mirror of
https://github.com/oven-sh/bun
synced 2026-02-10 10:58:56 +00:00
1504 lines
58 KiB
C++
1504 lines
58 KiB
C++
/*
|
|
* Copyright (C) 2011 Google Inc. All rights reserved.
|
|
* Copyright (C) 2015-2016 Apple Inc. All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions are
|
|
* met:
|
|
*
|
|
* * Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* * Redistributions in binary form must reproduce the above
|
|
* copyright notice, this list of conditions and the following disclaimer
|
|
* in the documentation and/or other materials provided with the
|
|
* distribution.
|
|
* * Neither the name of Google Inc. nor the names of its
|
|
* contributors may be used to endorse or promote products derived from
|
|
* this software without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
|
|
* A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
|
|
* OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
|
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
|
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*/
|
|
|
|
#include "config.h"
|
|
#include "WebSocket.h"
|
|
#include "headers.h"
|
|
// #include "Blob.h"
|
|
#include "CloseEvent.h"
|
|
// #include "ContentSecurityPolicy.h"
|
|
// #include "DOMWindow.h"
|
|
// #include "Document.h"
|
|
#include "Event.h"
|
|
#include "EventListener.h"
|
|
#include "EventNames.h"
|
|
// #include "Frame.h"
|
|
// #include "FrameLoader.h"
|
|
// #include "FrameLoaderClient.h"
|
|
// #include "InspectorInstrumentation.h"
|
|
// #include "Logging.h"
|
|
#include "MessageEvent.h"
|
|
// #include "MixedContentChecker.h"
|
|
// #include "ResourceLoadObserver.h"
|
|
// #include "ScriptController.h"
|
|
#include "ScriptExecutionContext.h"
|
|
// #include "SecurityOrigin.h"
|
|
// #include "SocketProvider.h"
|
|
// #include "ThreadableWebSocketChannel.h"
|
|
// #include "WebSocketChannel.h"
|
|
// #include "WorkerGlobalScope.h"
|
|
// #include "WorkerLoaderProxy.h"
|
|
// #include "WorkerThread.h"
|
|
#include <JavaScriptCore/ArrayBuffer.h>
|
|
#include <JavaScriptCore/ArrayBufferView.h>
|
|
#include <JavaScriptCore/ScriptCallStack.h>
|
|
#include <wtf/HashSet.h>
|
|
#include <wtf/HexNumber.h>
|
|
// #include <wtf/IsoMallocInlines.h>
|
|
#include <wtf/NeverDestroyed.h>
|
|
// #include <wtf/RunLoop.h>
|
|
#include <wtf/StdLibExtras.h>
|
|
#include <wtf/text/CString.h>
|
|
#include <wtf/text/StringBuilder.h>
|
|
|
|
#include "JSBuffer.h"
|
|
#include "ErrorEvent.h"
|
|
|
|
// #if USE(WEB_THREAD)
|
|
// #include "WebCoreThreadRun.h"
|
|
// #endif
|
|
|
|
namespace WebCore {
|
|
WTF_MAKE_ISO_ALLOCATED_IMPL(WebSocket);
|
|
|
|
extern "C" bool Bun__defaultRejectUnauthorized(JSGlobalObject* lexicalGlobalObject);
|
|
static size_t getFramingOverhead(size_t payloadSize)
|
|
{
|
|
static const size_t hybiBaseFramingOverhead = 2; // Every frame has at least two-byte header.
|
|
static const size_t hybiMaskingKeyLength = 4; // Every frame from client must have masking key.
|
|
static const size_t minimumPayloadSizeWithTwoByteExtendedPayloadLength = 126;
|
|
static const size_t minimumPayloadSizeWithEightByteExtendedPayloadLength = 0x10000;
|
|
size_t overhead = hybiBaseFramingOverhead + hybiMaskingKeyLength;
|
|
if (payloadSize >= minimumPayloadSizeWithEightByteExtendedPayloadLength)
|
|
overhead += 8;
|
|
else if (payloadSize >= minimumPayloadSizeWithTwoByteExtendedPayloadLength)
|
|
overhead += 2;
|
|
return overhead;
|
|
}
|
|
|
|
const size_t maxReasonSizeInBytes = 123;
|
|
|
|
static inline bool isValidProtocolCharacter(UChar character)
|
|
{
|
|
// Hybi-10 says "(Subprotocol string must consist of) characters in the range U+0021 to U+007E not including
|
|
// separator characters as defined in [RFC2616]."
|
|
const UChar minimumProtocolCharacter = '!'; // U+0021.
|
|
const UChar maximumProtocolCharacter = '~'; // U+007E.
|
|
return character >= minimumProtocolCharacter && character <= maximumProtocolCharacter
|
|
&& character != '"' && character != '(' && character != ')' && character != ',' && character != '/'
|
|
&& !(character >= ':' && character <= '@') // U+003A - U+0040 (':', ';', '<', '=', '>', '?', '@').
|
|
&& !(character >= '[' && character <= ']') // U+005B - U+005D ('[', '\\', ']').
|
|
&& character != '{' && character != '}';
|
|
}
|
|
|
|
static bool isValidProtocolString(StringView protocol)
|
|
{
|
|
if (protocol.isEmpty())
|
|
return false;
|
|
for (auto codeUnit : protocol.codeUnits()) {
|
|
if (!isValidProtocolCharacter(codeUnit))
|
|
return false;
|
|
}
|
|
return true;
|
|
}
|
|
|
|
static String encodeProtocolString(const String& protocol)
|
|
{
|
|
StringBuilder builder;
|
|
for (size_t i = 0; i < protocol.length(); i++) {
|
|
if (protocol[i] < 0x20 || protocol[i] > 0x7E)
|
|
builder.append("\\u", hex(protocol[i], 4));
|
|
else if (protocol[i] == 0x5c)
|
|
builder.append("\\\\"_s);
|
|
else
|
|
builder.append(protocol[i]);
|
|
}
|
|
return builder.toString();
|
|
}
|
|
|
|
static String joinStrings(const Vector<String>& strings, ASCIILiteral separator)
|
|
{
|
|
StringBuilder builder;
|
|
for (size_t i = 0; i < strings.size(); ++i) {
|
|
if (i)
|
|
builder.append(separator);
|
|
builder.append(strings[i]);
|
|
}
|
|
return builder.toString();
|
|
}
|
|
|
|
static unsigned saturateAdd(unsigned a, unsigned b)
|
|
{
|
|
if (std::numeric_limits<unsigned>::max() - a < b)
|
|
return std::numeric_limits<unsigned>::max();
|
|
return a + b;
|
|
}
|
|
|
|
ASCIILiteral WebSocket::subprotocolSeparator()
|
|
{
|
|
return ", "_s;
|
|
}
|
|
|
|
WebSocket::WebSocket(ScriptExecutionContext& context)
|
|
: ContextDestructionObserver(&context)
|
|
, m_subprotocol(emptyString())
|
|
, m_extensions(emptyString())
|
|
{
|
|
m_state = CONNECTING;
|
|
m_hasPendingActivity.store(true);
|
|
m_rejectUnauthorized = Bun__defaultRejectUnauthorized(context.jsGlobalObject());
|
|
}
|
|
|
|
WebSocket::~WebSocket()
|
|
{
|
|
if (m_upgradeClient != nullptr) {
|
|
void* upgradeClient = m_upgradeClient;
|
|
if (m_isSecure) {
|
|
Bun__WebSocketHTTPSClient__cancel(reinterpret_cast<void*>(upgradeClient));
|
|
} else {
|
|
Bun__WebSocketHTTPClient__cancel(reinterpret_cast<void*>(upgradeClient));
|
|
}
|
|
}
|
|
|
|
switch (m_connectedWebSocketKind) {
|
|
case ConnectedWebSocketKind::Client: {
|
|
Bun__WebSocketClient__finalize(reinterpret_cast<void*>(this->m_connectedWebSocket.client));
|
|
break;
|
|
}
|
|
case ConnectedWebSocketKind::ClientSSL: {
|
|
Bun__WebSocketClientTLS__finalize(reinterpret_cast<void*>(this->m_connectedWebSocket.clientSSL));
|
|
break;
|
|
}
|
|
// case ConnectedWebSocketKind::Server: {
|
|
// this->m_connectedWebSocket.server->end(None);
|
|
// break;
|
|
// }
|
|
// case ConnectedWebSocketKind::ServerSSL: {
|
|
// this->m_connectedWebSocket.serverSSL->end(None);
|
|
// break;
|
|
// }
|
|
default: {
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
ExceptionOr<Ref<WebSocket>> WebSocket::create(ScriptExecutionContext& context, const String& url)
|
|
{
|
|
return create(context, url, Vector<String> {}, std::nullopt);
|
|
}
|
|
|
|
ExceptionOr<Ref<WebSocket>> WebSocket::create(ScriptExecutionContext& context, const String& url, const Vector<String>& protocols)
|
|
{
|
|
return create(context, url, protocols, std::nullopt);
|
|
}
|
|
|
|
ExceptionOr<Ref<WebSocket>> WebSocket::create(ScriptExecutionContext& context, const String& url, const Vector<String>& protocols, std::optional<FetchHeaders::Init>&& headers)
|
|
{
|
|
if (url.isNull())
|
|
return Exception { SyntaxError };
|
|
|
|
auto socket = adoptRef(*new WebSocket(context));
|
|
// socket->suspendIfNeeded();
|
|
|
|
auto result = socket->connect(url, protocols, WTFMove(headers));
|
|
// auto result = socket->connect(url, protocols);
|
|
|
|
if (result.hasException())
|
|
return result.releaseException();
|
|
|
|
return socket;
|
|
}
|
|
ExceptionOr<Ref<WebSocket>> WebSocket::create(ScriptExecutionContext& context, const String& url, const Vector<String>& protocols, std::optional<FetchHeaders::Init>&& headers, bool rejectUnauthorized)
|
|
{
|
|
if (url.isNull())
|
|
return Exception { SyntaxError };
|
|
|
|
auto socket = adoptRef(*new WebSocket(context));
|
|
socket->setRejectUnauthorized(rejectUnauthorized);
|
|
// socket->suspendIfNeeded();
|
|
|
|
auto result = socket->connect(url, protocols, WTFMove(headers));
|
|
// auto result = socket->connect(url, protocols);
|
|
|
|
if (result.hasException())
|
|
return result.releaseException();
|
|
|
|
return socket;
|
|
}
|
|
|
|
ExceptionOr<Ref<WebSocket>> WebSocket::create(ScriptExecutionContext& context, const String& url, const String& protocol)
|
|
{
|
|
return create(context, url, Vector<String> { 1, protocol });
|
|
}
|
|
|
|
ExceptionOr<void> WebSocket::connect(const String& url)
|
|
{
|
|
return connect(url, Vector<String> {}, std::nullopt);
|
|
}
|
|
|
|
ExceptionOr<void> WebSocket::connect(const String& url, const String& protocol)
|
|
{
|
|
return connect(url, Vector<String> { 1, protocol }, std::nullopt);
|
|
}
|
|
|
|
static String resourceName(const URL& url)
|
|
{
|
|
auto path = url.path();
|
|
auto result = makeString(
|
|
path,
|
|
path.isEmpty() ? "/" : "",
|
|
url.queryWithLeadingQuestionMark());
|
|
ASSERT(!result.isEmpty());
|
|
ASSERT(!result.contains(' '));
|
|
return result;
|
|
}
|
|
|
|
static String hostName(const URL& url, bool secure)
|
|
{
|
|
// ASSERT(url.protocolIs("wss"_s) == secure);
|
|
if (url.port() && ((!secure && url.port().value() != 80) || (secure && url.port().value() != 443)))
|
|
return makeString(asASCIILowercase(url.host()), ':', url.port().value());
|
|
return url.host().convertToASCIILowercase();
|
|
}
|
|
|
|
ExceptionOr<void> WebSocket::connect(const String& url, const Vector<String>& protocols)
|
|
{
|
|
return connect(url, protocols, std::nullopt);
|
|
}
|
|
|
|
ExceptionOr<void> WebSocket::connect(const String& url, const Vector<String>& protocols, std::optional<FetchHeaders::Init>&& headersInit)
|
|
{
|
|
// LOG(Network, "WebSocket %p connect() url='%s'", this, url.utf8().data());
|
|
m_url = URL { url };
|
|
|
|
ASSERT(scriptExecutionContext());
|
|
|
|
if (!m_url.isValid()) {
|
|
// context.addConsoleMessage(MessageSource::JS, MessageLevel::Error, );
|
|
m_state = CLOSED;
|
|
updateHasPendingActivity();
|
|
return Exception { SyntaxError, makeString("Invalid url for WebSocket "_s, m_url.stringCenterEllipsizedToLength()) };
|
|
}
|
|
|
|
bool is_secure = m_url.protocolIs("wss"_s) || m_url.protocolIs("https"_s);
|
|
|
|
if (!m_url.protocolIs("http"_s) && !m_url.protocolIs("ws"_s) && !is_secure) {
|
|
// context.addConsoleMessage(MessageSource::JS, MessageLevel::Error, );
|
|
m_state = CLOSED;
|
|
updateHasPendingActivity();
|
|
return Exception { SyntaxError, makeString("Wrong url scheme for WebSocket "_s, m_url.stringCenterEllipsizedToLength()) };
|
|
}
|
|
if (m_url.hasFragmentIdentifier()) {
|
|
// context.addConsoleMessage(MessageSource::JS, MessageLevel::Error, );
|
|
m_state = CLOSED;
|
|
updateHasPendingActivity();
|
|
return Exception { SyntaxError, makeString("URL has fragment component "_s, m_url.stringCenterEllipsizedToLength()) };
|
|
}
|
|
|
|
// ASSERT(context.contentSecurityPolicy());
|
|
// auto& contentSecurityPolicy = *context.contentSecurityPolicy();
|
|
|
|
// contentSecurityPolicy.upgradeInsecureRequestIfNeeded(m_url, ContentSecurityPolicy::InsecureRequestType::Load);
|
|
|
|
// if (!portAllowed(m_url)) {
|
|
// String message;
|
|
// if (m_url.port())
|
|
// message = makeString("WebSocket port ", m_url.port().value(), " blocked");
|
|
// else
|
|
// message = "WebSocket without port blocked"_s;
|
|
// context.addConsoleMessage(MessageSource::JS, MessageLevel::Error, message);
|
|
// failAsynchronously();
|
|
// return {};
|
|
// }
|
|
|
|
// FIXME: Convert this to check the isolated world's Content Security Policy once webkit.org/b/104520 is solved.
|
|
// if (!context.shouldBypassMainWorldContentSecurityPolicy() && !contentSecurityPolicy.allowConnectToSource(m_url)) {
|
|
// m_state = CLOSED;
|
|
|
|
// // FIXME: Should this be throwing an exception?
|
|
// return Exception { SecurityError };
|
|
// }
|
|
|
|
// FIXME: There is a disagreement about restriction of subprotocols between WebSocket API and hybi-10 protocol
|
|
// draft. The former simply says "only characters in the range U+0021 to U+007E are allowed," while the latter
|
|
// imposes a stricter rule: "the elements MUST be non-empty strings with characters as defined in [RFC2616],
|
|
// and MUST all be unique strings."
|
|
//
|
|
// Here, we throw SyntaxError if the given protocols do not meet the latter criteria. This behavior does not
|
|
// comply with WebSocket API specification, but it seems to be the only reasonable way to handle this conflict.
|
|
for (auto& protocol : protocols) {
|
|
if (!isValidProtocolString(protocol)) {
|
|
// context.addConsoleMessage(MessageSource::JS, MessageLevel::Error, );
|
|
m_state = CLOSED;
|
|
updateHasPendingActivity();
|
|
return Exception { SyntaxError, makeString("Wrong protocol for WebSocket '"_s, encodeProtocolString(protocol), "'"_s) };
|
|
}
|
|
}
|
|
HashSet<String> visited;
|
|
for (auto& protocol : protocols) {
|
|
if (!visited.add(protocol).isNewEntry) {
|
|
// context.addConsoleMessage(MessageSource::JS, MessageLevel::Error, );
|
|
m_state = CLOSED;
|
|
updateHasPendingActivity();
|
|
return Exception { SyntaxError, makeString("WebSocket protocols contain duplicates:"_s, encodeProtocolString(protocol), "'"_s) };
|
|
}
|
|
}
|
|
|
|
// RunLoop::main().dispatch([targetURL = m_url.isolatedCopy(), mainFrameURL = context.url().isolatedCopy()]() {
|
|
// ResourceLoadObserver::shared().logWebSocketLoading(targetURL, mainFrameURL);
|
|
// });
|
|
|
|
// if (is<Document>(context)) {
|
|
// Document& document = downcast<Document>(context);
|
|
// RefPtr<Frame> frame = document.frame();
|
|
// // FIXME: make the mixed content check equivalent to the non-document mixed content check currently in WorkerThreadableWebSocketChannel::Bridge::connect()
|
|
// if (!frame || !MixedContentChecker::canRunInsecureContent(*frame, document.securityOrigin(), m_url)) {
|
|
// failAsynchronously();
|
|
// return { };
|
|
// }
|
|
// }
|
|
|
|
String protocolString;
|
|
if (!protocols.isEmpty())
|
|
protocolString = joinStrings(protocols, subprotocolSeparator());
|
|
|
|
ZigString host = Zig::toZigString(m_url.host());
|
|
auto resource = resourceName(m_url);
|
|
ZigString path = Zig::toZigString(resource);
|
|
ZigString clientProtocolString = Zig::toZigString(protocolString);
|
|
uint16_t port = is_secure ? 443 : 80;
|
|
if (auto userPort = m_url.port()) {
|
|
port = userPort.value();
|
|
}
|
|
|
|
Vector<ZigString, 8> headerNames;
|
|
Vector<ZigString, 8> headerValues;
|
|
|
|
auto headersOrException = FetchHeaders::create(WTFMove(headersInit));
|
|
if (UNLIKELY(headersOrException.hasException())) {
|
|
m_state = CLOSED;
|
|
updateHasPendingActivity();
|
|
return headersOrException.releaseException();
|
|
}
|
|
|
|
auto headers = headersOrException.releaseReturnValue();
|
|
headerNames.reserveInitialCapacity(headers.get().internalHeaders().size());
|
|
headerValues.reserveInitialCapacity(headers.get().internalHeaders().size());
|
|
auto iterator = headers.get().createIterator();
|
|
while (auto value = iterator.next()) {
|
|
headerNames.unsafeAppendWithoutCapacityCheck(Zig::toZigString(value->key));
|
|
headerValues.unsafeAppendWithoutCapacityCheck(Zig::toZigString(value->value));
|
|
}
|
|
|
|
m_isSecure = is_secure;
|
|
this->incPendingActivityCount();
|
|
|
|
if (is_secure) {
|
|
us_socket_context_t* ctx = scriptExecutionContext()->webSocketContext<true>();
|
|
RELEASE_ASSERT(ctx);
|
|
this->m_upgradeClient = Bun__WebSocketHTTPSClient__connect(scriptExecutionContext()->jsGlobalObject(), ctx, reinterpret_cast<CppWebSocket*>(this), &host, port, &path, &clientProtocolString, headerNames.data(), headerValues.data(), headerNames.size());
|
|
} else {
|
|
us_socket_context_t* ctx = scriptExecutionContext()->webSocketContext<false>();
|
|
RELEASE_ASSERT(ctx);
|
|
this->m_upgradeClient = Bun__WebSocketHTTPClient__connect(scriptExecutionContext()->jsGlobalObject(), ctx, reinterpret_cast<CppWebSocket*>(this), &host, port, &path, &clientProtocolString, headerNames.data(), headerValues.data(), headerNames.size());
|
|
}
|
|
|
|
headerValues.clear();
|
|
headerNames.clear();
|
|
|
|
if (this->m_upgradeClient == nullptr) {
|
|
m_state = CLOSED;
|
|
if (auto* context = scriptExecutionContext()) {
|
|
context->postTask([this, protectedThis = Ref { *this }](ScriptExecutionContext& context) {
|
|
ASSERT(scriptExecutionContext());
|
|
protectedThis->dispatchEvent(Event::create(eventNames().errorEvent, Event::CanBubble::No, Event::IsCancelable::No));
|
|
protectedThis->dispatchEvent(CloseEvent::create(false, 1006, "Failed to connect"_s));
|
|
protectedThis->decPendingActivityCount();
|
|
});
|
|
}
|
|
return {};
|
|
}
|
|
|
|
m_state = CONNECTING;
|
|
|
|
// #if ENABLE(INTELLIGENT_TRACKING_PREVENTION)
|
|
// auto reportRegistrableDomain = [domain = RegistrableDomain(m_url).isolatedCopy()](auto& context) mutable {
|
|
// if (auto* frame = downcast<Document>(context).frame())
|
|
// frame->loader().client().didLoadFromRegistrableDomain(WTFMove(domain));
|
|
// };
|
|
// if (is<Document>(context))
|
|
// reportRegistrableDomain(context);
|
|
// else
|
|
// downcast<WorkerGlobalScope>(context).thread().workerLoaderProxy().postTaskToLoader(WTFMove(reportRegistrableDomain));
|
|
// #endif
|
|
|
|
// m_pendingActivity = makePendingActivity(*this);
|
|
updateHasPendingActivity();
|
|
return {};
|
|
}
|
|
|
|
ExceptionOr<void> WebSocket::send(const String& message)
|
|
{
|
|
// LOG(Network, "WebSocket %p send() Sending String '%s'", this, message.utf8().data());
|
|
if (m_state == CONNECTING)
|
|
return Exception { InvalidStateError };
|
|
// No exception is raised if the connection was once established but has subsequently been closed.
|
|
if (m_state == CLOSING || m_state == CLOSED) {
|
|
auto utf8 = message.utf8(StrictConversionReplacingUnpairedSurrogatesWithFFFD);
|
|
size_t payloadSize = utf8.length();
|
|
m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, payloadSize);
|
|
m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, getFramingOverhead(payloadSize));
|
|
return {};
|
|
}
|
|
|
|
this->sendWebSocketString(message, Opcode::Text);
|
|
|
|
return {};
|
|
}
|
|
|
|
ExceptionOr<void> WebSocket::send(ArrayBuffer& binaryData)
|
|
{
|
|
// LOG(Network, "WebSocket %p send() Sending ArrayBuffer %p", this, &binaryData);
|
|
if (m_state == CONNECTING)
|
|
return Exception { InvalidStateError };
|
|
if (m_state == CLOSING || m_state == CLOSED) {
|
|
unsigned payloadSize = binaryData.byteLength();
|
|
m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, payloadSize);
|
|
m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, getFramingOverhead(payloadSize));
|
|
return {};
|
|
}
|
|
char* data = static_cast<char*>(binaryData.data());
|
|
size_t length = binaryData.byteLength();
|
|
|
|
this->sendWebSocketData(data, length, Opcode::Binary);
|
|
|
|
return {};
|
|
}
|
|
|
|
ExceptionOr<void> WebSocket::send(ArrayBufferView& arrayBufferView)
|
|
{
|
|
// LOG(Network, "WebSocket %p send() Sending ArrayBufferView %p", this, &arrayBufferView);
|
|
|
|
if (m_state == CONNECTING)
|
|
return Exception { InvalidStateError };
|
|
if (m_state == CLOSING || m_state == CLOSED) {
|
|
unsigned payloadSize = arrayBufferView.byteLength();
|
|
m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, payloadSize);
|
|
m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, getFramingOverhead(payloadSize));
|
|
return {};
|
|
}
|
|
|
|
auto buffer = arrayBufferView.unsharedBuffer().get();
|
|
char* baseAddress = reinterpret_cast<char*>(buffer->data()) + arrayBufferView.byteOffset();
|
|
size_t length = arrayBufferView.byteLength();
|
|
this->sendWebSocketData(baseAddress, length, Opcode::Binary);
|
|
|
|
return {};
|
|
}
|
|
|
|
// ExceptionOr<void> WebSocket::send(Blob& binaryData)
|
|
// {
|
|
// LOG(Network, "WebSocket %p send() Sending Blob '%s'", this, binaryData.url().stringCenterEllipsizedToLength().utf8().data());
|
|
// if (m_state == CONNECTING)
|
|
// return Exception { InvalidStateError };
|
|
// if (m_state == CLOSING || m_state == CLOSED) {
|
|
// unsigned payloadSize = static_cast<unsigned>(binaryData.size());
|
|
// m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, payloadSize);
|
|
// m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, getFramingOverhead(payloadSize));
|
|
// return {};
|
|
// }
|
|
// m_bufferedAmount = saturateAdd(m_bufferedAmount, binaryData.size());
|
|
// ASSERT(m_channel);
|
|
// m_channel->send(binaryData);
|
|
// return {};
|
|
// }
|
|
|
|
void WebSocket::sendWebSocketData(const char* baseAddress, size_t length, const Opcode op)
|
|
{
|
|
switch (m_connectedWebSocketKind) {
|
|
case ConnectedWebSocketKind::Client: {
|
|
Bun__WebSocketClient__writeBinaryData(this->m_connectedWebSocket.client, reinterpret_cast<const unsigned char*>(baseAddress), length, static_cast<uint8_t>(op));
|
|
// this->m_connectedWebSocket.client->send({ baseAddress, length }, opCode);
|
|
// this->m_bufferedAmount = this->m_connectedWebSocket.client->getBufferedAmount();
|
|
break;
|
|
}
|
|
case ConnectedWebSocketKind::ClientSSL: {
|
|
Bun__WebSocketClientTLS__writeBinaryData(this->m_connectedWebSocket.clientSSL, reinterpret_cast<const unsigned char*>(baseAddress), length, static_cast<uint8_t>(op));
|
|
break;
|
|
}
|
|
// case ConnectedWebSocketKind::Server: {
|
|
// this->m_connectedWebSocket.server->send({ baseAddress, length }, opCode);
|
|
// this->m_bufferedAmount = this->m_connectedWebSocket.server->getBufferedAmount();
|
|
// break;
|
|
// }
|
|
// case ConnectedWebSocketKind::ServerSSL: {
|
|
// this->m_connectedWebSocket.serverSSL->send({ baseAddress, length }, opCode);
|
|
// this->m_bufferedAmount = this->m_connectedWebSocket.serverSSL->getBufferedAmount();
|
|
// break;
|
|
// }
|
|
default: {
|
|
RELEASE_ASSERT_NOT_REACHED();
|
|
}
|
|
}
|
|
}
|
|
|
|
void WebSocket::sendWebSocketString(const String& message, const Opcode op)
|
|
{
|
|
switch (m_connectedWebSocketKind) {
|
|
case ConnectedWebSocketKind::Client: {
|
|
auto zigStr = Zig::toZigString(message);
|
|
Bun__WebSocketClient__writeString(this->m_connectedWebSocket.client, &zigStr, static_cast<uint8_t>(op));
|
|
// this->m_connectedWebSocket.client->send({ baseAddress, length }, opCode);
|
|
// this->m_bufferedAmount = this->m_connectedWebSocket.client->getBufferedAmount();
|
|
break;
|
|
}
|
|
case ConnectedWebSocketKind::ClientSSL: {
|
|
auto zigStr = Zig::toZigString(message);
|
|
Bun__WebSocketClientTLS__writeString(this->m_connectedWebSocket.clientSSL, &zigStr, static_cast<uint8_t>(op));
|
|
break;
|
|
}
|
|
// case ConnectedWebSocketKind::Server: {
|
|
// auto utf8 = message.utf8(StrictConversionReplacingUnpairedSurrogatesWithFFFD);
|
|
// this->m_connectedWebSocket.server->send({ utf8.data(), utf8.length() }, uWS::OpCode::TEXT);
|
|
// this->m_bufferedAmount = this->m_connectedWebSocket.server->getBufferedAmount();
|
|
// break;
|
|
// }
|
|
// case ConnectedWebSocketKind::ServerSSL: {
|
|
// auto utf8 = message.utf8(StrictConversionReplacingUnpairedSurrogatesWithFFFD);
|
|
// this->m_connectedWebSocket.serverSSL->send({ utf8.data(), utf8.length() }, uWS::OpCode::TEXT);
|
|
// this->m_bufferedAmount = this->m_connectedWebSocket.serverSSL->getBufferedAmount();
|
|
// break;
|
|
// }
|
|
default: {
|
|
RELEASE_ASSERT_NOT_REACHED();
|
|
}
|
|
}
|
|
updateHasPendingActivity();
|
|
}
|
|
|
|
ExceptionOr<void> WebSocket::close(std::optional<unsigned short> optionalCode, const String& reason)
|
|
{
|
|
int code = optionalCode ? optionalCode.value() : static_cast<int>(1000);
|
|
if (code == 1000) {
|
|
// LOG(Network, "WebSocket %p close() without code and reason", this);
|
|
} else {
|
|
// LOG(Network, "WebSocket %p close() code=%d reason='%s'", this, code, reason.utf8().data());
|
|
// if (!(code == WebSocketChannel::CloseEventCodeNormalClosure || (WebSocketChannel::CloseEventCodeMinimumUserDefined <= code && code <= WebSocketChannel::CloseEventCodeMaximumUserDefined)))
|
|
// return Exception { InvalidAccessError };
|
|
if (reason.length() > maxReasonSizeInBytes) {
|
|
// scriptExecutionContext()->addConsoleMessage(MessageSource::JS, MessageLevel::Error, "WebSocket close message is too long."_s);
|
|
return Exception { SyntaxError, "WebSocket close message is too long."_s };
|
|
}
|
|
}
|
|
|
|
if (m_state == CLOSING || m_state == CLOSED)
|
|
return {};
|
|
if (m_state == CONNECTING) {
|
|
m_state = CLOSING;
|
|
if (m_upgradeClient != nullptr) {
|
|
void* upgradeClient = m_upgradeClient;
|
|
m_upgradeClient = nullptr;
|
|
if (m_isSecure) {
|
|
Bun__WebSocketHTTPSClient__cancel(upgradeClient);
|
|
} else {
|
|
Bun__WebSocketHTTPClient__cancel(upgradeClient);
|
|
}
|
|
}
|
|
updateHasPendingActivity();
|
|
return {};
|
|
}
|
|
m_state = CLOSING;
|
|
switch (m_connectedWebSocketKind) {
|
|
case ConnectedWebSocketKind::Client: {
|
|
ZigString reasonZigStr = Zig::toZigString(reason);
|
|
Bun__WebSocketClient__close(this->m_connectedWebSocket.client, code, &reasonZigStr);
|
|
updateHasPendingActivity();
|
|
// this->m_bufferedAmount = this->m_connectedWebSocket.client->getBufferedAmount();
|
|
break;
|
|
}
|
|
case ConnectedWebSocketKind::ClientSSL: {
|
|
ZigString reasonZigStr = Zig::toZigString(reason);
|
|
Bun__WebSocketClientTLS__close(this->m_connectedWebSocket.clientSSL, code, &reasonZigStr);
|
|
updateHasPendingActivity();
|
|
// this->m_bufferedAmount = this->m_connectedWebSocket.clientSSL->getBufferedAmount();
|
|
break;
|
|
}
|
|
// case ConnectedWebSocketKind::Server: {
|
|
// this->m_connectedWebSocket.server->end(code, { utf8.data(), utf8.length() });
|
|
// this->m_bufferedAmount = this->m_connectedWebSocket.server->getBufferedAmount();
|
|
// break;
|
|
// }
|
|
// case ConnectedWebSocketKind::ServerSSL: {
|
|
// // this->m_connectedWebSocket.serverSSL->end(code, { utf8.data(), utf8.length() });
|
|
// // this->m_bufferedAmount = this->m_connectedWebSocket.serverSSL->getBufferedAmount();
|
|
// break;
|
|
// }
|
|
default: {
|
|
break;
|
|
}
|
|
}
|
|
this->m_connectedWebSocketKind = ConnectedWebSocketKind::None;
|
|
updateHasPendingActivity();
|
|
return {};
|
|
}
|
|
|
|
ExceptionOr<void> WebSocket::terminate()
|
|
{
|
|
// LOG(Network, "WebSocket %p terminate()", this);
|
|
|
|
if (m_state == CLOSING || m_state == CLOSED)
|
|
return {};
|
|
if (m_state == CONNECTING) {
|
|
m_state = CLOSING;
|
|
if (m_upgradeClient != nullptr) {
|
|
void* upgradeClient = m_upgradeClient;
|
|
m_upgradeClient = nullptr;
|
|
if (m_isSecure) {
|
|
Bun__WebSocketHTTPSClient__cancel(upgradeClient);
|
|
} else {
|
|
Bun__WebSocketHTTPClient__cancel(upgradeClient);
|
|
}
|
|
}
|
|
updateHasPendingActivity();
|
|
return {};
|
|
}
|
|
m_state = CLOSING;
|
|
switch (m_connectedWebSocketKind) {
|
|
case ConnectedWebSocketKind::Client: {
|
|
Bun__WebSocketClient__cancel(this->m_connectedWebSocket.client);
|
|
updateHasPendingActivity();
|
|
break;
|
|
}
|
|
case ConnectedWebSocketKind::ClientSSL: {
|
|
Bun__WebSocketClientTLS__cancel(this->m_connectedWebSocket.clientSSL);
|
|
updateHasPendingActivity();
|
|
break;
|
|
}
|
|
default: {
|
|
break;
|
|
}
|
|
}
|
|
this->m_connectedWebSocketKind = ConnectedWebSocketKind::None;
|
|
updateHasPendingActivity();
|
|
return {};
|
|
}
|
|
|
|
ExceptionOr<void> WebSocket::ping()
|
|
{
|
|
auto message = WTF::String::number(WTF::jsCurrentTime());
|
|
// LOG(Network, "WebSocket %p ping() Sending Timestamp '%s'", this, message.data());
|
|
if (m_state == CONNECTING)
|
|
return Exception { InvalidStateError };
|
|
|
|
// No exception is raised if the connection was once established but has subsequently been closed.
|
|
if (m_state == CLOSING || m_state == CLOSED) {
|
|
size_t payloadSize = message.length();
|
|
m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, payloadSize);
|
|
m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, getFramingOverhead(payloadSize));
|
|
return {};
|
|
}
|
|
|
|
this->sendWebSocketString(message, Opcode::Ping);
|
|
|
|
return {};
|
|
}
|
|
|
|
ExceptionOr<void> WebSocket::ping(const String& message)
|
|
{
|
|
// LOG(Network, "WebSocket %p ping() Sending String '%s'", this, message.utf8().data());
|
|
if (m_state == CONNECTING)
|
|
return Exception { InvalidStateError };
|
|
|
|
// No exception is raised if the connection was once established but has subsequently been closed.
|
|
if (m_state == CLOSING || m_state == CLOSED) {
|
|
auto utf8 = message.utf8(StrictConversionReplacingUnpairedSurrogatesWithFFFD);
|
|
size_t payloadSize = utf8.length();
|
|
m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, payloadSize);
|
|
m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, getFramingOverhead(payloadSize));
|
|
return {};
|
|
}
|
|
|
|
this->sendWebSocketString(message, Opcode::Ping);
|
|
|
|
return {};
|
|
}
|
|
|
|
ExceptionOr<void> WebSocket::ping(ArrayBuffer& binaryData)
|
|
{
|
|
// LOG(Network, "WebSocket %p ping() Sending ArrayBuffer %p", this, &binaryData);
|
|
if (m_state == CONNECTING)
|
|
return Exception { InvalidStateError };
|
|
|
|
if (m_state == CLOSING || m_state == CLOSED) {
|
|
unsigned payloadSize = binaryData.byteLength();
|
|
m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, payloadSize);
|
|
m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, getFramingOverhead(payloadSize));
|
|
return {};
|
|
}
|
|
|
|
char* data = static_cast<char*>(binaryData.data());
|
|
size_t length = binaryData.byteLength();
|
|
this->sendWebSocketData(data, length, Opcode::Ping);
|
|
|
|
return {};
|
|
}
|
|
|
|
ExceptionOr<void> WebSocket::ping(ArrayBufferView& arrayBufferView)
|
|
{
|
|
// LOG(Network, "WebSocket %p ping() Sending ArrayBufferView %p", this, &arrayBufferView);
|
|
|
|
if (m_state == CONNECTING)
|
|
return Exception { InvalidStateError };
|
|
|
|
if (m_state == CLOSING || m_state == CLOSED) {
|
|
unsigned payloadSize = arrayBufferView.byteLength();
|
|
m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, payloadSize);
|
|
m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, getFramingOverhead(payloadSize));
|
|
return {};
|
|
}
|
|
|
|
auto buffer = arrayBufferView.unsharedBuffer().get();
|
|
char* baseAddress = reinterpret_cast<char*>(buffer->data()) + arrayBufferView.byteOffset();
|
|
size_t length = arrayBufferView.byteLength();
|
|
this->sendWebSocketData(baseAddress, length, Opcode::Ping);
|
|
|
|
return {};
|
|
}
|
|
|
|
ExceptionOr<void> WebSocket::pong()
|
|
{
|
|
auto message = WTF::String::number(WTF::jsCurrentTime());
|
|
// LOG(Network, "WebSocket %p pong() Sending Timestamp '%s'", this, message.data());
|
|
if (m_state == CONNECTING)
|
|
return Exception { InvalidStateError };
|
|
|
|
// No exception is raised if the connection was once established but has subsequently been closed.
|
|
if (m_state == CLOSING || m_state == CLOSED) {
|
|
size_t payloadSize = message.length();
|
|
m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, payloadSize);
|
|
m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, getFramingOverhead(payloadSize));
|
|
return {};
|
|
}
|
|
|
|
this->sendWebSocketString(message, Opcode::Pong);
|
|
|
|
return {};
|
|
}
|
|
|
|
ExceptionOr<void> WebSocket::pong(const String& message)
|
|
{
|
|
// LOG(Network, "WebSocket %p pong() Sending String '%s'", this, message.utf8().data());
|
|
if (m_state == CONNECTING)
|
|
return Exception { InvalidStateError };
|
|
|
|
// No exception is raised if the connection was once established but has subsequently been closed.
|
|
if (m_state == CLOSING || m_state == CLOSED) {
|
|
auto utf8 = message.utf8(StrictConversionReplacingUnpairedSurrogatesWithFFFD);
|
|
size_t payloadSize = utf8.length();
|
|
m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, payloadSize);
|
|
m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, getFramingOverhead(payloadSize));
|
|
return {};
|
|
}
|
|
|
|
this->sendWebSocketString(message, Opcode::Pong);
|
|
|
|
return {};
|
|
}
|
|
|
|
ExceptionOr<void> WebSocket::pong(ArrayBuffer& binaryData)
|
|
{
|
|
// LOG(Network, "WebSocket %p pong() Sending ArrayBuffer %p", this, &binaryData);
|
|
if (m_state == CONNECTING)
|
|
return Exception { InvalidStateError };
|
|
|
|
if (m_state == CLOSING || m_state == CLOSED) {
|
|
unsigned payloadSize = binaryData.byteLength();
|
|
m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, payloadSize);
|
|
m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, getFramingOverhead(payloadSize));
|
|
return {};
|
|
}
|
|
|
|
char* data = static_cast<char*>(binaryData.data());
|
|
size_t length = binaryData.byteLength();
|
|
this->sendWebSocketData(data, length, Opcode::Pong);
|
|
|
|
return {};
|
|
}
|
|
|
|
ExceptionOr<void> WebSocket::pong(ArrayBufferView& arrayBufferView)
|
|
{
|
|
// LOG(Network, "WebSocket %p pong() Sending ArrayBufferView %p", this, &arrayBufferView);
|
|
|
|
if (m_state == CONNECTING)
|
|
return Exception { InvalidStateError };
|
|
|
|
if (m_state == CLOSING || m_state == CLOSED) {
|
|
unsigned payloadSize = arrayBufferView.byteLength();
|
|
m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, payloadSize);
|
|
m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, getFramingOverhead(payloadSize));
|
|
return {};
|
|
}
|
|
|
|
auto buffer = arrayBufferView.unsharedBuffer().get();
|
|
char* baseAddress = reinterpret_cast<char*>(buffer->data()) + arrayBufferView.byteOffset();
|
|
size_t length = arrayBufferView.byteLength();
|
|
this->sendWebSocketData(baseAddress, length, Opcode::Pong);
|
|
|
|
return {};
|
|
}
|
|
|
|
const URL& WebSocket::url() const
|
|
{
|
|
return m_url;
|
|
}
|
|
|
|
WebSocket::State WebSocket::readyState() const
|
|
{
|
|
return m_state;
|
|
}
|
|
|
|
unsigned WebSocket::bufferedAmount() const
|
|
{
|
|
return saturateAdd(m_bufferedAmount, m_bufferedAmountAfterClose);
|
|
}
|
|
|
|
String WebSocket::protocol() const
|
|
{
|
|
return m_subprotocol;
|
|
}
|
|
|
|
String WebSocket::extensions() const
|
|
{
|
|
return m_extensions;
|
|
}
|
|
|
|
String WebSocket::binaryType() const
|
|
{
|
|
switch (m_binaryType) {
|
|
case BinaryType::NodeBuffer:
|
|
return "nodebuffer"_s;
|
|
case BinaryType::ArrayBuffer:
|
|
return "arraybuffer"_s;
|
|
case BinaryType::Blob:
|
|
return "blob"_s;
|
|
}
|
|
|
|
ASSERT_NOT_REACHED();
|
|
return String();
|
|
}
|
|
|
|
ExceptionOr<void> WebSocket::setBinaryType(const String& binaryType)
|
|
{
|
|
// if (binaryType == "blob"_s) {
|
|
// m_binaryType = BinaryType::Blob;
|
|
// return {};
|
|
// }
|
|
if (binaryType == "arraybuffer"_s) {
|
|
m_binaryType = BinaryType::ArrayBuffer;
|
|
return {};
|
|
} else if (binaryType == "nodebuffer"_s) {
|
|
m_binaryType = BinaryType::NodeBuffer;
|
|
return {};
|
|
}
|
|
// scriptExecutionContext()->addConsoleMessage(MessageSource::JS, MessageLevel::Error, "'" + binaryType + "' is not a valid value for binaryType; binaryType remains unchanged.");
|
|
return Exception { SyntaxError, makeString("'"_s, binaryType, "' is not a valid value for binaryType; binaryType remains unchanged."_s) };
|
|
}
|
|
|
|
EventTargetInterface WebSocket::eventTargetInterface() const
|
|
{
|
|
return WebSocketEventTargetInterfaceType;
|
|
}
|
|
|
|
ScriptExecutionContext* WebSocket::scriptExecutionContext() const
|
|
{
|
|
return ContextDestructionObserver::scriptExecutionContext();
|
|
}
|
|
|
|
// void WebSocket::contextDestroyed()
|
|
// {
|
|
// LOG(Network, "WebSocket %p contextDestroyed()", this);
|
|
// ASSERT(!m_channel);
|
|
// ASSERT(m_state == CLOSED);
|
|
// // ActiveDOMObject::contextDestroyed();
|
|
// }
|
|
|
|
// void WebSocket::suspend(ReasonForSuspension reason)
|
|
// {
|
|
// // if (!m_channel)
|
|
// // return;
|
|
|
|
// // if (reason == ReasonForSuspension::BackForwardCache) {
|
|
// // // This will cause didClose() to be called.
|
|
// // m_channel->fail("WebSocket is closed due to suspension."_s);
|
|
// // return;
|
|
// // }
|
|
|
|
// // m_channel->suspend();
|
|
// }
|
|
|
|
// void WebSocket::resume()
|
|
// {
|
|
// // if (m_channel)
|
|
// // m_channel->resume();
|
|
// }
|
|
|
|
// void WebSocket::stop()
|
|
// {
|
|
// if (m_channel)
|
|
// m_channel->disconnect();
|
|
// m_channel = nullptr;
|
|
// m_state = CLOSED;
|
|
// // ActiveDOMObject::stop();
|
|
// // m_pendingActivity = nullptr;
|
|
// }
|
|
|
|
// const char* WebSocket::activeDOMObjectName() const
|
|
// {
|
|
// return "WebSocket";
|
|
// }
|
|
|
|
void WebSocket::didConnect()
|
|
{
|
|
// from new WebSocket() -> connect()
|
|
|
|
// LOG(Network, "WebSocket %p didConnect()", this);
|
|
// queueTaskKeepingObjectAlive(*this, TaskSource::WebSocket, [this] {
|
|
if (m_state == CLOSED)
|
|
return;
|
|
if (m_state != CONNECTING) {
|
|
didClose(0, 0, emptyString());
|
|
return;
|
|
}
|
|
m_state = OPEN;
|
|
|
|
if (auto* context = scriptExecutionContext()) {
|
|
|
|
if (this->hasEventListeners("open"_s)) {
|
|
this->incPendingActivityCount();
|
|
// the main reason for dispatching on a separate tick is to handle when you haven't yet attached an event listener
|
|
dispatchEvent(Event::create(eventNames().openEvent, Event::CanBubble::No, Event::IsCancelable::No));
|
|
this->decPendingActivityCount();
|
|
} else {
|
|
this->incPendingActivityCount();
|
|
context->postTask([this, protectedThis = Ref { *this }](ScriptExecutionContext& context) {
|
|
ASSERT(scriptExecutionContext());
|
|
|
|
// m_subprotocol = m_channel->subprotocol();
|
|
// m_extensions = m_channel->extensions();
|
|
protectedThis->dispatchEvent(Event::create(eventNames().openEvent, Event::CanBubble::No, Event::IsCancelable::No));
|
|
// });
|
|
protectedThis->decPendingActivityCount();
|
|
});
|
|
}
|
|
}
|
|
}
|
|
|
|
void WebSocket::didReceiveMessage(String&& message)
|
|
{
|
|
// LOG(Network, "WebSocket %p didReceiveMessage() Text message '%s'", this, message.utf8().data());
|
|
// queueTaskKeepingObjectAlive(*this, TaskSource::WebSocket, [this, message = WTFMove(message)]() mutable {
|
|
if (m_state != OPEN)
|
|
return;
|
|
|
|
// if (UNLIKELY(InspectorInstrumentation::hasFrontends())) {
|
|
// if (auto* inspector = m_channel->channelInspector()) {
|
|
// auto utf8Message = message.utf8();
|
|
// inspector->didReceiveWebSocketFrame(WebSocketChannelInspector::createFrame(utf8Message.dataAsUInt8Ptr(), utf8Message.length(), WebSocketFrame::OpCode::OpCodeText));
|
|
// }
|
|
// }
|
|
|
|
if (this->hasEventListeners("message"_s)) {
|
|
// the main reason for dispatching on a separate tick is to handle when you haven't yet attached an event listener
|
|
this->incPendingActivityCount();
|
|
dispatchEvent(MessageEvent::create(WTFMove(message), m_url.string()));
|
|
this->decPendingActivityCount();
|
|
return;
|
|
}
|
|
|
|
if (auto* context = scriptExecutionContext()) {
|
|
this->incPendingActivityCount();
|
|
context->postTask([this, message_ = WTFMove(message), protectedThis = Ref { *this }](ScriptExecutionContext& context) {
|
|
ASSERT(scriptExecutionContext());
|
|
protectedThis->dispatchEvent(MessageEvent::create(message_, protectedThis->m_url.string()));
|
|
protectedThis->decPendingActivityCount();
|
|
});
|
|
}
|
|
|
|
// });
|
|
}
|
|
|
|
void WebSocket::didReceiveBinaryData(const AtomString& eventName, const std::span<const uint8_t> binaryData)
|
|
{
|
|
// LOG(Network, "WebSocket %p didReceiveBinaryData() %u byte binary message", this, static_cast<unsigned>(binaryData.size()));
|
|
// queueTaskKeepingObjectAlive(*this, TaskSource::WebSocket, [this, binaryData = WTFMove(binaryData)]() mutable {
|
|
if (m_state != OPEN)
|
|
return;
|
|
|
|
// if (UNLIKELY(InspectorInstrumentation::hasFrontends())) {
|
|
// if (auto* inspector = m_channel->channelInspector())
|
|
// inspector->didReceiveWebSocketFrame(WebSocketChannelInspector::createFrame(binaryData.data(), binaryData.size(), WebSocketFrame::OpCode::OpCodeBinary));
|
|
// }
|
|
switch (m_binaryType) {
|
|
// case BinaryType::Blob:
|
|
// // FIXME: We just received the data from NetworkProcess, and are sending it back. This is inefficient.
|
|
// dispatchEvent(MessageEvent::create(Blob::create(scriptExecutionContext(), WTFMove(binaryData), emptyString()), SecurityOrigin::create(m_url)->toString()));
|
|
// break;
|
|
case BinaryType::ArrayBuffer: {
|
|
if (this->hasEventListeners(eventName)) {
|
|
// the main reason for dispatching on a separate tick is to handle when you haven't yet attached an event listener
|
|
this->incPendingActivityCount();
|
|
dispatchEvent(MessageEvent::create(eventName, ArrayBuffer::create(binaryData.data(), binaryData.size()), m_url.string()));
|
|
this->decPendingActivityCount();
|
|
return;
|
|
}
|
|
|
|
if (auto* context = scriptExecutionContext()) {
|
|
auto arrayBuffer = JSC::ArrayBuffer::create(binaryData.data(), binaryData.size());
|
|
this->incPendingActivityCount();
|
|
context->postTask([this, name = eventName, buffer = WTFMove(arrayBuffer), protectedThis = Ref { *this }](ScriptExecutionContext& context) {
|
|
ASSERT(scriptExecutionContext());
|
|
protectedThis->dispatchEvent(MessageEvent::create(name, buffer, m_url.string()));
|
|
protectedThis->decPendingActivityCount();
|
|
});
|
|
}
|
|
|
|
break;
|
|
}
|
|
case BinaryType::NodeBuffer: {
|
|
|
|
if (this->hasEventListeners(eventName)) {
|
|
// the main reason for dispatching on a separate tick is to handle when you haven't yet attached an event listener
|
|
this->incPendingActivityCount();
|
|
auto scope = DECLARE_CATCH_SCOPE(scriptExecutionContext()->vm());
|
|
JSUint8Array* buffer = createBuffer(scriptExecutionContext()->jsGlobalObject(), binaryData);
|
|
|
|
if (UNLIKELY(!buffer || scope.exception())) {
|
|
scope.clearExceptionExceptTermination();
|
|
|
|
ErrorEvent::Init errorInit;
|
|
errorInit.message = "Failed to allocate memory for binary data"_s;
|
|
dispatchEvent(ErrorEvent::create(eventNames().errorEvent, errorInit));
|
|
this->decPendingActivityCount();
|
|
return;
|
|
}
|
|
|
|
JSC::EnsureStillAliveScope ensureStillAlive(buffer);
|
|
MessageEvent::Init init;
|
|
init.data = buffer;
|
|
init.origin = this->m_url.string();
|
|
|
|
dispatchEvent(MessageEvent::create(eventName, WTFMove(init), EventIsTrusted::Yes));
|
|
this->decPendingActivityCount();
|
|
return;
|
|
}
|
|
|
|
if (auto* context = scriptExecutionContext()) {
|
|
auto arrayBuffer = JSC::ArrayBuffer::tryCreate(binaryData.data(), binaryData.size());
|
|
|
|
this->incPendingActivityCount();
|
|
|
|
context->postTask([name = eventName, buffer = WTFMove(arrayBuffer), protectedThis = Ref { *this }](ScriptExecutionContext& context) {
|
|
size_t length = buffer->byteLength();
|
|
auto* globalObject = context.jsGlobalObject();
|
|
JSUint8Array* uint8array = JSUint8Array::create(
|
|
globalObject,
|
|
reinterpret_cast<Zig::GlobalObject*>(globalObject)->JSBufferSubclassStructure(),
|
|
buffer.copyRef(),
|
|
0,
|
|
length);
|
|
JSC::EnsureStillAliveScope ensureStillAlive(uint8array);
|
|
MessageEvent::Init init;
|
|
init.data = uint8array;
|
|
init.origin = protectedThis->m_url.string();
|
|
protectedThis->dispatchEvent(MessageEvent::create(name, WTFMove(init), EventIsTrusted::Yes));
|
|
protectedThis->decPendingActivityCount();
|
|
});
|
|
}
|
|
|
|
break;
|
|
}
|
|
case BinaryType::Blob: {
|
|
// TODO: Blob is not supported currently.
|
|
}
|
|
}
|
|
// });
|
|
}
|
|
|
|
void WebSocket::didReceiveClose(CleanStatus wasClean, unsigned short code, WTF::String reason, bool isConnectionError)
|
|
{
|
|
// LOG(Network, "WebSocket %p didReceiveErrorMessage()", this);
|
|
// queueTaskKeepingObjectAlive(*this, TaskSource::WebSocket, [this, reason = WTFMove(reason)] {
|
|
if (m_state == CLOSED)
|
|
return;
|
|
const bool wasConnecting = m_state == CONNECTING;
|
|
m_state = CLOSED;
|
|
if (auto* context = scriptExecutionContext()) {
|
|
this->incPendingActivityCount();
|
|
if (wasConnecting && isConnectionError) {
|
|
dispatchEvent(Event::create(eventNames().errorEvent, Event::CanBubble::No, Event::IsCancelable::No));
|
|
}
|
|
// https://html.spec.whatwg.org/multipage/web-sockets.html#feedback-from-the-protocol:concept-websocket-closed, we should synchronously fire a close event.
|
|
dispatchEvent(CloseEvent::create(wasClean == CleanStatus::Clean, code, reason));
|
|
this->decPendingActivityCount();
|
|
}
|
|
}
|
|
|
|
void WebSocket::didUpdateBufferedAmount(unsigned bufferedAmount)
|
|
{
|
|
// LOG(Network, "WebSocket %p didUpdateBufferedAmount() New bufferedAmount is %u", this, bufferedAmount);
|
|
if (m_state == CLOSED)
|
|
return;
|
|
m_bufferedAmount = bufferedAmount;
|
|
}
|
|
|
|
void WebSocket::didStartClosingHandshake()
|
|
{
|
|
// LOG(Network, "WebSocket %p didStartClosingHandshake()", this);
|
|
// queueTaskKeepingObjectAlive(*this, TaskSource::WebSocket, [this] {
|
|
if (m_state == CLOSED)
|
|
return;
|
|
m_state = CLOSING;
|
|
updateHasPendingActivity();
|
|
// });
|
|
}
|
|
|
|
void WebSocket::didClose(unsigned unhandledBufferedAmount, unsigned short code, const String& reason)
|
|
{
|
|
// LOG(Network, "WebSocket %p didClose()", this);
|
|
if (this->m_connectedWebSocketKind == ConnectedWebSocketKind::None)
|
|
return;
|
|
|
|
// queueTaskKeepingObjectAlive(*this, TaskSource::WebSocket, [this, unhandledBufferedAmount, closingHandshakeCompletion, code, reason] {
|
|
// if (!m_channel)
|
|
// return;
|
|
|
|
// if (UNLIKELY(InspectorInstrumentation::hasFrontends())) {
|
|
// if (auto* inspector = m_channel->channelInspector()) {
|
|
// WebSocketFrame closingFrame(WebSocketFrame::OpCodeClose, true, false, false);
|
|
// inspector->didReceiveWebSocketFrame(closingFrame);
|
|
// inspector->didCloseWebSocket();
|
|
// }
|
|
// }
|
|
|
|
bool wasClean = m_state == CLOSING && !unhandledBufferedAmount && code != 0; // WebSocketChannel::CloseEventCodeAbnormalClosure;
|
|
m_state = CLOSED;
|
|
m_bufferedAmount = unhandledBufferedAmount;
|
|
ASSERT(scriptExecutionContext());
|
|
this->m_connectedWebSocketKind = ConnectedWebSocketKind::None;
|
|
this->m_upgradeClient = nullptr;
|
|
|
|
// since we are open and closing now we know that we have at least one pending activity
|
|
// so we just call decPendingActivityCount() after dispatching the event
|
|
|
|
if (this->hasEventListeners("close"_s)) {
|
|
this->dispatchEvent(CloseEvent::create(wasClean, code, reason));
|
|
|
|
// we deinit if possible in the next tick
|
|
if (auto* context = scriptExecutionContext()) {
|
|
context->postTask([this, code, wasClean, reason, protectedThis = Ref { *this }](ScriptExecutionContext& context) {
|
|
ASSERT(scriptExecutionContext());
|
|
protectedThis->decPendingActivityCount();
|
|
});
|
|
} else {
|
|
// we fallback if we don't have a context or we will leak
|
|
this->decPendingActivityCount();
|
|
}
|
|
return;
|
|
}
|
|
|
|
if (auto* context = scriptExecutionContext()) {
|
|
context->postTask([this, code, wasClean, reason, protectedThis = Ref { *this }](ScriptExecutionContext& context) {
|
|
ASSERT(scriptExecutionContext());
|
|
protectedThis->dispatchEvent(CloseEvent::create(wasClean, code, reason));
|
|
protectedThis->decPendingActivityCount();
|
|
});
|
|
} else {
|
|
// we fallback if we don't have a context
|
|
this->decPendingActivityCount();
|
|
}
|
|
}
|
|
|
|
void WebSocket::didConnect(us_socket_t* socket, char* bufferedData, size_t bufferedDataSize)
|
|
{
|
|
this->m_upgradeClient = nullptr;
|
|
if (m_isSecure) {
|
|
us_socket_context_t* ctx = (us_socket_context_t*)this->scriptExecutionContext()->connectedWebSocketContext<true, false>();
|
|
this->m_connectedWebSocket.clientSSL = Bun__WebSocketClientTLS__init(reinterpret_cast<CppWebSocket*>(this), socket, ctx, this->scriptExecutionContext()->jsGlobalObject(), reinterpret_cast<unsigned char*>(bufferedData), bufferedDataSize);
|
|
this->m_connectedWebSocketKind = ConnectedWebSocketKind::ClientSSL;
|
|
} else {
|
|
us_socket_context_t* ctx = (us_socket_context_t*)this->scriptExecutionContext()->connectedWebSocketContext<false, false>();
|
|
this->m_connectedWebSocket.client = Bun__WebSocketClient__init(reinterpret_cast<CppWebSocket*>(this), socket, ctx, this->scriptExecutionContext()->jsGlobalObject(), reinterpret_cast<unsigned char*>(bufferedData), bufferedDataSize);
|
|
this->m_connectedWebSocketKind = ConnectedWebSocketKind::Client;
|
|
}
|
|
|
|
this->didConnect();
|
|
}
|
|
void WebSocket::didFailWithErrorCode(int32_t code)
|
|
{
|
|
// from new WebSocket() -> connect()
|
|
|
|
if (m_state == CLOSED)
|
|
return;
|
|
|
|
this->m_upgradeClient = nullptr;
|
|
this->m_connectedWebSocketKind = ConnectedWebSocketKind::None;
|
|
this->m_connectedWebSocket.client = nullptr;
|
|
|
|
switch (code) {
|
|
// cancel
|
|
case 0: {
|
|
break;
|
|
}
|
|
// invalid_response
|
|
case 1: {
|
|
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Invalid response");
|
|
didReceiveClose(CleanStatus::NotClean, 1002, message);
|
|
break;
|
|
}
|
|
// expected_101_status_code
|
|
case 2: {
|
|
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Expected 101 status code");
|
|
didReceiveClose(CleanStatus::NotClean, 1002, message);
|
|
break;
|
|
}
|
|
// missing_upgrade_header
|
|
case 3: {
|
|
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Missing upgrade header");
|
|
didReceiveClose(CleanStatus::NotClean, 1002, message);
|
|
break;
|
|
}
|
|
// missing_connection_header
|
|
case 4: {
|
|
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Missing connection header");
|
|
didReceiveClose(CleanStatus::NotClean, 1002, message);
|
|
break;
|
|
}
|
|
// missing_websocket_accept_header
|
|
case 5: {
|
|
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Missing websocket accept header");
|
|
didReceiveClose(CleanStatus::NotClean, 1002, message);
|
|
break;
|
|
}
|
|
// invalid_upgrade_header
|
|
case 6: {
|
|
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Invalid upgrade header");
|
|
didReceiveClose(CleanStatus::NotClean, 1002, message);
|
|
break;
|
|
}
|
|
// invalid_connection_header
|
|
case 7: {
|
|
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Invalid connection header");
|
|
didReceiveClose(CleanStatus::NotClean, 1002, message);
|
|
break;
|
|
}
|
|
// invalid_websocket_version
|
|
case 8: {
|
|
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Invalid websocket version");
|
|
didReceiveClose(CleanStatus::NotClean, 1002, message);
|
|
break;
|
|
}
|
|
// mismatch_websocket_accept_header
|
|
case 9: {
|
|
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Mismatch websocket accept header");
|
|
didReceiveClose(CleanStatus::NotClean, 1002, message);
|
|
break;
|
|
}
|
|
// missing_client_protocol
|
|
case 10: {
|
|
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Missing client protocol");
|
|
didReceiveClose(CleanStatus::Clean, 1002, message);
|
|
break;
|
|
}
|
|
// mismatch_client_protocol
|
|
case 11: {
|
|
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Mismatch client protocol");
|
|
didReceiveClose(CleanStatus::Clean, 1002, message);
|
|
break;
|
|
}
|
|
// timeout
|
|
case 12: {
|
|
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Timeout");
|
|
didReceiveClose(CleanStatus::Clean, 1013, message);
|
|
break;
|
|
}
|
|
// closed
|
|
case 13: {
|
|
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Closed by client");
|
|
didReceiveClose(CleanStatus::Clean, 1000, message);
|
|
break;
|
|
}
|
|
// failed_to_write
|
|
case 14: {
|
|
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Failed to write");
|
|
didReceiveClose(CleanStatus::NotClean, 1006, message);
|
|
break;
|
|
}
|
|
// failed_to_connect
|
|
case 15: {
|
|
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Failed to connect");
|
|
didReceiveClose(CleanStatus::NotClean, 1006, message, true);
|
|
break;
|
|
}
|
|
// headers_too_large
|
|
case 16: {
|
|
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Headers too large");
|
|
didReceiveClose(CleanStatus::NotClean, 1007, message);
|
|
break;
|
|
}
|
|
// ended
|
|
case 17: {
|
|
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Connection ended");
|
|
didReceiveClose(CleanStatus::NotClean, 1006, message);
|
|
break;
|
|
}
|
|
|
|
// failed_to_allocate_memory
|
|
case 18: {
|
|
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Failed to allocate memory");
|
|
didReceiveClose(CleanStatus::NotClean, 1001, message);
|
|
break;
|
|
}
|
|
// control_frame_is_fragmented
|
|
case 19: {
|
|
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Protocol error - control frame is fragmented");
|
|
didReceiveClose(CleanStatus::NotClean, 1002, message);
|
|
break;
|
|
}
|
|
// invalid_control_frame
|
|
case 20: {
|
|
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Protocol error - invalid control frame");
|
|
didReceiveClose(CleanStatus::NotClean, 1002, message);
|
|
break;
|
|
}
|
|
// compression_unsupported
|
|
case 21: {
|
|
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Compression not implemented yet");
|
|
didReceiveClose(CleanStatus::Clean, 1011, message);
|
|
break;
|
|
}
|
|
// unexpected_mask_from_server
|
|
case 22: {
|
|
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Protocol error - unexpected mask from server");
|
|
didReceiveClose(CleanStatus::NotClean, 1002, message);
|
|
break;
|
|
}
|
|
// expected_control_frame
|
|
case 23: {
|
|
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Protocol error - expected control frame");
|
|
didReceiveClose(CleanStatus::NotClean, 1002, message);
|
|
break;
|
|
}
|
|
// unsupported_control_frame
|
|
case 24: {
|
|
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Protocol error - unsupported control frame");
|
|
didReceiveClose(CleanStatus::NotClean, 1002, message);
|
|
break;
|
|
}
|
|
// unexpected_opcode
|
|
case 25: {
|
|
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Protocol error - unexpected opcode");
|
|
didReceiveClose(CleanStatus::NotClean, 1002, message);
|
|
break;
|
|
}
|
|
// invalid_utf8
|
|
case 26: {
|
|
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Server sent invalid UTF8");
|
|
didReceiveClose(CleanStatus::NotClean, 1003, message);
|
|
break;
|
|
}
|
|
// tls_handshake_failed
|
|
case 27: {
|
|
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("TLS handshake failed");
|
|
didReceiveClose(CleanStatus::NotClean, 1015, message);
|
|
break;
|
|
}
|
|
}
|
|
|
|
m_state = CLOSED;
|
|
if (auto* context = scriptExecutionContext()) {
|
|
context->postTask([protectedThis = Ref { *this }](ScriptExecutionContext& context) {
|
|
protectedThis->decPendingActivityCount();
|
|
});
|
|
} else {
|
|
// we fallback if we don't have a context
|
|
this->decPendingActivityCount();
|
|
}
|
|
}
|
|
void WebSocket::updateHasPendingActivity()
|
|
{
|
|
std::atomic_thread_fence(std::memory_order_acquire);
|
|
m_hasPendingActivity.store(
|
|
!(m_state == CLOSED && m_pendingActivityCount == 0));
|
|
}
|
|
|
|
} // namespace WebCore
|
|
|
|
extern "C" void WebSocket__didConnect(WebCore::WebSocket* webSocket, us_socket_t* socket, char* bufferedData, size_t len)
|
|
{
|
|
webSocket->didConnect(socket, bufferedData, len);
|
|
}
|
|
extern "C" void WebSocket__didAbruptClose(WebCore::WebSocket* webSocket, int32_t errorCode)
|
|
{
|
|
webSocket->didFailWithErrorCode(errorCode);
|
|
}
|
|
extern "C" void WebSocket__didClose(WebCore::WebSocket* webSocket, uint16_t errorCode, const BunString* reason)
|
|
{
|
|
WTF::String wtf_reason = reason->toWTFString(BunString::ZeroCopy);
|
|
webSocket->didClose(0, errorCode, WTFMove(wtf_reason));
|
|
}
|
|
|
|
extern "C" void WebSocket__didReceiveText(WebCore::WebSocket* webSocket, bool clone, const ZigString* str)
|
|
{
|
|
WTF::String wtf_str = clone ? Zig::toStringCopy(*str) : Zig::toString(*str);
|
|
webSocket->didReceiveMessage(WTFMove(wtf_str));
|
|
}
|
|
extern "C" void WebSocket__didReceiveBytes(WebCore::WebSocket* webSocket, const uint8_t* bytes, size_t len, const uint8_t op)
|
|
{
|
|
auto opcode = static_cast<WebCore::WebSocket::Opcode>(op);
|
|
switch (opcode) {
|
|
case WebCore::WebSocket::Opcode::Binary:
|
|
webSocket->didReceiveBinaryData("message"_s, { bytes, len });
|
|
break;
|
|
case WebCore::WebSocket::Opcode::Ping:
|
|
webSocket->didReceiveBinaryData("ping"_s, { bytes, len });
|
|
break;
|
|
case WebCore::WebSocket::Opcode::Pong:
|
|
webSocket->didReceiveBinaryData("pong"_s, { bytes, len });
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
}
|
|
extern "C" bool WebSocket__rejectUnauthorized(WebCore::WebSocket* webSocket)
|
|
{
|
|
return webSocket->rejectUnauthorized();
|
|
}
|
|
|
|
extern "C" void WebSocket__incrementPendingActivity(WebCore::WebSocket* webSocket)
|
|
{
|
|
webSocket->incPendingActivityCount();
|
|
}
|
|
extern "C" void WebSocket__decrementPendingActivity(WebCore::WebSocket* webSocket)
|
|
{
|
|
webSocket->decPendingActivityCount();
|
|
}
|