|
| 1 | +from websockets.asyncio.server import serve |
| 2 | +from logging import info, warning |
| 3 | +import base64 |
| 4 | +import json |
| 5 | +import asyncio |
| 6 | + |
| 7 | +from .crypto import decrypt_data, encrypt_data |
| 8 | +from .users import get_users |
| 9 | +from . import get_from_env |
| 10 | +from . import commands |
| 11 | + |
| 12 | +async def init() -> None: |
| 13 | + # Getting info from environment |
| 14 | + addr = get_from_env.get_addr() |
| 15 | + info(f"Using address: {addr}") |
| 16 | + |
| 17 | + port = get_from_env.get_port() |
| 18 | + info(f"Using port: {port}") |
| 19 | + |
| 20 | + # Start command reader task |
| 21 | + asyncio.create_task(commands.start_command_reader()) |
| 22 | + |
| 23 | + print("Server starting! Type 'help' for available commands.") |
| 24 | + |
| 25 | + # Start serving |
| 26 | + await start_websocket_server(addr, port) |
| 27 | + |
| 28 | +async def handler(websocket) -> None: |
| 29 | + try: |
| 30 | + async for message in websocket: |
| 31 | + info(f"Received msg: {message}") |
| 32 | + response = await process(message) |
| 33 | + await websocket.send(response) |
| 34 | + info(f"Sent msg: {response}") |
| 35 | + except Exception as e: |
| 36 | + warning(f"Handler error: {repr(e)}") |
| 37 | + |
| 38 | + |
| 39 | +async def start_websocket_server(addr: str, port: int) -> None: |
| 40 | + async with serve(handler, addr, port) as server: |
| 41 | + await server.serve_forever() |
| 42 | + |
| 43 | + |
| 44 | +async def process(message: str) -> str: |
| 45 | + users = get_users() |
| 46 | + |
| 47 | + try: |
| 48 | + # Decode base64 message and parse JSON |
| 49 | + json_request = base64.b64decode(message).decode("utf-8") |
| 50 | + request = json.loads(json_request) |
| 51 | + info(f"Request: {request}") |
| 52 | + |
| 53 | + # Validate UUID |
| 54 | + if "uuid" not in request or request["uuid"] not in users: |
| 55 | + return "Invalid UUID" |
| 56 | + |
| 57 | + # Decrypt incoming data with server's private key |
| 58 | + encrypted_names = base64.b64decode(request["raw"]) |
| 59 | + server_private_key = base64.b64decode(users[request["uuid"]]["secret"]) |
| 60 | + |
| 61 | + decrypted_names = decrypt_data(server_private_key, encrypted_names) |
| 62 | + |
| 63 | + # Process decrypted names |
| 64 | + result = [] |
| 65 | + for encoded_name in decrypted_names.split("|"): |
| 66 | + if encoded_name: # Check for empty strings |
| 67 | + import sys |
| 68 | + from os import path |
| 69 | + sys.path.append(path.join(path.dirname(__file__), '..')) |
| 70 | + from services import VersionFinder |
| 71 | + |
| 72 | + finder = VersionFinder() |
| 73 | + |
| 74 | + name = base64.b64decode(encoded_name).decode("utf-8") |
| 75 | + |
| 76 | + res = finder.find_version(name) |
| 77 | + |
| 78 | + result.append(res) |
| 79 | + |
| 80 | + # Prepare JSON response |
| 81 | + response_json = json.dumps({"status": "success", "software": result}) |
| 82 | + |
| 83 | + # Encrypt response with client's public key |
| 84 | + client_public_key = base64.b64decode(users[request["uuid"]]["public_key"]) |
| 85 | + encrypted_response = encrypt_data(client_public_key, response_json.encode("utf-8")) |
| 86 | + |
| 87 | + # Return base64-encoded encrypted response |
| 88 | + return base64.b64encode(encrypted_response).decode("utf-8") |
| 89 | + |
| 90 | + except json.JSONDecodeError: |
| 91 | + return "Bad JSON in request" |
| 92 | + except KeyError: |
| 93 | + return "Bad Key in JSON" |
| 94 | + except ValueError as e: |
| 95 | + if "padding" in str(e): |
| 96 | + return "Bad Base64 in request" |
| 97 | + return f"Processing error: {str(e)}" |
| 98 | + except Exception as e: |
| 99 | + return f"Error: {repr(e)}" |
0 commit comments