| 1 | /**************************************************************************/ | 
|---|
| 2 | /*  wsl_peer.cpp                                                          */ | 
|---|
| 3 | /**************************************************************************/ | 
|---|
| 4 | /*                         This file is part of:                          */ | 
|---|
| 5 | /*                             GODOT ENGINE                               */ | 
|---|
| 6 | /*                        https://godotengine.org                         */ | 
|---|
| 7 | /**************************************************************************/ | 
|---|
| 8 | /* Copyright (c) 2014-present Godot Engine contributors (see AUTHORS.md). */ | 
|---|
| 9 | /* Copyright (c) 2007-2014 Juan Linietsky, Ariel Manzur.                  */ | 
|---|
| 10 | /*                                                                        */ | 
|---|
| 11 | /* Permission is hereby granted, free of charge, to any person obtaining  */ | 
|---|
| 12 | /* a copy of this software and associated documentation files (the        */ | 
|---|
| 13 | /* "Software"), to deal in the Software without restriction, including    */ | 
|---|
| 14 | /* without limitation the rights to use, copy, modify, merge, publish,    */ | 
|---|
| 15 | /* distribute, sublicense, and/or sell copies of the Software, and to     */ | 
|---|
| 16 | /* permit persons to whom the Software is furnished to do so, subject to  */ | 
|---|
| 17 | /* the following conditions:                                              */ | 
|---|
| 18 | /*                                                                        */ | 
|---|
| 19 | /* The above copyright notice and this permission notice shall be         */ | 
|---|
| 20 | /* included in all copies or substantial portions of the Software.        */ | 
|---|
| 21 | /*                                                                        */ | 
|---|
| 22 | /* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,        */ | 
|---|
| 23 | /* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF     */ | 
|---|
| 24 | /* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. */ | 
|---|
| 25 | /* IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY   */ | 
|---|
| 26 | /* CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,   */ | 
|---|
| 27 | /* TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE      */ | 
|---|
| 28 | /* SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.                 */ | 
|---|
| 29 | /**************************************************************************/ | 
|---|
| 30 |  | 
|---|
| 31 | #include "wsl_peer.h" | 
|---|
| 32 |  | 
|---|
| 33 | #ifndef WEB_ENABLED | 
|---|
| 34 |  | 
|---|
| 35 | #include "core/io/stream_peer_tls.h" | 
|---|
| 36 |  | 
|---|
| 37 | CryptoCore::RandomGenerator *WSLPeer::_static_rng = nullptr; | 
|---|
| 38 |  | 
|---|
| 39 | void WSLPeer::initialize() { | 
|---|
| 40 | WebSocketPeer::_create = WSLPeer::_create; | 
|---|
| 41 | _static_rng = memnew(CryptoCore::RandomGenerator); | 
|---|
| 42 | _static_rng->init(); | 
|---|
| 43 | } | 
|---|
| 44 |  | 
|---|
| 45 | void WSLPeer::deinitialize() { | 
|---|
| 46 | if (_static_rng) { | 
|---|
| 47 | memdelete(_static_rng); | 
|---|
| 48 | _static_rng = nullptr; | 
|---|
| 49 | } | 
|---|
| 50 | } | 
|---|
| 51 |  | 
|---|
| 52 | /// | 
|---|
| 53 | /// Resolver | 
|---|
| 54 | /// | 
|---|
| 55 | void WSLPeer::Resolver::start(const String &p_host, int p_port) { | 
|---|
| 56 | stop(); | 
|---|
| 57 |  | 
|---|
| 58 | port = p_port; | 
|---|
| 59 | if (p_host.is_valid_ip_address()) { | 
|---|
| 60 | ip_candidates.push_back(IPAddress(p_host)); | 
|---|
| 61 | } else { | 
|---|
| 62 | // Queue hostname for resolution. | 
|---|
| 63 | resolver_id = IP::get_singleton()->resolve_hostname_queue_item(p_host); | 
|---|
| 64 | ERR_FAIL_COND(resolver_id == IP::RESOLVER_INVALID_ID); | 
|---|
| 65 | // Check if it was found in cache. | 
|---|
| 66 | IP::ResolverStatus ip_status = IP::get_singleton()->get_resolve_item_status(resolver_id); | 
|---|
| 67 | if (ip_status == IP::RESOLVER_STATUS_DONE) { | 
|---|
| 68 | ip_candidates = IP::get_singleton()->get_resolve_item_addresses(resolver_id); | 
|---|
| 69 | IP::get_singleton()->erase_resolve_item(resolver_id); | 
|---|
| 70 | resolver_id = IP::RESOLVER_INVALID_ID; | 
|---|
| 71 | } | 
|---|
| 72 | } | 
|---|
| 73 | } | 
|---|
| 74 |  | 
|---|
| 75 | void WSLPeer::Resolver::stop() { | 
|---|
| 76 | if (resolver_id != IP::RESOLVER_INVALID_ID) { | 
|---|
| 77 | IP::get_singleton()->erase_resolve_item(resolver_id); | 
|---|
| 78 | resolver_id = IP::RESOLVER_INVALID_ID; | 
|---|
| 79 | } | 
|---|
| 80 | port = 0; | 
|---|
| 81 | } | 
|---|
| 82 |  | 
|---|
| 83 | void WSLPeer::Resolver::try_next_candidate(Ref<StreamPeerTCP> &p_tcp) { | 
|---|
| 84 | // Check if we still need resolving. | 
|---|
| 85 | if (resolver_id != IP::RESOLVER_INVALID_ID) { | 
|---|
| 86 | IP::ResolverStatus ip_status = IP::get_singleton()->get_resolve_item_status(resolver_id); | 
|---|
| 87 | if (ip_status == IP::RESOLVER_STATUS_WAITING) { | 
|---|
| 88 | return; | 
|---|
| 89 | } | 
|---|
| 90 | if (ip_status == IP::RESOLVER_STATUS_DONE) { | 
|---|
| 91 | ip_candidates = IP::get_singleton()->get_resolve_item_addresses(resolver_id); | 
|---|
| 92 | } | 
|---|
| 93 | IP::get_singleton()->erase_resolve_item(resolver_id); | 
|---|
| 94 | resolver_id = IP::RESOLVER_INVALID_ID; | 
|---|
| 95 | } | 
|---|
| 96 |  | 
|---|
| 97 | // Try the current candidate if we have one. | 
|---|
| 98 | if (p_tcp->get_status() != StreamPeerTCP::STATUS_NONE) { | 
|---|
| 99 | p_tcp->poll(); | 
|---|
| 100 | StreamPeerTCP::Status status = p_tcp->get_status(); | 
|---|
| 101 | if (status == StreamPeerTCP::STATUS_CONNECTED) { | 
|---|
| 102 | p_tcp->set_no_delay(true); | 
|---|
| 103 | ip_candidates.clear(); | 
|---|
| 104 | return; | 
|---|
| 105 | } else if (status == StreamPeerTCP::STATUS_CONNECTING) { | 
|---|
| 106 | return; // Keep connecting. | 
|---|
| 107 | } else { | 
|---|
| 108 | p_tcp->disconnect_from_host(); | 
|---|
| 109 | } | 
|---|
| 110 | } | 
|---|
| 111 |  | 
|---|
| 112 | // Keep trying next candidate. | 
|---|
| 113 | while (ip_candidates.size()) { | 
|---|
| 114 | Error err = p_tcp->connect_to_host(ip_candidates.pop_front(), port); | 
|---|
| 115 | if (err == OK) { | 
|---|
| 116 | return; | 
|---|
| 117 | } else { | 
|---|
| 118 | p_tcp->disconnect_from_host(); | 
|---|
| 119 | } | 
|---|
| 120 | } | 
|---|
| 121 | } | 
|---|
| 122 |  | 
|---|
| 123 | /// | 
|---|
| 124 | /// Server functions | 
|---|
| 125 | /// | 
|---|
| 126 | Error WSLPeer::accept_stream(Ref<StreamPeer> p_stream) { | 
|---|
| 127 | ERR_FAIL_COND_V(wsl_ctx || tcp.is_valid(), ERR_ALREADY_IN_USE); | 
|---|
| 128 | ERR_FAIL_COND_V(p_stream.is_null(), ERR_INVALID_PARAMETER); | 
|---|
| 129 |  | 
|---|
| 130 | _clear(); | 
|---|
| 131 |  | 
|---|
| 132 | if (p_stream->is_class_ptr(StreamPeerTCP::get_class_ptr_static())) { | 
|---|
| 133 | tcp = p_stream; | 
|---|
| 134 | connection = p_stream; | 
|---|
| 135 | use_tls = false; | 
|---|
| 136 | } else if (p_stream->is_class_ptr(StreamPeerTLS::get_class_ptr_static())) { | 
|---|
| 137 | Ref<StreamPeer> base_stream = static_cast<Ref<StreamPeerTLS>>(p_stream)->get_stream(); | 
|---|
| 138 | ERR_FAIL_COND_V(base_stream.is_null() || !base_stream->is_class_ptr(StreamPeerTCP::get_class_ptr_static()), ERR_INVALID_PARAMETER); | 
|---|
| 139 | tcp = static_cast<Ref<StreamPeerTCP>>(base_stream); | 
|---|
| 140 | connection = p_stream; | 
|---|
| 141 | use_tls = true; | 
|---|
| 142 | } | 
|---|
| 143 | ERR_FAIL_COND_V(connection.is_null() || tcp.is_null(), ERR_INVALID_PARAMETER); | 
|---|
| 144 | is_server = true; | 
|---|
| 145 | ready_state = STATE_CONNECTING; | 
|---|
| 146 | handshake_buffer->resize(WSL_MAX_HEADER_SIZE); | 
|---|
| 147 | handshake_buffer->seek(0); | 
|---|
| 148 | return OK; | 
|---|
| 149 | } | 
|---|
| 150 |  | 
|---|
| 151 | bool WSLPeer::_parse_client_request() { | 
|---|
| 152 | Vector<String> psa = String((const char *)handshake_buffer->get_data_array().ptr(), handshake_buffer->get_position() - 4).split( "\r\n"); | 
|---|
| 153 | int len = psa.size(); | 
|---|
| 154 | ERR_FAIL_COND_V_MSG(len < 4, false, "Not enough response headers, got: "+ itos(len) + ", expected >= 4."); | 
|---|
| 155 |  | 
|---|
| 156 | Vector<String> req = psa[0].split( " ", false); | 
|---|
| 157 | ERR_FAIL_COND_V_MSG(req.size() < 2, false, "Invalid protocol or status code."); | 
|---|
| 158 |  | 
|---|
| 159 | // Wrong protocol | 
|---|
| 160 | ERR_FAIL_COND_V_MSG(req[0] != "GET"|| req[2] != "HTTP/1.1", false, "Invalid method or HTTP version."); | 
|---|
| 161 |  | 
|---|
| 162 | HashMap<String, String> ; | 
|---|
| 163 | for (int i = 1; i < len; i++) { | 
|---|
| 164 | Vector<String>  = psa[i].split( ":", false, 1); | 
|---|
| 165 | ERR_FAIL_COND_V_MSG(header.size() != 2, false, "Invalid header -> "+ psa[i]); | 
|---|
| 166 | String name = header[0].to_lower(); | 
|---|
| 167 | String value = header[1].strip_edges(); | 
|---|
| 168 | if (headers.has(name)) { | 
|---|
| 169 | headers[name] += ","+ value; | 
|---|
| 170 | } else { | 
|---|
| 171 | headers[name] = value; | 
|---|
| 172 | } | 
|---|
| 173 | } | 
|---|
| 174 | requested_host = headers.has( "host") ? headers.get( "host") : ""; | 
|---|
| 175 | requested_url = (use_tls ? "wss://": "ws://") + requested_host + req[1]; | 
|---|
| 176 | #define WSL_CHECK(NAME, VALUE)                                                          \ | 
|---|
| 177 | ERR_FAIL_COND_V_MSG(!headers.has(NAME) || headers[NAME].to_lower() != VALUE, false, \ | 
|---|
| 178 | "Missing or invalid header '" + String(NAME) + "'. Expected value '" + VALUE + "'."); | 
|---|
| 179 | #define WSL_CHECK_EX(NAME) \ | 
|---|
| 180 | ERR_FAIL_COND_V_MSG(!headers.has(NAME), false, "Missing header '" + String(NAME) + "'."); | 
|---|
| 181 | WSL_CHECK( "upgrade", "websocket"); | 
|---|
| 182 | WSL_CHECK( "sec-websocket-version", "13"); | 
|---|
| 183 | WSL_CHECK_EX( "sec-websocket-key"); | 
|---|
| 184 | WSL_CHECK_EX( "connection"); | 
|---|
| 185 | #undef WSL_CHECK_EX | 
|---|
| 186 | #undef WSL_CHECK | 
|---|
| 187 | session_key = headers[ "sec-websocket-key"]; | 
|---|
| 188 | if (headers.has( "sec-websocket-protocol")) { | 
|---|
| 189 | Vector<String> protos = headers[ "sec-websocket-protocol"].split( ","); | 
|---|
| 190 | for (int i = 0; i < protos.size(); i++) { | 
|---|
| 191 | String proto = protos[i].strip_edges(); | 
|---|
| 192 | // Check if we have the given protocol | 
|---|
| 193 | for (int j = 0; j < supported_protocols.size(); j++) { | 
|---|
| 194 | if (proto != supported_protocols[j]) { | 
|---|
| 195 | continue; | 
|---|
| 196 | } | 
|---|
| 197 | selected_protocol = proto; | 
|---|
| 198 | break; | 
|---|
| 199 | } | 
|---|
| 200 | // Found a protocol | 
|---|
| 201 | if (!selected_protocol.is_empty()) { | 
|---|
| 202 | break; | 
|---|
| 203 | } | 
|---|
| 204 | } | 
|---|
| 205 | if (selected_protocol.is_empty()) { // Invalid protocol(s) requested | 
|---|
| 206 | return false; | 
|---|
| 207 | } | 
|---|
| 208 | } else if (supported_protocols.size() > 0) { // No protocol requested, but we need one | 
|---|
| 209 | return false; | 
|---|
| 210 | } | 
|---|
| 211 | return true; | 
|---|
| 212 | } | 
|---|
| 213 |  | 
|---|
| 214 | Error WSLPeer::_do_server_handshake() { | 
|---|
| 215 | if (use_tls) { | 
|---|
| 216 | Ref<StreamPeerTLS> tls = static_cast<Ref<StreamPeerTLS>>(connection); | 
|---|
| 217 | if (tls.is_null()) { | 
|---|
| 218 | ERR_FAIL_V_MSG(ERR_BUG, "Couldn't get StreamPeerTLS for WebSocket handshake."); | 
|---|
| 219 | close(-1); | 
|---|
| 220 | return FAILED; | 
|---|
| 221 | } | 
|---|
| 222 | tls->poll(); | 
|---|
| 223 | if (tls->get_status() == StreamPeerTLS::STATUS_HANDSHAKING) { | 
|---|
| 224 | return OK; // Pending handshake | 
|---|
| 225 | } else if (tls->get_status() != StreamPeerTLS::STATUS_CONNECTED) { | 
|---|
| 226 | print_verbose(vformat( "WebSocket SSL connection error during handshake (StreamPeerTLS status code %d).", tls->get_status())); | 
|---|
| 227 | close(-1); | 
|---|
| 228 | return FAILED; | 
|---|
| 229 | } | 
|---|
| 230 | } | 
|---|
| 231 |  | 
|---|
| 232 | if (pending_request) { | 
|---|
| 233 | int read = 0; | 
|---|
| 234 | while (true) { | 
|---|
| 235 | ERR_FAIL_COND_V_MSG(handshake_buffer->get_available_bytes() < 1, ERR_OUT_OF_MEMORY, "WebSocket response headers are too big."); | 
|---|
| 236 | int pos = handshake_buffer->get_position(); | 
|---|
| 237 | uint8_t byte; | 
|---|
| 238 | Error err = connection->get_partial_data(&byte, 1, read); | 
|---|
| 239 | if (err != OK) { // Got an error | 
|---|
| 240 | print_verbose(vformat( "WebSocket error while getting partial data (StreamPeer error code %d).", err)); | 
|---|
| 241 | close(-1); | 
|---|
| 242 | return FAILED; | 
|---|
| 243 | } else if (read != 1) { // Busy, wait next poll | 
|---|
| 244 | return OK; | 
|---|
| 245 | } | 
|---|
| 246 | handshake_buffer->put_u8(byte); | 
|---|
| 247 | const char *r = (const char *)handshake_buffer->get_data_array().ptr(); | 
|---|
| 248 | int l = pos; | 
|---|
| 249 | if (l > 3 && r[l] == '\n' && r[l - 1] == '\r' && r[l - 2] == '\n' && r[l - 3] == '\r') { | 
|---|
| 250 | if (!_parse_client_request()) { | 
|---|
| 251 | close(-1); | 
|---|
| 252 | return FAILED; | 
|---|
| 253 | } | 
|---|
| 254 | String s = "HTTP/1.1 101 Switching Protocols\r\n"; | 
|---|
| 255 | s += "Upgrade: websocket\r\n"; | 
|---|
| 256 | s += "Connection: Upgrade\r\n"; | 
|---|
| 257 | s += "Sec-WebSocket-Accept: "+ _compute_key_response(session_key) + "\r\n"; | 
|---|
| 258 | if (!selected_protocol.is_empty()) { | 
|---|
| 259 | s += "Sec-WebSocket-Protocol: "+ selected_protocol + "\r\n"; | 
|---|
| 260 | } | 
|---|
| 261 | for (int i = 0; i < handshake_headers.size(); i++) { | 
|---|
| 262 | s += handshake_headers[i] + "\r\n"; | 
|---|
| 263 | } | 
|---|
| 264 | s += "\r\n"; | 
|---|
| 265 | CharString cs = s.utf8(); | 
|---|
| 266 | handshake_buffer->clear(); | 
|---|
| 267 | handshake_buffer->put_data((const uint8_t *)cs.get_data(), cs.length()); | 
|---|
| 268 | handshake_buffer->seek(0); | 
|---|
| 269 | pending_request = false; | 
|---|
| 270 | break; | 
|---|
| 271 | } | 
|---|
| 272 | } | 
|---|
| 273 | } | 
|---|
| 274 |  | 
|---|
| 275 | if (pending_request) { // Still pending. | 
|---|
| 276 | return OK; | 
|---|
| 277 | } | 
|---|
| 278 |  | 
|---|
| 279 | int left = handshake_buffer->get_available_bytes(); | 
|---|
| 280 | if (left) { | 
|---|
| 281 | Vector<uint8_t> data = handshake_buffer->get_data_array(); | 
|---|
| 282 | int pos = handshake_buffer->get_position(); | 
|---|
| 283 | int sent = 0; | 
|---|
| 284 | Error err = connection->put_partial_data(data.ptr() + pos, left, sent); | 
|---|
| 285 | if (err != OK) { | 
|---|
| 286 | print_verbose(vformat( "WebSocket error while putting partial data (StreamPeer error code %d).", err)); | 
|---|
| 287 | close(-1); | 
|---|
| 288 | return err; | 
|---|
| 289 | } | 
|---|
| 290 | handshake_buffer->seek(pos + sent); | 
|---|
| 291 | left -= sent; | 
|---|
| 292 | if (left == 0) { | 
|---|
| 293 | resolver.stop(); | 
|---|
| 294 | // Response sent, initialize wslay context. | 
|---|
| 295 | wslay_event_context_server_init(&wsl_ctx, &_wsl_callbacks, this); | 
|---|
| 296 | wslay_event_config_set_max_recv_msg_length(wsl_ctx, inbound_buffer_size); | 
|---|
| 297 | in_buffer.resize(nearest_shift(inbound_buffer_size), max_queued_packets); | 
|---|
| 298 | packet_buffer.resize(inbound_buffer_size); | 
|---|
| 299 | ready_state = STATE_OPEN; | 
|---|
| 300 | } | 
|---|
| 301 | } | 
|---|
| 302 |  | 
|---|
| 303 | return OK; | 
|---|
| 304 | } | 
|---|
| 305 |  | 
|---|
| 306 | /// | 
|---|
| 307 | /// Client functions | 
|---|
| 308 | /// | 
|---|
| 309 | void WSLPeer::_do_client_handshake() { | 
|---|
| 310 | ERR_FAIL_COND(tcp.is_null()); | 
|---|
| 311 |  | 
|---|
| 312 | // Try to connect to candidates. | 
|---|
| 313 | if (resolver.has_more_candidates()) { | 
|---|
| 314 | resolver.try_next_candidate(tcp); | 
|---|
| 315 | if (resolver.has_more_candidates()) { | 
|---|
| 316 | return; // Still pending. | 
|---|
| 317 | } | 
|---|
| 318 | } | 
|---|
| 319 |  | 
|---|
| 320 | tcp->poll(); | 
|---|
| 321 | if (tcp->get_status() == StreamPeerTCP::STATUS_CONNECTING) { | 
|---|
| 322 | return; // Keep connecting. | 
|---|
| 323 | } else if (tcp->get_status() != StreamPeerTCP::STATUS_CONNECTED) { | 
|---|
| 324 | close(-1); // Failed to connect. | 
|---|
| 325 | return; | 
|---|
| 326 | } | 
|---|
| 327 |  | 
|---|
| 328 | if (use_tls) { | 
|---|
| 329 | Ref<StreamPeerTLS> tls; | 
|---|
| 330 | if (connection == tcp) { | 
|---|
| 331 | // Start SSL handshake | 
|---|
| 332 | tls = Ref<StreamPeerTLS>(StreamPeerTLS::create()); | 
|---|
| 333 | ERR_FAIL_COND(tls.is_null()); | 
|---|
| 334 | if (tls->connect_to_stream(tcp, requested_host, tls_options) != OK) { | 
|---|
| 335 | close(-1); | 
|---|
| 336 | return; // Error. | 
|---|
| 337 | } | 
|---|
| 338 | connection = tls; | 
|---|
| 339 | } else { | 
|---|
| 340 | tls = static_cast<Ref<StreamPeerTLS>>(connection); | 
|---|
| 341 | ERR_FAIL_COND(tls.is_null()); | 
|---|
| 342 | tls->poll(); | 
|---|
| 343 | } | 
|---|
| 344 | if (tls->get_status() == StreamPeerTLS::STATUS_HANDSHAKING) { | 
|---|
| 345 | return; // Need more polling. | 
|---|
| 346 | } else if (tls->get_status() != StreamPeerTLS::STATUS_CONNECTED) { | 
|---|
| 347 | close(-1); | 
|---|
| 348 | return; // Error. | 
|---|
| 349 | } | 
|---|
| 350 | } | 
|---|
| 351 |  | 
|---|
| 352 | // Do websocket handshake. | 
|---|
| 353 | if (pending_request) { | 
|---|
| 354 | int left = handshake_buffer->get_available_bytes(); | 
|---|
| 355 | int pos = handshake_buffer->get_position(); | 
|---|
| 356 | const Vector<uint8_t> data = handshake_buffer->get_data_array(); | 
|---|
| 357 | int sent = 0; | 
|---|
| 358 | Error err = connection->put_partial_data(data.ptr() + pos, left, sent); | 
|---|
| 359 | // Sending handshake failed | 
|---|
| 360 | if (err != OK) { | 
|---|
| 361 | close(-1); | 
|---|
| 362 | return; // Error. | 
|---|
| 363 | } | 
|---|
| 364 | handshake_buffer->seek(pos + sent); | 
|---|
| 365 | if (handshake_buffer->get_available_bytes() == 0) { | 
|---|
| 366 | pending_request = false; | 
|---|
| 367 | handshake_buffer->clear(); | 
|---|
| 368 | handshake_buffer->resize(WSL_MAX_HEADER_SIZE); | 
|---|
| 369 | handshake_buffer->seek(0); | 
|---|
| 370 | } | 
|---|
| 371 | } else { | 
|---|
| 372 | int read = 0; | 
|---|
| 373 | while (true) { | 
|---|
| 374 | int left = handshake_buffer->get_available_bytes(); | 
|---|
| 375 | int pos = handshake_buffer->get_position(); | 
|---|
| 376 | if (left == 0) { | 
|---|
| 377 | // Header is too big | 
|---|
| 378 | close(-1); | 
|---|
| 379 | ERR_FAIL_MSG( "Response headers too big."); | 
|---|
| 380 | } | 
|---|
| 381 |  | 
|---|
| 382 | uint8_t byte; | 
|---|
| 383 | Error err = connection->get_partial_data(&byte, 1, read); | 
|---|
| 384 | if (err != OK) { | 
|---|
| 385 | // Got some error. | 
|---|
| 386 | close(-1); | 
|---|
| 387 | return; | 
|---|
| 388 | } else if (read != 1) { | 
|---|
| 389 | // Busy, wait next poll. | 
|---|
| 390 | break; | 
|---|
| 391 | } | 
|---|
| 392 | handshake_buffer->put_u8(byte); | 
|---|
| 393 |  | 
|---|
| 394 | // Check "\r\n\r\n" header terminator | 
|---|
| 395 | const char *r = (const char *)handshake_buffer->get_data_array().ptr(); | 
|---|
| 396 | int l = pos; | 
|---|
| 397 | if (l > 3 && r[l] == '\n' && r[l - 1] == '\r' && r[l - 2] == '\n' && r[l - 3] == '\r') { | 
|---|
| 398 | // Response is over, verify headers and initialize wslay context/ | 
|---|
| 399 | if (!_verify_server_response()) { | 
|---|
| 400 | close(-1); | 
|---|
| 401 | ERR_FAIL_MSG( "Invalid response headers."); | 
|---|
| 402 | } | 
|---|
| 403 | wslay_event_context_client_init(&wsl_ctx, &_wsl_callbacks, this); | 
|---|
| 404 | wslay_event_config_set_max_recv_msg_length(wsl_ctx, inbound_buffer_size); | 
|---|
| 405 | in_buffer.resize(nearest_shift(inbound_buffer_size), max_queued_packets); | 
|---|
| 406 | packet_buffer.resize(inbound_buffer_size); | 
|---|
| 407 | ready_state = STATE_OPEN; | 
|---|
| 408 | break; | 
|---|
| 409 | } | 
|---|
| 410 | } | 
|---|
| 411 | } | 
|---|
| 412 | } | 
|---|
| 413 |  | 
|---|
| 414 | bool WSLPeer::_verify_server_response() { | 
|---|
| 415 | Vector<String> psa = String((const char *)handshake_buffer->get_data_array().ptr(), handshake_buffer->get_position() - 4).split( "\r\n"); | 
|---|
| 416 | int len = psa.size(); | 
|---|
| 417 | ERR_FAIL_COND_V_MSG(len < 4, false, "Not enough response headers. Got: "+ itos(len) + ", expected >= 4."); | 
|---|
| 418 |  | 
|---|
| 419 | Vector<String> req = psa[0].split( " ", false); | 
|---|
| 420 | ERR_FAIL_COND_V_MSG(req.size() < 2, false, "Invalid protocol or status code. Got '"+ psa[0] + "', expected 'HTTP/1.1 101'."); | 
|---|
| 421 |  | 
|---|
| 422 | // Wrong protocol | 
|---|
| 423 | ERR_FAIL_COND_V_MSG(req[0] != "HTTP/1.1", false, "Invalid protocol. Got: '"+ req[0] + "', expected 'HTTP/1.1'."); | 
|---|
| 424 | ERR_FAIL_COND_V_MSG(req[1] != "101", false, "Invalid status code. Got: '"+ req[1] + "', expected '101'."); | 
|---|
| 425 |  | 
|---|
| 426 | HashMap<String, String> ; | 
|---|
| 427 | for (int i = 1; i < len; i++) { | 
|---|
| 428 | Vector<String>  = psa[i].split( ":", false, 1); | 
|---|
| 429 | ERR_FAIL_COND_V_MSG(header.size() != 2, false, "Invalid header -> "+ psa[i] + "."); | 
|---|
| 430 | String name = header[0].to_lower(); | 
|---|
| 431 | String value = header[1].strip_edges(); | 
|---|
| 432 | if (headers.has(name)) { | 
|---|
| 433 | headers[name] += ","+ value; | 
|---|
| 434 | } else { | 
|---|
| 435 | headers[name] = value; | 
|---|
| 436 | } | 
|---|
| 437 | } | 
|---|
| 438 |  | 
|---|
| 439 | #define WSL_CHECK(NAME, VALUE)                                                          \ | 
|---|
| 440 | ERR_FAIL_COND_V_MSG(!headers.has(NAME) || headers[NAME].to_lower() != VALUE, false, \ | 
|---|
| 441 | "Missing or invalid header '" + String(NAME) + "'. Expected value '" + VALUE + "'."); | 
|---|
| 442 | #define WSL_CHECK_NC(NAME, VALUE)                                            \ | 
|---|
| 443 | ERR_FAIL_COND_V_MSG(!headers.has(NAME) || headers[NAME] != VALUE, false, \ | 
|---|
| 444 | "Missing or invalid header '" + String(NAME) + "'. Expected value '" + VALUE + "'."); | 
|---|
| 445 | WSL_CHECK( "connection", "upgrade"); | 
|---|
| 446 | WSL_CHECK( "upgrade", "websocket"); | 
|---|
| 447 | WSL_CHECK_NC( "sec-websocket-accept", _compute_key_response(session_key)); | 
|---|
| 448 | #undef WSL_CHECK_NC | 
|---|
| 449 | #undef WSL_CHECK | 
|---|
| 450 | if (supported_protocols.size() == 0) { | 
|---|
| 451 | // We didn't request a custom protocol | 
|---|
| 452 | ERR_FAIL_COND_V_MSG(headers.has( "sec-websocket-protocol"), false, "Received unrequested sub-protocol -> "+ headers[ "sec-websocket-protocol"]); | 
|---|
| 453 | } else { | 
|---|
| 454 | // We requested at least one custom protocol but didn't receive one | 
|---|
| 455 | ERR_FAIL_COND_V_MSG(!headers.has( "sec-websocket-protocol"), false, "Requested sub-protocol(s) but received none."); | 
|---|
| 456 | // Check received sub-protocol was one of those requested. | 
|---|
| 457 | selected_protocol = headers[ "sec-websocket-protocol"]; | 
|---|
| 458 | bool valid = false; | 
|---|
| 459 | for (int i = 0; i < supported_protocols.size(); i++) { | 
|---|
| 460 | if (supported_protocols[i] != selected_protocol) { | 
|---|
| 461 | continue; | 
|---|
| 462 | } | 
|---|
| 463 | valid = true; | 
|---|
| 464 | break; | 
|---|
| 465 | } | 
|---|
| 466 | if (!valid) { | 
|---|
| 467 | ERR_FAIL_V_MSG(false, "Received unrequested sub-protocol -> "+ selected_protocol); | 
|---|
| 468 | } | 
|---|
| 469 | } | 
|---|
| 470 | return true; | 
|---|
| 471 | } | 
|---|
| 472 |  | 
|---|
| 473 | Error WSLPeer::connect_to_url(const String &p_url, Ref<TLSOptions> p_options) { | 
|---|
| 474 | ERR_FAIL_COND_V(wsl_ctx || tcp.is_valid(), ERR_ALREADY_IN_USE); | 
|---|
| 475 | ERR_FAIL_COND_V(p_url.is_empty(), ERR_INVALID_PARAMETER); | 
|---|
| 476 | ERR_FAIL_COND_V(p_options.is_valid() && p_options->is_server(), ERR_INVALID_PARAMETER); | 
|---|
| 477 |  | 
|---|
| 478 | _clear(); | 
|---|
| 479 |  | 
|---|
| 480 | String host; | 
|---|
| 481 | String path; | 
|---|
| 482 | String scheme; | 
|---|
| 483 | int port = 0; | 
|---|
| 484 | Error err = p_url.parse_url(scheme, host, port, path); | 
|---|
| 485 | ERR_FAIL_COND_V_MSG(err != OK, err, "Invalid URL: "+ p_url); | 
|---|
| 486 | if (scheme.is_empty()) { | 
|---|
| 487 | scheme = "ws://"; | 
|---|
| 488 | } | 
|---|
| 489 | ERR_FAIL_COND_V_MSG(scheme != "ws://"&& scheme != "wss://", ERR_INVALID_PARAMETER, vformat( "Invalid protocol: \"%s\" (must be either \"ws://\" or \"wss://\").", scheme)); | 
|---|
| 490 |  | 
|---|
| 491 | use_tls = false; | 
|---|
| 492 | if (scheme == "wss://") { | 
|---|
| 493 | use_tls = true; | 
|---|
| 494 | } | 
|---|
| 495 | if (port == 0) { | 
|---|
| 496 | port = use_tls ? 443 : 80; | 
|---|
| 497 | } | 
|---|
| 498 | if (path.is_empty()) { | 
|---|
| 499 | path = "/"; | 
|---|
| 500 | } | 
|---|
| 501 |  | 
|---|
| 502 | ERR_FAIL_COND_V_MSG(use_tls && !StreamPeerTLS::is_available(), ERR_UNAVAILABLE, "WSS is not available in this build."); | 
|---|
| 503 |  | 
|---|
| 504 | requested_url = p_url; | 
|---|
| 505 | requested_host = host; | 
|---|
| 506 |  | 
|---|
| 507 | if (p_options.is_valid()) { | 
|---|
| 508 | tls_options = p_options; | 
|---|
| 509 | } else { | 
|---|
| 510 | tls_options = TLSOptions::client(); | 
|---|
| 511 | } | 
|---|
| 512 |  | 
|---|
| 513 | tcp.instantiate(); | 
|---|
| 514 |  | 
|---|
| 515 | resolver.start(host, port); | 
|---|
| 516 | resolver.try_next_candidate(tcp); | 
|---|
| 517 |  | 
|---|
| 518 | if (tcp->get_status() != StreamPeerTCP::STATUS_CONNECTING && tcp->get_status() != StreamPeerTCP::STATUS_CONNECTED && !resolver.has_more_candidates()) { | 
|---|
| 519 | _clear(); | 
|---|
| 520 | return FAILED; | 
|---|
| 521 | } | 
|---|
| 522 | connection = tcp; | 
|---|
| 523 |  | 
|---|
| 524 | // Prepare handshake request. | 
|---|
| 525 | session_key = _generate_key(); | 
|---|
| 526 | String request = "GET "+ path + " HTTP/1.1\r\n"; | 
|---|
| 527 | String port_string; | 
|---|
| 528 | if ((port != 80 && !use_tls) || (port != 443 && use_tls)) { | 
|---|
| 529 | port_string = ":"+ itos(port); | 
|---|
| 530 | } | 
|---|
| 531 | request += "Host: "+ host + port_string + "\r\n"; | 
|---|
| 532 | request += "Upgrade: websocket\r\n"; | 
|---|
| 533 | request += "Connection: Upgrade\r\n"; | 
|---|
| 534 | request += "Sec-WebSocket-Key: "+ session_key + "\r\n"; | 
|---|
| 535 | request += "Sec-WebSocket-Version: 13\r\n"; | 
|---|
| 536 | if (supported_protocols.size() > 0) { | 
|---|
| 537 | request += "Sec-WebSocket-Protocol: "; | 
|---|
| 538 | for (int i = 0; i < supported_protocols.size(); i++) { | 
|---|
| 539 | if (i != 0) { | 
|---|
| 540 | request += ","; | 
|---|
| 541 | } | 
|---|
| 542 | request += supported_protocols[i]; | 
|---|
| 543 | } | 
|---|
| 544 | request += "\r\n"; | 
|---|
| 545 | } | 
|---|
| 546 | for (int i = 0; i < handshake_headers.size(); i++) { | 
|---|
| 547 | request += handshake_headers[i] + "\r\n"; | 
|---|
| 548 | } | 
|---|
| 549 | request += "\r\n"; | 
|---|
| 550 | CharString cs = request.utf8(); | 
|---|
| 551 | handshake_buffer->put_data((const uint8_t *)cs.get_data(), cs.length()); | 
|---|
| 552 | handshake_buffer->seek(0); | 
|---|
| 553 | ready_state = STATE_CONNECTING; | 
|---|
| 554 | is_server = false; | 
|---|
| 555 | return OK; | 
|---|
| 556 | } | 
|---|
| 557 |  | 
|---|
| 558 | /// | 
|---|
| 559 | /// Callback functions. | 
|---|
| 560 | /// | 
|---|
| 561 | ssize_t WSLPeer::_wsl_recv_callback(wslay_event_context_ptr ctx, uint8_t *data, size_t len, int flags, void *user_data) { | 
|---|
| 562 | WSLPeer *peer = (WSLPeer *)user_data; | 
|---|
| 563 | Ref<StreamPeer> conn = peer->connection; | 
|---|
| 564 | if (conn.is_null()) { | 
|---|
| 565 | wslay_event_set_error(ctx, WSLAY_ERR_CALLBACK_FAILURE); | 
|---|
| 566 | return -1; | 
|---|
| 567 | } | 
|---|
| 568 | int read = 0; | 
|---|
| 569 | Error err = conn->get_partial_data(data, len, read); | 
|---|
| 570 | if (err != OK) { | 
|---|
| 571 | print_verbose( "Websocket get data error: "+ itos(err) + ", read (should be 0!): "+ itos(read)); | 
|---|
| 572 | wslay_event_set_error(ctx, WSLAY_ERR_CALLBACK_FAILURE); | 
|---|
| 573 | return -1; | 
|---|
| 574 | } | 
|---|
| 575 | if (read == 0) { | 
|---|
| 576 | wslay_event_set_error(ctx, WSLAY_ERR_WOULDBLOCK); | 
|---|
| 577 | return -1; | 
|---|
| 578 | } | 
|---|
| 579 | return read; | 
|---|
| 580 | } | 
|---|
| 581 |  | 
|---|
| 582 | ssize_t WSLPeer::_wsl_send_callback(wslay_event_context_ptr ctx, const uint8_t *data, size_t len, int flags, void *user_data) { | 
|---|
| 583 | WSLPeer *peer = (WSLPeer *)user_data; | 
|---|
| 584 | Ref<StreamPeer> conn = peer->connection; | 
|---|
| 585 | if (conn.is_null()) { | 
|---|
| 586 | wslay_event_set_error(ctx, WSLAY_ERR_CALLBACK_FAILURE); | 
|---|
| 587 | return -1; | 
|---|
| 588 | } | 
|---|
| 589 | int sent = 0; | 
|---|
| 590 | Error err = conn->put_partial_data(data, len, sent); | 
|---|
| 591 | if (err != OK) { | 
|---|
| 592 | wslay_event_set_error(ctx, WSLAY_ERR_CALLBACK_FAILURE); | 
|---|
| 593 | return -1; | 
|---|
| 594 | } | 
|---|
| 595 | if (sent == 0) { | 
|---|
| 596 | wslay_event_set_error(ctx, WSLAY_ERR_WOULDBLOCK); | 
|---|
| 597 | return -1; | 
|---|
| 598 | } | 
|---|
| 599 | return sent; | 
|---|
| 600 | } | 
|---|
| 601 |  | 
|---|
| 602 | int WSLPeer::_wsl_genmask_callback(wslay_event_context_ptr ctx, uint8_t *buf, size_t len, void *user_data) { | 
|---|
| 603 | ERR_FAIL_COND_V(!_static_rng, WSLAY_ERR_CALLBACK_FAILURE); | 
|---|
| 604 | Error err = _static_rng->get_random_bytes(buf, len); | 
|---|
| 605 | ERR_FAIL_COND_V(err != OK, WSLAY_ERR_CALLBACK_FAILURE); | 
|---|
| 606 | return 0; | 
|---|
| 607 | } | 
|---|
| 608 |  | 
|---|
| 609 | void WSLPeer::_wsl_msg_recv_callback(wslay_event_context_ptr ctx, const struct wslay_event_on_msg_recv_arg *arg, void *user_data) { | 
|---|
| 610 | WSLPeer *peer = (WSLPeer *)user_data; | 
|---|
| 611 | uint8_t op = arg->opcode; | 
|---|
| 612 |  | 
|---|
| 613 | if (op == WSLAY_CONNECTION_CLOSE) { | 
|---|
| 614 | // Close request or confirmation. | 
|---|
| 615 | peer->close_code = arg->status_code; | 
|---|
| 616 | size_t len = arg->msg_length; | 
|---|
| 617 | peer->close_reason = ""; | 
|---|
| 618 | if (len > 2 /* first 2 bytes = close code */) { | 
|---|
| 619 | peer->close_reason.parse_utf8((char *)arg->msg + 2, len - 2); | 
|---|
| 620 | } | 
|---|
| 621 | if (peer->ready_state == STATE_OPEN) { | 
|---|
| 622 | peer->ready_state = STATE_CLOSING; | 
|---|
| 623 | } | 
|---|
| 624 | return; | 
|---|
| 625 | } | 
|---|
| 626 |  | 
|---|
| 627 | if (peer->ready_state == STATE_CLOSING) { | 
|---|
| 628 | return; | 
|---|
| 629 | } | 
|---|
| 630 |  | 
|---|
| 631 | if (op == WSLAY_TEXT_FRAME || op == WSLAY_BINARY_FRAME) { | 
|---|
| 632 | // Message. | 
|---|
| 633 | uint8_t is_string = arg->opcode == WSLAY_TEXT_FRAME ? 1 : 0; | 
|---|
| 634 | peer->in_buffer.write_packet(arg->msg, arg->msg_length, &is_string); | 
|---|
| 635 | } | 
|---|
| 636 | // Ping or pong. | 
|---|
| 637 | } | 
|---|
| 638 |  | 
|---|
| 639 | wslay_event_callbacks WSLPeer::_wsl_callbacks = { | 
|---|
| 640 | _wsl_recv_callback, | 
|---|
| 641 | _wsl_send_callback, | 
|---|
| 642 | _wsl_genmask_callback, | 
|---|
| 643 | nullptr, /* on_frame_recv_start_callback */ | 
|---|
| 644 | nullptr, /* on_frame_recv_callback */ | 
|---|
| 645 | nullptr, /* on_frame_recv_end_callback */ | 
|---|
| 646 | _wsl_msg_recv_callback | 
|---|
| 647 | }; | 
|---|
| 648 |  | 
|---|
| 649 | String WSLPeer::_generate_key() { | 
|---|
| 650 | // Random key | 
|---|
| 651 | Vector<uint8_t> bkey; | 
|---|
| 652 | int len = 16; // 16 bytes, as per RFC | 
|---|
| 653 | bkey.resize(len); | 
|---|
| 654 | _wsl_genmask_callback(nullptr, bkey.ptrw(), len, nullptr); | 
|---|
| 655 | return CryptoCore::b64_encode_str(bkey.ptrw(), len); | 
|---|
| 656 | } | 
|---|
| 657 |  | 
|---|
| 658 | String WSLPeer::_compute_key_response(String p_key) { | 
|---|
| 659 | String key = p_key + "258EAFA5-E914-47DA-95CA-C5AB0DC85B11"; // Magic UUID as per RFC | 
|---|
| 660 | Vector<uint8_t> sha = key.sha1_buffer(); | 
|---|
| 661 | return CryptoCore::b64_encode_str(sha.ptr(), sha.size()); | 
|---|
| 662 | } | 
|---|
| 663 |  | 
|---|
| 664 | void WSLPeer::poll() { | 
|---|
| 665 | // Nothing to do. | 
|---|
| 666 | if (ready_state == STATE_CLOSED) { | 
|---|
| 667 | return; | 
|---|
| 668 | } | 
|---|
| 669 |  | 
|---|
| 670 | if (ready_state == STATE_CONNECTING) { | 
|---|
| 671 | if (is_server) { | 
|---|
| 672 | _do_server_handshake(); | 
|---|
| 673 | } else { | 
|---|
| 674 | _do_client_handshake(); | 
|---|
| 675 | } | 
|---|
| 676 | } | 
|---|
| 677 |  | 
|---|
| 678 | if (ready_state == STATE_OPEN || ready_state == STATE_CLOSING) { | 
|---|
| 679 | ERR_FAIL_COND(!wsl_ctx); | 
|---|
| 680 | int err = 0; | 
|---|
| 681 | if ((err = wslay_event_recv(wsl_ctx)) != 0 || (err = wslay_event_send(wsl_ctx)) != 0) { | 
|---|
| 682 | // Error close. | 
|---|
| 683 | print_verbose( "Websocket (wslay) poll error: "+ itos(err)); | 
|---|
| 684 | wslay_event_context_free(wsl_ctx); | 
|---|
| 685 | wsl_ctx = nullptr; | 
|---|
| 686 | close(-1); | 
|---|
| 687 | return; | 
|---|
| 688 | } | 
|---|
| 689 | if (wslay_event_get_close_sent(wsl_ctx) && wslay_event_get_close_received(wsl_ctx)) { | 
|---|
| 690 | // Clean close. | 
|---|
| 691 | wslay_event_context_free(wsl_ctx); | 
|---|
| 692 | wsl_ctx = nullptr; | 
|---|
| 693 | close(-1); | 
|---|
| 694 | return; | 
|---|
| 695 | } | 
|---|
| 696 | } | 
|---|
| 697 | } | 
|---|
| 698 |  | 
|---|
| 699 | Error WSLPeer::_send(const uint8_t *p_buffer, int p_buffer_size, wslay_opcode p_opcode) { | 
|---|
| 700 | ERR_FAIL_COND_V(ready_state != STATE_OPEN, FAILED); | 
|---|
| 701 | ERR_FAIL_COND_V(wslay_event_get_queued_msg_count(wsl_ctx) >= (uint32_t)max_queued_packets, ERR_OUT_OF_MEMORY); | 
|---|
| 702 | ERR_FAIL_COND_V(outbound_buffer_size > 0 && (wslay_event_get_queued_msg_length(wsl_ctx) + p_buffer_size > (uint32_t)outbound_buffer_size), ERR_OUT_OF_MEMORY); | 
|---|
| 703 |  | 
|---|
| 704 | struct wslay_event_msg msg; | 
|---|
| 705 | msg.opcode = p_opcode; | 
|---|
| 706 | msg.msg = p_buffer; | 
|---|
| 707 | msg.msg_length = p_buffer_size; | 
|---|
| 708 |  | 
|---|
| 709 | // Queue & send message. | 
|---|
| 710 | if (wslay_event_queue_msg(wsl_ctx, &msg) != 0 || wslay_event_send(wsl_ctx) != 0) { | 
|---|
| 711 | close(-1); | 
|---|
| 712 | return FAILED; | 
|---|
| 713 | } | 
|---|
| 714 | return OK; | 
|---|
| 715 | } | 
|---|
| 716 |  | 
|---|
| 717 | Error WSLPeer::send(const uint8_t *p_buffer, int p_buffer_size, WriteMode p_mode) { | 
|---|
| 718 | wslay_opcode opcode = p_mode == WRITE_MODE_TEXT ? WSLAY_TEXT_FRAME : WSLAY_BINARY_FRAME; | 
|---|
| 719 | return _send(p_buffer, p_buffer_size, opcode); | 
|---|
| 720 | } | 
|---|
| 721 |  | 
|---|
| 722 | Error WSLPeer::put_packet(const uint8_t *p_buffer, int p_buffer_size) { | 
|---|
| 723 | return _send(p_buffer, p_buffer_size, WSLAY_BINARY_FRAME); | 
|---|
| 724 | } | 
|---|
| 725 |  | 
|---|
| 726 | Error WSLPeer::get_packet(const uint8_t **r_buffer, int &r_buffer_size) { | 
|---|
| 727 | r_buffer_size = 0; | 
|---|
| 728 |  | 
|---|
| 729 | ERR_FAIL_COND_V(ready_state != STATE_OPEN, FAILED); | 
|---|
| 730 |  | 
|---|
| 731 | if (in_buffer.packets_left() == 0) { | 
|---|
| 732 | return ERR_UNAVAILABLE; | 
|---|
| 733 | } | 
|---|
| 734 |  | 
|---|
| 735 | int read = 0; | 
|---|
| 736 | uint8_t *rw = packet_buffer.ptrw(); | 
|---|
| 737 | in_buffer.read_packet(rw, packet_buffer.size(), &was_string, read); | 
|---|
| 738 |  | 
|---|
| 739 | *r_buffer = rw; | 
|---|
| 740 | r_buffer_size = read; | 
|---|
| 741 |  | 
|---|
| 742 | return OK; | 
|---|
| 743 | } | 
|---|
| 744 |  | 
|---|
| 745 | int WSLPeer::get_available_packet_count() const { | 
|---|
| 746 | if (ready_state != STATE_OPEN) { | 
|---|
| 747 | return 0; | 
|---|
| 748 | } | 
|---|
| 749 |  | 
|---|
| 750 | return in_buffer.packets_left(); | 
|---|
| 751 | } | 
|---|
| 752 |  | 
|---|
| 753 | int WSLPeer::get_current_outbound_buffered_amount() const { | 
|---|
| 754 | if (ready_state != STATE_OPEN) { | 
|---|
| 755 | return 0; | 
|---|
| 756 | } | 
|---|
| 757 |  | 
|---|
| 758 | return wslay_event_get_queued_msg_length(wsl_ctx); | 
|---|
| 759 | } | 
|---|
| 760 |  | 
|---|
| 761 | void WSLPeer::close(int p_code, String p_reason) { | 
|---|
| 762 | if (p_code < 0) { | 
|---|
| 763 | // Force immediate close. | 
|---|
| 764 | ready_state = STATE_CLOSED; | 
|---|
| 765 | } | 
|---|
| 766 |  | 
|---|
| 767 | if (ready_state == STATE_OPEN && !wslay_event_get_close_sent(wsl_ctx)) { | 
|---|
| 768 | CharString cs = p_reason.utf8(); | 
|---|
| 769 | wslay_event_queue_close(wsl_ctx, p_code, (uint8_t *)cs.ptr(), cs.length()); | 
|---|
| 770 | wslay_event_send(wsl_ctx); | 
|---|
| 771 | ready_state = STATE_CLOSING; | 
|---|
| 772 | } else if (ready_state == STATE_CONNECTING || ready_state == STATE_CLOSED) { | 
|---|
| 773 | ready_state = STATE_CLOSED; | 
|---|
| 774 | connection.unref(); | 
|---|
| 775 | if (tcp.is_valid()) { | 
|---|
| 776 | tcp->disconnect_from_host(); | 
|---|
| 777 | tcp.unref(); | 
|---|
| 778 | } | 
|---|
| 779 | } | 
|---|
| 780 |  | 
|---|
| 781 | in_buffer.clear(); | 
|---|
| 782 | packet_buffer.resize(0); | 
|---|
| 783 | } | 
|---|
| 784 |  | 
|---|
| 785 | IPAddress WSLPeer::get_connected_host() const { | 
|---|
| 786 | ERR_FAIL_COND_V(tcp.is_null(), IPAddress()); | 
|---|
| 787 | return tcp->get_connected_host(); | 
|---|
| 788 | } | 
|---|
| 789 |  | 
|---|
| 790 | uint16_t WSLPeer::get_connected_port() const { | 
|---|
| 791 | ERR_FAIL_COND_V(tcp.is_null(), 0); | 
|---|
| 792 | return tcp->get_connected_port(); | 
|---|
| 793 | } | 
|---|
| 794 |  | 
|---|
| 795 | String WSLPeer::get_selected_protocol() const { | 
|---|
| 796 | return selected_protocol; | 
|---|
| 797 | } | 
|---|
| 798 |  | 
|---|
| 799 | String WSLPeer::get_requested_url() const { | 
|---|
| 800 | return requested_url; | 
|---|
| 801 | } | 
|---|
| 802 |  | 
|---|
| 803 | void WSLPeer::set_no_delay(bool p_enabled) { | 
|---|
| 804 | ERR_FAIL_COND(tcp.is_null()); | 
|---|
| 805 | tcp->set_no_delay(p_enabled); | 
|---|
| 806 | } | 
|---|
| 807 |  | 
|---|
| 808 | void WSLPeer::_clear() { | 
|---|
| 809 | // Connection info. | 
|---|
| 810 | ready_state = STATE_CLOSED; | 
|---|
| 811 | is_server = false; | 
|---|
| 812 | connection.unref(); | 
|---|
| 813 | if (tcp.is_valid()) { | 
|---|
| 814 | tcp->disconnect_from_host(); | 
|---|
| 815 | tcp.unref(); | 
|---|
| 816 | } | 
|---|
| 817 | if (wsl_ctx) { | 
|---|
| 818 | wslay_event_context_free(wsl_ctx); | 
|---|
| 819 | wsl_ctx = nullptr; | 
|---|
| 820 | } | 
|---|
| 821 |  | 
|---|
| 822 | resolver.stop(); | 
|---|
| 823 | requested_url.clear(); | 
|---|
| 824 | requested_host.clear(); | 
|---|
| 825 | pending_request = true; | 
|---|
| 826 | handshake_buffer->clear(); | 
|---|
| 827 | selected_protocol.clear(); | 
|---|
| 828 | session_key.clear(); | 
|---|
| 829 |  | 
|---|
| 830 | // Pending packets info. | 
|---|
| 831 | was_string = 0; | 
|---|
| 832 | in_buffer.clear(); | 
|---|
| 833 | packet_buffer.clear(); | 
|---|
| 834 |  | 
|---|
| 835 | // Close code info. | 
|---|
| 836 | close_code = -1; | 
|---|
| 837 | close_reason.clear(); | 
|---|
| 838 | } | 
|---|
| 839 |  | 
|---|
| 840 | WSLPeer::WSLPeer() { | 
|---|
| 841 | handshake_buffer.instantiate(); | 
|---|
| 842 | } | 
|---|
| 843 |  | 
|---|
| 844 | WSLPeer::~WSLPeer() { | 
|---|
| 845 | close(-1); | 
|---|
| 846 | } | 
|---|
| 847 |  | 
|---|
| 848 | #endif // WEB_ENABLED | 
|---|
| 849 |  | 
|---|