1
0

entity.go 4.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127
  1. package entity
  2. import (
  3. "crypto/tls"
  4. "net"
  5. "strings"
  6. "time"
  7. "x-ui/util/common"
  8. )
  9. type Msg struct {
  10. Success bool `json:"success"`
  11. Msg string `json:"msg"`
  12. Obj interface{} `json:"obj"`
  13. }
  14. type AllSetting struct {
  15. WebListen string `json:"webListen" form:"webListen"`
  16. WebDomain string `json:"webDomain" form:"webDomain"`
  17. WebPort int `json:"webPort" form:"webPort"`
  18. WebCertFile string `json:"webCertFile" form:"webCertFile"`
  19. WebKeyFile string `json:"webKeyFile" form:"webKeyFile"`
  20. WebBasePath string `json:"webBasePath" form:"webBasePath"`
  21. SessionMaxAge int `json:"sessionMaxAge" form:"sessionMaxAge"`
  22. PageSize int `json:"pageSize" form:"pageSize"`
  23. ExpireDiff int `json:"expireDiff" form:"expireDiff"`
  24. TrafficDiff int `json:"trafficDiff" form:"trafficDiff"`
  25. RemarkModel string `json:"remarkModel" form:"remarkModel"`
  26. TgBotEnable bool `json:"tgBotEnable" form:"tgBotEnable"`
  27. TgBotToken string `json:"tgBotToken" form:"tgBotToken"`
  28. TgBotProxy string `json:"tgBotProxy" form:"tgBotProxy"`
  29. TgBotChatId string `json:"tgBotChatId" form:"tgBotChatId"`
  30. TgRunTime string `json:"tgRunTime" form:"tgRunTime"`
  31. TgBotBackup bool `json:"tgBotBackup" form:"tgBotBackup"`
  32. TgBotLoginNotify bool `json:"tgBotLoginNotify" form:"tgBotLoginNotify"`
  33. TgCpu int `json:"tgCpu" form:"tgCpu"`
  34. TgLang string `json:"tgLang" form:"tgLang"`
  35. TimeLocation string `json:"timeLocation" form:"timeLocation"`
  36. SecretEnable bool `json:"secretEnable" form:"secretEnable"`
  37. SubEnable bool `json:"subEnable" form:"subEnable"`
  38. SubListen string `json:"subListen" form:"subListen"`
  39. SubPort int `json:"subPort" form:"subPort"`
  40. SubPath string `json:"subPath" form:"subPath"`
  41. SubDomain string `json:"subDomain" form:"subDomain"`
  42. SubCertFile string `json:"subCertFile" form:"subCertFile"`
  43. SubKeyFile string `json:"subKeyFile" form:"subKeyFile"`
  44. SubUpdates int `json:"subUpdates" form:"subUpdates"`
  45. SubEncrypt bool `json:"subEncrypt" form:"subEncrypt"`
  46. SubShowInfo bool `json:"subShowInfo" form:"subShowInfo"`
  47. SubURI string `json:"subURI" form:"subURI"`
  48. SubJsonPath string `json:"subJsonPath" form:"subJsonPath"`
  49. SubJsonURI string `json:"subJsonURI" form:"subJsonURI"`
  50. SubJsonFragment string `json:"subJsonFragment" form:"subJsonFragment"`
  51. SubJsonMux string `json:"subJsonMux" form:"subJsonMux"`
  52. SubJsonRules string `json:"subJsonRules" form:"subJsonRules"`
  53. Datepicker string `json:"datepicker" form:"datepicker"`
  54. }
  55. func (s *AllSetting) CheckValid() error {
  56. if s.WebListen != "" {
  57. ip := net.ParseIP(s.WebListen)
  58. if ip == nil {
  59. return common.NewError("web listen is not valid ip:", s.WebListen)
  60. }
  61. }
  62. if s.SubListen != "" {
  63. ip := net.ParseIP(s.SubListen)
  64. if ip == nil {
  65. return common.NewError("Sub listen is not valid ip:", s.SubListen)
  66. }
  67. }
  68. if s.WebPort <= 0 || s.WebPort > 65535 {
  69. return common.NewError("web port is not a valid port:", s.WebPort)
  70. }
  71. if s.SubPort <= 0 || s.SubPort > 65535 {
  72. return common.NewError("Sub port is not a valid port:", s.SubPort)
  73. }
  74. if (s.SubPort == s.WebPort) && (s.WebListen == s.SubListen) {
  75. return common.NewError("Sub and Web could not use same ip:port, ", s.SubListen, ":", s.SubPort, " & ", s.WebListen, ":", s.WebPort)
  76. }
  77. if s.WebCertFile != "" || s.WebKeyFile != "" {
  78. _, err := tls.LoadX509KeyPair(s.WebCertFile, s.WebKeyFile)
  79. if err != nil {
  80. return common.NewErrorf("cert file <%v> or key file <%v> invalid: %v", s.WebCertFile, s.WebKeyFile, err)
  81. }
  82. }
  83. if s.SubCertFile != "" || s.SubKeyFile != "" {
  84. _, err := tls.LoadX509KeyPair(s.SubCertFile, s.SubKeyFile)
  85. if err != nil {
  86. return common.NewErrorf("cert file <%v> or key file <%v> invalid: %v", s.SubCertFile, s.SubKeyFile, err)
  87. }
  88. }
  89. if !strings.HasPrefix(s.WebBasePath, "/") {
  90. s.WebBasePath = "/" + s.WebBasePath
  91. }
  92. if !strings.HasSuffix(s.WebBasePath, "/") {
  93. s.WebBasePath += "/"
  94. }
  95. if !strings.HasPrefix(s.SubPath, "/") {
  96. s.SubPath = "/" + s.SubPath
  97. }
  98. if !strings.HasSuffix(s.SubPath, "/") {
  99. s.SubPath += "/"
  100. }
  101. if !strings.HasPrefix(s.SubJsonPath, "/") {
  102. s.SubJsonPath = "/" + s.SubJsonPath
  103. }
  104. if !strings.HasSuffix(s.SubJsonPath, "/") {
  105. s.SubJsonPath += "/"
  106. }
  107. _, err := time.LoadLocation(s.TimeLocation)
  108. if err != nil {
  109. return common.NewError("time location not exist:", s.TimeLocation)
  110. }
  111. return nil
  112. }