Compare commits
8 Commits
6-update-t
...
14-support
| Author | SHA1 | Date | |
|---|---|---|---|
| 42d7f4131b | |||
| be515d2e6f | |||
| ec43083868 | |||
| babe9757a6 | |||
| 225c79703f | |||
| b0d58766fc | |||
| 8721daf90a | |||
| 14f0897119 |
2
go.mod
2
go.mod
@@ -1,4 +1,4 @@
|
|||||||
module github.com/ubiquiti-community/go-unifi
|
module github.com/vegardengen/go-unifi
|
||||||
|
|
||||||
go 1.21
|
go 1.21
|
||||||
|
|
||||||
|
|||||||
@@ -5,7 +5,7 @@ import (
|
|||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"github.com/tj/assert"
|
"github.com/tj/assert"
|
||||||
"github.com/ubiquiti-community/go-unifi/unifi"
|
"github.com/vegardengen/go-unifi/unifi"
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestAccountMarshalJSON(t *testing.T) {
|
func TestAccountMarshalJSON(t *testing.T) {
|
||||||
|
|||||||
48
unifi/firewall_zone.go
Normal file
48
unifi/firewall_zone.go
Normal file
@@ -0,0 +1,48 @@
|
|||||||
|
package unifi
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"fmt"
|
||||||
|
)
|
||||||
|
|
||||||
|
type FirewallZone struct {
|
||||||
|
ID string `json:"_id,omitempty"`
|
||||||
|
|
||||||
|
// Hidden bool `json:"attr_hidden,omitempty"`
|
||||||
|
// HiddenID string `json:"attr_hidden_id,omitempty"`
|
||||||
|
// NoDelete bool `json:"attr_no_delete,omitempty"`
|
||||||
|
// NoEdit bool `json:"attr_no_edit,omitempty"`
|
||||||
|
|
||||||
|
Name string `json:"name"`
|
||||||
|
DefaultZone bool `json:"default_zone,omitempty"`
|
||||||
|
NetworkIDs []string `json:"network_ids,omitempty"`
|
||||||
|
ZoneKey string `json:"zone_key,omitempty"`
|
||||||
|
|
||||||
|
// Role string `json:"role"`
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *Client) ListFirewallZones(ctx context.Context, site string) ([]FirewallZone, error) {
|
||||||
|
var respBody []FirewallZone
|
||||||
|
|
||||||
|
err := c.do_versioned(ctx, "V2", "GET", fmt.Sprintf("site/%s/firewall/zone", site), nil, &respBody)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
return respBody, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *Client) GetFirewallZone(ctx context.Context, site, id string) (*FirewallZone, error) {
|
||||||
|
firewallzones, err := c.ListFirewallZones(ctx, site)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, z := range firewallzones {
|
||||||
|
if z.ID == id {
|
||||||
|
return &z, nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil, &NotFoundError{}
|
||||||
|
}
|
||||||
4
unifi/network.generated.go
generated
4
unifi/network.generated.go
generated
@@ -95,12 +95,12 @@ type Network struct {
|
|||||||
IPSecEspDhGroup int `json:"ipsec_esp_dh_group,omitempty"` // 1|2|5|14|15|16|17|18|19|20|21|22|23|24|25|26|27|28|29|30|31|32
|
IPSecEspDhGroup int `json:"ipsec_esp_dh_group,omitempty"` // 1|2|5|14|15|16|17|18|19|20|21|22|23|24|25|26|27|28|29|30|31|32
|
||||||
IPSecEspEncryption string `json:"ipsec_esp_encryption,omitempty"` // aes128|aes192|aes256|3des
|
IPSecEspEncryption string `json:"ipsec_esp_encryption,omitempty"` // aes128|aes192|aes256|3des
|
||||||
IPSecEspHash string `json:"ipsec_esp_hash,omitempty"` // sha1|md5|sha256|sha384|sha512
|
IPSecEspHash string `json:"ipsec_esp_hash,omitempty"` // sha1|md5|sha256|sha384|sha512
|
||||||
IPSecEspLifetime string `json:"ipsec_esp_lifetime,omitempty"` // ^(?:3[0-9]|[4-9][0-9]|[1-9][0-9]{2,3}|[1-7][0-9]{4}|8[0-5][0-9]{3}|86[0-3][0-9]{2}|86400)$
|
IPSecEspLifetime int `json:"ipsec_esp_lifetime,omitempty"` // ^(?:3[0-9]|[4-9][0-9]|[1-9][0-9]{2,3}|[1-7][0-9]{4}|8[0-5][0-9]{3}|86[0-3][0-9]{2}|86400)$
|
||||||
IPSecHash string `json:"ipsec_hash,omitempty"` // sha1|md5|sha256|sha384|sha512
|
IPSecHash string `json:"ipsec_hash,omitempty"` // sha1|md5|sha256|sha384|sha512
|
||||||
IPSecIkeDhGroup int `json:"ipsec_ike_dh_group,omitempty"` // 1|2|5|14|15|16|17|18|19|20|21|22|23|24|25|26|27|28|29|30|31|32
|
IPSecIkeDhGroup int `json:"ipsec_ike_dh_group,omitempty"` // 1|2|5|14|15|16|17|18|19|20|21|22|23|24|25|26|27|28|29|30|31|32
|
||||||
IPSecIkeEncryption string `json:"ipsec_ike_encryption,omitempty"` // aes128|aes192|aes256|3des
|
IPSecIkeEncryption string `json:"ipsec_ike_encryption,omitempty"` // aes128|aes192|aes256|3des
|
||||||
IPSecIkeHash string `json:"ipsec_ike_hash,omitempty"` // sha1|md5|sha256|sha384|sha512
|
IPSecIkeHash string `json:"ipsec_ike_hash,omitempty"` // sha1|md5|sha256|sha384|sha512
|
||||||
IPSecIkeLifetime string `json:"ipsec_ike_lifetime,omitempty"` // ^(?:3[0-9]|[4-9][0-9]|[1-9][0-9]{2,3}|[1-7][0-9]{4}|8[0-5][0-9]{3}|86[0-3][0-9]{2}|86400)$
|
IPSecIkeLifetime int `json:"ipsec_ike_lifetime,omitempty"` // ^(?:3[0-9]|[4-9][0-9]|[1-9][0-9]{2,3}|[1-7][0-9]{4}|8[0-5][0-9]{3}|86[0-3][0-9]{2}|86400)$
|
||||||
IPSecInterface string `json:"ipsec_interface,omitempty"` // wan|wan2
|
IPSecInterface string `json:"ipsec_interface,omitempty"` // wan|wan2
|
||||||
IPSecKeyExchange string `json:"ipsec_key_exchange,omitempty"` // ikev1|ikev2
|
IPSecKeyExchange string `json:"ipsec_key_exchange,omitempty"` // ikev1|ikev2
|
||||||
IPSecLocalIDentifier string `json:"ipsec_local_identifier,omitempty"`
|
IPSecLocalIDentifier string `json:"ipsec_local_identifier,omitempty"`
|
||||||
|
|||||||
@@ -5,7 +5,7 @@ import (
|
|||||||
"reflect"
|
"reflect"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"github.com/ubiquiti-community/go-unifi/unifi"
|
"github.com/vegardengen/go-unifi/unifi"
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestNetworkUnmarshalJSON(t *testing.T) {
|
func TestNetworkUnmarshalJSON(t *testing.T) {
|
||||||
|
|||||||
@@ -191,10 +191,22 @@ func (c *Client) Login(ctx context.Context, user, pass string) error {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (c *Client) do(ctx context.Context, method, relativeURL string, reqBody any, respBody any) error {
|
func (c *Client) do(ctx context.Context, method, relativeURL string, reqBody any, respBody any) error {
|
||||||
|
return c.do_versioned(ctx, "V1", method, relativeURL, reqBody, respBody)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *Client) do_versioned(ctx context.Context, version, method, relativeURL string, reqBody any, respBody any) error {
|
||||||
// single threading requests, this is mostly to assist in CSRF token propagation
|
// single threading requests, this is mostly to assist in CSRF token propagation
|
||||||
c.Lock()
|
c.Lock()
|
||||||
defer c.Unlock()
|
defer c.Unlock()
|
||||||
|
|
||||||
|
var apiPath string
|
||||||
|
|
||||||
|
if version == "V2" {
|
||||||
|
apiPath = c.apiV2Path
|
||||||
|
} else {
|
||||||
|
apiPath = c.apiPath
|
||||||
|
}
|
||||||
|
|
||||||
var (
|
var (
|
||||||
reqReader io.Reader
|
reqReader io.Reader
|
||||||
err error
|
err error
|
||||||
@@ -213,7 +225,7 @@ func (c *Client) do(ctx context.Context, method, relativeURL string, reqBody any
|
|||||||
return fmt.Errorf("unable to parse URL: %s %s %w", method, relativeURL, err)
|
return fmt.Errorf("unable to parse URL: %s %s %w", method, relativeURL, err)
|
||||||
}
|
}
|
||||||
if !strings.HasPrefix(relativeURL, "/") && !reqURL.IsAbs() {
|
if !strings.HasPrefix(relativeURL, "/") && !reqURL.IsAbs() {
|
||||||
reqURL.Path = path.Join(c.apiPath, reqURL.Path)
|
reqURL.Path = path.Join(apiPath, reqURL.Path)
|
||||||
}
|
}
|
||||||
|
|
||||||
url := c.baseURL.ResolveReference(reqURL)
|
url := c.baseURL.ResolveReference(reqURL)
|
||||||
|
|||||||
Reference in New Issue
Block a user