mirror of
https://github.com/curl/curl.git
synced 2025-04-12 16:20:35 +08:00
websocket: fix message send corruption
- Fix a bug in EAGAIN handling when sending frames that led to a corrupted last byte of the frame sent. - Restore sanity to curl_ws_send() behaviour: - Partial writes are reported as OK with the actual number of payload bytes sent. - CURLE_AGAIN is only returned when none of the payload bytes (or for 0-length frames, not all of the frame header bytes) could be sent. - curl_ws_send() now behaves like a common send() call. - Change 'ws-data' test client to allow concurrent send/recv operations and vary frame sizes and repeat count. - Add DEBUG env var CURL_WS_CHUNK_EAGAIN to simulate blocking after a chunk of an encoded websocket frame has been sent. - Add tests. Prior to this change data corruption may occur when sending websocket messages due to two bugs: 1) 3e64569a (precedes 8.10.0) caused a data corruption bug in the last byte of frame of large messages. 2) curl_ws_send had non-traditional send behavior and could return CURLE_AGAIN with bytes sent and expect the caller to adjust buffer and buflen in a subsequent call. That behavior was not documented. Reported-by: na-trium-144@users.noreply.github.com Fixes https://github.com/curl/curl/issues/15865 Fixes https://github.com/curl/curl/issues/15865#issuecomment-2569870144 Closes https://github.com/curl/curl/pull/15901
This commit is contained in:
parent
86f5653721
commit
02edae54e8
@ -130,6 +130,11 @@ greater. There is a number of debug levels, refer to *openldap.c* comments.
|
||||
Used to influence the buffer chunk size used for WebSocket encoding and
|
||||
decoding.
|
||||
|
||||
## CURL_WS_CHUNK_EAGAIN
|
||||
|
||||
Used to simulate blocking sends after this chunk size for WebSocket
|
||||
connections.
|
||||
|
||||
## CURL_FORBID_REUSE
|
||||
|
||||
Used to set the CURLOPT_FORBID_REUSE flag on each transfer initiated
|
||||
|
23
lib/bufq.c
23
lib/bufq.c
@ -45,11 +45,6 @@ static size_t chunk_len(const struct buf_chunk *chunk)
|
||||
return chunk->w_offset - chunk->r_offset;
|
||||
}
|
||||
|
||||
static size_t chunk_space(const struct buf_chunk *chunk)
|
||||
{
|
||||
return chunk->dlen - chunk->w_offset;
|
||||
}
|
||||
|
||||
static void chunk_reset(struct buf_chunk *chunk)
|
||||
{
|
||||
chunk->next = NULL;
|
||||
@ -287,24 +282,6 @@ size_t Curl_bufq_len(const struct bufq *q)
|
||||
return len;
|
||||
}
|
||||
|
||||
size_t Curl_bufq_space(const struct bufq *q)
|
||||
{
|
||||
size_t space = 0;
|
||||
if(q->tail)
|
||||
space += chunk_space(q->tail);
|
||||
if(q->spare) {
|
||||
struct buf_chunk *chunk = q->spare;
|
||||
while(chunk) {
|
||||
space += chunk->dlen;
|
||||
chunk = chunk->next;
|
||||
}
|
||||
}
|
||||
if(q->chunk_count < q->max_chunks) {
|
||||
space += (q->max_chunks - q->chunk_count) * q->chunk_size;
|
||||
}
|
||||
return space;
|
||||
}
|
||||
|
||||
bool Curl_bufq_is_empty(const struct bufq *q)
|
||||
{
|
||||
return !q->head || chunk_is_empty(q->head);
|
||||
|
@ -150,14 +150,6 @@ void Curl_bufq_free(struct bufq *q);
|
||||
*/
|
||||
size_t Curl_bufq_len(const struct bufq *q);
|
||||
|
||||
/**
|
||||
* Return the total amount of free space in the queue.
|
||||
* The returned length is the number of bytes that can
|
||||
* be expected to be written successfully to the bufq,
|
||||
* providing no memory allocations fail.
|
||||
*/
|
||||
size_t Curl_bufq_space(const struct bufq *q);
|
||||
|
||||
/**
|
||||
* Returns TRUE iff there is no data in the buffer queue.
|
||||
*/
|
||||
|
156
lib/ws.c
156
lib/ws.c
@ -1009,8 +1009,28 @@ static CURLcode ws_flush(struct Curl_easy *data, struct websocket *ws,
|
||||
CURLcode result;
|
||||
const unsigned char *out;
|
||||
size_t outlen, n;
|
||||
#ifdef DEBUGBUILD
|
||||
/* Simulate a blocking send after this chunk has been sent */
|
||||
bool eagain_next = FALSE;
|
||||
size_t chunk_egain = 0;
|
||||
char *p = getenv("CURL_WS_CHUNK_EAGAIN");
|
||||
if(p) {
|
||||
long l = strtol(p, NULL, 10);
|
||||
if(l > 0 && l <= (1*1024*1024)) {
|
||||
chunk_egain = (size_t)l;
|
||||
}
|
||||
}
|
||||
#endif
|
||||
|
||||
while(Curl_bufq_peek(&ws->sendbuf, &out, &outlen)) {
|
||||
#ifdef DEBUGBUILD
|
||||
if(eagain_next)
|
||||
return CURLE_AGAIN;
|
||||
if(chunk_egain && (outlen > chunk_egain)) {
|
||||
outlen = chunk_egain;
|
||||
eagain_next = TRUE;
|
||||
}
|
||||
#endif
|
||||
if(blocking) {
|
||||
result = ws_send_raw_blocking(data, ws, (char *)out, outlen);
|
||||
n = result ? 0 : outlen;
|
||||
@ -1119,15 +1139,15 @@ static CURLcode ws_send_raw(struct Curl_easy *data, const void *buffer,
|
||||
return result;
|
||||
}
|
||||
|
||||
CURL_EXTERN CURLcode curl_ws_send(CURL *d, const void *buffer,
|
||||
CURL_EXTERN CURLcode curl_ws_send(CURL *d, const void *buffer_arg,
|
||||
size_t buflen, size_t *sent,
|
||||
curl_off_t fragsize,
|
||||
unsigned int flags)
|
||||
{
|
||||
struct websocket *ws;
|
||||
const unsigned char *buffer = buffer_arg;
|
||||
ssize_t n;
|
||||
size_t space, payload_added;
|
||||
CURLcode result;
|
||||
CURLcode result = CURLE_OK;
|
||||
struct Curl_easy *data = d;
|
||||
|
||||
CURL_TRC_WS(data, "curl_ws_send(len=%zu, fragsize=%" FMT_OFF_T
|
||||
@ -1151,13 +1171,13 @@ CURL_EXTERN CURLcode curl_ws_send(CURL *d, const void *buffer,
|
||||
}
|
||||
ws = data->conn->proto.ws;
|
||||
|
||||
/* try flushing any content still waiting to be sent. */
|
||||
result = ws_flush(data, ws, FALSE);
|
||||
if(result)
|
||||
goto out;
|
||||
|
||||
if(data->set.ws_raw_mode) {
|
||||
/* In raw mode, we write directly to the connection */
|
||||
/* try flushing any content still waiting to be sent. */
|
||||
result = ws_flush(data, ws, FALSE);
|
||||
if(result)
|
||||
goto out;
|
||||
|
||||
if(fragsize || flags) {
|
||||
failf(data, "ws_send, raw mode: fragsize and flags cannot be non-zero");
|
||||
return CURLE_BAD_FUNCTION_ARGUMENT;
|
||||
@ -1167,87 +1187,87 @@ CURL_EXTERN CURLcode curl_ws_send(CURL *d, const void *buffer,
|
||||
}
|
||||
|
||||
/* Not RAW mode, buf we do the frame encoding */
|
||||
space = Curl_bufq_space(&ws->sendbuf);
|
||||
CURL_TRC_WS(data, "curl_ws_send(len=%zu), sendbuf=%zu space_left=%zu",
|
||||
buflen, Curl_bufq_len(&ws->sendbuf), space);
|
||||
if(space < 14) {
|
||||
result = CURLE_AGAIN;
|
||||
goto out;
|
||||
}
|
||||
|
||||
if(flags & CURLWS_OFFSET) {
|
||||
if(fragsize) {
|
||||
/* a frame series 'fragsize' bytes big, this is the first */
|
||||
n = ws_enc_write_head(data, &ws->enc, flags, fragsize,
|
||||
&ws->sendbuf, &result);
|
||||
if(n < 0)
|
||||
goto out;
|
||||
if(ws->enc.payload_remain || !Curl_bufq_is_empty(&ws->sendbuf)) {
|
||||
/* a frame is ongoing with payload buffered or more payload
|
||||
* that needs to be encoded into the buffer */
|
||||
if(buflen < ws->sendbuf_payload) {
|
||||
/* We have been called with LESS buffer data than before. This
|
||||
* is not how it's supposed too work. */
|
||||
failf(data, "curl_ws_send() called with smaller 'buflen' than "
|
||||
"bytes already buffered in previous call, %zu vs %zu",
|
||||
buflen, ws->sendbuf_payload);
|
||||
result = CURLE_BAD_FUNCTION_ARGUMENT;
|
||||
goto out;
|
||||
}
|
||||
else {
|
||||
if((curl_off_t)buflen > ws->enc.payload_remain) {
|
||||
infof(data, "WS: unaligned frame size (sending %zu instead of %"
|
||||
FMT_OFF_T ")",
|
||||
buflen, ws->enc.payload_remain);
|
||||
}
|
||||
if((curl_off_t)buflen >
|
||||
(ws->enc.payload_remain + (curl_off_t)ws->sendbuf_payload)) {
|
||||
/* too large buflen beyond payload length of frame */
|
||||
infof(data, "WS: unaligned frame size (sending %zu instead of %"
|
||||
FMT_OFF_T ")",
|
||||
buflen, ws->enc.payload_remain + ws->sendbuf_payload);
|
||||
result = CURLE_BAD_FUNCTION_ARGUMENT;
|
||||
goto out;
|
||||
}
|
||||
}
|
||||
else if(!ws->enc.payload_remain) {
|
||||
n = ws_enc_write_head(data, &ws->enc, flags, (curl_off_t)buflen,
|
||||
else {
|
||||
/* starting a new frame, we want a clean sendbuf */
|
||||
curl_off_t payload_len = (flags & CURLWS_OFFSET) ?
|
||||
fragsize : (curl_off_t)buflen;
|
||||
result = ws_flush(data, ws, Curl_is_in_callback(data));
|
||||
if(result)
|
||||
goto out;
|
||||
|
||||
n = ws_enc_write_head(data, &ws->enc, flags, payload_len,
|
||||
&ws->sendbuf, &result);
|
||||
if(n < 0)
|
||||
goto out;
|
||||
}
|
||||
|
||||
n = ws_enc_write_payload(&ws->enc, data,
|
||||
buffer, buflen, &ws->sendbuf, &result);
|
||||
if(n < 0)
|
||||
goto out;
|
||||
payload_added = (size_t)n;
|
||||
/* While there is either sendbuf to flush OR more payload to encode... */
|
||||
while(!Curl_bufq_is_empty(&ws->sendbuf) || (buflen > ws->sendbuf_payload)) {
|
||||
/* Try to add more payload to sendbuf */
|
||||
if(buflen > ws->sendbuf_payload) {
|
||||
size_t prev_len = Curl_bufq_len(&ws->sendbuf);
|
||||
n = ws_enc_write_payload(&ws->enc, data,
|
||||
buffer + ws->sendbuf_payload,
|
||||
buflen - ws->sendbuf_payload,
|
||||
&ws->sendbuf, &result);
|
||||
if(n < 0 && (result != CURLE_AGAIN))
|
||||
goto out;
|
||||
ws->sendbuf_payload += Curl_bufq_len(&ws->sendbuf) - prev_len;
|
||||
}
|
||||
|
||||
while(!result && (buflen || !Curl_bufq_is_empty(&ws->sendbuf))) {
|
||||
/* flush, blocking when in callback */
|
||||
result = ws_flush(data, ws, Curl_is_in_callback(data));
|
||||
if(!result) {
|
||||
DEBUGASSERT(payload_added <= buflen);
|
||||
/* all buffered data sent. Try sending the rest if there is any. */
|
||||
*sent += payload_added;
|
||||
buffer = (const char *)buffer + payload_added;
|
||||
buflen -= payload_added;
|
||||
payload_added = 0;
|
||||
if(buflen) {
|
||||
n = ws_enc_write_payload(&ws->enc, data,
|
||||
buffer, buflen, &ws->sendbuf, &result);
|
||||
if(n < 0)
|
||||
goto out;
|
||||
payload_added = Curl_bufq_len(&ws->sendbuf);
|
||||
}
|
||||
*sent += ws->sendbuf_payload;
|
||||
buffer += ws->sendbuf_payload;
|
||||
buflen -= ws->sendbuf_payload;
|
||||
ws->sendbuf_payload = 0;
|
||||
}
|
||||
else if(result == CURLE_AGAIN) {
|
||||
/* partially sent. how much of the call data has been part of it? what
|
||||
* should we report to out caller so it can retry/send the rest? */
|
||||
if(payload_added < buflen) {
|
||||
/* We did not add everything the caller wanted. Return just
|
||||
* the partial write to our buffer. */
|
||||
*sent = payload_added;
|
||||
if(ws->sendbuf_payload > Curl_bufq_len(&ws->sendbuf)) {
|
||||
/* blocked, part of payload bytes remain, report length
|
||||
* that we managed to send. */
|
||||
size_t flushed = (ws->sendbuf_payload - Curl_bufq_len(&ws->sendbuf));
|
||||
*sent += flushed;
|
||||
ws->sendbuf_payload -= flushed;
|
||||
result = CURLE_OK;
|
||||
goto out;
|
||||
}
|
||||
else if(!buflen) {
|
||||
/* We have no payload to report a partial write. EAGAIN would make
|
||||
* the caller repeat this and add the frame again.
|
||||
* Flush blocking seems the only way out of this. */
|
||||
*sent = (size_t)n;
|
||||
result = ws_flush(data, ws, TRUE);
|
||||
else {
|
||||
/* blocked before sending headers or 1st payload byte. We cannot report
|
||||
* OK on 0-length send (caller counts only payload) and EAGAIN */
|
||||
CURL_TRC_WS(data, "EAGAIN flushing sendbuf, payload_encoded: %zu/%zu",
|
||||
ws->sendbuf_payload, buflen);
|
||||
DEBUGASSERT(*sent == 0);
|
||||
result = CURLE_AGAIN;
|
||||
goto out;
|
||||
}
|
||||
/* We added the complete data to our sendbuf. Report one byte less as
|
||||
* sent. This partial success should make the caller invoke us again
|
||||
* with the last byte. */
|
||||
*sent = payload_added - 1;
|
||||
result = Curl_bufq_unwrite(&ws->sendbuf, 1);
|
||||
if(!result)
|
||||
result = CURLE_AGAIN;
|
||||
}
|
||||
else
|
||||
goto out; /* real error sending the data */
|
||||
}
|
||||
|
||||
out:
|
||||
|
3
lib/ws.h
3
lib/ws.h
@ -53,7 +53,7 @@ struct ws_encoder {
|
||||
unsigned int xori; /* xor index */
|
||||
unsigned char mask[4]; /* 32-bit mask for this connection */
|
||||
unsigned char firstbyte; /* first byte of frame we encode */
|
||||
bool contfragment; /* set TRUE if the previous fragment sent was not final */
|
||||
BIT(contfragment); /* set TRUE if the previous fragment sent was not final */
|
||||
};
|
||||
|
||||
/* A websocket connection with en- and decoder that treat frames
|
||||
@ -65,6 +65,7 @@ struct websocket {
|
||||
struct bufq recvbuf; /* raw data from the server */
|
||||
struct bufq sendbuf; /* raw data to be sent to the server */
|
||||
struct curl_ws_frame frame; /* the current WS FRAME received */
|
||||
size_t sendbuf_payload; /* number of payload bytes in sendbuf */
|
||||
};
|
||||
|
||||
CURLcode Curl_ws_request(struct Curl_easy *data, struct dynbuf *req);
|
||||
|
@ -26,14 +26,18 @@
|
||||
* </DESC>
|
||||
*/
|
||||
/* curl stuff */
|
||||
#include "curl_setup.h"
|
||||
#include <curl/curl.h>
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
|
||||
#ifndef CURL_DISABLE_WEBSOCKETS
|
||||
#if !defined(CURL_DISABLE_WEBSOCKETS) && !defined(_MSC_VER)
|
||||
|
||||
#ifndef _MSC_VER
|
||||
/* somewhat Unix-specific */
|
||||
#include <unistd.h> /* getopt() */
|
||||
#endif
|
||||
|
||||
#ifdef _WIN32
|
||||
#ifndef WIN32_LEAN_AND_MEAN
|
||||
@ -44,6 +48,7 @@
|
||||
#include <sys/time.h>
|
||||
#endif
|
||||
|
||||
|
||||
static
|
||||
void dump(const char *text, unsigned char *ptr, size_t size,
|
||||
char nohex)
|
||||
@ -93,86 +98,45 @@ void dump(const char *text, unsigned char *ptr, size_t size,
|
||||
}
|
||||
}
|
||||
|
||||
static CURLcode send_binary(CURL *curl, char *buf, size_t buflen)
|
||||
static CURLcode check_recv(const struct curl_ws_frame *frame,
|
||||
size_t r_offset, size_t nread, size_t exp_len)
|
||||
{
|
||||
size_t nwritten;
|
||||
CURLcode result =
|
||||
curl_ws_send(curl, buf, buflen, &nwritten, 0, CURLWS_BINARY);
|
||||
fprintf(stderr, "ws: send_binary(len=%ld) -> %d, %ld\n",
|
||||
(long)buflen, result, (long)nwritten);
|
||||
return result;
|
||||
if(!frame)
|
||||
return CURLE_OK;
|
||||
|
||||
if(frame->flags & CURLWS_CLOSE) {
|
||||
fprintf(stderr, "recv_data: unexpected CLOSE frame from server, "
|
||||
"got %ld bytes, offset=%ld, rflags %x\n",
|
||||
(long)nread, (long)r_offset, frame->flags);
|
||||
return CURLE_RECV_ERROR;
|
||||
}
|
||||
if(!r_offset && !(frame->flags & CURLWS_BINARY)) {
|
||||
fprintf(stderr, "recv_data: wrong frame, got %ld bytes, offset=%ld, "
|
||||
"rflags %x\n",
|
||||
(long)nread, (long)r_offset, frame->flags);
|
||||
return CURLE_RECV_ERROR;
|
||||
}
|
||||
if(frame->offset != (curl_off_t)r_offset) {
|
||||
fprintf(stderr, "recv_data: frame offset, expected %ld, got %ld\n",
|
||||
(long)r_offset, (long)frame->offset);
|
||||
return CURLE_RECV_ERROR;
|
||||
}
|
||||
if(frame->bytesleft != (curl_off_t)(exp_len - r_offset - nread)) {
|
||||
fprintf(stderr, "recv_data: frame bytesleft, expected %ld, got %ld\n",
|
||||
(long)(exp_len - r_offset - nread), (long)frame->bytesleft);
|
||||
return CURLE_RECV_ERROR;
|
||||
}
|
||||
if(r_offset + nread > exp_len) {
|
||||
fprintf(stderr, "recv_data: data length, expected %ld, now at %ld\n",
|
||||
(long)exp_len, (long)(r_offset + nread));
|
||||
return CURLE_RECV_ERROR;
|
||||
}
|
||||
return CURLE_OK;
|
||||
}
|
||||
|
||||
#if defined(__TANDEM)
|
||||
# include <cextdecs.h(PROCESS_DELAY_)>
|
||||
#endif
|
||||
static CURLcode recv_binary(CURL *curl, char *exp_data, size_t exp_len)
|
||||
{
|
||||
const struct curl_ws_frame *frame;
|
||||
char recvbuf[256];
|
||||
size_t r_offset, nread;
|
||||
CURLcode result;
|
||||
|
||||
fprintf(stderr, "recv_binary: expected payload %ld bytes\n", (long)exp_len);
|
||||
r_offset = 0;
|
||||
while(1) {
|
||||
result = curl_ws_recv(curl, recvbuf, sizeof(recvbuf), &nread, &frame);
|
||||
if(result == CURLE_AGAIN) {
|
||||
fprintf(stderr, "EAGAIN, sleep, try again\n");
|
||||
#ifdef _WIN32
|
||||
Sleep(100);
|
||||
#elif defined(__TANDEM)
|
||||
/* NonStop only defines usleep when building for a threading model */
|
||||
# if defined(_PUT_MODEL_) || defined(_KLT_MODEL_)
|
||||
usleep(100*1000);
|
||||
# else
|
||||
PROCESS_DELAY_(100*1000);
|
||||
# endif
|
||||
#else
|
||||
usleep(100*1000);
|
||||
#endif
|
||||
continue;
|
||||
}
|
||||
fprintf(stderr, "ws: curl_ws_recv(offset=%ld, len=%ld) -> %d, %ld\n",
|
||||
(long)r_offset, (long)sizeof(recvbuf), result, (long)nread);
|
||||
if(result) {
|
||||
return result;
|
||||
}
|
||||
if(!(frame->flags & CURLWS_BINARY)) {
|
||||
fprintf(stderr, "recv_data: wrong frame, got %ld bytes rflags %x\n",
|
||||
(long)nread, frame->flags);
|
||||
return CURLE_RECV_ERROR;
|
||||
}
|
||||
if(frame->offset != (curl_off_t)r_offset) {
|
||||
fprintf(stderr, "recv_data: frame offset, expected %ld, got %ld\n",
|
||||
(long)r_offset, (long)frame->offset);
|
||||
return CURLE_RECV_ERROR;
|
||||
}
|
||||
if(frame->bytesleft != (curl_off_t)(exp_len - r_offset - nread)) {
|
||||
fprintf(stderr, "recv_data: frame bytesleft, expected %ld, got %ld\n",
|
||||
(long)(exp_len - r_offset - nread), (long)frame->bytesleft);
|
||||
return CURLE_RECV_ERROR;
|
||||
}
|
||||
if(r_offset + nread > exp_len) {
|
||||
fprintf(stderr, "recv_data: data length, expected %ld, now at %ld\n",
|
||||
(long)exp_len, (long)(r_offset + nread));
|
||||
return CURLE_RECV_ERROR;
|
||||
}
|
||||
if(memcmp(exp_data + r_offset, recvbuf, nread)) {
|
||||
fprintf(stderr, "recv_data: data differs, offset=%ld, len=%ld\n",
|
||||
(long)r_offset, (long)nread);
|
||||
dump("expected:", (unsigned char *)exp_data + r_offset, nread, 0);
|
||||
dump("received:", (unsigned char *)recvbuf, nread, 0);
|
||||
return CURLE_RECV_ERROR;
|
||||
}
|
||||
r_offset += nread;
|
||||
if(r_offset >= exp_len) {
|
||||
fprintf(stderr, "recv_data: frame complete\n");
|
||||
break;
|
||||
}
|
||||
}
|
||||
return CURLE_OK;
|
||||
}
|
||||
|
||||
/* just close the connection */
|
||||
static void websocket_close(CURL *curl)
|
||||
@ -184,73 +148,175 @@ static void websocket_close(CURL *curl)
|
||||
"ws: curl_ws_send returned %u, sent %u\n", (int)result, (int)sent);
|
||||
}
|
||||
|
||||
static CURLcode data_echo(CURL *curl, size_t plen_min, size_t plen_max)
|
||||
static CURLcode data_echo(CURL *curl, size_t count,
|
||||
size_t plen_min, size_t plen_max)
|
||||
{
|
||||
CURLcode res = CURLE_OK;
|
||||
CURLcode r = CURLE_OK;
|
||||
const struct curl_ws_frame *frame;
|
||||
size_t len;
|
||||
char *send_buf;
|
||||
size_t i;
|
||||
char *send_buf = NULL, *recv_buf = NULL;
|
||||
size_t i, scount = count, rcount = count;
|
||||
int rblock, sblock;
|
||||
|
||||
send_buf = calloc(1, plen_max + 1);
|
||||
recv_buf = calloc(1, plen_max + 1);
|
||||
if(!send_buf || !recv_buf) {
|
||||
r = CURLE_OUT_OF_MEMORY;
|
||||
goto out;
|
||||
}
|
||||
|
||||
send_buf = calloc(1, plen_max);
|
||||
if(!send_buf)
|
||||
return CURLE_OUT_OF_MEMORY;
|
||||
for(i = 0; i < plen_max; ++i) {
|
||||
send_buf[i] = (char)('0' + ((int)i % 10));
|
||||
}
|
||||
|
||||
for(len = plen_min; len <= plen_max; ++len) {
|
||||
res = send_binary(curl, send_buf, len);
|
||||
if(res)
|
||||
goto out;
|
||||
res = recv_binary(curl, send_buf, len);
|
||||
if(res) {
|
||||
fprintf(stderr, "recv_data(len=%ld) -> %d\n", (long)len, res);
|
||||
size_t nwritten, nread, slen = len, rlen = len;
|
||||
char *sbuf = send_buf, *rbuf = recv_buf;
|
||||
|
||||
memset(recv_buf, 0, plen_max);
|
||||
while(slen || rlen || scount || rcount) {
|
||||
sblock = rblock = 1;
|
||||
if(slen) {
|
||||
r = curl_ws_send(curl, sbuf, slen, &nwritten, 0, CURLWS_BINARY);
|
||||
sblock = (r == CURLE_AGAIN);
|
||||
if(!r || (r == CURLE_AGAIN)) {
|
||||
fprintf(stderr, "curl_ws_send(len=%ld) -> %d, %ld (%ld/%ld)\n",
|
||||
(long)slen, r, (long)nwritten,
|
||||
(long)(len - slen), (long)len);
|
||||
sbuf += nwritten;
|
||||
slen -= nwritten;
|
||||
}
|
||||
else
|
||||
goto out;
|
||||
}
|
||||
if(!slen && scount) { /* go again? */
|
||||
scount--;
|
||||
sbuf = send_buf;
|
||||
slen = len;
|
||||
}
|
||||
|
||||
if(rlen) {
|
||||
size_t max_recv = (64 * 1024);
|
||||
r = curl_ws_recv(curl, rbuf, (rlen > max_recv) ? max_recv : rlen,
|
||||
&nread, &frame);
|
||||
if(!r || (r == CURLE_AGAIN)) {
|
||||
rblock = (r == CURLE_AGAIN);
|
||||
fprintf(stderr, "curl_ws_recv(len=%ld) -> %d, %ld (%ld/%ld) \n",
|
||||
(long)rlen, r, (long)nread, (long)(len - rlen), (long)len);
|
||||
if(!r) {
|
||||
r = check_recv(frame, len - rlen, nread, len);
|
||||
if(r)
|
||||
goto out;
|
||||
}
|
||||
rbuf += nread;
|
||||
rlen -= nread;
|
||||
}
|
||||
else
|
||||
goto out;
|
||||
}
|
||||
if(!rlen && rcount) { /* go again? */
|
||||
rcount--;
|
||||
rbuf = recv_buf;
|
||||
rlen = len;
|
||||
}
|
||||
|
||||
if(rblock && sblock) {
|
||||
fprintf(stderr, "EAGAIN, sleep, try again\n");
|
||||
#ifdef _WIN32
|
||||
Sleep(100);
|
||||
#elif defined(__TANDEM)
|
||||
/* NonStop only defines usleep when building for a threading model */
|
||||
# if defined(_PUT_MODEL_) || defined(_KLT_MODEL_)
|
||||
usleep(100*1000);
|
||||
# else
|
||||
PROCESS_DELAY_(100*1000);
|
||||
# endif
|
||||
#else
|
||||
usleep(100*1000);
|
||||
#endif
|
||||
}
|
||||
}
|
||||
|
||||
if(memcmp(send_buf, recv_buf, len)) {
|
||||
fprintf(stderr, "recv_data: data differs\n");
|
||||
dump("expected:", (unsigned char *)send_buf, len, 0);
|
||||
dump("received:", (unsigned char *)recv_buf, len, 0);
|
||||
r = CURLE_RECV_ERROR;
|
||||
goto out;
|
||||
}
|
||||
}
|
||||
|
||||
out:
|
||||
if(!res)
|
||||
if(!r)
|
||||
websocket_close(curl);
|
||||
free(send_buf);
|
||||
return res;
|
||||
free(recv_buf);
|
||||
return r;
|
||||
}
|
||||
|
||||
static void usage(const char *msg)
|
||||
{
|
||||
if(msg)
|
||||
fprintf(stderr, "%s\n", msg);
|
||||
fprintf(stderr,
|
||||
"usage: [options] url\n"
|
||||
" -m number minimum frame size\n"
|
||||
" -M number maximum frame size\n"
|
||||
);
|
||||
}
|
||||
|
||||
#endif
|
||||
|
||||
int main(int argc, char *argv[])
|
||||
{
|
||||
#ifndef CURL_DISABLE_WEBSOCKETS
|
||||
#if !defined(CURL_DISABLE_WEBSOCKETS) && !defined(_MSC_VER)
|
||||
CURL *curl;
|
||||
CURLcode res = CURLE_OK;
|
||||
const char *url;
|
||||
long l1, l2;
|
||||
size_t plen_min, plen_max;
|
||||
size_t plen_min = 0, plen_max = 0, count = 1;
|
||||
int ch;
|
||||
|
||||
while((ch = getopt(argc, argv, "c:hm:M:")) != -1) {
|
||||
switch(ch) {
|
||||
case 'h':
|
||||
usage(NULL);
|
||||
res = CURLE_BAD_FUNCTION_ARGUMENT;
|
||||
goto cleanup;
|
||||
case 'c':
|
||||
count = (size_t)strtol(optarg, NULL, 10);
|
||||
break;
|
||||
case 'm':
|
||||
plen_min = (size_t)strtol(optarg, NULL, 10);
|
||||
break;
|
||||
case 'M':
|
||||
plen_max = (size_t)strtol(optarg, NULL, 10);
|
||||
break;
|
||||
default:
|
||||
usage("invalid option");
|
||||
res = CURLE_BAD_FUNCTION_ARGUMENT;
|
||||
goto cleanup;
|
||||
}
|
||||
}
|
||||
argc -= optind;
|
||||
argv += optind;
|
||||
|
||||
if(!plen_max)
|
||||
plen_max = plen_min;
|
||||
|
||||
if(argc != 4) {
|
||||
fprintf(stderr, "usage: ws-data url minlen maxlen\n");
|
||||
return 2;
|
||||
}
|
||||
url = argv[1];
|
||||
l1 = strtol(argv[2], NULL, 10);
|
||||
if(l1 < 0) {
|
||||
fprintf(stderr, "minlen must be >= 0, got %ld\n", l1);
|
||||
return 2;
|
||||
}
|
||||
l2 = strtol(argv[3], NULL, 10);
|
||||
if(l2 < 0) {
|
||||
fprintf(stderr, "maxlen must be >= 0, got %ld\n", l2);
|
||||
return 2;
|
||||
}
|
||||
plen_min = l1;
|
||||
plen_max = l2;
|
||||
if(plen_max < plen_min) {
|
||||
fprintf(stderr, "maxlen must be >= minlen, got %ld-%ld\n",
|
||||
(long)plen_min, (long)plen_max);
|
||||
return 2;
|
||||
res = CURLE_BAD_FUNCTION_ARGUMENT;
|
||||
goto cleanup;
|
||||
}
|
||||
|
||||
if(argc != 1) {
|
||||
usage(NULL);
|
||||
res = CURLE_BAD_FUNCTION_ARGUMENT;
|
||||
goto cleanup;
|
||||
}
|
||||
url = argv[0];
|
||||
|
||||
curl_global_init(CURL_GLOBAL_ALL);
|
||||
|
||||
curl = curl_easy_init();
|
||||
@ -264,11 +330,13 @@ int main(int argc, char *argv[])
|
||||
res = curl_easy_perform(curl);
|
||||
fprintf(stderr, "curl_easy_perform() returned %u\n", (int)res);
|
||||
if(res == CURLE_OK)
|
||||
res = data_echo(curl, plen_min, plen_max);
|
||||
res = data_echo(curl, count, plen_min, plen_max);
|
||||
|
||||
/* always cleanup */
|
||||
curl_easy_cleanup(curl);
|
||||
}
|
||||
|
||||
cleanup:
|
||||
curl_global_cleanup();
|
||||
return (int)res;
|
||||
|
||||
|
@ -103,40 +103,51 @@ class TestWebsockets:
|
||||
r = client.run(args=[url, payload])
|
||||
r.check_exit_code(56)
|
||||
|
||||
# the python websocket server does not like 'large' control frames
|
||||
def test_20_04_data_small(self, env: Env, ws_echo, repeat):
|
||||
client = LocalClient(env=env, name='ws-data')
|
||||
if not client.exists():
|
||||
pytest.skip(f'example client not built: {client.name}')
|
||||
url = f'ws://localhost:{env.ws_port}/'
|
||||
r = client.run(args=[url, str(0), str(10)])
|
||||
r = client.run(args=['-m', str(0), '-M', str(10), url])
|
||||
r.check_exit_code(0)
|
||||
|
||||
# the python websocket server does not like 'large' control frames
|
||||
def test_20_05_data_med(self, env: Env, ws_echo, repeat):
|
||||
client = LocalClient(env=env, name='ws-data')
|
||||
if not client.exists():
|
||||
pytest.skip(f'example client not built: {client.name}')
|
||||
url = f'ws://localhost:{env.ws_port}/'
|
||||
r = client.run(args=[url, str(120), str(130)])
|
||||
r = client.run(args=['-m', str(120), '-M', str(130), url])
|
||||
r.check_exit_code(0)
|
||||
|
||||
# the python websocket server does not like 'large' control frames
|
||||
def test_20_06_data_large(self, env: Env, ws_echo, repeat):
|
||||
client = LocalClient(env=env, name='ws-data')
|
||||
if not client.exists():
|
||||
pytest.skip(f'example client not built: {client.name}')
|
||||
url = f'ws://localhost:{env.ws_port}/'
|
||||
r = client.run(args=[url, str(65535 - 5), str(65535 + 5)])
|
||||
r = client.run(args=['-m', str(65535 - 5), '-M', str(65535 + 5), url])
|
||||
r.check_exit_code(0)
|
||||
|
||||
# the python websocket server does not like 'large' control frames
|
||||
def test_20_07_data_large_small_recv(self, env: Env, ws_echo, repeat):
|
||||
client = LocalClient(env=env, name='ws-data', run_env={
|
||||
'CURL_WS_CHUNK_SIZE': '1024',
|
||||
})
|
||||
run_env = os.environ.copy()
|
||||
run_env['CURL_WS_CHUNK_SIZE'] = '1024'
|
||||
client = LocalClient(env=env, name='ws-data', run_env=run_env)
|
||||
if not client.exists():
|
||||
pytest.skip(f'example client not built: {client.name}')
|
||||
url = f'ws://localhost:{env.ws_port}/'
|
||||
r = client.run(args=[url, str(65535 - 5), str(65535 + 5)])
|
||||
r = client.run(args=['-m', str(65535 - 5), '-M', str(65535 + 5), url])
|
||||
r.check_exit_code(0)
|
||||
|
||||
# Send large frames and simulate send blocking on 8192 bytes chunks
|
||||
# Simlates error reported in #15865
|
||||
def test_20_08_data_very_large(self, env: Env, ws_echo, repeat):
|
||||
run_env = os.environ.copy()
|
||||
run_env['CURL_WS_CHUNK_EAGAIN'] = '8192'
|
||||
client = LocalClient(env=env, name='ws-data', run_env=run_env)
|
||||
if not client.exists():
|
||||
pytest.skip(f'example client not built: {client.name}')
|
||||
url = f'ws://localhost:{env.ws_port}/'
|
||||
count = 10
|
||||
large = 512 * 1024
|
||||
large = 20000
|
||||
r = client.run(args=['-c', str(count), '-m', str(large), url])
|
||||
r.check_exit_code(0)
|
||||
|
Loading…
x
Reference in New Issue
Block a user