mirror of
				https://github.com/h44z/wg-portal.git
				synced 2025-11-03 23:56:18 +00:00 
			
		
		
		
	cleanup code warnings, update RaspberryPi readme
This commit is contained in:
		@@ -2,7 +2,7 @@ package ldap
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"crypto/tls"
 | 
			
		||||
	"io/ioutil"
 | 
			
		||||
	"os"
 | 
			
		||||
	"strings"
 | 
			
		||||
 | 
			
		||||
	"github.com/gin-gonic/gin"
 | 
			
		||||
@@ -48,8 +48,8 @@ func (Provider) GetPriority() int {
 | 
			
		||||
	return 1 // LDAP password provider
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (provider Provider) SetupRoutes(routes *gin.RouterGroup) {
 | 
			
		||||
	// nothing todo here
 | 
			
		||||
func (provider Provider) SetupRoutes(_ *gin.RouterGroup) {
 | 
			
		||||
	// nothing here
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (provider Provider) Login(ctx *authentication.AuthContext) (string, error) {
 | 
			
		||||
@@ -97,8 +97,8 @@ func (provider Provider) Login(ctx *authentication.AuthContext) (string, error)
 | 
			
		||||
	return sr.Entries[0].GetAttributeValue(provider.config.EmailAttribute), nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (provider Provider) Logout(context *authentication.AuthContext) error {
 | 
			
		||||
	return nil // nothing todo here
 | 
			
		||||
func (provider Provider) Logout(_ *authentication.AuthContext) error {
 | 
			
		||||
	return nil // nothing here
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (provider Provider) GetUserModel(ctx *authentication.AuthContext) (*authentication.User, error) {
 | 
			
		||||
@@ -159,23 +159,23 @@ func (provider Provider) open() (*ldap.Conn, error) {
 | 
			
		||||
 | 
			
		||||
	if provider.config.LdapCertConn {
 | 
			
		||||
 | 
			
		||||
		cert_plain, err := ioutil.ReadFile(provider.config.LdapTlsCert)
 | 
			
		||||
		certPlain, err := os.ReadFile(provider.config.LdapTlsCert)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			return nil, errors.WithMessage(err, "failed to load the certificate")
 | 
			
		||||
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		key, err := ioutil.ReadFile(provider.config.LdapTlsKey)
 | 
			
		||||
		key, err := os.ReadFile(provider.config.LdapTlsKey)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			return nil, errors.WithMessage(err, "failed to load the key")
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		cert_x509, err := tls.X509KeyPair(cert_plain, key)
 | 
			
		||||
		certX509, err := tls.X509KeyPair(certPlain, key)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			return nil, errors.WithMessage(err, "failed X509")
 | 
			
		||||
 | 
			
		||||
		}
 | 
			
		||||
		tlsConfig = &tls.Config{Certificates: []tls.Certificate{cert_x509}}
 | 
			
		||||
		tlsConfig = &tls.Config{Certificates: []tls.Certificate{certX509}}
 | 
			
		||||
 | 
			
		||||
	} else {
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -50,8 +50,8 @@ func (Provider) GetPriority() int {
 | 
			
		||||
	return 0 // DB password provider = highest prio
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (provider Provider) SetupRoutes(routes *gin.RouterGroup) {
 | 
			
		||||
	// nothing todo here
 | 
			
		||||
func (provider Provider) SetupRoutes(_ *gin.RouterGroup) {
 | 
			
		||||
	// nothing here
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (provider Provider) Login(ctx *authentication.AuthContext) (string, error) {
 | 
			
		||||
@@ -79,8 +79,8 @@ func (provider Provider) Login(ctx *authentication.AuthContext) (string, error)
 | 
			
		||||
	return user.Email, nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (provider Provider) Logout(context *authentication.AuthContext) error {
 | 
			
		||||
	return nil // nothing todo here
 | 
			
		||||
func (provider Provider) Logout(_ *authentication.AuthContext) error {
 | 
			
		||||
	return nil // nothing here
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (provider Provider) GetUserModel(ctx *authentication.AuthContext) (*authentication.User, error) {
 | 
			
		||||
 
 | 
			
		||||
@@ -3,7 +3,6 @@ package common
 | 
			
		||||
import (
 | 
			
		||||
	"crypto/tls"
 | 
			
		||||
	"io"
 | 
			
		||||
	"io/ioutil"
 | 
			
		||||
	"time"
 | 
			
		||||
 | 
			
		||||
	"github.com/pkg/errors"
 | 
			
		||||
@@ -96,7 +95,7 @@ func SendEmailWithAttachments(cfg MailConfig, sender, replyTo, subject, body, ht
 | 
			
		||||
	email.AddAlternative(mail.TextPlain, body)
 | 
			
		||||
 | 
			
		||||
	for _, attachment := range attachments {
 | 
			
		||||
		attachmentData, err := ioutil.ReadAll(attachment.Data)
 | 
			
		||||
		attachmentData, err := io.ReadAll(attachment.Data)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			return errors.Wrapf(err, "failed to read attachment data for %s", attachment.Name)
 | 
			
		||||
		}
 | 
			
		||||
 
 | 
			
		||||
@@ -2,7 +2,7 @@ package ldap
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"crypto/tls"
 | 
			
		||||
	"io/ioutil"
 | 
			
		||||
	"os"
 | 
			
		||||
 | 
			
		||||
	"github.com/go-ldap/ldap/v3"
 | 
			
		||||
	"github.com/pkg/errors"
 | 
			
		||||
@@ -19,23 +19,23 @@ func Open(cfg *Config) (*ldap.Conn, error) {
 | 
			
		||||
 | 
			
		||||
	if cfg.LdapCertConn {
 | 
			
		||||
 | 
			
		||||
		cert_plain, err := ioutil.ReadFile(cfg.LdapTlsCert)
 | 
			
		||||
		certPlain, err := os.ReadFile(cfg.LdapTlsCert)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			return nil, errors.WithMessage(err, "failed to load the certificate")
 | 
			
		||||
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		key, err := ioutil.ReadFile(cfg.LdapTlsKey)
 | 
			
		||||
		key, err := os.ReadFile(cfg.LdapTlsKey)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			return nil, errors.WithMessage(err, "failed to load the key")
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		cert_x509, err := tls.X509KeyPair(cert_plain, key)
 | 
			
		||||
		certX509, err := tls.X509KeyPair(certPlain, key)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			return nil, errors.WithMessage(err, "failed X509")
 | 
			
		||||
 | 
			
		||||
		}
 | 
			
		||||
		tlsConfig = &tls.Config{Certificates: []tls.Certificate{cert_x509}}
 | 
			
		||||
		tlsConfig = &tls.Config{Certificates: []tls.Certificate{certX509}}
 | 
			
		||||
 | 
			
		||||
	} else {
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -4,8 +4,8 @@ import (
 | 
			
		||||
	"context"
 | 
			
		||||
	"encoding/gob"
 | 
			
		||||
	"html/template"
 | 
			
		||||
	"io"
 | 
			
		||||
	"io/fs"
 | 
			
		||||
	"io/ioutil"
 | 
			
		||||
	"math/rand"
 | 
			
		||||
	"net/http"
 | 
			
		||||
	"net/url"
 | 
			
		||||
@@ -110,7 +110,7 @@ func (s *Server) Setup(ctx context.Context) error {
 | 
			
		||||
 | 
			
		||||
	// Setup http server
 | 
			
		||||
	gin.SetMode(gin.DebugMode)
 | 
			
		||||
	gin.DefaultWriter = ioutil.Discard
 | 
			
		||||
	gin.DefaultWriter = io.Discard
 | 
			
		||||
	s.server = gin.New()
 | 
			
		||||
	if logrus.GetLevel() == logrus.TraceLevel {
 | 
			
		||||
		s.server.Use(ginlogrus.Logger(logrus.StandardLogger()))
 | 
			
		||||
 
 | 
			
		||||
@@ -4,7 +4,7 @@ import (
 | 
			
		||||
	"context"
 | 
			
		||||
	"crypto/md5"
 | 
			
		||||
	"fmt"
 | 
			
		||||
	"io/ioutil"
 | 
			
		||||
	"os"
 | 
			
		||||
	"path"
 | 
			
		||||
	"syscall"
 | 
			
		||||
	"time"
 | 
			
		||||
@@ -224,7 +224,7 @@ func (s *Server) WriteWireGuardConfigFile(device string) error {
 | 
			
		||||
		return errors.WithMessage(err, "failed to get config file")
 | 
			
		||||
	}
 | 
			
		||||
	filePath := path.Join(s.config.WG.ConfigDirectoryPath, dev.DeviceName+".conf")
 | 
			
		||||
	if err := ioutil.WriteFile(filePath, cfg, 0644); err != nil {
 | 
			
		||||
	if err := os.WriteFile(filePath, cfg, 0644); err != nil {
 | 
			
		||||
		return errors.Wrap(err, "failed to write WireGuard config file")
 | 
			
		||||
	}
 | 
			
		||||
	return nil
 | 
			
		||||
 
 | 
			
		||||
@@ -11,7 +11,6 @@ type UserSource string
 | 
			
		||||
const (
 | 
			
		||||
	UserSourceLdap     UserSource = "ldap" // LDAP / ActiveDirectory
 | 
			
		||||
	UserSourceDatabase UserSource = "db"   // sqlite / mysql database
 | 
			
		||||
	UserSourceOIDC     UserSource = "oidc" // open id connect, TODO: implement
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
type PrivateString string
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user