wsl_client.cpp 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356
  1. /*************************************************************************/
  2. /* wsl_client.cpp */
  3. /*************************************************************************/
  4. /* This file is part of: */
  5. /* GODOT ENGINE */
  6. /* https://godotengine.org */
  7. /*************************************************************************/
  8. /* Copyright (c) 2007-2020 Juan Linietsky, Ariel Manzur. */
  9. /* Copyright (c) 2014-2020 Godot Engine contributors (cf. AUTHORS.md). */
  10. /* */
  11. /* Permission is hereby granted, free of charge, to any person obtaining */
  12. /* a copy of this software and associated documentation files (the */
  13. /* "Software"), to deal in the Software without restriction, including */
  14. /* without limitation the rights to use, copy, modify, merge, publish, */
  15. /* distribute, sublicense, and/or sell copies of the Software, and to */
  16. /* permit persons to whom the Software is furnished to do so, subject to */
  17. /* the following conditions: */
  18. /* */
  19. /* The above copyright notice and this permission notice shall be */
  20. /* included in all copies or substantial portions of the Software. */
  21. /* */
  22. /* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, */
  23. /* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF */
  24. /* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.*/
  25. /* IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY */
  26. /* CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, */
  27. /* TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE */
  28. /* SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. */
  29. /*************************************************************************/
  30. #ifndef JAVASCRIPT_ENABLED
  31. #include "wsl_client.h"
  32. #include "core/io/ip.h"
  33. #include "core/project_settings.h"
  34. void WSLClient::_do_handshake() {
  35. if (_requested < _request.size() - 1) {
  36. int sent = 0;
  37. Error err = _connection->put_partial_data(((const uint8_t *)_request.get_data() + _requested), _request.size() - _requested - 1, sent);
  38. // Sending handshake failed
  39. if (err != OK) {
  40. disconnect_from_host();
  41. _on_error();
  42. return;
  43. }
  44. _requested += sent;
  45. } else {
  46. int read = 0;
  47. while (true) {
  48. if (_resp_pos >= WSL_MAX_HEADER_SIZE) {
  49. // Header is too big
  50. disconnect_from_host();
  51. _on_error();
  52. ERR_FAIL_MSG("Response headers too big.");
  53. }
  54. Error err = _connection->get_partial_data(&_resp_buf[_resp_pos], 1, read);
  55. if (err == ERR_FILE_EOF) {
  56. // We got a disconnect.
  57. disconnect_from_host();
  58. _on_error();
  59. return;
  60. } else if (err != OK) {
  61. // Got some error.
  62. disconnect_from_host();
  63. _on_error();
  64. return;
  65. } else if (read != 1) {
  66. // Busy, wait next poll.
  67. break;
  68. }
  69. // Check "\r\n\r\n" header terminator
  70. char *r = (char *)_resp_buf;
  71. int l = _resp_pos;
  72. if (l > 3 && r[l] == '\n' && r[l - 1] == '\r' && r[l - 2] == '\n' && r[l - 3] == '\r') {
  73. r[l - 3] = '\0';
  74. String protocol;
  75. // Response is over, verify headers and create peer.
  76. if (!_verify_headers(protocol)) {
  77. disconnect_from_host();
  78. _on_error();
  79. ERR_FAIL_MSG("Invalid response headers.");
  80. }
  81. // Create peer.
  82. WSLPeer::PeerData *data = memnew(struct WSLPeer::PeerData);
  83. data->obj = this;
  84. data->conn = _connection;
  85. data->tcp = _tcp;
  86. data->is_server = false;
  87. data->id = 1;
  88. _peer->make_context(data, _in_buf_size, _in_pkt_size, _out_buf_size, _out_pkt_size);
  89. _peer->set_no_delay(true);
  90. _on_connect(protocol);
  91. break;
  92. }
  93. _resp_pos += 1;
  94. }
  95. }
  96. }
  97. bool WSLClient::_verify_headers(String &r_protocol) {
  98. String s = (char *)_resp_buf;
  99. Vector<String> psa = s.split("\r\n");
  100. int len = psa.size();
  101. ERR_FAIL_COND_V_MSG(len < 4, false, "Not enough response headers, got: " + itos(len) + ", expected >= 4.");
  102. Vector<String> req = psa[0].split(" ", false);
  103. ERR_FAIL_COND_V_MSG(req.size() < 2, false, "Invalid protocol or status code.");
  104. // Wrong protocol
  105. ERR_FAIL_COND_V_MSG(req[0] != "HTTP/1.1" || req[1] != "101", false, "Invalid protocol or status code.");
  106. Map<String, String> headers;
  107. for (int i = 1; i < len; i++) {
  108. Vector<String> header = psa[i].split(":", false, 1);
  109. ERR_FAIL_COND_V_MSG(header.size() != 2, false, "Invalid header -> " + psa[i] + ".");
  110. String name = header[0].to_lower();
  111. String value = header[1].strip_edges();
  112. if (headers.has(name))
  113. headers[name] += "," + value;
  114. else
  115. headers[name] = value;
  116. }
  117. #define _WSL_CHECK(NAME, VALUE) \
  118. ERR_FAIL_COND_V_MSG(!headers.has(NAME) || headers[NAME].to_lower() != VALUE, false, \
  119. "Missing or invalid header '" + String(NAME) + "'. Expected value '" + VALUE + "'.");
  120. #define _WSL_CHECK_NC(NAME, VALUE) \
  121. ERR_FAIL_COND_V_MSG(!headers.has(NAME) || headers[NAME] != VALUE, false, \
  122. "Missing or invalid header '" + String(NAME) + "'. Expected value '" + VALUE + "'.");
  123. _WSL_CHECK("connection", "upgrade");
  124. _WSL_CHECK("upgrade", "websocket");
  125. _WSL_CHECK_NC("sec-websocket-accept", WSLPeer::compute_key_response(_key));
  126. #undef _WSL_CHECK_NC
  127. #undef _WSL_CHECK
  128. if (_protocols.size() == 0) {
  129. // We didn't request a custom protocol
  130. ERR_FAIL_COND_V(headers.has("sec-websocket-protocol"), false);
  131. } else {
  132. ERR_FAIL_COND_V(!headers.has("sec-websocket-protocol"), false);
  133. r_protocol = headers["sec-websocket-protocol"];
  134. bool valid = false;
  135. for (int i = 0; i < _protocols.size(); i++) {
  136. if (_protocols[i] != r_protocol)
  137. continue;
  138. valid = true;
  139. break;
  140. }
  141. if (!valid)
  142. return false;
  143. }
  144. return true;
  145. }
  146. Error WSLClient::connect_to_host(String p_host, String p_path, uint16_t p_port, bool p_ssl, const Vector<String> p_protocols, const Vector<String> p_custom_headers) {
  147. ERR_FAIL_COND_V(_connection.is_valid(), ERR_ALREADY_IN_USE);
  148. _peer = Ref<WSLPeer>(memnew(WSLPeer));
  149. IP_Address addr;
  150. if (!p_host.is_valid_ip_address()) {
  151. addr = IP::get_singleton()->resolve_hostname(p_host);
  152. } else {
  153. addr = p_host;
  154. }
  155. ERR_FAIL_COND_V(!addr.is_valid(), ERR_INVALID_PARAMETER);
  156. String port = "";
  157. if ((p_port != 80 && !p_ssl) || (p_port != 443 && p_ssl)) {
  158. port = ":" + itos(p_port);
  159. }
  160. Error err = _tcp->connect_to_host(addr, p_port);
  161. if (err != OK) {
  162. _tcp->disconnect_from_host();
  163. _on_error();
  164. return err;
  165. }
  166. _connection = _tcp;
  167. _use_ssl = p_ssl;
  168. _host = p_host;
  169. // Strip edges from protocols.
  170. _protocols.resize(p_protocols.size());
  171. String *pw = _protocols.ptrw();
  172. for (int i = 0; i < p_protocols.size(); i++) {
  173. pw[i] = p_protocols[i].strip_edges();
  174. }
  175. _key = WSLPeer::generate_key();
  176. // TODO custom extra headers (allow overriding this too?)
  177. String request = "GET " + p_path + " HTTP/1.1\r\n";
  178. request += "Host: " + p_host + port + "\r\n";
  179. request += "Upgrade: websocket\r\n";
  180. request += "Connection: Upgrade\r\n";
  181. request += "Sec-WebSocket-Key: " + _key + "\r\n";
  182. request += "Sec-WebSocket-Version: 13\r\n";
  183. if (p_protocols.size() > 0) {
  184. request += "Sec-WebSocket-Protocol: ";
  185. for (int i = 0; i < p_protocols.size(); i++) {
  186. if (i != 0)
  187. request += ",";
  188. request += p_protocols[i];
  189. }
  190. request += "\r\n";
  191. }
  192. for (int i = 0; i < p_custom_headers.size(); i++) {
  193. request += p_custom_headers[i] + "\r\n";
  194. }
  195. request += "\r\n";
  196. _request = request.utf8();
  197. return OK;
  198. }
  199. int WSLClient::get_max_packet_size() const {
  200. return (1 << _out_buf_size) - PROTO_SIZE;
  201. }
  202. void WSLClient::poll() {
  203. if (_peer->is_connected_to_host()) {
  204. _peer->poll();
  205. if (!_peer->is_connected_to_host()) {
  206. disconnect_from_host();
  207. _on_disconnect(_peer->close_code != -1);
  208. }
  209. return;
  210. }
  211. if (_connection.is_null())
  212. return; // Not connected.
  213. switch (_tcp->get_status()) {
  214. case StreamPeerTCP::STATUS_NONE:
  215. // Clean close
  216. disconnect_from_host();
  217. _on_error();
  218. break;
  219. case StreamPeerTCP::STATUS_CONNECTED: {
  220. Ref<StreamPeerSSL> ssl;
  221. if (_use_ssl) {
  222. if (_connection == _tcp) {
  223. // Start SSL handshake
  224. ssl = Ref<StreamPeerSSL>(StreamPeerSSL::create());
  225. ERR_FAIL_COND_MSG(ssl.is_null(), "SSL is not available in this build.");
  226. ssl->set_blocking_handshake_enabled(false);
  227. if (ssl->connect_to_stream(_tcp, verify_ssl, _host, ssl_cert) != OK) {
  228. disconnect_from_host();
  229. _on_error();
  230. return;
  231. }
  232. _connection = ssl;
  233. } else {
  234. ssl = static_cast<Ref<StreamPeerSSL> >(_connection);
  235. ERR_FAIL_COND(ssl.is_null()); // Bug?
  236. ssl->poll();
  237. }
  238. if (ssl->get_status() == StreamPeerSSL::STATUS_HANDSHAKING)
  239. return; // Need more polling.
  240. else if (ssl->get_status() != StreamPeerSSL::STATUS_CONNECTED) {
  241. disconnect_from_host();
  242. _on_error();
  243. return; // Error.
  244. }
  245. }
  246. // Do websocket handshake.
  247. _do_handshake();
  248. } break;
  249. case StreamPeerTCP::STATUS_ERROR:
  250. disconnect_from_host();
  251. _on_error();
  252. break;
  253. case StreamPeerTCP::STATUS_CONNECTING:
  254. break; // Wait for connection
  255. }
  256. }
  257. Ref<WebSocketPeer> WSLClient::get_peer(int p_peer_id) const {
  258. ERR_FAIL_COND_V(p_peer_id != 1, NULL);
  259. return _peer;
  260. }
  261. NetworkedMultiplayerPeer::ConnectionStatus WSLClient::get_connection_status() const {
  262. if (_peer->is_connected_to_host())
  263. return CONNECTION_CONNECTED;
  264. if (_tcp->is_connected_to_host())
  265. return CONNECTION_CONNECTING;
  266. return CONNECTION_DISCONNECTED;
  267. }
  268. void WSLClient::disconnect_from_host(int p_code, String p_reason) {
  269. _peer->close(p_code, p_reason);
  270. _connection = Ref<StreamPeer>(NULL);
  271. _tcp = Ref<StreamPeerTCP>(memnew(StreamPeerTCP));
  272. _key = "";
  273. _host = "";
  274. _protocols.clear();
  275. _use_ssl = false;
  276. _request = "";
  277. _requested = 0;
  278. memset(_resp_buf, 0, sizeof(_resp_buf));
  279. _resp_pos = 0;
  280. }
  281. IP_Address WSLClient::get_connected_host() const {
  282. ERR_FAIL_COND_V(!_peer->is_connected_to_host(), IP_Address());
  283. return _peer->get_connected_host();
  284. }
  285. uint16_t WSLClient::get_connected_port() const {
  286. ERR_FAIL_COND_V(!_peer->is_connected_to_host(), 0);
  287. return _peer->get_connected_port();
  288. }
  289. Error WSLClient::set_buffers(int p_in_buffer, int p_in_packets, int p_out_buffer, int p_out_packets) {
  290. ERR_FAIL_COND_V_MSG(_connection.is_valid(), FAILED, "Buffers sizes can only be set before listening or connecting.");
  291. _in_buf_size = nearest_shift(p_in_buffer - 1) + 10;
  292. _in_pkt_size = nearest_shift(p_in_packets - 1);
  293. _out_buf_size = nearest_shift(p_out_buffer - 1) + 10;
  294. _out_pkt_size = nearest_shift(p_out_packets - 1);
  295. return OK;
  296. }
  297. WSLClient::WSLClient() {
  298. _in_buf_size = nearest_shift((int)GLOBAL_GET(WSC_IN_BUF) - 1) + 10;
  299. _in_pkt_size = nearest_shift((int)GLOBAL_GET(WSC_IN_PKT) - 1);
  300. _out_buf_size = nearest_shift((int)GLOBAL_GET(WSC_OUT_BUF) - 1) + 10;
  301. _out_pkt_size = nearest_shift((int)GLOBAL_GET(WSC_OUT_PKT) - 1);
  302. _peer.instance();
  303. _tcp.instance();
  304. disconnect_from_host();
  305. }
  306. WSLClient::~WSLClient() {
  307. _peer->close_now();
  308. _peer->invalidate();
  309. disconnect_from_host();
  310. }
  311. #endif // JAVASCRIPT_ENABLED