Browse Source

fix workflow to fetch libsecp256k1.so

main
mleku 2 months ago
parent
commit
2b8f359a83
No known key found for this signature in database
  1. 3
      .claude/settings.local.json
  2. 26
      app/listener.go
  3. 2
      pkg/version/version

3
.claude/settings.local.json

@ -131,7 +131,8 @@ @@ -131,7 +131,8 @@
"Bash(systemctl:*)",
"Bash(systemctl show:*)",
"Bash(ssh relay1:*)",
"Bash(done)"
"Bash(done)",
"Bash(go run:*)"
],
"deny": [],
"ask": []

26
app/listener.go

@ -1,6 +1,7 @@ @@ -1,6 +1,7 @@
package app
import (
"bytes"
"context"
"net/http"
"strings"
@ -38,6 +39,7 @@ type Listener struct { @@ -38,6 +39,7 @@ type Listener struct {
messageQueue chan messageRequest // Buffered channel for message processing
processingDone chan struct{} // Closed when message processor exits
handlerWg sync.WaitGroup // Tracks spawned message handler goroutines
authProcessing sync.RWMutex // Ensures AUTH completes before other messages check authentication
// Flow control counters (atomic for concurrent access)
droppedMessages atomic.Int64 // Messages dropped due to full queue
// Diagnostics: per-connection counters
@ -218,9 +220,26 @@ func (l *Listener) messageProcessor() { @@ -218,9 +220,26 @@ func (l *Listener) messageProcessor() {
return
}
// Process the message in a separate goroutine to avoid blocking
// This allows multiple messages to be processed concurrently (like khatru does)
// Track the goroutine so we can wait for it during cleanup
// Lock immediately to ensure AUTH is processed before subsequent messages
// are dequeued. This prevents race conditions where EVENT checks authentication
// before AUTH completes.
l.authProcessing.Lock()
// Check if this is an AUTH message by looking for the ["AUTH" prefix
isAuthMessage := len(req.data) > 7 && bytes.HasPrefix(req.data, []byte(`["AUTH"`))
if isAuthMessage {
// Process AUTH message synchronously while holding lock
// This blocks the messageProcessor from dequeuing the next message
// until authentication is complete and authedPubkey is set
log.D.F("ws->%s processing AUTH synchronously with lock", req.remote)
l.HandleMessage(req.data, req.remote)
// Unlock after AUTH completes so subsequent messages see updated authedPubkey
l.authProcessing.Unlock()
} else {
// Not AUTH - unlock immediately and process concurrently
// The next message can now be dequeued (possibly another non-AUTH to process concurrently)
l.authProcessing.Unlock()
l.handlerWg.Add(1)
go func(data []byte, remote string) {
defer l.handlerWg.Done()
@ -229,6 +248,7 @@ func (l *Listener) messageProcessor() { @@ -229,6 +248,7 @@ func (l *Listener) messageProcessor() {
}
}
}
}
// getManagedACL returns the managed ACL instance if available
func (l *Listener) getManagedACL() *database.ManagedACL {

2
pkg/version/version

@ -1 +1 @@ @@ -1 +1 @@
v0.29.16
v0.29.17
Loading…
Cancel
Save