Compare commits
5 Commits
10-fix-mod
...
v0.0.1-alp
| Author | SHA1 | Date | |
|---|---|---|---|
| 0e9e9cb8a3 | |||
| 42d7f4131b | |||
| be515d2e6f | |||
| ec43083868 | |||
| babe9757a6 |
48
unifi/firewall_zone.go
Normal file
48
unifi/firewall_zone.go
Normal file
@@ -0,0 +1,48 @@
|
|||||||
|
package unifi
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"fmt"
|
||||||
|
)
|
||||||
|
|
||||||
|
type FirewallZone struct {
|
||||||
|
ID string `json:"_id,omitempty"`
|
||||||
|
|
||||||
|
// Hidden bool `json:"attr_hidden,omitempty"`
|
||||||
|
// HiddenID string `json:"attr_hidden_id,omitempty"`
|
||||||
|
// NoDelete bool `json:"attr_no_delete,omitempty"`
|
||||||
|
// NoEdit bool `json:"attr_no_edit,omitempty"`
|
||||||
|
|
||||||
|
Name string `json:"name"`
|
||||||
|
DefaultZone bool `json:"default_zone,omitempty"`
|
||||||
|
NetworkIDs []string `json:"network_ids,omitempty"`
|
||||||
|
ZoneKey string `json:"zone_key,omitempty"`
|
||||||
|
|
||||||
|
// Role string `json:"role"`
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *Client) ListFirewallZones(ctx context.Context, site string) ([]FirewallZone, error) {
|
||||||
|
var respBody []FirewallZone
|
||||||
|
|
||||||
|
err := c.do_versioned(ctx, "V2", "GET", fmt.Sprintf("site/%s/firewall/zone", site), nil, &respBody)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
return respBody, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *Client) GetFirewallZone(ctx context.Context, site, id string) (*FirewallZone, error) {
|
||||||
|
firewallzones, err := c.ListFirewallZones(ctx, site)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, z := range firewallzones {
|
||||||
|
if z.ID == id {
|
||||||
|
return &z, nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil, &NotFoundError{}
|
||||||
|
}
|
||||||
@@ -191,10 +191,22 @@ func (c *Client) Login(ctx context.Context, user, pass string) error {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (c *Client) do(ctx context.Context, method, relativeURL string, reqBody any, respBody any) error {
|
func (c *Client) do(ctx context.Context, method, relativeURL string, reqBody any, respBody any) error {
|
||||||
|
return c.do_versioned(ctx, "V1", method, relativeURL, reqBody, respBody)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *Client) do_versioned(ctx context.Context, version, method, relativeURL string, reqBody any, respBody any) error {
|
||||||
// single threading requests, this is mostly to assist in CSRF token propagation
|
// single threading requests, this is mostly to assist in CSRF token propagation
|
||||||
c.Lock()
|
c.Lock()
|
||||||
defer c.Unlock()
|
defer c.Unlock()
|
||||||
|
|
||||||
|
var apiPath string
|
||||||
|
|
||||||
|
if version == "V2" {
|
||||||
|
apiPath = c.apiV2Path
|
||||||
|
} else {
|
||||||
|
apiPath = c.apiPath
|
||||||
|
}
|
||||||
|
|
||||||
var (
|
var (
|
||||||
reqReader io.Reader
|
reqReader io.Reader
|
||||||
err error
|
err error
|
||||||
@@ -213,7 +225,7 @@ func (c *Client) do(ctx context.Context, method, relativeURL string, reqBody any
|
|||||||
return fmt.Errorf("unable to parse URL: %s %s %w", method, relativeURL, err)
|
return fmt.Errorf("unable to parse URL: %s %s %w", method, relativeURL, err)
|
||||||
}
|
}
|
||||||
if !strings.HasPrefix(relativeURL, "/") && !reqURL.IsAbs() {
|
if !strings.HasPrefix(relativeURL, "/") && !reqURL.IsAbs() {
|
||||||
reqURL.Path = path.Join(c.apiPath, reqURL.Path)
|
reqURL.Path = path.Join(apiPath, reqURL.Path)
|
||||||
}
|
}
|
||||||
|
|
||||||
url := c.baseURL.ResolveReference(reqURL)
|
url := c.baseURL.ResolveReference(reqURL)
|
||||||
|
|||||||
Reference in New Issue
Block a user