// Package http implements a BitTorrent frontend via the HTTP protocol as // described in BEP 3 and BEP 23. package http import ( "context" "crypto/tls" "net" "net/http" "time" log "github.com/Sirupsen/logrus" "github.com/julienschmidt/httprouter" "github.com/prometheus/client_golang/prometheus" "github.com/chihaya/chihaya/bittorrent" "github.com/chihaya/chihaya/frontend" ) func init() { prometheus.MustRegister(promResponseDurationMilliseconds) } // ErrInvalidIP indicates an invalid IP. var ErrInvalidIP = bittorrent.ClientError("invalid IP") var promResponseDurationMilliseconds = prometheus.NewHistogramVec( prometheus.HistogramOpts{ Name: "chihaya_http_response_duration_milliseconds", Help: "The duration of time it takes to receive and write a response to an API request", Buckets: prometheus.ExponentialBuckets(9.375, 2, 10), }, []string{"action", "address_family", "error"}, ) // recordResponseDuration records the duration of time to respond to a Request // in milliseconds . func recordResponseDuration(action string, af *bittorrent.AddressFamily, err error, duration time.Duration) { var errString string if err != nil { if _, ok := err.(bittorrent.ClientError); ok { errString = err.Error() } else { errString = "internal error" } } var afString string if af == nil { afString = "Unknown" } else if *af == bittorrent.IPv4 { afString = "IPv4" } else if *af == bittorrent.IPv6 { afString = "IPv6" } promResponseDurationMilliseconds. WithLabelValues(action, afString, errString). Observe(float64(duration.Nanoseconds()) / float64(time.Millisecond)) } // Config represents all of the configurable options for an HTTP BitTorrent // Frontend. type Config struct { Addr string `yaml:"addr"` ReadTimeout time.Duration `yaml:"read_timeout"` WriteTimeout time.Duration `yaml:"write_timeout"` AllowIPSpoofing bool `yaml:"allow_ip_spoofing"` RealIPHeader string `yaml:"real_ip_header"` TLSCertPath string `yaml:"tls_cert_path"` TLSKeyPath string `yaml:"tls_key_path"` EnableRequestTiming bool `yaml:"enable_request_timing"` } // LogFields renders the current config as a set of Logrus fields. func (cfg Config) LogFields() log.Fields { return log.Fields{ "addr": cfg.Addr, "readTimeout": cfg.ReadTimeout, "writeTimeout": cfg.WriteTimeout, "allowIPSpoofing": cfg.AllowIPSpoofing, "realIPHeader": cfg.RealIPHeader, "tlsCertPath": cfg.TLSCertPath, "tlsKeyPath": cfg.TLSKeyPath, "enableRequestTiming": cfg.EnableRequestTiming, } } // Frontend represents the state of an HTTP BitTorrent Frontend. type Frontend struct { srv *http.Server tlsCfg *tls.Config logic frontend.TrackerLogic Config } // NewFrontend creates a new instance of an HTTP Frontend that asynchronously // serves requests. func NewFrontend(logic frontend.TrackerLogic, cfg Config) (*Frontend, error) { f := &Frontend{ logic: logic, Config: cfg, } // If TLS is enabled, create a key pair. if cfg.TLSCertPath != "" && cfg.TLSKeyPath != "" { var err error f.tlsCfg = &tls.Config{ Certificates: make([]tls.Certificate, 1), } f.tlsCfg.Certificates[0], err = tls.LoadX509KeyPair(cfg.TLSCertPath, cfg.TLSKeyPath) if err != nil { return nil, err } } go func() { if err := f.listenAndServe(); err != nil { log.Fatal("failed while serving http: " + err.Error()) } }() return f, nil } // Stop provides a thread-safe way to shutdown a currently running Frontend. func (f *Frontend) Stop() <-chan error { c := make(chan error) go func() { if err := f.srv.Shutdown(context.Background()); err != nil { c <- err } else { close(c) } }() return c } func (f *Frontend) handler() http.Handler { router := httprouter.New() router.GET("/announce", f.announceRoute) router.GET("/scrape", f.scrapeRoute) return router } // listenAndServe blocks while listening and serving HTTP BitTorrent requests // until Stop() is called or an error is returned. func (f *Frontend) listenAndServe() error { f.srv = &http.Server{ Addr: f.Addr, TLSConfig: f.tlsCfg, Handler: f.handler(), ReadTimeout: f.ReadTimeout, WriteTimeout: f.WriteTimeout, } // Disable KeepAlives. f.srv.SetKeepAlivesEnabled(false) // Start the HTTP server. if err := f.srv.ListenAndServe(); err != http.ErrServerClosed { return err } return nil } // announceRoute parses and responds to an Announce. func (f *Frontend) announceRoute(w http.ResponseWriter, r *http.Request, _ httprouter.Params) { var err error var start time.Time if f.EnableRequestTiming { start = time.Now() } var af *bittorrent.AddressFamily defer func() { if f.EnableRequestTiming { recordResponseDuration("announce", af, err, time.Since(start)) } else { recordResponseDuration("announce", af, err, time.Duration(0)) } }() req, err := ParseAnnounce(r, f.RealIPHeader, f.AllowIPSpoofing) if err != nil { WriteError(w, err) return } af = new(bittorrent.AddressFamily) *af = req.IP.AddressFamily resp, err := f.logic.HandleAnnounce(context.Background(), req) if err != nil { WriteError(w, err) return } err = WriteAnnounceResponse(w, resp) if err != nil { WriteError(w, err) return } go f.logic.AfterAnnounce(context.Background(), req, resp) } // scrapeRoute parses and responds to a Scrape. func (f *Frontend) scrapeRoute(w http.ResponseWriter, r *http.Request, _ httprouter.Params) { var err error var start time.Time if f.EnableRequestTiming { start = time.Now() } var af *bittorrent.AddressFamily defer func() { if f.EnableRequestTiming { recordResponseDuration("scrape", af, err, time.Since(start)) } else { recordResponseDuration("scrape", af, err, time.Duration(0)) } }() req, err := ParseScrape(r) if err != nil { WriteError(w, err) return } host, _, err := net.SplitHostPort(r.RemoteAddr) if err != nil { log.Errorln("http: unable to determine remote address for scrape:", err) WriteError(w, err) return } reqIP := net.ParseIP(host) if reqIP.To4() != nil { req.AddressFamily = bittorrent.IPv4 } else if len(reqIP) == net.IPv6len { // implies reqIP.To4() == nil req.AddressFamily = bittorrent.IPv6 } else { log.Errorln("http: invalid IP: neither v4 nor v6, RemoteAddr was", r.RemoteAddr) WriteError(w, ErrInvalidIP) return } af = new(bittorrent.AddressFamily) *af = req.AddressFamily resp, err := f.logic.HandleScrape(context.Background(), req) if err != nil { WriteError(w, err) return } err = WriteScrapeResponse(w, resp) if err != nil { WriteError(w, err) return } go f.logic.AfterScrape(context.Background(), req, resp) }