wafformatter.go 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640
  1. package service
  2. import (
  3. "context"
  4. "crypto/tls"
  5. "crypto/x509"
  6. "encoding/json"
  7. "fmt"
  8. v1 "github.com/go-nunu/nunu-layout-advanced/api/v1"
  9. "github.com/go-nunu/nunu-layout-advanced/internal/model"
  10. "github.com/go-nunu/nunu-layout-advanced/internal/repository"
  11. "github.com/go-nunu/nunu-layout-advanced/pkg/rabbitmq"
  12. amqp "github.com/rabbitmq/amqp091-go"
  13. "go.uber.org/zap"
  14. "golang.org/x/net/idna"
  15. "golang.org/x/net/publicsuffix"
  16. "golang.org/x/sync/errgroup"
  17. "net"
  18. "slices"
  19. "strconv"
  20. "strings"
  21. )
  22. type WafFormatterService interface {
  23. Require(ctx context.Context, req v1.GlobalRequire) (RequireResponse, error)
  24. validateWafPortCount(ctx context.Context, hostId int) error
  25. validateWafDomainCount(ctx context.Context, req v1.GlobalRequire) error
  26. ConvertToWildcardDomain(ctx context.Context, domain string) (string, error)
  27. AppendWafIp(ctx context.Context, req []string, returnSourceIp string) ([]v1.IpInfo, error)
  28. WashIps(ctx context.Context, req []string) ([]string, error)
  29. PublishIpWhitelistTask(ips []string, action string, returnSourceIp string, color string)
  30. PublishDomainWhitelistTask(domain, ip, action string)
  31. findIpDifferences(oldIps, newIps []string) ([]string, []string)
  32. WashDeleteWafIp(ctx context.Context, backendList []string) ([]string, error)
  33. WashEditWafIp(ctx context.Context, newBackendList []string, oldBackendList []string) ([]string, []string, error)
  34. //cdn添加网站
  35. AddOrigin(ctx context.Context, req v1.WebJson) (int64, error)
  36. // 获取ip数量等于1的源站过白ip
  37. WashDelIps(ctx context.Context, ips []string) ([]string, error)
  38. // 判断域名是否是IDN,如果是,转换为 Punycode
  39. ConvertToPunycodeIfIDN(ctx context.Context, domain string) (isIDN bool, punycodeDomain string, err error)
  40. // 解析证书
  41. ParseCert(ctx context.Context, httpsCert string, httpKey string) (serverName string, commonName []string, DNSNames []string, before int64, after int64, isSelfSigned bool, err error)
  42. AddSSLPolicy(ctx context.Context, req v1.SSL) (sslPolicyId int64, sslCertId int64, err error)
  43. EditSSL(ctx context.Context, req v1.SSL) error
  44. }
  45. func NewWafFormatterService(
  46. service *Service,
  47. globalRep repository.GlobalLimitRepository,
  48. hostRep repository.HostRepository,
  49. required RequiredService,
  50. parser ParserService,
  51. tcpforwardingRep repository.TcpforwardingRepository,
  52. udpForWardingRep repository.UdpForWardingRepository,
  53. webForwardingRep repository.WebForwardingRepository,
  54. mq *rabbitmq.RabbitMQ,
  55. host HostService,
  56. gatewayGroupRep repository.GatewayGroupRepository,
  57. gatewayGroupIpRep repository.GateWayGroupIpRepository,
  58. cdn CdnService,
  59. ) WafFormatterService {
  60. return &wafFormatterService{
  61. Service: service,
  62. globalRep: globalRep,
  63. hostRep: hostRep,
  64. required: required,
  65. parser: parser,
  66. tcpforwardingRep: tcpforwardingRep,
  67. udpForWardingRep: udpForWardingRep,
  68. webForwardingRep: webForwardingRep,
  69. host: host,
  70. mq: mq,
  71. gatewayGroupRep: gatewayGroupRep,
  72. gatewayGroupIpRep: gatewayGroupIpRep,
  73. cdn: cdn,
  74. }
  75. }
  76. type wafFormatterService struct {
  77. *Service
  78. globalRep repository.GlobalLimitRepository
  79. hostRep repository.HostRepository
  80. required RequiredService
  81. parser ParserService
  82. tcpforwardingRep repository.TcpforwardingRepository
  83. udpForWardingRep repository.UdpForWardingRepository
  84. webForwardingRep repository.WebForwardingRepository
  85. host HostService
  86. mq *rabbitmq.RabbitMQ
  87. gatewayGroupRep repository.GatewayGroupRepository
  88. gatewayGroupIpRep repository.GateWayGroupIpRepository
  89. cdn CdnService
  90. }
  91. type RequireResponse struct {
  92. model.GlobalLimit `json:"globalLimit" form:"globalLimit"`
  93. GatewayIps []string `json:"ips" form:"ips"`
  94. Tag string `json:"tag" form:"tag"`
  95. SslPolicyId int64 `json:"sslPolicyId" form:"sslPolicyId"`
  96. }
  97. func (s *wafFormatterService) Require(ctx context.Context, req v1.GlobalRequire) (RequireResponse, error) {
  98. var res RequireResponse
  99. // 获取全局配置信息
  100. globalLimit, err := s.globalRep.GetGlobalLimitByHostId(ctx, int64(req.HostId))
  101. if err != nil {
  102. return RequireResponse{}, err
  103. }
  104. if globalLimit != nil {
  105. res.GlobalLimit = *globalLimit
  106. }
  107. // 获取主机名
  108. domain, err := s.hostRep.GetDomainById(ctx, req.HostId)
  109. if err != nil {
  110. return RequireResponse{}, err
  111. }
  112. res.Tag = strconv.Itoa(req.Uid) + "_" + strconv.Itoa(req.HostId) + "_" + domain + "_" + req.Comment
  113. res.GatewayIps, err = s.gatewayGroupIpRep.GetGateWayGroupAllIpByGatewayGroupId(ctx, res.GatewayGroupId)
  114. if err != nil {
  115. return RequireResponse{}, err
  116. }
  117. return res, nil
  118. }
  119. func (s *wafFormatterService) validateWafPortCount(ctx context.Context, hostId int) error {
  120. congfig, err := s.host.GetGlobalLimitConfig(ctx, hostId)
  121. if err != nil {
  122. return err
  123. }
  124. tcpCount, err := s.tcpforwardingRep.GetTcpForwardingPortCountByHostId(ctx, hostId)
  125. if err != nil {
  126. return err
  127. }
  128. udpCount, err := s.udpForWardingRep.GetUdpForwardingPortCountByHostId(ctx, hostId)
  129. if err != nil {
  130. return err
  131. }
  132. webCount, err := s.webForwardingRep.GetWebForwardingPortCountByHostId(ctx, hostId)
  133. if err != nil {
  134. return err
  135. }
  136. if int64(congfig.PortCount) > tcpCount+udpCount+webCount {
  137. return nil
  138. }
  139. return fmt.Errorf("端口数量超出套餐限制,已配置%d个端口,套餐限制为%d个端口", tcpCount+udpCount+webCount, congfig.PortCount)
  140. }
  141. func (s *wafFormatterService) validateWafDomainCount(ctx context.Context, req v1.GlobalRequire) error {
  142. congfig, err := s.host.GetGlobalLimitConfig(ctx, req.HostId)
  143. if err != nil {
  144. return err
  145. }
  146. domainCount, domainSlice, err := s.webForwardingRep.GetWebForwardingDomainCountByHostId(ctx, req.HostId)
  147. if err != nil {
  148. return err
  149. }
  150. if req.Domain != "" {
  151. if !slices.Contains(domainSlice, req.Domain) {
  152. domainCount += 1
  153. if domainCount > int64(congfig.DomainCount) {
  154. return fmt.Errorf("域名数量已达到上限,已配置%d个域名,套餐限制为%d个域名", domainCount, congfig.DomainCount)
  155. }
  156. }
  157. }
  158. return nil
  159. }
  160. func (s *wafFormatterService) ConvertToWildcardDomain(ctx context.Context, domain string) (string, error) {
  161. // 1. 使用 EffectiveTLDPlusOne 获取可注册域名部分。
  162. // 例如,对于 "www.google.com",这将返回 "google.com"。
  163. // 对于 "a.b.c.tokyo.jp",这将返回 "c.tokyo.jp"。
  164. if domain == "" {
  165. return "", nil
  166. }
  167. registrableDomain, err := publicsuffix.EffectiveTLDPlusOne(domain)
  168. if err != nil {
  169. s.logger.Error("无效的域名", zap.String("domain", domain), zap.Error(err))
  170. // 如果域名无效(如 IP 地址、localhost),则返回错误。
  171. return "", nil
  172. }
  173. // 2. 比较原始域名和可注册域名。
  174. // 如果它们不相等,说明原始域名包含子域名。
  175. if domain != registrableDomain {
  176. // 3. 如果存在子域名,则用 "*." 加上可注册域名来构造通配符域名。
  177. return registrableDomain, nil
  178. }
  179. // 4. 如果原始域名和可注册域名相同(例如,输入就是 "google.com"),
  180. // 则说明没有子域名可替换,直接返回原始域名。
  181. return domain, nil
  182. }
  183. func (s *wafFormatterService) AppendWafIp(ctx context.Context, req []string, returnSourceIp string) ([]v1.IpInfo, error) {
  184. var ips []v1.IpInfo
  185. for _, v := range req {
  186. ips = append(ips, v1.IpInfo{
  187. FType: "0",
  188. FStartIp: v,
  189. FEndIp: v,
  190. FRemark: "宁波高防IP过白",
  191. FServerIp: returnSourceIp,
  192. })
  193. }
  194. return ips, nil
  195. }
  196. func (s *wafFormatterService) AppendWafIpByRemovePort(ctx context.Context, req []string) ([]v1.IpInfo, error) {
  197. var ips []v1.IpInfo
  198. for _, v := range req {
  199. ip, _, err := net.SplitHostPort(v)
  200. if err != nil {
  201. return nil, err
  202. }
  203. ips = append(ips, v1.IpInfo{
  204. FType: "0",
  205. FStartIp: ip,
  206. FEndIp: ip,
  207. FRemark: "宁波高防IP过白",
  208. FServerIp: "",
  209. })
  210. }
  211. return ips, nil
  212. }
  213. func (s *wafFormatterService) WashIps(ctx context.Context, req []string) ([]string, error) {
  214. var res []string
  215. for _, v := range req {
  216. res = append(res, v)
  217. }
  218. return res, nil
  219. }
  220. // publishDomainWhitelistTask is a helper function to publish domain whitelist tasks to RabbitMQ.
  221. // It can handle different actions like "add" or "del".
  222. func (s *wafFormatterService) PublishDomainWhitelistTask(domain, ip, action string) {
  223. // Define message payload, including the action
  224. type domainTaskPayload struct {
  225. Domain string `json:"domain"`
  226. Ip string `json:"ip"`
  227. Action string `json:"action"`
  228. }
  229. payload := domainTaskPayload{
  230. Domain: domain,
  231. Ip: ip,
  232. Action: action,
  233. }
  234. // Serialize the message
  235. msgBody, err := json.Marshal(payload)
  236. if err != nil {
  237. s.logger.Error("Failed to serialize domain whitelist task message", zap.Error(err), zap.String("domain", domain), zap.String("ip", ip), zap.String("action", action))
  238. return
  239. }
  240. // Get task configuration
  241. taskCfg, ok := s.mq.GetTaskConfig("domain_whitelist")
  242. if !ok {
  243. s.logger.Error("Failed to get 'domain_whitelist' task configuration")
  244. return
  245. }
  246. // Construct the routing key dynamically based on the action
  247. routingKey := fmt.Sprintf("whitelist.domain.%s", action)
  248. // Construct the amqp.Publishing message
  249. publishingMsg := amqp.Publishing{
  250. ContentType: "application/json",
  251. Body: msgBody,
  252. DeliveryMode: amqp.Persistent, // Persistent message
  253. }
  254. // Publish the message
  255. err = s.mq.PublishWithCh(taskCfg.Exchange, routingKey, publishingMsg)
  256. if err != nil {
  257. s.logger.Error("发布 域名 白名单任务到 MQ 失败", zap.Error(err), zap.String("domain", domain), zap.String("action", action))
  258. } else {
  259. s.logger.Info("成功将 域名 白名单任务发布到 MQ", zap.String("domain", domain), zap.String("action", action))
  260. }
  261. }
  262. func (s *wafFormatterService) PublishIpWhitelistTask(ips []string, action string, returnSourceIp string, color string) {
  263. // Define message payload, including the action
  264. type ipTaskPayload struct {
  265. Ips []string `json:"ips"`
  266. Action string `json:"action"`
  267. ReturnSourceIp string `json:"return_source_ip"`
  268. Color string `json:"color"`
  269. }
  270. payload := ipTaskPayload{
  271. Ips: ips,
  272. Action: action,
  273. ReturnSourceIp: returnSourceIp,
  274. Color: color,
  275. }
  276. // Serialize the message
  277. msgBody, err := json.Marshal(payload)
  278. if err != nil {
  279. s.logger.Error("序列化 IP 白名单任务消息失败", zap.Error(err), zap.Any("IPs", ips), zap.String("action", action), zap.String("color", color))
  280. return
  281. }
  282. // Get task configuration
  283. taskCfg, ok := s.mq.GetTaskConfig("ip_white")
  284. if !ok {
  285. s.logger.Error("无法获取“ip_white”任务配置")
  286. return
  287. }
  288. // Construct the routing key dynamically based on the action
  289. routingKey := fmt.Sprintf("task.ip_white.%s", action)
  290. // Construct the amqp.Publishing message
  291. publishingMsg := amqp.Publishing{
  292. ContentType: "application/json",
  293. Body: msgBody,
  294. DeliveryMode: amqp.Persistent, // Persistent message
  295. }
  296. // Publish the message
  297. err = s.mq.PublishWithCh(taskCfg.Exchange, routingKey, publishingMsg)
  298. if err != nil {
  299. s.logger.Error("发布 IP 白名单任务到 MQ 失败", zap.Error(err), zap.String("action", action), zap.String("color", color))
  300. } else {
  301. s.logger.Info("成功将 IP 白名单任务发布到 MQ", zap.String("action", action), zap.String("color", color))
  302. }
  303. }
  304. func (s *wafFormatterService) findIpDifferences(oldIps, newIps []string) ([]string, []string) {
  305. // 使用 map 实现 set,用于快速查找
  306. oldIpsSet := make(map[string]struct{}, len(oldIps))
  307. for _, ip := range oldIps {
  308. oldIpsSet[ip] = struct{}{}
  309. }
  310. newIpsSet := make(map[string]struct{}, len(newIps))
  311. for _, ip := range newIps {
  312. newIpsSet[ip] = struct{}{}
  313. }
  314. var addedIps []string
  315. // 查找新增的 IP:存在于 newIpsSet 但不存在于 oldIpsSet
  316. for ip := range newIpsSet {
  317. if _, found := oldIpsSet[ip]; !found {
  318. addedIps = append(addedIps, ip)
  319. }
  320. }
  321. var removedIps []string
  322. // 查找移除的 IP:存在于 oldIpsSet 但不存在于 newIpsSet
  323. for ip := range oldIpsSet {
  324. if _, found := newIpsSet[ip]; !found {
  325. removedIps = append(removedIps, ip)
  326. }
  327. }
  328. return addedIps, removedIps
  329. }
  330. func (s *wafFormatterService) WashDeleteWafIp(ctx context.Context, backendList []string) ([]string, error) {
  331. var res []string
  332. for _, v := range backendList {
  333. ip, _, err := net.SplitHostPort(v)
  334. if err != nil {
  335. return nil, err
  336. }
  337. res = append(res, ip)
  338. }
  339. return res, nil
  340. }
  341. func (s *wafFormatterService) WashEditWafIp(ctx context.Context, newBackendList []string, oldBackendList []string) ([]string, []string, error) {
  342. var oldIps []string
  343. var newIps []string
  344. for _, v := range oldBackendList {
  345. ip, _, err := net.SplitHostPort(v)
  346. if err != nil {
  347. return nil, nil, err
  348. }
  349. oldIps = append(oldIps, ip)
  350. }
  351. if newBackendList != nil {
  352. for _, v := range newBackendList {
  353. ip, _, err := net.SplitHostPort(v)
  354. if err != nil {
  355. return nil, nil, err
  356. }
  357. newIps = append(newIps, ip)
  358. }
  359. }
  360. addedIps, removedIps := s.findIpDifferences(oldIps, newIps)
  361. return addedIps, removedIps, nil
  362. }
  363. func (s *wafFormatterService) AddOrigin(ctx context.Context, req v1.WebJson) (int64, error) {
  364. ip, port, err := net.SplitHostPort(req.BackendList)
  365. if err != nil {
  366. return 0, fmt.Errorf("无效的后端地址: %s", err)
  367. }
  368. addr := v1.Addr{
  369. Protocol: req.ApiType,
  370. Host: ip,
  371. Port: port,
  372. }
  373. id, err := s.cdn.CreateOrigin(ctx, v1.Origin{
  374. Addr: addr,
  375. Weight: 10,
  376. Description: req.Comment,
  377. Host: req.Host,
  378. IsOn: true,
  379. TlsSecurityVerifyMode: "auto",
  380. })
  381. if err != nil {
  382. return 0, err
  383. }
  384. return id, nil
  385. }
  386. // 获取ip数量等于1的源站过白ip
  387. func (s *wafFormatterService) WashDelIps(ctx context.Context, ips []string) ([]string, error) {
  388. var udpIpCounts, tcpIpCounts, webIpCounts []v1.IpCountResult
  389. g, gCtx := errgroup.WithContext(ctx)
  390. // 1. 查询 IP 的数量
  391. g.Go(func() error {
  392. var err error
  393. udpIpCounts, err = s.udpForWardingRep.GetIpCountByIp(gCtx, ips)
  394. if err != nil {
  395. return fmt.Errorf("in udp repository: %w", err)
  396. }
  397. return nil
  398. })
  399. g.Go(func() error {
  400. var err error
  401. tcpIpCounts, err = s.tcpforwardingRep.GetIpCountByIp(gCtx, ips)
  402. if err != nil {
  403. return fmt.Errorf("in tcp repository: %w", err)
  404. }
  405. return nil
  406. })
  407. g.Go(func() error {
  408. var err error
  409. webIpCounts, err = s.webForwardingRep.GetIpCountByIp(gCtx, ips)
  410. if err != nil {
  411. return fmt.Errorf("in web repository: %w", err)
  412. }
  413. return nil
  414. })
  415. if err := g.Wait(); err != nil {
  416. return nil, err
  417. }
  418. // 2. 汇总所有计数结果
  419. totalCountMap := make(map[string]int)
  420. // 将多个 for 循环合并到一个函数中,可以显得更整洁(可选)
  421. accumulateCounts := func(counts []v1.IpCountResult) {
  422. for _, result := range counts {
  423. totalCountMap[result.Ip] += result.Count
  424. }
  425. }
  426. accumulateCounts(udpIpCounts)
  427. accumulateCounts(tcpIpCounts)
  428. accumulateCounts(webIpCounts)
  429. // 3. 筛选出总引用数小于 2 的 IP
  430. var ipsToDelist []string
  431. for _, ip := range ips {
  432. if totalCountMap[ip] < 2 {
  433. ipsToDelist = append(ipsToDelist, ip)
  434. }
  435. }
  436. return ipsToDelist, nil
  437. }
  438. // 判断域名是否为 中文域名,如果是,转换为 Punycode
  439. func (s *wafFormatterService) ConvertToPunycodeIfIDN(ctx context.Context, domain string) (isIDN bool, punycodeDomain string, err error) {
  440. // 使用 idna.ToASCII 将域名转换为 Punycode。
  441. // 这个函数同时会根据 IDNA 规范验证域名的合法性。
  442. punycodeDomain, err = idna.ToASCII(domain)
  443. if err != nil {
  444. // 如果转换出错,说明域名格式不符合 IDNA 标准。
  445. return false, "", fmt.Errorf("域名 '%s' 格式无效: %v", domain, err)
  446. }
  447. // 判断是否为 IDN 的关键:
  448. // 比较转换后的 Punycode 域名和原始域名(忽略大小写)。
  449. // 如果不相等,说明原始域名包含非 ASCII 字符,即为 IDN。
  450. isIDN = !strings.EqualFold(domain, punycodeDomain)
  451. return isIDN, punycodeDomain, nil
  452. }
  453. func (s *wafFormatterService) ParseCert(ctx context.Context, httpsCert string, httpKey string) (serverName string, commonName []string, DNSNames []string, before int64, after int64, isSelfSigned bool, err error) {
  454. cert, err := tls.X509KeyPair([]byte(httpsCert), []byte(httpKey))
  455. if err != nil {
  456. return "", nil, nil, 0, 0, false, fmt.Errorf("无法从字符串加载密钥对: %v", err)
  457. }
  458. if len(cert.Certificate) == 0 {
  459. return "", nil, nil, 0, 0, false, fmt.Errorf("提供的证书数据中没有找到证书。")
  460. }
  461. // 解析第一个证书(通常是叶子证书)
  462. x509Cert, err := x509.ParseCertificate(cert.Certificate[0])
  463. if err != nil {
  464. return "", nil, nil, 0, 0, false, fmt.Errorf("无法解析证书: %v", err)
  465. }
  466. // 1. 获取 Common Name (通用名称)
  467. // Common Name 位于 Subject 字段内. [1]
  468. serverName = x509Cert.Subject.CommonName
  469. // 2. 获取 DNS Names (备用主题名称中的DNS条目)
  470. // DNS Names 直接是证书结构体的一个字段. [1]
  471. DNSNames = x509Cert.DNSNames
  472. // 检查证书是否为自签名
  473. // 判断条件:颁发者(Issuer)和主题(Subject)相同,并且证书的签名可以由其自身的公钥验证
  474. if err := x509Cert.CheckSignatureFrom(x509Cert); err == nil {
  475. isSelfSigned = true
  476. }
  477. // 将CommonName放入一个切片,以匹配[]string的类型要求
  478. var commonNames []string
  479. if x509Cert.Subject.CommonName != "" {
  480. commonNames = []string{x509Cert.Subject.CommonName}
  481. }
  482. return serverName, commonNames, DNSNames, x509Cert.NotBefore.Unix(), x509Cert.NotAfter.Unix(), isSelfSigned, nil
  483. }
  484. // HandleSSLPolicy 负责处理SSL证书的完整生命周期:解析、上传到CDN并创建或更新SSL策略。
  485. // 它封装了与CDN服务交互的复杂性,并返回一个可用的SSL策略ID。
  486. func (s *wafFormatterService) AddSSLPolicy(ctx context.Context, req v1.SSL) (sslPolicyId int64, sslCertId int64, err error) {
  487. // 1. 解析证书文件,提取元数据
  488. serverName, commonNames, DNSNames, before, after, isSelfSigned, err := s.ParseCert(ctx, req.CertData, req.KeyData)
  489. if err != nil {
  490. return 0, 0, fmt.Errorf("解析证书失败: %w", err)
  491. }
  492. // 2. 将证书添加到CDN提供商
  493. // 这是获取可以在策略中引用的 `sslCertId` 的前提
  494. newSslCertId, err := s.cdn.AddSSLCert(ctx, v1.SSlCert{
  495. IsOn: true,
  496. UserId: int64(req.CdnUserId),
  497. Name: req.Domain, // 使用域名作为证书名称
  498. ServerName: serverName,
  499. Description: req.Description,
  500. CertData: []byte(req.CertData),
  501. KeyData: []byte(req.KeyData),
  502. TimeBeginAt: before,
  503. TimeEndAt: after,
  504. DnsNames: DNSNames,
  505. CommonNames: commonNames,
  506. IsSelfSigned: isSelfSigned,
  507. })
  508. if err != nil {
  509. return 0, 0, fmt.Errorf("添加SSL证书到CDN失败: %w", err)
  510. }
  511. // 3. 基于获取到的证书ID,创建SSL策略
  512. if newSslCertId != 0 {
  513. // 构造策略中引用的证书列表
  514. type sslCerts struct {
  515. IsOn bool `json:"isOn" form:"isOn"`
  516. CertId int64 `json:"certId" form:"certId"`
  517. }
  518. var sslCertsSlice []sslCerts
  519. sslCertsSlice = append(sslCertsSlice, sslCerts{
  520. IsOn: true,
  521. CertId: newSslCertId,
  522. })
  523. sslCertsJson, err := json.Marshal(sslCertsSlice)
  524. if err != nil {
  525. return 0, 0, fmt.Errorf("序列化SSL证书引用失败: %w", err)
  526. }
  527. // 调用CDN服务创建策略
  528. newSslPolicyId, err := s.cdn.AddSSLPolicy(ctx, v1.AddSSLPolicy{
  529. Http2Enabled: true,
  530. SslCertsJSON: sslCertsJson,
  531. MinVersion: "TLS 1.1", // 可根据安全要求调整
  532. })
  533. if err != nil {
  534. // 如果策略创建失败,需要考虑回滚或记录错误,这里直接返回错误
  535. return 0, 0, fmt.Errorf("通过CDN添加SSL策略失败: %w", err)
  536. }
  537. return newSslPolicyId, newSslCertId, nil
  538. }
  539. return 0, 0, fmt.Errorf("未能创建有效的SSL证书ID,无法继续创建策略")
  540. }
  541. func (s *wafFormatterService) EditSSL(ctx context.Context, req v1.SSL) error {
  542. oldData, err := s.webForwardingRep.GetWebForwarding(ctx, req.WebId)
  543. if err != nil {
  544. return err
  545. }
  546. if oldData.HttpsKey != req.KeyData || oldData.HttpsCert != req.CertData {
  547. serverName, commonNames, DNSNames, before, after, isSelfSigned, err := s.ParseCert(ctx, req.CertData, req.KeyData)
  548. if err != nil {
  549. return fmt.Errorf("解析证书失败: %w", err)
  550. }
  551. sslCert, err := s.webForwardingRep.GetSslCertId(ctx, oldData.SslCertId)
  552. if err != nil {
  553. return fmt.Errorf("获取SSL证书失败: %w", err)
  554. }
  555. for _, v := range sslCert {
  556. err = s.cdn.EditSSLCert(ctx, v1.SSlCert{
  557. SslCertId: v.CertId,
  558. IsOn: v.IsOn,
  559. UserId: int64(req.CdnUserId),
  560. Name: req.Domain, // 使用域名作为证书名称
  561. ServerName: serverName,
  562. Description: req.Description,
  563. CertData: []byte(req.CertData),
  564. KeyData: []byte(req.KeyData),
  565. TimeBeginAt: before,
  566. TimeEndAt: after,
  567. DnsNames: DNSNames,
  568. CommonNames: commonNames,
  569. IsSelfSigned: isSelfSigned,
  570. })
  571. if err != nil {
  572. return fmt.Errorf("更新SSL证书失败: %w", err)
  573. }
  574. }
  575. return nil
  576. }
  577. return nil
  578. }