// Package main provides the entry point for the CLI Proxy API server. // This server acts as a proxy that provides OpenAI/Gemini/Claude compatible API interfaces // for CLI models, allowing CLI models to be used with tools and libraries designed for standard AI APIs. package main import ( "context" "errors" "flag" "fmt" "io/fs" "net/url" "os" "path/filepath" "strings" "time" "github.com/joho/godotenv" configaccess "github.com/router-for-me/CLIProxyAPI/v6/internal/access/config_access" "github.com/router-for-me/CLIProxyAPI/v6/internal/buildinfo" "github.com/router-for-me/CLIProxyAPI/v6/internal/cmd" "github.com/router-for-me/CLIProxyAPI/v6/internal/config" "github.com/router-for-me/CLIProxyAPI/v6/internal/logging" "github.com/router-for-me/CLIProxyAPI/v6/internal/managementasset" "github.com/router-for-me/CLIProxyAPI/v6/internal/misc" "github.com/router-for-me/CLIProxyAPI/v6/internal/store" _ "github.com/router-for-me/CLIProxyAPI/v6/internal/translator" "github.com/router-for-me/CLIProxyAPI/v6/internal/usage" "github.com/router-for-me/CLIProxyAPI/v6/internal/util" sdkAuth "github.com/router-for-me/CLIProxyAPI/v6/sdk/auth" coreauth "github.com/router-for-me/CLIProxyAPI/v6/sdk/cliproxy/auth" log "github.com/sirupsen/logrus" ) var ( Version = "dev" Commit = "none" BuildDate = "unknown" DefaultConfigPath = "" ) // init initializes the shared logger setup. func init() { logging.SetupBaseLogger() buildinfo.Version = Version buildinfo.Commit = Commit buildinfo.BuildDate = BuildDate } // main is the entry point of the application. // It parses command-line flags, loads configuration, and starts the appropriate // service based on the provided flags (login, codex-login, or server mode). func main() { fmt.Printf("CLIProxyAPI Version: %s, Commit: %s, BuiltAt: %s\n", buildinfo.Version, buildinfo.Commit, buildinfo.BuildDate) // Command-line flags to control the application's behavior. var login bool var codexLogin bool var claudeLogin bool var qwenLogin bool var iflowLogin bool var iflowCookie bool var noBrowser bool var oauthCallbackPort int var antigravityLogin bool var projectID string var vertexImport string var configPath string var password string // Define command-line flags for different operation modes. flag.BoolVar(&login, "login", false, "Login Google Account") flag.BoolVar(&codexLogin, "codex-login", false, "Login to Codex using OAuth") flag.BoolVar(&claudeLogin, "claude-login", false, "Login to Claude using OAuth") flag.BoolVar(&qwenLogin, "qwen-login", false, "Login to Qwen using OAuth") flag.BoolVar(&iflowLogin, "iflow-login", false, "Login to iFlow using OAuth") flag.BoolVar(&iflowCookie, "iflow-cookie", false, "Login to iFlow using Cookie") flag.BoolVar(&noBrowser, "no-browser", false, "Don't open browser automatically for OAuth") flag.IntVar(&oauthCallbackPort, "oauth-callback-port", 0, "Override OAuth callback port (defaults to provider-specific port)") flag.BoolVar(&antigravityLogin, "antigravity-login", false, "Login to Antigravity using OAuth") flag.StringVar(&projectID, "project_id", "", "Project ID (Gemini only, not required)") flag.StringVar(&configPath, "config", DefaultConfigPath, "Configure File Path") flag.StringVar(&vertexImport, "vertex-import", "", "Import Vertex service account key JSON file") flag.StringVar(&password, "password", "", "") flag.CommandLine.Usage = func() { out := flag.CommandLine.Output() _, _ = fmt.Fprintf(out, "Usage of %s\n", os.Args[0]) flag.CommandLine.VisitAll(func(f *flag.Flag) { if f.Name == "password" { return } s := fmt.Sprintf(" -%s", f.Name) name, unquoteUsage := flag.UnquoteUsage(f) if name != "" { s += " " + name } if len(s) <= 4 { s += " " } else { s += "\n " } if unquoteUsage != "" { s += unquoteUsage } if f.DefValue != "" && f.DefValue != "false" && f.DefValue != "0" { s += fmt.Sprintf(" (default %s)", f.DefValue) } _, _ = fmt.Fprint(out, s+"\n") }) } // Parse the command-line flags. flag.Parse() // Core application variables. var err error var cfg *config.Config var isCloudDeploy bool var ( usePostgresStore bool pgStoreDSN string pgStoreSchema string pgStoreLocalPath string pgStoreInst *store.PostgresStore useGitStore bool gitStoreRemoteURL string gitStoreUser string gitStorePassword string gitStoreLocalPath string gitStoreInst *store.GitTokenStore gitStoreRoot string useObjectStore bool objectStoreEndpoint string objectStoreAccess string objectStoreSecret string objectStoreBucket string objectStoreLocalPath string objectStoreInst *store.ObjectTokenStore ) wd, err := os.Getwd() if err != nil { log.Errorf("failed to get working directory: %v", err) return } // Load environment variables from .env if present. if errLoad := godotenv.Load(filepath.Join(wd, ".env")); errLoad != nil { if !errors.Is(errLoad, os.ErrNotExist) { log.WithError(errLoad).Warn("failed to load .env file") } } lookupEnv := func(keys ...string) (string, bool) { for _, key := range keys { if value, ok := os.LookupEnv(key); ok { if trimmed := strings.TrimSpace(value); trimmed != "" { return trimmed, true } } } return "", false } writableBase := util.WritablePath() if value, ok := lookupEnv("PGSTORE_DSN", "pgstore_dsn"); ok { usePostgresStore = true pgStoreDSN = value } if usePostgresStore { if value, ok := lookupEnv("PGSTORE_SCHEMA", "pgstore_schema"); ok { pgStoreSchema = value } if value, ok := lookupEnv("PGSTORE_LOCAL_PATH", "pgstore_local_path"); ok { pgStoreLocalPath = value } if pgStoreLocalPath == "" { if writableBase != "" { pgStoreLocalPath = writableBase } else { pgStoreLocalPath = wd } } useGitStore = false } if value, ok := lookupEnv("GITSTORE_GIT_URL", "gitstore_git_url"); ok { useGitStore = true gitStoreRemoteURL = value } if value, ok := lookupEnv("GITSTORE_GIT_USERNAME", "gitstore_git_username"); ok { gitStoreUser = value } if value, ok := lookupEnv("GITSTORE_GIT_TOKEN", "gitstore_git_token"); ok { gitStorePassword = value } if value, ok := lookupEnv("GITSTORE_LOCAL_PATH", "gitstore_local_path"); ok { gitStoreLocalPath = value } if value, ok := lookupEnv("OBJECTSTORE_ENDPOINT", "objectstore_endpoint"); ok { useObjectStore = true objectStoreEndpoint = value } if value, ok := lookupEnv("OBJECTSTORE_ACCESS_KEY", "objectstore_access_key"); ok { objectStoreAccess = value } if value, ok := lookupEnv("OBJECTSTORE_SECRET_KEY", "objectstore_secret_key"); ok { objectStoreSecret = value } if value, ok := lookupEnv("OBJECTSTORE_BUCKET", "objectstore_bucket"); ok { objectStoreBucket = value } if value, ok := lookupEnv("OBJECTSTORE_LOCAL_PATH", "objectstore_local_path"); ok { objectStoreLocalPath = value } // Check for cloud deploy mode only on first execution // Read env var name in uppercase: DEPLOY deployEnv := os.Getenv("DEPLOY") if deployEnv == "cloud" { isCloudDeploy = true } // Determine and load the configuration file. // Prefer the Postgres store when configured, otherwise fallback to git or local files. var configFilePath string if usePostgresStore { if pgStoreLocalPath == "" { pgStoreLocalPath = wd } pgStoreLocalPath = filepath.Join(pgStoreLocalPath, "pgstore") ctx, cancel := context.WithTimeout(context.Background(), 30*time.Second) pgStoreInst, err = store.NewPostgresStore(ctx, store.PostgresStoreConfig{ DSN: pgStoreDSN, Schema: pgStoreSchema, SpoolDir: pgStoreLocalPath, }) cancel() if err != nil { log.Errorf("failed to initialize postgres token store: %v", err) return } examplePath := filepath.Join(wd, "config.example.yaml") ctx, cancel = context.WithTimeout(context.Background(), 30*time.Second) if errBootstrap := pgStoreInst.Bootstrap(ctx, examplePath); errBootstrap != nil { cancel() log.Errorf("failed to bootstrap postgres-backed config: %v", errBootstrap) return } cancel() configFilePath = pgStoreInst.ConfigPath() cfg, err = config.LoadConfigOptional(configFilePath, isCloudDeploy) if err == nil { cfg.AuthDir = pgStoreInst.AuthDir() log.Infof("postgres-backed token store enabled, workspace path: %s", pgStoreInst.WorkDir()) } } else if useObjectStore { if objectStoreLocalPath == "" { if writableBase != "" { objectStoreLocalPath = writableBase } else { objectStoreLocalPath = wd } } objectStoreRoot := filepath.Join(objectStoreLocalPath, "objectstore") resolvedEndpoint := strings.TrimSpace(objectStoreEndpoint) useSSL := true if strings.Contains(resolvedEndpoint, "://") { parsed, errParse := url.Parse(resolvedEndpoint) if errParse != nil { log.Errorf("failed to parse object store endpoint %q: %v", objectStoreEndpoint, errParse) return } switch strings.ToLower(parsed.Scheme) { case "http": useSSL = false case "https": useSSL = true default: log.Errorf("unsupported object store scheme %q (only http and https are allowed)", parsed.Scheme) return } if parsed.Host == "" { log.Errorf("object store endpoint %q is missing host information", objectStoreEndpoint) return } resolvedEndpoint = parsed.Host if parsed.Path != "" && parsed.Path != "/" { resolvedEndpoint = strings.TrimSuffix(parsed.Host+parsed.Path, "/") } } resolvedEndpoint = strings.TrimRight(resolvedEndpoint, "/") objCfg := store.ObjectStoreConfig{ Endpoint: resolvedEndpoint, Bucket: objectStoreBucket, AccessKey: objectStoreAccess, SecretKey: objectStoreSecret, LocalRoot: objectStoreRoot, UseSSL: useSSL, PathStyle: true, } objectStoreInst, err = store.NewObjectTokenStore(objCfg) if err != nil { log.Errorf("failed to initialize object token store: %v", err) return } examplePath := filepath.Join(wd, "config.example.yaml") ctx, cancel := context.WithTimeout(context.Background(), 30*time.Second) if errBootstrap := objectStoreInst.Bootstrap(ctx, examplePath); errBootstrap != nil { cancel() log.Errorf("failed to bootstrap object-backed config: %v", errBootstrap) return } cancel() configFilePath = objectStoreInst.ConfigPath() cfg, err = config.LoadConfigOptional(configFilePath, isCloudDeploy) if err == nil { if cfg == nil { cfg = &config.Config{} } cfg.AuthDir = objectStoreInst.AuthDir() log.Infof("object-backed token store enabled, bucket: %s", objectStoreBucket) } } else if useGitStore { if gitStoreLocalPath == "" { if writableBase != "" { gitStoreLocalPath = writableBase } else { gitStoreLocalPath = wd } } gitStoreRoot = filepath.Join(gitStoreLocalPath, "gitstore") authDir := filepath.Join(gitStoreRoot, "auths") gitStoreInst = store.NewGitTokenStore(gitStoreRemoteURL, gitStoreUser, gitStorePassword) gitStoreInst.SetBaseDir(authDir) if errRepo := gitStoreInst.EnsureRepository(); errRepo != nil { log.Errorf("failed to prepare git token store: %v", errRepo) return } configFilePath = gitStoreInst.ConfigPath() if configFilePath == "" { configFilePath = filepath.Join(gitStoreRoot, "config", "config.yaml") } if _, statErr := os.Stat(configFilePath); errors.Is(statErr, fs.ErrNotExist) { examplePath := filepath.Join(wd, "config.example.yaml") if _, errExample := os.Stat(examplePath); errExample != nil { log.Errorf("failed to find template config file: %v", errExample) return } if errCopy := misc.CopyConfigTemplate(examplePath, configFilePath); errCopy != nil { log.Errorf("failed to bootstrap git-backed config: %v", errCopy) return } if errCommit := gitStoreInst.PersistConfig(context.Background()); errCommit != nil { log.Errorf("failed to commit initial git-backed config: %v", errCommit) return } log.Infof("git-backed config initialized from template: %s", configFilePath) } else if statErr != nil { log.Errorf("failed to inspect git-backed config: %v", statErr) return } cfg, err = config.LoadConfigOptional(configFilePath, isCloudDeploy) if err == nil { cfg.AuthDir = gitStoreInst.AuthDir() log.Infof("git-backed token store enabled, repository path: %s", gitStoreRoot) } } else if configPath != "" { configFilePath = configPath cfg, err = config.LoadConfigOptional(configPath, isCloudDeploy) } else { wd, err = os.Getwd() if err != nil { log.Errorf("failed to get working directory: %v", err) return } configFilePath = filepath.Join(wd, "config.yaml") cfg, err = config.LoadConfigOptional(configFilePath, isCloudDeploy) } if err != nil { log.Errorf("failed to load config: %v", err) return } if cfg == nil { cfg = &config.Config{} } // In cloud deploy mode, check if we have a valid configuration var configFileExists bool if isCloudDeploy { if info, errStat := os.Stat(configFilePath); errStat != nil { // Don't mislead: API server will not start until configuration is provided. log.Info("Cloud deploy mode: No configuration file detected; standing by for configuration") configFileExists = false } else if info.IsDir() { log.Info("Cloud deploy mode: Config path is a directory; standing by for configuration") configFileExists = false } else if cfg.Port == 0 { // LoadConfigOptional returns empty config when file is empty or invalid. // Config file exists but is empty or invalid; treat as missing config log.Info("Cloud deploy mode: Configuration file is empty or invalid; standing by for valid configuration") configFileExists = false } else { log.Info("Cloud deploy mode: Configuration file detected; starting service") configFileExists = true } } usage.SetStatisticsEnabled(cfg.UsageStatisticsEnabled) coreauth.SetQuotaCooldownDisabled(cfg.DisableCooling) if err = logging.ConfigureLogOutput(cfg); err != nil { log.Errorf("failed to configure log output: %v", err) return } log.Infof("CLIProxyAPI Version: %s, Commit: %s, BuiltAt: %s", buildinfo.Version, buildinfo.Commit, buildinfo.BuildDate) // Set the log level based on the configuration. util.SetLogLevel(cfg) if resolvedAuthDir, errResolveAuthDir := util.ResolveAuthDir(cfg.AuthDir); errResolveAuthDir != nil { log.Errorf("failed to resolve auth directory: %v", errResolveAuthDir) return } else { cfg.AuthDir = resolvedAuthDir } managementasset.SetCurrentConfig(cfg) // Create login options to be used in authentication flows. options := &cmd.LoginOptions{ NoBrowser: noBrowser, CallbackPort: oauthCallbackPort, } // Register the shared token store once so all components use the same persistence backend. if usePostgresStore { sdkAuth.RegisterTokenStore(pgStoreInst) } else if useObjectStore { sdkAuth.RegisterTokenStore(objectStoreInst) } else if useGitStore { sdkAuth.RegisterTokenStore(gitStoreInst) } else { sdkAuth.RegisterTokenStore(sdkAuth.NewFileTokenStore()) } // Register built-in access providers before constructing services. configaccess.Register() // Handle different command modes based on the provided flags. if vertexImport != "" { // Handle Vertex service account import cmd.DoVertexImport(cfg, vertexImport) } else if login { // Handle Google/Gemini login cmd.DoLogin(cfg, projectID, options) } else if antigravityLogin { // Handle Antigravity login cmd.DoAntigravityLogin(cfg, options) } else if codexLogin { // Handle Codex login cmd.DoCodexLogin(cfg, options) } else if claudeLogin { // Handle Claude login cmd.DoClaudeLogin(cfg, options) } else if qwenLogin { cmd.DoQwenLogin(cfg, options) } else if iflowLogin { cmd.DoIFlowLogin(cfg, options) } else if iflowCookie { cmd.DoIFlowCookieAuth(cfg, options) } else { // In cloud deploy mode without config file, just wait for shutdown signals if isCloudDeploy && !configFileExists { // No config file available, just wait for shutdown cmd.WaitForCloudDeploy() return } // Start the main proxy service managementasset.StartAutoUpdater(context.Background(), configFilePath) cmd.StartService(cfg, configFilePath, password) } }