upgrade_supported.go 7.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334
  1. // Copyright (C) 2014 The Syncthing Authors.
  2. //
  3. // This Source Code Form is subject to the terms of the Mozilla Public
  4. // License, v. 2.0. If a copy of the MPL was not distributed with this file,
  5. // You can obtain one at http://mozilla.org/MPL/2.0/.
  6. // +build !noupgrade
  7. package upgrade
  8. import (
  9. "archive/tar"
  10. "archive/zip"
  11. "bytes"
  12. "compress/gzip"
  13. "crypto/tls"
  14. "encoding/json"
  15. "fmt"
  16. "io"
  17. "io/ioutil"
  18. "net/http"
  19. "os"
  20. "path"
  21. "path/filepath"
  22. "runtime"
  23. "sort"
  24. "strings"
  25. "github.com/syncthing/syncthing/lib/dialer"
  26. "github.com/syncthing/syncthing/lib/signature"
  27. )
  28. const DisabledByCompilation = false
  29. // This is an HTTP/HTTPS client that does *not* perform certificate
  30. // validation. We do this because some systems where Syncthing runs have
  31. // issues with old or missing CA roots. It doesn't actually matter that we
  32. // load the upgrade insecurely as we verify an ECDSA signature of the actual
  33. // binary contents before accepting the upgrade.
  34. var insecureHTTP = &http.Client{
  35. Transport: &http.Transport{
  36. Dial: dialer.Dial,
  37. Proxy: http.ProxyFromEnvironment,
  38. TLSClientConfig: &tls.Config{
  39. InsecureSkipVerify: true,
  40. },
  41. },
  42. }
  43. // FetchLatestReleases returns the latest releases, including prereleases or
  44. // not depending on the argument
  45. func FetchLatestReleases(releasesURL, version string) []Release {
  46. resp, err := insecureHTTP.Get(releasesURL)
  47. if err != nil {
  48. l.Infoln("Couldn't fetch release information:", err)
  49. return nil
  50. }
  51. if resp.StatusCode > 299 {
  52. l.Infoln("API call returned HTTP error: %s", resp.Status)
  53. return nil
  54. }
  55. var rels []Release
  56. json.NewDecoder(resp.Body).Decode(&rels)
  57. resp.Body.Close()
  58. return rels
  59. }
  60. type SortByRelease []Release
  61. func (s SortByRelease) Len() int {
  62. return len(s)
  63. }
  64. func (s SortByRelease) Swap(i, j int) {
  65. s[i], s[j] = s[j], s[i]
  66. }
  67. func (s SortByRelease) Less(i, j int) bool {
  68. return CompareVersions(s[i].Tag, s[j].Tag) > 0
  69. }
  70. func LatestRelease(releasesURL, version string) (Release, error) {
  71. rels := FetchLatestReleases(releasesURL, version)
  72. return SelectLatestRelease(version, rels)
  73. }
  74. func SelectLatestRelease(version string, rels []Release) (Release, error) {
  75. if len(rels) == 0 {
  76. return Release{}, ErrNoVersionToSelect
  77. }
  78. sort.Sort(SortByRelease(rels))
  79. // Check for a beta build
  80. beta := strings.Contains(version, "-")
  81. for _, rel := range rels {
  82. if rel.Prerelease && !beta {
  83. continue
  84. }
  85. for _, asset := range rel.Assets {
  86. assetName := path.Base(asset.Name)
  87. // Check for the architecture
  88. expectedRelease := releaseName(rel.Tag)
  89. l.Debugf("expected release asset %q", expectedRelease)
  90. l.Debugln("considering release", assetName)
  91. if strings.HasPrefix(assetName, expectedRelease) {
  92. return rel, nil
  93. }
  94. }
  95. }
  96. return Release{}, ErrNoReleaseDownload
  97. }
  98. // Upgrade to the given release, saving the previous binary with a ".old" extension.
  99. func upgradeTo(binary string, rel Release) error {
  100. expectedRelease := releaseName(rel.Tag)
  101. l.Debugf("expected release asset %q", expectedRelease)
  102. for _, asset := range rel.Assets {
  103. assetName := path.Base(asset.Name)
  104. l.Debugln("considering release", assetName)
  105. if strings.HasPrefix(assetName, expectedRelease) {
  106. return upgradeToURL(binary, asset.URL)
  107. }
  108. }
  109. return ErrNoReleaseDownload
  110. }
  111. // Upgrade to the given release, saving the previous binary with a ".old" extension.
  112. func upgradeToURL(binary string, url string) error {
  113. fname, err := readRelease(filepath.Dir(binary), url)
  114. if err != nil {
  115. return err
  116. }
  117. old := binary + ".old"
  118. os.Remove(old)
  119. err = os.Rename(binary, old)
  120. if err != nil {
  121. return err
  122. }
  123. err = os.Rename(fname, binary)
  124. if err != nil {
  125. return err
  126. }
  127. return nil
  128. }
  129. func readRelease(dir, url string) (string, error) {
  130. l.Debugf("loading %q", url)
  131. req, err := http.NewRequest("GET", url, nil)
  132. if err != nil {
  133. return "", err
  134. }
  135. req.Header.Add("Accept", "application/octet-stream")
  136. resp, err := insecureHTTP.Do(req)
  137. if err != nil {
  138. return "", err
  139. }
  140. defer resp.Body.Close()
  141. switch runtime.GOOS {
  142. case "windows":
  143. return readZip(dir, resp.Body)
  144. default:
  145. return readTarGz(dir, resp.Body)
  146. }
  147. }
  148. func readTarGz(dir string, r io.Reader) (string, error) {
  149. gr, err := gzip.NewReader(r)
  150. if err != nil {
  151. return "", err
  152. }
  153. tr := tar.NewReader(gr)
  154. var tempName string
  155. var sig []byte
  156. // Iterate through the files in the archive.
  157. for {
  158. hdr, err := tr.Next()
  159. if err == io.EOF {
  160. // end of tar archive
  161. break
  162. }
  163. if err != nil {
  164. return "", err
  165. }
  166. err = archiveFileVisitor(dir, &tempName, &sig, hdr.Name, tr)
  167. if err != nil {
  168. return "", err
  169. }
  170. if tempName != "" && sig != nil {
  171. break
  172. }
  173. }
  174. if err := verifyUpgrade(tempName, sig); err != nil {
  175. return "", err
  176. }
  177. return tempName, nil
  178. }
  179. func readZip(dir string, r io.Reader) (string, error) {
  180. body, err := ioutil.ReadAll(r)
  181. if err != nil {
  182. return "", err
  183. }
  184. archive, err := zip.NewReader(bytes.NewReader(body), int64(len(body)))
  185. if err != nil {
  186. return "", err
  187. }
  188. var tempName string
  189. var sig []byte
  190. // Iterate through the files in the archive.
  191. for _, file := range archive.File {
  192. inFile, err := file.Open()
  193. if err != nil {
  194. return "", err
  195. }
  196. err = archiveFileVisitor(dir, &tempName, &sig, file.Name, inFile)
  197. inFile.Close()
  198. if err != nil {
  199. return "", err
  200. }
  201. if tempName != "" && sig != nil {
  202. break
  203. }
  204. }
  205. if err := verifyUpgrade(tempName, sig); err != nil {
  206. return "", err
  207. }
  208. return tempName, nil
  209. }
  210. // archiveFileVisitor is called for each file in an archive. It may set
  211. // tempFile and signature.
  212. func archiveFileVisitor(dir string, tempFile *string, signature *[]byte, archivePath string, filedata io.Reader) error {
  213. var err error
  214. filename := path.Base(archivePath)
  215. archiveDir := path.Dir(archivePath)
  216. archiveDirs := strings.Split(archiveDir, "/")
  217. if len(archiveDirs) > 1 {
  218. //don't consider files in subfolders
  219. return nil
  220. }
  221. l.Debugf("considering file %s", archivePath)
  222. switch filename {
  223. case "syncthing", "syncthing.exe":
  224. l.Debugf("found upgrade binary %s", archivePath)
  225. *tempFile, err = writeBinary(dir, filedata)
  226. if err != nil {
  227. return err
  228. }
  229. case "syncthing.sig", "syncthing.exe.sig":
  230. l.Debugf("found signature %s", archivePath)
  231. *signature, err = ioutil.ReadAll(filedata)
  232. if err != nil {
  233. return err
  234. }
  235. }
  236. return nil
  237. }
  238. func verifyUpgrade(tempName string, sig []byte) error {
  239. if tempName == "" {
  240. return fmt.Errorf("no upgrade found")
  241. }
  242. if sig == nil {
  243. return fmt.Errorf("no signature found")
  244. }
  245. l.Debugf("checking signature\n%s", sig)
  246. fd, err := os.Open(tempName)
  247. if err != nil {
  248. return err
  249. }
  250. err = signature.Verify(SigningKey, sig, fd)
  251. fd.Close()
  252. if err != nil {
  253. os.Remove(tempName)
  254. return err
  255. }
  256. return nil
  257. }
  258. func writeBinary(dir string, inFile io.Reader) (filename string, err error) {
  259. // Write the binary to a temporary file.
  260. outFile, err := ioutil.TempFile(dir, "syncthing")
  261. if err != nil {
  262. return "", err
  263. }
  264. _, err = io.Copy(outFile, inFile)
  265. if err != nil {
  266. os.Remove(outFile.Name())
  267. return "", err
  268. }
  269. err = outFile.Close()
  270. if err != nil {
  271. os.Remove(outFile.Name())
  272. return "", err
  273. }
  274. err = os.Chmod(outFile.Name(), os.FileMode(0755))
  275. if err != nil {
  276. os.Remove(outFile.Name())
  277. return "", err
  278. }
  279. return outFile.Name(), nil
  280. }