2023-01-02 16:00:42 -05:00
|
|
|
// Copyright 2018-2023 the Deno authors. All rights reserved. MIT license.
|
2023-04-22 13:48:21 -04:00
|
|
|
use crate::stream::WebSocketStream;
|
|
|
|
use bytes::Bytes;
|
2021-04-26 15:39:55 -04:00
|
|
|
use deno_core::error::invalid_hostname;
|
2022-01-05 11:41:44 -05:00
|
|
|
use deno_core::error::type_error;
|
2021-01-06 10:57:28 -05:00
|
|
|
use deno_core::error::AnyError;
|
2022-03-14 13:44:15 -04:00
|
|
|
use deno_core::op;
|
2021-01-06 10:57:28 -05:00
|
|
|
use deno_core::url;
|
|
|
|
use deno_core::AsyncRefCell;
|
2022-01-05 11:41:44 -05:00
|
|
|
use deno_core::ByteString;
|
2021-01-06 10:57:28 -05:00
|
|
|
use deno_core::CancelFuture;
|
|
|
|
use deno_core::CancelHandle;
|
|
|
|
use deno_core::OpState;
|
|
|
|
use deno_core::RcRef;
|
|
|
|
use deno_core::Resource;
|
2021-03-19 13:25:37 -04:00
|
|
|
use deno_core::ResourceId;
|
2023-04-22 13:48:21 -04:00
|
|
|
use deno_core::StringOrBuffer;
|
2021-03-17 17:33:29 -04:00
|
|
|
use deno_core::ZeroCopyBuf;
|
2023-04-22 13:48:21 -04:00
|
|
|
use deno_net::raw::take_network_stream_resource;
|
|
|
|
use deno_net::raw::NetworkStream;
|
2021-08-07 08:49:38 -04:00
|
|
|
use deno_tls::create_client_config;
|
2023-04-20 12:24:22 -04:00
|
|
|
use http::header::CONNECTION;
|
|
|
|
use http::header::UPGRADE;
|
2023-03-18 20:34:56 -04:00
|
|
|
use http::HeaderName;
|
2022-01-05 11:41:44 -05:00
|
|
|
use http::HeaderValue;
|
2021-12-06 18:48:11 -05:00
|
|
|
use http::Method;
|
|
|
|
use http::Request;
|
|
|
|
use http::Uri;
|
2023-04-20 12:24:22 -04:00
|
|
|
use hyper::Body;
|
2021-04-19 11:54:56 -04:00
|
|
|
use serde::Serialize;
|
2021-01-06 10:57:28 -05:00
|
|
|
use std::borrow::Cow;
|
2023-04-20 12:24:22 -04:00
|
|
|
use std::cell::Cell;
|
2021-01-06 10:57:28 -05:00
|
|
|
use std::cell::RefCell;
|
2021-12-06 18:48:11 -05:00
|
|
|
use std::convert::TryFrom;
|
2021-08-09 18:28:17 -04:00
|
|
|
use std::fmt;
|
2023-04-21 02:55:02 -04:00
|
|
|
use std::future::Future;
|
2022-03-16 20:25:44 -04:00
|
|
|
use std::path::PathBuf;
|
2021-01-06 10:57:28 -05:00
|
|
|
use std::rc::Rc;
|
|
|
|
use std::sync::Arc;
|
2023-04-23 16:07:37 -04:00
|
|
|
use tokio::io::AsyncRead;
|
|
|
|
use tokio::io::AsyncWrite;
|
2021-01-06 10:57:28 -05:00
|
|
|
use tokio::net::TcpStream;
|
2021-08-07 08:49:38 -04:00
|
|
|
use tokio_rustls::rustls::RootCertStore;
|
2021-12-06 18:48:11 -05:00
|
|
|
use tokio_rustls::rustls::ServerName;
|
2021-08-07 08:49:38 -04:00
|
|
|
use tokio_rustls::TlsConnector;
|
2021-01-06 10:57:28 -05:00
|
|
|
|
2023-04-20 12:24:22 -04:00
|
|
|
use fastwebsockets::CloseCode;
|
|
|
|
use fastwebsockets::FragmentCollector;
|
|
|
|
use fastwebsockets::Frame;
|
|
|
|
use fastwebsockets::OpCode;
|
|
|
|
use fastwebsockets::Role;
|
|
|
|
use fastwebsockets::WebSocket;
|
2023-04-06 09:14:31 -04:00
|
|
|
|
2023-04-22 13:48:21 -04:00
|
|
|
mod stream;
|
2023-04-06 09:14:31 -04:00
|
|
|
|
2021-01-06 10:57:28 -05:00
|
|
|
#[derive(Clone)]
|
2021-08-07 08:49:38 -04:00
|
|
|
pub struct WsRootStore(pub Option<RootCertStore>);
|
2021-01-06 10:57:28 -05:00
|
|
|
#[derive(Clone)]
|
|
|
|
pub struct WsUserAgent(pub String);
|
|
|
|
|
|
|
|
pub trait WebSocketPermissions {
|
2022-09-27 16:36:33 -04:00
|
|
|
fn check_net_url(
|
|
|
|
&mut self,
|
|
|
|
_url: &url::Url,
|
|
|
|
_api_name: &str,
|
|
|
|
) -> Result<(), AnyError>;
|
2021-01-06 10:57:28 -05:00
|
|
|
}
|
|
|
|
|
2021-08-10 07:19:45 -04:00
|
|
|
/// `UnsafelyIgnoreCertificateErrors` is a wrapper struct so it can be placed inside `GothamState`;
|
2021-08-09 10:53:21 -04:00
|
|
|
/// using type alias for a `Option<Vec<String>>` could work, but there's a high chance
|
|
|
|
/// that there might be another type alias pointing to a `Option<Vec<String>>`, which
|
|
|
|
/// would override previously used alias.
|
2021-08-10 07:19:45 -04:00
|
|
|
pub struct UnsafelyIgnoreCertificateErrors(Option<Vec<String>>);
|
2021-08-09 10:53:21 -04:00
|
|
|
|
2021-08-09 18:28:17 -04:00
|
|
|
pub struct WsCancelResource(Rc<CancelHandle>);
|
|
|
|
|
|
|
|
impl Resource for WsCancelResource {
|
|
|
|
fn name(&self) -> Cow<str> {
|
|
|
|
"webSocketCancel".into()
|
|
|
|
}
|
|
|
|
|
|
|
|
fn close(self: Rc<Self>) {
|
|
|
|
self.0.cancel()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-01-06 10:57:28 -05:00
|
|
|
// This op is needed because creating a WS instance in JavaScript is a sync
|
2021-01-10 14:05:24 -05:00
|
|
|
// operation and should throw error when permissions are not fulfilled,
|
2021-01-06 10:57:28 -05:00
|
|
|
// but actual op that connects WS is async.
|
2022-03-14 13:44:15 -04:00
|
|
|
#[op]
|
2021-08-09 18:28:17 -04:00
|
|
|
pub fn op_ws_check_permission_and_cancel_handle<WP>(
|
2021-01-06 10:57:28 -05:00
|
|
|
state: &mut OpState,
|
2022-09-27 16:36:33 -04:00
|
|
|
api_name: String,
|
2021-04-05 12:40:24 -04:00
|
|
|
url: String,
|
2021-08-09 18:28:17 -04:00
|
|
|
cancel_handle: bool,
|
|
|
|
) -> Result<Option<ResourceId>, AnyError>
|
2021-01-06 10:57:28 -05:00
|
|
|
where
|
|
|
|
WP: WebSocketPermissions + 'static,
|
|
|
|
{
|
|
|
|
state
|
2021-04-11 22:15:43 -04:00
|
|
|
.borrow_mut::<WP>()
|
2022-09-27 16:36:33 -04:00
|
|
|
.check_net_url(&url::Url::parse(&url)?, &api_name)?;
|
2021-01-06 10:57:28 -05:00
|
|
|
|
2021-08-09 18:28:17 -04:00
|
|
|
if cancel_handle {
|
|
|
|
let rid = state
|
|
|
|
.resource_table
|
|
|
|
.add(WsCancelResource(CancelHandle::new_rc()));
|
|
|
|
Ok(Some(rid))
|
|
|
|
} else {
|
|
|
|
Ok(None)
|
|
|
|
}
|
2021-01-06 10:57:28 -05:00
|
|
|
}
|
|
|
|
|
2021-04-19 11:54:56 -04:00
|
|
|
#[derive(Serialize)]
|
|
|
|
#[serde(rename_all = "camelCase")]
|
|
|
|
pub struct CreateResponse {
|
2021-05-01 14:52:13 -04:00
|
|
|
rid: ResourceId,
|
|
|
|
protocol: String,
|
|
|
|
extensions: String,
|
2021-04-19 11:54:56 -04:00
|
|
|
}
|
|
|
|
|
2023-04-23 16:07:37 -04:00
|
|
|
async fn handshake<S: AsyncRead + AsyncWrite + Send + Unpin + 'static>(
|
|
|
|
cancel_resource: Option<Rc<CancelHandle>>,
|
|
|
|
request: Request<Body>,
|
|
|
|
socket: S,
|
|
|
|
) -> Result<(WebSocket<WebSocketStream>, http::Response<Body>), AnyError> {
|
|
|
|
let client =
|
|
|
|
fastwebsockets::handshake::client(&LocalExecutor, request, socket);
|
|
|
|
|
|
|
|
let (upgraded, response) = if let Some(cancel_resource) = cancel_resource {
|
|
|
|
client.or_cancel(cancel_resource).await?
|
|
|
|
} else {
|
|
|
|
client.await
|
|
|
|
}
|
|
|
|
.map_err(|err| {
|
|
|
|
DomExceptionNetworkError::new(&format!(
|
|
|
|
"failed to connect to WebSocket: {err}"
|
|
|
|
))
|
|
|
|
})?;
|
|
|
|
|
|
|
|
let upgraded = upgraded.into_inner();
|
|
|
|
let stream =
|
|
|
|
WebSocketStream::new(stream::WsStreamKind::Upgraded(upgraded), None);
|
|
|
|
let stream = WebSocket::after_handshake(stream, Role::Client);
|
|
|
|
|
|
|
|
Ok((stream, response))
|
|
|
|
}
|
|
|
|
|
2022-03-14 13:44:15 -04:00
|
|
|
#[op]
|
2021-01-06 10:57:28 -05:00
|
|
|
pub async fn op_ws_create<WP>(
|
|
|
|
state: Rc<RefCell<OpState>>,
|
2022-09-27 16:36:33 -04:00
|
|
|
api_name: String,
|
2022-04-04 05:49:50 -04:00
|
|
|
url: String,
|
|
|
|
protocols: String,
|
|
|
|
cancel_handle: Option<ResourceId>,
|
|
|
|
headers: Option<Vec<(ByteString, ByteString)>>,
|
2021-04-19 11:54:56 -04:00
|
|
|
) -> Result<CreateResponse, AnyError>
|
2021-01-06 10:57:28 -05:00
|
|
|
where
|
|
|
|
WP: WebSocketPermissions + 'static,
|
|
|
|
{
|
|
|
|
{
|
2021-04-11 22:15:43 -04:00
|
|
|
let mut s = state.borrow_mut();
|
|
|
|
s.borrow_mut::<WP>()
|
2022-09-27 16:36:33 -04:00
|
|
|
.check_net_url(&url::Url::parse(&url)?, &api_name)
|
2021-01-06 10:57:28 -05:00
|
|
|
.expect(
|
|
|
|
"Permission check should have been done in op_ws_check_permission",
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2022-04-04 05:49:50 -04:00
|
|
|
let cancel_resource = if let Some(cancel_rid) = cancel_handle {
|
2021-11-28 06:25:49 -05:00
|
|
|
let r = state
|
|
|
|
.borrow_mut()
|
|
|
|
.resource_table
|
|
|
|
.get::<WsCancelResource>(cancel_rid)?;
|
2023-04-23 16:07:37 -04:00
|
|
|
Some(r.0.clone())
|
2021-11-28 06:25:49 -05:00
|
|
|
} else {
|
|
|
|
None
|
|
|
|
};
|
|
|
|
|
2021-08-10 07:19:45 -04:00
|
|
|
let unsafely_ignore_certificate_errors = state
|
2021-08-09 10:53:21 -04:00
|
|
|
.borrow()
|
2021-09-22 05:12:08 -04:00
|
|
|
.try_borrow::<UnsafelyIgnoreCertificateErrors>()
|
|
|
|
.and_then(|it| it.0.clone());
|
2021-08-07 08:49:38 -04:00
|
|
|
let root_cert_store = state.borrow().borrow::<WsRootStore>().0.clone();
|
2021-01-06 10:57:28 -05:00
|
|
|
let user_agent = state.borrow().borrow::<WsUserAgent>().0.clone();
|
2022-04-04 05:49:50 -04:00
|
|
|
let uri: Uri = url.parse()?;
|
2021-01-06 10:57:28 -05:00
|
|
|
let mut request = Request::builder().method(Method::GET).uri(&uri);
|
|
|
|
|
2023-04-20 12:24:22 -04:00
|
|
|
let authority = uri.authority().unwrap().as_str();
|
|
|
|
let host = authority
|
|
|
|
.find('@')
|
|
|
|
.map(|idx| authority.split_at(idx + 1).1)
|
|
|
|
.unwrap_or_else(|| authority);
|
|
|
|
request = request
|
|
|
|
.header("User-Agent", user_agent)
|
|
|
|
.header("Host", host)
|
|
|
|
.header(UPGRADE, "websocket")
|
|
|
|
.header(CONNECTION, "upgrade")
|
|
|
|
.header(
|
|
|
|
"Sec-WebSocket-Key",
|
|
|
|
fastwebsockets::handshake::generate_key(),
|
|
|
|
)
|
|
|
|
.header("Sec-WebSocket-Version", "13");
|
2021-01-06 10:57:28 -05:00
|
|
|
|
2022-04-04 05:49:50 -04:00
|
|
|
if !protocols.is_empty() {
|
|
|
|
request = request.header("Sec-WebSocket-Protocol", protocols);
|
2021-01-06 10:57:28 -05:00
|
|
|
}
|
|
|
|
|
2022-04-04 05:49:50 -04:00
|
|
|
if let Some(headers) = headers {
|
2022-01-05 11:41:44 -05:00
|
|
|
for (key, value) in headers {
|
|
|
|
let name = HeaderName::from_bytes(&key)
|
|
|
|
.map_err(|err| type_error(err.to_string()))?;
|
|
|
|
let v = HeaderValue::from_bytes(&value)
|
|
|
|
.map_err(|err| type_error(err.to_string()))?;
|
|
|
|
|
|
|
|
let is_disallowed_header = matches!(
|
|
|
|
name,
|
|
|
|
http::header::HOST
|
|
|
|
| http::header::SEC_WEBSOCKET_ACCEPT
|
|
|
|
| http::header::SEC_WEBSOCKET_EXTENSIONS
|
|
|
|
| http::header::SEC_WEBSOCKET_KEY
|
|
|
|
| http::header::SEC_WEBSOCKET_PROTOCOL
|
|
|
|
| http::header::SEC_WEBSOCKET_VERSION
|
|
|
|
| http::header::UPGRADE
|
|
|
|
| http::header::CONNECTION
|
|
|
|
);
|
|
|
|
if !is_disallowed_header {
|
|
|
|
request = request.header(name, v);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-04-20 12:24:22 -04:00
|
|
|
let request = request.body(Body::empty())?;
|
2021-01-06 10:57:28 -05:00
|
|
|
let domain = &uri.host().unwrap().to_string();
|
|
|
|
let port = &uri.port_u16().unwrap_or(match uri.scheme_str() {
|
|
|
|
Some("wss") => 443,
|
|
|
|
Some("ws") => 80,
|
|
|
|
_ => unreachable!(),
|
|
|
|
});
|
2023-01-27 10:43:16 -05:00
|
|
|
let addr = format!("{domain}:{port}");
|
2021-05-01 14:52:13 -04:00
|
|
|
let tcp_socket = TcpStream::connect(addr).await?;
|
2021-01-06 10:57:28 -05:00
|
|
|
|
2023-04-23 16:07:37 -04:00
|
|
|
let (stream, response) = match uri.scheme_str() {
|
|
|
|
Some("ws") => handshake(cancel_resource, request, tcp_socket).await?,
|
2021-01-06 10:57:28 -05:00
|
|
|
Some("wss") => {
|
2021-08-09 10:53:21 -04:00
|
|
|
let tls_config = create_client_config(
|
|
|
|
root_cert_store,
|
2021-09-30 03:26:15 -04:00
|
|
|
vec![],
|
2021-08-10 07:19:45 -04:00
|
|
|
unsafely_ignore_certificate_errors,
|
2021-12-01 11:13:11 -05:00
|
|
|
None,
|
2021-08-09 10:53:21 -04:00
|
|
|
)?;
|
2021-08-07 08:49:38 -04:00
|
|
|
let tls_connector = TlsConnector::from(Arc::new(tls_config));
|
2021-12-06 18:48:11 -05:00
|
|
|
let dnsname = ServerName::try_from(domain.as_str())
|
2021-04-26 15:39:55 -04:00
|
|
|
.map_err(|_| invalid_hostname(domain))?;
|
2021-01-06 10:57:28 -05:00
|
|
|
let tls_socket = tls_connector.connect(dnsname, tcp_socket).await?;
|
2023-04-23 16:07:37 -04:00
|
|
|
handshake(cancel_resource, request, tls_socket).await?
|
2021-01-06 10:57:28 -05:00
|
|
|
}
|
|
|
|
_ => unreachable!(),
|
|
|
|
};
|
|
|
|
|
2022-04-04 05:49:50 -04:00
|
|
|
if let Some(cancel_rid) = cancel_handle {
|
2021-08-15 07:29:19 -04:00
|
|
|
state.borrow_mut().resource_table.close(cancel_rid).ok();
|
2021-08-09 18:28:17 -04:00
|
|
|
}
|
|
|
|
|
2023-04-20 12:24:22 -04:00
|
|
|
let resource = ServerWebSocket {
|
|
|
|
ws: AsyncRefCell::new(FragmentCollector::new(stream)),
|
|
|
|
closed: Rc::new(Cell::new(false)),
|
2021-01-06 10:57:28 -05:00
|
|
|
};
|
|
|
|
let mut state = state.borrow_mut();
|
|
|
|
let rid = state.resource_table.add(resource);
|
|
|
|
|
|
|
|
let protocol = match response.headers().get("Sec-WebSocket-Protocol") {
|
|
|
|
Some(header) => header.to_str().unwrap(),
|
|
|
|
None => "",
|
|
|
|
};
|
|
|
|
let extensions = response
|
|
|
|
.headers()
|
|
|
|
.get_all("Sec-WebSocket-Extensions")
|
|
|
|
.iter()
|
|
|
|
.map(|header| header.to_str().unwrap())
|
|
|
|
.collect::<String>();
|
2021-04-19 11:54:56 -04:00
|
|
|
Ok(CreateResponse {
|
2021-05-01 14:52:13 -04:00
|
|
|
rid,
|
|
|
|
protocol: protocol.to_string(),
|
|
|
|
extensions,
|
2021-04-19 11:54:56 -04:00
|
|
|
})
|
2021-01-06 10:57:28 -05:00
|
|
|
}
|
|
|
|
|
2023-04-20 12:24:22 -04:00
|
|
|
#[repr(u16)]
|
|
|
|
pub enum MessageKind {
|
|
|
|
Text = 0,
|
|
|
|
Binary = 1,
|
|
|
|
Pong = 2,
|
2023-04-26 06:07:38 -04:00
|
|
|
Error = 3,
|
|
|
|
Closed = 4,
|
2023-04-20 12:24:22 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
pub struct ServerWebSocket {
|
2023-04-22 13:48:21 -04:00
|
|
|
ws: AsyncRefCell<FragmentCollector<WebSocketStream>>,
|
2023-04-20 12:24:22 -04:00
|
|
|
closed: Rc<Cell<bool>>,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl ServerWebSocket {
|
|
|
|
#[inline]
|
|
|
|
pub async fn write_frame(
|
|
|
|
self: Rc<Self>,
|
|
|
|
frame: Frame,
|
|
|
|
) -> Result<(), AnyError> {
|
|
|
|
// SAFETY: fastwebsockets only needs a mutable reference to the WebSocket
|
|
|
|
// to populate the write buffer. We encounter an await point when writing
|
|
|
|
// to the socket after the frame has already been written to the buffer.
|
|
|
|
let ws = unsafe { &mut *self.ws.as_ptr() };
|
|
|
|
ws.write_frame(frame)
|
|
|
|
.await
|
|
|
|
.map_err(|err| type_error(err.to_string()))?;
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl Resource for ServerWebSocket {
|
|
|
|
fn name(&self) -> Cow<str> {
|
|
|
|
"serverWebSocket".into()
|
|
|
|
}
|
|
|
|
}
|
2023-04-22 13:48:21 -04:00
|
|
|
|
|
|
|
pub fn ws_create_server_stream(
|
|
|
|
state: &mut OpState,
|
|
|
|
transport: NetworkStream,
|
|
|
|
read_buf: Bytes,
|
2023-04-20 12:24:22 -04:00
|
|
|
) -> Result<ResourceId, AnyError> {
|
2023-04-22 13:48:21 -04:00
|
|
|
let mut ws = WebSocket::after_handshake(
|
|
|
|
WebSocketStream::new(
|
|
|
|
stream::WsStreamKind::Network(transport),
|
|
|
|
Some(read_buf),
|
|
|
|
),
|
|
|
|
Role::Server,
|
|
|
|
);
|
2023-04-20 12:24:22 -04:00
|
|
|
ws.set_writev(true);
|
|
|
|
ws.set_auto_close(true);
|
|
|
|
ws.set_auto_pong(true);
|
|
|
|
|
|
|
|
let ws_resource = ServerWebSocket {
|
|
|
|
ws: AsyncRefCell::new(FragmentCollector::new(ws)),
|
|
|
|
closed: Rc::new(Cell::new(false)),
|
|
|
|
};
|
|
|
|
|
2023-04-22 13:48:21 -04:00
|
|
|
let rid = state.resource_table.add(ws_resource);
|
2023-04-20 12:24:22 -04:00
|
|
|
Ok(rid)
|
2021-01-06 10:57:28 -05:00
|
|
|
}
|
|
|
|
|
2023-04-22 13:48:21 -04:00
|
|
|
#[op]
|
|
|
|
pub fn op_ws_server_create(
|
|
|
|
state: &mut OpState,
|
|
|
|
conn: ResourceId,
|
|
|
|
extra_bytes: &[u8],
|
|
|
|
) -> Result<ResourceId, AnyError> {
|
|
|
|
let network_stream =
|
|
|
|
take_network_stream_resource(&mut state.resource_table, conn)?;
|
|
|
|
// Copying the extra bytes, but unlikely this will account for much
|
|
|
|
ws_create_server_stream(
|
|
|
|
state,
|
|
|
|
network_stream,
|
|
|
|
Bytes::from(extra_bytes.to_vec()),
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
2023-03-30 12:30:19 -04:00
|
|
|
#[op]
|
|
|
|
pub async fn op_ws_send_binary(
|
|
|
|
state: Rc<RefCell<OpState>>,
|
|
|
|
rid: ResourceId,
|
|
|
|
data: ZeroCopyBuf,
|
|
|
|
) -> Result<(), AnyError> {
|
|
|
|
let resource = state
|
|
|
|
.borrow_mut()
|
|
|
|
.resource_table
|
2023-04-20 12:24:22 -04:00
|
|
|
.get::<ServerWebSocket>(rid)?;
|
|
|
|
resource
|
|
|
|
.write_frame(Frame::new(true, OpCode::Binary, None, data.to_vec()))
|
|
|
|
.await
|
2023-03-30 12:30:19 -04:00
|
|
|
}
|
|
|
|
|
2023-03-30 11:52:12 -04:00
|
|
|
#[op]
|
|
|
|
pub async fn op_ws_send_text(
|
|
|
|
state: Rc<RefCell<OpState>>,
|
|
|
|
rid: ResourceId,
|
|
|
|
data: String,
|
|
|
|
) -> Result<(), AnyError> {
|
|
|
|
let resource = state
|
|
|
|
.borrow_mut()
|
|
|
|
.resource_table
|
2023-04-20 12:24:22 -04:00
|
|
|
.get::<ServerWebSocket>(rid)?;
|
|
|
|
resource
|
|
|
|
.write_frame(Frame::new(true, OpCode::Text, None, data.into_bytes()))
|
|
|
|
.await
|
2023-03-30 11:52:12 -04:00
|
|
|
}
|
|
|
|
|
2023-04-25 07:53:06 -04:00
|
|
|
#[op]
|
|
|
|
pub async fn op_ws_send_pong(
|
|
|
|
state: Rc<RefCell<OpState>>,
|
|
|
|
rid: ResourceId,
|
|
|
|
) -> Result<(), AnyError> {
|
2021-01-06 10:57:28 -05:00
|
|
|
let resource = state
|
|
|
|
.borrow_mut()
|
|
|
|
.resource_table
|
2023-04-20 12:24:22 -04:00
|
|
|
.get::<ServerWebSocket>(rid)?;
|
2023-04-25 07:53:06 -04:00
|
|
|
resource.write_frame(Frame::pong(vec![])).await
|
2021-01-06 10:57:28 -05:00
|
|
|
}
|
|
|
|
|
2023-04-28 10:48:00 -04:00
|
|
|
#[op]
|
|
|
|
pub async fn op_ws_send_ping(
|
|
|
|
state: Rc<RefCell<OpState>>,
|
|
|
|
rid: ResourceId,
|
|
|
|
) -> Result<(), AnyError> {
|
|
|
|
let resource = state
|
|
|
|
.borrow_mut()
|
|
|
|
.resource_table
|
|
|
|
.get::<ServerWebSocket>(rid)?;
|
|
|
|
resource
|
|
|
|
.write_frame(Frame::new(true, OpCode::Ping, None, vec![]))
|
|
|
|
.await
|
|
|
|
}
|
|
|
|
|
2022-09-06 13:38:37 -04:00
|
|
|
#[op(deferred)]
|
2021-01-06 10:57:28 -05:00
|
|
|
pub async fn op_ws_close(
|
|
|
|
state: Rc<RefCell<OpState>>,
|
2022-04-04 05:49:50 -04:00
|
|
|
rid: ResourceId,
|
|
|
|
code: Option<u16>,
|
|
|
|
reason: Option<String>,
|
2021-04-05 12:40:24 -04:00
|
|
|
) -> Result<(), AnyError> {
|
2021-01-06 10:57:28 -05:00
|
|
|
let resource = state
|
|
|
|
.borrow_mut()
|
|
|
|
.resource_table
|
2023-04-20 12:24:22 -04:00
|
|
|
.get::<ServerWebSocket>(rid)?;
|
|
|
|
let frame = reason
|
|
|
|
.map(|reason| Frame::close(code.unwrap_or(1005), reason.as_bytes()))
|
|
|
|
.unwrap_or_else(|| Frame::close_raw(vec![]));
|
|
|
|
|
|
|
|
let cell = Rc::clone(&resource.closed);
|
|
|
|
cell.set(true);
|
|
|
|
resource.write_frame(frame).await?;
|
2021-04-05 12:40:24 -04:00
|
|
|
Ok(())
|
2021-01-06 10:57:28 -05:00
|
|
|
}
|
|
|
|
|
2023-04-27 06:47:52 -04:00
|
|
|
#[op(fast)]
|
2021-01-06 10:57:28 -05:00
|
|
|
pub async fn op_ws_next_event(
|
|
|
|
state: Rc<RefCell<OpState>>,
|
2021-04-05 12:40:24 -04:00
|
|
|
rid: ResourceId,
|
2023-03-31 01:04:12 -04:00
|
|
|
) -> Result<(u16, StringOrBuffer), AnyError> {
|
2021-01-06 10:57:28 -05:00
|
|
|
let resource = state
|
|
|
|
.borrow_mut()
|
|
|
|
.resource_table
|
2023-04-20 12:24:22 -04:00
|
|
|
.get::<ServerWebSocket>(rid)?;
|
2021-01-06 10:57:28 -05:00
|
|
|
|
2023-04-20 12:24:22 -04:00
|
|
|
let mut ws = RcRef::map(&resource, |r| &r.ws).borrow_mut().await;
|
2023-04-26 06:07:38 -04:00
|
|
|
loop {
|
|
|
|
let val = match ws.read_frame().await {
|
|
|
|
Ok(val) => val,
|
|
|
|
Err(err) => {
|
|
|
|
// No message was received, socket closed while we waited.
|
|
|
|
// Try close the stream, ignoring any errors, and report closed status to JavaScript.
|
|
|
|
if resource.closed.get() {
|
|
|
|
let _ = state.borrow_mut().resource_table.close(rid);
|
|
|
|
return Ok((
|
|
|
|
MessageKind::Closed as u16,
|
|
|
|
StringOrBuffer::Buffer(vec![].into()),
|
|
|
|
));
|
|
|
|
}
|
|
|
|
|
2023-04-20 12:24:22 -04:00
|
|
|
return Ok((
|
2023-04-26 06:07:38 -04:00
|
|
|
MessageKind::Error as u16,
|
|
|
|
StringOrBuffer::String(err.to_string()),
|
2023-04-20 12:24:22 -04:00
|
|
|
));
|
|
|
|
}
|
2023-04-26 06:07:38 -04:00
|
|
|
};
|
|
|
|
|
|
|
|
break Ok(match val.opcode {
|
|
|
|
OpCode::Text => (
|
|
|
|
MessageKind::Text as u16,
|
|
|
|
StringOrBuffer::String(String::from_utf8(val.payload).unwrap()),
|
|
|
|
),
|
|
|
|
OpCode::Binary => (
|
|
|
|
MessageKind::Binary as u16,
|
|
|
|
StringOrBuffer::Buffer(val.payload.into()),
|
|
|
|
),
|
|
|
|
OpCode::Close => {
|
|
|
|
if val.payload.len() < 2 {
|
|
|
|
return Ok((1005, StringOrBuffer::String("".to_string())));
|
|
|
|
}
|
|
|
|
|
|
|
|
let close_code =
|
|
|
|
CloseCode::from(u16::from_be_bytes([val.payload[0], val.payload[1]]));
|
|
|
|
let reason = String::from_utf8(val.payload[2..].to_vec()).unwrap();
|
|
|
|
(close_code.into(), StringOrBuffer::String(reason))
|
2023-04-20 12:24:22 -04:00
|
|
|
}
|
2023-04-26 06:07:38 -04:00
|
|
|
OpCode::Pong => (
|
|
|
|
MessageKind::Pong as u16,
|
|
|
|
StringOrBuffer::Buffer(vec![].into()),
|
|
|
|
),
|
|
|
|
OpCode::Continuation | OpCode::Ping => {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
});
|
|
|
|
}
|
2021-01-06 10:57:28 -05:00
|
|
|
}
|
|
|
|
|
2023-03-17 14:22:15 -04:00
|
|
|
deno_core::extension!(deno_websocket,
|
|
|
|
deps = [ deno_url, deno_webidl ],
|
|
|
|
parameters = [P: WebSocketPermissions],
|
|
|
|
ops = [
|
|
|
|
op_ws_check_permission_and_cancel_handle<P>,
|
|
|
|
op_ws_create<P>,
|
|
|
|
op_ws_close,
|
|
|
|
op_ws_next_event,
|
2023-03-30 12:30:19 -04:00
|
|
|
op_ws_send_binary,
|
2023-03-30 11:52:12 -04:00
|
|
|
op_ws_send_text,
|
2023-04-28 10:48:00 -04:00
|
|
|
op_ws_send_ping,
|
2023-04-25 07:53:06 -04:00
|
|
|
op_ws_send_pong,
|
2023-04-22 13:48:21 -04:00
|
|
|
op_ws_server_create,
|
2023-03-17 14:22:15 -04:00
|
|
|
],
|
|
|
|
esm = [ "01_websocket.js", "02_websocketstream.js" ],
|
2023-03-17 18:15:27 -04:00
|
|
|
options = {
|
2023-03-17 14:22:15 -04:00
|
|
|
user_agent: String,
|
|
|
|
root_cert_store: Option<RootCertStore>,
|
|
|
|
unsafely_ignore_certificate_errors: Option<Vec<String>>
|
|
|
|
},
|
2023-03-17 18:15:27 -04:00
|
|
|
state = |state, options| {
|
|
|
|
state.put::<WsUserAgent>(WsUserAgent(options.user_agent));
|
2023-03-17 14:22:15 -04:00
|
|
|
state.put(UnsafelyIgnoreCertificateErrors(
|
2023-03-17 18:15:27 -04:00
|
|
|
options.unsafely_ignore_certificate_errors,
|
2023-03-17 14:22:15 -04:00
|
|
|
));
|
2023-03-17 18:15:27 -04:00
|
|
|
state.put::<WsRootStore>(WsRootStore(options.root_cert_store));
|
2023-03-17 14:22:15 -04:00
|
|
|
},
|
|
|
|
);
|
2021-01-06 10:57:28 -05:00
|
|
|
|
2022-03-16 20:25:44 -04:00
|
|
|
pub fn get_declaration() -> PathBuf {
|
|
|
|
PathBuf::from(env!("CARGO_MANIFEST_DIR")).join("lib.deno_websocket.d.ts")
|
|
|
|
}
|
|
|
|
|
2021-08-09 18:28:17 -04:00
|
|
|
#[derive(Debug)]
|
|
|
|
pub struct DomExceptionNetworkError {
|
|
|
|
pub msg: String,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl DomExceptionNetworkError {
|
|
|
|
pub fn new(msg: &str) -> Self {
|
|
|
|
DomExceptionNetworkError {
|
|
|
|
msg: msg.to_string(),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl fmt::Display for DomExceptionNetworkError {
|
|
|
|
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
|
|
|
|
f.pad(&self.msg)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl std::error::Error for DomExceptionNetworkError {}
|
|
|
|
|
|
|
|
pub fn get_network_error_class_name(e: &AnyError) -> Option<&'static str> {
|
|
|
|
e.downcast_ref::<DomExceptionNetworkError>()
|
|
|
|
.map(|_| "DOMExceptionNetworkError")
|
|
|
|
}
|
2023-04-21 02:55:02 -04:00
|
|
|
|
|
|
|
// Needed so hyper can use non Send futures
|
|
|
|
#[derive(Clone)]
|
|
|
|
struct LocalExecutor;
|
|
|
|
|
|
|
|
impl<Fut> hyper::rt::Executor<Fut> for LocalExecutor
|
|
|
|
where
|
|
|
|
Fut: Future + 'static,
|
|
|
|
Fut::Output: 'static,
|
|
|
|
{
|
|
|
|
fn execute(&self, fut: Fut) {
|
|
|
|
tokio::task::spawn_local(fut);
|
|
|
|
}
|
|
|
|
}
|