cowboy_websocket.erl 24 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569
  1. %% Copyright (c) 2011-2012, Loïc Hoguin <essen@ninenines.eu>
  2. %%
  3. %% Permission to use, copy, modify, and/or distribute this software for any
  4. %% purpose with or without fee is hereby granted, provided that the above
  5. %% copyright notice and this permission notice appear in all copies.
  6. %%
  7. %% THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
  8. %% WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
  9. %% MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
  10. %% ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
  11. %% WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
  12. %% ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
  13. %% OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
  14. %% @doc WebSocket protocol implementation.
  15. %%
  16. %% When using websockets, make sure that the crypto application is
  17. %% included in your release. If you are not using releases then there
  18. %% is no need for concern as crypto is already included.
  19. -module(cowboy_websocket).
  20. %% API.
  21. -export([upgrade/4]).
  22. %% Internal.
  23. -export([handler_loop/4]).
  24. -include("http.hrl").
  25. -type opcode() :: 0 | 1 | 2 | 8 | 9 | 10.
  26. -type mask_key() :: 0..16#ffffffff.
  27. %% The websocket_data/4 function may be called multiple times for a message.
  28. %% The websocket_dispatch/4 function is only called once for each message.
  29. -type frag_state() ::
  30. undefined | %% no fragmentation has been seen.
  31. {nofin, opcode()} | %% first fragment has been seen.
  32. {nofin, opcode(), binary()} | %% first fragment has been unmasked.
  33. {fin, opcode(), binary()}. %% last fragment has been seen.
  34. -record(state, {
  35. socket = undefined :: inet:socket(),
  36. transport = undefined :: module(),
  37. version :: 0 | 7 | 8 | 13,
  38. handler :: module(),
  39. opts :: any(),
  40. challenge = undefined :: undefined | binary() | {binary(), binary()},
  41. timeout = infinity :: timeout(),
  42. timeout_ref = undefined :: undefined | reference(),
  43. messages = undefined :: undefined | {atom(), atom(), atom()},
  44. hibernate = false :: boolean(),
  45. eop :: undefined | tuple(), %% hixie-76 specific.
  46. origin = undefined :: undefined | binary(), %% hixie-76 specific.
  47. frag_state = undefined :: frag_state()
  48. }).
  49. %% @doc Upgrade a HTTP request to the WebSocket protocol.
  50. %%
  51. %% You do not need to call this function manually. To upgrade to the WebSocket
  52. %% protocol, you simply need to return <em>{upgrade, protocol, {@module}}</em>
  53. %% in your <em>cowboy_http_handler:init/3</em> handler function.
  54. -spec upgrade(pid(), module(), any(), cowboy_req:req()) -> closed.
  55. upgrade(ListenerPid, Handler, Opts, Req) ->
  56. ranch_listener:remove_connection(ListenerPid),
  57. {ok, Transport, Socket} = cowboy_req:transport(Req),
  58. State = #state{socket=Socket, transport=Transport,
  59. handler=Handler, opts=Opts},
  60. case catch websocket_upgrade(State, Req) of
  61. {ok, State2, Req2} -> handler_init(State2, Req2);
  62. {'EXIT', _Reason} -> upgrade_error(Req)
  63. end.
  64. -spec websocket_upgrade(#state{}, Req)
  65. -> {ok, #state{}, Req} when Req::cowboy_req:req().
  66. websocket_upgrade(State, Req) ->
  67. {ConnTokens, Req2}
  68. = cowboy_req:parse_header('Connection', Req),
  69. true = lists:member(<<"upgrade">>, ConnTokens),
  70. %% @todo Should probably send a 426 if the Upgrade header is missing.
  71. {[<<"websocket">>], Req3} = cowboy_req:parse_header('Upgrade', Req2),
  72. {Version, Req4} = cowboy_req:header(<<"Sec-Websocket-Version">>, Req3),
  73. websocket_upgrade(Version, State, Req4).
  74. %% @todo Handle the Sec-Websocket-Protocol header.
  75. %% @todo Reply a proper error, don't die, if a required header is undefined.
  76. -spec websocket_upgrade(undefined | <<_:8>>, #state{}, Req)
  77. -> {ok, #state{}, Req} when Req::cowboy_req:req().
  78. %% No version given. Assuming hixie-76 draft.
  79. %%
  80. %% We need to wait to send a reply back before trying to read the
  81. %% third part of the challenge key, because proxies will wait for
  82. %% a reply before sending it. Therefore we calculate the challenge
  83. %% key only in websocket_handshake/3.
  84. websocket_upgrade(undefined, State, Req=#http_req{meta=Meta}) ->
  85. {Origin, Req2} = cowboy_req:header(<<"Origin">>, Req),
  86. {Key1, Req3} = cowboy_req:header(<<"Sec-Websocket-Key1">>, Req2),
  87. {Key2, Req4} = cowboy_req:header(<<"Sec-Websocket-Key2">>, Req3),
  88. false = lists:member(undefined, [Origin, Key1, Key2]),
  89. EOP = binary:compile_pattern(<< 255 >>),
  90. {ok, State#state{version=0, origin=Origin, challenge={Key1, Key2},
  91. eop=EOP}, Req4#http_req{meta=[{websocket_version, 0}|Meta]}};
  92. %% Versions 7 and 8. Implementation follows the hybi 7 through 17 drafts.
  93. websocket_upgrade(Version, State, Req=#http_req{meta=Meta})
  94. when Version =:= <<"7">>; Version =:= <<"8">>;
  95. Version =:= <<"13">> ->
  96. {Key, Req2} = cowboy_req:header(<<"Sec-Websocket-Key">>, Req),
  97. false = Key =:= undefined,
  98. Challenge = hybi_challenge(Key),
  99. IntVersion = list_to_integer(binary_to_list(Version)),
  100. {ok, State#state{version=IntVersion, challenge=Challenge},
  101. Req2#http_req{meta=[{websocket_version, IntVersion}|Meta]}}.
  102. -spec handler_init(#state{}, cowboy_req:req()) -> closed.
  103. handler_init(State=#state{transport=Transport, handler=Handler, opts=Opts},
  104. Req) ->
  105. try Handler:websocket_init(Transport:name(), Req, Opts) of
  106. {ok, Req2, HandlerState} ->
  107. websocket_handshake(State, Req2, HandlerState);
  108. {ok, Req2, HandlerState, hibernate} ->
  109. websocket_handshake(State#state{hibernate=true},
  110. Req2, HandlerState);
  111. {ok, Req2, HandlerState, Timeout} ->
  112. websocket_handshake(State#state{timeout=Timeout},
  113. Req2, HandlerState);
  114. {ok, Req2, HandlerState, Timeout, hibernate} ->
  115. websocket_handshake(State#state{timeout=Timeout,
  116. hibernate=true}, Req2, HandlerState);
  117. {shutdown, Req2} ->
  118. upgrade_denied(Req2)
  119. catch Class:Reason ->
  120. upgrade_error(Req),
  121. PLReq = cowboy_req:to_list(Req),
  122. error_logger:error_msg(
  123. "** Handler ~p terminating in websocket_init/3~n"
  124. " for the reason ~p:~p~n** Options were ~p~n"
  125. "** Request was ~p~n** Stacktrace: ~p~n~n",
  126. [Handler, Class, Reason, Opts, PLReq, erlang:get_stacktrace()])
  127. end.
  128. -spec upgrade_error(cowboy_req:req()) -> closed.
  129. upgrade_error(Req) ->
  130. receive
  131. {cowboy_req, resp_sent} -> closed
  132. after 0 ->
  133. _ = cowboy_req:reply(400, [], [], Req),
  134. closed
  135. end.
  136. %% @see cowboy_protocol:ensure_response/1
  137. -spec upgrade_denied(cowboy_req:req()) -> closed.
  138. upgrade_denied(#http_req{resp_state=done}) ->
  139. closed;
  140. upgrade_denied(Req=#http_req{resp_state=waiting}) ->
  141. {ok, _Req2} = cowboy_req:reply(400, [], [], Req),
  142. closed;
  143. upgrade_denied(#http_req{method='HEAD', resp_state=chunks}) ->
  144. closed;
  145. upgrade_denied(#http_req{socket=Socket, transport=Transport,
  146. resp_state=chunks}) ->
  147. Transport:send(Socket, <<"0\r\n\r\n">>),
  148. closed.
  149. -spec websocket_handshake(#state{}, cowboy_req:req(), any()) -> closed.
  150. websocket_handshake(State=#state{socket=Socket, transport=Transport,
  151. version=0, origin=Origin, challenge={Key1, Key2}},
  152. Req, HandlerState) ->
  153. {<< "http", Location/binary >>, Req1} = cowboy_req:url(Req),
  154. {ok, Req2} = cowboy_req:upgrade_reply(
  155. <<"101 WebSocket Protocol Handshake">>,
  156. [{<<"Upgrade">>, <<"WebSocket">>},
  157. {<<"Sec-Websocket-Location">>, << "ws", Location/binary >>},
  158. {<<"Sec-Websocket-Origin">>, Origin}],
  159. Req1),
  160. %% Flush the resp_sent message before moving on.
  161. receive {cowboy_req, resp_sent} -> ok after 0 -> ok end,
  162. %% We replied with a proper response. Proxies should be happy enough,
  163. %% we can now read the 8 last bytes of the challenge keys and send
  164. %% the challenge response directly to the socket.
  165. %%
  166. %% We use a trick here to read exactly 8 bytes of the body regardless
  167. %% of what's in the buffer.
  168. {ok, Req3} = cowboy_req:init_stream(
  169. fun cowboy_http:te_identity/2, {0, 8},
  170. fun cowboy_http:ce_identity/1, Req2),
  171. case cowboy_req:body(Req3) of
  172. {ok, Key3, Req4} ->
  173. Challenge = hixie76_challenge(Key1, Key2, Key3),
  174. Transport:send(Socket, Challenge),
  175. handler_before_loop(State#state{messages=Transport:messages()},
  176. Req4, HandlerState, <<>>);
  177. _Any ->
  178. closed %% If an error happened reading the body, stop there.
  179. end;
  180. websocket_handshake(State=#state{transport=Transport, challenge=Challenge},
  181. Req, HandlerState) ->
  182. {ok, Req2} = cowboy_req:upgrade_reply(
  183. 101,
  184. [{<<"Upgrade">>, <<"websocket">>},
  185. {<<"Sec-Websocket-Accept">>, Challenge}],
  186. Req),
  187. %% Flush the resp_sent message before moving on.
  188. receive {cowboy_req, resp_sent} -> ok after 0 -> ok end,
  189. handler_before_loop(State#state{messages=Transport:messages()},
  190. Req2, HandlerState, <<>>).
  191. -spec handler_before_loop(#state{}, cowboy_req:req(), any(), binary()) -> closed.
  192. handler_before_loop(State=#state{
  193. socket=Socket, transport=Transport, hibernate=true},
  194. Req, HandlerState, SoFar) ->
  195. Transport:setopts(Socket, [{active, once}]),
  196. State2 = handler_loop_timeout(State),
  197. catch erlang:hibernate(?MODULE, handler_loop,
  198. [State2#state{hibernate=false}, Req, HandlerState, SoFar]),
  199. closed;
  200. handler_before_loop(State=#state{socket=Socket, transport=Transport},
  201. Req, HandlerState, SoFar) ->
  202. Transport:setopts(Socket, [{active, once}]),
  203. State2 = handler_loop_timeout(State),
  204. handler_loop(State2, Req, HandlerState, SoFar).
  205. -spec handler_loop_timeout(#state{}) -> #state{}.
  206. handler_loop_timeout(State=#state{timeout=infinity}) ->
  207. State#state{timeout_ref=undefined};
  208. handler_loop_timeout(State=#state{timeout=Timeout, timeout_ref=PrevRef}) ->
  209. _ = case PrevRef of undefined -> ignore; PrevRef ->
  210. erlang:cancel_timer(PrevRef) end,
  211. TRef = erlang:start_timer(Timeout, self(), ?MODULE),
  212. State#state{timeout_ref=TRef}.
  213. %% @private
  214. -spec handler_loop(#state{}, cowboy_req:req(), any(), binary()) -> closed.
  215. handler_loop(State=#state{
  216. socket=Socket, messages={OK, Closed, Error}, timeout_ref=TRef},
  217. Req, HandlerState, SoFar) ->
  218. receive
  219. {OK, Socket, Data} ->
  220. websocket_data(State, Req, HandlerState,
  221. << SoFar/binary, Data/binary >>);
  222. {Closed, Socket} ->
  223. handler_terminate(State, Req, HandlerState, {error, closed});
  224. {Error, Socket, Reason} ->
  225. handler_terminate(State, Req, HandlerState, {error, Reason});
  226. {timeout, TRef, ?MODULE} ->
  227. websocket_close(State, Req, HandlerState, {normal, timeout});
  228. {timeout, OlderTRef, ?MODULE} when is_reference(OlderTRef) ->
  229. handler_loop(State, Req, HandlerState, SoFar);
  230. Message ->
  231. handler_call(State, Req, HandlerState,
  232. SoFar, websocket_info, Message, fun handler_before_loop/4)
  233. end.
  234. -spec websocket_data(#state{}, cowboy_req:req(), any(), binary()) -> closed.
  235. %% No more data.
  236. websocket_data(State, Req, HandlerState, <<>>) ->
  237. handler_before_loop(State, Req, HandlerState, <<>>);
  238. %% hixie-76 close frame.
  239. websocket_data(State=#state{version=0}, Req, HandlerState,
  240. << 255, 0, _Rest/binary >>) ->
  241. websocket_close(State, Req, HandlerState, {normal, closed});
  242. %% hixie-76 data frame. We only support the frame type 0, same as the specs.
  243. websocket_data(State=#state{version=0, eop=EOP}, Req, HandlerState,
  244. Data = << 0, _/binary >>) ->
  245. case binary:match(Data, EOP) of
  246. {Pos, 1} ->
  247. Pos2 = Pos - 1,
  248. << 0, Payload:Pos2/binary, 255, Rest/bits >> = Data,
  249. handler_call(State, Req, HandlerState,
  250. Rest, websocket_handle, {text, Payload}, fun websocket_data/4);
  251. nomatch ->
  252. %% @todo We probably should allow limiting frame length.
  253. handler_before_loop(State, Req, HandlerState, Data)
  254. end;
  255. %% incomplete hybi data frame.
  256. websocket_data(State=#state{version=Version}, Req, HandlerState, Data)
  257. when Version =/= 0, byte_size(Data) =:= 1 ->
  258. handler_before_loop(State, Req, HandlerState, Data);
  259. %% 7 bit payload length prefix exists
  260. websocket_data(State, Req, HandlerState,
  261. << Fin:1, Rsv:3, Opcode:4, Mask:1, PayloadLen:7, Rest/bits >>
  262. = Data) when PayloadLen < 126 ->
  263. websocket_data(State, Req, HandlerState,
  264. Fin, Rsv, Opcode, Mask, PayloadLen, Rest, Data);
  265. %% 7+16 bits payload length prefix exists
  266. websocket_data(State, Req, HandlerState,
  267. << Fin:1, Rsv:3, Opcode:4, Mask:1, 126:7, PayloadLen:16, Rest/bits >>
  268. = Data) when PayloadLen > 125 ->
  269. websocket_data(State, Req, HandlerState,
  270. Fin, Rsv, Opcode, Mask, PayloadLen, Rest, Data);
  271. %% 7+16 bits payload length prefix missing
  272. websocket_data(State, Req, HandlerState,
  273. << _Fin:1, _Rsv:3, _Opcode:4, _Mask:1, 126:7, Rest/bits >>
  274. = Data) when byte_size(Rest) < 2 ->
  275. handler_before_loop(State, Req, HandlerState, Data);
  276. %% 7+64 bits payload length prefix exists
  277. websocket_data(State, Req, HandlerState,
  278. << Fin:1, Rsv:3, Opcode:4, Mask:1, 127:7, 0:1, PayloadLen:63,
  279. Rest/bits >> = Data) when PayloadLen > 16#FFFF ->
  280. websocket_data(State, Req, HandlerState,
  281. Fin, Rsv, Opcode, Mask, PayloadLen, Rest, Data);
  282. %% 7+64 bits payload length prefix missing
  283. websocket_data(State, Req, HandlerState,
  284. << _Fin:1, _Rsv:3, _Opcode:4, _Mask:1, 127:7, Rest/bits >>
  285. = Data) when byte_size(Rest) < 8 ->
  286. handler_before_loop(State, Req, HandlerState, Data);
  287. %% invalid payload length prefix.
  288. websocket_data(State, Req, HandlerState, _Data) ->
  289. websocket_close(State, Req, HandlerState, {error, badframe}).
  290. -spec websocket_data(#state{}, cowboy_req:req(), any(), non_neg_integer(),
  291. non_neg_integer(), non_neg_integer(), non_neg_integer(),
  292. non_neg_integer(), binary(), binary()) -> closed.
  293. %% A fragmented message MUST start a non-zero opcode.
  294. websocket_data(State=#state{frag_state=undefined}, Req, HandlerState,
  295. _Fin=0, _Rsv=0, _Opcode=0, _Mask, _PayloadLen, _Rest, _Buffer) ->
  296. websocket_close(State, Req, HandlerState, {error, badframe});
  297. %% A control message MUST NOT be fragmented.
  298. websocket_data(State, Req, HandlerState, _Fin=0, _Rsv=0, Opcode, _Mask,
  299. _PayloadLen, _Rest, _Buffer) when Opcode >= 8 ->
  300. websocket_close(State, Req, HandlerState, {error, badframe});
  301. %% The opcode is only included in the first message fragment.
  302. websocket_data(State=#state{frag_state=undefined}, Req, HandlerState,
  303. _Fin=0, _Rsv=0, Opcode, Mask, PayloadLen, Rest, Data) ->
  304. websocket_before_unmask(
  305. State#state{frag_state={nofin, Opcode}}, Req, HandlerState,
  306. Data, Rest, 0, Mask, PayloadLen);
  307. %% non-control opcode when expecting control message or next fragment.
  308. websocket_data(State=#state{frag_state={nofin, _, _}}, Req, HandlerState, _Fin,
  309. _Rsv=0, Opcode, _Mask, _Ln, _Rest, _Data) when Opcode > 0, Opcode < 8 ->
  310. websocket_close(State, Req, HandlerState, {error, badframe});
  311. %% If the first message fragment was incomplete, retry unmasking.
  312. websocket_data(State=#state{frag_state={nofin, Opcode}}, Req, HandlerState,
  313. _Fin=0, _Rsv=0, Opcode, Mask, PayloadLen, Rest, Data) ->
  314. websocket_before_unmask(
  315. State#state{frag_state={nofin, Opcode}}, Req, HandlerState,
  316. Data, Rest, 0, Mask, PayloadLen);
  317. %% if the opcode is zero and the fin flag is zero, unmask and await next.
  318. websocket_data(State=#state{frag_state={nofin, _Opcode, _Payloads}}, Req,
  319. HandlerState, _Fin=0, _Rsv=0, _Opcode2=0, Mask, PayloadLen, Rest,
  320. Data) ->
  321. websocket_before_unmask(
  322. State, Req, HandlerState, Data, Rest, 0, Mask, PayloadLen);
  323. %% when the last fragment is seen. Update the fragmentation status.
  324. websocket_data(State=#state{frag_state={nofin, Opcode, Payloads}}, Req,
  325. HandlerState, _Fin=1, _Rsv=0, _Opcode=0, Mask, PayloadLen, Rest,
  326. Data) ->
  327. websocket_before_unmask(
  328. State#state{frag_state={fin, Opcode, Payloads}},
  329. Req, HandlerState, Data, Rest, 0, Mask, PayloadLen);
  330. %% control messages MUST NOT use 7+16 bits or 7+64 bits payload length prefixes
  331. websocket_data(State, Req, HandlerState, _Fin, _Rsv, Opcode, _Mask, PayloadLen,
  332. _Rest, _Data) when Opcode >= 8, PayloadLen > 125 ->
  333. websocket_close(State, Req, HandlerState, {error, badframe});
  334. %% unfragmented message. unmask and dispatch the message.
  335. websocket_data(State=#state{version=Version}, Req, HandlerState, _Fin=1, _Rsv=0,
  336. Opcode, Mask, PayloadLen, Rest, Data) when Version =/= 0 ->
  337. websocket_before_unmask(
  338. State, Req, HandlerState, Data, Rest, Opcode, Mask, PayloadLen);
  339. %% Something was wrong with the frame. Close the connection.
  340. websocket_data(State, Req, HandlerState, _Fin, _Rsv, _Opcode, _Mask,
  341. _PayloadLen, _Rest, _Data) ->
  342. websocket_close(State, Req, HandlerState, {error, badframe}).
  343. %% hybi routing depending on whether unmasking is needed.
  344. -spec websocket_before_unmask(#state{}, cowboy_req:req(), any(), binary(),
  345. binary(), opcode(), 0 | 1, non_neg_integer() | undefined) -> closed.
  346. websocket_before_unmask(State, Req, HandlerState, Data,
  347. Rest, Opcode, Mask, PayloadLen) ->
  348. case {Mask, PayloadLen} of
  349. {0, 0} ->
  350. websocket_dispatch(State, Req, HandlerState, Rest, Opcode, <<>>);
  351. {1, N} when N + 4 > byte_size(Rest); N =:= undefined ->
  352. %% @todo We probably should allow limiting frame length.
  353. handler_before_loop(State, Req, HandlerState, Data);
  354. {1, _N} ->
  355. << MaskKey:32, Payload:PayloadLen/binary, Rest2/bits >> = Rest,
  356. websocket_unmask(State, Req, HandlerState, Rest2,
  357. Opcode, Payload, MaskKey)
  358. end.
  359. %% hybi unmasking.
  360. -spec websocket_unmask(#state{}, cowboy_req:req(), any(), binary(),
  361. opcode(), binary(), mask_key()) -> closed.
  362. websocket_unmask(State, Req, HandlerState, RemainingData,
  363. Opcode, Payload, MaskKey) ->
  364. websocket_unmask(State, Req, HandlerState, RemainingData,
  365. Opcode, Payload, MaskKey, <<>>).
  366. -spec websocket_unmask(#state{}, cowboy_req:req(), any(), binary(),
  367. opcode(), binary(), mask_key(), binary()) -> closed.
  368. websocket_unmask(State, Req, HandlerState, RemainingData,
  369. Opcode, << O:32, Rest/bits >>, MaskKey, Acc) ->
  370. T = O bxor MaskKey,
  371. websocket_unmask(State, Req, HandlerState, RemainingData,
  372. Opcode, Rest, MaskKey, << Acc/binary, T:32 >>);
  373. websocket_unmask(State, Req, HandlerState, RemainingData,
  374. Opcode, << O:24 >>, MaskKey, Acc) ->
  375. << MaskKey2:24, _:8 >> = << MaskKey:32 >>,
  376. T = O bxor MaskKey2,
  377. websocket_dispatch(State, Req, HandlerState, RemainingData,
  378. Opcode, << Acc/binary, T:24 >>);
  379. websocket_unmask(State, Req, HandlerState, RemainingData,
  380. Opcode, << O:16 >>, MaskKey, Acc) ->
  381. << MaskKey2:16, _:16 >> = << MaskKey:32 >>,
  382. T = O bxor MaskKey2,
  383. websocket_dispatch(State, Req, HandlerState, RemainingData,
  384. Opcode, << Acc/binary, T:16 >>);
  385. websocket_unmask(State, Req, HandlerState, RemainingData,
  386. Opcode, << O:8 >>, MaskKey, Acc) ->
  387. << MaskKey2:8, _:24 >> = << MaskKey:32 >>,
  388. T = O bxor MaskKey2,
  389. websocket_dispatch(State, Req, HandlerState, RemainingData,
  390. Opcode, << Acc/binary, T:8 >>);
  391. websocket_unmask(State, Req, HandlerState, RemainingData,
  392. Opcode, <<>>, _MaskKey, Acc) ->
  393. websocket_dispatch(State, Req, HandlerState, RemainingData,
  394. Opcode, Acc).
  395. %% hybi dispatching.
  396. -spec websocket_dispatch(#state{}, cowboy_req:req(), any(), binary(),
  397. opcode(), binary()) -> closed.
  398. %% First frame of a fragmented message unmasked. Expect intermediate or last.
  399. websocket_dispatch(State=#state{frag_state={nofin, Opcode}}, Req, HandlerState,
  400. RemainingData, 0, Payload) ->
  401. websocket_data(State#state{frag_state={nofin, Opcode, Payload}},
  402. Req, HandlerState, RemainingData);
  403. %% Intermediate frame of a fragmented message unmasked. Add payload to buffer.
  404. websocket_dispatch(State=#state{frag_state={nofin, Opcode, Payloads}}, Req,
  405. HandlerState, RemainingData, 0, Payload) ->
  406. websocket_data(State#state{frag_state={nofin, Opcode,
  407. <<Payloads/binary, Payload/binary>>}}, Req, HandlerState,
  408. RemainingData);
  409. %% Last frame of a fragmented message unmasked. Dispatch to handler.
  410. websocket_dispatch(State=#state{frag_state={fin, Opcode, Payloads}}, Req,
  411. HandlerState, RemainingData, 0, Payload) ->
  412. websocket_dispatch(State#state{frag_state=undefined}, Req, HandlerState,
  413. RemainingData, Opcode, <<Payloads/binary, Payload/binary>>);
  414. %% Text frame.
  415. websocket_dispatch(State, Req, HandlerState, RemainingData, 1, Payload) ->
  416. handler_call(State, Req, HandlerState, RemainingData,
  417. websocket_handle, {text, Payload}, fun websocket_data/4);
  418. %% Binary frame.
  419. websocket_dispatch(State, Req, HandlerState, RemainingData, 2, Payload) ->
  420. handler_call(State, Req, HandlerState, RemainingData,
  421. websocket_handle, {binary, Payload}, fun websocket_data/4);
  422. %% Close control frame.
  423. %% @todo Handle the optional Payload.
  424. websocket_dispatch(State, Req, HandlerState, _RemainingData, 8, _Payload) ->
  425. websocket_close(State, Req, HandlerState, {normal, closed});
  426. %% Ping control frame. Send a pong back and forward the ping to the handler.
  427. websocket_dispatch(State=#state{socket=Socket, transport=Transport},
  428. Req, HandlerState, RemainingData, 9, Payload) ->
  429. Len = hybi_payload_length(byte_size(Payload)),
  430. Transport:send(Socket, << 1:1, 0:3, 10:4, 0:1, Len/bits, Payload/binary >>),
  431. handler_call(State, Req, HandlerState, RemainingData,
  432. websocket_handle, {ping, Payload}, fun websocket_data/4);
  433. %% Pong control frame.
  434. websocket_dispatch(State, Req, HandlerState, RemainingData, 10, Payload) ->
  435. handler_call(State, Req, HandlerState, RemainingData,
  436. websocket_handle, {pong, Payload}, fun websocket_data/4).
  437. -spec handler_call(#state{}, cowboy_req:req(), any(), binary(),
  438. atom(), any(), fun()) -> closed.
  439. handler_call(State=#state{handler=Handler, opts=Opts}, Req, HandlerState,
  440. RemainingData, Callback, Message, NextState) ->
  441. try Handler:Callback(Message, Req, HandlerState) of
  442. {ok, Req2, HandlerState2} ->
  443. NextState(State, Req2, HandlerState2, RemainingData);
  444. {ok, Req2, HandlerState2, hibernate} ->
  445. NextState(State#state{hibernate=true},
  446. Req2, HandlerState2, RemainingData);
  447. {reply, Payload, Req2, HandlerState2} ->
  448. websocket_send(Payload, State),
  449. NextState(State, Req2, HandlerState2, RemainingData);
  450. {reply, Payload, Req2, HandlerState2, hibernate} ->
  451. websocket_send(Payload, State),
  452. NextState(State#state{hibernate=true},
  453. Req2, HandlerState2, RemainingData);
  454. {shutdown, Req2, HandlerState2} ->
  455. websocket_close(State, Req2, HandlerState2, {normal, shutdown})
  456. catch Class:Reason ->
  457. PLReq = cowboy_req:to_list(Req),
  458. error_logger:error_msg(
  459. "** Handler ~p terminating in ~p/3~n"
  460. " for the reason ~p:~p~n** Message was ~p~n"
  461. "** Options were ~p~n** Handler state was ~p~n"
  462. "** Request was ~p~n** Stacktrace: ~p~n~n",
  463. [Handler, Callback, Class, Reason, Message, Opts,
  464. HandlerState, PLReq, erlang:get_stacktrace()]),
  465. websocket_close(State, Req, HandlerState, {error, handler})
  466. end.
  467. -spec websocket_send(binary(), #state{}) -> closed | ignore.
  468. %% hixie-76 text frame.
  469. websocket_send({text, Payload}, #state{
  470. socket=Socket, transport=Transport, version=0}) ->
  471. Transport:send(Socket, [0, Payload, 255]);
  472. %% Ignore all unknown frame types for compatibility with hixie 76.
  473. websocket_send(_Any, #state{version=0}) ->
  474. ignore;
  475. websocket_send({Type, Payload}, #state{socket=Socket, transport=Transport}) ->
  476. Opcode = case Type of
  477. text -> 1;
  478. binary -> 2;
  479. ping -> 9;
  480. pong -> 10
  481. end,
  482. Len = hybi_payload_length(iolist_size(Payload)),
  483. Transport:send(Socket, [<< 1:1, 0:3, Opcode:4, 0:1, Len/bits >>,
  484. Payload]).
  485. -spec websocket_close(#state{}, cowboy_req:req(), any(), {atom(), atom()})
  486. -> closed.
  487. websocket_close(State=#state{socket=Socket, transport=Transport, version=0},
  488. Req, HandlerState, Reason) ->
  489. Transport:send(Socket, << 255, 0 >>),
  490. handler_terminate(State, Req, HandlerState, Reason);
  491. %% @todo Send a Payload? Using Reason is usually good but we're quite careless.
  492. websocket_close(State=#state{socket=Socket, transport=Transport},
  493. Req, HandlerState, Reason) ->
  494. Transport:send(Socket, << 1:1, 0:3, 8:4, 0:8 >>),
  495. handler_terminate(State, Req, HandlerState, Reason).
  496. -spec handler_terminate(#state{}, cowboy_req:req(),
  497. any(), atom() | {atom(), atom()}) -> closed.
  498. handler_terminate(#state{handler=Handler, opts=Opts},
  499. Req, HandlerState, TerminateReason) ->
  500. try
  501. Handler:websocket_terminate(TerminateReason, Req, HandlerState)
  502. catch Class:Reason ->
  503. PLReq = cowboy_req:to_list(Req),
  504. error_logger:error_msg(
  505. "** Handler ~p terminating in websocket_terminate/3~n"
  506. " for the reason ~p:~p~n** Initial reason was ~p~n"
  507. "** Options were ~p~n** Handler state was ~p~n"
  508. "** Request was ~p~n** Stacktrace: ~p~n~n",
  509. [Handler, Class, Reason, TerminateReason, Opts,
  510. HandlerState, PLReq, erlang:get_stacktrace()])
  511. end,
  512. closed.
  513. %% hixie-76 specific.
  514. -spec hixie76_challenge(binary(), binary(), binary()) -> binary().
  515. hixie76_challenge(Key1, Key2, Key3) ->
  516. IntKey1 = hixie76_key_to_integer(Key1),
  517. IntKey2 = hixie76_key_to_integer(Key2),
  518. erlang:md5(<< IntKey1:32, IntKey2:32, Key3/binary >>).
  519. -spec hixie76_key_to_integer(binary()) -> integer().
  520. hixie76_key_to_integer(Key) ->
  521. Number = list_to_integer([C || << C >> <= Key, C >= $0, C =< $9]),
  522. Spaces = length([C || << C >> <= Key, C =:= 32]),
  523. Number div Spaces.
  524. %% hybi specific.
  525. -spec hybi_challenge(binary()) -> binary().
  526. hybi_challenge(Key) ->
  527. Bin = << Key/binary, "258EAFA5-E914-47DA-95CA-C5AB0DC85B11" >>,
  528. base64:encode(crypto:sha(Bin)).
  529. -spec hybi_payload_length(0..16#7fffffffffffffff)
  530. -> << _:7 >> | << _:23 >> | << _:71 >>.
  531. hybi_payload_length(N) ->
  532. case N of
  533. N when N =< 125 -> << N:7 >>;
  534. N when N =< 16#ffff -> << 126:7, N:16 >>;
  535. N when N =< 16#7fffffffffffffff -> << 127:7, N:64 >>
  536. end.