Files
CLIProxyAPI/MANAGEMENT_API.md
Luis Pater c875088be2 Add dynamic log level adjustment and "type" field to auth files response
- Introduced `SetLogLevel` utility function for unified log level management.
- Updated dynamic log level handling across server and watcher components.
- Extended auth files response by extracting and including the `type` field from file content.
- Updated management API documentation with the new `type` field in auth files response.
2025-09-08 01:09:39 +08:00

18 KiB
Raw Blame History

Management API

Base path: http://localhost:8317/v0/management

This API manages the CLI Proxy APIs runtime configuration and authentication files. All changes are persisted to the YAML config file and hotreloaded by the service.

Note: The following options cannot be modified via API and must be set in the config file (restart if needed):

  • allow-remote-management
  • remote-management-key (if plaintext is detected at startup, it is automatically bcrypthashed and written back to the config)

Authentication

  • All requests (including localhost) must provide a valid management key.
  • Remote access requires enabling remote management in the config: allow-remote-management: true.
  • Provide the management key (in plaintext) via either:
    • Authorization: Bearer <plaintext-key>
    • X-Management-Key: <plaintext-key>

If a plaintext key is detected in the config at startup, it will be bcrypthashed and written back to the config file automatically.

Request/Response Conventions

  • Content-Type: application/json (unless otherwise noted).
  • Boolean/int/string updates: request body is { "value": <type> }.
  • Array PUT: either a raw array (e.g. ["a","b"]) or { "items": [ ... ] }.
  • Array PATCH: supports { "old": "k1", "new": "k2" } or { "index": 0, "value": "k2" }.
  • Object-array PATCH: supports matching by index or by key field (specified per endpoint).

Endpoints

Config

  • GET /config — Get the full config
    • Request:
      curl -H 'Authorization: Bearer <MANAGEMENT_KEY>' http://localhost:8317/v0/management/config
      
    • Response:
      {"debug":true,"proxy-url":"","api-keys":["1...5","JS...W"],"quota-exceeded":{"switch-project":true,"switch-preview-model":true},"generative-language-api-key":["AI...01", "AI...02", "AI...03"],"request-log":true,"request-retry":3,"claude-api-key":[{"api-key":"cr...56","base-url":"https://example.com/api"},{"api-key":"cr...e3","base-url":"http://example.com:3000/api"},{"api-key":"sk-...q2","base-url":"https://example.com"}],"codex-api-key":[{"api-key":"sk...01","base-url":"https://example/v1"}],"openai-compatibility":[{"name":"openrouter","base-url":"https://openrouter.ai/api/v1","api-keys":["sk...01"],"models":[{"name":"moonshotai/kimi-k2:free","alias":"kimi-k2"}]},{"name":"iflow","base-url":"https://apis.iflow.cn/v1","api-keys":["sk...7e"],"models":[{"name":"deepseek-v3.1","alias":"deepseek-v3.1"},{"name":"glm-4.5","alias":"glm-4.5"},{"name":"kimi-k2","alias":"kimi-k2"}]}],"allow-localhost-unauthenticated":true}
      

Debug

  • GET /debug — Get the current debug state
    • Request:
      curl -H 'Authorization: Bearer <MANAGEMENT_KEY>' http://localhost:8317/v0/management/debug
      
    • Response:
      { "debug": false }
      
  • PUT/PATCH /debug — Set debug (boolean)
    • Request:
      curl -X PUT -H 'Content-Type: application/json' \
      -H 'Authorization: Bearer <MANAGEMENT_KEY>' \
        -d '{"value":true}' \
        http://localhost:8317/v0/management/debug
      
    • Response:
      { "status": "ok" }
      

Proxy Server URL

  • GET /proxy-url — Get the proxy URL string
    • Request:
      curl -H 'Authorization: Bearer <MANAGEMENT_KEY>' http://localhost:8317/v0/management/proxy-url
      
    • Response:
      { "proxy-url": "socks5://user:pass@127.0.0.1:1080/" }
      
  • PUT/PATCH /proxy-url — Set the proxy URL string
    • Request (PUT):
      curl -X PUT -H 'Content-Type: application/json' \
      -H 'Authorization: Bearer <MANAGEMENT_KEY>' \
        -d '{"value":"socks5://user:pass@127.0.0.1:1080/"}' \
        http://localhost:8317/v0/management/proxy-url
      
    • Request (PATCH):
      curl -X PATCH -H 'Content-Type: application/json' \
      -H 'Authorization: Bearer <MANAGEMENT_KEY>' \
        -d '{"value":"http://127.0.0.1:8080"}' \
        http://localhost:8317/v0/management/proxy-url
      
    • Response:
      { "status": "ok" }
      
  • DELETE /proxy-url — Clear the proxy URL
    • Request:
      curl -H 'Authorization: Bearer <MANAGEMENT_KEY>' -X DELETE http://localhost:8317/v0/management/proxy-url
      
    • Response:
      { "status": "ok" }
      

Quota Exceeded Behavior

  • GET /quota-exceeded/switch-project
    • Request:
      curl -H 'Authorization: Bearer <MANAGEMENT_KEY>' http://localhost:8317/v0/management/quota-exceeded/switch-project
      
    • Response:
      { "switch-project": true }
      
  • PUT/PATCH /quota-exceeded/switch-project — Boolean
    • Request:
      curl -X PUT -H 'Content-Type: application/json' \
      -H 'Authorization: Bearer <MANAGEMENT_KEY>' \
        -d '{"value":false}' \
        http://localhost:8317/v0/management/quota-exceeded/switch-project
      
    • Response:
      { "status": "ok" }
      
  • GET /quota-exceeded/switch-preview-model
    • Request:
      curl -H 'Authorization: Bearer <MANAGEMENT_KEY>' http://localhost:8317/v0/management/quota-exceeded/switch-preview-model
      
    • Response:
      { "switch-preview-model": true }
      
  • PUT/PATCH /quota-exceeded/switch-preview-model — Boolean
    • Request:
      curl -X PATCH -H 'Content-Type: application/json' \
      -H 'Authorization: Bearer <MANAGEMENT_KEY>' \
        -d '{"value":true}' \
        http://localhost:8317/v0/management/quota-exceeded/switch-preview-model
      
    • Response:
      { "status": "ok" }
      

API Keys (proxy service auth)

  • GET /api-keys — Return the full list
    • Request:
      curl -H 'Authorization: Bearer <MANAGEMENT_KEY>' http://localhost:8317/v0/management/api-keys
      
    • Response:
      { "api-keys": ["k1","k2","k3"] }
      
  • PUT /api-keys — Replace the full list
    • Request:
      curl -X PUT -H 'Content-Type: application/json' \
      -H 'Authorization: Bearer <MANAGEMENT_KEY>' \
        -d '["k1","k2","k3"]' \
        http://localhost:8317/v0/management/api-keys
      
    • Response:
      { "status": "ok" }
      
  • PATCH /api-keys — Modify one item (old/new or index/value)
    • Request (by old/new):
      curl -X PATCH -H 'Content-Type: application/json' \
      -H 'Authorization: Bearer <MANAGEMENT_KEY>' \
        -d '{"old":"k2","new":"k2b"}' \
        http://localhost:8317/v0/management/api-keys
      
    • Request (by index/value):
      curl -X PATCH -H 'Content-Type: application/json' \
      -H 'Authorization: Bearer <MANAGEMENT_KEY>' \
        -d '{"index":0,"value":"k1b"}' \
        http://localhost:8317/v0/management/api-keys
      
    • Response:
      { "status": "ok" }
      
  • DELETE /api-keys — Delete one (?value= or ?index=)
    • Request (by value):
      curl -H 'Authorization: Bearer <MANAGEMENT_KEY>' -X DELETE 'http://localhost:8317/v0/management/api-keys?value=k1'
      
    • Request (by index):
      curl -H 'Authorization: Bearer <MANAGEMENT_KEY>' -X DELETE 'http://localhost:8317/v0/management/api-keys?index=0'
      
    • Response:
      { "status": "ok" }
      

Gemini API Key (Generative Language)

  • GET /generative-language-api-key
    • Request:
      curl -H 'Authorization: Bearer <MANAGEMENT_KEY>' http://localhost:8317/v0/management/generative-language-api-key
      
    • Response:
      { "generative-language-api-key": ["AIzaSy...01","AIzaSy...02"] }
      
  • PUT /generative-language-api-key
    • Request:
      curl -X PUT -H 'Content-Type: application/json' \
      -H 'Authorization: Bearer <MANAGEMENT_KEY>' \
        -d '["AIzaSy-1","AIzaSy-2"]' \
        http://localhost:8317/v0/management/generative-language-api-key
      
    • Response:
      { "status": "ok" }
      
  • PATCH /generative-language-api-key
    • Request:
      curl -X PATCH -H 'Content-Type: application/json' \
      -H 'Authorization: Bearer <MANAGEMENT_KEY>' \
        -d '{"old":"AIzaSy-1","new":"AIzaSy-1b"}' \
        http://localhost:8317/v0/management/generative-language-api-key
      
    • Response:
      { "status": "ok" }
      
  • DELETE /generative-language-api-key
    • Request:
      curl -H 'Authorization: Bearer <MANAGEMENT_KEY>' -X DELETE 'http://localhost:8317/v0/management/generative-language-api-key?value=AIzaSy-2'
      
    • Response:
      { "status": "ok" }
      

Codex API KEY (object array)

  • GET /codex-api-key — List all
    • Request:
      curl -H 'Authorization: Bearer <MANAGEMENT_KEY>' http://localhost:8317/v0/management/codex-api-key
      
    • Response:
      { "codex-api-key": [ { "api-key": "sk-a", "base-url": "" } ] }
      
  • PUT /codex-api-key — Replace the list
    • Request:
      curl -X PUT -H 'Content-Type: application/json' \
      -H 'Authorization: Bearer <MANAGEMENT_KEY>' \
        -d '[{"api-key":"sk-a"},{"api-key":"sk-b","base-url":"https://c.example.com"}]' \
        http://localhost:8317/v0/management/codex-api-key
      
    • Response:
      { "status": "ok" }
      
  • PATCH /codex-api-key — Modify one (by index or match)
    • Request (by index):
      curl -X PATCH -H 'Content-Type: application/json' \
      -H 'Authorization: Bearer <MANAGEMENT_KEY>' \
        -d '{"index":1,"value":{"api-key":"sk-b2","base-url":"https://c.example.com"}}' \
        http://localhost:8317/v0/management/codex-api-key
      
    • Request (by match):
      curl -X PATCH -H 'Content-Type: application/json' \
      -H 'Authorization: Bearer <MANAGEMENT_KEY>' \
        -d '{"match":"sk-a","value":{"api-key":"sk-a","base-url":""}}' \
        http://localhost:8317/v0/management/codex-api-key
      
    • Response:
      { "status": "ok" }
      
  • DELETE /codex-api-key — Delete one (?api-key= or ?index=)
    • Request (by api-key):
      curl -H 'Authorization: Bearer <MANAGEMENT_KEY>' -X DELETE 'http://localhost:8317/v0/management/codex-api-key?api-key=sk-b2'
      
    • Request (by index):
      curl -H 'Authorization: Bearer <MANAGEMENT_KEY>' -X DELETE 'http://localhost:8317/v0/management/codex-api-key?index=0'
      
    • Response:
      { "status": "ok" }
      

Request Retry Count

  • GET /request-retry — Get integer
    • Request:
      curl -H 'Authorization: Bearer <MANAGEMENT_KEY>' http://localhost:8317/v0/management/request-retry
      
    • Response:
      { "request-retry": 3 }
      
  • PUT/PATCH /request-retry — Set integer
    • Request:
      curl -X PATCH -H 'Content-Type: application/json' \
      -H 'Authorization: Bearer <MANAGEMENT_KEY>' \
        -d '{"value":5}' \
        http://localhost:8317/v0/management/request-retry
      
    • Response:
      { "status": "ok" }
      

Allow Localhost Unauthenticated

  • GET /allow-localhost-unauthenticated — Get boolean
    • Request:
      curl -H 'Authorization: Bearer <MANAGEMENT_KEY>' http://localhost:8317/v0/management/allow-localhost-unauthenticated
      
    • Response:
      { "allow-localhost-unauthenticated": false }
      
  • PUT/PATCH /allow-localhost-unauthenticated — Set boolean
    • Request:
      curl -X PUT -H 'Content-Type: application/json' \
      -H 'Authorization: Bearer <MANAGEMENT_KEY>' \
        -d '{"value":true}' \
        http://localhost:8317/v0/management/allow-localhost-unauthenticated
      
    • Response:
      { "status": "ok" }
      

Claude API KEY (object array)

  • GET /claude-api-key — List all
    • Request:
      curl -H 'Authorization: Bearer <MANAGEMENT_KEY>' http://localhost:8317/v0/management/claude-api-key
      
    • Response:
      { "claude-api-key": [ { "api-key": "sk-a", "base-url": "" } ] }
      
  • PUT /claude-api-key — Replace the list
    • Request:
      curl -X PUT -H 'Content-Type: application/json' \
      -H 'Authorization: Bearer <MANAGEMENT_KEY>' \
        -d '[{"api-key":"sk-a"},{"api-key":"sk-b","base-url":"https://c.example.com"}]' \
        http://localhost:8317/v0/management/claude-api-key
      
    • Response:
      { "status": "ok" }
      
  • PATCH /claude-api-key — Modify one (by index or match)
    • Request (by index):
      curl -X PATCH -H 'Content-Type: application/json' \
      -H 'Authorization: Bearer <MANAGEMENT_KEY>' \
        -d '{"index":1,"value":{"api-key":"sk-b2","base-url":"https://c.example.com"}}' \
        http://localhost:8317/v0/management/claude-api-key
      
    • Request (by match):
      curl -X PATCH -H 'Content-Type: application/json' \
      -H 'Authorization: Bearer <MANAGEMENT_KEY>' \
        -d '{"match":"sk-a","value":{"api-key":"sk-a","base-url":""}}' \
        http://localhost:8317/v0/management/claude-api-key
      
    • Response:
      { "status": "ok" }
      
  • DELETE /claude-api-key — Delete one (?api-key= or ?index=)
    • Request (by api-key):
      curl -H 'Authorization: Bearer <MANAGEMENT_KEY>' -X DELETE 'http://localhost:8317/v0/management/claude-api-key?api-key=sk-b2'
      
    • Request (by index):
      curl -H 'Authorization: Bearer <MANAGEMENT_KEY>' -X DELETE 'http://localhost:8317/v0/management/claude-api-key?index=0'
      
    • Response:
      { "status": "ok" }
      

OpenAI Compatibility Providers (object array)

  • GET /openai-compatibility — List all
    • Request:
      curl -H 'Authorization: Bearer <MANAGEMENT_KEY>' http://localhost:8317/v0/management/openai-compatibility
      
    • Response:
      { "openai-compatibility": [ { "name": "openrouter", "base-url": "https://openrouter.ai/api/v1", "api-keys": [], "models": [] } ] }
      
  • PUT /openai-compatibility — Replace the list
    • Request:
      curl -X PUT -H 'Content-Type: application/json' \
      -H 'Authorization: Bearer <MANAGEMENT_KEY>' \
        -d '[{"name":"openrouter","base-url":"https://openrouter.ai/api/v1","api-keys":["sk"],"models":[{"name":"m","alias":"a"}]}]' \
        http://localhost:8317/v0/management/openai-compatibility
      
    • Response:
      { "status": "ok" }
      
  • PATCH /openai-compatibility — Modify one (by index or name)
    • Request (by name):
      curl -X PATCH -H 'Content-Type: application/json' \
      -H 'Authorization: Bearer <MANAGEMENT_KEY>' \
        -d '{"name":"openrouter","value":{"name":"openrouter","base-url":"https://openrouter.ai/api/v1","api-keys":[],"models":[]}}' \
        http://localhost:8317/v0/management/openai-compatibility
      
    • Request (by index):
      curl -X PATCH -H 'Content-Type: application/json' \
      -H 'Authorization: Bearer <MANAGEMENT_KEY>' \
        -d '{"index":0,"value":{"name":"openrouter","base-url":"https://openrouter.ai/api/v1","api-keys":[],"models":[]}}' \
        http://localhost:8317/v0/management/openai-compatibility
      
    • Response:
      { "status": "ok" }
      
  • DELETE /openai-compatibility — Delete (?name= or ?index=)
    • Request (by name):
      curl -H 'Authorization: Bearer <MANAGEMENT_KEY>' -X DELETE 'http://localhost:8317/v0/management/openai-compatibility?name=openrouter'
      
    • Request (by index):
      curl -H 'Authorization: Bearer <MANAGEMENT_KEY>' -X DELETE 'http://localhost:8317/v0/management/openai-compatibility?index=0'
      
    • Response:
      { "status": "ok" }
      

Auth File Management

Manage JSON token files under auth-dir: list, download, upload, delete.

  • GET /auth-files — List

    • Request:
      curl -H 'Authorization: Bearer <MANAGEMENT_KEY>' http://localhost:8317/v0/management/auth-files
      
    • Response:
      { "files": [ { "name": "acc1.json", "size": 1234, "modtime": "2025-08-30T12:34:56Z", "type": "google" } ] }
      
  • GET /auth-files/download?name=<file.json> — Download a single file

    • Request:
      curl -H 'Authorization: Bearer <MANAGEMENT_KEY>' -OJ 'http://localhost:8317/v0/management/auth-files/download?name=acc1.json'
      
  • POST /auth-files — Upload

    • Request (multipart):
      curl -X POST -F 'file=@/path/to/acc1.json' \
      -H 'Authorization: Bearer <MANAGEMENT_KEY>' \
        http://localhost:8317/v0/management/auth-files
      
    • Request (raw JSON):
      curl -X POST -H 'Content-Type: application/json' \
      -H 'Authorization: Bearer <MANAGEMENT_KEY>' \
        -d @/path/to/acc1.json \
        'http://localhost:8317/v0/management/auth-files?name=acc1.json'
      
    • Response:
      { "status": "ok" }
      
  • DELETE /auth-files?name=<file.json> — Delete a single file

    • Request:
      curl -H 'Authorization: Bearer <MANAGEMENT_KEY>' -X DELETE 'http://localhost:8317/v0/management/auth-files?name=acc1.json'
      
    • Response:
      { "status": "ok" }
      
  • DELETE /auth-files?all=true — Delete all .json files under auth-dir

    • Request:
      curl -H 'Authorization: Bearer <MANAGEMENT_KEY>' -X DELETE 'http://localhost:8317/v0/management/auth-files?all=true'
      
    • Response:
      { "status": "ok", "deleted": 3 }
      

Error Responses

Generic error format:

  • 400 Bad Request: { "error": "invalid body" }
  • 401 Unauthorized: { "error": "missing management key" } or { "error": "invalid management key" }
  • 403 Forbidden: { "error": "remote management disabled" }
  • 404 Not Found: { "error": "item not found" } or { "error": "file not found" }
  • 500 Internal Server Error: { "error": "failed to save config: ..." }

Notes

  • Changes are written back to the YAML config file and hotreloaded by the file watcher and clients.
  • allow-remote-management and remote-management-key cannot be changed via the API; configure them in the config file.