package server import ( "bytes" "crypto/rand" "crypto/sha1" "encoding/base64" "encoding/binary" "errors" "fmt" "io" "net" "net/http" "net/url" "os" "path" "path/filepath" "runtime" "runtime/debug" "strconv" "strings" "sync" "sync/atomic" "time" "github.com/prometheus/client_golang/prometheus" "github.com/tidwall/btree" "github.com/tidwall/buntdb" "github.com/tidwall/geojson" "github.com/tidwall/geojson/geometry" "github.com/tidwall/gjson" "github.com/tidwall/redcon" "github.com/tidwall/resp" "github.com/tidwall/rtree" "github.com/tidwall/tile38/core" "github.com/tidwall/tile38/internal/collection" "github.com/tidwall/tile38/internal/deadline" "github.com/tidwall/tile38/internal/endpoint" "github.com/tidwall/tile38/internal/log" "github.com/tidwall/tile38/internal/object" ) var errOOM = errors.New("OOM command not allowed when used memory > 'maxmemory'") func errTimeoutOnCmd(cmd string) error { return fmt.Errorf("timeout not supported for '%s'", cmd) } const ( goingLive = "going live" hookLogPrefix = "hook:log:" ) // commandDetails is detailed information about a mutable command. It's used // for geofence formulas. type commandDetails struct { command string // client command, like "SET" or "DEL" key string // collection key newKey string // new key, for RENAME command obj *object.Object // target object old *object.Object // previous object, if any updated bool // object was updated timestamp time.Time // timestamp when the update occured parent bool // when true, only children are forwarded pattern string // PDEL key pattern children []*commandDetails // for multi actions such as "PDEL" } // Server is a tile38 controller type Server struct { // static values unix string host string port int http bool dir string started time.Time config *Config epc *endpoint.Manager // env opts geomParseOpts geojson.ParseOptions geomIndexOpts geometry.IndexOptions http500Errors bool // atomics followc aint // counter increases when follow property changes statsTotalConns aint // counter for total connections statsTotalCommands aint // counter for total commands statsTotalMsgsSent aint // counter for total sent webhook messages statsExpired aint // item expiration counter lastShrinkDuration aint stopServer abool outOfMemory abool loadedAndReady abool // server is loaded and ready for commands connsmu sync.RWMutex conns map[int]*Client mu sync.RWMutex aof *os.File // active aof file aofdirty int32 // mark the aofbuf as having data aofbuf []byte // prewrite buffer aofsz int // active size of the aof file qdb *buntdb.DB // hook queue log qidx uint64 // hook queue log last idx cols *btree.Map[string, *collection.Collection] // data collections follows map[*bytes.Buffer]bool fcond *sync.Cond lstack []*commandDetails lives map[*liveBuffer]bool lcond *sync.Cond lwait sync.WaitGroup fcup bool // follow caught up fcuponce bool // follow caught up once shrinking bool // aof shrinking flag shrinklog [][]string // aof shrinking log hooks *btree.BTree // hook name -- [string]*Hook hookCross *rtree.RTree // hook spatial tree for "cross" geofences hookTree *rtree.RTree // hook spatial tree for all hooksOut *btree.BTree // hooks with "outside" detection -- [string]*Hook groupHooks *btree.BTree // hooks that are connected to objects groupObjects *btree.BTree // objects that are connected to hooks hookExpires *btree.BTree // queue of all hooks marked for expiration aofconnM map[net.Conn]io.Closer luascripts *lScriptMap luapool *lStatePool pubsub *pubsub monconnsMu sync.RWMutex monconns map[net.Conn]bool // monitor connections } // Options for Serve() type Options struct { Host string Port int Dir string UseHTTP bool MetricsAddr string UnixSocketPath string // path for unix socket } // Serve starts a new tile38 server func Serve(opts Options) error { if core.AppendFileName == "" { core.AppendFileName = path.Join(opts.Dir, "appendonly.aof") } if core.QueueFileName == "" { core.QueueFileName = path.Join(opts.Dir, "queue.db") } log.Infof("Server started, Tile38 version %s, git %s", core.Version, core.GitSHA) // Initialize the s s := &Server{ unix: opts.UnixSocketPath, host: opts.Host, port: opts.Port, dir: opts.Dir, follows: make(map[*bytes.Buffer]bool), fcond: sync.NewCond(&sync.Mutex{}), lives: make(map[*liveBuffer]bool), lcond: sync.NewCond(&sync.Mutex{}), hooks: btree.NewNonConcurrent(byHookName), hooksOut: btree.NewNonConcurrent(byHookName), hookCross: &rtree.RTree{}, hookTree: &rtree.RTree{}, aofconnM: make(map[net.Conn]io.Closer), started: time.Now(), conns: make(map[int]*Client), http: opts.UseHTTP, pubsub: newPubsub(), monconns: make(map[net.Conn]bool), cols: &btree.Map[string, *collection.Collection]{}, groupHooks: btree.NewNonConcurrent(byGroupHook), groupObjects: btree.NewNonConcurrent(byGroupObject), hookExpires: btree.NewNonConcurrent(byHookExpires), } s.epc = endpoint.NewManager(s) s.luascripts = s.newScriptMap() s.luapool = s.newPool() defer s.luapool.Shutdown() if err := os.MkdirAll(opts.Dir, 0700); err != nil { return err } var err error s.config, err = loadConfig(filepath.Join(opts.Dir, "config")) if err != nil { return err } // Send "500 Internal Server" error instead of "200 OK" for json responses // with `"ok":false`. T38HTTP500ERRORS=1 s.http500Errors, _ = strconv.ParseBool(os.Getenv("T38HTTP500ERRORS")) // Allow for geometry indexing options through environment variables: // T38IDXGEOMKIND -- None, RTree, QuadTree // T38IDXGEOM -- Min number of points in a geometry for indexing. // T38IDXMULTI -- Min number of object in a Multi/Collection for indexing. s.geomParseOpts = *geojson.DefaultParseOptions s.geomIndexOpts = *geometry.DefaultIndexOptions n, err := strconv.ParseUint(os.Getenv("T38IDXGEOM"), 10, 32) if err == nil { s.geomParseOpts.IndexGeometry = int(n) s.geomIndexOpts.MinPoints = int(n) } n, err = strconv.ParseUint(os.Getenv("T38IDXMULTI"), 10, 32) if err == nil { s.geomParseOpts.IndexChildren = int(n) } requireValid := os.Getenv("REQUIREVALID") if requireValid != "" { s.geomParseOpts.RequireValid = true } indexKind := os.Getenv("T38IDXGEOMKIND") switch indexKind { default: log.Errorf("Unknown index kind: %s", indexKind) case "": case "None": s.geomParseOpts.IndexGeometryKind = geometry.None s.geomIndexOpts.Kind = geometry.None case "RTree": s.geomParseOpts.IndexGeometryKind = geometry.RTree s.geomIndexOpts.Kind = geometry.RTree case "QuadTree": s.geomParseOpts.IndexGeometryKind = geometry.QuadTree s.geomIndexOpts.Kind = geometry.QuadTree } if s.geomParseOpts.IndexGeometryKind == geometry.None { log.Debugf("Geom indexing: %s", s.geomParseOpts.IndexGeometryKind, ) } else { log.Debugf("Geom indexing: %s (%d points)", s.geomParseOpts.IndexGeometryKind, s.geomParseOpts.IndexGeometry, ) } log.Debugf("Multi indexing: RTree (%d points)", s.geomParseOpts.IndexChildren) nerr := make(chan error) go func() { // Start the server in the background nerr <- s.netServe() }() // Load the queue before the aof qdb, err := buntdb.Open(core.QueueFileName) if err != nil { return err } var qidx uint64 if err := qdb.View(func(tx *buntdb.Tx) error { val, err := tx.Get("hook:idx") if err != nil { if err == buntdb.ErrNotFound { return nil } return err } qidx = stringToUint64(val) return nil }); err != nil { return err } err = qdb.CreateIndex("hooks", hookLogPrefix+"*", buntdb.IndexJSONCaseSensitive("hook")) if err != nil { return err } s.qdb = qdb s.qidx = qidx if err := s.migrateAOF(); err != nil { return err } if core.AppendOnly { f, err := os.OpenFile(core.AppendFileName, os.O_CREATE|os.O_RDWR, 0600) if err != nil { return err } s.aof = f if err := s.loadAOF(); err != nil { return err } defer func() { s.flushAOF(false) s.aof.Sync() }() } // Start background routines if s.config.followHost() != "" { go s.follow(s.config.followHost(), s.config.followPort(), s.followc.get()) } if opts.MetricsAddr != "" { log.Infof("Listening for metrics at: %s", opts.MetricsAddr) go func() { http.HandleFunc("/", s.MetricsIndexHandler) http.HandleFunc("/metrics", s.MetricsHandler) log.Fatal(http.ListenAndServe(opts.MetricsAddr, nil)) }() } s.lwait.Add(1) go s.processLives() go s.watchOutOfMemory() go s.watchLuaStatePool() go s.watchAutoGC() go s.backgroundExpiring() go s.backgroundSyncAOF() defer func() { // Stop background routines s.followc.add(1) // this will force any follow communication to die s.stopServer.set(true) s.lwait.Wait() }() // Server is now loaded and ready. Wait for network error messages. s.loadedAndReady.set(true) return <-nerr } func (s *Server) isProtected() bool { if core.ProtectedMode == "no" { // --protected-mode no return false } if s.host != "" && s.host != "127.0.0.1" && s.host != "::1" && s.host != "localhost" { // -h address return false } is := s.config.protectedMode() != "no" && s.config.requirePass() == "" return is } func (s *Server) netServe() error { var ln net.Listener var err error if s.unix != "" { os.RemoveAll(s.unix) ln, err = net.Listen("unix", s.unix) } else { tcpAddr := fmt.Sprintf("%s:%d", s.host, s.port) ln, err = net.Listen("tcp", tcpAddr) } if err != nil { return err } defer ln.Close() log.Infof("Ready to accept connections at %s", ln.Addr()) var clientID int64 for { conn, err := ln.Accept() if err != nil { return err } go func(conn net.Conn) { // open connection // create the client client := new(Client) client.id = int(atomic.AddInt64(&clientID, 1)) client.opened = time.Now() client.remoteAddr = conn.RemoteAddr().String() // add client to server map s.connsmu.Lock() s.conns[client.id] = client s.connsmu.Unlock() s.statsTotalConns.add(1) // set the client keep-alive, if needed if s.config.keepAlive() > 0 { if conn, ok := conn.(*net.TCPConn); ok { conn.SetKeepAlive(true) conn.SetKeepAlivePeriod( time.Duration(s.config.keepAlive()) * time.Second, ) } } log.Debugf("Opened connection: %s", client.remoteAddr) defer func() { // close connection // delete from server map s.connsmu.Lock() delete(s.conns, client.id) s.connsmu.Unlock() log.Debugf("Closed connection: %s", client.remoteAddr) conn.Close() }() var lastConnType Type var lastOutputType Type // check if the connection is protected if !strings.HasPrefix(client.remoteAddr, "127.0.0.1:") && !strings.HasPrefix(client.remoteAddr, "[::1]:") { if s.isProtected() { // This is a protected server. Only loopback is allowed. conn.Write(deniedMessage) return // close connection } } packet := make([]byte, 0xFFFF) for { var close bool n, err := conn.Read(packet) if err != nil { return } in := packet[:n] // read the payload packet from the client input stream. packet := client.in.Begin(in) // load the pipeline reader pr := &client.pr rdbuf := bytes.NewBuffer(packet) pr.rd = rdbuf pr.wr = client msgs, err := pr.ReadMessages() for _, msg := range msgs { // Just closing connection if we have deprecated HTTP or WS connection, // And --http-transport = false if !s.http && (msg.ConnType == WebSocket || msg.ConnType == HTTP) { close = true // close connection break } if msg != nil && msg.Command() != "" { if client.outputType != Null { msg.OutputType = client.outputType } if msg.Command() == "quit" { if msg.OutputType == RESP { io.WriteString(client, "+OK\r\n") } close = true // close connection break } // increment last used client.mu.Lock() client.last = time.Now() client.mu.Unlock() // update total command count s.statsTotalCommands.add(1) // handle the command err := s.handleInputCommand(client, msg) if err != nil { if err.Error() == goingLive { client.goLiveErr = err client.goLiveMsg = msg // detach var rwc io.ReadWriteCloser = conn client.conn = rwc if len(client.out) > 0 { client.conn.Write(client.out) client.out = nil } client.in = InputStream{} client.pr.rd = rwc client.pr.wr = rwc log.Debugf("Detached connection: %s", client.remoteAddr) var wg sync.WaitGroup wg.Add(1) go func() { defer wg.Done() err := s.goLive( client.goLiveErr, &liveConn{conn.RemoteAddr(), rwc}, &client.pr, client.goLiveMsg, client.goLiveMsg.ConnType == WebSocket, ) if err != nil { log.Error(err) } }() wg.Wait() return // close connection } log.Error(err) return // close connection, NOW } client.outputType = msg.OutputType } else { client.Write([]byte("HTTP/1.1 500 Bad Request\r\nConnection: close\r\n\r\n")) break } if msg.ConnType == HTTP || msg.ConnType == WebSocket { close = true // close connection break } lastOutputType = msg.OutputType lastConnType = msg.ConnType } packet = packet[len(packet)-rdbuf.Len():] client.in.End(packet) // write to client if len(client.out) > 0 { if atomic.LoadInt32(&s.aofdirty) != 0 { func() { // prewrite s.mu.Lock() defer s.mu.Unlock() s.flushAOF(false) }() atomic.StoreInt32(&s.aofdirty, 0) } conn.Write(client.out) client.out = nil } if close { break } if err != nil { log.Error(err) if lastConnType == RESP { var value resp.Value switch lastOutputType { case JSON: value = resp.StringValue(`{"ok":false,"err":` + jsonString(err.Error()) + "}") case RESP: value = resp.ErrorValue(err) } bytes, _ := value.MarshalRESP() conn.Write(bytes) } break // close connection } } }(conn) } } type liveConn struct { remoteAddr net.Addr rwc io.ReadWriteCloser } func (conn *liveConn) Close() error { return conn.rwc.Close() } func (conn *liveConn) LocalAddr() net.Addr { panic("not supported") } func (conn *liveConn) RemoteAddr() net.Addr { return conn.remoteAddr } func (conn *liveConn) Read(b []byte) (n int, err error) { return conn.rwc.Read(b) } func (conn *liveConn) Write(b []byte) (n int, err error) { return conn.rwc.Write(b) } func (conn *liveConn) SetDeadline(deadline time.Time) error { panic("not supported") } func (conn *liveConn) SetReadDeadline(deadline time.Time) error { panic("not supported") } func (conn *liveConn) SetWriteDeadline(deadline time.Time) error { panic("not supported") } func (s *Server) watchAutoGC() { t := time.NewTicker(time.Second) defer t.Stop() start := time.Now() for range t.C { if s.stopServer.on() { return } autoGC := s.config.autoGC() if autoGC == 0 { continue } if time.Since(start) < time.Second*time.Duration(autoGC) { continue } var mem1, mem2 runtime.MemStats runtime.ReadMemStats(&mem1) log.Debugf("autogc(before): "+ "alloc: %v, heap_alloc: %v, heap_released: %v", mem1.Alloc, mem1.HeapAlloc, mem1.HeapReleased) runtime.GC() debug.FreeOSMemory() runtime.ReadMemStats(&mem2) log.Debugf("autogc(after): "+ "alloc: %v, heap_alloc: %v, heap_released: %v", mem2.Alloc, mem2.HeapAlloc, mem2.HeapReleased) start = time.Now() } } func (s *Server) watchOutOfMemory() { t := time.NewTicker(time.Second * 2) defer t.Stop() var mem runtime.MemStats for range t.C { func() { if s.stopServer.on() { return } oom := s.outOfMemory.on() if s.config.maxMemory() == 0 { if oom { s.outOfMemory.set(false) } return } if oom { runtime.GC() } runtime.ReadMemStats(&mem) s.outOfMemory.set(int(mem.HeapAlloc) > s.config.maxMemory()) }() } } func (s *Server) watchLuaStatePool() { t := time.NewTicker(time.Second * 10) defer t.Stop() for range t.C { func() { s.luapool.Prune() }() } } // backgroundSyncAOF ensures that the aof buffer is does not grow too big. func (s *Server) backgroundSyncAOF() { t := time.NewTicker(time.Second) defer t.Stop() for range t.C { if s.stopServer.on() { return } func() { s.mu.Lock() defer s.mu.Unlock() s.flushAOF(true) }() } } func isReservedFieldName(field string) bool { switch field { case "z", "lat", "lon": return true } return false } func rewriteTimeoutMsg(msg *Message) (err error) { vs := msg.Args[1:] var valStr string var ok bool if vs, valStr, ok = tokenval(vs); !ok || valStr == "" || len(vs) == 0 { err = errInvalidNumberOfArguments return } timeoutSec, _err := strconv.ParseFloat(valStr, 64) if _err != nil || timeoutSec < 0 { err = errInvalidArgument(valStr) return } msg.Args = vs[:] msg._command = "" msg.Deadline = deadline.New( time.Now().Add(time.Duration(timeoutSec * float64(time.Second)))) return } func (s *Server) handleInputCommand(client *Client, msg *Message) error { start := time.Now() serializeOutput := func(res resp.Value) (string, error) { var resStr string var err error switch msg.OutputType { case JSON: resStr = res.String() case RESP: var resBytes []byte resBytes, err = res.MarshalRESP() resStr = string(resBytes) } return resStr, err } writeOutput := func(res string) error { switch msg.ConnType { default: err := fmt.Errorf("unsupported conn type: %v", msg.ConnType) log.Error(err) return err case WebSocket: return WriteWebSocketMessage(client, []byte(res)) case HTTP: status := "200 OK" if (s.http500Errors || msg._command == "healthz") && !gjson.Get(res, "ok").Bool() { status = "500 Internal Server Error" } _, err := fmt.Fprintf(client, "HTTP/1.1 %s\r\n"+ "Connection: close\r\n"+ "Content-Length: %d\r\n"+ "Content-Type: application/json; charset=utf-8\r\n"+ "\r\n", status, len(res)+2) if err != nil { return err } _, err = io.WriteString(client, res) if err != nil { return err } _, err = io.WriteString(client, "\r\n") return err case RESP: var err error if msg.OutputType == JSON { _, err = fmt.Fprintf(client, "$%d\r\n%s\r\n", len(res), res) } else { _, err = io.WriteString(client, res) } return err case Native: _, err := fmt.Fprintf(client, "$%d %s\r\n", len(res), res) return err } } cmd := msg.Command() defer func() { took := time.Since(start).Seconds() cmdDurations.With(prometheus.Labels{"cmd": cmd}).Observe(took) }() // Ping. Just send back the response. No need to put through the pipeline. if cmd == "ping" || cmd == "echo" { switch msg.OutputType { case JSON: if len(msg.Args) > 1 { return writeOutput(`{"ok":true,"` + cmd + `":` + jsonString(msg.Args[1]) + `,"elapsed":"` + time.Since(start).String() + `"}`) } return writeOutput(`{"ok":true,"` + cmd + `":"pong","elapsed":"` + time.Since(start).String() + `"}`) case RESP: if len(msg.Args) > 1 { data := redcon.AppendBulkString(nil, msg.Args[1]) return writeOutput(string(data)) } return writeOutput("+PONG\r\n") } s.sendMonitor(nil, msg, client, false) return nil } writeErr := func(errMsg string) error { switch msg.OutputType { case JSON: return writeOutput(`{"ok":false,"err":` + jsonString(errMsg) + `,"elapsed":"` + time.Since(start).String() + "\"}") case RESP: if errMsg == errInvalidNumberOfArguments.Error() { return writeOutput("-ERR wrong number of arguments for '" + cmd + "' command\r\n") } var ucprefix bool word := strings.Split(errMsg, " ")[0] if len(word) > 0 { ucprefix = true for i := 0; i < len(word); i++ { if word[i] < 'A' || word[i] > 'Z' { ucprefix = false break } } } if !ucprefix { errMsg = "ERR " + errMsg } v, _ := resp.ErrorValue(errors.New(errMsg)).MarshalRESP() return writeOutput(string(v)) } return nil } if !s.loadedAndReady.on() { switch msg.Command() { case "output", "ping", "echo": default: return writeErr("LOADING Tile38 is loading the dataset in memory") } } if cmd == "hello" { // Not Supporting RESP3+, returns an ERR instead. return writeErr("unknown command '" + msg.Args[0] + "'") } if cmd == "timeout" { if err := rewriteTimeoutMsg(msg); err != nil { return writeErr(err.Error()) } } var write bool if (!client.authd || cmd == "auth") && cmd != "output" { if s.config.requirePass() != "" { password := "" // This better be an AUTH command or the Message should contain an Auth if cmd != "auth" && msg.Auth == "" { // Just shut down the pipeline now. The less the client connection knows the better. return writeErr("authentication required") } if msg.Auth != "" { password = msg.Auth } else { if len(msg.Args) > 1 { password = msg.Args[1] } } if s.config.requirePass() != strings.TrimSpace(password) { return writeErr("invalid password") } client.authd = true if msg.ConnType != HTTP { resStr, _ := serializeOutput(OKMessage(msg, start)) return writeOutput(resStr) } } else if msg.Command() == "auth" { return writeErr("invalid password") } } // choose the locking strategy switch msg.Command() { default: s.mu.RLock() defer s.mu.RUnlock() case "set", "del", "drop", "fset", "flushdb", "setchan", "pdelchan", "delchan", "sethook", "pdelhook", "delhook", "expire", "persist", "jset", "pdel", "rename", "renamenx": // write operations write = true s.mu.Lock() defer s.mu.Unlock() if s.config.followHost() != "" { return writeErr("not the leader") } if s.config.readOnly() { return writeErr("read only") } case "eval", "evalsha": // write operations (potentially) but no AOF for the script command itself s.mu.Lock() defer s.mu.Unlock() if s.config.followHost() != "" { return writeErr("not the leader") } if s.config.readOnly() { return writeErr("read only") } case "get", "keys", "scan", "nearby", "within", "intersects", "hooks", "chans", "search", "ttl", "bounds", "server", "info", "type", "jget", "evalro", "evalrosha", "healthz": // read operations s.mu.RLock() defer s.mu.RUnlock() if s.config.followHost() != "" && !s.fcuponce { return writeErr("catching up to leader") } case "follow", "slaveof", "replconf", "readonly", "config": // system operations // does not write to aof, but requires a write lock. s.mu.Lock() defer s.mu.Unlock() case "output": // this is local connection operation. Locks not needed. case "echo": case "massinsert": // dev operation case "sleep": // dev operation s.mu.RLock() defer s.mu.RUnlock() case "shutdown": // dev operation s.mu.Lock() defer s.mu.Unlock() case "aofshrink": s.mu.RLock() defer s.mu.RUnlock() case "client": s.mu.Lock() defer s.mu.Unlock() case "evalna", "evalnasha": // No locking for scripts, otherwise writes cannot happen within scripts case "subscribe", "psubscribe", "publish": // No locking for pubsub case "monitor": // No locking for monitor } res, d, err := func() (res resp.Value, d commandDetails, err error) { if msg.Deadline != nil { if write { res = NOMessage err = errTimeoutOnCmd(msg.Command()) return } defer func() { if msg.Deadline.Hit() { v := recover() if v != nil { if s, ok := v.(string); !ok || s != "deadline" { panic(v) } } res = NOMessage err = writeErr("timeout") } }() } res, d, err = s.command(msg, client) if msg.Deadline != nil { msg.Deadline.Check() } return res, d, err }() if res.Type() == resp.Error { return writeErr(res.String()) } if err != nil { if err.Error() == goingLive { return err } return writeErr(err.Error()) } if write { if err := s.writeAOF(msg.Args, &d); err != nil { if _, ok := err.(errAOFHook); ok { return writeErr(err.Error()) } log.Fatal(err) return err } } if !isRespValueEmptyString(res) { var resStr string resStr, err := serializeOutput(res) if err != nil { return err } if err := writeOutput(resStr); err != nil { return err } } return nil } func isRespValueEmptyString(val resp.Value) bool { return !val.IsNull() && (val.Type() == resp.SimpleString || val.Type() == resp.BulkString) && len(val.Bytes()) == 0 } func randomKey(n int) string { b := make([]byte, n) nn, err := rand.Read(b) if err != nil { panic(err) } if nn != n { panic("random failed") } return fmt.Sprintf("%x", b) } func (s *Server) reset() { s.aofsz = 0 s.cols.Clear() } func (s *Server) command(msg *Message, client *Client) ( res resp.Value, d commandDetails, err error, ) { switch msg.Command() { default: err = fmt.Errorf("unknown command '%s'", msg.Args[0]) case "set": res, d, err = s.cmdSET(msg) case "fset": res, d, err = s.cmdFSET(msg) case "del": res, d, err = s.cmdDel(msg) case "pdel": res, d, err = s.cmdPdel(msg) case "drop": res, d, err = s.cmdDrop(msg) case "flushdb": res, d, err = s.cmdFLUSHDB(msg) case "rename": res, d, err = s.cmdRename(msg) case "renamenx": res, d, err = s.cmdRename(msg) case "sethook": res, d, err = s.cmdSetHook(msg) case "delhook": res, d, err = s.cmdDelHook(msg) case "pdelhook": res, d, err = s.cmdPDelHook(msg) case "hooks": res, err = s.cmdHooks(msg) case "setchan": res, d, err = s.cmdSetHook(msg) case "delchan": res, d, err = s.cmdDelHook(msg) case "pdelchan": res, d, err = s.cmdPDelHook(msg) case "chans": res, err = s.cmdHooks(msg) case "expire": res, d, err = s.cmdEXPIRE(msg) case "persist": res, d, err = s.cmdPERSIST(msg) case "ttl": res, err = s.cmdTTL(msg) case "shutdown": if !core.DevMode { err = fmt.Errorf("unknown command '%s'", msg.Args[0]) return } log.Fatal("shutdown requested by developer") case "massinsert": if !core.DevMode { err = fmt.Errorf("unknown command '%s'", msg.Args[0]) return } res, err = s.cmdMassInsert(msg) case "sleep": if !core.DevMode { err = fmt.Errorf("unknown command '%s'", msg.Args[0]) return } res, err = s.cmdSleep(msg) case "follow", "slaveof": res, err = s.cmdFollow(msg) case "replconf": res, err = s.cmdReplConf(msg, client) case "readonly": res, err = s.cmdReadOnly(msg) case "stats": res, err = s.cmdStats(msg) case "server": res, err = s.cmdServer(msg) case "healthz": res, err = s.cmdHealthz(msg) case "info": res, err = s.cmdInfo(msg) case "scan": res, err = s.cmdScan(msg) case "nearby": res, err = s.cmdNearby(msg) case "within": res, err = s.cmdWITHIN(msg) case "intersects": res, err = s.cmdINTERSECTS(msg) case "search": res, err = s.cmdSearch(msg) case "bounds": res, err = s.cmdBounds(msg) case "get": res, err = s.cmdGet(msg) case "jget": res, err = s.cmdJget(msg) case "jset": res, d, err = s.cmdJset(msg) case "jdel": res, d, err = s.cmdJdel(msg) case "type": res, err = s.cmdType(msg) case "keys": res, err = s.cmdKeys(msg) case "output": res, err = s.cmdOutput(msg) case "aof": res, err = s.cmdAOF(msg) case "aofmd5": res, err = s.cmdAOFMD5(msg) case "gc": runtime.GC() debug.FreeOSMemory() res = OKMessage(msg, time.Now()) case "aofshrink": go s.aofshrink() res = OKMessage(msg, time.Now()) case "config get": res, err = s.cmdConfigGet(msg) case "config set": res, err = s.cmdConfigSet(msg) case "config rewrite": res, err = s.cmdConfigRewrite(msg) case "config", "script": // These get rewritten into "config foo" and "script bar" err = fmt.Errorf("unknown command '%s'", msg.Args[0]) if len(msg.Args) > 1 { msg.Args[1] = msg.Args[0] + " " + msg.Args[1] msg.Args = msg.Args[1:] msg._command = "" return s.command(msg, client) } case "client": res, err = s.cmdClient(msg, client) case "eval", "evalro", "evalna": res, err = s.cmdEvalUnified(false, msg) case "evalsha", "evalrosha", "evalnasha": res, err = s.cmdEvalUnified(true, msg) case "script load": res, err = s.cmdScriptLoad(msg) case "script exists": res, err = s.cmdScriptExists(msg) case "script flush": res, err = s.cmdScriptFlush(msg) case "subscribe": res, err = s.cmdSubscribe(msg) case "psubscribe": res, err = s.cmdPsubscribe(msg) case "publish": res, err = s.cmdPublish(msg) case "test": res, err = s.cmdTest(msg) case "monitor": res, err = s.cmdMonitor(msg) } s.sendMonitor(err, msg, client, false) return } // This phrase is copied nearly verbatim from Redis. var deniedMessage = []byte(strings.Replace(strings.TrimSpace(` -DENIED Tile38 is running in protected mode because protected mode is enabled, no bind address was specified, no authentication password is requested to clients. In this mode connections are only accepted from the loopback interface. If you want to connect from external computers to Tile38 you may adopt one of the following solutions: 1) Just disable protected mode sending the command 'CONFIG SET protected-mode no' from the loopback interface by connecting to Tile38 from the same host the server is running, however MAKE SURE Tile38 is not publicly accessible from internet if you do so. Use CONFIG REWRITE to make this change permanent. 2) Alternatively you can just disable the protected mode by editing the Tile38 configuration file, and setting the protected mode option to 'no', and then restarting the server. 3) If you started the server manually just for testing, restart it with the '--protected-mode no' option. 4) Setup a bind address or an authentication password. NOTE: You only need to do one of the above things in order for the server to start accepting connections from the outside. `), "\n", " ", -1) + "\r\n") // WriteWebSocketMessage write a websocket message to an io.Writer. func WriteWebSocketMessage(w io.Writer, data []byte) error { var msg []byte buf := make([]byte, 10+len(data)) buf[0] = 129 // FIN + TEXT if len(data) <= 125 { buf[1] = byte(len(data)) copy(buf[2:], data) msg = buf[:2+len(data)] } else if len(data) <= 0xFFFF { buf[1] = 126 binary.BigEndian.PutUint16(buf[2:], uint16(len(data))) copy(buf[4:], data) msg = buf[:4+len(data)] } else { buf[1] = 127 binary.BigEndian.PutUint64(buf[2:], uint64(len(data))) copy(buf[10:], data) msg = buf[:10+len(data)] } _, err := w.Write(msg) return err } // OKMessage returns a default OK message in JSON or RESP. func OKMessage(msg *Message, start time.Time) resp.Value { switch msg.OutputType { case JSON: return resp.StringValue(`{"ok":true,"elapsed":"` + time.Since(start).String() + "\"}") case RESP: return resp.SimpleStringValue("OK") } return resp.SimpleStringValue("") } // NOMessage is no message var NOMessage = resp.SimpleStringValue("") var errInvalidHTTP = errors.New("invalid HTTP request") // Type is resp type type Type byte // Protocol Types const ( Null Type = iota RESP Telnet Native HTTP WebSocket JSON ) // Message is a resp message type Message struct { _command string Args []string ConnType Type OutputType Type Auth string Deadline *deadline.Deadline } // Command returns the first argument as a lowercase string func (msg *Message) Command() string { if msg._command == "" { msg._command = strings.ToLower(msg.Args[0]) } return msg._command } // PipelineReader ... type PipelineReader struct { rd io.Reader wr io.Writer packet [0xFFFF]byte buf []byte } const kindHTTP redcon.Kind = 9999 // NewPipelineReader ... func NewPipelineReader(rd io.ReadWriter) *PipelineReader { return &PipelineReader{rd: rd, wr: rd} } func readcrlfline(packet []byte) (line string, leftover []byte, ok bool) { for i := 1; i < len(packet); i++ { if packet[i] == '\n' && packet[i-1] == '\r' { return string(packet[:i-1]), packet[i+1:], true } } return "", packet, false } func readNextHTTPCommand(packet []byte, argsIn [][]byte, msg *Message, wr io.Writer) ( complete bool, args [][]byte, kind redcon.Kind, leftover []byte, err error, ) { args = argsIn[:0] msg.ConnType = HTTP msg.OutputType = JSON opacket := packet ready, err := func() (bool, error) { var line string var ok bool // read header var headers []string for { line, packet, ok = readcrlfline(packet) if !ok { return false, nil } if line == "" { break } headers = append(headers, line) } parts := strings.Split(headers[0], " ") if len(parts) != 3 { return false, errInvalidHTTP } method := parts[0] path := parts[1] if len(path) == 0 || path[0] != '/' { return false, errInvalidHTTP } path, err = url.QueryUnescape(path[1:]) if err != nil { return false, errInvalidHTTP } if method != "GET" && method != "POST" { return false, errInvalidHTTP } contentLength := 0 websocket := false websocketVersion := 0 websocketKey := "" for _, header := range headers[1:] { if header[0] == 'a' || header[0] == 'A' { if strings.HasPrefix(strings.ToLower(header), "authorization:") { msg.Auth = strings.TrimSpace(header[len("authorization:"):]) } } else if header[0] == 'u' || header[0] == 'U' { if strings.HasPrefix(strings.ToLower(header), "upgrade:") && strings.ToLower(strings.TrimSpace(header[len("upgrade:"):])) == "websocket" { websocket = true } } else if header[0] == 's' || header[0] == 'S' { if strings.HasPrefix(strings.ToLower(header), "sec-websocket-version:") { var n uint64 n, err = strconv.ParseUint(strings.TrimSpace(header[len("sec-websocket-version:"):]), 10, 64) if err != nil { return false, err } websocketVersion = int(n) } else if strings.HasPrefix(strings.ToLower(header), "sec-websocket-key:") { websocketKey = strings.TrimSpace(header[len("sec-websocket-key:"):]) } } else if header[0] == 'c' || header[0] == 'C' { if strings.HasPrefix(strings.ToLower(header), "content-length:") { var n uint64 n, err = strconv.ParseUint(strings.TrimSpace(header[len("content-length:"):]), 10, 64) if err != nil { return false, err } contentLength = int(n) } } } if websocket && websocketVersion >= 13 && websocketKey != "" { msg.ConnType = WebSocket if wr == nil { return false, errors.New("connection is nil") } sum := sha1.Sum([]byte(websocketKey + "258EAFA5-E914-47DA-95CA-C5AB0DC85B11")) accept := base64.StdEncoding.EncodeToString(sum[:]) wshead := "HTTP/1.1 101 Switching Protocols\r\nUpgrade: websocket\r\nConnection: Upgrade\r\nSec-WebSocket-Accept: " + accept + "\r\n\r\n" if _, err = wr.Write([]byte(wshead)); err != nil { return false, err } } else if contentLength > 0 { msg.ConnType = HTTP if len(packet) < contentLength { return false, nil } path += string(packet[:contentLength]) packet = packet[contentLength:] } if path == "" { return true, nil } nmsg, err := readNativeMessageLine([]byte(path)) if err != nil { return false, err } msg.OutputType = JSON msg.Args = nmsg.Args return true, nil }() if err != nil || !ready { return false, args[:0], kindHTTP, opacket, err } return true, args[:0], kindHTTP, packet, nil } func readNextCommand(packet []byte, argsIn [][]byte, msg *Message, wr io.Writer) ( complete bool, args [][]byte, kind redcon.Kind, leftover []byte, err error, ) { if packet[0] == 'G' || packet[0] == 'P' { // could be an HTTP request var line []byte for i := 1; i < len(packet); i++ { if packet[i] == '\n' { if packet[i-1] == '\r' { line = packet[:i+1] break } } } if len(line) == 0 { return false, argsIn[:0], redcon.Redis, packet, nil } if len(line) > 11 && string(line[len(line)-11:len(line)-5]) == " HTTP/" { return readNextHTTPCommand(packet, argsIn, msg, wr) } } return redcon.ReadNextCommand(packet, args) } // ReadMessages ... func (rd *PipelineReader) ReadMessages() ([]*Message, error) { var msgs []*Message moreData: n, err := rd.rd.Read(rd.packet[:]) if err != nil { return nil, err } if n == 0 { // need more data goto moreData } data := rd.packet[:n] if len(rd.buf) > 0 { data = append(rd.buf, data...) } for len(data) > 0 { msg := &Message{} complete, args, kind, leftover, err2 := readNextCommand(data, nil, msg, rd.wr) if err2 != nil { err = err2 break } if !complete { break } if kind == kindHTTP { if len(msg.Args) == 0 { return nil, errInvalidHTTP } msgs = append(msgs, msg) } else if len(args) > 0 { for i := 0; i < len(args); i++ { msg.Args = append(msg.Args, string(args[i])) } switch kind { case redcon.Redis: msg.ConnType = RESP msg.OutputType = RESP case redcon.Tile38: msg.ConnType = Native msg.OutputType = JSON case redcon.Telnet: msg.ConnType = RESP msg.OutputType = RESP } msgs = append(msgs, msg) } data = leftover } if len(data) > 0 { rd.buf = append(rd.buf[:0], data...) } else if len(rd.buf) > 0 { rd.buf = rd.buf[:0] } return msgs, err } func readNativeMessageLine(line []byte) (*Message, error) { var args []string reading: for len(line) != 0 { if line[0] == '{' { // The native protocol cannot understand json boundaries so it assumes that // a json element must be at the end of the line. args = append(args, string(line)) break } if line[0] == '"' && line[len(line)-1] == '"' { if len(args) > 0 && strings.ToLower(args[0]) == "set" && strings.ToLower(args[len(args)-1]) == "string" { // Setting a string value that is contained inside double quotes. // This is only because of the boundary issues of the native protocol. args = append(args, string(line[1:len(line)-1])) break } } i := 0 for ; i < len(line); i++ { if line[i] == ' ' { arg := string(line[:i]) if arg != "" { args = append(args, arg) } line = line[i+1:] continue reading } } args = append(args, string(line)) break } return &Message{Args: args, ConnType: Native, OutputType: JSON}, nil } // InputStream is a helper type for managing input streams from inside // the Data event. type InputStream struct{ b []byte } // Begin accepts a new packet and returns a working sequence of // unprocessed bytes. func (is *InputStream) Begin(packet []byte) (data []byte) { data = packet if len(is.b) > 0 { is.b = append(is.b, data...) data = is.b } return data } // End shifts the stream to match the unprocessed data. func (is *InputStream) End(data []byte) { if len(data) > 0 { if len(data) != len(is.b) { is.b = append(is.b[:0], data...) } } else if len(is.b) > 0 { is.b = is.b[:0] } } // clientErrorf is the same as fmt.Errorf, but is intented for errors that are // sent back to the client. This allows for the Go static checker to ignore // throwing warning for certain error strings. // https://staticcheck.io/docs/checks#ST1005 func clientErrorf(format string, args ...interface{}) error { return fmt.Errorf(format, args...) }