tcp_listen.go 5.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234
  1. // Copyright (C) 2016 The Syncthing Authors.
  2. //
  3. // This Source Code Form is subject to the terms of the Mozilla Public
  4. // License, v. 2.0. If a copy of the MPL was not distributed with this file,
  5. // You can obtain one at https://mozilla.org/MPL/2.0/.
  6. package connections
  7. import (
  8. "context"
  9. "crypto/tls"
  10. "net"
  11. "net/url"
  12. "sync"
  13. "time"
  14. "github.com/syncthing/syncthing/lib/config"
  15. "github.com/syncthing/syncthing/lib/connections/registry"
  16. "github.com/syncthing/syncthing/lib/dialer"
  17. "github.com/syncthing/syncthing/lib/nat"
  18. "github.com/syncthing/syncthing/lib/svcutil"
  19. )
  20. func init() {
  21. factory := &tcpListenerFactory{}
  22. for _, scheme := range []string{"tcp", "tcp4", "tcp6"} {
  23. listeners[scheme] = factory
  24. }
  25. }
  26. type tcpListener struct {
  27. svcutil.ServiceWithError
  28. onAddressesChangedNotifier
  29. uri *url.URL
  30. cfg config.Wrapper
  31. tlsCfg *tls.Config
  32. conns chan internalConn
  33. factory listenerFactory
  34. registry *registry.Registry
  35. natService *nat.Service
  36. mapping *nat.Mapping
  37. laddr net.Addr
  38. mut sync.RWMutex
  39. }
  40. func (t *tcpListener) serve(ctx context.Context) error {
  41. tcaddr, err := net.ResolveTCPAddr(t.uri.Scheme, t.uri.Host)
  42. if err != nil {
  43. l.Infoln("Listen (BEP/tcp):", err)
  44. return err
  45. }
  46. lc := net.ListenConfig{
  47. Control: dialer.ReusePortControl,
  48. }
  49. listener, err := lc.Listen(context.TODO(), t.uri.Scheme, tcaddr.String())
  50. if err != nil {
  51. l.Infoln("Listen (BEP/tcp):", err)
  52. return err
  53. }
  54. defer listener.Close()
  55. // We might bind to :0, so use the port we've been given.
  56. tcaddr = listener.Addr().(*net.TCPAddr)
  57. t.notifyAddressesChanged(t)
  58. defer t.clearAddresses(t)
  59. t.registry.Register(t.uri.Scheme, tcaddr)
  60. defer t.registry.Unregister(t.uri.Scheme, tcaddr)
  61. l.Infof("TCP listener (%v) starting", tcaddr)
  62. defer l.Infof("TCP listener (%v) shutting down", tcaddr)
  63. mapping := t.natService.NewMapping(nat.TCP, tcaddr.IP, tcaddr.Port)
  64. mapping.OnChanged(func() {
  65. t.notifyAddressesChanged(t)
  66. })
  67. // Should be called after t.mapping is nil'ed out.
  68. defer t.natService.RemoveMapping(mapping)
  69. t.mut.Lock()
  70. t.mapping = mapping
  71. t.laddr = tcaddr
  72. t.mut.Unlock()
  73. defer func() {
  74. t.mut.Lock()
  75. t.mapping = nil
  76. t.laddr = nil
  77. t.mut.Unlock()
  78. }()
  79. acceptFailures := 0
  80. const maxAcceptFailures = 10
  81. // :(, but what can you do.
  82. tcpListener := listener.(*net.TCPListener)
  83. for {
  84. _ = tcpListener.SetDeadline(time.Now().Add(time.Second))
  85. conn, err := tcpListener.Accept()
  86. select {
  87. case <-ctx.Done():
  88. if err == nil {
  89. conn.Close()
  90. }
  91. return nil
  92. default:
  93. }
  94. if err != nil {
  95. if err, ok := err.(*net.OpError); !ok || !err.Timeout() {
  96. l.Warnln("Listen (BEP/tcp): Accepting connection:", err)
  97. acceptFailures++
  98. if acceptFailures > maxAcceptFailures {
  99. // Return to restart the listener, because something
  100. // seems permanently damaged.
  101. return err
  102. }
  103. // Slightly increased delay for each failure.
  104. time.Sleep(time.Duration(acceptFailures) * time.Second)
  105. }
  106. continue
  107. }
  108. acceptFailures = 0
  109. l.Debugln("Listen (BEP/tcp): connect from", conn.RemoteAddr())
  110. if err := dialer.SetTCPOptions(conn); err != nil {
  111. l.Debugln("Listen (BEP/tcp): setting tcp options:", err)
  112. }
  113. if tc := t.cfg.Options().TrafficClass; tc != 0 {
  114. if err := dialer.SetTrafficClass(conn, tc); err != nil {
  115. l.Debugln("Listen (BEP/tcp): setting traffic class:", err)
  116. }
  117. }
  118. tc := tls.Server(conn, t.tlsCfg)
  119. if err := tlsTimedHandshake(tc); err != nil {
  120. l.Infoln("Listen (BEP/tcp): TLS handshake:", err)
  121. tc.Close()
  122. continue
  123. }
  124. t.conns <- newInternalConn(tc, connTypeTCPServer, tcpPriority)
  125. }
  126. }
  127. func (t *tcpListener) URI() *url.URL {
  128. return t.uri
  129. }
  130. func (t *tcpListener) WANAddresses() []*url.URL {
  131. t.mut.RLock()
  132. uris := []*url.URL{
  133. maybeReplacePort(t.uri, t.laddr),
  134. }
  135. if t.mapping != nil {
  136. addrs := t.mapping.ExternalAddresses()
  137. for _, addr := range addrs {
  138. uri := *t.uri
  139. // Does net.JoinHostPort internally
  140. uri.Host = addr.String()
  141. uris = append(uris, &uri)
  142. // For every address with a specified IP, add one without an IP,
  143. // just in case the specified IP is still internal (router behind DMZ).
  144. if len(addr.IP) != 0 && !addr.IP.IsUnspecified() {
  145. uri = *t.uri
  146. addr.IP = nil
  147. uri.Host = addr.String()
  148. uris = append(uris, &uri)
  149. }
  150. }
  151. }
  152. t.mut.RUnlock()
  153. // If we support ReusePort, add an unspecified zero port address, which will be resolved by the discovery server
  154. // in hopes that TCP punch through works.
  155. if dialer.SupportsReusePort {
  156. uri := *t.uri
  157. uri.Host = "0.0.0.0:0"
  158. uris = append([]*url.URL{&uri}, uris...)
  159. }
  160. return uris
  161. }
  162. func (t *tcpListener) LANAddresses() []*url.URL {
  163. t.mut.RLock()
  164. uri := maybeReplacePort(t.uri, t.laddr)
  165. t.mut.RUnlock()
  166. addrs := []*url.URL{uri}
  167. addrs = append(addrs, getURLsForAllAdaptersIfUnspecified(uri.Scheme, uri)...)
  168. return addrs
  169. }
  170. func (t *tcpListener) String() string {
  171. return t.uri.String()
  172. }
  173. func (t *tcpListener) Factory() listenerFactory {
  174. return t.factory
  175. }
  176. func (t *tcpListener) NATType() string {
  177. return "unknown"
  178. }
  179. type tcpListenerFactory struct{}
  180. func (f *tcpListenerFactory) New(uri *url.URL, cfg config.Wrapper, tlsCfg *tls.Config, conns chan internalConn, natService *nat.Service, registry *registry.Registry) genericListener {
  181. l := &tcpListener{
  182. uri: fixupPort(uri, config.DefaultTCPPort),
  183. cfg: cfg,
  184. tlsCfg: tlsCfg,
  185. conns: conns,
  186. natService: natService,
  187. factory: f,
  188. registry: registry,
  189. }
  190. l.ServiceWithError = svcutil.AsService(l.serve, l.String())
  191. return l
  192. }
  193. func (tcpListenerFactory) Valid(_ config.Configuration) error {
  194. // Always valid
  195. return nil
  196. }