Files
DurpAPI/main.go
2023-05-20 11:28:54 -05:00

98 lines
2.2 KiB
Go

package main
import (
"net/http"
"strings"
"github.com/gin-gonic/gin"
swaggerFiles "github.com/swaggo/files"
ginSwagger "github.com/swaggo/gin-swagger"
"gitlab.com/DeveloperDurp/DurpAPI/controller"
_ "gitlab.com/DeveloperDurp/DurpAPI/docs"
)
// @title DurpAPI
// @version 1.0
// @description API for Durp's needs
// @termsOfService http://swagger.io/terms/
// @contact.name API Support
// @contact.url http://www.swagger.io/support
// @contact.email support@swagger.io
// @license.name Apache 2.0
// @license.url http://www.apache.org/licenses/LICENSE-2.0.html
// @host durpapi.durp.info
// @BasePath /api/v1
// @securityDefinitions.apikey ApiKeyAuth
// @in header
// @name Authorization
func main() {
r := gin.Default()
c := controller.NewController()
var groups []string
v1 := r.Group("/api/v1")
{
health := v1.Group("/health")
{
health.GET("getHealth", c.GetHealth)
}
openai := v1.Group("/openai")
{
groups = []string{"openai"}
openai.Use(authMiddleware(groups))
openai.GET("general", c.GeneralOpenAI)
openai.GET("travelagent", c.TravelAgentOpenAI)
}
unraid := v1.Group("/unraid")
{
groups = []string{"unraid"}
unraid.Use(authMiddleware(groups))
unraid.GET("powerusage", c.UnraidPowerUsage)
}
}
r.GET("/swagger/*any", ginSwagger.WrapHandler(swaggerFiles.Handler))
r.Run(":8080")
}
func authMiddleware(allowedGroups []string) gin.HandlerFunc {
return func(c *gin.Context) {
// Get the user groups from the request headers
groupsHeader := c.GetHeader("X-authentik-groups")
// Split the groups header value into individual groups
groups := strings.Split(groupsHeader, "|")
// Check if the user belongs to any of the allowed groups
isAllowed := false
for _, allowedGroup := range allowedGroups {
for _, group := range groups {
if group == allowedGroup {
isAllowed = true
break
}
}
if isAllowed {
break
}
}
// If the user is not in any of the allowed groups, respond with unauthorized access
if !isAllowed {
c.AbortWithStatusJSON(http.StatusUnauthorized, gin.H{
"message": "Unauthorized access",
"groups": allowedGroups,
})
return
}
// Call the next handler
c.Next()
}
}