tcp_listen.go 5.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232
  1. // Copyright (C) 2016 The Syncthing Authors.
  2. //
  3. // This Source Code Form is subject to the terms of the Mozilla Public
  4. // License, v. 2.0. If a copy of the MPL was not distributed with this file,
  5. // You can obtain one at https://mozilla.org/MPL/2.0/.
  6. package connections
  7. import (
  8. "context"
  9. "crypto/tls"
  10. "net"
  11. "net/url"
  12. "sync"
  13. "time"
  14. "github.com/syncthing/syncthing/lib/config"
  15. "github.com/syncthing/syncthing/lib/connections/registry"
  16. "github.com/syncthing/syncthing/lib/dialer"
  17. "github.com/syncthing/syncthing/lib/nat"
  18. "github.com/syncthing/syncthing/lib/svcutil"
  19. )
  20. func init() {
  21. factory := &tcpListenerFactory{}
  22. for _, scheme := range []string{"tcp", "tcp4", "tcp6"} {
  23. listeners[scheme] = factory
  24. }
  25. }
  26. type tcpListener struct {
  27. svcutil.ServiceWithError
  28. onAddressesChangedNotifier
  29. uri *url.URL
  30. cfg config.Wrapper
  31. tlsCfg *tls.Config
  32. conns chan internalConn
  33. factory listenerFactory
  34. natService *nat.Service
  35. mapping *nat.Mapping
  36. laddr net.Addr
  37. mut sync.RWMutex
  38. }
  39. func (t *tcpListener) serve(ctx context.Context) error {
  40. tcaddr, err := net.ResolveTCPAddr(t.uri.Scheme, t.uri.Host)
  41. if err != nil {
  42. l.Infoln("Listen (BEP/tcp):", err)
  43. return err
  44. }
  45. lc := net.ListenConfig{
  46. Control: dialer.ReusePortControl,
  47. }
  48. listener, err := lc.Listen(context.TODO(), t.uri.Scheme, tcaddr.String())
  49. if err != nil {
  50. l.Infoln("Listen (BEP/tcp):", err)
  51. return err
  52. }
  53. defer listener.Close()
  54. // We might bind to :0, so use the port we've been given.
  55. tcaddr = listener.Addr().(*net.TCPAddr)
  56. t.notifyAddressesChanged(t)
  57. defer t.clearAddresses(t)
  58. registry.Register(t.uri.Scheme, tcaddr)
  59. defer registry.Unregister(t.uri.Scheme, tcaddr)
  60. l.Infof("TCP listener (%v) starting", tcaddr)
  61. defer l.Infof("TCP listener (%v) shutting down", tcaddr)
  62. mapping := t.natService.NewMapping(nat.TCP, tcaddr.IP, tcaddr.Port)
  63. mapping.OnChanged(func() {
  64. t.notifyAddressesChanged(t)
  65. })
  66. // Should be called after t.mapping is nil'ed out.
  67. defer t.natService.RemoveMapping(mapping)
  68. t.mut.Lock()
  69. t.mapping = mapping
  70. t.laddr = tcaddr
  71. t.mut.Unlock()
  72. defer func() {
  73. t.mut.Lock()
  74. t.mapping = nil
  75. t.laddr = nil
  76. t.mut.Unlock()
  77. }()
  78. acceptFailures := 0
  79. const maxAcceptFailures = 10
  80. // :(, but what can you do.
  81. tcpListener := listener.(*net.TCPListener)
  82. for {
  83. _ = tcpListener.SetDeadline(time.Now().Add(time.Second))
  84. conn, err := tcpListener.Accept()
  85. select {
  86. case <-ctx.Done():
  87. if err == nil {
  88. conn.Close()
  89. }
  90. return nil
  91. default:
  92. }
  93. if err != nil {
  94. if err, ok := err.(*net.OpError); !ok || !err.Timeout() {
  95. l.Warnln("Listen (BEP/tcp): Accepting connection:", err)
  96. acceptFailures++
  97. if acceptFailures > maxAcceptFailures {
  98. // Return to restart the listener, because something
  99. // seems permanently damaged.
  100. return err
  101. }
  102. // Slightly increased delay for each failure.
  103. time.Sleep(time.Duration(acceptFailures) * time.Second)
  104. }
  105. continue
  106. }
  107. acceptFailures = 0
  108. l.Debugln("Listen (BEP/tcp): connect from", conn.RemoteAddr())
  109. if err := dialer.SetTCPOptions(conn); err != nil {
  110. l.Debugln("Listen (BEP/tcp): setting tcp options:", err)
  111. }
  112. if tc := t.cfg.Options().TrafficClass; tc != 0 {
  113. if err := dialer.SetTrafficClass(conn, tc); err != nil {
  114. l.Debugln("Listen (BEP/tcp): setting traffic class:", err)
  115. }
  116. }
  117. tc := tls.Server(conn, t.tlsCfg)
  118. if err := tlsTimedHandshake(tc); err != nil {
  119. l.Infoln("Listen (BEP/tcp): TLS handshake:", err)
  120. tc.Close()
  121. continue
  122. }
  123. t.conns <- newInternalConn(tc, connTypeTCPServer, tcpPriority)
  124. }
  125. }
  126. func (t *tcpListener) URI() *url.URL {
  127. return t.uri
  128. }
  129. func (t *tcpListener) WANAddresses() []*url.URL {
  130. t.mut.RLock()
  131. uris := []*url.URL{
  132. maybeReplacePort(t.uri, t.laddr),
  133. }
  134. if t.mapping != nil {
  135. addrs := t.mapping.ExternalAddresses()
  136. for _, addr := range addrs {
  137. uri := *t.uri
  138. // Does net.JoinHostPort internally
  139. uri.Host = addr.String()
  140. uris = append(uris, &uri)
  141. // For every address with a specified IP, add one without an IP,
  142. // just in case the specified IP is still internal (router behind DMZ).
  143. if len(addr.IP) != 0 && !addr.IP.IsUnspecified() {
  144. uri = *t.uri
  145. addr.IP = nil
  146. uri.Host = addr.String()
  147. uris = append(uris, &uri)
  148. }
  149. }
  150. }
  151. t.mut.RUnlock()
  152. // If we support ReusePort, add an unspecified zero port address, which will be resolved by the discovery server
  153. // in hopes that TCP punch through works.
  154. if dialer.SupportsReusePort {
  155. uri := *t.uri
  156. uri.Host = "0.0.0.0:0"
  157. uris = append([]*url.URL{&uri}, uris...)
  158. }
  159. return uris
  160. }
  161. func (t *tcpListener) LANAddresses() []*url.URL {
  162. t.mut.RLock()
  163. uri := maybeReplacePort(t.uri, t.laddr)
  164. t.mut.RUnlock()
  165. addrs := []*url.URL{uri}
  166. addrs = append(addrs, getURLsForAllAdaptersIfUnspecified(uri.Scheme, uri)...)
  167. return addrs
  168. }
  169. func (t *tcpListener) String() string {
  170. return t.uri.String()
  171. }
  172. func (t *tcpListener) Factory() listenerFactory {
  173. return t.factory
  174. }
  175. func (t *tcpListener) NATType() string {
  176. return "unknown"
  177. }
  178. type tcpListenerFactory struct{}
  179. func (f *tcpListenerFactory) New(uri *url.URL, cfg config.Wrapper, tlsCfg *tls.Config, conns chan internalConn, natService *nat.Service) genericListener {
  180. l := &tcpListener{
  181. uri: fixupPort(uri, config.DefaultTCPPort),
  182. cfg: cfg,
  183. tlsCfg: tlsCfg,
  184. conns: conns,
  185. natService: natService,
  186. factory: f,
  187. }
  188. l.ServiceWithError = svcutil.AsService(l.serve, l.String())
  189. return l
  190. }
  191. func (tcpListenerFactory) Valid(_ config.Configuration) error {
  192. // Always valid
  193. return nil
  194. }