tcp_listen.go 4.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198
  1. // Copyright (C) 2016 The Syncthing Authors.
  2. //
  3. // This Source Code Form is subject to the terms of the Mozilla Public
  4. // License, v. 2.0. If a copy of the MPL was not distributed with this file,
  5. // You can obtain one at https://mozilla.org/MPL/2.0/.
  6. package connections
  7. import (
  8. "crypto/tls"
  9. "net"
  10. "net/url"
  11. "sync"
  12. "time"
  13. "github.com/syncthing/syncthing/lib/config"
  14. "github.com/syncthing/syncthing/lib/dialer"
  15. "github.com/syncthing/syncthing/lib/nat"
  16. )
  17. func init() {
  18. factory := &tcpListenerFactory{}
  19. for _, scheme := range []string{"tcp", "tcp4", "tcp6"} {
  20. listeners[scheme] = factory
  21. }
  22. }
  23. type tcpListener struct {
  24. onAddressesChangedNotifier
  25. uri *url.URL
  26. cfg *config.Wrapper
  27. tlsCfg *tls.Config
  28. stop chan struct{}
  29. conns chan internalConn
  30. factory listenerFactory
  31. natService *nat.Service
  32. mapping *nat.Mapping
  33. err error
  34. mut sync.RWMutex
  35. }
  36. func (t *tcpListener) Serve() {
  37. t.mut.Lock()
  38. t.err = nil
  39. t.mut.Unlock()
  40. tcaddr, err := net.ResolveTCPAddr(t.uri.Scheme, t.uri.Host)
  41. if err != nil {
  42. t.mut.Lock()
  43. t.err = err
  44. t.mut.Unlock()
  45. l.Infoln("Listen (BEP/tcp):", err)
  46. return
  47. }
  48. listener, err := net.ListenTCP(t.uri.Scheme, tcaddr)
  49. if err != nil {
  50. t.mut.Lock()
  51. t.err = err
  52. t.mut.Unlock()
  53. l.Infoln("Listen (BEP/tcp):", err)
  54. return
  55. }
  56. defer listener.Close()
  57. l.Infof("TCP listener (%v) starting", listener.Addr())
  58. defer l.Infof("TCP listener (%v) shutting down", listener.Addr())
  59. mapping := t.natService.NewMapping(nat.TCP, tcaddr.IP, tcaddr.Port)
  60. mapping.OnChanged(func(_ *nat.Mapping, _, _ []nat.Address) {
  61. t.notifyAddressesChanged(t)
  62. })
  63. defer t.natService.RemoveMapping(mapping)
  64. t.mut.Lock()
  65. t.mapping = mapping
  66. t.mut.Unlock()
  67. for {
  68. listener.SetDeadline(time.Now().Add(time.Second))
  69. conn, err := listener.Accept()
  70. select {
  71. case <-t.stop:
  72. if err == nil {
  73. conn.Close()
  74. }
  75. t.mut.Lock()
  76. t.mapping = nil
  77. t.mut.Unlock()
  78. return
  79. default:
  80. }
  81. if err != nil {
  82. if err, ok := err.(*net.OpError); !ok || !err.Timeout() {
  83. l.Warnln("Listen (BEP/tcp): Accepting connection:", err)
  84. }
  85. continue
  86. }
  87. l.Debugln("Listen (BEP/tcp): connect from", conn.RemoteAddr())
  88. if err := dialer.SetTCPOptions(conn); err != nil {
  89. l.Debugln("Listen (BEP/tcp): setting tcp options:", err)
  90. }
  91. if tc := t.cfg.Options().TrafficClass; tc != 0 {
  92. if err := dialer.SetTrafficClass(conn, tc); err != nil {
  93. l.Debugln("Listen (BEP/tcp): setting traffic class:", err)
  94. }
  95. }
  96. tc := tls.Server(conn, t.tlsCfg)
  97. if err := tlsTimedHandshake(tc); err != nil {
  98. l.Infoln("Listen (BEP/tcp): TLS handshake:", err)
  99. tc.Close()
  100. continue
  101. }
  102. t.conns <- internalConn{tc, connTypeTCPServer, tcpPriority}
  103. }
  104. }
  105. func (t *tcpListener) Stop() {
  106. close(t.stop)
  107. }
  108. func (t *tcpListener) URI() *url.URL {
  109. return t.uri
  110. }
  111. func (t *tcpListener) WANAddresses() []*url.URL {
  112. uris := t.LANAddresses()
  113. t.mut.RLock()
  114. if t.mapping != nil {
  115. addrs := t.mapping.ExternalAddresses()
  116. for _, addr := range addrs {
  117. uri := *t.uri
  118. // Does net.JoinHostPort internally
  119. uri.Host = addr.String()
  120. uris = append(uris, &uri)
  121. // For every address with a specified IP, add one without an IP,
  122. // just in case the specified IP is still internal (router behind DMZ).
  123. if len(addr.IP) != 0 && !addr.IP.IsUnspecified() {
  124. uri = *t.uri
  125. addr.IP = nil
  126. uri.Host = addr.String()
  127. uris = append(uris, &uri)
  128. }
  129. }
  130. }
  131. t.mut.RUnlock()
  132. return uris
  133. }
  134. func (t *tcpListener) LANAddresses() []*url.URL {
  135. return []*url.URL{t.uri}
  136. }
  137. func (t *tcpListener) Error() error {
  138. t.mut.RLock()
  139. err := t.err
  140. t.mut.RUnlock()
  141. return err
  142. }
  143. func (t *tcpListener) String() string {
  144. return t.uri.String()
  145. }
  146. func (t *tcpListener) Factory() listenerFactory {
  147. return t.factory
  148. }
  149. func (t *tcpListener) NATType() string {
  150. return "unknown"
  151. }
  152. type tcpListenerFactory struct{}
  153. func (f *tcpListenerFactory) New(uri *url.URL, cfg *config.Wrapper, tlsCfg *tls.Config, conns chan internalConn, natService *nat.Service) genericListener {
  154. return &tcpListener{
  155. uri: fixupPort(uri, config.DefaultTCPPort),
  156. cfg: cfg,
  157. tlsCfg: tlsCfg,
  158. conns: conns,
  159. natService: natService,
  160. stop: make(chan struct{}),
  161. factory: f,
  162. }
  163. }
  164. func (tcpListenerFactory) Enabled(cfg config.Configuration) bool {
  165. return true
  166. }