Просмотр исходного кода

Apply gofmt formatting to ensure consistent code style

ajasibley 5 месяцев назад
Родитель
Сommit
a6c1354fe9
4 измененных файлов с 24 добавлено и 24 удалено
  1. 5 5
      chat.go
  2. 6 8
      dns.go
  3. 7 6
      ssh.go
  4. 6 5
      util.go

+ 5 - 5
chat.go

@@ -9,7 +9,6 @@ const (
 	DNS_PORT   = 53  // DNS TXT chat (set to 0 to disable)
 )
 
-
 func main() {
 	// SSH Server
 	if SSH_PORT > 0 {
@@ -17,14 +16,14 @@ func main() {
 			StartSSHServer(SSH_PORT)
 		}()
 	}
-	
+
 	// DNS Server
 	if DNS_PORT > 0 {
 		go func() {
 			StartDNSServer(DNS_PORT)
 		}()
 	}
-	
+
 	// HTTP/HTTPS Server
 	// TODO: Implement graceful shutdown with signal handling
 	if HTTP_PORT > 0 || HTTPS_PORT > 0 {
@@ -33,7 +32,7 @@ func main() {
 				StartHTTPSServer(HTTPS_PORT, "cert.pem", "key.pem")
 			}()
 		}
-		
+
 		if HTTP_PORT > 0 {
 			StartHTTPServer(HTTP_PORT)
 		} else {
@@ -44,4 +43,5 @@ func main() {
 		// If no servers enabled, block forever
 		select {}
 	}
-}
+}
+

+ 6 - 8
dns.go

@@ -40,15 +40,14 @@ func handleDNS(w dns.ResponseWriter, r *dns.Msg) {
 
 		name := strings.TrimSuffix(strings.TrimSuffix(q.Name, "."), ".ch.at")
 		prompt := strings.ReplaceAll(name, "-", " ")
-		
-		
+
 		// Optimize prompt for DNS constraints
 		dnsPrompt := "Answer in 500 characters or less, no markdown formatting: " + prompt
 
 		// Stream LLM response with hard deadline
 		ch := make(chan string)
 		done := make(chan bool)
-		
+
 		go func() {
 			if _, err := LLM(dnsPrompt, ch); err != nil {
 				select {
@@ -62,8 +61,7 @@ func handleDNS(w dns.ResponseWriter, r *dns.Msg) {
 		var response strings.Builder
 		deadline := time.After(4 * time.Second) // Safe middle ground for DNS clients
 		channelClosed := false
-		
-		
+
 		for {
 			select {
 			case chunk, ok := <-ch:
@@ -94,7 +92,6 @@ func handleDNS(w dns.ResponseWriter, r *dns.Msg) {
 			// We hit the exact limit but stream is still going
 			finalResponse = finalResponse[:497] + "..."
 		}
-		
 
 		// Split response into 255-byte chunks for DNS TXT records
 		var txtStrings []string
@@ -105,7 +102,7 @@ func handleDNS(w dns.ResponseWriter, r *dns.Msg) {
 			}
 			txtStrings = append(txtStrings, finalResponse[i:end])
 		}
-		
+
 		txt := &dns.TXT{
 			Hdr: dns.RR_Header{
 				Name:   q.Name,
@@ -119,4 +116,5 @@ func handleDNS(w dns.ResponseWriter, r *dns.Msg) {
 	}
 
 	w.WriteMsg(m)
-}
+}
+

+ 7 - 6
ssh.go

@@ -32,14 +32,14 @@ func StartSSHServer(port int) error {
 
 	// Simple connection limiting
 	sem := make(chan struct{}, 100) // Max 100 concurrent SSH connections
-	
+
 	for {
 		conn, err := listener.Accept()
 		if err != nil {
 			// Connection error - continue accepting others
 			continue
 		}
-		
+
 		select {
 		case sem <- struct{}{}:
 			go func() {
@@ -134,7 +134,7 @@ func handleSession(channel ssh.Channel, requests <-chan *ssh.Request) {
 					if query == "exit" {
 						return
 					}
-					
+
 					// Get LLM response with streaming
 					ch := make(chan string)
 					go func() {
@@ -142,12 +142,12 @@ func handleSession(channel ssh.Channel, requests <-chan *ssh.Request) {
 							fmt.Fprintf(channel, "Error: %s\r\n", err.Error())
 						}
 					}()
-					
+
 					// Stream response as it arrives
 					for chunk := range ch {
 						fmt.Fprint(channel, chunk)
 					}
-					
+
 					fmt.Fprintf(channel, "\r\n> ")
 				}
 			} else if ch == '\b' || ch == 127 { // Backspace or Delete
@@ -179,4 +179,5 @@ func getOrCreateHostKey() (ssh.Signer, error) {
 	}
 
 	return ssh.NewSignerFromKey(key)
-}
+}
+

+ 6 - 5
util.go

@@ -10,7 +10,7 @@ import (
 
 // Rate limiters per IP with automatic cleanup
 var (
-	limiters sync.Map
+	limiters  sync.Map
 	lastClean = time.Now()
 )
 
@@ -20,7 +20,7 @@ func rateLimitAllow(addr string) bool {
 	if host, _, err := net.SplitHostPort(addr); err == nil {
 		ip = host
 	}
-	
+
 	// Clean old entries every hour
 	if time.Since(lastClean) > time.Hour {
 		lastClean = time.Now()
@@ -31,10 +31,11 @@ func rateLimitAllow(addr string) bool {
 			return true
 		})
 	}
-	
+
 	// Get or create limiter for this IP
 	limiterInterface, _ := limiters.LoadOrStore(ip, rate.NewLimiter(100.0/60, 10))
 	limiter := limiterInterface.(*rate.Limiter)
-	
+
 	return limiter.Allow()
-}
+}
+