// Package http implements a BitTorrent frontend via the HTTP protocol as // described in BEP 3 and BEP 23. package http import ( "context" "net" "net/http" "time" log "github.com/Sirupsen/logrus" "github.com/julienschmidt/httprouter" "github.com/prometheus/client_golang/prometheus" "github.com/tylerb/graceful" "github.com/chihaya/chihaya/frontend" "github.com/chihaya/chihaya/middleware" ) func init() { prometheus.MustRegister(promResponseDurationMilliseconds) recordResponseDuration("action", nil, time.Second) } var promResponseDurationMilliseconds = prometheus.NewHistogramVec( prometheus.HistogramOpts{ Name: "chihaya_http_response_duration_milliseconds", Help: "The duration of time it takes to receive and write a response to an API request", Buckets: prometheus.ExponentialBuckets(9.375, 2, 10), }, []string{"action", "error"}, ) // recordResponseDuration records the duration of time to respond to a Request // in milliseconds . func recordResponseDuration(action string, err error, duration time.Duration) { var errString string if err != nil { errString = err.Error() } promResponseDurationMilliseconds. WithLabelValues(action, errString). Observe(float64(duration.Nanoseconds()) / float64(time.Millisecond)) } // Config represents all of the configurable options for an HTTP BitTorrent // Frontend. type Config struct { Addr string `yaml:"addr"` ReadTimeout time.Duration `yaml:"read_timeout"` WriteTimeout time.Duration `yaml:"write_timeout"` RequestTimeout time.Duration `yaml:"request_timeout"` AllowIPSpoofing bool `yaml:"allow_ip_spoofing"` RealIPHeader string `yaml:"real_ip_header"` } // Frontend holds the state of an HTTP BitTorrent Frontend. type Frontend struct { grace *graceful.Server logic frontend.TrackerLogic Config } // NewFrontend allocates a new instance of a Frontend. func NewFrontend(logic frontend.TrackerLogic, cfg Config) *Frontend { return &Frontend{ logic: logic, Config: cfg, } } // Stop provides a thread-safe way to shutdown a currently running Tracker. func (t *Frontend) Stop() { t.grace.Stop(t.grace.Timeout) <-t.grace.StopChan() } func (t *Frontend) handler() http.Handler { router := httprouter.New() router.GET("/announce", t.announceRoute) router.GET("/scrape", t.scrapeRoute) return router } // ListenAndServe listens on the TCP network address t.Addr and blocks serving // BitTorrent requests until t.Stop() is called or an error is returned. func (t *Frontend) ListenAndServe() error { t.grace = &graceful.Server{ Server: &http.Server{ Addr: t.Addr, Handler: t.handler(), ReadTimeout: t.ReadTimeout, WriteTimeout: t.WriteTimeout, }, Timeout: t.RequestTimeout, NoSignalHandling: true, ConnState: func(conn net.Conn, state http.ConnState) { switch state { case http.StateNew: //stats.RecordEvent(stats.AcceptedConnection) case http.StateClosed: //stats.RecordEvent(stats.ClosedConnection) case http.StateHijacked: panic("http: connection impossibly hijacked") // Ignore the following cases. case http.StateActive, http.StateIdle: default: panic("http: connection transitioned to unknown state") } }, } t.grace.SetKeepAlivesEnabled(false) if err := t.grace.ListenAndServe(); err != nil { if opErr, ok := err.(*net.OpError); !ok || (ok && opErr.Op != "accept") { panic("http: failed to gracefully run HTTP server: " + err.Error()) } } return nil } // announceRoute parses and responds to an Announce by using t.TrackerLogic. func (t *Frontend) announceRoute(w http.ResponseWriter, r *http.Request, _ httprouter.Params) { var err error start := time.Now() defer recordResponseDuration("announce", err, time.Since(start)) req, err := ParseAnnounce(r, t.RealIPHeader, t.AllowIPSpoofing) if err != nil { WriteError(w, err) return } resp, err := t.logic.HandleAnnounce(context.Background(), req) if err != nil { WriteError(w, err) return } err = WriteAnnounceResponse(w, resp) if err != nil { WriteError(w, err) return } go t.logic.AfterAnnounce(context.Background(), req, resp) } // scrapeRoute parses and responds to a Scrape by using t.TrackerLogic. func (t *Frontend) scrapeRoute(w http.ResponseWriter, r *http.Request, _ httprouter.Params) { var err error start := time.Now() defer recordResponseDuration("scrape", err, time.Since(start)) req, err := ParseScrape(r) if err != nil { WriteError(w, err) return } host, _, err := net.SplitHostPort(r.RemoteAddr) if err != nil { log.Errorln("http: unable to determine remote address for scrape:", err) WriteError(w, err) return } ip := net.ParseIP(host) ctx := context.WithValue(context.Background(), middleware.ScrapeIsIPv6Key, len(ip) == net.IPv6len) resp, err := t.logic.HandleScrape(ctx, req) if err != nil { WriteError(w, err) return } err = WriteScrapeResponse(w, resp) if err != nil { WriteError(w, err) return } go t.logic.AfterScrape(context.Background(), req, resp) }