tile38/controller/server/server.go

239 lines
6.2 KiB
Go
Raw Normal View History

2016-03-05 02:08:16 +03:00
package server
import (
2016-03-29 15:53:53 +03:00
"encoding/binary"
2016-03-05 02:08:16 +03:00
"errors"
"fmt"
"io"
"net"
"strings"
2016-03-29 15:53:53 +03:00
"time"
2016-03-05 02:08:16 +03:00
2016-03-28 18:57:41 +03:00
//"github.com/tidwall/tile38/client"
2016-03-06 17:55:00 +03:00
"github.com/tidwall/tile38/controller/log"
"github.com/tidwall/tile38/core"
2016-03-05 02:08:16 +03:00
)
2016-03-08 03:37:39 +03:00
// This phrase is copied nearly verbatim from Redis.
// https://github.com/antirez/redis/blob/cf42c48adcea05c1bd4b939fcd36a01f23ec6303/src/networking.c
var deniedMessage = []byte(strings.TrimSpace(`
ACCESS DENIED
Tile38 is running in protected mode because protected mode is enabled, no host
address was specified, no authentication password is requested to clients. In
this mode connections are only accepted from the loopback interface. If you
want to connect from external computers to Tile38 you may adopt one of the
following solutions:
2016-03-08 15:32:39 +03:00
1) Disable protected mode by sending the command 'CONFIG SET protected-mode no'
2016-03-08 03:37:39 +03:00
from the loopback interface by connecting to Tile38 from the same host
the server is running, however MAKE SURE Tile38 is not publicly accessible
from internet if you do so. Use CONFIG REWRITE to make this change
permanent.
2) Alternatively you can just disable the protected mode by editing the Tile38
2016-03-08 15:32:39 +03:00
configuration file, and setting the 'protected-mode' option to 'no', and
then restarting the server.
2016-03-08 03:37:39 +03:00
3) If you started the server manually just for testing, restart it with the
'--protected-mode no' option.
2016-03-08 16:11:03 +03:00
4) Use a host address or an authentication password.
2016-03-08 03:37:39 +03:00
NOTE: You only need to do one of the above things in order for the server
to start accepting connections from the outside.
`) + "\r\n")
type Conn struct {
net.Conn
Authenticated bool
}
2016-03-05 02:08:16 +03:00
var errCloseHTTP = errors.New("close http")
// ListenAndServe starts a tile38 server at the specified address.
func ListenAndServe(
2016-03-05 23:39:36 +03:00
host string, port int,
2016-03-08 03:37:39 +03:00
protected func() bool,
2016-04-01 02:26:36 +03:00
handler func(conn *Conn, msg *Message, rd *AnyReaderWriter, w io.Writer, websocket bool) error,
2016-03-05 02:08:16 +03:00
) error {
2016-03-05 23:39:36 +03:00
ln, err := net.Listen("tcp", fmt.Sprintf("%s:%d", host, port))
2016-03-05 02:08:16 +03:00
if err != nil {
return err
}
log.Infof("The server is now ready to accept connections on port %d", port)
for {
conn, err := ln.Accept()
if err != nil {
log.Error(err)
continue
}
2016-03-08 03:37:39 +03:00
go handleConn(&Conn{Conn: conn}, protected, handler)
2016-03-05 02:08:16 +03:00
}
}
2016-03-28 18:57:41 +03:00
// func writeCommandErr(proto client.Proto, conn *Conn, err error) error {
// if proto == client.HTTP || proto == client.WebSocket {
// conn.Write([]byte(`HTTP/1.1 500 ` + err.Error() + "\r\nConnection: close\r\n\r\n"))
// }
// return err
// }
2016-03-08 18:35:43 +03:00
2016-03-05 02:08:16 +03:00
func handleConn(
2016-03-08 03:37:39 +03:00
conn *Conn,
protected func() bool,
2016-04-01 02:26:36 +03:00
handler func(conn *Conn, msg *Message, rd *AnyReaderWriter, w io.Writer, websocket bool) error,
2016-03-05 02:08:16 +03:00
) {
2016-03-08 16:11:03 +03:00
addr := conn.RemoteAddr().String()
2016-03-06 17:55:00 +03:00
if core.ShowDebugMessages {
2016-03-05 02:08:16 +03:00
log.Debugf("opened connection: %s", addr)
defer func() {
log.Debugf("closed connection: %s", addr)
}()
2016-03-08 16:11:03 +03:00
}
if !strings.HasPrefix(addr, "127.0.0.1:") && !strings.HasPrefix(addr, "[::1]:") {
if protected() {
// This is a protected server. Only loopback is allowed.
conn.Write(deniedMessage)
conn.Close()
return
2016-03-08 03:37:39 +03:00
}
2016-03-05 02:08:16 +03:00
}
defer conn.Close()
2016-03-29 22:29:15 +03:00
outputType := Null
2016-03-28 18:57:41 +03:00
rd := NewAnyReaderWriter(conn)
for {
msg, err := rd.ReadMessage()
2016-03-05 02:08:16 +03:00
if err != nil {
if err == io.EOF {
return
}
if err == errCloseHTTP ||
strings.Contains(err.Error(), "use of closed network connection") {
return
}
log.Error(err)
return
}
2016-03-28 18:57:41 +03:00
if msg != nil && msg.Command != "" {
2016-03-29 22:29:15 +03:00
if outputType != Null {
msg.OutputType = outputType
}
2016-03-28 18:57:41 +03:00
if msg.Command == "quit" {
if msg.OutputType == RESP {
io.WriteString(conn, "+OK\r\n")
}
return
}
2016-04-01 02:26:36 +03:00
err := handler(conn, msg, rd, conn, msg.ConnType == WebSocket)
2016-03-28 18:57:41 +03:00
if err != nil {
log.Error(err)
return
}
2016-03-29 22:29:15 +03:00
outputType = msg.OutputType
2016-03-29 15:53:53 +03:00
} else {
conn.Write([]byte("HTTP/1.1 500 Bad Request\r\nConnection: close\r\n\r\n"))
return
}
if msg.ConnType == HTTP || msg.ConnType == WebSocket {
return
2016-03-28 18:57:41 +03:00
}
2016-03-29 22:29:15 +03:00
2016-03-05 02:08:16 +03:00
}
}
2016-03-28 18:57:41 +03:00
2016-03-29 15:53:53 +03:00
func WriteWebSocketMessage(w io.Writer, data []byte) error {
var msg []byte
buf := make([]byte, 10+len(data))
buf[0] = 129 // FIN + TEXT
if len(data) <= 125 {
buf[1] = byte(len(data))
copy(buf[2:], data)
msg = buf[:2+len(data)]
} else if len(data) <= 0xFFFF {
buf[1] = 126
binary.BigEndian.PutUint16(buf[2:], uint16(len(data)))
copy(buf[4:], data)
msg = buf[:4+len(data)]
} else {
buf[1] = 127
binary.BigEndian.PutUint64(buf[2:], uint64(len(data)))
copy(buf[10:], data)
msg = buf[:10+len(data)]
}
_, err := w.Write(msg)
return err
}
func OKMessage(msg *Message, start time.Time) string {
switch msg.OutputType {
case JSON:
return `{"ok":true,"elapsed":"` + time.Now().Sub(start).String() + "\"}"
case RESP:
return "+OK\r\n"
}
return ""
}
2016-03-28 18:57:41 +03:00
//err := func() error {
// command, proto, auth, err := client.ReadMessage(rd, conn)
// if err != nil {
// return err
// }
// if len(command) > 0 && (command[0] == 'Q' || command[0] == 'q') && strings.ToLower(string(command)) == "quit" {
// return io.EOF
// }
// var b bytes.Buffer
// var denied bool
// if (proto == client.HTTP || proto == client.WebSocket) && auth != "" {
// if err := handler(conn, []byte("AUTH "+auth), rd, &b, proto == client.WebSocket); err != nil {
// return writeCommandErr(proto, conn, err)
// }
// if strings.HasPrefix(b.String(), `{"ok":false`) {
// denied = true
// } else {
// b.Reset()
// }
// }
// if !denied {
// if err := handler(conn, command, rd, &b, proto == client.WebSocket); err != nil {
// return writeCommandErr(proto, conn, err)
// }
// }
// switch proto {
// case client.Native:
// if err := client.WriteMessage(conn, b.Bytes()); err != nil {
// return err
// }
// case client.HTTP:
// if err := client.WriteHTTP(conn, b.Bytes()); err != nil {
// return err
// }
// return errCloseHTTP
// case client.WebSocket:
// if err := client.WriteWebSocket(conn, b.Bytes()); err != nil {
// return err
// }
// if _, err := conn.Write([]byte{137, 0}); err != nil {
// return err
// }
// return errCloseHTTP
// default:
// b.WriteString("\r\n")
// if _, err := conn.Write(b.Bytes()); err != nil {
// return err
// }
// }
// return nil
//}()
// if err != nil {
// if err == io.EOF {
// return
// }
// if err == errCloseHTTP ||
// strings.Contains(err.Error(), "use of closed network connection") {
// return
// }
// log.Error(err)
// return
// }
// }
// }