11 "golang.org/x/text/encoding/charmap"
24 type contextKey string
26 var contextKeyReq = contextKey("req")
28 type requestCtx struct {
32 // Converts bytes from Mac Roman encoding to UTF-8
33 var txtDecoder = charmap.Macintosh.NewDecoder()
35 // Converts bytes from UTF-8 to Mac Roman encoding
36 var txtEncoder = charmap.Macintosh.NewEncoder()
50 FS FileStore // Storage backend to use for File storage
52 outbox chan Transaction
59 FileTransferMgr FileTransferMgr
61 ClientMgr ClientManager
62 AccountManager AccountManager
63 ThreadedNewsMgr ThreadedNewsMgr
66 MessageBoard io.ReadWriteSeeker
69 // NewServer constructs a new Server from a config dir
70 func NewServer(config Config, configDir, netInterface string, netPort int, logger *slog.Logger, fs FileStore) (*Server, error) {
72 NetInterface: netInterface,
77 outbox: make(chan Transaction),
80 ChatMgr: NewMemChatManager(),
81 ClientMgr: NewMemClientMgr(),
82 FileTransferMgr: NewMemFileTransferMgr(),
85 // generate a new random passID for tracker registration
86 _, err := rand.Read(server.TrackerPassID[:])
91 server.Agreement, err = os.ReadFile(filepath.Join(configDir, agreementFile))
96 server.AccountManager, err = NewYAMLAccountManager(filepath.Join(configDir, "Users/"))
98 return nil, fmt.Errorf("error loading accounts: %w", err)
101 // If the FileRoot is an absolute path, use it, otherwise treat as a relative path to the config dir.
102 if !filepath.IsAbs(server.Config.FileRoot) {
103 server.Config.FileRoot = filepath.Join(configDir, server.Config.FileRoot)
106 server.banner, err = os.ReadFile(filepath.Join(server.ConfigDir, server.Config.BannerFile))
108 return nil, fmt.Errorf("error opening banner: %w", err)
111 if server.Config.EnableTrackerRegistration {
113 "Tracker registration enabled",
114 "frequency", fmt.Sprintf("%vs", trackerUpdateFrequency),
115 "trackers", server.Config.Trackers,
118 go server.registerWithTrackers()
121 // Start Client Keepalive go routine
122 go server.keepaliveHandler()
127 func (s *Server) CurrentStats() map[string]interface{} {
128 return s.Stats.Values()
131 func (s *Server) ListenAndServe(ctx context.Context) error {
132 var wg sync.WaitGroup
136 ln, err := net.Listen("tcp", fmt.Sprintf("%s:%v", s.NetInterface, s.Port))
141 log.Fatal(s.Serve(ctx, ln))
146 ln, err := net.Listen("tcp", fmt.Sprintf("%s:%v", s.NetInterface, s.Port+1))
151 log.Fatal(s.ServeFileTransfers(ctx, ln))
159 func (s *Server) ServeFileTransfers(ctx context.Context, ln net.Listener) error {
161 conn, err := ln.Accept()
167 defer func() { _ = conn.Close() }()
169 err = s.handleFileTransfer(
170 context.WithValue(ctx, contextKeyReq, requestCtx{remoteAddr: conn.RemoteAddr().String()}),
175 s.Logger.Error("file transfer error", "reason", err)
181 func (s *Server) sendTransaction(t Transaction) error {
182 client := s.ClientMgr.Get(t.clientID)
188 _, err := io.Copy(client.Connection, &t)
190 return fmt.Errorf("failed to send transaction to client %v: %v", t.clientID, err)
196 func (s *Server) processOutbox() {
200 if err := s.sendTransaction(t); err != nil {
201 s.Logger.Error("error sending transaction", "err", err)
207 func (s *Server) Serve(ctx context.Context, ln net.Listener) error {
211 conn, err := ln.Accept()
213 s.Logger.Error("error accepting connection", "err", err)
215 connCtx := context.WithValue(ctx, contextKeyReq, requestCtx{
216 remoteAddr: conn.RemoteAddr().String(),
220 s.Logger.Info("Connection established", "RemoteAddr", conn.RemoteAddr())
223 if err := s.handleNewConnection(connCtx, conn, conn.RemoteAddr().String()); err != nil {
225 s.Logger.Info("Client disconnected", "RemoteAddr", conn.RemoteAddr())
227 s.Logger.Error("error serving request", "RemoteAddr", conn.RemoteAddr(), "err", err)
235 agreementFile = "Agreement.txt"
238 func (s *Server) registerWithTrackers() {
240 tr := &TrackerRegistration{
241 UserCount: len(s.ClientMgr.List()),
242 PassID: s.TrackerPassID,
244 Description: s.Config.Description,
246 binary.BigEndian.PutUint16(tr.Port[:], uint16(s.Port))
247 for _, t := range s.Config.Trackers {
248 if err := register(&RealDialer{}, t, tr); err != nil {
249 s.Logger.Error(fmt.Sprintf("unable to register with tracker %v", t), "error", err)
253 time.Sleep(trackerUpdateFrequency * time.Second)
258 func (s *Server) keepaliveHandler() {
260 time.Sleep(idleCheckInterval * time.Second)
262 for _, c := range s.ClientMgr.List() {
265 c.IdleTime += idleCheckInterval
268 if c.IdleTime > userIdleSeconds && !c.Flags.IsSet(UserFlagAway) {
269 c.Flags.Set(UserFlagAway, 1)
272 TranNotifyChangeUser,
273 NewField(FieldUserID, c.ID[:]),
274 NewField(FieldUserFlags, c.Flags[:]),
275 NewField(FieldUserName, c.UserName),
276 NewField(FieldUserIconID, c.Icon),
284 func (s *Server) NewClientConn(conn io.ReadWriteCloser, remoteAddr string) *ClientConn {
285 clientConn := &ClientConn{
286 Icon: []byte{0, 0}, // TODO: make array type
289 RemoteAddr: remoteAddr,
291 ClientFileTransferMgr: NewClientFileTransferMgr(),
294 s.ClientMgr.Add(clientConn)
299 // loadFromYAMLFile loads data from a YAML file into the provided data structure.
300 func loadFromYAMLFile(path string, data interface{}) error {
301 fh, err := os.Open(path)
307 decoder := yaml.NewDecoder(fh)
308 return decoder.Decode(data)
311 func sendBanMessage(rwc io.Writer, message string) {
315 NewField(FieldData, []byte(message)),
316 NewField(FieldChatOptions, []byte{0, 0}),
318 _, _ = io.Copy(rwc, &t)
319 time.Sleep(1 * time.Second)
322 // handleNewConnection takes a new net.Conn and performs the initial login sequence
323 func (s *Server) handleNewConnection(ctx context.Context, rwc io.ReadWriteCloser, remoteAddr string) error {
324 defer dontPanic(s.Logger)
326 // Check if remoteAddr is present in the ban list
327 ipAddr := strings.Split(remoteAddr, ":")[0]
328 if isBanned, banUntil := s.BanList.IsBanned(ipAddr); isBanned {
331 sendBanMessage(rwc, "You are permanently banned on this server")
332 s.Logger.Debug("Disconnecting permanently banned IP", "remoteAddr", ipAddr)
337 if time.Now().Before(*banUntil) {
338 sendBanMessage(rwc, "You are temporarily banned on this server")
339 s.Logger.Debug("Disconnecting temporarily banned IP", "remoteAddr", ipAddr)
344 if err := performHandshake(rwc); err != nil {
345 return fmt.Errorf("error performing handshake: %w", err)
348 // Create a new scanner for parsing incoming bytes into transaction tokens
349 scanner := bufio.NewScanner(rwc)
350 scanner.Split(transactionScanner)
354 // Make a new []byte slice and copy the scanner bytes to it. This is critical to avoid a data race as the
355 // scanner re-uses the buffer for subsequent scans.
356 buf := make([]byte, len(scanner.Bytes()))
357 copy(buf, scanner.Bytes())
359 var clientLogin Transaction
360 if _, err := clientLogin.Write(buf); err != nil {
361 return fmt.Errorf("error writing login transaction: %w", err)
364 c := s.NewClientConn(rwc, remoteAddr)
367 encodedPassword := clientLogin.GetField(FieldUserPassword).Data
368 c.Version = clientLogin.GetField(FieldVersion).Data
370 login := clientLogin.GetField(FieldUserLogin).DecodeObfuscatedString()
375 c.logger = s.Logger.With("ip", ipAddr, "login", login)
377 // If authentication fails, send error reply and close connection
378 if !c.Authenticate(login, encodedPassword) {
379 t := c.NewErrReply(&clientLogin, "Incorrect login.")[0]
381 _, err := io.Copy(rwc, &t)
386 c.logger.Info("Login failed", "clientVersion", fmt.Sprintf("%x", c.Version))
391 if clientLogin.GetField(FieldUserIconID).Data != nil {
392 c.Icon = clientLogin.GetField(FieldUserIconID).Data
395 c.Account = c.Server.AccountManager.Get(login)
396 if c.Account == nil {
400 if clientLogin.GetField(FieldUserName).Data != nil {
401 if c.Authorize(AccessAnyName) {
402 c.UserName = clientLogin.GetField(FieldUserName).Data
404 c.UserName = []byte(c.Account.Name)
408 if c.Authorize(AccessDisconUser) {
409 c.Flags.Set(UserFlagAdmin, 1)
412 s.outbox <- c.NewReply(&clientLogin,
413 NewField(FieldVersion, []byte{0x00, 0xbe}),
414 NewField(FieldCommunityBannerID, []byte{0, 0}),
415 NewField(FieldServerName, []byte(s.Config.Name)),
418 // Send user access privs so client UI knows how to behave
419 c.Server.outbox <- NewTransaction(TranUserAccess, c.ID, NewField(FieldUserAccess, c.Account.Access[:]))
421 // Accounts with AccessNoAgreement do not receive the server agreement on login. The behavior is different between
422 // client versions. For 1.2.3 client, we do not send TranShowAgreement. For other client versions, we send
423 // TranShowAgreement but with the NoServerAgreement field set to 1.
424 if c.Authorize(AccessNoAgreement) {
425 // If client version is nil, then the client uses the 1.2.3 login behavior
426 if c.Version != nil {
427 c.Server.outbox <- NewTransaction(TranShowAgreement, c.ID, NewField(FieldNoServerAgreement, []byte{1}))
430 c.Server.outbox <- NewTransaction(TranShowAgreement, c.ID, NewField(FieldData, s.Agreement))
433 // If the client has provided a username as part of the login, we can infer that it is using the 1.2.3 login
434 // flow and not the 1.5+ flow.
435 if len(c.UserName) != 0 {
436 // Add the client username to the logger. For 1.5+ clients, we don't have this information yet as it comes as
437 // part of TranAgreed
438 c.logger = c.logger.With("Name", string(c.UserName))
439 c.logger.Info("Login successful", "clientVersion", "Not sent (probably 1.2.3)")
441 // Notify other clients on the server that the new user has logged in. For 1.5+ clients we don't have this
442 // information yet, so we do it in TranAgreed instead
443 for _, t := range c.NotifyOthers(
445 TranNotifyChangeUser, [2]byte{0, 0},
446 NewField(FieldUserName, c.UserName),
447 NewField(FieldUserID, c.ID[:]),
448 NewField(FieldUserIconID, c.Icon),
449 NewField(FieldUserFlags, c.Flags[:]),
456 c.Server.Stats.Increment(StatConnectionCounter, StatCurrentlyConnected)
457 defer c.Server.Stats.Decrement(StatCurrentlyConnected)
459 if len(s.ClientMgr.List()) > c.Server.Stats.Get(StatConnectionPeak) {
460 c.Server.Stats.Set(StatConnectionPeak, len(s.ClientMgr.List()))
463 // Scan for new transactions and handle them as they come in.
465 // Copy the scanner bytes to a new slice to it to avoid a data race when the scanner re-uses the buffer.
466 buf := make([]byte, len(scanner.Bytes()))
467 copy(buf, scanner.Bytes())
470 if _, err := t.Write(buf); err != nil {
474 c.handleTransaction(t)
479 // handleFileTransfer receives a client net.Conn from the file transfer server, performs the requested transfer type, then closes the connection
480 func (s *Server) handleFileTransfer(ctx context.Context, rwc io.ReadWriter) error {
481 defer dontPanic(s.Logger)
483 // The first 16 bytes contain the file transfer.
485 if _, err := io.CopyN(&t, rwc, 16); err != nil {
486 return fmt.Errorf("error reading file transfer: %w", err)
489 fileTransfer := s.FileTransferMgr.Get(t.ReferenceNumber)
490 if fileTransfer == nil {
491 return errors.New("invalid transaction ID")
495 s.FileTransferMgr.Delete(t.ReferenceNumber)
497 // Wait a few seconds before closing the connection: this is a workaround for problems
498 // observed with Windows clients where the client must initiate close of the TCP connection before
499 // the server does. This is gross and seems unnecessary. TODO: Revisit?
500 time.Sleep(3 * time.Second)
503 rLogger := s.Logger.With(
504 "remoteAddr", ctx.Value(contextKeyReq).(requestCtx).remoteAddr,
505 "login", fileTransfer.ClientConn.Account.Login,
506 "Name", string(fileTransfer.ClientConn.UserName),
509 fullPath, err := readPath(s.Config.FileRoot, fileTransfer.FilePath, fileTransfer.FileName)
514 switch fileTransfer.Type {
516 if _, err := io.Copy(rwc, bytes.NewBuffer(s.banner)); err != nil {
517 return fmt.Errorf("error sending banner: %w", err)
520 s.Stats.Increment(StatDownloadCounter, StatDownloadsInProgress)
522 s.Stats.Decrement(StatDownloadsInProgress)
525 err = DownloadHandler(rwc, fullPath, fileTransfer, s.FS, rLogger, true)
527 return fmt.Errorf("file download: %w", err)
531 s.Stats.Increment(StatUploadCounter, StatUploadsInProgress)
533 s.Stats.Decrement(StatUploadsInProgress)
536 err = UploadHandler(rwc, fullPath, fileTransfer, s.FS, rLogger, s.Config.PreserveResourceForks)
538 return fmt.Errorf("file upload error: %w", err)
542 s.Stats.Increment(StatDownloadCounter, StatDownloadsInProgress)
544 s.Stats.Decrement(StatDownloadsInProgress)
547 err = DownloadFolderHandler(rwc, fullPath, fileTransfer, s.FS, rLogger, s.Config.PreserveResourceForks)
549 return fmt.Errorf("file upload error: %w", err)
553 s.Stats.Increment(StatUploadCounter, StatUploadsInProgress)
555 s.Stats.Decrement(StatUploadsInProgress)
559 "Folder upload started",
561 "TransferSize", binary.BigEndian.Uint32(fileTransfer.TransferSize),
562 "FolderItemCount", fileTransfer.FolderItemCount,
565 err = UploadFolderHandler(rwc, fullPath, fileTransfer, s.FS, rLogger, s.Config.PreserveResourceForks)
567 return fmt.Errorf("file upload error: %w", err)