upgrade_supported.go 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440
  1. // Copyright (C) 2014 The Syncthing Authors.
  2. //
  3. // This Source Code Form is subject to the terms of the Mozilla Public
  4. // License, v. 2.0. If a copy of the MPL was not distributed with this file,
  5. // You can obtain one at https://mozilla.org/MPL/2.0/.
  6. //go:build !noupgrade && !ios
  7. // +build !noupgrade,!ios
  8. package upgrade
  9. import (
  10. "archive/tar"
  11. "archive/zip"
  12. "bytes"
  13. "compress/gzip"
  14. "encoding/json"
  15. "errors"
  16. "fmt"
  17. "io"
  18. "net/http"
  19. "os"
  20. "path"
  21. "path/filepath"
  22. "runtime"
  23. "sort"
  24. "strings"
  25. "time"
  26. "github.com/shirou/gopsutil/v4/host"
  27. "github.com/syncthing/syncthing/lib/dialer"
  28. "github.com/syncthing/syncthing/lib/signature"
  29. "golang.org/x/net/http2"
  30. )
  31. const DisabledByCompilation = false
  32. const (
  33. // Current binary size hovers around 10 MB. We give it some room to grow
  34. // and say that we never expect the binary to be larger than 64 MB.
  35. maxBinarySize = 64 << 20 // 64 MiB
  36. // The max expected size of the signature file.
  37. maxSignatureSize = 10 << 10 // 10 KiB
  38. // We set the same limit on the archive. The binary will compress and we
  39. // include some other stuff - currently the release archive size is
  40. // around 6 MB.
  41. maxArchiveSize = maxBinarySize
  42. // When looking through the archive for the binary and signature, stop
  43. // looking once we've searched this many files.
  44. maxArchiveMembers = 100
  45. // Archive reads, or metadata checks, that take longer than this will be
  46. // rejected.
  47. readTimeout = 30 * time.Minute
  48. // The limit on the size of metadata that we accept.
  49. maxMetadataSize = 10 << 20 // 10 MiB
  50. )
  51. var upgradeClient = &http.Client{
  52. Timeout: readTimeout,
  53. Transport: &http.Transport{
  54. DialContext: dialer.DialContext,
  55. Proxy: http.ProxyFromEnvironment,
  56. },
  57. }
  58. var osVersion string
  59. func init() {
  60. _ = http2.ConfigureTransport(upgradeClient.Transport.(*http.Transport))
  61. osVersion, _ = host.KernelVersion()
  62. osVersion = strings.TrimSpace(osVersion)
  63. }
  64. func insecureGet(url, version string) (*http.Response, error) {
  65. req, err := http.NewRequest(http.MethodGet, url, nil)
  66. if err != nil {
  67. return nil, err
  68. }
  69. req.Header.Set("User-Agent", fmt.Sprintf(`syncthing %s (%s %s-%s)`, version, runtime.Version(), runtime.GOOS, runtime.GOARCH))
  70. if osVersion != "" {
  71. req.Header.Set("Syncthing-Os-Version", osVersion)
  72. }
  73. return upgradeClient.Do(req)
  74. }
  75. // FetchLatestReleases returns the latest releases. The "current" parameter
  76. // is used for setting the User-Agent only.
  77. func FetchLatestReleases(releasesURL, current string) []Release {
  78. resp, err := insecureGet(releasesURL, current)
  79. if err != nil {
  80. l.Infoln("Couldn't fetch release information:", err)
  81. return nil
  82. }
  83. if resp.StatusCode > 299 {
  84. l.Infoln("API call returned HTTP error:", resp.Status)
  85. return nil
  86. }
  87. var rels []Release
  88. err = json.NewDecoder(io.LimitReader(resp.Body, maxMetadataSize)).Decode(&rels)
  89. if err != nil {
  90. l.Infoln("Fetching release information:", err)
  91. }
  92. resp.Body.Close()
  93. return rels
  94. }
  95. type SortByRelease []Release
  96. func (s SortByRelease) Len() int {
  97. return len(s)
  98. }
  99. func (s SortByRelease) Swap(i, j int) {
  100. s[i], s[j] = s[j], s[i]
  101. }
  102. func (s SortByRelease) Less(i, j int) bool {
  103. return CompareVersions(s[i].Tag, s[j].Tag) > 0
  104. }
  105. func LatestRelease(releasesURL, current string, upgradeToPreReleases bool) (Release, error) {
  106. rels := FetchLatestReleases(releasesURL, current)
  107. return SelectLatestRelease(rels, current, upgradeToPreReleases)
  108. }
  109. func SelectLatestRelease(rels []Release, current string, upgradeToPreReleases bool) (Release, error) {
  110. if len(rels) == 0 {
  111. return Release{}, ErrNoVersionToSelect
  112. }
  113. // Sort the releases, lowest version number first
  114. sort.Sort(sort.Reverse(SortByRelease(rels)))
  115. var selected Release
  116. for _, rel := range rels {
  117. if CompareVersions(rel.Tag, current) == MajorNewer {
  118. // We've found a new major version. That's fine, but if we've
  119. // already found a minor upgrade that is acceptable we should go
  120. // with that one first and then revisit in the future.
  121. if selected.Tag != "" && CompareVersions(selected.Tag, current) == Newer {
  122. return selected, nil
  123. }
  124. }
  125. if rel.Prerelease && !upgradeToPreReleases {
  126. l.Debugln("skipping pre-release", rel.Tag)
  127. continue
  128. }
  129. expectedReleases := releaseNames(rel.Tag)
  130. nextAsset:
  131. for _, asset := range rel.Assets {
  132. assetName := path.Base(asset.Name)
  133. // Check for the architecture
  134. for _, expRel := range expectedReleases {
  135. if strings.HasPrefix(assetName, expRel) {
  136. l.Debugln("selected", rel.Tag)
  137. selected = rel
  138. break nextAsset
  139. }
  140. }
  141. }
  142. }
  143. if selected.Tag == "" {
  144. return Release{}, ErrNoReleaseDownload
  145. }
  146. return selected, nil
  147. }
  148. // Upgrade to the given release, saving the previous binary with a ".old" extension.
  149. func upgradeTo(binary string, rel Release) error {
  150. expectedReleases := releaseNames(rel.Tag)
  151. for _, asset := range rel.Assets {
  152. assetName := path.Base(asset.Name)
  153. l.Debugln("considering release", assetName)
  154. for _, expRel := range expectedReleases {
  155. if strings.HasPrefix(assetName, expRel) {
  156. return upgradeToURL(assetName, binary, asset.URL)
  157. }
  158. }
  159. }
  160. return ErrNoReleaseDownload
  161. }
  162. // Upgrade to the given release, saving the previous binary with a ".old" extension.
  163. func upgradeToURL(archiveName, binary string, url string) error {
  164. fname, err := readRelease(archiveName, filepath.Dir(binary), url)
  165. if err != nil {
  166. return err
  167. }
  168. defer os.Remove(fname)
  169. old := binary + ".old"
  170. os.Remove(old)
  171. err = os.Rename(binary, old)
  172. if err != nil {
  173. return err
  174. }
  175. if err := os.Rename(fname, binary); err != nil {
  176. os.Rename(old, binary)
  177. return err
  178. }
  179. return nil
  180. }
  181. func readRelease(archiveName, dir, url string) (string, error) {
  182. l.Debugf("loading %q", url)
  183. req, err := http.NewRequest("GET", url, nil)
  184. if err != nil {
  185. return "", err
  186. }
  187. req.Header.Add("Accept", "application/octet-stream")
  188. resp, err := upgradeClient.Do(req)
  189. if err != nil {
  190. return "", err
  191. }
  192. defer resp.Body.Close()
  193. switch path.Ext(archiveName) {
  194. case ".zip":
  195. return readZip(archiveName, dir, io.LimitReader(resp.Body, maxArchiveSize))
  196. default:
  197. return readTarGz(archiveName, dir, io.LimitReader(resp.Body, maxArchiveSize))
  198. }
  199. }
  200. func readTarGz(archiveName, dir string, r io.Reader) (string, error) {
  201. gr, err := gzip.NewReader(r)
  202. if err != nil {
  203. return "", err
  204. }
  205. tr := tar.NewReader(gr)
  206. var tempName string
  207. var sig []byte
  208. // Iterate through the files in the archive.
  209. i := 0
  210. for {
  211. if i >= maxArchiveMembers {
  212. break
  213. }
  214. i++
  215. hdr, err := tr.Next()
  216. if err == io.EOF {
  217. // end of tar archive
  218. break
  219. }
  220. if err != nil {
  221. return "", err
  222. }
  223. if hdr.Size > maxBinarySize {
  224. // We don't even want to try processing or skipping over files
  225. // that are too large.
  226. break
  227. }
  228. err = archiveFileVisitor(dir, &tempName, &sig, hdr.Name, tr)
  229. if err != nil {
  230. return "", err
  231. }
  232. if tempName != "" && sig != nil {
  233. break
  234. }
  235. }
  236. if err := verifyUpgrade(archiveName, tempName, sig); err != nil {
  237. return "", err
  238. }
  239. return tempName, nil
  240. }
  241. func readZip(archiveName, dir string, r io.Reader) (string, error) {
  242. body, err := io.ReadAll(r)
  243. if err != nil {
  244. return "", err
  245. }
  246. archive, err := zip.NewReader(bytes.NewReader(body), int64(len(body)))
  247. if err != nil {
  248. return "", err
  249. }
  250. var tempName string
  251. var sig []byte
  252. // Iterate through the files in the archive.
  253. i := 0
  254. for _, file := range archive.File {
  255. if i >= maxArchiveMembers {
  256. break
  257. }
  258. i++
  259. if file.UncompressedSize64 > maxBinarySize {
  260. // We don't even want to try processing or skipping over files
  261. // that are too large.
  262. break
  263. }
  264. inFile, err := file.Open()
  265. if err != nil {
  266. return "", err
  267. }
  268. err = archiveFileVisitor(dir, &tempName, &sig, file.Name, inFile)
  269. inFile.Close()
  270. if err != nil {
  271. return "", err
  272. }
  273. if tempName != "" && sig != nil {
  274. break
  275. }
  276. }
  277. if err := verifyUpgrade(archiveName, tempName, sig); err != nil {
  278. return "", err
  279. }
  280. return tempName, nil
  281. }
  282. // archiveFileVisitor is called for each file in an archive. It may set
  283. // tempFile and signature.
  284. func archiveFileVisitor(dir string, tempFile *string, signature *[]byte, archivePath string, filedata io.Reader) error {
  285. var err error
  286. filename := path.Base(archivePath)
  287. archiveDir := path.Dir(archivePath)
  288. l.Debugf("considering file %s", archivePath)
  289. switch filename {
  290. case "syncthing", "syncthing.exe":
  291. archiveDirs := strings.Split(archiveDir, "/")
  292. if len(archiveDirs) > 1 {
  293. // Don't consider "syncthing" files found too deeply, as they may be
  294. // other things.
  295. return nil
  296. }
  297. l.Debugf("found upgrade binary %s", archivePath)
  298. *tempFile, err = writeBinary(dir, io.LimitReader(filedata, maxBinarySize))
  299. if err != nil {
  300. return err
  301. }
  302. case "release.sig":
  303. l.Debugf("found signature %s", archivePath)
  304. *signature, err = io.ReadAll(io.LimitReader(filedata, maxSignatureSize))
  305. if err != nil {
  306. return err
  307. }
  308. }
  309. return nil
  310. }
  311. func verifyUpgrade(archiveName, tempName string, sig []byte) error {
  312. if tempName == "" {
  313. return errors.New("no upgrade found")
  314. }
  315. if sig == nil {
  316. return errors.New("no signature found")
  317. }
  318. l.Debugf("checking signature\n%s", sig)
  319. fd, err := os.Open(tempName)
  320. if err != nil {
  321. return err
  322. }
  323. // Create a new reader that will serve reads from, in order:
  324. //
  325. // - the archive name ("syncthing-linux-amd64-v0.13.0-beta.4.tar.gz")
  326. // followed by a newline
  327. //
  328. // - the temp file contents
  329. //
  330. // We then verify the release signature against the contents of this
  331. // multireader. This ensures that it is not only a bonafide syncthing
  332. // binary, but it is also of exactly the platform and version we expect.
  333. mr := io.MultiReader(strings.NewReader(archiveName+"\n"), fd)
  334. err = signature.Verify(SigningKey, sig, mr)
  335. fd.Close()
  336. if err != nil {
  337. os.Remove(tempName)
  338. return err
  339. }
  340. return nil
  341. }
  342. func writeBinary(dir string, inFile io.Reader) (filename string, err error) {
  343. // Write the binary to a temporary file.
  344. outFile, err := os.CreateTemp(dir, "syncthing")
  345. if err != nil {
  346. return "", err
  347. }
  348. _, err = io.Copy(outFile, inFile)
  349. if err != nil {
  350. os.Remove(outFile.Name())
  351. return "", err
  352. }
  353. err = outFile.Close()
  354. if err != nil {
  355. os.Remove(outFile.Name())
  356. return "", err
  357. }
  358. err = os.Chmod(outFile.Name(), os.FileMode(0o755))
  359. if err != nil {
  360. os.Remove(outFile.Name())
  361. return "", err
  362. }
  363. return outFile.Name(), nil
  364. }