2019-10-15 09:27:47 +00:00
|
|
|
from __future__ import print_function
|
|
|
|
from __future__ import unicode_literals
|
2019-06-20 07:37:40 +00:00
|
|
|
import re
|
|
|
|
import os
|
2019-10-15 09:27:47 +00:00
|
|
|
import socket
|
2019-11-14 10:09:38 +00:00
|
|
|
import select
|
2019-10-15 09:27:47 +00:00
|
|
|
import hashlib
|
|
|
|
import base64
|
2019-11-14 10:09:38 +00:00
|
|
|
import queue
|
|
|
|
import random
|
|
|
|
import string
|
|
|
|
from threading import Thread, Event
|
2019-11-27 03:58:07 +00:00
|
|
|
import ttfw_idf
|
2019-06-20 07:37:40 +00:00
|
|
|
|
|
|
|
|
2019-10-15 09:27:47 +00:00
|
|
|
def get_my_ip():
|
|
|
|
s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
|
|
|
|
try:
|
|
|
|
# doesn't even have to be reachable
|
|
|
|
s.connect(('10.255.255.255', 1))
|
|
|
|
IP = s.getsockname()[0]
|
|
|
|
except Exception:
|
|
|
|
IP = '127.0.0.1'
|
|
|
|
finally:
|
|
|
|
s.close()
|
|
|
|
return IP
|
|
|
|
|
|
|
|
|
|
|
|
# Simple Websocket server for testing purposes
|
|
|
|
class Websocket:
|
|
|
|
HEADER_LEN = 6
|
|
|
|
|
|
|
|
def __init__(self, port):
|
|
|
|
self.port = port
|
|
|
|
self.socket = socket.socket()
|
2019-11-14 10:09:38 +00:00
|
|
|
self.socket.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)
|
2019-10-15 09:27:47 +00:00
|
|
|
self.socket.settimeout(10.0)
|
2019-11-14 10:09:38 +00:00
|
|
|
self.send_q = queue.Queue()
|
|
|
|
self.shutdown = Event()
|
2019-10-15 09:27:47 +00:00
|
|
|
|
|
|
|
def __enter__(self):
|
|
|
|
try:
|
|
|
|
self.socket.bind(('', self.port))
|
|
|
|
except socket.error as e:
|
|
|
|
print("Bind failed:{}".format(e))
|
|
|
|
raise
|
|
|
|
|
|
|
|
self.socket.listen(1)
|
|
|
|
self.server_thread = Thread(target=self.run_server)
|
|
|
|
self.server_thread.start()
|
|
|
|
|
2019-11-14 10:09:38 +00:00
|
|
|
return self
|
|
|
|
|
2019-10-15 09:27:47 +00:00
|
|
|
def __exit__(self, exc_type, exc_value, traceback):
|
2019-11-14 10:09:38 +00:00
|
|
|
self.shutdown.set()
|
2019-10-15 09:27:47 +00:00
|
|
|
self.server_thread.join()
|
|
|
|
self.socket.close()
|
|
|
|
self.conn.close()
|
|
|
|
|
|
|
|
def run_server(self):
|
|
|
|
self.conn, address = self.socket.accept() # accept new connection
|
2019-11-14 10:09:38 +00:00
|
|
|
self.socket.settimeout(10.0)
|
|
|
|
|
2019-10-15 09:27:47 +00:00
|
|
|
print("Connection from: {}".format(address))
|
|
|
|
|
|
|
|
self.establish_connection()
|
2019-11-14 10:09:38 +00:00
|
|
|
print("WS established")
|
|
|
|
# Handle connection until client closes it, will echo any data received and send data from send_q queue
|
|
|
|
self.handle_conn()
|
2019-10-15 09:27:47 +00:00
|
|
|
|
|
|
|
def establish_connection(self):
|
2019-11-14 10:09:38 +00:00
|
|
|
while not self.shutdown.is_set():
|
2019-10-15 09:27:47 +00:00
|
|
|
try:
|
|
|
|
# receive data stream. it won't accept data packet greater than 1024 bytes
|
|
|
|
data = self.conn.recv(1024).decode()
|
|
|
|
if not data:
|
|
|
|
# exit if data is not received
|
|
|
|
raise
|
|
|
|
|
|
|
|
if "Upgrade: websocket" in data and "Connection: Upgrade" in data:
|
|
|
|
self.handshake(data)
|
|
|
|
return
|
2019-11-14 10:09:38 +00:00
|
|
|
|
2019-10-15 09:27:47 +00:00
|
|
|
except socket.error as err:
|
|
|
|
print("Unable to establish a websocket connection: {}, {}".format(err))
|
|
|
|
raise
|
|
|
|
|
|
|
|
def handshake(self, data):
|
|
|
|
# Magic string from RFC
|
|
|
|
MAGIC_STRING = "258EAFA5-E914-47DA-95CA-C5AB0DC85B11"
|
|
|
|
headers = data.split("\r\n")
|
|
|
|
|
|
|
|
for header in headers:
|
|
|
|
if "Sec-WebSocket-Key" in header:
|
|
|
|
client_key = header.split()[1]
|
|
|
|
|
|
|
|
if client_key:
|
|
|
|
resp_key = client_key + MAGIC_STRING
|
|
|
|
resp_key = base64.standard_b64encode(hashlib.sha1(resp_key.encode()).digest())
|
|
|
|
|
|
|
|
resp = "HTTP/1.1 101 Switching Protocols\r\n" + \
|
|
|
|
"Upgrade: websocket\r\n" + \
|
|
|
|
"Connection: Upgrade\r\n" + \
|
|
|
|
"Sec-WebSocket-Accept: {}\r\n\r\n".format(resp_key.decode())
|
|
|
|
|
|
|
|
self.conn.send(resp.encode())
|
|
|
|
|
2019-11-14 10:09:38 +00:00
|
|
|
def handle_conn(self):
|
|
|
|
while not self.shutdown.is_set():
|
|
|
|
r,w,e = select.select([self.conn], [], [], 1)
|
2019-10-15 09:27:47 +00:00
|
|
|
try:
|
2019-11-14 10:09:38 +00:00
|
|
|
if self.conn in r:
|
|
|
|
self.echo_data()
|
2019-10-15 09:27:47 +00:00
|
|
|
|
2019-11-14 10:09:38 +00:00
|
|
|
if not self.send_q.empty():
|
|
|
|
self._send_data_(self.send_q.get())
|
2019-10-15 09:27:47 +00:00
|
|
|
|
|
|
|
except socket.error as err:
|
|
|
|
print("Stopped echoing data: {}".format(err))
|
2019-11-14 10:09:38 +00:00
|
|
|
raise
|
|
|
|
|
|
|
|
def echo_data(self):
|
|
|
|
header = bytearray(self.conn.recv(self.HEADER_LEN, socket.MSG_WAITALL))
|
|
|
|
if not header:
|
|
|
|
# exit if socket closed by peer
|
|
|
|
return
|
|
|
|
|
|
|
|
# Remove mask bit
|
|
|
|
payload_len = ~(1 << 7) & header[1]
|
|
|
|
|
|
|
|
payload = bytearray(self.conn.recv(payload_len, socket.MSG_WAITALL))
|
|
|
|
|
|
|
|
if not payload:
|
|
|
|
# exit if socket closed by peer
|
|
|
|
return
|
|
|
|
frame = header + payload
|
|
|
|
|
|
|
|
decoded_payload = self.decode_frame(frame)
|
|
|
|
print("Sending echo...")
|
|
|
|
self._send_data_(decoded_payload)
|
|
|
|
|
|
|
|
def _send_data_(self, data):
|
|
|
|
frame = self.encode_frame(data)
|
|
|
|
self.conn.send(frame)
|
|
|
|
|
|
|
|
def send_data(self, data):
|
|
|
|
self.send_q.put(data.encode())
|
2019-10-15 09:27:47 +00:00
|
|
|
|
|
|
|
def decode_frame(self, frame):
|
|
|
|
# Mask out MASK bit from payload length, this len is only valid for short messages (<126)
|
|
|
|
payload_len = ~(1 << 7) & frame[1]
|
|
|
|
|
|
|
|
mask = frame[2:self.HEADER_LEN]
|
|
|
|
|
|
|
|
encrypted_payload = frame[self.HEADER_LEN:self.HEADER_LEN + payload_len]
|
|
|
|
payload = bytearray()
|
|
|
|
|
|
|
|
for i in range(payload_len):
|
|
|
|
payload.append(encrypted_payload[i] ^ mask[i % 4])
|
|
|
|
|
|
|
|
return payload
|
|
|
|
|
|
|
|
def encode_frame(self, payload):
|
|
|
|
# Set FIN = 1 and OP_CODE = 1 (text)
|
|
|
|
header = (1 << 7) | (1 << 0)
|
|
|
|
|
2019-11-14 10:09:38 +00:00
|
|
|
frame = bytearray([header])
|
|
|
|
payload_len = len(payload)
|
|
|
|
|
|
|
|
# If payload len is longer than 125 then the next 16 bits are used to encode length
|
|
|
|
if payload_len > 125:
|
|
|
|
frame.append(126)
|
|
|
|
frame.append(payload_len >> 8)
|
|
|
|
frame.append(0xFF & payload_len)
|
|
|
|
|
|
|
|
else:
|
|
|
|
frame.append(payload_len)
|
|
|
|
|
2019-10-15 09:27:47 +00:00
|
|
|
frame += payload
|
|
|
|
|
|
|
|
return frame
|
|
|
|
|
|
|
|
|
|
|
|
def test_echo(dut):
|
|
|
|
dut.expect("WEBSOCKET_EVENT_CONNECTED")
|
|
|
|
for i in range(0, 10):
|
2019-11-14 10:09:38 +00:00
|
|
|
dut.expect(re.compile(r"Received=hello (\d)"), timeout=30)
|
|
|
|
print("All echos received")
|
|
|
|
|
|
|
|
|
|
|
|
def test_recv_long_msg(dut, websocket, msg_len, repeats):
|
|
|
|
send_msg = ''.join(random.choice(string.ascii_uppercase + string.ascii_lowercase + string.digits) for _ in range(msg_len))
|
|
|
|
|
|
|
|
for _ in range(repeats):
|
|
|
|
websocket.send_data(send_msg)
|
|
|
|
|
|
|
|
recv_msg = ''
|
|
|
|
while len(recv_msg) < msg_len:
|
|
|
|
# Filter out color encoding
|
|
|
|
match = dut.expect(re.compile(r"Received=([a-zA-Z0-9]*).*\n"), timeout=30)[0]
|
|
|
|
recv_msg += match
|
|
|
|
|
|
|
|
if recv_msg == send_msg:
|
|
|
|
print("Sent message and received message are equal")
|
|
|
|
else:
|
|
|
|
raise ValueError("DUT received string do not match sent string, \nexpected: {}\nwith length {}\
|
|
|
|
\nreceived: {}\nwith length {}".format(send_msg, len(send_msg), recv_msg, len(recv_msg)))
|
2019-10-15 09:27:47 +00:00
|
|
|
|
|
|
|
|
|
|
|
@ttfw_idf.idf_example_test(env_tag="Example_WIFI")
|
2019-06-20 07:37:40 +00:00
|
|
|
def test_examples_protocol_websocket(env, extra_data):
|
|
|
|
"""
|
2019-10-15 09:27:47 +00:00
|
|
|
steps:
|
2019-06-20 07:37:40 +00:00
|
|
|
1. join AP
|
2019-10-15 09:27:47 +00:00
|
|
|
2. connect to uri specified in the config
|
2019-06-20 07:37:40 +00:00
|
|
|
3. send and receive data
|
|
|
|
"""
|
2019-11-27 03:58:07 +00:00
|
|
|
dut1 = env.get_dut("websocket", "examples/protocols/websocket", dut_class=ttfw_idf.ESP32DUT)
|
2019-06-20 07:37:40 +00:00
|
|
|
# check and log bin size
|
|
|
|
binary_file = os.path.join(dut1.app.binary_path, "websocket-example.bin")
|
|
|
|
bin_size = os.path.getsize(binary_file)
|
2019-11-27 03:58:07 +00:00
|
|
|
ttfw_idf.log_performance("websocket_bin_size", "{}KB".format(bin_size // 1024))
|
|
|
|
ttfw_idf.check_performance("websocket_bin_size", bin_size // 1024)
|
2019-10-15 09:27:47 +00:00
|
|
|
|
|
|
|
try:
|
|
|
|
if "CONFIG_WEBSOCKET_URI_FROM_STDIN" in dut1.app.get_sdkconfig():
|
|
|
|
uri_from_stdin = True
|
|
|
|
else:
|
|
|
|
uri = dut1.app.get_sdkconfig()["CONFIG_WEBSOCKET_URI"].strip('"')
|
|
|
|
uri_from_stdin = False
|
|
|
|
|
|
|
|
except Exception:
|
|
|
|
print('ENV_TEST_FAILURE: Cannot find uri settings in sdkconfig')
|
|
|
|
raise
|
|
|
|
|
2019-06-20 07:37:40 +00:00
|
|
|
# start test
|
|
|
|
dut1.start_app()
|
2019-10-15 09:27:47 +00:00
|
|
|
|
|
|
|
if uri_from_stdin:
|
|
|
|
server_port = 4455
|
2019-11-14 10:09:38 +00:00
|
|
|
with Websocket(server_port) as ws:
|
2019-10-15 09:27:47 +00:00
|
|
|
uri = "ws://{}:{}".format(get_my_ip(), server_port)
|
|
|
|
print("DUT connecting to {}".format(uri))
|
|
|
|
dut1.expect("Please enter uri of websocket endpoint", timeout=30)
|
|
|
|
dut1.write(uri)
|
|
|
|
test_echo(dut1)
|
2019-11-14 10:09:38 +00:00
|
|
|
# Message length should exceed DUT's buffer size to test fragmentation, default is 1024 byte
|
|
|
|
test_recv_long_msg(dut1, ws, 2000, 3)
|
2019-10-15 09:27:47 +00:00
|
|
|
|
|
|
|
else:
|
|
|
|
print("DUT connecting to {}".format(uri))
|
|
|
|
test_echo(dut1)
|
2019-06-20 07:37:40 +00:00
|
|
|
|
|
|
|
|
|
|
|
if __name__ == '__main__':
|
|
|
|
test_examples_protocol_websocket()
|