akkoma/lib/pleroma/http/adapter/gun.ex

155 lines
4 KiB
Elixir
Raw Normal View History

2020-02-11 07:12:57 +00:00
# Pleroma: A lightweight social networking server
# Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
2020-02-11 07:12:57 +00:00
# SPDX-License-Identifier: AGPL-3.0-only
defmodule Pleroma.HTTP.Adapter.Gun do
@behaviour Pleroma.HTTP.Adapter
alias Pleroma.HTTP.Adapter
require Logger
alias Pleroma.Pool.Connections
@defaults [
2020-02-24 16:56:27 +00:00
connect_timeout: 5_000,
2020-02-11 07:12:57 +00:00
domain_lookup_timeout: 5_000,
tls_handshake_timeout: 5_000,
retry: 0,
2020-02-11 07:12:57 +00:00
await_up_timeout: 5_000
]
@spec options(keyword(), URI.t()) :: keyword()
def options(connection_opts \\ [], %URI{} = uri) do
proxy = Pleroma.Config.get([:http, :proxy_url], nil)
@defaults
|> Keyword.merge(Pleroma.Config.get([:http, :adapter], []))
|> add_original(uri)
|> add_scheme_opts(uri)
|> Adapter.maybe_add_proxy(Adapter.format_proxy(proxy))
|> maybe_get_conn(uri, connection_opts)
end
@spec after_request(keyword()) :: :ok
def after_request(opts) do
with conn when not is_nil(conn) <- opts[:conn],
body_as when body_as != :chunks <- opts[:body_as] do
Connections.checkout(conn, self(), :gun_connections)
end
:ok
end
defp add_original(opts, %URI{host: host, port: port}) do
formatted_host = format_host(host)
2020-02-11 07:12:57 +00:00
Keyword.put(opts, :original, "#{formatted_host}:#{port}")
end
defp add_scheme_opts(opts, %URI{scheme: "http"}), do: opts
defp add_scheme_opts(opts, %URI{scheme: "https", host: host, port: port}) do
adapter_opts = [
certificates_verification: true,
tls_opts: [
verify: :verify_peer,
cacertfile: CAStore.file_path(),
depth: 20,
reuse_sessions: false,
verify_fun: {&:ssl_verify_hostname.verify_fun/3, [check_hostname: format_host(host)]},
2020-02-21 11:28:16 +00:00
log_level: :warning
2020-02-11 07:12:57 +00:00
]
]
adapter_opts =
if port != 443 do
Keyword.put(adapter_opts, :transport, :tls)
else
adapter_opts
end
Keyword.merge(opts, adapter_opts)
end
defp maybe_get_conn(adapter_opts, uri, connection_opts) do
{receive_conn?, opts} =
adapter_opts
|> Keyword.merge(connection_opts)
|> Keyword.pop(:receive_conn, true)
if Connections.alive?(:gun_connections) and receive_conn? do
try_to_get_conn(uri, opts)
else
opts
end
end
defp try_to_get_conn(uri, opts) do
try do
case Connections.checkin(uri, :gun_connections) do
nil ->
Logger.debug(
2020-02-18 15:18:09 +00:00
"Gun connections pool checkin was not successful. Trying to open conn for next request."
2020-02-11 07:12:57 +00:00
)
2020-02-24 16:56:27 +00:00
Task.start(fn -> Pleroma.Gun.Conn.open(uri, :gun_connections, opts) end)
2020-02-11 07:12:57 +00:00
opts
conn when is_pid(conn) ->
2020-02-24 16:56:27 +00:00
Logger.debug("received conn #{inspect(conn)} #{Connections.compose_uri_log(uri)}")
2020-02-11 07:12:57 +00:00
opts
|> Keyword.put(:conn, conn)
|> Keyword.put(:close_conn, false)
end
rescue
error ->
Logger.warn(
2020-02-24 16:56:27 +00:00
"Gun connections pool checkin caused error #{Connections.compose_uri_log(uri)} #{
inspect(error)
}"
)
2020-02-11 07:12:57 +00:00
opts
catch
2020-02-24 16:56:27 +00:00
# TODO: here must be no timeouts
:exit, {:timeout, {_, operation, [_, {method, _}, _]}} ->
2020-02-21 13:56:55 +00:00
{:message_queue_len, messages_len} =
:gun_connections
|> Process.whereis()
|> Process.info(:message_queue_len)
Logger.warn(
"Gun connections pool checkin with timeout error for #{operation} #{method} #{
2020-02-24 16:56:27 +00:00
Connections.compose_uri_log(uri)
}. Messages length: #{messages_len}"
2020-02-11 07:12:57 +00:00
)
opts
:exit, error ->
Logger.warn(
2020-02-24 16:56:27 +00:00
"Gun pool checkin exited with error #{Connections.compose_uri_log(uri)} #{
inspect(error)
}"
)
2020-02-11 07:12:57 +00:00
opts
end
end
@spec format_host(String.t()) :: charlist()
def format_host(host) do
host_charlist = to_charlist(host)
case :inet.parse_address(host_charlist) do
{:error, :einval} ->
:idna.encode(host_charlist)
{:ok, _ip} ->
host_charlist
end
end
2020-02-11 07:12:57 +00:00
end