mirror of
https://github.com/transmission/transmission
synced 2024-12-29 11:06:23 +00:00
227 lines
6.1 KiB
C++
227 lines
6.1 KiB
C++
// This file Copyright © 2007-2022 Mnemosyne LLC.
|
|
// It may be used under GPLv2 (SPDX: GPL-2.0), GPLv3 (SPDX: GPL-3.0),
|
|
// or any future license endorsed by Mnemosyne LLC.
|
|
// License text can be found in the licenses/ folder.
|
|
|
|
#include <cerrno>
|
|
#include <ctime>
|
|
#include <cinttypes>
|
|
|
|
#include <event2/util.h> /* evutil_inet_ntop() */
|
|
|
|
#define ENABLE_STRNATPMPERR
|
|
#include "natpmp.h"
|
|
|
|
#include "transmission.h"
|
|
#include "natpmp_local.h"
|
|
#include "log.h"
|
|
#include "net.h" /* tr_netCloseSocket */
|
|
#include "port-forwarding.h"
|
|
#include "utils.h"
|
|
|
|
static auto constexpr LifetimeSecs = uint32_t{ 3600 };
|
|
static auto constexpr CommandWaitSecs = time_t{ 8 };
|
|
|
|
static char const* getKey()
|
|
{
|
|
return _("Port Forwarding (NAT-PMP)");
|
|
}
|
|
|
|
/**
|
|
***
|
|
**/
|
|
|
|
static void logVal(char const* func, int ret)
|
|
{
|
|
if (ret == NATPMP_TRYAGAIN)
|
|
{
|
|
return;
|
|
}
|
|
|
|
if (ret >= 0)
|
|
{
|
|
tr_logAddNamedInfo(getKey(), _("%s succeeded (%d)"), func, ret);
|
|
}
|
|
else
|
|
{
|
|
tr_logAddNamedDbg(
|
|
getKey(),
|
|
"%s failed. Natpmp returned %d (%s); errno is %d (%s)",
|
|
func,
|
|
ret,
|
|
strnatpmperr(ret),
|
|
errno,
|
|
tr_strerror(errno));
|
|
}
|
|
}
|
|
|
|
struct tr_natpmp* tr_natpmpInit()
|
|
{
|
|
auto* const nat = tr_new0(struct tr_natpmp, 1);
|
|
nat->state = TR_NATPMP_DISCOVER;
|
|
nat->public_port = 0;
|
|
nat->private_port = 0;
|
|
nat->natpmp.s = TR_BAD_SOCKET; /* socket */
|
|
return nat;
|
|
}
|
|
|
|
void tr_natpmpClose(tr_natpmp* nat)
|
|
{
|
|
if (nat != nullptr)
|
|
{
|
|
closenatpmp(&nat->natpmp);
|
|
tr_free(nat);
|
|
}
|
|
}
|
|
|
|
static bool canSendCommand(struct tr_natpmp const* nat)
|
|
{
|
|
return tr_time() >= nat->command_time;
|
|
}
|
|
|
|
static void setCommandTime(struct tr_natpmp* nat)
|
|
{
|
|
nat->command_time = tr_time() + CommandWaitSecs;
|
|
}
|
|
|
|
tr_port_forwarding tr_natpmpPulse(
|
|
struct tr_natpmp* nat,
|
|
tr_port private_port,
|
|
bool is_enabled,
|
|
tr_port* public_port,
|
|
tr_port* real_private_port)
|
|
{
|
|
if (is_enabled && nat->state == TR_NATPMP_DISCOVER)
|
|
{
|
|
int val = initnatpmp(&nat->natpmp, 0, 0);
|
|
logVal("initnatpmp", val);
|
|
val = sendpublicaddressrequest(&nat->natpmp);
|
|
logVal("sendpublicaddressrequest", val);
|
|
nat->state = val < 0 ? TR_NATPMP_ERR : TR_NATPMP_RECV_PUB;
|
|
nat->has_discovered = true;
|
|
setCommandTime(nat);
|
|
}
|
|
|
|
if (nat->state == TR_NATPMP_RECV_PUB && canSendCommand(nat))
|
|
{
|
|
natpmpresp_t response;
|
|
int const val = readnatpmpresponseorretry(&nat->natpmp, &response);
|
|
logVal("readnatpmpresponseorretry", val);
|
|
|
|
if (val >= 0)
|
|
{
|
|
char str[128];
|
|
evutil_inet_ntop(AF_INET, &response.pnu.publicaddress.addr, str, sizeof(str));
|
|
tr_logAddNamedInfo(getKey(), _("Found public address \"%s\""), str);
|
|
nat->state = TR_NATPMP_IDLE;
|
|
}
|
|
else if (val != NATPMP_TRYAGAIN)
|
|
{
|
|
nat->state = TR_NATPMP_ERR;
|
|
}
|
|
}
|
|
|
|
if ((nat->state == TR_NATPMP_IDLE || nat->state == TR_NATPMP_ERR) && (nat->is_mapped) &&
|
|
(!is_enabled || nat->private_port != private_port))
|
|
{
|
|
nat->state = TR_NATPMP_SEND_UNMAP;
|
|
}
|
|
|
|
if (nat->state == TR_NATPMP_SEND_UNMAP && canSendCommand(nat))
|
|
{
|
|
int const val = sendnewportmappingrequest(&nat->natpmp, NATPMP_PROTOCOL_TCP, nat->private_port, nat->public_port, 0);
|
|
logVal("sendnewportmappingrequest", val);
|
|
nat->state = val < 0 ? TR_NATPMP_ERR : TR_NATPMP_RECV_UNMAP;
|
|
setCommandTime(nat);
|
|
}
|
|
|
|
if (nat->state == TR_NATPMP_RECV_UNMAP)
|
|
{
|
|
natpmpresp_t resp;
|
|
int const val = readnatpmpresponseorretry(&nat->natpmp, &resp);
|
|
logVal("readnatpmpresponseorretry", val);
|
|
|
|
if (val >= 0)
|
|
{
|
|
int const unmapped_port = resp.pnu.newportmapping.privateport;
|
|
|
|
tr_logAddNamedInfo(getKey(), _("no longer forwarding port %d"), unmapped_port);
|
|
|
|
if (nat->private_port == unmapped_port)
|
|
{
|
|
nat->private_port = 0;
|
|
nat->public_port = 0;
|
|
nat->state = TR_NATPMP_IDLE;
|
|
nat->is_mapped = false;
|
|
}
|
|
}
|
|
else if (val != NATPMP_TRYAGAIN)
|
|
{
|
|
nat->state = TR_NATPMP_ERR;
|
|
}
|
|
}
|
|
|
|
if (nat->state == TR_NATPMP_IDLE)
|
|
{
|
|
if (is_enabled && !nat->is_mapped && nat->has_discovered)
|
|
{
|
|
nat->state = TR_NATPMP_SEND_MAP;
|
|
}
|
|
else if (nat->is_mapped && tr_time() >= nat->renew_time)
|
|
{
|
|
nat->state = TR_NATPMP_SEND_MAP;
|
|
}
|
|
}
|
|
|
|
if (nat->state == TR_NATPMP_SEND_MAP && canSendCommand(nat))
|
|
{
|
|
int const val = sendnewportmappingrequest(&nat->natpmp, NATPMP_PROTOCOL_TCP, private_port, private_port, LifetimeSecs);
|
|
logVal("sendnewportmappingrequest", val);
|
|
nat->state = val < 0 ? TR_NATPMP_ERR : TR_NATPMP_RECV_MAP;
|
|
setCommandTime(nat);
|
|
}
|
|
|
|
if (nat->state == TR_NATPMP_RECV_MAP)
|
|
{
|
|
natpmpresp_t resp;
|
|
int const val = readnatpmpresponseorretry(&nat->natpmp, &resp);
|
|
logVal("readnatpmpresponseorretry", val);
|
|
|
|
if (val >= 0)
|
|
{
|
|
nat->state = TR_NATPMP_IDLE;
|
|
nat->is_mapped = true;
|
|
nat->renew_time = tr_time() + (resp.pnu.newportmapping.lifetime / 2);
|
|
nat->private_port = resp.pnu.newportmapping.privateport;
|
|
nat->public_port = resp.pnu.newportmapping.mappedpublicport;
|
|
tr_logAddNamedInfo(getKey(), _("Port %d forwarded successfully"), nat->private_port);
|
|
}
|
|
else if (val != NATPMP_TRYAGAIN)
|
|
{
|
|
nat->state = TR_NATPMP_ERR;
|
|
}
|
|
}
|
|
|
|
switch (nat->state)
|
|
{
|
|
case TR_NATPMP_IDLE:
|
|
*public_port = nat->public_port;
|
|
*real_private_port = nat->private_port;
|
|
return nat->is_mapped ? TR_PORT_MAPPED : TR_PORT_UNMAPPED;
|
|
|
|
case TR_NATPMP_DISCOVER:
|
|
return TR_PORT_UNMAPPED;
|
|
|
|
case TR_NATPMP_RECV_PUB:
|
|
case TR_NATPMP_SEND_MAP:
|
|
case TR_NATPMP_RECV_MAP:
|
|
return TR_PORT_MAPPING;
|
|
|
|
case TR_NATPMP_SEND_UNMAP:
|
|
case TR_NATPMP_RECV_UNMAP:
|
|
return TR_PORT_UNMAPPING;
|
|
|
|
default:
|
|
return TR_PORT_ERROR;
|
|
}
|
|
}
|