source: code/trunk/server.go@ 684

Last change on this file since 684 was 680, checked in by contact, 4 years ago

Add context support to Server.createUser

File size: 5.8 KB
Line 
1package soju
2
3import (
4 "context"
5 "errors"
6 "fmt"
7 "io"
8 "log"
9 "mime"
10 "net"
11 "net/http"
12 "sync"
13 "sync/atomic"
14 "time"
15
16 "gopkg.in/irc.v3"
17 "nhooyr.io/websocket"
18
19 "git.sr.ht/~emersion/soju/config"
20)
21
22// TODO: make configurable
23var retryConnectDelay = time.Minute
24var connectTimeout = 15 * time.Second
25var writeTimeout = 10 * time.Second
26var upstreamMessageDelay = 2 * time.Second
27var upstreamMessageBurst = 10
28var backlogTimeout = 10 * time.Second
29var handleDownstreamMessageTimeout = 10 * time.Second
30var chatHistoryLimit = 1000
31var backlogLimit = 4000
32
33type Logger interface {
34 Print(v ...interface{})
35 Printf(format string, v ...interface{})
36}
37
38type prefixLogger struct {
39 logger Logger
40 prefix string
41}
42
43var _ Logger = (*prefixLogger)(nil)
44
45func (l *prefixLogger) Print(v ...interface{}) {
46 v = append([]interface{}{l.prefix}, v...)
47 l.logger.Print(v...)
48}
49
50func (l *prefixLogger) Printf(format string, v ...interface{}) {
51 v = append([]interface{}{l.prefix}, v...)
52 l.logger.Printf("%v"+format, v...)
53}
54
55type Server struct {
56 Hostname string
57 Title string
58 Logger Logger
59 LogPath string
60 Debug bool
61 HTTPOrigins []string
62 AcceptProxyIPs config.IPSet
63 MaxUserNetworks int
64 Identd *Identd // can be nil
65
66 db Database
67 stopWG sync.WaitGroup
68 connCount int64 // atomic
69
70 lock sync.Mutex
71 listeners map[net.Listener]struct{}
72 users map[string]*user
73
74 motd atomic.Value // string
75}
76
77func NewServer(db Database) *Server {
78 srv := &Server{
79 Logger: log.New(log.Writer(), "", log.LstdFlags),
80 MaxUserNetworks: -1,
81 db: db,
82 listeners: make(map[net.Listener]struct{}),
83 users: make(map[string]*user),
84 }
85 srv.motd.Store("")
86 return srv
87}
88
89func (s *Server) prefix() *irc.Prefix {
90 return &irc.Prefix{Name: s.Hostname}
91}
92
93func (s *Server) Start() error {
94 users, err := s.db.ListUsers(context.TODO())
95 if err != nil {
96 return err
97 }
98
99 s.lock.Lock()
100 for i := range users {
101 s.addUserLocked(&users[i])
102 }
103 s.lock.Unlock()
104
105 return nil
106}
107
108func (s *Server) Shutdown() {
109 s.lock.Lock()
110 for ln := range s.listeners {
111 if err := ln.Close(); err != nil {
112 s.Logger.Printf("failed to stop listener: %v", err)
113 }
114 }
115 for _, u := range s.users {
116 u.events <- eventStop{}
117 }
118 s.lock.Unlock()
119
120 s.stopWG.Wait()
121
122 if err := s.db.Close(); err != nil {
123 s.Logger.Printf("failed to close DB: %v", err)
124 }
125}
126
127func (s *Server) createUser(ctx context.Context, user *User) (*user, error) {
128 s.lock.Lock()
129 defer s.lock.Unlock()
130
131 if _, ok := s.users[user.Username]; ok {
132 return nil, fmt.Errorf("user %q already exists", user.Username)
133 }
134
135 err := s.db.StoreUser(ctx, user)
136 if err != nil {
137 return nil, fmt.Errorf("could not create user in db: %v", err)
138 }
139
140 return s.addUserLocked(user), nil
141}
142
143func (s *Server) forEachUser(f func(*user)) {
144 s.lock.Lock()
145 for _, u := range s.users {
146 f(u)
147 }
148 s.lock.Unlock()
149}
150
151func (s *Server) getUser(name string) *user {
152 s.lock.Lock()
153 u := s.users[name]
154 s.lock.Unlock()
155 return u
156}
157
158func (s *Server) addUserLocked(user *User) *user {
159 s.Logger.Printf("starting bouncer for user %q", user.Username)
160 u := newUser(s, user)
161 s.users[u.Username] = u
162
163 s.stopWG.Add(1)
164
165 go func() {
166 u.run()
167
168 s.lock.Lock()
169 delete(s.users, u.Username)
170 s.lock.Unlock()
171
172 s.stopWG.Done()
173 }()
174
175 return u
176}
177
178var lastDownstreamID uint64 = 0
179
180func (s *Server) handle(ic ircConn) {
181 atomic.AddInt64(&s.connCount, 1)
182 id := atomic.AddUint64(&lastDownstreamID, 1)
183 dc := newDownstreamConn(s, ic, id)
184 if err := dc.runUntilRegistered(); err != nil {
185 if !errors.Is(err, io.EOF) {
186 dc.logger.Print(err)
187 }
188 } else {
189 dc.user.events <- eventDownstreamConnected{dc}
190 if err := dc.readMessages(dc.user.events); err != nil {
191 dc.logger.Print(err)
192 }
193 dc.user.events <- eventDownstreamDisconnected{dc}
194 }
195 dc.Close()
196 atomic.AddInt64(&s.connCount, -1)
197}
198
199func (s *Server) Serve(ln net.Listener) error {
200 s.lock.Lock()
201 s.listeners[ln] = struct{}{}
202 s.lock.Unlock()
203
204 s.stopWG.Add(1)
205
206 defer func() {
207 s.lock.Lock()
208 delete(s.listeners, ln)
209 s.lock.Unlock()
210
211 s.stopWG.Done()
212 }()
213
214 for {
215 conn, err := ln.Accept()
216 if isErrClosed(err) {
217 return nil
218 } else if err != nil {
219 return fmt.Errorf("failed to accept connection: %v", err)
220 }
221
222 go s.handle(newNetIRCConn(conn))
223 }
224}
225
226func (s *Server) ServeHTTP(w http.ResponseWriter, req *http.Request) {
227 conn, err := websocket.Accept(w, req, &websocket.AcceptOptions{
228 Subprotocols: []string{"text.ircv3.net"}, // non-compliant, fight me
229 OriginPatterns: s.HTTPOrigins,
230 })
231 if err != nil {
232 s.Logger.Printf("failed to serve HTTP connection: %v", err)
233 return
234 }
235
236 isProxy := false
237 if host, _, err := net.SplitHostPort(req.RemoteAddr); err == nil {
238 if ip := net.ParseIP(host); ip != nil {
239 isProxy = s.AcceptProxyIPs.Contains(ip)
240 }
241 }
242
243 // Only trust the Forwarded header field if this is a trusted proxy IP
244 // to prevent users from spoofing the remote address
245 remoteAddr := req.RemoteAddr
246 if isProxy {
247 forwarded := parseForwarded(req.Header)
248 if forwarded["for"] != "" {
249 remoteAddr = forwarded["for"]
250 }
251 }
252
253 s.handle(newWebsocketIRCConn(conn, remoteAddr))
254}
255
256func parseForwarded(h http.Header) map[string]string {
257 forwarded := h.Get("Forwarded")
258 if forwarded == "" {
259 return map[string]string{
260 "for": h.Get("X-Forwarded-For"),
261 "proto": h.Get("X-Forwarded-Proto"),
262 "host": h.Get("X-Forwarded-Host"),
263 }
264 }
265 // Hack to easily parse header parameters
266 _, params, _ := mime.ParseMediaType("hack; " + forwarded)
267 return params
268}
269
270type ServerStats struct {
271 Users int
272 Downstreams int64
273}
274
275func (s *Server) Stats() *ServerStats {
276 var stats ServerStats
277 s.lock.Lock()
278 stats.Users = len(s.users)
279 s.lock.Unlock()
280 stats.Downstreams = atomic.LoadInt64(&s.connCount)
281 return &stats
282}
283
284func (s *Server) SetMOTD(motd string) {
285 s.motd.Store(motd)
286}
287
288func (s *Server) MOTD() string {
289 return s.motd.Load().(string)
290}
Note: See TracBrowser for help on using the repository browser.