Bind to localhost by default and stop echoing backend errors (which can embed credentials or low-level details) back over the API and log broadcast. Validate hotspot SSID/passphrase/channel before writing hostapd.conf and tighten its mode to 0600 since it stores the WPA PSK. Restrict WebSocket upgrades to same-origin so a LAN browser can't be turned into a proxy for the API. Guard shared state: status reads/writes go through StatusMutex (the periodic updater races with the toggle and status handlers otherwise), broadcastToWebSockets no longer mutates the client map under RLock, and station-event callbacks now run under SafeGo so a panic in app code can't take down the daemon. Stop channels in hostapd, dhcp, and iwd signal monitors are now closed under sync.Once to survive concurrent Stop calls. App.Shutdown is idempotent and waits for the periodic loops before closing backends, so signal-driven and deferred shutdowns no longer race. Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
78 lines
1.7 KiB
Go
78 lines
1.7 KiB
Go
package dhcp
|
|
|
|
import (
|
|
"bufio"
|
|
"os"
|
|
"os/exec"
|
|
"regexp"
|
|
"strings"
|
|
|
|
"github.com/nemunaire/repeater/internal/models"
|
|
)
|
|
|
|
// parseDHCPLeases reads and parses DHCP lease file
|
|
func parseDHCPLeases(path string) ([]models.DHCPLease, error) {
|
|
var leases []models.DHCPLease
|
|
|
|
file, err := os.Open(path)
|
|
if err != nil {
|
|
return leases, err
|
|
}
|
|
defer file.Close()
|
|
|
|
scanner := bufio.NewScanner(file)
|
|
var currentLease models.DHCPLease
|
|
|
|
for scanner.Scan() {
|
|
line := strings.TrimSpace(scanner.Text())
|
|
fields := strings.Fields(line)
|
|
|
|
switch {
|
|
case strings.HasPrefix(line, "lease "):
|
|
if len(fields) < 2 {
|
|
continue
|
|
}
|
|
currentLease = models.DHCPLease{IP: fields[1]}
|
|
case strings.Contains(line, "hardware ethernet"):
|
|
if len(fields) < 3 {
|
|
continue
|
|
}
|
|
currentLease.MAC = strings.TrimSuffix(fields[2], ";")
|
|
case strings.Contains(line, "client-hostname"):
|
|
if len(fields) < 2 {
|
|
continue
|
|
}
|
|
currentLease.Hostname = strings.Trim(fields[1], `";`)
|
|
case line == "}":
|
|
if currentLease.IP != "" && currentLease.MAC != "" {
|
|
leases = append(leases, currentLease)
|
|
}
|
|
currentLease = models.DHCPLease{}
|
|
}
|
|
}
|
|
|
|
return leases, nil
|
|
}
|
|
|
|
// getARPInfo retrieves ARP table information using arp command
|
|
// Returns a map of IP -> MAC address
|
|
func getARPInfo() (map[string]string, error) {
|
|
arpInfo := make(map[string]string)
|
|
|
|
cmd := exec.Command("arp", "-a")
|
|
output, err := cmd.Output()
|
|
if err != nil {
|
|
return arpInfo, err
|
|
}
|
|
|
|
lines := strings.Split(string(output), "\n")
|
|
for _, line := range lines {
|
|
if matches := regexp.MustCompile(`\(([^)]+)\) at ([0-9a-fA-F:]{17})`).FindStringSubmatch(line); len(matches) > 2 {
|
|
ip := matches[1]
|
|
mac := matches[2]
|
|
arpInfo[ip] = mac
|
|
}
|
|
}
|
|
|
|
return arpInfo, nil
|
|
}
|