mirror of
https://github.com/onyx-and-iris/q3rcon-proxy.git
synced 2026-04-07 15:53:29 +00:00
Compare commits
4 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
| abc1ea9d3f | |||
| 82ca15f70e | |||
| 8cb5bc03c5 | |||
| 939d419438 |
15
Dockerfile
15
Dockerfile
@@ -1,4 +1,4 @@
|
||||
FROM golang:1.21
|
||||
FROM golang:1.21 AS build_image
|
||||
|
||||
WORKDIR /usr/src/app
|
||||
|
||||
@@ -6,9 +6,16 @@ WORKDIR /usr/src/app
|
||||
COPY go.mod go.sum ./
|
||||
RUN go mod download && go mod verify
|
||||
|
||||
# build binary and place into /usr/local/bin/
|
||||
COPY . .
|
||||
RUN go build -v -o /usr/local/bin/q3rcon-proxy ./cmd/q3rcon-proxy/
|
||||
|
||||
# build binary, place into ./bin/
|
||||
RUN CGO_ENABLED=0 GOOS=linux go build -o ./bin/q3rcon-proxy ./cmd/q3rcon-proxy/
|
||||
|
||||
FROM scratch AS final_image
|
||||
|
||||
WORKDIR /bin/
|
||||
|
||||
COPY --from=build_image /usr/src/app/bin/q3rcon-proxy .
|
||||
|
||||
# Command to run when starting the container
|
||||
ENTRYPOINT [ "q3rcon-proxy" ]
|
||||
ENTRYPOINT [ "./q3rcon-proxy" ]
|
||||
@@ -31,19 +31,19 @@ func main() {
|
||||
host = "0.0.0.0"
|
||||
}
|
||||
|
||||
staleTimeout, err := getEnvInt("Q3RCON_STALE_SESSION_TIMEOUT")
|
||||
sessionTimeout, err := getEnvInt("Q3RCON_SESSION_TIMEOUT")
|
||||
if err != nil {
|
||||
log.Fatalf("unable to parse Q3RCON_STALE_SESSION_TIMEOUT: %s", err.Error())
|
||||
log.Fatalf("unable to parse Q3RCON_SESSION_TIMEOUT: %s", err.Error())
|
||||
}
|
||||
|
||||
for _, proxy := range strings.Split(proxies, ";") {
|
||||
go start(host, proxy, staleTimeout)
|
||||
go start(host, proxy, sessionTimeout)
|
||||
}
|
||||
|
||||
<-make(chan int)
|
||||
}
|
||||
|
||||
func start(host, proxy string, staleTimeout int) {
|
||||
func start(host, proxy string, sessionTimeout int) {
|
||||
port, target := func() (string, string) {
|
||||
x := strings.Split(proxy, ":")
|
||||
return x[0], x[1]
|
||||
@@ -52,7 +52,7 @@ func start(host, proxy string, staleTimeout int) {
|
||||
c, err := udpproxy.New(
|
||||
fmt.Sprintf("%s:%s", host, port),
|
||||
fmt.Sprintf("127.0.0.1:%s", target),
|
||||
udpproxy.WithStaleTimeout(time.Duration(staleTimeout)*time.Minute))
|
||||
udpproxy.WithSessionTimeout(time.Duration(sessionTimeout)*time.Minute))
|
||||
if err != nil {
|
||||
log.Fatal(err)
|
||||
}
|
||||
|
||||
41
pkg/udpproxy/sessioncache.go
Normal file
41
pkg/udpproxy/sessioncache.go
Normal file
@@ -0,0 +1,41 @@
|
||||
package udpproxy
|
||||
|
||||
import "sync"
|
||||
|
||||
// sessionCache tracks connection sessions
|
||||
type sessionCache struct {
|
||||
mu sync.RWMutex
|
||||
data map[string]*session
|
||||
}
|
||||
|
||||
// newSessionCache creates a usable sessionCache.
|
||||
func newSessionCache() sessionCache {
|
||||
return sessionCache{
|
||||
data: make(map[string]*session),
|
||||
}
|
||||
}
|
||||
|
||||
// Read returns the associated session for an addr
|
||||
func (sc *sessionCache) Read(addr string) (*session, bool) {
|
||||
sc.mu.RLock()
|
||||
defer sc.mu.RUnlock()
|
||||
|
||||
v, ok := sc.data[addr]
|
||||
return v, ok
|
||||
}
|
||||
|
||||
// Upsert overrides the session for a given addr.
|
||||
func (sc *sessionCache) Upsert(addr string, session *session) {
|
||||
sc.mu.Lock()
|
||||
defer sc.mu.Unlock()
|
||||
|
||||
sc.data[addr] = session
|
||||
}
|
||||
|
||||
// Delete removes the session for the given addr.
|
||||
func (sc *sessionCache) Delete(addr string) {
|
||||
sc.mu.Lock()
|
||||
defer sc.mu.Unlock()
|
||||
|
||||
delete(sc.data, addr)
|
||||
}
|
||||
@@ -2,7 +2,6 @@ package udpproxy
|
||||
|
||||
import (
|
||||
"net"
|
||||
"sync"
|
||||
"time"
|
||||
|
||||
log "github.com/sirupsen/logrus"
|
||||
@@ -11,15 +10,15 @@ import (
|
||||
// Option is a functional option type that allows us to configure the Client.
|
||||
type Option func(*Client)
|
||||
|
||||
// WithStaleTimeout is a functional option to set the stale session timeout
|
||||
func WithStaleTimeout(timeout time.Duration) Option {
|
||||
// WithSessionTimeout is a functional option to set the session timeout
|
||||
func WithSessionTimeout(timeout time.Duration) Option {
|
||||
return func(c *Client) {
|
||||
if timeout < time.Minute {
|
||||
log.Warnf("cannot set stale session timeout to less than 1 minute.. defaulting to 5 minutes")
|
||||
return
|
||||
}
|
||||
|
||||
c.timeout = timeout
|
||||
c.sessionTimeout = timeout
|
||||
}
|
||||
}
|
||||
|
||||
@@ -29,10 +28,8 @@ type Client struct {
|
||||
|
||||
proxyConn *net.UDPConn
|
||||
|
||||
mutex sync.RWMutex
|
||||
sessions map[string]*session
|
||||
|
||||
timeout time.Duration
|
||||
sessionCache sessionCache
|
||||
sessionTimeout time.Duration
|
||||
}
|
||||
|
||||
func New(port, target string, options ...Option) (*Client, error) {
|
||||
@@ -47,11 +44,10 @@ func New(port, target string, options ...Option) (*Client, error) {
|
||||
}
|
||||
|
||||
c := &Client{
|
||||
laddr: laddr,
|
||||
raddr: raddr,
|
||||
mutex: sync.RWMutex{},
|
||||
sessions: map[string]*session{},
|
||||
timeout: 5 * time.Minute,
|
||||
laddr: laddr,
|
||||
raddr: raddr,
|
||||
sessionCache: newSessionCache(),
|
||||
sessionTimeout: 5 * time.Minute,
|
||||
}
|
||||
|
||||
for _, o := range options {
|
||||
@@ -77,7 +73,7 @@ func (c *Client) ListenAndServe() error {
|
||||
log.Error(err)
|
||||
}
|
||||
|
||||
session, ok := c.sessions[caddr.String()]
|
||||
session, ok := c.sessionCache.Read(caddr.String())
|
||||
if !ok {
|
||||
session, err = newSession(caddr, c.raddr, c.proxyConn)
|
||||
if err != nil {
|
||||
@@ -85,7 +81,7 @@ func (c *Client) ListenAndServe() error {
|
||||
continue
|
||||
}
|
||||
|
||||
c.sessions[caddr.String()] = session
|
||||
c.sessionCache.Upsert(caddr.String(), session)
|
||||
}
|
||||
|
||||
go session.proxyTo(buf[:n])
|
||||
@@ -95,16 +91,12 @@ func (c *Client) ListenAndServe() error {
|
||||
func (c *Client) pruneSessions() {
|
||||
ticker := time.NewTicker(1 * time.Minute)
|
||||
|
||||
// the locks here could be abusive and i dont even know if this is a real
|
||||
// problem but we definitely need to clean up stale sessions
|
||||
for range ticker.C {
|
||||
for _, session := range c.sessions {
|
||||
c.mutex.RLock()
|
||||
if time.Since(session.updateTime) > c.timeout {
|
||||
delete(c.sessions, session.caddr.String())
|
||||
for _, session := range c.sessionCache.data {
|
||||
if time.Since(session.updateTime) > c.sessionTimeout {
|
||||
c.sessionCache.Delete(session.caddr.String())
|
||||
log.Tracef("session for %s deleted", session.caddr)
|
||||
}
|
||||
c.mutex.RUnlock()
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user