593 lines
		
	
	
		
			18 KiB
		
	
	
	
		
			Go
		
	
	
	
			
		
		
	
	
			593 lines
		
	
	
		
			18 KiB
		
	
	
	
		
			Go
		
	
	
	
package handler
 | 
						|
 | 
						|
import (
 | 
						|
	"encoding/json"
 | 
						|
	"fmt"
 | 
						|
	"net/http"
 | 
						|
	"strings"
 | 
						|
	"time"
 | 
						|
 | 
						|
	rice "github.com/GeertJohan/go.rice"
 | 
						|
 | 
						|
	"github.com/gorilla/sessions"
 | 
						|
	"github.com/labstack/echo-contrib/session"
 | 
						|
	"github.com/labstack/echo/v4"
 | 
						|
	"github.com/labstack/gommon/log"
 | 
						|
	"github.com/ngoduykhanh/wireguard-ui/model"
 | 
						|
	"github.com/ngoduykhanh/wireguard-ui/util"
 | 
						|
	"github.com/rs/xid"
 | 
						|
	"golang.zx2c4.com/wireguard/wgctrl/wgtypes"
 | 
						|
)
 | 
						|
 | 
						|
// LoginPage handler
 | 
						|
func LoginPage() echo.HandlerFunc {
 | 
						|
	return func(c echo.Context) error {
 | 
						|
		return c.Render(http.StatusOK, "login.html", map[string]interface{}{})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// Login for signing in handler
 | 
						|
func Login() echo.HandlerFunc {
 | 
						|
	return func(c echo.Context) error {
 | 
						|
		user := new(model.User)
 | 
						|
		c.Bind(user)
 | 
						|
 | 
						|
		dbuser, err := util.GetUser()
 | 
						|
		if err != nil {
 | 
						|
			return c.JSON(http.StatusInternalServerError, jsonHTTPResponse{false, "Cannot query user from DB"})
 | 
						|
		}
 | 
						|
 | 
						|
		if user.Username == dbuser.Username && user.Password == dbuser.Password {
 | 
						|
			// TODO: refresh the token
 | 
						|
			sess, _ := session.Get("session", c)
 | 
						|
			sess.Options = &sessions.Options{
 | 
						|
				Path:     "/",
 | 
						|
				MaxAge:   86400,
 | 
						|
				HttpOnly: true,
 | 
						|
			}
 | 
						|
 | 
						|
			// set session_token
 | 
						|
			tokenUID := xid.New().String()
 | 
						|
			sess.Values["username"] = user.Username
 | 
						|
			sess.Values["session_token"] = tokenUID
 | 
						|
			sess.Save(c.Request(), c.Response())
 | 
						|
 | 
						|
			// set session_token in cookie
 | 
						|
			cookie := new(http.Cookie)
 | 
						|
			cookie.Name = "session_token"
 | 
						|
			cookie.Value = tokenUID
 | 
						|
			cookie.Expires = time.Now().Add(24 * time.Hour)
 | 
						|
			c.SetCookie(cookie)
 | 
						|
 | 
						|
			return c.JSON(http.StatusOK, jsonHTTPResponse{true, "Logged in successfully"})
 | 
						|
		}
 | 
						|
 | 
						|
		return c.JSON(http.StatusUnauthorized, jsonHTTPResponse{false, "Invalid credentials"})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// Logout to log a user out
 | 
						|
func Logout() echo.HandlerFunc {
 | 
						|
	return func(c echo.Context) error {
 | 
						|
		clearSession(c)
 | 
						|
		return c.Redirect(http.StatusTemporaryRedirect, "/login")
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// WireGuardClients handler
 | 
						|
func WireGuardClients() echo.HandlerFunc {
 | 
						|
	return func(c echo.Context) error {
 | 
						|
		// access validation
 | 
						|
		validSession(c)
 | 
						|
 | 
						|
		clientDataList, err := util.GetClients(true)
 | 
						|
		if err != nil {
 | 
						|
			return c.JSON(http.StatusInternalServerError, jsonHTTPResponse{false, fmt.Sprintf("Cannot get client list: %v", err)})
 | 
						|
		}
 | 
						|
 | 
						|
		return c.Render(http.StatusOK, "clients.html", map[string]interface{}{
 | 
						|
			"baseData":       model.BaseData{Active: ""},
 | 
						|
			"username":       currentUser(c),
 | 
						|
			"clientDataList": clientDataList,
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// GetClients handler return a list of Wireguard client data
 | 
						|
func GetClients() echo.HandlerFunc {
 | 
						|
	return func(c echo.Context) error {
 | 
						|
		// access validation
 | 
						|
		validSession(c)
 | 
						|
 | 
						|
		clientDataList, err := util.GetClients(true)
 | 
						|
		if err != nil {
 | 
						|
			return c.JSON(http.StatusInternalServerError, jsonHTTPResponse{false, fmt.Sprintf("Cannot get client list: %v", err)})
 | 
						|
		}
 | 
						|
 | 
						|
		return c.JSON(http.StatusOK, clientDataList)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// GetClient handler return a of Wireguard client data
 | 
						|
func GetClient() echo.HandlerFunc {
 | 
						|
	return func(c echo.Context) error {
 | 
						|
		// access validation
 | 
						|
		validSession(c)
 | 
						|
 | 
						|
		clientID := c.Param("id")
 | 
						|
		clientData, err := util.GetClientByID(clientID, true)
 | 
						|
		if err != nil {
 | 
						|
			return c.JSON(http.StatusNotFound, jsonHTTPResponse{false, "Client not found"})
 | 
						|
		}
 | 
						|
 | 
						|
		return c.JSON(http.StatusOK, clientData)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// NewClient handler
 | 
						|
func NewClient() echo.HandlerFunc {
 | 
						|
	return func(c echo.Context) error {
 | 
						|
		// access validation
 | 
						|
		validSession(c)
 | 
						|
 | 
						|
		client := new(model.Client)
 | 
						|
		c.Bind(client)
 | 
						|
 | 
						|
		db, err := util.DBConn()
 | 
						|
		if err != nil {
 | 
						|
			log.Error("Cannot initialize database: ", err)
 | 
						|
			return c.JSON(http.StatusInternalServerError, jsonHTTPResponse{false, "Cannot access database"})
 | 
						|
		}
 | 
						|
 | 
						|
		// read server information
 | 
						|
		serverInterface := model.ServerInterface{}
 | 
						|
		if err := db.Read("server", "interfaces", &serverInterface); err != nil {
 | 
						|
			log.Error("Cannot fetch server interface config from database: ", err)
 | 
						|
		}
 | 
						|
 | 
						|
		// validate the input Allocation IPs
 | 
						|
		allocatedIPs, err := util.GetAllocatedIPs("")
 | 
						|
		check, err := util.ValidateIPAllocation(serverInterface.Addresses, allocatedIPs, client.AllocatedIPs)
 | 
						|
		if !check {
 | 
						|
			return c.JSON(http.StatusBadRequest, jsonHTTPResponse{false, fmt.Sprintf("%s", err)})
 | 
						|
		}
 | 
						|
 | 
						|
		// validate the input AllowedIPs
 | 
						|
		if util.ValidateAllowedIPs(client.AllowedIPs) == false {
 | 
						|
			log.Warnf("Invalid Allowed IPs input from user: %v", client.AllowedIPs)
 | 
						|
			return c.JSON(http.StatusBadRequest, jsonHTTPResponse{false, "Allowed IPs must be in CIDR format"})
 | 
						|
		}
 | 
						|
 | 
						|
		// validate the input PrivateSubnets
 | 
						|
		if util.ValidatePrivateSubnets(client.PrivateSubnets) == false {
 | 
						|
			log.Warnf("Invalid Private Subnets input from user: %v", client.PrivateSubnets)
 | 
						|
			return c.JSON(http.StatusBadRequest, jsonHTTPResponse{false, "Private Subnets must be in CIDR format"})
 | 
						|
		}
 | 
						|
 | 
						|
		// gen ID
 | 
						|
		guid := xid.New()
 | 
						|
		client.ID = guid.String()
 | 
						|
 | 
						|
		// gen Wireguard key pair
 | 
						|
		key, err := wgtypes.GeneratePrivateKey()
 | 
						|
		if err != nil {
 | 
						|
			log.Error("Cannot generate wireguard key pair: ", err)
 | 
						|
			return c.JSON(http.StatusInternalServerError, jsonHTTPResponse{false, "Cannot generate Wireguard key pair"})
 | 
						|
		}
 | 
						|
 | 
						|
		presharedKey, err := wgtypes.GenerateKey()
 | 
						|
		if err != nil {
 | 
						|
			log.Error("Cannot generated preshared key: ", err)
 | 
						|
			return c.JSON(http.StatusInternalServerError, jsonHTTPResponse{false, "Cannot generate Wireguard preshared key"})
 | 
						|
		}
 | 
						|
 | 
						|
		client.PrivateKey = key.String()
 | 
						|
		client.PublicKey = key.PublicKey().String()
 | 
						|
		client.PresharedKey = presharedKey.String()
 | 
						|
		client.CreatedAt = time.Now().UTC()
 | 
						|
		client.UpdatedAt = client.CreatedAt
 | 
						|
 | 
						|
		client.HasPrivateSubnet = false
 | 
						|
		for _, privateSubnet := range client.PrivateSubnets {
 | 
						|
			if privateSubnet != "" {
 | 
						|
				client.HasPrivateSubnet = true
 | 
						|
			}
 | 
						|
		}
 | 
						|
 | 
						|
		// write client to the database
 | 
						|
		db.Write("clients", client.ID, client)
 | 
						|
		log.Infof("Created wireguard client: %v", client)
 | 
						|
 | 
						|
		return c.JSON(http.StatusOK, client)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// UpdateClient handler to update client information
 | 
						|
func UpdateClient() echo.HandlerFunc {
 | 
						|
	return func(c echo.Context) error {
 | 
						|
		// access validation
 | 
						|
		validSession(c)
 | 
						|
 | 
						|
		_client := new(model.Client)
 | 
						|
		c.Bind(_client)
 | 
						|
 | 
						|
		db, err := util.DBConn()
 | 
						|
		if err != nil {
 | 
						|
			log.Error("Cannot initialize database: ", err)
 | 
						|
			return c.JSON(http.StatusInternalServerError, jsonHTTPResponse{false, "Cannot access database"})
 | 
						|
		}
 | 
						|
 | 
						|
		// validate client existence
 | 
						|
		client := model.Client{}
 | 
						|
		if err := db.Read("clients", _client.ID, &client); err != nil {
 | 
						|
			return c.JSON(http.StatusNotFound, jsonHTTPResponse{false, "Client not found"})
 | 
						|
		}
 | 
						|
 | 
						|
		// read server information
 | 
						|
		serverInterface := model.ServerInterface{}
 | 
						|
		if err := db.Read("server", "interfaces", &serverInterface); err != nil {
 | 
						|
			log.Error("Cannot fetch server interface config from database: ", err)
 | 
						|
			return c.JSON(http.StatusBadRequest, jsonHTTPResponse{false, fmt.Sprintf("Cannot fetch server config: %s", err)})
 | 
						|
		}
 | 
						|
 | 
						|
		// validate the input Allocation IPs
 | 
						|
		allocatedIPs, err := util.GetAllocatedIPs(client.ID)
 | 
						|
		check, err := util.ValidateIPAllocation(serverInterface.Addresses, allocatedIPs, _client.AllocatedIPs)
 | 
						|
		if !check {
 | 
						|
			return c.JSON(http.StatusBadRequest, jsonHTTPResponse{false, fmt.Sprintf("%s", err)})
 | 
						|
		}
 | 
						|
 | 
						|
		// validate the input AllowedIPs
 | 
						|
		if util.ValidateAllowedIPs(_client.AllowedIPs) == false {
 | 
						|
			log.Warnf("Invalid Allowed IPs input from user: %v", _client.AllowedIPs)
 | 
						|
			return c.JSON(http.StatusBadRequest, jsonHTTPResponse{false, "Allowed IPs must be in CIDR format"})
 | 
						|
		}
 | 
						|
 | 
						|
		// validate the input PrivateSubnets
 | 
						|
		if util.ValidatePrivateSubnets(_client.PrivateSubnets) == false {
 | 
						|
			log.Warnf("Invalid Private Subnets input from user: %v", _client.PrivateSubnets)
 | 
						|
			return c.JSON(http.StatusBadRequest, jsonHTTPResponse{false, "Private Subnets must be in CIDR format"})
 | 
						|
		}
 | 
						|
 | 
						|
		// map new data
 | 
						|
		client.Name = _client.Name
 | 
						|
		client.Email = _client.Email
 | 
						|
		client.Enabled = _client.Enabled
 | 
						|
		client.AllocatedIPs = _client.AllocatedIPs
 | 
						|
		client.AllowedIPs = _client.AllowedIPs
 | 
						|
		client.PrivateSubnets = _client.PrivateSubnets
 | 
						|
		client.PostUp = _client.PostUp
 | 
						|
		client.PostDown = _client.PostDown
 | 
						|
		client.UpdatedAt = time.Now().UTC()
 | 
						|
 | 
						|
		client.HasPrivateSubnet = false
 | 
						|
		for _, privateSubnet := range client.PrivateSubnets {
 | 
						|
			if privateSubnet != "" {
 | 
						|
				client.HasPrivateSubnet = true
 | 
						|
			}
 | 
						|
		}
 | 
						|
 | 
						|
		// write to the database
 | 
						|
		db.Write("clients", client.ID, &client)
 | 
						|
		log.Infof("Updated client information successfully => %v", client)
 | 
						|
 | 
						|
		return c.JSON(http.StatusOK, jsonHTTPResponse{true, "Updated client successfully"})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// SetClientStatus handler to enable / disable a client
 | 
						|
func SetClientStatus() echo.HandlerFunc {
 | 
						|
	return func(c echo.Context) error {
 | 
						|
		// access validation
 | 
						|
		validSession(c)
 | 
						|
 | 
						|
		data := make(map[string]interface{})
 | 
						|
		err := json.NewDecoder(c.Request().Body).Decode(&data)
 | 
						|
 | 
						|
		if err != nil {
 | 
						|
			return c.JSON(http.StatusBadRequest, jsonHTTPResponse{false, "Bad post data"})
 | 
						|
		}
 | 
						|
 | 
						|
		clientID := data["id"].(string)
 | 
						|
		status := data["status"].(bool)
 | 
						|
 | 
						|
		db, err := util.DBConn()
 | 
						|
		if err != nil {
 | 
						|
			log.Error("Cannot initialize database: ", err)
 | 
						|
			return c.JSON(http.StatusInternalServerError, jsonHTTPResponse{false, "Cannot access database"})
 | 
						|
		}
 | 
						|
 | 
						|
		client := model.Client{}
 | 
						|
		if err := db.Read("clients", clientID, &client); err != nil {
 | 
						|
			log.Error("Cannot get client from database: ", err)
 | 
						|
		}
 | 
						|
 | 
						|
		client.Enabled = status
 | 
						|
		db.Write("clients", clientID, &client)
 | 
						|
		log.Infof("Changed client %s enabled status to %v", client.ID, status)
 | 
						|
 | 
						|
		return c.JSON(http.StatusOK, jsonHTTPResponse{true, "Changed client status successfully"})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// DownloadClient handler
 | 
						|
func DownloadClient() echo.HandlerFunc {
 | 
						|
	return func(c echo.Context) error {
 | 
						|
		clientID := c.QueryParam("clientid")
 | 
						|
		if clientID == "" {
 | 
						|
			return c.JSON(http.StatusNotFound, jsonHTTPResponse{false, "Missing clientid parameter"})
 | 
						|
		}
 | 
						|
 | 
						|
		clientData, err := util.GetClientByID(clientID, false)
 | 
						|
		if err != nil {
 | 
						|
			log.Errorf("Cannot generate client id %s config file for downloading: %v", clientID, err)
 | 
						|
			return c.JSON(http.StatusNotFound, jsonHTTPResponse{false, "Client not found"})
 | 
						|
		}
 | 
						|
 | 
						|
		// build config
 | 
						|
		server, _ := util.GetServer()
 | 
						|
		globalSettings, _ := util.GetGlobalSettings()
 | 
						|
		config := util.BuildClientConfig(*clientData.Client, server, globalSettings)
 | 
						|
 | 
						|
		// create io reader from string
 | 
						|
		reader := strings.NewReader(config)
 | 
						|
 | 
						|
		// set response header for downloading
 | 
						|
		c.Response().Header().Set(echo.HeaderContentDisposition, "attachment; filename=wg0.conf")
 | 
						|
		return c.Stream(http.StatusOK, "text/plain", reader)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// RemoveClient handler
 | 
						|
func RemoveClient() echo.HandlerFunc {
 | 
						|
	return func(c echo.Context) error {
 | 
						|
		// access validation
 | 
						|
		validSession(c)
 | 
						|
 | 
						|
		client := new(model.Client)
 | 
						|
		c.Bind(client)
 | 
						|
 | 
						|
		// delete client from database
 | 
						|
		db, err := util.DBConn()
 | 
						|
		if err != nil {
 | 
						|
			log.Error("Cannot initialize database: ", err)
 | 
						|
			return c.JSON(http.StatusInternalServerError, jsonHTTPResponse{false, "Cannot access database"})
 | 
						|
		}
 | 
						|
 | 
						|
		if err := db.Delete("clients", client.ID); err != nil {
 | 
						|
			log.Error("Cannot delete wireguard client: ", err)
 | 
						|
			return c.JSON(http.StatusInternalServerError, jsonHTTPResponse{false, "Cannot delete client from database"})
 | 
						|
		}
 | 
						|
 | 
						|
		log.Infof("Removed wireguard client: %v", client)
 | 
						|
		return c.JSON(http.StatusOK, jsonHTTPResponse{true, "Client removed"})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// WireGuardServer handler
 | 
						|
func WireGuardServer() echo.HandlerFunc {
 | 
						|
	return func(c echo.Context) error {
 | 
						|
		// access validation
 | 
						|
		validSession(c)
 | 
						|
 | 
						|
		server, err := util.GetServer()
 | 
						|
		if err != nil {
 | 
						|
			log.Error("Cannot get server config: ", err)
 | 
						|
		}
 | 
						|
 | 
						|
		return c.Render(http.StatusOK, "server.html", map[string]interface{}{
 | 
						|
			"baseData":        model.BaseData{Active: "wg-server"},
 | 
						|
			"username":        currentUser(c),
 | 
						|
			"serverInterface": server.Interface,
 | 
						|
			"serverKeyPair":   server.KeyPair,
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// WireGuardServerInterfaces handler
 | 
						|
func WireGuardServerInterfaces() echo.HandlerFunc {
 | 
						|
	return func(c echo.Context) error {
 | 
						|
		// access validation
 | 
						|
		validSession(c)
 | 
						|
 | 
						|
		serverInterface := new(model.ServerInterface)
 | 
						|
		c.Bind(serverInterface)
 | 
						|
 | 
						|
		// validate the input addresses
 | 
						|
		if util.ValidateServerAddresses(serverInterface.Addresses) == false {
 | 
						|
			log.Warnf("Invalid server interface addresses input from user: %v", serverInterface.Addresses)
 | 
						|
			return c.JSON(http.StatusBadRequest, jsonHTTPResponse{false, "Interface IP address must be in CIDR format"})
 | 
						|
		}
 | 
						|
 | 
						|
		serverInterface.UpdatedAt = time.Now().UTC()
 | 
						|
 | 
						|
		// write config to the database
 | 
						|
		db, err := util.DBConn()
 | 
						|
		if err != nil {
 | 
						|
			log.Error("Cannot initialize database: ", err)
 | 
						|
			return c.JSON(http.StatusInternalServerError, jsonHTTPResponse{false, "Cannot access database"})
 | 
						|
		}
 | 
						|
 | 
						|
		db.Write("server", "interfaces", serverInterface)
 | 
						|
		log.Infof("Updated wireguard server interfaces settings: %v", serverInterface)
 | 
						|
 | 
						|
		return c.JSON(http.StatusOK, jsonHTTPResponse{true, "Updated interface addresses successfully"})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// WireGuardServerKeyPair handler to generate private and public keys
 | 
						|
func WireGuardServerKeyPair() echo.HandlerFunc {
 | 
						|
	return func(c echo.Context) error {
 | 
						|
		// access validation
 | 
						|
		validSession(c)
 | 
						|
 | 
						|
		// gen Wireguard key pair
 | 
						|
		key, err := wgtypes.GeneratePrivateKey()
 | 
						|
		if err != nil {
 | 
						|
			log.Error("Cannot generate wireguard key pair: ", err)
 | 
						|
			return c.JSON(http.StatusInternalServerError, jsonHTTPResponse{false, "Cannot generate Wireguard key pair"})
 | 
						|
		}
 | 
						|
 | 
						|
		serverKeyPair := new(model.ServerKeypair)
 | 
						|
		serverKeyPair.PrivateKey = key.String()
 | 
						|
		serverKeyPair.PublicKey = key.PublicKey().String()
 | 
						|
		serverKeyPair.UpdatedAt = time.Now().UTC()
 | 
						|
 | 
						|
		// write config to the database
 | 
						|
		db, err := util.DBConn()
 | 
						|
		if err != nil {
 | 
						|
			log.Error("Cannot initialize database: ", err)
 | 
						|
			return c.JSON(http.StatusInternalServerError, jsonHTTPResponse{false, "Cannot access database"})
 | 
						|
		}
 | 
						|
 | 
						|
		db.Write("server", "keypair", serverKeyPair)
 | 
						|
		log.Infof("Updated wireguard server interfaces settings: %v", serverKeyPair)
 | 
						|
 | 
						|
		return c.JSON(http.StatusOK, serverKeyPair)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// GlobalSettings handler
 | 
						|
func GlobalSettings() echo.HandlerFunc {
 | 
						|
	return func(c echo.Context) error {
 | 
						|
		// access validation
 | 
						|
		validSession(c)
 | 
						|
 | 
						|
		globalSettings, err := util.GetGlobalSettings()
 | 
						|
		if err != nil {
 | 
						|
			log.Error("Cannot get global settings: ", err)
 | 
						|
		}
 | 
						|
 | 
						|
		return c.Render(http.StatusOK, "global_settings.html", map[string]interface{}{
 | 
						|
			"baseData":       model.BaseData{Active: "global-settings"},
 | 
						|
			"username":       currentUser(c),
 | 
						|
			"globalSettings": globalSettings,
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// GlobalSettingSubmit handler to update the global settings
 | 
						|
func GlobalSettingSubmit() echo.HandlerFunc {
 | 
						|
	return func(c echo.Context) error {
 | 
						|
		// access validation
 | 
						|
		validSession(c)
 | 
						|
 | 
						|
		globalSettings := new(model.GlobalSetting)
 | 
						|
		c.Bind(globalSettings)
 | 
						|
 | 
						|
		// validate the input dns server list
 | 
						|
		if util.ValidateIPAddressList(globalSettings.DNSServers) == false {
 | 
						|
			log.Warnf("Invalid DNS server list input from user: %v", globalSettings.DNSServers)
 | 
						|
			return c.JSON(http.StatusBadRequest, jsonHTTPResponse{false, "Invalid DNS server address"})
 | 
						|
		}
 | 
						|
 | 
						|
		globalSettings.UpdatedAt = time.Now().UTC()
 | 
						|
 | 
						|
		// write config to the database
 | 
						|
		db, err := util.DBConn()
 | 
						|
		if err != nil {
 | 
						|
			log.Error("Cannot initialize database: ", err)
 | 
						|
			return c.JSON(http.StatusInternalServerError, jsonHTTPResponse{false, "Cannot access database"})
 | 
						|
		}
 | 
						|
 | 
						|
		db.Write("server", "global_settings", globalSettings)
 | 
						|
		log.Infof("Updated global settings: %v", globalSettings)
 | 
						|
 | 
						|
		return c.JSON(http.StatusOK, jsonHTTPResponse{true, "Updated global settings successfully"})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// MachineIPAddresses handler to get local interface ip addresses
 | 
						|
func MachineIPAddresses() echo.HandlerFunc {
 | 
						|
	return func(c echo.Context) error {
 | 
						|
		// access validation
 | 
						|
		validSession(c)
 | 
						|
 | 
						|
		// get private ip addresses
 | 
						|
		interfaceList, err := util.GetInterfaceIPs()
 | 
						|
		if err != nil {
 | 
						|
			return c.JSON(http.StatusInternalServerError, jsonHTTPResponse{false, "Cannot get machine ip addresses"})
 | 
						|
		}
 | 
						|
 | 
						|
		// get public ip address
 | 
						|
		// TODO: Remove the go-external-ip dependency
 | 
						|
		publicInterface, err := util.GetPublicIP()
 | 
						|
		if err != nil {
 | 
						|
			log.Warn("Cannot get machine public ip address: ", err)
 | 
						|
		} else {
 | 
						|
			// prepend public ip to the list
 | 
						|
			interfaceList = append([]model.Interface{publicInterface}, interfaceList...)
 | 
						|
		}
 | 
						|
 | 
						|
		return c.JSON(http.StatusOK, interfaceList)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// SuggestIPAllocation handler to get the list of ip address for client
 | 
						|
func SuggestIPAllocation() echo.HandlerFunc {
 | 
						|
	return func(c echo.Context) error {
 | 
						|
		// access validation
 | 
						|
		validSession(c)
 | 
						|
 | 
						|
		server, err := util.GetServer()
 | 
						|
		if err != nil {
 | 
						|
			log.Error("Cannot fetch server config from database: ", err)
 | 
						|
		}
 | 
						|
 | 
						|
		// return the list of suggestedIPs
 | 
						|
		// we take the first available ip address from
 | 
						|
		// each server's network addresses.
 | 
						|
		suggestedIPs := make([]string, 0)
 | 
						|
		allocatedIPs, err := util.GetAllocatedIPs("")
 | 
						|
		if err != nil {
 | 
						|
			log.Error("Cannot suggest ip allocation. Failed to get list of allocated ip addresses: ", err)
 | 
						|
			return c.JSON(http.StatusInternalServerError, jsonHTTPResponse{false, "Cannot suggest ip allocation: failed to get list of allocated ip addresses"})
 | 
						|
		}
 | 
						|
		for _, cidr := range server.Interface.Addresses {
 | 
						|
			ip, err := util.GetAvailableIP(cidr, allocatedIPs)
 | 
						|
			if err != nil {
 | 
						|
				log.Error("Failed to get available ip from a CIDR: ", err)
 | 
						|
				return c.JSON(http.StatusInternalServerError, jsonHTTPResponse{false, fmt.Sprintf("Cannot suggest ip allocation: failed to get available ip from network %s", cidr)})
 | 
						|
			}
 | 
						|
			suggestedIPs = append(suggestedIPs, fmt.Sprintf("%s/32", ip))
 | 
						|
		}
 | 
						|
 | 
						|
		return c.JSON(http.StatusOK, suggestedIPs)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// ApplyServerConfig handler to write config file and restart Wireguard server
 | 
						|
func ApplyServerConfig(tmplBox *rice.Box) echo.HandlerFunc {
 | 
						|
	return func(c echo.Context) error {
 | 
						|
		// access validation
 | 
						|
		validSession(c)
 | 
						|
 | 
						|
		server, err := util.GetServer()
 | 
						|
		if err != nil {
 | 
						|
			log.Error("Cannot get server config: ", err)
 | 
						|
			return c.JSON(http.StatusInternalServerError, jsonHTTPResponse{false, "Cannot get server config"})
 | 
						|
		}
 | 
						|
 | 
						|
		clients, err := util.GetClients(false)
 | 
						|
		if err != nil {
 | 
						|
			log.Error("Cannot get client config: ", err)
 | 
						|
			return c.JSON(http.StatusInternalServerError, jsonHTTPResponse{false, "Cannot get client config"})
 | 
						|
		}
 | 
						|
 | 
						|
		settings, err := util.GetGlobalSettings()
 | 
						|
		if err != nil {
 | 
						|
			log.Error("Cannot get global settings: ", err)
 | 
						|
			return c.JSON(http.StatusInternalServerError, jsonHTTPResponse{false, "Cannot get global settings"})
 | 
						|
		}
 | 
						|
 | 
						|
		// Write config file
 | 
						|
		err = util.WriteWireGuardServerConfig(tmplBox, server, clients, settings)
 | 
						|
		if err != nil {
 | 
						|
			log.Error("Cannot apply server config: ", err)
 | 
						|
			return c.JSON(http.StatusInternalServerError, jsonHTTPResponse{false, fmt.Sprintf("Cannot apply server config: %v", err)})
 | 
						|
		}
 | 
						|
 | 
						|
		return c.JSON(http.StatusOK, jsonHTTPResponse{true, "Applied server config successfully"})
 | 
						|
	}
 | 
						|
}
 |