session.rs 7.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261
  1. use bytes::Bytes;
  2. use crypto::digest::Digest;
  3. use crypto::sha1::Sha1;
  4. use futures::sync::mpsc;
  5. use futures::{Future, Stream, IntoFuture, Poll, Async};
  6. use std::io;
  7. use std::sync::{RwLock, Arc, Weak};
  8. use tokio_core::reactor::{Handle, Remote};
  9. use std::sync::atomic::{AtomicUsize, ATOMIC_USIZE_INIT, Ordering};
  10. use apresolve::apresolve_or_fallback;
  11. use authentication::Credentials;
  12. use cache::Cache;
  13. use component::Lazy;
  14. use connection;
  15. use config::SessionConfig;
  16. use audio_key::AudioKeyManager;
  17. use channel::ChannelManager;
  18. use mercury::MercuryManager;
  19. pub struct SessionData {
  20. country: String,
  21. canonical_username: String,
  22. }
  23. pub struct SessionInternal {
  24. config: SessionConfig,
  25. data: RwLock<SessionData>,
  26. tx_connection: mpsc::UnboundedSender<(u8, Vec<u8>)>,
  27. audio_key: Lazy<AudioKeyManager>,
  28. channel: Lazy<ChannelManager>,
  29. mercury: Lazy<MercuryManager>,
  30. cache: Option<Arc<Cache>>,
  31. handle: Remote,
  32. session_id: usize,
  33. }
  34. static SESSION_COUNTER : AtomicUsize = ATOMIC_USIZE_INIT;
  35. #[derive(Clone)]
  36. pub struct Session(pub Arc<SessionInternal>);
  37. pub fn device_id(name: &str) -> String {
  38. let mut h = Sha1::new();
  39. h.input_str(name);
  40. h.result_str()
  41. }
  42. impl Session {
  43. pub fn connect(config: SessionConfig, credentials: Credentials,
  44. cache: Option<Cache>, handle: Handle)
  45. -> Box<Future<Item=Session, Error=io::Error>>
  46. {
  47. let access_point = apresolve_or_fallback::<io::Error>(&handle);
  48. let handle_ = handle.clone();
  49. let connection = access_point.and_then(move |addr| {
  50. info!("Connecting to AP \"{}\"", addr);
  51. connection::connect::<&str>(&addr, &handle_)
  52. });
  53. let device_id = config.device_id.clone();
  54. let authentication = connection.and_then(move |connection| {
  55. connection::authenticate(connection, credentials, device_id)
  56. });
  57. let result = authentication.map(move |(transport, reusable_credentials)| {
  58. info!("Authenticated as \"{}\" !", reusable_credentials.username);
  59. if let Some(ref cache) = cache {
  60. cache.save_credentials(&reusable_credentials);
  61. }
  62. let (session, task) = Session::create(
  63. &handle, transport, config, cache, reusable_credentials.username.clone()
  64. );
  65. handle.spawn(task.map_err(|e| panic!(e)));
  66. session
  67. });
  68. Box::new(result)
  69. }
  70. fn create(handle: &Handle, transport: connection::Transport,
  71. config: SessionConfig, cache: Option<Cache>, username: String)
  72. -> (Session, Box<Future<Item = (), Error = io::Error>>)
  73. {
  74. let (sink, stream) = transport.split();
  75. let (sender_tx, sender_rx) = mpsc::unbounded();
  76. let session_id = SESSION_COUNTER.fetch_add(1, Ordering::Relaxed);
  77. debug!("new Session[{}]", session_id);
  78. let session = Session(Arc::new(SessionInternal {
  79. config: config,
  80. data: RwLock::new(SessionData {
  81. country: String::new(),
  82. canonical_username: username,
  83. }),
  84. tx_connection: sender_tx,
  85. cache: cache.map(Arc::new),
  86. audio_key: Lazy::new(),
  87. channel: Lazy::new(),
  88. mercury: Lazy::new(),
  89. handle: handle.remote().clone(),
  90. session_id: session_id,
  91. }));
  92. let sender_task = sender_rx
  93. .map_err(|e| -> io::Error { panic!(e) })
  94. .forward(sink).map(|_| ());
  95. let receiver_task = DispatchTask(stream, session.weak());
  96. let task = Box::new((receiver_task, sender_task).into_future()
  97. .map(|((), ())| ()));
  98. (session, task)
  99. }
  100. pub fn audio_key(&self) -> &AudioKeyManager {
  101. self.0.audio_key.get(|| AudioKeyManager::new(self.weak()))
  102. }
  103. pub fn channel(&self) -> &ChannelManager {
  104. self.0.channel.get(|| ChannelManager::new(self.weak()))
  105. }
  106. pub fn mercury(&self) -> &MercuryManager {
  107. self.0.mercury.get(|| MercuryManager::new(self.weak()))
  108. }
  109. pub fn spawn<F, R>(&self, f: F)
  110. where F: FnOnce(&Handle) -> R + Send + 'static,
  111. R: IntoFuture<Item=(), Error=()>,
  112. R::Future: 'static
  113. {
  114. self.0.handle.spawn(f)
  115. }
  116. fn debug_info(&self) {
  117. debug!("Session[{}] strong={} weak={}",
  118. self.0.session_id, Arc::strong_count(&self.0), Arc::weak_count(&self.0));
  119. }
  120. #[cfg_attr(feature = "cargo-clippy", allow(match_same_arms))]
  121. fn dispatch(&self, cmd: u8, data: Bytes) {
  122. match cmd {
  123. 0x4 => {
  124. self.debug_info();
  125. self.send_packet(0x49, data.as_ref().to_owned());
  126. },
  127. 0x4a => (),
  128. 0x1b => {
  129. let country = String::from_utf8(data.as_ref().to_owned()).unwrap();
  130. info!("Country: {:?}", country);
  131. self.0.data.write().unwrap().country = country;
  132. }
  133. 0x9 | 0xa => self.channel().dispatch(cmd, data),
  134. 0xd | 0xe => self.audio_key().dispatch(cmd, data),
  135. 0xb2...0xb6 => self.mercury().dispatch(cmd, data),
  136. _ => (),
  137. }
  138. }
  139. pub fn send_packet(&self, cmd: u8, data: Vec<u8>) {
  140. self.0.tx_connection.unbounded_send((cmd, data)).unwrap();
  141. }
  142. pub fn cache(&self) -> Option<&Arc<Cache>> {
  143. self.0.cache.as_ref()
  144. }
  145. fn config(&self) -> &SessionConfig {
  146. &self.0.config
  147. }
  148. pub fn username(&self) -> String {
  149. self.0.data.read().unwrap().canonical_username.clone()
  150. }
  151. pub fn country(&self) -> String {
  152. self.0.data.read().unwrap().country.clone()
  153. }
  154. pub fn device_id(&self) -> &str {
  155. &self.config().device_id
  156. }
  157. fn weak(&self) -> SessionWeak {
  158. SessionWeak(Arc::downgrade(&self.0))
  159. }
  160. pub fn session_id(&self) -> usize {
  161. self.0.session_id
  162. }
  163. }
  164. #[derive(Clone)]
  165. pub struct SessionWeak(pub Weak<SessionInternal>);
  166. impl SessionWeak {
  167. fn try_upgrade(&self) -> Option<Session> {
  168. self.0.upgrade().map(Session)
  169. }
  170. pub(crate) fn upgrade(&self) -> Session {
  171. self.try_upgrade().expect("Session died")
  172. }
  173. }
  174. impl Drop for SessionInternal {
  175. fn drop(&mut self) {
  176. debug!("drop Session[{}]", self.session_id);
  177. }
  178. }
  179. struct DispatchTask<S>(S, SessionWeak)
  180. where S: Stream<Item = (u8, Bytes)>;
  181. impl <S> Future for DispatchTask<S>
  182. where S: Stream<Item = (u8, Bytes)>
  183. {
  184. type Item = ();
  185. type Error = S::Error;
  186. fn poll(&mut self) -> Poll<Self::Item, Self::Error> {
  187. let session = match self.1.try_upgrade() {
  188. Some(session) => session,
  189. None => {
  190. return Ok(Async::Ready(()))
  191. },
  192. };
  193. loop {
  194. let (cmd, data) = try_ready!(self.0.poll()).expect("connection closed");
  195. session.dispatch(cmd, data);
  196. }
  197. }
  198. }
  199. impl <S> Drop for DispatchTask<S>
  200. where S: Stream<Item = (u8, Bytes)>
  201. {
  202. fn drop(&mut self) {
  203. debug!("drop Dispatch");
  204. }
  205. }