source: code/trunk/server.go@ 598

Last change on this file since 598 was 597, checked in by contact, 4 years ago

Add support for IRCv3 WebSocket text subprotocol

Technically we aren't spec-compliant since we don't serve
binary.ircv3.net. Any complaints will be redirected to /dev/null.

File size: 5.0 KB
RevLine 
[98]1package soju
[1]2
3import (
4 "fmt"
[37]5 "log"
[472]6 "mime"
[1]7 "net"
[323]8 "net/http"
[449]9 "strings"
[24]10 "sync"
[323]11 "sync/atomic"
[67]12 "time"
[1]13
14 "gopkg.in/irc.v3"
[323]15 "nhooyr.io/websocket"
[370]16
17 "git.sr.ht/~emersion/soju/config"
[1]18)
19
[67]20// TODO: make configurable
[398]21var retryConnectDelay = time.Minute
[206]22var connectTimeout = 15 * time.Second
[205]23var writeTimeout = 10 * time.Second
[398]24var upstreamMessageDelay = 2 * time.Second
25var upstreamMessageBurst = 10
[67]26
[9]27type Logger interface {
28 Print(v ...interface{})
29 Printf(format string, v ...interface{})
30}
31
[21]32type prefixLogger struct {
33 logger Logger
34 prefix string
35}
36
37var _ Logger = (*prefixLogger)(nil)
38
39func (l *prefixLogger) Print(v ...interface{}) {
40 v = append([]interface{}{l.prefix}, v...)
41 l.logger.Print(v...)
42}
43
44func (l *prefixLogger) Printf(format string, v ...interface{}) {
45 v = append([]interface{}{l.prefix}, v...)
46 l.logger.Printf("%v"+format, v...)
47}
48
[10]49type Server struct {
[370]50 Hostname string
51 Logger Logger
52 HistoryLimit int
53 LogPath string
54 Debug bool
55 HTTPOrigins []string
56 AcceptProxyIPs config.IPSet
[385]57 Identd *Identd // can be nil
[22]58
[531]59 db Database
[449]60 stopWG sync.WaitGroup
[77]61
[449]62 lock sync.Mutex
63 listeners map[net.Listener]struct{}
64 users map[string]*user
[10]65}
66
[531]67func NewServer(db Database) *Server {
[37]68 return &Server{
[319]69 Logger: log.New(log.Writer(), "", log.LstdFlags),
70 HistoryLimit: 1000,
[449]71 db: db,
72 listeners: make(map[net.Listener]struct{}),
[319]73 users: make(map[string]*user),
[37]74 }
75}
76
[5]77func (s *Server) prefix() *irc.Prefix {
78 return &irc.Prefix{Name: s.Hostname}
79}
80
[449]81func (s *Server) Start() error {
[77]82 users, err := s.db.ListUsers()
83 if err != nil {
84 return err
85 }
[71]86
[77]87 s.lock.Lock()
[378]88 for i := range users {
89 s.addUserLocked(&users[i])
[71]90 }
[37]91 s.lock.Unlock()
92
[449]93 return nil
[10]94}
95
[449]96func (s *Server) Shutdown() {
97 s.lock.Lock()
98 for ln := range s.listeners {
99 if err := ln.Close(); err != nil {
100 s.Logger.Printf("failed to stop listener: %v", err)
101 }
102 }
103 for _, u := range s.users {
104 u.events <- eventStop{}
105 }
106 s.lock.Unlock()
107
108 s.stopWG.Wait()
109}
110
[329]111func (s *Server) createUser(user *User) (*user, error) {
112 s.lock.Lock()
113 defer s.lock.Unlock()
114
115 if _, ok := s.users[user.Username]; ok {
116 return nil, fmt.Errorf("user %q already exists", user.Username)
117 }
118
119 err := s.db.StoreUser(user)
120 if err != nil {
121 return nil, fmt.Errorf("could not create user in db: %v", err)
122 }
123
[378]124 return s.addUserLocked(user), nil
[329]125}
126
[563]127func (s *Server) forEachUser(f func(*user)) {
128 s.lock.Lock()
129 for _, u := range s.users {
130 f(u)
131 }
132 s.lock.Unlock()
133}
134
[38]135func (s *Server) getUser(name string) *user {
136 s.lock.Lock()
137 u := s.users[name]
138 s.lock.Unlock()
139 return u
140}
141
[378]142func (s *Server) addUserLocked(user *User) *user {
143 s.Logger.Printf("starting bouncer for user %q", user.Username)
144 u := newUser(s, user)
145 s.users[u.Username] = u
146
[449]147 s.stopWG.Add(1)
148
[378]149 go func() {
150 u.run()
151
152 s.lock.Lock()
153 delete(s.users, u.Username)
154 s.lock.Unlock()
[449]155
156 s.stopWG.Done()
[378]157 }()
158
159 return u
160}
161
[323]162var lastDownstreamID uint64 = 0
163
[347]164func (s *Server) handle(ic ircConn) {
[323]165 id := atomic.AddUint64(&lastDownstreamID, 1)
[347]166 dc := newDownstreamConn(s, ic, id)
[323]167 if err := dc.runUntilRegistered(); err != nil {
168 dc.logger.Print(err)
169 } else {
170 dc.user.events <- eventDownstreamConnected{dc}
171 if err := dc.readMessages(dc.user.events); err != nil {
172 dc.logger.Print(err)
173 }
174 dc.user.events <- eventDownstreamDisconnected{dc}
175 }
176 dc.Close()
177}
178
[3]179func (s *Server) Serve(ln net.Listener) error {
[449]180 s.lock.Lock()
181 s.listeners[ln] = struct{}{}
182 s.lock.Unlock()
183
184 s.stopWG.Add(1)
185
186 defer func() {
187 s.lock.Lock()
188 delete(s.listeners, ln)
189 s.lock.Unlock()
190
191 s.stopWG.Done()
192 }()
193
[1]194 for {
[323]195 conn, err := ln.Accept()
[449]196 // TODO: use net.ErrClosed when available
197 if err != nil && strings.Contains(err.Error(), "use of closed network connection") {
198 return nil
199 } else if err != nil {
[1]200 return fmt.Errorf("failed to accept connection: %v", err)
201 }
202
[347]203 go s.handle(newNetIRCConn(conn))
[1]204 }
205}
[323]206
207func (s *Server) ServeHTTP(w http.ResponseWriter, req *http.Request) {
208 conn, err := websocket.Accept(w, req, &websocket.AcceptOptions{
[597]209 Subprotocols: []string{"text.ircv3.net"}, // non-compliant, fight me
[323]210 OriginPatterns: s.HTTPOrigins,
211 })
212 if err != nil {
213 s.Logger.Printf("failed to serve HTTP connection: %v", err)
214 return
215 }
[345]216
[370]217 isProxy := false
[345]218 if host, _, err := net.SplitHostPort(req.RemoteAddr); err == nil {
219 if ip := net.ParseIP(host); ip != nil {
[370]220 isProxy = s.AcceptProxyIPs.Contains(ip)
[345]221 }
222 }
223
[474]224 // Only trust the Forwarded header field if this is a trusted proxy IP
[345]225 // to prevent users from spoofing the remote address
[344]226 remoteAddr := req.RemoteAddr
[472]227 if isProxy {
228 forwarded := parseForwarded(req.Header)
[473]229 if forwarded["for"] != "" {
230 remoteAddr = forwarded["for"]
[472]231 }
[344]232 }
[345]233
[347]234 s.handle(newWebsocketIRCConn(conn, remoteAddr))
[323]235}
[472]236
237func parseForwarded(h http.Header) map[string]string {
238 forwarded := h.Get("Forwarded")
239 if forwarded == "" {
[474]240 return map[string]string{
241 "for": h.Get("X-Forwarded-For"),
242 "proto": h.Get("X-Forwarded-Proto"),
243 "host": h.Get("X-Forwarded-Host"),
244 }
[472]245 }
246 // Hack to easily parse header parameters
247 _, params, _ := mime.ParseMediaType("hack; " + forwarded)
248 return params
249}
Note: See TracBrowser for help on using the repository browser.