This commit is contained in:
413
main.go
413
main.go
@@ -10,7 +10,6 @@ import (
|
||||
"net/netip"
|
||||
"strings"
|
||||
"sync"
|
||||
"testing"
|
||||
"time"
|
||||
|
||||
"github.com/prometheus/client_golang/prometheus"
|
||||
@@ -18,75 +17,21 @@ import (
|
||||
"github.com/redis/go-redis/v9"
|
||||
)
|
||||
|
||||
var (
|
||||
checkRequests = prometheus.NewCounter(
|
||||
prometheus.CounterOpts{
|
||||
Name: "ipcheck_requests_total",
|
||||
Help: "Total number of IP check requests",
|
||||
},
|
||||
)
|
||||
checkBlocked = prometheus.NewCounter(
|
||||
prometheus.CounterOpts{
|
||||
Name: "ipcheck_blocked_total",
|
||||
Help: "Total number of blocked IPs",
|
||||
},
|
||||
)
|
||||
checkWhitelist = prometheus.NewCounter(
|
||||
prometheus.CounterOpts{
|
||||
Name: "ipcheck_whitelisted_total",
|
||||
Help: "Total number of whitelisted IPs",
|
||||
},
|
||||
)
|
||||
)
|
||||
|
||||
func init() {
|
||||
prometheus.MustRegister(checkRequests, checkBlocked, checkWhitelist)
|
||||
}
|
||||
|
||||
func handleCheck(w http.ResponseWriter, r *http.Request) {
|
||||
checkRequests.Inc()
|
||||
|
||||
ipStr := strings.TrimPrefix(r.URL.Path, "/check/")
|
||||
ip, err := netip.ParseAddr(ipStr)
|
||||
if err != nil {
|
||||
http.Error(w, "invalid IP", http.StatusBadRequest)
|
||||
return
|
||||
}
|
||||
|
||||
cats := []string{"generic", "test"}
|
||||
if q := r.URL.Query().Get("cats"); q != "" {
|
||||
cats = strings.Split(q, ",")
|
||||
}
|
||||
|
||||
matches, err := checkIP(ip, cats)
|
||||
if err != nil {
|
||||
http.Error(w, "internal error", http.StatusInternalServerError)
|
||||
return
|
||||
}
|
||||
|
||||
if len(matches) == 0 {
|
||||
wl, _ := rdb.Exists(ctx, "wl:"+ip.String()).Result()
|
||||
if wl > 0 {
|
||||
checkWhitelist.Inc()
|
||||
}
|
||||
} else {
|
||||
checkBlocked.Inc()
|
||||
}
|
||||
|
||||
writeJSON(w, map[string]any{
|
||||
"ip": ipStr,
|
||||
"blocked": len(matches) > 0,
|
||||
"categories": matches,
|
||||
})
|
||||
}
|
||||
|
||||
// Redis Client und Context
|
||||
// Redis + Context
|
||||
var ctx = context.Background()
|
||||
var rdb = redis.NewClient(&redis.Options{
|
||||
Addr: "10.10.5.249:6379",
|
||||
})
|
||||
|
||||
// Präfix-Cache (pro Kategorie)
|
||||
// URLs der Blocklisten
|
||||
var blocklistURLs = map[string]string{
|
||||
"firehol": "https://raw.githubusercontent.com/firehol/blocklist-ipsets/master/firehol_level1.netset",
|
||||
"bitwire": "https://raw.githubusercontent.com/bitwire-it/ipblocklist/refs/heads/main/ip-list.txt",
|
||||
"RU": "https://ipv64.net/blocklists/countries/ipv64_blocklist_RU.txt",
|
||||
"CN": "https://ipv64.net/blocklists/countries/ipv64_blocklist_CN.txt",
|
||||
}
|
||||
|
||||
// Präfix-Cache
|
||||
type prefixCacheEntry struct {
|
||||
prefixes []netip.Prefix
|
||||
expireAt time.Time
|
||||
@@ -97,9 +42,172 @@ var (
|
||||
prefixCacheMu sync.Mutex
|
||||
)
|
||||
|
||||
// Prüfen der IP
|
||||
// Prometheus Metriken
|
||||
var (
|
||||
checkRequests = prometheus.NewCounter(prometheus.CounterOpts{
|
||||
Name: "ipcheck_requests_total",
|
||||
Help: "Total IP check requests",
|
||||
})
|
||||
checkBlocked = prometheus.NewCounter(prometheus.CounterOpts{
|
||||
Name: "ipcheck_blocked_total",
|
||||
Help: "Total blocked IPs",
|
||||
})
|
||||
checkWhitelist = prometheus.NewCounter(prometheus.CounterOpts{
|
||||
Name: "ipcheck_whitelisted_total",
|
||||
Help: "Total whitelisted IPs",
|
||||
})
|
||||
)
|
||||
|
||||
func init() {
|
||||
prometheus.MustRegister(checkRequests, checkBlocked, checkWhitelist)
|
||||
}
|
||||
|
||||
// Main
|
||||
func main() {
|
||||
// Import Blocklisten
|
||||
if err := importBlocklists(); err != nil {
|
||||
fmt.Println("Blocklisten-Import FEHLGESCHLAGEN:", err)
|
||||
return
|
||||
}
|
||||
|
||||
// Server
|
||||
http.HandleFunc("/check/", handleCheck)
|
||||
http.Handle("/metrics", promhttp.Handler())
|
||||
|
||||
fmt.Println("Server läuft auf :8080")
|
||||
http.ListenAndServe(":8080", nil)
|
||||
}
|
||||
|
||||
// Import-Logik
|
||||
func importBlocklists() error {
|
||||
var wg sync.WaitGroup
|
||||
errCh := make(chan error, len(blocklistURLs))
|
||||
|
||||
for cat, url := range blocklistURLs {
|
||||
wg.Add(1)
|
||||
go func(c, u string) {
|
||||
defer wg.Done()
|
||||
if err := importCategory(c, u); err != nil {
|
||||
errCh <- fmt.Errorf("%s: %v", c, err)
|
||||
}
|
||||
}(cat, url)
|
||||
}
|
||||
|
||||
wg.Wait()
|
||||
close(errCh)
|
||||
|
||||
for err := range errCh {
|
||||
fmt.Println("❌", err)
|
||||
}
|
||||
|
||||
if len(errCh) > 0 {
|
||||
return fmt.Errorf("Blocklisten-Import teilweise fehlgeschlagen")
|
||||
}
|
||||
fmt.Println("✅ Blocklisten-Import abgeschlossen")
|
||||
return nil
|
||||
}
|
||||
|
||||
func importCategory(cat, url string) error {
|
||||
fmt.Printf("⬇️ Lade %s (%s)\n", cat, url)
|
||||
resp, err := http.Get(url)
|
||||
if err != nil {
|
||||
return fmt.Errorf("HTTP-Fehler: %v", err)
|
||||
}
|
||||
defer resp.Body.Close()
|
||||
|
||||
if resp.StatusCode != 200 {
|
||||
return fmt.Errorf("HTTP %d", resp.StatusCode)
|
||||
}
|
||||
|
||||
scanner := bufio.NewScanner(resp.Body)
|
||||
pipe := rdb.Pipeline()
|
||||
count, batchCount := 0, 0
|
||||
const batchSize = 500
|
||||
|
||||
for scanner.Scan() {
|
||||
line := strings.TrimSpace(scanner.Text())
|
||||
if line == "" || strings.HasPrefix(line, "#") {
|
||||
continue
|
||||
}
|
||||
prefix, valid := normalizePrefix(line)
|
||||
if !valid {
|
||||
fmt.Printf("⚠️ Ungültig %s: %s\n", cat, line)
|
||||
continue
|
||||
}
|
||||
pipe.HSet(ctx, "bl:"+cat, prefix, 1)
|
||||
count++
|
||||
batchCount++
|
||||
if batchCount >= batchSize {
|
||||
if _, err := pipe.Exec(ctx); err != nil {
|
||||
return fmt.Errorf("Redis-Fehler: %v", err)
|
||||
}
|
||||
batchCount = 0
|
||||
}
|
||||
if count%1000 == 0 {
|
||||
fmt.Printf("📈 [%s] %d Einträge\n", cat, count)
|
||||
}
|
||||
}
|
||||
if err := scanner.Err(); err != nil {
|
||||
return fmt.Errorf("Lesefehler: %v", err)
|
||||
}
|
||||
if batchCount > 0 {
|
||||
if _, err := pipe.Exec(ctx); err != nil {
|
||||
return fmt.Errorf("Redis-Fehler final: %v", err)
|
||||
}
|
||||
}
|
||||
fmt.Printf("✅ [%s] %d Einträge importiert\n", cat, count)
|
||||
return nil
|
||||
}
|
||||
|
||||
func normalizePrefix(s string) (string, bool) {
|
||||
if !strings.Contains(s, "/") {
|
||||
ip := net.ParseIP(s)
|
||||
if ip == nil {
|
||||
return "", false
|
||||
}
|
||||
if ip.To4() != nil {
|
||||
s += "/32"
|
||||
} else {
|
||||
s += "/128"
|
||||
}
|
||||
}
|
||||
s = strings.TrimSpace(s)
|
||||
_, err := netip.ParsePrefix(s)
|
||||
return s, err == nil
|
||||
}
|
||||
|
||||
// Check-Handler
|
||||
func handleCheck(w http.ResponseWriter, r *http.Request) {
|
||||
checkRequests.Inc()
|
||||
ipStr := strings.TrimPrefix(r.URL.Path, "/check/")
|
||||
ip, err := netip.ParseAddr(ipStr)
|
||||
if err != nil {
|
||||
http.Error(w, "invalid IP", http.StatusBadRequest)
|
||||
return
|
||||
}
|
||||
cats := []string{"firehol", "bitwire", "RU", "CN"}
|
||||
matches, err := checkIP(ip, cats)
|
||||
if err != nil {
|
||||
http.Error(w, "server error", http.StatusInternalServerError)
|
||||
return
|
||||
}
|
||||
if len(matches) > 0 {
|
||||
checkBlocked.Inc()
|
||||
} else {
|
||||
wl, _ := rdb.Exists(ctx, "wl:"+ip.String()).Result()
|
||||
if wl > 0 {
|
||||
checkWhitelist.Inc()
|
||||
}
|
||||
}
|
||||
writeJSON(w, map[string]any{
|
||||
"ip": ip.String(),
|
||||
"blocked": len(matches) > 0,
|
||||
"categories": matches,
|
||||
})
|
||||
}
|
||||
|
||||
// Check-Logik
|
||||
func checkIP(ip netip.Addr, cats []string) ([]string, error) {
|
||||
// Whitelist
|
||||
wl, err := rdb.Exists(ctx, "wl:"+ip.String()).Result()
|
||||
if err != nil {
|
||||
return nil, err
|
||||
@@ -107,14 +215,12 @@ func checkIP(ip netip.Addr, cats []string) ([]string, error) {
|
||||
if wl > 0 {
|
||||
return []string{}, nil
|
||||
}
|
||||
|
||||
matches := []string{}
|
||||
for _, cat := range cats {
|
||||
prefixes, err := loadCategoryPrefixes(cat)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
for _, pfx := range prefixes {
|
||||
if pfx.Contains(ip) {
|
||||
fmt.Printf("💡 MATCH: %s in %s (%s)\n", ip, cat, pfx)
|
||||
@@ -129,194 +235,33 @@ func checkIP(ip netip.Addr, cats []string) ([]string, error) {
|
||||
func loadCategoryPrefixes(cat string) ([]netip.Prefix, error) {
|
||||
prefixCacheMu.Lock()
|
||||
defer prefixCacheMu.Unlock()
|
||||
|
||||
entry, ok := prefixCache[cat]
|
||||
if ok && time.Now().Before(entry.expireAt) {
|
||||
return entry.prefixes, nil
|
||||
}
|
||||
|
||||
// Redis HKEYS holen
|
||||
keys, err := rdb.HKeys(ctx, "bl:"+cat).Result()
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
var prefixes []netip.Prefix
|
||||
for _, k := range keys {
|
||||
k = strings.TrimSpace(k) // spaces entfernen!
|
||||
k = strings.TrimSpace(k)
|
||||
pfx, err := netip.ParsePrefix(k)
|
||||
if err == nil {
|
||||
prefixes = append(prefixes, pfx)
|
||||
} else {
|
||||
fmt.Printf("⚠️ Ungültiger Prefix in Redis (%s): %s\n", cat, k)
|
||||
fmt.Printf("⚠️ Ungültiger Redis-Prefix %s: %s\n", cat, k)
|
||||
}
|
||||
}
|
||||
|
||||
prefixCache[cat] = prefixCacheEntry{
|
||||
prefixes: prefixes,
|
||||
expireAt: time.Now().Add(1 * time.Second),
|
||||
}
|
||||
|
||||
return prefixes, nil
|
||||
}
|
||||
|
||||
// JSON-Antwort
|
||||
// JSON-Helfer
|
||||
func writeJSON(w http.ResponseWriter, v any) {
|
||||
w.Header().Set("Content-Type", "application/json")
|
||||
enc := json.NewEncoder(w)
|
||||
enc.SetIndent("", " ")
|
||||
enc.Encode(v)
|
||||
}
|
||||
|
||||
// Main + Beispiel-Setup
|
||||
func main() {
|
||||
|
||||
if 1 == 1 {
|
||||
err := importBlocklists()
|
||||
if err != nil {
|
||||
fmt.Println("Import-Fehler:", err)
|
||||
return
|
||||
}
|
||||
|
||||
fmt.Println("Blocklisten-Import abgeschlossen.")
|
||||
}
|
||||
|
||||
http.HandleFunc("/check/", handleCheck)
|
||||
http.Handle("/metrics", promhttp.Handler())
|
||||
|
||||
fmt.Println("Server läuft auf :8080")
|
||||
http.ListenAndServe(":8080", nil)
|
||||
}
|
||||
|
||||
// Tests
|
||||
|
||||
func TestCheckIP(t *testing.T) {
|
||||
// Setup Redis-Daten
|
||||
rdb.FlushDB(ctx)
|
||||
rdb.HSet(ctx, "bl:generic", map[string]string{
|
||||
"81.232.51.35/32": "1",
|
||||
"150.242.0.0/20": "1",
|
||||
})
|
||||
rdb.HSet(ctx, "bl:test", map[string]string{
|
||||
"203.9.56.0/24": "1",
|
||||
})
|
||||
rdb.Set(ctx, "wl:8.8.8.8", "1", 0)
|
||||
|
||||
tests := []struct {
|
||||
ip string
|
||||
expected []string
|
||||
}{
|
||||
{"81.232.51.35", []string{"generic"}},
|
||||
{"150.242.5.10", []string{"generic"}},
|
||||
{"203.9.56.5", []string{"test"}},
|
||||
{"8.8.8.8", []string{}}, // Whitelisted
|
||||
{"1.1.1.1", []string{}},
|
||||
}
|
||||
|
||||
for _, tc := range tests {
|
||||
addr := netip.MustParseAddr(tc.ip)
|
||||
cats := []string{"generic", "test"}
|
||||
res, err := checkIP(addr, cats)
|
||||
if err != nil {
|
||||
t.Errorf("unexpected error: %v", err)
|
||||
}
|
||||
if !equalStringSlices(res, tc.expected) {
|
||||
t.Errorf("for IP %s: expected %v, got %v", tc.ip, tc.expected, res)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
func equalStringSlices(a, b []string) bool {
|
||||
if len(a) != len(b) {
|
||||
return false
|
||||
}
|
||||
m := make(map[string]int)
|
||||
for _, v := range a {
|
||||
m[v]++
|
||||
}
|
||||
for _, v := range b {
|
||||
if m[v] == 0 {
|
||||
return false
|
||||
}
|
||||
m[v]--
|
||||
}
|
||||
return true
|
||||
}
|
||||
|
||||
// Import
|
||||
|
||||
// URL-Liste
|
||||
var blocklistURLs = map[string]string{
|
||||
"firehol": "https://raw.githubusercontent.com/firehol/blocklist-ipsets/master/firehol_level1.netset",
|
||||
"bitwire": "https://raw.githubusercontent.com/bitwire-it/ipblocklist/refs/heads/main/ip-list.txt",
|
||||
"RU": "https://ipv64.net/blocklists/countries/ipv64_blocklist_RU.txt",
|
||||
"CN": "https://ipv64.net/blocklists/countries/ipv64_blocklist_CN.txt",
|
||||
}
|
||||
|
||||
// Importer
|
||||
func importBlocklists() error {
|
||||
for category, url := range blocklistURLs {
|
||||
fmt.Printf("Lade %s (%s)...\n", category, url)
|
||||
resp, err := http.Get(url)
|
||||
if err != nil {
|
||||
return fmt.Errorf("Fehler beim Laden %s: %v", url, err)
|
||||
}
|
||||
defer resp.Body.Close()
|
||||
|
||||
if resp.StatusCode != 200 {
|
||||
return fmt.Errorf("Fehler beim Laden %s: HTTP %d", url, resp.StatusCode)
|
||||
}
|
||||
|
||||
scanner := bufio.NewScanner(resp.Body)
|
||||
count := 0
|
||||
|
||||
pipe := rdb.Pipeline()
|
||||
|
||||
for scanner.Scan() {
|
||||
line := strings.TrimSpace(scanner.Text())
|
||||
if line == "" || strings.HasPrefix(line, "#") {
|
||||
continue
|
||||
}
|
||||
|
||||
// Prüfen ob IP oder Prefix
|
||||
if isValidPrefix(line) {
|
||||
pipe.HSet(ctx, "bl:"+category, line, 1)
|
||||
count++
|
||||
} else {
|
||||
fmt.Printf("⚠️ Ungültige Zeile (%s): %s\n", category, line)
|
||||
}
|
||||
}
|
||||
if err := scanner.Err(); err != nil {
|
||||
return fmt.Errorf("Lesefehler %s: %v", url, err)
|
||||
}
|
||||
|
||||
// Commit Pipeline
|
||||
_, err = pipe.Exec(ctx)
|
||||
if err != nil {
|
||||
return fmt.Errorf("Redis-Fehler %s: %v", category, err)
|
||||
}
|
||||
|
||||
fmt.Printf("✅ %d Einträge in Kategorie %s importiert.\n", count, category)
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
// Prüft ob eine Zeile ein valides IP-Präfix ist
|
||||
func isValidPrefix(s string) bool {
|
||||
// Wenn es kein / enthält → vermutlich /32 oder /128 annehmen
|
||||
if !strings.Contains(s, "/") {
|
||||
if ip := net.ParseIP(s); ip != nil {
|
||||
if ip.To4() != nil {
|
||||
s = s + "/32"
|
||||
} else {
|
||||
s = s + "/128"
|
||||
}
|
||||
} else {
|
||||
return false
|
||||
}
|
||||
}
|
||||
|
||||
_, err := netip.ParsePrefix(s)
|
||||
return err == nil
|
||||
_ = json.NewEncoder(w).Encode(v)
|
||||
}
|
||||
|
Reference in New Issue
Block a user