wsl_client.cpp 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357
  1. /*************************************************************************/
  2. /* wsl_client.cpp */
  3. /*************************************************************************/
  4. /* This file is part of: */
  5. /* GODOT ENGINE */
  6. /* https://godotengine.org */
  7. /*************************************************************************/
  8. /* Copyright (c) 2007-2021 Juan Linietsky, Ariel Manzur. */
  9. /* Copyright (c) 2014-2021 Godot Engine contributors (cf. AUTHORS.md). */
  10. /* */
  11. /* Permission is hereby granted, free of charge, to any person obtaining */
  12. /* a copy of this software and associated documentation files (the */
  13. /* "Software"), to deal in the Software without restriction, including */
  14. /* without limitation the rights to use, copy, modify, merge, publish, */
  15. /* distribute, sublicense, and/or sell copies of the Software, and to */
  16. /* permit persons to whom the Software is furnished to do so, subject to */
  17. /* the following conditions: */
  18. /* */
  19. /* The above copyright notice and this permission notice shall be */
  20. /* included in all copies or substantial portions of the Software. */
  21. /* */
  22. /* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, */
  23. /* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF */
  24. /* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.*/
  25. /* IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY */
  26. /* CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, */
  27. /* TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE */
  28. /* SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. */
  29. /*************************************************************************/
  30. #ifndef JAVASCRIPT_ENABLED
  31. #include "wsl_client.h"
  32. #include "core/io/ip.h"
  33. #include "core/project_settings.h"
  34. void WSLClient::_do_handshake() {
  35. if (_requested < _request.size() - 1) {
  36. int sent = 0;
  37. Error err = _connection->put_partial_data(((const uint8_t *)_request.get_data() + _requested), _request.size() - _requested - 1, sent);
  38. // Sending handshake failed
  39. if (err != OK) {
  40. disconnect_from_host();
  41. _on_error();
  42. return;
  43. }
  44. _requested += sent;
  45. } else {
  46. int read = 0;
  47. while (true) {
  48. if (_resp_pos >= WSL_MAX_HEADER_SIZE) {
  49. // Header is too big
  50. disconnect_from_host();
  51. _on_error();
  52. ERR_FAIL_MSG("Response headers too big.");
  53. }
  54. Error err = _connection->get_partial_data(&_resp_buf[_resp_pos], 1, read);
  55. if (err == ERR_FILE_EOF) {
  56. // We got a disconnect.
  57. disconnect_from_host();
  58. _on_error();
  59. return;
  60. } else if (err != OK) {
  61. // Got some error.
  62. disconnect_from_host();
  63. _on_error();
  64. return;
  65. } else if (read != 1) {
  66. // Busy, wait next poll.
  67. break;
  68. }
  69. // Check "\r\n\r\n" header terminator
  70. char *r = (char *)_resp_buf;
  71. int l = _resp_pos;
  72. if (l > 3 && r[l] == '\n' && r[l - 1] == '\r' && r[l - 2] == '\n' && r[l - 3] == '\r') {
  73. r[l - 3] = '\0';
  74. String protocol;
  75. // Response is over, verify headers and create peer.
  76. if (!_verify_headers(protocol)) {
  77. disconnect_from_host();
  78. _on_error();
  79. ERR_FAIL_MSG("Invalid response headers.");
  80. }
  81. // Create peer.
  82. WSLPeer::PeerData *data = memnew(struct WSLPeer::PeerData);
  83. data->obj = this;
  84. data->conn = _connection;
  85. data->tcp = _tcp;
  86. data->is_server = false;
  87. data->id = 1;
  88. _peer->make_context(data, _in_buf_size, _in_pkt_size, _out_buf_size, _out_pkt_size);
  89. _peer->set_no_delay(true);
  90. _on_connect(protocol);
  91. break;
  92. }
  93. _resp_pos += 1;
  94. }
  95. }
  96. }
  97. bool WSLClient::_verify_headers(String &r_protocol) {
  98. String s = (char *)_resp_buf;
  99. Vector<String> psa = s.split("\r\n");
  100. int len = psa.size();
  101. ERR_FAIL_COND_V_MSG(len < 4, false, "Not enough response headers, got: " + itos(len) + ", expected >= 4.");
  102. Vector<String> req = psa[0].split(" ", false);
  103. ERR_FAIL_COND_V_MSG(req.size() < 2, false, "Invalid protocol or status code.");
  104. // Wrong protocol
  105. ERR_FAIL_COND_V_MSG(req[0] != "HTTP/1.1" || req[1] != "101", false, "Invalid protocol or status code.");
  106. Map<String, String> headers;
  107. for (int i = 1; i < len; i++) {
  108. Vector<String> header = psa[i].split(":", false, 1);
  109. ERR_FAIL_COND_V_MSG(header.size() != 2, false, "Invalid header -> " + psa[i] + ".");
  110. String name = header[0].to_lower();
  111. String value = header[1].strip_edges();
  112. if (headers.has(name)) {
  113. headers[name] += "," + value;
  114. } else {
  115. headers[name] = value;
  116. }
  117. }
  118. #define _WSL_CHECK(NAME, VALUE) \
  119. ERR_FAIL_COND_V_MSG(!headers.has(NAME) || headers[NAME].to_lower() != VALUE, false, \
  120. "Missing or invalid header '" + String(NAME) + "'. Expected value '" + VALUE + "'.");
  121. #define _WSL_CHECK_NC(NAME, VALUE) \
  122. ERR_FAIL_COND_V_MSG(!headers.has(NAME) || headers[NAME] != VALUE, false, \
  123. "Missing or invalid header '" + String(NAME) + "'. Expected value '" + VALUE + "'.");
  124. _WSL_CHECK("connection", "upgrade");
  125. _WSL_CHECK("upgrade", "websocket");
  126. _WSL_CHECK_NC("sec-websocket-accept", WSLPeer::compute_key_response(_key));
  127. #undef _WSL_CHECK_NC
  128. #undef _WSL_CHECK
  129. if (_protocols.size() == 0) {
  130. // We didn't request a custom protocol
  131. ERR_FAIL_COND_V(headers.has("sec-websocket-protocol"), false);
  132. } else {
  133. ERR_FAIL_COND_V(!headers.has("sec-websocket-protocol"), false);
  134. r_protocol = headers["sec-websocket-protocol"];
  135. bool valid = false;
  136. for (int i = 0; i < _protocols.size(); i++) {
  137. if (_protocols[i] != r_protocol) {
  138. continue;
  139. }
  140. valid = true;
  141. break;
  142. }
  143. if (!valid) {
  144. return false;
  145. }
  146. }
  147. return true;
  148. }
  149. Error WSLClient::connect_to_host(String p_host, String p_path, uint16_t p_port, bool p_ssl, const Vector<String> p_protocols, const Vector<String> p_custom_headers) {
  150. ERR_FAIL_COND_V(_connection.is_valid(), ERR_ALREADY_IN_USE);
  151. ERR_FAIL_COND_V(p_path.empty(), ERR_INVALID_PARAMETER);
  152. _peer = Ref<WSLPeer>(memnew(WSLPeer));
  153. IP_Address addr;
  154. if (!p_host.is_valid_ip_address()) {
  155. addr = IP::get_singleton()->resolve_hostname(p_host);
  156. } else {
  157. addr = p_host;
  158. }
  159. ERR_FAIL_COND_V(!addr.is_valid(), ERR_INVALID_PARAMETER);
  160. String port = "";
  161. if ((p_port != 80 && !p_ssl) || (p_port != 443 && p_ssl)) {
  162. port = ":" + itos(p_port);
  163. }
  164. Error err = _tcp->connect_to_host(addr, p_port);
  165. if (err != OK) {
  166. _tcp->disconnect_from_host();
  167. _on_error();
  168. return err;
  169. }
  170. _connection = _tcp;
  171. _use_ssl = p_ssl;
  172. _host = p_host;
  173. // Strip edges from protocols.
  174. _protocols.resize(p_protocols.size());
  175. String *pw = _protocols.ptrw();
  176. for (int i = 0; i < p_protocols.size(); i++) {
  177. pw[i] = p_protocols[i].strip_edges();
  178. }
  179. _key = WSLPeer::generate_key();
  180. // TODO custom extra headers (allow overriding this too?)
  181. String request = "GET " + p_path + " HTTP/1.1\r\n";
  182. request += "Host: " + p_host + port + "\r\n";
  183. request += "Upgrade: websocket\r\n";
  184. request += "Connection: Upgrade\r\n";
  185. request += "Sec-WebSocket-Key: " + _key + "\r\n";
  186. request += "Sec-WebSocket-Version: 13\r\n";
  187. if (p_protocols.size() > 0) {
  188. request += "Sec-WebSocket-Protocol: ";
  189. for (int i = 0; i < p_protocols.size(); i++) {
  190. if (i != 0) {
  191. request += ",";
  192. }
  193. request += p_protocols[i];
  194. }
  195. request += "\r\n";
  196. }
  197. for (int i = 0; i < p_custom_headers.size(); i++) {
  198. request += p_custom_headers[i] + "\r\n";
  199. }
  200. request += "\r\n";
  201. _request = request.utf8();
  202. return OK;
  203. }
  204. int WSLClient::get_max_packet_size() const {
  205. return (1 << _out_buf_size) - PROTO_SIZE;
  206. }
  207. void WSLClient::poll() {
  208. if (_peer->is_connected_to_host()) {
  209. _peer->poll();
  210. if (!_peer->is_connected_to_host()) {
  211. disconnect_from_host();
  212. _on_disconnect(_peer->close_code != -1);
  213. }
  214. return;
  215. }
  216. if (_connection.is_null()) {
  217. return; // Not connected.
  218. }
  219. switch (_tcp->get_status()) {
  220. case StreamPeerTCP::STATUS_NONE:
  221. // Clean close
  222. disconnect_from_host();
  223. _on_error();
  224. break;
  225. case StreamPeerTCP::STATUS_CONNECTED: {
  226. Ref<StreamPeerSSL> ssl;
  227. if (_use_ssl) {
  228. if (_connection == _tcp) {
  229. // Start SSL handshake
  230. ssl = Ref<StreamPeerSSL>(StreamPeerSSL::create());
  231. ERR_FAIL_COND_MSG(ssl.is_null(), "SSL is not available in this build.");
  232. ssl->set_blocking_handshake_enabled(false);
  233. if (ssl->connect_to_stream(_tcp, verify_ssl, _host, ssl_cert) != OK) {
  234. disconnect_from_host();
  235. _on_error();
  236. return;
  237. }
  238. _connection = ssl;
  239. } else {
  240. ssl = static_cast<Ref<StreamPeerSSL>>(_connection);
  241. ERR_FAIL_COND(ssl.is_null()); // Bug?
  242. ssl->poll();
  243. }
  244. if (ssl->get_status() == StreamPeerSSL::STATUS_HANDSHAKING) {
  245. return; // Need more polling.
  246. } else if (ssl->get_status() != StreamPeerSSL::STATUS_CONNECTED) {
  247. disconnect_from_host();
  248. _on_error();
  249. return; // Error.
  250. }
  251. }
  252. // Do websocket handshake.
  253. _do_handshake();
  254. } break;
  255. case StreamPeerTCP::STATUS_ERROR:
  256. disconnect_from_host();
  257. _on_error();
  258. break;
  259. case StreamPeerTCP::STATUS_CONNECTING:
  260. break; // Wait for connection
  261. }
  262. }
  263. Ref<WebSocketPeer> WSLClient::get_peer(int p_peer_id) const {
  264. ERR_FAIL_COND_V(p_peer_id != 1, nullptr);
  265. return _peer;
  266. }
  267. NetworkedMultiplayerPeer::ConnectionStatus WSLClient::get_connection_status() const {
  268. if (_peer->is_connected_to_host()) {
  269. return CONNECTION_CONNECTED;
  270. }
  271. if (_tcp->is_connected_to_host()) {
  272. return CONNECTION_CONNECTING;
  273. }
  274. return CONNECTION_DISCONNECTED;
  275. }
  276. void WSLClient::disconnect_from_host(int p_code, String p_reason) {
  277. _peer->close(p_code, p_reason);
  278. _connection = Ref<StreamPeer>(nullptr);
  279. _tcp = Ref<StreamPeerTCP>(memnew(StreamPeerTCP));
  280. _key = "";
  281. _host = "";
  282. _protocols.clear();
  283. _use_ssl = false;
  284. _request = "";
  285. _requested = 0;
  286. memset(_resp_buf, 0, sizeof(_resp_buf));
  287. _resp_pos = 0;
  288. }
  289. IP_Address WSLClient::get_connected_host() const {
  290. ERR_FAIL_COND_V(!_peer->is_connected_to_host(), IP_Address());
  291. return _peer->get_connected_host();
  292. }
  293. uint16_t WSLClient::get_connected_port() const {
  294. ERR_FAIL_COND_V(!_peer->is_connected_to_host(), 0);
  295. return _peer->get_connected_port();
  296. }
  297. Error WSLClient::set_buffers(int p_in_buffer, int p_in_packets, int p_out_buffer, int p_out_packets) {
  298. ERR_FAIL_COND_V_MSG(_connection.is_valid(), FAILED, "Buffers sizes can only be set before listening or connecting.");
  299. _in_buf_size = nearest_shift(p_in_buffer - 1) + 10;
  300. _in_pkt_size = nearest_shift(p_in_packets - 1);
  301. _out_buf_size = nearest_shift(p_out_buffer - 1) + 10;
  302. _out_pkt_size = nearest_shift(p_out_packets - 1);
  303. return OK;
  304. }
  305. WSLClient::WSLClient() {
  306. _in_buf_size = nearest_shift((int)GLOBAL_GET(WSC_IN_BUF) - 1) + 10;
  307. _in_pkt_size = nearest_shift((int)GLOBAL_GET(WSC_IN_PKT) - 1);
  308. _out_buf_size = nearest_shift((int)GLOBAL_GET(WSC_OUT_BUF) - 1) + 10;
  309. _out_pkt_size = nearest_shift((int)GLOBAL_GET(WSC_OUT_PKT) - 1);
  310. _peer.instance();
  311. _tcp.instance();
  312. disconnect_from_host();
  313. }
  314. WSLClient::~WSLClient() {
  315. _peer->close_now();
  316. _peer->invalidate();
  317. disconnect_from_host();
  318. }
  319. #endif // JAVASCRIPT_ENABLED