2020-01-19 12:30:09 +13:00
|
|
|
package websocket
|
|
|
|
|
|
|
|
import (
|
2020-01-25 04:47:37 +13:00
|
|
|
"encoding/json"
|
2020-01-19 12:30:09 +13:00
|
|
|
|
2020-01-25 04:47:37 +13:00
|
|
|
"github.com/pkg/errors"
|
2020-01-19 12:30:09 +13:00
|
|
|
"github.com/rs/zerolog"
|
|
|
|
|
2021-10-06 09:38:24 +13:00
|
|
|
"m1k1o/neko/internal/types"
|
|
|
|
"m1k1o/neko/internal/types/event"
|
|
|
|
"m1k1o/neko/internal/types/message"
|
|
|
|
"m1k1o/neko/internal/utils"
|
2020-01-19 12:30:09 +13:00
|
|
|
)
|
|
|
|
|
2020-01-25 04:47:37 +13:00
|
|
|
type MessageHandler struct {
|
2020-09-27 11:10:34 +13:00
|
|
|
logger zerolog.Logger
|
|
|
|
sessions types.SessionManager
|
|
|
|
webrtc types.WebRTCManager
|
|
|
|
remote types.RemoteManager
|
|
|
|
broadcast types.BroadcastManager
|
2021-11-18 10:10:55 +13:00
|
|
|
banned map[string]string // IP -> session ID (that banned it)
|
|
|
|
locked map[string]string // resource name -> session ID (that locked it)
|
2020-01-19 12:30:09 +13:00
|
|
|
}
|
|
|
|
|
2021-11-18 06:00:27 +13:00
|
|
|
func (h *MessageHandler) Connected(admin bool, socket *WebSocket) (bool, string) {
|
2020-01-25 04:47:37 +13:00
|
|
|
address := socket.Address()
|
2020-04-05 15:49:43 +12:00
|
|
|
if address == "" {
|
|
|
|
h.logger.Debug().Msg("no remote address")
|
2020-01-25 04:47:37 +13:00
|
|
|
} else {
|
2021-11-18 10:10:55 +13:00
|
|
|
_, ok := h.banned[address]
|
|
|
|
if ok {
|
2020-04-05 15:49:43 +12:00
|
|
|
h.logger.Debug().Str("address", address).Msg("banned")
|
2021-11-18 06:00:27 +13:00
|
|
|
return false, "banned"
|
2020-01-19 12:30:09 +13:00
|
|
|
}
|
2020-01-25 04:47:37 +13:00
|
|
|
}
|
2020-01-21 03:38:07 +13:00
|
|
|
|
2021-11-17 10:50:11 +13:00
|
|
|
_, ok := h.locked["login"]
|
|
|
|
if ok && !admin {
|
2021-01-15 09:41:00 +13:00
|
|
|
h.logger.Debug().Msg("server locked")
|
2021-11-18 06:00:27 +13:00
|
|
|
return false, "locked"
|
2020-01-25 04:47:37 +13:00
|
|
|
}
|
2020-01-19 12:30:09 +13:00
|
|
|
|
2021-11-18 06:00:27 +13:00
|
|
|
return true, ""
|
2020-01-19 12:30:09 +13:00
|
|
|
}
|
|
|
|
|
2021-10-06 10:10:10 +13:00
|
|
|
func (h *MessageHandler) Disconnected(id string) {
|
|
|
|
h.sessions.Destroy(id)
|
2020-01-19 12:30:09 +13:00
|
|
|
}
|
|
|
|
|
2020-01-25 04:47:37 +13:00
|
|
|
func (h *MessageHandler) Message(id string, raw []byte) error {
|
|
|
|
header := message.Message{}
|
|
|
|
if err := json.Unmarshal(raw, &header); err != nil {
|
2020-01-21 05:22:24 +13:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2020-01-25 04:47:37 +13:00
|
|
|
session, ok := h.sessions.Get(id)
|
2020-01-21 05:22:24 +13:00
|
|
|
if !ok {
|
2021-07-23 06:58:39 +12:00
|
|
|
return errors.Errorf("unknown session id %s", id)
|
2020-01-19 12:30:09 +13:00
|
|
|
}
|
|
|
|
|
2020-01-25 04:47:37 +13:00
|
|
|
switch header.Event {
|
|
|
|
// Signal Events
|
2020-02-13 12:13:33 +13:00
|
|
|
case event.SIGNAL_ANSWER:
|
|
|
|
payload := &message.SignalAnswer{}
|
2020-01-25 04:47:37 +13:00
|
|
|
return errors.Wrapf(
|
|
|
|
utils.Unmarshal(payload, raw, func() error {
|
2020-02-13 12:13:33 +13:00
|
|
|
return h.signalAnswer(id, session, payload)
|
2020-01-25 04:47:37 +13:00
|
|
|
}), "%s failed", header.Event)
|
|
|
|
|
|
|
|
// Control Events
|
|
|
|
case event.CONTROL_RELEASE:
|
|
|
|
return errors.Wrapf(h.controlRelease(id, session), "%s failed", header.Event)
|
|
|
|
case event.CONTROL_REQUEST:
|
2020-06-16 11:01:23 +12:00
|
|
|
return errors.Wrapf(h.controlRequest(id, session), "%s failed", header.Event)
|
2020-01-25 04:47:37 +13:00
|
|
|
case event.CONTROL_GIVE:
|
|
|
|
payload := &message.Control{}
|
|
|
|
return errors.Wrapf(
|
|
|
|
utils.Unmarshal(payload, raw, func() error {
|
|
|
|
return h.controlGive(id, session, payload)
|
|
|
|
}), "%s failed", header.Event)
|
2020-01-26 03:29:52 +13:00
|
|
|
case event.CONTROL_CLIPBOARD:
|
|
|
|
payload := &message.Clipboard{}
|
|
|
|
return errors.Wrapf(
|
|
|
|
utils.Unmarshal(payload, raw, func() error {
|
|
|
|
return h.controlClipboard(id, session, payload)
|
|
|
|
}), "%s failed", header.Event)
|
2020-06-16 10:55:14 +12:00
|
|
|
case event.CONTROL_KEYBOARD:
|
|
|
|
payload := &message.Keyboard{}
|
|
|
|
return errors.Wrapf(
|
|
|
|
utils.Unmarshal(payload, raw, func() error {
|
|
|
|
return h.controlKeyboard(id, session, payload)
|
|
|
|
}), "%s failed", header.Event)
|
|
|
|
|
2020-01-25 04:47:37 +13:00
|
|
|
// Chat Events
|
|
|
|
case event.CHAT_MESSAGE:
|
2020-02-27 01:46:10 +13:00
|
|
|
payload := &message.ChatReceive{}
|
2020-01-25 04:47:37 +13:00
|
|
|
return errors.Wrapf(
|
|
|
|
utils.Unmarshal(payload, raw, func() error {
|
|
|
|
return h.chat(id, session, payload)
|
|
|
|
}), "%s failed", header.Event)
|
|
|
|
case event.CHAT_EMOTE:
|
2020-02-27 01:46:10 +13:00
|
|
|
payload := &message.EmoteReceive{}
|
2020-01-25 04:47:37 +13:00
|
|
|
return errors.Wrapf(
|
|
|
|
utils.Unmarshal(payload, raw, func() error {
|
|
|
|
return h.chatEmote(id, session, payload)
|
|
|
|
}), "%s failed", header.Event)
|
|
|
|
|
2020-02-11 18:15:59 +13:00
|
|
|
// Screen Events
|
|
|
|
case event.SCREEN_RESOLUTION:
|
|
|
|
return errors.Wrapf(h.screenResolution(id, session), "%s failed", header.Event)
|
|
|
|
case event.SCREEN_CONFIGURATIONS:
|
|
|
|
return errors.Wrapf(h.screenConfigurations(id, session), "%s failed", header.Event)
|
|
|
|
case event.SCREEN_SET:
|
|
|
|
payload := &message.ScreenResolution{}
|
|
|
|
return errors.Wrapf(
|
|
|
|
utils.Unmarshal(payload, raw, func() error {
|
|
|
|
return h.screenSet(id, session, payload)
|
|
|
|
}), "%s failed", header.Event)
|
|
|
|
|
2020-09-27 11:10:34 +13:00
|
|
|
// Boradcast Events
|
|
|
|
case event.BORADCAST_CREATE:
|
|
|
|
payload := &message.BroadcastCreate{}
|
|
|
|
return errors.Wrapf(
|
|
|
|
utils.Unmarshal(payload, raw, func() error {
|
|
|
|
return h.boradcastCreate(session, payload)
|
|
|
|
}), "%s failed", header.Event)
|
|
|
|
case event.BORADCAST_DESTROY:
|
|
|
|
return errors.Wrapf(h.boradcastDestroy(session), "%s failed", header.Event)
|
|
|
|
|
2020-01-25 04:47:37 +13:00
|
|
|
// Admin Events
|
|
|
|
case event.ADMIN_LOCK:
|
2021-11-17 10:50:11 +13:00
|
|
|
payload := &message.AdminLock{}
|
|
|
|
return errors.Wrapf(
|
|
|
|
utils.Unmarshal(payload, raw, func() error {
|
|
|
|
return h.adminLock(id, session, payload)
|
|
|
|
}), "%s failed", header.Event)
|
2020-01-25 04:47:37 +13:00
|
|
|
case event.ADMIN_UNLOCK:
|
2021-11-17 10:50:11 +13:00
|
|
|
payload := &message.AdminLock{}
|
|
|
|
return errors.Wrapf(
|
|
|
|
utils.Unmarshal(payload, raw, func() error {
|
|
|
|
return h.adminUnlock(id, session, payload)
|
|
|
|
}), "%s failed", header.Event)
|
2020-01-25 04:47:37 +13:00
|
|
|
case event.ADMIN_CONTROL:
|
|
|
|
return errors.Wrapf(h.adminControl(id, session), "%s failed", header.Event)
|
|
|
|
case event.ADMIN_RELEASE:
|
|
|
|
return errors.Wrapf(h.adminRelease(id, session), "%s failed", header.Event)
|
|
|
|
case event.ADMIN_GIVE:
|
|
|
|
payload := &message.Admin{}
|
|
|
|
return errors.Wrapf(
|
|
|
|
utils.Unmarshal(payload, raw, func() error {
|
|
|
|
return h.adminGive(id, session, payload)
|
|
|
|
}), "%s failed", header.Event)
|
|
|
|
case event.ADMIN_BAN:
|
|
|
|
payload := &message.Admin{}
|
|
|
|
return errors.Wrapf(
|
|
|
|
utils.Unmarshal(payload, raw, func() error {
|
|
|
|
return h.adminBan(id, session, payload)
|
|
|
|
}), "%s failed", header.Event)
|
|
|
|
case event.ADMIN_KICK:
|
|
|
|
payload := &message.Admin{}
|
|
|
|
return errors.Wrapf(
|
|
|
|
utils.Unmarshal(payload, raw, func() error {
|
|
|
|
return h.adminKick(id, session, payload)
|
|
|
|
}), "%s failed", header.Event)
|
|
|
|
case event.ADMIN_MUTE:
|
|
|
|
payload := &message.Admin{}
|
|
|
|
return errors.Wrapf(
|
|
|
|
utils.Unmarshal(payload, raw, func() error {
|
|
|
|
return h.adminMute(id, session, payload)
|
|
|
|
}), "%s failed", header.Event)
|
|
|
|
case event.ADMIN_UNMUTE:
|
|
|
|
payload := &message.Admin{}
|
|
|
|
return errors.Wrapf(
|
|
|
|
utils.Unmarshal(payload, raw, func() error {
|
|
|
|
return h.adminUnmute(id, session, payload)
|
|
|
|
}), "%s failed", header.Event)
|
|
|
|
default:
|
|
|
|
return errors.Errorf("unknown message event %s", header.Event)
|
2020-01-19 12:30:09 +13:00
|
|
|
}
|
|
|
|
}
|