tcp_server.go 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701
  1. package raft
  2. import (
  3. "bufio"
  4. "encoding/json"
  5. "fmt"
  6. "io"
  7. "net"
  8. "runtime"
  9. "strconv"
  10. "strings"
  11. "time"
  12. )
  13. // TCPClientSession holds state for a TCP connection
  14. type TCPClientSession struct {
  15. conn net.Conn
  16. server *KVServer
  17. token string
  18. username string
  19. reader *bufio.Reader
  20. writer *bufio.Writer
  21. remoteAddr string
  22. }
  23. func (s *KVServer) StartTCPServer(addr string) error {
  24. listener, err := net.Listen("tcp", addr)
  25. if err != nil {
  26. return err
  27. }
  28. s.Raft.config.Logger.Info("TCP API server listening on %s", addr)
  29. go func() {
  30. defer listener.Close()
  31. for {
  32. conn, err := listener.Accept()
  33. if err != nil {
  34. if s.stopCh != nil {
  35. select {
  36. case <-s.stopCh:
  37. return
  38. default:
  39. }
  40. }
  41. s.Raft.config.Logger.Error("TCP Accept error: %v", err)
  42. continue
  43. }
  44. go s.handleTCPConnection(conn)
  45. }
  46. }()
  47. return nil
  48. }
  49. func (s *KVServer) handleTCPConnection(conn net.Conn) {
  50. defer conn.Close()
  51. // Use larger buffers for high throughput
  52. reader := bufio.NewReaderSize(conn, 64*1024)
  53. writer := bufio.NewWriterSize(conn, 64*1024)
  54. session := &TCPClientSession{
  55. conn: conn,
  56. server: s,
  57. reader: reader,
  58. writer: writer,
  59. remoteAddr: conn.RemoteAddr().String(),
  60. }
  61. for {
  62. // Set Keep-Alive Deadline
  63. // Using a longer deadline avoids frequent syscalls if traffic is continuous
  64. conn.SetReadDeadline(time.Now().Add(60 * time.Second))
  65. // Read Request Line
  66. line, err := reader.ReadString('\n')
  67. if err != nil {
  68. return
  69. }
  70. line = strings.TrimSpace(line)
  71. if line == "" {
  72. continue
  73. }
  74. // Parse Headers
  75. var contentLength int
  76. for {
  77. hLine, err := reader.ReadString('\n')
  78. if err != nil {
  79. return
  80. }
  81. hLine = strings.TrimSpace(hLine)
  82. if hLine == "" {
  83. break
  84. }
  85. // Optimized Content-Length check
  86. // "Content-Length: 123"
  87. lowerHLine := strings.ToLower(hLine)
  88. if strings.HasPrefix(lowerHLine, "content-length:") {
  89. valStr := strings.TrimSpace(hLine[15:])
  90. if l, err := strconv.Atoi(valStr); err == nil {
  91. contentLength = l
  92. }
  93. }
  94. }
  95. // Read Body
  96. var body string
  97. if contentLength > 0 {
  98. // Optimization: Avoid allocation for small bodies if possible,
  99. // but Raft commands need to be passed as bytes/string anyway.
  100. buf := make([]byte, contentLength)
  101. if _, err := io.ReadFull(reader, buf); err != nil {
  102. return
  103. }
  104. body = string(buf)
  105. }
  106. // Implement Batching: Accumulate requests if they are ASET/SET
  107. // Ideally we need an internal buffer or channel here to queue up commands.
  108. // For zero-allocation batching in this loop structure, we can try to
  109. // eagerly read the next request if available in the buffer.
  110. // Note: Raft's Propose is thread-safe. The current serial loop is efficient for
  111. // minimizing context switches. Batching helps if we can merge multiple Proposes into one.
  112. // Since we haven't modified Raft to support ProposeBatch yet, we can't do true backend batching easily.
  113. // However, we can do "frontend batching" by checking buffer availability?
  114. // No, frontend batching requires Raft to accept a batch.
  115. // Without modifying Raft.Propose to accept []Command, "batching" here is limited.
  116. // BUT, we can at least pipeline the execution if we had concurrent workers,
  117. // but we replaced that with this serial loop for perf.
  118. // So for now, we just execute.
  119. // Execute Command Inline
  120. // s.Raft.config.Logger.Debug("TCP Request: %s", line)
  121. resp := s.executeCommandWithBody(session, line, body)
  122. // Write Response
  123. if _, err := writer.WriteString(resp + "\n"); err != nil {
  124. return
  125. }
  126. // Flush Optimization:
  127. // Only flush if there is no more data in the read buffer.
  128. // This automatically batches responses when requests are pipelined.
  129. if reader.Buffered() == 0 {
  130. if err := writer.Flush(); err != nil {
  131. return
  132. }
  133. }
  134. }
  135. }
  136. // Helper to bridge old logic
  137. func (s *KVServer) executeCommandWithBody(session *TCPClientSession, line string, body string) string {
  138. parts := strings.Fields(line)
  139. if len(parts) == 0 {
  140. return ""
  141. }
  142. cmd := strings.ToUpper(parts[0])
  143. // If body is present, it overrides the value part of the command
  144. // We handle specific commands that use body
  145. if body != "" {
  146. switch cmd {
  147. case "SET", "ASET":
  148. if len(parts) < 2 {
  149. return "ERR usage: SET <key> (value in body)"
  150. }
  151. key := parts[1]
  152. // Value is body
  153. if cmd == "SET" {
  154. if err := s.SetAuthenticated(key, body, session.token); err != nil {
  155. return fmt.Sprintf("ERR %v", err)
  156. }
  157. return "OK"
  158. } else {
  159. if err := s.SetAuthenticatedAsync(key, body, session.token); err != nil {
  160. return fmt.Sprintf("ERR %v", err)
  161. }
  162. return "OK"
  163. }
  164. }
  165. }
  166. // Fallback to legacy parsing if no body or command doesn't use body
  167. return s.executeCommand(session, line)
  168. }
  169. func (s *KVServer) executeCommand(session *TCPClientSession, line string) string {
  170. parts := strings.Fields(line)
  171. if len(parts) == 0 {
  172. return ""
  173. }
  174. cmd := strings.ToUpper(parts[0])
  175. var resp string
  176. switch cmd {
  177. case "LOGIN":
  178. if len(parts) < 3 {
  179. resp = "ERR usage: LOGIN <username> <password> [otp]"
  180. } else {
  181. user := parts[1]
  182. pass := parts[2]
  183. otp := ""
  184. if len(parts) > 3 {
  185. otp = parts[3]
  186. }
  187. // Extract IP
  188. ip := session.remoteAddr
  189. if host, _, err := net.SplitHostPort(ip); err == nil {
  190. ip = host
  191. }
  192. token, err := s.AuthManager.Login(user, pass, otp, ip)
  193. if err != nil {
  194. resp = fmt.Sprintf("ERR %v", err)
  195. } else {
  196. session.token = token
  197. session.username = user
  198. resp = fmt.Sprintf("OK %s", token)
  199. }
  200. }
  201. case "AUTH":
  202. if len(parts) < 2 {
  203. resp = "ERR usage: AUTH <token>"
  204. } else {
  205. token := parts[1]
  206. // Verify token
  207. sess, err := s.AuthManager.GetSession(token)
  208. if err != nil {
  209. resp = fmt.Sprintf("ERR %v", err)
  210. } else {
  211. session.token = token
  212. session.username = sess.Username
  213. resp = "OK"
  214. }
  215. }
  216. case "LOGOUT":
  217. if session.token != "" {
  218. s.AuthManager.Logout(session.token)
  219. session.token = ""
  220. session.username = ""
  221. }
  222. resp = "OK"
  223. case "GET":
  224. if len(parts) < 2 {
  225. resp = "ERR usage: GET <key>"
  226. } else {
  227. key := parts[1]
  228. val, found, err := s.GetLinearAuthenticated(key, session.token)
  229. if err != nil {
  230. resp = fmt.Sprintf("ERR %v", err)
  231. } else if !found {
  232. resp = "ERR not found"
  233. } else {
  234. resp = fmt.Sprintf("OK %s", val)
  235. }
  236. }
  237. case "SET":
  238. if len(parts) < 3 {
  239. resp = "ERR usage: SET <key> <value>"
  240. } else {
  241. key := parts[1]
  242. // Value might contain spaces, join the rest
  243. val := strings.Join(parts[2:], " ")
  244. // Use SetAuthenticated (Sync) by default for safety
  245. err := s.SetAuthenticated(key, val, session.token)
  246. if err != nil {
  247. resp = fmt.Sprintf("ERR %v", err)
  248. } else {
  249. resp = "OK"
  250. }
  251. }
  252. case "ASET":
  253. // Async SET for high performance
  254. if len(parts) < 3 {
  255. resp = "ERR usage: ASET <key> <value>"
  256. } else {
  257. key := parts[1]
  258. val := strings.Join(parts[2:], " ")
  259. err := s.SetAuthenticatedAsync(key, val, session.token)
  260. if err != nil {
  261. resp = fmt.Sprintf("ERR %v", err)
  262. } else {
  263. resp = "OK"
  264. }
  265. }
  266. case "DEL":
  267. if len(parts) < 2 {
  268. resp = "ERR usage: DEL <key>"
  269. } else {
  270. key := parts[1]
  271. err := s.DelAuthenticated(key, session.token)
  272. if err != nil {
  273. resp = fmt.Sprintf("ERR %v", err)
  274. } else {
  275. resp = "OK"
  276. }
  277. }
  278. case "WHOAMI":
  279. if session.username == "" {
  280. resp = "Guest"
  281. } else {
  282. resp = session.username
  283. }
  284. case "HELP":
  285. helpText := `Available Commands:
  286. GET <key> - Get value
  287. SET <key> <value> - Set value
  288. DEL <key> - Delete value
  289. SEARCH <pattern> [limit] - Search keys (e.g. user.*)
  290. COUNT <pattern> - Count keys
  291. INFO - Show system stats
  292. WHOAMI - Show current user
  293. JOIN <id> <addr> - Add node (Root only)
  294. LEAVE <id> - Remove node (Root only)
  295. USER_LIST - List users (Admin)
  296. ROLE_LIST - List roles (Admin)
  297. LOGIN/LOGOUT/EXIT`
  298. resp = "OK " + helpText
  299. case "INFO":
  300. // Check permission (Admin only if auth enabled)
  301. if s.AuthManager.IsEnabled() {
  302. // Allow if admin OR if root (HasFullAccess)
  303. // But IsAdmin is basically check for "admin" on "*"
  304. // Let's relax it slightly for dashboard if we want read-only dashboard?
  305. // For now, strict: Admin access required.
  306. if !s.IsAdmin(session.token) {
  307. resp = "ERR Permission Denied: Admin access required"
  308. break
  309. }
  310. }
  311. // Gather stats
  312. stats := s.GetStats()
  313. health := s.HealthCheck()
  314. dbSize := s.GetDBSize()
  315. logSize := s.GetLogSize()
  316. var m runtime.MemStats
  317. runtime.ReadMemStats(&m)
  318. // Construct JSON response
  319. info := map[string]interface{}{
  320. "node": map[string]interface{}{
  321. "id": health.NodeID,
  322. "state": health.State,
  323. "term": health.Term,
  324. "leader": health.LeaderID,
  325. "healthy": health.IsHealthy,
  326. },
  327. "storage": map[string]interface{}{
  328. "db_size": dbSize,
  329. "log_size": logSize,
  330. "mem_alloc": m.Alloc,
  331. "mem_sys": m.Sys,
  332. "num_gc": m.NumGC,
  333. },
  334. "indices": map[string]interface{}{
  335. "commit_index": stats.CommitIndex,
  336. "applied_index": stats.LastApplied,
  337. "last_log_index": stats.LastLogIndex,
  338. "db_applied": s.DB.GetLastAppliedIndex(),
  339. },
  340. "cluster": stats.ClusterNodes,
  341. "cluster_size": stats.ClusterSize,
  342. }
  343. data, err := json.Marshal(info)
  344. if err != nil {
  345. resp = fmt.Sprintf("ERR %v", err)
  346. } else {
  347. resp = "OK " + string(data)
  348. }
  349. case "SEARCH":
  350. // Usage: SEARCH <pattern> [limit] [offset]
  351. if len(parts) < 2 {
  352. resp = "ERR usage: SEARCH <pattern> [limit] [offset]"
  353. } else {
  354. pattern := parts[1]
  355. limit := 20
  356. offset := 0
  357. if len(parts) >= 3 {
  358. if l, err := strconv.Atoi(parts[2]); err == nil {
  359. limit = l
  360. }
  361. }
  362. if len(parts) >= 4 {
  363. if o, err := strconv.Atoi(parts[3]); err == nil {
  364. offset = o
  365. }
  366. }
  367. results, err := s.SearchAuthenticated(pattern, limit, offset, session.token)
  368. if err != nil {
  369. resp = fmt.Sprintf("ERR %v", err)
  370. } else {
  371. data, _ := json.Marshal(results)
  372. resp = "OK " + string(data)
  373. }
  374. }
  375. case "COUNT":
  376. // Usage: COUNT <pattern>
  377. if len(parts) < 2 {
  378. resp = "ERR usage: COUNT <pattern>"
  379. } else {
  380. pattern := parts[1]
  381. count, err := s.CountAuthenticated(pattern, session.token)
  382. if err != nil {
  383. resp = fmt.Sprintf("ERR %v", err)
  384. } else {
  385. resp = fmt.Sprintf("OK %d", count)
  386. }
  387. }
  388. case "JOIN":
  389. // Usage: JOIN <id> <addr>
  390. // Admin only
  391. if s.AuthManager.IsEnabled() {
  392. if !s.IsAdmin(session.token) {
  393. resp = "ERR Permission Denied: Admin access required"
  394. break
  395. }
  396. }
  397. if len(parts) < 3 {
  398. resp = "ERR usage: JOIN <id> <addr>"
  399. } else {
  400. err := s.Join(parts[1], parts[2])
  401. if err != nil {
  402. resp = fmt.Sprintf("ERR %v", err)
  403. } else {
  404. resp = "OK Join request sent"
  405. }
  406. }
  407. case "LEAVE":
  408. // Usage: LEAVE <id>
  409. // Admin only
  410. if s.AuthManager.IsEnabled() {
  411. if !s.IsAdmin(session.token) {
  412. resp = "ERR Permission Denied: Admin access required"
  413. break
  414. }
  415. }
  416. if len(parts) < 2 {
  417. resp = "ERR usage: LEAVE <id>"
  418. } else {
  419. err := s.Leave(parts[1])
  420. if err != nil {
  421. resp = fmt.Sprintf("ERR %v", err)
  422. } else {
  423. resp = "OK Leave request sent"
  424. }
  425. }
  426. // --- Admin Commands ---
  427. case "USER_LIST":
  428. users, err := s.ListUsers(session.token)
  429. if err != nil {
  430. resp = fmt.Sprintf("ERR %v", err)
  431. } else {
  432. data, err := json.Marshal(users)
  433. if err != nil {
  434. resp = fmt.Sprintf("ERR %v", err)
  435. } else {
  436. // Ensure it's a single line for TCP protocol simplicity
  437. jsonStr := string(data)
  438. resp = fmt.Sprintf("OK %s", jsonStr)
  439. }
  440. }
  441. case "ROLE_LIST":
  442. roles, err := s.ListRoles(session.token)
  443. if err != nil {
  444. resp = fmt.Sprintf("ERR %v", err)
  445. } else {
  446. data, err := json.Marshal(roles)
  447. if err != nil {
  448. resp = fmt.Sprintf("ERR %v", err)
  449. } else {
  450. resp = fmt.Sprintf("OK %s", string(data))
  451. }
  452. }
  453. case "USER_CREATE":
  454. // Usage: USER_CREATE <username> <password> <role1,role2>
  455. if len(parts) < 3 {
  456. resp = "ERR usage: USER_CREATE <user> <pass> [roles]"
  457. } else {
  458. u := parts[1]
  459. p := parts[2]
  460. var roles []string
  461. if len(parts) > 3 {
  462. roles = strings.Split(parts[3], ",")
  463. }
  464. // Use Server method which performs permission check
  465. err := s.CreateUser(u, p, roles, session.token)
  466. if err != nil {
  467. resp = fmt.Sprintf("ERR %v", err)
  468. } else {
  469. resp = "OK"
  470. }
  471. }
  472. case "ROLE_CREATE":
  473. // Usage: ROLE_CREATE <name>
  474. if len(parts) < 2 {
  475. resp = "ERR usage: ROLE_CREATE <name>"
  476. } else {
  477. name := parts[1]
  478. // Use Server method which performs permission check
  479. err := s.CreateRole(name, session.token)
  480. if err != nil {
  481. resp = fmt.Sprintf("ERR %v", err)
  482. } else {
  483. resp = "OK"
  484. }
  485. }
  486. case "ROLE_PERMISSION_ADD":
  487. // Usage: ROLE_PERMISSION_ADD <role> <pattern> <actions> [min] [max]
  488. // Actions: comma separated list of actions (read,write,admin,*)
  489. // Min/Max: optional numeric constraints for write operations ("-" for no constraint)
  490. if len(parts) < 4 {
  491. resp = "ERR usage: ROLE_PERMISSION_ADD <role> <pattern> <actions> [min] [max]"
  492. } else {
  493. roleName := parts[1]
  494. pattern := parts[2]
  495. actionsStr := parts[3]
  496. actions := strings.Split(actionsStr, ",")
  497. var minVal, maxVal *float64
  498. if len(parts) > 4 {
  499. if parts[4] != "-" && parts[4] != "null" {
  500. if v, err := strconv.ParseFloat(parts[4], 64); err == nil {
  501. minVal = &v
  502. } else {
  503. resp = "ERR invalid min value"
  504. break
  505. }
  506. }
  507. }
  508. if len(parts) > 5 {
  509. if parts[5] != "-" && parts[5] != "null" {
  510. if v, err := strconv.ParseFloat(parts[5], 64); err == nil {
  511. maxVal = &v
  512. } else {
  513. resp = "ERR invalid max value"
  514. break
  515. }
  516. }
  517. }
  518. // Check auth logic inside UpdateRole call?
  519. // No, UpdateRole in server.go handles Auth check now.
  520. // We just need to construct the object.
  521. rolePtr, err := s.AuthManager.GetRole(roleName)
  522. if err != nil {
  523. resp = fmt.Sprintf("ERR %v", err)
  524. } else {
  525. // Create a copy to modify
  526. role := *rolePtr
  527. // Deep copy permissions
  528. originalPerms := role.Permissions
  529. role.Permissions = make([]Permission, len(originalPerms))
  530. copy(role.Permissions, originalPerms)
  531. newPerm := Permission{
  532. KeyPattern: pattern,
  533. Actions: actions,
  534. }
  535. if minVal != nil || maxVal != nil {
  536. newPerm.Constraint = &Constraint{
  537. Min: minVal,
  538. Max: maxVal,
  539. }
  540. }
  541. // Upsert logic
  542. found := false
  543. for i, p := range role.Permissions {
  544. if p.KeyPattern == pattern {
  545. role.Permissions[i] = newPerm
  546. found = true
  547. break
  548. }
  549. }
  550. if !found {
  551. role.Permissions = append(role.Permissions, newPerm)
  552. }
  553. // Use server.UpdateRole which performs Delegation Check
  554. err := s.UpdateRole(role, session.token)
  555. if err != nil {
  556. resp = fmt.Sprintf("ERR %v", err)
  557. } else {
  558. resp = "OK"
  559. }
  560. }
  561. }
  562. case "ROLE_PERMISSION_REMOVE":
  563. // Usage: ROLE_PERMISSION_REMOVE <role> <pattern>
  564. if len(parts) < 3 {
  565. resp = "ERR usage: ROLE_PERMISSION_REMOVE <role> <pattern>"
  566. } else {
  567. roleName := parts[1]
  568. pattern := parts[2]
  569. rolePtr, err := s.AuthManager.GetRole(roleName)
  570. if err != nil {
  571. resp = fmt.Sprintf("ERR %v", err)
  572. } else {
  573. role := *rolePtr
  574. originalPerms := role.Permissions
  575. newPerms := make([]Permission, 0, len(originalPerms))
  576. found := false
  577. for _, p := range originalPerms {
  578. if p.KeyPattern == pattern {
  579. found = true
  580. continue
  581. }
  582. newPerms = append(newPerms, p)
  583. }
  584. if !found {
  585. resp = "ERR permission not found"
  586. } else {
  587. role.Permissions = newPerms
  588. // Use server.UpdateRole which performs Delegation Check
  589. err := s.UpdateRole(role, session.token)
  590. if err != nil {
  591. resp = fmt.Sprintf("ERR %v", err)
  592. } else {
  593. resp = "OK"
  594. }
  595. }
  596. }
  597. }
  598. case "USER_UNLOCK":
  599. // Usage: USER_UNLOCK <username>
  600. if s.AuthManager.IsEnabled() {
  601. if !s.IsAdmin(session.token) {
  602. resp = "ERR Permission Denied: Admin access required"
  603. break
  604. }
  605. }
  606. if len(parts) < 2 {
  607. resp = "ERR usage: USER_UNLOCK <username>"
  608. } else {
  609. // Manually clear the lock key
  610. userToUnlock := parts[1]
  611. // We use DelSync to ensure the lock is removed before returning
  612. err := s.DelSync("system.lock." + userToUnlock)
  613. if err != nil {
  614. resp = fmt.Sprintf("ERR %v", err)
  615. } else {
  616. resp = "OK"
  617. }
  618. }
  619. case "EXIT", "QUIT":
  620. resp = "BYE"
  621. // Need signal to close connection after write
  622. // For simplicity, handle it in handleTCPConnection loop break,
  623. // but here we just return the string.
  624. // Actually, BYE handling is tricky in async writer.
  625. // Let's keep connection open or let client close it.
  626. // Or send special signal?
  627. // For now, simple return. Client will read BYE and close.
  628. default:
  629. s.Raft.config.Logger.Warn("Unknown command received: %s (parts: %v)", cmd, parts)
  630. resp = fmt.Sprintf("ERR unknown command: %s", cmd)
  631. }
  632. return resp
  633. }