4 Commits
v0.1.2 ... main

Author SHA1 Message Date
1be267e0ff updated file browser url logic
All checks were successful
Build and Push Docker Image / Build image (push) Successful in 1m40s
2025-05-27 13:20:37 +03:00
8e2806deb2 imporved auth verify logs
All checks were successful
Build and Push Docker Image / Build image (push) Successful in 1m41s
2025-05-27 12:39:38 +03:00
6c2c305e2d added upsert to permissions
All checks were successful
Build and Push Docker Image / Build image (push) Successful in 1m40s
2025-05-26 16:18:21 +03:00
3819877919 added check for no documents
All checks were successful
Build and Push Docker Image / Build image (push) Successful in 1m47s
2025-05-26 14:36:23 +03:00
5 changed files with 56 additions and 17 deletions

View File

@@ -11,6 +11,7 @@ import (
"git.acooldomain.co/server-manager/backend/dbhandler" "git.acooldomain.co/server-manager/backend/dbhandler"
"git.acooldomain.co/server-manager/backend/factories" "git.acooldomain.co/server-manager/backend/factories"
"git.acooldomain.co/server-manager/backend/instancemanager"
"git.acooldomain.co/server-manager/backend/models" "git.acooldomain.co/server-manager/backend/models"
"github.com/gin-gonic/gin" "github.com/gin-gonic/gin"
"github.com/golang-jwt/jwt" "github.com/golang-jwt/jwt"
@@ -23,6 +24,7 @@ type AuthApi struct {
userAuthDbHandler dbhandler.UserPassAuthanticationDbHandler userAuthDbHandler dbhandler.UserPassAuthanticationDbHandler
serverAuthDbHandler dbhandler.ServersAuthorizationDbHandler serverAuthDbHandler dbhandler.ServersAuthorizationDbHandler
OidcAuthDbHandler dbhandler.OidcAuthenticationDbHandler OidcAuthDbHandler dbhandler.OidcAuthenticationDbHandler
instanceManager instancemanager.InstanceManager
} }
type Claims struct { type Claims struct {
@@ -171,12 +173,18 @@ func (con AuthApi) Verify(ctx *gin.Context) {
pathSegments := strings.Split(forwardedUri, "/") pathSegments := strings.Split(forwardedUri, "/")
serverId, service := pathSegments[2], pathSegments[1] service := pathSegments[1]
switch service { switch service {
case "browsers": case "browsers":
fmt.Printf("%#v %s", claims, serverId) serverId, err := con.instanceManager.GetServerIdFromFileBrowserUrl(ctx, forwardedUri)
if err != nil {
ctx.AbortWithError(500, err)
return
}
serverPermissions, err := con.serverAuthDbHandler.GetPermissions(ctx, claims.Username, serverId) serverPermissions, err := con.serverAuthDbHandler.GetPermissions(ctx, claims.Username, serverId)
fmt.Printf("User: %s | GlobalPermissions: %d | ServerId: %s | ServerPermissions: %d\n", claims.Username, claims.Permissions, serverId, serverPermissions)
if err != nil { if err != nil {
ctx.AbortWithError(500, err) ctx.AbortWithError(500, err)
return return
@@ -215,10 +223,16 @@ func LoadGroup(group *gin.RouterGroup, config models.GlobalConfig) gin.HandlerFu
panic(err) panic(err)
} }
instanceManager, err := factories.GetInstanceManager(config.InstanceManager, config.Domain)
if err != nil {
panic(err)
}
connection := AuthApi{ connection := AuthApi{
userAuthDbHandler: userAuthHandler, userAuthDbHandler: userAuthHandler,
serverAuthDbHandler: serverAuthDbHandler, serverAuthDbHandler: serverAuthDbHandler,
tokenHandler: inviteHandler, tokenHandler: inviteHandler,
instanceManager: instanceManager,
config: config, config: config,
} }

View File

@@ -52,8 +52,7 @@ func (self *ServersAuthorizationDbHandler) AddPermissions(ctx context.Context, u
"server_id": serverId, "server_id": serverId,
}, },
).Decode(&serverPermissions) ).Decode(&serverPermissions)
if err != nil && err != mongo.ErrNoDocuments {
if err != nil {
return err return err
} }
@@ -65,11 +64,12 @@ func (self *ServersAuthorizationDbHandler) AddPermissions(ctx context.Context, u
"username": username, "username": username,
"server_id": serverId, "server_id": serverId,
}, },
bson.M{"$set": bson.M{ bson.M{
"username": username, "$set": bson.M{
"server_id": serverId, "username": username,
"permissions": newPermissions, "server_id": serverId,
}, "permissions": newPermissions,
},
}, },
options.Update().SetUpsert(true), options.Update().SetUpsert(true),
) )
@@ -86,7 +86,6 @@ func (self *ServersAuthorizationDbHandler) RemovePermissions(ctx context.Context
"server_id": serverId, "server_id": serverId,
}, },
).Decode(&serverPermissions) ).Decode(&serverPermissions)
if err != nil { if err != nil {
return err return err
} }
@@ -99,9 +98,10 @@ func (self *ServersAuthorizationDbHandler) RemovePermissions(ctx context.Context
"username": username, "username": username,
"server_id": serverId, "server_id": serverId,
}, },
bson.M{"$set": bson.M{ bson.M{
"permissions": newPermissions, "$set": bson.M{
}, "permissions": newPermissions,
},
}, },
) )
@@ -115,10 +115,12 @@ func (self *ServersAuthorizationDbHandler) SetPermissions(ctx context.Context, u
"username": username, "username": username,
"server_id": serverId, "server_id": serverId,
}, },
bson.M{"$set": bson.M{ bson.M{
"permissions": permissions, "$set": bson.M{
}, "permissions": permissions,
},
}, },
options.Update().SetUpsert(true),
) )
return err return err
@@ -134,8 +136,11 @@ func (self *ServersAuthorizationDbHandler) GetPermissions(ctx context.Context, u
"server_id": serverId, "server_id": serverId,
}, },
).Decode(&serverPermissions) ).Decode(&serverPermissions)
if err != nil { if err != nil {
if err == mongo.ErrNoDocuments {
return 0, nil
}
return 0, err return 0, err
} }

View File

@@ -3,6 +3,7 @@ package docker
import ( import (
"context" "context"
"encoding/json" "encoding/json"
"errors"
"fmt" "fmt"
"log" "log"
"maps" "maps"
@@ -656,6 +657,14 @@ func (im *InstanceManager) StopFileBrowser(ctx context.Context, serverId string)
return nil return nil
} }
func (im *InstanceManager) GetServerIdFromFileBrowserUrl(ctx context.Context, url string) (string, error) {
pathSegments := strings.Split(url, "/")
if len(pathSegments) < 3 {
return "", errors.New("invalid url")
}
return pathSegments[2], nil
}
func NewInstanceManager(config models.DockerInstanceManagerConfig, siteDomain string) (*InstanceManager, error) { func NewInstanceManager(config models.DockerInstanceManagerConfig, siteDomain string) (*InstanceManager, error) {
apiClient, err := client.NewClientWithOpts(client.FromEnv, client.WithAPIVersionNegotiation()) apiClient, err := client.NewClientWithOpts(client.FromEnv, client.WithAPIVersionNegotiation())
if err != nil { if err != nil {

View File

@@ -60,6 +60,7 @@ type InstanceManager interface {
// Read Only // Read Only
GetFileBrowser(ctx context.Context, serverId string) (*models.FileBrowser, error) GetFileBrowser(ctx context.Context, serverId string) (*models.FileBrowser, error)
ListFileBrowsers(ctx context.Context) ([]models.FileBrowser, error) ListFileBrowsers(ctx context.Context) ([]models.FileBrowser, error)
GetServerIdFromFileBrowserUrl(ctx context.Context, serverId string) (string, error)
// Status Changing // Status Changing
StartFileBrowser(ctx context.Context, serverId string) (*models.FileBrowser, error) StartFileBrowser(ctx context.Context, serverId string) (*models.FileBrowser, error)

View File

@@ -8,6 +8,8 @@ import (
"strings" "strings"
"time" "time"
gerrors "errors"
"git.acooldomain.co/server-manager/backend/instancemanager" "git.acooldomain.co/server-manager/backend/instancemanager"
"git.acooldomain.co/server-manager/backend/models" "git.acooldomain.co/server-manager/backend/models"
servermanagerv1 "git.acooldomain.co/server-manager/kubernetes-operator/api/v1alpha1" servermanagerv1 "git.acooldomain.co/server-manager/kubernetes-operator/api/v1alpha1"
@@ -355,6 +357,14 @@ func (i *InstanceManager) StopFileBrowser(ctx context.Context, serverId string)
return nil return nil
} }
func (im *InstanceManager) GetServerIdFromFileBrowserUrl(ctx context.Context, url string) (string, error) {
pathSegments := strings.Split(url, "/")
if len(pathSegments) < 4 {
return "", gerrors.New("invalid url")
}
return pathSegments[3], nil
}
func NewInstanceManager(config models.KubernetesInstanceManagerConfig) (*InstanceManager, error) { func NewInstanceManager(config models.KubernetesInstanceManagerConfig) (*InstanceManager, error) {
c, err := rest.InClusterConfig() c, err := rest.InClusterConfig()
if err != nil { if err != nil {