completely isolate the socket api from the main realy
This commit is contained in:
@@ -2,89 +2,11 @@ package realy
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"net/http"
|
"net/http"
|
||||||
"time"
|
|
||||||
|
|
||||||
"github.com/fasthttp/websocket"
|
|
||||||
|
|
||||||
"realy.mleku.dev/context"
|
|
||||||
"realy.mleku.dev/envelopes/authenvelope"
|
|
||||||
"realy.mleku.dev/realy/subscribers"
|
|
||||||
"realy.mleku.dev/socketapi"
|
"realy.mleku.dev/socketapi"
|
||||||
)
|
)
|
||||||
|
|
||||||
func (s *Server) handleWebsocket(w http.ResponseWriter, r *http.Request) {
|
func (s *Server) handleWebsocket(w http.ResponseWriter, r *http.Request) {
|
||||||
conn, err := subscribers.Upgrader.Upgrade(w, r, nil)
|
a := &socketapi.A{Server: s, ClientsMu: &s.clientsMu, Clients: s.clients}
|
||||||
if err != nil {
|
a.Serve(w, r, s)
|
||||||
log.E.F("failed to upgrade websocket: %v", err)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
s.clientsMu.Lock()
|
|
||||||
defer s.clientsMu.Unlock()
|
|
||||||
s.clients[conn] = struct{}{}
|
|
||||||
ticker := time.NewTicker(s.listeners.PingPeriod)
|
|
||||||
ip := conn.RemoteAddr().String()
|
|
||||||
var realIP string
|
|
||||||
if realIP = r.Header.Get("X-Forwarded-For"); realIP != "" {
|
|
||||||
ip = realIP
|
|
||||||
} else if realIP = r.Header.Get("X-Real-Ip"); realIP != "" {
|
|
||||||
ip = realIP
|
|
||||||
}
|
|
||||||
log.T.F("connected from %s", ip)
|
|
||||||
ws := s.listeners.GetChallenge(conn, r, ip)
|
|
||||||
ctx, cancel := context.Cancel(context.Bg())
|
|
||||||
sto := s.relay.Storage()
|
|
||||||
go func() {
|
|
||||||
defer func() {
|
|
||||||
cancel()
|
|
||||||
ticker.Stop()
|
|
||||||
s.clientsMu.Lock()
|
|
||||||
if _, ok := s.clients[conn]; ok {
|
|
||||||
chk.E(conn.Close())
|
|
||||||
delete(s.clients, conn)
|
|
||||||
s.listeners.RemoveSubscriber(ws)
|
|
||||||
}
|
|
||||||
s.clientsMu.Unlock()
|
|
||||||
}()
|
|
||||||
conn.SetReadLimit(s.listeners.MaxMessageSize)
|
|
||||||
chk.E(conn.SetReadDeadline(time.Now().Add(s.listeners.PongWait)))
|
|
||||||
conn.SetPongHandler(func(string) error {
|
|
||||||
chk.E(conn.SetReadDeadline(time.Now().Add(s.listeners.PongWait)))
|
|
||||||
return nil
|
|
||||||
})
|
|
||||||
if s.authRequired {
|
|
||||||
ws.RequestAuth()
|
|
||||||
}
|
|
||||||
if ws.AuthRequested() && len(ws.Authed()) == 0 {
|
|
||||||
log.I.F("requesting auth from client from %s", ws.RealRemote())
|
|
||||||
if err = authenvelope.NewChallengeWith(ws.Challenge()).Write(ws); chk.E(err) {
|
|
||||||
return
|
|
||||||
}
|
|
||||||
// return
|
|
||||||
}
|
|
||||||
var message []byte
|
|
||||||
var typ int
|
|
||||||
for {
|
|
||||||
typ, message, err = conn.ReadMessage()
|
|
||||||
if err != nil {
|
|
||||||
if websocket.IsUnexpectedCloseError(err,
|
|
||||||
websocket.CloseNormalClosure,
|
|
||||||
websocket.CloseGoingAway,
|
|
||||||
websocket.CloseNoStatusReceived,
|
|
||||||
websocket.CloseAbnormalClosure,
|
|
||||||
) {
|
|
||||||
log.W.F("unexpected close error from %s: %v",
|
|
||||||
r.Header.Get("X-Forwarded-For"), err)
|
|
||||||
}
|
|
||||||
break
|
|
||||||
}
|
|
||||||
if typ == websocket.PingMessage {
|
|
||||||
if err = ws.WriteMessage(websocket.PongMessage, nil); chk.E(err) {
|
|
||||||
}
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
a := &socketapi.A{ws}
|
|
||||||
go s.handleMessage(ctx, a, message, sto)
|
|
||||||
}
|
|
||||||
}()
|
|
||||||
go s.pinger(ctx, ws, conn, ticker, cancel)
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -6,6 +6,7 @@ import (
|
|||||||
|
|
||||||
"realy.mleku.dev/context"
|
"realy.mleku.dev/context"
|
||||||
"realy.mleku.dev/event"
|
"realy.mleku.dev/event"
|
||||||
|
"realy.mleku.dev/realy/options"
|
||||||
"realy.mleku.dev/realy/subscribers"
|
"realy.mleku.dev/realy/subscribers"
|
||||||
"realy.mleku.dev/relay"
|
"realy.mleku.dev/relay"
|
||||||
"realy.mleku.dev/store"
|
"realy.mleku.dev/store"
|
||||||
@@ -33,4 +34,5 @@ type Server interface {
|
|||||||
SetConfiguration(*store.Configuration)
|
SetConfiguration(*store.Configuration)
|
||||||
Shutdown()
|
Shutdown()
|
||||||
Storage() store.I
|
Storage() store.I
|
||||||
|
Options() *options.T
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -7,6 +7,7 @@ import (
|
|||||||
"realy.mleku.dev/context"
|
"realy.mleku.dev/context"
|
||||||
"realy.mleku.dev/event"
|
"realy.mleku.dev/event"
|
||||||
"realy.mleku.dev/realy/interfaces"
|
"realy.mleku.dev/realy/interfaces"
|
||||||
|
"realy.mleku.dev/realy/options"
|
||||||
"realy.mleku.dev/realy/subscribers"
|
"realy.mleku.dev/realy/subscribers"
|
||||||
"realy.mleku.dev/relay"
|
"realy.mleku.dev/relay"
|
||||||
"realy.mleku.dev/store"
|
"realy.mleku.dev/store"
|
||||||
@@ -61,4 +62,6 @@ func (s *Server) Owners() [][]byte { return s.owners }
|
|||||||
|
|
||||||
func (s *Server) AuthRequired() bool { return s.authRequired }
|
func (s *Server) AuthRequired() bool { return s.authRequired }
|
||||||
|
|
||||||
|
func (s *Server) Options() *options.T { return s.options }
|
||||||
|
|
||||||
var _ interfaces.Server = &Server{}
|
var _ interfaces.Server = &Server{}
|
||||||
|
|||||||
@@ -78,10 +78,6 @@ const (
|
|||||||
|
|
||||||
var (
|
var (
|
||||||
NIP20prefixmatcher = regexp.MustCompile(`^\w+: `)
|
NIP20prefixmatcher = regexp.MustCompile(`^\w+: `)
|
||||||
Upgrader = websocket.Upgrader{ReadBufferSize: 1024, WriteBufferSize: 1024,
|
|
||||||
CheckOrigin: func(r *http.Request) bool {
|
|
||||||
return true
|
|
||||||
}}
|
|
||||||
)
|
)
|
||||||
|
|
||||||
// New creates a new subscribers.S.
|
// New creates a new subscribers.S.
|
||||||
@@ -114,8 +110,7 @@ func New(ctx context.T) (l *S) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// GetChallenge generates a new challenge for a subscriber.
|
// GetChallenge generates a new challenge for a subscriber.
|
||||||
func (s *S) GetChallenge(conn *websocket.Conn, req *http.Request,
|
func (s *S) GetChallenge(conn *websocket.Conn, req *http.Request) (w *ws.Listener) {
|
||||||
addr string) (w *ws.Listener) {
|
|
||||||
var err error
|
var err error
|
||||||
cb := make([]byte, s.ChallengeLength)
|
cb := make([]byte, s.ChallengeLength)
|
||||||
if _, err = rand.Read(cb); chk.E(err) {
|
if _, err = rand.Read(cb); chk.E(err) {
|
||||||
|
|||||||
@@ -1,9 +1,8 @@
|
|||||||
package realy
|
package socketapi
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
|
|
||||||
"realy.mleku.dev/context"
|
|
||||||
"realy.mleku.dev/envelopes"
|
"realy.mleku.dev/envelopes"
|
||||||
"realy.mleku.dev/envelopes/authenvelope"
|
"realy.mleku.dev/envelopes/authenvelope"
|
||||||
"realy.mleku.dev/envelopes/closeenvelope"
|
"realy.mleku.dev/envelopes/closeenvelope"
|
||||||
@@ -11,11 +10,9 @@ import (
|
|||||||
"realy.mleku.dev/envelopes/noticeenvelope"
|
"realy.mleku.dev/envelopes/noticeenvelope"
|
||||||
"realy.mleku.dev/envelopes/reqenvelope"
|
"realy.mleku.dev/envelopes/reqenvelope"
|
||||||
"realy.mleku.dev/relay"
|
"realy.mleku.dev/relay"
|
||||||
"realy.mleku.dev/socketapi"
|
|
||||||
"realy.mleku.dev/store"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
func (s *Server) handleMessage(c context.T, a *socketapi.A, msg []byte, sto store.I) {
|
func (a *A) HandleMessage(msg []byte) {
|
||||||
var notice []byte
|
var notice []byte
|
||||||
var err error
|
var err error
|
||||||
var t string
|
var t string
|
||||||
@@ -23,17 +20,16 @@ func (s *Server) handleMessage(c context.T, a *socketapi.A, msg []byte, sto stor
|
|||||||
if t, rem, err = envelopes.Identify(msg); chk.E(err) {
|
if t, rem, err = envelopes.Identify(msg); chk.E(err) {
|
||||||
notice = []byte(err.Error())
|
notice = []byte(err.Error())
|
||||||
}
|
}
|
||||||
skipEventFunc := s.options.SkipEventFunc
|
rl := a.Relay()
|
||||||
rl := s.relay
|
|
||||||
switch t {
|
switch t {
|
||||||
case eventenvelope.L:
|
case eventenvelope.L:
|
||||||
notice = a.HandleEvent(c, rem, s)
|
notice = a.HandleEvent(a.Context(), rem, a.Server)
|
||||||
case reqenvelope.L:
|
case reqenvelope.L:
|
||||||
notice = a.HandleReq(c, rem, skipEventFunc, s)
|
notice = a.HandleReq(a.Context(), rem, a.Options().SkipEventFunc, a.Server)
|
||||||
case closeenvelope.L:
|
case closeenvelope.L:
|
||||||
notice = a.HandleClose(rem, s)
|
notice = a.HandleClose(rem, a.Server)
|
||||||
case authenvelope.L:
|
case authenvelope.L:
|
||||||
notice = a.HandleAuth(rem, s)
|
notice = a.HandleAuth(rem, a.Server)
|
||||||
default:
|
default:
|
||||||
if wsh, ok := rl.(relay.WebSocketHandler); ok {
|
if wsh, ok := rl.(relay.WebSocketHandler); ok {
|
||||||
wsh.HandleUnknownType(a.Listener, t, rem)
|
wsh.HandleUnknownType(a.Listener, t, rem)
|
||||||
@@ -47,4 +43,5 @@ func (s *Server) handleMessage(c context.T, a *socketapi.A, msg []byte, sto stor
|
|||||||
return
|
return
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
1
socketapi/handleWebsocket.go
Normal file
1
socketapi/handleWebsocket.go
Normal file
@@ -0,0 +1 @@
|
|||||||
|
package socketapi
|
||||||
@@ -1,4 +1,4 @@
|
|||||||
package realy
|
package socketapi
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"time"
|
"time"
|
||||||
@@ -6,27 +6,26 @@ import (
|
|||||||
"github.com/fasthttp/websocket"
|
"github.com/fasthttp/websocket"
|
||||||
|
|
||||||
"realy.mleku.dev/context"
|
"realy.mleku.dev/context"
|
||||||
"realy.mleku.dev/ws"
|
"realy.mleku.dev/realy/interfaces"
|
||||||
)
|
)
|
||||||
|
|
||||||
func (s *Server) pinger(ctx context.T, ws *ws.Listener, conn *websocket.Conn,
|
func (a *A) Pinger(ctx context.T, ticker *time.Ticker, cancel context.F, s interfaces.Server) {
|
||||||
ticker *time.Ticker, cancel context.F) {
|
|
||||||
defer func() {
|
defer func() {
|
||||||
cancel()
|
cancel()
|
||||||
ticker.Stop()
|
ticker.Stop()
|
||||||
_ = conn.Close()
|
_ = a.Listener.Conn.Close()
|
||||||
}()
|
}()
|
||||||
var err error
|
var err error
|
||||||
for {
|
for {
|
||||||
select {
|
select {
|
||||||
case <-ticker.C:
|
case <-ticker.C:
|
||||||
err = conn.WriteControl(websocket.PingMessage, nil,
|
err = a.Listener.Conn.WriteControl(websocket.PingMessage, nil,
|
||||||
time.Now().Add(s.listeners.WriteWait))
|
time.Now().Add(s.Listeners().WriteWait))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.E.F("error writing ping: %v; closing websocket", err)
|
log.E.F("error writing ping: %v; closing websocket", err)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
ws.RealRemote()
|
a.Listener.RealRemote()
|
||||||
case <-ctx.Done():
|
case <-ctx.Done():
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
@@ -1,7 +1,90 @@
|
|||||||
package socketapi
|
package socketapi
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"net/http"
|
||||||
|
"sync"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/fasthttp/websocket"
|
||||||
|
|
||||||
|
"realy.mleku.dev/context"
|
||||||
|
"realy.mleku.dev/envelopes/authenvelope"
|
||||||
|
"realy.mleku.dev/realy/interfaces"
|
||||||
"realy.mleku.dev/ws"
|
"realy.mleku.dev/ws"
|
||||||
)
|
)
|
||||||
|
|
||||||
type A struct{ *ws.Listener }
|
type A struct {
|
||||||
|
*ws.Listener
|
||||||
|
interfaces.Server
|
||||||
|
ClientsMu *sync.Mutex
|
||||||
|
Clients map[*websocket.Conn]struct{}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (a *A) Serve(w http.ResponseWriter, r *http.Request, s interfaces.Server) {
|
||||||
|
|
||||||
|
var err error
|
||||||
|
ticker := time.NewTicker(s.Listeners().PingPeriod)
|
||||||
|
ctx, cancel := context.Cancel(context.Bg())
|
||||||
|
var conn *websocket.Conn
|
||||||
|
conn, err = Upgrader.Upgrade(w, r, nil)
|
||||||
|
if err != nil {
|
||||||
|
log.E.F("failed to upgrade websocket: %v", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
a.ClientsMu.Lock()
|
||||||
|
defer a.ClientsMu.Unlock()
|
||||||
|
a.Clients[conn] = struct{}{}
|
||||||
|
a.Listener = s.Listeners().GetChallenge(conn, r)
|
||||||
|
|
||||||
|
defer func() {
|
||||||
|
cancel()
|
||||||
|
ticker.Stop()
|
||||||
|
a.ClientsMu.Lock()
|
||||||
|
if _, ok := a.Clients[a.Listener.Conn]; ok {
|
||||||
|
chk.E(a.Listener.Conn.Close())
|
||||||
|
delete(a.Clients, a.Listener.Conn)
|
||||||
|
a.Listeners().RemoveSubscriber(a.Listener)
|
||||||
|
}
|
||||||
|
a.ClientsMu.Unlock()
|
||||||
|
}()
|
||||||
|
conn.SetReadLimit(a.Listeners().MaxMessageSize)
|
||||||
|
chk.E(conn.SetReadDeadline(time.Now().Add(a.Listeners().PongWait)))
|
||||||
|
conn.SetPongHandler(func(string) error {
|
||||||
|
chk.E(conn.SetReadDeadline(time.Now().Add(a.Listeners().PongWait)))
|
||||||
|
return nil
|
||||||
|
})
|
||||||
|
if a.Server.AuthRequired() {
|
||||||
|
a.Listener.RequestAuth()
|
||||||
|
}
|
||||||
|
if a.Listener.AuthRequested() && len(a.Listener.Authed()) == 0 {
|
||||||
|
log.I.F("requesting auth from client from %s", a.Listener.RealRemote())
|
||||||
|
if err = authenvelope.NewChallengeWith(a.Listener.Challenge()).Write(a.Listener); chk.E(err) {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
// return
|
||||||
|
}
|
||||||
|
go a.Pinger(ctx, ticker, cancel, a.Server)
|
||||||
|
var message []byte
|
||||||
|
var typ int
|
||||||
|
for {
|
||||||
|
typ, message, err = conn.ReadMessage()
|
||||||
|
if err != nil {
|
||||||
|
if websocket.IsUnexpectedCloseError(err,
|
||||||
|
websocket.CloseNormalClosure,
|
||||||
|
websocket.CloseGoingAway,
|
||||||
|
websocket.CloseNoStatusReceived,
|
||||||
|
websocket.CloseAbnormalClosure,
|
||||||
|
) {
|
||||||
|
log.W.F("unexpected close error from %s: %v",
|
||||||
|
a.Listener.Request.Header.Get("X-Forwarded-For"), err)
|
||||||
|
}
|
||||||
|
break
|
||||||
|
}
|
||||||
|
if typ == websocket.PingMessage {
|
||||||
|
if err = a.Listener.WriteMessage(websocket.PongMessage, nil); chk.E(err) {
|
||||||
|
}
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
go a.HandleMessage(message)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|||||||
12
socketapi/upgrader.go
Normal file
12
socketapi/upgrader.go
Normal file
@@ -0,0 +1,12 @@
|
|||||||
|
package socketapi
|
||||||
|
|
||||||
|
import (
|
||||||
|
"net/http"
|
||||||
|
|
||||||
|
"github.com/fasthttp/websocket"
|
||||||
|
)
|
||||||
|
|
||||||
|
var Upgrader = websocket.Upgrader{ReadBufferSize: 1024, WriteBufferSize: 1024,
|
||||||
|
CheckOrigin: func(r *http.Request) bool {
|
||||||
|
return true
|
||||||
|
}}
|
||||||
@@ -14,8 +14,8 @@ import (
|
|||||||
// Listener is a websocket implementation for a relay listener.
|
// Listener is a websocket implementation for a relay listener.
|
||||||
type Listener struct {
|
type Listener struct {
|
||||||
mutex sync.Mutex
|
mutex sync.Mutex
|
||||||
conn *websocket.Conn
|
Conn *websocket.Conn
|
||||||
req *http.Request
|
Request *http.Request
|
||||||
challenge atomic.String
|
challenge atomic.String
|
||||||
remote atomic.String
|
remote atomic.String
|
||||||
authed atomic.String
|
authed atomic.String
|
||||||
@@ -28,7 +28,7 @@ func NewListener(
|
|||||||
req *http.Request,
|
req *http.Request,
|
||||||
challenge []byte,
|
challenge []byte,
|
||||||
) (ws *Listener) {
|
) (ws *Listener) {
|
||||||
ws = &Listener{conn: conn, req: req}
|
ws = &Listener{Conn: conn, Request: req}
|
||||||
ws.challenge.Store(string(challenge))
|
ws.challenge.Store(string(challenge))
|
||||||
ws.authRequested.Store(false)
|
ws.authRequested.Store(false)
|
||||||
ws.setRemoteFromReq(req)
|
ws.setRemoteFromReq(req)
|
||||||
@@ -62,7 +62,7 @@ func (ws *Listener) setRemoteFromReq(r *http.Request) {
|
|||||||
if rr == "" {
|
if rr == "" {
|
||||||
// if that fails, fall back to the remote (probably the proxy, unless the realy is
|
// if that fails, fall back to the remote (probably the proxy, unless the realy is
|
||||||
// actually directly listening)
|
// actually directly listening)
|
||||||
rr = ws.conn.NetConn().RemoteAddr().String()
|
rr = ws.Conn.NetConn().RemoteAddr().String()
|
||||||
}
|
}
|
||||||
ws.remote.Store(rr)
|
ws.remote.Store(rr)
|
||||||
}
|
}
|
||||||
@@ -71,7 +71,7 @@ func (ws *Listener) setRemoteFromReq(r *http.Request) {
|
|||||||
func (ws *Listener) Write(p []byte) (n int, err error) {
|
func (ws *Listener) Write(p []byte) (n int, err error) {
|
||||||
ws.mutex.Lock()
|
ws.mutex.Lock()
|
||||||
defer ws.mutex.Unlock()
|
defer ws.mutex.Unlock()
|
||||||
err = ws.conn.WriteMessage(websocket.TextMessage, p)
|
err = ws.Conn.WriteMessage(websocket.TextMessage, p)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
n = len(p)
|
n = len(p)
|
||||||
if strings.Contains(err.Error(), "close sent") {
|
if strings.Contains(err.Error(), "close sent") {
|
||||||
@@ -88,7 +88,7 @@ func (ws *Listener) Write(p []byte) (n int, err error) {
|
|||||||
func (ws *Listener) WriteJSON(any interface{}) error {
|
func (ws *Listener) WriteJSON(any interface{}) error {
|
||||||
ws.mutex.Lock()
|
ws.mutex.Lock()
|
||||||
defer ws.mutex.Unlock()
|
defer ws.mutex.Unlock()
|
||||||
return ws.conn.WriteJSON(any)
|
return ws.Conn.WriteJSON(any)
|
||||||
}
|
}
|
||||||
|
|
||||||
// WriteMessage is a wrapper around the websocket WriteMessage, which includes a websocket
|
// WriteMessage is a wrapper around the websocket WriteMessage, which includes a websocket
|
||||||
@@ -96,7 +96,7 @@ func (ws *Listener) WriteJSON(any interface{}) error {
|
|||||||
func (ws *Listener) WriteMessage(t int, b []byte) error {
|
func (ws *Listener) WriteMessage(t int, b []byte) error {
|
||||||
ws.mutex.Lock()
|
ws.mutex.Lock()
|
||||||
defer ws.mutex.Unlock()
|
defer ws.mutex.Unlock()
|
||||||
return ws.conn.WriteMessage(t, b)
|
return ws.Conn.WriteMessage(t, b)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Challenge returns the current auth challenge string on the socket.
|
// Challenge returns the current auth challenge string on the socket.
|
||||||
@@ -122,7 +122,7 @@ func (ws *Listener) SetAuthed(s string) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Req returns the http.Request associated with the client connection to the Listener.
|
// Req returns the http.Request associated with the client connection to the Listener.
|
||||||
func (ws *Listener) Req() *http.Request { return ws.req }
|
func (ws *Listener) Req() *http.Request { return ws.Request }
|
||||||
|
|
||||||
// Close the Listener connection from the Listener side.
|
// Close the Listener connection from the Listener side.
|
||||||
func (ws *Listener) Close() (err error) { return ws.conn.Close() }
|
func (ws *Listener) Close() (err error) { return ws.Conn.Close() }
|
||||||
|
|||||||
Reference in New Issue
Block a user