Files
bun.sh/src/bun.js/bindings/webcore/WebSocket.cpp
2024-06-11 14:56:21 -07:00

1505 lines
58 KiB
C++

/*
* Copyright (C) 2011 Google Inc. All rights reserved.
* Copyright (C) 2015-2016 Apple Inc. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are
* met:
*
* * Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* * Redistributions in binary form must reproduce the above
* copyright notice, this list of conditions and the following disclaimer
* in the documentation and/or other materials provided with the
* distribution.
* * Neither the name of Google Inc. nor the names of its
* contributors may be used to endorse or promote products derived from
* this software without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
* A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
* OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#include "config.h"
#include "WebSocket.h"
#include "headers.h"
// #include "Blob.h"
#include "CloseEvent.h"
// #include "ContentSecurityPolicy.h"
// #include "DOMWindow.h"
// #include "Document.h"
#include "Event.h"
#include "EventListener.h"
#include "EventNames.h"
// #include "Frame.h"
// #include "FrameLoader.h"
// #include "FrameLoaderClient.h"
// #include "InspectorInstrumentation.h"
// #include "Logging.h"
#include "MessageEvent.h"
// #include "MixedContentChecker.h"
// #include "ResourceLoadObserver.h"
// #include "ScriptController.h"
#include "ScriptExecutionContext.h"
// #include "SecurityOrigin.h"
// #include "SocketProvider.h"
// #include "ThreadableWebSocketChannel.h"
// #include "WebSocketChannel.h"
// #include "WorkerGlobalScope.h"
// #include "WorkerLoaderProxy.h"
// #include "WorkerThread.h"
#include <JavaScriptCore/ArrayBuffer.h>
#include <JavaScriptCore/ArrayBufferView.h>
#include <JavaScriptCore/ScriptCallStack.h>
#include <wtf/HashSet.h>
#include <wtf/HexNumber.h>
// #include <wtf/IsoMallocInlines.h>
#include <wtf/NeverDestroyed.h>
// #include <wtf/RunLoop.h>
#include <wtf/StdLibExtras.h>
#include <wtf/text/CString.h>
#include <wtf/text/StringBuilder.h>
#include "JSBuffer.h"
#include "ErrorEvent.h"
// #if USE(WEB_THREAD)
// #include "WebCoreThreadRun.h"
// #endif
namespace WebCore {
WTF_MAKE_ISO_ALLOCATED_IMPL(WebSocket);
extern "C" bool Bun__defaultRejectUnauthorized(JSGlobalObject* lexicalGlobalObject);
static size_t getFramingOverhead(size_t payloadSize)
{
static const size_t hybiBaseFramingOverhead = 2; // Every frame has at least two-byte header.
static const size_t hybiMaskingKeyLength = 4; // Every frame from client must have masking key.
static const size_t minimumPayloadSizeWithTwoByteExtendedPayloadLength = 126;
static const size_t minimumPayloadSizeWithEightByteExtendedPayloadLength = 0x10000;
size_t overhead = hybiBaseFramingOverhead + hybiMaskingKeyLength;
if (payloadSize >= minimumPayloadSizeWithEightByteExtendedPayloadLength)
overhead += 8;
else if (payloadSize >= minimumPayloadSizeWithTwoByteExtendedPayloadLength)
overhead += 2;
return overhead;
}
const size_t maxReasonSizeInBytes = 123;
static inline bool isValidProtocolCharacter(UChar character)
{
// Hybi-10 says "(Subprotocol string must consist of) characters in the range U+0021 to U+007E not including
// separator characters as defined in [RFC2616]."
const UChar minimumProtocolCharacter = '!'; // U+0021.
const UChar maximumProtocolCharacter = '~'; // U+007E.
return character >= minimumProtocolCharacter && character <= maximumProtocolCharacter
&& character != '"' && character != '(' && character != ')' && character != ',' && character != '/'
&& !(character >= ':' && character <= '@') // U+003A - U+0040 (':', ';', '<', '=', '>', '?', '@').
&& !(character >= '[' && character <= ']') // U+005B - U+005D ('[', '\\', ']').
&& character != '{' && character != '}';
}
static bool isValidProtocolString(StringView protocol)
{
if (protocol.isEmpty())
return false;
for (auto codeUnit : protocol.codeUnits()) {
if (!isValidProtocolCharacter(codeUnit))
return false;
}
return true;
}
static String encodeProtocolString(const String& protocol)
{
StringBuilder builder;
for (size_t i = 0; i < protocol.length(); i++) {
if (protocol[i] < 0x20 || protocol[i] > 0x7E)
builder.append("\\u", hex(protocol[i], 4));
else if (protocol[i] == 0x5c)
builder.append("\\\\"_s);
else
builder.append(protocol[i]);
}
return builder.toString();
}
static String joinStrings(const Vector<String>& strings, ASCIILiteral separator)
{
StringBuilder builder;
for (size_t i = 0; i < strings.size(); ++i) {
if (i)
builder.append(separator);
builder.append(strings[i]);
}
return builder.toString();
}
static unsigned saturateAdd(unsigned a, unsigned b)
{
if (std::numeric_limits<unsigned>::max() - a < b)
return std::numeric_limits<unsigned>::max();
return a + b;
}
ASCIILiteral WebSocket::subprotocolSeparator()
{
return ", "_s;
}
WebSocket::WebSocket(ScriptExecutionContext& context)
: ContextDestructionObserver(&context)
, m_subprotocol(emptyString())
, m_extensions(emptyString())
{
m_state = CONNECTING;
m_hasPendingActivity.store(true);
m_rejectUnauthorized = Bun__defaultRejectUnauthorized(context.jsGlobalObject());
}
WebSocket::~WebSocket()
{
if (m_upgradeClient != nullptr) {
void* upgradeClient = m_upgradeClient;
if (m_isSecure) {
Bun__WebSocketHTTPSClient__cancel(reinterpret_cast<void*>(upgradeClient));
} else {
Bun__WebSocketHTTPClient__cancel(reinterpret_cast<void*>(upgradeClient));
}
}
switch (m_connectedWebSocketKind) {
case ConnectedWebSocketKind::Client: {
Bun__WebSocketClient__finalize(reinterpret_cast<void*>(this->m_connectedWebSocket.client));
break;
}
case ConnectedWebSocketKind::ClientSSL: {
Bun__WebSocketClientTLS__finalize(reinterpret_cast<void*>(this->m_connectedWebSocket.clientSSL));
break;
}
// case ConnectedWebSocketKind::Server: {
// this->m_connectedWebSocket.server->end(None);
// break;
// }
// case ConnectedWebSocketKind::ServerSSL: {
// this->m_connectedWebSocket.serverSSL->end(None);
// break;
// }
default: {
break;
}
}
}
ExceptionOr<Ref<WebSocket>> WebSocket::create(ScriptExecutionContext& context, const String& url)
{
return create(context, url, Vector<String> {}, std::nullopt);
}
ExceptionOr<Ref<WebSocket>> WebSocket::create(ScriptExecutionContext& context, const String& url, const Vector<String>& protocols)
{
return create(context, url, protocols, std::nullopt);
}
ExceptionOr<Ref<WebSocket>> WebSocket::create(ScriptExecutionContext& context, const String& url, const Vector<String>& protocols, std::optional<FetchHeaders::Init>&& headers)
{
if (url.isNull())
return Exception { SyntaxError };
auto socket = adoptRef(*new WebSocket(context));
// socket->suspendIfNeeded();
auto result = socket->connect(url, protocols, WTFMove(headers));
// auto result = socket->connect(url, protocols);
if (result.hasException())
return result.releaseException();
return socket;
}
ExceptionOr<Ref<WebSocket>> WebSocket::create(ScriptExecutionContext& context, const String& url, const Vector<String>& protocols, std::optional<FetchHeaders::Init>&& headers, bool rejectUnauthorized)
{
if (url.isNull())
return Exception { SyntaxError };
auto socket = adoptRef(*new WebSocket(context));
socket->setRejectUnauthorized(rejectUnauthorized);
// socket->suspendIfNeeded();
auto result = socket->connect(url, protocols, WTFMove(headers));
// auto result = socket->connect(url, protocols);
if (result.hasException())
return result.releaseException();
return socket;
}
ExceptionOr<Ref<WebSocket>> WebSocket::create(ScriptExecutionContext& context, const String& url, const String& protocol)
{
return create(context, url, Vector<String> { 1, protocol });
}
ExceptionOr<void> WebSocket::connect(const String& url)
{
return connect(url, Vector<String> {}, std::nullopt);
}
ExceptionOr<void> WebSocket::connect(const String& url, const String& protocol)
{
return connect(url, Vector<String> { 1, protocol }, std::nullopt);
}
static String resourceName(const URL& url)
{
auto path = url.path();
auto result = makeString(
path,
path.isEmpty() ? "/" : "",
url.queryWithLeadingQuestionMark());
ASSERT(!result.isEmpty());
ASSERT(!result.contains(' '));
return result;
}
static String hostName(const URL& url, bool secure)
{
// ASSERT(url.protocolIs("wss"_s) == secure);
if (url.port() && ((!secure && url.port().value() != 80) || (secure && url.port().value() != 443)))
return makeString(asASCIILowercase(url.host()), ':', url.port().value());
return url.host().convertToASCIILowercase();
}
ExceptionOr<void> WebSocket::connect(const String& url, const Vector<String>& protocols)
{
return connect(url, protocols, std::nullopt);
}
ExceptionOr<void> WebSocket::connect(const String& url, const Vector<String>& protocols, std::optional<FetchHeaders::Init>&& headersInit)
{
// LOG(Network, "WebSocket %p connect() url='%s'", this, url.utf8().data());
m_url = URL { url };
ASSERT(scriptExecutionContext());
if (!m_url.isValid()) {
// context.addConsoleMessage(MessageSource::JS, MessageLevel::Error, );
m_state = CLOSED;
updateHasPendingActivity();
return Exception { SyntaxError, makeString("Invalid url for WebSocket "_s, m_url.stringCenterEllipsizedToLength()) };
}
bool is_secure = m_url.protocolIs("wss"_s) || m_url.protocolIs("https"_s);
if (!m_url.protocolIs("http"_s) && !m_url.protocolIs("ws"_s) && !is_secure) {
// context.addConsoleMessage(MessageSource::JS, MessageLevel::Error, );
m_state = CLOSED;
updateHasPendingActivity();
return Exception { SyntaxError, makeString("Wrong url scheme for WebSocket "_s, m_url.stringCenterEllipsizedToLength()) };
}
if (m_url.hasFragmentIdentifier()) {
// context.addConsoleMessage(MessageSource::JS, MessageLevel::Error, );
m_state = CLOSED;
updateHasPendingActivity();
return Exception { SyntaxError, makeString("URL has fragment component "_s, m_url.stringCenterEllipsizedToLength()) };
}
// ASSERT(context.contentSecurityPolicy());
// auto& contentSecurityPolicy = *context.contentSecurityPolicy();
// contentSecurityPolicy.upgradeInsecureRequestIfNeeded(m_url, ContentSecurityPolicy::InsecureRequestType::Load);
// if (!portAllowed(m_url)) {
// String message;
// if (m_url.port())
// message = makeString("WebSocket port ", m_url.port().value(), " blocked");
// else
// message = "WebSocket without port blocked"_s;
// context.addConsoleMessage(MessageSource::JS, MessageLevel::Error, message);
// failAsynchronously();
// return {};
// }
// FIXME: Convert this to check the isolated world's Content Security Policy once webkit.org/b/104520 is solved.
// if (!context.shouldBypassMainWorldContentSecurityPolicy() && !contentSecurityPolicy.allowConnectToSource(m_url)) {
// m_state = CLOSED;
// // FIXME: Should this be throwing an exception?
// return Exception { SecurityError };
// }
// FIXME: There is a disagreement about restriction of subprotocols between WebSocket API and hybi-10 protocol
// draft. The former simply says "only characters in the range U+0021 to U+007E are allowed," while the latter
// imposes a stricter rule: "the elements MUST be non-empty strings with characters as defined in [RFC2616],
// and MUST all be unique strings."
//
// Here, we throw SyntaxError if the given protocols do not meet the latter criteria. This behavior does not
// comply with WebSocket API specification, but it seems to be the only reasonable way to handle this conflict.
for (auto& protocol : protocols) {
if (!isValidProtocolString(protocol)) {
// context.addConsoleMessage(MessageSource::JS, MessageLevel::Error, );
m_state = CLOSED;
updateHasPendingActivity();
return Exception { SyntaxError, makeString("Wrong protocol for WebSocket '"_s, encodeProtocolString(protocol), "'"_s) };
}
}
HashSet<String> visited;
for (auto& protocol : protocols) {
if (!visited.add(protocol).isNewEntry) {
// context.addConsoleMessage(MessageSource::JS, MessageLevel::Error, );
m_state = CLOSED;
updateHasPendingActivity();
return Exception { SyntaxError, makeString("WebSocket protocols contain duplicates:"_s, encodeProtocolString(protocol), "'"_s) };
}
}
// RunLoop::main().dispatch([targetURL = m_url.isolatedCopy(), mainFrameURL = context.url().isolatedCopy()]() {
// ResourceLoadObserver::shared().logWebSocketLoading(targetURL, mainFrameURL);
// });
// if (is<Document>(context)) {
// Document& document = downcast<Document>(context);
// RefPtr<Frame> frame = document.frame();
// // FIXME: make the mixed content check equivalent to the non-document mixed content check currently in WorkerThreadableWebSocketChannel::Bridge::connect()
// if (!frame || !MixedContentChecker::canRunInsecureContent(*frame, document.securityOrigin(), m_url)) {
// failAsynchronously();
// return { };
// }
// }
String protocolString;
if (!protocols.isEmpty())
protocolString = joinStrings(protocols, subprotocolSeparator());
ZigString host = Zig::toZigString(m_url.host());
auto resource = resourceName(m_url);
ZigString path = Zig::toZigString(resource);
ZigString clientProtocolString = Zig::toZigString(protocolString);
uint16_t port = is_secure ? 443 : 80;
if (auto userPort = m_url.port()) {
port = userPort.value();
}
Vector<ZigString, 8> headerNames;
Vector<ZigString, 8> headerValues;
auto headersOrException = FetchHeaders::create(WTFMove(headersInit));
if (UNLIKELY(headersOrException.hasException())) {
m_state = CLOSED;
updateHasPendingActivity();
return headersOrException.releaseException();
}
auto headers = headersOrException.releaseReturnValue();
headerNames.reserveInitialCapacity(headers.get().internalHeaders().size());
headerValues.reserveInitialCapacity(headers.get().internalHeaders().size());
auto iterator = headers.get().createIterator();
while (auto value = iterator.next()) {
headerNames.unsafeAppendWithoutCapacityCheck(Zig::toZigString(value->key));
headerValues.unsafeAppendWithoutCapacityCheck(Zig::toZigString(value->value));
}
m_isSecure = is_secure;
this->incPendingActivityCount();
if (is_secure) {
us_socket_context_t* ctx = scriptExecutionContext()->webSocketContext<true>();
RELEASE_ASSERT(ctx);
this->m_upgradeClient = Bun__WebSocketHTTPSClient__connect(scriptExecutionContext()->jsGlobalObject(), ctx, reinterpret_cast<CppWebSocket*>(this), &host, port, &path, &clientProtocolString, headerNames.data(), headerValues.data(), headerNames.size());
} else {
us_socket_context_t* ctx = scriptExecutionContext()->webSocketContext<false>();
RELEASE_ASSERT(ctx);
this->m_upgradeClient = Bun__WebSocketHTTPClient__connect(scriptExecutionContext()->jsGlobalObject(), ctx, reinterpret_cast<CppWebSocket*>(this), &host, port, &path, &clientProtocolString, headerNames.data(), headerValues.data(), headerNames.size());
}
headerValues.clear();
headerNames.clear();
if (this->m_upgradeClient == nullptr) {
m_state = CLOSED;
if (auto* context = scriptExecutionContext()) {
context->postTask([this, protectedThis = Ref { *this }](ScriptExecutionContext& context) {
ASSERT(scriptExecutionContext());
protectedThis->dispatchEvent(Event::create(eventNames().errorEvent, Event::CanBubble::No, Event::IsCancelable::No));
protectedThis->dispatchEvent(CloseEvent::create(false, 1006, "Failed to connect"_s));
protectedThis->decPendingActivityCount();
});
}
return {};
}
m_state = CONNECTING;
// #if ENABLE(INTELLIGENT_TRACKING_PREVENTION)
// auto reportRegistrableDomain = [domain = RegistrableDomain(m_url).isolatedCopy()](auto& context) mutable {
// if (auto* frame = downcast<Document>(context).frame())
// frame->loader().client().didLoadFromRegistrableDomain(WTFMove(domain));
// };
// if (is<Document>(context))
// reportRegistrableDomain(context);
// else
// downcast<WorkerGlobalScope>(context).thread().workerLoaderProxy().postTaskToLoader(WTFMove(reportRegistrableDomain));
// #endif
// m_pendingActivity = makePendingActivity(*this);
updateHasPendingActivity();
return {};
}
ExceptionOr<void> WebSocket::send(const String& message)
{
// LOG(Network, "WebSocket %p send() Sending String '%s'", this, message.utf8().data());
if (m_state == CONNECTING)
return Exception { InvalidStateError };
// No exception is raised if the connection was once established but has subsequently been closed.
if (m_state == CLOSING || m_state == CLOSED) {
auto utf8 = message.utf8(StrictConversionReplacingUnpairedSurrogatesWithFFFD);
size_t payloadSize = utf8.length();
m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, payloadSize);
m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, getFramingOverhead(payloadSize));
return {};
}
this->sendWebSocketString(message, Opcode::Text);
return {};
}
ExceptionOr<void> WebSocket::send(ArrayBuffer& binaryData)
{
// LOG(Network, "WebSocket %p send() Sending ArrayBuffer %p", this, &binaryData);
if (m_state == CONNECTING)
return Exception { InvalidStateError };
if (m_state == CLOSING || m_state == CLOSED) {
unsigned payloadSize = binaryData.byteLength();
m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, payloadSize);
m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, getFramingOverhead(payloadSize));
return {};
}
char* data = static_cast<char*>(binaryData.data());
size_t length = binaryData.byteLength();
this->sendWebSocketData(data, length, Opcode::Binary);
return {};
}
ExceptionOr<void> WebSocket::send(ArrayBufferView& arrayBufferView)
{
// LOG(Network, "WebSocket %p send() Sending ArrayBufferView %p", this, &arrayBufferView);
if (m_state == CONNECTING)
return Exception { InvalidStateError };
if (m_state == CLOSING || m_state == CLOSED) {
unsigned payloadSize = arrayBufferView.byteLength();
m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, payloadSize);
m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, getFramingOverhead(payloadSize));
return {};
}
auto buffer = arrayBufferView.unsharedBuffer().get();
char* baseAddress = reinterpret_cast<char*>(buffer->data()) + arrayBufferView.byteOffset();
size_t length = arrayBufferView.byteLength();
this->sendWebSocketData(baseAddress, length, Opcode::Binary);
return {};
}
// ExceptionOr<void> WebSocket::send(Blob& binaryData)
// {
// LOG(Network, "WebSocket %p send() Sending Blob '%s'", this, binaryData.url().stringCenterEllipsizedToLength().utf8().data());
// if (m_state == CONNECTING)
// return Exception { InvalidStateError };
// if (m_state == CLOSING || m_state == CLOSED) {
// unsigned payloadSize = static_cast<unsigned>(binaryData.size());
// m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, payloadSize);
// m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, getFramingOverhead(payloadSize));
// return {};
// }
// m_bufferedAmount = saturateAdd(m_bufferedAmount, binaryData.size());
// ASSERT(m_channel);
// m_channel->send(binaryData);
// return {};
// }
void WebSocket::sendWebSocketData(const char* baseAddress, size_t length, const Opcode op)
{
switch (m_connectedWebSocketKind) {
case ConnectedWebSocketKind::Client: {
Bun__WebSocketClient__writeBinaryData(this->m_connectedWebSocket.client, reinterpret_cast<const unsigned char*>(baseAddress), length, static_cast<uint8_t>(op));
// this->m_connectedWebSocket.client->send({ baseAddress, length }, opCode);
// this->m_bufferedAmount = this->m_connectedWebSocket.client->getBufferedAmount();
break;
}
case ConnectedWebSocketKind::ClientSSL: {
Bun__WebSocketClientTLS__writeBinaryData(this->m_connectedWebSocket.clientSSL, reinterpret_cast<const unsigned char*>(baseAddress), length, static_cast<uint8_t>(op));
break;
}
// case ConnectedWebSocketKind::Server: {
// this->m_connectedWebSocket.server->send({ baseAddress, length }, opCode);
// this->m_bufferedAmount = this->m_connectedWebSocket.server->getBufferedAmount();
// break;
// }
// case ConnectedWebSocketKind::ServerSSL: {
// this->m_connectedWebSocket.serverSSL->send({ baseAddress, length }, opCode);
// this->m_bufferedAmount = this->m_connectedWebSocket.serverSSL->getBufferedAmount();
// break;
// }
default: {
RELEASE_ASSERT_NOT_REACHED();
}
}
}
void WebSocket::sendWebSocketString(const String& message, const Opcode op)
{
switch (m_connectedWebSocketKind) {
case ConnectedWebSocketKind::Client: {
auto zigStr = Zig::toZigString(message);
Bun__WebSocketClient__writeString(this->m_connectedWebSocket.client, &zigStr, static_cast<uint8_t>(op));
// this->m_connectedWebSocket.client->send({ baseAddress, length }, opCode);
// this->m_bufferedAmount = this->m_connectedWebSocket.client->getBufferedAmount();
break;
}
case ConnectedWebSocketKind::ClientSSL: {
auto zigStr = Zig::toZigString(message);
Bun__WebSocketClientTLS__writeString(this->m_connectedWebSocket.clientSSL, &zigStr, static_cast<uint8_t>(op));
break;
}
// case ConnectedWebSocketKind::Server: {
// auto utf8 = message.utf8(StrictConversionReplacingUnpairedSurrogatesWithFFFD);
// this->m_connectedWebSocket.server->send({ utf8.data(), utf8.length() }, uWS::OpCode::TEXT);
// this->m_bufferedAmount = this->m_connectedWebSocket.server->getBufferedAmount();
// break;
// }
// case ConnectedWebSocketKind::ServerSSL: {
// auto utf8 = message.utf8(StrictConversionReplacingUnpairedSurrogatesWithFFFD);
// this->m_connectedWebSocket.serverSSL->send({ utf8.data(), utf8.length() }, uWS::OpCode::TEXT);
// this->m_bufferedAmount = this->m_connectedWebSocket.serverSSL->getBufferedAmount();
// break;
// }
default: {
RELEASE_ASSERT_NOT_REACHED();
}
}
updateHasPendingActivity();
}
ExceptionOr<void> WebSocket::close(std::optional<unsigned short> optionalCode, const String& reason)
{
int code = optionalCode ? optionalCode.value() : static_cast<int>(1000);
if (code == 1000) {
// LOG(Network, "WebSocket %p close() without code and reason", this);
} else {
// LOG(Network, "WebSocket %p close() code=%d reason='%s'", this, code, reason.utf8().data());
// if (!(code == WebSocketChannel::CloseEventCodeNormalClosure || (WebSocketChannel::CloseEventCodeMinimumUserDefined <= code && code <= WebSocketChannel::CloseEventCodeMaximumUserDefined)))
// return Exception { InvalidAccessError };
if (reason.length() > maxReasonSizeInBytes) {
// scriptExecutionContext()->addConsoleMessage(MessageSource::JS, MessageLevel::Error, "WebSocket close message is too long."_s);
return Exception { SyntaxError, "WebSocket close message is too long."_s };
}
}
if (m_state == CLOSING || m_state == CLOSED)
return {};
if (m_state == CONNECTING) {
m_state = CLOSING;
if (m_upgradeClient != nullptr) {
void* upgradeClient = m_upgradeClient;
m_upgradeClient = nullptr;
if (m_isSecure) {
Bun__WebSocketHTTPSClient__cancel(upgradeClient);
} else {
Bun__WebSocketHTTPClient__cancel(upgradeClient);
}
}
updateHasPendingActivity();
return {};
}
m_state = CLOSING;
switch (m_connectedWebSocketKind) {
case ConnectedWebSocketKind::Client: {
ZigString reasonZigStr = Zig::toZigString(reason);
Bun__WebSocketClient__close(this->m_connectedWebSocket.client, code, &reasonZigStr);
updateHasPendingActivity();
// this->m_bufferedAmount = this->m_connectedWebSocket.client->getBufferedAmount();
break;
}
case ConnectedWebSocketKind::ClientSSL: {
ZigString reasonZigStr = Zig::toZigString(reason);
Bun__WebSocketClientTLS__close(this->m_connectedWebSocket.clientSSL, code, &reasonZigStr);
updateHasPendingActivity();
// this->m_bufferedAmount = this->m_connectedWebSocket.clientSSL->getBufferedAmount();
break;
}
// case ConnectedWebSocketKind::Server: {
// this->m_connectedWebSocket.server->end(code, { utf8.data(), utf8.length() });
// this->m_bufferedAmount = this->m_connectedWebSocket.server->getBufferedAmount();
// break;
// }
// case ConnectedWebSocketKind::ServerSSL: {
// // this->m_connectedWebSocket.serverSSL->end(code, { utf8.data(), utf8.length() });
// // this->m_bufferedAmount = this->m_connectedWebSocket.serverSSL->getBufferedAmount();
// break;
// }
default: {
break;
}
}
this->m_connectedWebSocketKind = ConnectedWebSocketKind::None;
updateHasPendingActivity();
return {};
}
ExceptionOr<void> WebSocket::terminate()
{
// LOG(Network, "WebSocket %p terminate()", this);
if (m_state == CLOSING || m_state == CLOSED)
return {};
if (m_state == CONNECTING) {
m_state = CLOSING;
if (m_upgradeClient != nullptr) {
void* upgradeClient = m_upgradeClient;
m_upgradeClient = nullptr;
if (m_isSecure) {
Bun__WebSocketHTTPSClient__cancel(upgradeClient);
} else {
Bun__WebSocketHTTPClient__cancel(upgradeClient);
}
}
updateHasPendingActivity();
return {};
}
m_state = CLOSING;
switch (m_connectedWebSocketKind) {
case ConnectedWebSocketKind::Client: {
Bun__WebSocketClient__cancel(this->m_connectedWebSocket.client);
updateHasPendingActivity();
break;
}
case ConnectedWebSocketKind::ClientSSL: {
Bun__WebSocketClientTLS__cancel(this->m_connectedWebSocket.clientSSL);
updateHasPendingActivity();
break;
}
default: {
break;
}
}
this->m_connectedWebSocketKind = ConnectedWebSocketKind::None;
updateHasPendingActivity();
return {};
}
ExceptionOr<void> WebSocket::ping()
{
auto message = WTF::String::number(WTF::jsCurrentTime());
// LOG(Network, "WebSocket %p ping() Sending Timestamp '%s'", this, message.data());
if (m_state == CONNECTING)
return Exception { InvalidStateError };
// No exception is raised if the connection was once established but has subsequently been closed.
if (m_state == CLOSING || m_state == CLOSED) {
size_t payloadSize = message.length();
m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, payloadSize);
m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, getFramingOverhead(payloadSize));
return {};
}
this->sendWebSocketString(message, Opcode::Ping);
return {};
}
ExceptionOr<void> WebSocket::ping(const String& message)
{
// LOG(Network, "WebSocket %p ping() Sending String '%s'", this, message.utf8().data());
if (m_state == CONNECTING)
return Exception { InvalidStateError };
// No exception is raised if the connection was once established but has subsequently been closed.
if (m_state == CLOSING || m_state == CLOSED) {
auto utf8 = message.utf8(StrictConversionReplacingUnpairedSurrogatesWithFFFD);
size_t payloadSize = utf8.length();
m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, payloadSize);
m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, getFramingOverhead(payloadSize));
return {};
}
this->sendWebSocketString(message, Opcode::Ping);
return {};
}
ExceptionOr<void> WebSocket::ping(ArrayBuffer& binaryData)
{
// LOG(Network, "WebSocket %p ping() Sending ArrayBuffer %p", this, &binaryData);
if (m_state == CONNECTING)
return Exception { InvalidStateError };
if (m_state == CLOSING || m_state == CLOSED) {
unsigned payloadSize = binaryData.byteLength();
m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, payloadSize);
m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, getFramingOverhead(payloadSize));
return {};
}
char* data = static_cast<char*>(binaryData.data());
size_t length = binaryData.byteLength();
this->sendWebSocketData(data, length, Opcode::Ping);
return {};
}
ExceptionOr<void> WebSocket::ping(ArrayBufferView& arrayBufferView)
{
// LOG(Network, "WebSocket %p ping() Sending ArrayBufferView %p", this, &arrayBufferView);
if (m_state == CONNECTING)
return Exception { InvalidStateError };
if (m_state == CLOSING || m_state == CLOSED) {
unsigned payloadSize = arrayBufferView.byteLength();
m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, payloadSize);
m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, getFramingOverhead(payloadSize));
return {};
}
auto buffer = arrayBufferView.unsharedBuffer().get();
char* baseAddress = reinterpret_cast<char*>(buffer->data()) + arrayBufferView.byteOffset();
size_t length = arrayBufferView.byteLength();
this->sendWebSocketData(baseAddress, length, Opcode::Ping);
return {};
}
ExceptionOr<void> WebSocket::pong()
{
auto message = WTF::String::number(WTF::jsCurrentTime());
// LOG(Network, "WebSocket %p pong() Sending Timestamp '%s'", this, message.data());
if (m_state == CONNECTING)
return Exception { InvalidStateError };
// No exception is raised if the connection was once established but has subsequently been closed.
if (m_state == CLOSING || m_state == CLOSED) {
size_t payloadSize = message.length();
m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, payloadSize);
m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, getFramingOverhead(payloadSize));
return {};
}
this->sendWebSocketString(message, Opcode::Pong);
return {};
}
ExceptionOr<void> WebSocket::pong(const String& message)
{
// LOG(Network, "WebSocket %p pong() Sending String '%s'", this, message.utf8().data());
if (m_state == CONNECTING)
return Exception { InvalidStateError };
// No exception is raised if the connection was once established but has subsequently been closed.
if (m_state == CLOSING || m_state == CLOSED) {
auto utf8 = message.utf8(StrictConversionReplacingUnpairedSurrogatesWithFFFD);
size_t payloadSize = utf8.length();
m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, payloadSize);
m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, getFramingOverhead(payloadSize));
return {};
}
this->sendWebSocketString(message, Opcode::Pong);
return {};
}
ExceptionOr<void> WebSocket::pong(ArrayBuffer& binaryData)
{
// LOG(Network, "WebSocket %p pong() Sending ArrayBuffer %p", this, &binaryData);
if (m_state == CONNECTING)
return Exception { InvalidStateError };
if (m_state == CLOSING || m_state == CLOSED) {
unsigned payloadSize = binaryData.byteLength();
m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, payloadSize);
m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, getFramingOverhead(payloadSize));
return {};
}
char* data = static_cast<char*>(binaryData.data());
size_t length = binaryData.byteLength();
this->sendWebSocketData(data, length, Opcode::Pong);
return {};
}
ExceptionOr<void> WebSocket::pong(ArrayBufferView& arrayBufferView)
{
// LOG(Network, "WebSocket %p pong() Sending ArrayBufferView %p", this, &arrayBufferView);
if (m_state == CONNECTING)
return Exception { InvalidStateError };
if (m_state == CLOSING || m_state == CLOSED) {
unsigned payloadSize = arrayBufferView.byteLength();
m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, payloadSize);
m_bufferedAmountAfterClose = saturateAdd(m_bufferedAmountAfterClose, getFramingOverhead(payloadSize));
return {};
}
auto buffer = arrayBufferView.unsharedBuffer().get();
char* baseAddress = reinterpret_cast<char*>(buffer->data()) + arrayBufferView.byteOffset();
size_t length = arrayBufferView.byteLength();
this->sendWebSocketData(baseAddress, length, Opcode::Pong);
return {};
}
const URL& WebSocket::url() const
{
return m_url;
}
WebSocket::State WebSocket::readyState() const
{
return m_state;
}
unsigned WebSocket::bufferedAmount() const
{
return saturateAdd(m_bufferedAmount, m_bufferedAmountAfterClose);
}
String WebSocket::protocol() const
{
return m_subprotocol;
}
String WebSocket::extensions() const
{
return m_extensions;
}
String WebSocket::binaryType() const
{
switch (m_binaryType) {
case BinaryType::NodeBuffer:
return "nodebuffer"_s;
case BinaryType::ArrayBuffer:
return "arraybuffer"_s;
case BinaryType::Blob:
return "blob"_s;
}
ASSERT_NOT_REACHED();
return String();
}
ExceptionOr<void> WebSocket::setBinaryType(const String& binaryType)
{
// if (binaryType == "blob"_s) {
// m_binaryType = BinaryType::Blob;
// return {};
// }
if (binaryType == "arraybuffer"_s) {
m_binaryType = BinaryType::ArrayBuffer;
return {};
} else if (binaryType == "nodebuffer"_s) {
m_binaryType = BinaryType::NodeBuffer;
return {};
}
// scriptExecutionContext()->addConsoleMessage(MessageSource::JS, MessageLevel::Error, "'" + binaryType + "' is not a valid value for binaryType; binaryType remains unchanged.");
return Exception { SyntaxError, makeString("'"_s, binaryType, "' is not a valid value for binaryType; binaryType remains unchanged."_s) };
}
EventTargetInterface WebSocket::eventTargetInterface() const
{
return WebSocketEventTargetInterfaceType;
}
ScriptExecutionContext* WebSocket::scriptExecutionContext() const
{
return ContextDestructionObserver::scriptExecutionContext();
}
// void WebSocket::contextDestroyed()
// {
// LOG(Network, "WebSocket %p contextDestroyed()", this);
// ASSERT(!m_channel);
// ASSERT(m_state == CLOSED);
// // ActiveDOMObject::contextDestroyed();
// }
// void WebSocket::suspend(ReasonForSuspension reason)
// {
// // if (!m_channel)
// // return;
// // if (reason == ReasonForSuspension::BackForwardCache) {
// // // This will cause didClose() to be called.
// // m_channel->fail("WebSocket is closed due to suspension."_s);
// // return;
// // }
// // m_channel->suspend();
// }
// void WebSocket::resume()
// {
// // if (m_channel)
// // m_channel->resume();
// }
// void WebSocket::stop()
// {
// if (m_channel)
// m_channel->disconnect();
// m_channel = nullptr;
// m_state = CLOSED;
// // ActiveDOMObject::stop();
// // m_pendingActivity = nullptr;
// }
// const char* WebSocket::activeDOMObjectName() const
// {
// return "WebSocket";
// }
void WebSocket::didConnect()
{
// from new WebSocket() -> connect()
// LOG(Network, "WebSocket %p didConnect()", this);
// queueTaskKeepingObjectAlive(*this, TaskSource::WebSocket, [this] {
if (m_state == CLOSED)
return;
if (m_state != CONNECTING) {
didClose(0, 0, emptyString());
return;
}
m_state = OPEN;
if (auto* context = scriptExecutionContext()) {
if (this->hasEventListeners("open"_s)) {
this->incPendingActivityCount();
// the main reason for dispatching on a separate tick is to handle when you haven't yet attached an event listener
dispatchEvent(Event::create(eventNames().openEvent, Event::CanBubble::No, Event::IsCancelable::No));
this->decPendingActivityCount();
} else {
this->incPendingActivityCount();
context->postTask([this, protectedThis = Ref { *this }](ScriptExecutionContext& context) {
ASSERT(scriptExecutionContext());
// m_subprotocol = m_channel->subprotocol();
// m_extensions = m_channel->extensions();
protectedThis->dispatchEvent(Event::create(eventNames().openEvent, Event::CanBubble::No, Event::IsCancelable::No));
// });
protectedThis->decPendingActivityCount();
});
}
}
}
void WebSocket::didReceiveMessage(String&& message)
{
// LOG(Network, "WebSocket %p didReceiveMessage() Text message '%s'", this, message.utf8().data());
// queueTaskKeepingObjectAlive(*this, TaskSource::WebSocket, [this, message = WTFMove(message)]() mutable {
if (m_state != OPEN)
return;
// if (UNLIKELY(InspectorInstrumentation::hasFrontends())) {
// if (auto* inspector = m_channel->channelInspector()) {
// auto utf8Message = message.utf8();
// inspector->didReceiveWebSocketFrame(WebSocketChannelInspector::createFrame(utf8Message.dataAsUInt8Ptr(), utf8Message.length(), WebSocketFrame::OpCode::OpCodeText));
// }
// }
if (this->hasEventListeners("message"_s)) {
// the main reason for dispatching on a separate tick is to handle when you haven't yet attached an event listener
this->incPendingActivityCount();
dispatchEvent(MessageEvent::create(WTFMove(message), m_url.string()));
this->decPendingActivityCount();
return;
}
if (auto* context = scriptExecutionContext()) {
this->incPendingActivityCount();
context->postTask([this, message_ = WTFMove(message), protectedThis = Ref { *this }](ScriptExecutionContext& context) {
ASSERT(scriptExecutionContext());
protectedThis->dispatchEvent(MessageEvent::create(message_, protectedThis->m_url.string()));
protectedThis->decPendingActivityCount();
});
}
// });
}
void WebSocket::didReceiveBinaryData(const AtomString& eventName, const std::span<const uint8_t> binaryData)
{
// LOG(Network, "WebSocket %p didReceiveBinaryData() %u byte binary message", this, static_cast<unsigned>(binaryData.size()));
// queueTaskKeepingObjectAlive(*this, TaskSource::WebSocket, [this, binaryData = WTFMove(binaryData)]() mutable {
if (m_state != OPEN)
return;
// if (UNLIKELY(InspectorInstrumentation::hasFrontends())) {
// if (auto* inspector = m_channel->channelInspector())
// inspector->didReceiveWebSocketFrame(WebSocketChannelInspector::createFrame(binaryData.data(), binaryData.size(), WebSocketFrame::OpCode::OpCodeBinary));
// }
switch (m_binaryType) {
// case BinaryType::Blob:
// // FIXME: We just received the data from NetworkProcess, and are sending it back. This is inefficient.
// dispatchEvent(MessageEvent::create(Blob::create(scriptExecutionContext(), WTFMove(binaryData), emptyString()), SecurityOrigin::create(m_url)->toString()));
// break;
case BinaryType::ArrayBuffer: {
if (this->hasEventListeners(eventName)) {
// the main reason for dispatching on a separate tick is to handle when you haven't yet attached an event listener
this->incPendingActivityCount();
dispatchEvent(MessageEvent::create(eventName, ArrayBuffer::create(binaryData.data(), binaryData.size()), m_url.string()));
this->decPendingActivityCount();
return;
}
if (auto* context = scriptExecutionContext()) {
auto arrayBuffer = JSC::ArrayBuffer::create(binaryData.data(), binaryData.size());
this->incPendingActivityCount();
context->postTask([this, name = eventName, buffer = WTFMove(arrayBuffer), protectedThis = Ref { *this }](ScriptExecutionContext& context) {
ASSERT(scriptExecutionContext());
protectedThis->dispatchEvent(MessageEvent::create(name, buffer, m_url.string()));
protectedThis->decPendingActivityCount();
});
}
break;
}
case BinaryType::NodeBuffer: {
if (this->hasEventListeners(eventName)) {
// the main reason for dispatching on a separate tick is to handle when you haven't yet attached an event listener
this->incPendingActivityCount();
auto scope = DECLARE_CATCH_SCOPE(scriptExecutionContext()->vm());
JSUint8Array* buffer = createBuffer(scriptExecutionContext()->jsGlobalObject(), binaryData);
if (UNLIKELY(!buffer || scope.exception())) {
scope.clearExceptionExceptTermination();
ErrorEvent::Init errorInit;
errorInit.message = "Failed to allocate memory for binary data"_s;
dispatchEvent(ErrorEvent::create(eventNames().errorEvent, errorInit));
this->decPendingActivityCount();
return;
}
JSC::EnsureStillAliveScope ensureStillAlive(buffer);
MessageEvent::Init init;
init.data = buffer;
init.origin = this->m_url.string();
dispatchEvent(MessageEvent::create(eventName, WTFMove(init), EventIsTrusted::Yes));
this->decPendingActivityCount();
return;
}
if (auto* context = scriptExecutionContext()) {
auto arrayBuffer = JSC::ArrayBuffer::tryCreate(binaryData.data(), binaryData.size());
this->incPendingActivityCount();
context->postTask([name = eventName, buffer = WTFMove(arrayBuffer), protectedThis = Ref { *this }](ScriptExecutionContext& context) {
size_t length = buffer->byteLength();
auto* globalObject = context.jsGlobalObject();
JSUint8Array* uint8array = JSUint8Array::create(
globalObject,
reinterpret_cast<Zig::GlobalObject*>(globalObject)->JSBufferSubclassStructure(),
buffer.copyRef(),
0,
length);
JSC::EnsureStillAliveScope ensureStillAlive(uint8array);
MessageEvent::Init init;
init.data = uint8array;
init.origin = protectedThis->m_url.string();
protectedThis->dispatchEvent(MessageEvent::create(name, WTFMove(init), EventIsTrusted::Yes));
protectedThis->decPendingActivityCount();
});
}
break;
}
case BinaryType::Blob: {
// TODO: Blob is not supported currently.
}
}
// });
}
void WebSocket::didReceiveClose(CleanStatus wasClean, unsigned short code, WTF::String reason, bool isConnectionError)
{
// LOG(Network, "WebSocket %p didReceiveErrorMessage()", this);
// queueTaskKeepingObjectAlive(*this, TaskSource::WebSocket, [this, reason = WTFMove(reason)] {
if (m_state == CLOSED)
return;
const bool wasConnecting = m_state == CONNECTING;
m_state = CLOSED;
if (auto* context = scriptExecutionContext()) {
this->incPendingActivityCount();
if (wasConnecting && isConnectionError) {
dispatchEvent(Event::create(eventNames().errorEvent, Event::CanBubble::No, Event::IsCancelable::No));
}
// https://html.spec.whatwg.org/multipage/web-sockets.html#feedback-from-the-protocol:concept-websocket-closed, we should synchronously fire a close event.
dispatchEvent(CloseEvent::create(wasClean == CleanStatus::Clean, code, reason));
this->decPendingActivityCount();
}
}
void WebSocket::didUpdateBufferedAmount(unsigned bufferedAmount)
{
// LOG(Network, "WebSocket %p didUpdateBufferedAmount() New bufferedAmount is %u", this, bufferedAmount);
if (m_state == CLOSED)
return;
m_bufferedAmount = bufferedAmount;
}
void WebSocket::didStartClosingHandshake()
{
// LOG(Network, "WebSocket %p didStartClosingHandshake()", this);
// queueTaskKeepingObjectAlive(*this, TaskSource::WebSocket, [this] {
if (m_state == CLOSED)
return;
m_state = CLOSING;
updateHasPendingActivity();
// });
}
void WebSocket::didClose(unsigned unhandledBufferedAmount, unsigned short code, const String& reason)
{
// LOG(Network, "WebSocket %p didClose()", this);
if (this->m_connectedWebSocketKind == ConnectedWebSocketKind::None)
return;
// queueTaskKeepingObjectAlive(*this, TaskSource::WebSocket, [this, unhandledBufferedAmount, closingHandshakeCompletion, code, reason] {
// if (!m_channel)
// return;
// if (UNLIKELY(InspectorInstrumentation::hasFrontends())) {
// if (auto* inspector = m_channel->channelInspector()) {
// WebSocketFrame closingFrame(WebSocketFrame::OpCodeClose, true, false, false);
// inspector->didReceiveWebSocketFrame(closingFrame);
// inspector->didCloseWebSocket();
// }
// }
bool wasClean = m_state == CLOSING && !unhandledBufferedAmount && code != 0; // WebSocketChannel::CloseEventCodeAbnormalClosure;
m_state = CLOSED;
m_bufferedAmount = unhandledBufferedAmount;
ASSERT(scriptExecutionContext());
this->m_connectedWebSocketKind = ConnectedWebSocketKind::None;
this->m_upgradeClient = nullptr;
// since we are open and closing now we know that we have at least one pending activity
// so we just call decPendingActivityCount() after dispatching the event
ASSERT(m_pendingActivityCount > 0);
if (this->hasEventListeners("close"_s)) {
this->dispatchEvent(CloseEvent::create(wasClean, code, reason));
// we deinit if possible in the next tick
if (auto* context = scriptExecutionContext()) {
context->postTask([this, protectedThis = Ref { *this }](ScriptExecutionContext& context) {
ASSERT(scriptExecutionContext());
protectedThis->decPendingActivityCount();
});
} else {
// we fallback if we don't have a context or we will leak
this->decPendingActivityCount();
}
return;
}
if (auto* context = scriptExecutionContext()) {
context->postTask([this, code, wasClean, reason, protectedThis = Ref { *this }](ScriptExecutionContext& context) {
ASSERT(scriptExecutionContext());
protectedThis->dispatchEvent(CloseEvent::create(wasClean, code, reason));
protectedThis->decPendingActivityCount();
});
} else {
// we fallback if we don't have a context
this->decPendingActivityCount();
}
}
void WebSocket::didConnect(us_socket_t* socket, char* bufferedData, size_t bufferedDataSize)
{
this->m_upgradeClient = nullptr;
if (m_isSecure) {
us_socket_context_t* ctx = (us_socket_context_t*)this->scriptExecutionContext()->connectedWebSocketContext<true, false>();
this->m_connectedWebSocket.clientSSL = Bun__WebSocketClientTLS__init(reinterpret_cast<CppWebSocket*>(this), socket, ctx, this->scriptExecutionContext()->jsGlobalObject(), reinterpret_cast<unsigned char*>(bufferedData), bufferedDataSize);
this->m_connectedWebSocketKind = ConnectedWebSocketKind::ClientSSL;
} else {
us_socket_context_t* ctx = (us_socket_context_t*)this->scriptExecutionContext()->connectedWebSocketContext<false, false>();
this->m_connectedWebSocket.client = Bun__WebSocketClient__init(reinterpret_cast<CppWebSocket*>(this), socket, ctx, this->scriptExecutionContext()->jsGlobalObject(), reinterpret_cast<unsigned char*>(bufferedData), bufferedDataSize);
this->m_connectedWebSocketKind = ConnectedWebSocketKind::Client;
}
this->didConnect();
}
void WebSocket::didFailWithErrorCode(int32_t code)
{
// from new WebSocket() -> connect()
if (m_state == CLOSED)
return;
this->m_upgradeClient = nullptr;
this->m_connectedWebSocketKind = ConnectedWebSocketKind::None;
this->m_connectedWebSocket.client = nullptr;
switch (code) {
// cancel
case 0: {
break;
}
// invalid_response
case 1: {
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Invalid response");
didReceiveClose(CleanStatus::NotClean, 1002, message);
break;
}
// expected_101_status_code
case 2: {
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Expected 101 status code");
didReceiveClose(CleanStatus::NotClean, 1002, message);
break;
}
// missing_upgrade_header
case 3: {
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Missing upgrade header");
didReceiveClose(CleanStatus::NotClean, 1002, message);
break;
}
// missing_connection_header
case 4: {
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Missing connection header");
didReceiveClose(CleanStatus::NotClean, 1002, message);
break;
}
// missing_websocket_accept_header
case 5: {
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Missing websocket accept header");
didReceiveClose(CleanStatus::NotClean, 1002, message);
break;
}
// invalid_upgrade_header
case 6: {
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Invalid upgrade header");
didReceiveClose(CleanStatus::NotClean, 1002, message);
break;
}
// invalid_connection_header
case 7: {
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Invalid connection header");
didReceiveClose(CleanStatus::NotClean, 1002, message);
break;
}
// invalid_websocket_version
case 8: {
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Invalid websocket version");
didReceiveClose(CleanStatus::NotClean, 1002, message);
break;
}
// mismatch_websocket_accept_header
case 9: {
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Mismatch websocket accept header");
didReceiveClose(CleanStatus::NotClean, 1002, message);
break;
}
// missing_client_protocol
case 10: {
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Missing client protocol");
didReceiveClose(CleanStatus::Clean, 1002, message);
break;
}
// mismatch_client_protocol
case 11: {
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Mismatch client protocol");
didReceiveClose(CleanStatus::Clean, 1002, message);
break;
}
// timeout
case 12: {
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Timeout");
didReceiveClose(CleanStatus::Clean, 1013, message);
break;
}
// closed
case 13: {
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Closed by client");
didReceiveClose(CleanStatus::Clean, 1000, message);
break;
}
// failed_to_write
case 14: {
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Failed to write");
didReceiveClose(CleanStatus::NotClean, 1006, message);
break;
}
// failed_to_connect
case 15: {
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Failed to connect");
didReceiveClose(CleanStatus::NotClean, 1006, message, true);
break;
}
// headers_too_large
case 16: {
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Headers too large");
didReceiveClose(CleanStatus::NotClean, 1007, message);
break;
}
// ended
case 17: {
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Connection ended");
didReceiveClose(CleanStatus::NotClean, 1006, message);
break;
}
// failed_to_allocate_memory
case 18: {
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Failed to allocate memory");
didReceiveClose(CleanStatus::NotClean, 1001, message);
break;
}
// control_frame_is_fragmented
case 19: {
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Protocol error - control frame is fragmented");
didReceiveClose(CleanStatus::NotClean, 1002, message);
break;
}
// invalid_control_frame
case 20: {
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Protocol error - invalid control frame");
didReceiveClose(CleanStatus::NotClean, 1002, message);
break;
}
// compression_unsupported
case 21: {
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Compression not implemented yet");
didReceiveClose(CleanStatus::Clean, 1011, message);
break;
}
// unexpected_mask_from_server
case 22: {
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Protocol error - unexpected mask from server");
didReceiveClose(CleanStatus::NotClean, 1002, message);
break;
}
// expected_control_frame
case 23: {
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Protocol error - expected control frame");
didReceiveClose(CleanStatus::NotClean, 1002, message);
break;
}
// unsupported_control_frame
case 24: {
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Protocol error - unsupported control frame");
didReceiveClose(CleanStatus::NotClean, 1002, message);
break;
}
// unexpected_opcode
case 25: {
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Protocol error - unexpected opcode");
didReceiveClose(CleanStatus::NotClean, 1002, message);
break;
}
// invalid_utf8
case 26: {
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("Server sent invalid UTF8");
didReceiveClose(CleanStatus::NotClean, 1003, message);
break;
}
// tls_handshake_failed
case 27: {
static NeverDestroyed<String> message = MAKE_STATIC_STRING_IMPL("TLS handshake failed");
didReceiveClose(CleanStatus::NotClean, 1015, message);
break;
}
}
m_state = CLOSED;
if (auto* context = scriptExecutionContext()) {
context->postTask([protectedThis = Ref { *this }](ScriptExecutionContext& context) {
protectedThis->decPendingActivityCount();
});
} else {
// we fallback if we don't have a context
this->decPendingActivityCount();
}
}
void WebSocket::updateHasPendingActivity()
{
std::atomic_thread_fence(std::memory_order_acquire);
m_hasPendingActivity.store(
!(m_state == CLOSED && m_pendingActivityCount == 0));
}
} // namespace WebCore
extern "C" void WebSocket__didConnect(WebCore::WebSocket* webSocket, us_socket_t* socket, char* bufferedData, size_t len)
{
webSocket->didConnect(socket, bufferedData, len);
}
extern "C" void WebSocket__didAbruptClose(WebCore::WebSocket* webSocket, int32_t errorCode)
{
webSocket->didFailWithErrorCode(errorCode);
}
extern "C" void WebSocket__didClose(WebCore::WebSocket* webSocket, uint16_t errorCode, const BunString* reason)
{
WTF::String wtf_reason = reason->toWTFString(BunString::ZeroCopy);
webSocket->didClose(0, errorCode, WTFMove(wtf_reason));
}
extern "C" void WebSocket__didReceiveText(WebCore::WebSocket* webSocket, bool clone, const ZigString* str)
{
WTF::String wtf_str = clone ? Zig::toStringCopy(*str) : Zig::toString(*str);
webSocket->didReceiveMessage(WTFMove(wtf_str));
}
extern "C" void WebSocket__didReceiveBytes(WebCore::WebSocket* webSocket, const uint8_t* bytes, size_t len, const uint8_t op)
{
auto opcode = static_cast<WebCore::WebSocket::Opcode>(op);
switch (opcode) {
case WebCore::WebSocket::Opcode::Binary:
webSocket->didReceiveBinaryData("message"_s, { bytes, len });
break;
case WebCore::WebSocket::Opcode::Ping:
webSocket->didReceiveBinaryData("ping"_s, { bytes, len });
break;
case WebCore::WebSocket::Opcode::Pong:
webSocket->didReceiveBinaryData("pong"_s, { bytes, len });
break;
default:
break;
}
}
extern "C" bool WebSocket__rejectUnauthorized(WebCore::WebSocket* webSocket)
{
return webSocket->rejectUnauthorized();
}
extern "C" void WebSocket__incrementPendingActivity(WebCore::WebSocket* webSocket)
{
webSocket->incPendingActivityCount();
}
extern "C" void WebSocket__decrementPendingActivity(WebCore::WebSocket* webSocket)
{
webSocket->decPendingActivityCount();
}