14 "github.com/anacrolix/dht/krpc"
15 "github.com/anacrolix/missinggo/httptoo"
16 "github.com/anacrolix/torrent/bencode"
19 type httpResponse struct {
20 FailureReason string `bencode:"failure reason"`
21 Interval int32 `bencode:"interval"`
22 TrackerId string `bencode:"tracker id"`
23 Complete int32 `bencode:"complete"`
24 Incomplete int32 `bencode:"incomplete"`
25 Peers Peers `bencode:"peers"`
27 Peers6 krpc.CompactIPv6NodeAddrs `bencode:"peers6"`
32 func (me *Peers) UnmarshalBencode(b []byte) (err error) {
34 err = bencode.Unmarshal(b, &_v)
38 switch v := _v.(type) {
40 vars.Add("http responses with string peers", 1)
41 var cnas krpc.CompactIPv4NodeAddrs
42 err = cnas.UnmarshalBinary([]byte(v))
46 for _, cp := range cnas {
47 *me = append(*me, Peer{
54 vars.Add("http responses with list peers", 1)
57 p.fromDictInterface(i.(map[string]interface{}))
62 vars.Add("http responses with unhandled peers type", 1)
63 err = fmt.Errorf("unsupported type: %T", _v)
68 func setAnnounceParams(_url *url.URL, ar *AnnounceRequest, opts Announce) {
71 q.Set("info_hash", string(ar.InfoHash[:]))
72 q.Set("peer_id", string(ar.PeerId[:]))
73 // AFAICT, port is mandatory, and there's no implied port key.
74 q.Set("port", fmt.Sprintf("%d", ar.Port))
75 q.Set("uploaded", strconv.FormatInt(ar.Uploaded, 10))
76 q.Set("downloaded", strconv.FormatInt(ar.Downloaded, 10))
77 q.Set("left", strconv.FormatUint(ar.Left, 10))
79 q.Set("event", ar.Event.String())
81 // http://stackoverflow.com/questions/17418004/why-does-tracker-server-not-understand-my-request-bittorrent-protocol
83 // According to https://wiki.vuze.com/w/Message_Stream_Encryption. TODO:
84 // Take EncryptionPolicy or something like it as a parameter.
85 q.Set("supportcrypto", "1")
86 if opts.ClientIp4.IP != nil {
87 q.Set("ipv4", opts.ClientIp4.String())
89 if opts.ClientIp6.IP != nil {
90 q.Set("ipv6", opts.ClientIp6.String())
92 _url.RawQuery = q.Encode()
95 func announceHTTP(opt Announce, _url *url.URL) (ret AnnounceResponse, err error) {
96 _url = httptoo.CopyURL(_url)
97 setAnnounceParams(_url, &opt.Request, opt)
98 req, err := http.NewRequest("GET", _url.String(), nil)
99 req.Header.Set("User-Agent", opt.UserAgent)
100 req.Host = opt.HostHeader
101 resp, err := (&http.Client{
102 Timeout: time.Second * 15,
103 Transport: &http.Transport{
105 Timeout: 15 * time.Second,
107 Proxy: opt.HTTPProxy,
108 TLSHandshakeTimeout: 15 * time.Second,
109 TLSClientConfig: &tls.Config{
110 InsecureSkipVerify: true,
111 ServerName: opt.ServerName,
118 defer resp.Body.Close()
120 io.Copy(&buf, resp.Body)
121 if resp.StatusCode != 200 {
122 err = fmt.Errorf("response from tracker: %s: %s", resp.Status, buf.String())
125 var trackerResponse httpResponse
126 err = bencode.Unmarshal(buf.Bytes(), &trackerResponse)
127 if _, ok := err.(bencode.ErrUnusedTrailingBytes); ok {
129 } else if err != nil {
130 err = fmt.Errorf("error decoding %q: %s", buf.Bytes(), err)
133 if trackerResponse.FailureReason != "" {
134 err = fmt.Errorf("tracker gave failure reason: %q", trackerResponse.FailureReason)
137 vars.Add("successful http announces", 1)
138 ret.Interval = trackerResponse.Interval
139 ret.Leechers = trackerResponse.Incomplete
140 ret.Seeders = trackerResponse.Complete
141 if len(trackerResponse.Peers) != 0 {
142 vars.Add("http responses with nonempty peers key", 1)
144 ret.Peers = trackerResponse.Peers
145 if len(trackerResponse.Peers6) != 0 {
146 vars.Add("http responses with nonempty peers6 key", 1)
148 for _, na := range trackerResponse.Peers6 {
149 ret.Peers = append(ret.Peers, Peer{