Skip to content

Commit a244cac

Browse files
committed
remove log, improve stability
1 parent b5b7c30 commit a244cac

File tree

17 files changed

+1524
-1604
lines changed

17 files changed

+1524
-1604
lines changed

README.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ fiewall gateway is a firewall central controller as firewalld
1414
- Async batch task (only add).
1515
- Can control thousands of linux machine via firewall gateway remotely.
1616
- Support change tempate of thousands of machine fastly.
17-
- Support wrong operation.
17+
- Support wrong operation backoff.
1818
- Support delay command effect.
1919
- Support IPtables NAT
2020
- Support template (only enable db).
@@ -39,6 +39,10 @@ make
3939

4040
[HTTP API DOC](https://documenter.getpostman.com/view/12796679/UV5agGNr)
4141

42+
- v1 runtime.
43+
- v2 permanent.
44+
- v3 async task.
45+
4246
## FAQ
4347

4448
### Why not use ssh or ansible tools.

cmd/main.go

Lines changed: 0 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,6 @@ package main
22

33
import (
44
"flag"
5-
"fmt"
65
"os"
76

87
"github.com/spf13/pflag"
@@ -11,32 +10,6 @@ import (
1110
"github.com/cylonchau/firewalldGateway/server"
1211
)
1312

14-
var (
15-
configuration string
16-
h bool
17-
)
18-
19-
func BuildInitFlags() {
20-
flagset := flag.CommandLine
21-
flagset.StringVar(&configuration, "f", "./firewalld-gateway.conf", "set configuration file.")
22-
flagset.BoolVar(&h, "h", false, "Prints a short help text and exists.")
23-
flagset.Usage = usage
24-
klog.InitFlags(flagset)
25-
flag.Parse()
26-
}
27-
28-
func cmdPrompt(str string) {
29-
fmt.Fprintf(os.Stderr, "firewall-api: invalid option, %s\n", str)
30-
}
31-
32-
func usage() {
33-
fmt.Fprintf(os.Stderr, `Usage: firewalld-gateway [-f configfile] [-h help]
34-
35-
Options
36-
`)
37-
flag.PrintDefaults()
38-
}
39-
4013
func main() {
4114
command := server.NewProxyCommand()
4215
flagset := flag.CommandLine

firewalld-gateway.conf

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,5 @@
11
appname = "firewalld-gateway"
2-
loglevel = "debug"
3-
port = 7777
2+
port = 2952
43
address = "0.0.0.0"
54
dbus_port = 55556
65

log/logger.go

Lines changed: 0 additions & 124 deletions
This file was deleted.

server/app/router/health.go

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
package router
2+
3+
import (
4+
"github.com/gin-gonic/gin"
5+
6+
q "github.com/cylonchau/firewalldGateway/apis"
7+
code "github.com/cylonchau/firewalldGateway/server/apis"
8+
)
9+
10+
func ping(c *gin.Context) {
11+
q.SuccessResponse(c, code.OK, "pong")
12+
}

server/app/router/router.go

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ import (
99
)
1010

1111
func RegisteredRouter(e *gin.Engine) {
12+
e.Handle("GET", "ping", ping)
1213
firewall_api := e.Group("/fw")
1314
v1Group := firewall_api.Group("/v1")
1415
v2Group := firewall_api.Group("/v2")

server/app/router/v1/masquerade.go

Lines changed: 11 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -37,12 +37,12 @@ func (this *MasqueradeRouter) enableInRuntime(c *gin.Context) {
3737
}
3838

3939
dbusClient, err := firewalld.NewDbusClientService(query.Ip)
40-
defer dbusClient.Destroy()
40+
4141
if err != nil {
4242
q.ConnectDbusService(c, err)
4343
return
4444
}
45-
45+
defer dbusClient.Destroy()
4646
if err := dbusClient.EnableMasquerade(query.Zone, query.Timeout); err != nil {
4747
q.APIResponse(c, err, nil)
4848
return
@@ -67,12 +67,12 @@ func (this *MasqueradeRouter) disableInRuntime(c *gin.Context) {
6767
}
6868

6969
dbusClient, err := firewalld.NewDbusClientService(query.Ip)
70-
defer dbusClient.Destroy()
70+
7171
if err != nil {
7272
q.ConnectDbusService(c, err)
7373
return
7474
}
75-
75+
defer dbusClient.Destroy()
7676
if err := dbusClient.DisableMasquerade(query.Zone); err != nil {
7777
q.APIResponse(c, err, nil)
7878
return
@@ -97,11 +97,11 @@ func (this *MasqueradeRouter) queryInRuntime(c *gin.Context) {
9797
}
9898

9999
dbusClient, err := firewalld.NewDbusClientService(query.Ip)
100-
defer dbusClient.Destroy()
101100
if err != nil {
102101
q.ConnectDbusService(c, err)
103102
return
104103
}
104+
defer dbusClient.Destroy()
105105

106106
isenable, err := dbusClient.QueryMasquerade(query.Zone)
107107

@@ -134,11 +134,12 @@ func (this *MasqueradeRouter) enableInPermanent(c *gin.Context) {
134134
}
135135

136136
dbusClient, err := firewalld.NewDbusClientService(query.Ip)
137-
defer dbusClient.Destroy()
137+
138138
if err != nil {
139139
q.ConnectDbusService(c, err)
140140
return
141141
}
142+
defer dbusClient.Destroy()
142143

143144
if err := dbusClient.PermanentEnableMasquerade(query.Zone); err != nil {
144145
q.APIResponse(c, err, nil)
@@ -164,11 +165,12 @@ func (this *MasqueradeRouter) disableInPermanent(c *gin.Context) {
164165
}
165166

166167
dbusClient, err := firewalld.NewDbusClientService(query.Ip)
167-
defer dbusClient.Destroy()
168+
168169
if err != nil {
169170
q.ConnectDbusService(c, err)
170171
return
171172
}
173+
defer dbusClient.Destroy()
172174

173175
if err := dbusClient.PermanentDisableMasquerade(query.Zone); err != nil {
174176
q.APIResponse(c, err, nil)
@@ -194,11 +196,12 @@ func (this *MasqueradeRouter) queryInPermanent(c *gin.Context) {
194196
}
195197

196198
dbusClient, err := firewalld.NewDbusClientService(query.Ip)
197-
defer dbusClient.Destroy()
199+
198200
if err != nil {
199201
q.ConnectDbusService(c, err)
200202
return
201203
}
204+
defer dbusClient.Destroy()
202205

203206
isenable, err := dbusClient.PermanentQueryMasquerade(query.Zone)
204207

0 commit comments

Comments
 (0)