some restructuring of the code

This commit is contained in:
JCash 2020-08-25 16:50:33 +02:00
parent e781c84283
commit 0e589290ed
11 changed files with 863 additions and 642 deletions

View File

@ -60,9 +60,13 @@ local function websocket_callback(self, conn, data)
if data.event == websocket.EVENT_DISCONNECTED then if data.event == websocket.EVENT_DISCONNECTED then
self.connection = nil self.connection = nil
update_buttons(self) update_buttons(self)
if data.error then
log("Diconnect error:", data.error)
self.connection = nil
end
elseif data.event == websocket.EVENT_CONNECTED then elseif data.event == websocket.EVENT_CONNECTED then
if data.error then if data.error then
log("on_connected error", data.error) log("Connection error:", data.error)
self.connection = nil self.connection = nil
end end
update_buttons(self) update_buttons(self)
@ -83,11 +87,9 @@ local function connect(self, scheme)
local url = scheme .. URL local url = scheme .. URL
log("Connecting to " .. url) log("Connecting to " .. url)
local conn, err = websocket.connect(url, params, websocket_callback) self.connection = websocket.connect(url, params, websocket_callback)
if conn == nil then if self.connection == nil then
print("Failed to connect to " .. url .. ": " .. err) print("Failed to connect to " .. url .. ": " .. err)
else
self.connection = conn
end end
end end

View File

@ -0,0 +1,174 @@
// Copyright 2020 The Defold Foundation
// Licensed under the Defold License version 1.0 (the "License"); you may not use
// this file except in compliance with the License.
//
// You may obtain a copy of the License, together with FAQs at
// https://www.defold.com/license
//
// Unless required by applicable law or agreed to in writing, software distributed
// under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
// CONDITIONS OF ANY KIND, either express or implied. See the License for the
// specific language governing permissions and limitations under the License.
#ifndef DMSDK_CONNECTION_POOL
#define DMSDK_CONNECTION_POOL
#include <stdint.h>
#include <dlib/socket.h>
#include <dlib/dns.h>
/**
* Connection pooling
*/
namespace dmConnectionPool
{
/**
* Connection pool handle
*/
typedef struct ConnectionPool* HPool;
/**
* Connection handle
*/
typedef uint32_t HConnection;
/**
* Result codes
*/
enum Result
{
RESULT_OK = 0, //!< RESULT_OK
RESULT_OUT_OF_RESOURCES = -1,//!< RESULT_OUT_OF_RESOURCES
RESULT_SOCKET_ERROR = -2, //!< RESULT_SOCKET_ERROR
RESULT_HANDSHAKE_FAILED = -3,//!< RESULT_HANDSHAKE_FAILED
RESULT_SHUT_DOWN = -4, //<! RESULT_SHUT_DOWN
};
/**
* Stats
*/
struct Stats
{
uint32_t m_Free;
uint32_t m_Connected;
uint32_t m_InUse;
};
/**
* Parameters
*/
struct Params
{
Params()
{
m_MaxConnections = 64;
m_MaxKeepAlive = 10;
}
/// Max connection in pool
uint32_t m_MaxConnections;
/// Default max-keep-alive time in seconds
uint32_t m_MaxKeepAlive;
};
/**
* Create a new connection pool
* @param params
* @param pool
* @return RESULT_OK on success
*/
Result New(const Params* params, HPool* pool);
/**
* Delete connnection pool
* @param pool
* @return RESULT_OK on success
*/
Result Delete(HPool pool);
/**
* Set max keep-alive for sockets in seconds. Sockets older than max_keep_alive
* are not reused and hence closed
* @param pool
* @param max_keep_alive
*/
void SetMaxKeepAlive(HPool pool, uint32_t max_keep_alive);
/**
* Get statistics
* @param pool
* @param stats
*/
void GetStats(HPool pool, Stats* stats);
/**
* Connection to a host/port
* @param pool pool
* @param host host
* @param port port
* @param dns_channel The DNS channel that will be used for translating the host to an address
* @param ssl true for ssl connection
* @param timeout The timeout (micro seconds) for the connection and ssl handshake
* @param connection connection (out)
* @param sock_res socket-result code on failure
* @return RESULT_OK on success
*/
Result Dial(HPool pool, const char* host, uint16_t port, dmDNS::HChannel dns_channel, bool ssl, int timeout, HConnection* connection, dmSocket::Result* sock_res);
/**
* Return connection to pool
* @param pool
* @param connection
*/
void Return(HPool pool, HConnection connection);
/**
* Close connection. Use this function whenever an error occur in eg http.
* @param pool
* @param connection
*/
void Close(HPool pool, HConnection connection);
/**
* Get socket for connection
* @param pool
* @param connection
* @return RESULT_OK on success
*/
dmSocket::Socket GetSocket(HPool pool, HConnection connection);
/**
* Get ssl-handle. The returned value is an mbedtls_ssl_context* (mbedtls)
* @param pool
* @param connection
* @return An mbedtls_ssl_context* pointer on success
*/
void* GetSSLConnection(HPool pool, HConnection connection);
/**
* Get reuse count for a connection
* @param pool
* @param connection
* @return reuse count
*/
uint32_t GetReuseCount(HPool pool, HConnection connection);
/**
* Shuts down all open sockets in the pool and block new connection attempts. The function can be
* called repeatedly on the same pool until it returns no more connections in use.
*
* @param pool pool
* @param how shutdown type to pass to socket shutdown function
* @return current number of connections in use
*/
uint32_t Shutdown(HPool pool, dmSocket::ShutdownType how);
/**
* Reopen the pool from a Shutdown call so it allows Dialing again. This function is here so the pool can be reset
* during testing, or subsequent tests will break when the pool has been put in shutdown mode.
*/
void Reopen(HPool pool);
}
#endif // #ifndef DMSDK_CONNECTION_POOL

230
websocket/src/handshake.cpp Normal file
View File

@ -0,0 +1,230 @@
#include "websocket.h"
#include "dmsdk/socket.h"
namespace dmWebsocket
{
const char* RFC_MAGIC = "258EAFA5-E914-47DA-95CA-C5AB0DC85B11"; // as per the rfc document on page 7 (https://tools.ietf.org/html/rfc6455)
static void printHex(const uint8_t* data, size_t len)
{
for (int i = 0; i < 16; ++i)
{
printf("%x", data[i]);
}
}
static void CreateKey(uint8_t* key, size_t len)
{
pcg32_random_t rnd;
pcg32_srandom_r(&rnd, dmTime::GetTime(), 31452);
for (unsigned int i = 0; i < len; i++) {
key[i] = (char)(uint8_t)(pcg32_random_r(&rnd) & 0xFF);
}
}
#define WS_SENDALL(s) \
sock_res = Send(conn, s, strlen(s), 0);\
if (sock_res != dmSocket::RESULT_OK)\
{\
goto bail;\
}\
Result SendClientHandshake(WebsocketConnection* conn)
{
CreateKey(conn->m_Key, sizeof(conn->m_Key));
char encoded_key[64] = {0};
uint32_t encoded_key_len = sizeof(encoded_key);
//mbedtls_base64_encode((unsigned char*)encoded_key, sizeof(encoded_key), &encoded_key_len, (const unsigned char*)conn->m_Key, sizeof(conn->m_Key));
if (!dmCrypt::Base64Encode((const unsigned char*)conn->m_Key, sizeof(conn->m_Key), (unsigned char*)encoded_key, &encoded_key_len))
{
return SetStatus(conn, RESULT_HANDSHAKE_FAILED, "Failed to base64 encode key");
}
printf("DBG: CreateKey: '");
printHex((const uint8_t*)conn->m_Key, 16);
printf("'\n");
printf("DBG: encoded: '%s'\n", encoded_key);
char port[8] = "";
if (!(conn->m_Url.m_Port == 80 || conn->m_Url.m_Port == 443))
dmSnPrintf(port, sizeof(port), ":%d", conn->m_Url.m_Port);
dmSocket::Result sock_res = dmSocket::RESULT_OK;
WS_SENDALL("GET /");
WS_SENDALL(conn->m_Url.m_Path);
WS_SENDALL(" HTTP/1.1\r\n");
WS_SENDALL("Host: ");
WS_SENDALL(conn->m_Url.m_Hostname);
WS_SENDALL(port);
WS_SENDALL("\r\n");
WS_SENDALL("Upgrade: websocket\r\n");
WS_SENDALL("Connection: Upgrade\r\n");
WS_SENDALL("Sec-WebSocket-Key: ");
WS_SENDALL(encoded_key);
WS_SENDALL("\r\n");
WS_SENDALL("Sec-WebSocket-Version: 13\r\n");
// Add custom protocols
// Add custom headers
WS_SENDALL("\r\n");
bail:
if (sock_res != dmSocket::RESULT_OK)
{
return SetStatus(conn, RESULT_HANDSHAKE_FAILED, "SendClientHandshake failed: %s", dmSocket::ResultToString(sock_res));
}
return RESULT_OK;
}
#undef WS_SENDALL
void debugPrintBuffer(const char* s, size_t len)
{
for (int i = 0; i < len; ++i)
{
const char* p = s + i;
if (*p == '\r') {
printf("\\r");
}
else if (*p == '\n') {
printf("\\n\n");
}
else if (*p == '\t') {
printf("\t");
}
else {
printf("%c", *p);
}
}
}
// Currently blocking!
Result ReceiveHeaders(WebsocketConnection* conn)
{
while (1)
{
int max_to_recv = (int)(conn->m_BufferCapacity - 1) - conn->m_BufferSize; // allow for a terminating null character
if (max_to_recv <= 0)
{
return SetStatus(conn, RESULT_HANDSHAKE_FAILED, "Receive buffer full: %u bytes", conn->m_BufferCapacity);
}
int recv_bytes = 0;
dmSocket::Result r = Receive(conn, conn->m_Buffer + conn->m_BufferSize, max_to_recv, &recv_bytes);
if( r == dmSocket::RESULT_WOULDBLOCK )
{
r = dmSocket::RESULT_TRY_AGAIN;
}
if (r == dmSocket::RESULT_TRY_AGAIN)
continue;
if (r != dmSocket::RESULT_OK)
{
return SetStatus(conn, RESULT_HANDSHAKE_FAILED, "Receive error: %s", dmSocket::ResultToString(r));
}
debugPrintBuffer(conn->m_Buffer + conn->m_BufferSize, recv_bytes);
conn->m_BufferSize += recv_bytes;
// NOTE: We have an extra byte for null-termination so no buffer overrun here.
conn->m_Buffer[conn->m_BufferSize] = '\0';
// Check if the end of the response has arrived
if (conn->m_BufferSize >= 4 && strcmp(conn->m_Buffer + conn->m_BufferSize - 4, "\r\n\r\n") == 0)
{
return RESULT_OK;
}
if (r == 0)
{
return SetStatus(conn, RESULT_HANDSHAKE_FAILED, "Failed to parse headers:\n%s", conn->m_Buffer);
}
}
}
Result VerifyHeaders(WebsocketConnection* conn)
{
char* r = conn->m_Buffer;
printf("SERVER RESPONSE:\n%s\n", r);
const char* http_version_and_status_protocol = "HTTP/1.1 101"; // optionally "Web Socket Protocol Handshake"
if (strstr(r, http_version_and_status_protocol) != r) {
return SetStatus(conn, RESULT_HANDSHAKE_FAILED, "Missing: '%s' in header", http_version_and_status_protocol);
}
r = strstr(r, "\r\n") + 2;
bool upgraded = false;
bool valid_key = false;
const char* protocol = "";
// Sec-WebSocket-Protocol
// parse the headers in place
while (r)
{
// Tokenize the each header line: "Key: Value\r\n"
const char* key = r;
r = strchr(r, ':');
*r = 0;
++r;
const char* value = r;
while(*value == ' ')
++value;
r = strstr(r, "\r\n");
*r = 0;
r += 2;
printf("KEY: '%s', VALUE: '%s'\n", key, value);
if (strcmp(key, "Connection") == 0 && strcmp(value, "Upgrade") == 0)
upgraded = true;
else if (strcmp(key, "Sec-WebSocket-Accept") == 0)
{
uint8_t client_key[32 + 40];
uint32_t client_key_len = sizeof(client_key);
//mbedtls_base64_encode((unsigned char*)client_key, sizeof(client_key), &client_key_len, (const unsigned char*)conn->m_Key, sizeof(conn->m_Key));
dmCrypt::Base64Encode(conn->m_Key, sizeof(conn->m_Key), client_key, &client_key_len);
client_key[client_key_len] = 0;
memcpy(client_key + client_key_len, RFC_MAGIC, strlen(RFC_MAGIC));
client_key_len += strlen(RFC_MAGIC);
client_key[client_key_len] = 0;
uint8_t client_key_sha1[20];
dmCrypt::HashSha1(client_key, client_key_len, client_key_sha1);
//mbedtls_base64_encode((unsigned char*)client_key, sizeof(client_key), &client_key_len, client_key_sha1, sizeof(client_key_sha1));
client_key_len = sizeof(client_key);
dmCrypt::Base64Encode(client_key_sha1, sizeof(client_key_sha1), client_key, &client_key_len);
client_key[client_key_len] = 0;
if (strcmp(value, (const char*)client_key) == 0)
valid_key = true;
printf("DBG: CLIENT KEY+MAGIC: '%s'\n", client_key);
}
if (strcmp(r, "\r\n") == 0)
break;
}
return (upgraded && valid_key) ? RESULT_OK : RESULT_HANDSHAKE_FAILED;
}
} // namespace

24
websocket/src/pcg.cpp Normal file
View File

@ -0,0 +1,24 @@
#include "websocket.h"
// https://www.pcg-random.org/using-pcg-c-basic.html
namespace dmWebsocket
{
uint32_t pcg32_random_r(pcg32_random_t* rng)
{
uint64_t oldstate = rng->state;
rng->state = oldstate * 6364136223846793005ULL + rng->inc;
uint32_t xorshifted = ((oldstate >> 18u) ^ oldstate) >> 27u;
uint32_t rot = oldstate >> 59u;
return (xorshifted >> rot) | (xorshifted << ((-rot) & 31));
}
void pcg32_srandom_r(pcg32_random_t* rng, uint64_t initstate, uint64_t initseq)
{
rng->state = 0U;
rng->inc = (initseq << 1u) | 1u;
pcg32_random_r(rng);
rng->state += initstate;
pcg32_random_r(rng);
}
}

107
websocket/src/socket.cpp Normal file
View File

@ -0,0 +1,107 @@
#include "dmsdk/socket.h"
#include "websocket.h"
namespace dmWebsocket
{
extern void debugPrintBuffer(const char* s, size_t len);
dmSocket::Result Send(WebsocketConnection* conn, const char* buffer, int length, int* out_sent_bytes)
{
// if (response->m_SSLConnection != 0) {
// int r = 0;
// while( ( r = mbedtls_ssl_write(response->m_SSLConnection, (const uint8_t*) buffer, length) ) < 0 )
// {
// if (r == MBEDTLS_ERR_SSL_WANT_WRITE ||
// r == MBEDTLS_ERR_SSL_WANT_READ) {
// return dmSocket::RESULT_TRY_AGAIN;
// }
// if (r < 0) {
// return SSLToSocket(r);
// }
// }
// // In order to mimic the http code path, we return the same error number
// if( (r == length) && HasRequestTimedOut(response->m_Client) )
// {
// return dmSocket::RESULT_WOULDBLOCK;
// }
// if (r != length) {
// return SSLToSocket(r);
// }
// return dmSocket::RESULT_OK;
// } else {
int total_sent_bytes = 0;
int sent_bytes = 0;
while (total_sent_bytes < length) {
dmSocket::Result r = dmSocket::Send(conn->m_Socket, buffer + total_sent_bytes, length - total_sent_bytes, &sent_bytes);
debugPrintBuffer(buffer + total_sent_bytes, sent_bytes);
if( r == dmSocket::RESULT_WOULDBLOCK )
{
r = dmSocket::RESULT_TRY_AGAIN;
}
// if( (r == dmSocket::RESULT_OK || r == dmSocket::RESULT_TRY_AGAIN) && HasRequestTimedOut(response->m_Client) )
// {
// r = dmSocket::RESULT_WOULDBLOCK;
// }
if (r == dmSocket::RESULT_TRY_AGAIN)
continue;
if (r != dmSocket::RESULT_OK) {
return r;
}
total_sent_bytes += sent_bytes;
}
if (out_sent_bytes)
*out_sent_bytes = total_sent_bytes;
return dmSocket::RESULT_OK;
// }
}
dmSocket::Result Receive(WebsocketConnection* conn, void* buffer, int length, int* received_bytes)
{
// if (response->m_SSLConnection != 0) {
// int ret = 0;
// do
// {
// memset(buffer, 0, length);
// ret = mbedtls_ssl_read( response->m_SSLConnection, (unsigned char*)buffer, length-1 );
// if( ret == MBEDTLS_ERR_SSL_WANT_READ ||
// ret == MBEDTLS_ERR_SSL_WANT_WRITE ||
// ret == MBEDTLS_ERR_SSL_CRYPTO_IN_PROGRESS )
// {
// continue;
// }
// if (HasRequestTimedOut(response->m_Client)) {
// return dmSocket::RESULT_WOULDBLOCK;
// }
// if( ret <= 0 )
// {
// return SSLToSocket(ret);
// }
// ((uint8_t*)buffer)[ret] = 0;
// *received_bytes = ret;
// return dmSocket::RESULT_OK;
// }
// while( 1 );
// } else {
return dmSocket::Receive(conn->m_Socket, buffer, length, received_bytes);
//}
}
} // namespace

View File

@ -4,66 +4,49 @@
#define LIB_NAME "Websocket" #define LIB_NAME "Websocket"
#define MODULE_NAME "websocket" #define MODULE_NAME "websocket"
// include the Defold SDK #include "websocket.h"
#include <dmsdk/sdk.h>
#include <wslay/wslay.h>
#include "connection_pool.h"
#include "socket.h"
#include "dns.h"
#include "uri.h"
#include "script_util.h" #include "script_util.h"
// *****************************************************************************************************************************************************************
// DMSDK
extern "C" int mbedtls_base64_encode( unsigned char *dst, size_t dlen, size_t *olen, const unsigned char *src, size_t slen ); extern "C" int mbedtls_base64_encode( unsigned char *dst, size_t dlen, size_t *olen, const unsigned char *src, size_t slen );
extern "C" int mbedtls_base64_decode( unsigned char *dst, size_t dlen, size_t *olen, const unsigned char *src, size_t slen ); extern "C" int mbedtls_base64_decode( unsigned char *dst, size_t dlen, size_t *olen, const unsigned char *src, size_t slen );
namespace dmCrypt // TODO: MOVE TO DMSDK
bool dmCrypt::Base64Encode(const uint8_t* src, uint32_t src_len, uint8_t* dst, uint32_t* dst_len)
{ {
void HashSha1(const uint8_t* buf, uint32_t buflen, uint8_t* digest); size_t out_len = 0;
int r = mbedtls_base64_encode(dst, *dst_len, &out_len, src, src_len);
if (r != 0)
{
*dst_len = 0xFFFFFFFF;
return false;
}
*dst_len = (uint32_t)out_len;
return true;
} }
bool dmCrypt::Base64Decode(const uint8_t* src, uint32_t src_len, uint8_t* dst, uint32_t* dst_len)
{
size_t out_len = 0;
int r = mbedtls_base64_decode(dst, *dst_len, &out_len, src, src_len);
if (r != 0)
{
*dst_len = 0xFFFFFFFF;
return false;
}
*dst_len = (uint32_t)out_len;
return true;
}
// *****************************************************************************************************************************************************************
namespace dmWebsocket { namespace dmWebsocket {
enum State
{
STATE_CONNECTING,
STATE_HANDSHAKE,
STATE_CONNECTED,
STATE_DISCONNECTED,
};
enum Result
{
RESULT_OK,
RESULT_FAIL_WSLAY_INIT,
RESULT_NOT_CONNECTED,
RESULT_HANDSHAKE_FAILED,
};
enum Event
{
EVENT_CONNECTED,
EVENT_DISCONNECTED,
EVENT_MESSAGE,
};
struct WebsocketConnection
{
char m_Key[16];
wslay_event_context_ptr m_Ctx;
dmURI::Parts m_Url;
dmConnectionPool::HConnection m_Connection;
dmSocket::Socket m_Socket;
State m_State;
uint32_t m_SSL:1;
char* m_Response;
int m_ResponseSize;
uint32_t m_ResponseCapacity;
dmScript::LuaCallbackInfo* m_Callback;
Result m_Status;
};
struct WebsocketContext struct WebsocketContext
{ {
@ -76,491 +59,18 @@ struct WebsocketContext
} g_Websocket; } g_Websocket;
static void HandleCallback(WebsocketConnection* conn, int event, const uint8_t* msg, size_t msg_len); Result SetStatus(WebsocketConnection* conn, Result status, const char* format, ...)
#define WS_SENDALL(s) \
sock_res = Send(conn, s, strlen(s), 0);\
if (sock_res != dmSocket::RESULT_OK)\
{\
return sock_res;\
}\
static void debugPrintBuffer(const char* s, size_t len)
{ {
for (int i = 0; i < len; ++i) if (conn->m_Status == RESULT_OK)
{ {
const char* p = s + i; va_list lst;
if (*p == '\r') { va_start(lst, format);
printf("\\r");
conn->m_BufferSize = vsnprintf(conn->m_Buffer, conn->m_BufferCapacity, format, lst);
va_end(lst);
conn->m_Status = status;
} }
else if (*p == '\n') { return status;
printf("\\n\n");
}
else if (*p == '\t') {
printf("\t");
}
else {
printf("%c", *p);
}
}
}
static dmSocket::Result Send(WebsocketConnection* conn, const char* buffer, int length, int* out_sent_bytes)
{
// if (response->m_SSLConnection != 0) {
// int r = 0;
// while( ( r = mbedtls_ssl_write(response->m_SSLConnection, (const uint8_t*) buffer, length) ) < 0 )
// {
// if (r == MBEDTLS_ERR_SSL_WANT_WRITE ||
// r == MBEDTLS_ERR_SSL_WANT_READ) {
// return dmSocket::RESULT_TRY_AGAIN;
// }
// if (r < 0) {
// return SSLToSocket(r);
// }
// }
// // In order to mimic the http code path, we return the same error number
// if( (r == length) && HasRequestTimedOut(response->m_Client) )
// {
// return dmSocket::RESULT_WOULDBLOCK;
// }
// if (r != length) {
// return SSLToSocket(r);
// }
// return dmSocket::RESULT_OK;
// } else {
int total_sent_bytes = 0;
int sent_bytes = 0;
while (total_sent_bytes < length) {
dmSocket::Result r = dmSocket::Send(conn->m_Socket, buffer + total_sent_bytes, length - total_sent_bytes, &sent_bytes);
debugPrintBuffer(buffer + total_sent_bytes, sent_bytes);
if( r == dmSocket::RESULT_WOULDBLOCK )
{
r = dmSocket::RESULT_TRY_AGAIN;
}
// if( (r == dmSocket::RESULT_OK || r == dmSocket::RESULT_TRY_AGAIN) && HasRequestTimedOut(response->m_Client) )
// {
// r = dmSocket::RESULT_WOULDBLOCK;
// }
if (r == dmSocket::RESULT_TRY_AGAIN)
continue;
if (r != dmSocket::RESULT_OK) {
return r;
}
total_sent_bytes += sent_bytes;
}
if (out_sent_bytes)
*out_sent_bytes = total_sent_bytes;
return dmSocket::RESULT_OK;
// }
}
static dmSocket::Result Receive(WebsocketConnection* conn, void* buffer, int length, int* received_bytes)
{
// if (response->m_SSLConnection != 0) {
// int ret = 0;
// do
// {
// memset(buffer, 0, length);
// ret = mbedtls_ssl_read( response->m_SSLConnection, (unsigned char*)buffer, length-1 );
// if( ret == MBEDTLS_ERR_SSL_WANT_READ ||
// ret == MBEDTLS_ERR_SSL_WANT_WRITE ||
// ret == MBEDTLS_ERR_SSL_CRYPTO_IN_PROGRESS )
// {
// continue;
// }
// if (HasRequestTimedOut(response->m_Client)) {
// return dmSocket::RESULT_WOULDBLOCK;
// }
// if( ret <= 0 )
// {
// return SSLToSocket(ret);
// }
// ((uint8_t*)buffer)[ret] = 0;
// *received_bytes = ret;
// return dmSocket::RESULT_OK;
// }
// while( 1 );
// } else {
return dmSocket::Receive(conn->m_Socket, buffer, length, received_bytes);
//}
}
static void CreateKey(char key[16])
{
// TODO: Create proper key
for (int i = 0; i < 16; ++i)
{
key[i] = (char)i;
}
}
static void printHex(const uint8_t* data, size_t len)
{
for (int i = 0; i < 16; ++i)
{
printf("%x", data[i]);
}
}
static dmSocket::Result SendClientHandshake(WebsocketConnection* conn)
{
printf("SendClientHandshake\n");
CreateKey(conn->m_Key);
printf("DBG: CreateKey: '");
printHex((const uint8_t*)conn->m_Key, 16);
printf("'\n");
char encoded_key[32];
size_t encoded_key_len = 0;
mbedtls_base64_encode((unsigned char*)encoded_key, sizeof(encoded_key), &encoded_key_len, (const unsigned char*)conn->m_Key, sizeof(conn->m_Key));
printf("DBG: encoded: '%s'\n", encoded_key);
char port[8] = "";
if (!(conn->m_Url.m_Port == 80 || conn->m_Url.m_Port == 443))
dmSnPrintf(port, sizeof(port), ":%d", conn->m_Url.m_Port);
dmSocket::Result sock_res = dmSocket::RESULT_OK;
WS_SENDALL("GET /");
WS_SENDALL(conn->m_Url.m_Path);
WS_SENDALL(" HTTP/1.1\r\n");
WS_SENDALL("Host: ");
WS_SENDALL(conn->m_Url.m_Hostname);
WS_SENDALL(port);
WS_SENDALL("\r\n");
WS_SENDALL("Upgrade: websocket\r\n");
WS_SENDALL("Connection: Upgrade\r\n");
WS_SENDALL("Sec-WebSocket-Key: ");
WS_SENDALL(encoded_key);
WS_SENDALL("\r\n");
WS_SENDALL("Sec-WebSocket-Version: 13\r\n");
// Add custom protocols
// Add custom headers
WS_SENDALL("\r\n");
// String request = "GET " + p_path + " HTTP/1.1\r\n";
// request += "Host: " + p_host + port + "\r\n";
// request += "Upgrade: websocket\r\n";
// request += "Connection: Upgrade\r\n";
// request += "Sec-WebSocket-Key: " + _key + "\r\n";
// request += "Sec-WebSocket-Version: 13\r\n";
// if (p_protocols.size() > 0) {
// request += "Sec-WebSocket-Protocol: ";
// for (int i = 0; i < p_protocols.size(); i++) {
// if (i != 0) {
// request += ",";
// }
// request += p_protocols[i];
// }
// request += "\r\n";
// }
// for (int i = 0; i < p_custom_headers.size(); i++) {
// request += p_custom_headers[i] + "\r\n";
// }
// request += "\r\n";
//dmSocket::SetNoDelay(conn->m_Socket, true);
return sock_res;
}
static Result VerifyHeaders(WebsocketConnection* conn)
{
char* r = conn->m_Response;
printf("SERVER RESPONSE:\n%s\n", r);
const char* http_version_and_status_protocol = "HTTP/1.1 101"; // optionally "Web Socket Protocol Handshake"
if (strstr(r, http_version_and_status_protocol) != r) {
dmLogError("Missing: '%s'", http_version_and_status_protocol);
return RESULT_HANDSHAKE_FAILED;
}
r = strstr(r, "\r\n") + 2;
bool upgraded = false;
bool valid_key = false;
const char* protocol = "";
// Sec-WebSocket-Protocol
// parse he
while (r)
{
// Tokenize the each header line: "Key: Value\r\n"
const char* key = r;
r = strchr(r, ':');
*r = 0;
++r;
const char* value = r;
while(*value == ' ')
++value;
r = strstr(r, "\r\n");
*r = 0;
r += 2;
printf("KEY: '%s', VALUE: '%s'\n", key, value);
if (strcmp(key, "Connection") == 0 && strcmp(value, "Upgrade") == 0)
upgraded = true;
else if (strcmp(key, "Sec-WebSocket-Accept") == 0)
{
const char* magic = "258EAFA5-E914-47DA-95CA-C5AB0DC85B11"; // as per the rfc document on page 7 (https://tools.ietf.org/html/rfc6455)
uint8_t client_key[64];
size_t client_key_len = 0;
mbedtls_base64_encode((unsigned char*)client_key, sizeof(client_key), &client_key_len, (const unsigned char*)conn->m_Key, sizeof(conn->m_Key));
memcpy(client_key + client_key_len, magic, strlen(magic));
client_key_len += strlen(magic);
client_key[client_key_len] = 0;
uint8_t client_key_sha1[20];
dmCrypt::HashSha1(client_key, client_key_len, client_key_sha1);
mbedtls_base64_encode((unsigned char*)client_key, sizeof(client_key), &client_key_len, client_key_sha1, sizeof(client_key_sha1));
client_key[client_key_len] = 0;
if (strcmp(value, (const char*)client_key) == 0)
valid_key = true;
printf("DBG: CLIENT KEY+MAGIC: '%s'\n", client_key);
}
if (strcmp(r, "\r\n") == 0)
break;
}
return (upgraded && valid_key) ? RESULT_OK : RESULT_HANDSHAKE_FAILED;
}
static Result ReceiveHeaders(WebsocketConnection* conn)
{
while (1)
{
int max_to_recv = (int)(g_Websocket.m_BufferSize - 1) - conn->m_ResponseSize; // allow for a terminating null character
if (max_to_recv <= 0)
{
dmLogError("Receive buffer full");
return RESULT_HANDSHAKE_FAILED;
}
int recv_bytes = 0;
dmSocket::Result r = Receive(conn, conn->m_Response + conn->m_ResponseSize, max_to_recv, &recv_bytes);
if( r == dmSocket::RESULT_WOULDBLOCK )
{
r = dmSocket::RESULT_TRY_AGAIN;
}
if (r == dmSocket::RESULT_TRY_AGAIN)
continue;
if (r != dmSocket::RESULT_OK)
{
dmLogError("Receive error: %s", dmSocket::ResultToString(r));
return RESULT_HANDSHAKE_FAILED;
}
debugPrintBuffer(conn->m_Response + conn->m_ResponseSize, recv_bytes);
conn->m_ResponseSize += recv_bytes;
// NOTE: We have an extra byte for null-termination so no buffer overrun here.
conn->m_Response[conn->m_ResponseSize] = '\0';
// Check if the end of the response has arrived
if (conn->m_ResponseSize >= 4 && strcmp(conn->m_Response + conn->m_ResponseSize - 4, "\r\n\r\n") == 0)
{
return RESULT_OK;
}
if (r == 0)
{
dmLogError("Failed to parse headers:\n%s", conn->m_Response);
return RESULT_HANDSHAKE_FAILED;
}
}
}
static ssize_t WSL_RecvCallback(wslay_event_context_ptr ctx, uint8_t *buf, size_t len, int flags, void *user_data)
{
WebsocketConnection* conn = (WebsocketConnection*)user_data;
// struct Session *session = (struct Session*)user_data;
// ssize_t r;
// while((r = recv(session->fd, buf, len, 0)) == -1 && errno == EINTR);
// if(r == -1) {
// if(errno == EAGAIN || errno == EWOULDBLOCK) {
// wslay_event_set_error(ctx, WSLAY_ERR_WOULDBLOCK);
// } else {
// wslay_event_set_error(ctx, WSLAY_ERR_CALLBACK_FAILURE);
// }
// } else if(r == 0) {
// /* Unexpected EOF is also treated as an error */
// wslay_event_set_error(ctx, WSLAY_ERR_CALLBACK_FAILURE);
// r = -1;
// }
// return r;
int r = -1; // received bytes if >=0, error if < 0
dmSocket::Result socket_result = Receive(conn, buf, len, &r);
if (dmSocket::RESULT_OK == socket_result && r == 0)
socket_result = dmSocket::RESULT_WOULDBLOCK;
if (dmSocket::RESULT_OK != socket_result)
{
if (socket_result == dmSocket::RESULT_WOULDBLOCK || socket_result == dmSocket::RESULT_TRY_AGAIN) {
wslay_event_set_error(ctx, WSLAY_ERR_WOULDBLOCK);
}
else
wslay_event_set_error(ctx, WSLAY_ERR_CALLBACK_FAILURE);
return -1;
}
return r;
}
static ssize_t WSL_SendCallback(wslay_event_context_ptr ctx, const uint8_t *data, size_t len, int flags, void *user_data)
{
WebsocketConnection* conn = (WebsocketConnection*)user_data;
// struct Session *session = (struct Session*)user_data;
// ssize_t r;
// int sflags = 0;
// // #ifdef MSG_MORE
// // if(flags & WSLAY_MSG_MORE) {
// // sflags |= MSG_MORE;
// // }
// // #endif // MSG_MORE
// while((r = send(session->fd, data, len, sflags)) == -1 && errno == EINTR);
// if(r == -1) {
// if(errno == EAGAIN || errno == EWOULDBLOCK) {
// wslay_event_set_error(ctx, WSLAY_ERR_WOULDBLOCK);
// } else {
// wslay_event_set_error(ctx, WSLAY_ERR_CALLBACK_FAILURE);
// }
// }
// return r;
int sent_bytes = 0;
dmSocket::Result socket_result = Send(conn, (const char*)data, len, &sent_bytes);
// dmSocket::Result socket_result;
// int r = -1; // sent bytes if >=0, error if < 0
// do {
// socket_result = dmSocket::Send(conn->m_Socket, data, len, &r);
// }
// while (r == -1 && socket_result == dmSocket::RESULT_INTR);
if (socket_result != dmSocket::RESULT_OK)
{
if (socket_result == dmSocket::RESULT_WOULDBLOCK || socket_result == dmSocket::RESULT_TRY_AGAIN)
wslay_event_set_error(ctx, WSLAY_ERR_WOULDBLOCK);
else
wslay_event_set_error(ctx, WSLAY_ERR_CALLBACK_FAILURE);
return -1;
}
return (ssize_t)sent_bytes;
}
// Error WSLPeer::parse_message(const wslay_event_on_msg_recv_arg *arg) {
// uint8_t is_string = 0;
// if (arg->opcode == WSLAY_TEXT_FRAME) {
// is_string = 1;
// } else if (arg->opcode == WSLAY_CONNECTION_CLOSE) {
// close_code = arg->status_code;
// size_t len = arg->msg_length;
// close_reason = "";
// if (len > 2 /* first 2 bytes = close code */) {
// close_reason.parse_utf8((char *)arg->msg + 2, len - 2);
// }
// if (!wslay_event_get_close_sent(_data->ctx)) {
// if (_data->is_server) {
// WSLServer *helper = (WSLServer *)_data->obj;
// helper->_on_close_request(_data->id, close_code, close_reason);
// } else {
// WSLClient *helper = (WSLClient *)_data->obj;
// helper->_on_close_request(close_code, close_reason);
// }
// }
// return ERR_FILE_EOF;
// } else if (arg->opcode != WSLAY_BINARY_FRAME) {
// // Ping or pong
// return ERR_SKIP;
// }
// _in_buffer.write_packet(arg->msg, arg->msg_length, &is_string);
// return OK;
// }
static void WSL_OnMsgRecvCallback(wslay_event_context_ptr ctx, const struct wslay_event_on_msg_recv_arg *arg, void *user_data)
{
WebsocketConnection* conn = (WebsocketConnection*)user_data;
if (arg->opcode == WSLAY_TEXT_FRAME || arg->opcode == WSLAY_BINARY_FRAME)
{
HandleCallback(conn, EVENT_MESSAGE, arg->msg, arg->msg_length);
} else if (arg->opcode == WSLAY_CONNECTION_CLOSE)
{
// TODO: Store the reason
// close_code = arg->status_code;
// size_t len = arg->msg_length;
// close_reason = "";
// if (len > 2 /* first 2 bytes = close code */) {
// close_reason.parse_utf8((char *)arg->msg + 2, len - 2);
// }
// if (!wslay_event_get_close_sent(_data->ctx)) {
// if (_data->is_server) {
// WSLServer *helper = (WSLServer *)_data->obj;
// helper->_on_close_request(_data->id, close_code, close_reason);
// } else {
// WSLClient *helper = (WSLClient *)_data->obj;
// helper->_on_close_request(close_code, close_reason);
// }
// }
}
}
static int WSL_GenmaskCallback(wslay_event_context_ptr ctx, uint8_t *buf, size_t len, void *user_data) {
// RandomNumberGenerator rng;
// // TODO maybe use crypto in the future?
// rng.set_seed(OS::get_singleton()->get_unix_time());
// for (unsigned int i = 0; i < len; i++) {
// buf[i] = (uint8_t)rng.randi_range(0, 255);
// }
// return 0;
// TODO: Create a random mask
for (unsigned int i = 0; i < len; i++) {
buf[i] = (uint8_t)(i & 0xFF);
}
return 0;
} }
// *************************************************************************************************** // ***************************************************************************************************
@ -588,16 +98,26 @@ const struct wslay_event_callbacks g_WslCallbacks = {
}; };
static WebsocketConnection* WSL_CreateConnection() static WebsocketConnection* CreateConnection(const char* url)
{ {
WebsocketConnection* conn = (WebsocketConnection*)malloc(sizeof(WebsocketConnection)); WebsocketConnection* conn = (WebsocketConnection*)malloc(sizeof(WebsocketConnection));
memset(conn, 0, sizeof(WebsocketConnection)); memset(conn, 0, sizeof(WebsocketConnection));
conn->m_ResponseCapacity = g_Websocket.m_BufferSize; conn->m_BufferCapacity = g_Websocket.m_BufferSize;
conn->m_Response = (char*)malloc(conn->m_ResponseCapacity); conn->m_Buffer = (char*)malloc(conn->m_BufferCapacity);
dmURI::Parts uri;
dmURI::Parse(url, &conn->m_Url);
if (strcmp(conn->m_Url.m_Scheme, "https") == 0)
strcpy(conn->m_Url.m_Scheme, "wss");
conn->m_SSL = strcmp(conn->m_Url.m_Scheme, "wss") == 0 ? 1 : 0;
conn->m_State = STATE_CONNECTING;
return conn; return conn;
} }
static void WSL_DestroyConnection(WebsocketConnection* conn) static void DestroyConnection(WebsocketConnection* conn)
{ {
if (conn->m_State == STATE_CONNECTED) if (conn->m_State == STATE_CONNECTED)
wslay_event_context_free(conn->m_Ctx); wslay_event_context_free(conn->m_Ctx);
@ -608,11 +128,11 @@ static void WSL_DestroyConnection(WebsocketConnection* conn)
if (conn->m_Connection) if (conn->m_Connection)
dmConnectionPool::Close(g_Websocket.m_Pool, conn->m_Connection); dmConnectionPool::Close(g_Websocket.m_Pool, conn->m_Connection);
free((void*)conn->m_Response); free((void*)conn->m_Buffer);
free((void*)conn); free((void*)conn);
} }
static void WSL_CloseConnection(WebsocketConnection* conn) static void CloseConnection(WebsocketConnection* conn)
{ {
// we want it to send this message in the polling // we want it to send this message in the polling
if (conn->m_State == STATE_CONNECTED) { if (conn->m_State == STATE_CONNECTED) {
@ -623,65 +143,6 @@ static void WSL_CloseConnection(WebsocketConnection* conn)
conn->m_State = STATE_DISCONNECTED; conn->m_State = STATE_DISCONNECTED;
} }
static Result WSL_OpenConnection(WebsocketConnection* conn, const char* url)
{
dmURI::Parts uri;
dmURI::Parse(url, &conn->m_Url);
if (strcmp(conn->m_Url.m_Scheme, "https") == 0)
strcpy(conn->m_Url.m_Scheme, "wss");
conn->m_SSL = strcmp(conn->m_Url.m_Scheme, "wss") == 0 ? 1 : 0;
conn->m_State = STATE_CONNECTING;
// dmSocket::Result socket_result;
// dmConnectionPool::Result pool_result = dmConnectionPool::Dial(g_Websocket.m_Pool, conn->m_Url.m_Hostname, conn->m_Url.m_Port, g_Websocket.m_Channel, conn->m_SSL, g_Websocket.m_Timeout, &conn->m_Connection, &socket_result);
// if (dmConnectionPool::RESULT_OK != pool_result)
// {
// return RESULT_NOT_CONNECTED;
// }
// conn->m_Socket = dmConnectionPool::GetSocket(g_Websocket.m_Pool, conn->m_Connection);
// conn->m_State = STATE_HANDSHAKE;
// socket_result = SendClientHandshake(conn);
// if (dmSocket::RESULT_OK != socket_result)
// {
// return RESULT_HANDSHAKE_FAILED;
// }
// Result result = ReceiveHeaders(conn);
// if (RESULT_OK != result)
// {
// dmLogError("Failed receiving Handshake headers");
// return result;
// }
// result = VerifyHeaders(conn);
// if (RESULT_OK != result)
// {
// dmLogError("Failed verifying handshake headers:\n%s\n\n", conn->m_Response);
// return result;
// }
// // Handshake complete, time to
// // Currently only supports client implementation
// int ret = -1;
// ret = wslay_event_context_client_init(&conn->m_Ctx, &g_WslCallbacks, conn);
// if (ret == 0)
// wslay_event_config_set_max_recv_msg_length(conn->m_Ctx, g_Websocket.m_BufferSize);
// if (ret != 0)
// {
// return RESULT_FAIL_WSLAY_INIT;
// }
// conn->m_State = STATE_CONNECTED;
return RESULT_OK;
}
static int FindConnection(WebsocketConnection* conn) static int FindConnection(WebsocketConnection* conn)
{ {
for (int i = 0; i < g_Websocket.m_Connections.Size(); ++i ) for (int i = 0; i < g_Websocket.m_Connections.Size(); ++i )
@ -695,41 +156,22 @@ static int FindConnection(WebsocketConnection* conn)
/*# /*#
* *
*/ */
static int WSL_Lua_Connect(lua_State* L) static int LuaConnect(lua_State* L)
{ {
DM_LUA_STACK_CHECK(L, 2); DM_LUA_STACK_CHECK(L, 1);
if (!g_Websocket.m_Initialized) if (!g_Websocket.m_Initialized)
return DM_LUA_ERROR("The web socket module isn't initialized"); return DM_LUA_ERROR("The web socket module isn't initialized");
const char* url = luaL_checkstring(L, 1); const char* url = luaL_checkstring(L, 1);
WebsocketConnection* conn = WSL_CreateConnection();
Result result = WSL_OpenConnection(conn, url);
if (RESULT_OK != result)
{
WSL_CloseConnection(conn);
WSL_DestroyConnection(conn);
char msg[256];
switch (result)
{
case RESULT_FAIL_WSLAY_INIT: dmSnPrintf(msg, sizeof(msg), "Failed to initialize websocket context for %s", url); break;
case RESULT_NOT_CONNECTED: dmSnPrintf(msg, sizeof(msg), "Failed to connect to %s", url); break;
default: dmSnPrintf(msg, sizeof(msg), "Failed to create websocket for %s", url); break;
}
lua_pushnil(L);
lua_pushstring(L, msg);
return 2;
}
// long playedTime = luaL_checktable_number(L, 2, "playedTime", -1); // long playedTime = luaL_checktable_number(L, 2, "playedTime", -1);
// long progressValue = luaL_checktable_number(L, 2, "progressValue", -1); // long progressValue = luaL_checktable_number(L, 2, "progressValue", -1);
// char *description = luaL_checktable_string(L, 2, "description", NULL); // char *description = luaL_checktable_string(L, 2, "description", NULL);
// char *coverImage = luaL_checktable_string(L, 2, "coverImage", NULL); // char *coverImage = luaL_checktable_string(L, 2, "coverImage", NULL);
WebsocketConnection* conn = CreateConnection(url);
conn->m_Callback = dmScript::CreateCallback(L, 3); conn->m_Callback = dmScript::CreateCallback(L, 3);
if (g_Websocket.m_Connections.Full()) if (g_Websocket.m_Connections.Full())
@ -737,11 +179,10 @@ static int WSL_Lua_Connect(lua_State* L)
g_Websocket.m_Connections.Push(conn); g_Websocket.m_Connections.Push(conn);
lua_pushlightuserdata(L, conn); lua_pushlightuserdata(L, conn);
lua_pushnil(L); return 1;
return 2;
} }
static int WSL_Lua_Disconnect(lua_State* L) static int LuaDisconnect(lua_State* L)
{ {
DM_LUA_STACK_CHECK(L, 0); DM_LUA_STACK_CHECK(L, 0);
@ -756,12 +197,12 @@ static int WSL_Lua_Disconnect(lua_State* L)
int i = FindConnection(conn); int i = FindConnection(conn);
if (i != -1) if (i != -1)
{ {
WSL_CloseConnection(conn); CloseConnection(conn);
} }
return 0; return 0;
} }
static int WSL_Lua_Send(lua_State* L) static int LuaSend(lua_State* L)
{ {
DM_LUA_STACK_CHECK(L, 0); DM_LUA_STACK_CHECK(L, 0);
@ -821,8 +262,7 @@ static void HandleCallback(WebsocketConnection* conn, int event, const uint8_t*
if (conn->m_Status != RESULT_OK) if (conn->m_Status != RESULT_OK)
{ {
//lua_pushstring(L, conn->m_ErrorMessage); lua_pushstring(L, conn->m_Buffer);
lua_pushstring(L, "TODO: Some error");
lua_setfield(L, -2, "error"); lua_setfield(L, -2, "error");
} }
@ -862,9 +302,9 @@ static const char* WSL_ResultToString(int err)
// Functions exposed to Lua // Functions exposed to Lua
static const luaL_reg Websocket_module_methods[] = static const luaL_reg Websocket_module_methods[] =
{ {
{"connect", WSL_Lua_Connect}, {"connect", LuaConnect},
{"disconnect", WSL_Lua_Disconnect}, {"disconnect", LuaDisconnect},
{"send", WSL_Lua_Send}, {"send", LuaSend},
{0, 0} {0, 0}
}; };
@ -954,7 +394,7 @@ static dmExtension::Result WebsocketOnUpdate(dmExtension::Params* params)
#define CLOSE_CONN(MSG, ...) \ #define CLOSE_CONN(MSG, ...) \
dmLogError(MSG, __VA_ARGS__); \ dmLogError(MSG, __VA_ARGS__); \
WSL_CloseConnection(conn); CloseConnection(conn);
for (uint32_t i = 0; i < size; ++i) for (uint32_t i = 0; i < size; ++i)
{ {
@ -967,10 +407,11 @@ static dmExtension::Result WebsocketOnUpdate(dmExtension::Params* params)
g_Websocket.m_Connections.EraseSwap(i); g_Websocket.m_Connections.EraseSwap(i);
--i; --i;
--size; --size;
WSL_DestroyConnection(conn); DestroyConnection(conn);
} }
else if (STATE_CONNECTED == conn->m_State) else if (STATE_CONNECTED == conn->m_State)
{ {
// Do we need to loop here?
int err = 0; int err = 0;
if ((err = wslay_event_recv(conn->m_Ctx)) != 0 || (err = wslay_event_send(conn->m_Ctx)) != 0) { if ((err = wslay_event_recv(conn->m_Ctx)) != 0 || (err = wslay_event_send(conn->m_Ctx)) != 0) {
dmLogError("Websocket poll error: %s from %s", WSL_ResultToString(err), conn->m_Url.m_Hostname); dmLogError("Websocket poll error: %s from %s", WSL_ResultToString(err), conn->m_Url.m_Hostname);
@ -981,20 +422,26 @@ static dmExtension::Result WebsocketOnUpdate(dmExtension::Params* params)
conn->m_State = STATE_DISCONNECTED; conn->m_State = STATE_DISCONNECTED;
continue; continue;
} }
if (conn->m_HasMessage)
{
HandleCallback(conn, EVENT_MESSAGE, (uint8_t*)conn->m_Buffer, conn->m_BufferSize);
conn->m_HasMessage = 0;
}
} }
else if (STATE_HANDSHAKE == conn->m_State) else if (STATE_HANDSHAKE == conn->m_State)
{ {
// TODO: Split up this state into three? // TODO: Split up this state into three?
// e.g. STATE_HANDSHAKE_SEND, STATE_HANDSHAKE_RECEIVE, STATE_HANDSHAKE_VERIFY // e.g. STATE_HANDSHAKE_SEND, STATE_HANDSHAKE_RECEIVE, STATE_HANDSHAKE_VERIFY
dmSocket::Result socket_result = SendClientHandshake(conn); Result result = SendClientHandshake(conn);
if (dmSocket::RESULT_OK != socket_result) if (RESULT_OK != result)
{ {
CLOSE_CONN("Failed sending handshake: %s", dmSocket::ResultToString(socket_result)); CLOSE_CONN("Failed sending handshake: %d", result);
continue; continue;
} }
Result result = ReceiveHeaders(conn); result = ReceiveHeaders(conn);
if (RESULT_OK != result) if (RESULT_OK != result)
{ {
CLOSE_CONN("Failed receiving handshake headers. %d", result); CLOSE_CONN("Failed receiving handshake headers. %d", result);
@ -1004,7 +451,7 @@ static dmExtension::Result WebsocketOnUpdate(dmExtension::Params* params)
result = VerifyHeaders(conn); result = VerifyHeaders(conn);
if (RESULT_OK != result) if (RESULT_OK != result)
{ {
CLOSE_CONN("Failed verifying handshake headers:\n%s\n\n", conn->m_Response); CLOSE_CONN("Failed verifying handshake headers:\n%s\n\n", conn->m_Buffer);
continue; continue;
} }
@ -1016,6 +463,7 @@ static dmExtension::Result WebsocketOnUpdate(dmExtension::Params* params)
if (ret != 0) if (ret != 0)
{ {
CLOSE_CONN("Failed initializing wslay: %s", WSL_ResultToString(ret)); CLOSE_CONN("Failed initializing wslay: %s", WSL_ResultToString(ret));
SetStatus(conn, RESULT_HANDSHAKE_FAILED, "Failed initializing wslay: %s", WSL_ResultToString(ret));
continue; continue;
} }
@ -1025,8 +473,8 @@ static dmExtension::Result WebsocketOnUpdate(dmExtension::Params* params)
dmSocket::SetReceiveTimeout(conn->m_Socket, 500); dmSocket::SetReceiveTimeout(conn->m_Socket, 500);
} }
conn->m_Response[0] = 0; conn->m_Buffer[0] = 0;
conn->m_ResponseSize = 0; conn->m_BufferSize = 0;
conn->m_State = STATE_CONNECTED; conn->m_State = STATE_CONNECTED;
HandleCallback(conn, EVENT_CONNECTED, 0, 0); HandleCallback(conn, EVENT_CONNECTED, 0, 0);

99
websocket/src/websocket.h Normal file
View File

@ -0,0 +1,99 @@
#pragma once
// include the Defold SDK
#include <dmsdk/sdk.h>
#include <wslay/wslay.h>
#include "dmsdk/connection_pool.h"
#include "dmsdk/socket.h"
#include "dmsdk/dns.h"
#include "dmsdk/uri.h"
namespace dmCrypt
{
void HashSha1(const uint8_t* buf, uint32_t buflen, uint8_t* digest);
bool Base64Encode(const uint8_t* src, uint32_t src_len, uint8_t* dst, uint32_t* dst_len);
bool Base64Decode(const uint8_t* src, uint32_t src_len, uint8_t* dst, uint32_t* dst_len);
}
namespace dmWebsocket
{
enum State
{
STATE_CONNECTING,
STATE_HANDSHAKE,
STATE_CONNECTED,
STATE_DISCONNECTED,
};
enum Result
{
RESULT_OK,
RESULT_FAIL_WSLAY_INIT,
RESULT_NOT_CONNECTED,
RESULT_HANDSHAKE_FAILED,
};
enum Event
{
EVENT_CONNECTED,
EVENT_DISCONNECTED,
EVENT_MESSAGE,
};
struct WebsocketConnection
{
dmScript::LuaCallbackInfo* m_Callback;
wslay_event_context_ptr m_Ctx;
dmURI::Parts m_Url;
dmConnectionPool::HConnection m_Connection;
dmSocket::Socket m_Socket;
uint8_t m_Key[16];
State m_State;
uint32_t m_SSL:1;
uint32_t m_HasMessage:1;
char* m_Buffer;
int m_BufferSize;
uint32_t m_BufferCapacity;
Result m_Status;
};
// Set error message
#ifdef __GNUC__
Result SetStatus(WebsocketConnection* conn, Result status, const char* fmt, ...) __attribute__ ((format (printf, 3, 4)));
#else
Result SetStatus(WebsocketCOnnection* conn, Result status, const char* fmt, ...);
#endif
// Communication
dmSocket::Result Send(WebsocketConnection* conn, const char* buffer, int length, int* out_sent_bytes);
dmSocket::Result Receive(WebsocketConnection* conn, void* buffer, int length, int* received_bytes);
// Handshake
Result SendClientHandshake(WebsocketConnection* conn);
Result ReceiveHeaders(WebsocketConnection* conn);
Result VerifyHeaders(WebsocketConnection* conn);
// Wslay callbacks
ssize_t WSL_RecvCallback(wslay_event_context_ptr ctx, uint8_t *buf, size_t len, int flags, void *user_data);
ssize_t WSL_SendCallback(wslay_event_context_ptr ctx, const uint8_t *data, size_t len, int flags, void *user_data);
void WSL_OnMsgRecvCallback(wslay_event_context_ptr ctx, const struct wslay_event_on_msg_recv_arg *arg, void *user_data);
int WSL_GenmaskCallback(wslay_event_context_ptr ctx, uint8_t *buf, size_t len, void *user_data);
// Random numbers (PCG)
typedef struct { uint64_t state; uint64_t inc; } pcg32_random_t;
void pcg32_srandom_r(pcg32_random_t* rng, uint64_t initstate, uint64_t initseq);
uint32_t pcg32_random_r(pcg32_random_t* rng);
}

View File

@ -0,0 +1,137 @@
#include "websocket.h"
namespace dmWebsocket
{
ssize_t WSL_RecvCallback(wslay_event_context_ptr ctx, uint8_t *buf, size_t len, int flags, void *user_data)
{
WebsocketConnection* conn = (WebsocketConnection*)user_data;
// struct Session *session = (struct Session*)user_data;
// ssize_t r;
// while((r = recv(session->fd, buf, len, 0)) == -1 && errno == EINTR);
// if(r == -1) {
// if(errno == EAGAIN || errno == EWOULDBLOCK) {
// wslay_event_set_error(ctx, WSLAY_ERR_WOULDBLOCK);
// } else {
// wslay_event_set_error(ctx, WSLAY_ERR_CALLBACK_FAILURE);
// }
// } else if(r == 0) {
// /* Unexpected EOF is also treated as an error */
// wslay_event_set_error(ctx, WSLAY_ERR_CALLBACK_FAILURE);
// r = -1;
// }
// return r;
int r = -1; // received bytes if >=0, error if < 0
dmSocket::Result socket_result = Receive(conn, buf, len, &r);
if (dmSocket::RESULT_OK == socket_result && r == 0)
socket_result = dmSocket::RESULT_WOULDBLOCK;
if (dmSocket::RESULT_OK != socket_result)
{
if (socket_result == dmSocket::RESULT_WOULDBLOCK || socket_result == dmSocket::RESULT_TRY_AGAIN) {
wslay_event_set_error(ctx, WSLAY_ERR_WOULDBLOCK);
}
else
wslay_event_set_error(ctx, WSLAY_ERR_CALLBACK_FAILURE);
return -1;
}
return r;
}
ssize_t WSL_SendCallback(wslay_event_context_ptr ctx, const uint8_t *data, size_t len, int flags, void *user_data)
{
WebsocketConnection* conn = (WebsocketConnection*)user_data;
// struct Session *session = (struct Session*)user_data;
// ssize_t r;
// int sflags = 0;
// // #ifdef MSG_MORE
// // if(flags & WSLAY_MSG_MORE) {
// // sflags |= MSG_MORE;
// // }
// // #endif // MSG_MORE
// while((r = send(session->fd, data, len, sflags)) == -1 && errno == EINTR);
// if(r == -1) {
// if(errno == EAGAIN || errno == EWOULDBLOCK) {
// wslay_event_set_error(ctx, WSLAY_ERR_WOULDBLOCK);
// } else {
// wslay_event_set_error(ctx, WSLAY_ERR_CALLBACK_FAILURE);
// }
// }
// return r;
int sent_bytes = 0;
dmSocket::Result socket_result = Send(conn, (const char*)data, len, &sent_bytes);
// dmSocket::Result socket_result;
// int r = -1; // sent bytes if >=0, error if < 0
// do {
// socket_result = dmSocket::Send(conn->m_Socket, data, len, &r);
// }
// while (r == -1 && socket_result == dmSocket::RESULT_INTR);
if (socket_result != dmSocket::RESULT_OK)
{
if (socket_result == dmSocket::RESULT_WOULDBLOCK || socket_result == dmSocket::RESULT_TRY_AGAIN)
wslay_event_set_error(ctx, WSLAY_ERR_WOULDBLOCK);
else
wslay_event_set_error(ctx, WSLAY_ERR_CALLBACK_FAILURE);
return -1;
}
return (ssize_t)sent_bytes;
}
void WSL_OnMsgRecvCallback(wslay_event_context_ptr ctx, const struct wslay_event_on_msg_recv_arg *arg, void *user_data)
{
WebsocketConnection* conn = (WebsocketConnection*)user_data;
if (arg->opcode == WSLAY_TEXT_FRAME || arg->opcode == WSLAY_BINARY_FRAME)
{
if (arg->msg_length >= conn->m_BufferCapacity)
conn->m_Buffer = (char*)realloc(conn->m_Buffer, arg->msg_length + 1);
memcpy(conn->m_Buffer, arg->msg, arg->msg_length);
conn->m_BufferSize = arg->msg_length;
conn->m_HasMessage = 1;
} else if (arg->opcode == WSLAY_CONNECTION_CLOSE)
{
// TODO: Store the reason
// close_code = arg->status_code;
// size_t len = arg->msg_length;
// close_reason = "";
// if (len > 2 /* first 2 bytes = close code */) {
// close_reason.parse_utf8((char *)arg->msg + 2, len - 2);
// }
// if (!wslay_event_get_close_sent(_data->ctx)) {
// if (_data->is_server) {
// WSLServer *helper = (WSLServer *)_data->obj;
// helper->_on_close_request(_data->id, close_code, close_reason);
// } else {
// WSLClient *helper = (WSLClient *)_data->obj;
// helper->_on_close_request(close_code, close_reason);
// }
// }
//SetStatus(conn, RESULT_NOT_CONNECTED, "Websocket received close event for %s", conn->m_Url.m_Hostname);
}
}
// ************************************************************************************************
int WSL_GenmaskCallback(wslay_event_context_ptr ctx, uint8_t *buf, size_t len, void *user_data) {
pcg32_random_t rnd;
pcg32_srandom_r(&rnd, dmTime::GetTime(), 31452);
for (unsigned int i = 0; i < len; i++) {
buf[i] = (uint8_t)(pcg32_random_r(&rnd) & 0xFF);
}
return 0;
}
} // namespace