• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

nickg / nvc / 13736572297

08 Mar 2025 10:15AM UTC coverage: 92.281% (-0.01%) from 92.291%
13736572297

push

github

nickg
Add note about setup-nvc in README

68027 of 73717 relevant lines covered (92.28%)

484481.87 hits per line

Source File
Press 'n' to go to next uncovered line, 'b' for previous

76.52
/src/server.c
1
//
2
//  Copyright (C) 2023  Nick Gasson
3
//
4
//  This program is free software: you can redistribute it and/or modify
5
//  it under the terms of the GNU General Public License as published by
6
//  the Free Software Foundation, either version 3 of the License, or
7
//  (at your option) any later version.
8
//
9
//  This program is distributed in the hope that it will be useful,
10
//  but WITHOUT ANY WARRANTY; without even the implied warranty of
11
//  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
12
//  GNU General Public License for more details.
13
//
14
//  You should have received a copy of the GNU General Public License
15
//  along with this program.  If not, see <http://www.gnu.org/licenses/>.
16
//
17

18
#include "util.h"
19
#include "hash.h"
20
#include "ident.h"
21
#include "jit/jit.h"
22
#include "option.h"
23
#include "phase.h"
24
#include "rt/shell.h"
25
#include "server.h"
26
#include "sha1.h"
27
#include "thread.h"
28

29
#include <assert.h>
30
#include <errno.h>
31
#include <string.h>
32
#include <stdlib.h>
33
#include <sys/types.h>
34
#include <sys/stat.h>
35
#include <sys/fcntl.h>
36
#include <unistd.h>
37
#include <fcntl.h>
38
#include <time.h>
39
#include <jansson.h>
40

41
#ifdef __MINGW32__
42
#define WIN32_LEAN_AND_MEAN
43
#include <winsock2.h>
44
#else
45
#include <sys/select.h>
46
#include <sys/socket.h>
47
#include <netinet/in.h>
48
#endif
49

50
#define WS_UPGRADE_VALUE     "websocket"
51
#define WS_WEBSOCKET_VERSION "13"
52
#define WS_GUID              "258EAFA5-E914-47DA-95CA-C5AB0DC85B11"
53
#define WS_GUID_LEN          36
54
#define WS_KEY_LEN           24
55
#define WS_KEY_GUID_LEN      (WS_KEY_LEN + WS_GUID_LEN)
56

57
#define HTTP_SWITCHING_PROTOCOLS   101
58
#define HTTP_OK                    200
59
#define HTTP_BAD_REQUEST           400
60
#define HTTP_NOT_FOUND             404
61
#define HTTP_METHOD_NOT_ALLOWED    405
62
#define HTTP_UPGRADE_REQUIRED      426
63
#define HTTP_INTERNAL_SERVER_ERROR 500
64

65
#define WS_OPCODE_TEXT_FRAME   0x1
66
#define WS_OPCODE_BINARY_FRAME 0x2
67
#define WS_OPCODE_CLOSE_FRAME  0x8
68
#define WS_OPCODE_PING_FRAME   0x9
69
#define WS_OPCODE_PONG_FRAME   0xa
70

71
#define MAX_HTTP_REQUEST 1024
72

73
#ifndef __MINGW32__
74
#define closesocket close
75
#endif
76

77
typedef struct _debug_server debug_server_t;
78

79
typedef struct _web_socket {
80
   int           sock;
81
   bool          mask;
82
   bool          closing;
83
   ws_handler_t  handler;
84
   size_t        tx_size;
85
   size_t        tx_wptr;
86
   size_t        tx_rptr;
87
   uint8_t      *tx_buf;
88
   size_t        rx_size;
89
   size_t        rx_wptr;
90
   size_t        rx_rptr;
91
   uint8_t      *rx_buf;
92
} web_socket_t;
93

94
typedef struct _packet_buf {
95
   char  *buf;
96
   size_t alloc;
97
   size_t wptr;
98
   size_t rptr;
99
} packet_buf_t;
100

101
typedef struct {
102
   debug_server_t *(*new_server)(void);
103
   void (*free_server)(debug_server_t *);
104
   void (*new_connection)(debug_server_t *, int);
105
   int (*fill_fd_set)(debug_server_t *, fd_set *, fd_set *);
106
   void (*poll_sockets)(debug_server_t *, fd_set *, fd_set *);
107
   void (*shutdown)(debug_server_t *);
108
} server_proto_t;
109

110
typedef struct _debug_server {
111
   const server_proto_t *proto;
112
   tcl_shell_t          *shell;
113
   bool                  shutdown;
114
   bool                  banner;
115
   int                   sock;
116
   tree_t                top;
117
   packet_buf_t         *packetbuf;
118
   const char           *init_cmd;
119
} debug_server_t;
120

121
typedef struct {
122
   debug_server_t  server;
123
   web_socket_t   *websocket;
124
} http_server_t;
125

126
typedef struct {
127
   debug_server_t server;
128
   int            sock;
129
   size_t         rx_size;
130
   size_t         rx_wptr;
131
   size_t         rx_rptr;
132
   char          *rx_buf;
133
   size_t         tx_size;
134
   size_t         tx_wptr;
135
   size_t         tx_rptr;
136
   uint8_t       *tx_buf;
137
} cxxrtl_server_t;
138

139
////////////////////////////////////////////////////////////////////////////////
140
// WebSocket wrapper
141

142
web_socket_t *ws_new(int sock, const ws_handler_t *handler, bool mask)
14✔
143
{
144
   web_socket_t *ws = xcalloc(sizeof(web_socket_t));
14✔
145
   ws->sock    = sock;
14✔
146
   ws->mask    = mask;
14✔
147
   ws->handler = *handler;
14✔
148

149
   return ws;
14✔
150
}
151

152
void ws_free(web_socket_t *ws)
14✔
153
{
154
   free(ws->tx_buf);
14✔
155
   free(ws->rx_buf);
14✔
156
   free(ws);
14✔
157
}
14✔
158

159
static void ws_queue_buf(web_socket_t *ws, const void *data, size_t size)
651✔
160
{
161
   if (ws->tx_wptr + size > ws->tx_size) {
651✔
162
      ws->tx_size = MAX(ws->tx_size + size, 1024);
555✔
163
      ws->tx_buf = xrealloc(ws->tx_buf, ws->tx_size);
555✔
164
   }
165

166
   memcpy(ws->tx_buf + ws->tx_wptr, data, size);
651✔
167
   ws->tx_wptr += size;
651✔
168
}
651✔
169

170
static void ws_send(web_socket_t *ws, int opcode, const void *data, size_t size)
38✔
171
{
172
   const uint8_t size0 = (size < 126 ? size : (size <= UINT16_MAX ? 126 : 127));
38✔
173

174
   const uint8_t header[2] = {
38✔
175
      0x80 | opcode,
38✔
176
      (ws->mask ? 0x80 : 0x00) | (size0 & 0x7f),
38✔
177
   };
178
   ws_queue_buf(ws, header, sizeof(header));
38✔
179

180
   if (size0 == 126) {
38✔
181
      const uint8_t extlength[2] = { PACK_BE16(size) };
2✔
182
      ws_queue_buf(ws, extlength, sizeof(extlength));
2✔
183
   }
184
   else if (size0 == 127) {
36✔
185
      const uint8_t extlength[8] = { PACK_BE64(size) };
2✔
186
      ws_queue_buf(ws, extlength, sizeof(extlength));
2✔
187
   }
188

189
   if (ws->mask) {
38✔
190
      const int key = rand();
16✔
191
      const uint8_t masks[4] = { PACK_BE32(key) };
16✔
192
      ws_queue_buf(ws, masks, sizeof(masks));
16✔
193

194
      char xord[128];
16✔
195
      for (size_t i = 0; i < size; i += sizeof(xord)) {
593✔
196
         const size_t chunksz = MIN(sizeof(xord), size - i);
577✔
197
         for (int j = 0; j < chunksz; j++)
72,674✔
198
            xord[j] = ((const uint8_t *)data)[i + j] ^ masks[(i + j) % 4];
72,097✔
199

200
         ws_queue_buf(ws, xord, chunksz);
577✔
201
      }
202
   }
203
   else if (size > 0)
22✔
204
      ws_queue_buf(ws, data, size);
16✔
205
}
38✔
206

207
void ws_send_binary(web_socket_t *ws, const void *data, size_t size)
13✔
208
{
209
   ws_send(ws, WS_OPCODE_BINARY_FRAME, data, size);
13✔
210
}
13✔
211

212
void ws_send_packet(web_socket_t *ws, packet_buf_t *pb)
8✔
213
{
214
   ws_send_binary(ws, pb->buf, pb->wptr);
8✔
215
}
8✔
216

217
void ws_send_text(web_socket_t *ws, const char *text)
13✔
218
{
219
   ws_send(ws, WS_OPCODE_TEXT_FRAME, text, strlen(text));
13✔
220
}
13✔
221

222
void ws_send_close(web_socket_t *ws)
6✔
223
{
224
   ws_send(ws, WS_OPCODE_CLOSE_FRAME, NULL, 0);
6✔
225
}
6✔
226

227
void ws_send_ping(web_socket_t *ws, const void *data, size_t size)
3✔
228
{
229
   ws_send(ws, WS_OPCODE_PING_FRAME, data, size);
3✔
230
}
3✔
231

232
void ws_flush(web_socket_t *ws)
33✔
233
{
234
   while (ws->tx_wptr != ws->tx_rptr) {
66✔
235
      const size_t chunksz = ws->tx_wptr - ws->tx_rptr;
33✔
236
      const ssize_t nbytes =
33✔
237
         send(ws->sock, (char *)ws->tx_buf + ws->tx_rptr, chunksz, 0);
33✔
238

239
      if (nbytes == 0)
33✔
240
         break;
241
      else if (nbytes < 0) {
33✔
242
         ws->closing = true;
×
243
         break;
×
244
      }
245

246
      ws->tx_rptr += nbytes;
33✔
247
   }
248

249
   if (ws->tx_wptr == ws->tx_rptr)
33✔
250
      ws->tx_rptr = ws->tx_wptr = 0;
33✔
251
}
33✔
252

253
void ws_poll(web_socket_t *ws)
39✔
254
{
255
 read_more:
256
   if (ws->rx_size - ws->rx_wptr < 1024)
175✔
257
      ws->rx_buf = xrealloc(ws->rx_buf, (ws->rx_size += 1024));
150✔
258

259
   const ssize_t nbytes = recv(ws->sock, (char *)ws->rx_buf + ws->rx_wptr,
350✔
260
                               ws->rx_size - ws->rx_wptr - 1, 0);
175✔
261
   if (nbytes == -1 && errno == EAGAIN)
175✔
262
      return;
263
   else if (nbytes <= 0) {
175✔
264
      ws->closing = true;
6✔
265
      return;
6✔
266
   }
267

268
   ws->rx_wptr += nbytes;
169✔
269
   assert(ws->rx_wptr <= ws->rx_size);
169✔
270
   assert(ws->rx_rptr < ws->rx_wptr);
169✔
271

272
   do {
174✔
273
      const size_t rbytes = ws->rx_wptr - ws->rx_rptr;
174✔
274

275
      if (rbytes < 2)
174✔
276
         goto read_more;   // Not enough for WebSocket header
×
277

278
      uint8_t *frame = ws->rx_buf + ws->rx_rptr;
174✔
279

280
      // Frame format
281
      //
282
      //   0    1     2     3     4 5 6 7  8     9 A B C D E F
283
      //   FIN  RSV1  RSV2  RSV3  Opcode   Mask  Payload length
284
      //   Extended payload length (optional)
285
      //   Masking key (optional)
286
      //   Payload data
287

288
      const bool fin = frame[0] & 0x80;
174✔
289
      const int opcode = frame[0] & 0xf;
174✔
290
      const bool mask = frame[1] & 0x80;
174✔
291
      const int size0 = frame[1] & 0x7f;
174✔
292

293
      size_t headersz = 2 + (mask ? 4 : 0);
174✔
294
      if (size0 == 126)
174✔
295
         headersz += 2;
4✔
296
      else if (size0 == 127)
170✔
297
         headersz += 8;
136✔
298

299
      if (rbytes < headersz)
174✔
300
         goto read_more;   // Not enough for extended header
×
301

302
      int flength = size0;
174✔
303
      if (size0 == 127)
174✔
304
         flength = UNPACK_BE64(frame + 2);
136✔
305
      else if (size0 == 126)
38✔
306
         flength = UNPACK_BE16(frame + 2);
4✔
307

308
      if (rbytes < flength + headersz)
174✔
309
         goto read_more;   // Not enough for full frame
136✔
310

311
      assert(fin);
38✔
312
      (void)fin;
38✔
313

314
      if (mask) {
38✔
315
         for (int i = 0; i < flength; i++)
72,113✔
316
            frame[headersz + i] ^= frame[headersz - 4 + (i % 4)];
72,097✔
317
      }
318

319
      void *payload = frame + headersz;
38✔
320

321
      switch (opcode) {
38✔
322
      case WS_OPCODE_TEXT_FRAME:
13✔
323
         {
324
            char *text = payload;
13✔
325
            assert(text + flength < (char *)ws->rx_buf + ws->rx_size);
13✔
326
            text[flength] = '\0';
13✔
327

328
            if (ws->handler.text_frame != NULL)
13✔
329
               (*ws->handler.text_frame)(ws, text, ws->handler.context);
13✔
330
         }
331
         break;
332

333
      case WS_OPCODE_BINARY_FRAME:
13✔
334
         if (ws->handler.binary_frame != NULL)
13✔
335
            (*ws->handler.binary_frame)(ws, payload, flength,
13✔
336
                                        ws->handler.context);
337
         break;
338

339
      case WS_OPCODE_CLOSE_FRAME:
6✔
340
         ws->closing = true;
6✔
341
         break;
6✔
342

343
      case WS_OPCODE_PING_FRAME:
3✔
344
         ws_send(ws, WS_OPCODE_PONG_FRAME, payload, flength);
3✔
345
         break;
3✔
346

347
      case WS_OPCODE_PONG_FRAME:
3✔
348
         if (ws->handler.pong_frame != NULL)
3✔
349
            (*ws->handler.pong_frame)(ws, payload, flength,
3✔
350
                                      ws->handler.context);
351
         break;
352

353
      default:
×
354
         DEBUG_ONLY(fatal_trace("unhandled WebSocket opcode %02x", opcode));
355
         break;
38✔
356
      }
357

358
      ws->rx_rptr += flength + headersz;
38✔
359
   } while (ws->rx_rptr < ws->rx_wptr);
38✔
360

361
   ws->rx_rptr = ws->rx_wptr = 0;
33✔
362
}
363

364
bool ws_closing(web_socket_t *ws)
6✔
365
{
366
   return ws->closing;
6✔
367
}
368

369
////////////////////////////////////////////////////////////////////////////////
370
// Packet buffers
371

372
static packet_buf_t *pb_new(void)
7✔
373
{
374
   packet_buf_t *pb = xcalloc(sizeof(packet_buf_t));
7✔
375
   pb->alloc = 128;
7✔
376
   pb->buf = xmalloc(pb->alloc);
7✔
377

378
   return pb;
7✔
379
}
380

381
static void pb_free(packet_buf_t *pb)
7✔
382
{
383
   free(pb->buf);
7✔
384
   free(pb);
7✔
385
}
7✔
386

387
static void pb_grow(packet_buf_t *pb, size_t need)
22✔
388
{
389
   if (pb->wptr + need > pb->alloc) {
22✔
390
      pb->alloc = MAX(pb->wptr + need, pb->alloc * 2);
×
391
      pb->buf = xrealloc(pb->buf, pb->alloc);
×
392
   }
393
}
22✔
394

395
static void pb_pack_u8(packet_buf_t *pb, uint8_t value)
8✔
396
{
397
   pb_grow(pb, 1);
8✔
398
   pb->buf[pb->wptr++] = value;
8✔
399
}
8✔
400

401
static void pb_pack_u16(packet_buf_t *pb, uint16_t value)
6✔
402
{
403
   pb_grow(pb, 2);
6✔
404
   pb->buf[pb->wptr++] = value >> 8;
6✔
405
   pb->buf[pb->wptr++] = value & 0xff;
6✔
406
}
6✔
407

408
static void pb_pack_u32(packet_buf_t *pb, uint32_t value)
×
409
{
410
   pb_grow(pb, 4);
×
411
   pb->buf[pb->wptr++] = (value >> 24) & 0xff;
×
412
   pb->buf[pb->wptr++] = (value >> 16) & 0xff;
×
413
   pb->buf[pb->wptr++] = (value >> 8) & 0xff;
×
414
   pb->buf[pb->wptr++] = value & 0xff;
×
415
}
×
416

417
static void pb_pack_u64(packet_buf_t *pb, uint64_t value)
2✔
418
{
419
   pb_grow(pb, 8);
2✔
420
   pb->buf[pb->wptr++] = (value >> 56) & 0xff;
2✔
421
   pb->buf[pb->wptr++] = (value >> 48) & 0xff;
2✔
422
   pb->buf[pb->wptr++] = (value >> 40) & 0xff;
2✔
423
   pb->buf[pb->wptr++] = (value >> 32) & 0xff;
2✔
424
   pb->buf[pb->wptr++] = (value >> 24) & 0xff;
2✔
425
   pb->buf[pb->wptr++] = (value >> 16) & 0xff;
2✔
426
   pb->buf[pb->wptr++] = (value >> 8) & 0xff;
2✔
427
   pb->buf[pb->wptr++] = value & 0xff;
2✔
428
}
2✔
429

430
static void pb_pack_bytes(packet_buf_t *pb, const void *data, size_t len)
6✔
431
{
432
   pb_grow(pb, len);
6✔
433
   memcpy(pb->buf + pb->wptr, data, len);
6✔
434
   pb->wptr += len;
6✔
435
}
6✔
436

437
static void pb_pack_str(packet_buf_t *pb, const char *str)
3✔
438
{
439
   const size_t len = strlen(str);
3✔
440
   assert(len < UINT16_MAX);
3✔
441

442
   pb_pack_u16(pb, len);
3✔
443
   pb_pack_bytes(pb, str, len);
3✔
444
}
3✔
445

446
static void pb_pack_ident(packet_buf_t *pb, ident_t ident)
3✔
447
{
448
   const size_t len = ident_len(ident);
3✔
449
   assert(len < UINT16_MAX);
3✔
450

451
   pb_pack_u16(pb, len);
3✔
452
   pb_pack_bytes(pb, istr(ident), len);
3✔
453
}
3✔
454

455
////////////////////////////////////////////////////////////////////////////////
456
// Generic networking utilities
457

458
typedef enum {
459
   LOG_DEBUG,
460
   LOG_INFO,
461
   LOG_WARN,
462
   LOG_ERROR
463
} log_level_t;
464

465
__attribute__((format(printf, 2, 3)))
466
static void server_log(log_level_t level, const char *fmt, ...)
31✔
467
{
468
   if (opt_get_int(OPT_UNIT_TEST))
31✔
469
      return;
31✔
470
   else if (DEBUG_ONLY(false &&) level < LOG_INFO)
×
471
      return;
472

473
   va_list ap;
×
474
   va_start(ap, fmt);
×
475

476
   switch (level) {
×
477
   case LOG_DEBUG: color_printf("$#8$D: "); break;
×
478
   case LOG_INFO: printf("I: "); break;
×
479
   case LOG_WARN: color_printf("$yellow$W: "); break;
×
480
   case LOG_ERROR: color_printf("$red$E: "); break;
×
481
   }
482

483
   vprintf(fmt, ap);
×
484
   color_printf("$$\n");
×
485
   fflush(stdout);
×
486

487
   va_end(ap);
×
488
}
489

490
static void send_fully(int fd, const void *data, size_t len)
7✔
491
{
492
   while (len > 0) {
14✔
493
      ssize_t nbytes = send(fd, data, len, 0);
7✔
494
      if (nbytes <= 0) {
7✔
495
         server_log(LOG_ERROR, "send: %s", strerror(errno));
×
496
         return;
×
497
      }
498

499
      data += nbytes;
7✔
500
      len -= nbytes;
7✔
501
   }
502
}
503

504
static void base64_encode(const void *in, size_t len, text_buf_t *tb)
7✔
505
{
506
   static const char map[] =
7✔
507
      "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/";
508

509
   const unsigned char *data = in;
7✔
510

511
   for (size_t i = 0; i < len; i++) {
56✔
512
      int c0 = (data[i] >> 2) & 0x3F;
49✔
513
      tb_append(tb, map[c0]);
49✔
514
      c0 = (data[i] << 4) & 0x3F;
49✔
515
      if (++i < len)
49✔
516
         c0 |= (data[i] >> 4) & 0x0F;
49✔
517
      tb_append(tb, map[c0]);
49✔
518

519
      if (i < len) {
49✔
520
         int c1 = (data[i] << 2) & 0x3F;
49✔
521
         if (++i < len)
49✔
522
            c1 |= (data[i] >> 6) & 0x03;
42✔
523
         tb_append(tb, map[c1]);
49✔
524
      }
525
      else {
526
         ++i;
×
527
         tb_append(tb, '=');
×
528
      }
529

530
      if (i < len) {
49✔
531
         int c2 = data[i] & 0x3F;
42✔
532
         tb_append(tb, map[c2]);
42✔
533
      }
534
      else
535
         tb_append(tb, '=');
7✔
536
   }
537
}
7✔
538

539
static packet_buf_t *fresh_packet_buffer(debug_server_t *server)
8✔
540
{
541
   server->packetbuf->wptr = 0;
8✔
542
   return server->packetbuf;
8✔
543
}
544

545
////////////////////////////////////////////////////////////////////////////////
546
// HTTP and WebSocket server
547

548
static void send_http_headers(int fd, int status, const char *type, size_t len,
7✔
549
                              const char *headers)
550
{
551
   LOCAL_TEXT_BUF date = tb_new();
14✔
552
   tb_strftime(date, "G%a, %d %b %Y %H:%M:%S %Z", time(NULL));
7✔
553

554
   char buf[512];
7✔
555
   const int nbytes = checked_sprintf(buf, sizeof(buf),
7✔
556
                                      "HTTP/1.1 %d\r\n"
557
                                      "Date: %s\r\n"
558
                                      "Content-Type: %s; charset=UTF-8\r\n"
559
                                      "Content-Length: %zu\r\n"
560
                                      "%s\r\n",
561
                                      status, tb_get(date), type, len, headers);
562

563
   send_fully(fd, buf, nbytes);
7✔
564
}
7✔
565

566
static void send_page(int fd, int status, const char *page)
×
567
{
568
   const size_t len = strlen(page);
×
569
   send_http_headers(fd, status, "text/html", len, "");
×
570
   send_fully(fd, page, len);
×
571
}
×
572

573
#ifdef ENABLE_GUI
574
static void send_file(int fd, const char *file, const char *mime)
×
575
{
576
   FILE *f = fopen(file, "rb");
×
577
   if (f == NULL) {
×
578
      send_page(fd, HTTP_NOT_FOUND, "File not found");
×
579
      return;
×
580
   }
581

582
   file_info_t info;
×
583
   if (!get_handle_info(fileno(f), &info)) {
×
584
      send_page(fd, HTTP_INTERNAL_SERVER_ERROR, "Cannot stat file");
×
585
      goto out_close;
×
586
   }
587

588
   send_http_headers(fd, HTTP_OK, mime, info.size, "");
×
589

590
   char buf[1024];
×
591
   for (ssize_t remain = info.size, nbytes; remain > 0; remain -= nbytes) {
×
592
      memset(buf, '\0', sizeof(buf));
×
593

594
      if ((nbytes = fread(buf, 1, MIN(remain, sizeof(buf)), f)) == 0) {
×
595
         server_log(LOG_ERROR, "fread: %s: %s", file, strerror(errno));
×
596
         goto out_close;
×
597
      }
598

599
      send_fully(fd, buf, nbytes);
×
600
   }
601

602
 out_close:
×
603
   fclose(f);
×
604
}
605
#endif
606

607
static void handle_text_frame(web_socket_t *ws, const char *text, void *context)
8✔
608
{
609
   debug_server_t *server = context;
8✔
610

611
   const char *result = NULL;
8✔
612
   if (shell_eval(server->shell, text, &result) && *result != '\0')
8✔
613
      ws_send_text(ws, result);
5✔
614
}
8✔
615

616
static void handle_binary_frame(web_socket_t *ws, const void *data,
5✔
617
                                size_t length, void *context)
618
{
619
   debug_server_t *server = context;
5✔
620

621
   if (length == 0) {
5✔
622
      server_log(LOG_WARN, "ignoring zero-length binary frame");
×
623
      return;
×
624
   }
625

626
   const c2s_opcode_t op = *(const uint8_t *)data;
5✔
627
   switch (op) {
5✔
628
   case C2S_SHUTDOWN:
5✔
629
      server->shutdown = true;
5✔
630
      break;
5✔
631
   default:
×
632
      server_log(LOG_ERROR, "unhandled client to server opcode %02x", op);
×
633
      break;
×
634
   }
635
}
636

637
static void kill_http_connection(http_server_t *http)
7✔
638
{
639
   diag_set_consumer(NULL, NULL);
7✔
640

641
   closesocket(http->websocket->sock);
7✔
642

643
   ws_free(http->websocket);
7✔
644
   http->websocket = NULL;
7✔
645
}
7✔
646

647
static void tunnel_diag(diag_t *d, void *context)
×
648
{
649
   http_server_t *http = container_of(context, http_server_t, server);
×
650

651
   if (http->websocket != NULL) {
×
652
      ws_send_text(http->websocket, diag_get_text(d));
×
653
   }
654
   else
655
      server_log(LOG_INFO, "%s", diag_get_text(d));
×
656
}
×
657

658
static void tunnel_output(const char *buf, size_t nchars, void *user)
×
659
{
660
   http_server_t *http = container_of(user, http_server_t, server);
×
661
   ws_send(http->websocket, WS_OPCODE_TEXT_FRAME, buf, nchars);
×
662
}
×
663

664
static void tunnel_backchannel(const char *buf, size_t nchars, void *user)
×
665
{
666
   http_server_t *http = container_of(user, http_server_t, server);
×
667

668
   packet_buf_t *pb = fresh_packet_buffer(&(http->server));
×
669
   pb_pack_u8(pb, S2C_BACKCHANNEL);
×
670
   pb_pack_u32(pb, nchars);
×
671
   pb_pack_bytes(pb, buf, nchars);
×
672
   ws_send_packet(http->websocket, pb);
×
673
}
×
674

675
static void add_wave_handler(ident_t path, const char *enc, void *user)
1✔
676
{
677
   http_server_t *http = container_of(user, http_server_t, server);
1✔
678

679
   packet_buf_t *pb = fresh_packet_buffer(&(http->server));
1✔
680
   pb_pack_u8(pb, S2C_ADD_WAVE);
1✔
681
   pb_pack_ident(pb, path);
1✔
682
   pb_pack_str(pb, enc);
1✔
683
   ws_send_packet(http->websocket, pb);
1✔
684
}
1✔
685

686
static void signal_update_handler(ident_t path, uint64_t now, rt_signal_t *s,
1✔
687
                                  const char *enc, void *user)
688
{
689
   http_server_t *http = container_of(user, http_server_t, server);
1✔
690

691
   packet_buf_t *pb = fresh_packet_buffer(&(http->server));
1✔
692
   pb_pack_u8(pb, S2C_SIGNAL_UPDATE);
1✔
693
   pb_pack_ident(pb, path);
1✔
694
   pb_pack_str(pb, enc);
1✔
695
   ws_send_packet(http->websocket, pb);
1✔
696
}
1✔
697

698
static void start_sim_handler(ident_t top, void *user)
1✔
699
{
700
   http_server_t *http = container_of(user, http_server_t, server);
1✔
701

702
   packet_buf_t *pb = fresh_packet_buffer(&(http->server));
1✔
703
   pb_pack_u8(pb, S2C_START_SIM);
1✔
704
   pb_pack_ident(pb, top);
1✔
705
   ws_send_packet(http->websocket, pb);
1✔
706
}
1✔
707

708
static void restart_sim_handler(void *user)
1✔
709
{
710
   http_server_t *http = container_of(user, http_server_t, server);
1✔
711

712
   packet_buf_t *pb = fresh_packet_buffer(&(http->server));
1✔
713
   pb_pack_u8(pb, S2C_RESTART_SIM);
1✔
714
   ws_send_packet(http->websocket, pb);
1✔
715
}
1✔
716

717
static void quit_sim_handler(void *user)
1✔
718
{
719
   http_server_t *http = container_of(user, http_server_t, server);
1✔
720

721
   packet_buf_t *pb = fresh_packet_buffer(&(http->server));
1✔
722
   pb_pack_u8(pb, S2C_QUIT_SIM);
1✔
723
   ws_send_packet(http->websocket, pb);
1✔
724
}
1✔
725

726
static void next_time_step_handler(uint64_t now, void *user)
2✔
727
{
728
   http_server_t *http = container_of(user, http_server_t, server);
2✔
729

730
   packet_buf_t *pb = fresh_packet_buffer(&(http->server));
2✔
731
   pb_pack_u8(pb, S2C_NEXT_TIME_STEP);
2✔
732
   pb_pack_u64(pb, now);
2✔
733
   ws_send_packet(http->websocket, pb);
2✔
734
}
2✔
735

736
static void open_websocket(http_server_t *http, int fd)
7✔
737
{
738
   if (http->websocket != NULL) {
7✔
739
      ws_send_close(http->websocket);
1✔
740
      ws_flush(http->websocket);
1✔
741
      kill_http_connection(http);
1✔
742
   }
743

744
   const ws_handler_t handler = {
7✔
745
      .text_frame   = handle_text_frame,
746
      .binary_frame = handle_binary_frame,
747
      .context      = &(http->server)
7✔
748
   };
749

750
   http->websocket = ws_new(fd, &handler, false);
7✔
751

752
   diag_set_consumer(tunnel_diag, &(http->server));
7✔
753

754
   if (http->server.banner)
7✔
755
      shell_print_banner(http->server.shell);
×
756

757
   if (http->server.top != NULL)
7✔
758
      shell_reset(http->server.shell, http->server.top);
1✔
759

760
   if (http->server.init_cmd != NULL) {
7✔
761
      packet_buf_t *pb = fresh_packet_buffer(&(http->server));
1✔
762
      pb_pack_u8(pb, S2C_INIT_CMD);
1✔
763
      pb_pack_str(pb, http->server.init_cmd);
1✔
764
      ws_send_packet(http->websocket, pb);
1✔
765
   }
766
}
7✔
767

768
static bool get_websocket_accept_value(const char *key, text_buf_t *tb)
7✔
769
{
770
   if (key == NULL || strlen(key) != WS_KEY_LEN)
7✔
771
      return false;
772

773
   char *str LOCAL = xmalloc(WS_KEY_LEN + WS_GUID_LEN + 1);
7✔
774
   strncpy(str, key, (WS_KEY_LEN + 1));
7✔
775
   strncpy(str + WS_KEY_LEN, WS_GUID, WS_GUID_LEN + 1);
7✔
776

777
   SHA1_CTX ctx;
7✔
778
   SHA1Init(&ctx);
7✔
779
   SHA1Update(&ctx, (unsigned char *)str, WS_KEY_GUID_LEN);
7✔
780

781
   unsigned char hash[SHA1_LEN];
7✔
782
   SHA1Final(hash, &ctx);
7✔
783

784
   base64_encode(hash, SHA1_LEN, tb);
7✔
785
   return true;
7✔
786
}
787

788
static void websocket_upgrade(http_server_t *http, int fd, const char *method,
7✔
789
                              const char *version, shash_t *headers)
790
{
791
   LOCAL_TEXT_BUF tb = tb_new();
7✔
792

793
   if (strcmp(method, "GET") != 0 || strcmp(version, "HTTP/1.1") != 0) {
7✔
794
      send_page(fd, HTTP_BAD_REQUEST, "Bad request");
×
795
      goto out_close;
×
796
   }
797

798
   const char *ws_version_header = shash_get(headers, "sec-websocket-version");
7✔
799

800
   if (ws_version_header == NULL
7✔
801
       || strcasecmp(ws_version_header, WS_WEBSOCKET_VERSION) != 0) {
7✔
802

803
      static const char page[] = "Upgrade required";
×
804
      static const char header[] =
×
805
         "Sec-WebSocket-Version:" WS_WEBSOCKET_VERSION;
806

807
      send_http_headers(fd, HTTP_UPGRADE_REQUIRED, "text/html",
×
808
                        sizeof(page), header);
809
      send_fully(fd, page, sizeof(page));
×
810

811
      goto out_close;
×
812
   }
813

814
   const char *ws_key_header = shash_get(headers, "sec-websocket-key");
7✔
815

816
   if (ws_key_header == NULL || strlen(ws_key_header) != WS_KEY_LEN) {
7✔
817
      send_page(fd, HTTP_BAD_REQUEST, "Bad request");
×
818
      goto out_close;
×
819
   }
820

821
   tb_cat(tb, "Connection: upgrade\r\n"
7✔
822
          "Upgrade: websocket\r\n"
823
          "Sec-WebSocket-Accept: ");
824

825
   if (!get_websocket_accept_value(ws_key_header, tb))
7✔
826
      goto out_close;
×
827

828
   tb_cat(tb, "\r\n");
7✔
829

830
   send_http_headers(fd, HTTP_SWITCHING_PROTOCOLS, "text/html", 0, tb_get(tb));
7✔
831

832
   open_websocket(http, fd);
7✔
833

834
   return;   // Socket left open
7✔
835

836
 out_close:
×
837
   closesocket(fd);
×
838
}
839

840
static bool is_websocket_request(shash_t *headers)
7✔
841
{
842
   const char *upg_header = shash_get(headers, "upgrade");
7✔
843
   const char *con_header = shash_get(headers, "connection");
7✔
844

845
   return (upg_header != NULL && con_header != NULL)
7✔
846
          && (strcasecmp(upg_header, WS_UPGRADE_VALUE) == 0)
7✔
847
          && (strcasestr(con_header, "Upgrade") != NULL);
14✔
848
}
849

850
#ifdef ENABLE_GUI
851
static void serve_gui_static_files(int fd, const char *url)
×
852
{
853
   LOCAL_TEXT_BUF tb = tb_new();
×
854
   get_data_dir(tb);
×
855
   tb_cat(tb, "/gui");
×
856

857
   if (strcmp(url, "/") == 0) {
×
858
      tb_cat(tb, "/index.html");
×
859
      send_file(fd, tb_get(tb), "text/html");
×
860
      return;
×
861
   }
862

863
   const char *mime = "application/octet-stream";
×
864
   const char *dot = strrchr(url, '.');
×
865
   if (dot != NULL) {
×
866
      static const char *mime_map[][2] = {
867
         { ".js",  "text/javascript" },
868
         { ".css", "text/css" },
869
         { ".map", "application/json" },
870
      };
871

872
      for (int i = 0; i < ARRAY_LEN(mime_map); i++) {
×
873
         if (strcmp(dot, mime_map[i][0]) == 0) {
×
874
            mime = mime_map[i][1];
×
875
            break;
×
876
         }
877
      }
878
   }
879

880
   tb_cat(tb, url);
×
881
   send_file(fd, tb_get(tb), mime);
×
882
}
883
#endif
884

885
static void handle_http_request(http_server_t *http, int fd,
7✔
886
                                const char *method, const char *url,
887
                                const char *version, shash_t *headers)
888
{
889
   server_log(LOG_DEBUG, "%s %s", method, url);
7✔
890

891
   if (is_websocket_request(headers)) {
7✔
892
      websocket_upgrade(http, fd, method, version, headers);
7✔
893
      return;    // Socket left open
7✔
894
   }
895
   else if (strcmp(method, "GET") != 0) {
×
896
      send_page(fd, HTTP_METHOD_NOT_ALLOWED, "Method not allowed");
×
897
      goto out_close;
×
898
   }
899

900
#ifdef ENABLE_GUI
901
   serve_gui_static_files(fd, url);
×
902
#else
903
   send_page(fd, HTTP_NOT_FOUND, "Not found");
904
#endif
905

906
 out_close:
×
907
   closesocket(fd);
×
908
}
909

910
static void http_new_connection(debug_server_t *server, int fd)
7✔
911
{
912
   char buf[MAX_HTTP_REQUEST + 1];
7✔
913
   size_t reqlen = 0;
7✔
914
   do {
7✔
915
      ssize_t n = recv(fd, buf + reqlen, MAX_HTTP_REQUEST - reqlen, 0);
7✔
916

917
#ifdef __MINGW32__
918
      const bool would_block =
919
         (n == SOCKET_ERROR && WSAGetLastError() == WSAEWOULDBLOCK);
920
#else
921
      const bool would_block = (n == -1 && errno == EWOULDBLOCK);
7✔
922
#endif
923

924
      if (would_block) {
7✔
925
         fd_set rfd;
×
926
         FD_ZERO(&rfd);
×
927
         FD_SET(fd, &rfd);
×
928

929
         struct timeval tv = {
×
930
            .tv_sec = 1,
931
            .tv_usec = 0
932
         };
933

934
         if (select(fd + 1, &rfd, NULL, NULL, &tv) == -1) {
×
935
            server_log(LOG_ERROR, "select: %s", last_os_error());
×
936
            goto out_close;
×
937
         }
938

939
         if (FD_ISSET(fd, &rfd))
×
940
            continue;
×
941

942
         server_log(LOG_ERROR, "timeout waiting for HTTP request");
×
943
         goto out_close;
×
944
      }
945
      else if (n <= 0) {
7✔
946
         server_log(LOG_ERROR, "recv: %s", last_os_error());
×
947
         goto out_close;
×
948
      }
949

950
      reqlen += n;
7✔
951
      assert(reqlen <= MAX_HTTP_REQUEST);
7✔
952

953
      if (reqlen == MAX_HTTP_REQUEST) {
7✔
954
         server_log(LOG_ERROR, "HTTP request too big");
×
955
         goto out_close;
×
956
      }
957

958
      buf[reqlen] = '\0';
7✔
959
   } while (strstr(buf, "\r\n\r\n") == NULL);
7✔
960

961
   const char *method = "GET";
7✔
962
   const char *url = "/";
7✔
963
   const char *version = "";
7✔
964

965
   char *saveptr, *saveptr2;
7✔
966
   char *line = strtok_r(buf, "\r\n", &saveptr);
7✔
967
   if (line == NULL) {
7✔
968
      server_log(LOG_ERROR, "malformed HTTP request");
×
969
      goto out_close;
×
970
   }
971

972
   method = strtok_r(line, " ", &saveptr2);
7✔
973
   if (method == NULL)
7✔
974
      goto malformed;
×
975

976
   url = strtok_r(NULL, " ", &saveptr2);
7✔
977
   if (url == NULL)
7✔
978
      goto malformed;
×
979

980
   version = strtok_r(NULL, " ", &saveptr2);
7✔
981
   if (version == NULL)
7✔
982
      goto malformed;
×
983

984
   shash_t *headers = shash_new(64);
7✔
985

986
   while ((line = strtok_r(NULL, "\r\n", &saveptr)) && line[0] != '\0') {
70✔
987
      char *colon = strchr(line, ':');
56✔
988
      if (colon != NULL) {
56✔
989
         *colon = '\0';
56✔
990

991
         char *value = colon + 1;
56✔
992
         while (*value == ' ')
112✔
993
            value++;
56✔
994

995
         for (char *p = line; *p; p++)
623✔
996
            *p = tolower_iso88591(*p);
567✔
997

998
         shash_put(headers, line, value);
56✔
999
      }
1000
   }
1001

1002
   http_server_t *http = container_of(server, http_server_t, server);
7✔
1003
   handle_http_request(http, fd, method, url, version, headers);
7✔
1004
   shash_free(headers);
7✔
1005
   return;
7✔
1006

1007
 malformed:
×
1008
   server_log(LOG_ERROR, "malformed HTTP request");
×
1009

1010
 out_close:
×
1011
   closesocket(fd);
×
1012
}
1013

1014
static int http_fill_fd_set(debug_server_t *server, fd_set *rfd, fd_set *wfd)
49✔
1015
{
1016
   http_server_t *http = container_of(server, http_server_t, server);
49✔
1017

1018
   if (http->websocket == NULL)
49✔
1019
      return -1;
1020

1021
   FD_SET(http->websocket->sock, rfd);
38✔
1022

1023
   if (http->websocket->tx_wptr != http->websocket->tx_rptr)
38✔
1024
      FD_SET(http->websocket->sock, wfd);
16✔
1025

1026
   return http->websocket->sock;
38✔
1027
}
1028

1029
static void http_poll_sockets(debug_server_t *server, fd_set *rfd, fd_set *wfd)
44✔
1030
{
1031
   http_server_t *http = container_of(server, http_server_t, server);
44✔
1032

1033
   if (http->websocket == NULL)
44✔
1034
      return;
1035

1036
   if (FD_ISSET(http->websocket->sock, rfd))
44✔
1037
      ws_poll(http->websocket);
22✔
1038

1039
   if (FD_ISSET(http->websocket->sock, wfd))
44✔
1040
      ws_flush(http->websocket);
16✔
1041

1042
   if (http->websocket->closing)
44✔
1043
      kill_http_connection(http);
6✔
1044
}
1045

1046
static void http_shutdown(debug_server_t *server)
5✔
1047
{
1048
   http_server_t *http = container_of(server, http_server_t, server);
5✔
1049

1050
   if (http->websocket != NULL)
5✔
1051
      ws_send_close(http->websocket);
5✔
1052
}
5✔
1053

1054
static debug_server_t *http_server_new(void)
5✔
1055
{
1056
   http_server_t *http = xcalloc(sizeof(http_server_t));
5✔
1057
   return &(http->server);
5✔
1058
}
1059

1060
static void http_server_free(debug_server_t *server)
5✔
1061
{
1062
   http_server_t *http = container_of(server, http_server_t, server);
5✔
1063
   assert(http->websocket == NULL);
5✔
1064
   free(http);
5✔
1065
}
5✔
1066

1067
static const server_proto_t http_protocol = {
1068
   .new_server = http_server_new,
1069
   .free_server = http_server_free,
1070
   .new_connection = http_new_connection,
1071
   .fill_fd_set = http_fill_fd_set,
1072
   .poll_sockets = http_poll_sockets,
1073
   .shutdown = http_shutdown,
1074
};
1075

1076
////////////////////////////////////////////////////////////////////////////////
1077
// CXXRTL debug protocol over TCP
1078
//
1079
// https://gist.github.com/whitequark/59520e2de0947da8747061bc2ea91639
1080

1081
static void kill_cxxrtl_connection(cxxrtl_server_t *cxxrtl)
×
1082
{
1083
   diag_set_consumer(NULL, NULL);
×
1084

1085
   closesocket(cxxrtl->sock);
×
1086
   cxxrtl->sock = -1;
×
1087

1088
   cxxrtl->rx_rptr = cxxrtl->rx_wptr = 0;
×
1089
}
×
1090

1091
static void cxxrtl_send(cxxrtl_server_t *cxxrtl, json_t *json)
5✔
1092
{
1093
   // TODO: use json_dumpb or json_dump_callback
1094
   char *str LOCAL = json_dumps(json, JSON_COMPACT);
5✔
1095
   server_log(LOG_DEBUG, "S->C: %s", str);
5✔
1096

1097
   const size_t size = strlen(str) + 1;
5✔
1098

1099
   if (cxxrtl->tx_wptr + size > cxxrtl->tx_size) {
5✔
1100
      cxxrtl->tx_size = MAX(cxxrtl->tx_size + size, 1024);
2✔
1101
      cxxrtl->tx_buf = xrealloc(cxxrtl->tx_buf, cxxrtl->tx_size);
2✔
1102
   }
1103

1104
   memcpy(cxxrtl->tx_buf + cxxrtl->tx_wptr, str, size);
5✔
1105
   cxxrtl->tx_wptr += size;
5✔
1106
}
5✔
1107

1108
static void cxxrtl_error(cxxrtl_server_t *cxxrtl, json_t *json,
1✔
1109
                         const char *error, const char *message)
1110
{
1111
   json_object_set_new(json, "type", json_string("error"));
1✔
1112
   json_object_set_new(json, "error", json_string(error));
1✔
1113
   json_object_set_new(json, "message", json_string(message));
1✔
1114

1115
   cxxrtl_send(cxxrtl, json);
1✔
1116
}
1✔
1117

1118
static void handle_greeting(cxxrtl_server_t *cxxrtl, json_t *json)
2✔
1119
{
1120
   json_t *version = json_object_get(json, "version");
2✔
1121
   if (version == NULL)
2✔
1122
      return cxxrtl_error(cxxrtl, json, "parse_error", "Missing version");
×
1123
   else if (json_integer_value(version) != 0)
2✔
1124
      return cxxrtl_error(cxxrtl, json, "version_error", "Epected version 0");
×
1125

1126
   json_t *commands = json_array();
2✔
1127
   json_object_set_new(json, "commands", commands);
2✔
1128

1129
   static const char *supported_commands[] = {
2✔
1130
      "list_scopes",
1131
      "list_items",
1132
      "reference_items",
1133
      "query_interval",
1134
      "get_simulation_status",
1135
      "run_simulation",
1136
      "pause_simulation",
1137
      "nvc.quit_simulation",
1138
   };
1139

1140
   for (size_t i = 0; i < ARRAY_LEN(supported_commands); i++)
18✔
1141
      json_array_append_new(commands, json_string(supported_commands[i]));
16✔
1142

1143
   json_t *events = json_array();
2✔
1144
   json_object_set_new(json, "events", events);
2✔
1145

1146
   static const char *supported_events[] = {
2✔
1147
      "simulation_paused",
1148
      "simulation_finished"
1149
   };
1150

1151
   for (size_t i = 0; i < ARRAY_LEN(supported_events); i++)
6✔
1152
      json_array_append_new(events, json_string(supported_events[i]));
4✔
1153

1154
   json_t *features = json_object();
2✔
1155
   json_object_set_new(json, "features", features);
2✔
1156

1157
   json_t *encoding = json_array();
2✔
1158
   json_object_set_new(json, "item_values_encoding", encoding);
2✔
1159

1160
   json_array_append_new(encoding, json_string("base64(u32)"));
2✔
1161

1162
   json_object_set_new(features, "encoding", encoding);
2✔
1163

1164
   cxxrtl_send(cxxrtl, json);
2✔
1165
}
1166

1167
static void handle_get_simulation_status(cxxrtl_server_t *cxxrtl, json_t *json)
×
1168
{
1169
   json_object_set_new(json, "type", json_string("response"));
×
1170
   json_object_set_new(json, "status", json_string("paused"));
×
1171
   json_object_set_new(json, "latest_time", json_string("0.0"));
×
1172
   json_object_set_new(json, "next_sample_time", json_string("0.0"));
×
1173

1174
   cxxrtl_send(cxxrtl, json);
×
1175
}
×
1176

1177
static void handle_quit_simulation(cxxrtl_server_t *cxxrtl, json_t *json)
2✔
1178
{
1179
   cxxrtl->server.shutdown = true;
2✔
1180

1181
   json_object_set_new(json, "type", json_string("response"));
2✔
1182
   cxxrtl_send(cxxrtl, json);
2✔
1183
}
2✔
1184

1185
static void handle_command(cxxrtl_server_t *cxxrtl, json_t *json)
3✔
1186
{
1187
   json_t *command = json_object_get(json, "command");
3✔
1188
   if (command == NULL)
3✔
1189
      return cxxrtl_error(cxxrtl, json, "parse_error", "Missing command");
×
1190

1191
   const char *str = json_string_value(command);
3✔
1192
   if (strcmp(str, "get_simulation_status") == 0)
3✔
1193
      handle_get_simulation_status(cxxrtl, json);
×
1194
   else if (strcmp(str, "nvc.quit_simulation") == 0)
3✔
1195
      handle_quit_simulation(cxxrtl, json);
2✔
1196
   else
1197
      cxxrtl_error(cxxrtl, json, "bad_command", "Invalid command");
1✔
1198
}
1199

1200
static void cxxrtl_new_connection(debug_server_t *server, int fd)
2✔
1201
{
1202
   cxxrtl_server_t *cxxrtl = container_of(server, cxxrtl_server_t, server);
2✔
1203

1204
   if (cxxrtl->sock != -1) {
2✔
1205
      server_log(LOG_INFO, "closing old connection");
×
1206
      closesocket(cxxrtl->sock);
×
1207
   }
1208

1209
   cxxrtl->sock = fd;
2✔
1210
}
2✔
1211

1212
static int cxxrtl_fill_fd_set(debug_server_t *server, fd_set *rfd, fd_set *wfd)
14✔
1213
{
1214
   cxxrtl_server_t *cxxrtl = container_of(server, cxxrtl_server_t, server);
14✔
1215

1216
   if (cxxrtl->sock != -1)
14✔
1217
      FD_SET(cxxrtl->sock, rfd);
10✔
1218

1219
   if (cxxrtl->tx_wptr != cxxrtl->tx_rptr)
14✔
1220
      FD_SET(cxxrtl->sock, wfd);
5✔
1221

1222
   return cxxrtl->sock;
14✔
1223
}
1224

1225
static void cxxrtl_read_message(cxxrtl_server_t *cxxrtl)
5✔
1226
{
1227
   if (cxxrtl->rx_size - cxxrtl->rx_wptr < 1024)
5✔
1228
      cxxrtl->rx_buf = xrealloc(cxxrtl->rx_buf, (cxxrtl->rx_size += 1024));
2✔
1229

1230
   const ssize_t nbytes = recv(cxxrtl->sock, cxxrtl->rx_buf + cxxrtl->rx_wptr,
10✔
1231
                               cxxrtl->rx_size - cxxrtl->rx_wptr, 0);
5✔
1232
   if (nbytes == -1 && errno == EAGAIN)
5✔
1233
      return;
1234
   else if (nbytes == 0) {
5✔
1235
      kill_cxxrtl_connection(cxxrtl);
×
1236
      return;
×
1237
   }
1238
   else if (nbytes < 0) {
5✔
1239
      server_log(LOG_ERROR, "connection closed: %s", last_os_error());
×
1240
      kill_cxxrtl_connection(cxxrtl);
×
1241
      return;
×
1242
   }
1243

1244
   cxxrtl->rx_wptr += nbytes;
5✔
1245
   assert(cxxrtl->rx_wptr <= cxxrtl->rx_size);
5✔
1246
   assert(cxxrtl->rx_rptr < cxxrtl->rx_wptr);
5✔
1247

1248
   do {
5✔
1249
      char *endp = memchr(cxxrtl->rx_buf + cxxrtl->rx_rptr, '\0',
5✔
1250
                          cxxrtl->rx_wptr - cxxrtl->rx_rptr);
5✔
1251
      if (endp == NULL)
5✔
1252
         return;
×
1253

1254
      server_log(LOG_DEBUG, "C->S: %s", cxxrtl->rx_buf + cxxrtl->rx_rptr);
5✔
1255

1256
      json_error_t error;
5✔
1257
      json_t *root = json_loads(cxxrtl->rx_buf + cxxrtl->rx_rptr, 0, &error);
5✔
1258

1259
      if (endp == cxxrtl->rx_buf + cxxrtl->rx_wptr - 1)
5✔
1260
         cxxrtl->rx_wptr = cxxrtl->rx_rptr = 0;
5✔
1261
      else
1262
         cxxrtl->rx_rptr = endp - cxxrtl->rx_buf + 1;
×
1263

1264
      if (!json_is_object(root)) {
5✔
1265
         cxxrtl_error(cxxrtl, root, "bad_json", "Nnot a JSON object");
×
1266
         json_decref(root);
×
1267
         continue;
×
1268
      }
1269

1270
      json_t *type = json_object_get(root, "type");
5✔
1271
      if (!json_is_string(type)) {
5✔
1272
         cxxrtl_error(cxxrtl, root, "parse_error", "Missing type field");
×
1273
         json_decref(root);
×
1274
         continue;
×
1275
      }
1276

1277
      const char *typestr = json_string_value(type);
5✔
1278
      if (strcmp(typestr, "greeting") == 0)
5✔
1279
         handle_greeting(cxxrtl, root);
2✔
1280
      else if (strcmp(typestr, "command") == 0)
3✔
1281
         handle_command(cxxrtl, root);
3✔
1282
      else
1283
         server_log(LOG_ERROR, "unhandled message type '%s'", typestr);
×
1284
   } while (cxxrtl->rx_rptr != cxxrtl->rx_wptr);
5✔
1285
}
1286

1287
static void cxxrtl_flush(cxxrtl_server_t *cxxrtl)
5✔
1288
{
1289
   while (cxxrtl->tx_wptr != cxxrtl->tx_rptr) {
10✔
1290
      const size_t chunksz = cxxrtl->tx_wptr - cxxrtl->tx_rptr;
5✔
1291
      const ssize_t nbytes =
5✔
1292
         send(cxxrtl->sock, cxxrtl->tx_buf + cxxrtl->tx_rptr, chunksz, 0);
5✔
1293

1294
      if (nbytes == 0)
5✔
1295
         break;
1296
      else if (nbytes < 0) {
5✔
1297
         kill_cxxrtl_connection(cxxrtl);
×
1298
         break;
×
1299
      }
1300

1301
      cxxrtl->tx_rptr += nbytes;
5✔
1302
   }
1303

1304
   if (cxxrtl->tx_wptr == cxxrtl->tx_rptr)
5✔
1305
      cxxrtl->tx_rptr = cxxrtl->tx_wptr = 0;
5✔
1306
}
5✔
1307

1308
static void cxxrtl_poll_sockets(debug_server_t *server, fd_set *rfd,
12✔
1309
                                fd_set *wfd)
1310
{
1311
   cxxrtl_server_t *cxxrtl = container_of(server, cxxrtl_server_t, server);
12✔
1312

1313
   if (cxxrtl->sock == -1)
12✔
1314
      return;
1315

1316
   if (FD_ISSET(cxxrtl->sock, rfd))
12✔
1317
      cxxrtl_read_message(cxxrtl);
5✔
1318

1319
   if (FD_ISSET(cxxrtl->sock, wfd))
12✔
1320
      cxxrtl_flush(cxxrtl);
5✔
1321

1322
   if (server->shutdown && cxxrtl->tx_wptr == cxxrtl->tx_rptr) {
12✔
1323
      closesocket(cxxrtl->sock);
2✔
1324
      cxxrtl->sock = -1;
2✔
1325
   }
1326
}
1327

1328
static void cxxrtl_shutdown(debug_server_t *server)
2✔
1329
{
1330
   // TODO: send an event to the client?
1331
}
2✔
1332

1333
static debug_server_t *cxxrtl_server_new(void)
2✔
1334
{
1335
   cxxrtl_server_t *cxxrtl = xcalloc(sizeof(cxxrtl_server_t));
2✔
1336
   cxxrtl->sock = -1;
2✔
1337

1338
   return &(cxxrtl->server);
2✔
1339
}
1340

1341
static void cxxrtl_server_free(debug_server_t *server)
2✔
1342
{
1343
   cxxrtl_server_t *cxxrtl = container_of(server, cxxrtl_server_t, server);
2✔
1344
   assert(cxxrtl->sock == -1);
2✔
1345
   free(cxxrtl->rx_buf);
2✔
1346
   free(cxxrtl->tx_buf);
2✔
1347
   free(cxxrtl);
2✔
1348
}
2✔
1349

1350
static const server_proto_t cxxrtl_protocol = {
1351
   .new_server = cxxrtl_server_new,
1352
   .free_server = cxxrtl_server_free,
1353
   .new_connection = cxxrtl_new_connection,
1354
   .fill_fd_set = cxxrtl_fill_fd_set,
1355
   .poll_sockets = cxxrtl_poll_sockets,
1356
   .shutdown = cxxrtl_shutdown,
1357
};
1358

1359
////////////////////////////////////////////////////////////////////////////////
1360
// Server event loop
1361

1362
static void handle_new_connection(debug_server_t *server)
9✔
1363
{
1364
   int fd = accept(server->sock, NULL, NULL);
9✔
1365
   if (fd < 0) {
9✔
1366
      server_log(LOG_ERROR, "accept: %s", last_os_error());
×
1367
      return;
×
1368
   }
1369

1370
#ifdef __MINGW32__
1371
   if (ioctlsocket(fd, FIONBIO, &(unsigned long){1})) {
1372
      server_log(LOG_ERROR, "ioctlsocket: %s", last_os_error());
1373
      closesocket(fd);
1374
      return;
1375
   }
1376
#else
1377
   const int flags = fcntl(fd, F_GETFL, 0);
9✔
1378
   if (fcntl(fd, F_SETFL, flags | O_NONBLOCK) < 0) {
9✔
1379
      server_log(LOG_ERROR, "fcntl: %s", last_os_error());
×
1380
      close(fd);
×
1381
      return;
×
1382
   }
1383
#endif
1384

1385
   if (server->proto->new_connection != NULL)
9✔
1386
      (*server->proto->new_connection)(server, fd);
9✔
1387
}
1388

1389
static int open_server_socket(void)
7✔
1390
{
1391
#ifdef __MINGW32__
1392
   WSADATA wsaData;
1393
   if (WSAStartup(MAKEWORD(2, 2), &wsaData))
1394
      fatal_errno("WSAStartup failed");
1395
#endif
1396

1397
   int sock = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
7✔
1398
   if (sock < 0)
7✔
1399
      fatal_errno("socket");
×
1400

1401
   if (setsockopt(sock, SOL_SOCKET, SO_REUSEADDR,
7✔
1402
                  (char *)&(int){1}, sizeof(int)) < 0)
7✔
1403
      fatal_errno("setsockopt");
×
1404

1405
   const uint16_t port = opt_get_int(OPT_SERVER_PORT);
7✔
1406

1407
   struct sockaddr_in addr;
7✔
1408
   addr.sin_family = AF_INET;
7✔
1409
   addr.sin_port = htons(port);
7✔
1410
   addr.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
7✔
1411

1412
   if (bind(sock, (struct sockaddr *)&addr, sizeof(addr)) < 0)
7✔
1413
      fatal_errno("bind");
×
1414

1415
   if (listen(sock, SOMAXCONN) < 0)
7✔
1416
      fatal_errno("listen");
×
1417

1418
   server_log(LOG_INFO, "listening on 127.0.0.1:%u", port);
7✔
1419

1420
   return sock;
7✔
1421
}
1422

1423
void start_server(server_kind_t kind, jit_factory_t make_jit,
7✔
1424
                  unit_registry_t *registry, tree_t top,
1425
                  server_ready_fn_t cb, void *arg, const char *init_cmd)
1426
{
1427
   static const server_proto_t *map[] = {
7✔
1428
      [SERVER_HTTP] = &http_protocol,
1429
      [SERVER_CXXRTL] = &cxxrtl_protocol
1430
   };
1431

1432
   debug_server_t *server = (*map[kind]->new_server)();
7✔
1433
   server->shell     = shell_new(make_jit, registry);
7✔
1434
   server->top       = top;
7✔
1435
   server->packetbuf = pb_new();
7✔
1436
   server->init_cmd  = init_cmd;
7✔
1437
   server->banner    = !opt_get_int(OPT_UNIT_TEST);
7✔
1438
   server->proto     = map[kind];
7✔
1439

1440
   shell_handler_t handler = {
7✔
1441
      .add_wave = add_wave_handler,
1442
      .signal_update = signal_update_handler,
1443
      .stderr_write = tunnel_output,
1444
      .stdout_write = tunnel_output,
1445
      .backchannel_write = tunnel_backchannel,
1446
      .start_sim = start_sim_handler,
1447
      .restart_sim = restart_sim_handler,
1448
      .quit_sim = quit_sim_handler,
1449
      .next_time_step = next_time_step_handler,
1450
      .context = server
1451
   };
1452
   shell_set_handler(server->shell, &handler);
7✔
1453

1454
   server->sock = open_server_socket();
7✔
1455

1456
   if (cb != NULL)
7✔
1457
      (*cb)(arg);
7✔
1458

1459
   for (;;) {
56✔
1460
      fd_set rfd, wfd, efd;
63✔
1461
      FD_ZERO(&rfd);
1,134✔
1462
      FD_ZERO(&wfd);
1,071✔
1463
      FD_ZERO(&efd);
1,071✔
1464

1465
      int max_fd = -1;
63✔
1466

1467
      if (server->sock != -1) {
63✔
1468
         FD_SET(server->sock, &rfd);
44✔
1469
         max_fd = MAX(max_fd, server->sock);
44✔
1470
      }
1471

1472
      const int proto_max = (*server->proto->fill_fd_set)(server, &rfd, &wfd);
63✔
1473
      max_fd = MAX(max_fd, proto_max);
63✔
1474

1475
      if (max_fd == -1)
63✔
1476
         break;
1477

1478
      struct timeval tv = {
56✔
1479
         .tv_sec = 1,
1480
         .tv_usec = 0
1481
      };
1482

1483
      if (select(max_fd + 1, &rfd, &wfd, &efd, &tv) == -1)
56✔
1484
         fatal_errno("select");
×
1485

1486
      if (server->sock != -1 && FD_ISSET(server->sock, &rfd))
56✔
1487
         handle_new_connection(server);
9✔
1488

1489
      (*server->proto->poll_sockets)(server, &rfd, &wfd);
56✔
1490

1491
      if (server->shutdown && server->sock != -1) {
56✔
1492
         server_log(LOG_INFO, "stopping server");
7✔
1493

1494
         closesocket(server->sock);
7✔
1495
         server->sock = -1;
7✔
1496

1497
         (*server->proto->shutdown)(server);
7✔
1498
      }
1499
   }
1500

1501
   assert(server->sock == -1);
7✔
1502

1503
   pb_free(server->packetbuf);
7✔
1504
   (*server->proto->free_server)(server);
7✔
1505
}
7✔
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2025 Coveralls, Inc