2021-01-29 03:41:50 +00:00
|
|
|
package fshttp
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"net"
|
2021-05-22 19:40:07 +00:00
|
|
|
"runtime"
|
2021-05-02 18:26:42 +00:00
|
|
|
"strings"
|
2021-05-22 19:40:07 +00:00
|
|
|
"sync"
|
2021-01-29 03:41:50 +00:00
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/rclone/rclone/fs"
|
2021-02-12 21:10:58 +00:00
|
|
|
"github.com/rclone/rclone/fs/accounting"
|
2021-01-29 03:41:50 +00:00
|
|
|
"golang.org/x/net/ipv4"
|
|
|
|
"golang.org/x/net/ipv6"
|
|
|
|
)
|
|
|
|
|
|
|
|
func dialContext(ctx context.Context, network, address string, ci *fs.ConfigInfo) (net.Conn, error) {
|
|
|
|
return NewDialer(ctx).DialContext(ctx, network, address)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Dialer structure contains default dialer and timeout, tclass support
|
|
|
|
type Dialer struct {
|
|
|
|
net.Dialer
|
|
|
|
timeout time.Duration
|
|
|
|
tclass int
|
|
|
|
}
|
|
|
|
|
|
|
|
// NewDialer creates a Dialer structure with Timeout, Keepalive,
|
|
|
|
// LocalAddr and DSCP set from rclone flags.
|
|
|
|
func NewDialer(ctx context.Context) *Dialer {
|
|
|
|
ci := fs.GetConfig(ctx)
|
|
|
|
dialer := &Dialer{
|
|
|
|
Dialer: net.Dialer{
|
|
|
|
Timeout: ci.ConnectTimeout,
|
|
|
|
KeepAlive: 30 * time.Second,
|
|
|
|
},
|
|
|
|
timeout: ci.Timeout,
|
|
|
|
tclass: int(ci.TrafficClass),
|
|
|
|
}
|
|
|
|
if ci.BindAddr != nil {
|
|
|
|
dialer.Dialer.LocalAddr = &net.TCPAddr{IP: ci.BindAddr}
|
|
|
|
}
|
|
|
|
return dialer
|
|
|
|
}
|
|
|
|
|
2021-08-24 14:40:24 +00:00
|
|
|
// Dial connects to the network address.
|
2021-01-29 03:41:50 +00:00
|
|
|
func (d *Dialer) Dial(network, address string) (net.Conn, error) {
|
|
|
|
return d.DialContext(context.Background(), network, address)
|
|
|
|
}
|
|
|
|
|
2021-05-22 19:40:07 +00:00
|
|
|
var warnDSCPFail, warnDSCPWindows sync.Once
|
|
|
|
|
2021-08-24 14:40:24 +00:00
|
|
|
// DialContext connects to the network address using the provided context.
|
2021-01-29 03:41:50 +00:00
|
|
|
func (d *Dialer) DialContext(ctx context.Context, network, address string) (net.Conn, error) {
|
2023-08-30 22:41:36 +00:00
|
|
|
// If local address is 0.0.0.0 or ::0 force IPv4 or IPv6
|
|
|
|
// This works around https://github.com/golang/go/issues/48723
|
|
|
|
// Which means 0.0.0.0 and ::0 both bind to both IPv4 and IPv6
|
|
|
|
if ip, ok := d.Dialer.LocalAddr.(*net.TCPAddr); ok && ip.IP.IsUnspecified() && (network == "tcp" || network == "udp") {
|
|
|
|
if ip.IP.To4() != nil {
|
|
|
|
network += "4" // IPv4 address
|
|
|
|
} else {
|
|
|
|
network += "6" // IPv6 address
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-01-29 03:41:50 +00:00
|
|
|
c, err := d.Dialer.DialContext(ctx, network, address)
|
|
|
|
if err != nil {
|
|
|
|
return c, err
|
|
|
|
}
|
2021-08-24 14:40:24 +00:00
|
|
|
|
2021-01-29 03:41:50 +00:00
|
|
|
if d.tclass != 0 {
|
2021-05-02 18:26:42 +00:00
|
|
|
// IPv6 addresses must have two or more ":"
|
|
|
|
if strings.Count(c.RemoteAddr().String(), ":") > 1 {
|
|
|
|
err = ipv6.NewConn(c).SetTrafficClass(d.tclass)
|
|
|
|
} else {
|
|
|
|
err = ipv4.NewConn(c).SetTOS(d.tclass)
|
2021-05-22 19:40:07 +00:00
|
|
|
// Warn of silent failure on Windows (IPv4 only, IPv6 caught by error handler)
|
|
|
|
if runtime.GOOS == "windows" {
|
|
|
|
warnDSCPWindows.Do(func() {
|
|
|
|
fs.LogLevelPrintf(fs.LogLevelWarning, nil, "dialer: setting DSCP on Windows/IPv4 fails silently; see https://github.com/golang/go/issues/42728")
|
|
|
|
})
|
|
|
|
}
|
2021-05-02 18:26:42 +00:00
|
|
|
}
|
|
|
|
if err != nil {
|
2021-05-22 19:40:07 +00:00
|
|
|
warnDSCPFail.Do(func() {
|
|
|
|
fs.LogLevelPrintf(fs.LogLevelWarning, nil, "dialer: failed to set DSCP socket options: %v", err)
|
|
|
|
})
|
2021-01-29 03:41:50 +00:00
|
|
|
}
|
|
|
|
}
|
2021-08-24 14:40:24 +00:00
|
|
|
|
|
|
|
t := &timeoutConn{
|
|
|
|
Conn: c,
|
|
|
|
timeout: d.timeout,
|
|
|
|
}
|
|
|
|
return t, t.nudgeDeadline()
|
2021-01-29 03:41:50 +00:00
|
|
|
}
|
|
|
|
|
2021-08-24 14:40:24 +00:00
|
|
|
// A net.Conn that sets deadline for every Read/Write operation
|
2021-01-29 03:41:50 +00:00
|
|
|
type timeoutConn struct {
|
|
|
|
net.Conn
|
|
|
|
timeout time.Duration
|
|
|
|
}
|
|
|
|
|
|
|
|
// Nudge the deadline for an idle timeout on by c.timeout if non-zero
|
2021-08-24 14:40:24 +00:00
|
|
|
func (c *timeoutConn) nudgeDeadline() error {
|
|
|
|
if c.timeout > 0 {
|
|
|
|
return c.SetDeadline(time.Now().Add(c.timeout))
|
2021-01-29 03:41:50 +00:00
|
|
|
}
|
2021-08-24 14:40:24 +00:00
|
|
|
return nil
|
2021-01-29 03:41:50 +00:00
|
|
|
}
|
|
|
|
|
2021-08-24 14:40:24 +00:00
|
|
|
// Read bytes with rate limiting and idle timeouts
|
2021-02-12 21:10:58 +00:00
|
|
|
func (c *timeoutConn) Read(b []byte) (n int, err error) {
|
|
|
|
// Ideally we would LimitBandwidth(len(b)) here and replace tokens we didn't use
|
|
|
|
n, err = c.Conn.Read(b)
|
|
|
|
accounting.TokenBucket.LimitBandwidth(accounting.TokenBucketSlotTransportRx, n)
|
2021-08-24 14:40:24 +00:00
|
|
|
if err == nil && n > 0 && c.timeout > 0 {
|
|
|
|
err = c.nudgeDeadline()
|
2021-01-29 03:41:50 +00:00
|
|
|
}
|
2021-02-12 21:10:58 +00:00
|
|
|
return n, err
|
2021-01-29 03:41:50 +00:00
|
|
|
}
|
|
|
|
|
2021-08-24 14:40:24 +00:00
|
|
|
// Write bytes with rate limiting and idle timeouts
|
2021-01-29 03:41:50 +00:00
|
|
|
func (c *timeoutConn) Write(b []byte) (n int, err error) {
|
2021-02-12 21:10:58 +00:00
|
|
|
accounting.TokenBucket.LimitBandwidth(accounting.TokenBucketSlotTransportTx, len(b))
|
|
|
|
n, err = c.Conn.Write(b)
|
2021-08-24 14:40:24 +00:00
|
|
|
if err == nil && n > 0 && c.timeout > 0 {
|
|
|
|
err = c.nudgeDeadline()
|
2021-02-12 21:10:58 +00:00
|
|
|
}
|
|
|
|
return n, err
|
2021-01-29 03:41:50 +00:00
|
|
|
}
|