torrent/config.go

169 lines
6.0 KiB
Go
Raw Normal View History

2014-08-21 08:07:06 +00:00
package torrent
import (
2017-12-01 07:12:29 +00:00
"crypto/tls"
"net"
"net/http"
"net/url"
2017-12-01 07:12:29 +00:00
"time"
"github.com/anacrolix/dht"
"github.com/anacrolix/missinggo"
"github.com/anacrolix/missinggo/expect"
2018-07-07 01:36:58 +00:00
"golang.org/x/time/rate"
"github.com/anacrolix/torrent/iplist"
2016-03-28 09:38:30 +00:00
"github.com/anacrolix/torrent/storage"
)
var DefaultHTTPUserAgent = "Go-Torrent/1.0"
// Probably not safe to modify this after it's given to a Client.
type ClientConfig struct {
2018-01-11 06:11:54 +00:00
// Store torrent file data in this directory unless .DefaultStorage is
2015-03-08 06:28:14 +00:00
// specified.
DataDir string `long:"data-dir" description:"directory to store downloaded torrent data"`
2015-03-08 06:28:14 +00:00
// The address to listen for new uTP and TCP bittorrent protocol
// connections. DHT shares a UDP socket with uTP unless configured
// otherwise.
ListenHost func(network string) string
ListenPort int
NoDefaultPortForwarding bool
2015-03-08 06:28:14 +00:00
// Don't announce to trackers. This only leaves DHT to discover peers.
DisableTrackers bool `long:"disable-trackers"`
DisablePEX bool `long:"disable-pex"`
2016-10-10 03:57:34 +00:00
// Don't create a DHT.
NoDHT bool `long:"disable-dht"`
DhtStartingNodes dht.StartingNodesGetter
2016-10-10 03:57:34 +00:00
// Never send chunks to peers.
NoUpload bool `long:"no-upload"`
// Disable uploading even when it isn't fair.
DisableAggressiveUpload bool `long:"disable-aggressive-upload"`
2015-05-14 22:39:53 +00:00
// Upload even after there's nothing in it for us. By default uploading is
2018-07-07 01:33:48 +00:00
// not altruistic, we'll only upload to encourage the peer to reciprocate.
2015-05-14 22:39:53 +00:00
Seed bool `long:"seed"`
// Only applies to chunks uploaded to peers, to maintain responsiveness
// communicating local Client state to peers. Each limiter token
// represents one byte. The Limiter's burst must be large enough to fit a
// whole chunk, which is usually 16 KiB (see TorrentSpec.ChunkSize).
2016-10-10 06:29:39 +00:00
UploadRateLimiter *rate.Limiter
// Rate limits all reads from connections to peers. Each limiter token
// represents one byte. The Limiter's burst must be bigger than the
// largest Read performed on a the underlying rate-limiting io.Reader
// minus one. This is likely to be the larger of the main read loop buffer
// (~4096), and the requested chunk size (~16KiB, see
// TorrentSpec.ChunkSize).
2016-10-10 06:29:39 +00:00
DownloadRateLimiter *rate.Limiter
2015-03-08 06:28:14 +00:00
// User-provided Client peer ID. If not present, one is generated automatically.
PeerID string
// For the bittorrent protocol.
DisableUTP bool
// For the bittorrent protocol.
DisableTCP bool `long:"disable-tcp"`
2016-09-16 02:13:06 +00:00
// Called to instantiate storage for each added torrent. Builtin backends
// are in the storage package. If not set, the "file" implementation is
// used.
2016-09-16 02:42:41 +00:00
DefaultStorage storage.ClientImpl
EncryptionPolicy
// Sets usage of Socks5 Proxy. Authentication should be included in the url if needed.
// Example of setting: "socks5://demo:demo@192.168.99.100:1080"
ProxyURL string
IPBlocklist iplist.Ranger
DisableIPv6 bool `long:"disable-ipv6"`
DisableIPv4 bool
DisableIPv4Peers bool
// Perform logging and any other behaviour that will help debug.
2017-11-08 08:29:01 +00:00
Debug bool `help:"enable debugging"`
// HTTP client used to query the tracker endpoint. Default is DefaultHTTPClient
HTTP *http.Client
// HTTPUserAgent changes default UserAgent for HTTP requests
HTTPUserAgent string `long:"http-user-agent"`
// Updated occasionally to when there's been some changes to client
// behaviour in case other clients are assuming anything of us. See also
// `bep20`.
ExtendedHandshakeClientVersion string // default "go.torrent dev 20150624"
// Peer ID client identifier prefix. We'll update this occasionally to
// reflect changes to client behaviour that other clients may depend on.
// Also see `extendedHandshakeClientVersion`.
Bep20 string // default "-GT0001-"
NominalDialTimeout time.Duration // default time.Second * 30
MinDialTimeout time.Duration // default 5 * time.Second
EstablishedConnsPerTorrent int // default 80
HalfOpenConnsPerTorrent int // default 80
TorrentPeersHighWater int // default 200
TorrentPeersLowWater int // default 50
// Limit how long handshake can take. This is to reduce the lingering
// impact of a few bad apples. 4s loses 1% of successful handshakes that
// are obtained with 60s timeout, and 5% of unsuccessful handshakes.
HandshakesTimeout time.Duration // default 20 * time.Second
PublicIp4 net.IP
PublicIp6 net.IP
DisableAcceptRateLimiting bool
dropDuplicatePeerIds bool
}
func (cfg *ClientConfig) SetListenAddr(addr string) *ClientConfig {
host, port, err := missinggo.ParseHostPort(addr)
expect.Nil(err)
cfg.ListenHost = func(string) string { return host }
cfg.ListenPort = port
return cfg
}
func NewDefaultClientConfig() *ClientConfig {
return &ClientConfig{
HTTP: &http.Client{
Timeout: time.Second * 15,
Transport: &http.Transport{
Dial: (&net.Dialer{
Timeout: 15 * time.Second,
}).Dial,
TLSHandshakeTimeout: 15 * time.Second,
TLSClientConfig: &tls.Config{InsecureSkipVerify: true},
}},
HTTPUserAgent: DefaultHTTPUserAgent,
ExtendedHandshakeClientVersion: "go.torrent dev 20150624",
Bep20: "-GT0001-",
NominalDialTimeout: 30 * time.Second,
MinDialTimeout: 5 * time.Second,
EstablishedConnsPerTorrent: 50,
HalfOpenConnsPerTorrent: 25,
TorrentPeersHighWater: 500,
TorrentPeersLowWater: 50,
HandshakesTimeout: 20 * time.Second,
DhtStartingNodes: dht.GlobalBootstrapAddrs,
ListenHost: func(string) string { return "" },
UploadRateLimiter: unlimited,
DownloadRateLimiter: unlimited,
2018-04-12 13:34:31 +00:00
}
2014-08-21 08:07:06 +00:00
}
func (cfg *ClientConfig) setProxyURL() {
fixedURL, err := url.Parse(cfg.ProxyURL)
if err != nil {
return
}
cfg.HTTP.Transport = &http.Transport{
Proxy: http.ProxyURL(fixedURL),
TLSHandshakeTimeout: 15 * time.Second,
TLSClientConfig: &tls.Config{InsecureSkipVerify: true},
}
}
type EncryptionPolicy struct {
DisableEncryption bool
ForceEncryption bool // Don't allow unobfuscated connections.
PreferNoEncryption bool
}