mirror of https://github.com/aria2/aria2
				
				
				
			
		
			
				
	
	
		
			525 lines
		
	
	
		
			14 KiB
		
	
	
	
		
			C++
		
	
	
			
		
		
	
	
			525 lines
		
	
	
		
			14 KiB
		
	
	
	
		
			C++
		
	
	
| /*
 | |
|  * Wslay - The WebSocket Library
 | |
|  *
 | |
|  * Copyright (c) 2011, 2012 Tatsuhiro Tsujikawa
 | |
|  *
 | |
|  * Permission is hereby granted, free of charge, to any person obtaining
 | |
|  * a copy of this software and associated documentation files (the
 | |
|  * "Software"), to deal in the Software without restriction, including
 | |
|  * without limitation the rights to use, copy, modify, merge, publish,
 | |
|  * distribute, sublicense, and/or sell copies of the Software, and to
 | |
|  * permit persons to whom the Software is furnished to do so, subject to
 | |
|  * the following conditions:
 | |
|  *
 | |
|  * The above copyright notice and this permission notice shall be
 | |
|  * included in all copies or substantial portions of the Software.
 | |
|  *
 | |
|  * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
 | |
|  * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
 | |
|  * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
 | |
|  * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
 | |
|  * LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
 | |
|  * OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
 | |
|  * WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
 | |
|  */
 | |
| // WebSocket Test Client for Autobahn client test
 | |
| // $ g++ -Wall -O2 -g -o testclient testclient.cc -L../lib/.libs -I../lib/includes -lwslay -lnettle
 | |
| // $ export LD_LIBRARY_PATH=../lib/.libs
 | |
| // $ ./a.out localhost 9001
 | |
| #include <sys/types.h>
 | |
| #include <sys/socket.h>
 | |
| #include <netdb.h>
 | |
| #include <unistd.h>
 | |
| #include <fcntl.h>
 | |
| #include <sys/epoll.h>
 | |
| #include <netinet/in.h>
 | |
| #include <netinet/tcp.h>
 | |
| #include <signal.h>
 | |
| 
 | |
| #include <cassert>
 | |
| #include <cstdio>
 | |
| #include <cerrno>
 | |
| #include <cstdlib>
 | |
| #include <cstring>
 | |
| #include <string>
 | |
| #include <iostream>
 | |
| #include <string>
 | |
| #include <set>
 | |
| #include <iomanip>
 | |
| #include <fstream>
 | |
| 
 | |
| #include <nettle/base64.h>
 | |
| #include <nettle/sha.h>
 | |
| #include <wslay/wslay.h>
 | |
| 
 | |
| int connect_to(const char *host, const char *service)
 | |
| {
 | |
|   struct addrinfo hints;
 | |
|   int fd = -1;
 | |
|   int r;
 | |
|   memset(&hints, 0, sizeof(struct addrinfo));
 | |
|   hints.ai_family = AF_UNSPEC;
 | |
|   hints.ai_socktype = SOCK_STREAM;
 | |
|   struct addrinfo *res;
 | |
|   r = getaddrinfo(host, service, &hints, &res);
 | |
|   if(r != 0) {
 | |
|     std::cerr << "getaddrinfo: " << gai_strerror(r) << std::endl;
 | |
|     return -1;
 | |
|   }
 | |
|   for(struct addrinfo *rp = res; rp; rp = rp->ai_next) {
 | |
|     fd = socket(rp->ai_family, rp->ai_socktype, rp->ai_protocol);
 | |
|     if(fd == -1) {
 | |
|       continue;
 | |
|     }
 | |
|     while((r = connect(fd, rp->ai_addr, rp->ai_addrlen)) == -1 &&
 | |
|           errno == EINTR);
 | |
|     if(r == 0) {
 | |
|       break;
 | |
|     }
 | |
|     close(fd);
 | |
|     fd = -1;
 | |
|   }
 | |
|   freeaddrinfo(res);
 | |
|   return fd;
 | |
| }
 | |
| 
 | |
| int make_non_block(int fd)
 | |
| {
 | |
|   int flags, r;
 | |
|   while((flags = fcntl(fd, F_GETFL, 0)) == -1 && errno == EINTR);
 | |
|   if(flags == -1) {
 | |
|     return -1;
 | |
|   }
 | |
|   while((r = fcntl(fd, F_SETFL, flags | O_NONBLOCK)) == -1 && errno == EINTR);
 | |
|   if(r == -1) {
 | |
|     return -1;
 | |
|   }
 | |
|   return 0;
 | |
| }
 | |
| 
 | |
| std::string sha1(const std::string& src)
 | |
| {
 | |
|   sha1_ctx ctx;
 | |
|   sha1_init(&ctx);
 | |
|   sha1_update(&ctx, src.size(), reinterpret_cast<const uint8_t*>(src.c_str()));
 | |
|   uint8_t temp[SHA1_DIGEST_SIZE];
 | |
|   sha1_digest(&ctx, SHA1_DIGEST_SIZE, temp);
 | |
|   std::string res(&temp[0], &temp[SHA1_DIGEST_SIZE]);
 | |
|   return res;
 | |
| }
 | |
| 
 | |
| std::string base64(const std::string& src)
 | |
| {
 | |
|   base64_encode_ctx ctx;
 | |
|   base64_encode_init(&ctx);
 | |
|   int dstlen = BASE64_ENCODE_RAW_LENGTH(src.size());
 | |
|   uint8_t *dst = new uint8_t[dstlen];
 | |
|   base64_encode_raw(dst, src.size(),
 | |
|                     reinterpret_cast<const uint8_t*>(src.c_str()));
 | |
|   std::string res(&dst[0], &dst[dstlen]);
 | |
|   delete [] dst;
 | |
|   return res;
 | |
| }
 | |
| 
 | |
| std::string create_acceptkey(const std::string& clientkey)
 | |
| {
 | |
|   std::string s = clientkey+"258EAFA5-E914-47DA-95CA-C5AB0DC85B11";
 | |
|   return base64(sha1(s));
 | |
| }
 | |
| 
 | |
| class WebSocketClient {
 | |
| public:
 | |
|   WebSocketClient(int fd, struct wslay_event_callbacks *callbacks,
 | |
|                   const std::string& body)
 | |
|     : fd_(fd),
 | |
|       body_(body),
 | |
|       body_off_(0),
 | |
|       dev_urand_("/dev/urandom")
 | |
|   {
 | |
|     wslay_event_context_client_init(&ctx_, callbacks, this);
 | |
|   }
 | |
|   ~WebSocketClient()
 | |
|   {
 | |
|     wslay_event_context_free(ctx_);
 | |
|     shutdown(fd_, SHUT_WR);
 | |
|     close(fd_);
 | |
|   }
 | |
|   int on_read_event()
 | |
|   {
 | |
|     return wslay_event_recv(ctx_);
 | |
|   }
 | |
|   int on_write_event()
 | |
|   {
 | |
|     return wslay_event_send(ctx_);
 | |
|   }
 | |
|   ssize_t send_data(const uint8_t *data, size_t len, int flags)
 | |
|   {
 | |
|     ssize_t r;
 | |
|     int sflags = 0;
 | |
| #ifdef MSG_MORE
 | |
|     if(flags & WSLAY_MSG_MORE) {
 | |
|       sflags |= MSG_MORE;
 | |
|     }
 | |
| #endif // MSG_MORE
 | |
|     while((r = send(fd_, data, len, sflags)) == -1 && errno == EINTR);
 | |
|     return r;
 | |
|   }
 | |
|   ssize_t feed_body(uint8_t *data, size_t len)
 | |
|   {
 | |
|     if(body_off_ < body_.size()) {
 | |
|       size_t wlen = std::min(len, body_.size()-body_off_);
 | |
|       memcpy(data, body_.c_str(), wlen);
 | |
|       body_off_ += wlen;
 | |
|       return wlen;
 | |
|     } else {
 | |
|       return 0;
 | |
|     }
 | |
|   }
 | |
|   ssize_t recv_data(uint8_t *data, size_t len, int flags)
 | |
|   {
 | |
|     ssize_t r;
 | |
|     while((r = recv(fd_, data, len, 0)) == -1 && errno == EINTR);
 | |
|     return r;
 | |
|   }
 | |
|   bool want_read()
 | |
|   {
 | |
|     return wslay_event_want_read(ctx_);
 | |
|   }
 | |
|   bool want_write()
 | |
|   {
 | |
|     return wslay_event_want_write(ctx_);
 | |
|   }
 | |
|   int fd() const
 | |
|   {
 | |
|     return fd_;
 | |
|   }
 | |
|   void get_random(uint8_t *buf, size_t len)
 | |
|   {
 | |
|     dev_urand_.read((char*)buf, len);
 | |
|   }
 | |
|   void set_callbacks(const struct wslay_event_callbacks *callbacks)
 | |
|   {
 | |
|     wslay_event_config_set_callbacks(ctx_, callbacks);
 | |
|   }
 | |
| private:
 | |
|   int fd_;
 | |
|   wslay_event_context_ptr ctx_;
 | |
|   std::string body_;
 | |
|   size_t body_off_;
 | |
|   std::fstream dev_urand_;
 | |
| };
 | |
| 
 | |
| ssize_t send_callback(wslay_event_context_ptr ctx,
 | |
|                       const uint8_t *data, size_t len, int flags,
 | |
|                       void *user_data)
 | |
| {
 | |
|   WebSocketClient *ws = (WebSocketClient*)user_data;
 | |
|   ssize_t r = ws->send_data(data, len, flags);
 | |
|   if(r == -1) {
 | |
|     if(errno == EAGAIN || errno == EWOULDBLOCK) {
 | |
|       wslay_event_set_error(ctx, WSLAY_ERR_WOULDBLOCK);
 | |
|     } else {
 | |
|       wslay_event_set_error(ctx, WSLAY_ERR_CALLBACK_FAILURE);
 | |
|     }
 | |
|   }
 | |
|   return r;
 | |
| }
 | |
| 
 | |
| ssize_t recv_callback(wslay_event_context_ptr ctx, uint8_t *data, size_t len,
 | |
|                       int flags, void *user_data)
 | |
| {
 | |
|   WebSocketClient *ws = (WebSocketClient*)user_data;
 | |
|   ssize_t r = ws->recv_data(data, len, flags);
 | |
|   if(r == -1) {
 | |
|     if(errno == EAGAIN || errno == EWOULDBLOCK) {
 | |
|       wslay_event_set_error(ctx, WSLAY_ERR_WOULDBLOCK);
 | |
|     } else {
 | |
|       wslay_event_set_error(ctx, WSLAY_ERR_CALLBACK_FAILURE);
 | |
|     }
 | |
|   } else if(r == 0) {
 | |
|     wslay_event_set_error(ctx, WSLAY_ERR_CALLBACK_FAILURE);
 | |
|     r = -1;
 | |
|   }
 | |
|   return r;
 | |
| }
 | |
| 
 | |
| ssize_t feed_body_callback
 | |
| (wslay_event_context_ptr ctx, uint8_t *data, size_t len, int flags,
 | |
|  void *user_data)
 | |
| {
 | |
|   WebSocketClient *ws = (WebSocketClient*)user_data;
 | |
|   return ws->feed_body(data, len);
 | |
| }
 | |
| 
 | |
| int genmask_callback(wslay_event_context_ptr ctx, uint8_t *buf, size_t len,
 | |
|                      void *user_data)
 | |
| {
 | |
|   WebSocketClient *ws = (WebSocketClient*)user_data;
 | |
|   ws->get_random(buf, len);
 | |
|   return 0;
 | |
| }
 | |
| 
 | |
| void on_msg_recv_callback(wslay_event_context_ptr ctx,
 | |
|                           const struct wslay_event_on_msg_recv_arg *arg,
 | |
|                           void *user_data)
 | |
| {
 | |
|   if(!wslay_is_ctrl_frame(arg->opcode)) {
 | |
|     struct wslay_event_msg msgarg = {
 | |
|       arg->opcode, arg->msg, arg->msg_length
 | |
|     };
 | |
|     wslay_event_queue_msg(ctx, &msgarg);
 | |
|   }
 | |
| }
 | |
| 
 | |
| std::string casecntjson;
 | |
| 
 | |
| void get_casecnt_on_msg_recv_callback
 | |
| (wslay_event_context_ptr ctx,
 | |
|  const struct wslay_event_on_msg_recv_arg *arg,
 | |
|  void *user_data)
 | |
| {
 | |
|   if(arg->opcode == WSLAY_TEXT_FRAME) {
 | |
|     casecntjson.assign(arg->msg, arg->msg+arg->msg_length);
 | |
|   }
 | |
| }
 | |
| 
 | |
| int send_http_handshake(int fd, const std::string& reqheader)
 | |
| {
 | |
|   size_t off = 0;
 | |
|   while(off < reqheader.size()) {
 | |
|     ssize_t r;
 | |
|     size_t len = reqheader.size()-off;
 | |
|     while((r = write(fd, reqheader.c_str()+off, len)) == -1 && errno == EINTR);
 | |
|     if(r == -1) {
 | |
|       perror("write");
 | |
|       return -1;
 | |
|     }
 | |
|     off += r;
 | |
|   }
 | |
|   return 0;
 | |
| }
 | |
| 
 | |
| int recv_http_handshake(int fd, std::string& resheader)
 | |
| {
 | |
|   char buf[4096];
 | |
|   while(1) {
 | |
|     ssize_t r;
 | |
|     while((r = read(fd, buf, sizeof(buf))) == -1 && errno == EINTR);
 | |
|     if(r <= 0) {
 | |
|       return -1;
 | |
|     }
 | |
|     resheader.append(buf, buf+r);
 | |
|     if(resheader.find("\r\n\r\n") != std::string::npos) {
 | |
|       break;
 | |
|     }
 | |
|     if(resheader.size() > 8192) {
 | |
|       std::cerr << "Too big response header" << std::endl;
 | |
|       return -1;
 | |
|     }
 | |
|   }
 | |
|   return 0;
 | |
| }
 | |
| 
 | |
| std::string get_random16()
 | |
| {
 | |
|   char buf[16];
 | |
|   std::fstream f("/dev/urandom");
 | |
|   f.read(buf, 16);
 | |
|   return std::string(buf, buf+16);
 | |
| }
 | |
| 
 | |
| int http_handshake(int fd, const char *host, const char *service,
 | |
|                    const char *path, std::string& body)
 | |
| {
 | |
|   char buf[4096];
 | |
|   std::string client_key = base64(get_random16());
 | |
|   snprintf(buf, sizeof(buf),
 | |
|            "GET %s HTTP/1.1\r\n"
 | |
|            "Host: %s:%s\r\n"
 | |
|            "Upgrade: websocket\r\n"
 | |
|            "Connection: Upgrade\r\n"
 | |
|            "Sec-WebSocket-Key: %s\r\n"
 | |
|            "Sec-WebSocket-Version: 13\r\n"
 | |
|            "\r\n",
 | |
|            path, host, service, client_key.c_str());
 | |
|   std::string reqheader = buf;
 | |
|   if(send_http_handshake(fd, reqheader) == -1) {
 | |
|     return -1;
 | |
|   }
 | |
|   std::string resheader;
 | |
|   if(recv_http_handshake(fd, resheader) == -1) {
 | |
|     return -1;
 | |
|   }
 | |
|   std::string::size_type keyhdstart;
 | |
|   if((keyhdstart = resheader.find("Sec-WebSocket-Accept: ")) ==
 | |
|      std::string::npos) {
 | |
|     std::cerr << "http_upgrade: missing required headers" << std::endl;
 | |
|     return -1;
 | |
|   }
 | |
|   keyhdstart += 22;
 | |
|   std::string::size_type keyhdend = resheader.find("\r\n", keyhdstart);
 | |
|   std::string accept_key = resheader.substr(keyhdstart, keyhdend-keyhdstart);
 | |
|   if(accept_key == create_acceptkey(client_key)) {
 | |
|     body = resheader.substr(resheader.find("\r\n\r\n")+4);
 | |
|     return 0;
 | |
|   } else {
 | |
|     return -1;
 | |
|   }
 | |
| }
 | |
| 
 | |
| void ctl_epollev(int epollfd, int op, WebSocketClient& ws)
 | |
| {
 | |
|   epoll_event ev;
 | |
|   memset(&ev, 0, sizeof(ev));
 | |
|   if(ws.want_read()) {
 | |
|     ev.events |= EPOLLIN;
 | |
|   }
 | |
|   if(ws.want_write()) {
 | |
|     ev.events |= EPOLLOUT;
 | |
|   }
 | |
|   if(epoll_ctl(epollfd, op, ws.fd(), &ev) == -1) {
 | |
|     perror("epoll_ctl");
 | |
|     exit(EXIT_FAILURE);
 | |
|   }
 | |
| }
 | |
| 
 | |
| int communicate(const char *host, const char *service, const char *path,
 | |
|                 const struct wslay_event_callbacks *callbacks)
 | |
| {
 | |
|   struct wslay_event_callbacks cb = *callbacks;
 | |
|   cb.recv_callback = feed_body_callback;
 | |
|   int fd = connect_to(host, service);
 | |
|   if(fd == -1) {
 | |
|     std::cerr << "Could not connect to the host" << std::endl;
 | |
|     return -1;
 | |
|   }
 | |
|   std::string body;
 | |
|   if(http_handshake(fd, host, service, path, body) == -1) {
 | |
|     std::cerr << "Failed handshake" << std::endl;
 | |
|     close(fd);
 | |
|     return -1;
 | |
|   }
 | |
|   make_non_block(fd);
 | |
|   int val = 1;
 | |
|   if(setsockopt(fd, IPPROTO_TCP, TCP_NODELAY, &val, (socklen_t)sizeof(val))
 | |
|      == -1) {
 | |
|     perror("setsockopt: TCP_NODELAY");
 | |
|     return -1;
 | |
|   }
 | |
|   WebSocketClient ws(fd, &cb, body);
 | |
|   if(ws.on_read_event() == -1) {
 | |
|     return -1;
 | |
|   }
 | |
|   cb.recv_callback = callbacks->recv_callback;
 | |
|   ws.set_callbacks(&cb);
 | |
|   int epollfd = epoll_create(1);
 | |
|   if(epollfd == -1) {
 | |
|     perror("epoll_create");
 | |
|     return -1;
 | |
|   }
 | |
|   ctl_epollev(epollfd, EPOLL_CTL_ADD, ws);
 | |
|   static const size_t MAX_EVENTS = 1;
 | |
|   epoll_event events[MAX_EVENTS];
 | |
|   bool ok = true;
 | |
|   while(ws.want_read() || ws.want_write()) {
 | |
|     int nfds = epoll_wait(epollfd, events, MAX_EVENTS, -1);
 | |
|     if(nfds == -1) {
 | |
|       perror("epoll_wait");
 | |
|       return -1;
 | |
|     }
 | |
|     for(int n = 0; n < nfds; ++n) {
 | |
|       if(((events[n].events & EPOLLIN) && ws.on_read_event() != 0) ||
 | |
|          ((events[n].events & EPOLLOUT) && ws.on_write_event() != 0)) {
 | |
|         ok = false;
 | |
|         break;
 | |
|       }
 | |
|     }
 | |
|     if(!ok) {
 | |
|       break;
 | |
|     }
 | |
|     ctl_epollev(epollfd, EPOLL_CTL_MOD, ws);
 | |
|   }
 | |
|   return ok ? 0 : -1;
 | |
| }
 | |
| 
 | |
| int get_casecnt(const char *host, const char *service)
 | |
| {
 | |
|   struct wslay_event_callbacks callbacks = {
 | |
|     recv_callback,
 | |
|     send_callback,
 | |
|     genmask_callback,
 | |
|     NULL, /* on_frame_recv_start_callback */
 | |
|     NULL, /* on_frame_recv_callback */
 | |
|     NULL, /* on_frame_recv_end_callback */
 | |
|     get_casecnt_on_msg_recv_callback
 | |
|   };
 | |
|   if(communicate(host, service, "/getCaseCount", &callbacks) == -1) {
 | |
|     return -1;
 | |
|   }
 | |
|   errno = 0;
 | |
|   int casecnt = strtol(casecntjson.c_str(), 0, 10);
 | |
|   if(errno == ERANGE) {
 | |
|     return -1;
 | |
|   } else {
 | |
|     return casecnt;
 | |
|   }
 | |
| }
 | |
| 
 | |
| int run_testcase(const char *host, const char *service, int casenum)
 | |
| {
 | |
|   struct wslay_event_callbacks callbacks = {
 | |
|     recv_callback,
 | |
|     send_callback,
 | |
|     genmask_callback,
 | |
|     NULL, /* on_frame_recv_start_callback */
 | |
|     NULL, /* on_frame_recv_callback */
 | |
|     NULL, /* on_frame_recv_end_callback */
 | |
|     on_msg_recv_callback
 | |
|   };
 | |
|   char buf[1024];
 | |
|   snprintf(buf, sizeof(buf), "/runCase?case=%d&agent=wslay", casenum);
 | |
|   return communicate(host, service, buf, &callbacks);
 | |
| }
 | |
| int update_reports(const char *host, const char *service)
 | |
| {
 | |
|   struct wslay_event_callbacks callbacks = {
 | |
|     recv_callback,
 | |
|     send_callback,
 | |
|     genmask_callback,
 | |
|     NULL, /* on_frame_recv_start_callback */
 | |
|     NULL, /* on_frame_recv_callback */
 | |
|     NULL, /* on_frame_recv_end_callback */
 | |
|     NULL, /* on_msg_recv_callback */
 | |
|   };
 | |
|   return communicate(host, service, "/updateReports?&agent=wslay", &callbacks);
 | |
| }
 | |
| 
 | |
| int main(int argc, char **argv)
 | |
| {
 | |
|   if(argc < 2) {
 | |
|     std::cerr << "Usage: " << argv[0] << " HOST SERV" << std::endl;
 | |
|     exit(EXIT_FAILURE);
 | |
|   }
 | |
|   struct sigaction act;
 | |
|   memset(&act, 0, sizeof(struct sigaction));
 | |
|   act.sa_handler = SIG_IGN;
 | |
|   sigaction(SIGPIPE, &act, 0);
 | |
|   const char *host = argv[1];
 | |
|   const char *service = argv[2];
 | |
|   int casecnt = get_casecnt(host, service);
 | |
|   if(casecnt == -1) {
 | |
|     std::cerr << "Failed to get case count." << std::endl;
 | |
|     exit(EXIT_FAILURE);
 | |
|   }
 | |
|   for(int i = 1; i <= casecnt; ++i) {
 | |
|     std::cout << "Running test case " << i << std::endl;
 | |
|     if(run_testcase(host, service, i) == -1) {
 | |
|       std::cout << "Detected error during test" << std::endl;
 | |
|     }
 | |
|   }
 | |
|   if(update_reports(host, service) == -1) {
 | |
|     std::cerr << "Failed to update reports." << std::endl;
 | |
|     exit(EXIT_FAILURE);
 | |
|   }
 | |
| }
 |