mirror of
https://github.com/warmcat/libwebsockets.git
synced 2025-03-16 00:00:07 +01:00

Add initial support for defining servers using Secure Streams policy and api semantics. Serving h1, h2 and ws should be functional, the new minimal example shows a combined http + SS server with an incrementing ws message shown in the browser over tls, in around 200 lines of user code. NOP out anything to do with plugins, they're not currently used. Update the docs correspondingly.
208 lines
4.9 KiB
C
208 lines
4.9 KiB
C
/*
|
|
* lws-minimal-secure-streams-server
|
|
*
|
|
* Written in 2010-2020 by Andy Green <andy@warmcat.com>
|
|
*
|
|
* This file is made available under the Creative Commons CC0 1.0
|
|
* Universal Public Domain Dedication.
|
|
*/
|
|
|
|
#include <libwebsockets.h>
|
|
#include <assert.h>
|
|
|
|
extern int interrupted, bad;
|
|
|
|
static const char *html =
|
|
"<head><meta content=\"text/html;charset=utf-8\" "
|
|
"http-equiv=\"Content-Type\"><script>"
|
|
" var ws = new WebSocket(\"wss://localhost:7681\", \"mywsprotocol\");"
|
|
"try { ws.onopen = function() { console.log(\"open\"); }; "
|
|
"ws.onmessage = function got_packet(msg) { "
|
|
"var s=\"\"; s += msg.data; "
|
|
"document.getElementById(\"wsd\").innerHTML = s; };"
|
|
"} catch(exception) {"
|
|
"alert(\"<p>Error\" + exception); }"
|
|
"</script></head><html><body>"
|
|
"Hello from the web server<br>"
|
|
"<div id=\"wsd\"></div>"
|
|
"</body></html>";
|
|
|
|
|
|
typedef struct myss {
|
|
struct lws_ss_handle *ss;
|
|
void *opaque_data;
|
|
/* ... application specific state ... */
|
|
|
|
lws_sorted_usec_list_t sul;
|
|
int count;
|
|
char upgraded;
|
|
|
|
} myss_srv_t;
|
|
|
|
/*
|
|
* This is the Secure Streams Server RX and TX for HTTP(S)
|
|
*/
|
|
|
|
static int
|
|
myss_srv_rx(void *userobj, const uint8_t *buf, size_t len, int flags)
|
|
{
|
|
// myss_srv_t *m = (myss_srv_t *)userobj;
|
|
|
|
lwsl_user("%s: len %d, flags: %d\n", __func__, (int)len, flags);
|
|
lwsl_hexdump_info(buf, len);
|
|
|
|
/*
|
|
* If we received the whole message, for our example it means
|
|
* we are done.
|
|
*/
|
|
if (flags & LWSSS_FLAG_EOM) {
|
|
bad = 0;
|
|
interrupted = 1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
myss_srv_tx(void *userobj, lws_ss_tx_ordinal_t ord, uint8_t *buf, size_t *len,
|
|
int *flags)
|
|
{
|
|
myss_srv_t *m = (myss_srv_t *)userobj;
|
|
|
|
if (m->upgraded)
|
|
return LWSSSSRET_TX_DONT_SEND;
|
|
|
|
*flags = LWSSS_FLAG_SOM | LWSSS_FLAG_EOM;
|
|
|
|
lws_strncpy((char *)buf, html, *len);
|
|
*len = strlen(html);
|
|
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* This is the Secure Streams Server RX and TX for WS(S)... when we get a
|
|
* state that the underlying connection upgraded protocol, we switch the stream
|
|
* rx and tx handlers to here.
|
|
*/
|
|
|
|
static int
|
|
myss_ws_rx(void *userobj, const uint8_t *buf, size_t len, int flags)
|
|
{
|
|
// myss_srv_t *m = (myss_srv_t *)userobj;
|
|
|
|
lwsl_user("%s: len %d, flags: %d\n", __func__, (int)len, flags);
|
|
lwsl_hexdump_info(buf, len);
|
|
|
|
/*
|
|
* If we received the whole message, for our example it means
|
|
* we are done.
|
|
*/
|
|
if (flags & LWSSS_FLAG_EOM) {
|
|
bad = 0;
|
|
interrupted = 1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* this is the callback that mediates sending the incrementing number */
|
|
|
|
static void
|
|
spam_sul_cb(struct lws_sorted_usec_list *sul)
|
|
{
|
|
myss_srv_t *m = lws_container_of(sul, myss_srv_t, sul);
|
|
|
|
lws_ss_request_tx(m->ss);
|
|
|
|
lws_sul_schedule(lws_ss_get_context(m->ss), 0, &m->sul, spam_sul_cb,
|
|
100 * LWS_US_PER_MS);
|
|
}
|
|
|
|
static int
|
|
myss_ws_tx(void *userobj, lws_ss_tx_ordinal_t ord, uint8_t *buf, size_t *len,
|
|
int *flags)
|
|
{
|
|
myss_srv_t *m = (myss_srv_t *)userobj;
|
|
|
|
*flags = LWSSS_FLAG_SOM | LWSSS_FLAG_EOM;
|
|
|
|
*len = lws_snprintf((char *)buf, *len, "hello from ws %d", m->count++);
|
|
|
|
lws_sul_schedule(lws_ss_get_context(m->ss), 0, &m->sul, spam_sul_cb,
|
|
100 * LWS_US_PER_MS);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
myss_srv_state(void *userobj, void *sh, lws_ss_constate_t state,
|
|
lws_ss_tx_ordinal_t ack)
|
|
{
|
|
myss_srv_t *m = (myss_srv_t *)userobj;
|
|
|
|
lwsl_user("%s: %p %s, ord 0x%x\n", __func__, m->ss,
|
|
lws_ss_state_name(state), (unsigned int)ack);
|
|
|
|
switch (state) {
|
|
case LWSSSCS_DISCONNECTED:
|
|
lws_sul_cancel(&m->sul);
|
|
break;
|
|
case LWSSSCS_CREATING:
|
|
lws_ss_request_tx(m->ss);
|
|
break;
|
|
case LWSSSCS_ALL_RETRIES_FAILED:
|
|
/* if we're out of retries, we want to close the app and FAIL */
|
|
interrupted = 1;
|
|
break;
|
|
|
|
case LWSSSCS_SERVER_TXN:
|
|
/*
|
|
* The underlying protocol started a transaction, let's
|
|
* describe how we want to complete it. We can defer this until
|
|
* later, eg, after we have consumed any rx that's coming with
|
|
* the client's transaction initiation phase, but in this
|
|
* example we know what we want to do already.
|
|
*
|
|
* We do want to ack the transaction...
|
|
*/
|
|
lws_ss_server_ack(m->ss, 0);
|
|
/*
|
|
* ... it's going to be text/html...
|
|
*/
|
|
lws_ss_set_metadata(m->ss, "mime", "text/html", 9);
|
|
/*
|
|
* ...it's going to be 128 byte (and request tx)
|
|
*/
|
|
lws_ss_request_tx_len(m->ss, strlen(html));
|
|
break;
|
|
|
|
case LWSSSCS_SERVER_UPGRADE:
|
|
|
|
/*
|
|
* This is sent when the underlying protocol has experienced
|
|
* an upgrade, eg, http->ws... it's a one-way upgrade on this
|
|
* stream, change the handlers to deal with the kind of
|
|
* messages we send on ws
|
|
*/
|
|
|
|
m->upgraded = 1;
|
|
lws_ss_change_handlers(m->ss, myss_ws_rx, myss_ws_tx, NULL);
|
|
lws_ss_request_tx(m->ss); /* we want to start sending numbers */
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
const lws_ss_info_t ssi_server = {
|
|
.handle_offset = offsetof(myss_srv_t, ss),
|
|
.opaque_user_data_offset = offsetof(myss_srv_t, opaque_data),
|
|
.streamtype = "myserver",
|
|
.rx = myss_srv_rx,
|
|
.tx = myss_srv_tx,
|
|
.state = myss_srv_state,
|
|
.user_alloc = sizeof(myss_srv_t),
|
|
};
|