wsl_client.cpp 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351
  1. /*************************************************************************/
  2. /* wsl_client.cpp */
  3. /*************************************************************************/
  4. /* This file is part of: */
  5. /* GODOT ENGINE */
  6. /* https://godotengine.org */
  7. /*************************************************************************/
  8. /* Copyright (c) 2007-2021 Juan Linietsky, Ariel Manzur. */
  9. /* Copyright (c) 2014-2021 Godot Engine contributors (cf. AUTHORS.md). */
  10. /* */
  11. /* Permission is hereby granted, free of charge, to any person obtaining */
  12. /* a copy of this software and associated documentation files (the */
  13. /* "Software"), to deal in the Software without restriction, including */
  14. /* without limitation the rights to use, copy, modify, merge, publish, */
  15. /* distribute, sublicense, and/or sell copies of the Software, and to */
  16. /* permit persons to whom the Software is furnished to do so, subject to */
  17. /* the following conditions: */
  18. /* */
  19. /* The above copyright notice and this permission notice shall be */
  20. /* included in all copies or substantial portions of the Software. */
  21. /* */
  22. /* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, */
  23. /* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF */
  24. /* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.*/
  25. /* IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY */
  26. /* CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, */
  27. /* TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE */
  28. /* SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. */
  29. /*************************************************************************/
  30. #ifndef JAVASCRIPT_ENABLED
  31. #include "wsl_client.h"
  32. #include "core/config/project_settings.h"
  33. #include "core/io/ip.h"
  34. void WSLClient::_do_handshake() {
  35. if (_requested < _request.size() - 1) {
  36. int sent = 0;
  37. Error err = _connection->put_partial_data(((const uint8_t *)_request.get_data() + _requested), _request.size() - _requested - 1, sent);
  38. // Sending handshake failed
  39. if (err != OK) {
  40. disconnect_from_host();
  41. _on_error();
  42. return;
  43. }
  44. _requested += sent;
  45. } else {
  46. int read = 0;
  47. while (true) {
  48. if (_resp_pos >= WSL_MAX_HEADER_SIZE) {
  49. // Header is too big
  50. disconnect_from_host();
  51. _on_error();
  52. ERR_FAIL_MSG("Response headers too big.");
  53. }
  54. Error err = _connection->get_partial_data(&_resp_buf[_resp_pos], 1, read);
  55. if (err == ERR_FILE_EOF) {
  56. // We got a disconnect.
  57. disconnect_from_host();
  58. _on_error();
  59. return;
  60. } else if (err != OK) {
  61. // Got some error.
  62. disconnect_from_host();
  63. _on_error();
  64. return;
  65. } else if (read != 1) {
  66. // Busy, wait next poll.
  67. break;
  68. }
  69. // Check "\r\n\r\n" header terminator
  70. char *r = (char *)_resp_buf;
  71. int l = _resp_pos;
  72. if (l > 3 && r[l] == '\n' && r[l - 1] == '\r' && r[l - 2] == '\n' && r[l - 3] == '\r') {
  73. r[l - 3] = '\0';
  74. String protocol;
  75. // Response is over, verify headers and create peer.
  76. if (!_verify_headers(protocol)) {
  77. disconnect_from_host();
  78. _on_error();
  79. ERR_FAIL_MSG("Invalid response headers.");
  80. }
  81. // Create peer.
  82. WSLPeer::PeerData *data = memnew(struct WSLPeer::PeerData);
  83. data->obj = this;
  84. data->conn = _connection;
  85. data->tcp = _tcp;
  86. data->is_server = false;
  87. data->id = 1;
  88. _peer->make_context(data, _in_buf_size, _in_pkt_size, _out_buf_size, _out_pkt_size);
  89. _peer->set_no_delay(true);
  90. _on_connect(protocol);
  91. break;
  92. }
  93. _resp_pos += 1;
  94. }
  95. }
  96. }
  97. bool WSLClient::_verify_headers(String &r_protocol) {
  98. String s = (char *)_resp_buf;
  99. Vector<String> psa = s.split("\r\n");
  100. int len = psa.size();
  101. ERR_FAIL_COND_V_MSG(len < 4, false, "Not enough response headers, got: " + itos(len) + ", expected >= 4.");
  102. Vector<String> req = psa[0].split(" ", false);
  103. ERR_FAIL_COND_V_MSG(req.size() < 2, false, "Invalid protocol or status code.");
  104. // Wrong protocol
  105. ERR_FAIL_COND_V_MSG(req[0] != "HTTP/1.1" || req[1] != "101", false, "Invalid protocol or status code.");
  106. Map<String, String> headers;
  107. for (int i = 1; i < len; i++) {
  108. Vector<String> header = psa[i].split(":", false, 1);
  109. ERR_FAIL_COND_V_MSG(header.size() != 2, false, "Invalid header -> " + psa[i] + ".");
  110. String name = header[0].to_lower();
  111. String value = header[1].strip_edges();
  112. if (headers.has(name)) {
  113. headers[name] += "," + value;
  114. } else {
  115. headers[name] = value;
  116. }
  117. }
  118. #define _WSL_CHECK(NAME, VALUE) \
  119. ERR_FAIL_COND_V_MSG(!headers.has(NAME) || headers[NAME].to_lower() != VALUE, false, \
  120. "Missing or invalid header '" + String(NAME) + "'. Expected value '" + VALUE + "'.");
  121. #define _WSL_CHECK_NC(NAME, VALUE) \
  122. ERR_FAIL_COND_V_MSG(!headers.has(NAME) || headers[NAME] != VALUE, false, \
  123. "Missing or invalid header '" + String(NAME) + "'. Expected value '" + VALUE + "'.");
  124. _WSL_CHECK("connection", "upgrade");
  125. _WSL_CHECK("upgrade", "websocket");
  126. _WSL_CHECK_NC("sec-websocket-accept", WSLPeer::compute_key_response(_key));
  127. #undef _WSL_CHECK_NC
  128. #undef _WSL_CHECK
  129. if (_protocols.size() == 0) {
  130. // We didn't request a custom protocol
  131. ERR_FAIL_COND_V(headers.has("sec-websocket-protocol"), false);
  132. } else {
  133. ERR_FAIL_COND_V(!headers.has("sec-websocket-protocol"), false);
  134. r_protocol = headers["sec-websocket-protocol"];
  135. bool valid = false;
  136. for (int i = 0; i < _protocols.size(); i++) {
  137. if (_protocols[i] != r_protocol) {
  138. continue;
  139. }
  140. valid = true;
  141. break;
  142. }
  143. if (!valid) {
  144. return false;
  145. }
  146. }
  147. return true;
  148. }
  149. Error WSLClient::connect_to_host(String p_host, String p_path, uint16_t p_port, bool p_ssl, const Vector<String> p_protocols, const Vector<String> p_custom_headers) {
  150. ERR_FAIL_COND_V(_connection.is_valid(), ERR_ALREADY_IN_USE);
  151. _peer = Ref<WSLPeer>(memnew(WSLPeer));
  152. IPAddress addr;
  153. if (!p_host.is_valid_ip_address()) {
  154. addr = IP::get_singleton()->resolve_hostname(p_host);
  155. } else {
  156. addr = p_host;
  157. }
  158. ERR_FAIL_COND_V(!addr.is_valid(), ERR_INVALID_PARAMETER);
  159. String port = "";
  160. if ((p_port != 80 && !p_ssl) || (p_port != 443 && p_ssl)) {
  161. port = ":" + itos(p_port);
  162. }
  163. Error err = _tcp->connect_to_host(addr, p_port);
  164. if (err != OK) {
  165. _tcp->disconnect_from_host();
  166. _on_error();
  167. return err;
  168. }
  169. _connection = _tcp;
  170. _use_ssl = p_ssl;
  171. _host = p_host;
  172. // Strip edges from protocols.
  173. _protocols.resize(p_protocols.size());
  174. String *pw = _protocols.ptrw();
  175. for (int i = 0; i < p_protocols.size(); i++) {
  176. pw[i] = p_protocols[i].strip_edges();
  177. }
  178. _key = WSLPeer::generate_key();
  179. // TODO custom extra headers (allow overriding this too?)
  180. String request = "GET " + p_path + " HTTP/1.1\r\n";
  181. request += "Host: " + p_host + port + "\r\n";
  182. request += "Upgrade: websocket\r\n";
  183. request += "Connection: Upgrade\r\n";
  184. request += "Sec-WebSocket-Key: " + _key + "\r\n";
  185. request += "Sec-WebSocket-Version: 13\r\n";
  186. if (p_protocols.size() > 0) {
  187. request += "Sec-WebSocket-Protocol: ";
  188. for (int i = 0; i < p_protocols.size(); i++) {
  189. if (i != 0) {
  190. request += ",";
  191. }
  192. request += p_protocols[i];
  193. }
  194. request += "\r\n";
  195. }
  196. for (int i = 0; i < p_custom_headers.size(); i++) {
  197. request += p_custom_headers[i] + "\r\n";
  198. }
  199. request += "\r\n";
  200. _request = request.utf8();
  201. return OK;
  202. }
  203. int WSLClient::get_max_packet_size() const {
  204. return (1 << _out_buf_size) - PROTO_SIZE;
  205. }
  206. void WSLClient::poll() {
  207. if (_peer->is_connected_to_host()) {
  208. _peer->poll();
  209. if (!_peer->is_connected_to_host()) {
  210. disconnect_from_host();
  211. _on_disconnect(_peer->close_code != -1);
  212. }
  213. return;
  214. }
  215. if (_connection.is_null()) {
  216. return; // Not connected.
  217. }
  218. switch (_tcp->get_status()) {
  219. case StreamPeerTCP::STATUS_NONE:
  220. // Clean close
  221. disconnect_from_host();
  222. _on_error();
  223. break;
  224. case StreamPeerTCP::STATUS_CONNECTED: {
  225. Ref<StreamPeerSSL> ssl;
  226. if (_use_ssl) {
  227. if (_connection == _tcp) {
  228. // Start SSL handshake
  229. ssl = Ref<StreamPeerSSL>(StreamPeerSSL::create());
  230. ERR_FAIL_COND_MSG(ssl.is_null(), "SSL is not available in this build.");
  231. ssl->set_blocking_handshake_enabled(false);
  232. if (ssl->connect_to_stream(_tcp, verify_ssl, _host, ssl_cert) != OK) {
  233. disconnect_from_host();
  234. _on_error();
  235. return;
  236. }
  237. _connection = ssl;
  238. } else {
  239. ssl = static_cast<Ref<StreamPeerSSL>>(_connection);
  240. ERR_FAIL_COND(ssl.is_null()); // Bug?
  241. ssl->poll();
  242. }
  243. if (ssl->get_status() == StreamPeerSSL::STATUS_HANDSHAKING) {
  244. return; // Need more polling.
  245. } else if (ssl->get_status() != StreamPeerSSL::STATUS_CONNECTED) {
  246. disconnect_from_host();
  247. _on_error();
  248. return; // Error.
  249. }
  250. }
  251. // Do websocket handshake.
  252. _do_handshake();
  253. } break;
  254. case StreamPeerTCP::STATUS_ERROR:
  255. disconnect_from_host();
  256. _on_error();
  257. break;
  258. case StreamPeerTCP::STATUS_CONNECTING:
  259. break; // Wait for connection
  260. }
  261. }
  262. Ref<WebSocketPeer> WSLClient::get_peer(int p_peer_id) const {
  263. ERR_FAIL_COND_V(p_peer_id != 1, nullptr);
  264. return _peer;
  265. }
  266. NetworkedMultiplayerPeer::ConnectionStatus WSLClient::get_connection_status() const {
  267. if (_peer->is_connected_to_host()) {
  268. return CONNECTION_CONNECTED;
  269. }
  270. if (_tcp->is_connected_to_host()) {
  271. return CONNECTION_CONNECTING;
  272. }
  273. return CONNECTION_DISCONNECTED;
  274. }
  275. void WSLClient::disconnect_from_host(int p_code, String p_reason) {
  276. _peer->close(p_code, p_reason);
  277. _connection = Ref<StreamPeer>(nullptr);
  278. _tcp = Ref<StreamPeerTCP>(memnew(StreamPeerTCP));
  279. _key = "";
  280. _host = "";
  281. _protocols.clear();
  282. _use_ssl = false;
  283. _request = "";
  284. _requested = 0;
  285. memset(_resp_buf, 0, sizeof(_resp_buf));
  286. _resp_pos = 0;
  287. }
  288. IPAddress WSLClient::get_connected_host() const {
  289. ERR_FAIL_COND_V(!_peer->is_connected_to_host(), IPAddress());
  290. return _peer->get_connected_host();
  291. }
  292. uint16_t WSLClient::get_connected_port() const {
  293. ERR_FAIL_COND_V(!_peer->is_connected_to_host(), 0);
  294. return _peer->get_connected_port();
  295. }
  296. Error WSLClient::set_buffers(int p_in_buffer, int p_in_packets, int p_out_buffer, int p_out_packets) {
  297. ERR_FAIL_COND_V_MSG(_connection.is_valid(), FAILED, "Buffers sizes can only be set before listening or connecting.");
  298. _in_buf_size = nearest_shift(p_in_buffer - 1) + 10;
  299. _in_pkt_size = nearest_shift(p_in_packets - 1);
  300. _out_buf_size = nearest_shift(p_out_buffer - 1) + 10;
  301. _out_pkt_size = nearest_shift(p_out_packets - 1);
  302. return OK;
  303. }
  304. WSLClient::WSLClient() {
  305. _peer.instance();
  306. _tcp.instance();
  307. disconnect_from_host();
  308. }
  309. WSLClient::~WSLClient() {
  310. _peer->close_now();
  311. _peer->invalidate();
  312. disconnect_from_host();
  313. }
  314. #endif // JAVASCRIPT_ENABLED