mirror of
https://github.com/octoleo/syncthing.git
synced 2024-11-20 03:51:00 +00:00
65aaa607ab
Change made by: - running "gvt fetch" on each of the packages mentioned in Godeps/Godeps.json - `rm -rf Godeps` - tweaking the build scripts to not mention Godeps - tweaking the build scripts to test `./lib/...`, `./cmd/...` explicitly (to avoid testing vendor) - tweaking the build scripts to not juggle GOPATH for Godeps and instead set GO15VENDOREXPERIMENT. This also results in some updated packages at the same time I bet. Building with Go 1.3 and 1.4 still *works* but won't use our vendored dependencies - the user needs to have the actual packages in their GOPATH then, which they'll get with a normal "go get". Building with Go 1.6+ will get our vendored dependencies by default even when not using our build script, which is nice. By doing this we gain some freedom in that we can pick and choose manually what to include in vendor, as it's not based on just dependency analysis of our own code. This is also a risk as we might pick up dependencies we are unaware of, as the build may work locally with those packages present in GOPATH. On the other hand the build server will detect this as it has no packages in it's GOPATH beyond what is included in the repo. Recommended tool to manage dependencies is github.com/FiloSottile/gvt.
289 lines
7.3 KiB
Go
289 lines
7.3 KiB
Go
// Copyright 2013 The Go Authors. All rights reserved.
|
|
// Use of this source code is governed by a BSD-style
|
|
// license that can be found in the LICENSE file.
|
|
|
|
// +build darwin dragonfly freebsd linux netbsd openbsd windows
|
|
|
|
package ipv6
|
|
|
|
import (
|
|
"net"
|
|
"syscall"
|
|
)
|
|
|
|
// MulticastHopLimit returns the hop limit field value for outgoing
|
|
// multicast packets.
|
|
func (c *dgramOpt) MulticastHopLimit() (int, error) {
|
|
if !c.ok() {
|
|
return 0, syscall.EINVAL
|
|
}
|
|
fd, err := c.sysfd()
|
|
if err != nil {
|
|
return 0, err
|
|
}
|
|
return getInt(fd, &sockOpts[ssoMulticastHopLimit])
|
|
}
|
|
|
|
// SetMulticastHopLimit sets the hop limit field value for future
|
|
// outgoing multicast packets.
|
|
func (c *dgramOpt) SetMulticastHopLimit(hoplim int) error {
|
|
if !c.ok() {
|
|
return syscall.EINVAL
|
|
}
|
|
fd, err := c.sysfd()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return setInt(fd, &sockOpts[ssoMulticastHopLimit], hoplim)
|
|
}
|
|
|
|
// MulticastInterface returns the default interface for multicast
|
|
// packet transmissions.
|
|
func (c *dgramOpt) MulticastInterface() (*net.Interface, error) {
|
|
if !c.ok() {
|
|
return nil, syscall.EINVAL
|
|
}
|
|
fd, err := c.sysfd()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return getInterface(fd, &sockOpts[ssoMulticastInterface])
|
|
}
|
|
|
|
// SetMulticastInterface sets the default interface for future
|
|
// multicast packet transmissions.
|
|
func (c *dgramOpt) SetMulticastInterface(ifi *net.Interface) error {
|
|
if !c.ok() {
|
|
return syscall.EINVAL
|
|
}
|
|
fd, err := c.sysfd()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return setInterface(fd, &sockOpts[ssoMulticastInterface], ifi)
|
|
}
|
|
|
|
// MulticastLoopback reports whether transmitted multicast packets
|
|
// should be copied and send back to the originator.
|
|
func (c *dgramOpt) MulticastLoopback() (bool, error) {
|
|
if !c.ok() {
|
|
return false, syscall.EINVAL
|
|
}
|
|
fd, err := c.sysfd()
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
on, err := getInt(fd, &sockOpts[ssoMulticastLoopback])
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
return on == 1, nil
|
|
}
|
|
|
|
// SetMulticastLoopback sets whether transmitted multicast packets
|
|
// should be copied and send back to the originator.
|
|
func (c *dgramOpt) SetMulticastLoopback(on bool) error {
|
|
if !c.ok() {
|
|
return syscall.EINVAL
|
|
}
|
|
fd, err := c.sysfd()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return setInt(fd, &sockOpts[ssoMulticastLoopback], boolint(on))
|
|
}
|
|
|
|
// JoinGroup joins the group address group on the interface ifi.
|
|
// By default all sources that can cast data to group are accepted.
|
|
// It's possible to mute and unmute data transmission from a specific
|
|
// source by using ExcludeSourceSpecificGroup and
|
|
// IncludeSourceSpecificGroup.
|
|
// JoinGroup uses the system assigned multicast interface when ifi is
|
|
// nil, although this is not recommended because the assignment
|
|
// depends on platforms and sometimes it might require routing
|
|
// configuration.
|
|
func (c *dgramOpt) JoinGroup(ifi *net.Interface, group net.Addr) error {
|
|
if !c.ok() {
|
|
return syscall.EINVAL
|
|
}
|
|
fd, err := c.sysfd()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
grp := netAddrToIP16(group)
|
|
if grp == nil {
|
|
return errMissingAddress
|
|
}
|
|
return setGroup(fd, &sockOpts[ssoJoinGroup], ifi, grp)
|
|
}
|
|
|
|
// LeaveGroup leaves the group address group on the interface ifi
|
|
// regardless of whether the group is any-source group or
|
|
// source-specific group.
|
|
func (c *dgramOpt) LeaveGroup(ifi *net.Interface, group net.Addr) error {
|
|
if !c.ok() {
|
|
return syscall.EINVAL
|
|
}
|
|
fd, err := c.sysfd()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
grp := netAddrToIP16(group)
|
|
if grp == nil {
|
|
return errMissingAddress
|
|
}
|
|
return setGroup(fd, &sockOpts[ssoLeaveGroup], ifi, grp)
|
|
}
|
|
|
|
// JoinSourceSpecificGroup joins the source-specific group comprising
|
|
// group and source on the interface ifi.
|
|
// JoinSourceSpecificGroup uses the system assigned multicast
|
|
// interface when ifi is nil, although this is not recommended because
|
|
// the assignment depends on platforms and sometimes it might require
|
|
// routing configuration.
|
|
func (c *dgramOpt) JoinSourceSpecificGroup(ifi *net.Interface, group, source net.Addr) error {
|
|
if !c.ok() {
|
|
return syscall.EINVAL
|
|
}
|
|
fd, err := c.sysfd()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
grp := netAddrToIP16(group)
|
|
if grp == nil {
|
|
return errMissingAddress
|
|
}
|
|
src := netAddrToIP16(source)
|
|
if src == nil {
|
|
return errMissingAddress
|
|
}
|
|
return setSourceGroup(fd, &sockOpts[ssoJoinSourceGroup], ifi, grp, src)
|
|
}
|
|
|
|
// LeaveSourceSpecificGroup leaves the source-specific group on the
|
|
// interface ifi.
|
|
func (c *dgramOpt) LeaveSourceSpecificGroup(ifi *net.Interface, group, source net.Addr) error {
|
|
if !c.ok() {
|
|
return syscall.EINVAL
|
|
}
|
|
fd, err := c.sysfd()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
grp := netAddrToIP16(group)
|
|
if grp == nil {
|
|
return errMissingAddress
|
|
}
|
|
src := netAddrToIP16(source)
|
|
if src == nil {
|
|
return errMissingAddress
|
|
}
|
|
return setSourceGroup(fd, &sockOpts[ssoLeaveSourceGroup], ifi, grp, src)
|
|
}
|
|
|
|
// ExcludeSourceSpecificGroup excludes the source-specific group from
|
|
// the already joined any-source groups by JoinGroup on the interface
|
|
// ifi.
|
|
func (c *dgramOpt) ExcludeSourceSpecificGroup(ifi *net.Interface, group, source net.Addr) error {
|
|
if !c.ok() {
|
|
return syscall.EINVAL
|
|
}
|
|
fd, err := c.sysfd()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
grp := netAddrToIP16(group)
|
|
if grp == nil {
|
|
return errMissingAddress
|
|
}
|
|
src := netAddrToIP16(source)
|
|
if src == nil {
|
|
return errMissingAddress
|
|
}
|
|
return setSourceGroup(fd, &sockOpts[ssoBlockSourceGroup], ifi, grp, src)
|
|
}
|
|
|
|
// IncludeSourceSpecificGroup includes the excluded source-specific
|
|
// group by ExcludeSourceSpecificGroup again on the interface ifi.
|
|
func (c *dgramOpt) IncludeSourceSpecificGroup(ifi *net.Interface, group, source net.Addr) error {
|
|
if !c.ok() {
|
|
return syscall.EINVAL
|
|
}
|
|
fd, err := c.sysfd()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
grp := netAddrToIP16(group)
|
|
if grp == nil {
|
|
return errMissingAddress
|
|
}
|
|
src := netAddrToIP16(source)
|
|
if src == nil {
|
|
return errMissingAddress
|
|
}
|
|
return setSourceGroup(fd, &sockOpts[ssoUnblockSourceGroup], ifi, grp, src)
|
|
}
|
|
|
|
// Checksum reports whether the kernel will compute, store or verify a
|
|
// checksum for both incoming and outgoing packets. If on is true, it
|
|
// returns an offset in bytes into the data of where the checksum
|
|
// field is located.
|
|
func (c *dgramOpt) Checksum() (on bool, offset int, err error) {
|
|
if !c.ok() {
|
|
return false, 0, syscall.EINVAL
|
|
}
|
|
fd, err := c.sysfd()
|
|
if err != nil {
|
|
return false, 0, err
|
|
}
|
|
offset, err = getInt(fd, &sockOpts[ssoChecksum])
|
|
if err != nil {
|
|
return false, 0, err
|
|
}
|
|
if offset < 0 {
|
|
return false, 0, nil
|
|
}
|
|
return true, offset, nil
|
|
}
|
|
|
|
// SetChecksum enables the kernel checksum processing. If on is ture,
|
|
// the offset should be an offset in bytes into the data of where the
|
|
// checksum field is located.
|
|
func (c *dgramOpt) SetChecksum(on bool, offset int) error {
|
|
if !c.ok() {
|
|
return syscall.EINVAL
|
|
}
|
|
fd, err := c.sysfd()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if !on {
|
|
offset = -1
|
|
}
|
|
return setInt(fd, &sockOpts[ssoChecksum], offset)
|
|
}
|
|
|
|
// ICMPFilter returns an ICMP filter.
|
|
func (c *dgramOpt) ICMPFilter() (*ICMPFilter, error) {
|
|
if !c.ok() {
|
|
return nil, syscall.EINVAL
|
|
}
|
|
fd, err := c.sysfd()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return getICMPFilter(fd, &sockOpts[ssoICMPFilter])
|
|
}
|
|
|
|
// SetICMPFilter deploys the ICMP filter.
|
|
func (c *dgramOpt) SetICMPFilter(f *ICMPFilter) error {
|
|
if !c.ok() {
|
|
return syscall.EINVAL
|
|
}
|
|
fd, err := c.sysfd()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return setICMPFilter(fd, &sockOpts[ssoICMPFilter], f)
|
|
}
|