torrent/tracker/http.go

169 lines
4.4 KiB
Go
Raw Normal View History

package tracker
2015-03-26 06:20:31 +00:00
import (
"bytes"
"crypto/tls"
2015-03-26 06:20:31 +00:00
"fmt"
"io"
2019-07-17 08:12:11 +00:00
"math"
"net"
2015-03-26 06:20:31 +00:00
"net/http"
"net/url"
"strconv"
"time"
2015-03-26 06:20:31 +00:00
2019-08-10 08:46:07 +00:00
"github.com/anacrolix/dht/v2/krpc"
"github.com/anacrolix/missinggo/httptoo"
"github.com/anacrolix/torrent/bencode"
2015-03-26 06:20:31 +00:00
)
2016-02-07 06:45:46 +00:00
type httpResponse struct {
FailureReason string `bencode:"failure reason"`
Interval int32 `bencode:"interval"`
TrackerId string `bencode:"tracker id"`
Complete int32 `bencode:"complete"`
Incomplete int32 `bencode:"incomplete"`
Peers Peers `bencode:"peers"`
// BEP 7
Peers6 krpc.CompactIPv6NodeAddrs `bencode:"peers6"`
2015-03-26 06:20:31 +00:00
}
type Peers []Peer
func (me *Peers) UnmarshalBencode(b []byte) (err error) {
var _v interface{}
err = bencode.Unmarshal(b, &_v)
if err != nil {
return
}
switch v := _v.(type) {
case string:
vars.Add("http responses with string peers", 1)
var cnas krpc.CompactIPv4NodeAddrs
err = cnas.UnmarshalBinary([]byte(v))
if err != nil {
return
}
for _, cp := range cnas {
*me = append(*me, Peer{
IP: cp.IP[:],
Port: int(cp.Port),
})
}
2015-03-26 06:20:31 +00:00
return
case []interface{}:
vars.Add("http responses with list peers", 1)
for _, i := range v {
var p Peer
p.fromDictInterface(i.(map[string]interface{}))
*me = append(*me, p)
}
return
default:
vars.Add("http responses with unhandled peers type", 1)
err = fmt.Errorf("unsupported type: %T", _v)
2015-03-26 06:20:31 +00:00
return
}
}
2018-02-19 05:19:18 +00:00
func setAnnounceParams(_url *url.URL, ar *AnnounceRequest, opts Announce) {
q := _url.Query()
2015-03-26 06:20:31 +00:00
q.Set("info_hash", string(ar.InfoHash[:]))
q.Set("peer_id", string(ar.PeerId[:]))
2018-08-13 10:27:42 +00:00
// AFAICT, port is mandatory, and there's no implied port key.
2015-03-26 06:20:31 +00:00
q.Set("port", fmt.Sprintf("%d", ar.Port))
q.Set("uploaded", strconv.FormatInt(ar.Uploaded, 10))
q.Set("downloaded", strconv.FormatInt(ar.Downloaded, 10))
2019-07-17 08:12:11 +00:00
// The AWS S3 tracker returns "400 Bad Request: left(-1) was not in the valid range 0 -
// 9223372036854775807" if left is out of range, or "500 Internal Server Error: Internal Server
// Error" if omitted entirely.
left := ar.Left
if left < 0 {
left = math.MaxInt64
}
q.Set("left", strconv.FormatInt(left, 10))
if ar.Event != None {
2015-03-26 06:20:31 +00:00
q.Set("event", ar.Event.String())
}
// http://stackoverflow.com/questions/17418004/why-does-tracker-server-not-understand-my-request-bittorrent-protocol
q.Set("compact", "1")
2018-02-13 00:18:23 +00:00
// According to https://wiki.vuze.com/w/Message_Stream_Encryption. TODO:
// Take EncryptionPolicy or something like it as a parameter.
2015-03-27 06:22:42 +00:00
q.Set("supportcrypto", "1")
2018-02-19 05:19:18 +00:00
if opts.ClientIp4.IP != nil {
q.Set("ipv4", opts.ClientIp4.String())
}
if opts.ClientIp6.IP != nil {
q.Set("ipv6", opts.ClientIp6.String())
}
_url.RawQuery = q.Encode()
}
2018-02-19 05:19:18 +00:00
func announceHTTP(opt Announce, _url *url.URL) (ret AnnounceResponse, err error) {
_url = httptoo.CopyURL(_url)
2018-02-19 05:19:18 +00:00
setAnnounceParams(_url, &opt.Request, opt)
req, err := http.NewRequest("GET", _url.String(), nil)
2018-02-19 05:19:18 +00:00
req.Header.Set("User-Agent", opt.UserAgent)
req.Host = opt.HostHeader
if opt.Context != nil {
req = req.WithContext(opt.Context)
}
resp, err := (&http.Client{
Timeout: time.Second * 15,
Transport: &http.Transport{
Dial: (&net.Dialer{
Timeout: 15 * time.Second,
}).Dial,
Proxy: opt.HTTPProxy,
TLSHandshakeTimeout: 15 * time.Second,
TLSClientConfig: &tls.Config{
InsecureSkipVerify: true,
ServerName: opt.ServerName,
},
},
}).Do(req)
2015-03-26 06:20:31 +00:00
if err != nil {
return
}
defer resp.Body.Close()
var buf bytes.Buffer
2015-03-26 06:20:31 +00:00
io.Copy(&buf, resp.Body)
if resp.StatusCode != 200 {
err = fmt.Errorf("response from tracker: %s: %s", resp.Status, buf.String())
return
}
2016-02-07 06:45:46 +00:00
var trackerResponse httpResponse
err = bencode.Unmarshal(buf.Bytes(), &trackerResponse)
if _, ok := err.(bencode.ErrUnusedTrailingBytes); ok {
err = nil
} else if err != nil {
err = fmt.Errorf("error decoding %q: %s", buf.Bytes(), err)
2015-03-26 06:20:31 +00:00
return
}
if trackerResponse.FailureReason != "" {
2018-08-13 10:28:02 +00:00
err = fmt.Errorf("tracker gave failure reason: %q", trackerResponse.FailureReason)
2015-03-26 06:20:31 +00:00
return
}
vars.Add("successful http announces", 1)
2015-03-26 06:20:31 +00:00
ret.Interval = trackerResponse.Interval
ret.Leechers = trackerResponse.Incomplete
ret.Seeders = trackerResponse.Complete
if len(trackerResponse.Peers) != 0 {
vars.Add("http responses with nonempty peers key", 1)
}
ret.Peers = trackerResponse.Peers
if len(trackerResponse.Peers6) != 0 {
vars.Add("http responses with nonempty peers6 key", 1)
}
for _, na := range trackerResponse.Peers6 {
ret.Peers = append(ret.Peers, Peer{
IP: na.IP,
Port: na.Port,
})
}
2015-03-26 06:20:31 +00:00
return
}