mirror of
https://github.com/syncthing/syncthing.git
synced 2024-11-16 10:28:49 -07:00
674fc566bb
1. Removes separate relay lists and relay clients/services, just makes it a listen address 2. Easier plugging-in of other transports 3. Allows "hot" disabling and enabling NAT services 4. Allows "hot" listen address changes 5. Changes listen address list with a preferable "default" value just like for discovery 6. Debounces global discovery announcements as external addresses change (which it might alot upon starting) 7. Stops this whole "pick other peers relay by latency". This information is no longer available, but I don't think it matters as most of the time other peer only has one relay. 8. Rename ListenAddress to ListenAddresses, as well as in javascript land. 9. Stop serializing deprecated values to JSON GitHub-Pull-Request: https://github.com/syncthing/syncthing/pull/2982
328 lines
8.8 KiB
Go
328 lines
8.8 KiB
Go
// Copyright (C) 2015 The Syncthing Authors.
|
|
//
|
|
// This Source Code Form is subject to the terms of the Mozilla Public
|
|
// License, v. 2.0. If a copy of the MPL was not distributed with this file,
|
|
// You can obtain one at http://mozilla.org/MPL/2.0/.
|
|
|
|
package nat
|
|
|
|
import (
|
|
"fmt"
|
|
"math/rand"
|
|
"net"
|
|
stdsync "sync"
|
|
"time"
|
|
|
|
"github.com/syncthing/syncthing/lib/config"
|
|
"github.com/syncthing/syncthing/lib/protocol"
|
|
"github.com/syncthing/syncthing/lib/sync"
|
|
)
|
|
|
|
// Service runs a loop for discovery of IGDs (Internet Gateway Devices) and
|
|
// setup/renewal of a port mapping.
|
|
type Service struct {
|
|
id protocol.DeviceID
|
|
cfg *config.Wrapper
|
|
stop chan struct{}
|
|
|
|
mappings []*Mapping
|
|
timer *time.Timer
|
|
mut sync.RWMutex
|
|
}
|
|
|
|
func NewService(id protocol.DeviceID, cfg *config.Wrapper) *Service {
|
|
return &Service{
|
|
id: id,
|
|
cfg: cfg,
|
|
|
|
timer: time.NewTimer(0),
|
|
mut: sync.NewRWMutex(),
|
|
}
|
|
}
|
|
|
|
func (s *Service) Serve() {
|
|
announce := stdsync.Once{}
|
|
|
|
s.timer.Reset(0)
|
|
|
|
s.mut.Lock()
|
|
s.stop = make(chan struct{})
|
|
s.mut.Unlock()
|
|
|
|
for {
|
|
select {
|
|
case <-s.timer.C:
|
|
if found := s.process(); found != -1 {
|
|
announce.Do(func() {
|
|
suffix := "s"
|
|
if found == 1 {
|
|
suffix = ""
|
|
}
|
|
l.Infoln("Detected", found, "NAT device"+suffix)
|
|
})
|
|
}
|
|
case <-s.stop:
|
|
s.timer.Stop()
|
|
s.mut.RLock()
|
|
for _, mapping := range s.mappings {
|
|
mapping.clearAddresses()
|
|
}
|
|
s.mut.RUnlock()
|
|
return
|
|
}
|
|
}
|
|
}
|
|
|
|
func (s *Service) process() int {
|
|
// toRenew are mappings which are due for renewal
|
|
// toUpdate are the remaining mappings, which will only be updated if one of
|
|
// the old IGDs has gone away, or a new IGD has appeared, but only if we
|
|
// actually need to perform a renewal.
|
|
var toRenew, toUpdate []*Mapping
|
|
|
|
renewIn := time.Duration(s.cfg.Options().NATRenewalM) * time.Minute
|
|
if renewIn == 0 {
|
|
// We always want to do renewal so lets just pick a nice sane number.
|
|
renewIn = 30 * time.Minute
|
|
}
|
|
|
|
s.mut.RLock()
|
|
for _, mapping := range s.mappings {
|
|
if mapping.expires.Before(time.Now()) {
|
|
toRenew = append(toRenew, mapping)
|
|
} else {
|
|
toUpdate = append(toUpdate, mapping)
|
|
mappingRenewIn := mapping.expires.Sub(time.Now())
|
|
if mappingRenewIn < renewIn {
|
|
renewIn = mappingRenewIn
|
|
}
|
|
}
|
|
}
|
|
// Reset the timer while holding the lock, because of the following race:
|
|
// T1: process acquires lock
|
|
// T1: process checks the mappings and gets next renewal time in 30m
|
|
// T2: process releases the lock
|
|
// T2: NewMapping acquires the lock
|
|
// T2: NewMapping adds mapping
|
|
// T2: NewMapping releases the lock
|
|
// T2: NewMapping resets timer to 1s
|
|
// T1: process resets timer to 30
|
|
s.timer.Reset(renewIn)
|
|
s.mut.RUnlock()
|
|
|
|
// Don't do anything, unless we really need to renew
|
|
if len(toRenew) == 0 {
|
|
return -1
|
|
}
|
|
|
|
nats := discoverAll(time.Duration(s.cfg.Options().NATRenewalM)*time.Minute, time.Duration(s.cfg.Options().NATTimeoutS)*time.Second)
|
|
|
|
for _, mapping := range toRenew {
|
|
s.updateMapping(mapping, nats, true)
|
|
}
|
|
|
|
for _, mapping := range toUpdate {
|
|
s.updateMapping(mapping, nats, false)
|
|
}
|
|
|
|
return len(nats)
|
|
}
|
|
|
|
func (s *Service) Stop() {
|
|
s.mut.RLock()
|
|
close(s.stop)
|
|
s.mut.RUnlock()
|
|
}
|
|
|
|
func (s *Service) NewMapping(protocol Protocol, ip net.IP, port int) *Mapping {
|
|
mapping := &Mapping{
|
|
protocol: protocol,
|
|
address: Address{
|
|
IP: ip,
|
|
Port: port,
|
|
},
|
|
extAddresses: make(map[string]Address),
|
|
mut: sync.NewRWMutex(),
|
|
}
|
|
|
|
s.mut.Lock()
|
|
s.mappings = append(s.mappings, mapping)
|
|
// Reset the timer while holding the lock, see process() for explanation
|
|
s.timer.Reset(time.Second)
|
|
s.mut.Unlock()
|
|
|
|
return mapping
|
|
}
|
|
|
|
// RemoveMapping does not actually remove the mapping from the IGD, it just
|
|
// internally removes it which stops renewing the mapping. Also, it clears any
|
|
// existing mapped addresses from the mapping, which as a result should cause
|
|
// discovery to reannounce the new addresses.
|
|
func (s *Service) RemoveMapping(mapping *Mapping) {
|
|
s.mut.Lock()
|
|
defer s.mut.Unlock()
|
|
for i, existing := range s.mappings {
|
|
if existing == mapping {
|
|
mapping.clearAddresses()
|
|
last := len(s.mappings) - 1
|
|
s.mappings[i] = s.mappings[last]
|
|
s.mappings[last] = nil
|
|
s.mappings = s.mappings[:last]
|
|
return
|
|
}
|
|
}
|
|
}
|
|
|
|
// updateMapping compares the addresses of the existing mapping versus the natds
|
|
// discovered, and removes any addresses of natds that do not exist, or tries to
|
|
// acquire mappings for natds which the mapping was unaware of before.
|
|
// Optionally takes renew flag which indicates whether or not we should renew
|
|
// mappings with existing natds
|
|
func (s *Service) updateMapping(mapping *Mapping, nats map[string]Device, renew bool) {
|
|
var added, removed []Address
|
|
|
|
renewalTime := time.Duration(s.cfg.Options().NATRenewalM) * time.Minute
|
|
mapping.expires = time.Now().Add(renewalTime)
|
|
|
|
newAdded, newRemoved := s.verifyExistingMappings(mapping, nats, renew)
|
|
added = append(added, newAdded...)
|
|
removed = append(removed, newRemoved...)
|
|
|
|
newAdded, newRemoved = s.acquireNewMappings(mapping, nats)
|
|
added = append(added, newAdded...)
|
|
removed = append(removed, newRemoved...)
|
|
|
|
if len(added) > 0 || len(removed) > 0 {
|
|
mapping.notify(added, removed)
|
|
}
|
|
}
|
|
|
|
func (s *Service) verifyExistingMappings(mapping *Mapping, nats map[string]Device, renew bool) ([]Address, []Address) {
|
|
var added, removed []Address
|
|
|
|
leaseTime := time.Duration(s.cfg.Options().NATLeaseM) * time.Minute
|
|
|
|
for id, address := range mapping.addressMap() {
|
|
// Delete addresses for NATDevice's that do not exist anymore
|
|
nat, ok := nats[id]
|
|
if !ok {
|
|
mapping.removeAddress(id)
|
|
removed = append(removed, address)
|
|
continue
|
|
} else if renew {
|
|
// Only perform renewals on the nat's that have the right local IP
|
|
// address
|
|
localIP := nat.GetLocalIPAddress()
|
|
if !mapping.validGateway(localIP) {
|
|
l.Debugf("Skipping %s for %s because of IP mismatch. %s != %s", id, mapping, mapping.address.IP, localIP)
|
|
continue
|
|
}
|
|
|
|
l.Debugf("Renewing %s -> %s mapping on %s", mapping, address, id)
|
|
|
|
addr, err := s.tryNATDevice(nat, mapping.address.Port, address.Port, leaseTime)
|
|
if err != nil {
|
|
l.Debugf("Failed to renew %s -> mapping on %s", mapping, address, id)
|
|
mapping.removeAddress(id)
|
|
removed = append(removed, address)
|
|
continue
|
|
}
|
|
|
|
l.Debugf("Renewed %s -> %s mapping on %s", mapping, address, id)
|
|
|
|
if !addr.Equal(address) {
|
|
mapping.removeAddress(id)
|
|
mapping.setAddress(id, addr)
|
|
removed = append(removed, address)
|
|
added = append(added, address)
|
|
}
|
|
}
|
|
}
|
|
|
|
return added, removed
|
|
}
|
|
|
|
func (s *Service) acquireNewMappings(mapping *Mapping, nats map[string]Device) ([]Address, []Address) {
|
|
var added, removed []Address
|
|
|
|
leaseTime := time.Duration(s.cfg.Options().NATLeaseM) * time.Minute
|
|
addrMap := mapping.addressMap()
|
|
|
|
for id, nat := range nats {
|
|
if _, ok := addrMap[id]; ok {
|
|
continue
|
|
}
|
|
|
|
// Only perform mappings on the nat's that have the right local IP
|
|
// address
|
|
localIP := nat.GetLocalIPAddress()
|
|
if !mapping.validGateway(localIP) {
|
|
l.Debugf("Skipping %s for %s because of IP mismatch. %s != %s", id, mapping, mapping.address.IP, localIP)
|
|
continue
|
|
}
|
|
|
|
l.Debugf("Acquiring %s mapping on %s", mapping, id)
|
|
|
|
addr, err := s.tryNATDevice(nat, mapping.address.Port, 0, leaseTime)
|
|
if err != nil {
|
|
l.Debugf("Failed to acquire %s mapping on %s", mapping, id)
|
|
continue
|
|
}
|
|
|
|
l.Debugf("Acquired %s -> %s mapping on %s", mapping, addr, id)
|
|
|
|
mapping.setAddress(id, addr)
|
|
added = append(added, addr)
|
|
}
|
|
|
|
return added, removed
|
|
}
|
|
|
|
// tryNATDevice tries to acquire a port mapping for the given internal address to
|
|
// the given external port. If external port is 0, picks a pseudo-random port.
|
|
func (s *Service) tryNATDevice(natd Device, intPort, extPort int, leaseTime time.Duration) (Address, error) {
|
|
var err error
|
|
var port int
|
|
|
|
// Generate a predictable random which is based on device ID + local port
|
|
// number so that the ports we'd try to acquire for the mapping would always
|
|
// be the same.
|
|
predictableRand := rand.New(rand.NewSource(int64(s.id.Short()) + int64(intPort)))
|
|
|
|
if extPort != 0 {
|
|
// First try renewing our existing mapping, if we have one.
|
|
name := fmt.Sprintf("syncthing-%d", extPort)
|
|
port, err = natd.AddPortMapping(TCP, intPort, extPort, name, leaseTime)
|
|
if err == nil {
|
|
extPort = port
|
|
goto findIP
|
|
}
|
|
l.Debugln("Error extending lease on", natd.ID(), err)
|
|
}
|
|
|
|
for i := 0; i < 10; i++ {
|
|
// Then try up to ten random ports.
|
|
extPort = 1024 + predictableRand.Intn(65535-1024)
|
|
name := fmt.Sprintf("syncthing-%d", extPort)
|
|
port, err = natd.AddPortMapping(TCP, intPort, extPort, name, leaseTime)
|
|
if err == nil {
|
|
extPort = port
|
|
goto findIP
|
|
}
|
|
l.Debugln("Error getting new lease on", natd.ID(), err)
|
|
}
|
|
|
|
return Address{}, err
|
|
|
|
findIP:
|
|
ip, err := natd.GetExternalIPAddress()
|
|
if err != nil {
|
|
l.Debugln("Error getting external ip on", natd.ID(), err)
|
|
ip = nil
|
|
}
|
|
return Address{
|
|
IP: ip,
|
|
Port: extPort,
|
|
}, nil
|
|
}
|