Added better error handling and .env file

This commit is contained in:
vanten-s 2023-10-15 13:13:07 +02:00
parent 620ad761fd
commit cb87ebe318
Signed by: vanten-s
GPG key ID: DE3060396884D3F2
7 changed files with 143 additions and 61 deletions

7
Cargo.lock generated
View file

@ -379,6 +379,12 @@ dependencies = [
"subtle",
]
[[package]]
name = "dotenv"
version = "0.15.0"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "77c90badedccf4105eca100756a0b1289e191f6fcbdadd3cee1d2f614f97da8f"
[[package]]
name = "ecdsa"
version = "0.16.8"
@ -609,6 +615,7 @@ name = "irc-e2e"
version = "0.1.0"
dependencies = [
"base64",
"dotenv",
"eyre",
"ircparser",
"openssl",

View file

@ -7,6 +7,7 @@ edition = "2021"
[dependencies]
base64 = "0.21.4"
dotenv = "0.15.0"
eyre = "0.6.8"
ircparser = "0.2.1"
openssl = "0.10"

View file

@ -3,18 +3,52 @@ use eyre::Result;
use ircparser;
use std::sync::mpsc::{self, Receiver, Sender};
#[derive(Debug)]
struct IrcParseError;
impl std::fmt::Display for IrcParseError {
fn fmt(&self, _: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
Ok(())
}
}
impl std::error::Error for IrcParseError {}
static MAX_LENGTH: usize = 300;
#[macro_export]
macro_rules! unwrap_or_return_result {
($e:expr) => {
match $e {
Ok(val) => val,
Err(_) => return Ok(()),
}
};
}
#[macro_export]
macro_rules! unwrap_or_return_option {
($e:expr) => {
match $e {
Some(val) => val,
None => return Ok(()),
}
};
}
fn forward(
message: &str,
message: String,
stream: &Sender<String>,
server_local: &str,
server_forward: &str,
) -> Result<(), mpsc::SendError<String>> {
if ircparser::parse(message).unwrap()[0].command == "PRIVMSG" {
return Ok(());
match ircparser::parse(&message) {
Ok(val) => match val[0].command.as_str() {
"PRIVMSG" => stream.send(message),
_ => stream.send(message.replace(&server_local, server_forward)),
},
Err(_) => stream.send(message.replace(server_local, server_forward)),
}
stream.send(message.replace(&server_local, server_forward))
}
pub fn bytes_to_privmsg_base64(message: &Vec<u8>, reciever: &str) -> String {
@ -45,11 +79,11 @@ pub fn send_key(sender: &Sender<String>, reciever: &str, key: &Vec<u8>) -> Resul
Ok(())
}
pub fn get_nick(userstring: &str) -> String {
pub fn get_nick(userstring: &str) -> Option<String> {
let userstring = userstring.chars().collect::<Vec<char>>();
let start_pos = userstring.iter().position(|&x| x == ':').unwrap() + 1;
let end_pos = userstring.iter().position(|&x| x == '!').unwrap();
userstring[start_pos..end_pos].iter().collect::<String>()
let start_pos = userstring.iter().position(|&x| x == ':')? + 1;
let end_pos = userstring.iter().position(|&x| x == '!')?;
Some(userstring[start_pos..end_pos].iter().collect::<String>())
}
pub fn recieve_message_base64(
@ -65,7 +99,13 @@ pub fn recieve_message_base64(
while !message.contains(&end.to_string()) {
let recieved_raw = writer_channel_rx.recv()?;
let recieved = &ircparser::parse(&recieved_raw).unwrap()[0];
let parse_result = ircparser::parse(&recieved_raw);
let recieved = match parse_result {
Ok(mut val) => val.pop_back().unwrap(),
Err(_) => return Err(IrcParseError.into()),
};
let begin_source_reciever = format!(":{sender}!");
if recieved.command != "PRIVMSG"
|| !recieved
@ -75,7 +115,7 @@ pub fn recieve_message_base64(
.starts_with(&begin_source_reciever)
|| recieved.params[0].starts_with("#")
{
forward(&recieved_raw, forward_stream, server_local, server_forward)?;
forward(recieved_raw, forward_stream, server_local, server_forward)?;
continue;
}

View file

@ -1,17 +1,10 @@
use std::io::{ErrorKind, Read, Write};
use std::net::TcpListener;
use std::sync::mpsc;
use std::net::{TcpListener, TcpStream};
use std::sync::mpsc::{self, TryRecvError};
use std::thread;
use std::time::Duration;
pub fn listen_to_client(tx: mpsc::Sender<String>, rx: mpsc::Receiver<String>, port: &str) {
let listener = TcpListener::bind("127.0.0.1:".to_string() + port).unwrap();
let mut stream = listener.accept().unwrap().0;
stream
.set_nonblocking(true)
.expect("Couldn't set nonblocking");
fn stream_handler(tx: &mpsc::Sender<String>, rx: &mpsc::Receiver<String>, mut stream: TcpStream) {
loop {
let mut buffer: Vec<u8> = Vec::new();
let mut buf: [u8; 1] = [0];
@ -24,6 +17,7 @@ pub fn listen_to_client(tx: mpsc::Sender<String>, rx: mpsc::Receiver<String>, po
ErrorKind::WouldBlock => {}
_ => {
dbg!(_error);
return;
}
},
}
@ -31,10 +25,14 @@ pub fn listen_to_client(tx: mpsc::Sender<String>, rx: mpsc::Receiver<String>, po
Ok(value) => {
match stream.write_all(value.as_bytes()) {
Ok(_) => {}
Err(_e) => println!("Couldn't send {value}"),
Err(_e) => {
dbg!(_e);
return;
}
};
}
Err(_e) => {}
Err(TryRecvError::Empty) => {},
Err(TryRecvError::Disconnected) => return,
}
thread::sleep(Duration::from_micros(100));
}
@ -42,3 +40,19 @@ pub fn listen_to_client(tx: mpsc::Sender<String>, rx: mpsc::Receiver<String>, po
let _ = tx.send(String::from_utf8_lossy(&buffer).to_string());
}
}
pub fn listen_to_client(tx: mpsc::Sender<String>, rx: mpsc::Receiver<String>, port: String) {
let listener = TcpListener::bind("127.0.0.1:".to_string() + &port)
.expect(&("Couldn't start listener on 127.0.0.1 port ".to_string() + &port));
loop {
let (stream, ip) = listener.accept().unwrap();
println!("Got connection from {ip}");
stream
.set_nonblocking(true)
.expect("Couldn't set nonblocking");
stream_handler(&tx, &rx, stream);
println!("Closed connection with {ip}");
}
}

View file

@ -1,11 +1,12 @@
use dotenv::{dotenv, vars};
use eyre::Result;
use pgp::{Deserializable, SignedPublicKey, SignedSecretKey};
use std::collections::HashMap;
use std::fs;
use std::net::{Shutdown, TcpStream};
use std::sync::mpsc;
use std::thread;
use std::time::Duration;
use std::{env, fs};
mod client_handler;
mod encryption;
@ -15,13 +16,24 @@ mod server_handler;
mod writer_client;
fn main() -> Result<()> {
let mut args = env::args().collect::<Vec<String>>();
dotenv().expect("Couldn't load .env. It probably doesn't exist");
let mut vars_hashmap = HashMap::new();
let server = args[1].clone();
let port = args[2].clone();
for var in vars() {
vars_hashmap.insert(var.0, var.1);
}
let default_password = String::new();
let passwd = args.pop().unwrap_or(default_password);
let server = &vars_hashmap["SERVER"];
let default_passwd = String::new();
let port = match vars_hashmap.get("PORT") {
Some(val) => val,
None => "6666",
}
.to_string();
let passwd = vars_hashmap.get("PASSWD").unwrap_or(&default_passwd);
let stream = TcpStream::connect(format!("{server}:6697"))?;
@ -52,7 +64,7 @@ fn main() -> Result<()> {
let (writer_channel_recv_tx, writer_channel_rx) = mpsc::channel();
thread::spawn(move || {
listener_server::listen_to_client(listener_channel_send_tx, listener_channel_recv_rx, &port)
listener_server::listen_to_client(listener_channel_send_tx, listener_channel_recv_rx, port)
});
let tmp_server = server.clone();
thread::spawn(|| {
@ -68,16 +80,18 @@ fn main() -> Result<()> {
loop {
match listener_channel_rx.try_recv() {
Ok(message) => client_handler::handle_message_from_client(
Ok(message) => {
let _ = client_handler::handle_message_from_client(
&message,
&public_key,
&server,
server,
&mut keys,
&writer_channel_tx,
&writer_channel_rx,
&listener_channel_tx,
&listener_channel_rx,
)?,
);
}
Err(error) => match error {
mpsc::TryRecvError::Empty => {}
mpsc::TryRecvError::Disconnected => panic!("listener_channel_rx disconnected"),
@ -85,18 +99,20 @@ fn main() -> Result<()> {
};
match writer_channel_rx.try_recv() {
Ok(message) => server_handler::handle_message_from_server(
Ok(message) => {
let _ = server_handler::handle_message_from_server(
&message,
&public_key,
&secret_key,
&server,
&passwd,
server,
passwd,
&mut keys,
&writer_channel_tx,
&writer_channel_rx,
&listener_channel_tx,
&listener_channel_rx,
)?,
);
}
Err(error) => match error {
mpsc::TryRecvError::Empty => {}
mpsc::TryRecvError::Disconnected => panic!("writer_channel_rx disconnected"),

View file

@ -1,3 +1,5 @@
use crate::unwrap_or_return_option;
use crate::unwrap_or_return_result;
use crate::{encryption, helpers};
use eyre::Result;
use pgp::{Deserializable, SignedPublicKey, SignedSecretKey};
@ -9,7 +11,7 @@ fn forward(
listener_channel_tx: &Sender<String>,
server: &str,
) -> Result<(), mpsc::SendError<String>> {
listener_channel_tx.send(message.replace(&server, "127.0.0.1"))
listener_channel_tx.send(message.replace(server, "127.0.0.1"))
}
pub fn handle_message_from_server(
@ -24,14 +26,14 @@ pub fn handle_message_from_server(
listener_channel_tx: &Sender<String>,
_listener_channel_rx: &Receiver<String>,
) -> Result<()> {
let recieved_parsed = &ircparser::parse(&recieved).unwrap()[0];
let recieved_parsed = &unwrap_or_return_result!(ircparser::parse(recieved))[0];
if recieved_parsed.command != "PRIVMSG"
|| recieved_parsed
.params
.get(0)
.unwrap_or(&String::new())
.starts_with("#")
.starts_with('#')
{
forward(recieved, listener_channel_tx, server)?;
return Ok(());
@ -39,30 +41,32 @@ pub fn handle_message_from_server(
dbg!(&recieved_parsed);
let source = unwrap_or_return_option!(&recieved_parsed.source);
if recieved_parsed.params[1] == "START_MESSAGE" {
let sender = helpers::get_nick(&recieved_parsed.source.clone().unwrap());
let sender = unwrap_or_return_option!(helpers::get_nick(source));
let message = helpers::recieve_message_base64(
writer_channel_rx,
listener_channel_tx,
&server,
server,
"127.0.0.1",
&sender,
"END_MESSAGE",
)?; // Get
let message = encryption::decrypt(&secret_key, &message, &passwd)?; // Decrypt
let message = encryption::decrypt(secret_key, &message, passwd)?; // Decrypt
listener_channel_tx.send(recieved.replace("START_MESSAGE", &message))?; // Send
} else if recieved_parsed.params[1] == "START_KEY" {
let sender = helpers::get_nick(&recieved_parsed.source.clone().unwrap());
let to_send = helpers::bytes_to_privmsg_base64(&public_key, &sender);
let sender = unwrap_or_return_option!(helpers::get_nick(source));
let to_send = helpers::bytes_to_privmsg_base64(public_key, &sender);
writer_channel_tx.send(to_send)?;
writer_channel_tx.send(format!("PRIVMSG {sender} END_KEY\r\n"))?;
let foreign_key = helpers::recieve_message_base64(
writer_channel_rx,
listener_channel_tx,
&server,
server,
"127.0.0.1",
&sender,
"END_KEY",

View file

@ -35,7 +35,7 @@ pub fn write_to_server(
}
Err(_error) => match _error.io_error() {
None => {
dbg!(_error);
dbg!(_error.ssl_error());
}
Some(error) => match error.kind() {
ErrorKind::WouldBlock => {}