entity.go 4.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128
  1. package entity
  2. import (
  3. "crypto/tls"
  4. "net"
  5. "strings"
  6. "time"
  7. "x-ui/util/common"
  8. )
  9. type Msg struct {
  10. Success bool `json:"success"`
  11. Msg string `json:"msg"`
  12. Obj interface{} `json:"obj"`
  13. }
  14. type AllSetting struct {
  15. WebListen string `json:"webListen" form:"webListen"`
  16. WebDomain string `json:"webDomain" form:"webDomain"`
  17. WebPort int `json:"webPort" form:"webPort"`
  18. WebCertFile string `json:"webCertFile" form:"webCertFile"`
  19. WebKeyFile string `json:"webKeyFile" form:"webKeyFile"`
  20. WebBasePath string `json:"webBasePath" form:"webBasePath"`
  21. SessionMaxAge int `json:"sessionMaxAge" form:"sessionMaxAge"`
  22. PageSize int `json:"pageSize" form:"pageSize"`
  23. ExpireDiff int `json:"expireDiff" form:"expireDiff"`
  24. TrafficDiff int `json:"trafficDiff" form:"trafficDiff"`
  25. RemarkModel string `json:"remarkModel" form:"remarkModel"`
  26. TgBotEnable bool `json:"tgBotEnable" form:"tgBotEnable"`
  27. TgBotToken string `json:"tgBotToken" form:"tgBotToken"`
  28. TgBotProxy string `json:"tgBotProxy" form:"tgBotProxy"`
  29. TgBotChatId string `json:"tgBotChatId" form:"tgBotChatId"`
  30. TgRunTime string `json:"tgRunTime" form:"tgRunTime"`
  31. TgBotBackup bool `json:"tgBotBackup" form:"tgBotBackup"`
  32. TgBotLoginNotify bool `json:"tgBotLoginNotify" form:"tgBotLoginNotify"`
  33. TgCpu int `json:"tgCpu" form:"tgCpu"`
  34. TgLang string `json:"tgLang" form:"tgLang"`
  35. TimeLocation string `json:"timeLocation" form:"timeLocation"`
  36. SecretEnable bool `json:"secretEnable" form:"secretEnable"`
  37. SubEnable bool `json:"subEnable" form:"subEnable"`
  38. SubListen string `json:"subListen" form:"subListen"`
  39. SubPort int `json:"subPort" form:"subPort"`
  40. SubPath string `json:"subPath" form:"subPath"`
  41. SubDomain string `json:"subDomain" form:"subDomain"`
  42. SubCertFile string `json:"subCertFile" form:"subCertFile"`
  43. SubKeyFile string `json:"subKeyFile" form:"subKeyFile"`
  44. SubUpdates int `json:"subUpdates" form:"subUpdates"`
  45. SubEncrypt bool `json:"subEncrypt" form:"subEncrypt"`
  46. SubShowInfo bool `json:"subShowInfo" form:"subShowInfo"`
  47. SubURI string `json:"subURI" form:"subURI"`
  48. SubJsonPath string `json:"subJsonPath" form:"subJsonPath"`
  49. SubJsonURI string `json:"subJsonURI" form:"subJsonURI"`
  50. SubJsonFragment string `json:"subJsonFragment" form:"subJsonFragment"`
  51. SubJsonNoise string `json:"subJsonNoise" form:"subJsonNoise"`
  52. SubJsonMux string `json:"subJsonMux" form:"subJsonMux"`
  53. SubJsonRules string `json:"subJsonRules" form:"subJsonRules"`
  54. Datepicker string `json:"datepicker" form:"datepicker"`
  55. }
  56. func (s *AllSetting) CheckValid() error {
  57. if s.WebListen != "" {
  58. ip := net.ParseIP(s.WebListen)
  59. if ip == nil {
  60. return common.NewError("web listen is not valid ip:", s.WebListen)
  61. }
  62. }
  63. if s.SubListen != "" {
  64. ip := net.ParseIP(s.SubListen)
  65. if ip == nil {
  66. return common.NewError("Sub listen is not valid ip:", s.SubListen)
  67. }
  68. }
  69. if s.WebPort <= 0 || s.WebPort > 65535 {
  70. return common.NewError("web port is not a valid port:", s.WebPort)
  71. }
  72. if s.SubPort <= 0 || s.SubPort > 65535 {
  73. return common.NewError("Sub port is not a valid port:", s.SubPort)
  74. }
  75. if (s.SubPort == s.WebPort) && (s.WebListen == s.SubListen) {
  76. return common.NewError("Sub and Web could not use same ip:port, ", s.SubListen, ":", s.SubPort, " & ", s.WebListen, ":", s.WebPort)
  77. }
  78. if s.WebCertFile != "" || s.WebKeyFile != "" {
  79. _, err := tls.LoadX509KeyPair(s.WebCertFile, s.WebKeyFile)
  80. if err != nil {
  81. return common.NewErrorf("cert file <%v> or key file <%v> invalid: %v", s.WebCertFile, s.WebKeyFile, err)
  82. }
  83. }
  84. if s.SubCertFile != "" || s.SubKeyFile != "" {
  85. _, err := tls.LoadX509KeyPair(s.SubCertFile, s.SubKeyFile)
  86. if err != nil {
  87. return common.NewErrorf("cert file <%v> or key file <%v> invalid: %v", s.SubCertFile, s.SubKeyFile, err)
  88. }
  89. }
  90. if !strings.HasPrefix(s.WebBasePath, "/") {
  91. s.WebBasePath = "/" + s.WebBasePath
  92. }
  93. if !strings.HasSuffix(s.WebBasePath, "/") {
  94. s.WebBasePath += "/"
  95. }
  96. if !strings.HasPrefix(s.SubPath, "/") {
  97. s.SubPath = "/" + s.SubPath
  98. }
  99. if !strings.HasSuffix(s.SubPath, "/") {
  100. s.SubPath += "/"
  101. }
  102. if !strings.HasPrefix(s.SubJsonPath, "/") {
  103. s.SubJsonPath = "/" + s.SubJsonPath
  104. }
  105. if !strings.HasSuffix(s.SubJsonPath, "/") {
  106. s.SubJsonPath += "/"
  107. }
  108. _, err := time.LoadLocation(s.TimeLocation)
  109. if err != nil {
  110. return common.NewError("time location not exist:", s.TimeLocation)
  111. }
  112. return nil
  113. }