implement group add/delete routes

This commit is contained in:
2026-03-11 22:12:45 +00:00
parent 322f233718
commit f0f8397d4a
4 changed files with 97 additions and 38 deletions

View File

@@ -5,6 +5,7 @@ import (
"strings" "strings"
) )
// returns an error if the groupname format was not correct
func ParseGroupname(groupname string) (Groupname, error) { func ParseGroupname(groupname string) (Groupname, error) {
g := Groupname{} g := Groupname{}
x := strings.Split(groupname, "-") x := strings.Split(groupname, "-")
@@ -21,6 +22,7 @@ func ParseGroupname(groupname string) (Groupname, error) {
} }
} }
// returns an error if the username format was not correct
func ParseUsername(username string) (Username, error) { func ParseUsername(username string) (Username, error) {
u := Username{} u := Username{}
x := strings.Split(username, "@") x := strings.Split(username, "@")

View File

@@ -2,6 +2,7 @@ package app
import ( import (
"crypto/rand" "crypto/rand"
"fmt"
"log" "log"
"net/http" "net/http"
"strconv" "strconv"
@@ -29,11 +30,16 @@ func Run(configPath *string) {
log.Printf("Read in config from %s\n", *configPath) log.Printf("Read in config from %s\n", *configPath)
// setup router // setup router
router := SetupAPI(&Config) router := SetupAPISessionStore(&Config)
gin.SetMode(gin.ReleaseMode)
// make global session map // make global session map
UserSessions = make(map[string]*Backends) UserSessions = make(map[string]*Backends)
router.GET("/version", func(c *gin.Context) {
c.JSON(200, gin.H{"version": Version})
})
router.POST("/ticket", func(c *gin.Context) { router.POST("/ticket", func(c *gin.Context) {
body := common.Login{} body := common.Login{}
if err := c.ShouldBind(&body); err != nil { // bad request from binding if err := c.ShouldBind(&body); err != nil { // bad request from binding
@@ -47,36 +53,34 @@ func Run(configPath *string) {
c.JSON(http.StatusBadRequest, gin.H{"auth": false, "error": err.Error()}) c.JSON(http.StatusBadRequest, gin.H{"auth": false, "error": err.Error()})
return return
} }
handler := Config.Realms[body.Username.Realm].Handler
// bind proxmox backend // always bind proxmox backend
newPVEClient, code, err := pve.NewClientFromCredentials(Config.PVE, body.Username, body.Password) PVEClient, code, err := pve.NewClientFromCredentials(Config.PVE, body.Username, body.Password)
if err != nil { // pve client failed to bind if err != nil { // pve client failed to bind
c.JSON(code, gin.H{"auth": false, "error": err.Error()}) c.JSON(code, gin.H{"auth": false, "error": err.Error()})
return return
} }
// bind ldap backend // bind ldap backend if backend is ldap
newLDAPClient, code, err := ldap.NewClientFromCredentials(Config.LDAP, body.Username, body.Password) var LDAPClient *ldap.LDAPClient
if err != nil { // ldap client failed to bind if handler == "ldap" {
c.JSON(code, gin.H{"auth": false, "error": err.Error()}) LDAPClient, code, err = ldap.NewClientFromCredentials(Config.LDAP, body.Username, body.Password)
return if err != nil { // ldap client failed to bind
} c.JSON(code, gin.H{"auth": false, "error": err.Error()})
//err = newLDAPClient.BindUser(body.Username, body.Password) return
//if err != nil { // failed to authenticate, return error }
// c.JSON(http.StatusBadRequest, gin.H{"auth": false, "error": err.Error()}) } //ldap client will be nil if it is unused!!
// return
//}
// todo allow ldap backed to fail if user is not using an ldap backend
// successful binding at this point // successful binding at this point
// create new session // create new session
session := sessions.Default(c) session := sessions.Default(c)
// create (hopefully) safe uuid to map to ldap session // create random uuid to map user to backends
uuid, _ := uuid.NewV4() uuid, _ := uuid.NewV4()
// set uuid mapping in session // set uuid mapping in session
session.Set("SessionUUID", uuid.String()) session.Set("SessionUUID", uuid.String())
// set uuid mapping in LDAPSessions // set uuid mapping in LDAPSessions
UserSessions[uuid.String()] = &Backends{pve: newPVEClient, ldap: newLDAPClient} UserSessions[uuid.String()] = &Backends{handler: handler, pve: PVEClient, ldap: LDAPClient}
// save the session // save the session
session.Save() session.Save()
// return successful auth // return successful auth
@@ -97,12 +101,11 @@ func Run(configPath *string) {
c.JSON(http.StatusUnauthorized, gin.H{"auth": false}) c.JSON(http.StatusUnauthorized, gin.H{"auth": false})
}) })
router.GET("/version", func(c *gin.Context) { router.POST("/pools/:poolid", func(c *gin.Context) {
c.JSON(200, gin.H{"version": Version}) poolid, ok := c.Params.Get("poolid")
}) if !ok {
c.JSON(http.StatusBadRequest, gin.H{"error": fmt.Errorf("Missing required path parameter poolid")})
router.POST("/pool/:poolid", func(c *gin.Context) { }
poolid, _ := c.Params.Get("poolid")
backends, code, err := GetBackendsFromContext(c) backends, code, err := GetBackendsFromContext(c)
if err != nil { if err != nil {
@@ -117,8 +120,11 @@ func Run(configPath *string) {
} }
}) })
router.DELETE("/pool/:poolid", func(c *gin.Context) { router.DELETE("/pools/:poolid", func(c *gin.Context) {
poolid, _ := c.Params.Get("poolid") poolid, ok := c.Params.Get("poolid")
if !ok {
c.JSON(http.StatusBadRequest, gin.H{"error": fmt.Errorf("Missing required path parameter poolid")})
}
backends, code, err := GetBackendsFromContext(c) backends, code, err := GetBackendsFromContext(c)
if err != nil { if err != nil {
@@ -133,6 +139,52 @@ func Run(configPath *string) {
} }
}) })
router.POST("/groups/:groupid", func(c *gin.Context) {
groupid, ok := c.Params.Get("groupid")
if !ok {
c.JSON(http.StatusBadRequest, gin.H{"error": fmt.Errorf("Missing required path parameter groupid")})
}
groupname, err := common.ParseGroupname(groupid)
if err != nil {
c.JSON(http.StatusBadRequest, gin.H{"error": err})
}
backends, code, err := GetBackendsFromContext(c)
if err != nil {
c.JSON(code, gin.H{"error": err.Error()})
}
code, err = NewGroup(backends, groupname)
if err != nil {
c.JSON(code, gin.H{"error": err.Error()})
} else {
c.Status(200)
}
})
router.DELETE("/groups/:groupid", func(c *gin.Context) {
groupid, ok := c.Params.Get("groupid")
if !ok {
c.JSON(http.StatusBadRequest, gin.H{"error": fmt.Errorf("Missing required path parameter groupid")})
}
groupname, err := common.ParseGroupname(groupid)
if err != nil {
c.JSON(http.StatusBadRequest, gin.H{"error": err})
}
backends, code, err := GetBackendsFromContext(c)
if err != nil {
c.JSON(code, gin.H{"error": err.Error()})
}
code, err = DelGroup(backends, groupname)
if err != nil {
c.JSON(code, gin.H{"error": err.Error()})
} else {
c.Status(200)
}
})
log.Printf("Starting User Manager API on port %s\n", strconv.Itoa(Config.ListenPort)) log.Printf("Starting User Manager API on port %s\n", strconv.Itoa(Config.ListenPort))
err = router.Run("0.0.0.0:" + strconv.Itoa(Config.ListenPort)) err = router.Run("0.0.0.0:" + strconv.Itoa(Config.ListenPort))
@@ -141,15 +193,11 @@ func Run(configPath *string) {
} }
} }
func SetupAPI(config *common.Config) *gin.Engine { func SetupAPISessionStore(config *common.Config) *gin.Engine {
secretKey := make([]byte, 256) secretKey := make([]byte, 256)
n, err := rand.Read(secretKey) n, _ := rand.Read(secretKey) // rand Read never returns an error, always crashes on error
if err != nil {
log.Fatalf("Error when generating session secret key: %s\n", err.Error())
}
log.Printf("Generated session secret key of length %d\n", n) log.Printf("Generated session secret key of length %d\n", n)
gin.SetMode(gin.ReleaseMode)
router := gin.Default() router := gin.Default()
store := cookie.NewStore(secretKey) store := cookie.NewStore(secretKey)
store.Options(sessions.Options{ store.Options(sessions.Options{
@@ -160,7 +208,7 @@ func SetupAPI(config *common.Config) *gin.Engine {
}) })
router.Use(sessions.Sessions(config.SessionCookieName, store)) router.Use(sessions.Sessions(config.SessionCookieName, store))
log.Printf("Started API router and cookie store (Name: %s Params: %+v)\n", config.SessionCookieName, config.SessionCookie) log.Printf("Started cookie store (Name: %s Params: %+v)\n", config.SessionCookieName, config.SessionCookie)
return router return router
} }

View File

@@ -17,9 +17,13 @@ func NewGroup(backends *Backends, groupname common.Groupname) (int, error) {
case "pve": case "pve":
return backends.pve.NewGroup(groupname) return backends.pve.NewGroup(groupname)
case "ldap": case "ldap":
backends.ldap.NewGroup(groupname) code, err := backends.ldap.NewGroup(groupname)
if err != nil {
return code, err
}
//pve sync //pve sync
return 200, nil return backends.pve.SyncRealms()
} }
return 200, nil return 200, nil
} }
@@ -30,9 +34,13 @@ func DelGroup(backends *Backends, groupname common.Groupname) (int, error) {
case "pve": case "pve":
return backends.pve.DelGroup(groupname) return backends.pve.DelGroup(groupname)
case "ldap": case "ldap":
backends.ldap.DelGroup(groupname) code, err := backends.ldap.DelGroup(groupname)
if err != nil {
return code, err
}
//pve sync //pve sync
return 200, nil return backends.pve.SyncRealms()
} }
return 200, nil return 200, nil
} }

View File

@@ -15,8 +15,9 @@ import (
) )
type Backends struct { type Backends struct {
pve *pve.ProxmoxClient handler string
ldap *ldap.LDAPClient pve *pve.ProxmoxClient
ldap *ldap.LDAPClient
} }
func GetBackendsFromContext(c *gin.Context) (*Backends, int, error) { func GetBackendsFromContext(c *gin.Context) (*Backends, int, error) {