upgrade_supported.go 7.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349
  1. // Copyright (C) 2014 The Syncthing Authors.
  2. //
  3. // This Source Code Form is subject to the terms of the Mozilla Public
  4. // License, v. 2.0. If a copy of the MPL was not distributed with this file,
  5. // You can obtain one at http://mozilla.org/MPL/2.0/.
  6. // +build !noupgrade
  7. package upgrade
  8. import (
  9. "archive/tar"
  10. "archive/zip"
  11. "bytes"
  12. "compress/gzip"
  13. "crypto/tls"
  14. "encoding/json"
  15. "fmt"
  16. "io"
  17. "io/ioutil"
  18. "net/http"
  19. "os"
  20. "path"
  21. "path/filepath"
  22. "runtime"
  23. "sort"
  24. "strings"
  25. "github.com/syncthing/syncthing/lib/signature"
  26. )
  27. const DisabledByCompilation = false
  28. // This is an HTTP/HTTPS client that does *not* perform certificate
  29. // validation. We do this because some systems where Syncthing runs have
  30. // issues with old or missing CA roots. It doesn't actually matter that we
  31. // load the upgrade insecurely as we verify an ECDSA signature of the actual
  32. // binary contents before accepting the upgrade.
  33. var insecureHTTP = &http.Client{
  34. Transport: &http.Transport{
  35. TLSClientConfig: &tls.Config{
  36. InsecureSkipVerify: true,
  37. },
  38. },
  39. }
  40. // LatestGithubReleases returns the latest releases, including prereleases or
  41. // not depending on the argument
  42. func LatestGithubReleases(version string) ([]Release, error) {
  43. resp, err := insecureHTTP.Get("https://api.github.com/repos/syncthing/syncthing/releases?per_page=30")
  44. if err != nil {
  45. return nil, err
  46. }
  47. if resp.StatusCode > 299 {
  48. return nil, fmt.Errorf("API call returned HTTP error: %s", resp.Status)
  49. }
  50. var rels []Release
  51. json.NewDecoder(resp.Body).Decode(&rels)
  52. resp.Body.Close()
  53. return rels, nil
  54. }
  55. type SortByRelease []Release
  56. func (s SortByRelease) Len() int {
  57. return len(s)
  58. }
  59. func (s SortByRelease) Swap(i, j int) {
  60. s[i], s[j] = s[j], s[i]
  61. }
  62. func (s SortByRelease) Less(i, j int) bool {
  63. return CompareVersions(s[i].Tag, s[j].Tag) > 0
  64. }
  65. func LatestRelease(version string) (Release, error) {
  66. rels, _ := LatestGithubReleases(version)
  67. return SelectLatestRelease(version, rels)
  68. }
  69. func SelectLatestRelease(version string, rels []Release) (Release, error) {
  70. if len(rels) == 0 {
  71. return Release{}, ErrVersionUnknown
  72. }
  73. sort.Sort(SortByRelease(rels))
  74. // Check for a beta build
  75. beta := strings.Contains(version, "-beta")
  76. for _, rel := range rels {
  77. if rel.Prerelease && !beta {
  78. continue
  79. }
  80. for _, asset := range rel.Assets {
  81. assetName := path.Base(asset.Name)
  82. // Check for the architecture
  83. expectedRelease := releaseName(rel.Tag)
  84. if debug {
  85. l.Debugf("expected release asset %q", expectedRelease)
  86. }
  87. if debug {
  88. l.Debugln("considering release", assetName)
  89. }
  90. if strings.HasPrefix(assetName, expectedRelease) {
  91. return rel, nil
  92. }
  93. }
  94. }
  95. return Release{}, ErrVersionUnknown
  96. }
  97. // Upgrade to the given release, saving the previous binary with a ".old" extension.
  98. func upgradeTo(binary string, rel Release) error {
  99. expectedRelease := releaseName(rel.Tag)
  100. if debug {
  101. l.Debugf("expected release asset %q", expectedRelease)
  102. }
  103. for _, asset := range rel.Assets {
  104. assetName := path.Base(asset.Name)
  105. if debug {
  106. l.Debugln("considering release", assetName)
  107. }
  108. if strings.HasPrefix(assetName, expectedRelease) {
  109. return upgradeToURL(binary, asset.URL)
  110. }
  111. }
  112. return ErrVersionUnknown
  113. }
  114. // Upgrade to the given release, saving the previous binary with a ".old" extension.
  115. func upgradeToURL(binary string, url string) error {
  116. fname, err := readRelease(filepath.Dir(binary), url)
  117. if err != nil {
  118. return err
  119. }
  120. old := binary + ".old"
  121. os.Remove(old)
  122. err = os.Rename(binary, old)
  123. if err != nil {
  124. return err
  125. }
  126. err = os.Rename(fname, binary)
  127. if err != nil {
  128. return err
  129. }
  130. return nil
  131. }
  132. func readRelease(dir, url string) (string, error) {
  133. if debug {
  134. l.Debugf("loading %q", url)
  135. }
  136. req, err := http.NewRequest("GET", url, nil)
  137. if err != nil {
  138. return "", err
  139. }
  140. req.Header.Add("Accept", "application/octet-stream")
  141. resp, err := insecureHTTP.Do(req)
  142. if err != nil {
  143. return "", err
  144. }
  145. defer resp.Body.Close()
  146. switch runtime.GOOS {
  147. case "windows":
  148. return readZip(dir, resp.Body)
  149. default:
  150. return readTarGz(dir, resp.Body)
  151. }
  152. }
  153. func readTarGz(dir string, r io.Reader) (string, error) {
  154. gr, err := gzip.NewReader(r)
  155. if err != nil {
  156. return "", err
  157. }
  158. tr := tar.NewReader(gr)
  159. var tempName string
  160. var sig []byte
  161. // Iterate through the files in the archive.
  162. for {
  163. hdr, err := tr.Next()
  164. if err == io.EOF {
  165. // end of tar archive
  166. break
  167. }
  168. if err != nil {
  169. return "", err
  170. }
  171. shortName := path.Base(hdr.Name)
  172. if debug {
  173. l.Debugf("considering file %q", shortName)
  174. }
  175. err = archiveFileVisitor(dir, &tempName, &sig, shortName, tr)
  176. if err != nil {
  177. return "", err
  178. }
  179. if tempName != "" && sig != nil {
  180. break
  181. }
  182. }
  183. if err := verifyUpgrade(tempName, sig); err != nil {
  184. return "", err
  185. }
  186. return tempName, nil
  187. }
  188. func readZip(dir string, r io.Reader) (string, error) {
  189. body, err := ioutil.ReadAll(r)
  190. if err != nil {
  191. return "", err
  192. }
  193. archive, err := zip.NewReader(bytes.NewReader(body), int64(len(body)))
  194. if err != nil {
  195. return "", err
  196. }
  197. var tempName string
  198. var sig []byte
  199. // Iterate through the files in the archive.
  200. for _, file := range archive.File {
  201. shortName := path.Base(file.Name)
  202. if debug {
  203. l.Debugf("considering file %q", shortName)
  204. }
  205. inFile, err := file.Open()
  206. if err != nil {
  207. return "", err
  208. }
  209. err = archiveFileVisitor(dir, &tempName, &sig, shortName, inFile)
  210. inFile.Close()
  211. if err != nil {
  212. return "", err
  213. }
  214. if tempName != "" && sig != nil {
  215. break
  216. }
  217. }
  218. if err := verifyUpgrade(tempName, sig); err != nil {
  219. return "", err
  220. }
  221. return tempName, nil
  222. }
  223. // archiveFileVisitor is called for each file in an archive. It may set
  224. // tempFile and signature.
  225. func archiveFileVisitor(dir string, tempFile *string, signature *[]byte, filename string, filedata io.Reader) error {
  226. var err error
  227. switch filename {
  228. case "syncthing", "syncthing.exe":
  229. if debug {
  230. l.Debugln("reading binary")
  231. }
  232. *tempFile, err = writeBinary(dir, filedata)
  233. if err != nil {
  234. return err
  235. }
  236. case "syncthing.sig", "syncthing.exe.sig":
  237. if debug {
  238. l.Debugln("reading signature")
  239. }
  240. *signature, err = ioutil.ReadAll(filedata)
  241. if err != nil {
  242. return err
  243. }
  244. }
  245. return nil
  246. }
  247. func verifyUpgrade(tempName string, sig []byte) error {
  248. if tempName == "" {
  249. return fmt.Errorf("no upgrade found")
  250. }
  251. if sig == nil {
  252. return fmt.Errorf("no signature found")
  253. }
  254. if debug {
  255. l.Debugf("checking signature\n%s", sig)
  256. }
  257. fd, err := os.Open(tempName)
  258. if err != nil {
  259. return err
  260. }
  261. err = signature.Verify(SigningKey, sig, fd)
  262. fd.Close()
  263. if err != nil {
  264. os.Remove(tempName)
  265. return err
  266. }
  267. return nil
  268. }
  269. func writeBinary(dir string, inFile io.Reader) (filename string, err error) {
  270. // Write the binary to a temporary file.
  271. outFile, err := ioutil.TempFile(dir, "syncthing")
  272. if err != nil {
  273. return "", err
  274. }
  275. _, err = io.Copy(outFile, inFile)
  276. if err != nil {
  277. os.Remove(outFile.Name())
  278. return "", err
  279. }
  280. err = outFile.Close()
  281. if err != nil {
  282. os.Remove(outFile.Name())
  283. return "", err
  284. }
  285. err = os.Chmod(outFile.Name(), os.FileMode(0755))
  286. if err != nil {
  287. os.Remove(outFile.Name())
  288. return "", err
  289. }
  290. return outFile.Name(), nil
  291. }