|
@@ -93,9 +93,6 @@ func (s *tcpforwardingService) GetTcpforwarding(ctx context.Context, req v1.GetF
|
|
Port: tcpForwarding.Port,
|
|
Port: tcpForwarding.Port,
|
|
Comment: tcpForwarding.Comment,
|
|
Comment: tcpForwarding.Comment,
|
|
BackendList: backend.BackendList,
|
|
BackendList: backend.BackendList,
|
|
- AllowIpList: backend.AllowIpList,
|
|
|
|
- DenyIpList: backend.DenyIpList,
|
|
|
|
- AccessRule: backend.AccessRule,
|
|
|
|
}, nil
|
|
}, nil
|
|
}
|
|
}
|
|
|
|
|
|
@@ -116,9 +113,6 @@ func (s *tcpforwardingService) buildTcpRuleModel(reqData *v1.TcpForwardingDataRe
|
|
TcpId: localDbId, // 关联到本地数据库的主记录 ID
|
|
TcpId: localDbId, // 关联到本地数据库的主记录 ID
|
|
CdnOriginIds: cdnOriginIds,
|
|
CdnOriginIds: cdnOriginIds,
|
|
BackendList: reqData.BackendList,
|
|
BackendList: reqData.BackendList,
|
|
- AllowIpList: reqData.AllowIpList,
|
|
|
|
- DenyIpList: reqData.DenyIpList,
|
|
|
|
- AccessRule: reqData.AccessRule,
|
|
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
@@ -214,7 +208,7 @@ func (s *tcpforwardingService) AddTcpForwarding(ctx context.Context, req *v1.Tcp
|
|
}
|
|
}
|
|
|
|
|
|
|
|
|
|
- // 异步任务:将IP添加到白名单
|
|
|
|
|
|
+ // 异步任务:将源站IP添加到白名单
|
|
var ips []string
|
|
var ips []string
|
|
if req.TcpForwardingData.BackendList != nil {
|
|
if req.TcpForwardingData.BackendList != nil {
|
|
for _, v := range req.TcpForwardingData.BackendList {
|
|
for _, v := range req.TcpForwardingData.BackendList {
|
|
@@ -227,31 +221,7 @@ func (s *tcpforwardingService) AddTcpForwarding(ctx context.Context, req *v1.Tcp
|
|
go s.wafformatter.PublishIpWhitelistTask(ips, "add","","white")
|
|
go s.wafformatter.PublishIpWhitelistTask(ips, "add","","white")
|
|
}
|
|
}
|
|
|
|
|
|
- //白名单
|
|
|
|
- var accessRuleIps []string
|
|
|
|
- if req.TcpForwardingData.AllowIpList != nil {
|
|
|
|
- for _, v := range require.GatewayIps {
|
|
|
|
- for _, ip := range req.TcpForwardingData.AllowIpList {
|
|
|
|
- if net.ParseIP(ip) != nil{
|
|
|
|
- accessRuleIps = append(accessRuleIps, ip)
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
- go s.wafformatter.PublishIpWhitelistTask(accessRuleIps, "add",v,"white")
|
|
|
|
- }
|
|
|
|
|
|
|
|
- }
|
|
|
|
- //黑名单
|
|
|
|
- var denyRuleIps []string
|
|
|
|
- if req.TcpForwardingData.DenyIpList != nil {
|
|
|
|
- for _, v := range require.GatewayIps {
|
|
|
|
- for _, ip := range req.TcpForwardingData.DenyIpList {
|
|
|
|
- if net.ParseIP(ip) != nil{
|
|
|
|
- denyRuleIps = append(denyRuleIps, ip)
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
- go s.wafformatter.PublishIpWhitelistTask(denyRuleIps, "add",v,"black")
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
return nil
|
|
return nil
|
|
}
|
|
}
|
|
|
|
|
|
@@ -290,7 +260,7 @@ func (s *tcpforwardingService) EditTcpForwarding(ctx context.Context, req *v1.Tc
|
|
if err != nil {
|
|
if err != nil {
|
|
return err
|
|
return err
|
|
}
|
|
}
|
|
- addedIps, removedIps, addedAllowIps, removedAllowIps, addedDenyIps, removedDenyIps, err := s.wafformatter.WashEditWafIp(ctx,req.TcpForwardingData.BackendList,req.TcpForwardingData.AllowIpList,req.TcpForwardingData.DenyIpList,ipData.BackendList,ipData.AllowIpList,ipData.DenyIpList)
|
|
|
|
|
|
+ addedIps, removedIps, err := s.wafformatter.WashEditWafIp(ctx,req.TcpForwardingData.BackendList, ipData.BackendList)
|
|
if err != nil {
|
|
if err != nil {
|
|
return err
|
|
return err
|
|
}
|
|
}
|
|
@@ -298,30 +268,9 @@ func (s *tcpforwardingService) EditTcpForwarding(ctx context.Context, req *v1.Tc
|
|
go s.wafformatter.PublishIpWhitelistTask(addedIps, "add","","white")
|
|
go s.wafformatter.PublishIpWhitelistTask(addedIps, "add","","white")
|
|
}
|
|
}
|
|
if len(removedIps) > 0 {
|
|
if len(removedIps) > 0 {
|
|
- go s.wafformatter.PublishIpWhitelistTask(removedIps, "del","","white")
|
|
|
|
|
|
+ go s.wafformatter.PublishIpWhitelistTask(removedIps, "del","0","white")
|
|
}
|
|
}
|
|
|
|
|
|
- if len(addedAllowIps) > 0 {
|
|
|
|
- for _, v := range require.GatewayIps {
|
|
|
|
- go s.wafformatter.PublishIpWhitelistTask(addedAllowIps, "add",v,"white")
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
- if len(removedAllowIps) > 0 {
|
|
|
|
- for _, v := range require.GatewayIps {
|
|
|
|
- go s.wafformatter.PublishIpWhitelistTask(removedAllowIps, "del",v,"white")
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- if len(addedDenyIps) > 0 {
|
|
|
|
- for _, v := range require.GatewayIps {
|
|
|
|
- go s.wafformatter.PublishIpWhitelistTask(addedDenyIps, "add",v,"black")
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
- if len(removedDenyIps) > 0 {
|
|
|
|
- for _, v := range require.GatewayIps {
|
|
|
|
- go s.wafformatter.PublishIpWhitelistTask(removedDenyIps, "del",v,"black")
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
@@ -391,16 +340,12 @@ func (s *tcpforwardingService) DeleteTcpForwarding(ctx context.Context, req v1.D
|
|
if err != nil {
|
|
if err != nil {
|
|
return err
|
|
return err
|
|
}
|
|
}
|
|
- ips, err = s.wafformatter.WashDeleteWafIp(ctx, ipData.BackendList, ipData.AllowIpList)
|
|
|
|
|
|
+ ips, err = s.wafformatter.WashDeleteWafIp(ctx, ipData.BackendList)
|
|
if err != nil {
|
|
if err != nil {
|
|
return err
|
|
return err
|
|
}
|
|
}
|
|
if len(ips) > 0 {
|
|
if len(ips) > 0 {
|
|
- go s.wafformatter.PublishIpWhitelistTask(ips, "del","","white")
|
|
|
|
- }
|
|
|
|
- // 删除黑名单
|
|
|
|
- if len(ipData.DenyIpList) > 0 {
|
|
|
|
- go s.wafformatter.PublishIpWhitelistTask(ips, "del","","black")
|
|
|
|
|
|
+ go s.wafformatter.PublishIpWhitelistTask(ips, "del","0","white")
|
|
}
|
|
}
|
|
|
|
|
|
|
|
|
|
@@ -476,9 +421,6 @@ func (s *tcpforwardingService) GetTcpForwardingAllIpsByHostId(ctx context.Contex
|
|
}
|
|
}
|
|
if r.BackendRule != nil {
|
|
if r.BackendRule != nil {
|
|
dataReq.BackendList = r.BackendRule.BackendList
|
|
dataReq.BackendList = r.BackendRule.BackendList
|
|
- dataReq.AllowIpList = r.BackendRule.AllowIpList
|
|
|
|
- dataReq.DenyIpList = r.BackendRule.DenyIpList
|
|
|
|
- dataReq.AccessRule = r.BackendRule.AccessRule
|
|
|
|
}
|
|
}
|
|
res = append(res, dataReq)
|
|
res = append(res, dataReq)
|
|
}
|
|
}
|