diff --git a/controllers/common.go b/controllers/common.go index 5ebdc162..f8ce1d47 100644 --- a/controllers/common.go +++ b/controllers/common.go @@ -15,6 +15,7 @@ import ( * If being deleted by server, create a record in the DELETED_NODES_TABLE for the client to find * If being deleted by the client, delete completely */ +// DeleteNode - deletes a node func DeleteNode(key string, exterminate bool) error { var err error if !exterminate { @@ -46,6 +47,7 @@ func DeleteNode(key string, exterminate bool) error { return err } +// DeleteIntClient - deletes an int client func DeleteIntClient(clientid string) (bool, error) { err := database.DeleteRecord(database.INT_CLIENTS_TABLE_NAME, clientid) @@ -56,6 +58,7 @@ func DeleteIntClient(clientid string) (bool, error) { return true, nil } +// GetNode - gets a node func GetNode(macaddress string, network string) (models.Node, error) { var node models.Node @@ -80,6 +83,7 @@ func GetNode(macaddress string, network string) (models.Node, error) { return node, err } +// GetIntClient - gets int client func GetIntClient(clientid string) (models.IntClient, error) { var client models.IntClient diff --git a/controllers/loggerHttpController.go b/controllers/loggerHttpController.go index e323f3cc..81f6e242 100644 --- a/controllers/loggerHttpController.go +++ b/controllers/loggerHttpController.go @@ -10,7 +10,7 @@ import ( ) func loggerHandlers(r *mux.Router) { - r.HandleFunc("/api/logs", securityCheckDNS(true, true, http.HandlerFunc(getLogs))).Methods("GET") + r.HandleFunc("/api/logs", securityCheck(true, http.HandlerFunc(getLogs))).Methods("GET") } func getLogs(w http.ResponseWriter, r *http.Request) { diff --git a/controllers/security.go b/controllers/security.go index 554c942c..a0b15eee 100644 --- a/controllers/security.go +++ b/controllers/security.go @@ -28,6 +28,7 @@ func securityCheck(reqAdmin bool, next http.Handler) http.HandlerFunc { networks, _ := json.Marshal([]string{ALL_NETWORK_ACCESS}) r.Header.Set("networks", string(networks)) next.ServeHTTP(w, r) + return } err, networks, username := SecurityCheck(reqAdmin, params["networkname"], bearerToken)