mirror of
https://github.com/hrydgard/ppsspp.git
synced 2024-11-26 23:10:38 +00:00
544 lines
14 KiB
C++
544 lines
14 KiB
C++
#include <algorithm>
|
|
#include <cctype>
|
|
#include <cmath>
|
|
#include <cstring>
|
|
#ifndef _WIN32
|
|
#include <arpa/inet.h>
|
|
#include <netinet/in.h>
|
|
#include <sys/socket.h>
|
|
#include <sys/types.h>
|
|
#include <sys/select.h>
|
|
#include <unistd.h>
|
|
#else
|
|
#include <io.h>
|
|
#include <winsock2.h>
|
|
#include <ws2tcpip.h>
|
|
#endif
|
|
|
|
#include "Common/Data/Encoding/Base64.h"
|
|
#include "Common/Net/HTTPServer.h"
|
|
#include "Common/Net/Sinks.h"
|
|
#include "Common/Net/WebsocketServer.h"
|
|
|
|
#include "Common/Crypto/sha1.h"
|
|
#include "Common/Log.h"
|
|
#include "Common/StringUtils.h"
|
|
|
|
static const char *const WEBSOCKET_GUID = "258EAFA5-E914-47DA-95CA-C5AB0DC85B11";
|
|
|
|
namespace net {
|
|
|
|
enum class Opcode {
|
|
CONTINUE = 0,
|
|
TEXT = 1,
|
|
BINARY = 2,
|
|
|
|
CLOSE = 8,
|
|
PING = 9,
|
|
PONG = 10,
|
|
|
|
PAYLOAD_MAX = 2,
|
|
CONTROL_MIN = 8,
|
|
CONTROL_MAX = 10,
|
|
};
|
|
|
|
static const size_t OUT_PRESSURE = 65536;
|
|
|
|
static inline std::string TrimString(const std::string &s) {
|
|
auto wsfront = std::find_if_not(s.begin(), s.end(), [](int c) {
|
|
// isspace() expects 0 - 255, so convert any sign-extended value.
|
|
return std::isspace(c & 0xFF);
|
|
});
|
|
auto wsback = std::find_if_not(s.rbegin(), s.rend(), [](int c){
|
|
return std::isspace(c & 0xFF);
|
|
}).base();
|
|
return wsback > wsfront ? std::string(wsfront, wsback) : std::string();
|
|
}
|
|
|
|
static bool ListContainsNoCase(const std::string &list, const std::string value) {
|
|
std::vector<std::string> split;
|
|
SplitString(list, ',', split);
|
|
|
|
for (auto item : split) {
|
|
std::transform(item.begin(), item.end(), item.begin(), tolower);
|
|
if (TrimString(item) == value) {
|
|
return true;
|
|
}
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
WebSocketServer *WebSocketServer::CreateAsUpgrade(const http::ServerRequest &request, const std::string &protocol) {
|
|
auto requireHeader = [&](const char *name, const char *expected) {
|
|
std::string val;
|
|
if (!request.GetHeader(name, &val)) {
|
|
return false;
|
|
}
|
|
return strcasecmp(val.c_str(), expected) == 0;
|
|
};
|
|
auto requireHeaderContains = [&](const char *name, const char *expected) {
|
|
std::string val;
|
|
if (!request.GetHeader(name, &val)) {
|
|
return false;
|
|
}
|
|
return ListContainsNoCase(val, expected);
|
|
};
|
|
|
|
if (!requireHeader("upgrade", "websocket") || !requireHeaderContains("connection", "upgrade")) {
|
|
request.WriteHttpResponseHeader("1.1", 400, -1, "text/plain");
|
|
request.Out()->Push("Must send a websocket request.");
|
|
return nullptr;
|
|
}
|
|
if (!requireHeader("sec-websocket-version", "13")) {
|
|
request.WriteHttpResponseHeader("1.1", 400, -1, "text/plain", "Sec-WebSocket-Version: 13\r\n");
|
|
request.Out()->Push("Unsupported version.");
|
|
return nullptr;
|
|
}
|
|
|
|
std::string requestedProtocols;
|
|
std::string obtainedProtocolHeader;
|
|
if (!protocol.empty() && request.GetHeader("sec-websocket-protocol", &requestedProtocols)) {
|
|
if (ListContainsNoCase(requestedProtocols, protocol)) {
|
|
obtainedProtocolHeader = "Sec-WebSocket-Protocol: " + protocol + "\r\n";
|
|
}
|
|
}
|
|
|
|
std::string key;
|
|
if (!request.GetHeader("sec-websocket-key", &key)) {
|
|
request.WriteHttpResponseHeader("1.1", 400, -1, "text/plain");
|
|
request.Out()->Push("Cannot accept without key.");
|
|
return nullptr;
|
|
}
|
|
|
|
key += WEBSOCKET_GUID;
|
|
unsigned char accept[20];
|
|
sha1((unsigned char *)key.c_str(), (int)key.size(), accept);
|
|
|
|
std::string acceptKey = Base64Encode(accept, 20);
|
|
std::string otherHeaders = StringFromFormat("Upgrade: websocket\r\nConnection: Upgrade\r\nSec-WebSocket-Accept: %s\r\n%s", acceptKey.c_str(), obtainedProtocolHeader.c_str());
|
|
|
|
// Okay, we're good to go then.
|
|
request.WriteHttpResponseHeader("1.1", 101, -1, "websocket", otherHeaders.c_str());
|
|
request.WritePartial();
|
|
|
|
return new WebSocketServer(request.fd(), request.In(), request.Out());
|
|
}
|
|
|
|
void WebSocketServer::Send(const std::string &str) {
|
|
_assert_(open_);
|
|
_assert_(fragmentOpcode_ == -1);
|
|
SendHeader(true, (int)Opcode::TEXT, str.size());
|
|
SendBytes(str.c_str(), str.size());
|
|
}
|
|
|
|
void WebSocketServer::Send(const std::vector<uint8_t> &payload) {
|
|
_assert_(open_);
|
|
_assert_(fragmentOpcode_ == -1);
|
|
SendHeader(true, (int)Opcode::BINARY, payload.size());
|
|
SendBytes((const char *)&payload[0], payload.size());
|
|
}
|
|
|
|
void WebSocketServer::AddFragment(bool finish, const std::string &str) {
|
|
_assert_(open_);
|
|
if (fragmentOpcode_ == -1) {
|
|
SendHeader(finish, (int)Opcode::TEXT, str.size());
|
|
fragmentOpcode_ = (int)Opcode::TEXT;
|
|
} else if (fragmentOpcode_ == (int)Opcode::TEXT) {
|
|
SendHeader(finish, (int)Opcode::CONTINUE, str.size());
|
|
} else {
|
|
_assert_(fragmentOpcode_ == (int)Opcode::TEXT || fragmentOpcode_ == -1);
|
|
}
|
|
SendBytes(str.c_str(), str.size());
|
|
if (finish) {
|
|
fragmentOpcode_ = -1;
|
|
}
|
|
}
|
|
|
|
void WebSocketServer::AddFragment(bool finish, const std::vector<uint8_t> &payload) {
|
|
_assert_(open_);
|
|
if (fragmentOpcode_ == -1) {
|
|
SendHeader(finish, (int)Opcode::BINARY, payload.size());
|
|
fragmentOpcode_ = (int)Opcode::BINARY;
|
|
} else if (fragmentOpcode_ == (int)Opcode::BINARY) {
|
|
SendHeader(finish, (int)Opcode::CONTINUE, payload.size());
|
|
} else {
|
|
_assert_(fragmentOpcode_ == (int)Opcode::BINARY || fragmentOpcode_ == -1);
|
|
}
|
|
SendBytes((const char *)&payload[0], payload.size());
|
|
if (finish) {
|
|
fragmentOpcode_ = -1;
|
|
}
|
|
}
|
|
|
|
void WebSocketServer::Ping(const std::vector<uint8_t> &payload) {
|
|
_assert_(open_);
|
|
_assert_(payload.size() <= 125);
|
|
SendHeader(true, (int)Opcode::PING, payload.size());
|
|
SendBytes((const char *)&payload[0], payload.size());
|
|
}
|
|
|
|
void WebSocketServer::Pong(const std::vector<uint8_t> &payload) {
|
|
_assert_(open_);
|
|
_assert_(payload.size() <= 125);
|
|
SendHeader(true, (int)Opcode::PONG, payload.size());
|
|
SendBytes((const char *)&payload[0], payload.size());
|
|
}
|
|
|
|
void WebSocketServer::Close(WebSocketClose reason) {
|
|
closeReason_ = reason;
|
|
if (reason == WebSocketClose::NO_STATUS) {
|
|
// This means we received a CLOSE without a code.
|
|
SendHeader(true, (int)Opcode::CLOSE, 0);
|
|
} else {
|
|
SendHeader(true, (int)Opcode::CLOSE, 2);
|
|
|
|
uint16_t r = (uint16_t)reason;
|
|
uint8_t reasonData[] = {
|
|
(uint8_t)((r >> 8) & 0xFF),
|
|
(uint8_t)((r >> 0) & 0xFF),
|
|
};
|
|
SendBytes((const char *)reasonData, sizeof(reasonData));
|
|
}
|
|
|
|
sentClose_ = true;
|
|
}
|
|
|
|
bool WebSocketServer::Process(float timeout) {
|
|
if (!open_) {
|
|
return false;
|
|
}
|
|
|
|
SendFlush();
|
|
|
|
if (outBuf_.empty() && out_->Empty() && sentClose_) {
|
|
// Okay, we've sent the close. Don't wait for anything else (whether we got a close or not.)
|
|
open_ = false;
|
|
return false;
|
|
}
|
|
|
|
struct timeval tv;
|
|
tv.tv_sec = floor(timeout);
|
|
tv.tv_usec = (timeout - floor(timeout)) * 1000000.0;
|
|
|
|
fd_set read;
|
|
FD_ZERO(&read);
|
|
// In case we closed due to protocol error, don't even try to read.
|
|
if (!sentClose_) {
|
|
FD_SET(fd_, &read);
|
|
}
|
|
|
|
fd_set write;
|
|
FD_ZERO(&write);
|
|
if (!outBuf_.empty() || !out_->Empty()) {
|
|
FD_SET(fd_, &write);
|
|
}
|
|
|
|
// First argument to select is the highest socket in the set + 1.
|
|
int rval = select((int)fd_ + 1, &read, &write, nullptr, &tv);
|
|
if (rval < 0) {
|
|
// Something went wrong with the select() call.
|
|
// TODO: Could be EINTR, for now returning true...
|
|
return true;
|
|
}
|
|
|
|
if (rval == 0) {
|
|
// Timed out.
|
|
return true;
|
|
}
|
|
|
|
if (FD_ISSET(fd_, &write)) {
|
|
SendFlush();
|
|
}
|
|
if (FD_ISSET(fd_, &read)) {
|
|
if (in_->Empty() && !in_->TryFill()) {
|
|
// Since select said it was readable, we assume this means disconnect.
|
|
closeReason_ = WebSocketClose::ABNORMAL;
|
|
open_ = false;
|
|
// Kill any remaining output too.
|
|
out_->Discard();
|
|
return false;
|
|
}
|
|
|
|
while (ReadFrames() && !in_->Empty())
|
|
continue;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
bool WebSocketServer::ReadFrames() {
|
|
if (pendingLeft_ != 0) {
|
|
return ReadPending();
|
|
}
|
|
|
|
return ReadFrame();
|
|
}
|
|
|
|
bool WebSocketServer::ReadFrame() {
|
|
_assert_(pendingLeft_ == 0);
|
|
|
|
// TODO: For now blocking on header trickle, shouldn't be common.
|
|
auto readExact = [&](void *p, size_t sz) {
|
|
if (!in_->TakeExact((char *)p, sz)) {
|
|
// TODO: Failing on too slow trickle timeout for now.
|
|
Close(WebSocketClose::POLICY_VIOLATION);
|
|
return false;
|
|
}
|
|
return true;
|
|
};
|
|
|
|
// Client frames are always between 6 and 14 bytes. We start with 6.
|
|
uint8_t header[14];
|
|
if (!readExact(header, 6))
|
|
return false;
|
|
|
|
// Don't allow reserved bits to be set, require masking.
|
|
if ((header[0] & 0x70) != 0 || (header[1] & 0x80) == 0) {
|
|
Close(WebSocketClose::PROTOCOL_ERROR);
|
|
return false;
|
|
}
|
|
|
|
const bool fin = (header[0] & 0x80) != 0;
|
|
const int opcode = header[0] & 0x0F;
|
|
uint64_t sz = header[1] & 0x7F;
|
|
const uint8_t *mask = &header[2];
|
|
|
|
if (opcode >= (int)Opcode::CONTROL_MIN && (sz > 125 || !fin)) {
|
|
// Control frames must be <= 125 bytes.
|
|
Close(WebSocketClose::PROTOCOL_ERROR);
|
|
return false;
|
|
}
|
|
|
|
if (opcode > (int)Opcode::CONTROL_MAX || (opcode > (int)Opcode::PAYLOAD_MAX && opcode < (int)Opcode::CONTROL_MIN)) {
|
|
// Undefined opcode.
|
|
Close(WebSocketClose::PROTOCOL_ERROR);
|
|
return false;
|
|
}
|
|
|
|
if (!pendingFin_ && opcode == (int)Opcode::CONTINUE) {
|
|
// Can't continue what you haven't started.
|
|
Close(WebSocketClose::PROTOCOL_ERROR);
|
|
return false;
|
|
}
|
|
if (pendingFin_ && opcode != (int)Opcode::CONTINUE && opcode < (int)Opcode::CONTROL_MIN) {
|
|
// Can't start something else until you finish your thought.
|
|
Close(WebSocketClose::PROTOCOL_ERROR);
|
|
return false;
|
|
}
|
|
|
|
if (sz == 126) {
|
|
// Read the rest of the mask.
|
|
if (!readExact((char *)&header[6], 2))
|
|
return false;
|
|
|
|
mask = &header[4];
|
|
sz = (header[2] << 8) | (header[3] << 0);
|
|
} else if (sz == 127) {
|
|
// We only have half the size so far - read the rest, and the mask.
|
|
if (!readExact((char *)&header[6], 8))
|
|
return false;
|
|
|
|
mask = &header[10];
|
|
// Read from big endian.
|
|
uint64_t high = (header[2] << 24) | (header[3] << 16) | (header[4] << 8) | (header[5] << 0);
|
|
uint64_t low = (header[6] << 24) | (header[7] << 16) | (header[8] << 8) | (header[9] << 0);
|
|
sz = (high << 32) | low;
|
|
|
|
if ((sz & 0x8000000000000000ULL) != 0) {
|
|
Close(WebSocketClose::PROTOCOL_ERROR);
|
|
return false;
|
|
}
|
|
}
|
|
|
|
if (opcode >= (int)Opcode::CONTROL_MIN) {
|
|
// It's safe to overwrite this since we can be between fragmented frames, but not inside a frame.
|
|
memcpy(pendingMask_, mask, sizeof(pendingMask_));
|
|
return ReadControlFrame(opcode, sz);
|
|
}
|
|
|
|
// The data could be split among many TCP packets, so read it as it comes.
|
|
if (!pendingFin_)
|
|
pendingOpcode_ = opcode;
|
|
pendingFin_ = !fin;
|
|
pendingLeft_ = sz;
|
|
memcpy(pendingMask_, mask, sizeof(pendingMask_));
|
|
|
|
// Payload data is actually read in ReadPending().
|
|
return true;
|
|
}
|
|
|
|
bool WebSocketServer::ReadPending() {
|
|
size_t pos = pendingBuf_.size();
|
|
pendingBuf_.resize(pendingBuf_.size() + pendingLeft_);
|
|
|
|
// Read what we can.
|
|
size_t readBytes = in_->TakeAtMost((char *)&pendingBuf_[pos], pendingLeft_);
|
|
for (size_t i = 0; i < readBytes; ++i) {
|
|
pendingBuf_[pos + i] ^= pendingMask_[i & 3];
|
|
}
|
|
pendingLeft_ -= readBytes;
|
|
|
|
if (pendingLeft_ != 0) {
|
|
// Still more to read. Careful: we might need to rotate the mask.
|
|
// Example: if we read only 3 bytes, next read should start at fourth byte in mask.
|
|
int offset = readBytes & 3;
|
|
if (offset) {
|
|
uint8_t orig[4];
|
|
memcpy(orig, pendingMask_, sizeof(orig));
|
|
for (size_t i = 0; i < sizeof(orig); ++i) {
|
|
pendingMask_[i] = orig[(offset + i) & 3];
|
|
}
|
|
}
|
|
|
|
// Truncate out the unread bytes for next time.
|
|
pendingBuf_.resize(pos + readBytes);
|
|
return true;
|
|
}
|
|
|
|
// We're done, but were we waiting for a FIN packet?
|
|
if (pendingFin_)
|
|
return true;
|
|
|
|
if (pendingOpcode_ == (int)Opcode::TEXT) {
|
|
if (text_) {
|
|
text_(std::string(pendingBuf_.begin(), pendingBuf_.end()));
|
|
}
|
|
} else if (pendingOpcode_ == (int)Opcode::BINARY) {
|
|
if (binary_) {
|
|
binary_(pendingBuf_);
|
|
}
|
|
} else {
|
|
_assert_(false);
|
|
}
|
|
|
|
// All done, clear it out.
|
|
pendingBuf_.clear();
|
|
pendingOpcode_ = -1;
|
|
|
|
return true;
|
|
}
|
|
|
|
bool WebSocketServer::ReadControlFrame(int opcode, size_t sz) {
|
|
std::vector<uint8_t> payload;
|
|
payload.resize(sz);
|
|
// Just block here to read the payload.
|
|
if (!in_->TakeExact((char *)&payload[0], sz)) {
|
|
// TODO: Failing on too slow trickle timeout for now.
|
|
Close(WebSocketClose::POLICY_VIOLATION);
|
|
return false;
|
|
}
|
|
|
|
for (size_t i = 0; i < sz; ++i) {
|
|
payload[i] ^= pendingMask_[i & 3];
|
|
}
|
|
|
|
if (opcode == (int)Opcode::PING) {
|
|
Pong(payload);
|
|
// Try to send immediately if possible, but don't block.
|
|
SendFlush();
|
|
|
|
if (ping_) {
|
|
ping_(payload);
|
|
}
|
|
} else if (opcode == (int)Opcode::PONG) {
|
|
if (pong_) {
|
|
pong_(payload);
|
|
}
|
|
} else if (opcode == (int)Opcode::CLOSE) {
|
|
if (payload.size() >= 2) {
|
|
uint16_t reason = (payload[0] << 8) | payload[1];
|
|
// Send back a close right away.
|
|
Close(WebSocketClose(reason));
|
|
} else {
|
|
Close(WebSocketClose::NO_STATUS);
|
|
}
|
|
// Don't read anything more.
|
|
return false;
|
|
} else {
|
|
_assert_(false);
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
void WebSocketServer::SendHeader(bool fin, int opcode, size_t sz) {
|
|
_assert_((opcode & 0x0F) == opcode);
|
|
uint8_t frameHeader = (fin ? 0x80 : 0x00) | opcode;
|
|
SendBytes(&frameHeader, 1);
|
|
|
|
// We never mask from the server.
|
|
if (sz <= 125) {
|
|
uint8_t frameSize = (int8_t)sz;
|
|
SendBytes(&frameSize, 1);
|
|
} else if (sz <= 0xFFFF) {
|
|
uint8_t frameSize[] = {
|
|
126,
|
|
(uint8_t)((sz >> 8) & 0xFF),
|
|
(uint8_t)((sz >> 0) & 0xFF),
|
|
};
|
|
SendBytes(frameSize, sizeof(frameSize));
|
|
} else {
|
|
uint64_t sz64 = sz;
|
|
_assert_((sz64 & 0x8000000000000000ULL) == 0);
|
|
uint8_t frameSize[] = {
|
|
127,
|
|
(uint8_t)((sz64 >> 56) & 0xFF),
|
|
(uint8_t)((sz64 >> 48) & 0xFF),
|
|
(uint8_t)((sz64 >> 40) & 0xFF),
|
|
(uint8_t)((sz64 >> 32) & 0xFF),
|
|
(uint8_t)((sz64 >> 24) & 0xFF),
|
|
(uint8_t)((sz64 >> 16) & 0xFF),
|
|
(uint8_t)((sz64 >> 8) & 0xFF),
|
|
(uint8_t)((sz64 >> 0) & 0xFF),
|
|
};
|
|
SendBytes(frameSize, sizeof(frameSize));
|
|
}
|
|
}
|
|
|
|
void WebSocketServer::SendBytes(const void *p, size_t sz) {
|
|
const char *data = (const char *)p;
|
|
if (outBuf_.empty()) {
|
|
size_t pushed = out_->PushAtMost(data, sz);
|
|
data += pushed;
|
|
sz -= pushed;
|
|
}
|
|
|
|
if (sz != 0) {
|
|
size_t pos = outBuf_.size();
|
|
outBuf_.resize(pos + sz);
|
|
memcpy(&outBuf_[pos], data, sz);
|
|
|
|
if (pos + sz > lastPressure_ + OUT_PRESSURE) {
|
|
size_t pushed = out_->PushAtMost((const char *)&outBuf_[0], outBuf_.size());
|
|
if (pushed != 0) {
|
|
outBuf_.erase(outBuf_.begin(), outBuf_.begin() + pushed);
|
|
}
|
|
lastPressure_ = outBuf_.size();
|
|
}
|
|
}
|
|
}
|
|
|
|
void WebSocketServer::SendFlush() {
|
|
out_->Flush(false);
|
|
|
|
// Drain out as much of our buffer as possible.
|
|
size_t totalPushed = 0;
|
|
while (outBuf_.size() - totalPushed != 0) {
|
|
size_t pushed = out_->PushAtMost((const char *)&outBuf_[totalPushed], outBuf_.size() - totalPushed);
|
|
if (pushed == 0)
|
|
break;
|
|
|
|
totalPushed += pushed;
|
|
out_->Flush(false);
|
|
}
|
|
|
|
if (totalPushed != 0) {
|
|
// Hopefully this is usually the entire buffer.
|
|
outBuf_.erase(outBuf_.begin(), outBuf_.begin() + totalPushed);
|
|
}
|
|
lastPressure_ = outBuf_.size();
|
|
}
|
|
|
|
};
|