Version: 0.9.82.dev.260507
后端: 1. 登录注册补齐极验行为验证与跨域入口:gateway 新增 `/user/captcha/register`,登录/注册先做 GeeTest 初始化与二次校验,再进入 user/auth RPC;补充验证码失败/初始化失败/服务不可用响应码,并新增可配置 CORS middleware 适配分域部署。 2. 容器部署配置入口收口:`bootstrap.LoadConfig` 支持 `SMARTFLOW_CONFIG_FILE` 与环境变量覆盖,`config.example.yaml` / `config.docker.yaml` 补齐 geetest 与容器内服务地址,网关新增配置列表解析,便于 compose 场景直接挂载配置启动。 3. LLM outbox 与助手时间线稳定性修正:`cmd/llm` 显式绑定 llm 自身 topic/group,避免误入 agent consumer group;agent timeline 在 Redis 热缓存未落 MySQL 时改用 `seq` 兜底临时 id,避免前端历史回放撞 key。 前端: 4. 认证页接入极验并补齐提交前校验:新增 GeeTest 脚本加载与实例封装,登录/注册面板支持 challenge 初始化、切换面板重挂载、失败提示与提交前校验,认证 API/types 同步透传 geetest 三元组。 5. 前端部署基址与网关对接收口:Axios `baseURL`、Vue Router `history base` 与 Vite `base/dev proxy` 改为读取环境变量,新增 `frontend/.env.example`,支持子路径部署、容器内反向代理和本地联调共存。 6. 助手与工作台展示细节修正:AssistantPanel 历史重建优先使用真实 timeline id、缺失时退回 `seq` 保证消息主键唯一;首页主面板改为纵向可滚动并补底部留白,避免内容截断。 仓库: 7. 整站容器化交付链路补齐并重写说明文档:新增后端/前端 Dockerfile、`.dockerignore`、前端 Nginx 代理、`docker-compose.full.yml`、`.env.full.example` 与镜像打包/导入脚本,README 改写数据库/路由/部署章节,并新增 `docs/容器化部署说明.md` 说明离线镜像分发方案。
This commit is contained in:
59
backend/gateway/api/userauth/dto.go
Normal file
59
backend/gateway/api/userauth/dto.go
Normal file
@@ -0,0 +1,59 @@
|
||||
package userauthapi
|
||||
|
||||
import contracts "github.com/LoveLosita/smartflow/backend/shared/contracts/userauth"
|
||||
|
||||
// geeTestValidatePayload 只承载 gateway 边界的人机验证字段。
|
||||
// 职责边界:
|
||||
// 1. 负责承接前端提交的 geetest 三元组;
|
||||
// 2. 不负责 user/auth RPC 入参映射,避免把第三方验证码字段带入内部服务契约;
|
||||
// 3. 不负责校验逻辑,真正校验由 GeeTestService 完成。
|
||||
type geeTestValidatePayload struct {
|
||||
Challenge string `json:"geetest_challenge"`
|
||||
Validate string `json:"geetest_validate"`
|
||||
Seccode string `json:"geetest_seccode"`
|
||||
}
|
||||
|
||||
type registerRequest struct {
|
||||
Username string `json:"username"`
|
||||
Password string `json:"password"`
|
||||
PhoneNumber string `json:"phone_number"`
|
||||
|
||||
geeTestValidatePayload
|
||||
}
|
||||
|
||||
func (r registerRequest) toContract() contracts.RegisterRequest {
|
||||
return contracts.RegisterRequest{
|
||||
Username: r.Username,
|
||||
Password: r.Password,
|
||||
PhoneNumber: r.PhoneNumber,
|
||||
}
|
||||
}
|
||||
|
||||
func (r registerRequest) captchaPayload() geeTestValidatePayload {
|
||||
return r.geeTestValidatePayload
|
||||
}
|
||||
|
||||
type loginRequest struct {
|
||||
Username string `json:"username"`
|
||||
Password string `json:"password"`
|
||||
|
||||
geeTestValidatePayload
|
||||
}
|
||||
|
||||
func (r loginRequest) toContract() contracts.LoginRequest {
|
||||
return contracts.LoginRequest{
|
||||
Username: r.Username,
|
||||
Password: r.Password,
|
||||
}
|
||||
}
|
||||
|
||||
func (r loginRequest) captchaPayload() geeTestValidatePayload {
|
||||
return r.geeTestValidatePayload
|
||||
}
|
||||
|
||||
type captchaRegisterResponse struct {
|
||||
Success int `json:"success"`
|
||||
GT string `json:"gt"`
|
||||
Challenge string `json:"challenge"`
|
||||
NewCaptcha bool `json:"new_captcha"`
|
||||
}
|
||||
188
backend/gateway/api/userauth/geetest.go
Normal file
188
backend/gateway/api/userauth/geetest.go
Normal file
@@ -0,0 +1,188 @@
|
||||
package userauthapi
|
||||
|
||||
import (
|
||||
"context"
|
||||
"crypto/md5"
|
||||
"encoding/hex"
|
||||
"encoding/json"
|
||||
"io"
|
||||
"net/http"
|
||||
"net/url"
|
||||
"strings"
|
||||
"time"
|
||||
|
||||
"github.com/LoveLosita/smartflow/backend/gateway/shared/respond"
|
||||
"github.com/spf13/viper"
|
||||
)
|
||||
|
||||
const (
|
||||
geeTestRegisterURL = "https://api.geetest.com/register.php"
|
||||
geeTestValidateURL = "http://api.geetest.com/validate.php"
|
||||
geeTestClientType = "web"
|
||||
geeTestSDKName = "smartflow-gateway-go/1.0"
|
||||
)
|
||||
|
||||
type geeTestRegisterUpstreamResponse struct {
|
||||
Challenge string `json:"challenge"`
|
||||
}
|
||||
|
||||
type geeTestValidateUpstreamResponse struct {
|
||||
Seccode string `json:"seccode"`
|
||||
}
|
||||
|
||||
// GeeTestService 负责封装 gateway 与极验 v3 接口的最小交互。
|
||||
// 职责边界:
|
||||
// 1. 只处理验证码初始化与二次校验,不承载登录/注册业务;
|
||||
// 2. 只暴露 gateway HTTP 层真正需要的最小方法,避免把第三方协议散落到 handler;
|
||||
// 3. 不做离线 failback 存储,当前阶段聚焦“在线校验闭环”这一个能力域。
|
||||
type GeeTestService struct {
|
||||
captchaID string
|
||||
privateKey string
|
||||
httpClient *http.Client
|
||||
}
|
||||
|
||||
func NewGeeTestServiceFromConfig() *GeeTestService {
|
||||
return &GeeTestService{
|
||||
captchaID: strings.TrimSpace(viper.GetString("geetest.captchaID")),
|
||||
privateKey: strings.TrimSpace(viper.GetString("geetest.privateKey")),
|
||||
httpClient: &http.Client{Timeout: 3 * time.Second},
|
||||
}
|
||||
}
|
||||
|
||||
// Register 负责向极验申请当前页 challenge,并转成前端 `initGeetest` 可直接消费的结构。
|
||||
// 职责边界:
|
||||
// 1. 只对应官方 API1 初始化;
|
||||
// 2. 不负责缓存 challenge,也不负责表单业务字段;
|
||||
// 3. 若极验服务不可用,直接返回初始化失败,让前端走显式提示。
|
||||
func (s *GeeTestService) Register(ctx context.Context, clientIP string) (*captchaRegisterResponse, error) {
|
||||
if !s.isConfigured() {
|
||||
return nil, respond.CaptchaInitFailed
|
||||
}
|
||||
|
||||
// 1. 先按官方 API1 约定拉取原始 challenge。
|
||||
// 2. 再使用 privateKey 做一次签名混淆,避免把上游原始 challenge 直接暴露给前端。
|
||||
// 3. 任一步失败都直接中断,让登录/注册入口显式暴露初始化异常。
|
||||
query := url.Values{}
|
||||
query.Set("digestmod", "md5")
|
||||
query.Set("gt", s.captchaID)
|
||||
query.Set("json_format", "1")
|
||||
query.Set("sdk", geeTestSDKName)
|
||||
query.Set("client_type", geeTestClientType)
|
||||
if ip := strings.TrimSpace(clientIP); ip != "" {
|
||||
query.Set("ip_address", ip)
|
||||
}
|
||||
|
||||
req, err := http.NewRequestWithContext(ctx, http.MethodGet, geeTestRegisterURL+"?"+query.Encode(), nil)
|
||||
if err != nil {
|
||||
return nil, respond.CaptchaInitFailed
|
||||
}
|
||||
|
||||
resp, err := s.httpClient.Do(req)
|
||||
if err != nil {
|
||||
return nil, respond.CaptchaInitFailed
|
||||
}
|
||||
defer resp.Body.Close()
|
||||
|
||||
rawBody, err := io.ReadAll(resp.Body)
|
||||
if err != nil {
|
||||
return nil, respond.CaptchaInitFailed
|
||||
}
|
||||
|
||||
challenge := extractRegisterChallenge(rawBody)
|
||||
if challenge == "" {
|
||||
return nil, respond.CaptchaInitFailed
|
||||
}
|
||||
|
||||
return &captchaRegisterResponse{
|
||||
Success: 1,
|
||||
GT: s.captchaID,
|
||||
Challenge: md5Hex(challenge + s.privateKey),
|
||||
NewCaptcha: true,
|
||||
}, nil
|
||||
}
|
||||
|
||||
// Verify 负责校验前端回传的极验三元组。
|
||||
// 职责边界:
|
||||
// 1. 先做本地 challenge/validate 一致性检查,尽早拦截无效请求;
|
||||
// 2. 再调用官方 API2 校验 seccode,保证验证码结果真实有效;
|
||||
// 3. 只返回“通过/失败/服务不可用”三类结论,不混入登录注册业务判断。
|
||||
func (s *GeeTestService) Verify(ctx context.Context, payload geeTestValidatePayload, clientIP string) error {
|
||||
if !s.isConfigured() {
|
||||
return respond.CaptchaVerifyUnavailable
|
||||
}
|
||||
|
||||
challenge := strings.TrimSpace(payload.Challenge)
|
||||
validate := strings.TrimSpace(payload.Validate)
|
||||
seccode := strings.TrimSpace(payload.Seccode)
|
||||
if challenge == "" || validate == "" || seccode == "" {
|
||||
return respond.MissingParam
|
||||
}
|
||||
|
||||
// 1. 先按极验 v3 协议校验 validate 是否与 challenge/privateKey 匹配。
|
||||
// 2. 若本地签名都对不上,直接判失败,避免继续请求第三方接口。
|
||||
// 3. 只有本地签名通过后,才继续调用 API2 复核 seccode。
|
||||
expectedValidate := md5Hex(s.privateKey + "geetest" + challenge)
|
||||
if !strings.EqualFold(validate, expectedValidate) {
|
||||
return respond.CaptchaVerifyFailed
|
||||
}
|
||||
|
||||
form := url.Values{}
|
||||
form.Set("captchaid", s.captchaID)
|
||||
form.Set("challenge", challenge)
|
||||
form.Set("seccode", seccode)
|
||||
form.Set("json_format", "1")
|
||||
form.Set("sdk", geeTestSDKName)
|
||||
form.Set("client_type", geeTestClientType)
|
||||
if ip := strings.TrimSpace(clientIP); ip != "" {
|
||||
form.Set("ip_address", ip)
|
||||
}
|
||||
|
||||
req, err := http.NewRequestWithContext(ctx, http.MethodPost, geeTestValidateURL, strings.NewReader(form.Encode()))
|
||||
if err != nil {
|
||||
return respond.CaptchaVerifyUnavailable
|
||||
}
|
||||
req.Header.Set("Content-Type", "application/x-www-form-urlencoded")
|
||||
|
||||
resp, err := s.httpClient.Do(req)
|
||||
if err != nil {
|
||||
return respond.CaptchaVerifyUnavailable
|
||||
}
|
||||
defer resp.Body.Close()
|
||||
|
||||
rawBody, err := io.ReadAll(resp.Body)
|
||||
if err != nil {
|
||||
return respond.CaptchaVerifyUnavailable
|
||||
}
|
||||
|
||||
if !matchValidateSeccode(rawBody, seccode) {
|
||||
return respond.CaptchaVerifyFailed
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
func (s *GeeTestService) isConfigured() bool {
|
||||
return s != nil && s.captchaID != "" && s.privateKey != ""
|
||||
}
|
||||
|
||||
func extractRegisterChallenge(rawBody []byte) string {
|
||||
var payload geeTestRegisterUpstreamResponse
|
||||
if err := json.Unmarshal(rawBody, &payload); err == nil {
|
||||
return strings.TrimSpace(payload.Challenge)
|
||||
}
|
||||
return strings.TrimSpace(string(rawBody))
|
||||
}
|
||||
|
||||
func matchValidateSeccode(rawBody []byte, seccode string) bool {
|
||||
expected := md5Hex(strings.TrimSpace(seccode))
|
||||
|
||||
var payload geeTestValidateUpstreamResponse
|
||||
if err := json.Unmarshal(rawBody, &payload); err == nil {
|
||||
return strings.EqualFold(strings.TrimSpace(payload.Seccode), expected)
|
||||
}
|
||||
return strings.EqualFold(strings.TrimSpace(string(rawBody)), expected)
|
||||
}
|
||||
|
||||
func md5Hex(input string) string {
|
||||
sum := md5.Sum([]byte(input))
|
||||
return hex.EncodeToString(sum[:])
|
||||
}
|
||||
@@ -14,25 +14,51 @@ import (
|
||||
)
|
||||
|
||||
type UserHandler struct {
|
||||
client ports.UserCommandClient
|
||||
client ports.UserCommandClient
|
||||
captcha *GeeTestService
|
||||
}
|
||||
|
||||
// NewUserHandler 只接收 user/auth 客户端,不再直接依赖本地 user service。
|
||||
func NewUserHandler(client ports.UserCommandClient) *UserHandler {
|
||||
return &UserHandler{client: client}
|
||||
// NewUserHandler 只接收 user/auth 客户端与验证码服务,不再直接依赖本地 user service。
|
||||
func NewUserHandler(client ports.UserCommandClient, captcha *GeeTestService) *UserHandler {
|
||||
return &UserHandler{
|
||||
client: client,
|
||||
captcha: captcha,
|
||||
}
|
||||
}
|
||||
|
||||
func (api *UserHandler) CaptchaRegister(c *gin.Context) {
|
||||
captchaCtx, cancel := context.WithTimeout(c.Request.Context(), 3*time.Second)
|
||||
defer cancel()
|
||||
|
||||
registerData, err := api.captcha.Register(captchaCtx, c.ClientIP())
|
||||
if err != nil {
|
||||
respond.DealWithError(c, err)
|
||||
return
|
||||
}
|
||||
c.JSON(http.StatusOK, respond.RespWithData(respond.Ok, registerData))
|
||||
}
|
||||
|
||||
func (api *UserHandler) UserRegister(c *gin.Context) {
|
||||
var req contracts.RegisterRequest
|
||||
var req registerRequest
|
||||
if err := c.ShouldBindJSON(&req); err != nil {
|
||||
c.JSON(http.StatusBadRequest, respond.WrongParamType)
|
||||
return
|
||||
}
|
||||
|
||||
// 1. 先用独立超时完成极验二次校验,避免第三方接口抖动侵入内部 RPC 超时预算。
|
||||
// 2. 只有验证码通过后才继续调 user/auth 注册服务,防止无效流量进入内部链路。
|
||||
// 3. 内部 RPC 仍保留原先 2 秒超时边界,不改变现有 user/auth 服务 SLA。
|
||||
captchaCtx, cancelCaptcha := context.WithTimeout(c.Request.Context(), 3*time.Second)
|
||||
defer cancelCaptcha()
|
||||
if err := api.captcha.Verify(captchaCtx, req.captchaPayload(), c.ClientIP()); err != nil {
|
||||
respond.DealWithError(c, err)
|
||||
return
|
||||
}
|
||||
|
||||
ctx, cancel := context.WithTimeout(c.Request.Context(), 2*time.Second)
|
||||
defer cancel()
|
||||
|
||||
retUser, err := api.client.Register(ctx, req)
|
||||
retUser, err := api.client.Register(ctx, req.toContract())
|
||||
if err != nil {
|
||||
respond.DealWithError(c, err)
|
||||
return
|
||||
@@ -41,16 +67,23 @@ func (api *UserHandler) UserRegister(c *gin.Context) {
|
||||
}
|
||||
|
||||
func (api *UserHandler) UserLogin(c *gin.Context) {
|
||||
var req contracts.LoginRequest
|
||||
var req loginRequest
|
||||
if err := c.ShouldBindJSON(&req); err != nil {
|
||||
c.JSON(http.StatusBadRequest, respond.WrongParamType)
|
||||
return
|
||||
}
|
||||
|
||||
captchaCtx, cancelCaptcha := context.WithTimeout(c.Request.Context(), 3*time.Second)
|
||||
defer cancelCaptcha()
|
||||
if err := api.captcha.Verify(captchaCtx, req.captchaPayload(), c.ClientIP()); err != nil {
|
||||
respond.DealWithError(c, err)
|
||||
return
|
||||
}
|
||||
|
||||
ctx, cancel := context.WithTimeout(c.Request.Context(), 2*time.Second)
|
||||
defer cancel()
|
||||
|
||||
tokens, err := api.client.Login(ctx, req)
|
||||
tokens, err := api.client.Login(ctx, req.toContract())
|
||||
if err != nil {
|
||||
respond.DealWithError(c, err)
|
||||
return
|
||||
|
||||
@@ -20,6 +20,7 @@ func RegisterRoutes(apiGroup *gin.RouterGroup, handler *UserHandler, authClient
|
||||
|
||||
userGroup := apiGroup.Group("/user")
|
||||
{
|
||||
userGroup.GET("/captcha/register", handler.CaptchaRegister)
|
||||
userGroup.POST("/register", handler.UserRegister)
|
||||
userGroup.POST("/login", handler.UserLogin)
|
||||
userGroup.POST("/refresh-token", handler.RefreshTokenHandler)
|
||||
|
||||
147
backend/gateway/middleware/cors.go
Normal file
147
backend/gateway/middleware/cors.go
Normal file
@@ -0,0 +1,147 @@
|
||||
package middleware
|
||||
|
||||
import (
|
||||
"net/http"
|
||||
"strconv"
|
||||
"strings"
|
||||
"time"
|
||||
|
||||
"github.com/gin-gonic/gin"
|
||||
)
|
||||
|
||||
type CORSOptions struct {
|
||||
AllowedOrigins []string
|
||||
AllowedMethods []string
|
||||
AllowedHeaders []string
|
||||
ExposedHeaders []string
|
||||
AllowCredentials bool
|
||||
MaxAge time.Duration
|
||||
}
|
||||
|
||||
func CORSMiddleware(opts CORSOptions) gin.HandlerFunc {
|
||||
origins := normalizeHeaderValues(opts.AllowedOrigins)
|
||||
if len(origins) == 0 {
|
||||
return func(c *gin.Context) {
|
||||
c.Next()
|
||||
}
|
||||
}
|
||||
|
||||
methods := normalizeHeaderValuesWithDefaults(opts.AllowedMethods, []string{
|
||||
http.MethodGet,
|
||||
http.MethodPost,
|
||||
http.MethodPut,
|
||||
http.MethodPatch,
|
||||
http.MethodDelete,
|
||||
http.MethodOptions,
|
||||
})
|
||||
headers := normalizeHeaderValuesWithDefaults(opts.AllowedHeaders, []string{
|
||||
"Authorization",
|
||||
"Content-Type",
|
||||
"Accept",
|
||||
"Origin",
|
||||
"X-Requested-With",
|
||||
"Idempotency-Key",
|
||||
})
|
||||
exposedHeaders := normalizeHeaderValues(opts.ExposedHeaders)
|
||||
maxAge := opts.MaxAge
|
||||
if maxAge <= 0 {
|
||||
maxAge = 12 * time.Hour
|
||||
}
|
||||
|
||||
return func(c *gin.Context) {
|
||||
origin := strings.TrimSpace(c.GetHeader("Origin"))
|
||||
if origin == "" {
|
||||
c.Next()
|
||||
return
|
||||
}
|
||||
|
||||
allowedOrigin := matchAllowedOrigin(origin, origins)
|
||||
if allowedOrigin == "" {
|
||||
if c.Request.Method == http.MethodOptions {
|
||||
c.AbortWithStatus(http.StatusForbidden)
|
||||
return
|
||||
}
|
||||
c.Next()
|
||||
return
|
||||
}
|
||||
|
||||
setVaryHeader(c.Writer.Header(), "Origin")
|
||||
c.Header("Access-Control-Allow-Origin", allowedOrigin)
|
||||
if opts.AllowCredentials && allowedOrigin != "*" {
|
||||
c.Header("Access-Control-Allow-Credentials", "true")
|
||||
}
|
||||
if len(exposedHeaders) > 0 {
|
||||
c.Header("Access-Control-Expose-Headers", strings.Join(exposedHeaders, ", "))
|
||||
}
|
||||
|
||||
if c.Request.Method == http.MethodOptions {
|
||||
setVaryHeader(c.Writer.Header(), "Access-Control-Request-Method")
|
||||
setVaryHeader(c.Writer.Header(), "Access-Control-Request-Headers")
|
||||
c.Header("Access-Control-Allow-Methods", strings.Join(methods, ", "))
|
||||
c.Header("Access-Control-Allow-Headers", strings.Join(headers, ", "))
|
||||
c.Header("Access-Control-Max-Age", formatMaxAgeSeconds(maxAge))
|
||||
c.AbortWithStatus(http.StatusNoContent)
|
||||
return
|
||||
}
|
||||
|
||||
c.Next()
|
||||
}
|
||||
}
|
||||
|
||||
func matchAllowedOrigin(origin string, allowedOrigins []string) string {
|
||||
for _, allowedOrigin := range allowedOrigins {
|
||||
if allowedOrigin == "*" {
|
||||
return "*"
|
||||
}
|
||||
if strings.EqualFold(origin, allowedOrigin) {
|
||||
return origin
|
||||
}
|
||||
}
|
||||
return ""
|
||||
}
|
||||
|
||||
func normalizeHeaderValues(values []string) []string {
|
||||
seen := make(map[string]struct{}, len(values))
|
||||
normalized := make([]string, 0, len(values))
|
||||
for _, value := range values {
|
||||
trimmed := strings.TrimSpace(value)
|
||||
if trimmed == "" {
|
||||
continue
|
||||
}
|
||||
key := strings.ToLower(trimmed)
|
||||
if _, exists := seen[key]; exists {
|
||||
continue
|
||||
}
|
||||
seen[key] = struct{}{}
|
||||
normalized = append(normalized, trimmed)
|
||||
}
|
||||
return normalized
|
||||
}
|
||||
|
||||
func normalizeHeaderValuesWithDefaults(values []string, defaults []string) []string {
|
||||
normalized := normalizeHeaderValues(values)
|
||||
if len(normalized) > 0 {
|
||||
return normalized
|
||||
}
|
||||
return normalizeHeaderValues(defaults)
|
||||
}
|
||||
|
||||
func setVaryHeader(header http.Header, value string) {
|
||||
existing := header.Values("Vary")
|
||||
for _, entry := range existing {
|
||||
for _, part := range strings.Split(entry, ",") {
|
||||
if strings.EqualFold(strings.TrimSpace(part), value) {
|
||||
return
|
||||
}
|
||||
}
|
||||
}
|
||||
header.Add("Vary", value)
|
||||
}
|
||||
|
||||
func formatMaxAgeSeconds(maxAge time.Duration) string {
|
||||
seconds := int(maxAge / time.Second)
|
||||
if seconds < 0 {
|
||||
seconds = 0
|
||||
}
|
||||
return strconv.Itoa(seconds)
|
||||
}
|
||||
@@ -5,6 +5,7 @@ import (
|
||||
"errors"
|
||||
"log"
|
||||
"net/http"
|
||||
"strings"
|
||||
"time"
|
||||
|
||||
taskclassforumclient "github.com/LoveLosita/smartflow/backend/client/taskclassforum"
|
||||
@@ -68,6 +69,13 @@ func RegisterRouters(
|
||||
limiter *ratelimit.RateLimiter,
|
||||
) *gin.Engine {
|
||||
r := gin.Default()
|
||||
r.Use(gatewaymiddleware.CORSMiddleware(gatewaymiddleware.CORSOptions{
|
||||
AllowedOrigins: readConfigList("cors.allowedOrigins"),
|
||||
AllowedMethods: readConfigList("cors.allowedMethods"),
|
||||
AllowedHeaders: readConfigList("cors.allowedHeaders"),
|
||||
ExposedHeaders: readConfigList("cors.exposedHeaders"),
|
||||
AllowCredentials: viper.GetBool("cors.allowCredentials"),
|
||||
}))
|
||||
apiGroup := r.Group("/api/v1")
|
||||
{
|
||||
apiGroup.GET("/health", func(c *gin.Context) {
|
||||
@@ -77,7 +85,7 @@ func RegisterRouters(
|
||||
})
|
||||
})
|
||||
|
||||
userauthapi.RegisterRoutes(apiGroup, userauthapi.NewUserHandler(authClient), authClient, limiter)
|
||||
userauthapi.RegisterRoutes(apiGroup, userauthapi.NewUserHandler(authClient, userauthapi.NewGeeTestServiceFromConfig()), authClient, limiter)
|
||||
forumapi.RegisterRoutes(apiGroup, forumapi.NewHandler(forumClient), authClient, cache, limiter)
|
||||
tokenstoreapi.RegisterRoutes(apiGroup, tokenstoreapi.NewHandler(tokenStoreClient), authClient, cache, limiter)
|
||||
|
||||
@@ -173,3 +181,53 @@ func RegisterRouters(
|
||||
log.Println("Routes setup completed")
|
||||
return r
|
||||
}
|
||||
|
||||
func readConfigList(key string) []string {
|
||||
values := viper.GetStringSlice(key)
|
||||
if len(values) > 0 {
|
||||
return compactConfigList(expandConfigList(values))
|
||||
}
|
||||
|
||||
raw := strings.TrimSpace(viper.GetString(key))
|
||||
if raw == "" {
|
||||
return nil
|
||||
}
|
||||
|
||||
splitted := strings.FieldsFunc(raw, func(r rune) bool {
|
||||
return r == ',' || r == '\n' || r == '\r' || r == ';'
|
||||
})
|
||||
return compactConfigList(splitted)
|
||||
}
|
||||
|
||||
func expandConfigList(values []string) []string {
|
||||
expanded := make([]string, 0, len(values))
|
||||
for _, value := range values {
|
||||
parts := strings.FieldsFunc(value, func(r rune) bool {
|
||||
return r == ',' || r == '\n' || r == '\r' || r == ';'
|
||||
})
|
||||
if len(parts) == 0 {
|
||||
expanded = append(expanded, value)
|
||||
continue
|
||||
}
|
||||
expanded = append(expanded, parts...)
|
||||
}
|
||||
return expanded
|
||||
}
|
||||
|
||||
func compactConfigList(values []string) []string {
|
||||
seen := make(map[string]struct{}, len(values))
|
||||
result := make([]string, 0, len(values))
|
||||
for _, value := range values {
|
||||
trimmed := strings.TrimSpace(value)
|
||||
if trimmed == "" {
|
||||
continue
|
||||
}
|
||||
key := strings.ToLower(trimmed)
|
||||
if _, exists := seen[key]; exists {
|
||||
continue
|
||||
}
|
||||
seen[key] = struct{}{}
|
||||
result = append(result, trimmed)
|
||||
}
|
||||
return result
|
||||
}
|
||||
|
||||
@@ -39,6 +39,9 @@ var (
|
||||
TokenUsageExceedsLimit = rootrespond.TokenUsageExceedsLimit
|
||||
ConversationNotFound = rootrespond.ConversationNotFound
|
||||
MissingConversationID = rootrespond.MissingConversationID
|
||||
CaptchaVerifyFailed = rootrespond.CaptchaVerifyFailed
|
||||
CaptchaInitFailed = rootrespond.CaptchaInitFailed
|
||||
CaptchaVerifyUnavailable = rootrespond.CaptchaVerifyUnavailable
|
||||
)
|
||||
|
||||
// RespWithData 为 gateway HTTP 门面生成带 data 的统一响应体。
|
||||
|
||||
Reference in New Issue
Block a user