mirror of
https://github.com/TeaOSLab/EdgeNode.git
synced 2025-11-03 15:00:26 +08:00
节点进程停止时,自动保存WAF临时白名单,并在进程重新启动后恢复
This commit is contained in:
@@ -3,12 +3,18 @@
|
|||||||
package waf
|
package waf
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"encoding/json"
|
||||||
"github.com/TeaOSLab/EdgeCommon/pkg/serverconfigs/firewallconfigs"
|
"github.com/TeaOSLab/EdgeCommon/pkg/serverconfigs/firewallconfigs"
|
||||||
"github.com/TeaOSLab/EdgeNode/internal/conns"
|
"github.com/TeaOSLab/EdgeNode/internal/conns"
|
||||||
|
teaconst "github.com/TeaOSLab/EdgeNode/internal/const"
|
||||||
|
"github.com/TeaOSLab/EdgeNode/internal/events"
|
||||||
"github.com/TeaOSLab/EdgeNode/internal/firewalls"
|
"github.com/TeaOSLab/EdgeNode/internal/firewalls"
|
||||||
"github.com/TeaOSLab/EdgeNode/internal/utils/expires"
|
"github.com/TeaOSLab/EdgeNode/internal/utils/expires"
|
||||||
"github.com/TeaOSLab/EdgeNode/internal/utils/fasttime"
|
"github.com/TeaOSLab/EdgeNode/internal/utils/fasttime"
|
||||||
|
"github.com/iwind/TeaGo/Tea"
|
||||||
|
"github.com/iwind/TeaGo/maps"
|
||||||
"github.com/iwind/TeaGo/types"
|
"github.com/iwind/TeaGo/types"
|
||||||
|
"os"
|
||||||
"sync"
|
"sync"
|
||||||
"sync/atomic"
|
"sync/atomic"
|
||||||
)
|
)
|
||||||
@@ -25,11 +31,30 @@ const (
|
|||||||
|
|
||||||
const IPTypeAll = "*"
|
const IPTypeAll = "*"
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
if !teaconst.IsMain {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
var cacheFile = Tea.Root + "/data/waf_white_list.cache"
|
||||||
|
|
||||||
|
// save
|
||||||
|
events.On(events.EventTerminated, func() {
|
||||||
|
_ = SharedIPWhiteList.Save(cacheFile)
|
||||||
|
})
|
||||||
|
|
||||||
|
// load
|
||||||
|
go func() {
|
||||||
|
_ = SharedIPWhiteList.Load(cacheFile)
|
||||||
|
_ = os.Remove(cacheFile)
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
|
||||||
// IPList IP列表管理
|
// IPList IP列表管理
|
||||||
type IPList struct {
|
type IPList struct {
|
||||||
expireList *expires.List
|
expireList *expires.List
|
||||||
ipMap map[string]uint64 // ip => id
|
ipMap map[string]uint64 // ip info => id
|
||||||
idMap map[uint64]string // id => ip
|
idMap map[uint64]string // id => ip info
|
||||||
listType IPListType
|
listType IPListType
|
||||||
|
|
||||||
id uint64
|
id uint64
|
||||||
@@ -47,7 +72,7 @@ func NewIPList(listType IPListType) *IPList {
|
|||||||
listType: listType,
|
listType: listType,
|
||||||
}
|
}
|
||||||
|
|
||||||
e := expires.NewList()
|
var e = expires.NewList()
|
||||||
list.expireList = e
|
list.expireList = e
|
||||||
|
|
||||||
e.OnGC(func(itemId uint64) {
|
e.OnGC(func(itemId uint64) {
|
||||||
@@ -206,6 +231,85 @@ func (this *IPList) RemoveIP(ip string, serverId int64, shouldExecute bool) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Save to local file
|
||||||
|
func (this *IPList) Save(path string) error {
|
||||||
|
var itemMaps = []maps.Map{} // [ {ip info, expiresAt }, ... ]
|
||||||
|
this.locker.Lock()
|
||||||
|
defer this.locker.Unlock()
|
||||||
|
|
||||||
|
// prevent too many items
|
||||||
|
if len(this.ipMap) > 100_000 {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
for ipInfo, id := range this.ipMap {
|
||||||
|
var expiresAt = this.expireList.ExpiresAt(id)
|
||||||
|
if expiresAt <= 0 {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
itemMaps = append(itemMaps, maps.Map{
|
||||||
|
"ip": ipInfo,
|
||||||
|
"expiresAt": expiresAt,
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
itemMapsJSON, err := json.Marshal(itemMaps)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return os.WriteFile(path, itemMapsJSON, 0666)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Load from local file
|
||||||
|
func (this *IPList) Load(path string) error {
|
||||||
|
data, err := os.ReadFile(path)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if len(data) == 0 {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
var itemMaps = []maps.Map{}
|
||||||
|
err = json.Unmarshal(data, &itemMaps)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
this.locker.Lock()
|
||||||
|
defer this.locker.Unlock()
|
||||||
|
|
||||||
|
for _, itemMap := range itemMaps {
|
||||||
|
var ip = itemMap.GetString("ip")
|
||||||
|
var expiresAt = itemMap.GetInt64("expiresAt")
|
||||||
|
if len(ip) == 0 || expiresAt < fasttime.Now().Unix()+10 /** seconds **/ {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
var id = this.nextId()
|
||||||
|
this.expireList.Add(id, expiresAt)
|
||||||
|
|
||||||
|
this.ipMap[ip] = id
|
||||||
|
this.idMap[id] = ip
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// IPMap get ipMap
|
||||||
|
func (this *IPList) IPMap() map[string]uint64 {
|
||||||
|
this.locker.RLock()
|
||||||
|
defer this.locker.RUnlock()
|
||||||
|
return this.ipMap
|
||||||
|
}
|
||||||
|
|
||||||
|
// IdMap get idMap
|
||||||
|
func (this *IPList) IdMap() map[uint64]string {
|
||||||
|
this.locker.RLock()
|
||||||
|
defer this.locker.RUnlock()
|
||||||
|
return this.idMap
|
||||||
|
}
|
||||||
|
|
||||||
func (this *IPList) remove(id uint64) {
|
func (this *IPList) remove(id uint64) {
|
||||||
this.locker.Lock()
|
this.locker.Lock()
|
||||||
ip, ok := this.idMap[id]
|
ip, ok := this.idMap[id]
|
||||||
|
|||||||
@@ -1,12 +1,16 @@
|
|||||||
// Copyright 2021 Liuxiangchao iwind.liu@gmail.com. All rights reserved.
|
// Copyright 2021 Liuxiangchao iwind.liu@gmail.com. All rights reserved.
|
||||||
|
|
||||||
package waf
|
package waf_test
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"github.com/TeaOSLab/EdgeCommon/pkg/serverconfigs/firewallconfigs"
|
"github.com/TeaOSLab/EdgeCommon/pkg/serverconfigs/firewallconfigs"
|
||||||
|
"github.com/TeaOSLab/EdgeNode/internal/waf"
|
||||||
|
"github.com/iwind/TeaGo/Tea"
|
||||||
"github.com/iwind/TeaGo/assert"
|
"github.com/iwind/TeaGo/assert"
|
||||||
|
_ "github.com/iwind/TeaGo/bootstrap"
|
||||||
"github.com/iwind/TeaGo/logs"
|
"github.com/iwind/TeaGo/logs"
|
||||||
timeutil "github.com/iwind/TeaGo/utils/time"
|
timeutil "github.com/iwind/TeaGo/utils/time"
|
||||||
|
"os"
|
||||||
"runtime"
|
"runtime"
|
||||||
"strconv"
|
"strconv"
|
||||||
"testing"
|
"testing"
|
||||||
@@ -14,35 +18,33 @@ import (
|
|||||||
)
|
)
|
||||||
|
|
||||||
func TestNewIPList(t *testing.T) {
|
func TestNewIPList(t *testing.T) {
|
||||||
var list = NewIPList(IPListTypeDeny)
|
var list = waf.NewIPList(waf.IPListTypeDeny)
|
||||||
list.Add(IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "127.0.0.1", time.Now().Unix())
|
list.Add(waf.IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "127.0.0.1", time.Now().Unix())
|
||||||
list.Add(IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "127.0.0.2", time.Now().Unix()+1)
|
list.Add(waf.IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "127.0.0.2", time.Now().Unix()+1)
|
||||||
list.Add(IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "127.0.0.1", time.Now().Unix()+2)
|
list.Add(waf.IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "127.0.0.1", time.Now().Unix()+2)
|
||||||
list.Add(IPTypeAll, firewallconfigs.FirewallScopeService, 1, "127.0.0.3", time.Now().Unix()+3)
|
list.Add(waf.IPTypeAll, firewallconfigs.FirewallScopeService, 1, "127.0.0.3", time.Now().Unix()+3)
|
||||||
list.Add(IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "127.0.0.10", time.Now().Unix()+10)
|
list.Add(waf.IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "127.0.0.10", time.Now().Unix()+10)
|
||||||
|
|
||||||
list.RemoveIP("127.0.0.1", 1, false)
|
list.RemoveIP("127.0.0.1", 1, false)
|
||||||
|
|
||||||
logs.PrintAsJSON(list.ipMap, t)
|
logs.PrintAsJSON(list.IPMap(), t)
|
||||||
logs.PrintAsJSON(list.idMap, t)
|
logs.PrintAsJSON(list.IdMap(), t)
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestIPList_Expire(t *testing.T) {
|
func TestIPList_Expire(t *testing.T) {
|
||||||
var list = NewIPList(IPListTypeDeny)
|
var list = waf.NewIPList(waf.IPListTypeDeny)
|
||||||
list.Add(IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "127.0.0.1", time.Now().Unix())
|
list.Add(waf.IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "127.0.0.1", time.Now().Unix())
|
||||||
list.Add(IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "127.0.0.2", time.Now().Unix()+1)
|
list.Add(waf.IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "127.0.0.2", time.Now().Unix()+1)
|
||||||
list.Add(IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "127.0.0.1", time.Now().Unix()+2)
|
list.Add(waf.IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "127.0.0.1", time.Now().Unix()+2)
|
||||||
list.Add(IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "127.0.0.3", time.Now().Unix()+3)
|
list.Add(waf.IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "127.0.0.3", time.Now().Unix()+3)
|
||||||
list.Add(IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "127.0.0.10", time.Now().Unix()+6)
|
list.Add(waf.IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "127.0.0.10", time.Now().Unix()+6)
|
||||||
|
|
||||||
var ticker = time.NewTicker(1 * time.Second)
|
var ticker = time.NewTicker(1 * time.Second)
|
||||||
for range ticker.C {
|
for range ticker.C {
|
||||||
t.Log("====")
|
t.Log("====")
|
||||||
list.locker.Lock()
|
logs.PrintAsJSON(list.IPMap(), t)
|
||||||
logs.PrintAsJSON(list.ipMap, t)
|
logs.PrintAsJSON(list.IdMap(), t)
|
||||||
logs.PrintAsJSON(list.idMap, t)
|
if len(list.IdMap()) == 0 {
|
||||||
list.locker.Unlock()
|
|
||||||
if len(list.idMap) == 0 {
|
|
||||||
break
|
break
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -51,54 +53,78 @@ func TestIPList_Expire(t *testing.T) {
|
|||||||
func TestIPList_Contains(t *testing.T) {
|
func TestIPList_Contains(t *testing.T) {
|
||||||
var a = assert.NewAssertion(t)
|
var a = assert.NewAssertion(t)
|
||||||
|
|
||||||
var list = NewIPList(IPListTypeDeny)
|
var list = waf.NewIPList(waf.IPListTypeDeny)
|
||||||
|
|
||||||
for i := 0; i < 1_0000; i++ {
|
for i := 0; i < 1_0000; i++ {
|
||||||
list.Add(IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "192.168.1."+strconv.Itoa(i), time.Now().Unix()+3600)
|
list.Add(waf.IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "192.168.1."+strconv.Itoa(i), time.Now().Unix()+3600)
|
||||||
}
|
}
|
||||||
//list.RemoveIP("192.168.1.100")
|
//list.RemoveIP("192.168.1.100")
|
||||||
{
|
{
|
||||||
a.IsTrue(list.Contains(IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "192.168.1.100"))
|
a.IsTrue(list.Contains(waf.IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "192.168.1.100"))
|
||||||
}
|
}
|
||||||
{
|
{
|
||||||
a.IsFalse(list.Contains(IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "192.168.2.100"))
|
a.IsFalse(list.Contains(waf.IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "192.168.2.100"))
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestIPList_ContainsExpires(t *testing.T) {
|
func TestIPList_ContainsExpires(t *testing.T) {
|
||||||
var list = NewIPList(IPListTypeDeny)
|
var list = waf.NewIPList(waf.IPListTypeDeny)
|
||||||
|
|
||||||
for i := 0; i < 1_0000; i++ {
|
for i := 0; i < 1_0000; i++ {
|
||||||
list.Add(IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "192.168.1."+strconv.Itoa(i), time.Now().Unix()+3600)
|
list.Add(waf.IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "192.168.1."+strconv.Itoa(i), time.Now().Unix()+3600)
|
||||||
}
|
}
|
||||||
// list.RemoveIP("192.168.1.100", 1, false)
|
// list.RemoveIP("192.168.1.100", 1, false)
|
||||||
for _, ip := range []string{"192.168.1.100", "192.168.2.100"} {
|
for _, ip := range []string{"192.168.1.100", "192.168.2.100"} {
|
||||||
expiresAt, ok := list.ContainsExpires(IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, ip)
|
expiresAt, ok := list.ContainsExpires(waf.IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, ip)
|
||||||
t.Log(ok, expiresAt, timeutil.FormatTime("Y-m-d H:i:s", expiresAt))
|
t.Log(ok, expiresAt, timeutil.FormatTime("Y-m-d H:i:s", expiresAt))
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestIPList_Save(t *testing.T) {
|
||||||
|
var a = assert.NewAssertion(t)
|
||||||
|
|
||||||
|
var list = waf.NewIPList(waf.IPListTypeAllow)
|
||||||
|
list.Add(waf.IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "192.168.1.100", time.Now().Unix()+3600)
|
||||||
|
list.Add(waf.IPTypeAll, firewallconfigs.FirewallScopeGlobal, 2, "192.168.1.101", time.Now().Unix()+3600)
|
||||||
|
|
||||||
|
var file = Tea.Root + "/data/waf.iplist.json"
|
||||||
|
err := list.Save(file)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
var newList = waf.NewIPList(waf.IPListTypeAllow)
|
||||||
|
err = newList.Load(file)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
a.IsTrue(newList.Contains(waf.IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "192.168.1.100"))
|
||||||
|
|
||||||
|
_ = os.Remove(file)
|
||||||
|
}
|
||||||
|
|
||||||
func BenchmarkIPList_Add(b *testing.B) {
|
func BenchmarkIPList_Add(b *testing.B) {
|
||||||
runtime.GOMAXPROCS(1)
|
runtime.GOMAXPROCS(1)
|
||||||
|
|
||||||
var list = NewIPList(IPListTypeDeny)
|
var list = waf.NewIPList(waf.IPListTypeDeny)
|
||||||
for i := 0; i < b.N; i++ {
|
for i := 0; i < b.N; i++ {
|
||||||
list.Add(IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "192.168.1."+strconv.Itoa(i), time.Now().Unix()+3600)
|
list.Add(waf.IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "192.168.1."+strconv.Itoa(i), time.Now().Unix()+3600)
|
||||||
}
|
}
|
||||||
b.Log(len(list.ipMap))
|
b.Log(len(list.IPMap()))
|
||||||
}
|
}
|
||||||
|
|
||||||
func BenchmarkIPList_Has(b *testing.B) {
|
func BenchmarkIPList_Has(b *testing.B) {
|
||||||
runtime.GOMAXPROCS(1)
|
runtime.GOMAXPROCS(1)
|
||||||
|
|
||||||
var list = NewIPList(IPListTypeDeny)
|
var list = waf.NewIPList(waf.IPListTypeDeny)
|
||||||
b.ResetTimer()
|
b.ResetTimer()
|
||||||
|
|
||||||
for i := 0; i < 1_0000; i++ {
|
for i := 0; i < 1_0000; i++ {
|
||||||
list.Add(IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "192.168.1."+strconv.Itoa(i), time.Now().Unix()+3600)
|
list.Add(waf.IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "192.168.1."+strconv.Itoa(i), time.Now().Unix()+3600)
|
||||||
}
|
}
|
||||||
|
|
||||||
for i := 0; i < b.N; i++ {
|
for i := 0; i < b.N; i++ {
|
||||||
list.Contains(IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "192.168.1.100")
|
list.Contains(waf.IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "192.168.1.100")
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user