tcp_listen.go 5.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238
  1. // Copyright (C) 2016 The Syncthing Authors.
  2. //
  3. // This Source Code Form is subject to the terms of the Mozilla Public
  4. // License, v. 2.0. If a copy of the MPL was not distributed with this file,
  5. // You can obtain one at https://mozilla.org/MPL/2.0/.
  6. package connections
  7. import (
  8. "context"
  9. "crypto/tls"
  10. "errors"
  11. "log/slog"
  12. "net"
  13. "net/url"
  14. "sync"
  15. "time"
  16. "github.com/syncthing/syncthing/internal/slogutil"
  17. "github.com/syncthing/syncthing/lib/config"
  18. "github.com/syncthing/syncthing/lib/connections/registry"
  19. "github.com/syncthing/syncthing/lib/dialer"
  20. "github.com/syncthing/syncthing/lib/nat"
  21. "github.com/syncthing/syncthing/lib/svcutil"
  22. )
  23. func init() {
  24. factory := &tcpListenerFactory{}
  25. for _, scheme := range []string{"tcp", "tcp4", "tcp6"} {
  26. listeners[scheme] = factory
  27. }
  28. }
  29. type tcpListener struct {
  30. svcutil.ServiceWithError
  31. onAddressesChangedNotifier
  32. uri *url.URL
  33. cfg config.Wrapper
  34. tlsCfg *tls.Config
  35. conns chan internalConn
  36. factory listenerFactory
  37. registry *registry.Registry
  38. lanChecker *lanChecker
  39. natService *nat.Service
  40. mapping *nat.Mapping
  41. laddr net.Addr
  42. mut sync.RWMutex
  43. }
  44. func (t *tcpListener) serve(ctx context.Context) error {
  45. tcaddr, err := net.ResolveTCPAddr(t.uri.Scheme, t.uri.Host)
  46. if err != nil {
  47. slog.WarnContext(ctx, "Failed to listen (TCP)", slogutil.Error(err))
  48. return err
  49. }
  50. lc := net.ListenConfig{
  51. Control: dialer.ReusePortControl,
  52. }
  53. listener, err := lc.Listen(context.TODO(), t.uri.Scheme, tcaddr.String())
  54. if err != nil {
  55. slog.WarnContext(ctx, "Failed to listen (TCP)", slogutil.Error(err))
  56. return err
  57. }
  58. defer listener.Close()
  59. // We might bind to :0, so use the port we've been given.
  60. tcaddr = listener.Addr().(*net.TCPAddr)
  61. t.notifyAddressesChanged(t)
  62. defer t.clearAddresses(t)
  63. t.registry.Register(t.uri.Scheme, tcaddr)
  64. defer t.registry.Unregister(t.uri.Scheme, tcaddr)
  65. slog.InfoContext(ctx, "TCP listener starting", slogutil.Address(tcaddr))
  66. defer slog.InfoContext(ctx, "TCP listener shutting down", slogutil.Address(tcaddr))
  67. var ipVersion nat.IPVersion
  68. if t.uri.Scheme == "tcp4" {
  69. ipVersion = nat.IPv4Only
  70. } else if t.uri.Scheme == "tcp6" {
  71. ipVersion = nat.IPv6Only
  72. } else {
  73. ipVersion = nat.IPvAny
  74. }
  75. mapping := t.natService.NewMapping(nat.TCP, ipVersion, tcaddr.IP, tcaddr.Port)
  76. mapping.OnChanged(func() {
  77. t.notifyAddressesChanged(t)
  78. })
  79. // Should be called after t.mapping is nil'ed out.
  80. defer t.natService.RemoveMapping(mapping)
  81. t.mut.Lock()
  82. t.mapping = mapping
  83. t.laddr = tcaddr
  84. t.mut.Unlock()
  85. defer func() {
  86. t.mut.Lock()
  87. t.mapping = nil
  88. t.laddr = nil
  89. t.mut.Unlock()
  90. }()
  91. acceptFailures := 0
  92. const maxAcceptFailures = 10
  93. // :(, but what can you do.
  94. tcpListener := listener.(*net.TCPListener)
  95. for {
  96. _ = tcpListener.SetDeadline(time.Now().Add(time.Second))
  97. conn, err := tcpListener.Accept()
  98. select {
  99. case <-ctx.Done():
  100. if err == nil {
  101. conn.Close()
  102. }
  103. return nil
  104. default:
  105. }
  106. if err != nil {
  107. var ne *net.OpError
  108. if ok := errors.As(err, &ne); !ok || !ne.Timeout() {
  109. slog.WarnContext(ctx, "Failed to accept TCP connection", slogutil.Error(err))
  110. acceptFailures++
  111. if acceptFailures > maxAcceptFailures {
  112. // Return to restart the listener, because something
  113. // seems permanently damaged.
  114. return err
  115. }
  116. // Slightly increased delay for each failure.
  117. time.Sleep(time.Duration(acceptFailures) * time.Second)
  118. }
  119. continue
  120. }
  121. acceptFailures = 0
  122. l.Debugln("Listen (BEP/tcp): connect from", conn.RemoteAddr())
  123. if err := dialer.SetTCPOptions(conn); err != nil {
  124. l.Debugln("Listen (BEP/tcp): setting tcp options:", err)
  125. }
  126. if tc := t.cfg.Options().TrafficClass; tc != 0 {
  127. if err := dialer.SetTrafficClass(conn, tc); err != nil {
  128. l.Debugln("Listen (BEP/tcp): setting traffic class:", err)
  129. }
  130. }
  131. tc := tls.Server(conn, t.tlsCfg)
  132. if err := tlsTimedHandshake(tc); err != nil {
  133. slog.WarnContext(ctx, "Failed TLS handshake", slogutil.Address(tc.RemoteAddr()), slogutil.Error(err))
  134. tc.Close()
  135. continue
  136. }
  137. priority := t.cfg.Options().ConnectionPriorityTCPWAN
  138. isLocal := t.lanChecker.isLAN(conn.RemoteAddr())
  139. if isLocal {
  140. priority = t.cfg.Options().ConnectionPriorityTCPLAN
  141. }
  142. t.conns <- newInternalConn(tc, connTypeTCPServer, isLocal, priority)
  143. }
  144. }
  145. func (t *tcpListener) URI() *url.URL {
  146. return t.uri
  147. }
  148. func (t *tcpListener) WANAddresses() []*url.URL {
  149. t.mut.RLock()
  150. uris := []*url.URL{
  151. maybeReplacePort(t.uri, t.laddr),
  152. }
  153. uris = append(uris, portMappingURIs(t.mapping, *t.uri)...)
  154. t.mut.RUnlock()
  155. // If we support ReusePort, add an unspecified zero port address, which will be resolved by the discovery server
  156. // in hopes that TCP punch through works.
  157. if dialer.SupportsReusePort {
  158. uri := *t.uri
  159. uri.Host = "0.0.0.0:0"
  160. uris = append([]*url.URL{&uri}, uris...)
  161. }
  162. return uris
  163. }
  164. func (t *tcpListener) LANAddresses() []*url.URL {
  165. t.mut.RLock()
  166. uri := maybeReplacePort(t.uri, t.laddr)
  167. t.mut.RUnlock()
  168. addrs := []*url.URL{uri}
  169. addrs = append(addrs, getURLsForAllAdaptersIfUnspecified(uri.Scheme, uri)...)
  170. return addrs
  171. }
  172. func (t *tcpListener) String() string {
  173. return t.uri.String()
  174. }
  175. func (t *tcpListener) Factory() listenerFactory {
  176. return t.factory
  177. }
  178. func (*tcpListener) NATType() string {
  179. return "unknown"
  180. }
  181. type tcpListenerFactory struct{}
  182. func (f *tcpListenerFactory) New(uri *url.URL, cfg config.Wrapper, tlsCfg *tls.Config, conns chan internalConn, natService *nat.Service, registry *registry.Registry, lanChecker *lanChecker) genericListener {
  183. l := &tcpListener{
  184. uri: fixupPort(uri, config.DefaultTCPPort),
  185. cfg: cfg,
  186. tlsCfg: tlsCfg,
  187. conns: conns,
  188. natService: natService,
  189. factory: f,
  190. registry: registry,
  191. lanChecker: lanChecker,
  192. }
  193. l.ServiceWithError = svcutil.AsService(l.serve, l.String())
  194. return l
  195. }
  196. func (tcpListenerFactory) Valid(_ config.Configuration) error {
  197. // Always valid
  198. return nil
  199. }