first commit
This commit is contained in:
295
backend/internal/setup/cli.go
Normal file
295
backend/internal/setup/cli.go
Normal file
@@ -0,0 +1,295 @@
|
||||
// Package setup provides CLI commands and application initialization helpers.
|
||||
package setup
|
||||
|
||||
import (
|
||||
"bufio"
|
||||
"fmt"
|
||||
"net/mail"
|
||||
"os"
|
||||
"regexp"
|
||||
"strconv"
|
||||
"strings"
|
||||
|
||||
"golang.org/x/term"
|
||||
)
|
||||
|
||||
// CLI input validation functions (matching Web API validation)
|
||||
func cliValidateHostname(host string) bool {
|
||||
validHost := regexp.MustCompile(`^[a-zA-Z0-9.\-:]+$`)
|
||||
return validHost.MatchString(host) && len(host) <= 253
|
||||
}
|
||||
|
||||
func cliValidateDBName(name string) bool {
|
||||
validName := regexp.MustCompile(`^[a-zA-Z][a-zA-Z0-9_]*$`)
|
||||
return validName.MatchString(name) && len(name) <= 63
|
||||
}
|
||||
|
||||
func cliValidateUsername(name string) bool {
|
||||
validName := regexp.MustCompile(`^[a-zA-Z0-9_]+$`)
|
||||
return validName.MatchString(name) && len(name) <= 63
|
||||
}
|
||||
|
||||
func cliValidateEmail(email string) bool {
|
||||
_, err := mail.ParseAddress(email)
|
||||
return err == nil && len(email) <= 254
|
||||
}
|
||||
|
||||
func cliValidatePort(port int) bool {
|
||||
return port > 0 && port <= 65535
|
||||
}
|
||||
|
||||
func cliValidateSSLMode(mode string) bool {
|
||||
validModes := map[string]bool{
|
||||
"disable": true, "require": true, "verify-ca": true, "verify-full": true,
|
||||
}
|
||||
return validModes[mode]
|
||||
}
|
||||
|
||||
// RunCLI runs the CLI setup wizard
|
||||
func RunCLI() error {
|
||||
reader := bufio.NewReader(os.Stdin)
|
||||
|
||||
fmt.Println()
|
||||
fmt.Println("╔═══════════════════════════════════════════╗")
|
||||
fmt.Println("║ Sub2API Installation Wizard ║")
|
||||
fmt.Println("╚═══════════════════════════════════════════╝")
|
||||
fmt.Println()
|
||||
|
||||
cfg := &SetupConfig{
|
||||
Server: ServerConfig{
|
||||
Host: "0.0.0.0",
|
||||
Port: 8080,
|
||||
Mode: "release",
|
||||
},
|
||||
JWT: JWTConfig{
|
||||
ExpireHour: 24,
|
||||
},
|
||||
}
|
||||
|
||||
// Database configuration with validation
|
||||
fmt.Println("── Database Configuration ──")
|
||||
|
||||
for {
|
||||
cfg.Database.Host = promptString(reader, "PostgreSQL Host", "localhost")
|
||||
if cliValidateHostname(cfg.Database.Host) {
|
||||
break
|
||||
}
|
||||
fmt.Println(" Invalid hostname format. Use alphanumeric, dots, hyphens only.")
|
||||
}
|
||||
|
||||
for {
|
||||
cfg.Database.Port = promptInt(reader, "PostgreSQL Port", 5432)
|
||||
if cliValidatePort(cfg.Database.Port) {
|
||||
break
|
||||
}
|
||||
fmt.Println(" Invalid port. Must be between 1 and 65535.")
|
||||
}
|
||||
|
||||
for {
|
||||
cfg.Database.User = promptString(reader, "PostgreSQL User", "postgres")
|
||||
if cliValidateUsername(cfg.Database.User) {
|
||||
break
|
||||
}
|
||||
fmt.Println(" Invalid username. Use alphanumeric and underscores only.")
|
||||
}
|
||||
|
||||
cfg.Database.Password = promptPassword("PostgreSQL Password")
|
||||
|
||||
for {
|
||||
cfg.Database.DBName = promptString(reader, "Database Name", "sub2api")
|
||||
if cliValidateDBName(cfg.Database.DBName) {
|
||||
break
|
||||
}
|
||||
fmt.Println(" Invalid database name. Start with letter, use alphanumeric and underscores.")
|
||||
}
|
||||
|
||||
for {
|
||||
cfg.Database.SSLMode = promptString(reader, "SSL Mode", "disable")
|
||||
if cliValidateSSLMode(cfg.Database.SSLMode) {
|
||||
break
|
||||
}
|
||||
fmt.Println(" Invalid SSL mode. Use: disable, require, verify-ca, or verify-full.")
|
||||
}
|
||||
|
||||
fmt.Println()
|
||||
fmt.Print("Testing database connection... ")
|
||||
if err := TestDatabaseConnection(&cfg.Database); err != nil {
|
||||
fmt.Println("FAILED")
|
||||
return fmt.Errorf("database connection failed: %w", err)
|
||||
}
|
||||
fmt.Println("OK")
|
||||
|
||||
// Redis configuration with validation
|
||||
fmt.Println()
|
||||
fmt.Println("── Redis Configuration ──")
|
||||
|
||||
for {
|
||||
cfg.Redis.Host = promptString(reader, "Redis Host", "localhost")
|
||||
if cliValidateHostname(cfg.Redis.Host) {
|
||||
break
|
||||
}
|
||||
fmt.Println(" Invalid hostname format. Use alphanumeric, dots, hyphens only.")
|
||||
}
|
||||
|
||||
for {
|
||||
cfg.Redis.Port = promptInt(reader, "Redis Port", 6379)
|
||||
if cliValidatePort(cfg.Redis.Port) {
|
||||
break
|
||||
}
|
||||
fmt.Println(" Invalid port. Must be between 1 and 65535.")
|
||||
}
|
||||
|
||||
cfg.Redis.Password = promptPassword("Redis Password (optional)")
|
||||
|
||||
for {
|
||||
cfg.Redis.DB = promptInt(reader, "Redis DB", 0)
|
||||
if cfg.Redis.DB >= 0 && cfg.Redis.DB <= 15 {
|
||||
break
|
||||
}
|
||||
fmt.Println(" Invalid Redis DB. Must be between 0 and 15.")
|
||||
}
|
||||
|
||||
fmt.Println()
|
||||
fmt.Print("Testing Redis connection... ")
|
||||
if err := TestRedisConnection(&cfg.Redis); err != nil {
|
||||
fmt.Println("FAILED")
|
||||
return fmt.Errorf("redis connection failed: %w", err)
|
||||
}
|
||||
fmt.Println("OK")
|
||||
|
||||
// Admin configuration with validation
|
||||
fmt.Println()
|
||||
fmt.Println("── Admin Account ──")
|
||||
|
||||
for {
|
||||
cfg.Admin.Email = promptString(reader, "Admin Email", "admin@example.com")
|
||||
if cliValidateEmail(cfg.Admin.Email) {
|
||||
break
|
||||
}
|
||||
fmt.Println(" Invalid email format.")
|
||||
}
|
||||
|
||||
for {
|
||||
cfg.Admin.Password = promptPassword("Admin Password")
|
||||
// SECURITY: Match Web API requirement of 8 characters minimum
|
||||
if len(cfg.Admin.Password) < 8 {
|
||||
fmt.Println(" Password must be at least 8 characters")
|
||||
continue
|
||||
}
|
||||
if len(cfg.Admin.Password) > 128 {
|
||||
fmt.Println(" Password must be at most 128 characters")
|
||||
continue
|
||||
}
|
||||
confirm := promptPassword("Confirm Password")
|
||||
if cfg.Admin.Password != confirm {
|
||||
fmt.Println(" Passwords do not match")
|
||||
continue
|
||||
}
|
||||
break
|
||||
}
|
||||
|
||||
// Server configuration with validation
|
||||
fmt.Println()
|
||||
fmt.Println("── Server Configuration ──")
|
||||
|
||||
for {
|
||||
cfg.Server.Port = promptInt(reader, "Server Port", 8080)
|
||||
if cliValidatePort(cfg.Server.Port) {
|
||||
break
|
||||
}
|
||||
fmt.Println(" Invalid port. Must be between 1 and 65535.")
|
||||
}
|
||||
|
||||
// Confirm and install
|
||||
fmt.Println()
|
||||
fmt.Println("── Configuration Summary ──")
|
||||
fmt.Printf("Database: %s@%s:%d/%s\n", cfg.Database.User, cfg.Database.Host, cfg.Database.Port, cfg.Database.DBName)
|
||||
fmt.Printf("Redis: %s:%d\n", cfg.Redis.Host, cfg.Redis.Port)
|
||||
fmt.Printf("Admin: %s\n", cfg.Admin.Email)
|
||||
fmt.Printf("Server: :%d\n", cfg.Server.Port)
|
||||
fmt.Println()
|
||||
|
||||
if !promptConfirm(reader, "Proceed with installation?") {
|
||||
fmt.Println("Installation cancelled")
|
||||
return nil
|
||||
}
|
||||
|
||||
fmt.Println()
|
||||
fmt.Print("Installing... ")
|
||||
if err := Install(cfg); err != nil {
|
||||
fmt.Println("FAILED")
|
||||
return err
|
||||
}
|
||||
fmt.Println("OK")
|
||||
|
||||
fmt.Println()
|
||||
fmt.Println("╔═══════════════════════════════════════════╗")
|
||||
fmt.Println("║ Installation Complete! ║")
|
||||
fmt.Println("╚═══════════════════════════════════════════╝")
|
||||
fmt.Println()
|
||||
fmt.Println("Start the server with:")
|
||||
fmt.Println(" ./sub2api")
|
||||
fmt.Println()
|
||||
fmt.Printf("Admin panel: http://localhost:%d\n", cfg.Server.Port)
|
||||
fmt.Println()
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
func promptString(reader *bufio.Reader, prompt, defaultVal string) string {
|
||||
if defaultVal != "" {
|
||||
fmt.Printf(" %s [%s]: ", prompt, defaultVal)
|
||||
} else {
|
||||
fmt.Printf(" %s: ", prompt)
|
||||
}
|
||||
|
||||
input, _ := reader.ReadString('\n')
|
||||
input = strings.TrimSpace(input)
|
||||
|
||||
if input == "" {
|
||||
return defaultVal
|
||||
}
|
||||
return input
|
||||
}
|
||||
|
||||
func promptInt(reader *bufio.Reader, prompt string, defaultVal int) int {
|
||||
fmt.Printf(" %s [%d]: ", prompt, defaultVal)
|
||||
|
||||
input, _ := reader.ReadString('\n')
|
||||
input = strings.TrimSpace(input)
|
||||
|
||||
if input == "" {
|
||||
return defaultVal
|
||||
}
|
||||
|
||||
val, err := strconv.Atoi(input)
|
||||
if err != nil {
|
||||
return defaultVal
|
||||
}
|
||||
return val
|
||||
}
|
||||
|
||||
func promptPassword(prompt string) string {
|
||||
fmt.Printf(" %s: ", prompt)
|
||||
|
||||
// Try to read password without echo
|
||||
if term.IsTerminal(int(os.Stdin.Fd())) {
|
||||
password, err := term.ReadPassword(int(os.Stdin.Fd()))
|
||||
fmt.Println()
|
||||
if err == nil {
|
||||
return string(password)
|
||||
}
|
||||
}
|
||||
|
||||
// Fallback to regular input
|
||||
reader := bufio.NewReader(os.Stdin)
|
||||
input, _ := reader.ReadString('\n')
|
||||
return strings.TrimSpace(input)
|
||||
}
|
||||
|
||||
func promptConfirm(reader *bufio.Reader, prompt string) bool {
|
||||
fmt.Printf("%s [y/N]: ", prompt)
|
||||
input, _ := reader.ReadString('\n')
|
||||
input = strings.TrimSpace(strings.ToLower(input))
|
||||
return input == "y" || input == "yes"
|
||||
}
|
||||
354
backend/internal/setup/handler.go
Normal file
354
backend/internal/setup/handler.go
Normal file
@@ -0,0 +1,354 @@
|
||||
package setup
|
||||
|
||||
import (
|
||||
"fmt"
|
||||
"net/http"
|
||||
"net/mail"
|
||||
"regexp"
|
||||
"strings"
|
||||
"sync"
|
||||
"time"
|
||||
|
||||
"github.com/Wei-Shaw/sub2api/internal/pkg/response"
|
||||
"github.com/Wei-Shaw/sub2api/internal/pkg/sysutil"
|
||||
|
||||
"github.com/gin-gonic/gin"
|
||||
)
|
||||
|
||||
// installMutex prevents concurrent installation attempts (TOCTOU protection)
|
||||
var installMutex sync.Mutex
|
||||
|
||||
// RegisterRoutes registers setup wizard routes
|
||||
func RegisterRoutes(r *gin.Engine) {
|
||||
setup := r.Group("/setup")
|
||||
{
|
||||
// Status endpoint is always accessible (read-only)
|
||||
setup.GET("/status", getStatus)
|
||||
|
||||
// All modification endpoints are protected by setupGuard
|
||||
protected := setup.Group("")
|
||||
protected.Use(setupGuard())
|
||||
{
|
||||
protected.POST("/test-db", testDatabase)
|
||||
protected.POST("/test-redis", testRedis)
|
||||
protected.POST("/install", install)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// SetupStatus represents the current setup state
|
||||
type SetupStatus struct {
|
||||
NeedsSetup bool `json:"needs_setup"`
|
||||
Step string `json:"step"`
|
||||
}
|
||||
|
||||
// getStatus returns the current setup status
|
||||
func getStatus(c *gin.Context) {
|
||||
response.Success(c, SetupStatus{
|
||||
NeedsSetup: NeedsSetup(),
|
||||
Step: "welcome",
|
||||
})
|
||||
}
|
||||
|
||||
// setupGuard middleware ensures setup endpoints are only accessible during setup mode
|
||||
func setupGuard() gin.HandlerFunc {
|
||||
return func(c *gin.Context) {
|
||||
if !NeedsSetup() {
|
||||
response.Error(c, http.StatusForbidden, "Setup is not allowed: system is already installed")
|
||||
c.Abort()
|
||||
return
|
||||
}
|
||||
c.Next()
|
||||
}
|
||||
}
|
||||
|
||||
// validateHostname checks if a hostname/IP is safe (no injection characters)
|
||||
func validateHostname(host string) bool {
|
||||
// Allow only alphanumeric, dots, hyphens, and colons (for IPv6)
|
||||
validHost := regexp.MustCompile(`^[a-zA-Z0-9.\-:]+$`)
|
||||
return validHost.MatchString(host) && len(host) <= 253
|
||||
}
|
||||
|
||||
// validateDBName checks if database name is safe
|
||||
func validateDBName(name string) bool {
|
||||
// Allow only alphanumeric and underscores, starting with letter
|
||||
validName := regexp.MustCompile(`^[a-zA-Z][a-zA-Z0-9_]*$`)
|
||||
return validName.MatchString(name) && len(name) <= 63
|
||||
}
|
||||
|
||||
// validateUsername checks if username is safe
|
||||
func validateUsername(name string) bool {
|
||||
// Allow only alphanumeric and underscores
|
||||
validName := regexp.MustCompile(`^[a-zA-Z0-9_]+$`)
|
||||
return validName.MatchString(name) && len(name) <= 63
|
||||
}
|
||||
|
||||
// validateEmail checks if email format is valid
|
||||
func validateEmail(email string) bool {
|
||||
_, err := mail.ParseAddress(email)
|
||||
return err == nil && len(email) <= 254
|
||||
}
|
||||
|
||||
// validatePassword checks password strength
|
||||
func validatePassword(password string) error {
|
||||
if len(password) < 8 {
|
||||
return fmt.Errorf("password must be at least 8 characters")
|
||||
}
|
||||
if len(password) > 128 {
|
||||
return fmt.Errorf("password must be at most 128 characters")
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
// validatePort checks if port is in valid range
|
||||
func validatePort(port int) bool {
|
||||
return port > 0 && port <= 65535
|
||||
}
|
||||
|
||||
// validateSSLMode checks if SSL mode is valid
|
||||
func validateSSLMode(mode string) bool {
|
||||
validModes := map[string]bool{
|
||||
"disable": true, "require": true, "verify-ca": true, "verify-full": true,
|
||||
}
|
||||
return validModes[mode]
|
||||
}
|
||||
|
||||
// TestDatabaseRequest represents database test request
|
||||
type TestDatabaseRequest struct {
|
||||
Host string `json:"host" binding:"required"`
|
||||
Port int `json:"port" binding:"required"`
|
||||
User string `json:"user" binding:"required"`
|
||||
Password string `json:"password"`
|
||||
DBName string `json:"dbname" binding:"required"`
|
||||
SSLMode string `json:"sslmode"`
|
||||
}
|
||||
|
||||
// testDatabase tests database connection
|
||||
func testDatabase(c *gin.Context) {
|
||||
var req TestDatabaseRequest
|
||||
if err := c.ShouldBindJSON(&req); err != nil {
|
||||
response.Error(c, http.StatusBadRequest, "Invalid request: "+err.Error())
|
||||
return
|
||||
}
|
||||
|
||||
// Security: Validate all inputs to prevent injection attacks
|
||||
if !validateHostname(req.Host) {
|
||||
response.Error(c, http.StatusBadRequest, "Invalid hostname format")
|
||||
return
|
||||
}
|
||||
if !validatePort(req.Port) {
|
||||
response.Error(c, http.StatusBadRequest, "Invalid port number")
|
||||
return
|
||||
}
|
||||
if !validateUsername(req.User) {
|
||||
response.Error(c, http.StatusBadRequest, "Invalid username format")
|
||||
return
|
||||
}
|
||||
if !validateDBName(req.DBName) {
|
||||
response.Error(c, http.StatusBadRequest, "Invalid database name format")
|
||||
return
|
||||
}
|
||||
|
||||
if req.SSLMode == "" {
|
||||
req.SSLMode = "disable"
|
||||
}
|
||||
if !validateSSLMode(req.SSLMode) {
|
||||
response.Error(c, http.StatusBadRequest, "Invalid SSL mode")
|
||||
return
|
||||
}
|
||||
|
||||
cfg := &DatabaseConfig{
|
||||
Host: req.Host,
|
||||
Port: req.Port,
|
||||
User: req.User,
|
||||
Password: req.Password,
|
||||
DBName: req.DBName,
|
||||
SSLMode: req.SSLMode,
|
||||
}
|
||||
|
||||
if err := TestDatabaseConnection(cfg); err != nil {
|
||||
response.Error(c, http.StatusBadRequest, "Connection failed: "+err.Error())
|
||||
return
|
||||
}
|
||||
|
||||
response.Success(c, gin.H{"message": "Connection successful"})
|
||||
}
|
||||
|
||||
// TestRedisRequest represents Redis test request
|
||||
type TestRedisRequest struct {
|
||||
Host string `json:"host" binding:"required"`
|
||||
Port int `json:"port" binding:"required"`
|
||||
Password string `json:"password"`
|
||||
DB int `json:"db"`
|
||||
}
|
||||
|
||||
// testRedis tests Redis connection
|
||||
func testRedis(c *gin.Context) {
|
||||
var req TestRedisRequest
|
||||
if err := c.ShouldBindJSON(&req); err != nil {
|
||||
response.Error(c, http.StatusBadRequest, "Invalid request: "+err.Error())
|
||||
return
|
||||
}
|
||||
|
||||
// Security: Validate inputs
|
||||
if !validateHostname(req.Host) {
|
||||
response.Error(c, http.StatusBadRequest, "Invalid hostname format")
|
||||
return
|
||||
}
|
||||
if !validatePort(req.Port) {
|
||||
response.Error(c, http.StatusBadRequest, "Invalid port number")
|
||||
return
|
||||
}
|
||||
if req.DB < 0 || req.DB > 15 {
|
||||
response.Error(c, http.StatusBadRequest, "Invalid Redis database number (0-15)")
|
||||
return
|
||||
}
|
||||
|
||||
cfg := &RedisConfig{
|
||||
Host: req.Host,
|
||||
Port: req.Port,
|
||||
Password: req.Password,
|
||||
DB: req.DB,
|
||||
}
|
||||
|
||||
if err := TestRedisConnection(cfg); err != nil {
|
||||
response.Error(c, http.StatusBadRequest, "Connection failed: "+err.Error())
|
||||
return
|
||||
}
|
||||
|
||||
response.Success(c, gin.H{"message": "Connection successful"})
|
||||
}
|
||||
|
||||
// InstallRequest represents installation request
|
||||
type InstallRequest struct {
|
||||
Database DatabaseConfig `json:"database" binding:"required"`
|
||||
Redis RedisConfig `json:"redis" binding:"required"`
|
||||
Admin AdminConfig `json:"admin" binding:"required"`
|
||||
Server ServerConfig `json:"server"`
|
||||
}
|
||||
|
||||
// install performs the installation
|
||||
func install(c *gin.Context) {
|
||||
// TOCTOU Protection: Acquire mutex to prevent concurrent installation
|
||||
installMutex.Lock()
|
||||
defer installMutex.Unlock()
|
||||
|
||||
// Double-check after acquiring lock
|
||||
if !NeedsSetup() {
|
||||
response.Error(c, http.StatusForbidden, "Setup is not allowed: system is already installed")
|
||||
return
|
||||
}
|
||||
|
||||
var req InstallRequest
|
||||
if err := c.ShouldBindJSON(&req); err != nil {
|
||||
response.Error(c, http.StatusBadRequest, "Invalid request: "+err.Error())
|
||||
return
|
||||
}
|
||||
|
||||
// ========== COMPREHENSIVE INPUT VALIDATION ==========
|
||||
// Database validation
|
||||
if !validateHostname(req.Database.Host) {
|
||||
response.Error(c, http.StatusBadRequest, "Invalid database hostname")
|
||||
return
|
||||
}
|
||||
if !validatePort(req.Database.Port) {
|
||||
response.Error(c, http.StatusBadRequest, "Invalid database port")
|
||||
return
|
||||
}
|
||||
if !validateUsername(req.Database.User) {
|
||||
response.Error(c, http.StatusBadRequest, "Invalid database username")
|
||||
return
|
||||
}
|
||||
if !validateDBName(req.Database.DBName) {
|
||||
response.Error(c, http.StatusBadRequest, "Invalid database name")
|
||||
return
|
||||
}
|
||||
|
||||
// Redis validation
|
||||
if !validateHostname(req.Redis.Host) {
|
||||
response.Error(c, http.StatusBadRequest, "Invalid Redis hostname")
|
||||
return
|
||||
}
|
||||
if !validatePort(req.Redis.Port) {
|
||||
response.Error(c, http.StatusBadRequest, "Invalid Redis port")
|
||||
return
|
||||
}
|
||||
if req.Redis.DB < 0 || req.Redis.DB > 15 {
|
||||
response.Error(c, http.StatusBadRequest, "Invalid Redis database number")
|
||||
return
|
||||
}
|
||||
|
||||
// Admin validation
|
||||
if !validateEmail(req.Admin.Email) {
|
||||
response.Error(c, http.StatusBadRequest, "Invalid admin email format")
|
||||
return
|
||||
}
|
||||
if err := validatePassword(req.Admin.Password); err != nil {
|
||||
response.Error(c, http.StatusBadRequest, err.Error())
|
||||
return
|
||||
}
|
||||
|
||||
// Server validation
|
||||
if req.Server.Port != 0 && !validatePort(req.Server.Port) {
|
||||
response.Error(c, http.StatusBadRequest, "Invalid server port")
|
||||
return
|
||||
}
|
||||
|
||||
// ========== SET DEFAULTS ==========
|
||||
if req.Database.SSLMode == "" {
|
||||
req.Database.SSLMode = "disable"
|
||||
}
|
||||
if !validateSSLMode(req.Database.SSLMode) {
|
||||
response.Error(c, http.StatusBadRequest, "Invalid SSL mode")
|
||||
return
|
||||
}
|
||||
if req.Server.Host == "" {
|
||||
req.Server.Host = "0.0.0.0"
|
||||
}
|
||||
if req.Server.Port == 0 {
|
||||
req.Server.Port = 8080
|
||||
}
|
||||
if req.Server.Mode == "" {
|
||||
req.Server.Mode = "release"
|
||||
}
|
||||
// Validate server mode
|
||||
if req.Server.Mode != "release" && req.Server.Mode != "debug" {
|
||||
response.Error(c, http.StatusBadRequest, "Invalid server mode (must be 'release' or 'debug')")
|
||||
return
|
||||
}
|
||||
|
||||
// Trim whitespace from string inputs
|
||||
req.Admin.Email = strings.TrimSpace(req.Admin.Email)
|
||||
req.Database.Host = strings.TrimSpace(req.Database.Host)
|
||||
req.Database.User = strings.TrimSpace(req.Database.User)
|
||||
req.Database.DBName = strings.TrimSpace(req.Database.DBName)
|
||||
req.Redis.Host = strings.TrimSpace(req.Redis.Host)
|
||||
|
||||
cfg := &SetupConfig{
|
||||
Database: req.Database,
|
||||
Redis: req.Redis,
|
||||
Admin: req.Admin,
|
||||
Server: req.Server,
|
||||
JWT: JWTConfig{
|
||||
ExpireHour: 24,
|
||||
},
|
||||
}
|
||||
|
||||
if err := Install(cfg); err != nil {
|
||||
response.Error(c, http.StatusInternalServerError, "Installation failed: "+err.Error())
|
||||
return
|
||||
}
|
||||
|
||||
// Schedule service restart in background after sending response
|
||||
// This ensures the client receives the success response before the service restarts
|
||||
go func() {
|
||||
// Wait a moment to ensure the response is sent
|
||||
time.Sleep(500 * time.Millisecond)
|
||||
sysutil.RestartServiceAsync()
|
||||
}()
|
||||
|
||||
response.Success(c, gin.H{
|
||||
"message": "Installation completed successfully. Service will restart automatically.",
|
||||
"restart": true,
|
||||
})
|
||||
}
|
||||
573
backend/internal/setup/setup.go
Normal file
573
backend/internal/setup/setup.go
Normal file
@@ -0,0 +1,573 @@
|
||||
package setup
|
||||
|
||||
import (
|
||||
"context"
|
||||
"crypto/rand"
|
||||
"database/sql"
|
||||
"encoding/hex"
|
||||
"fmt"
|
||||
"log"
|
||||
"os"
|
||||
"strconv"
|
||||
"time"
|
||||
|
||||
"github.com/Wei-Shaw/sub2api/internal/repository"
|
||||
"github.com/Wei-Shaw/sub2api/internal/service"
|
||||
|
||||
_ "github.com/lib/pq"
|
||||
"github.com/redis/go-redis/v9"
|
||||
"gopkg.in/yaml.v3"
|
||||
)
|
||||
|
||||
// Config paths
|
||||
const (
|
||||
ConfigFileName = "config.yaml"
|
||||
InstallLockFile = ".installed"
|
||||
)
|
||||
|
||||
// GetDataDir returns the data directory for storing config and lock files.
|
||||
// Priority: DATA_DIR env > /app/data (if exists and writable) > current directory
|
||||
func GetDataDir() string {
|
||||
// Check DATA_DIR environment variable first
|
||||
if dir := os.Getenv("DATA_DIR"); dir != "" {
|
||||
return dir
|
||||
}
|
||||
|
||||
// Check if /app/data exists and is writable (Docker environment)
|
||||
dockerDataDir := "/app/data"
|
||||
if info, err := os.Stat(dockerDataDir); err == nil && info.IsDir() {
|
||||
// Try to check if writable by creating a temp file
|
||||
testFile := dockerDataDir + "/.write_test"
|
||||
if f, err := os.Create(testFile); err == nil {
|
||||
_ = f.Close()
|
||||
_ = os.Remove(testFile)
|
||||
return dockerDataDir
|
||||
}
|
||||
}
|
||||
|
||||
// Default to current directory
|
||||
return "."
|
||||
}
|
||||
|
||||
// GetConfigFilePath returns the full path to config.yaml
|
||||
func GetConfigFilePath() string {
|
||||
return GetDataDir() + "/" + ConfigFileName
|
||||
}
|
||||
|
||||
// GetInstallLockPath returns the full path to .installed lock file
|
||||
func GetInstallLockPath() string {
|
||||
return GetDataDir() + "/" + InstallLockFile
|
||||
}
|
||||
|
||||
// SetupConfig holds the setup configuration
|
||||
type SetupConfig struct {
|
||||
Database DatabaseConfig `json:"database" yaml:"database"`
|
||||
Redis RedisConfig `json:"redis" yaml:"redis"`
|
||||
Admin AdminConfig `json:"admin" yaml:"-"` // Not stored in config file
|
||||
Server ServerConfig `json:"server" yaml:"server"`
|
||||
JWT JWTConfig `json:"jwt" yaml:"jwt"`
|
||||
Timezone string `json:"timezone" yaml:"timezone"` // e.g. "Asia/Shanghai", "UTC"
|
||||
}
|
||||
|
||||
type DatabaseConfig struct {
|
||||
Host string `json:"host" yaml:"host"`
|
||||
Port int `json:"port" yaml:"port"`
|
||||
User string `json:"user" yaml:"user"`
|
||||
Password string `json:"password" yaml:"password"`
|
||||
DBName string `json:"dbname" yaml:"dbname"`
|
||||
SSLMode string `json:"sslmode" yaml:"sslmode"`
|
||||
}
|
||||
|
||||
type RedisConfig struct {
|
||||
Host string `json:"host" yaml:"host"`
|
||||
Port int `json:"port" yaml:"port"`
|
||||
Password string `json:"password" yaml:"password"`
|
||||
DB int `json:"db" yaml:"db"`
|
||||
}
|
||||
|
||||
type AdminConfig struct {
|
||||
Email string `json:"email"`
|
||||
Password string `json:"password"`
|
||||
}
|
||||
|
||||
type ServerConfig struct {
|
||||
Host string `json:"host" yaml:"host"`
|
||||
Port int `json:"port" yaml:"port"`
|
||||
Mode string `json:"mode" yaml:"mode"`
|
||||
}
|
||||
|
||||
type JWTConfig struct {
|
||||
Secret string `json:"secret" yaml:"secret"`
|
||||
ExpireHour int `json:"expire_hour" yaml:"expire_hour"`
|
||||
}
|
||||
|
||||
// NeedsSetup checks if the system needs initial setup
|
||||
// Uses multiple checks to prevent attackers from forcing re-setup by deleting config
|
||||
func NeedsSetup() bool {
|
||||
// Check 1: Config file must not exist
|
||||
if _, err := os.Stat(GetConfigFilePath()); !os.IsNotExist(err) {
|
||||
return false // Config exists, no setup needed
|
||||
}
|
||||
|
||||
// Check 2: Installation lock file (harder to bypass)
|
||||
if _, err := os.Stat(GetInstallLockPath()); !os.IsNotExist(err) {
|
||||
return false // Lock file exists, already installed
|
||||
}
|
||||
|
||||
return true
|
||||
}
|
||||
|
||||
// TestDatabaseConnection tests the database connection and creates database if not exists
|
||||
func TestDatabaseConnection(cfg *DatabaseConfig) error {
|
||||
// First, connect to the default 'postgres' database to check/create target database
|
||||
defaultDSN := fmt.Sprintf(
|
||||
"host=%s port=%d user=%s password=%s dbname=postgres sslmode=%s",
|
||||
cfg.Host, cfg.Port, cfg.User, cfg.Password, cfg.SSLMode,
|
||||
)
|
||||
|
||||
db, err := sql.Open("postgres", defaultDSN)
|
||||
if err != nil {
|
||||
return fmt.Errorf("failed to connect to PostgreSQL: %w", err)
|
||||
}
|
||||
|
||||
defer func() {
|
||||
if db == nil {
|
||||
return
|
||||
}
|
||||
if err := db.Close(); err != nil {
|
||||
log.Printf("failed to close postgres connection: %v", err)
|
||||
}
|
||||
}()
|
||||
|
||||
ctx, cancel := context.WithTimeout(context.Background(), 5*time.Second)
|
||||
defer cancel()
|
||||
|
||||
if err := db.PingContext(ctx); err != nil {
|
||||
return fmt.Errorf("ping failed: %w", err)
|
||||
}
|
||||
|
||||
// Check if target database exists
|
||||
var exists bool
|
||||
row := db.QueryRowContext(ctx, "SELECT EXISTS(SELECT 1 FROM pg_database WHERE datname = $1)", cfg.DBName)
|
||||
if err := row.Scan(&exists); err != nil {
|
||||
return fmt.Errorf("failed to check database existence: %w", err)
|
||||
}
|
||||
|
||||
// Create database if not exists
|
||||
if !exists {
|
||||
// 注意:数据库名不能参数化,依赖前置输入校验保障安全。
|
||||
// Note: Database names cannot be parameterized, but we've already validated cfg.DBName
|
||||
// in the handler using validateDBName() which only allows [a-zA-Z][a-zA-Z0-9_]*
|
||||
_, err := db.ExecContext(ctx, fmt.Sprintf("CREATE DATABASE %s", cfg.DBName))
|
||||
if err != nil {
|
||||
return fmt.Errorf("failed to create database '%s': %w", cfg.DBName, err)
|
||||
}
|
||||
log.Printf("Database '%s' created successfully", cfg.DBName)
|
||||
}
|
||||
|
||||
// Now connect to the target database to verify
|
||||
if err := db.Close(); err != nil {
|
||||
log.Printf("failed to close postgres connection: %v", err)
|
||||
}
|
||||
db = nil
|
||||
|
||||
targetDSN := fmt.Sprintf(
|
||||
"host=%s port=%d user=%s password=%s dbname=%s sslmode=%s",
|
||||
cfg.Host, cfg.Port, cfg.User, cfg.Password, cfg.DBName, cfg.SSLMode,
|
||||
)
|
||||
|
||||
targetDB, err := sql.Open("postgres", targetDSN)
|
||||
if err != nil {
|
||||
return fmt.Errorf("failed to connect to database '%s': %w", cfg.DBName, err)
|
||||
}
|
||||
|
||||
defer func() {
|
||||
if err := targetDB.Close(); err != nil {
|
||||
log.Printf("failed to close postgres connection: %v", err)
|
||||
}
|
||||
}()
|
||||
|
||||
ctx2, cancel2 := context.WithTimeout(context.Background(), 5*time.Second)
|
||||
defer cancel2()
|
||||
|
||||
if err := targetDB.PingContext(ctx2); err != nil {
|
||||
return fmt.Errorf("ping target database failed: %w", err)
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
// TestRedisConnection tests the Redis connection
|
||||
func TestRedisConnection(cfg *RedisConfig) error {
|
||||
rdb := redis.NewClient(&redis.Options{
|
||||
Addr: fmt.Sprintf("%s:%d", cfg.Host, cfg.Port),
|
||||
Password: cfg.Password,
|
||||
DB: cfg.DB,
|
||||
})
|
||||
defer func() {
|
||||
if err := rdb.Close(); err != nil {
|
||||
log.Printf("failed to close redis client: %v", err)
|
||||
}
|
||||
}()
|
||||
|
||||
ctx, cancel := context.WithTimeout(context.Background(), 5*time.Second)
|
||||
defer cancel()
|
||||
|
||||
if err := rdb.Ping(ctx).Err(); err != nil {
|
||||
return fmt.Errorf("ping failed: %w", err)
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
// Install performs the installation with the given configuration
|
||||
func Install(cfg *SetupConfig) error {
|
||||
// Security check: prevent re-installation if already installed
|
||||
if !NeedsSetup() {
|
||||
return fmt.Errorf("system is already installed, re-installation is not allowed")
|
||||
}
|
||||
|
||||
// Generate JWT secret if not provided
|
||||
if cfg.JWT.Secret == "" {
|
||||
secret, err := generateSecret(32)
|
||||
if err != nil {
|
||||
return fmt.Errorf("failed to generate jwt secret: %w", err)
|
||||
}
|
||||
cfg.JWT.Secret = secret
|
||||
log.Println("Warning: JWT secret auto-generated. Consider setting a fixed secret for production.")
|
||||
}
|
||||
|
||||
// Test connections
|
||||
if err := TestDatabaseConnection(&cfg.Database); err != nil {
|
||||
return fmt.Errorf("database connection failed: %w", err)
|
||||
}
|
||||
|
||||
if err := TestRedisConnection(&cfg.Redis); err != nil {
|
||||
return fmt.Errorf("redis connection failed: %w", err)
|
||||
}
|
||||
|
||||
// Initialize database
|
||||
if err := initializeDatabase(cfg); err != nil {
|
||||
return fmt.Errorf("database initialization failed: %w", err)
|
||||
}
|
||||
|
||||
// Create admin user
|
||||
if err := createAdminUser(cfg); err != nil {
|
||||
return fmt.Errorf("admin user creation failed: %w", err)
|
||||
}
|
||||
|
||||
// Write config file
|
||||
if err := writeConfigFile(cfg); err != nil {
|
||||
return fmt.Errorf("config file creation failed: %w", err)
|
||||
}
|
||||
|
||||
// Create installation lock file to prevent re-setup attacks
|
||||
if err := createInstallLock(); err != nil {
|
||||
return fmt.Errorf("failed to create install lock: %w", err)
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
// createInstallLock creates a lock file to prevent re-installation attacks
|
||||
func createInstallLock() error {
|
||||
content := fmt.Sprintf("installed_at=%s\n", time.Now().UTC().Format(time.RFC3339))
|
||||
return os.WriteFile(GetInstallLockPath(), []byte(content), 0400) // Read-only for owner
|
||||
}
|
||||
|
||||
func initializeDatabase(cfg *SetupConfig) error {
|
||||
dsn := fmt.Sprintf(
|
||||
"host=%s port=%d user=%s password=%s dbname=%s sslmode=%s",
|
||||
cfg.Database.Host, cfg.Database.Port, cfg.Database.User,
|
||||
cfg.Database.Password, cfg.Database.DBName, cfg.Database.SSLMode,
|
||||
)
|
||||
|
||||
db, err := sql.Open("postgres", dsn)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
defer func() {
|
||||
if err := db.Close(); err != nil {
|
||||
log.Printf("failed to close postgres connection: %v", err)
|
||||
}
|
||||
}()
|
||||
|
||||
migrationCtx, cancel := context.WithTimeout(context.Background(), 60*time.Second)
|
||||
defer cancel()
|
||||
return repository.ApplyMigrations(migrationCtx, db)
|
||||
}
|
||||
|
||||
func createAdminUser(cfg *SetupConfig) error {
|
||||
dsn := fmt.Sprintf(
|
||||
"host=%s port=%d user=%s password=%s dbname=%s sslmode=%s",
|
||||
cfg.Database.Host, cfg.Database.Port, cfg.Database.User,
|
||||
cfg.Database.Password, cfg.Database.DBName, cfg.Database.SSLMode,
|
||||
)
|
||||
|
||||
db, err := sql.Open("postgres", dsn)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
defer func() {
|
||||
if err := db.Close(); err != nil {
|
||||
log.Printf("failed to close postgres connection: %v", err)
|
||||
}
|
||||
}()
|
||||
|
||||
// 使用超时上下文避免安装流程因数据库异常而长时间阻塞。
|
||||
ctx, cancel := context.WithTimeout(context.Background(), 5*time.Second)
|
||||
defer cancel()
|
||||
|
||||
// Check if admin already exists
|
||||
var count int64
|
||||
if err := db.QueryRowContext(ctx, "SELECT COUNT(1) FROM users WHERE role = $1", service.RoleAdmin).Scan(&count); err != nil {
|
||||
return err
|
||||
}
|
||||
if count > 0 {
|
||||
return nil // Admin already exists
|
||||
}
|
||||
|
||||
admin := &service.User{
|
||||
Email: cfg.Admin.Email,
|
||||
Role: service.RoleAdmin,
|
||||
Status: service.StatusActive,
|
||||
Balance: 0,
|
||||
Concurrency: 5,
|
||||
CreatedAt: time.Now(),
|
||||
UpdatedAt: time.Now(),
|
||||
}
|
||||
|
||||
if err := admin.SetPassword(cfg.Admin.Password); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
_, err = db.ExecContext(
|
||||
ctx,
|
||||
`INSERT INTO users (email, password_hash, role, balance, concurrency, status, created_at, updated_at)
|
||||
VALUES ($1, $2, $3, $4, $5, $6, $7, $8)`,
|
||||
admin.Email,
|
||||
admin.PasswordHash,
|
||||
admin.Role,
|
||||
admin.Balance,
|
||||
admin.Concurrency,
|
||||
admin.Status,
|
||||
admin.CreatedAt,
|
||||
admin.UpdatedAt,
|
||||
)
|
||||
return err
|
||||
}
|
||||
|
||||
func writeConfigFile(cfg *SetupConfig) error {
|
||||
// Ensure timezone has a default value
|
||||
tz := cfg.Timezone
|
||||
if tz == "" {
|
||||
tz = "Asia/Shanghai"
|
||||
}
|
||||
|
||||
// Prepare config for YAML (exclude sensitive data and admin config)
|
||||
yamlConfig := struct {
|
||||
Server ServerConfig `yaml:"server"`
|
||||
Database DatabaseConfig `yaml:"database"`
|
||||
Redis RedisConfig `yaml:"redis"`
|
||||
JWT struct {
|
||||
Secret string `yaml:"secret"`
|
||||
ExpireHour int `yaml:"expire_hour"`
|
||||
} `yaml:"jwt"`
|
||||
Default struct {
|
||||
UserConcurrency int `yaml:"user_concurrency"`
|
||||
UserBalance float64 `yaml:"user_balance"`
|
||||
APIKeyPrefix string `yaml:"api_key_prefix"`
|
||||
RateMultiplier float64 `yaml:"rate_multiplier"`
|
||||
} `yaml:"default"`
|
||||
RateLimit struct {
|
||||
RequestsPerMinute int `yaml:"requests_per_minute"`
|
||||
BurstSize int `yaml:"burst_size"`
|
||||
} `yaml:"rate_limit"`
|
||||
Timezone string `yaml:"timezone"`
|
||||
}{
|
||||
Server: cfg.Server,
|
||||
Database: cfg.Database,
|
||||
Redis: cfg.Redis,
|
||||
JWT: struct {
|
||||
Secret string `yaml:"secret"`
|
||||
ExpireHour int `yaml:"expire_hour"`
|
||||
}{
|
||||
Secret: cfg.JWT.Secret,
|
||||
ExpireHour: cfg.JWT.ExpireHour,
|
||||
},
|
||||
Default: struct {
|
||||
UserConcurrency int `yaml:"user_concurrency"`
|
||||
UserBalance float64 `yaml:"user_balance"`
|
||||
APIKeyPrefix string `yaml:"api_key_prefix"`
|
||||
RateMultiplier float64 `yaml:"rate_multiplier"`
|
||||
}{
|
||||
UserConcurrency: 5,
|
||||
UserBalance: 0,
|
||||
APIKeyPrefix: "sk-",
|
||||
RateMultiplier: 1.0,
|
||||
},
|
||||
RateLimit: struct {
|
||||
RequestsPerMinute int `yaml:"requests_per_minute"`
|
||||
BurstSize int `yaml:"burst_size"`
|
||||
}{
|
||||
RequestsPerMinute: 60,
|
||||
BurstSize: 10,
|
||||
},
|
||||
Timezone: tz,
|
||||
}
|
||||
|
||||
data, err := yaml.Marshal(&yamlConfig)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
return os.WriteFile(GetConfigFilePath(), data, 0600)
|
||||
}
|
||||
|
||||
func generateSecret(length int) (string, error) {
|
||||
bytes := make([]byte, length)
|
||||
if _, err := rand.Read(bytes); err != nil {
|
||||
return "", err
|
||||
}
|
||||
return hex.EncodeToString(bytes), nil
|
||||
}
|
||||
|
||||
// =============================================================================
|
||||
// Auto Setup for Docker Deployment
|
||||
// =============================================================================
|
||||
|
||||
// AutoSetupEnabled checks if auto setup is enabled via environment variable
|
||||
func AutoSetupEnabled() bool {
|
||||
val := os.Getenv("AUTO_SETUP")
|
||||
return val == "true" || val == "1" || val == "yes"
|
||||
}
|
||||
|
||||
// getEnvOrDefault gets environment variable or returns default value
|
||||
func getEnvOrDefault(key, defaultValue string) string {
|
||||
if val := os.Getenv(key); val != "" {
|
||||
return val
|
||||
}
|
||||
return defaultValue
|
||||
}
|
||||
|
||||
// getEnvIntOrDefault gets environment variable as int or returns default value
|
||||
func getEnvIntOrDefault(key string, defaultValue int) int {
|
||||
if val := os.Getenv(key); val != "" {
|
||||
if i, err := strconv.Atoi(val); err == nil {
|
||||
return i
|
||||
}
|
||||
}
|
||||
return defaultValue
|
||||
}
|
||||
|
||||
// AutoSetupFromEnv performs automatic setup using environment variables
|
||||
// This is designed for Docker deployment where all config is passed via env vars
|
||||
func AutoSetupFromEnv() error {
|
||||
log.Println("Auto setup enabled, configuring from environment variables...")
|
||||
log.Printf("Data directory: %s", GetDataDir())
|
||||
|
||||
// Get timezone from TZ or TIMEZONE env var (TZ is standard for Docker)
|
||||
tz := getEnvOrDefault("TZ", "")
|
||||
if tz == "" {
|
||||
tz = getEnvOrDefault("TIMEZONE", "Asia/Shanghai")
|
||||
}
|
||||
|
||||
// Build config from environment variables
|
||||
cfg := &SetupConfig{
|
||||
Database: DatabaseConfig{
|
||||
Host: getEnvOrDefault("DATABASE_HOST", "localhost"),
|
||||
Port: getEnvIntOrDefault("DATABASE_PORT", 5432),
|
||||
User: getEnvOrDefault("DATABASE_USER", "postgres"),
|
||||
Password: getEnvOrDefault("DATABASE_PASSWORD", ""),
|
||||
DBName: getEnvOrDefault("DATABASE_DBNAME", "sub2api"),
|
||||
SSLMode: getEnvOrDefault("DATABASE_SSLMODE", "disable"),
|
||||
},
|
||||
Redis: RedisConfig{
|
||||
Host: getEnvOrDefault("REDIS_HOST", "localhost"),
|
||||
Port: getEnvIntOrDefault("REDIS_PORT", 6379),
|
||||
Password: getEnvOrDefault("REDIS_PASSWORD", ""),
|
||||
DB: getEnvIntOrDefault("REDIS_DB", 0),
|
||||
},
|
||||
Admin: AdminConfig{
|
||||
Email: getEnvOrDefault("ADMIN_EMAIL", "admin@sub2api.local"),
|
||||
Password: getEnvOrDefault("ADMIN_PASSWORD", ""),
|
||||
},
|
||||
Server: ServerConfig{
|
||||
Host: getEnvOrDefault("SERVER_HOST", "0.0.0.0"),
|
||||
Port: getEnvIntOrDefault("SERVER_PORT", 8080),
|
||||
Mode: getEnvOrDefault("SERVER_MODE", "release"),
|
||||
},
|
||||
JWT: JWTConfig{
|
||||
Secret: getEnvOrDefault("JWT_SECRET", ""),
|
||||
ExpireHour: getEnvIntOrDefault("JWT_EXPIRE_HOUR", 24),
|
||||
},
|
||||
Timezone: tz,
|
||||
}
|
||||
|
||||
// Generate JWT secret if not provided
|
||||
if cfg.JWT.Secret == "" {
|
||||
secret, err := generateSecret(32)
|
||||
if err != nil {
|
||||
return fmt.Errorf("failed to generate jwt secret: %w", err)
|
||||
}
|
||||
cfg.JWT.Secret = secret
|
||||
log.Println("Warning: JWT secret auto-generated. Consider setting a fixed secret for production.")
|
||||
}
|
||||
|
||||
// Generate admin password if not provided
|
||||
if cfg.Admin.Password == "" {
|
||||
password, err := generateSecret(16)
|
||||
if err != nil {
|
||||
return fmt.Errorf("failed to generate admin password: %w", err)
|
||||
}
|
||||
cfg.Admin.Password = password
|
||||
fmt.Printf("Generated admin password (one-time): %s\n", cfg.Admin.Password)
|
||||
fmt.Println("IMPORTANT: Save this password! It will not be shown again.")
|
||||
}
|
||||
|
||||
// Test database connection
|
||||
log.Println("Testing database connection...")
|
||||
if err := TestDatabaseConnection(&cfg.Database); err != nil {
|
||||
return fmt.Errorf("database connection failed: %w", err)
|
||||
}
|
||||
log.Println("Database connection successful")
|
||||
|
||||
// Test Redis connection
|
||||
log.Println("Testing Redis connection...")
|
||||
if err := TestRedisConnection(&cfg.Redis); err != nil {
|
||||
return fmt.Errorf("redis connection failed: %w", err)
|
||||
}
|
||||
log.Println("Redis connection successful")
|
||||
|
||||
// Initialize database
|
||||
log.Println("Initializing database...")
|
||||
if err := initializeDatabase(cfg); err != nil {
|
||||
return fmt.Errorf("database initialization failed: %w", err)
|
||||
}
|
||||
log.Println("Database initialized successfully")
|
||||
|
||||
// Create admin user
|
||||
log.Println("Creating admin user...")
|
||||
if err := createAdminUser(cfg); err != nil {
|
||||
return fmt.Errorf("admin user creation failed: %w", err)
|
||||
}
|
||||
log.Printf("Admin user created: %s", cfg.Admin.Email)
|
||||
|
||||
// Write config file
|
||||
log.Println("Writing configuration file...")
|
||||
if err := writeConfigFile(cfg); err != nil {
|
||||
return fmt.Errorf("config file creation failed: %w", err)
|
||||
}
|
||||
log.Println("Configuration file created")
|
||||
|
||||
// Create installation lock file
|
||||
if err := createInstallLock(); err != nil {
|
||||
return fmt.Errorf("failed to create install lock: %w", err)
|
||||
}
|
||||
log.Println("Installation lock created")
|
||||
|
||||
log.Println("Auto setup completed successfully!")
|
||||
return nil
|
||||
}
|
||||
Reference in New Issue
Block a user