wsl_peer.cpp 30 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935
  1. /**************************************************************************/
  2. /* wsl_peer.cpp */
  3. /**************************************************************************/
  4. /* This file is part of: */
  5. /* GODOT ENGINE */
  6. /* https://godotengine.org */
  7. /**************************************************************************/
  8. /* Copyright (c) 2014-present Godot Engine contributors (see AUTHORS.md). */
  9. /* Copyright (c) 2007-2014 Juan Linietsky, Ariel Manzur. */
  10. /* */
  11. /* Permission is hereby granted, free of charge, to any person obtaining */
  12. /* a copy of this software and associated documentation files (the */
  13. /* "Software"), to deal in the Software without restriction, including */
  14. /* without limitation the rights to use, copy, modify, merge, publish, */
  15. /* distribute, sublicense, and/or sell copies of the Software, and to */
  16. /* permit persons to whom the Software is furnished to do so, subject to */
  17. /* the following conditions: */
  18. /* */
  19. /* The above copyright notice and this permission notice shall be */
  20. /* included in all copies or substantial portions of the Software. */
  21. /* */
  22. /* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, */
  23. /* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF */
  24. /* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. */
  25. /* IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY */
  26. /* CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, */
  27. /* TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE */
  28. /* SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. */
  29. /**************************************************************************/
  30. #include "wsl_peer.h"
  31. #ifndef WEB_ENABLED
  32. #include "core/io/stream_peer_tls.h"
  33. CryptoCore::RandomGenerator *WSLPeer::_static_rng = nullptr;
  34. void WSLPeer::initialize() {
  35. WebSocketPeer::_create = WSLPeer::_create;
  36. _static_rng = memnew(CryptoCore::RandomGenerator);
  37. _static_rng->init();
  38. }
  39. void WSLPeer::deinitialize() {
  40. if (_static_rng) {
  41. memdelete(_static_rng);
  42. _static_rng = nullptr;
  43. }
  44. }
  45. ///
  46. /// Resolver
  47. ///
  48. void WSLPeer::Resolver::start(const String &p_host, int p_port) {
  49. stop();
  50. port = p_port;
  51. if (p_host.is_valid_ip_address()) {
  52. ip_candidates.push_back(IPAddress(p_host));
  53. } else {
  54. // Queue hostname for resolution.
  55. resolver_id = IP::get_singleton()->resolve_hostname_queue_item(p_host);
  56. ERR_FAIL_COND(resolver_id == IP::RESOLVER_INVALID_ID);
  57. // Check if it was found in cache.
  58. IP::ResolverStatus ip_status = IP::get_singleton()->get_resolve_item_status(resolver_id);
  59. if (ip_status == IP::RESOLVER_STATUS_DONE) {
  60. ip_candidates = IP::get_singleton()->get_resolve_item_addresses(resolver_id);
  61. IP::get_singleton()->erase_resolve_item(resolver_id);
  62. resolver_id = IP::RESOLVER_INVALID_ID;
  63. }
  64. }
  65. }
  66. void WSLPeer::Resolver::stop() {
  67. if (resolver_id != IP::RESOLVER_INVALID_ID) {
  68. IP::get_singleton()->erase_resolve_item(resolver_id);
  69. resolver_id = IP::RESOLVER_INVALID_ID;
  70. }
  71. port = 0;
  72. }
  73. void WSLPeer::Resolver::try_next_candidate(Ref<StreamPeerTCP> &p_tcp) {
  74. // Check if we still need resolving.
  75. if (resolver_id != IP::RESOLVER_INVALID_ID) {
  76. IP::ResolverStatus ip_status = IP::get_singleton()->get_resolve_item_status(resolver_id);
  77. if (ip_status == IP::RESOLVER_STATUS_WAITING) {
  78. return;
  79. }
  80. if (ip_status == IP::RESOLVER_STATUS_DONE) {
  81. ip_candidates = IP::get_singleton()->get_resolve_item_addresses(resolver_id);
  82. }
  83. IP::get_singleton()->erase_resolve_item(resolver_id);
  84. resolver_id = IP::RESOLVER_INVALID_ID;
  85. }
  86. // Try the current candidate if we have one.
  87. if (p_tcp->get_status() != StreamPeerTCP::STATUS_NONE) {
  88. p_tcp->poll();
  89. StreamPeerTCP::Status status = p_tcp->get_status();
  90. if (status == StreamPeerTCP::STATUS_CONNECTED) {
  91. // On Windows, setting TCP_NODELAY may fail if the socket is still connecting.
  92. p_tcp->set_no_delay(true);
  93. ip_candidates.clear();
  94. return;
  95. } else if (status == StreamPeerTCP::STATUS_CONNECTING) {
  96. return; // Keep connecting.
  97. } else {
  98. p_tcp->disconnect_from_host();
  99. }
  100. }
  101. // Keep trying next candidate.
  102. while (ip_candidates.size()) {
  103. Error err = p_tcp->connect_to_host(ip_candidates.pop_front(), port);
  104. if (err == OK) {
  105. return;
  106. } else {
  107. p_tcp->disconnect_from_host();
  108. }
  109. }
  110. }
  111. ///
  112. /// Server functions
  113. ///
  114. Error WSLPeer::accept_stream(Ref<StreamPeer> p_stream) {
  115. ERR_FAIL_COND_V(p_stream.is_null(), ERR_INVALID_PARAMETER);
  116. ERR_FAIL_COND_V(ready_state != STATE_CLOSED && ready_state != STATE_CLOSING, ERR_ALREADY_IN_USE);
  117. _clear();
  118. if (p_stream->is_class_ptr(StreamPeerTCP::get_class_ptr_static())) {
  119. tcp = p_stream;
  120. connection = p_stream;
  121. use_tls = false;
  122. } else if (p_stream->is_class_ptr(StreamPeerTLS::get_class_ptr_static())) {
  123. Ref<StreamPeer> base_stream = static_cast<Ref<StreamPeerTLS>>(p_stream)->get_stream();
  124. ERR_FAIL_COND_V(base_stream.is_null() || !base_stream->is_class_ptr(StreamPeerTCP::get_class_ptr_static()), ERR_INVALID_PARAMETER);
  125. tcp = static_cast<Ref<StreamPeerTCP>>(base_stream);
  126. connection = p_stream;
  127. use_tls = true;
  128. }
  129. ERR_FAIL_COND_V(connection.is_null() || tcp.is_null(), ERR_INVALID_PARAMETER);
  130. is_server = true;
  131. tcp->set_no_delay(true);
  132. ready_state = STATE_CONNECTING;
  133. handshake_buffer->resize(WSL_MAX_HEADER_SIZE);
  134. handshake_buffer->seek(0);
  135. return OK;
  136. }
  137. bool WSLPeer::_parse_client_request() {
  138. Vector<String> psa = String((const char *)handshake_buffer->get_data_array().ptr(), handshake_buffer->get_position() - 4).split("\r\n");
  139. int len = psa.size();
  140. ERR_FAIL_COND_V_MSG(len < 4, false, "Not enough response headers, got: " + itos(len) + ", expected >= 4.");
  141. Vector<String> req = psa[0].split(" ", false);
  142. ERR_FAIL_COND_V_MSG(req.size() < 2, false, "Invalid protocol or status code.");
  143. // Wrong protocol
  144. ERR_FAIL_COND_V_MSG(req[0] != "GET" || req[2] != "HTTP/1.1", false, "Invalid method or HTTP version.");
  145. HashMap<String, String> headers;
  146. for (int i = 1; i < len; i++) {
  147. Vector<String> header = psa[i].split(":", false, 1);
  148. ERR_FAIL_COND_V_MSG(header.size() != 2, false, "Invalid header -> " + psa[i]);
  149. String name = header[0].to_lower();
  150. String value = header[1].strip_edges();
  151. if (headers.has(name)) {
  152. headers[name] += "," + value;
  153. } else {
  154. headers[name] = value;
  155. }
  156. }
  157. requested_host = headers.has("host") ? headers.get("host") : "";
  158. requested_url = (use_tls ? "wss://" : "ws://") + requested_host + req[1];
  159. #define WSL_CHECK(NAME, VALUE) \
  160. ERR_FAIL_COND_V_MSG(!headers.has(NAME) || headers[NAME].to_lower() != VALUE, false, \
  161. "Missing or invalid header '" + String(NAME) + "'. Expected value '" + VALUE + "'.");
  162. #define WSL_CHECK_EX(NAME) \
  163. ERR_FAIL_COND_V_MSG(!headers.has(NAME), false, "Missing header '" + String(NAME) + "'.");
  164. WSL_CHECK("upgrade", "websocket");
  165. WSL_CHECK("sec-websocket-version", "13");
  166. WSL_CHECK_EX("sec-websocket-key");
  167. WSL_CHECK_EX("connection");
  168. #undef WSL_CHECK_EX
  169. #undef WSL_CHECK
  170. session_key = headers["sec-websocket-key"];
  171. if (headers.has("sec-websocket-protocol")) {
  172. Vector<String> protos = headers["sec-websocket-protocol"].split(",");
  173. for (int i = 0; i < protos.size(); i++) {
  174. String proto = protos[i].strip_edges();
  175. // Check if we have the given protocol
  176. for (int j = 0; j < supported_protocols.size(); j++) {
  177. if (proto != supported_protocols[j]) {
  178. continue;
  179. }
  180. selected_protocol = proto;
  181. break;
  182. }
  183. // Found a protocol
  184. if (!selected_protocol.is_empty()) {
  185. break;
  186. }
  187. }
  188. if (selected_protocol.is_empty()) { // Invalid protocol(s) requested
  189. return false;
  190. }
  191. } else if (supported_protocols.size() > 0) { // No protocol requested, but we need one
  192. return false;
  193. }
  194. return true;
  195. }
  196. Error WSLPeer::_do_server_handshake() {
  197. if (use_tls) {
  198. Ref<StreamPeerTLS> tls = static_cast<Ref<StreamPeerTLS>>(connection);
  199. if (tls.is_null()) {
  200. ERR_FAIL_V_MSG(ERR_BUG, "Couldn't get StreamPeerTLS for WebSocket handshake.");
  201. close(-1);
  202. return FAILED;
  203. }
  204. tls->poll();
  205. if (tls->get_status() == StreamPeerTLS::STATUS_HANDSHAKING) {
  206. return OK; // Pending handshake
  207. } else if (tls->get_status() != StreamPeerTLS::STATUS_CONNECTED) {
  208. print_verbose(vformat("WebSocket SSL connection error during handshake (StreamPeerTLS status code %d).", tls->get_status()));
  209. close(-1);
  210. return FAILED;
  211. }
  212. }
  213. if (pending_request) {
  214. int read = 0;
  215. while (true) {
  216. ERR_FAIL_COND_V_MSG(handshake_buffer->get_available_bytes() < 1, ERR_OUT_OF_MEMORY, "WebSocket response headers are too big.");
  217. int pos = handshake_buffer->get_position();
  218. uint8_t byte;
  219. Error err = connection->get_partial_data(&byte, 1, read);
  220. if (err != OK) { // Got an error
  221. print_verbose(vformat("WebSocket error while getting partial data (StreamPeer error code %d).", err));
  222. close(-1);
  223. return FAILED;
  224. } else if (read != 1) { // Busy, wait next poll
  225. return OK;
  226. }
  227. handshake_buffer->put_u8(byte);
  228. const char *r = (const char *)handshake_buffer->get_data_array().ptr();
  229. int l = pos;
  230. if (l > 3 && r[l] == '\n' && r[l - 1] == '\r' && r[l - 2] == '\n' && r[l - 3] == '\r') {
  231. if (!_parse_client_request()) {
  232. close(-1);
  233. return FAILED;
  234. }
  235. String s = "HTTP/1.1 101 Switching Protocols\r\n";
  236. s += "Upgrade: websocket\r\n";
  237. s += "Connection: Upgrade\r\n";
  238. s += "Sec-WebSocket-Accept: " + _compute_key_response(session_key) + "\r\n";
  239. if (!selected_protocol.is_empty()) {
  240. s += "Sec-WebSocket-Protocol: " + selected_protocol + "\r\n";
  241. }
  242. for (int i = 0; i < handshake_headers.size(); i++) {
  243. s += handshake_headers[i] + "\r\n";
  244. }
  245. s += "\r\n";
  246. CharString cs = s.utf8();
  247. handshake_buffer->clear();
  248. handshake_buffer->put_data((const uint8_t *)cs.get_data(), cs.length());
  249. handshake_buffer->seek(0);
  250. pending_request = false;
  251. break;
  252. }
  253. }
  254. }
  255. if (pending_request) { // Still pending.
  256. return OK;
  257. }
  258. int left = handshake_buffer->get_available_bytes();
  259. if (left) {
  260. Vector<uint8_t> data = handshake_buffer->get_data_array();
  261. int pos = handshake_buffer->get_position();
  262. int sent = 0;
  263. Error err = connection->put_partial_data(data.ptr() + pos, left, sent);
  264. if (err != OK) {
  265. print_verbose(vformat("WebSocket error while putting partial data (StreamPeer error code %d).", err));
  266. close(-1);
  267. return err;
  268. }
  269. handshake_buffer->seek(pos + sent);
  270. left -= sent;
  271. if (left == 0) {
  272. resolver.stop();
  273. // Response sent, initialize wslay context.
  274. wslay_event_context_server_init(&wsl_ctx, &_wsl_callbacks, this);
  275. wslay_event_config_set_no_buffering(wsl_ctx, 1);
  276. wslay_event_config_set_max_recv_msg_length(wsl_ctx, inbound_buffer_size);
  277. in_buffer.resize(nearest_shift(inbound_buffer_size), max_queued_packets);
  278. packet_buffer.resize(inbound_buffer_size);
  279. ready_state = STATE_OPEN;
  280. }
  281. }
  282. return OK;
  283. }
  284. ///
  285. /// Client functions
  286. ///
  287. void WSLPeer::_do_client_handshake() {
  288. ERR_FAIL_COND(tcp.is_null());
  289. // Try to connect to candidates.
  290. if (resolver.has_more_candidates() || tcp->get_status() == StreamPeerTCP::STATUS_CONNECTING) {
  291. resolver.try_next_candidate(tcp);
  292. if (resolver.has_more_candidates()) {
  293. return; // Still pending.
  294. }
  295. }
  296. tcp->poll();
  297. if (tcp->get_status() == StreamPeerTCP::STATUS_CONNECTING) {
  298. return; // Keep connecting.
  299. } else if (tcp->get_status() != StreamPeerTCP::STATUS_CONNECTED) {
  300. close(-1); // Failed to connect.
  301. return;
  302. }
  303. if (use_tls) {
  304. Ref<StreamPeerTLS> tls;
  305. if (connection == tcp) {
  306. // Start SSL handshake
  307. tls = Ref<StreamPeerTLS>(StreamPeerTLS::create());
  308. ERR_FAIL_COND(tls.is_null());
  309. if (tls->connect_to_stream(tcp, requested_host, tls_options) != OK) {
  310. close(-1);
  311. return; // Error.
  312. }
  313. connection = tls;
  314. } else {
  315. tls = static_cast<Ref<StreamPeerTLS>>(connection);
  316. ERR_FAIL_COND(tls.is_null());
  317. tls->poll();
  318. }
  319. if (tls->get_status() == StreamPeerTLS::STATUS_HANDSHAKING) {
  320. return; // Need more polling.
  321. } else if (tls->get_status() != StreamPeerTLS::STATUS_CONNECTED) {
  322. close(-1);
  323. return; // Error.
  324. }
  325. }
  326. // Do websocket handshake.
  327. if (pending_request) {
  328. int left = handshake_buffer->get_available_bytes();
  329. int pos = handshake_buffer->get_position();
  330. const Vector<uint8_t> data = handshake_buffer->get_data_array();
  331. int sent = 0;
  332. Error err = connection->put_partial_data(data.ptr() + pos, left, sent);
  333. // Sending handshake failed
  334. if (err != OK) {
  335. close(-1);
  336. return; // Error.
  337. }
  338. handshake_buffer->seek(pos + sent);
  339. if (handshake_buffer->get_available_bytes() == 0) {
  340. pending_request = false;
  341. handshake_buffer->clear();
  342. handshake_buffer->resize(WSL_MAX_HEADER_SIZE);
  343. handshake_buffer->seek(0);
  344. }
  345. } else {
  346. int read = 0;
  347. while (true) {
  348. int left = handshake_buffer->get_available_bytes();
  349. int pos = handshake_buffer->get_position();
  350. if (left == 0) {
  351. // Header is too big
  352. close(-1);
  353. ERR_FAIL_MSG("Response headers too big.");
  354. }
  355. uint8_t byte;
  356. Error err = connection->get_partial_data(&byte, 1, read);
  357. if (err != OK) {
  358. // Got some error.
  359. close(-1);
  360. return;
  361. } else if (read != 1) {
  362. // Busy, wait next poll.
  363. break;
  364. }
  365. handshake_buffer->put_u8(byte);
  366. // Check "\r\n\r\n" header terminator
  367. const char *r = (const char *)handshake_buffer->get_data_array().ptr();
  368. int l = pos;
  369. if (l > 3 && r[l] == '\n' && r[l - 1] == '\r' && r[l - 2] == '\n' && r[l - 3] == '\r') {
  370. // Response is over, verify headers and initialize wslay context/
  371. if (!_verify_server_response()) {
  372. close(-1);
  373. ERR_FAIL_MSG("Invalid response headers.");
  374. }
  375. wslay_event_context_client_init(&wsl_ctx, &_wsl_callbacks, this);
  376. wslay_event_config_set_no_buffering(wsl_ctx, 1);
  377. wslay_event_config_set_max_recv_msg_length(wsl_ctx, inbound_buffer_size);
  378. in_buffer.resize(nearest_shift(inbound_buffer_size), max_queued_packets);
  379. packet_buffer.resize(inbound_buffer_size);
  380. ready_state = STATE_OPEN;
  381. break;
  382. }
  383. }
  384. }
  385. }
  386. bool WSLPeer::_verify_server_response() {
  387. Vector<String> psa = String((const char *)handshake_buffer->get_data_array().ptr(), handshake_buffer->get_position() - 4).split("\r\n");
  388. int len = psa.size();
  389. ERR_FAIL_COND_V_MSG(len < 4, false, "Not enough response headers. Got: " + itos(len) + ", expected >= 4.");
  390. Vector<String> req = psa[0].split(" ", false);
  391. ERR_FAIL_COND_V_MSG(req.size() < 2, false, "Invalid protocol or status code. Got '" + psa[0] + "', expected 'HTTP/1.1 101'.");
  392. // Wrong protocol
  393. ERR_FAIL_COND_V_MSG(req[0] != "HTTP/1.1", false, "Invalid protocol. Got: '" + req[0] + "', expected 'HTTP/1.1'.");
  394. ERR_FAIL_COND_V_MSG(req[1] != "101", false, "Invalid status code. Got: '" + req[1] + "', expected '101'.");
  395. HashMap<String, String> headers;
  396. for (int i = 1; i < len; i++) {
  397. Vector<String> header = psa[i].split(":", false, 1);
  398. ERR_FAIL_COND_V_MSG(header.size() != 2, false, "Invalid header -> " + psa[i] + ".");
  399. String name = header[0].to_lower();
  400. String value = header[1].strip_edges();
  401. if (headers.has(name)) {
  402. headers[name] += "," + value;
  403. } else {
  404. headers[name] = value;
  405. }
  406. }
  407. #define WSL_CHECK(NAME, VALUE) \
  408. ERR_FAIL_COND_V_MSG(!headers.has(NAME) || headers[NAME].to_lower() != VALUE, false, \
  409. "Missing or invalid header '" + String(NAME) + "'. Expected value '" + VALUE + "'.");
  410. #define WSL_CHECK_NC(NAME, VALUE) \
  411. ERR_FAIL_COND_V_MSG(!headers.has(NAME) || headers[NAME] != VALUE, false, \
  412. "Missing or invalid header '" + String(NAME) + "'. Expected value '" + VALUE + "'.");
  413. WSL_CHECK("connection", "upgrade");
  414. WSL_CHECK("upgrade", "websocket");
  415. WSL_CHECK_NC("sec-websocket-accept", _compute_key_response(session_key));
  416. #undef WSL_CHECK_NC
  417. #undef WSL_CHECK
  418. if (supported_protocols.size() == 0) {
  419. // We didn't request a custom protocol
  420. ERR_FAIL_COND_V_MSG(headers.has("sec-websocket-protocol"), false, "Received unrequested sub-protocol -> " + headers["sec-websocket-protocol"]);
  421. } else {
  422. // We requested at least one custom protocol but didn't receive one
  423. ERR_FAIL_COND_V_MSG(!headers.has("sec-websocket-protocol"), false, "Requested sub-protocol(s) but received none.");
  424. // Check received sub-protocol was one of those requested.
  425. selected_protocol = headers["sec-websocket-protocol"];
  426. bool valid = false;
  427. for (int i = 0; i < supported_protocols.size(); i++) {
  428. if (supported_protocols[i] != selected_protocol) {
  429. continue;
  430. }
  431. valid = true;
  432. break;
  433. }
  434. if (!valid) {
  435. ERR_FAIL_V_MSG(false, "Received unrequested sub-protocol -> " + selected_protocol);
  436. }
  437. }
  438. return true;
  439. }
  440. Error WSLPeer::connect_to_url(const String &p_url, Ref<TLSOptions> p_options) {
  441. ERR_FAIL_COND_V(p_url.is_empty(), ERR_INVALID_PARAMETER);
  442. ERR_FAIL_COND_V(p_options.is_valid() && p_options->is_server(), ERR_INVALID_PARAMETER);
  443. ERR_FAIL_COND_V(ready_state != STATE_CLOSED && ready_state != STATE_CLOSING, ERR_ALREADY_IN_USE);
  444. _clear();
  445. String host;
  446. String path;
  447. String scheme;
  448. String fragment;
  449. int port = 0;
  450. Error err = p_url.parse_url(scheme, host, port, path, fragment);
  451. ERR_FAIL_COND_V_MSG(err != OK, err, "Invalid URL: " + p_url);
  452. if (scheme.is_empty()) {
  453. scheme = "ws://";
  454. }
  455. ERR_FAIL_COND_V_MSG(scheme != "ws://" && scheme != "wss://", ERR_INVALID_PARAMETER, vformat("Invalid protocol: \"%s\" (must be either \"ws://\" or \"wss://\").", scheme));
  456. use_tls = false;
  457. if (scheme == "wss://") {
  458. use_tls = true;
  459. }
  460. if (port == 0) {
  461. port = use_tls ? 443 : 80;
  462. }
  463. if (path.is_empty()) {
  464. path = "/";
  465. }
  466. ERR_FAIL_COND_V_MSG(use_tls && !StreamPeerTLS::is_available(), ERR_UNAVAILABLE, "WSS is not available in this build.");
  467. requested_url = p_url;
  468. requested_host = host;
  469. if (p_options.is_valid()) {
  470. tls_options = p_options;
  471. } else {
  472. tls_options = TLSOptions::client();
  473. }
  474. tcp.instantiate();
  475. resolver.start(host, port);
  476. resolver.try_next_candidate(tcp);
  477. if (tcp->get_status() != StreamPeerTCP::STATUS_CONNECTING && tcp->get_status() != StreamPeerTCP::STATUS_CONNECTED && !resolver.has_more_candidates()) {
  478. _clear();
  479. return FAILED;
  480. }
  481. connection = tcp;
  482. // Prepare handshake request.
  483. session_key = _generate_key();
  484. String request = "GET " + path + " HTTP/1.1\r\n";
  485. String port_string;
  486. if ((port != 80 && !use_tls) || (port != 443 && use_tls)) {
  487. port_string = ":" + itos(port);
  488. }
  489. request += "Host: " + host + port_string + "\r\n";
  490. request += "Upgrade: websocket\r\n";
  491. request += "Connection: Upgrade\r\n";
  492. request += "Sec-WebSocket-Key: " + session_key + "\r\n";
  493. request += "Sec-WebSocket-Version: 13\r\n";
  494. if (supported_protocols.size() > 0) {
  495. request += "Sec-WebSocket-Protocol: ";
  496. for (int i = 0; i < supported_protocols.size(); i++) {
  497. if (i != 0) {
  498. request += ",";
  499. }
  500. request += supported_protocols[i];
  501. }
  502. request += "\r\n";
  503. }
  504. for (int i = 0; i < handshake_headers.size(); i++) {
  505. request += handshake_headers[i] + "\r\n";
  506. }
  507. request += "\r\n";
  508. CharString cs = request.utf8();
  509. handshake_buffer->put_data((const uint8_t *)cs.get_data(), cs.length());
  510. handshake_buffer->seek(0);
  511. ready_state = STATE_CONNECTING;
  512. is_server = false;
  513. return OK;
  514. }
  515. ///
  516. /// Callback functions.
  517. ///
  518. ssize_t WSLPeer::_wsl_recv_callback(wslay_event_context_ptr ctx, uint8_t *data, size_t len, int flags, void *user_data) {
  519. WSLPeer *peer = (WSLPeer *)user_data;
  520. Ref<StreamPeer> conn = peer->connection;
  521. if (conn.is_null()) {
  522. wslay_event_set_error(ctx, WSLAY_ERR_CALLBACK_FAILURE);
  523. return -1;
  524. }
  525. // Make sure we don't read more than what our buffer can hold.
  526. size_t buffer_limit = MIN(peer->in_buffer.payload_space_left(), peer->in_buffer.packets_space_left() * 2); // The minimum size of a websocket message is 2 bytes.
  527. size_t to_read = MIN(len, buffer_limit);
  528. if (to_read == 0) {
  529. wslay_event_set_error(ctx, WSLAY_ERR_WOULDBLOCK);
  530. return -1;
  531. }
  532. int read = 0;
  533. Error err = conn->get_partial_data(data, to_read, read);
  534. if (err != OK) {
  535. print_verbose("Websocket get data error: " + itos(err) + ", read (should be 0!): " + itos(read));
  536. wslay_event_set_error(ctx, WSLAY_ERR_CALLBACK_FAILURE);
  537. return -1;
  538. }
  539. if (read == 0) {
  540. wslay_event_set_error(ctx, WSLAY_ERR_WOULDBLOCK);
  541. return -1;
  542. }
  543. return read;
  544. }
  545. void WSLPeer::_wsl_recv_start_callback(wslay_event_context_ptr ctx, const struct wslay_event_on_frame_recv_start_arg *arg, void *user_data) {
  546. WSLPeer *peer = (WSLPeer *)user_data;
  547. uint8_t op = arg->opcode;
  548. if (op == WSLAY_TEXT_FRAME || op == WSLAY_BINARY_FRAME) {
  549. // Get ready to process a data package.
  550. PendingMessage &pm = peer->pending_message;
  551. pm.opcode = op;
  552. }
  553. }
  554. void WSLPeer::_wsl_frame_recv_chunk_callback(wslay_event_context_ptr ctx, const struct wslay_event_on_frame_recv_chunk_arg *arg, void *user_data) {
  555. WSLPeer *peer = (WSLPeer *)user_data;
  556. PendingMessage &pm = peer->pending_message;
  557. if (pm.opcode != 0) {
  558. // Only write the payload.
  559. peer->in_buffer.write_packet(arg->data, arg->data_length, nullptr);
  560. pm.payload_size += arg->data_length;
  561. }
  562. }
  563. ssize_t WSLPeer::_wsl_send_callback(wslay_event_context_ptr ctx, const uint8_t *data, size_t len, int flags, void *user_data) {
  564. WSLPeer *peer = (WSLPeer *)user_data;
  565. Ref<StreamPeer> conn = peer->connection;
  566. if (conn.is_null()) {
  567. wslay_event_set_error(ctx, WSLAY_ERR_CALLBACK_FAILURE);
  568. return -1;
  569. }
  570. int sent = 0;
  571. Error err = conn->put_partial_data(data, len, sent);
  572. if (err != OK) {
  573. wslay_event_set_error(ctx, WSLAY_ERR_CALLBACK_FAILURE);
  574. return -1;
  575. }
  576. if (sent == 0) {
  577. wslay_event_set_error(ctx, WSLAY_ERR_WOULDBLOCK);
  578. return -1;
  579. }
  580. return sent;
  581. }
  582. int WSLPeer::_wsl_genmask_callback(wslay_event_context_ptr ctx, uint8_t *buf, size_t len, void *user_data) {
  583. ERR_FAIL_NULL_V(_static_rng, WSLAY_ERR_CALLBACK_FAILURE);
  584. Error err = _static_rng->get_random_bytes(buf, len);
  585. ERR_FAIL_COND_V(err != OK, WSLAY_ERR_CALLBACK_FAILURE);
  586. return 0;
  587. }
  588. void WSLPeer::_wsl_msg_recv_callback(wslay_event_context_ptr ctx, const struct wslay_event_on_msg_recv_arg *arg, void *user_data) {
  589. WSLPeer *peer = (WSLPeer *)user_data;
  590. uint8_t op = arg->opcode;
  591. if (op == WSLAY_CONNECTION_CLOSE) {
  592. // Close request or confirmation.
  593. peer->close_code = arg->status_code;
  594. size_t len = arg->msg_length;
  595. peer->close_reason = "";
  596. if (len > 2 /* first 2 bytes = close code */) {
  597. peer->close_reason.parse_utf8((char *)arg->msg + 2, len - 2);
  598. }
  599. if (peer->ready_state == STATE_OPEN) {
  600. peer->ready_state = STATE_CLOSING;
  601. }
  602. return;
  603. }
  604. if (op == WSLAY_PONG) {
  605. peer->heartbeat_waiting = false;
  606. } else if (op == WSLAY_TEXT_FRAME || op == WSLAY_BINARY_FRAME) {
  607. PendingMessage &pm = peer->pending_message;
  608. ERR_FAIL_COND(pm.opcode != op);
  609. // Only write the packet (since it's now completed).
  610. uint8_t is_string = pm.opcode == WSLAY_TEXT_FRAME ? 1 : 0;
  611. peer->in_buffer.write_packet(nullptr, pm.payload_size, &is_string);
  612. pm.clear();
  613. }
  614. // Ping.
  615. }
  616. wslay_event_callbacks WSLPeer::_wsl_callbacks = {
  617. _wsl_recv_callback,
  618. _wsl_send_callback,
  619. _wsl_genmask_callback,
  620. _wsl_recv_start_callback,
  621. _wsl_frame_recv_chunk_callback,
  622. nullptr,
  623. _wsl_msg_recv_callback
  624. };
  625. String WSLPeer::_generate_key() {
  626. // Random key
  627. Vector<uint8_t> bkey;
  628. int len = 16; // 16 bytes, as per RFC
  629. bkey.resize(len);
  630. _wsl_genmask_callback(nullptr, bkey.ptrw(), len, nullptr);
  631. return CryptoCore::b64_encode_str(bkey.ptrw(), len);
  632. }
  633. String WSLPeer::_compute_key_response(String p_key) {
  634. String key = p_key + "258EAFA5-E914-47DA-95CA-C5AB0DC85B11"; // Magic UUID as per RFC
  635. Vector<uint8_t> sha = key.sha1_buffer();
  636. return CryptoCore::b64_encode_str(sha.ptr(), sha.size());
  637. }
  638. void WSLPeer::poll() {
  639. // Nothing to do.
  640. if (ready_state == STATE_CLOSED) {
  641. return;
  642. }
  643. if (ready_state == STATE_CONNECTING) {
  644. if (is_server) {
  645. _do_server_handshake();
  646. } else {
  647. _do_client_handshake();
  648. }
  649. }
  650. if (ready_state == STATE_OPEN || ready_state == STATE_CLOSING) {
  651. ERR_FAIL_NULL(wsl_ctx);
  652. uint64_t ticks = OS::get_singleton()->get_ticks_msec();
  653. int err = 0;
  654. if (heartbeat_interval_msec != 0 && ticks - last_heartbeat > heartbeat_interval_msec && ready_state == STATE_OPEN) {
  655. if (heartbeat_waiting) {
  656. wslay_event_context_free(wsl_ctx);
  657. wsl_ctx = nullptr;
  658. close(-1);
  659. return;
  660. }
  661. heartbeat_waiting = true;
  662. struct wslay_event_msg msg;
  663. msg.opcode = WSLAY_PING;
  664. msg.msg = nullptr;
  665. msg.msg_length = 0;
  666. err = wslay_event_queue_msg(wsl_ctx, &msg);
  667. if (err == 0) {
  668. last_heartbeat = ticks;
  669. } else {
  670. print_verbose("Websocket (wslay) failed to send ping: " + itos(err));
  671. wslay_event_context_free(wsl_ctx);
  672. wsl_ctx = nullptr;
  673. close(-1);
  674. return;
  675. }
  676. }
  677. if ((err = wslay_event_recv(wsl_ctx)) != 0 || (err = wslay_event_send(wsl_ctx)) != 0) {
  678. // Error close.
  679. print_verbose("Websocket (wslay) poll error: " + itos(err));
  680. wslay_event_context_free(wsl_ctx);
  681. wsl_ctx = nullptr;
  682. close(-1);
  683. return;
  684. }
  685. if (wslay_event_get_close_sent(wsl_ctx)) {
  686. if (wslay_event_get_close_received(wsl_ctx)) {
  687. // Clean close.
  688. wslay_event_context_free(wsl_ctx);
  689. wsl_ctx = nullptr;
  690. close(-1);
  691. return;
  692. } else if (!wslay_event_get_read_enabled(wsl_ctx)) {
  693. // Some protocol error caused wslay to stop processing incoming events, we'll never receive a close from the other peer.
  694. close_code = wslay_event_get_status_code_sent(wsl_ctx);
  695. switch (close_code) {
  696. case WSLAY_CODE_MESSAGE_TOO_BIG:
  697. close_reason = "Message too big";
  698. break;
  699. case WSLAY_CODE_PROTOCOL_ERROR:
  700. close_reason = "Protocol error";
  701. break;
  702. case WSLAY_CODE_ABNORMAL_CLOSURE:
  703. close_reason = "Abnormal closure";
  704. break;
  705. case WSLAY_CODE_INVALID_FRAME_PAYLOAD_DATA:
  706. close_reason = "Invalid frame payload data";
  707. break;
  708. default:
  709. close_reason = "Unknown";
  710. }
  711. wslay_event_context_free(wsl_ctx);
  712. wsl_ctx = nullptr;
  713. close(-1);
  714. return;
  715. }
  716. }
  717. }
  718. }
  719. Error WSLPeer::_send(const uint8_t *p_buffer, int p_buffer_size, wslay_opcode p_opcode) {
  720. ERR_FAIL_COND_V(ready_state != STATE_OPEN, FAILED);
  721. ERR_FAIL_COND_V(wslay_event_get_queued_msg_count(wsl_ctx) >= (uint32_t)max_queued_packets, ERR_OUT_OF_MEMORY);
  722. ERR_FAIL_COND_V(outbound_buffer_size > 0 && (wslay_event_get_queued_msg_length(wsl_ctx) + p_buffer_size > (uint32_t)outbound_buffer_size), ERR_OUT_OF_MEMORY);
  723. struct wslay_event_msg msg;
  724. msg.opcode = p_opcode;
  725. msg.msg = p_buffer;
  726. msg.msg_length = p_buffer_size;
  727. // Queue & send message.
  728. if (wslay_event_queue_msg(wsl_ctx, &msg) != 0 || wslay_event_send(wsl_ctx) != 0) {
  729. close(-1);
  730. return FAILED;
  731. }
  732. return OK;
  733. }
  734. Error WSLPeer::send(const uint8_t *p_buffer, int p_buffer_size, WriteMode p_mode) {
  735. wslay_opcode opcode = p_mode == WRITE_MODE_TEXT ? WSLAY_TEXT_FRAME : WSLAY_BINARY_FRAME;
  736. return _send(p_buffer, p_buffer_size, opcode);
  737. }
  738. Error WSLPeer::put_packet(const uint8_t *p_buffer, int p_buffer_size) {
  739. return _send(p_buffer, p_buffer_size, WSLAY_BINARY_FRAME);
  740. }
  741. Error WSLPeer::get_packet(const uint8_t **r_buffer, int &r_buffer_size) {
  742. r_buffer_size = 0;
  743. ERR_FAIL_COND_V(ready_state != STATE_OPEN, FAILED);
  744. if (in_buffer.packets_left() == 0) {
  745. return ERR_UNAVAILABLE;
  746. }
  747. int read = 0;
  748. uint8_t *rw = packet_buffer.ptrw();
  749. in_buffer.read_packet(rw, packet_buffer.size(), &was_string, read);
  750. *r_buffer = rw;
  751. r_buffer_size = read;
  752. return OK;
  753. }
  754. int WSLPeer::get_available_packet_count() const {
  755. if (ready_state != STATE_OPEN) {
  756. return 0;
  757. }
  758. return in_buffer.packets_left();
  759. }
  760. int WSLPeer::get_current_outbound_buffered_amount() const {
  761. if (ready_state != STATE_OPEN) {
  762. return 0;
  763. }
  764. return wslay_event_get_queued_msg_length(wsl_ctx);
  765. }
  766. void WSLPeer::close(int p_code, String p_reason) {
  767. if (p_code < 0) {
  768. // Force immediate close.
  769. ready_state = STATE_CLOSED;
  770. }
  771. if (ready_state == STATE_OPEN && !wslay_event_get_close_sent(wsl_ctx)) {
  772. CharString cs = p_reason.utf8();
  773. wslay_event_queue_close(wsl_ctx, p_code, (uint8_t *)cs.ptr(), cs.length());
  774. wslay_event_send(wsl_ctx);
  775. ready_state = STATE_CLOSING;
  776. } else if (ready_state == STATE_CONNECTING || ready_state == STATE_CLOSED) {
  777. ready_state = STATE_CLOSED;
  778. connection.unref();
  779. if (tcp.is_valid()) {
  780. tcp->disconnect_from_host();
  781. tcp.unref();
  782. }
  783. }
  784. if (ready_state == STATE_CLOSED) {
  785. heartbeat_waiting = false;
  786. in_buffer.clear();
  787. packet_buffer.resize(0);
  788. pending_message.clear();
  789. }
  790. }
  791. IPAddress WSLPeer::get_connected_host() const {
  792. ERR_FAIL_COND_V(tcp.is_null(), IPAddress());
  793. return tcp->get_connected_host();
  794. }
  795. uint16_t WSLPeer::get_connected_port() const {
  796. ERR_FAIL_COND_V(tcp.is_null(), 0);
  797. return tcp->get_connected_port();
  798. }
  799. String WSLPeer::get_selected_protocol() const {
  800. return selected_protocol;
  801. }
  802. String WSLPeer::get_requested_url() const {
  803. return requested_url;
  804. }
  805. void WSLPeer::set_no_delay(bool p_enabled) {
  806. ERR_FAIL_COND(tcp.is_null());
  807. tcp->set_no_delay(p_enabled);
  808. }
  809. void WSLPeer::_clear() {
  810. // Connection info.
  811. ready_state = STATE_CLOSED;
  812. is_server = false;
  813. connection.unref();
  814. if (tcp.is_valid()) {
  815. tcp->disconnect_from_host();
  816. tcp.unref();
  817. }
  818. if (wsl_ctx) {
  819. wslay_event_context_free(wsl_ctx);
  820. wsl_ctx = nullptr;
  821. }
  822. resolver.stop();
  823. requested_url.clear();
  824. requested_host.clear();
  825. pending_request = true;
  826. handshake_buffer->clear();
  827. selected_protocol.clear();
  828. session_key.clear();
  829. // Pending packets info.
  830. was_string = 0;
  831. in_buffer.clear();
  832. packet_buffer.clear();
  833. // Close code info.
  834. close_code = -1;
  835. close_reason.clear();
  836. }
  837. WSLPeer::WSLPeer() {
  838. handshake_buffer.instantiate();
  839. }
  840. WSLPeer::~WSLPeer() {
  841. close(-1);
  842. }
  843. #endif // WEB_ENABLED