mirror of
https://github.com/warmcat/libwebsockets.git
synced 2025-03-16 00:00:07 +01:00

Introduce a generic lws_state object with notification handlers that may be registered in a chain. Implement one of those in the context to manage the "system state". Allow other pieces of lws and user code to register notification handlers on a context list. Handlers can object to or take over responsibility to move forward and retry system state changes if they know that some dependent action must succeed first. For example if the system time is invalid, we cannot move on to a state where anything can do tls until that has been corrected.
267 lines
6.5 KiB
C
267 lines
6.5 KiB
C
/*
|
|
* lws-minimal-http-client
|
|
*
|
|
* Written in 2010-2019 by Andy Green <andy@warmcat.com>
|
|
*
|
|
* This file is made available under the Creative Commons CC0 1.0
|
|
* Universal Public Domain Dedication.
|
|
*
|
|
* This demonstrates the a minimal http client using lws.
|
|
*
|
|
* It visits https://warmcat.com/ and receives the html page there. You
|
|
* can dump the page data by changing the #if 0 below.
|
|
*/
|
|
|
|
#include <libwebsockets.h>
|
|
#include <string.h>
|
|
#include <signal.h>
|
|
|
|
static int interrupted, bad = 1, status;
|
|
#if defined(LWS_WITH_HTTP2)
|
|
static int long_poll;
|
|
#endif
|
|
static struct lws *client_wsi;
|
|
|
|
static const lws_retry_bo_t retry = {
|
|
.secs_since_valid_ping = 3,
|
|
.secs_since_valid_hangup = 10,
|
|
};
|
|
|
|
static int
|
|
callback_http(struct lws *wsi, enum lws_callback_reasons reason,
|
|
void *user, void *in, size_t len)
|
|
{
|
|
switch (reason) {
|
|
|
|
/* because we are protocols[0] ... */
|
|
case LWS_CALLBACK_CLIENT_CONNECTION_ERROR:
|
|
lwsl_err("CLIENT_CONNECTION_ERROR: %s\n",
|
|
in ? (char *)in : "(null)");
|
|
interrupted = 1;
|
|
break;
|
|
|
|
case LWS_CALLBACK_ESTABLISHED_CLIENT_HTTP:
|
|
status = lws_http_client_http_response(wsi);
|
|
lwsl_user("Connected with server response: %d\n", status);
|
|
#if defined(LWS_WITH_HTTP2)
|
|
if (long_poll) {
|
|
lwsl_user("%s: Client entering long poll mode\n", __func__);
|
|
lws_h2_client_stream_long_poll_rxonly(wsi);
|
|
}
|
|
#endif
|
|
break;
|
|
|
|
/* chunks of chunked content, with header removed */
|
|
case LWS_CALLBACK_RECEIVE_CLIENT_HTTP_READ:
|
|
lwsl_user("RECEIVE_CLIENT_HTTP_READ: read %d\n", (int)len);
|
|
#if defined(LWS_WITH_HTTP2)
|
|
if (long_poll)
|
|
lwsl_notice("long poll rx: '%.*s'\n",
|
|
(int)len, (const char *)in);
|
|
#endif
|
|
#if 0 /* enable to dump the html */
|
|
{
|
|
const char *p = in;
|
|
|
|
while (len--)
|
|
if (*p < 0x7f)
|
|
putchar(*p++);
|
|
else
|
|
putchar('.');
|
|
}
|
|
#endif
|
|
return 0; /* don't passthru */
|
|
|
|
/* uninterpreted http content */
|
|
case LWS_CALLBACK_RECEIVE_CLIENT_HTTP:
|
|
{
|
|
char buffer[1024 + LWS_PRE];
|
|
char *px = buffer + LWS_PRE;
|
|
int lenx = sizeof(buffer) - LWS_PRE;
|
|
|
|
if (lws_http_client_read(wsi, &px, &lenx) < 0)
|
|
return -1;
|
|
}
|
|
return 0; /* don't passthru */
|
|
|
|
case LWS_CALLBACK_COMPLETED_CLIENT_HTTP:
|
|
lwsl_user("LWS_CALLBACK_COMPLETED_CLIENT_HTTP\n");
|
|
interrupted = 1;
|
|
bad = status != 200;
|
|
lws_cancel_service(lws_get_context(wsi)); /* abort poll wait */
|
|
break;
|
|
|
|
case LWS_CALLBACK_CLOSED_CLIENT_HTTP:
|
|
interrupted = 1;
|
|
bad = status != 200;
|
|
lws_cancel_service(lws_get_context(wsi)); /* abort poll wait */
|
|
break;
|
|
|
|
default:
|
|
break;
|
|
}
|
|
|
|
return lws_callback_http_dummy(wsi, reason, user, in, len);
|
|
}
|
|
|
|
static const struct lws_protocols protocols[] = {
|
|
{
|
|
"http",
|
|
callback_http,
|
|
0,
|
|
0,
|
|
},
|
|
{ NULL, NULL, 0, 0 }
|
|
};
|
|
|
|
static void
|
|
sigint_handler(int sig)
|
|
{
|
|
interrupted = 1;
|
|
}
|
|
|
|
struct args {
|
|
int argc;
|
|
const char **argv;
|
|
};
|
|
|
|
static int
|
|
system_notify_cb(lws_state_manager_t *mgr, lws_state_notify_link_t *link,
|
|
int current, int target)
|
|
{
|
|
struct lws_context *context = mgr->parent;
|
|
struct lws_client_connect_info i;
|
|
struct args *a = lws_context_user(context);
|
|
const char *p;
|
|
|
|
if (current != LWS_SYSTATE_OPERATIONAL || target != LWS_SYSTATE_OPERATIONAL)
|
|
return 0;
|
|
|
|
lwsl_info("%s: operational\n", __func__);
|
|
|
|
memset(&i, 0, sizeof i); /* otherwise uninitialized garbage */
|
|
i.context = context;
|
|
if (!lws_cmdline_option(a->argc, a->argv, "-n")) {
|
|
i.ssl_connection = LCCSCF_USE_SSL;
|
|
#if defined(LWS_WITH_HTTP2)
|
|
/* requires h2 */
|
|
if (lws_cmdline_option(a->argc, a->argv, "--long-poll")) {
|
|
lwsl_user("%s: long poll mode\n", __func__);
|
|
long_poll = 1;
|
|
}
|
|
#endif
|
|
}
|
|
|
|
if (lws_cmdline_option(a->argc, a->argv, "-l")) {
|
|
i.port = 7681;
|
|
i.address = "localhost";
|
|
i.ssl_connection |= LCCSCF_ALLOW_SELFSIGNED;
|
|
} else {
|
|
i.port = 443;
|
|
i.address = "warmcat.com";
|
|
}
|
|
|
|
if (lws_cmdline_option(a->argc, a->argv, "--h1"))
|
|
i.alpn = "http/1.1";
|
|
|
|
if ((p = lws_cmdline_option(a->argc, a->argv, "-p")))
|
|
i.port = atoi(p);
|
|
|
|
if (lws_cmdline_option(a->argc, a->argv, "-j"))
|
|
i.ssl_connection |= LCCSCF_ALLOW_SELFSIGNED;
|
|
|
|
if (lws_cmdline_option(a->argc, a->argv, "-k"))
|
|
i.ssl_connection |= LCCSCF_ALLOW_INSECURE;
|
|
|
|
if (lws_cmdline_option(a->argc, a->argv, "-m"))
|
|
i.ssl_connection |= LCCSCF_SKIP_SERVER_CERT_HOSTNAME_CHECK;
|
|
|
|
if (lws_cmdline_option(a->argc, a->argv, "-e"))
|
|
i.ssl_connection |= LCCSCF_ALLOW_EXPIRED;
|
|
|
|
/* the default validity check is 5m / 5m10s... -v = 3s / 10s */
|
|
|
|
if (lws_cmdline_option(a->argc, a->argv, "-v"))
|
|
i.retry_and_idle_policy = &retry;
|
|
|
|
if ((p = lws_cmdline_option(a->argc, a->argv, "--server")))
|
|
i.address = p;
|
|
|
|
i.path = "/";
|
|
i.host = i.address;
|
|
i.origin = i.address;
|
|
i.method = "GET";
|
|
|
|
i.protocol = protocols[0].name;
|
|
i.pwsi = &client_wsi;
|
|
|
|
return !lws_client_connect_via_info(&i);
|
|
}
|
|
|
|
int main(int argc, const char **argv)
|
|
{
|
|
lws_state_notify_link_t notifier = { {}, system_notify_cb, "app" };
|
|
lws_state_notify_link_t *na[] = { ¬ifier, NULL };
|
|
struct lws_context_creation_info info;
|
|
struct lws_context *context;
|
|
const char *p;
|
|
struct args args;
|
|
int n = 0, logs = LLL_USER | LLL_ERR | LLL_WARN | LLL_NOTICE
|
|
/*
|
|
* For LLL_ verbosity above NOTICE to be built into lws,
|
|
* lws must have been configured and built with
|
|
* -DCMAKE_BUILD_TYPE=DEBUG instead of =RELEASE
|
|
*
|
|
* | LLL_INFO | LLL_PARSER | LLL_HEADER | LLL_EXT |
|
|
* LLL_CLIENT | LLL_LATENCY | LLL_DEBUG
|
|
*/ ;
|
|
|
|
args.argc = argc;
|
|
args.argv = argv;
|
|
|
|
signal(SIGINT, sigint_handler);
|
|
|
|
if ((p = lws_cmdline_option(argc, argv, "-d")))
|
|
logs = atoi(p);
|
|
|
|
lws_set_log_level(logs, NULL);
|
|
lwsl_user("LWS minimal http client [-d<verbosity>] [-l] [--h1]\n");
|
|
|
|
memset(&info, 0, sizeof info); /* otherwise uninitialized garbage */
|
|
info.options = LWS_SERVER_OPTION_DO_SSL_GLOBAL_INIT;
|
|
info.port = CONTEXT_PORT_NO_LISTEN; /* we do not run any server */
|
|
info.protocols = protocols;
|
|
info.user = &args;
|
|
info.register_notifier_list = na;
|
|
|
|
/*
|
|
* since we know this lws context is only ever going to be used with
|
|
* one client wsis / fds / sockets at a time, let lws know it doesn't
|
|
* have to use the default allocations for fd tables up to ulimit -n.
|
|
* It will just allocate for 1 internal and 1 (+ 1 http2 nwsi) that we
|
|
* will use.
|
|
*/
|
|
info.fd_limit_per_thread = 1 + 1 + 1;
|
|
|
|
#if defined(LWS_WITH_MBEDTLS)
|
|
/*
|
|
* OpenSSL uses the system trust store. mbedTLS has to be told which
|
|
* CA to trust explicitly.
|
|
*/
|
|
info.client_ssl_ca_filepath = "./warmcat.com.cer";
|
|
#endif
|
|
|
|
context = lws_create_context(&info);
|
|
if (!context) {
|
|
lwsl_err("lws init failed\n");
|
|
return 1;
|
|
}
|
|
|
|
while (n >= 0 && !interrupted)
|
|
n = lws_service(context, 0);
|
|
|
|
lws_context_destroy(context);
|
|
lwsl_user("Completed: %s\n", bad ? "failed" : "OK");
|
|
|
|
return bad;
|
|
}
|