model.go 99 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384238523862387238823892390239123922393239423952396239723982399240024012402240324042405240624072408240924102411241224132414241524162417241824192420242124222423242424252426242724282429243024312432243324342435243624372438243924402441244224432444244524462447244824492450245124522453245424552456245724582459246024612462246324642465246624672468246924702471247224732474247524762477247824792480248124822483248424852486248724882489249024912492249324942495249624972498249925002501250225032504250525062507250825092510251125122513251425152516251725182519252025212522252325242525252625272528252925302531253225332534253525362537253825392540254125422543254425452546254725482549255025512552255325542555255625572558255925602561256225632564256525662567256825692570257125722573257425752576257725782579258025812582258325842585258625872588258925902591259225932594259525962597259825992600260126022603260426052606260726082609261026112612261326142615261626172618261926202621262226232624262526262627262826292630263126322633263426352636263726382639264026412642264326442645264626472648264926502651265226532654265526562657265826592660266126622663266426652666266726682669267026712672267326742675267626772678267926802681268226832684268526862687268826892690269126922693269426952696269726982699270027012702270327042705270627072708270927102711271227132714271527162717271827192720272127222723272427252726272727282729273027312732273327342735273627372738273927402741274227432744274527462747274827492750275127522753275427552756275727582759276027612762276327642765276627672768276927702771277227732774277527762777277827792780278127822783278427852786278727882789279027912792279327942795279627972798279928002801280228032804280528062807280828092810281128122813281428152816281728182819282028212822282328242825282628272828282928302831283228332834283528362837283828392840284128422843284428452846284728482849285028512852285328542855285628572858285928602861286228632864286528662867286828692870287128722873287428752876287728782879288028812882288328842885288628872888288928902891289228932894289528962897289828992900290129022903290429052906290729082909291029112912291329142915291629172918291929202921292229232924292529262927292829292930293129322933293429352936293729382939294029412942294329442945294629472948294929502951295229532954295529562957295829592960296129622963296429652966296729682969297029712972297329742975297629772978297929802981298229832984298529862987298829892990299129922993299429952996299729982999300030013002300330043005300630073008300930103011301230133014301530163017301830193020302130223023302430253026302730283029303030313032303330343035303630373038303930403041304230433044304530463047304830493050305130523053305430553056305730583059306030613062306330643065306630673068306930703071307230733074307530763077307830793080308130823083308430853086308730883089309030913092309330943095309630973098309931003101310231033104310531063107310831093110311131123113311431153116311731183119312031213122312331243125312631273128312931303131313231333134313531363137313831393140314131423143314431453146314731483149315031513152315331543155315631573158315931603161316231633164316531663167316831693170317131723173317431753176317731783179318031813182318331843185318631873188318931903191319231933194319531963197319831993200320132023203320432053206320732083209321032113212321332143215321632173218321932203221322232233224322532263227322832293230323132323233323432353236323732383239324032413242324332443245324632473248324932503251325232533254325532563257
  1. // Copyright (C) 2014 The Syncthing Authors.
  2. //
  3. // This Source Code Form is subject to the terms of the Mozilla Public
  4. // License, v. 2.0. If a copy of the MPL was not distributed with this file,
  5. // You can obtain one at https://mozilla.org/MPL/2.0/.
  6. //go:generate counterfeiter -o mocks/model.go --fake-name Model . Model
  7. package model
  8. import (
  9. "bytes"
  10. "context"
  11. "encoding/json"
  12. "fmt"
  13. "io"
  14. "net"
  15. "os"
  16. "path/filepath"
  17. "reflect"
  18. "runtime"
  19. "strings"
  20. stdsync "sync"
  21. "time"
  22. "github.com/pkg/errors"
  23. "github.com/thejerf/suture/v4"
  24. "github.com/syncthing/syncthing/lib/config"
  25. "github.com/syncthing/syncthing/lib/connections"
  26. "github.com/syncthing/syncthing/lib/db"
  27. "github.com/syncthing/syncthing/lib/events"
  28. "github.com/syncthing/syncthing/lib/fs"
  29. "github.com/syncthing/syncthing/lib/ignore"
  30. "github.com/syncthing/syncthing/lib/osutil"
  31. "github.com/syncthing/syncthing/lib/protocol"
  32. "github.com/syncthing/syncthing/lib/scanner"
  33. "github.com/syncthing/syncthing/lib/stats"
  34. "github.com/syncthing/syncthing/lib/svcutil"
  35. "github.com/syncthing/syncthing/lib/sync"
  36. "github.com/syncthing/syncthing/lib/ur/contract"
  37. "github.com/syncthing/syncthing/lib/versioner"
  38. )
  39. type service interface {
  40. suture.Service
  41. BringToFront(string)
  42. Override()
  43. Revert()
  44. DelayScan(d time.Duration)
  45. SchedulePull() // something relevant changed, we should try a pull
  46. Jobs(page, perpage int) ([]string, []string, int) // In progress, Queued, skipped
  47. Scan(subs []string) error
  48. Errors() []FileError
  49. WatchError() error
  50. ScheduleForceRescan(path string)
  51. GetStatistics() (stats.FolderStatistics, error)
  52. getState() (folderState, time.Time, error)
  53. }
  54. type Availability struct {
  55. ID protocol.DeviceID `json:"id"`
  56. FromTemporary bool `json:"fromTemporary"`
  57. }
  58. type Model interface {
  59. suture.Service
  60. connections.Model
  61. ResetFolder(folder string)
  62. DelayScan(folder string, next time.Duration)
  63. ScanFolder(folder string) error
  64. ScanFolders() map[string]error
  65. ScanFolderSubdirs(folder string, subs []string) error
  66. State(folder string) (string, time.Time, error)
  67. FolderErrors(folder string) ([]FileError, error)
  68. WatchError(folder string) error
  69. Override(folder string)
  70. Revert(folder string)
  71. BringToFront(folder, file string)
  72. LoadIgnores(folder string) ([]string, []string, error)
  73. CurrentIgnores(folder string) ([]string, []string, error)
  74. SetIgnores(folder string, content []string) error
  75. GetFolderVersions(folder string) (map[string][]versioner.FileVersion, error)
  76. RestoreFolderVersions(folder string, versions map[string]time.Time) (map[string]error, error)
  77. DBSnapshot(folder string) (*db.Snapshot, error)
  78. NeedFolderFiles(folder string, page, perpage int) ([]db.FileInfoTruncated, []db.FileInfoTruncated, []db.FileInfoTruncated, error)
  79. RemoteNeedFolderFiles(folder string, device protocol.DeviceID, page, perpage int) ([]db.FileInfoTruncated, error)
  80. LocalChangedFolderFiles(folder string, page, perpage int) ([]db.FileInfoTruncated, error)
  81. FolderProgressBytesCompleted(folder string) int64
  82. CurrentFolderFile(folder string, file string) (protocol.FileInfo, bool, error)
  83. CurrentGlobalFile(folder string, file string) (protocol.FileInfo, bool, error)
  84. GetMtimeMapping(folder string, file string) (fs.MtimeMapping, error)
  85. Availability(folder string, file protocol.FileInfo, block protocol.BlockInfo) ([]Availability, error)
  86. Completion(device protocol.DeviceID, folder string) (FolderCompletion, error)
  87. ConnectionStats() map[string]interface{}
  88. DeviceStatistics() (map[protocol.DeviceID]stats.DeviceStatistics, error)
  89. FolderStatistics() (map[string]stats.FolderStatistics, error)
  90. UsageReportingStats(report *contract.Report, version int, preview bool)
  91. PendingDevices() (map[protocol.DeviceID]db.ObservedDevice, error)
  92. PendingFolders(device protocol.DeviceID) (map[string]db.PendingFolder, error)
  93. StartDeadlockDetector(timeout time.Duration)
  94. GlobalDirectoryTree(folder, prefix string, levels int, dirsOnly bool) ([]*TreeEntry, error)
  95. }
  96. type model struct {
  97. *suture.Supervisor
  98. // constructor parameters
  99. cfg config.Wrapper
  100. id protocol.DeviceID
  101. clientName string
  102. clientVersion string
  103. db *db.Lowlevel
  104. protectedFiles []string
  105. evLogger events.Logger
  106. // constant or concurrency safe fields
  107. finder *db.BlockFinder
  108. progressEmitter *ProgressEmitter
  109. shortID protocol.ShortID
  110. // globalRequestLimiter limits the amount of data in concurrent incoming
  111. // requests
  112. globalRequestLimiter *byteSemaphore
  113. // folderIOLimiter limits the number of concurrent I/O heavy operations,
  114. // such as scans and pulls.
  115. folderIOLimiter *byteSemaphore
  116. fatalChan chan error
  117. started chan struct{}
  118. // fields protected by fmut
  119. fmut sync.RWMutex
  120. folderCfgs map[string]config.FolderConfiguration // folder -> cfg
  121. folderFiles map[string]*db.FileSet // folder -> files
  122. deviceStatRefs map[protocol.DeviceID]*stats.DeviceStatisticsReference // deviceID -> statsRef
  123. folderIgnores map[string]*ignore.Matcher // folder -> matcher object
  124. folderRunners map[string]service // folder -> puller or scanner
  125. folderRunnerToken map[string]suture.ServiceToken // folder -> token for folder runner
  126. folderRestartMuts syncMutexMap // folder -> restart mutex
  127. folderVersioners map[string]versioner.Versioner // folder -> versioner (may be nil)
  128. folderEncryptionPasswordTokens map[string][]byte // folder -> encryption token (may be missing, and only for encryption type folders)
  129. folderEncryptionFailures map[string]map[protocol.DeviceID]error // folder -> device -> error regarding encryption consistency (may be missing)
  130. // fields protected by pmut
  131. pmut sync.RWMutex
  132. conn map[protocol.DeviceID]protocol.Connection
  133. connRequestLimiters map[protocol.DeviceID]*byteSemaphore
  134. closed map[protocol.DeviceID]chan struct{}
  135. helloMessages map[protocol.DeviceID]protocol.Hello
  136. deviceDownloads map[protocol.DeviceID]*deviceDownloadState
  137. remotePausedFolders map[protocol.DeviceID]map[string]struct{} // deviceID -> folders
  138. indexSenders map[protocol.DeviceID]*indexSenderRegistry
  139. // for testing only
  140. foldersRunning int32
  141. }
  142. type folderFactory func(*model, *db.FileSet, *ignore.Matcher, config.FolderConfiguration, versioner.Versioner, events.Logger, *byteSemaphore) service
  143. var (
  144. folderFactories = make(map[config.FolderType]folderFactory)
  145. )
  146. var (
  147. errDeviceUnknown = errors.New("unknown device")
  148. errDevicePaused = errors.New("device is paused")
  149. errDeviceIgnored = errors.New("device is ignored")
  150. errDeviceRemoved = errors.New("device has been removed")
  151. ErrFolderPaused = errors.New("folder is paused")
  152. ErrFolderNotRunning = errors.New("folder is not running")
  153. ErrFolderMissing = errors.New("no such folder")
  154. errNetworkNotAllowed = errors.New("network not allowed")
  155. errNoVersioner = errors.New("folder has no versioner")
  156. // errors about why a connection is closed
  157. errReplacingConnection = errors.New("replacing connection")
  158. errStopped = errors.New("Syncthing is being stopped")
  159. errEncryptionInvConfigLocal = errors.New("can't encrypt data for a device when the folder type is receiveEncrypted")
  160. errEncryptionInvConfigRemote = errors.New("remote has encrypted data and encrypts that data for us - this is impossible")
  161. errEncryptionNotEncryptedLocal = errors.New("folder is announced as encrypted, but not configured thus")
  162. errEncryptionNotEncryptedRemote = errors.New("folder is configured to be encrypted but not announced thus")
  163. errEncryptionNotEncryptedUntrusted = errors.New("device is untrusted, but configured to receive not encrypted data")
  164. errEncryptionPassword = errors.New("different encryption passwords used")
  165. errEncryptionTokenRead = errors.New("failed to read encryption token")
  166. errEncryptionTokenWrite = errors.New("failed to write encryption token")
  167. errEncryptionNeedToken = errors.New("require password token for receive-encrypted token")
  168. errMissingRemoteInClusterConfig = errors.New("remote device missing in cluster config")
  169. errMissingLocalInClusterConfig = errors.New("local device missing in cluster config")
  170. errConnLimitReached = errors.New("connection limit reached")
  171. // messages for failure reports
  172. failureUnexpectedGenerateCCError = "unexpected error occurred in generateClusterConfig"
  173. )
  174. // NewModel creates and starts a new model. The model starts in read-only mode,
  175. // where it sends index information to connected peers and responds to requests
  176. // for file data without altering the local folder in any way.
  177. func NewModel(cfg config.Wrapper, id protocol.DeviceID, clientName, clientVersion string, ldb *db.Lowlevel, protectedFiles []string, evLogger events.Logger) Model {
  178. spec := svcutil.SpecWithDebugLogger(l)
  179. m := &model{
  180. Supervisor: suture.New("model", spec),
  181. // constructor parameters
  182. cfg: cfg,
  183. id: id,
  184. clientName: clientName,
  185. clientVersion: clientVersion,
  186. db: ldb,
  187. protectedFiles: protectedFiles,
  188. evLogger: evLogger,
  189. // constant or concurrency safe fields
  190. finder: db.NewBlockFinder(ldb),
  191. progressEmitter: NewProgressEmitter(cfg, evLogger),
  192. shortID: id.Short(),
  193. globalRequestLimiter: newByteSemaphore(1024 * cfg.Options().MaxConcurrentIncomingRequestKiB()),
  194. folderIOLimiter: newByteSemaphore(cfg.Options().MaxFolderConcurrency()),
  195. fatalChan: make(chan error),
  196. started: make(chan struct{}),
  197. // fields protected by fmut
  198. fmut: sync.NewRWMutex(),
  199. folderCfgs: make(map[string]config.FolderConfiguration),
  200. folderFiles: make(map[string]*db.FileSet),
  201. deviceStatRefs: make(map[protocol.DeviceID]*stats.DeviceStatisticsReference),
  202. folderIgnores: make(map[string]*ignore.Matcher),
  203. folderRunners: make(map[string]service),
  204. folderRunnerToken: make(map[string]suture.ServiceToken),
  205. folderVersioners: make(map[string]versioner.Versioner),
  206. folderEncryptionPasswordTokens: make(map[string][]byte),
  207. folderEncryptionFailures: make(map[string]map[protocol.DeviceID]error),
  208. // fields protected by pmut
  209. pmut: sync.NewRWMutex(),
  210. conn: make(map[protocol.DeviceID]protocol.Connection),
  211. connRequestLimiters: make(map[protocol.DeviceID]*byteSemaphore),
  212. closed: make(map[protocol.DeviceID]chan struct{}),
  213. helloMessages: make(map[protocol.DeviceID]protocol.Hello),
  214. deviceDownloads: make(map[protocol.DeviceID]*deviceDownloadState),
  215. remotePausedFolders: make(map[protocol.DeviceID]map[string]struct{}),
  216. indexSenders: make(map[protocol.DeviceID]*indexSenderRegistry),
  217. }
  218. for devID := range cfg.Devices() {
  219. m.deviceStatRefs[devID] = stats.NewDeviceStatisticsReference(m.db, devID)
  220. }
  221. m.Add(m.progressEmitter)
  222. m.Add(svcutil.AsService(m.serve, m.String()))
  223. return m
  224. }
  225. func (m *model) serve(ctx context.Context) error {
  226. defer m.closeAllConnectionsAndWait()
  227. cfg := m.cfg.Subscribe(m)
  228. defer m.cfg.Unsubscribe(m)
  229. if err := m.initFolders(cfg); err != nil {
  230. close(m.started)
  231. return svcutil.AsFatalErr(err, svcutil.ExitError)
  232. }
  233. close(m.started)
  234. select {
  235. case <-ctx.Done():
  236. return ctx.Err()
  237. case err := <-m.fatalChan:
  238. return svcutil.AsFatalErr(err, svcutil.ExitError)
  239. }
  240. }
  241. func (m *model) initFolders(cfg config.Configuration) error {
  242. clusterConfigDevices := make(deviceIDSet, len(cfg.Devices))
  243. for _, folderCfg := range cfg.Folders {
  244. if folderCfg.Paused {
  245. folderCfg.CreateRoot()
  246. continue
  247. }
  248. err := m.newFolder(folderCfg, cfg.Options.CacheIgnoredFiles)
  249. if err != nil {
  250. return err
  251. }
  252. clusterConfigDevices.add(folderCfg.DeviceIDs())
  253. }
  254. ignoredDevices := observedDeviceSet(m.cfg.IgnoredDevices())
  255. m.cleanPending(cfg.DeviceMap(), cfg.FolderMap(), ignoredDevices, nil)
  256. m.sendClusterConfig(clusterConfigDevices.AsSlice())
  257. return nil
  258. }
  259. func (m *model) closeAllConnectionsAndWait() {
  260. m.pmut.RLock()
  261. closed := make([]chan struct{}, 0, len(m.conn))
  262. for id, conn := range m.conn {
  263. closed = append(closed, m.closed[id])
  264. go conn.Close(errStopped)
  265. }
  266. m.pmut.RUnlock()
  267. for _, c := range closed {
  268. <-c
  269. }
  270. }
  271. func (m *model) fatal(err error) {
  272. select {
  273. case m.fatalChan <- err:
  274. default:
  275. }
  276. }
  277. // StartDeadlockDetector starts a deadlock detector on the models locks which
  278. // causes panics in case the locks cannot be acquired in the given timeout
  279. // period.
  280. func (m *model) StartDeadlockDetector(timeout time.Duration) {
  281. l.Infof("Starting deadlock detector with %v timeout", timeout)
  282. detector := newDeadlockDetector(timeout)
  283. detector.Watch("fmut", m.fmut)
  284. detector.Watch("pmut", m.pmut)
  285. }
  286. // Need to hold lock on m.fmut when calling this.
  287. func (m *model) addAndStartFolderLocked(cfg config.FolderConfiguration, fset *db.FileSet, cacheIgnoredFiles bool) {
  288. ignores := ignore.New(cfg.Filesystem(), ignore.WithCache(cacheIgnoredFiles))
  289. if cfg.Type != config.FolderTypeReceiveEncrypted {
  290. if err := ignores.Load(".stignore"); err != nil && !fs.IsNotExist(err) {
  291. l.Warnln("Loading ignores:", err)
  292. }
  293. }
  294. m.addAndStartFolderLockedWithIgnores(cfg, fset, ignores)
  295. }
  296. // Only needed for testing, use addAndStartFolderLocked instead.
  297. func (m *model) addAndStartFolderLockedWithIgnores(cfg config.FolderConfiguration, fset *db.FileSet, ignores *ignore.Matcher) {
  298. m.folderCfgs[cfg.ID] = cfg
  299. m.folderFiles[cfg.ID] = fset
  300. m.folderIgnores[cfg.ID] = ignores
  301. _, ok := m.folderRunners[cfg.ID]
  302. if ok {
  303. l.Warnln("Cannot start already running folder", cfg.Description())
  304. panic("cannot start already running folder")
  305. }
  306. folderFactory, ok := folderFactories[cfg.Type]
  307. if !ok {
  308. panic(fmt.Sprintf("unknown folder type 0x%x", cfg.Type))
  309. }
  310. folder := cfg.ID
  311. // Find any devices for which we hold the index in the db, but the folder
  312. // is not shared, and drop it.
  313. expected := mapDevices(cfg.DeviceIDs())
  314. for _, available := range fset.ListDevices() {
  315. if _, ok := expected[available]; !ok {
  316. l.Debugln("dropping", folder, "state for", available)
  317. fset.Drop(available)
  318. }
  319. }
  320. v, ok := fset.Sequence(protocol.LocalDeviceID), true
  321. indexHasFiles := ok && v > 0
  322. if !indexHasFiles {
  323. // It's a blank folder, so this may the first time we're looking at
  324. // it. Attempt to create and tag with our marker as appropriate. We
  325. // don't really do anything with errors at this point except warn -
  326. // if these things don't work, we still want to start the folder and
  327. // it'll show up as errored later.
  328. if err := cfg.CreateRoot(); err != nil {
  329. l.Warnln("Failed to create folder root directory", err)
  330. } else if err = cfg.CreateMarker(); err != nil {
  331. l.Warnln("Failed to create folder marker:", err)
  332. }
  333. }
  334. if cfg.Type == config.FolderTypeReceiveEncrypted {
  335. if encryptionToken, err := readEncryptionToken(cfg); err == nil {
  336. m.folderEncryptionPasswordTokens[folder] = encryptionToken
  337. } else if !fs.IsNotExist(err) {
  338. l.Warnf("Failed to read encryption token: %v", err)
  339. }
  340. }
  341. // These are our metadata files, and they should always be hidden.
  342. ffs := cfg.Filesystem()
  343. _ = ffs.Hide(config.DefaultMarkerName)
  344. _ = ffs.Hide(".stversions")
  345. _ = ffs.Hide(".stignore")
  346. var ver versioner.Versioner
  347. if cfg.Versioning.Type != "" {
  348. var err error
  349. ver, err = versioner.New(cfg)
  350. if err != nil {
  351. panic(fmt.Errorf("creating versioner: %w", err))
  352. }
  353. }
  354. m.folderVersioners[folder] = ver
  355. p := folderFactory(m, fset, ignores, cfg, ver, m.evLogger, m.folderIOLimiter)
  356. m.folderRunners[folder] = p
  357. m.warnAboutOverwritingProtectedFiles(cfg, ignores)
  358. m.folderRunnerToken[folder] = m.Add(p)
  359. l.Infof("Ready to synchronize %s (%s)", cfg.Description(), cfg.Type)
  360. }
  361. func (m *model) warnAboutOverwritingProtectedFiles(cfg config.FolderConfiguration, ignores *ignore.Matcher) {
  362. if cfg.Type == config.FolderTypeSendOnly {
  363. return
  364. }
  365. // This is a bit of a hack.
  366. ffs := cfg.Filesystem()
  367. if ffs.Type() != fs.FilesystemTypeBasic {
  368. return
  369. }
  370. folderLocation := ffs.URI()
  371. var filesAtRisk []string
  372. for _, protectedFilePath := range m.protectedFiles {
  373. // check if file is synced in this folder
  374. if protectedFilePath != folderLocation && !fs.IsParent(protectedFilePath, folderLocation) {
  375. continue
  376. }
  377. // check if file is ignored
  378. relPath, _ := filepath.Rel(folderLocation, protectedFilePath)
  379. if ignores.Match(relPath).IsIgnored() {
  380. continue
  381. }
  382. filesAtRisk = append(filesAtRisk, protectedFilePath)
  383. }
  384. if len(filesAtRisk) > 0 {
  385. l.Warnln("Some protected files may be overwritten and cause issues. See https://docs.syncthing.net/users/config.html#syncing-configuration-files for more information. The at risk files are:", strings.Join(filesAtRisk, ", "))
  386. }
  387. }
  388. func (m *model) removeFolder(cfg config.FolderConfiguration) {
  389. m.fmut.RLock()
  390. token, ok := m.folderRunnerToken[cfg.ID]
  391. m.fmut.RUnlock()
  392. if ok {
  393. m.RemoveAndWait(token, 0)
  394. }
  395. // We need to hold both fmut and pmut and must acquire locks in the same
  396. // order always. (The locks can be *released* in any order.)
  397. m.fmut.Lock()
  398. m.pmut.RLock()
  399. isPathUnique := true
  400. for folderID, folderCfg := range m.folderCfgs {
  401. if folderID != cfg.ID && folderCfg.Path == cfg.Path {
  402. isPathUnique = false
  403. break
  404. }
  405. }
  406. if isPathUnique {
  407. // Remove (if empty and removable) or move away (if non-empty or
  408. // otherwise not removable) Syncthing-specific marker files.
  409. fs := cfg.Filesystem()
  410. if err := fs.Remove(config.DefaultMarkerName); err != nil {
  411. moved := config.DefaultMarkerName + time.Now().Format(".removed-20060102-150405")
  412. _ = fs.Rename(config.DefaultMarkerName, moved)
  413. }
  414. }
  415. m.cleanupFolderLocked(cfg)
  416. for _, r := range m.indexSenders {
  417. r.remove(cfg.ID)
  418. }
  419. m.fmut.Unlock()
  420. m.pmut.RUnlock()
  421. // Remove it from the database
  422. db.DropFolder(m.db, cfg.ID)
  423. }
  424. // Need to hold lock on m.fmut when calling this.
  425. func (m *model) cleanupFolderLocked(cfg config.FolderConfiguration) {
  426. // clear up our config maps
  427. delete(m.folderCfgs, cfg.ID)
  428. delete(m.folderFiles, cfg.ID)
  429. delete(m.folderIgnores, cfg.ID)
  430. delete(m.folderRunners, cfg.ID)
  431. delete(m.folderRunnerToken, cfg.ID)
  432. delete(m.folderVersioners, cfg.ID)
  433. }
  434. func (m *model) restartFolder(from, to config.FolderConfiguration, cacheIgnoredFiles bool) error {
  435. if len(to.ID) == 0 {
  436. panic("bug: cannot restart empty folder ID")
  437. }
  438. if to.ID != from.ID {
  439. l.Warnf("bug: folder restart cannot change ID %q -> %q", from.ID, to.ID)
  440. panic("bug: folder restart cannot change ID")
  441. }
  442. folder := to.ID
  443. // This mutex protects the entirety of the restart operation, preventing
  444. // there from being more than one folder restart operation in progress
  445. // at any given time. The usual fmut/pmut stuff doesn't cover this,
  446. // because those locks are released while we are waiting for the folder
  447. // to shut down (and must be so because the folder might need them as
  448. // part of its operations before shutting down).
  449. restartMut := m.folderRestartMuts.Get(folder)
  450. restartMut.Lock()
  451. defer restartMut.Unlock()
  452. m.fmut.RLock()
  453. token, ok := m.folderRunnerToken[from.ID]
  454. m.fmut.RUnlock()
  455. if ok {
  456. m.RemoveAndWait(token, 0)
  457. }
  458. m.fmut.Lock()
  459. defer m.fmut.Unlock()
  460. // Cache the (maybe) existing fset before it's removed by cleanupFolderLocked
  461. fset := m.folderFiles[folder]
  462. fsetNil := fset == nil
  463. m.cleanupFolderLocked(from)
  464. if !to.Paused {
  465. if fsetNil {
  466. // Create a new fset. Might take a while and we do it under
  467. // locking, but it's unsafe to create fset:s concurrently so
  468. // that's the price we pay.
  469. var err error
  470. fset, err = db.NewFileSet(folder, to.Filesystem(), m.db)
  471. if err != nil {
  472. return fmt.Errorf("restarting %v: %w", to.Description(), err)
  473. }
  474. }
  475. m.addAndStartFolderLocked(to, fset, cacheIgnoredFiles)
  476. }
  477. // Care needs to be taken because we already hold fmut and the lock order
  478. // must be the same everywhere. As fmut is acquired first, this is fine.
  479. // toDeviceIDs := to.DeviceIDs()
  480. m.pmut.RLock()
  481. for _, id := range to.DeviceIDs() {
  482. indexSenders, ok := m.indexSenders[id]
  483. if !ok {
  484. continue
  485. }
  486. // In case the folder was newly shared with us we already got a
  487. // cluster config and wont necessarily get another soon - start
  488. // sending indexes if connected.
  489. if to.Paused {
  490. indexSenders.pause(to.ID)
  491. } else if !from.SharedWith(indexSenders.deviceID) || fsetNil || from.Paused {
  492. indexSenders.resume(to, fset)
  493. }
  494. }
  495. m.pmut.RUnlock()
  496. var infoMsg string
  497. switch {
  498. case to.Paused:
  499. infoMsg = "Paused"
  500. case from.Paused:
  501. infoMsg = "Unpaused"
  502. default:
  503. infoMsg = "Restarted"
  504. }
  505. l.Infof("%v folder %v (%v)", infoMsg, to.Description(), to.Type)
  506. return nil
  507. }
  508. func (m *model) newFolder(cfg config.FolderConfiguration, cacheIgnoredFiles bool) error {
  509. // Creating the fileset can take a long time (metadata calculation) so
  510. // we do it outside of the lock.
  511. fset, err := db.NewFileSet(cfg.ID, cfg.Filesystem(), m.db)
  512. if err != nil {
  513. return fmt.Errorf("adding %v: %w", cfg.Description(), err)
  514. }
  515. m.fmut.Lock()
  516. defer m.fmut.Unlock()
  517. // Cluster configs might be received and processed before reaching this
  518. // point, i.e. before the folder is started. If that's the case, start
  519. // index senders here.
  520. m.pmut.RLock()
  521. for _, id := range cfg.DeviceIDs() {
  522. if is, ok := m.indexSenders[id]; ok {
  523. is.resume(cfg, fset)
  524. }
  525. }
  526. m.pmut.RUnlock()
  527. m.addAndStartFolderLocked(cfg, fset, cacheIgnoredFiles)
  528. return nil
  529. }
  530. func (m *model) UsageReportingStats(report *contract.Report, version int, preview bool) {
  531. if version >= 3 {
  532. // Block stats
  533. blockStatsMut.Lock()
  534. for k, v := range blockStats {
  535. switch k {
  536. case "total":
  537. report.BlockStats.Total = v
  538. case "renamed":
  539. report.BlockStats.Renamed = v
  540. case "reused":
  541. report.BlockStats.Reused = v
  542. case "pulled":
  543. report.BlockStats.Pulled = v
  544. case "copyOrigin":
  545. report.BlockStats.CopyOrigin = v
  546. case "copyOriginShifted":
  547. report.BlockStats.CopyOriginShifted = v
  548. case "copyElsewhere":
  549. report.BlockStats.CopyElsewhere = v
  550. }
  551. // Reset counts, as these are incremental
  552. if !preview {
  553. blockStats[k] = 0
  554. }
  555. }
  556. blockStatsMut.Unlock()
  557. // Transport stats
  558. m.pmut.RLock()
  559. for _, conn := range m.conn {
  560. report.TransportStats[conn.Transport()]++
  561. }
  562. m.pmut.RUnlock()
  563. // Ignore stats
  564. var seenPrefix [3]bool
  565. for folder := range m.cfg.Folders() {
  566. lines, _, err := m.CurrentIgnores(folder)
  567. if err != nil {
  568. continue
  569. }
  570. report.IgnoreStats.Lines += len(lines)
  571. for _, line := range lines {
  572. // Allow prefixes to be specified in any order, but only once.
  573. for {
  574. if strings.HasPrefix(line, "!") && !seenPrefix[0] {
  575. seenPrefix[0] = true
  576. line = line[1:]
  577. report.IgnoreStats.Inverts++
  578. } else if strings.HasPrefix(line, "(?i)") && !seenPrefix[1] {
  579. seenPrefix[1] = true
  580. line = line[4:]
  581. report.IgnoreStats.Folded++
  582. } else if strings.HasPrefix(line, "(?d)") && !seenPrefix[2] {
  583. seenPrefix[2] = true
  584. line = line[4:]
  585. report.IgnoreStats.Deletable++
  586. } else {
  587. seenPrefix[0] = false
  588. seenPrefix[1] = false
  589. seenPrefix[2] = false
  590. break
  591. }
  592. }
  593. // Noops, remove
  594. line = strings.TrimSuffix(line, "**")
  595. line = strings.TrimPrefix(line, "**/")
  596. if strings.HasPrefix(line, "/") {
  597. report.IgnoreStats.Rooted++
  598. } else if strings.HasPrefix(line, "#include ") {
  599. report.IgnoreStats.Includes++
  600. if strings.Contains(line, "..") {
  601. report.IgnoreStats.EscapedIncludes++
  602. }
  603. }
  604. if strings.Contains(line, "**") {
  605. report.IgnoreStats.DoubleStars++
  606. // Remove not to trip up star checks.
  607. line = strings.ReplaceAll(line, "**", "")
  608. }
  609. if strings.Contains(line, "*") {
  610. report.IgnoreStats.Stars++
  611. }
  612. }
  613. }
  614. }
  615. }
  616. type ConnectionInfo struct {
  617. protocol.Statistics
  618. Connected bool
  619. Paused bool
  620. Address string
  621. ClientVersion string
  622. Type string
  623. Crypto string
  624. }
  625. func (info ConnectionInfo) MarshalJSON() ([]byte, error) {
  626. return json.Marshal(map[string]interface{}{
  627. "at": info.At,
  628. "inBytesTotal": info.InBytesTotal,
  629. "outBytesTotal": info.OutBytesTotal,
  630. "connected": info.Connected,
  631. "paused": info.Paused,
  632. "address": info.Address,
  633. "clientVersion": info.ClientVersion,
  634. "type": info.Type,
  635. "crypto": info.Crypto,
  636. })
  637. }
  638. // NumConnections returns the current number of active connected devices.
  639. func (m *model) NumConnections() int {
  640. m.pmut.RLock()
  641. defer m.pmut.RUnlock()
  642. return len(m.conn)
  643. }
  644. // ConnectionStats returns a map with connection statistics for each device.
  645. func (m *model) ConnectionStats() map[string]interface{} {
  646. m.pmut.RLock()
  647. defer m.pmut.RUnlock()
  648. res := make(map[string]interface{})
  649. devs := m.cfg.Devices()
  650. conns := make(map[string]ConnectionInfo, len(devs))
  651. for device, deviceCfg := range devs {
  652. hello := m.helloMessages[device]
  653. versionString := hello.ClientVersion
  654. if hello.ClientName != "syncthing" {
  655. versionString = hello.ClientName + " " + hello.ClientVersion
  656. }
  657. ci := ConnectionInfo{
  658. ClientVersion: strings.TrimSpace(versionString),
  659. Paused: deviceCfg.Paused,
  660. }
  661. if conn, ok := m.conn[device]; ok {
  662. ci.Type = conn.Type()
  663. ci.Crypto = conn.Crypto()
  664. ci.Connected = ok
  665. ci.Statistics = conn.Statistics()
  666. if addr := conn.RemoteAddr(); addr != nil {
  667. ci.Address = addr.String()
  668. }
  669. }
  670. conns[device.String()] = ci
  671. }
  672. res["connections"] = conns
  673. in, out := protocol.TotalInOut()
  674. res["total"] = ConnectionInfo{
  675. Statistics: protocol.Statistics{
  676. At: time.Now().Truncate(time.Second),
  677. InBytesTotal: in,
  678. OutBytesTotal: out,
  679. },
  680. }
  681. return res
  682. }
  683. // DeviceStatistics returns statistics about each device
  684. func (m *model) DeviceStatistics() (map[protocol.DeviceID]stats.DeviceStatistics, error) {
  685. m.fmut.RLock()
  686. defer m.fmut.RUnlock()
  687. res := make(map[protocol.DeviceID]stats.DeviceStatistics, len(m.deviceStatRefs))
  688. for id, sr := range m.deviceStatRefs {
  689. stats, err := sr.GetStatistics()
  690. if err != nil {
  691. return nil, err
  692. }
  693. res[id] = stats
  694. }
  695. return res, nil
  696. }
  697. // FolderStatistics returns statistics about each folder
  698. func (m *model) FolderStatistics() (map[string]stats.FolderStatistics, error) {
  699. res := make(map[string]stats.FolderStatistics)
  700. m.fmut.RLock()
  701. defer m.fmut.RUnlock()
  702. for id, runner := range m.folderRunners {
  703. stats, err := runner.GetStatistics()
  704. if err != nil {
  705. return nil, err
  706. }
  707. res[id] = stats
  708. }
  709. return res, nil
  710. }
  711. type FolderCompletion struct {
  712. CompletionPct float64
  713. GlobalBytes int64
  714. NeedBytes int64
  715. GlobalItems int
  716. NeedItems int
  717. NeedDeletes int
  718. Sequence int64
  719. }
  720. func newFolderCompletion(global, need db.Counts, sequence int64) FolderCompletion {
  721. comp := FolderCompletion{
  722. GlobalBytes: global.Bytes,
  723. NeedBytes: need.Bytes,
  724. GlobalItems: global.Files + global.Directories + global.Symlinks,
  725. NeedItems: need.Files + need.Directories + need.Symlinks,
  726. NeedDeletes: need.Deleted,
  727. Sequence: sequence,
  728. }
  729. comp.setComplectionPct()
  730. return comp
  731. }
  732. func (comp *FolderCompletion) add(other FolderCompletion) {
  733. comp.GlobalBytes += other.GlobalBytes
  734. comp.NeedBytes += other.NeedBytes
  735. comp.GlobalItems += other.GlobalItems
  736. comp.NeedItems += other.NeedItems
  737. comp.NeedDeletes += other.NeedDeletes
  738. comp.setComplectionPct()
  739. }
  740. func (comp *FolderCompletion) setComplectionPct() {
  741. if comp.GlobalBytes == 0 {
  742. comp.CompletionPct = 100
  743. } else {
  744. needRatio := float64(comp.NeedBytes) / float64(comp.GlobalBytes)
  745. comp.CompletionPct = 100 * (1 - needRatio)
  746. }
  747. // If the completion is 100% but there are deletes we need to handle,
  748. // drop it down a notch. Hack for consumers that look only at the
  749. // percentage (our own GUI does the same calculation as here on its own
  750. // and needs the same fixup).
  751. if comp.NeedBytes == 0 && comp.NeedDeletes > 0 {
  752. comp.CompletionPct = 95 // chosen by fair dice roll
  753. }
  754. }
  755. // Map returns the members as a map, e.g. used in api to serialize as Json.
  756. func (comp FolderCompletion) Map() map[string]interface{} {
  757. return map[string]interface{}{
  758. "completion": comp.CompletionPct,
  759. "globalBytes": comp.GlobalBytes,
  760. "needBytes": comp.NeedBytes,
  761. "globalItems": comp.GlobalItems,
  762. "needItems": comp.NeedItems,
  763. "needDeletes": comp.NeedDeletes,
  764. "sequence": comp.Sequence,
  765. }
  766. }
  767. // Completion returns the completion status, in percent with some counters,
  768. // for the given device and folder. The device can be any known device ID
  769. // (including the local device) or explicitly protocol.LocalDeviceID. An
  770. // empty folder string means the aggregate of all folders shared with the
  771. // given device.
  772. func (m *model) Completion(device protocol.DeviceID, folder string) (FolderCompletion, error) {
  773. // The user specifically asked for our own device ID. Internally that is
  774. // known as protocol.LocalDeviceID so translate.
  775. if device == m.id {
  776. device = protocol.LocalDeviceID
  777. }
  778. if folder != "" {
  779. // We want completion for a specific folder.
  780. return m.folderCompletion(device, folder)
  781. }
  782. // We want completion for all (shared) folders as an aggregate.
  783. var comp FolderCompletion
  784. for _, fcfg := range m.cfg.FolderList() {
  785. if device == protocol.LocalDeviceID || fcfg.SharedWith(device) {
  786. folderComp, err := m.folderCompletion(device, fcfg.ID)
  787. if err != nil {
  788. return FolderCompletion{}, err
  789. }
  790. comp.add(folderComp)
  791. }
  792. }
  793. return comp, nil
  794. }
  795. func (m *model) folderCompletion(device protocol.DeviceID, folder string) (FolderCompletion, error) {
  796. m.fmut.RLock()
  797. err := m.checkFolderRunningLocked(folder)
  798. rf := m.folderFiles[folder]
  799. m.fmut.RUnlock()
  800. if err != nil {
  801. return FolderCompletion{}, err
  802. }
  803. snap, err := rf.Snapshot()
  804. if err != nil {
  805. return FolderCompletion{}, err
  806. }
  807. defer snap.Release()
  808. m.pmut.RLock()
  809. downloaded := m.deviceDownloads[device].BytesDownloaded(folder)
  810. m.pmut.RUnlock()
  811. need := snap.NeedSize(device)
  812. need.Bytes -= downloaded
  813. // This might might be more than it really is, because some blocks can be of a smaller size.
  814. if need.Bytes < 0 {
  815. need.Bytes = 0
  816. }
  817. comp := newFolderCompletion(snap.GlobalSize(), need, snap.Sequence(device))
  818. l.Debugf("%v Completion(%s, %q): %v", m, device, folder, comp.Map())
  819. return comp, nil
  820. }
  821. // DBSnapshot returns a snapshot of the database content relevant to the given folder.
  822. func (m *model) DBSnapshot(folder string) (*db.Snapshot, error) {
  823. m.fmut.RLock()
  824. err := m.checkFolderRunningLocked(folder)
  825. rf := m.folderFiles[folder]
  826. m.fmut.RUnlock()
  827. if err != nil {
  828. return nil, err
  829. }
  830. return rf.Snapshot()
  831. }
  832. func (m *model) FolderProgressBytesCompleted(folder string) int64 {
  833. return m.progressEmitter.BytesCompleted(folder)
  834. }
  835. // NeedFolderFiles returns paginated list of currently needed files in
  836. // progress, queued, and to be queued on next puller iteration.
  837. func (m *model) NeedFolderFiles(folder string, page, perpage int) ([]db.FileInfoTruncated, []db.FileInfoTruncated, []db.FileInfoTruncated, error) {
  838. m.fmut.RLock()
  839. rf, rfOk := m.folderFiles[folder]
  840. runner, runnerOk := m.folderRunners[folder]
  841. cfg := m.folderCfgs[folder]
  842. m.fmut.RUnlock()
  843. if !rfOk {
  844. return nil, nil, nil, ErrFolderMissing
  845. }
  846. snap, err := rf.Snapshot()
  847. if err != nil {
  848. return nil, nil, nil, err
  849. }
  850. defer snap.Release()
  851. var progress, queued, rest []db.FileInfoTruncated
  852. var seen map[string]struct{}
  853. p := newPager(page, perpage)
  854. if runnerOk {
  855. progressNames, queuedNames, skipped := runner.Jobs(page, perpage)
  856. progress = make([]db.FileInfoTruncated, len(progressNames))
  857. queued = make([]db.FileInfoTruncated, len(queuedNames))
  858. seen = make(map[string]struct{}, len(progressNames)+len(queuedNames))
  859. for i, name := range progressNames {
  860. if f, ok := snap.GetGlobalTruncated(name); ok {
  861. progress[i] = f
  862. seen[name] = struct{}{}
  863. }
  864. }
  865. for i, name := range queuedNames {
  866. if f, ok := snap.GetGlobalTruncated(name); ok {
  867. queued[i] = f
  868. seen[name] = struct{}{}
  869. }
  870. }
  871. p.get -= len(seen)
  872. if p.get == 0 {
  873. return progress, queued, nil, nil
  874. }
  875. p.toSkip -= skipped
  876. }
  877. rest = make([]db.FileInfoTruncated, 0, perpage)
  878. snap.WithNeedTruncated(protocol.LocalDeviceID, func(f protocol.FileIntf) bool {
  879. if cfg.IgnoreDelete && f.IsDeleted() {
  880. return true
  881. }
  882. if p.skip() {
  883. return true
  884. }
  885. ft := f.(db.FileInfoTruncated)
  886. if _, ok := seen[ft.Name]; !ok {
  887. rest = append(rest, ft)
  888. p.get--
  889. }
  890. return p.get > 0
  891. })
  892. return progress, queued, rest, nil
  893. }
  894. // RemoteNeedFolderFiles returns paginated list of currently needed files in
  895. // progress, queued, and to be queued on next puller iteration, as well as the
  896. // total number of files currently needed.
  897. func (m *model) RemoteNeedFolderFiles(folder string, device protocol.DeviceID, page, perpage int) ([]db.FileInfoTruncated, error) {
  898. m.fmut.RLock()
  899. rf, ok := m.folderFiles[folder]
  900. m.fmut.RUnlock()
  901. if !ok {
  902. return nil, ErrFolderMissing
  903. }
  904. snap, err := rf.Snapshot()
  905. if err != nil {
  906. return nil, err
  907. }
  908. defer snap.Release()
  909. files := make([]db.FileInfoTruncated, 0, perpage)
  910. p := newPager(page, perpage)
  911. snap.WithNeedTruncated(device, func(f protocol.FileIntf) bool {
  912. if p.skip() {
  913. return true
  914. }
  915. files = append(files, f.(db.FileInfoTruncated))
  916. return !p.done()
  917. })
  918. return files, nil
  919. }
  920. func (m *model) LocalChangedFolderFiles(folder string, page, perpage int) ([]db.FileInfoTruncated, error) {
  921. m.fmut.RLock()
  922. rf, ok := m.folderFiles[folder]
  923. cfg := m.folderCfgs[folder]
  924. m.fmut.RUnlock()
  925. if !ok {
  926. return nil, ErrFolderMissing
  927. }
  928. snap, err := rf.Snapshot()
  929. if err != nil {
  930. return nil, err
  931. }
  932. defer snap.Release()
  933. if snap.ReceiveOnlyChangedSize().TotalItems() == 0 {
  934. return nil, nil
  935. }
  936. p := newPager(page, perpage)
  937. recvEnc := cfg.Type == config.FolderTypeReceiveEncrypted
  938. files := make([]db.FileInfoTruncated, 0, perpage)
  939. snap.WithHaveTruncated(protocol.LocalDeviceID, func(f protocol.FileIntf) bool {
  940. if !f.IsReceiveOnlyChanged() || (recvEnc && f.IsDeleted()) {
  941. return true
  942. }
  943. if p.skip() {
  944. return true
  945. }
  946. ft := f.(db.FileInfoTruncated)
  947. files = append(files, ft)
  948. return !p.done()
  949. })
  950. return files, nil
  951. }
  952. type pager struct {
  953. toSkip, get int
  954. }
  955. func newPager(page, perpage int) *pager {
  956. return &pager{
  957. toSkip: (page - 1) * perpage,
  958. get: perpage,
  959. }
  960. }
  961. func (p *pager) skip() bool {
  962. if p.toSkip == 0 {
  963. return false
  964. }
  965. p.toSkip--
  966. return true
  967. }
  968. func (p *pager) done() bool {
  969. if p.get > 0 {
  970. p.get--
  971. }
  972. return p.get == 0
  973. }
  974. // Index is called when a new device is connected and we receive their full index.
  975. // Implements the protocol.Model interface.
  976. func (m *model) Index(deviceID protocol.DeviceID, folder string, fs []protocol.FileInfo) error {
  977. return m.handleIndex(deviceID, folder, fs, false)
  978. }
  979. // IndexUpdate is called for incremental updates to connected devices' indexes.
  980. // Implements the protocol.Model interface.
  981. func (m *model) IndexUpdate(deviceID protocol.DeviceID, folder string, fs []protocol.FileInfo) error {
  982. return m.handleIndex(deviceID, folder, fs, true)
  983. }
  984. func (m *model) handleIndex(deviceID protocol.DeviceID, folder string, fs []protocol.FileInfo, update bool) error {
  985. op := "Index"
  986. if update {
  987. op += " update"
  988. }
  989. l.Debugf("%v (in): %s / %q: %d files", op, deviceID, folder, len(fs))
  990. if cfg, ok := m.cfg.Folder(folder); !ok || !cfg.SharedWith(deviceID) {
  991. l.Infof("%v for unexpected folder ID %q sent from device %q; ensure that the folder exists and that this device is selected under \"Share With\" in the folder configuration.", op, folder, deviceID)
  992. return errors.Wrap(ErrFolderMissing, folder)
  993. } else if cfg.Paused {
  994. l.Debugf("%v for paused folder (ID %q) sent from device %q.", op, folder, deviceID)
  995. return errors.Wrap(ErrFolderPaused, folder)
  996. }
  997. m.fmut.RLock()
  998. files, existing := m.folderFiles[folder]
  999. runner, running := m.folderRunners[folder]
  1000. m.fmut.RUnlock()
  1001. if !existing {
  1002. l.Infof("%v for nonexistent folder %q", op, folder)
  1003. return errors.Wrap(ErrFolderMissing, folder)
  1004. }
  1005. if running {
  1006. defer runner.SchedulePull()
  1007. }
  1008. m.pmut.RLock()
  1009. downloads := m.deviceDownloads[deviceID]
  1010. m.pmut.RUnlock()
  1011. downloads.Update(folder, makeForgetUpdate(fs))
  1012. if !update {
  1013. files.Drop(deviceID)
  1014. }
  1015. for i := range fs {
  1016. // The local attributes should never be transmitted over the wire.
  1017. // Make sure they look like they weren't.
  1018. fs[i].LocalFlags = 0
  1019. fs[i].VersionHash = nil
  1020. }
  1021. files.Update(deviceID, fs)
  1022. seq := files.Sequence(deviceID)
  1023. m.evLogger.Log(events.RemoteIndexUpdated, map[string]interface{}{
  1024. "device": deviceID.String(),
  1025. "folder": folder,
  1026. "items": len(fs),
  1027. "sequence": seq,
  1028. "version": seq, // legacy for sequence
  1029. })
  1030. return nil
  1031. }
  1032. func (m *model) ClusterConfig(deviceID protocol.DeviceID, cm protocol.ClusterConfig) error {
  1033. // Check the peer device's announced folders against our own. Emits events
  1034. // for folders that we don't expect (unknown or not shared).
  1035. // Also, collect a list of folders we do share, and if he's interested in
  1036. // temporary indexes, subscribe the connection.
  1037. m.pmut.RLock()
  1038. indexSenderRegistry, ok := m.indexSenders[deviceID]
  1039. m.pmut.RUnlock()
  1040. if !ok {
  1041. panic("bug: ClusterConfig called on closed or nonexistent connection")
  1042. }
  1043. deviceCfg, ok := m.cfg.Device(deviceID)
  1044. if !ok {
  1045. l.Debugln("Device disappeared from config while processing cluster-config")
  1046. return errDeviceUnknown
  1047. }
  1048. // Assemble the device information from the connected device about
  1049. // themselves and us for all folders.
  1050. ccDeviceInfos := make(map[string]*indexSenderStartInfo, len(cm.Folders))
  1051. for _, folder := range cm.Folders {
  1052. info := &indexSenderStartInfo{}
  1053. for _, dev := range folder.Devices {
  1054. if dev.ID == m.id {
  1055. info.local = dev
  1056. } else if dev.ID == deviceID {
  1057. info.remote = dev
  1058. }
  1059. if info.local.ID != protocol.EmptyDeviceID && info.remote.ID != protocol.EmptyDeviceID {
  1060. break
  1061. }
  1062. }
  1063. if info.remote.ID == protocol.EmptyDeviceID {
  1064. l.Infof("Device %v sent cluster-config without the device info for the remote on folder %v", deviceID, folder.Description())
  1065. return errMissingRemoteInClusterConfig
  1066. }
  1067. if info.local.ID == protocol.EmptyDeviceID {
  1068. l.Infof("Device %v sent cluster-config without the device info for us locally on folder %v", deviceID, folder.Description())
  1069. return errMissingLocalInClusterConfig
  1070. }
  1071. ccDeviceInfos[folder.ID] = info
  1072. }
  1073. // Needs to happen outside of the fmut, as can cause CommitConfiguration
  1074. if deviceCfg.AutoAcceptFolders {
  1075. w, _ := m.cfg.Modify(func(cfg *config.Configuration) {
  1076. changedFcfg := make(map[string]config.FolderConfiguration)
  1077. haveFcfg := cfg.FolderMap()
  1078. for _, folder := range cm.Folders {
  1079. from, ok := haveFcfg[folder.ID]
  1080. if to, changed := m.handleAutoAccepts(deviceID, folder, ccDeviceInfos[folder.ID], from, ok, cfg.Defaults.Folder.Path); changed {
  1081. changedFcfg[folder.ID] = to
  1082. }
  1083. }
  1084. if len(changedFcfg) == 0 {
  1085. return
  1086. }
  1087. for i := range cfg.Folders {
  1088. if fcfg, ok := changedFcfg[cfg.Folders[i].ID]; ok {
  1089. cfg.Folders[i] = fcfg
  1090. delete(changedFcfg, cfg.Folders[i].ID)
  1091. }
  1092. }
  1093. for _, fcfg := range changedFcfg {
  1094. cfg.Folders = append(cfg.Folders, fcfg)
  1095. }
  1096. })
  1097. // Need to wait for the waiter, as this calls CommitConfiguration,
  1098. // which sets up the folder and as we return from this call,
  1099. // ClusterConfig starts poking at m.folderFiles and other things
  1100. // that might not exist until the config is committed.
  1101. w.Wait()
  1102. }
  1103. tempIndexFolders, paused, err := m.ccHandleFolders(cm.Folders, deviceCfg, ccDeviceInfos, indexSenderRegistry)
  1104. if err != nil {
  1105. return err
  1106. }
  1107. m.pmut.Lock()
  1108. m.remotePausedFolders[deviceID] = paused
  1109. m.pmut.Unlock()
  1110. if len(tempIndexFolders) > 0 {
  1111. m.pmut.RLock()
  1112. conn, ok := m.conn[deviceID]
  1113. m.pmut.RUnlock()
  1114. // In case we've got ClusterConfig, and the connection disappeared
  1115. // from infront of our nose.
  1116. if ok {
  1117. m.progressEmitter.temporaryIndexSubscribe(conn, tempIndexFolders)
  1118. }
  1119. }
  1120. if deviceCfg.Introducer {
  1121. m.cfg.Modify(func(cfg *config.Configuration) {
  1122. folders, devices, foldersDevices, introduced := m.handleIntroductions(deviceCfg, cm, cfg.FolderMap(), cfg.DeviceMap())
  1123. folders, devices, deintroduced := m.handleDeintroductions(deviceCfg, foldersDevices, folders, devices)
  1124. if !introduced && !deintroduced {
  1125. return
  1126. }
  1127. cfg.Folders = make([]config.FolderConfiguration, 0, len(folders))
  1128. for _, fcfg := range folders {
  1129. cfg.Folders = append(cfg.Folders, fcfg)
  1130. }
  1131. cfg.Devices = make([]config.DeviceConfiguration, len(devices))
  1132. for _, dcfg := range devices {
  1133. cfg.Devices = append(cfg.Devices, dcfg)
  1134. }
  1135. })
  1136. }
  1137. return nil
  1138. }
  1139. func (m *model) ccHandleFolders(folders []protocol.Folder, deviceCfg config.DeviceConfiguration, ccDeviceInfos map[string]*indexSenderStartInfo, indexSenders *indexSenderRegistry) ([]string, map[string]struct{}, error) {
  1140. var folderDevice config.FolderDeviceConfiguration
  1141. tempIndexFolders := make([]string, 0, len(folders))
  1142. paused := make(map[string]struct{}, len(folders))
  1143. seenFolders := make(map[string]struct{}, len(folders))
  1144. updatedPending := make([]updatedPendingFolder, 0, len(folders))
  1145. deviceID := deviceCfg.DeviceID
  1146. expiredPending, err := m.db.PendingFoldersForDevice(deviceID)
  1147. if err != nil {
  1148. l.Infof("Could not get pending folders for cleanup: %v", err)
  1149. }
  1150. of := db.ObservedFolder{Time: time.Now().Truncate(time.Second)}
  1151. for _, folder := range folders {
  1152. seenFolders[folder.ID] = struct{}{}
  1153. cfg, ok := m.cfg.Folder(folder.ID)
  1154. if ok {
  1155. folderDevice, ok = cfg.Device(deviceID)
  1156. }
  1157. if !ok {
  1158. indexSenders.remove(folder.ID)
  1159. if deviceCfg.IgnoredFolder(folder.ID) {
  1160. l.Infof("Ignoring folder %s from device %s since we are configured to", folder.Description(), deviceID)
  1161. continue
  1162. }
  1163. delete(expiredPending, folder.ID)
  1164. of.Label = folder.Label
  1165. of.ReceiveEncrypted = len(ccDeviceInfos[folder.ID].local.EncryptionPasswordToken) > 0
  1166. if err := m.db.AddOrUpdatePendingFolder(folder.ID, of, deviceID); err != nil {
  1167. l.Warnf("Failed to persist pending folder entry to database: %v", err)
  1168. }
  1169. indexSenders.addPending(cfg, ccDeviceInfos[folder.ID])
  1170. updatedPending = append(updatedPending, updatedPendingFolder{
  1171. FolderID: folder.ID,
  1172. FolderLabel: folder.Label,
  1173. DeviceID: deviceID,
  1174. ReceiveEncrypted: of.ReceiveEncrypted,
  1175. })
  1176. // DEPRECATED: Only for backwards compatibility, should be removed.
  1177. m.evLogger.Log(events.FolderRejected, map[string]string{
  1178. "folder": folder.ID,
  1179. "folderLabel": folder.Label,
  1180. "device": deviceID.String(),
  1181. })
  1182. l.Infof("Unexpected folder %s sent from device %q; ensure that the folder exists and that this device is selected under \"Share With\" in the folder configuration.", folder.Description(), deviceID)
  1183. continue
  1184. }
  1185. if folder.Paused {
  1186. indexSenders.remove(folder.ID)
  1187. paused[cfg.ID] = struct{}{}
  1188. continue
  1189. }
  1190. if cfg.Paused {
  1191. indexSenders.addPending(cfg, ccDeviceInfos[folder.ID])
  1192. continue
  1193. }
  1194. if err := m.ccCheckEncryption(cfg, folderDevice, ccDeviceInfos[folder.ID], deviceCfg.Untrusted); err != nil {
  1195. sameError := false
  1196. if devs, ok := m.folderEncryptionFailures[folder.ID]; ok {
  1197. sameError = devs[deviceID] == err
  1198. } else {
  1199. m.folderEncryptionFailures[folder.ID] = make(map[protocol.DeviceID]error)
  1200. }
  1201. m.folderEncryptionFailures[folder.ID][deviceID] = err
  1202. msg := fmt.Sprintf("Failure checking encryption consistency with device %v for folder %v: %v", deviceID, cfg.Description(), err)
  1203. if sameError {
  1204. l.Debugln(msg)
  1205. } else {
  1206. if rerr, ok := err.(*redactedError); ok {
  1207. err = rerr.redacted
  1208. }
  1209. m.evLogger.Log(events.Failure, err.Error())
  1210. l.Warnln(msg)
  1211. }
  1212. return tempIndexFolders, paused, err
  1213. }
  1214. if devErrs, ok := m.folderEncryptionFailures[folder.ID]; ok {
  1215. if len(devErrs) == 1 {
  1216. delete(m.folderEncryptionFailures, folder.ID)
  1217. } else {
  1218. delete(m.folderEncryptionFailures[folder.ID], deviceID)
  1219. }
  1220. }
  1221. // Handle indexes
  1222. if !folder.DisableTempIndexes {
  1223. tempIndexFolders = append(tempIndexFolders, folder.ID)
  1224. }
  1225. m.fmut.RLock()
  1226. fs, ok := m.folderFiles[folder.ID]
  1227. m.fmut.RUnlock()
  1228. if !ok {
  1229. // Shouldn't happen because !cfg.Paused, but might happen
  1230. // if the folder is about to be unpaused, but not yet.
  1231. l.Debugln("ccH: no fset", folder.ID)
  1232. indexSenders.addPending(cfg, ccDeviceInfos[folder.ID])
  1233. continue
  1234. }
  1235. indexSenders.add(cfg, fs, ccDeviceInfos[folder.ID])
  1236. // We might already have files that we need to pull so let the
  1237. // folder runner know that it should recheck the index data.
  1238. m.fmut.RLock()
  1239. if runner := m.folderRunners[folder.ID]; runner != nil {
  1240. defer runner.SchedulePull()
  1241. }
  1242. m.fmut.RUnlock()
  1243. }
  1244. indexSenders.removeAllExcept(seenFolders)
  1245. for folder := range expiredPending {
  1246. m.db.RemovePendingFolderForDevice(folder, deviceID)
  1247. }
  1248. if len(updatedPending) > 0 || len(expiredPending) > 0 {
  1249. expiredPendingList := make([]map[string]string, 0, len(expiredPending))
  1250. for folderID := range expiredPending {
  1251. expiredPendingList = append(expiredPendingList, map[string]string{
  1252. "folderID": folderID,
  1253. "deviceID": deviceID.String(),
  1254. })
  1255. }
  1256. m.evLogger.Log(events.PendingFoldersChanged, map[string]interface{}{
  1257. "added": updatedPending,
  1258. "removed": expiredPendingList,
  1259. })
  1260. }
  1261. return tempIndexFolders, paused, nil
  1262. }
  1263. func (m *model) ccCheckEncryption(fcfg config.FolderConfiguration, folderDevice config.FolderDeviceConfiguration, ccDeviceInfos *indexSenderStartInfo, deviceUntrusted bool) error {
  1264. hasTokenRemote := len(ccDeviceInfos.remote.EncryptionPasswordToken) > 0
  1265. hasTokenLocal := len(ccDeviceInfos.local.EncryptionPasswordToken) > 0
  1266. isEncryptedRemote := folderDevice.EncryptionPassword != ""
  1267. isEncryptedLocal := fcfg.Type == config.FolderTypeReceiveEncrypted
  1268. if !isEncryptedRemote && !isEncryptedLocal && deviceUntrusted {
  1269. return errEncryptionNotEncryptedUntrusted
  1270. }
  1271. if !(hasTokenRemote || hasTokenLocal || isEncryptedRemote || isEncryptedLocal) {
  1272. // Noone cares about encryption here
  1273. return nil
  1274. }
  1275. if isEncryptedRemote && isEncryptedLocal {
  1276. // Should never happen, but config racyness and be safe.
  1277. return errEncryptionInvConfigLocal
  1278. }
  1279. if hasTokenRemote && hasTokenLocal {
  1280. return errEncryptionInvConfigRemote
  1281. }
  1282. if !(hasTokenRemote || hasTokenLocal) {
  1283. return errEncryptionNotEncryptedRemote
  1284. }
  1285. if !(isEncryptedRemote || isEncryptedLocal) {
  1286. return errEncryptionNotEncryptedLocal
  1287. }
  1288. if isEncryptedRemote {
  1289. passwordToken := protocol.PasswordToken(fcfg.ID, folderDevice.EncryptionPassword)
  1290. match := false
  1291. if hasTokenLocal {
  1292. match = bytes.Equal(passwordToken, ccDeviceInfos.local.EncryptionPasswordToken)
  1293. } else {
  1294. // hasTokenRemote == true
  1295. match = bytes.Equal(passwordToken, ccDeviceInfos.remote.EncryptionPasswordToken)
  1296. }
  1297. if !match {
  1298. return errEncryptionPassword
  1299. }
  1300. return nil
  1301. }
  1302. // isEncryptedLocal == true
  1303. var ccToken []byte
  1304. if hasTokenLocal {
  1305. ccToken = ccDeviceInfos.local.EncryptionPasswordToken
  1306. } else {
  1307. // hasTokenRemote == true
  1308. ccToken = ccDeviceInfos.remote.EncryptionPasswordToken
  1309. }
  1310. m.fmut.RLock()
  1311. token, ok := m.folderEncryptionPasswordTokens[fcfg.ID]
  1312. m.fmut.RUnlock()
  1313. if !ok {
  1314. var err error
  1315. token, err = readEncryptionToken(fcfg)
  1316. if err != nil && !fs.IsNotExist(err) {
  1317. if rerr, ok := redactPathError(err); ok {
  1318. return rerr
  1319. }
  1320. return &redactedError{
  1321. error: err,
  1322. redacted: errEncryptionTokenRead,
  1323. }
  1324. }
  1325. if err == nil {
  1326. m.fmut.Lock()
  1327. m.folderEncryptionPasswordTokens[fcfg.ID] = token
  1328. m.fmut.Unlock()
  1329. } else {
  1330. if err := writeEncryptionToken(ccToken, fcfg); err != nil {
  1331. if rerr, ok := redactPathError(err); ok {
  1332. return rerr
  1333. } else {
  1334. return &redactedError{
  1335. error: err,
  1336. redacted: errEncryptionTokenWrite,
  1337. }
  1338. }
  1339. }
  1340. m.fmut.Lock()
  1341. m.folderEncryptionPasswordTokens[fcfg.ID] = ccToken
  1342. m.fmut.Unlock()
  1343. // We can only announce ourselfs once we have the token,
  1344. // thus we need to resend CCs now that we have it.
  1345. m.sendClusterConfig(fcfg.DeviceIDs())
  1346. return nil
  1347. }
  1348. }
  1349. if !bytes.Equal(token, ccToken) {
  1350. return errEncryptionPassword
  1351. }
  1352. return nil
  1353. }
  1354. func (m *model) sendClusterConfig(ids []protocol.DeviceID) {
  1355. if len(ids) == 0 {
  1356. return
  1357. }
  1358. ccConns := make([]protocol.Connection, 0, len(ids))
  1359. m.pmut.RLock()
  1360. for _, id := range ids {
  1361. if conn, ok := m.conn[id]; ok {
  1362. ccConns = append(ccConns, conn)
  1363. }
  1364. }
  1365. m.pmut.RUnlock()
  1366. // Generating cluster-configs acquires fmut -> must happen outside of pmut.
  1367. for _, conn := range ccConns {
  1368. cm, passwords, err := m.generateClusterConfig(conn.ID())
  1369. if err != nil {
  1370. if err != errEncryptionNeedToken {
  1371. m.evLogger.Log(events.Failure, failureUnexpectedGenerateCCError)
  1372. continue
  1373. }
  1374. go conn.Close(err)
  1375. continue
  1376. }
  1377. conn.SetFolderPasswords(passwords)
  1378. go conn.ClusterConfig(cm)
  1379. }
  1380. }
  1381. // handleIntroductions handles adding devices/folders that are shared by an introducer device
  1382. func (m *model) handleIntroductions(introducerCfg config.DeviceConfiguration, cm protocol.ClusterConfig, folders map[string]config.FolderConfiguration, devices map[protocol.DeviceID]config.DeviceConfiguration) (map[string]config.FolderConfiguration, map[protocol.DeviceID]config.DeviceConfiguration, folderDeviceSet, bool) {
  1383. changed := false
  1384. foldersDevices := make(folderDeviceSet)
  1385. for _, folder := range cm.Folders {
  1386. // Adds devices which we do not have, but the introducer has
  1387. // for the folders that we have in common. Also, shares folders
  1388. // with devices that we have in common, yet are currently not sharing
  1389. // the folder.
  1390. fcfg, ok := folders[folder.ID]
  1391. if !ok {
  1392. // Don't have this folder, carry on.
  1393. continue
  1394. }
  1395. folderChanged := false
  1396. for _, device := range folder.Devices {
  1397. // No need to share with self.
  1398. if device.ID == m.id {
  1399. continue
  1400. }
  1401. foldersDevices.set(device.ID, folder.ID)
  1402. if _, ok := devices[device.ID]; !ok {
  1403. // The device is currently unknown. Add it to the config.
  1404. devices[device.ID] = m.introduceDevice(device, introducerCfg)
  1405. } else if fcfg.SharedWith(device.ID) {
  1406. // We already share the folder with this device, so
  1407. // nothing to do.
  1408. continue
  1409. }
  1410. // We don't yet share this folder with this device. Add the device
  1411. // to sharing list of the folder.
  1412. l.Infof("Sharing folder %s with %v (vouched for by introducer %v)", folder.Description(), device.ID, introducerCfg.DeviceID)
  1413. fcfg.Devices = append(fcfg.Devices, config.FolderDeviceConfiguration{
  1414. DeviceID: device.ID,
  1415. IntroducedBy: introducerCfg.DeviceID,
  1416. })
  1417. folderChanged = true
  1418. }
  1419. if folderChanged {
  1420. folders[fcfg.ID] = fcfg
  1421. changed = true
  1422. }
  1423. }
  1424. return folders, devices, foldersDevices, changed
  1425. }
  1426. // handleDeintroductions handles removals of devices/shares that are removed by an introducer device
  1427. func (m *model) handleDeintroductions(introducerCfg config.DeviceConfiguration, foldersDevices folderDeviceSet, folders map[string]config.FolderConfiguration, devices map[protocol.DeviceID]config.DeviceConfiguration) (map[string]config.FolderConfiguration, map[protocol.DeviceID]config.DeviceConfiguration, bool) {
  1428. if introducerCfg.SkipIntroductionRemovals {
  1429. return folders, devices, false
  1430. }
  1431. changed := false
  1432. devicesNotIntroduced := make(map[protocol.DeviceID]struct{})
  1433. // Check if we should unshare some folders, if the introducer has unshared them.
  1434. for folderID, folderCfg := range folders {
  1435. for k := 0; k < len(folderCfg.Devices); k++ {
  1436. if folderCfg.Devices[k].IntroducedBy != introducerCfg.DeviceID {
  1437. devicesNotIntroduced[folderCfg.Devices[k].DeviceID] = struct{}{}
  1438. continue
  1439. }
  1440. if !foldersDevices.has(folderCfg.Devices[k].DeviceID, folderCfg.ID) {
  1441. // We could not find that folder shared on the
  1442. // introducer with the device that was introduced to us.
  1443. // We should follow and unshare as well.
  1444. l.Infof("Unsharing folder %s with %v as introducer %v no longer shares the folder with that device", folderCfg.Description(), folderCfg.Devices[k].DeviceID, folderCfg.Devices[k].IntroducedBy)
  1445. folderCfg.Devices = append(folderCfg.Devices[:k], folderCfg.Devices[k+1:]...)
  1446. folders[folderID] = folderCfg
  1447. k--
  1448. changed = true
  1449. }
  1450. }
  1451. }
  1452. // Check if we should remove some devices, if the introducer no longer
  1453. // shares any folder with them. Yet do not remove if we share other
  1454. // folders that haven't been introduced by the introducer.
  1455. for deviceID, device := range devices {
  1456. if device.IntroducedBy == introducerCfg.DeviceID {
  1457. if !foldersDevices.hasDevice(deviceID) {
  1458. if _, ok := devicesNotIntroduced[deviceID]; !ok {
  1459. // The introducer no longer shares any folder with the
  1460. // device, remove the device.
  1461. l.Infof("Removing device %v as introducer %v no longer shares any folders with that device", deviceID, device.IntroducedBy)
  1462. changed = true
  1463. delete(devices, deviceID)
  1464. continue
  1465. }
  1466. l.Infof("Would have removed %v as %v no longer shares any folders, yet there are other folders that are shared with this device that haven't been introduced by this introducer.", deviceID, device.IntroducedBy)
  1467. }
  1468. }
  1469. }
  1470. return folders, devices, changed
  1471. }
  1472. // handleAutoAccepts handles adding and sharing folders for devices that have
  1473. // AutoAcceptFolders set to true.
  1474. func (m *model) handleAutoAccepts(deviceID protocol.DeviceID, folder protocol.Folder, ccDeviceInfos *indexSenderStartInfo, cfg config.FolderConfiguration, haveCfg bool, defaultPath string) (config.FolderConfiguration, bool) {
  1475. if !haveCfg {
  1476. defaultPathFs := fs.NewFilesystem(fs.FilesystemTypeBasic, defaultPath)
  1477. pathAlternatives := []string{
  1478. fs.SanitizePath(folder.Label),
  1479. fs.SanitizePath(folder.ID),
  1480. }
  1481. for _, path := range pathAlternatives {
  1482. if _, err := defaultPathFs.Lstat(path); !fs.IsNotExist(err) {
  1483. continue
  1484. }
  1485. fcfg := newFolderConfiguration(m.cfg, folder.ID, folder.Label, fs.FilesystemTypeBasic, filepath.Join(defaultPath, path))
  1486. fcfg.Devices = append(fcfg.Devices, config.FolderDeviceConfiguration{
  1487. DeviceID: deviceID,
  1488. })
  1489. if len(ccDeviceInfos.remote.EncryptionPasswordToken) > 0 || len(ccDeviceInfos.local.EncryptionPasswordToken) > 0 {
  1490. fcfg.Type = config.FolderTypeReceiveEncrypted
  1491. }
  1492. l.Infof("Auto-accepted %s folder %s at path %s", deviceID, folder.Description(), fcfg.Path)
  1493. return fcfg, true
  1494. }
  1495. l.Infof("Failed to auto-accept folder %s from %s due to path conflict", folder.Description(), deviceID)
  1496. return config.FolderConfiguration{}, false
  1497. } else {
  1498. for _, device := range cfg.DeviceIDs() {
  1499. if device == deviceID {
  1500. // Already shared nothing todo.
  1501. return config.FolderConfiguration{}, false
  1502. }
  1503. }
  1504. if cfg.Type == config.FolderTypeReceiveEncrypted {
  1505. if len(ccDeviceInfos.remote.EncryptionPasswordToken) == 0 && len(ccDeviceInfos.local.EncryptionPasswordToken) == 0 {
  1506. l.Infof("Failed to auto-accept device %s on existing folder %s as the remote wants to send us unencrypted data, but the folder type is receive-encrypted", folder.Description(), deviceID)
  1507. return config.FolderConfiguration{}, false
  1508. }
  1509. } else {
  1510. if len(ccDeviceInfos.remote.EncryptionPasswordToken) > 0 || len(ccDeviceInfos.local.EncryptionPasswordToken) > 0 {
  1511. l.Infof("Failed to auto-accept device %s on existing folder %s as the remote wants to send us encrypted data, but the folder type is not receive-encrypted", folder.Description(), deviceID)
  1512. return config.FolderConfiguration{}, false
  1513. }
  1514. }
  1515. cfg.Devices = append(cfg.Devices, config.FolderDeviceConfiguration{
  1516. DeviceID: deviceID,
  1517. })
  1518. l.Infof("Shared %s with %s due to auto-accept", folder.ID, deviceID)
  1519. return cfg, true
  1520. }
  1521. }
  1522. func (m *model) introduceDevice(device protocol.Device, introducerCfg config.DeviceConfiguration) config.DeviceConfiguration {
  1523. addresses := []string{"dynamic"}
  1524. for _, addr := range device.Addresses {
  1525. if addr != "dynamic" {
  1526. addresses = append(addresses, addr)
  1527. }
  1528. }
  1529. l.Infof("Adding device %v to config (vouched for by introducer %v)", device.ID, introducerCfg.DeviceID)
  1530. newDeviceCfg := m.cfg.DefaultDevice()
  1531. newDeviceCfg.DeviceID = device.ID
  1532. newDeviceCfg.Name = device.Name
  1533. newDeviceCfg.Compression = introducerCfg.Compression
  1534. newDeviceCfg.Addresses = addresses
  1535. newDeviceCfg.CertName = device.CertName
  1536. newDeviceCfg.IntroducedBy = introducerCfg.DeviceID
  1537. // The introducers' introducers are also our introducers.
  1538. if device.Introducer {
  1539. l.Infof("Device %v is now also an introducer", device.ID)
  1540. newDeviceCfg.Introducer = true
  1541. newDeviceCfg.SkipIntroductionRemovals = device.SkipIntroductionRemovals
  1542. }
  1543. return newDeviceCfg
  1544. }
  1545. // Closed is called when a connection has been closed
  1546. func (m *model) Closed(device protocol.DeviceID, err error) {
  1547. m.pmut.Lock()
  1548. conn, ok := m.conn[device]
  1549. if !ok {
  1550. m.pmut.Unlock()
  1551. return
  1552. }
  1553. delete(m.conn, device)
  1554. delete(m.connRequestLimiters, device)
  1555. delete(m.helloMessages, device)
  1556. delete(m.deviceDownloads, device)
  1557. delete(m.remotePausedFolders, device)
  1558. closed := m.closed[device]
  1559. delete(m.closed, device)
  1560. delete(m.indexSenders, device)
  1561. m.pmut.Unlock()
  1562. m.progressEmitter.temporaryIndexUnsubscribe(conn)
  1563. m.deviceDidClose(device, time.Since(conn.EstablishedAt()))
  1564. l.Infof("Connection to %s at %s closed: %v", device, conn, err)
  1565. m.evLogger.Log(events.DeviceDisconnected, map[string]string{
  1566. "id": device.String(),
  1567. "error": err.Error(),
  1568. })
  1569. close(closed)
  1570. }
  1571. // Implements protocol.RequestResponse
  1572. type requestResponse struct {
  1573. data []byte
  1574. closed chan struct{}
  1575. once stdsync.Once
  1576. }
  1577. func newRequestResponse(size int) *requestResponse {
  1578. return &requestResponse{
  1579. data: protocol.BufferPool.Get(size),
  1580. closed: make(chan struct{}),
  1581. }
  1582. }
  1583. func (r *requestResponse) Data() []byte {
  1584. return r.data
  1585. }
  1586. func (r *requestResponse) Close() {
  1587. r.once.Do(func() {
  1588. protocol.BufferPool.Put(r.data)
  1589. close(r.closed)
  1590. })
  1591. }
  1592. func (r *requestResponse) Wait() {
  1593. <-r.closed
  1594. }
  1595. // Request returns the specified data segment by reading it from local disk.
  1596. // Implements the protocol.Model interface.
  1597. func (m *model) Request(deviceID protocol.DeviceID, folder, name string, blockNo, size int32, offset int64, hash []byte, weakHash uint32, fromTemporary bool) (out protocol.RequestResponse, err error) {
  1598. if size < 0 || offset < 0 {
  1599. return nil, protocol.ErrInvalid
  1600. }
  1601. m.fmut.RLock()
  1602. folderCfg, ok := m.folderCfgs[folder]
  1603. folderIgnores := m.folderIgnores[folder]
  1604. m.fmut.RUnlock()
  1605. if !ok {
  1606. // The folder might be already unpaused in the config, but not yet
  1607. // in the model.
  1608. l.Debugf("Request from %s for file %s in unstarted folder %q", deviceID, name, folder)
  1609. return nil, protocol.ErrGeneric
  1610. }
  1611. if !folderCfg.SharedWith(deviceID) {
  1612. l.Warnf("Request from %s for file %s in unshared folder %q", deviceID, name, folder)
  1613. return nil, protocol.ErrGeneric
  1614. }
  1615. if folderCfg.Paused {
  1616. l.Debugf("Request from %s for file %s in paused folder %q", deviceID, name, folder)
  1617. return nil, protocol.ErrGeneric
  1618. }
  1619. // Make sure the path is valid and in canonical form
  1620. if name, err = fs.Canonicalize(name); err != nil {
  1621. l.Debugf("Request from %s in folder %q for invalid filename %s", deviceID, folder, name)
  1622. return nil, protocol.ErrGeneric
  1623. }
  1624. if deviceID != protocol.LocalDeviceID {
  1625. l.Debugf("%v REQ(in): %s: %q / %q o=%d s=%d t=%v", m, deviceID, folder, name, offset, size, fromTemporary)
  1626. }
  1627. if fs.IsInternal(name) {
  1628. l.Debugf("%v REQ(in) for internal file: %s: %q / %q o=%d s=%d", m, deviceID, folder, name, offset, size)
  1629. return nil, protocol.ErrInvalid
  1630. }
  1631. if folderIgnores.Match(name).IsIgnored() {
  1632. l.Debugf("%v REQ(in) for ignored file: %s: %q / %q o=%d s=%d", m, deviceID, folder, name, offset, size)
  1633. return nil, protocol.ErrInvalid
  1634. }
  1635. // Restrict parallel requests by connection/device
  1636. m.pmut.RLock()
  1637. limiter := m.connRequestLimiters[deviceID]
  1638. m.pmut.RUnlock()
  1639. // The requestResponse releases the bytes to the buffer pool and the
  1640. // limiters when its Close method is called.
  1641. res := newLimitedRequestResponse(int(size), limiter, m.globalRequestLimiter)
  1642. defer func() {
  1643. // Close it ourselves if it isn't returned due to an error
  1644. if err != nil {
  1645. res.Close()
  1646. }
  1647. }()
  1648. // Grab the FS after limiting, as it causes I/O and we want to minimize
  1649. // the race time between the symlink check and the read.
  1650. folderFs := folderCfg.Filesystem()
  1651. if err := osutil.TraversesSymlink(folderFs, filepath.Dir(name)); err != nil {
  1652. l.Debugf("%v REQ(in) traversal check: %s - %s: %q / %q o=%d s=%d", m, err, deviceID, folder, name, offset, size)
  1653. return nil, protocol.ErrNoSuchFile
  1654. }
  1655. // Only check temp files if the flag is set, and if we are set to advertise
  1656. // the temp indexes.
  1657. if fromTemporary && !folderCfg.DisableTempIndexes {
  1658. tempFn := fs.TempName(name)
  1659. if info, err := folderFs.Lstat(tempFn); err != nil || !info.IsRegular() {
  1660. // Reject reads for anything that doesn't exist or is something
  1661. // other than a regular file.
  1662. l.Debugf("%v REQ(in) failed stating temp file (%v): %s: %q / %q o=%d s=%d", m, err, deviceID, folder, name, offset, size)
  1663. return nil, protocol.ErrNoSuchFile
  1664. }
  1665. _, err := readOffsetIntoBuf(folderFs, tempFn, offset, res.data)
  1666. if err == nil && scanner.Validate(res.data, hash, weakHash) {
  1667. return res, nil
  1668. }
  1669. // Fall through to reading from a non-temp file, just incase the temp
  1670. // file has finished downloading.
  1671. }
  1672. if info, err := folderFs.Lstat(name); err != nil || !info.IsRegular() {
  1673. // Reject reads for anything that doesn't exist or is something
  1674. // other than a regular file.
  1675. l.Debugf("%v REQ(in) failed stating file (%v): %s: %q / %q o=%d s=%d", m, err, deviceID, folder, name, offset, size)
  1676. return nil, protocol.ErrNoSuchFile
  1677. }
  1678. n, err := readOffsetIntoBuf(folderFs, name, offset, res.data)
  1679. if fs.IsNotExist(err) {
  1680. l.Debugf("%v REQ(in) file doesn't exist: %s: %q / %q o=%d s=%d", m, deviceID, folder, name, offset, size)
  1681. return nil, protocol.ErrNoSuchFile
  1682. } else if err == io.EOF {
  1683. // Read beyond end of file. This might indicate a problem, or it
  1684. // might be a short block that gets padded when read for encrypted
  1685. // folders. We ignore the error and let the hash validation in the
  1686. // next step take care of it, by only hashing the part we actually
  1687. // managed to read.
  1688. } else if err != nil {
  1689. l.Debugf("%v REQ(in) failed reading file (%v): %s: %q / %q o=%d s=%d", m, err, deviceID, folder, name, offset, size)
  1690. return nil, protocol.ErrGeneric
  1691. }
  1692. if len(hash) > 0 && !scanner.Validate(res.data[:n], hash, weakHash) {
  1693. m.recheckFile(deviceID, folder, name, offset, hash, weakHash)
  1694. l.Debugf("%v REQ(in) failed validating data: %s: %q / %q o=%d s=%d", m, deviceID, folder, name, offset, size)
  1695. return nil, protocol.ErrNoSuchFile
  1696. }
  1697. return res, nil
  1698. }
  1699. // newLimitedRequestResponse takes size bytes from the limiters in order,
  1700. // skipping nil limiters, then returns a requestResponse of the given size.
  1701. // When the requestResponse is closed the limiters are given back the bytes,
  1702. // in reverse order.
  1703. func newLimitedRequestResponse(size int, limiters ...*byteSemaphore) *requestResponse {
  1704. for _, limiter := range limiters {
  1705. if limiter != nil {
  1706. limiter.take(size)
  1707. }
  1708. }
  1709. res := newRequestResponse(size)
  1710. go func() {
  1711. res.Wait()
  1712. for i := range limiters {
  1713. limiter := limiters[len(limiters)-1-i]
  1714. if limiter != nil {
  1715. limiter.give(size)
  1716. }
  1717. }
  1718. }()
  1719. return res
  1720. }
  1721. func (m *model) recheckFile(deviceID protocol.DeviceID, folder, name string, offset int64, hash []byte, weakHash uint32) {
  1722. cf, ok, err := m.CurrentFolderFile(folder, name)
  1723. if err != nil {
  1724. l.Debugf("%v recheckFile: %s: %q / %q: current file error: %v", m, deviceID, folder, name, err)
  1725. return
  1726. }
  1727. if !ok {
  1728. l.Debugf("%v recheckFile: %s: %q / %q: no current file", m, deviceID, folder, name)
  1729. return
  1730. }
  1731. if cf.IsDeleted() || cf.IsInvalid() || cf.IsSymlink() || cf.IsDirectory() {
  1732. l.Debugf("%v recheckFile: %s: %q / %q: not a regular file", m, deviceID, folder, name)
  1733. return
  1734. }
  1735. blockIndex := int(offset / int64(cf.BlockSize()))
  1736. if blockIndex >= len(cf.Blocks) {
  1737. l.Debugf("%v recheckFile: %s: %q / %q i=%d: block index too far", m, deviceID, folder, name, blockIndex)
  1738. return
  1739. }
  1740. block := cf.Blocks[blockIndex]
  1741. // Seems to want a different version of the file, whatever.
  1742. if !bytes.Equal(block.Hash, hash) {
  1743. l.Debugf("%v recheckFile: %s: %q / %q i=%d: hash mismatch %x != %x", m, deviceID, folder, name, blockIndex, block.Hash, hash)
  1744. return
  1745. }
  1746. if weakHash != 0 && block.WeakHash != weakHash {
  1747. l.Debugf("%v recheckFile: %s: %q / %q i=%d: weak hash mismatch %v != %v", m, deviceID, folder, name, blockIndex, block.WeakHash, weakHash)
  1748. return
  1749. }
  1750. // The hashes provided part of the request match what we expect to find according
  1751. // to what we have in the database, yet the content we've read off the filesystem doesn't
  1752. // Something is fishy, invalidate the file and rescan it.
  1753. // The file will temporarily become invalid, which is ok as the content is messed up.
  1754. m.fmut.RLock()
  1755. runner, ok := m.folderRunners[folder]
  1756. m.fmut.RUnlock()
  1757. if !ok {
  1758. l.Debugf("%v recheckFile: %s: %q / %q: Folder stopped before rescan could be scheduled", m, deviceID, folder, name)
  1759. return
  1760. }
  1761. runner.ScheduleForceRescan(name)
  1762. l.Debugf("%v recheckFile: %s: %q / %q", m, deviceID, folder, name)
  1763. }
  1764. func (m *model) CurrentFolderFile(folder string, file string) (protocol.FileInfo, bool, error) {
  1765. m.fmut.RLock()
  1766. fs, ok := m.folderFiles[folder]
  1767. m.fmut.RUnlock()
  1768. if !ok {
  1769. return protocol.FileInfo{}, false, ErrFolderMissing
  1770. }
  1771. snap, err := fs.Snapshot()
  1772. if err != nil {
  1773. return protocol.FileInfo{}, false, err
  1774. }
  1775. f, ok := snap.Get(protocol.LocalDeviceID, file)
  1776. snap.Release()
  1777. return f, ok, nil
  1778. }
  1779. func (m *model) CurrentGlobalFile(folder string, file string) (protocol.FileInfo, bool, error) {
  1780. m.fmut.RLock()
  1781. ffs, ok := m.folderFiles[folder]
  1782. m.fmut.RUnlock()
  1783. if !ok {
  1784. return protocol.FileInfo{}, false, ErrFolderMissing
  1785. }
  1786. snap, err := ffs.Snapshot()
  1787. if err != nil {
  1788. return protocol.FileInfo{}, false, err
  1789. }
  1790. f, ok := snap.GetGlobal(file)
  1791. snap.Release()
  1792. return f, ok, nil
  1793. }
  1794. func (m *model) GetMtimeMapping(folder string, file string) (fs.MtimeMapping, error) {
  1795. m.fmut.RLock()
  1796. ffs, ok := m.folderFiles[folder]
  1797. m.fmut.RUnlock()
  1798. if !ok {
  1799. return fs.MtimeMapping{}, ErrFolderMissing
  1800. }
  1801. return fs.GetMtimeMapping(ffs.MtimeFS(), file)
  1802. }
  1803. // Connection returns the current connection for device, and a boolean whether a connection was found.
  1804. func (m *model) Connection(deviceID protocol.DeviceID) (protocol.Connection, bool) {
  1805. m.pmut.RLock()
  1806. cn, ok := m.conn[deviceID]
  1807. m.pmut.RUnlock()
  1808. if ok {
  1809. m.deviceWasSeen(deviceID)
  1810. }
  1811. return cn, ok
  1812. }
  1813. // LoadIgnores loads or refreshes the ignore patterns from disk, if the
  1814. // folder is healthy, and returns the refreshed lines and patterns.
  1815. func (m *model) LoadIgnores(folder string) ([]string, []string, error) {
  1816. m.fmut.RLock()
  1817. cfg, cfgOk := m.folderCfgs[folder]
  1818. ignores, ignoresOk := m.folderIgnores[folder]
  1819. m.fmut.RUnlock()
  1820. if !cfgOk {
  1821. cfg, cfgOk = m.cfg.Folder(folder)
  1822. if !cfgOk {
  1823. return nil, nil, fmt.Errorf("folder %s does not exist", folder)
  1824. }
  1825. }
  1826. if cfg.Type == config.FolderTypeReceiveEncrypted {
  1827. return nil, nil, nil
  1828. }
  1829. // On creation a new folder with ignore patterns validly has no marker yet.
  1830. if err := cfg.CheckPath(); err != nil && err != config.ErrMarkerMissing {
  1831. return nil, nil, err
  1832. }
  1833. if !ignoresOk {
  1834. ignores = ignore.New(cfg.Filesystem())
  1835. }
  1836. err := ignores.Load(".stignore")
  1837. if fs.IsNotExist(err) {
  1838. // Having no ignores is not an error.
  1839. return nil, nil, nil
  1840. }
  1841. // Return lines and patterns, which may have some meaning even when err
  1842. // != nil, depending on the specific error.
  1843. return ignores.Lines(), ignores.Patterns(), err
  1844. }
  1845. // CurrentIgnores returns the currently loaded set of ignore patterns,
  1846. // whichever it may be. No attempt is made to load or refresh ignore
  1847. // patterns from disk.
  1848. func (m *model) CurrentIgnores(folder string) ([]string, []string, error) {
  1849. m.fmut.RLock()
  1850. _, cfgOk := m.folderCfgs[folder]
  1851. ignores, ignoresOk := m.folderIgnores[folder]
  1852. m.fmut.RUnlock()
  1853. if !cfgOk {
  1854. return nil, nil, fmt.Errorf("folder %s does not exist", folder)
  1855. }
  1856. if !ignoresOk {
  1857. // Empty ignore patterns
  1858. return []string{}, []string{}, nil
  1859. }
  1860. return ignores.Lines(), ignores.Patterns(), nil
  1861. }
  1862. func (m *model) SetIgnores(folder string, content []string) error {
  1863. cfg, ok := m.cfg.Folder(folder)
  1864. if !ok {
  1865. return fmt.Errorf("folder %s does not exist", cfg.Description())
  1866. }
  1867. err := cfg.CheckPath()
  1868. if err == config.ErrPathMissing {
  1869. if err = cfg.CreateRoot(); err != nil {
  1870. return errors.Wrap(err, "failed to create folder root")
  1871. }
  1872. err = cfg.CheckPath()
  1873. }
  1874. if err != nil && err != config.ErrMarkerMissing {
  1875. return err
  1876. }
  1877. if err := ignore.WriteIgnores(cfg.Filesystem(), ".stignore", content); err != nil {
  1878. l.Warnln("Saving .stignore:", err)
  1879. return err
  1880. }
  1881. m.fmut.RLock()
  1882. runner, ok := m.folderRunners[folder]
  1883. m.fmut.RUnlock()
  1884. if ok {
  1885. return runner.Scan(nil)
  1886. }
  1887. return nil
  1888. }
  1889. // OnHello is called when an device connects to us.
  1890. // This allows us to extract some information from the Hello message
  1891. // and add it to a list of known devices ahead of any checks.
  1892. func (m *model) OnHello(remoteID protocol.DeviceID, addr net.Addr, hello protocol.Hello) error {
  1893. if m.cfg.IgnoredDevice(remoteID) {
  1894. return errDeviceIgnored
  1895. }
  1896. cfg, ok := m.cfg.Device(remoteID)
  1897. if !ok {
  1898. if err := m.db.AddOrUpdatePendingDevice(remoteID, hello.DeviceName, addr.String()); err != nil {
  1899. l.Warnf("Failed to persist pending device entry to database: %v", err)
  1900. }
  1901. m.evLogger.Log(events.PendingDevicesChanged, map[string][]interface{}{
  1902. "added": {map[string]string{
  1903. "deviceID": remoteID.String(),
  1904. "name": hello.DeviceName,
  1905. "address": addr.String(),
  1906. }},
  1907. })
  1908. // DEPRECATED: Only for backwards compatibility, should be removed.
  1909. m.evLogger.Log(events.DeviceRejected, map[string]string{
  1910. "name": hello.DeviceName,
  1911. "device": remoteID.String(),
  1912. "address": addr.String(),
  1913. })
  1914. return errDeviceUnknown
  1915. }
  1916. if cfg.Paused {
  1917. return errDevicePaused
  1918. }
  1919. if len(cfg.AllowedNetworks) > 0 && !connections.IsAllowedNetwork(addr.String(), cfg.AllowedNetworks) {
  1920. // The connection is not from an allowed network.
  1921. return errNetworkNotAllowed
  1922. }
  1923. if max := m.cfg.Options().ConnectionLimitMax; max > 0 && m.NumConnections() >= max {
  1924. // We're not allowed to accept any more connections.
  1925. return errConnLimitReached
  1926. }
  1927. return nil
  1928. }
  1929. // GetHello is called when we are about to connect to some remote device.
  1930. func (m *model) GetHello(id protocol.DeviceID) protocol.HelloIntf {
  1931. name := ""
  1932. if _, ok := m.cfg.Device(id); ok {
  1933. // Set our name (from the config of our device ID) only if we already know about the other side device ID.
  1934. if myCfg, ok := m.cfg.Device(m.id); ok {
  1935. name = myCfg.Name
  1936. }
  1937. }
  1938. return &protocol.Hello{
  1939. DeviceName: name,
  1940. ClientName: m.clientName,
  1941. ClientVersion: m.clientVersion,
  1942. }
  1943. }
  1944. // AddConnection adds a new peer connection to the model. An initial index will
  1945. // be sent to the connected peer, thereafter index updates whenever the local
  1946. // folder changes.
  1947. func (m *model) AddConnection(conn protocol.Connection, hello protocol.Hello) {
  1948. deviceID := conn.ID()
  1949. device, ok := m.cfg.Device(deviceID)
  1950. if !ok {
  1951. l.Infoln("Trying to add connection to unknown device")
  1952. return
  1953. }
  1954. m.pmut.Lock()
  1955. if oldConn, ok := m.conn[deviceID]; ok {
  1956. l.Infoln("Replacing old connection", oldConn, "with", conn, "for", deviceID)
  1957. // There is an existing connection to this device that we are
  1958. // replacing. We must close the existing connection and wait for the
  1959. // close to complete before adding the new connection. We do the
  1960. // actual close without holding pmut as the connection will call
  1961. // back into Closed() for the cleanup.
  1962. closed := m.closed[deviceID]
  1963. m.pmut.Unlock()
  1964. oldConn.Close(errReplacingConnection)
  1965. <-closed
  1966. m.pmut.Lock()
  1967. }
  1968. m.conn[deviceID] = conn
  1969. closed := make(chan struct{})
  1970. m.closed[deviceID] = closed
  1971. m.deviceDownloads[deviceID] = newDeviceDownloadState()
  1972. m.indexSenders[deviceID] = newIndexSenderRegistry(conn, closed, m.Supervisor, m.evLogger)
  1973. // 0: default, <0: no limiting
  1974. switch {
  1975. case device.MaxRequestKiB > 0:
  1976. m.connRequestLimiters[deviceID] = newByteSemaphore(1024 * device.MaxRequestKiB)
  1977. case device.MaxRequestKiB == 0:
  1978. m.connRequestLimiters[deviceID] = newByteSemaphore(1024 * defaultPullerPendingKiB)
  1979. }
  1980. m.helloMessages[deviceID] = hello
  1981. event := map[string]string{
  1982. "id": deviceID.String(),
  1983. "deviceName": hello.DeviceName,
  1984. "clientName": hello.ClientName,
  1985. "clientVersion": hello.ClientVersion,
  1986. "type": conn.Type(),
  1987. }
  1988. addr := conn.RemoteAddr()
  1989. if addr != nil {
  1990. event["addr"] = addr.String()
  1991. }
  1992. m.evLogger.Log(events.DeviceConnected, event)
  1993. l.Infof(`Device %s client is "%s %s" named "%s" at %s`, deviceID, hello.ClientName, hello.ClientVersion, hello.DeviceName, conn)
  1994. conn.Start()
  1995. m.pmut.Unlock()
  1996. // Acquires fmut, so has to be done outside of pmut.
  1997. cm, passwords, err := m.generateClusterConfig(deviceID)
  1998. // We ignore errEncryptionNeedToken on a new connection, as the missing
  1999. // token should be delivered in the cluster-config about to be received.
  2000. if err != nil && err != errEncryptionNeedToken {
  2001. m.evLogger.Log(events.Failure, failureUnexpectedGenerateCCError)
  2002. }
  2003. conn.SetFolderPasswords(passwords)
  2004. conn.ClusterConfig(cm)
  2005. if (device.Name == "" || m.cfg.Options().OverwriteRemoteDevNames) && hello.DeviceName != "" {
  2006. m.cfg.Modify(func(cfg *config.Configuration) {
  2007. for i := range cfg.Devices {
  2008. if cfg.Devices[i].DeviceID == deviceID {
  2009. if cfg.Devices[i].Name == "" || cfg.Options.OverwriteRemoteDevNames {
  2010. cfg.Devices[i].Name = hello.DeviceName
  2011. }
  2012. return
  2013. }
  2014. }
  2015. })
  2016. }
  2017. m.deviceWasSeen(deviceID)
  2018. }
  2019. func (m *model) DownloadProgress(device protocol.DeviceID, folder string, updates []protocol.FileDownloadProgressUpdate) error {
  2020. m.fmut.RLock()
  2021. cfg, ok := m.folderCfgs[folder]
  2022. m.fmut.RUnlock()
  2023. if !ok || cfg.DisableTempIndexes || !cfg.SharedWith(device) {
  2024. return nil
  2025. }
  2026. m.pmut.RLock()
  2027. downloads := m.deviceDownloads[device]
  2028. m.pmut.RUnlock()
  2029. downloads.Update(folder, updates)
  2030. state := downloads.GetBlockCounts(folder)
  2031. m.evLogger.Log(events.RemoteDownloadProgress, map[string]interface{}{
  2032. "device": device.String(),
  2033. "folder": folder,
  2034. "state": state,
  2035. })
  2036. return nil
  2037. }
  2038. func (m *model) deviceWasSeen(deviceID protocol.DeviceID) {
  2039. m.fmut.RLock()
  2040. sr, ok := m.deviceStatRefs[deviceID]
  2041. m.fmut.RUnlock()
  2042. if ok {
  2043. _ = sr.WasSeen()
  2044. }
  2045. }
  2046. func (m *model) deviceDidClose(deviceID protocol.DeviceID, duration time.Duration) {
  2047. m.fmut.RLock()
  2048. sr, ok := m.deviceStatRefs[deviceID]
  2049. m.fmut.RUnlock()
  2050. if ok {
  2051. _ = sr.LastConnectionDuration(duration)
  2052. }
  2053. }
  2054. func (m *model) requestGlobal(ctx context.Context, deviceID protocol.DeviceID, folder, name string, blockNo int, offset int64, size int, hash []byte, weakHash uint32, fromTemporary bool) ([]byte, error) {
  2055. m.pmut.RLock()
  2056. nc, ok := m.conn[deviceID]
  2057. m.pmut.RUnlock()
  2058. if !ok {
  2059. return nil, fmt.Errorf("requestGlobal: no such device: %s", deviceID)
  2060. }
  2061. l.Debugf("%v REQ(out): %s: %q / %q b=%d o=%d s=%d h=%x wh=%x ft=%t", m, deviceID, folder, name, blockNo, offset, size, hash, weakHash, fromTemporary)
  2062. return nc.Request(ctx, folder, name, blockNo, offset, size, hash, weakHash, fromTemporary)
  2063. }
  2064. func (m *model) ScanFolders() map[string]error {
  2065. m.fmut.RLock()
  2066. folders := make([]string, 0, len(m.folderCfgs))
  2067. for folder := range m.folderCfgs {
  2068. folders = append(folders, folder)
  2069. }
  2070. m.fmut.RUnlock()
  2071. errors := make(map[string]error, len(m.folderCfgs))
  2072. errorsMut := sync.NewMutex()
  2073. wg := sync.NewWaitGroup()
  2074. wg.Add(len(folders))
  2075. for _, folder := range folders {
  2076. folder := folder
  2077. go func() {
  2078. err := m.ScanFolder(folder)
  2079. if err != nil {
  2080. errorsMut.Lock()
  2081. errors[folder] = err
  2082. errorsMut.Unlock()
  2083. }
  2084. wg.Done()
  2085. }()
  2086. }
  2087. wg.Wait()
  2088. return errors
  2089. }
  2090. func (m *model) ScanFolder(folder string) error {
  2091. return m.ScanFolderSubdirs(folder, nil)
  2092. }
  2093. func (m *model) ScanFolderSubdirs(folder string, subs []string) error {
  2094. m.fmut.RLock()
  2095. err := m.checkFolderRunningLocked(folder)
  2096. runner := m.folderRunners[folder]
  2097. m.fmut.RUnlock()
  2098. if err != nil {
  2099. return err
  2100. }
  2101. return runner.Scan(subs)
  2102. }
  2103. func (m *model) DelayScan(folder string, next time.Duration) {
  2104. m.fmut.RLock()
  2105. runner, ok := m.folderRunners[folder]
  2106. m.fmut.RUnlock()
  2107. if !ok {
  2108. return
  2109. }
  2110. runner.DelayScan(next)
  2111. }
  2112. // numHashers returns the number of hasher routines to use for a given folder,
  2113. // taking into account configuration and available CPU cores.
  2114. func (m *model) numHashers(folder string) int {
  2115. m.fmut.RLock()
  2116. folderCfg := m.folderCfgs[folder]
  2117. numFolders := len(m.folderCfgs)
  2118. m.fmut.RUnlock()
  2119. if folderCfg.Hashers > 0 {
  2120. // Specific value set in the config, use that.
  2121. return folderCfg.Hashers
  2122. }
  2123. if runtime.GOOS == "windows" || runtime.GOOS == "darwin" {
  2124. // Interactive operating systems; don't load the system too heavily by
  2125. // default.
  2126. return 1
  2127. }
  2128. // For other operating systems and architectures, lets try to get some
  2129. // work done... Divide the available CPU cores among the configured
  2130. // folders.
  2131. if perFolder := runtime.GOMAXPROCS(-1) / numFolders; perFolder > 0 {
  2132. return perFolder
  2133. }
  2134. return 1
  2135. }
  2136. // generateClusterConfig returns a ClusterConfigMessage that is correct and the
  2137. // set of folder passwords for the given peer device
  2138. func (m *model) generateClusterConfig(device protocol.DeviceID) (protocol.ClusterConfig, map[string]string, error) {
  2139. var message protocol.ClusterConfig
  2140. m.fmut.RLock()
  2141. defer m.fmut.RUnlock()
  2142. folders := m.cfg.FolderList()
  2143. passwords := make(map[string]string, len(folders))
  2144. for _, folderCfg := range folders {
  2145. if !folderCfg.SharedWith(device) {
  2146. continue
  2147. }
  2148. var encryptionToken []byte
  2149. var hasEncryptionToken bool
  2150. if folderCfg.Type == config.FolderTypeReceiveEncrypted {
  2151. if encryptionToken, hasEncryptionToken = m.folderEncryptionPasswordTokens[folderCfg.ID]; !hasEncryptionToken {
  2152. // We haven't gotten a token yet and without one the other side
  2153. // can't validate us - reset the connection to trigger a new
  2154. // cluster-config and get the token.
  2155. return message, nil, errEncryptionNeedToken
  2156. }
  2157. }
  2158. protocolFolder := protocol.Folder{
  2159. ID: folderCfg.ID,
  2160. Label: folderCfg.Label,
  2161. ReadOnly: folderCfg.Type == config.FolderTypeSendOnly,
  2162. IgnorePermissions: folderCfg.IgnorePerms,
  2163. IgnoreDelete: folderCfg.IgnoreDelete,
  2164. DisableTempIndexes: folderCfg.DisableTempIndexes,
  2165. }
  2166. fs := m.folderFiles[folderCfg.ID]
  2167. // Even if we aren't paused, if we haven't started the folder yet
  2168. // pretend we are. Otherwise the remote might get confused about
  2169. // the missing index info (and drop all the info). We will send
  2170. // another cluster config once the folder is started.
  2171. protocolFolder.Paused = folderCfg.Paused || fs == nil
  2172. for _, folderDevice := range folderCfg.Devices {
  2173. deviceCfg, _ := m.cfg.Device(folderDevice.DeviceID)
  2174. protocolDevice := protocol.Device{
  2175. ID: deviceCfg.DeviceID,
  2176. Name: deviceCfg.Name,
  2177. Addresses: deviceCfg.Addresses,
  2178. Compression: deviceCfg.Compression,
  2179. CertName: deviceCfg.CertName,
  2180. Introducer: deviceCfg.Introducer,
  2181. }
  2182. if deviceCfg.DeviceID == m.id && hasEncryptionToken {
  2183. protocolDevice.EncryptionPasswordToken = encryptionToken
  2184. } else if folderDevice.EncryptionPassword != "" {
  2185. protocolDevice.EncryptionPasswordToken = protocol.PasswordToken(folderCfg.ID, folderDevice.EncryptionPassword)
  2186. if folderDevice.DeviceID == device {
  2187. passwords[folderCfg.ID] = folderDevice.EncryptionPassword
  2188. }
  2189. }
  2190. if fs != nil {
  2191. if deviceCfg.DeviceID == m.id {
  2192. protocolDevice.IndexID = fs.IndexID(protocol.LocalDeviceID)
  2193. protocolDevice.MaxSequence = fs.Sequence(protocol.LocalDeviceID)
  2194. } else {
  2195. protocolDevice.IndexID = fs.IndexID(deviceCfg.DeviceID)
  2196. protocolDevice.MaxSequence = fs.Sequence(deviceCfg.DeviceID)
  2197. }
  2198. }
  2199. protocolFolder.Devices = append(protocolFolder.Devices, protocolDevice)
  2200. }
  2201. message.Folders = append(message.Folders, protocolFolder)
  2202. }
  2203. return message, passwords, nil
  2204. }
  2205. func (m *model) State(folder string) (string, time.Time, error) {
  2206. m.fmut.RLock()
  2207. runner, ok := m.folderRunners[folder]
  2208. m.fmut.RUnlock()
  2209. if !ok {
  2210. // The returned error should be an actual folder error, so returning
  2211. // errors.New("does not exist") or similar here would be
  2212. // inappropriate.
  2213. return "", time.Time{}, nil
  2214. }
  2215. state, changed, err := runner.getState()
  2216. return state.String(), changed, err
  2217. }
  2218. func (m *model) FolderErrors(folder string) ([]FileError, error) {
  2219. m.fmut.RLock()
  2220. err := m.checkFolderRunningLocked(folder)
  2221. runner := m.folderRunners[folder]
  2222. m.fmut.RUnlock()
  2223. if err != nil {
  2224. return nil, err
  2225. }
  2226. return runner.Errors(), nil
  2227. }
  2228. func (m *model) WatchError(folder string) error {
  2229. m.fmut.RLock()
  2230. err := m.checkFolderRunningLocked(folder)
  2231. runner := m.folderRunners[folder]
  2232. m.fmut.RUnlock()
  2233. if err != nil {
  2234. return nil // If the folder isn't running, there's no error to report.
  2235. }
  2236. return runner.WatchError()
  2237. }
  2238. func (m *model) Override(folder string) {
  2239. // Grab the runner and the file set.
  2240. m.fmut.RLock()
  2241. runner, ok := m.folderRunners[folder]
  2242. m.fmut.RUnlock()
  2243. if !ok {
  2244. return
  2245. }
  2246. // Run the override, taking updates as if they came from scanning.
  2247. runner.Override()
  2248. }
  2249. func (m *model) Revert(folder string) {
  2250. // Grab the runner and the file set.
  2251. m.fmut.RLock()
  2252. runner, ok := m.folderRunners[folder]
  2253. m.fmut.RUnlock()
  2254. if !ok {
  2255. return
  2256. }
  2257. // Run the revert, taking updates as if they came from scanning.
  2258. runner.Revert()
  2259. }
  2260. type TreeEntry struct {
  2261. Name string `json:"name"`
  2262. ModTime time.Time `json:"modTime"`
  2263. Size int64 `json:"size"`
  2264. Type protocol.FileInfoType `json:"type"`
  2265. Children []*TreeEntry `json:"children,omitempty"`
  2266. }
  2267. func findByName(slice []*TreeEntry, name string) *TreeEntry {
  2268. for _, child := range slice {
  2269. if child.Name == name {
  2270. return child
  2271. }
  2272. }
  2273. return nil
  2274. }
  2275. func (m *model) GlobalDirectoryTree(folder, prefix string, levels int, dirsOnly bool) ([]*TreeEntry, error) {
  2276. m.fmut.RLock()
  2277. files, ok := m.folderFiles[folder]
  2278. m.fmut.RUnlock()
  2279. if !ok {
  2280. return nil, ErrFolderMissing
  2281. }
  2282. root := &TreeEntry{
  2283. Children: make([]*TreeEntry, 0),
  2284. }
  2285. sep := string(filepath.Separator)
  2286. prefix = osutil.NativeFilename(prefix)
  2287. if prefix != "" && !strings.HasSuffix(prefix, sep) {
  2288. prefix = prefix + sep
  2289. }
  2290. snap, err := files.Snapshot()
  2291. if err != nil {
  2292. return nil, err
  2293. }
  2294. defer snap.Release()
  2295. snap.WithPrefixedGlobalTruncated(prefix, func(fi protocol.FileIntf) bool {
  2296. f := fi.(db.FileInfoTruncated)
  2297. // Don't include the prefix itself.
  2298. if f.IsInvalid() || f.IsDeleted() || strings.HasPrefix(prefix, f.Name) {
  2299. return true
  2300. }
  2301. f.Name = strings.Replace(f.Name, prefix, "", 1)
  2302. dir := filepath.Dir(f.Name)
  2303. base := filepath.Base(f.Name)
  2304. if levels > -1 && strings.Count(f.Name, sep) > levels {
  2305. return true
  2306. }
  2307. parent := root
  2308. if dir != "." {
  2309. for _, path := range strings.Split(dir, sep) {
  2310. child := findByName(parent.Children, path)
  2311. if child == nil {
  2312. err = fmt.Errorf("could not find child '%s' for path '%s' in parent '%s'", path, f.Name, parent.Name)
  2313. return false
  2314. }
  2315. parent = child
  2316. }
  2317. }
  2318. if dirsOnly && !f.IsDirectory() {
  2319. return true
  2320. }
  2321. parent.Children = append(parent.Children, &TreeEntry{
  2322. Name: base,
  2323. Type: f.Type,
  2324. ModTime: f.ModTime(),
  2325. Size: f.FileSize(),
  2326. })
  2327. return true
  2328. })
  2329. if err != nil {
  2330. return nil, err
  2331. }
  2332. return root.Children, nil
  2333. }
  2334. func (m *model) GetFolderVersions(folder string) (map[string][]versioner.FileVersion, error) {
  2335. m.fmut.RLock()
  2336. err := m.checkFolderRunningLocked(folder)
  2337. ver := m.folderVersioners[folder]
  2338. m.fmut.RUnlock()
  2339. if err != nil {
  2340. return nil, err
  2341. }
  2342. if ver == nil {
  2343. return nil, errNoVersioner
  2344. }
  2345. return ver.GetVersions()
  2346. }
  2347. func (m *model) RestoreFolderVersions(folder string, versions map[string]time.Time) (map[string]error, error) {
  2348. m.fmut.RLock()
  2349. err := m.checkFolderRunningLocked(folder)
  2350. fcfg := m.folderCfgs[folder]
  2351. ver := m.folderVersioners[folder]
  2352. m.fmut.RUnlock()
  2353. if err != nil {
  2354. return nil, err
  2355. }
  2356. if ver == nil {
  2357. return nil, errNoVersioner
  2358. }
  2359. restoreErrors := make(map[string]error)
  2360. for file, version := range versions {
  2361. if err := ver.Restore(file, version); err != nil {
  2362. restoreErrors[file] = err
  2363. }
  2364. }
  2365. // Trigger scan
  2366. if !fcfg.FSWatcherEnabled {
  2367. go func() { _ = m.ScanFolder(folder) }()
  2368. }
  2369. return restoreErrors, nil
  2370. }
  2371. func (m *model) Availability(folder string, file protocol.FileInfo, block protocol.BlockInfo) ([]Availability, error) {
  2372. // The slightly unusual locking sequence here is because we need to hold
  2373. // pmut for the duration (as the value returned from foldersFiles can
  2374. // get heavily modified on Close()), but also must acquire fmut before
  2375. // pmut. (The locks can be *released* in any order.)
  2376. m.fmut.RLock()
  2377. m.pmut.RLock()
  2378. defer m.pmut.RUnlock()
  2379. fs, ok := m.folderFiles[folder]
  2380. cfg := m.folderCfgs[folder]
  2381. m.fmut.RUnlock()
  2382. if !ok {
  2383. return nil, ErrFolderMissing
  2384. }
  2385. snap, err := fs.Snapshot()
  2386. if err != nil {
  2387. return nil, err
  2388. }
  2389. defer snap.Release()
  2390. return m.availabilityInSnapshotPRlocked(cfg, snap, file, block), nil
  2391. }
  2392. func (m *model) availabilityInSnapshot(cfg config.FolderConfiguration, snap *db.Snapshot, file protocol.FileInfo, block protocol.BlockInfo) []Availability {
  2393. m.pmut.RLock()
  2394. defer m.pmut.RUnlock()
  2395. return m.availabilityInSnapshotPRlocked(cfg, snap, file, block)
  2396. }
  2397. func (m *model) availabilityInSnapshotPRlocked(cfg config.FolderConfiguration, snap *db.Snapshot, file protocol.FileInfo, block protocol.BlockInfo) []Availability {
  2398. var availabilities []Availability
  2399. for _, device := range snap.Availability(file.Name) {
  2400. if _, ok := m.remotePausedFolders[device]; !ok {
  2401. continue
  2402. }
  2403. if _, ok := m.remotePausedFolders[device][cfg.ID]; ok {
  2404. continue
  2405. }
  2406. _, ok := m.conn[device]
  2407. if ok {
  2408. availabilities = append(availabilities, Availability{ID: device, FromTemporary: false})
  2409. }
  2410. }
  2411. for _, device := range cfg.Devices {
  2412. if m.deviceDownloads[device.DeviceID].Has(cfg.ID, file.Name, file.Version, int(block.Offset/int64(file.BlockSize()))) {
  2413. availabilities = append(availabilities, Availability{ID: device.DeviceID, FromTemporary: true})
  2414. }
  2415. }
  2416. return availabilities
  2417. }
  2418. // BringToFront bumps the given files priority in the job queue.
  2419. func (m *model) BringToFront(folder, file string) {
  2420. m.fmut.RLock()
  2421. runner, ok := m.folderRunners[folder]
  2422. m.fmut.RUnlock()
  2423. if ok {
  2424. runner.BringToFront(file)
  2425. }
  2426. }
  2427. func (m *model) ResetFolder(folder string) {
  2428. l.Infof("Cleaning data for folder %q", folder)
  2429. db.DropFolder(m.db, folder)
  2430. }
  2431. func (m *model) String() string {
  2432. return fmt.Sprintf("model@%p", m)
  2433. }
  2434. func (m *model) VerifyConfiguration(from, to config.Configuration) error {
  2435. return nil
  2436. }
  2437. func (m *model) CommitConfiguration(from, to config.Configuration) bool {
  2438. // TODO: This should not use reflect, and should take more care to try to handle stuff without restart.
  2439. // Delay processing config changes until after the initial setup
  2440. <-m.started
  2441. // Go through the folder configs and figure out if we need to restart or not.
  2442. // Tracks devices affected by any configuration change to resend ClusterConfig.
  2443. clusterConfigDevices := make(deviceIDSet, len(from.Devices)+len(to.Devices))
  2444. fromFolders := mapFolders(from.Folders)
  2445. toFolders := mapFolders(to.Folders)
  2446. for folderID, cfg := range toFolders {
  2447. if _, ok := fromFolders[folderID]; !ok {
  2448. // A folder was added.
  2449. if cfg.Paused {
  2450. l.Infoln("Paused folder", cfg.Description())
  2451. } else {
  2452. l.Infoln("Adding folder", cfg.Description())
  2453. if err := m.newFolder(cfg, to.Options.CacheIgnoredFiles); err != nil {
  2454. m.fatal(err)
  2455. return true
  2456. }
  2457. }
  2458. clusterConfigDevices.add(cfg.DeviceIDs())
  2459. }
  2460. }
  2461. removedFolders := make(map[string]struct{})
  2462. for folderID, fromCfg := range fromFolders {
  2463. toCfg, ok := toFolders[folderID]
  2464. if !ok {
  2465. // The folder was removed.
  2466. m.removeFolder(fromCfg)
  2467. clusterConfigDevices.add(fromCfg.DeviceIDs())
  2468. removedFolders[fromCfg.ID] = struct{}{}
  2469. continue
  2470. }
  2471. if fromCfg.Paused && toCfg.Paused {
  2472. continue
  2473. }
  2474. // This folder exists on both sides. Settings might have changed.
  2475. // Check if anything differs that requires a restart.
  2476. if !reflect.DeepEqual(fromCfg.RequiresRestartOnly(), toCfg.RequiresRestartOnly()) || from.Options.CacheIgnoredFiles != to.Options.CacheIgnoredFiles {
  2477. if err := m.restartFolder(fromCfg, toCfg, to.Options.CacheIgnoredFiles); err != nil {
  2478. m.fatal(err)
  2479. return true
  2480. }
  2481. clusterConfigDevices.add(fromCfg.DeviceIDs())
  2482. clusterConfigDevices.add(toCfg.DeviceIDs())
  2483. }
  2484. // Emit the folder pause/resume event
  2485. if fromCfg.Paused != toCfg.Paused {
  2486. eventType := events.FolderResumed
  2487. if toCfg.Paused {
  2488. eventType = events.FolderPaused
  2489. }
  2490. m.evLogger.Log(eventType, map[string]string{"id": toCfg.ID, "label": toCfg.Label})
  2491. }
  2492. }
  2493. // Removing a device. We actually don't need to do anything.
  2494. // Because folder config has changed (since the device lists do not match)
  2495. // Folders for that had device got "restarted", which involves killing
  2496. // connections to all devices that we were sharing the folder with.
  2497. // At some point model.Close() will get called for that device which will
  2498. // clean residue device state that is not part of any folder.
  2499. // Pausing a device, unpausing is handled by the connection service.
  2500. fromDevices := from.DeviceMap()
  2501. toDevices := to.DeviceMap()
  2502. closeDevices := make([]protocol.DeviceID, 0, len(to.Devices))
  2503. for deviceID, toCfg := range toDevices {
  2504. fromCfg, ok := fromDevices[deviceID]
  2505. if !ok {
  2506. sr := stats.NewDeviceStatisticsReference(m.db, deviceID)
  2507. m.fmut.Lock()
  2508. m.deviceStatRefs[deviceID] = sr
  2509. m.fmut.Unlock()
  2510. continue
  2511. }
  2512. delete(fromDevices, deviceID)
  2513. if fromCfg.Paused == toCfg.Paused {
  2514. continue
  2515. }
  2516. // Ignored folder was removed, reconnect to retrigger the prompt.
  2517. if !toCfg.Paused && len(fromCfg.IgnoredFolders) > len(toCfg.IgnoredFolders) {
  2518. closeDevices = append(closeDevices, deviceID)
  2519. }
  2520. if toCfg.Paused {
  2521. l.Infoln("Pausing", deviceID)
  2522. closeDevices = append(closeDevices, deviceID)
  2523. delete(clusterConfigDevices, deviceID)
  2524. m.evLogger.Log(events.DevicePaused, map[string]string{"device": deviceID.String()})
  2525. } else {
  2526. m.evLogger.Log(events.DeviceResumed, map[string]string{"device": deviceID.String()})
  2527. }
  2528. }
  2529. // Clean up after removed devices
  2530. removedDevices := make([]protocol.DeviceID, 0, len(fromDevices))
  2531. m.fmut.Lock()
  2532. for deviceID := range fromDevices {
  2533. delete(m.deviceStatRefs, deviceID)
  2534. removedDevices = append(removedDevices, deviceID)
  2535. delete(clusterConfigDevices, deviceID)
  2536. }
  2537. m.fmut.Unlock()
  2538. m.pmut.RLock()
  2539. for _, id := range closeDevices {
  2540. if conn, ok := m.conn[id]; ok {
  2541. go conn.Close(errDevicePaused)
  2542. }
  2543. }
  2544. for _, id := range removedDevices {
  2545. if conn, ok := m.conn[id]; ok {
  2546. go conn.Close(errDeviceRemoved)
  2547. }
  2548. }
  2549. m.pmut.RUnlock()
  2550. // Generating cluster-configs acquires fmut -> must happen outside of pmut.
  2551. m.sendClusterConfig(clusterConfigDevices.AsSlice())
  2552. ignoredDevices := observedDeviceSet(to.IgnoredDevices)
  2553. m.cleanPending(toDevices, toFolders, ignoredDevices, removedFolders)
  2554. m.globalRequestLimiter.setCapacity(1024 * to.Options.MaxConcurrentIncomingRequestKiB())
  2555. m.folderIOLimiter.setCapacity(to.Options.MaxFolderConcurrency())
  2556. // Some options don't require restart as those components handle it fine
  2557. // by themselves. Compare the options structs containing only the
  2558. // attributes that require restart and act apprioriately.
  2559. if !reflect.DeepEqual(from.Options.RequiresRestartOnly(), to.Options.RequiresRestartOnly()) {
  2560. l.Debugln(m, "requires restart, options differ")
  2561. return false
  2562. }
  2563. return true
  2564. }
  2565. func (m *model) cleanPending(existingDevices map[protocol.DeviceID]config.DeviceConfiguration, existingFolders map[string]config.FolderConfiguration, ignoredDevices deviceIDSet, removedFolders map[string]struct{}) {
  2566. var removedPendingFolders []map[string]string
  2567. pendingFolders, err := m.db.PendingFolders()
  2568. if err != nil {
  2569. l.Infof("Could not iterate through pending folder entries for cleanup: %v", err)
  2570. // Continue with pending devices below, loop is skipped.
  2571. }
  2572. for folderID, pf := range pendingFolders {
  2573. if _, ok := removedFolders[folderID]; ok {
  2574. // Forget pending folder device associations for recently removed
  2575. // folders as well, assuming the folder is no longer of interest
  2576. // at all (but might become pending again).
  2577. l.Debugf("Discarding pending removed folder %v from all devices", folderID)
  2578. m.db.RemovePendingFolder(folderID)
  2579. removedPendingFolders = append(removedPendingFolders, map[string]string{
  2580. "folderID": folderID,
  2581. })
  2582. continue
  2583. }
  2584. for deviceID := range pf.OfferedBy {
  2585. if dev, ok := existingDevices[deviceID]; !ok {
  2586. l.Debugf("Discarding pending folder %v from unknown device %v", folderID, deviceID)
  2587. goto removeFolderForDevice
  2588. } else if dev.IgnoredFolder(folderID) {
  2589. l.Debugf("Discarding now ignored pending folder %v for device %v", folderID, deviceID)
  2590. goto removeFolderForDevice
  2591. }
  2592. if folderCfg, ok := existingFolders[folderID]; ok {
  2593. if folderCfg.SharedWith(deviceID) {
  2594. l.Debugf("Discarding now shared pending folder %v for device %v", folderID, deviceID)
  2595. goto removeFolderForDevice
  2596. }
  2597. }
  2598. continue
  2599. removeFolderForDevice:
  2600. m.db.RemovePendingFolderForDevice(folderID, deviceID)
  2601. removedPendingFolders = append(removedPendingFolders, map[string]string{
  2602. "folderID": folderID,
  2603. "deviceID": deviceID.String(),
  2604. })
  2605. }
  2606. }
  2607. if len(removedPendingFolders) > 0 {
  2608. m.evLogger.Log(events.PendingFoldersChanged, map[string]interface{}{
  2609. "removed": removedPendingFolders,
  2610. })
  2611. }
  2612. var removedPendingDevices []map[string]string
  2613. pendingDevices, err := m.db.PendingDevices()
  2614. if err != nil {
  2615. l.Infof("Could not iterate through pending device entries for cleanup: %v", err)
  2616. return
  2617. }
  2618. for deviceID := range pendingDevices {
  2619. if _, ok := ignoredDevices[deviceID]; ok {
  2620. l.Debugf("Discarding now ignored pending device %v", deviceID)
  2621. goto removeDevice
  2622. }
  2623. if _, ok := existingDevices[deviceID]; ok {
  2624. l.Debugf("Discarding now added pending device %v", deviceID)
  2625. goto removeDevice
  2626. }
  2627. continue
  2628. removeDevice:
  2629. m.db.RemovePendingDevice(deviceID)
  2630. removedPendingDevices = append(removedPendingDevices, map[string]string{
  2631. "deviceID": deviceID.String(),
  2632. })
  2633. }
  2634. if len(removedPendingDevices) > 0 {
  2635. m.evLogger.Log(events.PendingDevicesChanged, map[string]interface{}{
  2636. "removed": removedPendingDevices,
  2637. })
  2638. }
  2639. }
  2640. // checkFolderRunningLocked returns nil if the folder is up and running and a
  2641. // descriptive error if not.
  2642. // Need to hold (read) lock on m.fmut when calling this.
  2643. func (m *model) checkFolderRunningLocked(folder string) error {
  2644. _, ok := m.folderRunners[folder]
  2645. if ok {
  2646. return nil
  2647. }
  2648. if cfg, ok := m.cfg.Folder(folder); !ok {
  2649. return ErrFolderMissing
  2650. } else if cfg.Paused {
  2651. return ErrFolderPaused
  2652. }
  2653. return ErrFolderNotRunning
  2654. }
  2655. // PendingDevices lists unknown devices that tried to connect.
  2656. func (m *model) PendingDevices() (map[protocol.DeviceID]db.ObservedDevice, error) {
  2657. return m.db.PendingDevices()
  2658. }
  2659. // PendingFolders lists folders that we don't yet share with the offering devices. It
  2660. // returns the entries grouped by folder and filters for a given device unless the
  2661. // argument is specified as EmptyDeviceID.
  2662. func (m *model) PendingFolders(device protocol.DeviceID) (map[string]db.PendingFolder, error) {
  2663. return m.db.PendingFoldersForDevice(device)
  2664. }
  2665. // mapFolders returns a map of folder ID to folder configuration for the given
  2666. // slice of folder configurations.
  2667. func mapFolders(folders []config.FolderConfiguration) map[string]config.FolderConfiguration {
  2668. m := make(map[string]config.FolderConfiguration, len(folders))
  2669. for _, cfg := range folders {
  2670. m[cfg.ID] = cfg
  2671. }
  2672. return m
  2673. }
  2674. // mapDevices returns a map of device ID to nothing for the given slice of
  2675. // device IDs.
  2676. func mapDevices(devices []protocol.DeviceID) map[protocol.DeviceID]struct{} {
  2677. m := make(map[protocol.DeviceID]struct{}, len(devices))
  2678. for _, dev := range devices {
  2679. m[dev] = struct{}{}
  2680. }
  2681. return m
  2682. }
  2683. func observedDeviceSet(devices []config.ObservedDevice) deviceIDSet {
  2684. res := make(deviceIDSet, len(devices))
  2685. for _, dev := range devices {
  2686. res[dev.ID] = struct{}{}
  2687. }
  2688. return res
  2689. }
  2690. func readOffsetIntoBuf(fs fs.Filesystem, file string, offset int64, buf []byte) (int, error) {
  2691. fd, err := fs.Open(file)
  2692. if err != nil {
  2693. l.Debugln("readOffsetIntoBuf.Open", file, err)
  2694. return 0, err
  2695. }
  2696. defer fd.Close()
  2697. n, err := fd.ReadAt(buf, offset)
  2698. if err != nil {
  2699. l.Debugln("readOffsetIntoBuf.ReadAt", file, err)
  2700. }
  2701. return n, err
  2702. }
  2703. // makeForgetUpdate takes an index update and constructs a download progress update
  2704. // causing to forget any progress for files which we've just been sent.
  2705. func makeForgetUpdate(files []protocol.FileInfo) []protocol.FileDownloadProgressUpdate {
  2706. updates := make([]protocol.FileDownloadProgressUpdate, 0, len(files))
  2707. for _, file := range files {
  2708. if file.IsSymlink() || file.IsDirectory() || file.IsDeleted() {
  2709. continue
  2710. }
  2711. updates = append(updates, protocol.FileDownloadProgressUpdate{
  2712. Name: file.Name,
  2713. Version: file.Version,
  2714. UpdateType: protocol.FileDownloadProgressUpdateTypeForget,
  2715. })
  2716. }
  2717. return updates
  2718. }
  2719. // folderDeviceSet is a set of (folder, deviceID) pairs
  2720. type folderDeviceSet map[string]map[protocol.DeviceID]struct{}
  2721. // set adds the (dev, folder) pair to the set
  2722. func (s folderDeviceSet) set(dev protocol.DeviceID, folder string) {
  2723. devs, ok := s[folder]
  2724. if !ok {
  2725. devs = make(map[protocol.DeviceID]struct{})
  2726. s[folder] = devs
  2727. }
  2728. devs[dev] = struct{}{}
  2729. }
  2730. // has returns true if the (dev, folder) pair is in the set
  2731. func (s folderDeviceSet) has(dev protocol.DeviceID, folder string) bool {
  2732. _, ok := s[folder][dev]
  2733. return ok
  2734. }
  2735. // hasDevice returns true if the device is set on any folder
  2736. func (s folderDeviceSet) hasDevice(dev protocol.DeviceID) bool {
  2737. for _, devices := range s {
  2738. if _, ok := devices[dev]; ok {
  2739. return true
  2740. }
  2741. }
  2742. return false
  2743. }
  2744. // syncMutexMap is a type safe wrapper for a sync.Map that holds mutexes
  2745. type syncMutexMap struct {
  2746. inner stdsync.Map
  2747. }
  2748. func (m *syncMutexMap) Get(key string) sync.Mutex {
  2749. v, _ := m.inner.LoadOrStore(key, sync.NewMutex())
  2750. return v.(sync.Mutex)
  2751. }
  2752. type deviceIDSet map[protocol.DeviceID]struct{}
  2753. func (s deviceIDSet) add(ids []protocol.DeviceID) {
  2754. for _, id := range ids {
  2755. if _, ok := s[id]; !ok {
  2756. s[id] = struct{}{}
  2757. }
  2758. }
  2759. }
  2760. func (s deviceIDSet) AsSlice() []protocol.DeviceID {
  2761. ids := make([]protocol.DeviceID, 0, len(s))
  2762. for id := range s {
  2763. ids = append(ids, id)
  2764. }
  2765. return ids
  2766. }
  2767. func encryptionTokenPath(cfg config.FolderConfiguration) string {
  2768. return filepath.Join(cfg.MarkerName, config.EncryptionTokenName)
  2769. }
  2770. type storedEncryptionToken struct {
  2771. FolderID string
  2772. Token []byte
  2773. }
  2774. func readEncryptionToken(cfg config.FolderConfiguration) ([]byte, error) {
  2775. fd, err := cfg.Filesystem().Open(encryptionTokenPath(cfg))
  2776. if err != nil {
  2777. return nil, err
  2778. }
  2779. defer fd.Close()
  2780. var stored storedEncryptionToken
  2781. if err := json.NewDecoder(fd).Decode(&stored); err != nil {
  2782. return nil, err
  2783. }
  2784. return stored.Token, nil
  2785. }
  2786. func writeEncryptionToken(token []byte, cfg config.FolderConfiguration) error {
  2787. tokenName := encryptionTokenPath(cfg)
  2788. fd, err := cfg.Filesystem().OpenFile(tokenName, fs.OptReadWrite|fs.OptCreate, 0666)
  2789. if err != nil {
  2790. return err
  2791. }
  2792. defer fd.Close()
  2793. return json.NewEncoder(fd).Encode(storedEncryptionToken{
  2794. FolderID: cfg.ID,
  2795. Token: token,
  2796. })
  2797. }
  2798. func newFolderConfiguration(w config.Wrapper, id, label string, fsType fs.FilesystemType, path string) config.FolderConfiguration {
  2799. fcfg := w.DefaultFolder()
  2800. fcfg.ID = id
  2801. fcfg.Label = label
  2802. fcfg.FilesystemType = fsType
  2803. fcfg.Path = path
  2804. return fcfg
  2805. }
  2806. type updatedPendingFolder struct {
  2807. FolderID string `json:"folderID"`
  2808. FolderLabel string `json:"folderLabel"`
  2809. DeviceID protocol.DeviceID `json:"deviceID"`
  2810. ReceiveEncrypted bool `json:"receiveEncrypted"`
  2811. }
  2812. // redactPathError checks if the error is actually a os.PathError, and if yes
  2813. // returns a redactedError with the path removed.
  2814. func redactPathError(err error) (error, bool) {
  2815. perr, ok := err.(*os.PathError)
  2816. if !ok {
  2817. return nil, false
  2818. }
  2819. return &redactedError{
  2820. error: err,
  2821. redacted: fmt.Errorf("%v: %w", perr.Op, perr.Err),
  2822. }, true
  2823. }
  2824. type redactedError struct {
  2825. error
  2826. redacted error
  2827. }