entity.go 4.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130
  1. package entity
  2. import (
  3. "crypto/tls"
  4. "net"
  5. "strings"
  6. "time"
  7. "x-ui/util/common"
  8. )
  9. type Msg struct {
  10. Success bool `json:"success"`
  11. Msg string `json:"msg"`
  12. Obj interface{} `json:"obj"`
  13. }
  14. type AllSetting struct {
  15. WebListen string `json:"webListen" form:"webListen"`
  16. WebDomain string `json:"webDomain" form:"webDomain"`
  17. WebPort int `json:"webPort" form:"webPort"`
  18. WebCertFile string `json:"webCertFile" form:"webCertFile"`
  19. WebKeyFile string `json:"webKeyFile" form:"webKeyFile"`
  20. WebBasePath string `json:"webBasePath" form:"webBasePath"`
  21. SessionMaxAge int `json:"sessionMaxAge" form:"sessionMaxAge"`
  22. PageSize int `json:"pageSize" form:"pageSize"`
  23. ExpireDiff int `json:"expireDiff" form:"expireDiff"`
  24. TrafficDiff int `json:"trafficDiff" form:"trafficDiff"`
  25. RemarkModel string `json:"remarkModel" form:"remarkModel"`
  26. TgBotEnable bool `json:"tgBotEnable" form:"tgBotEnable"`
  27. TgBotToken string `json:"tgBotToken" form:"tgBotToken"`
  28. TgBotProxy string `json:"tgBotProxy" form:"tgBotProxy"`
  29. TgBotAPIServer string `json:"tgBotAPIServer" form:"tgBotAPIServer"`
  30. TgBotChatId string `json:"tgBotChatId" form:"tgBotChatId"`
  31. TgRunTime string `json:"tgRunTime" form:"tgRunTime"`
  32. TgBotBackup bool `json:"tgBotBackup" form:"tgBotBackup"`
  33. TgBotLoginNotify bool `json:"tgBotLoginNotify" form:"tgBotLoginNotify"`
  34. TgCpu int `json:"tgCpu" form:"tgCpu"`
  35. TgLang string `json:"tgLang" form:"tgLang"`
  36. TimeLocation string `json:"timeLocation" form:"timeLocation"`
  37. SecretEnable bool `json:"secretEnable" form:"secretEnable"`
  38. SubEnable bool `json:"subEnable" form:"subEnable"`
  39. SubSyncEnable bool `json:"subSyncEnable" form:"subSyncEnable"`
  40. SubListen string `json:"subListen" form:"subListen"`
  41. SubPort int `json:"subPort" form:"subPort"`
  42. SubPath string `json:"subPath" form:"subPath"`
  43. SubDomain string `json:"subDomain" form:"subDomain"`
  44. SubCertFile string `json:"subCertFile" form:"subCertFile"`
  45. SubKeyFile string `json:"subKeyFile" form:"subKeyFile"`
  46. SubUpdates int `json:"subUpdates" form:"subUpdates"`
  47. SubEncrypt bool `json:"subEncrypt" form:"subEncrypt"`
  48. SubShowInfo bool `json:"subShowInfo" form:"subShowInfo"`
  49. SubURI string `json:"subURI" form:"subURI"`
  50. SubJsonPath string `json:"subJsonPath" form:"subJsonPath"`
  51. SubJsonURI string `json:"subJsonURI" form:"subJsonURI"`
  52. SubJsonFragment string `json:"subJsonFragment" form:"subJsonFragment"`
  53. SubJsonNoises string `json:"subJsonNoises" form:"subJsonNoises"`
  54. SubJsonMux string `json:"subJsonMux" form:"subJsonMux"`
  55. SubJsonRules string `json:"subJsonRules" form:"subJsonRules"`
  56. Datepicker string `json:"datepicker" form:"datepicker"`
  57. }
  58. func (s *AllSetting) CheckValid() error {
  59. if s.WebListen != "" {
  60. ip := net.ParseIP(s.WebListen)
  61. if ip == nil {
  62. return common.NewError("web listen is not valid ip:", s.WebListen)
  63. }
  64. }
  65. if s.SubListen != "" {
  66. ip := net.ParseIP(s.SubListen)
  67. if ip == nil {
  68. return common.NewError("Sub listen is not valid ip:", s.SubListen)
  69. }
  70. }
  71. if s.WebPort <= 0 || s.WebPort > 65535 {
  72. return common.NewError("web port is not a valid port:", s.WebPort)
  73. }
  74. if s.SubPort <= 0 || s.SubPort > 65535 {
  75. return common.NewError("Sub port is not a valid port:", s.SubPort)
  76. }
  77. if (s.SubPort == s.WebPort) && (s.WebListen == s.SubListen) {
  78. return common.NewError("Sub and Web could not use same ip:port, ", s.SubListen, ":", s.SubPort, " & ", s.WebListen, ":", s.WebPort)
  79. }
  80. if s.WebCertFile != "" || s.WebKeyFile != "" {
  81. _, err := tls.LoadX509KeyPair(s.WebCertFile, s.WebKeyFile)
  82. if err != nil {
  83. return common.NewErrorf("cert file <%v> or key file <%v> invalid: %v", s.WebCertFile, s.WebKeyFile, err)
  84. }
  85. }
  86. if s.SubCertFile != "" || s.SubKeyFile != "" {
  87. _, err := tls.LoadX509KeyPair(s.SubCertFile, s.SubKeyFile)
  88. if err != nil {
  89. return common.NewErrorf("cert file <%v> or key file <%v> invalid: %v", s.SubCertFile, s.SubKeyFile, err)
  90. }
  91. }
  92. if !strings.HasPrefix(s.WebBasePath, "/") {
  93. s.WebBasePath = "/" + s.WebBasePath
  94. }
  95. if !strings.HasSuffix(s.WebBasePath, "/") {
  96. s.WebBasePath += "/"
  97. }
  98. if !strings.HasPrefix(s.SubPath, "/") {
  99. s.SubPath = "/" + s.SubPath
  100. }
  101. if !strings.HasSuffix(s.SubPath, "/") {
  102. s.SubPath += "/"
  103. }
  104. if !strings.HasPrefix(s.SubJsonPath, "/") {
  105. s.SubJsonPath = "/" + s.SubJsonPath
  106. }
  107. if !strings.HasSuffix(s.SubJsonPath, "/") {
  108. s.SubJsonPath += "/"
  109. }
  110. _, err := time.LoadLocation(s.TimeLocation)
  111. if err != nil {
  112. return common.NewError("time location not exist:", s.TimeLocation)
  113. }
  114. return nil
  115. }