source: code/trunk/server.go@ 656

Last change on this file since 656 was 656, checked in by contact, 4 years ago

Fix missing imports in server.go

Oops.

File size: 5.7 KB
RevLine 
[98]1package soju
[1]2
3import (
[652]4 "context"
[656]5 "errors"
[1]6 "fmt"
[656]7 "io"
[37]8 "log"
[472]9 "mime"
[1]10 "net"
[323]11 "net/http"
[24]12 "sync"
[323]13 "sync/atomic"
[67]14 "time"
[1]15
16 "gopkg.in/irc.v3"
[323]17 "nhooyr.io/websocket"
[370]18
19 "git.sr.ht/~emersion/soju/config"
[1]20)
21
[67]22// TODO: make configurable
[398]23var retryConnectDelay = time.Minute
[206]24var connectTimeout = 15 * time.Second
[205]25var writeTimeout = 10 * time.Second
[398]26var upstreamMessageDelay = 2 * time.Second
27var upstreamMessageBurst = 10
[67]28
[9]29type Logger interface {
30 Print(v ...interface{})
31 Printf(format string, v ...interface{})
32}
33
[21]34type prefixLogger struct {
35 logger Logger
36 prefix string
37}
38
39var _ Logger = (*prefixLogger)(nil)
40
41func (l *prefixLogger) Print(v ...interface{}) {
42 v = append([]interface{}{l.prefix}, v...)
43 l.logger.Print(v...)
44}
45
46func (l *prefixLogger) Printf(format string, v ...interface{}) {
47 v = append([]interface{}{l.prefix}, v...)
48 l.logger.Printf("%v"+format, v...)
49}
50
[10]51type Server struct {
[612]52 Hostname string
53 Logger Logger
54 HistoryLimit int
55 LogPath string
56 Debug bool
57 HTTPOrigins []string
58 AcceptProxyIPs config.IPSet
59 MaxUserNetworks int
60 Identd *Identd // can be nil
[22]61
[605]62 db Database
63 stopWG sync.WaitGroup
64 connCount int64 // atomic
[77]65
[449]66 lock sync.Mutex
67 listeners map[net.Listener]struct{}
68 users map[string]*user
[636]69
70 motd atomic.Value // string
[10]71}
72
[531]73func NewServer(db Database) *Server {
[636]74 srv := &Server{
[612]75 Logger: log.New(log.Writer(), "", log.LstdFlags),
76 HistoryLimit: 1000,
77 MaxUserNetworks: -1,
78 db: db,
79 listeners: make(map[net.Listener]struct{}),
80 users: make(map[string]*user),
[37]81 }
[636]82 srv.motd.Store("")
83 return srv
[37]84}
85
[5]86func (s *Server) prefix() *irc.Prefix {
87 return &irc.Prefix{Name: s.Hostname}
88}
89
[449]90func (s *Server) Start() error {
[652]91 users, err := s.db.ListUsers(context.TODO())
[77]92 if err != nil {
93 return err
94 }
[71]95
[77]96 s.lock.Lock()
[378]97 for i := range users {
98 s.addUserLocked(&users[i])
[71]99 }
[37]100 s.lock.Unlock()
101
[449]102 return nil
[10]103}
104
[449]105func (s *Server) Shutdown() {
106 s.lock.Lock()
107 for ln := range s.listeners {
108 if err := ln.Close(); err != nil {
109 s.Logger.Printf("failed to stop listener: %v", err)
110 }
111 }
112 for _, u := range s.users {
113 u.events <- eventStop{}
114 }
115 s.lock.Unlock()
116
117 s.stopWG.Wait()
[599]118
119 if err := s.db.Close(); err != nil {
120 s.Logger.Printf("failed to close DB: %v", err)
121 }
[449]122}
123
[329]124func (s *Server) createUser(user *User) (*user, error) {
125 s.lock.Lock()
126 defer s.lock.Unlock()
127
128 if _, ok := s.users[user.Username]; ok {
129 return nil, fmt.Errorf("user %q already exists", user.Username)
130 }
131
[652]132 err := s.db.StoreUser(context.TODO(), user)
[329]133 if err != nil {
134 return nil, fmt.Errorf("could not create user in db: %v", err)
135 }
136
[378]137 return s.addUserLocked(user), nil
[329]138}
139
[563]140func (s *Server) forEachUser(f func(*user)) {
141 s.lock.Lock()
142 for _, u := range s.users {
143 f(u)
144 }
145 s.lock.Unlock()
146}
147
[38]148func (s *Server) getUser(name string) *user {
149 s.lock.Lock()
150 u := s.users[name]
151 s.lock.Unlock()
152 return u
153}
154
[378]155func (s *Server) addUserLocked(user *User) *user {
156 s.Logger.Printf("starting bouncer for user %q", user.Username)
157 u := newUser(s, user)
158 s.users[u.Username] = u
159
[449]160 s.stopWG.Add(1)
161
[378]162 go func() {
163 u.run()
164
165 s.lock.Lock()
166 delete(s.users, u.Username)
167 s.lock.Unlock()
[449]168
169 s.stopWG.Done()
[378]170 }()
171
172 return u
173}
174
[323]175var lastDownstreamID uint64 = 0
176
[347]177func (s *Server) handle(ic ircConn) {
[605]178 atomic.AddInt64(&s.connCount, 1)
[323]179 id := atomic.AddUint64(&lastDownstreamID, 1)
[347]180 dc := newDownstreamConn(s, ic, id)
[323]181 if err := dc.runUntilRegistered(); err != nil {
[655]182 if !errors.Is(err, io.EOF) {
183 dc.logger.Print(err)
184 }
[323]185 } else {
186 dc.user.events <- eventDownstreamConnected{dc}
187 if err := dc.readMessages(dc.user.events); err != nil {
188 dc.logger.Print(err)
189 }
190 dc.user.events <- eventDownstreamDisconnected{dc}
191 }
192 dc.Close()
[605]193 atomic.AddInt64(&s.connCount, -1)
[323]194}
195
[3]196func (s *Server) Serve(ln net.Listener) error {
[449]197 s.lock.Lock()
198 s.listeners[ln] = struct{}{}
199 s.lock.Unlock()
200
201 s.stopWG.Add(1)
202
203 defer func() {
204 s.lock.Lock()
205 delete(s.listeners, ln)
206 s.lock.Unlock()
207
208 s.stopWG.Done()
209 }()
210
[1]211 for {
[323]212 conn, err := ln.Accept()
[601]213 if isErrClosed(err) {
[449]214 return nil
215 } else if err != nil {
[1]216 return fmt.Errorf("failed to accept connection: %v", err)
217 }
218
[347]219 go s.handle(newNetIRCConn(conn))
[1]220 }
221}
[323]222
223func (s *Server) ServeHTTP(w http.ResponseWriter, req *http.Request) {
224 conn, err := websocket.Accept(w, req, &websocket.AcceptOptions{
[597]225 Subprotocols: []string{"text.ircv3.net"}, // non-compliant, fight me
[323]226 OriginPatterns: s.HTTPOrigins,
227 })
228 if err != nil {
229 s.Logger.Printf("failed to serve HTTP connection: %v", err)
230 return
231 }
[345]232
[370]233 isProxy := false
[345]234 if host, _, err := net.SplitHostPort(req.RemoteAddr); err == nil {
235 if ip := net.ParseIP(host); ip != nil {
[370]236 isProxy = s.AcceptProxyIPs.Contains(ip)
[345]237 }
238 }
239
[474]240 // Only trust the Forwarded header field if this is a trusted proxy IP
[345]241 // to prevent users from spoofing the remote address
[344]242 remoteAddr := req.RemoteAddr
[472]243 if isProxy {
244 forwarded := parseForwarded(req.Header)
[473]245 if forwarded["for"] != "" {
246 remoteAddr = forwarded["for"]
[472]247 }
[344]248 }
[345]249
[347]250 s.handle(newWebsocketIRCConn(conn, remoteAddr))
[323]251}
[472]252
253func parseForwarded(h http.Header) map[string]string {
254 forwarded := h.Get("Forwarded")
255 if forwarded == "" {
[474]256 return map[string]string{
257 "for": h.Get("X-Forwarded-For"),
258 "proto": h.Get("X-Forwarded-Proto"),
259 "host": h.Get("X-Forwarded-Host"),
260 }
[472]261 }
262 // Hack to easily parse header parameters
263 _, params, _ := mime.ParseMediaType("hack; " + forwarded)
264 return params
265}
[605]266
267type ServerStats struct {
268 Users int
269 Downstreams int64
270}
271
272func (s *Server) Stats() *ServerStats {
273 var stats ServerStats
274 s.lock.Lock()
275 stats.Users = len(s.users)
276 s.lock.Unlock()
277 stats.Downstreams = atomic.LoadInt64(&s.connCount)
278 return &stats
279}
[636]280
281func (s *Server) SetMOTD(motd string) {
282 s.motd.Store(motd)
283}
284
285func (s *Server) MOTD() string {
286 return s.motd.Load().(string)
287}
Note: See TracBrowser for help on using the repository browser.