptions: rule.CheckpointOptions,
|
||||
}
|
||||
s.Rules = append(s.Rules, r)
|
||||
}
|
||||
|
||||
g.RuleSets = append(g.RuleSets, s)
|
||||
}
|
||||
|
||||
w.Outbound = append(w.Outbound, g)
|
||||
}
|
||||
}
|
||||
|
||||
// action
|
||||
// TODO
|
||||
|
||||
err := w.Init()
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
return w, nil
|
||||
}
|
||||
Reference in New Issue
Block a user