bittorrent-tracker/server.js

317 lines
9.2 KiB
JavaScript
Raw Normal View History

module.exports = Server
2014-06-12 00:57:19 +00:00
var bencode = require('bencode')
2014-08-02 20:43:06 +00:00
var debug = require('debug')('bittorrent-tracker')
var dgram = require('dgram')
var EventEmitter = require('events').EventEmitter
var http = require('http')
var inherits = require('inherits')
var portfinder = require('portfinder')
2014-12-10 15:47:41 +00:00
var series = require('run-series')
2014-12-10 15:51:35 +00:00
var string2compact = require('string2compact')
2014-12-10 15:47:41 +00:00
var common = require('./lib/common')
var Swarm = require('./lib/swarm')
var parseHttpRequest = require('./lib/parse_http')
var parseUdpRequest = require('./lib/parse_udp')
// Use random port above 1024
portfinder.basePort = Math.floor(Math.random() * 60000) + 1025
inherits(Server, EventEmitter)
/**
* A BitTorrent tracker server.
*
* A "BitTorrent tracker" is an HTTP service which responds to GET requests from
* BitTorrent clients. The requests include metrics from clients that help the tracker
* keep overall statistics about the torrent. The response includes a peer list that
* helps the client participate in the torrent.
*
* @param {Object} opts options
* @param {Number} opts.interval interval in ms that clients should announce on
* @param {Number} opts.trustProxy Trust 'x-forwarded-for' header from reverse proxy
* @param {boolean} opts.http Start an http server? (default: true)
* @param {boolean} opts.udp Start a udp server? (default: true)
*/
function Server (opts) {
var self = this
if (!(self instanceof Server)) return new Server(opts)
EventEmitter.call(self)
opts = opts || {}
self._intervalMs = opts.interval
? opts.interval / 1000
: 10 * 60 // 10 min (in secs)
self._trustProxy = !!opts.trustProxy
self.listening = false
2014-08-07 05:35:43 +00:00
self.port = null
self.torrents = {}
// default to starting an http server unless the user explictly says no
if (opts.http !== false) {
self._httpServer = http.createServer()
self._httpServer.on('request', self.onHttpRequest.bind(self))
2014-07-13 22:28:23 +00:00
self._httpServer.on('error', self._onError.bind(self))
2014-08-07 05:35:43 +00:00
self._httpServer.on('listening', onListening)
}
// default to starting a udp server unless the user explicitly says no
if (opts.udp !== false) {
self._udpSocket = dgram.createSocket('udp4')
self._udpSocket.on('message', self._onUdpRequest.bind(self))
self._udpSocket.on('error', self._onError.bind(self))
self._udpSocket.on('listening', onListening)
2014-08-07 05:35:43 +00:00
}
var num = !!self._httpServer + !!self._udpSocket
2014-08-07 05:35:43 +00:00
function onListening () {
num -= 1
if (num === 0) {
self.listening = true
self.emit('listening', self.port)
}
}
}
2014-07-13 22:28:23 +00:00
Server.prototype._onError = function (err) {
var self = this
self.emit('error', err)
}
Server.prototype.listen = function (port, onlistening) {
var self = this
if (typeof port === 'function') {
onlistening = port
port = undefined
}
if (self.listening) throw new Error('server already listening')
2014-08-07 05:35:43 +00:00
if (onlistening) self.once('listening', onlistening)
function onPort (err, port) {
if (err) return self.emit('error', err)
self.port = port
2014-12-12 23:09:40 +00:00
// ATTENTION:
// binding to :: only receives IPv4 connections if the bindv6only
// sysctl is set 0, which is the default on many operating systems.
self._httpServer && self._httpServer.listen(port.http || port, '::')
self._udpSocket && self._udpSocket.bind(port.udp || port)
}
if (port) onPort(null, port)
else portfinder.getPort(onPort)
}
Server.prototype.close = function (cb) {
var self = this
cb = cb || function () {}
if (self._udpSocket) {
self._udpSocket.close()
}
if (self._httpServer) {
self._httpServer.close(cb)
} else {
cb(null)
}
}
Server.prototype.getSwarm = function (infoHash) {
var self = this
if (Buffer.isBuffer(infoHash)) infoHash = infoHash.toString('hex')
var swarm = self.torrents[infoHash]
if (!swarm) swarm = self.torrents[infoHash] = new Swarm(infoHash, this)
return swarm
}
Server.prototype.onHttpRequest = function (req, res) {
var self = this
2014-12-08 22:42:05 +00:00
var params
try {
params = parseHttpRequest(req, { trustProxy: self._trustProxy })
2014-12-08 22:42:05 +00:00
} catch (err) {
debug('sent error %s', err.message)
2014-12-08 22:42:05 +00:00
res.end(bencode.encode({
'failure reason': err.message
2014-12-08 22:42:05 +00:00
}))
2014-12-08 22:42:05 +00:00
// even though it's an error for the client, it's just a warning for the server.
// don't crash the server because a client sent bad data :)
self.emit('warning', err)
2014-12-08 22:42:05 +00:00
return
}
2014-12-09 01:35:05 +00:00
this._onRequest(params, function (err, response) {
if (err) {
self.emit('warning', err)
2014-12-09 01:35:05 +00:00
response = {
'failure reason': err.message
}
}
2014-12-09 22:18:20 +00:00
delete response.action // only needed for UDP encoding
2014-06-12 00:57:19 +00:00
res.end(bencode.encode(response))
2014-12-09 01:35:05 +00:00
})
}
Server.prototype._onUdpRequest = function (msg, rinfo) {
var self = this
2014-12-08 23:22:36 +00:00
var params
try {
params = parseUdpRequest(msg, rinfo)
} catch (err) {
2014-12-09 01:35:05 +00:00
self.emit('warning', err)
// Do not reply for parsing errors
return
}
2014-12-09 01:35:05 +00:00
// Handle
this._onRequest(params, function (err, response) {
if (err) {
self.emit('warning', err)
2014-12-09 01:35:05 +00:00
response = {
action: common.ACTIONS.ERRROR,
'failure reason': err.message
}
}
2014-12-11 20:53:39 +00:00
2014-12-09 01:35:05 +00:00
response.transactionId = params.transactionId
response.connectionId = params.connectionId
var buf = makeUdpPacket(response)
self._udpSocket.send(buf, 0, buf.length, rinfo.port, rinfo.address, function () {
2014-12-09 01:35:05 +00:00
try {
socket.close()
} catch (err) {}
})
})
}
2014-12-09 01:35:05 +00:00
Server.prototype._onRequest = function (params, cb) {
if (params && params.action === common.ACTIONS.CONNECT) {
cb(null, { action: common.ACTIONS.CONNECT })
} else if (params && params.action === common.ACTIONS.ANNOUNCE) {
this._onAnnounce(params, cb)
} else if (params && params.action === common.ACTIONS.SCRAPE) {
this._onScrape(params, cb)
} else {
cb(new Error('Invalid action'))
}
}
2014-12-09 01:35:05 +00:00
Server.prototype._onAnnounce = function (params, cb) {
var self = this
var swarm = self.getSwarm(params.info_hash)
2014-12-10 15:47:41 +00:00
swarm.announce(params, function (err, response) {
if (response) {
if (!response.action) response.action = common.ACTIONS.ANNOUNCE
if (!response.intervalMs) response.intervalMs = self._intervalMs
2014-12-10 15:51:35 +00:00
if (params.compact === 1) {
2014-12-12 23:09:40 +00:00
var peers = response.peers
// Find IPv4 peers
response.peers = string2compact(peers.filter(function (peer) {
return common.IPV4_RE.test(peer.ip)
}).map(function (peer) {
return peer.ip + ':' + peer.port
}))
// Find IPv6 peers
response.peers6 = string2compact(peers.filter(function (peer) {
return common.IPV6_RE.test(peer.ip)
}).map(function (peer) {
return '[' + peer.ip + ']:' + peer.port
2014-12-10 15:51:35 +00:00
}))
}
2014-12-12 23:09:40 +00:00
// IPv6 peers are not separate for non-compact responses
}
2014-12-10 15:47:41 +00:00
cb(err, response)
2014-12-09 01:35:05 +00:00
})
}
Server.prototype._onScrape = function (params, cb) {
var self = this
2014-12-11 20:53:39 +00:00
if (params.info_hash == null) {
2014-12-09 01:35:05 +00:00
// if info_hash param is omitted, stats for all torrents are returned
// TODO: make this configurable!
params.info_hash = Object.keys(self.torrents)
}
2014-12-11 20:53:39 +00:00
2014-12-10 15:47:41 +00:00
series(params.info_hash.map(function (infoHash) {
var swarm = self.getSwarm(infoHash)
2014-12-10 15:47:41 +00:00
return function (cb) {
2014-12-11 20:53:39 +00:00
swarm.scrape(params, function (err, scrapeInfo) {
2014-12-10 15:47:41 +00:00
cb(err, scrapeInfo && {
infoHash: infoHash,
complete: scrapeInfo.complete || 0,
incomplete: scrapeInfo.incomplete || 0
})
})
2014-12-09 01:35:05 +00:00
}
2014-12-10 15:47:41 +00:00
}), function (err, results) {
if (err) return cb(err)
var response = {
action: common.ACTIONS.SCRAPE,
files: {},
flags: { min_request_interval: self._intervalMs }
}
2014-12-10 15:47:41 +00:00
results.forEach(function (result) {
response.files[common.hexToBinary(result.infoHash)] = {
2014-12-10 15:47:41 +00:00
complete: result.complete,
incomplete: result.incomplete,
downloaded: result.complete // TODO: this only provides a lower-bound
}
})
2014-12-10 15:47:41 +00:00
cb(null, response)
})
}
2014-12-09 01:35:05 +00:00
function makeUdpPacket (params) {
switch (params.action) {
case common.ACTIONS.CONNECT:
return Buffer.concat([
common.toUInt32(common.ACTIONS.CONNECT),
common.toUInt32(params.transactionId),
params.connectionId
])
case common.ACTIONS.ANNOUNCE:
return Buffer.concat([
common.toUInt32(common.ACTIONS.ANNOUNCE),
common.toUInt32(params.transactionId),
common.toUInt32(params.intervalMs),
common.toUInt32(params.incomplete),
common.toUInt32(params.complete),
params.peers
])
case common.ACTIONS.SCRAPE:
var firstInfoHash = Object.keys(params.files)[0]
var scrapeInfo = firstInfoHash ? {
complete: params.files[firstInfoHash].complete,
incomplete: params.files[firstInfoHash].incomplete,
completed: params.files[firstInfoHash].complete // TODO: this only provides a lower-bound
} : {}
return Buffer.concat([
common.toUInt32(common.ACTIONS.SCRAPE),
common.toUInt32(params.transactionId),
common.toUInt32(scrapeInfo.complete),
common.toUInt32(scrapeInfo.completed),
common.toUInt32(scrapeInfo.incomplete)
])
case common.ACTIONS.ERROR:
return Buffer.concat([
common.toUInt32(common.ACTIONS.ERROR),
common.toUInt32(params.transactionId || 0),
new Buffer(params.message, 'utf8')
])
default:
throw new Error('Action not implemented: ' + params.action)
}
}