Initial commit (code only without large binaries)
This commit is contained in:
178
EdgeAPI/internal/db/models/http_firewall_rule_dao.go
Normal file
178
EdgeAPI/internal/db/models/http_firewall_rule_dao.go
Normal file
@@ -0,0 +1,178 @@
|
||||
package models
|
||||
|
||||
import (
|
||||
"encoding/json"
|
||||
"github.com/TeaOSLab/EdgeCommon/pkg/serverconfigs/firewallconfigs"
|
||||
_ "github.com/go-sql-driver/mysql"
|
||||
"github.com/iwind/TeaGo/Tea"
|
||||
"github.com/iwind/TeaGo/dbs"
|
||||
"github.com/iwind/TeaGo/types"
|
||||
)
|
||||
|
||||
const (
|
||||
HTTPFirewallRuleStateEnabled = 1 // 已启用
|
||||
HTTPFirewallRuleStateDisabled = 0 // 已禁用
|
||||
)
|
||||
|
||||
type HTTPFirewallRuleDAO dbs.DAO
|
||||
|
||||
func NewHTTPFirewallRuleDAO() *HTTPFirewallRuleDAO {
|
||||
return dbs.NewDAO(&HTTPFirewallRuleDAO{
|
||||
DAOObject: dbs.DAOObject{
|
||||
DB: Tea.Env,
|
||||
Table: "edgeHTTPFirewallRules",
|
||||
Model: new(HTTPFirewallRule),
|
||||
PkName: "id",
|
||||
},
|
||||
}).(*HTTPFirewallRuleDAO)
|
||||
}
|
||||
|
||||
var SharedHTTPFirewallRuleDAO *HTTPFirewallRuleDAO
|
||||
|
||||
func init() {
|
||||
dbs.OnReady(func() {
|
||||
SharedHTTPFirewallRuleDAO = NewHTTPFirewallRuleDAO()
|
||||
})
|
||||
}
|
||||
|
||||
// Init 初始化
|
||||
func (this *HTTPFirewallRuleDAO) Init() {
|
||||
_ = this.DAOObject.Init()
|
||||
}
|
||||
|
||||
// EnableHTTPFirewallRule 启用条目
|
||||
func (this *HTTPFirewallRuleDAO) EnableHTTPFirewallRule(tx *dbs.Tx, id int64) error {
|
||||
_, err := this.Query(tx).
|
||||
Pk(id).
|
||||
Set("state", HTTPFirewallRuleStateEnabled).
|
||||
Update()
|
||||
return err
|
||||
}
|
||||
|
||||
// DisableHTTPFirewallRule 禁用条目
|
||||
func (this *HTTPFirewallRuleDAO) DisableHTTPFirewallRule(tx *dbs.Tx, ruleId int64) error {
|
||||
_, err := this.Query(tx).
|
||||
Pk(ruleId).
|
||||
Set("state", HTTPFirewallRuleStateDisabled).
|
||||
Update()
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
return this.NotifyUpdate(tx, ruleId)
|
||||
}
|
||||
|
||||
// FindEnabledHTTPFirewallRule 查找启用中的条目
|
||||
func (this *HTTPFirewallRuleDAO) FindEnabledHTTPFirewallRule(tx *dbs.Tx, id int64) (*HTTPFirewallRule, error) {
|
||||
result, err := this.Query(tx).
|
||||
Pk(id).
|
||||
Attr("state", HTTPFirewallRuleStateEnabled).
|
||||
Find()
|
||||
if result == nil {
|
||||
return nil, err
|
||||
}
|
||||
return result.(*HTTPFirewallRule), err
|
||||
}
|
||||
|
||||
// ComposeFirewallRule 组合配置
|
||||
func (this *HTTPFirewallRuleDAO) ComposeFirewallRule(tx *dbs.Tx, ruleId int64) (*firewallconfigs.HTTPFirewallRule, error) {
|
||||
rule, err := this.FindEnabledHTTPFirewallRule(tx, ruleId)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
if rule == nil {
|
||||
return nil, nil
|
||||
}
|
||||
var config = &firewallconfigs.HTTPFirewallRule{}
|
||||
config.Id = int64(rule.Id)
|
||||
config.IsOn = rule.IsOn
|
||||
config.Param = rule.Param
|
||||
|
||||
var paramFilters = []*firewallconfigs.ParamFilter{}
|
||||
if IsNotNull(rule.ParamFilters) {
|
||||
err = json.Unmarshal(rule.ParamFilters, ¶mFilters)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
}
|
||||
config.ParamFilters = paramFilters
|
||||
|
||||
config.Operator = rule.Operator
|
||||
config.Value = rule.Value
|
||||
config.IsCaseInsensitive = rule.IsCaseInsensitive
|
||||
|
||||
if IsNotNull(rule.CheckpointOptions) {
|
||||
var checkpointOptions = map[string]interface{}{}
|
||||
err = json.Unmarshal(rule.CheckpointOptions, &checkpointOptions)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
config.CheckpointOptions = checkpointOptions
|
||||
}
|
||||
|
||||
config.IsComposed = firewallconfigs.CheckCheckpointIsComposed(config.Prefix())
|
||||
|
||||
config.Description = rule.Description
|
||||
|
||||
return config, nil
|
||||
}
|
||||
|
||||
// CreateOrUpdateRuleFromConfig 从配置中配置规则
|
||||
func (this *HTTPFirewallRuleDAO) CreateOrUpdateRuleFromConfig(tx *dbs.Tx, ruleConfig *firewallconfigs.HTTPFirewallRule, imp ...bool) (int64, error) {
|
||||
var op = NewHTTPFirewallRuleOperator()
|
||||
if len(imp) == 0 || !imp[0] {
|
||||
op.Id = ruleConfig.Id
|
||||
}
|
||||
//op.Id = ruleConfig.Id
|
||||
op.State = HTTPFirewallRuleStateEnabled
|
||||
op.IsOn = ruleConfig.IsOn
|
||||
op.Description = ruleConfig.Description
|
||||
op.Param = ruleConfig.Param
|
||||
|
||||
if len(ruleConfig.ParamFilters) == 0 {
|
||||
op.ParamFilters = "[]"
|
||||
} else {
|
||||
paramFilters, err := json.Marshal(ruleConfig.ParamFilters)
|
||||
if err != nil {
|
||||
return 0, err
|
||||
}
|
||||
op.ParamFilters = paramFilters
|
||||
}
|
||||
|
||||
op.Value = ruleConfig.Value
|
||||
op.IsCaseInsensitive = ruleConfig.IsCaseInsensitive
|
||||
op.Operator = ruleConfig.Operator
|
||||
|
||||
if ruleConfig.CheckpointOptions != nil {
|
||||
checkpointOptionsJSON, err := json.Marshal(ruleConfig.CheckpointOptions)
|
||||
if err != nil {
|
||||
return 0, err
|
||||
}
|
||||
op.CheckpointOptions = checkpointOptionsJSON
|
||||
}
|
||||
err := this.Save(tx, op)
|
||||
if err != nil {
|
||||
return 0, err
|
||||
}
|
||||
|
||||
// 通知更新
|
||||
if ruleConfig.Id > 0 {
|
||||
err := this.NotifyUpdate(tx, ruleConfig.Id)
|
||||
if err != nil {
|
||||
return 0, err
|
||||
}
|
||||
}
|
||||
|
||||
return types.Int64(op.Id), nil
|
||||
}
|
||||
|
||||
// NotifyUpdate 通知更新
|
||||
func (this *HTTPFirewallRuleDAO) NotifyUpdate(tx *dbs.Tx, ruleId int64) error {
|
||||
setId, err := SharedHTTPFirewallRuleSetDAO.FindEnabledRuleSetIdWithRuleId(tx, ruleId)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
if setId > 0 {
|
||||
return SharedHTTPFirewallRuleSetDAO.NotifyUpdate(tx, setId)
|
||||
}
|
||||
return nil
|
||||
}
|
||||
Reference in New Issue
Block a user