2011-01-22 12:51:57 +00:00
|
|
|
#include "private-libwebsockets.h"
|
|
|
|
|
2017-06-20 15:56:48 +08:00
|
|
|
static int
|
|
|
|
lws_getaddrinfo46(struct lws *wsi, const char *ads, struct addrinfo **result)
|
2015-12-06 08:40:00 +08:00
|
|
|
{
|
2017-06-20 15:56:48 +08:00
|
|
|
struct addrinfo hints;
|
|
|
|
|
|
|
|
memset(&hints, 0, sizeof(hints));
|
|
|
|
*result = NULL;
|
|
|
|
|
2014-03-24 16:09:25 +08:00
|
|
|
#ifdef LWS_USE_IPV6
|
2017-06-20 15:56:48 +08:00
|
|
|
if (wsi->ipv6) {
|
|
|
|
|
|
|
|
#if !defined(__ANDROID__)
|
|
|
|
hints.ai_family = AF_INET6;
|
|
|
|
hints.ai_flags = AI_V4MAPPED;
|
|
|
|
#endif
|
|
|
|
} else
|
2014-03-24 16:09:25 +08:00
|
|
|
#endif
|
2017-06-20 15:56:48 +08:00
|
|
|
{
|
|
|
|
hints.ai_family = PF_UNSPEC;
|
|
|
|
hints.ai_socktype = SOCK_STREAM;
|
|
|
|
hints.ai_flags = AI_CANONNAME;
|
|
|
|
}
|
|
|
|
|
|
|
|
return getaddrinfo(ads, NULL, &hints, result);
|
|
|
|
}
|
|
|
|
|
|
|
|
struct lws *
|
|
|
|
lws_client_connect_2(struct lws *wsi)
|
|
|
|
{
|
|
|
|
sockaddr46 sa46;
|
|
|
|
struct addrinfo *result;
|
2015-12-15 21:15:58 +08:00
|
|
|
struct lws_context *context = wsi->context;
|
2016-01-19 03:34:24 +08:00
|
|
|
struct lws_context_per_thread *pt = &context->pt[(int)wsi->tsi];
|
2015-12-06 08:40:00 +08:00
|
|
|
struct lws_pollfd pfd;
|
2017-06-14 09:45:30 +08:00
|
|
|
const char *cce = "", *iface;
|
2017-06-20 15:56:48 +08:00
|
|
|
int n, plen = 0, port;
|
2013-02-11 13:04:45 +08:00
|
|
|
const char *ads;
|
2017-06-20 15:56:48 +08:00
|
|
|
#ifdef LWS_USE_IPV6
|
|
|
|
char ipv6only = lws_check_opt(wsi->vhost->options,
|
|
|
|
LWS_SERVER_OPTION_IPV6_V6ONLY_MODIFY |
|
|
|
|
LWS_SERVER_OPTION_IPV6_V6ONLY_VALUE);
|
|
|
|
|
|
|
|
#if defined(__ANDROID__)
|
|
|
|
ipv6only = 0;
|
|
|
|
#endif
|
|
|
|
#endif
|
2011-05-23 10:00:03 +01:00
|
|
|
|
2015-12-15 21:15:58 +08:00
|
|
|
lwsl_client("%s\n", __func__);
|
2011-05-23 10:00:03 +01:00
|
|
|
|
2016-11-15 16:33:18 +08:00
|
|
|
if (!wsi->u.hdr.ah) {
|
|
|
|
cce = "ah was NULL at cc2";
|
|
|
|
lwsl_err("%s\n", cce);
|
|
|
|
goto oom4;
|
|
|
|
}
|
|
|
|
|
2017-06-20 15:56:48 +08:00
|
|
|
/*
|
|
|
|
* start off allowing ipv6 on connection if vhost allows it
|
|
|
|
*/
|
|
|
|
wsi->ipv6 = LWS_IPV6_ENABLED(wsi->vhost);
|
|
|
|
|
|
|
|
/* Decide what it is we need to connect to:
|
|
|
|
*
|
|
|
|
* Priority 1: connect to http proxy */
|
2011-05-23 10:00:03 +01:00
|
|
|
|
2016-03-28 10:10:43 +08:00
|
|
|
if (wsi->vhost->http_proxy_port) {
|
2016-01-19 03:34:24 +08:00
|
|
|
plen = sprintf((char *)pt->serv_buf,
|
2013-02-10 15:19:39 +08:00
|
|
|
"CONNECT %s:%u HTTP/1.0\x0d\x0a"
|
2015-11-08 10:15:01 +08:00
|
|
|
"User-agent: libwebsockets\x0d\x0a",
|
2013-02-11 13:04:45 +08:00
|
|
|
lws_hdr_simple_ptr(wsi, _WSI_TOKEN_CLIENT_PEER_ADDRESS),
|
2017-02-22 06:55:12 +08:00
|
|
|
wsi->c_port);
|
2015-11-08 10:15:01 +08:00
|
|
|
|
2016-03-28 10:10:43 +08:00
|
|
|
if (wsi->vhost->proxy_basic_auth_token[0])
|
2016-01-19 03:34:24 +08:00
|
|
|
plen += sprintf((char *)pt->serv_buf + plen,
|
2015-11-08 10:15:01 +08:00
|
|
|
"Proxy-authorization: basic %s\x0d\x0a",
|
2016-03-28 10:10:43 +08:00
|
|
|
wsi->vhost->proxy_basic_auth_token);
|
2015-11-08 10:15:01 +08:00
|
|
|
|
2016-01-29 21:18:54 +08:00
|
|
|
plen += sprintf((char *)pt->serv_buf + plen, "\x0d\x0a");
|
2016-03-28 10:10:43 +08:00
|
|
|
ads = wsi->vhost->http_proxy_address;
|
2017-06-20 15:56:48 +08:00
|
|
|
port = wsi->vhost->http_proxy_port;
|
2014-03-24 16:09:25 +08:00
|
|
|
|
2017-05-05 11:38:34 -04:00
|
|
|
#if defined(LWS_WITH_SOCKS5)
|
2017-06-20 15:56:48 +08:00
|
|
|
|
|
|
|
/* Priority 2: Connect to SOCK5 Proxy */
|
|
|
|
|
|
|
|
} else if (wsi->vhost->socks_proxy_port) {
|
2017-05-05 11:38:34 -04:00
|
|
|
socks_generate_msg(wsi, SOCKS_MSG_GREETING, (size_t *)&plen);
|
|
|
|
lwsl_client("%s\n", "Sending SOCKS Greeting.");
|
|
|
|
|
|
|
|
ads = wsi->vhost->socks_proxy_address;
|
2017-06-20 15:56:48 +08:00
|
|
|
port = wsi->vhost->socks_proxy_port;
|
2017-05-05 11:38:34 -04:00
|
|
|
#endif
|
2017-06-20 15:56:48 +08:00
|
|
|
} else {
|
|
|
|
|
|
|
|
/* Priority 3: Connect directly */
|
2017-05-05 11:38:34 -04:00
|
|
|
|
2013-10-25 22:07:57 +08:00
|
|
|
ads = lws_hdr_simple_ptr(wsi, _WSI_TOKEN_CLIENT_PEER_ADDRESS);
|
2017-06-20 15:56:48 +08:00
|
|
|
port = wsi->c_port;
|
2011-05-23 10:00:03 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2017-06-20 15:56:48 +08:00
|
|
|
* prepare the actual connection
|
|
|
|
* to whatever we decided to connect to
|
2011-05-23 10:00:03 +01:00
|
|
|
*/
|
2017-06-20 15:56:48 +08:00
|
|
|
|
2017-03-16 10:46:31 +08:00
|
|
|
lwsl_notice("%s: %p: address %s\n", __func__, wsi, ads);
|
2013-02-11 13:04:45 +08:00
|
|
|
|
2017-06-20 15:56:48 +08:00
|
|
|
n = lws_getaddrinfo46(wsi, ads, &result);
|
|
|
|
|
2014-03-24 16:09:25 +08:00
|
|
|
#ifdef LWS_USE_IPV6
|
2017-06-20 15:56:48 +08:00
|
|
|
if (wsi->ipv6) {
|
2014-03-24 16:09:25 +08:00
|
|
|
|
2017-07-25 17:14:37 +08:00
|
|
|
if (n) {
|
|
|
|
/* lws_getaddrinfo46 failed, there is no usable result */
|
|
|
|
lwsl_notice("%s: lws_getaddrinfo46 failed %d\n",
|
|
|
|
__func__, n);
|
|
|
|
cce = "ipv6 lws_getaddrinfo46 failed";
|
|
|
|
goto oom4;
|
|
|
|
}
|
|
|
|
|
2017-06-20 15:56:48 +08:00
|
|
|
memset(&sa46, 0, sizeof(sa46));
|
|
|
|
|
|
|
|
sa46.sa6.sin6_family = AF_INET6;
|
2014-03-24 16:09:25 +08:00
|
|
|
switch (result->ai_family) {
|
2015-12-11 18:10:02 +09:00
|
|
|
case AF_INET:
|
2017-06-20 15:56:48 +08:00
|
|
|
if (ipv6only)
|
|
|
|
break;
|
2015-12-11 18:10:02 +09:00
|
|
|
/* map IPv4 to IPv6 */
|
2017-06-20 15:56:48 +08:00
|
|
|
bzero((char *)&sa46.sa6.sin6_addr,
|
|
|
|
sizeof(sa46.sa6.sin6_addr));
|
|
|
|
sa46.sa6.sin6_addr.s6_addr[10] = 0xff;
|
|
|
|
sa46.sa6.sin6_addr.s6_addr[11] = 0xff;
|
|
|
|
memcpy(&sa46.sa6.sin6_addr.s6_addr[12],
|
2015-12-11 18:10:02 +09:00
|
|
|
&((struct sockaddr_in *)result->ai_addr)->sin_addr,
|
|
|
|
sizeof(struct in_addr));
|
2017-06-20 15:56:48 +08:00
|
|
|
lwsl_notice("uplevelling AF_INET to AF_INET6\n");
|
2015-12-11 18:10:02 +09:00
|
|
|
break;
|
2017-06-20 15:56:48 +08:00
|
|
|
|
2014-03-24 16:09:25 +08:00
|
|
|
case AF_INET6:
|
2017-06-20 15:56:48 +08:00
|
|
|
memcpy(&sa46.sa6.sin6_addr,
|
2014-03-24 16:09:25 +08:00
|
|
|
&((struct sockaddr_in6 *)result->ai_addr)->sin6_addr,
|
|
|
|
sizeof(struct in6_addr));
|
2017-06-20 15:56:48 +08:00
|
|
|
sa46.sa6.sin6_scope_id = ((struct sockaddr_in6 *)result->ai_addr)->sin6_scope_id;
|
|
|
|
sa46.sa6.sin6_flowinfo = ((struct sockaddr_in6 *)result->ai_addr)->sin6_flowinfo;
|
2014-03-24 16:09:25 +08:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
lwsl_err("Unknown address family\n");
|
|
|
|
freeaddrinfo(result);
|
2016-07-01 08:54:39 +08:00
|
|
|
cce = "unknown address family";
|
2014-03-24 16:09:25 +08:00
|
|
|
goto oom4;
|
|
|
|
}
|
|
|
|
} else
|
2017-06-20 15:56:48 +08:00
|
|
|
#endif /* use ipv6 */
|
|
|
|
|
|
|
|
/* use ipv4 */
|
2014-03-24 16:09:25 +08:00
|
|
|
{
|
2015-01-28 21:03:49 +08:00
|
|
|
void *p = NULL;
|
|
|
|
|
2017-06-20 15:56:48 +08:00
|
|
|
if (!n) {
|
|
|
|
struct addrinfo *res = result;
|
|
|
|
|
|
|
|
/* pick the first AF_INET (IPv4) result */
|
2015-01-28 21:03:49 +08:00
|
|
|
|
2017-02-05 21:47:08 +08:00
|
|
|
while (!p && res) {
|
|
|
|
switch (res->ai_family) {
|
|
|
|
case AF_INET:
|
|
|
|
p = &((struct sockaddr_in *)res->ai_addr)->sin_addr;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
res = res->ai_next;
|
|
|
|
}
|
|
|
|
#if defined(LWS_FALLBACK_GETHOSTBYNAME)
|
2017-06-20 15:56:48 +08:00
|
|
|
} else if (n == EAI_SYSTEM) {
|
2017-02-05 21:47:08 +08:00
|
|
|
struct hostent *host;
|
|
|
|
|
|
|
|
lwsl_info("getaddrinfo (ipv4) failed, trying gethostbyname\n");
|
|
|
|
host = gethostbyname(ads);
|
|
|
|
if (host) {
|
|
|
|
p = host->h_addr;
|
|
|
|
} else {
|
|
|
|
lwsl_err("gethostbyname failed\n");
|
|
|
|
cce = "gethostbyname (ipv4) failed";
|
|
|
|
goto oom4;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
} else {
|
2016-05-03 07:26:10 +08:00
|
|
|
lwsl_err("getaddrinfo failed\n");
|
2017-06-20 15:56:48 +08:00
|
|
|
cce = "getaddrinfo failed";
|
2014-03-24 16:09:25 +08:00
|
|
|
goto oom4;
|
2016-05-03 07:26:10 +08:00
|
|
|
}
|
2015-01-28 21:03:49 +08:00
|
|
|
|
2015-04-11 07:00:51 +08:00
|
|
|
if (!p) {
|
2017-02-05 21:47:08 +08:00
|
|
|
if (result)
|
|
|
|
freeaddrinfo(result);
|
2016-05-03 07:26:10 +08:00
|
|
|
lwsl_err("Couldn't identify address\n");
|
2017-01-17 07:01:02 +08:00
|
|
|
cce = "unable to lookup address";
|
2015-01-28 21:03:49 +08:00
|
|
|
goto oom4;
|
2015-04-11 07:00:51 +08:00
|
|
|
}
|
2014-03-24 16:09:25 +08:00
|
|
|
|
2017-06-20 15:56:48 +08:00
|
|
|
sa46.sa4.sin_family = AF_INET;
|
|
|
|
sa46.sa4.sin_addr = *((struct in_addr *)p);
|
|
|
|
bzero(&sa46.sa4.sin_zero, 8);
|
2011-05-23 10:00:03 +01:00
|
|
|
}
|
|
|
|
|
2017-06-20 15:56:48 +08:00
|
|
|
if (result)
|
|
|
|
freeaddrinfo(result);
|
|
|
|
|
|
|
|
/* now we decided on ipv4 or ipv6, set the port */
|
|
|
|
|
2017-02-27 12:55:56 +08:00
|
|
|
if (!lws_socket_is_valid(wsi->desc.sockfd)) {
|
2013-09-20 20:26:12 +08:00
|
|
|
|
2017-06-23 10:27:52 +08:00
|
|
|
#if defined(LWS_USE_LIBUV)
|
|
|
|
if (LWS_LIBUV_ENABLED(context))
|
|
|
|
if (lws_libuv_check_watcher_active(wsi)) {
|
|
|
|
lwsl_warn("Waiting for libuv watcher to close\n");
|
|
|
|
cce = "waiting for libuv watcher to close";
|
|
|
|
goto oom4;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2014-03-24 16:09:25 +08:00
|
|
|
#ifdef LWS_USE_IPV6
|
2017-07-21 20:35:58 +08:00
|
|
|
if (wsi->ipv6)
|
2017-02-27 12:55:56 +08:00
|
|
|
wsi->desc.sockfd = socket(AF_INET6, SOCK_STREAM, 0);
|
2017-07-21 20:35:58 +08:00
|
|
|
else
|
2014-03-24 16:09:25 +08:00
|
|
|
#endif
|
2017-02-27 12:55:56 +08:00
|
|
|
wsi->desc.sockfd = socket(AF_INET, SOCK_STREAM, 0);
|
2013-09-20 20:26:12 +08:00
|
|
|
|
2017-02-27 12:55:56 +08:00
|
|
|
if (!lws_socket_is_valid(wsi->desc.sockfd)) {
|
2013-09-20 20:26:12 +08:00
|
|
|
lwsl_warn("Unable to open socket\n");
|
2017-01-17 07:01:02 +08:00
|
|
|
cce = "unable to open socket";
|
2013-09-20 20:26:12 +08:00
|
|
|
goto oom4;
|
|
|
|
}
|
|
|
|
|
2017-02-27 12:55:56 +08:00
|
|
|
if (lws_plat_set_socket_options(wsi->vhost, wsi->desc.sockfd)) {
|
2013-09-20 20:26:12 +08:00
|
|
|
lwsl_err("Failed to set wsi socket options\n");
|
2017-02-27 12:55:56 +08:00
|
|
|
compatible_close(wsi->desc.sockfd);
|
2016-07-01 08:54:39 +08:00
|
|
|
cce = "set socket opts failed";
|
2013-09-20 20:26:12 +08:00
|
|
|
goto oom4;
|
|
|
|
}
|
|
|
|
|
2015-12-17 17:03:59 +08:00
|
|
|
wsi->mode = LWSCM_WSCL_WAITING_CONNECT;
|
2013-09-20 20:26:12 +08:00
|
|
|
|
2017-02-27 12:55:56 +08:00
|
|
|
lws_libev_accept(wsi, wsi->desc);
|
|
|
|
lws_libuv_accept(wsi, wsi->desc);
|
2017-03-15 19:41:11 +05:30
|
|
|
lws_libevent_accept(wsi, wsi->desc);
|
2017-06-23 10:27:52 +08:00
|
|
|
|
2015-11-14 13:48:58 +08:00
|
|
|
if (insert_wsi_socket_into_fds(context, wsi)) {
|
2017-02-27 12:55:56 +08:00
|
|
|
compatible_close(wsi->desc.sockfd);
|
2016-07-01 08:54:39 +08:00
|
|
|
cce = "insert wsi failed";
|
2015-10-15 07:39:33 +08:00
|
|
|
goto oom4;
|
2015-11-14 13:48:58 +08:00
|
|
|
}
|
2013-09-20 20:26:12 +08:00
|
|
|
|
2016-08-07 08:33:08 +08:00
|
|
|
lws_change_pollfd(wsi, 0, LWS_POLLIN);
|
|
|
|
|
2015-10-18 18:47:37 +08:00
|
|
|
/*
|
|
|
|
* past here, we can't simply free the structs as error
|
|
|
|
* handling as oom4 does. We have to run the whole close flow.
|
|
|
|
*/
|
|
|
|
|
2016-05-03 07:26:10 +08:00
|
|
|
if (!wsi->protocol)
|
|
|
|
wsi->protocol = &wsi->vhost->protocols[0];
|
|
|
|
|
2016-03-15 16:24:58 +08:00
|
|
|
wsi->protocol->callback(wsi, LWS_CALLBACK_WSI_CREATE,
|
|
|
|
wsi->user_space, NULL, 0);
|
|
|
|
|
2016-03-12 08:18:58 +08:00
|
|
|
lws_set_timeout(wsi, PENDING_TIMEOUT_AWAITING_CONNECT_RESPONSE,
|
|
|
|
AWAITING_TIMEOUT);
|
2014-02-18 10:06:57 +01:00
|
|
|
|
2017-06-14 09:45:30 +08:00
|
|
|
iface = lws_hdr_simple_ptr(wsi, _WSI_TOKEN_CLIENT_IFACE);
|
|
|
|
|
|
|
|
if (iface) {
|
|
|
|
n = lws_socket_bind(wsi->vhost, wsi->desc.sockfd, 0, iface);
|
|
|
|
if (n < 0) {
|
|
|
|
cce = "unable to bind socket";
|
|
|
|
goto failed;
|
|
|
|
}
|
2017-01-17 07:01:02 +08:00
|
|
|
}
|
2011-05-23 10:00:03 +01:00
|
|
|
}
|
|
|
|
|
2014-03-24 16:09:25 +08:00
|
|
|
#ifdef LWS_USE_IPV6
|
2017-07-21 20:35:58 +08:00
|
|
|
if (wsi->ipv6) {
|
|
|
|
sa46.sa6.sin6_port = htons(port);
|
2014-03-24 16:09:25 +08:00
|
|
|
n = sizeof(struct sockaddr_in6);
|
2017-07-21 20:35:58 +08:00
|
|
|
} else
|
2014-03-24 16:09:25 +08:00
|
|
|
#endif
|
2017-07-21 20:35:58 +08:00
|
|
|
{
|
|
|
|
sa46.sa4.sin_port = htons(port);
|
2014-03-24 16:09:25 +08:00
|
|
|
n = sizeof(struct sockaddr);
|
2017-07-21 20:35:58 +08:00
|
|
|
}
|
2011-05-23 10:00:03 +01:00
|
|
|
|
2017-06-20 15:56:48 +08:00
|
|
|
if (connect(wsi->desc.sockfd, (const struct sockaddr *)&sa46, n) == -1 ||
|
2017-06-12 13:36:24 +08:00
|
|
|
LWS_ERRNO == LWS_EISCONN) {
|
2015-12-06 08:40:00 +08:00
|
|
|
if (LWS_ERRNO == LWS_EALREADY ||
|
|
|
|
LWS_ERRNO == LWS_EINPROGRESS ||
|
|
|
|
LWS_ERRNO == LWS_EWOULDBLOCK
|
2015-08-26 11:31:28 -07:00
|
|
|
#ifdef _WIN32
|
|
|
|
|| LWS_ERRNO == WSAEINVAL
|
|
|
|
#endif
|
2015-12-06 08:40:00 +08:00
|
|
|
) {
|
2016-06-28 19:01:20 +08:00
|
|
|
lwsl_client("nonblocking connect retry (errno = %d)\n",
|
|
|
|
LWS_ERRNO);
|
|
|
|
|
2017-01-17 07:01:02 +08:00
|
|
|
if (lws_plat_check_connection_error(wsi)) {
|
|
|
|
cce = "socket connect failed";
|
2016-06-28 19:01:20 +08:00
|
|
|
goto failed;
|
2017-01-17 07:01:02 +08:00
|
|
|
}
|
2011-05-23 10:00:03 +01:00
|
|
|
|
2013-09-20 20:26:12 +08:00
|
|
|
/*
|
|
|
|
* must do specifically a POLLOUT poll to hear
|
|
|
|
* about the connect completion
|
|
|
|
*/
|
2017-01-17 07:01:02 +08:00
|
|
|
if (lws_change_pollfd(wsi, 0, LWS_POLLOUT)) {
|
|
|
|
cce = "POLLOUT set failed";
|
2015-10-18 18:47:37 +08:00
|
|
|
goto failed;
|
2017-01-17 07:01:02 +08:00
|
|
|
}
|
2013-09-20 20:26:12 +08:00
|
|
|
|
|
|
|
return wsi;
|
|
|
|
}
|
|
|
|
|
2014-02-28 12:37:52 +01:00
|
|
|
if (LWS_ERRNO != LWS_EISCONN) {
|
2017-01-17 07:01:02 +08:00
|
|
|
lwsl_notice("Connect failed errno=%d\n", LWS_ERRNO);
|
|
|
|
cce = "connect failed";
|
2013-10-25 15:49:11 +02:00
|
|
|
goto failed;
|
|
|
|
}
|
2013-02-09 12:25:31 +08:00
|
|
|
}
|
|
|
|
|
2013-09-20 20:26:12 +08:00
|
|
|
lwsl_client("connected\n");
|
2011-05-23 10:00:03 +01:00
|
|
|
|
|
|
|
/* we are connected to server, or proxy */
|
|
|
|
|
2017-05-05 11:38:34 -04:00
|
|
|
/* http proxy */
|
2016-03-28 10:10:43 +08:00
|
|
|
if (wsi->vhost->http_proxy_port) {
|
2011-05-23 10:00:03 +01:00
|
|
|
|
2013-10-25 22:07:57 +08:00
|
|
|
/*
|
2015-12-06 08:40:00 +08:00
|
|
|
* OK from now on we talk via the proxy, so connect to that
|
|
|
|
*
|
2013-10-25 22:07:57 +08:00
|
|
|
* (will overwrite existing pointer,
|
|
|
|
* leaving old string/frag there but unreferenced)
|
|
|
|
*/
|
|
|
|
if (lws_hdr_simple_create(wsi, _WSI_TOKEN_CLIENT_PEER_ADDRESS,
|
2016-03-28 10:10:43 +08:00
|
|
|
wsi->vhost->http_proxy_address))
|
2013-10-25 22:07:57 +08:00
|
|
|
goto failed;
|
2017-02-22 06:55:12 +08:00
|
|
|
wsi->c_port = wsi->vhost->http_proxy_port;
|
2013-10-25 22:07:57 +08:00
|
|
|
|
2017-02-27 12:55:56 +08:00
|
|
|
n = send(wsi->desc.sockfd, (char *)pt->serv_buf, plen,
|
2015-12-06 08:40:00 +08:00
|
|
|
MSG_NOSIGNAL);
|
2011-05-23 10:00:03 +01:00
|
|
|
if (n < 0) {
|
2013-01-10 19:50:35 +08:00
|
|
|
lwsl_debug("ERROR writing to proxy socket\n");
|
2017-01-17 07:01:02 +08:00
|
|
|
cce = "proxy write failed";
|
2013-09-20 20:26:12 +08:00
|
|
|
goto failed;
|
2011-05-23 10:00:03 +01:00
|
|
|
}
|
|
|
|
|
2015-12-06 08:40:00 +08:00
|
|
|
lws_set_timeout(wsi, PENDING_TIMEOUT_AWAITING_PROXY_RESPONSE,
|
|
|
|
AWAITING_TIMEOUT);
|
2011-05-23 10:00:03 +01:00
|
|
|
|
2015-12-17 17:03:59 +08:00
|
|
|
wsi->mode = LWSCM_WSCL_WAITING_PROXY_REPLY;
|
2011-05-23 10:00:03 +01:00
|
|
|
|
|
|
|
return wsi;
|
|
|
|
}
|
2017-05-05 11:38:34 -04:00
|
|
|
#if defined(LWS_WITH_SOCKS5)
|
|
|
|
/* socks proxy */
|
|
|
|
else if (wsi->vhost->socks_proxy_port) {
|
|
|
|
n = send(wsi->desc.sockfd, (char *)pt->serv_buf, plen,
|
|
|
|
MSG_NOSIGNAL);
|
|
|
|
if (n < 0) {
|
|
|
|
lwsl_debug("ERROR writing greeting to socks proxy"
|
|
|
|
"socket.\n");
|
|
|
|
cce = "socks write failed";
|
|
|
|
goto failed;
|
|
|
|
}
|
|
|
|
|
|
|
|
lws_set_timeout(wsi, PENDING_TIMEOUT_AWAITING_SOCKS_GREETING_REPLY,
|
|
|
|
AWAITING_TIMEOUT);
|
|
|
|
|
|
|
|
wsi->mode = LWSCM_WSCL_WAITING_SOCKS_GREETING_REPLY;
|
|
|
|
|
|
|
|
return wsi;
|
|
|
|
}
|
|
|
|
#endif
|
2011-05-23 10:00:03 +01:00
|
|
|
|
|
|
|
/*
|
|
|
|
* provoke service to issue the handshake directly
|
|
|
|
* we need to do it this way because in the proxy case, this is the
|
|
|
|
* next state and executed only if and when we get a good proxy
|
2013-01-13 11:05:30 +08:00
|
|
|
* response inside the state machine... but notice in SSL case this
|
|
|
|
* may not have sent anything yet with 0 return, and won't until some
|
|
|
|
* many retries from main loop. To stop that becoming endless,
|
|
|
|
* cover with a timeout.
|
2011-05-23 10:00:03 +01:00
|
|
|
*/
|
|
|
|
|
2015-12-06 08:40:00 +08:00
|
|
|
lws_set_timeout(wsi, PENDING_TIMEOUT_SENT_CLIENT_HANDSHAKE,
|
|
|
|
AWAITING_TIMEOUT);
|
2013-01-13 11:05:30 +08:00
|
|
|
|
2015-12-17 17:03:59 +08:00
|
|
|
wsi->mode = LWSCM_WSCL_ISSUE_HANDSHAKE;
|
2017-02-27 12:55:56 +08:00
|
|
|
pfd.fd = wsi->desc.sockfd;
|
2016-05-08 17:03:01 +08:00
|
|
|
pfd.events = LWS_POLLIN;
|
2014-03-30 09:18:05 +02:00
|
|
|
pfd.revents = LWS_POLLIN;
|
2013-01-09 16:17:04 +08:00
|
|
|
|
2015-12-04 08:43:54 +08:00
|
|
|
n = lws_service_fd(context, &pfd);
|
2017-01-17 07:01:02 +08:00
|
|
|
if (n < 0) {
|
|
|
|
cce = "first service failed";
|
2013-09-20 20:26:12 +08:00
|
|
|
goto failed;
|
2017-01-17 07:01:02 +08:00
|
|
|
}
|
2013-01-09 16:17:04 +08:00
|
|
|
if (n) /* returns 1 on failure after closing wsi */
|
|
|
|
return NULL;
|
|
|
|
|
2011-05-23 10:00:03 +01:00
|
|
|
return wsi;
|
|
|
|
|
|
|
|
oom4:
|
ah owns rxbuf
This is intended to solve a longstanding problem with the
relationship between http/1.1 keep-alive and the service
loop.
Ah now contain an rx buffer which is used during header
processing, and the ah may not be detached from the wsi
until the rx buffer is exhausted.
Having the rx buffer in the ah means we can delay using the
rx until a later service loop.
Ah which have pending rx force POLLIN service on the wsi
they are attached to automatically, so we can interleave
general service / connections with draining each ah rx
buffer.
The possible http/1.1 situations and their dispositions are:
1) exactly one set of http headers come. After processing,
the ah is detached since no pending rx left. If more
headers come later, a fresh ah is aqcuired when available
and the rx flow control blocks the read until then.
2) more that one whole set of headers come and we remain in
http mode (no upgrade). The ah is left attached and
returns to the service loop after the first set of headers.
We will get forced service due to the ah having pending
content (respecting flowcontrol) and process the pending
rx in the ah. If we use it all up, we will detach the
ah.
3) one set of http headers come with ws traffic appended.
We service the headers, do the upgrade, and keep the ah
until the remaining ws content is used. When we
exhausted the ws traffix in the ah rx buffer, we
detach the ah.
Since there can be any amount of http/1.1 pipelining on a
connection, and each may be expensive to service, it's now
enforced there is a return to the service loop after each
header set is serviced on a connection.
When I added the forced service for ah with pending buffering,
I added support for it to the windows plat code. However this
is untested.
Signed-off-by: Andy Green <andy.green@linaro.org>
2016-02-15 12:37:04 +08:00
|
|
|
/* we're closing, losing some rx is OK */
|
2017-06-28 12:13:13 +08:00
|
|
|
lws_header_table_force_to_detachable_state(wsi);
|
|
|
|
|
2017-01-17 07:01:02 +08:00
|
|
|
if (wsi->mode == LWSCM_HTTP_CLIENT ||
|
|
|
|
wsi->mode == LWSCM_HTTP_CLIENT_ACCEPTED ||
|
|
|
|
wsi->mode == LWSCM_WSCL_WAITING_CONNECT) {
|
2016-05-03 07:26:10 +08:00
|
|
|
wsi->vhost->protocols[0].callback(wsi,
|
|
|
|
LWS_CALLBACK_CLIENT_CONNECTION_ERROR,
|
2016-07-01 08:54:39 +08:00
|
|
|
wsi->user_space, (void *)cce, strlen(cce));
|
|
|
|
wsi->already_did_cce = 1;
|
|
|
|
}
|
2016-04-22 12:29:44 +08:00
|
|
|
/* take care that we might be inserted in fds already */
|
|
|
|
if (wsi->position_in_fds_table != -1)
|
2017-01-17 07:01:02 +08:00
|
|
|
goto failed1;
|
2017-02-21 23:38:40 +08:00
|
|
|
lws_remove_from_timeout_list(wsi);
|
2016-02-27 11:42:22 +08:00
|
|
|
lws_header_table_detach(wsi, 0);
|
2014-12-04 23:59:35 +01:00
|
|
|
lws_free(wsi);
|
2015-12-17 17:03:59 +08:00
|
|
|
|
2013-09-20 20:26:12 +08:00
|
|
|
return NULL;
|
2011-05-23 10:00:03 +01:00
|
|
|
|
2013-09-20 20:26:12 +08:00
|
|
|
failed:
|
2017-01-17 07:01:02 +08:00
|
|
|
wsi->vhost->protocols[0].callback(wsi,
|
|
|
|
LWS_CALLBACK_CLIENT_CONNECTION_ERROR,
|
|
|
|
wsi->user_space, (void *)cce, strlen(cce));
|
|
|
|
wsi->already_did_cce = 1;
|
|
|
|
failed1:
|
2015-12-15 21:15:58 +08:00
|
|
|
lws_close_free_wsi(wsi, LWS_CLOSE_STATUS_NOSTATUS);
|
2015-12-06 08:40:00 +08:00
|
|
|
|
2011-05-23 10:00:03 +01:00
|
|
|
return NULL;
|
|
|
|
}
|
2016-01-14 11:37:56 +08:00
|
|
|
|
|
|
|
/**
|
|
|
|
* lws_client_reset() - retarget a connected wsi to start over with a new connection (ie, redirect)
|
|
|
|
* this only works if still in HTTP, ie, not upgraded yet
|
|
|
|
* wsi: connection to reset
|
|
|
|
* address: network address of the new server
|
|
|
|
* port: port to connect to
|
|
|
|
* path: uri path to connect to on the new server
|
|
|
|
* host: host header to send to the new server
|
|
|
|
*/
|
|
|
|
LWS_VISIBLE struct lws *
|
2017-02-21 22:59:00 +08:00
|
|
|
lws_client_reset(struct lws **pwsi, int ssl, const char *address, int port,
|
2017-02-10 11:00:38 +08:00
|
|
|
const char *path, const char *host)
|
2016-01-14 11:37:56 +08:00
|
|
|
{
|
2017-06-14 09:45:30 +08:00
|
|
|
char origin[300] = "", protocol[300] = "", method[32] = "", iface[16] = "", *p;
|
2017-02-21 22:59:00 +08:00
|
|
|
struct lws *wsi = *pwsi;
|
2017-02-10 11:00:38 +08:00
|
|
|
|
2017-02-22 06:55:12 +08:00
|
|
|
if (wsi->redirects == 3) {
|
2016-01-14 11:37:56 +08:00
|
|
|
lwsl_err("%s: Too many redirects\n", __func__);
|
|
|
|
return NULL;
|
|
|
|
}
|
2017-02-22 06:55:12 +08:00
|
|
|
wsi->redirects++;
|
2016-01-14 11:37:56 +08:00
|
|
|
|
2017-02-09 15:25:01 +08:00
|
|
|
p = lws_hdr_simple_ptr(wsi, _WSI_TOKEN_CLIENT_ORIGIN);
|
|
|
|
if (p)
|
|
|
|
strncpy(origin, p, sizeof(origin) - 1);
|
2016-01-14 11:37:56 +08:00
|
|
|
|
2017-02-09 15:25:01 +08:00
|
|
|
p = lws_hdr_simple_ptr(wsi, _WSI_TOKEN_CLIENT_SENT_PROTOCOLS);
|
|
|
|
if (p)
|
|
|
|
strncpy(protocol, p, sizeof(protocol) - 1);
|
2016-01-14 11:37:56 +08:00
|
|
|
|
2017-02-09 15:25:01 +08:00
|
|
|
p = lws_hdr_simple_ptr(wsi, _WSI_TOKEN_CLIENT_METHOD);
|
|
|
|
if (p)
|
|
|
|
strncpy(method, p, sizeof(method) - 1);
|
2016-01-14 11:37:56 +08:00
|
|
|
|
2017-06-14 09:45:30 +08:00
|
|
|
p = lws_hdr_simple_ptr(wsi, _WSI_TOKEN_CLIENT_IFACE);
|
|
|
|
if (p)
|
|
|
|
strncpy(method, p, sizeof(iface) - 1);
|
|
|
|
|
2017-07-21 20:25:32 +08:00
|
|
|
lwsl_notice("redirect ads='%s', port=%d, path='%s', ssl = %d\n",
|
2017-02-10 11:00:38 +08:00
|
|
|
address, port, path, ssl);
|
2017-02-09 15:25:01 +08:00
|
|
|
|
|
|
|
/* close the connection by hand */
|
2016-01-14 11:37:56 +08:00
|
|
|
|
2017-07-21 20:25:32 +08:00
|
|
|
#ifdef LWS_OPENSSL_SUPPORT
|
|
|
|
lws_ssl_close(wsi);
|
|
|
|
#endif
|
|
|
|
|
2017-06-23 10:27:52 +08:00
|
|
|
#ifdef LWS_USE_LIBUV
|
|
|
|
if (LWS_LIBUV_ENABLED(wsi->context)) {
|
|
|
|
lwsl_debug("%s: lws_libuv_closehandle: wsi %p\n", __func__, wsi);
|
|
|
|
/*
|
|
|
|
* libuv has to do his own close handle processing asynchronously
|
|
|
|
* but once it starts we can do everything else synchronously,
|
|
|
|
* including trash wsi->desc.sockfd since it took a copy.
|
|
|
|
*
|
|
|
|
* When it completes it will call compatible_close()
|
|
|
|
*/
|
|
|
|
lws_libuv_closehandle_manually(wsi);
|
|
|
|
} else
|
|
|
|
#else
|
2017-02-27 12:55:56 +08:00
|
|
|
compatible_close(wsi->desc.sockfd);
|
2017-06-23 10:27:52 +08:00
|
|
|
#endif
|
|
|
|
|
2016-01-14 11:37:56 +08:00
|
|
|
remove_wsi_socket_from_fds(wsi);
|
2017-02-09 15:25:01 +08:00
|
|
|
|
2017-07-21 20:25:32 +08:00
|
|
|
#ifdef LWS_OPENSSL_SUPPORT
|
|
|
|
wsi->use_ssl = ssl;
|
|
|
|
#else
|
|
|
|
if (ssl) {
|
|
|
|
lwsl_err("%s: not configured for ssl\n", __func__);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2017-02-27 12:55:56 +08:00
|
|
|
wsi->desc.sockfd = LWS_SOCK_INVALID;
|
2016-01-14 11:37:56 +08:00
|
|
|
wsi->state = LWSS_CLIENT_UNCONNECTED;
|
|
|
|
wsi->protocol = NULL;
|
|
|
|
wsi->pending_timeout = NO_PENDING_TIMEOUT;
|
2017-02-22 06:55:12 +08:00
|
|
|
wsi->c_port = port;
|
2017-02-09 15:25:01 +08:00
|
|
|
wsi->hdr_parsing_completed = 0;
|
|
|
|
_lws_header_table_reset(wsi->u.hdr.ah);
|
|
|
|
|
|
|
|
if (lws_hdr_simple_create(wsi, _WSI_TOKEN_CLIENT_PEER_ADDRESS, address))
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
if (lws_hdr_simple_create(wsi, _WSI_TOKEN_CLIENT_HOST, host))
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
if (origin[0])
|
|
|
|
if (lws_hdr_simple_create(wsi, _WSI_TOKEN_CLIENT_ORIGIN,
|
|
|
|
origin))
|
|
|
|
return NULL;
|
|
|
|
if (protocol[0])
|
|
|
|
if (lws_hdr_simple_create(wsi, _WSI_TOKEN_CLIENT_SENT_PROTOCOLS,
|
|
|
|
protocol))
|
|
|
|
return NULL;
|
|
|
|
if (method[0])
|
|
|
|
if (lws_hdr_simple_create(wsi, _WSI_TOKEN_CLIENT_METHOD,
|
|
|
|
method))
|
|
|
|
return NULL;
|
2016-01-14 11:37:56 +08:00
|
|
|
|
2017-06-14 09:45:30 +08:00
|
|
|
if (iface[0])
|
|
|
|
if (lws_hdr_simple_create(wsi, _WSI_TOKEN_CLIENT_IFACE,
|
|
|
|
iface))
|
|
|
|
return NULL;
|
|
|
|
|
2017-02-10 11:00:38 +08:00
|
|
|
origin[0] = '/';
|
|
|
|
strncpy(&origin[1], path, sizeof(origin) - 2);
|
|
|
|
if (lws_hdr_simple_create(wsi, _WSI_TOKEN_CLIENT_URI, origin))
|
|
|
|
return NULL;
|
|
|
|
|
2017-02-21 22:59:00 +08:00
|
|
|
*pwsi = lws_client_connect_2(wsi);
|
|
|
|
|
|
|
|
return *pwsi;
|
2016-01-14 11:37:56 +08:00
|
|
|
}
|
|
|
|
|
2016-03-20 11:55:25 +08:00
|
|
|
#ifdef LWS_WITH_HTTP_PROXY
|
2016-03-20 11:59:53 +08:00
|
|
|
static hubbub_error
|
|
|
|
html_parser_cb(const hubbub_token *token, void *pw)
|
|
|
|
{
|
|
|
|
struct lws_rewrite *r = (struct lws_rewrite *)pw;
|
|
|
|
char buf[1024], *start = buf + LWS_PRE, *p = start,
|
|
|
|
*end = &buf[sizeof(buf) - 1];
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
switch (token->type) {
|
|
|
|
case HUBBUB_TOKEN_DOCTYPE:
|
|
|
|
|
2016-09-15 02:22:57 +08:00
|
|
|
p += lws_snprintf(p, end - p, "<!DOCTYPE %.*s %s ",
|
2016-03-20 11:59:53 +08:00
|
|
|
(int) token->data.doctype.name.len,
|
|
|
|
token->data.doctype.name.ptr,
|
|
|
|
token->data.doctype.force_quirks ?
|
|
|
|
"(force-quirks) " : "");
|
|
|
|
|
|
|
|
if (token->data.doctype.public_missing)
|
2017-06-12 13:36:24 +08:00
|
|
|
lwsl_debug("\tpublic: missing\n");
|
2016-03-20 11:59:53 +08:00
|
|
|
else
|
2016-09-15 02:22:57 +08:00
|
|
|
p += lws_snprintf(p, end - p, "PUBLIC \"%.*s\"\n",
|
2016-03-20 11:59:53 +08:00
|
|
|
(int) token->data.doctype.public_id.len,
|
|
|
|
token->data.doctype.public_id.ptr);
|
|
|
|
|
|
|
|
if (token->data.doctype.system_missing)
|
2017-06-12 13:36:24 +08:00
|
|
|
lwsl_debug("\tsystem: missing\n");
|
2016-03-20 11:59:53 +08:00
|
|
|
else
|
2016-09-15 02:22:57 +08:00
|
|
|
p += lws_snprintf(p, end - p, " \"%.*s\">\n",
|
2016-03-20 11:59:53 +08:00
|
|
|
(int) token->data.doctype.system_id.len,
|
|
|
|
token->data.doctype.system_id.ptr);
|
|
|
|
|
|
|
|
break;
|
|
|
|
case HUBBUB_TOKEN_START_TAG:
|
2016-09-15 02:22:57 +08:00
|
|
|
p += lws_snprintf(p, end - p, "<%.*s", (int)token->data.tag.name.len,
|
2016-03-20 11:59:53 +08:00
|
|
|
token->data.tag.name.ptr);
|
|
|
|
|
|
|
|
/* (token->data.tag.self_closing) ?
|
|
|
|
"(self-closing) " : "",
|
|
|
|
(token->data.tag.n_attributes > 0) ?
|
|
|
|
"attributes:" : "");
|
|
|
|
*/
|
|
|
|
for (i = 0; i < token->data.tag.n_attributes; i++) {
|
|
|
|
if (!hstrcmp(&token->data.tag.attributes[i].name, "href", 4) ||
|
|
|
|
!hstrcmp(&token->data.tag.attributes[i].name, "action", 6) ||
|
|
|
|
!hstrcmp(&token->data.tag.attributes[i].name, "src", 3)) {
|
|
|
|
const char *pp = (const char *)token->data.tag.attributes[i].value.ptr;
|
|
|
|
int plen = (int) token->data.tag.attributes[i].value.len;
|
|
|
|
|
2017-06-12 13:36:24 +08:00
|
|
|
if (strncmp(pp, "http:", 5) && strncmp(pp, "https:", 6)) {
|
|
|
|
|
|
|
|
if (!hstrcmp(&token->data.tag.attributes[i].value,
|
|
|
|
r->from, r->from_len)) {
|
|
|
|
pp += r->from_len;
|
|
|
|
plen -= r->from_len;
|
|
|
|
}
|
|
|
|
p += lws_snprintf(p, end - p, " %.*s=\"%s/%.*s\"",
|
|
|
|
(int) token->data.tag.attributes[i].name.len,
|
|
|
|
token->data.tag.attributes[i].name.ptr,
|
|
|
|
r->to, plen, pp);
|
|
|
|
continue;
|
2016-03-20 11:59:53 +08:00
|
|
|
}
|
2017-06-12 13:36:24 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
p += lws_snprintf(p, end - p, " %.*s=\"%.*s\"",
|
|
|
|
(int) token->data.tag.attributes[i].name.len,
|
|
|
|
token->data.tag.attributes[i].name.ptr,
|
|
|
|
(int) token->data.tag.attributes[i].value.len,
|
|
|
|
token->data.tag.attributes[i].value.ptr);
|
2016-03-20 11:59:53 +08:00
|
|
|
}
|
2017-06-12 13:36:24 +08:00
|
|
|
p += lws_snprintf(p, end - p, ">");
|
2016-03-20 11:59:53 +08:00
|
|
|
break;
|
|
|
|
case HUBBUB_TOKEN_END_TAG:
|
2016-09-15 02:22:57 +08:00
|
|
|
p += lws_snprintf(p, end - p, "</%.*s", (int) token->data.tag.name.len,
|
2016-03-20 11:59:53 +08:00
|
|
|
token->data.tag.name.ptr);
|
|
|
|
/*
|
|
|
|
(token->data.tag.self_closing) ?
|
|
|
|
"(self-closing) " : "",
|
|
|
|
(token->data.tag.n_attributes > 0) ?
|
|
|
|
"attributes:" : "");
|
|
|
|
*/
|
|
|
|
for (i = 0; i < token->data.tag.n_attributes; i++) {
|
2016-09-15 02:22:57 +08:00
|
|
|
p += lws_snprintf(p, end - p, " %.*s='%.*s'\n",
|
2016-03-20 11:59:53 +08:00
|
|
|
(int) token->data.tag.attributes[i].name.len,
|
|
|
|
token->data.tag.attributes[i].name.ptr,
|
|
|
|
(int) token->data.tag.attributes[i].value.len,
|
|
|
|
token->data.tag.attributes[i].value.ptr);
|
|
|
|
}
|
2017-06-12 13:36:24 +08:00
|
|
|
p += lws_snprintf(p, end - p, ">");
|
2016-03-20 11:59:53 +08:00
|
|
|
break;
|
|
|
|
case HUBBUB_TOKEN_COMMENT:
|
2016-09-15 02:22:57 +08:00
|
|
|
p += lws_snprintf(p, end - p, "<!-- %.*s -->\n",
|
2016-03-20 11:59:53 +08:00
|
|
|
(int) token->data.comment.len,
|
|
|
|
token->data.comment.ptr);
|
|
|
|
break;
|
|
|
|
case HUBBUB_TOKEN_CHARACTER:
|
2017-06-12 13:36:24 +08:00
|
|
|
if (token->data.character.len == 1) {
|
|
|
|
if (*token->data.character.ptr == '<') {
|
|
|
|
p += lws_snprintf(p, end - p, "<");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (*token->data.character.ptr == '>') {
|
|
|
|
p += lws_snprintf(p, end - p, ">");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (*token->data.character.ptr == '&') {
|
|
|
|
p += lws_snprintf(p, end - p, "&");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-09-15 02:22:57 +08:00
|
|
|
p += lws_snprintf(p, end - p, "%.*s", (int) token->data.character.len,
|
2016-03-20 11:59:53 +08:00
|
|
|
token->data.character.ptr);
|
|
|
|
break;
|
|
|
|
case HUBBUB_TOKEN_EOF:
|
2016-09-15 02:22:57 +08:00
|
|
|
p += lws_snprintf(p, end - p, "\n");
|
2016-03-20 11:59:53 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (user_callback_handle_rxflow(r->wsi->protocol->callback,
|
|
|
|
r->wsi, LWS_CALLBACK_RECEIVE_CLIENT_HTTP_READ,
|
|
|
|
r->wsi->user_space, start, p - start))
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
return HUBBUB_OK;
|
|
|
|
}
|
2016-03-20 11:55:25 +08:00
|
|
|
#endif
|
2016-01-12 17:22:06 +08:00
|
|
|
|
2015-12-04 11:08:32 +08:00
|
|
|
LWS_VISIBLE struct lws *
|
2016-01-12 17:22:06 +08:00
|
|
|
lws_client_connect_via_info(struct lws_client_connect_info *i)
|
2011-01-22 12:51:57 +00:00
|
|
|
{
|
2015-12-04 11:08:32 +08:00
|
|
|
struct lws *wsi;
|
2016-01-11 11:34:01 +08:00
|
|
|
int v = SPEC_LATEST_SUPPORTED;
|
2017-02-15 09:12:39 +08:00
|
|
|
const struct lws_protocols *p;
|
2013-01-20 17:08:31 +08:00
|
|
|
|
2016-05-08 17:03:01 +08:00
|
|
|
if (i->context->requested_kill)
|
|
|
|
return NULL;
|
|
|
|
|
2016-08-07 08:33:08 +08:00
|
|
|
if (!i->context->protocol_init_done)
|
|
|
|
lws_protocol_init(i->context);
|
|
|
|
|
2015-12-04 11:08:32 +08:00
|
|
|
wsi = lws_zalloc(sizeof(struct lws));
|
2011-02-14 20:25:43 +00:00
|
|
|
if (wsi == NULL)
|
2013-02-11 21:43:41 +08:00
|
|
|
goto bail;
|
2011-01-22 12:51:57 +00:00
|
|
|
|
2016-01-11 11:34:01 +08:00
|
|
|
wsi->context = i->context;
|
2016-02-29 14:19:16 +08:00
|
|
|
/* assert the mode and union status (hdr) clearly */
|
2016-02-29 13:18:30 +08:00
|
|
|
lws_union_transition(wsi, LWSCM_HTTP_CLIENT);
|
2017-02-27 12:55:56 +08:00
|
|
|
wsi->desc.sockfd = LWS_SOCK_INVALID;
|
2011-02-14 17:52:39 +00:00
|
|
|
|
2016-02-29 14:19:16 +08:00
|
|
|
/* 1) fill up the wsi with stuff from the connect_info as far as it
|
|
|
|
* can go. It's because not only is our connection async, we might
|
|
|
|
* not even be able to get ahold of an ah at this point.
|
|
|
|
*/
|
2011-02-09 08:49:14 +00:00
|
|
|
|
2016-02-29 14:19:16 +08:00
|
|
|
/* -1 means just use latest supported */
|
2016-01-11 11:34:01 +08:00
|
|
|
if (i->ietf_version_or_minus_one != -1 && i->ietf_version_or_minus_one)
|
|
|
|
v = i->ietf_version_or_minus_one;
|
2011-02-09 08:49:14 +00:00
|
|
|
|
2016-01-11 11:34:01 +08:00
|
|
|
wsi->ietf_spec_revision = v;
|
2011-01-22 12:51:57 +00:00
|
|
|
wsi->user_space = NULL;
|
2015-12-17 17:03:59 +08:00
|
|
|
wsi->state = LWSS_CLIENT_UNCONNECTED;
|
2011-02-14 17:59:43 +00:00
|
|
|
wsi->pending_timeout = NO_PENDING_TIMEOUT;
|
2016-02-22 23:32:52 +08:00
|
|
|
wsi->position_in_fds_table = -1;
|
2017-02-22 06:55:12 +08:00
|
|
|
wsi->c_port = i->port;
|
2016-03-28 10:10:43 +08:00
|
|
|
wsi->vhost = i->vhost;
|
|
|
|
if (!wsi->vhost)
|
|
|
|
wsi->vhost = i->context->vhost_list;
|
2016-02-29 14:19:16 +08:00
|
|
|
|
2016-03-28 10:10:43 +08:00
|
|
|
wsi->protocol = &wsi->vhost->protocols[0];
|
2017-02-15 09:12:39 +08:00
|
|
|
|
|
|
|
/* for http[s] connection, allow protocol selection by name */
|
|
|
|
|
|
|
|
if (i->method && i->vhost && i->protocol) {
|
|
|
|
p = lws_vhost_name_to_protocol(i->vhost, i->protocol);
|
|
|
|
if (p)
|
|
|
|
wsi->protocol = p;
|
|
|
|
}
|
|
|
|
|
2016-02-29 14:19:16 +08:00
|
|
|
if (wsi && !wsi->user_space && i->userdata) {
|
|
|
|
wsi->user_space_externally_allocated = 1;
|
|
|
|
wsi->user_space = i->userdata;
|
2016-03-02 09:17:22 +08:00
|
|
|
} else
|
|
|
|
/* if we stay in http, we can assign the user space now,
|
|
|
|
* otherwise do it after the protocol negotiated
|
|
|
|
*/
|
|
|
|
if (i->method)
|
2016-04-23 07:53:46 +08:00
|
|
|
if (lws_ensure_user_space(wsi))
|
|
|
|
goto bail;
|
2014-04-02 19:45:42 +08:00
|
|
|
|
2011-02-14 20:25:43 +00:00
|
|
|
#ifdef LWS_OPENSSL_SUPPORT
|
2016-01-11 11:34:01 +08:00
|
|
|
wsi->use_ssl = i->ssl_connection;
|
2014-04-03 10:17:00 +08:00
|
|
|
#else
|
2016-01-11 11:34:01 +08:00
|
|
|
if (i->ssl_connection) {
|
2014-04-03 10:17:00 +08:00
|
|
|
lwsl_err("libwebsockets not configured for ssl\n");
|
|
|
|
goto bail;
|
|
|
|
}
|
2011-02-14 20:25:43 +00:00
|
|
|
#endif
|
|
|
|
|
2016-02-29 14:19:16 +08:00
|
|
|
/* 2) stash the things from connect_info that we can't process without
|
|
|
|
* an ah. Because if no ah, we will go on the ah waiting list and
|
|
|
|
* process those things later (after the connect_info and maybe the
|
|
|
|
* things pointed to have gone out of scope.
|
|
|
|
*/
|
|
|
|
|
|
|
|
wsi->u.hdr.stash = lws_malloc(sizeof(*wsi->u.hdr.stash));
|
|
|
|
if (!wsi->u.hdr.stash) {
|
|
|
|
lwsl_err("%s: OOM\n", __func__);
|
2013-02-11 13:04:45 +08:00
|
|
|
goto bail;
|
2016-02-29 14:19:16 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
wsi->u.hdr.stash->origin[0] = '\0';
|
|
|
|
wsi->u.hdr.stash->protocol[0] = '\0';
|
2016-02-29 13:18:30 +08:00
|
|
|
wsi->u.hdr.stash->method[0] = '\0';
|
2017-06-14 09:45:30 +08:00
|
|
|
wsi->u.hdr.stash->iface[0] = '\0';
|
2016-02-29 14:19:16 +08:00
|
|
|
|
|
|
|
strncpy(wsi->u.hdr.stash->address, i->address,
|
|
|
|
sizeof(wsi->u.hdr.stash->address) - 1);
|
|
|
|
strncpy(wsi->u.hdr.stash->path, i->path,
|
|
|
|
sizeof(wsi->u.hdr.stash->path) - 1);
|
|
|
|
strncpy(wsi->u.hdr.stash->host, i->host,
|
|
|
|
sizeof(wsi->u.hdr.stash->host) - 1);
|
|
|
|
if (i->origin)
|
|
|
|
strncpy(wsi->u.hdr.stash->origin, i->origin,
|
|
|
|
sizeof(wsi->u.hdr.stash->origin) - 1);
|
|
|
|
if (i->protocol)
|
|
|
|
strncpy(wsi->u.hdr.stash->protocol, i->protocol,
|
|
|
|
sizeof(wsi->u.hdr.stash->protocol) - 1);
|
2016-02-29 13:18:30 +08:00
|
|
|
if (i->method)
|
|
|
|
strncpy(wsi->u.hdr.stash->method, i->method,
|
|
|
|
sizeof(wsi->u.hdr.stash->method) - 1);
|
2017-06-14 09:45:30 +08:00
|
|
|
if (i->iface)
|
|
|
|
strncpy(wsi->u.hdr.stash->iface, i->iface,
|
|
|
|
sizeof(wsi->u.hdr.stash->iface) - 1);
|
2016-02-29 14:19:16 +08:00
|
|
|
|
|
|
|
wsi->u.hdr.stash->address[sizeof(wsi->u.hdr.stash->address) - 1] = '\0';
|
|
|
|
wsi->u.hdr.stash->path[sizeof(wsi->u.hdr.stash->path) - 1] = '\0';
|
|
|
|
wsi->u.hdr.stash->host[sizeof(wsi->u.hdr.stash->host) - 1] = '\0';
|
|
|
|
wsi->u.hdr.stash->origin[sizeof(wsi->u.hdr.stash->origin) - 1] = '\0';
|
|
|
|
wsi->u.hdr.stash->protocol[sizeof(wsi->u.hdr.stash->protocol) - 1] = '\0';
|
2016-02-29 13:18:30 +08:00
|
|
|
wsi->u.hdr.stash->method[sizeof(wsi->u.hdr.stash->method) - 1] = '\0';
|
2017-06-14 09:45:30 +08:00
|
|
|
wsi->u.hdr.stash->iface[sizeof(wsi->u.hdr.stash->iface) - 1] = '\0';
|
2016-02-29 14:19:16 +08:00
|
|
|
|
2016-07-01 08:54:39 +08:00
|
|
|
if (i->pwsi)
|
|
|
|
*i->pwsi = wsi;
|
|
|
|
|
2016-02-29 14:19:16 +08:00
|
|
|
/* if we went on the waiting list, no probs just return the wsi
|
|
|
|
* when we get the ah, now or later, he will call
|
2016-05-08 17:03:01 +08:00
|
|
|
* lws_client_connect_via_info2() below.
|
2016-02-29 14:19:16 +08:00
|
|
|
*/
|
2016-07-01 08:54:39 +08:00
|
|
|
if (lws_header_table_attach(wsi, 0) < 0) {
|
|
|
|
/*
|
|
|
|
* if we failed here, the connection is already closed
|
|
|
|
* and freed.
|
|
|
|
*/
|
|
|
|
goto bail1;
|
|
|
|
}
|
2016-02-29 14:19:16 +08:00
|
|
|
|
2016-03-02 09:17:22 +08:00
|
|
|
if (i->parent_wsi) {
|
|
|
|
lwsl_info("%s: created child %p of parent %p\n", __func__,
|
|
|
|
wsi, i->parent_wsi);
|
|
|
|
wsi->parent = i->parent_wsi;
|
|
|
|
wsi->sibling_list = i->parent_wsi->child_list;
|
|
|
|
i->parent_wsi->child_list = wsi;
|
|
|
|
}
|
2016-03-20 11:55:25 +08:00
|
|
|
#ifdef LWS_WITH_HTTP_PROXY
|
2016-03-20 11:59:53 +08:00
|
|
|
if (i->uri_replace_to)
|
|
|
|
wsi->rw = lws_rewrite_create(wsi, html_parser_cb,
|
|
|
|
i->uri_replace_from,
|
|
|
|
i->uri_replace_to);
|
2016-03-20 11:55:25 +08:00
|
|
|
#endif
|
2016-03-20 11:59:53 +08:00
|
|
|
|
2016-02-29 14:19:16 +08:00
|
|
|
return wsi;
|
|
|
|
|
|
|
|
bail:
|
|
|
|
lws_free(wsi);
|
|
|
|
|
2016-07-01 08:54:39 +08:00
|
|
|
bail1:
|
|
|
|
if (i->pwsi)
|
|
|
|
*i->pwsi = NULL;
|
|
|
|
|
2016-02-29 14:19:16 +08:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
struct lws *
|
|
|
|
lws_client_connect_via_info2(struct lws *wsi)
|
|
|
|
{
|
|
|
|
struct client_info_stash *stash = wsi->u.hdr.stash;
|
|
|
|
|
|
|
|
if (!stash)
|
|
|
|
return wsi;
|
2013-02-11 13:04:45 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* we're not necessarily in a position to action these right away,
|
|
|
|
* stash them... we only need during connect phase so u.hdr is fine
|
|
|
|
*/
|
2016-02-29 14:19:16 +08:00
|
|
|
if (lws_hdr_simple_create(wsi, _WSI_TOKEN_CLIENT_PEER_ADDRESS,
|
|
|
|
stash->address))
|
2013-02-11 13:04:45 +08:00
|
|
|
goto bail1;
|
2011-05-23 10:00:03 +01:00
|
|
|
|
2013-02-11 13:04:45 +08:00
|
|
|
/* these only need u.hdr lifetime as well */
|
2011-02-14 20:25:43 +00:00
|
|
|
|
2016-02-29 14:19:16 +08:00
|
|
|
if (lws_hdr_simple_create(wsi, _WSI_TOKEN_CLIENT_URI, stash->path))
|
2011-02-14 20:25:43 +00:00
|
|
|
goto bail1;
|
|
|
|
|
2016-02-29 14:19:16 +08:00
|
|
|
if (lws_hdr_simple_create(wsi, _WSI_TOKEN_CLIENT_HOST, stash->host))
|
2013-02-11 13:04:45 +08:00
|
|
|
goto bail1;
|
2012-04-20 12:16:52 +08:00
|
|
|
|
2016-02-29 14:19:16 +08:00
|
|
|
if (stash->origin[0])
|
|
|
|
if (lws_hdr_simple_create(wsi, _WSI_TOKEN_CLIENT_ORIGIN,
|
|
|
|
stash->origin))
|
2013-02-11 13:04:45 +08:00
|
|
|
goto bail1;
|
|
|
|
/*
|
|
|
|
* this is a list of protocols we tell the server we're okay with
|
|
|
|
* stash it for later when we compare server response with it
|
|
|
|
*/
|
2016-02-29 14:19:16 +08:00
|
|
|
if (stash->protocol[0])
|
2015-12-06 08:40:00 +08:00
|
|
|
if (lws_hdr_simple_create(wsi, _WSI_TOKEN_CLIENT_SENT_PROTOCOLS,
|
2016-02-29 14:19:16 +08:00
|
|
|
stash->protocol))
|
2013-02-11 13:04:45 +08:00
|
|
|
goto bail1;
|
2016-02-29 13:18:30 +08:00
|
|
|
if (stash->method[0])
|
|
|
|
if (lws_hdr_simple_create(wsi, _WSI_TOKEN_CLIENT_METHOD,
|
|
|
|
stash->method))
|
|
|
|
goto bail1;
|
2017-06-14 09:45:30 +08:00
|
|
|
if (stash->iface[0])
|
|
|
|
if (lws_hdr_simple_create(wsi, _WSI_TOKEN_CLIENT_IFACE,
|
|
|
|
stash->iface))
|
|
|
|
goto bail1;
|
2013-02-11 13:04:45 +08:00
|
|
|
|
2017-05-05 11:38:34 -04:00
|
|
|
#if defined(LWS_WITH_SOCKS5)
|
|
|
|
if (!wsi->vhost->socks_proxy_port)
|
|
|
|
lws_free_set_NULL(wsi->u.hdr.stash);
|
|
|
|
#endif
|
2011-01-22 12:51:57 +00:00
|
|
|
|
|
|
|
/*
|
2011-05-23 10:00:03 +01:00
|
|
|
* Check with each extension if it is able to route and proxy this
|
|
|
|
* connection for us. For example, an extension like x-google-mux
|
|
|
|
* can handle this and then we don't need an actual socket for this
|
|
|
|
* connection.
|
2011-01-27 22:01:43 +00:00
|
|
|
*/
|
2015-12-14 08:52:03 +08:00
|
|
|
|
2016-02-29 14:19:16 +08:00
|
|
|
if (lws_ext_cb_all_exts(wsi->context, wsi,
|
|
|
|
LWS_EXT_CB_CAN_PROXY_CLIENT_CONNECTION,
|
|
|
|
(void *)stash->address,
|
2017-02-22 06:55:12 +08:00
|
|
|
wsi->c_port) > 0) {
|
2015-12-04 08:43:54 +08:00
|
|
|
lwsl_client("lws_client_connect: ext handling conn\n");
|
2011-01-28 09:39:29 +00:00
|
|
|
|
2015-12-04 08:43:54 +08:00
|
|
|
lws_set_timeout(wsi,
|
2013-02-11 17:13:32 +08:00
|
|
|
PENDING_TIMEOUT_AWAITING_EXTENSION_CONNECT_RESPONSE,
|
2015-12-06 08:40:00 +08:00
|
|
|
AWAITING_TIMEOUT);
|
2011-01-27 06:26:52 +00:00
|
|
|
|
2015-12-17 17:03:59 +08:00
|
|
|
wsi->mode = LWSCM_WSCL_WAITING_EXTENSION_CONNECT;
|
2011-02-14 20:25:43 +00:00
|
|
|
return wsi;
|
2011-01-27 22:01:43 +00:00
|
|
|
}
|
2015-12-04 08:43:54 +08:00
|
|
|
lwsl_client("lws_client_connect: direct conn\n");
|
2016-02-14 09:27:41 +08:00
|
|
|
wsi->context->count_wsi_allocated++;
|
|
|
|
|
2015-12-25 12:44:12 +08:00
|
|
|
return lws_client_connect_2(wsi);
|
2011-01-22 12:51:57 +00:00
|
|
|
|
|
|
|
bail1:
|
2017-05-05 11:38:34 -04:00
|
|
|
#if defined(LWS_WITH_SOCKS5)
|
|
|
|
if (!wsi->vhost->socks_proxy_port)
|
|
|
|
lws_free_set_NULL(wsi->u.hdr.stash);
|
|
|
|
#endif
|
2011-01-22 12:51:57 +00:00
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
2012-04-20 12:19:01 +08:00
|
|
|
|
2015-12-04 11:08:32 +08:00
|
|
|
LWS_VISIBLE struct lws *
|
2015-12-06 08:40:00 +08:00
|
|
|
lws_client_connect_extended(struct lws_context *context, const char *address,
|
|
|
|
int port, int ssl_connection, const char *path,
|
|
|
|
const char *host, const char *origin,
|
|
|
|
const char *protocol, int ietf_version_or_minus_one,
|
|
|
|
void *userdata)
|
2012-04-20 12:19:01 +08:00
|
|
|
{
|
2016-01-11 11:34:01 +08:00
|
|
|
struct lws_client_connect_info i;
|
|
|
|
|
|
|
|
memset(&i, 0, sizeof(i));
|
|
|
|
|
|
|
|
i.context = context;
|
|
|
|
i.address = address;
|
|
|
|
i.port = port;
|
|
|
|
i.ssl_connection = ssl_connection;
|
|
|
|
i.path = path;
|
|
|
|
i.host = host;
|
|
|
|
i.origin = origin;
|
|
|
|
i.protocol = protocol;
|
|
|
|
i.ietf_version_or_minus_one = ietf_version_or_minus_one;
|
|
|
|
i.userdata = userdata;
|
|
|
|
|
2016-01-12 17:22:06 +08:00
|
|
|
return lws_client_connect_via_info(&i);
|
2016-01-11 11:34:01 +08:00
|
|
|
}
|
2015-12-06 08:40:00 +08:00
|
|
|
|
2016-01-11 11:34:01 +08:00
|
|
|
LWS_VISIBLE struct lws *
|
|
|
|
lws_client_connect(struct lws_context *context, const char *address,
|
|
|
|
int port, int ssl_connection, const char *path,
|
|
|
|
const char *host, const char *origin,
|
|
|
|
const char *protocol, int ietf_version_or_minus_one)
|
|
|
|
{
|
2016-02-02 09:02:24 +08:00
|
|
|
struct lws_client_connect_info i;
|
|
|
|
|
|
|
|
memset(&i, 0, sizeof(i));
|
|
|
|
|
|
|
|
i.context = context;
|
|
|
|
i.address = address;
|
|
|
|
i.port = port;
|
|
|
|
i.ssl_connection = ssl_connection;
|
|
|
|
i.path = path;
|
|
|
|
i.host = host;
|
|
|
|
i.origin = origin;
|
|
|
|
i.protocol = protocol;
|
|
|
|
i.ietf_version_or_minus_one = ietf_version_or_minus_one;
|
|
|
|
i.userdata = NULL;
|
|
|
|
|
|
|
|
return lws_client_connect_via_info(&i);
|
2013-02-11 17:13:32 +08:00
|
|
|
}
|
2016-01-11 11:34:01 +08:00
|
|
|
|
2017-05-05 11:38:34 -04:00
|
|
|
#if defined(LWS_WITH_SOCKS5)
|
|
|
|
void socks_generate_msg(struct lws *wsi, enum socks_msg_type type,
|
|
|
|
size_t *msg_len)
|
|
|
|
{
|
|
|
|
struct lws_context *context = wsi->context;
|
|
|
|
struct lws_context_per_thread *pt = &context->pt[(int)wsi->tsi];
|
|
|
|
size_t len = 0;
|
|
|
|
|
|
|
|
if (type == SOCKS_MSG_GREETING) {
|
|
|
|
/* socks version, version 5 only */
|
|
|
|
pt->serv_buf[len++] = SOCKS_VERSION_5;
|
|
|
|
/* number of methods */
|
|
|
|
pt->serv_buf[len++] = 2;
|
|
|
|
/* username password method */
|
|
|
|
pt->serv_buf[len++] = SOCKS_AUTH_USERNAME_PASSWORD;
|
|
|
|
/* no authentication method */
|
|
|
|
pt->serv_buf[len++] = SOCKS_AUTH_NO_AUTH;
|
|
|
|
}
|
|
|
|
else if (type == SOCKS_MSG_USERNAME_PASSWORD) {
|
|
|
|
size_t user_len = 0;
|
|
|
|
size_t passwd_len = 0;
|
|
|
|
|
|
|
|
user_len = strlen(wsi->vhost->socks_user);
|
|
|
|
passwd_len = strlen(wsi->vhost->socks_password);
|
|
|
|
|
|
|
|
/* the subnegotiation version */
|
|
|
|
pt->serv_buf[len++] = SOCKS_SUBNEGOTIATION_VERSION_1;
|
|
|
|
/* length of the user name */
|
|
|
|
pt->serv_buf[len++] = user_len;
|
|
|
|
/* user name */
|
|
|
|
strncpy((char *)&pt->serv_buf[len], wsi->vhost->socks_user,
|
|
|
|
context->pt_serv_buf_size - len);
|
|
|
|
len += user_len;
|
|
|
|
/* length of the password */
|
|
|
|
pt->serv_buf[len++] = passwd_len;
|
|
|
|
/* password */
|
|
|
|
strncpy((char *)&pt->serv_buf[len], wsi->vhost->socks_password,
|
|
|
|
context->pt_serv_buf_size - len);
|
|
|
|
len += passwd_len;
|
|
|
|
}
|
|
|
|
else if (type == SOCKS_MSG_CONNECT) {
|
|
|
|
size_t len_index = 0;
|
|
|
|
short net_num = 0;
|
|
|
|
char *net_buf = (char*)&net_num;
|
|
|
|
|
|
|
|
/* socks version */
|
|
|
|
pt->serv_buf[len++] = SOCKS_VERSION_5;
|
|
|
|
/* socks command */
|
|
|
|
pt->serv_buf[len++] = SOCKS_COMMAND_CONNECT;
|
|
|
|
/* reserved */
|
|
|
|
pt->serv_buf[len++] = 0;
|
|
|
|
/* address type */
|
|
|
|
pt->serv_buf[len++] = SOCKS_ATYP_DOMAINNAME;
|
|
|
|
len_index = len;
|
|
|
|
len++;
|
|
|
|
/* the address we tell SOCKS proxy to connect to */
|
|
|
|
strncpy((char *)&(pt->serv_buf[len]), wsi->u.hdr.stash->address,
|
|
|
|
context->pt_serv_buf_size - len);
|
|
|
|
len += strlen(wsi->u.hdr.stash->address);
|
|
|
|
net_num = htons((short)wsi->c_port);
|
|
|
|
/* the port we tell SOCKS proxy to connect to */
|
|
|
|
pt->serv_buf[len++] = net_buf[0];
|
|
|
|
pt->serv_buf[len++] = net_buf[1];
|
|
|
|
/* the length of the address, excluding port */
|
|
|
|
pt->serv_buf[len_index] = strlen(wsi->u.hdr.stash->address);
|
|
|
|
}
|
|
|
|
|
|
|
|
*msg_len = len;
|
|
|
|
}
|
|
|
|
#endif
|