This restructures dbcore (now the db package) and jwtcore (now the jwt package) to use a single struct. There is now a state package, which contains a struct with the full application state. After this, instead of initializing the API routes directly in the main function, the state object gets passed, and the API routes get initialized with their accompanying code. One fix done to reduce memory usage and increase speed is that the validator object is now persistent across requests, instead of recreating it each time. This should speed things up slightly, and improve memory usage. One additional chore done is that the database models have been moved to be a seperate file from the DB initialization itself.
184 lines
4.8 KiB
Go
184 lines
4.8 KiB
Go
package proxies
|
|
|
|
import (
|
|
"fmt"
|
|
"net/http"
|
|
"strings"
|
|
|
|
"git.terah.dev/imterah/hermes/backend/api/db"
|
|
"git.terah.dev/imterah/hermes/backend/api/permissions"
|
|
"git.terah.dev/imterah/hermes/backend/api/state"
|
|
"github.com/charmbracelet/log"
|
|
"github.com/gin-gonic/gin"
|
|
)
|
|
|
|
type ProxyLookupRequest struct {
|
|
Token string `validate:"required" json:"token"`
|
|
Id *uint `json:"id"`
|
|
Name *string `json:"name"`
|
|
Description *string `json:"description"`
|
|
Protocol *string `json:"protocol"`
|
|
SourceIP *string `json:"sourceIP"`
|
|
SourcePort *uint16 `json:"sourcePort"`
|
|
DestinationPort *uint16 `json:"destPort"`
|
|
ProviderID *uint `json:"providerID"`
|
|
AutoStart *bool `json:"autoStart"`
|
|
}
|
|
|
|
type SanitizedProxy struct {
|
|
Id uint `json:"id"`
|
|
Name string `json:"name"`
|
|
Description *string `json:"description,omitempty"`
|
|
Protcol string `json:"protocol"`
|
|
SourceIP string `json:"sourceIP"`
|
|
SourcePort uint16 `json:"sourcePort"`
|
|
DestinationPort uint16 `json:"destPort"`
|
|
ProviderID uint `json:"providerID"`
|
|
AutoStart bool `json:"autoStart"`
|
|
}
|
|
|
|
type ProxyLookupResponse struct {
|
|
Success bool `json:"success"`
|
|
Data []*SanitizedProxy `json:"data"`
|
|
}
|
|
|
|
func SetupLookupProxy(state *state.State) {
|
|
state.Engine.POST("/api/v1/forward/lookup", func(c *gin.Context) {
|
|
var req ProxyLookupRequest
|
|
|
|
if err := c.BindJSON(&req); err != nil {
|
|
c.JSON(http.StatusBadRequest, gin.H{
|
|
"error": fmt.Sprintf("Failed to parse body: %s", err.Error()),
|
|
})
|
|
|
|
return
|
|
}
|
|
|
|
if err := state.Validator.Struct(&req); err != nil {
|
|
c.JSON(http.StatusBadRequest, gin.H{
|
|
"error": fmt.Sprintf("Failed to validate body: %s", err.Error()),
|
|
})
|
|
|
|
return
|
|
}
|
|
|
|
user, err := state.JWT.GetUserFromJWT(req.Token)
|
|
|
|
if err != nil {
|
|
if err.Error() == "token is expired" || err.Error() == "user does not exist" {
|
|
c.JSON(http.StatusForbidden, gin.H{
|
|
"error": err.Error(),
|
|
})
|
|
|
|
return
|
|
} else {
|
|
log.Warnf("Failed to get user from the provided JWT token: %s", err.Error())
|
|
|
|
c.JSON(http.StatusInternalServerError, gin.H{
|
|
"error": "Failed to parse token",
|
|
})
|
|
|
|
return
|
|
}
|
|
}
|
|
|
|
if !permissions.UserHasPermission(user, "routes.visible") {
|
|
c.JSON(http.StatusForbidden, gin.H{
|
|
"error": "Missing permissions",
|
|
})
|
|
|
|
return
|
|
}
|
|
|
|
if req.Protocol != nil {
|
|
if *req.Protocol != "tcp" && *req.Protocol != "udp" {
|
|
c.JSON(http.StatusBadRequest, gin.H{
|
|
"error": "Protocol specified in body must either be 'tcp' or 'udp'",
|
|
})
|
|
|
|
return
|
|
}
|
|
}
|
|
|
|
proxies := []db.Proxy{}
|
|
|
|
queryString := []string{}
|
|
queryParameters := []interface{}{}
|
|
|
|
if req.Id != nil {
|
|
queryString = append(queryString, "id = ?")
|
|
queryParameters = append(queryParameters, req.Id)
|
|
}
|
|
|
|
if req.Name != nil {
|
|
queryString = append(queryString, "name = ?")
|
|
queryParameters = append(queryParameters, req.Name)
|
|
}
|
|
|
|
if req.Description != nil {
|
|
queryString = append(queryString, "description = ?")
|
|
queryParameters = append(queryParameters, req.Description)
|
|
}
|
|
|
|
if req.SourceIP != nil {
|
|
queryString = append(queryString, "name = ?")
|
|
queryParameters = append(queryParameters, req.Name)
|
|
}
|
|
|
|
if req.SourcePort != nil {
|
|
queryString = append(queryString, "source_port = ?")
|
|
queryParameters = append(queryParameters, req.SourcePort)
|
|
}
|
|
|
|
if req.DestinationPort != nil {
|
|
queryString = append(queryString, "destination_port = ?")
|
|
queryParameters = append(queryParameters, req.DestinationPort)
|
|
}
|
|
|
|
if req.ProviderID != nil {
|
|
queryString = append(queryString, "backend_id = ?")
|
|
queryParameters = append(queryParameters, req.ProviderID)
|
|
}
|
|
|
|
if req.AutoStart != nil {
|
|
queryString = append(queryString, "auto_start = ?")
|
|
queryParameters = append(queryParameters, req.AutoStart)
|
|
}
|
|
|
|
if req.Protocol != nil {
|
|
queryString = append(queryString, "protocol = ?")
|
|
queryParameters = append(queryParameters, req.Protocol)
|
|
}
|
|
|
|
if err := state.DB.DB.Where(strings.Join(queryString, " AND "), queryParameters...).Find(&proxies).Error; err != nil {
|
|
log.Warnf("failed to get proxies: %s", err.Error())
|
|
|
|
c.JSON(http.StatusInternalServerError, gin.H{
|
|
"error": "Failed to get proxies",
|
|
})
|
|
|
|
return
|
|
}
|
|
|
|
sanitizedProxies := make([]*SanitizedProxy, len(proxies))
|
|
|
|
for proxyIndex, proxy := range proxies {
|
|
sanitizedProxies[proxyIndex] = &SanitizedProxy{
|
|
Id: proxy.ID,
|
|
Name: proxy.Name,
|
|
Description: proxy.Description,
|
|
Protcol: proxy.Protocol,
|
|
SourceIP: proxy.SourceIP,
|
|
SourcePort: proxy.SourcePort,
|
|
DestinationPort: proxy.DestinationPort,
|
|
ProviderID: proxy.BackendID,
|
|
AutoStart: proxy.AutoStart,
|
|
}
|
|
}
|
|
|
|
c.JSON(http.StatusOK, &ProxyLookupResponse{
|
|
Success: true,
|
|
Data: sanitizedProxies,
|
|
})
|
|
})
|
|
}
|