• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

nickg / nvc / 6962501065

22 Nov 2023 08:42PM UTC coverage: 91.231% (-0.01%) from 91.245%
6962501065

push

github

nickg
Fix crash with type alias in implicit condition conversion

Fixes #802

5 of 7 new or added lines in 1 file covered. (71.43%)

7 existing lines in 1 file now uncovered.

50730 of 55606 relevant lines covered (91.23%)

606266.51 hits per line

Source File
Press 'n' to go to next uncovered line, 'b' for previous

74.96
/src/server.c
1
//
2
//  Copyright (C) 2023  Nick Gasson
3
//
4
//  This program is free software: you can redistribute it and/or modify
5
//  it under the terms of the GNU General Public License as published by
6
//  the Free Software Foundation, either version 3 of the License, or
7
//  (at your option) any later version.
8
//
9
//  This program is distributed in the hope that it will be useful,
10
//  but WITHOUT ANY WARRANTY; without even the implied warranty of
11
//  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
12
//  GNU General Public License for more details.
13
//
14
//  You should have received a copy of the GNU General Public License
15
//  along with this program.  If not, see <http://www.gnu.org/licenses/>.
16
//
17

18
#include "util.h"
19
#include "hash.h"
20
#include "ident.h"
21
#include "jit/jit.h"
22
#include "option.h"
23
#include "phase.h"
24
#include "rt/shell.h"
25
#include "server.h"
26
#include "sha1.h"
27
#include "thread.h"
28

29
#include <assert.h>
30
#include <errno.h>
31
#include <string.h>
32
#include <stdlib.h>
33
#include <sys/types.h>
34
#include <sys/stat.h>
35
#include <sys/fcntl.h>
36
#include <unistd.h>
37
#include <fcntl.h>
38
#include <time.h>
39

40
#ifdef __MINGW32__
41
#define WIN32_LEAN_AND_MEAN
42
#include <winsock2.h>
43
#else
44
#include <sys/select.h>
45
#include <sys/socket.h>
46
#include <netinet/in.h>
47
#endif
48

49
#define WS_UPGRADE_VALUE     "websocket"
50
#define WS_WEBSOCKET_VERSION "13"
51
#define WS_GUID              "258EAFA5-E914-47DA-95CA-C5AB0DC85B11"
52
#define WS_GUID_LEN          36
53
#define WS_KEY_LEN           24
54
#define WS_KEY_GUID_LEN      (WS_KEY_LEN + WS_GUID_LEN)
55

56
#define HTTP_SWITCHING_PROTOCOLS   101
57
#define HTTP_OK                    200
58
#define HTTP_BAD_REQUEST           400
59
#define HTTP_NOT_FOUND             404
60
#define HTTP_METHOD_NOT_ALLOWED    405
61
#define HTTP_UPGRADE_REQUIRED      426
62
#define HTTP_INTERNAL_SERVER_ERROR 500
63

64
#define WS_OPCODE_TEXT_FRAME   0x1
65
#define WS_OPCODE_BINARY_FRAME 0x2
66
#define WS_OPCODE_CLOSE_FRAME  0x8
67
#define WS_OPCODE_PING_FRAME   0x9
68
#define WS_OPCODE_PONG_FRAME   0xa
69

70
#define MAX_HTTP_REQUEST 1024
71

72
#ifndef __MINGW32__
73
#define closesocket close
74
#endif
75

76
typedef struct _web_socket {
77
   int           sock;
78
   bool          mask;
79
   bool          closing;
80
   ws_handler_t  handler;
81
   size_t        tx_size;
82
   size_t        tx_wptr;
83
   size_t        tx_rptr;
84
   uint8_t      *tx_buf;
85
   size_t        rx_size;
86
   size_t        rx_wptr;
87
   size_t        rx_rptr;
88
   uint8_t      *rx_buf;
89
} web_socket_t;
90

91
typedef struct _packet_buf {
92
   char  *buf;
93
   size_t alloc;
94
   size_t wptr;
95
   size_t rptr;
96
} packet_buf_t;
97

98
typedef struct {
99
   tcl_shell_t  *shell;
100
   bool          shutdown;
101
   bool          banner;
102
   web_socket_t *websocket;
103
   int           sock;
104
   tree_t        top;
105
   packet_buf_t *packetbuf;
106
   const char   *init_cmd;
107
} web_server_t;
108

109
////////////////////////////////////////////////////////////////////////////////
110
// WebSocket wrapper
111

112
web_socket_t *ws_new(int sock, const ws_handler_t *handler, bool mask)
14✔
113
{
114
   web_socket_t *ws = xcalloc(sizeof(web_socket_t));
14✔
115
   ws->sock    = sock;
14✔
116
   ws->mask    = mask;
14✔
117
   ws->handler = *handler;
14✔
118

119
   return ws;
14✔
120
}
121

122
void ws_free(web_socket_t *ws)
14✔
123
{
124
   free(ws->tx_buf);
14✔
125
   free(ws->rx_buf);
14✔
126
   free(ws);
14✔
127
}
14✔
128

129
static void ws_queue_buf(web_socket_t *ws, const void *data, size_t size)
649✔
130
{
131
   if (ws->tx_wptr + size > ws->tx_size) {
649✔
132
      ws->tx_size = MAX(ws->tx_size + size, 1024);
555✔
133
      ws->tx_buf = xrealloc(ws->tx_buf, ws->tx_size);
555✔
134
   }
135

136
   memcpy(ws->tx_buf + ws->tx_wptr, data, size);
649✔
137
   ws->tx_wptr += size;
649✔
138
}
649✔
139

140
static void ws_send(web_socket_t *ws, int opcode, const void *data, size_t size)
37✔
141
{
142
   const uint8_t size0 = (size < 126 ? size : (size <= UINT16_MAX ? 126 : 127));
37✔
143

144
   const uint8_t header[2] = {
37✔
145
      0x80 | opcode,
37✔
146
      (ws->mask ? 0x80 : 0x00) | (size0 & 0x7f),
37✔
147
   };
148
   ws_queue_buf(ws, header, sizeof(header));
37✔
149

150
   if (size0 == 126) {
37✔
151
      const uint8_t extlength[2] = { PACK_BE16(size) };
2✔
152
      ws_queue_buf(ws, extlength, sizeof(extlength));
2✔
153
   }
154
   else if (size0 == 127) {
35✔
155
      const uint8_t extlength[8] = { PACK_BE64(size) };
2✔
156
      ws_queue_buf(ws, extlength, sizeof(extlength));
2✔
157
   }
158

159
   if (ws->mask) {
37✔
160
      const int key = rand();
16✔
161
      const uint8_t masks[4] = { PACK_BE32(key) };
16✔
162
      ws_queue_buf(ws, masks, sizeof(masks));
16✔
163

164
      char xord[128];
16✔
165
      for (size_t i = 0; i < size; i += sizeof(xord)) {
593✔
166
         const size_t chunksz = MIN(sizeof(xord), size - i);
577✔
167
         for (int j = 0; j < chunksz; j++)
72,674✔
168
            xord[j] = ((const uint8_t *)data)[i + j] ^ masks[(i + j) % 4];
72,097✔
169

170
         ws_queue_buf(ws, xord, chunksz);
577✔
171
      }
172
   }
173
   else if (size > 0)
21✔
174
      ws_queue_buf(ws, data, size);
15✔
175
}
37✔
176

177
void ws_send_binary(web_socket_t *ws, const void *data, size_t size)
12✔
178
{
179
   ws_send(ws, WS_OPCODE_BINARY_FRAME, data, size);
12✔
180
}
12✔
181

182
void ws_send_packet(web_socket_t *ws, packet_buf_t *pb)
7✔
183
{
184
   ws_send_binary(ws, pb->buf, pb->wptr);
7✔
185
}
7✔
186

187
void ws_send_text(web_socket_t *ws, const char *text)
13✔
188
{
189
   ws_send(ws, WS_OPCODE_TEXT_FRAME, text, strlen(text));
13✔
190
}
13✔
191

192
void ws_send_close(web_socket_t *ws)
6✔
193
{
194
   ws_send(ws, WS_OPCODE_CLOSE_FRAME, NULL, 0);
6✔
195
}
6✔
196

197
void ws_send_ping(web_socket_t *ws, const void *data, size_t size)
3✔
198
{
199
   ws_send(ws, WS_OPCODE_PING_FRAME, data, size);
3✔
200
}
3✔
201

202
void ws_flush(web_socket_t *ws)
33✔
203
{
204
   while (ws->tx_wptr != ws->tx_rptr) {
66✔
205
      const size_t chunksz = ws->tx_wptr - ws->tx_rptr;
33✔
206
      const ssize_t nbytes =
33✔
207
         send(ws->sock, (char *)ws->tx_buf + ws->tx_rptr, chunksz, 0);
33✔
208

209
      if (nbytes == 0)
33✔
210
         break;
211
      else if (nbytes < 0) {
33✔
212
         ws->closing = true;
×
213
         break;
×
214
      }
215

216
      ws->tx_rptr += nbytes;
33✔
217
   }
218

219
   if (ws->tx_wptr == ws->tx_rptr)
33✔
220
      ws->tx_rptr = ws->tx_wptr = 0;
33✔
221
}
33✔
222

223
void ws_poll(web_socket_t *ws)
39✔
224
{
225
 read_more:
226
   if (ws->rx_size - ws->rx_wptr < 1024)
175✔
227
      ws->rx_buf = xrealloc(ws->rx_buf, (ws->rx_size += 1024));
150✔
228

229
   const ssize_t nbytes = recv(ws->sock, (char *)ws->rx_buf + ws->rx_wptr,
350✔
230
                               ws->rx_size - ws->rx_wptr - 1, 0);
175✔
231
   if (nbytes == -1 && errno == EAGAIN)
175✔
232
      return;
233
   else if (nbytes <= 0) {
175✔
234
      ws->closing = true;
6✔
235
      return;
6✔
236
   }
237

238
   ws->rx_wptr += nbytes;
169✔
239
   assert(ws->rx_wptr <= ws->rx_size);
169✔
240
   assert(ws->rx_rptr < ws->rx_wptr);
169✔
241

242
   do {
173✔
243
      const size_t rbytes = ws->rx_wptr - ws->rx_rptr;
173✔
244

245
      if (rbytes < 2)
173✔
246
         goto read_more;   // Not enough for WebSocket header
×
247

248
      uint8_t *frame = ws->rx_buf + ws->rx_rptr;
173✔
249

250
      // Frame format
251
      //
252
      //   0    1     2     3     4 5 6 7  8     9 A B C D E F
253
      //   FIN  RSV1  RSV2  RSV3  Opcode   Mask  Payload length
254
      //   Extended payload length (optional)
255
      //   Masking key (optional)
256
      //   Payload data
257

258
      const bool fin = frame[0] & 0x80;
173✔
259
      const int opcode = frame[0] & 0xf;
173✔
260
      const bool mask = frame[1] & 0x80;
173✔
261
      const int size0 = frame[1] & 0x7f;
173✔
262

263
      size_t headersz = 2 + (mask ? 4 : 0);
173✔
264
      if (size0 == 126)
173✔
265
         headersz += 2;
4✔
266
      else if (size0 == 127)
169✔
267
         headersz += 8;
136✔
268

269
      if (rbytes < headersz)
173✔
270
         goto read_more;   // Not enough for extended header
×
271

272
      int flength = size0;
173✔
273
      if (size0 == 127)
173✔
274
         flength = UNPACK_BE64(frame + 2);
136✔
275
      else if (size0 == 126)
37✔
276
         flength = UNPACK_BE16(frame + 2);
4✔
277

278
      if (rbytes < flength + headersz)
173✔
279
         goto read_more;   // Not enough for full frame
136✔
280

281
      assert(fin);
37✔
282
      (void)fin;
37✔
283

284
      if (mask) {
37✔
285
         for (int i = 0; i < flength; i++)
72,113✔
286
            frame[headersz + i] ^= frame[headersz - 4 + (i % 4)];
72,097✔
287
      }
288

289
      void *payload = frame + headersz;
37✔
290

291
      switch (opcode) {
37✔
292
      case WS_OPCODE_TEXT_FRAME:
13✔
293
         {
294
            char *text = payload;
13✔
295
            assert(text + flength < (char *)ws->rx_buf + ws->rx_size);
13✔
296
            text[flength] = '\0';
13✔
297

298
            if (ws->handler.text_frame != NULL)
13✔
299
               (*ws->handler.text_frame)(ws, text, ws->handler.context);
13✔
300
         }
301
         break;
302

303
      case WS_OPCODE_BINARY_FRAME:
12✔
304
         if (ws->handler.binary_frame != NULL)
12✔
305
            (*ws->handler.binary_frame)(ws, payload, flength,
12✔
306
                                        ws->handler.context);
307
         break;
308

309
      case WS_OPCODE_CLOSE_FRAME:
6✔
310
         ws->closing = true;
6✔
311
         break;
6✔
312

313
      case WS_OPCODE_PING_FRAME:
3✔
314
         ws_send(ws, WS_OPCODE_PONG_FRAME, payload, flength);
3✔
315
         break;
3✔
316

317
      case WS_OPCODE_PONG_FRAME:
3✔
318
         if (ws->handler.pong_frame != NULL)
3✔
319
            (*ws->handler.pong_frame)(ws, payload, flength,
3✔
320
                                      ws->handler.context);
321
         break;
322

323
      default:
×
324
         DEBUG_ONLY(fatal_trace("unhandled WebSocket opcode %02x", opcode));
×
325
         break;
37✔
326
      }
327

328
      ws->rx_rptr += flength + headersz;
37✔
329
   } while (ws->rx_rptr < ws->rx_wptr);
37✔
330

331
   ws->rx_rptr = ws->rx_wptr = 0;
33✔
332
}
333

334
bool ws_closing(web_socket_t *ws)
6✔
335
{
336
   return ws->closing;
6✔
337
}
338

339
////////////////////////////////////////////////////////////////////////////////
340
// Packet buffers
341

342
static packet_buf_t *pb_new(void)
5✔
343
{
344
   packet_buf_t *pb = xcalloc(sizeof(packet_buf_t));
5✔
345
   pb->alloc = 128;
5✔
346
   pb->buf = xmalloc(pb->alloc);
5✔
347

348
   return pb;
5✔
349
}
350

351
static void pb_free(packet_buf_t *pb)
5✔
352
{
353
   free(pb->buf);
5✔
354
   free(pb);
5✔
355
}
5✔
356

357
static void pb_grow(packet_buf_t *pb, size_t need)
20✔
358
{
359
   if (pb->wptr + need > pb->alloc) {
20✔
360
      pb->alloc = MAX(pb->wptr + need, pb->alloc * 2);
×
361
      pb->buf = xrealloc(pb->buf, pb->alloc);
×
362
   }
363
}
20✔
364

365
static void pb_pack_u8(packet_buf_t *pb, uint8_t value)
7✔
366
{
367
   pb_grow(pb, 1);
7✔
368
   pb->buf[pb->wptr++] = value;
7✔
369
}
7✔
370

371
static void pb_pack_u16(packet_buf_t *pb, uint16_t value)
6✔
372
{
373
   pb_grow(pb, 2);
6✔
374
   pb->buf[pb->wptr++] = value >> 8;
6✔
375
   pb->buf[pb->wptr++] = value & 0xff;
6✔
376
}
6✔
377

378
static void pb_pack_u32(packet_buf_t *pb, uint32_t value)
×
379
{
380
   pb_grow(pb, 4);
×
381
   pb->buf[pb->wptr++] = (value >> 24) & 0xff;
×
382
   pb->buf[pb->wptr++] = (value >> 16) & 0xff;
×
383
   pb->buf[pb->wptr++] = (value >> 8) & 0xff;
×
384
   pb->buf[pb->wptr++] = value & 0xff;
×
385
}
×
386

387
static void pb_pack_u64(packet_buf_t *pb, uint64_t value)
1✔
388
{
389
   pb_grow(pb, 8);
1✔
390
   pb->buf[pb->wptr++] = (value >> 56) & 0xff;
1✔
391
   pb->buf[pb->wptr++] = (value >> 48) & 0xff;
1✔
392
   pb->buf[pb->wptr++] = (value >> 40) & 0xff;
1✔
393
   pb->buf[pb->wptr++] = (value >> 32) & 0xff;
1✔
394
   pb->buf[pb->wptr++] = (value >> 24) & 0xff;
1✔
395
   pb->buf[pb->wptr++] = (value >> 16) & 0xff;
1✔
396
   pb->buf[pb->wptr++] = (value >> 8) & 0xff;
1✔
397
   pb->buf[pb->wptr++] = value & 0xff;
1✔
398
}
1✔
399

400
static void pb_pack_bytes(packet_buf_t *pb, const void *data, size_t len)
6✔
401
{
402
   pb_grow(pb, len);
6✔
403
   memcpy(pb->buf + pb->wptr, data, len);
6✔
404
   pb->wptr += len;
6✔
405
}
6✔
406

407
static void pb_pack_str(packet_buf_t *pb, const char *str)
3✔
408
{
409
   const size_t len = strlen(str);
3✔
410
   assert(len < UINT16_MAX);
3✔
411

412
   pb_pack_u16(pb, len);
3✔
413
   pb_pack_bytes(pb, str, len);
3✔
414
}
3✔
415

416
static void pb_pack_ident(packet_buf_t *pb, ident_t ident)
3✔
417
{
418
   const size_t len = ident_len(ident);
3✔
419
   assert(len < UINT16_MAX);
3✔
420

421
   pb_pack_u16(pb, len);
3✔
422
   pb_pack_bytes(pb, istr(ident), len);
3✔
423
}
3✔
424

425
////////////////////////////////////////////////////////////////////////////////
426
// Web server
427

428
typedef enum {
429
   LOG_DEBUG,
430
   LOG_INFO,
431
   LOG_WARN,
432
   LOG_ERROR
433
} log_level_t;
434

435
__attribute__((format(printf, 2, 3)))
436
static void server_log(log_level_t level, const char *fmt, ...)
17✔
437
{
438
   if (opt_get_int(OPT_UNIT_TEST))
17✔
439
      return;
17✔
440
   else if (DEBUG_ONLY(false &&) level < LOG_INFO)
×
441
      return;
442

443
   va_list ap;
×
444
   va_start(ap, fmt);
×
445

446
   switch (level) {
×
447
   case LOG_DEBUG: color_printf("$#8$D: "); break;
×
448
   case LOG_INFO: printf("I: "); break;
×
449
   case LOG_WARN: color_printf("$yellow$W: "); break;
×
450
   case LOG_ERROR: color_printf("$red$E: "); break;
×
451
   }
452

453
   vprintf(fmt, ap);
×
454
   color_printf("$$\n");
×
455
   fflush(stdout);
×
456

457
   va_end(ap);
×
458
}
459

460
static void send_fully(int fd, const void *data, size_t len)
7✔
461
{
462
   while (len > 0) {
14✔
463
      ssize_t nbytes = send(fd, data, len, 0);
7✔
464
      if (nbytes <= 0) {
7✔
465
         server_log(LOG_ERROR, "send: %s", strerror(errno));
×
466
         return;
×
467
      }
468

469
      data += nbytes;
7✔
470
      len -= nbytes;
7✔
471
   }
472
}
473

474
static void send_http_headers(int fd, int status, const char *type, size_t len,
7✔
475
                              const char *headers)
476
{
477
   char date[128];
7✔
478
   time_t now = time(0);
7✔
479
   struct tm tm;
7✔
480
#ifdef __MINGW32__
481
   gmtime_s(&tm, &now);
482
#else
483
   gmtime_r(&now, &tm);
7✔
484
#endif
485
   strftime(date, sizeof(date), "%a, %d %b %Y %H:%M:%S %Z", &tm);
7✔
486

487
   char buf[512];
7✔
488
   const int nbytes = checked_sprintf(buf, sizeof(buf),
7✔
489
                                      "HTTP/1.1 %d\r\n"
490
                                      "Date: %s\r\n"
491
                                      "Content-Type: %s; charset=UTF-8\r\n"
492
                                      "Content-Length: %zu\r\n"
493
                                      "%s\r\n",
494
                                      status, date, type, len, headers);
495

496
   send_fully(fd, buf, nbytes);
7✔
497
}
7✔
498

499
static void send_page(int fd, int status, const char *page)
×
500
{
501
   const size_t len = strlen(page);
×
502
   send_http_headers(fd, status, "text/html", len, "");
×
503
   send_fully(fd, page, len);
×
504
}
×
505

506
#ifdef ENABLE_GUI
507
static void send_file(int fd, const char *file, const char *mime)
×
508
{
509
   FILE *f = fopen(file, "rb");
×
510
   if (f == NULL) {
×
511
      send_page(fd, HTTP_NOT_FOUND, "File not found");
×
512
      return;
×
513
   }
514

515
   file_info_t info;
×
516
   if (!get_handle_info(fileno(f), &info)) {
×
517
      send_page(fd, HTTP_INTERNAL_SERVER_ERROR, "Cannot stat file");
×
518
      goto out_close;
×
519
   }
520

521
   send_http_headers(fd, HTTP_OK, mime, info.size, "");
×
522

523
   char buf[1024];
×
524
   for (ssize_t remain = info.size, nbytes; remain > 0; remain -= nbytes) {
×
525
      memset(buf, '\0', sizeof(buf));
×
526

527
      if ((nbytes = fread(buf, 1, MIN(remain, sizeof(buf)), f)) == 0) {
×
528
         server_log(LOG_ERROR, "fread: %s: %s", file, strerror(errno));
×
529
         goto out_close;
×
530
      }
531

532
      send_fully(fd, buf, nbytes);
×
533
   }
534

535
 out_close:
×
536
   fclose(f);
×
537
}
538
#endif
539

540
static void handle_text_frame(web_socket_t *ws, const char *text, void *context)
8✔
541
{
542
   web_server_t *server = context;
8✔
543

544
   const char *result = NULL;
8✔
545
   if (shell_eval(server->shell, text, &result) && *result != '\0')
8✔
546
      ws_send_text(ws, result);
5✔
547
}
8✔
548

549
static void handle_binary_frame(web_socket_t *ws, const void *data,
5✔
550
                                size_t length, void *context)
551
{
552
   web_server_t *server = context;
5✔
553

554
   if (length == 0) {
5✔
555
      server_log(LOG_WARN, "ignoring zero-length binary frame");
×
556
      return;
×
557
   }
558

559
   const c2s_opcode_t op = *(const uint8_t *)data;
5✔
560
   switch (op) {
5✔
561
   case C2S_SHUTDOWN:
5✔
562
      server->shutdown = true;
5✔
563
      break;
5✔
564
   default:
×
565
      server_log(LOG_ERROR, "unhandled client to server opcode %02x", op);
×
566
      break;
×
567
   }
568
}
569

570
static void kill_connection(web_server_t *server)
571
{
572
   diag_set_consumer(NULL, NULL);
573

574
   closesocket(server->websocket->sock);
575

576
   ws_free(server->websocket);
577
   server->websocket = NULL;
578
}
579

580
static void tunnel_diag(diag_t *d, void *context)
×
581
{
582
   web_server_t *server = context;
×
583

584
   if (server->websocket != NULL) {
×
585
      ws_send_text(server->websocket, diag_get_text(d));
×
586
   }
587
   else
588
      server_log(LOG_INFO, "%s", diag_get_text(d));
×
589
}
×
590

591
static packet_buf_t *fresh_packet_buffer(web_server_t *server)
592
{
593
   server->packetbuf->wptr = 0;
594
   return server->packetbuf;
595
}
596

597
static void add_wave_handler(ident_t path, const char *enc, void *user)
1✔
598
{
599
   web_server_t *server = user;
1✔
600

601
   packet_buf_t *pb = fresh_packet_buffer(server);
1✔
602
   pb_pack_u8(pb, S2C_ADD_WAVE);
1✔
603
   pb_pack_ident(pb, path);
1✔
604
   pb_pack_str(pb, enc);
1✔
605
   ws_send_packet(server->websocket, pb);
1✔
606
}
1✔
607

608
static void signal_update_handler(ident_t path, uint64_t now, rt_signal_t *s,
1✔
609
                                  const char *enc, void *user)
610
{
611
   web_server_t *server = user;
1✔
612

613
   packet_buf_t *pb = fresh_packet_buffer(server);
1✔
614
   pb_pack_u8(pb, S2C_SIGNAL_UPDATE);
1✔
615
   pb_pack_ident(pb, path);
1✔
616
   pb_pack_str(pb, enc);
1✔
617
   ws_send_packet(server->websocket, pb);
1✔
618
}
1✔
619

620
static void start_sim_handler(ident_t top, void *user)
1✔
621
{
622
   web_server_t *server = user;
1✔
623

624
   packet_buf_t *pb = fresh_packet_buffer(server);
1✔
625
   pb_pack_u8(pb, S2C_START_SIM);
1✔
626
   pb_pack_ident(pb, top);
1✔
627
   ws_send_packet(server->websocket, pb);
1✔
628
}
1✔
629

630
static void restart_sim_handler(void *user)
1✔
631
{
632
   web_server_t *server = user;
1✔
633

634
   packet_buf_t *pb = fresh_packet_buffer(server);
1✔
635
   pb_pack_u8(pb, S2C_RESTART_SIM);
1✔
636
   ws_send_packet(server->websocket, pb);
1✔
637
}
1✔
638

639
static void quit_sim_handler(void *user)
1✔
640
{
641
   web_server_t *server = user;
1✔
642

643
   packet_buf_t *pb = fresh_packet_buffer(server);
1✔
644
   pb_pack_u8(pb, S2C_QUIT_SIM);
1✔
645
   ws_send_packet(server->websocket, pb);
1✔
646
}
1✔
647

648
static void next_time_step_handler(uint64_t now, void *user)
1✔
649
{
650
   web_server_t *server = user;
1✔
651

652
   packet_buf_t *pb = fresh_packet_buffer(server);
1✔
653
   pb_pack_u8(pb, S2C_NEXT_TIME_STEP);
1✔
654
   pb_pack_u64(pb, now);
1✔
655
   ws_send_packet(server->websocket, pb);
1✔
656
}
1✔
657

658
static void open_websocket(web_server_t *server, int fd)
7✔
659
{
660
   if (server->websocket != NULL) {
7✔
661
      ws_send_close(server->websocket);
1✔
662
      ws_flush(server->websocket);
1✔
663
      kill_connection(server);
1✔
664
   }
665

666
   const ws_handler_t handler = {
7✔
667
      .text_frame   = handle_text_frame,
668
      .binary_frame = handle_binary_frame,
669
      .context      = server
670
   };
671

672
   server->websocket = ws_new(fd, &handler, false);
7✔
673

674
   diag_set_consumer(tunnel_diag, server);
7✔
675

676
   if (server->banner)
7✔
677
      shell_print_banner(server->shell);
×
678

679
   if (server->top != NULL)
7✔
680
      shell_reset(server->shell, server->top);
1✔
681

682
   if (server->init_cmd != NULL) {
7✔
683
      packet_buf_t *pb = fresh_packet_buffer(server);
1✔
684
      pb_pack_u8(pb, S2C_INIT_CMD);
1✔
685
      pb_pack_str(pb, server->init_cmd);
1✔
686
      ws_send_packet(server->websocket, pb);
1✔
687
   }
688
}
7✔
689

690
static void base64_encode(const void *in, size_t len, text_buf_t *tb)
7✔
691
{
692
   static const char map[] =
7✔
693
      "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/";
694

695
   const unsigned char *data = in;
7✔
696

697
   for (size_t i = 0; i < len; i++) {
56✔
698
      int c0 = (data[i] >> 2) & 0x3F;
49✔
699
      tb_append(tb, map[c0]);
49✔
700
      c0 = (data[i] << 4) & 0x3F;
49✔
701
      if (++i < len)
49✔
702
         c0 |= (data[i] >> 4) & 0x0F;
49✔
703
      tb_append(tb, map[c0]);
49✔
704

705
      if (i < len) {
49✔
706
         int c1 = (data[i] << 2) & 0x3F;
49✔
707
         if (++i < len)
49✔
708
            c1 |= (data[i] >> 6) & 0x03;
42✔
709
         tb_append(tb, map[c1]);
49✔
710
      }
711
      else {
712
         ++i;
×
713
         tb_append(tb, '=');
×
714
      }
715

716
      if (i < len) {
49✔
717
         int c2 = data[i] & 0x3F;
42✔
718
         tb_append(tb, map[c2]);
42✔
719
      }
720
      else
721
         tb_append(tb, '=');
7✔
722
   }
723
}
7✔
724

725
static bool get_websocket_accept_value(const char *key, text_buf_t *tb)
7✔
726
{
727
   if (key == NULL || strlen(key) != WS_KEY_LEN)
7✔
728
      return false;
729

730
   char *str LOCAL = xmalloc(WS_KEY_LEN + WS_GUID_LEN + 1);
7✔
731
   strncpy(str, key, (WS_KEY_LEN + 1));
7✔
732
   strncpy(str + WS_KEY_LEN, WS_GUID, WS_GUID_LEN + 1);
7✔
733

734
   SHA1_CTX ctx;
7✔
735
   SHA1Init(&ctx);
7✔
736
   SHA1Update(&ctx, (unsigned char *)str, WS_KEY_GUID_LEN);
7✔
737

738
   unsigned char hash[SHA1_LEN];
7✔
739
   SHA1Final(hash, &ctx);
7✔
740

741
   base64_encode(hash, SHA1_LEN, tb);
7✔
742
   return true;
7✔
743
}
744

745
static void websocket_upgrade(web_server_t *server, int fd, const char *method,
7✔
746
                              const char *version, shash_t *headers)
747
{
748
   LOCAL_TEXT_BUF tb = tb_new();
7✔
749

750
   if (strcmp(method, "GET") != 0 || strcmp(version, "HTTP/1.1") != 0) {
7✔
751
      send_page(fd, HTTP_BAD_REQUEST, "Bad request");
×
752
      goto out_close;
×
753
   }
754

755
   const char *ws_version_header = shash_get(headers, "sec-websocket-version");
7✔
756

757
   if (ws_version_header == NULL
7✔
758
       || strcasecmp(ws_version_header, WS_WEBSOCKET_VERSION) != 0) {
7✔
759

760
      static const char page[] = "Upgrade required";
×
761
      static const char header[] =
×
762
         "Sec-WebSocket-Version:" WS_WEBSOCKET_VERSION;
763

764
      send_http_headers(fd, HTTP_UPGRADE_REQUIRED, "text/html",
×
765
                        sizeof(page), header);
766
      send_fully(fd, page, sizeof(page));
×
767

768
      goto out_close;
×
769
   }
770

771
   const char *ws_key_header = shash_get(headers, "sec-websocket-key");
7✔
772

773
   if (ws_key_header == NULL || strlen(ws_key_header) != WS_KEY_LEN) {
7✔
774
      send_page(fd, HTTP_BAD_REQUEST, "Bad request");
×
775
      goto out_close;
×
776
   }
777

778
   tb_cat(tb, "Connection: upgrade\r\n"
7✔
779
          "Upgrade: websocket\r\n"
780
          "Sec-WebSocket-Accept: ");
781

782
   if (!get_websocket_accept_value(ws_key_header, tb))
7✔
783
      goto out_close;
×
784

785
   tb_cat(tb, "\r\n");
7✔
786

787
   send_http_headers(fd, HTTP_SWITCHING_PROTOCOLS, "text/html", 0, tb_get(tb));
7✔
788

789
   open_websocket(server, fd);
7✔
790

791
   return;   // Socket left open
7✔
792

793
 out_close:
×
794
   closesocket(fd);
×
795
}
796

797
static bool is_websocket_request(shash_t *headers)
7✔
798
{
799
   const char *upg_header = shash_get(headers, "upgrade");
7✔
800
   const char *con_header = shash_get(headers, "connection");
7✔
801

802
   return (upg_header != NULL && con_header != NULL)
7✔
803
          && (strcasecmp(upg_header, WS_UPGRADE_VALUE) == 0)
7✔
804
          && (strcasestr(con_header, "Upgrade") != NULL);
14✔
805
}
806

807
#ifdef ENABLE_GUI
808
static void serve_gui_static_files(int fd, const char *url)
×
809
{
810
   LOCAL_TEXT_BUF tb = tb_new();
×
811
   get_data_dir(tb);
×
812
   tb_cat(tb, "/gui");
×
813

814
   if (strcmp(url, "/") == 0) {
×
815
      tb_cat(tb, "/index.html");
×
816
      send_file(fd, tb_get(tb), "text/html");
×
817
      return;
×
818
   }
819

820
   const char *mime = "application/octet-stream";
×
821
   const char *dot = strrchr(url, '.');
×
822
   if (dot != NULL) {
×
823
      static const char *mime_map[][2] = {
824
         { ".js",  "text/javascript" },
825
         { ".css", "text/css" },
826
         { ".map", "application/json" },
827
      };
828

829
      for (int i = 0; i < ARRAY_LEN(mime_map); i++) {
×
830
         if (strcmp(dot, mime_map[i][0]) == 0) {
×
831
            mime = mime_map[i][1];
×
832
            break;
×
833
         }
834
      }
835
   }
836

837
   tb_cat(tb, url);
×
838
   send_file(fd, tb_get(tb), mime);
×
839
}
840
#endif
841

842
static void handle_http_request(web_server_t *server, int fd,
7✔
843
                                const char *method, const char *url,
844
                                const char *version, shash_t *headers)
845
{
846
   server_log(LOG_DEBUG, "%s %s", method, url);
7✔
847

848
   if (is_websocket_request(headers)) {
7✔
849
      websocket_upgrade(server, fd, method, version, headers);
7✔
850
      return;    // Socket left open
7✔
851
   }
852
   else if (strcmp(method, "GET") != 0) {
×
853
      send_page(fd, HTTP_METHOD_NOT_ALLOWED, "Method not allowed");
×
854
      goto out_close;
×
855
   }
856

857
#ifdef ENABLE_GUI
858
   serve_gui_static_files(fd, url);
×
859
#else
860
   send_page(fd, HTTP_NOT_FOUND, "Not found");
861
#endif
862

863
 out_close:
×
864
   closesocket(fd);
×
865
}
866

867
static void handle_new_connection(web_server_t *server)
7✔
868
{
869
   int fd = accept(server->sock, NULL, NULL);
7✔
870
   if (fd < 0) {
7✔
871
      server_log(LOG_ERROR, "accept: %s", last_os_error());
×
872
      return;
7✔
873
   }
874

875
#ifdef __MINGW32__
876
   if (ioctlsocket(fd, FIONBIO, &(unsigned long){1})) {
877
      server_log(LOG_ERROR, "ioctlsocket: %s", last_os_error());
878
      goto out_close;
879
   }
880
#else
881
   const int flags = fcntl(fd, F_GETFL, 0);
7✔
882
   if (fcntl(fd, F_SETFL, flags | O_NONBLOCK) < 0) {
7✔
883
      server_log(LOG_ERROR, "fcntl: %s", last_os_error());
×
884
      goto out_close;
×
885
   }
886
#endif
887

888
   char buf[MAX_HTTP_REQUEST + 1];
7✔
889
   size_t reqlen = 0;
7✔
890
   do {
7✔
891
      ssize_t n = recv(fd, buf + reqlen, MAX_HTTP_REQUEST - reqlen, 0);
7✔
892

893
#ifdef __MINGW32__
894
      const bool would_block =
895
         (n == SOCKET_ERROR && WSAGetLastError() == WSAEWOULDBLOCK);
896
#else
897
      const bool would_block = (n == -1 && errno == EWOULDBLOCK);
7✔
898
#endif
899

900
      if (would_block) {
7✔
UNCOV
901
         fd_set rfd;
×
UNCOV
902
         FD_ZERO(&rfd);
×
UNCOV
903
         FD_SET(fd, &rfd);
×
904

UNCOV
905
         struct timeval tv = {
×
906
            .tv_sec = 1,
907
            .tv_usec = 0
908
         };
909

UNCOV
910
         if (select(fd + 1, &rfd, NULL, NULL, &tv) == -1) {
×
911
            server_log(LOG_ERROR, "select: %s", last_os_error());
×
912
            goto out_close;
×
913
         }
914

UNCOV
915
         if (FD_ISSET(fd, &rfd))
×
UNCOV
916
            continue;
×
917

918
         server_log(LOG_ERROR, "timeout waiting for HTTP request");
×
919
         goto out_close;
×
920
      }
921
      else if (n <= 0) {
7✔
922
         server_log(LOG_ERROR, "recv: %s", last_os_error());
×
923
         goto out_close;
×
924
      }
925

926
      reqlen += n;
7✔
927
      assert(reqlen <= MAX_HTTP_REQUEST);
7✔
928

929
      if (reqlen == MAX_HTTP_REQUEST) {
7✔
930
         server_log(LOG_ERROR, "HTTP request too big");
×
931
         goto out_close;
×
932
      }
933

934
      buf[reqlen] = '\0';
7✔
935
   } while (strstr(buf, "\r\n\r\n") == NULL);
7✔
936

937
   const char *method = "GET";
7✔
938
   const char *url = "/";
7✔
939
   const char *version = "";
7✔
940

941
   char *saveptr, *saveptr2;
7✔
942
   char *line = strtok_r(buf, "\r\n", &saveptr);
7✔
943
   if (line == NULL) {
7✔
944
      server_log(LOG_ERROR, "malformed HTTP request");
×
945
      goto out_close;
×
946
   }
947

948
   method = strtok_r(line, " ", &saveptr2);
7✔
949
   if (method == NULL)
7✔
950
      goto malformed;
×
951

952
   url = strtok_r(NULL, " ", &saveptr2);
7✔
953
   if (url == NULL)
7✔
954
      goto malformed;
×
955

956
   version = strtok_r(NULL, " ", &saveptr2);
7✔
957
   if (version == NULL)
7✔
958
      goto malformed;
×
959

960
   shash_t *headers = shash_new(64);
7✔
961

962
   while ((line = strtok_r(NULL, "\r\n", &saveptr)) && line[0] != '\0') {
70✔
963
      char *colon = strchr(line, ':');
56✔
964
      if (colon != NULL) {
56✔
965
         *colon = '\0';
56✔
966

967
         char *value = colon + 1;
56✔
968
         while (*value == ' ')
112✔
969
            value++;
56✔
970

971
         for (char *p = line; *p; p++)
623✔
972
            *p = tolower_iso88591(*p);
567✔
973

974
         shash_put(headers, line, value);
56✔
975
      }
976
   }
977

978
   handle_http_request(server, fd, method, url, version, headers);
7✔
979
   shash_free(headers);
7✔
980
   return;
7✔
981

982
 malformed:
×
983
   server_log(LOG_ERROR, "malformed HTTP request");
×
984

985
 out_close:
×
986
   closesocket(fd);
×
987
}
988

989
static void tunnel_output(const char *buf, size_t nchars, void *user)
×
990
{
991
   web_server_t *server = user;
×
992
   ws_send(server->websocket, WS_OPCODE_TEXT_FRAME, buf, nchars);
×
993
}
×
994

995
static void tunnel_backchannel(const char *buf, size_t nchars, void *user)
×
996
{
997
   web_server_t *server = user;
×
998

999
   packet_buf_t *pb = fresh_packet_buffer(server);
×
1000
   pb_pack_u8(pb, S2C_BACKCHANNEL);
×
1001
   pb_pack_u32(pb, nchars);
×
1002
   pb_pack_bytes(pb, buf, nchars);
×
1003
   ws_send_packet(server->websocket, pb);
×
1004
}
×
1005

1006
static int open_server_socket(void)
5✔
1007
{
1008
#ifdef __MINGW32__
1009
   WSADATA wsaData;
1010
   if (WSAStartup(MAKEWORD(2, 2), &wsaData))
1011
      fatal_errno("WSAStartup failed");
1012
#endif
1013

1014
   int sock = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
5✔
1015
   if (sock < 0)
5✔
1016
      fatal_errno("socket");
×
1017

1018
   if (setsockopt(sock, SOL_SOCKET, SO_REUSEADDR,
5✔
1019
                  (char *)&(int){1}, sizeof(int)) < 0)
5✔
1020
      fatal_errno("setsockopt");
×
1021

1022
   const uint16_t port = opt_get_int(OPT_SERVER_PORT);
5✔
1023

1024
   struct sockaddr_in addr;
5✔
1025
   addr.sin_family = AF_INET;
5✔
1026
   addr.sin_port = htons(port);
5✔
1027
   addr.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
5✔
1028

1029
   if (bind(sock, (struct sockaddr *)&addr, sizeof(addr)) < 0)
5✔
1030
      fatal_errno("bind");
×
1031

1032
   if (listen(sock, SOMAXCONN) < 0)
5✔
1033
      fatal_errno("listen");
×
1034

1035
   server_log(LOG_INFO, "listening on 127.0.0.1:%u", port);
5✔
1036

1037
   return sock;
5✔
1038
}
1039

1040
void start_server(jit_factory_t make_jit, tree_t top,
5✔
1041
                  server_ready_fn_t cb, void *arg, const char *init_cmd)
1042
{
1043
   web_server_t *server = xcalloc(sizeof(web_server_t));
5✔
1044
   server->shell     = shell_new(make_jit);
5✔
1045
   server->top       = top;
5✔
1046
   server->packetbuf = pb_new();
5✔
1047
   server->init_cmd  = init_cmd;
5✔
1048
   server->banner    = !opt_get_int(OPT_UNIT_TEST);
5✔
1049

1050
   shell_handler_t handler = {
5✔
1051
      .add_wave = add_wave_handler,
1052
      .signal_update = signal_update_handler,
1053
      .stderr_write = tunnel_output,
1054
      .stdout_write = tunnel_output,
1055
      .backchannel_write = tunnel_backchannel,
1056
      .start_sim = start_sim_handler,
1057
      .restart_sim = restart_sim_handler,
1058
      .quit_sim = quit_sim_handler,
1059
      .next_time_step = next_time_step_handler,
1060
      .context = server
1061
   };
1062
   shell_set_handler(server->shell, &handler);
5✔
1063

1064
   server->sock = open_server_socket();
5✔
1065

1066
   if (cb != NULL)
5✔
1067
      (*cb)(arg);
5✔
1068

1069
   for (;;) {
44✔
1070
      fd_set rfd, wfd, efd;
49✔
1071
      FD_ZERO(&rfd);
49✔
1072
      FD_ZERO(&wfd);
49✔
1073
      FD_ZERO(&efd);
49✔
1074

1075
      int max_fd = -1;
49✔
1076

1077
      if (server->sock != -1) {
49✔
1078
         FD_SET(server->sock, &rfd);
34✔
1079
         max_fd = MAX(max_fd, server->sock);
34✔
1080
      }
1081

1082
      if (server->websocket != NULL) {
49✔
1083
         FD_SET(server->websocket->sock, &rfd);
38✔
1084

1085
         if (server->websocket->tx_wptr != server->websocket->tx_rptr)
38✔
1086
            FD_SET(server->websocket->sock, &wfd);
16✔
1087

1088
         max_fd = MAX(max_fd, server->websocket->sock);
38✔
1089
      }
1090

1091
      if (max_fd == -1)
49✔
1092
         break;
1093

1094
      struct timeval tv = {
44✔
1095
         .tv_sec = 1,
1096
         .tv_usec = 0
1097
      };
1098

1099
      if (select(max_fd + 1, &rfd, &wfd, &efd, &tv) == -1)
44✔
1100
         fatal_errno("select");
×
1101

1102
      if (server->sock != -1 && FD_ISSET(server->sock, &rfd))
44✔
1103
         handle_new_connection(server);
7✔
1104

1105
      if (server->websocket != NULL) {
44✔
1106
         if (FD_ISSET(server->websocket->sock, &rfd))
44✔
1107
            ws_poll(server->websocket);
22✔
1108

1109
         if (FD_ISSET(server->websocket->sock, &wfd))
44✔
1110
            ws_flush(server->websocket);
16✔
1111

1112
         if (server->websocket->closing)
44✔
1113
            kill_connection(server);
6✔
1114
      }
1115

1116
      if (server->shutdown && server->sock != -1) {
44✔
1117
         server_log(LOG_INFO, "stopping server");
5✔
1118

1119
         closesocket(server->sock);
5✔
1120
         server->sock = -1;
5✔
1121

1122
         if (server->websocket != NULL)
5✔
1123
            ws_send_close(server->websocket);
5✔
1124
      }
1125
   }
1126

1127
   assert(server->sock == -1);
5✔
1128

1129
   pb_free(server->packetbuf);
5✔
1130
   free(server);
5✔
1131
}
5✔
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc