model.go 111 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755275627572758275927602761276227632764276527662767276827692770277127722773277427752776277727782779278027812782278327842785278627872788278927902791279227932794279527962797279827992800280128022803280428052806280728082809281028112812281328142815281628172818281928202821282228232824282528262827282828292830283128322833283428352836283728382839284028412842284328442845284628472848284928502851285228532854285528562857285828592860286128622863286428652866286728682869287028712872287328742875287628772878287928802881288228832884288528862887288828892890289128922893289428952896289728982899290029012902290329042905290629072908290929102911291229132914291529162917291829192920292129222923292429252926292729282929293029312932293329342935293629372938293929402941294229432944294529462947294829492950295129522953295429552956295729582959296029612962296329642965296629672968296929702971297229732974297529762977297829792980298129822983298429852986298729882989299029912992299329942995299629972998299930003001300230033004300530063007300830093010301130123013301430153016301730183019302030213022302330243025302630273028302930303031303230333034303530363037303830393040304130423043304430453046304730483049305030513052305330543055305630573058305930603061306230633064306530663067306830693070307130723073307430753076307730783079308030813082308330843085308630873088308930903091309230933094309530963097309830993100310131023103310431053106310731083109311031113112311331143115311631173118311931203121312231233124312531263127312831293130313131323133313431353136313731383139314031413142314331443145314631473148314931503151315231533154315531563157315831593160316131623163316431653166316731683169317031713172317331743175317631773178317931803181318231833184318531863187318831893190319131923193319431953196319731983199320032013202320332043205320632073208320932103211321232133214321532163217321832193220322132223223322432253226322732283229323032313232323332343235323632373238323932403241324232433244324532463247324832493250325132523253325432553256325732583259326032613262326332643265326632673268326932703271327232733274327532763277327832793280328132823283328432853286328732883289329032913292329332943295329632973298329933003301330233033304330533063307330833093310331133123313331433153316331733183319332033213322332333243325332633273328332933303331333233333334333533363337333833393340334133423343334433453346334733483349335033513352335333543355335633573358335933603361336233633364336533663367336833693370337133723373337433753376337733783379338033813382338333843385338633873388338933903391339233933394339533963397339833993400340134023403340434053406340734083409341034113412341334143415341634173418341934203421342234233424342534263427342834293430343134323433343434353436343734383439344034413442344334443445344634473448344934503451345234533454345534563457345834593460346134623463346434653466346734683469347034713472347334743475347634773478347934803481348234833484348534863487348834893490349134923493349434953496349734983499350035013502350335043505350635073508350935103511351235133514351535163517351835193520352135223523352435253526352735283529353035313532353335343535
  1. // Copyright (C) 2014 The Syncthing Authors.
  2. //
  3. // This Source Code Form is subject to the terms of the Mozilla Public
  4. // License, v. 2.0. If a copy of the MPL was not distributed with this file,
  5. // You can obtain one at https://mozilla.org/MPL/2.0/.
  6. //go:generate -command counterfeiter go run github.com/maxbrunsfeld/counterfeiter/v6
  7. //go:generate counterfeiter -o mocks/model.go --fake-name Model . Model
  8. package model
  9. import (
  10. "bytes"
  11. "context"
  12. "encoding/json"
  13. "errors"
  14. "fmt"
  15. "io"
  16. "net"
  17. "os"
  18. "path/filepath"
  19. "reflect"
  20. "runtime"
  21. "strings"
  22. stdsync "sync"
  23. "sync/atomic"
  24. "time"
  25. "github.com/thejerf/suture/v4"
  26. "github.com/syncthing/syncthing/lib/build"
  27. "github.com/syncthing/syncthing/lib/config"
  28. "github.com/syncthing/syncthing/lib/connections"
  29. "github.com/syncthing/syncthing/lib/db"
  30. "github.com/syncthing/syncthing/lib/events"
  31. "github.com/syncthing/syncthing/lib/fs"
  32. "github.com/syncthing/syncthing/lib/ignore"
  33. "github.com/syncthing/syncthing/lib/osutil"
  34. "github.com/syncthing/syncthing/lib/protocol"
  35. "github.com/syncthing/syncthing/lib/rand"
  36. "github.com/syncthing/syncthing/lib/scanner"
  37. "github.com/syncthing/syncthing/lib/semaphore"
  38. "github.com/syncthing/syncthing/lib/stats"
  39. "github.com/syncthing/syncthing/lib/svcutil"
  40. "github.com/syncthing/syncthing/lib/sync"
  41. "github.com/syncthing/syncthing/lib/ur/contract"
  42. "github.com/syncthing/syncthing/lib/versioner"
  43. )
  44. type service interface {
  45. suture.Service
  46. BringToFront(string)
  47. Override()
  48. Revert()
  49. DelayScan(d time.Duration)
  50. ScheduleScan()
  51. SchedulePull() // something relevant changed, we should try a pull
  52. Jobs(page, perpage int) ([]string, []string, int) // In progress, Queued, skipped
  53. Scan(subs []string) error
  54. Errors() []FileError
  55. WatchError() error
  56. ScheduleForceRescan(path string)
  57. GetStatistics() (stats.FolderStatistics, error)
  58. getState() (folderState, time.Time, error)
  59. }
  60. type Availability struct {
  61. ID protocol.DeviceID `json:"id"`
  62. FromTemporary bool `json:"fromTemporary"`
  63. }
  64. type Model interface {
  65. suture.Service
  66. connections.Model
  67. ResetFolder(folder string) error
  68. DelayScan(folder string, next time.Duration)
  69. ScanFolder(folder string) error
  70. ScanFolders() map[string]error
  71. ScanFolderSubdirs(folder string, subs []string) error
  72. State(folder string) (string, time.Time, error)
  73. FolderErrors(folder string) ([]FileError, error)
  74. WatchError(folder string) error
  75. Override(folder string)
  76. Revert(folder string)
  77. BringToFront(folder, file string)
  78. LoadIgnores(folder string) ([]string, []string, error)
  79. CurrentIgnores(folder string) ([]string, []string, error)
  80. SetIgnores(folder string, content []string) error
  81. GetFolderVersions(folder string) (map[string][]versioner.FileVersion, error)
  82. RestoreFolderVersions(folder string, versions map[string]time.Time) (map[string]error, error)
  83. DBSnapshot(folder string) (*db.Snapshot, error)
  84. NeedFolderFiles(folder string, page, perpage int) ([]db.FileInfoTruncated, []db.FileInfoTruncated, []db.FileInfoTruncated, error)
  85. RemoteNeedFolderFiles(folder string, device protocol.DeviceID, page, perpage int) ([]db.FileInfoTruncated, error)
  86. LocalChangedFolderFiles(folder string, page, perpage int) ([]db.FileInfoTruncated, error)
  87. FolderProgressBytesCompleted(folder string) int64
  88. CurrentFolderFile(folder string, file string) (protocol.FileInfo, bool, error)
  89. CurrentGlobalFile(folder string, file string) (protocol.FileInfo, bool, error)
  90. GetMtimeMapping(folder string, file string) (fs.MtimeMapping, error)
  91. Availability(folder string, file protocol.FileInfo, block protocol.BlockInfo) ([]Availability, error)
  92. Completion(device protocol.DeviceID, folder string) (FolderCompletion, error)
  93. ConnectionStats() map[string]interface{}
  94. DeviceStatistics() (map[protocol.DeviceID]stats.DeviceStatistics, error)
  95. FolderStatistics() (map[string]stats.FolderStatistics, error)
  96. UsageReportingStats(report *contract.Report, version int, preview bool)
  97. ConnectedTo(remoteID protocol.DeviceID) bool
  98. PendingDevices() (map[protocol.DeviceID]db.ObservedDevice, error)
  99. PendingFolders(device protocol.DeviceID) (map[string]db.PendingFolder, error)
  100. DismissPendingDevice(device protocol.DeviceID) error
  101. DismissPendingFolder(device protocol.DeviceID, folder string) error
  102. StartDeadlockDetector(timeout time.Duration)
  103. GlobalDirectoryTree(folder, prefix string, levels int, dirsOnly bool) ([]*TreeEntry, error)
  104. }
  105. type model struct {
  106. *suture.Supervisor
  107. // constructor parameters
  108. cfg config.Wrapper
  109. id protocol.DeviceID
  110. db *db.Lowlevel
  111. protectedFiles []string
  112. evLogger events.Logger
  113. // constant or concurrency safe fields
  114. finder *db.BlockFinder
  115. progressEmitter *ProgressEmitter
  116. shortID protocol.ShortID
  117. // globalRequestLimiter limits the amount of data in concurrent incoming
  118. // requests
  119. globalRequestLimiter *semaphore.Semaphore
  120. // folderIOLimiter limits the number of concurrent I/O heavy operations,
  121. // such as scans and pulls.
  122. folderIOLimiter *semaphore.Semaphore
  123. fatalChan chan error
  124. started chan struct{}
  125. keyGen *protocol.KeyGenerator
  126. promotionTimer *time.Timer
  127. // fields protected by fmut
  128. fmut sync.RWMutex
  129. folderCfgs map[string]config.FolderConfiguration // folder -> cfg
  130. folderFiles map[string]*db.FileSet // folder -> files
  131. deviceStatRefs map[protocol.DeviceID]*stats.DeviceStatisticsReference // deviceID -> statsRef
  132. folderIgnores map[string]*ignore.Matcher // folder -> matcher object
  133. folderRunners *serviceMap[string, service] // folder -> puller or scanner
  134. folderRestartMuts syncMutexMap // folder -> restart mutex
  135. folderVersioners map[string]versioner.Versioner // folder -> versioner (may be nil)
  136. folderEncryptionPasswordTokens map[string][]byte // folder -> encryption token (may be missing, and only for encryption type folders)
  137. folderEncryptionFailures map[string]map[protocol.DeviceID]error // folder -> device -> error regarding encryption consistency (may be missing)
  138. // fields protected by pmut
  139. pmut sync.RWMutex
  140. connections map[string]protocol.Connection // connection ID -> connection
  141. deviceConnIDs map[protocol.DeviceID][]string // device -> connection IDs (invariant: if the key exists, the value is len >= 1, with the primary connection at the start of the slice)
  142. promotedConnID map[protocol.DeviceID]string // device -> latest promoted connection ID
  143. connRequestLimiters map[protocol.DeviceID]*semaphore.Semaphore
  144. closed map[string]chan struct{} // connection ID -> closed channel
  145. helloMessages map[protocol.DeviceID]protocol.Hello
  146. deviceDownloads map[protocol.DeviceID]*deviceDownloadState
  147. remoteFolderStates map[protocol.DeviceID]map[string]remoteFolderState // deviceID -> folders
  148. indexHandlers *serviceMap[protocol.DeviceID, *indexHandlerRegistry]
  149. // for testing only
  150. foldersRunning atomic.Int32
  151. }
  152. var _ config.Verifier = &model{}
  153. type folderFactory func(*model, *db.FileSet, *ignore.Matcher, config.FolderConfiguration, versioner.Versioner, events.Logger, *semaphore.Semaphore) service
  154. var folderFactories = make(map[config.FolderType]folderFactory)
  155. var (
  156. errDeviceUnknown = errors.New("unknown device")
  157. errDevicePaused = errors.New("device is paused")
  158. ErrFolderPaused = errors.New("folder is paused")
  159. ErrFolderNotRunning = errors.New("folder is not running")
  160. ErrFolderMissing = errors.New("no such folder")
  161. errNoVersioner = errors.New("folder has no versioner")
  162. // errors about why a connection is closed
  163. errStopped = errors.New("Syncthing is being stopped")
  164. errEncryptionInvConfigLocal = errors.New("can't encrypt outgoing data because local data is encrypted (folder-type receive-encrypted)")
  165. errEncryptionInvConfigRemote = errors.New("remote has encrypted data and encrypts that data for us - this is impossible")
  166. errEncryptionNotEncryptedLocal = errors.New("remote expects to exchange encrypted data, but is configured for plain data")
  167. errEncryptionPlainForReceiveEncrypted = errors.New("remote expects to exchange plain data, but is configured to be encrypted")
  168. errEncryptionPlainForRemoteEncrypted = errors.New("remote expects to exchange plain data, but local data is encrypted (folder-type receive-encrypted)")
  169. errEncryptionNotEncryptedUntrusted = errors.New("device is untrusted, but configured to receive plain data")
  170. errEncryptionPassword = errors.New("different encryption passwords used")
  171. errEncryptionTokenRead = errors.New("failed to read encryption token")
  172. errEncryptionTokenWrite = errors.New("failed to write encryption token")
  173. errMissingRemoteInClusterConfig = errors.New("remote device missing in cluster config")
  174. errMissingLocalInClusterConfig = errors.New("local device missing in cluster config")
  175. )
  176. // NewModel creates and starts a new model. The model starts in read-only mode,
  177. // where it sends index information to connected peers and responds to requests
  178. // for file data without altering the local folder in any way.
  179. func NewModel(cfg config.Wrapper, id protocol.DeviceID, ldb *db.Lowlevel, protectedFiles []string, evLogger events.Logger, keyGen *protocol.KeyGenerator) Model {
  180. spec := svcutil.SpecWithDebugLogger(l)
  181. m := &model{
  182. Supervisor: suture.New("model", spec),
  183. // constructor parameters
  184. cfg: cfg,
  185. id: id,
  186. db: ldb,
  187. protectedFiles: protectedFiles,
  188. evLogger: evLogger,
  189. // constant or concurrency safe fields
  190. finder: db.NewBlockFinder(ldb),
  191. progressEmitter: NewProgressEmitter(cfg, evLogger),
  192. shortID: id.Short(),
  193. globalRequestLimiter: semaphore.New(1024 * cfg.Options().MaxConcurrentIncomingRequestKiB()),
  194. folderIOLimiter: semaphore.New(cfg.Options().MaxFolderConcurrency()),
  195. fatalChan: make(chan error),
  196. started: make(chan struct{}),
  197. keyGen: keyGen,
  198. promotionTimer: time.NewTimer(0),
  199. // fields protected by fmut
  200. fmut: sync.NewRWMutex(),
  201. folderCfgs: make(map[string]config.FolderConfiguration),
  202. folderFiles: make(map[string]*db.FileSet),
  203. deviceStatRefs: make(map[protocol.DeviceID]*stats.DeviceStatisticsReference),
  204. folderIgnores: make(map[string]*ignore.Matcher),
  205. folderRunners: newServiceMap[string, service](evLogger),
  206. folderVersioners: make(map[string]versioner.Versioner),
  207. folderEncryptionPasswordTokens: make(map[string][]byte),
  208. folderEncryptionFailures: make(map[string]map[protocol.DeviceID]error),
  209. // fields protected by pmut
  210. pmut: sync.NewRWMutex(),
  211. connections: make(map[string]protocol.Connection),
  212. deviceConnIDs: make(map[protocol.DeviceID][]string),
  213. promotedConnID: make(map[protocol.DeviceID]string),
  214. connRequestLimiters: make(map[protocol.DeviceID]*semaphore.Semaphore),
  215. closed: make(map[string]chan struct{}),
  216. helloMessages: make(map[protocol.DeviceID]protocol.Hello),
  217. deviceDownloads: make(map[protocol.DeviceID]*deviceDownloadState),
  218. remoteFolderStates: make(map[protocol.DeviceID]map[string]remoteFolderState),
  219. indexHandlers: newServiceMap[protocol.DeviceID, *indexHandlerRegistry](evLogger),
  220. }
  221. for devID, cfg := range cfg.Devices() {
  222. m.deviceStatRefs[devID] = stats.NewDeviceStatisticsReference(m.db, devID)
  223. m.setConnRequestLimitersPLocked(cfg)
  224. }
  225. m.Add(m.folderRunners)
  226. m.Add(m.progressEmitter)
  227. m.Add(m.indexHandlers)
  228. m.Add(svcutil.AsService(m.serve, m.String()))
  229. return m
  230. }
  231. func (m *model) serve(ctx context.Context) error {
  232. defer m.closeAllConnectionsAndWait()
  233. cfg := m.cfg.Subscribe(m)
  234. defer m.cfg.Unsubscribe(m)
  235. if err := m.initFolders(cfg); err != nil {
  236. close(m.started)
  237. return svcutil.AsFatalErr(err, svcutil.ExitError)
  238. }
  239. close(m.started)
  240. for {
  241. select {
  242. case <-ctx.Done():
  243. l.Debugln(m, "context closed, stopping", ctx.Err())
  244. return ctx.Err()
  245. case err := <-m.fatalChan:
  246. l.Debugln(m, "fatal error, stopping", err)
  247. return svcutil.AsFatalErr(err, svcutil.ExitError)
  248. case <-m.promotionTimer.C:
  249. l.Debugln("promotion timer fired")
  250. m.promoteConnections()
  251. }
  252. }
  253. }
  254. func (m *model) initFolders(cfg config.Configuration) error {
  255. clusterConfigDevices := make(deviceIDSet, len(cfg.Devices))
  256. for _, folderCfg := range cfg.Folders {
  257. if folderCfg.Paused {
  258. folderCfg.CreateRoot()
  259. continue
  260. }
  261. err := m.newFolder(folderCfg, cfg.Options.CacheIgnoredFiles)
  262. if err != nil {
  263. return err
  264. }
  265. clusterConfigDevices.add(folderCfg.DeviceIDs())
  266. }
  267. ignoredDevices := observedDeviceSet(m.cfg.IgnoredDevices())
  268. m.cleanPending(cfg.DeviceMap(), cfg.FolderMap(), ignoredDevices, nil)
  269. m.sendClusterConfig(clusterConfigDevices.AsSlice())
  270. return nil
  271. }
  272. func (m *model) closeAllConnectionsAndWait() {
  273. m.pmut.RLock()
  274. closed := make([]chan struct{}, 0, len(m.connections))
  275. for connID, conn := range m.connections {
  276. closed = append(closed, m.closed[connID])
  277. go conn.Close(errStopped)
  278. }
  279. m.pmut.RUnlock()
  280. for _, c := range closed {
  281. <-c
  282. }
  283. }
  284. func (m *model) fatal(err error) {
  285. select {
  286. case m.fatalChan <- err:
  287. default:
  288. }
  289. }
  290. // StartDeadlockDetector starts a deadlock detector on the models locks which
  291. // causes panics in case the locks cannot be acquired in the given timeout
  292. // period.
  293. func (m *model) StartDeadlockDetector(timeout time.Duration) {
  294. l.Infof("Starting deadlock detector with %v timeout", timeout)
  295. detector := newDeadlockDetector(timeout, m.evLogger, m.fatal)
  296. detector.Watch("fmut", m.fmut)
  297. detector.Watch("pmut", m.pmut)
  298. }
  299. // Need to hold lock on m.fmut when calling this.
  300. func (m *model) addAndStartFolderLocked(cfg config.FolderConfiguration, fset *db.FileSet, cacheIgnoredFiles bool) {
  301. ignores := ignore.New(cfg.Filesystem(nil), ignore.WithCache(cacheIgnoredFiles))
  302. if cfg.Type != config.FolderTypeReceiveEncrypted {
  303. if err := ignores.Load(".stignore"); err != nil && !fs.IsNotExist(err) {
  304. l.Warnln("Loading ignores:", err)
  305. }
  306. }
  307. m.addAndStartFolderLockedWithIgnores(cfg, fset, ignores)
  308. }
  309. // Only needed for testing, use addAndStartFolderLocked instead.
  310. func (m *model) addAndStartFolderLockedWithIgnores(cfg config.FolderConfiguration, fset *db.FileSet, ignores *ignore.Matcher) {
  311. m.folderCfgs[cfg.ID] = cfg
  312. m.folderFiles[cfg.ID] = fset
  313. m.folderIgnores[cfg.ID] = ignores
  314. _, ok := m.folderRunners.Get(cfg.ID)
  315. if ok {
  316. l.Warnln("Cannot start already running folder", cfg.Description())
  317. panic("cannot start already running folder")
  318. }
  319. folderFactory, ok := folderFactories[cfg.Type]
  320. if !ok {
  321. panic(fmt.Sprintf("unknown folder type 0x%x", cfg.Type))
  322. }
  323. folder := cfg.ID
  324. // Find any devices for which we hold the index in the db, but the folder
  325. // is not shared, and drop it.
  326. expected := mapDevices(cfg.DeviceIDs())
  327. for _, available := range fset.ListDevices() {
  328. if _, ok := expected[available]; !ok {
  329. l.Debugln("dropping", folder, "state for", available)
  330. fset.Drop(available)
  331. }
  332. }
  333. v, ok := fset.Sequence(protocol.LocalDeviceID), true
  334. indexHasFiles := ok && v > 0
  335. if !indexHasFiles {
  336. // It's a blank folder, so this may the first time we're looking at
  337. // it. Attempt to create and tag with our marker as appropriate. We
  338. // don't really do anything with errors at this point except warn -
  339. // if these things don't work, we still want to start the folder and
  340. // it'll show up as errored later.
  341. if err := cfg.CreateRoot(); err != nil {
  342. l.Warnln("Failed to create folder root directory", err)
  343. } else if err = cfg.CreateMarker(); err != nil {
  344. l.Warnln("Failed to create folder marker:", err)
  345. }
  346. }
  347. if cfg.Type == config.FolderTypeReceiveEncrypted {
  348. if encryptionToken, err := readEncryptionToken(cfg); err == nil {
  349. m.folderEncryptionPasswordTokens[folder] = encryptionToken
  350. } else if !fs.IsNotExist(err) {
  351. l.Warnf("Failed to read encryption token: %v", err)
  352. }
  353. }
  354. // These are our metadata files, and they should always be hidden.
  355. ffs := cfg.Filesystem(nil)
  356. _ = ffs.Hide(config.DefaultMarkerName)
  357. _ = ffs.Hide(versioner.DefaultPath)
  358. _ = ffs.Hide(".stignore")
  359. var ver versioner.Versioner
  360. if cfg.Versioning.Type != "" {
  361. var err error
  362. ver, err = versioner.New(cfg)
  363. if err != nil {
  364. panic(fmt.Errorf("creating versioner: %w", err))
  365. }
  366. }
  367. m.folderVersioners[folder] = ver
  368. m.warnAboutOverwritingProtectedFiles(cfg, ignores)
  369. p := folderFactory(m, fset, ignores, cfg, ver, m.evLogger, m.folderIOLimiter)
  370. m.folderRunners.Add(folder, p)
  371. l.Infof("Ready to synchronize %s (%s)", cfg.Description(), cfg.Type)
  372. }
  373. func (m *model) warnAboutOverwritingProtectedFiles(cfg config.FolderConfiguration, ignores *ignore.Matcher) {
  374. if cfg.Type == config.FolderTypeSendOnly {
  375. return
  376. }
  377. // This is a bit of a hack.
  378. ffs := cfg.Filesystem(nil)
  379. if ffs.Type() != fs.FilesystemTypeBasic {
  380. return
  381. }
  382. folderLocation := ffs.URI()
  383. var filesAtRisk []string
  384. for _, protectedFilePath := range m.protectedFiles {
  385. // check if file is synced in this folder
  386. if protectedFilePath != folderLocation && !fs.IsParent(protectedFilePath, folderLocation) {
  387. continue
  388. }
  389. // check if file is ignored
  390. relPath, _ := filepath.Rel(folderLocation, protectedFilePath)
  391. if ignores.Match(relPath).IsIgnored() {
  392. continue
  393. }
  394. filesAtRisk = append(filesAtRisk, protectedFilePath)
  395. }
  396. if len(filesAtRisk) > 0 {
  397. l.Warnln("Some protected files may be overwritten and cause issues. See https://docs.syncthing.net/users/config.html#syncing-configuration-files for more information. The at risk files are:", strings.Join(filesAtRisk, ", "))
  398. }
  399. }
  400. func (m *model) removeFolder(cfg config.FolderConfiguration) {
  401. m.fmut.RLock()
  402. wait := m.folderRunners.StopAndWaitChan(cfg.ID, 0)
  403. m.fmut.RUnlock()
  404. <-wait
  405. // We need to hold both fmut and pmut and must acquire locks in the same
  406. // order always. (The locks can be *released* in any order.)
  407. m.fmut.Lock()
  408. m.pmut.RLock()
  409. isPathUnique := true
  410. for folderID, folderCfg := range m.folderCfgs {
  411. if folderID != cfg.ID && folderCfg.Path == cfg.Path {
  412. isPathUnique = false
  413. break
  414. }
  415. }
  416. if isPathUnique {
  417. // Remove (if empty and removable) or move away (if non-empty or
  418. // otherwise not removable) Syncthing-specific marker files.
  419. fs := cfg.Filesystem(nil)
  420. if err := fs.Remove(config.DefaultMarkerName); err != nil {
  421. moved := config.DefaultMarkerName + time.Now().Format(".removed-20060102-150405")
  422. _ = fs.Rename(config.DefaultMarkerName, moved)
  423. }
  424. }
  425. m.cleanupFolderLocked(cfg)
  426. m.indexHandlers.Each(func(_ protocol.DeviceID, r *indexHandlerRegistry) error {
  427. r.Remove(cfg.ID)
  428. return nil
  429. })
  430. m.fmut.Unlock()
  431. m.pmut.RUnlock()
  432. // Remove it from the database
  433. db.DropFolder(m.db, cfg.ID)
  434. }
  435. // Need to hold lock on m.fmut when calling this.
  436. func (m *model) cleanupFolderLocked(cfg config.FolderConfiguration) {
  437. // clear up our config maps
  438. m.folderRunners.Remove(cfg.ID)
  439. delete(m.folderCfgs, cfg.ID)
  440. delete(m.folderFiles, cfg.ID)
  441. delete(m.folderIgnores, cfg.ID)
  442. delete(m.folderVersioners, cfg.ID)
  443. delete(m.folderEncryptionPasswordTokens, cfg.ID)
  444. delete(m.folderEncryptionFailures, cfg.ID)
  445. }
  446. func (m *model) restartFolder(from, to config.FolderConfiguration, cacheIgnoredFiles bool) error {
  447. if to.ID == "" {
  448. panic("bug: cannot restart empty folder ID")
  449. }
  450. if to.ID != from.ID {
  451. l.Warnf("bug: folder restart cannot change ID %q -> %q", from.ID, to.ID)
  452. panic("bug: folder restart cannot change ID")
  453. }
  454. folder := to.ID
  455. // This mutex protects the entirety of the restart operation, preventing
  456. // there from being more than one folder restart operation in progress
  457. // at any given time. The usual fmut/pmut stuff doesn't cover this,
  458. // because those locks are released while we are waiting for the folder
  459. // to shut down (and must be so because the folder might need them as
  460. // part of its operations before shutting down).
  461. restartMut := m.folderRestartMuts.Get(folder)
  462. restartMut.Lock()
  463. defer restartMut.Unlock()
  464. m.fmut.RLock()
  465. wait := m.folderRunners.StopAndWaitChan(from.ID, 0)
  466. m.fmut.RUnlock()
  467. <-wait
  468. m.fmut.Lock()
  469. defer m.fmut.Unlock()
  470. // Cache the (maybe) existing fset before it's removed by cleanupFolderLocked
  471. fset := m.folderFiles[folder]
  472. fsetNil := fset == nil
  473. m.cleanupFolderLocked(from)
  474. if !to.Paused {
  475. if fsetNil {
  476. // Create a new fset. Might take a while and we do it under
  477. // locking, but it's unsafe to create fset:s concurrently so
  478. // that's the price we pay.
  479. var err error
  480. fset, err = db.NewFileSet(folder, m.db)
  481. if err != nil {
  482. return fmt.Errorf("restarting %v: %w", to.Description(), err)
  483. }
  484. }
  485. m.addAndStartFolderLocked(to, fset, cacheIgnoredFiles)
  486. }
  487. // Care needs to be taken because we already hold fmut and the lock order
  488. // must be the same everywhere. As fmut is acquired first, this is fine.
  489. m.pmut.RLock()
  490. runner, _ := m.folderRunners.Get(to.ID)
  491. m.indexHandlers.Each(func(_ protocol.DeviceID, r *indexHandlerRegistry) error {
  492. r.RegisterFolderState(to, fset, runner)
  493. return nil
  494. })
  495. m.pmut.RUnlock()
  496. var infoMsg string
  497. switch {
  498. case to.Paused:
  499. infoMsg = "Paused"
  500. case from.Paused:
  501. infoMsg = "Unpaused"
  502. default:
  503. infoMsg = "Restarted"
  504. }
  505. l.Infof("%v folder %v (%v)", infoMsg, to.Description(), to.Type)
  506. return nil
  507. }
  508. func (m *model) newFolder(cfg config.FolderConfiguration, cacheIgnoredFiles bool) error {
  509. // Creating the fileset can take a long time (metadata calculation) so
  510. // we do it outside of the lock.
  511. fset, err := db.NewFileSet(cfg.ID, m.db)
  512. if err != nil {
  513. return fmt.Errorf("adding %v: %w", cfg.Description(), err)
  514. }
  515. m.fmut.Lock()
  516. defer m.fmut.Unlock()
  517. m.addAndStartFolderLocked(cfg, fset, cacheIgnoredFiles)
  518. // Cluster configs might be received and processed before reaching this
  519. // point, i.e. before the folder is started. If that's the case, start
  520. // index senders here.
  521. // Care needs to be taken because we already hold fmut and the lock order
  522. // must be the same everywhere. As fmut is acquired first, this is fine.
  523. m.pmut.RLock()
  524. m.indexHandlers.Each(func(_ protocol.DeviceID, r *indexHandlerRegistry) error {
  525. runner, _ := m.folderRunners.Get(cfg.ID)
  526. r.RegisterFolderState(cfg, fset, runner)
  527. return nil
  528. })
  529. m.pmut.RUnlock()
  530. return nil
  531. }
  532. func (m *model) UsageReportingStats(report *contract.Report, version int, preview bool) {
  533. if version >= 3 {
  534. // Block stats
  535. blockStatsMut.Lock()
  536. for k, v := range blockStats {
  537. switch k {
  538. case "total":
  539. report.BlockStats.Total = v
  540. case "renamed":
  541. report.BlockStats.Renamed = v
  542. case "reused":
  543. report.BlockStats.Reused = v
  544. case "pulled":
  545. report.BlockStats.Pulled = v
  546. case "copyOrigin":
  547. report.BlockStats.CopyOrigin = v
  548. case "copyOriginShifted":
  549. report.BlockStats.CopyOriginShifted = v
  550. case "copyElsewhere":
  551. report.BlockStats.CopyElsewhere = v
  552. }
  553. // Reset counts, as these are incremental
  554. if !preview {
  555. blockStats[k] = 0
  556. }
  557. }
  558. blockStatsMut.Unlock()
  559. // Transport stats
  560. m.pmut.RLock()
  561. for _, conn := range m.connections {
  562. report.TransportStats[conn.Transport()]++
  563. }
  564. m.pmut.RUnlock()
  565. // Ignore stats
  566. var seenPrefix [3]bool
  567. for folder := range m.cfg.Folders() {
  568. lines, _, err := m.CurrentIgnores(folder)
  569. if err != nil {
  570. continue
  571. }
  572. report.IgnoreStats.Lines += len(lines)
  573. for _, line := range lines {
  574. // Allow prefixes to be specified in any order, but only once.
  575. for {
  576. if strings.HasPrefix(line, "!") && !seenPrefix[0] {
  577. seenPrefix[0] = true
  578. line = line[1:]
  579. report.IgnoreStats.Inverts++
  580. } else if strings.HasPrefix(line, "(?i)") && !seenPrefix[1] {
  581. seenPrefix[1] = true
  582. line = line[4:]
  583. report.IgnoreStats.Folded++
  584. } else if strings.HasPrefix(line, "(?d)") && !seenPrefix[2] {
  585. seenPrefix[2] = true
  586. line = line[4:]
  587. report.IgnoreStats.Deletable++
  588. } else {
  589. seenPrefix[0] = false
  590. seenPrefix[1] = false
  591. seenPrefix[2] = false
  592. break
  593. }
  594. }
  595. // Noops, remove
  596. line = strings.TrimSuffix(line, "**")
  597. line = strings.TrimPrefix(line, "**/")
  598. if strings.HasPrefix(line, "/") {
  599. report.IgnoreStats.Rooted++
  600. } else if strings.HasPrefix(line, "#include ") {
  601. report.IgnoreStats.Includes++
  602. if strings.Contains(line, "..") {
  603. report.IgnoreStats.EscapedIncludes++
  604. }
  605. }
  606. if strings.Contains(line, "**") {
  607. report.IgnoreStats.DoubleStars++
  608. // Remove not to trip up star checks.
  609. line = strings.ReplaceAll(line, "**", "")
  610. }
  611. if strings.Contains(line, "*") {
  612. report.IgnoreStats.Stars++
  613. }
  614. }
  615. }
  616. }
  617. }
  618. type ConnectionStats struct {
  619. protocol.Statistics // Total for primary + secondaries
  620. Connected bool `json:"connected"`
  621. Paused bool `json:"paused"`
  622. ClientVersion string `json:"clientVersion"`
  623. Address string `json:"address"` // mirror values from Primary, for compatibility with <1.24.0
  624. Type string `json:"type"` // mirror values from Primary, for compatibility with <1.24.0
  625. IsLocal bool `json:"isLocal"` // mirror values from Primary, for compatibility with <1.24.0
  626. Crypto string `json:"crypto"` // mirror values from Primary, for compatibility with <1.24.0
  627. Primary ConnectionInfo `json:"primary,omitempty"`
  628. Secondary []ConnectionInfo `json:"secondary,omitempty"`
  629. }
  630. type ConnectionInfo struct {
  631. protocol.Statistics
  632. Address string `json:"address"`
  633. Type string `json:"type"`
  634. IsLocal bool `json:"isLocal"`
  635. Crypto string `json:"crypto"`
  636. }
  637. // ConnectionStats returns a map with connection statistics for each device.
  638. func (m *model) ConnectionStats() map[string]interface{} {
  639. m.pmut.RLock()
  640. defer m.pmut.RUnlock()
  641. res := make(map[string]interface{})
  642. devs := m.cfg.Devices()
  643. conns := make(map[string]ConnectionStats, len(devs))
  644. for device, deviceCfg := range devs {
  645. if device == m.id {
  646. continue
  647. }
  648. hello := m.helloMessages[device]
  649. versionString := hello.ClientVersion
  650. if hello.ClientName != "syncthing" {
  651. versionString = hello.ClientName + " " + hello.ClientVersion
  652. }
  653. connIDs, ok := m.deviceConnIDs[device]
  654. cs := ConnectionStats{
  655. Connected: ok,
  656. Paused: deviceCfg.Paused,
  657. ClientVersion: strings.TrimSpace(versionString),
  658. }
  659. if ok {
  660. conn := m.connections[connIDs[0]]
  661. cs.Primary.Type = conn.Type()
  662. cs.Primary.IsLocal = conn.IsLocal()
  663. cs.Primary.Crypto = conn.Crypto()
  664. cs.Primary.Statistics = conn.Statistics()
  665. cs.Primary.Address = conn.RemoteAddr().String()
  666. cs.Type = cs.Primary.Type
  667. cs.IsLocal = cs.Primary.IsLocal
  668. cs.Crypto = cs.Primary.Crypto
  669. cs.Address = cs.Primary.Address
  670. cs.Statistics = cs.Primary.Statistics
  671. for _, connID := range connIDs[1:] {
  672. conn = m.connections[connID]
  673. sec := ConnectionInfo{
  674. Statistics: conn.Statistics(),
  675. Address: conn.RemoteAddr().String(),
  676. Type: conn.Type(),
  677. IsLocal: conn.IsLocal(),
  678. Crypto: conn.Crypto(),
  679. }
  680. if sec.At.After(cs.At) {
  681. cs.At = sec.At
  682. }
  683. if sec.StartedAt.Before(cs.StartedAt) {
  684. cs.StartedAt = sec.StartedAt
  685. }
  686. cs.InBytesTotal += sec.InBytesTotal
  687. cs.OutBytesTotal += sec.OutBytesTotal
  688. cs.Secondary = append(cs.Secondary, sec)
  689. }
  690. }
  691. conns[device.String()] = cs
  692. }
  693. res["connections"] = conns
  694. in, out := protocol.TotalInOut()
  695. res["total"] = map[string]interface{}{
  696. "at": time.Now().Truncate(time.Second),
  697. "inBytesTotal": in,
  698. "outBytesTotal": out,
  699. }
  700. return res
  701. }
  702. // DeviceStatistics returns statistics about each device
  703. func (m *model) DeviceStatistics() (map[protocol.DeviceID]stats.DeviceStatistics, error) {
  704. m.fmut.RLock()
  705. defer m.fmut.RUnlock()
  706. m.pmut.RLock()
  707. defer m.pmut.RUnlock()
  708. res := make(map[protocol.DeviceID]stats.DeviceStatistics, len(m.deviceStatRefs))
  709. for id, sr := range m.deviceStatRefs {
  710. stats, err := sr.GetStatistics()
  711. if err != nil {
  712. return nil, err
  713. }
  714. if len(m.deviceConnIDs[id]) > 0 {
  715. // If a device is currently connected, we can see them right
  716. // now.
  717. stats.LastSeen = time.Now().Truncate(time.Second)
  718. }
  719. res[id] = stats
  720. }
  721. return res, nil
  722. }
  723. // FolderStatistics returns statistics about each folder
  724. func (m *model) FolderStatistics() (map[string]stats.FolderStatistics, error) {
  725. res := make(map[string]stats.FolderStatistics)
  726. m.fmut.RLock()
  727. defer m.fmut.RUnlock()
  728. err := m.folderRunners.Each(func(id string, runner service) error {
  729. stats, err := runner.GetStatistics()
  730. if err != nil {
  731. return err
  732. }
  733. res[id] = stats
  734. return nil
  735. })
  736. if err != nil {
  737. return nil, err
  738. }
  739. return res, nil
  740. }
  741. type FolderCompletion struct {
  742. CompletionPct float64
  743. GlobalBytes int64
  744. NeedBytes int64
  745. GlobalItems int
  746. NeedItems int
  747. NeedDeletes int
  748. Sequence int64
  749. RemoteState remoteFolderState
  750. }
  751. func newFolderCompletion(global, need db.Counts, sequence int64, state remoteFolderState) FolderCompletion {
  752. comp := FolderCompletion{
  753. GlobalBytes: global.Bytes,
  754. NeedBytes: need.Bytes,
  755. GlobalItems: global.Files + global.Directories + global.Symlinks,
  756. NeedItems: need.Files + need.Directories + need.Symlinks,
  757. NeedDeletes: need.Deleted,
  758. Sequence: sequence,
  759. RemoteState: state,
  760. }
  761. comp.setComplectionPct()
  762. return comp
  763. }
  764. func (comp *FolderCompletion) add(other FolderCompletion) {
  765. comp.GlobalBytes += other.GlobalBytes
  766. comp.NeedBytes += other.NeedBytes
  767. comp.GlobalItems += other.GlobalItems
  768. comp.NeedItems += other.NeedItems
  769. comp.NeedDeletes += other.NeedDeletes
  770. comp.setComplectionPct()
  771. }
  772. func (comp *FolderCompletion) setComplectionPct() {
  773. if comp.GlobalBytes == 0 {
  774. comp.CompletionPct = 100
  775. } else {
  776. needRatio := float64(comp.NeedBytes) / float64(comp.GlobalBytes)
  777. comp.CompletionPct = 100 * (1 - needRatio)
  778. }
  779. // If the completion is 100% but there are deletes we need to handle,
  780. // drop it down a notch. Hack for consumers that look only at the
  781. // percentage (our own GUI does the same calculation as here on its own
  782. // and needs the same fixup).
  783. if comp.NeedBytes == 0 && comp.NeedDeletes > 0 {
  784. comp.CompletionPct = 95 // chosen by fair dice roll
  785. }
  786. }
  787. // Map returns the members as a map, e.g. used in api to serialize as JSON.
  788. func (comp *FolderCompletion) Map() map[string]interface{} {
  789. return map[string]interface{}{
  790. "completion": comp.CompletionPct,
  791. "globalBytes": comp.GlobalBytes,
  792. "needBytes": comp.NeedBytes,
  793. "globalItems": comp.GlobalItems,
  794. "needItems": comp.NeedItems,
  795. "needDeletes": comp.NeedDeletes,
  796. "sequence": comp.Sequence,
  797. "remoteState": comp.RemoteState,
  798. }
  799. }
  800. // Completion returns the completion status, in percent with some counters,
  801. // for the given device and folder. The device can be any known device ID
  802. // (including the local device) or explicitly protocol.LocalDeviceID. An
  803. // empty folder string means the aggregate of all folders shared with the
  804. // given device.
  805. func (m *model) Completion(device protocol.DeviceID, folder string) (FolderCompletion, error) {
  806. // The user specifically asked for our own device ID. Internally that is
  807. // known as protocol.LocalDeviceID so translate.
  808. if device == m.id {
  809. device = protocol.LocalDeviceID
  810. }
  811. if folder != "" {
  812. // We want completion for a specific folder.
  813. return m.folderCompletion(device, folder)
  814. }
  815. // We want completion for all (shared) folders as an aggregate.
  816. var comp FolderCompletion
  817. for _, fcfg := range m.cfg.FolderList() {
  818. if fcfg.Paused {
  819. continue
  820. }
  821. if device == protocol.LocalDeviceID || fcfg.SharedWith(device) {
  822. folderComp, err := m.folderCompletion(device, fcfg.ID)
  823. if errors.Is(err, ErrFolderPaused) {
  824. continue
  825. } else if err != nil {
  826. return FolderCompletion{}, err
  827. }
  828. comp.add(folderComp)
  829. }
  830. }
  831. return comp, nil
  832. }
  833. func (m *model) folderCompletion(device protocol.DeviceID, folder string) (FolderCompletion, error) {
  834. m.fmut.RLock()
  835. err := m.checkFolderRunningLocked(folder)
  836. rf := m.folderFiles[folder]
  837. m.fmut.RUnlock()
  838. if err != nil {
  839. return FolderCompletion{}, err
  840. }
  841. snap, err := rf.Snapshot()
  842. if err != nil {
  843. return FolderCompletion{}, err
  844. }
  845. defer snap.Release()
  846. m.pmut.RLock()
  847. state := m.remoteFolderStates[device][folder]
  848. downloaded := m.deviceDownloads[device].BytesDownloaded(folder)
  849. m.pmut.RUnlock()
  850. need := snap.NeedSize(device)
  851. need.Bytes -= downloaded
  852. // This might might be more than it really is, because some blocks can be of a smaller size.
  853. if need.Bytes < 0 {
  854. need.Bytes = 0
  855. }
  856. comp := newFolderCompletion(snap.GlobalSize(), need, snap.Sequence(device), state)
  857. l.Debugf("%v Completion(%s, %q): %v", m, device, folder, comp.Map())
  858. return comp, nil
  859. }
  860. // DBSnapshot returns a snapshot of the database content relevant to the given folder.
  861. func (m *model) DBSnapshot(folder string) (*db.Snapshot, error) {
  862. m.fmut.RLock()
  863. err := m.checkFolderRunningLocked(folder)
  864. rf := m.folderFiles[folder]
  865. m.fmut.RUnlock()
  866. if err != nil {
  867. return nil, err
  868. }
  869. return rf.Snapshot()
  870. }
  871. func (m *model) FolderProgressBytesCompleted(folder string) int64 {
  872. return m.progressEmitter.BytesCompleted(folder)
  873. }
  874. // NeedFolderFiles returns paginated list of currently needed files in
  875. // progress, queued, and to be queued on next puller iteration.
  876. func (m *model) NeedFolderFiles(folder string, page, perpage int) ([]db.FileInfoTruncated, []db.FileInfoTruncated, []db.FileInfoTruncated, error) {
  877. m.fmut.RLock()
  878. rf, rfOk := m.folderFiles[folder]
  879. runner, runnerOk := m.folderRunners.Get(folder)
  880. cfg := m.folderCfgs[folder]
  881. m.fmut.RUnlock()
  882. if !rfOk {
  883. return nil, nil, nil, ErrFolderMissing
  884. }
  885. snap, err := rf.Snapshot()
  886. if err != nil {
  887. return nil, nil, nil, err
  888. }
  889. defer snap.Release()
  890. var progress, queued, rest []db.FileInfoTruncated
  891. var seen map[string]struct{}
  892. p := newPager(page, perpage)
  893. if runnerOk {
  894. progressNames, queuedNames, skipped := runner.Jobs(page, perpage)
  895. progress = make([]db.FileInfoTruncated, len(progressNames))
  896. queued = make([]db.FileInfoTruncated, len(queuedNames))
  897. seen = make(map[string]struct{}, len(progressNames)+len(queuedNames))
  898. for i, name := range progressNames {
  899. if f, ok := snap.GetGlobalTruncated(name); ok {
  900. progress[i] = f
  901. seen[name] = struct{}{}
  902. }
  903. }
  904. for i, name := range queuedNames {
  905. if f, ok := snap.GetGlobalTruncated(name); ok {
  906. queued[i] = f
  907. seen[name] = struct{}{}
  908. }
  909. }
  910. p.get -= len(seen)
  911. if p.get == 0 {
  912. return progress, queued, nil, nil
  913. }
  914. p.toSkip -= skipped
  915. }
  916. rest = make([]db.FileInfoTruncated, 0, perpage)
  917. snap.WithNeedTruncated(protocol.LocalDeviceID, func(f protocol.FileIntf) bool {
  918. if cfg.IgnoreDelete && f.IsDeleted() {
  919. return true
  920. }
  921. if p.skip() {
  922. return true
  923. }
  924. ft := f.(db.FileInfoTruncated)
  925. if _, ok := seen[ft.Name]; !ok {
  926. rest = append(rest, ft)
  927. p.get--
  928. }
  929. return p.get > 0
  930. })
  931. return progress, queued, rest, nil
  932. }
  933. // RemoteNeedFolderFiles returns paginated list of currently needed files for a
  934. // remote device to become synced with a folder.
  935. func (m *model) RemoteNeedFolderFiles(folder string, device protocol.DeviceID, page, perpage int) ([]db.FileInfoTruncated, error) {
  936. m.fmut.RLock()
  937. rf, ok := m.folderFiles[folder]
  938. m.fmut.RUnlock()
  939. if !ok {
  940. return nil, ErrFolderMissing
  941. }
  942. snap, err := rf.Snapshot()
  943. if err != nil {
  944. return nil, err
  945. }
  946. defer snap.Release()
  947. files := make([]db.FileInfoTruncated, 0, perpage)
  948. p := newPager(page, perpage)
  949. snap.WithNeedTruncated(device, func(f protocol.FileIntf) bool {
  950. if p.skip() {
  951. return true
  952. }
  953. files = append(files, f.(db.FileInfoTruncated))
  954. return !p.done()
  955. })
  956. return files, nil
  957. }
  958. func (m *model) LocalChangedFolderFiles(folder string, page, perpage int) ([]db.FileInfoTruncated, error) {
  959. m.fmut.RLock()
  960. rf, ok := m.folderFiles[folder]
  961. m.fmut.RUnlock()
  962. if !ok {
  963. return nil, ErrFolderMissing
  964. }
  965. snap, err := rf.Snapshot()
  966. if err != nil {
  967. return nil, err
  968. }
  969. defer snap.Release()
  970. if snap.ReceiveOnlyChangedSize().TotalItems() == 0 {
  971. return nil, nil
  972. }
  973. p := newPager(page, perpage)
  974. files := make([]db.FileInfoTruncated, 0, perpage)
  975. snap.WithHaveTruncated(protocol.LocalDeviceID, func(f protocol.FileIntf) bool {
  976. if !f.IsReceiveOnlyChanged() {
  977. return true
  978. }
  979. if p.skip() {
  980. return true
  981. }
  982. ft := f.(db.FileInfoTruncated)
  983. files = append(files, ft)
  984. return !p.done()
  985. })
  986. return files, nil
  987. }
  988. type pager struct {
  989. toSkip, get int
  990. }
  991. func newPager(page, perpage int) *pager {
  992. return &pager{
  993. toSkip: (page - 1) * perpage,
  994. get: perpage,
  995. }
  996. }
  997. func (p *pager) skip() bool {
  998. if p.toSkip == 0 {
  999. return false
  1000. }
  1001. p.toSkip--
  1002. return true
  1003. }
  1004. func (p *pager) done() bool {
  1005. if p.get > 0 {
  1006. p.get--
  1007. }
  1008. return p.get == 0
  1009. }
  1010. // Index is called when a new device is connected and we receive their full index.
  1011. // Implements the protocol.Model interface.
  1012. func (m *model) Index(conn protocol.Connection, folder string, fs []protocol.FileInfo) error {
  1013. return m.handleIndex(conn, folder, fs, false)
  1014. }
  1015. // IndexUpdate is called for incremental updates to connected devices' indexes.
  1016. // Implements the protocol.Model interface.
  1017. func (m *model) IndexUpdate(conn protocol.Connection, folder string, fs []protocol.FileInfo) error {
  1018. return m.handleIndex(conn, folder, fs, true)
  1019. }
  1020. func (m *model) handleIndex(conn protocol.Connection, folder string, fs []protocol.FileInfo, update bool) error {
  1021. op := "Index"
  1022. if update {
  1023. op += " update"
  1024. }
  1025. deviceID := conn.DeviceID()
  1026. l.Debugf("%v (in): %s / %q: %d files", op, deviceID, folder, len(fs))
  1027. if cfg, ok := m.cfg.Folder(folder); !ok || !cfg.SharedWith(deviceID) {
  1028. l.Warnf("%v for unexpected folder ID %q sent from device %q; ensure that the folder exists and that this device is selected under \"Share With\" in the folder configuration.", op, folder, deviceID)
  1029. return fmt.Errorf("%s: %w", folder, ErrFolderMissing)
  1030. } else if cfg.Paused {
  1031. l.Debugf("%v for paused folder (ID %q) sent from device %q.", op, folder, deviceID)
  1032. return fmt.Errorf("%s: %w", folder, ErrFolderPaused)
  1033. }
  1034. m.pmut.RLock()
  1035. indexHandler, ok := m.getIndexHandlerPRLocked(conn)
  1036. m.pmut.RUnlock()
  1037. if !ok {
  1038. // This should be impossible, as an index handler is registered when
  1039. // we send a cluster config, and that is what triggers index
  1040. // sending.
  1041. m.evLogger.Log(events.Failure, "index sender does not exist for connection on which indexes were received")
  1042. l.Debugf("%v for folder (ID %q) sent from device %q: missing index handler", op, folder, deviceID)
  1043. return fmt.Errorf("%s: %w", folder, ErrFolderNotRunning)
  1044. }
  1045. return indexHandler.ReceiveIndex(folder, fs, update, op)
  1046. }
  1047. type clusterConfigDeviceInfo struct {
  1048. local, remote protocol.Device
  1049. }
  1050. type ClusterConfigReceivedEventData struct {
  1051. Device protocol.DeviceID `json:"device"`
  1052. }
  1053. func (m *model) ClusterConfig(conn protocol.Connection, cm protocol.ClusterConfig) error {
  1054. deviceID := conn.DeviceID()
  1055. if cm.Secondary {
  1056. // No handling of secondary connection ClusterConfigs; they merely
  1057. // indicate the connection is ready to start.
  1058. l.Debugf("Skipping secondary ClusterConfig from %v at %s", deviceID.Short(), conn)
  1059. return nil
  1060. }
  1061. // Check the peer device's announced folders against our own. Emits events
  1062. // for folders that we don't expect (unknown or not shared).
  1063. // Also, collect a list of folders we do share, and if he's interested in
  1064. // temporary indexes, subscribe the connection.
  1065. l.Debugf("Handling ClusterConfig from %v at %s", deviceID.Short(), conn)
  1066. indexHandlerRegistry := m.ensureIndexHandler(conn)
  1067. deviceCfg, ok := m.cfg.Device(deviceID)
  1068. if !ok {
  1069. l.Debugf("Device %s disappeared from config while processing cluster-config", deviceID.Short())
  1070. return errDeviceUnknown
  1071. }
  1072. // Assemble the device information from the connected device about
  1073. // themselves and us for all folders.
  1074. ccDeviceInfos := make(map[string]*clusterConfigDeviceInfo, len(cm.Folders))
  1075. for _, folder := range cm.Folders {
  1076. info := &clusterConfigDeviceInfo{}
  1077. for _, dev := range folder.Devices {
  1078. if dev.ID == m.id {
  1079. info.local = dev
  1080. } else if dev.ID == deviceID {
  1081. info.remote = dev
  1082. }
  1083. if info.local.ID != protocol.EmptyDeviceID && info.remote.ID != protocol.EmptyDeviceID {
  1084. break
  1085. }
  1086. }
  1087. if info.remote.ID == protocol.EmptyDeviceID {
  1088. l.Infof("Device %v sent cluster-config without the device info for the remote on folder %v", deviceID.Short(), folder.Description())
  1089. return errMissingRemoteInClusterConfig
  1090. }
  1091. if info.local.ID == protocol.EmptyDeviceID {
  1092. l.Infof("Device %v sent cluster-config without the device info for us locally on folder %v", deviceID.Short(), folder.Description())
  1093. return errMissingLocalInClusterConfig
  1094. }
  1095. ccDeviceInfos[folder.ID] = info
  1096. }
  1097. for _, info := range ccDeviceInfos {
  1098. if deviceCfg.Introducer && info.local.Introducer {
  1099. l.Warnf("Remote %v is an introducer to us, and we are to them - only one should be introducer to the other, see https://docs.syncthing.net/users/introducer.html", deviceCfg.Description())
  1100. }
  1101. break
  1102. }
  1103. // Needs to happen outside of the fmut, as can cause CommitConfiguration
  1104. if deviceCfg.AutoAcceptFolders {
  1105. w, _ := m.cfg.Modify(func(cfg *config.Configuration) {
  1106. changedFcfg := make(map[string]config.FolderConfiguration)
  1107. haveFcfg := cfg.FolderMap()
  1108. for _, folder := range cm.Folders {
  1109. from, ok := haveFcfg[folder.ID]
  1110. if to, changed := m.handleAutoAccepts(deviceID, folder, ccDeviceInfos[folder.ID], from, ok, cfg.Defaults.Folder); changed {
  1111. changedFcfg[folder.ID] = to
  1112. }
  1113. }
  1114. if len(changedFcfg) == 0 {
  1115. return
  1116. }
  1117. for i := range cfg.Folders {
  1118. if fcfg, ok := changedFcfg[cfg.Folders[i].ID]; ok {
  1119. cfg.Folders[i] = fcfg
  1120. delete(changedFcfg, cfg.Folders[i].ID)
  1121. }
  1122. }
  1123. for _, fcfg := range changedFcfg {
  1124. cfg.Folders = append(cfg.Folders, fcfg)
  1125. }
  1126. })
  1127. // Need to wait for the waiter, as this calls CommitConfiguration,
  1128. // which sets up the folder and as we return from this call,
  1129. // ClusterConfig starts poking at m.folderFiles and other things
  1130. // that might not exist until the config is committed.
  1131. w.Wait()
  1132. }
  1133. tempIndexFolders, states, err := m.ccHandleFolders(cm.Folders, deviceCfg, ccDeviceInfos, indexHandlerRegistry)
  1134. if err != nil {
  1135. return err
  1136. }
  1137. m.pmut.Lock()
  1138. m.remoteFolderStates[deviceID] = states
  1139. m.pmut.Unlock()
  1140. m.evLogger.Log(events.ClusterConfigReceived, ClusterConfigReceivedEventData{
  1141. Device: deviceID,
  1142. })
  1143. if len(tempIndexFolders) > 0 {
  1144. var connOK bool
  1145. var conn protocol.Connection
  1146. m.pmut.RLock()
  1147. if connIDs, connIDOK := m.deviceConnIDs[deviceID]; connIDOK {
  1148. conn, connOK = m.connections[connIDs[0]]
  1149. }
  1150. m.pmut.RUnlock()
  1151. // In case we've got ClusterConfig, and the connection disappeared
  1152. // from infront of our nose.
  1153. if connOK {
  1154. m.progressEmitter.temporaryIndexSubscribe(conn, tempIndexFolders)
  1155. }
  1156. }
  1157. if deviceCfg.Introducer {
  1158. m.cfg.Modify(func(cfg *config.Configuration) {
  1159. folders, devices, foldersDevices, introduced := m.handleIntroductions(deviceCfg, cm, cfg.FolderMap(), cfg.DeviceMap())
  1160. folders, devices, deintroduced := m.handleDeintroductions(deviceCfg, foldersDevices, folders, devices)
  1161. if !introduced && !deintroduced {
  1162. return
  1163. }
  1164. cfg.Folders = make([]config.FolderConfiguration, 0, len(folders))
  1165. for _, fcfg := range folders {
  1166. cfg.Folders = append(cfg.Folders, fcfg)
  1167. }
  1168. cfg.Devices = make([]config.DeviceConfiguration, 0, len(devices))
  1169. for _, dcfg := range devices {
  1170. cfg.Devices = append(cfg.Devices, dcfg)
  1171. }
  1172. })
  1173. }
  1174. return nil
  1175. }
  1176. func (m *model) ensureIndexHandler(conn protocol.Connection) *indexHandlerRegistry {
  1177. deviceID := conn.DeviceID()
  1178. connID := conn.ConnectionID()
  1179. // We must acquire fmut first when acquiring both locks.
  1180. m.fmut.RLock()
  1181. defer m.fmut.RUnlock()
  1182. m.pmut.Lock()
  1183. defer m.pmut.Unlock()
  1184. indexHandlerRegistry, ok := m.indexHandlers.Get(deviceID)
  1185. if ok && indexHandlerRegistry.conn.ConnectionID() == connID {
  1186. // This is an existing and proper index handler for this connection.
  1187. return indexHandlerRegistry
  1188. }
  1189. if ok {
  1190. // A handler exists, but it's for another connection than the one we
  1191. // now got a ClusterConfig on. This should be unusual as it means
  1192. // the other side has decided to start using a new primary
  1193. // connection but we haven't seen it close yet. Ideally it will
  1194. // close shortly by itself...
  1195. l.Infof("Abandoning old index handler for %s (%s) in favour of %s", deviceID.Short(), indexHandlerRegistry.conn.ConnectionID(), connID)
  1196. m.indexHandlers.RemoveAndWait(deviceID, 0)
  1197. }
  1198. // Create a new index handler for this device.
  1199. indexHandlerRegistry = newIndexHandlerRegistry(conn, m.deviceDownloads[deviceID], m.evLogger)
  1200. for id, fcfg := range m.folderCfgs {
  1201. l.Debugln("Registering folder", id, "for", deviceID.Short())
  1202. runner, _ := m.folderRunners.Get(id)
  1203. indexHandlerRegistry.RegisterFolderState(fcfg, m.folderFiles[id], runner)
  1204. }
  1205. m.indexHandlers.Add(deviceID, indexHandlerRegistry)
  1206. return indexHandlerRegistry
  1207. }
  1208. func (m *model) getIndexHandlerPRLocked(conn protocol.Connection) (*indexHandlerRegistry, bool) {
  1209. // Reads from index handlers, which requires pmut to be read locked
  1210. deviceID := conn.DeviceID()
  1211. connID := conn.ConnectionID()
  1212. indexHandlerRegistry, ok := m.indexHandlers.Get(deviceID)
  1213. if ok && indexHandlerRegistry.conn.ConnectionID() == connID {
  1214. // This is an existing and proper index handler for this connection.
  1215. return indexHandlerRegistry, true
  1216. }
  1217. // There is no index handler, or it's not registered for this connection.
  1218. return nil, false
  1219. }
  1220. func (m *model) ccHandleFolders(folders []protocol.Folder, deviceCfg config.DeviceConfiguration, ccDeviceInfos map[string]*clusterConfigDeviceInfo, indexHandlers *indexHandlerRegistry) ([]string, map[string]remoteFolderState, error) {
  1221. var folderDevice config.FolderDeviceConfiguration
  1222. tempIndexFolders := make([]string, 0, len(folders))
  1223. seenFolders := make(map[string]remoteFolderState, len(folders))
  1224. updatedPending := make([]updatedPendingFolder, 0, len(folders))
  1225. deviceID := deviceCfg.DeviceID
  1226. expiredPending, err := m.db.PendingFoldersForDevice(deviceID)
  1227. if err != nil {
  1228. l.Infof("Could not get pending folders for cleanup: %v", err)
  1229. }
  1230. of := db.ObservedFolder{Time: time.Now().Truncate(time.Second)}
  1231. for _, folder := range folders {
  1232. seenFolders[folder.ID] = remoteFolderValid
  1233. cfg, ok := m.cfg.Folder(folder.ID)
  1234. if ok {
  1235. folderDevice, ok = cfg.Device(deviceID)
  1236. }
  1237. if !ok {
  1238. indexHandlers.Remove(folder.ID)
  1239. if deviceCfg.IgnoredFolder(folder.ID) {
  1240. l.Infof("Ignoring folder %s from device %s since we are configured to", folder.Description(), deviceID)
  1241. continue
  1242. }
  1243. delete(expiredPending, folder.ID)
  1244. of.Label = folder.Label
  1245. of.ReceiveEncrypted = len(ccDeviceInfos[folder.ID].local.EncryptionPasswordToken) > 0
  1246. of.RemoteEncrypted = len(ccDeviceInfos[folder.ID].remote.EncryptionPasswordToken) > 0
  1247. if err := m.db.AddOrUpdatePendingFolder(folder.ID, of, deviceID); err != nil {
  1248. l.Warnf("Failed to persist pending folder entry to database: %v", err)
  1249. }
  1250. if !folder.Paused {
  1251. indexHandlers.AddIndexInfo(folder.ID, ccDeviceInfos[folder.ID])
  1252. }
  1253. updatedPending = append(updatedPending, updatedPendingFolder{
  1254. FolderID: folder.ID,
  1255. FolderLabel: folder.Label,
  1256. DeviceID: deviceID,
  1257. ReceiveEncrypted: of.ReceiveEncrypted,
  1258. RemoteEncrypted: of.RemoteEncrypted,
  1259. })
  1260. // DEPRECATED: Only for backwards compatibility, should be removed.
  1261. m.evLogger.Log(events.FolderRejected, map[string]string{
  1262. "folder": folder.ID,
  1263. "folderLabel": folder.Label,
  1264. "device": deviceID.String(),
  1265. })
  1266. l.Infof("Unexpected folder %s sent from device %q; ensure that the folder exists and that this device is selected under \"Share With\" in the folder configuration.", folder.Description(), deviceID)
  1267. continue
  1268. }
  1269. if folder.Paused {
  1270. indexHandlers.Remove(folder.ID)
  1271. seenFolders[cfg.ID] = remoteFolderPaused
  1272. continue
  1273. }
  1274. if cfg.Paused {
  1275. indexHandlers.AddIndexInfo(folder.ID, ccDeviceInfos[folder.ID])
  1276. continue
  1277. }
  1278. if err := m.ccCheckEncryption(cfg, folderDevice, ccDeviceInfos[folder.ID], deviceCfg.Untrusted); err != nil {
  1279. sameError := false
  1280. m.fmut.Lock()
  1281. if devs, ok := m.folderEncryptionFailures[folder.ID]; ok {
  1282. sameError = devs[deviceID] == err
  1283. } else {
  1284. m.folderEncryptionFailures[folder.ID] = make(map[protocol.DeviceID]error)
  1285. }
  1286. m.folderEncryptionFailures[folder.ID][deviceID] = err
  1287. m.fmut.Unlock()
  1288. msg := fmt.Sprintf("Failure checking encryption consistency with device %v for folder %v: %v", deviceID, cfg.Description(), err)
  1289. if sameError {
  1290. l.Debugln(msg)
  1291. } else {
  1292. if rerr, ok := err.(*redactedError); ok {
  1293. err = rerr.redacted
  1294. }
  1295. m.evLogger.Log(events.Failure, err.Error())
  1296. l.Warnln(msg)
  1297. }
  1298. return tempIndexFolders, seenFolders, err
  1299. }
  1300. m.fmut.Lock()
  1301. if devErrs, ok := m.folderEncryptionFailures[folder.ID]; ok {
  1302. if len(devErrs) == 1 {
  1303. delete(m.folderEncryptionFailures, folder.ID)
  1304. } else {
  1305. delete(m.folderEncryptionFailures[folder.ID], deviceID)
  1306. }
  1307. }
  1308. m.fmut.Unlock()
  1309. // Handle indexes
  1310. if !folder.DisableTempIndexes {
  1311. tempIndexFolders = append(tempIndexFolders, folder.ID)
  1312. }
  1313. indexHandlers.AddIndexInfo(folder.ID, ccDeviceInfos[folder.ID])
  1314. }
  1315. indexHandlers.RemoveAllExcept(seenFolders)
  1316. // Explicitly mark folders we offer, but the remote has not accepted
  1317. for folderID, cfg := range m.cfg.Folders() {
  1318. if _, seen := seenFolders[folderID]; !seen && cfg.SharedWith(deviceID) {
  1319. l.Debugf("Remote device %v has not accepted sharing folder %s", deviceID.Short(), cfg.Description())
  1320. seenFolders[folderID] = remoteFolderNotSharing
  1321. }
  1322. }
  1323. expiredPendingList := make([]map[string]string, 0, len(expiredPending))
  1324. for folder := range expiredPending {
  1325. if err = m.db.RemovePendingFolderForDevice(folder, deviceID); err != nil {
  1326. msg := "Failed to remove pending folder-device entry"
  1327. l.Warnf("%v (%v, %v): %v", msg, folder, deviceID, err)
  1328. m.evLogger.Log(events.Failure, msg)
  1329. continue
  1330. }
  1331. expiredPendingList = append(expiredPendingList, map[string]string{
  1332. "folderID": folder,
  1333. "deviceID": deviceID.String(),
  1334. })
  1335. }
  1336. if len(updatedPending) > 0 || len(expiredPendingList) > 0 {
  1337. m.evLogger.Log(events.PendingFoldersChanged, map[string]interface{}{
  1338. "added": updatedPending,
  1339. "removed": expiredPendingList,
  1340. })
  1341. }
  1342. return tempIndexFolders, seenFolders, nil
  1343. }
  1344. func (m *model) ccCheckEncryption(fcfg config.FolderConfiguration, folderDevice config.FolderDeviceConfiguration, ccDeviceInfos *clusterConfigDeviceInfo, deviceUntrusted bool) error {
  1345. hasTokenRemote := len(ccDeviceInfos.remote.EncryptionPasswordToken) > 0
  1346. hasTokenLocal := len(ccDeviceInfos.local.EncryptionPasswordToken) > 0
  1347. isEncryptedRemote := folderDevice.EncryptionPassword != ""
  1348. isEncryptedLocal := fcfg.Type == config.FolderTypeReceiveEncrypted
  1349. if !isEncryptedRemote && !isEncryptedLocal && deviceUntrusted {
  1350. return errEncryptionNotEncryptedUntrusted
  1351. }
  1352. if !(hasTokenRemote || hasTokenLocal || isEncryptedRemote || isEncryptedLocal) {
  1353. // No one cares about encryption here
  1354. return nil
  1355. }
  1356. if isEncryptedRemote && isEncryptedLocal {
  1357. // Should never happen, but config racyness and be safe.
  1358. return errEncryptionInvConfigLocal
  1359. }
  1360. if hasTokenRemote && hasTokenLocal {
  1361. return errEncryptionInvConfigRemote
  1362. }
  1363. if !(hasTokenRemote || hasTokenLocal) {
  1364. if isEncryptedRemote {
  1365. return errEncryptionPlainForRemoteEncrypted
  1366. } else {
  1367. return errEncryptionPlainForReceiveEncrypted
  1368. }
  1369. }
  1370. if !(isEncryptedRemote || isEncryptedLocal) {
  1371. return errEncryptionNotEncryptedLocal
  1372. }
  1373. if isEncryptedRemote {
  1374. passwordToken := protocol.PasswordToken(m.keyGen, fcfg.ID, folderDevice.EncryptionPassword)
  1375. match := false
  1376. if hasTokenLocal {
  1377. match = bytes.Equal(passwordToken, ccDeviceInfos.local.EncryptionPasswordToken)
  1378. } else {
  1379. // hasTokenRemote == true
  1380. match = bytes.Equal(passwordToken, ccDeviceInfos.remote.EncryptionPasswordToken)
  1381. }
  1382. if !match {
  1383. return errEncryptionPassword
  1384. }
  1385. return nil
  1386. }
  1387. // isEncryptedLocal == true
  1388. var ccToken []byte
  1389. if hasTokenLocal {
  1390. ccToken = ccDeviceInfos.local.EncryptionPasswordToken
  1391. } else {
  1392. // hasTokenRemote == true
  1393. ccToken = ccDeviceInfos.remote.EncryptionPasswordToken
  1394. }
  1395. m.fmut.RLock()
  1396. token, ok := m.folderEncryptionPasswordTokens[fcfg.ID]
  1397. m.fmut.RUnlock()
  1398. if !ok {
  1399. var err error
  1400. token, err = readEncryptionToken(fcfg)
  1401. if err != nil && !fs.IsNotExist(err) {
  1402. if rerr, ok := redactPathError(err); ok {
  1403. return rerr
  1404. }
  1405. return &redactedError{
  1406. error: err,
  1407. redacted: errEncryptionTokenRead,
  1408. }
  1409. }
  1410. if err == nil {
  1411. m.fmut.Lock()
  1412. m.folderEncryptionPasswordTokens[fcfg.ID] = token
  1413. m.fmut.Unlock()
  1414. } else {
  1415. if err := writeEncryptionToken(ccToken, fcfg); err != nil {
  1416. if rerr, ok := redactPathError(err); ok {
  1417. return rerr
  1418. } else {
  1419. return &redactedError{
  1420. error: err,
  1421. redacted: errEncryptionTokenWrite,
  1422. }
  1423. }
  1424. }
  1425. m.fmut.Lock()
  1426. m.folderEncryptionPasswordTokens[fcfg.ID] = ccToken
  1427. m.fmut.Unlock()
  1428. // We can only announce ourselves once we have the token,
  1429. // thus we need to resend CCs now that we have it.
  1430. m.sendClusterConfig(fcfg.DeviceIDs())
  1431. return nil
  1432. }
  1433. }
  1434. if !bytes.Equal(token, ccToken) {
  1435. return errEncryptionPassword
  1436. }
  1437. return nil
  1438. }
  1439. func (m *model) sendClusterConfig(ids []protocol.DeviceID) {
  1440. if len(ids) == 0 {
  1441. return
  1442. }
  1443. ccConns := make([]protocol.Connection, 0, len(ids))
  1444. m.pmut.RLock()
  1445. for _, id := range ids {
  1446. if connIDs, ok := m.deviceConnIDs[id]; ok {
  1447. ccConns = append(ccConns, m.connections[connIDs[0]])
  1448. }
  1449. }
  1450. m.pmut.RUnlock()
  1451. // Generating cluster-configs acquires fmut -> must happen outside of pmut.
  1452. for _, conn := range ccConns {
  1453. cm, passwords := m.generateClusterConfig(conn.DeviceID())
  1454. conn.SetFolderPasswords(passwords)
  1455. go conn.ClusterConfig(cm)
  1456. }
  1457. }
  1458. // handleIntroductions handles adding devices/folders that are shared by an introducer device
  1459. func (m *model) handleIntroductions(introducerCfg config.DeviceConfiguration, cm protocol.ClusterConfig, folders map[string]config.FolderConfiguration, devices map[protocol.DeviceID]config.DeviceConfiguration) (map[string]config.FolderConfiguration, map[protocol.DeviceID]config.DeviceConfiguration, folderDeviceSet, bool) {
  1460. changed := false
  1461. foldersDevices := make(folderDeviceSet)
  1462. for _, folder := range cm.Folders {
  1463. // Adds devices which we do not have, but the introducer has
  1464. // for the folders that we have in common. Also, shares folders
  1465. // with devices that we have in common, yet are currently not sharing
  1466. // the folder.
  1467. fcfg, ok := folders[folder.ID]
  1468. if !ok {
  1469. // Don't have this folder, carry on.
  1470. continue
  1471. }
  1472. folderChanged := false
  1473. for _, device := range folder.Devices {
  1474. // No need to share with self.
  1475. if device.ID == m.id {
  1476. continue
  1477. }
  1478. foldersDevices.set(device.ID, folder.ID)
  1479. if _, ok := devices[device.ID]; !ok {
  1480. // The device is currently unknown. Add it to the config.
  1481. devices[device.ID] = m.introduceDevice(device, introducerCfg)
  1482. } else if fcfg.SharedWith(device.ID) {
  1483. // We already share the folder with this device, so
  1484. // nothing to do.
  1485. continue
  1486. }
  1487. if fcfg.Type != config.FolderTypeReceiveEncrypted && device.EncryptionPasswordToken != nil {
  1488. l.Infof("Cannot share folder %s with %v because the introducer %v encrypts data, which requires a password", folder.Description(), device.ID, introducerCfg.DeviceID)
  1489. continue
  1490. }
  1491. // We don't yet share this folder with this device. Add the device
  1492. // to sharing list of the folder.
  1493. l.Infof("Sharing folder %s with %v (vouched for by introducer %v)", folder.Description(), device.ID, introducerCfg.DeviceID)
  1494. fcfg.Devices = append(fcfg.Devices, config.FolderDeviceConfiguration{
  1495. DeviceID: device.ID,
  1496. IntroducedBy: introducerCfg.DeviceID,
  1497. })
  1498. folderChanged = true
  1499. }
  1500. if folderChanged {
  1501. folders[fcfg.ID] = fcfg
  1502. changed = true
  1503. }
  1504. }
  1505. return folders, devices, foldersDevices, changed
  1506. }
  1507. // handleDeintroductions handles removals of devices/shares that are removed by an introducer device
  1508. func (*model) handleDeintroductions(introducerCfg config.DeviceConfiguration, foldersDevices folderDeviceSet, folders map[string]config.FolderConfiguration, devices map[protocol.DeviceID]config.DeviceConfiguration) (map[string]config.FolderConfiguration, map[protocol.DeviceID]config.DeviceConfiguration, bool) {
  1509. if introducerCfg.SkipIntroductionRemovals {
  1510. return folders, devices, false
  1511. }
  1512. changed := false
  1513. devicesNotIntroduced := make(map[protocol.DeviceID]struct{})
  1514. // Check if we should unshare some folders, if the introducer has unshared them.
  1515. for folderID, folderCfg := range folders {
  1516. for k := 0; k < len(folderCfg.Devices); k++ {
  1517. if folderCfg.Devices[k].IntroducedBy != introducerCfg.DeviceID {
  1518. devicesNotIntroduced[folderCfg.Devices[k].DeviceID] = struct{}{}
  1519. continue
  1520. }
  1521. if !foldersDevices.has(folderCfg.Devices[k].DeviceID, folderCfg.ID) {
  1522. // We could not find that folder shared on the
  1523. // introducer with the device that was introduced to us.
  1524. // We should follow and unshare as well.
  1525. l.Infof("Unsharing folder %s with %v as introducer %v no longer shares the folder with that device", folderCfg.Description(), folderCfg.Devices[k].DeviceID, folderCfg.Devices[k].IntroducedBy)
  1526. folderCfg.Devices = append(folderCfg.Devices[:k], folderCfg.Devices[k+1:]...)
  1527. folders[folderID] = folderCfg
  1528. k--
  1529. changed = true
  1530. }
  1531. }
  1532. }
  1533. // Check if we should remove some devices, if the introducer no longer
  1534. // shares any folder with them. Yet do not remove if we share other
  1535. // folders that haven't been introduced by the introducer.
  1536. for deviceID, device := range devices {
  1537. if device.IntroducedBy == introducerCfg.DeviceID {
  1538. if !foldersDevices.hasDevice(deviceID) {
  1539. if _, ok := devicesNotIntroduced[deviceID]; !ok {
  1540. // The introducer no longer shares any folder with the
  1541. // device, remove the device.
  1542. l.Infof("Removing device %v as introducer %v no longer shares any folders with that device", deviceID, device.IntroducedBy)
  1543. changed = true
  1544. delete(devices, deviceID)
  1545. continue
  1546. }
  1547. l.Infof("Would have removed %v as %v no longer shares any folders, yet there are other folders that are shared with this device that haven't been introduced by this introducer.", deviceID, device.IntroducedBy)
  1548. }
  1549. }
  1550. }
  1551. return folders, devices, changed
  1552. }
  1553. // handleAutoAccepts handles adding and sharing folders for devices that have
  1554. // AutoAcceptFolders set to true.
  1555. func (m *model) handleAutoAccepts(deviceID protocol.DeviceID, folder protocol.Folder, ccDeviceInfos *clusterConfigDeviceInfo, cfg config.FolderConfiguration, haveCfg bool, defaultFolderCfg config.FolderConfiguration) (config.FolderConfiguration, bool) {
  1556. if !haveCfg {
  1557. defaultPathFs := fs.NewFilesystem(defaultFolderCfg.FilesystemType, defaultFolderCfg.Path)
  1558. var pathAlternatives []string
  1559. if alt := fs.SanitizePath(folder.Label); alt != "" {
  1560. pathAlternatives = append(pathAlternatives, alt)
  1561. }
  1562. if alt := fs.SanitizePath(folder.ID); alt != "" {
  1563. pathAlternatives = append(pathAlternatives, alt)
  1564. }
  1565. if len(pathAlternatives) == 0 {
  1566. l.Infof("Failed to auto-accept folder %s from %s due to lack of path alternatives", folder.Description(), deviceID)
  1567. return config.FolderConfiguration{}, false
  1568. }
  1569. for _, path := range pathAlternatives {
  1570. // Make sure the folder path doesn't already exist.
  1571. if _, err := defaultPathFs.Lstat(path); !fs.IsNotExist(err) {
  1572. continue
  1573. }
  1574. // Attempt to create it to make sure it does, now.
  1575. fullPath := filepath.Join(defaultFolderCfg.Path, path)
  1576. if err := defaultPathFs.MkdirAll(path, 0o700); err != nil {
  1577. l.Warnf("Failed to create path for auto-accepted folder %s at path %s: %v", folder.Description(), fullPath, err)
  1578. continue
  1579. }
  1580. fcfg := newFolderConfiguration(m.cfg, folder.ID, folder.Label, defaultFolderCfg.FilesystemType, fullPath)
  1581. fcfg.Devices = append(fcfg.Devices, config.FolderDeviceConfiguration{
  1582. DeviceID: deviceID,
  1583. })
  1584. if len(ccDeviceInfos.remote.EncryptionPasswordToken) > 0 || len(ccDeviceInfos.local.EncryptionPasswordToken) > 0 {
  1585. fcfg.Type = config.FolderTypeReceiveEncrypted
  1586. // Override the user-configured defaults, as normally done by the GUI
  1587. fcfg.FSWatcherEnabled = false
  1588. if fcfg.RescanIntervalS != 0 {
  1589. minRescanInterval := 3600 * 24
  1590. if fcfg.RescanIntervalS < minRescanInterval {
  1591. fcfg.RescanIntervalS = minRescanInterval
  1592. }
  1593. }
  1594. fcfg.Versioning.Reset()
  1595. // Other necessary settings are ensured by FolderConfiguration itself
  1596. } else {
  1597. ignores := m.cfg.DefaultIgnores()
  1598. if err := m.setIgnores(fcfg, ignores.Lines); err != nil {
  1599. l.Warnf("Failed to apply default ignores to auto-accepted folder %s at path %s: %v", folder.Description(), fcfg.Path, err)
  1600. }
  1601. }
  1602. l.Infof("Auto-accepted %s folder %s at path %s", deviceID, folder.Description(), fcfg.Path)
  1603. return fcfg, true
  1604. }
  1605. l.Infof("Failed to auto-accept folder %s from %s due to path conflict", folder.Description(), deviceID)
  1606. return config.FolderConfiguration{}, false
  1607. } else {
  1608. for _, device := range cfg.DeviceIDs() {
  1609. if device == deviceID {
  1610. // Already shared nothing todo.
  1611. return config.FolderConfiguration{}, false
  1612. }
  1613. }
  1614. if cfg.Type == config.FolderTypeReceiveEncrypted {
  1615. if len(ccDeviceInfos.remote.EncryptionPasswordToken) == 0 && len(ccDeviceInfos.local.EncryptionPasswordToken) == 0 {
  1616. l.Infof("Failed to auto-accept device %s on existing folder %s as the remote wants to send us unencrypted data, but the folder type is receive-encrypted", folder.Description(), deviceID)
  1617. return config.FolderConfiguration{}, false
  1618. }
  1619. } else {
  1620. if len(ccDeviceInfos.remote.EncryptionPasswordToken) > 0 || len(ccDeviceInfos.local.EncryptionPasswordToken) > 0 {
  1621. l.Infof("Failed to auto-accept device %s on existing folder %s as the remote wants to send us encrypted data, but the folder type is not receive-encrypted", folder.Description(), deviceID)
  1622. return config.FolderConfiguration{}, false
  1623. }
  1624. }
  1625. cfg.Devices = append(cfg.Devices, config.FolderDeviceConfiguration{
  1626. DeviceID: deviceID,
  1627. })
  1628. l.Infof("Shared %s with %s due to auto-accept", folder.ID, deviceID)
  1629. return cfg, true
  1630. }
  1631. }
  1632. func (m *model) introduceDevice(device protocol.Device, introducerCfg config.DeviceConfiguration) config.DeviceConfiguration {
  1633. addresses := []string{"dynamic"}
  1634. for _, addr := range device.Addresses {
  1635. if addr != "dynamic" {
  1636. addresses = append(addresses, addr)
  1637. }
  1638. }
  1639. l.Infof("Adding device %v to config (vouched for by introducer %v)", device.ID, introducerCfg.DeviceID)
  1640. newDeviceCfg := m.cfg.DefaultDevice()
  1641. newDeviceCfg.DeviceID = device.ID
  1642. newDeviceCfg.Name = device.Name
  1643. newDeviceCfg.Compression = introducerCfg.Compression
  1644. newDeviceCfg.Addresses = addresses
  1645. newDeviceCfg.CertName = device.CertName
  1646. newDeviceCfg.IntroducedBy = introducerCfg.DeviceID
  1647. // The introducers' introducers are also our introducers.
  1648. if device.Introducer {
  1649. l.Infof("Device %v is now also an introducer", device.ID)
  1650. newDeviceCfg.Introducer = true
  1651. newDeviceCfg.SkipIntroductionRemovals = device.SkipIntroductionRemovals
  1652. }
  1653. return newDeviceCfg
  1654. }
  1655. // Closed is called when a connection has been closed
  1656. func (m *model) Closed(conn protocol.Connection, err error) {
  1657. connID := conn.ConnectionID()
  1658. deviceID := conn.DeviceID()
  1659. m.pmut.Lock()
  1660. conn, ok := m.connections[connID]
  1661. if !ok {
  1662. m.pmut.Unlock()
  1663. return
  1664. }
  1665. closed := m.closed[connID]
  1666. delete(m.closed, connID)
  1667. delete(m.connections, connID)
  1668. removedIsPrimary := m.promotedConnID[deviceID] == connID
  1669. remainingConns := without(m.deviceConnIDs[deviceID], connID)
  1670. var wait <-chan error
  1671. if removedIsPrimary {
  1672. m.progressEmitter.temporaryIndexUnsubscribe(conn)
  1673. if idxh, ok := m.indexHandlers.Get(deviceID); ok && idxh.conn.ConnectionID() == connID {
  1674. wait = m.indexHandlers.RemoveAndWaitChan(deviceID, 0)
  1675. }
  1676. m.scheduleConnectionPromotion()
  1677. }
  1678. if len(remainingConns) == 0 {
  1679. // All device connections closed
  1680. delete(m.deviceConnIDs, deviceID)
  1681. delete(m.promotedConnID, deviceID)
  1682. delete(m.connRequestLimiters, deviceID)
  1683. delete(m.helloMessages, deviceID)
  1684. delete(m.remoteFolderStates, deviceID)
  1685. delete(m.deviceDownloads, deviceID)
  1686. } else {
  1687. // Some connections remain
  1688. m.deviceConnIDs[deviceID] = remainingConns
  1689. }
  1690. m.pmut.Unlock()
  1691. if wait != nil {
  1692. <-wait
  1693. }
  1694. m.fmut.RLock()
  1695. m.deviceDidCloseFRLocked(deviceID, time.Since(conn.EstablishedAt()))
  1696. m.fmut.RUnlock()
  1697. k := map[bool]string{false: "secondary", true: "primary"}[removedIsPrimary]
  1698. l.Infof("Lost %s connection to %s at %s: %v (%d remain)", k, deviceID.Short(), conn, err, len(remainingConns))
  1699. if len(remainingConns) == 0 {
  1700. l.Infof("Connection to %s at %s closed: %v", deviceID.Short(), conn, err)
  1701. m.evLogger.Log(events.DeviceDisconnected, map[string]string{
  1702. "id": deviceID.String(),
  1703. "error": err.Error(),
  1704. })
  1705. }
  1706. close(closed)
  1707. }
  1708. // Implements protocol.RequestResponse
  1709. type requestResponse struct {
  1710. data []byte
  1711. closed chan struct{}
  1712. once stdsync.Once
  1713. }
  1714. func newRequestResponse(size int) *requestResponse {
  1715. return &requestResponse{
  1716. data: protocol.BufferPool.Get(size),
  1717. closed: make(chan struct{}),
  1718. }
  1719. }
  1720. func (r *requestResponse) Data() []byte {
  1721. return r.data
  1722. }
  1723. func (r *requestResponse) Close() {
  1724. r.once.Do(func() {
  1725. protocol.BufferPool.Put(r.data)
  1726. close(r.closed)
  1727. })
  1728. }
  1729. func (r *requestResponse) Wait() {
  1730. <-r.closed
  1731. }
  1732. // Request returns the specified data segment by reading it from local disk.
  1733. // Implements the protocol.Model interface.
  1734. func (m *model) Request(conn protocol.Connection, folder, name string, _, size int32, offset int64, hash []byte, weakHash uint32, fromTemporary bool) (out protocol.RequestResponse, err error) {
  1735. if size < 0 || offset < 0 {
  1736. return nil, protocol.ErrInvalid
  1737. }
  1738. deviceID := conn.DeviceID()
  1739. m.fmut.RLock()
  1740. folderCfg, ok := m.folderCfgs[folder]
  1741. folderIgnores := m.folderIgnores[folder]
  1742. m.fmut.RUnlock()
  1743. if !ok {
  1744. // The folder might be already unpaused in the config, but not yet
  1745. // in the model.
  1746. l.Debugf("Request from %s for file %s in unstarted folder %q", deviceID.Short(), name, folder)
  1747. return nil, protocol.ErrGeneric
  1748. }
  1749. if !folderCfg.SharedWith(deviceID) {
  1750. l.Warnf("Request from %s for file %s in unshared folder %q", deviceID.Short(), name, folder)
  1751. return nil, protocol.ErrGeneric
  1752. }
  1753. if folderCfg.Paused {
  1754. l.Debugf("Request from %s for file %s in paused folder %q", deviceID.Short(), name, folder)
  1755. return nil, protocol.ErrGeneric
  1756. }
  1757. // Make sure the path is valid and in canonical form
  1758. if name, err = fs.Canonicalize(name); err != nil {
  1759. l.Debugf("Request from %s in folder %q for invalid filename %s", deviceID.Short(), folder, name)
  1760. return nil, protocol.ErrGeneric
  1761. }
  1762. if deviceID != protocol.LocalDeviceID {
  1763. l.Debugf("%v REQ(in): %s: %q / %q o=%d s=%d t=%v", m, deviceID.Short(), folder, name, offset, size, fromTemporary)
  1764. }
  1765. if fs.IsInternal(name) {
  1766. l.Debugf("%v REQ(in) for internal file: %s: %q / %q o=%d s=%d", m, deviceID.Short(), folder, name, offset, size)
  1767. return nil, protocol.ErrInvalid
  1768. }
  1769. if folderIgnores.Match(name).IsIgnored() {
  1770. l.Debugf("%v REQ(in) for ignored file: %s: %q / %q o=%d s=%d", m, deviceID.Short(), folder, name, offset, size)
  1771. return nil, protocol.ErrInvalid
  1772. }
  1773. // Restrict parallel requests by connection/device
  1774. m.pmut.RLock()
  1775. limiter := m.connRequestLimiters[deviceID]
  1776. m.pmut.RUnlock()
  1777. // The requestResponse releases the bytes to the buffer pool and the
  1778. // limiters when its Close method is called.
  1779. res := newLimitedRequestResponse(int(size), limiter, m.globalRequestLimiter)
  1780. defer func() {
  1781. // Close it ourselves if it isn't returned due to an error
  1782. if err != nil {
  1783. res.Close()
  1784. }
  1785. }()
  1786. // Grab the FS after limiting, as it causes I/O and we want to minimize
  1787. // the race time between the symlink check and the read.
  1788. folderFs := folderCfg.Filesystem(nil)
  1789. if err := osutil.TraversesSymlink(folderFs, filepath.Dir(name)); err != nil {
  1790. l.Debugf("%v REQ(in) traversal check: %s - %s: %q / %q o=%d s=%d", m, err, deviceID.Short(), folder, name, offset, size)
  1791. return nil, protocol.ErrNoSuchFile
  1792. }
  1793. // Only check temp files if the flag is set, and if we are set to advertise
  1794. // the temp indexes.
  1795. if fromTemporary && !folderCfg.DisableTempIndexes {
  1796. tempFn := fs.TempName(name)
  1797. if info, err := folderFs.Lstat(tempFn); err != nil || !info.IsRegular() {
  1798. // Reject reads for anything that doesn't exist or is something
  1799. // other than a regular file.
  1800. l.Debugf("%v REQ(in) failed stating temp file (%v): %s: %q / %q o=%d s=%d", m, err, deviceID.Short(), folder, name, offset, size)
  1801. return nil, protocol.ErrNoSuchFile
  1802. }
  1803. _, err := readOffsetIntoBuf(folderFs, tempFn, offset, res.data)
  1804. if err == nil && scanner.Validate(res.data, hash, weakHash) {
  1805. return res, nil
  1806. }
  1807. // Fall through to reading from a non-temp file, just in case the temp
  1808. // file has finished downloading.
  1809. }
  1810. if info, err := folderFs.Lstat(name); err != nil || !info.IsRegular() {
  1811. // Reject reads for anything that doesn't exist or is something
  1812. // other than a regular file.
  1813. l.Debugf("%v REQ(in) failed stating file (%v): %s: %q / %q o=%d s=%d", m, err, deviceID.Short(), folder, name, offset, size)
  1814. return nil, protocol.ErrNoSuchFile
  1815. }
  1816. n, err := readOffsetIntoBuf(folderFs, name, offset, res.data)
  1817. if fs.IsNotExist(err) {
  1818. l.Debugf("%v REQ(in) file doesn't exist: %s: %q / %q o=%d s=%d", m, deviceID.Short(), folder, name, offset, size)
  1819. return nil, protocol.ErrNoSuchFile
  1820. } else if err == io.EOF {
  1821. // Read beyond end of file. This might indicate a problem, or it
  1822. // might be a short block that gets padded when read for encrypted
  1823. // folders. We ignore the error and let the hash validation in the
  1824. // next step take care of it, by only hashing the part we actually
  1825. // managed to read.
  1826. } else if err != nil {
  1827. l.Debugf("%v REQ(in) failed reading file (%v): %s: %q / %q o=%d s=%d", m, err, deviceID.Short(), folder, name, offset, size)
  1828. return nil, protocol.ErrGeneric
  1829. }
  1830. if folderCfg.Type != config.FolderTypeReceiveEncrypted && len(hash) > 0 && !scanner.Validate(res.data[:n], hash, weakHash) {
  1831. m.recheckFile(deviceID, folder, name, offset, hash, weakHash)
  1832. l.Debugf("%v REQ(in) failed validating data: %s: %q / %q o=%d s=%d", m, deviceID.Short(), folder, name, offset, size)
  1833. return nil, protocol.ErrNoSuchFile
  1834. }
  1835. return res, nil
  1836. }
  1837. // newLimitedRequestResponse takes size bytes from the limiters in order,
  1838. // skipping nil limiters, then returns a requestResponse of the given size.
  1839. // When the requestResponse is closed the limiters are given back the bytes,
  1840. // in reverse order.
  1841. func newLimitedRequestResponse(size int, limiters ...*semaphore.Semaphore) *requestResponse {
  1842. multi := semaphore.MultiSemaphore(limiters)
  1843. multi.Take(size)
  1844. res := newRequestResponse(size)
  1845. go func() {
  1846. res.Wait()
  1847. multi.Give(size)
  1848. }()
  1849. return res
  1850. }
  1851. func (m *model) recheckFile(deviceID protocol.DeviceID, folder, name string, offset int64, hash []byte, weakHash uint32) {
  1852. cf, ok, err := m.CurrentFolderFile(folder, name)
  1853. if err != nil {
  1854. l.Debugf("%v recheckFile: %s: %q / %q: current file error: %v", m, deviceID, folder, name, err)
  1855. return
  1856. }
  1857. if !ok {
  1858. l.Debugf("%v recheckFile: %s: %q / %q: no current file", m, deviceID, folder, name)
  1859. return
  1860. }
  1861. if cf.IsDeleted() || cf.IsInvalid() || cf.IsSymlink() || cf.IsDirectory() {
  1862. l.Debugf("%v recheckFile: %s: %q / %q: not a regular file", m, deviceID, folder, name)
  1863. return
  1864. }
  1865. blockIndex := int(offset / int64(cf.BlockSize()))
  1866. if blockIndex >= len(cf.Blocks) {
  1867. l.Debugf("%v recheckFile: %s: %q / %q i=%d: block index too far", m, deviceID, folder, name, blockIndex)
  1868. return
  1869. }
  1870. block := cf.Blocks[blockIndex]
  1871. // Seems to want a different version of the file, whatever.
  1872. if !bytes.Equal(block.Hash, hash) {
  1873. l.Debugf("%v recheckFile: %s: %q / %q i=%d: hash mismatch %x != %x", m, deviceID, folder, name, blockIndex, block.Hash, hash)
  1874. return
  1875. }
  1876. if weakHash != 0 && block.WeakHash != weakHash {
  1877. l.Debugf("%v recheckFile: %s: %q / %q i=%d: weak hash mismatch %v != %v", m, deviceID, folder, name, blockIndex, block.WeakHash, weakHash)
  1878. return
  1879. }
  1880. // The hashes provided part of the request match what we expect to find according
  1881. // to what we have in the database, yet the content we've read off the filesystem doesn't
  1882. // Something is fishy, invalidate the file and rescan it.
  1883. // The file will temporarily become invalid, which is ok as the content is messed up.
  1884. m.fmut.RLock()
  1885. runner, ok := m.folderRunners.Get(folder)
  1886. m.fmut.RUnlock()
  1887. if !ok {
  1888. l.Debugf("%v recheckFile: %s: %q / %q: Folder stopped before rescan could be scheduled", m, deviceID, folder, name)
  1889. return
  1890. }
  1891. runner.ScheduleForceRescan(name)
  1892. l.Debugf("%v recheckFile: %s: %q / %q", m, deviceID, folder, name)
  1893. }
  1894. func (m *model) CurrentFolderFile(folder string, file string) (protocol.FileInfo, bool, error) {
  1895. m.fmut.RLock()
  1896. fs, ok := m.folderFiles[folder]
  1897. m.fmut.RUnlock()
  1898. if !ok {
  1899. return protocol.FileInfo{}, false, ErrFolderMissing
  1900. }
  1901. snap, err := fs.Snapshot()
  1902. if err != nil {
  1903. return protocol.FileInfo{}, false, err
  1904. }
  1905. f, ok := snap.Get(protocol.LocalDeviceID, file)
  1906. snap.Release()
  1907. return f, ok, nil
  1908. }
  1909. func (m *model) CurrentGlobalFile(folder string, file string) (protocol.FileInfo, bool, error) {
  1910. m.fmut.RLock()
  1911. ffs, ok := m.folderFiles[folder]
  1912. m.fmut.RUnlock()
  1913. if !ok {
  1914. return protocol.FileInfo{}, false, ErrFolderMissing
  1915. }
  1916. snap, err := ffs.Snapshot()
  1917. if err != nil {
  1918. return protocol.FileInfo{}, false, err
  1919. }
  1920. f, ok := snap.GetGlobal(file)
  1921. snap.Release()
  1922. return f, ok, nil
  1923. }
  1924. func (m *model) GetMtimeMapping(folder string, file string) (fs.MtimeMapping, error) {
  1925. m.fmut.RLock()
  1926. ffs, ok := m.folderFiles[folder]
  1927. fcfg := m.folderCfgs[folder]
  1928. m.fmut.RUnlock()
  1929. if !ok {
  1930. return fs.MtimeMapping{}, ErrFolderMissing
  1931. }
  1932. return fs.GetMtimeMapping(fcfg.Filesystem(ffs), file)
  1933. }
  1934. // Connection returns if we are connected to the given device.
  1935. func (m *model) ConnectedTo(deviceID protocol.DeviceID) bool {
  1936. m.pmut.RLock()
  1937. _, ok := m.deviceConnIDs[deviceID]
  1938. m.pmut.RUnlock()
  1939. return ok
  1940. }
  1941. // LoadIgnores loads or refreshes the ignore patterns from disk, if the
  1942. // folder is healthy, and returns the refreshed lines and patterns.
  1943. func (m *model) LoadIgnores(folder string) ([]string, []string, error) {
  1944. m.fmut.RLock()
  1945. cfg, cfgOk := m.folderCfgs[folder]
  1946. ignores, ignoresOk := m.folderIgnores[folder]
  1947. m.fmut.RUnlock()
  1948. if !cfgOk {
  1949. cfg, cfgOk = m.cfg.Folder(folder)
  1950. if !cfgOk {
  1951. return nil, nil, fmt.Errorf("folder %s does not exist", folder)
  1952. }
  1953. }
  1954. if cfg.Type == config.FolderTypeReceiveEncrypted {
  1955. return nil, nil, nil
  1956. }
  1957. if !ignoresOk {
  1958. ignores = ignore.New(cfg.Filesystem(nil))
  1959. }
  1960. err := ignores.Load(".stignore")
  1961. if fs.IsNotExist(err) {
  1962. // Having no ignores is not an error.
  1963. return nil, nil, nil
  1964. }
  1965. // Return lines and patterns, which may have some meaning even when err
  1966. // != nil, depending on the specific error.
  1967. return ignores.Lines(), ignores.Patterns(), err
  1968. }
  1969. // CurrentIgnores returns the currently loaded set of ignore patterns,
  1970. // whichever it may be. No attempt is made to load or refresh ignore
  1971. // patterns from disk.
  1972. func (m *model) CurrentIgnores(folder string) ([]string, []string, error) {
  1973. m.fmut.RLock()
  1974. _, cfgOk := m.folderCfgs[folder]
  1975. ignores, ignoresOk := m.folderIgnores[folder]
  1976. m.fmut.RUnlock()
  1977. if !cfgOk {
  1978. return nil, nil, fmt.Errorf("folder %s does not exist", folder)
  1979. }
  1980. if !ignoresOk {
  1981. // Empty ignore patterns
  1982. return []string{}, []string{}, nil
  1983. }
  1984. return ignores.Lines(), ignores.Patterns(), nil
  1985. }
  1986. func (m *model) SetIgnores(folder string, content []string) error {
  1987. cfg, ok := m.cfg.Folder(folder)
  1988. if !ok {
  1989. return fmt.Errorf("folder %s does not exist", cfg.Description())
  1990. }
  1991. return m.setIgnores(cfg, content)
  1992. }
  1993. func (m *model) setIgnores(cfg config.FolderConfiguration, content []string) error {
  1994. err := cfg.CheckPath()
  1995. if err == config.ErrPathMissing {
  1996. if err = cfg.CreateRoot(); err != nil {
  1997. return fmt.Errorf("failed to create folder root: %w", err)
  1998. }
  1999. err = cfg.CheckPath()
  2000. }
  2001. if err != nil && err != config.ErrMarkerMissing {
  2002. return err
  2003. }
  2004. if err := ignore.WriteIgnores(cfg.Filesystem(nil), ".stignore", content); err != nil {
  2005. l.Warnln("Saving .stignore:", err)
  2006. return err
  2007. }
  2008. m.fmut.RLock()
  2009. runner, ok := m.folderRunners.Get(cfg.ID)
  2010. m.fmut.RUnlock()
  2011. if ok {
  2012. runner.ScheduleScan()
  2013. }
  2014. return nil
  2015. }
  2016. // OnHello is called when an device connects to us.
  2017. // This allows us to extract some information from the Hello message
  2018. // and add it to a list of known devices ahead of any checks.
  2019. func (m *model) OnHello(remoteID protocol.DeviceID, addr net.Addr, hello protocol.Hello) error {
  2020. if _, ok := m.cfg.Device(remoteID); !ok {
  2021. if err := m.db.AddOrUpdatePendingDevice(remoteID, hello.DeviceName, addr.String()); err != nil {
  2022. l.Warnf("Failed to persist pending device entry to database: %v", err)
  2023. }
  2024. m.evLogger.Log(events.PendingDevicesChanged, map[string][]interface{}{
  2025. "added": {map[string]string{
  2026. "deviceID": remoteID.String(),
  2027. "name": hello.DeviceName,
  2028. "address": addr.String(),
  2029. }},
  2030. })
  2031. // DEPRECATED: Only for backwards compatibility, should be removed.
  2032. m.evLogger.Log(events.DeviceRejected, map[string]string{
  2033. "name": hello.DeviceName,
  2034. "device": remoteID.String(),
  2035. "address": addr.String(),
  2036. })
  2037. return errDeviceUnknown
  2038. }
  2039. return nil
  2040. }
  2041. // AddConnection adds a new peer connection to the model. An initial index will
  2042. // be sent to the connected peer, thereafter index updates whenever the local
  2043. // folder changes.
  2044. func (m *model) AddConnection(conn protocol.Connection, hello protocol.Hello) {
  2045. deviceID := conn.DeviceID()
  2046. deviceCfg, ok := m.cfg.Device(deviceID)
  2047. if !ok {
  2048. l.Infoln("Trying to add connection to unknown device")
  2049. return
  2050. }
  2051. connID := conn.ConnectionID()
  2052. closed := make(chan struct{})
  2053. m.pmut.Lock()
  2054. m.connections[connID] = conn
  2055. m.closed[connID] = closed
  2056. m.helloMessages[deviceID] = hello
  2057. m.deviceConnIDs[deviceID] = append(m.deviceConnIDs[deviceID], connID)
  2058. if m.deviceDownloads[deviceID] == nil {
  2059. m.deviceDownloads[deviceID] = newDeviceDownloadState()
  2060. }
  2061. event := map[string]string{
  2062. "id": deviceID.String(),
  2063. "deviceName": hello.DeviceName,
  2064. "clientName": hello.ClientName,
  2065. "clientVersion": hello.ClientVersion,
  2066. "type": conn.Type(),
  2067. }
  2068. addr := conn.RemoteAddr()
  2069. if addr != nil {
  2070. event["addr"] = addr.String()
  2071. }
  2072. m.evLogger.Log(events.DeviceConnected, event)
  2073. if len(m.deviceConnIDs[deviceID]) == 1 {
  2074. l.Infof(`Device %s client is "%s %s" named "%s" at %s`, deviceID.Short(), hello.ClientName, hello.ClientVersion, hello.DeviceName, conn)
  2075. } else {
  2076. l.Infof(`Additional connection (+%d) for device %s at %s`, len(m.deviceConnIDs[deviceID])-1, deviceID.Short(), conn)
  2077. }
  2078. m.pmut.Unlock()
  2079. if (deviceCfg.Name == "" || m.cfg.Options().OverwriteRemoteDevNames) && hello.DeviceName != "" {
  2080. m.cfg.Modify(func(cfg *config.Configuration) {
  2081. for i := range cfg.Devices {
  2082. if cfg.Devices[i].DeviceID == deviceID {
  2083. if cfg.Devices[i].Name == "" || cfg.Options.OverwriteRemoteDevNames {
  2084. cfg.Devices[i].Name = hello.DeviceName
  2085. }
  2086. return
  2087. }
  2088. }
  2089. })
  2090. }
  2091. m.deviceWasSeen(deviceID)
  2092. m.scheduleConnectionPromotion()
  2093. }
  2094. func (m *model) scheduleConnectionPromotion() {
  2095. // Keeps deferring to prevent multiple executions in quick succession,
  2096. // e.g. if multiple connections to a single device are closed.
  2097. m.promotionTimer.Reset(time.Second)
  2098. }
  2099. // promoteConnections checks for devices that have connections, but where
  2100. // the primary connection hasn't started index handlers etc. yet, and
  2101. // promotes the primary connection to be the index handling one. This should
  2102. // be called after adding new connections, and after closing a primary
  2103. // device connection.
  2104. func (m *model) promoteConnections() {
  2105. m.fmut.RLock() // for generateClusterConfigFRLocked
  2106. defer m.fmut.RUnlock()
  2107. m.pmut.Lock() // for most other things
  2108. defer m.pmut.Unlock()
  2109. for deviceID, connIDs := range m.deviceConnIDs {
  2110. cm, passwords := m.generateClusterConfigFRLocked(deviceID)
  2111. if m.promotedConnID[deviceID] != connIDs[0] {
  2112. // The previously promoted connection is not the current
  2113. // primary; we should promote the primary connection to be the
  2114. // index handling one. We do this by sending a ClusterConfig on
  2115. // it, which will cause the other side to start sending us index
  2116. // messages there. (On our side, we manage index handlers based
  2117. // on where we get ClusterConfigs from the peer.)
  2118. conn := m.connections[connIDs[0]]
  2119. l.Debugf("Promoting connection to %s at %s", deviceID.Short(), conn)
  2120. if conn.Statistics().StartedAt.IsZero() {
  2121. conn.SetFolderPasswords(passwords)
  2122. conn.Start()
  2123. }
  2124. conn.ClusterConfig(cm)
  2125. m.promotedConnID[deviceID] = connIDs[0]
  2126. }
  2127. // Make sure any other new connections also get started, and that
  2128. // they get a secondary-marked ClusterConfig.
  2129. for _, connID := range connIDs[1:] {
  2130. conn := m.connections[connID]
  2131. if conn.Statistics().StartedAt.IsZero() {
  2132. conn.SetFolderPasswords(passwords)
  2133. conn.Start()
  2134. conn.ClusterConfig(protocol.ClusterConfig{Secondary: true})
  2135. }
  2136. }
  2137. }
  2138. }
  2139. func (m *model) DownloadProgress(conn protocol.Connection, folder string, updates []protocol.FileDownloadProgressUpdate) error {
  2140. deviceID := conn.DeviceID()
  2141. m.fmut.RLock()
  2142. cfg, ok := m.folderCfgs[folder]
  2143. m.fmut.RUnlock()
  2144. if !ok || cfg.DisableTempIndexes || !cfg.SharedWith(deviceID) {
  2145. return nil
  2146. }
  2147. m.pmut.RLock()
  2148. downloads := m.deviceDownloads[deviceID]
  2149. m.pmut.RUnlock()
  2150. downloads.Update(folder, updates)
  2151. state := downloads.GetBlockCounts(folder)
  2152. m.evLogger.Log(events.RemoteDownloadProgress, map[string]interface{}{
  2153. "device": deviceID.String(),
  2154. "folder": folder,
  2155. "state": state,
  2156. })
  2157. return nil
  2158. }
  2159. func (m *model) deviceWasSeen(deviceID protocol.DeviceID) {
  2160. m.fmut.RLock()
  2161. sr, ok := m.deviceStatRefs[deviceID]
  2162. m.fmut.RUnlock()
  2163. if ok {
  2164. _ = sr.WasSeen()
  2165. }
  2166. }
  2167. func (m *model) deviceDidCloseFRLocked(deviceID protocol.DeviceID, duration time.Duration) {
  2168. if sr, ok := m.deviceStatRefs[deviceID]; ok {
  2169. _ = sr.LastConnectionDuration(duration)
  2170. _ = sr.WasSeen()
  2171. }
  2172. }
  2173. func (m *model) requestGlobal(ctx context.Context, deviceID protocol.DeviceID, folder, name string, blockNo int, offset int64, size int, hash []byte, weakHash uint32, fromTemporary bool) ([]byte, error) {
  2174. conn, connOK := m.requestConnectionForDevice(deviceID)
  2175. if !connOK {
  2176. return nil, fmt.Errorf("requestGlobal: no connection to device: %s", deviceID.Short())
  2177. }
  2178. l.Debugf("%v REQ(out): %s (%s): %q / %q b=%d o=%d s=%d h=%x wh=%x ft=%t", m, deviceID.Short(), conn, folder, name, blockNo, offset, size, hash, weakHash, fromTemporary)
  2179. return conn.Request(ctx, folder, name, blockNo, offset, size, hash, weakHash, fromTemporary)
  2180. }
  2181. // requestConnectionForDevice returns a connection to the given device, to
  2182. // be used for sending a request. If there is only one device connection,
  2183. // this is the one to use. If there are multiple then we avoid the first
  2184. // ("primary") connection, which is dedicated to index data, and pick a
  2185. // random one of the others.
  2186. func (m *model) requestConnectionForDevice(deviceID protocol.DeviceID) (protocol.Connection, bool) {
  2187. m.pmut.RLock()
  2188. defer m.pmut.RUnlock()
  2189. connIDs, ok := m.deviceConnIDs[deviceID]
  2190. if !ok {
  2191. return nil, false
  2192. }
  2193. // If there is an entry in deviceConns, it always contains at least one
  2194. // connection.
  2195. connID := connIDs[0]
  2196. if len(connIDs) > 1 {
  2197. // Pick a random connection of the non-primary ones
  2198. idx := rand.Intn(len(connIDs)-1) + 1
  2199. connID = connIDs[idx]
  2200. }
  2201. conn, connOK := m.connections[connID]
  2202. return conn, connOK
  2203. }
  2204. func (m *model) ScanFolders() map[string]error {
  2205. m.fmut.RLock()
  2206. folders := make([]string, 0, len(m.folderCfgs))
  2207. for folder := range m.folderCfgs {
  2208. folders = append(folders, folder)
  2209. }
  2210. m.fmut.RUnlock()
  2211. errors := make(map[string]error, len(m.folderCfgs))
  2212. errorsMut := sync.NewMutex()
  2213. wg := sync.NewWaitGroup()
  2214. wg.Add(len(folders))
  2215. for _, folder := range folders {
  2216. folder := folder
  2217. go func() {
  2218. err := m.ScanFolder(folder)
  2219. if err != nil {
  2220. errorsMut.Lock()
  2221. errors[folder] = err
  2222. errorsMut.Unlock()
  2223. }
  2224. wg.Done()
  2225. }()
  2226. }
  2227. wg.Wait()
  2228. return errors
  2229. }
  2230. func (m *model) ScanFolder(folder string) error {
  2231. return m.ScanFolderSubdirs(folder, nil)
  2232. }
  2233. func (m *model) ScanFolderSubdirs(folder string, subs []string) error {
  2234. m.fmut.RLock()
  2235. err := m.checkFolderRunningLocked(folder)
  2236. runner, _ := m.folderRunners.Get(folder)
  2237. m.fmut.RUnlock()
  2238. if err != nil {
  2239. return err
  2240. }
  2241. return runner.Scan(subs)
  2242. }
  2243. func (m *model) DelayScan(folder string, next time.Duration) {
  2244. m.fmut.RLock()
  2245. runner, ok := m.folderRunners.Get(folder)
  2246. m.fmut.RUnlock()
  2247. if !ok {
  2248. return
  2249. }
  2250. runner.DelayScan(next)
  2251. }
  2252. // numHashers returns the number of hasher routines to use for a given folder,
  2253. // taking into account configuration and available CPU cores.
  2254. func (m *model) numHashers(folder string) int {
  2255. m.fmut.RLock()
  2256. folderCfg := m.folderCfgs[folder]
  2257. numFolders := len(m.folderCfgs)
  2258. m.fmut.RUnlock()
  2259. if folderCfg.Hashers > 0 {
  2260. // Specific value set in the config, use that.
  2261. return folderCfg.Hashers
  2262. }
  2263. if build.IsWindows || build.IsDarwin || build.IsAndroid {
  2264. // Interactive operating systems; don't load the system too heavily by
  2265. // default.
  2266. return 1
  2267. }
  2268. // For other operating systems and architectures, lets try to get some
  2269. // work done... Divide the available CPU cores among the configured
  2270. // folders.
  2271. if perFolder := runtime.GOMAXPROCS(-1) / numFolders; perFolder > 0 {
  2272. return perFolder
  2273. }
  2274. return 1
  2275. }
  2276. // generateClusterConfig returns a ClusterConfigMessage that is correct and the
  2277. // set of folder passwords for the given peer device
  2278. func (m *model) generateClusterConfig(device protocol.DeviceID) (protocol.ClusterConfig, map[string]string) {
  2279. m.fmut.RLock()
  2280. defer m.fmut.RUnlock()
  2281. return m.generateClusterConfigFRLocked(device)
  2282. }
  2283. func (m *model) generateClusterConfigFRLocked(device protocol.DeviceID) (protocol.ClusterConfig, map[string]string) {
  2284. var message protocol.ClusterConfig
  2285. folders := m.cfg.FolderList()
  2286. passwords := make(map[string]string, len(folders))
  2287. for _, folderCfg := range folders {
  2288. if !folderCfg.SharedWith(device) {
  2289. continue
  2290. }
  2291. encryptionToken, hasEncryptionToken := m.folderEncryptionPasswordTokens[folderCfg.ID]
  2292. if folderCfg.Type == config.FolderTypeReceiveEncrypted && !hasEncryptionToken {
  2293. // We haven't gotten a token for us yet and without one the other
  2294. // side can't validate us - pretend we don't have the folder yet.
  2295. continue
  2296. }
  2297. protocolFolder := protocol.Folder{
  2298. ID: folderCfg.ID,
  2299. Label: folderCfg.Label,
  2300. ReadOnly: folderCfg.Type == config.FolderTypeSendOnly,
  2301. IgnorePermissions: folderCfg.IgnorePerms,
  2302. IgnoreDelete: folderCfg.IgnoreDelete,
  2303. DisableTempIndexes: folderCfg.DisableTempIndexes,
  2304. }
  2305. fs := m.folderFiles[folderCfg.ID]
  2306. // Even if we aren't paused, if we haven't started the folder yet
  2307. // pretend we are. Otherwise the remote might get confused about
  2308. // the missing index info (and drop all the info). We will send
  2309. // another cluster config once the folder is started.
  2310. protocolFolder.Paused = folderCfg.Paused || fs == nil
  2311. for _, folderDevice := range folderCfg.Devices {
  2312. deviceCfg, _ := m.cfg.Device(folderDevice.DeviceID)
  2313. protocolDevice := protocol.Device{
  2314. ID: deviceCfg.DeviceID,
  2315. Name: deviceCfg.Name,
  2316. Addresses: deviceCfg.Addresses,
  2317. Compression: deviceCfg.Compression,
  2318. CertName: deviceCfg.CertName,
  2319. Introducer: deviceCfg.Introducer,
  2320. }
  2321. if deviceCfg.DeviceID == m.id && hasEncryptionToken {
  2322. protocolDevice.EncryptionPasswordToken = encryptionToken
  2323. } else if folderDevice.EncryptionPassword != "" {
  2324. protocolDevice.EncryptionPasswordToken = protocol.PasswordToken(m.keyGen, folderCfg.ID, folderDevice.EncryptionPassword)
  2325. if folderDevice.DeviceID == device {
  2326. passwords[folderCfg.ID] = folderDevice.EncryptionPassword
  2327. }
  2328. }
  2329. if fs != nil {
  2330. if deviceCfg.DeviceID == m.id {
  2331. protocolDevice.IndexID = fs.IndexID(protocol.LocalDeviceID)
  2332. protocolDevice.MaxSequence = fs.Sequence(protocol.LocalDeviceID)
  2333. } else {
  2334. protocolDevice.IndexID = fs.IndexID(deviceCfg.DeviceID)
  2335. protocolDevice.MaxSequence = fs.Sequence(deviceCfg.DeviceID)
  2336. }
  2337. }
  2338. protocolFolder.Devices = append(protocolFolder.Devices, protocolDevice)
  2339. }
  2340. message.Folders = append(message.Folders, protocolFolder)
  2341. }
  2342. return message, passwords
  2343. }
  2344. func (m *model) State(folder string) (string, time.Time, error) {
  2345. m.fmut.RLock()
  2346. runner, ok := m.folderRunners.Get(folder)
  2347. m.fmut.RUnlock()
  2348. if !ok {
  2349. // The returned error should be an actual folder error, so returning
  2350. // errors.New("does not exist") or similar here would be
  2351. // inappropriate.
  2352. return "", time.Time{}, nil
  2353. }
  2354. state, changed, err := runner.getState()
  2355. return state.String(), changed, err
  2356. }
  2357. func (m *model) FolderErrors(folder string) ([]FileError, error) {
  2358. m.fmut.RLock()
  2359. err := m.checkFolderRunningLocked(folder)
  2360. runner, _ := m.folderRunners.Get(folder)
  2361. m.fmut.RUnlock()
  2362. if err != nil {
  2363. return nil, err
  2364. }
  2365. return runner.Errors(), nil
  2366. }
  2367. func (m *model) WatchError(folder string) error {
  2368. m.fmut.RLock()
  2369. err := m.checkFolderRunningLocked(folder)
  2370. runner, _ := m.folderRunners.Get(folder)
  2371. m.fmut.RUnlock()
  2372. if err != nil {
  2373. return nil // If the folder isn't running, there's no error to report.
  2374. }
  2375. return runner.WatchError()
  2376. }
  2377. func (m *model) Override(folder string) {
  2378. // Grab the runner and the file set.
  2379. m.fmut.RLock()
  2380. runner, ok := m.folderRunners.Get(folder)
  2381. m.fmut.RUnlock()
  2382. if !ok {
  2383. return
  2384. }
  2385. // Run the override, taking updates as if they came from scanning.
  2386. runner.Override()
  2387. }
  2388. func (m *model) Revert(folder string) {
  2389. // Grab the runner and the file set.
  2390. m.fmut.RLock()
  2391. runner, ok := m.folderRunners.Get(folder)
  2392. m.fmut.RUnlock()
  2393. if !ok {
  2394. return
  2395. }
  2396. // Run the revert, taking updates as if they came from scanning.
  2397. runner.Revert()
  2398. }
  2399. type TreeEntry struct {
  2400. Name string `json:"name"`
  2401. ModTime time.Time `json:"modTime"`
  2402. Size int64 `json:"size"`
  2403. Type protocol.FileInfoType `json:"type"`
  2404. Children []*TreeEntry `json:"children,omitempty"`
  2405. }
  2406. func findByName(slice []*TreeEntry, name string) *TreeEntry {
  2407. for _, child := range slice {
  2408. if child.Name == name {
  2409. return child
  2410. }
  2411. }
  2412. return nil
  2413. }
  2414. func (m *model) GlobalDirectoryTree(folder, prefix string, levels int, dirsOnly bool) ([]*TreeEntry, error) {
  2415. m.fmut.RLock()
  2416. files, ok := m.folderFiles[folder]
  2417. m.fmut.RUnlock()
  2418. if !ok {
  2419. return nil, ErrFolderMissing
  2420. }
  2421. root := &TreeEntry{
  2422. Children: make([]*TreeEntry, 0),
  2423. }
  2424. sep := string(filepath.Separator)
  2425. prefix = osutil.NativeFilename(prefix)
  2426. if prefix != "" && !strings.HasSuffix(prefix, sep) {
  2427. prefix = prefix + sep
  2428. }
  2429. snap, err := files.Snapshot()
  2430. if err != nil {
  2431. return nil, err
  2432. }
  2433. defer snap.Release()
  2434. snap.WithPrefixedGlobalTruncated(prefix, func(fi protocol.FileIntf) bool {
  2435. f := fi.(db.FileInfoTruncated)
  2436. // Don't include the prefix itself.
  2437. if f.IsInvalid() || f.IsDeleted() || strings.HasPrefix(prefix, f.Name) {
  2438. return true
  2439. }
  2440. f.Name = strings.Replace(f.Name, prefix, "", 1)
  2441. dir := filepath.Dir(f.Name)
  2442. base := filepath.Base(f.Name)
  2443. if levels > -1 && strings.Count(f.Name, sep) > levels {
  2444. return true
  2445. }
  2446. parent := root
  2447. if dir != "." {
  2448. for _, path := range strings.Split(dir, sep) {
  2449. child := findByName(parent.Children, path)
  2450. if child == nil {
  2451. err = fmt.Errorf("could not find child '%s' for path '%s' in parent '%s'", path, f.Name, parent.Name)
  2452. return false
  2453. }
  2454. parent = child
  2455. }
  2456. }
  2457. if dirsOnly && !f.IsDirectory() {
  2458. return true
  2459. }
  2460. parent.Children = append(parent.Children, &TreeEntry{
  2461. Name: base,
  2462. Type: f.Type,
  2463. ModTime: f.ModTime(),
  2464. Size: f.FileSize(),
  2465. })
  2466. return true
  2467. })
  2468. if err != nil {
  2469. return nil, err
  2470. }
  2471. return root.Children, nil
  2472. }
  2473. func (m *model) GetFolderVersions(folder string) (map[string][]versioner.FileVersion, error) {
  2474. m.fmut.RLock()
  2475. err := m.checkFolderRunningLocked(folder)
  2476. ver := m.folderVersioners[folder]
  2477. m.fmut.RUnlock()
  2478. if err != nil {
  2479. return nil, err
  2480. }
  2481. if ver == nil {
  2482. return nil, errNoVersioner
  2483. }
  2484. return ver.GetVersions()
  2485. }
  2486. func (m *model) RestoreFolderVersions(folder string, versions map[string]time.Time) (map[string]error, error) {
  2487. m.fmut.RLock()
  2488. err := m.checkFolderRunningLocked(folder)
  2489. fcfg := m.folderCfgs[folder]
  2490. ver := m.folderVersioners[folder]
  2491. m.fmut.RUnlock()
  2492. if err != nil {
  2493. return nil, err
  2494. }
  2495. if ver == nil {
  2496. return nil, errNoVersioner
  2497. }
  2498. restoreErrors := make(map[string]error)
  2499. for file, version := range versions {
  2500. if err := ver.Restore(file, version); err != nil {
  2501. restoreErrors[file] = err
  2502. }
  2503. }
  2504. // Trigger scan
  2505. if !fcfg.FSWatcherEnabled {
  2506. go func() { _ = m.ScanFolder(folder) }()
  2507. }
  2508. return restoreErrors, nil
  2509. }
  2510. func (m *model) Availability(folder string, file protocol.FileInfo, block protocol.BlockInfo) ([]Availability, error) {
  2511. // The slightly unusual locking sequence here is because we need to hold
  2512. // pmut for the duration (as the value returned from foldersFiles can
  2513. // get heavily modified on Close()), but also must acquire fmut before
  2514. // pmut. (The locks can be *released* in any order.)
  2515. m.fmut.RLock()
  2516. m.pmut.RLock()
  2517. defer m.pmut.RUnlock()
  2518. fs, ok := m.folderFiles[folder]
  2519. cfg := m.folderCfgs[folder]
  2520. m.fmut.RUnlock()
  2521. if !ok {
  2522. return nil, ErrFolderMissing
  2523. }
  2524. snap, err := fs.Snapshot()
  2525. if err != nil {
  2526. return nil, err
  2527. }
  2528. defer snap.Release()
  2529. return m.availabilityInSnapshotPRlocked(cfg, snap, file, block), nil
  2530. }
  2531. func (m *model) availabilityInSnapshot(cfg config.FolderConfiguration, snap *db.Snapshot, file protocol.FileInfo, block protocol.BlockInfo) []Availability {
  2532. m.pmut.RLock()
  2533. defer m.pmut.RUnlock()
  2534. return m.availabilityInSnapshotPRlocked(cfg, snap, file, block)
  2535. }
  2536. func (m *model) availabilityInSnapshotPRlocked(cfg config.FolderConfiguration, snap *db.Snapshot, file protocol.FileInfo, block protocol.BlockInfo) []Availability {
  2537. var availabilities []Availability
  2538. for _, device := range snap.Availability(file.Name) {
  2539. if _, ok := m.remoteFolderStates[device]; !ok {
  2540. continue
  2541. }
  2542. if state := m.remoteFolderStates[device][cfg.ID]; state != remoteFolderValid {
  2543. continue
  2544. }
  2545. _, ok := m.deviceConnIDs[device]
  2546. if ok {
  2547. availabilities = append(availabilities, Availability{ID: device, FromTemporary: false})
  2548. }
  2549. }
  2550. for _, device := range cfg.Devices {
  2551. if m.deviceDownloads[device.DeviceID].Has(cfg.ID, file.Name, file.Version, int(block.Offset/int64(file.BlockSize()))) {
  2552. availabilities = append(availabilities, Availability{ID: device.DeviceID, FromTemporary: true})
  2553. }
  2554. }
  2555. return availabilities
  2556. }
  2557. // BringToFront bumps the given files priority in the job queue.
  2558. func (m *model) BringToFront(folder, file string) {
  2559. m.fmut.RLock()
  2560. runner, ok := m.folderRunners.Get(folder)
  2561. m.fmut.RUnlock()
  2562. if ok {
  2563. runner.BringToFront(file)
  2564. }
  2565. }
  2566. func (m *model) ResetFolder(folder string) error {
  2567. m.fmut.RLock()
  2568. defer m.fmut.RUnlock()
  2569. _, ok := m.folderRunners.Get(folder)
  2570. if ok {
  2571. return errors.New("folder must be paused when resetting")
  2572. }
  2573. l.Infof("Cleaning metadata for reset folder %q", folder)
  2574. db.DropFolder(m.db, folder)
  2575. return nil
  2576. }
  2577. func (m *model) String() string {
  2578. return fmt.Sprintf("model@%p", m)
  2579. }
  2580. func (*model) VerifyConfiguration(from, to config.Configuration) error {
  2581. toFolders := to.FolderMap()
  2582. for _, from := range from.Folders {
  2583. to, ok := toFolders[from.ID]
  2584. if ok && from.Type != to.Type && (from.Type == config.FolderTypeReceiveEncrypted || to.Type == config.FolderTypeReceiveEncrypted) {
  2585. return errors.New("folder type must not be changed from/to receive-encrypted")
  2586. }
  2587. }
  2588. // Verify that any requested versioning is possible to construct, or we
  2589. // will panic later when starting the folder.
  2590. for _, to := range to.Folders {
  2591. if to.Versioning.Type != "" {
  2592. if _, err := versioner.New(to); err != nil {
  2593. return err
  2594. }
  2595. }
  2596. }
  2597. return nil
  2598. }
  2599. func (m *model) CommitConfiguration(from, to config.Configuration) bool {
  2600. // TODO: This should not use reflect, and should take more care to try to handle stuff without restart.
  2601. // Delay processing config changes until after the initial setup
  2602. <-m.started
  2603. // Go through the folder configs and figure out if we need to restart or not.
  2604. // Tracks devices affected by any configuration change to resend ClusterConfig.
  2605. clusterConfigDevices := make(deviceIDSet, len(from.Devices)+len(to.Devices))
  2606. closeDevices := make([]protocol.DeviceID, 0, len(to.Devices))
  2607. fromFolders := mapFolders(from.Folders)
  2608. toFolders := mapFolders(to.Folders)
  2609. for folderID, cfg := range toFolders {
  2610. if _, ok := fromFolders[folderID]; !ok {
  2611. // A folder was added.
  2612. if cfg.Paused {
  2613. l.Infoln("Paused folder", cfg.Description())
  2614. } else {
  2615. l.Infoln("Adding folder", cfg.Description())
  2616. if err := m.newFolder(cfg, to.Options.CacheIgnoredFiles); err != nil {
  2617. m.fatal(err)
  2618. return true
  2619. }
  2620. }
  2621. clusterConfigDevices.add(cfg.DeviceIDs())
  2622. }
  2623. }
  2624. removedFolders := make(map[string]struct{})
  2625. for folderID, fromCfg := range fromFolders {
  2626. toCfg, ok := toFolders[folderID]
  2627. if !ok {
  2628. // The folder was removed.
  2629. m.removeFolder(fromCfg)
  2630. clusterConfigDevices.add(fromCfg.DeviceIDs())
  2631. removedFolders[fromCfg.ID] = struct{}{}
  2632. continue
  2633. }
  2634. if fromCfg.Paused && toCfg.Paused {
  2635. continue
  2636. }
  2637. // This folder exists on both sides. Settings might have changed.
  2638. // Check if anything differs that requires a restart.
  2639. if !reflect.DeepEqual(fromCfg.RequiresRestartOnly(), toCfg.RequiresRestartOnly()) || from.Options.CacheIgnoredFiles != to.Options.CacheIgnoredFiles {
  2640. if err := m.restartFolder(fromCfg, toCfg, to.Options.CacheIgnoredFiles); err != nil {
  2641. m.fatal(err)
  2642. return true
  2643. }
  2644. clusterConfigDevices.add(fromCfg.DeviceIDs())
  2645. if toCfg.Type != config.FolderTypeReceiveEncrypted {
  2646. clusterConfigDevices.add(toCfg.DeviceIDs())
  2647. } else {
  2648. // If we don't have the encryption token yet, we need to drop
  2649. // the connection to make the remote re-send the cluster-config
  2650. // and with it the token.
  2651. m.fmut.RLock()
  2652. _, ok := m.folderEncryptionPasswordTokens[toCfg.ID]
  2653. m.fmut.RUnlock()
  2654. if !ok {
  2655. closeDevices = append(closeDevices, toCfg.DeviceIDs()...)
  2656. } else {
  2657. clusterConfigDevices.add(toCfg.DeviceIDs())
  2658. }
  2659. }
  2660. }
  2661. // Emit the folder pause/resume event
  2662. if fromCfg.Paused != toCfg.Paused {
  2663. eventType := events.FolderResumed
  2664. if toCfg.Paused {
  2665. eventType = events.FolderPaused
  2666. }
  2667. m.evLogger.Log(eventType, map[string]string{"id": toCfg.ID, "label": toCfg.Label})
  2668. }
  2669. }
  2670. // Pausing a device, unpausing is handled by the connection service.
  2671. fromDevices := from.DeviceMap()
  2672. toDevices := to.DeviceMap()
  2673. for deviceID, toCfg := range toDevices {
  2674. fromCfg, ok := fromDevices[deviceID]
  2675. if !ok {
  2676. sr := stats.NewDeviceStatisticsReference(m.db, deviceID)
  2677. m.fmut.Lock()
  2678. m.deviceStatRefs[deviceID] = sr
  2679. m.fmut.Unlock()
  2680. continue
  2681. }
  2682. delete(fromDevices, deviceID)
  2683. if fromCfg.Paused == toCfg.Paused {
  2684. continue
  2685. }
  2686. if toCfg.Paused {
  2687. l.Infoln("Pausing", deviceID)
  2688. closeDevices = append(closeDevices, deviceID)
  2689. m.evLogger.Log(events.DevicePaused, map[string]string{"device": deviceID.String()})
  2690. } else {
  2691. // Ignored folder was removed, reconnect to retrigger the prompt.
  2692. if len(fromCfg.IgnoredFolders) > len(toCfg.IgnoredFolders) {
  2693. closeDevices = append(closeDevices, deviceID)
  2694. }
  2695. l.Infoln("Resuming", deviceID)
  2696. m.evLogger.Log(events.DeviceResumed, map[string]string{"device": deviceID.String()})
  2697. }
  2698. if toCfg.MaxRequestKiB != fromCfg.MaxRequestKiB {
  2699. m.pmut.Lock()
  2700. m.setConnRequestLimitersPLocked(toCfg)
  2701. m.pmut.Unlock()
  2702. }
  2703. }
  2704. // Clean up after removed devices
  2705. removedDevices := make([]protocol.DeviceID, 0, len(fromDevices))
  2706. m.fmut.Lock()
  2707. for deviceID := range fromDevices {
  2708. delete(m.deviceStatRefs, deviceID)
  2709. removedDevices = append(removedDevices, deviceID)
  2710. delete(clusterConfigDevices, deviceID)
  2711. }
  2712. m.fmut.Unlock()
  2713. m.pmut.RLock()
  2714. for _, id := range closeDevices {
  2715. delete(clusterConfigDevices, id)
  2716. if conns, ok := m.deviceConnIDs[id]; ok {
  2717. for _, connID := range conns {
  2718. go m.connections[connID].Close(errDevicePaused)
  2719. }
  2720. }
  2721. }
  2722. for _, id := range removedDevices {
  2723. delete(clusterConfigDevices, id)
  2724. if conns, ok := m.deviceConnIDs[id]; ok {
  2725. for _, connID := range conns {
  2726. go m.connections[connID].Close(errDevicePaused)
  2727. }
  2728. }
  2729. }
  2730. m.pmut.RUnlock()
  2731. // Generating cluster-configs acquires fmut -> must happen outside of pmut.
  2732. m.sendClusterConfig(clusterConfigDevices.AsSlice())
  2733. ignoredDevices := observedDeviceSet(to.IgnoredDevices)
  2734. m.cleanPending(toDevices, toFolders, ignoredDevices, removedFolders)
  2735. m.globalRequestLimiter.SetCapacity(1024 * to.Options.MaxConcurrentIncomingRequestKiB())
  2736. m.folderIOLimiter.SetCapacity(to.Options.MaxFolderConcurrency())
  2737. // Some options don't require restart as those components handle it fine
  2738. // by themselves. Compare the options structs containing only the
  2739. // attributes that require restart and act apprioriately.
  2740. if !reflect.DeepEqual(from.Options.RequiresRestartOnly(), to.Options.RequiresRestartOnly()) {
  2741. l.Debugln(m, "requires restart, options differ")
  2742. return false
  2743. }
  2744. return true
  2745. }
  2746. func (m *model) setConnRequestLimitersPLocked(cfg config.DeviceConfiguration) {
  2747. // Touches connRequestLimiters which is protected by pmut.
  2748. // 0: default, <0: no limiting
  2749. switch {
  2750. case cfg.MaxRequestKiB > 0:
  2751. m.connRequestLimiters[cfg.DeviceID] = semaphore.New(1024 * cfg.MaxRequestKiB)
  2752. case cfg.MaxRequestKiB == 0:
  2753. m.connRequestLimiters[cfg.DeviceID] = semaphore.New(1024 * defaultPullerPendingKiB)
  2754. }
  2755. }
  2756. func (m *model) cleanPending(existingDevices map[protocol.DeviceID]config.DeviceConfiguration, existingFolders map[string]config.FolderConfiguration, ignoredDevices deviceIDSet, removedFolders map[string]struct{}) {
  2757. var removedPendingFolders []map[string]string
  2758. pendingFolders, err := m.db.PendingFolders()
  2759. if err != nil {
  2760. msg := "Could not iterate through pending folder entries for cleanup"
  2761. l.Warnf("%v: %v", msg, err)
  2762. m.evLogger.Log(events.Failure, msg)
  2763. // Continue with pending devices below, loop is skipped.
  2764. }
  2765. for folderID, pf := range pendingFolders {
  2766. if _, ok := removedFolders[folderID]; ok {
  2767. // Forget pending folder device associations for recently removed
  2768. // folders as well, assuming the folder is no longer of interest
  2769. // at all (but might become pending again).
  2770. l.Debugf("Discarding pending removed folder %v from all devices", folderID)
  2771. if err := m.db.RemovePendingFolder(folderID); err != nil {
  2772. msg := "Failed to remove pending folder entry"
  2773. l.Warnf("%v (%v): %v", msg, folderID, err)
  2774. m.evLogger.Log(events.Failure, msg)
  2775. } else {
  2776. removedPendingFolders = append(removedPendingFolders, map[string]string{
  2777. "folderID": folderID,
  2778. })
  2779. }
  2780. continue
  2781. }
  2782. for deviceID := range pf.OfferedBy {
  2783. if dev, ok := existingDevices[deviceID]; !ok {
  2784. l.Debugf("Discarding pending folder %v from unknown device %v", folderID, deviceID)
  2785. goto removeFolderForDevice
  2786. } else if dev.IgnoredFolder(folderID) {
  2787. l.Debugf("Discarding now ignored pending folder %v for device %v", folderID, deviceID)
  2788. goto removeFolderForDevice
  2789. }
  2790. if folderCfg, ok := existingFolders[folderID]; ok {
  2791. if folderCfg.SharedWith(deviceID) {
  2792. l.Debugf("Discarding now shared pending folder %v for device %v", folderID, deviceID)
  2793. goto removeFolderForDevice
  2794. }
  2795. }
  2796. continue
  2797. removeFolderForDevice:
  2798. if err := m.db.RemovePendingFolderForDevice(folderID, deviceID); err != nil {
  2799. msg := "Failed to remove pending folder-device entry"
  2800. l.Warnf("%v (%v, %v): %v", msg, folderID, deviceID, err)
  2801. m.evLogger.Log(events.Failure, msg)
  2802. continue
  2803. }
  2804. removedPendingFolders = append(removedPendingFolders, map[string]string{
  2805. "folderID": folderID,
  2806. "deviceID": deviceID.String(),
  2807. })
  2808. }
  2809. }
  2810. if len(removedPendingFolders) > 0 {
  2811. m.evLogger.Log(events.PendingFoldersChanged, map[string]interface{}{
  2812. "removed": removedPendingFolders,
  2813. })
  2814. }
  2815. var removedPendingDevices []map[string]string
  2816. pendingDevices, err := m.db.PendingDevices()
  2817. if err != nil {
  2818. msg := "Could not iterate through pending device entries for cleanup"
  2819. l.Warnf("%v: %v", msg, err)
  2820. m.evLogger.Log(events.Failure, msg)
  2821. return
  2822. }
  2823. for deviceID := range pendingDevices {
  2824. if _, ok := ignoredDevices[deviceID]; ok {
  2825. l.Debugf("Discarding now ignored pending device %v", deviceID)
  2826. goto removeDevice
  2827. }
  2828. if _, ok := existingDevices[deviceID]; ok {
  2829. l.Debugf("Discarding now added pending device %v", deviceID)
  2830. goto removeDevice
  2831. }
  2832. continue
  2833. removeDevice:
  2834. if err := m.db.RemovePendingDevice(deviceID); err != nil {
  2835. msg := "Failed to remove pending device entry"
  2836. l.Warnf("%v: %v", msg, err)
  2837. m.evLogger.Log(events.Failure, msg)
  2838. continue
  2839. }
  2840. removedPendingDevices = append(removedPendingDevices, map[string]string{
  2841. "deviceID": deviceID.String(),
  2842. })
  2843. }
  2844. if len(removedPendingDevices) > 0 {
  2845. m.evLogger.Log(events.PendingDevicesChanged, map[string]interface{}{
  2846. "removed": removedPendingDevices,
  2847. })
  2848. }
  2849. }
  2850. // checkFolderRunningLocked returns nil if the folder is up and running and a
  2851. // descriptive error if not.
  2852. // Need to hold (read) lock on m.fmut when calling this.
  2853. func (m *model) checkFolderRunningLocked(folder string) error {
  2854. _, ok := m.folderRunners.Get(folder)
  2855. if ok {
  2856. return nil
  2857. }
  2858. if cfg, ok := m.cfg.Folder(folder); !ok {
  2859. return ErrFolderMissing
  2860. } else if cfg.Paused {
  2861. return ErrFolderPaused
  2862. }
  2863. return ErrFolderNotRunning
  2864. }
  2865. // PendingDevices lists unknown devices that tried to connect.
  2866. func (m *model) PendingDevices() (map[protocol.DeviceID]db.ObservedDevice, error) {
  2867. return m.db.PendingDevices()
  2868. }
  2869. // PendingFolders lists folders that we don't yet share with the offering devices. It
  2870. // returns the entries grouped by folder and filters for a given device unless the
  2871. // argument is specified as EmptyDeviceID.
  2872. func (m *model) PendingFolders(device protocol.DeviceID) (map[string]db.PendingFolder, error) {
  2873. return m.db.PendingFoldersForDevice(device)
  2874. }
  2875. // DismissPendingDevices removes the record of a specific pending device.
  2876. func (m *model) DismissPendingDevice(device protocol.DeviceID) error {
  2877. l.Debugf("Discarding pending device %v", device)
  2878. err := m.db.RemovePendingDevice(device)
  2879. if err != nil {
  2880. return err
  2881. }
  2882. removedPendingDevices := []map[string]string{
  2883. {"deviceID": device.String()},
  2884. }
  2885. m.evLogger.Log(events.PendingDevicesChanged, map[string]interface{}{
  2886. "removed": removedPendingDevices,
  2887. })
  2888. return nil
  2889. }
  2890. // DismissPendingFolders removes records of pending folders. Either a specific folder /
  2891. // device combination, or all matching a specific folder ID if the device argument is
  2892. // specified as EmptyDeviceID.
  2893. func (m *model) DismissPendingFolder(device protocol.DeviceID, folder string) error {
  2894. var removedPendingFolders []map[string]string
  2895. if device == protocol.EmptyDeviceID {
  2896. l.Debugf("Discarding pending removed folder %s from all devices", folder)
  2897. err := m.db.RemovePendingFolder(folder)
  2898. if err != nil {
  2899. return err
  2900. }
  2901. removedPendingFolders = []map[string]string{
  2902. {"folderID": folder},
  2903. }
  2904. } else {
  2905. l.Debugf("Discarding pending folder %s from device %v", folder, device)
  2906. err := m.db.RemovePendingFolderForDevice(folder, device)
  2907. if err != nil {
  2908. return err
  2909. }
  2910. removedPendingFolders = []map[string]string{
  2911. {
  2912. "folderID": folder,
  2913. "deviceID": device.String(),
  2914. },
  2915. }
  2916. }
  2917. if len(removedPendingFolders) > 0 {
  2918. m.evLogger.Log(events.PendingFoldersChanged, map[string]interface{}{
  2919. "removed": removedPendingFolders,
  2920. })
  2921. }
  2922. return nil
  2923. }
  2924. // mapFolders returns a map of folder ID to folder configuration for the given
  2925. // slice of folder configurations.
  2926. func mapFolders(folders []config.FolderConfiguration) map[string]config.FolderConfiguration {
  2927. m := make(map[string]config.FolderConfiguration, len(folders))
  2928. for _, cfg := range folders {
  2929. m[cfg.ID] = cfg
  2930. }
  2931. return m
  2932. }
  2933. // mapDevices returns a map of device ID to nothing for the given slice of
  2934. // device IDs.
  2935. func mapDevices(devices []protocol.DeviceID) map[protocol.DeviceID]struct{} {
  2936. m := make(map[protocol.DeviceID]struct{}, len(devices))
  2937. for _, dev := range devices {
  2938. m[dev] = struct{}{}
  2939. }
  2940. return m
  2941. }
  2942. func observedDeviceSet(devices []config.ObservedDevice) deviceIDSet {
  2943. res := make(deviceIDSet, len(devices))
  2944. for _, dev := range devices {
  2945. res[dev.ID] = struct{}{}
  2946. }
  2947. return res
  2948. }
  2949. func readOffsetIntoBuf(fs fs.Filesystem, file string, offset int64, buf []byte) (int, error) {
  2950. fd, err := fs.Open(file)
  2951. if err != nil {
  2952. l.Debugln("readOffsetIntoBuf.Open", file, err)
  2953. return 0, err
  2954. }
  2955. defer fd.Close()
  2956. n, err := fd.ReadAt(buf, offset)
  2957. if err != nil {
  2958. l.Debugln("readOffsetIntoBuf.ReadAt", file, err)
  2959. }
  2960. return n, err
  2961. }
  2962. // folderDeviceSet is a set of (folder, deviceID) pairs
  2963. type folderDeviceSet map[string]map[protocol.DeviceID]struct{}
  2964. // set adds the (dev, folder) pair to the set
  2965. func (s folderDeviceSet) set(dev protocol.DeviceID, folder string) {
  2966. devs, ok := s[folder]
  2967. if !ok {
  2968. devs = make(map[protocol.DeviceID]struct{})
  2969. s[folder] = devs
  2970. }
  2971. devs[dev] = struct{}{}
  2972. }
  2973. // has returns true if the (dev, folder) pair is in the set
  2974. func (s folderDeviceSet) has(dev protocol.DeviceID, folder string) bool {
  2975. _, ok := s[folder][dev]
  2976. return ok
  2977. }
  2978. // hasDevice returns true if the device is set on any folder
  2979. func (s folderDeviceSet) hasDevice(dev protocol.DeviceID) bool {
  2980. for _, devices := range s {
  2981. if _, ok := devices[dev]; ok {
  2982. return true
  2983. }
  2984. }
  2985. return false
  2986. }
  2987. // syncMutexMap is a type safe wrapper for a sync.Map that holds mutexes
  2988. type syncMutexMap struct {
  2989. inner stdsync.Map
  2990. }
  2991. func (m *syncMutexMap) Get(key string) sync.Mutex {
  2992. v, _ := m.inner.LoadOrStore(key, sync.NewMutex())
  2993. return v.(sync.Mutex)
  2994. }
  2995. type deviceIDSet map[protocol.DeviceID]struct{}
  2996. func (s deviceIDSet) add(ids []protocol.DeviceID) {
  2997. for _, id := range ids {
  2998. if _, ok := s[id]; !ok {
  2999. s[id] = struct{}{}
  3000. }
  3001. }
  3002. }
  3003. func (s deviceIDSet) AsSlice() []protocol.DeviceID {
  3004. ids := make([]protocol.DeviceID, 0, len(s))
  3005. for id := range s {
  3006. ids = append(ids, id)
  3007. }
  3008. return ids
  3009. }
  3010. func encryptionTokenPath(cfg config.FolderConfiguration) string {
  3011. return filepath.Join(cfg.MarkerName, config.EncryptionTokenName)
  3012. }
  3013. type storedEncryptionToken struct {
  3014. FolderID string
  3015. Token []byte
  3016. }
  3017. func readEncryptionToken(cfg config.FolderConfiguration) ([]byte, error) {
  3018. fd, err := cfg.Filesystem(nil).Open(encryptionTokenPath(cfg))
  3019. if err != nil {
  3020. return nil, err
  3021. }
  3022. defer fd.Close()
  3023. var stored storedEncryptionToken
  3024. if err := json.NewDecoder(fd).Decode(&stored); err != nil {
  3025. return nil, err
  3026. }
  3027. return stored.Token, nil
  3028. }
  3029. func writeEncryptionToken(token []byte, cfg config.FolderConfiguration) error {
  3030. tokenName := encryptionTokenPath(cfg)
  3031. fd, err := cfg.Filesystem(nil).OpenFile(tokenName, fs.OptReadWrite|fs.OptCreate, 0o666)
  3032. if err != nil {
  3033. return err
  3034. }
  3035. defer fd.Close()
  3036. return json.NewEncoder(fd).Encode(storedEncryptionToken{
  3037. FolderID: cfg.ID,
  3038. Token: token,
  3039. })
  3040. }
  3041. func newFolderConfiguration(w config.Wrapper, id, label string, fsType fs.FilesystemType, path string) config.FolderConfiguration {
  3042. fcfg := w.DefaultFolder()
  3043. fcfg.ID = id
  3044. fcfg.Label = label
  3045. fcfg.FilesystemType = fsType
  3046. fcfg.Path = path
  3047. return fcfg
  3048. }
  3049. type updatedPendingFolder struct {
  3050. FolderID string `json:"folderID"`
  3051. FolderLabel string `json:"folderLabel"`
  3052. DeviceID protocol.DeviceID `json:"deviceID"`
  3053. ReceiveEncrypted bool `json:"receiveEncrypted"`
  3054. RemoteEncrypted bool `json:"remoteEncrypted"`
  3055. }
  3056. // redactPathError checks if the error is actually a os.PathError, and if yes
  3057. // returns a redactedError with the path removed.
  3058. func redactPathError(err error) (error, bool) {
  3059. perr, ok := err.(*os.PathError)
  3060. if !ok {
  3061. return nil, false
  3062. }
  3063. return &redactedError{
  3064. error: err,
  3065. redacted: fmt.Errorf("%v: %w", perr.Op, perr.Err),
  3066. }, true
  3067. }
  3068. type redactedError struct {
  3069. error
  3070. redacted error
  3071. }
  3072. func without[E comparable, S ~[]E](s S, e E) S {
  3073. for i, x := range s {
  3074. if x == e {
  3075. return append(s[:i], s[i+1:]...)
  3076. }
  3077. }
  3078. return s
  3079. }