control user access to gw by roles

This commit is contained in:
abhishek9686 2024-10-30 15:24:23 +04:00
parent 8c6772420f
commit e1cc0a24dd

View file

@ -835,7 +835,7 @@ func getUserRemoteAccessNetworks(w http.ResponseWriter, r *http.Request) {
userGws := make(map[string][]models.UserRemoteGws)
networks := []models.Network{}
networkMap := make(map[string]struct{})
userGwNodes := proLogic.GetUserRAGNodesV1(*user)
userGwNodes := proLogic.GetUserRAGNodes(*user)
for _, node := range userGwNodes {
network, err := logic.GetNetwork(node.Network)
if err != nil {
@ -877,7 +877,7 @@ func getUserRemoteAccessNetworkGateways(w http.ResponseWriter, r *http.Request)
}
userGws := []models.UserRAGs{}
userGwNodes := proLogic.GetUserRAGNodesV1(*user)
userGwNodes := proLogic.GetUserRAGNodes(*user)
for _, node := range userGwNodes {
if node.Network != network {
continue
@ -932,7 +932,7 @@ func getRemoteAccessGatewayConf(w http.ResponseWriter, r *http.Request) {
return
}
userGwNodes := proLogic.GetUserRAGNodesV1(*user)
userGwNodes := proLogic.GetUserRAGNodes(*user)
if _, ok := userGwNodes[remoteGwID]; !ok {
logic.ReturnErrorResponse(w, r, logic.FormatError(errors.New("access denied"), "forbidden"))
return
@ -1076,7 +1076,7 @@ func getUserRemoteAccessGwsV1(w http.ResponseWriter, r *http.Request) {
logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
return
}
userGwNodes := proLogic.GetUserRAGNodesV1(*user)
userGwNodes := proLogic.GetUserRAGNodes(*user)
for _, extClient := range allextClients {
node, ok := userGwNodes[extClient.IngressGatewayID]
if !ok {