BREAKING CHANGE(vpn): replace tag-based VPN access control with source and target profiles
This commit is contained in:
155
ts/opsserver/handlers/target-profile.handler.ts
Normal file
155
ts/opsserver/handlers/target-profile.handler.ts
Normal file
@@ -0,0 +1,155 @@
|
||||
import * as plugins from '../../plugins.js';
|
||||
import type { OpsServer } from '../classes.opsserver.js';
|
||||
import * as interfaces from '../../../ts_interfaces/index.js';
|
||||
|
||||
export class TargetProfileHandler {
|
||||
public typedrouter = new plugins.typedrequest.TypedRouter();
|
||||
|
||||
constructor(private opsServerRef: OpsServer) {
|
||||
this.opsServerRef.typedrouter.addTypedRouter(this.typedrouter);
|
||||
this.registerHandlers();
|
||||
}
|
||||
|
||||
private async requireAuth(
|
||||
request: { identity?: interfaces.data.IIdentity; apiToken?: string },
|
||||
requiredScope?: interfaces.data.TApiTokenScope,
|
||||
): Promise<string> {
|
||||
if (request.identity?.jwt) {
|
||||
try {
|
||||
const isAdmin = await this.opsServerRef.adminHandler.adminIdentityGuard.exec({
|
||||
identity: request.identity,
|
||||
});
|
||||
if (isAdmin) return request.identity.userId;
|
||||
} catch { /* fall through */ }
|
||||
}
|
||||
|
||||
if (request.apiToken) {
|
||||
const tokenManager = this.opsServerRef.dcRouterRef.apiTokenManager;
|
||||
if (tokenManager) {
|
||||
const token = await tokenManager.validateToken(request.apiToken);
|
||||
if (token) {
|
||||
if (!requiredScope || tokenManager.hasScope(token, requiredScope)) {
|
||||
return token.createdBy;
|
||||
}
|
||||
throw new plugins.typedrequest.TypedResponseError('insufficient scope');
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
throw new plugins.typedrequest.TypedResponseError('unauthorized');
|
||||
}
|
||||
|
||||
private registerHandlers(): void {
|
||||
// Get all target profiles
|
||||
this.typedrouter.addTypedHandler(
|
||||
new plugins.typedrequest.TypedHandler<interfaces.requests.IReq_GetTargetProfiles>(
|
||||
'getTargetProfiles',
|
||||
async (dataArg) => {
|
||||
await this.requireAuth(dataArg, 'target-profiles:read');
|
||||
const manager = this.opsServerRef.dcRouterRef.targetProfileManager;
|
||||
if (!manager) {
|
||||
return { profiles: [] };
|
||||
}
|
||||
return { profiles: manager.listProfiles() };
|
||||
},
|
||||
),
|
||||
);
|
||||
|
||||
// Get a single target profile
|
||||
this.typedrouter.addTypedHandler(
|
||||
new plugins.typedrequest.TypedHandler<interfaces.requests.IReq_GetTargetProfile>(
|
||||
'getTargetProfile',
|
||||
async (dataArg) => {
|
||||
await this.requireAuth(dataArg, 'target-profiles:read');
|
||||
const manager = this.opsServerRef.dcRouterRef.targetProfileManager;
|
||||
if (!manager) {
|
||||
return { profile: null };
|
||||
}
|
||||
return { profile: manager.getProfile(dataArg.id) || null };
|
||||
},
|
||||
),
|
||||
);
|
||||
|
||||
// Create a target profile
|
||||
this.typedrouter.addTypedHandler(
|
||||
new plugins.typedrequest.TypedHandler<interfaces.requests.IReq_CreateTargetProfile>(
|
||||
'createTargetProfile',
|
||||
async (dataArg) => {
|
||||
const userId = await this.requireAuth(dataArg, 'target-profiles:write');
|
||||
const manager = this.opsServerRef.dcRouterRef.targetProfileManager;
|
||||
if (!manager) {
|
||||
return { success: false, message: 'Target profile manager not initialized' };
|
||||
}
|
||||
const id = await manager.createProfile({
|
||||
name: dataArg.name,
|
||||
description: dataArg.description,
|
||||
domains: dataArg.domains,
|
||||
targets: dataArg.targets,
|
||||
routeRefs: dataArg.routeRefs,
|
||||
createdBy: userId,
|
||||
});
|
||||
return { success: true, id };
|
||||
},
|
||||
),
|
||||
);
|
||||
|
||||
// Update a target profile
|
||||
this.typedrouter.addTypedHandler(
|
||||
new plugins.typedrequest.TypedHandler<interfaces.requests.IReq_UpdateTargetProfile>(
|
||||
'updateTargetProfile',
|
||||
async (dataArg) => {
|
||||
await this.requireAuth(dataArg, 'target-profiles:write');
|
||||
const manager = this.opsServerRef.dcRouterRef.targetProfileManager;
|
||||
if (!manager) {
|
||||
return { success: false, message: 'Not initialized' };
|
||||
}
|
||||
await manager.updateProfile(dataArg.id, {
|
||||
name: dataArg.name,
|
||||
description: dataArg.description,
|
||||
domains: dataArg.domains,
|
||||
targets: dataArg.targets,
|
||||
routeRefs: dataArg.routeRefs,
|
||||
});
|
||||
// Re-apply routes to update VPN access
|
||||
this.opsServerRef.dcRouterRef.routeConfigManager?.applyRoutes();
|
||||
return { success: true };
|
||||
},
|
||||
),
|
||||
);
|
||||
|
||||
// Delete a target profile
|
||||
this.typedrouter.addTypedHandler(
|
||||
new plugins.typedrequest.TypedHandler<interfaces.requests.IReq_DeleteTargetProfile>(
|
||||
'deleteTargetProfile',
|
||||
async (dataArg) => {
|
||||
await this.requireAuth(dataArg, 'target-profiles:write');
|
||||
const manager = this.opsServerRef.dcRouterRef.targetProfileManager;
|
||||
if (!manager) {
|
||||
return { success: false, message: 'Not initialized' };
|
||||
}
|
||||
const result = await manager.deleteProfile(dataArg.id, dataArg.force);
|
||||
if (result.success) {
|
||||
// Re-apply routes to update VPN access
|
||||
this.opsServerRef.dcRouterRef.routeConfigManager?.applyRoutes();
|
||||
}
|
||||
return result;
|
||||
},
|
||||
),
|
||||
);
|
||||
|
||||
// Get VPN clients using a target profile
|
||||
this.typedrouter.addTypedHandler(
|
||||
new plugins.typedrequest.TypedHandler<interfaces.requests.IReq_GetTargetProfileUsage>(
|
||||
'getTargetProfileUsage',
|
||||
async (dataArg) => {
|
||||
await this.requireAuth(dataArg, 'target-profiles:read');
|
||||
const manager = this.opsServerRef.dcRouterRef.targetProfileManager;
|
||||
if (!manager) {
|
||||
return { clients: [] };
|
||||
}
|
||||
return { clients: await manager.getProfileUsage(dataArg.id) };
|
||||
},
|
||||
),
|
||||
);
|
||||
}
|
||||
}
|
||||
Reference in New Issue
Block a user