summaryrefslogtreecommitdiffstats
path: root/src/api.c
blob: 70bae66d43bb6dff542fda9e94d3560ec8f51ba0 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
#define DC_LOGIN_FORMAT "{\"login\":\"%s\",\"password\":\"%s\",\"undelete\":false,\"captcha_key\":null,\"login_source\":null,\"gift_code_sku_id\":null}"
#define DC_USER_AGENT "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.131 Safari/537.36"
#define DC_SERVER_ADDRESS "discord.com"
#define DC_SERVER_PORT 443
#define DC_SERVER_SSL 1
#define DC_SERVER_ORIGIN "https://discord.com"
#define DC_API_PREFIX "/api/v9/"
#define DC_LWS_ABLE_TO_PARSE_HEADERS 1
/* libwebsockets information: libwebsockets works with event loops and discord.c primary targets debian for building (it must work on debian), but debian does not ship libwebsockets with glib or libevent event loop support, so loops are implemented in the classic poll() style. this reduces performance probably. if you use discord.c API with support for a platform specific event loop, you may rewrite LWS to do things differently. currently calls into API (dc_api_i and dc_api_o) will both do LWS stuff. */
void dc_api_stack (struct dc_api_io i) { /* stack output struct to be delivered via dc_api_o 2usr */
	DC_MR(i.program->api_ios);
	i.program->api_ios[i.program->api_ios_length] = malloc(sizeof(i));
	*(i.program->api_ios[i.program->api_ios_length++]) = i;
	return;
}
static int dc_lws_cb (struct lws * wsi, enum lws_callback_reasons rs, void * us, void * in, size_t len) {
	struct dc_lws_pass * pass = (struct dc_lws_pass *) us;
	switch (rs) {
		case LWS_CALLBACK_CLIENT_CONNECTION_ERROR: /* TODO: handle and report somehow */
			lwsl_err("CLIENT_CONNECTION_ERROR: %s\n", in ? (char *) in : "(null)");
			break;
		case LWS_CALLBACK_CLIENT_APPEND_HANDSHAKE_HEADER: /* lws gives us len space after *in */
			;
			unsigned char ** p = (unsigned char **) in, * end = (*p)+len;
			for (int i = 0; i < DC_LWS_HEADERS_LENGTH; i++)
				if (pass->headers[i][0])
					if (lws_add_http_header_by_name(wsi, (const unsigned char *) dc_lws_headers[i], (const unsigned char *) pass->headers[i], strlen(pass->headers[i]), p, end))
						return -1;
			char slen[32];
			snprintf(slen, 32, "%u", pass->body_length);
			if (lws_add_http_header_by_name(wsi, (const unsigned char *) "Content-Length:", (const unsigned char *) slen, strlen(slen), p, end))
				return -1;
			if (!lws_http_is_redirected_to_get(wsi)) {
				lwsl_user("doing POST flow\n");
				lws_client_http_body_pending(wsi, 1);
				lws_callback_on_writable(wsi);
			} else
				lwsl_user("doing GET flow, got redirected - this is a bug, report!\n");
			break;
		case LWS_CALLBACK_CLIENT_HTTP_WRITEABLE: /* see minimal post example on how to send */
			if (lws_http_is_redirected_to_get(wsi)) {
				fprintf(stderr, "http is redirected to get\n");
				break;	/* for setting avatar pictures or uploading files. Yecch */
			}
			fprintf(stderr, "LWS_CALLBACK_CLIENT_HTTP_WRITABLE, %d\n", pass->api_io.status);
			if (lws_write(wsi, (unsigned char *) pass->body, pass->body_length, LWS_WRITE_HTTP_FINAL) != (int) pass->body_length) { /* TODO: fix to allow sending large bodies */
				fprintf(stderr, "lws_write can't write that much!\n");
				return 1;
			}
			lws_client_http_body_pending(wsi, 0);
			if (pass->api_io.status & DC_MUST_FREE)
				free(pass->body);
			pass->body = NULL;
			pass->body_length = 0;
			break;
		case LWS_CALLBACK_ESTABLISHED_CLIENT_HTTP:
			pass->status = lws_http_client_http_response(wsi); /* 200 OK, 404 Not Found,...*/
			fprintf(stderr, "Connected with server response: %d\n", pass->status);
#ifdef DC_LWS_ABLE_TO_PARSE_HEADERS
			/* how to query custom headers (http 1.x only at the moment) */
			for (int i = 0; i < DC_LWS_HEADERS_LENGTH; i++) {
				pass->headers[i][0] = '\0'; /* to clear any headers we requested with */
				int n = lws_hdr_custom_length(wsi, dc_lws_headers[i], strlen(dc_lws_headers[i]));
				if (n < -1)
					lwsl_notice("Error with header %s.\n", dc_lws_headers[i]);
				else
					if (lws_hdr_custom_copy(wsi, pass->headers[i], DC_LWS_MAX_HEADER_LENGTH, dc_lws_headers[i], strlen(dc_lws_headers[i])) < 0)
						lwsl_notice("Header %s too long or non existent.\n", dc_lws_headers[i]);
					else
						lwsl_notice("%s %s\n", dc_lws_headers[i], pass->headers[i]);
			}
#endif
			break;
		case LWS_CALLBACK_RECEIVE_CLIENT_HTTP_READ: /* chunked body, without headers */
			fprintf(stderr, "RECEIVE_CLIENT_HTTP_READ: read %d\n", len);
			lwsl_hexdump_notice(in, len); /* for debugging purposes, kek */
			if (!(pass->api_io.status & DC_MUST_FREE)) { /* we start filling the ->body */
				pass->api_io.status |= DC_MUST_FREE; /* buffer, on end of wsi session */
				pass->body = NULL; /* dc_api_i is called from DC_CALLBACK_WSI_DESTROY */
			} /* if ->body from input was not freed and it should be, res body is appended */
			pass->body_length += len; /* if ->body was static, pointer is changed to NULL */
			pass->body = realloc(pass->body, pass->body_length + 1); /* normally - no edge */
			memcpy(pass->body+pass->body_length-len, in, len); /* case - resp body will be */
			pass->body[pass->body_length] = '\0'; /* on heap and freed on _DESTROY. */
			return 0; /* don't pass to lws_callback_http_dummy */
		case LWS_CALLBACK_RECEIVE_CLIENT_HTTP: /* uninterpreted http content */
			fprintf(stderr, "LCRCH\n");
			char buffer[DC_LWS_BUF + LWS_PRE];
			char * ptr = buffer + LWS_PRE; /* see, BEFORE the pointer - lower addr */
			int len2 /* DC_LWS_BUF again */ = sizeof(buffer) - LWS_PRE;
			if (lws_http_client_read(wsi, &ptr, &len2) < 0) {
				fprintf(stderr, "lws_http_client_read -1\n");
				return -1;
			}
			return 0; /* don't pass to lws_callback_http_dummy */
		case LWS_CALLBACK_COMPLETED_CLIENT_HTTP:
			lwsl_user("LWS_CALLBACK_COMPLETED_CLIENT_HTTP\n");
			break;
		case LWS_CALLBACK_CLOSED_CLIENT_HTTP:
			lwsl_user("LWS_CALLBACK_CLOSED_CLIENT_HTTP\n");
			break;
		case LWS_CALLBACK_WSI_DESTROY: /* if I understand the docs correctly, this is allways */
			if (pass->api_io.pass != pass)
				fprintf(stderr, "[!!!] REPORT THIS BUG: pass->api_io.pass != pass\n");
			pass->api_io.status |= DC_FROM_LWS;
			dc_api_i(pass->api_io);
			pass->api_io.status &= ~DC_FROM_LWS;
			fprintf(stderr, "pass before freed is %p\n", (void *) pass);
			if (pass->api_io.status & DC_MUST_FREE) /* we still do this check in case */
				free(pass->body); /* _READ was not called and pointer was static */
			free(pass); /* called at the final moment when user pointer and wsi is still */
			break; /* accessible - we can free the struct that was passed in as a heap ptr */
		default:
			break;
	}
	return lws_callback_http_dummy(wsi, rs, us, in, len);
}
void dc_api_i (struct dc_api_io i) { /* this function does not call attached functions, only output does that */
	if (!i.program)
		return;
	if (i.program->lws_context && !(i.status & DC_FROM_LWS))
		lws_service(i.program->lws_context, 0); /* DO NOT CALL THIS FROM _cb! */
	switch (i.type) {
		case DC_API_MESSAGE:
			break;
		case DC_API_CHANNEL:
			break;
		case DC_API_GUILD:
			break;
		case DC_API_LOGIN: /* library currently only works for a single client */
			if (!i.program->clients_length) /* already attempted login */
				DC_MR(i.program->clients);
			i.program->clients[0] = i.client;
			struct lws_client_connect_info info;
			memset(&info, 0, sizeof(info));
			info.context = i.program->lws_context;
#if DC_SERVER_SSL
			info.ssl_connection = LCCSCF_USE_SSL;
#endif
			info.port = DC_SERVER_PORT;
			info.address = DC_SERVER_ADDRESS;
			info.path = DC_API_PREFIX "auth/login";
			info.host = info.address;
			/* info.origin = DC_SERVER_ORIGIN; */ /* just don't send it */
			info.method = "POST";
			struct dc_lws_pass * pass = calloc(1, sizeof(struct dc_lws_pass)); /* cb frees */
			fprintf(stderr, "allocated pass at %p\n", (void *) pass);
			i.status |= DC_MUST_FREE;
			pass->body_length = smprintf(&pass->body, DC_LOGIN_FORMAT, i.client->email, i.client->password);
			fprintf(stderr, "length: %u string: %s\n", pass->body_length, pass->body);
			i.type = DC_API_LOGIN_CB;
			memcpy(&pass->api_io, &i, sizeof(i));
			pass->api_io.pass = pass;
			strcpy(pass->headers[DC_LWS_CONTENT_TYPE], "application/json");
			info.userdata = pass;
#if DC_LWS_ABLE_TO_PARSE_HEADERS
			info.alpn = "http/1.1";
#endif
			info.protocol = dc_lws_protocols[0].name;
			if (i.client->authorization) /* attempt cookie login without user/pass */
				strcpy(pass->headers[DC_LWS_AUTHORIZATION], i.client->authorization);
			lws_client_connect_via_info(&info);
			break;
		case DC_API_LOGIN_CB:
#define DC_STACK_RETURN(x) do { i.status = x; dc_api_stack(i); return; } while (0)
			i.type = DC_API_LOGIN;
			if (!i.pass->body) {
				i.status |= DC_REQUEST_FAILED;
				i.status &= ~(DC_OK);
				dc_api_stack(i);
				break;
			}
			fprintf(stderr, "DEBUG: %s\n", i.pass->body);
			if (strstr(i.pass->body, "INVALID_LOGIN"))
				DC_STACK_ERROR(DC_BAD_LOGIN);
			if (strstr(i.pass->body, "captcha-required"))
				DC_STACK_ERROR(DC_CAPTCHA_NEEDED);
			if (strstr(i.pass->body, "ACCOUNT_LOGIN_VERIFICATION_EMAIL"))
				DC_STACK_ERROR(DC_VERIFICATION_NEEDED);
			char * cp, c2;
			if (!(cp = strstr(i.pass->body, "\"token\": \"")) || !(c2 = strchr(cp+strlen("\"token\": \""), '"')))
				DC_STACK_ERROR(DC_ERROR);
			c2[0] = '\0'; /* body is on heap, we can edit it */
			free(i.client->authorization); /* in case we set it previously */
			i.client->authorization = strdup(cp);
			fprintf(stderr, "got token %s\n", i.client->authorization);
			DC_STACK_RETURN(DC_OK | DC_INCOMPLETE /* we now have to request properties */);
			break;
		case DC_API_REGISTER:
			break;
		case DC_API_STATUS:
			break;
		case DC_API_USER:
			break;
		case DC_API_ROLE:
			break;
		case DC_API_NONE:
			break;
		case DC_API_ATTACH:
			if (i.attached_function->type == DC_API_NONE)
				break;
			DC_MR(i.program->attached_functions); /* makes room for at least one */
			break;
	}
}
struct dc_api_io dc_api_o (struct dc_api_io i /* for ->program */) {
	if (i.program->lws_context)
		lws_service(i.program->lws_context, 0);
	struct dc_api_io o = {
		.type = DC_API_NONE,
		.program = i.program
	};
	/* dc_api_stack pop: */
	if (i.program->api_ios_length) {
		memcpy(&o, (i.program->api_ios[--i.program->api_ios_length]), sizeof(o));
		dc_api_io_free(i.program->api_ios[i.program->api_ios_length]);
	}
	for (size_t j = 0; j < i.program->attached_functions_length; j++) { /* call attached functions */
		if (i.program->attached_functions[j]->type == o.type) /* wow, it's possible to attach to NONE */
			i.program->attached_functions[j]->function(o, i.program->attached_functions[j]->user_data);
	}
	return o;
}