Added Firewall

This commit is contained in:
Eduard Urbach 2017-07-20 12:39:47 +02:00
parent 43a58b8f46
commit 0e2fec0d1b
2 changed files with 80 additions and 0 deletions

View File

@ -142,6 +142,7 @@ func configure(app *aero.Application) *aero.Application {
app.Get("/api/paypal/payment/create", paypal.CreatePayment)
// Middleware
app.Use(middleware.Firewall())
app.Use(middleware.Log())
app.Use(middleware.Session())
app.Use(middleware.UserInfo())

79
middleware/Firewall.go Normal file
View File

@ -0,0 +1,79 @@
package middleware
import (
"strings"
"time"
"github.com/aerogo/aero"
"github.com/animenotifier/notify.moe/utils"
cache "github.com/patrickmn/go-cache"
)
const requestThreshold = 10
var ipToStats = cache.New(30*time.Minute, 15*time.Minute)
// IPStats captures the statistics for a single IP.
type IPStats struct {
Requests []string
}
// Firewall middleware detects malicious requests.
func Firewall() aero.Middleware {
return func(ctx *aero.Context, next func()) {
var stats *IPStats
ip := ctx.RealIP()
// Allow localhost
// if ip == "127.0.0.1" {
// next()
// return
// }
statsObj, found := ipToStats.Get(ip)
if found {
stats = statsObj.(*IPStats)
} else {
stats = &IPStats{
Requests: []string{},
}
ipToStats.Set(ip, stats, cache.DefaultExpiration)
}
// Add requested URI to the list of requests
stats.Requests = append(stats.Requests, ctx.URI())
if len(stats.Requests) > requestThreshold {
stats.Requests = stats.Requests[len(stats.Requests)-requestThreshold:]
for _, uri := range stats.Requests {
// Allow request
if strings.Contains(uri, "/_/") || strings.Contains(uri, "/api/") || strings.Contains(uri, "/scripts") || strings.Contains(uri, "/service-worker") || strings.Contains(uri, "/favicon.ico") || strings.Contains(uri, "/extension/embed") {
next()
return
}
}
// Allow logged in users
if ctx.HasSession() {
user := utils.GetUser(ctx)
if user != nil {
// Allow request
next()
return
}
}
// Disallow request
request.Error("[guest]", ip, "BLOCKED BY FIREWALL", ctx.URI())
return
}
// Allow the request if the number of requests done by the IP is below the threshold
next()
}
}