tcp_listen.go 4.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194
  1. // Copyright (C) 2016 The Syncthing Authors.
  2. //
  3. // This Source Code Form is subject to the terms of the Mozilla Public
  4. // License, v. 2.0. If a copy of the MPL was not distributed with this file,
  5. // You can obtain one at https://mozilla.org/MPL/2.0/.
  6. package connections
  7. import (
  8. "context"
  9. "crypto/tls"
  10. "net"
  11. "net/url"
  12. "sync"
  13. "time"
  14. "github.com/syncthing/syncthing/lib/config"
  15. "github.com/syncthing/syncthing/lib/dialer"
  16. "github.com/syncthing/syncthing/lib/nat"
  17. "github.com/syncthing/syncthing/lib/util"
  18. )
  19. func init() {
  20. factory := &tcpListenerFactory{}
  21. for _, scheme := range []string{"tcp", "tcp4", "tcp6"} {
  22. listeners[scheme] = factory
  23. }
  24. }
  25. type tcpListener struct {
  26. util.ServiceWithError
  27. onAddressesChangedNotifier
  28. uri *url.URL
  29. cfg config.Wrapper
  30. tlsCfg *tls.Config
  31. conns chan internalConn
  32. factory listenerFactory
  33. natService *nat.Service
  34. mapping *nat.Mapping
  35. mut sync.RWMutex
  36. }
  37. func (t *tcpListener) serve(ctx context.Context) error {
  38. tcaddr, err := net.ResolveTCPAddr(t.uri.Scheme, t.uri.Host)
  39. if err != nil {
  40. l.Infoln("Listen (BEP/tcp):", err)
  41. return err
  42. }
  43. listener, err := net.ListenTCP(t.uri.Scheme, tcaddr)
  44. if err != nil {
  45. l.Infoln("Listen (BEP/tcp):", err)
  46. return err
  47. }
  48. defer listener.Close()
  49. l.Infof("TCP listener (%v) starting", listener.Addr())
  50. defer l.Infof("TCP listener (%v) shutting down", listener.Addr())
  51. mapping := t.natService.NewMapping(nat.TCP, tcaddr.IP, tcaddr.Port)
  52. mapping.OnChanged(func(_ *nat.Mapping, _, _ []nat.Address) {
  53. t.notifyAddressesChanged(t)
  54. })
  55. defer t.natService.RemoveMapping(mapping)
  56. t.mut.Lock()
  57. t.mapping = mapping
  58. t.mut.Unlock()
  59. acceptFailures := 0
  60. const maxAcceptFailures = 10
  61. for {
  62. listener.SetDeadline(time.Now().Add(time.Second))
  63. conn, err := listener.Accept()
  64. select {
  65. case <-ctx.Done():
  66. if err == nil {
  67. conn.Close()
  68. }
  69. t.mut.Lock()
  70. t.mapping = nil
  71. t.mut.Unlock()
  72. return nil
  73. default:
  74. }
  75. if err != nil {
  76. if err, ok := err.(*net.OpError); !ok || !err.Timeout() {
  77. l.Warnln("Listen (BEP/tcp): Accepting connection:", err)
  78. acceptFailures++
  79. if acceptFailures > maxAcceptFailures {
  80. // Return to restart the listener, because something
  81. // seems permanently damaged.
  82. return err
  83. }
  84. // Slightly increased delay for each failure.
  85. time.Sleep(time.Duration(acceptFailures) * time.Second)
  86. }
  87. continue
  88. }
  89. acceptFailures = 0
  90. l.Debugln("Listen (BEP/tcp): connect from", conn.RemoteAddr())
  91. if err := dialer.SetTCPOptions(conn); err != nil {
  92. l.Debugln("Listen (BEP/tcp): setting tcp options:", err)
  93. }
  94. if tc := t.cfg.Options().TrafficClass; tc != 0 {
  95. if err := dialer.SetTrafficClass(conn, tc); err != nil {
  96. l.Debugln("Listen (BEP/tcp): setting traffic class:", err)
  97. }
  98. }
  99. tc := tls.Server(conn, t.tlsCfg)
  100. if err := tlsTimedHandshake(tc); err != nil {
  101. l.Infoln("Listen (BEP/tcp): TLS handshake:", err)
  102. tc.Close()
  103. continue
  104. }
  105. t.conns <- internalConn{tc, connTypeTCPServer, tcpPriority}
  106. }
  107. }
  108. func (t *tcpListener) URI() *url.URL {
  109. return t.uri
  110. }
  111. func (t *tcpListener) WANAddresses() []*url.URL {
  112. uris := t.LANAddresses()
  113. t.mut.RLock()
  114. if t.mapping != nil {
  115. addrs := t.mapping.ExternalAddresses()
  116. for _, addr := range addrs {
  117. uri := *t.uri
  118. // Does net.JoinHostPort internally
  119. uri.Host = addr.String()
  120. uris = append(uris, &uri)
  121. // For every address with a specified IP, add one without an IP,
  122. // just in case the specified IP is still internal (router behind DMZ).
  123. if len(addr.IP) != 0 && !addr.IP.IsUnspecified() {
  124. uri = *t.uri
  125. addr.IP = nil
  126. uri.Host = addr.String()
  127. uris = append(uris, &uri)
  128. }
  129. }
  130. }
  131. t.mut.RUnlock()
  132. return uris
  133. }
  134. func (t *tcpListener) LANAddresses() []*url.URL {
  135. return []*url.URL{t.uri}
  136. }
  137. func (t *tcpListener) String() string {
  138. return t.uri.String()
  139. }
  140. func (t *tcpListener) Factory() listenerFactory {
  141. return t.factory
  142. }
  143. func (t *tcpListener) NATType() string {
  144. return "unknown"
  145. }
  146. type tcpListenerFactory struct{}
  147. func (f *tcpListenerFactory) New(uri *url.URL, cfg config.Wrapper, tlsCfg *tls.Config, conns chan internalConn, natService *nat.Service) genericListener {
  148. l := &tcpListener{
  149. uri: fixupPort(uri, config.DefaultTCPPort),
  150. cfg: cfg,
  151. tlsCfg: tlsCfg,
  152. conns: conns,
  153. natService: natService,
  154. factory: f,
  155. }
  156. l.ServiceWithError = util.AsServiceWithError(l.serve, l.String())
  157. return l
  158. }
  159. func (tcpListenerFactory) Valid(_ config.Configuration) error {
  160. // Always valid
  161. return nil
  162. }