mirror of
https://github.com/octoleo/syncthing.git
synced 2024-11-19 03:25:16 +00:00
ab0eb909a2
* lib/connections: Cache isLAN decision for later external access. The check whether a remote device's address is on a local network currently happens when handling the Hello message, to configure the limiters. Save the result to the ConnectionInfo and pass it out as part of the model's ConnectionInfo struct in ConnectionStats(). * gui: Use provided connection attribute to distinguish LAN / WAN. Replace the dumb IP address check which didn't catch common cases and actually could contradict what the backend decided. That could have been confusing if the GUI says WAN, but the limiter is not actually applied because the backend thinks it's a LAN. Add strings for QUIC and relay connections to also differentiate between LAN and WAN. * gui: Redefine reception level icons for all connection types. Move the mapping to the JS code, as it is much easier to handle multiple switch cases by fall-through there. QUIC is regarded no less than TCP anymore. LAN and WAN make the difference between levels 4 / 3 and 2 / 1: {TCP,QUIC} LAN --> {TCP,QUIC} WAN --> Relay LAN --> Relay WAN --> Disconnected.
247 lines
6.1 KiB
Go
247 lines
6.1 KiB
Go
// Copyright (C) 2016 The Syncthing Authors.
|
|
//
|
|
// This Source Code Form is subject to the terms of the Mozilla Public
|
|
// License, v. 2.0. If a copy of the MPL was not distributed with this file,
|
|
// You can obtain one at https://mozilla.org/MPL/2.0/.
|
|
|
|
package connections
|
|
|
|
import (
|
|
"context"
|
|
"crypto/tls"
|
|
"fmt"
|
|
"io"
|
|
"net"
|
|
"net/url"
|
|
"time"
|
|
|
|
"github.com/syncthing/syncthing/lib/config"
|
|
"github.com/syncthing/syncthing/lib/connections/registry"
|
|
"github.com/syncthing/syncthing/lib/nat"
|
|
"github.com/syncthing/syncthing/lib/osutil"
|
|
"github.com/syncthing/syncthing/lib/protocol"
|
|
"github.com/syncthing/syncthing/lib/stats"
|
|
|
|
"github.com/thejerf/suture/v4"
|
|
)
|
|
|
|
type tlsConn interface {
|
|
io.ReadWriteCloser
|
|
ConnectionState() tls.ConnectionState
|
|
RemoteAddr() net.Addr
|
|
SetDeadline(time.Time) error
|
|
SetWriteDeadline(time.Time) error
|
|
LocalAddr() net.Addr
|
|
}
|
|
|
|
// internalConn is the raw TLS connection plus some metadata on where it
|
|
// came from (type, priority).
|
|
type internalConn struct {
|
|
tlsConn
|
|
connType connType
|
|
isLocal bool
|
|
priority int
|
|
establishedAt time.Time
|
|
}
|
|
|
|
type connType int
|
|
|
|
const (
|
|
connTypeRelayClient connType = iota
|
|
connTypeRelayServer
|
|
connTypeTCPClient
|
|
connTypeTCPServer
|
|
connTypeQUICClient
|
|
connTypeQUICServer
|
|
)
|
|
|
|
func (t connType) String() string {
|
|
switch t {
|
|
case connTypeRelayClient:
|
|
return "relay-client"
|
|
case connTypeRelayServer:
|
|
return "relay-server"
|
|
case connTypeTCPClient:
|
|
return "tcp-client"
|
|
case connTypeTCPServer:
|
|
return "tcp-server"
|
|
case connTypeQUICClient:
|
|
return "quic-client"
|
|
case connTypeQUICServer:
|
|
return "quic-server"
|
|
default:
|
|
return "unknown-type"
|
|
}
|
|
}
|
|
|
|
func (t connType) Transport() string {
|
|
switch t {
|
|
case connTypeRelayClient, connTypeRelayServer:
|
|
return "relay"
|
|
case connTypeTCPClient, connTypeTCPServer:
|
|
return "tcp"
|
|
case connTypeQUICClient, connTypeQUICServer:
|
|
return "quic"
|
|
default:
|
|
return "unknown"
|
|
}
|
|
}
|
|
|
|
func newInternalConn(tc tlsConn, connType connType, priority int) internalConn {
|
|
return internalConn{
|
|
tlsConn: tc,
|
|
connType: connType,
|
|
priority: priority,
|
|
establishedAt: time.Now().Truncate(time.Second),
|
|
}
|
|
}
|
|
|
|
func (c internalConn) Close() error {
|
|
// *tls.Conn.Close() does more than it says on the tin. Specifically, it
|
|
// sends a TLS alert message, which might block forever if the
|
|
// connection is dead and we don't have a deadline set.
|
|
_ = c.SetWriteDeadline(time.Now().Add(250 * time.Millisecond))
|
|
return c.tlsConn.Close()
|
|
}
|
|
|
|
func (c internalConn) Type() string {
|
|
return c.connType.String()
|
|
}
|
|
|
|
func (c internalConn) IsLocal() bool {
|
|
return c.isLocal
|
|
}
|
|
|
|
func (c internalConn) Priority() int {
|
|
return c.priority
|
|
}
|
|
|
|
func (c internalConn) Crypto() string {
|
|
cs := c.ConnectionState()
|
|
return fmt.Sprintf("%s-%s", tlsVersionNames[cs.Version], tlsCipherSuiteNames[cs.CipherSuite])
|
|
}
|
|
|
|
func (c internalConn) Transport() string {
|
|
transport := c.connType.Transport()
|
|
ip, err := osutil.IPFromAddr(c.LocalAddr())
|
|
if err != nil {
|
|
return transport
|
|
}
|
|
if ip.To4() != nil {
|
|
return transport + "4"
|
|
}
|
|
return transport + "6"
|
|
}
|
|
|
|
func (c internalConn) EstablishedAt() time.Time {
|
|
return c.establishedAt
|
|
}
|
|
|
|
func (c internalConn) String() string {
|
|
return fmt.Sprintf("%s-%s/%s/%s", c.LocalAddr(), c.RemoteAddr(), c.Type(), c.Crypto())
|
|
}
|
|
|
|
type dialerFactory interface {
|
|
New(config.OptionsConfiguration, *tls.Config, *registry.Registry) genericDialer
|
|
Priority() int
|
|
AlwaysWAN() bool
|
|
Valid(config.Configuration) error
|
|
String() string
|
|
}
|
|
|
|
type commonDialer struct {
|
|
trafficClass int
|
|
reconnectInterval time.Duration
|
|
tlsCfg *tls.Config
|
|
}
|
|
|
|
func (d *commonDialer) RedialFrequency() time.Duration {
|
|
return d.reconnectInterval
|
|
}
|
|
|
|
type genericDialer interface {
|
|
Dial(context.Context, protocol.DeviceID, *url.URL) (internalConn, error)
|
|
RedialFrequency() time.Duration
|
|
}
|
|
|
|
type listenerFactory interface {
|
|
New(*url.URL, config.Wrapper, *tls.Config, chan internalConn, *nat.Service, *registry.Registry) genericListener
|
|
Valid(config.Configuration) error
|
|
}
|
|
|
|
type ListenerAddresses struct {
|
|
URI *url.URL
|
|
WANAddresses []*url.URL
|
|
LANAddresses []*url.URL
|
|
}
|
|
|
|
type genericListener interface {
|
|
suture.Service
|
|
URI() *url.URL
|
|
// A given address can potentially be mutated by the listener.
|
|
// For example we bind to tcp://0.0.0.0, but that for example might return
|
|
// tcp://gateway1.ip and tcp://gateway2.ip as WAN addresses due to there
|
|
// being multiple gateways, and us managing to get a UPnP mapping on both
|
|
// and tcp://192.168.0.1 and tcp://10.0.0.1 due to there being multiple
|
|
// network interfaces. (The later case for LAN addresses is made up just
|
|
// to provide an example)
|
|
WANAddresses() []*url.URL
|
|
LANAddresses() []*url.URL
|
|
Error() error
|
|
OnAddressesChanged(func(ListenerAddresses))
|
|
String() string
|
|
Factory() listenerFactory
|
|
NATType() string
|
|
}
|
|
|
|
type Model interface {
|
|
protocol.Model
|
|
AddConnection(conn protocol.Connection, hello protocol.Hello)
|
|
NumConnections() int
|
|
Connection(remoteID protocol.DeviceID) (protocol.Connection, bool)
|
|
OnHello(protocol.DeviceID, net.Addr, protocol.Hello) error
|
|
GetHello(protocol.DeviceID) protocol.HelloIntf
|
|
DeviceStatistics() (map[protocol.DeviceID]stats.DeviceStatistics, error)
|
|
}
|
|
|
|
type onAddressesChangedNotifier struct {
|
|
callbacks []func(ListenerAddresses)
|
|
}
|
|
|
|
func (o *onAddressesChangedNotifier) OnAddressesChanged(callback func(ListenerAddresses)) {
|
|
o.callbacks = append(o.callbacks, callback)
|
|
}
|
|
|
|
func (o *onAddressesChangedNotifier) notifyAddressesChanged(l genericListener) {
|
|
o.notifyAddresses(ListenerAddresses{
|
|
URI: l.URI(),
|
|
WANAddresses: l.WANAddresses(),
|
|
LANAddresses: l.LANAddresses(),
|
|
})
|
|
}
|
|
|
|
func (o *onAddressesChangedNotifier) clearAddresses(l genericListener) {
|
|
o.notifyAddresses(ListenerAddresses{
|
|
URI: l.URI(),
|
|
})
|
|
}
|
|
|
|
func (o *onAddressesChangedNotifier) notifyAddresses(l ListenerAddresses) {
|
|
for _, callback := range o.callbacks {
|
|
callback(l)
|
|
}
|
|
}
|
|
|
|
type dialTarget struct {
|
|
addr string
|
|
dialer genericDialer
|
|
priority int
|
|
uri *url.URL
|
|
deviceID protocol.DeviceID
|
|
}
|
|
|
|
func (t dialTarget) Dial(ctx context.Context) (internalConn, error) {
|
|
l.Debugln("dialing", t.deviceID, t.uri, "prio", t.priority)
|
|
return t.dialer.Dial(ctx, t.deviceID, t.uri)
|
|
}
|