Files
golib/socket/server/tcp/model.go
Nicolas JUHEL 9ca3530b1d Package Config/component/LDAP:
- replace mutex by atomic
- fix minor bugs & optimize code

Package Size:
- add function 'mul' allowing do a multiplaction on the size value by a float64 given value (could use another size.float64)
- add function 'div' allowing do a division of the size value by a float64 given value (could use another size.float64)
- add function 'add' allowing do an addtion of the size value with a uint64 given value (could use another size.uint64)
- add function 'sub' allowing do an substraction of the size value with a uint64 given value (could use another size.uint64)

Package Encoding:
- rework completly crypt package to new package encoding
- part aes of old crypt become new subpackage encoding/aes
- part hex of old crypt (associated with aes) become new standalone subpackage encoding/hexa
- adding new subpackage mux to use multiplexer/de-multiplexer of io stream
- mux is different of multireader / multiwriter in way as io send from mux in one channel will be received only in the coresponding channel  of de-mux
- mux is encoding subpackage becauxse based on hex + cbor marshalling / unmarshalling
- all subpackage can be used directly of by io reader / writer

Package Socket/server
- rework server to use as possible direct io to con
- rework server to optimize & fix managment (context / shutdown...)
- rework server to stop connection befor stopping server
- rework server to not load incoming and send it to handler by allowing handler to manager io input/output directly
- server not more used buff internally (less memory consuption)
- adding counter of opened connection
- adding some testing who's checking server & client for each protocol

Package Socket/client
- rework client to allow connect to server before reading/writing on io stream
- rework client to allow consum direct io stream instead of reading locally / call function
- rework client to allow having less memory consumption by removing internal buffer
- rework client allowing to use root io function (bufio, io copy, ...)

Package Socket/multi
- adding new subpackage multi to simplfy using of 1 reader / x writer
- if no writer is define, using an extended io discard
- allowing asynch instancing, populate writer and calling main writer
- allowing calling writer / reader to expose the main io reader / writer

Package Socket/delim:
- adding new subpackage delim to simplify using of bufio reader with delimiter
- using 1 writer / 1 reader
- allowing root io function like readwritecloser, writeto, ...
- use local buffer to prevent race if reader and writer are not is same process

Package PProf:
- fix missing \n in message

Package HttpServer:
- fix bug with init TLS & http2

Other:
- bump dependencies
2024-03-23 15:33:24 +01:00

323 lines
5.9 KiB
Go

/*
* MIT License
*
* Copyright (c) 2022 Nicolas JUHEL
*
* Permission is hereby granted, free of charge, to any person obtaining a copy
* of this software and associated documentation files (the "Software"), to deal
* in the Software without restriction, including without limitation the rights
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
* copies of the Software, and to permit persons to whom the Software is
* furnished to do so, subject to the following conditions:
*
* The above copyright notice and this permission notice shall be included in all
* copies or substantial portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
* SOFTWARE.
*
*
*/
package tcp
import (
"context"
"crypto/tls"
"fmt"
"net"
"sync/atomic"
"time"
libtls "github.com/nabbar/golib/certificates"
libptc "github.com/nabbar/golib/network/protocol"
libsck "github.com/nabbar/golib/socket"
)
var (
closedChanStruct chan struct{}
)
func init() {
closedChanStruct = make(chan struct{})
close(closedChanStruct)
}
type srv struct {
ssl *atomic.Value // tls config
hdl *atomic.Value // handler
msg *atomic.Value // chan []byte
stp *atomic.Value // chan struct{}
rst *atomic.Value // chan struct{}
run *atomic.Bool // is Running
gon *atomic.Bool // is Running
fe *atomic.Value // function error
fi *atomic.Value // function info
fs *atomic.Value // function info server
sr *atomic.Int32 // read buffer size
ad *atomic.Value // Server address url
nc *atomic.Int64 // Counter Connection
}
func (o *srv) OpenConnections() int64 {
return o.nc.Load()
}
func (o *srv) IsRunning() bool {
return o.run.Load()
}
func (o *srv) IsGone() bool {
return o.gon.Load()
}
func (o *srv) Done() <-chan struct{} {
if o == nil {
return closedChanStruct
}
if i := o.stp.Load(); i != nil {
if c, k := i.(chan struct{}); k {
return c
}
}
return closedChanStruct
}
func (o *srv) Gone() <-chan struct{} {
if o == nil {
return closedChanStruct
}
if o.IsGone() {
return closedChanStruct
} else if i := o.rst.Load(); i != nil {
if g, k := i.(chan struct{}); k {
return g
}
}
return closedChanStruct
}
func (o *srv) Close() error {
return o.Shutdown(context.Background())
}
func (o *srv) StopGone(ctx context.Context) error {
if o == nil {
return ErrInvalidInstance
}
o.gon.Store(true)
if i := o.rst.Load(); i != nil {
if c, k := i.(chan struct{}); k && c != closedChanStruct {
close(c)
}
}
o.rst.Store(closedChanStruct)
var (
tck = time.NewTicker(5 * time.Millisecond)
cnl context.CancelFunc
)
ctx, cnl = context.WithTimeout(ctx, 10*time.Second)
defer func() {
tck.Stop()
cnl()
}()
for {
select {
case <-ctx.Done():
return ErrGoneTimeout
case <-tck.C:
if o.OpenConnections() > 0 {
continue
}
return nil
}
}
}
func (o *srv) StopListen(ctx context.Context) error {
if o == nil {
return ErrInvalidInstance
}
if i := o.stp.Load(); i != nil {
if c, k := i.(chan struct{}); k && c != closedChanStruct {
close(c)
}
}
o.stp.Store(closedChanStruct)
var (
tck = time.NewTicker(5 * time.Millisecond)
cnl context.CancelFunc
)
ctx, cnl = context.WithTimeout(ctx, 10*time.Second)
defer func() {
tck.Stop()
cnl()
}()
for {
select {
case <-ctx.Done():
return ErrShutdownTimeout
case <-tck.C:
if o.IsRunning() {
continue
}
return nil
}
}
}
func (o *srv) Shutdown(ctx context.Context) error {
if o == nil {
return ErrInvalidInstance
}
var cnl context.CancelFunc
ctx, cnl = context.WithTimeout(ctx, 25*time.Second)
defer cnl()
e := o.StopGone(ctx)
if err := o.StopListen(ctx); err != nil {
return err
} else {
return e
}
}
func (o *srv) SetTLS(enable bool, config libtls.TLSConfig) error {
if !enable {
// #nosec
o.ssl.Store(&tls.Config{})
return nil
}
if config == nil {
return fmt.Errorf("invalid tls config")
} else if l := config.GetCertificatePair(); len(l) < 1 {
return fmt.Errorf("invalid tls config, missing certificates pair")
} else if t := config.TlsConfig(""); t == nil {
return fmt.Errorf("invalid tls config")
} else {
o.ssl.Store(t)
return nil
}
}
func (o *srv) RegisterFuncError(f libsck.FuncError) {
if o == nil {
return
}
o.fe.Store(f)
}
func (o *srv) RegisterFuncInfo(f libsck.FuncInfo) {
if o == nil {
return
}
o.fi.Store(f)
}
func (o *srv) RegisterFuncInfoServer(f libsck.FuncInfoSrv) {
if o == nil {
return
}
o.fs.Store(f)
}
func (o *srv) RegisterServer(address string) error {
if len(address) < 1 {
return ErrInvalidAddress
} else if _, err := net.ResolveTCPAddr(libptc.NetworkTCP.Code(), address); err != nil {
return err
}
o.ad.Store(address)
return nil
}
func (o *srv) fctError(e error) {
if o == nil {
return
}
v := o.fe.Load()
if v != nil {
v.(libsck.FuncError)(e)
}
}
func (o *srv) fctInfo(local, remote net.Addr, state libsck.ConnState) {
if o == nil {
return
}
v := o.fi.Load()
if v != nil {
v.(libsck.FuncInfo)(local, remote, state)
}
}
func (o *srv) fctInfoSrv(msg string, args ...interface{}) {
if o == nil {
return
}
v := o.fs.Load()
if v != nil {
v.(libsck.FuncInfoSrv)(fmt.Sprintf(msg, args...))
}
}
func (o *srv) handler() libsck.Handler {
if o == nil {
return nil
}
v := o.hdl.Load()
if v != nil {
return v.(libsck.Handler)
}
return nil
}
func (o *srv) getTLS() *tls.Config {
i := o.ssl.Load()
if i == nil {
return nil
} else if t, k := i.(*tls.Config); !k {
return nil
} else if len(t.Certificates) < 1 {
return nil
} else {
return t
}
}