ws.go 4.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160
  1. package ws
  2. import (
  3. "encoding/json"
  4. "fmt"
  5. "github.com/gorilla/websocket"
  6. "goseg/auth"
  7. "goseg/broadcast"
  8. "goseg/config"
  9. "goseg/structs"
  10. "net/http"
  11. "time"
  12. )
  13. var (
  14. upgrader = websocket.Upgrader{
  15. ReadBufferSize: 1024,
  16. WriteBufferSize: 1024,
  17. }
  18. )
  19. // func handleConnection(c *websocket.Conn) {
  20. // // Read the first message from the client which should be the token
  21. // messageType, p, err := c.ReadMessage()
  22. // if err != nil {
  23. // config.Logger.Error(fmt.Errorf("%v",err))
  24. // return
  25. // }
  26. // token := string(p)
  27. // // Verify the token
  28. // isValid, _, err := CheckToken(token, c, false) // 'false' assumes it's not a setup
  29. // if !isValid || err != nil {
  30. // config.Logger.Info("Invalid token provided by client.")
  31. // c.Close()
  32. // return
  33. // }
  34. // // rest of logic
  35. // }
  36. // switch on ws event cases
  37. func WsHandler(w http.ResponseWriter, r *http.Request) {
  38. conn, err := upgrader.Upgrade(w, r, nil)
  39. if err != nil {
  40. config.Logger.Error(fmt.Sprintf("Couldn't upgrade websocket connection: %v", err))
  41. return
  42. }
  43. // manage broadcasts and clients thru the broadcast package
  44. broadcast.RegisterClient(conn)
  45. defer broadcast.UnregisterClient(conn)
  46. // keepalive for ws
  47. conn.SetPongHandler(func(string) error {
  48. conn.SetReadDeadline(time.Now().Add(60 * time.Second))
  49. return nil
  50. })
  51. pingInterval := 15 * time.Second
  52. go func() {
  53. ticker := time.NewTicker(pingInterval)
  54. defer ticker.Stop()
  55. for {
  56. select {
  57. case <-ticker.C:
  58. if err := conn.WriteMessage(websocket.PingMessage, nil); err != nil {
  59. return
  60. }
  61. }
  62. }
  63. }()
  64. for {
  65. _, msg, err := conn.ReadMessage()
  66. if err != nil {
  67. return
  68. }
  69. var prelim structs.WsType
  70. var payload structs.WsPayload
  71. if err := json.Unmarshal(msg, &prelim); err != nil {
  72. fmt.Println("Error unmarshalling message:", err)
  73. continue
  74. }
  75. switch prelim.Payload.Type {
  76. case "login":
  77. if err = loginHandler(msg, payload); err != nil {
  78. config.Logger.Error(fmt.Sprintf("%v", err))
  79. }
  80. case "verify":
  81. if err = verifyHandler(msg, payload, r, conn); err != nil {
  82. config.Logger.Error(fmt.Sprintf("%v", err))
  83. }
  84. case "setup":
  85. config.Logger.Info("Setup")
  86. // setup.Setup(payload)
  87. case "new_ship":
  88. config.Logger.Info("New ship")
  89. case "pier_upload":
  90. config.Logger.Info("Pier upload")
  91. case "password":
  92. config.Logger.Info("Password")
  93. case "system":
  94. config.Logger.Info("System")
  95. case "startram":
  96. config.Logger.Info("StarTram")
  97. case "urbit":
  98. config.Logger.Info("Urbit")
  99. case "support":
  100. config.Logger.Info("Support")
  101. case "broadcast":
  102. if err := broadcast.BroadcastToClients(); err != nil {
  103. errmsg := fmt.Sprintf("Unable to broadcast to peer(s): %v", err)
  104. config.Logger.Error(errmsg)
  105. }
  106. default:
  107. errmsg := fmt.Sprintf("Unknown request type: %s", prelim.Payload.Type)
  108. config.Logger.Warn(errmsg)
  109. }
  110. }
  111. }
  112. // validate password and add to auth session map
  113. func loginHandler(msg []byte, payload structs.WsPayload) error {
  114. config.Logger.Info("Login")
  115. now := time.Now().Format("2006-01-02_15:04:05")
  116. payload.Payload = structs.WsLoginPayload{}
  117. if err := json.Unmarshal(msg, &payload); err != nil {
  118. return fmt.Errorf("Error unmarshalling message: %v", err)
  119. }
  120. loginPayload, ok := payload.Payload.(structs.WsLoginPayload)
  121. if !ok {
  122. return fmt.Errorf("Error casting to LoginPayload")
  123. }
  124. isAuthenticated := auth.AuthenticateLogin(loginPayload.Password)
  125. if isAuthenticated {
  126. if err := auth.AddSession(payload.Token.ID, payload.Token.Token, now, true); err != nil {
  127. return fmt.Errorf("Unable to process login: %v", err)
  128. }
  129. } else {
  130. config.Logger.Info("Login failed")
  131. }
  132. return nil
  133. }
  134. // create tokens for those who have not auth
  135. func verifyHandler(msg []byte, payload structs.WsPayload, r *http.Request, conn *websocket.Conn) error {
  136. config.Logger.Info("Verify")
  137. payload.Payload = structs.WsLoginPayload{}
  138. // if we can't unmarshal, assume no token
  139. if err := json.Unmarshal(msg, &payload); err != nil {
  140. resp, err := auth.CreateToken(conn, r, false)
  141. if err != nil {
  142. fmt.Errorf("Couldn't create token: %v", err)
  143. }
  144. respJson, err := json.Marshal(resp)
  145. if err != nil {
  146. return fmt.Errorf("Error marshalling token: %v", err)
  147. }
  148. if err := conn.WriteMessage(websocket.TextMessage, respJson); err != nil {
  149. return fmt.Errorf("Error writing response: %v", err)
  150. }
  151. }
  152. return nil
  153. }