#include "WebSocketClient.h" #include "QtHttpRequest.h" #include "QtHttpHeader.h" #include #include #include #include #include #include WebSocketClient::WebSocketClient(QtHttpRequest* request, QTcpSocket* sock, bool localConnection, QObject* parent) : QObject(parent) , _socket(sock) , _log(Logger::getInstance("WEBSOCKET")) { // connect socket; disconnect handled from QtHttpServer connect(_socket, &QTcpSocket::readyRead , this, &WebSocketClient::handleWebSocketFrame); // QtHttpRequest contains all headers for handshake QByteArray secWebSocketKey = request->getHeader(QtHttpHeader::SecWebSocketKey); const QString client = request->getClientInfo().clientAddress.toString(); // Json processor _jsonAPI = new JsonAPI(client, _log, localConnection, this); connect(_jsonAPI, &JsonAPI::callbackMessage, this, &WebSocketClient::sendMessage); connect(_jsonAPI, &JsonAPI::forceClose, this,[this]() { this->sendClose(CLOSECODE::NORMAL); }); Debug(_log, "New connection from %s", QSTRING_CSTR(client)); // do handshake secWebSocketKey += "258EAFA5-E914-47DA-95CA-C5AB0DC85B11"; QByteArray hash = QCryptographicHash::hash(secWebSocketKey, QCryptographicHash::Sha1).toBase64(); QString data = QString("HTTP/1.1 101 Switching Protocols\r\n") + QString("Upgrade: websocket\r\n") + QString("Connection: Upgrade\r\n") + QString("Sec-WebSocket-Accept: ")+QString(hash.data()) + "\r\n\r\n"; _socket->write(QSTRING_CSTR(data), data.size()); _socket->flush(); // Init JsonAPI _jsonAPI->initialize(); } void WebSocketClient::handleWebSocketFrame() { while (_socket->bytesAvailable()) { // we are on no continious reading from socket from call before if (!_notEnoughData) { getWsFrameHeader(&_wsh); } if(_socket->bytesAvailable() < (qint64)_wsh.payloadLength) { //printf("not enough data %llu %llu\n", _socket->bytesAvailable(), _wsh.payloadLength); _notEnoughData=true; return; } _notEnoughData = false; QByteArray buf = _socket->read(_wsh.payloadLength); //printf("opcode %x payload bytes %llu avail: %llu\n", _wsh.opCode, _wsh.payloadLength, _socket->bytesAvailable()); if (OPCODE::invalid((OPCODE::value)_wsh.opCode)) { sendClose(CLOSECODE::INV_TYPE, "invalid opcode"); return; } // check the type of data frame bool isContinuation=false; switch (_wsh.opCode) { case OPCODE::CONTINUATION: isContinuation = true; // no break here, just jump over to opcode text case OPCODE::BINARY: case OPCODE::TEXT: { // check for protocol violations if (_onContinuation && !isContinuation) { sendClose(CLOSECODE::VIOLATION, "protocol violation, somebody sends frames in between continued frames"); return; } if (!_wsh.masked && _wsh.opCode == OPCODE::TEXT) { sendClose(CLOSECODE::VIOLATION, "protocol violation, unmasked text frames not allowed"); return; } // unmask data for (int i=0; i < buf.size(); i++) { buf[i] = buf[i] ^ _wsh.key[i % 4]; } _onContinuation = !_wsh.fin || isContinuation; // frame contains text, extract it, append data if this is a continuation if (_wsh.fin && ! isContinuation) // one frame { _wsReceiveBuffer.clear(); } _wsReceiveBuffer.append(buf); // this is the final frame, decode and handle data if (_wsh.fin) { _onContinuation = false; if (_wsh.opCode == OPCODE::TEXT) { _jsonAPI->handleMessage(QString(_wsReceiveBuffer)); } else { handleBinaryMessage(_wsReceiveBuffer); } _wsReceiveBuffer.clear(); } } break; case OPCODE::CLOSE: { sendClose(CLOSECODE::NORMAL); } break; case OPCODE::PING: { // ping received, send pong quint8 pong[] = {OPCODE::PONG, 0}; _socket->write((const char*)pong, 2); _socket->flush(); } break; case OPCODE::PONG: { Error(_log, "pong received, protocol violation!"); } default: Warning(_log, "strange %d\n%s\n", _wsh.opCode, QSTRING_CSTR(QString(buf))); } } } void WebSocketClient::getWsFrameHeader(WebSocketHeader* header) { char fin_rsv_opcode, mask_length; _socket->getChar(&fin_rsv_opcode); _socket->getChar(&mask_length); header->fin = (fin_rsv_opcode & BHB0_FIN) == BHB0_FIN; header->opCode = fin_rsv_opcode & BHB0_OPCODE; header->masked = (mask_length & BHB1_MASK) == BHB1_MASK; header->payloadLength = mask_length & BHB1_PAYLOAD; // get size of payload switch (header->payloadLength) { case payload_size_code_16bit: { QByteArray buf = _socket->read(2); header->payloadLength = ((buf.at(0) << 8) & 0xFF00) | (buf.at(1) & 0xFF); } break; case payload_size_code_64bit: { QByteArray buf = _socket->read(8); header->payloadLength = 0; for (uint i=0; i < 8; i++) { header->payloadLength |= ((quint64)(buf.at(i) & 0xFF)) << (8*(7-i)); } } break; } // if the data is masked we need to get the key for unmasking if (header->masked) { _socket->read(header->key, 4); } } /// See http://tools.ietf.org/html/rfc6455#section-5.2 for more information void WebSocketClient::sendClose(int status, QString reason) { Debug(_log, "send close: %d %s", status, QSTRING_CSTR(reason)); ErrorIf(!reason.isEmpty(), _log, QSTRING_CSTR(reason)); _receiveBuffer.clear(); QByteArray sendBuffer; sendBuffer.append(136+(status-1000)); int length = reason.size(); if(length >= 126) { sendBuffer.append( (length > 0xffff) ? 127 : 126); int num_bytes = (length > 0xffff) ? 8 : 2; for(int c = num_bytes - 1; c != -1; c--) { sendBuffer.append( quint8((static_cast(length) >> (8 * c)) % 256)); } } else { sendBuffer.append(quint8(length)); } sendBuffer.append(reason.toUtf8()); _socket->write(sendBuffer); _socket->flush(); _socket->close(); } void WebSocketClient::handleBinaryMessage(QByteArray &data) { //uint8_t priority = data.at(0); //unsigned duration_s = data.at(1); unsigned imgSize = data.size() - 4; unsigned width = ((data.at(2) << 8) & 0xFF00) | (data.at(3) & 0xFF); unsigned height = imgSize / width; if ( imgSize % width > 0 ) { Error(_log, "data size is not multiple of width"); return; } Image image; image.resize(width, height); memcpy(image.memptr(), data.data()+4, imgSize); //_hyperion->registerInput(); //_hyperion->setInputImage(priority, image, duration_s*1000); } qint64 WebSocketClient::sendMessage(QJsonObject obj) { QJsonDocument writer(obj); QByteArray data = writer.toJson(QJsonDocument::Compact) + "\n"; if (!_socket || (_socket->state() != QAbstractSocket::ConnectedState)) return 0; qint64 payloadWritten = 0; quint32 payloadSize = data.size(); const char * payload = data.data(); qint32 numFrames = payloadSize / FRAME_SIZE_IN_BYTES + ((quint64(payloadSize) % FRAME_SIZE_IN_BYTES) > 0 ? 1 : 0); for (int i = 0; i < numFrames; ++i) { const bool isLastFrame = (i == (numFrames - 1)); quint64 position = i * FRAME_SIZE_IN_BYTES; quint32 frameSize = (payloadSize-position >= FRAME_SIZE_IN_BYTES) ? FRAME_SIZE_IN_BYTES : (payloadSize-position); QByteArray buf = makeFrameHeader(OPCODE::TEXT, frameSize, isLastFrame); sendMessage_Raw(buf); qint64 written = sendMessage_Raw(payload+position,frameSize); if (written > 0) { payloadWritten += written; } else { _socket->flush(); Error(_log, "Error writing bytes to socket: %s", QSTRING_CSTR(_socket->errorString())); break; } } if (payloadSize != payloadWritten) { Error(_log, "Error writing bytes to socket %d bytes from %d written", payloadWritten, payloadSize); return -1; } return payloadWritten; } qint64 WebSocketClient::sendMessage_Raw(const char* data, quint64 size) { return _socket->write(data, size); } qint64 WebSocketClient::sendMessage_Raw(QByteArray &data) { return _socket->write(data.data(), data.size()); } QByteArray WebSocketClient::makeFrameHeader(quint8 opCode, quint64 payloadLength, bool lastFrame) { QByteArray header; if (payloadLength <= 0x7FFFFFFFFFFFFFFFULL) { //FIN, RSV1-3, opcode (RSV-1, RSV-2 and RSV-3 are zero) quint8 byte = static_cast((opCode & 0x0F) | (lastFrame ? 0x80 : 0x00)); header.append(static_cast(byte)); byte = 0x00; if (payloadLength <= 125) { byte |= static_cast(payloadLength); header.append(static_cast(byte)); } else if (payloadLength <= 0xFFFFU) { byte |= 126; header.append(static_cast(byte)); quint16 swapped = qToBigEndian(static_cast(payloadLength)); header.append(static_cast(static_cast(&swapped)), 2); } else { byte |= 127; header.append(static_cast(byte)); quint64 swapped = qToBigEndian(payloadLength); header.append(static_cast(static_cast(&swapped)), 8); } } else { Error(_log, "Payload too big!"); } return header; }