package http import ( "bytes" "context" "encoding/json" "fmt" "io" "math" "math/rand" "net" "net/http" "net/url" "strings" "time" "github.com/debridmediamanager/zurg/internal/config" "github.com/debridmediamanager/zurg/pkg/logutil" http_dialer "github.com/mwitkow/go-http-dialer" "golang.org/x/net/proxy" cmap "github.com/orcaman/concurrent-map/v2" ) type HTTPClient struct { client *http.Client maxRetries int timeoutSecs int backoff func(attempt int) time.Duration bearerToken string cfg config.ConfigInterface dnsCache cmap.ConcurrentMap[string, string] optimalHosts []string log *logutil.Logger } type ApiErrorResponse struct { Message string `json:"error"` Code int `json:"error_code"` } func (e *ApiErrorResponse) Error() string { return fmt.Sprintf("api response error: %s (code: %d)", e.Message, e.Code) } func NewHTTPClient( token string, maxRetries int, timeoutSecs int, forceIPv6 bool, optimalHosts []string, cfg config.ConfigInterface, log *logutil.Logger, ) *HTTPClient { client := HTTPClient{ bearerToken: token, client: &http.Client{}, maxRetries: maxRetries, timeoutSecs: timeoutSecs, backoff: backoffFunc, cfg: cfg, dnsCache: cmap.New[string](), optimalHosts: optimalHosts, log: log, } var dialer proxy.Dialer = &net.Dialer{ Timeout: time.Duration(timeoutSecs) * time.Second, // timeout for dns resolution, tcp handshake } if proxyURLString := cfg.GetProxy(); proxyURLString != "" { proxyURL, err := url.Parse(proxyURLString) if err != nil { log.Errorf("Failed to parse proxy URL: %v", err) return nil } dialer, err = client.proxyDialer(proxyURL) if err != nil { log.Errorf("Failed to create proxy dialer: %v", err) return nil } } maxConnections := cfg.GetNumOfWorkers() if maxConnections > 32 { maxConnections = 32 // real-debrid has a limit of 32 connections per server/host } client.client.Transport = &http.Transport{ ResponseHeaderTimeout: time.Duration(timeoutSecs) * time.Second, MaxIdleConns: 0, MaxConnsPerHost: maxConnections, DialContext: func(ctx context.Context, network, address string) (net.Conn, error) { return dialer.Dial(network, address) }, } if forceIPv6 { // replace the default dialer with a custom one that resolves hostnames to IPv6 addresses client.client.Transport.(*http.Transport).DialContext = func(ctx context.Context, network, address string) (net.Conn, error) { // if address is already cached, use it if ipv6Address, ok := client.dnsCache.Get(address); ok { return dialer.Dial(network, ipv6Address) } host, port, err := net.SplitHostPort(address) if err != nil { return nil, err } ips, err := net.DefaultResolver.LookupIPAddr(ctx, host) if err != nil { return nil, err } for _, ip := range ips { if ip.IP.To4() == nil { // IPv6 address found ipv6Address := net.JoinHostPort(ip.IP.String(), port) client.dnsCache.Set(address, ipv6Address) return dialer.Dial(network, ipv6Address) } } return nil, fmt.Errorf("no ipv6 address found") } } return &client } func (r *HTTPClient) Do(req *http.Request) (*http.Response, error) { if r.bearerToken != "" { req.Header.Set("Authorization", "Bearer "+r.bearerToken) } var resp *http.Response var err error attempt := 0 var origBody []byte if req.Method == "POST" || req.Method == "PUT" || req.Method == "PATCH" { origBody, _ = io.ReadAll(req.Body) } for { if origBody != nil { req.Body = io.NopCloser(bytes.NewReader(origBody)) } if resp != nil && resp.Body != nil { resp.Body.Close() } if len(r.optimalHosts) > 0 { r.optimizeHost(req) } resp, err = r.client.Do(req) // http 4xx and 5xx errors if resp != nil && resp.StatusCode >= http.StatusBadRequest { body, _ := io.ReadAll(resp.Body) if body != nil { var errResp ApiErrorResponse jsonErr := json.Unmarshal(body, &errResp) if jsonErr == nil { errResp.Message += fmt.Sprintf(" (status code: %d)", resp.StatusCode) err = &errResp } } } incr := r.shouldRetry(req, resp, err, r.cfg.GetRateLimitSleepSecs()) if incr > 0 { attempt += incr if attempt > r.maxRetries { r.log.Warnf("Request to %s failed after %d attempts", req.URL.String(), r.maxRetries) break } time.Sleep(r.backoff(attempt)) } else if incr == 0 { time.Sleep(10 * time.Millisecond) } else { // don't retry anymore break } } okWithTimeout := strings.HasSuffix(req.URL.Path, "unrestrict/link") && strings.HasSuffix(req.URL.Path, "torrents/addMagnet") if err != nil && strings.Contains(err.Error(), "timeout") && req.Host == "api.real-debrid.com" && !okWithTimeout { r.log.Warnf("Adjust your API timeout settings, request to %s timed out", req.URL.String()) } return resp, err } func (r *HTTPClient) optimizeHost(req *http.Request) { if !strings.Contains(req.Host, ".download.real-debrid.") { return } req.Host = r.optimalHosts[rand.Intn(len(r.optimalHosts))] req.URL.Host = req.Host } func (r *HTTPClient) proxyDialer(proxyURL *url.URL) (proxy.Dialer, error) { if proxyURL.Scheme == "http" || proxyURL.Scheme == "https" { httpProxyDialer := http_dialer.New(proxyURL, http_dialer.WithConnectionTimeout(time.Duration(r.timeoutSecs)*time.Second)) return httpProxyDialer, nil } else if proxyURL.Scheme == "socks5" { return proxy.FromURL(proxyURL, proxy.Direct) } return nil, fmt.Errorf("unsupported proxy scheme: %s", proxyURL.Scheme) } func (r *HTTPClient) shouldRetry(req *http.Request, resp *http.Response, err error, rateLimitSleep int) int { if strings.HasSuffix(req.URL.Path, "torrents/addMagnet") { return -1 // don't retry to prevent duplicate torrents } if err != nil && strings.HasPrefix(err.Error(), "api response error:") { if apiErr, ok := err.(*ApiErrorResponse); ok { switch apiErr.Code { case -1: // Internal error return 1 case 5: // Slow down (retry infinitely), default: 4 secs time.Sleep(time.Duration(rateLimitSleep) * time.Second) return 0 case 6: // Ressource unreachable return 1 case 17: // Hoster in maintenance return 1 case 18: // Hoster limit reached return 1 case 25: // Service unavailable return 1 case 34: // Too many requests (retry infinitely), default: 4 secs time.Sleep(time.Duration(rateLimitSleep) * time.Second) return 0 case 36: // Fair Usage Limit return 1 default: return -1 // don't retry } } } if err != nil && strings.Contains(err.Error(), "timeout") { return 1 } if resp != nil { if resp.StatusCode == http.StatusTooManyRequests { // Too many requests: retry infinitely, default: 4 secs time.Sleep(time.Duration(rateLimitSleep) * time.Second) return 0 } if resp.StatusCode >= http.StatusBadRequest && resp.StatusCode < http.StatusInternalServerError { // other client errors: retry return 1 } if resp.StatusCode >= http.StatusInternalServerError { // server errors: don't retry return -1 } okResponseCode := resp.StatusCode == http.StatusOK || resp.StatusCode == http.StatusPartialContent // if the request has a Range header but the server doesn't respond with a Content-Range header hasRangeHeader := req.Header.Get("Range") != "" && !strings.HasPrefix(req.Header.Get("Range"), "bytes=0-") if hasRangeHeader && okResponseCode && resp.Header.Get("Content-Range") == "" { time.Sleep(10 * time.Millisecond) return 0 } return -1 // don't retry } return 1 } func backoffFunc(attempt int) time.Duration { maxDuration := 60 backoff := int(math.Pow(2, float64(attempt))) if backoff > maxDuration { backoff = maxDuration } return time.Duration(backoff) * time.Second } func (r *HTTPClient) CanFetchFirstByte(url string) bool { req, err := http.NewRequest("GET", url, nil) if err != nil { return false } req.Header.Set("Range", "bytes=0-0") timeout := time.Duration(r.timeoutSecs) * time.Second ctx, cancel := context.WithTimeout(context.Background(), timeout) defer cancel() req = req.WithContext(ctx) resp, _ := r.Do(req) if resp != nil { defer resp.Body.Close() return resp.StatusCode == http.StatusOK || resp.StatusCode == http.StatusPartialContent } return false }