重构项目

This commit is contained in:
2025-10-30 18:26:02 +08:00
parent fbc8bcd089
commit 7e10e2d2da
39 changed files with 728 additions and 464 deletions

View File

@ -1,18 +0,0 @@
package moudle
import (
"SafelineAPI/internal/app/safeLineApi"
"time"
)
func CheckNodes(nodes safeLineApi.Nodes, n int) safeLineApi.Nodes {
var need safeLineApi.Nodes
date := time.Now()
for _, node := range nodes {
days := int(node.ValidBefore.Sub(date).Hours() / 24)
if days <= n {
need = append(need, node)
}
}
return need
}

View File

@ -1,24 +0,0 @@
package moudle
import (
"SafelineAPI/internal/app/config"
"errors"
"github.com/go-acme/lego/v4/challenge"
)
func ChooseDNSProvider(config config.DNSProviderConfig) (challenge.Provider, error) {
if config.DNSProvider == "TencentCloud" {
return config.TencentCloud.Provider()
} else if config.DNSProvider == "AliCloud" {
return config.AliCloud.Provider()
} else if config.DNSProvider == "HuaweiCloud" {
return config.HuaweiCloud.Provider()
} else if config.DNSProvider == "WestCN" {
return config.WestCN.Provider()
} else if config.DNSProvider == "RainYun" {
return config.RainYun.Provider()
} else if config.DNSProvider == "Dode" {
return config.Dode.Provider()
}
return nil, errors.New("未正确设置 DNS 服务提供商")
}

View File

@ -1,83 +0,0 @@
package services
import (
"SafelineAPI/internal/app/logger"
"crypto"
"crypto/ecdsa"
"crypto/elliptic"
"crypto/rand"
"github.com/go-acme/lego/v4/certcrypto"
"github.com/go-acme/lego/v4/certificate"
"github.com/go-acme/lego/v4/challenge"
"github.com/go-acme/lego/v4/lego"
"github.com/go-acme/lego/v4/registration"
"os"
"path/filepath"
)
type MyUser struct {
Email string
Registration *registration.Resource
key crypto.PrivateKey
}
func (u *MyUser) GetEmail() string {
return u.Email
}
func (u *MyUser) GetRegistration() *registration.Resource {
return u.Registration
}
func (u *MyUser) GetPrivateKey() crypto.PrivateKey {
return u.key
}
func ApplyCert(domains []string, email, dir string, provider challenge.Provider) bool {
privateKey, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
if err != nil {
logger.Error.Printf("申请 %s%s%s 证书时发生错误: %s%s%s", logger.Cyan, domains, logger.Reset, logger.Red, err, logger.Reset)
return true
}
myUser := MyUser{
Email: email,
key: privateKey,
}
config := lego.NewConfig(&myUser)
config.Certificate.KeyType = certcrypto.RSA2048
client, err := lego.NewClient(config)
if err != nil {
logger.Error.Printf("申请 %s%s%s 证书时发生错误: %s%s%s", logger.Cyan, domains, logger.Reset, logger.Red, err, logger.Reset)
return true
}
err = client.Challenge.SetDNS01Provider(provider)
if err != nil {
logger.Error.Printf("申请 %s%s%s 证书时发生错误: %s%s%s", logger.Cyan, domains, logger.Reset, logger.Red, err, logger.Reset)
return true
}
reg, err := client.Registration.Register(registration.RegisterOptions{TermsOfServiceAgreed: true})
if err != nil {
logger.Error.Printf("申请 %s%s%s 证书时发生错误: %s%s%s", logger.Cyan, domains, logger.Reset, logger.Red, err, logger.Reset)
return true
}
myUser.Registration = reg
request := certificate.ObtainRequest{
Domains: domains,
Bundle: true,
}
certificates, err := client.Certificate.Obtain(request)
if err != nil {
logger.Error.Printf("申请 %s%s%s 证书时发生错误: %s%s%s", logger.Cyan, domains, logger.Reset, logger.Red, err, logger.Reset)
return true
}
err = os.WriteFile(filepath.Join(dir, domains[0]+".crt"), certificates.Certificate, os.ModePerm)
if err != nil {
logger.Error.Printf("保存 %s%s%s 证书时发生错误: %s%s%s", logger.Cyan, domains, logger.Reset, logger.Red, err, logger.Reset)
return true
}
err = os.WriteFile(filepath.Join(dir, domains[0]+".key"), certificates.PrivateKey, os.ModePerm)
if err != nil {
logger.Error.Printf("保存 %s%s%s 证书密钥时发生错误: %s%s%s", logger.Cyan, domains, logger.Reset, logger.Red, err, logger.Reset)
return true
}
return false
}

View File

@ -1,35 +1,35 @@
package utils
import (
"SafelineAPI/internal/app/safeLineApi"
"SafelineAPI/internal/app/SafelineRequest"
"io"
"net/http"
)
func AuthSafeLine(url safeLineApi.URL) (safeLineApi.AuthTokenResp, int, error) {
resp, err := Request(safeLineApi.GetTOKEN, url.AuthTokenUrl(), nil, nil)
func AuthSafeLine(url SafelineRequest.URL) (SafelineRequest.AuthTokenResp, int, error) {
resp, err := Request(SafelineRequest.GetTOKEN, url.AuthTokenUrl(), nil, nil)
if err != nil {
return safeLineApi.AuthTokenResp{}, 0, err
return SafelineRequest.AuthTokenResp{}, 0, err
}
defer resp.Body.Close()
data, _ := io.ReadAll(resp.Body)
var authTokenResp safeLineApi.AuthTokenResp
var authTokenResp SafelineRequest.AuthTokenResp
authTokenResp.Unmarshal(data)
return authTokenResp, resp.StatusCode, nil
}
func VerifyAuthToken(url safeLineApi.URL, token string) (safeLineApi.AuthTokenResp, int, error) {
func VerifyAuthToken(url SafelineRequest.URL, token string) (SafelineRequest.AuthTokenResp, int, error) {
header := http.Header{
"X-SLCE-API-TOKEN": []string{token},
}
resp, err := Request(safeLineApi.GetTOKEN, url.AuthTokenUrl(), nil, header)
resp, err := Request(SafelineRequest.GetTOKEN, url.AuthTokenUrl(), nil, header)
if err != nil {
return safeLineApi.AuthTokenResp{}, 0, err
return SafelineRequest.AuthTokenResp{}, 0, err
}
defer resp.Body.Close()
data, _ := io.ReadAll(resp.Body)
var authTokenResp safeLineApi.AuthTokenResp
var authTokenResp SafelineRequest.AuthTokenResp
authTokenResp.Unmarshal(data)
return authTokenResp, resp.StatusCode, nil
}

View File

@ -1,14 +1,14 @@
package utils
import (
"SafelineAPI/internal/app/SafelineRequest"
"SafelineAPI/internal/app/logger"
"SafelineAPI/internal/app/safeLineApi"
"io"
"net/http"
"os"
)
func GetList(url *safeLineApi.URL, token string) safeLineApi.Nodes {
func GetList(url *SafelineRequest.URL, token string) []SafelineRequest.Nodes {
header := http.Header{
"X-SLCE-API-TOKEN": []string{token},
}
@ -19,7 +19,7 @@ func GetList(url *safeLineApi.URL, token string) safeLineApi.Nodes {
}
defer resp.Body.Close()
data, _ := io.ReadAll(resp.Body)
var listResp safeLineApi.ListResp
var listResp SafelineRequest.ListResp
listResp.Unmarshal(data)
return listResp.Data.Nodes
}

View File

@ -1,13 +1,13 @@
package utils
import (
"SafelineAPI/internal/app/SafelineRequest"
"SafelineAPI/internal/app/logger"
"SafelineAPI/internal/app/safeLineApi"
"io"
"net/http"
)
func Upsert(url *safeLineApi.URL, token string, body io.Reader) safeLineApi.UpsertResp {
func Upsert(url *SafelineRequest.URL, token string, body io.Reader) SafelineRequest.UpsertResp {
header := http.Header{
"X-SLCE-API-TOKEN": []string{token},
"Content-Type": []string{"application/json"},
@ -15,11 +15,11 @@ func Upsert(url *safeLineApi.URL, token string, body io.Reader) safeLineApi.Upse
resp, err := Request(UPSERT, url.SSLCertUrl(), body, header)
if err != nil {
logger.Error.Printf("更新证书时发生错误: %s%s%s", logger.Red, err, logger.Reset)
return safeLineApi.UpsertResp{}
return SafelineRequest.UpsertResp{}
}
defer resp.Body.Close()
data, _ := io.ReadAll(resp.Body)
var upsertResp safeLineApi.UpsertResp
var upsertResp SafelineRequest.UpsertResp
upsertResp.Unmarshal(data)
return upsertResp
}

15
pkg/utils/kvp.go Normal file
View File

@ -0,0 +1,15 @@
package utils
import (
"strings"
)
type KVPair map[string]string
func (kvp *KVPair) Set(str string) {
kvps := strings.Split(str, ",")
for _, i := range kvps {
kv := strings.SplitN(i, "=", 2)
(*kvp)[kv[0]] = kv[1]
}
}