-
Notifications
You must be signed in to change notification settings - Fork 9
/
Copy pathrcon.go
308 lines (246 loc) · 9.53 KB
/
rcon.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
// Package rcon implements Source RCON Protocol which is described in the
// documentation: https://developer.valvesoftware.com/wiki/Source_RCON_Protocol.
package rcon
import (
"encoding/binary"
"errors"
"fmt"
"net"
"time"
)
const (
// DefaultDialTimeout provides default auth timeout to remote server.
DefaultDialTimeout = 5 * time.Second
// DefaultDeadline provides default deadline to tcp read/write operations.
DefaultDeadline = 5 * time.Second
// DefaultMaxCommandLen is an artificial restriction, but it will help in case of random
// large queries.
DefaultMaxCommandLen = 1000
// SERVERDATA_AUTH is the first packet sent by the client,
// which is used to authenticate the conn with the server.
SERVERDATA_AUTH int32 = 3
// SERVERDATA_AUTH_ID is any positive integer, chosen by the client
// (will be mirrored back in the server's response).
SERVERDATA_AUTH_ID int32 = 0
// SERVERDATA_AUTH_RESPONSE packet is a notification of the conn's current auth
// status. When the server receives an auth request, it will respond with an empty
// SERVERDATA_RESPONSE_VALUE, followed immediately by a SERVERDATA_AUTH_RESPONSE
// indicating whether authentication succeeded or failed. Note that the status
// code is returned in the packet id field, so when pairing the response with
// the original auth request, you may need to look at the packet id of the
// preceding SERVERDATA_RESPONSE_VALUE.
// If authentication was successful, the ID assigned by the request.
// If auth failed, -1 (0xFF FF FF FF).
SERVERDATA_AUTH_RESPONSE int32 = 2
// SERVERDATA_RESPONSE_VALUE packet is the response to a SERVERDATA_EXECCOMMAND
// request. The ID assigned by the original request.
SERVERDATA_RESPONSE_VALUE int32 = 0
// SERVERDATA_EXECCOMMAND packet type represents a command issued to the server
// by a client. The response will vary depending on the command issued.
SERVERDATA_EXECCOMMAND int32 = 2
// SERVERDATA_EXECCOMMAND_ID is any positive integer, chosen by the client
// (will be mirrored back in the server's response).
SERVERDATA_EXECCOMMAND_ID int32 = 0
)
var (
// ErrAuthNotRCON is returned when got auth response with negative size.
ErrAuthNotRCON = errors.New("response from not rcon server")
// ErrInvalidAuthResponse is returned when we didn't get an auth packet
// back for second read try after discard empty SERVERDATA_RESPONSE_VALUE
// from authentication response.
ErrInvalidAuthResponse = errors.New("invalid authentication packet type response")
// ErrAuthFailed is returned when the package id from authentication
// response is -1.
ErrAuthFailed = errors.New("authentication failed")
// ErrInvalidPacketID is returned when the package id from server response
// was not mirrored back from request.
ErrInvalidPacketID = errors.New("response for another request")
// ErrInvalidPacketPadding is returned when the bytes after type field from
// response is not equal to null-terminated ASCII strings.
ErrInvalidPacketPadding = errors.New("invalid response padding")
// ErrResponseTooSmall is returned when the server response is smaller
// than 10 bytes.
ErrResponseTooSmall = errors.New("response too small")
// ErrCommandTooLong is returned when executed command length is bigger
// than MaxCommandLen characters.
ErrCommandTooLong = errors.New("command too long")
// ErrCommandEmpty is returned when executed command length equal 0.
ErrCommandEmpty = errors.New("command too small")
// ErrMultiErrorOccurred is returned when close connection failed with
// error after auth failed.
ErrMultiErrorOccurred = errors.New("an error occurred while handling another error")
)
// Conn is source RCON generic stream-oriented network connection.
type Conn struct {
conn net.Conn
settings Settings
}
// open creates a new Conn from an existing net.Conn and authenticates it.
func open(conn net.Conn, password string, settings Settings) (*Conn, error) {
client := Conn{conn: conn, settings: settings}
if err := client.auth(password); err != nil {
// Failed to auth conn with the server.
if err2 := client.Close(); err2 != nil {
return &client, fmt.Errorf("%w: %s. Previous error: %s", ErrMultiErrorOccurred, err2.Error(), err.Error())
}
return &client, fmt.Errorf("rcon: %w", err)
}
return &client, nil
}
// Open creates a new authorized Conn from an existing net.Conn.
func Open(conn net.Conn, password string, options ...Option) (*Conn, error) {
settings := DefaultSettings
for _, option := range options {
option(&settings)
}
return open(conn, password, settings)
}
// Dial creates a new authorized Conn tcp dialer connection.
func Dial(address string, password string, options ...Option) (*Conn, error) {
settings := DefaultSettings
for _, option := range options {
option(&settings)
}
conn, err := net.DialTimeout("tcp", address, settings.dialTimeout)
if err != nil {
// Failed to open TCP connection to the server.
return nil, fmt.Errorf("rcon: %w", err)
}
return open(conn, password, settings)
}
// Execute sends command type and it string to execute to the remote server,
// creating a packet with a SERVERDATA_EXECCOMMAND_ID for the server to mirror,
// and compiling its payload bytes in the appropriate order. The response body
// is decompiled from bytes into a string for return.
func (c *Conn) Execute(command string) (string, error) {
if command == "" {
return "", ErrCommandEmpty
}
if c.settings.maxCommandLen > 0 && len(command) > c.settings.maxCommandLen {
return "", ErrCommandTooLong
}
if err := c.write(SERVERDATA_EXECCOMMAND, SERVERDATA_EXECCOMMAND_ID, command); err != nil {
return "", err
}
response, err := c.read()
if err != nil {
return response.Body(), err
}
if response.ID != SERVERDATA_EXECCOMMAND_ID {
return response.Body(), ErrInvalidPacketID
}
return response.Body(), nil
}
// LocalAddr returns the local network address.
func (c *Conn) LocalAddr() net.Addr {
return c.conn.LocalAddr()
}
// RemoteAddr returns the remote network address.
func (c *Conn) RemoteAddr() net.Addr {
return c.conn.RemoteAddr()
}
// Close closes the connection.
func (c *Conn) Close() error {
return c.conn.Close()
}
// auth sends SERVERDATA_AUTH request to the remote server and
// authenticates client for the next requests.
func (c *Conn) auth(password string) error {
if err := c.write(SERVERDATA_AUTH, SERVERDATA_AUTH_ID, password); err != nil {
return err
}
if c.settings.deadline != 0 {
if err := c.conn.SetReadDeadline(time.Now().Add(c.settings.deadline)); err != nil {
return fmt.Errorf("rcon: %w", err)
}
}
response, err := c.readHeader()
if err != nil {
return err
}
size := response.Size - PacketHeaderSize
if size < 0 {
return ErrAuthNotRCON
}
// When the server receives an auth request, it will respond with an empty
// SERVERDATA_RESPONSE_VALUE, followed immediately by a SERVERDATA_AUTH_RESPONSE
// indicating whether authentication succeeded or failed.
// Some servers doesn't send an empty SERVERDATA_RESPONSE_VALUE packet, so we
// do this case optional.
if response.Type == SERVERDATA_RESPONSE_VALUE {
// Discard empty SERVERDATA_RESPONSE_VALUE from authentication response.
_, _ = c.conn.Read(make([]byte, size))
if response, err = c.readHeader(); err != nil {
return err
}
}
// We must to read response body.
buffer := make([]byte, size)
if _, err := c.conn.Read(buffer); err != nil {
return fmt.Errorf("rcon: %w", err)
}
if response.Type != SERVERDATA_AUTH_RESPONSE {
return ErrInvalidAuthResponse
}
if response.ID == -1 {
return ErrAuthFailed
}
if response.ID != SERVERDATA_AUTH_ID {
return ErrInvalidPacketID
}
return nil
}
// write creates packet and writes it to established tcp conn.
func (c *Conn) write(packetType int32, packetID int32, command string) error {
if c.settings.deadline != 0 {
if err := c.conn.SetWriteDeadline(time.Now().Add(c.settings.deadline)); err != nil {
return fmt.Errorf("rcon: %w", err)
}
}
packet := NewPacket(packetType, packetID, command)
_, err := packet.WriteTo(c.conn)
return err
}
// read reads structured binary data from c.conn into packet.
func (c *Conn) read() (*Packet, error) {
if c.settings.deadline != 0 {
if err := c.conn.SetReadDeadline(time.Now().Add(c.settings.deadline)); err != nil {
return nil, fmt.Errorf("rcon: %w", err)
}
}
packet := &Packet{}
if _, err := packet.ReadFrom(c.conn); err != nil {
return packet, err
}
// Workaround for Rust server.
// Rust rcon server responses packet with a type of 4 and the next packet
// is valid. It is undocumented, so skip packet and read next.
if packet.Type == 4 {
if _, err := packet.ReadFrom(c.conn); err != nil {
return packet, err
}
// One more workaround for Rust server.
// When sent command "Say" there is no response data from server with
// packet.ID = SERVERDATA_EXECCOMMAND_ID, only previous console message
// that command was received with packet.ID = -1, therefore, forcibly
// set packet.ID to SERVERDATA_EXECCOMMAND_ID.
if packet.ID == -1 {
packet.ID = SERVERDATA_EXECCOMMAND_ID
}
}
return packet, nil
}
// readHeader reads structured binary data without body from c.conn into packet.
func (c *Conn) readHeader() (Packet, error) {
var packet Packet
if err := binary.Read(c.conn, binary.LittleEndian, &packet.Size); err != nil {
return packet, fmt.Errorf("rcon: read packet size: %w", err)
}
if err := binary.Read(c.conn, binary.LittleEndian, &packet.ID); err != nil {
return packet, fmt.Errorf("rcon: read packet id: %w", err)
}
if err := binary.Read(c.conn, binary.LittleEndian, &packet.Type); err != nil {
return packet, fmt.Errorf("rcon: read packet type: %w", err)
}
return packet, nil
}