premiere-libtorrent/src/udp_tracker_connection.cpp

724 lines
20 KiB
C++
Raw Normal View History

2004-01-31 11:46:15 +01:00
/*
Copyright (c) 2003-2012, Arvid Norberg
2004-01-31 11:46:15 +01:00
All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions
are met:
* Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
* Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in
the documentation and/or other materials provided with the distribution.
* Neither the name of the author nor the names of its
contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.
*/
#include "libtorrent/pch.hpp"
2004-01-31 11:46:15 +01:00
#include <vector>
#include <cctype>
#ifdef _MSC_VER
#pragma warning(push, 1)
#endif
#include <boost/bind.hpp>
#include <boost/tuple/tuple.hpp>
#ifdef _MSC_VER
#pragma warning(pop)
#endif
2004-01-31 11:46:15 +01:00
#include "libtorrent/tracker_manager.hpp"
#include "libtorrent/parse_url.hpp"
2004-01-31 11:46:15 +01:00
#include "libtorrent/udp_tracker_connection.hpp"
#include "libtorrent/io.hpp"
2008-10-22 21:40:32 +02:00
#include "libtorrent/aux_/session_impl.hpp"
#include "libtorrent/escape_string.hpp"
2010-08-20 09:01:11 +02:00
#include "libtorrent/broadcast_socket.hpp" // for is_any
#include "libtorrent/random.hpp"
2004-01-31 11:46:15 +01:00
namespace libtorrent
{
2010-02-06 09:14:18 +01:00
std::map<address, udp_tracker_connection::connection_cache_entry>
udp_tracker_connection::m_connection_cache;
mutex udp_tracker_connection::m_cache_mutex;
2004-01-31 11:46:15 +01:00
udp_tracker_connection::udp_tracker_connection(
2008-01-08 06:47:43 +01:00
io_service& ios
, connection_queue& cc
, tracker_manager& man
, tracker_request const& req
2004-09-16 03:14:16 +02:00
, boost::weak_ptr<request_callback> c
, aux::session_impl& ses
, proxy_settings const& proxy)
: tracker_connection(man, req, ios, c)
, m_abort(false)
2004-01-31 11:46:15 +01:00
, m_transaction_id(0)
2008-10-22 21:40:32 +02:00
, m_ses(ses)
2004-01-31 11:46:15 +01:00
, m_attempts(0)
, m_state(action_error)
2010-08-03 11:08:37 +02:00
, m_proxy(proxy)
2004-01-31 11:46:15 +01:00
{
}
void udp_tracker_connection::start()
{
std::string hostname;
2013-02-26 06:57:29 +01:00
std::string protocol;
int port;
error_code ec;
using boost::tuples::ignore;
2013-02-26 06:57:29 +01:00
boost::tie(protocol, ignore, hostname, port, ignore)
= parse_url_components(tracker_req().url, ec);
2013-02-26 06:57:29 +01:00
if (port == -1) port = protocol == "http" ? 80 : 443;
if (ec)
{
// never call fail() when the session mutex is locked!
m_ses.m_io_service.post(boost::bind(
&tracker_connection::fail_disp, self(), ec));
return;
}
2008-10-22 21:40:32 +02:00
session_settings const& settings = m_ses.settings();
2010-08-03 11:08:37 +02:00
if (m_proxy.proxy_hostnames
&& (m_proxy.type == proxy_settings::socks5
|| m_proxy.type == proxy_settings::socks5_pw))
{
m_hostname = hostname;
m_target.port(port);
start_announce();
}
else
{
#if defined TORRENT_ASIO_DEBUGGING
add_outstanding_async("udp_tracker_connection::name_lookup");
#endif
2010-08-03 11:08:37 +02:00
tcp::resolver::query q(hostname, to_string(port).elems);
m_ses.m_host_resolver.async_resolve(q
, boost::bind(
&udp_tracker_connection::name_lookup, self(), _1, _2));
#if defined TORRENT_VERBOSE_LOGGING || defined TORRENT_LOGGING
boost::shared_ptr<request_callback> cb = requester();
2012-09-28 01:04:51 +02:00
if (cb) cb->debug_log("*** UDP_TRACKER [ initiating name lookup: \"%s\" ]"
, hostname.c_str());
2010-08-03 11:08:37 +02:00
#endif
}
set_timeout(tracker_req().event == tracker_request::stopped
2008-10-22 21:40:32 +02:00
? settings.stop_tracker_timeout
: settings.tracker_completion_timeout
, settings.tracker_receive_timeout);
2004-01-31 11:46:15 +01:00
}
2012-10-01 02:13:58 +02:00
void udp_tracker_connection::fail(error_code const& ec, int code
, char const* msg, int interval, int min_interval)
{
// m_target failed. remove it from the endpoint list
std::list<tcp::endpoint>::iterator i = std::find(m_endpoints.begin()
, m_endpoints.end(), tcp::endpoint(m_target.address(), m_target.port()));
if (i != m_endpoints.end()) m_endpoints.erase(i);
// if that was the last one, fail the whole announce
if (m_endpoints.empty())
2012-10-01 04:19:00 +02:00
{
2012-10-01 02:13:58 +02:00
tracker_connection::fail(ec, code, msg, interval, min_interval);
2012-10-01 04:19:00 +02:00
return;
}
#if defined TORRENT_VERBOSE_LOGGING || defined TORRENT_LOGGING
boost::shared_ptr<request_callback> cb = requester();
if (cb) cb->debug_log("*** UDP_TRACKER [ host: \"%s\" ip: \"%s\" | error: \"%s\" ]"
, m_hostname.c_str(), print_endpoint(m_target).c_str(), ec.message().c_str());
#endif
2012-10-01 02:13:58 +02:00
// pick another target endpoint and try again
m_target = pick_target_endpoint();
2012-10-01 04:19:00 +02:00
#if defined TORRENT_VERBOSE_LOGGING || defined TORRENT_LOGGING
if (cb) cb->debug_log("*** UDP_TRACKER trying next IP [ host: \"%s\" ip: \"%s\" ]"
, m_hostname.c_str(), print_endpoint(m_target).c_str());
#endif
2012-10-01 02:13:58 +02:00
m_ses.m_io_service.post(boost::bind(
&udp_tracker_connection::start_announce, self()));
}
2008-05-03 18:05:42 +02:00
void udp_tracker_connection::name_lookup(error_code const& error
, tcp::resolver::iterator i)
2004-01-31 11:46:15 +01:00
{
#if defined TORRENT_ASIO_DEBUGGING
complete_async("udp_tracker_connection::name_lookup");
#endif
if (m_abort) return;
if (error == asio::error::operation_aborted) return;
if (error || i == tcp::resolver::iterator())
{
2010-02-23 22:53:45 +01:00
fail(error);
return;
}
2004-01-31 11:46:15 +01:00
boost::shared_ptr<request_callback> cb = requester();
2008-02-17 23:51:03 +01:00
#if defined TORRENT_VERBOSE_LOGGING || defined TORRENT_LOGGING
2008-01-06 23:14:00 +01:00
if (cb) cb->debug_log("*** UDP_TRACKER [ name lookup successful ]");
#endif
2010-03-02 10:04:27 +01:00
if (cancelled())
{
2010-03-02 10:12:34 +01:00
fail(error_code(errors::torrent_aborted));
2010-03-02 10:04:27 +01:00
return;
}
restart_read_timeout();
// look for an address that has the same kind as the one
// we're listening on. To make sure the tracker get our
// correct listening address.
std::transform(i, tcp::resolver::iterator(), std::back_inserter(m_endpoints)
, boost::bind(&tcp::resolver::iterator::value_type::endpoint, _1));
if (tracker_req().apply_ip_filter)
{
// remove endpoints that are filtered by the IP filter
for (std::list<tcp::endpoint>::iterator k = m_endpoints.begin();
k != m_endpoints.end();)
{
if (m_ses.m_ip_filter.access(k->address()) == ip_filter::blocked)
{
#if defined TORRENT_VERBOSE_LOGGING || defined TORRENT_LOGGING
2012-09-28 01:04:51 +02:00
if (cb) cb->debug_log("*** UDP_TRACKER [ IP blocked by filter: %s ]"
, print_address(k->address()).c_str());
#endif
k = m_endpoints.erase(k);
}
else
++k;
}
}
2008-10-22 21:40:32 +02:00
// if all endpoints were filtered by the IP filter, we can't connect
if (m_endpoints.empty())
2008-10-22 21:40:32 +02:00
{
2010-02-23 22:53:45 +01:00
fail(error_code(errors::banned_by_ip_filter));
2008-10-22 21:40:32 +02:00
return;
}
2012-10-01 02:13:58 +02:00
m_target = pick_target_endpoint();
if (cb) cb->m_tracker_address = tcp::endpoint(m_target.address(), m_target.port());
start_announce();
}
udp::endpoint udp_tracker_connection::pick_target_endpoint() const
{
std::list<tcp::endpoint>::const_iterator iter = m_endpoints.begin();
udp::endpoint target = udp::endpoint(iter->address(), iter->port());
if (bind_interface() != address_v4::any())
{
// find first endpoint that matches our bind interface type
for (; iter != m_endpoints.end() && iter->address().is_v4()
!= bind_interface().is_v4(); ++iter);
if (iter == m_endpoints.end())
{
2012-10-01 02:13:58 +02:00
TORRENT_ASSERT(target.address().is_v4() != bind_interface().is_v4());
boost::shared_ptr<request_callback> cb = requester();
if (cb)
{
2012-10-01 02:13:58 +02:00
char const* tracker_address_type = target.address().is_v4() ? "IPv4" : "IPv6";
char const* bind_address_type = bind_interface().is_v4() ? "IPv4" : "IPv6";
char msg[200];
snprintf(msg, sizeof(msg)
, "the tracker only resolves to an %s address, and you're "
"listening on an %s socket. This may prevent you from receiving "
"incoming connections."
, tracker_address_type, bind_address_type);
cb->tracker_warning(tracker_req(), msg);
}
}
else
{
2012-10-01 02:13:58 +02:00
target = udp::endpoint(iter->address(), iter->port());
}
}
2012-10-01 02:13:58 +02:00
return target;
2010-08-03 11:08:37 +02:00
}
void udp_tracker_connection::start_announce()
{
mutex::scoped_lock l(m_cache_mutex);
2010-02-06 09:14:18 +01:00
std::map<address, connection_cache_entry>::iterator cc
= m_connection_cache.find(m_target.address());
if (cc != m_connection_cache.end())
{
2010-02-06 09:14:18 +01:00
// we found a cached entry! Now, we can only
// use if if it hasn't expired
if (time_now() < cc->second.expires)
{
2010-02-06 09:14:18 +01:00
if (tracker_req().kind == tracker_request::announce_request)
send_udp_announce();
else if (tracker_req().kind == tracker_request::scrape_request)
send_udp_scrape();
return;
}
2010-02-06 09:14:18 +01:00
// if it expired, remove it from the cache
m_connection_cache.erase(cc);
}
l.unlock();
2010-02-06 09:14:18 +01:00
send_udp_connect();
}
2004-01-31 11:46:15 +01:00
2010-11-18 02:06:33 +01:00
void udp_tracker_connection::on_timeout(error_code const& ec)
2004-01-31 11:46:15 +01:00
{
2010-11-18 02:06:33 +01:00
if (ec)
{
fail(ec);
return;
}
2008-02-17 23:51:03 +01:00
#if defined TORRENT_VERBOSE_LOGGING || defined TORRENT_LOGGING || defined TORRENT_ERROR_LOGGING
2008-01-06 23:14:00 +01:00
boost::shared_ptr<request_callback> cb = requester();
2012-09-28 01:04:51 +02:00
if (cb) cb->debug_log("*** UDP_TRACKER [ timed out url: %s ]", tracker_req().url.c_str());
2008-01-06 23:14:00 +01:00
#endif
m_abort = true;
2010-02-23 22:53:45 +01:00
fail(error_code(errors::timed_out));
}
2004-01-31 11:46:15 +01:00
void udp_tracker_connection::close()
{
2008-05-03 18:05:42 +02:00
error_code ec;
tracker_connection::close();
}
2010-08-03 11:08:37 +02:00
bool udp_tracker_connection::on_receive_hostname(error_code const& e
, char const* hostname, char const* buf, int size)
{
// just ignore the hostname this came from, pretend that
// it's from the same endpoint we sent it to (i.e. the same
// port). We have so many other ways of confirming this packet
// comes from the tracker anyway, so it's not a big deal
return on_receive(e, m_target, buf, size);
}
bool udp_tracker_connection::on_receive(error_code const& e
2008-03-25 05:46:18 +01:00
, udp::endpoint const& ep, char const* buf, int size)
{
// ignore resposes before we've sent any requests
if (m_state == action_error) return false;
if (m_abort) return false;
// ignore packet not sent from the tracker
2010-08-20 09:01:11 +02:00
// if m_target is inaddr_any, it suggests that we
// sent the packet through a proxy only knowing
// the hostname, in which case this packet might be for us
if (!is_any(m_target.address()) && m_target != ep) return false;
2008-03-25 05:46:18 +01:00
2010-02-23 22:53:45 +01:00
if (e) fail(e);
2004-01-31 11:46:15 +01:00
2008-02-17 23:51:03 +01:00
#if defined TORRENT_VERBOSE_LOGGING || defined TORRENT_LOGGING
boost::shared_ptr<request_callback> cb = requester();
if (cb)
2004-01-31 11:46:15 +01:00
{
2012-09-28 01:04:51 +02:00
cb->debug_log("<== UDP_TRACKER_PACKET [ size: %d ]", size);
}
#endif
2004-01-31 11:46:15 +01:00
// ignore packets smaller than 8 bytes
if (size < 8) return false;
2004-01-31 11:46:15 +01:00
const char* ptr = buf;
int action = detail::read_int32(ptr);
int transaction = detail::read_int32(ptr);
2008-02-17 23:51:03 +01:00
#if defined TORRENT_VERBOSE_LOGGING || defined TORRENT_LOGGING
if (cb)
2004-01-31 11:46:15 +01:00
{
2012-09-28 01:04:51 +02:00
cb->debug_log("*** UDP_TRACKER_PACKET [ action: %d ]", action);
2004-01-31 11:46:15 +01:00
}
#endif
// ignore packets with incorrect transaction id
if (m_transaction_id != transaction) return false;
2004-01-31 11:46:15 +01:00
if (action == action_error)
2004-01-31 11:46:15 +01:00
{
2010-02-23 22:53:45 +01:00
fail(error_code(errors::tracker_failure), -1, std::string(ptr, size - 8).c_str());
return true;
2004-01-31 11:46:15 +01:00
}
// ignore packets that's not a response to our message
if (action != m_state) return false;
restart_read_timeout();
2008-02-17 23:51:03 +01:00
#if defined TORRENT_VERBOSE_LOGGING || defined TORRENT_LOGGING
if (cb)
2005-04-12 13:34:40 +02:00
{
2012-09-28 01:04:51 +02:00
cb->debug_log("*** UDP_TRACKER_RESPONSE [ tid: %x ]"
2010-02-13 17:29:17 +01:00
, int(transaction));
2005-04-12 13:34:40 +02:00
}
#endif
2005-04-12 13:34:40 +02:00
switch (m_state)
{
case action_connect:
return on_connect_response(buf, size);
case action_announce:
return on_announce_response(buf, size);
case action_scrape:
return on_scrape_response(buf, size);
default: break;
}
return false;
}
bool udp_tracker_connection::on_connect_response(char const* buf, int size)
2004-01-31 11:46:15 +01:00
{
// ignore packets smaller than 16 bytes
if (size < 16) return false;
2004-01-31 11:46:15 +01:00
restart_read_timeout();
buf += 8; // skip header
// reset transaction
m_transaction_id = 0;
m_attempts = 0;
2010-02-06 09:14:18 +01:00
boost::uint64_t connection_id = detail::read_int64(buf);
mutex::scoped_lock l(m_cache_mutex);
2010-02-06 09:14:18 +01:00
connection_cache_entry& cce = m_connection_cache[m_target.address()];
cce.connection_id = connection_id;
cce.expires = time_now() + seconds(m_ses.m_settings.udp_tracker_token_expiry);
2004-01-31 11:46:15 +01:00
if (tracker_req().kind == tracker_request::announce_request)
send_udp_announce();
else if (tracker_req().kind == tracker_request::scrape_request)
send_udp_scrape();
return true;
}
2005-04-05 09:55:27 +02:00
void udp_tracker_connection::send_udp_connect()
{
2008-02-17 23:51:03 +01:00
#if defined TORRENT_VERBOSE_LOGGING || defined TORRENT_LOGGING
boost::shared_ptr<request_callback> cb = requester();
if (cb)
{
2009-04-04 11:52:25 +02:00
char hex_ih[41];
to_hex((char const*)&tracker_req().info_hash[0], 20, hex_ih);
2012-09-28 01:04:51 +02:00
cb->debug_log("==> UDP_TRACKER_CONNECT [%s]", hex_ih);
}
#endif
if (m_abort) return;
char buf[16];
char* ptr = buf;
if (m_transaction_id == 0)
m_transaction_id = random() ^ (random() << 16);
detail::write_uint32(0x417, ptr);
detail::write_uint32(0x27101980, ptr); // connection_id
detail::write_int32(action_connect, ptr); // action (connect)
detail::write_int32(m_transaction_id, ptr); // transaction_id
TORRENT_ASSERT(ptr - buf == sizeof(buf));
2008-05-03 18:05:42 +02:00
error_code ec;
2010-08-03 11:08:37 +02:00
if (!m_hostname.empty())
{
m_ses.m_udp_socket.send_hostname(m_hostname.c_str(), m_target.port(), buf, 16, ec);
}
else
{
m_ses.m_udp_socket.send(m_target, buf, 16, ec);
}
m_state = action_connect;
sent_bytes(16 + 28); // assuming UDP/IP header
2004-01-31 11:46:15 +01:00
++m_attempts;
if (ec)
{
2010-02-23 22:53:45 +01:00
fail(ec);
return;
}
2004-01-31 11:46:15 +01:00
}
2005-04-12 13:34:40 +02:00
void udp_tracker_connection::send_udp_scrape()
{
if (m_transaction_id == 0)
m_transaction_id = random() ^ (random() << 16);
2005-04-12 13:34:40 +02:00
if (m_abort) return;
2010-02-06 09:14:18 +01:00
std::map<address, connection_cache_entry>::iterator i
= m_connection_cache.find(m_target.address());
// this isn't really supposed to happen
TORRENT_ASSERT(i != m_connection_cache.end());
if (i == m_connection_cache.end()) return;
char buf[8 + 4 + 4 + 20];
char* out = buf;
2005-04-12 13:34:40 +02:00
2010-02-06 09:14:18 +01:00
detail::write_int64(i->second.connection_id, out); // connection_id
detail::write_int32(action_scrape, out); // action (scrape)
detail::write_int32(m_transaction_id, out); // transaction_id
2005-04-12 13:34:40 +02:00
// info_hash
std::copy(tracker_req().info_hash.begin(), tracker_req().info_hash.end(), out);
#if defined TORRENT_DEBUG || TORRENT_RELEASE_ASSERTS
2008-02-25 09:50:07 +01:00
out += 20;
TORRENT_ASSERT(out - buf == sizeof(buf));
#endif
2005-04-12 13:34:40 +02:00
2008-05-03 18:05:42 +02:00
error_code ec;
2010-08-03 11:08:37 +02:00
if (!m_hostname.empty())
{
m_ses.m_udp_socket.send_hostname(m_hostname.c_str(), m_target.port(), buf, sizeof(buf), ec);
}
else
{
m_ses.m_udp_socket.send(m_target, buf, sizeof(buf), ec);
}
m_state = action_scrape;
sent_bytes(sizeof(buf) + 28); // assuming UDP/IP header
2005-04-12 13:34:40 +02:00
++m_attempts;
if (ec)
{
2010-02-23 22:53:45 +01:00
fail(ec);
return;
}
2005-04-12 13:34:40 +02:00
}
bool udp_tracker_connection::on_announce_response(char const* buf, int size)
2004-01-31 11:46:15 +01:00
{
if (size < 20) return false;
2004-01-31 11:46:15 +01:00
buf += 8; // skip header
restart_read_timeout();
2004-01-31 11:46:15 +01:00
int interval = detail::read_int32(buf);
2009-12-02 05:05:24 +01:00
int min_interval = 60;
int incomplete = detail::read_int32(buf);
int complete = detail::read_int32(buf);
int num_peers = (size - 20) / 6;
if ((size - 20) % 6 != 0)
2004-01-31 11:46:15 +01:00
{
2010-02-23 22:53:45 +01:00
fail(error_code(errors::invalid_tracker_response_length));
return false;
2004-01-31 11:46:15 +01:00
}
boost::shared_ptr<request_callback> cb = requester();
2008-02-17 23:51:03 +01:00
#if defined TORRENT_VERBOSE_LOGGING || defined TORRENT_LOGGING
if (cb)
{
2008-12-30 18:37:38 +01:00
boost::shared_ptr<request_callback> cb = requester();
2012-09-28 01:04:51 +02:00
cb->debug_log("<== UDP_TRACKER_RESPONSE [ url: %s ]", tracker_req().url.c_str());
}
#endif
if (!cb)
{
close();
return true;
}
2004-01-31 11:46:15 +01:00
std::vector<peer_entry> peer_list;
for (int i = 0; i < num_peers; ++i)
{
// TODO: it would be more efficient to not use a string here.
// however, the problem is that some trackers will respond
// with actual strings. For example i2p trackers
2004-01-31 11:46:15 +01:00
peer_entry e;
2009-04-04 11:52:25 +02:00
char ip_string[100];
unsigned int a = detail::read_uint8(buf);
unsigned int b = detail::read_uint8(buf);
unsigned int c = detail::read_uint8(buf);
unsigned int d = detail::read_uint8(buf);
snprintf(ip_string, 100, "%u.%u.%u.%u", a, b, c, d);
e.ip = ip_string;
2004-01-31 11:46:15 +01:00
e.port = detail::read_uint16(buf);
e.pid.clear();
2004-01-31 11:46:15 +01:00
peer_list.push_back(e);
}
std::list<address> ip_list;
for (std::list<tcp::endpoint>::const_iterator i = m_endpoints.begin()
2009-09-06 02:57:01 +02:00
, end(m_endpoints.end()); i != end; ++i)
{
ip_list.push_back(i->address());
}
cb->tracker_response(tracker_req(), m_target.address(), ip_list
, peer_list, interval, min_interval, complete, incomplete, 0, address(), "" /*trackerid*/);
2004-01-31 11:46:15 +01:00
close();
return true;
}
2005-04-12 13:34:40 +02:00
bool udp_tracker_connection::on_scrape_response(char const* buf, int size)
{
restart_read_timeout();
int action = detail::read_int32(buf);
int transaction = detail::read_int32(buf);
2004-01-31 11:46:15 +01:00
if (transaction != m_transaction_id)
2004-01-31 11:46:15 +01:00
{
2010-02-23 22:53:45 +01:00
fail(error_code(errors::invalid_tracker_transaction_id));
return false;
2004-01-31 11:46:15 +01:00
}
if (action == action_error)
2004-01-31 11:46:15 +01:00
{
2010-02-23 22:53:45 +01:00
fail(error_code(errors::tracker_failure), -1, std::string(buf, size - 8).c_str());
return true;
2004-01-31 11:46:15 +01:00
}
if (action != action_scrape)
2004-01-31 11:46:15 +01:00
{
2010-02-23 22:53:45 +01:00
fail(error_code(errors::invalid_tracker_action));
return true;
2004-01-31 11:46:15 +01:00
}
if (size < 20)
2004-01-31 11:46:15 +01:00
{
2010-02-23 22:53:45 +01:00
fail(error_code(errors::invalid_tracker_response_length));
return true;
2004-01-31 11:46:15 +01:00
}
int complete = detail::read_int32(buf);
2007-11-20 23:46:27 +01:00
int downloaded = detail::read_int32(buf);
int incomplete = detail::read_int32(buf);
2005-04-12 13:34:40 +02:00
boost::shared_ptr<request_callback> cb = requester();
if (!cb)
{
close();
return true;
}
2007-11-20 23:46:27 +01:00
cb->tracker_scrape_response(tracker_req()
2010-09-06 06:02:15 +02:00
, complete, incomplete, downloaded, -1);
2004-01-31 11:46:15 +01:00
close();
return true;
}
void udp_tracker_connection::send_udp_announce()
{
if (m_transaction_id == 0)
m_transaction_id = random() ^ (random() << 16);
if (m_abort) return;
char buf[800];
char* out = buf;
tracker_request const& req = tracker_req();
const bool stats = req.send_stats;
2008-10-22 21:40:32 +02:00
session_settings const& settings = m_ses.settings();
2010-02-06 09:14:18 +01:00
std::map<address, connection_cache_entry>::iterator i
= m_connection_cache.find(m_target.address());
// this isn't really supposed to happen
TORRENT_ASSERT(i != m_connection_cache.end());
if (i == m_connection_cache.end()) return;
detail::write_int64(i->second.connection_id, out); // connection_id
detail::write_int32(action_announce, out); // action (announce)
detail::write_int32(m_transaction_id, out); // transaction_id
std::copy(req.info_hash.begin(), req.info_hash.end(), out); // info_hash
2008-02-25 09:50:07 +01:00
out += 20;
std::copy(req.pid.begin(), req.pid.end(), out); // peer_id
2008-02-25 09:50:07 +01:00
out += 20;
detail::write_int64(stats ? req.downloaded : 0, out); // downloaded
detail::write_int64(stats ? req.left : 0, out); // left
detail::write_int64(stats ? req.uploaded : 0, out); // uploaded
detail::write_int32(req.event, out); // event
// ip address
address_v4 announce_ip;
2012-10-17 17:54:38 +02:00
if (!m_ses.settings().anonymous_mode
&& !settings.announce_ip.empty())
{
error_code ec;
address ip = address::from_string(settings.announce_ip.c_str(), ec);
if (!ec && ip.is_v4()) announce_ip = ip.to_v4();
}
detail::write_uint32(announce_ip.to_ulong(), out);
detail::write_int32(req.key, out); // key
detail::write_int32(req.num_want, out); // num_want
detail::write_uint16(req.listen_port, out); // port
std::string request_string;
error_code ec;
using boost::tuples::ignore;
boost::tie(ignore, ignore, ignore, ignore, request_string) = parse_url_components(req.url, ec);
if (ec) request_string.clear();
if (!request_string.empty())
{
2012-09-18 04:03:24 +02:00
int str_len = (std::min)(int(request_string.size()), 255);
request_string.resize(str_len);
detail::write_uint8(2, out);
detail::write_uint8(str_len, out);
detail::write_string(request_string, out);
}
TORRENT_ASSERT(out - buf <= sizeof(buf));
2008-02-17 23:51:03 +01:00
#if defined TORRENT_VERBOSE_LOGGING || defined TORRENT_LOGGING
boost::shared_ptr<request_callback> cb = requester();
2009-04-24 19:04:20 +02:00
if (cb)
{
char hex_ih[41];
to_hex((char const*)&req.info_hash[0], 20, hex_ih);
2012-09-28 01:04:51 +02:00
cb->debug_log("==> UDP_TRACKER_ANNOUNCE [%s]", hex_ih);
2009-04-24 19:04:20 +02:00
}
#endif
2010-08-03 11:08:37 +02:00
if (!m_hostname.empty())
{
m_ses.m_udp_socket.send_hostname(m_hostname.c_str(), m_target.port(), buf, out - buf, ec);
2010-08-03 11:08:37 +02:00
}
else
{
m_ses.m_udp_socket.send(m_target, buf, out - buf, ec);
2010-08-03 11:08:37 +02:00
}
m_state = action_announce;
sent_bytes(out - buf + 28); // assuming UDP/IP header
++m_attempts;
if (ec)
{
2010-02-23 22:53:45 +01:00
fail(ec);
return;
}
}
2004-01-31 11:46:15 +01:00
}
2005-03-19 13:22:40 +01:00