Files
pfs-tftp-codex/crates/pfs-tftp-sync/src/client.rs

490 lines
16 KiB
Rust

#![forbid(unsafe_code)]
use std::{
fs::File,
io::{Read, Write},
net::SocketAddr,
path::Path,
time::Duration,
};
use pfs_tftp_proto::packet::{BLOCK_SIZE, ErrorCode, MAX_PACKET_SIZE, Packet, Request};
use crate::{
Mode,
error::{Error, Result},
util,
};
/// Configuration for a synchronous TFTP client.
#[derive(Debug, Clone)]
pub struct ClientConfig {
pub timeout: Duration,
pub retries: u32,
pub dally_timeout: Duration,
pub dally_retries: u32,
}
impl Default for ClientConfig {
fn default() -> Self {
let timeout = Duration::from_secs(5);
Self {
timeout,
retries: 5,
dally_timeout: timeout,
// RFC 1350, Section 6: The final ACK sender *may* terminate immediately, but
// "dallying is encouraged". For CLI UX, default to no dallying and allow
// opt-in via flags.
dally_retries: 0,
}
}
}
/// A synchronous TFTP client.
#[derive(Debug)]
pub struct Client {
pub(crate) server: SocketAddr,
pub(crate) config: ClientConfig,
}
impl Client {
#[must_use]
pub fn new(server: SocketAddr, config: ClientConfig) -> Self {
Self { server, config }
}
#[must_use]
pub fn server(&self) -> SocketAddr {
self.server
}
#[must_use]
pub fn config(&self) -> &ClientConfig {
&self.config
}
/// Downloads `remote_filename` from the configured server into `output`.
///
/// RFC reference:
/// - Packet formats: RFC 1350, Section 5 (Figures 5-1..5-4)
/// - Lock-step ACK/DATA: RFC 1350, Section 2
/// - Termination (final <512 DATA): RFC 1350, Section 6
/// - Transfer identifiers (TID): RFC 1350, Section 4 (page 4)
///
/// # Errors
/// Returns an error on I/O failures, protocol decode errors, timeouts after
/// exhausting retries, or if the peer sends an ERROR packet.
pub fn download_to_writer(
&self,
remote_filename: &str,
mode: Mode,
output: &mut impl Write,
) -> Result<()> {
let socket = util::bind_ephemeral_for(self.server)?;
socket.set_read_timeout(Some(self.config.timeout))?;
Self::validate_mode(mode)?;
let mut sink = util::DataSink::new(output, mode);
let mut recv_buf = [0u8; MAX_PACKET_SIZE];
let (peer, first) = self.rrq_handshake(&socket, &mut recv_buf, remote_filename, mode)?;
let Packet::Data { block, data } = first else {
return Err(Error::Io(std::io::Error::new(
std::io::ErrorKind::InvalidData,
"unexpected packet type",
)));
};
if block != 1 {
util::send_error(
&socket,
peer,
ErrorCode::IllegalOperation,
"unexpected block number",
);
return Err(Error::Io(std::io::Error::new(
std::io::ErrorKind::InvalidData,
"unexpected block number",
)));
}
sink.write_data(&data).map_err(map_sink_error)?;
let ack_bytes = Packet::Ack { block }.encode();
socket.send_to(&ack_bytes, peer)?;
let mut last_ack = Some(ack_bytes.clone());
let mut last_sent = ack_bytes;
let mut expected_block = 2u16;
if data.len() < BLOCK_SIZE {
sink.finish().map_err(map_sink_error)?;
self.dally_final_ack(&socket, peer, block, last_ack.as_deref())?;
return Ok(());
}
let mut attempts = 0u32;
loop {
let n = self.recv_from_peer_with_retries(
&socket,
&mut recv_buf,
&mut attempts,
"ACK",
&last_sent,
peer,
)?;
let pkt = Packet::decode(&recv_buf[..n])?;
match pkt {
Packet::Error { code, message } => {
return Err(Error::RemoteError { code, message });
}
Packet::Data { block, data } if block == expected_block => {
sink.write_data(&data).map_err(map_sink_error)?;
let ack = Packet::Ack { block }.encode();
socket.send_to(&ack, peer)?;
last_ack = Some(ack.clone());
last_sent = ack;
if data.len() < BLOCK_SIZE {
sink.finish().map_err(map_sink_error)?;
self.dally_final_ack(&socket, peer, block, last_ack.as_deref())?;
return Ok(());
}
expected_block = expected_block.wrapping_add(1);
}
Packet::Data { block, .. } if block == expected_block.wrapping_sub(1) => {
if let Some(ack) = &last_ack {
socket.send_to(ack, peer)?;
}
}
_ => {
util::send_error(
&socket,
peer,
ErrorCode::IllegalOperation,
"unexpected packet type",
);
return Err(Error::Io(std::io::Error::new(
std::io::ErrorKind::InvalidData,
"unexpected packet type",
)));
}
}
}
}
/// Downloads `remote_filename` from the configured server into `local_path`.
///
/// # Errors
/// Returns any error from [`Self::download_to_writer`] or filesystem I/O.
pub fn get(&self, remote_filename: &str, local_path: &Path, mode: Mode) -> Result<()> {
let mut file = File::create(local_path)?;
self.download_to_writer(remote_filename, mode, &mut file)
}
/// Uploads `input` to the configured server as `remote_filename`.
///
/// RFC reference:
/// - WRQ/ACK(0) handshake: RFC 1350, Section 4 (page 4) and Section 5 (ACK block=0)
/// - Lock-step ACK/DATA: RFC 1350, Section 2
/// - Termination (final <512 DATA): RFC 1350, Section 6
///
/// # Errors
/// Returns an error on I/O failures, protocol decode errors, timeouts after
/// exhausting retries, or if the peer sends an ERROR packet.
pub fn upload_from_reader(
&self,
remote_filename: &str,
mode: Mode,
input: &mut impl Read,
) -> Result<()> {
let socket = util::bind_ephemeral_for(self.server)?;
socket.set_read_timeout(Some(self.config.timeout))?;
Self::validate_mode(mode)?;
let mut recv_buf = [0u8; MAX_PACKET_SIZE];
let peer = self.wrq_handshake(&socket, &mut recv_buf, remote_filename, mode)?;
let mut source = util::DataSource::new(input, mode);
let mut next_block: u16 = 1;
let mut attempts = 0u32;
while let Some(data) = source.next_block()? {
let data_bytes = Packet::Data {
block: next_block,
data,
}
.encode();
socket.send_to(&data_bytes, peer)?;
let expected_ack = next_block;
let last_sent = data_bytes;
let last_sent_kind = "DATA";
loop {
let n = self.recv_from_peer_with_retries(
&socket,
&mut recv_buf,
&mut attempts,
last_sent_kind,
&last_sent,
peer,
)?;
match Packet::decode(&recv_buf[..n])? {
Packet::Ack { block } if block == expected_ack => break,
Packet::Ack { block } if block == expected_ack.wrapping_sub(1) => {
socket.send_to(&last_sent, peer)?;
}
Packet::Error { code, message } => {
return Err(Error::RemoteError { code, message });
}
_ => {
util::send_error(
&socket,
peer,
ErrorCode::IllegalOperation,
"unexpected packet type",
);
return Err(Error::Io(std::io::Error::new(
std::io::ErrorKind::InvalidData,
"unexpected packet type",
)));
}
}
}
attempts = 0;
next_block = next_block.wrapping_add(1);
}
Ok(())
}
/// Uploads `local_path` to the configured server as `remote_filename`.
///
/// # Errors
/// Returns any error from [`Self::upload_from_reader`] or filesystem I/O.
pub fn put(&self, local_path: &Path, remote_filename: &str, mode: Mode) -> Result<()> {
let mut file = File::open(local_path)?;
self.upload_from_reader(remote_filename, mode, &mut file)
}
fn dally_final_ack(
&self,
socket: &std::net::UdpSocket,
peer: SocketAddr,
final_block: u16,
ack_bytes: Option<&[u8]>,
) -> Result<()> {
if self.config.dally_retries == 0 {
return Ok(());
}
let Some(ack_bytes) = ack_bytes else {
return Ok(());
};
socket.set_read_timeout(Some(self.config.dally_timeout))?;
let mut recv_buf = [0u8; MAX_PACKET_SIZE];
let mut timeouts = 0u32;
// RFC 1350, Section 6: "dallying is encouraged" to retransmit the final ACK
// if the last DATA is retransmitted.
while timeouts < self.config.dally_retries {
match socket.recv_from(&mut recv_buf) {
Ok((n, from)) => {
if from != peer {
util::send_error(
socket,
from,
ErrorCode::UnknownTransferId,
"unknown transfer id",
);
continue;
}
if let Ok(Packet::Data { block, .. }) = Packet::decode(&recv_buf[..n])
&& block == final_block
{
let _ignored = socket.send_to(ack_bytes, peer);
}
}
Err(e) if util::is_timeout(&e) => timeouts += 1,
Err(e) => return Err(e.into()),
}
}
Ok(())
}
fn validate_mode(mode: Mode) -> Result<()> {
if mode == Mode::Mail {
return Err(Error::UnsupportedMode(mode));
}
Ok(())
}
fn rrq_handshake(
&self,
socket: &std::net::UdpSocket,
recv_buf: &mut [u8],
remote_filename: &str,
mode: Mode,
) -> Result<(SocketAddr, Packet)> {
let rrq_bytes = Packet::Rrq(Request {
filename: remote_filename.to_string(),
mode,
})
.encode();
socket.send_to(&rrq_bytes, self.server)?;
let mut attempts = 0u32;
loop {
let (n, from) = self.recv_from_with_retries(
socket,
recv_buf,
&mut attempts,
"RRQ",
&rrq_bytes,
self.server,
)?;
if from.ip() != self.server.ip() {
continue;
}
let pkt = Packet::decode(&recv_buf[..n])?;
match pkt {
Packet::Data { .. } => return Ok((from, pkt)),
Packet::Error { code, message } => {
return Err(Error::RemoteError { code, message });
}
_ => {
util::send_error(
socket,
from,
ErrorCode::IllegalOperation,
"unexpected packet",
);
return Err(Error::Io(std::io::Error::new(
std::io::ErrorKind::InvalidData,
"unexpected packet",
)));
}
}
}
}
fn wrq_handshake(
&self,
socket: &std::net::UdpSocket,
recv_buf: &mut [u8],
remote_filename: &str,
mode: Mode,
) -> Result<SocketAddr> {
let wrq_bytes = Packet::Wrq(Request {
filename: remote_filename.to_string(),
mode,
})
.encode();
socket.send_to(&wrq_bytes, self.server)?;
let mut attempts = 0u32;
loop {
let (n, from) = self.recv_from_with_retries(
socket,
recv_buf,
&mut attempts,
"WRQ",
&wrq_bytes,
self.server,
)?;
if from.ip() != self.server.ip() {
continue;
}
match Packet::decode(&recv_buf[..n])? {
Packet::Ack { block: 0 } => return Ok(from),
Packet::Error { code, message } => {
return Err(Error::RemoteError { code, message });
}
_ => {
util::send_error(
socket,
from,
ErrorCode::IllegalOperation,
"unexpected packet",
);
return Err(Error::Io(std::io::Error::new(
std::io::ErrorKind::InvalidData,
"unexpected packet",
)));
}
}
}
}
fn recv_from_with_retries(
&self,
socket: &std::net::UdpSocket,
recv_buf: &mut [u8],
attempts: &mut u32,
last_sent_kind: &'static str,
last_sent: &[u8],
resend_to: SocketAddr,
) -> Result<(usize, SocketAddr)> {
loop {
match socket.recv_from(recv_buf) {
Ok(v) => {
*attempts = 0;
return Ok(v);
}
Err(e) if util::is_timeout(&e) => {
*attempts += 1;
if *attempts > self.config.retries {
return Err(Error::Timeout {
last_packet: last_sent_kind,
attempts: *attempts,
});
}
socket.send_to(last_sent, resend_to)?;
}
Err(e) => return Err(e.into()),
}
}
}
fn recv_from_peer_with_retries(
&self,
socket: &std::net::UdpSocket,
recv_buf: &mut [u8],
attempts: &mut u32,
last_sent_kind: &'static str,
last_sent: &[u8],
peer: SocketAddr,
) -> Result<usize> {
loop {
let (n, from) = self.recv_from_with_retries(
socket,
recv_buf,
attempts,
last_sent_kind,
last_sent,
peer,
)?;
if from == peer {
return Ok(n);
}
// RFC 1350, Section 4 (page 4): incorrect source port => Unknown transfer ID.
if from.ip() == peer.ip() {
util::send_error(
socket,
from,
ErrorCode::UnknownTransferId,
"unknown transfer id",
);
}
}
}
}
fn map_sink_error(err: util::DataSinkError) -> Error {
match err {
util::DataSinkError::Io(e) => Error::Io(e),
util::DataSinkError::Netascii(e) => Error::Netascii(e),
}
}