123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217 |
- package agi
- import (
- "encoding/json"
- "log"
- "net/http"
- "path/filepath"
- "strings"
- "time"
- "github.com/google/uuid"
- "imuslab.com/arozos/mod/common"
- )
- type endpointFormat struct {
- Username string `json:"username"`
- Path string `json:"path"`
- }
- //Handle request from EXTERNAL RESTFUL API
- func (g *Gateway) ExtAPIHandler(w http.ResponseWriter, r *http.Request) {
- // get db
- sysdb := g.Option.UserHandler.GetDatabase()
- if !sysdb.TableExists("external_agi") {
- common.SendErrorResponse(w, "Invalid Request")
- return
- }
- // get the request URI from the r.URL
- requestURI := filepath.ToSlash(filepath.Clean(r.URL.Path))
- subpathElements := strings.Split(requestURI[1:], "/")
- // check if it contains only two part, [rexec uuid]
- if len(subpathElements) != 3 {
- common.SendErrorResponse(w, "Invalid Request")
- return
- }
- // check if UUID exists in the database
- // get the info from the database
- data, isExist := g.checkIfExternalEndpointExist(subpathElements[2])
- if !isExist {
- common.SendErrorResponse(w, "Malform Request, invaild UUID given")
- return
- }
- usernameFromDb := data.Username
- pathFromDb := data.Path
- // get the userinfo and the realPath
- userInfo, err := g.Option.UserHandler.GetUserInfoFromUsername(usernameFromDb)
- if err != nil {
- common.SendErrorResponse(w, "Invalid username")
- return
- }
- _, realPath, err := virtualPathToRealPath(pathFromDb, userInfo)
- if err != nil {
- common.SendErrorResponse(w, "Invalid filepath")
- return
- }
- // execute!
- start := time.Now()
- //g.ExecuteAGIScript(scriptContent, "", "", w, r, userInfo)
- result, err := g.ExecuteAGIScriptAsUser(realPath, userInfo, r)
- duration := time.Since(start)
- if err != nil {
- common.SendErrorResponse(w, err.Error())
- return
- }
- common.SendTextResponse(w, result)
- log.Println("[Remote AGI] IP:", r.RemoteAddr, " executed the script ", pathFromDb, "(", realPath, ")", " on behalf of", userInfo.Username, "with total duration: ", duration)
- }
- func (g *Gateway) AddExternalEndPoint(w http.ResponseWriter, r *http.Request) {
- userInfo, err := g.Option.UserHandler.GetUserInfoFromRequest(w, r)
- if err != nil {
- common.SendErrorResponse(w, "User not logged in")
- return
- }
- // get db
- sysdb := g.Option.UserHandler.GetDatabase()
- if !sysdb.TableExists("external_agi") {
- sysdb.NewTable("external_agi")
- }
- var dat endpointFormat
- // uuid: [path, id]
- path, err := common.Mv(r, "path", false)
- if err != nil {
- common.SendErrorResponse(w, "Invalid path given")
- return
- }
- // put the data in then marshal
- id := uuid.New().String()
- dat.Path = path
- dat.Username = userInfo.Username
- jsonStr, err := json.Marshal(dat)
- if err != nil {
- common.SendErrorResponse(w, "Invalid JSON string: "+err.Error())
- return
- }
- sysdb.Write("external_agi", id, string(jsonStr))
- // send the uuid to frontend
- common.SendJSONResponse(w, "\""+id+"\"")
- }
- func (g *Gateway) RemoveExternalEndPoint(w http.ResponseWriter, r *http.Request) {
- userInfo, err := g.Option.UserHandler.GetUserInfoFromRequest(w, r)
- if err != nil {
- common.SendErrorResponse(w, "User not logged in")
- return
- }
- // get db
- sysdb := g.Option.UserHandler.GetDatabase()
- if !sysdb.TableExists("external_agi") {
- sysdb.NewTable("external_agi")
- }
- // get path
- uuid, err := common.Mv(r, "uuid", false)
- if err != nil {
- common.SendErrorResponse(w, "Invalid uuid given")
- return
- }
- // check if endpoint is here
- data, isExist := g.checkIfExternalEndpointExist(uuid)
- if !isExist {
- common.SendErrorResponse(w, "UUID does not exists in the database!")
- return
- }
- // make sure user cant see other's endpoint
- if data.Username != userInfo.Username {
- common.SendErrorResponse(w, "Permission denied")
- return
- }
- // delete record
- sysdb.Delete("external_agi", uuid)
- common.SendOK(w)
- }
- func (g *Gateway) ListExternalEndpoint(w http.ResponseWriter, r *http.Request) {
- userInfo, err := g.Option.UserHandler.GetUserInfoFromRequest(w, r)
- if err != nil {
- common.SendErrorResponse(w, "User not logged in")
- return
- }
- // get db
- sysdb := g.Option.UserHandler.GetDatabase()
- if !sysdb.TableExists("external_agi") {
- sysdb.NewTable("external_agi")
- }
- // declare variable for return
- dataFromDB := make(map[string]endpointFormat)
- // O(n) method to do the lookup
- entries, err := sysdb.ListTable("external_agi")
- if err != nil {
- common.SendErrorResponse(w, "Invalid table")
- return
- }
- for _, keypairs := range entries {
- //Decode the string
- var dataFromResult endpointFormat
- result := ""
- uuid := string(keypairs[0])
- json.Unmarshal(keypairs[1], &result)
- //fmt.Println(result)
- json.Unmarshal([]byte(result), &dataFromResult)
- if dataFromResult.Username == userInfo.Username {
- dataFromDB[uuid] = dataFromResult
- }
- }
- // marhsal and return
- returnJson, err := json.Marshal(dataFromDB)
- if err != nil {
- common.SendErrorResponse(w, "Invalid JSON: "+err.Error())
- return
- }
- sendJSONResponse(w, string(returnJson))
- }
- func (g *Gateway) checkIfExternalEndpointExist(uuid string) (endpointFormat, bool) {
- // get db
- sysdb := g.Option.UserHandler.GetDatabase()
- if !sysdb.TableExists("external_agi") {
- sysdb.NewTable("external_agi")
- }
- var dat endpointFormat
- // check if key exist
- if !sysdb.KeyExists("external_agi", uuid) {
- return dat, false
- }
- // if yes then return the value
- jsonData := ""
- sysdb.Read("external_agi", uuid, &jsonData)
- json.Unmarshal([]byte(jsonData), &dat)
- return dat, true
- }
|