mirror of
https://github.com/caddyserver/caddy.git
synced 2024-12-16 21:56:40 -05:00
f5ccb904a3
To clarify, listening on wildcard interfaces is NOT the default and should only be done under certain circumstances and when you know what you're doing. Emits a warning in the log. Fixes https://github.com/caddyserver/caddy-docker/issues/71
434 lines
13 KiB
Go
434 lines
13 KiB
Go
// Copyright 2015 Matthew Holt and The Caddy Authors
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package caddy
|
|
|
|
import (
|
|
"fmt"
|
|
"log"
|
|
"net"
|
|
"strconv"
|
|
"strings"
|
|
"sync"
|
|
"sync/atomic"
|
|
"time"
|
|
)
|
|
|
|
// Listen returns a listener suitable for use in a Caddy module.
|
|
// Always be sure to close listeners when you are done with them.
|
|
func Listen(network, addr string) (net.Listener, error) {
|
|
lnKey := network + "/" + addr
|
|
|
|
listenersMu.Lock()
|
|
defer listenersMu.Unlock()
|
|
|
|
// if listener already exists, increment usage counter, then return listener
|
|
if lnGlobal, ok := listeners[lnKey]; ok {
|
|
atomic.AddInt32(&lnGlobal.usage, 1)
|
|
return &fakeCloseListener{
|
|
usage: &lnGlobal.usage,
|
|
deadline: &lnGlobal.deadline,
|
|
deadlineMu: &lnGlobal.deadlineMu,
|
|
key: lnKey,
|
|
Listener: lnGlobal.ln,
|
|
}, nil
|
|
}
|
|
|
|
// or, create new one and save it
|
|
ln, err := net.Listen(network, addr)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// make sure to start its usage counter at 1
|
|
lnGlobal := &globalListener{usage: 1, ln: ln}
|
|
listeners[lnKey] = lnGlobal
|
|
|
|
return &fakeCloseListener{
|
|
usage: &lnGlobal.usage,
|
|
deadline: &lnGlobal.deadline,
|
|
deadlineMu: &lnGlobal.deadlineMu,
|
|
key: lnKey,
|
|
Listener: ln,
|
|
}, nil
|
|
}
|
|
|
|
// ListenPacket returns a net.PacketConn suitable for use in a Caddy module.
|
|
// Always be sure to close the PacketConn when you are done.
|
|
func ListenPacket(network, addr string) (net.PacketConn, error) {
|
|
lnKey := network + "/" + addr
|
|
|
|
listenersMu.Lock()
|
|
defer listenersMu.Unlock()
|
|
|
|
// if listener already exists, increment usage counter, then return listener
|
|
if lnGlobal, ok := listeners[lnKey]; ok {
|
|
atomic.AddInt32(&lnGlobal.usage, 1)
|
|
log.Printf("[DEBUG] %s: Usage counter should not go above 2 or maybe 3, is now: %d", lnKey, atomic.LoadInt32(&lnGlobal.usage)) // TODO: remove
|
|
return &fakeClosePacketConn{usage: &lnGlobal.usage, key: lnKey, PacketConn: lnGlobal.pc}, nil
|
|
}
|
|
|
|
// or, create new one and save it
|
|
pc, err := net.ListenPacket(network, addr)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// make sure to start its usage counter at 1
|
|
lnGlobal := &globalListener{usage: 1, pc: pc}
|
|
listeners[lnKey] = lnGlobal
|
|
|
|
return &fakeClosePacketConn{usage: &lnGlobal.usage, key: lnKey, PacketConn: pc}, nil
|
|
}
|
|
|
|
// fakeCloseListener's Close() method is a no-op. This allows
|
|
// stopping servers that are using the listener without giving
|
|
// up the socket; thus, servers become hot-swappable while the
|
|
// listener remains running. Listeners should be re-wrapped in
|
|
// a new fakeCloseListener each time the listener is reused.
|
|
// Other than the 'closed' field (which pertains to this value
|
|
// only), the other fields in this struct should be pointers to
|
|
// the associated globalListener's struct fields (except 'key'
|
|
// which is there for read-only purposes, so it can be a copy).
|
|
type fakeCloseListener struct {
|
|
closed int32 // accessed atomically; belongs to this struct only
|
|
usage *int32 // accessed atomically; global
|
|
deadline *bool // protected by deadlineMu; global
|
|
deadlineMu *sync.Mutex // global
|
|
key string // global, but read-only, so can be copy
|
|
net.Listener // global
|
|
}
|
|
|
|
// Accept accepts connections until Close() is called.
|
|
func (fcl *fakeCloseListener) Accept() (net.Conn, error) {
|
|
// if the listener is already "closed", return error
|
|
if atomic.LoadInt32(&fcl.closed) == 1 {
|
|
return nil, fcl.fakeClosedErr()
|
|
}
|
|
|
|
// wrap underlying accept
|
|
conn, err := fcl.Listener.Accept()
|
|
if err == nil {
|
|
return conn, nil
|
|
}
|
|
|
|
// accept returned with error
|
|
// TODO: This may be better as a condition variable so the deadline is cleared only once?
|
|
fcl.deadlineMu.Lock()
|
|
if *fcl.deadline {
|
|
switch ln := fcl.Listener.(type) {
|
|
case *net.TCPListener:
|
|
ln.SetDeadline(time.Time{})
|
|
case *net.UnixListener:
|
|
ln.SetDeadline(time.Time{})
|
|
}
|
|
*fcl.deadline = false
|
|
}
|
|
fcl.deadlineMu.Unlock()
|
|
|
|
if atomic.LoadInt32(&fcl.closed) == 1 {
|
|
// if we canceled the Accept() by setting a deadline
|
|
// on the listener, we need to make sure any callers of
|
|
// Accept() think the listener was actually closed;
|
|
// if we return the timeout error instead, callers might
|
|
// simply retry, leaking goroutines for longer
|
|
if netErr, ok := err.(net.Error); ok && netErr.Timeout() {
|
|
return nil, fcl.fakeClosedErr()
|
|
}
|
|
}
|
|
|
|
return nil, err
|
|
}
|
|
|
|
// Close stops accepting new connections without
|
|
// closing the underlying listener, unless no one
|
|
// else is using it.
|
|
func (fcl *fakeCloseListener) Close() error {
|
|
if atomic.CompareAndSwapInt32(&fcl.closed, 0, 1) {
|
|
// unfortunately, there is no way to cancel any
|
|
// currently-blocking calls to Accept() that are
|
|
// awaiting connections since we're not actually
|
|
// closing the listener; so we cheat by setting
|
|
// a deadline in the past, which forces it to
|
|
// time out; note that this only works for
|
|
// certain types of listeners...
|
|
fcl.deadlineMu.Lock()
|
|
if !*fcl.deadline {
|
|
switch ln := fcl.Listener.(type) {
|
|
case *net.TCPListener:
|
|
ln.SetDeadline(time.Now().Add(-1 * time.Minute))
|
|
case *net.UnixListener:
|
|
ln.SetDeadline(time.Now().Add(-1 * time.Minute))
|
|
}
|
|
*fcl.deadline = true
|
|
}
|
|
fcl.deadlineMu.Unlock()
|
|
|
|
// since we're no longer using this listener,
|
|
// decrement the usage counter and, if no one
|
|
// else is using it, close underlying listener
|
|
if atomic.AddInt32(fcl.usage, -1) == 0 {
|
|
listenersMu.Lock()
|
|
delete(listeners, fcl.key)
|
|
listenersMu.Unlock()
|
|
err := fcl.Listener.Close()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (fcl *fakeCloseListener) fakeClosedErr() error {
|
|
return &net.OpError{
|
|
Op: "accept",
|
|
Net: fcl.Listener.Addr().Network(),
|
|
Addr: fcl.Listener.Addr(),
|
|
Err: errFakeClosed,
|
|
}
|
|
}
|
|
|
|
type fakeClosePacketConn struct {
|
|
closed int32 // accessed atomically
|
|
usage *int32 // accessed atomically
|
|
key string
|
|
net.PacketConn
|
|
}
|
|
|
|
func (fcpc *fakeClosePacketConn) Close() error {
|
|
log.Println("[DEBUG] Fake-closing underlying packet conn") // TODO: remove this
|
|
|
|
if atomic.CompareAndSwapInt32(&fcpc.closed, 0, 1) {
|
|
// since we're no longer using this listener,
|
|
// decrement the usage counter and, if no one
|
|
// else is using it, close underlying listener
|
|
if atomic.AddInt32(fcpc.usage, -1) == 0 {
|
|
listenersMu.Lock()
|
|
delete(listeners, fcpc.key)
|
|
listenersMu.Unlock()
|
|
err := fcpc.PacketConn.Close()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// ErrFakeClosed is the underlying error value returned by
|
|
// fakeCloseListener.Accept() after Close() has been called,
|
|
// indicating that it is pretending to be closed so that the
|
|
// server using it can terminate, while the underlying
|
|
// socket is actually left open.
|
|
var errFakeClosed = fmt.Errorf("listener 'closed' 😉")
|
|
|
|
// globalListener keeps global state for a listener
|
|
// that may be shared by multiple servers. In other
|
|
// words, values in this struct exist only once and
|
|
// all other uses of these values point to the ones
|
|
// in this struct. In particular, the usage count
|
|
// (how many callers are using the listener), the
|
|
// actual listener, and synchronization of the
|
|
// listener's deadline changes are singular, global
|
|
// values that must not be copied.
|
|
type globalListener struct {
|
|
usage int32 // accessed atomically
|
|
deadline bool
|
|
deadlineMu sync.Mutex
|
|
ln net.Listener
|
|
pc net.PacketConn
|
|
}
|
|
|
|
// NetworkAddress contains the individual components
|
|
// for a parsed network address of the form accepted
|
|
// by ParseNetworkAddress(). Network should be a
|
|
// network value accepted by Go's net package. Port
|
|
// ranges are given by [StartPort, EndPort].
|
|
type NetworkAddress struct {
|
|
Network string
|
|
Host string
|
|
StartPort uint
|
|
EndPort uint
|
|
}
|
|
|
|
// IsUnixNetwork returns true if na.Network is
|
|
// unix, unixgram, or unixpacket.
|
|
func (na NetworkAddress) IsUnixNetwork() bool {
|
|
return isUnixNetwork(na.Network)
|
|
}
|
|
|
|
// JoinHostPort is like net.JoinHostPort, but where the port
|
|
// is StartPort + offset.
|
|
func (na NetworkAddress) JoinHostPort(offset uint) string {
|
|
if na.IsUnixNetwork() {
|
|
return na.Host
|
|
}
|
|
return net.JoinHostPort(na.Host, strconv.Itoa(int(na.StartPort+offset)))
|
|
}
|
|
|
|
// PortRangeSize returns how many ports are in
|
|
// pa's port range. Port ranges are inclusive,
|
|
// so the size is the difference of start and
|
|
// end ports plus one.
|
|
func (na NetworkAddress) PortRangeSize() uint {
|
|
return (na.EndPort - na.StartPort) + 1
|
|
}
|
|
|
|
func (na NetworkAddress) isLoopback() bool {
|
|
if na.IsUnixNetwork() {
|
|
return true
|
|
}
|
|
if na.Host == "localhost" {
|
|
return true
|
|
}
|
|
if ip := net.ParseIP(na.Host); ip != nil {
|
|
return ip.IsLoopback()
|
|
}
|
|
return false
|
|
}
|
|
|
|
func (na NetworkAddress) isWildcardInterface() bool {
|
|
if na.Host == "" {
|
|
return true
|
|
}
|
|
if ip := net.ParseIP(na.Host); ip != nil {
|
|
return ip.IsUnspecified()
|
|
}
|
|
return false
|
|
}
|
|
|
|
func (na NetworkAddress) port() string {
|
|
if na.StartPort == na.EndPort {
|
|
return strconv.FormatUint(uint64(na.StartPort), 10)
|
|
}
|
|
return fmt.Sprintf("%d-%d", na.StartPort, na.EndPort)
|
|
}
|
|
|
|
// String reconstructs the address string to the form expected
|
|
// by ParseNetworkAddress(). If the address is a unix socket,
|
|
// any non-zero port will be dropped.
|
|
func (na NetworkAddress) String() string {
|
|
return JoinNetworkAddress(na.Network, na.Host, na.port())
|
|
}
|
|
|
|
func isUnixNetwork(netw string) bool {
|
|
return netw == "unix" || netw == "unixgram" || netw == "unixpacket"
|
|
}
|
|
|
|
// ParseNetworkAddress parses addr into its individual
|
|
// components. The input string is expected to be of
|
|
// the form "network/host:port-range" where any part is
|
|
// optional. The default network, if unspecified, is tcp.
|
|
// Port ranges are inclusive.
|
|
//
|
|
// Network addresses are distinct from URLs and do not
|
|
// use URL syntax.
|
|
func ParseNetworkAddress(addr string) (NetworkAddress, error) {
|
|
var host, port string
|
|
network, host, port, err := SplitNetworkAddress(addr)
|
|
if network == "" {
|
|
network = "tcp"
|
|
}
|
|
if err != nil {
|
|
return NetworkAddress{}, err
|
|
}
|
|
if isUnixNetwork(network) {
|
|
return NetworkAddress{
|
|
Network: network,
|
|
Host: host,
|
|
}, nil
|
|
}
|
|
ports := strings.SplitN(port, "-", 2)
|
|
if len(ports) == 1 {
|
|
ports = append(ports, ports[0])
|
|
}
|
|
var start, end uint64
|
|
start, err = strconv.ParseUint(ports[0], 10, 16)
|
|
if err != nil {
|
|
return NetworkAddress{}, fmt.Errorf("invalid start port: %v", err)
|
|
}
|
|
end, err = strconv.ParseUint(ports[1], 10, 16)
|
|
if err != nil {
|
|
return NetworkAddress{}, fmt.Errorf("invalid end port: %v", err)
|
|
}
|
|
if end < start {
|
|
return NetworkAddress{}, fmt.Errorf("end port must not be less than start port")
|
|
}
|
|
if (end - start) > maxPortSpan {
|
|
return NetworkAddress{}, fmt.Errorf("port range exceeds %d ports", maxPortSpan)
|
|
}
|
|
return NetworkAddress{
|
|
Network: network,
|
|
Host: host,
|
|
StartPort: uint(start),
|
|
EndPort: uint(end),
|
|
}, nil
|
|
}
|
|
|
|
// SplitNetworkAddress splits a into its network, host, and port components.
|
|
// Note that port may be a port range (:X-Y), or omitted for unix sockets.
|
|
func SplitNetworkAddress(a string) (network, host, port string, err error) {
|
|
if idx := strings.Index(a, "/"); idx >= 0 {
|
|
network = strings.ToLower(strings.TrimSpace(a[:idx]))
|
|
a = a[idx+1:]
|
|
}
|
|
if isUnixNetwork(network) {
|
|
host = a
|
|
return
|
|
}
|
|
host, port, err = net.SplitHostPort(a)
|
|
return
|
|
}
|
|
|
|
// JoinNetworkAddress combines network, host, and port into a single
|
|
// address string of the form accepted by ParseNetworkAddress(). For
|
|
// unix sockets, the network should be "unix" (or "unixgram" or
|
|
// "unixpacket") and the path to the socket should be given as the
|
|
// host parameter.
|
|
func JoinNetworkAddress(network, host, port string) string {
|
|
var a string
|
|
if network != "" {
|
|
a = network + "/"
|
|
}
|
|
if (host != "" && port == "") || isUnixNetwork(network) {
|
|
a += host
|
|
} else if port != "" {
|
|
a += net.JoinHostPort(host, port)
|
|
}
|
|
return a
|
|
}
|
|
|
|
// ListenerWrapper is a type that wraps a listener
|
|
// so it can modify the input listener's methods.
|
|
// Modules that implement this interface are found
|
|
// in the caddy.listeners namespace. Usually, to
|
|
// wrap a listener, you will define your own struct
|
|
// type that embeds the input listener, then
|
|
// implement your own methods that you want to wrap,
|
|
// calling the underlying listener's methods where
|
|
// appropriate.
|
|
type ListenerWrapper interface {
|
|
WrapListener(net.Listener) net.Listener
|
|
}
|
|
|
|
var (
|
|
listeners = make(map[string]*globalListener)
|
|
listenersMu sync.Mutex
|
|
)
|
|
|
|
const maxPortSpan = 65535
|