-
Notifications
You must be signed in to change notification settings - Fork 6
Expand file tree
/
Copy pathmain.go
More file actions
2267 lines (1944 loc) · 61.3 KB
/
main.go
File metadata and controls
2267 lines (1944 loc) · 61.3 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
package main
import (
"crypto/rand"
"encoding/hex"
"encoding/json"
"fmt"
mathrand "math/rand"
"net/http"
"os"
"os/signal"
"strings"
"sync"
"syscall"
"time"
"unicode/utf8"
"github.com/gorilla/websocket"
"go.uber.org/zap"
)
// Message types
const (
// Client -> Server
MsgTypeCreateRoom = "create_room"
MsgTypeJoinRoom = "join_room"
MsgTypeLeaveRoom = "leave_room"
MsgTypeApproveJoin = "approve_join"
MsgTypeRejectJoin = "reject_join"
MsgTypePlaybackAction = "playback_action"
MsgTypeBufferReady = "buffer_ready"
MsgTypeKickUser = "kick_user"
MsgTypeTransferHost = "transfer_host"
MsgTypePing = "ping"
MsgTypeRequestSync = "request_sync"
MsgTypeReconnect = "reconnect"
MsgTypeSuggestTrack = "suggest_track"
MsgTypeApproveSuggestion = "approve_suggestion"
MsgTypeRejectSuggestion = "reject_suggestion"
// Server -> Client
MsgTypeRoomCreated = "room_created"
MsgTypeJoinRequest = "join_request"
MsgTypeJoinApproved = "join_approved"
MsgTypeJoinRejected = "join_rejected"
MsgTypeUserJoined = "user_joined"
MsgTypeUserLeft = "user_left"
MsgTypeSyncPlayback = "sync_playback"
MsgTypeBufferWait = "buffer_wait"
MsgTypeBufferComplete = "buffer_complete"
MsgTypeError = "error"
MsgTypePong = "pong"
MsgTypeHostChanged = "host_changed"
MsgTypeKicked = "kicked"
MsgTypeSyncState = "sync_state"
MsgTypeReconnected = "reconnected"
MsgTypeUserReconnected = "user_reconnected"
MsgTypeUserDisconnected = "user_disconnected"
MsgTypeSuggestionReceived = "suggestion_received"
MsgTypeSuggestionApproved = "suggestion_approved"
MsgTypeSuggestionRejected = "suggestion_rejected"
)
// Playback actions
const (
ActionPlay = "play"
ActionPause = "pause"
ActionSeek = "seek"
ActionSkipNext = "skip_next"
ActionSkipPrev = "skip_prev"
ActionChangeTrack = "change_track"
ActionQueueAdd = "queue_add"
ActionQueueRemove = "queue_remove"
ActionQueueClear = "queue_clear"
ActionSyncQueue = "sync_queue"
ActionSetVolume = "set_volume"
)
// CreateRoomPayload is for creating a new room
type CreateRoomPayload struct {
Username string `json:"username"`
}
// RoomCreatedPayload is the response for room creation
type RoomCreatedPayload struct {
RoomCode string `json:"room_code"`
UserID string `json:"user_id"`
SessionToken string `json:"session_token"`
}
// JoinRoomPayload is for joining a room
type JoinRoomPayload struct {
RoomCode string `json:"room_code"`
Username string `json:"username"`
}
// JoinRequestPayload is sent to the host when someone wants to join
type JoinRequestPayload struct {
UserID string `json:"user_id"`
Username string `json:"username"`
}
// ApproveJoinPayload is for approving a join request
type ApproveJoinPayload struct {
UserID string `json:"user_id"`
}
// RejectJoinPayload is for rejecting a join request
type RejectJoinPayload struct {
UserID string `json:"user_id"`
Reason string `json:"reason,omitempty"`
}
// JoinApprovedPayload is sent to the user when they are approved
type JoinApprovedPayload struct {
RoomCode string `json:"room_code"`
UserID string `json:"user_id"`
SessionToken string `json:"session_token"`
State *RoomState `json:"state"`
}
// JoinRejectedPayload is sent to the user when they are rejected
type JoinRejectedPayload struct {
Reason string `json:"reason"`
}
// UserJoinedPayload is sent when a user joins the room
type UserJoinedPayload struct {
UserID string `json:"user_id"`
Username string `json:"username"`
}
// UserLeftPayload is sent when a user leaves the room
type UserLeftPayload struct {
UserID string `json:"user_id"`
Username string `json:"username"`
}
// PlaybackActionPayload is for playback control actions
type PlaybackActionPayload struct {
Action string `json:"action"`
TrackID string `json:"track_id,omitempty"`
Position int64 `json:"position,omitempty"` // milliseconds
TrackInfo *TrackInfo `json:"track_info,omitempty"`
InsertNext bool `json:"insert_next,omitempty"`
Queue []TrackInfo `json:"queue,omitempty"`
QueueTitle string `json:"queue_title,omitempty"`
Volume float64 `json:"volume"`
ServerTime int64 `json:"server_time,omitempty"`
}
// Suggestion payloads
type SuggestTrackPayload struct {
TrackInfo *TrackInfo `json:"track_info"`
}
type SuggestionReceivedPayload struct {
SuggestionID string `json:"suggestion_id"`
FromUserID string `json:"from_user_id"`
FromUsername string `json:"from_username"`
TrackInfo *TrackInfo `json:"track_info"`
}
type ApproveSuggestionPayload struct {
SuggestionID string `json:"suggestion_id"`
}
type RejectSuggestionPayload struct {
SuggestionID string `json:"suggestion_id"`
Reason string `json:"reason,omitempty"`
}
type SuggestionApprovedPayload struct {
SuggestionID string `json:"suggestion_id"`
TrackInfo *TrackInfo `json:"track_info"`
}
type SuggestionRejectedPayload struct {
SuggestionID string `json:"suggestion_id"`
Reason string `json:"reason,omitempty"`
}
// TrackInfo contains information about a track
type TrackInfo struct {
ID string `json:"id"`
Title string `json:"title"`
Artist string `json:"artist"`
Album string `json:"album,omitempty"`
Duration int64 `json:"duration"` // milliseconds
Thumbnail string `json:"thumbnail,omitempty"`
SuggestedBy string `json:"suggested_by,omitempty"`
}
// BufferReadyPayload is sent when a user has finished buffering
type BufferReadyPayload struct {
TrackID string `json:"track_id"`
}
// BufferWaitPayload is sent to tell users to wait for buffering
type BufferWaitPayload struct {
TrackID string `json:"track_id"`
WaitingFor []string `json:"waiting_for"` // user IDs still buffering
}
// BufferCompletePayload is sent when all users have buffered
type BufferCompletePayload struct {
TrackID string `json:"track_id"`
}
// ErrorPayload is for error messages
type ErrorPayload struct {
Code string `json:"code"`
Message string `json:"message"`
}
// RoomState contains the current state of a room
type RoomState struct {
RoomCode string `json:"room_code"`
HostID string `json:"host_id"`
Users []UserInfo `json:"users"`
CurrentTrack *TrackInfo `json:"current_track,omitempty"`
IsPlaying bool `json:"is_playing"`
Position int64 `json:"position"` // milliseconds
LastUpdate int64 `json:"last_update"` // unix timestamp ms
Volume float64 `json:"volume"`
Queue []TrackInfo `json:"queue,omitempty"`
}
// UserInfo contains information about a user
type UserInfo struct {
UserID string `json:"user_id"`
Username string `json:"username"`
IsHost bool `json:"is_host"`
IsConnected bool `json:"is_connected"`
}
// KickUserPayload is for kicking a user from the room
type KickUserPayload struct {
UserID string `json:"user_id"`
Reason string `json:"reason,omitempty"`
}
// TransferHostPayload is for transferring host role to another user
type TransferHostPayload struct {
NewHostID string `json:"new_host_id"`
}
// KickedPayload is sent to the user when they are kicked
type KickedPayload struct {
Reason string `json:"reason"`
}
// HostChangedPayload is sent when the host changes
type HostChangedPayload struct {
NewHostID string `json:"new_host_id"`
NewHostName string `json:"new_host_name"`
}
// SyncStatePayload is sent to a guest when they request current playback state
type SyncStatePayload struct {
CurrentTrack *TrackInfo `json:"current_track,omitempty"`
IsPlaying bool `json:"is_playing"`
Position int64 `json:"position"` // milliseconds
LastUpdate int64 `json:"last_update"` // unix timestamp ms
Volume float64 `json:"volume"`
Queue []TrackInfo `json:"queue,omitempty"`
}
// ReconnectPayload is for reconnecting to a room
type ReconnectPayload struct {
SessionToken string `json:"session_token"`
}
// ReconnectedPayload is sent when successfully reconnected
type ReconnectedPayload struct {
RoomCode string `json:"room_code"`
UserID string `json:"user_id"`
State *RoomState `json:"state"`
IsHost bool `json:"is_host"`
}
// UserReconnectedPayload is sent to other users when someone reconnects
type UserReconnectedPayload struct {
UserID string `json:"user_id"`
Username string `json:"username"`
}
// UserDisconnectedPayload is sent when a user temporarily disconnects
type UserDisconnectedPayload struct {
UserID string `json:"user_id"`
Username string `json:"username"`
}
// Session holds information about a disconnected user for reconnection
type Session struct {
UserID string
Username string
RoomCode string
IsHost bool
DisconnectAt time.Time
}
// Client represents a connected WebSocket client
type Client struct {
ID string
Username string
SessionToken string
Conn *websocket.Conn
Room *Room
Send chan []byte
closed bool
mu sync.Mutex
codec *MessageCodec // Message codec for encoding/decoding
}
// Room represents a listening room
type Room struct {
Code string
Host *Client
Clients map[string]*Client
PendingJoins map[string]*Client // Users waiting for approval
PendingSuggestions map[string]*Suggestion // Track suggestions waiting for host action
DisconnectedUsers map[string]*Session // Users temporarily disconnected
State *RoomState
BufferingUsers map[string]bool // Track which users are still buffering
HostStartPosition int64 // Host's position when buffering started
HostDisconnectedAt *time.Time // When the host disconnected (nil if connected)
mu sync.RWMutex
}
// Suggestion represents a track suggestion from a guest
type Suggestion struct {
ID string
FromUserID string
FromUsername string
Track *TrackInfo
}
// Server is the main WebSocket server
type Server struct {
rooms map[string]*Room
sessions map[string]*Session // sessionToken -> Session
clients map[*Client]bool
upgrader websocket.Upgrader
mu sync.RWMutex
rngMu sync.Mutex
logger *zap.Logger
rng *mathrand.Rand
startTime time.Time // Track when server started for room retention logic
}
const (
// Grace period for reconnection (increased from 5 to 15 minutes for better recovery)
ReconnectGracePeriod = 15 * time.Minute
// How often to clean up expired sessions
SessionCleanupInterval = 1 * time.Minute
// Minimum time to keep empty rooms after server restart (for reconnection)
MinRoomRetentionAfterRestart = 2 * time.Minute
// Security limits
MaxUsernameLength = 50
MaxRoomCodeLength = 10
MaxTrackTitleLength = 200
MaxTrackArtistLength = 200
MaxQueueSize = 1000
// Connection limits
MaxReadMessageSize = 524288 // 512KB (reasonable for queue syncs)
ReadTimeout = 60 * time.Second
WriteTimeout = 10 * time.Second
IdleTimeout = 120 * time.Second
)
func NewServer(logger *zap.Logger) *Server {
s := &Server{
rooms: make(map[string]*Room),
sessions: make(map[string]*Session),
clients: make(map[*Client]bool),
upgrader: websocket.Upgrader{
CheckOrigin: func(r *http.Request) bool {
return true // Allow all origins for mobile app
},
ReadBufferSize: 4096,
WriteBufferSize: 4096,
},
logger: logger,
rng: mathrand.New(mathrand.NewSource(time.Now().UnixNano())),
startTime: time.Now(),
}
// Start cleanup goroutines
go s.cleanupExpiredSessions()
return s
}
func (s *Server) cleanupExpiredSessions() {
ticker := time.NewTicker(SessionCleanupInterval)
defer ticker.Stop()
for range ticker.C {
now := time.Now()
minRetentionTime := s.startTime.Add(MinRoomRetentionAfterRestart)
// First, determine which sessions have expired without holding any room locks.
s.mu.Lock()
expired := make([]*Session, 0)
for token, session := range s.sessions {
if now.Sub(session.DisconnectAt) > ReconnectGracePeriod {
expired = append(expired, session)
delete(s.sessions, token)
s.logger.Info("Session expired",
zap.String("user_id", session.UserID),
zap.String("room_code", session.RoomCode))
}
}
s.mu.Unlock()
// Now process the side effects for each expired session without
// ever taking the server lock and a room lock at the same time.
for _, session := range expired {
s.mu.RLock()
room, exists := s.rooms[session.RoomCode]
s.mu.RUnlock()
if !exists || room == nil {
continue
}
room.mu.Lock()
delete(room.DisconnectedUsers, session.UserID)
// Remove from room state users if still there
newUsers := make([]UserInfo, 0, len(room.State.Users))
for _, u := range room.State.Users {
if u.UserID != session.UserID {
newUsers = append(newUsers, u)
}
}
room.State.Users = newUsers
// Capture information needed after releasing the room lock
shouldDeleteRoom := len(room.Clients) == 0 && len(room.DisconnectedUsers) == 0 && now.After(minRetentionTime)
roomCode := room.Code
remainingClients := make([]*Client, 0, len(room.Clients))
for _, client := range room.Clients {
if client != nil {
remainingClients = append(remainingClients, client)
}
}
room.mu.Unlock()
// If the room is now empty and past the retention window, delete it.
if shouldDeleteRoom {
s.mu.Lock()
// Re-check to avoid races where the room might have been recreated.
if currentRoom, exists := s.rooms[roomCode]; exists && currentRoom == room {
delete(s.rooms, roomCode)
s.logger.Info("Deleted empty room",
zap.String("room_code", roomCode))
}
s.mu.Unlock()
continue
}
// Notify remaining users that the expired session permanently left.
for _, client := range remainingClients {
client.sendMessage(s.logger, MsgTypeUserLeft, UserLeftPayload{
UserID: session.UserID,
Username: session.Username,
})
}
}
}
}
func (s *Server) generateRoomCode() string {
const chars = "1234567890QWERTYUPASDFGHJLKZXCVBNM"
code := make([]byte, 8)
s.rngMu.Lock()
for i := range code {
code[i] = chars[s.rng.Intn(len(chars))]
}
s.rngMu.Unlock()
return string(code)
}
func (s *Server) generateUserID() string {
s.rngMu.Lock()
randNum := s.rng.Intn(10000)
s.rngMu.Unlock()
return fmt.Sprintf("user_%d_%d", time.Now().UnixNano(), randNum)
}
func (s *Server) generateSessionToken() string {
// Use crypto/rand for secure token generation
b := make([]byte, 32)
if _, err := rand.Read(b); err != nil {
s.logger.Error("Failed to generate secure token", zap.Error(err))
// Fallback to less secure but functional token
s.rngMu.Lock()
tokenNum := s.rng.Intn(1000000)
s.rngMu.Unlock()
return fmt.Sprintf("token_%d_%d", time.Now().UnixNano(), tokenNum)
}
return hex.EncodeToString(b)
}
func (s *Server) handleWebSocket(w http.ResponseWriter, r *http.Request) {
conn, err := s.upgrader.Upgrade(w, r, nil)
if err != nil {
s.logger.Warn("WebSocket upgrade error", zap.Error(err))
return
}
// Use Protobuf codec with compression enabled
client := &Client{
ID: s.generateUserID(),
Conn: conn,
Send: make(chan []byte, 256),
codec: NewMessageCodec(true),
}
s.mu.Lock()
s.clients[client] = true
s.mu.Unlock()
go client.writePump(s.logger)
go client.readPump(s)
s.logger.Info("Client connected", zap.String("client_id", client.ID))
}
func (c *Client) writePump(logger *zap.Logger) {
// Reduce ping frequency for efficiency (60s is sufficient for idle detection)
ticker := time.NewTicker(60 * time.Second)
defer func() {
ticker.Stop()
c.Conn.Close()
}()
for {
select {
case message, ok := <-c.Send:
if err := c.Conn.SetWriteDeadline(time.Now().Add(10 * time.Second)); err != nil {
logger.Debug("Failed to set write deadline", zap.String("client_id", c.ID), zap.Error(err))
return
}
if !ok {
c.Conn.WriteMessage(websocket.CloseMessage, []byte{})
return
}
if err := c.Conn.WriteMessage(websocket.BinaryMessage, message); err != nil {
logger.Debug("Write error for client", zap.String("client_id", c.ID), zap.Error(err))
return
}
case <-ticker.C:
if err := c.Conn.SetWriteDeadline(time.Now().Add(10 * time.Second)); err != nil {
logger.Debug("Failed to set write deadline", zap.String("client_id", c.ID), zap.Error(err))
return
}
if err := c.Conn.WriteMessage(websocket.PingMessage, nil); err != nil {
return
}
}
}
}
func (c *Client) readPump(s *Server) {
defer func() {
s.removeClient(c)
c.Conn.Close()
}()
c.Conn.SetReadLimit(MaxReadMessageSize)
if err := c.Conn.SetReadDeadline(time.Now().Add(ReadTimeout)); err != nil {
s.logger.Debug("Failed to set read deadline", zap.String("client_id", c.ID), zap.Error(err))
}
c.Conn.SetPongHandler(func(string) error {
if err := c.Conn.SetReadDeadline(time.Now().Add(ReadTimeout)); err != nil {
s.logger.Debug("Failed to set read deadline in pong handler", zap.String("client_id", c.ID), zap.Error(err))
}
return nil
})
for {
_, message, err := c.Conn.ReadMessage()
if err != nil {
if websocket.IsUnexpectedCloseError(err, websocket.CloseGoingAway, websocket.CloseAbnormalClosure) {
s.logger.Debug("Read error for client", zap.String("client_id", c.ID), zap.Error(err))
}
break
}
c.Conn.SetReadDeadline(time.Now().Add(60 * time.Second))
s.handleMessage(c, message)
}
}
func (s *Server) removeClient(c *Client) {
s.mu.Lock()
delete(s.clients, c)
s.mu.Unlock()
if c.Room != nil {
s.handleClientDisconnect(c)
}
// Mark client as closed and close the channel
c.mu.Lock()
if !c.closed {
c.closed = true
close(c.Send)
}
c.mu.Unlock()
s.logger.Info("Client disconnected", zap.String("client_id", c.ID))
}
// handleClientDisconnect handles a client disconnecting - creates a session for reconnection
func (s *Server) handleClientDisconnect(c *Client) {
if c.Room == nil {
return
}
room := c.Room
room.mu.Lock()
wasHost := room.Host == c
username := c.Username
// Create session for reconnection
session := &Session{
UserID: c.ID,
Username: c.Username,
RoomCode: room.Code,
IsHost: wasHost,
DisconnectAt: time.Now(),
}
// Generate session token if not already present
if c.SessionToken == "" {
c.SessionToken = s.generateSessionToken()
}
// Store the session
s.mu.Lock()
s.sessions[c.SessionToken] = session
s.mu.Unlock()
// Remove from active clients but add to disconnected users
delete(room.Clients, c.ID)
delete(room.BufferingUsers, c.ID)
if room.DisconnectedUsers == nil {
room.DisconnectedUsers = make(map[string]*Session)
}
room.DisconnectedUsers[c.ID] = session
// Mark user as disconnected in room state
for i := range room.State.Users {
if room.State.Users[i].UserID == c.ID {
room.State.Users[i].IsConnected = false
break
}
}
// Track if host disconnected
if wasHost {
now := time.Now()
room.HostDisconnectedAt = &now
}
c.Room = nil
// Collect clients to notify before unlocking
clientsToNotify := make([]*Client, 0, len(room.Clients))
for _, client := range room.Clients {
if client != nil {
clientsToNotify = append(clientsToNotify, client)
}
}
// If room has no active clients and no disconnected users, delete it
if len(room.Clients) == 0 && len(room.DisconnectedUsers) == 0 {
roomCode := room.Code
room.mu.Unlock()
s.mu.Lock()
delete(s.rooms, roomCode)
s.mu.Unlock()
s.logger.Info("Room deleted (empty)", zap.String("room_code", roomCode))
return
}
room.mu.Unlock()
// Notify other users about the temporary disconnect
for _, client := range clientsToNotify {
client.sendMessage(s.logger, MsgTypeUserDisconnected, UserDisconnectedPayload{
UserID: c.ID,
Username: username,
})
}
s.logger.Info("User temporarily disconnected",
zap.String("username", username),
zap.String("user_id", c.ID),
zap.String("room_code", room.Code),
zap.Bool("was_host", wasHost),
zap.String("session_token", c.SessionToken))
}
// handleReconnect handles a client trying to reconnect to their room
func (s *Server) handleReconnect(c *Client, payload []byte) {
var p ReconnectPayload
if err := decodePayload(payload, MsgTypeReconnect, &p); err != nil {
c.sendError(s.logger, "invalid_payload", "Invalid reconnect payload")
return
}
if p.SessionToken == "" {
c.sendError(s.logger, "missing_session_token", "Session token is required")
return
}
s.mu.RLock()
session, exists := s.sessions[p.SessionToken]
s.mu.RUnlock()
if !exists {
c.sendError(s.logger, "session_not_found", "Session not found or expired")
return
}
// Check if session is expired
if time.Since(session.DisconnectAt) > ReconnectGracePeriod {
s.mu.Lock()
delete(s.sessions, p.SessionToken)
s.mu.Unlock()
c.sendError(s.logger, "session_expired", "Session has expired")
return
}
s.mu.RLock()
room, roomExists := s.rooms[session.RoomCode]
s.mu.RUnlock()
if !roomExists {
s.mu.Lock()
delete(s.sessions, p.SessionToken)
s.mu.Unlock()
c.sendError(s.logger, "room_not_found", "Room no longer exists")
return
}
room.mu.Lock()
// Restore the client
c.ID = session.UserID
c.Username = session.Username
c.SessionToken = p.SessionToken
c.Room = room
// Add back to room clients
room.Clients[c.ID] = c
delete(room.DisconnectedUsers, c.ID)
// Mark user as connected in room state
for i := range room.State.Users {
if room.State.Users[i].UserID == c.ID {
room.State.Users[i].IsConnected = true
break
}
}
// Restore host status if they were the host
if session.IsHost && room.HostDisconnectedAt != nil {
room.Host = c
room.HostDisconnectedAt = nil
// Update IsHost flag in users list
for i := range room.State.Users {
room.State.Users[i].IsHost = room.State.Users[i].UserID == c.ID
}
}
// Calculate live position for reconnect state
nowMs := time.Now().UnixMilli()
liveState := *room.State
liveState.Position = livePlaybackPosition(room.State, nowMs)
liveState.LastUpdate = nowMs
isHost := room.Host == c
room.mu.Unlock()
// Remove session since reconnection succeeded
s.mu.Lock()
delete(s.sessions, p.SessionToken)
s.mu.Unlock()
// Send reconnected message to the client with LIVE state
c.sendMessage(s.logger, MsgTypeReconnected, ReconnectedPayload{
RoomCode: room.Code,
UserID: c.ID,
State: &liveState,
IsHost: isHost,
})
if isHost {
room.mu.RLock()
pendingJoinRequests := make([]JoinRequestPayload, 0, len(room.PendingJoins))
for _, pendingClient := range room.PendingJoins {
if pendingClient == nil {
continue
}
pendingJoinRequests = append(pendingJoinRequests, JoinRequestPayload{
UserID: pendingClient.ID,
Username: pendingClient.Username,
})
}
room.mu.RUnlock()
for _, joinRequest := range pendingJoinRequests {
c.sendMessage(s.logger, MsgTypeJoinRequest, joinRequest)
}
if len(pendingJoinRequests) > 0 {
s.logger.Info("Replayed pending join requests to reconnected host",
zap.String("host_id", c.ID),
zap.String("room_code", room.Code),
zap.Int("pending_count", len(pendingJoinRequests)))
}
}
// Notify other users
room.mu.RLock()
for _, client := range room.Clients {
if client != nil && client.ID != c.ID {
client.sendMessage(s.logger, MsgTypeUserReconnected, UserReconnectedPayload{
UserID: c.ID,
Username: c.Username,
})
}
}
room.mu.RUnlock()
s.logger.Info("User reconnected",
zap.String("username", c.Username),
zap.String("user_id", c.ID),
zap.String("room_code", room.Code),
zap.Bool("is_host", isHost))
}
// sanitizeString removes potentially dangerous characters and limits length
func sanitizeString(s string, maxLen int) string {
// Remove null bytes and other control characters
s = strings.Map(func(r rune) rune {
if r == 0 || (r < 32 && r != '\t' && r != '\n' && r != '\r') {
return -1
}
return r
}, s)
// Trim whitespace
s = strings.TrimSpace(s)
// Validate UTF-8
if !utf8.ValidString(s) {
s = strings.ToValidUTF8(s, "")
}
// Limit length
if len(s) > maxLen {
// Ensure we don't cut in the middle of a multibyte character
for i := maxLen; i > 0 && i > maxLen-4; i-- {
if utf8.ValidString(s[:i]) {
return s[:i]
}
}
return s[:maxLen]
}
return s
}
func livePlaybackPosition(state *RoomState, nowMs int64) int64 {
if state == nil {
return 0
}
position := state.Position
if position < 0 {
position = 0
}
if state.IsPlaying && state.LastUpdate > 0 {
elapsed := nowMs - state.LastUpdate
if elapsed > 0 {
position += elapsed
}
}
if state.CurrentTrack != nil && state.CurrentTrack.Duration > 0 && position > state.CurrentTrack.Duration {
return state.CurrentTrack.Duration
}
return position
}
func (s *Server) handleMessage(c *Client, data []byte) {
// Decode message using protobuf codec
msgType, payloadBytes, err := c.codec.Decode(data)
if err != nil {
s.logger.Debug("Invalid message received", zap.String("client_id", c.ID), zap.Error(err))
c.sendError(s.logger, "invalid_message", "Invalid message format")
return
}
if msgType == "" {
c.sendError(s.logger, "invalid_message", "Message type is required")
return
}
s.logger.Debug("Message received", zap.String("client_id", c.ID), zap.String("message_type", msgType), zap.String("format", "protobuf"))
switch msgType {
case MsgTypeCreateRoom:
s.handleCreateRoom(c, payloadBytes)
case MsgTypeJoinRoom:
s.handleJoinRoom(c, payloadBytes)
case MsgTypeLeaveRoom:
s.leaveRoom(c)
case MsgTypeApproveJoin:
s.handleApproveJoin(c, payloadBytes)
case MsgTypeRejectJoin:
s.handleRejectJoin(c, payloadBytes)
case MsgTypePlaybackAction:
s.handlePlaybackAction(c, payloadBytes)
case MsgTypeBufferReady:
s.handleBufferReady(c, payloadBytes)
case MsgTypeKickUser:
s.handleKickUser(c, payloadBytes)
case MsgTypeTransferHost:
s.handleTransferHost(c, payloadBytes)
case MsgTypePing:
c.sendMessage(s.logger, MsgTypePong, nil)
case MsgTypeRequestSync:
s.handleRequestSync(c)
case MsgTypeReconnect:
s.handleReconnect(c, payloadBytes)
case MsgTypeSuggestTrack:
s.handleSuggestTrack(c, payloadBytes)
case MsgTypeApproveSuggestion:
s.handleApproveSuggestion(c, payloadBytes)
case MsgTypeRejectSuggestion:
s.handleRejectSuggestion(c, payloadBytes)
default:
c.sendError(s.logger, "unknown_message_type", fmt.Sprintf("Unknown message type: %s", msgType))
}
}
func (s *Server) handleSuggestTrack(c *Client, payload []byte) {
var p SuggestTrackPayload
if err := decodePayload(payload, MsgTypeSuggestTrack, &p); err != nil {
c.sendError(s.logger, "invalid_payload", "Invalid suggest track payload")
return
}
if c.Room == nil {
c.sendError(s.logger, "not_in_room", "You are not in a room")
return
}
if p.TrackInfo == nil {
c.sendError(s.logger, "missing_track_info", "Track info is required")
return
}
// Validate and sanitize track info
p.TrackInfo.ID = sanitizeString(p.TrackInfo.ID, 200)
p.TrackInfo.Title = sanitizeString(p.TrackInfo.Title, MaxTrackTitleLength)
p.TrackInfo.Artist = sanitizeString(p.TrackInfo.Artist, MaxTrackArtistLength)
p.TrackInfo.Album = sanitizeString(p.TrackInfo.Album, MaxTrackArtistLength)
if p.TrackInfo.ID == "" || p.TrackInfo.Title == "" {
c.sendError(s.logger, "invalid_track_info", "Track must have ID and title")
return
}
room := c.Room
room.mu.Lock()
defer room.mu.Unlock()
// Host cannot suggest to themselves; ignore silently
if room.Host != nil && room.Host.ID == c.ID {
return
}