]> git.r.bdr.sh - rbdr/mobius/blame - hotline/server.go
Refactor TrackerRegistration Read to io.Reader interface
[rbdr/mobius] / hotline / server.go
CommitLineData
6988a057
JH
1package hotline
2
3import (
7cd900d6 4 "bufio"
6988a057
JH
5 "context"
6 "encoding/binary"
7 "errors"
8 "fmt"
041c2df6 9 "github.com/go-playground/validator/v10"
6988a057 10 "go.uber.org/zap"
2e1aec0f 11 "golang.org/x/text/encoding/charmap"
7cd900d6 12 "gopkg.in/yaml.v3"
6988a057 13 "io"
16a4ad70 14 "io/fs"
6988a057
JH
15 "math/big"
16 "math/rand"
17 "net"
18 "os"
180d6544 19 "path"
6988a057 20 "path/filepath"
6988a057
JH
21 "strings"
22 "sync"
23 "time"
6988a057
JH
24)
25
7cd900d6
JH
26type contextKey string
27
28var contextKeyReq = contextKey("req")
29
30type requestCtx struct {
31 remoteAddr string
7cd900d6
JH
32}
33
2e1aec0f
JH
34// Converts bytes from Mac Roman encoding to UTF-8
35var txtDecoder = charmap.Macintosh.NewDecoder()
36
37// Converts bytes from UTF-8 to Mac Roman encoding
38var txtEncoder = charmap.Macintosh.NewEncoder()
39
6988a057 40type Server struct {
2d0f2abe 41 NetInterface string
8eb43f95
JH
42 Port int
43 Accounts map[string]*Account
44 Agreement []byte
45 Clients map[uint16]*ClientConn
df1ade54
JH
46 fileTransfers map[[4]byte]*FileTransfer
47
c1c44744
JH
48 Config *Config
49 ConfigDir string
50 Logger *zap.SugaredLogger
51
52 PrivateChatsMu sync.Mutex
53 PrivateChats map[uint32]*PrivateChat
54
6988a057 55 NextGuestID *uint16
40414f92 56 TrackerPassID [4]byte
00913df3
JH
57
58 StatsMu sync.Mutex
59 Stats *Stats
6988a057 60
7cd900d6 61 FS FileStore // Storage backend to use for File storage
6988a057
JH
62
63 outbox chan Transaction
7cd900d6 64 mux sync.Mutex
6988a057 65
8eb43f95
JH
66 threadedNewsMux sync.Mutex
67 ThreadedNews *ThreadedNews
68
6988a057 69 flatNewsMux sync.Mutex
7cd900d6 70 FlatNews []byte
46862572
JH
71
72 banListMU sync.Mutex
73 banList map[string]*time.Time
6988a057
JH
74}
75
00913df3
JH
76func (s *Server) CurrentStats() Stats {
77 s.StatsMu.Lock()
78 defer s.StatsMu.Unlock()
79
80 stats := s.Stats
81 stats.CurrentlyConnected = len(s.Clients)
82
83 return *stats
84}
85
6988a057
JH
86type PrivateChat struct {
87 Subject string
88 ClientConn map[uint16]*ClientConn
89}
90
91func (s *Server) ListenAndServe(ctx context.Context, cancelRoot context.CancelFunc) error {
aeec1015
JH
92 s.Logger.Infow("Hotline server started",
93 "version", VERSION,
2d0f2abe
JH
94 "API port", fmt.Sprintf("%s:%v", s.NetInterface, s.Port),
95 "Transfer port", fmt.Sprintf("%s:%v", s.NetInterface, s.Port+1),
aeec1015
JH
96 )
97
6988a057
JH
98 var wg sync.WaitGroup
99
100 wg.Add(1)
8168522a 101 go func() {
2d0f2abe 102 ln, err := net.Listen("tcp", fmt.Sprintf("%s:%v", s.NetInterface, s.Port))
8168522a
JH
103 if err != nil {
104 s.Logger.Fatal(err)
105 }
106
7cd900d6 107 s.Logger.Fatal(s.Serve(ctx, ln))
8168522a 108 }()
6988a057
JH
109
110 wg.Add(1)
8168522a 111 go func() {
2d0f2abe 112 ln, err := net.Listen("tcp", fmt.Sprintf("%s:%v", s.NetInterface, s.Port+1))
8168522a
JH
113 if err != nil {
114 s.Logger.Fatal(err)
8168522a
JH
115 }
116
7cd900d6 117 s.Logger.Fatal(s.ServeFileTransfers(ctx, ln))
8168522a 118 }()
6988a057
JH
119
120 wg.Wait()
121
122 return nil
123}
124
7cd900d6 125func (s *Server) ServeFileTransfers(ctx context.Context, ln net.Listener) error {
6988a057
JH
126 for {
127 conn, err := ln.Accept()
128 if err != nil {
129 return err
130 }
131
132 go func() {
7cd900d6
JH
133 defer func() { _ = conn.Close() }()
134
135 err = s.handleFileTransfer(
136 context.WithValue(ctx, contextKeyReq, requestCtx{
137 remoteAddr: conn.RemoteAddr().String(),
138 }),
139 conn,
140 )
141
142 if err != nil {
6988a057
JH
143 s.Logger.Errorw("file transfer error", "reason", err)
144 }
145 }()
146 }
147}
148
149func (s *Server) sendTransaction(t Transaction) error {
6988a057
JH
150 clientID, err := byteToInt(*t.clientID)
151 if err != nil {
152 return err
153 }
154
155 s.mux.Lock()
156 client := s.Clients[uint16(clientID)]
75e4191b 157 s.mux.Unlock()
6988a057 158 if client == nil {
bd1ce113 159 return fmt.Errorf("invalid client id %v", *t.clientID)
6988a057 160 }
6988a057 161
72dd37f1
JH
162 b, err := t.MarshalBinary()
163 if err != nil {
164 return err
165 }
3178ae58 166
75e4191b
JH
167 _, err = client.Connection.Write(b)
168 if err != nil {
6988a057
JH
169 return err
170 }
3178ae58 171
6988a057
JH
172 return nil
173}
174
67db911d
JH
175func (s *Server) processOutbox() {
176 for {
177 t := <-s.outbox
178 go func() {
179 if err := s.sendTransaction(t); err != nil {
180 s.Logger.Errorw("error sending transaction", "err", err)
181 }
182 }()
183 }
184}
185
7cd900d6 186func (s *Server) Serve(ctx context.Context, ln net.Listener) error {
67db911d
JH
187 go s.processOutbox()
188
6988a057
JH
189 for {
190 conn, err := ln.Accept()
191 if err != nil {
192 s.Logger.Errorw("error accepting connection", "err", err)
193 }
67db911d
JH
194 connCtx := context.WithValue(ctx, contextKeyReq, requestCtx{
195 remoteAddr: conn.RemoteAddr().String(),
196 })
6988a057
JH
197
198 go func() {
0da28a1f
JH
199 s.Logger.Infow("Connection established", "RemoteAddr", conn.RemoteAddr())
200
46862572 201 defer conn.Close()
67db911d 202 if err := s.handleNewConnection(connCtx, conn, conn.RemoteAddr().String()); err != nil {
6988a057
JH
203 if err == io.EOF {
204 s.Logger.Infow("Client disconnected", "RemoteAddr", conn.RemoteAddr())
205 } else {
206 s.Logger.Errorw("error serving request", "RemoteAddr", conn.RemoteAddr(), "err", err)
207 }
208 }
209 }()
210 }
211}
212
213const (
c7e932c0 214 agreementFile = "Agreement.txt"
6988a057
JH
215)
216
217// NewServer constructs a new Server from a config dir
2d0f2abe 218func NewServer(configDir, netInterface string, netPort int, logger *zap.SugaredLogger, fs FileStore) (*Server, error) {
6988a057 219 server := Server{
2d0f2abe 220 NetInterface: netInterface,
6988a057
JH
221 Port: netPort,
222 Accounts: make(map[string]*Account),
223 Config: new(Config),
224 Clients: make(map[uint16]*ClientConn),
df1ade54 225 fileTransfers: make(map[[4]byte]*FileTransfer),
6988a057
JH
226 PrivateChats: make(map[uint32]*PrivateChat),
227 ConfigDir: configDir,
228 Logger: logger,
229 NextGuestID: new(uint16),
230 outbox: make(chan Transaction),
00913df3 231 Stats: &Stats{Since: time.Now()},
6988a057 232 ThreadedNews: &ThreadedNews{},
d6141467 233 FS: fs,
46862572 234 banList: make(map[string]*time.Time),
6988a057
JH
235 }
236
8168522a 237 var err error
6988a057
JH
238
239 // generate a new random passID for tracker registration
40414f92 240 if _, err := rand.Read(server.TrackerPassID[:]); err != nil {
6988a057
JH
241 return nil, err
242 }
243
f22acf38 244 server.Agreement, err = os.ReadFile(filepath.Join(configDir, agreementFile))
b196a50a 245 if err != nil {
6988a057
JH
246 return nil, err
247 }
248
f22acf38 249 if server.FlatNews, err = os.ReadFile(filepath.Join(configDir, "MessageBoard.txt")); err != nil {
6988a057
JH
250 return nil, err
251 }
252
46862572
JH
253 // try to load the ban list, but ignore errors as this file may not be present or may be empty
254 _ = server.loadBanList(filepath.Join(configDir, "Banlist.yaml"))
255
f22acf38 256 if err := server.loadThreadedNews(filepath.Join(configDir, "ThreadedNews.yaml")); err != nil {
6988a057
JH
257 return nil, err
258 }
259
f22acf38 260 if err := server.loadConfig(filepath.Join(configDir, "config.yaml")); err != nil {
6988a057
JH
261 return nil, err
262 }
263
f22acf38 264 if err := server.loadAccounts(filepath.Join(configDir, "Users/")); err != nil {
6988a057
JH
265 return nil, err
266 }
267
70c2c110
JH
268 // If the FileRoot is an absolute path, use it, otherwise treat as a relative path to the config dir.
269 if !filepath.IsAbs(server.Config.FileRoot) {
270 server.Config.FileRoot = filepath.Join(configDir, server.Config.FileRoot)
271 }
6988a057
JH
272
273 *server.NextGuestID = 1
274
275 if server.Config.EnableTrackerRegistration {
e42888eb
JH
276 server.Logger.Infow(
277 "Tracker registration enabled",
278 "frequency", fmt.Sprintf("%vs", trackerUpdateFrequency),
279 "trackers", server.Config.Trackers,
280 )
281
6988a057
JH
282 go func() {
283 for {
e42888eb 284 tr := &TrackerRegistration{
6988a057 285 UserCount: server.userCount(),
40414f92 286 PassID: server.TrackerPassID[:],
6988a057
JH
287 Name: server.Config.Name,
288 Description: server.Config.Description,
289 }
40414f92 290 binary.BigEndian.PutUint16(tr.Port[:], uint16(server.Port))
6988a057 291 for _, t := range server.Config.Trackers {
6988a057
JH
292 if err := register(t, tr); err != nil {
293 server.Logger.Errorw("unable to register with tracker %v", "error", err)
294 }
78b305d6 295 server.Logger.Debugw("Sent Tracker registration", "addr", t)
6988a057
JH
296 }
297
298 time.Sleep(trackerUpdateFrequency * time.Second)
299 }
300 }()
301 }
302
303 // Start Client Keepalive go routine
304 go server.keepaliveHandler()
305
306 return &server, nil
307}
308
309func (s *Server) userCount() int {
310 s.mux.Lock()
311 defer s.mux.Unlock()
312
313 return len(s.Clients)
314}
315
316func (s *Server) keepaliveHandler() {
317 for {
318 time.Sleep(idleCheckInterval * time.Second)
319 s.mux.Lock()
320
321 for _, c := range s.Clients {
61c272e1
JH
322 c.IdleTime += idleCheckInterval
323 if c.IdleTime > userIdleSeconds && !c.Idle {
6988a057
JH
324 c.Idle = true
325
a7216f67 326 flagBitmap := big.NewInt(int64(binary.BigEndian.Uint16(c.Flags)))
b1658a46 327 flagBitmap.SetBit(flagBitmap, UserFlagAway, 1)
a7216f67 328 binary.BigEndian.PutUint16(c.Flags, uint16(flagBitmap.Int64()))
6988a057
JH
329
330 c.sendAll(
d005ef04
JH
331 TranNotifyChangeUser,
332 NewField(FieldUserID, *c.ID),
333 NewField(FieldUserFlags, c.Flags),
334 NewField(FieldUserName, c.UserName),
335 NewField(FieldUserIconID, c.Icon),
6988a057
JH
336 )
337 }
338 }
339 s.mux.Unlock()
340 }
341}
342
46862572
JH
343func (s *Server) writeBanList() error {
344 s.banListMU.Lock()
345 defer s.banListMU.Unlock()
346
347 out, err := yaml.Marshal(s.banList)
348 if err != nil {
349 return err
350 }
7152b7e5 351 err = os.WriteFile(
46862572
JH
352 filepath.Join(s.ConfigDir, "Banlist.yaml"),
353 out,
354 0666,
355 )
356 return err
357}
358
6988a057 359func (s *Server) writeThreadedNews() error {
8eb43f95
JH
360 s.threadedNewsMux.Lock()
361 defer s.threadedNewsMux.Unlock()
6988a057
JH
362
363 out, err := yaml.Marshal(s.ThreadedNews)
364 if err != nil {
365 return err
366 }
8eb43f95 367 err = s.FS.WriteFile(
f22acf38 368 filepath.Join(s.ConfigDir, "ThreadedNews.yaml"),
6988a057
JH
369 out,
370 0666,
371 )
372 return err
373}
374
67db911d 375func (s *Server) NewClientConn(conn io.ReadWriteCloser, remoteAddr string) *ClientConn {
6988a057
JH
376 s.mux.Lock()
377 defer s.mux.Unlock()
378
379 clientConn := &ClientConn{
380 ID: &[]byte{0, 0},
a7216f67
JH
381 Icon: []byte{0, 0},
382 Flags: []byte{0, 0},
72dd37f1 383 UserName: []byte{},
6988a057
JH
384 Connection: conn,
385 Server: s,
a7216f67 386 Version: []byte{},
aebc4d36 387 AutoReply: []byte{},
d4c152a4 388 RemoteAddr: remoteAddr,
180d6544
JH
389 transfers: map[int]map[[4]byte]*FileTransfer{
390 FileDownload: {},
391 FileUpload: {},
392 FolderDownload: {},
393 FolderUpload: {},
394 bannerDownload: {},
395 },
df1ade54
JH
396 }
397
6988a057
JH
398 *s.NextGuestID++
399 ID := *s.NextGuestID
400
6988a057
JH
401 binary.BigEndian.PutUint16(*clientConn.ID, ID)
402 s.Clients[ID] = clientConn
403
404 return clientConn
405}
406
407// NewUser creates a new user account entry in the server map and config file
187d6dc5 408func (s *Server) NewUser(login, name, password string, access accessBitmap) error {
6988a057
JH
409 s.mux.Lock()
410 defer s.mux.Unlock()
411
412 account := Account{
413 Login: login,
414 Name: name,
415 Password: hashAndSalt([]byte(password)),
187d6dc5 416 Access: access,
6988a057
JH
417 }
418 out, err := yaml.Marshal(&account)
419 if err != nil {
420 return err
421 }
180d6544
JH
422
423 // Create account file, returning an error if one already exists.
424 file, err := os.OpenFile(
425 filepath.Join(s.ConfigDir, "Users", path.Join("/", login)+".yaml"),
426 os.O_CREATE|os.O_EXCL|os.O_WRONLY,
427 0644,
428 )
429 if err != nil {
430 return err
431 }
432 defer file.Close()
433
434 _, err = file.Write(out)
435 if err != nil {
436 return fmt.Errorf("error writing account file: %w", err)
437 }
438
6988a057
JH
439 s.Accounts[login] = &account
440
180d6544 441 return nil
6988a057
JH
442}
443
187d6dc5 444func (s *Server) UpdateUser(login, newLogin, name, password string, access accessBitmap) error {
d2810ae9
JH
445 s.mux.Lock()
446 defer s.mux.Unlock()
447
d2810ae9
JH
448 // update renames the user login
449 if login != newLogin {
b8b0a6c9 450 err := os.Rename(filepath.Join(s.ConfigDir, "Users", path.Join("/", login)+".yaml"), filepath.Join(s.ConfigDir, "Users", path.Join("/", newLogin)+".yaml"))
d2810ae9 451 if err != nil {
b8b0a6c9 452 return fmt.Errorf("unable to rename account: %w", err)
d2810ae9
JH
453 }
454 s.Accounts[newLogin] = s.Accounts[login]
b8b0a6c9 455 s.Accounts[newLogin].Login = newLogin
d2810ae9
JH
456 delete(s.Accounts, login)
457 }
458
459 account := s.Accounts[newLogin]
187d6dc5 460 account.Access = access
d2810ae9
JH
461 account.Name = name
462 account.Password = password
463
464 out, err := yaml.Marshal(&account)
465 if err != nil {
466 return err
467 }
f22acf38
JH
468
469 if err := os.WriteFile(filepath.Join(s.ConfigDir, "Users", newLogin+".yaml"), out, 0666); err != nil {
d2810ae9
JH
470 return err
471 }
472
473 return nil
474}
475
6988a057
JH
476// DeleteUser deletes the user account
477func (s *Server) DeleteUser(login string) error {
478 s.mux.Lock()
479 defer s.mux.Unlock()
480
180d6544
JH
481 err := s.FS.Remove(filepath.Join(s.ConfigDir, "Users", path.Join("/", login)+".yaml"))
482 if err != nil {
483 return err
484 }
485
6988a057
JH
486 delete(s.Accounts, login)
487
180d6544 488 return nil
6988a057
JH
489}
490
491func (s *Server) connectedUsers() []Field {
492 s.mux.Lock()
493 defer s.mux.Unlock()
494
495 var connectedUsers []Field
c7e932c0 496 for _, c := range sortedClients(s.Clients) {
6988a057
JH
497 user := User{
498 ID: *c.ID,
a7216f67
JH
499 Icon: c.Icon,
500 Flags: c.Flags,
72dd37f1 501 Name: string(c.UserName),
6988a057 502 }
d005ef04 503 connectedUsers = append(connectedUsers, NewField(FieldUsernameWithInfo, user.Payload()))
6988a057
JH
504 }
505 return connectedUsers
506}
507
46862572
JH
508func (s *Server) loadBanList(path string) error {
509 fh, err := os.Open(path)
510 if err != nil {
511 return err
512 }
513 decoder := yaml.NewDecoder(fh)
514
515 return decoder.Decode(s.banList)
516}
517
6988a057
JH
518// loadThreadedNews loads the threaded news data from disk
519func (s *Server) loadThreadedNews(threadedNewsPath string) error {
520 fh, err := os.Open(threadedNewsPath)
521 if err != nil {
522 return err
523 }
524 decoder := yaml.NewDecoder(fh)
6988a057
JH
525
526 return decoder.Decode(s.ThreadedNews)
527}
528
529// loadAccounts loads account data from disk
530func (s *Server) loadAccounts(userDir string) error {
f22acf38 531 matches, err := filepath.Glob(filepath.Join(userDir, "*.yaml"))
6988a057
JH
532 if err != nil {
533 return err
534 }
535
536 if len(matches) == 0 {
537 return errors.New("no user accounts found in " + userDir)
538 }
539
540 for _, file := range matches {
b196a50a 541 fh, err := s.FS.Open(file)
6988a057
JH
542 if err != nil {
543 return err
544 }
545
546 account := Account{}
547 decoder := yaml.NewDecoder(fh)
180d6544
JH
548 if err = decoder.Decode(&account); err != nil {
549 return fmt.Errorf("error loading account %s: %w", file, err)
6988a057
JH
550 }
551
552 s.Accounts[account.Login] = &account
553 }
554 return nil
555}
556
557func (s *Server) loadConfig(path string) error {
b196a50a 558 fh, err := s.FS.Open(path)
6988a057
JH
559 if err != nil {
560 return err
561 }
562
563 decoder := yaml.NewDecoder(fh)
6988a057
JH
564 err = decoder.Decode(s.Config)
565 if err != nil {
566 return err
567 }
041c2df6
JH
568
569 validate := validator.New()
570 err = validate.Struct(s.Config)
571 if err != nil {
572 return err
573 }
6988a057
JH
574 return nil
575}
576
6988a057 577// handleNewConnection takes a new net.Conn and performs the initial login sequence
3178ae58 578func (s *Server) handleNewConnection(ctx context.Context, rwc io.ReadWriteCloser, remoteAddr string) error {
c4208f86
JH
579 defer dontPanic(s.Logger)
580
3178ae58 581 if err := Handshake(rwc); err != nil {
6988a057
JH
582 return err
583 }
584
3178ae58
JH
585 // Create a new scanner for parsing incoming bytes into transaction tokens
586 scanner := bufio.NewScanner(rwc)
587 scanner.Split(transactionScanner)
588
589 scanner.Scan()
6988a057 590
f4cdaddc
JH
591 // Make a new []byte slice and copy the scanner bytes to it. This is critical to avoid a data race as the
592 // scanner re-uses the buffer for subsequent scans.
593 buf := make([]byte, len(scanner.Bytes()))
594 copy(buf, scanner.Bytes())
595
854a92fc 596 var clientLogin Transaction
f4cdaddc 597 if _, err := clientLogin.Write(buf); err != nil {
854a92fc 598 return err
6988a057
JH
599 }
600
46862572
JH
601 // check if remoteAddr is present in the ban list
602 if banUntil, ok := s.banList[strings.Split(remoteAddr, ":")[0]]; ok {
603 // permaban
604 if banUntil == nil {
e9c043c0 605 t := NewTransaction(
d005ef04 606 TranServerMsg,
e9c043c0 607 &[]byte{0, 0},
d005ef04
JH
608 NewField(FieldData, []byte("You are permanently banned on this server")),
609 NewField(FieldChatOptions, []byte{0, 0}),
46862572 610 )
e9c043c0
JH
611
612 b, err := t.MarshalBinary()
613 if err != nil {
614 return err
615 }
616
617 _, err = rwc.Write(b)
618 if err != nil {
619 return err
620 }
621
46862572
JH
622 time.Sleep(1 * time.Second)
623 return nil
e9c043c0
JH
624 }
625
626 // temporary ban
627 if time.Now().Before(*banUntil) {
628 t := NewTransaction(
d005ef04 629 TranServerMsg,
e9c043c0 630 &[]byte{0, 0},
d005ef04
JH
631 NewField(FieldData, []byte("You are temporarily banned on this server")),
632 NewField(FieldChatOptions, []byte{0, 0}),
46862572 633 )
e9c043c0
JH
634 b, err := t.MarshalBinary()
635 if err != nil {
636 return err
637 }
638
639 _, err = rwc.Write(b)
640 if err != nil {
641 return err
642 }
643
46862572
JH
644 time.Sleep(1 * time.Second)
645 return nil
646 }
46862572 647 }
e9c043c0
JH
648
649 c := s.NewClientConn(rwc, remoteAddr)
6988a057 650 defer c.Disconnect()
6988a057 651
d005ef04
JH
652 encodedLogin := clientLogin.GetField(FieldUserLogin).Data
653 encodedPassword := clientLogin.GetField(FieldUserPassword).Data
654 c.Version = clientLogin.GetField(FieldVersion).Data
6988a057
JH
655
656 var login string
657 for _, char := range encodedLogin {
658 login += string(rune(255 - uint(char)))
659 }
660 if login == "" {
661 login = GuestAccount
662 }
663
0da28a1f
JH
664 c.logger = s.Logger.With("remoteAddr", remoteAddr, "login", login)
665
6988a057
JH
666 // If authentication fails, send error reply and close connection
667 if !c.Authenticate(login, encodedPassword) {
854a92fc 668 t := c.NewErrReply(&clientLogin, "Incorrect login.")
72dd37f1
JH
669 b, err := t.MarshalBinary()
670 if err != nil {
671 return err
672 }
3178ae58 673 if _, err := rwc.Write(b); err != nil {
6988a057
JH
674 return err
675 }
0da28a1f 676
a7216f67 677 c.logger.Infow("Login failed", "clientVersion", fmt.Sprintf("%x", c.Version))
0da28a1f
JH
678
679 return nil
6988a057
JH
680 }
681
d005ef04
JH
682 if clientLogin.GetField(FieldUserIconID).Data != nil {
683 c.Icon = clientLogin.GetField(FieldUserIconID).Data
59097464
JH
684 }
685
686 c.Account = c.Server.Accounts[login]
687
d005ef04 688 if clientLogin.GetField(FieldUserName).Data != nil {
ea5d8c51 689 if c.Authorize(accessAnyName) {
d005ef04 690 c.UserName = clientLogin.GetField(FieldUserName).Data
ea5d8c51
JH
691 } else {
692 c.UserName = []byte(c.Account.Name)
693 }
6988a057
JH
694 }
695
6988a057 696 if c.Authorize(accessDisconUser) {
a7216f67 697 c.Flags = []byte{0, 2}
6988a057
JH
698 }
699
854a92fc 700 s.outbox <- c.NewReply(&clientLogin,
d005ef04
JH
701 NewField(FieldVersion, []byte{0x00, 0xbe}),
702 NewField(FieldCommunityBannerID, []byte{0, 0}),
703 NewField(FieldServerName, []byte(s.Config.Name)),
6988a057
JH
704 )
705
706 // Send user access privs so client UI knows how to behave
d005ef04 707 c.Server.outbox <- *NewTransaction(TranUserAccess, c.ID, NewField(FieldUserAccess, c.Account.Access[:]))
6988a057 708
a322be02 709 // Accounts with accessNoAgreement do not receive the server agreement on login. The behavior is different between
d005ef04
JH
710 // client versions. For 1.2.3 client, we do not send TranShowAgreement. For other client versions, we send
711 // TranShowAgreement but with the NoServerAgreement field set to 1.
688c86d2 712 if c.Authorize(accessNoAgreement) {
a322be02
JH
713 // If client version is nil, then the client uses the 1.2.3 login behavior
714 if c.Version != nil {
d005ef04 715 c.Server.outbox <- *NewTransaction(TranShowAgreement, c.ID, NewField(FieldNoServerAgreement, []byte{1}))
a322be02 716 }
688c86d2 717 } else {
d005ef04 718 c.Server.outbox <- *NewTransaction(TranShowAgreement, c.ID, NewField(FieldData, s.Agreement))
688c86d2 719 }
6988a057 720
2f8472fa
JH
721 // If the client has provided a username as part of the login, we can infer that it is using the 1.2.3 login
722 // flow and not the 1.5+ flow.
723 if len(c.UserName) != 0 {
724 // Add the client username to the logger. For 1.5+ clients, we don't have this information yet as it comes as
d005ef04 725 // part of TranAgreed
2f8472fa
JH
726 c.logger = c.logger.With("name", string(c.UserName))
727
728 c.logger.Infow("Login successful", "clientVersion", "Not sent (probably 1.2.3)")
729
730 // Notify other clients on the server that the new user has logged in. For 1.5+ clients we don't have this
d005ef04 731 // information yet, so we do it in TranAgreed instead
2f8472fa
JH
732 for _, t := range c.notifyOthers(
733 *NewTransaction(
d005ef04
JH
734 TranNotifyChangeUser, nil,
735 NewField(FieldUserName, c.UserName),
736 NewField(FieldUserID, *c.ID),
737 NewField(FieldUserIconID, c.Icon),
738 NewField(FieldUserFlags, c.Flags),
2f8472fa
JH
739 ),
740 ) {
741 c.Server.outbox <- t
742 }
6988a057 743 }
bd1ce113 744
00913df3
JH
745 c.Server.Stats.ConnectionCounter += 1
746 if len(s.Clients) > c.Server.Stats.ConnectionPeak {
747 c.Server.Stats.ConnectionPeak = len(s.Clients)
748 }
6988a057 749
3178ae58
JH
750 // Scan for new transactions and handle them as they come in.
751 for scanner.Scan() {
752 // Make a new []byte slice and copy the scanner bytes to it. This is critical to avoid a data race as the
753 // scanner re-uses the buffer for subsequent scans.
754 buf := make([]byte, len(scanner.Bytes()))
755 copy(buf, scanner.Bytes())
6988a057 756
854a92fc
JH
757 var t Transaction
758 if _, err := t.Write(buf); err != nil {
759 return err
6988a057 760 }
854a92fc
JH
761
762 if err := c.handleTransaction(t); err != nil {
0fcfa5d5 763 c.logger.Errorw("Error handling transaction", "err", err)
6988a057 764 }
6988a057 765 }
3178ae58 766 return nil
6988a057
JH
767}
768
6988a057 769func (s *Server) NewPrivateChat(cc *ClientConn) []byte {
c1c44744
JH
770 s.PrivateChatsMu.Lock()
771 defer s.PrivateChatsMu.Unlock()
6988a057
JH
772
773 randID := make([]byte, 4)
774 rand.Read(randID)
aeb97482 775 data := binary.BigEndian.Uint32(randID)
6988a057
JH
776
777 s.PrivateChats[data] = &PrivateChat{
6988a057
JH
778 ClientConn: make(map[uint16]*ClientConn),
779 }
780 s.PrivateChats[data].ClientConn[cc.uint16ID()] = cc
781
782 return randID
783}
784
785const dlFldrActionSendFile = 1
786const dlFldrActionResumeFile = 2
787const dlFldrActionNextFile = 3
788
85767504 789// handleFileTransfer receives a client net.Conn from the file transfer server, performs the requested transfer type, then closes the connection
7cd900d6 790func (s *Server) handleFileTransfer(ctx context.Context, rwc io.ReadWriter) error {
37a954c8 791 defer dontPanic(s.Logger)
0a92e50b 792
2e7c03cf 793 txBuf := make([]byte, 16)
7cd900d6 794 if _, err := io.ReadFull(rwc, txBuf); err != nil {
6988a057
JH
795 return err
796 }
797
df2735b2 798 var t transfer
0a92e50b 799 if _, err := t.Write(txBuf); err != nil {
6988a057
JH
800 return err
801 }
802
0a92e50b
JH
803 defer func() {
804 s.mux.Lock()
df1ade54 805 delete(s.fileTransfers, t.ReferenceNumber)
0a92e50b 806 s.mux.Unlock()
df1ade54 807
94742e2f
JH
808 // Wait a few seconds before closing the connection: this is a workaround for problems
809 // observed with Windows clients where the client must initiate close of the TCP connection before
810 // the server does. This is gross and seems unnecessary. TODO: Revisit?
811 time.Sleep(3 * time.Second)
0a92e50b 812 }()
6988a057 813
0a92e50b 814 s.mux.Lock()
df1ade54 815 fileTransfer, ok := s.fileTransfers[t.ReferenceNumber]
0a92e50b
JH
816 s.mux.Unlock()
817 if !ok {
818 return errors.New("invalid transaction ID")
819 }
16a4ad70 820
df1ade54
JH
821 defer func() {
822 fileTransfer.ClientConn.transfersMU.Lock()
823 delete(fileTransfer.ClientConn.transfers[fileTransfer.Type], t.ReferenceNumber)
824 fileTransfer.ClientConn.transfersMU.Unlock()
825 }()
826
7cd900d6
JH
827 rLogger := s.Logger.With(
828 "remoteAddr", ctx.Value(contextKeyReq).(requestCtx).remoteAddr,
df1ade54
JH
829 "login", fileTransfer.ClientConn.Account.Login,
830 "name", string(fileTransfer.ClientConn.UserName),
7cd900d6
JH
831 )
832
df1ade54
JH
833 fullPath, err := readPath(s.Config.FileRoot, fileTransfer.FilePath, fileTransfer.FileName)
834 if err != nil {
835 return err
836 }
837
6988a057 838 switch fileTransfer.Type {
9067f234
JH
839 case bannerDownload:
840 if err := s.bannerDownload(rwc); err != nil {
841 return err
842 }
6988a057 843 case FileDownload:
23411fc2 844 s.Stats.DownloadCounter += 1
00913df3 845 s.Stats.DownloadsInProgress += 1
94742e2f
JH
846 defer func() {
847 s.Stats.DownloadsInProgress -= 1
848 }()
23411fc2 849
16a4ad70
JH
850 var dataOffset int64
851 if fileTransfer.fileResumeData != nil {
852 dataOffset = int64(binary.BigEndian.Uint32(fileTransfer.fileResumeData.ForkInfoList[0].DataSize[:]))
853 }
854
df1ade54 855 fw, err := newFileWrapper(s.FS, fullPath, 0)
6988a057
JH
856 if err != nil {
857 return err
858 }
859
df1ade54 860 rLogger.Infow("File download started", "filePath", fullPath)
7cd900d6
JH
861
862 // if file transfer options are included, that means this is a "quick preview" request from a 1.5+ client
d1cd6664
JH
863 if fileTransfer.options == nil {
864 // Start by sending flat file object to client
df1ade54 865 if _, err := rwc.Write(fw.ffo.BinaryMarshal()); err != nil {
d1cd6664
JH
866 return err
867 }
6988a057
JH
868 }
869
7cd900d6 870 file, err := fw.dataForkReader()
6988a057
JH
871 if err != nil {
872 return err
873 }
874
df1ade54
JH
875 br := bufio.NewReader(file)
876 if _, err := br.Discard(int(dataOffset)); err != nil {
7cd900d6
JH
877 return err
878 }
879
df1ade54 880 if _, err = io.Copy(rwc, io.TeeReader(br, fileTransfer.bytesSentCounter)); err != nil {
7cd900d6
JH
881 return err
882 }
883
df1ade54 884 // if the client requested to resume transfer, do not send the resource fork header, or it will be appended into the fileWrapper data
7cd900d6 885 if fileTransfer.fileResumeData == nil {
df1ade54 886 err = binary.Write(rwc, binary.BigEndian, fw.rsrcForkHeader())
16a4ad70
JH
887 if err != nil {
888 return err
889 }
6988a057 890 }
7cd900d6
JH
891
892 rFile, err := fw.rsrcForkFile()
893 if err != nil {
894 return nil
895 }
896
df1ade54 897 if _, err = io.Copy(rwc, io.TeeReader(rFile, fileTransfer.bytesSentCounter)); err != nil {
7cd900d6
JH
898 return err
899 }
900
6988a057 901 case FileUpload:
23411fc2 902 s.Stats.UploadCounter += 1
00913df3
JH
903 s.Stats.UploadsInProgress += 1
904 defer func() { s.Stats.UploadsInProgress -= 1 }()
23411fc2 905
5c14e4c9
JH
906 var file *os.File
907
908 // A file upload has three possible cases:
909 // 1) Upload a new file
910 // 2) Resume a partially transferred file
911 // 3) Replace a fully uploaded file
7cd900d6 912 // We have to infer which case applies by inspecting what is already on the filesystem
5c14e4c9
JH
913
914 // 1) Check for existing file:
df1ade54 915 _, err = os.Stat(fullPath)
5c14e4c9 916 if err == nil {
df1ade54 917 return errors.New("existing file found at " + fullPath)
5c14e4c9 918 }
16a4ad70 919 if errors.Is(err, fs.ErrNotExist) {
7cd900d6 920 // If not found, open or create a new .incomplete file
df1ade54 921 file, err = os.OpenFile(fullPath+incompleteFileSuffix, os.O_CREATE|os.O_APPEND|os.O_WRONLY, 0644)
16a4ad70
JH
922 if err != nil {
923 return err
924 }
6988a057 925 }
16a4ad70 926
df1ade54 927 f, err := newFileWrapper(s.FS, fullPath, 0)
7cd900d6
JH
928 if err != nil {
929 return err
930 }
931
df1ade54 932 rLogger.Infow("File upload started", "dstFile", fullPath)
6988a057 933
7cd900d6
JH
934 rForkWriter := io.Discard
935 iForkWriter := io.Discard
936 if s.Config.PreserveResourceForks {
937 rForkWriter, err = f.rsrcForkWriter()
938 if err != nil {
939 return err
940 }
941
942 iForkWriter, err = f.infoForkWriter()
943 if err != nil {
944 return err
945 }
946 }
947
df1ade54
JH
948 if err := receiveFile(rwc, file, rForkWriter, iForkWriter, fileTransfer.bytesSentCounter); err != nil {
949 s.Logger.Error(err)
16a4ad70
JH
950 }
951
e00ff8fe
JH
952 if err := file.Close(); err != nil {
953 return err
954 }
67db911d 955
df1ade54 956 if err := s.FS.Rename(fullPath+".incomplete", fullPath); err != nil {
16a4ad70 957 return err
6988a057 958 }
85767504 959
df1ade54 960 rLogger.Infow("File upload complete", "dstFile", fullPath)
00913df3 961
6988a057 962 case FolderDownload:
00913df3
JH
963 s.Stats.DownloadCounter += 1
964 s.Stats.DownloadsInProgress += 1
965 defer func() { s.Stats.DownloadsInProgress -= 1 }()
966
6988a057 967 // Folder Download flow:
df2735b2 968 // 1. Get filePath from the transfer
6988a057 969 // 2. Iterate over files
7cd900d6
JH
970 // 3. For each fileWrapper:
971 // Send fileWrapper header to client
6988a057
JH
972 // The client can reply in 3 ways:
973 //
7cd900d6
JH
974 // 1. If type is an odd number (unknown type?), or fileWrapper download for the current fileWrapper is completed:
975 // client sends []byte{0x00, 0x03} to tell the server to continue to the next fileWrapper
6988a057 976 //
7cd900d6 977 // 2. If download of a fileWrapper is to be resumed:
6988a057
JH
978 // client sends:
979 // []byte{0x00, 0x02} // download folder action
980 // [2]byte // Resume data size
7cd900d6 981 // []byte fileWrapper resume data (see myField_FileResumeData)
6988a057 982 //
7cd900d6 983 // 3. Otherwise, download of the fileWrapper is requested and client sends []byte{0x00, 0x01}
6988a057
JH
984 //
985 // When download is requested (case 2 or 3), server replies with:
7cd900d6 986 // [4]byte - fileWrapper size
6988a057
JH
987 // []byte - Flattened File Object
988 //
7cd900d6 989 // After every fileWrapper download, client could request next fileWrapper with:
6988a057
JH
990 // []byte{0x00, 0x03}
991 //
992 // This notifies the server to send the next item header
993
df1ade54 994 basePathLen := len(fullPath)
6988a057 995
df1ade54 996 rLogger.Infow("Start folder download", "path", fullPath)
6988a057 997
85767504 998 nextAction := make([]byte, 2)
7cd900d6 999 if _, err := io.ReadFull(rwc, nextAction); err != nil {
85767504
JH
1000 return err
1001 }
6988a057
JH
1002
1003 i := 0
df1ade54 1004 err = filepath.Walk(fullPath+"/", func(path string, info os.FileInfo, err error) error {
23411fc2 1005 s.Stats.DownloadCounter += 1
7cd900d6 1006 i += 1
23411fc2 1007
85767504
JH
1008 if err != nil {
1009 return err
1010 }
7cd900d6
JH
1011
1012 // skip dot files
1013 if strings.HasPrefix(info.Name(), ".") {
1014 return nil
1015 }
1016
1017 hlFile, err := newFileWrapper(s.FS, path, 0)
1018 if err != nil {
1019 return err
1020 }
1021
85767504 1022 subPath := path[basePathLen+1:]
df1ade54 1023 rLogger.Debugw("Sending fileheader", "i", i, "path", path, "fullFilePath", fullPath, "subPath", subPath, "IsDir", info.IsDir())
6988a057 1024
6988a057
JH
1025 if i == 1 {
1026 return nil
1027 }
1028
85767504
JH
1029 fileHeader := NewFileHeader(subPath, info.IsDir())
1030
7cd900d6
JH
1031 // Send the fileWrapper header to client
1032 if _, err := rwc.Write(fileHeader.Payload()); err != nil {
6988a057
JH
1033 s.Logger.Errorf("error sending file header: %v", err)
1034 return err
1035 }
1036
1037 // Read the client's Next Action request
7cd900d6 1038 if _, err := io.ReadFull(rwc, nextAction); err != nil {
6988a057
JH
1039 return err
1040 }
1041
df1ade54 1042 rLogger.Debugw("Client folder download action", "action", fmt.Sprintf("%X", nextAction[0:2]))
6988a057 1043
16a4ad70
JH
1044 var dataOffset int64
1045
1046 switch nextAction[1] {
1047 case dlFldrActionResumeFile:
16a4ad70 1048 // get size of resumeData
7cd900d6
JH
1049 resumeDataByteLen := make([]byte, 2)
1050 if _, err := io.ReadFull(rwc, resumeDataByteLen); err != nil {
16a4ad70
JH
1051 return err
1052 }
1053
7cd900d6 1054 resumeDataLen := binary.BigEndian.Uint16(resumeDataByteLen)
16a4ad70 1055 resumeDataBytes := make([]byte, resumeDataLen)
7cd900d6 1056 if _, err := io.ReadFull(rwc, resumeDataBytes); err != nil {
16a4ad70
JH
1057 return err
1058 }
1059
7cd900d6 1060 var frd FileResumeData
16a4ad70
JH
1061 if err := frd.UnmarshalBinary(resumeDataBytes); err != nil {
1062 return err
1063 }
1064 dataOffset = int64(binary.BigEndian.Uint32(frd.ForkInfoList[0].DataSize[:]))
1065 case dlFldrActionNextFile:
1066 // client asked to skip this file
1067 return nil
1068 }
1069
6988a057
JH
1070 if info.IsDir() {
1071 return nil
1072 }
1073
df1ade54 1074 rLogger.Infow("File download started",
6988a057 1075 "fileName", info.Name(),
7cd900d6 1076 "TransferSize", fmt.Sprintf("%x", hlFile.ffo.TransferSize(dataOffset)),
6988a057
JH
1077 )
1078
1079 // Send file size to client
7cd900d6 1080 if _, err := rwc.Write(hlFile.ffo.TransferSize(dataOffset)); err != nil {
6988a057
JH
1081 s.Logger.Error(err)
1082 return err
1083 }
1084
85767504 1085 // Send ffo bytes to client
7cd900d6 1086 if _, err := rwc.Write(hlFile.ffo.BinaryMarshal()); err != nil {
6988a057
JH
1087 s.Logger.Error(err)
1088 return err
1089 }
1090
b196a50a 1091 file, err := s.FS.Open(path)
6988a057
JH
1092 if err != nil {
1093 return err
1094 }
1095
7cd900d6 1096 // wr := bufio.NewWriterSize(rwc, 1460)
df1ade54 1097 if _, err = io.Copy(rwc, io.TeeReader(file, fileTransfer.bytesSentCounter)); err != nil {
7cd900d6
JH
1098 return err
1099 }
1100
1101 if nextAction[1] != 2 && hlFile.ffo.FlatFileHeader.ForkCount[1] == 3 {
1102 err = binary.Write(rwc, binary.BigEndian, hlFile.rsrcForkHeader())
16a4ad70 1103 if err != nil {
7cd900d6 1104 return err
16a4ad70 1105 }
16a4ad70 1106
7cd900d6
JH
1107 rFile, err := hlFile.rsrcForkFile()
1108 if err != nil {
1109 return err
1110 }
16a4ad70 1111
df1ade54 1112 if _, err = io.Copy(rwc, io.TeeReader(rFile, fileTransfer.bytesSentCounter)); err != nil {
16a4ad70
JH
1113 return err
1114 }
85767504 1115 }
6988a057 1116
16a4ad70 1117 // Read the client's Next Action request. This is always 3, I think?
7cd900d6 1118 if _, err := io.ReadFull(rwc, nextAction); err != nil {
85767504 1119 return err
6988a057 1120 }
85767504 1121
16a4ad70 1122 return nil
6988a057
JH
1123 })
1124
67db911d
JH
1125 if err != nil {
1126 return err
1127 }
1128
6988a057 1129 case FolderUpload:
00913df3
JH
1130 s.Stats.UploadCounter += 1
1131 s.Stats.UploadsInProgress += 1
1132 defer func() { s.Stats.UploadsInProgress -= 1 }()
df1ade54 1133 rLogger.Infow(
6988a057 1134 "Folder upload started",
df1ade54
JH
1135 "dstPath", fullPath,
1136 "TransferSize", binary.BigEndian.Uint32(fileTransfer.TransferSize),
6988a057
JH
1137 "FolderItemCount", fileTransfer.FolderItemCount,
1138 )
1139
1140 // Check if the target folder exists. If not, create it.
df1ade54
JH
1141 if _, err := s.FS.Stat(fullPath); os.IsNotExist(err) {
1142 if err := s.FS.Mkdir(fullPath, 0777); err != nil {
16a4ad70 1143 return err
6988a057
JH
1144 }
1145 }
1146
6988a057 1147 // Begin the folder upload flow by sending the "next file action" to client
7cd900d6 1148 if _, err := rwc.Write([]byte{0, dlFldrActionNextFile}); err != nil {
6988a057
JH
1149 return err
1150 }
1151
1152 fileSize := make([]byte, 4)
16a4ad70
JH
1153
1154 for i := 0; i < fileTransfer.ItemCount(); i++ {
ba29c43b
JH
1155 s.Stats.UploadCounter += 1
1156
1157 var fu folderUpload
7cd900d6 1158 if _, err := io.ReadFull(rwc, fu.DataSize[:]); err != nil {
ba29c43b
JH
1159 return err
1160 }
7cd900d6 1161 if _, err := io.ReadFull(rwc, fu.IsFolder[:]); err != nil {
ba29c43b
JH
1162 return err
1163 }
7cd900d6 1164 if _, err := io.ReadFull(rwc, fu.PathItemCount[:]); err != nil {
ba29c43b
JH
1165 return err
1166 }
ba29c43b 1167
7cd900d6
JH
1168 fu.FileNamePath = make([]byte, binary.BigEndian.Uint16(fu.DataSize[:])-4) // -4 to subtract the path separator bytes
1169
1170 if _, err := io.ReadFull(rwc, fu.FileNamePath); err != nil {
6988a057
JH
1171 return err
1172 }
6988a057 1173
df1ade54 1174 rLogger.Infow(
6988a057 1175 "Folder upload continued",
6988a057
JH
1176 "FormattedPath", fu.FormattedPath(),
1177 "IsFolder", fmt.Sprintf("%x", fu.IsFolder),
c5d9af5a 1178 "PathItemCount", binary.BigEndian.Uint16(fu.PathItemCount[:]),
6988a057
JH
1179 )
1180
c5d9af5a 1181 if fu.IsFolder == [2]byte{0, 1} {
df1ade54
JH
1182 if _, err := os.Stat(filepath.Join(fullPath, fu.FormattedPath())); os.IsNotExist(err) {
1183 if err := os.Mkdir(filepath.Join(fullPath, fu.FormattedPath()), 0777); err != nil {
16a4ad70 1184 return err
6988a057
JH
1185 }
1186 }
1187
1188 // Tell client to send next file
7cd900d6 1189 if _, err := rwc.Write([]byte{0, dlFldrActionNextFile}); err != nil {
6988a057
JH
1190 return err
1191 }
1192 } else {
16a4ad70
JH
1193 nextAction := dlFldrActionSendFile
1194
1195 // Check if we have the full file already. If so, send dlFldrAction_NextFile to client to skip.
df1ade54 1196 _, err = os.Stat(filepath.Join(fullPath, fu.FormattedPath()))
16a4ad70 1197 if err != nil && !errors.Is(err, fs.ErrNotExist) {
6988a057
JH
1198 return err
1199 }
16a4ad70
JH
1200 if err == nil {
1201 nextAction = dlFldrActionNextFile
1202 }
6988a057 1203
16a4ad70 1204 // Check if we have a partial file already. If so, send dlFldrAction_ResumeFile to client to resume upload.
df1ade54 1205 incompleteFile, err := os.Stat(filepath.Join(fullPath, fu.FormattedPath()+incompleteFileSuffix))
16a4ad70 1206 if err != nil && !errors.Is(err, fs.ErrNotExist) {
85767504 1207 return err
6988a057 1208 }
16a4ad70
JH
1209 if err == nil {
1210 nextAction = dlFldrActionResumeFile
1211 }
6988a057 1212
7cd900d6 1213 if _, err := rwc.Write([]byte{0, uint8(nextAction)}); err != nil {
85767504
JH
1214 return err
1215 }
1216
16a4ad70
JH
1217 switch nextAction {
1218 case dlFldrActionNextFile:
1219 continue
1220 case dlFldrActionResumeFile:
1221 offset := make([]byte, 4)
7cd900d6 1222 binary.BigEndian.PutUint32(offset, uint32(incompleteFile.Size()))
16a4ad70 1223
df1ade54 1224 file, err := os.OpenFile(fullPath+"/"+fu.FormattedPath()+incompleteFileSuffix, os.O_APPEND|os.O_CREATE|os.O_WRONLY, 0644)
16a4ad70
JH
1225 if err != nil {
1226 return err
1227 }
1228
7cd900d6 1229 fileResumeData := NewFileResumeData([]ForkInfoList{*NewForkInfoList(offset)})
16a4ad70
JH
1230
1231 b, _ := fileResumeData.BinaryMarshal()
1232
1233 bs := make([]byte, 2)
1234 binary.BigEndian.PutUint16(bs, uint16(len(b)))
1235
7cd900d6 1236 if _, err := rwc.Write(append(bs, b...)); err != nil {
16a4ad70
JH
1237 return err
1238 }
1239
7cd900d6 1240 if _, err := io.ReadFull(rwc, fileSize); err != nil {
16a4ad70
JH
1241 return err
1242 }
1243
7152b7e5 1244 if err := receiveFile(rwc, file, io.Discard, io.Discard, fileTransfer.bytesSentCounter); err != nil {
16a4ad70
JH
1245 s.Logger.Error(err)
1246 }
1247
df1ade54 1248 err = os.Rename(fullPath+"/"+fu.FormattedPath()+".incomplete", fullPath+"/"+fu.FormattedPath())
16a4ad70
JH
1249 if err != nil {
1250 return err
1251 }
1252
1253 case dlFldrActionSendFile:
7cd900d6 1254 if _, err := io.ReadFull(rwc, fileSize); err != nil {
16a4ad70
JH
1255 return err
1256 }
1257
df1ade54 1258 filePath := filepath.Join(fullPath, fu.FormattedPath())
16a4ad70 1259
7cd900d6 1260 hlFile, err := newFileWrapper(s.FS, filePath, 0)
16a4ad70
JH
1261 if err != nil {
1262 return err
1263 }
1264
df1ade54 1265 rLogger.Infow("Starting file transfer", "path", filePath, "fileNum", i+1, "fileSize", binary.BigEndian.Uint32(fileSize))
7cd900d6
JH
1266
1267 incWriter, err := hlFile.incFileWriter()
1268 if err != nil {
1269 return err
1270 }
1271
1272 rForkWriter := io.Discard
1273 iForkWriter := io.Discard
1274 if s.Config.PreserveResourceForks {
1275 iForkWriter, err = hlFile.infoForkWriter()
1276 if err != nil {
1277 return err
1278 }
1279
1280 rForkWriter, err = hlFile.rsrcForkWriter()
1281 if err != nil {
1282 return err
1283 }
16a4ad70 1284 }
df1ade54 1285 if err := receiveFile(rwc, incWriter, rForkWriter, iForkWriter, fileTransfer.bytesSentCounter); err != nil {
7cd900d6
JH
1286 return err
1287 }
df1ade54 1288
16a4ad70
JH
1289 if err := os.Rename(filePath+".incomplete", filePath); err != nil {
1290 return err
1291 }
6988a057
JH
1292 }
1293
7cd900d6
JH
1294 // Tell client to send next fileWrapper
1295 if _, err := rwc.Write([]byte{0, dlFldrActionNextFile}); err != nil {
6988a057
JH
1296 return err
1297 }
6988a057
JH
1298 }
1299 }
df1ade54 1300 rLogger.Infof("Folder upload complete")
6988a057
JH
1301 }
1302
1303 return nil
1304}