feat: Go 重写后端,替换 Python FastAPI

用 Go (Gin + GORM + SQLite) 重写整个后端:
- 单二进制部署,不依赖 Python/pip/SDK
- net/http 原生客户端,无 Cloudflare TLS 指纹问题
- 多阶段 Dockerfile:Node 构建前端 + Go 构建后端 + Alpine 运行
- 内存占用从 ~95MB 降至 ~3MB
- 完整保留所有 API 路由、JWT 认证、API Key 权限、审计日志
This commit is contained in:
zqq61
2026-03-16 02:11:48 +08:00
parent e897c99f59
commit faba565c66
34 changed files with 2430 additions and 17 deletions

84
middleware/api_key.go Normal file
View File

@@ -0,0 +1,84 @@
package middleware
import (
"encoding/json"
"net/http"
"time"
"github.com/gin-gonic/gin"
"airwallex-admin/models"
)
func APIKeyAuth() gin.HandlerFunc {
return func(c *gin.Context) {
apiKey := c.GetHeader("X-API-Key")
if apiKey == "" {
c.JSON(http.StatusUnauthorized, gin.H{"detail": "Missing API key"})
c.Abort()
return
}
var token models.ApiToken
result := models.DB.Where("token = ?", apiKey).First(&token)
if result.Error != nil {
c.JSON(http.StatusUnauthorized, gin.H{"detail": "Invalid API key"})
c.Abort()
return
}
if !token.IsActive {
c.JSON(http.StatusForbidden, gin.H{"detail": "API key is inactive"})
c.Abort()
return
}
if token.ExpiresAt != nil && token.ExpiresAt.Before(time.Now()) {
c.JSON(http.StatusForbidden, gin.H{"detail": "API key has expired"})
c.Abort()
return
}
// Update last_used_at
now := time.Now()
models.DB.Model(&token).Update("last_used_at", now)
c.Set("api_token", token)
c.Next()
}
}
func CheckPermission(requiredPerm string) gin.HandlerFunc {
return func(c *gin.Context) {
val, exists := c.Get("api_token")
if !exists {
c.JSON(http.StatusForbidden, gin.H{"detail": "No API token in context"})
c.Abort()
return
}
token, ok := val.(models.ApiToken)
if !ok {
c.JSON(http.StatusForbidden, gin.H{"detail": "Invalid API token in context"})
c.Abort()
return
}
var permissions []string
if err := json.Unmarshal([]byte(token.Permissions), &permissions); err != nil {
c.JSON(http.StatusForbidden, gin.H{"detail": "Invalid permissions format"})
c.Abort()
return
}
for _, perm := range permissions {
if perm == "*" || perm == requiredPerm {
c.Next()
return
}
}
c.JSON(http.StatusForbidden, gin.H{"detail": "Insufficient permissions"})
c.Abort()
}
}

69
middleware/auth.go Normal file
View File

@@ -0,0 +1,69 @@
package middleware
import (
"net/http"
"strings"
"time"
"github.com/gin-gonic/gin"
"github.com/golang-jwt/jwt/v5"
"airwallex-admin/config"
)
func GenerateToken(username string) (string, error) {
claims := jwt.MapClaims{
"sub": username,
"exp": time.Now().Add(time.Duration(config.Cfg.JWTExpireMinutes) * time.Minute).Unix(),
}
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
return token.SignedString([]byte(config.Cfg.SecretKey))
}
func JWTAuth() gin.HandlerFunc {
return func(c *gin.Context) {
authHeader := c.GetHeader("Authorization")
if authHeader == "" {
c.JSON(http.StatusUnauthorized, gin.H{"detail": "Missing authorization header"})
c.Abort()
return
}
parts := strings.SplitN(authHeader, " ", 2)
if len(parts) != 2 || strings.ToLower(parts[0]) != "bearer" {
c.JSON(http.StatusUnauthorized, gin.H{"detail": "Invalid authorization header format"})
c.Abort()
return
}
tokenString := parts[1]
token, err := jwt.Parse(tokenString, func(t *jwt.Token) (interface{}, error) {
if _, ok := t.Method.(*jwt.SigningMethodHMAC); !ok {
return nil, jwt.ErrSignatureInvalid
}
return []byte(config.Cfg.SecretKey), nil
})
if err != nil || !token.Valid {
c.JSON(http.StatusUnauthorized, gin.H{"detail": "Invalid or expired token"})
c.Abort()
return
}
claims, ok := token.Claims.(jwt.MapClaims)
if !ok {
c.JSON(http.StatusUnauthorized, gin.H{"detail": "Invalid token claims"})
c.Abort()
return
}
username, ok := claims["sub"].(string)
if !ok {
c.JSON(http.StatusUnauthorized, gin.H{"detail": "Invalid token subject"})
c.Abort()
return
}
c.Set("username", username)
c.Next()
}
}