Implement Songbird driver configuration (#1074)
This commit is contained in:
@@ -1,10 +1,81 @@
|
|||||||
use super::CryptoMode;
|
use super::{CryptoMode, DecodeMode};
|
||||||
|
|
||||||
/// Configuration for the inner Driver.
|
/// Configuration for the inner Driver.
|
||||||
///
|
///
|
||||||
/// At present, this cannot be changed.
|
#[derive(Clone, Debug)]
|
||||||
#[derive(Clone, Debug, Default)]
|
|
||||||
pub struct Config {
|
pub struct Config {
|
||||||
/// Selected tagging mode for voice packet encryption.
|
/// Selected tagging mode for voice packet encryption.
|
||||||
pub crypto_mode: Option<CryptoMode>,
|
///
|
||||||
|
/// Defaults to [`CryptoMode::Normal`].
|
||||||
|
///
|
||||||
|
/// Changes to this field will not immediately apply if the
|
||||||
|
/// driver is actively connected, but will apply to subsequent
|
||||||
|
/// sessions.
|
||||||
|
///
|
||||||
|
/// [`CryptoMode::Normal`]: enum.CryptoMode.html#variant.Normal
|
||||||
|
pub crypto_mode: CryptoMode,
|
||||||
|
/// Configures whether decoding and decryption occur for all received packets.
|
||||||
|
///
|
||||||
|
/// If voice receiving voice packets, generally you should choose [`DecodeMode::Decode`].
|
||||||
|
/// [`DecodeMode::Decrypt`] is intended for users running their own selective decoding,
|
||||||
|
/// who rely upon [user speaking events], or who need to inspect Opus packets.
|
||||||
|
/// If you're certain you will never need any RT(C)P events, then consider [`DecodeMode::Pass`].
|
||||||
|
///
|
||||||
|
/// Defaults to [`DecodeMode::Decrypt`]. This is due to per-packet decoding costs,
|
||||||
|
/// which most users will not want to pay, but allowing speaking events which are commonly used.
|
||||||
|
///
|
||||||
|
/// [`DecodeMode::Decode`]: enum.DecodeMode.html#variant.Decode
|
||||||
|
/// [`DecodeMode::Decrypt`]: enum.DecodeMode.html#variant.Decrypt
|
||||||
|
/// [`DecodeMode::Pass`]: enum.DecodeMode.html#variant.Pass
|
||||||
|
/// [user speaking events]: ../events/enum.CoreEvent.html#variant.SpeakingUpdate
|
||||||
|
pub decode_mode: DecodeMode,
|
||||||
|
/// Number of concurrently active tracks to allocate memory for.
|
||||||
|
///
|
||||||
|
/// This should be set at, or just above, the maximum number of tracks
|
||||||
|
/// you expect your bot will play at the same time. Exceeding the size of
|
||||||
|
/// the internal queue will trigger a larger memory allocation and copy,
|
||||||
|
/// possibly causing the mixer thread to miss a packet deadline.
|
||||||
|
///
|
||||||
|
/// Defaults to `1`.
|
||||||
|
///
|
||||||
|
/// Changes to this field in a running driver will only ever increase
|
||||||
|
/// the capacity of the track store.
|
||||||
|
pub preallocated_tracks: usize,
|
||||||
|
}
|
||||||
|
|
||||||
|
impl Default for Config {
|
||||||
|
fn default() -> Self {
|
||||||
|
Self {
|
||||||
|
crypto_mode: CryptoMode::Normal,
|
||||||
|
decode_mode: DecodeMode::Decrypt,
|
||||||
|
preallocated_tracks: 1,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
impl Config {
|
||||||
|
/// Sets this `Config`'s chosen cryptographic tagging scheme.
|
||||||
|
pub fn crypto_mode(mut self, crypto_mode: CryptoMode) -> Self {
|
||||||
|
self.crypto_mode = crypto_mode;
|
||||||
|
self
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Sets this `Config`'s received packet decryption/decoding behaviour.
|
||||||
|
pub fn decode_mode(mut self, decode_mode: DecodeMode) -> Self {
|
||||||
|
self.decode_mode = decode_mode;
|
||||||
|
self
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Sets this `Config`'s number of tracks to preallocate.
|
||||||
|
pub fn preallocated_tracks(mut self, preallocated_tracks: usize) -> Self {
|
||||||
|
self.preallocated_tracks = preallocated_tracks;
|
||||||
|
self
|
||||||
|
}
|
||||||
|
|
||||||
|
/// This is used to prevent changes which would invalidate the current session.
|
||||||
|
pub(crate) fn make_safe(&mut self, previous: &Config, connected: bool) {
|
||||||
|
if connected {
|
||||||
|
self.crypto_mode = previous.crypto_mode;
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -41,8 +41,6 @@ impl Connection {
|
|||||||
interconnect: &Interconnect,
|
interconnect: &Interconnect,
|
||||||
config: &Config,
|
config: &Config,
|
||||||
) -> Result<Connection> {
|
) -> Result<Connection> {
|
||||||
let crypto_mode = config.crypto_mode.unwrap_or(CryptoMode::Normal);
|
|
||||||
|
|
||||||
let url = generate_url(&mut info.endpoint)?;
|
let url = generate_url(&mut info.endpoint)?;
|
||||||
|
|
||||||
#[cfg(all(feature = "rustls", not(feature = "native")))]
|
#[cfg(all(feature = "rustls", not(feature = "native")))]
|
||||||
@@ -95,7 +93,7 @@ impl Connection {
|
|||||||
let ready =
|
let ready =
|
||||||
ready.expect("Ready packet expected in connection initialisation, but not found.");
|
ready.expect("Ready packet expected in connection initialisation, but not found.");
|
||||||
|
|
||||||
if !has_valid_mode(&ready.modes, crypto_mode) {
|
if !has_valid_mode(&ready.modes, config.crypto_mode) {
|
||||||
return Err(Error::CryptoModeUnavailable);
|
return Err(Error::CryptoModeUnavailable);
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -147,14 +145,14 @@ impl Connection {
|
|||||||
protocol: "udp".into(),
|
protocol: "udp".into(),
|
||||||
data: ProtocolData {
|
data: ProtocolData {
|
||||||
address,
|
address,
|
||||||
mode: crypto_mode.to_request_str().into(),
|
mode: config.crypto_mode.to_request_str().into(),
|
||||||
port: view.get_port(),
|
port: view.get_port(),
|
||||||
},
|
},
|
||||||
}))
|
}))
|
||||||
.await?;
|
.await?;
|
||||||
}
|
}
|
||||||
|
|
||||||
let cipher = init_cipher(&mut client, crypto_mode).await?;
|
let cipher = init_cipher(&mut client, config.crypto_mode).await?;
|
||||||
|
|
||||||
info!("Connected to: {}", info.endpoint);
|
info!("Connected to: {}", info.endpoint);
|
||||||
|
|
||||||
@@ -169,6 +167,7 @@ impl Connection {
|
|||||||
|
|
||||||
let mix_conn = MixerConnection {
|
let mix_conn = MixerConnection {
|
||||||
cipher: cipher.clone(),
|
cipher: cipher.clone(),
|
||||||
|
crypto_state: config.crypto_mode.into(),
|
||||||
udp_rx: udp_receiver_msg_tx,
|
udp_rx: udp_receiver_msg_tx,
|
||||||
udp_tx: udp_sender_msg_tx,
|
udp_tx: udp_sender_msg_tx,
|
||||||
};
|
};
|
||||||
@@ -193,7 +192,7 @@ impl Connection {
|
|||||||
interconnect.clone(),
|
interconnect.clone(),
|
||||||
udp_receiver_msg_rx,
|
udp_receiver_msg_rx,
|
||||||
cipher,
|
cipher,
|
||||||
crypto_mode,
|
config.clone(),
|
||||||
udp_rx,
|
udp_rx,
|
||||||
));
|
));
|
||||||
tokio::spawn(udp_tx::runner(udp_sender_msg_rx, ssrc, udp_tx));
|
tokio::spawn(udp_tx::runner(udp_sender_msg_rx, ssrc, udp_tx));
|
||||||
|
|||||||
@@ -1,38 +1,223 @@
|
|||||||
//! Encryption schemes supported by Discord's secure RTP negotiation.
|
//! Encryption schemes supported by Discord's secure RTP negotiation.
|
||||||
|
use byteorder::{NetworkEndian, WriteBytesExt};
|
||||||
|
use discortp::{rtp::RtpPacket, MutablePacket};
|
||||||
|
use rand::Rng;
|
||||||
|
use std::num::Wrapping;
|
||||||
|
use xsalsa20poly1305::{
|
||||||
|
aead::{AeadInPlace, Error as CryptoError},
|
||||||
|
Nonce,
|
||||||
|
Tag,
|
||||||
|
XSalsa20Poly1305 as Cipher,
|
||||||
|
NONCE_SIZE,
|
||||||
|
TAG_SIZE,
|
||||||
|
};
|
||||||
|
|
||||||
/// Variants of the XSalsa20Poly1305 encryption scheme.
|
/// Variants of the XSalsa20Poly1305 encryption scheme.
|
||||||
///
|
|
||||||
/// At present, only `Normal` is supported or selectable.
|
|
||||||
#[derive(Clone, Copy, Debug, Eq, PartialEq)]
|
#[derive(Clone, Copy, Debug, Eq, PartialEq)]
|
||||||
#[non_exhaustive]
|
#[non_exhaustive]
|
||||||
pub enum Mode {
|
pub enum CryptoMode {
|
||||||
/// The RTP header is used as the source of nonce bytes for the packet.
|
/// The RTP header is used as the source of nonce bytes for the packet.
|
||||||
///
|
///
|
||||||
/// Equivalent to a nonce of at most 48b (6B) at no extra packet overhead:
|
/// Equivalent to a nonce of at most 48b (6B) at no extra packet overhead:
|
||||||
/// the RTP sequence number and timestamp are the varying quantities.
|
/// the RTP sequence number and timestamp are the varying quantities.
|
||||||
Normal,
|
Normal,
|
||||||
/// An additional random 24B suffix is used as the source of nonce bytes for the packet.
|
/// An additional random 24B suffix is used as the source of nonce bytes for the packet.
|
||||||
|
/// This is regenerated randomly for each packet.
|
||||||
///
|
///
|
||||||
/// Full nonce width of 24B (192b), at an extra 24B per packet (~1.2 kB/s).
|
/// Full nonce width of 24B (192b), at an extra 24B per packet (~1.2 kB/s).
|
||||||
Suffix,
|
Suffix,
|
||||||
/// An additional random 24B suffix is used as the source of nonce bytes for the packet.
|
/// An additional random 4B suffix is used as the source of nonce bytes for the packet.
|
||||||
|
/// This nonce value increments by `1` with each packet.
|
||||||
///
|
///
|
||||||
/// Nonce width of 4B (32b), at an extra 4B per packet (~0.2 kB/s).
|
/// Nonce width of 4B (32b), at an extra 4B per packet (~0.2 kB/s).
|
||||||
Lite,
|
Lite,
|
||||||
}
|
}
|
||||||
|
|
||||||
impl Mode {
|
impl From<CryptoState> for CryptoMode {
|
||||||
|
fn from(val: CryptoState) -> Self {
|
||||||
|
use CryptoState::*;
|
||||||
|
match val {
|
||||||
|
Normal => CryptoMode::Normal,
|
||||||
|
Suffix => CryptoMode::Suffix,
|
||||||
|
Lite(_) => CryptoMode::Lite,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
impl CryptoMode {
|
||||||
/// Returns the name of a mode as it will appear during negotiation.
|
/// Returns the name of a mode as it will appear during negotiation.
|
||||||
pub fn to_request_str(self) -> &'static str {
|
pub fn to_request_str(self) -> &'static str {
|
||||||
use Mode::*;
|
use CryptoMode::*;
|
||||||
match self {
|
match self {
|
||||||
Normal => "xsalsa20_poly1305",
|
Normal => "xsalsa20_poly1305",
|
||||||
Suffix => "xsalsa20_poly1305_suffix",
|
Suffix => "xsalsa20_poly1305_suffix",
|
||||||
Lite => "xsalsa20_poly1305_lite",
|
Lite => "xsalsa20_poly1305_lite",
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/// Returns the number of bytes each nonce is stored as within
|
||||||
|
/// a packet.
|
||||||
|
pub fn nonce_size(self) -> usize {
|
||||||
|
use CryptoMode::*;
|
||||||
|
match self {
|
||||||
|
Normal => RtpPacket::minimum_packet_size(),
|
||||||
|
Suffix => NONCE_SIZE,
|
||||||
|
Lite => 4,
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// TODO: implement encrypt + decrypt + nonce selection for each.
|
/// Returns the number of bytes occupied by the encryption scheme
|
||||||
// This will probably need some research into correct handling of
|
/// which fall before the payload.
|
||||||
// padding, reported length, SRTP profiles, and so on.
|
pub fn payload_prefix_len(self) -> usize {
|
||||||
|
TAG_SIZE
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Returns the number of bytes occupied by the encryption scheme
|
||||||
|
/// which fall after the payload.
|
||||||
|
pub fn payload_suffix_len(self) -> usize {
|
||||||
|
use CryptoMode::*;
|
||||||
|
match self {
|
||||||
|
Normal => 0,
|
||||||
|
Suffix | Lite => self.nonce_size(),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Calculates the number of additional bytes required compared
|
||||||
|
/// to an unencrypted payload.
|
||||||
|
pub fn payload_overhead(self) -> usize {
|
||||||
|
self.payload_prefix_len() + self.payload_suffix_len()
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Extracts the byte slice in a packet used as the nonce, and the remaining mutable
|
||||||
|
/// portion of the packet.
|
||||||
|
fn nonce_slice<'a>(self, header: &'a [u8], body: &'a mut [u8]) -> (&'a [u8], &'a mut [u8]) {
|
||||||
|
use CryptoMode::*;
|
||||||
|
match self {
|
||||||
|
Normal => (header, body),
|
||||||
|
Suffix | Lite => {
|
||||||
|
let len = body.len();
|
||||||
|
let (body_left, nonce_loc) = body.split_at_mut(len - self.payload_suffix_len());
|
||||||
|
(&nonce_loc[..self.nonce_size()], body_left)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Decrypts a Discord RT(C)P packet using the given key.
|
||||||
|
///
|
||||||
|
/// If successful, this returns the number of bytes to be ignored from the
|
||||||
|
/// start and end of the packet payload.
|
||||||
|
#[inline]
|
||||||
|
pub(crate) fn decrypt_in_place(
|
||||||
|
self,
|
||||||
|
packet: &mut impl MutablePacket,
|
||||||
|
cipher: &Cipher,
|
||||||
|
) -> Result<(usize, usize), CryptoError> {
|
||||||
|
let header_len = packet.packet().len() - packet.payload().len();
|
||||||
|
let (header, body) = packet.packet_mut().split_at_mut(header_len);
|
||||||
|
let (slice_to_use, body_remaining) = self.nonce_slice(header, body);
|
||||||
|
|
||||||
|
let mut nonce = Nonce::default();
|
||||||
|
let nonce_slice = if slice_to_use.len() == NONCE_SIZE {
|
||||||
|
Nonce::from_slice(&slice_to_use[..NONCE_SIZE])
|
||||||
|
} else {
|
||||||
|
let max_bytes_avail = slice_to_use.len();
|
||||||
|
nonce[..self.nonce_size().min(max_bytes_avail)].copy_from_slice(slice_to_use);
|
||||||
|
&nonce
|
||||||
|
};
|
||||||
|
|
||||||
|
let body_start = self.payload_prefix_len();
|
||||||
|
let body_tail = self.payload_suffix_len();
|
||||||
|
|
||||||
|
let (tag_bytes, data_bytes) = body_remaining.split_at_mut(body_start);
|
||||||
|
let tag = Tag::from_slice(tag_bytes);
|
||||||
|
|
||||||
|
Ok(cipher
|
||||||
|
.decrypt_in_place_detached(nonce_slice, b"", data_bytes, tag)
|
||||||
|
.map(|_| (body_start, body_tail))?)
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Encrypts a Discord RT(C)P packet using the given key.
|
||||||
|
///
|
||||||
|
/// Use of this requires that the input packet has had a nonce generated in the correct location,
|
||||||
|
/// and `payload_len` specifies the number of bytes after the header including this nonce.
|
||||||
|
#[inline]
|
||||||
|
pub fn encrypt_in_place(
|
||||||
|
self,
|
||||||
|
packet: &mut impl MutablePacket,
|
||||||
|
cipher: &Cipher,
|
||||||
|
payload_len: usize,
|
||||||
|
) -> Result<(), CryptoError> {
|
||||||
|
let header_len = packet.packet().len() - packet.payload().len();
|
||||||
|
let (header, body) = packet.packet_mut().split_at_mut(header_len);
|
||||||
|
let (slice_to_use, body_remaining) = self.nonce_slice(header, &mut body[..payload_len]);
|
||||||
|
|
||||||
|
let mut nonce = Nonce::default();
|
||||||
|
let nonce_slice = if slice_to_use.len() == NONCE_SIZE {
|
||||||
|
Nonce::from_slice(&slice_to_use[..NONCE_SIZE])
|
||||||
|
} else {
|
||||||
|
nonce[..self.nonce_size()].copy_from_slice(slice_to_use);
|
||||||
|
&nonce
|
||||||
|
};
|
||||||
|
|
||||||
|
// body_remaining is now correctly truncated by this point.
|
||||||
|
// the true_payload to encrypt follows after the first TAG_LEN bytes.
|
||||||
|
let tag =
|
||||||
|
cipher.encrypt_in_place_detached(nonce_slice, b"", &mut body_remaining[TAG_SIZE..])?;
|
||||||
|
body_remaining[..TAG_SIZE].copy_from_slice(&tag[..]);
|
||||||
|
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
#[derive(Clone, Copy, Debug, Eq, PartialEq)]
|
||||||
|
#[non_exhaustive]
|
||||||
|
pub(crate) enum CryptoState {
|
||||||
|
Normal,
|
||||||
|
Suffix,
|
||||||
|
Lite(Wrapping<u32>),
|
||||||
|
}
|
||||||
|
|
||||||
|
impl From<CryptoMode> for CryptoState {
|
||||||
|
fn from(val: CryptoMode) -> Self {
|
||||||
|
use CryptoMode::*;
|
||||||
|
match val {
|
||||||
|
Normal => CryptoState::Normal,
|
||||||
|
Suffix => CryptoState::Suffix,
|
||||||
|
Lite => CryptoState::Lite(Wrapping(rand::random::<u32>())),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
impl CryptoState {
|
||||||
|
/// Writes packet nonce into the body, if required, returning the new length.
|
||||||
|
pub fn write_packet_nonce(
|
||||||
|
&mut self,
|
||||||
|
packet: &mut impl MutablePacket,
|
||||||
|
payload_end: usize,
|
||||||
|
) -> usize {
|
||||||
|
let mode = self.kind();
|
||||||
|
let endpoint = payload_end + mode.payload_suffix_len();
|
||||||
|
|
||||||
|
use CryptoState::*;
|
||||||
|
match self {
|
||||||
|
Suffix => {
|
||||||
|
rand::thread_rng().fill(&mut packet.payload_mut()[payload_end..endpoint]);
|
||||||
|
},
|
||||||
|
Lite(mut i) => {
|
||||||
|
(&mut packet.payload_mut()[payload_end..endpoint])
|
||||||
|
.write_u32::<NetworkEndian>(i.0)
|
||||||
|
.expect(
|
||||||
|
"Nonce size is guaranteed to be sufficient to write u32 for lite tagging.",
|
||||||
|
);
|
||||||
|
i += Wrapping(1);
|
||||||
|
},
|
||||||
|
_ => {},
|
||||||
|
}
|
||||||
|
|
||||||
|
endpoint
|
||||||
|
}
|
||||||
|
|
||||||
|
pub fn kind(&self) -> CryptoMode {
|
||||||
|
CryptoMode::from(*self)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|||||||
32
src/driver/decode_mode.rs
Normal file
32
src/driver/decode_mode.rs
Normal file
@@ -0,0 +1,32 @@
|
|||||||
|
/// Decode behaviour for received RTP packets within the driver.
|
||||||
|
#[derive(Clone, Copy, Debug, Eq, PartialEq)]
|
||||||
|
#[non_exhaustive]
|
||||||
|
pub enum DecodeMode {
|
||||||
|
/// Packets received from Discord are handed over to events without any
|
||||||
|
/// changes applied.
|
||||||
|
///
|
||||||
|
/// No CPU work involved.
|
||||||
|
///
|
||||||
|
/// *BEWARE: this will almost certainly break [user speaking events].
|
||||||
|
/// Silent frame detection only works if extensions can be parsed or
|
||||||
|
/// are not present, as they are encrypted.
|
||||||
|
/// This event requires such functionality.*
|
||||||
|
///
|
||||||
|
/// [user speaking events]: ../events/enum.CoreEvent.html#variant.SpeakingUpdate
|
||||||
|
Pass,
|
||||||
|
/// Decrypts the body of each received packet.
|
||||||
|
///
|
||||||
|
/// Small per-packet CPU use.
|
||||||
|
Decrypt,
|
||||||
|
/// Decrypts and decodes each received packet, correctly accounting for losses.
|
||||||
|
///
|
||||||
|
/// Larger per-packet CPU use.
|
||||||
|
Decode,
|
||||||
|
}
|
||||||
|
|
||||||
|
impl DecodeMode {
|
||||||
|
/// Returns whether this mode will decrypt received packets.
|
||||||
|
pub fn should_decrypt(self) -> bool {
|
||||||
|
self != DecodeMode::Pass
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -11,11 +11,13 @@
|
|||||||
mod config;
|
mod config;
|
||||||
pub(crate) mod connection;
|
pub(crate) mod connection;
|
||||||
mod crypto;
|
mod crypto;
|
||||||
|
mod decode_mode;
|
||||||
pub(crate) mod tasks;
|
pub(crate) mod tasks;
|
||||||
|
|
||||||
pub use config::Config;
|
pub use config::Config;
|
||||||
use connection::error::Result;
|
use connection::error::Result;
|
||||||
pub use crypto::Mode as CryptoMode;
|
pub use crypto::*;
|
||||||
|
pub use decode_mode::DecodeMode;
|
||||||
|
|
||||||
use crate::{
|
use crate::{
|
||||||
events::EventData,
|
events::EventData,
|
||||||
@@ -187,6 +189,13 @@ impl Driver {
|
|||||||
self.send(CoreMessage::SetTrack(None))
|
self.send(CoreMessage::SetTrack(None))
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/// Sets the configuration for this driver.
|
||||||
|
#[instrument(skip(self))]
|
||||||
|
pub fn set_config(&mut self, config: Config) {
|
||||||
|
self.config = config.clone();
|
||||||
|
self.send(CoreMessage::SetConfig(config))
|
||||||
|
}
|
||||||
|
|
||||||
/// Attach a global event handler to an audio context. Global events may receive
|
/// Attach a global event handler to an audio context. Global events may receive
|
||||||
/// any [`EventContext`].
|
/// any [`EventContext`].
|
||||||
///
|
///
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
use crate::{
|
use crate::{
|
||||||
driver::connection::error::Error,
|
driver::{connection::error::Error, Config},
|
||||||
events::EventData,
|
events::EventData,
|
||||||
tracks::Track,
|
tracks::Track,
|
||||||
Bitrate,
|
Bitrate,
|
||||||
@@ -16,6 +16,7 @@ pub enum CoreMessage {
|
|||||||
AddTrack(Track),
|
AddTrack(Track),
|
||||||
SetBitrate(Bitrate),
|
SetBitrate(Bitrate),
|
||||||
AddEvent(EventData),
|
AddEvent(EventData),
|
||||||
|
SetConfig(Config),
|
||||||
Mute(bool),
|
Mute(bool),
|
||||||
Reconnect,
|
Reconnect,
|
||||||
FullReconnect,
|
FullReconnect,
|
||||||
|
|||||||
@@ -1,11 +1,16 @@
|
|||||||
use super::{Interconnect, UdpRxMessage, UdpTxMessage, WsMessage};
|
use super::{Interconnect, UdpRxMessage, UdpTxMessage, WsMessage};
|
||||||
|
|
||||||
use crate::{tracks::Track, Bitrate};
|
use crate::{
|
||||||
|
driver::{Config, CryptoState},
|
||||||
|
tracks::Track,
|
||||||
|
Bitrate,
|
||||||
|
};
|
||||||
use flume::Sender;
|
use flume::Sender;
|
||||||
use xsalsa20poly1305::XSalsa20Poly1305 as Cipher;
|
use xsalsa20poly1305::XSalsa20Poly1305 as Cipher;
|
||||||
|
|
||||||
pub(crate) struct MixerConnection {
|
pub(crate) struct MixerConnection {
|
||||||
pub cipher: Cipher,
|
pub cipher: Cipher,
|
||||||
|
pub crypto_state: CryptoState,
|
||||||
pub udp_rx: Sender<UdpRxMessage>,
|
pub udp_rx: Sender<UdpRxMessage>,
|
||||||
pub udp_tx: Sender<UdpTxMessage>,
|
pub udp_tx: Sender<UdpTxMessage>,
|
||||||
}
|
}
|
||||||
@@ -20,13 +25,17 @@ impl Drop for MixerConnection {
|
|||||||
pub(crate) enum MixerMessage {
|
pub(crate) enum MixerMessage {
|
||||||
AddTrack(Track),
|
AddTrack(Track),
|
||||||
SetTrack(Option<Track>),
|
SetTrack(Option<Track>),
|
||||||
|
|
||||||
SetBitrate(Bitrate),
|
SetBitrate(Bitrate),
|
||||||
|
SetConfig(Config),
|
||||||
SetMute(bool),
|
SetMute(bool),
|
||||||
|
|
||||||
SetConn(MixerConnection, u32),
|
SetConn(MixerConnection, u32),
|
||||||
|
Ws(Option<Sender<WsMessage>>),
|
||||||
DropConn,
|
DropConn,
|
||||||
|
|
||||||
ReplaceInterconnect(Interconnect),
|
ReplaceInterconnect(Interconnect),
|
||||||
RebuildEncoder,
|
RebuildEncoder,
|
||||||
|
|
||||||
Ws(Option<Sender<WsMessage>>),
|
|
||||||
Poison,
|
Poison,
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,6 +1,8 @@
|
|||||||
use super::Interconnect;
|
use super::Interconnect;
|
||||||
|
use crate::driver::Config;
|
||||||
|
|
||||||
pub(crate) enum UdpRxMessage {
|
pub(crate) enum UdpRxMessage {
|
||||||
|
SetConfig(Config),
|
||||||
ReplaceInterconnect(Interconnect),
|
ReplaceInterconnect(Interconnect),
|
||||||
|
|
||||||
Poison,
|
Poison,
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
use super::{error::Result, message::*};
|
use super::{error::Result, message::*, Config};
|
||||||
use crate::{
|
use crate::{
|
||||||
constants::*,
|
constants::*,
|
||||||
tracks::{PlayMode, Track},
|
tracks::{PlayMode, Track},
|
||||||
@@ -13,7 +13,6 @@ use audiopus::{
|
|||||||
use discortp::{
|
use discortp::{
|
||||||
rtp::{MutableRtpPacket, RtpPacket},
|
rtp::{MutableRtpPacket, RtpPacket},
|
||||||
MutablePacket,
|
MutablePacket,
|
||||||
Packet,
|
|
||||||
};
|
};
|
||||||
use flume::{Receiver, Sender, TryRecvError};
|
use flume::{Receiver, Sender, TryRecvError};
|
||||||
use rand::random;
|
use rand::random;
|
||||||
@@ -21,11 +20,12 @@ use spin_sleep::SpinSleeper;
|
|||||||
use std::time::Instant;
|
use std::time::Instant;
|
||||||
use tokio::runtime::Handle;
|
use tokio::runtime::Handle;
|
||||||
use tracing::{error, instrument};
|
use tracing::{error, instrument};
|
||||||
use xsalsa20poly1305::{aead::AeadInPlace, Nonce, TAG_SIZE};
|
use xsalsa20poly1305::TAG_SIZE;
|
||||||
|
|
||||||
struct Mixer {
|
struct Mixer {
|
||||||
async_handle: Handle,
|
async_handle: Handle,
|
||||||
bitrate: Bitrate,
|
bitrate: Bitrate,
|
||||||
|
config: Config,
|
||||||
conn_active: Option<MixerConnection>,
|
conn_active: Option<MixerConnection>,
|
||||||
deadline: Instant,
|
deadline: Instant,
|
||||||
encoder: OpusEncoder,
|
encoder: OpusEncoder,
|
||||||
@@ -53,6 +53,7 @@ impl Mixer {
|
|||||||
mix_rx: Receiver<MixerMessage>,
|
mix_rx: Receiver<MixerMessage>,
|
||||||
async_handle: Handle,
|
async_handle: Handle,
|
||||||
interconnect: Interconnect,
|
interconnect: Interconnect,
|
||||||
|
config: Config,
|
||||||
) -> Self {
|
) -> Self {
|
||||||
let bitrate = DEFAULT_BITRATE;
|
let bitrate = DEFAULT_BITRATE;
|
||||||
let encoder = new_encoder(bitrate)
|
let encoder = new_encoder(bitrate)
|
||||||
@@ -70,9 +71,12 @@ impl Mixer {
|
|||||||
rtp.set_sequence(random::<u16>().into());
|
rtp.set_sequence(random::<u16>().into());
|
||||||
rtp.set_timestamp(random::<u32>().into());
|
rtp.set_timestamp(random::<u32>().into());
|
||||||
|
|
||||||
|
let tracks = Vec::with_capacity(1.max(config.preallocated_tracks));
|
||||||
|
|
||||||
Self {
|
Self {
|
||||||
async_handle,
|
async_handle,
|
||||||
bitrate,
|
bitrate,
|
||||||
|
config,
|
||||||
conn_active: None,
|
conn_active: None,
|
||||||
deadline: Instant::now(),
|
deadline: Instant::now(),
|
||||||
encoder,
|
encoder,
|
||||||
@@ -84,7 +88,7 @@ impl Mixer {
|
|||||||
silence_frames: 0,
|
silence_frames: 0,
|
||||||
sleeper: Default::default(),
|
sleeper: Default::default(),
|
||||||
soft_clip,
|
soft_clip,
|
||||||
tracks: vec![],
|
tracks,
|
||||||
ws: None,
|
ws: None,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -137,6 +141,8 @@ impl Mixer {
|
|||||||
(Blame: VOICE_PACKET_MAX?)",
|
(Blame: VOICE_PACKET_MAX?)",
|
||||||
);
|
);
|
||||||
rtp.set_ssrc(ssrc);
|
rtp.set_ssrc(ssrc);
|
||||||
|
rtp.set_sequence(random::<u16>().into());
|
||||||
|
rtp.set_timestamp(random::<u32>().into());
|
||||||
self.deadline = Instant::now();
|
self.deadline = Instant::now();
|
||||||
Ok(())
|
Ok(())
|
||||||
},
|
},
|
||||||
@@ -160,6 +166,23 @@ impl Mixer {
|
|||||||
|
|
||||||
self.rebuild_tracks()
|
self.rebuild_tracks()
|
||||||
},
|
},
|
||||||
|
Ok(SetConfig(new_config)) => {
|
||||||
|
self.config = new_config.clone();
|
||||||
|
|
||||||
|
if self.tracks.capacity() < self.config.preallocated_tracks {
|
||||||
|
self.tracks
|
||||||
|
.reserve(self.config.preallocated_tracks - self.tracks.len());
|
||||||
|
}
|
||||||
|
|
||||||
|
if let Some(conn) = &self.conn_active {
|
||||||
|
conn_failure |= conn
|
||||||
|
.udp_rx
|
||||||
|
.send(UdpRxMessage::SetConfig(new_config))
|
||||||
|
.is_err();
|
||||||
|
}
|
||||||
|
|
||||||
|
Ok(())
|
||||||
|
},
|
||||||
Ok(RebuildEncoder) => match new_encoder(self.bitrate) {
|
Ok(RebuildEncoder) => match new_encoder(self.bitrate) {
|
||||||
Ok(encoder) => {
|
Ok(encoder) => {
|
||||||
self.encoder = encoder;
|
self.encoder = encoder;
|
||||||
@@ -449,38 +472,38 @@ impl Mixer {
|
|||||||
.as_mut()
|
.as_mut()
|
||||||
.expect("Shouldn't be mixing packets without access to a cipher + UDP dest.");
|
.expect("Shouldn't be mixing packets without access to a cipher + UDP dest.");
|
||||||
|
|
||||||
let mut nonce = Nonce::default();
|
|
||||||
let index = {
|
let index = {
|
||||||
let mut rtp = MutableRtpPacket::new(&mut self.packet[..]).expect(
|
let mut rtp = MutableRtpPacket::new(&mut self.packet[..]).expect(
|
||||||
"FATAL: Too few bytes in self.packet for RTP header.\
|
"FATAL: Too few bytes in self.packet for RTP header.\
|
||||||
(Blame: VOICE_PACKET_MAX?)",
|
(Blame: VOICE_PACKET_MAX?)",
|
||||||
);
|
);
|
||||||
|
|
||||||
let pkt = rtp.packet();
|
|
||||||
let rtp_len = RtpPacket::minimum_packet_size();
|
|
||||||
nonce[..rtp_len].copy_from_slice(&pkt[..rtp_len]);
|
|
||||||
|
|
||||||
let payload = rtp.payload_mut();
|
let payload = rtp.payload_mut();
|
||||||
|
let crypto_mode = conn.crypto_state.kind();
|
||||||
|
|
||||||
let payload_len = if opus_frame.is_empty() {
|
let payload_len = if opus_frame.is_empty() {
|
||||||
self.encoder
|
let total_payload_space = payload.len() - crypto_mode.payload_suffix_len();
|
||||||
.encode_float(&buffer[..STEREO_FRAME_SIZE], &mut payload[TAG_SIZE..])?
|
self.encoder.encode_float(
|
||||||
|
&buffer[..STEREO_FRAME_SIZE],
|
||||||
|
&mut payload[TAG_SIZE..total_payload_space],
|
||||||
|
)?
|
||||||
} else {
|
} else {
|
||||||
let len = opus_frame.len();
|
let len = opus_frame.len();
|
||||||
payload[TAG_SIZE..TAG_SIZE + len].clone_from_slice(opus_frame);
|
payload[TAG_SIZE..TAG_SIZE + len].clone_from_slice(opus_frame);
|
||||||
len
|
len
|
||||||
};
|
};
|
||||||
|
|
||||||
let final_payload_size = TAG_SIZE + payload_len;
|
let final_payload_size = conn
|
||||||
|
.crypto_state
|
||||||
|
.write_packet_nonce(&mut rtp, TAG_SIZE + payload_len);
|
||||||
|
|
||||||
let tag = conn.cipher.encrypt_in_place_detached(
|
conn.crypto_state.kind().encrypt_in_place(
|
||||||
&nonce,
|
&mut rtp,
|
||||||
b"",
|
&conn.cipher,
|
||||||
&mut payload[TAG_SIZE..final_payload_size],
|
final_payload_size,
|
||||||
)?;
|
)?;
|
||||||
payload[..TAG_SIZE].copy_from_slice(&tag[..]);
|
|
||||||
|
|
||||||
rtp_len + final_payload_size
|
RtpPacket::minimum_packet_size() + final_payload_size
|
||||||
};
|
};
|
||||||
|
|
||||||
// TODO: This is dog slow, don't do this.
|
// TODO: This is dog slow, don't do this.
|
||||||
@@ -509,8 +532,9 @@ pub(crate) fn runner(
|
|||||||
interconnect: Interconnect,
|
interconnect: Interconnect,
|
||||||
mix_rx: Receiver<MixerMessage>,
|
mix_rx: Receiver<MixerMessage>,
|
||||||
async_handle: Handle,
|
async_handle: Handle,
|
||||||
|
config: Config,
|
||||||
) {
|
) {
|
||||||
let mut mixer = Mixer::new(mix_rx, async_handle, interconnect);
|
let mut mixer = Mixer::new(mix_rx, async_handle, interconnect, config);
|
||||||
|
|
||||||
mixer.run();
|
mixer.run();
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -23,7 +23,7 @@ pub(crate) fn start(config: Config, rx: Receiver<CoreMessage>, tx: Sender<CoreMe
|
|||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
fn start_internals(core: Sender<CoreMessage>) -> Interconnect {
|
fn start_internals(core: Sender<CoreMessage>, config: Config) -> Interconnect {
|
||||||
let (evt_tx, evt_rx) = flume::unbounded();
|
let (evt_tx, evt_rx) = flume::unbounded();
|
||||||
let (mix_tx, mix_rx) = flume::unbounded();
|
let (mix_tx, mix_rx) = flume::unbounded();
|
||||||
|
|
||||||
@@ -44,7 +44,7 @@ fn start_internals(core: Sender<CoreMessage>) -> Interconnect {
|
|||||||
let handle = Handle::current();
|
let handle = Handle::current();
|
||||||
std::thread::spawn(move || {
|
std::thread::spawn(move || {
|
||||||
info!("Mixer started.");
|
info!("Mixer started.");
|
||||||
mixer::runner(ic, mix_rx, handle);
|
mixer::runner(ic, mix_rx, handle, config);
|
||||||
info!("Mixer finished.");
|
info!("Mixer finished.");
|
||||||
});
|
});
|
||||||
|
|
||||||
@@ -52,13 +52,23 @@ fn start_internals(core: Sender<CoreMessage>) -> Interconnect {
|
|||||||
}
|
}
|
||||||
|
|
||||||
#[instrument(skip(rx, tx))]
|
#[instrument(skip(rx, tx))]
|
||||||
async fn runner(config: Config, rx: Receiver<CoreMessage>, tx: Sender<CoreMessage>) {
|
async fn runner(mut config: Config, rx: Receiver<CoreMessage>, tx: Sender<CoreMessage>) {
|
||||||
|
let mut next_config: Option<Config> = None;
|
||||||
let mut connection = None;
|
let mut connection = None;
|
||||||
let mut interconnect = start_internals(tx);
|
let mut interconnect = start_internals(tx, config.clone());
|
||||||
|
|
||||||
loop {
|
loop {
|
||||||
match rx.recv_async().await {
|
match rx.recv_async().await {
|
||||||
Ok(CoreMessage::ConnectWithResult(info, tx)) => {
|
Ok(CoreMessage::ConnectWithResult(info, tx)) => {
|
||||||
|
config = if let Some(new_config) = next_config.take() {
|
||||||
|
let _ = interconnect
|
||||||
|
.mixer
|
||||||
|
.send(MixerMessage::SetConfig(new_config.clone()));
|
||||||
|
new_config
|
||||||
|
} else {
|
||||||
|
config
|
||||||
|
};
|
||||||
|
|
||||||
connection = match Connection::new(info, &interconnect, &config).await {
|
connection = match Connection::new(info, &interconnect, &config).await {
|
||||||
Ok(connection) => {
|
Ok(connection) => {
|
||||||
// Other side may not be listening: this is fine.
|
// Other side may not be listening: this is fine.
|
||||||
@@ -87,6 +97,13 @@ async fn runner(config: Config, rx: Receiver<CoreMessage>, tx: Sender<CoreMessag
|
|||||||
Ok(CoreMessage::SetBitrate(b)) => {
|
Ok(CoreMessage::SetBitrate(b)) => {
|
||||||
let _ = interconnect.mixer.send(MixerMessage::SetBitrate(b));
|
let _ = interconnect.mixer.send(MixerMessage::SetBitrate(b));
|
||||||
},
|
},
|
||||||
|
Ok(CoreMessage::SetConfig(mut new_config)) => {
|
||||||
|
next_config = Some(new_config.clone());
|
||||||
|
|
||||||
|
new_config.make_safe(&config, connection.is_some());
|
||||||
|
|
||||||
|
let _ = interconnect.mixer.send(MixerMessage::SetConfig(new_config));
|
||||||
|
},
|
||||||
Ok(CoreMessage::AddEvent(evt)) => {
|
Ok(CoreMessage::AddEvent(evt)) => {
|
||||||
let _ = interconnect.events.send(EventMessage::AddGlobalEvent(evt));
|
let _ = interconnect.events.send(EventMessage::AddGlobalEvent(evt));
|
||||||
},
|
},
|
||||||
|
|||||||
@@ -2,13 +2,16 @@ use super::{
|
|||||||
error::{Error, Result},
|
error::{Error, Result},
|
||||||
message::*,
|
message::*,
|
||||||
};
|
};
|
||||||
use crate::{constants::*, driver::CryptoMode, events::CoreContext};
|
use crate::{
|
||||||
|
constants::*,
|
||||||
|
driver::{Config, DecodeMode},
|
||||||
|
events::CoreContext,
|
||||||
|
};
|
||||||
use audiopus::{coder::Decoder as OpusDecoder, Channels};
|
use audiopus::{coder::Decoder as OpusDecoder, Channels};
|
||||||
use discortp::{
|
use discortp::{
|
||||||
demux::{self, DemuxedMut},
|
demux::{self, DemuxedMut},
|
||||||
rtp::{RtpExtensionPacket, RtpPacket},
|
rtp::{RtpExtensionPacket, RtpPacket},
|
||||||
FromPacket,
|
FromPacket,
|
||||||
MutablePacket,
|
|
||||||
Packet,
|
Packet,
|
||||||
PacketSize,
|
PacketSize,
|
||||||
};
|
};
|
||||||
@@ -16,7 +19,7 @@ use flume::Receiver;
|
|||||||
use std::collections::HashMap;
|
use std::collections::HashMap;
|
||||||
use tokio::net::udp::RecvHalf;
|
use tokio::net::udp::RecvHalf;
|
||||||
use tracing::{error, info, instrument, warn};
|
use tracing::{error, info, instrument, warn};
|
||||||
use xsalsa20poly1305::{aead::AeadInPlace, Nonce, Tag, XSalsa20Poly1305 as Cipher, TAG_SIZE};
|
use xsalsa20poly1305::XSalsa20Poly1305 as Cipher;
|
||||||
|
|
||||||
#[derive(Debug)]
|
#[derive(Debug)]
|
||||||
struct SsrcState {
|
struct SsrcState {
|
||||||
@@ -46,19 +49,38 @@ impl SsrcState {
|
|||||||
&mut self,
|
&mut self,
|
||||||
pkt: RtpPacket<'_>,
|
pkt: RtpPacket<'_>,
|
||||||
data_offset: usize,
|
data_offset: usize,
|
||||||
) -> Result<(SpeakingDelta, Vec<i16>)> {
|
data_trailer: usize,
|
||||||
|
decode_mode: DecodeMode,
|
||||||
|
decrypted: bool,
|
||||||
|
) -> Result<(SpeakingDelta, Option<Vec<i16>>)> {
|
||||||
let new_seq: u16 = pkt.get_sequence().into();
|
let new_seq: u16 = pkt.get_sequence().into();
|
||||||
|
let payload_len = pkt.payload().len();
|
||||||
|
|
||||||
let extensions = pkt.get_extension() != 0;
|
let extensions = pkt.get_extension() != 0;
|
||||||
let seq_delta = new_seq.wrapping_sub(self.last_seq);
|
let seq_delta = new_seq.wrapping_sub(self.last_seq);
|
||||||
Ok(if seq_delta >= (1 << 15) {
|
Ok(if seq_delta >= (1 << 15) {
|
||||||
// Overflow, reordered (previously missing) packet.
|
// Overflow, reordered (previously missing) packet.
|
||||||
(SpeakingDelta::Same, vec![])
|
(SpeakingDelta::Same, Some(vec![]))
|
||||||
} else {
|
} else {
|
||||||
self.last_seq = new_seq;
|
self.last_seq = new_seq;
|
||||||
let missed_packets = seq_delta.saturating_sub(1);
|
let missed_packets = seq_delta.saturating_sub(1);
|
||||||
let (audio, pkt_size) =
|
|
||||||
self.scan_and_decode(&pkt.payload()[data_offset..], extensions, missed_packets)?;
|
// Note: we still need to handle this for non-decoded.
|
||||||
|
// This is mainly because packet events and speaking events can be handed to the
|
||||||
|
// user.
|
||||||
|
let (audio, pkt_size) = if decode_mode.should_decrypt() && decrypted {
|
||||||
|
self.scan_and_decode(
|
||||||
|
&pkt.payload()[data_offset..payload_len - data_trailer],
|
||||||
|
extensions,
|
||||||
|
missed_packets,
|
||||||
|
decode_mode == DecodeMode::Decode,
|
||||||
|
)?
|
||||||
|
} else {
|
||||||
|
// The latter part is an upper bound, as we cannot determine
|
||||||
|
// how long packet extensions are.
|
||||||
|
// WIthout decryption, speaking detection is thus broken.
|
||||||
|
(None, payload_len - data_offset - data_trailer)
|
||||||
|
};
|
||||||
|
|
||||||
let delta = if pkt_size == SILENT_FRAME.len() {
|
let delta = if pkt_size == SILENT_FRAME.len() {
|
||||||
// Frame is silent.
|
// Frame is silent.
|
||||||
@@ -91,8 +113,8 @@ impl SsrcState {
|
|||||||
data: &[u8],
|
data: &[u8],
|
||||||
extension: bool,
|
extension: bool,
|
||||||
missed_packets: u16,
|
missed_packets: u16,
|
||||||
) -> Result<(Vec<i16>, usize)> {
|
decode: bool,
|
||||||
let mut out = vec![0; STEREO_FRAME_SIZE];
|
) -> Result<(Option<Vec<i16>>, usize)> {
|
||||||
let start = if extension {
|
let start = if extension {
|
||||||
RtpExtensionPacket::new(data)
|
RtpExtensionPacket::new(data)
|
||||||
.map(|pkt| pkt.packet_size())
|
.map(|pkt| pkt.packet_size())
|
||||||
@@ -104,6 +126,9 @@ impl SsrcState {
|
|||||||
Ok(0)
|
Ok(0)
|
||||||
}?;
|
}?;
|
||||||
|
|
||||||
|
let pkt = if decode {
|
||||||
|
let mut out = vec![0; STEREO_FRAME_SIZE];
|
||||||
|
|
||||||
for _ in 0..missed_packets {
|
for _ in 0..missed_packets {
|
||||||
let missing_frame: Option<&[u8]> = None;
|
let missing_frame: Option<&[u8]> = None;
|
||||||
if let Err(e) = self.decoder.decode(missing_frame, &mut out[..], false) {
|
if let Err(e) = self.decoder.decode(missing_frame, &mut out[..], false) {
|
||||||
@@ -123,7 +148,12 @@ impl SsrcState {
|
|||||||
// => multiply by number of channels.
|
// => multiply by number of channels.
|
||||||
out.truncate(2 * audio_len);
|
out.truncate(2 * audio_len);
|
||||||
|
|
||||||
Ok((out, data.len() - start))
|
Some(out)
|
||||||
|
} else {
|
||||||
|
None
|
||||||
|
};
|
||||||
|
|
||||||
|
Ok((pkt, data.len() - start))
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -131,7 +161,7 @@ struct UdpRx {
|
|||||||
cipher: Cipher,
|
cipher: Cipher,
|
||||||
decoder_map: HashMap<u32, SsrcState>,
|
decoder_map: HashMap<u32, SsrcState>,
|
||||||
#[allow(dead_code)]
|
#[allow(dead_code)]
|
||||||
mode: CryptoMode, // In future, this will allow crypto mode selection.
|
config: Config,
|
||||||
packet_buffer: [u8; VOICE_PACKET_MAX],
|
packet_buffer: [u8; VOICE_PACKET_MAX],
|
||||||
rx: Receiver<UdpRxMessage>,
|
rx: Receiver<UdpRxMessage>,
|
||||||
udp_socket: RecvHalf,
|
udp_socket: RecvHalf,
|
||||||
@@ -150,7 +180,10 @@ impl UdpRx {
|
|||||||
match msg {
|
match msg {
|
||||||
Ok(ReplaceInterconnect(i)) => {
|
Ok(ReplaceInterconnect(i)) => {
|
||||||
*interconnect = i;
|
*interconnect = i;
|
||||||
}
|
},
|
||||||
|
Ok(SetConfig(c)) => {
|
||||||
|
self.config = c;
|
||||||
|
},
|
||||||
Ok(Poison) | Err(_) => break,
|
Ok(Poison) | Err(_) => break,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -166,6 +199,7 @@ impl UdpRx {
|
|||||||
// For simplicity, we nominate the mixing context to rebuild the event
|
// For simplicity, we nominate the mixing context to rebuild the event
|
||||||
// context if it fails (hence, the `let _ =` statements.), as it will try to
|
// context if it fails (hence, the `let _ =` statements.), as it will try to
|
||||||
// make contact every 20ms.
|
// make contact every 20ms.
|
||||||
|
let crypto_mode = self.config.crypto_mode;
|
||||||
let packet = &mut self.packet_buffer[..len];
|
let packet = &mut self.packet_buffer[..len];
|
||||||
|
|
||||||
match demux::demux_mut(packet) {
|
match demux::demux_mut(packet) {
|
||||||
@@ -175,15 +209,40 @@ impl UdpRx {
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
let rtp_body_start =
|
let packet_data = if self.config.decode_mode.should_decrypt() {
|
||||||
decrypt_in_place(&mut rtp, &self.cipher).expect("RTP decryption failed.");
|
let out = crypto_mode
|
||||||
|
.decrypt_in_place(&mut rtp, &self.cipher)
|
||||||
|
.map(|(s, t)| (s, t, true));
|
||||||
|
|
||||||
|
if let Err(e) = out {
|
||||||
|
warn!("RTP decryption failed: {:?}", e);
|
||||||
|
}
|
||||||
|
|
||||||
|
out.ok()
|
||||||
|
} else {
|
||||||
|
None
|
||||||
|
};
|
||||||
|
|
||||||
|
let (rtp_body_start, rtp_body_tail, decrypted) = packet_data.unwrap_or_else(|| {
|
||||||
|
(
|
||||||
|
crypto_mode.payload_prefix_len(),
|
||||||
|
crypto_mode.payload_suffix_len(),
|
||||||
|
false,
|
||||||
|
)
|
||||||
|
});
|
||||||
|
|
||||||
let entry = self
|
let entry = self
|
||||||
.decoder_map
|
.decoder_map
|
||||||
.entry(rtp.get_ssrc())
|
.entry(rtp.get_ssrc())
|
||||||
.or_insert_with(|| SsrcState::new(rtp.to_immutable()));
|
.or_insert_with(|| SsrcState::new(rtp.to_immutable()));
|
||||||
|
|
||||||
if let Ok((delta, audio)) = entry.process(rtp.to_immutable(), rtp_body_start) {
|
if let Ok((delta, audio)) = entry.process(
|
||||||
|
rtp.to_immutable(),
|
||||||
|
rtp_body_start,
|
||||||
|
rtp_body_tail,
|
||||||
|
self.config.decode_mode,
|
||||||
|
decrypted,
|
||||||
|
) {
|
||||||
match delta {
|
match delta {
|
||||||
SpeakingDelta::Start => {
|
SpeakingDelta::Start => {
|
||||||
let _ = interconnect.events.send(EventMessage::FireCoreEvent(
|
let _ = interconnect.events.send(EventMessage::FireCoreEvent(
|
||||||
@@ -209,25 +268,40 @@ impl UdpRx {
|
|||||||
audio,
|
audio,
|
||||||
packet: rtp.from_packet(),
|
packet: rtp.from_packet(),
|
||||||
payload_offset: rtp_body_start,
|
payload_offset: rtp_body_start,
|
||||||
|
payload_end_pad: rtp_body_tail,
|
||||||
},
|
},
|
||||||
));
|
));
|
||||||
} else {
|
} else {
|
||||||
warn!("RTP decoding/decrytion failed.");
|
warn!("RTP decoding/processing failed.");
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
DemuxedMut::Rtcp(mut rtcp) => {
|
DemuxedMut::Rtcp(mut rtcp) => {
|
||||||
let rtcp_body_start = decrypt_in_place(&mut rtcp, &self.cipher);
|
let packet_data = if self.config.decode_mode.should_decrypt() {
|
||||||
|
let out = crypto_mode.decrypt_in_place(&mut rtcp, &self.cipher);
|
||||||
|
|
||||||
|
if let Err(e) = out {
|
||||||
|
warn!("RTCP decryption failed: {:?}", e);
|
||||||
|
}
|
||||||
|
|
||||||
|
out.ok()
|
||||||
|
} else {
|
||||||
|
None
|
||||||
|
};
|
||||||
|
|
||||||
|
let (start, tail) = packet_data.unwrap_or_else(|| {
|
||||||
|
(
|
||||||
|
crypto_mode.payload_prefix_len(),
|
||||||
|
crypto_mode.payload_suffix_len(),
|
||||||
|
)
|
||||||
|
});
|
||||||
|
|
||||||
if let Ok(start) = rtcp_body_start {
|
|
||||||
let _ = interconnect.events.send(EventMessage::FireCoreEvent(
|
let _ = interconnect.events.send(EventMessage::FireCoreEvent(
|
||||||
CoreContext::RtcpPacket {
|
CoreContext::RtcpPacket {
|
||||||
packet: rtcp.from_packet(),
|
packet: rtcp.from_packet(),
|
||||||
payload_offset: start,
|
payload_offset: start,
|
||||||
|
payload_end_pad: tail,
|
||||||
},
|
},
|
||||||
));
|
));
|
||||||
} else {
|
|
||||||
warn!("RTCP decryption failed.");
|
|
||||||
}
|
|
||||||
},
|
},
|
||||||
DemuxedMut::FailedParse(t) => {
|
DemuxedMut::FailedParse(t) => {
|
||||||
warn!("Failed to parse message of type {:?}.", t);
|
warn!("Failed to parse message of type {:?}.", t);
|
||||||
@@ -244,7 +318,7 @@ pub(crate) async fn runner(
|
|||||||
mut interconnect: Interconnect,
|
mut interconnect: Interconnect,
|
||||||
rx: Receiver<UdpRxMessage>,
|
rx: Receiver<UdpRxMessage>,
|
||||||
cipher: Cipher,
|
cipher: Cipher,
|
||||||
mode: CryptoMode,
|
config: Config,
|
||||||
udp_socket: RecvHalf,
|
udp_socket: RecvHalf,
|
||||||
) {
|
) {
|
||||||
info!("UDP receive handle started.");
|
info!("UDP receive handle started.");
|
||||||
@@ -252,7 +326,7 @@ pub(crate) async fn runner(
|
|||||||
let mut state = UdpRx {
|
let mut state = UdpRx {
|
||||||
cipher,
|
cipher,
|
||||||
decoder_map: Default::default(),
|
decoder_map: Default::default(),
|
||||||
mode,
|
config,
|
||||||
packet_buffer: [0u8; VOICE_PACKET_MAX],
|
packet_buffer: [0u8; VOICE_PACKET_MAX],
|
||||||
rx,
|
rx,
|
||||||
udp_socket,
|
udp_socket,
|
||||||
@@ -263,23 +337,6 @@ pub(crate) async fn runner(
|
|||||||
info!("UDP receive handle stopped.");
|
info!("UDP receive handle stopped.");
|
||||||
}
|
}
|
||||||
|
|
||||||
#[inline]
|
|
||||||
fn decrypt_in_place(packet: &mut impl MutablePacket, cipher: &Cipher) -> Result<usize> {
|
|
||||||
// Applies discord's cheapest.
|
|
||||||
// In future, might want to make a choice...
|
|
||||||
let header_len = packet.packet().len() - packet.payload().len();
|
|
||||||
let mut nonce = Nonce::default();
|
|
||||||
nonce[..header_len].copy_from_slice(&packet.packet()[..header_len]);
|
|
||||||
|
|
||||||
let data = packet.payload_mut();
|
|
||||||
let (tag_bytes, data_bytes) = data.split_at_mut(TAG_SIZE);
|
|
||||||
let tag = Tag::from_slice(tag_bytes);
|
|
||||||
|
|
||||||
Ok(cipher
|
|
||||||
.decrypt_in_place_detached(&nonce, b"", data_bytes, tag)
|
|
||||||
.map(|_| TAG_SIZE)?)
|
|
||||||
}
|
|
||||||
|
|
||||||
#[inline]
|
#[inline]
|
||||||
fn rtp_valid(packet: RtpPacket<'_>) -> bool {
|
fn rtp_valid(packet: RtpPacket<'_>) -> bool {
|
||||||
packet.get_version() == RTP_VERSION && packet.get_payload_type() == RTP_PROFILE_TYPE
|
packet.get_version() == RTP_VERSION && packet.get_payload_type() == RTP_PROFILE_TYPE
|
||||||
|
|||||||
@@ -42,13 +42,15 @@ pub enum EventContext<'a> {
|
|||||||
/// if `audio.len() == 0`, then this packet arrived out-of-order.
|
/// if `audio.len() == 0`, then this packet arrived out-of-order.
|
||||||
VoicePacket {
|
VoicePacket {
|
||||||
/// Decoded audio from this packet.
|
/// Decoded audio from this packet.
|
||||||
audio: &'a Vec<i16>,
|
audio: &'a Option<Vec<i16>>,
|
||||||
/// Raw RTP packet data.
|
/// Raw RTP packet data.
|
||||||
///
|
///
|
||||||
/// Includes the SSRC (i.e., sender) of this packet.
|
/// Includes the SSRC (i.e., sender) of this packet.
|
||||||
packet: &'a Rtp,
|
packet: &'a Rtp,
|
||||||
/// Byte index into the packet for where the payload begins.
|
/// Byte index into the packet body (after headers) for where the payload begins.
|
||||||
payload_offset: usize,
|
payload_offset: usize,
|
||||||
|
/// Number of bytes at the end of the packet to discard.
|
||||||
|
payload_end_pad: usize,
|
||||||
},
|
},
|
||||||
/// Telemetry/statistics packet, received from another stream (detailed in `packet`).
|
/// Telemetry/statistics packet, received from another stream (detailed in `packet`).
|
||||||
/// `payload_offset` contains the true payload location within the raw packet's `payload()`,
|
/// `payload_offset` contains the true payload location within the raw packet's `payload()`,
|
||||||
@@ -56,8 +58,10 @@ pub enum EventContext<'a> {
|
|||||||
RtcpPacket {
|
RtcpPacket {
|
||||||
/// Raw RTCP packet data.
|
/// Raw RTCP packet data.
|
||||||
packet: &'a Rtcp,
|
packet: &'a Rtcp,
|
||||||
/// Byte index into the packet for where the payload begins.
|
/// Byte index into the packet body (after headers) for where the payload begins.
|
||||||
payload_offset: usize,
|
payload_offset: usize,
|
||||||
|
/// Number of bytes at the end of the packet to discard.
|
||||||
|
payload_end_pad: usize,
|
||||||
},
|
},
|
||||||
/// Fired whenever a client connects to a call for the first time, allowing SSRC/UserID
|
/// Fired whenever a client connects to a call for the first time, allowing SSRC/UserID
|
||||||
/// matching.
|
/// matching.
|
||||||
@@ -74,13 +78,15 @@ pub(crate) enum CoreContext {
|
|||||||
speaking: bool,
|
speaking: bool,
|
||||||
},
|
},
|
||||||
VoicePacket {
|
VoicePacket {
|
||||||
audio: Vec<i16>,
|
audio: Option<Vec<i16>>,
|
||||||
packet: Rtp,
|
packet: Rtp,
|
||||||
payload_offset: usize,
|
payload_offset: usize,
|
||||||
|
payload_end_pad: usize,
|
||||||
},
|
},
|
||||||
RtcpPacket {
|
RtcpPacket {
|
||||||
packet: Rtcp,
|
packet: Rtcp,
|
||||||
payload_offset: usize,
|
payload_offset: usize,
|
||||||
|
payload_end_pad: usize,
|
||||||
},
|
},
|
||||||
ClientConnect(ClientConnect),
|
ClientConnect(ClientConnect),
|
||||||
ClientDisconnect(ClientDisconnect),
|
ClientDisconnect(ClientDisconnect),
|
||||||
@@ -100,17 +106,21 @@ impl<'a> CoreContext {
|
|||||||
audio,
|
audio,
|
||||||
packet,
|
packet,
|
||||||
payload_offset,
|
payload_offset,
|
||||||
|
payload_end_pad,
|
||||||
} => EventContext::VoicePacket {
|
} => EventContext::VoicePacket {
|
||||||
audio,
|
audio,
|
||||||
packet,
|
packet,
|
||||||
payload_offset: *payload_offset,
|
payload_offset: *payload_offset,
|
||||||
|
payload_end_pad: *payload_end_pad,
|
||||||
},
|
},
|
||||||
RtcpPacket {
|
RtcpPacket {
|
||||||
packet,
|
packet,
|
||||||
payload_offset,
|
payload_offset,
|
||||||
|
payload_end_pad,
|
||||||
} => EventContext::RtcpPacket {
|
} => EventContext::RtcpPacket {
|
||||||
packet,
|
packet,
|
||||||
payload_offset: *payload_offset,
|
payload_offset: *payload_offset,
|
||||||
|
payload_end_pad: *payload_end_pad,
|
||||||
},
|
},
|
||||||
ClientConnect(evt) => EventContext::ClientConnect(*evt),
|
ClientConnect(evt) => EventContext::ClientConnect(*evt),
|
||||||
ClientDisconnect(evt) => EventContext::ClientDisconnect(*evt),
|
ClientDisconnect(evt) => EventContext::ClientDisconnect(*evt),
|
||||||
|
|||||||
@@ -1,5 +1,8 @@
|
|||||||
#[cfg(feature = "driver")]
|
#[cfg(feature = "driver")]
|
||||||
use crate::{driver::Driver, error::ConnectionResult};
|
use crate::{
|
||||||
|
driver::{Config, Driver},
|
||||||
|
error::ConnectionResult,
|
||||||
|
};
|
||||||
use crate::{
|
use crate::{
|
||||||
error::{JoinError, JoinResult},
|
error::{JoinError, JoinResult},
|
||||||
id::{ChannelId, GuildId, UserId},
|
id::{ChannelId, GuildId, UserId},
|
||||||
@@ -59,6 +62,19 @@ impl Call {
|
|||||||
Self::new_raw(guild_id, Some(ws), user_id)
|
Self::new_raw(guild_id, Some(ws), user_id)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#[cfg(feature = "driver")]
|
||||||
|
/// Creates a new Call, configuring the driver as specified.
|
||||||
|
#[inline]
|
||||||
|
#[instrument]
|
||||||
|
pub fn from_driver_config(
|
||||||
|
guild_id: GuildId,
|
||||||
|
ws: Shard,
|
||||||
|
user_id: UserId,
|
||||||
|
config: Config,
|
||||||
|
) -> Self {
|
||||||
|
Self::new_raw_cfg(guild_id, Some(ws), user_id, config)
|
||||||
|
}
|
||||||
|
|
||||||
/// Creates a new, standalone Call which is not connected via
|
/// Creates a new, standalone Call which is not connected via
|
||||||
/// WebSocket to the Gateway.
|
/// WebSocket to the Gateway.
|
||||||
///
|
///
|
||||||
@@ -73,6 +89,18 @@ impl Call {
|
|||||||
Self::new_raw(guild_id, None, user_id)
|
Self::new_raw(guild_id, None, user_id)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#[cfg(feature = "driver")]
|
||||||
|
/// Creates a new standalone Call, configuring the driver as specified.
|
||||||
|
#[inline]
|
||||||
|
#[instrument]
|
||||||
|
pub fn standalone_from_driver_config(
|
||||||
|
guild_id: GuildId,
|
||||||
|
user_id: UserId,
|
||||||
|
config: Config,
|
||||||
|
) -> Self {
|
||||||
|
Self::new_raw_cfg(guild_id, None, user_id, config)
|
||||||
|
}
|
||||||
|
|
||||||
fn new_raw(guild_id: GuildId, ws: Option<Shard>, user_id: UserId) -> Self {
|
fn new_raw(guild_id: GuildId, ws: Option<Shard>, user_id: UserId) -> Self {
|
||||||
Call {
|
Call {
|
||||||
connection: None,
|
connection: None,
|
||||||
@@ -86,6 +114,19 @@ impl Call {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#[cfg(feature = "driver")]
|
||||||
|
fn new_raw_cfg(guild_id: GuildId, ws: Option<Shard>, user_id: UserId, config: Config) -> Self {
|
||||||
|
Call {
|
||||||
|
connection: None,
|
||||||
|
driver: Driver::new(config),
|
||||||
|
guild_id,
|
||||||
|
self_deaf: false,
|
||||||
|
self_mute: false,
|
||||||
|
user_id,
|
||||||
|
ws,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
#[instrument(skip(self))]
|
#[instrument(skip(self))]
|
||||||
fn do_connect(&mut self) {
|
fn do_connect(&mut self) {
|
||||||
match &self.connection {
|
match &self.connection {
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
#[cfg(feature = "driver")]
|
#[cfg(feature = "driver")]
|
||||||
use crate::error::ConnectionResult;
|
use crate::{driver::Config, error::ConnectionResult};
|
||||||
use crate::{
|
use crate::{
|
||||||
error::{JoinError, JoinResult},
|
error::{JoinError, JoinResult},
|
||||||
id::{ChannelId, GuildId, UserId},
|
id::{ChannelId, GuildId, UserId},
|
||||||
@@ -47,6 +47,9 @@ pub struct Songbird {
|
|||||||
client_data: PRwLock<ClientData>,
|
client_data: PRwLock<ClientData>,
|
||||||
calls: PRwLock<HashMap<GuildId, Arc<Mutex<Call>>>>,
|
calls: PRwLock<HashMap<GuildId, Arc<Mutex<Call>>>>,
|
||||||
sharder: Sharder,
|
sharder: Sharder,
|
||||||
|
|
||||||
|
#[cfg(feature = "driver")]
|
||||||
|
driver_config: PRwLock<Option<Config>>,
|
||||||
}
|
}
|
||||||
|
|
||||||
impl Songbird {
|
impl Songbird {
|
||||||
@@ -61,6 +64,9 @@ impl Songbird {
|
|||||||
client_data: Default::default(),
|
client_data: Default::default(),
|
||||||
calls: Default::default(),
|
calls: Default::default(),
|
||||||
sharder: Sharder::Serenity(Default::default()),
|
sharder: Sharder::Serenity(Default::default()),
|
||||||
|
|
||||||
|
#[cfg(feature = "driver")]
|
||||||
|
driver_config: Default::default(),
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -84,6 +90,9 @@ impl Songbird {
|
|||||||
}),
|
}),
|
||||||
calls: Default::default(),
|
calls: Default::default(),
|
||||||
sharder: Sharder::Twilight(cluster),
|
sharder: Sharder::Twilight(cluster),
|
||||||
|
|
||||||
|
#[cfg(feature = "driver")]
|
||||||
|
driver_config: Default::default(),
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -133,7 +142,18 @@ impl Songbird {
|
|||||||
.get_shard(shard)
|
.get_shard(shard)
|
||||||
.expect("Failed to get shard handle: shard_count incorrect?");
|
.expect("Failed to get shard handle: shard_count incorrect?");
|
||||||
|
|
||||||
Arc::new(Mutex::new(Call::new(guild_id, shard_handle, info.user_id)))
|
#[cfg(feature = "driver")]
|
||||||
|
let call = Call::from_driver_config(
|
||||||
|
guild_id,
|
||||||
|
shard_handle,
|
||||||
|
info.user_id,
|
||||||
|
self.driver_config.read().clone().unwrap_or_default(),
|
||||||
|
);
|
||||||
|
|
||||||
|
#[cfg(not(feature = "driver"))]
|
||||||
|
let call = Call::new(guild_id, shard_handle, info.user_id);
|
||||||
|
|
||||||
|
Arc::new(Mutex::new(call))
|
||||||
})
|
})
|
||||||
.clone()
|
.clone()
|
||||||
})
|
})
|
||||||
@@ -347,6 +367,20 @@ impl VoiceGatewayManager for Songbird {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#[cfg(feature = "driver")]
|
||||||
|
impl Songbird {
|
||||||
|
/// Sets a shared configuration for all drivers created from this
|
||||||
|
/// manager.
|
||||||
|
///
|
||||||
|
/// Changes made here will apply to new Call and Driver instances only.
|
||||||
|
///
|
||||||
|
/// Requires the `"driver"` feature.
|
||||||
|
pub fn set_config(&self, new_config: Config) {
|
||||||
|
let mut config = self.driver_config.write();
|
||||||
|
*config = Some(new_config);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
#[inline]
|
#[inline]
|
||||||
fn shard_id(guild_id: u64, shard_count: u64) -> u64 {
|
fn shard_id(guild_id: u64, shard_count: u64) -> u64 {
|
||||||
(guild_id >> 22) % shard_count
|
(guild_id >> 22) % shard_count
|
||||||
|
|||||||
Reference in New Issue
Block a user