2020-11-02 04:09:48 +13:00
|
|
|
package handler
|
2020-10-23 03:54:50 +13:00
|
|
|
|
|
|
|
import (
|
|
|
|
"encoding/json"
|
|
|
|
|
|
|
|
"github.com/pkg/errors"
|
|
|
|
"github.com/rs/zerolog"
|
2020-11-02 04:09:48 +13:00
|
|
|
"github.com/rs/zerolog/log"
|
2020-10-23 03:54:50 +13:00
|
|
|
|
2020-10-29 07:15:48 +13:00
|
|
|
"demodesk/neko/internal/types"
|
|
|
|
"demodesk/neko/internal/types/event"
|
|
|
|
"demodesk/neko/internal/types/message"
|
|
|
|
"demodesk/neko/internal/utils"
|
2020-10-23 03:54:50 +13:00
|
|
|
)
|
|
|
|
|
2020-11-02 04:09:48 +13:00
|
|
|
func New(
|
|
|
|
sessions types.SessionManager,
|
|
|
|
desktop types.DesktopManager,
|
|
|
|
capture types.CaptureManager,
|
|
|
|
webrtc types.WebRTCManager,
|
|
|
|
) *MessageHandlerCtx {
|
|
|
|
logger := log.With().Str("module", "handler").Logger()
|
|
|
|
|
|
|
|
return &MessageHandlerCtx{
|
|
|
|
logger: logger,
|
|
|
|
sessions: sessions,
|
|
|
|
desktop: desktop,
|
|
|
|
capture: capture,
|
|
|
|
webrtc: webrtc,
|
|
|
|
banned: make(map[string]bool),
|
|
|
|
locked: false,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
type MessageHandlerCtx struct {
|
2020-10-23 03:54:50 +13:00
|
|
|
logger zerolog.Logger
|
|
|
|
sessions types.SessionManager
|
|
|
|
webrtc types.WebRTCManager
|
2020-11-02 04:09:48 +13:00
|
|
|
desktop types.DesktopManager
|
|
|
|
capture types.CaptureManager
|
2020-10-23 03:54:50 +13:00
|
|
|
banned map[string]bool
|
|
|
|
locked bool
|
|
|
|
}
|
|
|
|
|
2020-11-15 04:03:12 +13:00
|
|
|
func (h *MessageHandlerCtx) Connected(session types.Session, socket types.WebSocket) (bool, string) {
|
2020-10-23 03:54:50 +13:00
|
|
|
address := socket.Address()
|
2020-11-02 04:09:48 +13:00
|
|
|
if address != "" {
|
2020-10-23 03:54:50 +13:00
|
|
|
ok, banned := h.banned[address]
|
|
|
|
if ok && banned {
|
|
|
|
h.logger.Debug().Str("address", address).Msg("banned")
|
2020-11-02 04:09:48 +13:00
|
|
|
return false, "banned"
|
2020-10-23 03:54:50 +13:00
|
|
|
}
|
2020-11-02 04:09:48 +13:00
|
|
|
} else {
|
|
|
|
h.logger.Debug().Msg("no remote address")
|
2020-10-23 03:54:50 +13:00
|
|
|
}
|
|
|
|
|
2020-11-15 04:03:12 +13:00
|
|
|
if h.locked && !session.Admin(){
|
|
|
|
h.logger.Debug().Msg("server locked")
|
|
|
|
return false, "locked"
|
2020-10-23 03:54:50 +13:00
|
|
|
}
|
|
|
|
|
2020-11-02 04:09:48 +13:00
|
|
|
return true, ""
|
2020-10-23 03:54:50 +13:00
|
|
|
}
|
|
|
|
|
2020-11-02 04:09:48 +13:00
|
|
|
func (h *MessageHandlerCtx) Disconnected(id string) error {
|
|
|
|
// TODO: Refactor.
|
2020-10-23 03:54:50 +13:00
|
|
|
if h.locked && len(h.sessions.Admins()) == 0 {
|
|
|
|
h.locked = false
|
|
|
|
}
|
|
|
|
|
|
|
|
return h.sessions.Destroy(id)
|
|
|
|
}
|
|
|
|
|
2020-11-15 04:03:12 +13:00
|
|
|
func (h *MessageHandlerCtx) Message(session types.Session, raw []byte) error {
|
2020-10-23 03:54:50 +13:00
|
|
|
header := message.Message{}
|
|
|
|
if err := json.Unmarshal(raw, &header); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2020-11-17 04:56:03 +13:00
|
|
|
var err error
|
2020-10-23 03:54:50 +13:00
|
|
|
switch header.Event {
|
|
|
|
// Signal Events
|
|
|
|
case event.SIGNAL_ANSWER:
|
|
|
|
payload := &message.SignalAnswer{}
|
2020-11-17 04:56:03 +13:00
|
|
|
err = utils.Unmarshal(payload, raw, func() error {
|
|
|
|
return h.signalAnswer(session, payload)
|
|
|
|
})
|
2020-10-23 03:54:50 +13:00
|
|
|
|
|
|
|
// Control Events
|
|
|
|
case event.CONTROL_RELEASE:
|
2020-11-17 04:56:03 +13:00
|
|
|
err = h.controlRelease(session)
|
2020-10-23 03:54:50 +13:00
|
|
|
case event.CONTROL_REQUEST:
|
2020-11-17 04:56:03 +13:00
|
|
|
err = h.controlRequest(session)
|
2020-10-23 03:54:50 +13:00
|
|
|
case event.CONTROL_GIVE:
|
|
|
|
payload := &message.Control{}
|
2020-11-17 04:56:03 +13:00
|
|
|
err = utils.Unmarshal(payload, raw, func() error {
|
|
|
|
return h.controlGive(session, payload)
|
|
|
|
})
|
2020-10-23 03:54:50 +13:00
|
|
|
case event.CONTROL_CLIPBOARD:
|
|
|
|
payload := &message.Clipboard{}
|
2020-11-17 04:56:03 +13:00
|
|
|
err = utils.Unmarshal(payload, raw, func() error {
|
|
|
|
return h.controlClipboard(session, payload)
|
|
|
|
})
|
2020-10-23 03:54:50 +13:00
|
|
|
case event.CONTROL_KEYBOARD:
|
|
|
|
payload := &message.Keyboard{}
|
2020-11-17 04:56:03 +13:00
|
|
|
err = utils.Unmarshal(payload, raw, func() error {
|
|
|
|
return h.controlKeyboard(session, payload)
|
|
|
|
})
|
2020-10-23 03:54:50 +13:00
|
|
|
|
|
|
|
// Screen Events
|
|
|
|
case event.SCREEN_RESOLUTION:
|
2020-11-17 04:56:03 +13:00
|
|
|
err = h.screenResolution(session)
|
2020-10-23 03:54:50 +13:00
|
|
|
case event.SCREEN_CONFIGURATIONS:
|
2020-11-17 04:56:03 +13:00
|
|
|
err = h.screenConfigurations(session)
|
2020-10-23 03:54:50 +13:00
|
|
|
case event.SCREEN_SET:
|
|
|
|
payload := &message.ScreenResolution{}
|
2020-11-17 04:56:03 +13:00
|
|
|
err = utils.Unmarshal(payload, raw, func() error {
|
|
|
|
return h.screenSet(session, payload)
|
|
|
|
})
|
2020-10-23 03:54:50 +13:00
|
|
|
|
|
|
|
// Boradcast Events
|
|
|
|
case event.BORADCAST_CREATE:
|
|
|
|
payload := &message.BroadcastCreate{}
|
2020-11-17 04:56:03 +13:00
|
|
|
err = utils.Unmarshal(payload, raw, func() error {
|
|
|
|
return h.boradcastCreate(session, payload)
|
|
|
|
})
|
2020-10-23 03:54:50 +13:00
|
|
|
case event.BORADCAST_DESTROY:
|
2020-11-17 04:56:03 +13:00
|
|
|
err = h.boradcastDestroy(session)
|
2020-10-23 03:54:50 +13:00
|
|
|
|
|
|
|
// Admin Events
|
|
|
|
case event.ADMIN_LOCK:
|
2020-11-17 04:56:03 +13:00
|
|
|
err = h.adminLock(session)
|
2020-10-23 03:54:50 +13:00
|
|
|
case event.ADMIN_UNLOCK:
|
2020-11-17 04:56:03 +13:00
|
|
|
err = h.adminUnlock(session)
|
2020-10-23 03:54:50 +13:00
|
|
|
case event.ADMIN_CONTROL:
|
2020-11-17 04:56:03 +13:00
|
|
|
err = h.adminControl(session)
|
2020-10-23 03:54:50 +13:00
|
|
|
case event.ADMIN_RELEASE:
|
2020-11-17 04:56:03 +13:00
|
|
|
err = h.adminRelease(session)
|
2020-10-23 03:54:50 +13:00
|
|
|
case event.ADMIN_GIVE:
|
|
|
|
payload := &message.Admin{}
|
2020-11-17 04:56:03 +13:00
|
|
|
err = utils.Unmarshal(payload, raw, func() error {
|
|
|
|
return h.adminGive(session, payload)
|
|
|
|
})
|
2020-10-23 03:54:50 +13:00
|
|
|
case event.ADMIN_BAN:
|
|
|
|
payload := &message.Admin{}
|
2020-11-17 04:56:03 +13:00
|
|
|
err = utils.Unmarshal(payload, raw, func() error {
|
|
|
|
return h.adminBan(session, payload)
|
|
|
|
})
|
2020-10-23 03:54:50 +13:00
|
|
|
case event.ADMIN_KICK:
|
|
|
|
payload := &message.Admin{}
|
2020-11-17 04:56:03 +13:00
|
|
|
err = utils.Unmarshal(payload, raw, func() error {
|
|
|
|
return h.adminKick(session, payload)
|
|
|
|
})
|
2020-10-23 03:54:50 +13:00
|
|
|
case event.ADMIN_MUTE:
|
|
|
|
payload := &message.Admin{}
|
2020-11-17 04:56:03 +13:00
|
|
|
err = utils.Unmarshal(payload, raw, func() error {
|
|
|
|
return h.adminMute(session, payload)
|
|
|
|
})
|
2020-10-23 03:54:50 +13:00
|
|
|
case event.ADMIN_UNMUTE:
|
|
|
|
payload := &message.Admin{}
|
2020-11-17 04:56:03 +13:00
|
|
|
err = utils.Unmarshal(payload, raw, func() error {
|
|
|
|
return h.adminUnmute(session, payload)
|
|
|
|
})
|
2020-10-23 03:54:50 +13:00
|
|
|
default:
|
|
|
|
return errors.Errorf("unknown message event %s", header.Event)
|
|
|
|
}
|
2020-11-17 04:56:03 +13:00
|
|
|
|
|
|
|
return errors.Wrapf(err, "%s failed", header.Event)
|
2020-10-23 03:54:50 +13:00
|
|
|
}
|