172 lines
3.9 KiB
Go
172 lines
3.9 KiB
Go
// Copyright 2015 The Chihaya Authors. All rights reserved.
|
|
// Use of this source code is governed by the BSD 2-Clause license,
|
|
// which can be found in the LICENSE file.
|
|
|
|
package udp
|
|
|
|
import (
|
|
"bytes"
|
|
"encoding/binary"
|
|
"net"
|
|
|
|
"github.com/chihaya/chihaya/stats"
|
|
"github.com/chihaya/chihaya/tracker/models"
|
|
)
|
|
|
|
// initialConnectionID is the magic initial connection ID specified by BEP 15.
|
|
var initialConnectionID = []byte{0, 0, 0x04, 0x17, 0x27, 0x10, 0x19, 0x80}
|
|
|
|
// eventIDs maps IDs to event names.
|
|
var eventIDs = []string{"", "completed", "started", "stopped"}
|
|
|
|
var (
|
|
errMalformedPacket = models.ProtocolError("malformed packet")
|
|
errMalformedIP = models.ProtocolError("malformed IP address")
|
|
errMalformedEvent = models.ProtocolError("malformed event ID")
|
|
errBadConnectionID = models.ProtocolError("bad connection ID")
|
|
)
|
|
|
|
// handleTorrentError writes err to w if err is a models.ClientError.
|
|
func handleTorrentError(err error, w *Writer) {
|
|
if err == nil {
|
|
return
|
|
}
|
|
|
|
if _, ok := err.(models.ClientError); ok {
|
|
w.WriteError(err)
|
|
stats.RecordEvent(stats.ClientError)
|
|
}
|
|
}
|
|
|
|
// handlePacket decodes and processes one UDP request, returning the response.
|
|
func (s *Server) handlePacket(packet []byte, addr *net.UDPAddr) (response []byte, actionName string) {
|
|
if len(packet) < 16 {
|
|
return // Malformed, no client packets are less than 16 bytes.
|
|
}
|
|
|
|
connID := packet[0:8]
|
|
action := binary.BigEndian.Uint32(packet[8:12])
|
|
transactionID := packet[12:16]
|
|
|
|
writer := &Writer{
|
|
buf: new(bytes.Buffer),
|
|
|
|
connectionID: connID,
|
|
transactionID: transactionID,
|
|
}
|
|
|
|
defer func() {
|
|
if writer.buf.Len() > 0 {
|
|
response = writer.buf.Bytes()
|
|
}
|
|
}()
|
|
|
|
if action != 0 && !s.connIDGen.Matches(connID, addr.IP) {
|
|
writer.WriteError(errBadConnectionID)
|
|
return
|
|
}
|
|
|
|
switch action {
|
|
case 0:
|
|
actionName = "connect"
|
|
if !bytes.Equal(connID, initialConnectionID) {
|
|
return // Malformed packet.
|
|
}
|
|
|
|
writer.writeHeader(0)
|
|
writer.buf.Write(s.connIDGen.Generate(addr.IP))
|
|
|
|
case 1:
|
|
actionName = "announce"
|
|
ann, err := s.newAnnounce(packet, addr.IP)
|
|
|
|
if err == nil {
|
|
err = s.tracker.HandleAnnounce(ann, writer)
|
|
}
|
|
|
|
handleTorrentError(err, writer)
|
|
|
|
case 2:
|
|
actionName = "scrape"
|
|
scrape, err := s.newScrape(packet)
|
|
|
|
if err == nil {
|
|
err = s.tracker.HandleScrape(scrape, writer)
|
|
}
|
|
|
|
handleTorrentError(err, writer)
|
|
}
|
|
|
|
return
|
|
}
|
|
|
|
// newAnnounce decodes one announce packet, returning a models.Announce.
|
|
func (s *Server) newAnnounce(packet []byte, ip net.IP) (*models.Announce, error) {
|
|
if len(packet) < 98 {
|
|
return nil, errMalformedPacket
|
|
}
|
|
|
|
infohash := packet[16:36]
|
|
peerID := packet[36:56]
|
|
|
|
downloaded := binary.BigEndian.Uint64(packet[56:64])
|
|
left := binary.BigEndian.Uint64(packet[64:72])
|
|
uploaded := binary.BigEndian.Uint64(packet[72:80])
|
|
|
|
eventID := packet[83]
|
|
if eventID > 3 {
|
|
return nil, errMalformedEvent
|
|
}
|
|
|
|
ipbuf := packet[84:88]
|
|
if s.config.AllowIPSpoofing && !bytes.Equal(ipbuf, []byte{0, 0, 0, 0}) {
|
|
ip = net.ParseIP(string(ipbuf))
|
|
}
|
|
|
|
if ip == nil {
|
|
return nil, errMalformedIP
|
|
} else if ipv4 := ip.To4(); ipv4 != nil {
|
|
ip = ipv4
|
|
}
|
|
|
|
numWant := binary.BigEndian.Uint32(packet[92:96])
|
|
port := binary.BigEndian.Uint16(packet[96:98])
|
|
|
|
return &models.Announce{
|
|
Config: s.config,
|
|
Downloaded: downloaded,
|
|
Event: eventIDs[eventID],
|
|
IPv4: ip,
|
|
Infohash: string(infohash),
|
|
Left: left,
|
|
NumWant: int(numWant),
|
|
PeerID: string(peerID),
|
|
Port: port,
|
|
Uploaded: uploaded,
|
|
}, nil
|
|
}
|
|
|
|
// newScrape decodes one announce packet, returning a models.Scrape.
|
|
func (s *Server) newScrape(packet []byte) (*models.Scrape, error) {
|
|
if len(packet) < 36 {
|
|
return nil, errMalformedPacket
|
|
}
|
|
|
|
var infohashes []string
|
|
packet = packet[16:]
|
|
|
|
if len(packet)%20 != 0 {
|
|
return nil, errMalformedPacket
|
|
}
|
|
|
|
for len(packet) >= 20 {
|
|
infohash := packet[:20]
|
|
infohashes = append(infohashes, string(infohash))
|
|
packet = packet[20:]
|
|
}
|
|
|
|
return &models.Scrape{
|
|
Config: s.config,
|
|
Infohashes: infohashes,
|
|
}, nil
|
|
}
|