feat: refactor key validation logic and restructure configuration handling; remove unused modules
parent
3cbd0d5e22
commit
9e88973ef7
|
@ -398,6 +398,7 @@ dependencies = [
|
||||||
"reqwest",
|
"reqwest",
|
||||||
"serde",
|
"serde",
|
||||||
"serde_json",
|
"serde_json",
|
||||||
|
"thiserror",
|
||||||
"tokio",
|
"tokio",
|
||||||
"toml 0.9.2",
|
"toml 0.9.2",
|
||||||
"url",
|
"url",
|
||||||
|
|
|
@ -23,3 +23,4 @@ async-stream = "0.3"
|
||||||
figment = { version = "0.10", features = ["env", "toml"] }
|
figment = { version = "0.10", features = ["env", "toml"] }
|
||||||
serde = { version = "1.0", features = ["derive"] }
|
serde = { version = "1.0", features = ["derive"] }
|
||||||
toml = "0.9"
|
toml = "0.9"
|
||||||
|
thiserror = "2.0.12"
|
||||||
|
|
|
@ -1,5 +1,3 @@
|
||||||
mod basic_client;
|
mod config;
|
||||||
mod basic_config;
|
|
||||||
|
|
||||||
pub use basic_client::client_builder;
|
pub use config::{KeyCheckerConfig, TEST_MESSAGE_BODY};
|
||||||
pub use basic_config::{KeyCheckerConfig, TEST_MESSAGE_BODY};
|
|
||||||
|
|
|
@ -0,0 +1,15 @@
|
||||||
|
use thiserror::Error;
|
||||||
|
|
||||||
|
#[derive(Error, Debug)]
|
||||||
|
pub enum ValidationError {
|
||||||
|
#[error("HTTP error: {0}")]
|
||||||
|
HttpRequest(#[from] reqwest::Error),
|
||||||
|
|
||||||
|
#[error("Key is unavailable or invalid")]
|
||||||
|
KeyUnavailable,
|
||||||
|
|
||||||
|
#[error("Key validation failed: {0}")]
|
||||||
|
Invalid(String),
|
||||||
|
}
|
||||||
|
|
||||||
|
pub type Result<T> = std::result::Result<T, ValidationError>;
|
|
@ -1,78 +0,0 @@
|
||||||
use anyhow::Result;
|
|
||||||
use backon::{ExponentialBuilder, Retryable};
|
|
||||||
use reqwest::{Client, StatusCode};
|
|
||||||
use tokio::time::Duration;
|
|
||||||
use url::Url;
|
|
||||||
|
|
||||||
use crate::config::TEST_MESSAGE_BODY;
|
|
||||||
use crate::types::{GeminiKey, KeyStatus};
|
|
||||||
|
|
||||||
pub async fn validate_key_with_retry(
|
|
||||||
client: Client,
|
|
||||||
full_url: Url,
|
|
||||||
key: GeminiKey,
|
|
||||||
) -> Option<GeminiKey> {
|
|
||||||
let retry_policy = ExponentialBuilder::default()
|
|
||||||
.with_max_times(3)
|
|
||||||
.with_min_delay(Duration::from_secs(3))
|
|
||||||
.with_max_delay(Duration::from_secs(5));
|
|
||||||
|
|
||||||
let result = (async || match keytest(client.to_owned(), &full_url, &key).await {
|
|
||||||
Ok(KeyStatus::Valid) => {
|
|
||||||
println!("Key: {}... -> SUCCESS", &key.as_ref()[..10]);
|
|
||||||
Ok(Some(key.clone()))
|
|
||||||
}
|
|
||||||
Ok(KeyStatus::Invalid) => {
|
|
||||||
println!("Key: {}... -> INVALID (Forbidden)", &key.as_ref()[..10]);
|
|
||||||
Ok(None)
|
|
||||||
}
|
|
||||||
Ok(KeyStatus::Retryable(reason)) => {
|
|
||||||
eprintln!(
|
|
||||||
"Key: {}... -> RETRYABLE (Reason: {})",
|
|
||||||
&key.as_ref()[..10],
|
|
||||||
reason
|
|
||||||
);
|
|
||||||
Err(anyhow::anyhow!("Retryable error: {}", reason))
|
|
||||||
}
|
|
||||||
Err(e) => {
|
|
||||||
eprintln!(
|
|
||||||
"Key: {}... -> NETWORK ERROR (Reason: {})",
|
|
||||||
&key.as_ref()[..10],
|
|
||||||
e
|
|
||||||
);
|
|
||||||
Err(e)
|
|
||||||
}
|
|
||||||
})
|
|
||||||
.retry(retry_policy)
|
|
||||||
.await;
|
|
||||||
|
|
||||||
match result {
|
|
||||||
Ok(key_result) => key_result,
|
|
||||||
Err(_) => {
|
|
||||||
eprintln!(
|
|
||||||
"Key: {}... -> FAILED after all retries.",
|
|
||||||
&key.as_ref()[..10]
|
|
||||||
);
|
|
||||||
None
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
async fn keytest(client: Client, full_url: &Url, key: &GeminiKey) -> Result<KeyStatus> {
|
|
||||||
let response = client
|
|
||||||
.post(full_url.clone())
|
|
||||||
.header("Content-Type", "application/json")
|
|
||||||
.header("X-goog-api-key", key.as_ref())
|
|
||||||
.json(&*TEST_MESSAGE_BODY)
|
|
||||||
.send()
|
|
||||||
.await?;
|
|
||||||
|
|
||||||
let status = response.status();
|
|
||||||
|
|
||||||
let key_status = match status {
|
|
||||||
StatusCode::OK => KeyStatus::Valid,
|
|
||||||
StatusCode::FORBIDDEN | StatusCode::UNAUTHORIZED => KeyStatus::Invalid,
|
|
||||||
other => KeyStatus::Retryable(format!("Received status {}, will retry.", other)),
|
|
||||||
};
|
|
||||||
Ok(key_status)
|
|
||||||
}
|
|
|
@ -1,8 +1,8 @@
|
||||||
pub mod adapters;
|
pub mod adapters;
|
||||||
pub mod config;
|
pub mod config;
|
||||||
pub mod key_validator;
|
pub mod error;
|
||||||
pub mod types;
|
pub mod types;
|
||||||
pub mod validation;
|
pub mod service;
|
||||||
|
|
||||||
// ASCII art for Gemini
|
// ASCII art for Gemini
|
||||||
pub const BANNER: &str = r#"
|
pub const BANNER: &str = r#"
|
||||||
|
@ -12,4 +12,3 @@ pub const BANNER: &str = r#"
|
||||||
/ /_/ // __// / / / / // // / / // /
|
/ /_/ // __// / / / / // // / / // /
|
||||||
\____/ \___//_/ /_/ /_//_//_/ /_//_/
|
\____/ \___//_/ /_/ /_//_//_/ /_//_/
|
||||||
"#;
|
"#;
|
||||||
|
|
||||||
|
|
22
src/main.rs
22
src/main.rs
|
@ -1,30 +1,20 @@
|
||||||
use anyhow::Result;
|
use anyhow::Result;
|
||||||
use gemini_keychecker::{
|
use gemini_keychecker::{BANNER, config::KeyCheckerConfig, service::start_validation};
|
||||||
BANNER,
|
|
||||||
adapters::load_keys,
|
|
||||||
config::{KeyCheckerConfig, client_builder},
|
|
||||||
validation::ValidationService,
|
|
||||||
};
|
|
||||||
|
|
||||||
use mimalloc::MiMalloc;
|
use mimalloc::MiMalloc;
|
||||||
|
|
||||||
#[global_allocator]
|
#[global_allocator]
|
||||||
static GLOBAL: MiMalloc = MiMalloc;
|
static GLOBAL: MiMalloc = MiMalloc;
|
||||||
|
|
||||||
/// Main function - orchestrates the key validation process
|
/// Main function - displays banner and starts validation service
|
||||||
#[tokio::main]
|
#[tokio::main]
|
||||||
async fn main() -> Result<()> {
|
async fn main() -> Result<()> {
|
||||||
let config = KeyCheckerConfig::load_config().unwrap();
|
|
||||||
|
|
||||||
// Display banner and configuration status at startup
|
// Display banner and configuration status at startup
|
||||||
println!("{BANNER}");
|
println!("{BANNER}");
|
||||||
|
|
||||||
|
let config = KeyCheckerConfig::load_config()?;
|
||||||
println!("{config}");
|
println!("{config}");
|
||||||
|
|
||||||
let keys = load_keys(config.input_path.as_path())?;
|
// Start validation service
|
||||||
let client = client_builder(&config)?;
|
start_validation().await
|
||||||
|
|
||||||
let validation_service = ValidationService::new(config, client);
|
|
||||||
validation_service.validate_keys(keys).await?;
|
|
||||||
|
|
||||||
Ok(())
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,8 +1,6 @@
|
||||||
use std::time::Duration;
|
|
||||||
|
|
||||||
use reqwest::Client;
|
|
||||||
|
|
||||||
use crate::config::KeyCheckerConfig;
|
use crate::config::KeyCheckerConfig;
|
||||||
|
use reqwest::Client;
|
||||||
|
use std::time::Duration;
|
||||||
|
|
||||||
pub fn client_builder(config: &KeyCheckerConfig) -> Result<Client, reqwest::Error> {
|
pub fn client_builder(config: &KeyCheckerConfig) -> Result<Client, reqwest::Error> {
|
||||||
// Set the maximum number of connections per host based on concurrency.
|
// Set the maximum number of connections per host based on concurrency.
|
|
@ -0,0 +1,63 @@
|
||||||
|
use backon::{ExponentialBuilder, Retryable};
|
||||||
|
use reqwest::{Client, IntoUrl, StatusCode};
|
||||||
|
use tokio::time::Duration;
|
||||||
|
use url::Url;
|
||||||
|
|
||||||
|
use crate::config::TEST_MESSAGE_BODY;
|
||||||
|
use crate::error::ValidationError;
|
||||||
|
use crate::types::GeminiKey;
|
||||||
|
|
||||||
|
pub async fn validate_key(
|
||||||
|
client: Client,
|
||||||
|
api_endpoint: impl IntoUrl,
|
||||||
|
api_key: GeminiKey,
|
||||||
|
) -> Result<GeminiKey, ValidationError> {
|
||||||
|
let api_endpoint = api_endpoint.into_url()?;
|
||||||
|
|
||||||
|
match send_test_request(client, &api_endpoint, api_key.clone()).await {
|
||||||
|
Ok(response) => {
|
||||||
|
let status = response.status();
|
||||||
|
match status {
|
||||||
|
StatusCode::OK => Ok(api_key),
|
||||||
|
StatusCode::UNAUTHORIZED
|
||||||
|
| StatusCode::FORBIDDEN
|
||||||
|
| StatusCode::TOO_MANY_REQUESTS => Err(ValidationError::KeyUnavailable),
|
||||||
|
_ => Err(ValidationError::HttpRequest(
|
||||||
|
response.error_for_status().unwrap_err(),
|
||||||
|
)),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
Err(e) => Err(ValidationError::HttpRequest(e)),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
async fn send_test_request(
|
||||||
|
client: Client,
|
||||||
|
api_endpoint: &Url,
|
||||||
|
key: GeminiKey,
|
||||||
|
) -> Result<reqwest::Response, reqwest::Error> {
|
||||||
|
let retry_policy = ExponentialBuilder::default()
|
||||||
|
.with_max_times(3)
|
||||||
|
.with_min_delay(Duration::from_secs(3))
|
||||||
|
.with_max_delay(Duration::from_secs(5));
|
||||||
|
|
||||||
|
(async || {
|
||||||
|
let response = client
|
||||||
|
.post(api_endpoint.clone())
|
||||||
|
.header("Content-Type", "application/json")
|
||||||
|
.header("X-goog-api-key", key.as_ref())
|
||||||
|
.json(&*TEST_MESSAGE_BODY)
|
||||||
|
.send()
|
||||||
|
.await?;
|
||||||
|
|
||||||
|
response.error_for_status()
|
||||||
|
})
|
||||||
|
.retry(&retry_policy)
|
||||||
|
.when(|e: &reqwest::Error| {
|
||||||
|
!matches!(
|
||||||
|
e.status(),
|
||||||
|
Some(StatusCode::FORBIDDEN | StatusCode::UNAUTHORIZED)
|
||||||
|
)
|
||||||
|
})
|
||||||
|
.await
|
||||||
|
}
|
|
@ -0,0 +1,7 @@
|
||||||
|
pub mod http_client;
|
||||||
|
pub mod key_tester;
|
||||||
|
pub mod validation;
|
||||||
|
|
||||||
|
pub use http_client::client_builder;
|
||||||
|
pub use key_tester::validate_key;
|
||||||
|
pub use validation::{ValidationService, start_validation};
|
|
@ -5,9 +5,9 @@ use reqwest::Client;
|
||||||
use std::time::Instant;
|
use std::time::Instant;
|
||||||
use tokio::{fs, io::AsyncWriteExt, sync::mpsc};
|
use tokio::{fs, io::AsyncWriteExt, sync::mpsc};
|
||||||
|
|
||||||
use crate::adapters::write_keys_txt_file;
|
use super::{key_tester::validate_key, http_client::client_builder};
|
||||||
|
use crate::adapters::{write_keys_txt_file, load_keys};
|
||||||
use crate::config::KeyCheckerConfig;
|
use crate::config::KeyCheckerConfig;
|
||||||
use crate::key_validator::validate_key_with_retry;
|
|
||||||
use crate::types::GeminiKey;
|
use crate::types::GeminiKey;
|
||||||
|
|
||||||
pub struct ValidationService {
|
pub struct ValidationService {
|
||||||
|
@ -48,9 +48,9 @@ impl ValidationService {
|
||||||
|
|
||||||
// Create stream to validate keys concurrently
|
// Create stream to validate keys concurrently
|
||||||
let valid_keys_stream = stream
|
let valid_keys_stream = stream
|
||||||
.map(|key| validate_key_with_retry(self.client.to_owned(), self.full_url.clone(), key))
|
.map(|key| validate_key(self.client.clone(), self.full_url.clone(), key))
|
||||||
.buffer_unordered(self.config.concurrency)
|
.buffer_unordered(self.config.concurrency)
|
||||||
.filter_map(|r| async { r });
|
.filter_map(|result| async { result.ok() });
|
||||||
pin_mut!(valid_keys_stream);
|
pin_mut!(valid_keys_stream);
|
||||||
|
|
||||||
// Open output file for writing valid keys
|
// Open output file for writing valid keys
|
||||||
|
@ -72,3 +72,18 @@ impl ValidationService {
|
||||||
Ok(())
|
Ok(())
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/// 启动验证服务 - 封装了所有启动逻辑
|
||||||
|
pub async fn start_validation() -> Result<()> {
|
||||||
|
let config = KeyCheckerConfig::load_config()?;
|
||||||
|
|
||||||
|
// 加载密钥
|
||||||
|
let keys = load_keys(config.input_path.as_path())?;
|
||||||
|
|
||||||
|
// 构建HTTP客户端
|
||||||
|
let client = client_builder(&config)?;
|
||||||
|
|
||||||
|
// 创建验证服务并启动
|
||||||
|
let validation_service = ValidationService::new(config, client);
|
||||||
|
validation_service.validate_keys(keys).await
|
||||||
|
}
|
|
@ -2,13 +2,6 @@ use regex::Regex;
|
||||||
use std::str::FromStr;
|
use std::str::FromStr;
|
||||||
use std::sync::LazyLock;
|
use std::sync::LazyLock;
|
||||||
|
|
||||||
#[derive(Debug)]
|
|
||||||
pub enum KeyStatus {
|
|
||||||
Valid,
|
|
||||||
Invalid,
|
|
||||||
Retryable(String),
|
|
||||||
}
|
|
||||||
|
|
||||||
#[derive(Debug, Clone)]
|
#[derive(Debug, Clone)]
|
||||||
pub struct GeminiKey {
|
pub struct GeminiKey {
|
||||||
pub inner: String,
|
pub inner: String,
|
||||||
|
|
Loading…
Reference in New Issue