mirror of
https://github.com/hyperion-project/hyperion.ng.git
synced 2023-10-10 13:36:59 +02:00
2a77f6f012
Signed-off-by: Paulchen-Panther <Paulchen--Panter@gmx.net>
343 lines
8.6 KiB
C++
343 lines
8.6 KiB
C++
#include "WebSocketClient.h"
|
|
|
|
// hyperion includes
|
|
#include <hyperion/Hyperion.h>
|
|
|
|
// JsonAPI includes
|
|
#include <api/JsonAPI.h>
|
|
|
|
// qt includes
|
|
#include "QtHttpRequest.h"
|
|
#include "QtHttpHeader.h"
|
|
#include <QTcpSocket>
|
|
#include <QtEndian>
|
|
#include <QCryptographicHash>
|
|
#include <QJsonObject>
|
|
|
|
WebSocketClient::WebSocketClient(QtHttpRequest* request, QTcpSocket* sock, QObject* parent)
|
|
: QObject(parent)
|
|
, _socket(sock)
|
|
, _log(Logger::getInstance("WEBSOCKET"))
|
|
, _hyperion(Hyperion::getInstance())
|
|
{
|
|
// connect socket; disconnect handled from QtHttpServer
|
|
connect(_socket, &QTcpSocket::readyRead , this, &WebSocketClient::handleWebSocketFrame);
|
|
|
|
// QtHttpRequest contains all headers for handshake
|
|
QByteArray secWebSocketKey = request->getHeader(QtHttpHeader::SecWebSocketKey);
|
|
const QString client = request->getClientInfo().clientAddress.toString();
|
|
|
|
// Json processor
|
|
_jsonAPI = new JsonAPI(client, _log, this);
|
|
connect(_jsonAPI, &JsonAPI::callbackMessage, this, &WebSocketClient::sendMessage);
|
|
|
|
Debug(_log, "New connection from %s", QSTRING_CSTR(client));
|
|
|
|
// do handshake
|
|
secWebSocketKey += "258EAFA5-E914-47DA-95CA-C5AB0DC85B11";
|
|
QByteArray hash = QCryptographicHash::hash(secWebSocketKey, QCryptographicHash::Sha1).toBase64();
|
|
|
|
QString data
|
|
= QString("HTTP/1.1 101 Switching Protocols\r\n")
|
|
+ QString("Upgrade: websocket\r\n")
|
|
+ QString("Connection: Upgrade\r\n")
|
|
+ QString("Sec-WebSocket-Accept: ")+QString(hash.data()) + "\r\n\r\n";
|
|
|
|
_socket->write(QSTRING_CSTR(data), data.size());
|
|
_socket->flush();
|
|
}
|
|
|
|
void WebSocketClient::handleWebSocketFrame(void)
|
|
{
|
|
// we are on no continious reading from socket from call before
|
|
if (!_notEnoughData)
|
|
{
|
|
getWsFrameHeader(&_wsh);
|
|
}
|
|
|
|
if(_socket->bytesAvailable() < (qint64)_wsh.payloadLength)
|
|
{
|
|
//printf("not enough data %llu %llu\n", _socket->bytesAvailable(), _wsh.payloadLength);
|
|
_notEnoughData=true;
|
|
return;
|
|
}
|
|
_notEnoughData = false;
|
|
|
|
QByteArray buf = _socket->read(_wsh.payloadLength);
|
|
//printf("opcode %x payload bytes %llu avail: %llu\n", _wsh.opCode, _wsh.payloadLength, _socket->bytesAvailable());
|
|
|
|
if (OPCODE::invalid((OPCODE::value)_wsh.opCode))
|
|
{
|
|
sendClose(CLOSECODE::INV_TYPE, "invalid opcode");
|
|
return;
|
|
}
|
|
|
|
// check the type of data frame
|
|
bool isContinuation=false;
|
|
switch (_wsh.opCode)
|
|
{
|
|
case OPCODE::CONTINUATION:
|
|
isContinuation = true;
|
|
// no break here, just jump over to opcode text
|
|
|
|
case OPCODE::BINARY:
|
|
case OPCODE::TEXT:
|
|
{
|
|
// check for protocal violations
|
|
if (_onContinuation && !isContinuation)
|
|
{
|
|
sendClose(CLOSECODE::VIOLATION, "protocol violation, somebody sends frames in between continued frames");
|
|
return;
|
|
}
|
|
|
|
if (!_wsh.masked && _wsh.opCode == OPCODE::TEXT)
|
|
{
|
|
sendClose(CLOSECODE::VIOLATION, "protocol violation, unmasked text frames not allowed");
|
|
return;
|
|
}
|
|
|
|
// unmask data
|
|
for (int i=0; i < buf.size(); i++)
|
|
{
|
|
buf[i] = buf[i] ^ _wsh.key[i % 4];
|
|
}
|
|
|
|
_onContinuation = !_wsh.fin || isContinuation;
|
|
|
|
// frame contains text, extract it, append data if this is a continuation
|
|
if (_wsh.fin && ! isContinuation) // one frame
|
|
{
|
|
_wsReceiveBuffer.clear();
|
|
}
|
|
_wsReceiveBuffer.append(buf);
|
|
|
|
// this is the final frame, decode and handle data
|
|
if (_wsh.fin)
|
|
{
|
|
_onContinuation = false;
|
|
if (_wsh.opCode == OPCODE::TEXT)
|
|
{
|
|
_jsonAPI->handleMessage(QString(_wsReceiveBuffer));
|
|
}
|
|
else
|
|
{
|
|
handleBinaryMessage(_wsReceiveBuffer);
|
|
}
|
|
_wsReceiveBuffer.clear();
|
|
}
|
|
}
|
|
break;
|
|
|
|
case OPCODE::CLOSE:
|
|
{
|
|
sendClose(CLOSECODE::NORMAL);
|
|
}
|
|
break;
|
|
|
|
case OPCODE::PING:
|
|
{
|
|
// ping received, send pong
|
|
quint8 pong[] = {OPCODE::PONG, 0};
|
|
_socket->write((const char*)pong, 2);
|
|
_socket->flush();
|
|
}
|
|
break;
|
|
|
|
case OPCODE::PONG:
|
|
{
|
|
Error(_log, "pong received, protocol violation!");
|
|
}
|
|
|
|
default:
|
|
Warning(_log, "strange %d\n%s\n", _wsh.opCode, QSTRING_CSTR(QString(buf)));
|
|
}
|
|
}
|
|
|
|
void WebSocketClient::getWsFrameHeader(WebSocketHeader* header)
|
|
{
|
|
char fin_rsv_opcode, mask_length;
|
|
_socket->getChar(&fin_rsv_opcode);
|
|
_socket->getChar(&mask_length);
|
|
|
|
header->fin = (fin_rsv_opcode & BHB0_FIN) == BHB0_FIN;
|
|
header->opCode = fin_rsv_opcode & BHB0_OPCODE;
|
|
header->masked = (mask_length & BHB1_MASK) == BHB1_MASK;
|
|
header->payloadLength = mask_length & BHB1_PAYLOAD;
|
|
|
|
// get size of payload
|
|
switch (header->payloadLength)
|
|
{
|
|
case payload_size_code_16bit:
|
|
{
|
|
QByteArray buf = _socket->read(2);
|
|
header->payloadLength = ((buf.at(0) << 8) & 0xFF00) | (buf.at(1) & 0xFF);
|
|
}
|
|
break;
|
|
|
|
case payload_size_code_64bit:
|
|
{
|
|
QByteArray buf = _socket->read(8);
|
|
header->payloadLength = 0;
|
|
for (uint i=0; i < 8; i++)
|
|
{
|
|
header->payloadLength |= ((quint64)(buf.at(i) & 0xFF)) << (8*(7-i));
|
|
}
|
|
}
|
|
break;
|
|
}
|
|
|
|
// if the data is masked we need to get the key for unmasking
|
|
if (header->masked)
|
|
{
|
|
_socket->read(header->key, 4);
|
|
}
|
|
}
|
|
|
|
/// See http://tools.ietf.org/html/rfc6455#section-5.2 for more information
|
|
void WebSocketClient::sendClose(int status, QString reason)
|
|
{
|
|
Debug(_log, "send close: %d %s", status, QSTRING_CSTR(reason));
|
|
ErrorIf(!reason.isEmpty(), _log, QSTRING_CSTR(reason));
|
|
_receiveBuffer.clear();
|
|
QByteArray sendBuffer;
|
|
|
|
sendBuffer.append(136+(status-1000));
|
|
int length = reason.size();
|
|
if(length >= 126)
|
|
{
|
|
sendBuffer.append( (length > 0xffff) ? 127 : 126);
|
|
int num_bytes = (length > 0xffff) ? 8 : 2;
|
|
|
|
for(int c = num_bytes - 1; c != -1; c--)
|
|
{
|
|
sendBuffer.append( quint8((static_cast<unsigned long long>(length) >> (8 * c)) % 256));
|
|
}
|
|
}
|
|
else
|
|
{
|
|
sendBuffer.append(quint8(length));
|
|
}
|
|
|
|
sendBuffer.append(reason);
|
|
|
|
_socket->write(sendBuffer);
|
|
_socket->flush();
|
|
_socket->close();
|
|
}
|
|
|
|
void WebSocketClient::handleBinaryMessage(QByteArray &data)
|
|
{
|
|
uint8_t priority = data.at(0);
|
|
unsigned duration_s = data.at(1);
|
|
unsigned imgSize = data.size() - 4;
|
|
unsigned width = ((data.at(2) << 8) & 0xFF00) | (data.at(3) & 0xFF);
|
|
unsigned height = imgSize / width;
|
|
|
|
if ( ! (imgSize) % width)
|
|
{
|
|
Error(_log, "data size is not multiple of width");
|
|
return;
|
|
}
|
|
|
|
Image<ColorRgb> image;
|
|
image.resize(width, height);
|
|
|
|
memcpy(image.memptr(), data.data()+4, imgSize);
|
|
//_hyperion->registerInput();
|
|
_hyperion->setInputImage(priority, image, duration_s*1000);
|
|
}
|
|
|
|
qint64 WebSocketClient::sendMessage(QJsonObject obj)
|
|
{
|
|
QJsonDocument writer(obj);
|
|
QByteArray data = writer.toJson(QJsonDocument::Compact) + "\n";
|
|
|
|
if (!_socket || (_socket->state() != QAbstractSocket::ConnectedState)) return 0;
|
|
|
|
qint64 payloadWritten = 0;
|
|
quint32 payloadSize = data.size();
|
|
const char * payload = data.data();
|
|
|
|
qint32 numFrames = payloadSize / FRAME_SIZE_IN_BYTES + ((quint64(payloadSize) % FRAME_SIZE_IN_BYTES) > 0 ? 1 : 0);
|
|
|
|
for (int i = 0; i < numFrames; ++i)
|
|
{
|
|
const bool isLastFrame = (i == (numFrames - 1));
|
|
|
|
quint64 position = i * FRAME_SIZE_IN_BYTES;
|
|
quint32 frameSize = (payloadSize-position >= FRAME_SIZE_IN_BYTES) ? FRAME_SIZE_IN_BYTES : (payloadSize-position);
|
|
|
|
QByteArray buf = makeFrameHeader(OPCODE::TEXT, frameSize, isLastFrame);
|
|
sendMessage_Raw(buf);
|
|
|
|
qint64 written = sendMessage_Raw(payload+position,frameSize);
|
|
if (written > 0)
|
|
{
|
|
payloadWritten += written;
|
|
}
|
|
else
|
|
{
|
|
_socket->flush();
|
|
Error(_log, "Error writing bytes to socket: %s", QSTRING_CSTR(_socket->errorString()));
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (payloadSize != payloadWritten)
|
|
{
|
|
Error(_log, "Error writing bytes to socket %d bytes from %d written", payloadWritten, payloadSize);
|
|
return -1;
|
|
}
|
|
return payloadWritten;
|
|
}
|
|
|
|
qint64 WebSocketClient::sendMessage_Raw(const char* data, quint64 size)
|
|
{
|
|
return _socket->write(data, size);
|
|
}
|
|
|
|
qint64 WebSocketClient::sendMessage_Raw(QByteArray &data)
|
|
{
|
|
return _socket->write(data.data(), data.size());
|
|
}
|
|
|
|
|
|
QByteArray WebSocketClient::makeFrameHeader(quint8 opCode, quint64 payloadLength, bool lastFrame)
|
|
{
|
|
QByteArray header;
|
|
|
|
if (payloadLength <= 0x7FFFFFFFFFFFFFFFULL)
|
|
{
|
|
//FIN, RSV1-3, opcode (RSV-1, RSV-2 and RSV-3 are zero)
|
|
quint8 byte = static_cast<quint8>((opCode & 0x0F) | (lastFrame ? 0x80 : 0x00));
|
|
header.append(static_cast<char>(byte));
|
|
|
|
byte = 0x00;
|
|
if (payloadLength <= 125)
|
|
{
|
|
byte |= static_cast<quint8>(payloadLength);
|
|
header.append(static_cast<char>(byte));
|
|
}
|
|
else if (payloadLength <= 0xFFFFU)
|
|
{
|
|
byte |= 126;
|
|
header.append(static_cast<char>(byte));
|
|
quint16 swapped = qToBigEndian<quint16>(static_cast<quint16>(payloadLength));
|
|
header.append(static_cast<const char *>(static_cast<const void *>(&swapped)), 2);
|
|
}
|
|
else
|
|
{
|
|
byte |= 127;
|
|
header.append(static_cast<char>(byte));
|
|
quint64 swapped = qToBigEndian<quint64>(payloadLength);
|
|
header.append(static_cast<const char *>(static_cast<const void *>(&swapped)), 8);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
Error(_log, "Payload too big!");
|
|
}
|
|
|
|
return header;
|
|
}
|