- Fix GetByKeyForAuth not selecting balance notify fields (notifications never triggered in gateway path) - Fix provider-level ProxyURL never resolved: inject ProxyRepository into SettingService, resolve proxy URLs when building Manager - Fix admin manual balance adjustment not updating total_recharged - Add threshold_type input validation (reject invalid values) - Fix user threshold_type inheritance: custom threshold defaults to "fixed" instead of inheriting global type (prevents $5 being treated as 5%) - Add try-catch for clipboard.writeText (fails on non-HTTPS) - Add SetTotalRecharged to user Update for admin balance operations
138 lines
4.6 KiB
Go
138 lines
4.6 KiB
Go
// Package server provides HTTP server initialization and configuration.
|
||
package server
|
||
|
||
import (
|
||
"context"
|
||
"log"
|
||
"net/http"
|
||
"time"
|
||
|
||
"github.com/Wei-Shaw/sub2api/internal/config"
|
||
"github.com/Wei-Shaw/sub2api/internal/handler"
|
||
"github.com/Wei-Shaw/sub2api/internal/pkg/websearch"
|
||
middleware2 "github.com/Wei-Shaw/sub2api/internal/server/middleware"
|
||
"github.com/Wei-Shaw/sub2api/internal/service"
|
||
|
||
"github.com/gin-gonic/gin"
|
||
"github.com/google/wire"
|
||
"github.com/redis/go-redis/v9"
|
||
"golang.org/x/net/http2"
|
||
"golang.org/x/net/http2/h2c"
|
||
)
|
||
|
||
// ProviderSet 提供服务器层的依赖
|
||
var ProviderSet = wire.NewSet(
|
||
ProvideRouter,
|
||
ProvideHTTPServer,
|
||
)
|
||
|
||
// ProvideRouter 提供路由器
|
||
func ProvideRouter(
|
||
cfg *config.Config,
|
||
handlers *handler.Handlers,
|
||
jwtAuth middleware2.JWTAuthMiddleware,
|
||
adminAuth middleware2.AdminAuthMiddleware,
|
||
apiKeyAuth middleware2.APIKeyAuthMiddleware,
|
||
apiKeyService *service.APIKeyService,
|
||
subscriptionService *service.SubscriptionService,
|
||
opsService *service.OpsService,
|
||
settingService *service.SettingService,
|
||
redisClient *redis.Client,
|
||
) *gin.Engine {
|
||
if cfg.Server.Mode == "release" {
|
||
gin.SetMode(gin.ReleaseMode)
|
||
}
|
||
|
||
r := gin.New()
|
||
r.Use(middleware2.Recovery())
|
||
if len(cfg.Server.TrustedProxies) > 0 {
|
||
if err := r.SetTrustedProxies(cfg.Server.TrustedProxies); err != nil {
|
||
log.Printf("Failed to set trusted proxies: %v", err)
|
||
}
|
||
} else {
|
||
if err := r.SetTrustedProxies(nil); err != nil {
|
||
log.Printf("Failed to disable trusted proxies: %v", err)
|
||
}
|
||
if cfg.Server.Mode == "release" {
|
||
log.Printf("Warning: server.trusted_proxies is empty in release mode; client IP trust chain is disabled")
|
||
}
|
||
}
|
||
|
||
// Wire up websearch Manager builder so it initializes on startup and rebuilds on config save.
|
||
settingService.SetWebSearchManagerBuilder(context.Background(), func(cfg *service.WebSearchEmulationConfig, proxyURLs map[int64]string) {
|
||
if cfg == nil || !cfg.Enabled || len(cfg.Providers) == 0 {
|
||
service.SetWebSearchManager(nil)
|
||
return
|
||
}
|
||
configs := make([]websearch.ProviderConfig, 0, len(cfg.Providers))
|
||
for _, p := range cfg.Providers {
|
||
if p.APIKey == "" {
|
||
continue
|
||
}
|
||
pc := websearch.ProviderConfig{
|
||
Type: p.Type,
|
||
APIKey: p.APIKey,
|
||
QuotaLimit: p.QuotaLimit,
|
||
ExpiresAt: p.ExpiresAt,
|
||
}
|
||
if p.SubscribedAt != nil {
|
||
pc.SubscribedAt = p.SubscribedAt
|
||
}
|
||
if p.ProxyID != nil {
|
||
pc.ProxyID = *p.ProxyID
|
||
if u, ok := proxyURLs[*p.ProxyID]; ok {
|
||
pc.ProxyURL = u
|
||
}
|
||
}
|
||
configs = append(configs, pc)
|
||
}
|
||
service.SetWebSearchManager(websearch.NewManager(configs, redisClient))
|
||
})
|
||
|
||
return SetupRouter(r, handlers, jwtAuth, adminAuth, apiKeyAuth, apiKeyService, subscriptionService, opsService, settingService, cfg, redisClient)
|
||
}
|
||
|
||
// ProvideHTTPServer 提供 HTTP 服务器
|
||
func ProvideHTTPServer(cfg *config.Config, router *gin.Engine) *http.Server {
|
||
httpHandler := http.Handler(router)
|
||
|
||
globalMaxSize := cfg.Server.MaxRequestBodySize
|
||
if globalMaxSize <= 0 {
|
||
globalMaxSize = cfg.Gateway.MaxBodySize
|
||
}
|
||
if globalMaxSize > 0 {
|
||
httpHandler = http.MaxBytesHandler(httpHandler, globalMaxSize)
|
||
log.Printf("Global max request body size: %d bytes (%.2f MB)", globalMaxSize, float64(globalMaxSize)/(1<<20))
|
||
}
|
||
|
||
// 根据配置决定是否启用 H2C
|
||
if cfg.Server.H2C.Enabled {
|
||
h2cConfig := cfg.Server.H2C
|
||
httpHandler = h2c.NewHandler(router, &http2.Server{
|
||
MaxConcurrentStreams: h2cConfig.MaxConcurrentStreams,
|
||
IdleTimeout: time.Duration(h2cConfig.IdleTimeout) * time.Second,
|
||
MaxReadFrameSize: uint32(h2cConfig.MaxReadFrameSize),
|
||
MaxUploadBufferPerConnection: int32(h2cConfig.MaxUploadBufferPerConnection),
|
||
MaxUploadBufferPerStream: int32(h2cConfig.MaxUploadBufferPerStream),
|
||
})
|
||
log.Printf("HTTP/2 Cleartext (h2c) enabled: max_concurrent_streams=%d, idle_timeout=%ds, max_read_frame_size=%d, max_upload_buffer_per_connection=%d, max_upload_buffer_per_stream=%d",
|
||
h2cConfig.MaxConcurrentStreams,
|
||
h2cConfig.IdleTimeout,
|
||
h2cConfig.MaxReadFrameSize,
|
||
h2cConfig.MaxUploadBufferPerConnection,
|
||
h2cConfig.MaxUploadBufferPerStream,
|
||
)
|
||
}
|
||
|
||
return &http.Server{
|
||
Addr: cfg.Server.Address(),
|
||
Handler: httpHandler,
|
||
// ReadHeaderTimeout: 读取请求头的超时时间,防止慢速请求头攻击
|
||
ReadHeaderTimeout: time.Duration(cfg.Server.ReadHeaderTimeout) * time.Second,
|
||
// IdleTimeout: 空闲连接超时时间,释放不活跃的连接资源
|
||
IdleTimeout: time.Duration(cfg.Server.IdleTimeout) * time.Second,
|
||
// 注意:不设置 WriteTimeout,因为流式响应可能持续十几分钟
|
||
// 不设置 ReadTimeout,因为大请求体可能需要较长时间读取
|
||
}
|
||
}
|