tracker/frontend/udp/frontend.go

246 lines
5.9 KiB
Go
Raw Normal View History

2016-08-04 20:08:26 +02:00
// Package udp implements a BitTorrent tracker via the UDP protocol as
// described in BEP 15.
package udp
import (
"bytes"
2016-08-17 04:32:15 +02:00
"context"
"encoding/binary"
"net"
2016-08-05 07:47:04 +02:00
"sync"
"time"
2016-08-05 07:47:04 +02:00
"github.com/prometheus/client_golang/prometheus"
2016-08-17 03:42:08 +02:00
"github.com/chihaya/chihaya/bittorrent"
"github.com/chihaya/chihaya/frontend"
"github.com/chihaya/chihaya/frontend/udp/bytepool"
"github.com/chihaya/chihaya/middleware"
)
2016-08-05 09:35:17 +02:00
func init() {
prometheus.MustRegister(promResponseDurationMilliseconds)
recordResponseDuration("action", nil, time.Second)
}
var promResponseDurationMilliseconds = prometheus.NewHistogramVec(
prometheus.HistogramOpts{
2016-08-17 03:42:08 +02:00
Name: "chihaya_udp_response_duration_milliseconds",
Help: "The duration of time it takes to receive and write a response to an API request",
Buckets: prometheus.ExponentialBuckets(9.375, 2, 10),
},
[]string{"action", "error"},
)
2016-08-04 20:48:32 +02:00
// recordResponseDuration records the duration of time to respond to a UDP
// Request in milliseconds .
2016-08-05 07:47:04 +02:00
func recordResponseDuration(action string, err error, duration time.Duration) {
var errString string
if err != nil {
errString = err.Error()
}
2016-08-04 20:48:32 +02:00
promResponseDurationMilliseconds.
2016-08-05 07:47:04 +02:00
WithLabelValues(action, errString).
2016-08-04 20:48:32 +02:00
Observe(float64(duration.Nanoseconds()) / float64(time.Millisecond))
}
// Config represents all of the configurable options for a UDP BitTorrent
// Tracker.
type Config struct {
Addr string `yaml:"addr"`
PrivateKey string `yaml:"private_key"`
MaxClockSkew time.Duration `yaml:"max_clock_skew"`
AllowIPSpoofing bool `yaml:"allow_ip_spoofing"`
}
2016-08-07 04:41:33 +02:00
// Frontend holds the state of a UDP BitTorrent Frontend.
type Frontend struct {
2016-08-05 07:47:04 +02:00
socket *net.UDPConn
closing chan struct{}
wg sync.WaitGroup
2016-08-10 02:08:15 +02:00
logic frontend.TrackerLogic
Config
}
2016-08-07 04:41:33 +02:00
// NewFrontend allocates a new instance of a Frontend.
2016-08-10 02:08:15 +02:00
func NewFrontend(logic frontend.TrackerLogic, cfg Config) *Frontend {
2016-08-07 04:41:33 +02:00
return &Frontend{
closing: make(chan struct{}),
2016-08-10 02:08:15 +02:00
logic: logic,
Config: cfg,
}
}
2016-08-07 04:41:33 +02:00
// Stop provides a thread-safe way to shutdown a currently running Frontend.
func (t *Frontend) Stop() {
2016-08-04 06:18:58 +02:00
close(t.closing)
2016-08-05 07:47:04 +02:00
t.socket.SetReadDeadline(time.Now())
2016-08-04 06:18:58 +02:00
t.wg.Wait()
}
2016-08-04 20:08:26 +02:00
// ListenAndServe listens on the UDP network address t.Addr and blocks serving
// BitTorrent requests until t.Stop() is called or an error is returned.
2016-08-07 04:41:33 +02:00
func (t *Frontend) ListenAndServe() error {
2016-08-04 06:18:58 +02:00
udpAddr, err := net.ResolveUDPAddr("udp", t.Addr)
if err != nil {
return err
}
2016-08-05 07:47:04 +02:00
t.socket, err = net.ListenUDP("udp", udpAddr)
if err != nil {
return err
}
2016-08-05 07:47:04 +02:00
defer t.socket.Close()
2016-09-05 18:30:03 +02:00
pool := bytepool.New(2048)
for {
// Check to see if we need to shutdown.
select {
2016-08-04 06:18:58 +02:00
case <-t.closing:
return nil
default:
}
// Read a UDP packet into a reusable buffer.
buffer := pool.Get()
2016-08-05 07:47:04 +02:00
t.socket.SetReadDeadline(time.Now().Add(time.Second))
n, addr, err := t.socket.ReadFromUDP(buffer)
if err != nil {
pool.Put(buffer)
if netErr, ok := err.(net.Error); ok && netErr.Temporary() {
// A temporary failure is not fatal; just pretend it never happened.
continue
}
return err
}
// We got nothin'
if n == 0 {
pool.Put(buffer)
continue
}
2016-08-04 06:18:58 +02:00
t.wg.Add(1)
2016-08-05 07:47:04 +02:00
go func() {
2016-08-04 06:18:58 +02:00
defer t.wg.Done()
defer pool.Put(buffer)
2016-08-04 20:48:32 +02:00
// Handle the request.
start := time.Now()
2016-08-18 01:04:53 +02:00
action, err := t.handleRequest(
2016-08-05 07:47:04 +02:00
Request{buffer[:n], addr.IP},
ResponseWriter{t.socket, addr},
)
recordResponseDuration(action, err, time.Since(start))
2016-08-04 20:48:32 +02:00
}()
}
}
2016-08-04 20:08:26 +02:00
// Request represents a UDP payload received by a Tracker.
type Request struct {
Packet []byte
IP net.IP
}
2016-08-04 20:08:26 +02:00
// ResponseWriter implements the ability to respond to a Request via the
// io.Writer interface.
type ResponseWriter struct {
2016-08-05 07:47:04 +02:00
socket *net.UDPConn
addr *net.UDPAddr
}
2016-08-04 20:08:26 +02:00
// Write implements the io.Writer interface for a ResponseWriter.
2016-08-05 07:47:04 +02:00
func (w ResponseWriter) Write(b []byte) (int, error) {
w.socket.WriteToUDP(b, w.addr)
return len(b), nil
}
2016-08-04 20:08:26 +02:00
// handleRequest parses and responds to a UDP Request.
2016-08-18 01:04:53 +02:00
func (t *Frontend) handleRequest(r Request, w ResponseWriter) (actionName string, err error) {
2016-08-05 07:47:04 +02:00
if len(r.Packet) < 16 {
// Malformed, no client packets are less than 16 bytes.
// We explicitly return nothing in case this is a DoS attempt.
err = errMalformedPacket
return
}
// Parse the headers of the UDP packet.
2016-08-05 07:47:04 +02:00
connID := r.Packet[0:8]
actionID := binary.BigEndian.Uint32(r.Packet[8:12])
txID := r.Packet[12:16]
// If this isn't requesting a new connection ID and the connection ID is
// invalid, then fail.
2016-08-05 07:47:04 +02:00
if actionID != connectActionID && !ValidConnectionID(connID, r.IP, time.Now(), t.MaxClockSkew, t.PrivateKey) {
err = errBadConnectionID
WriteError(w, txID, err)
return
}
// Handle the requested action.
switch actionID {
case connectActionID:
actionName = "connect"
if !bytes.Equal(connID, initialConnectionID) {
err = errMalformedPacket
return
}
2016-08-04 06:18:58 +02:00
WriteConnectionID(w, txID, NewConnectionID(r.IP, time.Now(), t.PrivateKey))
case announceActionID, announceV6ActionID:
actionName = "announce"
var req *bittorrent.AnnounceRequest
req, err = ParseAnnounce(r, t.AllowIPSpoofing, actionID == announceV6ActionID)
if err != nil {
WriteError(w, txID, err)
return
}
var resp *bittorrent.AnnounceResponse
2016-09-05 18:25:11 +02:00
resp, err = t.logic.HandleAnnounce(context.Background(), req)
if err != nil {
WriteError(w, txID, err)
return
}
WriteAnnounce(w, txID, resp, actionID == announceV6ActionID)
2016-09-05 18:25:11 +02:00
go t.logic.AfterAnnounce(context.Background(), req, resp)
case scrapeActionID:
actionName = "scrape"
var req *bittorrent.ScrapeRequest
req, err = ParseScrape(r)
if err != nil {
WriteError(w, txID, err)
return
}
ctx := context.WithValue(context.Background(), middleware.ScrapeIsIPv6Key, len(r.IP) == net.IPv6len)
var resp *bittorrent.ScrapeResponse
resp, err = t.logic.HandleScrape(ctx, req)
if err != nil {
WriteError(w, txID, err)
return
}
WriteScrape(w, txID, resp)
2016-09-05 18:25:11 +02:00
go t.logic.AfterScrape(context.Background(), req, resp)
default:
err = errUnknownAction
WriteError(w, txID, err)
}
return
}