diff options
| author | Gustav Sörnäs <gustav@sornas.net> | 2020-10-10 20:33:55 +0200 |
|---|---|---|
| committer | Gustav Sörnäs <gustav@sornas.net> | 2020-10-10 20:33:55 +0200 |
| commit | ab8116223328412484d1e76a9ff7b2055f05abf5 (patch) | |
| tree | a38ddfa10111aa6f7b5015015a1b33fae2fdb42c /mumd/src/network.rs | |
| parent | 2aee60f7bbc6186cf6ca63aef182e1fe52fa03ad (diff) | |
| download | mum-ab8116223328412484d1e76a9ff7b2055f05abf5.tar.gz | |
big ol refactor
Co-authored-by: Eskil Queseth <eskilq@kth.se>
Diffstat (limited to 'mumd/src/network.rs')
| -rw-r--r-- | mumd/src/network.rs | 241 |
1 files changed, 228 insertions, 13 deletions
diff --git a/mumd/src/network.rs b/mumd/src/network.rs index 34b5d01..82b45da 100644 --- a/mumd/src/network.rs +++ b/mumd/src/network.rs @@ -1,32 +1,53 @@ +use crate::audio::Audio; + +use bytes::Bytes; +use mumble_protocol::voice::VoicePacketPayload; +use opus::Channels; + use futures::channel::oneshot; +use futures::join; +use futures::SinkExt; use futures::StreamExt; use futures_util::stream::{SplitSink, SplitStream}; -use mumble_protocol::{Serverbound, Clientbound}; +use mumble_protocol::control::msgs; use mumble_protocol::control::ClientControlCodec; use mumble_protocol::control::ControlCodec; use mumble_protocol::control::ControlPacket; use mumble_protocol::crypt::ClientCryptState; use mumble_protocol::voice::VoicePacket; +use mumble_protocol::{Clientbound, Serverbound}; +use std::convert::Into; +use std::convert::TryInto; use std::net::Ipv6Addr; use std::net::SocketAddr; +use std::sync::Arc; +use std::sync::Mutex; use tokio::net::TcpStream; use tokio::net::UdpSocket; +use tokio::time::{self, Duration}; use tokio_tls::TlsConnector; use tokio_tls::TlsStream; use tokio_util::codec::Decoder; use tokio_util::codec::Framed; use tokio_util::udp::UdpFramed; -pub async fn connect_tcp( +type TcpSender = SplitSink< + Framed<TlsStream<TcpStream>, ControlCodec<Serverbound, Clientbound>>, + ControlPacket<Serverbound>, +>; +type TcpReceiver = + SplitStream<Framed<TlsStream<TcpStream>, ControlCodec<Serverbound, Clientbound>>>; +type UdpSender = SplitSink<UdpFramed<ClientCryptState>, (VoicePacket<Serverbound>, SocketAddr)>; +type UdpReceiver = SplitStream<UdpFramed<ClientCryptState>>; + +async fn connect_tcp( server_addr: SocketAddr, server_host: String, accept_invalid_cert: bool, -) -> ( - SplitSink<Framed<TlsStream<TcpStream>, ControlCodec<Serverbound, Clientbound>>, ControlPacket<Serverbound>>, - SplitStream<Framed<TlsStream<TcpStream>, ControlCodec<Serverbound, Clientbound>>> -) { - - let stream = TcpStream::connect(&server_addr).await.expect("failed to connect to server:"); +) -> (TcpSender, TcpReceiver) { + let stream = TcpStream::connect(&server_addr) + .await + .expect("failed to connect to server:"); println!("TCP connected"); let mut builder = native_tls::TlsConnector::builder(); @@ -46,12 +67,8 @@ pub async fn connect_tcp( } pub async fn connect_udp( - server_addr: SocketAddr, crypt_state: oneshot::Receiver<ClientCryptState>, -) -> ( - SplitSink<UdpFramed<ClientCryptState>, (VoicePacket<Serverbound>, SocketAddr)>, - SplitStream<UdpFramed<ClientCryptState>> -) { +) -> (UdpSender, UdpReceiver) { // Bind UDP socket let udp_socket = UdpSocket::bind((Ipv6Addr::from(0u128), 0u16)) .await @@ -68,3 +85,201 @@ pub async fn connect_udp( // Wrap the raw UDP packets in Mumble's crypto and voice codec (CryptState does both) UdpFramed::new(udp_socket, crypt_state).split() } + +async fn send_pings(sink: Arc<Mutex<TcpSender>>, delay_seconds: u64) { + let mut interval = time::interval(Duration::from_secs(delay_seconds)); + loop { + interval.tick().await; + println!("Sending ping"); + let msg = msgs::Ping::new(); + sink.lock().unwrap().send(msg.into()).await.unwrap(); + } +} + +async fn authenticate(sink: Arc<Mutex<TcpSender>>, username: String) { + let mut msg = msgs::Authenticate::new(); + msg.set_username(username); + msg.set_opus(true); + sink.lock().unwrap().send(msg.into()).await.unwrap(); +} + +async fn listen_tcp( + sink: Arc<Mutex<TcpSender>>, + mut stream: TcpReceiver, + crypt_state_sender: oneshot::Sender<ClientCryptState>, +) { + let mut crypt_state = None; + let mut crypt_state_sender = Some(crypt_state_sender); + + while let Some(packet) = stream.next().await { + //TODO handle types separately + match packet.unwrap() { + ControlPacket::TextMessage(mut msg) => { + println!( + "Got message from user with session ID {}: {}", + msg.get_actor(), + msg.get_message() + ); + // Send reply back to server + let mut response = msgs::TextMessage::new(); + response.mut_session().push(msg.get_actor()); + response.set_message(msg.take_message()); + let mut lock = sink.lock().unwrap(); + lock.send(response.into()).await.unwrap(); + } + ControlPacket::CryptSetup(msg) => { + println!("crypt setup"); + // Wait until we're fully connected before initiating UDP voice + crypt_state = Some(ClientCryptState::new_from( + msg.get_key() + .try_into() + .expect("Server sent private key with incorrect size"), + msg.get_client_nonce() + .try_into() + .expect("Server sent client_nonce with incorrect size"), + msg.get_server_nonce() + .try_into() + .expect("Server sent server_nonce with incorrect size"), + )); + } + ControlPacket::ServerSync(_) => { + println!("Logged in!"); + if let Some(sender) = crypt_state_sender.take() { + let _ = sender.send( + crypt_state + .take() + .expect("Server didn't send us any CryptSetup packet!"), + ); + } + } + ControlPacket::Reject(msg) => { + println!("Login rejected: {:?}", msg); + } + _ => {} + } + } +} + +pub async fn handle_tcp( + server_addr: SocketAddr, + server_host: String, + username: String, + accept_invalid_cert: bool, + crypt_state_sender: oneshot::Sender<ClientCryptState>, +) { + let (sink, stream) = connect_tcp(server_addr, server_host, accept_invalid_cert).await; + let sink = Arc::new(Mutex::new(sink)); + + // Handshake (omitting `Version` message for brevity) + authenticate(Arc::clone(&sink), username).await; + + println!("Logging in.."); + + join!( + send_pings(Arc::clone(&sink), 10), + listen_tcp(sink, stream, crypt_state_sender), + ); +} + +async fn listen_udp( + _sink: Arc<Mutex<UdpSender>>, + mut source: UdpReceiver, + mut opus_decoder: opus::Decoder, + audio: Audio, +) { + while let Some(packet) = source.next().await { + let (packet, _src_addr) = match packet { + Ok(packet) => packet, + Err(err) => { + eprintln!("Got an invalid UDP packet: {}", err); + // To be expected, considering this is the internet, just ignore it + continue; + } + }; + match packet { + VoicePacket::Ping { .. } => { + // Note: A normal application would handle these and only use UDP for voice + // once it has received one. + continue; + } + VoicePacket::Audio { + // seq_num, + payload, + // position_info, + .. + } => { + match payload { + VoicePacketPayload::Opus(bytes, _eot) => { + let mut out: Vec<f32> = + vec![0.0; bytes.len() * audio.output_config.channels as usize * 4]; + opus_decoder + .decode_float(&bytes[..], &mut out, false) + .expect("error decoding"); + let mut lock = audio.output_buffer.lock().unwrap(); + lock.extend(out); + } + _ => { + unimplemented!("något fint"); + } + } + + // decode paylout and put it in buffer + + // Got audio, naively echo it back + //let reply = VoicePacket::Audio { + // _dst: std::marker::PhantomData, + // target: 0, // normal speech + // session_id: (), // unused for server-bound packets + // seq_num, + // payload, + // position_info, + //}; + //sink.send((reply, src_addr)).await.unwrap(); + } + } + } +} + +async fn send_ping_udp(sink: &mut UdpSender, server_addr: SocketAddr) { + sink.send(( + VoicePacket::Audio { + _dst: std::marker::PhantomData, + target: 0, + session_id: (), + seq_num: 0, + payload: VoicePacketPayload::Opus(Bytes::from([0u8; 128].as_ref()), true), + position_info: None, + }, + server_addr, + )) + .await + .unwrap(); +} + +pub async fn handle_udp( + server_addr: SocketAddr, + crypt_state: oneshot::Receiver<ClientCryptState>, + audio: Audio, +) { + let opus_decoder = opus::Decoder::new( + audio.output_config.sample_rate.0 as u32, + match audio.output_config.channels { + 1 => Channels::Mono, + 2 => Channels::Stereo, + _ => unimplemented!( + "ljudnörd (got {} channels, need 1 or 2)", + audio.output_config.channels + ), + }, + ) + .unwrap(); + + let (mut sink, source) = connect_udp(crypt_state).await; + + // Note: A normal application would also send periodic Ping packets, and its own audio + // via UDP. We instead trick the server into accepting us by sending it one + // dummy voice packet. + send_ping_udp(&mut sink, server_addr).await; + + listen_udp(Arc::new(Mutex::new(sink)), source, opus_decoder, audio).await; +} |
