tcp_listen.go 4.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199
  1. // Copyright (C) 2016 The Syncthing Authors.
  2. //
  3. // This Source Code Form is subject to the terms of the Mozilla Public
  4. // License, v. 2.0. If a copy of the MPL was not distributed with this file,
  5. // You can obtain one at https://mozilla.org/MPL/2.0/.
  6. package connections
  7. import (
  8. "crypto/tls"
  9. "net"
  10. "net/url"
  11. "sync"
  12. "time"
  13. "github.com/syncthing/syncthing/lib/config"
  14. "github.com/syncthing/syncthing/lib/dialer"
  15. "github.com/syncthing/syncthing/lib/nat"
  16. )
  17. func init() {
  18. factory := &tcpListenerFactory{}
  19. for _, scheme := range []string{"tcp", "tcp4", "tcp6"} {
  20. listeners[scheme] = factory
  21. }
  22. }
  23. type tcpListener struct {
  24. onAddressesChangedNotifier
  25. uri *url.URL
  26. cfg *config.Wrapper
  27. tlsCfg *tls.Config
  28. stop chan struct{}
  29. conns chan internalConn
  30. factory listenerFactory
  31. natService *nat.Service
  32. mapping *nat.Mapping
  33. err error
  34. mut sync.RWMutex
  35. }
  36. func (t *tcpListener) Serve() {
  37. t.mut.Lock()
  38. t.err = nil
  39. t.mut.Unlock()
  40. tcaddr, err := net.ResolveTCPAddr(t.uri.Scheme, t.uri.Host)
  41. if err != nil {
  42. t.mut.Lock()
  43. t.err = err
  44. t.mut.Unlock()
  45. l.Infoln("listen (BEP/tcp):", err)
  46. return
  47. }
  48. listener, err := net.ListenTCP(t.uri.Scheme, tcaddr)
  49. if err != nil {
  50. t.mut.Lock()
  51. t.err = err
  52. t.mut.Unlock()
  53. l.Infoln("listen (BEP/tcp):", err)
  54. return
  55. }
  56. defer listener.Close()
  57. l.Infof("TCP listener (%v) starting", listener.Addr())
  58. defer l.Infof("TCP listener (%v) shutting down", listener.Addr())
  59. mapping := t.natService.NewMapping(nat.TCP, tcaddr.IP, tcaddr.Port)
  60. mapping.OnChanged(func(_ *nat.Mapping, _, _ []nat.Address) {
  61. t.notifyAddressesChanged(t)
  62. })
  63. defer t.natService.RemoveMapping(mapping)
  64. t.mut.Lock()
  65. t.mapping = mapping
  66. t.mut.Unlock()
  67. for {
  68. listener.SetDeadline(time.Now().Add(time.Second))
  69. conn, err := listener.Accept()
  70. select {
  71. case <-t.stop:
  72. if err == nil {
  73. conn.Close()
  74. }
  75. t.mut.Lock()
  76. t.mapping = nil
  77. t.mut.Unlock()
  78. return
  79. default:
  80. }
  81. if err != nil {
  82. if err, ok := err.(*net.OpError); !ok || !err.Timeout() {
  83. l.Warnln("Accepting connection (BEP/tcp):", err)
  84. }
  85. continue
  86. }
  87. l.Debugln("connect from", conn.RemoteAddr())
  88. err = dialer.SetTCPOptions(conn)
  89. if err != nil {
  90. l.Infoln(err)
  91. }
  92. err = dialer.SetTrafficClass(conn, t.cfg.Options().TrafficClass)
  93. if err != nil {
  94. l.Debugf("failed to set traffic class: %s", err)
  95. }
  96. tc := tls.Server(conn, t.tlsCfg)
  97. err = tlsTimedHandshake(tc)
  98. if err != nil {
  99. l.Infoln("TLS handshake (BEP/tcp):", err)
  100. tc.Close()
  101. continue
  102. }
  103. t.conns <- internalConn{tc, connTypeTCPServer, tcpPriority}
  104. }
  105. }
  106. func (t *tcpListener) Stop() {
  107. close(t.stop)
  108. }
  109. func (t *tcpListener) URI() *url.URL {
  110. return t.uri
  111. }
  112. func (t *tcpListener) WANAddresses() []*url.URL {
  113. uris := t.LANAddresses()
  114. t.mut.RLock()
  115. if t.mapping != nil {
  116. addrs := t.mapping.ExternalAddresses()
  117. for _, addr := range addrs {
  118. uri := *t.uri
  119. // Does net.JoinHostPort internally
  120. uri.Host = addr.String()
  121. uris = append(uris, &uri)
  122. // For every address with a specified IP, add one without an IP,
  123. // just in case the specified IP is still internal (router behind DMZ).
  124. if len(addr.IP) != 0 && !addr.IP.IsUnspecified() {
  125. uri = *t.uri
  126. addr.IP = nil
  127. uri.Host = addr.String()
  128. uris = append(uris, &uri)
  129. }
  130. }
  131. }
  132. t.mut.RUnlock()
  133. return uris
  134. }
  135. func (t *tcpListener) LANAddresses() []*url.URL {
  136. return []*url.URL{t.uri}
  137. }
  138. func (t *tcpListener) Error() error {
  139. t.mut.RLock()
  140. err := t.err
  141. t.mut.RUnlock()
  142. return err
  143. }
  144. func (t *tcpListener) String() string {
  145. return t.uri.String()
  146. }
  147. func (t *tcpListener) Factory() listenerFactory {
  148. return t.factory
  149. }
  150. func (t *tcpListener) NATType() string {
  151. return "unknown"
  152. }
  153. type tcpListenerFactory struct{}
  154. func (f *tcpListenerFactory) New(uri *url.URL, cfg *config.Wrapper, tlsCfg *tls.Config, conns chan internalConn, natService *nat.Service) genericListener {
  155. return &tcpListener{
  156. uri: fixupPort(uri, config.DefaultTCPPort),
  157. cfg: cfg,
  158. tlsCfg: tlsCfg,
  159. conns: conns,
  160. natService: natService,
  161. stop: make(chan struct{}),
  162. factory: f,
  163. }
  164. }
  165. func (tcpListenerFactory) Enabled(cfg config.Configuration) bool {
  166. return true
  167. }