source: code/trunk/server.go@ 709

Last change on this file since 709 was 709, checked in by contact, 4 years ago

Add int64 gauge abstraction

We want to serve metrics via both BouncerServ and Prometheus. Add
a tiny abstraction to avoid updating multiple metrics at once.

File size: 7.3 KB
RevLine 
[98]1package soju
[1]2
3import (
[652]4 "context"
[656]5 "errors"
[1]6 "fmt"
[656]7 "io"
[37]8 "log"
[472]9 "mime"
[1]10 "net"
[323]11 "net/http"
[689]12 "runtime/debug"
[24]13 "sync"
[323]14 "sync/atomic"
[67]15 "time"
[1]16
[707]17 "github.com/prometheus/client_golang/prometheus"
[708]18 "github.com/prometheus/client_golang/prometheus/promauto"
[1]19 "gopkg.in/irc.v3"
[323]20 "nhooyr.io/websocket"
[370]21
22 "git.sr.ht/~emersion/soju/config"
[1]23)
24
[67]25// TODO: make configurable
[398]26var retryConnectDelay = time.Minute
[206]27var connectTimeout = 15 * time.Second
[205]28var writeTimeout = 10 * time.Second
[398]29var upstreamMessageDelay = 2 * time.Second
30var upstreamMessageBurst = 10
[675]31var backlogTimeout = 10 * time.Second
32var handleDownstreamMessageTimeout = 10 * time.Second
[704]33var downstreamRegisterTimeout = 30 * time.Second
[670]34var chatHistoryLimit = 1000
35var backlogLimit = 4000
[67]36
[9]37type Logger interface {
38 Print(v ...interface{})
39 Printf(format string, v ...interface{})
40}
41
[21]42type prefixLogger struct {
43 logger Logger
44 prefix string
45}
46
47var _ Logger = (*prefixLogger)(nil)
48
49func (l *prefixLogger) Print(v ...interface{}) {
50 v = append([]interface{}{l.prefix}, v...)
51 l.logger.Print(v...)
52}
53
54func (l *prefixLogger) Printf(format string, v ...interface{}) {
55 v = append([]interface{}{l.prefix}, v...)
56 l.logger.Printf("%v"+format, v...)
57}
58
[709]59type int64Gauge struct {
60 v int64 // atomic
61}
62
63func (g *int64Gauge) Add(delta int64) {
64 atomic.AddInt64(&g.v, delta)
65}
66
67func (g *int64Gauge) Value() int64 {
68 return atomic.LoadInt64(&g.v)
69}
70
71func (g *int64Gauge) Float64() float64 {
72 return float64(g.Value())
73}
74
[691]75type Config struct {
[612]76 Hostname string
[662]77 Title string
[612]78 LogPath string
79 Debug bool
80 HTTPOrigins []string
81 AcceptProxyIPs config.IPSet
82 MaxUserNetworks int
[694]83 MultiUpstream bool
[691]84 MOTD string
[705]85 UpstreamUserIPs []*net.IPNet
[691]86}
[22]87
[691]88type Server struct {
[707]89 Logger Logger
90 Identd *Identd // can be nil
91 MetricsRegistry prometheus.Registerer // can be nil
[691]92
[709]93 config atomic.Value // *Config
94 db Database
95 stopWG sync.WaitGroup
[77]96
[449]97 lock sync.Mutex
98 listeners map[net.Listener]struct{}
99 users map[string]*user
[709]100
101 metrics struct {
102 downstreams int64Gauge
103 }
[10]104}
105
[531]106func NewServer(db Database) *Server {
[636]107 srv := &Server{
[691]108 Logger: log.New(log.Writer(), "", log.LstdFlags),
109 db: db,
110 listeners: make(map[net.Listener]struct{}),
111 users: make(map[string]*user),
[37]112 }
[694]113 srv.config.Store(&Config{
114 Hostname: "localhost",
115 MaxUserNetworks: -1,
116 MultiUpstream: true,
117 })
[636]118 return srv
[37]119}
120
[5]121func (s *Server) prefix() *irc.Prefix {
[691]122 return &irc.Prefix{Name: s.Config().Hostname}
[5]123}
124
[691]125func (s *Server) Config() *Config {
126 return s.config.Load().(*Config)
127}
128
129func (s *Server) SetConfig(cfg *Config) {
130 s.config.Store(cfg)
131}
132
[449]133func (s *Server) Start() error {
[708]134 s.registerMetrics()
135
[652]136 users, err := s.db.ListUsers(context.TODO())
[77]137 if err != nil {
138 return err
139 }
[71]140
[77]141 s.lock.Lock()
[378]142 for i := range users {
143 s.addUserLocked(&users[i])
[71]144 }
[37]145 s.lock.Unlock()
146
[449]147 return nil
[10]148}
149
[708]150func (s *Server) registerMetrics() {
151 factory := promauto.With(s.MetricsRegistry)
152
153 factory.NewGaugeFunc(prometheus.GaugeOpts{
154 Name: "soju_users_active",
155 Help: "Current number of active users",
156 }, func() float64 {
157 s.lock.Lock()
158 n := len(s.users)
159 s.lock.Unlock()
160 return float64(n)
161 })
162
163 factory.NewGaugeFunc(prometheus.GaugeOpts{
164 Name: "soju_downstreams_active",
165 Help: "Current number of downstream connections",
[709]166 }, s.metrics.downstreams.Float64)
[708]167}
168
[449]169func (s *Server) Shutdown() {
170 s.lock.Lock()
171 for ln := range s.listeners {
172 if err := ln.Close(); err != nil {
173 s.Logger.Printf("failed to stop listener: %v", err)
174 }
175 }
176 for _, u := range s.users {
177 u.events <- eventStop{}
178 }
179 s.lock.Unlock()
180
181 s.stopWG.Wait()
[599]182
183 if err := s.db.Close(); err != nil {
184 s.Logger.Printf("failed to close DB: %v", err)
185 }
[449]186}
187
[680]188func (s *Server) createUser(ctx context.Context, user *User) (*user, error) {
[329]189 s.lock.Lock()
190 defer s.lock.Unlock()
191
192 if _, ok := s.users[user.Username]; ok {
193 return nil, fmt.Errorf("user %q already exists", user.Username)
194 }
195
[680]196 err := s.db.StoreUser(ctx, user)
[329]197 if err != nil {
198 return nil, fmt.Errorf("could not create user in db: %v", err)
199 }
200
[378]201 return s.addUserLocked(user), nil
[329]202}
203
[563]204func (s *Server) forEachUser(f func(*user)) {
205 s.lock.Lock()
206 for _, u := range s.users {
207 f(u)
208 }
209 s.lock.Unlock()
210}
211
[38]212func (s *Server) getUser(name string) *user {
213 s.lock.Lock()
214 u := s.users[name]
215 s.lock.Unlock()
216 return u
217}
218
[378]219func (s *Server) addUserLocked(user *User) *user {
220 s.Logger.Printf("starting bouncer for user %q", user.Username)
221 u := newUser(s, user)
222 s.users[u.Username] = u
223
[449]224 s.stopWG.Add(1)
225
[378]226 go func() {
[689]227 defer func() {
228 if err := recover(); err != nil {
229 s.Logger.Printf("panic serving user %q: %v\n%v", user.Username, err, debug.Stack())
230 }
231 }()
232
[378]233 u.run()
234
235 s.lock.Lock()
236 delete(s.users, u.Username)
237 s.lock.Unlock()
[449]238
239 s.stopWG.Done()
[378]240 }()
241
242 return u
243}
244
[323]245var lastDownstreamID uint64 = 0
246
[347]247func (s *Server) handle(ic ircConn) {
[689]248 defer func() {
249 if err := recover(); err != nil {
250 s.Logger.Printf("panic serving downstream %q: %v\n%v", ic.RemoteAddr(), err, debug.Stack())
251 }
252 }()
253
[709]254 s.metrics.downstreams.Add(1)
[323]255 id := atomic.AddUint64(&lastDownstreamID, 1)
[347]256 dc := newDownstreamConn(s, ic, id)
[323]257 if err := dc.runUntilRegistered(); err != nil {
[655]258 if !errors.Is(err, io.EOF) {
259 dc.logger.Print(err)
260 }
[323]261 } else {
262 dc.user.events <- eventDownstreamConnected{dc}
263 if err := dc.readMessages(dc.user.events); err != nil {
264 dc.logger.Print(err)
265 }
266 dc.user.events <- eventDownstreamDisconnected{dc}
267 }
268 dc.Close()
[709]269 s.metrics.downstreams.Add(-1)
[323]270}
271
[3]272func (s *Server) Serve(ln net.Listener) error {
[449]273 s.lock.Lock()
274 s.listeners[ln] = struct{}{}
275 s.lock.Unlock()
276
277 s.stopWG.Add(1)
278
279 defer func() {
280 s.lock.Lock()
281 delete(s.listeners, ln)
282 s.lock.Unlock()
283
284 s.stopWG.Done()
285 }()
286
[1]287 for {
[323]288 conn, err := ln.Accept()
[601]289 if isErrClosed(err) {
[449]290 return nil
291 } else if err != nil {
[1]292 return fmt.Errorf("failed to accept connection: %v", err)
293 }
294
[347]295 go s.handle(newNetIRCConn(conn))
[1]296 }
297}
[323]298
299func (s *Server) ServeHTTP(w http.ResponseWriter, req *http.Request) {
300 conn, err := websocket.Accept(w, req, &websocket.AcceptOptions{
[597]301 Subprotocols: []string{"text.ircv3.net"}, // non-compliant, fight me
[691]302 OriginPatterns: s.Config().HTTPOrigins,
[323]303 })
304 if err != nil {
305 s.Logger.Printf("failed to serve HTTP connection: %v", err)
306 return
307 }
[345]308
[370]309 isProxy := false
[345]310 if host, _, err := net.SplitHostPort(req.RemoteAddr); err == nil {
311 if ip := net.ParseIP(host); ip != nil {
[691]312 isProxy = s.Config().AcceptProxyIPs.Contains(ip)
[345]313 }
314 }
315
[474]316 // Only trust the Forwarded header field if this is a trusted proxy IP
[345]317 // to prevent users from spoofing the remote address
[344]318 remoteAddr := req.RemoteAddr
[472]319 if isProxy {
320 forwarded := parseForwarded(req.Header)
[473]321 if forwarded["for"] != "" {
322 remoteAddr = forwarded["for"]
[472]323 }
[344]324 }
[345]325
[347]326 s.handle(newWebsocketIRCConn(conn, remoteAddr))
[323]327}
[472]328
329func parseForwarded(h http.Header) map[string]string {
330 forwarded := h.Get("Forwarded")
331 if forwarded == "" {
[474]332 return map[string]string{
333 "for": h.Get("X-Forwarded-For"),
334 "proto": h.Get("X-Forwarded-Proto"),
335 "host": h.Get("X-Forwarded-Host"),
336 }
[472]337 }
338 // Hack to easily parse header parameters
339 _, params, _ := mime.ParseMediaType("hack; " + forwarded)
340 return params
341}
[605]342
343type ServerStats struct {
344 Users int
345 Downstreams int64
346}
347
348func (s *Server) Stats() *ServerStats {
349 var stats ServerStats
350 s.lock.Lock()
351 stats.Users = len(s.users)
352 s.lock.Unlock()
[709]353 stats.Downstreams = s.metrics.downstreams.Value()
[605]354 return &stats
355}
Note: See TracBrowser for help on using the repository browser.