2014-04-03 07:29:50 +08:00
|
|
|
/*
|
|
|
|
* libwebsockets - small server side websockets and web server implementation
|
|
|
|
*
|
2018-04-12 15:56:38 +08:00
|
|
|
* Copyright (C) 2010-2018 Andy Green <andy@warmcat.com>
|
2014-04-03 07:29:50 +08:00
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
|
|
* License as published by the Free Software Foundation:
|
|
|
|
* version 2.1 of the License.
|
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* Lesser General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
|
|
* License along with this library; if not, write to the Free Software
|
|
|
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston,
|
|
|
|
* MA 02110-1301 USA
|
|
|
|
*/
|
|
|
|
|
2018-05-03 10:49:36 +08:00
|
|
|
#include "core/private.h"
|
2014-04-03 07:29:50 +08:00
|
|
|
|
|
|
|
#ifndef LWS_BUILD_HASH
|
|
|
|
#define LWS_BUILD_HASH "unknown-build-hash"
|
|
|
|
#endif
|
|
|
|
|
2018-04-30 09:16:04 +08:00
|
|
|
const struct lws_role_ops *available_roles[] = {
|
2018-04-12 15:56:38 +08:00
|
|
|
#if defined(LWS_ROLE_H2)
|
|
|
|
&role_ops_h2,
|
|
|
|
#endif
|
|
|
|
#if defined(LWS_ROLE_H1)
|
|
|
|
&role_ops_h1,
|
|
|
|
#endif
|
|
|
|
#if defined(LWS_ROLE_WS)
|
|
|
|
&role_ops_ws,
|
2018-10-02 10:50:24 +08:00
|
|
|
#endif
|
|
|
|
#if defined(LWS_ROLE_DBUS)
|
|
|
|
&role_ops_dbus,
|
2018-04-12 15:56:38 +08:00
|
|
|
#endif
|
2018-04-25 08:42:18 +08:00
|
|
|
NULL
|
2018-04-12 15:56:38 +08:00
|
|
|
};
|
|
|
|
|
2018-04-30 09:16:04 +08:00
|
|
|
const struct lws_event_loop_ops *available_event_libs[] = {
|
|
|
|
#if defined(LWS_WITH_POLL)
|
|
|
|
&event_loop_ops_poll,
|
|
|
|
#endif
|
|
|
|
#if defined(LWS_WITH_LIBUV)
|
|
|
|
&event_loop_ops_uv,
|
|
|
|
#endif
|
|
|
|
#if defined(LWS_WITH_LIBEVENT)
|
|
|
|
&event_loop_ops_event,
|
|
|
|
#endif
|
|
|
|
#if defined(LWS_WITH_LIBEV)
|
|
|
|
&event_loop_ops_ev,
|
|
|
|
#endif
|
|
|
|
NULL
|
|
|
|
};
|
|
|
|
|
2014-04-03 07:29:50 +08:00
|
|
|
static const char *library_version = LWS_LIBRARY_VERSION " " LWS_BUILD_HASH;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* lws_get_library_version: get version and git hash library built from
|
|
|
|
*
|
|
|
|
* returns a const char * to a string like "1.1 178d78c"
|
|
|
|
* representing the library version followed by the git head hash it
|
|
|
|
* was built from
|
|
|
|
*/
|
|
|
|
LWS_VISIBLE const char *
|
|
|
|
lws_get_library_version(void)
|
|
|
|
{
|
|
|
|
return library_version;
|
|
|
|
}
|
|
|
|
|
2018-04-12 15:56:38 +08:00
|
|
|
int
|
|
|
|
lws_role_call_alpn_negotiated(struct lws *wsi, const char *alpn)
|
|
|
|
{
|
|
|
|
#if defined(LWS_WITH_TLS)
|
|
|
|
if (!alpn)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
lwsl_info("%s: '%s'\n", __func__, alpn);
|
|
|
|
|
2018-04-25 08:42:18 +08:00
|
|
|
LWS_FOR_EVERY_AVAILABLE_ROLE_START(ar)
|
2018-05-01 18:15:52 +08:00
|
|
|
if (ar->alpn && !strcmp(ar->alpn, alpn) && ar->alpn_negotiated)
|
2018-04-25 08:42:18 +08:00
|
|
|
return ar->alpn_negotiated(wsi, alpn);
|
|
|
|
LWS_FOR_EVERY_AVAILABLE_ROLE_END;
|
2018-04-12 15:56:38 +08:00
|
|
|
#endif
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2018-05-10 16:13:26 +08:00
|
|
|
#if !defined(LWS_WITHOUT_SERVER)
|
|
|
|
int
|
|
|
|
lws_role_call_adoption_bind(struct lws *wsi, int type, const char *prot)
|
|
|
|
{
|
|
|
|
LWS_FOR_EVERY_AVAILABLE_ROLE_START(ar)
|
|
|
|
if (ar->adoption_bind)
|
|
|
|
if (ar->adoption_bind(wsi, type, prot))
|
|
|
|
return 0;
|
|
|
|
LWS_FOR_EVERY_AVAILABLE_ROLE_END;
|
|
|
|
|
|
|
|
/* fall back to raw socket role if, eg, h1 not configured */
|
|
|
|
|
|
|
|
if (role_ops_raw_skt.adoption_bind &&
|
|
|
|
role_ops_raw_skt.adoption_bind(wsi, type, prot))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
/* fall back to raw file role if, eg, h1 not configured */
|
|
|
|
|
|
|
|
if (role_ops_raw_file.adoption_bind &&
|
|
|
|
role_ops_raw_file.adoption_bind(wsi, type, prot))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if !defined(LWS_WITHOUT_CLIENT)
|
|
|
|
int
|
|
|
|
lws_role_call_client_bind(struct lws *wsi,
|
|
|
|
const struct lws_client_connect_info *i)
|
|
|
|
{
|
|
|
|
LWS_FOR_EVERY_AVAILABLE_ROLE_START(ar)
|
|
|
|
if (ar->client_bind) {
|
|
|
|
int m = ar->client_bind(wsi, i);
|
|
|
|
if (m < 0)
|
|
|
|
return m;
|
|
|
|
if (m)
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
LWS_FOR_EVERY_AVAILABLE_ROLE_END;
|
|
|
|
|
|
|
|
/* fall back to raw socket role if, eg, h1 not configured */
|
|
|
|
|
|
|
|
if (role_ops_raw_skt.client_bind &&
|
|
|
|
role_ops_raw_skt.client_bind(wsi, i))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2016-03-28 10:10:43 +08:00
|
|
|
static const char * const mount_protocols[] = {
|
|
|
|
"http://",
|
|
|
|
"https://",
|
|
|
|
"file://",
|
2016-04-08 18:30:45 +08:00
|
|
|
"cgi://",
|
|
|
|
">http://",
|
|
|
|
">https://",
|
2016-05-09 09:37:01 +08:00
|
|
|
"callback://"
|
2016-03-28 10:10:43 +08:00
|
|
|
};
|
|
|
|
|
2016-04-06 16:15:40 +08:00
|
|
|
LWS_VISIBLE void *
|
2017-09-23 12:55:21 +08:00
|
|
|
lws_protocol_vh_priv_zalloc(struct lws_vhost *vhost,
|
|
|
|
const struct lws_protocols *prot, int size)
|
2016-04-06 16:15:40 +08:00
|
|
|
{
|
|
|
|
int n = 0;
|
|
|
|
|
|
|
|
/* allocate the vh priv array only on demand */
|
|
|
|
if (!vhost->protocol_vh_privs) {
|
|
|
|
vhost->protocol_vh_privs = (void **)lws_zalloc(
|
2017-10-28 07:42:44 +08:00
|
|
|
vhost->count_protocols * sizeof(void *),
|
|
|
|
"protocol_vh_privs");
|
2016-04-06 16:15:40 +08:00
|
|
|
if (!vhost->protocol_vh_privs)
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
while (n < vhost->count_protocols && &vhost->protocols[n] != prot)
|
|
|
|
n++;
|
|
|
|
|
2016-05-19 15:28:31 +08:00
|
|
|
if (n == vhost->count_protocols) {
|
|
|
|
n = 0;
|
|
|
|
while (n < vhost->count_protocols &&
|
|
|
|
strcmp(vhost->protocols[n].name, prot->name))
|
|
|
|
n++;
|
|
|
|
|
|
|
|
if (n == vhost->count_protocols)
|
|
|
|
return NULL;
|
|
|
|
}
|
2016-04-06 16:15:40 +08:00
|
|
|
|
2017-10-04 07:10:39 +08:00
|
|
|
vhost->protocol_vh_privs[n] = lws_zalloc(size, "vh priv");
|
2016-04-06 16:15:40 +08:00
|
|
|
return vhost->protocol_vh_privs[n];
|
|
|
|
}
|
|
|
|
|
|
|
|
LWS_VISIBLE void *
|
2017-09-23 12:55:21 +08:00
|
|
|
lws_protocol_vh_priv_get(struct lws_vhost *vhost,
|
|
|
|
const struct lws_protocols *prot)
|
2016-04-06 16:15:40 +08:00
|
|
|
{
|
|
|
|
int n = 0;
|
|
|
|
|
2018-07-31 13:21:56 +08:00
|
|
|
if (!vhost || !vhost->protocol_vh_privs || !prot)
|
2016-04-06 16:15:40 +08:00
|
|
|
return NULL;
|
|
|
|
|
|
|
|
while (n < vhost->count_protocols && &vhost->protocols[n] != prot)
|
|
|
|
n++;
|
|
|
|
|
|
|
|
if (n == vhost->count_protocols) {
|
2016-05-19 15:28:31 +08:00
|
|
|
n = 0;
|
|
|
|
while (n < vhost->count_protocols &&
|
|
|
|
strcmp(vhost->protocols[n].name, prot->name))
|
|
|
|
n++;
|
|
|
|
|
|
|
|
if (n == vhost->count_protocols) {
|
|
|
|
lwsl_err("%s: unknown protocol %p\n", __func__, prot);
|
|
|
|
return NULL;
|
|
|
|
}
|
2016-04-06 16:15:40 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
return vhost->protocol_vh_privs[n];
|
|
|
|
}
|
|
|
|
|
2016-05-02 06:01:59 +08:00
|
|
|
static const struct lws_protocol_vhost_options *
|
2016-04-08 13:25:34 +08:00
|
|
|
lws_vhost_protocol_options(struct lws_vhost *vh, const char *name)
|
|
|
|
{
|
2016-05-02 06:01:59 +08:00
|
|
|
const struct lws_protocol_vhost_options *pvo = vh->pvo;
|
2016-04-08 13:25:34 +08:00
|
|
|
|
2017-09-12 17:44:10 +08:00
|
|
|
if (!name)
|
|
|
|
return NULL;
|
|
|
|
|
2016-04-08 13:25:34 +08:00
|
|
|
while (pvo) {
|
|
|
|
if (!strcmp(pvo->name, name))
|
|
|
|
return pvo;
|
|
|
|
pvo = pvo->next;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2016-11-30 07:05:13 +08:00
|
|
|
/*
|
|
|
|
* inform every vhost that hasn't already done it, that
|
|
|
|
* his protocols are initializing
|
|
|
|
*/
|
2017-02-18 17:26:40 +08:00
|
|
|
LWS_VISIBLE int
|
2016-04-06 16:15:40 +08:00
|
|
|
lws_protocol_init(struct lws_context *context)
|
|
|
|
{
|
|
|
|
struct lws_vhost *vh = context->vhost_list;
|
2016-05-06 14:24:59 +08:00
|
|
|
const struct lws_protocol_vhost_options *pvo, *pvo1;
|
2016-04-06 16:15:40 +08:00
|
|
|
struct lws wsi;
|
2017-10-26 18:53:34 +08:00
|
|
|
int n, any = 0;
|
2016-04-06 16:15:40 +08:00
|
|
|
|
2017-10-21 09:06:13 +08:00
|
|
|
if (context->doing_protocol_init)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
context->doing_protocol_init = 1;
|
|
|
|
|
2016-04-06 16:15:40 +08:00
|
|
|
memset(&wsi, 0, sizeof(wsi));
|
|
|
|
wsi.context = context;
|
|
|
|
|
2017-01-17 07:01:02 +08:00
|
|
|
lwsl_info("%s\n", __func__);
|
2016-05-06 14:24:59 +08:00
|
|
|
|
2016-04-06 16:15:40 +08:00
|
|
|
while (vh) {
|
|
|
|
wsi.vhost = vh;
|
|
|
|
|
2016-11-30 07:05:13 +08:00
|
|
|
/* only do the protocol init once for a given vhost */
|
2017-10-26 18:53:34 +08:00
|
|
|
if (vh->created_vhost_protocols ||
|
|
|
|
(vh->options & LWS_SERVER_OPTION_SKIP_PROTOCOL_INIT))
|
2016-11-30 07:05:13 +08:00
|
|
|
goto next;
|
|
|
|
|
2016-04-06 16:15:40 +08:00
|
|
|
/* initialize supported protocols on this vhost */
|
|
|
|
|
|
|
|
for (n = 0; n < vh->count_protocols; n++) {
|
|
|
|
wsi.protocol = &vh->protocols[n];
|
2017-03-03 12:38:10 +08:00
|
|
|
if (!vh->protocols[n].name)
|
|
|
|
continue;
|
2016-04-08 13:25:34 +08:00
|
|
|
pvo = lws_vhost_protocol_options(vh,
|
|
|
|
vh->protocols[n].name);
|
2016-05-06 14:24:59 +08:00
|
|
|
if (pvo) {
|
2016-04-08 13:25:34 +08:00
|
|
|
/*
|
|
|
|
* linked list of options specific to
|
|
|
|
* vh + protocol
|
|
|
|
*/
|
2016-05-06 14:24:59 +08:00
|
|
|
pvo1 = pvo;
|
|
|
|
pvo = pvo1->options;
|
|
|
|
|
|
|
|
while (pvo) {
|
2017-10-29 16:22:54 +08:00
|
|
|
lwsl_debug(
|
2017-10-28 07:42:44 +08:00
|
|
|
" vhost \"%s\", "
|
|
|
|
"protocol \"%s\", "
|
|
|
|
"option \"%s\"\n",
|
2016-05-06 14:24:59 +08:00
|
|
|
vh->name,
|
|
|
|
vh->protocols[n].name,
|
|
|
|
pvo->name);
|
|
|
|
|
|
|
|
if (!strcmp(pvo->name, "default")) {
|
2017-10-29 16:22:54 +08:00
|
|
|
lwsl_info("Setting default "
|
2016-05-06 14:24:59 +08:00
|
|
|
"protocol for vh %s to %s\n",
|
|
|
|
vh->name,
|
|
|
|
vh->protocols[n].name);
|
|
|
|
vh->default_protocol_index = n;
|
|
|
|
}
|
2017-03-07 16:06:05 +08:00
|
|
|
if (!strcmp(pvo->name, "raw")) {
|
2017-10-29 16:22:54 +08:00
|
|
|
lwsl_info("Setting raw "
|
2017-03-07 16:06:05 +08:00
|
|
|
"protocol for vh %s to %s\n",
|
|
|
|
vh->name,
|
|
|
|
vh->protocols[n].name);
|
|
|
|
vh->raw_protocol_index = n;
|
|
|
|
}
|
2016-05-06 14:24:59 +08:00
|
|
|
pvo = pvo->next;
|
|
|
|
}
|
|
|
|
|
|
|
|
pvo = pvo1->options;
|
|
|
|
}
|
2016-04-08 13:25:34 +08:00
|
|
|
|
2018-04-11 13:39:42 +08:00
|
|
|
#if defined(LWS_WITH_TLS)
|
2018-05-01 12:41:42 +08:00
|
|
|
any |= !!vh->tls.ssl_ctx;
|
2017-10-26 18:53:34 +08:00
|
|
|
#endif
|
|
|
|
|
2016-04-06 16:15:40 +08:00
|
|
|
/*
|
2017-09-23 12:55:21 +08:00
|
|
|
* inform all the protocols that they are doing their
|
|
|
|
* one-time initialization if they want to.
|
2016-04-06 16:15:40 +08:00
|
|
|
*
|
2017-09-23 12:55:21 +08:00
|
|
|
* NOTE the wsi is all zeros except for the context, vh
|
|
|
|
* + protocol ptrs so lws_get_context(wsi) etc can work
|
2016-04-06 16:15:40 +08:00
|
|
|
*/
|
2016-05-19 15:28:31 +08:00
|
|
|
if (vh->protocols[n].callback(&wsi,
|
2017-09-23 12:55:21 +08:00
|
|
|
LWS_CALLBACK_PROTOCOL_INIT, NULL,
|
2017-10-21 09:06:13 +08:00
|
|
|
(void *)pvo, 0)) {
|
2017-11-08 14:21:03 +08:00
|
|
|
lws_free(vh->protocol_vh_privs[n]);
|
|
|
|
vh->protocol_vh_privs[n] = NULL;
|
|
|
|
lwsl_err("%s: protocol %s failed init\n", __func__,
|
2017-10-21 09:06:13 +08:00
|
|
|
vh->protocols[n].name);
|
2018-07-31 13:21:56 +08:00
|
|
|
|
|
|
|
return 1;
|
2017-10-21 09:06:13 +08:00
|
|
|
}
|
2016-04-06 16:15:40 +08:00
|
|
|
}
|
|
|
|
|
2016-11-30 07:05:13 +08:00
|
|
|
vh->created_vhost_protocols = 1;
|
|
|
|
next:
|
2016-04-06 16:15:40 +08:00
|
|
|
vh = vh->vhost_next;
|
|
|
|
}
|
|
|
|
|
2017-10-21 09:06:13 +08:00
|
|
|
context->doing_protocol_init = 0;
|
|
|
|
|
2016-11-30 07:05:13 +08:00
|
|
|
if (!context->protocol_init_done)
|
|
|
|
lws_finalize_startup(context);
|
|
|
|
|
2016-04-06 16:15:40 +08:00
|
|
|
context->protocol_init_done = 1;
|
|
|
|
|
2017-10-26 18:53:34 +08:00
|
|
|
if (any)
|
|
|
|
lws_tls_check_all_cert_lifetimes(context);
|
|
|
|
|
2016-04-06 16:15:40 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2016-05-02 06:58:16 +08:00
|
|
|
|
|
|
|
/* list of supported protocols and callbacks */
|
|
|
|
|
|
|
|
static const struct lws_protocols protocols_dummy[] = {
|
|
|
|
/* first protocol must always be HTTP handler */
|
|
|
|
|
|
|
|
{
|
2018-04-13 16:01:38 +08:00
|
|
|
"http-only", /* name */
|
|
|
|
lws_callback_http_dummy, /* callback */
|
|
|
|
0, /* per_session_data_size */
|
|
|
|
0, /* rx_buffer_size */
|
|
|
|
0, /* id */
|
|
|
|
NULL, /* user */
|
|
|
|
0 /* tx_packet_size */
|
2016-05-02 06:58:16 +08:00
|
|
|
},
|
|
|
|
/*
|
|
|
|
* the other protocols are provided by lws plugins
|
|
|
|
*/
|
2017-03-16 10:46:31 +08:00
|
|
|
{ NULL, NULL, 0, 0, 0, NULL, 0} /* terminator */
|
2016-05-02 06:58:16 +08:00
|
|
|
};
|
|
|
|
|
2017-01-17 07:01:02 +08:00
|
|
|
#ifdef LWS_PLAT_OPTEE
|
|
|
|
#undef LWS_HAVE_GETENV
|
|
|
|
#endif
|
|
|
|
|
2016-03-28 10:10:43 +08:00
|
|
|
LWS_VISIBLE struct lws_vhost *
|
|
|
|
lws_create_vhost(struct lws_context *context,
|
2018-04-27 08:27:16 +08:00
|
|
|
const struct lws_context_creation_info *info)
|
2016-03-28 10:10:43 +08:00
|
|
|
{
|
2017-10-04 07:10:39 +08:00
|
|
|
struct lws_vhost *vh = lws_zalloc(sizeof(*vh), "create vhost"),
|
2016-03-28 10:10:43 +08:00
|
|
|
**vh1 = &context->vhost_list;
|
2016-05-02 04:59:54 +08:00
|
|
|
const struct lws_http_mount *mounts;
|
2018-04-27 08:27:16 +08:00
|
|
|
const struct lws_protocols *pcols = info->protocols;
|
2016-05-19 15:28:31 +08:00
|
|
|
const struct lws_protocol_vhost_options *pvo;
|
2016-04-06 16:15:40 +08:00
|
|
|
#ifdef LWS_WITH_PLUGINS
|
|
|
|
struct lws_plugin *plugin = context->plugin_list;
|
2017-02-18 17:26:40 +08:00
|
|
|
#endif
|
2016-04-06 16:15:40 +08:00
|
|
|
struct lws_protocols *lwsp;
|
2016-05-19 15:28:31 +08:00
|
|
|
int m, f = !info->pvo;
|
2018-03-24 08:07:00 +08:00
|
|
|
char buf[20];
|
2018-05-01 12:41:42 +08:00
|
|
|
#if !defined(LWS_WITHOUT_CLIENT) && defined(LWS_HAVE_GETENV)
|
2016-03-28 10:10:43 +08:00
|
|
|
char *p;
|
2016-07-23 14:18:25 +08:00
|
|
|
#endif
|
2016-05-19 15:28:31 +08:00
|
|
|
int n;
|
2016-03-28 10:10:43 +08:00
|
|
|
|
|
|
|
if (!vh)
|
|
|
|
return NULL;
|
|
|
|
|
2018-03-02 15:31:35 +08:00
|
|
|
#if LWS_MAX_SMP > 1
|
|
|
|
pthread_mutex_init(&vh->lock, NULL);
|
|
|
|
#endif
|
|
|
|
|
2018-04-27 08:27:16 +08:00
|
|
|
if (!pcols)
|
|
|
|
pcols = &protocols_dummy[0];
|
2016-05-02 06:58:16 +08:00
|
|
|
|
2016-03-28 10:10:43 +08:00
|
|
|
vh->context = context;
|
|
|
|
if (!info->vhost_name)
|
|
|
|
vh->name = "default";
|
|
|
|
else
|
|
|
|
vh->name = info->vhost_name;
|
|
|
|
|
2018-04-27 15:20:56 +08:00
|
|
|
#if defined(LWS_ROLE_H1) || defined(LWS_ROLE_H2)
|
|
|
|
vh->http.error_document_404 = info->error_document_404;
|
|
|
|
#endif
|
2018-03-07 19:57:34 +08:00
|
|
|
|
2017-10-16 16:59:57 +08:00
|
|
|
if (info->options & LWS_SERVER_OPTION_ONLY_RAW)
|
|
|
|
lwsl_info("%s set to only support RAW\n", vh->name);
|
|
|
|
|
2016-03-28 10:10:43 +08:00
|
|
|
vh->iface = info->iface;
|
2017-11-30 12:40:46 +08:00
|
|
|
#if !defined(LWS_WITH_ESP32) && \
|
2017-10-28 07:42:44 +08:00
|
|
|
!defined(OPTEE_TA) && !defined(WIN32)
|
2017-06-02 14:07:35 -03:00
|
|
|
vh->bind_iface = info->bind_iface;
|
|
|
|
#endif
|
|
|
|
|
2016-03-28 10:10:43 +08:00
|
|
|
for (vh->count_protocols = 0;
|
2018-04-27 08:27:16 +08:00
|
|
|
pcols[vh->count_protocols].callback;
|
2016-03-28 10:10:43 +08:00
|
|
|
vh->count_protocols++)
|
|
|
|
;
|
2016-04-08 13:25:34 +08:00
|
|
|
|
2016-04-14 12:37:21 +08:00
|
|
|
vh->options = info->options;
|
2016-04-08 13:25:34 +08:00
|
|
|
vh->pvo = info->pvo;
|
2016-08-27 17:07:06 +08:00
|
|
|
vh->headers = info->headers;
|
2017-08-29 15:37:16 +08:00
|
|
|
vh->user = info->user;
|
vhost_destroy: use vhost wsi reference counting to trigger destroy
This changes the vhost destroy flow to only hand off the listen
socket if another vhost sharing it, and mark the vhost as
being_destroyed.
Each tsi calls lws_check_deferred_free() once a second, if it sees
any vhost being_destroyed there, it closes all wsi on its tsi on
the same vhost, one time.
As the wsi on the vhost complete close (ie, after libuv async close
if on libuv event loop), they decrement a reference count for all
wsi open on the vhost. The tsi who closes the last one then
completes the destroy flow for the vhost itself... it's random
which tsi completes the vhost destroy but since there are no
wsi left on the vhost, and it holds the context lock, nothing
can conflict.
The advantage of this is that owning tsi do the close for wsi
that are bound to the vhost under destruction, at a time when
they are guaranteed to be idle for service, and they do it with
both vhost and context locks owned, so no other service thread
can conflict for stuff protected by those either.
For the situation the user code may have allocations attached to
the vhost, this adds args to lws_vhost_destroy() to allow destroying
the user allocations just before the vhost is freed.
2018-06-16 09:31:07 +08:00
|
|
|
vh->finalize = info->finalize;
|
|
|
|
vh->finalize_arg = info->finalize_arg;
|
2018-04-11 13:39:42 +08:00
|
|
|
|
2018-04-25 08:42:18 +08:00
|
|
|
LWS_FOR_EVERY_AVAILABLE_ROLE_START(ar)
|
|
|
|
if (ar->init_vhost)
|
|
|
|
if (ar->init_vhost(vh, info))
|
|
|
|
return NULL;
|
|
|
|
LWS_FOR_EVERY_AVAILABLE_ROLE_END;
|
2018-04-11 13:39:42 +08:00
|
|
|
|
2018-05-01 12:41:42 +08:00
|
|
|
|
2016-07-23 14:18:25 +08:00
|
|
|
if (info->keepalive_timeout)
|
|
|
|
vh->keepalive_timeout = info->keepalive_timeout;
|
|
|
|
else
|
|
|
|
vh->keepalive_timeout = 5;
|
2016-04-08 13:25:34 +08:00
|
|
|
|
2017-07-26 11:49:41 +08:00
|
|
|
if (info->timeout_secs_ah_idle)
|
|
|
|
vh->timeout_secs_ah_idle = info->timeout_secs_ah_idle;
|
|
|
|
else
|
|
|
|
vh->timeout_secs_ah_idle = 10;
|
|
|
|
|
2018-04-11 13:39:42 +08:00
|
|
|
#if defined(LWS_WITH_TLS)
|
2018-05-01 12:41:42 +08:00
|
|
|
|
|
|
|
vh->tls.alpn = info->alpn;
|
|
|
|
vh->tls.ssl_info_event_mask = info->ssl_info_event_mask;
|
|
|
|
|
2017-11-02 09:20:17 +08:00
|
|
|
if (info->ecdh_curve)
|
2018-05-01 12:41:42 +08:00
|
|
|
lws_strncpy(vh->tls.ecdh_curve, info->ecdh_curve,
|
|
|
|
sizeof(vh->tls.ecdh_curve));
|
2017-11-02 09:20:17 +08:00
|
|
|
|
|
|
|
/* carefully allocate and take a copy of cert + key paths if present */
|
|
|
|
n = 0;
|
|
|
|
if (info->ssl_cert_filepath)
|
|
|
|
n += (int)strlen(info->ssl_cert_filepath) + 1;
|
|
|
|
if (info->ssl_private_key_filepath)
|
|
|
|
n += (int)strlen(info->ssl_private_key_filepath) + 1;
|
|
|
|
|
|
|
|
if (n) {
|
2018-05-01 12:41:42 +08:00
|
|
|
vh->tls.key_path = vh->tls.alloc_cert_path = lws_malloc(n, "vh paths");
|
2017-11-02 09:20:17 +08:00
|
|
|
if (info->ssl_cert_filepath) {
|
|
|
|
n = (int)strlen(info->ssl_cert_filepath) + 1;
|
2018-05-01 12:41:42 +08:00
|
|
|
memcpy(vh->tls.alloc_cert_path, info->ssl_cert_filepath, n);
|
|
|
|
vh->tls.key_path += n;
|
2017-11-02 09:20:17 +08:00
|
|
|
}
|
|
|
|
if (info->ssl_private_key_filepath)
|
2018-05-01 12:41:42 +08:00
|
|
|
memcpy(vh->tls.key_path, info->ssl_private_key_filepath,
|
2017-11-02 09:20:17 +08:00
|
|
|
strlen(info->ssl_private_key_filepath) + 1);
|
|
|
|
}
|
2018-05-01 12:41:42 +08:00
|
|
|
#endif
|
2017-11-02 09:20:17 +08:00
|
|
|
|
2017-02-18 17:26:40 +08:00
|
|
|
/*
|
|
|
|
* give the vhost a unified list of protocols including the
|
|
|
|
* ones that came from plugins
|
|
|
|
*/
|
2017-10-28 07:42:44 +08:00
|
|
|
lwsp = lws_zalloc(sizeof(struct lws_protocols) * (vh->count_protocols +
|
|
|
|
context->plugin_protocol_count + 1),
|
|
|
|
"vhost-specific plugin table");
|
2017-02-18 17:26:40 +08:00
|
|
|
if (!lwsp) {
|
|
|
|
lwsl_err("OOM\n");
|
|
|
|
return NULL;
|
|
|
|
}
|
2016-04-06 16:15:40 +08:00
|
|
|
|
2017-02-18 17:26:40 +08:00
|
|
|
m = vh->count_protocols;
|
2018-04-27 08:27:16 +08:00
|
|
|
memcpy(lwsp, pcols, sizeof(struct lws_protocols) * m);
|
2016-04-08 13:25:34 +08:00
|
|
|
|
2017-02-18 17:26:40 +08:00
|
|
|
/* for compatibility, all protocols enabled on vhost if only
|
|
|
|
* the default vhost exists. Otherwise only vhosts who ask
|
|
|
|
* for a protocol get it enabled.
|
|
|
|
*/
|
2016-04-12 16:41:31 +08:00
|
|
|
|
2017-07-18 11:15:43 +08:00
|
|
|
if (context->options & LWS_SERVER_OPTION_EXPLICIT_VHOSTS)
|
2017-02-18 17:26:40 +08:00
|
|
|
f = 0;
|
|
|
|
(void)f;
|
|
|
|
#ifdef LWS_WITH_PLUGINS
|
|
|
|
if (plugin) {
|
2016-04-12 16:41:31 +08:00
|
|
|
|
2016-04-06 16:15:40 +08:00
|
|
|
while (plugin) {
|
2016-04-08 13:25:34 +08:00
|
|
|
for (n = 0; n < plugin->caps.count_protocols; n++) {
|
|
|
|
/*
|
|
|
|
* for compatibility's sake, no pvo implies
|
|
|
|
* allow all protocols
|
|
|
|
*/
|
2016-04-12 16:41:31 +08:00
|
|
|
if (f || lws_vhost_protocol_options(vh,
|
2016-04-08 13:25:34 +08:00
|
|
|
plugin->caps.protocols[n].name)) {
|
|
|
|
memcpy(&lwsp[m],
|
|
|
|
&plugin->caps.protocols[n],
|
|
|
|
sizeof(struct lws_protocols));
|
|
|
|
m++;
|
|
|
|
vh->count_protocols++;
|
|
|
|
}
|
|
|
|
}
|
2016-04-06 16:15:40 +08:00
|
|
|
plugin = plugin->list;
|
|
|
|
}
|
2017-02-18 17:26:40 +08:00
|
|
|
}
|
2016-04-06 16:15:40 +08:00
|
|
|
#endif
|
2017-02-18 17:26:40 +08:00
|
|
|
|
2017-03-03 12:38:10 +08:00
|
|
|
if (
|
|
|
|
#ifdef LWS_WITH_PLUGINS
|
|
|
|
(context->plugin_list) ||
|
|
|
|
#endif
|
2017-07-18 11:15:43 +08:00
|
|
|
context->options & LWS_SERVER_OPTION_EXPLICIT_VHOSTS)
|
2017-02-18 17:26:40 +08:00
|
|
|
vh->protocols = lwsp;
|
2017-02-20 06:20:56 +08:00
|
|
|
else {
|
2018-04-27 08:27:16 +08:00
|
|
|
vh->protocols = pcols;
|
2017-08-16 16:03:12 -04:00
|
|
|
lws_free(lwsp);
|
2017-02-20 06:20:56 +08:00
|
|
|
}
|
2016-04-06 16:15:40 +08:00
|
|
|
|
2018-09-30 07:07:48 +08:00
|
|
|
vh->same_vh_protocol_heads = (struct lws_dll_lws *)
|
|
|
|
lws_zalloc(sizeof(struct lws_dll_lws) *
|
|
|
|
vh->count_protocols, "same vh list");
|
2018-04-27 15:20:56 +08:00
|
|
|
#if defined(LWS_ROLE_H1) || defined(LWS_ROLE_H2)
|
|
|
|
vh->http.mount_list = info->mounts;
|
|
|
|
#endif
|
2016-03-28 10:10:43 +08:00
|
|
|
|
2017-09-28 11:29:03 +08:00
|
|
|
#ifdef LWS_WITH_UNIX_SOCK
|
2018-08-02 19:13:53 +08:00
|
|
|
if (LWS_UNIX_SOCK_ENABLED(vh)) {
|
2016-03-30 22:47:02 -07:00
|
|
|
lwsl_notice("Creating Vhost '%s' path \"%s\", %d protocols\n",
|
2018-03-19 12:48:56 +08:00
|
|
|
vh->name, vh->iface, vh->count_protocols);
|
2016-03-30 22:47:02 -07:00
|
|
|
} else
|
|
|
|
#endif
|
2018-03-24 08:07:00 +08:00
|
|
|
{
|
|
|
|
switch(info->port) {
|
|
|
|
case CONTEXT_PORT_NO_LISTEN:
|
|
|
|
strcpy(buf, "(serving disabled)");
|
|
|
|
break;
|
|
|
|
case CONTEXT_PORT_NO_LISTEN_SERVER:
|
|
|
|
strcpy(buf, "(no listener)");
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
lws_snprintf(buf, sizeof(buf), "port %u", info->port);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
lwsl_notice("Creating Vhost '%s' %s, %d protocols, IPv6 %s\n",
|
|
|
|
vh->name, buf, vh->count_protocols,
|
|
|
|
LWS_IPV6_ENABLED(vh) ? "on" : "off");
|
|
|
|
}
|
2016-05-02 04:59:54 +08:00
|
|
|
mounts = info->mounts;
|
2016-03-28 10:10:43 +08:00
|
|
|
while (mounts) {
|
2017-06-13 16:55:07 +03:00
|
|
|
(void)mount_protocols[0];
|
2017-10-29 16:22:54 +08:00
|
|
|
lwsl_info(" mounting %s%s to %s\n",
|
|
|
|
mount_protocols[mounts->origin_protocol],
|
|
|
|
mounts->origin, mounts->mountpoint);
|
2016-05-19 15:28:31 +08:00
|
|
|
|
|
|
|
/* convert interpreter protocol names to pointers */
|
|
|
|
pvo = mounts->interpret;
|
|
|
|
while (pvo) {
|
2017-10-28 07:42:44 +08:00
|
|
|
for (n = 0; n < vh->count_protocols; n++) {
|
|
|
|
if (strcmp(pvo->value, vh->protocols[n].name))
|
|
|
|
continue;
|
|
|
|
((struct lws_protocol_vhost_options *)pvo)->
|
|
|
|
value = (const char *)(lws_intptr_t)n;
|
|
|
|
break;
|
|
|
|
}
|
2016-05-19 15:28:31 +08:00
|
|
|
if (n == vh->count_protocols)
|
2017-10-28 07:42:44 +08:00
|
|
|
lwsl_err("ignoring unknown interp pr %s\n",
|
2017-09-23 12:55:21 +08:00
|
|
|
pvo->value);
|
2016-05-19 15:28:31 +08:00
|
|
|
pvo = pvo->next;
|
|
|
|
}
|
|
|
|
|
2016-03-28 10:10:43 +08:00
|
|
|
mounts = mounts->mount_next;
|
|
|
|
}
|
|
|
|
|
|
|
|
vh->listen_port = info->port;
|
2018-04-27 15:20:56 +08:00
|
|
|
#if defined(LWS_ROLE_H1) || defined(LWS_ROLE_H2)
|
|
|
|
vh->http.http_proxy_port = 0;
|
|
|
|
vh->http.http_proxy_address[0] = '\0';
|
|
|
|
#endif
|
2017-05-05 11:38:34 -04:00
|
|
|
#if defined(LWS_WITH_SOCKS5)
|
|
|
|
vh->socks_proxy_port = 0;
|
|
|
|
vh->socks_proxy_address[0] = '\0';
|
|
|
|
#endif
|
2016-03-28 10:10:43 +08:00
|
|
|
|
2018-05-01 12:41:42 +08:00
|
|
|
#if !defined(LWS_WITHOUT_CLIENT)
|
2016-03-28 10:10:43 +08:00
|
|
|
/* either use proxy from info, or try get it from env var */
|
2018-04-27 15:20:56 +08:00
|
|
|
#if defined(LWS_ROLE_H1) || defined(LWS_ROLE_H2)
|
2017-05-05 11:38:34 -04:00
|
|
|
/* http proxy */
|
2016-03-28 10:10:43 +08:00
|
|
|
if (info->http_proxy_address) {
|
|
|
|
/* override for backwards compatibility */
|
|
|
|
if (info->http_proxy_port)
|
2018-04-27 15:20:56 +08:00
|
|
|
vh->http.http_proxy_port = info->http_proxy_port;
|
2016-03-28 10:10:43 +08:00
|
|
|
lws_set_proxy(vh, info->http_proxy_address);
|
2018-04-27 15:20:56 +08:00
|
|
|
} else
|
|
|
|
#endif
|
|
|
|
{
|
2016-03-28 10:10:43 +08:00
|
|
|
#ifdef LWS_HAVE_GETENV
|
|
|
|
p = getenv("http_proxy");
|
|
|
|
if (p)
|
|
|
|
lws_set_proxy(vh, p);
|
|
|
|
#endif
|
|
|
|
}
|
2018-05-01 12:41:42 +08:00
|
|
|
#endif
|
2017-05-05 11:38:34 -04:00
|
|
|
#if defined(LWS_WITH_SOCKS5)
|
|
|
|
/* socks proxy */
|
|
|
|
if (info->socks_proxy_address) {
|
|
|
|
/* override for backwards compatibility */
|
|
|
|
if (info->socks_proxy_port)
|
|
|
|
vh->socks_proxy_port = info->socks_proxy_port;
|
|
|
|
lws_set_socks(vh, info->socks_proxy_address);
|
|
|
|
} else {
|
|
|
|
#ifdef LWS_HAVE_GETENV
|
|
|
|
p = getenv("socks_proxy");
|
|
|
|
if (p)
|
|
|
|
lws_set_socks(vh, p);
|
2016-07-23 14:18:25 +08:00
|
|
|
#endif
|
2017-05-05 11:38:34 -04:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2016-03-28 10:10:43 +08:00
|
|
|
vh->ka_time = info->ka_time;
|
|
|
|
vh->ka_interval = info->ka_interval;
|
|
|
|
vh->ka_probes = info->ka_probes;
|
|
|
|
|
2016-04-14 12:37:21 +08:00
|
|
|
if (vh->options & LWS_SERVER_OPTION_STS)
|
|
|
|
lwsl_notice(" STS enabled\n");
|
|
|
|
|
2016-04-15 12:00:23 +08:00
|
|
|
#ifdef LWS_WITH_ACCESS_LOG
|
|
|
|
if (info->log_filepath) {
|
2018-06-23 12:56:21 +08:00
|
|
|
vh->log_fd = lws_open(info->log_filepath,
|
2017-09-23 12:55:21 +08:00
|
|
|
O_CREAT | O_APPEND | O_RDWR, 0600);
|
2016-05-15 08:29:37 +08:00
|
|
|
if (vh->log_fd == (int)LWS_INVALID_FILE) {
|
2016-04-15 12:00:23 +08:00
|
|
|
lwsl_err("unable to open log filepath %s\n",
|
|
|
|
info->log_filepath);
|
|
|
|
goto bail;
|
|
|
|
}
|
2016-05-11 18:59:27 +08:00
|
|
|
#ifndef WIN32
|
2016-04-15 12:00:23 +08:00
|
|
|
if (context->uid != -1)
|
|
|
|
if (chown(info->log_filepath, context->uid,
|
|
|
|
context->gid) == -1)
|
|
|
|
lwsl_err("unable to chown log file %s\n",
|
|
|
|
info->log_filepath);
|
2016-05-11 18:59:27 +08:00
|
|
|
#endif
|
2016-04-15 12:00:23 +08:00
|
|
|
} else
|
2016-05-15 08:29:37 +08:00
|
|
|
vh->log_fd = (int)LWS_INVALID_FILE;
|
2016-04-15 12:00:23 +08:00
|
|
|
#endif
|
2018-03-16 10:06:52 +08:00
|
|
|
if (lws_context_init_server_ssl(info, vh)) {
|
|
|
|
lwsl_err("%s: lws_context_init_server_ssl failed\n", __func__);
|
2017-11-26 09:22:42 +08:00
|
|
|
goto bail1;
|
2018-03-16 10:06:52 +08:00
|
|
|
}
|
|
|
|
if (lws_context_init_client_ssl(info, vh)) {
|
|
|
|
lwsl_err("%s: lws_context_init_client_ssl failed\n", __func__);
|
2017-11-26 09:22:42 +08:00
|
|
|
goto bail1;
|
2018-03-16 10:06:52 +08:00
|
|
|
}
|
2018-06-27 07:15:39 +08:00
|
|
|
lws_context_lock(context, "create_vhost");
|
2018-04-29 10:44:36 +08:00
|
|
|
n = _lws_vhost_init_server(info, vh);
|
2018-04-26 15:27:02 +08:00
|
|
|
lws_context_unlock(context);
|
|
|
|
if (n < 0) {
|
2017-02-18 17:26:40 +08:00
|
|
|
lwsl_err("init server failed\n");
|
2017-11-26 09:22:42 +08:00
|
|
|
goto bail1;
|
2017-02-18 17:26:40 +08:00
|
|
|
}
|
2016-03-28 10:10:43 +08:00
|
|
|
|
2018-04-26 15:27:02 +08:00
|
|
|
|
2016-03-28 10:10:43 +08:00
|
|
|
while (1) {
|
|
|
|
if (!(*vh1)) {
|
|
|
|
*vh1 = vh;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
vh1 = &(*vh1)->vhost_next;
|
|
|
|
};
|
2017-10-28 07:42:44 +08:00
|
|
|
|
2016-11-30 07:05:13 +08:00
|
|
|
/* for the case we are adding a vhost much later, after server init */
|
|
|
|
|
|
|
|
if (context->protocol_init_done)
|
2018-03-16 10:06:52 +08:00
|
|
|
if (lws_protocol_init(context)) {
|
|
|
|
lwsl_err("%s: lws_protocol_init failed\n", __func__);
|
2017-11-26 09:22:42 +08:00
|
|
|
goto bail1;
|
2018-03-16 10:06:52 +08:00
|
|
|
}
|
2016-11-30 07:05:13 +08:00
|
|
|
|
2016-03-28 10:10:43 +08:00
|
|
|
return vh;
|
|
|
|
|
2017-11-26 09:22:42 +08:00
|
|
|
bail1:
|
2018-06-16 13:23:06 +08:00
|
|
|
lws_vhost_destroy(vh);
|
2017-11-26 09:22:42 +08:00
|
|
|
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
#ifdef LWS_WITH_ACCESS_LOG
|
2016-03-28 10:10:43 +08:00
|
|
|
bail:
|
|
|
|
lws_free(vh);
|
2017-11-26 09:22:42 +08:00
|
|
|
#endif
|
2016-03-28 10:10:43 +08:00
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2016-05-12 19:39:29 +08:00
|
|
|
LWS_VISIBLE int
|
|
|
|
lws_init_vhost_client_ssl(const struct lws_context_creation_info *info,
|
|
|
|
struct lws_vhost *vhost)
|
|
|
|
{
|
|
|
|
struct lws_context_creation_info i;
|
|
|
|
|
|
|
|
memcpy(&i, info, sizeof(i));
|
|
|
|
i.port = CONTEXT_PORT_NO_LISTEN;
|
|
|
|
|
|
|
|
return lws_context_init_client_ssl(&i, vhost);
|
|
|
|
}
|
|
|
|
|
2017-10-24 11:59:44 +08:00
|
|
|
LWS_VISIBLE void
|
|
|
|
lws_cancel_service_pt(struct lws *wsi)
|
|
|
|
{
|
|
|
|
lws_plat_pipe_signal(wsi);
|
|
|
|
}
|
|
|
|
|
|
|
|
LWS_VISIBLE void
|
|
|
|
lws_cancel_service(struct lws_context *context)
|
|
|
|
{
|
|
|
|
struct lws_context_per_thread *pt = &context->pt[0];
|
|
|
|
short m = context->count_threads;
|
|
|
|
|
2018-05-02 08:46:16 +08:00
|
|
|
if (context->being_destroyed1)
|
|
|
|
return;
|
|
|
|
|
2018-03-13 13:13:23 +08:00
|
|
|
lwsl_info("%s\n", __func__);
|
2017-10-24 11:59:44 +08:00
|
|
|
|
|
|
|
while (m--) {
|
|
|
|
if (pt->pipe_wsi)
|
|
|
|
lws_plat_pipe_signal(pt->pipe_wsi);
|
|
|
|
pt++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
lws_create_event_pipes(struct lws_context *context)
|
|
|
|
{
|
|
|
|
struct lws *wsi;
|
|
|
|
int n;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Create the pt event pipes... these are unique in that they are
|
|
|
|
* not bound to a vhost or protocol (both are NULL)
|
|
|
|
*/
|
|
|
|
|
|
|
|
for (n = 0; n < context->count_threads; n++) {
|
|
|
|
if (context->pt[n].pipe_wsi)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
wsi = lws_zalloc(sizeof(*wsi), "event pipe wsi");
|
|
|
|
if (!wsi) {
|
|
|
|
lwsl_err("Out of mem\n");
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
wsi->context = context;
|
2018-04-11 13:39:42 +08:00
|
|
|
lws_role_transition(wsi, 0, LRS_UNCONNECTED, &role_ops_pipe);
|
2017-10-24 11:59:44 +08:00
|
|
|
wsi->protocol = NULL;
|
|
|
|
wsi->tsi = n;
|
|
|
|
wsi->vhost = NULL;
|
|
|
|
wsi->event_pipe = 1;
|
2018-05-25 10:49:05 +08:00
|
|
|
wsi->desc.sockfd = LWS_SOCK_INVALID;
|
|
|
|
context->pt[n].pipe_wsi = wsi;
|
|
|
|
context->count_wsi_allocated++;
|
2017-10-24 11:59:44 +08:00
|
|
|
|
2018-05-25 10:49:05 +08:00
|
|
|
if (lws_plat_pipe_create(wsi))
|
|
|
|
/*
|
|
|
|
* platform code returns 0 if it actually created pipes
|
|
|
|
* and initialized pt->dummy_pipe_fds[]. If it used
|
|
|
|
* some other mechanism outside of signaling in the
|
|
|
|
* normal event loop, we skip treating the pipe as
|
|
|
|
* related to dummy_pipe_fds[], adding it to the fds,
|
|
|
|
* etc.
|
|
|
|
*/
|
2017-10-24 11:59:44 +08:00
|
|
|
continue;
|
2018-05-25 10:49:05 +08:00
|
|
|
|
2017-10-24 11:59:44 +08:00
|
|
|
wsi->desc.sockfd = context->pt[n].dummy_pipe_fds[0];
|
|
|
|
lwsl_debug("event pipe fd %d\n", wsi->desc.sockfd);
|
|
|
|
|
2018-04-29 10:44:36 +08:00
|
|
|
if (context->event_loop_ops->accept)
|
|
|
|
context->event_loop_ops->accept(wsi);
|
2017-10-24 11:59:44 +08:00
|
|
|
|
2018-03-05 16:49:28 +08:00
|
|
|
if (__insert_wsi_socket_into_fds(context, wsi))
|
2017-10-24 11:59:44 +08:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2018-04-29 10:44:36 +08:00
|
|
|
void
|
2018-01-17 02:05:45 +01:00
|
|
|
lws_destroy_event_pipe(struct lws *wsi)
|
|
|
|
{
|
2018-04-29 10:44:36 +08:00
|
|
|
lwsl_info("%s\n", __func__);
|
2018-03-05 16:49:28 +08:00
|
|
|
__remove_wsi_socket_from_fds(wsi);
|
2018-04-29 10:44:36 +08:00
|
|
|
|
|
|
|
if (wsi->context->event_loop_ops->wsi_logical_close) {
|
|
|
|
wsi->context->event_loop_ops->wsi_logical_close(wsi);
|
|
|
|
lws_plat_pipe_close(wsi);
|
2018-09-04 08:06:46 +08:00
|
|
|
wsi->context->count_wsi_allocated--;
|
2018-04-29 10:44:36 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (wsi->context->event_loop_ops->destroy_wsi)
|
|
|
|
wsi->context->event_loop_ops->destroy_wsi(wsi);
|
|
|
|
lws_plat_pipe_close(wsi);
|
2018-01-17 02:05:45 +01:00
|
|
|
wsi->context->count_wsi_allocated--;
|
|
|
|
lws_free(wsi);
|
|
|
|
}
|
|
|
|
|
2015-12-04 11:08:32 +08:00
|
|
|
LWS_VISIBLE struct lws_context *
|
2018-04-27 08:27:16 +08:00
|
|
|
lws_create_context(const struct lws_context_creation_info *info)
|
2014-04-03 07:29:50 +08:00
|
|
|
{
|
2015-12-04 11:08:32 +08:00
|
|
|
struct lws_context *context = NULL;
|
2017-03-03 12:38:10 +08:00
|
|
|
struct lws_plat_file_ops *prev;
|
2015-12-06 11:00:36 +08:00
|
|
|
#ifndef LWS_NO_DAEMONIZE
|
2014-04-03 07:29:50 +08:00
|
|
|
int pid_daemon = get_daemonize_pid();
|
2015-11-02 20:34:12 +08:00
|
|
|
#endif
|
2017-10-06 16:07:57 +08:00
|
|
|
int n;
|
2016-04-08 16:02:59 +08:00
|
|
|
#if defined(__ANDROID__)
|
|
|
|
struct rlimit rt;
|
|
|
|
#endif
|
|
|
|
|
2018-05-01 12:41:42 +08:00
|
|
|
|
|
|
|
|
2017-09-19 17:30:06 +08:00
|
|
|
lwsl_info("Initial logging level %d\n", log_level);
|
|
|
|
lwsl_info("Libwebsockets version: %s\n", library_version);
|
2018-04-11 13:39:42 +08:00
|
|
|
|
2017-09-28 11:29:03 +08:00
|
|
|
#ifdef LWS_WITH_IPV6
|
2016-03-23 09:22:11 +08:00
|
|
|
if (!lws_check_opt(info->options, LWS_SERVER_OPTION_DISABLE_IPV6))
|
2017-09-19 17:30:06 +08:00
|
|
|
lwsl_info("IPV6 compiled in and enabled\n");
|
2014-04-03 07:29:50 +08:00
|
|
|
else
|
2017-09-19 17:30:06 +08:00
|
|
|
lwsl_info("IPV6 compiled in but disabled\n");
|
2014-04-03 07:29:50 +08:00
|
|
|
#else
|
2017-09-19 17:30:06 +08:00
|
|
|
lwsl_info("IPV6 not compiled in\n");
|
2014-04-03 07:29:50 +08:00
|
|
|
#endif
|
2018-04-30 09:16:04 +08:00
|
|
|
|
2016-01-26 20:56:56 +08:00
|
|
|
lwsl_info(" LWS_DEF_HEADER_LEN : %u\n", LWS_DEF_HEADER_LEN);
|
2016-01-19 03:34:24 +08:00
|
|
|
lwsl_info(" LWS_MAX_PROTOCOLS : %u\n", LWS_MAX_PROTOCOLS);
|
|
|
|
lwsl_info(" LWS_MAX_SMP : %u\n", LWS_MAX_SMP);
|
2017-02-05 22:07:34 +08:00
|
|
|
lwsl_info(" sizeof (*info) : %ld\n", (long)sizeof(*info));
|
2017-05-07 10:02:03 +08:00
|
|
|
#if defined(LWS_WITH_STATS)
|
2017-09-19 17:30:06 +08:00
|
|
|
lwsl_info(" LWS_WITH_STATS : on\n");
|
2017-05-07 10:02:03 +08:00
|
|
|
#endif
|
2014-04-03 07:29:50 +08:00
|
|
|
lwsl_info(" SYSTEM_RANDOM_FILEPATH: '%s'\n", SYSTEM_RANDOM_FILEPATH);
|
2017-10-13 10:33:02 +08:00
|
|
|
#if defined(LWS_WITH_HTTP2)
|
|
|
|
lwsl_info(" HTTP2 support : available\n");
|
|
|
|
#else
|
2017-10-26 07:24:45 +08:00
|
|
|
lwsl_info(" HTTP2 support : not configured\n");
|
2015-11-08 12:10:26 +08:00
|
|
|
#endif
|
2014-04-03 07:29:50 +08:00
|
|
|
if (lws_plat_context_early_init())
|
|
|
|
return NULL;
|
|
|
|
|
2017-10-04 07:10:39 +08:00
|
|
|
context = lws_zalloc(sizeof(struct lws_context), "context");
|
2014-04-03 07:29:50 +08:00
|
|
|
if (!context) {
|
|
|
|
lwsl_err("No memory for websocket context\n");
|
|
|
|
return NULL;
|
|
|
|
}
|
2018-05-01 12:41:42 +08:00
|
|
|
|
|
|
|
#if defined(LWS_WITH_TLS)
|
|
|
|
#if defined(LWS_WITH_MBEDTLS)
|
|
|
|
context->tls_ops = &tls_ops_mbedtls;
|
|
|
|
#else
|
|
|
|
context->tls_ops = &tls_ops_openssl;
|
|
|
|
#endif
|
|
|
|
#endif
|
|
|
|
|
2016-05-19 12:34:35 +08:00
|
|
|
if (info->pt_serv_buf_size)
|
|
|
|
context->pt_serv_buf_size = info->pt_serv_buf_size;
|
|
|
|
else
|
|
|
|
context->pt_serv_buf_size = 4096;
|
|
|
|
|
2018-04-11 13:39:42 +08:00
|
|
|
#if defined(LWS_ROLE_H2)
|
|
|
|
role_ops_h2.init_context(context, info);
|
2017-10-13 10:33:02 +08:00
|
|
|
#endif
|
|
|
|
|
2017-09-14 13:14:11 +08:00
|
|
|
#if LWS_MAX_SMP > 1
|
2018-06-27 07:15:39 +08:00
|
|
|
lws_mutex_refcount_init(&context->mr);
|
2017-09-14 13:14:11 +08:00
|
|
|
#endif
|
|
|
|
|
2017-09-11 10:23:30 +08:00
|
|
|
#if defined(LWS_WITH_ESP32)
|
|
|
|
context->last_free_heap = esp_get_free_heap_size();
|
|
|
|
#endif
|
|
|
|
|
2017-03-01 14:28:56 +08:00
|
|
|
/* default to just the platform fops implementation */
|
|
|
|
|
2017-03-08 11:11:41 +08:00
|
|
|
context->fops_platform.LWS_FOP_OPEN = _lws_plat_file_open;
|
|
|
|
context->fops_platform.LWS_FOP_CLOSE = _lws_plat_file_close;
|
|
|
|
context->fops_platform.LWS_FOP_SEEK_CUR = _lws_plat_file_seek_cur;
|
|
|
|
context->fops_platform.LWS_FOP_READ = _lws_plat_file_read;
|
|
|
|
context->fops_platform.LWS_FOP_WRITE = _lws_plat_file_write;
|
2017-03-03 12:38:10 +08:00
|
|
|
context->fops_platform.fi[0].sig = NULL;
|
2017-03-01 14:28:56 +08:00
|
|
|
|
2017-03-03 12:38:10 +08:00
|
|
|
/*
|
|
|
|
* arrange a linear linked-list of fops starting from context->fops
|
|
|
|
*
|
|
|
|
* platform fops
|
|
|
|
* [ -> fops_zip (copied into context so .next settable) ]
|
|
|
|
* [ -> info->fops ]
|
|
|
|
*/
|
|
|
|
|
|
|
|
context->fops = &context->fops_platform;
|
|
|
|
prev = (struct lws_plat_file_ops *)context->fops;
|
2017-03-01 14:28:56 +08:00
|
|
|
|
2017-03-03 12:38:10 +08:00
|
|
|
#if defined(LWS_WITH_ZIP_FOPS)
|
|
|
|
/* make a soft copy so we can set .next */
|
|
|
|
context->fops_zip = fops_zip;
|
|
|
|
prev->next = &context->fops_zip;
|
|
|
|
prev = (struct lws_plat_file_ops *)prev->next;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* if user provided fops, tack them on the end of the list */
|
2017-03-01 14:28:56 +08:00
|
|
|
if (info->fops)
|
2017-03-03 12:38:10 +08:00
|
|
|
prev->next = info->fops;
|
2017-03-01 14:28:56 +08:00
|
|
|
|
2016-10-13 06:32:57 +08:00
|
|
|
context->reject_service_keywords = info->reject_service_keywords;
|
2016-12-04 07:34:05 +08:00
|
|
|
if (info->external_baggage_free_on_destroy)
|
|
|
|
context->external_baggage_free_on_destroy =
|
|
|
|
info->external_baggage_free_on_destroy;
|
2016-10-13 06:32:57 +08:00
|
|
|
|
2016-04-15 14:01:29 +08:00
|
|
|
context->time_up = time(NULL);
|
2018-04-29 10:44:36 +08:00
|
|
|
context->pcontext_finalize = info->pcontext;
|
context deprecation
1) This makes lwsws run a parent process with the original permissions.
But this process is only able to respond to SIGHUP, it doesn't do anything
else.
2) You can send this parent process a SIGHUP now to cause it to
- close listening sockets in existing lwsws processes
- mark those processes as to exit when the number of active connections
on the falls to zero
- spawn a fresh child process from scratch, using latest configuration
file content, latest plugins, etc. It can now reopen listening sockets
if it chooses to, or open different listen ports or whatever.
Notes:
1) lws_context_destroy() has been split into two pieces... the reason for
the split is the first part closes the per-vhost protocols, but since
they may have created libuv objects in the per-vhost protocol storage,
these cannot be freed until after the loop has been run.
That's the purpose of the second part of the context destruction,
lws_context_destroy2().
For compatibility, if you are not using libuv, the first part calls the
second part. However if you are using libuv, you must now call the
second part from your own main.c after the first part.
2016-12-16 07:37:43 +08:00
|
|
|
|
2017-10-28 07:42:44 +08:00
|
|
|
context->simultaneous_ssl_restriction =
|
|
|
|
info->simultaneous_ssl_restriction;
|
2017-03-16 10:46:31 +08:00
|
|
|
|
2015-12-06 11:00:36 +08:00
|
|
|
#ifndef LWS_NO_DAEMONIZE
|
2014-04-12 10:07:02 +08:00
|
|
|
if (pid_daemon) {
|
|
|
|
context->started_with_parent = pid_daemon;
|
2017-09-19 17:30:06 +08:00
|
|
|
lwsl_info(" Started with daemon pid %d\n", pid_daemon);
|
2014-04-12 10:07:02 +08:00
|
|
|
}
|
2015-11-02 20:34:12 +08:00
|
|
|
#endif
|
2016-04-08 16:02:59 +08:00
|
|
|
#if defined(__ANDROID__)
|
|
|
|
n = getrlimit ( RLIMIT_NOFILE,&rt);
|
|
|
|
if (-1 == n) {
|
|
|
|
lwsl_err("Get RLIMIT_NOFILE failed!\n");
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
context->max_fds = rt.rlim_cur;
|
|
|
|
#else
|
|
|
|
context->max_fds = getdtablesize();
|
|
|
|
#endif
|
2016-01-19 03:34:24 +08:00
|
|
|
|
|
|
|
if (info->count_threads)
|
|
|
|
context->count_threads = info->count_threads;
|
|
|
|
else
|
|
|
|
context->count_threads = 1;
|
|
|
|
|
|
|
|
if (context->count_threads > LWS_MAX_SMP)
|
|
|
|
context->count_threads = LWS_MAX_SMP;
|
|
|
|
|
2014-06-29 00:25:19 -04:00
|
|
|
context->token_limits = info->token_limits;
|
2016-03-28 10:10:43 +08:00
|
|
|
|
2014-04-03 07:29:50 +08:00
|
|
|
context->options = info->options;
|
2016-03-28 10:10:43 +08:00
|
|
|
|
2018-04-29 10:44:36 +08:00
|
|
|
/*
|
|
|
|
* set the context event loops ops struct
|
|
|
|
*
|
|
|
|
* after this, all event_loop actions use the generic ops
|
|
|
|
*/
|
|
|
|
|
|
|
|
#if defined(LWS_WITH_POLL)
|
|
|
|
context->event_loop_ops = &event_loop_ops_poll;
|
|
|
|
#endif
|
|
|
|
|
2018-04-30 09:16:04 +08:00
|
|
|
if (lws_check_opt(context->options, LWS_SERVER_OPTION_LIBUV))
|
2018-04-29 10:44:36 +08:00
|
|
|
#if defined(LWS_WITH_LIBUV)
|
|
|
|
context->event_loop_ops = &event_loop_ops_uv;
|
2018-04-30 09:16:04 +08:00
|
|
|
#else
|
|
|
|
goto fail_event_libs;
|
2018-04-29 10:44:36 +08:00
|
|
|
#endif
|
2018-04-30 09:16:04 +08:00
|
|
|
|
|
|
|
if (lws_check_opt(context->options, LWS_SERVER_OPTION_LIBEV))
|
2018-04-29 10:44:36 +08:00
|
|
|
#if defined(LWS_WITH_LIBEV)
|
|
|
|
context->event_loop_ops = &event_loop_ops_ev;
|
2018-04-30 09:16:04 +08:00
|
|
|
#else
|
|
|
|
goto fail_event_libs;
|
2018-04-29 10:44:36 +08:00
|
|
|
#endif
|
2018-04-30 09:16:04 +08:00
|
|
|
|
|
|
|
if (lws_check_opt(context->options, LWS_SERVER_OPTION_LIBEVENT))
|
2018-04-29 10:44:36 +08:00
|
|
|
#if defined(LWS_WITH_LIBEVENT)
|
|
|
|
context->event_loop_ops = &event_loop_ops_event;
|
2018-04-30 09:16:04 +08:00
|
|
|
#else
|
|
|
|
goto fail_event_libs;
|
2018-04-29 10:44:36 +08:00
|
|
|
#endif
|
|
|
|
|
2018-04-30 09:16:04 +08:00
|
|
|
if (!context->event_loop_ops)
|
|
|
|
goto fail_event_libs;
|
2018-04-29 10:44:36 +08:00
|
|
|
|
|
|
|
lwsl_info("Using event loop: %s\n", context->event_loop_ops->name);
|
|
|
|
|
2018-04-12 15:56:38 +08:00
|
|
|
#if defined(LWS_WITH_TLS)
|
2018-05-02 18:35:58 +08:00
|
|
|
time(&context->tls.last_cert_check_s);
|
2018-04-12 15:56:38 +08:00
|
|
|
if (info->alpn)
|
2018-05-01 12:41:42 +08:00
|
|
|
context->tls.alpn_default = info->alpn;
|
2018-04-12 15:56:38 +08:00
|
|
|
else {
|
2018-05-01 12:41:42 +08:00
|
|
|
char *p = context->tls.alpn_discovered, first = 1;
|
2018-04-12 15:56:38 +08:00
|
|
|
|
2018-04-25 08:42:18 +08:00
|
|
|
LWS_FOR_EVERY_AVAILABLE_ROLE_START(ar) {
|
|
|
|
if (ar->alpn) {
|
2018-04-12 15:56:38 +08:00
|
|
|
if (!first)
|
|
|
|
*p++ = ',';
|
2018-05-01 12:41:42 +08:00
|
|
|
p += lws_snprintf(p,
|
|
|
|
context->tls.alpn_discovered +
|
|
|
|
sizeof(context->tls.alpn_discovered) -
|
|
|
|
2 - p, "%s", ar->alpn);
|
2018-04-12 15:56:38 +08:00
|
|
|
first = 0;
|
|
|
|
}
|
2018-04-25 08:42:18 +08:00
|
|
|
} LWS_FOR_EVERY_AVAILABLE_ROLE_END;
|
|
|
|
|
2018-05-01 12:41:42 +08:00
|
|
|
context->tls.alpn_default = context->tls.alpn_discovered;
|
2018-04-12 15:56:38 +08:00
|
|
|
}
|
|
|
|
|
2018-05-01 12:41:42 +08:00
|
|
|
lwsl_info("Default ALPN advertisment: %s\n", context->tls.alpn_default);
|
2018-04-12 15:56:38 +08:00
|
|
|
#endif
|
|
|
|
|
2016-02-15 20:36:02 +08:00
|
|
|
if (info->timeout_secs)
|
|
|
|
context->timeout_secs = info->timeout_secs;
|
|
|
|
else
|
|
|
|
context->timeout_secs = AWAITING_TIMEOUT;
|
|
|
|
|
2016-07-15 13:41:38 +08:00
|
|
|
context->ws_ping_pong_interval = info->ws_ping_pong_interval;
|
|
|
|
|
2016-02-15 20:36:02 +08:00
|
|
|
lwsl_info(" default timeout (secs): %u\n", context->timeout_secs);
|
2014-07-29 15:36:06 +03:00
|
|
|
|
2016-01-26 20:56:56 +08:00
|
|
|
if (info->max_http_header_data)
|
|
|
|
context->max_http_header_data = info->max_http_header_data;
|
|
|
|
else
|
2016-06-02 12:32:38 +08:00
|
|
|
if (info->max_http_header_data2)
|
|
|
|
context->max_http_header_data =
|
|
|
|
info->max_http_header_data2;
|
|
|
|
else
|
|
|
|
context->max_http_header_data = LWS_DEF_HEADER_LEN;
|
2018-01-14 10:18:32 +08:00
|
|
|
|
2016-01-26 20:56:56 +08:00
|
|
|
if (info->max_http_header_pool)
|
|
|
|
context->max_http_header_pool = info->max_http_header_pool;
|
|
|
|
else
|
2018-06-19 13:27:54 +08:00
|
|
|
if (info->max_http_header_pool2)
|
|
|
|
context->max_http_header_pool =
|
|
|
|
info->max_http_header_pool2;
|
|
|
|
else
|
|
|
|
context->max_http_header_pool = context->max_fds;
|
2016-01-26 20:56:56 +08:00
|
|
|
|
2018-04-29 10:44:36 +08:00
|
|
|
if (info->fd_limit_per_thread)
|
|
|
|
context->fd_limit_per_thread = info->fd_limit_per_thread;
|
|
|
|
else
|
|
|
|
context->fd_limit_per_thread = context->max_fds /
|
|
|
|
context->count_threads;
|
|
|
|
|
2016-01-26 20:56:56 +08:00
|
|
|
/*
|
|
|
|
* Allocate the per-thread storage for scratchpad buffers,
|
|
|
|
* and header data pool
|
2016-01-19 03:34:24 +08:00
|
|
|
*/
|
|
|
|
for (n = 0; n < context->count_threads; n++) {
|
2017-10-06 16:07:57 +08:00
|
|
|
context->pt[n].serv_buf = lws_malloc(context->pt_serv_buf_size,
|
|
|
|
"pt_serv_buf");
|
2016-01-19 03:34:24 +08:00
|
|
|
if (!context->pt[n].serv_buf) {
|
|
|
|
lwsl_err("OOM\n");
|
|
|
|
return NULL;
|
|
|
|
}
|
2016-01-26 20:56:56 +08:00
|
|
|
|
2016-02-27 11:03:27 +08:00
|
|
|
context->pt[n].context = context;
|
|
|
|
context->pt[n].tid = n;
|
2018-04-29 10:44:36 +08:00
|
|
|
|
2018-04-27 19:16:50 +08:00
|
|
|
#if defined(LWS_ROLE_H1) || defined(LWS_ROLE_H2)
|
2018-04-27 15:20:56 +08:00
|
|
|
context->pt[n].http.ah_list = NULL;
|
|
|
|
context->pt[n].http.ah_pool_length = 0;
|
2018-04-27 19:16:50 +08:00
|
|
|
#endif
|
2016-01-26 20:56:56 +08:00
|
|
|
lws_pt_mutex_init(&context->pt[n]);
|
2016-01-19 03:34:24 +08:00
|
|
|
}
|
|
|
|
|
2017-09-19 17:30:06 +08:00
|
|
|
lwsl_info(" Threads: %d each %d fds\n", context->count_threads,
|
2016-01-19 03:34:24 +08:00
|
|
|
context->fd_limit_per_thread);
|
|
|
|
|
2015-10-16 10:54:04 +08:00
|
|
|
if (!info->ka_interval && info->ka_time > 0) {
|
|
|
|
lwsl_err("info->ka_interval can't be 0 if ka_time used\n");
|
|
|
|
return NULL;
|
|
|
|
}
|
2015-12-14 08:52:03 +08:00
|
|
|
|
2017-09-14 13:14:11 +08:00
|
|
|
#if defined(LWS_WITH_PEER_LIMITS)
|
|
|
|
/* scale the peer hash table according to the max fds for the process,
|
|
|
|
* so that the max list depth averages 16. Eg, 1024 fd -> 64,
|
|
|
|
* 102400 fd -> 6400
|
|
|
|
*/
|
2018-08-02 19:13:53 +08:00
|
|
|
|
2017-09-14 13:14:11 +08:00
|
|
|
context->pl_hash_elements =
|
|
|
|
(context->count_threads * context->fd_limit_per_thread) / 16;
|
|
|
|
context->pl_hash_table = lws_zalloc(sizeof(struct lws_peer *) *
|
2017-10-04 07:10:39 +08:00
|
|
|
context->pl_hash_elements, "peer limits hash table");
|
2018-08-02 19:13:53 +08:00
|
|
|
|
2017-09-14 13:14:11 +08:00
|
|
|
context->ip_limit_ah = info->ip_limit_ah;
|
|
|
|
context->ip_limit_wsi = info->ip_limit_wsi;
|
|
|
|
#endif
|
|
|
|
|
2017-10-28 07:42:44 +08:00
|
|
|
lwsl_info(" mem: context: %5lu B (%ld ctx + (%ld thr x %d))\n",
|
2017-02-05 22:07:34 +08:00
|
|
|
(long)sizeof(struct lws_context) +
|
2016-05-19 12:34:35 +08:00
|
|
|
(context->count_threads * context->pt_serv_buf_size),
|
2017-02-05 22:07:34 +08:00
|
|
|
(long)sizeof(struct lws_context),
|
|
|
|
(long)context->count_threads,
|
2016-05-19 12:34:35 +08:00
|
|
|
context->pt_serv_buf_size);
|
2018-04-27 19:16:50 +08:00
|
|
|
#if defined(LWS_ROLE_H1) || defined(LWS_ROLE_H2)
|
2017-10-28 07:42:44 +08:00
|
|
|
lwsl_info(" mem: http hdr rsvd: %5lu B (%u thr x (%u + %lu) x %u))\n",
|
2017-02-05 22:07:34 +08:00
|
|
|
(long)(context->max_http_header_data +
|
2016-01-19 03:34:24 +08:00
|
|
|
sizeof(struct allocated_headers)) *
|
2016-01-26 20:56:56 +08:00
|
|
|
context->max_http_header_pool * context->count_threads,
|
|
|
|
context->count_threads,
|
2016-01-19 03:34:24 +08:00
|
|
|
context->max_http_header_data,
|
2017-02-05 22:07:34 +08:00
|
|
|
(long)sizeof(struct allocated_headers),
|
2015-12-25 12:44:12 +08:00
|
|
|
context->max_http_header_pool);
|
2018-04-27 19:16:50 +08:00
|
|
|
#endif
|
2016-01-19 03:34:24 +08:00
|
|
|
n = sizeof(struct lws_pollfd) * context->count_threads *
|
|
|
|
context->fd_limit_per_thread;
|
2017-10-04 07:10:39 +08:00
|
|
|
context->pt[0].fds = lws_zalloc(n, "fds table");
|
2016-01-19 03:34:24 +08:00
|
|
|
if (context->pt[0].fds == NULL) {
|
2015-12-04 16:54:12 +08:00
|
|
|
lwsl_err("OOM allocating %d fds\n", context->max_fds);
|
2015-06-25 17:51:07 +02:00
|
|
|
goto bail;
|
2014-04-03 07:29:50 +08:00
|
|
|
}
|
2016-01-19 03:34:24 +08:00
|
|
|
lwsl_info(" mem: pollfd map: %5u\n", n);
|
2016-01-26 20:56:56 +08:00
|
|
|
|
2016-04-15 13:33:52 +08:00
|
|
|
if (info->server_string) {
|
|
|
|
context->server_string = info->server_string;
|
2016-05-04 11:11:15 +08:00
|
|
|
context->server_string_len = (short)
|
|
|
|
strlen(context->server_string);
|
2016-04-15 13:33:52 +08:00
|
|
|
}
|
|
|
|
|
2016-01-26 20:56:56 +08:00
|
|
|
#if LWS_MAX_SMP > 1
|
2016-01-19 03:34:24 +08:00
|
|
|
/* each thread serves his own chunk of fds */
|
|
|
|
for (n = 1; n < (int)info->count_threads; n++)
|
2016-01-26 20:56:56 +08:00
|
|
|
context->pt[n].fds = context->pt[n - 1].fds +
|
|
|
|
context->fd_limit_per_thread;
|
|
|
|
#endif
|
2015-12-25 12:44:12 +08:00
|
|
|
|
2015-12-10 07:14:16 +08:00
|
|
|
if (lws_plat_init(context, info))
|
2015-06-25 17:51:07 +02:00
|
|
|
goto bail;
|
2015-11-08 12:10:26 +08:00
|
|
|
|
2018-04-29 10:44:36 +08:00
|
|
|
if (context->event_loop_ops->init_context)
|
|
|
|
if (context->event_loop_ops->init_context(context, info))
|
|
|
|
goto bail;
|
|
|
|
|
|
|
|
|
|
|
|
if (context->event_loop_ops->init_pt)
|
|
|
|
for (n = 0; n < context->count_threads; n++) {
|
|
|
|
void *lp = NULL;
|
|
|
|
|
|
|
|
if (info->foreign_loops)
|
|
|
|
lp = info->foreign_loops[n];
|
|
|
|
|
|
|
|
if (context->event_loop_ops->init_pt(context, lp, n))
|
|
|
|
goto bail;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (lws_create_event_pipes(context))
|
|
|
|
goto bail;
|
|
|
|
|
2016-03-28 10:10:43 +08:00
|
|
|
lws_context_init_ssl_library(info);
|
|
|
|
|
2016-04-13 11:42:53 +08:00
|
|
|
context->user_space = info->user;
|
|
|
|
|
2016-03-28 10:10:43 +08:00
|
|
|
/*
|
|
|
|
* if he's not saying he'll make his own vhosts later then act
|
|
|
|
* compatibly and make a default vhost using the data in the info
|
|
|
|
*/
|
|
|
|
if (!lws_check_opt(info->options, LWS_SERVER_OPTION_EXPLICIT_VHOSTS))
|
2016-05-02 04:59:54 +08:00
|
|
|
if (!lws_create_vhost(context, info)) {
|
2016-03-28 10:10:43 +08:00
|
|
|
lwsl_err("Failed to create default vhost\n");
|
2018-03-22 14:54:25 +08:00
|
|
|
for (n = 0; n < context->count_threads; n++)
|
|
|
|
lws_free_set_NULL(context->pt[n].serv_buf);
|
|
|
|
#if defined(LWS_WITH_PEER_LIMITS)
|
|
|
|
lws_free_set_NULL(context->pl_hash_table);
|
|
|
|
#endif
|
|
|
|
lws_free_set_NULL(context->pt[0].fds);
|
|
|
|
lws_plat_context_late_destroy(context);
|
|
|
|
lws_free_set_NULL(context);
|
2016-03-28 10:10:43 +08:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2014-04-12 10:07:02 +08:00
|
|
|
lws_context_init_extensions(info, context);
|
|
|
|
|
2017-09-19 17:30:06 +08:00
|
|
|
lwsl_info(" mem: per-conn: %5lu bytes + protocol rx buf\n",
|
2017-02-04 13:09:00 +01:00
|
|
|
(unsigned long)sizeof(struct lws));
|
2014-04-03 07:29:50 +08:00
|
|
|
|
2015-12-25 12:44:12 +08:00
|
|
|
strcpy(context->canonical_hostname, "unknown");
|
2014-04-12 10:07:02 +08:00
|
|
|
lws_server_get_canonical_hostname(context, info);
|
2014-04-03 07:29:50 +08:00
|
|
|
|
2016-03-28 10:10:43 +08:00
|
|
|
context->uid = info->uid;
|
|
|
|
context->gid = info->gid;
|
2014-04-03 07:29:50 +08:00
|
|
|
|
2017-06-07 06:10:02 +08:00
|
|
|
#if defined(LWS_HAVE_SYS_CAPABILITY_H) && defined(LWS_HAVE_LIBCAP)
|
|
|
|
memcpy(context->caps, info->caps, sizeof(context->caps));
|
|
|
|
context->count_caps = info->count_caps;
|
|
|
|
#endif
|
|
|
|
|
2014-04-03 07:29:50 +08:00
|
|
|
/*
|
|
|
|
* drop any root privs for this process
|
|
|
|
* to listen on port < 1023 we would have needed root, but now we are
|
|
|
|
* listening, we don't want the power for anything else
|
|
|
|
*/
|
2016-03-28 10:10:43 +08:00
|
|
|
if (!lws_check_opt(info->options, LWS_SERVER_OPTION_EXPLICIT_VHOSTS))
|
|
|
|
lws_plat_drop_app_privileges(info);
|
2014-04-03 07:29:50 +08:00
|
|
|
|
2018-04-20 10:33:23 +08:00
|
|
|
/* expedite post-context init (eg, protocols) */
|
|
|
|
lws_cancel_service(context);
|
|
|
|
|
2017-10-18 19:27:38 +08:00
|
|
|
#if defined(LWS_WITH_SELFTESTS)
|
|
|
|
lws_jws_selftest();
|
|
|
|
#endif
|
|
|
|
|
2014-04-03 07:29:50 +08:00
|
|
|
return context;
|
|
|
|
|
|
|
|
bail:
|
2015-12-04 08:43:54 +08:00
|
|
|
lws_context_destroy(context);
|
2018-03-22 14:54:25 +08:00
|
|
|
|
2018-04-30 09:16:04 +08:00
|
|
|
return NULL;
|
|
|
|
|
|
|
|
fail_event_libs:
|
|
|
|
lwsl_err("Requested event library support not configured, available:\n");
|
|
|
|
{
|
|
|
|
const struct lws_event_loop_ops **elops = available_event_libs;
|
|
|
|
|
|
|
|
while (*elops) {
|
|
|
|
lwsl_err(" - %s\n", (*elops)->name);
|
|
|
|
elops++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
lws_free(context);
|
|
|
|
|
2014-04-03 07:29:50 +08:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
context deprecation
1) This makes lwsws run a parent process with the original permissions.
But this process is only able to respond to SIGHUP, it doesn't do anything
else.
2) You can send this parent process a SIGHUP now to cause it to
- close listening sockets in existing lwsws processes
- mark those processes as to exit when the number of active connections
on the falls to zero
- spawn a fresh child process from scratch, using latest configuration
file content, latest plugins, etc. It can now reopen listening sockets
if it chooses to, or open different listen ports or whatever.
Notes:
1) lws_context_destroy() has been split into two pieces... the reason for
the split is the first part closes the per-vhost protocols, but since
they may have created libuv objects in the per-vhost protocol storage,
these cannot be freed until after the loop has been run.
That's the purpose of the second part of the context destruction,
lws_context_destroy2().
For compatibility, if you are not using libuv, the first part calls the
second part. However if you are using libuv, you must now call the
second part from your own main.c after the first part.
2016-12-16 07:37:43 +08:00
|
|
|
LWS_VISIBLE LWS_EXTERN void
|
|
|
|
lws_context_deprecate(struct lws_context *context, lws_reload_func cb)
|
|
|
|
{
|
|
|
|
struct lws_vhost *vh = context->vhost_list, *vh1;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* "deprecation" means disable the context from accepting any new
|
|
|
|
* connections and free up listen sockets to be used by a replacement
|
|
|
|
* context.
|
|
|
|
*
|
|
|
|
* Otherwise the deprecated context remains operational, until its
|
|
|
|
* number of connected sockets falls to zero, when it is deleted.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/* for each vhost, close his listen socket */
|
|
|
|
|
|
|
|
while (vh) {
|
2018-10-10 13:54:43 +08:00
|
|
|
struct lws *wsi = vh->lserv_wsi;
|
|
|
|
|
context deprecation
1) This makes lwsws run a parent process with the original permissions.
But this process is only able to respond to SIGHUP, it doesn't do anything
else.
2) You can send this parent process a SIGHUP now to cause it to
- close listening sockets in existing lwsws processes
- mark those processes as to exit when the number of active connections
on the falls to zero
- spawn a fresh child process from scratch, using latest configuration
file content, latest plugins, etc. It can now reopen listening sockets
if it chooses to, or open different listen ports or whatever.
Notes:
1) lws_context_destroy() has been split into two pieces... the reason for
the split is the first part closes the per-vhost protocols, but since
they may have created libuv objects in the per-vhost protocol storage,
these cannot be freed until after the loop has been run.
That's the purpose of the second part of the context destruction,
lws_context_destroy2().
For compatibility, if you are not using libuv, the first part calls the
second part. However if you are using libuv, you must now call the
second part from your own main.c after the first part.
2016-12-16 07:37:43 +08:00
|
|
|
if (wsi) {
|
|
|
|
wsi->socket_is_permanently_unusable = 1;
|
2018-02-03 13:48:18 +08:00
|
|
|
lws_close_free_wsi(wsi, LWS_CLOSE_STATUS_NOSTATUS, "ctx deprecate");
|
context deprecation
1) This makes lwsws run a parent process with the original permissions.
But this process is only able to respond to SIGHUP, it doesn't do anything
else.
2) You can send this parent process a SIGHUP now to cause it to
- close listening sockets in existing lwsws processes
- mark those processes as to exit when the number of active connections
on the falls to zero
- spawn a fresh child process from scratch, using latest configuration
file content, latest plugins, etc. It can now reopen listening sockets
if it chooses to, or open different listen ports or whatever.
Notes:
1) lws_context_destroy() has been split into two pieces... the reason for
the split is the first part closes the per-vhost protocols, but since
they may have created libuv objects in the per-vhost protocol storage,
these cannot be freed until after the loop has been run.
That's the purpose of the second part of the context destruction,
lws_context_destroy2().
For compatibility, if you are not using libuv, the first part calls the
second part. However if you are using libuv, you must now call the
second part from your own main.c after the first part.
2016-12-16 07:37:43 +08:00
|
|
|
wsi->context->deprecation_pending_listen_close_count++;
|
|
|
|
/*
|
|
|
|
* other vhosts can share the listen port, they
|
|
|
|
* point to the same wsi. So zap those too.
|
|
|
|
*/
|
|
|
|
vh1 = context->vhost_list;
|
|
|
|
while (vh1) {
|
|
|
|
if (vh1->lserv_wsi == wsi)
|
|
|
|
vh1->lserv_wsi = NULL;
|
|
|
|
vh1 = vh1->vhost_next;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
vh = vh->vhost_next;
|
|
|
|
}
|
|
|
|
|
|
|
|
context->deprecated = 1;
|
|
|
|
context->deprecation_cb = cb;
|
|
|
|
}
|
|
|
|
|
|
|
|
LWS_VISIBLE LWS_EXTERN int
|
|
|
|
lws_context_is_deprecated(struct lws_context *context)
|
|
|
|
{
|
|
|
|
return context->deprecated;
|
|
|
|
}
|
|
|
|
|
2018-03-30 20:22:46 +08:00
|
|
|
void
|
2017-07-15 14:37:04 +08:00
|
|
|
lws_vhost_destroy1(struct lws_vhost *vh)
|
|
|
|
{
|
|
|
|
struct lws_context *context = vh->context;
|
|
|
|
|
2017-09-19 17:30:06 +08:00
|
|
|
lwsl_info("%s\n", __func__);
|
2017-07-15 14:37:04 +08:00
|
|
|
|
2018-06-27 07:49:04 +08:00
|
|
|
lws_context_lock(context, "vhost destroy 1"); /* ---------- context { */
|
|
|
|
|
2017-07-15 14:37:04 +08:00
|
|
|
if (vh->being_destroyed)
|
2018-06-27 07:49:04 +08:00
|
|
|
goto out;
|
2017-07-15 14:37:04 +08:00
|
|
|
|
vhost_destroy: use vhost wsi reference counting to trigger destroy
This changes the vhost destroy flow to only hand off the listen
socket if another vhost sharing it, and mark the vhost as
being_destroyed.
Each tsi calls lws_check_deferred_free() once a second, if it sees
any vhost being_destroyed there, it closes all wsi on its tsi on
the same vhost, one time.
As the wsi on the vhost complete close (ie, after libuv async close
if on libuv event loop), they decrement a reference count for all
wsi open on the vhost. The tsi who closes the last one then
completes the destroy flow for the vhost itself... it's random
which tsi completes the vhost destroy but since there are no
wsi left on the vhost, and it holds the context lock, nothing
can conflict.
The advantage of this is that owning tsi do the close for wsi
that are bound to the vhost under destruction, at a time when
they are guaranteed to be idle for service, and they do it with
both vhost and context locks owned, so no other service thread
can conflict for stuff protected by those either.
For the situation the user code may have allocations attached to
the vhost, this adds args to lws_vhost_destroy() to allow destroying
the user allocations just before the vhost is freed.
2018-06-16 09:31:07 +08:00
|
|
|
lws_vhost_lock(vh); /* -------------- vh { */
|
|
|
|
|
2017-07-15 14:37:04 +08:00
|
|
|
vh->being_destroyed = 1;
|
|
|
|
|
|
|
|
/*
|
vhost_destroy: use vhost wsi reference counting to trigger destroy
This changes the vhost destroy flow to only hand off the listen
socket if another vhost sharing it, and mark the vhost as
being_destroyed.
Each tsi calls lws_check_deferred_free() once a second, if it sees
any vhost being_destroyed there, it closes all wsi on its tsi on
the same vhost, one time.
As the wsi on the vhost complete close (ie, after libuv async close
if on libuv event loop), they decrement a reference count for all
wsi open on the vhost. The tsi who closes the last one then
completes the destroy flow for the vhost itself... it's random
which tsi completes the vhost destroy but since there are no
wsi left on the vhost, and it holds the context lock, nothing
can conflict.
The advantage of this is that owning tsi do the close for wsi
that are bound to the vhost under destruction, at a time when
they are guaranteed to be idle for service, and they do it with
both vhost and context locks owned, so no other service thread
can conflict for stuff protected by those either.
For the situation the user code may have allocations attached to
the vhost, this adds args to lws_vhost_destroy() to allow destroying
the user allocations just before the vhost is freed.
2018-06-16 09:31:07 +08:00
|
|
|
* PHASE 1: take down or reassign any listen wsi
|
|
|
|
*
|
2017-07-15 14:37:04 +08:00
|
|
|
* Are there other vhosts that are piggybacking on our listen socket?
|
|
|
|
* If so we need to hand the listen socket off to one of the others
|
vhost_destroy: use vhost wsi reference counting to trigger destroy
This changes the vhost destroy flow to only hand off the listen
socket if another vhost sharing it, and mark the vhost as
being_destroyed.
Each tsi calls lws_check_deferred_free() once a second, if it sees
any vhost being_destroyed there, it closes all wsi on its tsi on
the same vhost, one time.
As the wsi on the vhost complete close (ie, after libuv async close
if on libuv event loop), they decrement a reference count for all
wsi open on the vhost. The tsi who closes the last one then
completes the destroy flow for the vhost itself... it's random
which tsi completes the vhost destroy but since there are no
wsi left on the vhost, and it holds the context lock, nothing
can conflict.
The advantage of this is that owning tsi do the close for wsi
that are bound to the vhost under destruction, at a time when
they are guaranteed to be idle for service, and they do it with
both vhost and context locks owned, so no other service thread
can conflict for stuff protected by those either.
For the situation the user code may have allocations attached to
the vhost, this adds args to lws_vhost_destroy() to allow destroying
the user allocations just before the vhost is freed.
2018-06-16 09:31:07 +08:00
|
|
|
* so it will remain open.
|
|
|
|
*
|
|
|
|
* If not, leave it attached to the closing vhost, the vh being marked
|
|
|
|
* being_destroyed will defeat any service and it will get closed in
|
|
|
|
* later phases.
|
2017-07-15 14:37:04 +08:00
|
|
|
*/
|
|
|
|
|
|
|
|
if (vh->lserv_wsi)
|
2017-10-28 07:42:44 +08:00
|
|
|
lws_start_foreach_ll(struct lws_vhost *, v,
|
|
|
|
context->vhost_list) {
|
2017-07-15 14:37:04 +08:00
|
|
|
if (v != vh &&
|
|
|
|
!v->being_destroyed &&
|
|
|
|
v->listen_port == vh->listen_port &&
|
|
|
|
((!v->iface && !vh->iface) ||
|
|
|
|
(v->iface && vh->iface &&
|
|
|
|
!strcmp(v->iface, vh->iface)))) {
|
|
|
|
/*
|
|
|
|
* this can only be a listen wsi, which is
|
|
|
|
* restricted... it has no protocol or other
|
|
|
|
* bindings or states. So we can simply
|
|
|
|
* swap it to a vhost that has the same
|
|
|
|
* iface + port, but is not closing.
|
|
|
|
*/
|
|
|
|
assert(v->lserv_wsi == NULL);
|
|
|
|
v->lserv_wsi = vh->lserv_wsi;
|
vhost_destroy: use vhost wsi reference counting to trigger destroy
This changes the vhost destroy flow to only hand off the listen
socket if another vhost sharing it, and mark the vhost as
being_destroyed.
Each tsi calls lws_check_deferred_free() once a second, if it sees
any vhost being_destroyed there, it closes all wsi on its tsi on
the same vhost, one time.
As the wsi on the vhost complete close (ie, after libuv async close
if on libuv event loop), they decrement a reference count for all
wsi open on the vhost. The tsi who closes the last one then
completes the destroy flow for the vhost itself... it's random
which tsi completes the vhost destroy but since there are no
wsi left on the vhost, and it holds the context lock, nothing
can conflict.
The advantage of this is that owning tsi do the close for wsi
that are bound to the vhost under destruction, at a time when
they are guaranteed to be idle for service, and they do it with
both vhost and context locks owned, so no other service thread
can conflict for stuff protected by those either.
For the situation the user code may have allocations attached to
the vhost, this adds args to lws_vhost_destroy() to allow destroying
the user allocations just before the vhost is freed.
2018-06-16 09:31:07 +08:00
|
|
|
|
2018-09-04 08:06:46 +08:00
|
|
|
lwsl_notice("%s: listen skt from %s to %s\n",
|
|
|
|
__func__, vh->name, v->name);
|
|
|
|
|
vhost_destroy: use vhost wsi reference counting to trigger destroy
This changes the vhost destroy flow to only hand off the listen
socket if another vhost sharing it, and mark the vhost as
being_destroyed.
Each tsi calls lws_check_deferred_free() once a second, if it sees
any vhost being_destroyed there, it closes all wsi on its tsi on
the same vhost, one time.
As the wsi on the vhost complete close (ie, after libuv async close
if on libuv event loop), they decrement a reference count for all
wsi open on the vhost. The tsi who closes the last one then
completes the destroy flow for the vhost itself... it's random
which tsi completes the vhost destroy but since there are no
wsi left on the vhost, and it holds the context lock, nothing
can conflict.
The advantage of this is that owning tsi do the close for wsi
that are bound to the vhost under destruction, at a time when
they are guaranteed to be idle for service, and they do it with
both vhost and context locks owned, so no other service thread
can conflict for stuff protected by those either.
For the situation the user code may have allocations attached to
the vhost, this adds args to lws_vhost_destroy() to allow destroying
the user allocations just before the vhost is freed.
2018-06-16 09:31:07 +08:00
|
|
|
if (v->lserv_wsi) {
|
|
|
|
lws_vhost_unbind_wsi(vh->lserv_wsi);
|
|
|
|
lws_vhost_bind_wsi(v, v->lserv_wsi);
|
|
|
|
}
|
2017-07-15 14:37:04 +08:00
|
|
|
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
} lws_end_foreach_ll(v, vhost_next);
|
|
|
|
|
vhost_destroy: use vhost wsi reference counting to trigger destroy
This changes the vhost destroy flow to only hand off the listen
socket if another vhost sharing it, and mark the vhost as
being_destroyed.
Each tsi calls lws_check_deferred_free() once a second, if it sees
any vhost being_destroyed there, it closes all wsi on its tsi on
the same vhost, one time.
As the wsi on the vhost complete close (ie, after libuv async close
if on libuv event loop), they decrement a reference count for all
wsi open on the vhost. The tsi who closes the last one then
completes the destroy flow for the vhost itself... it's random
which tsi completes the vhost destroy but since there are no
wsi left on the vhost, and it holds the context lock, nothing
can conflict.
The advantage of this is that owning tsi do the close for wsi
that are bound to the vhost under destruction, at a time when
they are guaranteed to be idle for service, and they do it with
both vhost and context locks owned, so no other service thread
can conflict for stuff protected by those either.
For the situation the user code may have allocations attached to
the vhost, this adds args to lws_vhost_destroy() to allow destroying
the user allocations just before the vhost is freed.
2018-06-16 09:31:07 +08:00
|
|
|
lws_vhost_unlock(vh); /* } vh -------------- */
|
|
|
|
|
2017-07-15 14:37:04 +08:00
|
|
|
/*
|
vhost_destroy: use vhost wsi reference counting to trigger destroy
This changes the vhost destroy flow to only hand off the listen
socket if another vhost sharing it, and mark the vhost as
being_destroyed.
Each tsi calls lws_check_deferred_free() once a second, if it sees
any vhost being_destroyed there, it closes all wsi on its tsi on
the same vhost, one time.
As the wsi on the vhost complete close (ie, after libuv async close
if on libuv event loop), they decrement a reference count for all
wsi open on the vhost. The tsi who closes the last one then
completes the destroy flow for the vhost itself... it's random
which tsi completes the vhost destroy but since there are no
wsi left on the vhost, and it holds the context lock, nothing
can conflict.
The advantage of this is that owning tsi do the close for wsi
that are bound to the vhost under destruction, at a time when
they are guaranteed to be idle for service, and they do it with
both vhost and context locks owned, so no other service thread
can conflict for stuff protected by those either.
For the situation the user code may have allocations attached to
the vhost, this adds args to lws_vhost_destroy() to allow destroying
the user allocations just before the vhost is freed.
2018-06-16 09:31:07 +08:00
|
|
|
* lws_check_deferred_free() will notice there is a vhost that is
|
|
|
|
* marked for destruction during the next 1s, for all tsi.
|
|
|
|
*
|
|
|
|
* It will start closing all wsi on this vhost. When the last wsi
|
|
|
|
* is closed, it will trigger lws_vhost_destroy2()
|
2017-07-15 14:37:04 +08:00
|
|
|
*/
|
2018-06-27 07:49:04 +08:00
|
|
|
|
|
|
|
out:
|
|
|
|
lws_context_unlock(context); /* --------------------------- context { */
|
vhost_destroy: use vhost wsi reference counting to trigger destroy
This changes the vhost destroy flow to only hand off the listen
socket if another vhost sharing it, and mark the vhost as
being_destroyed.
Each tsi calls lws_check_deferred_free() once a second, if it sees
any vhost being_destroyed there, it closes all wsi on its tsi on
the same vhost, one time.
As the wsi on the vhost complete close (ie, after libuv async close
if on libuv event loop), they decrement a reference count for all
wsi open on the vhost. The tsi who closes the last one then
completes the destroy flow for the vhost itself... it's random
which tsi completes the vhost destroy but since there are no
wsi left on the vhost, and it holds the context lock, nothing
can conflict.
The advantage of this is that owning tsi do the close for wsi
that are bound to the vhost under destruction, at a time when
they are guaranteed to be idle for service, and they do it with
both vhost and context locks owned, so no other service thread
can conflict for stuff protected by those either.
For the situation the user code may have allocations attached to
the vhost, this adds args to lws_vhost_destroy() to allow destroying
the user allocations just before the vhost is freed.
2018-06-16 09:31:07 +08:00
|
|
|
}
|
2017-07-15 14:37:04 +08:00
|
|
|
|
vhost_destroy: use vhost wsi reference counting to trigger destroy
This changes the vhost destroy flow to only hand off the listen
socket if another vhost sharing it, and mark the vhost as
being_destroyed.
Each tsi calls lws_check_deferred_free() once a second, if it sees
any vhost being_destroyed there, it closes all wsi on its tsi on
the same vhost, one time.
As the wsi on the vhost complete close (ie, after libuv async close
if on libuv event loop), they decrement a reference count for all
wsi open on the vhost. The tsi who closes the last one then
completes the destroy flow for the vhost itself... it's random
which tsi completes the vhost destroy but since there are no
wsi left on the vhost, and it holds the context lock, nothing
can conflict.
The advantage of this is that owning tsi do the close for wsi
that are bound to the vhost under destruction, at a time when
they are guaranteed to be idle for service, and they do it with
both vhost and context locks owned, so no other service thread
can conflict for stuff protected by those either.
For the situation the user code may have allocations attached to
the vhost, this adds args to lws_vhost_destroy() to allow destroying
the user allocations just before the vhost is freed.
2018-06-16 09:31:07 +08:00
|
|
|
void
|
2018-06-27 07:49:04 +08:00
|
|
|
__lws_vhost_destroy2(struct lws_vhost *vh)
|
vhost_destroy: use vhost wsi reference counting to trigger destroy
This changes the vhost destroy flow to only hand off the listen
socket if another vhost sharing it, and mark the vhost as
being_destroyed.
Each tsi calls lws_check_deferred_free() once a second, if it sees
any vhost being_destroyed there, it closes all wsi on its tsi on
the same vhost, one time.
As the wsi on the vhost complete close (ie, after libuv async close
if on libuv event loop), they decrement a reference count for all
wsi open on the vhost. The tsi who closes the last one then
completes the destroy flow for the vhost itself... it's random
which tsi completes the vhost destroy but since there are no
wsi left on the vhost, and it holds the context lock, nothing
can conflict.
The advantage of this is that owning tsi do the close for wsi
that are bound to the vhost under destruction, at a time when
they are guaranteed to be idle for service, and they do it with
both vhost and context locks owned, so no other service thread
can conflict for stuff protected by those either.
For the situation the user code may have allocations attached to
the vhost, this adds args to lws_vhost_destroy() to allow destroying
the user allocations just before the vhost is freed.
2018-06-16 09:31:07 +08:00
|
|
|
{
|
|
|
|
const struct lws_protocols *protocol = NULL;
|
|
|
|
struct lws_context *context = vh->context;
|
|
|
|
struct lws_deferred_free *df;
|
|
|
|
struct lws wsi;
|
|
|
|
int n;
|
2017-07-15 14:37:04 +08:00
|
|
|
|
2017-12-07 10:16:17 +08:00
|
|
|
/*
|
|
|
|
* destroy any pending timed events
|
|
|
|
*/
|
|
|
|
|
|
|
|
while (vh->timed_vh_protocol_list)
|
|
|
|
lws_timed_callback_remove(vh, vh->timed_vh_protocol_list);
|
|
|
|
|
2017-07-15 14:37:04 +08:00
|
|
|
/*
|
|
|
|
* let the protocols destroy the per-vhost protocol objects
|
|
|
|
*/
|
|
|
|
|
|
|
|
memset(&wsi, 0, sizeof(wsi));
|
|
|
|
wsi.context = vh->context;
|
vhost_destroy: use vhost wsi reference counting to trigger destroy
This changes the vhost destroy flow to only hand off the listen
socket if another vhost sharing it, and mark the vhost as
being_destroyed.
Each tsi calls lws_check_deferred_free() once a second, if it sees
any vhost being_destroyed there, it closes all wsi on its tsi on
the same vhost, one time.
As the wsi on the vhost complete close (ie, after libuv async close
if on libuv event loop), they decrement a reference count for all
wsi open on the vhost. The tsi who closes the last one then
completes the destroy flow for the vhost itself... it's random
which tsi completes the vhost destroy but since there are no
wsi left on the vhost, and it holds the context lock, nothing
can conflict.
The advantage of this is that owning tsi do the close for wsi
that are bound to the vhost under destruction, at a time when
they are guaranteed to be idle for service, and they do it with
both vhost and context locks owned, so no other service thread
can conflict for stuff protected by those either.
For the situation the user code may have allocations attached to
the vhost, this adds args to lws_vhost_destroy() to allow destroying
the user allocations just before the vhost is freed.
2018-06-16 09:31:07 +08:00
|
|
|
wsi.vhost = vh; /* not a real bound wsi */
|
2017-07-15 14:37:04 +08:00
|
|
|
protocol = vh->protocols;
|
2018-03-08 08:42:50 +08:00
|
|
|
if (protocol && vh->created_vhost_protocols) {
|
2017-07-15 14:37:04 +08:00
|
|
|
n = 0;
|
|
|
|
while (n < vh->count_protocols) {
|
|
|
|
wsi.protocol = protocol;
|
|
|
|
protocol->callback(&wsi, LWS_CALLBACK_PROTOCOL_DESTROY,
|
|
|
|
NULL, NULL, 0);
|
|
|
|
protocol++;
|
|
|
|
n++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* remove vhost from context list of vhosts
|
|
|
|
*/
|
|
|
|
|
|
|
|
lws_start_foreach_llp(struct lws_vhost **, pv, context->vhost_list) {
|
|
|
|
if (*pv == vh) {
|
|
|
|
*pv = vh->vhost_next;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
} lws_end_foreach_llp(pv, vhost_next);
|
|
|
|
|
|
|
|
/* add ourselves to the pending destruction list */
|
|
|
|
|
|
|
|
vh->vhost_next = vh->context->vhost_pending_destruction_list;
|
|
|
|
vh->context->vhost_pending_destruction_list = vh;
|
|
|
|
|
2017-09-19 17:30:06 +08:00
|
|
|
lwsl_info("%s: %p\n", __func__, vh);
|
2017-07-15 14:37:04 +08:00
|
|
|
|
|
|
|
/* if we are still on deferred free list, remove ourselves */
|
|
|
|
|
2017-09-23 12:55:21 +08:00
|
|
|
lws_start_foreach_llp(struct lws_deferred_free **, pdf,
|
|
|
|
context->deferred_free_list) {
|
2017-07-15 14:37:04 +08:00
|
|
|
if ((*pdf)->payload == vh) {
|
|
|
|
df = *pdf;
|
|
|
|
*pdf = df->next;
|
|
|
|
lws_free(df);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
} lws_end_foreach_llp(pdf, next);
|
|
|
|
|
|
|
|
/* remove ourselves from the pending destruction list */
|
|
|
|
|
2017-09-23 12:55:21 +08:00
|
|
|
lws_start_foreach_llp(struct lws_vhost **, pv,
|
|
|
|
context->vhost_pending_destruction_list) {
|
2017-07-15 14:37:04 +08:00
|
|
|
if ((*pv) == vh) {
|
|
|
|
*pv = (*pv)->vhost_next;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
} lws_end_foreach_llp(pv, vhost_next);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Free all the allocations associated with the vhost
|
|
|
|
*/
|
|
|
|
|
|
|
|
protocol = vh->protocols;
|
|
|
|
if (protocol) {
|
|
|
|
n = 0;
|
|
|
|
while (n < vh->count_protocols) {
|
|
|
|
if (vh->protocol_vh_privs &&
|
|
|
|
vh->protocol_vh_privs[n]) {
|
|
|
|
lws_free(vh->protocol_vh_privs[n]);
|
|
|
|
vh->protocol_vh_privs[n] = NULL;
|
|
|
|
}
|
|
|
|
protocol++;
|
|
|
|
n++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (vh->protocol_vh_privs)
|
|
|
|
lws_free(vh->protocol_vh_privs);
|
|
|
|
lws_ssl_SSL_CTX_destroy(vh);
|
2018-09-30 07:07:48 +08:00
|
|
|
lws_free(vh->same_vh_protocol_heads);
|
2018-04-29 10:44:36 +08:00
|
|
|
|
|
|
|
if (context->plugin_list ||
|
|
|
|
(context->options & LWS_SERVER_OPTION_EXPLICIT_VHOSTS))
|
|
|
|
lws_free((void *)vh->protocols);
|
2017-07-15 14:37:04 +08:00
|
|
|
|
2018-04-25 08:42:18 +08:00
|
|
|
LWS_FOR_EVERY_AVAILABLE_ROLE_START(ar)
|
|
|
|
if (ar->destroy_vhost)
|
|
|
|
ar->destroy_vhost(vh);
|
|
|
|
LWS_FOR_EVERY_AVAILABLE_ROLE_END;
|
|
|
|
|
2017-07-15 14:37:04 +08:00
|
|
|
#ifdef LWS_WITH_ACCESS_LOG
|
|
|
|
if (vh->log_fd != (int)LWS_INVALID_FILE)
|
|
|
|
close(vh->log_fd);
|
|
|
|
#endif
|
|
|
|
|
2018-05-01 12:41:42 +08:00
|
|
|
#if defined (LWS_WITH_TLS)
|
|
|
|
lws_free_set_NULL(vh->tls.alloc_cert_path);
|
|
|
|
#endif
|
2017-11-02 09:20:17 +08:00
|
|
|
|
2018-03-02 15:31:35 +08:00
|
|
|
#if LWS_MAX_SMP > 1
|
|
|
|
pthread_mutex_destroy(&vh->lock);
|
|
|
|
#endif
|
|
|
|
|
2018-03-19 12:48:56 +08:00
|
|
|
#if defined(LWS_WITH_UNIX_SOCK)
|
2018-08-02 19:13:53 +08:00
|
|
|
if (LWS_UNIX_SOCK_ENABLED(vh)) {
|
2018-03-19 12:48:56 +08:00
|
|
|
n = unlink(vh->iface);
|
|
|
|
if (n)
|
|
|
|
lwsl_info("Closing unix socket %s: errno %d\n",
|
|
|
|
vh->iface, errno);
|
|
|
|
}
|
|
|
|
#endif
|
2017-07-15 14:37:04 +08:00
|
|
|
/*
|
|
|
|
* although async event callbacks may still come for wsi handles with
|
|
|
|
* pending close in the case of asycn event library like libuv,
|
|
|
|
* they do not refer to the vhost. So it's safe to free.
|
|
|
|
*/
|
|
|
|
|
vhost_destroy: use vhost wsi reference counting to trigger destroy
This changes the vhost destroy flow to only hand off the listen
socket if another vhost sharing it, and mark the vhost as
being_destroyed.
Each tsi calls lws_check_deferred_free() once a second, if it sees
any vhost being_destroyed there, it closes all wsi on its tsi on
the same vhost, one time.
As the wsi on the vhost complete close (ie, after libuv async close
if on libuv event loop), they decrement a reference count for all
wsi open on the vhost. The tsi who closes the last one then
completes the destroy flow for the vhost itself... it's random
which tsi completes the vhost destroy but since there are no
wsi left on the vhost, and it holds the context lock, nothing
can conflict.
The advantage of this is that owning tsi do the close for wsi
that are bound to the vhost under destruction, at a time when
they are guaranteed to be idle for service, and they do it with
both vhost and context locks owned, so no other service thread
can conflict for stuff protected by those either.
For the situation the user code may have allocations attached to
the vhost, this adds args to lws_vhost_destroy() to allow destroying
the user allocations just before the vhost is freed.
2018-06-16 09:31:07 +08:00
|
|
|
if (vh->finalize)
|
|
|
|
vh->finalize(vh, vh->finalize_arg);
|
|
|
|
|
2017-09-19 17:30:06 +08:00
|
|
|
lwsl_info(" %s: Freeing vhost %p\n", __func__, vh);
|
2017-07-15 14:37:04 +08:00
|
|
|
|
|
|
|
memset(vh, 0, sizeof(*vh));
|
2017-08-28 21:49:23 +08:00
|
|
|
lws_free(vh);
|
2017-07-15 14:37:04 +08:00
|
|
|
}
|
|
|
|
|
vhost_destroy: use vhost wsi reference counting to trigger destroy
This changes the vhost destroy flow to only hand off the listen
socket if another vhost sharing it, and mark the vhost as
being_destroyed.
Each tsi calls lws_check_deferred_free() once a second, if it sees
any vhost being_destroyed there, it closes all wsi on its tsi on
the same vhost, one time.
As the wsi on the vhost complete close (ie, after libuv async close
if on libuv event loop), they decrement a reference count for all
wsi open on the vhost. The tsi who closes the last one then
completes the destroy flow for the vhost itself... it's random
which tsi completes the vhost destroy but since there are no
wsi left on the vhost, and it holds the context lock, nothing
can conflict.
The advantage of this is that owning tsi do the close for wsi
that are bound to the vhost under destruction, at a time when
they are guaranteed to be idle for service, and they do it with
both vhost and context locks owned, so no other service thread
can conflict for stuff protected by those either.
For the situation the user code may have allocations attached to
the vhost, this adds args to lws_vhost_destroy() to allow destroying
the user allocations just before the vhost is freed.
2018-06-16 09:31:07 +08:00
|
|
|
/*
|
|
|
|
* each service thread calls this once a second or so
|
|
|
|
*/
|
|
|
|
|
2017-07-15 14:37:04 +08:00
|
|
|
int
|
vhost_destroy: use vhost wsi reference counting to trigger destroy
This changes the vhost destroy flow to only hand off the listen
socket if another vhost sharing it, and mark the vhost as
being_destroyed.
Each tsi calls lws_check_deferred_free() once a second, if it sees
any vhost being_destroyed there, it closes all wsi on its tsi on
the same vhost, one time.
As the wsi on the vhost complete close (ie, after libuv async close
if on libuv event loop), they decrement a reference count for all
wsi open on the vhost. The tsi who closes the last one then
completes the destroy flow for the vhost itself... it's random
which tsi completes the vhost destroy but since there are no
wsi left on the vhost, and it holds the context lock, nothing
can conflict.
The advantage of this is that owning tsi do the close for wsi
that are bound to the vhost under destruction, at a time when
they are guaranteed to be idle for service, and they do it with
both vhost and context locks owned, so no other service thread
can conflict for stuff protected by those either.
For the situation the user code may have allocations attached to
the vhost, this adds args to lws_vhost_destroy() to allow destroying
the user allocations just before the vhost is freed.
2018-06-16 09:31:07 +08:00
|
|
|
lws_check_deferred_free(struct lws_context *context, int tsi, int force)
|
2017-07-15 14:37:04 +08:00
|
|
|
{
|
vhost_destroy: use vhost wsi reference counting to trigger destroy
This changes the vhost destroy flow to only hand off the listen
socket if another vhost sharing it, and mark the vhost as
being_destroyed.
Each tsi calls lws_check_deferred_free() once a second, if it sees
any vhost being_destroyed there, it closes all wsi on its tsi on
the same vhost, one time.
As the wsi on the vhost complete close (ie, after libuv async close
if on libuv event loop), they decrement a reference count for all
wsi open on the vhost. The tsi who closes the last one then
completes the destroy flow for the vhost itself... it's random
which tsi completes the vhost destroy but since there are no
wsi left on the vhost, and it holds the context lock, nothing
can conflict.
The advantage of this is that owning tsi do the close for wsi
that are bound to the vhost under destruction, at a time when
they are guaranteed to be idle for service, and they do it with
both vhost and context locks owned, so no other service thread
can conflict for stuff protected by those either.
For the situation the user code may have allocations attached to
the vhost, this adds args to lws_vhost_destroy() to allow destroying
the user allocations just before the vhost is freed.
2018-06-16 09:31:07 +08:00
|
|
|
struct lws_context_per_thread *pt;
|
|
|
|
int n;
|
2017-07-15 14:37:04 +08:00
|
|
|
|
vhost_destroy: use vhost wsi reference counting to trigger destroy
This changes the vhost destroy flow to only hand off the listen
socket if another vhost sharing it, and mark the vhost as
being_destroyed.
Each tsi calls lws_check_deferred_free() once a second, if it sees
any vhost being_destroyed there, it closes all wsi on its tsi on
the same vhost, one time.
As the wsi on the vhost complete close (ie, after libuv async close
if on libuv event loop), they decrement a reference count for all
wsi open on the vhost. The tsi who closes the last one then
completes the destroy flow for the vhost itself... it's random
which tsi completes the vhost destroy but since there are no
wsi left on the vhost, and it holds the context lock, nothing
can conflict.
The advantage of this is that owning tsi do the close for wsi
that are bound to the vhost under destruction, at a time when
they are guaranteed to be idle for service, and they do it with
both vhost and context locks owned, so no other service thread
can conflict for stuff protected by those either.
For the situation the user code may have allocations attached to
the vhost, this adds args to lws_vhost_destroy() to allow destroying
the user allocations just before the vhost is freed.
2018-06-16 09:31:07 +08:00
|
|
|
/*
|
|
|
|
* If we see a vhost is being destroyed, forcibly close every wsi on
|
|
|
|
* this tsi associated with this vhost. That will include the listen
|
|
|
|
* socket if it is still associated with the closing vhost.
|
|
|
|
*
|
|
|
|
* For SMP, we do this once per tsi per destroyed vhost. The reference
|
|
|
|
* counting on the vhost as the bound wsi close will notice that there
|
|
|
|
* are no bound wsi left, that vhost destruction can complete,
|
|
|
|
* and perform it. It doesn't matter which service thread does that
|
|
|
|
* because there is nothing left using the vhost to conflict.
|
|
|
|
*/
|
|
|
|
|
2018-06-27 07:15:39 +08:00
|
|
|
lws_context_lock(context, "check deferred free"); /* ------ context { */
|
vhost_destroy: use vhost wsi reference counting to trigger destroy
This changes the vhost destroy flow to only hand off the listen
socket if another vhost sharing it, and mark the vhost as
being_destroyed.
Each tsi calls lws_check_deferred_free() once a second, if it sees
any vhost being_destroyed there, it closes all wsi on its tsi on
the same vhost, one time.
As the wsi on the vhost complete close (ie, after libuv async close
if on libuv event loop), they decrement a reference count for all
wsi open on the vhost. The tsi who closes the last one then
completes the destroy flow for the vhost itself... it's random
which tsi completes the vhost destroy but since there are no
wsi left on the vhost, and it holds the context lock, nothing
can conflict.
The advantage of this is that owning tsi do the close for wsi
that are bound to the vhost under destruction, at a time when
they are guaranteed to be idle for service, and they do it with
both vhost and context locks owned, so no other service thread
can conflict for stuff protected by those either.
For the situation the user code may have allocations attached to
the vhost, this adds args to lws_vhost_destroy() to allow destroying
the user allocations just before the vhost is freed.
2018-06-16 09:31:07 +08:00
|
|
|
|
2018-07-10 09:38:40 -05:00
|
|
|
lws_start_foreach_ll_safe(struct lws_vhost *, v, context->vhost_list, vhost_next) {
|
vhost_destroy: use vhost wsi reference counting to trigger destroy
This changes the vhost destroy flow to only hand off the listen
socket if another vhost sharing it, and mark the vhost as
being_destroyed.
Each tsi calls lws_check_deferred_free() once a second, if it sees
any vhost being_destroyed there, it closes all wsi on its tsi on
the same vhost, one time.
As the wsi on the vhost complete close (ie, after libuv async close
if on libuv event loop), they decrement a reference count for all
wsi open on the vhost. The tsi who closes the last one then
completes the destroy flow for the vhost itself... it's random
which tsi completes the vhost destroy but since there are no
wsi left on the vhost, and it holds the context lock, nothing
can conflict.
The advantage of this is that owning tsi do the close for wsi
that are bound to the vhost under destruction, at a time when
they are guaranteed to be idle for service, and they do it with
both vhost and context locks owned, so no other service thread
can conflict for stuff protected by those either.
For the situation the user code may have allocations attached to
the vhost, this adds args to lws_vhost_destroy() to allow destroying
the user allocations just before the vhost is freed.
2018-06-16 09:31:07 +08:00
|
|
|
if (v->being_destroyed
|
|
|
|
#if LWS_MAX_SMP > 1
|
|
|
|
&& !v->close_flow_vs_tsi[tsi]
|
|
|
|
#endif
|
|
|
|
) {
|
|
|
|
|
|
|
|
pt = &context->pt[tsi];
|
|
|
|
|
|
|
|
lws_pt_lock(pt, "vhost removal"); /* -------------- pt { */
|
|
|
|
|
|
|
|
#if LWS_MAX_SMP > 1
|
|
|
|
v->close_flow_vs_tsi[tsi] = 1;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
for (n = 0; (unsigned int)n < pt->fds_count; n++) {
|
|
|
|
struct lws *wsi = wsi_from_fd(context, pt->fds[n].fd);
|
|
|
|
if (!wsi)
|
|
|
|
continue;
|
|
|
|
if (wsi->vhost != v)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
__lws_close_free_wsi(wsi,
|
|
|
|
LWS_CLOSE_STATUS_NOSTATUS_CONTEXT_DESTROY,
|
|
|
|
"vh destroy"
|
|
|
|
/* no protocol close */);
|
|
|
|
n--;
|
|
|
|
}
|
|
|
|
|
|
|
|
lws_pt_unlock(pt); /* } pt -------------- */
|
2017-07-15 14:37:04 +08:00
|
|
|
}
|
2018-07-10 09:38:40 -05:00
|
|
|
} lws_end_foreach_ll_safe(v);
|
vhost_destroy: use vhost wsi reference counting to trigger destroy
This changes the vhost destroy flow to only hand off the listen
socket if another vhost sharing it, and mark the vhost as
being_destroyed.
Each tsi calls lws_check_deferred_free() once a second, if it sees
any vhost being_destroyed there, it closes all wsi on its tsi on
the same vhost, one time.
As the wsi on the vhost complete close (ie, after libuv async close
if on libuv event loop), they decrement a reference count for all
wsi open on the vhost. The tsi who closes the last one then
completes the destroy flow for the vhost itself... it's random
which tsi completes the vhost destroy but since there are no
wsi left on the vhost, and it holds the context lock, nothing
can conflict.
The advantage of this is that owning tsi do the close for wsi
that are bound to the vhost under destruction, at a time when
they are guaranteed to be idle for service, and they do it with
both vhost and context locks owned, so no other service thread
can conflict for stuff protected by those either.
For the situation the user code may have allocations attached to
the vhost, this adds args to lws_vhost_destroy() to allow destroying
the user allocations just before the vhost is freed.
2018-06-16 09:31:07 +08:00
|
|
|
|
|
|
|
|
|
|
|
lws_context_unlock(context); /* } context ------------------- */
|
2017-07-15 14:37:04 +08:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
LWS_VISIBLE void
|
|
|
|
lws_vhost_destroy(struct lws_vhost *vh)
|
|
|
|
{
|
2017-10-04 07:10:39 +08:00
|
|
|
struct lws_deferred_free *df = lws_malloc(sizeof(*df), "deferred free");
|
2018-06-27 07:49:04 +08:00
|
|
|
struct lws_context *context = vh->context;
|
2017-07-15 14:37:04 +08:00
|
|
|
|
|
|
|
if (!df)
|
|
|
|
return;
|
|
|
|
|
2018-06-27 07:49:04 +08:00
|
|
|
lws_context_lock(context, __func__); /* ------ context { */
|
|
|
|
|
2017-07-15 14:37:04 +08:00
|
|
|
lws_vhost_destroy1(vh);
|
|
|
|
|
vhost_destroy: use vhost wsi reference counting to trigger destroy
This changes the vhost destroy flow to only hand off the listen
socket if another vhost sharing it, and mark the vhost as
being_destroyed.
Each tsi calls lws_check_deferred_free() once a second, if it sees
any vhost being_destroyed there, it closes all wsi on its tsi on
the same vhost, one time.
As the wsi on the vhost complete close (ie, after libuv async close
if on libuv event loop), they decrement a reference count for all
wsi open on the vhost. The tsi who closes the last one then
completes the destroy flow for the vhost itself... it's random
which tsi completes the vhost destroy but since there are no
wsi left on the vhost, and it holds the context lock, nothing
can conflict.
The advantage of this is that owning tsi do the close for wsi
that are bound to the vhost under destruction, at a time when
they are guaranteed to be idle for service, and they do it with
both vhost and context locks owned, so no other service thread
can conflict for stuff protected by those either.
For the situation the user code may have allocations attached to
the vhost, this adds args to lws_vhost_destroy() to allow destroying
the user allocations just before the vhost is freed.
2018-06-16 09:31:07 +08:00
|
|
|
if (!vh->count_bound_wsi) {
|
|
|
|
/*
|
|
|
|
* After listen handoff, there are already no wsi bound to this
|
|
|
|
* vhost by any pt: nothing can be servicing any wsi belonging
|
|
|
|
* to it any more.
|
|
|
|
*
|
|
|
|
* Finalize the vh destruction immediately
|
|
|
|
*/
|
2018-06-27 07:49:04 +08:00
|
|
|
__lws_vhost_destroy2(vh);
|
vhost_destroy: use vhost wsi reference counting to trigger destroy
This changes the vhost destroy flow to only hand off the listen
socket if another vhost sharing it, and mark the vhost as
being_destroyed.
Each tsi calls lws_check_deferred_free() once a second, if it sees
any vhost being_destroyed there, it closes all wsi on its tsi on
the same vhost, one time.
As the wsi on the vhost complete close (ie, after libuv async close
if on libuv event loop), they decrement a reference count for all
wsi open on the vhost. The tsi who closes the last one then
completes the destroy flow for the vhost itself... it's random
which tsi completes the vhost destroy but since there are no
wsi left on the vhost, and it holds the context lock, nothing
can conflict.
The advantage of this is that owning tsi do the close for wsi
that are bound to the vhost under destruction, at a time when
they are guaranteed to be idle for service, and they do it with
both vhost and context locks owned, so no other service thread
can conflict for stuff protected by those either.
For the situation the user code may have allocations attached to
the vhost, this adds args to lws_vhost_destroy() to allow destroying
the user allocations just before the vhost is freed.
2018-06-16 09:31:07 +08:00
|
|
|
lws_free(df);
|
|
|
|
|
2018-06-27 07:49:04 +08:00
|
|
|
goto out;
|
vhost_destroy: use vhost wsi reference counting to trigger destroy
This changes the vhost destroy flow to only hand off the listen
socket if another vhost sharing it, and mark the vhost as
being_destroyed.
Each tsi calls lws_check_deferred_free() once a second, if it sees
any vhost being_destroyed there, it closes all wsi on its tsi on
the same vhost, one time.
As the wsi on the vhost complete close (ie, after libuv async close
if on libuv event loop), they decrement a reference count for all
wsi open on the vhost. The tsi who closes the last one then
completes the destroy flow for the vhost itself... it's random
which tsi completes the vhost destroy but since there are no
wsi left on the vhost, and it holds the context lock, nothing
can conflict.
The advantage of this is that owning tsi do the close for wsi
that are bound to the vhost under destruction, at a time when
they are guaranteed to be idle for service, and they do it with
both vhost and context locks owned, so no other service thread
can conflict for stuff protected by those either.
For the situation the user code may have allocations attached to
the vhost, this adds args to lws_vhost_destroy() to allow destroying
the user allocations just before the vhost is freed.
2018-06-16 09:31:07 +08:00
|
|
|
}
|
|
|
|
|
2017-07-15 14:37:04 +08:00
|
|
|
/* part 2 is deferred to allow all the handle closes to complete */
|
|
|
|
|
|
|
|
df->next = vh->context->deferred_free_list;
|
2017-11-24 11:00:59 +08:00
|
|
|
df->deadline = lws_now_secs();
|
2017-07-15 14:37:04 +08:00
|
|
|
df->payload = vh;
|
|
|
|
vh->context->deferred_free_list = df;
|
2018-06-27 07:49:04 +08:00
|
|
|
|
|
|
|
out:
|
|
|
|
lws_context_unlock(context); /* } context ------------------- */
|
2017-07-15 14:37:04 +08:00
|
|
|
}
|
|
|
|
|
2018-04-29 10:44:36 +08:00
|
|
|
/*
|
|
|
|
* When using an event loop, the context destruction is in three separate
|
|
|
|
* parts. This is to cover both internal and foreign event loops cleanly.
|
|
|
|
*
|
|
|
|
* - lws_context_destroy() simply starts a soft close of all wsi and
|
|
|
|
* related allocations. The event loop continues.
|
|
|
|
*
|
|
|
|
* As the closes complete in the event loop, reference counting is used
|
|
|
|
* to determine when everything is closed. It then calls
|
|
|
|
* lws_context_destroy2().
|
|
|
|
*
|
|
|
|
* - lws_context_destroy2() cleans up the rest of the higher-level logical
|
|
|
|
* lws pieces like vhosts. If the loop was foreign, it then proceeds to
|
|
|
|
* lws_context_destroy3(). If it the loop is internal, it stops the
|
|
|
|
* internal loops and waits for lws_context_destroy() to be called again
|
|
|
|
* outside the event loop (since we cannot destroy the loop from
|
|
|
|
* within the loop). That will cause lws_context_destroy3() to run
|
|
|
|
* directly.
|
|
|
|
*
|
|
|
|
* - lws_context_destroy3() destroys any internal event loops and then
|
|
|
|
* destroys the context itself, setting what was info.pcontext to NULL.
|
|
|
|
*/
|
|
|
|
|
2018-05-02 19:27:29 +08:00
|
|
|
/*
|
|
|
|
* destroy the actual context itself
|
|
|
|
*/
|
|
|
|
|
2018-04-29 10:44:36 +08:00
|
|
|
static void
|
|
|
|
lws_context_destroy3(struct lws_context *context)
|
|
|
|
{
|
|
|
|
struct lws_context **pcontext_finalize = context->pcontext_finalize;
|
2018-05-02 18:35:58 +08:00
|
|
|
int n;
|
|
|
|
|
|
|
|
for (n = 0; n < context->count_threads; n++) {
|
2018-10-10 13:54:43 +08:00
|
|
|
#if defined(LWS_ROLE_H1) || defined(LWS_ROLE_H2)
|
|
|
|
struct lws_context_per_thread *pt = &context->pt[n];
|
|
|
|
#endif
|
2018-05-02 18:35:58 +08:00
|
|
|
|
|
|
|
if (context->event_loop_ops->destroy_pt)
|
|
|
|
context->event_loop_ops->destroy_pt(context, n);
|
|
|
|
|
|
|
|
lws_free_set_NULL(context->pt[n].serv_buf);
|
|
|
|
|
|
|
|
#if defined(LWS_ROLE_H1) || defined(LWS_ROLE_H2)
|
|
|
|
while (pt->http.ah_list)
|
|
|
|
_lws_destroy_ah(pt, pt->http.ah_list);
|
|
|
|
#endif
|
|
|
|
}
|
2018-04-29 10:44:36 +08:00
|
|
|
|
|
|
|
lws_free(context);
|
|
|
|
lwsl_info("%s: ctx %p freed\n", __func__, context);
|
|
|
|
|
|
|
|
if (pcontext_finalize)
|
|
|
|
*pcontext_finalize = NULL;
|
|
|
|
}
|
|
|
|
|
2018-05-02 19:27:29 +08:00
|
|
|
/*
|
|
|
|
* really start destroying things
|
|
|
|
*/
|
|
|
|
|
2018-04-29 10:44:36 +08:00
|
|
|
void
|
|
|
|
lws_context_destroy2(struct lws_context *context)
|
|
|
|
{
|
|
|
|
struct lws_vhost *vh = NULL, *vh1;
|
|
|
|
#if defined(LWS_WITH_PEER_LIMITS)
|
2018-05-02 18:35:58 +08:00
|
|
|
uint32_t nu;
|
2018-04-29 10:44:36 +08:00
|
|
|
#endif
|
|
|
|
|
|
|
|
lwsl_info("%s: ctx %p\n", __func__, context);
|
|
|
|
|
2018-06-27 07:49:04 +08:00
|
|
|
lws_context_lock(context, "context destroy 2"); /* ------ context { */
|
|
|
|
|
2018-04-30 09:16:04 +08:00
|
|
|
context->being_destroyed2 = 1;
|
|
|
|
|
|
|
|
if (context->pt[0].fds)
|
|
|
|
lws_free_set_NULL(context->pt[0].fds);
|
|
|
|
|
2018-04-29 10:44:36 +08:00
|
|
|
/*
|
|
|
|
* free all the per-vhost allocations
|
|
|
|
*/
|
|
|
|
|
|
|
|
vh = context->vhost_list;
|
|
|
|
while (vh) {
|
|
|
|
vh1 = vh->vhost_next;
|
2018-06-27 07:49:04 +08:00
|
|
|
__lws_vhost_destroy2(vh);
|
2018-04-29 10:44:36 +08:00
|
|
|
vh = vh1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* remove ourselves from the pending destruction list */
|
|
|
|
|
|
|
|
while (context->vhost_pending_destruction_list)
|
|
|
|
/* removes itself from list */
|
2018-06-27 07:49:04 +08:00
|
|
|
__lws_vhost_destroy2(context->vhost_pending_destruction_list);
|
2018-04-29 10:44:36 +08:00
|
|
|
|
|
|
|
|
|
|
|
lws_stats_log_dump(context);
|
|
|
|
|
|
|
|
lws_ssl_context_destroy(context);
|
|
|
|
lws_plat_context_late_destroy(context);
|
|
|
|
|
|
|
|
#if defined(LWS_WITH_PEER_LIMITS)
|
2018-05-02 18:35:58 +08:00
|
|
|
for (nu = 0; nu < context->pl_hash_elements; nu++) {
|
2018-04-29 10:44:36 +08:00
|
|
|
lws_start_foreach_llp(struct lws_peer **, peer,
|
2018-05-02 18:35:58 +08:00
|
|
|
context->pl_hash_table[nu]) {
|
2018-04-29 10:44:36 +08:00
|
|
|
struct lws_peer *df = *peer;
|
|
|
|
*peer = df->next;
|
|
|
|
lws_free(df);
|
|
|
|
continue;
|
|
|
|
} lws_end_foreach_llp(peer, next);
|
|
|
|
}
|
|
|
|
lws_free(context->pl_hash_table);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
if (context->external_baggage_free_on_destroy)
|
|
|
|
free(context->external_baggage_free_on_destroy);
|
|
|
|
|
vhost_destroy: use vhost wsi reference counting to trigger destroy
This changes the vhost destroy flow to only hand off the listen
socket if another vhost sharing it, and mark the vhost as
being_destroyed.
Each tsi calls lws_check_deferred_free() once a second, if it sees
any vhost being_destroyed there, it closes all wsi on its tsi on
the same vhost, one time.
As the wsi on the vhost complete close (ie, after libuv async close
if on libuv event loop), they decrement a reference count for all
wsi open on the vhost. The tsi who closes the last one then
completes the destroy flow for the vhost itself... it's random
which tsi completes the vhost destroy but since there are no
wsi left on the vhost, and it holds the context lock, nothing
can conflict.
The advantage of this is that owning tsi do the close for wsi
that are bound to the vhost under destruction, at a time when
they are guaranteed to be idle for service, and they do it with
both vhost and context locks owned, so no other service thread
can conflict for stuff protected by those either.
For the situation the user code may have allocations attached to
the vhost, this adds args to lws_vhost_destroy() to allow destroying
the user allocations just before the vhost is freed.
2018-06-16 09:31:07 +08:00
|
|
|
lws_check_deferred_free(context, 0, 1);
|
2018-04-29 10:44:36 +08:00
|
|
|
|
|
|
|
#if LWS_MAX_SMP > 1
|
2018-06-27 07:15:39 +08:00
|
|
|
lws_mutex_refcount_destroy(&context->mr);
|
2018-04-29 10:44:36 +08:00
|
|
|
#endif
|
|
|
|
|
|
|
|
if (context->event_loop_ops->destroy_context2)
|
|
|
|
if (context->event_loop_ops->destroy_context2(context)) {
|
2018-08-01 06:52:03 +08:00
|
|
|
lws_context_unlock(context); /* } context ----------- */
|
2018-04-29 10:44:36 +08:00
|
|
|
context->finalize_destroy_after_internal_loops_stopped = 1;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2018-10-10 13:54:43 +08:00
|
|
|
if (!context->pt[0].event_loop_foreign) {
|
|
|
|
int n;
|
2018-05-02 18:35:58 +08:00
|
|
|
for (n = 0; n < context->count_threads; n++)
|
2018-08-01 06:52:03 +08:00
|
|
|
if (context->pt[n].inside_service) {
|
|
|
|
lws_context_unlock(context); /* } context --- */
|
2018-05-02 18:35:58 +08:00
|
|
|
return;
|
2018-08-01 06:52:03 +08:00
|
|
|
}
|
2018-10-10 13:54:43 +08:00
|
|
|
}
|
2018-05-02 18:35:58 +08:00
|
|
|
|
2018-06-27 07:49:04 +08:00
|
|
|
lws_context_unlock(context); /* } context ------------------- */
|
|
|
|
|
2018-04-29 10:44:36 +08:00
|
|
|
lws_context_destroy3(context);
|
|
|
|
}
|
|
|
|
|
2018-05-02 19:27:29 +08:00
|
|
|
/*
|
|
|
|
* Begin the context takedown
|
|
|
|
*/
|
|
|
|
|
2014-04-03 07:29:50 +08:00
|
|
|
LWS_VISIBLE void
|
2015-12-04 11:08:32 +08:00
|
|
|
lws_context_destroy(struct lws_context *context)
|
2014-04-03 07:29:50 +08:00
|
|
|
{
|
2017-11-12 09:16:46 +08:00
|
|
|
volatile struct lws_foreign_thread_pollfd *ftp, *next;
|
|
|
|
volatile struct lws_context_per_thread *vpt;
|
context deprecation
1) This makes lwsws run a parent process with the original permissions.
But this process is only able to respond to SIGHUP, it doesn't do anything
else.
2) You can send this parent process a SIGHUP now to cause it to
- close listening sockets in existing lwsws processes
- mark those processes as to exit when the number of active connections
on the falls to zero
- spawn a fresh child process from scratch, using latest configuration
file content, latest plugins, etc. It can now reopen listening sockets
if it chooses to, or open different listen ports or whatever.
Notes:
1) lws_context_destroy() has been split into two pieces... the reason for
the split is the first part closes the per-vhost protocols, but since
they may have created libuv objects in the per-vhost protocol storage,
these cannot be freed until after the loop has been run.
That's the purpose of the second part of the context destruction,
lws_context_destroy2().
For compatibility, if you are not using libuv, the first part calls the
second part. However if you are using libuv, you must now call the
second part from your own main.c after the first part.
2016-12-16 07:37:43 +08:00
|
|
|
struct lws_vhost *vh = NULL;
|
2015-12-18 01:08:14 +08:00
|
|
|
struct lws wsi;
|
2016-01-19 21:29:34 +08:00
|
|
|
int n, m;
|
2014-04-03 07:29:50 +08:00
|
|
|
|
2018-04-30 19:17:32 +08:00
|
|
|
if (!context)
|
context deprecation
1) This makes lwsws run a parent process with the original permissions.
But this process is only able to respond to SIGHUP, it doesn't do anything
else.
2) You can send this parent process a SIGHUP now to cause it to
- close listening sockets in existing lwsws processes
- mark those processes as to exit when the number of active connections
on the falls to zero
- spawn a fresh child process from scratch, using latest configuration
file content, latest plugins, etc. It can now reopen listening sockets
if it chooses to, or open different listen ports or whatever.
Notes:
1) lws_context_destroy() has been split into two pieces... the reason for
the split is the first part closes the per-vhost protocols, but since
they may have created libuv objects in the per-vhost protocol storage,
these cannot be freed until after the loop has been run.
That's the purpose of the second part of the context destruction,
lws_context_destroy2().
For compatibility, if you are not using libuv, the first part calls the
second part. However if you are using libuv, you must now call the
second part from your own main.c after the first part.
2016-12-16 07:37:43 +08:00
|
|
|
return;
|
2018-04-29 10:44:36 +08:00
|
|
|
|
|
|
|
if (context->finalize_destroy_after_internal_loops_stopped) {
|
|
|
|
if (context->event_loop_ops->destroy_context2)
|
|
|
|
context->event_loop_ops->destroy_context2(context);
|
|
|
|
|
|
|
|
lws_context_destroy3(context);
|
|
|
|
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
context deprecation
1) This makes lwsws run a parent process with the original permissions.
But this process is only able to respond to SIGHUP, it doesn't do anything
else.
2) You can send this parent process a SIGHUP now to cause it to
- close listening sockets in existing lwsws processes
- mark those processes as to exit when the number of active connections
on the falls to zero
- spawn a fresh child process from scratch, using latest configuration
file content, latest plugins, etc. It can now reopen listening sockets
if it chooses to, or open different listen ports or whatever.
Notes:
1) lws_context_destroy() has been split into two pieces... the reason for
the split is the first part closes the per-vhost protocols, but since
they may have created libuv objects in the per-vhost protocol storage,
these cannot be freed until after the loop has been run.
That's the purpose of the second part of the context destruction,
lws_context_destroy2().
For compatibility, if you are not using libuv, the first part calls the
second part. However if you are using libuv, you must now call the
second part from your own main.c after the first part.
2016-12-16 07:37:43 +08:00
|
|
|
if (context->being_destroyed1) {
|
2018-04-30 19:17:32 +08:00
|
|
|
if (!context->being_destroyed2) {
|
|
|
|
lws_context_destroy2(context);
|
|
|
|
|
|
|
|
return;
|
|
|
|
}
|
2018-04-29 10:44:36 +08:00
|
|
|
lwsl_info("%s: ctx %p: already being destroyed\n",
|
2017-09-23 12:55:21 +08:00
|
|
|
__func__, context);
|
2018-05-02 18:35:58 +08:00
|
|
|
|
|
|
|
lws_context_destroy3(context);
|
2015-06-25 17:51:07 +02:00
|
|
|
return;
|
context deprecation
1) This makes lwsws run a parent process with the original permissions.
But this process is only able to respond to SIGHUP, it doesn't do anything
else.
2) You can send this parent process a SIGHUP now to cause it to
- close listening sockets in existing lwsws processes
- mark those processes as to exit when the number of active connections
on the falls to zero
- spawn a fresh child process from scratch, using latest configuration
file content, latest plugins, etc. It can now reopen listening sockets
if it chooses to, or open different listen ports or whatever.
Notes:
1) lws_context_destroy() has been split into two pieces... the reason for
the split is the first part closes the per-vhost protocols, but since
they may have created libuv objects in the per-vhost protocol storage,
these cannot be freed until after the loop has been run.
That's the purpose of the second part of the context destruction,
lws_context_destroy2().
For compatibility, if you are not using libuv, the first part calls the
second part. However if you are using libuv, you must now call the
second part from your own main.c after the first part.
2016-12-16 07:37:43 +08:00
|
|
|
}
|
|
|
|
|
2017-09-19 17:30:06 +08:00
|
|
|
lwsl_info("%s: ctx %p\n", __func__, context);
|
2015-06-25 17:51:07 +02:00
|
|
|
|
2016-01-19 21:29:34 +08:00
|
|
|
m = context->count_threads;
|
2016-01-18 11:49:41 +08:00
|
|
|
context->being_destroyed = 1;
|
context deprecation
1) This makes lwsws run a parent process with the original permissions.
But this process is only able to respond to SIGHUP, it doesn't do anything
else.
2) You can send this parent process a SIGHUP now to cause it to
- close listening sockets in existing lwsws processes
- mark those processes as to exit when the number of active connections
on the falls to zero
- spawn a fresh child process from scratch, using latest configuration
file content, latest plugins, etc. It can now reopen listening sockets
if it chooses to, or open different listen ports or whatever.
Notes:
1) lws_context_destroy() has been split into two pieces... the reason for
the split is the first part closes the per-vhost protocols, but since
they may have created libuv objects in the per-vhost protocol storage,
these cannot be freed until after the loop has been run.
That's the purpose of the second part of the context destruction,
lws_context_destroy2().
For compatibility, if you are not using libuv, the first part calls the
second part. However if you are using libuv, you must now call the
second part from your own main.c after the first part.
2016-12-16 07:37:43 +08:00
|
|
|
context->being_destroyed1 = 1;
|
2018-04-29 10:44:36 +08:00
|
|
|
context->requested_kill = 1;
|
2016-01-18 11:49:41 +08:00
|
|
|
|
2015-12-18 01:08:14 +08:00
|
|
|
memset(&wsi, 0, sizeof(wsi));
|
|
|
|
wsi.context = context;
|
|
|
|
|
2014-04-03 07:29:50 +08:00
|
|
|
#ifdef LWS_LATENCY
|
|
|
|
if (context->worst_latency_info[0])
|
|
|
|
lwsl_notice("Worst latency: %s\n", context->worst_latency_info);
|
|
|
|
#endif
|
|
|
|
|
2016-02-14 09:27:41 +08:00
|
|
|
while (m--) {
|
2018-10-10 13:54:43 +08:00
|
|
|
struct lws_context_per_thread *pt = &context->pt[m];
|
2017-11-12 09:16:46 +08:00
|
|
|
vpt = (volatile struct lws_context_per_thread *)pt;
|
|
|
|
|
|
|
|
ftp = vpt->foreign_pfd_list;
|
|
|
|
while (ftp) {
|
|
|
|
next = ftp->next;
|
|
|
|
lws_free((void *)ftp);
|
|
|
|
ftp = next;
|
|
|
|
}
|
|
|
|
vpt->foreign_pfd_list = NULL;
|
2016-02-14 09:27:41 +08:00
|
|
|
|
2016-01-26 20:56:56 +08:00
|
|
|
for (n = 0; (unsigned int)n < context->pt[m].fds_count; n++) {
|
2016-02-14 09:27:41 +08:00
|
|
|
struct lws *wsi = wsi_from_fd(context, pt->fds[n].fd);
|
2016-01-19 03:34:24 +08:00
|
|
|
if (!wsi)
|
|
|
|
continue;
|
2016-02-14 09:27:41 +08:00
|
|
|
|
2018-01-17 02:05:45 +01:00
|
|
|
if (wsi->event_pipe)
|
|
|
|
lws_destroy_event_pipe(wsi);
|
|
|
|
else
|
2017-10-24 11:59:44 +08:00
|
|
|
lws_close_free_wsi(wsi,
|
2018-02-03 13:48:18 +08:00
|
|
|
LWS_CLOSE_STATUS_NOSTATUS_CONTEXT_DESTROY,
|
|
|
|
"ctx destroy"
|
2017-10-24 11:59:44 +08:00
|
|
|
/* no protocol close */);
|
2016-01-19 03:34:24 +08:00
|
|
|
n--;
|
|
|
|
}
|
2016-05-12 20:22:35 -05:00
|
|
|
lws_pt_mutex_destroy(pt);
|
2016-02-14 09:27:41 +08:00
|
|
|
}
|
context deprecation
1) This makes lwsws run a parent process with the original permissions.
But this process is only able to respond to SIGHUP, it doesn't do anything
else.
2) You can send this parent process a SIGHUP now to cause it to
- close listening sockets in existing lwsws processes
- mark those processes as to exit when the number of active connections
on the falls to zero
- spawn a fresh child process from scratch, using latest configuration
file content, latest plugins, etc. It can now reopen listening sockets
if it chooses to, or open different listen ports or whatever.
Notes:
1) lws_context_destroy() has been split into two pieces... the reason for
the split is the first part closes the per-vhost protocols, but since
they may have created libuv objects in the per-vhost protocol storage,
these cannot be freed until after the loop has been run.
That's the purpose of the second part of the context destruction,
lws_context_destroy2().
For compatibility, if you are not using libuv, the first part calls the
second part. However if you are using libuv, you must now call the
second part from your own main.c after the first part.
2016-12-16 07:37:43 +08:00
|
|
|
|
2014-04-03 07:29:50 +08:00
|
|
|
/*
|
|
|
|
* inform all the protocols that they are done and will have no more
|
2016-04-06 16:15:40 +08:00
|
|
|
* callbacks.
|
|
|
|
*
|
|
|
|
* We can't free things until after the event loop shuts down.
|
2014-04-03 07:29:50 +08:00
|
|
|
*/
|
2016-05-08 17:00:38 +08:00
|
|
|
if (context->protocol_init_done)
|
|
|
|
vh = context->vhost_list;
|
2016-03-28 10:10:43 +08:00
|
|
|
while (vh) {
|
2017-10-11 19:42:45 +08:00
|
|
|
struct lws_vhost *vhn = vh->vhost_next;
|
2017-07-15 14:37:04 +08:00
|
|
|
lws_vhost_destroy1(vh);
|
2017-10-11 19:42:45 +08:00
|
|
|
vh = vhn;
|
2016-03-28 10:10:43 +08:00
|
|
|
}
|
2014-04-03 07:29:50 +08:00
|
|
|
|
|
|
|
lws_plat_context_early_destroy(context);
|
2016-03-28 10:10:43 +08:00
|
|
|
|
2018-05-02 19:27:29 +08:00
|
|
|
/*
|
|
|
|
* We face two different needs depending if foreign loop or not.
|
|
|
|
*
|
|
|
|
* 1) If foreign loop, we really want to advance the destroy_context()
|
|
|
|
* past here, and block only for libuv-style async close completion.
|
|
|
|
*
|
|
|
|
* 2a) If poll, and we exited by ourselves and are calling a final
|
|
|
|
* destroy_context() outside of any service already, we want to
|
|
|
|
* advance all the way in one step.
|
|
|
|
*
|
|
|
|
* 2b) If poll, and we are reacting to a SIGINT, service thread(s) may
|
|
|
|
* be in poll wait or servicing. We can't advance the
|
|
|
|
* destroy_context() to the point it's freeing things; we have to
|
|
|
|
* leave that for the final destroy_context() after the service
|
|
|
|
* thread(s) are finished calling for service.
|
|
|
|
*/
|
2015-06-25 17:51:07 +02:00
|
|
|
|
2018-04-29 10:44:36 +08:00
|
|
|
if (context->event_loop_ops->destroy_context1) {
|
|
|
|
context->event_loop_ops->destroy_context1(context);
|
2017-07-15 14:37:04 +08:00
|
|
|
|
2018-04-29 10:44:36 +08:00
|
|
|
return;
|
2017-09-14 13:14:11 +08:00
|
|
|
}
|
2016-12-04 07:34:05 +08:00
|
|
|
|
2018-04-29 10:44:36 +08:00
|
|
|
lws_context_destroy2(context);
|
2014-04-03 07:29:50 +08:00
|
|
|
}
|