model.go 103 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755275627572758275927602761276227632764276527662767276827692770277127722773277427752776277727782779278027812782278327842785278627872788278927902791279227932794279527962797279827992800280128022803280428052806280728082809281028112812281328142815281628172818281928202821282228232824282528262827282828292830283128322833283428352836283728382839284028412842284328442845284628472848284928502851285228532854285528562857285828592860286128622863286428652866286728682869287028712872287328742875287628772878287928802881288228832884288528862887288828892890289128922893289428952896289728982899290029012902290329042905290629072908290929102911291229132914291529162917291829192920292129222923292429252926292729282929293029312932293329342935293629372938293929402941294229432944294529462947294829492950295129522953295429552956295729582959296029612962296329642965296629672968296929702971297229732974297529762977297829792980298129822983298429852986298729882989299029912992299329942995299629972998299930003001300230033004300530063007300830093010301130123013301430153016301730183019302030213022302330243025302630273028302930303031303230333034303530363037303830393040304130423043304430453046304730483049305030513052305330543055305630573058305930603061306230633064306530663067306830693070307130723073307430753076307730783079308030813082308330843085308630873088308930903091309230933094309530963097309830993100310131023103310431053106310731083109311031113112311331143115311631173118311931203121312231233124312531263127312831293130313131323133313431353136313731383139314031413142314331443145314631473148314931503151315231533154315531563157315831593160316131623163316431653166316731683169317031713172317331743175317631773178317931803181318231833184318531863187318831893190319131923193319431953196319731983199320032013202320332043205320632073208320932103211321232133214321532163217321832193220322132223223322432253226322732283229323032313232323332343235323632373238323932403241324232433244324532463247324832493250325132523253325432553256325732583259326032613262326332643265326632673268326932703271327232733274327532763277327832793280328132823283328432853286328732883289329032913292329332943295329632973298329933003301330233033304330533063307330833093310331133123313331433153316331733183319332033213322332333243325332633273328332933303331333233333334
  1. // Copyright (C) 2014 The Syncthing Authors.
  2. //
  3. // This Source Code Form is subject to the terms of the Mozilla Public
  4. // License, v. 2.0. If a copy of the MPL was not distributed with this file,
  5. // You can obtain one at https://mozilla.org/MPL/2.0/.
  6. //go:generate -command counterfeiter go run github.com/maxbrunsfeld/counterfeiter/v6
  7. //go:generate counterfeiter -o mocks/model.go --fake-name Model . Model
  8. package model
  9. import (
  10. "bytes"
  11. "context"
  12. "encoding/json"
  13. "errors"
  14. "fmt"
  15. "io"
  16. "net"
  17. "os"
  18. "path/filepath"
  19. "reflect"
  20. "runtime"
  21. "strings"
  22. stdsync "sync"
  23. "sync/atomic"
  24. "time"
  25. "github.com/thejerf/suture/v4"
  26. "github.com/syncthing/syncthing/lib/build"
  27. "github.com/syncthing/syncthing/lib/config"
  28. "github.com/syncthing/syncthing/lib/connections"
  29. "github.com/syncthing/syncthing/lib/db"
  30. "github.com/syncthing/syncthing/lib/events"
  31. "github.com/syncthing/syncthing/lib/fs"
  32. "github.com/syncthing/syncthing/lib/ignore"
  33. "github.com/syncthing/syncthing/lib/osutil"
  34. "github.com/syncthing/syncthing/lib/protocol"
  35. "github.com/syncthing/syncthing/lib/scanner"
  36. "github.com/syncthing/syncthing/lib/semaphore"
  37. "github.com/syncthing/syncthing/lib/stats"
  38. "github.com/syncthing/syncthing/lib/svcutil"
  39. "github.com/syncthing/syncthing/lib/sync"
  40. "github.com/syncthing/syncthing/lib/ur/contract"
  41. "github.com/syncthing/syncthing/lib/versioner"
  42. )
  43. type service interface {
  44. suture.Service
  45. BringToFront(string)
  46. Override()
  47. Revert()
  48. DelayScan(d time.Duration)
  49. ScheduleScan()
  50. SchedulePull() // something relevant changed, we should try a pull
  51. Jobs(page, perpage int) ([]string, []string, int) // In progress, Queued, skipped
  52. Scan(subs []string) error
  53. Errors() []FileError
  54. WatchError() error
  55. ScheduleForceRescan(path string)
  56. GetStatistics() (stats.FolderStatistics, error)
  57. getState() (folderState, time.Time, error)
  58. }
  59. type Availability struct {
  60. ID protocol.DeviceID `json:"id"`
  61. FromTemporary bool `json:"fromTemporary"`
  62. }
  63. type Model interface {
  64. suture.Service
  65. connections.Model
  66. ResetFolder(folder string) error
  67. DelayScan(folder string, next time.Duration)
  68. ScanFolder(folder string) error
  69. ScanFolders() map[string]error
  70. ScanFolderSubdirs(folder string, subs []string) error
  71. State(folder string) (string, time.Time, error)
  72. FolderErrors(folder string) ([]FileError, error)
  73. WatchError(folder string) error
  74. Override(folder string)
  75. Revert(folder string)
  76. BringToFront(folder, file string)
  77. LoadIgnores(folder string) ([]string, []string, error)
  78. CurrentIgnores(folder string) ([]string, []string, error)
  79. SetIgnores(folder string, content []string) error
  80. GetFolderVersions(folder string) (map[string][]versioner.FileVersion, error)
  81. RestoreFolderVersions(folder string, versions map[string]time.Time) (map[string]error, error)
  82. DBSnapshot(folder string) (*db.Snapshot, error)
  83. NeedFolderFiles(folder string, page, perpage int) ([]db.FileInfoTruncated, []db.FileInfoTruncated, []db.FileInfoTruncated, error)
  84. RemoteNeedFolderFiles(folder string, device protocol.DeviceID, page, perpage int) ([]db.FileInfoTruncated, error)
  85. LocalChangedFolderFiles(folder string, page, perpage int) ([]db.FileInfoTruncated, error)
  86. FolderProgressBytesCompleted(folder string) int64
  87. CurrentFolderFile(folder string, file string) (protocol.FileInfo, bool, error)
  88. CurrentGlobalFile(folder string, file string) (protocol.FileInfo, bool, error)
  89. GetMtimeMapping(folder string, file string) (fs.MtimeMapping, error)
  90. Availability(folder string, file protocol.FileInfo, block protocol.BlockInfo) ([]Availability, error)
  91. Completion(device protocol.DeviceID, folder string) (FolderCompletion, error)
  92. ConnectionStats() map[string]interface{}
  93. DeviceStatistics() (map[protocol.DeviceID]stats.DeviceStatistics, error)
  94. FolderStatistics() (map[string]stats.FolderStatistics, error)
  95. UsageReportingStats(report *contract.Report, version int, preview bool)
  96. PendingDevices() (map[protocol.DeviceID]db.ObservedDevice, error)
  97. PendingFolders(device protocol.DeviceID) (map[string]db.PendingFolder, error)
  98. DismissPendingDevice(device protocol.DeviceID) error
  99. DismissPendingFolder(device protocol.DeviceID, folder string) error
  100. StartDeadlockDetector(timeout time.Duration)
  101. GlobalDirectoryTree(folder, prefix string, levels int, dirsOnly bool) ([]*TreeEntry, error)
  102. }
  103. type model struct {
  104. *suture.Supervisor
  105. // constructor parameters
  106. cfg config.Wrapper
  107. id protocol.DeviceID
  108. clientName string
  109. clientVersion string
  110. db *db.Lowlevel
  111. protectedFiles []string
  112. evLogger events.Logger
  113. // constant or concurrency safe fields
  114. finder *db.BlockFinder
  115. progressEmitter *ProgressEmitter
  116. shortID protocol.ShortID
  117. // globalRequestLimiter limits the amount of data in concurrent incoming
  118. // requests
  119. globalRequestLimiter *semaphore.Semaphore
  120. // folderIOLimiter limits the number of concurrent I/O heavy operations,
  121. // such as scans and pulls.
  122. folderIOLimiter *semaphore.Semaphore
  123. fatalChan chan error
  124. started chan struct{}
  125. keyGen *protocol.KeyGenerator
  126. // fields protected by fmut
  127. fmut sync.RWMutex
  128. folderCfgs map[string]config.FolderConfiguration // folder -> cfg
  129. folderFiles map[string]*db.FileSet // folder -> files
  130. deviceStatRefs map[protocol.DeviceID]*stats.DeviceStatisticsReference // deviceID -> statsRef
  131. folderIgnores map[string]*ignore.Matcher // folder -> matcher object
  132. folderRunners *serviceMap[string, service] // folder -> puller or scanner
  133. folderRestartMuts syncMutexMap // folder -> restart mutex
  134. folderVersioners map[string]versioner.Versioner // folder -> versioner (may be nil)
  135. folderEncryptionPasswordTokens map[string][]byte // folder -> encryption token (may be missing, and only for encryption type folders)
  136. folderEncryptionFailures map[string]map[protocol.DeviceID]error // folder -> device -> error regarding encryption consistency (may be missing)
  137. // fields protected by pmut
  138. pmut sync.RWMutex
  139. conn map[protocol.DeviceID]protocol.Connection
  140. connRequestLimiters map[protocol.DeviceID]*semaphore.Semaphore
  141. closed map[protocol.DeviceID]chan struct{}
  142. helloMessages map[protocol.DeviceID]protocol.Hello
  143. deviceDownloads map[protocol.DeviceID]*deviceDownloadState
  144. remoteFolderStates map[protocol.DeviceID]map[string]remoteFolderState // deviceID -> folders
  145. indexHandlers *serviceMap[protocol.DeviceID, *indexHandlerRegistry]
  146. // for testing only
  147. foldersRunning atomic.Int32
  148. }
  149. var _ config.Verifier = &model{}
  150. type folderFactory func(*model, *db.FileSet, *ignore.Matcher, config.FolderConfiguration, versioner.Versioner, events.Logger, *semaphore.Semaphore) service
  151. var folderFactories = make(map[config.FolderType]folderFactory)
  152. var (
  153. errDeviceUnknown = errors.New("unknown device")
  154. errDevicePaused = errors.New("device is paused")
  155. errDeviceRemoved = errors.New("device has been removed")
  156. ErrFolderPaused = errors.New("folder is paused")
  157. ErrFolderNotRunning = errors.New("folder is not running")
  158. ErrFolderMissing = errors.New("no such folder")
  159. errNoVersioner = errors.New("folder has no versioner")
  160. // errors about why a connection is closed
  161. errReplacingConnection = errors.New("replacing connection")
  162. errStopped = errors.New("Syncthing is being stopped")
  163. errEncryptionInvConfigLocal = errors.New("can't encrypt outgoing data because local data is encrypted (folder-type receive-encrypted)")
  164. errEncryptionInvConfigRemote = errors.New("remote has encrypted data and encrypts that data for us - this is impossible")
  165. errEncryptionNotEncryptedLocal = errors.New("remote expects to exchange encrypted data, but is configured for plain data")
  166. errEncryptionPlainForReceiveEncrypted = errors.New("remote expects to exchange plain data, but is configured to be encrypted")
  167. errEncryptionPlainForRemoteEncrypted = errors.New("remote expects to exchange plain data, but local data is encrypted (folder-type receive-encrypted)")
  168. errEncryptionNotEncryptedUntrusted = errors.New("device is untrusted, but configured to receive plain data")
  169. errEncryptionPassword = errors.New("different encryption passwords used")
  170. errEncryptionTokenRead = errors.New("failed to read encryption token")
  171. errEncryptionTokenWrite = errors.New("failed to write encryption token")
  172. errMissingRemoteInClusterConfig = errors.New("remote device missing in cluster config")
  173. errMissingLocalInClusterConfig = errors.New("local device missing in cluster config")
  174. )
  175. // NewModel creates and starts a new model. The model starts in read-only mode,
  176. // where it sends index information to connected peers and responds to requests
  177. // for file data without altering the local folder in any way.
  178. func NewModel(cfg config.Wrapper, id protocol.DeviceID, clientName, clientVersion string, ldb *db.Lowlevel, protectedFiles []string, evLogger events.Logger, keyGen *protocol.KeyGenerator) Model {
  179. spec := svcutil.SpecWithDebugLogger(l)
  180. m := &model{
  181. Supervisor: suture.New("model", spec),
  182. // constructor parameters
  183. cfg: cfg,
  184. id: id,
  185. clientName: clientName,
  186. clientVersion: clientVersion,
  187. db: ldb,
  188. protectedFiles: protectedFiles,
  189. evLogger: evLogger,
  190. // constant or concurrency safe fields
  191. finder: db.NewBlockFinder(ldb),
  192. progressEmitter: NewProgressEmitter(cfg, evLogger),
  193. shortID: id.Short(),
  194. globalRequestLimiter: semaphore.New(1024 * cfg.Options().MaxConcurrentIncomingRequestKiB()),
  195. folderIOLimiter: semaphore.New(cfg.Options().MaxFolderConcurrency()),
  196. fatalChan: make(chan error),
  197. started: make(chan struct{}),
  198. keyGen: keyGen,
  199. // fields protected by fmut
  200. fmut: sync.NewRWMutex(),
  201. folderCfgs: make(map[string]config.FolderConfiguration),
  202. folderFiles: make(map[string]*db.FileSet),
  203. deviceStatRefs: make(map[protocol.DeviceID]*stats.DeviceStatisticsReference),
  204. folderIgnores: make(map[string]*ignore.Matcher),
  205. folderRunners: newServiceMap[string, service](evLogger),
  206. folderVersioners: make(map[string]versioner.Versioner),
  207. folderEncryptionPasswordTokens: make(map[string][]byte),
  208. folderEncryptionFailures: make(map[string]map[protocol.DeviceID]error),
  209. // fields protected by pmut
  210. pmut: sync.NewRWMutex(),
  211. conn: make(map[protocol.DeviceID]protocol.Connection),
  212. connRequestLimiters: make(map[protocol.DeviceID]*semaphore.Semaphore),
  213. closed: make(map[protocol.DeviceID]chan struct{}),
  214. helloMessages: make(map[protocol.DeviceID]protocol.Hello),
  215. deviceDownloads: make(map[protocol.DeviceID]*deviceDownloadState),
  216. remoteFolderStates: make(map[protocol.DeviceID]map[string]remoteFolderState),
  217. indexHandlers: newServiceMap[protocol.DeviceID, *indexHandlerRegistry](evLogger),
  218. }
  219. for devID := range cfg.Devices() {
  220. m.deviceStatRefs[devID] = stats.NewDeviceStatisticsReference(m.db, devID)
  221. }
  222. m.Add(m.folderRunners)
  223. m.Add(m.progressEmitter)
  224. m.Add(m.indexHandlers)
  225. m.Add(svcutil.AsService(m.serve, m.String()))
  226. return m
  227. }
  228. func (m *model) serve(ctx context.Context) error {
  229. defer m.closeAllConnectionsAndWait()
  230. cfg := m.cfg.Subscribe(m)
  231. defer m.cfg.Unsubscribe(m)
  232. if err := m.initFolders(cfg); err != nil {
  233. close(m.started)
  234. return svcutil.AsFatalErr(err, svcutil.ExitError)
  235. }
  236. close(m.started)
  237. select {
  238. case <-ctx.Done():
  239. return ctx.Err()
  240. case err := <-m.fatalChan:
  241. return svcutil.AsFatalErr(err, svcutil.ExitError)
  242. }
  243. }
  244. func (m *model) initFolders(cfg config.Configuration) error {
  245. clusterConfigDevices := make(deviceIDSet, len(cfg.Devices))
  246. for _, folderCfg := range cfg.Folders {
  247. if folderCfg.Paused {
  248. folderCfg.CreateRoot()
  249. continue
  250. }
  251. err := m.newFolder(folderCfg, cfg.Options.CacheIgnoredFiles)
  252. if err != nil {
  253. return err
  254. }
  255. clusterConfigDevices.add(folderCfg.DeviceIDs())
  256. }
  257. ignoredDevices := observedDeviceSet(m.cfg.IgnoredDevices())
  258. m.cleanPending(cfg.DeviceMap(), cfg.FolderMap(), ignoredDevices, nil)
  259. m.sendClusterConfig(clusterConfigDevices.AsSlice())
  260. return nil
  261. }
  262. func (m *model) closeAllConnectionsAndWait() {
  263. m.pmut.RLock()
  264. closed := make([]chan struct{}, 0, len(m.conn))
  265. for id, conn := range m.conn {
  266. closed = append(closed, m.closed[id])
  267. go conn.Close(errStopped)
  268. }
  269. m.pmut.RUnlock()
  270. for _, c := range closed {
  271. <-c
  272. }
  273. }
  274. func (m *model) fatal(err error) {
  275. select {
  276. case m.fatalChan <- err:
  277. default:
  278. }
  279. }
  280. // StartDeadlockDetector starts a deadlock detector on the models locks which
  281. // causes panics in case the locks cannot be acquired in the given timeout
  282. // period.
  283. func (m *model) StartDeadlockDetector(timeout time.Duration) {
  284. l.Infof("Starting deadlock detector with %v timeout", timeout)
  285. detector := newDeadlockDetector(timeout, m.evLogger, m.fatal)
  286. detector.Watch("fmut", m.fmut)
  287. detector.Watch("pmut", m.pmut)
  288. }
  289. // Need to hold lock on m.fmut when calling this.
  290. func (m *model) addAndStartFolderLocked(cfg config.FolderConfiguration, fset *db.FileSet, cacheIgnoredFiles bool) {
  291. ignores := ignore.New(cfg.Filesystem(nil), ignore.WithCache(cacheIgnoredFiles))
  292. if cfg.Type != config.FolderTypeReceiveEncrypted {
  293. if err := ignores.Load(".stignore"); err != nil && !fs.IsNotExist(err) {
  294. l.Warnln("Loading ignores:", err)
  295. }
  296. }
  297. m.addAndStartFolderLockedWithIgnores(cfg, fset, ignores)
  298. }
  299. // Only needed for testing, use addAndStartFolderLocked instead.
  300. func (m *model) addAndStartFolderLockedWithIgnores(cfg config.FolderConfiguration, fset *db.FileSet, ignores *ignore.Matcher) {
  301. m.folderCfgs[cfg.ID] = cfg
  302. m.folderFiles[cfg.ID] = fset
  303. m.folderIgnores[cfg.ID] = ignores
  304. _, ok := m.folderRunners.Get(cfg.ID)
  305. if ok {
  306. l.Warnln("Cannot start already running folder", cfg.Description())
  307. panic("cannot start already running folder")
  308. }
  309. folderFactory, ok := folderFactories[cfg.Type]
  310. if !ok {
  311. panic(fmt.Sprintf("unknown folder type 0x%x", cfg.Type))
  312. }
  313. folder := cfg.ID
  314. // Find any devices for which we hold the index in the db, but the folder
  315. // is not shared, and drop it.
  316. expected := mapDevices(cfg.DeviceIDs())
  317. for _, available := range fset.ListDevices() {
  318. if _, ok := expected[available]; !ok {
  319. l.Debugln("dropping", folder, "state for", available)
  320. fset.Drop(available)
  321. }
  322. }
  323. v, ok := fset.Sequence(protocol.LocalDeviceID), true
  324. indexHasFiles := ok && v > 0
  325. if !indexHasFiles {
  326. // It's a blank folder, so this may the first time we're looking at
  327. // it. Attempt to create and tag with our marker as appropriate. We
  328. // don't really do anything with errors at this point except warn -
  329. // if these things don't work, we still want to start the folder and
  330. // it'll show up as errored later.
  331. if err := cfg.CreateRoot(); err != nil {
  332. l.Warnln("Failed to create folder root directory", err)
  333. } else if err = cfg.CreateMarker(); err != nil {
  334. l.Warnln("Failed to create folder marker:", err)
  335. }
  336. }
  337. if cfg.Type == config.FolderTypeReceiveEncrypted {
  338. if encryptionToken, err := readEncryptionToken(cfg); err == nil {
  339. m.folderEncryptionPasswordTokens[folder] = encryptionToken
  340. } else if !fs.IsNotExist(err) {
  341. l.Warnf("Failed to read encryption token: %v", err)
  342. }
  343. }
  344. // These are our metadata files, and they should always be hidden.
  345. ffs := cfg.Filesystem(nil)
  346. _ = ffs.Hide(config.DefaultMarkerName)
  347. _ = ffs.Hide(versioner.DefaultPath)
  348. _ = ffs.Hide(".stignore")
  349. var ver versioner.Versioner
  350. if cfg.Versioning.Type != "" {
  351. var err error
  352. ver, err = versioner.New(cfg)
  353. if err != nil {
  354. panic(fmt.Errorf("creating versioner: %w", err))
  355. }
  356. }
  357. m.folderVersioners[folder] = ver
  358. m.warnAboutOverwritingProtectedFiles(cfg, ignores)
  359. p := folderFactory(m, fset, ignores, cfg, ver, m.evLogger, m.folderIOLimiter)
  360. m.folderRunners.Add(folder, p)
  361. l.Infof("Ready to synchronize %s (%s)", cfg.Description(), cfg.Type)
  362. }
  363. func (m *model) warnAboutOverwritingProtectedFiles(cfg config.FolderConfiguration, ignores *ignore.Matcher) {
  364. if cfg.Type == config.FolderTypeSendOnly {
  365. return
  366. }
  367. // This is a bit of a hack.
  368. ffs := cfg.Filesystem(nil)
  369. if ffs.Type() != fs.FilesystemTypeBasic {
  370. return
  371. }
  372. folderLocation := ffs.URI()
  373. var filesAtRisk []string
  374. for _, protectedFilePath := range m.protectedFiles {
  375. // check if file is synced in this folder
  376. if protectedFilePath != folderLocation && !fs.IsParent(protectedFilePath, folderLocation) {
  377. continue
  378. }
  379. // check if file is ignored
  380. relPath, _ := filepath.Rel(folderLocation, protectedFilePath)
  381. if ignores.Match(relPath).IsIgnored() {
  382. continue
  383. }
  384. filesAtRisk = append(filesAtRisk, protectedFilePath)
  385. }
  386. if len(filesAtRisk) > 0 {
  387. l.Warnln("Some protected files may be overwritten and cause issues. See https://docs.syncthing.net/users/config.html#syncing-configuration-files for more information. The at risk files are:", strings.Join(filesAtRisk, ", "))
  388. }
  389. }
  390. func (m *model) removeFolder(cfg config.FolderConfiguration) {
  391. m.fmut.RLock()
  392. wait := m.folderRunners.RemoveAndWaitChan(cfg.ID, 0)
  393. m.fmut.RUnlock()
  394. <-wait
  395. // We need to hold both fmut and pmut and must acquire locks in the same
  396. // order always. (The locks can be *released* in any order.)
  397. m.fmut.Lock()
  398. m.pmut.RLock()
  399. isPathUnique := true
  400. for folderID, folderCfg := range m.folderCfgs {
  401. if folderID != cfg.ID && folderCfg.Path == cfg.Path {
  402. isPathUnique = false
  403. break
  404. }
  405. }
  406. if isPathUnique {
  407. // Remove (if empty and removable) or move away (if non-empty or
  408. // otherwise not removable) Syncthing-specific marker files.
  409. fs := cfg.Filesystem(nil)
  410. if err := fs.Remove(config.DefaultMarkerName); err != nil {
  411. moved := config.DefaultMarkerName + time.Now().Format(".removed-20060102-150405")
  412. _ = fs.Rename(config.DefaultMarkerName, moved)
  413. }
  414. }
  415. m.cleanupFolderLocked(cfg)
  416. m.indexHandlers.Each(func(_ protocol.DeviceID, r *indexHandlerRegistry) error {
  417. r.Remove(cfg.ID)
  418. return nil
  419. })
  420. m.fmut.Unlock()
  421. m.pmut.RUnlock()
  422. // Remove it from the database
  423. db.DropFolder(m.db, cfg.ID)
  424. }
  425. // Need to hold lock on m.fmut when calling this.
  426. func (m *model) cleanupFolderLocked(cfg config.FolderConfiguration) {
  427. // clear up our config maps
  428. delete(m.folderCfgs, cfg.ID)
  429. delete(m.folderFiles, cfg.ID)
  430. delete(m.folderIgnores, cfg.ID)
  431. delete(m.folderVersioners, cfg.ID)
  432. delete(m.folderEncryptionPasswordTokens, cfg.ID)
  433. delete(m.folderEncryptionFailures, cfg.ID)
  434. }
  435. func (m *model) restartFolder(from, to config.FolderConfiguration, cacheIgnoredFiles bool) error {
  436. if to.ID == "" {
  437. panic("bug: cannot restart empty folder ID")
  438. }
  439. if to.ID != from.ID {
  440. l.Warnf("bug: folder restart cannot change ID %q -> %q", from.ID, to.ID)
  441. panic("bug: folder restart cannot change ID")
  442. }
  443. folder := to.ID
  444. // This mutex protects the entirety of the restart operation, preventing
  445. // there from being more than one folder restart operation in progress
  446. // at any given time. The usual fmut/pmut stuff doesn't cover this,
  447. // because those locks are released while we are waiting for the folder
  448. // to shut down (and must be so because the folder might need them as
  449. // part of its operations before shutting down).
  450. restartMut := m.folderRestartMuts.Get(folder)
  451. restartMut.Lock()
  452. defer restartMut.Unlock()
  453. m.fmut.RLock()
  454. wait := m.folderRunners.RemoveAndWaitChan(from.ID, 0)
  455. m.fmut.RUnlock()
  456. <-wait
  457. m.fmut.Lock()
  458. defer m.fmut.Unlock()
  459. // Cache the (maybe) existing fset before it's removed by cleanupFolderLocked
  460. fset := m.folderFiles[folder]
  461. fsetNil := fset == nil
  462. m.cleanupFolderLocked(from)
  463. if !to.Paused {
  464. if fsetNil {
  465. // Create a new fset. Might take a while and we do it under
  466. // locking, but it's unsafe to create fset:s concurrently so
  467. // that's the price we pay.
  468. var err error
  469. fset, err = db.NewFileSet(folder, m.db)
  470. if err != nil {
  471. return fmt.Errorf("restarting %v: %w", to.Description(), err)
  472. }
  473. }
  474. m.addAndStartFolderLocked(to, fset, cacheIgnoredFiles)
  475. }
  476. // Care needs to be taken because we already hold fmut and the lock order
  477. // must be the same everywhere. As fmut is acquired first, this is fine.
  478. m.pmut.RLock()
  479. runner, _ := m.folderRunners.Get(to.ID)
  480. m.indexHandlers.Each(func(_ protocol.DeviceID, r *indexHandlerRegistry) error {
  481. r.RegisterFolderState(to, fset, runner)
  482. return nil
  483. })
  484. m.pmut.RUnlock()
  485. var infoMsg string
  486. switch {
  487. case to.Paused:
  488. infoMsg = "Paused"
  489. case from.Paused:
  490. infoMsg = "Unpaused"
  491. default:
  492. infoMsg = "Restarted"
  493. }
  494. l.Infof("%v folder %v (%v)", infoMsg, to.Description(), to.Type)
  495. return nil
  496. }
  497. func (m *model) newFolder(cfg config.FolderConfiguration, cacheIgnoredFiles bool) error {
  498. // Creating the fileset can take a long time (metadata calculation) so
  499. // we do it outside of the lock.
  500. fset, err := db.NewFileSet(cfg.ID, m.db)
  501. if err != nil {
  502. return fmt.Errorf("adding %v: %w", cfg.Description(), err)
  503. }
  504. m.fmut.Lock()
  505. defer m.fmut.Unlock()
  506. m.addAndStartFolderLocked(cfg, fset, cacheIgnoredFiles)
  507. // Cluster configs might be received and processed before reaching this
  508. // point, i.e. before the folder is started. If that's the case, start
  509. // index senders here.
  510. // Care needs to be taken because we already hold fmut and the lock order
  511. // must be the same everywhere. As fmut is acquired first, this is fine.
  512. m.pmut.RLock()
  513. m.indexHandlers.Each(func(_ protocol.DeviceID, r *indexHandlerRegistry) error {
  514. runner, _ := m.folderRunners.Get(cfg.ID)
  515. r.RegisterFolderState(cfg, fset, runner)
  516. return nil
  517. })
  518. m.pmut.RUnlock()
  519. return nil
  520. }
  521. func (m *model) UsageReportingStats(report *contract.Report, version int, preview bool) {
  522. if version >= 3 {
  523. // Block stats
  524. blockStatsMut.Lock()
  525. for k, v := range blockStats {
  526. switch k {
  527. case "total":
  528. report.BlockStats.Total = v
  529. case "renamed":
  530. report.BlockStats.Renamed = v
  531. case "reused":
  532. report.BlockStats.Reused = v
  533. case "pulled":
  534. report.BlockStats.Pulled = v
  535. case "copyOrigin":
  536. report.BlockStats.CopyOrigin = v
  537. case "copyOriginShifted":
  538. report.BlockStats.CopyOriginShifted = v
  539. case "copyElsewhere":
  540. report.BlockStats.CopyElsewhere = v
  541. }
  542. // Reset counts, as these are incremental
  543. if !preview {
  544. blockStats[k] = 0
  545. }
  546. }
  547. blockStatsMut.Unlock()
  548. // Transport stats
  549. m.pmut.RLock()
  550. for _, conn := range m.conn {
  551. report.TransportStats[conn.Transport()]++
  552. }
  553. m.pmut.RUnlock()
  554. // Ignore stats
  555. var seenPrefix [3]bool
  556. for folder := range m.cfg.Folders() {
  557. lines, _, err := m.CurrentIgnores(folder)
  558. if err != nil {
  559. continue
  560. }
  561. report.IgnoreStats.Lines += len(lines)
  562. for _, line := range lines {
  563. // Allow prefixes to be specified in any order, but only once.
  564. for {
  565. if strings.HasPrefix(line, "!") && !seenPrefix[0] {
  566. seenPrefix[0] = true
  567. line = line[1:]
  568. report.IgnoreStats.Inverts++
  569. } else if strings.HasPrefix(line, "(?i)") && !seenPrefix[1] {
  570. seenPrefix[1] = true
  571. line = line[4:]
  572. report.IgnoreStats.Folded++
  573. } else if strings.HasPrefix(line, "(?d)") && !seenPrefix[2] {
  574. seenPrefix[2] = true
  575. line = line[4:]
  576. report.IgnoreStats.Deletable++
  577. } else {
  578. seenPrefix[0] = false
  579. seenPrefix[1] = false
  580. seenPrefix[2] = false
  581. break
  582. }
  583. }
  584. // Noops, remove
  585. line = strings.TrimSuffix(line, "**")
  586. line = strings.TrimPrefix(line, "**/")
  587. if strings.HasPrefix(line, "/") {
  588. report.IgnoreStats.Rooted++
  589. } else if strings.HasPrefix(line, "#include ") {
  590. report.IgnoreStats.Includes++
  591. if strings.Contains(line, "..") {
  592. report.IgnoreStats.EscapedIncludes++
  593. }
  594. }
  595. if strings.Contains(line, "**") {
  596. report.IgnoreStats.DoubleStars++
  597. // Remove not to trip up star checks.
  598. line = strings.ReplaceAll(line, "**", "")
  599. }
  600. if strings.Contains(line, "*") {
  601. report.IgnoreStats.Stars++
  602. }
  603. }
  604. }
  605. }
  606. }
  607. type ConnectionInfo struct {
  608. protocol.Statistics
  609. Connected bool `json:"connected"`
  610. Paused bool `json:"paused"`
  611. Address string `json:"address"`
  612. ClientVersion string `json:"clientVersion"`
  613. Type string `json:"type"`
  614. IsLocal bool `json:"isLocal"`
  615. Crypto string `json:"crypto"`
  616. }
  617. // NumConnections returns the current number of active connected devices.
  618. func (m *model) NumConnections() int {
  619. m.pmut.RLock()
  620. defer m.pmut.RUnlock()
  621. return len(m.conn)
  622. }
  623. // ConnectionStats returns a map with connection statistics for each device.
  624. func (m *model) ConnectionStats() map[string]interface{} {
  625. m.pmut.RLock()
  626. defer m.pmut.RUnlock()
  627. res := make(map[string]interface{})
  628. devs := m.cfg.Devices()
  629. conns := make(map[string]ConnectionInfo, len(devs))
  630. for device, deviceCfg := range devs {
  631. hello := m.helloMessages[device]
  632. versionString := hello.ClientVersion
  633. if hello.ClientName != "syncthing" {
  634. versionString = hello.ClientName + " " + hello.ClientVersion
  635. }
  636. ci := ConnectionInfo{
  637. ClientVersion: strings.TrimSpace(versionString),
  638. Paused: deviceCfg.Paused,
  639. }
  640. if conn, ok := m.conn[device]; ok {
  641. ci.Type = conn.Type()
  642. ci.IsLocal = conn.IsLocal()
  643. ci.Crypto = conn.Crypto()
  644. ci.Connected = ok
  645. ci.Statistics = conn.Statistics()
  646. if addr := conn.RemoteAddr(); addr != nil {
  647. ci.Address = addr.String()
  648. }
  649. }
  650. conns[device.String()] = ci
  651. }
  652. res["connections"] = conns
  653. in, out := protocol.TotalInOut()
  654. res["total"] = map[string]interface{}{
  655. "at": time.Now().Truncate(time.Second),
  656. "inBytesTotal": in,
  657. "outBytesTotal": out,
  658. }
  659. return res
  660. }
  661. // DeviceStatistics returns statistics about each device
  662. func (m *model) DeviceStatistics() (map[protocol.DeviceID]stats.DeviceStatistics, error) {
  663. m.fmut.RLock()
  664. defer m.fmut.RUnlock()
  665. res := make(map[protocol.DeviceID]stats.DeviceStatistics, len(m.deviceStatRefs))
  666. for id, sr := range m.deviceStatRefs {
  667. stats, err := sr.GetStatistics()
  668. if err != nil {
  669. return nil, err
  670. }
  671. res[id] = stats
  672. }
  673. return res, nil
  674. }
  675. // FolderStatistics returns statistics about each folder
  676. func (m *model) FolderStatistics() (map[string]stats.FolderStatistics, error) {
  677. res := make(map[string]stats.FolderStatistics)
  678. m.fmut.RLock()
  679. defer m.fmut.RUnlock()
  680. err := m.folderRunners.Each(func(id string, runner service) error {
  681. stats, err := runner.GetStatistics()
  682. if err != nil {
  683. return err
  684. }
  685. res[id] = stats
  686. return nil
  687. })
  688. if err != nil {
  689. return nil, err
  690. }
  691. return res, nil
  692. }
  693. type FolderCompletion struct {
  694. CompletionPct float64
  695. GlobalBytes int64
  696. NeedBytes int64
  697. GlobalItems int
  698. NeedItems int
  699. NeedDeletes int
  700. Sequence int64
  701. RemoteState remoteFolderState
  702. }
  703. func newFolderCompletion(global, need db.Counts, sequence int64, state remoteFolderState) FolderCompletion {
  704. comp := FolderCompletion{
  705. GlobalBytes: global.Bytes,
  706. NeedBytes: need.Bytes,
  707. GlobalItems: global.Files + global.Directories + global.Symlinks,
  708. NeedItems: need.Files + need.Directories + need.Symlinks,
  709. NeedDeletes: need.Deleted,
  710. Sequence: sequence,
  711. RemoteState: state,
  712. }
  713. comp.setComplectionPct()
  714. return comp
  715. }
  716. func (comp *FolderCompletion) add(other FolderCompletion) {
  717. comp.GlobalBytes += other.GlobalBytes
  718. comp.NeedBytes += other.NeedBytes
  719. comp.GlobalItems += other.GlobalItems
  720. comp.NeedItems += other.NeedItems
  721. comp.NeedDeletes += other.NeedDeletes
  722. comp.setComplectionPct()
  723. }
  724. func (comp *FolderCompletion) setComplectionPct() {
  725. if comp.GlobalBytes == 0 {
  726. comp.CompletionPct = 100
  727. } else {
  728. needRatio := float64(comp.NeedBytes) / float64(comp.GlobalBytes)
  729. comp.CompletionPct = 100 * (1 - needRatio)
  730. }
  731. // If the completion is 100% but there are deletes we need to handle,
  732. // drop it down a notch. Hack for consumers that look only at the
  733. // percentage (our own GUI does the same calculation as here on its own
  734. // and needs the same fixup).
  735. if comp.NeedBytes == 0 && comp.NeedDeletes > 0 {
  736. comp.CompletionPct = 95 // chosen by fair dice roll
  737. }
  738. }
  739. // Map returns the members as a map, e.g. used in api to serialize as JSON.
  740. func (comp *FolderCompletion) Map() map[string]interface{} {
  741. return map[string]interface{}{
  742. "completion": comp.CompletionPct,
  743. "globalBytes": comp.GlobalBytes,
  744. "needBytes": comp.NeedBytes,
  745. "globalItems": comp.GlobalItems,
  746. "needItems": comp.NeedItems,
  747. "needDeletes": comp.NeedDeletes,
  748. "sequence": comp.Sequence,
  749. "remoteState": comp.RemoteState,
  750. }
  751. }
  752. // Completion returns the completion status, in percent with some counters,
  753. // for the given device and folder. The device can be any known device ID
  754. // (including the local device) or explicitly protocol.LocalDeviceID. An
  755. // empty folder string means the aggregate of all folders shared with the
  756. // given device.
  757. func (m *model) Completion(device protocol.DeviceID, folder string) (FolderCompletion, error) {
  758. // The user specifically asked for our own device ID. Internally that is
  759. // known as protocol.LocalDeviceID so translate.
  760. if device == m.id {
  761. device = protocol.LocalDeviceID
  762. }
  763. if folder != "" {
  764. // We want completion for a specific folder.
  765. return m.folderCompletion(device, folder)
  766. }
  767. // We want completion for all (shared) folders as an aggregate.
  768. var comp FolderCompletion
  769. for _, fcfg := range m.cfg.FolderList() {
  770. if fcfg.Paused {
  771. continue
  772. }
  773. if device == protocol.LocalDeviceID || fcfg.SharedWith(device) {
  774. folderComp, err := m.folderCompletion(device, fcfg.ID)
  775. if errors.Is(err, ErrFolderPaused) {
  776. continue
  777. } else if err != nil {
  778. return FolderCompletion{}, err
  779. }
  780. comp.add(folderComp)
  781. }
  782. }
  783. return comp, nil
  784. }
  785. func (m *model) folderCompletion(device protocol.DeviceID, folder string) (FolderCompletion, error) {
  786. m.fmut.RLock()
  787. err := m.checkFolderRunningLocked(folder)
  788. rf := m.folderFiles[folder]
  789. m.fmut.RUnlock()
  790. if err != nil {
  791. return FolderCompletion{}, err
  792. }
  793. snap, err := rf.Snapshot()
  794. if err != nil {
  795. return FolderCompletion{}, err
  796. }
  797. defer snap.Release()
  798. m.pmut.RLock()
  799. state := m.remoteFolderStates[device][folder]
  800. downloaded := m.deviceDownloads[device].BytesDownloaded(folder)
  801. m.pmut.RUnlock()
  802. need := snap.NeedSize(device)
  803. need.Bytes -= downloaded
  804. // This might might be more than it really is, because some blocks can be of a smaller size.
  805. if need.Bytes < 0 {
  806. need.Bytes = 0
  807. }
  808. comp := newFolderCompletion(snap.GlobalSize(), need, snap.Sequence(device), state)
  809. l.Debugf("%v Completion(%s, %q): %v", m, device, folder, comp.Map())
  810. return comp, nil
  811. }
  812. // DBSnapshot returns a snapshot of the database content relevant to the given folder.
  813. func (m *model) DBSnapshot(folder string) (*db.Snapshot, error) {
  814. m.fmut.RLock()
  815. err := m.checkFolderRunningLocked(folder)
  816. rf := m.folderFiles[folder]
  817. m.fmut.RUnlock()
  818. if err != nil {
  819. return nil, err
  820. }
  821. return rf.Snapshot()
  822. }
  823. func (m *model) FolderProgressBytesCompleted(folder string) int64 {
  824. return m.progressEmitter.BytesCompleted(folder)
  825. }
  826. // NeedFolderFiles returns paginated list of currently needed files in
  827. // progress, queued, and to be queued on next puller iteration.
  828. func (m *model) NeedFolderFiles(folder string, page, perpage int) ([]db.FileInfoTruncated, []db.FileInfoTruncated, []db.FileInfoTruncated, error) {
  829. m.fmut.RLock()
  830. rf, rfOk := m.folderFiles[folder]
  831. runner, runnerOk := m.folderRunners.Get(folder)
  832. cfg := m.folderCfgs[folder]
  833. m.fmut.RUnlock()
  834. if !rfOk {
  835. return nil, nil, nil, ErrFolderMissing
  836. }
  837. snap, err := rf.Snapshot()
  838. if err != nil {
  839. return nil, nil, nil, err
  840. }
  841. defer snap.Release()
  842. var progress, queued, rest []db.FileInfoTruncated
  843. var seen map[string]struct{}
  844. p := newPager(page, perpage)
  845. if runnerOk {
  846. progressNames, queuedNames, skipped := runner.Jobs(page, perpage)
  847. progress = make([]db.FileInfoTruncated, len(progressNames))
  848. queued = make([]db.FileInfoTruncated, len(queuedNames))
  849. seen = make(map[string]struct{}, len(progressNames)+len(queuedNames))
  850. for i, name := range progressNames {
  851. if f, ok := snap.GetGlobalTruncated(name); ok {
  852. progress[i] = f
  853. seen[name] = struct{}{}
  854. }
  855. }
  856. for i, name := range queuedNames {
  857. if f, ok := snap.GetGlobalTruncated(name); ok {
  858. queued[i] = f
  859. seen[name] = struct{}{}
  860. }
  861. }
  862. p.get -= len(seen)
  863. if p.get == 0 {
  864. return progress, queued, nil, nil
  865. }
  866. p.toSkip -= skipped
  867. }
  868. rest = make([]db.FileInfoTruncated, 0, perpage)
  869. snap.WithNeedTruncated(protocol.LocalDeviceID, func(f protocol.FileIntf) bool {
  870. if cfg.IgnoreDelete && f.IsDeleted() {
  871. return true
  872. }
  873. if p.skip() {
  874. return true
  875. }
  876. ft := f.(db.FileInfoTruncated)
  877. if _, ok := seen[ft.Name]; !ok {
  878. rest = append(rest, ft)
  879. p.get--
  880. }
  881. return p.get > 0
  882. })
  883. return progress, queued, rest, nil
  884. }
  885. // RemoteNeedFolderFiles returns paginated list of currently needed files for a
  886. // remote device to become synced with a folder.
  887. func (m *model) RemoteNeedFolderFiles(folder string, device protocol.DeviceID, page, perpage int) ([]db.FileInfoTruncated, error) {
  888. m.fmut.RLock()
  889. rf, ok := m.folderFiles[folder]
  890. m.fmut.RUnlock()
  891. if !ok {
  892. return nil, ErrFolderMissing
  893. }
  894. snap, err := rf.Snapshot()
  895. if err != nil {
  896. return nil, err
  897. }
  898. defer snap.Release()
  899. files := make([]db.FileInfoTruncated, 0, perpage)
  900. p := newPager(page, perpage)
  901. snap.WithNeedTruncated(device, func(f protocol.FileIntf) bool {
  902. if p.skip() {
  903. return true
  904. }
  905. files = append(files, f.(db.FileInfoTruncated))
  906. return !p.done()
  907. })
  908. return files, nil
  909. }
  910. func (m *model) LocalChangedFolderFiles(folder string, page, perpage int) ([]db.FileInfoTruncated, error) {
  911. m.fmut.RLock()
  912. rf, ok := m.folderFiles[folder]
  913. m.fmut.RUnlock()
  914. if !ok {
  915. return nil, ErrFolderMissing
  916. }
  917. snap, err := rf.Snapshot()
  918. if err != nil {
  919. return nil, err
  920. }
  921. defer snap.Release()
  922. if snap.ReceiveOnlyChangedSize().TotalItems() == 0 {
  923. return nil, nil
  924. }
  925. p := newPager(page, perpage)
  926. files := make([]db.FileInfoTruncated, 0, perpage)
  927. snap.WithHaveTruncated(protocol.LocalDeviceID, func(f protocol.FileIntf) bool {
  928. if !f.IsReceiveOnlyChanged() {
  929. return true
  930. }
  931. if p.skip() {
  932. return true
  933. }
  934. ft := f.(db.FileInfoTruncated)
  935. files = append(files, ft)
  936. return !p.done()
  937. })
  938. return files, nil
  939. }
  940. type pager struct {
  941. toSkip, get int
  942. }
  943. func newPager(page, perpage int) *pager {
  944. return &pager{
  945. toSkip: (page - 1) * perpage,
  946. get: perpage,
  947. }
  948. }
  949. func (p *pager) skip() bool {
  950. if p.toSkip == 0 {
  951. return false
  952. }
  953. p.toSkip--
  954. return true
  955. }
  956. func (p *pager) done() bool {
  957. if p.get > 0 {
  958. p.get--
  959. }
  960. return p.get == 0
  961. }
  962. // Index is called when a new device is connected and we receive their full index.
  963. // Implements the protocol.Model interface.
  964. func (m *model) Index(conn protocol.Connection, folder string, fs []protocol.FileInfo) error {
  965. return m.handleIndex(conn, folder, fs, false)
  966. }
  967. // IndexUpdate is called for incremental updates to connected devices' indexes.
  968. // Implements the protocol.Model interface.
  969. func (m *model) IndexUpdate(conn protocol.Connection, folder string, fs []protocol.FileInfo) error {
  970. return m.handleIndex(conn, folder, fs, true)
  971. }
  972. func (m *model) handleIndex(conn protocol.Connection, folder string, fs []protocol.FileInfo, update bool) error {
  973. op := "Index"
  974. if update {
  975. op += " update"
  976. }
  977. deviceID := conn.DeviceID()
  978. l.Debugf("%v (in): %s / %q: %d files", op, deviceID, folder, len(fs))
  979. if cfg, ok := m.cfg.Folder(folder); !ok || !cfg.SharedWith(deviceID) {
  980. l.Warnf("%v for unexpected folder ID %q sent from device %q; ensure that the folder exists and that this device is selected under \"Share With\" in the folder configuration.", op, folder, deviceID)
  981. return fmt.Errorf("%s: %w", folder, ErrFolderMissing)
  982. } else if cfg.Paused {
  983. l.Debugf("%v for paused folder (ID %q) sent from device %q.", op, folder, deviceID)
  984. return fmt.Errorf("%s: %w", folder, ErrFolderPaused)
  985. }
  986. m.pmut.RLock()
  987. indexHandler, ok := m.indexHandlers.Get(deviceID)
  988. m.pmut.RUnlock()
  989. if !ok {
  990. // This should be impossible, as an index handler always exists for an
  991. // open connection, and this method can't be called on a closed
  992. // connection
  993. m.evLogger.Log(events.Failure, "index sender does not exist for connection on which indexes were received")
  994. l.Debugf("%v for folder (ID %q) sent from device %q: missing index handler", op, folder, deviceID)
  995. return fmt.Errorf("index handler missing: %s", folder)
  996. }
  997. return indexHandler.ReceiveIndex(folder, fs, update, op)
  998. }
  999. type clusterConfigDeviceInfo struct {
  1000. local, remote protocol.Device
  1001. }
  1002. type ClusterConfigReceivedEventData struct {
  1003. Device protocol.DeviceID `json:"device"`
  1004. }
  1005. func (m *model) ClusterConfig(conn protocol.Connection, cm protocol.ClusterConfig) error {
  1006. // Check the peer device's announced folders against our own. Emits events
  1007. // for folders that we don't expect (unknown or not shared).
  1008. // Also, collect a list of folders we do share, and if he's interested in
  1009. // temporary indexes, subscribe the connection.
  1010. deviceID := conn.DeviceID()
  1011. l.Debugf("Handling ClusterConfig from %v", deviceID.Short())
  1012. m.pmut.RLock()
  1013. indexHandlerRegistry, ok := m.indexHandlers.Get(deviceID)
  1014. m.pmut.RUnlock()
  1015. if !ok {
  1016. panic("bug: ClusterConfig called on closed or nonexistent connection")
  1017. }
  1018. deviceCfg, ok := m.cfg.Device(deviceID)
  1019. if !ok {
  1020. l.Debugln("Device disappeared from config while processing cluster-config")
  1021. return errDeviceUnknown
  1022. }
  1023. // Assemble the device information from the connected device about
  1024. // themselves and us for all folders.
  1025. ccDeviceInfos := make(map[string]*clusterConfigDeviceInfo, len(cm.Folders))
  1026. for _, folder := range cm.Folders {
  1027. info := &clusterConfigDeviceInfo{}
  1028. for _, dev := range folder.Devices {
  1029. if dev.ID == m.id {
  1030. info.local = dev
  1031. } else if dev.ID == deviceID {
  1032. info.remote = dev
  1033. }
  1034. if info.local.ID != protocol.EmptyDeviceID && info.remote.ID != protocol.EmptyDeviceID {
  1035. break
  1036. }
  1037. }
  1038. if info.remote.ID == protocol.EmptyDeviceID {
  1039. l.Infof("Device %v sent cluster-config without the device info for the remote on folder %v", deviceID, folder.Description())
  1040. return errMissingRemoteInClusterConfig
  1041. }
  1042. if info.local.ID == protocol.EmptyDeviceID {
  1043. l.Infof("Device %v sent cluster-config without the device info for us locally on folder %v", deviceID, folder.Description())
  1044. return errMissingLocalInClusterConfig
  1045. }
  1046. ccDeviceInfos[folder.ID] = info
  1047. }
  1048. for _, info := range ccDeviceInfos {
  1049. if deviceCfg.Introducer && info.local.Introducer {
  1050. l.Warnf("Remote %v is an introducer to us, and we are to them - only one should be introducer to the other, see https://docs.syncthing.net/users/introducer.html", deviceCfg.Description())
  1051. }
  1052. break
  1053. }
  1054. // Needs to happen outside of the fmut, as can cause CommitConfiguration
  1055. if deviceCfg.AutoAcceptFolders {
  1056. w, _ := m.cfg.Modify(func(cfg *config.Configuration) {
  1057. changedFcfg := make(map[string]config.FolderConfiguration)
  1058. haveFcfg := cfg.FolderMap()
  1059. for _, folder := range cm.Folders {
  1060. from, ok := haveFcfg[folder.ID]
  1061. if to, changed := m.handleAutoAccepts(deviceID, folder, ccDeviceInfos[folder.ID], from, ok, cfg.Defaults.Folder); changed {
  1062. changedFcfg[folder.ID] = to
  1063. }
  1064. }
  1065. if len(changedFcfg) == 0 {
  1066. return
  1067. }
  1068. for i := range cfg.Folders {
  1069. if fcfg, ok := changedFcfg[cfg.Folders[i].ID]; ok {
  1070. cfg.Folders[i] = fcfg
  1071. delete(changedFcfg, cfg.Folders[i].ID)
  1072. }
  1073. }
  1074. for _, fcfg := range changedFcfg {
  1075. cfg.Folders = append(cfg.Folders, fcfg)
  1076. }
  1077. })
  1078. // Need to wait for the waiter, as this calls CommitConfiguration,
  1079. // which sets up the folder and as we return from this call,
  1080. // ClusterConfig starts poking at m.folderFiles and other things
  1081. // that might not exist until the config is committed.
  1082. w.Wait()
  1083. }
  1084. tempIndexFolders, states, err := m.ccHandleFolders(cm.Folders, deviceCfg, ccDeviceInfos, indexHandlerRegistry)
  1085. if err != nil {
  1086. return err
  1087. }
  1088. m.pmut.Lock()
  1089. m.remoteFolderStates[deviceID] = states
  1090. m.pmut.Unlock()
  1091. m.evLogger.Log(events.ClusterConfigReceived, ClusterConfigReceivedEventData{
  1092. Device: deviceID,
  1093. })
  1094. if len(tempIndexFolders) > 0 {
  1095. m.pmut.RLock()
  1096. conn, ok := m.conn[deviceID]
  1097. m.pmut.RUnlock()
  1098. // In case we've got ClusterConfig, and the connection disappeared
  1099. // from infront of our nose.
  1100. if ok {
  1101. m.progressEmitter.temporaryIndexSubscribe(conn, tempIndexFolders)
  1102. }
  1103. }
  1104. if deviceCfg.Introducer {
  1105. m.cfg.Modify(func(cfg *config.Configuration) {
  1106. folders, devices, foldersDevices, introduced := m.handleIntroductions(deviceCfg, cm, cfg.FolderMap(), cfg.DeviceMap())
  1107. folders, devices, deintroduced := m.handleDeintroductions(deviceCfg, foldersDevices, folders, devices)
  1108. if !introduced && !deintroduced {
  1109. return
  1110. }
  1111. cfg.Folders = make([]config.FolderConfiguration, 0, len(folders))
  1112. for _, fcfg := range folders {
  1113. cfg.Folders = append(cfg.Folders, fcfg)
  1114. }
  1115. cfg.Devices = make([]config.DeviceConfiguration, 0, len(devices))
  1116. for _, dcfg := range devices {
  1117. cfg.Devices = append(cfg.Devices, dcfg)
  1118. }
  1119. })
  1120. }
  1121. return nil
  1122. }
  1123. func (m *model) ccHandleFolders(folders []protocol.Folder, deviceCfg config.DeviceConfiguration, ccDeviceInfos map[string]*clusterConfigDeviceInfo, indexHandlers *indexHandlerRegistry) ([]string, map[string]remoteFolderState, error) {
  1124. var folderDevice config.FolderDeviceConfiguration
  1125. tempIndexFolders := make([]string, 0, len(folders))
  1126. seenFolders := make(map[string]remoteFolderState, len(folders))
  1127. updatedPending := make([]updatedPendingFolder, 0, len(folders))
  1128. deviceID := deviceCfg.DeviceID
  1129. expiredPending, err := m.db.PendingFoldersForDevice(deviceID)
  1130. if err != nil {
  1131. l.Infof("Could not get pending folders for cleanup: %v", err)
  1132. }
  1133. of := db.ObservedFolder{Time: time.Now().Truncate(time.Second)}
  1134. for _, folder := range folders {
  1135. seenFolders[folder.ID] = remoteFolderValid
  1136. cfg, ok := m.cfg.Folder(folder.ID)
  1137. if ok {
  1138. folderDevice, ok = cfg.Device(deviceID)
  1139. }
  1140. if !ok {
  1141. indexHandlers.Remove(folder.ID)
  1142. if deviceCfg.IgnoredFolder(folder.ID) {
  1143. l.Infof("Ignoring folder %s from device %s since we are configured to", folder.Description(), deviceID)
  1144. continue
  1145. }
  1146. delete(expiredPending, folder.ID)
  1147. of.Label = folder.Label
  1148. of.ReceiveEncrypted = len(ccDeviceInfos[folder.ID].local.EncryptionPasswordToken) > 0
  1149. of.RemoteEncrypted = len(ccDeviceInfos[folder.ID].remote.EncryptionPasswordToken) > 0
  1150. if err := m.db.AddOrUpdatePendingFolder(folder.ID, of, deviceID); err != nil {
  1151. l.Warnf("Failed to persist pending folder entry to database: %v", err)
  1152. }
  1153. if !folder.Paused {
  1154. indexHandlers.AddIndexInfo(folder.ID, ccDeviceInfos[folder.ID])
  1155. }
  1156. updatedPending = append(updatedPending, updatedPendingFolder{
  1157. FolderID: folder.ID,
  1158. FolderLabel: folder.Label,
  1159. DeviceID: deviceID,
  1160. ReceiveEncrypted: of.ReceiveEncrypted,
  1161. RemoteEncrypted: of.RemoteEncrypted,
  1162. })
  1163. // DEPRECATED: Only for backwards compatibility, should be removed.
  1164. m.evLogger.Log(events.FolderRejected, map[string]string{
  1165. "folder": folder.ID,
  1166. "folderLabel": folder.Label,
  1167. "device": deviceID.String(),
  1168. })
  1169. l.Infof("Unexpected folder %s sent from device %q; ensure that the folder exists and that this device is selected under \"Share With\" in the folder configuration.", folder.Description(), deviceID)
  1170. continue
  1171. }
  1172. if folder.Paused {
  1173. indexHandlers.Remove(folder.ID)
  1174. seenFolders[cfg.ID] = remoteFolderPaused
  1175. continue
  1176. }
  1177. if cfg.Paused {
  1178. indexHandlers.AddIndexInfo(folder.ID, ccDeviceInfos[folder.ID])
  1179. continue
  1180. }
  1181. if err := m.ccCheckEncryption(cfg, folderDevice, ccDeviceInfos[folder.ID], deviceCfg.Untrusted); err != nil {
  1182. sameError := false
  1183. m.fmut.Lock()
  1184. if devs, ok := m.folderEncryptionFailures[folder.ID]; ok {
  1185. sameError = devs[deviceID] == err
  1186. } else {
  1187. m.folderEncryptionFailures[folder.ID] = make(map[protocol.DeviceID]error)
  1188. }
  1189. m.folderEncryptionFailures[folder.ID][deviceID] = err
  1190. m.fmut.Unlock()
  1191. msg := fmt.Sprintf("Failure checking encryption consistency with device %v for folder %v: %v", deviceID, cfg.Description(), err)
  1192. if sameError {
  1193. l.Debugln(msg)
  1194. } else {
  1195. if rerr, ok := err.(*redactedError); ok {
  1196. err = rerr.redacted
  1197. }
  1198. m.evLogger.Log(events.Failure, err.Error())
  1199. l.Warnln(msg)
  1200. }
  1201. return tempIndexFolders, seenFolders, err
  1202. }
  1203. m.fmut.Lock()
  1204. if devErrs, ok := m.folderEncryptionFailures[folder.ID]; ok {
  1205. if len(devErrs) == 1 {
  1206. delete(m.folderEncryptionFailures, folder.ID)
  1207. } else {
  1208. delete(m.folderEncryptionFailures[folder.ID], deviceID)
  1209. }
  1210. }
  1211. m.fmut.Unlock()
  1212. // Handle indexes
  1213. if !folder.DisableTempIndexes {
  1214. tempIndexFolders = append(tempIndexFolders, folder.ID)
  1215. }
  1216. indexHandlers.AddIndexInfo(folder.ID, ccDeviceInfos[folder.ID])
  1217. }
  1218. indexHandlers.RemoveAllExcept(seenFolders)
  1219. // Explicitly mark folders we offer, but the remote has not accepted
  1220. for folderID, cfg := range m.cfg.Folders() {
  1221. if _, seen := seenFolders[folderID]; !seen && cfg.SharedWith(deviceID) {
  1222. l.Debugf("Remote device %v has not accepted sharing folder %s", deviceID.Short(), cfg.Description())
  1223. seenFolders[folderID] = remoteFolderNotSharing
  1224. }
  1225. }
  1226. expiredPendingList := make([]map[string]string, 0, len(expiredPending))
  1227. for folder := range expiredPending {
  1228. if err = m.db.RemovePendingFolderForDevice(folder, deviceID); err != nil {
  1229. msg := "Failed to remove pending folder-device entry"
  1230. l.Warnf("%v (%v, %v): %v", msg, folder, deviceID, err)
  1231. m.evLogger.Log(events.Failure, msg)
  1232. continue
  1233. }
  1234. expiredPendingList = append(expiredPendingList, map[string]string{
  1235. "folderID": folder,
  1236. "deviceID": deviceID.String(),
  1237. })
  1238. }
  1239. if len(updatedPending) > 0 || len(expiredPendingList) > 0 {
  1240. m.evLogger.Log(events.PendingFoldersChanged, map[string]interface{}{
  1241. "added": updatedPending,
  1242. "removed": expiredPendingList,
  1243. })
  1244. }
  1245. return tempIndexFolders, seenFolders, nil
  1246. }
  1247. func (m *model) ccCheckEncryption(fcfg config.FolderConfiguration, folderDevice config.FolderDeviceConfiguration, ccDeviceInfos *clusterConfigDeviceInfo, deviceUntrusted bool) error {
  1248. hasTokenRemote := len(ccDeviceInfos.remote.EncryptionPasswordToken) > 0
  1249. hasTokenLocal := len(ccDeviceInfos.local.EncryptionPasswordToken) > 0
  1250. isEncryptedRemote := folderDevice.EncryptionPassword != ""
  1251. isEncryptedLocal := fcfg.Type == config.FolderTypeReceiveEncrypted
  1252. if !isEncryptedRemote && !isEncryptedLocal && deviceUntrusted {
  1253. return errEncryptionNotEncryptedUntrusted
  1254. }
  1255. if !(hasTokenRemote || hasTokenLocal || isEncryptedRemote || isEncryptedLocal) {
  1256. // No one cares about encryption here
  1257. return nil
  1258. }
  1259. if isEncryptedRemote && isEncryptedLocal {
  1260. // Should never happen, but config racyness and be safe.
  1261. return errEncryptionInvConfigLocal
  1262. }
  1263. if hasTokenRemote && hasTokenLocal {
  1264. return errEncryptionInvConfigRemote
  1265. }
  1266. if !(hasTokenRemote || hasTokenLocal) {
  1267. if isEncryptedRemote {
  1268. return errEncryptionPlainForRemoteEncrypted
  1269. } else {
  1270. return errEncryptionPlainForReceiveEncrypted
  1271. }
  1272. }
  1273. if !(isEncryptedRemote || isEncryptedLocal) {
  1274. return errEncryptionNotEncryptedLocal
  1275. }
  1276. if isEncryptedRemote {
  1277. passwordToken := protocol.PasswordToken(m.keyGen, fcfg.ID, folderDevice.EncryptionPassword)
  1278. match := false
  1279. if hasTokenLocal {
  1280. match = bytes.Equal(passwordToken, ccDeviceInfos.local.EncryptionPasswordToken)
  1281. } else {
  1282. // hasTokenRemote == true
  1283. match = bytes.Equal(passwordToken, ccDeviceInfos.remote.EncryptionPasswordToken)
  1284. }
  1285. if !match {
  1286. return errEncryptionPassword
  1287. }
  1288. return nil
  1289. }
  1290. // isEncryptedLocal == true
  1291. var ccToken []byte
  1292. if hasTokenLocal {
  1293. ccToken = ccDeviceInfos.local.EncryptionPasswordToken
  1294. } else {
  1295. // hasTokenRemote == true
  1296. ccToken = ccDeviceInfos.remote.EncryptionPasswordToken
  1297. }
  1298. m.fmut.RLock()
  1299. token, ok := m.folderEncryptionPasswordTokens[fcfg.ID]
  1300. m.fmut.RUnlock()
  1301. if !ok {
  1302. var err error
  1303. token, err = readEncryptionToken(fcfg)
  1304. if err != nil && !fs.IsNotExist(err) {
  1305. if rerr, ok := redactPathError(err); ok {
  1306. return rerr
  1307. }
  1308. return &redactedError{
  1309. error: err,
  1310. redacted: errEncryptionTokenRead,
  1311. }
  1312. }
  1313. if err == nil {
  1314. m.fmut.Lock()
  1315. m.folderEncryptionPasswordTokens[fcfg.ID] = token
  1316. m.fmut.Unlock()
  1317. } else {
  1318. if err := writeEncryptionToken(ccToken, fcfg); err != nil {
  1319. if rerr, ok := redactPathError(err); ok {
  1320. return rerr
  1321. } else {
  1322. return &redactedError{
  1323. error: err,
  1324. redacted: errEncryptionTokenWrite,
  1325. }
  1326. }
  1327. }
  1328. m.fmut.Lock()
  1329. m.folderEncryptionPasswordTokens[fcfg.ID] = ccToken
  1330. m.fmut.Unlock()
  1331. // We can only announce ourselves once we have the token,
  1332. // thus we need to resend CCs now that we have it.
  1333. m.sendClusterConfig(fcfg.DeviceIDs())
  1334. return nil
  1335. }
  1336. }
  1337. if !bytes.Equal(token, ccToken) {
  1338. return errEncryptionPassword
  1339. }
  1340. return nil
  1341. }
  1342. func (m *model) sendClusterConfig(ids []protocol.DeviceID) {
  1343. if len(ids) == 0 {
  1344. return
  1345. }
  1346. ccConns := make([]protocol.Connection, 0, len(ids))
  1347. m.pmut.RLock()
  1348. for _, id := range ids {
  1349. if conn, ok := m.conn[id]; ok {
  1350. ccConns = append(ccConns, conn)
  1351. }
  1352. }
  1353. m.pmut.RUnlock()
  1354. // Generating cluster-configs acquires fmut -> must happen outside of pmut.
  1355. for _, conn := range ccConns {
  1356. cm, passwords := m.generateClusterConfig(conn.DeviceID())
  1357. conn.SetFolderPasswords(passwords)
  1358. go conn.ClusterConfig(cm)
  1359. }
  1360. }
  1361. // handleIntroductions handles adding devices/folders that are shared by an introducer device
  1362. func (m *model) handleIntroductions(introducerCfg config.DeviceConfiguration, cm protocol.ClusterConfig, folders map[string]config.FolderConfiguration, devices map[protocol.DeviceID]config.DeviceConfiguration) (map[string]config.FolderConfiguration, map[protocol.DeviceID]config.DeviceConfiguration, folderDeviceSet, bool) {
  1363. changed := false
  1364. foldersDevices := make(folderDeviceSet)
  1365. for _, folder := range cm.Folders {
  1366. // Adds devices which we do not have, but the introducer has
  1367. // for the folders that we have in common. Also, shares folders
  1368. // with devices that we have in common, yet are currently not sharing
  1369. // the folder.
  1370. fcfg, ok := folders[folder.ID]
  1371. if !ok {
  1372. // Don't have this folder, carry on.
  1373. continue
  1374. }
  1375. folderChanged := false
  1376. for _, device := range folder.Devices {
  1377. // No need to share with self.
  1378. if device.ID == m.id {
  1379. continue
  1380. }
  1381. foldersDevices.set(device.ID, folder.ID)
  1382. if _, ok := devices[device.ID]; !ok {
  1383. // The device is currently unknown. Add it to the config.
  1384. devices[device.ID] = m.introduceDevice(device, introducerCfg)
  1385. } else if fcfg.SharedWith(device.ID) {
  1386. // We already share the folder with this device, so
  1387. // nothing to do.
  1388. continue
  1389. }
  1390. if fcfg.Type != config.FolderTypeReceiveEncrypted && device.EncryptionPasswordToken != nil {
  1391. l.Infof("Cannot share folder %s with %v because the introducer %v encrypts data, which requires a password", folder.Description(), device.ID, introducerCfg.DeviceID)
  1392. continue
  1393. }
  1394. // We don't yet share this folder with this device. Add the device
  1395. // to sharing list of the folder.
  1396. l.Infof("Sharing folder %s with %v (vouched for by introducer %v)", folder.Description(), device.ID, introducerCfg.DeviceID)
  1397. fcfg.Devices = append(fcfg.Devices, config.FolderDeviceConfiguration{
  1398. DeviceID: device.ID,
  1399. IntroducedBy: introducerCfg.DeviceID,
  1400. })
  1401. folderChanged = true
  1402. }
  1403. if folderChanged {
  1404. folders[fcfg.ID] = fcfg
  1405. changed = true
  1406. }
  1407. }
  1408. return folders, devices, foldersDevices, changed
  1409. }
  1410. // handleDeintroductions handles removals of devices/shares that are removed by an introducer device
  1411. func (*model) handleDeintroductions(introducerCfg config.DeviceConfiguration, foldersDevices folderDeviceSet, folders map[string]config.FolderConfiguration, devices map[protocol.DeviceID]config.DeviceConfiguration) (map[string]config.FolderConfiguration, map[protocol.DeviceID]config.DeviceConfiguration, bool) {
  1412. if introducerCfg.SkipIntroductionRemovals {
  1413. return folders, devices, false
  1414. }
  1415. changed := false
  1416. devicesNotIntroduced := make(map[protocol.DeviceID]struct{})
  1417. // Check if we should unshare some folders, if the introducer has unshared them.
  1418. for folderID, folderCfg := range folders {
  1419. for k := 0; k < len(folderCfg.Devices); k++ {
  1420. if folderCfg.Devices[k].IntroducedBy != introducerCfg.DeviceID {
  1421. devicesNotIntroduced[folderCfg.Devices[k].DeviceID] = struct{}{}
  1422. continue
  1423. }
  1424. if !foldersDevices.has(folderCfg.Devices[k].DeviceID, folderCfg.ID) {
  1425. // We could not find that folder shared on the
  1426. // introducer with the device that was introduced to us.
  1427. // We should follow and unshare as well.
  1428. l.Infof("Unsharing folder %s with %v as introducer %v no longer shares the folder with that device", folderCfg.Description(), folderCfg.Devices[k].DeviceID, folderCfg.Devices[k].IntroducedBy)
  1429. folderCfg.Devices = append(folderCfg.Devices[:k], folderCfg.Devices[k+1:]...)
  1430. folders[folderID] = folderCfg
  1431. k--
  1432. changed = true
  1433. }
  1434. }
  1435. }
  1436. // Check if we should remove some devices, if the introducer no longer
  1437. // shares any folder with them. Yet do not remove if we share other
  1438. // folders that haven't been introduced by the introducer.
  1439. for deviceID, device := range devices {
  1440. if device.IntroducedBy == introducerCfg.DeviceID {
  1441. if !foldersDevices.hasDevice(deviceID) {
  1442. if _, ok := devicesNotIntroduced[deviceID]; !ok {
  1443. // The introducer no longer shares any folder with the
  1444. // device, remove the device.
  1445. l.Infof("Removing device %v as introducer %v no longer shares any folders with that device", deviceID, device.IntroducedBy)
  1446. changed = true
  1447. delete(devices, deviceID)
  1448. continue
  1449. }
  1450. l.Infof("Would have removed %v as %v no longer shares any folders, yet there are other folders that are shared with this device that haven't been introduced by this introducer.", deviceID, device.IntroducedBy)
  1451. }
  1452. }
  1453. }
  1454. return folders, devices, changed
  1455. }
  1456. // handleAutoAccepts handles adding and sharing folders for devices that have
  1457. // AutoAcceptFolders set to true.
  1458. func (m *model) handleAutoAccepts(deviceID protocol.DeviceID, folder protocol.Folder, ccDeviceInfos *clusterConfigDeviceInfo, cfg config.FolderConfiguration, haveCfg bool, defaultFolderCfg config.FolderConfiguration) (config.FolderConfiguration, bool) {
  1459. if !haveCfg {
  1460. defaultPathFs := fs.NewFilesystem(defaultFolderCfg.FilesystemType, defaultFolderCfg.Path)
  1461. var pathAlternatives []string
  1462. if alt := fs.SanitizePath(folder.Label); alt != "" {
  1463. pathAlternatives = append(pathAlternatives, alt)
  1464. }
  1465. if alt := fs.SanitizePath(folder.ID); alt != "" {
  1466. pathAlternatives = append(pathAlternatives, alt)
  1467. }
  1468. if len(pathAlternatives) == 0 {
  1469. l.Infof("Failed to auto-accept folder %s from %s due to lack of path alternatives", folder.Description(), deviceID)
  1470. return config.FolderConfiguration{}, false
  1471. }
  1472. for _, path := range pathAlternatives {
  1473. // Make sure the folder path doesn't already exist.
  1474. if _, err := defaultPathFs.Lstat(path); !fs.IsNotExist(err) {
  1475. continue
  1476. }
  1477. // Attempt to create it to make sure it does, now.
  1478. fullPath := filepath.Join(defaultFolderCfg.Path, path)
  1479. if err := defaultPathFs.MkdirAll(path, 0o700); err != nil {
  1480. l.Warnf("Failed to create path for auto-accepted folder %s at path %s: %v", folder.Description(), fullPath, err)
  1481. continue
  1482. }
  1483. fcfg := newFolderConfiguration(m.cfg, folder.ID, folder.Label, defaultFolderCfg.FilesystemType, fullPath)
  1484. fcfg.Devices = append(fcfg.Devices, config.FolderDeviceConfiguration{
  1485. DeviceID: deviceID,
  1486. })
  1487. if len(ccDeviceInfos.remote.EncryptionPasswordToken) > 0 || len(ccDeviceInfos.local.EncryptionPasswordToken) > 0 {
  1488. fcfg.Type = config.FolderTypeReceiveEncrypted
  1489. // Override the user-configured defaults, as normally done by the GUI
  1490. fcfg.FSWatcherEnabled = false
  1491. if fcfg.RescanIntervalS != 0 {
  1492. minRescanInterval := 3600 * 24
  1493. if fcfg.RescanIntervalS < minRescanInterval {
  1494. fcfg.RescanIntervalS = minRescanInterval
  1495. }
  1496. }
  1497. fcfg.Versioning.Reset()
  1498. // Other necessary settings are ensured by FolderConfiguration itself
  1499. } else {
  1500. ignores := m.cfg.DefaultIgnores()
  1501. if err := m.setIgnores(fcfg, ignores.Lines); err != nil {
  1502. l.Warnf("Failed to apply default ignores to auto-accepted folder %s at path %s: %v", folder.Description(), fcfg.Path, err)
  1503. }
  1504. }
  1505. l.Infof("Auto-accepted %s folder %s at path %s", deviceID, folder.Description(), fcfg.Path)
  1506. return fcfg, true
  1507. }
  1508. l.Infof("Failed to auto-accept folder %s from %s due to path conflict", folder.Description(), deviceID)
  1509. return config.FolderConfiguration{}, false
  1510. } else {
  1511. for _, device := range cfg.DeviceIDs() {
  1512. if device == deviceID {
  1513. // Already shared nothing todo.
  1514. return config.FolderConfiguration{}, false
  1515. }
  1516. }
  1517. if cfg.Type == config.FolderTypeReceiveEncrypted {
  1518. if len(ccDeviceInfos.remote.EncryptionPasswordToken) == 0 && len(ccDeviceInfos.local.EncryptionPasswordToken) == 0 {
  1519. l.Infof("Failed to auto-accept device %s on existing folder %s as the remote wants to send us unencrypted data, but the folder type is receive-encrypted", folder.Description(), deviceID)
  1520. return config.FolderConfiguration{}, false
  1521. }
  1522. } else {
  1523. if len(ccDeviceInfos.remote.EncryptionPasswordToken) > 0 || len(ccDeviceInfos.local.EncryptionPasswordToken) > 0 {
  1524. l.Infof("Failed to auto-accept device %s on existing folder %s as the remote wants to send us encrypted data, but the folder type is not receive-encrypted", folder.Description(), deviceID)
  1525. return config.FolderConfiguration{}, false
  1526. }
  1527. }
  1528. cfg.Devices = append(cfg.Devices, config.FolderDeviceConfiguration{
  1529. DeviceID: deviceID,
  1530. })
  1531. l.Infof("Shared %s with %s due to auto-accept", folder.ID, deviceID)
  1532. return cfg, true
  1533. }
  1534. }
  1535. func (m *model) introduceDevice(device protocol.Device, introducerCfg config.DeviceConfiguration) config.DeviceConfiguration {
  1536. addresses := []string{"dynamic"}
  1537. for _, addr := range device.Addresses {
  1538. if addr != "dynamic" {
  1539. addresses = append(addresses, addr)
  1540. }
  1541. }
  1542. l.Infof("Adding device %v to config (vouched for by introducer %v)", device.ID, introducerCfg.DeviceID)
  1543. newDeviceCfg := m.cfg.DefaultDevice()
  1544. newDeviceCfg.DeviceID = device.ID
  1545. newDeviceCfg.Name = device.Name
  1546. newDeviceCfg.Compression = introducerCfg.Compression
  1547. newDeviceCfg.Addresses = addresses
  1548. newDeviceCfg.CertName = device.CertName
  1549. newDeviceCfg.IntroducedBy = introducerCfg.DeviceID
  1550. // The introducers' introducers are also our introducers.
  1551. if device.Introducer {
  1552. l.Infof("Device %v is now also an introducer", device.ID)
  1553. newDeviceCfg.Introducer = true
  1554. newDeviceCfg.SkipIntroductionRemovals = device.SkipIntroductionRemovals
  1555. }
  1556. return newDeviceCfg
  1557. }
  1558. // Closed is called when a connection has been closed
  1559. func (m *model) Closed(conn protocol.Connection, err error) {
  1560. device := conn.DeviceID()
  1561. m.pmut.Lock()
  1562. conn, ok := m.conn[device]
  1563. if !ok {
  1564. m.pmut.Unlock()
  1565. return
  1566. }
  1567. delete(m.conn, device)
  1568. delete(m.connRequestLimiters, device)
  1569. delete(m.helloMessages, device)
  1570. delete(m.deviceDownloads, device)
  1571. delete(m.remoteFolderStates, device)
  1572. closed := m.closed[device]
  1573. delete(m.closed, device)
  1574. wait := m.indexHandlers.RemoveAndWaitChan(device, 0)
  1575. m.pmut.Unlock()
  1576. <-wait
  1577. m.progressEmitter.temporaryIndexUnsubscribe(conn)
  1578. m.deviceDidClose(device, time.Since(conn.EstablishedAt()))
  1579. l.Infof("Connection to %s at %s closed: %v", device, conn, err)
  1580. m.evLogger.Log(events.DeviceDisconnected, map[string]string{
  1581. "id": device.String(),
  1582. "error": err.Error(),
  1583. })
  1584. close(closed)
  1585. }
  1586. // Implements protocol.RequestResponse
  1587. type requestResponse struct {
  1588. data []byte
  1589. closed chan struct{}
  1590. once stdsync.Once
  1591. }
  1592. func newRequestResponse(size int) *requestResponse {
  1593. return &requestResponse{
  1594. data: protocol.BufferPool.Get(size),
  1595. closed: make(chan struct{}),
  1596. }
  1597. }
  1598. func (r *requestResponse) Data() []byte {
  1599. return r.data
  1600. }
  1601. func (r *requestResponse) Close() {
  1602. r.once.Do(func() {
  1603. protocol.BufferPool.Put(r.data)
  1604. close(r.closed)
  1605. })
  1606. }
  1607. func (r *requestResponse) Wait() {
  1608. <-r.closed
  1609. }
  1610. // Request returns the specified data segment by reading it from local disk.
  1611. // Implements the protocol.Model interface.
  1612. func (m *model) Request(conn protocol.Connection, folder, name string, _, size int32, offset int64, hash []byte, weakHash uint32, fromTemporary bool) (out protocol.RequestResponse, err error) {
  1613. if size < 0 || offset < 0 {
  1614. return nil, protocol.ErrInvalid
  1615. }
  1616. deviceID := conn.DeviceID()
  1617. m.fmut.RLock()
  1618. folderCfg, ok := m.folderCfgs[folder]
  1619. folderIgnores := m.folderIgnores[folder]
  1620. m.fmut.RUnlock()
  1621. if !ok {
  1622. // The folder might be already unpaused in the config, but not yet
  1623. // in the model.
  1624. l.Debugf("Request from %s for file %s in unstarted folder %q", deviceID, name, folder)
  1625. return nil, protocol.ErrGeneric
  1626. }
  1627. if !folderCfg.SharedWith(deviceID) {
  1628. l.Warnf("Request from %s for file %s in unshared folder %q", deviceID, name, folder)
  1629. return nil, protocol.ErrGeneric
  1630. }
  1631. if folderCfg.Paused {
  1632. l.Debugf("Request from %s for file %s in paused folder %q", deviceID, name, folder)
  1633. return nil, protocol.ErrGeneric
  1634. }
  1635. // Make sure the path is valid and in canonical form
  1636. if name, err = fs.Canonicalize(name); err != nil {
  1637. l.Debugf("Request from %s in folder %q for invalid filename %s", deviceID, folder, name)
  1638. return nil, protocol.ErrGeneric
  1639. }
  1640. if deviceID != protocol.LocalDeviceID {
  1641. l.Debugf("%v REQ(in): %s: %q / %q o=%d s=%d t=%v", m, deviceID, folder, name, offset, size, fromTemporary)
  1642. }
  1643. if fs.IsInternal(name) {
  1644. l.Debugf("%v REQ(in) for internal file: %s: %q / %q o=%d s=%d", m, deviceID, folder, name, offset, size)
  1645. return nil, protocol.ErrInvalid
  1646. }
  1647. if folderIgnores.Match(name).IsIgnored() {
  1648. l.Debugf("%v REQ(in) for ignored file: %s: %q / %q o=%d s=%d", m, deviceID, folder, name, offset, size)
  1649. return nil, protocol.ErrInvalid
  1650. }
  1651. // Restrict parallel requests by connection/device
  1652. m.pmut.RLock()
  1653. limiter := m.connRequestLimiters[deviceID]
  1654. m.pmut.RUnlock()
  1655. // The requestResponse releases the bytes to the buffer pool and the
  1656. // limiters when its Close method is called.
  1657. res := newLimitedRequestResponse(int(size), limiter, m.globalRequestLimiter)
  1658. defer func() {
  1659. // Close it ourselves if it isn't returned due to an error
  1660. if err != nil {
  1661. res.Close()
  1662. }
  1663. }()
  1664. // Grab the FS after limiting, as it causes I/O and we want to minimize
  1665. // the race time between the symlink check and the read.
  1666. folderFs := folderCfg.Filesystem(nil)
  1667. if err := osutil.TraversesSymlink(folderFs, filepath.Dir(name)); err != nil {
  1668. l.Debugf("%v REQ(in) traversal check: %s - %s: %q / %q o=%d s=%d", m, err, deviceID, folder, name, offset, size)
  1669. return nil, protocol.ErrNoSuchFile
  1670. }
  1671. // Only check temp files if the flag is set, and if we are set to advertise
  1672. // the temp indexes.
  1673. if fromTemporary && !folderCfg.DisableTempIndexes {
  1674. tempFn := fs.TempName(name)
  1675. if info, err := folderFs.Lstat(tempFn); err != nil || !info.IsRegular() {
  1676. // Reject reads for anything that doesn't exist or is something
  1677. // other than a regular file.
  1678. l.Debugf("%v REQ(in) failed stating temp file (%v): %s: %q / %q o=%d s=%d", m, err, deviceID, folder, name, offset, size)
  1679. return nil, protocol.ErrNoSuchFile
  1680. }
  1681. _, err := readOffsetIntoBuf(folderFs, tempFn, offset, res.data)
  1682. if err == nil && scanner.Validate(res.data, hash, weakHash) {
  1683. return res, nil
  1684. }
  1685. // Fall through to reading from a non-temp file, just in case the temp
  1686. // file has finished downloading.
  1687. }
  1688. if info, err := folderFs.Lstat(name); err != nil || !info.IsRegular() {
  1689. // Reject reads for anything that doesn't exist or is something
  1690. // other than a regular file.
  1691. l.Debugf("%v REQ(in) failed stating file (%v): %s: %q / %q o=%d s=%d", m, err, deviceID, folder, name, offset, size)
  1692. return nil, protocol.ErrNoSuchFile
  1693. }
  1694. n, err := readOffsetIntoBuf(folderFs, name, offset, res.data)
  1695. if fs.IsNotExist(err) {
  1696. l.Debugf("%v REQ(in) file doesn't exist: %s: %q / %q o=%d s=%d", m, deviceID, folder, name, offset, size)
  1697. return nil, protocol.ErrNoSuchFile
  1698. } else if err == io.EOF {
  1699. // Read beyond end of file. This might indicate a problem, or it
  1700. // might be a short block that gets padded when read for encrypted
  1701. // folders. We ignore the error and let the hash validation in the
  1702. // next step take care of it, by only hashing the part we actually
  1703. // managed to read.
  1704. } else if err != nil {
  1705. l.Debugf("%v REQ(in) failed reading file (%v): %s: %q / %q o=%d s=%d", m, err, deviceID, folder, name, offset, size)
  1706. return nil, protocol.ErrGeneric
  1707. }
  1708. if folderCfg.Type != config.FolderTypeReceiveEncrypted && len(hash) > 0 && !scanner.Validate(res.data[:n], hash, weakHash) {
  1709. m.recheckFile(deviceID, folder, name, offset, hash, weakHash)
  1710. l.Debugf("%v REQ(in) failed validating data: %s: %q / %q o=%d s=%d", m, deviceID, folder, name, offset, size)
  1711. return nil, protocol.ErrNoSuchFile
  1712. }
  1713. return res, nil
  1714. }
  1715. // newLimitedRequestResponse takes size bytes from the limiters in order,
  1716. // skipping nil limiters, then returns a requestResponse of the given size.
  1717. // When the requestResponse is closed the limiters are given back the bytes,
  1718. // in reverse order.
  1719. func newLimitedRequestResponse(size int, limiters ...*semaphore.Semaphore) *requestResponse {
  1720. multi := semaphore.MultiSemaphore(limiters)
  1721. multi.Take(size)
  1722. res := newRequestResponse(size)
  1723. go func() {
  1724. res.Wait()
  1725. multi.Give(size)
  1726. }()
  1727. return res
  1728. }
  1729. func (m *model) recheckFile(deviceID protocol.DeviceID, folder, name string, offset int64, hash []byte, weakHash uint32) {
  1730. cf, ok, err := m.CurrentFolderFile(folder, name)
  1731. if err != nil {
  1732. l.Debugf("%v recheckFile: %s: %q / %q: current file error: %v", m, deviceID, folder, name, err)
  1733. return
  1734. }
  1735. if !ok {
  1736. l.Debugf("%v recheckFile: %s: %q / %q: no current file", m, deviceID, folder, name)
  1737. return
  1738. }
  1739. if cf.IsDeleted() || cf.IsInvalid() || cf.IsSymlink() || cf.IsDirectory() {
  1740. l.Debugf("%v recheckFile: %s: %q / %q: not a regular file", m, deviceID, folder, name)
  1741. return
  1742. }
  1743. blockIndex := int(offset / int64(cf.BlockSize()))
  1744. if blockIndex >= len(cf.Blocks) {
  1745. l.Debugf("%v recheckFile: %s: %q / %q i=%d: block index too far", m, deviceID, folder, name, blockIndex)
  1746. return
  1747. }
  1748. block := cf.Blocks[blockIndex]
  1749. // Seems to want a different version of the file, whatever.
  1750. if !bytes.Equal(block.Hash, hash) {
  1751. l.Debugf("%v recheckFile: %s: %q / %q i=%d: hash mismatch %x != %x", m, deviceID, folder, name, blockIndex, block.Hash, hash)
  1752. return
  1753. }
  1754. if weakHash != 0 && block.WeakHash != weakHash {
  1755. l.Debugf("%v recheckFile: %s: %q / %q i=%d: weak hash mismatch %v != %v", m, deviceID, folder, name, blockIndex, block.WeakHash, weakHash)
  1756. return
  1757. }
  1758. // The hashes provided part of the request match what we expect to find according
  1759. // to what we have in the database, yet the content we've read off the filesystem doesn't
  1760. // Something is fishy, invalidate the file and rescan it.
  1761. // The file will temporarily become invalid, which is ok as the content is messed up.
  1762. m.fmut.RLock()
  1763. runner, ok := m.folderRunners.Get(folder)
  1764. m.fmut.RUnlock()
  1765. if !ok {
  1766. l.Debugf("%v recheckFile: %s: %q / %q: Folder stopped before rescan could be scheduled", m, deviceID, folder, name)
  1767. return
  1768. }
  1769. runner.ScheduleForceRescan(name)
  1770. l.Debugf("%v recheckFile: %s: %q / %q", m, deviceID, folder, name)
  1771. }
  1772. func (m *model) CurrentFolderFile(folder string, file string) (protocol.FileInfo, bool, error) {
  1773. m.fmut.RLock()
  1774. fs, ok := m.folderFiles[folder]
  1775. m.fmut.RUnlock()
  1776. if !ok {
  1777. return protocol.FileInfo{}, false, ErrFolderMissing
  1778. }
  1779. snap, err := fs.Snapshot()
  1780. if err != nil {
  1781. return protocol.FileInfo{}, false, err
  1782. }
  1783. f, ok := snap.Get(protocol.LocalDeviceID, file)
  1784. snap.Release()
  1785. return f, ok, nil
  1786. }
  1787. func (m *model) CurrentGlobalFile(folder string, file string) (protocol.FileInfo, bool, error) {
  1788. m.fmut.RLock()
  1789. ffs, ok := m.folderFiles[folder]
  1790. m.fmut.RUnlock()
  1791. if !ok {
  1792. return protocol.FileInfo{}, false, ErrFolderMissing
  1793. }
  1794. snap, err := ffs.Snapshot()
  1795. if err != nil {
  1796. return protocol.FileInfo{}, false, err
  1797. }
  1798. f, ok := snap.GetGlobal(file)
  1799. snap.Release()
  1800. return f, ok, nil
  1801. }
  1802. func (m *model) GetMtimeMapping(folder string, file string) (fs.MtimeMapping, error) {
  1803. m.fmut.RLock()
  1804. ffs, ok := m.folderFiles[folder]
  1805. fcfg := m.folderCfgs[folder]
  1806. m.fmut.RUnlock()
  1807. if !ok {
  1808. return fs.MtimeMapping{}, ErrFolderMissing
  1809. }
  1810. return fs.GetMtimeMapping(fcfg.Filesystem(ffs), file)
  1811. }
  1812. // Connection returns the current connection for device, and a boolean whether a connection was found.
  1813. func (m *model) Connection(deviceID protocol.DeviceID) (protocol.Connection, bool) {
  1814. m.pmut.RLock()
  1815. cn, ok := m.conn[deviceID]
  1816. m.pmut.RUnlock()
  1817. if ok {
  1818. m.deviceWasSeen(deviceID)
  1819. }
  1820. return cn, ok
  1821. }
  1822. // LoadIgnores loads or refreshes the ignore patterns from disk, if the
  1823. // folder is healthy, and returns the refreshed lines and patterns.
  1824. func (m *model) LoadIgnores(folder string) ([]string, []string, error) {
  1825. m.fmut.RLock()
  1826. cfg, cfgOk := m.folderCfgs[folder]
  1827. ignores, ignoresOk := m.folderIgnores[folder]
  1828. m.fmut.RUnlock()
  1829. if !cfgOk {
  1830. cfg, cfgOk = m.cfg.Folder(folder)
  1831. if !cfgOk {
  1832. return nil, nil, fmt.Errorf("folder %s does not exist", folder)
  1833. }
  1834. }
  1835. if cfg.Type == config.FolderTypeReceiveEncrypted {
  1836. return nil, nil, nil
  1837. }
  1838. if !ignoresOk {
  1839. ignores = ignore.New(cfg.Filesystem(nil))
  1840. }
  1841. err := ignores.Load(".stignore")
  1842. if fs.IsNotExist(err) {
  1843. // Having no ignores is not an error.
  1844. return nil, nil, nil
  1845. }
  1846. // Return lines and patterns, which may have some meaning even when err
  1847. // != nil, depending on the specific error.
  1848. return ignores.Lines(), ignores.Patterns(), err
  1849. }
  1850. // CurrentIgnores returns the currently loaded set of ignore patterns,
  1851. // whichever it may be. No attempt is made to load or refresh ignore
  1852. // patterns from disk.
  1853. func (m *model) CurrentIgnores(folder string) ([]string, []string, error) {
  1854. m.fmut.RLock()
  1855. _, cfgOk := m.folderCfgs[folder]
  1856. ignores, ignoresOk := m.folderIgnores[folder]
  1857. m.fmut.RUnlock()
  1858. if !cfgOk {
  1859. return nil, nil, fmt.Errorf("folder %s does not exist", folder)
  1860. }
  1861. if !ignoresOk {
  1862. // Empty ignore patterns
  1863. return []string{}, []string{}, nil
  1864. }
  1865. return ignores.Lines(), ignores.Patterns(), nil
  1866. }
  1867. func (m *model) SetIgnores(folder string, content []string) error {
  1868. cfg, ok := m.cfg.Folder(folder)
  1869. if !ok {
  1870. return fmt.Errorf("folder %s does not exist", cfg.Description())
  1871. }
  1872. return m.setIgnores(cfg, content)
  1873. }
  1874. func (m *model) setIgnores(cfg config.FolderConfiguration, content []string) error {
  1875. err := cfg.CheckPath()
  1876. if err == config.ErrPathMissing {
  1877. if err = cfg.CreateRoot(); err != nil {
  1878. return fmt.Errorf("failed to create folder root: %w", err)
  1879. }
  1880. err = cfg.CheckPath()
  1881. }
  1882. if err != nil && err != config.ErrMarkerMissing {
  1883. return err
  1884. }
  1885. if err := ignore.WriteIgnores(cfg.Filesystem(nil), ".stignore", content); err != nil {
  1886. l.Warnln("Saving .stignore:", err)
  1887. return err
  1888. }
  1889. m.fmut.RLock()
  1890. runner, ok := m.folderRunners.Get(cfg.ID)
  1891. m.fmut.RUnlock()
  1892. if ok {
  1893. runner.ScheduleScan()
  1894. }
  1895. return nil
  1896. }
  1897. // OnHello is called when an device connects to us.
  1898. // This allows us to extract some information from the Hello message
  1899. // and add it to a list of known devices ahead of any checks.
  1900. func (m *model) OnHello(remoteID protocol.DeviceID, addr net.Addr, hello protocol.Hello) error {
  1901. if _, ok := m.cfg.Device(remoteID); !ok {
  1902. if err := m.db.AddOrUpdatePendingDevice(remoteID, hello.DeviceName, addr.String()); err != nil {
  1903. l.Warnf("Failed to persist pending device entry to database: %v", err)
  1904. }
  1905. m.evLogger.Log(events.PendingDevicesChanged, map[string][]interface{}{
  1906. "added": {map[string]string{
  1907. "deviceID": remoteID.String(),
  1908. "name": hello.DeviceName,
  1909. "address": addr.String(),
  1910. }},
  1911. })
  1912. // DEPRECATED: Only for backwards compatibility, should be removed.
  1913. m.evLogger.Log(events.DeviceRejected, map[string]string{
  1914. "name": hello.DeviceName,
  1915. "device": remoteID.String(),
  1916. "address": addr.String(),
  1917. })
  1918. return errDeviceUnknown
  1919. }
  1920. return nil
  1921. }
  1922. // GetHello is called when we are about to connect to some remote device.
  1923. func (m *model) GetHello(id protocol.DeviceID) protocol.HelloIntf {
  1924. name := ""
  1925. if _, ok := m.cfg.Device(id); ok {
  1926. // Set our name (from the config of our device ID) only if we already know about the other side device ID.
  1927. if myCfg, ok := m.cfg.Device(m.id); ok {
  1928. name = myCfg.Name
  1929. }
  1930. }
  1931. return &protocol.Hello{
  1932. DeviceName: name,
  1933. ClientName: m.clientName,
  1934. ClientVersion: m.clientVersion,
  1935. }
  1936. }
  1937. // AddConnection adds a new peer connection to the model. An initial index will
  1938. // be sent to the connected peer, thereafter index updates whenever the local
  1939. // folder changes.
  1940. func (m *model) AddConnection(conn protocol.Connection, hello protocol.Hello) {
  1941. deviceID := conn.DeviceID()
  1942. device, ok := m.cfg.Device(deviceID)
  1943. if !ok {
  1944. l.Infoln("Trying to add connection to unknown device")
  1945. return
  1946. }
  1947. // The slightly unusual locking sequence here is because we must acquire
  1948. // fmut before pmut. (The locks can be *released* in any order.)
  1949. m.fmut.RLock()
  1950. m.pmut.Lock()
  1951. if oldConn, ok := m.conn[deviceID]; ok {
  1952. l.Infoln("Replacing old connection", oldConn, "with", conn, "for", deviceID)
  1953. // There is an existing connection to this device that we are
  1954. // replacing. We must close the existing connection and wait for the
  1955. // close to complete before adding the new connection. We do the
  1956. // actual close without holding pmut as the connection will call
  1957. // back into Closed() for the cleanup.
  1958. closed := m.closed[deviceID]
  1959. m.fmut.RUnlock()
  1960. m.pmut.Unlock()
  1961. oldConn.Close(errReplacingConnection)
  1962. <-closed
  1963. // Again, lock fmut before pmut.
  1964. m.fmut.RLock()
  1965. m.pmut.Lock()
  1966. }
  1967. m.conn[deviceID] = conn
  1968. closed := make(chan struct{})
  1969. m.closed[deviceID] = closed
  1970. m.deviceDownloads[deviceID] = newDeviceDownloadState()
  1971. indexRegistry := newIndexHandlerRegistry(conn, m.deviceDownloads[deviceID], m.evLogger)
  1972. for id, fcfg := range m.folderCfgs {
  1973. runner, _ := m.folderRunners.Get(id)
  1974. indexRegistry.RegisterFolderState(fcfg, m.folderFiles[id], runner)
  1975. }
  1976. m.indexHandlers.Add(deviceID, indexRegistry)
  1977. m.fmut.RUnlock()
  1978. // 0: default, <0: no limiting
  1979. switch {
  1980. case device.MaxRequestKiB > 0:
  1981. m.connRequestLimiters[deviceID] = semaphore.New(1024 * device.MaxRequestKiB)
  1982. case device.MaxRequestKiB == 0:
  1983. m.connRequestLimiters[deviceID] = semaphore.New(1024 * defaultPullerPendingKiB)
  1984. }
  1985. m.helloMessages[deviceID] = hello
  1986. event := map[string]string{
  1987. "id": deviceID.String(),
  1988. "deviceName": hello.DeviceName,
  1989. "clientName": hello.ClientName,
  1990. "clientVersion": hello.ClientVersion,
  1991. "type": conn.Type(),
  1992. }
  1993. addr := conn.RemoteAddr()
  1994. if addr != nil {
  1995. event["addr"] = addr.String()
  1996. }
  1997. m.evLogger.Log(events.DeviceConnected, event)
  1998. l.Infof(`Device %s client is "%s %s" named "%s" at %s`, deviceID, hello.ClientName, hello.ClientVersion, hello.DeviceName, conn)
  1999. conn.Start()
  2000. m.pmut.Unlock()
  2001. // Acquires fmut, so has to be done outside of pmut.
  2002. cm, passwords := m.generateClusterConfig(deviceID)
  2003. conn.SetFolderPasswords(passwords)
  2004. conn.ClusterConfig(cm)
  2005. if (device.Name == "" || m.cfg.Options().OverwriteRemoteDevNames) && hello.DeviceName != "" {
  2006. m.cfg.Modify(func(cfg *config.Configuration) {
  2007. for i := range cfg.Devices {
  2008. if cfg.Devices[i].DeviceID == deviceID {
  2009. if cfg.Devices[i].Name == "" || cfg.Options.OverwriteRemoteDevNames {
  2010. cfg.Devices[i].Name = hello.DeviceName
  2011. }
  2012. return
  2013. }
  2014. }
  2015. })
  2016. }
  2017. m.deviceWasSeen(deviceID)
  2018. }
  2019. func (m *model) DownloadProgress(conn protocol.Connection, folder string, updates []protocol.FileDownloadProgressUpdate) error {
  2020. m.fmut.RLock()
  2021. cfg, ok := m.folderCfgs[folder]
  2022. m.fmut.RUnlock()
  2023. device := conn.DeviceID()
  2024. if !ok || cfg.DisableTempIndexes || !cfg.SharedWith(device) {
  2025. return nil
  2026. }
  2027. m.pmut.RLock()
  2028. downloads := m.deviceDownloads[device]
  2029. m.pmut.RUnlock()
  2030. downloads.Update(folder, updates)
  2031. state := downloads.GetBlockCounts(folder)
  2032. m.evLogger.Log(events.RemoteDownloadProgress, map[string]interface{}{
  2033. "device": device.String(),
  2034. "folder": folder,
  2035. "state": state,
  2036. })
  2037. return nil
  2038. }
  2039. func (m *model) deviceWasSeen(deviceID protocol.DeviceID) {
  2040. m.fmut.RLock()
  2041. sr, ok := m.deviceStatRefs[deviceID]
  2042. m.fmut.RUnlock()
  2043. if ok {
  2044. _ = sr.WasSeen()
  2045. }
  2046. }
  2047. func (m *model) deviceDidClose(deviceID protocol.DeviceID, duration time.Duration) {
  2048. m.fmut.RLock()
  2049. sr, ok := m.deviceStatRefs[deviceID]
  2050. m.fmut.RUnlock()
  2051. if ok {
  2052. _ = sr.LastConnectionDuration(duration)
  2053. }
  2054. }
  2055. func (m *model) requestGlobal(ctx context.Context, deviceID protocol.DeviceID, folder, name string, blockNo int, offset int64, size int, hash []byte, weakHash uint32, fromTemporary bool) ([]byte, error) {
  2056. m.pmut.RLock()
  2057. nc, ok := m.conn[deviceID]
  2058. m.pmut.RUnlock()
  2059. if !ok {
  2060. return nil, fmt.Errorf("requestGlobal: no such device: %s", deviceID)
  2061. }
  2062. l.Debugf("%v REQ(out): %s: %q / %q b=%d o=%d s=%d h=%x wh=%x ft=%t", m, deviceID, folder, name, blockNo, offset, size, hash, weakHash, fromTemporary)
  2063. return nc.Request(ctx, folder, name, blockNo, offset, size, hash, weakHash, fromTemporary)
  2064. }
  2065. func (m *model) ScanFolders() map[string]error {
  2066. m.fmut.RLock()
  2067. folders := make([]string, 0, len(m.folderCfgs))
  2068. for folder := range m.folderCfgs {
  2069. folders = append(folders, folder)
  2070. }
  2071. m.fmut.RUnlock()
  2072. errors := make(map[string]error, len(m.folderCfgs))
  2073. errorsMut := sync.NewMutex()
  2074. wg := sync.NewWaitGroup()
  2075. wg.Add(len(folders))
  2076. for _, folder := range folders {
  2077. folder := folder
  2078. go func() {
  2079. err := m.ScanFolder(folder)
  2080. if err != nil {
  2081. errorsMut.Lock()
  2082. errors[folder] = err
  2083. errorsMut.Unlock()
  2084. }
  2085. wg.Done()
  2086. }()
  2087. }
  2088. wg.Wait()
  2089. return errors
  2090. }
  2091. func (m *model) ScanFolder(folder string) error {
  2092. return m.ScanFolderSubdirs(folder, nil)
  2093. }
  2094. func (m *model) ScanFolderSubdirs(folder string, subs []string) error {
  2095. m.fmut.RLock()
  2096. err := m.checkFolderRunningLocked(folder)
  2097. runner, _ := m.folderRunners.Get(folder)
  2098. m.fmut.RUnlock()
  2099. if err != nil {
  2100. return err
  2101. }
  2102. return runner.Scan(subs)
  2103. }
  2104. func (m *model) DelayScan(folder string, next time.Duration) {
  2105. m.fmut.RLock()
  2106. runner, ok := m.folderRunners.Get(folder)
  2107. m.fmut.RUnlock()
  2108. if !ok {
  2109. return
  2110. }
  2111. runner.DelayScan(next)
  2112. }
  2113. // numHashers returns the number of hasher routines to use for a given folder,
  2114. // taking into account configuration and available CPU cores.
  2115. func (m *model) numHashers(folder string) int {
  2116. m.fmut.RLock()
  2117. folderCfg := m.folderCfgs[folder]
  2118. numFolders := len(m.folderCfgs)
  2119. m.fmut.RUnlock()
  2120. if folderCfg.Hashers > 0 {
  2121. // Specific value set in the config, use that.
  2122. return folderCfg.Hashers
  2123. }
  2124. if build.IsWindows || build.IsDarwin || build.IsAndroid {
  2125. // Interactive operating systems; don't load the system too heavily by
  2126. // default.
  2127. return 1
  2128. }
  2129. // For other operating systems and architectures, lets try to get some
  2130. // work done... Divide the available CPU cores among the configured
  2131. // folders.
  2132. if perFolder := runtime.GOMAXPROCS(-1) / numFolders; perFolder > 0 {
  2133. return perFolder
  2134. }
  2135. return 1
  2136. }
  2137. // generateClusterConfig returns a ClusterConfigMessage that is correct and the
  2138. // set of folder passwords for the given peer device
  2139. func (m *model) generateClusterConfig(device protocol.DeviceID) (protocol.ClusterConfig, map[string]string) {
  2140. var message protocol.ClusterConfig
  2141. m.fmut.RLock()
  2142. defer m.fmut.RUnlock()
  2143. folders := m.cfg.FolderList()
  2144. passwords := make(map[string]string, len(folders))
  2145. for _, folderCfg := range folders {
  2146. if !folderCfg.SharedWith(device) {
  2147. continue
  2148. }
  2149. encryptionToken, hasEncryptionToken := m.folderEncryptionPasswordTokens[folderCfg.ID]
  2150. if folderCfg.Type == config.FolderTypeReceiveEncrypted && !hasEncryptionToken {
  2151. // We haven't gotten a token for us yet and without one the other
  2152. // side can't validate us - pretend we don't have the folder yet.
  2153. continue
  2154. }
  2155. protocolFolder := protocol.Folder{
  2156. ID: folderCfg.ID,
  2157. Label: folderCfg.Label,
  2158. ReadOnly: folderCfg.Type == config.FolderTypeSendOnly,
  2159. IgnorePermissions: folderCfg.IgnorePerms,
  2160. IgnoreDelete: folderCfg.IgnoreDelete,
  2161. DisableTempIndexes: folderCfg.DisableTempIndexes,
  2162. }
  2163. fs := m.folderFiles[folderCfg.ID]
  2164. // Even if we aren't paused, if we haven't started the folder yet
  2165. // pretend we are. Otherwise the remote might get confused about
  2166. // the missing index info (and drop all the info). We will send
  2167. // another cluster config once the folder is started.
  2168. protocolFolder.Paused = folderCfg.Paused || fs == nil
  2169. for _, folderDevice := range folderCfg.Devices {
  2170. deviceCfg, _ := m.cfg.Device(folderDevice.DeviceID)
  2171. protocolDevice := protocol.Device{
  2172. ID: deviceCfg.DeviceID,
  2173. Name: deviceCfg.Name,
  2174. Addresses: deviceCfg.Addresses,
  2175. Compression: deviceCfg.Compression,
  2176. CertName: deviceCfg.CertName,
  2177. Introducer: deviceCfg.Introducer,
  2178. }
  2179. if deviceCfg.DeviceID == m.id && hasEncryptionToken {
  2180. protocolDevice.EncryptionPasswordToken = encryptionToken
  2181. } else if folderDevice.EncryptionPassword != "" {
  2182. protocolDevice.EncryptionPasswordToken = protocol.PasswordToken(m.keyGen, folderCfg.ID, folderDevice.EncryptionPassword)
  2183. if folderDevice.DeviceID == device {
  2184. passwords[folderCfg.ID] = folderDevice.EncryptionPassword
  2185. }
  2186. }
  2187. if fs != nil {
  2188. if deviceCfg.DeviceID == m.id {
  2189. protocolDevice.IndexID = fs.IndexID(protocol.LocalDeviceID)
  2190. protocolDevice.MaxSequence = fs.Sequence(protocol.LocalDeviceID)
  2191. } else {
  2192. protocolDevice.IndexID = fs.IndexID(deviceCfg.DeviceID)
  2193. protocolDevice.MaxSequence = fs.Sequence(deviceCfg.DeviceID)
  2194. }
  2195. }
  2196. protocolFolder.Devices = append(protocolFolder.Devices, protocolDevice)
  2197. }
  2198. message.Folders = append(message.Folders, protocolFolder)
  2199. }
  2200. return message, passwords
  2201. }
  2202. func (m *model) State(folder string) (string, time.Time, error) {
  2203. m.fmut.RLock()
  2204. runner, ok := m.folderRunners.Get(folder)
  2205. m.fmut.RUnlock()
  2206. if !ok {
  2207. // The returned error should be an actual folder error, so returning
  2208. // errors.New("does not exist") or similar here would be
  2209. // inappropriate.
  2210. return "", time.Time{}, nil
  2211. }
  2212. state, changed, err := runner.getState()
  2213. return state.String(), changed, err
  2214. }
  2215. func (m *model) FolderErrors(folder string) ([]FileError, error) {
  2216. m.fmut.RLock()
  2217. err := m.checkFolderRunningLocked(folder)
  2218. runner, _ := m.folderRunners.Get(folder)
  2219. m.fmut.RUnlock()
  2220. if err != nil {
  2221. return nil, err
  2222. }
  2223. return runner.Errors(), nil
  2224. }
  2225. func (m *model) WatchError(folder string) error {
  2226. m.fmut.RLock()
  2227. err := m.checkFolderRunningLocked(folder)
  2228. runner, _ := m.folderRunners.Get(folder)
  2229. m.fmut.RUnlock()
  2230. if err != nil {
  2231. return nil // If the folder isn't running, there's no error to report.
  2232. }
  2233. return runner.WatchError()
  2234. }
  2235. func (m *model) Override(folder string) {
  2236. // Grab the runner and the file set.
  2237. m.fmut.RLock()
  2238. runner, ok := m.folderRunners.Get(folder)
  2239. m.fmut.RUnlock()
  2240. if !ok {
  2241. return
  2242. }
  2243. // Run the override, taking updates as if they came from scanning.
  2244. runner.Override()
  2245. }
  2246. func (m *model) Revert(folder string) {
  2247. // Grab the runner and the file set.
  2248. m.fmut.RLock()
  2249. runner, ok := m.folderRunners.Get(folder)
  2250. m.fmut.RUnlock()
  2251. if !ok {
  2252. return
  2253. }
  2254. // Run the revert, taking updates as if they came from scanning.
  2255. runner.Revert()
  2256. }
  2257. type TreeEntry struct {
  2258. Name string `json:"name"`
  2259. ModTime time.Time `json:"modTime"`
  2260. Size int64 `json:"size"`
  2261. Type protocol.FileInfoType `json:"type"`
  2262. Children []*TreeEntry `json:"children,omitempty"`
  2263. }
  2264. func findByName(slice []*TreeEntry, name string) *TreeEntry {
  2265. for _, child := range slice {
  2266. if child.Name == name {
  2267. return child
  2268. }
  2269. }
  2270. return nil
  2271. }
  2272. func (m *model) GlobalDirectoryTree(folder, prefix string, levels int, dirsOnly bool) ([]*TreeEntry, error) {
  2273. m.fmut.RLock()
  2274. files, ok := m.folderFiles[folder]
  2275. m.fmut.RUnlock()
  2276. if !ok {
  2277. return nil, ErrFolderMissing
  2278. }
  2279. root := &TreeEntry{
  2280. Children: make([]*TreeEntry, 0),
  2281. }
  2282. sep := string(filepath.Separator)
  2283. prefix = osutil.NativeFilename(prefix)
  2284. if prefix != "" && !strings.HasSuffix(prefix, sep) {
  2285. prefix = prefix + sep
  2286. }
  2287. snap, err := files.Snapshot()
  2288. if err != nil {
  2289. return nil, err
  2290. }
  2291. defer snap.Release()
  2292. snap.WithPrefixedGlobalTruncated(prefix, func(fi protocol.FileIntf) bool {
  2293. f := fi.(db.FileInfoTruncated)
  2294. // Don't include the prefix itself.
  2295. if f.IsInvalid() || f.IsDeleted() || strings.HasPrefix(prefix, f.Name) {
  2296. return true
  2297. }
  2298. f.Name = strings.Replace(f.Name, prefix, "", 1)
  2299. dir := filepath.Dir(f.Name)
  2300. base := filepath.Base(f.Name)
  2301. if levels > -1 && strings.Count(f.Name, sep) > levels {
  2302. return true
  2303. }
  2304. parent := root
  2305. if dir != "." {
  2306. for _, path := range strings.Split(dir, sep) {
  2307. child := findByName(parent.Children, path)
  2308. if child == nil {
  2309. err = fmt.Errorf("could not find child '%s' for path '%s' in parent '%s'", path, f.Name, parent.Name)
  2310. return false
  2311. }
  2312. parent = child
  2313. }
  2314. }
  2315. if dirsOnly && !f.IsDirectory() {
  2316. return true
  2317. }
  2318. parent.Children = append(parent.Children, &TreeEntry{
  2319. Name: base,
  2320. Type: f.Type,
  2321. ModTime: f.ModTime(),
  2322. Size: f.FileSize(),
  2323. })
  2324. return true
  2325. })
  2326. if err != nil {
  2327. return nil, err
  2328. }
  2329. return root.Children, nil
  2330. }
  2331. func (m *model) GetFolderVersions(folder string) (map[string][]versioner.FileVersion, error) {
  2332. m.fmut.RLock()
  2333. err := m.checkFolderRunningLocked(folder)
  2334. ver := m.folderVersioners[folder]
  2335. m.fmut.RUnlock()
  2336. if err != nil {
  2337. return nil, err
  2338. }
  2339. if ver == nil {
  2340. return nil, errNoVersioner
  2341. }
  2342. return ver.GetVersions()
  2343. }
  2344. func (m *model) RestoreFolderVersions(folder string, versions map[string]time.Time) (map[string]error, error) {
  2345. m.fmut.RLock()
  2346. err := m.checkFolderRunningLocked(folder)
  2347. fcfg := m.folderCfgs[folder]
  2348. ver := m.folderVersioners[folder]
  2349. m.fmut.RUnlock()
  2350. if err != nil {
  2351. return nil, err
  2352. }
  2353. if ver == nil {
  2354. return nil, errNoVersioner
  2355. }
  2356. restoreErrors := make(map[string]error)
  2357. for file, version := range versions {
  2358. if err := ver.Restore(file, version); err != nil {
  2359. restoreErrors[file] = err
  2360. }
  2361. }
  2362. // Trigger scan
  2363. if !fcfg.FSWatcherEnabled {
  2364. go func() { _ = m.ScanFolder(folder) }()
  2365. }
  2366. return restoreErrors, nil
  2367. }
  2368. func (m *model) Availability(folder string, file protocol.FileInfo, block protocol.BlockInfo) ([]Availability, error) {
  2369. // The slightly unusual locking sequence here is because we need to hold
  2370. // pmut for the duration (as the value returned from foldersFiles can
  2371. // get heavily modified on Close()), but also must acquire fmut before
  2372. // pmut. (The locks can be *released* in any order.)
  2373. m.fmut.RLock()
  2374. m.pmut.RLock()
  2375. defer m.pmut.RUnlock()
  2376. fs, ok := m.folderFiles[folder]
  2377. cfg := m.folderCfgs[folder]
  2378. m.fmut.RUnlock()
  2379. if !ok {
  2380. return nil, ErrFolderMissing
  2381. }
  2382. snap, err := fs.Snapshot()
  2383. if err != nil {
  2384. return nil, err
  2385. }
  2386. defer snap.Release()
  2387. return m.availabilityInSnapshotPRlocked(cfg, snap, file, block), nil
  2388. }
  2389. func (m *model) availabilityInSnapshot(cfg config.FolderConfiguration, snap *db.Snapshot, file protocol.FileInfo, block protocol.BlockInfo) []Availability {
  2390. m.pmut.RLock()
  2391. defer m.pmut.RUnlock()
  2392. return m.availabilityInSnapshotPRlocked(cfg, snap, file, block)
  2393. }
  2394. func (m *model) availabilityInSnapshotPRlocked(cfg config.FolderConfiguration, snap *db.Snapshot, file protocol.FileInfo, block protocol.BlockInfo) []Availability {
  2395. var availabilities []Availability
  2396. for _, device := range snap.Availability(file.Name) {
  2397. if _, ok := m.remoteFolderStates[device]; !ok {
  2398. continue
  2399. }
  2400. if state := m.remoteFolderStates[device][cfg.ID]; state != remoteFolderValid {
  2401. continue
  2402. }
  2403. _, ok := m.conn[device]
  2404. if ok {
  2405. availabilities = append(availabilities, Availability{ID: device, FromTemporary: false})
  2406. }
  2407. }
  2408. for _, device := range cfg.Devices {
  2409. if m.deviceDownloads[device.DeviceID].Has(cfg.ID, file.Name, file.Version, int(block.Offset/int64(file.BlockSize()))) {
  2410. availabilities = append(availabilities, Availability{ID: device.DeviceID, FromTemporary: true})
  2411. }
  2412. }
  2413. return availabilities
  2414. }
  2415. // BringToFront bumps the given files priority in the job queue.
  2416. func (m *model) BringToFront(folder, file string) {
  2417. m.fmut.RLock()
  2418. runner, ok := m.folderRunners.Get(folder)
  2419. m.fmut.RUnlock()
  2420. if ok {
  2421. runner.BringToFront(file)
  2422. }
  2423. }
  2424. func (m *model) ResetFolder(folder string) error {
  2425. m.fmut.RLock()
  2426. defer m.fmut.RUnlock()
  2427. _, ok := m.folderRunners.Get(folder)
  2428. if ok {
  2429. return errors.New("folder must be paused when resetting")
  2430. }
  2431. l.Infof("Cleaning metadata for reset folder %q", folder)
  2432. db.DropFolder(m.db, folder)
  2433. return nil
  2434. }
  2435. func (m *model) String() string {
  2436. return fmt.Sprintf("model@%p", m)
  2437. }
  2438. func (*model) VerifyConfiguration(from, to config.Configuration) error {
  2439. toFolders := to.FolderMap()
  2440. for _, from := range from.Folders {
  2441. to, ok := toFolders[from.ID]
  2442. if ok && from.Type != to.Type && (from.Type == config.FolderTypeReceiveEncrypted || to.Type == config.FolderTypeReceiveEncrypted) {
  2443. return errors.New("folder type must not be changed from/to receive-encrypted")
  2444. }
  2445. }
  2446. return nil
  2447. }
  2448. func (m *model) CommitConfiguration(from, to config.Configuration) bool {
  2449. // TODO: This should not use reflect, and should take more care to try to handle stuff without restart.
  2450. // Delay processing config changes until after the initial setup
  2451. <-m.started
  2452. // Go through the folder configs and figure out if we need to restart or not.
  2453. // Tracks devices affected by any configuration change to resend ClusterConfig.
  2454. clusterConfigDevices := make(deviceIDSet, len(from.Devices)+len(to.Devices))
  2455. closeDevices := make([]protocol.DeviceID, 0, len(to.Devices))
  2456. fromFolders := mapFolders(from.Folders)
  2457. toFolders := mapFolders(to.Folders)
  2458. for folderID, cfg := range toFolders {
  2459. if _, ok := fromFolders[folderID]; !ok {
  2460. // A folder was added.
  2461. if cfg.Paused {
  2462. l.Infoln("Paused folder", cfg.Description())
  2463. } else {
  2464. l.Infoln("Adding folder", cfg.Description())
  2465. if err := m.newFolder(cfg, to.Options.CacheIgnoredFiles); err != nil {
  2466. m.fatal(err)
  2467. return true
  2468. }
  2469. }
  2470. clusterConfigDevices.add(cfg.DeviceIDs())
  2471. }
  2472. }
  2473. removedFolders := make(map[string]struct{})
  2474. for folderID, fromCfg := range fromFolders {
  2475. toCfg, ok := toFolders[folderID]
  2476. if !ok {
  2477. // The folder was removed.
  2478. m.removeFolder(fromCfg)
  2479. clusterConfigDevices.add(fromCfg.DeviceIDs())
  2480. removedFolders[fromCfg.ID] = struct{}{}
  2481. continue
  2482. }
  2483. if fromCfg.Paused && toCfg.Paused {
  2484. continue
  2485. }
  2486. // This folder exists on both sides. Settings might have changed.
  2487. // Check if anything differs that requires a restart.
  2488. if !reflect.DeepEqual(fromCfg.RequiresRestartOnly(), toCfg.RequiresRestartOnly()) || from.Options.CacheIgnoredFiles != to.Options.CacheIgnoredFiles {
  2489. if err := m.restartFolder(fromCfg, toCfg, to.Options.CacheIgnoredFiles); err != nil {
  2490. m.fatal(err)
  2491. return true
  2492. }
  2493. clusterConfigDevices.add(fromCfg.DeviceIDs())
  2494. if toCfg.Type != config.FolderTypeReceiveEncrypted {
  2495. clusterConfigDevices.add(toCfg.DeviceIDs())
  2496. } else {
  2497. // If we don't have the encryption token yet, we need to drop
  2498. // the connection to make the remote re-send the cluster-config
  2499. // and with it the token.
  2500. m.fmut.RLock()
  2501. _, ok := m.folderEncryptionPasswordTokens[toCfg.ID]
  2502. m.fmut.RUnlock()
  2503. if !ok {
  2504. closeDevices = append(closeDevices, toCfg.DeviceIDs()...)
  2505. } else {
  2506. clusterConfigDevices.add(toCfg.DeviceIDs())
  2507. }
  2508. }
  2509. }
  2510. // Emit the folder pause/resume event
  2511. if fromCfg.Paused != toCfg.Paused {
  2512. eventType := events.FolderResumed
  2513. if toCfg.Paused {
  2514. eventType = events.FolderPaused
  2515. }
  2516. m.evLogger.Log(eventType, map[string]string{"id": toCfg.ID, "label": toCfg.Label})
  2517. }
  2518. }
  2519. // Removing a device. We actually don't need to do anything.
  2520. // Because folder config has changed (since the device lists do not match)
  2521. // Folders for that had device got "restarted", which involves killing
  2522. // connections to all devices that we were sharing the folder with.
  2523. // At some point model.Close() will get called for that device which will
  2524. // clean residue device state that is not part of any folder.
  2525. // Pausing a device, unpausing is handled by the connection service.
  2526. fromDevices := from.DeviceMap()
  2527. toDevices := to.DeviceMap()
  2528. for deviceID, toCfg := range toDevices {
  2529. fromCfg, ok := fromDevices[deviceID]
  2530. if !ok {
  2531. sr := stats.NewDeviceStatisticsReference(m.db, deviceID)
  2532. m.fmut.Lock()
  2533. m.deviceStatRefs[deviceID] = sr
  2534. m.fmut.Unlock()
  2535. continue
  2536. }
  2537. delete(fromDevices, deviceID)
  2538. if fromCfg.Paused == toCfg.Paused {
  2539. continue
  2540. }
  2541. if toCfg.Paused {
  2542. l.Infoln("Pausing", deviceID)
  2543. closeDevices = append(closeDevices, deviceID)
  2544. m.evLogger.Log(events.DevicePaused, map[string]string{"device": deviceID.String()})
  2545. } else {
  2546. // Ignored folder was removed, reconnect to retrigger the prompt.
  2547. if len(fromCfg.IgnoredFolders) > len(toCfg.IgnoredFolders) {
  2548. closeDevices = append(closeDevices, deviceID)
  2549. }
  2550. l.Infoln("Resuming", deviceID)
  2551. m.evLogger.Log(events.DeviceResumed, map[string]string{"device": deviceID.String()})
  2552. }
  2553. }
  2554. // Clean up after removed devices
  2555. removedDevices := make([]protocol.DeviceID, 0, len(fromDevices))
  2556. m.fmut.Lock()
  2557. for deviceID := range fromDevices {
  2558. delete(m.deviceStatRefs, deviceID)
  2559. removedDevices = append(removedDevices, deviceID)
  2560. delete(clusterConfigDevices, deviceID)
  2561. }
  2562. m.fmut.Unlock()
  2563. m.pmut.RLock()
  2564. for _, id := range closeDevices {
  2565. delete(clusterConfigDevices, id)
  2566. if conn, ok := m.conn[id]; ok {
  2567. go conn.Close(errDevicePaused)
  2568. }
  2569. }
  2570. for _, id := range removedDevices {
  2571. delete(clusterConfigDevices, id)
  2572. if conn, ok := m.conn[id]; ok {
  2573. go conn.Close(errDeviceRemoved)
  2574. }
  2575. }
  2576. m.pmut.RUnlock()
  2577. // Generating cluster-configs acquires fmut -> must happen outside of pmut.
  2578. m.sendClusterConfig(clusterConfigDevices.AsSlice())
  2579. ignoredDevices := observedDeviceSet(to.IgnoredDevices)
  2580. m.cleanPending(toDevices, toFolders, ignoredDevices, removedFolders)
  2581. m.globalRequestLimiter.SetCapacity(1024 * to.Options.MaxConcurrentIncomingRequestKiB())
  2582. m.folderIOLimiter.SetCapacity(to.Options.MaxFolderConcurrency())
  2583. // Some options don't require restart as those components handle it fine
  2584. // by themselves. Compare the options structs containing only the
  2585. // attributes that require restart and act apprioriately.
  2586. if !reflect.DeepEqual(from.Options.RequiresRestartOnly(), to.Options.RequiresRestartOnly()) {
  2587. l.Debugln(m, "requires restart, options differ")
  2588. return false
  2589. }
  2590. return true
  2591. }
  2592. func (m *model) cleanPending(existingDevices map[protocol.DeviceID]config.DeviceConfiguration, existingFolders map[string]config.FolderConfiguration, ignoredDevices deviceIDSet, removedFolders map[string]struct{}) {
  2593. var removedPendingFolders []map[string]string
  2594. pendingFolders, err := m.db.PendingFolders()
  2595. if err != nil {
  2596. msg := "Could not iterate through pending folder entries for cleanup"
  2597. l.Warnf("%v: %v", msg, err)
  2598. m.evLogger.Log(events.Failure, msg)
  2599. // Continue with pending devices below, loop is skipped.
  2600. }
  2601. for folderID, pf := range pendingFolders {
  2602. if _, ok := removedFolders[folderID]; ok {
  2603. // Forget pending folder device associations for recently removed
  2604. // folders as well, assuming the folder is no longer of interest
  2605. // at all (but might become pending again).
  2606. l.Debugf("Discarding pending removed folder %v from all devices", folderID)
  2607. if err := m.db.RemovePendingFolder(folderID); err != nil {
  2608. msg := "Failed to remove pending folder entry"
  2609. l.Warnf("%v (%v): %v", msg, folderID, err)
  2610. m.evLogger.Log(events.Failure, msg)
  2611. } else {
  2612. removedPendingFolders = append(removedPendingFolders, map[string]string{
  2613. "folderID": folderID,
  2614. })
  2615. }
  2616. continue
  2617. }
  2618. for deviceID := range pf.OfferedBy {
  2619. if dev, ok := existingDevices[deviceID]; !ok {
  2620. l.Debugf("Discarding pending folder %v from unknown device %v", folderID, deviceID)
  2621. goto removeFolderForDevice
  2622. } else if dev.IgnoredFolder(folderID) {
  2623. l.Debugf("Discarding now ignored pending folder %v for device %v", folderID, deviceID)
  2624. goto removeFolderForDevice
  2625. }
  2626. if folderCfg, ok := existingFolders[folderID]; ok {
  2627. if folderCfg.SharedWith(deviceID) {
  2628. l.Debugf("Discarding now shared pending folder %v for device %v", folderID, deviceID)
  2629. goto removeFolderForDevice
  2630. }
  2631. }
  2632. continue
  2633. removeFolderForDevice:
  2634. if err := m.db.RemovePendingFolderForDevice(folderID, deviceID); err != nil {
  2635. msg := "Failed to remove pending folder-device entry"
  2636. l.Warnf("%v (%v, %v): %v", msg, folderID, deviceID, err)
  2637. m.evLogger.Log(events.Failure, msg)
  2638. continue
  2639. }
  2640. removedPendingFolders = append(removedPendingFolders, map[string]string{
  2641. "folderID": folderID,
  2642. "deviceID": deviceID.String(),
  2643. })
  2644. }
  2645. }
  2646. if len(removedPendingFolders) > 0 {
  2647. m.evLogger.Log(events.PendingFoldersChanged, map[string]interface{}{
  2648. "removed": removedPendingFolders,
  2649. })
  2650. }
  2651. var removedPendingDevices []map[string]string
  2652. pendingDevices, err := m.db.PendingDevices()
  2653. if err != nil {
  2654. msg := "Could not iterate through pending device entries for cleanup"
  2655. l.Warnf("%v: %v", msg, err)
  2656. m.evLogger.Log(events.Failure, msg)
  2657. return
  2658. }
  2659. for deviceID := range pendingDevices {
  2660. if _, ok := ignoredDevices[deviceID]; ok {
  2661. l.Debugf("Discarding now ignored pending device %v", deviceID)
  2662. goto removeDevice
  2663. }
  2664. if _, ok := existingDevices[deviceID]; ok {
  2665. l.Debugf("Discarding now added pending device %v", deviceID)
  2666. goto removeDevice
  2667. }
  2668. continue
  2669. removeDevice:
  2670. if err := m.db.RemovePendingDevice(deviceID); err != nil {
  2671. msg := "Failed to remove pending device entry"
  2672. l.Warnf("%v: %v", msg, err)
  2673. m.evLogger.Log(events.Failure, msg)
  2674. continue
  2675. }
  2676. removedPendingDevices = append(removedPendingDevices, map[string]string{
  2677. "deviceID": deviceID.String(),
  2678. })
  2679. }
  2680. if len(removedPendingDevices) > 0 {
  2681. m.evLogger.Log(events.PendingDevicesChanged, map[string]interface{}{
  2682. "removed": removedPendingDevices,
  2683. })
  2684. }
  2685. }
  2686. // checkFolderRunningLocked returns nil if the folder is up and running and a
  2687. // descriptive error if not.
  2688. // Need to hold (read) lock on m.fmut when calling this.
  2689. func (m *model) checkFolderRunningLocked(folder string) error {
  2690. _, ok := m.folderRunners.Get(folder)
  2691. if ok {
  2692. return nil
  2693. }
  2694. if cfg, ok := m.cfg.Folder(folder); !ok {
  2695. return ErrFolderMissing
  2696. } else if cfg.Paused {
  2697. return ErrFolderPaused
  2698. }
  2699. return ErrFolderNotRunning
  2700. }
  2701. // PendingDevices lists unknown devices that tried to connect.
  2702. func (m *model) PendingDevices() (map[protocol.DeviceID]db.ObservedDevice, error) {
  2703. return m.db.PendingDevices()
  2704. }
  2705. // PendingFolders lists folders that we don't yet share with the offering devices. It
  2706. // returns the entries grouped by folder and filters for a given device unless the
  2707. // argument is specified as EmptyDeviceID.
  2708. func (m *model) PendingFolders(device protocol.DeviceID) (map[string]db.PendingFolder, error) {
  2709. return m.db.PendingFoldersForDevice(device)
  2710. }
  2711. // DismissPendingDevices removes the record of a specific pending device.
  2712. func (m *model) DismissPendingDevice(device protocol.DeviceID) error {
  2713. l.Debugf("Discarding pending device %v", device)
  2714. err := m.db.RemovePendingDevice(device)
  2715. if err != nil {
  2716. return err
  2717. }
  2718. removedPendingDevices := []map[string]string{
  2719. {"deviceID": device.String()},
  2720. }
  2721. m.evLogger.Log(events.PendingDevicesChanged, map[string]interface{}{
  2722. "removed": removedPendingDevices,
  2723. })
  2724. return nil
  2725. }
  2726. // DismissPendingFolders removes records of pending folders. Either a specific folder /
  2727. // device combination, or all matching a specific folder ID if the device argument is
  2728. // specified as EmptyDeviceID.
  2729. func (m *model) DismissPendingFolder(device protocol.DeviceID, folder string) error {
  2730. var removedPendingFolders []map[string]string
  2731. if device == protocol.EmptyDeviceID {
  2732. l.Debugf("Discarding pending removed folder %s from all devices", folder)
  2733. err := m.db.RemovePendingFolder(folder)
  2734. if err != nil {
  2735. return err
  2736. }
  2737. removedPendingFolders = []map[string]string{
  2738. {"folderID": folder},
  2739. }
  2740. } else {
  2741. l.Debugf("Discarding pending folder %s from device %v", folder, device)
  2742. err := m.db.RemovePendingFolderForDevice(folder, device)
  2743. if err != nil {
  2744. return err
  2745. }
  2746. removedPendingFolders = []map[string]string{
  2747. {
  2748. "folderID": folder,
  2749. "deviceID": device.String(),
  2750. },
  2751. }
  2752. }
  2753. if len(removedPendingFolders) > 0 {
  2754. m.evLogger.Log(events.PendingFoldersChanged, map[string]interface{}{
  2755. "removed": removedPendingFolders,
  2756. })
  2757. }
  2758. return nil
  2759. }
  2760. // mapFolders returns a map of folder ID to folder configuration for the given
  2761. // slice of folder configurations.
  2762. func mapFolders(folders []config.FolderConfiguration) map[string]config.FolderConfiguration {
  2763. m := make(map[string]config.FolderConfiguration, len(folders))
  2764. for _, cfg := range folders {
  2765. m[cfg.ID] = cfg
  2766. }
  2767. return m
  2768. }
  2769. // mapDevices returns a map of device ID to nothing for the given slice of
  2770. // device IDs.
  2771. func mapDevices(devices []protocol.DeviceID) map[protocol.DeviceID]struct{} {
  2772. m := make(map[protocol.DeviceID]struct{}, len(devices))
  2773. for _, dev := range devices {
  2774. m[dev] = struct{}{}
  2775. }
  2776. return m
  2777. }
  2778. func observedDeviceSet(devices []config.ObservedDevice) deviceIDSet {
  2779. res := make(deviceIDSet, len(devices))
  2780. for _, dev := range devices {
  2781. res[dev.ID] = struct{}{}
  2782. }
  2783. return res
  2784. }
  2785. func readOffsetIntoBuf(fs fs.Filesystem, file string, offset int64, buf []byte) (int, error) {
  2786. fd, err := fs.Open(file)
  2787. if err != nil {
  2788. l.Debugln("readOffsetIntoBuf.Open", file, err)
  2789. return 0, err
  2790. }
  2791. defer fd.Close()
  2792. n, err := fd.ReadAt(buf, offset)
  2793. if err != nil {
  2794. l.Debugln("readOffsetIntoBuf.ReadAt", file, err)
  2795. }
  2796. return n, err
  2797. }
  2798. // folderDeviceSet is a set of (folder, deviceID) pairs
  2799. type folderDeviceSet map[string]map[protocol.DeviceID]struct{}
  2800. // set adds the (dev, folder) pair to the set
  2801. func (s folderDeviceSet) set(dev protocol.DeviceID, folder string) {
  2802. devs, ok := s[folder]
  2803. if !ok {
  2804. devs = make(map[protocol.DeviceID]struct{})
  2805. s[folder] = devs
  2806. }
  2807. devs[dev] = struct{}{}
  2808. }
  2809. // has returns true if the (dev, folder) pair is in the set
  2810. func (s folderDeviceSet) has(dev protocol.DeviceID, folder string) bool {
  2811. _, ok := s[folder][dev]
  2812. return ok
  2813. }
  2814. // hasDevice returns true if the device is set on any folder
  2815. func (s folderDeviceSet) hasDevice(dev protocol.DeviceID) bool {
  2816. for _, devices := range s {
  2817. if _, ok := devices[dev]; ok {
  2818. return true
  2819. }
  2820. }
  2821. return false
  2822. }
  2823. // syncMutexMap is a type safe wrapper for a sync.Map that holds mutexes
  2824. type syncMutexMap struct {
  2825. inner stdsync.Map
  2826. }
  2827. func (m *syncMutexMap) Get(key string) sync.Mutex {
  2828. v, _ := m.inner.LoadOrStore(key, sync.NewMutex())
  2829. return v.(sync.Mutex)
  2830. }
  2831. type deviceIDSet map[protocol.DeviceID]struct{}
  2832. func (s deviceIDSet) add(ids []protocol.DeviceID) {
  2833. for _, id := range ids {
  2834. if _, ok := s[id]; !ok {
  2835. s[id] = struct{}{}
  2836. }
  2837. }
  2838. }
  2839. func (s deviceIDSet) AsSlice() []protocol.DeviceID {
  2840. ids := make([]protocol.DeviceID, 0, len(s))
  2841. for id := range s {
  2842. ids = append(ids, id)
  2843. }
  2844. return ids
  2845. }
  2846. func encryptionTokenPath(cfg config.FolderConfiguration) string {
  2847. return filepath.Join(cfg.MarkerName, config.EncryptionTokenName)
  2848. }
  2849. type storedEncryptionToken struct {
  2850. FolderID string
  2851. Token []byte
  2852. }
  2853. func readEncryptionToken(cfg config.FolderConfiguration) ([]byte, error) {
  2854. fd, err := cfg.Filesystem(nil).Open(encryptionTokenPath(cfg))
  2855. if err != nil {
  2856. return nil, err
  2857. }
  2858. defer fd.Close()
  2859. var stored storedEncryptionToken
  2860. if err := json.NewDecoder(fd).Decode(&stored); err != nil {
  2861. return nil, err
  2862. }
  2863. return stored.Token, nil
  2864. }
  2865. func writeEncryptionToken(token []byte, cfg config.FolderConfiguration) error {
  2866. tokenName := encryptionTokenPath(cfg)
  2867. fd, err := cfg.Filesystem(nil).OpenFile(tokenName, fs.OptReadWrite|fs.OptCreate, 0o666)
  2868. if err != nil {
  2869. return err
  2870. }
  2871. defer fd.Close()
  2872. return json.NewEncoder(fd).Encode(storedEncryptionToken{
  2873. FolderID: cfg.ID,
  2874. Token: token,
  2875. })
  2876. }
  2877. func newFolderConfiguration(w config.Wrapper, id, label string, fsType fs.FilesystemType, path string) config.FolderConfiguration {
  2878. fcfg := w.DefaultFolder()
  2879. fcfg.ID = id
  2880. fcfg.Label = label
  2881. fcfg.FilesystemType = fsType
  2882. fcfg.Path = path
  2883. return fcfg
  2884. }
  2885. type updatedPendingFolder struct {
  2886. FolderID string `json:"folderID"`
  2887. FolderLabel string `json:"folderLabel"`
  2888. DeviceID protocol.DeviceID `json:"deviceID"`
  2889. ReceiveEncrypted bool `json:"receiveEncrypted"`
  2890. RemoteEncrypted bool `json:"remoteEncrypted"`
  2891. }
  2892. // redactPathError checks if the error is actually a os.PathError, and if yes
  2893. // returns a redactedError with the path removed.
  2894. func redactPathError(err error) (error, bool) {
  2895. perr, ok := err.(*os.PathError)
  2896. if !ok {
  2897. return nil, false
  2898. }
  2899. return &redactedError{
  2900. error: err,
  2901. redacted: fmt.Errorf("%v: %w", perr.Op, perr.Err),
  2902. }, true
  2903. }
  2904. type redactedError struct {
  2905. error
  2906. redacted error
  2907. }