source: code/trunk/server.go@ 627

Last change on this file since 627 was 612, checked in by contact, 4 years ago

Add max-user-networks config option

File size: 5.4 KB
RevLine 
[98]1package soju
[1]2
3import (
4 "fmt"
[37]5 "log"
[472]6 "mime"
[1]7 "net"
[323]8 "net/http"
[24]9 "sync"
[323]10 "sync/atomic"
[67]11 "time"
[1]12
13 "gopkg.in/irc.v3"
[323]14 "nhooyr.io/websocket"
[370]15
16 "git.sr.ht/~emersion/soju/config"
[1]17)
18
[67]19// TODO: make configurable
[398]20var retryConnectDelay = time.Minute
[206]21var connectTimeout = 15 * time.Second
[205]22var writeTimeout = 10 * time.Second
[398]23var upstreamMessageDelay = 2 * time.Second
24var upstreamMessageBurst = 10
[67]25
[9]26type Logger interface {
27 Print(v ...interface{})
28 Printf(format string, v ...interface{})
29}
30
[21]31type prefixLogger struct {
32 logger Logger
33 prefix string
34}
35
36var _ Logger = (*prefixLogger)(nil)
37
38func (l *prefixLogger) Print(v ...interface{}) {
39 v = append([]interface{}{l.prefix}, v...)
40 l.logger.Print(v...)
41}
42
43func (l *prefixLogger) Printf(format string, v ...interface{}) {
44 v = append([]interface{}{l.prefix}, v...)
45 l.logger.Printf("%v"+format, v...)
46}
47
[10]48type Server struct {
[612]49 Hostname string
50 Logger Logger
51 HistoryLimit int
52 LogPath string
53 Debug bool
54 HTTPOrigins []string
55 AcceptProxyIPs config.IPSet
56 MaxUserNetworks int
57 Identd *Identd // can be nil
[22]58
[605]59 db Database
60 stopWG sync.WaitGroup
61 connCount int64 // atomic
[77]62
[449]63 lock sync.Mutex
64 listeners map[net.Listener]struct{}
65 users map[string]*user
[10]66}
67
[531]68func NewServer(db Database) *Server {
[37]69 return &Server{
[612]70 Logger: log.New(log.Writer(), "", log.LstdFlags),
71 HistoryLimit: 1000,
72 MaxUserNetworks: -1,
73 db: db,
74 listeners: make(map[net.Listener]struct{}),
75 users: make(map[string]*user),
[37]76 }
77}
78
[5]79func (s *Server) prefix() *irc.Prefix {
80 return &irc.Prefix{Name: s.Hostname}
81}
82
[449]83func (s *Server) Start() error {
[77]84 users, err := s.db.ListUsers()
85 if err != nil {
86 return err
87 }
[71]88
[77]89 s.lock.Lock()
[378]90 for i := range users {
91 s.addUserLocked(&users[i])
[71]92 }
[37]93 s.lock.Unlock()
94
[449]95 return nil
[10]96}
97
[449]98func (s *Server) Shutdown() {
99 s.lock.Lock()
100 for ln := range s.listeners {
101 if err := ln.Close(); err != nil {
102 s.Logger.Printf("failed to stop listener: %v", err)
103 }
104 }
105 for _, u := range s.users {
106 u.events <- eventStop{}
107 }
108 s.lock.Unlock()
109
110 s.stopWG.Wait()
[599]111
112 if err := s.db.Close(); err != nil {
113 s.Logger.Printf("failed to close DB: %v", err)
114 }
[449]115}
116
[329]117func (s *Server) createUser(user *User) (*user, error) {
118 s.lock.Lock()
119 defer s.lock.Unlock()
120
121 if _, ok := s.users[user.Username]; ok {
122 return nil, fmt.Errorf("user %q already exists", user.Username)
123 }
124
125 err := s.db.StoreUser(user)
126 if err != nil {
127 return nil, fmt.Errorf("could not create user in db: %v", err)
128 }
129
[378]130 return s.addUserLocked(user), nil
[329]131}
132
[563]133func (s *Server) forEachUser(f func(*user)) {
134 s.lock.Lock()
135 for _, u := range s.users {
136 f(u)
137 }
138 s.lock.Unlock()
139}
140
[38]141func (s *Server) getUser(name string) *user {
142 s.lock.Lock()
143 u := s.users[name]
144 s.lock.Unlock()
145 return u
146}
147
[378]148func (s *Server) addUserLocked(user *User) *user {
149 s.Logger.Printf("starting bouncer for user %q", user.Username)
150 u := newUser(s, user)
151 s.users[u.Username] = u
152
[449]153 s.stopWG.Add(1)
154
[378]155 go func() {
156 u.run()
157
158 s.lock.Lock()
159 delete(s.users, u.Username)
160 s.lock.Unlock()
[449]161
162 s.stopWG.Done()
[378]163 }()
164
165 return u
166}
167
[323]168var lastDownstreamID uint64 = 0
169
[347]170func (s *Server) handle(ic ircConn) {
[605]171 atomic.AddInt64(&s.connCount, 1)
[323]172 id := atomic.AddUint64(&lastDownstreamID, 1)
[347]173 dc := newDownstreamConn(s, ic, id)
[323]174 if err := dc.runUntilRegistered(); err != nil {
175 dc.logger.Print(err)
176 } else {
177 dc.user.events <- eventDownstreamConnected{dc}
178 if err := dc.readMessages(dc.user.events); err != nil {
179 dc.logger.Print(err)
180 }
181 dc.user.events <- eventDownstreamDisconnected{dc}
182 }
183 dc.Close()
[605]184 atomic.AddInt64(&s.connCount, -1)
[323]185}
186
[3]187func (s *Server) Serve(ln net.Listener) error {
[449]188 s.lock.Lock()
189 s.listeners[ln] = struct{}{}
190 s.lock.Unlock()
191
192 s.stopWG.Add(1)
193
194 defer func() {
195 s.lock.Lock()
196 delete(s.listeners, ln)
197 s.lock.Unlock()
198
199 s.stopWG.Done()
200 }()
201
[1]202 for {
[323]203 conn, err := ln.Accept()
[601]204 if isErrClosed(err) {
[449]205 return nil
206 } else if err != nil {
[1]207 return fmt.Errorf("failed to accept connection: %v", err)
208 }
209
[347]210 go s.handle(newNetIRCConn(conn))
[1]211 }
212}
[323]213
214func (s *Server) ServeHTTP(w http.ResponseWriter, req *http.Request) {
215 conn, err := websocket.Accept(w, req, &websocket.AcceptOptions{
[597]216 Subprotocols: []string{"text.ircv3.net"}, // non-compliant, fight me
[323]217 OriginPatterns: s.HTTPOrigins,
218 })
219 if err != nil {
220 s.Logger.Printf("failed to serve HTTP connection: %v", err)
221 return
222 }
[345]223
[370]224 isProxy := false
[345]225 if host, _, err := net.SplitHostPort(req.RemoteAddr); err == nil {
226 if ip := net.ParseIP(host); ip != nil {
[370]227 isProxy = s.AcceptProxyIPs.Contains(ip)
[345]228 }
229 }
230
[474]231 // Only trust the Forwarded header field if this is a trusted proxy IP
[345]232 // to prevent users from spoofing the remote address
[344]233 remoteAddr := req.RemoteAddr
[472]234 if isProxy {
235 forwarded := parseForwarded(req.Header)
[473]236 if forwarded["for"] != "" {
237 remoteAddr = forwarded["for"]
[472]238 }
[344]239 }
[345]240
[347]241 s.handle(newWebsocketIRCConn(conn, remoteAddr))
[323]242}
[472]243
244func parseForwarded(h http.Header) map[string]string {
245 forwarded := h.Get("Forwarded")
246 if forwarded == "" {
[474]247 return map[string]string{
248 "for": h.Get("X-Forwarded-For"),
249 "proto": h.Get("X-Forwarded-Proto"),
250 "host": h.Get("X-Forwarded-Host"),
251 }
[472]252 }
253 // Hack to easily parse header parameters
254 _, params, _ := mime.ParseMediaType("hack; " + forwarded)
255 return params
256}
[605]257
258type ServerStats struct {
259 Users int
260 Downstreams int64
261}
262
263func (s *Server) Stats() *ServerStats {
264 var stats ServerStats
265 s.lock.Lock()
266 stats.Users = len(s.users)
267 s.lock.Unlock()
268 stats.Downstreams = atomic.LoadInt64(&s.connCount)
269 return &stats
270}
Note: See TracBrowser for help on using the repository browser.