syncthing/cmd/syncthing/main.go

1167 lines
30 KiB
Go
Raw Normal View History

2014-07-13 00:45:33 +02:00
// Copyright (C) 2014 Jakob Borg and Contributors (see the CONTRIBUTORS file).
// All rights reserved. Use of this source code is governed by an MIT-style
// license that can be found in the LICENSE file.
2014-06-01 22:50:14 +02:00
2013-12-15 11:43:31 +01:00
package main
import (
"crypto/sha1"
2013-12-15 11:43:31 +01:00
"crypto/tls"
2014-01-26 14:28:41 +01:00
"flag"
2014-01-08 14:37:33 +01:00
"fmt"
2014-04-01 20:36:54 +02:00
"io"
2013-12-15 11:43:31 +01:00
"log"
"math/rand"
2013-12-15 11:43:31 +01:00
"net"
"net/http"
_ "net/http/pprof"
"os"
"os/exec"
"path/filepath"
2014-06-23 10:38:50 +02:00
"regexp"
2014-01-10 00:09:27 +01:00
"runtime"
"runtime/debug"
2014-04-14 12:13:50 +02:00
"runtime/pprof"
2014-04-18 13:20:42 +02:00
"strconv"
2013-12-15 11:43:31 +01:00
"strings"
"time"
"code.google.com/p/go.crypto/bcrypt"
2014-04-01 20:36:54 +02:00
"github.com/juju/ratelimit"
"github.com/syncthing/syncthing/config"
"github.com/syncthing/syncthing/discover"
"github.com/syncthing/syncthing/events"
"github.com/syncthing/syncthing/logger"
"github.com/syncthing/syncthing/model"
"github.com/syncthing/syncthing/osutil"
"github.com/syncthing/syncthing/protocol"
"github.com/syncthing/syncthing/upgrade"
"github.com/syncthing/syncthing/upnp"
2014-07-06 14:46:48 +02:00
"github.com/syndtr/goleveldb/leveldb"
2013-12-15 11:43:31 +01:00
)
2014-04-19 16:38:11 +02:00
var (
2014-04-19 16:40:19 +02:00
Version = "unknown-dev"
2014-06-13 20:44:00 +02:00
BuildEnv = "default"
2014-04-19 16:40:19 +02:00
BuildStamp = "0"
BuildDate time.Time
BuildHost = "unknown"
BuildUser = "unknown"
2014-04-19 16:40:19 +02:00
LongVersion string
GoArchExtra string // "", "v5", "v6", "v7"
2014-04-19 16:38:11 +02:00
)
2014-05-15 02:08:56 +02:00
var l = logger.DefaultLogger
2014-04-19 16:38:11 +02:00
func init() {
2014-06-23 10:38:50 +02:00
if Version != "unknown-dev" {
// If not a generic dev build, version string should come from git describe
exp := regexp.MustCompile(`^v\d+\.\d+\.\d+(-[a-z0-9]+)*(\+\d+-g[0-9a-f]+)?(-dirty)?$`)
2014-06-23 10:38:50 +02:00
if !exp.MatchString(Version) {
l.Fatalf("Invalid version string %q;\n\tdoes not match regexp %v", Version, exp)
}
}
2014-04-19 16:38:11 +02:00
stamp, _ := strconv.Atoi(BuildStamp)
BuildDate = time.Unix(int64(stamp), 0)
2014-04-19 16:40:19 +02:00
date := BuildDate.UTC().Format("2006-01-02 15:04:05 MST")
2014-06-13 20:44:00 +02:00
LongVersion = fmt.Sprintf("syncthing %s (%s %s-%s %s) %s@%s %s", Version, runtime.Version(), runtime.GOOS, runtime.GOARCH, BuildEnv, BuildUser, BuildHost, date)
2014-05-15 02:08:56 +02:00
if os.Getenv("STTRACE") != "" {
logFlags = log.Ltime | log.Ldate | log.Lmicroseconds | log.Lshortfile
2014-05-15 02:08:56 +02:00
}
2014-04-19 16:38:11 +02:00
}
2013-12-18 19:36:28 +01:00
2013-12-15 11:43:31 +01:00
var (
2014-08-11 23:58:32 +02:00
cfg config.Configuration
myID protocol.NodeID
confDir string
logFlags int = log.Ltime
rateBucket *ratelimit.Bucket
stop = make(chan bool)
discoverer *discover.Discoverer
lockConn *net.TCPListener
lockPort int
externalPort int
cert tls.Certificate
2014-01-26 14:28:41 +01:00
)
const (
usage = "syncthing [options]"
extraUsage = `The value for the -logflags option is a sum of the following:
1 Date
2 Time
4 Microsecond time
8 Long filename
16 Short filename
I.e. to prefix each log line with date and time, set -logflags=3 (1 + 2 from
above). The value 0 is used to disable all of the above. The default is to
show time only (2).
The following enviroment variables are interpreted by syncthing:
STGUIADDRESS Override GUI listen address set in config. Expects protocol type
followed by hostname or an IP address, followed by a port, such
as "https://127.0.0.1:8888".
STGUIAUTH Override GUI authentication credentials set in config. Expects
a colon separated username and password, such as "admin:secret".
STGUIAPIKEY Override GUI API key set in config.
2014-04-14 12:13:50 +02:00
STNORESTART Do not attempt to restart when requested to, instead just exit.
Set this variable when running under a service manager such as
runit, launchd, etc.
STTRACE A comma separated string of facilities to trace. The valid
facility strings:
2014-05-15 05:26:55 +02:00
- "beacon" (the beacon package)
- "discover" (the discover package)
2014-07-25 14:50:14 +02:00
- "events" (the events package)
2014-05-15 05:26:55 +02:00
- "files" (the files package)
2014-05-21 20:36:21 +02:00
- "net" (the main package; connections & network messages)
- "model" (the model package)
2014-05-15 05:26:55 +02:00
- "scanner" (the scanner package)
- "stats" (the stats package)
2014-05-15 05:26:55 +02:00
- "upnp" (the upnp package)
2014-05-17 08:43:01 +02:00
- "xdr" (the xdr package)
2014-05-15 02:08:56 +02:00
- "all" (all of the above)
2014-04-14 12:13:50 +02:00
STGUIASSETS Directory to load GUI assets from. Overrides compiled in assets.
STPROFILER Set to a listen address such as "127.0.0.1:9090" to start the
profiler with HTTP access.
STCPUPROFILE Write a CPU profile to cpu-$pid.pprof on exit.
STHEAPPROFILE Write heap profiles to heap-$pid-$timestamp.pprof each time
heap usage increases.
2014-08-13 22:31:56 +02:00
STPERFSTATS Write running performance statistics to perf-$pid.csv. Not
supported on Windows.
STDEADLOCKTIMEOUT Alter deadlock detection timeout (seconds; default 1200).`
)
func init() {
rand.Seed(time.Now().UnixNano())
}
2013-12-15 11:43:31 +01:00
func main() {
var reset bool
2014-04-01 20:36:54 +02:00
var showVersion bool
2014-05-02 10:01:09 +02:00
var doUpgrade bool
var doUpgradeCheck bool
2014-08-06 14:30:18 +02:00
var noBrowser bool
var generateDir string
var guiAddress string
var guiAuthentication string
var guiAPIKey string
flag.StringVar(&confDir, "home", getDefaultConfDir(), "Set configuration directory")
flag.BoolVar(&reset, "reset", false, "Prepare to resync from cluster")
2014-01-26 14:28:41 +01:00
flag.BoolVar(&showVersion, "version", false, "Show version")
2014-05-02 10:01:09 +02:00
flag.BoolVar(&doUpgrade, "upgrade", false, "Perform upgrade")
flag.BoolVar(&doUpgradeCheck, "upgrade-check", false, "Check for available upgrade")
2014-08-06 14:30:18 +02:00
flag.BoolVar(&noBrowser, "no-browser", false, "Do not start browser")
2014-08-03 09:41:08 +02:00
flag.StringVar(&generateDir, "generate", "", "Generate key in specified dir")
flag.StringVar(&guiAddress, "gui-address", "", "Override GUI address")
flag.StringVar(&guiAuthentication, "gui-authentication", "", "Override GUI authentication. Expects 'username:password'")
flag.StringVar(&guiAPIKey, "gui-apikey", "", "Override GUI API key")
flag.IntVar(&logFlags, "logflags", logFlags, "Set log flags")
flag.Usage = usageFor(flag.CommandLine, usage, extraUsage)
2014-01-26 14:28:41 +01:00
flag.Parse()
2014-01-08 14:37:33 +01:00
2014-01-26 14:28:41 +01:00
if showVersion {
2014-04-19 16:40:19 +02:00
fmt.Println(LongVersion)
2014-04-14 12:13:50 +02:00
return
2013-12-15 11:43:31 +01:00
}
2014-01-08 14:37:33 +01:00
l.SetFlags(logFlags)
2014-08-03 09:41:08 +02:00
if generateDir != "" {
dir := expandTilde(generateDir)
info, err := os.Stat(dir)
l.FatalErr(err)
if !info.IsDir() {
l.Fatalln(dir, "is not a directory")
}
cert, err := loadCert(dir, "")
if err == nil {
l.Warnln("Key exists; will not overwrite.")
l.Infoln("Node ID:", protocol.NewNodeID(cert.Certificate[0]))
return
}
newCertificate(dir, "")
cert, err = loadCert(dir, "")
l.FatalErr(err)
if err == nil {
l.Infoln("Node ID:", protocol.NewNodeID(cert.Certificate[0]))
}
return
}
2014-07-31 16:01:23 +02:00
if doUpgrade || doUpgradeCheck {
rel, err := upgrade.LatestRelease(strings.Contains(Version, "-beta"))
2014-05-02 10:01:09 +02:00
if err != nil {
2014-07-31 16:01:23 +02:00
l.Fatalln("Upgrade:", err) // exits 1
2014-05-02 10:01:09 +02:00
}
2014-07-31 16:01:23 +02:00
if upgrade.CompareVersions(rel.Tag, Version) <= 0 {
l.Infof("No upgrade available (current %q >= latest %q).", Version, rel.Tag)
os.Exit(2)
}
2014-07-31 16:01:23 +02:00
l.Infof("Upgrade available (current %q < latest %q)", Version, rel.Tag)
if doUpgrade {
err = upgrade.UpgradeTo(rel, GoArchExtra)
2014-07-31 16:01:23 +02:00
if err != nil {
l.Fatalln("Upgrade:", err) // exits 1
}
l.Okf("Upgraded to %q", rel.Tag)
return
} else {
return
}
}
2014-08-03 09:41:08 +02:00
var err error
lockPort, err = getLockPort()
if err != nil {
l.Fatalln("Opening lock port:", err)
}
2014-01-10 00:09:27 +01:00
if len(os.Getenv("GOGC")) == 0 {
debug.SetGCPercent(25)
}
if len(os.Getenv("GOMAXPROCS")) == 0 {
runtime.GOMAXPROCS(runtime.NumCPU())
}
2014-01-26 14:28:41 +01:00
confDir = expandTilde(confDir)
2013-12-22 00:16:49 +01:00
2014-07-17 13:38:36 +02:00
events.Default.Log(events.Starting, map[string]string{"home": confDir})
if _, err := os.Stat(confDir); err != nil && confDir == getDefaultConfDir() {
// We are supposed to use the default configuration directory. It
// doesn't exist. In the past our default has been ~/.syncthing, so if
// that directory exists we move it to the new default location and
// continue. We don't much care if this fails at this point, we will
// be checking that later.
var oldDefault string
if runtime.GOOS == "windows" {
oldDefault = filepath.Join(os.Getenv("AppData"), "Syncthing")
} else {
oldDefault = expandTilde("~/.syncthing")
}
if _, err := os.Stat(oldDefault); err == nil {
os.MkdirAll(filepath.Dir(confDir), 0700)
if err := os.Rename(oldDefault, confDir); err == nil {
2014-05-15 02:08:56 +02:00
l.Infoln("Moved config dir", oldDefault, "to", confDir)
}
}
}
2013-12-15 11:43:31 +01:00
// Ensure that our home directory exists and that we have a certificate and key.
2014-01-26 14:28:41 +01:00
ensureDir(confDir, 0700)
cert, err = loadCert(confDir, "")
2013-12-15 11:43:31 +01:00
if err != nil {
2014-05-21 14:04:16 +02:00
newCertificate(confDir, "")
cert, err = loadCert(confDir, "")
2014-05-15 02:08:56 +02:00
l.FatalErr(err)
2013-12-15 11:43:31 +01:00
}
myID = protocol.NewNodeID(cert.Certificate[0])
l.SetPrefix(fmt.Sprintf("[%s] ", myID.String()[:5]))
2013-12-15 11:43:31 +01:00
2014-05-15 02:08:56 +02:00
l.Infoln(LongVersion)
l.Infoln("My ID:", myID)
// Prepare to be able to save configuration
cfgFile := filepath.Join(confDir, "config.xml")
go saveConfigLoop(cfgFile)
var myName string
// Load the configuration file, if it exists.
// If it does not, create a template.
cf, err := os.Open(cfgFile)
if err == nil {
// Read config.xml
2014-05-15 02:18:09 +02:00
cfg, err = config.Load(cf, myID)
if err != nil {
2014-05-15 02:08:56 +02:00
l.Fatalln(err)
}
cf.Close()
myCfg := cfg.GetNodeConfiguration(myID)
if myCfg == nil || myCfg.Name == "" {
myName, _ = os.Hostname()
} else {
myName = myCfg.Name
}
} else {
2014-05-15 02:08:56 +02:00
l.Infoln("No config file; starting with empty defaults")
myName, _ = os.Hostname()
defaultRepo := filepath.Join(getHomeDir(), "Sync")
2014-05-15 02:18:09 +02:00
cfg, err = config.Load(nil, myID)
cfg.Repositories = []config.RepositoryConfiguration{
{
ID: "default",
Directory: defaultRepo,
Nodes: []config.RepositoryNodeConfiguration{{NodeID: myID}},
},
}
2014-05-15 02:18:09 +02:00
cfg.Nodes = []config.NodeConfiguration{
{
NodeID: myID,
Addresses: []string{"dynamic"},
Name: myName,
},
}
port, err := getFreePort("127.0.0.1", 8080)
2014-05-15 02:08:56 +02:00
l.FatalErr(err)
cfg.GUI.Address = fmt.Sprintf("127.0.0.1:%d", port)
port, err = getFreePort("0.0.0.0", 22000)
2014-05-15 02:08:56 +02:00
l.FatalErr(err)
cfg.Options.ListenAddress = []string{fmt.Sprintf("0.0.0.0:%d", port)}
saveConfig()
2014-05-15 02:08:56 +02:00
l.Infof("Edit %s to taste or use the GUI\n", cfgFile)
}
2014-01-26 14:28:41 +01:00
if reset {
resetRepositories()
2014-04-14 12:13:50 +02:00
return
}
if len(os.Getenv("STRESTART")) > 0 {
waitForParentExit()
}
if profiler := os.Getenv("STPROFILER"); len(profiler) > 0 {
2013-12-15 11:43:31 +01:00
go func() {
2014-05-15 02:08:56 +02:00
l.Debugln("Starting profiler on", profiler)
runtime.SetBlockProfileRate(1)
2014-01-26 14:28:41 +01:00
err := http.ListenAndServe(profiler, nil)
2013-12-18 19:36:28 +01:00
if err != nil {
2014-05-15 02:08:56 +02:00
l.Fatalln(err)
2013-12-18 19:36:28 +01:00
}
2013-12-15 11:43:31 +01:00
}()
}
// The TLS configuration is used for both the listening socket and outgoing
// connections.
tlsCfg := &tls.Config{
2014-01-09 09:28:08 +01:00
Certificates: []tls.Certificate{cert},
NextProtos: []string{"bep/1.0"},
ServerName: myID.String(),
2014-01-09 09:28:08 +01:00
ClientAuth: tls.RequestClientCert,
SessionTicketsDisabled: true,
InsecureSkipVerify: true,
MinVersion: tls.VersionTLS12,
2013-12-15 11:43:31 +01:00
}
2014-04-01 20:36:54 +02:00
// If the write rate should be limited, set up a rate limiter for it.
// This will be used on connections created in the connect and listen routines.
if cfg.Options.MaxSendKbps > 0 {
2014-04-01 20:36:54 +02:00
rateBucket = ratelimit.NewBucketWithRate(float64(1000*cfg.Options.MaxSendKbps), int64(5*1000*cfg.Options.MaxSendKbps))
2014-01-12 16:59:35 +01:00
}
2013-12-15 11:43:31 +01:00
// If this is the first time the user runs v0.9, archive the old indexes and config.
archiveLegacyConfig()
2014-07-06 14:46:48 +02:00
db, err := leveldb.OpenFile(filepath.Join(confDir, "index"), nil)
if err != nil {
2014-08-17 01:03:41 +02:00
l.Fatalln("Cannot open database:", err, "- Is another copy of Syncthing already running?")
2014-07-06 14:46:48 +02:00
}
m := model.NewModel(confDir, &cfg, myName, "syncthing", Version, db)
2014-04-01 20:36:54 +02:00
nextRepo:
for i, repo := range cfg.Repositories {
if repo.Invalid != "" {
continue
}
2014-05-23 14:31:16 +02:00
repo.Directory = expandTilde(repo.Directory)
fi, err := os.Stat(repo.Directory)
if m.LocalVersion(repo.ID) > 0 {
// Safety check. If the cached index contains files but the
// repository doesn't exist, we have a problem. We would assume
// that all files have been deleted which might not be the case,
// so mark it as invalid instead.
if err != nil || !fi.IsDir() {
cfg.Repositories[i].Invalid = "repo directory missing"
continue nextRepo
}
} else if os.IsNotExist(err) {
// If we don't have ny files in the index, and the directory does
// exist, try creating it.
err = os.MkdirAll(repo.Directory, 0700)
}
if err != nil {
// If there was another error or we could not create the
// directory, the repository is invalid.
cfg.Repositories[i].Invalid = err.Error()
continue nextRepo
}
2014-05-23 14:31:16 +02:00
m.AddRepo(repo)
}
2014-01-05 23:54:57 +01:00
// GUI
guiCfg := overrideGUIConfig(cfg.GUI, guiAddress, guiAuthentication, guiAPIKey)
if guiCfg.Enabled && guiCfg.Address != "" {
addr, err := net.ResolveTCPAddr("tcp", guiCfg.Address)
if err != nil {
l.Fatalf("Cannot start GUI on %q: %v", guiCfg.Address, err)
} else {
2014-03-02 12:52:32 +01:00
var hostOpen, hostShow string
switch {
case addr.IP == nil:
hostOpen = "localhost"
hostShow = "0.0.0.0"
case addr.IP.IsUnspecified():
hostOpen = "localhost"
hostShow = addr.IP.String()
default:
hostOpen = addr.IP.String()
hostShow = hostOpen
}
2014-03-02 12:52:32 +01:00
2014-05-21 14:04:16 +02:00
var proto = "http"
if guiCfg.UseTLS {
2014-05-21 14:04:16 +02:00
proto = "https"
}
l.Infof("Starting web GUI on %s://%s:%d/", proto, hostShow, addr.Port)
err := startGUI(guiCfg, os.Getenv("STGUIASSETS"), m)
if err != nil {
2014-05-15 02:08:56 +02:00
l.Fatalln("Cannot start GUI:", err)
}
2014-08-06 14:30:18 +02:00
if !noBrowser && cfg.Options.StartBrowser && len(os.Getenv("STRESTART")) == 0 {
2014-05-21 14:04:16 +02:00
openURL(fmt.Sprintf("%s://%s:%d", proto, hostOpen, addr.Port))
}
}
2014-01-05 23:54:57 +01:00
}
// Clear out old indexes for other nodes. Otherwise we'll start up and
// start needing a bunch of files which are nowhere to be found. This
// needs to be changed when we correctly do persistent indexes.
for _, repoCfg := range cfg.Repositories {
for _, node := range repoCfg.NodeIDs() {
m.Index(node, repoCfg.ID, nil)
}
}
2013-12-15 11:43:31 +01:00
// Walk the repository and update the local model before establishing any
// connections to other nodes.
2014-05-15 05:26:55 +02:00
m.CleanRepos()
2014-07-06 14:46:48 +02:00
l.Infoln("Performing initial repository scan")
m.ScanRepos()
2013-12-15 11:43:31 +01:00
// Remove all .idx* files that don't belong to an active repo.
validIndexes := make(map[string]bool)
for _, repo := range cfg.Repositories {
dir := expandTilde(repo.Directory)
id := fmt.Sprintf("%x", sha1.Sum([]byte(dir)))
validIndexes[id] = true
}
allIndexes, err := filepath.Glob(filepath.Join(confDir, "*.idx*"))
if err == nil {
for _, idx := range allIndexes {
bn := filepath.Base(idx)
fs := strings.Split(bn, ".")
if len(fs) > 1 {
if _, ok := validIndexes[fs[0]]; !ok {
l.Infoln("Removing old index", bn)
os.Remove(idx)
}
}
}
}
2014-04-18 13:20:42 +02:00
// UPnP
2014-04-18 13:39:51 +02:00
if cfg.Options.UPnPEnabled {
setupUPnP()
2014-04-18 13:20:42 +02:00
}
2013-12-15 11:43:31 +01:00
// Routine to connect out to configured nodes
2014-04-18 13:20:42 +02:00
discoverer = discovery(externalPort)
go listenConnect(myID, m, tlsCfg)
2013-12-15 11:43:31 +01:00
for _, repo := range cfg.Repositories {
if repo.Invalid != "" {
continue
}
// Routine to pull blocks from other nodes to synchronize the local
// repository. Does not run when we are in read only (publish only) mode.
if repo.ReadOnly {
2014-05-15 02:08:56 +02:00
l.Okf("Ready to synchronize %s (read only; no external updates accepted)", repo.ID)
m.StartRepoRO(repo.ID)
} else {
2014-05-15 02:08:56 +02:00
l.Okf("Ready to synchronize %s (read-write)", repo.ID)
m.StartRepoRW(repo.ID, cfg.Options.ParallelRequests)
}
}
2014-01-05 16:16:37 +01:00
2014-04-14 12:13:50 +02:00
if cpuprof := os.Getenv("STCPUPROFILE"); len(cpuprof) > 0 {
f, err := os.Create(fmt.Sprintf("cpu-%d.pprof", os.Getpid()))
2014-04-14 12:13:50 +02:00
if err != nil {
log.Fatal(err)
}
pprof.StartCPUProfile(f)
defer pprof.StopCPUProfile()
}
for _, node := range cfg.Nodes {
if len(node.Name) > 0 {
l.Infof("Node %s is %q at %v", node.NodeID, node.Name, node.Addresses)
}
}
if cfg.Options.URAccepted > 0 && cfg.Options.URAccepted < usageReportVersion {
2014-06-11 20:04:23 +02:00
l.Infoln("Anonymous usage report has changed; revoking acceptance")
cfg.Options.URAccepted = 0
2014-06-11 20:04:23 +02:00
}
if cfg.Options.URAccepted >= usageReportVersion {
2014-06-11 20:04:23 +02:00
go usageReportingLoop(m)
go func() {
time.Sleep(10 * time.Minute)
err := sendUsageReport(m)
if err != nil {
l.Infoln("Usage report:", err)
}
2014-06-11 20:04:23 +02:00
}()
}
2014-07-13 21:07:24 +02:00
events.Default.Log(events.StartupComplete, nil)
go generateEvents()
2014-04-14 12:13:50 +02:00
<-stop
2014-07-13 21:07:24 +02:00
l.Okln("Exiting")
}
2014-07-13 21:07:24 +02:00
func generateEvents() {
for {
time.Sleep(300 * time.Second)
events.Default.Log(events.Ping, nil)
}
}
func waitForParentExit() {
l.Infoln("Waiting for parent to exit...")
lockPortStr := os.Getenv("STRESTART")
lockPort, err := strconv.Atoi(lockPortStr)
if err != nil {
l.Warnln("Invalid lock port %q: %v", lockPortStr, err)
}
// Wait for the listen address to become free, indicating that the parent has exited.
for {
ln, err := net.Listen("tcp", fmt.Sprintf("127.0.0.1:%d", lockPort))
if err == nil {
ln.Close()
break
}
time.Sleep(250 * time.Millisecond)
}
l.Infoln("Continuing")
2013-12-15 11:43:31 +01:00
}
func setupUPnP() {
2014-04-18 13:39:51 +02:00
if len(cfg.Options.ListenAddress) == 1 {
_, portStr, err := net.SplitHostPort(cfg.Options.ListenAddress[0])
if err != nil {
l.Warnln("Bad listen address:", err)
2014-04-18 13:39:51 +02:00
} else {
// Set up incoming port forwarding, if necessary and possible
port, _ := strconv.Atoi(portStr)
igd, err := upnp.Discover()
if err == nil {
externalPort = setupExternalPort(igd, port)
2014-04-18 13:39:51 +02:00
if externalPort == 0 {
2014-05-15 02:08:56 +02:00
l.Warnln("Failed to create UPnP port mapping")
} else {
l.Infoln("Created UPnP port mapping - external port", externalPort)
2014-04-18 13:39:51 +02:00
}
} else {
l.Infof("No UPnP gateway detected")
if debugNet {
l.Debugf("UPnP: %v", err)
}
2014-04-18 13:39:51 +02:00
}
2014-08-13 22:15:20 +02:00
if cfg.Options.UPnPRenewal > 0 {
go renewUPnP(port)
2014-08-13 22:15:20 +02:00
}
2014-04-18 13:39:51 +02:00
}
} else {
2014-05-15 02:08:56 +02:00
l.Warnln("Multiple listening addresses; not attempting UPnP port mapping")
2014-04-18 13:39:51 +02:00
}
2014-08-11 23:58:32 +02:00
}
func setupExternalPort(igd *upnp.IGD, port int) int {
// We seed the random number generator with the node ID to get a
// repeatable sequence of random external ports.
rnd := rand.NewSource(certSeed(cert.Certificate[0]))
for i := 0; i < 10; i++ {
r := 1024 + int(rnd.Int63()%(65535-1024))
err := igd.AddPortMapping(upnp.TCP, r, port, "syncthing", cfg.Options.UPnPLease*60)
if err == nil {
return r
}
}
return 0
}
func renewUPnP(port int) {
2014-08-11 23:58:32 +02:00
for {
time.Sleep(time.Duration(cfg.Options.UPnPRenewal) * time.Minute)
2014-08-13 22:15:20 +02:00
igd, err := upnp.Discover()
if err != nil {
continue
}
// Just renew the same port that we already have
2014-08-13 22:15:20 +02:00
err = igd.AddPortMapping(upnp.TCP, externalPort, port, "syncthing", cfg.Options.UPnPLease*60)
2014-08-11 23:58:32 +02:00
if err == nil {
l.Infoln("Renewed UPnP port mapping - external port", externalPort)
continue
}
// Something strange has happened. Perhaps the gateway has changed?
// Retry the same port sequence from the beginning.
r := setupExternalPort(igd, port)
if r != 0 {
2014-08-11 23:58:32 +02:00
externalPort = r
l.Infoln("Updated UPnP port mapping - external port", externalPort)
discoverer.StopGlobal()
2014-08-13 00:29:29 +02:00
discoverer.StartGlobal(cfg.Options.GlobalAnnServer, uint16(r))
2014-08-11 23:58:32 +02:00
continue
}
l.Warnln("Failed to update UPnP port mapping - external port", externalPort)
2014-08-11 23:58:32 +02:00
}
2014-04-18 13:39:51 +02:00
}
func resetRepositories() {
suffix := fmt.Sprintf(".syncthing-reset-%d", time.Now().UnixNano())
for _, repo := range cfg.Repositories {
if _, err := os.Stat(repo.Directory); err == nil {
2014-05-15 02:08:56 +02:00
l.Infof("Reset: Moving %s -> %s", repo.Directory, repo.Directory+suffix)
os.Rename(repo.Directory, repo.Directory+suffix)
}
}
idx := filepath.Join(confDir, "index")
os.RemoveAll(idx)
}
func archiveLegacyConfig() {
pat := filepath.Join(confDir, "*.idx.gz*")
idxs, err := filepath.Glob(pat)
if err == nil && len(idxs) > 0 {
// There are legacy indexes. This is probably the first time we run as v0.9.
backupDir := filepath.Join(confDir, "backup-of-v0.8")
err = os.MkdirAll(backupDir, 0700)
if err != nil {
l.Warnln("Cannot archive config/indexes:", err)
return
}
for _, idx := range idxs {
l.Infof("Archiving %s", filepath.Base(idx))
os.Rename(idx, filepath.Join(backupDir, filepath.Base(idx)))
}
src, err := os.Open(filepath.Join(confDir, "config.xml"))
if err != nil {
l.Warnf("Cannot archive config:", err)
return
}
defer src.Close()
dst, err := os.Create(filepath.Join(backupDir, "config.xml"))
if err != nil {
l.Warnf("Cannot archive config:", err)
return
}
defer src.Close()
l.Infoln("Archiving config.xml")
io.Copy(dst, src)
}
}
2014-02-12 12:10:44 +01:00
func restart() {
2014-05-15 02:08:56 +02:00
l.Infoln("Restarting")
if os.Getenv("SMF_FMRI") != "" || os.Getenv("STNORESTART") != "" {
// Solaris SMF
2014-05-15 02:08:56 +02:00
l.Infoln("Service manager detected; exit instead of restart")
2014-04-14 12:13:50 +02:00
stop <- true
return
}
2014-03-09 08:35:38 +01:00
env := os.Environ()
newEnv := make([]string, 0, len(env))
for _, s := range env {
if !strings.HasPrefix(s, "STRESTART=") {
newEnv = append(newEnv, s)
}
2014-02-12 12:10:44 +01:00
}
newEnv = append(newEnv, fmt.Sprintf("STRESTART=%d", lockPort))
pgm, err := exec.LookPath(os.Args[0])
if err != nil {
l.Warnln("Cannot restart:", err)
return
}
2014-03-09 08:35:38 +01:00
proc, err := os.StartProcess(pgm, os.Args, &os.ProcAttr{
Env: newEnv,
2014-02-12 12:10:44 +01:00
Files: []*os.File{os.Stdin, os.Stdout, os.Stderr},
})
if err != nil {
2014-05-15 02:08:56 +02:00
l.Fatalln(err)
2014-02-12 12:10:44 +01:00
}
proc.Release()
2014-04-14 12:13:50 +02:00
stop <- true
2014-02-12 12:10:44 +01:00
}
2014-05-12 01:16:27 +02:00
func shutdown() {
stop <- true
}
var saveConfigCh = make(chan struct{})
func saveConfigLoop(cfgFile string) {
for _ = range saveConfigCh {
fd, err := os.Create(cfgFile + ".tmp")
if err != nil {
l.Warnln("Saving config:", err)
continue
}
2014-05-15 02:18:09 +02:00
err = config.Save(fd, cfg)
if err != nil {
l.Warnln("Saving config:", err)
fd.Close()
continue
}
err = fd.Close()
if err != nil {
l.Warnln("Saving config:", err)
continue
}
2014-05-25 20:49:08 +02:00
err = osutil.Rename(cfgFile+".tmp", cfgFile)
if err != nil {
l.Warnln("Saving config:", err)
}
}
}
func saveConfig() {
saveConfigCh <- struct{}{}
}
func listenConnect(myID protocol.NodeID, m *model.Model, tlsCfg *tls.Config) {
var conns = make(chan *tls.Conn)
// Listen
for _, addr := range cfg.Options.ListenAddress {
2014-07-15 12:12:19 +02:00
go listenTLS(conns, addr, tlsCfg)
}
2013-12-15 11:43:31 +01:00
// Connect
2014-07-15 12:12:19 +02:00
go dialTLS(m, conns, tlsCfg)
2013-12-15 11:43:31 +01:00
next:
for conn := range conns {
certs := conn.ConnectionState().PeerCertificates
2014-05-15 02:08:56 +02:00
if cl := len(certs); cl != 1 {
l.Infof("Got peer certificate list of length %d != 1 from %s; protocol error", cl, conn.RemoteAddr())
conn.Close()
continue
}
2014-07-30 07:59:22 +02:00
remoteCert := certs[0]
remoteID := protocol.NewNodeID(remoteCert.Raw)
2013-12-15 11:43:31 +01:00
if remoteID == myID {
l.Infof("Connected to myself (%s) - should not happen", remoteID)
2013-12-15 11:43:31 +01:00
conn.Close()
continue
}
if m.ConnectedTo(remoteID) {
l.Infof("Connected to already connected node (%s)", remoteID)
conn.Close()
continue
2013-12-15 11:43:31 +01:00
}
for _, nodeCfg := range cfg.Nodes {
if nodeCfg.NodeID == remoteID {
2014-07-30 07:59:22 +02:00
// Verify the name on the certificate. By default we set it to
// "syncthing" when generating, but the user may have replaced
// the certificate and used another name.
certName := nodeCfg.CertName
if certName == "" {
certName = "syncthing"
}
err := remoteCert.VerifyHostname(certName)
if err != nil {
// Incorrect certificate name is something the user most
// likely wants to know about, since it's an advanced
// config. Warn instead of Info.
l.Warnf("Bad certificate from %s (%v): %v", remoteID, conn.RemoteAddr(), err)
conn.Close()
continue next
}
// If rate limiting is set, we wrap the write side of the
// connection in a limiter.
2014-04-01 20:36:54 +02:00
var wr io.Writer = conn
if rateBucket != nil {
wr = &limitedWriter{conn, rateBucket}
}
2014-07-30 07:59:22 +02:00
name := fmt.Sprintf("%s-%s", conn.LocalAddr(), conn.RemoteAddr())
protoConn := protocol.NewConnection(remoteID, conn, wr, m, name, nodeCfg.Compression)
2014-06-23 15:06:20 +02:00
l.Infof("Established secure connection to %s at %s", remoteID, name)
2014-07-14 23:52:11 +02:00
if debugNet {
l.Debugf("cipher suite %04X", conn.ConnectionState().CipherSuite)
}
2014-07-13 21:07:24 +02:00
events.Default.Log(events.NodeConnected, map[string]string{
"id": remoteID.String(),
"addr": conn.RemoteAddr().String(),
})
2014-06-23 15:06:20 +02:00
2014-01-09 13:58:35 +01:00
m.AddConnection(conn, protoConn)
continue next
2013-12-15 11:43:31 +01:00
}
}
events.Default.Log(events.NodeRejected, map[string]string{
"node": remoteID.String(),
"address": conn.RemoteAddr().String(),
})
l.Infof("Connection from %s with unknown node ID %s; ignoring", conn.RemoteAddr(), remoteID)
2013-12-15 11:43:31 +01:00
conn.Close()
}
}
2014-07-15 12:12:19 +02:00
func listenTLS(conns chan *tls.Conn, addr string, tlsCfg *tls.Config) {
if debugNet {
l.Debugln("listening on", addr)
}
tcaddr, err := net.ResolveTCPAddr("tcp", addr)
l.FatalErr(err)
listener, err := net.ListenTCP("tcp", tcaddr)
l.FatalErr(err)
for {
conn, err := listener.Accept()
if err != nil {
l.Warnln("Accepting connection:", err)
2014-07-15 12:12:19 +02:00
continue
}
if debugNet {
l.Debugln("connect from", conn.RemoteAddr())
}
tcpConn := conn.(*net.TCPConn)
setTCPOptions(tcpConn)
tc := tls.Server(conn, tlsCfg)
err = tc.Handshake()
if err != nil {
l.Infoln("TLS handshake:", err)
2014-07-15 12:12:19 +02:00
tc.Close()
continue
}
conns <- tc
}
}
func dialTLS(m *model.Model, conns chan *tls.Conn, tlsCfg *tls.Config) {
var delay time.Duration = 1 * time.Second
for {
nextNode:
for _, nodeCfg := range cfg.Nodes {
if nodeCfg.NodeID == myID {
continue
}
if m.ConnectedTo(nodeCfg.NodeID) {
continue
}
var addrs []string
for _, addr := range nodeCfg.Addresses {
if addr == "dynamic" {
if discoverer != nil {
t := discoverer.Lookup(nodeCfg.NodeID)
if len(t) == 0 {
continue
}
addrs = append(addrs, t...)
}
} else {
addrs = append(addrs, addr)
}
}
for _, addr := range addrs {
host, port, err := net.SplitHostPort(addr)
if err != nil && strings.HasPrefix(err.Error(), "missing port") {
// addr is on the form "1.2.3.4"
addr = net.JoinHostPort(addr, "22000")
} else if err == nil && port == "" {
// addr is on the form "1.2.3.4:"
addr = net.JoinHostPort(host, "22000")
}
if debugNet {
l.Debugln("dial", nodeCfg.NodeID, addr)
}
raddr, err := net.ResolveTCPAddr("tcp", addr)
if err != nil {
if debugNet {
l.Debugln(err)
}
continue
}
conn, err := net.DialTCP("tcp", nil, raddr)
if err != nil {
if debugNet {
l.Debugln(err)
}
continue
}
setTCPOptions(conn)
tc := tls.Client(conn, tlsCfg)
err = tc.Handshake()
if err != nil {
l.Infoln("TLS handshake:", err)
2014-07-15 12:12:19 +02:00
tc.Close()
continue
}
conns <- tc
continue nextNode
}
}
time.Sleep(delay)
delay *= 2
if maxD := time.Duration(cfg.Options.ReconnectIntervalS) * time.Second; delay > maxD {
delay = maxD
}
}
}
func setTCPOptions(conn *net.TCPConn) {
var err error
if err = conn.SetLinger(0); err != nil {
l.Infoln(err)
}
if err = conn.SetNoDelay(false); err != nil {
l.Infoln(err)
}
if err = conn.SetKeepAlivePeriod(60 * time.Second); err != nil {
l.Infoln(err)
}
if err = conn.SetKeepAlive(true); err != nil {
l.Infoln(err)
}
}
2014-04-18 13:20:42 +02:00
func discovery(extPort int) *discover.Discoverer {
disc := discover.NewDiscoverer(myID, cfg.Options.ListenAddress)
2013-12-22 22:29:23 +01:00
if cfg.Options.LocalAnnEnabled {
l.Infoln("Starting local discovery announcements")
disc.StartLocal(cfg.Options.LocalAnnPort, cfg.Options.LocalAnnMCAddr)
2013-12-22 22:29:23 +01:00
}
if cfg.Options.GlobalAnnEnabled {
l.Infoln("Starting global discovery announcements")
2014-04-18 13:20:42 +02:00
disc.StartGlobal(cfg.Options.GlobalAnnServer, uint16(extPort))
2013-12-15 11:43:31 +01:00
}
return disc
}
2013-12-22 00:16:49 +01:00
func ensureDir(dir string, mode int) {
2013-12-15 11:43:31 +01:00
fi, err := os.Stat(dir)
if os.IsNotExist(err) {
err := os.MkdirAll(dir, 0700)
2014-05-15 02:08:56 +02:00
l.FatalErr(err)
2013-12-22 00:16:49 +01:00
} else if mode >= 0 && err == nil && int(fi.Mode()&0777) != mode {
err := os.Chmod(dir, os.FileMode(mode))
2014-05-15 02:08:56 +02:00
l.FatalErr(err)
2013-12-15 11:43:31 +01:00
}
}
func getDefaultConfDir() string {
switch runtime.GOOS {
case "windows":
return filepath.Join(os.Getenv("LocalAppData"), "Syncthing")
case "darwin":
return expandTilde("~/Library/Application Support/Syncthing")
default:
if xdgCfg := os.Getenv("XDG_CONFIG_HOME"); xdgCfg != "" {
return filepath.Join(xdgCfg, "syncthing")
} else {
return expandTilde("~/.config/syncthing")
}
}
}
func expandTilde(p string) string {
2014-05-24 13:22:09 +02:00
if p == "~" {
return getHomeDir()
}
p = filepath.FromSlash(p)
2014-05-24 13:22:09 +02:00
if !strings.HasPrefix(p, fmt.Sprintf("~%c", os.PathSeparator)) {
return p
}
return filepath.Join(getHomeDir(), p[2:])
}
2013-12-15 11:43:31 +01:00
func getHomeDir() string {
var home string
switch runtime.GOOS {
case "windows":
home = filepath.Join(os.Getenv("HomeDrive"), os.Getenv("HomePath"))
if home == "" {
home = os.Getenv("UserProfile")
}
default:
home = os.Getenv("HOME")
}
if home == "" {
2014-05-15 02:08:56 +02:00
l.Fatalln("No home directory found - set $HOME (or the platform equivalent).")
2013-12-15 11:43:31 +01:00
}
return home
2013-12-15 11:43:31 +01:00
}
// getFreePort returns a free TCP port fort listening on. The ports given are
// tried in succession and the first to succeed is returned. If none succeed,
// a random high port is returned.
func getFreePort(host string, ports ...int) (int, error) {
for _, port := range ports {
c, err := net.Listen("tcp", fmt.Sprintf("%s:%d", host, port))
if err == nil {
c.Close()
return port, nil
}
}
c, err := net.Listen("tcp", host+":0")
if err != nil {
return 0, err
}
addr := c.Addr().(*net.TCPAddr)
c.Close()
return addr.Port, nil
}
func getLockPort() (int, error) {
var err error
lockConn, err = net.ListenTCP("tcp", &net.TCPAddr{IP: net.IP{127, 0, 0, 1}})
if err != nil {
return 0, err
}
addr := lockConn.Addr().(*net.TCPAddr)
return addr.Port, nil
}
func overrideGUIConfig(originalCfg config.GUIConfiguration, address, authentication, apikey string) config.GUIConfiguration {
// Make a copy of the config
cfg := originalCfg
if address == "" {
address = os.Getenv("STGUIADDRESS")
}
if address != "" {
cfg.Enabled = true
addressParts := strings.SplitN(address, "://", 2)
switch addressParts[0] {
case "http":
cfg.UseTLS = false
case "https":
cfg.UseTLS = true
default:
l.Fatalln("Unidentified protocol", addressParts[0])
}
cfg.Address = addressParts[1]
}
if authentication == "" {
authentication = os.Getenv("STGUIAUTH")
}
if authentication != "" {
authenticationParts := strings.SplitN(authentication, ":", 2)
hash, err := bcrypt.GenerateFromPassword([]byte(authenticationParts[1]), 0)
if err != nil {
l.Fatalln("Invalid GUI password:", err)
}
cfg.User = authenticationParts[0]
cfg.Password = string(hash)
}
if apikey == "" {
apikey = os.Getenv("STGUIAPIKEY")
}
if apikey != "" {
cfg.APIKey = apikey
}
return cfg
}