violet/servers/api/target.go

106 lines
4.1 KiB
Go
Raw Permalink Normal View History

package api
import (
"encoding/json"
"github.com/1f349/mjwt"
2024-05-13 19:33:33 +01:00
"github.com/1f349/violet/logger"
2023-07-22 01:11:47 +01:00
"github.com/1f349/violet/router"
"github.com/1f349/violet/target"
"github.com/1f349/violet/utils"
"github.com/julienschmidt/httprouter"
"net/http"
"strings"
)
2023-07-13 00:15:00 +01:00
func SetupTargetApis(r *httprouter.Router, verify mjwt.Verifier, manager *router.Manager) {
// Endpoint for routes
r.GET("/route", checkAuthWithPerm(verify, "violet:route", func(rw http.ResponseWriter, req *http.Request, params httprouter.Params, b AuthClaims) {
2023-10-27 09:16:52 +01:00
domains := getDomainOwnershipClaims(b.Claims.Perms)
routes, err := manager.GetAllRoutes(domains)
2023-07-13 00:15:00 +01:00
if err != nil {
2024-05-13 19:33:33 +01:00
logger.Logger.Infof("Failed to get routes from database: %s\n", err)
2023-07-13 00:15:00 +01:00
apiError(rw, http.StatusInternalServerError, "Failed to get routes from database")
return
}
rw.WriteHeader(http.StatusOK)
2023-07-13 00:16:47 +01:00
_ = json.NewEncoder(rw).Encode(routes)
2023-07-13 00:15:00 +01:00
}))
r.POST("/route", parseJsonAndCheckOwnership[routeSource](verify, "route", func(rw http.ResponseWriter, req *http.Request, params httprouter.Params, b AuthClaims, t routeSource) {
err := manager.InsertRoute(target.RouteWithActive(t))
2023-07-13 00:15:00 +01:00
if err != nil {
2024-05-13 19:33:33 +01:00
logger.Logger.Infof("Failed to insert route into database: %s\n", err)
2023-07-13 00:15:00 +01:00
apiError(rw, http.StatusInternalServerError, "Failed to insert route into database")
return
}
manager.Compile()
}))
r.DELETE("/route", parseJsonAndCheckOwnership[sourceJson](verify, "route", func(rw http.ResponseWriter, req *http.Request, params httprouter.Params, b AuthClaims, t sourceJson) {
err := manager.DeleteRoute(t.Src)
if err != nil {
2024-05-13 19:33:33 +01:00
logger.Logger.Infof("Failed to delete route from database: %s\n", err)
2023-07-13 00:15:00 +01:00
apiError(rw, http.StatusInternalServerError, "Failed to delete route from database")
return
}
manager.Compile()
}))
2023-07-13 00:15:00 +01:00
// Endpoint for redirects
r.GET("/redirect", checkAuthWithPerm(verify, "violet:redirect", func(rw http.ResponseWriter, req *http.Request, params httprouter.Params, b AuthClaims) {
2023-10-27 09:16:52 +01:00
domains := getDomainOwnershipClaims(b.Claims.Perms)
redirects, err := manager.GetAllRedirects(domains)
2023-07-13 00:15:00 +01:00
if err != nil {
2024-05-13 19:33:33 +01:00
logger.Logger.Infof("Failed to get redirects from database: %s\n", err)
2023-07-13 00:15:00 +01:00
apiError(rw, http.StatusInternalServerError, "Failed to get redirects from database")
return
}
rw.WriteHeader(http.StatusOK)
2023-07-13 00:16:47 +01:00
_ = json.NewEncoder(rw).Encode(redirects)
2023-07-13 00:15:00 +01:00
}))
r.POST("/redirect", parseJsonAndCheckOwnership[redirectSource](verify, "redirect", func(rw http.ResponseWriter, req *http.Request, params httprouter.Params, b AuthClaims, t redirectSource) {
err := manager.InsertRedirect(target.RedirectWithActive(t))
2023-07-13 00:15:00 +01:00
if err != nil {
2024-05-13 19:33:33 +01:00
logger.Logger.Infof("Failed to insert redirect into database: %s\n", err)
2023-07-13 00:15:00 +01:00
apiError(rw, http.StatusInternalServerError, "Failed to insert redirect into database")
return
}
manager.Compile()
}))
r.DELETE("/redirect", parseJsonAndCheckOwnership[sourceJson](verify, "redirect", func(rw http.ResponseWriter, req *http.Request, params httprouter.Params, b AuthClaims, t sourceJson) {
err := manager.DeleteRedirect(t.Src)
if err != nil {
2024-05-13 19:33:33 +01:00
logger.Logger.Infof("Failed to delete redirect from database: %s\n", err)
2023-07-13 00:15:00 +01:00
apiError(rw, http.StatusInternalServerError, "Failed to delete redirect from database")
return
}
manager.Compile()
}))
}
type AuthWithJsonCallback[T any] func(rw http.ResponseWriter, req *http.Request, params httprouter.Params, b AuthClaims, t T)
func parseJsonAndCheckOwnership[T sourceGetter](verify mjwt.Verifier, t string, cb AuthWithJsonCallback[T]) httprouter.Handle {
return checkAuthWithPerm(verify, "violet:"+t, func(rw http.ResponseWriter, req *http.Request, params httprouter.Params, b AuthClaims) {
var j T
if json.NewDecoder(req.Body).Decode(&j) != nil {
apiError(rw, http.StatusBadRequest, "Invalid request body")
return
}
// check token owns this domain
host, _ := utils.SplitHostPath(j.GetSource())
if strings.IndexByte(host, ':') != -1 {
apiError(rw, http.StatusBadRequest, "Invalid route source")
return
}
if !validateDomainOwnershipClaims(host, b.Claims.Perms) {
apiError(rw, http.StatusBadRequest, "Token cannot modify the specified domain")
return
}
cb(rw, req, params, b, j)
})
}