| 1 | /**************************************************************************/ |
| 2 | /* wsl_peer.cpp */ |
| 3 | /**************************************************************************/ |
| 4 | /* This file is part of: */ |
| 5 | /* GODOT ENGINE */ |
| 6 | /* https://godotengine.org */ |
| 7 | /**************************************************************************/ |
| 8 | /* Copyright (c) 2014-present Godot Engine contributors (see AUTHORS.md). */ |
| 9 | /* Copyright (c) 2007-2014 Juan Linietsky, Ariel Manzur. */ |
| 10 | /* */ |
| 11 | /* Permission is hereby granted, free of charge, to any person obtaining */ |
| 12 | /* a copy of this software and associated documentation files (the */ |
| 13 | /* "Software"), to deal in the Software without restriction, including */ |
| 14 | /* without limitation the rights to use, copy, modify, merge, publish, */ |
| 15 | /* distribute, sublicense, and/or sell copies of the Software, and to */ |
| 16 | /* permit persons to whom the Software is furnished to do so, subject to */ |
| 17 | /* the following conditions: */ |
| 18 | /* */ |
| 19 | /* The above copyright notice and this permission notice shall be */ |
| 20 | /* included in all copies or substantial portions of the Software. */ |
| 21 | /* */ |
| 22 | /* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, */ |
| 23 | /* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF */ |
| 24 | /* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. */ |
| 25 | /* IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY */ |
| 26 | /* CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, */ |
| 27 | /* TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE */ |
| 28 | /* SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. */ |
| 29 | /**************************************************************************/ |
| 30 | |
| 31 | #include "wsl_peer.h" |
| 32 | |
| 33 | #ifndef WEB_ENABLED |
| 34 | |
| 35 | #include "core/io/stream_peer_tls.h" |
| 36 | |
| 37 | CryptoCore::RandomGenerator *WSLPeer::_static_rng = nullptr; |
| 38 | |
| 39 | void WSLPeer::initialize() { |
| 40 | WebSocketPeer::_create = WSLPeer::_create; |
| 41 | _static_rng = memnew(CryptoCore::RandomGenerator); |
| 42 | _static_rng->init(); |
| 43 | } |
| 44 | |
| 45 | void WSLPeer::deinitialize() { |
| 46 | if (_static_rng) { |
| 47 | memdelete(_static_rng); |
| 48 | _static_rng = nullptr; |
| 49 | } |
| 50 | } |
| 51 | |
| 52 | /// |
| 53 | /// Resolver |
| 54 | /// |
| 55 | void WSLPeer::Resolver::start(const String &p_host, int p_port) { |
| 56 | stop(); |
| 57 | |
| 58 | port = p_port; |
| 59 | if (p_host.is_valid_ip_address()) { |
| 60 | ip_candidates.push_back(IPAddress(p_host)); |
| 61 | } else { |
| 62 | // Queue hostname for resolution. |
| 63 | resolver_id = IP::get_singleton()->resolve_hostname_queue_item(p_host); |
| 64 | ERR_FAIL_COND(resolver_id == IP::RESOLVER_INVALID_ID); |
| 65 | // Check if it was found in cache. |
| 66 | IP::ResolverStatus ip_status = IP::get_singleton()->get_resolve_item_status(resolver_id); |
| 67 | if (ip_status == IP::RESOLVER_STATUS_DONE) { |
| 68 | ip_candidates = IP::get_singleton()->get_resolve_item_addresses(resolver_id); |
| 69 | IP::get_singleton()->erase_resolve_item(resolver_id); |
| 70 | resolver_id = IP::RESOLVER_INVALID_ID; |
| 71 | } |
| 72 | } |
| 73 | } |
| 74 | |
| 75 | void WSLPeer::Resolver::stop() { |
| 76 | if (resolver_id != IP::RESOLVER_INVALID_ID) { |
| 77 | IP::get_singleton()->erase_resolve_item(resolver_id); |
| 78 | resolver_id = IP::RESOLVER_INVALID_ID; |
| 79 | } |
| 80 | port = 0; |
| 81 | } |
| 82 | |
| 83 | void WSLPeer::Resolver::try_next_candidate(Ref<StreamPeerTCP> &p_tcp) { |
| 84 | // Check if we still need resolving. |
| 85 | if (resolver_id != IP::RESOLVER_INVALID_ID) { |
| 86 | IP::ResolverStatus ip_status = IP::get_singleton()->get_resolve_item_status(resolver_id); |
| 87 | if (ip_status == IP::RESOLVER_STATUS_WAITING) { |
| 88 | return; |
| 89 | } |
| 90 | if (ip_status == IP::RESOLVER_STATUS_DONE) { |
| 91 | ip_candidates = IP::get_singleton()->get_resolve_item_addresses(resolver_id); |
| 92 | } |
| 93 | IP::get_singleton()->erase_resolve_item(resolver_id); |
| 94 | resolver_id = IP::RESOLVER_INVALID_ID; |
| 95 | } |
| 96 | |
| 97 | // Try the current candidate if we have one. |
| 98 | if (p_tcp->get_status() != StreamPeerTCP::STATUS_NONE) { |
| 99 | p_tcp->poll(); |
| 100 | StreamPeerTCP::Status status = p_tcp->get_status(); |
| 101 | if (status == StreamPeerTCP::STATUS_CONNECTED) { |
| 102 | p_tcp->set_no_delay(true); |
| 103 | ip_candidates.clear(); |
| 104 | return; |
| 105 | } else if (status == StreamPeerTCP::STATUS_CONNECTING) { |
| 106 | return; // Keep connecting. |
| 107 | } else { |
| 108 | p_tcp->disconnect_from_host(); |
| 109 | } |
| 110 | } |
| 111 | |
| 112 | // Keep trying next candidate. |
| 113 | while (ip_candidates.size()) { |
| 114 | Error err = p_tcp->connect_to_host(ip_candidates.pop_front(), port); |
| 115 | if (err == OK) { |
| 116 | return; |
| 117 | } else { |
| 118 | p_tcp->disconnect_from_host(); |
| 119 | } |
| 120 | } |
| 121 | } |
| 122 | |
| 123 | /// |
| 124 | /// Server functions |
| 125 | /// |
| 126 | Error WSLPeer::accept_stream(Ref<StreamPeer> p_stream) { |
| 127 | ERR_FAIL_COND_V(wsl_ctx || tcp.is_valid(), ERR_ALREADY_IN_USE); |
| 128 | ERR_FAIL_COND_V(p_stream.is_null(), ERR_INVALID_PARAMETER); |
| 129 | |
| 130 | _clear(); |
| 131 | |
| 132 | if (p_stream->is_class_ptr(StreamPeerTCP::get_class_ptr_static())) { |
| 133 | tcp = p_stream; |
| 134 | connection = p_stream; |
| 135 | use_tls = false; |
| 136 | } else if (p_stream->is_class_ptr(StreamPeerTLS::get_class_ptr_static())) { |
| 137 | Ref<StreamPeer> base_stream = static_cast<Ref<StreamPeerTLS>>(p_stream)->get_stream(); |
| 138 | ERR_FAIL_COND_V(base_stream.is_null() || !base_stream->is_class_ptr(StreamPeerTCP::get_class_ptr_static()), ERR_INVALID_PARAMETER); |
| 139 | tcp = static_cast<Ref<StreamPeerTCP>>(base_stream); |
| 140 | connection = p_stream; |
| 141 | use_tls = true; |
| 142 | } |
| 143 | ERR_FAIL_COND_V(connection.is_null() || tcp.is_null(), ERR_INVALID_PARAMETER); |
| 144 | is_server = true; |
| 145 | ready_state = STATE_CONNECTING; |
| 146 | handshake_buffer->resize(WSL_MAX_HEADER_SIZE); |
| 147 | handshake_buffer->seek(0); |
| 148 | return OK; |
| 149 | } |
| 150 | |
| 151 | bool WSLPeer::_parse_client_request() { |
| 152 | Vector<String> psa = String((const char *)handshake_buffer->get_data_array().ptr(), handshake_buffer->get_position() - 4).split("\r\n" ); |
| 153 | int len = psa.size(); |
| 154 | ERR_FAIL_COND_V_MSG(len < 4, false, "Not enough response headers, got: " + itos(len) + ", expected >= 4." ); |
| 155 | |
| 156 | Vector<String> req = psa[0].split(" " , false); |
| 157 | ERR_FAIL_COND_V_MSG(req.size() < 2, false, "Invalid protocol or status code." ); |
| 158 | |
| 159 | // Wrong protocol |
| 160 | ERR_FAIL_COND_V_MSG(req[0] != "GET" || req[2] != "HTTP/1.1" , false, "Invalid method or HTTP version." ); |
| 161 | |
| 162 | HashMap<String, String> ; |
| 163 | for (int i = 1; i < len; i++) { |
| 164 | Vector<String> = psa[i].split(":" , false, 1); |
| 165 | ERR_FAIL_COND_V_MSG(header.size() != 2, false, "Invalid header -> " + psa[i]); |
| 166 | String name = header[0].to_lower(); |
| 167 | String value = header[1].strip_edges(); |
| 168 | if (headers.has(name)) { |
| 169 | headers[name] += "," + value; |
| 170 | } else { |
| 171 | headers[name] = value; |
| 172 | } |
| 173 | } |
| 174 | requested_host = headers.has("host" ) ? headers.get("host" ) : "" ; |
| 175 | requested_url = (use_tls ? "wss://" : "ws://" ) + requested_host + req[1]; |
| 176 | #define WSL_CHECK(NAME, VALUE) \ |
| 177 | ERR_FAIL_COND_V_MSG(!headers.has(NAME) || headers[NAME].to_lower() != VALUE, false, \ |
| 178 | "Missing or invalid header '" + String(NAME) + "'. Expected value '" + VALUE + "'."); |
| 179 | #define WSL_CHECK_EX(NAME) \ |
| 180 | ERR_FAIL_COND_V_MSG(!headers.has(NAME), false, "Missing header '" + String(NAME) + "'."); |
| 181 | WSL_CHECK("upgrade" , "websocket" ); |
| 182 | WSL_CHECK("sec-websocket-version" , "13" ); |
| 183 | WSL_CHECK_EX("sec-websocket-key" ); |
| 184 | WSL_CHECK_EX("connection" ); |
| 185 | #undef WSL_CHECK_EX |
| 186 | #undef WSL_CHECK |
| 187 | session_key = headers["sec-websocket-key" ]; |
| 188 | if (headers.has("sec-websocket-protocol" )) { |
| 189 | Vector<String> protos = headers["sec-websocket-protocol" ].split("," ); |
| 190 | for (int i = 0; i < protos.size(); i++) { |
| 191 | String proto = protos[i].strip_edges(); |
| 192 | // Check if we have the given protocol |
| 193 | for (int j = 0; j < supported_protocols.size(); j++) { |
| 194 | if (proto != supported_protocols[j]) { |
| 195 | continue; |
| 196 | } |
| 197 | selected_protocol = proto; |
| 198 | break; |
| 199 | } |
| 200 | // Found a protocol |
| 201 | if (!selected_protocol.is_empty()) { |
| 202 | break; |
| 203 | } |
| 204 | } |
| 205 | if (selected_protocol.is_empty()) { // Invalid protocol(s) requested |
| 206 | return false; |
| 207 | } |
| 208 | } else if (supported_protocols.size() > 0) { // No protocol requested, but we need one |
| 209 | return false; |
| 210 | } |
| 211 | return true; |
| 212 | } |
| 213 | |
| 214 | Error WSLPeer::_do_server_handshake() { |
| 215 | if (use_tls) { |
| 216 | Ref<StreamPeerTLS> tls = static_cast<Ref<StreamPeerTLS>>(connection); |
| 217 | if (tls.is_null()) { |
| 218 | ERR_FAIL_V_MSG(ERR_BUG, "Couldn't get StreamPeerTLS for WebSocket handshake." ); |
| 219 | close(-1); |
| 220 | return FAILED; |
| 221 | } |
| 222 | tls->poll(); |
| 223 | if (tls->get_status() == StreamPeerTLS::STATUS_HANDSHAKING) { |
| 224 | return OK; // Pending handshake |
| 225 | } else if (tls->get_status() != StreamPeerTLS::STATUS_CONNECTED) { |
| 226 | print_verbose(vformat("WebSocket SSL connection error during handshake (StreamPeerTLS status code %d)." , tls->get_status())); |
| 227 | close(-1); |
| 228 | return FAILED; |
| 229 | } |
| 230 | } |
| 231 | |
| 232 | if (pending_request) { |
| 233 | int read = 0; |
| 234 | while (true) { |
| 235 | ERR_FAIL_COND_V_MSG(handshake_buffer->get_available_bytes() < 1, ERR_OUT_OF_MEMORY, "WebSocket response headers are too big." ); |
| 236 | int pos = handshake_buffer->get_position(); |
| 237 | uint8_t byte; |
| 238 | Error err = connection->get_partial_data(&byte, 1, read); |
| 239 | if (err != OK) { // Got an error |
| 240 | print_verbose(vformat("WebSocket error while getting partial data (StreamPeer error code %d)." , err)); |
| 241 | close(-1); |
| 242 | return FAILED; |
| 243 | } else if (read != 1) { // Busy, wait next poll |
| 244 | return OK; |
| 245 | } |
| 246 | handshake_buffer->put_u8(byte); |
| 247 | const char *r = (const char *)handshake_buffer->get_data_array().ptr(); |
| 248 | int l = pos; |
| 249 | if (l > 3 && r[l] == '\n' && r[l - 1] == '\r' && r[l - 2] == '\n' && r[l - 3] == '\r') { |
| 250 | if (!_parse_client_request()) { |
| 251 | close(-1); |
| 252 | return FAILED; |
| 253 | } |
| 254 | String s = "HTTP/1.1 101 Switching Protocols\r\n" ; |
| 255 | s += "Upgrade: websocket\r\n" ; |
| 256 | s += "Connection: Upgrade\r\n" ; |
| 257 | s += "Sec-WebSocket-Accept: " + _compute_key_response(session_key) + "\r\n" ; |
| 258 | if (!selected_protocol.is_empty()) { |
| 259 | s += "Sec-WebSocket-Protocol: " + selected_protocol + "\r\n" ; |
| 260 | } |
| 261 | for (int i = 0; i < handshake_headers.size(); i++) { |
| 262 | s += handshake_headers[i] + "\r\n" ; |
| 263 | } |
| 264 | s += "\r\n" ; |
| 265 | CharString cs = s.utf8(); |
| 266 | handshake_buffer->clear(); |
| 267 | handshake_buffer->put_data((const uint8_t *)cs.get_data(), cs.length()); |
| 268 | handshake_buffer->seek(0); |
| 269 | pending_request = false; |
| 270 | break; |
| 271 | } |
| 272 | } |
| 273 | } |
| 274 | |
| 275 | if (pending_request) { // Still pending. |
| 276 | return OK; |
| 277 | } |
| 278 | |
| 279 | int left = handshake_buffer->get_available_bytes(); |
| 280 | if (left) { |
| 281 | Vector<uint8_t> data = handshake_buffer->get_data_array(); |
| 282 | int pos = handshake_buffer->get_position(); |
| 283 | int sent = 0; |
| 284 | Error err = connection->put_partial_data(data.ptr() + pos, left, sent); |
| 285 | if (err != OK) { |
| 286 | print_verbose(vformat("WebSocket error while putting partial data (StreamPeer error code %d)." , err)); |
| 287 | close(-1); |
| 288 | return err; |
| 289 | } |
| 290 | handshake_buffer->seek(pos + sent); |
| 291 | left -= sent; |
| 292 | if (left == 0) { |
| 293 | resolver.stop(); |
| 294 | // Response sent, initialize wslay context. |
| 295 | wslay_event_context_server_init(&wsl_ctx, &_wsl_callbacks, this); |
| 296 | wslay_event_config_set_max_recv_msg_length(wsl_ctx, inbound_buffer_size); |
| 297 | in_buffer.resize(nearest_shift(inbound_buffer_size), max_queued_packets); |
| 298 | packet_buffer.resize(inbound_buffer_size); |
| 299 | ready_state = STATE_OPEN; |
| 300 | } |
| 301 | } |
| 302 | |
| 303 | return OK; |
| 304 | } |
| 305 | |
| 306 | /// |
| 307 | /// Client functions |
| 308 | /// |
| 309 | void WSLPeer::_do_client_handshake() { |
| 310 | ERR_FAIL_COND(tcp.is_null()); |
| 311 | |
| 312 | // Try to connect to candidates. |
| 313 | if (resolver.has_more_candidates()) { |
| 314 | resolver.try_next_candidate(tcp); |
| 315 | if (resolver.has_more_candidates()) { |
| 316 | return; // Still pending. |
| 317 | } |
| 318 | } |
| 319 | |
| 320 | tcp->poll(); |
| 321 | if (tcp->get_status() == StreamPeerTCP::STATUS_CONNECTING) { |
| 322 | return; // Keep connecting. |
| 323 | } else if (tcp->get_status() != StreamPeerTCP::STATUS_CONNECTED) { |
| 324 | close(-1); // Failed to connect. |
| 325 | return; |
| 326 | } |
| 327 | |
| 328 | if (use_tls) { |
| 329 | Ref<StreamPeerTLS> tls; |
| 330 | if (connection == tcp) { |
| 331 | // Start SSL handshake |
| 332 | tls = Ref<StreamPeerTLS>(StreamPeerTLS::create()); |
| 333 | ERR_FAIL_COND(tls.is_null()); |
| 334 | if (tls->connect_to_stream(tcp, requested_host, tls_options) != OK) { |
| 335 | close(-1); |
| 336 | return; // Error. |
| 337 | } |
| 338 | connection = tls; |
| 339 | } else { |
| 340 | tls = static_cast<Ref<StreamPeerTLS>>(connection); |
| 341 | ERR_FAIL_COND(tls.is_null()); |
| 342 | tls->poll(); |
| 343 | } |
| 344 | if (tls->get_status() == StreamPeerTLS::STATUS_HANDSHAKING) { |
| 345 | return; // Need more polling. |
| 346 | } else if (tls->get_status() != StreamPeerTLS::STATUS_CONNECTED) { |
| 347 | close(-1); |
| 348 | return; // Error. |
| 349 | } |
| 350 | } |
| 351 | |
| 352 | // Do websocket handshake. |
| 353 | if (pending_request) { |
| 354 | int left = handshake_buffer->get_available_bytes(); |
| 355 | int pos = handshake_buffer->get_position(); |
| 356 | const Vector<uint8_t> data = handshake_buffer->get_data_array(); |
| 357 | int sent = 0; |
| 358 | Error err = connection->put_partial_data(data.ptr() + pos, left, sent); |
| 359 | // Sending handshake failed |
| 360 | if (err != OK) { |
| 361 | close(-1); |
| 362 | return; // Error. |
| 363 | } |
| 364 | handshake_buffer->seek(pos + sent); |
| 365 | if (handshake_buffer->get_available_bytes() == 0) { |
| 366 | pending_request = false; |
| 367 | handshake_buffer->clear(); |
| 368 | handshake_buffer->resize(WSL_MAX_HEADER_SIZE); |
| 369 | handshake_buffer->seek(0); |
| 370 | } |
| 371 | } else { |
| 372 | int read = 0; |
| 373 | while (true) { |
| 374 | int left = handshake_buffer->get_available_bytes(); |
| 375 | int pos = handshake_buffer->get_position(); |
| 376 | if (left == 0) { |
| 377 | // Header is too big |
| 378 | close(-1); |
| 379 | ERR_FAIL_MSG("Response headers too big." ); |
| 380 | } |
| 381 | |
| 382 | uint8_t byte; |
| 383 | Error err = connection->get_partial_data(&byte, 1, read); |
| 384 | if (err != OK) { |
| 385 | // Got some error. |
| 386 | close(-1); |
| 387 | return; |
| 388 | } else if (read != 1) { |
| 389 | // Busy, wait next poll. |
| 390 | break; |
| 391 | } |
| 392 | handshake_buffer->put_u8(byte); |
| 393 | |
| 394 | // Check "\r\n\r\n" header terminator |
| 395 | const char *r = (const char *)handshake_buffer->get_data_array().ptr(); |
| 396 | int l = pos; |
| 397 | if (l > 3 && r[l] == '\n' && r[l - 1] == '\r' && r[l - 2] == '\n' && r[l - 3] == '\r') { |
| 398 | // Response is over, verify headers and initialize wslay context/ |
| 399 | if (!_verify_server_response()) { |
| 400 | close(-1); |
| 401 | ERR_FAIL_MSG("Invalid response headers." ); |
| 402 | } |
| 403 | wslay_event_context_client_init(&wsl_ctx, &_wsl_callbacks, this); |
| 404 | wslay_event_config_set_max_recv_msg_length(wsl_ctx, inbound_buffer_size); |
| 405 | in_buffer.resize(nearest_shift(inbound_buffer_size), max_queued_packets); |
| 406 | packet_buffer.resize(inbound_buffer_size); |
| 407 | ready_state = STATE_OPEN; |
| 408 | break; |
| 409 | } |
| 410 | } |
| 411 | } |
| 412 | } |
| 413 | |
| 414 | bool WSLPeer::_verify_server_response() { |
| 415 | Vector<String> psa = String((const char *)handshake_buffer->get_data_array().ptr(), handshake_buffer->get_position() - 4).split("\r\n" ); |
| 416 | int len = psa.size(); |
| 417 | ERR_FAIL_COND_V_MSG(len < 4, false, "Not enough response headers. Got: " + itos(len) + ", expected >= 4." ); |
| 418 | |
| 419 | Vector<String> req = psa[0].split(" " , false); |
| 420 | ERR_FAIL_COND_V_MSG(req.size() < 2, false, "Invalid protocol or status code. Got '" + psa[0] + "', expected 'HTTP/1.1 101'." ); |
| 421 | |
| 422 | // Wrong protocol |
| 423 | ERR_FAIL_COND_V_MSG(req[0] != "HTTP/1.1" , false, "Invalid protocol. Got: '" + req[0] + "', expected 'HTTP/1.1'." ); |
| 424 | ERR_FAIL_COND_V_MSG(req[1] != "101" , false, "Invalid status code. Got: '" + req[1] + "', expected '101'." ); |
| 425 | |
| 426 | HashMap<String, String> ; |
| 427 | for (int i = 1; i < len; i++) { |
| 428 | Vector<String> = psa[i].split(":" , false, 1); |
| 429 | ERR_FAIL_COND_V_MSG(header.size() != 2, false, "Invalid header -> " + psa[i] + "." ); |
| 430 | String name = header[0].to_lower(); |
| 431 | String value = header[1].strip_edges(); |
| 432 | if (headers.has(name)) { |
| 433 | headers[name] += "," + value; |
| 434 | } else { |
| 435 | headers[name] = value; |
| 436 | } |
| 437 | } |
| 438 | |
| 439 | #define WSL_CHECK(NAME, VALUE) \ |
| 440 | ERR_FAIL_COND_V_MSG(!headers.has(NAME) || headers[NAME].to_lower() != VALUE, false, \ |
| 441 | "Missing or invalid header '" + String(NAME) + "'. Expected value '" + VALUE + "'."); |
| 442 | #define WSL_CHECK_NC(NAME, VALUE) \ |
| 443 | ERR_FAIL_COND_V_MSG(!headers.has(NAME) || headers[NAME] != VALUE, false, \ |
| 444 | "Missing or invalid header '" + String(NAME) + "'. Expected value '" + VALUE + "'."); |
| 445 | WSL_CHECK("connection" , "upgrade" ); |
| 446 | WSL_CHECK("upgrade" , "websocket" ); |
| 447 | WSL_CHECK_NC("sec-websocket-accept" , _compute_key_response(session_key)); |
| 448 | #undef WSL_CHECK_NC |
| 449 | #undef WSL_CHECK |
| 450 | if (supported_protocols.size() == 0) { |
| 451 | // We didn't request a custom protocol |
| 452 | ERR_FAIL_COND_V_MSG(headers.has("sec-websocket-protocol" ), false, "Received unrequested sub-protocol -> " + headers["sec-websocket-protocol" ]); |
| 453 | } else { |
| 454 | // We requested at least one custom protocol but didn't receive one |
| 455 | ERR_FAIL_COND_V_MSG(!headers.has("sec-websocket-protocol" ), false, "Requested sub-protocol(s) but received none." ); |
| 456 | // Check received sub-protocol was one of those requested. |
| 457 | selected_protocol = headers["sec-websocket-protocol" ]; |
| 458 | bool valid = false; |
| 459 | for (int i = 0; i < supported_protocols.size(); i++) { |
| 460 | if (supported_protocols[i] != selected_protocol) { |
| 461 | continue; |
| 462 | } |
| 463 | valid = true; |
| 464 | break; |
| 465 | } |
| 466 | if (!valid) { |
| 467 | ERR_FAIL_V_MSG(false, "Received unrequested sub-protocol -> " + selected_protocol); |
| 468 | } |
| 469 | } |
| 470 | return true; |
| 471 | } |
| 472 | |
| 473 | Error WSLPeer::connect_to_url(const String &p_url, Ref<TLSOptions> p_options) { |
| 474 | ERR_FAIL_COND_V(wsl_ctx || tcp.is_valid(), ERR_ALREADY_IN_USE); |
| 475 | ERR_FAIL_COND_V(p_url.is_empty(), ERR_INVALID_PARAMETER); |
| 476 | ERR_FAIL_COND_V(p_options.is_valid() && p_options->is_server(), ERR_INVALID_PARAMETER); |
| 477 | |
| 478 | _clear(); |
| 479 | |
| 480 | String host; |
| 481 | String path; |
| 482 | String scheme; |
| 483 | int port = 0; |
| 484 | Error err = p_url.parse_url(scheme, host, port, path); |
| 485 | ERR_FAIL_COND_V_MSG(err != OK, err, "Invalid URL: " + p_url); |
| 486 | if (scheme.is_empty()) { |
| 487 | scheme = "ws://" ; |
| 488 | } |
| 489 | ERR_FAIL_COND_V_MSG(scheme != "ws://" && scheme != "wss://" , ERR_INVALID_PARAMETER, vformat("Invalid protocol: \"%s\" (must be either \"ws://\" or \"wss://\")." , scheme)); |
| 490 | |
| 491 | use_tls = false; |
| 492 | if (scheme == "wss://" ) { |
| 493 | use_tls = true; |
| 494 | } |
| 495 | if (port == 0) { |
| 496 | port = use_tls ? 443 : 80; |
| 497 | } |
| 498 | if (path.is_empty()) { |
| 499 | path = "/" ; |
| 500 | } |
| 501 | |
| 502 | ERR_FAIL_COND_V_MSG(use_tls && !StreamPeerTLS::is_available(), ERR_UNAVAILABLE, "WSS is not available in this build." ); |
| 503 | |
| 504 | requested_url = p_url; |
| 505 | requested_host = host; |
| 506 | |
| 507 | if (p_options.is_valid()) { |
| 508 | tls_options = p_options; |
| 509 | } else { |
| 510 | tls_options = TLSOptions::client(); |
| 511 | } |
| 512 | |
| 513 | tcp.instantiate(); |
| 514 | |
| 515 | resolver.start(host, port); |
| 516 | resolver.try_next_candidate(tcp); |
| 517 | |
| 518 | if (tcp->get_status() != StreamPeerTCP::STATUS_CONNECTING && tcp->get_status() != StreamPeerTCP::STATUS_CONNECTED && !resolver.has_more_candidates()) { |
| 519 | _clear(); |
| 520 | return FAILED; |
| 521 | } |
| 522 | connection = tcp; |
| 523 | |
| 524 | // Prepare handshake request. |
| 525 | session_key = _generate_key(); |
| 526 | String request = "GET " + path + " HTTP/1.1\r\n" ; |
| 527 | String port_string; |
| 528 | if ((port != 80 && !use_tls) || (port != 443 && use_tls)) { |
| 529 | port_string = ":" + itos(port); |
| 530 | } |
| 531 | request += "Host: " + host + port_string + "\r\n" ; |
| 532 | request += "Upgrade: websocket\r\n" ; |
| 533 | request += "Connection: Upgrade\r\n" ; |
| 534 | request += "Sec-WebSocket-Key: " + session_key + "\r\n" ; |
| 535 | request += "Sec-WebSocket-Version: 13\r\n" ; |
| 536 | if (supported_protocols.size() > 0) { |
| 537 | request += "Sec-WebSocket-Protocol: " ; |
| 538 | for (int i = 0; i < supported_protocols.size(); i++) { |
| 539 | if (i != 0) { |
| 540 | request += "," ; |
| 541 | } |
| 542 | request += supported_protocols[i]; |
| 543 | } |
| 544 | request += "\r\n" ; |
| 545 | } |
| 546 | for (int i = 0; i < handshake_headers.size(); i++) { |
| 547 | request += handshake_headers[i] + "\r\n" ; |
| 548 | } |
| 549 | request += "\r\n" ; |
| 550 | CharString cs = request.utf8(); |
| 551 | handshake_buffer->put_data((const uint8_t *)cs.get_data(), cs.length()); |
| 552 | handshake_buffer->seek(0); |
| 553 | ready_state = STATE_CONNECTING; |
| 554 | is_server = false; |
| 555 | return OK; |
| 556 | } |
| 557 | |
| 558 | /// |
| 559 | /// Callback functions. |
| 560 | /// |
| 561 | ssize_t WSLPeer::_wsl_recv_callback(wslay_event_context_ptr ctx, uint8_t *data, size_t len, int flags, void *user_data) { |
| 562 | WSLPeer *peer = (WSLPeer *)user_data; |
| 563 | Ref<StreamPeer> conn = peer->connection; |
| 564 | if (conn.is_null()) { |
| 565 | wslay_event_set_error(ctx, WSLAY_ERR_CALLBACK_FAILURE); |
| 566 | return -1; |
| 567 | } |
| 568 | int read = 0; |
| 569 | Error err = conn->get_partial_data(data, len, read); |
| 570 | if (err != OK) { |
| 571 | print_verbose("Websocket get data error: " + itos(err) + ", read (should be 0!): " + itos(read)); |
| 572 | wslay_event_set_error(ctx, WSLAY_ERR_CALLBACK_FAILURE); |
| 573 | return -1; |
| 574 | } |
| 575 | if (read == 0) { |
| 576 | wslay_event_set_error(ctx, WSLAY_ERR_WOULDBLOCK); |
| 577 | return -1; |
| 578 | } |
| 579 | return read; |
| 580 | } |
| 581 | |
| 582 | ssize_t WSLPeer::_wsl_send_callback(wslay_event_context_ptr ctx, const uint8_t *data, size_t len, int flags, void *user_data) { |
| 583 | WSLPeer *peer = (WSLPeer *)user_data; |
| 584 | Ref<StreamPeer> conn = peer->connection; |
| 585 | if (conn.is_null()) { |
| 586 | wslay_event_set_error(ctx, WSLAY_ERR_CALLBACK_FAILURE); |
| 587 | return -1; |
| 588 | } |
| 589 | int sent = 0; |
| 590 | Error err = conn->put_partial_data(data, len, sent); |
| 591 | if (err != OK) { |
| 592 | wslay_event_set_error(ctx, WSLAY_ERR_CALLBACK_FAILURE); |
| 593 | return -1; |
| 594 | } |
| 595 | if (sent == 0) { |
| 596 | wslay_event_set_error(ctx, WSLAY_ERR_WOULDBLOCK); |
| 597 | return -1; |
| 598 | } |
| 599 | return sent; |
| 600 | } |
| 601 | |
| 602 | int WSLPeer::_wsl_genmask_callback(wslay_event_context_ptr ctx, uint8_t *buf, size_t len, void *user_data) { |
| 603 | ERR_FAIL_COND_V(!_static_rng, WSLAY_ERR_CALLBACK_FAILURE); |
| 604 | Error err = _static_rng->get_random_bytes(buf, len); |
| 605 | ERR_FAIL_COND_V(err != OK, WSLAY_ERR_CALLBACK_FAILURE); |
| 606 | return 0; |
| 607 | } |
| 608 | |
| 609 | void WSLPeer::_wsl_msg_recv_callback(wslay_event_context_ptr ctx, const struct wslay_event_on_msg_recv_arg *arg, void *user_data) { |
| 610 | WSLPeer *peer = (WSLPeer *)user_data; |
| 611 | uint8_t op = arg->opcode; |
| 612 | |
| 613 | if (op == WSLAY_CONNECTION_CLOSE) { |
| 614 | // Close request or confirmation. |
| 615 | peer->close_code = arg->status_code; |
| 616 | size_t len = arg->msg_length; |
| 617 | peer->close_reason = "" ; |
| 618 | if (len > 2 /* first 2 bytes = close code */) { |
| 619 | peer->close_reason.parse_utf8((char *)arg->msg + 2, len - 2); |
| 620 | } |
| 621 | if (peer->ready_state == STATE_OPEN) { |
| 622 | peer->ready_state = STATE_CLOSING; |
| 623 | } |
| 624 | return; |
| 625 | } |
| 626 | |
| 627 | if (peer->ready_state == STATE_CLOSING) { |
| 628 | return; |
| 629 | } |
| 630 | |
| 631 | if (op == WSLAY_TEXT_FRAME || op == WSLAY_BINARY_FRAME) { |
| 632 | // Message. |
| 633 | uint8_t is_string = arg->opcode == WSLAY_TEXT_FRAME ? 1 : 0; |
| 634 | peer->in_buffer.write_packet(arg->msg, arg->msg_length, &is_string); |
| 635 | } |
| 636 | // Ping or pong. |
| 637 | } |
| 638 | |
| 639 | wslay_event_callbacks WSLPeer::_wsl_callbacks = { |
| 640 | _wsl_recv_callback, |
| 641 | _wsl_send_callback, |
| 642 | _wsl_genmask_callback, |
| 643 | nullptr, /* on_frame_recv_start_callback */ |
| 644 | nullptr, /* on_frame_recv_callback */ |
| 645 | nullptr, /* on_frame_recv_end_callback */ |
| 646 | _wsl_msg_recv_callback |
| 647 | }; |
| 648 | |
| 649 | String WSLPeer::_generate_key() { |
| 650 | // Random key |
| 651 | Vector<uint8_t> bkey; |
| 652 | int len = 16; // 16 bytes, as per RFC |
| 653 | bkey.resize(len); |
| 654 | _wsl_genmask_callback(nullptr, bkey.ptrw(), len, nullptr); |
| 655 | return CryptoCore::b64_encode_str(bkey.ptrw(), len); |
| 656 | } |
| 657 | |
| 658 | String WSLPeer::_compute_key_response(String p_key) { |
| 659 | String key = p_key + "258EAFA5-E914-47DA-95CA-C5AB0DC85B11" ; // Magic UUID as per RFC |
| 660 | Vector<uint8_t> sha = key.sha1_buffer(); |
| 661 | return CryptoCore::b64_encode_str(sha.ptr(), sha.size()); |
| 662 | } |
| 663 | |
| 664 | void WSLPeer::poll() { |
| 665 | // Nothing to do. |
| 666 | if (ready_state == STATE_CLOSED) { |
| 667 | return; |
| 668 | } |
| 669 | |
| 670 | if (ready_state == STATE_CONNECTING) { |
| 671 | if (is_server) { |
| 672 | _do_server_handshake(); |
| 673 | } else { |
| 674 | _do_client_handshake(); |
| 675 | } |
| 676 | } |
| 677 | |
| 678 | if (ready_state == STATE_OPEN || ready_state == STATE_CLOSING) { |
| 679 | ERR_FAIL_COND(!wsl_ctx); |
| 680 | int err = 0; |
| 681 | if ((err = wslay_event_recv(wsl_ctx)) != 0 || (err = wslay_event_send(wsl_ctx)) != 0) { |
| 682 | // Error close. |
| 683 | print_verbose("Websocket (wslay) poll error: " + itos(err)); |
| 684 | wslay_event_context_free(wsl_ctx); |
| 685 | wsl_ctx = nullptr; |
| 686 | close(-1); |
| 687 | return; |
| 688 | } |
| 689 | if (wslay_event_get_close_sent(wsl_ctx) && wslay_event_get_close_received(wsl_ctx)) { |
| 690 | // Clean close. |
| 691 | wslay_event_context_free(wsl_ctx); |
| 692 | wsl_ctx = nullptr; |
| 693 | close(-1); |
| 694 | return; |
| 695 | } |
| 696 | } |
| 697 | } |
| 698 | |
| 699 | Error WSLPeer::_send(const uint8_t *p_buffer, int p_buffer_size, wslay_opcode p_opcode) { |
| 700 | ERR_FAIL_COND_V(ready_state != STATE_OPEN, FAILED); |
| 701 | ERR_FAIL_COND_V(wslay_event_get_queued_msg_count(wsl_ctx) >= (uint32_t)max_queued_packets, ERR_OUT_OF_MEMORY); |
| 702 | ERR_FAIL_COND_V(outbound_buffer_size > 0 && (wslay_event_get_queued_msg_length(wsl_ctx) + p_buffer_size > (uint32_t)outbound_buffer_size), ERR_OUT_OF_MEMORY); |
| 703 | |
| 704 | struct wslay_event_msg msg; |
| 705 | msg.opcode = p_opcode; |
| 706 | msg.msg = p_buffer; |
| 707 | msg.msg_length = p_buffer_size; |
| 708 | |
| 709 | // Queue & send message. |
| 710 | if (wslay_event_queue_msg(wsl_ctx, &msg) != 0 || wslay_event_send(wsl_ctx) != 0) { |
| 711 | close(-1); |
| 712 | return FAILED; |
| 713 | } |
| 714 | return OK; |
| 715 | } |
| 716 | |
| 717 | Error WSLPeer::send(const uint8_t *p_buffer, int p_buffer_size, WriteMode p_mode) { |
| 718 | wslay_opcode opcode = p_mode == WRITE_MODE_TEXT ? WSLAY_TEXT_FRAME : WSLAY_BINARY_FRAME; |
| 719 | return _send(p_buffer, p_buffer_size, opcode); |
| 720 | } |
| 721 | |
| 722 | Error WSLPeer::put_packet(const uint8_t *p_buffer, int p_buffer_size) { |
| 723 | return _send(p_buffer, p_buffer_size, WSLAY_BINARY_FRAME); |
| 724 | } |
| 725 | |
| 726 | Error WSLPeer::get_packet(const uint8_t **r_buffer, int &r_buffer_size) { |
| 727 | r_buffer_size = 0; |
| 728 | |
| 729 | ERR_FAIL_COND_V(ready_state != STATE_OPEN, FAILED); |
| 730 | |
| 731 | if (in_buffer.packets_left() == 0) { |
| 732 | return ERR_UNAVAILABLE; |
| 733 | } |
| 734 | |
| 735 | int read = 0; |
| 736 | uint8_t *rw = packet_buffer.ptrw(); |
| 737 | in_buffer.read_packet(rw, packet_buffer.size(), &was_string, read); |
| 738 | |
| 739 | *r_buffer = rw; |
| 740 | r_buffer_size = read; |
| 741 | |
| 742 | return OK; |
| 743 | } |
| 744 | |
| 745 | int WSLPeer::get_available_packet_count() const { |
| 746 | if (ready_state != STATE_OPEN) { |
| 747 | return 0; |
| 748 | } |
| 749 | |
| 750 | return in_buffer.packets_left(); |
| 751 | } |
| 752 | |
| 753 | int WSLPeer::get_current_outbound_buffered_amount() const { |
| 754 | if (ready_state != STATE_OPEN) { |
| 755 | return 0; |
| 756 | } |
| 757 | |
| 758 | return wslay_event_get_queued_msg_length(wsl_ctx); |
| 759 | } |
| 760 | |
| 761 | void WSLPeer::close(int p_code, String p_reason) { |
| 762 | if (p_code < 0) { |
| 763 | // Force immediate close. |
| 764 | ready_state = STATE_CLOSED; |
| 765 | } |
| 766 | |
| 767 | if (ready_state == STATE_OPEN && !wslay_event_get_close_sent(wsl_ctx)) { |
| 768 | CharString cs = p_reason.utf8(); |
| 769 | wslay_event_queue_close(wsl_ctx, p_code, (uint8_t *)cs.ptr(), cs.length()); |
| 770 | wslay_event_send(wsl_ctx); |
| 771 | ready_state = STATE_CLOSING; |
| 772 | } else if (ready_state == STATE_CONNECTING || ready_state == STATE_CLOSED) { |
| 773 | ready_state = STATE_CLOSED; |
| 774 | connection.unref(); |
| 775 | if (tcp.is_valid()) { |
| 776 | tcp->disconnect_from_host(); |
| 777 | tcp.unref(); |
| 778 | } |
| 779 | } |
| 780 | |
| 781 | in_buffer.clear(); |
| 782 | packet_buffer.resize(0); |
| 783 | } |
| 784 | |
| 785 | IPAddress WSLPeer::get_connected_host() const { |
| 786 | ERR_FAIL_COND_V(tcp.is_null(), IPAddress()); |
| 787 | return tcp->get_connected_host(); |
| 788 | } |
| 789 | |
| 790 | uint16_t WSLPeer::get_connected_port() const { |
| 791 | ERR_FAIL_COND_V(tcp.is_null(), 0); |
| 792 | return tcp->get_connected_port(); |
| 793 | } |
| 794 | |
| 795 | String WSLPeer::get_selected_protocol() const { |
| 796 | return selected_protocol; |
| 797 | } |
| 798 | |
| 799 | String WSLPeer::get_requested_url() const { |
| 800 | return requested_url; |
| 801 | } |
| 802 | |
| 803 | void WSLPeer::set_no_delay(bool p_enabled) { |
| 804 | ERR_FAIL_COND(tcp.is_null()); |
| 805 | tcp->set_no_delay(p_enabled); |
| 806 | } |
| 807 | |
| 808 | void WSLPeer::_clear() { |
| 809 | // Connection info. |
| 810 | ready_state = STATE_CLOSED; |
| 811 | is_server = false; |
| 812 | connection.unref(); |
| 813 | if (tcp.is_valid()) { |
| 814 | tcp->disconnect_from_host(); |
| 815 | tcp.unref(); |
| 816 | } |
| 817 | if (wsl_ctx) { |
| 818 | wslay_event_context_free(wsl_ctx); |
| 819 | wsl_ctx = nullptr; |
| 820 | } |
| 821 | |
| 822 | resolver.stop(); |
| 823 | requested_url.clear(); |
| 824 | requested_host.clear(); |
| 825 | pending_request = true; |
| 826 | handshake_buffer->clear(); |
| 827 | selected_protocol.clear(); |
| 828 | session_key.clear(); |
| 829 | |
| 830 | // Pending packets info. |
| 831 | was_string = 0; |
| 832 | in_buffer.clear(); |
| 833 | packet_buffer.clear(); |
| 834 | |
| 835 | // Close code info. |
| 836 | close_code = -1; |
| 837 | close_reason.clear(); |
| 838 | } |
| 839 | |
| 840 | WSLPeer::WSLPeer() { |
| 841 | handshake_buffer.instantiate(); |
| 842 | } |
| 843 | |
| 844 | WSLPeer::~WSLPeer() { |
| 845 | close(-1); |
| 846 | } |
| 847 | |
| 848 | #endif // WEB_ENABLED |
| 849 | |