14 "github.com/anacrolix/dht/krpc"
15 "github.com/anacrolix/missinggo/httptoo"
17 "github.com/anacrolix/torrent/bencode"
20 type httpResponse struct {
21 FailureReason string `bencode:"failure reason"`
22 Interval int32 `bencode:"interval"`
23 TrackerId string `bencode:"tracker id"`
24 Complete int32 `bencode:"complete"`
25 Incomplete int32 `bencode:"incomplete"`
26 Peers Peers `bencode:"peers"`
28 Peers6 krpc.CompactIPv6NodeAddrs `bencode:"peers6"`
33 func (me *Peers) UnmarshalBencode(b []byte) (err error) {
35 err = bencode.Unmarshal(b, &_v)
39 switch v := _v.(type) {
41 vars.Add("http responses with string peers", 1)
42 var cnas krpc.CompactIPv4NodeAddrs
43 err = cnas.UnmarshalBinary([]byte(v))
47 for _, cp := range cnas {
48 *me = append(*me, Peer{
55 vars.Add("http responses with list peers", 1)
58 p.fromDictInterface(i.(map[string]interface{}))
63 vars.Add("http responses with unhandled peers type", 1)
64 err = fmt.Errorf("unsupported type: %T", _v)
69 func setAnnounceParams(_url *url.URL, ar *AnnounceRequest, opts Announce) {
72 q.Set("info_hash", string(ar.InfoHash[:]))
73 q.Set("peer_id", string(ar.PeerId[:]))
74 // AFAICT, port is mandatory, and there's no implied port key.
75 q.Set("port", fmt.Sprintf("%d", ar.Port))
76 q.Set("uploaded", strconv.FormatInt(ar.Uploaded, 10))
77 q.Set("downloaded", strconv.FormatInt(ar.Downloaded, 10))
78 q.Set("left", strconv.FormatUint(ar.Left, 10))
80 q.Set("event", ar.Event.String())
82 // http://stackoverflow.com/questions/17418004/why-does-tracker-server-not-understand-my-request-bittorrent-protocol
84 // According to https://wiki.vuze.com/w/Message_Stream_Encryption. TODO:
85 // Take EncryptionPolicy or something like it as a parameter.
86 q.Set("supportcrypto", "1")
87 if opts.ClientIp4.IP != nil {
88 q.Set("ipv4", opts.ClientIp4.String())
90 if opts.ClientIp6.IP != nil {
91 q.Set("ipv6", opts.ClientIp6.String())
93 _url.RawQuery = q.Encode()
96 func announceHTTP(opt Announce, _url *url.URL) (ret AnnounceResponse, err error) {
97 _url = httptoo.CopyURL(_url)
98 setAnnounceParams(_url, &opt.Request, opt)
99 req, err := http.NewRequest("GET", _url.String(), nil)
100 req.Header.Set("User-Agent", opt.UserAgent)
101 req.Host = opt.HostHeader
102 resp, err := (&http.Client{
103 Timeout: time.Second * 15,
104 Transport: &http.Transport{
106 Timeout: 15 * time.Second,
108 TLSHandshakeTimeout: 15 * time.Second,
109 TLSClientConfig: &tls.Config{
110 InsecureSkipVerify: true,
111 ServerName: opt.ServerName,
118 defer resp.Body.Close()
120 io.Copy(&buf, resp.Body)
121 if resp.StatusCode != 200 {
122 err = fmt.Errorf("response from tracker: %s: %s", resp.Status, buf.String())
125 var trackerResponse httpResponse
126 err = bencode.Unmarshal(buf.Bytes(), &trackerResponse)
127 if _, ok := err.(bencode.ErrUnusedTrailingBytes); ok {
129 } else if err != nil {
130 err = fmt.Errorf("error decoding %q: %s", buf.Bytes(), err)
133 if trackerResponse.FailureReason != "" {
134 err = fmt.Errorf("tracker gave failure reason: %q", trackerResponse.FailureReason)
137 vars.Add("successful http announces", 1)
138 ret.Interval = trackerResponse.Interval
139 ret.Leechers = trackerResponse.Incomplete
140 ret.Seeders = trackerResponse.Complete
141 if len(trackerResponse.Peers) != 0 {
142 vars.Add("http responses with nonempty peers key", 1)
144 ret.Peers = trackerResponse.Peers
145 if len(trackerResponse.Peers6) != 0 {
146 vars.Add("http responses with nonempty peers6 key", 1)
148 for _, na := range trackerResponse.Peers6 {
149 ret.Peers = append(ret.Peers, Peer{