mirror of
https://github.com/router-for-me/CLIProxyAPI.git
synced 2026-05-14 10:46:28 +08:00
feat(management): expose additional OAuth and configuration helpers
- Added new helper methods for OAuth session management (`RegisterOAuthSession`, `CompleteOAuthSession`, etc.). - Introduced `WriteConfig` for persisting management configurations. - Exported `Handler` type and `NewHandler` constructors for SDK consumers.
This commit is contained in:
@@ -1,16 +1,21 @@
|
||||
// Package api exposes helpers for embedding CLIProxyAPI.
|
||||
//
|
||||
// It wraps internal management handler types so external projects can integrate
|
||||
// management endpoints without importing internal packages.
|
||||
// It wraps internal management handler types and helpers so external projects
|
||||
// can integrate management endpoints without importing internal packages.
|
||||
package api
|
||||
|
||||
import (
|
||||
"context"
|
||||
|
||||
"github.com/gin-gonic/gin"
|
||||
internalmanagement "github.com/router-for-me/CLIProxyAPI/v7/internal/api/handlers/management"
|
||||
coreauth "github.com/router-for-me/CLIProxyAPI/v7/sdk/cliproxy/auth"
|
||||
"github.com/router-for-me/CLIProxyAPI/v7/sdk/config"
|
||||
)
|
||||
|
||||
// Handler re-exports the management handler used by the internal HTTP API.
|
||||
type Handler = internalmanagement.Handler
|
||||
|
||||
// ManagementTokenRequester exposes a limited subset of management endpoints for requesting tokens.
|
||||
type ManagementTokenRequester interface {
|
||||
RequestAnthropicToken(*gin.Context)
|
||||
@@ -23,13 +28,23 @@ type ManagementTokenRequester interface {
|
||||
}
|
||||
|
||||
type managementTokenRequester struct {
|
||||
handler *internalmanagement.Handler
|
||||
handler *Handler
|
||||
}
|
||||
|
||||
// NewHandler creates a management handler for SDK consumers.
|
||||
func NewHandler(cfg *config.Config, configFilePath string, manager *coreauth.Manager) *Handler {
|
||||
return internalmanagement.NewHandler(cfg, configFilePath, manager)
|
||||
}
|
||||
|
||||
// NewHandlerWithoutConfigFilePath creates a management handler that skips config file persistence.
|
||||
func NewHandlerWithoutConfigFilePath(cfg *config.Config, manager *coreauth.Manager) *Handler {
|
||||
return internalmanagement.NewHandlerWithoutConfigFilePath(cfg, manager)
|
||||
}
|
||||
|
||||
// NewManagementTokenRequester creates a limited management handler exposing only token request endpoints.
|
||||
func NewManagementTokenRequester(cfg *config.Config, manager *coreauth.Manager) ManagementTokenRequester {
|
||||
return &managementTokenRequester{
|
||||
handler: internalmanagement.NewHandlerWithoutConfigFilePath(cfg, manager),
|
||||
handler: NewHandlerWithoutConfigFilePath(cfg, manager),
|
||||
}
|
||||
}
|
||||
|
||||
@@ -60,3 +75,63 @@ func (m *managementTokenRequester) GetAuthStatus(c *gin.Context) {
|
||||
func (m *managementTokenRequester) PostOAuthCallback(c *gin.Context) {
|
||||
m.handler.PostOAuthCallback(c)
|
||||
}
|
||||
|
||||
// WriteConfig persists management configuration to disk.
|
||||
func WriteConfig(path string, data []byte) error {
|
||||
return internalmanagement.WriteConfig(path, data)
|
||||
}
|
||||
|
||||
// RegisterOAuthSession records a pending OAuth callback state.
|
||||
func RegisterOAuthSession(state, provider string) {
|
||||
internalmanagement.RegisterOAuthSession(state, provider)
|
||||
}
|
||||
|
||||
// SetOAuthSessionError stores an OAuth session error message.
|
||||
func SetOAuthSessionError(state, message string) {
|
||||
internalmanagement.SetOAuthSessionError(state, message)
|
||||
}
|
||||
|
||||
// CompleteOAuthSession marks a single OAuth session as completed.
|
||||
func CompleteOAuthSession(state string) {
|
||||
internalmanagement.CompleteOAuthSession(state)
|
||||
}
|
||||
|
||||
// CompleteOAuthSessionsByProvider removes all pending OAuth sessions for a provider.
|
||||
func CompleteOAuthSessionsByProvider(provider string) int {
|
||||
return internalmanagement.CompleteOAuthSessionsByProvider(provider)
|
||||
}
|
||||
|
||||
// GetOAuthSession returns the current OAuth session state.
|
||||
func GetOAuthSession(state string) (provider string, status string, ok bool) {
|
||||
return internalmanagement.GetOAuthSession(state)
|
||||
}
|
||||
|
||||
// IsOAuthSessionPending reports whether a provider/state pair is still pending.
|
||||
func IsOAuthSessionPending(state, provider string) bool {
|
||||
return internalmanagement.IsOAuthSessionPending(state, provider)
|
||||
}
|
||||
|
||||
// ValidateOAuthState validates an OAuth state token.
|
||||
func ValidateOAuthState(state string) error {
|
||||
return internalmanagement.ValidateOAuthState(state)
|
||||
}
|
||||
|
||||
// NormalizeOAuthProvider normalizes a provider name to its canonical form.
|
||||
func NormalizeOAuthProvider(provider string) (string, error) {
|
||||
return internalmanagement.NormalizeOAuthProvider(provider)
|
||||
}
|
||||
|
||||
// WriteOAuthCallbackFile writes an OAuth callback payload to disk.
|
||||
func WriteOAuthCallbackFile(authDir, provider, state, code, errorMessage string) (string, error) {
|
||||
return internalmanagement.WriteOAuthCallbackFile(authDir, provider, state, code, errorMessage)
|
||||
}
|
||||
|
||||
// WriteOAuthCallbackFileForPendingSession writes an OAuth callback payload for a pending session.
|
||||
func WriteOAuthCallbackFileForPendingSession(authDir, provider, state, code, errorMessage string) (string, error) {
|
||||
return internalmanagement.WriteOAuthCallbackFileForPendingSession(authDir, provider, state, code, errorMessage)
|
||||
}
|
||||
|
||||
// PopulateAuthContext copies auth metadata from a Gin context into a request context.
|
||||
func PopulateAuthContext(ctx context.Context, c *gin.Context) context.Context {
|
||||
return internalmanagement.PopulateAuthContext(ctx, c)
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user