mirror of
https://github.com/router-for-me/CLIProxyAPI.git
synced 2026-02-03 21:10:51 +08:00
This commit introduces a new configuration option `logs-max-total-size-mb` that allows users to set a maximum total size (in MB) for log files in the logs directory. When this limit is exceeded, the oldest log files will be automatically deleted to stay within the specified size. Setting this value to 0 (the default) disables this feature. This change enhances log management by preventing excessive disk space usage.
480 lines
16 KiB
Go
480 lines
16 KiB
Go
// Package main provides the entry point for the CLI Proxy API server.
|
|
// This server acts as a proxy that provides OpenAI/Gemini/Claude compatible API interfaces
|
|
// for CLI models, allowing CLI models to be used with tools and libraries designed for standard AI APIs.
|
|
package main
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"flag"
|
|
"fmt"
|
|
"io/fs"
|
|
"net/url"
|
|
"os"
|
|
"path/filepath"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/joho/godotenv"
|
|
configaccess "github.com/router-for-me/CLIProxyAPI/v6/internal/access/config_access"
|
|
"github.com/router-for-me/CLIProxyAPI/v6/internal/buildinfo"
|
|
"github.com/router-for-me/CLIProxyAPI/v6/internal/cmd"
|
|
"github.com/router-for-me/CLIProxyAPI/v6/internal/config"
|
|
"github.com/router-for-me/CLIProxyAPI/v6/internal/logging"
|
|
"github.com/router-for-me/CLIProxyAPI/v6/internal/managementasset"
|
|
"github.com/router-for-me/CLIProxyAPI/v6/internal/misc"
|
|
"github.com/router-for-me/CLIProxyAPI/v6/internal/store"
|
|
_ "github.com/router-for-me/CLIProxyAPI/v6/internal/translator"
|
|
"github.com/router-for-me/CLIProxyAPI/v6/internal/usage"
|
|
"github.com/router-for-me/CLIProxyAPI/v6/internal/util"
|
|
sdkAuth "github.com/router-for-me/CLIProxyAPI/v6/sdk/auth"
|
|
coreauth "github.com/router-for-me/CLIProxyAPI/v6/sdk/cliproxy/auth"
|
|
log "github.com/sirupsen/logrus"
|
|
)
|
|
|
|
var (
|
|
Version = "dev"
|
|
Commit = "none"
|
|
BuildDate = "unknown"
|
|
DefaultConfigPath = ""
|
|
)
|
|
|
|
// init initializes the shared logger setup.
|
|
func init() {
|
|
logging.SetupBaseLogger()
|
|
buildinfo.Version = Version
|
|
buildinfo.Commit = Commit
|
|
buildinfo.BuildDate = BuildDate
|
|
}
|
|
|
|
// main is the entry point of the application.
|
|
// It parses command-line flags, loads configuration, and starts the appropriate
|
|
// service based on the provided flags (login, codex-login, or server mode).
|
|
func main() {
|
|
fmt.Printf("CLIProxyAPI Version: %s, Commit: %s, BuiltAt: %s\n", buildinfo.Version, buildinfo.Commit, buildinfo.BuildDate)
|
|
|
|
// Command-line flags to control the application's behavior.
|
|
var login bool
|
|
var codexLogin bool
|
|
var claudeLogin bool
|
|
var qwenLogin bool
|
|
var iflowLogin bool
|
|
var iflowCookie bool
|
|
var noBrowser bool
|
|
var antigravityLogin bool
|
|
var projectID string
|
|
var vertexImport string
|
|
var configPath string
|
|
var password string
|
|
|
|
// Define command-line flags for different operation modes.
|
|
flag.BoolVar(&login, "login", false, "Login Google Account")
|
|
flag.BoolVar(&codexLogin, "codex-login", false, "Login to Codex using OAuth")
|
|
flag.BoolVar(&claudeLogin, "claude-login", false, "Login to Claude using OAuth")
|
|
flag.BoolVar(&qwenLogin, "qwen-login", false, "Login to Qwen using OAuth")
|
|
flag.BoolVar(&iflowLogin, "iflow-login", false, "Login to iFlow using OAuth")
|
|
flag.BoolVar(&iflowCookie, "iflow-cookie", false, "Login to iFlow using Cookie")
|
|
flag.BoolVar(&noBrowser, "no-browser", false, "Don't open browser automatically for OAuth")
|
|
flag.BoolVar(&antigravityLogin, "antigravity-login", false, "Login to Antigravity using OAuth")
|
|
flag.StringVar(&projectID, "project_id", "", "Project ID (Gemini only, not required)")
|
|
flag.StringVar(&configPath, "config", DefaultConfigPath, "Configure File Path")
|
|
flag.StringVar(&vertexImport, "vertex-import", "", "Import Vertex service account key JSON file")
|
|
flag.StringVar(&password, "password", "", "")
|
|
|
|
flag.CommandLine.Usage = func() {
|
|
out := flag.CommandLine.Output()
|
|
_, _ = fmt.Fprintf(out, "Usage of %s\n", os.Args[0])
|
|
flag.CommandLine.VisitAll(func(f *flag.Flag) {
|
|
if f.Name == "password" {
|
|
return
|
|
}
|
|
s := fmt.Sprintf(" -%s", f.Name)
|
|
name, unquoteUsage := flag.UnquoteUsage(f)
|
|
if name != "" {
|
|
s += " " + name
|
|
}
|
|
if len(s) <= 4 {
|
|
s += " "
|
|
} else {
|
|
s += "\n "
|
|
}
|
|
if unquoteUsage != "" {
|
|
s += unquoteUsage
|
|
}
|
|
if f.DefValue != "" && f.DefValue != "false" && f.DefValue != "0" {
|
|
s += fmt.Sprintf(" (default %s)", f.DefValue)
|
|
}
|
|
_, _ = fmt.Fprint(out, s+"\n")
|
|
})
|
|
}
|
|
|
|
// Parse the command-line flags.
|
|
flag.Parse()
|
|
|
|
// Core application variables.
|
|
var err error
|
|
var cfg *config.Config
|
|
var isCloudDeploy bool
|
|
var (
|
|
usePostgresStore bool
|
|
pgStoreDSN string
|
|
pgStoreSchema string
|
|
pgStoreLocalPath string
|
|
pgStoreInst *store.PostgresStore
|
|
useGitStore bool
|
|
gitStoreRemoteURL string
|
|
gitStoreUser string
|
|
gitStorePassword string
|
|
gitStoreLocalPath string
|
|
gitStoreInst *store.GitTokenStore
|
|
gitStoreRoot string
|
|
useObjectStore bool
|
|
objectStoreEndpoint string
|
|
objectStoreAccess string
|
|
objectStoreSecret string
|
|
objectStoreBucket string
|
|
objectStoreLocalPath string
|
|
objectStoreInst *store.ObjectTokenStore
|
|
)
|
|
|
|
wd, err := os.Getwd()
|
|
if err != nil {
|
|
log.Errorf("failed to get working directory: %v", err)
|
|
return
|
|
}
|
|
|
|
// Load environment variables from .env if present.
|
|
if errLoad := godotenv.Load(filepath.Join(wd, ".env")); errLoad != nil {
|
|
if !errors.Is(errLoad, os.ErrNotExist) {
|
|
log.WithError(errLoad).Warn("failed to load .env file")
|
|
}
|
|
}
|
|
|
|
lookupEnv := func(keys ...string) (string, bool) {
|
|
for _, key := range keys {
|
|
if value, ok := os.LookupEnv(key); ok {
|
|
if trimmed := strings.TrimSpace(value); trimmed != "" {
|
|
return trimmed, true
|
|
}
|
|
}
|
|
}
|
|
return "", false
|
|
}
|
|
writableBase := util.WritablePath()
|
|
if value, ok := lookupEnv("PGSTORE_DSN", "pgstore_dsn"); ok {
|
|
usePostgresStore = true
|
|
pgStoreDSN = value
|
|
}
|
|
if usePostgresStore {
|
|
if value, ok := lookupEnv("PGSTORE_SCHEMA", "pgstore_schema"); ok {
|
|
pgStoreSchema = value
|
|
}
|
|
if value, ok := lookupEnv("PGSTORE_LOCAL_PATH", "pgstore_local_path"); ok {
|
|
pgStoreLocalPath = value
|
|
}
|
|
if pgStoreLocalPath == "" {
|
|
if writableBase != "" {
|
|
pgStoreLocalPath = writableBase
|
|
} else {
|
|
pgStoreLocalPath = wd
|
|
}
|
|
}
|
|
useGitStore = false
|
|
}
|
|
if value, ok := lookupEnv("GITSTORE_GIT_URL", "gitstore_git_url"); ok {
|
|
useGitStore = true
|
|
gitStoreRemoteURL = value
|
|
}
|
|
if value, ok := lookupEnv("GITSTORE_GIT_USERNAME", "gitstore_git_username"); ok {
|
|
gitStoreUser = value
|
|
}
|
|
if value, ok := lookupEnv("GITSTORE_GIT_TOKEN", "gitstore_git_token"); ok {
|
|
gitStorePassword = value
|
|
}
|
|
if value, ok := lookupEnv("GITSTORE_LOCAL_PATH", "gitstore_local_path"); ok {
|
|
gitStoreLocalPath = value
|
|
}
|
|
if value, ok := lookupEnv("OBJECTSTORE_ENDPOINT", "objectstore_endpoint"); ok {
|
|
useObjectStore = true
|
|
objectStoreEndpoint = value
|
|
}
|
|
if value, ok := lookupEnv("OBJECTSTORE_ACCESS_KEY", "objectstore_access_key"); ok {
|
|
objectStoreAccess = value
|
|
}
|
|
if value, ok := lookupEnv("OBJECTSTORE_SECRET_KEY", "objectstore_secret_key"); ok {
|
|
objectStoreSecret = value
|
|
}
|
|
if value, ok := lookupEnv("OBJECTSTORE_BUCKET", "objectstore_bucket"); ok {
|
|
objectStoreBucket = value
|
|
}
|
|
if value, ok := lookupEnv("OBJECTSTORE_LOCAL_PATH", "objectstore_local_path"); ok {
|
|
objectStoreLocalPath = value
|
|
}
|
|
|
|
// Check for cloud deploy mode only on first execution
|
|
// Read env var name in uppercase: DEPLOY
|
|
deployEnv := os.Getenv("DEPLOY")
|
|
if deployEnv == "cloud" {
|
|
isCloudDeploy = true
|
|
}
|
|
|
|
// Determine and load the configuration file.
|
|
// Prefer the Postgres store when configured, otherwise fallback to git or local files.
|
|
var configFilePath string
|
|
if usePostgresStore {
|
|
if pgStoreLocalPath == "" {
|
|
pgStoreLocalPath = wd
|
|
}
|
|
pgStoreLocalPath = filepath.Join(pgStoreLocalPath, "pgstore")
|
|
ctx, cancel := context.WithTimeout(context.Background(), 30*time.Second)
|
|
pgStoreInst, err = store.NewPostgresStore(ctx, store.PostgresStoreConfig{
|
|
DSN: pgStoreDSN,
|
|
Schema: pgStoreSchema,
|
|
SpoolDir: pgStoreLocalPath,
|
|
})
|
|
cancel()
|
|
if err != nil {
|
|
log.Errorf("failed to initialize postgres token store: %v", err)
|
|
return
|
|
}
|
|
examplePath := filepath.Join(wd, "config.example.yaml")
|
|
ctx, cancel = context.WithTimeout(context.Background(), 30*time.Second)
|
|
if errBootstrap := pgStoreInst.Bootstrap(ctx, examplePath); errBootstrap != nil {
|
|
cancel()
|
|
log.Errorf("failed to bootstrap postgres-backed config: %v", errBootstrap)
|
|
return
|
|
}
|
|
cancel()
|
|
configFilePath = pgStoreInst.ConfigPath()
|
|
cfg, err = config.LoadConfigOptional(configFilePath, isCloudDeploy)
|
|
if err == nil {
|
|
cfg.AuthDir = pgStoreInst.AuthDir()
|
|
log.Infof("postgres-backed token store enabled, workspace path: %s", pgStoreInst.WorkDir())
|
|
}
|
|
} else if useObjectStore {
|
|
if objectStoreLocalPath == "" {
|
|
if writableBase != "" {
|
|
objectStoreLocalPath = writableBase
|
|
} else {
|
|
objectStoreLocalPath = wd
|
|
}
|
|
}
|
|
objectStoreRoot := filepath.Join(objectStoreLocalPath, "objectstore")
|
|
resolvedEndpoint := strings.TrimSpace(objectStoreEndpoint)
|
|
useSSL := true
|
|
if strings.Contains(resolvedEndpoint, "://") {
|
|
parsed, errParse := url.Parse(resolvedEndpoint)
|
|
if errParse != nil {
|
|
log.Errorf("failed to parse object store endpoint %q: %v", objectStoreEndpoint, errParse)
|
|
return
|
|
}
|
|
switch strings.ToLower(parsed.Scheme) {
|
|
case "http":
|
|
useSSL = false
|
|
case "https":
|
|
useSSL = true
|
|
default:
|
|
log.Errorf("unsupported object store scheme %q (only http and https are allowed)", parsed.Scheme)
|
|
return
|
|
}
|
|
if parsed.Host == "" {
|
|
log.Errorf("object store endpoint %q is missing host information", objectStoreEndpoint)
|
|
return
|
|
}
|
|
resolvedEndpoint = parsed.Host
|
|
if parsed.Path != "" && parsed.Path != "/" {
|
|
resolvedEndpoint = strings.TrimSuffix(parsed.Host+parsed.Path, "/")
|
|
}
|
|
}
|
|
resolvedEndpoint = strings.TrimRight(resolvedEndpoint, "/")
|
|
objCfg := store.ObjectStoreConfig{
|
|
Endpoint: resolvedEndpoint,
|
|
Bucket: objectStoreBucket,
|
|
AccessKey: objectStoreAccess,
|
|
SecretKey: objectStoreSecret,
|
|
LocalRoot: objectStoreRoot,
|
|
UseSSL: useSSL,
|
|
PathStyle: true,
|
|
}
|
|
objectStoreInst, err = store.NewObjectTokenStore(objCfg)
|
|
if err != nil {
|
|
log.Errorf("failed to initialize object token store: %v", err)
|
|
return
|
|
}
|
|
examplePath := filepath.Join(wd, "config.example.yaml")
|
|
ctx, cancel := context.WithTimeout(context.Background(), 30*time.Second)
|
|
if errBootstrap := objectStoreInst.Bootstrap(ctx, examplePath); errBootstrap != nil {
|
|
cancel()
|
|
log.Errorf("failed to bootstrap object-backed config: %v", errBootstrap)
|
|
return
|
|
}
|
|
cancel()
|
|
configFilePath = objectStoreInst.ConfigPath()
|
|
cfg, err = config.LoadConfigOptional(configFilePath, isCloudDeploy)
|
|
if err == nil {
|
|
if cfg == nil {
|
|
cfg = &config.Config{}
|
|
}
|
|
cfg.AuthDir = objectStoreInst.AuthDir()
|
|
log.Infof("object-backed token store enabled, bucket: %s", objectStoreBucket)
|
|
}
|
|
} else if useGitStore {
|
|
if gitStoreLocalPath == "" {
|
|
if writableBase != "" {
|
|
gitStoreLocalPath = writableBase
|
|
} else {
|
|
gitStoreLocalPath = wd
|
|
}
|
|
}
|
|
gitStoreRoot = filepath.Join(gitStoreLocalPath, "gitstore")
|
|
authDir := filepath.Join(gitStoreRoot, "auths")
|
|
gitStoreInst = store.NewGitTokenStore(gitStoreRemoteURL, gitStoreUser, gitStorePassword)
|
|
gitStoreInst.SetBaseDir(authDir)
|
|
if errRepo := gitStoreInst.EnsureRepository(); errRepo != nil {
|
|
log.Errorf("failed to prepare git token store: %v", errRepo)
|
|
return
|
|
}
|
|
configFilePath = gitStoreInst.ConfigPath()
|
|
if configFilePath == "" {
|
|
configFilePath = filepath.Join(gitStoreRoot, "config", "config.yaml")
|
|
}
|
|
if _, statErr := os.Stat(configFilePath); errors.Is(statErr, fs.ErrNotExist) {
|
|
examplePath := filepath.Join(wd, "config.example.yaml")
|
|
if _, errExample := os.Stat(examplePath); errExample != nil {
|
|
log.Errorf("failed to find template config file: %v", errExample)
|
|
return
|
|
}
|
|
if errCopy := misc.CopyConfigTemplate(examplePath, configFilePath); errCopy != nil {
|
|
log.Errorf("failed to bootstrap git-backed config: %v", errCopy)
|
|
return
|
|
}
|
|
if errCommit := gitStoreInst.PersistConfig(context.Background()); errCommit != nil {
|
|
log.Errorf("failed to commit initial git-backed config: %v", errCommit)
|
|
return
|
|
}
|
|
log.Infof("git-backed config initialized from template: %s", configFilePath)
|
|
} else if statErr != nil {
|
|
log.Errorf("failed to inspect git-backed config: %v", statErr)
|
|
return
|
|
}
|
|
cfg, err = config.LoadConfigOptional(configFilePath, isCloudDeploy)
|
|
if err == nil {
|
|
cfg.AuthDir = gitStoreInst.AuthDir()
|
|
log.Infof("git-backed token store enabled, repository path: %s", gitStoreRoot)
|
|
}
|
|
} else if configPath != "" {
|
|
configFilePath = configPath
|
|
cfg, err = config.LoadConfigOptional(configPath, isCloudDeploy)
|
|
} else {
|
|
wd, err = os.Getwd()
|
|
if err != nil {
|
|
log.Errorf("failed to get working directory: %v", err)
|
|
return
|
|
}
|
|
configFilePath = filepath.Join(wd, "config.yaml")
|
|
cfg, err = config.LoadConfigOptional(configFilePath, isCloudDeploy)
|
|
}
|
|
if err != nil {
|
|
log.Errorf("failed to load config: %v", err)
|
|
return
|
|
}
|
|
if cfg == nil {
|
|
cfg = &config.Config{}
|
|
}
|
|
|
|
// In cloud deploy mode, check if we have a valid configuration
|
|
var configFileExists bool
|
|
if isCloudDeploy {
|
|
if info, errStat := os.Stat(configFilePath); errStat != nil {
|
|
// Don't mislead: API server will not start until configuration is provided.
|
|
log.Info("Cloud deploy mode: No configuration file detected; standing by for configuration")
|
|
configFileExists = false
|
|
} else if info.IsDir() {
|
|
log.Info("Cloud deploy mode: Config path is a directory; standing by for configuration")
|
|
configFileExists = false
|
|
} else if cfg.Port == 0 {
|
|
// LoadConfigOptional returns empty config when file is empty or invalid.
|
|
// Config file exists but is empty or invalid; treat as missing config
|
|
log.Info("Cloud deploy mode: Configuration file is empty or invalid; standing by for valid configuration")
|
|
configFileExists = false
|
|
} else {
|
|
log.Info("Cloud deploy mode: Configuration file detected; starting service")
|
|
configFileExists = true
|
|
}
|
|
}
|
|
usage.SetStatisticsEnabled(cfg.UsageStatisticsEnabled)
|
|
coreauth.SetQuotaCooldownDisabled(cfg.DisableCooling)
|
|
|
|
if err = logging.ConfigureLogOutput(cfg.LoggingToFile, cfg.LogsMaxTotalSizeMB); err != nil {
|
|
log.Errorf("failed to configure log output: %v", err)
|
|
return
|
|
}
|
|
|
|
log.Infof("CLIProxyAPI Version: %s, Commit: %s, BuiltAt: %s", buildinfo.Version, buildinfo.Commit, buildinfo.BuildDate)
|
|
|
|
// Set the log level based on the configuration.
|
|
util.SetLogLevel(cfg)
|
|
|
|
if resolvedAuthDir, errResolveAuthDir := util.ResolveAuthDir(cfg.AuthDir); errResolveAuthDir != nil {
|
|
log.Errorf("failed to resolve auth directory: %v", errResolveAuthDir)
|
|
return
|
|
} else {
|
|
cfg.AuthDir = resolvedAuthDir
|
|
}
|
|
managementasset.SetCurrentConfig(cfg)
|
|
|
|
// Create login options to be used in authentication flows.
|
|
options := &cmd.LoginOptions{
|
|
NoBrowser: noBrowser,
|
|
}
|
|
|
|
// Register the shared token store once so all components use the same persistence backend.
|
|
if usePostgresStore {
|
|
sdkAuth.RegisterTokenStore(pgStoreInst)
|
|
} else if useObjectStore {
|
|
sdkAuth.RegisterTokenStore(objectStoreInst)
|
|
} else if useGitStore {
|
|
sdkAuth.RegisterTokenStore(gitStoreInst)
|
|
} else {
|
|
sdkAuth.RegisterTokenStore(sdkAuth.NewFileTokenStore())
|
|
}
|
|
|
|
// Register built-in access providers before constructing services.
|
|
configaccess.Register()
|
|
|
|
// Handle different command modes based on the provided flags.
|
|
|
|
if vertexImport != "" {
|
|
// Handle Vertex service account import
|
|
cmd.DoVertexImport(cfg, vertexImport)
|
|
} else if login {
|
|
// Handle Google/Gemini login
|
|
cmd.DoLogin(cfg, projectID, options)
|
|
} else if antigravityLogin {
|
|
// Handle Antigravity login
|
|
cmd.DoAntigravityLogin(cfg, options)
|
|
} else if codexLogin {
|
|
// Handle Codex login
|
|
cmd.DoCodexLogin(cfg, options)
|
|
} else if claudeLogin {
|
|
// Handle Claude login
|
|
cmd.DoClaudeLogin(cfg, options)
|
|
} else if qwenLogin {
|
|
cmd.DoQwenLogin(cfg, options)
|
|
} else if iflowLogin {
|
|
cmd.DoIFlowLogin(cfg, options)
|
|
} else if iflowCookie {
|
|
cmd.DoIFlowCookieAuth(cfg, options)
|
|
} else {
|
|
// In cloud deploy mode without config file, just wait for shutdown signals
|
|
if isCloudDeploy && !configFileExists {
|
|
// No config file available, just wait for shutdown
|
|
cmd.WaitForCloudDeploy()
|
|
return
|
|
}
|
|
// Start the main proxy service
|
|
managementasset.StartAutoUpdater(context.Background(), configFilePath)
|
|
cmd.StartService(cfg, configFilePath, password)
|
|
}
|
|
}
|