tcp_listen.go 5.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241
  1. // Copyright (C) 2016 The Syncthing Authors.
  2. //
  3. // This Source Code Form is subject to the terms of the Mozilla Public
  4. // License, v. 2.0. If a copy of the MPL was not distributed with this file,
  5. // You can obtain one at https://mozilla.org/MPL/2.0/.
  6. package connections
  7. import (
  8. "context"
  9. "crypto/tls"
  10. "net"
  11. "net/url"
  12. "sync"
  13. "time"
  14. "github.com/syncthing/syncthing/lib/config"
  15. "github.com/syncthing/syncthing/lib/connections/registry"
  16. "github.com/syncthing/syncthing/lib/dialer"
  17. "github.com/syncthing/syncthing/lib/nat"
  18. "github.com/syncthing/syncthing/lib/svcutil"
  19. )
  20. func init() {
  21. factory := &tcpListenerFactory{}
  22. for _, scheme := range []string{"tcp", "tcp4", "tcp6"} {
  23. listeners[scheme] = factory
  24. }
  25. }
  26. type tcpListener struct {
  27. svcutil.ServiceWithError
  28. onAddressesChangedNotifier
  29. uri *url.URL
  30. cfg config.Wrapper
  31. tlsCfg *tls.Config
  32. conns chan internalConn
  33. factory listenerFactory
  34. registry *registry.Registry
  35. lanChecker *lanChecker
  36. natService *nat.Service
  37. mapping *nat.Mapping
  38. laddr net.Addr
  39. mut sync.RWMutex
  40. }
  41. func (t *tcpListener) serve(ctx context.Context) error {
  42. tcaddr, err := net.ResolveTCPAddr(t.uri.Scheme, t.uri.Host)
  43. if err != nil {
  44. l.Infoln("Listen (BEP/tcp):", err)
  45. return err
  46. }
  47. lc := net.ListenConfig{
  48. Control: dialer.ReusePortControl,
  49. }
  50. listener, err := lc.Listen(context.TODO(), t.uri.Scheme, tcaddr.String())
  51. if err != nil {
  52. l.Infoln("Listen (BEP/tcp):", err)
  53. return err
  54. }
  55. defer listener.Close()
  56. // We might bind to :0, so use the port we've been given.
  57. tcaddr = listener.Addr().(*net.TCPAddr)
  58. t.notifyAddressesChanged(t)
  59. defer t.clearAddresses(t)
  60. t.registry.Register(t.uri.Scheme, tcaddr)
  61. defer t.registry.Unregister(t.uri.Scheme, tcaddr)
  62. l.Infof("TCP listener (%v) starting", tcaddr)
  63. defer l.Infof("TCP listener (%v) shutting down", tcaddr)
  64. mapping := t.natService.NewMapping(nat.TCP, tcaddr.IP, tcaddr.Port)
  65. mapping.OnChanged(func() {
  66. t.notifyAddressesChanged(t)
  67. })
  68. // Should be called after t.mapping is nil'ed out.
  69. defer t.natService.RemoveMapping(mapping)
  70. t.mut.Lock()
  71. t.mapping = mapping
  72. t.laddr = tcaddr
  73. t.mut.Unlock()
  74. defer func() {
  75. t.mut.Lock()
  76. t.mapping = nil
  77. t.laddr = nil
  78. t.mut.Unlock()
  79. }()
  80. acceptFailures := 0
  81. const maxAcceptFailures = 10
  82. // :(, but what can you do.
  83. tcpListener := listener.(*net.TCPListener)
  84. for {
  85. _ = tcpListener.SetDeadline(time.Now().Add(time.Second))
  86. conn, err := tcpListener.Accept()
  87. select {
  88. case <-ctx.Done():
  89. if err == nil {
  90. conn.Close()
  91. }
  92. return nil
  93. default:
  94. }
  95. if err != nil {
  96. if err, ok := err.(*net.OpError); !ok || !err.Timeout() {
  97. l.Warnln("Listen (BEP/tcp): Accepting connection:", err)
  98. acceptFailures++
  99. if acceptFailures > maxAcceptFailures {
  100. // Return to restart the listener, because something
  101. // seems permanently damaged.
  102. return err
  103. }
  104. // Slightly increased delay for each failure.
  105. time.Sleep(time.Duration(acceptFailures) * time.Second)
  106. }
  107. continue
  108. }
  109. acceptFailures = 0
  110. l.Debugln("Listen (BEP/tcp): connect from", conn.RemoteAddr())
  111. if err := dialer.SetTCPOptions(conn); err != nil {
  112. l.Debugln("Listen (BEP/tcp): setting tcp options:", err)
  113. }
  114. if tc := t.cfg.Options().TrafficClass; tc != 0 {
  115. if err := dialer.SetTrafficClass(conn, tc); err != nil {
  116. l.Debugln("Listen (BEP/tcp): setting traffic class:", err)
  117. }
  118. }
  119. tc := tls.Server(conn, t.tlsCfg)
  120. if err := tlsTimedHandshake(tc); err != nil {
  121. l.Infoln("Listen (BEP/tcp): TLS handshake:", err)
  122. tc.Close()
  123. continue
  124. }
  125. priority := t.cfg.Options().ConnectionPriorityTCPWAN
  126. isLocal := t.lanChecker.isLAN(conn.RemoteAddr())
  127. if isLocal {
  128. priority = t.cfg.Options().ConnectionPriorityTCPLAN
  129. }
  130. t.conns <- newInternalConn(tc, connTypeTCPServer, isLocal, priority)
  131. }
  132. }
  133. func (t *tcpListener) URI() *url.URL {
  134. return t.uri
  135. }
  136. func (t *tcpListener) WANAddresses() []*url.URL {
  137. t.mut.RLock()
  138. uris := []*url.URL{
  139. maybeReplacePort(t.uri, t.laddr),
  140. }
  141. if t.mapping != nil {
  142. addrs := t.mapping.ExternalAddresses()
  143. for _, addr := range addrs {
  144. uri := *t.uri
  145. // Does net.JoinHostPort internally
  146. uri.Host = addr.String()
  147. uris = append(uris, &uri)
  148. // For every address with a specified IP, add one without an IP,
  149. // just in case the specified IP is still internal (router behind DMZ).
  150. if len(addr.IP) != 0 && !addr.IP.IsUnspecified() {
  151. zeroUri := *t.uri
  152. addr.IP = nil
  153. zeroUri.Host = addr.String()
  154. uris = append(uris, &zeroUri)
  155. }
  156. }
  157. }
  158. t.mut.RUnlock()
  159. // If we support ReusePort, add an unspecified zero port address, which will be resolved by the discovery server
  160. // in hopes that TCP punch through works.
  161. if dialer.SupportsReusePort {
  162. uri := *t.uri
  163. uri.Host = "0.0.0.0:0"
  164. uris = append([]*url.URL{&uri}, uris...)
  165. }
  166. return uris
  167. }
  168. func (t *tcpListener) LANAddresses() []*url.URL {
  169. t.mut.RLock()
  170. uri := maybeReplacePort(t.uri, t.laddr)
  171. t.mut.RUnlock()
  172. addrs := []*url.URL{uri}
  173. addrs = append(addrs, getURLsForAllAdaptersIfUnspecified(uri.Scheme, uri)...)
  174. return addrs
  175. }
  176. func (t *tcpListener) String() string {
  177. return t.uri.String()
  178. }
  179. func (t *tcpListener) Factory() listenerFactory {
  180. return t.factory
  181. }
  182. func (*tcpListener) NATType() string {
  183. return "unknown"
  184. }
  185. type tcpListenerFactory struct{}
  186. func (f *tcpListenerFactory) New(uri *url.URL, cfg config.Wrapper, tlsCfg *tls.Config, conns chan internalConn, natService *nat.Service, registry *registry.Registry, lanChecker *lanChecker) genericListener {
  187. l := &tcpListener{
  188. uri: fixupPort(uri, config.DefaultTCPPort),
  189. cfg: cfg,
  190. tlsCfg: tlsCfg,
  191. conns: conns,
  192. natService: natService,
  193. factory: f,
  194. registry: registry,
  195. lanChecker: lanChecker,
  196. }
  197. l.ServiceWithError = svcutil.AsService(l.serve, l.String())
  198. return l
  199. }
  200. func (tcpListenerFactory) Valid(_ config.Configuration) error {
  201. // Always valid
  202. return nil
  203. }