5.0 KiB
Developing Oragono
Most development happens on the develop
branch, which is
occasionally rebased + merged into master
when it’s not
incredibly broken. When this happens, the develop
branch is
usually pruned until I feel like making ‘unsafe’ changes again.
I may also name the branch develop+feature
if I’m
developing multiple, or particularly unstable, features.
The intent is to keep master
relatively stable.
Releasing a new version
- Ensure dependencies are up-to-date.
- Run
irctest
over it to make sure nothing’s severely broken. - Remove
-unreleased
from the version number inirc/constants.go
. - Update the changelog with new changes.
- Remove unused sections from the changelog, change the date/version number and write release notes.
- Commit the new changelog and constants change.
- Tag the release with
git tag v0.0.0 -m "Release v0.0.0"
(0.0.0
replaced with the real ver number). - Build binaries using the Makefile, upload release to Github including the changelog and binaries.
Once it’s built and released, you need to setup the new development version. To do so:
- In
irc/constants.go
, update the version number to0.0.1-unreleased
, where0.0.1
is the previous release number with the minor field incremented by one (for instance,0.9.2
->0.9.3-unreleased
). - At the top of the changelog, paste a new section with the content below.
- Commit the new version number and changelog with the message
"Setup v0.0.1-unreleased devel ver"
.
Unreleased changelog content
## Unreleased
New release of Oragono!
### Config Changes
### Security
### Added
### Changed
### Removed
### Fixed
Updating vendor/
The vendor/
directory holds our dependencies. When we
import new repos, we need to update this folder to contain these new
deps. This is something that I’ll mostly be handling.
To update this folder:
- Install https://github.com/golang/dep
cd
to Oragono folderdep ensure -update
cd vendor
- Commit the changes with the message
"Updated packages"
cd ..
- Commit the result with the message
"vendor: Updated submodules"
This will make sure things stay nice and up-to-date for users.
Fuzzing and Testing
Fuzzing can be useful. We don’t have testing done inside the IRCd itself, but this fuzzer I’ve written works alright and has helped shake out various bugs: irc_fuzz.py.
In addition, I’ve got the beginnings of a stress-tester here which is useful: https://github.com/DanielOaks/irc-stress-test
As well, there’s a decent set of ‘tests’ here, which I like to run Oragono through now and then: https://github.com/DanielOaks/irctest
Debugging Hangs
To debug a hang, the best thing to do is to get a stack trace. Go’s nice, and you can do so by running this:
$ kill -ABRT <procid>
This will kill Oragono and print out a stack trace for you to take a look at.
Concurrency design
Oragono involves a fair amount of shared state. Here are some of the main points:
- Each client has a separate goroutine that listens for incoming messages and synchronously processes them.
- All sends to clients are asynchronous;
client.Send
appends the message to a queue, which is then processed on a separate goroutine. It is always safe to callclient.Send
. - The server has a few of its own goroutines, for listening on sockets and handing off new client connections to their dedicated goroutines.
- A few tasks are done asynchronously in ad-hoc goroutines.
In consequence, there is a lot of state (in particular, server and channel state) that can be read and written from multiple goroutines. This state is protected with mutexes. To avoid deadlocks, mutexes are arranged in “tiers”; while holding a mutex of one tier, you’re only allowed to acquire mutexes of a strictly higher tier. The tiers are:
- Tier 1 mutexes: these are the “innermost” mutexes. They typically
protect getters and setters on objects, or invariants that are local to
the state of a single object. Example:
Channel.stateMutex
. - Tier 2 mutexes: these protect some invariants of their own, but also
need to access fields on other objects that themselves require
synchronization. Example:
ChannelManager.RWMutex
. - Tier 3 mutexes: these protect macroscopic operations, where it
doesn’t make sense for more than one to occur concurrently. Example;
Server.rehashMutex
, which prevents rehashes from overlapping.
There are some mutexes that are “tier 0”: anything in a subpackage of
irc
(e.g., irc/logger
or
irc/connection_limits
) shouldn’t acquire mutexes defined in
irc
.
We are using buntdb
for persistence; a
buntdb.DB
has an RWMutex
inside it, with
read-write transactions getting the Lock()
and read-only
transactions getting the RLock()
. We haven’t completely
decided where this lock fits into the overall lock model. For now, it’s
probably better to err on the side of caution: if possible, don’t
acquire new locks inside the buntdb
transaction, and be
careful about what locks are held around the transaction as well.