Archived
2
0
This repository has been archived on 2024-06-24. You can view files and clone it, but cannot push or open issues or pull requests.
neko-custom/server/internal/websocket/messages.go

150 lines
4.3 KiB
Go
Raw Normal View History

2020-01-19 12:30:09 +13:00
package websocket
import (
"encoding/json"
2020-01-24 04:23:26 +13:00
"strings"
2020-01-19 12:30:09 +13:00
"github.com/gorilla/websocket"
"github.com/pkg/errors"
"github.com/rs/zerolog"
"n.eko.moe/neko/internal/event"
"n.eko.moe/neko/internal/message"
"n.eko.moe/neko/internal/session"
"n.eko.moe/neko/internal/utils"
"n.eko.moe/neko/internal/webrtc"
)
type MessageHandler struct {
logger zerolog.Logger
sessions *session.SessionManager
webrtc *webrtc.WebRTCManager
2020-01-21 05:22:24 +13:00
banned map[string]bool
locked bool
2020-01-19 12:30:09 +13:00
}
2020-01-21 05:22:24 +13:00
func (h *MessageHandler) SocketConnected(id string, socket *websocket.Conn) (bool, string, error) {
2020-01-24 04:23:26 +13:00
remote := socket.RemoteAddr().String()
if remote != "" {
address := strings.SplitN(remote, ":", -1)
if len(address[0]) < 1 {
h.logger.Debug().Str("address", remote).Msg("no remote address, baling")
} else {
ok, banned := h.banned[address[0]]
if ok && banned {
h.logger.Debug().Str("address", remote).Msg("banned")
return false, "This IP has been banned", nil
}
}
2020-01-21 05:22:24 +13:00
}
if h.locked {
2020-01-24 04:23:26 +13:00
h.logger.Debug().Str("address", remote).Msg("locked")
return false, "Server is currently locked", nil
2020-01-21 05:22:24 +13:00
}
return true, "", nil
2020-01-19 12:30:09 +13:00
}
2020-01-21 03:38:07 +13:00
func (h *MessageHandler) SocketDisconnected(id string) error {
2020-01-19 12:30:09 +13:00
return h.sessions.Destroy(id)
}
func (h *MessageHandler) Message(id string, raw []byte) error {
header := message.Message{}
if err := json.Unmarshal(raw, &header); err != nil {
return err
}
session, ok := h.sessions.Get(id)
if !ok {
errors.Errorf("unknown session id %s", id)
}
switch header.Event {
2020-01-21 05:22:24 +13:00
// Signal Events
2020-01-21 03:38:07 +13:00
case event.SIGNAL_PROVIDE:
payload := message.Signal{}
return errors.Wrapf(
utils.Unmarshal(&payload, raw, func() error {
return h.webrtc.CreatePeer(id, payload.SDP)
}), "%s failed", header.Event)
2020-01-23 06:16:40 +13:00
2020-01-21 05:22:24 +13:00
// Identity Events
2020-01-21 03:38:07 +13:00
case event.IDENTITY_DETAILS:
payload := &message.IdentityDetails{}
return errors.Wrapf(
utils.Unmarshal(payload, raw, func() error {
return h.identityDetails(id, session, payload)
}), "%s failed", header.Event)
2020-01-23 06:16:40 +13:00
2020-01-21 05:22:24 +13:00
// Control Events
2020-01-19 12:30:09 +13:00
case event.CONTROL_RELEASE:
return errors.Wrapf(h.controlRelease(id, session), "%s failed", header.Event)
case event.CONTROL_REQUEST:
return errors.Wrapf(h.controlRequest(id, session), "%s failed", header.Event)
2020-01-24 04:23:26 +13:00
case event.CONTROL_GIVE:
payload := &message.Control{}
return errors.Wrapf(
utils.Unmarshal(payload, raw, func() error {
return h.controlGive(id, session, payload)
}), "%s failed", header.Event)
2020-01-23 06:16:40 +13:00
2020-01-21 05:22:24 +13:00
// Chat Events
case event.CHAT_MESSAGE:
payload := &message.ChatRecieve{}
return errors.Wrapf(
utils.Unmarshal(payload, raw, func() error {
return h.chat(id, session, payload)
}), "%s failed", header.Event)
2020-01-24 04:23:26 +13:00
case event.CHAT_EMOTE:
payload := &message.EmoteRecieve{}
2020-01-21 05:22:24 +13:00
return errors.Wrapf(
utils.Unmarshal(payload, raw, func() error {
2020-01-24 04:23:26 +13:00
return h.chatEmote(id, session, payload)
2020-01-21 05:22:24 +13:00
}), "%s failed", header.Event)
2020-01-23 06:16:40 +13:00
2020-01-21 05:22:24 +13:00
// Admin Events
case event.ADMIN_LOCK:
return errors.Wrapf(h.adminLock(id, session), "%s failed", header.Event)
2020-01-23 06:16:40 +13:00
case event.ADMIN_UNLOCK:
return errors.Wrapf(h.adminUnlock(id, session), "%s failed", header.Event)
case event.ADMIN_CONTROL:
2020-01-21 05:22:24 +13:00
return errors.Wrapf(h.adminControl(id, session), "%s failed", header.Event)
2020-01-23 06:16:40 +13:00
case event.ADMIN_RELEASE:
2020-01-21 05:22:24 +13:00
return errors.Wrapf(h.adminRelease(id, session), "%s failed", header.Event)
2020-01-24 04:23:26 +13:00
case event.ADMIN_GIVE:
payload := &message.Admin{}
return errors.Wrapf(
utils.Unmarshal(payload, raw, func() error {
return h.adminGive(id, session, payload)
}), "%s failed", header.Event)
2020-01-21 05:22:24 +13:00
case event.ADMIN_BAN:
payload := &message.Admin{}
return errors.Wrapf(
utils.Unmarshal(payload, raw, func() error {
return h.adminBan(id, session, payload)
}), "%s failed", header.Event)
case event.ADMIN_KICK:
payload := &message.Admin{}
return errors.Wrapf(
utils.Unmarshal(payload, raw, func() error {
return h.adminKick(id, session, payload)
}), "%s failed", header.Event)
case event.ADMIN_MUTE:
payload := &message.Admin{}
return errors.Wrapf(
utils.Unmarshal(payload, raw, func() error {
return h.adminMute(id, session, payload)
}), "%s failed", header.Event)
case event.ADMIN_UNMUTE:
payload := &message.Admin{}
return errors.Wrapf(
utils.Unmarshal(payload, raw, func() error {
return h.adminUnmute(id, session, payload)
}), "%s failed", header.Event)
2020-01-19 12:30:09 +13:00
default:
return errors.Errorf("unknown message event %s", header.Event)
}
}