tracker/frontend/http/frontend.go

342 lines
8.7 KiB
Go
Raw Normal View History

2016-08-07 04:41:33 +02:00
// Package http implements a BitTorrent frontend via the HTTP protocol as
2016-08-04 20:08:26 +02:00
// described in BEP 3 and BEP 23.
package http
2016-08-05 07:47:04 +02:00
import (
2016-08-17 04:32:15 +02:00
"context"
"crypto/tls"
"errors"
2016-08-05 07:47:04 +02:00
"net"
"net/http"
"time"
"github.com/julienschmidt/httprouter"
2016-11-28 20:55:04 +01:00
"github.com/chihaya/chihaya/bittorrent"
2016-08-17 03:42:08 +02:00
"github.com/chihaya/chihaya/frontend"
2017-06-20 14:58:44 +02:00
"github.com/chihaya/chihaya/pkg/log"
"github.com/chihaya/chihaya/pkg/stop"
2016-08-05 07:47:04 +02:00
)
2016-08-04 20:08:26 +02:00
// Config represents all of the configurable options for an HTTP BitTorrent
2016-08-07 04:41:33 +02:00
// Frontend.
type Config struct {
2017-05-12 13:12:35 +02:00
Addr string `yaml:"addr"`
HTTPSAddr string `yaml:"https_addr"`
2017-05-12 13:12:35 +02:00
ReadTimeout time.Duration `yaml:"read_timeout"`
WriteTimeout time.Duration `yaml:"write_timeout"`
IdleTimeout time.Duration `yaml:"idle_timeout"`
EnableKeepAlive bool `yaml:"enable_keepalive"`
2017-05-12 13:12:35 +02:00
TLSCertPath string `yaml:"tls_cert_path"`
TLSKeyPath string `yaml:"tls_key_path"`
2017-12-05 10:38:50 +01:00
EnableLegacyPHPURLs bool `yaml:"enable_legacy_php_urls"`
2017-05-12 13:12:35 +02:00
EnableRequestTiming bool `yaml:"enable_request_timing"`
ParseOptions `yaml:",inline"`
}
2017-05-07 00:48:44 +02:00
// LogFields renders the current config as a set of Logrus fields.
func (cfg Config) LogFields() log.Fields {
return log.Fields{
2017-05-12 13:12:35 +02:00
"addr": cfg.Addr,
"httpsAddr": cfg.HTTPSAddr,
2017-05-12 13:12:35 +02:00
"readTimeout": cfg.ReadTimeout,
"writeTimeout": cfg.WriteTimeout,
"idleTimeout": cfg.IdleTimeout,
"enableKeepAlive": cfg.EnableKeepAlive,
2017-05-12 13:12:35 +02:00
"tlsCertPath": cfg.TLSCertPath,
"tlsKeyPath": cfg.TLSKeyPath,
2017-12-05 10:38:50 +01:00
"enableLegacyPHPURLs": cfg.EnableLegacyPHPURLs,
2017-05-12 13:12:35 +02:00
"enableRequestTiming": cfg.EnableRequestTiming,
"allowIPSpoofing": cfg.AllowIPSpoofing,
"realIPHeader": cfg.RealIPHeader,
"maxNumWant": cfg.MaxNumWant,
"defaultNumWant": cfg.DefaultNumWant,
"maxScrapeInfoHashes": cfg.MaxScrapeInfoHashes,
2017-05-07 00:48:44 +02:00
}
}
// Default config constants.
const (
defaultReadTimeout = 2 * time.Second
defaultWriteTimeout = 2 * time.Second
defaultIdleTimeout = 30 * time.Second
)
// Validate sanity checks values set in a config and returns a new config with
// default values replacing anything that is invalid.
//
// This function warns to the logger when a value is changed.
func (cfg Config) Validate() Config {
validcfg := cfg
if cfg.ReadTimeout <= 0 {
validcfg.ReadTimeout = defaultReadTimeout
log.Warn("falling back to default configuration", log.Fields{
"name": "http.ReadTimeout",
"provided": cfg.ReadTimeout,
"default": validcfg.ReadTimeout,
})
}
if cfg.WriteTimeout <= 0 {
validcfg.WriteTimeout = defaultWriteTimeout
log.Warn("falling back to default configuration", log.Fields{
"name": "http.WriteTimeout",
"provided": cfg.WriteTimeout,
"default": validcfg.WriteTimeout,
})
}
if cfg.IdleTimeout <= 0 {
validcfg.IdleTimeout = defaultIdleTimeout
if cfg.EnableKeepAlive {
// If keepalive is disabled, this configuration isn't used anyway.
log.Warn("falling back to default configuration", log.Fields{
"name": "http.IdleTimeout",
"provided": cfg.IdleTimeout,
"default": validcfg.IdleTimeout,
})
}
}
return validcfg
}
// Frontend represents the state of an HTTP BitTorrent Frontend.
2016-08-07 04:41:33 +02:00
type Frontend struct {
srv *http.Server
tlsSrv *http.Server
tlsCfg *tls.Config
2016-08-10 02:08:15 +02:00
logic frontend.TrackerLogic
Config
}
// NewFrontend creates a new instance of an HTTP Frontend that asynchronously
// serves requests.
func NewFrontend(logic frontend.TrackerLogic, provided Config) (*Frontend, error) {
cfg := provided.Validate()
f := &Frontend{
2016-08-10 02:08:15 +02:00
logic: logic,
Config: cfg,
}
if cfg.Addr == "" && cfg.HTTPSAddr == "" {
return nil, errors.New("must specify addr or https_addr or both")
}
// If TLS is enabled, create a key pair.
if cfg.TLSCertPath != "" && cfg.TLSKeyPath != "" {
var err error
f.tlsCfg = &tls.Config{
Certificates: make([]tls.Certificate, 1),
}
f.tlsCfg.Certificates[0], err = tls.LoadX509KeyPair(cfg.TLSCertPath, cfg.TLSKeyPath)
if err != nil {
return nil, err
}
}
if cfg.HTTPSAddr != "" && f.tlsCfg == nil {
return nil, errors.New("must specify tls_cert_path and tls_key_path when using https_addr")
}
if cfg.HTTPSAddr == "" && f.tlsCfg != nil {
return nil, errors.New("must specify https_addr when using tls_cert_path and tls_key_path")
}
if cfg.Addr != "" {
go func() {
if err := f.listenAndServe(); err != nil {
log.Fatal("failed while serving http", log.Err(err))
}
}()
}
if cfg.HTTPSAddr != "" {
go func() {
if err := f.listenAndServeTLS(); err != nil {
log.Fatal("failed while serving https", log.Err(err))
}
}()
}
return f, nil
}
2016-11-27 10:56:51 +01:00
// Stop provides a thread-safe way to shutdown a currently running Frontend.
func (f *Frontend) Stop() stop.Result {
stopGroup := stop.NewGroup()
if f.srv != nil {
stopGroup.AddFunc(f.makeStopFunc(f.srv))
}
if f.tlsSrv != nil {
stopGroup.AddFunc(f.makeStopFunc(f.tlsSrv))
}
return stopGroup.Stop()
}
func (f *Frontend) makeStopFunc(stopSrv *http.Server) stop.Func {
return func() stop.Result {
c := make(stop.Channel)
go func() {
c.Done(stopSrv.Shutdown(context.Background()))
}()
return c.Result()
}
}
func (f *Frontend) handler() http.Handler {
router := httprouter.New()
router.GET("/announce", f.announceRoute)
router.GET("/scrape", f.scrapeRoute)
2017-12-05 10:38:50 +01:00
if f.EnableLegacyPHPURLs {
log.Info("http: enabling legacy PHP URLs")
router.GET("/announce.php", f.announceRoute)
router.GET("/scrape.php", f.scrapeRoute)
}
2016-08-05 07:47:04 +02:00
return router
}
// listenAndServe blocks while listening and serving non-TLS HTTP BitTorrent
// requests until Stop() is called or an error is returned.
func (f *Frontend) listenAndServe() error {
f.srv = &http.Server{
Addr: f.Addr,
Handler: f.handler(),
ReadTimeout: f.ReadTimeout,
WriteTimeout: f.WriteTimeout,
IdleTimeout: f.IdleTimeout,
}
f.srv.SetKeepAlivesEnabled(f.EnableKeepAlive)
// Start the HTTP server.
if err := f.srv.ListenAndServe(); err != http.ErrServerClosed {
return err
}
return nil
}
// listenAndServeTLS blocks while listening and serving TLS HTTP BitTorrent
// requests until Stop() is called or an error is returned.
func (f *Frontend) listenAndServeTLS() error {
f.tlsSrv = &http.Server{
Addr: f.HTTPSAddr,
TLSConfig: f.tlsCfg,
Handler: f.handler(),
ReadTimeout: f.ReadTimeout,
WriteTimeout: f.WriteTimeout,
}
2016-08-05 07:47:04 +02:00
// Disable KeepAlives.
f.tlsSrv.SetKeepAlivesEnabled(f.EnableKeepAlive)
// Start the HTTP server.
if err := f.tlsSrv.ListenAndServeTLS("", ""); err != http.ErrServerClosed {
return err
}
2016-08-05 07:47:04 +02:00
return nil
}
// announceRoute parses and responds to an Announce.
func (f *Frontend) announceRoute(w http.ResponseWriter, r *http.Request, _ httprouter.Params) {
2016-08-05 07:47:04 +02:00
var err error
2017-05-12 13:12:35 +02:00
var start time.Time
if f.EnableRequestTiming {
start = time.Now()
}
2017-02-01 02:58:08 +01:00
var af *bittorrent.AddressFamily
2017-05-12 13:12:35 +02:00
defer func() {
if f.EnableRequestTiming {
recordResponseDuration("announce", af, err, time.Since(start))
} else {
recordResponseDuration("announce", af, err, time.Duration(0))
}
}()
2016-08-04 20:48:32 +02:00
req, err := ParseAnnounce(r, f.ParseOptions)
if err != nil {
WriteError(w, err)
return
}
af = new(bittorrent.AddressFamily)
2017-02-01 02:58:08 +01:00
*af = req.IP.AddressFamily
ctx, resp, err := f.logic.HandleAnnounce(context.Background(), req)
if err != nil {
WriteError(w, err)
return
}
err = WriteAnnounceResponse(w, resp)
if err != nil {
WriteError(w, err)
return
}
go f.logic.AfterAnnounce(ctx, req, resp)
}
// scrapeRoute parses and responds to a Scrape.
func (f *Frontend) scrapeRoute(w http.ResponseWriter, r *http.Request, _ httprouter.Params) {
2016-08-05 07:47:04 +02:00
var err error
2017-05-12 13:12:35 +02:00
var start time.Time
if f.EnableRequestTiming {
start = time.Now()
}
2017-02-01 02:58:08 +01:00
var af *bittorrent.AddressFamily
2017-05-12 13:12:35 +02:00
defer func() {
if f.EnableRequestTiming {
recordResponseDuration("scrape", af, err, time.Since(start))
} else {
recordResponseDuration("scrape", af, err, time.Duration(0))
}
}()
2016-08-04 20:48:32 +02:00
req, err := ParseScrape(r, f.ParseOptions)
if err != nil {
WriteError(w, err)
return
}
host, _, err := net.SplitHostPort(r.RemoteAddr)
if err != nil {
2017-06-20 14:58:44 +02:00
log.Error("http: unable to determine remote address for scrape", log.Err(err))
WriteError(w, err)
return
}
2016-11-28 20:55:04 +01:00
reqIP := net.ParseIP(host)
if reqIP.To4() != nil {
req.AddressFamily = bittorrent.IPv4
2016-11-28 20:55:04 +01:00
} else if len(reqIP) == net.IPv6len { // implies reqIP.To4() == nil
req.AddressFamily = bittorrent.IPv6
2016-11-28 20:55:04 +01:00
} else {
2017-06-20 14:58:44 +02:00
log.Error("http: invalid IP: neither v4 nor v6", log.Fields{"RemoteAddr": r.RemoteAddr})
WriteError(w, bittorrent.ErrInvalidIP)
2016-11-28 20:55:04 +01:00
return
}
af = new(bittorrent.AddressFamily)
2017-02-01 02:58:08 +01:00
*af = req.AddressFamily
2016-11-28 20:55:04 +01:00
ctx, resp, err := f.logic.HandleScrape(context.Background(), req)
if err != nil {
WriteError(w, err)
return
}
err = WriteScrapeResponse(w, resp)
if err != nil {
WriteError(w, err)
return
}
go f.logic.AfterScrape(ctx, req, resp)
}