accesslist.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547
  1. package main
  2. import (
  3. "encoding/json"
  4. "net/http"
  5. "strings"
  6. "github.com/google/uuid"
  7. "github.com/microcosm-cc/bluemonday"
  8. "imuslab.com/zoraxy/mod/access"
  9. "imuslab.com/zoraxy/mod/utils"
  10. )
  11. /*
  12. accesslist.go
  13. This script file is added to extend the
  14. reverse proxy function to include
  15. banning / whitelist a specific IP address or country code
  16. */
  17. /*
  18. General Function
  19. */
  20. func handleListAccessRules(w http.ResponseWriter, r *http.Request) {
  21. allAccessRules := accessController.ListAllAccessRules()
  22. js, _ := json.Marshal(allAccessRules)
  23. utils.SendJSONResponse(w, string(js))
  24. }
  25. func handleAttachRuleToHost(w http.ResponseWriter, r *http.Request) {
  26. ruleid, err := utils.PostPara(r, "id")
  27. if err != nil {
  28. utils.SendErrorResponse(w, "invalid rule name")
  29. return
  30. }
  31. host, err := utils.PostPara(r, "host")
  32. if err != nil {
  33. utils.SendErrorResponse(w, "invalid rule name")
  34. return
  35. }
  36. //Check if access rule and proxy rule exists
  37. targetProxyEndpoint, err := dynamicProxyRouter.LoadProxy(host)
  38. if err != nil {
  39. utils.SendErrorResponse(w, "invalid host given")
  40. return
  41. }
  42. if !accessController.AccessRuleExists(ruleid) {
  43. utils.SendErrorResponse(w, "access rule not exists")
  44. return
  45. }
  46. //Update the proxy host acess rule id
  47. targetProxyEndpoint.AccessFilterUUID = ruleid
  48. targetProxyEndpoint.UpdateToRuntime()
  49. err = SaveReverseProxyConfig(targetProxyEndpoint)
  50. if err != nil {
  51. utils.SendErrorResponse(w, err.Error())
  52. return
  53. }
  54. utils.SendOK(w)
  55. }
  56. // Create a new access rule, require name and desc only
  57. func handleCreateAccessRule(w http.ResponseWriter, r *http.Request) {
  58. ruleName, err := utils.PostPara(r, "name")
  59. if err != nil {
  60. utils.SendErrorResponse(w, "invalid rule name")
  61. return
  62. }
  63. ruleDesc, _ := utils.PostPara(r, "desc")
  64. //Filter out injection if any
  65. p := bluemonday.StripTagsPolicy()
  66. ruleName = p.Sanitize(ruleName)
  67. ruleDesc = p.Sanitize(ruleDesc)
  68. ruleUUID := uuid.New().String()
  69. newAccessRule := access.AccessRule{
  70. ID: ruleUUID,
  71. Name: ruleName,
  72. Desc: ruleDesc,
  73. BlacklistEnabled: false,
  74. WhitelistEnabled: false,
  75. }
  76. //Add it to runtime
  77. err = accessController.AddNewAccessRule(&newAccessRule)
  78. if err != nil {
  79. utils.SendErrorResponse(w, err.Error())
  80. return
  81. }
  82. utils.SendOK(w)
  83. }
  84. // Handle removing an access rule. All proxy endpoint using this rule will be
  85. // set to use the default rule
  86. func handleRemoveAccessRule(w http.ResponseWriter, r *http.Request) {
  87. ruleID, err := utils.PostPara(r, "id")
  88. if err != nil {
  89. utils.SendErrorResponse(w, "invalid rule id given")
  90. return
  91. }
  92. if ruleID == "default" {
  93. utils.SendErrorResponse(w, "default access rule cannot be removed")
  94. return
  95. }
  96. ruleID = strings.TrimSpace(ruleID)
  97. //Set all proxy hosts that use this access rule back to using "default"
  98. allProxyEndpoints := dynamicProxyRouter.GetProxyEndpointsAsMap()
  99. for _, proxyEndpoint := range allProxyEndpoints {
  100. if strings.EqualFold(proxyEndpoint.AccessFilterUUID, ruleID) {
  101. //This proxy endpoint is using the current access filter.
  102. //set it to default
  103. proxyEndpoint.AccessFilterUUID = "default"
  104. proxyEndpoint.UpdateToRuntime()
  105. err = SaveReverseProxyConfig(proxyEndpoint)
  106. if err != nil {
  107. SystemWideLogger.PrintAndLog("Access", "Unable to save updated proxy endpoint "+proxyEndpoint.RootOrMatchingDomain, err)
  108. } else {
  109. SystemWideLogger.PrintAndLog("Access", "Updated "+proxyEndpoint.RootOrMatchingDomain+" access filter to \"default\"", nil)
  110. }
  111. }
  112. }
  113. //Remove the access rule by ID
  114. err = accessController.RemoveAccessRuleByID(ruleID)
  115. if err != nil {
  116. utils.SendErrorResponse(w, err.Error())
  117. return
  118. }
  119. SystemWideLogger.PrintAndLog("Access", "Access Rule "+ruleID+" removed", nil)
  120. utils.SendOK(w)
  121. }
  122. // Only the name and desc, for other properties use blacklist / whitelist api
  123. func handleUpadateAccessRule(w http.ResponseWriter, r *http.Request) {
  124. ruleID, err := utils.PostPara(r, "id")
  125. if err != nil {
  126. utils.SendErrorResponse(w, "invalid rule id")
  127. return
  128. }
  129. ruleName, err := utils.PostPara(r, "name")
  130. if err != nil {
  131. utils.SendErrorResponse(w, "invalid rule name")
  132. return
  133. }
  134. ruleDesc, _ := utils.PostPara(r, "desc")
  135. //Filter anything weird
  136. p := bluemonday.StrictPolicy()
  137. ruleName = p.Sanitize(ruleName)
  138. ruleDesc = p.Sanitize(ruleDesc)
  139. err = accessController.UpdateAccessRule(ruleID, ruleName, ruleDesc)
  140. if err != nil {
  141. utils.SendErrorResponse(w, err.Error())
  142. return
  143. }
  144. utils.SendOK(w)
  145. }
  146. /*
  147. Blacklist Related
  148. */
  149. // List a of blacklisted ip address or country code
  150. func handleListBlacklisted(w http.ResponseWriter, r *http.Request) {
  151. bltype, err := utils.GetPara(r, "type")
  152. if err != nil {
  153. bltype = "country"
  154. }
  155. ruleID, err := utils.GetPara(r, "id")
  156. if err != nil {
  157. //Use default if not set
  158. ruleID = "default"
  159. }
  160. //Load the target rule from access controller
  161. rule, err := accessController.GetAccessRuleByID(ruleID)
  162. if err != nil {
  163. utils.SendErrorResponse(w, err.Error())
  164. return
  165. }
  166. resulst := []string{}
  167. if bltype == "country" {
  168. resulst = rule.GetAllBlacklistedCountryCode()
  169. } else if bltype == "ip" {
  170. resulst = rule.GetAllBlacklistedIp()
  171. }
  172. js, _ := json.Marshal(resulst)
  173. utils.SendJSONResponse(w, string(js))
  174. }
  175. func handleCountryBlacklistAdd(w http.ResponseWriter, r *http.Request) {
  176. countryCode, err := utils.PostPara(r, "cc")
  177. if err != nil {
  178. utils.SendErrorResponse(w, "invalid or empty country code")
  179. return
  180. }
  181. ruleID, err := utils.PostPara(r, "id")
  182. if err != nil {
  183. ruleID = "default"
  184. }
  185. comment, _ := utils.PostPara(r, "comment")
  186. p := bluemonday.StripTagsPolicy()
  187. comment = p.Sanitize(comment)
  188. //Load the target rule from access controller
  189. rule, err := accessController.GetAccessRuleByID(ruleID)
  190. if err != nil {
  191. utils.SendErrorResponse(w, err.Error())
  192. return
  193. }
  194. //Check if the country code contains comma, if yes, split it
  195. if strings.Contains(countryCode, ",") {
  196. codes := strings.Split(countryCode, ",")
  197. for _, code := range codes {
  198. code = strings.TrimSpace(code)
  199. rule.AddCountryCodeToBlackList(code, comment)
  200. }
  201. } else {
  202. countryCode = strings.TrimSpace(countryCode)
  203. rule.AddCountryCodeToBlackList(countryCode, comment)
  204. }
  205. utils.SendOK(w)
  206. }
  207. func handleCountryBlacklistRemove(w http.ResponseWriter, r *http.Request) {
  208. countryCode, err := utils.PostPara(r, "cc")
  209. if err != nil {
  210. utils.SendErrorResponse(w, "invalid or empty country code")
  211. return
  212. }
  213. ruleID, err := utils.PostPara(r, "id")
  214. if err != nil {
  215. ruleID = "default"
  216. }
  217. //Load the target rule from access controller
  218. rule, err := accessController.GetAccessRuleByID(ruleID)
  219. if err != nil {
  220. utils.SendErrorResponse(w, err.Error())
  221. return
  222. }
  223. //Check if the country code contains comma, if yes, split it
  224. if strings.Contains(countryCode, ",") {
  225. codes := strings.Split(countryCode, ",")
  226. for _, code := range codes {
  227. code = strings.TrimSpace(code)
  228. rule.RemoveCountryCodeFromBlackList(code)
  229. }
  230. } else {
  231. countryCode = strings.TrimSpace(countryCode)
  232. rule.RemoveCountryCodeFromBlackList(countryCode)
  233. }
  234. utils.SendOK(w)
  235. }
  236. func handleIpBlacklistAdd(w http.ResponseWriter, r *http.Request) {
  237. ipAddr, err := utils.PostPara(r, "ip")
  238. if err != nil {
  239. utils.SendErrorResponse(w, "invalid or empty ip address")
  240. return
  241. }
  242. ruleID, err := utils.PostPara(r, "id")
  243. if err != nil {
  244. ruleID = "default"
  245. }
  246. //Load the target rule from access controller
  247. rule, err := accessController.GetAccessRuleByID(ruleID)
  248. if err != nil {
  249. utils.SendErrorResponse(w, err.Error())
  250. return
  251. }
  252. comment, _ := utils.GetPara(r, "comment")
  253. p := bluemonday.StripTagsPolicy()
  254. comment = p.Sanitize(comment)
  255. rule.AddIPToBlackList(ipAddr, comment)
  256. utils.SendOK(w)
  257. }
  258. func handleIpBlacklistRemove(w http.ResponseWriter, r *http.Request) {
  259. ipAddr, err := utils.PostPara(r, "ip")
  260. if err != nil {
  261. utils.SendErrorResponse(w, "invalid or empty ip address")
  262. return
  263. }
  264. ruleID, err := utils.PostPara(r, "id")
  265. if err != nil {
  266. ruleID = "default"
  267. }
  268. //Load the target rule from access controller
  269. rule, err := accessController.GetAccessRuleByID(ruleID)
  270. if err != nil {
  271. utils.SendErrorResponse(w, err.Error())
  272. return
  273. }
  274. rule.RemoveIPFromBlackList(ipAddr)
  275. utils.SendOK(w)
  276. }
  277. func handleBlacklistEnable(w http.ResponseWriter, r *http.Request) {
  278. enable, _ := utils.PostPara(r, "enable")
  279. ruleID, err := utils.PostPara(r, "id")
  280. if err != nil {
  281. ruleID = "default"
  282. }
  283. rule, err := accessController.GetAccessRuleByID(ruleID)
  284. if err != nil {
  285. utils.SendErrorResponse(w, err.Error())
  286. return
  287. }
  288. if enable == "" {
  289. //enable paramter not set
  290. currentEnabled := rule.BlacklistEnabled
  291. js, _ := json.Marshal(currentEnabled)
  292. utils.SendJSONResponse(w, string(js))
  293. } else {
  294. if enable == "true" {
  295. rule.ToggleBlacklist(true)
  296. } else if enable == "false" {
  297. rule.ToggleBlacklist(false)
  298. } else {
  299. utils.SendErrorResponse(w, "invalid enable state: only true and false is accepted")
  300. return
  301. }
  302. utils.SendOK(w)
  303. }
  304. }
  305. /*
  306. Whitelist Related
  307. */
  308. func handleListWhitelisted(w http.ResponseWriter, r *http.Request) {
  309. bltype, err := utils.GetPara(r, "type")
  310. if err != nil {
  311. bltype = "country"
  312. }
  313. ruleID, err := utils.GetPara(r, "id")
  314. if err != nil {
  315. ruleID = "default"
  316. }
  317. rule, err := accessController.GetAccessRuleByID(ruleID)
  318. if err != nil {
  319. utils.SendErrorResponse(w, err.Error())
  320. return
  321. }
  322. resulst := []*access.WhitelistEntry{}
  323. if bltype == "country" {
  324. resulst = rule.GetAllWhitelistedCountryCode()
  325. } else if bltype == "ip" {
  326. resulst = rule.GetAllWhitelistedIp()
  327. }
  328. js, _ := json.Marshal(resulst)
  329. utils.SendJSONResponse(w, string(js))
  330. }
  331. func handleCountryWhitelistAdd(w http.ResponseWriter, r *http.Request) {
  332. countryCode, err := utils.PostPara(r, "cc")
  333. if err != nil {
  334. utils.SendErrorResponse(w, "invalid or empty country code")
  335. return
  336. }
  337. ruleID, err := utils.PostPara(r, "id")
  338. if err != nil {
  339. ruleID = "default"
  340. }
  341. rule, err := accessController.GetAccessRuleByID(ruleID)
  342. if err != nil {
  343. utils.SendErrorResponse(w, err.Error())
  344. return
  345. }
  346. comment, _ := utils.PostPara(r, "comment")
  347. p := bluemonday.StrictPolicy()
  348. comment = p.Sanitize(comment)
  349. //Check if the country code contains comma, if yes, split it
  350. if strings.Contains(countryCode, ",") {
  351. codes := strings.Split(countryCode, ",")
  352. for _, code := range codes {
  353. code = strings.TrimSpace(code)
  354. rule.AddCountryCodeToWhitelist(code, comment)
  355. }
  356. } else {
  357. countryCode = strings.TrimSpace(countryCode)
  358. rule.AddCountryCodeToWhitelist(countryCode, comment)
  359. }
  360. utils.SendOK(w)
  361. }
  362. func handleCountryWhitelistRemove(w http.ResponseWriter, r *http.Request) {
  363. countryCode, err := utils.PostPara(r, "cc")
  364. if err != nil {
  365. utils.SendErrorResponse(w, "invalid or empty country code")
  366. return
  367. }
  368. ruleID, err := utils.PostPara(r, "id")
  369. if err != nil {
  370. ruleID = "default"
  371. }
  372. rule, err := accessController.GetAccessRuleByID(ruleID)
  373. if err != nil {
  374. utils.SendErrorResponse(w, err.Error())
  375. return
  376. }
  377. //Check if the country code contains comma, if yes, split it
  378. if strings.Contains(countryCode, ",") {
  379. codes := strings.Split(countryCode, ",")
  380. for _, code := range codes {
  381. code = strings.TrimSpace(code)
  382. rule.RemoveCountryCodeFromWhitelist(code)
  383. }
  384. } else {
  385. countryCode = strings.TrimSpace(countryCode)
  386. rule.RemoveCountryCodeFromWhitelist(countryCode)
  387. }
  388. utils.SendOK(w)
  389. }
  390. func handleIpWhitelistAdd(w http.ResponseWriter, r *http.Request) {
  391. ipAddr, err := utils.PostPara(r, "ip")
  392. if err != nil {
  393. utils.SendErrorResponse(w, "invalid or empty ip address")
  394. return
  395. }
  396. ruleID, err := utils.PostPara(r, "id")
  397. if err != nil {
  398. ruleID = "default"
  399. }
  400. rule, err := accessController.GetAccessRuleByID(ruleID)
  401. if err != nil {
  402. utils.SendErrorResponse(w, err.Error())
  403. return
  404. }
  405. comment, _ := utils.PostPara(r, "comment")
  406. p := bluemonday.StrictPolicy()
  407. comment = p.Sanitize(comment)
  408. rule.AddIPToWhiteList(ipAddr, comment)
  409. utils.SendOK(w)
  410. }
  411. func handleIpWhitelistRemove(w http.ResponseWriter, r *http.Request) {
  412. ipAddr, err := utils.PostPara(r, "ip")
  413. if err != nil {
  414. utils.SendErrorResponse(w, "invalid or empty ip address")
  415. return
  416. }
  417. ruleID, err := utils.PostPara(r, "id")
  418. if err != nil {
  419. ruleID = "default"
  420. }
  421. rule, err := accessController.GetAccessRuleByID(ruleID)
  422. if err != nil {
  423. utils.SendErrorResponse(w, err.Error())
  424. return
  425. }
  426. rule.RemoveIPFromWhiteList(ipAddr)
  427. utils.SendOK(w)
  428. }
  429. func handleWhitelistEnable(w http.ResponseWriter, r *http.Request) {
  430. enable, _ := utils.PostPara(r, "enable")
  431. ruleID, err := utils.PostPara(r, "id")
  432. if err != nil {
  433. ruleID = "default"
  434. }
  435. rule, err := accessController.GetAccessRuleByID(ruleID)
  436. if err != nil {
  437. utils.SendErrorResponse(w, err.Error())
  438. return
  439. }
  440. if enable == "" {
  441. //Return the current enabled state
  442. currentEnabled := rule.WhitelistEnabled
  443. js, _ := json.Marshal(currentEnabled)
  444. utils.SendJSONResponse(w, string(js))
  445. } else {
  446. if enable == "true" {
  447. rule.ToggleWhitelist(true)
  448. } else if enable == "false" {
  449. rule.ToggleWhitelist(false)
  450. } else {
  451. utils.SendErrorResponse(w, "invalid enable state: only true and false is accepted")
  452. return
  453. }
  454. utils.SendOK(w)
  455. }
  456. }