source: code/trunk/server.go@ 551

Last change on this file since 551 was 531, checked in by sir, 4 years ago

db: refactor into interface

This refactors the SQLite-specific bits into db_sqlite.go. A future
patch will add PostgreSQL support.

File size: 4.8 KB
Line 
1package soju
2
3import (
4 "fmt"
5 "log"
6 "mime"
7 "net"
8 "net/http"
9 "strings"
10 "sync"
11 "sync/atomic"
12 "time"
13
14 "gopkg.in/irc.v3"
15 "nhooyr.io/websocket"
16
17 "git.sr.ht/~emersion/soju/config"
18)
19
20// TODO: make configurable
21var retryConnectDelay = time.Minute
22var connectTimeout = 15 * time.Second
23var writeTimeout = 10 * time.Second
24var upstreamMessageDelay = 2 * time.Second
25var upstreamMessageBurst = 10
26
27type Logger interface {
28 Print(v ...interface{})
29 Printf(format string, v ...interface{})
30}
31
32type prefixLogger struct {
33 logger Logger
34 prefix string
35}
36
37var _ Logger = (*prefixLogger)(nil)
38
39func (l *prefixLogger) Print(v ...interface{}) {
40 v = append([]interface{}{l.prefix}, v...)
41 l.logger.Print(v...)
42}
43
44func (l *prefixLogger) Printf(format string, v ...interface{}) {
45 v = append([]interface{}{l.prefix}, v...)
46 l.logger.Printf("%v"+format, v...)
47}
48
49type Server struct {
50 Hostname string
51 Logger Logger
52 HistoryLimit int
53 LogPath string
54 Debug bool
55 HTTPOrigins []string
56 AcceptProxyIPs config.IPSet
57 Identd *Identd // can be nil
58
59 db Database
60 stopWG sync.WaitGroup
61
62 lock sync.Mutex
63 listeners map[net.Listener]struct{}
64 users map[string]*user
65}
66
67func NewServer(db Database) *Server {
68 return &Server{
69 Logger: log.New(log.Writer(), "", log.LstdFlags),
70 HistoryLimit: 1000,
71 db: db,
72 listeners: make(map[net.Listener]struct{}),
73 users: make(map[string]*user),
74 }
75}
76
77func (s *Server) prefix() *irc.Prefix {
78 return &irc.Prefix{Name: s.Hostname}
79}
80
81func (s *Server) Start() error {
82 users, err := s.db.ListUsers()
83 if err != nil {
84 return err
85 }
86
87 s.lock.Lock()
88 for i := range users {
89 s.addUserLocked(&users[i])
90 }
91 s.lock.Unlock()
92
93 return nil
94}
95
96func (s *Server) Shutdown() {
97 s.lock.Lock()
98 for ln := range s.listeners {
99 if err := ln.Close(); err != nil {
100 s.Logger.Printf("failed to stop listener: %v", err)
101 }
102 }
103 for _, u := range s.users {
104 u.events <- eventStop{}
105 }
106 s.lock.Unlock()
107
108 s.stopWG.Wait()
109}
110
111func (s *Server) createUser(user *User) (*user, error) {
112 s.lock.Lock()
113 defer s.lock.Unlock()
114
115 if _, ok := s.users[user.Username]; ok {
116 return nil, fmt.Errorf("user %q already exists", user.Username)
117 }
118
119 err := s.db.StoreUser(user)
120 if err != nil {
121 return nil, fmt.Errorf("could not create user in db: %v", err)
122 }
123
124 return s.addUserLocked(user), nil
125}
126
127func (s *Server) getUser(name string) *user {
128 s.lock.Lock()
129 u := s.users[name]
130 s.lock.Unlock()
131 return u
132}
133
134func (s *Server) addUserLocked(user *User) *user {
135 s.Logger.Printf("starting bouncer for user %q", user.Username)
136 u := newUser(s, user)
137 s.users[u.Username] = u
138
139 s.stopWG.Add(1)
140
141 go func() {
142 u.run()
143
144 s.lock.Lock()
145 delete(s.users, u.Username)
146 s.lock.Unlock()
147
148 s.stopWG.Done()
149 }()
150
151 return u
152}
153
154var lastDownstreamID uint64 = 0
155
156func (s *Server) handle(ic ircConn) {
157 id := atomic.AddUint64(&lastDownstreamID, 1)
158 dc := newDownstreamConn(s, ic, id)
159 if err := dc.runUntilRegistered(); err != nil {
160 dc.logger.Print(err)
161 } else {
162 dc.user.events <- eventDownstreamConnected{dc}
163 if err := dc.readMessages(dc.user.events); err != nil {
164 dc.logger.Print(err)
165 }
166 dc.user.events <- eventDownstreamDisconnected{dc}
167 }
168 dc.Close()
169}
170
171func (s *Server) Serve(ln net.Listener) error {
172 s.lock.Lock()
173 s.listeners[ln] = struct{}{}
174 s.lock.Unlock()
175
176 s.stopWG.Add(1)
177
178 defer func() {
179 s.lock.Lock()
180 delete(s.listeners, ln)
181 s.lock.Unlock()
182
183 s.stopWG.Done()
184 }()
185
186 for {
187 conn, err := ln.Accept()
188 // TODO: use net.ErrClosed when available
189 if err != nil && strings.Contains(err.Error(), "use of closed network connection") {
190 return nil
191 } else if err != nil {
192 return fmt.Errorf("failed to accept connection: %v", err)
193 }
194
195 go s.handle(newNetIRCConn(conn))
196 }
197}
198
199func (s *Server) ServeHTTP(w http.ResponseWriter, req *http.Request) {
200 conn, err := websocket.Accept(w, req, &websocket.AcceptOptions{
201 OriginPatterns: s.HTTPOrigins,
202 })
203 if err != nil {
204 s.Logger.Printf("failed to serve HTTP connection: %v", err)
205 return
206 }
207
208 isProxy := false
209 if host, _, err := net.SplitHostPort(req.RemoteAddr); err == nil {
210 if ip := net.ParseIP(host); ip != nil {
211 isProxy = s.AcceptProxyIPs.Contains(ip)
212 }
213 }
214
215 // Only trust the Forwarded header field if this is a trusted proxy IP
216 // to prevent users from spoofing the remote address
217 remoteAddr := req.RemoteAddr
218 if isProxy {
219 forwarded := parseForwarded(req.Header)
220 if forwarded["for"] != "" {
221 remoteAddr = forwarded["for"]
222 }
223 }
224
225 s.handle(newWebsocketIRCConn(conn, remoteAddr))
226}
227
228func parseForwarded(h http.Header) map[string]string {
229 forwarded := h.Get("Forwarded")
230 if forwarded == "" {
231 return map[string]string{
232 "for": h.Get("X-Forwarded-For"),
233 "proto": h.Get("X-Forwarded-Proto"),
234 "host": h.Get("X-Forwarded-Host"),
235 }
236 }
237 // Hack to easily parse header parameters
238 _, params, _ := mime.ParseMediaType("hack; " + forwarded)
239 return params
240}
Note: See TracBrowser for help on using the repository browser.