Платформа ЦРНП "Мирокод" для разработки проектов
https://git.mirocod.ru
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
263 lines
7.1 KiB
263 lines
7.1 KiB
// Copyright 2020 The Gitea Authors. All rights reserved. |
|
// Use of this source code is governed by a MIT-style |
|
// license that can be found in the LICENSE file. |
|
|
|
package nosql |
|
|
|
import ( |
|
"crypto/tls" |
|
"net/url" |
|
"path" |
|
"runtime/pprof" |
|
"strconv" |
|
"strings" |
|
|
|
"code.gitea.io/gitea/modules/log" |
|
|
|
"github.com/go-redis/redis/v8" |
|
) |
|
|
|
var replacer = strings.NewReplacer("_", "", "-", "") |
|
|
|
// CloseRedisClient closes a redis client |
|
func (m *Manager) CloseRedisClient(connection string) error { |
|
m.mutex.Lock() |
|
defer m.mutex.Unlock() |
|
client, ok := m.RedisConnections[connection] |
|
if !ok { |
|
connection = ToRedisURI(connection).String() |
|
client, ok = m.RedisConnections[connection] |
|
} |
|
if !ok { |
|
return nil |
|
} |
|
|
|
client.count-- |
|
if client.count > 0 { |
|
return nil |
|
} |
|
|
|
for _, name := range client.name { |
|
delete(m.RedisConnections, name) |
|
} |
|
return client.UniversalClient.Close() |
|
} |
|
|
|
// GetRedisClient gets a redis client for a particular connection |
|
func (m *Manager) GetRedisClient(connection string) (client redis.UniversalClient) { |
|
// Because we want associate any goroutines created by this call to the main nosqldb context we need to |
|
// wrap this in a goroutine labelled with the nosqldb context |
|
done := make(chan struct{}) |
|
var recovered interface{} |
|
go func() { |
|
defer func() { |
|
recovered = recover() |
|
if recovered != nil { |
|
log.Critical("PANIC during GetRedisClient: %v\nStacktrace: %s", recovered, log.Stack(2)) |
|
} |
|
close(done) |
|
}() |
|
pprof.SetGoroutineLabels(m.ctx) |
|
|
|
client = m.getRedisClient(connection) |
|
}() |
|
<-done |
|
if recovered != nil { |
|
panic(recovered) |
|
} |
|
return |
|
} |
|
|
|
func (m *Manager) getRedisClient(connection string) redis.UniversalClient { |
|
m.mutex.Lock() |
|
defer m.mutex.Unlock() |
|
client, ok := m.RedisConnections[connection] |
|
if ok { |
|
client.count++ |
|
return client |
|
} |
|
|
|
uri := ToRedisURI(connection) |
|
client, ok = m.RedisConnections[uri.String()] |
|
if ok { |
|
client.count++ |
|
return client |
|
} |
|
client = &redisClientHolder{ |
|
name: []string{connection, uri.String()}, |
|
} |
|
|
|
opts := getRedisOptions(uri) |
|
tlsConfig := getRedisTLSOptions(uri) |
|
|
|
clientName := uri.Query().Get("clientname") |
|
|
|
if len(clientName) > 0 { |
|
client.name = append(client.name, clientName) |
|
} |
|
|
|
switch uri.Scheme { |
|
case "redis+sentinels": |
|
fallthrough |
|
case "rediss+sentinel": |
|
opts.TLSConfig = tlsConfig |
|
fallthrough |
|
case "redis+sentinel": |
|
client.UniversalClient = redis.NewFailoverClient(opts.Failover()) |
|
case "redis+clusters": |
|
fallthrough |
|
case "rediss+cluster": |
|
opts.TLSConfig = tlsConfig |
|
fallthrough |
|
case "redis+cluster": |
|
client.UniversalClient = redis.NewClusterClient(opts.Cluster()) |
|
case "redis+socket": |
|
simpleOpts := opts.Simple() |
|
simpleOpts.Network = "unix" |
|
simpleOpts.Addr = path.Join(uri.Host, uri.Path) |
|
client.UniversalClient = redis.NewClient(simpleOpts) |
|
case "rediss": |
|
opts.TLSConfig = tlsConfig |
|
fallthrough |
|
case "redis": |
|
client.UniversalClient = redis.NewClient(opts.Simple()) |
|
default: |
|
return nil |
|
} |
|
|
|
for _, name := range client.name { |
|
m.RedisConnections[name] = client |
|
} |
|
|
|
client.count++ |
|
|
|
return client |
|
} |
|
|
|
// getRedisOptions pulls various configuration options based on the RedisUri format and converts them to go-redis's |
|
// UniversalOptions fields. This function explicitly excludes fields related to TLS configuration, which is |
|
// conditionally attached to this options struct before being converted to the specific type for the redis scheme being |
|
// used, and only in scenarios where TLS is applicable (e.g. rediss://, redis+clusters://). |
|
func getRedisOptions(uri *url.URL) *redis.UniversalOptions { |
|
opts := &redis.UniversalOptions{} |
|
|
|
// Handle username/password |
|
if password, ok := uri.User.Password(); ok { |
|
opts.Password = password |
|
// Username does not appear to be handled by redis.Options |
|
opts.Username = uri.User.Username() |
|
} else if uri.User.Username() != "" { |
|
// assume this is the password |
|
opts.Password = uri.User.Username() |
|
} |
|
|
|
// Now handle the uri query sets |
|
for k, v := range uri.Query() { |
|
switch replacer.Replace(strings.ToLower(k)) { |
|
case "addr": |
|
opts.Addrs = append(opts.Addrs, v...) |
|
case "addrs": |
|
opts.Addrs = append(opts.Addrs, strings.Split(v[0], ",")...) |
|
case "username": |
|
opts.Username = v[0] |
|
case "password": |
|
opts.Password = v[0] |
|
case "database": |
|
fallthrough |
|
case "db": |
|
opts.DB, _ = strconv.Atoi(v[0]) |
|
case "maxretries": |
|
opts.MaxRetries, _ = strconv.Atoi(v[0]) |
|
case "minretrybackoff": |
|
opts.MinRetryBackoff = valToTimeDuration(v) |
|
case "maxretrybackoff": |
|
opts.MaxRetryBackoff = valToTimeDuration(v) |
|
case "timeout": |
|
timeout := valToTimeDuration(v) |
|
if timeout != 0 { |
|
if opts.DialTimeout == 0 { |
|
opts.DialTimeout = timeout |
|
} |
|
if opts.ReadTimeout == 0 { |
|
opts.ReadTimeout = timeout |
|
} |
|
} |
|
case "dialtimeout": |
|
opts.DialTimeout = valToTimeDuration(v) |
|
case "readtimeout": |
|
opts.ReadTimeout = valToTimeDuration(v) |
|
case "writetimeout": |
|
opts.WriteTimeout = valToTimeDuration(v) |
|
case "poolsize": |
|
opts.PoolSize, _ = strconv.Atoi(v[0]) |
|
case "minidleconns": |
|
opts.MinIdleConns, _ = strconv.Atoi(v[0]) |
|
case "pooltimeout": |
|
opts.PoolTimeout = valToTimeDuration(v) |
|
case "idletimeout": |
|
opts.IdleTimeout = valToTimeDuration(v) |
|
case "idlecheckfrequency": |
|
opts.IdleCheckFrequency = valToTimeDuration(v) |
|
case "maxredirects": |
|
opts.MaxRedirects, _ = strconv.Atoi(v[0]) |
|
case "readonly": |
|
opts.ReadOnly, _ = strconv.ParseBool(v[0]) |
|
case "routebylatency": |
|
opts.RouteByLatency, _ = strconv.ParseBool(v[0]) |
|
case "routerandomly": |
|
opts.RouteRandomly, _ = strconv.ParseBool(v[0]) |
|
case "sentinelmasterid": |
|
fallthrough |
|
case "mastername": |
|
opts.MasterName = v[0] |
|
case "sentinelusername": |
|
opts.SentinelUsername = v[0] |
|
case "sentinelpassword": |
|
opts.SentinelPassword = v[0] |
|
} |
|
} |
|
|
|
if uri.Host != "" { |
|
opts.Addrs = append(opts.Addrs, strings.Split(uri.Host, ",")...) |
|
} |
|
|
|
// A redis connection string uses the path section of the URI in two different ways. In a TCP-based connection, the |
|
// path will be a database index to automatically have the client SELECT. In a Unix socket connection, it will be the |
|
// file path. We only want to try to coerce this to the database index when we're not expecting a file path so that |
|
// the error log stays clean. |
|
if uri.Path != "" && uri.Scheme != "redis+socket" { |
|
if db, err := strconv.Atoi(uri.Path[1:]); err == nil { |
|
opts.DB = db |
|
} else { |
|
log.Error("Provided database identifier '%s' is not a valid integer. Gitea will ignore this option.", uri.Path) |
|
} |
|
} |
|
|
|
return opts |
|
} |
|
|
|
// getRedisTlsOptions parses RedisUri TLS configuration parameters and converts them to the go TLS configuration |
|
// equivalent fields. |
|
func getRedisTLSOptions(uri *url.URL) *tls.Config { |
|
tlsConfig := &tls.Config{} |
|
|
|
skipverify := uri.Query().Get("skipverify") |
|
|
|
if len(skipverify) > 0 { |
|
skipverify, err := strconv.ParseBool(skipverify) |
|
if err != nil { |
|
tlsConfig.InsecureSkipVerify = skipverify |
|
} |
|
} |
|
|
|
insecureskipverify := uri.Query().Get("insecureskipverify") |
|
|
|
if len(insecureskipverify) > 0 { |
|
insecureskipverify, err := strconv.ParseBool(insecureskipverify) |
|
if err != nil { |
|
tlsConfig.InsecureSkipVerify = insecureskipverify |
|
} |
|
} |
|
|
|
return tlsConfig |
|
}
|
|
|