mirror of
https://github.com/router-for-me/CLIProxyAPI.git
synced 2026-02-18 04:10:51 +08:00
Compare commits
29 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
f9f2333997 | ||
|
|
179b8aa88f | ||
|
|
040d66f0bb | ||
|
|
c875088be2 | ||
|
|
46fa32f087 | ||
|
|
551bc1a4a8 | ||
|
|
1305f2f6dc | ||
|
|
2a2a276e3b | ||
|
|
5aba4ca1b1 | ||
|
|
47b5ebfc43 | ||
|
|
1bb0d11f62 | ||
|
|
6164f5c35b | ||
|
|
c263398423 | ||
|
|
ef922b29c2 | ||
|
|
d10ef7b58a | ||
|
|
e074e957d1 | ||
|
|
7b546ea2ee | ||
|
|
506e2e12a6 | ||
|
|
c52255e2a4 | ||
|
|
b05d00ede9 | ||
|
|
8d05489973 | ||
|
|
4f18809500 | ||
|
|
28218ec550 | ||
|
|
f97954c811 | ||
|
|
798f65b35e | ||
|
|
57484b97bb | ||
|
|
0e0602c553 | ||
|
|
54ffb52838 | ||
|
|
c62e45ee88 |
14
.github/workflows/docker-image.yml
vendored
14
.github/workflows/docker-image.yml
vendored
@@ -24,8 +24,11 @@ jobs:
|
|||||||
with:
|
with:
|
||||||
username: ${{ secrets.DOCKERHUB_USERNAME }}
|
username: ${{ secrets.DOCKERHUB_USERNAME }}
|
||||||
password: ${{ secrets.DOCKERHUB_TOKEN }}
|
password: ${{ secrets.DOCKERHUB_TOKEN }}
|
||||||
- name: Generate App Version
|
- name: Generate Build Metadata
|
||||||
run: echo APP_VERSION=`git describe --tags --always` >> $GITHUB_ENV
|
run: |
|
||||||
|
echo VERSION=`git describe --tags --always --dirty` >> $GITHUB_ENV
|
||||||
|
echo COMMIT=`git rev-parse --short HEAD` >> $GITHUB_ENV
|
||||||
|
echo BUILD_DATE=`date -u +%Y-%m-%dT%H:%M:%SZ` >> $GITHUB_ENV
|
||||||
- name: Build and push
|
- name: Build and push
|
||||||
uses: docker/build-push-action@v6
|
uses: docker/build-push-action@v6
|
||||||
with:
|
with:
|
||||||
@@ -35,8 +38,9 @@ jobs:
|
|||||||
linux/arm64
|
linux/arm64
|
||||||
push: true
|
push: true
|
||||||
build-args: |
|
build-args: |
|
||||||
APP_NAME=${{ env.APP_NAME }}
|
VERSION=${{ env.VERSION }}
|
||||||
APP_VERSION=${{ env.APP_VERSION }}
|
COMMIT=${{ env.COMMIT }}
|
||||||
|
BUILD_DATE=${{ env.BUILD_DATE }}
|
||||||
tags: |
|
tags: |
|
||||||
${{ env.DOCKERHUB_REPO }}:latest
|
${{ env.DOCKERHUB_REPO }}:latest
|
||||||
${{ env.DOCKERHUB_REPO }}:${{ env.APP_VERSION }}
|
${{ env.DOCKERHUB_REPO }}:${{ env.VERSION }}
|
||||||
|
|||||||
14
.github/workflows/release.yaml
vendored
14
.github/workflows/release.yaml
vendored
@@ -13,18 +13,26 @@ jobs:
|
|||||||
goreleaser:
|
goreleaser:
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
steps:
|
steps:
|
||||||
- uses: actions/checkout@v3
|
- uses: actions/checkout@v4
|
||||||
with:
|
with:
|
||||||
fetch-depth: 0
|
fetch-depth: 0
|
||||||
- run: git fetch --force --tags
|
- run: git fetch --force --tags
|
||||||
- uses: actions/setup-go@v3
|
- uses: actions/setup-go@v4
|
||||||
with:
|
with:
|
||||||
go-version: '>=1.24.0'
|
go-version: '>=1.24.0'
|
||||||
cache: true
|
cache: true
|
||||||
- uses: goreleaser/goreleaser-action@v3
|
- name: Generate Build Metadata
|
||||||
|
run: |
|
||||||
|
echo VERSION=`git describe --tags --always --dirty` >> $GITHUB_ENV
|
||||||
|
echo COMMIT=`git rev-parse --short HEAD` >> $GITHUB_ENV
|
||||||
|
echo BUILD_DATE=`date -u +%Y-%m-%dT%H:%M:%SZ` >> $GITHUB_ENV
|
||||||
|
- uses: goreleaser/goreleaser-action@v4
|
||||||
with:
|
with:
|
||||||
distribution: goreleaser
|
distribution: goreleaser
|
||||||
version: latest
|
version: latest
|
||||||
args: release --clean
|
args: release --clean
|
||||||
env:
|
env:
|
||||||
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
||||||
|
VERSION: ${{ env.VERSION }}
|
||||||
|
COMMIT: ${{ env.COMMIT }}
|
||||||
|
BUILD_DATE: ${{ env.BUILD_DATE }}
|
||||||
|
|||||||
@@ -9,6 +9,8 @@ builds:
|
|||||||
- arm64
|
- arm64
|
||||||
main: ./cmd/server/
|
main: ./cmd/server/
|
||||||
binary: cli-proxy-api
|
binary: cli-proxy-api
|
||||||
|
ldflags:
|
||||||
|
- -s -w -X 'main.Version={{.Version}}' -X 'main.Commit={{.ShortCommit}}' -X 'main.BuildDate={{.Date}}'
|
||||||
archives:
|
archives:
|
||||||
- id: "cli-proxy-api"
|
- id: "cli-proxy-api"
|
||||||
format: tar.gz
|
format: tar.gz
|
||||||
@@ -19,4 +21,17 @@ archives:
|
|||||||
- LICENSE
|
- LICENSE
|
||||||
- README.md
|
- README.md
|
||||||
- README_CN.md
|
- README_CN.md
|
||||||
- config.example.yaml
|
- config.example.yaml
|
||||||
|
|
||||||
|
checksum:
|
||||||
|
name_template: 'checksums.txt'
|
||||||
|
|
||||||
|
snapshot:
|
||||||
|
name_template: "{{ incpatch .Version }}-next"
|
||||||
|
|
||||||
|
changelog:
|
||||||
|
sort: asc
|
||||||
|
filters:
|
||||||
|
exclude:
|
||||||
|
- '^docs:'
|
||||||
|
- '^test:'
|
||||||
@@ -8,7 +8,11 @@ RUN go mod download
|
|||||||
|
|
||||||
COPY . .
|
COPY . .
|
||||||
|
|
||||||
RUN CGO_ENABLED=0 GOOS=linux go build -o ./CLIProxyAPI ./cmd/server/
|
ARG VERSION=dev
|
||||||
|
ARG COMMIT=none
|
||||||
|
ARG BUILD_DATE=unknown
|
||||||
|
|
||||||
|
RUN CGO_ENABLED=0 GOOS=linux go build -ldflags="-s -w -X 'main.Version=${VERSION}' -X 'main.Commit=${COMMIT}' -X 'main.BuildDate=${BUILD_DATE}'" -o ./CLIProxyAPI ./cmd/server/
|
||||||
|
|
||||||
FROM alpine:3.22.0
|
FROM alpine:3.22.0
|
||||||
|
|
||||||
|
|||||||
@@ -28,6 +28,17 @@ If a plaintext key is detected in the config at startup, it will be bcrypt‑has
|
|||||||
|
|
||||||
## Endpoints
|
## Endpoints
|
||||||
|
|
||||||
|
### Config
|
||||||
|
- GET `/config` — Get the full config
|
||||||
|
- Request:
|
||||||
|
```bash
|
||||||
|
curl -H 'Authorization: Bearer <MANAGEMENT_KEY>' http://localhost:8317/v0/management/config
|
||||||
|
```
|
||||||
|
- Response:
|
||||||
|
```json
|
||||||
|
{"debug":true,"proxy-url":"","api-keys":["1...5","JS...W"],"quota-exceeded":{"switch-project":true,"switch-preview-model":true},"generative-language-api-key":["AI...01", "AI...02", "AI...03"],"request-log":true,"request-retry":3,"claude-api-key":[{"api-key":"cr...56","base-url":"https://example.com/api"},{"api-key":"cr...e3","base-url":"http://example.com:3000/api"},{"api-key":"sk-...q2","base-url":"https://example.com"}],"codex-api-key":[{"api-key":"sk...01","base-url":"https://example/v1"}],"openai-compatibility":[{"name":"openrouter","base-url":"https://openrouter.ai/api/v1","api-keys":["sk...01"],"models":[{"name":"moonshotai/kimi-k2:free","alias":"kimi-k2"}]},{"name":"iflow","base-url":"https://apis.iflow.cn/v1","api-keys":["sk...7e"],"models":[{"name":"deepseek-v3.1","alias":"deepseek-v3.1"},{"name":"glm-4.5","alias":"glm-4.5"},{"name":"kimi-k2","alias":"kimi-k2"}]}],"allow-localhost-unauthenticated":true}
|
||||||
|
```
|
||||||
|
|
||||||
### Debug
|
### Debug
|
||||||
- GET `/debug` — Get the current debug state
|
- GET `/debug` — Get the current debug state
|
||||||
- Request:
|
- Request:
|
||||||
@@ -455,7 +466,7 @@ Manage JSON token files under `auth-dir`: list, download, upload, delete.
|
|||||||
```
|
```
|
||||||
- Response:
|
- Response:
|
||||||
```json
|
```json
|
||||||
{ "files": [ { "name": "acc1.json", "size": 1234, "modtime": "2025-08-30T12:34:56Z" } ] }
|
{ "files": [ { "name": "acc1.json", "size": 1234, "modtime": "2025-08-30T12:34:56Z", "type": "google" } ] }
|
||||||
```
|
```
|
||||||
|
|
||||||
- GET `/auth-files/download?name=<file.json>` — Download a single file
|
- GET `/auth-files/download?name=<file.json>` — Download a single file
|
||||||
|
|||||||
@@ -28,6 +28,17 @@
|
|||||||
|
|
||||||
## 端点说明
|
## 端点说明
|
||||||
|
|
||||||
|
### Config
|
||||||
|
- GET `/config` — 获取完整的配置
|
||||||
|
- 请求:
|
||||||
|
```bash
|
||||||
|
curl -H 'Authorization: Bearer <MANAGEMENT_KEY>' http://localhost:8317/v0/management/config
|
||||||
|
```
|
||||||
|
- 响应:
|
||||||
|
```json
|
||||||
|
{"debug":true,"proxy-url":"","api-keys":["1...5","JS...W"],"quota-exceeded":{"switch-project":true,"switch-preview-model":true},"generative-language-api-key":["AI...01", "AI...02", "AI...03"],"request-log":true,"request-retry":3,"claude-api-key":[{"api-key":"cr...56","base-url":"https://example.com/api"},{"api-key":"cr...e3","base-url":"http://example.com:3000/api"},{"api-key":"sk-...q2","base-url":"https://example.com"}],"codex-api-key":[{"api-key":"sk...01","base-url":"https://example/v1"}],"openai-compatibility":[{"name":"openrouter","base-url":"https://openrouter.ai/api/v1","api-keys":["sk...01"],"models":[{"name":"moonshotai/kimi-k2:free","alias":"kimi-k2"}]},{"name":"iflow","base-url":"https://apis.iflow.cn/v1","api-keys":["sk...7e"],"models":[{"name":"deepseek-v3.1","alias":"deepseek-v3.1"},{"name":"glm-4.5","alias":"glm-4.5"},{"name":"kimi-k2","alias":"kimi-k2"}]}],"allow-localhost-unauthenticated":true}
|
||||||
|
```
|
||||||
|
|
||||||
### Debug
|
### Debug
|
||||||
- GET `/debug` — 获取当前 debug 状态
|
- GET `/debug` — 获取当前 debug 状态
|
||||||
- 请求:
|
- 请求:
|
||||||
@@ -455,7 +466,7 @@
|
|||||||
```
|
```
|
||||||
- 响应:
|
- 响应:
|
||||||
```json
|
```json
|
||||||
{ "files": [ { "name": "acc1.json", "size": 1234, "modtime": "2025-08-30T12:34:56Z" } ] }
|
{ "files": [ { "name": "acc1.json", "size": 1234, "modtime": "2025-08-30T12:34:56Z", "type": "google" } ] }
|
||||||
```
|
```
|
||||||
|
|
||||||
- GET `/auth-files/download?name=<file.json>` — 下载单个文件
|
- GET `/auth-files/download?name=<file.json>` — 下载单个文件
|
||||||
|
|||||||
69
README.md
69
README.md
@@ -220,6 +220,7 @@ console.log(await claudeResponse.json());
|
|||||||
|
|
||||||
- gemini-2.5-pro
|
- gemini-2.5-pro
|
||||||
- gemini-2.5-flash
|
- gemini-2.5-flash
|
||||||
|
- gemini-2.5-flash-lite
|
||||||
- gpt-5
|
- gpt-5
|
||||||
- claude-opus-4-1-20250805
|
- claude-opus-4-1-20250805
|
||||||
- claude-opus-4-20250514
|
- claude-opus-4-20250514
|
||||||
@@ -254,6 +255,9 @@ The server uses a YAML configuration file (`config.yaml`) located in the project
|
|||||||
| `debug` | boolean | false | Enable debug mode for verbose logging. |
|
| `debug` | boolean | false | Enable debug mode for verbose logging. |
|
||||||
| `api-keys` | string[] | [] | List of API keys that can be used to authenticate requests. |
|
| `api-keys` | string[] | [] | List of API keys that can be used to authenticate requests. |
|
||||||
| `generative-language-api-key` | string[] | [] | List of Generative Language API keys. |
|
| `generative-language-api-key` | string[] | [] | List of Generative Language API keys. |
|
||||||
|
| `codex-api-key` | object | {} | List of Codex API keys. |
|
||||||
|
| `codex-api-key.api-key` | string | "" | Codex API key. |
|
||||||
|
| `codex-api-key.base-url` | string | "" | Custom Codex API endpoint, if you use a third-party API endpoint. |
|
||||||
| `claude-api-key` | object | {} | List of Claude API keys. |
|
| `claude-api-key` | object | {} | List of Claude API keys. |
|
||||||
| `claude-api-key.api-key` | string | "" | Claude API key. |
|
| `claude-api-key.api-key` | string | "" | Claude API key. |
|
||||||
| `claude-api-key.base-url` | string | "" | Custom Claude API endpoint, if you use a third-party API endpoint. |
|
| `claude-api-key.base-url` | string | "" | Custom Claude API endpoint, if you use a third-party API endpoint. |
|
||||||
@@ -310,6 +314,11 @@ generative-language-api-key:
|
|||||||
- "AIzaSy...02"
|
- "AIzaSy...02"
|
||||||
- "AIzaSy...03"
|
- "AIzaSy...03"
|
||||||
- "AIzaSy...04"
|
- "AIzaSy...04"
|
||||||
|
|
||||||
|
# Codex API keys
|
||||||
|
codex-api-key:
|
||||||
|
- api-key: "sk-atSM..."
|
||||||
|
base-url: "https://www.example.com" # use the custom codex API endpoint
|
||||||
|
|
||||||
# Claude API keys
|
# Claude API keys
|
||||||
claude-api-key:
|
claude-api-key:
|
||||||
@@ -488,25 +497,63 @@ docker run --rm -p 8317:8317 -v /path/to/your/config.yaml:/CLIProxyAPI/config.ya
|
|||||||
|
|
||||||
## Run with Docker Compose
|
## Run with Docker Compose
|
||||||
|
|
||||||
1. Create a `config.yaml` from `config.example.yaml` and customize it.
|
1. Clone the repository and navigate into the directory:
|
||||||
|
|
||||||
2. Build and start the services using Docker Compose:
|
|
||||||
```bash
|
```bash
|
||||||
docker compose up -d --build
|
git clone https://github.com/luispater/CLIProxyAPI.git
|
||||||
|
cd CLIProxyAPI
|
||||||
```
|
```
|
||||||
|
|
||||||
3. To authenticate with providers, run the login command inside the container:
|
2. Prepare the configuration file:
|
||||||
- **Gemini**: `docker compose exec cli-proxy-api /CLIProxyAPI/CLIProxyAPI -no-browser --login`
|
Create a `config.yaml` file by copying the example and customize it to your needs.
|
||||||
- **OpenAI (Codex)**: `docker compose exec cli-proxy-api /CLIProxyAPI/CLIProxyAPI -no-browser --codex-login`
|
```bash
|
||||||
- **Claude**: `docker compose exec cli-proxy-api /CLIProxyAPI/CLIProxyAPI -no-browser --claude-login`
|
cp config.example.yaml config.yaml
|
||||||
- **Qwen**: `docker compose exec cli-proxy-api /CLIProxyAPI/CLIProxyAPI -no-browser --qwen-login`
|
```
|
||||||
|
*(Note for Windows users: You can use `copy config.example.yaml config.yaml` in CMD or PowerShell.)*
|
||||||
|
|
||||||
4. To view the server logs:
|
3. Start the service:
|
||||||
|
- **For most users (recommended):**
|
||||||
|
Run the following command to start the service using the pre-built image from Docker Hub. The service will run in the background.
|
||||||
|
```bash
|
||||||
|
docker compose up -d
|
||||||
|
```
|
||||||
|
- **For advanced users:**
|
||||||
|
If you have modified the source code and need to build a new image, use the interactive helper scripts:
|
||||||
|
- For Windows (PowerShell):
|
||||||
|
```powershell
|
||||||
|
.\docker-build.ps1
|
||||||
|
```
|
||||||
|
- For Linux/macOS:
|
||||||
|
```bash
|
||||||
|
bash docker-build.sh
|
||||||
|
```
|
||||||
|
The script will prompt you to choose how to run the application:
|
||||||
|
- **Option 1: Run using Pre-built Image (Recommended)**: Pulls the latest official image from the registry and starts the container. This is the easiest way to get started.
|
||||||
|
- **Option 2: Build from Source and Run (For Developers)**: Builds the image from the local source code, tags it as `cli-proxy-api:local`, and then starts the container. This is useful if you are making changes to the source code.
|
||||||
|
|
||||||
|
4. To authenticate with providers, run the login command inside the container:
|
||||||
|
- **Gemini**:
|
||||||
|
```bash
|
||||||
|
docker compose exec cli-proxy-api /CLIProxyAPI/CLIProxyAPI -no-browser --login
|
||||||
|
```
|
||||||
|
- **OpenAI (Codex)**:
|
||||||
|
```bash
|
||||||
|
docker compose exec cli-proxy-api /CLIProxyAPI/CLIProxyAPI -no-browser --codex-login
|
||||||
|
```
|
||||||
|
- **Claude**:
|
||||||
|
```bash
|
||||||
|
docker compose exec cli-proxy-api /CLIProxyAPI/CLIProxyAPI -no-browser --claude-login
|
||||||
|
```
|
||||||
|
- **Qwen**:
|
||||||
|
```bash
|
||||||
|
docker compose exec cli-proxy-api /CLIProxyAPI/CLIProxyAPI -no-browser --qwen-login
|
||||||
|
```
|
||||||
|
|
||||||
|
5. To view the server logs:
|
||||||
```bash
|
```bash
|
||||||
docker compose logs -f
|
docker compose logs -f
|
||||||
```
|
```
|
||||||
|
|
||||||
5. To stop the application:
|
6. To stop the application:
|
||||||
```bash
|
```bash
|
||||||
docker compose down
|
docker compose down
|
||||||
```
|
```
|
||||||
|
|||||||
79
README_CN.md
79
README_CN.md
@@ -16,6 +16,8 @@
|
|||||||
|
|
||||||
另外中文需要交流的用户可以加 QQ 群:188637136
|
另外中文需要交流的用户可以加 QQ 群:188637136
|
||||||
|
|
||||||
|
或 Telegram 群:https://t.me/CLIProxyAPI
|
||||||
|
|
||||||
# CLI 代理 API
|
# CLI 代理 API
|
||||||
|
|
||||||
[English](README.md) | 中文
|
[English](README.md) | 中文
|
||||||
@@ -237,6 +239,7 @@ console.log(await claudeResponse.json());
|
|||||||
|
|
||||||
- gemini-2.5-pro
|
- gemini-2.5-pro
|
||||||
- gemini-2.5-flash
|
- gemini-2.5-flash
|
||||||
|
- gemini-2.5-flash-lite
|
||||||
- gpt-5
|
- gpt-5
|
||||||
- claude-opus-4-1-20250805
|
- claude-opus-4-1-20250805
|
||||||
- claude-opus-4-20250514
|
- claude-opus-4-20250514
|
||||||
@@ -271,6 +274,9 @@ console.log(await claudeResponse.json());
|
|||||||
| `debug` | boolean | false | 启用调试模式以获取详细日志。 |
|
| `debug` | boolean | false | 启用调试模式以获取详细日志。 |
|
||||||
| `api-keys` | string[] | [] | 可用于验证请求的API密钥列表。 |
|
| `api-keys` | string[] | [] | 可用于验证请求的API密钥列表。 |
|
||||||
| `generative-language-api-key` | string[] | [] | 生成式语言API密钥列表。 |
|
| `generative-language-api-key` | string[] | [] | 生成式语言API密钥列表。 |
|
||||||
|
| `codex-api-key` | object | {} | Codex API密钥列表。 |
|
||||||
|
| `codex-api-key.api-key` | string | "" | Codex API密钥。 |
|
||||||
|
| `codex-api-key.base-url` | string | "" | 自定义的Codex API端点 |
|
||||||
| `claude-api-key` | object | {} | Claude API密钥列表。 |
|
| `claude-api-key` | object | {} | Claude API密钥列表。 |
|
||||||
| `claude-api-key.api-key` | string | "" | Claude API密钥。 |
|
| `claude-api-key.api-key` | string | "" | Claude API密钥。 |
|
||||||
| `claude-api-key.base-url` | string | "" | 自定义的Claude API端点,如果您使用第三方的API端点。 |
|
| `claude-api-key.base-url` | string | "" | 自定义的Claude API端点,如果您使用第三方的API端点。 |
|
||||||
@@ -328,11 +334,16 @@ generative-language-api-key:
|
|||||||
- "AIzaSy...03"
|
- "AIzaSy...03"
|
||||||
- "AIzaSy...04"
|
- "AIzaSy...04"
|
||||||
|
|
||||||
# Claude API keys
|
# Codex API 密钥
|
||||||
claude-api-key:
|
codex-api-key:
|
||||||
- api-key: "sk-atSM..." # use the official claude API key, no need to set the base url
|
|
||||||
- api-key: "sk-atSM..."
|
- api-key: "sk-atSM..."
|
||||||
base-url: "https://www.example.com" # use the custom claude API endpoint
|
base-url: "https://www.example.com" # 第三方 Codex API 中转服务端点
|
||||||
|
|
||||||
|
# Claude API 密钥
|
||||||
|
claude-api-key:
|
||||||
|
- api-key: "sk-atSM..." # 如果使用官方 Claude API,无需设置 base-url
|
||||||
|
- api-key: "sk-atSM..."
|
||||||
|
base-url: "https://www.example.com" # 第三方 Claude API 中转服务端点
|
||||||
|
|
||||||
# OpenAI 兼容提供商
|
# OpenAI 兼容提供商
|
||||||
openai-compatibility:
|
openai-compatibility:
|
||||||
@@ -501,25 +512,63 @@ docker run --rm -p 8317:8317 -v /path/to/your/config.yaml:/CLIProxyAPI/config.ya
|
|||||||
|
|
||||||
## 使用 Docker Compose 运行
|
## 使用 Docker Compose 运行
|
||||||
|
|
||||||
1. 从 `config.example.yaml` 创建一个 `config.yaml` 文件并进行自定义。
|
1. 克隆仓库并进入目录:
|
||||||
|
|
||||||
2. 使用 Docker Compose 构建并启动服务:
|
|
||||||
```bash
|
```bash
|
||||||
docker compose up -d --build
|
git clone https://github.com/luispater/CLIProxyAPI.git
|
||||||
|
cd CLIProxyAPI
|
||||||
```
|
```
|
||||||
|
|
||||||
3. 要在容器内运行登录命令进行身份验证:
|
2. 准备配置文件:
|
||||||
- **Gemini**: `docker compose exec cli-proxy-api /CLIProxyAPI/CLIProxyAPI -no-browser --login`
|
通过复制示例文件来创建 `config.yaml` 文件,并根据您的需求进行自定义。
|
||||||
- **OpenAI (Codex)**: `docker compose exec cli-proxy-api /CLIProxyAPI/CLIProxyAPI -no-browser --codex-login`
|
```bash
|
||||||
- **Claude**: `docker compose exec cli-proxy-api /CLIProxyAPI/CLIProxyAPI -no-browser --claude-login`
|
cp config.example.yaml config.yaml
|
||||||
- **Qwen**: `docker compose exec cli-proxy-api /CLIProxyAPI/CLIProxyAPI -no-browser --qwen-login`
|
```
|
||||||
|
*(Windows 用户请注意:您可以在 CMD 或 PowerShell 中使用 `copy config.example.yaml config.yaml`。)*
|
||||||
|
|
||||||
4. 查看服务器日志:
|
3. 启动服务:
|
||||||
|
- **适用于大多数用户(推荐):**
|
||||||
|
运行以下命令,使用 Docker Hub 上的预构建镜像启动服务。服务将在后台运行。
|
||||||
|
```bash
|
||||||
|
docker compose up -d
|
||||||
|
```
|
||||||
|
- **适用于进阶用户:**
|
||||||
|
如果您修改了源代码并需要构建新镜像,请使用交互式辅助脚本:
|
||||||
|
- 对于 Windows (PowerShell):
|
||||||
|
```powershell
|
||||||
|
.\docker-build.ps1
|
||||||
|
```
|
||||||
|
- 对于 Linux/macOS:
|
||||||
|
```bash
|
||||||
|
bash docker-build.sh
|
||||||
|
```
|
||||||
|
脚本将提示您选择运行方式:
|
||||||
|
- **选项 1:使用预构建的镜像运行 (推荐)**:从镜像仓库拉取最新的官方镜像并启动容器。这是最简单的开始方式。
|
||||||
|
- **选项 2:从源码构建并运行 (适用于开发者)**:从本地源代码构建镜像,将其标记为 `cli-proxy-api:local`,然后启动容器。如果您需要修改源代码,此选项很有用。
|
||||||
|
|
||||||
|
4. 要在容器内运行登录命令进行身份验证:
|
||||||
|
- **Gemini**:
|
||||||
|
```bash
|
||||||
|
docker compose exec cli-proxy-api /CLIProxyAPI/CLIProxyAPI -no-browser --login
|
||||||
|
```
|
||||||
|
- **OpenAI (Codex)**:
|
||||||
|
```bash
|
||||||
|
docker compose exec cli-proxy-api /CLIProxyAPI/CLIProxyAPI -no-browser --codex-login
|
||||||
|
```
|
||||||
|
- **Claude**:
|
||||||
|
```bash
|
||||||
|
docker compose exec cli-proxy-api /CLIProxyAPI/CLIProxyAPI -no-browser --claude-login
|
||||||
|
```
|
||||||
|
- **Qwen**:
|
||||||
|
```bash
|
||||||
|
docker compose exec cli-proxy-api /CLIProxyAPI/CLIProxyAPI -no-browser --qwen-login
|
||||||
|
```
|
||||||
|
|
||||||
|
5. 查看服务器日志:
|
||||||
```bash
|
```bash
|
||||||
docker compose logs -f
|
docker compose logs -f
|
||||||
```
|
```
|
||||||
|
|
||||||
5. 停止应用程序:
|
6. 停止应用程序:
|
||||||
```bash
|
```bash
|
||||||
docker compose down
|
docker compose down
|
||||||
```
|
```
|
||||||
|
|||||||
@@ -14,9 +14,16 @@ import (
|
|||||||
"github.com/luispater/CLIProxyAPI/internal/cmd"
|
"github.com/luispater/CLIProxyAPI/internal/cmd"
|
||||||
"github.com/luispater/CLIProxyAPI/internal/config"
|
"github.com/luispater/CLIProxyAPI/internal/config"
|
||||||
_ "github.com/luispater/CLIProxyAPI/internal/translator"
|
_ "github.com/luispater/CLIProxyAPI/internal/translator"
|
||||||
|
"github.com/luispater/CLIProxyAPI/internal/util"
|
||||||
log "github.com/sirupsen/logrus"
|
log "github.com/sirupsen/logrus"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
Version = "dev"
|
||||||
|
Commit = "none"
|
||||||
|
BuildDate = "unknown"
|
||||||
|
)
|
||||||
|
|
||||||
// LogFormatter defines a custom log format for logrus.
|
// LogFormatter defines a custom log format for logrus.
|
||||||
// This formatter adds timestamp, log level, and source location information
|
// This formatter adds timestamp, log level, and source location information
|
||||||
// to each log entry for better debugging and monitoring.
|
// to each log entry for better debugging and monitoring.
|
||||||
@@ -58,6 +65,8 @@ func init() {
|
|||||||
// It parses command-line flags, loads configuration, and starts the appropriate
|
// It parses command-line flags, loads configuration, and starts the appropriate
|
||||||
// service based on the provided flags (login, codex-login, or server mode).
|
// service based on the provided flags (login, codex-login, or server mode).
|
||||||
func main() {
|
func main() {
|
||||||
|
log.Infof("CLIProxyAPI Version: %s, Commit: %s, BuiltAt: %s", Version, Commit, BuildDate)
|
||||||
|
|
||||||
// Command-line flags to control the application's behavior.
|
// Command-line flags to control the application's behavior.
|
||||||
var login bool
|
var login bool
|
||||||
var codexLogin bool
|
var codexLogin bool
|
||||||
@@ -104,11 +113,7 @@ func main() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Set the log level based on the configuration.
|
// Set the log level based on the configuration.
|
||||||
if cfg.Debug {
|
util.SetLogLevel(cfg)
|
||||||
log.SetLevel(log.DebugLevel)
|
|
||||||
} else {
|
|
||||||
log.SetLevel(log.InfoLevel)
|
|
||||||
}
|
|
||||||
|
|
||||||
// Expand the tilde (~) in the auth directory path to the user's home directory.
|
// Expand the tilde (~) in the auth directory path to the user's home directory.
|
||||||
if strings.HasPrefix(cfg.AuthDir, "~") {
|
if strings.HasPrefix(cfg.AuthDir, "~") {
|
||||||
|
|||||||
@@ -41,6 +41,11 @@ generative-language-api-key:
|
|||||||
- "AIzaSy...03"
|
- "AIzaSy...03"
|
||||||
- "AIzaSy...04"
|
- "AIzaSy...04"
|
||||||
|
|
||||||
|
# Codex API keys
|
||||||
|
codex-api-key:
|
||||||
|
- api-key: "sk-atSM..."
|
||||||
|
base-url: "https://www.example.com" # use the custom codex API endpoint
|
||||||
|
|
||||||
# Claude API keys
|
# Claude API keys
|
||||||
claude-api-key:
|
claude-api-key:
|
||||||
- api-key: "sk-atSM..." # use the official claude API key, no need to set the base url
|
- api-key: "sk-atSM..." # use the official claude API key, no need to set the base url
|
||||||
|
|||||||
53
docker-build.ps1
Normal file
53
docker-build.ps1
Normal file
@@ -0,0 +1,53 @@
|
|||||||
|
# build.ps1 - Windows PowerShell Build Script
|
||||||
|
#
|
||||||
|
# This script automates the process of building and running the Docker container
|
||||||
|
# with version information dynamically injected at build time.
|
||||||
|
|
||||||
|
# Stop script execution on any error
|
||||||
|
$ErrorActionPreference = "Stop"
|
||||||
|
|
||||||
|
# --- Step 1: Choose Environment ---
|
||||||
|
Write-Host "Please select an option:"
|
||||||
|
Write-Host "1) Run using Pre-built Image (Recommended)"
|
||||||
|
Write-Host "2) Build from Source and Run (For Developers)"
|
||||||
|
$choice = Read-Host -Prompt "Enter choice [1-2]"
|
||||||
|
|
||||||
|
# --- Step 2: Execute based on choice ---
|
||||||
|
switch ($choice) {
|
||||||
|
"1" {
|
||||||
|
Write-Host "--- Running with Pre-built Image ---"
|
||||||
|
docker compose up -d --remove-orphans --no-build
|
||||||
|
Write-Host "Services are starting from remote image."
|
||||||
|
Write-Host "Run 'docker compose logs -f' to see the logs."
|
||||||
|
}
|
||||||
|
"2" {
|
||||||
|
Write-Host "--- Building from Source and Running ---"
|
||||||
|
|
||||||
|
# Get Version Information
|
||||||
|
$VERSION = (git describe --tags --always --dirty)
|
||||||
|
$COMMIT = (git rev-parse --short HEAD)
|
||||||
|
$BUILD_DATE = (Get-Date).ToUniversalTime().ToString("yyyy-MM-ddTHH:mm:ssZ")
|
||||||
|
|
||||||
|
Write-Host "Building with the following info:"
|
||||||
|
Write-Host " Version: $VERSION"
|
||||||
|
Write-Host " Commit: $COMMIT"
|
||||||
|
Write-Host " Build Date: $BUILD_DATE"
|
||||||
|
Write-Host "----------------------------------------"
|
||||||
|
|
||||||
|
# Build and start the services with a local-only image tag
|
||||||
|
$env:CLI_PROXY_IMAGE = "cli-proxy-api:local"
|
||||||
|
|
||||||
|
Write-Host "Building the Docker image..."
|
||||||
|
docker compose build --build-arg VERSION=$VERSION --build-arg COMMIT=$COMMIT --build-arg BUILD_DATE=$BUILD_DATE
|
||||||
|
|
||||||
|
Write-Host "Starting the services..."
|
||||||
|
docker compose up -d --remove-orphans --pull never
|
||||||
|
|
||||||
|
Write-Host "Build complete. Services are starting."
|
||||||
|
Write-Host "Run 'docker compose logs -f' to see the logs."
|
||||||
|
}
|
||||||
|
default {
|
||||||
|
Write-Host "Invalid choice. Please enter 1 or 2."
|
||||||
|
exit 1
|
||||||
|
}
|
||||||
|
}
|
||||||
58
docker-build.sh
Normal file
58
docker-build.sh
Normal file
@@ -0,0 +1,58 @@
|
|||||||
|
#!/usr/bin/env bash
|
||||||
|
#
|
||||||
|
# build.sh - Linux/macOS Build Script
|
||||||
|
#
|
||||||
|
# This script automates the process of building and running the Docker container
|
||||||
|
# with version information dynamically injected at build time.
|
||||||
|
|
||||||
|
# Exit immediately if a command exits with a non-zero status.
|
||||||
|
set -euo pipefail
|
||||||
|
|
||||||
|
# --- Step 1: Choose Environment ---
|
||||||
|
echo "Please select an option:"
|
||||||
|
echo "1) Run using Pre-built Image (Recommended)"
|
||||||
|
echo "2) Build from Source and Run (For Developers)"
|
||||||
|
read -r -p "Enter choice [1-2]: " choice
|
||||||
|
|
||||||
|
# --- Step 2: Execute based on choice ---
|
||||||
|
case "$choice" in
|
||||||
|
1)
|
||||||
|
echo "--- Running with Pre-built Image ---"
|
||||||
|
docker compose up -d --remove-orphans --no-build
|
||||||
|
echo "Services are starting from remote image."
|
||||||
|
echo "Run 'docker compose logs -f' to see the logs."
|
||||||
|
;;
|
||||||
|
2)
|
||||||
|
echo "--- Building from Source and Running ---"
|
||||||
|
|
||||||
|
# Get Version Information
|
||||||
|
VERSION="$(git describe --tags --always --dirty)"
|
||||||
|
COMMIT="$(git rev-parse --short HEAD)"
|
||||||
|
BUILD_DATE="$(date -u +%Y-%m-%dT%H:%M:%SZ)"
|
||||||
|
|
||||||
|
echo "Building with the following info:"
|
||||||
|
echo " Version: ${VERSION}"
|
||||||
|
echo " Commit: ${COMMIT}"
|
||||||
|
echo " Build Date: ${BUILD_DATE}"
|
||||||
|
echo "----------------------------------------"
|
||||||
|
|
||||||
|
# Build and start the services with a local-only image tag
|
||||||
|
export CLI_PROXY_IMAGE="cli-proxy-api:local"
|
||||||
|
|
||||||
|
echo "Building the Docker image..."
|
||||||
|
docker compose build \
|
||||||
|
--build-arg VERSION="${VERSION}" \
|
||||||
|
--build-arg COMMIT="${COMMIT}" \
|
||||||
|
--build-arg BUILD_DATE="${BUILD_DATE}"
|
||||||
|
|
||||||
|
echo "Starting the services..."
|
||||||
|
docker compose up -d --remove-orphans --pull never
|
||||||
|
|
||||||
|
echo "Build complete. Services are starting."
|
||||||
|
echo "Run 'docker compose logs -f' to see the logs."
|
||||||
|
;;
|
||||||
|
*)
|
||||||
|
echo "Invalid choice. Please enter 1 or 2."
|
||||||
|
exit 1
|
||||||
|
;;
|
||||||
|
esac
|
||||||
@@ -1,9 +1,14 @@
|
|||||||
services:
|
services:
|
||||||
cli-proxy-api:
|
cli-proxy-api:
|
||||||
|
image: ${CLI_PROXY_IMAGE:-eceasy/cli-proxy-api:latest}
|
||||||
|
pull_policy: always
|
||||||
build:
|
build:
|
||||||
context: .
|
context: .
|
||||||
dockerfile: Dockerfile
|
dockerfile: Dockerfile
|
||||||
image: cli-proxy-api:latest
|
args:
|
||||||
|
VERSION: ${VERSION:-dev}
|
||||||
|
COMMIT: ${COMMIT:-none}
|
||||||
|
BUILD_DATE: ${BUILD_DATE:-unknown}
|
||||||
container_name: cli-proxy-api
|
container_name: cli-proxy-api
|
||||||
ports:
|
ports:
|
||||||
- "8317:8317"
|
- "8317:8317"
|
||||||
|
|||||||
@@ -8,6 +8,7 @@ import (
|
|||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
"github.com/gin-gonic/gin"
|
"github.com/gin-gonic/gin"
|
||||||
|
"github.com/tidwall/gjson"
|
||||||
)
|
)
|
||||||
|
|
||||||
// List auth files
|
// List auth files
|
||||||
@@ -27,7 +28,16 @@ func (h *Handler) ListAuthFiles(c *gin.Context) {
|
|||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
if info, errInfo := e.Info(); errInfo == nil {
|
if info, errInfo := e.Info(); errInfo == nil {
|
||||||
files = append(files, gin.H{"name": name, "size": info.Size(), "modtime": info.ModTime()})
|
fileData := gin.H{"name": name, "size": info.Size(), "modtime": info.ModTime()}
|
||||||
|
|
||||||
|
// Read file to get type field
|
||||||
|
full := filepath.Join(h.cfg.AuthDir, name)
|
||||||
|
if data, errRead := os.ReadFile(full); errRead == nil {
|
||||||
|
typeValue := gjson.GetBytes(data, "type").String()
|
||||||
|
fileData["type"] = typeValue
|
||||||
|
}
|
||||||
|
|
||||||
|
files = append(files, fileData)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
c.JSON(200, gin.H{"files": files})
|
c.JSON(200, gin.H{"files": files})
|
||||||
|
|||||||
@@ -4,6 +4,10 @@ import (
|
|||||||
"github.com/gin-gonic/gin"
|
"github.com/gin-gonic/gin"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
func (h *Handler) GetConfig(c *gin.Context) {
|
||||||
|
c.JSON(200, h.cfg)
|
||||||
|
}
|
||||||
|
|
||||||
// Debug
|
// Debug
|
||||||
func (h *Handler) GetDebug(c *gin.Context) { c.JSON(200, gin.H{"debug": h.cfg.Debug}) }
|
func (h *Handler) GetDebug(c *gin.Context) { c.JSON(200, gin.H{"debug": h.cfg.Debug}) }
|
||||||
func (h *Handler) PutDebug(c *gin.Context) { h.updateBoolField(c, func(v bool) { h.cfg.Debug = v }) }
|
func (h *Handler) PutDebug(c *gin.Context) { h.updateBoolField(c, func(v bool) { h.cfg.Debug = v }) }
|
||||||
|
|||||||
@@ -18,9 +18,11 @@ import (
|
|||||||
managementHandlers "github.com/luispater/CLIProxyAPI/internal/api/handlers/management"
|
managementHandlers "github.com/luispater/CLIProxyAPI/internal/api/handlers/management"
|
||||||
"github.com/luispater/CLIProxyAPI/internal/api/handlers/openai"
|
"github.com/luispater/CLIProxyAPI/internal/api/handlers/openai"
|
||||||
"github.com/luispater/CLIProxyAPI/internal/api/middleware"
|
"github.com/luispater/CLIProxyAPI/internal/api/middleware"
|
||||||
|
"github.com/luispater/CLIProxyAPI/internal/client"
|
||||||
"github.com/luispater/CLIProxyAPI/internal/config"
|
"github.com/luispater/CLIProxyAPI/internal/config"
|
||||||
"github.com/luispater/CLIProxyAPI/internal/interfaces"
|
"github.com/luispater/CLIProxyAPI/internal/interfaces"
|
||||||
"github.com/luispater/CLIProxyAPI/internal/logging"
|
"github.com/luispater/CLIProxyAPI/internal/logging"
|
||||||
|
"github.com/luispater/CLIProxyAPI/internal/util"
|
||||||
log "github.com/sirupsen/logrus"
|
log "github.com/sirupsen/logrus"
|
||||||
)
|
)
|
||||||
|
|
||||||
@@ -149,6 +151,8 @@ func (s *Server) setupRoutes() {
|
|||||||
mgmt := s.engine.Group("/v0/management")
|
mgmt := s.engine.Group("/v0/management")
|
||||||
mgmt.Use(s.mgmt.Middleware())
|
mgmt.Use(s.mgmt.Middleware())
|
||||||
{
|
{
|
||||||
|
mgmt.GET("/config", s.mgmt.GetConfig)
|
||||||
|
|
||||||
mgmt.GET("/debug", s.mgmt.GetDebug)
|
mgmt.GET("/debug", s.mgmt.GetDebug)
|
||||||
mgmt.PUT("/debug", s.mgmt.PutDebug)
|
mgmt.PUT("/debug", s.mgmt.PutDebug)
|
||||||
mgmt.PATCH("/debug", s.mgmt.PutDebug)
|
mgmt.PATCH("/debug", s.mgmt.PutDebug)
|
||||||
@@ -302,11 +306,7 @@ func (s *Server) UpdateClients(clients map[string]interfaces.Client, cfg *config
|
|||||||
|
|
||||||
// Update log level dynamically when debug flag changes
|
// Update log level dynamically when debug flag changes
|
||||||
if s.cfg.Debug != cfg.Debug {
|
if s.cfg.Debug != cfg.Debug {
|
||||||
if cfg.Debug {
|
util.SetLogLevel(cfg)
|
||||||
log.SetLevel(log.DebugLevel)
|
|
||||||
} else {
|
|
||||||
log.SetLevel(log.InfoLevel)
|
|
||||||
}
|
|
||||||
log.Debugf("debug mode updated from %t to %t", s.cfg.Debug, cfg.Debug)
|
log.Debugf("debug mode updated from %t to %t", s.cfg.Debug, cfg.Debug)
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -315,7 +315,47 @@ func (s *Server) UpdateClients(clients map[string]interfaces.Client, cfg *config
|
|||||||
if s.mgmt != nil {
|
if s.mgmt != nil {
|
||||||
s.mgmt.SetConfig(cfg)
|
s.mgmt.SetConfig(cfg)
|
||||||
}
|
}
|
||||||
log.Infof("server clients and configuration updated: %d clients", len(clientSlice))
|
|
||||||
|
// Count client types for detailed logging
|
||||||
|
authFiles := 0
|
||||||
|
glAPIKeyCount := 0
|
||||||
|
claudeAPIKeyCount := 0
|
||||||
|
codexAPIKeyCount := 0
|
||||||
|
openAICompatCount := 0
|
||||||
|
|
||||||
|
for _, c := range clientSlice {
|
||||||
|
switch cl := c.(type) {
|
||||||
|
case *client.GeminiCLIClient:
|
||||||
|
authFiles++
|
||||||
|
case *client.CodexClient:
|
||||||
|
if cl.GetAPIKey() == "" {
|
||||||
|
authFiles++
|
||||||
|
} else {
|
||||||
|
codexAPIKeyCount++
|
||||||
|
}
|
||||||
|
case *client.ClaudeClient:
|
||||||
|
if cl.GetAPIKey() == "" {
|
||||||
|
authFiles++
|
||||||
|
} else {
|
||||||
|
claudeAPIKeyCount++
|
||||||
|
}
|
||||||
|
case *client.QwenClient:
|
||||||
|
authFiles++
|
||||||
|
case *client.GeminiClient:
|
||||||
|
glAPIKeyCount++
|
||||||
|
case *client.OpenAICompatibilityClient:
|
||||||
|
openAICompatCount++
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Infof("server clients and configuration updated: %d clients (%d auth files + %d GL API keys + %d Claude API keys + %d Codex keys + %d OpenAI-compat)",
|
||||||
|
len(clientSlice),
|
||||||
|
authFiles,
|
||||||
|
glAPIKeyCount,
|
||||||
|
claudeAPIKeyCount,
|
||||||
|
codexAPIKeyCount,
|
||||||
|
openAICompatCount,
|
||||||
|
)
|
||||||
}
|
}
|
||||||
|
|
||||||
// (management handlers moved to internal/api/handlers/management)
|
// (management handlers moved to internal/api/handlers/management)
|
||||||
|
|||||||
@@ -18,6 +18,7 @@ import (
|
|||||||
"github.com/luispater/CLIProxyAPI/internal/auth/codex"
|
"github.com/luispater/CLIProxyAPI/internal/auth/codex"
|
||||||
"github.com/luispater/CLIProxyAPI/internal/browser"
|
"github.com/luispater/CLIProxyAPI/internal/browser"
|
||||||
"github.com/luispater/CLIProxyAPI/internal/config"
|
"github.com/luispater/CLIProxyAPI/internal/config"
|
||||||
|
"github.com/luispater/CLIProxyAPI/internal/util"
|
||||||
log "github.com/sirupsen/logrus"
|
log "github.com/sirupsen/logrus"
|
||||||
"github.com/tidwall/gjson"
|
"github.com/tidwall/gjson"
|
||||||
"golang.org/x/net/proxy"
|
"golang.org/x/net/proxy"
|
||||||
@@ -250,11 +251,13 @@ func (g *GeminiAuth) getTokenFromWeb(ctx context.Context, config *oauth2.Config,
|
|||||||
// Check if browser is available
|
// Check if browser is available
|
||||||
if !browser.IsAvailable() {
|
if !browser.IsAvailable() {
|
||||||
log.Warn("No browser available on this system")
|
log.Warn("No browser available on this system")
|
||||||
|
util.PrintSSHTunnelInstructions(8085)
|
||||||
log.Infof("Please manually open this URL in your browser:\n\n%s\n", authURL)
|
log.Infof("Please manually open this URL in your browser:\n\n%s\n", authURL)
|
||||||
} else {
|
} else {
|
||||||
if err := browser.OpenURL(authURL); err != nil {
|
if err := browser.OpenURL(authURL); err != nil {
|
||||||
authErr := codex.NewAuthenticationError(codex.ErrBrowserOpenFailed, err)
|
authErr := codex.NewAuthenticationError(codex.ErrBrowserOpenFailed, err)
|
||||||
log.Warn(codex.GetUserFriendlyMessage(authErr))
|
log.Warn(codex.GetUserFriendlyMessage(authErr))
|
||||||
|
util.PrintSSHTunnelInstructions(8085)
|
||||||
log.Infof("Please manually open this URL in your browser:\n\n%s\n", authURL)
|
log.Infof("Please manually open this URL in your browser:\n\n%s\n", authURL)
|
||||||
|
|
||||||
// Log platform info for debugging
|
// Log platform info for debugging
|
||||||
@@ -265,6 +268,7 @@ func (g *GeminiAuth) getTokenFromWeb(ctx context.Context, config *oauth2.Config,
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
|
util.PrintSSHTunnelInstructions(8085)
|
||||||
log.Infof("Please open this URL in your browser:\n\n%s\n", authURL)
|
log.Infof("Please open this URL in your browser:\n\n%s\n", authURL)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -21,7 +21,7 @@ import (
|
|||||||
// Returns:
|
// Returns:
|
||||||
// - An error if the URL cannot be opened, otherwise nil.
|
// - An error if the URL cannot be opened, otherwise nil.
|
||||||
func OpenURL(url string) error {
|
func OpenURL(url string) error {
|
||||||
log.Debugf("Attempting to open URL in browser: %s", url)
|
log.Infof("Attempting to open URL in browser: %s", url)
|
||||||
|
|
||||||
// Try using the open-golang library first
|
// Try using the open-golang library first
|
||||||
err := open.Run(url)
|
err := open.Run(url)
|
||||||
|
|||||||
@@ -417,6 +417,7 @@ func (c *GeminiCLIClient) SendRawTokenCount(ctx context.Context, modelName strin
|
|||||||
if newModelName != "" {
|
if newModelName != "" {
|
||||||
log.Debugf("Model %s is quota exceeded. Switch to preview model %s", modelName, newModelName)
|
log.Debugf("Model %s is quota exceeded. Switch to preview model %s", modelName, newModelName)
|
||||||
rawJSON, _ = sjson.SetBytes(rawJSON, "model", newModelName)
|
rawJSON, _ = sjson.SetBytes(rawJSON, "model", newModelName)
|
||||||
|
modelName = newModelName
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -15,6 +15,7 @@ import (
|
|||||||
"github.com/luispater/CLIProxyAPI/internal/browser"
|
"github.com/luispater/CLIProxyAPI/internal/browser"
|
||||||
"github.com/luispater/CLIProxyAPI/internal/client"
|
"github.com/luispater/CLIProxyAPI/internal/client"
|
||||||
"github.com/luispater/CLIProxyAPI/internal/config"
|
"github.com/luispater/CLIProxyAPI/internal/config"
|
||||||
|
"github.com/luispater/CLIProxyAPI/internal/util"
|
||||||
log "github.com/sirupsen/logrus"
|
log "github.com/sirupsen/logrus"
|
||||||
)
|
)
|
||||||
|
|
||||||
@@ -86,11 +87,13 @@ func DoClaudeLogin(cfg *config.Config, options *LoginOptions) {
|
|||||||
// Check if browser is available
|
// Check if browser is available
|
||||||
if !browser.IsAvailable() {
|
if !browser.IsAvailable() {
|
||||||
log.Warn("No browser available on this system")
|
log.Warn("No browser available on this system")
|
||||||
|
util.PrintSSHTunnelInstructions(54545)
|
||||||
log.Infof("Please manually open this URL in your browser:\n\n%s\n", authURL)
|
log.Infof("Please manually open this URL in your browser:\n\n%s\n", authURL)
|
||||||
} else {
|
} else {
|
||||||
if err = browser.OpenURL(authURL); err != nil {
|
if err = browser.OpenURL(authURL); err != nil {
|
||||||
authErr := claude.NewAuthenticationError(claude.ErrBrowserOpenFailed, err)
|
authErr := claude.NewAuthenticationError(claude.ErrBrowserOpenFailed, err)
|
||||||
log.Warn(claude.GetUserFriendlyMessage(authErr))
|
log.Warn(claude.GetUserFriendlyMessage(authErr))
|
||||||
|
util.PrintSSHTunnelInstructions(54545)
|
||||||
log.Infof("Please manually open this URL in your browser:\n\n%s\n", authURL)
|
log.Infof("Please manually open this URL in your browser:\n\n%s\n", authURL)
|
||||||
|
|
||||||
// Log platform info for debugging
|
// Log platform info for debugging
|
||||||
@@ -101,6 +104,7 @@ func DoClaudeLogin(cfg *config.Config, options *LoginOptions) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
|
util.PrintSSHTunnelInstructions(54545)
|
||||||
log.Infof("Please open this URL in your browser:\n\n%s\n", authURL)
|
log.Infof("Please open this URL in your browser:\n\n%s\n", authURL)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -17,6 +17,7 @@ import (
|
|||||||
"github.com/luispater/CLIProxyAPI/internal/browser"
|
"github.com/luispater/CLIProxyAPI/internal/browser"
|
||||||
"github.com/luispater/CLIProxyAPI/internal/client"
|
"github.com/luispater/CLIProxyAPI/internal/client"
|
||||||
"github.com/luispater/CLIProxyAPI/internal/config"
|
"github.com/luispater/CLIProxyAPI/internal/config"
|
||||||
|
"github.com/luispater/CLIProxyAPI/internal/util"
|
||||||
log "github.com/sirupsen/logrus"
|
log "github.com/sirupsen/logrus"
|
||||||
)
|
)
|
||||||
|
|
||||||
@@ -94,11 +95,13 @@ func DoCodexLogin(cfg *config.Config, options *LoginOptions) {
|
|||||||
// Check if browser is available
|
// Check if browser is available
|
||||||
if !browser.IsAvailable() {
|
if !browser.IsAvailable() {
|
||||||
log.Warn("No browser available on this system")
|
log.Warn("No browser available on this system")
|
||||||
|
util.PrintSSHTunnelInstructions(1455)
|
||||||
log.Infof("Please manually open this URL in your browser:\n\n%s\n", authURL)
|
log.Infof("Please manually open this URL in your browser:\n\n%s\n", authURL)
|
||||||
} else {
|
} else {
|
||||||
if err = browser.OpenURL(authURL); err != nil {
|
if err = browser.OpenURL(authURL); err != nil {
|
||||||
authErr := codex.NewAuthenticationError(codex.ErrBrowserOpenFailed, err)
|
authErr := codex.NewAuthenticationError(codex.ErrBrowserOpenFailed, err)
|
||||||
log.Warn(codex.GetUserFriendlyMessage(authErr))
|
log.Warn(codex.GetUserFriendlyMessage(authErr))
|
||||||
|
util.PrintSSHTunnelInstructions(1455)
|
||||||
log.Infof("Please manually open this URL in your browser:\n\n%s\n", authURL)
|
log.Infof("Please manually open this URL in your browser:\n\n%s\n", authURL)
|
||||||
|
|
||||||
// Log platform info for debugging
|
// Log platform info for debugging
|
||||||
@@ -109,6 +112,7 @@ func DoCodexLogin(cfg *config.Config, options *LoginOptions) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
|
util.PrintSSHTunnelInstructions(1455)
|
||||||
log.Infof("Please open this URL in your browser:\n\n%s\n", authURL)
|
log.Infof("Please open this URL in your browser:\n\n%s\n", authURL)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -50,6 +50,7 @@ import (
|
|||||||
func StartService(cfg *config.Config, configPath string) {
|
func StartService(cfg *config.Config, configPath string) {
|
||||||
// Create a pool of API clients, one for each token file found.
|
// Create a pool of API clients, one for each token file found.
|
||||||
cliClients := make(map[string]interfaces.Client)
|
cliClients := make(map[string]interfaces.Client)
|
||||||
|
successfulAuthCount := 0
|
||||||
err := filepath.Walk(cfg.AuthDir, func(path string, info fs.FileInfo, err error) error {
|
err := filepath.Walk(cfg.AuthDir, func(path string, info fs.FileInfo, err error) error {
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
@@ -89,6 +90,7 @@ func StartService(cfg *config.Config, configPath string) {
|
|||||||
// Add the new client to the pool.
|
// Add the new client to the pool.
|
||||||
cliClient := client.NewGeminiCLIClient(httpClient, &ts, cfg)
|
cliClient := client.NewGeminiCLIClient(httpClient, &ts, cfg)
|
||||||
cliClients[path] = cliClient
|
cliClients[path] = cliClient
|
||||||
|
successfulAuthCount++
|
||||||
}
|
}
|
||||||
} else if tokenType == "codex" {
|
} else if tokenType == "codex" {
|
||||||
var ts codex.CodexTokenStorage
|
var ts codex.CodexTokenStorage
|
||||||
@@ -103,6 +105,7 @@ func StartService(cfg *config.Config, configPath string) {
|
|||||||
}
|
}
|
||||||
log.Info("Authentication successful.")
|
log.Info("Authentication successful.")
|
||||||
cliClients[path] = codexClient
|
cliClients[path] = codexClient
|
||||||
|
successfulAuthCount++
|
||||||
}
|
}
|
||||||
} else if tokenType == "claude" {
|
} else if tokenType == "claude" {
|
||||||
var ts claude.ClaudeTokenStorage
|
var ts claude.ClaudeTokenStorage
|
||||||
@@ -112,6 +115,7 @@ func StartService(cfg *config.Config, configPath string) {
|
|||||||
claudeClient := client.NewClaudeClient(cfg, &ts)
|
claudeClient := client.NewClaudeClient(cfg, &ts)
|
||||||
log.Info("Authentication successful.")
|
log.Info("Authentication successful.")
|
||||||
cliClients[path] = claudeClient
|
cliClients[path] = claudeClient
|
||||||
|
successfulAuthCount++
|
||||||
}
|
}
|
||||||
} else if tokenType == "qwen" {
|
} else if tokenType == "qwen" {
|
||||||
var ts qwen.QwenTokenStorage
|
var ts qwen.QwenTokenStorage
|
||||||
@@ -121,6 +125,7 @@ func StartService(cfg *config.Config, configPath string) {
|
|||||||
qwenClient := client.NewQwenClient(cfg, &ts)
|
qwenClient := client.NewQwenClient(cfg, &ts)
|
||||||
log.Info("Authentication successful.")
|
log.Info("Authentication successful.")
|
||||||
cliClients[path] = qwenClient
|
cliClients[path] = qwenClient
|
||||||
|
successfulAuthCount++
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -130,51 +135,24 @@ func StartService(cfg *config.Config, configPath string) {
|
|||||||
log.Fatalf("Error walking auth directory: %v", err)
|
log.Fatalf("Error walking auth directory: %v", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
clientSlice := clientsToSlice(cliClients)
|
apiKeyClients, glAPIKeyCount, claudeAPIKeyCount, codexAPIKeyCount, openAICompatCount := buildAPIKeyClients(cfg)
|
||||||
|
|
||||||
if len(cfg.GlAPIKey) > 0 {
|
totalNewClients := len(cliClients) + len(apiKeyClients)
|
||||||
// Initialize clients with Generative Language API Keys if provided in configuration.
|
log.Infof("full client load complete - %d clients (%d auth files + %d GL API keys + %d Claude API keys + %d Codex keys + %d OpenAI-compat)",
|
||||||
for i := 0; i < len(cfg.GlAPIKey); i++ {
|
totalNewClients,
|
||||||
httpClient := util.SetProxy(cfg, &http.Client{})
|
successfulAuthCount,
|
||||||
|
glAPIKeyCount,
|
||||||
|
claudeAPIKeyCount,
|
||||||
|
codexAPIKeyCount,
|
||||||
|
openAICompatCount,
|
||||||
|
)
|
||||||
|
|
||||||
log.Debug("Initializing with Generative Language API Key...")
|
// Combine file-based and API key-based clients for the initial server setup
|
||||||
cliClient := client.NewGeminiClient(httpClient, cfg, cfg.GlAPIKey[i])
|
allClients := clientsToSlice(cliClients)
|
||||||
clientSlice = append(clientSlice, cliClient)
|
allClients = append(allClients, clientsToSlice(apiKeyClients)...)
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if len(cfg.ClaudeKey) > 0 {
|
|
||||||
// Initialize clients with Claude API Keys if provided in configuration.
|
|
||||||
for i := 0; i < len(cfg.ClaudeKey); i++ {
|
|
||||||
log.Debug("Initializing with Claude API Key...")
|
|
||||||
cliClient := client.NewClaudeClientWithKey(cfg, i)
|
|
||||||
clientSlice = append(clientSlice, cliClient)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if len(cfg.CodexKey) > 0 {
|
|
||||||
// Initialize clients with Codex API Keys if provided in configuration.
|
|
||||||
for i := 0; i < len(cfg.CodexKey); i++ {
|
|
||||||
log.Debug("Initializing with Codex API Key...")
|
|
||||||
cliClient := client.NewCodexClientWithKey(cfg, i)
|
|
||||||
clientSlice = append(clientSlice, cliClient)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if len(cfg.OpenAICompatibility) > 0 {
|
|
||||||
// Initialize clients for OpenAI compatibility configurations
|
|
||||||
for _, compatConfig := range cfg.OpenAICompatibility {
|
|
||||||
log.Debugf("Initializing OpenAI compatibility client for provider: %s", compatConfig.Name)
|
|
||||||
compatClient, errClient := client.NewOpenAICompatibilityClient(cfg, &compatConfig)
|
|
||||||
if errClient != nil {
|
|
||||||
log.Fatalf("failed to create OpenAI compatibility client for %s: %v", compatConfig.Name, errClient)
|
|
||||||
}
|
|
||||||
clientSlice = append(clientSlice, compatClient)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Create and start the API server with the pool of clients in a separate goroutine.
|
// Create and start the API server with the pool of clients in a separate goroutine.
|
||||||
apiServer := api.NewServer(cfg, clientSlice, configPath)
|
apiServer := api.NewServer(cfg, allClients, configPath)
|
||||||
log.Infof("Starting API server on port %d", cfg.Port)
|
log.Infof("Starting API server on port %d", cfg.Port)
|
||||||
|
|
||||||
// Start the API server in a goroutine so it doesn't block the main thread.
|
// Start the API server in a goroutine so it doesn't block the main thread.
|
||||||
@@ -200,6 +178,7 @@ func StartService(cfg *config.Config, configPath string) {
|
|||||||
// Set initial state for the watcher with current configuration and clients.
|
// Set initial state for the watcher with current configuration and clients.
|
||||||
fileWatcher.SetConfig(cfg)
|
fileWatcher.SetConfig(cfg)
|
||||||
fileWatcher.SetClients(cliClients)
|
fileWatcher.SetClients(cliClients)
|
||||||
|
fileWatcher.SetAPIKeyClients(apiKeyClients)
|
||||||
|
|
||||||
// Start the file watcher in a separate context.
|
// Start the file watcher in a separate context.
|
||||||
watcherCtx, watcherCancel := context.WithCancel(context.Background())
|
watcherCtx, watcherCancel := context.WithCancel(context.Background())
|
||||||
@@ -317,3 +296,55 @@ func clientsToSlice(clientMap map[string]interfaces.Client) []interfaces.Client
|
|||||||
}
|
}
|
||||||
return s
|
return s
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// buildAPIKeyClients creates clients from API keys in the config
|
||||||
|
func buildAPIKeyClients(cfg *config.Config) (map[string]interfaces.Client, int, int, int, int) {
|
||||||
|
apiKeyClients := make(map[string]interfaces.Client)
|
||||||
|
glAPIKeyCount := 0
|
||||||
|
claudeAPIKeyCount := 0
|
||||||
|
codexAPIKeyCount := 0
|
||||||
|
openAICompatCount := 0
|
||||||
|
|
||||||
|
if len(cfg.GlAPIKey) > 0 {
|
||||||
|
for _, key := range cfg.GlAPIKey {
|
||||||
|
httpClient := util.SetProxy(cfg, &http.Client{})
|
||||||
|
log.Debug("Initializing with Generative Language API Key...")
|
||||||
|
cliClient := client.NewGeminiClient(httpClient, cfg, key)
|
||||||
|
apiKeyClients[cliClient.GetClientID()] = cliClient
|
||||||
|
glAPIKeyCount++
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(cfg.ClaudeKey) > 0 {
|
||||||
|
for i := range cfg.ClaudeKey {
|
||||||
|
log.Debug("Initializing with Claude API Key...")
|
||||||
|
cliClient := client.NewClaudeClientWithKey(cfg, i)
|
||||||
|
apiKeyClients[cliClient.GetClientID()] = cliClient
|
||||||
|
claudeAPIKeyCount++
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(cfg.CodexKey) > 0 {
|
||||||
|
for i := range cfg.CodexKey {
|
||||||
|
log.Debug("Initializing with Codex API Key...")
|
||||||
|
cliClient := client.NewCodexClientWithKey(cfg, i)
|
||||||
|
apiKeyClients[cliClient.GetClientID()] = cliClient
|
||||||
|
codexAPIKeyCount++
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(cfg.OpenAICompatibility) > 0 {
|
||||||
|
for _, compatConfig := range cfg.OpenAICompatibility {
|
||||||
|
log.Debugf("Initializing OpenAI compatibility client for provider: %s", compatConfig.Name)
|
||||||
|
compatClient, errClient := client.NewOpenAICompatibilityClient(cfg, &compatConfig)
|
||||||
|
if errClient != nil {
|
||||||
|
log.Errorf("failed to create OpenAI compatibility client for %s: %v", compatConfig.Name, errClient)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
apiKeyClients[compatClient.GetClientID()] = compatClient
|
||||||
|
openAICompatCount++
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return apiKeyClients, glAPIKeyCount, claudeAPIKeyCount, codexAPIKeyCount, openAICompatCount
|
||||||
|
}
|
||||||
|
|||||||
@@ -15,46 +15,46 @@ import (
|
|||||||
// Config represents the application's configuration, loaded from a YAML file.
|
// Config represents the application's configuration, loaded from a YAML file.
|
||||||
type Config struct {
|
type Config struct {
|
||||||
// Port is the network port on which the API server will listen.
|
// Port is the network port on which the API server will listen.
|
||||||
Port int `yaml:"port"`
|
Port int `yaml:"port" json:"-"`
|
||||||
|
|
||||||
// AuthDir is the directory where authentication token files are stored.
|
// AuthDir is the directory where authentication token files are stored.
|
||||||
AuthDir string `yaml:"auth-dir"`
|
AuthDir string `yaml:"auth-dir" json:"-"`
|
||||||
|
|
||||||
// Debug enables or disables debug-level logging and other debug features.
|
// Debug enables or disables debug-level logging and other debug features.
|
||||||
Debug bool `yaml:"debug"`
|
Debug bool `yaml:"debug" json:"debug"`
|
||||||
|
|
||||||
// ProxyURL is the URL of an optional proxy server to use for outbound requests.
|
// ProxyURL is the URL of an optional proxy server to use for outbound requests.
|
||||||
ProxyURL string `yaml:"proxy-url"`
|
ProxyURL string `yaml:"proxy-url" json:"proxy-url"`
|
||||||
|
|
||||||
// APIKeys is a list of keys for authenticating clients to this proxy server.
|
// APIKeys is a list of keys for authenticating clients to this proxy server.
|
||||||
APIKeys []string `yaml:"api-keys"`
|
APIKeys []string `yaml:"api-keys" json:"api-keys"`
|
||||||
|
|
||||||
// QuotaExceeded defines the behavior when a quota is exceeded.
|
// QuotaExceeded defines the behavior when a quota is exceeded.
|
||||||
QuotaExceeded QuotaExceeded `yaml:"quota-exceeded"`
|
QuotaExceeded QuotaExceeded `yaml:"quota-exceeded" json:"quota-exceeded"`
|
||||||
|
|
||||||
// GlAPIKey is the API key for the generative language API.
|
// GlAPIKey is the API key for the generative language API.
|
||||||
GlAPIKey []string `yaml:"generative-language-api-key"`
|
GlAPIKey []string `yaml:"generative-language-api-key" json:"generative-language-api-key"`
|
||||||
|
|
||||||
// RequestLog enables or disables detailed request logging functionality.
|
// RequestLog enables or disables detailed request logging functionality.
|
||||||
RequestLog bool `yaml:"request-log"`
|
RequestLog bool `yaml:"request-log" json:"request-log"`
|
||||||
|
|
||||||
// RequestRetry defines the retry times when the request failed.
|
// RequestRetry defines the retry times when the request failed.
|
||||||
RequestRetry int `yaml:"request-retry"`
|
RequestRetry int `yaml:"request-retry" json:"request-retry"`
|
||||||
|
|
||||||
// ClaudeKey defines a list of Claude API key configurations as specified in the YAML configuration file.
|
// ClaudeKey defines a list of Claude API key configurations as specified in the YAML configuration file.
|
||||||
ClaudeKey []ClaudeKey `yaml:"claude-api-key"`
|
ClaudeKey []ClaudeKey `yaml:"claude-api-key" json:"claude-api-key"`
|
||||||
|
|
||||||
// Codex defines a list of Codex API key configurations as specified in the YAML configuration file.
|
// Codex defines a list of Codex API key configurations as specified in the YAML configuration file.
|
||||||
CodexKey []CodexKey `yaml:"codex-api-key"`
|
CodexKey []CodexKey `yaml:"codex-api-key" json:"codex-api-key"`
|
||||||
|
|
||||||
// OpenAICompatibility defines OpenAI API compatibility configurations for external providers.
|
// OpenAICompatibility defines OpenAI API compatibility configurations for external providers.
|
||||||
OpenAICompatibility []OpenAICompatibility `yaml:"openai-compatibility"`
|
OpenAICompatibility []OpenAICompatibility `yaml:"openai-compatibility" json:"openai-compatibility"`
|
||||||
|
|
||||||
// AllowLocalhostUnauthenticated allows unauthenticated requests from localhost.
|
// AllowLocalhostUnauthenticated allows unauthenticated requests from localhost.
|
||||||
AllowLocalhostUnauthenticated bool `yaml:"allow-localhost-unauthenticated"`
|
AllowLocalhostUnauthenticated bool `yaml:"allow-localhost-unauthenticated" json:"allow-localhost-unauthenticated"`
|
||||||
|
|
||||||
// RemoteManagement nests management-related options under 'remote-management'.
|
// RemoteManagement nests management-related options under 'remote-management'.
|
||||||
RemoteManagement RemoteManagement `yaml:"remote-management"`
|
RemoteManagement RemoteManagement `yaml:"remote-management" json:"-"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// RemoteManagement holds management API configuration under 'remote-management'.
|
// RemoteManagement holds management API configuration under 'remote-management'.
|
||||||
@@ -69,58 +69,58 @@ type RemoteManagement struct {
|
|||||||
// It provides configuration options for automatic failover mechanisms.
|
// It provides configuration options for automatic failover mechanisms.
|
||||||
type QuotaExceeded struct {
|
type QuotaExceeded struct {
|
||||||
// SwitchProject indicates whether to automatically switch to another project when a quota is exceeded.
|
// SwitchProject indicates whether to automatically switch to another project when a quota is exceeded.
|
||||||
SwitchProject bool `yaml:"switch-project"`
|
SwitchProject bool `yaml:"switch-project" json:"switch-project"`
|
||||||
|
|
||||||
// SwitchPreviewModel indicates whether to automatically switch to a preview model when a quota is exceeded.
|
// SwitchPreviewModel indicates whether to automatically switch to a preview model when a quota is exceeded.
|
||||||
SwitchPreviewModel bool `yaml:"switch-preview-model"`
|
SwitchPreviewModel bool `yaml:"switch-preview-model" json:"switch-preview-model"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// ClaudeKey represents the configuration for a Claude API key,
|
// ClaudeKey represents the configuration for a Claude API key,
|
||||||
// including the API key itself and an optional base URL for the API endpoint.
|
// including the API key itself and an optional base URL for the API endpoint.
|
||||||
type ClaudeKey struct {
|
type ClaudeKey struct {
|
||||||
// APIKey is the authentication key for accessing Claude API services.
|
// APIKey is the authentication key for accessing Claude API services.
|
||||||
APIKey string `yaml:"api-key"`
|
APIKey string `yaml:"api-key" json:"api-key"`
|
||||||
|
|
||||||
// BaseURL is the base URL for the Claude API endpoint.
|
// BaseURL is the base URL for the Claude API endpoint.
|
||||||
// If empty, the default Claude API URL will be used.
|
// If empty, the default Claude API URL will be used.
|
||||||
BaseURL string `yaml:"base-url"`
|
BaseURL string `yaml:"base-url" json:"base-url"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// CodexKey represents the configuration for a Codex API key,
|
// CodexKey represents the configuration for a Codex API key,
|
||||||
// including the API key itself and an optional base URL for the API endpoint.
|
// including the API key itself and an optional base URL for the API endpoint.
|
||||||
type CodexKey struct {
|
type CodexKey struct {
|
||||||
// APIKey is the authentication key for accessing Codex API services.
|
// APIKey is the authentication key for accessing Codex API services.
|
||||||
APIKey string `yaml:"api-key"`
|
APIKey string `yaml:"api-key" json:"api-key"`
|
||||||
|
|
||||||
// BaseURL is the base URL for the Codex API endpoint.
|
// BaseURL is the base URL for the Codex API endpoint.
|
||||||
// If empty, the default Codex API URL will be used.
|
// If empty, the default Codex API URL will be used.
|
||||||
BaseURL string `yaml:"base-url"`
|
BaseURL string `yaml:"base-url" json:"base-url"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// OpenAICompatibility represents the configuration for OpenAI API compatibility
|
// OpenAICompatibility represents the configuration for OpenAI API compatibility
|
||||||
// with external providers, allowing model aliases to be routed through OpenAI API format.
|
// with external providers, allowing model aliases to be routed through OpenAI API format.
|
||||||
type OpenAICompatibility struct {
|
type OpenAICompatibility struct {
|
||||||
// Name is the identifier for this OpenAI compatibility configuration.
|
// Name is the identifier for this OpenAI compatibility configuration.
|
||||||
Name string `yaml:"name"`
|
Name string `yaml:"name" json:"name"`
|
||||||
|
|
||||||
// BaseURL is the base URL for the external OpenAI-compatible API endpoint.
|
// BaseURL is the base URL for the external OpenAI-compatible API endpoint.
|
||||||
BaseURL string `yaml:"base-url"`
|
BaseURL string `yaml:"base-url" json:"base-url"`
|
||||||
|
|
||||||
// APIKeys are the authentication keys for accessing the external API services.
|
// APIKeys are the authentication keys for accessing the external API services.
|
||||||
APIKeys []string `yaml:"api-keys"`
|
APIKeys []string `yaml:"api-keys" json:"api-keys"`
|
||||||
|
|
||||||
// Models defines the model configurations including aliases for routing.
|
// Models defines the model configurations including aliases for routing.
|
||||||
Models []OpenAICompatibilityModel `yaml:"models"`
|
Models []OpenAICompatibilityModel `yaml:"models" json:"models"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// OpenAICompatibilityModel represents a model configuration for OpenAI compatibility,
|
// OpenAICompatibilityModel represents a model configuration for OpenAI compatibility,
|
||||||
// including the actual model name and its alias for API routing.
|
// including the actual model name and its alias for API routing.
|
||||||
type OpenAICompatibilityModel struct {
|
type OpenAICompatibilityModel struct {
|
||||||
// Name is the actual model name used by the external provider.
|
// Name is the actual model name used by the external provider.
|
||||||
Name string `yaml:"name"`
|
Name string `yaml:"name" json:"name"`
|
||||||
|
|
||||||
// Alias is the model name alias that clients will use to reference this model.
|
// Alias is the model name alias that clients will use to reference this model.
|
||||||
Alias string `yaml:"alias"`
|
Alias string `yaml:"alias" json:"alias"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// LoadConfig reads a YAML configuration file from the given path,
|
// LoadConfig reads a YAML configuration file from the given path,
|
||||||
|
|||||||
@@ -21,9 +21,10 @@ var (
|
|||||||
|
|
||||||
// ConvertCliToOpenAIParams holds parameters for response conversion.
|
// ConvertCliToOpenAIParams holds parameters for response conversion.
|
||||||
type ConvertCliToOpenAIParams struct {
|
type ConvertCliToOpenAIParams struct {
|
||||||
ResponseID string
|
ResponseID string
|
||||||
CreatedAt int64
|
CreatedAt int64
|
||||||
Model string
|
Model string
|
||||||
|
FunctionCallIndex int
|
||||||
}
|
}
|
||||||
|
|
||||||
// ConvertCodexResponseToOpenAI translates a single chunk of a streaming response from the
|
// ConvertCodexResponseToOpenAI translates a single chunk of a streaming response from the
|
||||||
@@ -43,9 +44,10 @@ type ConvertCliToOpenAIParams struct {
|
|||||||
func ConvertCodexResponseToOpenAI(_ context.Context, modelName string, originalRequestRawJSON, requestRawJSON, rawJSON []byte, param *any) []string {
|
func ConvertCodexResponseToOpenAI(_ context.Context, modelName string, originalRequestRawJSON, requestRawJSON, rawJSON []byte, param *any) []string {
|
||||||
if *param == nil {
|
if *param == nil {
|
||||||
*param = &ConvertCliToOpenAIParams{
|
*param = &ConvertCliToOpenAIParams{
|
||||||
Model: modelName,
|
Model: modelName,
|
||||||
CreatedAt: 0,
|
CreatedAt: 0,
|
||||||
ResponseID: "",
|
ResponseID: "",
|
||||||
|
FunctionCallIndex: -1,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -108,27 +110,36 @@ func ConvertCodexResponseToOpenAI(_ context.Context, modelName string, originalR
|
|||||||
template, _ = sjson.Set(template, "choices.0.delta.content", deltaResult.String())
|
template, _ = sjson.Set(template, "choices.0.delta.content", deltaResult.String())
|
||||||
}
|
}
|
||||||
} else if dataType == "response.completed" {
|
} else if dataType == "response.completed" {
|
||||||
template, _ = sjson.Set(template, "choices.0.finish_reason", "stop")
|
finishReason := "stop"
|
||||||
template, _ = sjson.Set(template, "choices.0.native_finish_reason", "stop")
|
if (*param).(*ConvertCliToOpenAIParams).FunctionCallIndex != -1 {
|
||||||
|
finishReason = "tool_calls"
|
||||||
|
}
|
||||||
|
template, _ = sjson.Set(template, "choices.0.finish_reason", finishReason)
|
||||||
|
template, _ = sjson.Set(template, "choices.0.native_finish_reason", finishReason)
|
||||||
} else if dataType == "response.output_item.done" {
|
} else if dataType == "response.output_item.done" {
|
||||||
functionCallItemTemplate := `{"id": "","type": "function","function": {"name": "","arguments": ""}}`
|
functionCallItemTemplate := `{"index":0,"id":"","type":"function","function":{"name":"","arguments":""}}`
|
||||||
itemResult := rootResult.Get("item")
|
itemResult := rootResult.Get("item")
|
||||||
if itemResult.Exists() {
|
if itemResult.Exists() {
|
||||||
if itemResult.Get("type").String() != "function_call" {
|
if itemResult.Get("type").String() != "function_call" {
|
||||||
return []string{}
|
return []string{}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// set the index
|
||||||
|
(*param).(*ConvertCliToOpenAIParams).FunctionCallIndex++
|
||||||
|
functionCallItemTemplate, _ = sjson.Set(functionCallItemTemplate, "index", (*param).(*ConvertCliToOpenAIParams).FunctionCallIndex)
|
||||||
|
|
||||||
template, _ = sjson.SetRaw(template, "choices.0.delta.tool_calls", `[]`)
|
template, _ = sjson.SetRaw(template, "choices.0.delta.tool_calls", `[]`)
|
||||||
functionCallItemTemplate, _ = sjson.Set(functionCallItemTemplate, "id", itemResult.Get("call_id").String())
|
functionCallItemTemplate, _ = sjson.Set(functionCallItemTemplate, "id", itemResult.Get("call_id").String())
|
||||||
{
|
|
||||||
// Restore original tool name if it was shortened
|
// Restore original tool name if it was shortened
|
||||||
name := itemResult.Get("name").String()
|
name := itemResult.Get("name").String()
|
||||||
// Build reverse map on demand from original request tools
|
// Build reverse map on demand from original request tools
|
||||||
rev := buildReverseMapFromOriginalOpenAI(originalRequestRawJSON)
|
rev := buildReverseMapFromOriginalOpenAI(originalRequestRawJSON)
|
||||||
if orig, ok := rev[name]; ok {
|
if orig, ok := rev[name]; ok {
|
||||||
name = orig
|
name = orig
|
||||||
}
|
|
||||||
functionCallItemTemplate, _ = sjson.Set(functionCallItemTemplate, "function.name", name)
|
|
||||||
}
|
}
|
||||||
|
functionCallItemTemplate, _ = sjson.Set(functionCallItemTemplate, "function.name", name)
|
||||||
|
|
||||||
functionCallItemTemplate, _ = sjson.Set(functionCallItemTemplate, "function.arguments", itemResult.Get("arguments").String())
|
functionCallItemTemplate, _ = sjson.Set(functionCallItemTemplate, "function.arguments", itemResult.Get("arguments").String())
|
||||||
template, _ = sjson.Set(template, "choices.0.delta.role", "assistant")
|
template, _ = sjson.Set(template, "choices.0.delta.role", "assistant")
|
||||||
template, _ = sjson.SetRaw(template, "choices.0.delta.tool_calls.-1", functionCallItemTemplate)
|
template, _ = sjson.SetRaw(template, "choices.0.delta.tool_calls.-1", functionCallItemTemplate)
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
// Package util provides utility functions for the CLI Proxy API server.
|
// Package util provides utility functions for the CLI Proxy API server.
|
||||||
// It includes helper functions for proxy configuration, HTTP client setup,
|
// It includes helper functions for proxy configuration, HTTP client setup,
|
||||||
// and other common operations used across the application.
|
// log level management, and other common operations used across the application.
|
||||||
package util
|
package util
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
|||||||
135
internal/util/ssh_helper.go
Normal file
135
internal/util/ssh_helper.go
Normal file
@@ -0,0 +1,135 @@
|
|||||||
|
// Package util provides helper functions for SSH tunnel instructions and network-related tasks.
|
||||||
|
// This includes detecting the appropriate IP address and printing commands
|
||||||
|
// to help users connect to the local server from a remote machine.
|
||||||
|
package util
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"net"
|
||||||
|
"net/http"
|
||||||
|
"strings"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
log "github.com/sirupsen/logrus"
|
||||||
|
)
|
||||||
|
|
||||||
|
var ipServices = []string{
|
||||||
|
"https://api.ipify.org",
|
||||||
|
"https://ifconfig.me/ip",
|
||||||
|
"https://icanhazip.com",
|
||||||
|
"https://ipinfo.io/ip",
|
||||||
|
}
|
||||||
|
|
||||||
|
// getPublicIP attempts to retrieve the public IP address from a list of external services.
|
||||||
|
// It iterates through the ipServices and returns the first successful response.
|
||||||
|
//
|
||||||
|
// Returns:
|
||||||
|
// - string: The public IP address as a string
|
||||||
|
// - error: An error if all services fail, nil otherwise
|
||||||
|
func getPublicIP() (string, error) {
|
||||||
|
for _, service := range ipServices {
|
||||||
|
ctx, cancel := context.WithTimeout(context.Background(), 2*time.Second)
|
||||||
|
defer cancel()
|
||||||
|
req, err := http.NewRequestWithContext(ctx, "GET", service, nil)
|
||||||
|
if err != nil {
|
||||||
|
log.Debugf("Failed to create request to %s: %v", service, err)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
resp, err := http.DefaultClient.Do(req)
|
||||||
|
if err != nil {
|
||||||
|
log.Debugf("Failed to get public IP from %s: %v", service, err)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
defer func() {
|
||||||
|
if closeErr := resp.Body.Close(); closeErr != nil {
|
||||||
|
log.Warnf("Failed to close response body from %s: %v", service, closeErr)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
if resp.StatusCode != http.StatusOK {
|
||||||
|
log.Debugf("bad status code from %s: %d", service, resp.StatusCode)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
ip, err := io.ReadAll(resp.Body)
|
||||||
|
if err != nil {
|
||||||
|
log.Debugf("Failed to read response body from %s: %v", service, err)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
return strings.TrimSpace(string(ip)), nil
|
||||||
|
}
|
||||||
|
return "", fmt.Errorf("all IP services failed")
|
||||||
|
}
|
||||||
|
|
||||||
|
// getOutboundIP retrieves the preferred outbound IP address of this machine.
|
||||||
|
// It uses a UDP connection to a public DNS server to determine the local IP
|
||||||
|
// address that would be used for outbound traffic.
|
||||||
|
//
|
||||||
|
// Returns:
|
||||||
|
// - string: The outbound IP address as a string
|
||||||
|
// - error: An error if the IP address cannot be determined, nil otherwise
|
||||||
|
func getOutboundIP() (string, error) {
|
||||||
|
conn, err := net.Dial("udp", "8.8.8.8:80")
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
defer func() {
|
||||||
|
if closeErr := conn.Close(); closeErr != nil {
|
||||||
|
log.Warnf("Failed to close UDP connection: %v", closeErr)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
localAddr, ok := conn.LocalAddr().(*net.UDPAddr)
|
||||||
|
if !ok {
|
||||||
|
return "", fmt.Errorf("could not assert UDP address type")
|
||||||
|
}
|
||||||
|
|
||||||
|
return localAddr.IP.String(), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetIPAddress attempts to find the best-available IP address.
|
||||||
|
// It first tries to get the public IP address, and if that fails,
|
||||||
|
// it falls back to getting the local outbound IP address.
|
||||||
|
//
|
||||||
|
// Returns:
|
||||||
|
// - string: The determined IP address (preferring public IPv4)
|
||||||
|
func GetIPAddress() string {
|
||||||
|
publicIP, err := getPublicIP()
|
||||||
|
if err == nil {
|
||||||
|
log.Debugf("Public IP detected: %s", publicIP)
|
||||||
|
return publicIP
|
||||||
|
}
|
||||||
|
log.Warnf("Failed to get public IP, falling back to outbound IP: %v", err)
|
||||||
|
outboundIP, err := getOutboundIP()
|
||||||
|
if err == nil {
|
||||||
|
log.Debugf("Outbound IP detected: %s", outboundIP)
|
||||||
|
return outboundIP
|
||||||
|
}
|
||||||
|
log.Errorf("Failed to get any IP address: %v", err)
|
||||||
|
return "127.0.0.1" // Fallback
|
||||||
|
}
|
||||||
|
|
||||||
|
// PrintSSHTunnelInstructions detects the IP address and prints SSH tunnel instructions
|
||||||
|
// for the user to connect to the local OAuth callback server from a remote machine.
|
||||||
|
//
|
||||||
|
// Parameters:
|
||||||
|
// - port: The local port number for the SSH tunnel
|
||||||
|
func PrintSSHTunnelInstructions(port int) {
|
||||||
|
ipAddress := GetIPAddress()
|
||||||
|
border := "================================================================================"
|
||||||
|
log.Infof("To authenticate from a remote machine, an SSH tunnel may be required.")
|
||||||
|
fmt.Println(border)
|
||||||
|
fmt.Println(" Run one of the following commands on your local machine (NOT the server):")
|
||||||
|
fmt.Println()
|
||||||
|
fmt.Printf(" # Standard SSH command (assumes SSH port 22):\n")
|
||||||
|
fmt.Printf(" ssh -L %d:127.0.0.1:%d root@%s -p 22\n", port, port, ipAddress)
|
||||||
|
fmt.Println()
|
||||||
|
fmt.Printf(" # If using an SSH key (assumes SSH port 22):\n")
|
||||||
|
fmt.Printf(" ssh -i <path_to_your_key> -L %d:127.0.0.1:%d root@%s -p 22\n", port, port, ipAddress)
|
||||||
|
fmt.Println()
|
||||||
|
fmt.Println(" NOTE: If your server's SSH port is not 22, please modify the '-p 22' part accordingly.")
|
||||||
|
fmt.Println(border)
|
||||||
|
}
|
||||||
23
internal/util/util.go
Normal file
23
internal/util/util.go
Normal file
@@ -0,0 +1,23 @@
|
|||||||
|
package util
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/luispater/CLIProxyAPI/internal/config"
|
||||||
|
log "github.com/sirupsen/logrus"
|
||||||
|
)
|
||||||
|
|
||||||
|
// SetLogLevel configures the logrus log level based on the configuration.
|
||||||
|
// It sets the log level to DebugLevel if debug mode is enabled, otherwise to InfoLevel.
|
||||||
|
func SetLogLevel(cfg *config.Config) {
|
||||||
|
currentLevel := log.GetLevel()
|
||||||
|
var newLevel log.Level
|
||||||
|
if cfg.Debug {
|
||||||
|
newLevel = log.DebugLevel
|
||||||
|
} else {
|
||||||
|
newLevel = log.InfoLevel
|
||||||
|
}
|
||||||
|
|
||||||
|
if currentLevel != newLevel {
|
||||||
|
log.SetLevel(newLevel)
|
||||||
|
log.Infof("log level changed from %s to %s (debug=%t)", currentLevel, newLevel, cfg.Debug)
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -6,12 +6,12 @@ package watcher
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
|
"crypto/sha256"
|
||||||
|
"encoding/hex"
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
"fmt"
|
|
||||||
"io/fs"
|
"io/fs"
|
||||||
"net/http"
|
"net/http"
|
||||||
"os"
|
"os"
|
||||||
"path"
|
|
||||||
"path/filepath"
|
"path/filepath"
|
||||||
"strings"
|
"strings"
|
||||||
"sync"
|
"sync"
|
||||||
@@ -36,11 +36,11 @@ type Watcher struct {
|
|||||||
authDir string
|
authDir string
|
||||||
config *config.Config
|
config *config.Config
|
||||||
clients map[string]interfaces.Client
|
clients map[string]interfaces.Client
|
||||||
|
apiKeyClients map[string]interfaces.Client // New field for caching API key clients
|
||||||
clientsMutex sync.RWMutex
|
clientsMutex sync.RWMutex
|
||||||
reloadCallback func(map[string]interfaces.Client, *config.Config)
|
reloadCallback func(map[string]interfaces.Client, *config.Config)
|
||||||
watcher *fsnotify.Watcher
|
watcher *fsnotify.Watcher
|
||||||
eventTimes map[string]time.Time
|
lastAuthHashes map[string]string
|
||||||
eventMutex sync.Mutex
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// NewWatcher creates a new file watcher instance
|
// NewWatcher creates a new file watcher instance
|
||||||
@@ -56,7 +56,8 @@ func NewWatcher(configPath, authDir string, reloadCallback func(map[string]inter
|
|||||||
reloadCallback: reloadCallback,
|
reloadCallback: reloadCallback,
|
||||||
watcher: watcher,
|
watcher: watcher,
|
||||||
clients: make(map[string]interfaces.Client),
|
clients: make(map[string]interfaces.Client),
|
||||||
eventTimes: make(map[string]time.Time),
|
apiKeyClients: make(map[string]interfaces.Client),
|
||||||
|
lastAuthHashes: make(map[string]string),
|
||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -94,13 +95,20 @@ func (w *Watcher) SetConfig(cfg *config.Config) {
|
|||||||
w.config = cfg
|
w.config = cfg
|
||||||
}
|
}
|
||||||
|
|
||||||
// SetClients updates the current client list
|
// SetClients sets the file-based clients.
|
||||||
func (w *Watcher) SetClients(clients map[string]interfaces.Client) {
|
func (w *Watcher) SetClients(clients map[string]interfaces.Client) {
|
||||||
w.clientsMutex.Lock()
|
w.clientsMutex.Lock()
|
||||||
defer w.clientsMutex.Unlock()
|
defer w.clientsMutex.Unlock()
|
||||||
w.clients = clients
|
w.clients = clients
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// SetAPIKeyClients sets the API key-based clients.
|
||||||
|
func (w *Watcher) SetAPIKeyClients(apiKeyClients map[string]interfaces.Client) {
|
||||||
|
w.clientsMutex.Lock()
|
||||||
|
defer w.clientsMutex.Unlock()
|
||||||
|
w.apiKeyClients = apiKeyClients
|
||||||
|
}
|
||||||
|
|
||||||
// processEvents handles file system events
|
// processEvents handles file system events
|
||||||
func (w *Watcher) processEvents(ctx context.Context) {
|
func (w *Watcher) processEvents(ctx context.Context) {
|
||||||
for {
|
for {
|
||||||
@@ -126,16 +134,6 @@ func (w *Watcher) handleEvent(event fsnotify.Event) {
|
|||||||
now := time.Now()
|
now := time.Now()
|
||||||
log.Debugf("file system event detected: %s %s", event.Op.String(), event.Name)
|
log.Debugf("file system event detected: %s %s", event.Op.String(), event.Name)
|
||||||
|
|
||||||
// Debounce logic to prevent rapid reloads
|
|
||||||
w.eventMutex.Lock()
|
|
||||||
if lastTime, ok := w.eventTimes[event.Name]; ok && now.Sub(lastTime) < 500*time.Millisecond {
|
|
||||||
log.Debugf("debouncing event for %s", event.Name)
|
|
||||||
w.eventMutex.Unlock()
|
|
||||||
return
|
|
||||||
}
|
|
||||||
w.eventTimes[event.Name] = now
|
|
||||||
w.eventMutex.Unlock()
|
|
||||||
|
|
||||||
// Handle config file changes
|
// Handle config file changes
|
||||||
if event.Name == w.configPath && (event.Op&fsnotify.Write == fsnotify.Write || event.Op&fsnotify.Create == fsnotify.Create) {
|
if event.Name == w.configPath && (event.Op&fsnotify.Write == fsnotify.Write || event.Op&fsnotify.Create == fsnotify.Create) {
|
||||||
log.Infof("config file changed, reloading: %s", w.configPath)
|
log.Infof("config file changed, reloading: %s", w.configPath)
|
||||||
@@ -170,6 +168,14 @@ func (w *Watcher) reloadConfig() {
|
|||||||
w.config = newConfig
|
w.config = newConfig
|
||||||
w.clientsMutex.Unlock()
|
w.clientsMutex.Unlock()
|
||||||
|
|
||||||
|
// Always apply the current log level based on the latest config.
|
||||||
|
// This ensures logrus reflects the desired level even if change detection misses.
|
||||||
|
util.SetLogLevel(newConfig)
|
||||||
|
// Additional debug for visibility when the flag actually changes.
|
||||||
|
if oldConfig != nil && oldConfig.Debug != newConfig.Debug {
|
||||||
|
log.Debugf("log level updated - debug mode changed from %t to %t", oldConfig.Debug, newConfig.Debug)
|
||||||
|
}
|
||||||
|
|
||||||
// Log configuration changes in debug mode
|
// Log configuration changes in debug mode
|
||||||
if oldConfig != nil {
|
if oldConfig != nil {
|
||||||
log.Debugf("config changes detected:")
|
log.Debugf("config changes detected:")
|
||||||
@@ -216,14 +222,14 @@ func (w *Watcher) reloadConfig() {
|
|||||||
w.reloadClients()
|
w.reloadClients()
|
||||||
}
|
}
|
||||||
|
|
||||||
// reloadClients performs a full scan of the auth directory and reloads all clients.
|
// reloadClients performs a full scan and reload of all clients.
|
||||||
// This is used for initial startup and for handling config file reloads.
|
|
||||||
func (w *Watcher) reloadClients() {
|
func (w *Watcher) reloadClients() {
|
||||||
log.Debugf("starting full client reload process")
|
log.Debugf("starting full client reload process")
|
||||||
|
|
||||||
w.clientsMutex.RLock()
|
w.clientsMutex.RLock()
|
||||||
cfg := w.config
|
cfg := w.config
|
||||||
oldClientCount := len(w.clients)
|
oldFileClientCount := len(w.clients)
|
||||||
|
oldAPIKeyClientCount := len(w.apiKeyClients)
|
||||||
w.clientsMutex.RUnlock()
|
w.clientsMutex.RUnlock()
|
||||||
|
|
||||||
if cfg == nil {
|
if cfg == nil {
|
||||||
@@ -231,127 +237,50 @@ func (w *Watcher) reloadClients() {
|
|||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debugf("scanning auth directory for initial load or full reload: %s", cfg.AuthDir)
|
// Unregister all old API key clients before creating new ones
|
||||||
|
log.Debugf("unregistering %d old API key clients", oldAPIKeyClientCount)
|
||||||
// Create new client map
|
for _, oldClient := range w.apiKeyClients {
|
||||||
newClients := make(map[string]interfaces.Client)
|
if u, ok := oldClient.(interface{ UnregisterClient() }); ok {
|
||||||
authFileCount := 0
|
u.UnregisterClient()
|
||||||
successfulAuthCount := 0
|
|
||||||
|
|
||||||
// Handle tilde expansion for auth directory
|
|
||||||
if strings.HasPrefix(cfg.AuthDir, "~") {
|
|
||||||
home, errUserHomeDir := os.UserHomeDir()
|
|
||||||
if errUserHomeDir != nil {
|
|
||||||
log.Fatalf("failed to get home directory: %v", errUserHomeDir)
|
|
||||||
}
|
|
||||||
parts := strings.Split(cfg.AuthDir, string(os.PathSeparator))
|
|
||||||
if len(parts) > 1 {
|
|
||||||
parts[0] = home
|
|
||||||
cfg.AuthDir = path.Join(parts...)
|
|
||||||
} else {
|
|
||||||
cfg.AuthDir = home
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Load clients from auth directory
|
// Create new API key clients based on the new config
|
||||||
errWalk := filepath.Walk(cfg.AuthDir, func(path string, info fs.FileInfo, err error) error {
|
newAPIKeyClients, glAPIKeyCount, claudeAPIKeyCount, codexAPIKeyCount, openAICompatCount := buildAPIKeyClients(cfg)
|
||||||
if err != nil {
|
log.Debugf("created %d new API key clients", len(newAPIKeyClients))
|
||||||
log.Debugf("error accessing path %s: %v", path, err)
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
if !info.IsDir() && strings.HasSuffix(info.Name(), ".json") {
|
|
||||||
authFileCount++
|
|
||||||
log.Debugf("processing auth file %d: %s", authFileCount, filepath.Base(path))
|
|
||||||
if cliClient, errCreateClientFromFile := w.createClientFromFile(path, cfg); errCreateClientFromFile == nil {
|
|
||||||
newClients[path] = cliClient
|
|
||||||
successfulAuthCount++
|
|
||||||
} else {
|
|
||||||
log.Errorf("failed to create client from file %s: %v", path, errCreateClientFromFile)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
})
|
|
||||||
if errWalk != nil {
|
|
||||||
log.Errorf("error walking auth directory: %v", errWalk)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
log.Debugf("auth directory scan complete - found %d .json files, %d successful authentications", authFileCount, successfulAuthCount)
|
|
||||||
|
|
||||||
// Note: API key-based clients are not stored in the map as they don't correspond to a file.
|
// Load file-based clients
|
||||||
// They are re-created each time, which is lightweight.
|
newFileClients, successfulAuthCount := w.loadFileClients(cfg)
|
||||||
clientSlice := w.clientsToSlice(newClients)
|
log.Debugf("loaded %d new file-based clients", len(newFileClients))
|
||||||
|
|
||||||
// Add clients for Generative Language API keys if configured
|
// Unregister all old file-based clients
|
||||||
glAPIKeyCount := 0
|
log.Debugf("unregistering %d old file-based clients", oldFileClientCount)
|
||||||
if len(cfg.GlAPIKey) > 0 {
|
|
||||||
log.Debugf("processing %d Generative Language API Keys", len(cfg.GlAPIKey))
|
|
||||||
for i := 0; i < len(cfg.GlAPIKey); i++ {
|
|
||||||
httpClient := util.SetProxy(cfg, &http.Client{})
|
|
||||||
log.Debugf("Initializing with Generative Language API Key %d...", i+1)
|
|
||||||
cliClient := client.NewGeminiClient(httpClient, cfg, cfg.GlAPIKey[i])
|
|
||||||
clientSlice = append(clientSlice, cliClient)
|
|
||||||
glAPIKeyCount++
|
|
||||||
}
|
|
||||||
log.Debugf("Successfully initialized %d Generative Language API Key clients", glAPIKeyCount)
|
|
||||||
}
|
|
||||||
// ... (Claude, Codex, OpenAI-compat clients are handled similarly) ...
|
|
||||||
claudeAPIKeyCount := 0
|
|
||||||
if len(cfg.ClaudeKey) > 0 {
|
|
||||||
log.Debugf("processing %d Claude API Keys", len(cfg.ClaudeKey))
|
|
||||||
for i := 0; i < len(cfg.ClaudeKey); i++ {
|
|
||||||
log.Debugf("Initializing with Claude API Key %d...", i+1)
|
|
||||||
cliClient := client.NewClaudeClientWithKey(cfg, i)
|
|
||||||
clientSlice = append(clientSlice, cliClient)
|
|
||||||
claudeAPIKeyCount++
|
|
||||||
}
|
|
||||||
log.Debugf("Successfully initialized %d Claude API Key clients", claudeAPIKeyCount)
|
|
||||||
}
|
|
||||||
|
|
||||||
codexAPIKeyCount := 0
|
|
||||||
if len(cfg.CodexKey) > 0 {
|
|
||||||
log.Debugf("processing %d Codex API Keys", len(cfg.CodexKey))
|
|
||||||
for i := 0; i < len(cfg.CodexKey); i++ {
|
|
||||||
log.Debugf("Initializing with Codex API Key %d...", i+1)
|
|
||||||
cliClient := client.NewCodexClientWithKey(cfg, i)
|
|
||||||
clientSlice = append(clientSlice, cliClient)
|
|
||||||
codexAPIKeyCount++
|
|
||||||
}
|
|
||||||
log.Debugf("Successfully initialized %d Codex API Key clients", codexAPIKeyCount)
|
|
||||||
}
|
|
||||||
|
|
||||||
openAICompatCount := 0
|
|
||||||
if len(cfg.OpenAICompatibility) > 0 {
|
|
||||||
log.Debugf("processing %d OpenAI-compatibility providers", len(cfg.OpenAICompatibility))
|
|
||||||
for i := 0; i < len(cfg.OpenAICompatibility); i++ {
|
|
||||||
compat := cfg.OpenAICompatibility[i]
|
|
||||||
compatClient, errClient := client.NewOpenAICompatibilityClient(cfg, &compat)
|
|
||||||
if errClient != nil {
|
|
||||||
log.Errorf(" failed to create OpenAI-compatibility client for %s: %v", compat.Name, errClient)
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
clientSlice = append(clientSlice, compatClient)
|
|
||||||
openAICompatCount++
|
|
||||||
}
|
|
||||||
log.Debugf("Successfully initialized %d OpenAI-compatibility clients", openAICompatCount)
|
|
||||||
}
|
|
||||||
|
|
||||||
// Unregister all old clients
|
|
||||||
w.clientsMutex.RLock()
|
|
||||||
for _, oldClient := range w.clients {
|
for _, oldClient := range w.clients {
|
||||||
if u, ok := any(oldClient).(interface{ UnregisterClient() }); ok {
|
if u, ok := any(oldClient).(interface{ UnregisterClient() }); ok {
|
||||||
u.UnregisterClient()
|
u.UnregisterClient()
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
w.clientsMutex.RUnlock()
|
|
||||||
|
|
||||||
// Update the client map
|
// Update client maps
|
||||||
w.clientsMutex.Lock()
|
w.clientsMutex.Lock()
|
||||||
w.clients = newClients
|
w.clients = newFileClients
|
||||||
|
w.apiKeyClients = newAPIKeyClients
|
||||||
|
|
||||||
|
// Rebuild auth file hash cache for current clients
|
||||||
|
w.lastAuthHashes = make(map[string]string, len(newFileClients))
|
||||||
|
for path := range newFileClients {
|
||||||
|
if data, err := os.ReadFile(path); err == nil && len(data) > 0 {
|
||||||
|
sum := sha256.Sum256(data)
|
||||||
|
w.lastAuthHashes[path] = hex.EncodeToString(sum[:])
|
||||||
|
}
|
||||||
|
}
|
||||||
w.clientsMutex.Unlock()
|
w.clientsMutex.Unlock()
|
||||||
|
|
||||||
|
totalNewClients := len(newFileClients) + len(newAPIKeyClients)
|
||||||
|
|
||||||
log.Infof("full client reload complete - old: %d clients, new: %d clients (%d auth files + %d GL API keys + %d Claude API keys + %d Codex keys + %d OpenAI-compat)",
|
log.Infof("full client reload complete - old: %d clients, new: %d clients (%d auth files + %d GL API keys + %d Claude API keys + %d Codex keys + %d OpenAI-compat)",
|
||||||
oldClientCount,
|
oldFileClientCount+oldAPIKeyClientCount,
|
||||||
len(clientSlice),
|
totalNewClients,
|
||||||
successfulAuthCount,
|
successfulAuthCount,
|
||||||
glAPIKeyCount,
|
glAPIKeyCount,
|
||||||
claudeAPIKeyCount,
|
claudeAPIKeyCount,
|
||||||
@@ -359,10 +288,10 @@ func (w *Watcher) reloadClients() {
|
|||||||
openAICompatCount,
|
openAICompatCount,
|
||||||
)
|
)
|
||||||
|
|
||||||
// Trigger the callback to update the server with file-based + API key clients
|
// Trigger the callback to update the server
|
||||||
if w.reloadCallback != nil {
|
if w.reloadCallback != nil {
|
||||||
log.Debugf("triggering server update callback")
|
log.Debugf("triggering server update callback")
|
||||||
combinedClients := w.buildCombinedClientMap(cfg)
|
combinedClients := w.buildCombinedClientMap()
|
||||||
w.reloadCallback(combinedClients, cfg)
|
w.reloadCallback(combinedClients, cfg)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -430,15 +359,38 @@ func (w *Watcher) clientsToSlice(clientMap map[string]interfaces.Client) []inter
|
|||||||
// addOrUpdateClient handles the addition or update of a single client.
|
// addOrUpdateClient handles the addition or update of a single client.
|
||||||
func (w *Watcher) addOrUpdateClient(path string) {
|
func (w *Watcher) addOrUpdateClient(path string) {
|
||||||
w.clientsMutex.Lock()
|
w.clientsMutex.Lock()
|
||||||
defer w.clientsMutex.Unlock()
|
|
||||||
|
|
||||||
cfg := w.config
|
cfg := w.config
|
||||||
if cfg == nil {
|
if cfg == nil {
|
||||||
log.Error("config is nil, cannot add or update client")
|
log.Error("config is nil, cannot add or update client")
|
||||||
|
w.clientsMutex.Unlock()
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
// Unregister old client if it exists
|
// Read file to check for emptiness and calculate hash
|
||||||
|
data, errRead := os.ReadFile(path)
|
||||||
|
if errRead != nil {
|
||||||
|
log.Errorf("failed to read auth file %s: %v", filepath.Base(path), errRead)
|
||||||
|
w.clientsMutex.Unlock()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if len(data) == 0 {
|
||||||
|
// Empty file: ignore (wait for a subsequent WRITE)
|
||||||
|
log.Debugf("ignoring empty auth file: %s", filepath.Base(path))
|
||||||
|
w.clientsMutex.Unlock()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Calculate a hash of the current content and compare with the cache
|
||||||
|
sum := sha256.Sum256(data)
|
||||||
|
curHash := hex.EncodeToString(sum[:])
|
||||||
|
if prev, ok := w.lastAuthHashes[path]; ok && prev == curHash {
|
||||||
|
log.Debugf("auth file unchanged (hash match), skipping reload: %s", filepath.Base(path))
|
||||||
|
w.clientsMutex.Unlock()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// If an old client exists, unregister it first
|
||||||
if oldClient, ok := w.clients[path]; ok {
|
if oldClient, ok := w.clients[path]; ok {
|
||||||
if u, canUnregister := any(oldClient).(interface{ UnregisterClient() }); canUnregister {
|
if u, canUnregister := any(oldClient).(interface{ UnregisterClient() }); canUnregister {
|
||||||
log.Debugf("unregistering old client for updated file: %s", filepath.Base(path))
|
log.Debugf("unregistering old client for updated file: %s", filepath.Base(path))
|
||||||
@@ -446,23 +398,32 @@ func (w *Watcher) addOrUpdateClient(path string) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Create new client (reads the file again internally; this is acceptable as the files are small and it keeps the change minimal)
|
||||||
newClient, err := w.createClientFromFile(path, cfg)
|
newClient, err := w.createClientFromFile(path, cfg)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Errorf("failed to create/update client for %s: %v", filepath.Base(path), err)
|
log.Errorf("failed to create/update client for %s: %v", filepath.Base(path), err)
|
||||||
// If creation fails, ensure the old client is removed from the map
|
// If creation fails, ensure the old client is removed from the map; don't update hash, let a subsequent change retry
|
||||||
delete(w.clients, path)
|
delete(w.clients, path)
|
||||||
} else if newClient != nil { // Only update if a client was actually created
|
w.clientsMutex.Unlock()
|
||||||
log.Debugf("successfully created/updated client for %s", filepath.Base(path))
|
return
|
||||||
w.clients[path] = newClient
|
|
||||||
} else {
|
|
||||||
// This case handles the empty file scenario gracefully
|
|
||||||
log.Debugf("ignoring empty auth file: %s", filepath.Base(path))
|
|
||||||
return // Do not trigger callback for an empty file
|
|
||||||
}
|
}
|
||||||
|
if newClient == nil {
|
||||||
|
// This branch should not be reached normally (empty files are handled above); a fallback
|
||||||
|
log.Debugf("ignoring auth file with no client created: %s", filepath.Base(path))
|
||||||
|
w.clientsMutex.Unlock()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Update client and hash cache
|
||||||
|
log.Debugf("successfully created/updated client for %s", filepath.Base(path))
|
||||||
|
w.clients[path] = newClient
|
||||||
|
w.lastAuthHashes[path] = curHash
|
||||||
|
|
||||||
|
w.clientsMutex.Unlock() // Unlock before the callback
|
||||||
|
|
||||||
if w.reloadCallback != nil {
|
if w.reloadCallback != nil {
|
||||||
log.Debugf("triggering server update callback after add/update")
|
log.Debugf("triggering server update callback after add/update")
|
||||||
combinedClients := w.buildCombinedClientMap(cfg)
|
combinedClients := w.buildCombinedClientMap()
|
||||||
w.reloadCallback(combinedClients, cfg)
|
w.reloadCallback(combinedClients, cfg)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -470,9 +431,9 @@ func (w *Watcher) addOrUpdateClient(path string) {
|
|||||||
// removeClient handles the removal of a single client.
|
// removeClient handles the removal of a single client.
|
||||||
func (w *Watcher) removeClient(path string) {
|
func (w *Watcher) removeClient(path string) {
|
||||||
w.clientsMutex.Lock()
|
w.clientsMutex.Lock()
|
||||||
defer w.clientsMutex.Unlock()
|
|
||||||
|
|
||||||
cfg := w.config
|
cfg := w.config
|
||||||
|
var clientRemoved bool
|
||||||
|
|
||||||
// Unregister client if it exists
|
// Unregister client if it exists
|
||||||
if oldClient, ok := w.clients[path]; ok {
|
if oldClient, ok := w.clients[path]; ok {
|
||||||
@@ -481,63 +442,121 @@ func (w *Watcher) removeClient(path string) {
|
|||||||
u.UnregisterClient()
|
u.UnregisterClient()
|
||||||
}
|
}
|
||||||
delete(w.clients, path)
|
delete(w.clients, path)
|
||||||
|
delete(w.lastAuthHashes, path)
|
||||||
log.Debugf("removed client for %s", filepath.Base(path))
|
log.Debugf("removed client for %s", filepath.Base(path))
|
||||||
|
clientRemoved = true
|
||||||
|
}
|
||||||
|
|
||||||
if w.reloadCallback != nil {
|
w.clientsMutex.Unlock() // Release the lock before the callback
|
||||||
log.Debugf("triggering server update callback after removal")
|
|
||||||
combinedClients := w.buildCombinedClientMap(cfg)
|
if clientRemoved && w.reloadCallback != nil {
|
||||||
w.reloadCallback(combinedClients, cfg)
|
log.Debugf("triggering server update callback after removal")
|
||||||
}
|
combinedClients := w.buildCombinedClientMap()
|
||||||
|
w.reloadCallback(combinedClients, cfg)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// buildCombinedClientMap merges file-based clients with API key and compatibility clients.
|
// buildCombinedClientMap merges file-based clients with API key clients from the cache.
|
||||||
// This ensures the callback receives the complete set of active clients.
|
func (w *Watcher) buildCombinedClientMap() map[string]interfaces.Client {
|
||||||
func (w *Watcher) buildCombinedClientMap(cfg *config.Config) map[string]interfaces.Client {
|
w.clientsMutex.RLock()
|
||||||
|
defer w.clientsMutex.RUnlock()
|
||||||
|
|
||||||
combined := make(map[string]interfaces.Client)
|
combined := make(map[string]interfaces.Client)
|
||||||
|
|
||||||
// Include file-based clients
|
// Add file-based clients
|
||||||
for k, v := range w.clients {
|
for k, v := range w.clients {
|
||||||
combined[k] = v
|
combined[k] = v
|
||||||
}
|
}
|
||||||
|
|
||||||
// Add Generative Language API Key clients
|
// Add cached API key-based clients
|
||||||
if len(cfg.GlAPIKey) > 0 {
|
for k, v := range w.apiKeyClients {
|
||||||
for i := 0; i < len(cfg.GlAPIKey); i++ {
|
combined[k] = v
|
||||||
httpClient := util.SetProxy(cfg, &http.Client{})
|
|
||||||
cliClient := client.NewGeminiClient(httpClient, cfg, cfg.GlAPIKey[i])
|
|
||||||
combined[fmt.Sprintf("apikey:gemini:%d", i)] = cliClient
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Add Claude API Key clients
|
|
||||||
if len(cfg.ClaudeKey) > 0 {
|
|
||||||
for i := 0; i < len(cfg.ClaudeKey); i++ {
|
|
||||||
cliClient := client.NewClaudeClientWithKey(cfg, i)
|
|
||||||
combined[fmt.Sprintf("apikey:claude:%d", i)] = cliClient
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Add Codex API Key clients
|
|
||||||
if len(cfg.CodexKey) > 0 {
|
|
||||||
for i := 0; i < len(cfg.CodexKey); i++ {
|
|
||||||
cliClient := client.NewCodexClientWithKey(cfg, i)
|
|
||||||
combined[fmt.Sprintf("apikey:codex:%d", i)] = cliClient
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Add OpenAI compatibility clients
|
|
||||||
if len(cfg.OpenAICompatibility) > 0 {
|
|
||||||
for i := 0; i < len(cfg.OpenAICompatibility); i++ {
|
|
||||||
compat := cfg.OpenAICompatibility[i]
|
|
||||||
compatClient, errClient := client.NewOpenAICompatibilityClient(cfg, &compat)
|
|
||||||
if errClient != nil {
|
|
||||||
log.Errorf("failed to create OpenAI-compatibility client for %s: %v", compat.Name, errClient)
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
combined[fmt.Sprintf("openai-compat:%s:%d", compat.Name, i)] = compatClient
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
return combined
|
return combined
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// loadFileClients scans the auth directory and creates clients from .json files.
|
||||||
|
func (w *Watcher) loadFileClients(cfg *config.Config) (map[string]interfaces.Client, int) {
|
||||||
|
newClients := make(map[string]interfaces.Client)
|
||||||
|
authFileCount := 0
|
||||||
|
successfulAuthCount := 0
|
||||||
|
|
||||||
|
authDir := cfg.AuthDir
|
||||||
|
if strings.HasPrefix(authDir, "~") {
|
||||||
|
home, err := os.UserHomeDir()
|
||||||
|
if err != nil {
|
||||||
|
log.Errorf("failed to get home directory: %v", err)
|
||||||
|
return newClients, 0
|
||||||
|
}
|
||||||
|
authDir = filepath.Join(home, authDir[1:])
|
||||||
|
}
|
||||||
|
|
||||||
|
errWalk := filepath.Walk(authDir, func(path string, info fs.FileInfo, err error) error {
|
||||||
|
if err != nil {
|
||||||
|
log.Debugf("error accessing path %s: %v", path, err)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if !info.IsDir() && strings.HasSuffix(info.Name(), ".json") {
|
||||||
|
authFileCount++
|
||||||
|
log.Debugf("processing auth file %d: %s", authFileCount, filepath.Base(path))
|
||||||
|
if cliClient, errCreate := w.createClientFromFile(path, cfg); errCreate == nil && cliClient != nil {
|
||||||
|
newClients[path] = cliClient
|
||||||
|
successfulAuthCount++
|
||||||
|
} else if errCreate != nil {
|
||||||
|
log.Errorf("failed to create client from file %s: %v", path, errCreate)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
})
|
||||||
|
|
||||||
|
if errWalk != nil {
|
||||||
|
log.Errorf("error walking auth directory: %v", errWalk)
|
||||||
|
}
|
||||||
|
log.Debugf("auth directory scan complete - found %d .json files, %d successful authentications", authFileCount, successfulAuthCount)
|
||||||
|
return newClients, successfulAuthCount
|
||||||
|
}
|
||||||
|
|
||||||
|
// buildAPIKeyClients creates clients from API keys in the config.
|
||||||
|
func buildAPIKeyClients(cfg *config.Config) (map[string]interfaces.Client, int, int, int, int) {
|
||||||
|
apiKeyClients := make(map[string]interfaces.Client)
|
||||||
|
glAPIKeyCount := 0
|
||||||
|
claudeAPIKeyCount := 0
|
||||||
|
codexAPIKeyCount := 0
|
||||||
|
openAICompatCount := 0
|
||||||
|
|
||||||
|
if len(cfg.GlAPIKey) > 0 {
|
||||||
|
for _, key := range cfg.GlAPIKey {
|
||||||
|
httpClient := util.SetProxy(cfg, &http.Client{})
|
||||||
|
cliClient := client.NewGeminiClient(httpClient, cfg, key)
|
||||||
|
apiKeyClients[cliClient.GetClientID()] = cliClient
|
||||||
|
glAPIKeyCount++
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if len(cfg.ClaudeKey) > 0 {
|
||||||
|
for i := range cfg.ClaudeKey {
|
||||||
|
cliClient := client.NewClaudeClientWithKey(cfg, i)
|
||||||
|
apiKeyClients[cliClient.GetClientID()] = cliClient
|
||||||
|
claudeAPIKeyCount++
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if len(cfg.CodexKey) > 0 {
|
||||||
|
for i := range cfg.CodexKey {
|
||||||
|
cliClient := client.NewCodexClientWithKey(cfg, i)
|
||||||
|
apiKeyClients[cliClient.GetClientID()] = cliClient
|
||||||
|
codexAPIKeyCount++
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if len(cfg.OpenAICompatibility) > 0 {
|
||||||
|
for _, compatConfig := range cfg.OpenAICompatibility {
|
||||||
|
compatClient, errClient := client.NewOpenAICompatibilityClient(cfg, &compatConfig)
|
||||||
|
if errClient != nil {
|
||||||
|
log.Errorf("failed to create OpenAI-compatibility client for %s: %v", compatConfig.Name, errClient)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
apiKeyClients[compatClient.GetClientID()] = compatClient
|
||||||
|
openAICompatCount++
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return apiKeyClients, glAPIKeyCount, claudeAPIKeyCount, codexAPIKeyCount, openAICompatCount
|
||||||
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user