]> git.r.bdr.sh - rbdr/mobius/blame - hotline/server.go
Implement io.Writer interface for Transaction
[rbdr/mobius] / hotline / server.go
CommitLineData
6988a057
JH
1package hotline
2
3import (
7cd900d6 4 "bufio"
a82b93cf 5 "bytes"
6988a057
JH
6 "context"
7 "encoding/binary"
8 "errors"
9 "fmt"
041c2df6 10 "github.com/go-playground/validator/v10"
6988a057 11 "go.uber.org/zap"
7cd900d6 12 "gopkg.in/yaml.v3"
6988a057 13 "io"
16a4ad70 14 "io/fs"
6988a057 15 "io/ioutil"
6988a057
JH
16 "math/big"
17 "math/rand"
18 "net"
19 "os"
6988a057 20 "path/filepath"
6988a057
JH
21 "strings"
22 "sync"
23 "time"
6988a057
JH
24)
25
7cd900d6
JH
26type contextKey string
27
28var contextKeyReq = contextKey("req")
29
30type requestCtx struct {
31 remoteAddr string
32 login string
33 name string
34}
35
6988a057
JH
36const (
37 userIdleSeconds = 300 // time in seconds before an inactive user is marked idle
38 idleCheckInterval = 10 // time in seconds to check for idle users
39 trackerUpdateFrequency = 300 // time in seconds between tracker re-registration
40)
41
a82b93cf
JH
42var nostalgiaVersion = []byte{0, 0, 2, 0x2c} // version ID used by the Nostalgia client
43
6988a057 44type Server struct {
8eb43f95
JH
45 Port int
46 Accounts map[string]*Account
47 Agreement []byte
48 Clients map[uint16]*ClientConn
df1ade54
JH
49 fileTransfers map[[4]byte]*FileTransfer
50
6988a057
JH
51 Config *Config
52 ConfigDir string
53 Logger *zap.SugaredLogger
54 PrivateChats map[uint32]*PrivateChat
55 NextGuestID *uint16
40414f92 56 TrackerPassID [4]byte
6988a057
JH
57 Stats *Stats
58
7cd900d6 59 FS FileStore // Storage backend to use for File storage
6988a057
JH
60
61 outbox chan Transaction
7cd900d6 62 mux sync.Mutex
6988a057 63
8eb43f95
JH
64 threadedNewsMux sync.Mutex
65 ThreadedNews *ThreadedNews
66
6988a057 67 flatNewsMux sync.Mutex
7cd900d6 68 FlatNews []byte
46862572
JH
69
70 banListMU sync.Mutex
71 banList map[string]*time.Time
6988a057
JH
72}
73
74type PrivateChat struct {
75 Subject string
76 ClientConn map[uint16]*ClientConn
77}
78
79func (s *Server) ListenAndServe(ctx context.Context, cancelRoot context.CancelFunc) error {
aeec1015
JH
80 s.Logger.Infow("Hotline server started",
81 "version", VERSION,
82 "API port", fmt.Sprintf(":%v", s.Port),
83 "Transfer port", fmt.Sprintf(":%v", s.Port+1),
84 )
85
6988a057
JH
86 var wg sync.WaitGroup
87
88 wg.Add(1)
8168522a
JH
89 go func() {
90 ln, err := net.Listen("tcp", fmt.Sprintf("%s:%v", "", s.Port))
91 if err != nil {
92 s.Logger.Fatal(err)
93 }
94
7cd900d6 95 s.Logger.Fatal(s.Serve(ctx, ln))
8168522a 96 }()
6988a057
JH
97
98 wg.Add(1)
8168522a
JH
99 go func() {
100 ln, err := net.Listen("tcp", fmt.Sprintf("%s:%v", "", s.Port+1))
101 if err != nil {
102 s.Logger.Fatal(err)
103
104 }
105
7cd900d6 106 s.Logger.Fatal(s.ServeFileTransfers(ctx, ln))
8168522a 107 }()
6988a057
JH
108
109 wg.Wait()
110
111 return nil
112}
113
7cd900d6 114func (s *Server) ServeFileTransfers(ctx context.Context, ln net.Listener) error {
6988a057
JH
115 for {
116 conn, err := ln.Accept()
117 if err != nil {
118 return err
119 }
120
121 go func() {
7cd900d6
JH
122 defer func() { _ = conn.Close() }()
123
124 err = s.handleFileTransfer(
125 context.WithValue(ctx, contextKeyReq, requestCtx{
126 remoteAddr: conn.RemoteAddr().String(),
127 }),
128 conn,
129 )
130
131 if err != nil {
6988a057
JH
132 s.Logger.Errorw("file transfer error", "reason", err)
133 }
134 }()
135 }
136}
137
138func (s *Server) sendTransaction(t Transaction) error {
6988a057
JH
139 clientID, err := byteToInt(*t.clientID)
140 if err != nil {
141 return err
142 }
143
144 s.mux.Lock()
145 client := s.Clients[uint16(clientID)]
6988a057 146 if client == nil {
bd1ce113 147 return fmt.Errorf("invalid client id %v", *t.clientID)
6988a057 148 }
6988a057 149
3178ae58 150 s.mux.Unlock()
6988a057 151
72dd37f1
JH
152 b, err := t.MarshalBinary()
153 if err != nil {
154 return err
155 }
3178ae58
JH
156
157 if _, err := client.Connection.Write(b); err != nil {
6988a057
JH
158 return err
159 }
3178ae58 160
6988a057
JH
161 return nil
162}
163
67db911d
JH
164func (s *Server) processOutbox() {
165 for {
166 t := <-s.outbox
167 go func() {
168 if err := s.sendTransaction(t); err != nil {
169 s.Logger.Errorw("error sending transaction", "err", err)
170 }
171 }()
172 }
173}
174
7cd900d6 175func (s *Server) Serve(ctx context.Context, ln net.Listener) error {
67db911d
JH
176 go s.processOutbox()
177
6988a057
JH
178 for {
179 conn, err := ln.Accept()
180 if err != nil {
181 s.Logger.Errorw("error accepting connection", "err", err)
182 }
67db911d
JH
183 connCtx := context.WithValue(ctx, contextKeyReq, requestCtx{
184 remoteAddr: conn.RemoteAddr().String(),
185 })
6988a057
JH
186
187 go func() {
0da28a1f
JH
188 s.Logger.Infow("Connection established", "RemoteAddr", conn.RemoteAddr())
189
46862572 190 defer conn.Close()
67db911d 191 if err := s.handleNewConnection(connCtx, conn, conn.RemoteAddr().String()); err != nil {
6988a057
JH
192 if err == io.EOF {
193 s.Logger.Infow("Client disconnected", "RemoteAddr", conn.RemoteAddr())
194 } else {
195 s.Logger.Errorw("error serving request", "RemoteAddr", conn.RemoteAddr(), "err", err)
196 }
197 }
198 }()
199 }
200}
201
202const (
c7e932c0 203 agreementFile = "Agreement.txt"
6988a057
JH
204)
205
206// NewServer constructs a new Server from a config dir
7cd900d6 207func NewServer(configDir string, netPort int, logger *zap.SugaredLogger, FS FileStore) (*Server, error) {
6988a057
JH
208 server := Server{
209 Port: netPort,
210 Accounts: make(map[string]*Account),
211 Config: new(Config),
212 Clients: make(map[uint16]*ClientConn),
df1ade54 213 fileTransfers: make(map[[4]byte]*FileTransfer),
6988a057
JH
214 PrivateChats: make(map[uint32]*PrivateChat),
215 ConfigDir: configDir,
216 Logger: logger,
217 NextGuestID: new(uint16),
218 outbox: make(chan Transaction),
219 Stats: &Stats{StartTime: time.Now()},
220 ThreadedNews: &ThreadedNews{},
b196a50a 221 FS: FS,
46862572 222 banList: make(map[string]*time.Time),
6988a057
JH
223 }
224
8168522a 225 var err error
6988a057
JH
226
227 // generate a new random passID for tracker registration
40414f92 228 if _, err := rand.Read(server.TrackerPassID[:]); err != nil {
6988a057
JH
229 return nil, err
230 }
231
f22acf38 232 server.Agreement, err = os.ReadFile(filepath.Join(configDir, agreementFile))
b196a50a 233 if err != nil {
6988a057
JH
234 return nil, err
235 }
236
f22acf38 237 if server.FlatNews, err = os.ReadFile(filepath.Join(configDir, "MessageBoard.txt")); err != nil {
6988a057
JH
238 return nil, err
239 }
240
46862572
JH
241 // try to load the ban list, but ignore errors as this file may not be present or may be empty
242 _ = server.loadBanList(filepath.Join(configDir, "Banlist.yaml"))
243
f22acf38 244 if err := server.loadThreadedNews(filepath.Join(configDir, "ThreadedNews.yaml")); err != nil {
6988a057
JH
245 return nil, err
246 }
247
f22acf38 248 if err := server.loadConfig(filepath.Join(configDir, "config.yaml")); err != nil {
6988a057
JH
249 return nil, err
250 }
251
f22acf38 252 if err := server.loadAccounts(filepath.Join(configDir, "Users/")); err != nil {
6988a057
JH
253 return nil, err
254 }
255
f22acf38 256 server.Config.FileRoot = filepath.Join(configDir, "Files")
6988a057
JH
257
258 *server.NextGuestID = 1
259
260 if server.Config.EnableTrackerRegistration {
e42888eb
JH
261 server.Logger.Infow(
262 "Tracker registration enabled",
263 "frequency", fmt.Sprintf("%vs", trackerUpdateFrequency),
264 "trackers", server.Config.Trackers,
265 )
266
6988a057
JH
267 go func() {
268 for {
e42888eb 269 tr := &TrackerRegistration{
6988a057 270 UserCount: server.userCount(),
40414f92 271 PassID: server.TrackerPassID[:],
6988a057
JH
272 Name: server.Config.Name,
273 Description: server.Config.Description,
274 }
40414f92 275 binary.BigEndian.PutUint16(tr.Port[:], uint16(server.Port))
6988a057 276 for _, t := range server.Config.Trackers {
6988a057
JH
277 if err := register(t, tr); err != nil {
278 server.Logger.Errorw("unable to register with tracker %v", "error", err)
279 }
78b305d6 280 server.Logger.Debugw("Sent Tracker registration", "addr", t)
6988a057
JH
281 }
282
283 time.Sleep(trackerUpdateFrequency * time.Second)
284 }
285 }()
286 }
287
288 // Start Client Keepalive go routine
289 go server.keepaliveHandler()
290
291 return &server, nil
292}
293
294func (s *Server) userCount() int {
295 s.mux.Lock()
296 defer s.mux.Unlock()
297
298 return len(s.Clients)
299}
300
301func (s *Server) keepaliveHandler() {
302 for {
303 time.Sleep(idleCheckInterval * time.Second)
304 s.mux.Lock()
305
306 for _, c := range s.Clients {
61c272e1
JH
307 c.IdleTime += idleCheckInterval
308 if c.IdleTime > userIdleSeconds && !c.Idle {
6988a057
JH
309 c.Idle = true
310
a7216f67 311 flagBitmap := big.NewInt(int64(binary.BigEndian.Uint16(c.Flags)))
6988a057 312 flagBitmap.SetBit(flagBitmap, userFlagAway, 1)
a7216f67 313 binary.BigEndian.PutUint16(c.Flags, uint16(flagBitmap.Int64()))
6988a057
JH
314
315 c.sendAll(
316 tranNotifyChangeUser,
317 NewField(fieldUserID, *c.ID),
a7216f67 318 NewField(fieldUserFlags, c.Flags),
72dd37f1 319 NewField(fieldUserName, c.UserName),
a7216f67 320 NewField(fieldUserIconID, c.Icon),
6988a057
JH
321 )
322 }
323 }
324 s.mux.Unlock()
325 }
326}
327
46862572
JH
328func (s *Server) writeBanList() error {
329 s.banListMU.Lock()
330 defer s.banListMU.Unlock()
331
332 out, err := yaml.Marshal(s.banList)
333 if err != nil {
334 return err
335 }
336 err = ioutil.WriteFile(
337 filepath.Join(s.ConfigDir, "Banlist.yaml"),
338 out,
339 0666,
340 )
341 return err
342}
343
6988a057 344func (s *Server) writeThreadedNews() error {
8eb43f95
JH
345 s.threadedNewsMux.Lock()
346 defer s.threadedNewsMux.Unlock()
6988a057
JH
347
348 out, err := yaml.Marshal(s.ThreadedNews)
349 if err != nil {
350 return err
351 }
8eb43f95 352 err = s.FS.WriteFile(
f22acf38 353 filepath.Join(s.ConfigDir, "ThreadedNews.yaml"),
6988a057
JH
354 out,
355 0666,
356 )
357 return err
358}
359
67db911d 360func (s *Server) NewClientConn(conn io.ReadWriteCloser, remoteAddr string) *ClientConn {
6988a057
JH
361 s.mux.Lock()
362 defer s.mux.Unlock()
363
364 clientConn := &ClientConn{
365 ID: &[]byte{0, 0},
a7216f67
JH
366 Icon: []byte{0, 0},
367 Flags: []byte{0, 0},
72dd37f1 368 UserName: []byte{},
6988a057
JH
369 Connection: conn,
370 Server: s,
a7216f67 371 Version: []byte{},
aebc4d36 372 AutoReply: []byte{},
df1ade54 373 transfers: map[int]map[[4]byte]*FileTransfer{},
bd1ce113 374 Agreed: false,
d4c152a4 375 RemoteAddr: remoteAddr,
6988a057 376 }
df1ade54
JH
377 clientConn.transfers = map[int]map[[4]byte]*FileTransfer{
378 FileDownload: {},
379 FileUpload: {},
380 FolderDownload: {},
381 FolderUpload: {},
382 bannerDownload: {},
383 }
384
6988a057
JH
385 *s.NextGuestID++
386 ID := *s.NextGuestID
387
6988a057
JH
388 binary.BigEndian.PutUint16(*clientConn.ID, ID)
389 s.Clients[ID] = clientConn
390
391 return clientConn
392}
393
394// NewUser creates a new user account entry in the server map and config file
187d6dc5 395func (s *Server) NewUser(login, name, password string, access accessBitmap) error {
6988a057
JH
396 s.mux.Lock()
397 defer s.mux.Unlock()
398
399 account := Account{
400 Login: login,
401 Name: name,
402 Password: hashAndSalt([]byte(password)),
187d6dc5 403 Access: access,
6988a057
JH
404 }
405 out, err := yaml.Marshal(&account)
406 if err != nil {
407 return err
408 }
409 s.Accounts[login] = &account
410
f22acf38 411 return s.FS.WriteFile(filepath.Join(s.ConfigDir, "Users", login+".yaml"), out, 0666)
6988a057
JH
412}
413
187d6dc5 414func (s *Server) UpdateUser(login, newLogin, name, password string, access accessBitmap) error {
d2810ae9
JH
415 s.mux.Lock()
416 defer s.mux.Unlock()
417
d2810ae9
JH
418 // update renames the user login
419 if login != newLogin {
f22acf38 420 err := os.Rename(filepath.Join(s.ConfigDir, "Users", login+".yaml"), filepath.Join(s.ConfigDir, "Users", newLogin+".yaml"))
d2810ae9
JH
421 if err != nil {
422 return err
423 }
424 s.Accounts[newLogin] = s.Accounts[login]
425 delete(s.Accounts, login)
426 }
427
428 account := s.Accounts[newLogin]
187d6dc5 429 account.Access = access
d2810ae9
JH
430 account.Name = name
431 account.Password = password
432
433 out, err := yaml.Marshal(&account)
434 if err != nil {
435 return err
436 }
f22acf38
JH
437
438 if err := os.WriteFile(filepath.Join(s.ConfigDir, "Users", newLogin+".yaml"), out, 0666); err != nil {
d2810ae9
JH
439 return err
440 }
441
442 return nil
443}
444
6988a057
JH
445// DeleteUser deletes the user account
446func (s *Server) DeleteUser(login string) error {
447 s.mux.Lock()
448 defer s.mux.Unlock()
449
450 delete(s.Accounts, login)
451
f22acf38 452 return s.FS.Remove(filepath.Join(s.ConfigDir, "Users", login+".yaml"))
6988a057
JH
453}
454
455func (s *Server) connectedUsers() []Field {
456 s.mux.Lock()
457 defer s.mux.Unlock()
458
459 var connectedUsers []Field
c7e932c0 460 for _, c := range sortedClients(s.Clients) {
aebc4d36 461 if !c.Agreed {
bd1ce113
JH
462 continue
463 }
6988a057
JH
464 user := User{
465 ID: *c.ID,
a7216f67
JH
466 Icon: c.Icon,
467 Flags: c.Flags,
72dd37f1 468 Name: string(c.UserName),
6988a057
JH
469 }
470 connectedUsers = append(connectedUsers, NewField(fieldUsernameWithInfo, user.Payload()))
471 }
472 return connectedUsers
473}
474
46862572
JH
475func (s *Server) loadBanList(path string) error {
476 fh, err := os.Open(path)
477 if err != nil {
478 return err
479 }
480 decoder := yaml.NewDecoder(fh)
481
482 return decoder.Decode(s.banList)
483}
484
6988a057
JH
485// loadThreadedNews loads the threaded news data from disk
486func (s *Server) loadThreadedNews(threadedNewsPath string) error {
487 fh, err := os.Open(threadedNewsPath)
488 if err != nil {
489 return err
490 }
491 decoder := yaml.NewDecoder(fh)
6988a057
JH
492
493 return decoder.Decode(s.ThreadedNews)
494}
495
496// loadAccounts loads account data from disk
497func (s *Server) loadAccounts(userDir string) error {
f22acf38 498 matches, err := filepath.Glob(filepath.Join(userDir, "*.yaml"))
6988a057
JH
499 if err != nil {
500 return err
501 }
502
503 if len(matches) == 0 {
504 return errors.New("no user accounts found in " + userDir)
505 }
506
507 for _, file := range matches {
b196a50a 508 fh, err := s.FS.Open(file)
6988a057
JH
509 if err != nil {
510 return err
511 }
512
513 account := Account{}
514 decoder := yaml.NewDecoder(fh)
6988a057
JH
515 if err := decoder.Decode(&account); err != nil {
516 return err
517 }
518
519 s.Accounts[account.Login] = &account
520 }
521 return nil
522}
523
524func (s *Server) loadConfig(path string) error {
b196a50a 525 fh, err := s.FS.Open(path)
6988a057
JH
526 if err != nil {
527 return err
528 }
529
530 decoder := yaml.NewDecoder(fh)
6988a057
JH
531 err = decoder.Decode(s.Config)
532 if err != nil {
533 return err
534 }
041c2df6
JH
535
536 validate := validator.New()
537 err = validate.Struct(s.Config)
538 if err != nil {
539 return err
540 }
6988a057
JH
541 return nil
542}
543
6988a057 544// handleNewConnection takes a new net.Conn and performs the initial login sequence
3178ae58 545func (s *Server) handleNewConnection(ctx context.Context, rwc io.ReadWriteCloser, remoteAddr string) error {
c4208f86
JH
546 defer dontPanic(s.Logger)
547
3178ae58 548 if err := Handshake(rwc); err != nil {
6988a057
JH
549 return err
550 }
551
3178ae58
JH
552 // Create a new scanner for parsing incoming bytes into transaction tokens
553 scanner := bufio.NewScanner(rwc)
554 scanner.Split(transactionScanner)
555
556 scanner.Scan()
6988a057 557
854a92fc
JH
558 var clientLogin Transaction
559 if _, err := clientLogin.Write(scanner.Bytes()); err != nil {
560 return err
6988a057
JH
561 }
562
3178ae58 563 c := s.NewClientConn(rwc, remoteAddr)
46862572
JH
564
565 // check if remoteAddr is present in the ban list
566 if banUntil, ok := s.banList[strings.Split(remoteAddr, ":")[0]]; ok {
567 // permaban
568 if banUntil == nil {
569 s.outbox <- *NewTransaction(
570 tranServerMsg,
571 c.ID,
572 NewField(fieldData, []byte("You are permanently banned on this server")),
573 NewField(fieldChatOptions, []byte{0, 0}),
574 )
575 time.Sleep(1 * time.Second)
576 return nil
577 } else if time.Now().Before(*banUntil) {
578 s.outbox <- *NewTransaction(
579 tranServerMsg,
580 c.ID,
581 NewField(fieldData, []byte("You are temporarily banned on this server")),
582 NewField(fieldChatOptions, []byte{0, 0}),
583 )
584 time.Sleep(1 * time.Second)
585 return nil
586 }
587
588 }
6988a057 589 defer c.Disconnect()
6988a057
JH
590
591 encodedLogin := clientLogin.GetField(fieldUserLogin).Data
592 encodedPassword := clientLogin.GetField(fieldUserPassword).Data
a7216f67 593 c.Version = clientLogin.GetField(fieldVersion).Data
6988a057
JH
594
595 var login string
596 for _, char := range encodedLogin {
597 login += string(rune(255 - uint(char)))
598 }
599 if login == "" {
600 login = GuestAccount
601 }
602
0da28a1f
JH
603 c.logger = s.Logger.With("remoteAddr", remoteAddr, "login", login)
604
6988a057
JH
605 // If authentication fails, send error reply and close connection
606 if !c.Authenticate(login, encodedPassword) {
854a92fc 607 t := c.NewErrReply(&clientLogin, "Incorrect login.")
72dd37f1
JH
608 b, err := t.MarshalBinary()
609 if err != nil {
610 return err
611 }
3178ae58 612 if _, err := rwc.Write(b); err != nil {
6988a057
JH
613 return err
614 }
0da28a1f 615
a7216f67 616 c.logger.Infow("Login failed", "clientVersion", fmt.Sprintf("%x", c.Version))
0da28a1f
JH
617
618 return nil
6988a057
JH
619 }
620
59097464 621 if clientLogin.GetField(fieldUserIconID).Data != nil {
a7216f67 622 c.Icon = clientLogin.GetField(fieldUserIconID).Data
59097464
JH
623 }
624
625 c.Account = c.Server.Accounts[login]
626
6988a057 627 if clientLogin.GetField(fieldUserName).Data != nil {
ea5d8c51
JH
628 if c.Authorize(accessAnyName) {
629 c.UserName = clientLogin.GetField(fieldUserName).Data
630 } else {
631 c.UserName = []byte(c.Account.Name)
632 }
6988a057
JH
633 }
634
6988a057 635 if c.Authorize(accessDisconUser) {
a7216f67 636 c.Flags = []byte{0, 2}
6988a057
JH
637 }
638
854a92fc 639 s.outbox <- c.NewReply(&clientLogin,
6988a057 640 NewField(fieldVersion, []byte{0x00, 0xbe}),
9067f234 641 NewField(fieldCommunityBannerID, []byte{0, 0}),
6988a057
JH
642 NewField(fieldServerName, []byte(s.Config.Name)),
643 )
644
645 // Send user access privs so client UI knows how to behave
187d6dc5 646 c.Server.outbox <- *NewTransaction(tranUserAccess, c.ID, NewField(fieldUserAccess, c.Account.Access[:]))
6988a057 647
a322be02
JH
648 // Accounts with accessNoAgreement do not receive the server agreement on login. The behavior is different between
649 // client versions. For 1.2.3 client, we do not send tranShowAgreement. For other client versions, we send
650 // tranShowAgreement but with the NoServerAgreement field set to 1.
688c86d2 651 if c.Authorize(accessNoAgreement) {
a322be02
JH
652 // If client version is nil, then the client uses the 1.2.3 login behavior
653 if c.Version != nil {
654 c.Server.outbox <- *NewTransaction(tranShowAgreement, c.ID, NewField(fieldNoServerAgreement, []byte{1}))
655 }
688c86d2
JH
656 } else {
657 c.Server.outbox <- *NewTransaction(tranShowAgreement, c.ID, NewField(fieldData, s.Agreement))
658 }
6988a057 659
a82b93cf 660 // Used simplified hotline v1.2.3 login flow for clients that do not send login info in tranAgreed
a7216f67 661 if c.Version == nil || bytes.Equal(c.Version, nostalgiaVersion) {
bd1ce113 662 c.Agreed = true
67db911d 663 c.logger = c.logger.With("name", string(c.UserName))
0db54aa7 664 c.logger.Infow("Login successful", "clientVersion", fmt.Sprintf("%v", func() int { i, _ := byteToInt(c.Version); return i }()))
67db911d 665
21581958 666 for _, t := range c.notifyOthers(
003a743e
JH
667 *NewTransaction(
668 tranNotifyChangeUser, nil,
669 NewField(fieldUserName, c.UserName),
670 NewField(fieldUserID, *c.ID),
a7216f67
JH
671 NewField(fieldUserIconID, c.Icon),
672 NewField(fieldUserFlags, c.Flags),
003a743e 673 ),
21581958
JH
674 ) {
675 c.Server.outbox <- t
676 }
6988a057 677 }
bd1ce113 678
6988a057
JH
679 c.Server.Stats.LoginCount += 1
680
3178ae58
JH
681 // Scan for new transactions and handle them as they come in.
682 for scanner.Scan() {
683 // Make a new []byte slice and copy the scanner bytes to it. This is critical to avoid a data race as the
684 // scanner re-uses the buffer for subsequent scans.
685 buf := make([]byte, len(scanner.Bytes()))
686 copy(buf, scanner.Bytes())
6988a057 687
854a92fc
JH
688 var t Transaction
689 if _, err := t.Write(buf); err != nil {
690 return err
6988a057 691 }
854a92fc
JH
692
693 if err := c.handleTransaction(t); err != nil {
0fcfa5d5 694 c.logger.Errorw("Error handling transaction", "err", err)
6988a057 695 }
6988a057 696 }
3178ae58 697 return nil
6988a057
JH
698}
699
6988a057
JH
700func (s *Server) NewPrivateChat(cc *ClientConn) []byte {
701 s.mux.Lock()
702 defer s.mux.Unlock()
703
704 randID := make([]byte, 4)
705 rand.Read(randID)
706 data := binary.BigEndian.Uint32(randID[:])
707
708 s.PrivateChats[data] = &PrivateChat{
709 Subject: "",
710 ClientConn: make(map[uint16]*ClientConn),
711 }
712 s.PrivateChats[data].ClientConn[cc.uint16ID()] = cc
713
714 return randID
715}
716
717const dlFldrActionSendFile = 1
718const dlFldrActionResumeFile = 2
719const dlFldrActionNextFile = 3
720
85767504 721// handleFileTransfer receives a client net.Conn from the file transfer server, performs the requested transfer type, then closes the connection
7cd900d6 722func (s *Server) handleFileTransfer(ctx context.Context, rwc io.ReadWriter) error {
37a954c8 723 defer dontPanic(s.Logger)
0a92e50b 724
2e7c03cf 725 txBuf := make([]byte, 16)
7cd900d6 726 if _, err := io.ReadFull(rwc, txBuf); err != nil {
6988a057
JH
727 return err
728 }
729
df2735b2 730 var t transfer
0a92e50b 731 if _, err := t.Write(txBuf); err != nil {
6988a057
JH
732 return err
733 }
734
0a92e50b
JH
735 defer func() {
736 s.mux.Lock()
df1ade54 737 delete(s.fileTransfers, t.ReferenceNumber)
0a92e50b 738 s.mux.Unlock()
df1ade54 739
0a92e50b 740 }()
6988a057 741
0a92e50b 742 s.mux.Lock()
df1ade54 743 fileTransfer, ok := s.fileTransfers[t.ReferenceNumber]
0a92e50b
JH
744 s.mux.Unlock()
745 if !ok {
746 return errors.New("invalid transaction ID")
747 }
16a4ad70 748
df1ade54
JH
749 defer func() {
750 fileTransfer.ClientConn.transfersMU.Lock()
751 delete(fileTransfer.ClientConn.transfers[fileTransfer.Type], t.ReferenceNumber)
752 fileTransfer.ClientConn.transfersMU.Unlock()
753 }()
754
7cd900d6
JH
755 rLogger := s.Logger.With(
756 "remoteAddr", ctx.Value(contextKeyReq).(requestCtx).remoteAddr,
df1ade54
JH
757 "login", fileTransfer.ClientConn.Account.Login,
758 "name", string(fileTransfer.ClientConn.UserName),
7cd900d6
JH
759 )
760
df1ade54
JH
761 fullPath, err := readPath(s.Config.FileRoot, fileTransfer.FilePath, fileTransfer.FileName)
762 if err != nil {
763 return err
764 }
765
6988a057 766 switch fileTransfer.Type {
9067f234
JH
767 case bannerDownload:
768 if err := s.bannerDownload(rwc); err != nil {
df1ade54 769 panic(err)
9067f234
JH
770 return err
771 }
6988a057 772 case FileDownload:
23411fc2
JH
773 s.Stats.DownloadCounter += 1
774
16a4ad70
JH
775 var dataOffset int64
776 if fileTransfer.fileResumeData != nil {
777 dataOffset = int64(binary.BigEndian.Uint32(fileTransfer.fileResumeData.ForkInfoList[0].DataSize[:]))
778 }
779
df1ade54 780 fw, err := newFileWrapper(s.FS, fullPath, 0)
6988a057
JH
781 if err != nil {
782 return err
783 }
784
df1ade54 785 rLogger.Infow("File download started", "filePath", fullPath)
7cd900d6
JH
786
787 // if file transfer options are included, that means this is a "quick preview" request from a 1.5+ client
d1cd6664
JH
788 if fileTransfer.options == nil {
789 // Start by sending flat file object to client
df1ade54 790 if _, err := rwc.Write(fw.ffo.BinaryMarshal()); err != nil {
d1cd6664
JH
791 return err
792 }
6988a057
JH
793 }
794
7cd900d6 795 file, err := fw.dataForkReader()
6988a057
JH
796 if err != nil {
797 return err
798 }
799
df1ade54
JH
800 br := bufio.NewReader(file)
801 if _, err := br.Discard(int(dataOffset)); err != nil {
7cd900d6
JH
802 return err
803 }
804
df1ade54 805 if _, err = io.Copy(rwc, io.TeeReader(br, fileTransfer.bytesSentCounter)); err != nil {
7cd900d6
JH
806 return err
807 }
808
df1ade54 809 // if the client requested to resume transfer, do not send the resource fork header, or it will be appended into the fileWrapper data
7cd900d6 810 if fileTransfer.fileResumeData == nil {
df1ade54 811 err = binary.Write(rwc, binary.BigEndian, fw.rsrcForkHeader())
16a4ad70
JH
812 if err != nil {
813 return err
814 }
6988a057 815 }
7cd900d6
JH
816
817 rFile, err := fw.rsrcForkFile()
818 if err != nil {
819 return nil
820 }
821
df1ade54 822 if _, err = io.Copy(rwc, io.TeeReader(rFile, fileTransfer.bytesSentCounter)); err != nil {
7cd900d6
JH
823 return err
824 }
825
6988a057 826 case FileUpload:
23411fc2
JH
827 s.Stats.UploadCounter += 1
828
5c14e4c9
JH
829 var file *os.File
830
831 // A file upload has three possible cases:
832 // 1) Upload a new file
833 // 2) Resume a partially transferred file
834 // 3) Replace a fully uploaded file
7cd900d6 835 // We have to infer which case applies by inspecting what is already on the filesystem
5c14e4c9
JH
836
837 // 1) Check for existing file:
df1ade54 838 _, err = os.Stat(fullPath)
5c14e4c9 839 if err == nil {
df1ade54 840 return errors.New("existing file found at " + fullPath)
5c14e4c9 841 }
16a4ad70 842 if errors.Is(err, fs.ErrNotExist) {
7cd900d6 843 // If not found, open or create a new .incomplete file
df1ade54 844 file, err = os.OpenFile(fullPath+incompleteFileSuffix, os.O_CREATE|os.O_APPEND|os.O_WRONLY, 0644)
16a4ad70
JH
845 if err != nil {
846 return err
847 }
6988a057 848 }
16a4ad70 849
df1ade54 850 f, err := newFileWrapper(s.FS, fullPath, 0)
7cd900d6
JH
851 if err != nil {
852 return err
853 }
854
df1ade54 855 rLogger.Infow("File upload started", "dstFile", fullPath)
6988a057 856
7cd900d6
JH
857 rForkWriter := io.Discard
858 iForkWriter := io.Discard
859 if s.Config.PreserveResourceForks {
860 rForkWriter, err = f.rsrcForkWriter()
861 if err != nil {
862 return err
863 }
864
865 iForkWriter, err = f.infoForkWriter()
866 if err != nil {
867 return err
868 }
869 }
870
df1ade54
JH
871 if err := receiveFile(rwc, file, rForkWriter, iForkWriter, fileTransfer.bytesSentCounter); err != nil {
872 s.Logger.Error(err)
16a4ad70
JH
873 }
874
e00ff8fe
JH
875 if err := file.Close(); err != nil {
876 return err
877 }
67db911d 878
df1ade54 879 if err := s.FS.Rename(fullPath+".incomplete", fullPath); err != nil {
16a4ad70 880 return err
6988a057 881 }
85767504 882
df1ade54 883 rLogger.Infow("File upload complete", "dstFile", fullPath)
6988a057
JH
884 case FolderDownload:
885 // Folder Download flow:
df2735b2 886 // 1. Get filePath from the transfer
6988a057 887 // 2. Iterate over files
7cd900d6
JH
888 // 3. For each fileWrapper:
889 // Send fileWrapper header to client
6988a057
JH
890 // The client can reply in 3 ways:
891 //
7cd900d6
JH
892 // 1. If type is an odd number (unknown type?), or fileWrapper download for the current fileWrapper is completed:
893 // client sends []byte{0x00, 0x03} to tell the server to continue to the next fileWrapper
6988a057 894 //
7cd900d6 895 // 2. If download of a fileWrapper is to be resumed:
6988a057
JH
896 // client sends:
897 // []byte{0x00, 0x02} // download folder action
898 // [2]byte // Resume data size
7cd900d6 899 // []byte fileWrapper resume data (see myField_FileResumeData)
6988a057 900 //
7cd900d6 901 // 3. Otherwise, download of the fileWrapper is requested and client sends []byte{0x00, 0x01}
6988a057
JH
902 //
903 // When download is requested (case 2 or 3), server replies with:
7cd900d6 904 // [4]byte - fileWrapper size
6988a057
JH
905 // []byte - Flattened File Object
906 //
7cd900d6 907 // After every fileWrapper download, client could request next fileWrapper with:
6988a057
JH
908 // []byte{0x00, 0x03}
909 //
910 // This notifies the server to send the next item header
911
df1ade54 912 basePathLen := len(fullPath)
6988a057 913
df1ade54 914 rLogger.Infow("Start folder download", "path", fullPath)
6988a057 915
85767504 916 nextAction := make([]byte, 2)
7cd900d6 917 if _, err := io.ReadFull(rwc, nextAction); err != nil {
85767504
JH
918 return err
919 }
6988a057
JH
920
921 i := 0
df1ade54 922 err = filepath.Walk(fullPath+"/", func(path string, info os.FileInfo, err error) error {
23411fc2 923 s.Stats.DownloadCounter += 1
7cd900d6 924 i += 1
23411fc2 925
85767504
JH
926 if err != nil {
927 return err
928 }
7cd900d6
JH
929
930 // skip dot files
931 if strings.HasPrefix(info.Name(), ".") {
932 return nil
933 }
934
935 hlFile, err := newFileWrapper(s.FS, path, 0)
936 if err != nil {
937 return err
938 }
939
85767504 940 subPath := path[basePathLen+1:]
df1ade54 941 rLogger.Debugw("Sending fileheader", "i", i, "path", path, "fullFilePath", fullPath, "subPath", subPath, "IsDir", info.IsDir())
6988a057 942
6988a057
JH
943 if i == 1 {
944 return nil
945 }
946
85767504
JH
947 fileHeader := NewFileHeader(subPath, info.IsDir())
948
7cd900d6
JH
949 // Send the fileWrapper header to client
950 if _, err := rwc.Write(fileHeader.Payload()); err != nil {
6988a057
JH
951 s.Logger.Errorf("error sending file header: %v", err)
952 return err
953 }
954
955 // Read the client's Next Action request
7cd900d6 956 if _, err := io.ReadFull(rwc, nextAction); err != nil {
6988a057
JH
957 return err
958 }
959
df1ade54 960 rLogger.Debugw("Client folder download action", "action", fmt.Sprintf("%X", nextAction[0:2]))
6988a057 961
16a4ad70
JH
962 var dataOffset int64
963
964 switch nextAction[1] {
965 case dlFldrActionResumeFile:
16a4ad70 966 // get size of resumeData
7cd900d6
JH
967 resumeDataByteLen := make([]byte, 2)
968 if _, err := io.ReadFull(rwc, resumeDataByteLen); err != nil {
16a4ad70
JH
969 return err
970 }
971
7cd900d6 972 resumeDataLen := binary.BigEndian.Uint16(resumeDataByteLen)
16a4ad70 973 resumeDataBytes := make([]byte, resumeDataLen)
7cd900d6 974 if _, err := io.ReadFull(rwc, resumeDataBytes); err != nil {
16a4ad70
JH
975 return err
976 }
977
7cd900d6 978 var frd FileResumeData
16a4ad70
JH
979 if err := frd.UnmarshalBinary(resumeDataBytes); err != nil {
980 return err
981 }
982 dataOffset = int64(binary.BigEndian.Uint32(frd.ForkInfoList[0].DataSize[:]))
983 case dlFldrActionNextFile:
984 // client asked to skip this file
985 return nil
986 }
987
6988a057
JH
988 if info.IsDir() {
989 return nil
990 }
991
df1ade54 992 rLogger.Infow("File download started",
6988a057 993 "fileName", info.Name(),
7cd900d6 994 "TransferSize", fmt.Sprintf("%x", hlFile.ffo.TransferSize(dataOffset)),
6988a057
JH
995 )
996
997 // Send file size to client
7cd900d6 998 if _, err := rwc.Write(hlFile.ffo.TransferSize(dataOffset)); err != nil {
6988a057
JH
999 s.Logger.Error(err)
1000 return err
1001 }
1002
85767504 1003 // Send ffo bytes to client
7cd900d6 1004 if _, err := rwc.Write(hlFile.ffo.BinaryMarshal()); err != nil {
6988a057
JH
1005 s.Logger.Error(err)
1006 return err
1007 }
1008
b196a50a 1009 file, err := s.FS.Open(path)
6988a057
JH
1010 if err != nil {
1011 return err
1012 }
1013
7cd900d6 1014 // wr := bufio.NewWriterSize(rwc, 1460)
df1ade54 1015 if _, err = io.Copy(rwc, io.TeeReader(file, fileTransfer.bytesSentCounter)); err != nil {
7cd900d6
JH
1016 return err
1017 }
1018
1019 if nextAction[1] != 2 && hlFile.ffo.FlatFileHeader.ForkCount[1] == 3 {
1020 err = binary.Write(rwc, binary.BigEndian, hlFile.rsrcForkHeader())
16a4ad70 1021 if err != nil {
7cd900d6 1022 return err
16a4ad70 1023 }
16a4ad70 1024
7cd900d6
JH
1025 rFile, err := hlFile.rsrcForkFile()
1026 if err != nil {
1027 return err
1028 }
16a4ad70 1029
df1ade54 1030 if _, err = io.Copy(rwc, io.TeeReader(rFile, fileTransfer.bytesSentCounter)); err != nil {
16a4ad70
JH
1031 return err
1032 }
85767504 1033 }
6988a057 1034
16a4ad70 1035 // Read the client's Next Action request. This is always 3, I think?
7cd900d6 1036 if _, err := io.ReadFull(rwc, nextAction); err != nil {
85767504 1037 return err
6988a057 1038 }
85767504 1039
16a4ad70 1040 return nil
6988a057
JH
1041 })
1042
67db911d
JH
1043 if err != nil {
1044 return err
1045 }
1046
6988a057 1047 case FolderUpload:
df1ade54 1048 rLogger.Infow(
6988a057 1049 "Folder upload started",
df1ade54
JH
1050 "dstPath", fullPath,
1051 "TransferSize", binary.BigEndian.Uint32(fileTransfer.TransferSize),
6988a057
JH
1052 "FolderItemCount", fileTransfer.FolderItemCount,
1053 )
1054
1055 // Check if the target folder exists. If not, create it.
df1ade54
JH
1056 if _, err := s.FS.Stat(fullPath); os.IsNotExist(err) {
1057 if err := s.FS.Mkdir(fullPath, 0777); err != nil {
16a4ad70 1058 return err
6988a057
JH
1059 }
1060 }
1061
6988a057 1062 // Begin the folder upload flow by sending the "next file action" to client
7cd900d6 1063 if _, err := rwc.Write([]byte{0, dlFldrActionNextFile}); err != nil {
6988a057
JH
1064 return err
1065 }
1066
1067 fileSize := make([]byte, 4)
16a4ad70
JH
1068
1069 for i := 0; i < fileTransfer.ItemCount(); i++ {
ba29c43b
JH
1070 s.Stats.UploadCounter += 1
1071
1072 var fu folderUpload
7cd900d6 1073 if _, err := io.ReadFull(rwc, fu.DataSize[:]); err != nil {
ba29c43b
JH
1074 return err
1075 }
7cd900d6 1076 if _, err := io.ReadFull(rwc, fu.IsFolder[:]); err != nil {
ba29c43b
JH
1077 return err
1078 }
7cd900d6 1079 if _, err := io.ReadFull(rwc, fu.PathItemCount[:]); err != nil {
ba29c43b
JH
1080 return err
1081 }
ba29c43b 1082
7cd900d6
JH
1083 fu.FileNamePath = make([]byte, binary.BigEndian.Uint16(fu.DataSize[:])-4) // -4 to subtract the path separator bytes
1084
1085 if _, err := io.ReadFull(rwc, fu.FileNamePath); err != nil {
6988a057
JH
1086 return err
1087 }
6988a057 1088
df1ade54 1089 rLogger.Infow(
6988a057 1090 "Folder upload continued",
6988a057
JH
1091 "FormattedPath", fu.FormattedPath(),
1092 "IsFolder", fmt.Sprintf("%x", fu.IsFolder),
c5d9af5a 1093 "PathItemCount", binary.BigEndian.Uint16(fu.PathItemCount[:]),
6988a057
JH
1094 )
1095
c5d9af5a 1096 if fu.IsFolder == [2]byte{0, 1} {
df1ade54
JH
1097 if _, err := os.Stat(filepath.Join(fullPath, fu.FormattedPath())); os.IsNotExist(err) {
1098 if err := os.Mkdir(filepath.Join(fullPath, fu.FormattedPath()), 0777); err != nil {
16a4ad70 1099 return err
6988a057
JH
1100 }
1101 }
1102
1103 // Tell client to send next file
7cd900d6 1104 if _, err := rwc.Write([]byte{0, dlFldrActionNextFile}); err != nil {
6988a057
JH
1105 return err
1106 }
1107 } else {
16a4ad70
JH
1108 nextAction := dlFldrActionSendFile
1109
1110 // Check if we have the full file already. If so, send dlFldrAction_NextFile to client to skip.
df1ade54 1111 _, err = os.Stat(filepath.Join(fullPath, fu.FormattedPath()))
16a4ad70 1112 if err != nil && !errors.Is(err, fs.ErrNotExist) {
6988a057
JH
1113 return err
1114 }
16a4ad70
JH
1115 if err == nil {
1116 nextAction = dlFldrActionNextFile
1117 }
6988a057 1118
16a4ad70 1119 // Check if we have a partial file already. If so, send dlFldrAction_ResumeFile to client to resume upload.
df1ade54 1120 incompleteFile, err := os.Stat(filepath.Join(fullPath, fu.FormattedPath()+incompleteFileSuffix))
16a4ad70 1121 if err != nil && !errors.Is(err, fs.ErrNotExist) {
85767504 1122 return err
6988a057 1123 }
16a4ad70
JH
1124 if err == nil {
1125 nextAction = dlFldrActionResumeFile
1126 }
6988a057 1127
7cd900d6 1128 if _, err := rwc.Write([]byte{0, uint8(nextAction)}); err != nil {
85767504
JH
1129 return err
1130 }
1131
16a4ad70
JH
1132 switch nextAction {
1133 case dlFldrActionNextFile:
1134 continue
1135 case dlFldrActionResumeFile:
1136 offset := make([]byte, 4)
7cd900d6 1137 binary.BigEndian.PutUint32(offset, uint32(incompleteFile.Size()))
16a4ad70 1138
df1ade54 1139 file, err := os.OpenFile(fullPath+"/"+fu.FormattedPath()+incompleteFileSuffix, os.O_APPEND|os.O_CREATE|os.O_WRONLY, 0644)
16a4ad70
JH
1140 if err != nil {
1141 return err
1142 }
1143
7cd900d6 1144 fileResumeData := NewFileResumeData([]ForkInfoList{*NewForkInfoList(offset)})
16a4ad70
JH
1145
1146 b, _ := fileResumeData.BinaryMarshal()
1147
1148 bs := make([]byte, 2)
1149 binary.BigEndian.PutUint16(bs, uint16(len(b)))
1150
7cd900d6 1151 if _, err := rwc.Write(append(bs, b...)); err != nil {
16a4ad70
JH
1152 return err
1153 }
1154
7cd900d6 1155 if _, err := io.ReadFull(rwc, fileSize); err != nil {
16a4ad70
JH
1156 return err
1157 }
1158
df1ade54 1159 if err := receiveFile(rwc, file, ioutil.Discard, ioutil.Discard, fileTransfer.bytesSentCounter); err != nil {
16a4ad70
JH
1160 s.Logger.Error(err)
1161 }
1162
df1ade54 1163 err = os.Rename(fullPath+"/"+fu.FormattedPath()+".incomplete", fullPath+"/"+fu.FormattedPath())
16a4ad70
JH
1164 if err != nil {
1165 return err
1166 }
1167
1168 case dlFldrActionSendFile:
7cd900d6 1169 if _, err := io.ReadFull(rwc, fileSize); err != nil {
16a4ad70
JH
1170 return err
1171 }
1172
df1ade54 1173 filePath := filepath.Join(fullPath, fu.FormattedPath())
16a4ad70 1174
7cd900d6 1175 hlFile, err := newFileWrapper(s.FS, filePath, 0)
16a4ad70
JH
1176 if err != nil {
1177 return err
1178 }
1179
df1ade54 1180 rLogger.Infow("Starting file transfer", "path", filePath, "fileNum", i+1, "fileSize", binary.BigEndian.Uint32(fileSize))
7cd900d6
JH
1181
1182 incWriter, err := hlFile.incFileWriter()
1183 if err != nil {
1184 return err
1185 }
1186
1187 rForkWriter := io.Discard
1188 iForkWriter := io.Discard
1189 if s.Config.PreserveResourceForks {
1190 iForkWriter, err = hlFile.infoForkWriter()
1191 if err != nil {
1192 return err
1193 }
1194
1195 rForkWriter, err = hlFile.rsrcForkWriter()
1196 if err != nil {
1197 return err
1198 }
16a4ad70 1199 }
df1ade54 1200 if err := receiveFile(rwc, incWriter, rForkWriter, iForkWriter, fileTransfer.bytesSentCounter); err != nil {
7cd900d6
JH
1201 return err
1202 }
df1ade54 1203
16a4ad70
JH
1204 if err := os.Rename(filePath+".incomplete", filePath); err != nil {
1205 return err
1206 }
6988a057
JH
1207 }
1208
7cd900d6
JH
1209 // Tell client to send next fileWrapper
1210 if _, err := rwc.Write([]byte{0, dlFldrActionNextFile}); err != nil {
6988a057
JH
1211 return err
1212 }
6988a057
JH
1213 }
1214 }
df1ade54 1215 rLogger.Infof("Folder upload complete")
6988a057
JH
1216 }
1217
1218 return nil
1219}