Skip to content

Commit

Permalink
Merge pull request plietar#236 from haroldmrt/master
Browse files Browse the repository at this point in the history
Add option to specify preferred AP port
  • Loading branch information
sashahilton00 authored Aug 6, 2018
2 parents 431be9e + 4fb3d5f commit ee87904
Show file tree
Hide file tree
Showing 9 changed files with 54 additions and 27 deletions.
17 changes: 14 additions & 3 deletions core/src/apresolve.rs
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,11 @@ pub struct APResolveData {
ap_list: Vec<String>,
}

fn apresolve(handle: &Handle, proxy: &Option<Url>) -> Box<Future<Item = String, Error = Error>> {
fn apresolve(
handle: &Handle,
proxy: &Option<Url>,
ap_port: &Option<u16>,
) -> Box<Future<Item = String, Error = Error>> {
let url = Uri::from_str(APRESOLVE_ENDPOINT).expect("invalid AP resolve URL");
let use_proxy = proxy.is_some();

Expand Down Expand Up @@ -53,9 +57,15 @@ fn apresolve(handle: &Handle, proxy: &Option<Url>) -> Box<Future<Item = String,
let data =
body.and_then(|body| serde_json::from_str::<APResolveData>(&body).chain_err(|| "invalid JSON"));

let p = ap_port.clone();

let ap = data.and_then(move |data| {
let mut aps = data.ap_list.iter().filter(|ap| {
if use_proxy {
if p.is_some() {
Uri::from_str(ap)
.ok()
.map_or(false, |uri| uri.port().map_or(false, |port| port == p.unwrap()))
} else if use_proxy {
// It is unlikely that the proxy will accept CONNECT on anything other than 443.
Uri::from_str(ap)
.ok()
Expand All @@ -75,11 +85,12 @@ fn apresolve(handle: &Handle, proxy: &Option<Url>) -> Box<Future<Item = String,
pub(crate) fn apresolve_or_fallback<E>(
handle: &Handle,
proxy: &Option<Url>,
ap_port: &Option<u16>,
) -> Box<Future<Item = String, Error = E>>
where
E: 'static,
{
let ap = apresolve(handle, proxy).or_else(|e| {
let ap = apresolve(handle, proxy, ap_port).or_else(|e| {
warn!("Failed to resolve Access Point: {}", e.description());
warn!("Using fallback \"{}\"", AP_FALLBACK);
Ok(AP_FALLBACK.into())
Expand Down
2 changes: 2 additions & 0 deletions core/src/config.rs
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,7 @@ pub struct SessionConfig {
pub user_agent: String,
pub device_id: String,
pub proxy: Option<Url>,
pub ap_port: Option<u16>,
}

impl Default for SessionConfig {
Expand All @@ -19,6 +20,7 @@ impl Default for SessionConfig {
user_agent: version::version_string(),
device_id: device_id,
proxy: None,
ap_port: None,
}
}
}
Expand Down
2 changes: 1 addition & 1 deletion core/src/session.rs
Original file line number Diff line number Diff line change
Expand Up @@ -51,7 +51,7 @@ impl Session {
cache: Option<Cache>,
handle: Handle,
) -> Box<Future<Item = Session, Error = io::Error>> {
let access_point = apresolve_or_fallback::<io::Error>(&handle, &config.proxy);
let access_point = apresolve_or_fallback::<io::Error>(&handle, &config.proxy, &config.ap_port);

let handle_ = handle.clone();
let proxy = config.proxy.clone();
Expand Down
2 changes: 1 addition & 1 deletion docs/connection.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ An AP is randomly picked from that list to connect to.

The connection is done using a bare TCP socket. Despite many APs using ports 80 and 443, neither HTTP nor TLS are used to connect.

If `http://apresolve.spotify.com` is unresponsive, `ap.spotify.com:80` is used as a fallback.
If `http://apresolve.spotify.com` is unresponsive, `ap.spotify.com:443` is used as a fallback.

## Connection Hello
The first 3 packets exchanged are unencrypted, and have the following format :
Expand Down
3 changes: 2 additions & 1 deletion examples/play.rs
Original file line number Diff line number Diff line change
Expand Up @@ -33,7 +33,8 @@ fn main() {
let backend = audio_backend::find(None).unwrap();

println!("Connecting ..");
let session = core.run(Session::connect(session_config, credentials, None, handle))
let session = core
.run(Session::connect(session_config, credentials, None, handle))
.unwrap();

let (player, _) = Player::new(player_config, session.clone(), None, move || (backend)(None));
Expand Down
21 changes: 14 additions & 7 deletions metadata/src/lib.rs
Original file line number Diff line number Diff line change
Expand Up @@ -110,13 +110,15 @@ impl Metadata for Track {
fn parse(msg: &Self::Message, session: &Session) -> Self {
let country = session.country();

let artists = msg.get_artist()
let artists = msg
.get_artist()
.iter()
.filter(|artist| artist.has_gid())
.map(|artist| SpotifyId::from_raw(artist.get_gid()).unwrap())
.collect::<Vec<_>>();

let files = msg.get_file()
let files = msg
.get_file()
.iter()
.filter(|file| file.has_file_id())
.map(|file| {
Expand All @@ -133,7 +135,8 @@ impl Metadata for Track {
album: SpotifyId::from_raw(msg.get_album().get_gid()).unwrap(),
artists: artists,
files: files,
alternatives: msg.get_alternative()
alternatives: msg
.get_alternative()
.iter()
.map(|alt| SpotifyId::from_raw(alt.get_gid()).unwrap())
.collect(),
Expand All @@ -150,20 +153,23 @@ impl Metadata for Album {
}

fn parse(msg: &Self::Message, _: &Session) -> Self {
let artists = msg.get_artist()
let artists = msg
.get_artist()
.iter()
.filter(|artist| artist.has_gid())
.map(|artist| SpotifyId::from_raw(artist.get_gid()).unwrap())
.collect::<Vec<_>>();

let tracks = msg.get_disc()
let tracks = msg
.get_disc()
.iter()
.flat_map(|disc| disc.get_track())
.filter(|track| track.has_gid())
.map(|track| SpotifyId::from_raw(track.get_gid()).unwrap())
.collect::<Vec<_>>();

let covers = msg.get_cover_group()
let covers = msg
.get_cover_group()
.get_image()
.iter()
.filter(|image| image.has_file_id())
Expand Down Expand Up @@ -194,7 +200,8 @@ impl Metadata for Artist {
fn parse(msg: &Self::Message, session: &Session) -> Self {
let country = session.country();

let top_tracks: Vec<SpotifyId> = match msg.get_top_track()
let top_tracks: Vec<SpotifyId> = match msg
.get_top_track()
.iter()
.find(|tt| !tt.has_country() || countrylist_contains(tt.get_country(), &country))
{
Expand Down
6 changes: 4 additions & 2 deletions playback/src/player.rs
Original file line number Diff line number Diff line change
Expand Up @@ -557,7 +557,8 @@ impl PlayerInternal {
}
};

let key = self.session
let key = self
.session
.audio_key()
.request(track.id, file_id)
.wait()
Expand Down Expand Up @@ -599,7 +600,8 @@ impl Drop for PlayerInternal {
impl ::std::fmt::Debug for PlayerCommand {
fn fmt(&self, f: &mut ::std::fmt::Formatter) -> ::std::fmt::Result {
match *self {
PlayerCommand::Load(track, play, position, _) => f.debug_tuple("Load")
PlayerCommand::Load(track, play, position, _) => f
.debug_tuple("Load")
.field(&track)
.field(&play)
.field(&position)
Expand Down
2 changes: 1 addition & 1 deletion protocol/files.rs
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
// Autogenerated by build.sh

pub const FILES : &'static [(&'static str, u32)] = &[
pub const FILES: &'static [(&'static str, u32)] = &[
("proto/authentication.proto", 2098196376),
("proto/keyexchange.proto", 451735664),
("proto/mercury.proto", 709993906),
Expand Down
26 changes: 15 additions & 11 deletions src/main.rs
Original file line number Diff line number Diff line change
Expand Up @@ -129,6 +129,7 @@ fn setup(args: &[String]) -> Setup {
.optopt("u", "username", "Username to sign in with", "USERNAME")
.optopt("p", "password", "Password", "PASSWORD")
.optopt("", "proxy", "HTTP proxy to use when connecting", "PROXY")
.optopt("", "ap-port", "Connect to AP with specified port. If no AP with that port are present fallback AP will be used. Available ports are usually 80, 443 and 4070", "AP_PORT")
.optflag("", "disable-discovery", "Disable discovery mode")
.optopt(
"",
Expand Down Expand Up @@ -255,20 +256,23 @@ fn setup(args: &[String]) -> Setup {
proxy: matches.opt_str("proxy").or(std::env::var("http_proxy").ok()).map(
|s| {
match Url::parse(&s) {
Ok(url) => {
if url.host().is_none() || url.port().is_none() {
panic!("Invalid proxy url, only urls on the format \"http://host:port\" are allowed");
Ok(url) => {
if url.host().is_none() || url.port().is_none() {
panic!("Invalid proxy url, only urls on the format \"http://host:port\" are allowed");
}

if url.scheme() != "http" {
panic!("Only unsecure http:// proxies are supported");
}
url
},
Err(err) => panic!("Invalid proxy url: {}, only urls on the format \"http://host:port\" are allowed", err)
}

if url.scheme() != "http" {
panic!("Only unsecure http:// proxies are supported");
}
url
},
Err(err) => panic!("Invalid proxy url: {}, only urls on the format \"http://host:port\" are allowed", err)
}
},
),
ap_port: matches
.opt_str("ap-port")
.map(|port| port.parse::<u16>().expect("Invalid port")),
}
};

Expand Down

0 comments on commit ee87904

Please sign in to comment.