Files
cgrates/cores/server.go
2020-11-29 20:06:30 +01:00

573 lines
15 KiB
Go

/*
Real-time Online/Offline Charging System (OCS) for Telecom & ISP environments
Copyright (C) ITsysCOM GmbH
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>
*/
package cores
import (
"bytes"
"crypto/tls"
"crypto/x509"
"encoding/gob"
"fmt"
"io"
"io/ioutil"
"log"
"net"
"net/http"
"net/http/pprof"
"net/rpc"
"net/url"
"reflect"
"strings"
"sync"
"time"
rpc2_jsonrpc "github.com/cenkalti/rpc2/jsonrpc"
"github.com/cgrates/cgrates/analyzers"
"github.com/cgrates/cgrates/engine"
"github.com/cgrates/cgrates/utils"
"github.com/cenkalti/rpc2"
"golang.org/x/net/websocket"
)
func init() {
gob.Register(map[string]interface{}{})
gob.Register([]interface{}{})
gob.Register(time.Duration(0))
gob.Register(time.Time{})
gob.Register(url.Values{})
}
func NewServer(caps *engine.Caps) (s *Server) {
return &Server{
httpMux: http.NewServeMux(),
httpsMux: http.NewServeMux(),
stopbiRPCServer: make(chan struct{}, 1),
caps: caps,
}
}
type Server struct {
sync.RWMutex
rpcEnabled bool
httpEnabled bool
birpcSrv *rpc2.Server
stopbiRPCServer chan struct{} // used in order to fully stop the biRPC
httpsMux *http.ServeMux
httpMux *http.ServeMux
caps *engine.Caps
anz *analyzers.AnalyzerService
}
func (s *Server) SetAnalyzer(anz *analyzers.AnalyzerService) {
s.anz = anz
}
func (s *Server) RpcRegister(rcvr interface{}) {
utils.RegisterRpcParams(utils.EmptyString, rcvr)
rpc.Register(rcvr)
s.Lock()
s.rpcEnabled = true
s.Unlock()
}
func (s *Server) RpcRegisterName(name string, rcvr interface{}) {
utils.RegisterRpcParams(name, rcvr)
rpc.RegisterName(name, rcvr)
s.Lock()
s.rpcEnabled = true
s.Unlock()
}
func (s *Server) RegisterHttpFunc(pattern string, handler func(http.ResponseWriter, *http.Request)) {
if s.httpMux != nil {
s.httpMux.HandleFunc(pattern, handler)
}
if s.httpsMux != nil {
s.httpsMux.HandleFunc(pattern, handler)
}
s.Lock()
s.httpEnabled = true
s.Unlock()
}
func (s *Server) RegisterHttpHandler(pattern string, handler http.Handler) {
if s.httpMux != nil {
s.httpMux.Handle(pattern, handler)
}
if s.httpsMux != nil {
s.httpsMux.Handle(pattern, handler)
}
s.Lock()
s.httpEnabled = true
s.Unlock()
}
// Registers a new BiJsonRpc name
func (s *Server) BiRPCRegisterName(method string, handlerFunc interface{}) {
s.RLock()
isNil := s.birpcSrv == nil
s.RUnlock()
if isNil {
s.Lock()
s.birpcSrv = rpc2.NewServer()
s.Unlock()
}
s.birpcSrv.Handle(method, handlerFunc)
}
func (s *Server) BiRPCRegister(rcvr interface{}) {
s.RLock()
isNil := s.birpcSrv == nil
s.RUnlock()
if isNil {
s.Lock()
s.birpcSrv = rpc2.NewServer()
s.Unlock()
}
rcvType := reflect.TypeOf(rcvr)
for i := 0; i < rcvType.NumMethod(); i++ {
method := rcvType.Method(i)
if method.Name != "Call" {
s.birpcSrv.Handle("SMGenericV1."+method.Name, method.Func.Interface())
}
}
}
func (s *Server) ServeJSON(addr string, shdChan *utils.SyncedChan) {
s.RLock()
enabled := s.rpcEnabled
s.RUnlock()
if !enabled {
return
}
lJSON, e := net.Listen(utils.TCP, addr)
if e != nil {
log.Println("ServeJSON listen error:", e)
shdChan.CloseOnce()
return
}
utils.Logger.Info(fmt.Sprintf("Starting CGRateS JSON server at <%s>.", addr))
errCnt := 0
var lastErrorTime time.Time
for {
conn, err := lJSON.Accept()
if err != nil {
utils.Logger.Err(fmt.Sprintf("<CGRServer> JSON accept error: <%s>", err.Error()))
now := time.Now()
if now.Sub(lastErrorTime) > 5*time.Second {
errCnt = 0 // reset error count if last error was more than 5 seconds ago
}
lastErrorTime = time.Now()
errCnt++
if errCnt > 50 { // Too many errors in short interval, network buffer failure most probably
shdChan.CloseOnce()
return
}
continue
}
go rpc.ServeCodec(newCapsJSONCodec(conn, s.caps, s.anz))
}
}
func (s *Server) ServeGOB(addr string, shdChan *utils.SyncedChan) {
s.RLock()
enabled := s.rpcEnabled
s.RUnlock()
if !enabled {
return
}
lGOB, e := net.Listen(utils.TCP, addr)
if e != nil {
log.Println("ServeGOB listen error:", e)
shdChan.CloseOnce()
return
}
utils.Logger.Info(fmt.Sprintf("Starting CGRateS GOB server at <%s>.", addr))
errCnt := 0
var lastErrorTime time.Time
for {
conn, err := lGOB.Accept()
if err != nil {
utils.Logger.Err(fmt.Sprintf("<CGRServer> GOB accept error: <%s>", err.Error()))
now := time.Now()
if now.Sub(lastErrorTime) > 5*time.Second {
errCnt = 0 // reset error count if last error was more than 5 seconds ago
}
lastErrorTime = time.Now()
errCnt++
if errCnt > 50 { // Too many errors in short interval, network buffer failure most probably
shdChan.CloseOnce()
return
}
continue
}
go rpc.ServeCodec(newCapsGOBCodec(conn, s.caps, s.anz))
}
}
func (s *Server) handleRequest(w http.ResponseWriter, r *http.Request) {
defer r.Body.Close()
w.Header().Set("Content-Type", "application/json")
rmtIP, _ := utils.GetRemoteIP(r)
rmtAddr, _ := net.ResolveIPAddr(utils.EmptyString, rmtIP)
res := newRPCRequest(r.Body, rmtAddr, s.caps, s.anz).Call()
io.Copy(w, res)
}
func registerProfiler(addr string, mux *http.ServeMux) {
mux.HandleFunc(addr, pprof.Index)
mux.HandleFunc(addr+"cmdline", pprof.Cmdline)
mux.HandleFunc(addr+"profile", pprof.Profile)
mux.HandleFunc(addr+"symbol", pprof.Symbol)
mux.HandleFunc(addr+"trace", pprof.Trace)
mux.Handle(addr+"goroutine", pprof.Handler("goroutine"))
mux.Handle(addr+"heap", pprof.Handler("heap"))
mux.Handle(addr+"threadcreate", pprof.Handler("threadcreate"))
mux.Handle(addr+"block", pprof.Handler("block"))
mux.Handle(addr+"allocs", pprof.Handler("allocs"))
mux.Handle(addr+"mutex", pprof.Handler("mutex"))
}
func (s *Server) RegisterProfiler(addr string) {
if addr[len(addr)-1] != '/' {
addr = addr + "/"
}
registerProfiler(addr, s.httpMux)
registerProfiler(addr, s.httpsMux)
}
func (s *Server) ServeHTTP(addr string, jsonRPCURL string, wsRPCURL string,
useBasicAuth bool, userList map[string]string, shdChan *utils.SyncedChan) {
s.RLock()
enabled := s.rpcEnabled
s.RUnlock()
if !enabled {
return
}
if jsonRPCURL != "" {
s.Lock()
s.httpEnabled = true
s.Unlock()
utils.Logger.Info("<HTTP> enabling handler for JSON-RPC")
if useBasicAuth {
s.httpMux.HandleFunc(jsonRPCURL, use(s.handleRequest, basicAuth(userList)))
} else {
s.httpMux.HandleFunc(jsonRPCURL, s.handleRequest)
}
}
if wsRPCURL != "" {
s.Lock()
s.httpEnabled = true
s.Unlock()
utils.Logger.Info("<HTTP> enabling handler for WebSocket connections")
wsHandler := websocket.Handler(func(ws *websocket.Conn) {
rpc.ServeCodec(newCapsJSONCodec(ws, s.caps, s.anz))
})
if useBasicAuth {
s.httpMux.HandleFunc(wsRPCURL, use(wsHandler.ServeHTTP, basicAuth(userList)))
} else {
s.httpMux.Handle(wsRPCURL, wsHandler)
}
}
if !s.httpEnabled {
return
}
if useBasicAuth {
utils.Logger.Info("<HTTP> enabling basic auth")
}
utils.Logger.Info(fmt.Sprintf("<HTTP> start listening at <%s>", addr))
if err := http.ListenAndServe(addr, s.httpMux); err != nil {
log.Println(fmt.Sprintf("<HTTP>Error: %s when listening ", err))
shdChan.CloseOnce()
}
}
// ServeBiJSON create a gorutine to listen and serve as BiRPC server
func (s *Server) ServeBiJSON(addr string, onConn func(*rpc2.Client), onDis func(*rpc2.Client)) (err error) {
s.RLock()
isNil := s.birpcSrv == nil
s.RUnlock()
if isNil {
return fmt.Errorf("BiRPCServer should not be nil")
}
var lBiJSON net.Listener
lBiJSON, err = net.Listen(utils.TCP, addr)
if err != nil {
log.Println("ServeBiJSON listen error:", err)
return
}
s.birpcSrv.OnConnect(onConn)
s.birpcSrv.OnDisconnect(onDis)
utils.Logger.Info(fmt.Sprintf("Starting CGRateS BiJSON server at <%s>", addr))
go func(l net.Listener) {
for {
conn, err := l.Accept()
if err != nil {
if strings.Contains(err.Error(), "use of closed network connection") { // if closed by us do not log
return
}
s.stopbiRPCServer <- struct{}{}
log.Fatal(err)
return // stop if we get Accept error
}
go s.birpcSrv.ServeCodec(rpc2_jsonrpc.NewJSONCodec(conn))
}
}(lBiJSON)
<-s.stopbiRPCServer // wait until server is stoped to close the listener
lBiJSON.Close()
return
}
// StopBiRPC stops the go rutine create with ServeBiJSON
func (s *Server) StopBiRPC() {
s.stopbiRPCServer <- struct{}{}
}
// rpcRequest represents a RPC request.
// rpcRequest implements the io.ReadWriteCloser interface.
type rpcRequest struct {
r io.ReadCloser // holds the JSON formated RPC request
rw io.ReadWriter // holds the JSON formated RPC response
remoteAddr net.Addr
caps *engine.Caps
anzWarpper *analyzers.AnalyzerService
}
// newRPCRequest returns a new rpcRequest.
func newRPCRequest(r io.ReadCloser, remoteAddr net.Addr, caps *engine.Caps, anz *analyzers.AnalyzerService) *rpcRequest {
return &rpcRequest{
r: r,
rw: new(bytes.Buffer),
remoteAddr: remoteAddr,
caps: caps,
anzWarpper: anz,
}
}
func (r *rpcRequest) Read(p []byte) (n int, err error) {
return r.r.Read(p)
}
func (r *rpcRequest) Write(p []byte) (n int, err error) {
return r.rw.Write(p)
}
func (r *rpcRequest) LocalAddr() net.Addr {
return utils.LocalAddr()
}
func (r *rpcRequest) RemoteAddr() net.Addr {
return r.remoteAddr
}
func (r *rpcRequest) Close() error {
return r.r.Close()
}
// Call invokes the RPC request, waits for it to complete, and returns the results.
func (r *rpcRequest) Call() io.Reader {
rpc.ServeCodec(newCapsJSONCodec(r, r.caps, r.anzWarpper))
return r.rw
}
func loadTLSConfig(serverCrt, serverKey, caCert string, serverPolicy int,
serverName string) (config *tls.Config, err error) {
cert, err := tls.LoadX509KeyPair(serverCrt, serverKey)
if err != nil {
log.Fatalf("Error: %s when load server keys", err)
}
rootCAs, err := x509.SystemCertPool()
if err != nil {
log.Fatalf("Error: %s when load SystemCertPool", err)
return
}
if rootCAs == nil {
rootCAs = x509.NewCertPool()
}
if caCert != "" {
ca, err := ioutil.ReadFile(caCert)
if err != nil {
log.Fatalf("Error: %s when read CA", err)
return config, err
}
if ok := rootCAs.AppendCertsFromPEM(ca); !ok {
log.Fatalf("Cannot append certificate authority")
return config, err
}
}
config = &tls.Config{
Certificates: []tls.Certificate{cert},
ClientAuth: tls.ClientAuthType(serverPolicy),
ClientCAs: rootCAs,
}
if serverName != "" {
config.ServerName = serverName
}
return
}
func (s *Server) ServeGOBTLS(addr, serverCrt, serverKey, caCert string,
serverPolicy int, serverName string, shdChan *utils.SyncedChan) {
s.RLock()
enabled := s.rpcEnabled
s.RUnlock()
if !enabled {
return
}
config, err := loadTLSConfig(serverCrt, serverKey, caCert, serverPolicy, serverName)
if err != nil {
shdChan.CloseOnce()
return
}
listener, err := tls.Listen(utils.TCP, addr, config)
if err != nil {
log.Println(fmt.Sprintf("Error: %s when listening", err))
shdChan.CloseOnce()
return
}
utils.Logger.Info(fmt.Sprintf("Starting CGRateS GOB TLS server at <%s>.", addr))
errCnt := 0
var lastErrorTime time.Time
for {
conn, err := listener.Accept()
defer conn.Close()
if err != nil {
utils.Logger.Err(fmt.Sprintf("<CGRServer> TLS accept error: <%s>", err.Error()))
now := time.Now()
if now.Sub(lastErrorTime) > 5*time.Second {
errCnt = 0 // reset error count if last error was more than 5 seconds ago
}
lastErrorTime = time.Now()
errCnt++
if errCnt > 50 { // Too many errors in short interval, network buffer failure most probably
shdChan.CloseOnce()
return
}
continue
}
go rpc.ServeCodec(newCapsGOBCodec(conn, s.caps, s.anz))
}
}
func (s *Server) ServeJSONTLS(addr, serverCrt, serverKey, caCert string,
serverPolicy int, serverName string, shdChan *utils.SyncedChan) {
s.RLock()
enabled := s.rpcEnabled
s.RUnlock()
if !enabled {
return
}
config, err := loadTLSConfig(serverCrt, serverKey, caCert, serverPolicy, serverName)
if err != nil {
shdChan.CloseOnce()
return
}
listener, err := tls.Listen(utils.TCP, addr, config)
if err != nil {
log.Println(fmt.Sprintf("Error: %s when listening", err))
shdChan.CloseOnce()
return
}
utils.Logger.Info(fmt.Sprintf("Starting CGRateS JSON TLS server at <%s>.", addr))
errCnt := 0
var lastErrorTime time.Time
for {
conn, err := listener.Accept()
defer conn.Close()
if err != nil {
utils.Logger.Err(fmt.Sprintf("<CGRServer> TLS accept error: <%s>", err.Error()))
now := time.Now()
if now.Sub(lastErrorTime) > 5*time.Second {
errCnt = 0 // reset error count if last error was more than 5 seconds ago
}
lastErrorTime = time.Now()
errCnt++
if errCnt > 50 { // Too many errors in short interval, network buffer failure most probably
shdChan.CloseOnce()
return
}
continue
}
go rpc.ServeCodec(newCapsJSONCodec(conn, s.caps, s.anz))
}
}
func (s *Server) ServeHTTPTLS(addr, serverCrt, serverKey, caCert string, serverPolicy int,
serverName string, jsonRPCURL string, wsRPCURL string,
useBasicAuth bool, userList map[string]string, shdChan *utils.SyncedChan) {
s.RLock()
enabled := s.rpcEnabled
s.RUnlock()
if !enabled {
return
}
if jsonRPCURL != "" {
s.Lock()
s.httpEnabled = true
s.Unlock()
utils.Logger.Info("<HTTPS> enabling handler for JSON-RPC")
if useBasicAuth {
s.httpsMux.HandleFunc(jsonRPCURL, use(s.handleRequest, basicAuth(userList)))
} else {
s.httpsMux.HandleFunc(jsonRPCURL, s.handleRequest)
}
}
if wsRPCURL != "" {
s.Lock()
s.httpEnabled = true
s.Unlock()
utils.Logger.Info("<HTTPS> enabling handler for WebSocket connections")
wsHandler := websocket.Handler(func(ws *websocket.Conn) {
rpc.ServeCodec(newCapsJSONCodec(ws, s.caps, s.anz))
})
if useBasicAuth {
s.httpsMux.HandleFunc(wsRPCURL, use(wsHandler.ServeHTTP, basicAuth(userList)))
} else {
s.httpsMux.Handle(wsRPCURL, wsHandler)
}
}
if !s.httpEnabled {
return
}
if useBasicAuth {
utils.Logger.Info("<HTTPS> enabling basic auth")
}
config, err := loadTLSConfig(serverCrt, serverKey, caCert, serverPolicy, serverName)
if err != nil {
shdChan.CloseOnce()
return
}
httpSrv := http.Server{
Addr: addr,
Handler: s.httpsMux,
TLSConfig: config,
}
utils.Logger.Info(fmt.Sprintf("<HTTPS> start listening at <%s>", addr))
if err := httpSrv.ListenAndServeTLS(serverCrt, serverKey); err != nil {
log.Println(fmt.Sprintf("<HTTPS>Error: %s when listening ", err))
shdChan.CloseOnce()
}
}