tcp_listen.go 4.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213
  1. // Copyright (C) 2016 The Syncthing Authors.
  2. //
  3. // This Source Code Form is subject to the terms of the Mozilla Public
  4. // License, v. 2.0. If a copy of the MPL was not distributed with this file,
  5. // You can obtain one at https://mozilla.org/MPL/2.0/.
  6. package connections
  7. import (
  8. "crypto/tls"
  9. "net"
  10. "net/url"
  11. "sync"
  12. "time"
  13. "github.com/syncthing/syncthing/lib/config"
  14. "github.com/syncthing/syncthing/lib/dialer"
  15. "github.com/syncthing/syncthing/lib/nat"
  16. )
  17. func init() {
  18. factory := &tcpListenerFactory{}
  19. for _, scheme := range []string{"tcp", "tcp4", "tcp6"} {
  20. listeners[scheme] = factory
  21. }
  22. }
  23. type tcpListener struct {
  24. onAddressesChangedNotifier
  25. uri *url.URL
  26. cfg *config.Wrapper
  27. tlsCfg *tls.Config
  28. stop chan struct{}
  29. conns chan internalConn
  30. factory listenerFactory
  31. natService *nat.Service
  32. mapping *nat.Mapping
  33. err error
  34. mut sync.RWMutex
  35. }
  36. func (t *tcpListener) Serve() {
  37. t.mut.Lock()
  38. t.err = nil
  39. t.mut.Unlock()
  40. tcaddr, err := net.ResolveTCPAddr(t.uri.Scheme, t.uri.Host)
  41. if err != nil {
  42. t.mut.Lock()
  43. t.err = err
  44. t.mut.Unlock()
  45. l.Infoln("Listen (BEP/tcp):", err)
  46. return
  47. }
  48. listener, err := net.ListenTCP(t.uri.Scheme, tcaddr)
  49. if err != nil {
  50. t.mut.Lock()
  51. t.err = err
  52. t.mut.Unlock()
  53. l.Infoln("Listen (BEP/tcp):", err)
  54. return
  55. }
  56. defer listener.Close()
  57. l.Infof("TCP listener (%v) starting", listener.Addr())
  58. defer l.Infof("TCP listener (%v) shutting down", listener.Addr())
  59. mapping := t.natService.NewMapping(nat.TCP, tcaddr.IP, tcaddr.Port)
  60. mapping.OnChanged(func(_ *nat.Mapping, _, _ []nat.Address) {
  61. t.notifyAddressesChanged(t)
  62. })
  63. defer t.natService.RemoveMapping(mapping)
  64. t.mut.Lock()
  65. t.mapping = mapping
  66. t.mut.Unlock()
  67. acceptFailures := 0
  68. const maxAcceptFailures = 10
  69. for {
  70. listener.SetDeadline(time.Now().Add(time.Second))
  71. conn, err := listener.Accept()
  72. select {
  73. case <-t.stop:
  74. if err == nil {
  75. conn.Close()
  76. }
  77. t.mut.Lock()
  78. t.mapping = nil
  79. t.mut.Unlock()
  80. return
  81. default:
  82. }
  83. if err != nil {
  84. if err, ok := err.(*net.OpError); !ok || !err.Timeout() {
  85. l.Warnln("Listen (BEP/tcp): Accepting connection:", err)
  86. acceptFailures++
  87. if acceptFailures > maxAcceptFailures {
  88. // Return to restart the listener, because something
  89. // seems permanently damaged.
  90. return
  91. }
  92. // Slightly increased delay for each failure.
  93. time.Sleep(time.Duration(acceptFailures) * time.Second)
  94. }
  95. continue
  96. }
  97. acceptFailures = 0
  98. l.Debugln("Listen (BEP/tcp): connect from", conn.RemoteAddr())
  99. if err := dialer.SetTCPOptions(conn); err != nil {
  100. l.Debugln("Listen (BEP/tcp): setting tcp options:", err)
  101. }
  102. if tc := t.cfg.Options().TrafficClass; tc != 0 {
  103. if err := dialer.SetTrafficClass(conn, tc); err != nil {
  104. l.Debugln("Listen (BEP/tcp): setting traffic class:", err)
  105. }
  106. }
  107. tc := tls.Server(conn, t.tlsCfg)
  108. if err := tlsTimedHandshake(tc); err != nil {
  109. l.Infoln("Listen (BEP/tcp): TLS handshake:", err)
  110. tc.Close()
  111. continue
  112. }
  113. t.conns <- internalConn{tc, connTypeTCPServer, tcpPriority}
  114. }
  115. }
  116. func (t *tcpListener) Stop() {
  117. close(t.stop)
  118. }
  119. func (t *tcpListener) URI() *url.URL {
  120. return t.uri
  121. }
  122. func (t *tcpListener) WANAddresses() []*url.URL {
  123. uris := t.LANAddresses()
  124. t.mut.RLock()
  125. if t.mapping != nil {
  126. addrs := t.mapping.ExternalAddresses()
  127. for _, addr := range addrs {
  128. uri := *t.uri
  129. // Does net.JoinHostPort internally
  130. uri.Host = addr.String()
  131. uris = append(uris, &uri)
  132. // For every address with a specified IP, add one without an IP,
  133. // just in case the specified IP is still internal (router behind DMZ).
  134. if len(addr.IP) != 0 && !addr.IP.IsUnspecified() {
  135. uri = *t.uri
  136. addr.IP = nil
  137. uri.Host = addr.String()
  138. uris = append(uris, &uri)
  139. }
  140. }
  141. }
  142. t.mut.RUnlock()
  143. return uris
  144. }
  145. func (t *tcpListener) LANAddresses() []*url.URL {
  146. return []*url.URL{t.uri}
  147. }
  148. func (t *tcpListener) Error() error {
  149. t.mut.RLock()
  150. err := t.err
  151. t.mut.RUnlock()
  152. return err
  153. }
  154. func (t *tcpListener) String() string {
  155. return t.uri.String()
  156. }
  157. func (t *tcpListener) Factory() listenerFactory {
  158. return t.factory
  159. }
  160. func (t *tcpListener) NATType() string {
  161. return "unknown"
  162. }
  163. type tcpListenerFactory struct{}
  164. func (f *tcpListenerFactory) New(uri *url.URL, cfg *config.Wrapper, tlsCfg *tls.Config, conns chan internalConn, natService *nat.Service) genericListener {
  165. return &tcpListener{
  166. uri: fixupPort(uri, config.DefaultTCPPort),
  167. cfg: cfg,
  168. tlsCfg: tlsCfg,
  169. conns: conns,
  170. natService: natService,
  171. stop: make(chan struct{}),
  172. factory: f,
  173. }
  174. }
  175. func (tcpListenerFactory) Valid(_ config.Configuration) error {
  176. // Always valid
  177. return nil
  178. }