0
0
Fork 0
mirror of https://github.com/matrix-construct/construct synced 2024-11-18 07:50:57 +01:00
construct/ircd/client.cc

631 lines
14 KiB
C++
Raw Normal View History

/*
2007-12-03 17:59:25 +01:00
* charybdis: an advanced ircd.
* client.c: Controls clients.
*
* Copyright (C) 1990 Jarkko Oikarinen and University of Oulu, Co Center
* Copyright (C) 1996-2002 Hybrid Development Team
* Copyright (C) 2002-2005 ircd-ratbox development team
2007-12-03 17:59:25 +01:00
* Copyright (C) 2007 William Pitcock
2016-09-10 21:57:33 +02:00
* Copyright (C) 2016 Charybdis Development Team
* Copyright (C) 2016 Jason Volk <jason@zemos.net>
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
* USA
*/
#include <ircd/asio.h>
namespace ircd {
// Default time limit for how long a client connection can be in "async mode"
// (or idle mode) after which it is disconnected.
const auto async_timeout
{
2017-11-30 20:44:23 +01:00
40s
};
// Time limit for how long a connected client can be in "request mode." This
// should never be hit unless there's an error in the handling code.
const auto request_timeout
{
2017-11-30 20:44:23 +01:00
20s
};
// The pool of request contexts. When a client makes a request it does so by acquiring
// a stack from this pool. The request handling and response logic can then be written
// in a synchronous manner as if each connection had its own thread.
2016-11-29 16:23:38 +01:00
ctx::pool request
{
2017-11-30 20:44:23 +01:00
"request", 4_MiB
};
// Container for all active clients (connections) for iteration purposes.
client::list client::clients;
static bool handle_ec(client &, const net::error_code &);
2016-11-29 16:23:38 +01:00
void async_recv_next(std::shared_ptr<client>, const milliseconds &timeout);
void async_recv_next(std::shared_ptr<client>);
void disconnect(client &, const net::dc & = net::dc::RST);
2016-11-29 16:23:38 +01:00
void disconnect_all();
2016-08-24 01:08:40 +02:00
2016-11-29 16:23:38 +01:00
template<class... args> std::shared_ptr<client> make_client(args&&...);
2016-11-29 16:23:38 +01:00
} // namespace ircd
2016-11-29 16:23:38 +01:00
ircd::client::init::init()
{
2017-11-30 20:44:23 +01:00
request.add(32);
}
void
ircd::client::init::interrupt()
{
if(request.active() || !client::clients.empty())
log::warning("Interrupting %zu requests; dropping %zu requests; disconnecting %zu clients...",
request.active(),
request.pending(),
client::clients.size());
2016-11-29 16:23:38 +01:00
request.interrupt();
disconnect_all();
}
ircd::client::init::~init()
noexcept
{
interrupt();
if(request.active())
log::warning("Joining %zu active of %zu remaining request contexts...",
request.active(),
request.size());
else
log::debug("Waiting for %zu request contexts to join...",
request.size());
2017-09-20 07:23:49 +02:00
request.join();
if(unlikely(!client::clients.empty()))
{
log::error("%zu clients are unterminated...", client::clients.size());
assert(client::clients.empty());
}
}
2017-09-30 08:04:41 +02:00
ircd::hostport
ircd::local(const client &client)
2017-03-11 02:46:25 +01:00
{
if(!client.sock)
return hostport::null;
2017-03-11 02:46:25 +01:00
2017-09-30 08:04:41 +02:00
return net::local_hostport(*client.sock);
2017-03-11 02:46:25 +01:00
}
2017-09-30 08:04:41 +02:00
ircd::hostport
ircd::remote(const client &client)
2017-03-11 02:46:25 +01:00
{
if(!client.sock)
return hostport::null;
2017-03-11 02:46:25 +01:00
2017-09-30 08:04:41 +02:00
return net::remote_hostport(*client.sock);
2017-03-11 02:46:25 +01:00
}
ircd::http::response::write_closure
ircd::write_closure(client &client)
{
2017-03-31 00:46:40 +02:00
// returns a function that can be called to send an iovector of data to a client
return [&client](const ilist<const_buffer> &iov)
{
//std::cout << "<<<<" << std::endl;
//std::cout << iov << std::endl;
//std::cout << "----" << std::endl;
const auto written
{
write(*client.sock, iov)
};
};
}
ircd::parse::read_closure
ircd::read_closure(client &client)
{
2017-03-31 00:46:40 +02:00
// Returns a function the parser can call when it wants more data
return [&client](char *&start, char *const &stop)
{
try
{
2017-03-21 03:30:07 +01:00
const char *const got(start);
read(client, start, stop);
//std::cout << ">>>>" << std::endl;
//std::cout << string_view{got, start} << std::endl;
//std::cout << "----" << std::endl;
}
catch(const boost::system::system_error &e)
{
2017-10-19 10:04:52 +02:00
using namespace boost::system::errc;
switch(e.code().value())
{
case operation_canceled:
throw http::error(http::REQUEST_TIMEOUT);
default:
throw;
}
}
};
}
2017-10-12 02:44:00 +02:00
char *
ircd::read(client &client,
char *&start,
char *const &stop)
{
auto &sock(*client.sock);
const std::array<mutable_buffer, 1> bufs
{{
{ start, stop }
}};
char *const base(start);
start += sock.read_some(bufs);
return base;
}
const char *
ircd::write(client &client,
const char *&start,
const char *const &stop)
{
auto &sock(*client.sock);
const std::array<const_buffer, 1> bufs
{{
{ start, stop }
}};
const char *const base(start);
start += sock.write(bufs);
return base;
}
//
// client
//
2017-03-11 02:46:25 +01:00
ircd::client::client()
:client{std::shared_ptr<socket>{}}
{
}
2017-09-30 08:04:41 +02:00
ircd::client::client(const hostport &host_port,
2017-03-11 02:46:25 +01:00
const seconds &timeout)
:client
{
net::connect(host_port, timeout)
2017-03-11 02:46:25 +01:00
}
{
}
ircd::client::client(std::shared_ptr<socket> sock)
:clit{clients, clients.emplace(end(clients), this)}
2017-03-11 02:46:25 +01:00
,sock{std::move(sock)}
,request_timer{ircd::timer::nostart}
2017-03-11 02:46:25 +01:00
{
}
ircd::client::~client()
2017-10-25 18:49:16 +02:00
noexcept try
{
//assert(!sock || !connected(*sock));
2017-10-25 18:49:16 +02:00
}
catch(const std::exception &e)
2017-03-11 02:46:25 +01:00
{
log::critical("~client(%p): %s", this, e.what());
2017-10-25 18:49:16 +02:00
return;
2017-03-11 02:46:25 +01:00
}
namespace ircd
{
void handle_request(client &client, parse::capstan &pc, const http::request::head &head);
bool handle_request(client &client, parse::capstan &pc);
}
2017-03-11 02:46:25 +01:00
bool
ircd::client::main()
noexcept try
{
2017-11-30 20:44:23 +01:00
const auto header_max{8_KiB};
//const auto content_max{64_KiB};
const auto content_max{8_MiB};
const unique_buffer<mutable_buffer> buffer
{
header_max + content_max
};
parse::buffer pb{buffer};
parse::capstan pc{pb, read_closure(*this)}; do
{
if(!handle_request(*this, pc))
return false;
pb.remove();
}
while(pc.unparsed());
return true;
2017-03-11 02:46:25 +01:00
}
catch(const http::error &e)
{
log::debug("client[%s] HTTP %s in %ld$us %s",
string(remote(*this)),
e.what(),
request_timer.at<microseconds>().count(),
e.content);
switch(e.code)
{
case http::BAD_REQUEST:
case http::REQUEST_TIMEOUT:
case http::INTERNAL_SERVER_ERROR:
return false;
default:
return true;
}
}
2016-11-29 16:23:38 +01:00
catch(const boost::system::system_error &e)
{
using namespace boost::system::errc;
using boost::system::get_system_category;
using boost::asio::error::get_ssl_category;
using boost::asio::error::get_misc_category;
const error_code &ec{e.code()};
const int &value{ec.value()};
if(ec.category() == get_system_category()) switch(value)
{
case success:
assert(0);
return true;
case broken_pipe:
case connection_reset:
case not_connected:
disconnect(*this, net::dc::RST);
return false;
case operation_canceled:
disconnect(*this, net::dc::SSL_NOTIFY);
return false;
case bad_file_descriptor:
return false;
default:
break;
}
else if(ec.category() == get_ssl_category()) switch(uint8_t(value))
{
case SSL_R_SHORT_READ:
case SSL_R_PROTOCOL_IS_SHUTDOWN:
disconnect(*this, net::dc::RST);
return false;
default:
break;
}
else if(ec.category() == get_misc_category()) switch(value)
{
case boost::asio::error::eof:
disconnect(*this, net::dc::RST);
return false;
default:
break;
}
log::error("client(%p): (unexpected) %s: (%d) %s",
(const void *)this,
ec.category().name(),
value,
ec.message());
disconnect(*this, net::dc::RST);
return false;
}
2016-11-29 16:23:38 +01:00
catch(const std::exception &e)
{
log::error("client[%s] [500 Internal Error]: %s",
2017-09-30 08:04:41 +02:00
string(remote(*this)),
e.what());
#ifdef RB_DEBUG
2017-10-25 18:49:16 +02:00
throw;
#else
return false;
#endif
}
bool
ircd::handle_request(client &client,
parse::capstan &pc)
{
client.request_timer = ircd::timer{};
const socket::scope_timeout timeout
{
*client.sock, request_timeout, [client(shared_from(client))]
(const net::error_code &ec)
{
if(!ec)
disconnect(*client, net::dc::SSL_NOTIFY_YIELD);
}
};
2017-10-25 18:49:16 +02:00
bool ret{true};
http::request
{
2017-10-25 18:49:16 +02:00
pc, nullptr, write_closure(client), [&client, &pc, &ret]
(const auto &head)
{
handle_request(client, pc, head);
2017-10-25 18:49:16 +02:00
ret = !iequals(head.connection, "close"s);
}
};
2017-10-25 18:49:16 +02:00
return ret;
}
void
ircd::handle_request(client &client,
parse::capstan &pc,
const http::request::head &head)
{
log::debug("client[%s] HTTP %s `%s' (content-length: %zu)",
2017-09-30 08:04:41 +02:00
string(remote(client)),
head.method,
head.path,
head.content_length);
2017-09-21 11:12:29 +02:00
auto &resource
{
ircd::resource::find(head.path)
};
resource(client, pc, head);
}
2016-11-29 16:23:38 +01:00
std::shared_ptr<ircd::client>
ircd::add_client(std::shared_ptr<socket> s)
{
const auto client
{
make_client(std::move(s))
};
log::debug("client[%s] CONNECTED local[%s]",
2017-09-30 08:04:41 +02:00
string(remote(*client)),
string(local(*client)));
2016-11-29 16:23:38 +01:00
async_recv_next(client, async_timeout);
2016-11-29 16:23:38 +01:00
return client;
}
2016-11-29 16:23:38 +01:00
template<class... args>
std::shared_ptr<ircd::client>
ircd::make_client(args&&... a)
{
2016-11-29 16:23:38 +01:00
return std::make_shared<client>(std::forward<args>(a)...);
}
void
2016-11-29 16:23:38 +01:00
ircd::disconnect_all()
{
auto it(begin(client::clients));
while(it != end(client::clients))
2016-11-29 16:23:38 +01:00
{
auto *const client(*it);
++it; try
{
disconnect(*client, net::dc::SSL_NOTIFY);
}
catch(const std::exception &e)
{
log::warning("Error disconnecting client @%p: %s", client, e.what());
}
2016-11-29 16:23:38 +01:00
}
}
void
2016-11-29 16:23:38 +01:00
ircd::disconnect(client &client,
const net::dc &type)
{
if(likely(client.sock))
disconnect(*client.sock, type);
}
void
2016-11-29 16:23:38 +01:00
ircd::async_recv_next(std::shared_ptr<client> client)
{
2016-11-29 16:23:38 +01:00
async_recv_next(std::move(client), milliseconds(-1));
}
///
/// This function is the basis for the client's request loop. We still use
/// an asynchronous pattern until there is activity on the socket (a request)
/// in which case the switch to synchronous mode is made by jumping into an
/// ircd::context drawn from the request pool. When the request is finished,
/// the client exits back into asynchronous mode until the next request is
/// received and rinse and repeat.
//
/// This sequence exists to avoid any possible c10k-style limitation imposed by
/// dedicating a context and its stack space to the lifetime of a connection.
/// This is similar to the thread-per-request pattern before async was in vogue.
//
/// Developers: Pay close attention to the comments to know exactly where you
/// are and what you can do at any given point in this sequence.
///
void
2016-11-29 16:23:38 +01:00
ircd::async_recv_next(std::shared_ptr<client> client,
const milliseconds &timeout)
{
assert(bool(client));
assert(bool(client->sock));
// This call returns immediately so we no longer block the current context and
// its stack while waiting for activity on idle connections between requests.
auto &sock(*client->sock);
2017-09-30 08:04:41 +02:00
sock(timeout, [client(std::move(client)), timeout](const net::error_code &ec)
2016-11-29 16:23:38 +01:00
noexcept
{
// Right here this handler is executing on the main stack (not in any
2017-10-19 10:04:52 +02:00
// ircd::context).
2016-11-29 16:23:38 +01:00
if(!handle_ec(*client, ec))
return;
// This call returns immediately because we can never block the main stack outside
// of the ircd::context system. The context the closure ends up getting is the next
// available from the request pool, which may not be available immediately so this
// handler might be queued for some time after this call returns.
request([ec, client(std::move(client)), timeout]
2016-11-29 16:23:38 +01:00
{
// Right here this handler is executing on an ircd::context with its own
// stack dedicated to the lifetime of this request. If client::main()
// returns true, we bring the client back into async mode to wait for
// the next request.
2016-11-29 16:23:38 +01:00
if(client->main())
async_recv_next(std::move(client), timeout);
else
disconnect(*client, net::dc::SSL_NOTIFY_YIELD);
2016-11-29 16:23:38 +01:00
});
});
}
namespace ircd
{
static bool handle_ec_success(client &);
static bool handle_ec_timeout(client &);
static bool handle_ec_eof(client &);
static bool handle_ec_short_read(client &);
static bool handle_ec_default(client &, const net::error_code &);
}
bool
ircd::handle_ec(client &client,
2017-09-30 08:04:41 +02:00
const net::error_code &ec)
{
using namespace boost::system::errc;
using boost::system::get_system_category;
using boost::asio::error::get_ssl_category;
using boost::asio::error::get_misc_category;
if(ec.category() == get_system_category()) switch(ec.value())
{
case success: return handle_ec_success(client);
2016-11-29 16:23:38 +01:00
case operation_canceled: return handle_ec_timeout(client);
default: return handle_ec_default(client, ec);
}
else if(ec.category() == get_misc_category()) switch(ec.value())
{
case asio::error::eof: return handle_ec_eof(client);
default: return handle_ec_default(client, ec);
}
else if(ec.category() == get_ssl_category()) switch(ec.value())
{
case SSL_R_SHORT_READ: return handle_ec_short_read(client);
default: return handle_ec_default(client, ec);
}
else return handle_ec_default(client, ec);
}
bool
ircd::handle_ec_default(client &client,
const net::error_code &ec)
{
log::debug("client(%p): %s: %s",
&client,
ec.category().name(),
ec.message());
disconnect(client, net::dc::SSL_NOTIFY);
return false;
}
bool
ircd::handle_ec_short_read(client &client)
try
{
log::warning("client[%s]: short_read",
string(remote(client)));
disconnect(client, net::dc::RST);
return false;
}
catch(const std::exception &e)
{
log::error("client(%p): short_read: %s",
&client,
e.what());
return false;
}
bool
ircd::handle_ec_eof(client &client)
try
{
2017-10-25 18:49:16 +02:00
log::debug("client[%s]: EOF",
string(remote(client)));
disconnect(client, net::dc::RST);
return false;
}
catch(const std::exception &e)
{
log::error("client(%p): EOF: %s",
&client,
e.what());
return false;
}
2016-11-29 16:23:38 +01:00
bool
ircd::handle_ec_timeout(client &client)
try
{
2017-10-19 10:04:52 +02:00
assert(bool(client.sock));
log::warning("client[%s]: disconnecting after inactivity timeout",
string(remote(client)));
disconnect(client, net::dc::SSL_NOTIFY);
2016-11-29 16:23:38 +01:00
return false;
}
catch(const std::exception &e)
{
log::error("client(%p): timeout: %s",
&client,
e.what());
return false;
}
bool
ircd::handle_ec_success(client &client)
{
return true;
}