Refactor hot-reload mechanism to use notify crate

Updated hot-reload functionality to use notify crate for file watching and improved documentation.
This commit is contained in:
artemws 2026-02-20 15:29:37 +02:00 committed by GitHub
parent 0f6621d359
commit 953fab68c4
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with 342 additions and 217 deletions

View File

@ -1,51 +1,33 @@
//! Hot-reload: watches the config file and reloads it on SIGHUP (Unix) //! Hot-reload: watches the config file via inotify (Linux) / FSEvents (macOS)
//! or on a periodic timer (all platforms). //! / ReadDirectoryChangesW (Windows) using the `notify` crate.
//! SIGHUP is also supported on Unix as an additional manual trigger.
//! //!
//! # What can be reloaded without restart //! # What can be reloaded without restart
//! //!
//! | Section | Field | Effect | //! | Section | Field | Effect |
//! |-----------|-------------------------------|---------------------------------| //! |-----------|-------------------------------|-----------------------------------|
//! | `general` | `log_level` | Filter updated via `log_level_tx` | //! | `general` | `log_level` | Filter updated via `log_level_tx` |
//! | `general` | `ad_tag` | Passed on next connection | //! | `general` | `ad_tag` | Passed on next connection |
//! | `general` | `middle_proxy_pool_size` | Passed on next connection | //! | `general` | `middle_proxy_pool_size` | Passed on next connection |
//! | `general` | `me_keepalive_*` | Passed on next connection | //! | `general` | `me_keepalive_*` | Passed on next connection |
//! | `access` | All user/quota fields | Effective immediately | //! | `access` | All user/quota fields | Effective immediately |
//! //!
//! Fields that require re-binding sockets (`server.port`, `censorship.*`, //! Fields that require re-binding sockets (`server.port`, `censorship.*`,
//! `network.*`, `use_middle_proxy`) are **not** applied; a warning is emitted. //! `network.*`, `use_middle_proxy`) are **not** applied; a warning is emitted.
//!
//! # Usage
//!
//! ```rust,ignore
//! let (config_rx, log_level_rx) = spawn_config_watcher(
//! PathBuf::from("config.toml"),
//! initial_config.clone(),
//! Duration::from_secs(60),
//! );
//!
//! // In each accept-loop, get a fresh snapshot per connection:
//! let config = config_rx.borrow_and_update().clone();
//!
//! // In a separate task, apply log_level changes to the tracing filter:
//! tokio::spawn(async move {
//! loop {
//! log_level_rx.changed().await.ok();
//! let level = log_level_rx.borrow().clone();
//! filter_handle.reload(EnvFilter::new(level.to_filter_str())).ok();
//! }
//! });
//! ```
use std::net::IpAddr;
use std::path::PathBuf; use std::path::PathBuf;
use std::sync::Arc; use std::sync::Arc;
use std::time::Duration;
use tokio::sync::watch; use notify::{EventKind, RecursiveMode, Watcher, recommended_watcher};
use tokio::sync::{mpsc, watch};
use tracing::{error, info, warn}; use tracing::{error, info, warn};
use crate::config::LogLevel; use crate::config::LogLevel;
use super::load::ProxyConfig; use super::load::ProxyConfig;
// ── Hot fields ────────────────────────────────────────────────────────────────
/// Fields that are safe to swap without restarting listeners. /// Fields that are safe to swap without restarting listeners.
#[derive(Debug, Clone, PartialEq)] #[derive(Debug, Clone, PartialEq)]
pub struct HotFields { pub struct HotFields {
@ -74,7 +56,9 @@ impl HotFields {
} }
} }
/// Warn if any non-hot fields changed (i.e. require restart). // ── Helpers ───────────────────────────────────────────────────────────────────
/// Warn if any non-hot fields changed (require restart).
fn warn_non_hot_changes(old: &ProxyConfig, new: &ProxyConfig) { fn warn_non_hot_changes(old: &ProxyConfig, new: &ProxyConfig) {
if old.server.port != new.server.port { if old.server.port != new.server.port {
warn!( warn!(
@ -96,206 +80,347 @@ fn warn_non_hot_changes(old: &ProxyConfig, new: &ProxyConfig) {
} }
} }
/// Resolve the public host for link generation — mirrors the logic in main.rs.
///
/// Priority:
/// 1. `[general.links] public_host` — explicit override in config
/// 2. `detected_ip_v4` — from STUN/interface probe at startup
/// 3. `detected_ip_v6` — fallback
/// 4. `"UNKNOWN"` — warn the user to set `public_host`
fn resolve_link_host(
cfg: &ProxyConfig,
detected_ip_v4: Option<IpAddr>,
detected_ip_v6: Option<IpAddr>,
) -> String {
if let Some(ref h) = cfg.general.links.public_host {
return h.clone();
}
detected_ip_v4
.or(detected_ip_v6)
.map(|ip| ip.to_string())
.unwrap_or_else(|| {
warn!(
"config reload: could not determine public IP for proxy links. \
Set [general.links] public_host in config."
);
"UNKNOWN".to_string()
})
}
/// Print TG proxy links for a single user — mirrors print_proxy_links() in main.rs.
fn print_user_links(user: &str, secret: &str, host: &str, port: u16, cfg: &ProxyConfig) {
info!(target: "telemt::links", "--- New user: {} ---", user);
if cfg.general.modes.classic {
info!(
target: "telemt::links",
" Classic: tg://proxy?server={}&port={}&secret={}",
host, port, secret
);
}
if cfg.general.modes.secure {
info!(
target: "telemt::links",
" DD: tg://proxy?server={}&port={}&secret=dd{}",
host, port, secret
);
}
if cfg.general.modes.tls {
let mut domains = vec![cfg.censorship.tls_domain.clone()];
for d in &cfg.censorship.tls_domains {
if !domains.contains(d) {
domains.push(d.clone());
}
}
for domain in &domains {
let domain_hex = hex::encode(domain.as_bytes());
info!(
target: "telemt::links",
" EE-TLS: tg://proxy?server={}&port={}&secret=ee{}{}",
host, port, secret, domain_hex
);
}
}
info!(target: "telemt::links", "--------------------");
}
/// Log all detected changes and emit TG links for new users.
fn log_changes(
old_hot: &HotFields,
new_hot: &HotFields,
new_cfg: &ProxyConfig,
log_tx: &watch::Sender<LogLevel>,
detected_ip_v4: Option<IpAddr>,
detected_ip_v6: Option<IpAddr>,
) {
if old_hot.log_level != new_hot.log_level {
info!(
"config reload: log_level: '{}' → '{}'",
old_hot.log_level, new_hot.log_level
);
log_tx.send(new_hot.log_level.clone()).ok();
}
if old_hot.ad_tag != new_hot.ad_tag {
info!(
"config reload: ad_tag: {} → {}",
old_hot.ad_tag.as_deref().unwrap_or("none"),
new_hot.ad_tag.as_deref().unwrap_or("none"),
);
}
if old_hot.middle_proxy_pool_size != new_hot.middle_proxy_pool_size {
info!(
"config reload: middle_proxy_pool_size: {} → {}",
old_hot.middle_proxy_pool_size, new_hot.middle_proxy_pool_size,
);
}
if old_hot.me_keepalive_enabled != new_hot.me_keepalive_enabled
|| old_hot.me_keepalive_interval_secs != new_hot.me_keepalive_interval_secs
|| old_hot.me_keepalive_jitter_secs != new_hot.me_keepalive_jitter_secs
|| old_hot.me_keepalive_payload_random != new_hot.me_keepalive_payload_random
{
info!(
"config reload: me_keepalive: enabled={} interval={}s jitter={}s random_payload={}",
new_hot.me_keepalive_enabled,
new_hot.me_keepalive_interval_secs,
new_hot.me_keepalive_jitter_secs,
new_hot.me_keepalive_payload_random,
);
}
if old_hot.access.users != new_hot.access.users {
let mut added: Vec<&String> = new_hot.access.users.keys()
.filter(|u| !old_hot.access.users.contains_key(*u))
.collect();
added.sort();
let mut removed: Vec<&String> = old_hot.access.users.keys()
.filter(|u| !new_hot.access.users.contains_key(*u))
.collect();
removed.sort();
let mut changed: Vec<&String> = new_hot.access.users.keys()
.filter(|u| {
old_hot.access.users.get(*u)
.map(|s| s != &new_hot.access.users[*u])
.unwrap_or(false)
})
.collect();
changed.sort();
if !added.is_empty() {
info!(
"config reload: users added: [{}]",
added.iter().map(|s| s.as_str()).collect::<Vec<_>>().join(", ")
);
let host = resolve_link_host(new_cfg, detected_ip_v4, detected_ip_v6);
let port = new_cfg.general.links.public_port.unwrap_or(new_cfg.server.port);
for user in &added {
if let Some(secret) = new_hot.access.users.get(*user) {
print_user_links(user, secret, &host, port, new_cfg);
}
}
}
if !removed.is_empty() {
info!(
"config reload: users removed: [{}]",
removed.iter().map(|s| s.as_str()).collect::<Vec<_>>().join(", ")
);
}
if !changed.is_empty() {
info!(
"config reload: users secret changed: [{}]",
changed.iter().map(|s| s.as_str()).collect::<Vec<_>>().join(", ")
);
}
}
if old_hot.access.user_max_tcp_conns != new_hot.access.user_max_tcp_conns {
info!(
"config reload: user_max_tcp_conns updated ({} entries)",
new_hot.access.user_max_tcp_conns.len()
);
}
if old_hot.access.user_expirations != new_hot.access.user_expirations {
info!(
"config reload: user_expirations updated ({} entries)",
new_hot.access.user_expirations.len()
);
}
if old_hot.access.user_data_quota != new_hot.access.user_data_quota {
info!(
"config reload: user_data_quota updated ({} entries)",
new_hot.access.user_data_quota.len()
);
}
if old_hot.access.user_max_unique_ips != new_hot.access.user_max_unique_ips {
info!(
"config reload: user_max_unique_ips updated ({} entries)",
new_hot.access.user_max_unique_ips.len()
);
}
}
/// Load config, validate, diff against current, and broadcast if changed.
fn reload_config(
config_path: &PathBuf,
config_tx: &watch::Sender<Arc<ProxyConfig>>,
log_tx: &watch::Sender<LogLevel>,
detected_ip_v4: Option<IpAddr>,
detected_ip_v6: Option<IpAddr>,
) {
let new_cfg = match ProxyConfig::load(config_path) {
Ok(c) => c,
Err(e) => {
error!("config reload: failed to parse {:?}: {}", config_path, e);
return;
}
};
if let Err(e) = new_cfg.validate() {
error!("config reload: validation failed: {}; keeping old config", e);
return;
}
let old_cfg = config_tx.borrow().clone();
let old_hot = HotFields::from_config(&old_cfg);
let new_hot = HotFields::from_config(&new_cfg);
if old_hot == new_hot {
return;
}
warn_non_hot_changes(&old_cfg, &new_cfg);
log_changes(&old_hot, &new_hot, &new_cfg, log_tx, detected_ip_v4, detected_ip_v6);
config_tx.send(Arc::new(new_cfg)).ok();
}
// ── Public API ────────────────────────────────────────────────────────────────
/// Spawn the hot-reload watcher task. /// Spawn the hot-reload watcher task.
/// ///
/// Returns: /// Uses `notify` (inotify on Linux) to detect file changes instantly.
/// - `watch::Receiver<Arc<ProxyConfig>>` — every accept-loop should call /// SIGHUP is also handled on Unix as an additional manual trigger.
/// `.borrow_and_update().clone()` per accepted connection. ///
/// - `watch::Receiver<LogLevel>` — caller should watch this and apply changes /// `detected_ip_v4` / `detected_ip_v6` are the IPs discovered during the
/// to the `tracing` reload handle (avoids lifetime/generic issues). /// startup probe — used when generating proxy links for newly added users,
/// matching the same logic as the startup output.
pub fn spawn_config_watcher( pub fn spawn_config_watcher(
config_path: PathBuf, config_path: PathBuf,
initial: Arc<ProxyConfig>, initial: Arc<ProxyConfig>,
reload_interval: Duration, detected_ip_v4: Option<IpAddr>,
detected_ip_v6: Option<IpAddr>,
) -> (watch::Receiver<Arc<ProxyConfig>>, watch::Receiver<LogLevel>) { ) -> (watch::Receiver<Arc<ProxyConfig>>, watch::Receiver<LogLevel>) {
let initial_level = initial.general.log_level.clone(); let initial_level = initial.general.log_level.clone();
let (config_tx, config_rx) = watch::channel(initial); let (config_tx, config_rx) = watch::channel(initial);
let (log_tx, log_rx) = watch::channel(initial_level); let (log_tx, log_rx) = watch::channel(initial_level);
tokio::spawn(async move { // Bridge: sync notify callback → async task via mpsc.
// On Unix, also listen for SIGHUP. let (notify_tx, mut notify_rx) = mpsc::channel::<()>(4);
#[cfg(unix)]
let mut sighup = {
use tokio::signal::unix::{signal, SignalKind};
signal(SignalKind::hangup()).expect("Failed to register SIGHUP handler")
};
let mut interval = tokio::time::interval(reload_interval); // Watch the parent directory rather than the file itself, because many
interval.set_missed_tick_behavior(tokio::time::MissedTickBehavior::Skip); // editors (vim, nano, systemd-sysusers) write via rename, which would
// cause inotify to lose track of the original inode.
let watch_dir = config_path
.parent()
.unwrap_or_else(|| std::path::Path::new("."))
.to_path_buf();
loop { let config_file = config_path.clone();
// Wait for either a timer tick or SIGHUP. let tx_clone = notify_tx.clone();
#[cfg(unix)]
tokio::select! {
_ = interval.tick() => {},
_ = sighup.recv() => {
info!("SIGHUP received — reloading config from {:?}", config_path);
}
}
#[cfg(not(unix))]
interval.tick().await;
let new_cfg = match ProxyConfig::load(&config_path) { let watcher_result = recommended_watcher(move |res: notify::Result<notify::Event>| {
Ok(c) => c, let Ok(event) = res else { return };
Err(e) => {
error!("config reload: failed to parse {:?}: {}", config_path, e);
continue;
}
};
if let Err(e) = new_cfg.validate() { let is_our_file = event.paths.iter().any(|p| p == &config_file);
error!("config reload: validation failed: {}; keeping old config", e); if !is_our_file {
continue; return;
} }
let relevant = matches!(
let old_cfg = config_tx.borrow().clone(); event.kind,
let old_hot = HotFields::from_config(&old_cfg); EventKind::Modify(_) | EventKind::Create(_) | EventKind::Remove(_)
let new_hot = HotFields::from_config(&new_cfg); );
if relevant {
if old_hot == new_hot { let _ = tx_clone.try_send(());
// Nothing changed in hot fields — skip silent tick.
continue;
}
warn_non_hot_changes(&old_cfg, &new_cfg);
// ── Detailed diff logging ─────────────────────────────────────
// log_level
if old_hot.log_level != new_hot.log_level {
info!(
"config reload: log_level: '{}' → '{}'",
old_hot.log_level, new_hot.log_level
);
log_tx.send(new_hot.log_level.clone()).ok();
}
// ad_tag
if old_hot.ad_tag != new_hot.ad_tag {
info!(
"config reload: ad_tag: {} → {}",
old_hot.ad_tag.as_deref().unwrap_or("none"),
new_hot.ad_tag.as_deref().unwrap_or("none"),
);
}
// middle_proxy_pool_size
if old_hot.middle_proxy_pool_size != new_hot.middle_proxy_pool_size {
info!(
"config reload: middle_proxy_pool_size: {} → {}",
old_hot.middle_proxy_pool_size, new_hot.middle_proxy_pool_size,
);
}
// me_keepalive
if old_hot.me_keepalive_enabled != new_hot.me_keepalive_enabled
|| old_hot.me_keepalive_interval_secs != new_hot.me_keepalive_interval_secs
|| old_hot.me_keepalive_jitter_secs != new_hot.me_keepalive_jitter_secs
|| old_hot.me_keepalive_payload_random != new_hot.me_keepalive_payload_random
{
info!(
"config reload: me_keepalive: enabled={} interval={}s jitter={}s random_payload={}",
new_hot.me_keepalive_enabled,
new_hot.me_keepalive_interval_secs,
new_hot.me_keepalive_jitter_secs,
new_hot.me_keepalive_payload_random,
);
}
// access.users — added / removed / changed
if old_hot.access.users != new_hot.access.users {
let added: Vec<&String> = new_hot.access.users.keys()
.filter(|u| !old_hot.access.users.contains_key(*u))
.collect();
let removed: Vec<&String> = old_hot.access.users.keys()
.filter(|u| !new_hot.access.users.contains_key(*u))
.collect();
let changed: Vec<&String> = new_hot.access.users.keys()
.filter(|u| {
old_hot.access.users.get(*u)
.map(|old_s| old_s != &new_hot.access.users[*u])
.unwrap_or(false)
})
.collect();
if !added.is_empty() {
let names: Vec<&str> = added.iter().map(|s| s.as_str()).collect();
info!("config reload: users added: [{}]", names.join(", "));
// Print TG proxy links for each newly added user.
let host = new_cfg.general.links.public_host.as_deref()
.unwrap_or("YOUR_SERVER_IP");
let port = new_cfg.general.links.public_port
.unwrap_or(new_cfg.server.port);
let tls_domain = &new_cfg.censorship.tls_domain;
let mut tls_domains = vec![tls_domain.clone()];
for d in &new_cfg.censorship.tls_domains {
if !tls_domains.contains(d) { tls_domains.push(d.clone()); }
}
for user in &added {
if let Some(secret) = new_hot.access.users.get(*user) {
info!(target: "telemt::links", "--- New user: {} ---", user);
if new_cfg.general.modes.classic {
info!(
target: "telemt::links",
" Classic: tg://proxy?server={}&port={}&secret={}",
host, port, secret
);
}
if new_cfg.general.modes.secure {
info!(
target: "telemt::links",
" DD: tg://proxy?server={}&port={}&secret=dd{}",
host, port, secret
);
}
if new_cfg.general.modes.tls {
for domain in &tls_domains {
let domain_hex = hex::encode(domain.as_bytes());
info!(
target: "telemt::links",
" EE-TLS: tg://proxy?server={}&port={}&secret=ee{}{}",
host, port, secret, domain_hex
);
}
}
info!(target: "telemt::links", "--------------------");
}
}
}
if !removed.is_empty() {
let names: Vec<&str> = removed.iter().map(|s| s.as_str()).collect();
info!("config reload: users removed: [{}]", names.join(", "));
}
if !changed.is_empty() {
let names: Vec<&str> = changed.iter().map(|s| s.as_str()).collect();
info!("config reload: users secret changed: [{}]", names.join(", "));
}
}
// access quotas / limits
if old_hot.access.user_max_tcp_conns != new_hot.access.user_max_tcp_conns {
info!("config reload: user_max_tcp_conns updated ({} entries)",
new_hot.access.user_max_tcp_conns.len());
}
if old_hot.access.user_expirations != new_hot.access.user_expirations {
info!("config reload: user_expirations updated ({} entries)",
new_hot.access.user_expirations.len());
}
if old_hot.access.user_data_quota != new_hot.access.user_data_quota {
info!("config reload: user_data_quota updated ({} entries)",
new_hot.access.user_data_quota.len());
}
if old_hot.access.user_max_unique_ips != new_hot.access.user_max_unique_ips {
info!("config reload: user_max_unique_ips updated ({} entries)",
new_hot.access.user_max_unique_ips.len());
}
// Broadcast the new config snapshot.
config_tx.send(Arc::new(new_cfg)).ok();
} }
}); });
match watcher_result {
Ok(mut watcher) => {
match watcher.watch(&watch_dir, RecursiveMode::NonRecursive) {
Ok(()) => info!("config watcher: watching {:?} via inotify", config_path),
Err(e) => warn!(
"config watcher: failed to watch {:?}: {}; use SIGHUP to reload",
watch_dir, e
),
}
tokio::spawn(async move {
let _watcher = watcher; // keep alive
#[cfg(unix)]
let mut sighup = {
use tokio::signal::unix::{SignalKind, signal};
signal(SignalKind::hangup()).expect("Failed to register SIGHUP handler")
};
loop {
#[cfg(unix)]
tokio::select! {
msg = notify_rx.recv() => {
if msg.is_none() { break; }
}
_ = sighup.recv() => {
info!("SIGHUP received — reloading {:?}", config_path);
}
}
#[cfg(not(unix))]
if notify_rx.recv().await.is_none() { break; }
// Debounce: drain extra events fired within 50ms.
tokio::time::sleep(std::time::Duration::from_millis(50)).await;
while notify_rx.try_recv().is_ok() {}
reload_config(
&config_path,
&config_tx,
&log_tx,
detected_ip_v4,
detected_ip_v6,
);
}
});
}
Err(e) => {
warn!(
"config watcher: inotify unavailable ({}); only SIGHUP will trigger reload",
e
);
// Fall back to SIGHUP-only.
tokio::spawn(async move {
#[cfg(unix)]
{
use tokio::signal::unix::{SignalKind, signal};
let mut sighup = signal(SignalKind::hangup())
.expect("Failed to register SIGHUP handler");
loop {
sighup.recv().await;
info!("SIGHUP received — reloading {:?}", config_path);
reload_config(
&config_path,
&config_tx,
&log_tx,
detected_ip_v4,
detected_ip_v6,
);
}
}
#[cfg(not(unix))]
let _ = (config_tx, log_tx, config_path);
});
}
}
(config_rx, log_rx) (config_rx, log_rx)
} }