haproxy-wi/app/routes/main/routes.py

201 lines
6.7 KiB
Python

import os
from typing import Union, Literal
from flask import render_template, g, abort, jsonify, send_from_directory, request
from flask_jwt_extended import jwt_required
from flask_pydantic import validate
from pydantic import IPvAnyAddress
import requests
from app import app, cache, jwt
from app.routes.main import bp
import app.modules.db.sql as sql
import app.modules.db.user as user_sql
import app.modules.db.server as server_sql
import app.modules.db.service as service_sql
import app.modules.db.history as history_sql
from app.middleware import check_services, get_user_params
import app.modules.common.common as common
import app.modules.roxywi.roxy as roxy
import app.modules.roxywi.auth as roxywi_auth
import app.modules.roxywi.nettools as nettools_mod
import app.modules.roxywi.common as roxywi_common
import app.modules.service.common as service_common
import app.modules.service.haproxy as service_haproxy
from app.modules.roxywi.class_models import ErrorResponse, NettoolsRequest, DomainName
@app.template_filter('strftime')
def _jinja2_filter_datetime(date, fmt=None):
return common.get_time_zoned_date(date, fmt)
@jwt.expired_token_loader
def my_expired_token_callback(jwt_header, jwt_payload):
return jsonify(error="Token is expired"), 401
@jwt.unauthorized_loader
def custom_unauthorized_response(_err):
return jsonify(error="Authorize first"), 401
@app.route('/favicon.ico')
def favicon():
return send_from_directory(os.path.join(app.root_path, 'static'),
'images/favicon/favicon.ico', mimetype='image/vnd.microsoft.icon')
@bp.route('/stats/<service>/', defaults={'serv': None})
@bp.route('/stats/<service>/<serv>')
@jwt_required()
@check_services
@get_user_params()
def stats(service, serv):
kwargs = {
'serv': serv,
'service': service,
'service_desc': service_sql.select_service(service),
'lang': g.user_params['lang']
}
return render_template('statsview.html', **kwargs)
@bp.route('/stats/view/<service>/<server_ip>')
@jwt_required()
@check_services
@get_user_params()
@validate()
def show_stats(service: Literal['haproxy', 'apache', 'nginx'], server_ip: Union[IPvAnyAddress, DomainName]):
if service in ('nginx', 'apache'):
try:
return service_common.get_stat_page(server_ip, service, g.user_params['group_id'])
except Exception as e:
return e
else:
try:
return service_haproxy.stat_page_action(server_ip, g.user_params['group_id'])
except Exception as e:
return str(e)
@bp.route('/nettools')
@jwt_required()
@get_user_params(1)
def nettools():
return render_template('nettools.html', lang=g.user_params['lang'])
@bp.post('/nettools/<check>')
@validate(body=NettoolsRequest)
@jwt_required()
def nettools_check(check, body: NettoolsRequest):
if check == 'icmp':
try:
return nettools_mod.ping_from_server(body.server_from, str(body.server_to), body.action)
except Exception as e:
return ErrorResponse(error=f'Cannot ping: {e}').model_dump(mode='json'), 500
elif check == 'tcp':
try:
return nettools_mod.telnet_from_server(body.server_from, str(body.server_to), body.port)
except Exception as e:
return ErrorResponse(error=f'Cannot check port: {e}').model_dump(mode='json'), 500
elif check == 'dns':
try:
return nettools_mod.nslookup_from_server(body.server_from, body.dns_name, body.record_type)
except Exception as e:
return ErrorResponse(error=f'Cannot lookup: {e}').model_dump(mode='json'), 500
elif check == 'whois':
try:
return jsonify(nettools_mod.whois_check(body.dns_name))
except Exception as e:
return ErrorResponse(error=f'Cannot make whois: {e}').model_dump(mode='json'), 500
elif check == 'ipcalc':
try:
ip_add = str(body.ip)
netmask = int(body.netmask)
except Exception as e:
return ErrorResponse(error=f'Cannot calc: {e}').model_dump(mode='json'), 500
try:
return jsonify(nettools_mod.ip_calc(ip_add, netmask))
except Exception as e:
return ErrorResponse(error=f'Cannot calc: {e}').model_dump(mode='json'), 500
else:
return 'error: Wrong check'
@bp.route('/history/<service>/<server_ip>')
@jwt_required()
@get_user_params()
@validate()
def service_history(service: str, server_ip: Union[IPvAnyAddress, DomainName, int]):
history = ''
server_ip = str(server_ip)
if service in ('haproxy', 'nginx', 'keepalived', 'apache', 'cluster', 'udp'):
service_desc = service_sql.select_service(service)
if not roxywi_auth.is_access_permit_to_service(service_desc.slug):
abort(403, f'You do not have needed permissions to access to {service_desc.slug.title()} service')
if service in ('cluster', 'udp'):
server_id = server_ip
else:
server_id = server_sql.get_server_by_ip(server_ip).server_id
history = history_sql.select_action_history_by_server_id_and_service(server_id, service_desc.service)
elif service == 'server':
if roxywi_common.check_is_server_in_group(server_ip):
server_id = server_sql.get_server_by_ip(server_ip).server_id
history = history_sql.select_action_history_by_server_id(server_id)
elif service == 'user':
history = history_sql.select_action_history_by_user_id(int(server_ip))
else:
abort(404, 'History not found')
kwargs = {
'user_subscription': roxywi_common.return_user_subscription(),
'users': user_sql.select_users(),
'serv': server_ip,
'service': service,
'history': history
}
return render_template('history.html', **kwargs)
@bp.route('/internal/show_version')
@cache.cached()
def show_roxywi_version():
return jsonify(roxy.versions())
@app.route("/api/gpt", methods=["POST"])
def ask_gpt():
data = request.get_json()
prompt = data.get("prompt", "")
try:
proxies = common.return_proxy_dict()
headers = {
"Content-Type": "application/json",
}
payload = {
"prompt": prompt,
"license": sql.get_setting('license')
}
response = requests.post(
"https://roxy-wi.org/api/gpt",
headers=headers,
json=payload,
proxies=proxies,
timeout=20
)
response.raise_for_status()
result = response.json()
if "error" in result:
return jsonify({"error": result["error"]}), 500
content = result["response"]
return jsonify({"response": content})
except Exception as e:
return jsonify({"error": str(e)}), 500