This commit is contained in:
vanten-s 2023-10-07 13:27:38 +02:00
parent cc36c3dce5
commit 91539e2efe
Signed by: vanten-s
GPG key ID: DE3060396884D3F2
3 changed files with 35 additions and 38 deletions

View file

@ -1,15 +1,14 @@
use std::io::{self, Read, Write}; use std::io::{ErrorKind, Read, Write};
use std::net::TcpListener; use std::net::TcpListener;
use std::sync::mpsc; use std::sync::mpsc;
use std::time::Duration;
pub fn listen_to_client(tx: mpsc::Sender<String>, rx: mpsc::Receiver<String>, port: &str) { pub fn listen_to_client(tx: mpsc::Sender<String>, rx: mpsc::Receiver<String>, port: &str) {
let listener = TcpListener::bind("127.0.0.1:".to_string() + port).unwrap(); let listener = TcpListener::bind("127.0.0.1:".to_string() + port).unwrap();
let mut stream = listener.accept().unwrap().0; let mut stream = listener.accept().unwrap().0;
stream stream
.set_read_timeout(Some(Duration::from_millis(10))) .set_nonblocking(true)
.expect("Couldn't set timeout!!"); .expect("Couldn't set nonblocking");
loop { loop {
let mut buffer: Vec<u8> = Vec::new(); let mut buffer: Vec<u8> = Vec::new();
@ -18,17 +17,17 @@ pub fn listen_to_client(tx: mpsc::Sender<String>, rx: mpsc::Receiver<String>, po
while buf[0] != newline { while buf[0] != newline {
match stream.read(&mut buf) { match stream.read(&mut buf) {
Ok(_length) => { Ok(_length) => buffer.push(buf[0]),
buffer.push(buf[0]);
}
Err(_error) => match _error.kind() { Err(_error) => match _error.kind() {
io::ErrorKind::TimedOut => {} ErrorKind::WouldBlock => {},
_ => {} _ => {
dbg!(_error);
}
}, },
} }
match rx.try_recv() { match rx.try_recv() {
Ok(value) => { Ok(value) => {
dbg!(&value);
match stream.write_all(value.as_bytes()) { match stream.write_all(value.as_bytes()) {
Ok(_) => {} Ok(_) => {}
Err(_e) => println!("Couldn't send {value}"), Err(_e) => println!("Couldn't send {value}"),

View file

@ -10,9 +10,7 @@ use std::sync::mpsc;
use std::thread; use std::thread;
use std::{env, fs}; use std::{env, fs};
mod encryption;
mod listener_server; mod listener_server;
mod message_stream;
mod writer_client; mod writer_client;
macro_rules! try_recv { macro_rules! try_recv {
@ -127,7 +125,7 @@ fn main() -> Result<(), Box<dyn std::error::Error>> {
}); });
let mut keys: HashMap<String, SignedPublicKey> = HashMap::new(); let mut keys: HashMap<String, SignedPublicKey> = HashMap::new();
let mut userstring: Option<String> = None; let mut userstring = String::new();
loop { loop {
let recieved = try_recv!(listener_channel_rx); let recieved = try_recv!(listener_channel_rx);
@ -138,9 +136,12 @@ fn main() -> Result<(), Box<dyn std::error::Error>> {
if command.command == "PRIVMSG" && !command.params[0].starts_with("#") { if command.command == "PRIVMSG" && !command.params[0].starts_with("#") {
let reciever = &command.params[0]; let reciever = &command.params[0];
if !keys.contains_key(reciever) { if !keys.contains_key(reciever) {
dbg!(recieved);
writer_channel_tx.send(format!("PRIVMSG {reciever} :START_KEY\r\n"))?; writer_channel_tx.send(format!("PRIVMSG {reciever} :START_KEY\r\n"))?;
userstring = ircparser::parse(&writer_channel_rx.recv()?).unwrap()[0]
.source
.clone()
.unwrap();
writer_channel_tx writer_channel_tx
.send(bytes_to_privmsg_base64(public_key.clone(), reciever))?; .send(bytes_to_privmsg_base64(public_key.clone(), reciever))?;
writer_channel_tx.send(format!("PRIVMSG {reciever} :END_KEY\r\n"))?; writer_channel_tx.send(format!("PRIVMSG {reciever} :END_KEY\r\n"))?;
@ -162,7 +163,7 @@ fn main() -> Result<(), Box<dyn std::error::Error>> {
continue; continue;
} }
foreign_key.push(dbg!(recieved.params[1].clone())); foreign_key.push(recieved.params[1].clone());
} }
foreign_key.pop(); foreign_key.pop();
println!("Got a foreign key from {reciever}"); println!("Got a foreign key from {reciever}");
@ -170,8 +171,12 @@ fn main() -> Result<(), Box<dyn std::error::Error>> {
let foreign_key = general_purpose::STANDARD.decode(foreign_key)?; let foreign_key = general_purpose::STANDARD.decode(foreign_key)?;
dbg!("It's decoded");
let key = SignedPublicKey::from_bytes(foreign_key.as_slice())?; let key = SignedPublicKey::from_bytes(foreign_key.as_slice())?;
dbg!("And I now got it's SignedPublicKey format");
keys.insert(reciever.to_string(), key); keys.insert(reciever.to_string(), key);
} }
@ -184,14 +189,12 @@ fn main() -> Result<(), Box<dyn std::error::Error>> {
))?; ))?;
writer_channel_tx.send(format!("PRIVMSG {reciever} END_MESSAGE\r\n"))?; writer_channel_tx.send(format!("PRIVMSG {reciever} END_MESSAGE\r\n"))?;
} else { } else {
dbg!(&recieved);
writer_channel_tx.send(recieved.replace("127.0.0.1", &server))?; writer_channel_tx.send(recieved.replace("127.0.0.1", &server))?;
} }
} }
let recieved = try_recv!(writer_channel_rx); let recieved = try_recv!(writer_channel_rx);
if !recieved.is_empty() { if !recieved.is_empty() {
dbg!(&recieved);
let recieved_parsed = &ircparser::parse(&recieved).unwrap()[0]; let recieved_parsed = &ircparser::parse(&recieved).unwrap()[0];
if recieved_parsed.command != "PRIVMSG" if recieved_parsed.command != "PRIVMSG"

View file

@ -2,7 +2,6 @@ use openssl::ssl::{SslConnector, SslMethod};
use std::io::{ErrorKind, Write}; use std::io::{ErrorKind, Write};
use std::net::TcpStream; use std::net::TcpStream;
use std::sync::mpsc; use std::sync::mpsc;
use std::time::Duration;
pub fn write_to_server( pub fn write_to_server(
tcp_stream: TcpStream, tcp_stream: TcpStream,
@ -10,15 +9,16 @@ pub fn write_to_server(
rx: mpsc::Receiver<String>, rx: mpsc::Receiver<String>,
tx: mpsc::Sender<String>, tx: mpsc::Sender<String>,
) { ) {
tcp_stream
.set_read_timeout(Some(Duration::from_millis(10)))
.expect("Couldn't set timeout!!");
let connector = SslConnector::builder(SslMethod::tls()).unwrap().build(); let connector = SslConnector::builder(SslMethod::tls()).unwrap().build();
let mut stream = connector let mut stream = connector
.connect(&server, &tcp_stream) .connect(&server, tcp_stream)
.expect("Couldn't start TLS"); .expect("Couldn't start TLS");
stream
.get_mut()
.set_nonblocking(true)
.expect("Failed to set nonblocking");
loop { loop {
let mut buffer: Vec<u8> = Vec::new(); let mut buffer: Vec<u8> = Vec::new();
let mut buf: [u8; 1] = [0]; let mut buf: [u8; 1] = [0];
@ -27,15 +27,15 @@ pub fn write_to_server(
while buf[0] != newline { while buf[0] != newline {
match stream.ssl_read(&mut buf) { match stream.ssl_read(&mut buf) {
Ok(_length) => { Ok(_length) => {
if _length > 0 {
buffer.push(buf[0]); buffer.push(buf[0]);
} }
}
Err(_error) => match _error.io_error() { Err(_error) => match _error.io_error() {
None => { None => {
dbg!(_error); dbg!(_error);
panic!("TLS Error")
} }
Some(error) => match error.kind() { Some(error) => match error.kind() {
ErrorKind::TimedOut => {}
ErrorKind::WouldBlock => {} ErrorKind::WouldBlock => {}
_ => { _ => {
dbg!(error.kind()); dbg!(error.kind());
@ -44,18 +44,13 @@ pub fn write_to_server(
}, },
}, },
} }
let value = rx.try_recv().unwrap_or("".to_string());
match rx.try_recv() {
Ok(value) => {
match stream.write_all(value.as_bytes()) { match stream.write_all(value.as_bytes()) {
Ok(_) => {} Ok(_) => {}
Err(_e) => println!("Couldn't send {value}"), Err(_e) => println!("Couldn't send {value}"),
}; };
} }
Err(_e) => {}
}
}
let _ = tx.send(String::from_utf8_lossy(&buffer).to_string()); let _ = tx.send(dbg!(String::from_utf8_lossy(&buffer).to_string()));
} }
} }