2016-03-05 02:08:16 +03:00
|
|
|
package server
|
|
|
|
|
|
|
|
import (
|
2017-10-01 05:34:25 +03:00
|
|
|
"bytes"
|
2018-10-29 01:49:45 +03:00
|
|
|
"crypto/rand"
|
|
|
|
"crypto/sha1"
|
|
|
|
"encoding/base64"
|
2016-03-29 15:53:53 +03:00
|
|
|
"encoding/binary"
|
2016-03-05 02:08:16 +03:00
|
|
|
"errors"
|
|
|
|
"fmt"
|
|
|
|
"io"
|
|
|
|
"net"
|
Update expiration logic
This commit changes the logic for managing the expiration of
objects in the database.
Before: There was a server-wide hashmap that stored the
collection key, id, and expiration timestamp for all objects
that had a TTL. The hashmap was occasionally probed at 20
random positions, looking for objects that have expired. Those
expired objects were immediately deleted, and if there was 5
or more objects deleted, then the probe happened again, with
no delay. If the number of objects was less than 5 then the
there was a 1/10th of a second delay before the next probe.
Now: Rather than a server-wide hashmap, each collection has
its own ordered priority queue that stores objects with TTLs.
Rather than probing, there is a background routine that
executes every 1/10th of a second, which pops the expired
objects from the collection queues, and deletes them.
The collection/queue method is a more stable approach than
the hashmap/probing method. With probing, we can run into
major cache misses for some cases where there is wide
TTL duration, such as in the hours or days. This may cause
the system to occasionally fall behind, leaving should-be
expired objects in memory. Using a queue, there is no
cache misses, all objects that should be expired will be
right away, regardless of the TTL durations.
Fixes #616
2021-07-12 23:37:50 +03:00
|
|
|
"net/http"
|
2018-10-29 01:49:45 +03:00
|
|
|
"net/url"
|
|
|
|
"os"
|
|
|
|
"path"
|
|
|
|
"path/filepath"
|
|
|
|
"runtime"
|
|
|
|
"runtime/debug"
|
|
|
|
"strconv"
|
2016-03-05 02:08:16 +03:00
|
|
|
"strings"
|
2018-10-29 01:49:45 +03:00
|
|
|
"sync"
|
|
|
|
"sync/atomic"
|
2016-03-29 15:53:53 +03:00
|
|
|
"time"
|
2016-03-05 02:08:16 +03:00
|
|
|
|
2021-08-20 15:00:14 +03:00
|
|
|
"github.com/prometheus/client_golang/prometheus"
|
2021-01-26 00:34:40 +03:00
|
|
|
"github.com/tidwall/btree"
|
2018-10-29 01:49:45 +03:00
|
|
|
"github.com/tidwall/buntdb"
|
|
|
|
"github.com/tidwall/geojson"
|
|
|
|
"github.com/tidwall/geojson/geometry"
|
2020-11-07 15:22:11 +03:00
|
|
|
"github.com/tidwall/gjson"
|
2018-10-29 01:49:45 +03:00
|
|
|
"github.com/tidwall/redcon"
|
Lua scripting feature. (#224)
* Start on lua scripting
* Implement evalsha, script load, script exists, and script flush
* Type conversions from lua to resp/json.
Refactor to make luastate and luascripts persistent in the controller.
* Change controller.command and all underlying commands to return resp.Value.
Serialize only during the ouput.
* First stab at tile38 call from lua
* Change tile38 into tile38.call in Lua
* Property return errors from scripts
* Minor refactoring. No locking on script run
* Cleanup/refactoring
* Create a pool of 5 lua states, allow for more as needed. Refactor.
* Use safe map for scripts. Add a limit for max number of lua states. Refactor.
* Refactor
* Refactor script commands into atomic, read-only, and non-atomic classes.
Proper locking for all three classes.
Add tests for scripts
* More tests for scripts
* Properly escape newlines in lua-produced errors
* Better test for readonly failure
* Correctly convert ok/err messages between lua and resp.
Add pcall, sha1hex, error_reply, status_reply functions to tile38 namespace in lua.
* Add pcall test. Change writeErr to work with string argument
* Make sure eval/evalsha never attempt to write AOF
* Add eval-set and eval-get to benchmarks
* Fix eval benchmark tests, add more
* Improve benchmarks
* Optimizations and refactoring.
* Add lua memtest
* Typo
* Add dependency
* golint fixes
* gofmt fixes
* Add scripting commands to the core/commands.json
* Use ARGV for args inside lua
2017-10-05 18:20:40 +03:00
|
|
|
"github.com/tidwall/resp"
|
2021-02-08 03:54:56 +03:00
|
|
|
"github.com/tidwall/rtree"
|
2018-10-11 00:25:40 +03:00
|
|
|
"github.com/tidwall/tile38/core"
|
2018-10-29 01:49:45 +03:00
|
|
|
"github.com/tidwall/tile38/internal/collection"
|
2019-04-24 15:09:41 +03:00
|
|
|
"github.com/tidwall/tile38/internal/deadline"
|
2018-10-29 01:49:45 +03:00
|
|
|
"github.com/tidwall/tile38/internal/endpoint"
|
2018-10-11 00:25:40 +03:00
|
|
|
"github.com/tidwall/tile38/internal/log"
|
2022-09-21 00:20:53 +03:00
|
|
|
"github.com/tidwall/tile38/internal/object"
|
2016-03-05 02:08:16 +03:00
|
|
|
)
|
|
|
|
|
2018-10-29 01:49:45 +03:00
|
|
|
var errOOM = errors.New("OOM command not allowed when used memory > 'maxmemory'")
|
2019-04-26 21:50:49 +03:00
|
|
|
|
2019-04-26 00:15:12 +03:00
|
|
|
func errTimeoutOnCmd(cmd string) error {
|
|
|
|
return fmt.Errorf("timeout not supported for '%s'", cmd)
|
|
|
|
}
|
2016-03-08 03:37:39 +03:00
|
|
|
|
2018-11-24 01:53:33 +03:00
|
|
|
const (
|
|
|
|
goingLive = "going live"
|
|
|
|
hookLogPrefix = "hook:log:"
|
|
|
|
)
|
|
|
|
|
|
|
|
// commandDetails is detailed information about a mutable command. It's used
|
|
|
|
// for geofence formulas.
|
|
|
|
type commandDetails struct {
|
2022-09-20 03:47:38 +03:00
|
|
|
command string // client command, like "SET" or "DEL"
|
2022-09-21 00:20:53 +03:00
|
|
|
key string // collection key
|
2022-09-20 03:47:38 +03:00
|
|
|
newKey string // new key, for RENAME command
|
|
|
|
|
2022-09-21 00:20:53 +03:00
|
|
|
obj *object.Object // target object
|
|
|
|
old *object.Object // previous object, if any
|
2022-09-20 03:47:38 +03:00
|
|
|
|
2018-11-24 01:53:33 +03:00
|
|
|
updated bool // object was updated
|
2024-04-11 06:16:44 +03:00
|
|
|
timestamp time.Time // timestamp when the update occurred
|
2018-11-24 01:53:33 +03:00
|
|
|
parent bool // when true, only children are forwarded
|
|
|
|
pattern string // PDEL key pattern
|
|
|
|
children []*commandDetails // for multi actions such as "PDEL"
|
2016-03-08 03:37:39 +03:00
|
|
|
}
|
|
|
|
|
2018-10-29 01:49:45 +03:00
|
|
|
// Server is a tile38 controller
|
|
|
|
type Server struct {
|
2022-11-03 20:07:17 +03:00
|
|
|
// user defined options
|
|
|
|
opts Options
|
|
|
|
|
2018-10-29 01:49:45 +03:00
|
|
|
// static values
|
2021-09-07 15:51:15 +03:00
|
|
|
unix string
|
2018-10-29 01:49:45 +03:00
|
|
|
host string
|
|
|
|
port int
|
|
|
|
http bool
|
|
|
|
dir string
|
|
|
|
started time.Time
|
|
|
|
config *Config
|
|
|
|
epc *endpoint.Manager
|
2022-10-21 03:01:12 +03:00
|
|
|
epool *exprPool
|
2022-09-26 23:26:46 +03:00
|
|
|
|
|
|
|
lnmu sync.Mutex
|
|
|
|
ln net.Listener // server listener
|
2018-10-29 01:49:45 +03:00
|
|
|
|
|
|
|
// env opts
|
|
|
|
geomParseOpts geojson.ParseOptions
|
2020-03-26 01:35:31 +03:00
|
|
|
geomIndexOpts geometry.IndexOptions
|
2020-11-07 15:22:11 +03:00
|
|
|
http500Errors bool
|
2018-10-29 01:49:45 +03:00
|
|
|
|
|
|
|
// atomics
|
2022-09-27 20:15:31 +03:00
|
|
|
followc atomic.Int64 // counter when follow property changes
|
|
|
|
statsTotalConns atomic.Int64 // counter for total connections
|
|
|
|
statsTotalCommands atomic.Int64 // counter for total commands
|
|
|
|
statsTotalMsgsSent atomic.Int64 // counter for total sent webhook messages
|
|
|
|
statsExpired atomic.Int64 // item expiration counter
|
|
|
|
lastShrinkDuration atomic.Int64
|
|
|
|
stopServer atomic.Bool
|
|
|
|
outOfMemory atomic.Bool
|
|
|
|
loadedAndReady atomic.Bool // server is loaded and ready for commands
|
2018-10-29 01:49:45 +03:00
|
|
|
|
|
|
|
connsmu sync.RWMutex
|
|
|
|
conns map[int]*Client
|
|
|
|
|
2022-11-03 20:07:17 +03:00
|
|
|
mu sync.RWMutex
|
|
|
|
|
|
|
|
// aof
|
|
|
|
aof *os.File // active aof file
|
|
|
|
aofdirty atomic.Bool // mark the aofbuf as having data
|
|
|
|
aofbuf []byte // prewrite buffer
|
|
|
|
aofsz int // active size of the aof file
|
|
|
|
shrinking bool // aof shrinking flag
|
|
|
|
shrinklog [][]string // aof shrinking log
|
|
|
|
|
|
|
|
// database
|
|
|
|
qdb *buntdb.DB // hook queue log
|
|
|
|
qidx uint64 // hook queue log last idx
|
2022-09-13 18:16:41 +03:00
|
|
|
|
|
|
|
cols *btree.Map[string, *collection.Collection] // data collections
|
2018-10-29 01:49:45 +03:00
|
|
|
|
2021-09-13 20:02:36 +03:00
|
|
|
hooks *btree.BTree // hook name -- [string]*Hook
|
|
|
|
hookCross *rtree.RTree // hook spatial tree for "cross" geofences
|
|
|
|
hookTree *rtree.RTree // hook spatial tree for all
|
|
|
|
hooksOut *btree.BTree // hooks with "outside" detection -- [string]*Hook
|
|
|
|
groupHooks *btree.BTree // hooks that are connected to objects
|
|
|
|
groupObjects *btree.BTree // objects that are connected to hooks
|
|
|
|
hookExpires *btree.BTree // queue of all hooks marked for expiration
|
2021-08-20 15:00:14 +03:00
|
|
|
|
2022-11-03 20:07:17 +03:00
|
|
|
// followers (external aof readers)
|
|
|
|
follows map[*bytes.Buffer]bool
|
|
|
|
fcond *sync.Cond
|
|
|
|
lstack []*commandDetails
|
|
|
|
lives map[*liveBuffer]bool
|
2022-12-14 14:46:28 +03:00
|
|
|
lcond *sync.Cond // live geofence signal
|
2023-05-21 18:22:27 +03:00
|
|
|
faofsz int // last reported aofsize
|
2022-12-14 14:46:28 +03:00
|
|
|
fcup bool // follow caught up
|
|
|
|
fcuponce bool // follow caught up once
|
2022-11-03 20:07:17 +03:00
|
|
|
aofconnM map[net.Conn]io.Closer
|
|
|
|
|
|
|
|
// lua scripts
|
2018-10-29 01:49:45 +03:00
|
|
|
luascripts *lScriptMap
|
|
|
|
luapool *lStatePool
|
|
|
|
|
2022-11-03 20:07:17 +03:00
|
|
|
// pubsub system (SUBSCRIBE, PUBLISH, and SETCHAN)
|
2018-10-29 01:49:45 +03:00
|
|
|
pubsub *pubsub
|
2020-08-12 22:38:35 +03:00
|
|
|
|
2022-11-03 20:07:17 +03:00
|
|
|
// monitor connections (using the MONITOR command)
|
2020-08-12 22:38:35 +03:00
|
|
|
monconnsMu sync.RWMutex
|
2022-11-03 20:07:17 +03:00
|
|
|
monconns map[net.Conn]bool
|
2018-10-29 01:49:45 +03:00
|
|
|
}
|
|
|
|
|
2021-09-07 15:51:15 +03:00
|
|
|
// Options for Serve()
|
2021-09-06 18:55:13 +03:00
|
|
|
type Options struct {
|
2021-09-07 15:51:15 +03:00
|
|
|
Host string
|
|
|
|
Port int
|
|
|
|
Dir string
|
|
|
|
UseHTTP bool
|
|
|
|
MetricsAddr string
|
|
|
|
UnixSocketPath string // path for unix socket
|
2022-09-25 01:42:07 +03:00
|
|
|
|
|
|
|
// DevMode puts application in to dev mode
|
|
|
|
DevMode bool
|
|
|
|
|
|
|
|
// ShowDebugMessages allows for log.Debug to print to console.
|
|
|
|
ShowDebugMessages bool
|
|
|
|
|
|
|
|
// ProtectedMode forces Tile38 to default in protected mode.
|
|
|
|
ProtectedMode string
|
|
|
|
|
|
|
|
// AppendOnly allows for disabling the appendonly file.
|
|
|
|
AppendOnly bool
|
|
|
|
|
|
|
|
// AppendFileName allows for custom appendonly file path
|
|
|
|
AppendFileName string
|
|
|
|
|
|
|
|
// QueueFileName allows for custom queue.db file path
|
|
|
|
QueueFileName string
|
2022-09-25 16:28:17 +03:00
|
|
|
|
|
|
|
// Shutdown allows for shutting down the server.
|
|
|
|
Shutdown <-chan bool
|
2021-09-06 18:55:13 +03:00
|
|
|
}
|
|
|
|
|
2018-10-29 01:49:45 +03:00
|
|
|
// Serve starts a new tile38 server
|
2021-09-06 18:55:13 +03:00
|
|
|
func Serve(opts Options) error {
|
2022-09-25 01:42:07 +03:00
|
|
|
if opts.AppendFileName == "" {
|
|
|
|
opts.AppendFileName = path.Join(opts.Dir, "appendonly.aof")
|
|
|
|
}
|
|
|
|
if opts.QueueFileName == "" {
|
|
|
|
opts.QueueFileName = path.Join(opts.Dir, "queue.db")
|
2018-10-29 01:49:45 +03:00
|
|
|
}
|
2022-09-25 01:42:07 +03:00
|
|
|
if opts.ProtectedMode == "" {
|
|
|
|
opts.ProtectedMode = "no"
|
2018-10-29 01:49:45 +03:00
|
|
|
}
|
|
|
|
|
2021-12-27 14:20:14 +03:00
|
|
|
log.Infof("Server started, Tile38 version %s, git %s", core.Version, core.GitSHA)
|
2022-09-25 16:28:17 +03:00
|
|
|
defer func() {
|
|
|
|
log.Warn("Server has shutdown, bye now")
|
|
|
|
if false {
|
|
|
|
// prints the stack, looking for running goroutines.
|
|
|
|
buf := make([]byte, 10000)
|
|
|
|
n := runtime.Stack(buf, true)
|
|
|
|
println(string(buf[:n]))
|
|
|
|
}
|
|
|
|
}()
|
2021-12-27 14:20:14 +03:00
|
|
|
|
2021-12-09 19:24:26 +03:00
|
|
|
// Initialize the s
|
|
|
|
s := &Server{
|
2021-09-07 15:51:15 +03:00
|
|
|
unix: opts.UnixSocketPath,
|
2021-09-06 18:55:13 +03:00
|
|
|
host: opts.Host,
|
|
|
|
port: opts.Port,
|
|
|
|
dir: opts.Dir,
|
2021-08-20 15:00:14 +03:00
|
|
|
follows: make(map[*bytes.Buffer]bool),
|
|
|
|
fcond: sync.NewCond(&sync.Mutex{}),
|
|
|
|
lives: make(map[*liveBuffer]bool),
|
|
|
|
lcond: sync.NewCond(&sync.Mutex{}),
|
2021-09-13 20:02:36 +03:00
|
|
|
hooks: btree.NewNonConcurrent(byHookName),
|
|
|
|
hooksOut: btree.NewNonConcurrent(byHookName),
|
2021-08-20 15:00:14 +03:00
|
|
|
hookCross: &rtree.RTree{},
|
|
|
|
hookTree: &rtree.RTree{},
|
|
|
|
aofconnM: make(map[net.Conn]io.Closer),
|
|
|
|
started: time.Now(),
|
|
|
|
conns: make(map[int]*Client),
|
2021-09-06 18:55:13 +03:00
|
|
|
http: opts.UseHTTP,
|
2021-08-20 15:00:14 +03:00
|
|
|
pubsub: newPubsub(),
|
|
|
|
monconns: make(map[net.Conn]bool),
|
2022-09-13 18:16:41 +03:00
|
|
|
cols: &btree.Map[string, *collection.Collection]{},
|
2021-08-20 15:00:14 +03:00
|
|
|
|
|
|
|
groupHooks: btree.NewNonConcurrent(byGroupHook),
|
|
|
|
groupObjects: btree.NewNonConcurrent(byGroupObject),
|
2021-09-12 19:55:58 +03:00
|
|
|
hookExpires: btree.NewNonConcurrent(byHookExpires),
|
2022-09-25 01:42:07 +03:00
|
|
|
opts: opts,
|
2018-10-29 01:49:45 +03:00
|
|
|
}
|
2022-10-21 03:01:12 +03:00
|
|
|
s.epool = newExprPool(s)
|
2021-12-09 19:24:26 +03:00
|
|
|
s.epc = endpoint.NewManager(s)
|
2022-09-25 16:28:17 +03:00
|
|
|
defer s.epc.Shutdown()
|
2021-12-09 19:24:26 +03:00
|
|
|
s.luascripts = s.newScriptMap()
|
|
|
|
s.luapool = s.newPool()
|
|
|
|
defer s.luapool.Shutdown()
|
2017-02-09 20:01:59 +03:00
|
|
|
|
2021-09-06 18:55:13 +03:00
|
|
|
if err := os.MkdirAll(opts.Dir, 0700); err != nil {
|
2018-10-29 01:49:45 +03:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
var err error
|
2021-12-09 19:24:26 +03:00
|
|
|
s.config, err = loadConfig(filepath.Join(opts.Dir, "config"))
|
2018-10-29 01:49:45 +03:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2016-03-05 02:08:16 +03:00
|
|
|
|
2020-11-07 15:22:11 +03:00
|
|
|
// Send "500 Internal Server" error instead of "200 OK" for json responses
|
|
|
|
// with `"ok":false`. T38HTTP500ERRORS=1
|
2021-12-09 19:24:26 +03:00
|
|
|
s.http500Errors, _ = strconv.ParseBool(os.Getenv("T38HTTP500ERRORS"))
|
2020-11-07 15:22:11 +03:00
|
|
|
|
2018-10-29 01:49:45 +03:00
|
|
|
// Allow for geometry indexing options through environment variables:
|
|
|
|
// T38IDXGEOMKIND -- None, RTree, QuadTree
|
|
|
|
// T38IDXGEOM -- Min number of points in a geometry for indexing.
|
|
|
|
// T38IDXMULTI -- Min number of object in a Multi/Collection for indexing.
|
2021-12-09 19:24:26 +03:00
|
|
|
s.geomParseOpts = *geojson.DefaultParseOptions
|
|
|
|
s.geomIndexOpts = *geometry.DefaultIndexOptions
|
2018-10-29 01:49:45 +03:00
|
|
|
n, err := strconv.ParseUint(os.Getenv("T38IDXGEOM"), 10, 32)
|
|
|
|
if err == nil {
|
2021-12-09 19:24:26 +03:00
|
|
|
s.geomParseOpts.IndexGeometry = int(n)
|
|
|
|
s.geomIndexOpts.MinPoints = int(n)
|
2018-10-29 01:49:45 +03:00
|
|
|
}
|
|
|
|
n, err = strconv.ParseUint(os.Getenv("T38IDXMULTI"), 10, 32)
|
|
|
|
if err == nil {
|
2021-12-09 19:24:26 +03:00
|
|
|
s.geomParseOpts.IndexChildren = int(n)
|
2018-10-29 01:49:45 +03:00
|
|
|
}
|
2019-01-10 19:36:58 +03:00
|
|
|
requireValid := os.Getenv("REQUIREVALID")
|
|
|
|
if requireValid != "" {
|
2021-12-09 19:24:26 +03:00
|
|
|
s.geomParseOpts.RequireValid = true
|
2019-01-10 19:36:58 +03:00
|
|
|
}
|
2018-10-29 01:49:45 +03:00
|
|
|
indexKind := os.Getenv("T38IDXGEOMKIND")
|
|
|
|
switch indexKind {
|
|
|
|
default:
|
|
|
|
log.Errorf("Unknown index kind: %s", indexKind)
|
|
|
|
case "":
|
|
|
|
case "None":
|
2021-12-09 19:24:26 +03:00
|
|
|
s.geomParseOpts.IndexGeometryKind = geometry.None
|
|
|
|
s.geomIndexOpts.Kind = geometry.None
|
2018-10-29 01:49:45 +03:00
|
|
|
case "RTree":
|
2021-12-09 19:24:26 +03:00
|
|
|
s.geomParseOpts.IndexGeometryKind = geometry.RTree
|
|
|
|
s.geomIndexOpts.Kind = geometry.RTree
|
2018-10-29 01:49:45 +03:00
|
|
|
case "QuadTree":
|
2021-12-09 19:24:26 +03:00
|
|
|
s.geomParseOpts.IndexGeometryKind = geometry.QuadTree
|
|
|
|
s.geomIndexOpts.Kind = geometry.QuadTree
|
2018-10-29 01:49:45 +03:00
|
|
|
}
|
2021-12-09 19:24:26 +03:00
|
|
|
if s.geomParseOpts.IndexGeometryKind == geometry.None {
|
2018-10-29 01:49:45 +03:00
|
|
|
log.Debugf("Geom indexing: %s",
|
2021-12-09 19:24:26 +03:00
|
|
|
s.geomParseOpts.IndexGeometryKind,
|
2018-10-29 01:49:45 +03:00
|
|
|
)
|
|
|
|
} else {
|
|
|
|
log.Debugf("Geom indexing: %s (%d points)",
|
2021-12-09 19:24:26 +03:00
|
|
|
s.geomParseOpts.IndexGeometryKind,
|
|
|
|
s.geomParseOpts.IndexGeometry,
|
2018-10-29 01:49:45 +03:00
|
|
|
)
|
|
|
|
}
|
2021-12-09 19:24:26 +03:00
|
|
|
log.Debugf("Multi indexing: RTree (%d points)", s.geomParseOpts.IndexChildren)
|
2018-10-29 01:49:45 +03:00
|
|
|
|
2021-10-02 03:18:07 +03:00
|
|
|
nerr := make(chan error)
|
|
|
|
go func() {
|
|
|
|
// Start the server in the background
|
2021-12-09 19:24:26 +03:00
|
|
|
nerr <- s.netServe()
|
2021-10-02 03:18:07 +03:00
|
|
|
}()
|
|
|
|
|
2022-12-14 14:46:28 +03:00
|
|
|
var fstop atomic.Bool
|
|
|
|
go func() {
|
|
|
|
for !fstop.Load() {
|
|
|
|
s.fcond.Broadcast()
|
|
|
|
time.Sleep(time.Second / 4)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
2022-09-25 16:28:17 +03:00
|
|
|
go func() {
|
|
|
|
<-opts.Shutdown
|
2022-09-27 20:15:31 +03:00
|
|
|
s.stopServer.Store(true)
|
2022-09-25 16:28:17 +03:00
|
|
|
log.Warnf("Shutting down...")
|
2022-12-14 14:46:28 +03:00
|
|
|
fstop.Store(true)
|
2022-09-26 23:26:46 +03:00
|
|
|
s.lnmu.Lock()
|
|
|
|
ln := s.ln
|
|
|
|
s.ln = nil
|
|
|
|
s.lnmu.Unlock()
|
|
|
|
if ln != nil {
|
|
|
|
ln.Close()
|
|
|
|
}
|
2022-09-27 01:43:14 +03:00
|
|
|
for conn, f := range s.aofconnM {
|
|
|
|
conn.Close()
|
|
|
|
f.Close()
|
|
|
|
}
|
2022-09-25 16:28:17 +03:00
|
|
|
}()
|
|
|
|
|
2018-10-29 01:49:45 +03:00
|
|
|
// Load the queue before the aof
|
2022-09-25 01:42:07 +03:00
|
|
|
qdb, err := buntdb.Open(opts.QueueFileName)
|
2018-10-29 01:49:45 +03:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
var qidx uint64
|
|
|
|
if err := qdb.View(func(tx *buntdb.Tx) error {
|
|
|
|
val, err := tx.Get("hook:idx")
|
|
|
|
if err != nil {
|
|
|
|
if err == buntdb.ErrNotFound {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
qidx = stringToUint64(val)
|
|
|
|
return nil
|
|
|
|
}); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
err = qdb.CreateIndex("hooks", hookLogPrefix+"*", buntdb.IndexJSONCaseSensitive("hook"))
|
2016-03-05 02:08:16 +03:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2018-10-29 01:49:45 +03:00
|
|
|
|
2021-12-09 19:24:26 +03:00
|
|
|
s.qdb = qdb
|
|
|
|
s.qidx = qidx
|
|
|
|
if err := s.migrateAOF(); err != nil {
|
2018-10-29 01:49:45 +03:00
|
|
|
return err
|
2016-09-09 02:11:53 +03:00
|
|
|
}
|
2022-09-25 01:42:07 +03:00
|
|
|
if opts.AppendOnly {
|
|
|
|
f, err := os.OpenFile(opts.AppendFileName, os.O_CREATE|os.O_RDWR, 0600)
|
2016-03-05 02:08:16 +03:00
|
|
|
if err != nil {
|
2016-09-09 02:11:53 +03:00
|
|
|
return err
|
2016-03-05 02:08:16 +03:00
|
|
|
}
|
2021-12-09 19:24:26 +03:00
|
|
|
s.aof = f
|
|
|
|
if err := s.loadAOF(); err != nil {
|
2018-10-29 01:49:45 +03:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer func() {
|
2021-12-09 19:24:26 +03:00
|
|
|
s.flushAOF(false)
|
|
|
|
s.aof.Sync()
|
2018-10-29 01:49:45 +03:00
|
|
|
}()
|
2016-03-05 02:08:16 +03:00
|
|
|
}
|
|
|
|
|
2018-10-29 01:49:45 +03:00
|
|
|
// Start background routines
|
2022-09-25 16:28:17 +03:00
|
|
|
var bgwg sync.WaitGroup
|
|
|
|
|
2021-12-09 19:24:26 +03:00
|
|
|
if s.config.followHost() != "" {
|
2022-09-25 16:28:17 +03:00
|
|
|
bgwg.Add(1)
|
|
|
|
go func() {
|
|
|
|
defer bgwg.Done()
|
|
|
|
s.follow(s.config.followHost(), s.config.followPort(),
|
2022-09-27 20:15:31 +03:00
|
|
|
int(s.followc.Load()))
|
2022-09-25 16:28:17 +03:00
|
|
|
}()
|
2016-03-08 16:11:03 +03:00
|
|
|
}
|
2021-05-04 04:44:54 +03:00
|
|
|
|
2022-09-25 16:28:17 +03:00
|
|
|
var mln net.Listener
|
2021-09-06 18:55:13 +03:00
|
|
|
if opts.MetricsAddr != "" {
|
|
|
|
log.Infof("Listening for metrics at: %s", opts.MetricsAddr)
|
2022-09-25 16:28:17 +03:00
|
|
|
mln, err = net.Listen("tcp", opts.MetricsAddr)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
bgwg.Add(1)
|
2021-05-04 04:44:54 +03:00
|
|
|
go func() {
|
2022-09-25 16:28:17 +03:00
|
|
|
defer bgwg.Done()
|
|
|
|
smux := http.NewServeMux()
|
|
|
|
smux.HandleFunc("/", s.MetricsIndexHandler)
|
|
|
|
smux.HandleFunc("/metrics", s.MetricsHandler)
|
|
|
|
err := http.Serve(mln, smux)
|
|
|
|
if err != nil {
|
2022-09-27 20:15:31 +03:00
|
|
|
if !s.stopServer.Load() {
|
2022-09-25 16:28:17 +03:00
|
|
|
log.Fatalf("metrics server: %s", err)
|
|
|
|
}
|
|
|
|
}
|
2021-05-04 04:44:54 +03:00
|
|
|
}()
|
|
|
|
}
|
|
|
|
|
2022-09-25 16:28:17 +03:00
|
|
|
bgwg.Add(1)
|
|
|
|
go s.processLives(&bgwg)
|
|
|
|
bgwg.Add(1)
|
|
|
|
go s.watchOutOfMemory(&bgwg)
|
|
|
|
bgwg.Add(1)
|
|
|
|
go s.watchLuaStatePool(&bgwg)
|
|
|
|
bgwg.Add(1)
|
|
|
|
go s.watchAutoGC(&bgwg)
|
|
|
|
bgwg.Add(1)
|
|
|
|
go s.backgroundExpiring(&bgwg)
|
|
|
|
bgwg.Add(1)
|
|
|
|
go s.backgroundSyncAOF(&bgwg)
|
2017-10-01 05:34:25 +03:00
|
|
|
defer func() {
|
2022-09-25 16:28:17 +03:00
|
|
|
log.Debug("Stopping background routines")
|
2018-10-29 01:49:45 +03:00
|
|
|
// Stop background routines
|
2022-09-27 20:15:31 +03:00
|
|
|
s.followc.Add(1) // this will force any follow communication to die
|
|
|
|
s.stopServer.Store(true)
|
2022-09-25 16:28:17 +03:00
|
|
|
if mln != nil {
|
|
|
|
mln.Close() // Stop the metrics server
|
|
|
|
}
|
|
|
|
bgwg.Wait()
|
2017-10-01 05:34:25 +03:00
|
|
|
}()
|
2018-10-29 01:49:45 +03:00
|
|
|
|
2021-10-02 03:18:07 +03:00
|
|
|
// Server is now loaded and ready. Wait for network error messages.
|
2022-09-27 20:15:31 +03:00
|
|
|
s.loadedAndReady.Store(true)
|
2021-10-02 03:18:07 +03:00
|
|
|
return <-nerr
|
2018-10-29 01:49:45 +03:00
|
|
|
}
|
|
|
|
|
2021-12-09 19:24:26 +03:00
|
|
|
func (s *Server) isProtected() bool {
|
2022-09-25 01:42:07 +03:00
|
|
|
if s.opts.ProtectedMode == "no" {
|
2018-10-29 01:49:45 +03:00
|
|
|
// --protected-mode no
|
|
|
|
return false
|
|
|
|
}
|
2021-12-09 19:24:26 +03:00
|
|
|
if s.host != "" && s.host != "127.0.0.1" &&
|
|
|
|
s.host != "::1" && s.host != "localhost" {
|
2018-10-29 01:49:45 +03:00
|
|
|
// -h address
|
|
|
|
return false
|
|
|
|
}
|
2021-12-09 19:24:26 +03:00
|
|
|
is := s.config.protectedMode() != "no" && s.config.requirePass() == ""
|
2018-10-29 01:49:45 +03:00
|
|
|
return is
|
|
|
|
}
|
|
|
|
|
2021-12-09 19:24:26 +03:00
|
|
|
func (s *Server) netServe() error {
|
2021-09-07 15:51:15 +03:00
|
|
|
var ln net.Listener
|
|
|
|
var err error
|
2021-12-09 19:24:26 +03:00
|
|
|
if s.unix != "" {
|
|
|
|
os.RemoveAll(s.unix)
|
|
|
|
ln, err = net.Listen("unix", s.unix)
|
2021-09-07 15:51:15 +03:00
|
|
|
} else {
|
2021-12-09 19:24:26 +03:00
|
|
|
tcpAddr := fmt.Sprintf("%s:%d", s.host, s.port)
|
2021-09-07 15:51:15 +03:00
|
|
|
ln, err = net.Listen("tcp", tcpAddr)
|
|
|
|
}
|
2018-11-06 01:24:45 +03:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2022-09-26 23:26:46 +03:00
|
|
|
s.lnmu.Lock()
|
|
|
|
s.ln = ln
|
|
|
|
s.lnmu.Unlock()
|
2022-09-25 16:28:17 +03:00
|
|
|
|
|
|
|
var wg sync.WaitGroup
|
|
|
|
defer func() {
|
|
|
|
log.Debug("Closing client connections...")
|
|
|
|
s.connsmu.RLock()
|
|
|
|
for _, c := range s.conns {
|
|
|
|
c.closer.Close()
|
|
|
|
}
|
|
|
|
s.connsmu.RUnlock()
|
|
|
|
wg.Wait()
|
|
|
|
ln.Close()
|
|
|
|
log.Debug("Client connection closed")
|
|
|
|
}()
|
|
|
|
|
2018-11-06 01:24:45 +03:00
|
|
|
log.Infof("Ready to accept connections at %s", ln.Addr())
|
|
|
|
var clientID int64
|
|
|
|
for {
|
|
|
|
conn, err := ln.Accept()
|
|
|
|
if err != nil {
|
2022-09-27 20:15:31 +03:00
|
|
|
if s.stopServer.Load() {
|
2022-09-25 16:28:17 +03:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
log.Warn(err)
|
|
|
|
time.Sleep(time.Second / 5)
|
|
|
|
continue
|
2018-11-06 01:24:45 +03:00
|
|
|
}
|
2022-09-25 16:28:17 +03:00
|
|
|
wg.Add(1)
|
2018-11-06 01:24:45 +03:00
|
|
|
go func(conn net.Conn) {
|
2022-09-25 16:28:17 +03:00
|
|
|
defer wg.Done()
|
|
|
|
|
2018-11-06 01:24:45 +03:00
|
|
|
// open connection
|
|
|
|
// create the client
|
|
|
|
client := new(Client)
|
|
|
|
client.id = int(atomic.AddInt64(&clientID, 1))
|
|
|
|
client.opened = time.Now()
|
|
|
|
client.remoteAddr = conn.RemoteAddr().String()
|
2022-09-24 23:41:36 +03:00
|
|
|
client.closer = conn
|
2018-11-06 01:24:45 +03:00
|
|
|
|
|
|
|
// add client to server map
|
2021-12-09 19:24:26 +03:00
|
|
|
s.connsmu.Lock()
|
|
|
|
s.conns[client.id] = client
|
|
|
|
s.connsmu.Unlock()
|
2022-09-27 20:15:31 +03:00
|
|
|
s.statsTotalConns.Add(1)
|
2018-11-06 01:24:45 +03:00
|
|
|
|
|
|
|
// set the client keep-alive, if needed
|
2021-12-09 19:24:26 +03:00
|
|
|
if s.config.keepAlive() > 0 {
|
2018-11-06 01:24:45 +03:00
|
|
|
if conn, ok := conn.(*net.TCPConn); ok {
|
|
|
|
conn.SetKeepAlive(true)
|
|
|
|
conn.SetKeepAlivePeriod(
|
2021-12-09 19:24:26 +03:00
|
|
|
time.Duration(s.config.keepAlive()) * time.Second,
|
2018-11-06 01:24:45 +03:00
|
|
|
)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
log.Debugf("Opened connection: %s", client.remoteAddr)
|
|
|
|
|
|
|
|
defer func() {
|
|
|
|
// close connection
|
|
|
|
// delete from server map
|
2021-12-09 19:24:26 +03:00
|
|
|
s.connsmu.Lock()
|
|
|
|
delete(s.conns, client.id)
|
|
|
|
s.connsmu.Unlock()
|
2018-11-06 01:24:45 +03:00
|
|
|
log.Debugf("Closed connection: %s", client.remoteAddr)
|
|
|
|
conn.Close()
|
|
|
|
}()
|
|
|
|
|
2019-12-11 21:08:33 +03:00
|
|
|
var lastConnType Type
|
|
|
|
var lastOutputType Type
|
|
|
|
|
2018-11-06 01:24:45 +03:00
|
|
|
// check if the connection is protected
|
|
|
|
if !strings.HasPrefix(client.remoteAddr, "127.0.0.1:") &&
|
|
|
|
!strings.HasPrefix(client.remoteAddr, "[::1]:") {
|
2021-12-09 19:24:26 +03:00
|
|
|
if s.isProtected() {
|
2018-11-06 01:24:45 +03:00
|
|
|
// This is a protected server. Only loopback is allowed.
|
|
|
|
conn.Write(deniedMessage)
|
|
|
|
return // close connection
|
|
|
|
}
|
|
|
|
}
|
|
|
|
packet := make([]byte, 0xFFFF)
|
|
|
|
for {
|
|
|
|
var close bool
|
|
|
|
n, err := conn.Read(packet)
|
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
in := packet[:n]
|
|
|
|
|
|
|
|
// read the payload packet from the client input stream.
|
|
|
|
packet := client.in.Begin(in)
|
|
|
|
|
|
|
|
// load the pipeline reader
|
|
|
|
pr := &client.pr
|
|
|
|
rdbuf := bytes.NewBuffer(packet)
|
|
|
|
pr.rd = rdbuf
|
|
|
|
pr.wr = client
|
|
|
|
msgs, err := pr.ReadMessages()
|
|
|
|
for _, msg := range msgs {
|
|
|
|
// Just closing connection if we have deprecated HTTP or WS connection,
|
|
|
|
// And --http-transport = false
|
2021-12-09 19:24:26 +03:00
|
|
|
if !s.http && (msg.ConnType == WebSocket ||
|
2018-11-06 01:24:45 +03:00
|
|
|
msg.ConnType == HTTP) {
|
|
|
|
close = true // close connection
|
|
|
|
break
|
|
|
|
}
|
|
|
|
if msg != nil && msg.Command() != "" {
|
|
|
|
if client.outputType != Null {
|
|
|
|
msg.OutputType = client.outputType
|
|
|
|
}
|
|
|
|
if msg.Command() == "quit" {
|
|
|
|
if msg.OutputType == RESP {
|
|
|
|
io.WriteString(client, "+OK\r\n")
|
|
|
|
}
|
|
|
|
close = true // close connection
|
|
|
|
break
|
|
|
|
}
|
|
|
|
|
|
|
|
// increment last used
|
|
|
|
client.mu.Lock()
|
|
|
|
client.last = time.Now()
|
|
|
|
client.mu.Unlock()
|
|
|
|
|
|
|
|
// update total command count
|
2022-09-27 20:15:31 +03:00
|
|
|
s.statsTotalCommands.Add(1)
|
2018-11-06 01:24:45 +03:00
|
|
|
|
|
|
|
// handle the command
|
2021-12-09 19:24:26 +03:00
|
|
|
err := s.handleInputCommand(client, msg)
|
2018-11-06 01:24:45 +03:00
|
|
|
if err != nil {
|
|
|
|
if err.Error() == goingLive {
|
|
|
|
client.goLiveErr = err
|
|
|
|
client.goLiveMsg = msg
|
|
|
|
// detach
|
|
|
|
var rwc io.ReadWriteCloser = conn
|
|
|
|
client.conn = rwc
|
|
|
|
if len(client.out) > 0 {
|
|
|
|
client.conn.Write(client.out)
|
|
|
|
client.out = nil
|
|
|
|
}
|
2019-04-26 21:50:49 +03:00
|
|
|
client.in = InputStream{}
|
2018-11-06 01:24:45 +03:00
|
|
|
client.pr.rd = rwc
|
|
|
|
client.pr.wr = rwc
|
|
|
|
log.Debugf("Detached connection: %s", client.remoteAddr)
|
|
|
|
|
|
|
|
var wg sync.WaitGroup
|
|
|
|
wg.Add(1)
|
|
|
|
go func() {
|
|
|
|
defer wg.Done()
|
2021-12-09 19:24:26 +03:00
|
|
|
err := s.goLive(
|
2018-11-06 01:24:45 +03:00
|
|
|
client.goLiveErr,
|
|
|
|
&liveConn{conn.RemoteAddr(), rwc},
|
|
|
|
&client.pr,
|
|
|
|
client.goLiveMsg,
|
|
|
|
client.goLiveMsg.ConnType == WebSocket,
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
log.Error(err)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
wg.Wait()
|
|
|
|
return // close connection
|
|
|
|
}
|
|
|
|
log.Error(err)
|
|
|
|
return // close connection, NOW
|
|
|
|
}
|
|
|
|
|
|
|
|
client.outputType = msg.OutputType
|
|
|
|
} else {
|
|
|
|
client.Write([]byte("HTTP/1.1 500 Bad Request\r\nConnection: close\r\n\r\n"))
|
|
|
|
break
|
|
|
|
}
|
|
|
|
if msg.ConnType == HTTP || msg.ConnType == WebSocket {
|
|
|
|
close = true // close connection
|
|
|
|
break
|
|
|
|
}
|
2019-12-11 21:08:33 +03:00
|
|
|
lastOutputType = msg.OutputType
|
|
|
|
lastConnType = msg.ConnType
|
2018-11-06 01:24:45 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
packet = packet[len(packet)-rdbuf.Len():]
|
|
|
|
client.in.End(packet)
|
|
|
|
|
|
|
|
// write to client
|
|
|
|
if len(client.out) > 0 {
|
2022-11-03 20:07:17 +03:00
|
|
|
if s.aofdirty.Load() {
|
2018-11-11 02:21:07 +03:00
|
|
|
func() {
|
|
|
|
// prewrite
|
2021-12-09 19:24:26 +03:00
|
|
|
s.mu.Lock()
|
|
|
|
defer s.mu.Unlock()
|
|
|
|
s.flushAOF(false)
|
2018-11-11 02:21:07 +03:00
|
|
|
}()
|
2022-11-03 20:07:17 +03:00
|
|
|
s.aofdirty.Store(false)
|
2018-11-11 02:21:07 +03:00
|
|
|
}
|
2018-11-06 01:24:45 +03:00
|
|
|
conn.Write(client.out)
|
2018-11-10 23:30:56 +03:00
|
|
|
client.out = nil
|
2018-11-06 01:24:45 +03:00
|
|
|
}
|
|
|
|
if close {
|
|
|
|
break
|
|
|
|
}
|
2019-12-11 21:08:33 +03:00
|
|
|
if err != nil {
|
|
|
|
log.Error(err)
|
|
|
|
if lastConnType == RESP {
|
|
|
|
var value resp.Value
|
|
|
|
switch lastOutputType {
|
|
|
|
case JSON:
|
|
|
|
value = resp.StringValue(`{"ok":false,"err":` +
|
|
|
|
jsonString(err.Error()) + "}")
|
|
|
|
case RESP:
|
|
|
|
value = resp.ErrorValue(err)
|
|
|
|
}
|
|
|
|
bytes, _ := value.MarshalRESP()
|
|
|
|
conn.Write(bytes)
|
|
|
|
}
|
|
|
|
break // close connection
|
|
|
|
}
|
2018-11-06 01:24:45 +03:00
|
|
|
}
|
|
|
|
}(conn)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-10-29 01:49:45 +03:00
|
|
|
type liveConn struct {
|
|
|
|
remoteAddr net.Addr
|
|
|
|
rwc io.ReadWriteCloser
|
|
|
|
}
|
|
|
|
|
|
|
|
func (conn *liveConn) Close() error {
|
|
|
|
return conn.rwc.Close()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (conn *liveConn) LocalAddr() net.Addr {
|
|
|
|
panic("not supported")
|
|
|
|
}
|
|
|
|
|
|
|
|
func (conn *liveConn) RemoteAddr() net.Addr {
|
|
|
|
return conn.remoteAddr
|
|
|
|
}
|
|
|
|
func (conn *liveConn) Read(b []byte) (n int, err error) {
|
|
|
|
return conn.rwc.Read(b)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (conn *liveConn) Write(b []byte) (n int, err error) {
|
|
|
|
return conn.rwc.Write(b)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (conn *liveConn) SetDeadline(deadline time.Time) error {
|
|
|
|
panic("not supported")
|
|
|
|
}
|
|
|
|
|
|
|
|
func (conn *liveConn) SetReadDeadline(deadline time.Time) error {
|
|
|
|
panic("not supported")
|
|
|
|
}
|
|
|
|
|
|
|
|
func (conn *liveConn) SetWriteDeadline(deadline time.Time) error {
|
|
|
|
panic("not supported")
|
|
|
|
}
|
|
|
|
|
2022-09-25 16:28:17 +03:00
|
|
|
func (s *Server) watchAutoGC(wg *sync.WaitGroup) {
|
|
|
|
defer wg.Done()
|
2021-12-09 19:24:26 +03:00
|
|
|
start := time.Now()
|
2022-09-25 16:28:17 +03:00
|
|
|
s.loopUntilServerStops(time.Second, func() {
|
2021-12-09 19:24:26 +03:00
|
|
|
autoGC := s.config.autoGC()
|
2018-10-29 01:49:45 +03:00
|
|
|
if autoGC == 0 {
|
2022-09-25 16:28:17 +03:00
|
|
|
return
|
2018-10-29 01:49:45 +03:00
|
|
|
}
|
2021-12-09 19:24:26 +03:00
|
|
|
if time.Since(start) < time.Second*time.Duration(autoGC) {
|
2022-09-25 16:28:17 +03:00
|
|
|
return
|
2018-10-29 01:49:45 +03:00
|
|
|
}
|
|
|
|
var mem1, mem2 runtime.MemStats
|
|
|
|
runtime.ReadMemStats(&mem1)
|
|
|
|
log.Debugf("autogc(before): "+
|
|
|
|
"alloc: %v, heap_alloc: %v, heap_released: %v",
|
|
|
|
mem1.Alloc, mem1.HeapAlloc, mem1.HeapReleased)
|
|
|
|
|
|
|
|
runtime.GC()
|
|
|
|
debug.FreeOSMemory()
|
|
|
|
runtime.ReadMemStats(&mem2)
|
|
|
|
log.Debugf("autogc(after): "+
|
|
|
|
"alloc: %v, heap_alloc: %v, heap_released: %v",
|
|
|
|
mem2.Alloc, mem2.HeapAlloc, mem2.HeapReleased)
|
2021-12-09 19:24:26 +03:00
|
|
|
start = time.Now()
|
2022-09-25 16:28:17 +03:00
|
|
|
})
|
2018-10-29 01:49:45 +03:00
|
|
|
}
|
|
|
|
|
2022-09-23 22:42:39 +03:00
|
|
|
func (s *Server) checkOutOfMemory() {
|
2022-09-27 20:15:31 +03:00
|
|
|
if s.stopServer.Load() {
|
2022-09-23 22:42:39 +03:00
|
|
|
return
|
|
|
|
}
|
2022-09-27 20:15:31 +03:00
|
|
|
oom := s.outOfMemory.Load()
|
2022-09-23 22:42:39 +03:00
|
|
|
var mem runtime.MemStats
|
|
|
|
if s.config.maxMemory() == 0 {
|
|
|
|
if oom {
|
2022-09-27 20:15:31 +03:00
|
|
|
s.outOfMemory.Store(false)
|
2022-09-23 22:42:39 +03:00
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if oom {
|
|
|
|
runtime.GC()
|
|
|
|
}
|
|
|
|
runtime.ReadMemStats(&mem)
|
2022-09-27 20:15:31 +03:00
|
|
|
s.outOfMemory.Store(int(mem.HeapAlloc) > s.config.maxMemory())
|
2022-09-23 22:42:39 +03:00
|
|
|
}
|
|
|
|
|
2022-09-25 16:28:17 +03:00
|
|
|
func (s *Server) loopUntilServerStops(dur time.Duration, op func()) {
|
|
|
|
var last time.Time
|
|
|
|
for {
|
2022-09-27 20:15:31 +03:00
|
|
|
if s.stopServer.Load() {
|
2022-09-25 16:28:17 +03:00
|
|
|
return
|
|
|
|
}
|
|
|
|
now := time.Now()
|
|
|
|
if now.Sub(last) > dur {
|
|
|
|
op()
|
|
|
|
last = now
|
|
|
|
}
|
|
|
|
time.Sleep(time.Second / 5)
|
2018-10-29 01:49:45 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-09-25 16:28:17 +03:00
|
|
|
func (s *Server) watchOutOfMemory(wg *sync.WaitGroup) {
|
|
|
|
defer wg.Done()
|
|
|
|
s.loopUntilServerStops(time.Second*4, func() {
|
|
|
|
s.checkOutOfMemory()
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Server) watchLuaStatePool(wg *sync.WaitGroup) {
|
|
|
|
defer wg.Done()
|
|
|
|
s.loopUntilServerStops(time.Second*10, func() {
|
|
|
|
s.luapool.Prune()
|
|
|
|
})
|
2018-10-29 01:49:45 +03:00
|
|
|
}
|
|
|
|
|
2019-03-10 20:48:14 +03:00
|
|
|
// backgroundSyncAOF ensures that the aof buffer is does not grow too big.
|
2022-09-25 16:28:17 +03:00
|
|
|
func (s *Server) backgroundSyncAOF(wg *sync.WaitGroup) {
|
|
|
|
defer wg.Done()
|
|
|
|
s.loopUntilServerStops(time.Second, func() {
|
|
|
|
s.mu.Lock()
|
|
|
|
defer s.mu.Unlock()
|
|
|
|
s.flushAOF(true)
|
|
|
|
})
|
2019-03-10 20:48:14 +03:00
|
|
|
}
|
|
|
|
|
2018-10-29 01:49:45 +03:00
|
|
|
func isReservedFieldName(field string) bool {
|
|
|
|
switch field {
|
|
|
|
case "z", "lat", "lon":
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2019-04-26 00:15:12 +03:00
|
|
|
func rewriteTimeoutMsg(msg *Message) (err error) {
|
|
|
|
vs := msg.Args[1:]
|
|
|
|
var valStr string
|
|
|
|
var ok bool
|
|
|
|
if vs, valStr, ok = tokenval(vs); !ok || valStr == "" || len(vs) == 0 {
|
|
|
|
err = errInvalidNumberOfArguments
|
|
|
|
return
|
|
|
|
}
|
|
|
|
timeoutSec, _err := strconv.ParseFloat(valStr, 64)
|
|
|
|
if _err != nil || timeoutSec < 0 {
|
|
|
|
err = errInvalidArgument(valStr)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
msg.Args = vs[:]
|
|
|
|
msg._command = ""
|
|
|
|
msg.Deadline = deadline.New(
|
|
|
|
time.Now().Add(time.Duration(timeoutSec * float64(time.Second))))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-12-09 19:24:26 +03:00
|
|
|
func (s *Server) handleInputCommand(client *Client, msg *Message) error {
|
2018-10-29 01:49:45 +03:00
|
|
|
start := time.Now()
|
|
|
|
serializeOutput := func(res resp.Value) (string, error) {
|
|
|
|
var resStr string
|
|
|
|
var err error
|
|
|
|
switch msg.OutputType {
|
|
|
|
case JSON:
|
|
|
|
resStr = res.String()
|
|
|
|
case RESP:
|
|
|
|
var resBytes []byte
|
|
|
|
resBytes, err = res.MarshalRESP()
|
|
|
|
resStr = string(resBytes)
|
2016-03-28 18:57:41 +03:00
|
|
|
}
|
2018-10-29 01:49:45 +03:00
|
|
|
return resStr, err
|
2016-03-05 02:08:16 +03:00
|
|
|
}
|
2018-10-29 01:49:45 +03:00
|
|
|
writeOutput := func(res string) error {
|
|
|
|
switch msg.ConnType {
|
|
|
|
default:
|
|
|
|
err := fmt.Errorf("unsupported conn type: %v", msg.ConnType)
|
|
|
|
log.Error(err)
|
|
|
|
return err
|
|
|
|
case WebSocket:
|
|
|
|
return WriteWebSocketMessage(client, []byte(res))
|
|
|
|
case HTTP:
|
2020-11-07 15:22:11 +03:00
|
|
|
status := "200 OK"
|
2021-12-09 19:24:26 +03:00
|
|
|
if (s.http500Errors || msg._command == "healthz") &&
|
2021-05-26 02:36:49 +03:00
|
|
|
!gjson.Get(res, "ok").Bool() {
|
2020-11-07 15:22:11 +03:00
|
|
|
status = "500 Internal Server Error"
|
|
|
|
}
|
|
|
|
_, err := fmt.Fprintf(client, "HTTP/1.1 %s\r\n"+
|
2018-10-29 01:49:45 +03:00
|
|
|
"Connection: close\r\n"+
|
|
|
|
"Content-Length: %d\r\n"+
|
|
|
|
"Content-Type: application/json; charset=utf-8\r\n"+
|
2024-05-06 06:43:56 +03:00
|
|
|
"Access-Control-Allow-Origin: *\r\n"+
|
2020-11-07 15:22:11 +03:00
|
|
|
"\r\n", status, len(res)+2)
|
2018-10-29 01:49:45 +03:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
_, err = io.WriteString(client, res)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
_, err = io.WriteString(client, "\r\n")
|
|
|
|
return err
|
|
|
|
case RESP:
|
|
|
|
var err error
|
|
|
|
if msg.OutputType == JSON {
|
|
|
|
_, err = fmt.Fprintf(client, "$%d\r\n%s\r\n", len(res), res)
|
|
|
|
} else {
|
|
|
|
_, err = io.WriteString(client, res)
|
|
|
|
}
|
|
|
|
return err
|
|
|
|
case Native:
|
|
|
|
_, err := fmt.Fprintf(client, "$%d %s\r\n", len(res), res)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
2018-11-10 23:30:56 +03:00
|
|
|
|
2021-05-04 04:44:54 +03:00
|
|
|
cmd := msg.Command()
|
|
|
|
defer func() {
|
2021-07-10 13:59:27 +03:00
|
|
|
took := time.Since(start).Seconds()
|
2021-05-04 04:44:54 +03:00
|
|
|
cmdDurations.With(prometheus.Labels{"cmd": cmd}).Observe(took)
|
|
|
|
}()
|
|
|
|
|
2018-10-29 01:49:45 +03:00
|
|
|
// Ping. Just send back the response. No need to put through the pipeline.
|
2021-05-04 04:44:54 +03:00
|
|
|
if cmd == "ping" || cmd == "echo" {
|
2018-10-29 01:49:45 +03:00
|
|
|
switch msg.OutputType {
|
|
|
|
case JSON:
|
|
|
|
if len(msg.Args) > 1 {
|
2021-05-04 04:44:54 +03:00
|
|
|
return writeOutput(`{"ok":true,"` + cmd + `":` + jsonString(msg.Args[1]) + `,"elapsed":"` + time.Since(start).String() + `"}`)
|
2018-10-29 01:49:45 +03:00
|
|
|
}
|
2021-05-04 04:44:54 +03:00
|
|
|
return writeOutput(`{"ok":true,"` + cmd + `":"pong","elapsed":"` + time.Since(start).String() + `"}`)
|
2018-10-29 01:49:45 +03:00
|
|
|
case RESP:
|
|
|
|
if len(msg.Args) > 1 {
|
|
|
|
data := redcon.AppendBulkString(nil, msg.Args[1])
|
|
|
|
return writeOutput(string(data))
|
|
|
|
}
|
|
|
|
return writeOutput("+PONG\r\n")
|
|
|
|
}
|
2021-12-09 19:24:26 +03:00
|
|
|
s.sendMonitor(nil, msg, client, false)
|
2018-10-29 01:49:45 +03:00
|
|
|
return nil
|
|
|
|
}
|
2018-11-10 23:30:56 +03:00
|
|
|
|
2018-10-29 01:49:45 +03:00
|
|
|
writeErr := func(errMsg string) error {
|
|
|
|
switch msg.OutputType {
|
|
|
|
case JSON:
|
2021-03-31 18:13:44 +03:00
|
|
|
return writeOutput(`{"ok":false,"err":` + jsonString(errMsg) + `,"elapsed":"` + time.Since(start).String() + "\"}")
|
2018-10-29 01:49:45 +03:00
|
|
|
case RESP:
|
|
|
|
if errMsg == errInvalidNumberOfArguments.Error() {
|
2021-05-04 04:44:54 +03:00
|
|
|
return writeOutput("-ERR wrong number of arguments for '" + cmd + "' command\r\n")
|
2018-10-29 01:49:45 +03:00
|
|
|
}
|
2021-10-02 03:18:07 +03:00
|
|
|
var ucprefix bool
|
|
|
|
word := strings.Split(errMsg, " ")[0]
|
|
|
|
if len(word) > 0 {
|
|
|
|
ucprefix = true
|
|
|
|
for i := 0; i < len(word); i++ {
|
|
|
|
if word[i] < 'A' || word[i] > 'Z' {
|
|
|
|
ucprefix = false
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if !ucprefix {
|
|
|
|
errMsg = "ERR " + errMsg
|
|
|
|
}
|
|
|
|
v, _ := resp.ErrorValue(errors.New(errMsg)).MarshalRESP()
|
2018-10-29 01:49:45 +03:00
|
|
|
return writeOutput(string(v))
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2022-09-27 20:15:31 +03:00
|
|
|
if !s.loadedAndReady.Load() {
|
2021-10-02 03:18:07 +03:00
|
|
|
switch msg.Command() {
|
2023-07-27 00:26:44 +03:00
|
|
|
case "output", "ping", "echo", "auth":
|
2021-10-02 03:18:07 +03:00
|
|
|
default:
|
|
|
|
return writeErr("LOADING Tile38 is loading the dataset in memory")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-03-10 22:44:40 +03:00
|
|
|
if cmd == "hello" {
|
|
|
|
// Not Supporting RESP3+, returns an ERR instead.
|
|
|
|
return writeErr("unknown command '" + msg.Args[0] + "'")
|
|
|
|
}
|
|
|
|
|
2021-05-04 04:44:54 +03:00
|
|
|
if cmd == "timeout" {
|
2019-04-26 00:15:12 +03:00
|
|
|
if err := rewriteTimeoutMsg(msg); err != nil {
|
|
|
|
return writeErr(err.Error())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-10-29 01:49:45 +03:00
|
|
|
var write bool
|
|
|
|
|
2023-07-31 14:51:14 +03:00
|
|
|
if (!client.authd || cmd == "auth") && cmd != "output" && cmd != "healthz" {
|
2021-12-09 19:24:26 +03:00
|
|
|
if s.config.requirePass() != "" {
|
2018-10-29 01:49:45 +03:00
|
|
|
password := ""
|
|
|
|
// This better be an AUTH command or the Message should contain an Auth
|
2021-05-04 04:44:54 +03:00
|
|
|
if cmd != "auth" && msg.Auth == "" {
|
2018-10-29 01:49:45 +03:00
|
|
|
// Just shut down the pipeline now. The less the client connection knows the better.
|
|
|
|
return writeErr("authentication required")
|
|
|
|
}
|
|
|
|
if msg.Auth != "" {
|
|
|
|
password = msg.Auth
|
|
|
|
} else {
|
|
|
|
if len(msg.Args) > 1 {
|
|
|
|
password = msg.Args[1]
|
|
|
|
}
|
|
|
|
}
|
2021-12-09 19:24:26 +03:00
|
|
|
if s.config.requirePass() != strings.TrimSpace(password) {
|
2018-10-29 01:49:45 +03:00
|
|
|
return writeErr("invalid password")
|
|
|
|
}
|
|
|
|
client.authd = true
|
|
|
|
if msg.ConnType != HTTP {
|
|
|
|
resStr, _ := serializeOutput(OKMessage(msg, start))
|
|
|
|
return writeOutput(resStr)
|
|
|
|
}
|
|
|
|
} else if msg.Command() == "auth" {
|
|
|
|
return writeErr("invalid password")
|
|
|
|
}
|
|
|
|
}
|
2018-11-10 23:30:56 +03:00
|
|
|
|
2018-10-29 01:49:45 +03:00
|
|
|
// choose the locking strategy
|
|
|
|
switch msg.Command() {
|
|
|
|
default:
|
2021-12-09 19:24:26 +03:00
|
|
|
s.mu.RLock()
|
|
|
|
defer s.mu.RUnlock()
|
2018-10-29 01:49:45 +03:00
|
|
|
case "set", "del", "drop", "fset", "flushdb",
|
|
|
|
"setchan", "pdelchan", "delchan",
|
|
|
|
"sethook", "pdelhook", "delhook",
|
2018-12-28 04:15:53 +03:00
|
|
|
"expire", "persist", "jset", "pdel", "rename", "renamenx":
|
2018-10-29 01:49:45 +03:00
|
|
|
// write operations
|
|
|
|
write = true
|
2021-12-09 19:24:26 +03:00
|
|
|
s.mu.Lock()
|
|
|
|
defer s.mu.Unlock()
|
|
|
|
if s.config.followHost() != "" {
|
2018-10-29 01:49:45 +03:00
|
|
|
return writeErr("not the leader")
|
|
|
|
}
|
2021-12-09 19:24:26 +03:00
|
|
|
if s.config.readOnly() {
|
2018-10-29 01:49:45 +03:00
|
|
|
return writeErr("read only")
|
|
|
|
}
|
|
|
|
case "eval", "evalsha":
|
|
|
|
// write operations (potentially) but no AOF for the script command itself
|
2021-12-09 19:24:26 +03:00
|
|
|
s.mu.Lock()
|
|
|
|
defer s.mu.Unlock()
|
|
|
|
if s.config.followHost() != "" {
|
2018-10-29 01:49:45 +03:00
|
|
|
return writeErr("not the leader")
|
|
|
|
}
|
2021-12-09 19:24:26 +03:00
|
|
|
if s.config.readOnly() {
|
2018-10-29 01:49:45 +03:00
|
|
|
return writeErr("read only")
|
|
|
|
}
|
|
|
|
case "get", "keys", "scan", "nearby", "within", "intersects", "hooks",
|
|
|
|
"chans", "search", "ttl", "bounds", "server", "info", "type", "jget",
|
2024-03-25 08:54:40 +03:00
|
|
|
"evalro", "evalrosha", "healthz", "role", "fget", "exists", "fexists":
|
2018-10-29 01:49:45 +03:00
|
|
|
// read operations
|
2018-11-10 23:30:56 +03:00
|
|
|
|
2021-12-09 19:24:26 +03:00
|
|
|
s.mu.RLock()
|
|
|
|
defer s.mu.RUnlock()
|
|
|
|
if s.config.followHost() != "" && !s.fcuponce {
|
2018-10-29 01:49:45 +03:00
|
|
|
return writeErr("catching up to leader")
|
|
|
|
}
|
2019-01-19 00:51:20 +03:00
|
|
|
case "follow", "slaveof", "replconf", "readonly", "config":
|
2018-10-29 01:49:45 +03:00
|
|
|
// system operations
|
|
|
|
// does not write to aof, but requires a write lock.
|
2021-12-09 19:24:26 +03:00
|
|
|
s.mu.Lock()
|
|
|
|
defer s.mu.Unlock()
|
2019-04-26 00:15:12 +03:00
|
|
|
case "output":
|
2018-10-29 01:49:45 +03:00
|
|
|
// this is local connection operation. Locks not needed.
|
|
|
|
case "echo":
|
|
|
|
case "massinsert":
|
|
|
|
// dev operation
|
|
|
|
case "sleep":
|
|
|
|
// dev operation
|
2021-12-09 19:24:26 +03:00
|
|
|
s.mu.RLock()
|
|
|
|
defer s.mu.RUnlock()
|
2018-10-29 01:49:45 +03:00
|
|
|
case "shutdown":
|
|
|
|
// dev operation
|
2021-12-09 19:24:26 +03:00
|
|
|
s.mu.Lock()
|
|
|
|
defer s.mu.Unlock()
|
2018-10-29 01:49:45 +03:00
|
|
|
case "aofshrink":
|
2021-12-09 19:24:26 +03:00
|
|
|
s.mu.RLock()
|
|
|
|
defer s.mu.RUnlock()
|
2018-10-29 01:49:45 +03:00
|
|
|
case "client":
|
2021-12-09 19:24:26 +03:00
|
|
|
s.mu.Lock()
|
|
|
|
defer s.mu.Unlock()
|
2018-10-29 01:49:45 +03:00
|
|
|
case "evalna", "evalnasha":
|
|
|
|
// No locking for scripts, otherwise writes cannot happen within scripts
|
|
|
|
case "subscribe", "psubscribe", "publish":
|
|
|
|
// No locking for pubsub
|
2021-05-04 04:44:54 +03:00
|
|
|
case "monitor":
|
2020-08-12 22:38:35 +03:00
|
|
|
// No locking for monitor
|
2018-10-29 01:49:45 +03:00
|
|
|
}
|
2019-04-24 15:09:41 +03:00
|
|
|
res, d, err := func() (res resp.Value, d commandDetails, err error) {
|
2019-04-26 00:15:12 +03:00
|
|
|
if msg.Deadline != nil {
|
|
|
|
if write {
|
|
|
|
res = NOMessage
|
2019-04-26 21:50:49 +03:00
|
|
|
err = errTimeoutOnCmd(msg.Command())
|
2019-04-26 00:15:12 +03:00
|
|
|
return
|
2019-04-24 23:20:57 +03:00
|
|
|
}
|
2019-04-24 15:09:41 +03:00
|
|
|
defer func() {
|
|
|
|
if msg.Deadline.Hit() {
|
|
|
|
v := recover()
|
|
|
|
if v != nil {
|
|
|
|
if s, ok := v.(string); !ok || s != "deadline" {
|
|
|
|
panic(v)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
res = NOMessage
|
2022-09-24 17:22:39 +03:00
|
|
|
err = errTimeout
|
2019-04-24 15:09:41 +03:00
|
|
|
}
|
|
|
|
}()
|
|
|
|
}
|
2021-12-09 19:24:26 +03:00
|
|
|
res, d, err = s.command(msg, client)
|
2021-09-08 21:07:07 +03:00
|
|
|
if msg.Deadline != nil {
|
|
|
|
msg.Deadline.Check()
|
|
|
|
}
|
|
|
|
return res, d, err
|
2019-04-24 15:09:41 +03:00
|
|
|
}()
|
2018-10-29 01:49:45 +03:00
|
|
|
if res.Type() == resp.Error {
|
|
|
|
return writeErr(res.String())
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
if err.Error() == goingLive {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return writeErr(err.Error())
|
|
|
|
}
|
|
|
|
if write {
|
2021-12-09 19:24:26 +03:00
|
|
|
if err := s.writeAOF(msg.Args, &d); err != nil {
|
2018-10-29 01:49:45 +03:00
|
|
|
if _, ok := err.(errAOFHook); ok {
|
|
|
|
return writeErr(err.Error())
|
|
|
|
}
|
|
|
|
log.Fatal(err)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
2022-09-24 17:22:39 +03:00
|
|
|
var resStr string
|
|
|
|
resStr, err = serializeOutput(res)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := writeOutput(resStr); err != nil {
|
|
|
|
return err
|
2018-10-29 01:49:45 +03:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func randomKey(n int) string {
|
|
|
|
b := make([]byte, n)
|
|
|
|
nn, err := rand.Read(b)
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
if nn != n {
|
|
|
|
panic("random failed")
|
|
|
|
}
|
|
|
|
return fmt.Sprintf("%x", b)
|
|
|
|
}
|
|
|
|
|
2021-12-09 19:24:26 +03:00
|
|
|
func (s *Server) reset() {
|
|
|
|
s.aofsz = 0
|
2022-09-13 18:16:41 +03:00
|
|
|
s.cols.Clear()
|
2018-10-29 01:49:45 +03:00
|
|
|
}
|
|
|
|
|
2021-12-09 19:24:26 +03:00
|
|
|
func (s *Server) command(msg *Message, client *Client) (
|
2018-11-24 01:53:33 +03:00
|
|
|
res resp.Value, d commandDetails, err error,
|
2018-10-29 01:49:45 +03:00
|
|
|
) {
|
|
|
|
switch msg.Command() {
|
|
|
|
default:
|
|
|
|
err = fmt.Errorf("unknown command '%s'", msg.Args[0])
|
|
|
|
case "set":
|
2022-09-20 03:47:38 +03:00
|
|
|
res, d, err = s.cmdSET(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "fset":
|
2022-09-20 03:47:38 +03:00
|
|
|
res, d, err = s.cmdFSET(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "del":
|
2022-09-23 19:04:01 +03:00
|
|
|
res, d, err = s.cmdDEL(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "pdel":
|
2022-09-23 19:04:01 +03:00
|
|
|
res, d, err = s.cmdPDEL(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "drop":
|
2022-09-23 20:42:43 +03:00
|
|
|
res, d, err = s.cmdDROP(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "flushdb":
|
2022-09-20 03:47:38 +03:00
|
|
|
res, d, err = s.cmdFLUSHDB(msg)
|
2018-12-28 04:15:53 +03:00
|
|
|
case "rename":
|
2022-09-23 21:18:01 +03:00
|
|
|
res, d, err = s.cmdRENAME(msg)
|
2018-12-28 04:15:53 +03:00
|
|
|
case "renamenx":
|
2022-09-23 21:18:01 +03:00
|
|
|
res, d, err = s.cmdRENAME(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "sethook":
|
2021-12-09 19:24:26 +03:00
|
|
|
res, d, err = s.cmdSetHook(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "delhook":
|
2021-12-09 19:24:26 +03:00
|
|
|
res, d, err = s.cmdDelHook(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "pdelhook":
|
2021-12-09 19:24:26 +03:00
|
|
|
res, d, err = s.cmdPDelHook(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "hooks":
|
2021-12-09 19:24:26 +03:00
|
|
|
res, err = s.cmdHooks(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "setchan":
|
2021-12-09 19:24:26 +03:00
|
|
|
res, d, err = s.cmdSetHook(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "delchan":
|
2021-12-09 19:24:26 +03:00
|
|
|
res, d, err = s.cmdDelHook(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "pdelchan":
|
2021-12-09 19:24:26 +03:00
|
|
|
res, d, err = s.cmdPDelHook(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "chans":
|
2021-12-09 19:24:26 +03:00
|
|
|
res, err = s.cmdHooks(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "expire":
|
2022-09-20 03:47:38 +03:00
|
|
|
res, d, err = s.cmdEXPIRE(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "persist":
|
2022-09-20 03:47:38 +03:00
|
|
|
res, d, err = s.cmdPERSIST(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "ttl":
|
2021-12-09 19:24:26 +03:00
|
|
|
res, err = s.cmdTTL(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "shutdown":
|
2022-09-25 01:42:07 +03:00
|
|
|
if !s.opts.DevMode {
|
2018-10-29 01:49:45 +03:00
|
|
|
err = fmt.Errorf("unknown command '%s'", msg.Args[0])
|
|
|
|
return
|
|
|
|
}
|
|
|
|
log.Fatal("shutdown requested by developer")
|
|
|
|
case "massinsert":
|
2022-09-25 01:42:07 +03:00
|
|
|
if !s.opts.DevMode {
|
2018-10-29 01:49:45 +03:00
|
|
|
err = fmt.Errorf("unknown command '%s'", msg.Args[0])
|
|
|
|
return
|
|
|
|
}
|
2021-12-09 19:24:26 +03:00
|
|
|
res, err = s.cmdMassInsert(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "sleep":
|
2022-09-25 01:42:07 +03:00
|
|
|
if !s.opts.DevMode {
|
2018-10-29 01:49:45 +03:00
|
|
|
err = fmt.Errorf("unknown command '%s'", msg.Args[0])
|
|
|
|
return
|
|
|
|
}
|
2021-12-09 19:24:26 +03:00
|
|
|
res, err = s.cmdSleep(msg)
|
2019-01-19 00:51:20 +03:00
|
|
|
case "follow", "slaveof":
|
2021-12-09 19:24:26 +03:00
|
|
|
res, err = s.cmdFollow(msg)
|
2019-01-19 00:51:20 +03:00
|
|
|
case "replconf":
|
2021-12-09 19:24:26 +03:00
|
|
|
res, err = s.cmdReplConf(msg, client)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "readonly":
|
2022-09-27 03:58:51 +03:00
|
|
|
res, err = s.cmdREADONLY(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "stats":
|
2022-09-24 01:29:46 +03:00
|
|
|
res, err = s.cmdSTATS(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "server":
|
2022-09-24 03:54:49 +03:00
|
|
|
res, err = s.cmdSERVER(msg)
|
2021-05-26 02:36:49 +03:00
|
|
|
case "healthz":
|
2022-09-24 03:34:09 +03:00
|
|
|
res, err = s.cmdHEALTHZ(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "info":
|
2022-09-25 00:28:47 +03:00
|
|
|
res, err = s.cmdINFO(msg)
|
2023-05-21 18:22:27 +03:00
|
|
|
case "role":
|
|
|
|
res, err = s.cmdROLE(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "scan":
|
2021-12-09 19:24:26 +03:00
|
|
|
res, err = s.cmdScan(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "nearby":
|
2021-12-09 19:24:26 +03:00
|
|
|
res, err = s.cmdNearby(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "within":
|
2022-09-20 03:47:38 +03:00
|
|
|
res, err = s.cmdWITHIN(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "intersects":
|
2022-09-20 03:47:38 +03:00
|
|
|
res, err = s.cmdINTERSECTS(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "search":
|
2021-12-09 19:24:26 +03:00
|
|
|
res, err = s.cmdSearch(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "bounds":
|
2022-09-23 17:51:05 +03:00
|
|
|
res, err = s.cmdBOUNDS(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "get":
|
2022-09-23 20:42:43 +03:00
|
|
|
res, err = s.cmdGET(msg)
|
2024-03-18 23:10:04 +03:00
|
|
|
case "fget":
|
|
|
|
res, err = s.cmdFGET(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "jget":
|
2021-12-09 19:24:26 +03:00
|
|
|
res, err = s.cmdJget(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "jset":
|
2021-12-09 19:24:26 +03:00
|
|
|
res, d, err = s.cmdJset(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "jdel":
|
2021-12-09 19:24:26 +03:00
|
|
|
res, d, err = s.cmdJdel(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "type":
|
2022-09-23 19:04:01 +03:00
|
|
|
res, err = s.cmdTYPE(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "keys":
|
2022-09-24 02:12:32 +03:00
|
|
|
res, err = s.cmdKEYS(msg)
|
2024-03-19 06:19:16 +03:00
|
|
|
case "exists":
|
|
|
|
res, err = s.cmdEXISTS(msg)
|
|
|
|
case "fexists":
|
|
|
|
res, err = s.cmdFEXISTS(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "output":
|
2022-09-28 00:19:57 +03:00
|
|
|
res, err = s.cmdOUTPUT(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "aof":
|
2021-12-09 19:24:26 +03:00
|
|
|
res, err = s.cmdAOF(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "aofmd5":
|
2021-12-09 19:24:26 +03:00
|
|
|
res, err = s.cmdAOFMD5(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "gc":
|
|
|
|
runtime.GC()
|
|
|
|
debug.FreeOSMemory()
|
|
|
|
res = OKMessage(msg, time.Now())
|
|
|
|
case "aofshrink":
|
2021-12-09 19:24:26 +03:00
|
|
|
go s.aofshrink()
|
2018-10-29 01:49:45 +03:00
|
|
|
res = OKMessage(msg, time.Now())
|
|
|
|
case "config get":
|
2021-12-09 19:24:26 +03:00
|
|
|
res, err = s.cmdConfigGet(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "config set":
|
2021-12-09 19:24:26 +03:00
|
|
|
res, err = s.cmdConfigSet(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "config rewrite":
|
2021-12-09 19:24:26 +03:00
|
|
|
res, err = s.cmdConfigRewrite(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "config", "script":
|
|
|
|
// These get rewritten into "config foo" and "script bar"
|
|
|
|
err = fmt.Errorf("unknown command '%s'", msg.Args[0])
|
|
|
|
if len(msg.Args) > 1 {
|
2018-11-20 21:25:48 +03:00
|
|
|
msg.Args[1] = msg.Args[0] + " " + msg.Args[1]
|
2018-10-29 01:49:45 +03:00
|
|
|
msg.Args = msg.Args[1:]
|
2018-11-20 21:25:48 +03:00
|
|
|
msg._command = ""
|
2021-12-09 19:24:26 +03:00
|
|
|
return s.command(msg, client)
|
2018-10-29 01:49:45 +03:00
|
|
|
}
|
|
|
|
case "client":
|
2022-09-24 16:22:58 +03:00
|
|
|
res, err = s.cmdCLIENT(msg, client)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "eval", "evalro", "evalna":
|
2021-12-09 19:24:26 +03:00
|
|
|
res, err = s.cmdEvalUnified(false, msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "evalsha", "evalrosha", "evalnasha":
|
2021-12-09 19:24:26 +03:00
|
|
|
res, err = s.cmdEvalUnified(true, msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "script load":
|
2021-12-09 19:24:26 +03:00
|
|
|
res, err = s.cmdScriptLoad(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "script exists":
|
2021-12-09 19:24:26 +03:00
|
|
|
res, err = s.cmdScriptExists(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "script flush":
|
2021-12-09 19:24:26 +03:00
|
|
|
res, err = s.cmdScriptFlush(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "subscribe":
|
2021-12-09 19:24:26 +03:00
|
|
|
res, err = s.cmdSubscribe(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "psubscribe":
|
2021-12-09 19:24:26 +03:00
|
|
|
res, err = s.cmdPsubscribe(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
case "publish":
|
2021-12-09 19:24:26 +03:00
|
|
|
res, err = s.cmdPublish(msg)
|
2019-02-09 00:57:29 +03:00
|
|
|
case "test":
|
2022-09-27 18:18:17 +03:00
|
|
|
res, err = s.cmdTEST(msg)
|
2020-08-12 22:38:35 +03:00
|
|
|
case "monitor":
|
2021-12-09 19:24:26 +03:00
|
|
|
res, err = s.cmdMonitor(msg)
|
2018-10-29 01:49:45 +03:00
|
|
|
}
|
2022-09-24 16:22:58 +03:00
|
|
|
|
2021-12-09 19:24:26 +03:00
|
|
|
s.sendMonitor(err, msg, client, false)
|
2018-10-29 01:49:45 +03:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// This phrase is copied nearly verbatim from Redis.
|
|
|
|
var deniedMessage = []byte(strings.Replace(strings.TrimSpace(`
|
|
|
|
-DENIED Tile38 is running in protected mode because protected mode is enabled,
|
|
|
|
no bind address was specified, no authentication password is requested to
|
|
|
|
clients. In this mode connections are only accepted from the loopback
|
|
|
|
interface. If you want to connect from external computers to Tile38 you may
|
|
|
|
adopt one of the following solutions: 1) Just disable protected mode sending
|
|
|
|
the command 'CONFIG SET protected-mode no' from the loopback interface by
|
|
|
|
connecting to Tile38 from the same host the server is running, however MAKE
|
|
|
|
SURE Tile38 is not publicly accessible from internet if you do so. Use CONFIG
|
|
|
|
REWRITE to make this change permanent. 2) Alternatively you can just disable
|
|
|
|
the protected mode by editing the Tile38 configuration file, and setting the
|
|
|
|
protected mode option to 'no', and then restarting the server. 3) If you
|
|
|
|
started the server manually just for testing, restart it with the
|
|
|
|
'--protected-mode no' option. 4) Setup a bind address or an authentication
|
|
|
|
password. NOTE: You only need to do one of the above things in order for the
|
|
|
|
server to start accepting connections from the outside.
|
|
|
|
`), "\n", " ", -1) + "\r\n")
|
|
|
|
|
2016-04-03 05:16:36 +03:00
|
|
|
// WriteWebSocketMessage write a websocket message to an io.Writer.
|
2016-03-29 15:53:53 +03:00
|
|
|
func WriteWebSocketMessage(w io.Writer, data []byte) error {
|
|
|
|
var msg []byte
|
|
|
|
buf := make([]byte, 10+len(data))
|
|
|
|
buf[0] = 129 // FIN + TEXT
|
|
|
|
if len(data) <= 125 {
|
|
|
|
buf[1] = byte(len(data))
|
|
|
|
copy(buf[2:], data)
|
|
|
|
msg = buf[:2+len(data)]
|
|
|
|
} else if len(data) <= 0xFFFF {
|
|
|
|
buf[1] = 126
|
|
|
|
binary.BigEndian.PutUint16(buf[2:], uint16(len(data)))
|
|
|
|
copy(buf[4:], data)
|
|
|
|
msg = buf[:4+len(data)]
|
|
|
|
} else {
|
|
|
|
buf[1] = 127
|
|
|
|
binary.BigEndian.PutUint64(buf[2:], uint64(len(data)))
|
|
|
|
copy(buf[10:], data)
|
|
|
|
msg = buf[:10+len(data)]
|
|
|
|
}
|
|
|
|
_, err := w.Write(msg)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2016-04-03 05:16:36 +03:00
|
|
|
// OKMessage returns a default OK message in JSON or RESP.
|
Lua scripting feature. (#224)
* Start on lua scripting
* Implement evalsha, script load, script exists, and script flush
* Type conversions from lua to resp/json.
Refactor to make luastate and luascripts persistent in the controller.
* Change controller.command and all underlying commands to return resp.Value.
Serialize only during the ouput.
* First stab at tile38 call from lua
* Change tile38 into tile38.call in Lua
* Property return errors from scripts
* Minor refactoring. No locking on script run
* Cleanup/refactoring
* Create a pool of 5 lua states, allow for more as needed. Refactor.
* Use safe map for scripts. Add a limit for max number of lua states. Refactor.
* Refactor
* Refactor script commands into atomic, read-only, and non-atomic classes.
Proper locking for all three classes.
Add tests for scripts
* More tests for scripts
* Properly escape newlines in lua-produced errors
* Better test for readonly failure
* Correctly convert ok/err messages between lua and resp.
Add pcall, sha1hex, error_reply, status_reply functions to tile38 namespace in lua.
* Add pcall test. Change writeErr to work with string argument
* Make sure eval/evalsha never attempt to write AOF
* Add eval-set and eval-get to benchmarks
* Fix eval benchmark tests, add more
* Improve benchmarks
* Optimizations and refactoring.
* Add lua memtest
* Typo
* Add dependency
* golint fixes
* gofmt fixes
* Add scripting commands to the core/commands.json
* Use ARGV for args inside lua
2017-10-05 18:20:40 +03:00
|
|
|
func OKMessage(msg *Message, start time.Time) resp.Value {
|
2016-03-29 15:53:53 +03:00
|
|
|
switch msg.OutputType {
|
|
|
|
case JSON:
|
2021-03-31 18:13:44 +03:00
|
|
|
return resp.StringValue(`{"ok":true,"elapsed":"` + time.Since(start).String() + "\"}")
|
2016-03-29 15:53:53 +03:00
|
|
|
case RESP:
|
Lua scripting feature. (#224)
* Start on lua scripting
* Implement evalsha, script load, script exists, and script flush
* Type conversions from lua to resp/json.
Refactor to make luastate and luascripts persistent in the controller.
* Change controller.command and all underlying commands to return resp.Value.
Serialize only during the ouput.
* First stab at tile38 call from lua
* Change tile38 into tile38.call in Lua
* Property return errors from scripts
* Minor refactoring. No locking on script run
* Cleanup/refactoring
* Create a pool of 5 lua states, allow for more as needed. Refactor.
* Use safe map for scripts. Add a limit for max number of lua states. Refactor.
* Refactor
* Refactor script commands into atomic, read-only, and non-atomic classes.
Proper locking for all three classes.
Add tests for scripts
* More tests for scripts
* Properly escape newlines in lua-produced errors
* Better test for readonly failure
* Correctly convert ok/err messages between lua and resp.
Add pcall, sha1hex, error_reply, status_reply functions to tile38 namespace in lua.
* Add pcall test. Change writeErr to work with string argument
* Make sure eval/evalsha never attempt to write AOF
* Add eval-set and eval-get to benchmarks
* Fix eval benchmark tests, add more
* Improve benchmarks
* Optimizations and refactoring.
* Add lua memtest
* Typo
* Add dependency
* golint fixes
* gofmt fixes
* Add scripting commands to the core/commands.json
* Use ARGV for args inside lua
2017-10-05 18:20:40 +03:00
|
|
|
return resp.SimpleStringValue("OK")
|
2016-03-29 15:53:53 +03:00
|
|
|
}
|
Lua scripting feature. (#224)
* Start on lua scripting
* Implement evalsha, script load, script exists, and script flush
* Type conversions from lua to resp/json.
Refactor to make luastate and luascripts persistent in the controller.
* Change controller.command and all underlying commands to return resp.Value.
Serialize only during the ouput.
* First stab at tile38 call from lua
* Change tile38 into tile38.call in Lua
* Property return errors from scripts
* Minor refactoring. No locking on script run
* Cleanup/refactoring
* Create a pool of 5 lua states, allow for more as needed. Refactor.
* Use safe map for scripts. Add a limit for max number of lua states. Refactor.
* Refactor
* Refactor script commands into atomic, read-only, and non-atomic classes.
Proper locking for all three classes.
Add tests for scripts
* More tests for scripts
* Properly escape newlines in lua-produced errors
* Better test for readonly failure
* Correctly convert ok/err messages between lua and resp.
Add pcall, sha1hex, error_reply, status_reply functions to tile38 namespace in lua.
* Add pcall test. Change writeErr to work with string argument
* Make sure eval/evalsha never attempt to write AOF
* Add eval-set and eval-get to benchmarks
* Fix eval benchmark tests, add more
* Improve benchmarks
* Optimizations and refactoring.
* Add lua memtest
* Typo
* Add dependency
* golint fixes
* gofmt fixes
* Add scripting commands to the core/commands.json
* Use ARGV for args inside lua
2017-10-05 18:20:40 +03:00
|
|
|
return resp.SimpleStringValue("")
|
2016-03-29 15:53:53 +03:00
|
|
|
}
|
Lua scripting feature. (#224)
* Start on lua scripting
* Implement evalsha, script load, script exists, and script flush
* Type conversions from lua to resp/json.
Refactor to make luastate and luascripts persistent in the controller.
* Change controller.command and all underlying commands to return resp.Value.
Serialize only during the ouput.
* First stab at tile38 call from lua
* Change tile38 into tile38.call in Lua
* Property return errors from scripts
* Minor refactoring. No locking on script run
* Cleanup/refactoring
* Create a pool of 5 lua states, allow for more as needed. Refactor.
* Use safe map for scripts. Add a limit for max number of lua states. Refactor.
* Refactor
* Refactor script commands into atomic, read-only, and non-atomic classes.
Proper locking for all three classes.
Add tests for scripts
* More tests for scripts
* Properly escape newlines in lua-produced errors
* Better test for readonly failure
* Correctly convert ok/err messages between lua and resp.
Add pcall, sha1hex, error_reply, status_reply functions to tile38 namespace in lua.
* Add pcall test. Change writeErr to work with string argument
* Make sure eval/evalsha never attempt to write AOF
* Add eval-set and eval-get to benchmarks
* Fix eval benchmark tests, add more
* Improve benchmarks
* Optimizations and refactoring.
* Add lua memtest
* Typo
* Add dependency
* golint fixes
* gofmt fixes
* Add scripting commands to the core/commands.json
* Use ARGV for args inside lua
2017-10-05 18:20:40 +03:00
|
|
|
|
2018-10-11 00:25:40 +03:00
|
|
|
// NOMessage is no message
|
Lua scripting feature. (#224)
* Start on lua scripting
* Implement evalsha, script load, script exists, and script flush
* Type conversions from lua to resp/json.
Refactor to make luastate and luascripts persistent in the controller.
* Change controller.command and all underlying commands to return resp.Value.
Serialize only during the ouput.
* First stab at tile38 call from lua
* Change tile38 into tile38.call in Lua
* Property return errors from scripts
* Minor refactoring. No locking on script run
* Cleanup/refactoring
* Create a pool of 5 lua states, allow for more as needed. Refactor.
* Use safe map for scripts. Add a limit for max number of lua states. Refactor.
* Refactor
* Refactor script commands into atomic, read-only, and non-atomic classes.
Proper locking for all three classes.
Add tests for scripts
* More tests for scripts
* Properly escape newlines in lua-produced errors
* Better test for readonly failure
* Correctly convert ok/err messages between lua and resp.
Add pcall, sha1hex, error_reply, status_reply functions to tile38 namespace in lua.
* Add pcall test. Change writeErr to work with string argument
* Make sure eval/evalsha never attempt to write AOF
* Add eval-set and eval-get to benchmarks
* Fix eval benchmark tests, add more
* Improve benchmarks
* Optimizations and refactoring.
* Add lua memtest
* Typo
* Add dependency
* golint fixes
* gofmt fixes
* Add scripting commands to the core/commands.json
* Use ARGV for args inside lua
2017-10-05 18:20:40 +03:00
|
|
|
var NOMessage = resp.SimpleStringValue("")
|
2018-10-29 01:49:45 +03:00
|
|
|
|
|
|
|
var errInvalidHTTP = errors.New("invalid HTTP request")
|
|
|
|
|
|
|
|
// Type is resp type
|
|
|
|
type Type byte
|
|
|
|
|
|
|
|
// Protocol Types
|
|
|
|
const (
|
|
|
|
Null Type = iota
|
|
|
|
RESP
|
|
|
|
Telnet
|
|
|
|
Native
|
|
|
|
HTTP
|
|
|
|
WebSocket
|
|
|
|
JSON
|
|
|
|
)
|
|
|
|
|
|
|
|
// Message is a resp message
|
|
|
|
type Message struct {
|
2018-11-10 23:30:56 +03:00
|
|
|
_command string
|
2018-10-29 01:49:45 +03:00
|
|
|
Args []string
|
|
|
|
ConnType Type
|
|
|
|
OutputType Type
|
|
|
|
Auth string
|
2019-04-24 15:09:41 +03:00
|
|
|
Deadline *deadline.Deadline
|
2018-10-29 01:49:45 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// Command returns the first argument as a lowercase string
|
|
|
|
func (msg *Message) Command() string {
|
2018-11-10 23:30:56 +03:00
|
|
|
if msg._command == "" {
|
|
|
|
msg._command = strings.ToLower(msg.Args[0])
|
|
|
|
}
|
|
|
|
return msg._command
|
2018-10-29 01:49:45 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// PipelineReader ...
|
|
|
|
type PipelineReader struct {
|
|
|
|
rd io.Reader
|
|
|
|
wr io.Writer
|
|
|
|
packet [0xFFFF]byte
|
|
|
|
buf []byte
|
|
|
|
}
|
|
|
|
|
|
|
|
const kindHTTP redcon.Kind = 9999
|
|
|
|
|
|
|
|
// NewPipelineReader ...
|
|
|
|
func NewPipelineReader(rd io.ReadWriter) *PipelineReader {
|
|
|
|
return &PipelineReader{rd: rd, wr: rd}
|
|
|
|
}
|
|
|
|
|
|
|
|
func readcrlfline(packet []byte) (line string, leftover []byte, ok bool) {
|
|
|
|
for i := 1; i < len(packet); i++ {
|
|
|
|
if packet[i] == '\n' && packet[i-1] == '\r' {
|
|
|
|
return string(packet[:i-1]), packet[i+1:], true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return "", packet, false
|
|
|
|
}
|
|
|
|
|
|
|
|
func readNextHTTPCommand(packet []byte, argsIn [][]byte, msg *Message, wr io.Writer) (
|
|
|
|
complete bool, args [][]byte, kind redcon.Kind, leftover []byte, err error,
|
|
|
|
) {
|
|
|
|
args = argsIn[:0]
|
|
|
|
msg.ConnType = HTTP
|
|
|
|
msg.OutputType = JSON
|
|
|
|
opacket := packet
|
|
|
|
|
|
|
|
ready, err := func() (bool, error) {
|
|
|
|
var line string
|
|
|
|
var ok bool
|
|
|
|
|
|
|
|
// read header
|
|
|
|
var headers []string
|
|
|
|
for {
|
|
|
|
line, packet, ok = readcrlfline(packet)
|
|
|
|
if !ok {
|
|
|
|
return false, nil
|
|
|
|
}
|
|
|
|
if line == "" {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
headers = append(headers, line)
|
|
|
|
}
|
|
|
|
parts := strings.Split(headers[0], " ")
|
|
|
|
if len(parts) != 3 {
|
|
|
|
return false, errInvalidHTTP
|
|
|
|
}
|
|
|
|
method := parts[0]
|
|
|
|
path := parts[1]
|
2024-05-06 06:43:56 +03:00
|
|
|
// Handle CORS request for allowed origins
|
|
|
|
if method == "OPTIONS" {
|
|
|
|
if wr == nil {
|
|
|
|
return false, errors.New("connection is nil")
|
|
|
|
}
|
2024-05-07 08:07:07 +03:00
|
|
|
corshead := "HTTP/1.1 204 No Content\r\n" +
|
|
|
|
"Connection: close\r\n" +
|
|
|
|
"Access-Control-Allow-Origin: *\r\n" +
|
|
|
|
"Access-Control-Allow-Headers: *, Authorization\r\n" +
|
2024-05-06 06:43:56 +03:00
|
|
|
"Access-Control-Allow-Methods: POST, GET, OPTIONS\r\n\r\n"
|
|
|
|
|
|
|
|
if _, err = wr.Write([]byte(corshead)); err != nil {
|
|
|
|
return false, err
|
|
|
|
}
|
|
|
|
return false, nil
|
|
|
|
}
|
2018-10-29 01:49:45 +03:00
|
|
|
if len(path) == 0 || path[0] != '/' {
|
|
|
|
return false, errInvalidHTTP
|
|
|
|
}
|
|
|
|
path, err = url.QueryUnescape(path[1:])
|
|
|
|
if err != nil {
|
|
|
|
return false, errInvalidHTTP
|
|
|
|
}
|
|
|
|
if method != "GET" && method != "POST" {
|
|
|
|
return false, errInvalidHTTP
|
|
|
|
}
|
|
|
|
contentLength := 0
|
|
|
|
websocket := false
|
|
|
|
websocketVersion := 0
|
|
|
|
websocketKey := ""
|
|
|
|
for _, header := range headers[1:] {
|
|
|
|
if header[0] == 'a' || header[0] == 'A' {
|
|
|
|
if strings.HasPrefix(strings.ToLower(header), "authorization:") {
|
|
|
|
msg.Auth = strings.TrimSpace(header[len("authorization:"):])
|
|
|
|
}
|
|
|
|
} else if header[0] == 'u' || header[0] == 'U' {
|
|
|
|
if strings.HasPrefix(strings.ToLower(header), "upgrade:") && strings.ToLower(strings.TrimSpace(header[len("upgrade:"):])) == "websocket" {
|
|
|
|
websocket = true
|
|
|
|
}
|
|
|
|
} else if header[0] == 's' || header[0] == 'S' {
|
|
|
|
if strings.HasPrefix(strings.ToLower(header), "sec-websocket-version:") {
|
|
|
|
var n uint64
|
|
|
|
n, err = strconv.ParseUint(strings.TrimSpace(header[len("sec-websocket-version:"):]), 10, 64)
|
|
|
|
if err != nil {
|
|
|
|
return false, err
|
|
|
|
}
|
|
|
|
websocketVersion = int(n)
|
|
|
|
} else if strings.HasPrefix(strings.ToLower(header), "sec-websocket-key:") {
|
|
|
|
websocketKey = strings.TrimSpace(header[len("sec-websocket-key:"):])
|
|
|
|
}
|
|
|
|
} else if header[0] == 'c' || header[0] == 'C' {
|
|
|
|
if strings.HasPrefix(strings.ToLower(header), "content-length:") {
|
|
|
|
var n uint64
|
|
|
|
n, err = strconv.ParseUint(strings.TrimSpace(header[len("content-length:"):]), 10, 64)
|
|
|
|
if err != nil {
|
|
|
|
return false, err
|
|
|
|
}
|
|
|
|
contentLength = int(n)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if websocket && websocketVersion >= 13 && websocketKey != "" {
|
|
|
|
msg.ConnType = WebSocket
|
|
|
|
if wr == nil {
|
|
|
|
return false, errors.New("connection is nil")
|
|
|
|
}
|
|
|
|
sum := sha1.Sum([]byte(websocketKey + "258EAFA5-E914-47DA-95CA-C5AB0DC85B11"))
|
|
|
|
accept := base64.StdEncoding.EncodeToString(sum[:])
|
|
|
|
wshead := "HTTP/1.1 101 Switching Protocols\r\nUpgrade: websocket\r\nConnection: Upgrade\r\nSec-WebSocket-Accept: " + accept + "\r\n\r\n"
|
|
|
|
if _, err = wr.Write([]byte(wshead)); err != nil {
|
|
|
|
return false, err
|
|
|
|
}
|
|
|
|
} else if contentLength > 0 {
|
|
|
|
msg.ConnType = HTTP
|
|
|
|
if len(packet) < contentLength {
|
|
|
|
return false, nil
|
|
|
|
}
|
|
|
|
path += string(packet[:contentLength])
|
|
|
|
packet = packet[contentLength:]
|
|
|
|
}
|
|
|
|
if path == "" {
|
|
|
|
return true, nil
|
|
|
|
}
|
|
|
|
nmsg, err := readNativeMessageLine([]byte(path))
|
|
|
|
if err != nil {
|
|
|
|
return false, err
|
|
|
|
}
|
|
|
|
|
|
|
|
msg.OutputType = JSON
|
|
|
|
msg.Args = nmsg.Args
|
|
|
|
return true, nil
|
|
|
|
}()
|
|
|
|
if err != nil || !ready {
|
|
|
|
return false, args[:0], kindHTTP, opacket, err
|
|
|
|
}
|
|
|
|
return true, args[:0], kindHTTP, packet, nil
|
|
|
|
}
|
|
|
|
func readNextCommand(packet []byte, argsIn [][]byte, msg *Message, wr io.Writer) (
|
|
|
|
complete bool, args [][]byte, kind redcon.Kind, leftover []byte, err error,
|
|
|
|
) {
|
2024-05-06 06:43:56 +03:00
|
|
|
if packet[0] == 'G' || packet[0] == 'P' || packet[0] == 'O' {
|
2018-10-29 01:49:45 +03:00
|
|
|
// could be an HTTP request
|
|
|
|
var line []byte
|
|
|
|
for i := 1; i < len(packet); i++ {
|
|
|
|
if packet[i] == '\n' {
|
|
|
|
if packet[i-1] == '\r' {
|
|
|
|
line = packet[:i+1]
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if len(line) == 0 {
|
|
|
|
return false, argsIn[:0], redcon.Redis, packet, nil
|
|
|
|
}
|
|
|
|
if len(line) > 11 && string(line[len(line)-11:len(line)-5]) == " HTTP/" {
|
|
|
|
return readNextHTTPCommand(packet, argsIn, msg, wr)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return redcon.ReadNextCommand(packet, args)
|
|
|
|
}
|
|
|
|
|
|
|
|
// ReadMessages ...
|
|
|
|
func (rd *PipelineReader) ReadMessages() ([]*Message, error) {
|
|
|
|
var msgs []*Message
|
|
|
|
moreData:
|
|
|
|
n, err := rd.rd.Read(rd.packet[:])
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if n == 0 {
|
|
|
|
// need more data
|
|
|
|
goto moreData
|
|
|
|
}
|
|
|
|
data := rd.packet[:n]
|
|
|
|
if len(rd.buf) > 0 {
|
|
|
|
data = append(rd.buf, data...)
|
|
|
|
}
|
|
|
|
for len(data) > 0 {
|
|
|
|
msg := &Message{}
|
2019-12-11 21:08:33 +03:00
|
|
|
complete, args, kind, leftover, err2 :=
|
|
|
|
readNextCommand(data, nil, msg, rd.wr)
|
|
|
|
if err2 != nil {
|
|
|
|
err = err2
|
2018-10-29 01:49:45 +03:00
|
|
|
break
|
|
|
|
}
|
|
|
|
if !complete {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
if kind == kindHTTP {
|
|
|
|
if len(msg.Args) == 0 {
|
|
|
|
return nil, errInvalidHTTP
|
|
|
|
}
|
|
|
|
msgs = append(msgs, msg)
|
|
|
|
} else if len(args) > 0 {
|
|
|
|
for i := 0; i < len(args); i++ {
|
|
|
|
msg.Args = append(msg.Args, string(args[i]))
|
|
|
|
}
|
|
|
|
switch kind {
|
|
|
|
case redcon.Redis:
|
|
|
|
msg.ConnType = RESP
|
|
|
|
msg.OutputType = RESP
|
|
|
|
case redcon.Tile38:
|
|
|
|
msg.ConnType = Native
|
|
|
|
msg.OutputType = JSON
|
|
|
|
case redcon.Telnet:
|
|
|
|
msg.ConnType = RESP
|
|
|
|
msg.OutputType = RESP
|
|
|
|
}
|
|
|
|
msgs = append(msgs, msg)
|
|
|
|
}
|
|
|
|
data = leftover
|
|
|
|
}
|
|
|
|
if len(data) > 0 {
|
|
|
|
rd.buf = append(rd.buf[:0], data...)
|
|
|
|
} else if len(rd.buf) > 0 {
|
|
|
|
rd.buf = rd.buf[:0]
|
|
|
|
}
|
2019-12-11 21:08:33 +03:00
|
|
|
return msgs, err
|
2018-10-29 01:49:45 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
func readNativeMessageLine(line []byte) (*Message, error) {
|
|
|
|
var args []string
|
|
|
|
reading:
|
|
|
|
for len(line) != 0 {
|
|
|
|
if line[0] == '{' {
|
|
|
|
// The native protocol cannot understand json boundaries so it assumes that
|
|
|
|
// a json element must be at the end of the line.
|
|
|
|
args = append(args, string(line))
|
|
|
|
break
|
|
|
|
}
|
|
|
|
if line[0] == '"' && line[len(line)-1] == '"' {
|
|
|
|
if len(args) > 0 &&
|
|
|
|
strings.ToLower(args[0]) == "set" &&
|
|
|
|
strings.ToLower(args[len(args)-1]) == "string" {
|
|
|
|
// Setting a string value that is contained inside double quotes.
|
|
|
|
// This is only because of the boundary issues of the native protocol.
|
|
|
|
args = append(args, string(line[1:len(line)-1]))
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
i := 0
|
|
|
|
for ; i < len(line); i++ {
|
|
|
|
if line[i] == ' ' {
|
|
|
|
arg := string(line[:i])
|
|
|
|
if arg != "" {
|
|
|
|
args = append(args, arg)
|
|
|
|
}
|
|
|
|
line = line[i+1:]
|
|
|
|
continue reading
|
|
|
|
}
|
|
|
|
}
|
|
|
|
args = append(args, string(line))
|
|
|
|
break
|
|
|
|
}
|
|
|
|
return &Message{Args: args, ConnType: Native, OutputType: JSON}, nil
|
|
|
|
}
|
2019-04-26 21:50:49 +03:00
|
|
|
|
|
|
|
// InputStream is a helper type for managing input streams from inside
|
|
|
|
// the Data event.
|
|
|
|
type InputStream struct{ b []byte }
|
|
|
|
|
|
|
|
// Begin accepts a new packet and returns a working sequence of
|
|
|
|
// unprocessed bytes.
|
|
|
|
func (is *InputStream) Begin(packet []byte) (data []byte) {
|
|
|
|
data = packet
|
|
|
|
if len(is.b) > 0 {
|
|
|
|
is.b = append(is.b, data...)
|
|
|
|
data = is.b
|
|
|
|
}
|
|
|
|
return data
|
|
|
|
}
|
|
|
|
|
|
|
|
// End shifts the stream to match the unprocessed data.
|
|
|
|
func (is *InputStream) End(data []byte) {
|
|
|
|
if len(data) > 0 {
|
|
|
|
if len(data) != len(is.b) {
|
|
|
|
is.b = append(is.b[:0], data...)
|
|
|
|
}
|
|
|
|
} else if len(is.b) > 0 {
|
|
|
|
is.b = is.b[:0]
|
|
|
|
}
|
|
|
|
}
|
2021-03-31 18:13:44 +03:00
|
|
|
|
|
|
|
// clientErrorf is the same as fmt.Errorf, but is intented for errors that are
|
|
|
|
// sent back to the client. This allows for the Go static checker to ignore
|
|
|
|
// throwing warning for certain error strings.
|
|
|
|
// https://staticcheck.io/docs/checks#ST1005
|
|
|
|
func clientErrorf(format string, args ...interface{}) error {
|
|
|
|
return fmt.Errorf(format, args...)
|
|
|
|
}
|