gopenfusion/core/protocol/cnpeer.go

149 lines
3.1 KiB
Go
Raw Normal View History

package protocol
2023-03-05 08:14:36 +00:00
import (
"encoding/binary"
"fmt"
"io"
2023-03-05 08:14:36 +00:00
"log"
"net"
"github.com/CPunch/gopenfusion/core/protocol/pool"
2023-03-05 08:14:36 +00:00
)
const (
USE_E = iota
USE_FE
)
2023-03-09 22:42:13 +00:00
type PeerHandler interface {
HandlePacket(peer *CNPeer, typeID uint32, pkt Packet) error
Disconnect(peer *CNPeer)
}
// CNPeer is a simple wrapper for net.Conn connections to send/recv packets over the Fusionfall packet protocol.
type CNPeer struct {
conn net.Conn
handler PeerHandler
SzID string
E_key []byte
FE_key []byte
AccountID int
whichKey int
alive bool
2023-03-05 08:14:36 +00:00
}
func NewCNPeer(handler PeerHandler, conn net.Conn) *CNPeer {
return &CNPeer{
conn: conn,
handler: handler,
SzID: "",
E_key: []byte(DEFAULT_KEY),
FE_key: nil,
AccountID: -1,
whichKey: USE_E,
alive: true,
2023-03-05 08:14:36 +00:00
}
}
func (peer *CNPeer) Send(typeID uint32, data ...interface{}) error {
// grab buffer from pool
buf := pool.Get()
defer pool.Put(buf)
// body start
pkt := NewPacket(buf)
2023-03-05 08:14:36 +00:00
// encode type id
if err := pkt.Encode(typeID); err != nil {
return err
}
2023-03-05 08:14:36 +00:00
// encode data
for _, trailer := range data {
if err := pkt.Encode(trailer); err != nil {
return err
}
}
2023-03-05 08:14:36 +00:00
// encrypt body
switch peer.whichKey {
case USE_E:
EncryptData(buf.Bytes(), peer.E_key)
case USE_FE:
EncryptData(buf.Bytes(), peer.FE_key)
}
2023-03-05 08:14:36 +00:00
// write packet size
if err := binary.Write(peer.conn, binary.LittleEndian, uint32(buf.Len())); err != nil {
return err
}
// write packet body
log.Printf("Sending %#v, sizeof: %d", data, buf.Len())
if _, err := peer.conn.Write(buf.Bytes()); err != nil {
return fmt.Errorf("[FATAL] failed to write packet body! %v", err)
2023-03-05 08:14:36 +00:00
}
return nil
2023-03-05 08:14:36 +00:00
}
func (peer *CNPeer) Kill() {
if !peer.alive {
return
}
peer.alive = false
peer.conn.Close()
peer.handler.Disconnect(peer)
}
// meant to be invoked as a goroutine
func (peer *CNPeer) Handler() {
defer peer.Kill()
2023-03-05 08:14:36 +00:00
for {
// read packet size, the goroutine spends most of it's time parked here
var sz uint32
if err := binary.Read(peer.conn, binary.LittleEndian, &sz); err != nil {
log.Printf("[FATAL] failed to read packet size! %v\n", err)
return
2023-03-05 08:14:36 +00:00
}
2023-03-07 00:39:41 +00:00
// client should never send a packet size outside of this range
if sz > CN_PACKET_BUFFER_SIZE || sz < 4 {
log.Printf("[FATAL] malicious packet size received! %d", sz)
return
2023-03-07 00:39:41 +00:00
}
// grab buffer && read packet body
if err := func() error { // we wrap this in a closure so we can easily defer the buffer return to pool
buf := pool.Get()
defer pool.Put(buf)
if _, err := buf.ReadFrom(io.LimitReader(peer.conn, int64(sz))); err != nil {
return fmt.Errorf("failed to read packet body! %v", err)
}
// decrypt
DecryptData(buf.Bytes(), peer.E_key)
pkt := NewPacket(buf)
// create packet && read typeID
var typeID uint32
if err := pkt.Decode(&typeID); err != nil {
return fmt.Errorf("failed to read packet type! %v", err)
}
// dispatch packet
log.Printf("Got packet ID: %x, with a sizeof: %d\n", typeID, sz)
if err := peer.handler.HandlePacket(peer, typeID, pkt); err != nil {
return err
}
return nil
}(); err != nil {
log.Printf("[FATAL] %v", err)
return
}
2023-03-05 08:14:36 +00:00
}
}