mirror of
https://github.com/qdm12/gluetun.git
synced 2026-05-07 04:20:12 +02:00
@@ -7,6 +7,7 @@ import (
|
||||
"fmt"
|
||||
"net/http"
|
||||
"slices"
|
||||
"strings"
|
||||
|
||||
"github.com/qdm12/gosettings"
|
||||
"github.com/qdm12/gosettings/validate"
|
||||
@@ -38,22 +39,27 @@ func (s *Settings) SetDefaultRole(jsonRole string) error {
|
||||
return fmt.Errorf("validating default role: %w", err)
|
||||
}
|
||||
|
||||
authenticatedRoutes := make(map[string]struct{}, len(validRoutes))
|
||||
maxRoutes := countValidRoutes()
|
||||
|
||||
authenticatedRoutes := make(map[string]struct{}, maxRoutes)
|
||||
for _, role := range s.Roles {
|
||||
for _, route := range role.Routes {
|
||||
authenticatedRoutes[route] = struct{}{}
|
||||
}
|
||||
}
|
||||
|
||||
if len(authenticatedRoutes) == len(validRoutes) {
|
||||
if len(authenticatedRoutes) == maxRoutes {
|
||||
return nil
|
||||
}
|
||||
|
||||
unauthenticatedRoutes := make([]string, 0, len(validRoutes))
|
||||
for route := range validRoutes {
|
||||
_, authenticated := authenticatedRoutes[route]
|
||||
if !authenticated {
|
||||
unauthenticatedRoutes = append(unauthenticatedRoutes, route)
|
||||
var unauthenticatedRoutes []string
|
||||
for urlPath, methods := range validRoutes {
|
||||
for _, method := range methods {
|
||||
route := method + " " + urlPath
|
||||
_, authenticated := authenticatedRoutes[route]
|
||||
if !authenticated {
|
||||
unauthenticatedRoutes = append(unauthenticatedRoutes, route)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
@@ -101,11 +107,12 @@ type Role struct {
|
||||
}
|
||||
|
||||
var (
|
||||
ErrMethodNotSupported = errors.New("authentication method not supported")
|
||||
ErrAPIKeyEmpty = errors.New("api key is empty")
|
||||
ErrBasicUsernameEmpty = errors.New("username is empty")
|
||||
ErrBasicPasswordEmpty = errors.New("password is empty")
|
||||
ErrRouteNotSupported = errors.New("route not supported by the control server")
|
||||
ErrMethodNotSupported = errors.New("authentication method not supported")
|
||||
ErrAPIKeyEmpty = errors.New("api key is empty")
|
||||
ErrBasicUsernameEmpty = errors.New("username is empty")
|
||||
ErrBasicPasswordEmpty = errors.New("password is empty")
|
||||
ErrRoutePathNotSupported = errors.New("route path not supported by the control server")
|
||||
ErrRouteMethodNotSupported = errors.New("route method not supported for the path")
|
||||
)
|
||||
|
||||
func (r Role) Validate() (err error) {
|
||||
@@ -124,39 +131,47 @@ func (r Role) Validate() (err error) {
|
||||
}
|
||||
|
||||
for i, route := range r.Routes {
|
||||
_, ok := validRoutes[route]
|
||||
const maxRouteFields = 2
|
||||
parts := strings.SplitN(route, " ", maxRouteFields)
|
||||
method, path := parts[0], parts[1]
|
||||
methods, ok := validRoutes[path]
|
||||
if !ok {
|
||||
return fmt.Errorf("route %d of %d: %w: %s",
|
||||
i+1, len(r.Routes), ErrRouteNotSupported, route)
|
||||
i+1, len(r.Routes), ErrRoutePathNotSupported, path)
|
||||
} else if !slices.Contains(methods, method) {
|
||||
return fmt.Errorf("route %d of %d: %w: %s for path %s",
|
||||
i+1, len(r.Routes), ErrRouteMethodNotSupported, method, path)
|
||||
}
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
// validRoutes maps URL paths to allowed HTTP methods.
|
||||
// WARNING: do not mutate programmatically.
|
||||
var validRoutes = map[string]struct{}{ //nolint:gochecknoglobals
|
||||
http.MethodGet + " /openvpn/actions/restart": {},
|
||||
http.MethodGet + " /openvpn/portforwarded": {},
|
||||
http.MethodGet + " /openvpn/settings": {},
|
||||
http.MethodGet + " /unbound/actions/restart": {},
|
||||
http.MethodGet + " /updater/restart": {},
|
||||
http.MethodGet + " /v1/version": {},
|
||||
http.MethodGet + " /v1/vpn/status": {},
|
||||
http.MethodPut + " /v1/vpn/status": {},
|
||||
http.MethodGet + " /v1/vpn/settings": {},
|
||||
http.MethodPut + " /v1/vpn/settings": {},
|
||||
http.MethodGet + " /v1/openvpn/status": {},
|
||||
http.MethodPut + " /v1/openvpn/status": {},
|
||||
http.MethodGet + " /v1/openvpn/portforwarded": {},
|
||||
http.MethodGet + " /v1/openvpn/settings": {},
|
||||
http.MethodGet + " /v1/dns/status": {},
|
||||
http.MethodPut + " /v1/dns/status": {},
|
||||
http.MethodGet + " /v1/updater/status": {},
|
||||
http.MethodPut + " /v1/updater/status": {},
|
||||
http.MethodGet + " /v1/publicip/ip": {},
|
||||
http.MethodGet + " /v1/portforward": {},
|
||||
http.MethodPut + " /v1/portforward": {},
|
||||
var validRoutes = map[string][]string{ //nolint:gochecknoglobals
|
||||
"/openvpn/actions/restart": {http.MethodGet},
|
||||
"/openvpn/portforwarded": {http.MethodGet},
|
||||
"/openvpn/settings": {http.MethodGet},
|
||||
"/unbound/actions/restart": {http.MethodGet},
|
||||
"/updater/restart": {http.MethodGet},
|
||||
"/v1/version": {http.MethodGet},
|
||||
"/v1/vpn/status": {http.MethodGet, http.MethodPut},
|
||||
"/v1/vpn/settings": {http.MethodGet, http.MethodPut},
|
||||
"/v1/openvpn/status": {http.MethodGet, http.MethodPut},
|
||||
"/v1/openvpn/portforwarded": {http.MethodGet},
|
||||
"/v1/openvpn/settings": {http.MethodGet},
|
||||
"/v1/dns/status": {http.MethodGet, http.MethodPut},
|
||||
"/v1/updater/status": {http.MethodGet, http.MethodPut},
|
||||
"/v1/publicip/ip": {http.MethodGet},
|
||||
"/v1/portforward": {http.MethodGet, http.MethodPut},
|
||||
}
|
||||
|
||||
func countValidRoutes() (count int) {
|
||||
for _, methods := range validRoutes {
|
||||
count += len(methods)
|
||||
}
|
||||
return count
|
||||
}
|
||||
|
||||
func (r Role) ToLinesNode() (node *gotree.Node) {
|
||||
|
||||
Reference in New Issue
Block a user