2016-05-04 21:38:12 +02:00
|
|
|
// Copyright (C) 2016 The Syncthing Authors.
|
|
|
|
//
|
|
|
|
// This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
// License, v. 2.0. If a copy of the MPL was not distributed with this file,
|
2017-02-09 07:52:18 +01:00
|
|
|
// You can obtain one at https://mozilla.org/MPL/2.0/.
|
2016-05-04 21:38:12 +02:00
|
|
|
|
|
|
|
package connections
|
|
|
|
|
|
|
|
import (
|
2019-11-21 08:41:15 +01:00
|
|
|
"context"
|
2016-05-04 21:38:12 +02:00
|
|
|
"crypto/tls"
|
|
|
|
"net"
|
|
|
|
"net/url"
|
|
|
|
"sync"
|
|
|
|
"time"
|
|
|
|
|
2016-05-17 02:05:38 +02:00
|
|
|
"github.com/syncthing/syncthing/lib/config"
|
2020-06-16 09:17:07 +02:00
|
|
|
"github.com/syncthing/syncthing/lib/connections/registry"
|
2016-05-04 21:38:12 +02:00
|
|
|
"github.com/syncthing/syncthing/lib/dialer"
|
|
|
|
"github.com/syncthing/syncthing/lib/nat"
|
2020-12-22 20:17:14 +01:00
|
|
|
"github.com/syncthing/syncthing/lib/svcutil"
|
2016-05-04 21:38:12 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
func init() {
|
2016-05-17 02:05:38 +02:00
|
|
|
factory := &tcpListenerFactory{}
|
2016-05-04 21:38:12 +02:00
|
|
|
for _, scheme := range []string{"tcp", "tcp4", "tcp6"} {
|
2016-05-17 02:05:38 +02:00
|
|
|
listeners[scheme] = factory
|
2016-05-04 21:38:12 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
type tcpListener struct {
|
2020-12-22 20:17:14 +01:00
|
|
|
svcutil.ServiceWithError
|
2016-05-04 21:38:12 +02:00
|
|
|
onAddressesChangedNotifier
|
|
|
|
|
2016-05-17 02:05:38 +02:00
|
|
|
uri *url.URL
|
2019-02-26 09:09:25 +01:00
|
|
|
cfg config.Wrapper
|
2016-05-17 02:05:38 +02:00
|
|
|
tlsCfg *tls.Config
|
2016-11-30 08:54:20 +01:00
|
|
|
conns chan internalConn
|
2016-05-17 02:05:38 +02:00
|
|
|
factory listenerFactory
|
2016-05-04 21:38:12 +02:00
|
|
|
|
|
|
|
natService *nat.Service
|
|
|
|
mapping *nat.Mapping
|
2021-05-10 16:44:47 +02:00
|
|
|
laddr net.Addr
|
2016-05-04 21:38:12 +02:00
|
|
|
|
2016-05-12 22:43:11 +02:00
|
|
|
mut sync.RWMutex
|
2016-05-04 21:38:12 +02:00
|
|
|
}
|
|
|
|
|
2019-11-21 08:41:15 +01:00
|
|
|
func (t *tcpListener) serve(ctx context.Context) error {
|
2016-05-04 21:38:12 +02:00
|
|
|
tcaddr, err := net.ResolveTCPAddr(t.uri.Scheme, t.uri.Host)
|
|
|
|
if err != nil {
|
2017-11-14 22:49:36 +01:00
|
|
|
l.Infoln("Listen (BEP/tcp):", err)
|
2019-07-09 11:40:30 +02:00
|
|
|
return err
|
2016-05-04 21:38:12 +02:00
|
|
|
}
|
|
|
|
|
2020-06-16 09:17:07 +02:00
|
|
|
lc := net.ListenConfig{
|
|
|
|
Control: dialer.ReusePortControl,
|
|
|
|
}
|
|
|
|
|
|
|
|
listener, err := lc.Listen(context.TODO(), t.uri.Scheme, tcaddr.String())
|
2016-05-04 21:38:12 +02:00
|
|
|
if err != nil {
|
2017-11-14 22:49:36 +01:00
|
|
|
l.Infoln("Listen (BEP/tcp):", err)
|
2019-07-09 11:40:30 +02:00
|
|
|
return err
|
2016-05-04 21:38:12 +02:00
|
|
|
}
|
2021-05-10 22:29:27 +02:00
|
|
|
defer listener.Close()
|
2021-05-10 16:44:47 +02:00
|
|
|
|
|
|
|
// We might bind to :0, so use the port we've been given.
|
|
|
|
tcaddr = listener.Addr().(*net.TCPAddr)
|
|
|
|
|
2020-05-11 15:02:22 +02:00
|
|
|
t.notifyAddressesChanged(t)
|
2021-05-10 22:29:27 +02:00
|
|
|
defer t.clearAddresses(t)
|
|
|
|
|
2020-06-16 09:17:07 +02:00
|
|
|
registry.Register(t.uri.Scheme, tcaddr)
|
2021-05-10 22:29:27 +02:00
|
|
|
defer registry.Unregister(t.uri.Scheme, tcaddr)
|
2020-06-16 09:17:07 +02:00
|
|
|
|
2021-05-10 16:44:47 +02:00
|
|
|
l.Infof("TCP listener (%v) starting", tcaddr)
|
2021-05-10 22:29:27 +02:00
|
|
|
defer l.Infof("TCP listener (%v) shutting down", tcaddr)
|
2016-05-17 02:05:38 +02:00
|
|
|
|
2016-05-04 21:38:12 +02:00
|
|
|
mapping := t.natService.NewMapping(nat.TCP, tcaddr.IP, tcaddr.Port)
|
|
|
|
mapping.OnChanged(func(_ *nat.Mapping, _, _ []nat.Address) {
|
|
|
|
t.notifyAddressesChanged(t)
|
|
|
|
})
|
2021-05-10 22:29:27 +02:00
|
|
|
// Should be called after t.mapping is nil'ed out.
|
|
|
|
defer t.natService.RemoveMapping(mapping)
|
2016-05-04 21:38:12 +02:00
|
|
|
|
|
|
|
t.mut.Lock()
|
|
|
|
t.mapping = mapping
|
2021-05-10 16:44:47 +02:00
|
|
|
t.laddr = tcaddr
|
2016-05-04 21:38:12 +02:00
|
|
|
t.mut.Unlock()
|
2021-05-10 16:44:47 +02:00
|
|
|
defer func() {
|
|
|
|
t.mut.Lock()
|
2021-05-10 22:29:27 +02:00
|
|
|
t.mapping = nil
|
2021-05-10 16:44:47 +02:00
|
|
|
t.laddr = nil
|
|
|
|
t.mut.Unlock()
|
|
|
|
}()
|
|
|
|
|
2018-06-27 08:24:30 +02:00
|
|
|
acceptFailures := 0
|
|
|
|
const maxAcceptFailures = 10
|
|
|
|
|
2020-06-16 09:17:07 +02:00
|
|
|
// :(, but what can you do.
|
|
|
|
tcpListener := listener.(*net.TCPListener)
|
|
|
|
|
2016-05-04 21:38:12 +02:00
|
|
|
for {
|
2020-06-16 09:17:07 +02:00
|
|
|
_ = tcpListener.SetDeadline(time.Now().Add(time.Second))
|
|
|
|
conn, err := tcpListener.Accept()
|
2016-05-04 21:38:12 +02:00
|
|
|
select {
|
2019-11-21 08:41:15 +01:00
|
|
|
case <-ctx.Done():
|
2016-05-04 21:38:12 +02:00
|
|
|
if err == nil {
|
|
|
|
conn.Close()
|
|
|
|
}
|
2019-07-09 11:40:30 +02:00
|
|
|
return nil
|
2016-05-04 21:38:12 +02:00
|
|
|
default:
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
if err, ok := err.(*net.OpError); !ok || !err.Timeout() {
|
2017-11-14 22:49:36 +01:00
|
|
|
l.Warnln("Listen (BEP/tcp): Accepting connection:", err)
|
2018-06-27 08:24:30 +02:00
|
|
|
|
|
|
|
acceptFailures++
|
|
|
|
if acceptFailures > maxAcceptFailures {
|
|
|
|
// Return to restart the listener, because something
|
|
|
|
// seems permanently damaged.
|
2019-07-09 11:40:30 +02:00
|
|
|
return err
|
2018-06-27 08:24:30 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Slightly increased delay for each failure.
|
|
|
|
time.Sleep(time.Duration(acceptFailures) * time.Second)
|
2016-05-04 21:38:12 +02:00
|
|
|
}
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2018-06-27 08:24:30 +02:00
|
|
|
acceptFailures = 0
|
2017-11-14 22:49:36 +01:00
|
|
|
l.Debugln("Listen (BEP/tcp): connect from", conn.RemoteAddr())
|
2016-05-04 21:38:12 +02:00
|
|
|
|
2017-11-19 18:38:13 +01:00
|
|
|
if err := dialer.SetTCPOptions(conn); err != nil {
|
2017-11-14 22:49:36 +01:00
|
|
|
l.Debugln("Listen (BEP/tcp): setting tcp options:", err)
|
2016-05-04 21:38:12 +02:00
|
|
|
}
|
|
|
|
|
2017-11-19 18:38:13 +01:00
|
|
|
if tc := t.cfg.Options().TrafficClass; tc != 0 {
|
|
|
|
if err := dialer.SetTrafficClass(conn, tc); err != nil {
|
|
|
|
l.Debugln("Listen (BEP/tcp): setting traffic class:", err)
|
|
|
|
}
|
2016-12-20 21:14:52 +01:00
|
|
|
}
|
|
|
|
|
2016-05-04 21:38:12 +02:00
|
|
|
tc := tls.Server(conn, t.tlsCfg)
|
2017-11-19 18:38:13 +01:00
|
|
|
if err := tlsTimedHandshake(tc); err != nil {
|
2017-11-14 22:49:36 +01:00
|
|
|
l.Infoln("Listen (BEP/tcp): TLS handshake:", err)
|
2016-05-04 21:38:12 +02:00
|
|
|
tc.Close()
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2021-01-05 17:45:07 +01:00
|
|
|
t.conns <- newInternalConn(tc, connTypeTCPServer, tcpPriority)
|
2016-05-04 21:38:12 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (t *tcpListener) URI() *url.URL {
|
|
|
|
return t.uri
|
|
|
|
}
|
|
|
|
|
|
|
|
func (t *tcpListener) WANAddresses() []*url.URL {
|
|
|
|
t.mut.RLock()
|
2021-05-10 16:44:47 +02:00
|
|
|
uris := []*url.URL{
|
|
|
|
maybeReplacePort(t.uri, t.laddr),
|
|
|
|
}
|
2016-05-04 21:38:12 +02:00
|
|
|
if t.mapping != nil {
|
|
|
|
addrs := t.mapping.ExternalAddresses()
|
|
|
|
for _, addr := range addrs {
|
|
|
|
uri := *t.uri
|
|
|
|
// Does net.JoinHostPort internally
|
|
|
|
uri.Host = addr.String()
|
|
|
|
uris = append(uris, &uri)
|
2016-05-27 08:28:46 +02:00
|
|
|
|
|
|
|
// For every address with a specified IP, add one without an IP,
|
|
|
|
// just in case the specified IP is still internal (router behind DMZ).
|
|
|
|
if len(addr.IP) != 0 && !addr.IP.IsUnspecified() {
|
|
|
|
uri = *t.uri
|
|
|
|
addr.IP = nil
|
|
|
|
uri.Host = addr.String()
|
|
|
|
uris = append(uris, &uri)
|
|
|
|
}
|
2016-05-04 21:38:12 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
t.mut.RUnlock()
|
2020-06-16 09:17:07 +02:00
|
|
|
|
|
|
|
// If we support ReusePort, add an unspecified zero port address, which will be resolved by the discovery server
|
|
|
|
// in hopes that TCP punch through works.
|
|
|
|
if dialer.SupportsReusePort {
|
|
|
|
uri := *t.uri
|
|
|
|
uri.Host = "0.0.0.0:0"
|
|
|
|
uris = append([]*url.URL{&uri}, uris...)
|
|
|
|
}
|
2016-05-04 21:38:12 +02:00
|
|
|
return uris
|
|
|
|
}
|
|
|
|
|
|
|
|
func (t *tcpListener) LANAddresses() []*url.URL {
|
2021-05-10 16:44:47 +02:00
|
|
|
t.mut.RLock()
|
|
|
|
uri := maybeReplacePort(t.uri, t.laddr)
|
|
|
|
t.mut.RUnlock()
|
|
|
|
addrs := []*url.URL{uri}
|
|
|
|
addrs = append(addrs, getURLsForAllAdaptersIfUnspecified(uri.Scheme, uri)...)
|
2020-08-25 11:48:14 +02:00
|
|
|
return addrs
|
2016-05-04 21:38:12 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
func (t *tcpListener) String() string {
|
|
|
|
return t.uri.String()
|
|
|
|
}
|
|
|
|
|
2016-05-17 02:05:38 +02:00
|
|
|
func (t *tcpListener) Factory() listenerFactory {
|
|
|
|
return t.factory
|
|
|
|
}
|
|
|
|
|
2017-10-12 08:16:46 +02:00
|
|
|
func (t *tcpListener) NATType() string {
|
|
|
|
return "unknown"
|
|
|
|
}
|
|
|
|
|
2016-05-17 02:05:38 +02:00
|
|
|
type tcpListenerFactory struct{}
|
|
|
|
|
2019-02-26 09:09:25 +01:00
|
|
|
func (f *tcpListenerFactory) New(uri *url.URL, cfg config.Wrapper, tlsCfg *tls.Config, conns chan internalConn, natService *nat.Service) genericListener {
|
2019-07-09 11:40:30 +02:00
|
|
|
l := &tcpListener{
|
2017-03-07 13:44:16 +01:00
|
|
|
uri: fixupPort(uri, config.DefaultTCPPort),
|
2016-12-20 21:14:52 +01:00
|
|
|
cfg: cfg,
|
2016-05-04 21:38:12 +02:00
|
|
|
tlsCfg: tlsCfg,
|
|
|
|
conns: conns,
|
|
|
|
natService: natService,
|
2016-05-17 02:05:38 +02:00
|
|
|
factory: f,
|
|
|
|
}
|
2020-12-22 20:17:14 +01:00
|
|
|
l.ServiceWithError = svcutil.AsService(l.serve, l.String())
|
2019-07-09 11:40:30 +02:00
|
|
|
return l
|
2016-05-17 02:05:38 +02:00
|
|
|
}
|
|
|
|
|
2018-02-09 11:40:57 +01:00
|
|
|
func (tcpListenerFactory) Valid(_ config.Configuration) error {
|
|
|
|
// Always valid
|
|
|
|
return nil
|
2016-05-17 02:05:38 +02:00
|
|
|
}
|