mirror of
https://github.com/YGGverse/aquatic.git
synced 2026-03-31 17:55:36 +00:00
179 lines
5.5 KiB
Rust
179 lines
5.5 KiB
Rust
use anyhow::Context;
|
|
use aquatic_common::{
|
|
access_list::update_access_list,
|
|
cpu_pinning::{
|
|
glommio::{get_worker_placement, set_affinity_for_util_worker},
|
|
WorkerIndex,
|
|
},
|
|
privileges::PrivilegeDropper,
|
|
rustls_config::create_rustls_config,
|
|
PanicSentinelWatcher, ServerStartInstant,
|
|
};
|
|
use arc_swap::ArcSwap;
|
|
use common::State;
|
|
use glommio::{channels::channel_mesh::MeshBuilder, prelude::*};
|
|
use signal_hook::{
|
|
consts::{SIGTERM, SIGUSR1},
|
|
iterator::Signals,
|
|
};
|
|
use std::sync::Arc;
|
|
|
|
use crate::config::Config;
|
|
|
|
mod common;
|
|
pub mod config;
|
|
mod workers;
|
|
|
|
pub const APP_NAME: &str = "aquatic_http: HTTP BitTorrent tracker";
|
|
pub const APP_VERSION: &str = env!("CARGO_PKG_VERSION");
|
|
|
|
const SHARED_CHANNEL_SIZE: usize = 1024;
|
|
|
|
pub fn run(config: Config) -> ::anyhow::Result<()> {
|
|
let mut signals = Signals::new([SIGUSR1, SIGTERM])?;
|
|
|
|
#[cfg(feature = "prometheus")]
|
|
if config.metrics.run_prometheus_endpoint {
|
|
use metrics_exporter_prometheus::PrometheusBuilder;
|
|
|
|
PrometheusBuilder::new()
|
|
.with_http_listener(config.metrics.prometheus_endpoint_address)
|
|
.install()
|
|
.with_context(|| {
|
|
format!(
|
|
"Install prometheus endpoint on {}",
|
|
config.metrics.prometheus_endpoint_address
|
|
)
|
|
})?;
|
|
}
|
|
|
|
let state = State::default();
|
|
|
|
update_access_list(&config.access_list, &state.access_list)?;
|
|
|
|
let num_peers = config.socket_workers + config.swarm_workers;
|
|
|
|
let request_mesh_builder = MeshBuilder::partial(num_peers, SHARED_CHANNEL_SIZE);
|
|
|
|
let (sentinel_watcher, sentinel) = PanicSentinelWatcher::create_with_sentinel();
|
|
let priv_dropper = PrivilegeDropper::new(config.privileges.clone(), config.socket_workers);
|
|
|
|
let opt_tls_config = if config.network.enable_tls {
|
|
Some(Arc::new(ArcSwap::from_pointee(create_rustls_config(
|
|
&config.network.tls_certificate_path,
|
|
&config.network.tls_private_key_path,
|
|
)?)))
|
|
} else {
|
|
None
|
|
};
|
|
|
|
let server_start_instant = ServerStartInstant::new();
|
|
|
|
let mut executors = Vec::new();
|
|
|
|
for i in 0..(config.socket_workers) {
|
|
let sentinel = sentinel.clone();
|
|
let config = config.clone();
|
|
let state = state.clone();
|
|
let opt_tls_config = opt_tls_config.clone();
|
|
let request_mesh_builder = request_mesh_builder.clone();
|
|
let priv_dropper = priv_dropper.clone();
|
|
|
|
let placement = get_worker_placement(
|
|
&config.cpu_pinning,
|
|
config.socket_workers,
|
|
config.swarm_workers,
|
|
WorkerIndex::SocketWorker(i),
|
|
)?;
|
|
let builder = LocalExecutorBuilder::new(placement).name(&format!("socket-{:02}", i + 1));
|
|
|
|
let executor = builder
|
|
.spawn(move || async move {
|
|
workers::socket::run_socket_worker(
|
|
sentinel,
|
|
config,
|
|
state,
|
|
opt_tls_config,
|
|
request_mesh_builder,
|
|
priv_dropper,
|
|
server_start_instant,
|
|
i,
|
|
)
|
|
.await
|
|
})
|
|
.map_err(|err| anyhow::anyhow!("Spawning executor failed: {:#}", err))?;
|
|
|
|
executors.push(executor);
|
|
}
|
|
|
|
for i in 0..(config.swarm_workers) {
|
|
let sentinel = sentinel.clone();
|
|
let config = config.clone();
|
|
let state = state.clone();
|
|
let request_mesh_builder = request_mesh_builder.clone();
|
|
|
|
let placement = get_worker_placement(
|
|
&config.cpu_pinning,
|
|
config.socket_workers,
|
|
config.swarm_workers,
|
|
WorkerIndex::SwarmWorker(i),
|
|
)?;
|
|
let builder = LocalExecutorBuilder::new(placement).name(&format!("swarm-{:02}", i + 1));
|
|
|
|
let executor = builder
|
|
.spawn(move || async move {
|
|
workers::swarm::run_swarm_worker(
|
|
sentinel,
|
|
config,
|
|
state,
|
|
request_mesh_builder,
|
|
server_start_instant,
|
|
i,
|
|
)
|
|
.await
|
|
})
|
|
.map_err(|err| anyhow::anyhow!("Spawning executor failed: {:#}", err))?;
|
|
|
|
executors.push(executor);
|
|
}
|
|
|
|
if config.cpu_pinning.active {
|
|
set_affinity_for_util_worker(
|
|
&config.cpu_pinning,
|
|
config.socket_workers,
|
|
config.swarm_workers,
|
|
)?;
|
|
}
|
|
|
|
for signal in &mut signals {
|
|
match signal {
|
|
SIGUSR1 => {
|
|
let _ = update_access_list(&config.access_list, &state.access_list);
|
|
|
|
if let Some(tls_config) = opt_tls_config.as_ref() {
|
|
match create_rustls_config(
|
|
&config.network.tls_certificate_path,
|
|
&config.network.tls_private_key_path,
|
|
) {
|
|
Ok(config) => {
|
|
tls_config.store(Arc::new(config));
|
|
|
|
::log::info!("successfully updated tls config");
|
|
}
|
|
Err(err) => ::log::error!("could not update tls config: {:#}", err),
|
|
}
|
|
}
|
|
}
|
|
SIGTERM => {
|
|
if sentinel_watcher.panic_was_triggered() {
|
|
return Err(anyhow::anyhow!("worker thread panicked"));
|
|
} else {
|
|
return Ok(());
|
|
}
|
|
}
|
|
_ => unreachable!(),
|
|
}
|
|
}
|
|
|
|
Ok(())
|
|
}
|