/* * lws-minimal-raw-proxy-fallback * * Written in 2010-2019 by Andy Green * * This file is made available under the Creative Commons CC0 1.0 * Universal Public Domain Dedication. * * This demonstrates a normal http / https server which if it receives something * it can't make sense of at the start, falls back to becoming a raw tcp proxy * to a specified address and port. * * Incoming connections cause an outgoing connection to be initiated, and if * successfully established then traffic coming in one side is placed on a * ringbuffer and sent out the opposite side as soon as possible. * * If it receives expected packets for an http(s) connection, it acts like a * normal h1 / h2 webserver. */ #include #include #include #include #define LWS_PLUGIN_STATIC #include "../plugins/raw-proxy/protocol_lws_raw_proxy.c" static struct lws_protocols protocols[] = { LWS_PLUGIN_PROTOCOL_RAW_PROXY, { NULL, NULL, 0, 0 } /* terminator */ }; static const struct lws_http_mount mount = { /* .mount_next */ NULL, /* linked-list "next" */ /* .mountpoint */ "/", /* mountpoint URL */ /* .origin */ "./mount-origin", /* serve from dir */ /* .def */ "index.html", /* default filename */ /* .protocol */ NULL, /* .cgienv */ NULL, /* .extra_mimetypes */ NULL, /* .interpret */ NULL, /* .cgi_timeout */ 0, /* .cache_max_age */ 0, /* .auth_mask */ 0, /* .cache_reusable */ 0, /* .cache_revalidate */ 0, /* .cache_intermediaries */ 0, /* .origin_protocol */ LWSMPRO_FILE, /* files in a dir */ /* .mountpoint_len */ 1, /* char count */ /* .basic_auth_login_file */ NULL, }; static int interrupted; void sigint_handler(int sig) { interrupted = 1; } static struct lws_protocol_vhost_options pvo1 = { NULL, NULL, "onward", /* pvo name */ "ipv4:127.0.0.1:22" /* pvo value */ }; static const struct lws_protocol_vhost_options pvo = { NULL, /* "next" pvo linked-list */ &pvo1, /* "child" pvo linked-list */ "raw-proxy", /* protocol name we belong to on this vhost */ "" /* ignored */ }; int main(int argc, const char **argv) { int n = 0, logs = LLL_USER | LLL_ERR | LLL_WARN | LLL_NOTICE; struct lws_context_creation_info info; struct lws_context *context; char outward[256]; const char *p; signal(SIGINT, sigint_handler); if ((p = lws_cmdline_option(argc, argv, "-d"))) logs = atoi(p); lws_set_log_level(logs, NULL); lwsl_user("LWS minimal raw proxy fallback | visit http://localhost:7681\n"); if ((p = lws_cmdline_option(argc, argv, "-r"))) { lws_strncpy(outward, p, sizeof(outward)); pvo1.value = outward; } memset(&info, 0, sizeof info); /* otherwise uninitialized garbage */ info.port = 7681; info.protocols = protocols; info.pvo = &pvo; info.mounts = &mount; info.error_document_404 = "/404.html"; info.options = LWS_SERVER_OPTION_HTTP_HEADERS_SECURITY_BEST_PRACTICES_ENFORCE | LWS_SERVER_OPTION_FALLBACK_TO_APPLY_LISTEN_ACCEPT_CONFIG; info.listen_accept_role = "raw-proxy"; info.listen_accept_protocol = "raw-proxy"; if (lws_cmdline_option(argc, argv, "-s")) { info.options |= LWS_SERVER_OPTION_DO_SSL_GLOBAL_INIT | LWS_SERVER_OPTION_ALLOW_NON_SSL_ON_SSL_PORT; info.ssl_cert_filepath = "localhost-100y.cert"; info.ssl_private_key_filepath = "localhost-100y.key"; if (lws_cmdline_option(argc, argv, "-u")) info.options |= LWS_SERVER_OPTION_REDIRECT_HTTP_TO_HTTPS; if (lws_cmdline_option(argc, argv, "-h")) info.options |= LWS_SERVER_OPTION_ALLOW_HTTP_ON_HTTPS_LISTENER; } context = lws_create_context(&info); if (!context) { lwsl_err("lws init failed\n"); return 1; } while (n >= 0 && !interrupted) n = lws_service(context, 0); lws_context_destroy(context); return 0; }