9 "github.com/go-playground/validator/v10"
11 "golang.org/x/text/encoding/charmap"
25 type contextKey string
27 var contextKeyReq = contextKey("req")
29 type requestCtx struct {
33 // Converts bytes from Mac Roman encoding to UTF-8
34 var txtDecoder = charmap.Macintosh.NewDecoder()
36 // Converts bytes from UTF-8 to Mac Roman encoding
37 var txtEncoder = charmap.Macintosh.NewEncoder()
42 Accounts map[string]*Account
44 Clients map[uint16]*ClientConn
45 fileTransfers map[[4]byte]*FileTransfer
49 Logger *zap.SugaredLogger
51 PrivateChatsMu sync.Mutex
52 PrivateChats map[uint32]*PrivateChat
60 FS FileStore // Storage backend to use for File storage
62 outbox chan Transaction
65 threadedNewsMux sync.Mutex
66 ThreadedNews *ThreadedNews
68 flatNewsMux sync.Mutex
72 banList map[string]*time.Time
75 func (s *Server) CurrentStats() Stats {
77 defer s.StatsMu.Unlock()
80 stats.CurrentlyConnected = len(s.Clients)
85 type PrivateChat struct {
87 ClientConn map[uint16]*ClientConn
90 func (s *Server) ListenAndServe(ctx context.Context, cancelRoot context.CancelFunc) error {
91 s.Logger.Infow("Hotline server started",
93 "API port", fmt.Sprintf("%s:%v", s.NetInterface, s.Port),
94 "Transfer port", fmt.Sprintf("%s:%v", s.NetInterface, s.Port+1),
101 ln, err := net.Listen("tcp", fmt.Sprintf("%s:%v", s.NetInterface, s.Port))
106 s.Logger.Fatal(s.Serve(ctx, ln))
111 ln, err := net.Listen("tcp", fmt.Sprintf("%s:%v", s.NetInterface, s.Port+1))
116 s.Logger.Fatal(s.ServeFileTransfers(ctx, ln))
124 func (s *Server) ServeFileTransfers(ctx context.Context, ln net.Listener) error {
126 conn, err := ln.Accept()
132 defer func() { _ = conn.Close() }()
134 err = s.handleFileTransfer(
135 context.WithValue(ctx, contextKeyReq, requestCtx{
136 remoteAddr: conn.RemoteAddr().String(),
142 s.Logger.Errorw("file transfer error", "reason", err)
148 func (s *Server) sendTransaction(t Transaction) error {
149 clientID, err := byteToInt(*t.clientID)
155 client := s.Clients[uint16(clientID)]
158 return fmt.Errorf("invalid client id %v", *t.clientID)
161 b, err := t.MarshalBinary()
166 _, err = client.Connection.Write(b)
174 func (s *Server) processOutbox() {
178 if err := s.sendTransaction(t); err != nil {
179 s.Logger.Errorw("error sending transaction", "err", err)
185 func (s *Server) Serve(ctx context.Context, ln net.Listener) error {
189 conn, err := ln.Accept()
191 s.Logger.Errorw("error accepting connection", "err", err)
193 connCtx := context.WithValue(ctx, contextKeyReq, requestCtx{
194 remoteAddr: conn.RemoteAddr().String(),
198 s.Logger.Infow("Connection established", "RemoteAddr", conn.RemoteAddr())
201 if err := s.handleNewConnection(connCtx, conn, conn.RemoteAddr().String()); err != nil {
203 s.Logger.Infow("Client disconnected", "RemoteAddr", conn.RemoteAddr())
205 s.Logger.Errorw("error serving request", "RemoteAddr", conn.RemoteAddr(), "err", err)
213 agreementFile = "Agreement.txt"
216 // NewServer constructs a new Server from a config dir
217 func NewServer(configDir, netInterface string, netPort int, logger *zap.SugaredLogger, fs FileStore) (*Server, error) {
219 NetInterface: netInterface,
221 Accounts: make(map[string]*Account),
223 Clients: make(map[uint16]*ClientConn),
224 fileTransfers: make(map[[4]byte]*FileTransfer),
225 PrivateChats: make(map[uint32]*PrivateChat),
226 ConfigDir: configDir,
228 NextGuestID: new(uint16),
229 outbox: make(chan Transaction),
230 Stats: &Stats{Since: time.Now()},
231 ThreadedNews: &ThreadedNews{},
233 banList: make(map[string]*time.Time),
238 // generate a new random passID for tracker registration
239 if _, err := rand.Read(server.TrackerPassID[:]); err != nil {
243 server.Agreement, err = os.ReadFile(filepath.Join(configDir, agreementFile))
248 if server.FlatNews, err = os.ReadFile(filepath.Join(configDir, "MessageBoard.txt")); err != nil {
252 // try to load the ban list, but ignore errors as this file may not be present or may be empty
253 _ = server.loadBanList(filepath.Join(configDir, "Banlist.yaml"))
255 if err := server.loadThreadedNews(filepath.Join(configDir, "ThreadedNews.yaml")); err != nil {
259 if err := server.loadConfig(filepath.Join(configDir, "config.yaml")); err != nil {
263 if err := server.loadAccounts(filepath.Join(configDir, "Users/")); err != nil {
267 // If the FileRoot is an absolute path, use it, otherwise treat as a relative path to the config dir.
268 if !filepath.IsAbs(server.Config.FileRoot) {
269 server.Config.FileRoot = filepath.Join(configDir, server.Config.FileRoot)
272 *server.NextGuestID = 1
274 if server.Config.EnableTrackerRegistration {
276 "Tracker registration enabled",
277 "frequency", fmt.Sprintf("%vs", trackerUpdateFrequency),
278 "trackers", server.Config.Trackers,
283 tr := &TrackerRegistration{
284 UserCount: server.userCount(),
285 PassID: server.TrackerPassID[:],
286 Name: server.Config.Name,
287 Description: server.Config.Description,
289 binary.BigEndian.PutUint16(tr.Port[:], uint16(server.Port))
290 for _, t := range server.Config.Trackers {
291 if err := register(t, tr); err != nil {
292 server.Logger.Errorw("unable to register with tracker %v", "error", err)
294 server.Logger.Debugw("Sent Tracker registration", "addr", t)
297 time.Sleep(trackerUpdateFrequency * time.Second)
302 // Start Client Keepalive go routine
303 go server.keepaliveHandler()
308 func (s *Server) userCount() int {
312 return len(s.Clients)
315 func (s *Server) keepaliveHandler() {
317 time.Sleep(idleCheckInterval * time.Second)
320 for _, c := range s.Clients {
321 c.IdleTime += idleCheckInterval
322 if c.IdleTime > userIdleSeconds && !c.Idle {
325 flagBitmap := big.NewInt(int64(binary.BigEndian.Uint16(c.Flags)))
326 flagBitmap.SetBit(flagBitmap, UserFlagAway, 1)
327 binary.BigEndian.PutUint16(c.Flags, uint16(flagBitmap.Int64()))
330 TranNotifyChangeUser,
331 NewField(FieldUserID, *c.ID),
332 NewField(FieldUserFlags, c.Flags),
333 NewField(FieldUserName, c.UserName),
334 NewField(FieldUserIconID, c.Icon),
342 func (s *Server) writeBanList() error {
344 defer s.banListMU.Unlock()
346 out, err := yaml.Marshal(s.banList)
351 filepath.Join(s.ConfigDir, "Banlist.yaml"),
358 func (s *Server) writeThreadedNews() error {
359 s.threadedNewsMux.Lock()
360 defer s.threadedNewsMux.Unlock()
362 out, err := yaml.Marshal(s.ThreadedNews)
366 err = s.FS.WriteFile(
367 filepath.Join(s.ConfigDir, "ThreadedNews.yaml"),
374 func (s *Server) NewClientConn(conn io.ReadWriteCloser, remoteAddr string) *ClientConn {
378 clientConn := &ClientConn{
387 transfers: map[int]map[[4]byte]*FileTransfer{},
388 RemoteAddr: remoteAddr,
390 clientConn.transfers = map[int]map[[4]byte]*FileTransfer{
401 binary.BigEndian.PutUint16(*clientConn.ID, ID)
402 s.Clients[ID] = clientConn
407 // NewUser creates a new user account entry in the server map and config file
408 func (s *Server) NewUser(login, name, password string, access accessBitmap) error {
415 Password: hashAndSalt([]byte(password)),
418 out, err := yaml.Marshal(&account)
422 s.Accounts[login] = &account
424 return s.FS.WriteFile(filepath.Join(s.ConfigDir, "Users", login+".yaml"), out, 0666)
427 func (s *Server) UpdateUser(login, newLogin, name, password string, access accessBitmap) error {
431 // update renames the user login
432 if login != newLogin {
433 err := os.Rename(filepath.Join(s.ConfigDir, "Users", login+".yaml"), filepath.Join(s.ConfigDir, "Users", newLogin+".yaml"))
437 s.Accounts[newLogin] = s.Accounts[login]
438 delete(s.Accounts, login)
441 account := s.Accounts[newLogin]
442 account.Access = access
444 account.Password = password
446 out, err := yaml.Marshal(&account)
451 if err := os.WriteFile(filepath.Join(s.ConfigDir, "Users", newLogin+".yaml"), out, 0666); err != nil {
458 // DeleteUser deletes the user account
459 func (s *Server) DeleteUser(login string) error {
463 delete(s.Accounts, login)
465 return s.FS.Remove(filepath.Join(s.ConfigDir, "Users", login+".yaml"))
468 func (s *Server) connectedUsers() []Field {
472 var connectedUsers []Field
473 for _, c := range sortedClients(s.Clients) {
478 Name: string(c.UserName),
480 connectedUsers = append(connectedUsers, NewField(FieldUsernameWithInfo, user.Payload()))
482 return connectedUsers
485 func (s *Server) loadBanList(path string) error {
486 fh, err := os.Open(path)
490 decoder := yaml.NewDecoder(fh)
492 return decoder.Decode(s.banList)
495 // loadThreadedNews loads the threaded news data from disk
496 func (s *Server) loadThreadedNews(threadedNewsPath string) error {
497 fh, err := os.Open(threadedNewsPath)
501 decoder := yaml.NewDecoder(fh)
503 return decoder.Decode(s.ThreadedNews)
506 // loadAccounts loads account data from disk
507 func (s *Server) loadAccounts(userDir string) error {
508 matches, err := filepath.Glob(filepath.Join(userDir, "*.yaml"))
513 if len(matches) == 0 {
514 return errors.New("no user accounts found in " + userDir)
517 for _, file := range matches {
518 fh, err := s.FS.Open(file)
524 decoder := yaml.NewDecoder(fh)
525 if err := decoder.Decode(&account); err != nil {
529 s.Accounts[account.Login] = &account
534 func (s *Server) loadConfig(path string) error {
535 fh, err := s.FS.Open(path)
540 decoder := yaml.NewDecoder(fh)
541 err = decoder.Decode(s.Config)
546 validate := validator.New()
547 err = validate.Struct(s.Config)
554 // handleNewConnection takes a new net.Conn and performs the initial login sequence
555 func (s *Server) handleNewConnection(ctx context.Context, rwc io.ReadWriteCloser, remoteAddr string) error {
556 defer dontPanic(s.Logger)
558 if err := Handshake(rwc); err != nil {
562 // Create a new scanner for parsing incoming bytes into transaction tokens
563 scanner := bufio.NewScanner(rwc)
564 scanner.Split(transactionScanner)
568 // Make a new []byte slice and copy the scanner bytes to it. This is critical to avoid a data race as the
569 // scanner re-uses the buffer for subsequent scans.
570 buf := make([]byte, len(scanner.Bytes()))
571 copy(buf, scanner.Bytes())
573 var clientLogin Transaction
574 if _, err := clientLogin.Write(buf); err != nil {
578 // check if remoteAddr is present in the ban list
579 if banUntil, ok := s.banList[strings.Split(remoteAddr, ":")[0]]; ok {
585 NewField(FieldData, []byte("You are permanently banned on this server")),
586 NewField(FieldChatOptions, []byte{0, 0}),
589 b, err := t.MarshalBinary()
594 _, err = rwc.Write(b)
599 time.Sleep(1 * time.Second)
604 if time.Now().Before(*banUntil) {
608 NewField(FieldData, []byte("You are temporarily banned on this server")),
609 NewField(FieldChatOptions, []byte{0, 0}),
611 b, err := t.MarshalBinary()
616 _, err = rwc.Write(b)
621 time.Sleep(1 * time.Second)
626 c := s.NewClientConn(rwc, remoteAddr)
629 encodedLogin := clientLogin.GetField(FieldUserLogin).Data
630 encodedPassword := clientLogin.GetField(FieldUserPassword).Data
631 c.Version = clientLogin.GetField(FieldVersion).Data
634 for _, char := range encodedLogin {
635 login += string(rune(255 - uint(char)))
641 c.logger = s.Logger.With("remoteAddr", remoteAddr, "login", login)
643 // If authentication fails, send error reply and close connection
644 if !c.Authenticate(login, encodedPassword) {
645 t := c.NewErrReply(&clientLogin, "Incorrect login.")
646 b, err := t.MarshalBinary()
650 if _, err := rwc.Write(b); err != nil {
654 c.logger.Infow("Login failed", "clientVersion", fmt.Sprintf("%x", c.Version))
659 if clientLogin.GetField(FieldUserIconID).Data != nil {
660 c.Icon = clientLogin.GetField(FieldUserIconID).Data
663 c.Account = c.Server.Accounts[login]
665 if clientLogin.GetField(FieldUserName).Data != nil {
666 if c.Authorize(accessAnyName) {
667 c.UserName = clientLogin.GetField(FieldUserName).Data
669 c.UserName = []byte(c.Account.Name)
673 if c.Authorize(accessDisconUser) {
674 c.Flags = []byte{0, 2}
677 s.outbox <- c.NewReply(&clientLogin,
678 NewField(FieldVersion, []byte{0x00, 0xbe}),
679 NewField(FieldCommunityBannerID, []byte{0, 0}),
680 NewField(FieldServerName, []byte(s.Config.Name)),
683 // Send user access privs so client UI knows how to behave
684 c.Server.outbox <- *NewTransaction(TranUserAccess, c.ID, NewField(FieldUserAccess, c.Account.Access[:]))
686 // Accounts with accessNoAgreement do not receive the server agreement on login. The behavior is different between
687 // client versions. For 1.2.3 client, we do not send TranShowAgreement. For other client versions, we send
688 // TranShowAgreement but with the NoServerAgreement field set to 1.
689 if c.Authorize(accessNoAgreement) {
690 // If client version is nil, then the client uses the 1.2.3 login behavior
691 if c.Version != nil {
692 c.Server.outbox <- *NewTransaction(TranShowAgreement, c.ID, NewField(FieldNoServerAgreement, []byte{1}))
695 c.Server.outbox <- *NewTransaction(TranShowAgreement, c.ID, NewField(FieldData, s.Agreement))
698 // If the client has provided a username as part of the login, we can infer that it is using the 1.2.3 login
699 // flow and not the 1.5+ flow.
700 if len(c.UserName) != 0 {
701 // Add the client username to the logger. For 1.5+ clients, we don't have this information yet as it comes as
702 // part of TranAgreed
703 c.logger = c.logger.With("name", string(c.UserName))
705 c.logger.Infow("Login successful", "clientVersion", "Not sent (probably 1.2.3)")
707 // Notify other clients on the server that the new user has logged in. For 1.5+ clients we don't have this
708 // information yet, so we do it in TranAgreed instead
709 for _, t := range c.notifyOthers(
711 TranNotifyChangeUser, nil,
712 NewField(FieldUserName, c.UserName),
713 NewField(FieldUserID, *c.ID),
714 NewField(FieldUserIconID, c.Icon),
715 NewField(FieldUserFlags, c.Flags),
722 c.Server.Stats.ConnectionCounter += 1
723 if len(s.Clients) > c.Server.Stats.ConnectionPeak {
724 c.Server.Stats.ConnectionPeak = len(s.Clients)
727 // Scan for new transactions and handle them as they come in.
729 // Make a new []byte slice and copy the scanner bytes to it. This is critical to avoid a data race as the
730 // scanner re-uses the buffer for subsequent scans.
731 buf := make([]byte, len(scanner.Bytes()))
732 copy(buf, scanner.Bytes())
735 if _, err := t.Write(buf); err != nil {
739 if err := c.handleTransaction(t); err != nil {
740 c.logger.Errorw("Error handling transaction", "err", err)
746 func (s *Server) NewPrivateChat(cc *ClientConn) []byte {
747 s.PrivateChatsMu.Lock()
748 defer s.PrivateChatsMu.Unlock()
750 randID := make([]byte, 4)
752 data := binary.BigEndian.Uint32(randID)
754 s.PrivateChats[data] = &PrivateChat{
755 ClientConn: make(map[uint16]*ClientConn),
757 s.PrivateChats[data].ClientConn[cc.uint16ID()] = cc
762 const dlFldrActionSendFile = 1
763 const dlFldrActionResumeFile = 2
764 const dlFldrActionNextFile = 3
766 // handleFileTransfer receives a client net.Conn from the file transfer server, performs the requested transfer type, then closes the connection
767 func (s *Server) handleFileTransfer(ctx context.Context, rwc io.ReadWriter) error {
768 defer dontPanic(s.Logger)
770 txBuf := make([]byte, 16)
771 if _, err := io.ReadFull(rwc, txBuf); err != nil {
776 if _, err := t.Write(txBuf); err != nil {
782 delete(s.fileTransfers, t.ReferenceNumber)
785 // Wait a few seconds before closing the connection: this is a workaround for problems
786 // observed with Windows clients where the client must initiate close of the TCP connection before
787 // the server does. This is gross and seems unnecessary. TODO: Revisit?
788 time.Sleep(3 * time.Second)
792 fileTransfer, ok := s.fileTransfers[t.ReferenceNumber]
795 return errors.New("invalid transaction ID")
799 fileTransfer.ClientConn.transfersMU.Lock()
800 delete(fileTransfer.ClientConn.transfers[fileTransfer.Type], t.ReferenceNumber)
801 fileTransfer.ClientConn.transfersMU.Unlock()
804 rLogger := s.Logger.With(
805 "remoteAddr", ctx.Value(contextKeyReq).(requestCtx).remoteAddr,
806 "login", fileTransfer.ClientConn.Account.Login,
807 "name", string(fileTransfer.ClientConn.UserName),
810 fullPath, err := readPath(s.Config.FileRoot, fileTransfer.FilePath, fileTransfer.FileName)
815 switch fileTransfer.Type {
817 if err := s.bannerDownload(rwc); err != nil {
821 s.Stats.DownloadCounter += 1
822 s.Stats.DownloadsInProgress += 1
824 s.Stats.DownloadsInProgress -= 1
828 if fileTransfer.fileResumeData != nil {
829 dataOffset = int64(binary.BigEndian.Uint32(fileTransfer.fileResumeData.ForkInfoList[0].DataSize[:]))
832 fw, err := newFileWrapper(s.FS, fullPath, 0)
837 rLogger.Infow("File download started", "filePath", fullPath)
839 // if file transfer options are included, that means this is a "quick preview" request from a 1.5+ client
840 if fileTransfer.options == nil {
841 // Start by sending flat file object to client
842 if _, err := rwc.Write(fw.ffo.BinaryMarshal()); err != nil {
847 file, err := fw.dataForkReader()
852 br := bufio.NewReader(file)
853 if _, err := br.Discard(int(dataOffset)); err != nil {
857 if _, err = io.Copy(rwc, io.TeeReader(br, fileTransfer.bytesSentCounter)); err != nil {
861 // if the client requested to resume transfer, do not send the resource fork header, or it will be appended into the fileWrapper data
862 if fileTransfer.fileResumeData == nil {
863 err = binary.Write(rwc, binary.BigEndian, fw.rsrcForkHeader())
869 rFile, err := fw.rsrcForkFile()
874 if _, err = io.Copy(rwc, io.TeeReader(rFile, fileTransfer.bytesSentCounter)); err != nil {
879 s.Stats.UploadCounter += 1
880 s.Stats.UploadsInProgress += 1
881 defer func() { s.Stats.UploadsInProgress -= 1 }()
885 // A file upload has three possible cases:
886 // 1) Upload a new file
887 // 2) Resume a partially transferred file
888 // 3) Replace a fully uploaded file
889 // We have to infer which case applies by inspecting what is already on the filesystem
891 // 1) Check for existing file:
892 _, err = os.Stat(fullPath)
894 return errors.New("existing file found at " + fullPath)
896 if errors.Is(err, fs.ErrNotExist) {
897 // If not found, open or create a new .incomplete file
898 file, err = os.OpenFile(fullPath+incompleteFileSuffix, os.O_CREATE|os.O_APPEND|os.O_WRONLY, 0644)
904 f, err := newFileWrapper(s.FS, fullPath, 0)
909 rLogger.Infow("File upload started", "dstFile", fullPath)
911 rForkWriter := io.Discard
912 iForkWriter := io.Discard
913 if s.Config.PreserveResourceForks {
914 rForkWriter, err = f.rsrcForkWriter()
919 iForkWriter, err = f.infoForkWriter()
925 if err := receiveFile(rwc, file, rForkWriter, iForkWriter, fileTransfer.bytesSentCounter); err != nil {
929 if err := file.Close(); err != nil {
933 if err := s.FS.Rename(fullPath+".incomplete", fullPath); err != nil {
937 rLogger.Infow("File upload complete", "dstFile", fullPath)
940 s.Stats.DownloadCounter += 1
941 s.Stats.DownloadsInProgress += 1
942 defer func() { s.Stats.DownloadsInProgress -= 1 }()
944 // Folder Download flow:
945 // 1. Get filePath from the transfer
946 // 2. Iterate over files
947 // 3. For each fileWrapper:
948 // Send fileWrapper header to client
949 // The client can reply in 3 ways:
951 // 1. If type is an odd number (unknown type?), or fileWrapper download for the current fileWrapper is completed:
952 // client sends []byte{0x00, 0x03} to tell the server to continue to the next fileWrapper
954 // 2. If download of a fileWrapper is to be resumed:
956 // []byte{0x00, 0x02} // download folder action
957 // [2]byte // Resume data size
958 // []byte fileWrapper resume data (see myField_FileResumeData)
960 // 3. Otherwise, download of the fileWrapper is requested and client sends []byte{0x00, 0x01}
962 // When download is requested (case 2 or 3), server replies with:
963 // [4]byte - fileWrapper size
964 // []byte - Flattened File Object
966 // After every fileWrapper download, client could request next fileWrapper with:
967 // []byte{0x00, 0x03}
969 // This notifies the server to send the next item header
971 basePathLen := len(fullPath)
973 rLogger.Infow("Start folder download", "path", fullPath)
975 nextAction := make([]byte, 2)
976 if _, err := io.ReadFull(rwc, nextAction); err != nil {
981 err = filepath.Walk(fullPath+"/", func(path string, info os.FileInfo, err error) error {
982 s.Stats.DownloadCounter += 1
990 if strings.HasPrefix(info.Name(), ".") {
994 hlFile, err := newFileWrapper(s.FS, path, 0)
999 subPath := path[basePathLen+1:]
1000 rLogger.Debugw("Sending fileheader", "i", i, "path", path, "fullFilePath", fullPath, "subPath", subPath, "IsDir", info.IsDir())
1006 fileHeader := NewFileHeader(subPath, info.IsDir())
1008 // Send the fileWrapper header to client
1009 if _, err := rwc.Write(fileHeader.Payload()); err != nil {
1010 s.Logger.Errorf("error sending file header: %v", err)
1014 // Read the client's Next Action request
1015 if _, err := io.ReadFull(rwc, nextAction); err != nil {
1019 rLogger.Debugw("Client folder download action", "action", fmt.Sprintf("%X", nextAction[0:2]))
1021 var dataOffset int64
1023 switch nextAction[1] {
1024 case dlFldrActionResumeFile:
1025 // get size of resumeData
1026 resumeDataByteLen := make([]byte, 2)
1027 if _, err := io.ReadFull(rwc, resumeDataByteLen); err != nil {
1031 resumeDataLen := binary.BigEndian.Uint16(resumeDataByteLen)
1032 resumeDataBytes := make([]byte, resumeDataLen)
1033 if _, err := io.ReadFull(rwc, resumeDataBytes); err != nil {
1037 var frd FileResumeData
1038 if err := frd.UnmarshalBinary(resumeDataBytes); err != nil {
1041 dataOffset = int64(binary.BigEndian.Uint32(frd.ForkInfoList[0].DataSize[:]))
1042 case dlFldrActionNextFile:
1043 // client asked to skip this file
1051 rLogger.Infow("File download started",
1052 "fileName", info.Name(),
1053 "TransferSize", fmt.Sprintf("%x", hlFile.ffo.TransferSize(dataOffset)),
1056 // Send file size to client
1057 if _, err := rwc.Write(hlFile.ffo.TransferSize(dataOffset)); err != nil {
1062 // Send ffo bytes to client
1063 if _, err := rwc.Write(hlFile.ffo.BinaryMarshal()); err != nil {
1068 file, err := s.FS.Open(path)
1073 // wr := bufio.NewWriterSize(rwc, 1460)
1074 if _, err = io.Copy(rwc, io.TeeReader(file, fileTransfer.bytesSentCounter)); err != nil {
1078 if nextAction[1] != 2 && hlFile.ffo.FlatFileHeader.ForkCount[1] == 3 {
1079 err = binary.Write(rwc, binary.BigEndian, hlFile.rsrcForkHeader())
1084 rFile, err := hlFile.rsrcForkFile()
1089 if _, err = io.Copy(rwc, io.TeeReader(rFile, fileTransfer.bytesSentCounter)); err != nil {
1094 // Read the client's Next Action request. This is always 3, I think?
1095 if _, err := io.ReadFull(rwc, nextAction); err != nil {
1107 s.Stats.UploadCounter += 1
1108 s.Stats.UploadsInProgress += 1
1109 defer func() { s.Stats.UploadsInProgress -= 1 }()
1111 "Folder upload started",
1112 "dstPath", fullPath,
1113 "TransferSize", binary.BigEndian.Uint32(fileTransfer.TransferSize),
1114 "FolderItemCount", fileTransfer.FolderItemCount,
1117 // Check if the target folder exists. If not, create it.
1118 if _, err := s.FS.Stat(fullPath); os.IsNotExist(err) {
1119 if err := s.FS.Mkdir(fullPath, 0777); err != nil {
1124 // Begin the folder upload flow by sending the "next file action" to client
1125 if _, err := rwc.Write([]byte{0, dlFldrActionNextFile}); err != nil {
1129 fileSize := make([]byte, 4)
1131 for i := 0; i < fileTransfer.ItemCount(); i++ {
1132 s.Stats.UploadCounter += 1
1135 if _, err := io.ReadFull(rwc, fu.DataSize[:]); err != nil {
1138 if _, err := io.ReadFull(rwc, fu.IsFolder[:]); err != nil {
1141 if _, err := io.ReadFull(rwc, fu.PathItemCount[:]); err != nil {
1145 fu.FileNamePath = make([]byte, binary.BigEndian.Uint16(fu.DataSize[:])-4) // -4 to subtract the path separator bytes
1147 if _, err := io.ReadFull(rwc, fu.FileNamePath); err != nil {
1152 "Folder upload continued",
1153 "FormattedPath", fu.FormattedPath(),
1154 "IsFolder", fmt.Sprintf("%x", fu.IsFolder),
1155 "PathItemCount", binary.BigEndian.Uint16(fu.PathItemCount[:]),
1158 if fu.IsFolder == [2]byte{0, 1} {
1159 if _, err := os.Stat(filepath.Join(fullPath, fu.FormattedPath())); os.IsNotExist(err) {
1160 if err := os.Mkdir(filepath.Join(fullPath, fu.FormattedPath()), 0777); err != nil {
1165 // Tell client to send next file
1166 if _, err := rwc.Write([]byte{0, dlFldrActionNextFile}); err != nil {
1170 nextAction := dlFldrActionSendFile
1172 // Check if we have the full file already. If so, send dlFldrAction_NextFile to client to skip.
1173 _, err = os.Stat(filepath.Join(fullPath, fu.FormattedPath()))
1174 if err != nil && !errors.Is(err, fs.ErrNotExist) {
1178 nextAction = dlFldrActionNextFile
1181 // Check if we have a partial file already. If so, send dlFldrAction_ResumeFile to client to resume upload.
1182 incompleteFile, err := os.Stat(filepath.Join(fullPath, fu.FormattedPath()+incompleteFileSuffix))
1183 if err != nil && !errors.Is(err, fs.ErrNotExist) {
1187 nextAction = dlFldrActionResumeFile
1190 if _, err := rwc.Write([]byte{0, uint8(nextAction)}); err != nil {
1195 case dlFldrActionNextFile:
1197 case dlFldrActionResumeFile:
1198 offset := make([]byte, 4)
1199 binary.BigEndian.PutUint32(offset, uint32(incompleteFile.Size()))
1201 file, err := os.OpenFile(fullPath+"/"+fu.FormattedPath()+incompleteFileSuffix, os.O_APPEND|os.O_CREATE|os.O_WRONLY, 0644)
1206 fileResumeData := NewFileResumeData([]ForkInfoList{*NewForkInfoList(offset)})
1208 b, _ := fileResumeData.BinaryMarshal()
1210 bs := make([]byte, 2)
1211 binary.BigEndian.PutUint16(bs, uint16(len(b)))
1213 if _, err := rwc.Write(append(bs, b...)); err != nil {
1217 if _, err := io.ReadFull(rwc, fileSize); err != nil {
1221 if err := receiveFile(rwc, file, io.Discard, io.Discard, fileTransfer.bytesSentCounter); err != nil {
1225 err = os.Rename(fullPath+"/"+fu.FormattedPath()+".incomplete", fullPath+"/"+fu.FormattedPath())
1230 case dlFldrActionSendFile:
1231 if _, err := io.ReadFull(rwc, fileSize); err != nil {
1235 filePath := filepath.Join(fullPath, fu.FormattedPath())
1237 hlFile, err := newFileWrapper(s.FS, filePath, 0)
1242 rLogger.Infow("Starting file transfer", "path", filePath, "fileNum", i+1, "fileSize", binary.BigEndian.Uint32(fileSize))
1244 incWriter, err := hlFile.incFileWriter()
1249 rForkWriter := io.Discard
1250 iForkWriter := io.Discard
1251 if s.Config.PreserveResourceForks {
1252 iForkWriter, err = hlFile.infoForkWriter()
1257 rForkWriter, err = hlFile.rsrcForkWriter()
1262 if err := receiveFile(rwc, incWriter, rForkWriter, iForkWriter, fileTransfer.bytesSentCounter); err != nil {
1266 if err := os.Rename(filePath+".incomplete", filePath); err != nil {
1271 // Tell client to send next fileWrapper
1272 if _, err := rwc.Write([]byte{0, dlFldrActionNextFile}); err != nil {
1277 rLogger.Infof("Folder upload complete")