-
Notifications
You must be signed in to change notification settings - Fork 0
/
ip-extractor.go
104 lines (86 loc) · 2.17 KB
/
ip-extractor.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
package goautowp
import (
"context"
"errors"
"net"
"github.com/autowp/goautowp/ban"
"github.com/autowp/goautowp/users"
"github.com/casbin/casbin"
"github.com/sirupsen/logrus"
"google.golang.org/protobuf/types/known/timestamppb"
)
type IPExtractor struct {
enforcer *casbin.Enforcer
banRepository *ban.Repository
userRepository *users.Repository
userExtractor *UserExtractor
}
func NewIPExtractor(
enforcer *casbin.Enforcer,
banRepository *ban.Repository,
userRepository *users.Repository,
userExtractor *UserExtractor,
) *IPExtractor {
return &IPExtractor{
enforcer: enforcer,
banRepository: banRepository,
userRepository: userRepository,
userExtractor: userExtractor,
}
}
func (s *IPExtractor) Extract(
ctx context.Context, ip net.IP, fields map[string]bool, userID int64, role string,
) (*APIIP, error) {
result := APIIP{
Address: ip.String(),
}
_, ok := fields["hostname"]
if ok {
host, err := net.LookupAddr(ip.String())
if err != nil {
logrus.Errorf("LookupAddr error: %v", err.Error())
}
if len(host) > 0 {
result.Hostname = host[0]
}
}
_, ok = fields["blacklist"]
if ok {
canView := len(role) > 0 && s.enforcer.Enforce(role, "global", "moderate")
if canView {
result.Blacklist = nil
banItem, err := s.banRepository.Get(ctx, ip)
if err != nil && !errors.Is(err, ban.ErrBanItemNotFound) {
return nil, err
}
if banItem != nil {
result.Blacklist = &APIBanItem{
Until: timestamppb.New(banItem.Until),
ByUserId: banItem.ByUserID,
ByUser: nil,
Reason: banItem.Reason,
}
user, err := s.userRepository.User(ctx, users.GetUsersOptions{ID: banItem.ByUserID})
if err != nil && !errors.Is(err, users.ErrUserNotFound) {
return nil, err
}
if user != nil {
apiUser, err := s.userExtractor.Extract(ctx, user, nil, userID, role)
if err != nil {
return nil, err
}
result.Blacklist.ByUser = apiUser
}
}
}
}
_, ok = fields["rights"]
if ok {
canBan := len(role) > 0 && s.enforcer.Enforce(role, "user", "ban")
result.Rights = &APIIPRights{
AddToBlacklist: canBan,
RemoveFromBlacklist: canBan,
}
}
return &result, nil
}