source: code/trunk/server.go@ 611

Last change on this file since 611 was 605, checked in by contact, 4 years ago

Add "server status" command

Right now, it prints the number of active users and number of
downstream connections.

File size: 5.3 KB
RevLine 
[98]1package soju
[1]2
3import (
4 "fmt"
[37]5 "log"
[472]6 "mime"
[1]7 "net"
[323]8 "net/http"
[24]9 "sync"
[323]10 "sync/atomic"
[67]11 "time"
[1]12
13 "gopkg.in/irc.v3"
[323]14 "nhooyr.io/websocket"
[370]15
16 "git.sr.ht/~emersion/soju/config"
[1]17)
18
[67]19// TODO: make configurable
[398]20var retryConnectDelay = time.Minute
[206]21var connectTimeout = 15 * time.Second
[205]22var writeTimeout = 10 * time.Second
[398]23var upstreamMessageDelay = 2 * time.Second
24var upstreamMessageBurst = 10
[67]25
[9]26type Logger interface {
27 Print(v ...interface{})
28 Printf(format string, v ...interface{})
29}
30
[21]31type prefixLogger struct {
32 logger Logger
33 prefix string
34}
35
36var _ Logger = (*prefixLogger)(nil)
37
38func (l *prefixLogger) Print(v ...interface{}) {
39 v = append([]interface{}{l.prefix}, v...)
40 l.logger.Print(v...)
41}
42
43func (l *prefixLogger) Printf(format string, v ...interface{}) {
44 v = append([]interface{}{l.prefix}, v...)
45 l.logger.Printf("%v"+format, v...)
46}
47
[10]48type Server struct {
[370]49 Hostname string
50 Logger Logger
51 HistoryLimit int
52 LogPath string
53 Debug bool
54 HTTPOrigins []string
55 AcceptProxyIPs config.IPSet
[385]56 Identd *Identd // can be nil
[22]57
[605]58 db Database
59 stopWG sync.WaitGroup
60 connCount int64 // atomic
[77]61
[449]62 lock sync.Mutex
63 listeners map[net.Listener]struct{}
64 users map[string]*user
[10]65}
66
[531]67func NewServer(db Database) *Server {
[37]68 return &Server{
[319]69 Logger: log.New(log.Writer(), "", log.LstdFlags),
70 HistoryLimit: 1000,
[449]71 db: db,
72 listeners: make(map[net.Listener]struct{}),
[319]73 users: make(map[string]*user),
[37]74 }
75}
76
[5]77func (s *Server) prefix() *irc.Prefix {
78 return &irc.Prefix{Name: s.Hostname}
79}
80
[449]81func (s *Server) Start() error {
[77]82 users, err := s.db.ListUsers()
83 if err != nil {
84 return err
85 }
[71]86
[77]87 s.lock.Lock()
[378]88 for i := range users {
89 s.addUserLocked(&users[i])
[71]90 }
[37]91 s.lock.Unlock()
92
[449]93 return nil
[10]94}
95
[449]96func (s *Server) Shutdown() {
97 s.lock.Lock()
98 for ln := range s.listeners {
99 if err := ln.Close(); err != nil {
100 s.Logger.Printf("failed to stop listener: %v", err)
101 }
102 }
103 for _, u := range s.users {
104 u.events <- eventStop{}
105 }
106 s.lock.Unlock()
107
108 s.stopWG.Wait()
[599]109
110 if err := s.db.Close(); err != nil {
111 s.Logger.Printf("failed to close DB: %v", err)
112 }
[449]113}
114
[329]115func (s *Server) createUser(user *User) (*user, error) {
116 s.lock.Lock()
117 defer s.lock.Unlock()
118
119 if _, ok := s.users[user.Username]; ok {
120 return nil, fmt.Errorf("user %q already exists", user.Username)
121 }
122
123 err := s.db.StoreUser(user)
124 if err != nil {
125 return nil, fmt.Errorf("could not create user in db: %v", err)
126 }
127
[378]128 return s.addUserLocked(user), nil
[329]129}
130
[563]131func (s *Server) forEachUser(f func(*user)) {
132 s.lock.Lock()
133 for _, u := range s.users {
134 f(u)
135 }
136 s.lock.Unlock()
137}
138
[38]139func (s *Server) getUser(name string) *user {
140 s.lock.Lock()
141 u := s.users[name]
142 s.lock.Unlock()
143 return u
144}
145
[378]146func (s *Server) addUserLocked(user *User) *user {
147 s.Logger.Printf("starting bouncer for user %q", user.Username)
148 u := newUser(s, user)
149 s.users[u.Username] = u
150
[449]151 s.stopWG.Add(1)
152
[378]153 go func() {
154 u.run()
155
156 s.lock.Lock()
157 delete(s.users, u.Username)
158 s.lock.Unlock()
[449]159
160 s.stopWG.Done()
[378]161 }()
162
163 return u
164}
165
[323]166var lastDownstreamID uint64 = 0
167
[347]168func (s *Server) handle(ic ircConn) {
[605]169 atomic.AddInt64(&s.connCount, 1)
[323]170 id := atomic.AddUint64(&lastDownstreamID, 1)
[347]171 dc := newDownstreamConn(s, ic, id)
[323]172 if err := dc.runUntilRegistered(); err != nil {
173 dc.logger.Print(err)
174 } else {
175 dc.user.events <- eventDownstreamConnected{dc}
176 if err := dc.readMessages(dc.user.events); err != nil {
177 dc.logger.Print(err)
178 }
179 dc.user.events <- eventDownstreamDisconnected{dc}
180 }
181 dc.Close()
[605]182 atomic.AddInt64(&s.connCount, -1)
[323]183}
184
[3]185func (s *Server) Serve(ln net.Listener) error {
[449]186 s.lock.Lock()
187 s.listeners[ln] = struct{}{}
188 s.lock.Unlock()
189
190 s.stopWG.Add(1)
191
192 defer func() {
193 s.lock.Lock()
194 delete(s.listeners, ln)
195 s.lock.Unlock()
196
197 s.stopWG.Done()
198 }()
199
[1]200 for {
[323]201 conn, err := ln.Accept()
[601]202 if isErrClosed(err) {
[449]203 return nil
204 } else if err != nil {
[1]205 return fmt.Errorf("failed to accept connection: %v", err)
206 }
207
[347]208 go s.handle(newNetIRCConn(conn))
[1]209 }
210}
[323]211
212func (s *Server) ServeHTTP(w http.ResponseWriter, req *http.Request) {
213 conn, err := websocket.Accept(w, req, &websocket.AcceptOptions{
[597]214 Subprotocols: []string{"text.ircv3.net"}, // non-compliant, fight me
[323]215 OriginPatterns: s.HTTPOrigins,
216 })
217 if err != nil {
218 s.Logger.Printf("failed to serve HTTP connection: %v", err)
219 return
220 }
[345]221
[370]222 isProxy := false
[345]223 if host, _, err := net.SplitHostPort(req.RemoteAddr); err == nil {
224 if ip := net.ParseIP(host); ip != nil {
[370]225 isProxy = s.AcceptProxyIPs.Contains(ip)
[345]226 }
227 }
228
[474]229 // Only trust the Forwarded header field if this is a trusted proxy IP
[345]230 // to prevent users from spoofing the remote address
[344]231 remoteAddr := req.RemoteAddr
[472]232 if isProxy {
233 forwarded := parseForwarded(req.Header)
[473]234 if forwarded["for"] != "" {
235 remoteAddr = forwarded["for"]
[472]236 }
[344]237 }
[345]238
[347]239 s.handle(newWebsocketIRCConn(conn, remoteAddr))
[323]240}
[472]241
242func parseForwarded(h http.Header) map[string]string {
243 forwarded := h.Get("Forwarded")
244 if forwarded == "" {
[474]245 return map[string]string{
246 "for": h.Get("X-Forwarded-For"),
247 "proto": h.Get("X-Forwarded-Proto"),
248 "host": h.Get("X-Forwarded-Host"),
249 }
[472]250 }
251 // Hack to easily parse header parameters
252 _, params, _ := mime.ParseMediaType("hack; " + forwarded)
253 return params
254}
[605]255
256type ServerStats struct {
257 Users int
258 Downstreams int64
259}
260
261func (s *Server) Stats() *ServerStats {
262 var stats ServerStats
263 s.lock.Lock()
264 stats.Users = len(s.users)
265 s.lock.Unlock()
266 stats.Downstreams = atomic.LoadInt64(&s.connCount)
267 return &stats
268}
Note: See TracBrowser for help on using the repository browser.