akkoma/lib/pleroma/gun/conn.ex

197 lines
5.1 KiB
Elixir
Raw Normal View History

2020-02-11 00:12:57 -07:00
# Pleroma: A lightweight social networking server
# Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
2020-02-11 00:12:57 -07:00
# SPDX-License-Identifier: AGPL-3.0-only
defmodule Pleroma.Gun.Conn do
@moduledoc """
Struct for gun connection data
"""
2020-03-03 09:24:14 -07:00
alias Pleroma.Gun
2020-02-24 09:56:27 -07:00
alias Pleroma.Pool.Connections
require Logger
2020-02-11 00:12:57 -07:00
@type gun_state :: :up | :down
@type conn_state :: :active | :idle
@type t :: %__MODULE__{
conn: pid(),
gun_state: gun_state(),
conn_state: conn_state(),
used_by: [pid()],
last_reference: pos_integer(),
crf: float(),
retries: pos_integer()
}
defstruct conn: nil,
gun_state: :open,
conn_state: :init,
used_by: [],
last_reference: 0,
crf: 1,
retries: 0
2020-02-24 09:56:27 -07:00
@spec open(String.t() | URI.t(), atom(), keyword()) :: :ok | nil
def open(url, name, opts \\ [])
def open(url, name, opts) when is_binary(url), do: open(URI.parse(url), name, opts)
def open(%URI{} = uri, name, opts) do
pool_opts = Pleroma.Config.get([:connections_pool], [])
opts =
opts
|> Enum.into(%{})
|> Map.put_new(:retry, pool_opts[:retry] || 1)
|> Map.put_new(:retry_timeout, pool_opts[:retry_timeout] || 1000)
2020-02-24 09:56:27 -07:00
|> Map.put_new(:await_up_timeout, pool_opts[:await_up_timeout] || 5_000)
|> maybe_add_tls_opts(uri)
2020-02-24 09:56:27 -07:00
key = "#{uri.scheme}:#{uri.host}:#{uri.port}"
conn_pid =
if Connections.count(name) < opts[:max_connection] do
do_open(uri, opts)
else
2020-03-03 06:08:21 -07:00
close_least_used_and_do_open(name, uri, opts)
2020-02-24 09:56:27 -07:00
end
if is_pid(conn_pid) do
conn = %Pleroma.Gun.Conn{
conn: conn_pid,
gun_state: :up,
conn_state: :active,
last_reference: :os.system_time(:second)
}
2020-03-03 09:24:14 -07:00
:ok = Gun.set_owner(conn_pid, Process.whereis(name))
2020-02-24 09:56:27 -07:00
Connections.add_conn(name, key, conn)
end
end
defp maybe_add_tls_opts(opts, %URI{scheme: "http"}), do: opts
defp maybe_add_tls_opts(opts, %URI{scheme: "https", host: host}) do
tls_opts = [
verify: :verify_peer,
cacertfile: CAStore.file_path(),
depth: 20,
reuse_sessions: false,
verify_fun:
{&:ssl_verify_hostname.verify_fun/3,
[check_hostname: Pleroma.HTTP.Connection.format_host(host)]}
]
tls_opts =
if Keyword.keyword?(opts[:tls_opts]) do
Keyword.merge(tls_opts, opts[:tls_opts])
else
tls_opts
end
Map.put(opts, :tls_opts, tls_opts)
end
2020-02-24 09:56:27 -07:00
defp do_open(uri, %{proxy: {proxy_host, proxy_port}} = opts) do
connect_opts =
uri
|> destination_opts()
|> add_http2_opts(uri.scheme, Map.get(opts, :tls_opts, []))
with open_opts <- Map.delete(opts, :tls_opts),
2020-03-03 09:24:14 -07:00
{:ok, conn} <- Gun.open(proxy_host, proxy_port, open_opts),
{:ok, _} <- Gun.await_up(conn, opts[:await_up_timeout]),
stream <- Gun.connect(conn, connect_opts),
{:response, :fin, 200, _} <- Gun.await(conn, stream) do
2020-02-24 09:56:27 -07:00
conn
else
error ->
Logger.warn(
2020-03-12 09:28:54 -06:00
"Opening proxied connection to #{compose_uri_log(uri)} failed with error #{
inspect(error)
}"
2020-02-24 09:56:27 -07:00
)
error
2020-02-24 09:56:27 -07:00
end
end
defp do_open(uri, %{proxy: {proxy_type, proxy_host, proxy_port}} = opts) do
version =
proxy_type
|> to_string()
|> String.last()
|> case do
"4" -> 4
_ -> 5
end
socks_opts =
uri
|> destination_opts()
|> add_http2_opts(uri.scheme, Map.get(opts, :tls_opts, []))
|> Map.put(:version, version)
opts =
opts
|> Map.put(:protocols, [:socks])
|> Map.put(:socks_opts, socks_opts)
2020-03-03 09:24:14 -07:00
with {:ok, conn} <- Gun.open(proxy_host, proxy_port, opts),
{:ok, _} <- Gun.await_up(conn, opts[:await_up_timeout]) do
2020-02-24 09:56:27 -07:00
conn
else
error ->
Logger.warn(
2020-03-12 09:28:54 -06:00
"Opening socks proxied connection to #{compose_uri_log(uri)} failed with error #{
inspect(error)
}"
2020-02-24 09:56:27 -07:00
)
error
2020-02-24 09:56:27 -07:00
end
end
defp do_open(%URI{host: host, port: port} = uri, opts) do
host = Pleroma.HTTP.Connection.parse_host(host)
2020-02-24 09:56:27 -07:00
2020-03-03 09:24:14 -07:00
with {:ok, conn} <- Gun.open(host, port, opts),
{:ok, _} <- Gun.await_up(conn, opts[:await_up_timeout]) do
2020-02-24 09:56:27 -07:00
conn
else
error ->
Logger.warn(
2020-03-12 09:28:54 -06:00
"Opening connection to #{compose_uri_log(uri)} failed with error #{inspect(error)}"
2020-02-24 09:56:27 -07:00
)
error
2020-02-24 09:56:27 -07:00
end
end
defp destination_opts(%URI{host: host, port: port}) do
host = Pleroma.HTTP.Connection.parse_host(host)
2020-02-24 09:56:27 -07:00
%{host: host, port: port}
end
defp add_http2_opts(opts, "https", tls_opts) do
Map.merge(opts, %{protocols: [:http2], transport: :tls, tls_opts: tls_opts})
end
defp add_http2_opts(opts, _, _), do: opts
2020-03-03 06:08:21 -07:00
defp close_least_used_and_do_open(name, uri, opts) do
2020-03-12 09:28:54 -06:00
with [{key, conn} | _conns] <- Connections.get_unused_conns(name),
:ok <- Gun.close(conn.conn) do
Connections.remove_conn(name, key)
2020-02-24 09:56:27 -07:00
do_open(uri, opts)
else
[] -> {:error, :pool_overflowed}
2020-02-24 09:56:27 -07:00
end
end
2020-03-12 09:28:54 -06:00
def compose_uri_log(%URI{scheme: scheme, host: host, path: path}) do
"#{scheme}://#{host}#{path}"
end
2020-02-11 00:12:57 -07:00
end