wsl_client.cpp 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408
  1. /**************************************************************************/
  2. /* wsl_client.cpp */
  3. /**************************************************************************/
  4. /* This file is part of: */
  5. /* GODOT ENGINE */
  6. /* https://godotengine.org */
  7. /**************************************************************************/
  8. /* Copyright (c) 2014-present Godot Engine contributors (see AUTHORS.md). */
  9. /* Copyright (c) 2007-2014 Juan Linietsky, Ariel Manzur. */
  10. /* */
  11. /* Permission is hereby granted, free of charge, to any person obtaining */
  12. /* a copy of this software and associated documentation files (the */
  13. /* "Software"), to deal in the Software without restriction, including */
  14. /* without limitation the rights to use, copy, modify, merge, publish, */
  15. /* distribute, sublicense, and/or sell copies of the Software, and to */
  16. /* permit persons to whom the Software is furnished to do so, subject to */
  17. /* the following conditions: */
  18. /* */
  19. /* The above copyright notice and this permission notice shall be */
  20. /* included in all copies or substantial portions of the Software. */
  21. /* */
  22. /* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, */
  23. /* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF */
  24. /* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. */
  25. /* IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY */
  26. /* CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, */
  27. /* TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE */
  28. /* SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. */
  29. /**************************************************************************/
  30. #ifndef JAVASCRIPT_ENABLED
  31. #include "wsl_client.h"
  32. #include "core/io/ip.h"
  33. #include "core/project_settings.h"
  34. void WSLClient::_do_handshake() {
  35. if (_requested < _request.size() - 1) {
  36. int sent = 0;
  37. Error err = _connection->put_partial_data(((const uint8_t *)_request.get_data() + _requested), _request.size() - _requested - 1, sent);
  38. // Sending handshake failed
  39. if (err != OK) {
  40. disconnect_from_host();
  41. _on_error();
  42. return;
  43. }
  44. _requested += sent;
  45. } else {
  46. int read = 0;
  47. while (true) {
  48. if (_resp_pos >= WSL_MAX_HEADER_SIZE) {
  49. // Header is too big
  50. disconnect_from_host();
  51. _on_error();
  52. ERR_FAIL_MSG("Response headers too big.");
  53. }
  54. Error err = _connection->get_partial_data(&_resp_buf[_resp_pos], 1, read);
  55. if (err == ERR_FILE_EOF) {
  56. // We got a disconnect.
  57. disconnect_from_host();
  58. _on_error();
  59. return;
  60. } else if (err != OK) {
  61. // Got some error.
  62. disconnect_from_host();
  63. _on_error();
  64. return;
  65. } else if (read != 1) {
  66. // Busy, wait next poll.
  67. break;
  68. }
  69. // Check "\r\n\r\n" header terminator
  70. char *r = (char *)_resp_buf;
  71. int l = _resp_pos;
  72. if (l > 3 && r[l] == '\n' && r[l - 1] == '\r' && r[l - 2] == '\n' && r[l - 3] == '\r') {
  73. r[l - 3] = '\0';
  74. String protocol;
  75. // Response is over, verify headers and create peer.
  76. if (!_verify_headers(protocol)) {
  77. disconnect_from_host();
  78. _on_error();
  79. ERR_FAIL_MSG("Invalid response headers.");
  80. }
  81. // Create peer.
  82. WSLPeer::PeerData *data = memnew(struct WSLPeer::PeerData);
  83. data->obj = this;
  84. data->conn = _connection;
  85. data->tcp = _tcp;
  86. data->is_server = false;
  87. data->id = 1;
  88. _peer->make_context(data, _in_buf_size, _in_pkt_size, _out_buf_size, _out_pkt_size);
  89. _peer->set_no_delay(true);
  90. _on_connect(protocol);
  91. break;
  92. }
  93. _resp_pos += 1;
  94. }
  95. }
  96. }
  97. bool WSLClient::_verify_headers(String &r_protocol) {
  98. String s = (char *)_resp_buf;
  99. Vector<String> psa = s.split("\r\n");
  100. int len = psa.size();
  101. ERR_FAIL_COND_V_MSG(len < 4, false, "Not enough response headers, got: " + itos(len) + ", expected >= 4.");
  102. Vector<String> req = psa[0].split(" ", false);
  103. ERR_FAIL_COND_V_MSG(req.size() < 2, false, "Invalid protocol or status code.");
  104. // Wrong protocol
  105. ERR_FAIL_COND_V_MSG(req[0] != "HTTP/1.1" || req[1] != "101", false, "Invalid protocol or status code.");
  106. Map<String, String> headers;
  107. for (int i = 1; i < len; i++) {
  108. Vector<String> header = psa[i].split(":", false, 1);
  109. ERR_FAIL_COND_V_MSG(header.size() != 2, false, "Invalid header -> " + psa[i] + ".");
  110. String name = header[0].to_lower();
  111. String value = header[1].strip_edges();
  112. if (headers.has(name)) {
  113. headers[name] += "," + value;
  114. } else {
  115. headers[name] = value;
  116. }
  117. }
  118. #define _WSL_CHECK(NAME, VALUE) \
  119. ERR_FAIL_COND_V_MSG(!headers.has(NAME) || headers[NAME].to_lower() != VALUE, false, \
  120. "Missing or invalid header '" + String(NAME) + "'. Expected value '" + VALUE + "'.");
  121. #define _WSL_CHECK_NC(NAME, VALUE) \
  122. ERR_FAIL_COND_V_MSG(!headers.has(NAME) || headers[NAME] != VALUE, false, \
  123. "Missing or invalid header '" + String(NAME) + "'. Expected value '" + VALUE + "'.");
  124. _WSL_CHECK("connection", "upgrade");
  125. _WSL_CHECK("upgrade", "websocket");
  126. _WSL_CHECK_NC("sec-websocket-accept", WSLPeer::compute_key_response(_key));
  127. #undef _WSL_CHECK_NC
  128. #undef _WSL_CHECK
  129. if (_protocols.size() == 0) {
  130. // We didn't request a custom protocol
  131. ERR_FAIL_COND_V(headers.has("sec-websocket-protocol"), false);
  132. } else {
  133. ERR_FAIL_COND_V(!headers.has("sec-websocket-protocol"), false);
  134. r_protocol = headers["sec-websocket-protocol"];
  135. bool valid = false;
  136. for (int i = 0; i < _protocols.size(); i++) {
  137. if (_protocols[i] != r_protocol) {
  138. continue;
  139. }
  140. valid = true;
  141. break;
  142. }
  143. if (!valid) {
  144. return false;
  145. }
  146. }
  147. return true;
  148. }
  149. Error WSLClient::connect_to_host(String p_host, String p_path, uint16_t p_port, bool p_ssl, const Vector<String> p_protocols, const Vector<String> p_custom_headers) {
  150. ERR_FAIL_COND_V(_connection.is_valid(), ERR_ALREADY_IN_USE);
  151. ERR_FAIL_COND_V(p_path.empty(), ERR_INVALID_PARAMETER);
  152. _peer = Ref<WSLPeer>(memnew(WSLPeer));
  153. if (p_host.is_valid_ip_address()) {
  154. _ip_candidates.push_back(IP_Address(p_host));
  155. } else {
  156. // Queue hostname for resolution.
  157. _resolver_id = IP::get_singleton()->resolve_hostname_queue_item(p_host);
  158. ERR_FAIL_COND_V(_resolver_id == IP::RESOLVER_INVALID_ID, ERR_INVALID_PARAMETER);
  159. // Check if it was found in cache.
  160. IP::ResolverStatus ip_status = IP::get_singleton()->get_resolve_item_status(_resolver_id);
  161. if (ip_status == IP::RESOLVER_STATUS_DONE) {
  162. _ip_candidates = IP::get_singleton()->get_resolve_item_addresses(_resolver_id);
  163. IP::get_singleton()->erase_resolve_item(_resolver_id);
  164. _resolver_id = IP::RESOLVER_INVALID_ID;
  165. }
  166. }
  167. // We assume OK while hostname resolution is pending.
  168. Error err = _resolver_id != IP::RESOLVER_INVALID_ID ? OK : FAILED;
  169. while (_ip_candidates.size()) {
  170. err = _tcp->connect_to_host(_ip_candidates.pop_front(), p_port);
  171. if (err == OK) {
  172. break;
  173. }
  174. }
  175. if (err != OK) {
  176. _tcp->disconnect_from_host();
  177. _on_error();
  178. return err;
  179. }
  180. _connection = _tcp;
  181. _use_ssl = p_ssl;
  182. _host = p_host;
  183. _port = p_port;
  184. // Strip edges from protocols.
  185. _protocols.resize(p_protocols.size());
  186. String *pw = _protocols.ptrw();
  187. for (int i = 0; i < p_protocols.size(); i++) {
  188. pw[i] = p_protocols[i].strip_edges();
  189. }
  190. _key = WSLPeer::generate_key();
  191. String request = "GET " + p_path + " HTTP/1.1\r\n";
  192. String port = "";
  193. if ((p_port != 80 && !p_ssl) || (p_port != 443 && p_ssl)) {
  194. port = ":" + itos(p_port);
  195. }
  196. request += "Host: " + p_host + port + "\r\n";
  197. request += "Upgrade: websocket\r\n";
  198. request += "Connection: Upgrade\r\n";
  199. request += "Sec-WebSocket-Key: " + _key + "\r\n";
  200. request += "Sec-WebSocket-Version: 13\r\n";
  201. if (p_protocols.size() > 0) {
  202. request += "Sec-WebSocket-Protocol: ";
  203. for (int i = 0; i < p_protocols.size(); i++) {
  204. if (i != 0) {
  205. request += ",";
  206. }
  207. request += p_protocols[i];
  208. }
  209. request += "\r\n";
  210. }
  211. for (int i = 0; i < p_custom_headers.size(); i++) {
  212. request += p_custom_headers[i] + "\r\n";
  213. }
  214. request += "\r\n";
  215. _request = request.utf8();
  216. return OK;
  217. }
  218. int WSLClient::get_max_packet_size() const {
  219. return (1 << _out_buf_size) - PROTO_SIZE;
  220. }
  221. void WSLClient::poll() {
  222. if (_resolver_id != IP::RESOLVER_INVALID_ID) {
  223. IP::ResolverStatus ip_status = IP::get_singleton()->get_resolve_item_status(_resolver_id);
  224. if (ip_status == IP::RESOLVER_STATUS_WAITING) {
  225. return;
  226. }
  227. // Anything else is either a candidate or a failure.
  228. Error err = FAILED;
  229. if (ip_status == IP::RESOLVER_STATUS_DONE) {
  230. _ip_candidates = IP::get_singleton()->get_resolve_item_addresses(_resolver_id);
  231. while (_ip_candidates.size()) {
  232. err = _tcp->connect_to_host(_ip_candidates.pop_front(), _port);
  233. if (err == OK) {
  234. break;
  235. }
  236. }
  237. }
  238. IP::get_singleton()->erase_resolve_item(_resolver_id);
  239. _resolver_id = IP::RESOLVER_INVALID_ID;
  240. if (err != OK) {
  241. disconnect_from_host();
  242. _on_error();
  243. return;
  244. }
  245. }
  246. if (_peer->is_connected_to_host()) {
  247. _peer->poll();
  248. if (!_peer->is_connected_to_host()) {
  249. disconnect_from_host();
  250. _on_disconnect(_peer->close_code != -1);
  251. }
  252. return;
  253. }
  254. if (_connection.is_null()) {
  255. return; // Not connected.
  256. }
  257. switch (_tcp->get_status()) {
  258. case StreamPeerTCP::STATUS_NONE:
  259. // Clean close
  260. disconnect_from_host();
  261. _on_error();
  262. break;
  263. case StreamPeerTCP::STATUS_CONNECTED: {
  264. _ip_candidates.clear();
  265. Ref<StreamPeerSSL> ssl;
  266. if (_use_ssl) {
  267. if (_connection == _tcp) {
  268. // Start SSL handshake
  269. ssl = Ref<StreamPeerSSL>(StreamPeerSSL::create());
  270. ERR_FAIL_COND_MSG(ssl.is_null(), "SSL is not available in this build.");
  271. ssl->set_blocking_handshake_enabled(false);
  272. if (ssl->connect_to_stream(_tcp, verify_ssl, _host, ssl_cert) != OK) {
  273. disconnect_from_host();
  274. _on_error();
  275. return;
  276. }
  277. _connection = ssl;
  278. } else {
  279. ssl = static_cast<Ref<StreamPeerSSL>>(_connection);
  280. ERR_FAIL_COND(ssl.is_null()); // Bug?
  281. ssl->poll();
  282. }
  283. if (ssl->get_status() == StreamPeerSSL::STATUS_HANDSHAKING) {
  284. return; // Need more polling.
  285. } else if (ssl->get_status() != StreamPeerSSL::STATUS_CONNECTED) {
  286. disconnect_from_host();
  287. _on_error();
  288. return; // Error.
  289. }
  290. }
  291. // Do websocket handshake.
  292. _do_handshake();
  293. } break;
  294. case StreamPeerTCP::STATUS_ERROR:
  295. while (_ip_candidates.size() > 0) {
  296. _tcp->disconnect_from_host();
  297. if (_tcp->connect_to_host(_ip_candidates.pop_front(), _port) == OK) {
  298. return;
  299. }
  300. }
  301. disconnect_from_host();
  302. _on_error();
  303. break;
  304. case StreamPeerTCP::STATUS_CONNECTING:
  305. break; // Wait for connection
  306. }
  307. }
  308. Ref<WebSocketPeer> WSLClient::get_peer(int p_peer_id) const {
  309. ERR_FAIL_COND_V(p_peer_id != 1, nullptr);
  310. return _peer;
  311. }
  312. NetworkedMultiplayerPeer::ConnectionStatus WSLClient::get_connection_status() const {
  313. if (_peer->is_connected_to_host()) {
  314. return CONNECTION_CONNECTED;
  315. }
  316. if (_tcp->is_connected_to_host() || _resolver_id != IP::RESOLVER_INVALID_ID) {
  317. return CONNECTION_CONNECTING;
  318. }
  319. return CONNECTION_DISCONNECTED;
  320. }
  321. void WSLClient::disconnect_from_host(int p_code, String p_reason) {
  322. _peer->close(p_code, p_reason);
  323. _connection = Ref<StreamPeer>(nullptr);
  324. _tcp = Ref<StreamPeerTCP>(memnew(StreamPeerTCP));
  325. _key = "";
  326. _host = "";
  327. _protocols.clear();
  328. _use_ssl = false;
  329. _request = "";
  330. _requested = 0;
  331. memset(_resp_buf, 0, sizeof(_resp_buf));
  332. _resp_pos = 0;
  333. if (_resolver_id != IP::RESOLVER_INVALID_ID) {
  334. IP::get_singleton()->erase_resolve_item(_resolver_id);
  335. _resolver_id = IP::RESOLVER_INVALID_ID;
  336. }
  337. _ip_candidates.clear();
  338. }
  339. IP_Address WSLClient::get_connected_host() const {
  340. ERR_FAIL_COND_V(!_peer->is_connected_to_host(), IP_Address());
  341. return _peer->get_connected_host();
  342. }
  343. uint16_t WSLClient::get_connected_port() const {
  344. ERR_FAIL_COND_V(!_peer->is_connected_to_host(), 0);
  345. return _peer->get_connected_port();
  346. }
  347. Error WSLClient::set_buffers(int p_in_buffer, int p_in_packets, int p_out_buffer, int p_out_packets) {
  348. ERR_FAIL_COND_V_MSG(_connection.is_valid(), FAILED, "Buffers sizes can only be set before listening or connecting.");
  349. _in_buf_size = nearest_shift(p_in_buffer - 1) + 10;
  350. _in_pkt_size = nearest_shift(p_in_packets - 1);
  351. _out_buf_size = nearest_shift(p_out_buffer - 1) + 10;
  352. _out_pkt_size = nearest_shift(p_out_packets - 1);
  353. return OK;
  354. }
  355. WSLClient::WSLClient() {
  356. _in_buf_size = nearest_shift((int)GLOBAL_GET(WSC_IN_BUF) - 1) + 10;
  357. _in_pkt_size = nearest_shift((int)GLOBAL_GET(WSC_IN_PKT) - 1);
  358. _out_buf_size = nearest_shift((int)GLOBAL_GET(WSC_OUT_BUF) - 1) + 10;
  359. _out_pkt_size = nearest_shift((int)GLOBAL_GET(WSC_OUT_PKT) - 1);
  360. _peer.instance();
  361. _tcp.instance();
  362. disconnect_from_host();
  363. }
  364. WSLClient::~WSLClient() {
  365. _peer->close_now();
  366. _peer->invalidate();
  367. disconnect_from_host();
  368. }
  369. #endif // JAVASCRIPT_ENABLED