syncthing/cmd/discosrv/querysrv.go

398 lines
8.8 KiB
Go
Raw Normal View History

2015-03-25 08:16:52 +01:00
// Copyright (C) 2014-2015 Jakob Borg and Contributors (see the CONTRIBUTORS file).
package main
import (
2015-09-13 11:44:33 +02:00
"crypto/tls"
2015-03-25 08:16:52 +01:00
"database/sql"
2015-09-13 11:44:33 +02:00
"encoding/json"
2015-03-25 08:16:52 +01:00
"log"
"net"
2015-09-13 11:44:33 +02:00
"net/http"
2015-07-22 00:56:27 +02:00
"net/url"
2015-03-25 08:16:52 +01:00
"time"
"github.com/golang/groupcache/lru"
"github.com/juju/ratelimit"
"github.com/syncthing/protocol"
)
type querysrv struct {
2015-09-13 11:44:33 +02:00
addr string
db *sql.DB
prep map[string]*sql.Stmt
limiter *lru.Cache
cert tls.Certificate
listener net.Listener
}
type announcement struct {
Direct []string `json:"direct"`
Relays []annRelay `json:"relays"`
}
type annRelay struct {
URL string `json:"url"`
Latency int `json:"latency"`
2015-03-25 08:16:52 +01:00
}
func (s *querysrv) Serve() {
s.limiter = lru.New(lruSize)
2015-09-13 11:44:33 +02:00
tlsCfg := &tls.Config{
Certificates: []tls.Certificate{s.cert},
ClientAuth: tls.RequestClientCert,
SessionTicketsDisabled: true,
MinVersion: tls.VersionTLS12,
CipherSuites: []uint16{
tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
tls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
tls.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,
tls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
tls.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
tls.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
},
}
http.HandleFunc("/", s.handler)
2015-09-21 12:49:17 +02:00
http.HandleFunc("/ping", handlePing)
2015-09-13 11:44:33 +02:00
tlsListener, err := tls.Listen("tcp", s.addr, tlsCfg)
2015-03-25 08:16:52 +01:00
if err != nil {
log.Println("Listen:", err)
return
}
2015-09-13 11:44:33 +02:00
s.listener = tlsListener
srv := &http.Server{
ReadTimeout: 30 * time.Second,
WriteTimeout: 10 * time.Second,
MaxHeaderBytes: 2 << 10,
2015-03-25 08:16:52 +01:00
}
2015-09-13 11:44:33 +02:00
if err := srv.Serve(tlsListener); err != nil {
log.Println("Serve:", err)
2015-03-25 08:16:52 +01:00
}
2015-09-13 11:44:33 +02:00
}
2015-03-25 08:16:52 +01:00
2015-09-13 11:44:33 +02:00
func (s *querysrv) handler(w http.ResponseWriter, req *http.Request) {
if debug {
log.Println(req.Method, req.URL)
}
2015-03-25 08:16:52 +01:00
2015-09-13 11:44:33 +02:00
remoteAddr, err := net.ResolveTCPAddr("tcp", req.RemoteAddr)
if err != nil {
log.Println("remoteAddr:", err)
http.Error(w, "Internal Server Error", http.StatusInternalServerError)
return
}
2015-03-25 08:16:52 +01:00
2015-09-13 11:44:33 +02:00
if s.limit(remoteAddr.IP) {
if debug {
log.Println(remoteAddr.IP, "is limited")
2015-03-25 08:16:52 +01:00
}
2015-09-13 11:44:33 +02:00
w.Header().Set("Retry-After", "60")
http.Error(w, "Too Many Requests", 429)
return
}
2015-03-25 08:16:52 +01:00
2015-09-13 11:44:33 +02:00
switch req.Method {
case "GET":
s.handleGET(w, req)
case "POST":
s.handlePOST(w, req)
default:
globalStats.Error()
http.Error(w, "Method Not Allowed", http.StatusMethodNotAllowed)
2015-03-25 08:16:52 +01:00
}
}
2015-09-13 11:44:33 +02:00
func (s *querysrv) handleGET(w http.ResponseWriter, req *http.Request) {
if req.TLS == nil {
if debug {
log.Println(req.Method, req.URL, "not TLS")
}
globalStats.Error()
http.Error(w, "Forbidden", http.StatusForbidden)
return
}
2015-03-25 08:16:52 +01:00
2015-09-13 11:44:33 +02:00
deviceID, err := protocol.DeviceIDFromString(req.URL.Query().Get("device"))
if err != nil {
if debug {
log.Println(req.Method, req.URL, "bad device param")
}
globalStats.Error()
http.Error(w, "Bad Request", http.StatusBadRequest)
return
2015-03-25 08:16:52 +01:00
}
2015-09-13 11:44:33 +02:00
var ann announcement
2015-03-25 08:16:52 +01:00
2015-09-13 11:44:33 +02:00
ann.Direct, err = s.getAddresses(deviceID)
if err != nil {
log.Println("getAddresses:", err)
globalStats.Error()
http.Error(w, "Internal Server Error", http.StatusInternalServerError)
return
2015-03-25 08:16:52 +01:00
}
2015-09-13 11:44:33 +02:00
ann.Relays, err = s.getRelays(deviceID)
2015-03-25 08:16:52 +01:00
if err != nil {
2015-09-13 11:44:33 +02:00
log.Println("getRelays:", err)
globalStats.Error()
http.Error(w, "Internal Server Error", http.StatusInternalServerError)
return
2015-03-25 08:16:52 +01:00
}
2015-09-13 11:44:33 +02:00
if len(ann.Direct)+len(ann.Relays) == 0 {
globalStats.Error()
http.Error(w, "Not Found", http.StatusNotFound)
return
}
2015-07-22 00:56:27 +02:00
2015-09-13 11:44:33 +02:00
globalStats.Query()
w.Header().Set("Content-Type", "application/json")
json.NewEncoder(w).Encode(ann)
}
func (s *querysrv) handlePOST(w http.ResponseWriter, req *http.Request) {
if req.TLS == nil {
if debug {
log.Println(req.Method, req.URL, "not TLS")
2015-07-22 00:56:27 +02:00
}
2015-09-13 11:44:33 +02:00
globalStats.Error()
http.Error(w, "Forbidden", http.StatusForbidden)
return
}
2015-07-22 00:56:27 +02:00
2015-09-13 11:44:33 +02:00
if len(req.TLS.PeerCertificates) == 0 {
if debug {
log.Println(req.Method, req.URL, "no certificates")
2015-07-22 00:56:27 +02:00
}
2015-09-13 11:44:33 +02:00
globalStats.Error()
http.Error(w, "Forbidden", http.StatusForbidden)
return
}
2015-07-22 00:56:27 +02:00
2015-09-13 11:44:33 +02:00
var ann announcement
if err := json.NewDecoder(req.Body).Decode(&ann); err != nil {
if debug {
log.Println(req.Method, req.URL, err)
2015-07-22 00:56:27 +02:00
}
2015-09-13 11:44:33 +02:00
globalStats.Error()
http.Error(w, "Bad Request", http.StatusBadRequest)
return
2015-07-22 00:56:27 +02:00
}
2015-09-13 11:44:33 +02:00
remoteAddr, err := net.ResolveTCPAddr("tcp", req.RemoteAddr)
2015-07-22 00:56:27 +02:00
if err != nil {
2015-09-13 11:44:33 +02:00
log.Println("remoteAddr:", err)
globalStats.Error()
http.Error(w, "Internal Server Error", http.StatusInternalServerError)
return
2015-07-22 00:56:27 +02:00
}
2015-09-13 11:44:33 +02:00
deviceID := protocol.NewDeviceID(req.TLS.PeerCertificates[0].Raw)
// handleAnnounce returns *two* errors. The first indicates a problem with
// something the client posted to us. We should return a 400 Bad Request
// and not worry about it. The second indicates that the request was fine,
// but something internal fucked up. We should log it and respond with a
// more apologetic 500 Internal Server Error.
userErr, internalErr := s.handleAnnounce(remoteAddr.IP, deviceID, ann.Direct, ann.Relays)
if userErr != nil {
if debug {
log.Println(req.Method, req.URL, userErr)
2015-03-25 08:16:52 +01:00
}
2015-09-13 11:44:33 +02:00
globalStats.Error()
http.Error(w, "Bad Request", http.StatusBadRequest)
return
2015-03-25 08:16:52 +01:00
}
2015-09-13 11:44:33 +02:00
if internalErr != nil {
log.Println("handleAnnounce:", internalErr)
globalStats.Error()
http.Error(w, "Internal Server Error", http.StatusInternalServerError)
return
2015-03-25 08:16:52 +01:00
}
2015-09-13 11:44:33 +02:00
globalStats.Announce()
// TODO: Slowly increase this for stable clients
w.Header().Set("Reannounce-After", "1800")
// We could return the lookup result here, but it's kind of unnecessarily
// expensive to go query the database again so we let the client decide to
// do a lookup if they really care.
w.WriteHeader(http.StatusNoContent)
}
func (s *querysrv) Stop() {
s.listener.Close()
2015-03-25 08:16:52 +01:00
}
2015-09-13 11:44:33 +02:00
func (s *querysrv) handleAnnounce(remote net.IP, deviceID protocol.DeviceID, direct []string, relays []annRelay) (userErr, internalErr error) {
tx, err := s.db.Begin()
2015-03-25 08:16:52 +01:00
if err != nil {
2015-09-13 11:44:33 +02:00
internalErr = err
return
2015-03-25 08:16:52 +01:00
}
2015-09-13 11:44:33 +02:00
defer func() {
// Since we return from a bunch of different places, we handle
// rollback in the defer.
if internalErr != nil || userErr != nil {
tx.Rollback()
}
}()
2015-03-25 08:16:52 +01:00
2015-09-13 11:44:33 +02:00
for _, annAddr := range direct {
uri, err := url.Parse(annAddr)
if err != nil {
userErr = err
return
}
host, port, err := net.SplitHostPort(uri.Host)
if err != nil {
userErr = err
return
}
ip := net.ParseIP(host)
if len(ip) == 0 || ip.IsUnspecified() {
uri.Host = net.JoinHostPort(remote.String(), port)
}
if err := s.updateAddress(tx, deviceID, uri.String()); err != nil {
internalErr = err
return
}
2015-03-25 08:16:52 +01:00
}
2015-09-13 11:44:33 +02:00
_, err = tx.Stmt(s.prep["deleteRelay"]).Exec(deviceID.String())
2015-07-22 00:56:27 +02:00
if err != nil {
2015-09-13 11:44:33 +02:00
internalErr = err
return
2015-07-22 00:56:27 +02:00
}
2015-09-13 11:44:33 +02:00
for _, relay := range relays {
uri, err := url.Parse(relay.URL)
2015-03-25 08:16:52 +01:00
if err != nil {
2015-09-13 11:44:33 +02:00
userErr = err
return
2015-03-25 08:16:52 +01:00
}
2015-09-13 11:44:33 +02:00
_, err = tx.Stmt(s.prep["insertRelay"]).Exec(deviceID.String(), uri.String(), relay.Latency)
2015-03-25 08:16:52 +01:00
if err != nil {
2015-09-13 11:44:33 +02:00
internalErr = err
return
2015-03-25 08:16:52 +01:00
}
2015-09-13 11:44:33 +02:00
}
2015-03-25 08:16:52 +01:00
2015-09-13 11:44:33 +02:00
if err := s.updateDevice(tx, deviceID); err != nil {
internalErr = err
return
2015-03-25 08:16:52 +01:00
}
2015-09-13 11:44:33 +02:00
internalErr = tx.Commit()
return
2015-03-25 08:16:52 +01:00
}
2015-09-13 11:44:33 +02:00
func (s *querysrv) limit(remote net.IP) bool {
key := remote.String()
2015-03-25 08:16:52 +01:00
bkt, ok := s.limiter.Get(key)
if ok {
bkt := bkt.(*ratelimit.Bucket)
if bkt.TakeAvailable(1) != 1 {
// Rate limit exceeded; ignore packet
return true
}
} else {
// One packet per ten seconds average rate, burst ten packets
s.limiter.Add(key, ratelimit.NewBucket(10*time.Second/time.Duration(limitAvg), int64(limitBurst)))
}
return false
}
func (s *querysrv) updateDevice(tx *sql.Tx, device protocol.DeviceID) error {
res, err := tx.Stmt(s.prep["updateDevice"]).Exec(device.String())
if err != nil {
return err
}
if rows, _ := res.RowsAffected(); rows == 0 {
_, err := tx.Stmt(s.prep["insertDevice"]).Exec(device.String())
if err != nil {
return err
}
}
return nil
}
2015-07-22 00:56:27 +02:00
func (s *querysrv) updateAddress(tx *sql.Tx, device protocol.DeviceID, uri string) error {
res, err := tx.Stmt(s.prep["updateAddress"]).Exec(device.String(), uri)
2015-03-25 08:16:52 +01:00
if err != nil {
return err
}
if rows, _ := res.RowsAffected(); rows == 0 {
2015-07-22 00:56:27 +02:00
_, err := tx.Stmt(s.prep["insertAddress"]).Exec(device.String(), uri)
2015-03-25 08:16:52 +01:00
if err != nil {
return err
}
}
return nil
}
2015-07-22 00:56:27 +02:00
func (s *querysrv) getAddresses(device protocol.DeviceID) ([]string, error) {
2015-03-25 08:16:52 +01:00
rows, err := s.prep["selectAddress"].Query(device.String())
if err != nil {
return nil, err
}
2015-07-22 00:56:27 +02:00
var res []string
2015-03-25 08:16:52 +01:00
for rows.Next() {
var addr string
2015-07-22 00:56:27 +02:00
err := rows.Scan(&addr)
2015-03-25 08:16:52 +01:00
if err != nil {
log.Println("Scan:", err)
continue
}
2015-07-22 00:56:27 +02:00
res = append(res, addr)
}
return res, nil
}
2015-09-13 11:44:33 +02:00
func (s *querysrv) getRelays(device protocol.DeviceID) ([]annRelay, error) {
2015-07-22 00:56:27 +02:00
rows, err := s.prep["selectRelay"].Query(device.String())
if err != nil {
return nil, err
}
2015-09-13 11:44:33 +02:00
var res []annRelay
2015-07-22 00:56:27 +02:00
for rows.Next() {
2015-09-13 11:44:33 +02:00
var rel annRelay
2015-07-22 00:56:27 +02:00
2015-09-13 11:44:33 +02:00
err := rows.Scan(&rel.URL, &rel.Latency)
2015-07-22 00:56:27 +02:00
if err != nil {
2015-09-13 11:44:33 +02:00
return nil, err
2015-03-25 08:16:52 +01:00
}
2015-09-13 11:44:33 +02:00
res = append(res, rel)
2015-03-25 08:16:52 +01:00
}
return res, nil
}
2015-09-21 12:49:17 +02:00
func handlePing(w http.ResponseWriter, r *http.Request) {
w.WriteHeader(204)
}