- QuotaLimit changed to *int64 (null=unlimited, >0=limited) - Add reset-usage endpoint (POST /admin/settings/web-search-emulation/reset-usage) - Show quota usage in header always (collapsed and expanded) - Add reset quota button in expanded provider view - Quota input: empty=unlimited with ∞ placeholder, must be >0 if set - Add email verification hint on balance notify card
151 lines
4.9 KiB
Go
151 lines
4.9 KiB
Go
// Package server provides HTTP server initialization and configuration.
|
||
package server
|
||
|
||
import (
|
||
"context"
|
||
"log"
|
||
"log/slog"
|
||
"net/http"
|
||
"time"
|
||
|
||
"github.com/Wei-Shaw/sub2api/internal/config"
|
||
"github.com/Wei-Shaw/sub2api/internal/handler"
|
||
"github.com/Wei-Shaw/sub2api/internal/pkg/websearch"
|
||
middleware2 "github.com/Wei-Shaw/sub2api/internal/server/middleware"
|
||
"github.com/Wei-Shaw/sub2api/internal/service"
|
||
|
||
"github.com/gin-gonic/gin"
|
||
"github.com/google/wire"
|
||
"github.com/redis/go-redis/v9"
|
||
"golang.org/x/net/http2"
|
||
"golang.org/x/net/http2/h2c"
|
||
)
|
||
|
||
// ProviderSet 提供服务器层的依赖
|
||
var ProviderSet = wire.NewSet(
|
||
ProvideRouter,
|
||
ProvideHTTPServer,
|
||
)
|
||
|
||
// ProvideRouter 提供路由器
|
||
func ProvideRouter(
|
||
cfg *config.Config,
|
||
handlers *handler.Handlers,
|
||
jwtAuth middleware2.JWTAuthMiddleware,
|
||
adminAuth middleware2.AdminAuthMiddleware,
|
||
apiKeyAuth middleware2.APIKeyAuthMiddleware,
|
||
apiKeyService *service.APIKeyService,
|
||
subscriptionService *service.SubscriptionService,
|
||
opsService *service.OpsService,
|
||
settingService *service.SettingService,
|
||
redisClient *redis.Client,
|
||
) *gin.Engine {
|
||
if cfg.Server.Mode == "release" {
|
||
gin.SetMode(gin.ReleaseMode)
|
||
}
|
||
|
||
r := gin.New()
|
||
r.Use(middleware2.Recovery())
|
||
if len(cfg.Server.TrustedProxies) > 0 {
|
||
if err := r.SetTrustedProxies(cfg.Server.TrustedProxies); err != nil {
|
||
log.Printf("Failed to set trusted proxies: %v", err)
|
||
}
|
||
} else {
|
||
if err := r.SetTrustedProxies(nil); err != nil {
|
||
log.Printf("Failed to disable trusted proxies: %v", err)
|
||
}
|
||
if cfg.Server.Mode == "release" {
|
||
log.Printf("Warning: server.trusted_proxies is empty in release mode; client IP trust chain is disabled")
|
||
}
|
||
}
|
||
|
||
// Wire up websearch Manager builder so it initializes on startup and rebuilds on config save.
|
||
settingService.SetWebSearchManagerBuilder(context.Background(), func(cfg *service.WebSearchEmulationConfig, proxyURLs map[int64]string) {
|
||
if cfg == nil || !cfg.Enabled || len(cfg.Providers) == 0 {
|
||
service.SetWebSearchManager(nil)
|
||
return
|
||
}
|
||
configs := make([]websearch.ProviderConfig, 0, len(cfg.Providers))
|
||
for _, p := range cfg.Providers {
|
||
if p.APIKey == "" {
|
||
continue
|
||
}
|
||
pc := websearch.ProviderConfig{
|
||
Type: p.Type,
|
||
APIKey: p.APIKey,
|
||
QuotaLimit: derefInt64(p.QuotaLimit),
|
||
ExpiresAt: p.ExpiresAt,
|
||
}
|
||
if p.SubscribedAt != nil {
|
||
pc.SubscribedAt = p.SubscribedAt
|
||
}
|
||
if p.ProxyID != nil {
|
||
pc.ProxyID = *p.ProxyID
|
||
if u, ok := proxyURLs[*p.ProxyID]; ok {
|
||
pc.ProxyURL = u
|
||
} else {
|
||
// Proxy configured but not found — skip this provider to prevent direct connection.
|
||
slog.Warn("websearch: proxy not found for provider, skipping",
|
||
"provider", p.Type, "proxy_id", *p.ProxyID)
|
||
continue
|
||
}
|
||
}
|
||
configs = append(configs, pc)
|
||
}
|
||
service.SetWebSearchManager(websearch.NewManager(configs, redisClient))
|
||
})
|
||
|
||
return SetupRouter(r, handlers, jwtAuth, adminAuth, apiKeyAuth, apiKeyService, subscriptionService, opsService, settingService, cfg, redisClient)
|
||
}
|
||
|
||
// ProvideHTTPServer 提供 HTTP 服务器
|
||
func ProvideHTTPServer(cfg *config.Config, router *gin.Engine) *http.Server {
|
||
httpHandler := http.Handler(router)
|
||
|
||
globalMaxSize := cfg.Server.MaxRequestBodySize
|
||
if globalMaxSize <= 0 {
|
||
globalMaxSize = cfg.Gateway.MaxBodySize
|
||
}
|
||
if globalMaxSize > 0 {
|
||
httpHandler = http.MaxBytesHandler(httpHandler, globalMaxSize)
|
||
log.Printf("Global max request body size: %d bytes (%.2f MB)", globalMaxSize, float64(globalMaxSize)/(1<<20))
|
||
}
|
||
|
||
// 根据配置决定是否启用 H2C
|
||
if cfg.Server.H2C.Enabled {
|
||
h2cConfig := cfg.Server.H2C
|
||
httpHandler = h2c.NewHandler(router, &http2.Server{
|
||
MaxConcurrentStreams: h2cConfig.MaxConcurrentStreams,
|
||
IdleTimeout: time.Duration(h2cConfig.IdleTimeout) * time.Second,
|
||
MaxReadFrameSize: uint32(h2cConfig.MaxReadFrameSize),
|
||
MaxUploadBufferPerConnection: int32(h2cConfig.MaxUploadBufferPerConnection),
|
||
MaxUploadBufferPerStream: int32(h2cConfig.MaxUploadBufferPerStream),
|
||
})
|
||
log.Printf("HTTP/2 Cleartext (h2c) enabled: max_concurrent_streams=%d, idle_timeout=%ds, max_read_frame_size=%d, max_upload_buffer_per_connection=%d, max_upload_buffer_per_stream=%d",
|
||
h2cConfig.MaxConcurrentStreams,
|
||
h2cConfig.IdleTimeout,
|
||
h2cConfig.MaxReadFrameSize,
|
||
h2cConfig.MaxUploadBufferPerConnection,
|
||
h2cConfig.MaxUploadBufferPerStream,
|
||
)
|
||
}
|
||
|
||
return &http.Server{
|
||
Addr: cfg.Server.Address(),
|
||
Handler: httpHandler,
|
||
// ReadHeaderTimeout: 读取请求头的超时时间,防止慢速请求头攻击
|
||
ReadHeaderTimeout: time.Duration(cfg.Server.ReadHeaderTimeout) * time.Second,
|
||
// IdleTimeout: 空闲连接超时时间,释放不活跃的连接资源
|
||
IdleTimeout: time.Duration(cfg.Server.IdleTimeout) * time.Second,
|
||
// 注意:不设置 WriteTimeout,因为流式响应可能持续十几分钟
|
||
// 不设置 ReadTimeout,因为大请求体可能需要较长时间读取
|
||
}
|
||
}
|
||
|
||
func derefInt64(p *int64) int64 {
|
||
if p == nil {
|
||
return 0
|
||
}
|
||
return *p
|
||
}
|