accesslist.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507
  1. package main
  2. import (
  3. "encoding/json"
  4. "net/http"
  5. "strings"
  6. "github.com/google/uuid"
  7. "github.com/microcosm-cc/bluemonday"
  8. "imuslab.com/zoraxy/mod/access"
  9. "imuslab.com/zoraxy/mod/utils"
  10. )
  11. /*
  12. accesslist.go
  13. This script file is added to extend the
  14. reverse proxy function to include
  15. banning / whitelist a specific IP address or country code
  16. */
  17. /*
  18. General Function
  19. */
  20. func handleListAccessRules(w http.ResponseWriter, r *http.Request) {
  21. allAccessRules := accessController.ListAllAccessRules()
  22. js, _ := json.Marshal(allAccessRules)
  23. utils.SendJSONResponse(w, string(js))
  24. }
  25. func handleAttachRuleToHost(w http.ResponseWriter, r *http.Request) {
  26. ruleid, err := utils.PostPara(r, "id")
  27. if err != nil {
  28. utils.SendErrorResponse(w, "invalid rule name")
  29. return
  30. }
  31. host, err := utils.PostPara(r, "host")
  32. if err != nil {
  33. utils.SendErrorResponse(w, "invalid rule name")
  34. return
  35. }
  36. //Check if access rule and proxy rule exists
  37. targetProxyEndpoint, err := dynamicProxyRouter.LoadProxy(host)
  38. if err != nil {
  39. utils.SendErrorResponse(w, "invalid host given")
  40. return
  41. }
  42. if !accessController.AccessRuleExists(ruleid) {
  43. utils.SendErrorResponse(w, "access rule not exists")
  44. return
  45. }
  46. //Update the proxy host acess rule id
  47. targetProxyEndpoint.AccessFilterUUID = ruleid
  48. targetProxyEndpoint.UpdateToRuntime()
  49. err = SaveReverseProxyConfig(targetProxyEndpoint)
  50. if err != nil {
  51. utils.SendErrorResponse(w, err.Error())
  52. return
  53. }
  54. utils.SendOK(w)
  55. }
  56. // Create a new access rule, require name and desc only
  57. func handleCreateAccessRule(w http.ResponseWriter, r *http.Request) {
  58. ruleName, err := utils.PostPara(r, "name")
  59. if err != nil {
  60. utils.SendErrorResponse(w, "invalid rule name")
  61. return
  62. }
  63. ruleDesc, _ := utils.PostPara(r, "desc")
  64. //Filter out injection if any
  65. p := bluemonday.StripTagsPolicy()
  66. ruleName = p.Sanitize(ruleName)
  67. ruleDesc = p.Sanitize(ruleDesc)
  68. ruleUUID := uuid.New().String()
  69. newAccessRule := access.AccessRule{
  70. ID: ruleUUID,
  71. Name: ruleName,
  72. Desc: ruleDesc,
  73. BlacklistEnabled: false,
  74. WhitelistEnabled: false,
  75. }
  76. //Add it to runtime
  77. err = accessController.AddNewAccessRule(&newAccessRule)
  78. if err != nil {
  79. utils.SendErrorResponse(w, err.Error())
  80. return
  81. }
  82. utils.SendOK(w)
  83. }
  84. // Handle removing an access rule. All proxy endpoint using this rule will be
  85. // set to use the default rule
  86. func handleRemoveAccessRule(w http.ResponseWriter, r *http.Request) {
  87. ruleID, err := utils.PostPara(r, "id")
  88. if err != nil {
  89. utils.SendErrorResponse(w, "invalid rule id given")
  90. return
  91. }
  92. if ruleID == "default" {
  93. utils.SendErrorResponse(w, "default access rule cannot be removed")
  94. return
  95. }
  96. ruleID = strings.TrimSpace(ruleID)
  97. //Set all proxy hosts that use this access rule back to using "default"
  98. allProxyEndpoints := dynamicProxyRouter.GetProxyEndpointsAsMap()
  99. for _, proxyEndpoint := range allProxyEndpoints {
  100. if strings.EqualFold(proxyEndpoint.AccessFilterUUID, ruleID) {
  101. //This proxy endpoint is using the current access filter.
  102. //set it to default
  103. proxyEndpoint.AccessFilterUUID = "default"
  104. proxyEndpoint.UpdateToRuntime()
  105. err = SaveReverseProxyConfig(proxyEndpoint)
  106. if err != nil {
  107. SystemWideLogger.PrintAndLog("Access", "Unable to save updated proxy endpoint "+proxyEndpoint.RootOrMatchingDomain, err)
  108. } else {
  109. SystemWideLogger.PrintAndLog("Access", "Updated "+proxyEndpoint.RootOrMatchingDomain+" access filter to \"default\"", nil)
  110. }
  111. }
  112. }
  113. //Remove the access rule by ID
  114. err = accessController.RemoveAccessRuleByID(ruleID)
  115. if err != nil {
  116. utils.SendErrorResponse(w, err.Error())
  117. return
  118. }
  119. SystemWideLogger.PrintAndLog("Access", "Access Rule "+ruleID+" removed", nil)
  120. utils.SendOK(w)
  121. }
  122. // Only the name and desc, for other properties use blacklist / whitelist api
  123. func handleUpadateAccessRule(w http.ResponseWriter, r *http.Request) {
  124. ruleID, err := utils.PostPara(r, "id")
  125. if err != nil {
  126. utils.SendErrorResponse(w, "invalid rule id")
  127. return
  128. }
  129. ruleName, err := utils.PostPara(r, "name")
  130. if err != nil {
  131. utils.SendErrorResponse(w, "invalid rule name")
  132. return
  133. }
  134. ruleDesc, _ := utils.PostPara(r, "desc")
  135. //Filter anything weird
  136. p := bluemonday.StrictPolicy()
  137. ruleName = p.Sanitize(ruleName)
  138. ruleDesc = p.Sanitize(ruleDesc)
  139. err = accessController.UpdateAccessRule(ruleID, ruleName, ruleDesc)
  140. if err != nil {
  141. utils.SendErrorResponse(w, err.Error())
  142. return
  143. }
  144. utils.SendOK(w)
  145. }
  146. /*
  147. Blacklist Related
  148. */
  149. // List a of blacklisted ip address or country code
  150. func handleListBlacklisted(w http.ResponseWriter, r *http.Request) {
  151. bltype, err := utils.GetPara(r, "type")
  152. if err != nil {
  153. bltype = "country"
  154. }
  155. ruleID, err := utils.GetPara(r, "id")
  156. if err != nil {
  157. //Use default if not set
  158. ruleID = "default"
  159. }
  160. //Load the target rule from access controller
  161. rule, err := accessController.GetAccessRuleByID(ruleID)
  162. if err != nil {
  163. utils.SendErrorResponse(w, err.Error())
  164. return
  165. }
  166. resulst := []string{}
  167. if bltype == "country" {
  168. resulst = rule.GetAllBlacklistedCountryCode()
  169. } else if bltype == "ip" {
  170. resulst = rule.GetAllBlacklistedIp()
  171. }
  172. js, _ := json.Marshal(resulst)
  173. utils.SendJSONResponse(w, string(js))
  174. }
  175. func handleCountryBlacklistAdd(w http.ResponseWriter, r *http.Request) {
  176. countryCode, err := utils.PostPara(r, "cc")
  177. if err != nil {
  178. utils.SendErrorResponse(w, "invalid or empty country code")
  179. return
  180. }
  181. ruleID, err := utils.PostPara(r, "id")
  182. if err != nil {
  183. ruleID = "default"
  184. }
  185. comment, _ := utils.PostPara(r, "comment")
  186. p := bluemonday.StripTagsPolicy()
  187. comment = p.Sanitize(comment)
  188. //Load the target rule from access controller
  189. rule, err := accessController.GetAccessRuleByID(ruleID)
  190. if err != nil {
  191. utils.SendErrorResponse(w, err.Error())
  192. return
  193. }
  194. rule.AddCountryCodeToBlackList(countryCode, comment)
  195. utils.SendOK(w)
  196. }
  197. func handleCountryBlacklistRemove(w http.ResponseWriter, r *http.Request) {
  198. countryCode, err := utils.PostPara(r, "cc")
  199. if err != nil {
  200. utils.SendErrorResponse(w, "invalid or empty country code")
  201. return
  202. }
  203. ruleID, err := utils.PostPara(r, "id")
  204. if err != nil {
  205. ruleID = "default"
  206. }
  207. //Load the target rule from access controller
  208. rule, err := accessController.GetAccessRuleByID(ruleID)
  209. if err != nil {
  210. utils.SendErrorResponse(w, err.Error())
  211. return
  212. }
  213. rule.RemoveCountryCodeFromBlackList(countryCode)
  214. utils.SendOK(w)
  215. }
  216. func handleIpBlacklistAdd(w http.ResponseWriter, r *http.Request) {
  217. ipAddr, err := utils.PostPara(r, "ip")
  218. if err != nil {
  219. utils.SendErrorResponse(w, "invalid or empty ip address")
  220. return
  221. }
  222. ruleID, err := utils.PostPara(r, "id")
  223. if err != nil {
  224. ruleID = "default"
  225. }
  226. //Load the target rule from access controller
  227. rule, err := accessController.GetAccessRuleByID(ruleID)
  228. if err != nil {
  229. utils.SendErrorResponse(w, err.Error())
  230. return
  231. }
  232. comment, _ := utils.GetPara(r, "comment")
  233. p := bluemonday.StripTagsPolicy()
  234. comment = p.Sanitize(comment)
  235. rule.AddIPToBlackList(ipAddr, comment)
  236. utils.SendOK(w)
  237. }
  238. func handleIpBlacklistRemove(w http.ResponseWriter, r *http.Request) {
  239. ipAddr, err := utils.PostPara(r, "ip")
  240. if err != nil {
  241. utils.SendErrorResponse(w, "invalid or empty ip address")
  242. return
  243. }
  244. ruleID, err := utils.PostPara(r, "id")
  245. if err != nil {
  246. ruleID = "default"
  247. }
  248. //Load the target rule from access controller
  249. rule, err := accessController.GetAccessRuleByID(ruleID)
  250. if err != nil {
  251. utils.SendErrorResponse(w, err.Error())
  252. return
  253. }
  254. rule.RemoveIPFromBlackList(ipAddr)
  255. utils.SendOK(w)
  256. }
  257. func handleBlacklistEnable(w http.ResponseWriter, r *http.Request) {
  258. enable, _ := utils.PostPara(r, "enable")
  259. ruleID, err := utils.PostPara(r, "id")
  260. if err != nil {
  261. ruleID = "default"
  262. }
  263. rule, err := accessController.GetAccessRuleByID(ruleID)
  264. if err != nil {
  265. utils.SendErrorResponse(w, err.Error())
  266. return
  267. }
  268. if enable == "" {
  269. //enable paramter not set
  270. currentEnabled := rule.BlacklistEnabled
  271. js, _ := json.Marshal(currentEnabled)
  272. utils.SendJSONResponse(w, string(js))
  273. } else {
  274. if enable == "true" {
  275. rule.ToggleBlacklist(true)
  276. } else if enable == "false" {
  277. rule.ToggleBlacklist(false)
  278. } else {
  279. utils.SendErrorResponse(w, "invalid enable state: only true and false is accepted")
  280. return
  281. }
  282. utils.SendOK(w)
  283. }
  284. }
  285. /*
  286. Whitelist Related
  287. */
  288. func handleListWhitelisted(w http.ResponseWriter, r *http.Request) {
  289. bltype, err := utils.GetPara(r, "type")
  290. if err != nil {
  291. bltype = "country"
  292. }
  293. ruleID, err := utils.GetPara(r, "id")
  294. if err != nil {
  295. ruleID = "default"
  296. }
  297. rule, err := accessController.GetAccessRuleByID(ruleID)
  298. if err != nil {
  299. utils.SendErrorResponse(w, err.Error())
  300. return
  301. }
  302. resulst := []*access.WhitelistEntry{}
  303. if bltype == "country" {
  304. resulst = rule.GetAllWhitelistedCountryCode()
  305. } else if bltype == "ip" {
  306. resulst = rule.GetAllWhitelistedIp()
  307. }
  308. js, _ := json.Marshal(resulst)
  309. utils.SendJSONResponse(w, string(js))
  310. }
  311. func handleCountryWhitelistAdd(w http.ResponseWriter, r *http.Request) {
  312. countryCode, err := utils.PostPara(r, "cc")
  313. if err != nil {
  314. utils.SendErrorResponse(w, "invalid or empty country code")
  315. return
  316. }
  317. ruleID, err := utils.PostPara(r, "id")
  318. if err != nil {
  319. ruleID = "default"
  320. }
  321. rule, err := accessController.GetAccessRuleByID(ruleID)
  322. if err != nil {
  323. utils.SendErrorResponse(w, err.Error())
  324. return
  325. }
  326. comment, _ := utils.PostPara(r, "comment")
  327. p := bluemonday.StrictPolicy()
  328. comment = p.Sanitize(comment)
  329. rule.AddCountryCodeToWhitelist(countryCode, comment)
  330. utils.SendOK(w)
  331. }
  332. func handleCountryWhitelistRemove(w http.ResponseWriter, r *http.Request) {
  333. countryCode, err := utils.PostPara(r, "cc")
  334. if err != nil {
  335. utils.SendErrorResponse(w, "invalid or empty country code")
  336. return
  337. }
  338. ruleID, err := utils.PostPara(r, "id")
  339. if err != nil {
  340. ruleID = "default"
  341. }
  342. rule, err := accessController.GetAccessRuleByID(ruleID)
  343. if err != nil {
  344. utils.SendErrorResponse(w, err.Error())
  345. return
  346. }
  347. rule.RemoveCountryCodeFromWhitelist(countryCode)
  348. utils.SendOK(w)
  349. }
  350. func handleIpWhitelistAdd(w http.ResponseWriter, r *http.Request) {
  351. ipAddr, err := utils.PostPara(r, "ip")
  352. if err != nil {
  353. utils.SendErrorResponse(w, "invalid or empty ip address")
  354. return
  355. }
  356. ruleID, err := utils.PostPara(r, "id")
  357. if err != nil {
  358. ruleID = "default"
  359. }
  360. rule, err := accessController.GetAccessRuleByID(ruleID)
  361. if err != nil {
  362. utils.SendErrorResponse(w, err.Error())
  363. return
  364. }
  365. comment, _ := utils.PostPara(r, "comment")
  366. p := bluemonday.StrictPolicy()
  367. comment = p.Sanitize(comment)
  368. rule.AddIPToWhiteList(ipAddr, comment)
  369. utils.SendOK(w)
  370. }
  371. func handleIpWhitelistRemove(w http.ResponseWriter, r *http.Request) {
  372. ipAddr, err := utils.PostPara(r, "ip")
  373. if err != nil {
  374. utils.SendErrorResponse(w, "invalid or empty ip address")
  375. return
  376. }
  377. ruleID, err := utils.PostPara(r, "id")
  378. if err != nil {
  379. ruleID = "default"
  380. }
  381. rule, err := accessController.GetAccessRuleByID(ruleID)
  382. if err != nil {
  383. utils.SendErrorResponse(w, err.Error())
  384. return
  385. }
  386. rule.RemoveIPFromWhiteList(ipAddr)
  387. utils.SendOK(w)
  388. }
  389. func handleWhitelistEnable(w http.ResponseWriter, r *http.Request) {
  390. enable, _ := utils.PostPara(r, "enable")
  391. ruleID, err := utils.PostPara(r, "id")
  392. if err != nil {
  393. ruleID = "default"
  394. }
  395. rule, err := accessController.GetAccessRuleByID(ruleID)
  396. if err != nil {
  397. utils.SendErrorResponse(w, err.Error())
  398. return
  399. }
  400. if enable == "" {
  401. //Return the current enabled state
  402. currentEnabled := rule.WhitelistEnabled
  403. js, _ := json.Marshal(currentEnabled)
  404. utils.SendJSONResponse(w, string(js))
  405. } else {
  406. if enable == "true" {
  407. rule.ToggleWhitelist(true)
  408. } else if enable == "false" {
  409. rule.ToggleWhitelist(false)
  410. } else {
  411. utils.SendErrorResponse(w, "invalid enable state: only true and false is accepted")
  412. return
  413. }
  414. utils.SendOK(w)
  415. }
  416. }