test-server-http.c 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803
  1. /*
  2. * libwebsockets-test-server - libwebsockets test implementation
  3. *
  4. * Copyright (C) 2010-2016 Andy Green <andy@warmcat.com>
  5. *
  6. * This file is made available under the Creative Commons CC0 1.0
  7. * Universal Public Domain Dedication.
  8. *
  9. * The person who associated a work with this deed has dedicated
  10. * the work to the public domain by waiving all of his or her rights
  11. * to the work worldwide under copyright law, including all related
  12. * and neighboring rights, to the extent allowed by law. You can copy,
  13. * modify, distribute and perform the work, even for commercial purposes,
  14. * all without asking permission.
  15. *
  16. * The test apps are intended to be adapted for use in your code, which
  17. * may be proprietary. So unlike the library itself, they are licensed
  18. * Public Domain.
  19. */
  20. #include "test-server.h"
  21. /*
  22. * This demo server shows how to use libwebsockets for one or more
  23. * websocket protocols in the same server
  24. *
  25. * It defines the following websocket protocols:
  26. *
  27. * dumb-increment-protocol: once the socket is opened, an incrementing
  28. * ascii string is sent down it every 50ms.
  29. * If you send "reset\n" on the websocket, then
  30. * the incrementing number is reset to 0.
  31. *
  32. * lws-mirror-protocol: copies any received packet to every connection also
  33. * using this protocol, including the sender
  34. */
  35. #if defined(LWS_USE_POLARSSL)
  36. #else
  37. #if defined(LWS_USE_MBEDTLS)
  38. #else
  39. #if defined(LWS_OPENSSL_SUPPORT) && defined(LWS_HAVE_SSL_CTX_set1_param)
  40. /* location of the certificate revocation list */
  41. extern char crl_path[1024];
  42. #endif
  43. #endif
  44. #endif
  45. extern int debug_level;
  46. enum demo_protocols {
  47. /* always first */
  48. PROTOCOL_HTTP = 0,
  49. PROTOCOL_DUMB_INCREMENT,
  50. PROTOCOL_LWS_MIRROR,
  51. /* always last */
  52. DEMO_PROTOCOL_COUNT
  53. };
  54. /*
  55. * We take a strict whitelist approach to stop ../ attacks
  56. */
  57. struct serveable {
  58. const char *urlpath;
  59. const char *mimetype;
  60. };
  61. /*
  62. * this is just an example of parsing handshake headers, you don't need this
  63. * in your code unless you will filter allowing connections by the header
  64. * content
  65. */
  66. void
  67. dump_handshake_info(struct lws *wsi)
  68. {
  69. int n = 0, len;
  70. char buf[256];
  71. const unsigned char *c;
  72. do {
  73. c = lws_token_to_string(n);
  74. if (!c) {
  75. n++;
  76. continue;
  77. }
  78. len = lws_hdr_total_length(wsi, n);
  79. if (!len || len > sizeof(buf) - 1) {
  80. n++;
  81. continue;
  82. }
  83. lws_hdr_copy(wsi, buf, sizeof buf, n);
  84. buf[sizeof(buf) - 1] = '\0';
  85. fprintf(stderr, " %s = %s\n", (char *)c, buf);
  86. n++;
  87. } while (c);
  88. }
  89. const char * get_mimetype(const char *file)
  90. {
  91. int n = strlen(file);
  92. if (n < 5)
  93. return NULL;
  94. if (!strcmp(&file[n - 4], ".ico"))
  95. return "image/x-icon";
  96. if (!strcmp(&file[n - 4], ".png"))
  97. return "image/png";
  98. if (!strcmp(&file[n - 5], ".html"))
  99. return "text/html";
  100. if (!strcmp(&file[n - 4], ".css"))
  101. return "text/css";
  102. if (!strcmp(&file[n - 3], ".js"))
  103. return "text/javascript";
  104. return NULL;
  105. }
  106. static const char * const param_names[] = {
  107. "text",
  108. "send",
  109. "file",
  110. "upload",
  111. };
  112. enum enum_param_names {
  113. EPN_TEXT,
  114. EPN_SEND,
  115. EPN_FILE,
  116. EPN_UPLOAD,
  117. };
  118. static int
  119. file_upload_cb(void *data, const char *name, const char *filename,
  120. char *buf, int len, enum lws_spa_fileupload_states state)
  121. {
  122. struct per_session_data__http *pss =
  123. (struct per_session_data__http *)data;
  124. int n;
  125. switch (state) {
  126. case LWS_UFS_OPEN:
  127. strncpy(pss->filename, filename, sizeof(pss->filename) - 1);
  128. /* we get the original filename in @filename arg, but for
  129. * simple demo use a fixed name so we don't have to deal with
  130. * attacks */
  131. pss->post_fd = open("/tmp/post-file",
  132. O_CREAT | O_TRUNC | O_RDWR, 0600);
  133. break;
  134. case LWS_UFS_FINAL_CONTENT:
  135. case LWS_UFS_CONTENT:
  136. if (len) {
  137. pss->file_length += len;
  138. /* if the file length is too big, drop it */
  139. if (pss->file_length > 100000)
  140. return 1;
  141. n = write(pss->post_fd, buf, len);
  142. lwsl_notice("%s: write %d says %d\n", __func__, len, n);
  143. }
  144. if (state == LWS_UFS_CONTENT)
  145. break;
  146. close(pss->post_fd);
  147. pss->post_fd = LWS_INVALID_FILE;
  148. break;
  149. }
  150. return 0;
  151. }
  152. /* this protocol server (always the first one) handles HTTP,
  153. *
  154. * Some misc callbacks that aren't associated with a protocol also turn up only
  155. * here on the first protocol server.
  156. */
  157. int callback_http(struct lws *wsi, enum lws_callback_reasons reason, void *user,
  158. void *in, size_t len)
  159. {
  160. struct per_session_data__http *pss =
  161. (struct per_session_data__http *)user;
  162. unsigned char buffer[4096 + LWS_PRE];
  163. unsigned long amount, file_len, sent;
  164. char leaf_path[1024];
  165. const char *mimetype;
  166. char *other_headers;
  167. unsigned char *end, *start;
  168. struct timeval tv;
  169. unsigned char *p;
  170. #ifndef LWS_NO_CLIENT
  171. struct per_session_data__http *pss1;
  172. struct lws *wsi1;
  173. #endif
  174. char buf[256];
  175. char b64[64];
  176. int n, m;
  177. #ifdef EXTERNAL_POLL
  178. struct lws_pollargs *pa = (struct lws_pollargs *)in;
  179. #endif
  180. switch (reason) {
  181. case LWS_CALLBACK_HTTP:
  182. lwsl_info("lws_http_serve: %s\n",in);
  183. if (debug_level & LLL_INFO) {
  184. dump_handshake_info(wsi);
  185. /* dump the individual URI Arg parameters */
  186. n = 0;
  187. while (lws_hdr_copy_fragment(wsi, buf, sizeof(buf),
  188. WSI_TOKEN_HTTP_URI_ARGS, n) > 0) {
  189. lwsl_notice("URI Arg %d: %s\n", ++n, buf);
  190. }
  191. }
  192. {
  193. lws_get_peer_simple(wsi, buf, sizeof(buf));
  194. lwsl_info("HTTP connect from %s\n", buf);
  195. }
  196. if (len < 1) {
  197. lws_return_http_status(wsi,
  198. HTTP_STATUS_BAD_REQUEST, NULL);
  199. goto try_to_reuse;
  200. }
  201. #ifndef LWS_NO_CLIENT
  202. if (!strncmp(in, "/proxytest", 10)) {
  203. struct lws_client_connect_info i;
  204. char *rootpath = "/";
  205. const char *p = (const char *)in;
  206. if (lws_get_child(wsi))
  207. break;
  208. pss->client_finished = 0;
  209. memset(&i,0, sizeof(i));
  210. i.context = lws_get_context(wsi);
  211. i.address = "git.libwebsockets.org";
  212. i.port = 80;
  213. i.ssl_connection = 0;
  214. if (p[10])
  215. i.path = (char *)in + 10;
  216. else
  217. i.path = rootpath;
  218. i.host = "git.libwebsockets.org";
  219. i.origin = NULL;
  220. i.method = "GET";
  221. i.parent_wsi = wsi;
  222. i.uri_replace_from = "git.libwebsockets.org/";
  223. i.uri_replace_to = "/proxytest/";
  224. if (!lws_client_connect_via_info(&i)) {
  225. lwsl_err("proxy connect fail\n");
  226. break;
  227. }
  228. break;
  229. }
  230. #endif
  231. #if 1
  232. /* this example server has no concept of directories */
  233. if (strchr((const char *)in + 1, '/')) {
  234. lws_return_http_status(wsi, HTTP_STATUS_NOT_ACCEPTABLE, NULL);
  235. goto try_to_reuse;
  236. }
  237. #endif
  238. /* if a legal POST URL, let it continue and accept data */
  239. if (lws_hdr_total_length(wsi, WSI_TOKEN_POST_URI))
  240. return 0;
  241. /* check for the "send a big file by hand" example case */
  242. if (!strcmp((const char *)in, "/leaf.jpg")) {
  243. if (strlen(resource_path) > sizeof(leaf_path) - 10)
  244. return -1;
  245. sprintf(leaf_path, "%s/leaf.jpg", resource_path);
  246. /* well, let's demonstrate how to send the hard way */
  247. p = buffer + LWS_PRE;
  248. end = p + sizeof(buffer) - LWS_PRE;
  249. pss->fd = lws_plat_file_open(wsi, leaf_path, &file_len,
  250. LWS_O_RDONLY);
  251. if (pss->fd == LWS_INVALID_FILE) {
  252. lwsl_err("failed to open file %s\n", leaf_path);
  253. return -1;
  254. }
  255. /*
  256. * we will send a big jpeg file, but it could be
  257. * anything. Set the Content-Type: appropriately
  258. * so the browser knows what to do with it.
  259. *
  260. * Notice we use the APIs to build the header, which
  261. * will do the right thing for HTTP 1/1.1 and HTTP2
  262. * depending on what connection it happens to be working
  263. * on
  264. */
  265. if (lws_add_http_header_status(wsi, 200, &p, end))
  266. return 1;
  267. if (lws_add_http_header_by_token(wsi, WSI_TOKEN_HTTP_SERVER,
  268. (unsigned char *)"libwebsockets",
  269. 13, &p, end))
  270. return 1;
  271. if (lws_add_http_header_by_token(wsi,
  272. WSI_TOKEN_HTTP_CONTENT_TYPE,
  273. (unsigned char *)"image/jpeg",
  274. 10, &p, end))
  275. return 1;
  276. if (lws_add_http_header_content_length(wsi,
  277. file_len, &p,
  278. end))
  279. return 1;
  280. if (lws_finalize_http_header(wsi, &p, end))
  281. return 1;
  282. /*
  283. * send the http headers...
  284. * this won't block since it's the first payload sent
  285. * on the connection since it was established
  286. * (too small for partial)
  287. *
  288. * Notice they are sent using LWS_WRITE_HTTP_HEADERS
  289. * which also means you can't send body too in one step,
  290. * this is mandated by changes in HTTP2
  291. */
  292. *p = '\0';
  293. lwsl_info("%s\n", buffer + LWS_PRE);
  294. n = lws_write(wsi, buffer + LWS_PRE,
  295. p - (buffer + LWS_PRE),
  296. LWS_WRITE_HTTP_HEADERS);
  297. if (n < 0) {
  298. lws_plat_file_close(wsi, pss->fd);
  299. return -1;
  300. }
  301. /*
  302. * book us a LWS_CALLBACK_HTTP_WRITEABLE callback
  303. */
  304. lws_callback_on_writable(wsi);
  305. break;
  306. }
  307. /* if not, send a file the easy way */
  308. if (!strncmp(in, "/cgit-data/", 11)) {
  309. in = (char *)in + 11;
  310. strcpy(buf, "/usr/share/cgit");
  311. } else
  312. strcpy(buf, resource_path);
  313. if (strcmp(in, "/")) {
  314. if (*((const char *)in) != '/')
  315. strcat(buf, "/");
  316. strncat(buf, in, sizeof(buf) - strlen(buf) - 1);
  317. } else /* default file to serve */
  318. strcat(buf, "/test.html");
  319. buf[sizeof(buf) - 1] = '\0';
  320. /* refuse to serve files we don't understand */
  321. mimetype = get_mimetype(buf);
  322. if (!mimetype) {
  323. lwsl_err("Unknown mimetype for %s\n", buf);
  324. lws_return_http_status(wsi,
  325. HTTP_STATUS_UNSUPPORTED_MEDIA_TYPE, NULL);
  326. return -1;
  327. }
  328. /* demonstrates how to set a cookie on / */
  329. other_headers = leaf_path;
  330. p = (unsigned char *)leaf_path;
  331. if (!strcmp((const char *)in, "/") &&
  332. !lws_hdr_total_length(wsi, WSI_TOKEN_HTTP_COOKIE)) {
  333. /* this isn't very unguessable but it'll do for us */
  334. gettimeofday(&tv, NULL);
  335. n = sprintf(b64, "test=LWS_%u_%u_COOKIE;Max-Age=360000",
  336. (unsigned int)tv.tv_sec,
  337. (unsigned int)tv.tv_usec);
  338. if (lws_add_http_header_by_name(wsi,
  339. (unsigned char *)"set-cookie:",
  340. (unsigned char *)b64, n, &p,
  341. (unsigned char *)leaf_path + sizeof(leaf_path)))
  342. return 1;
  343. }
  344. if (lws_is_ssl(wsi) && lws_add_http_header_by_name(wsi,
  345. (unsigned char *)
  346. "Strict-Transport-Security:",
  347. (unsigned char *)
  348. "max-age=15768000 ; "
  349. "includeSubDomains", 36, &p,
  350. (unsigned char *)leaf_path +
  351. sizeof(leaf_path)))
  352. return 1;
  353. n = (char *)p - leaf_path;
  354. n = lws_serve_http_file(wsi, buf, mimetype, other_headers, n);
  355. if (n < 0 || ((n > 0) && lws_http_transaction_completed(wsi)))
  356. return -1; /* error or can't reuse connection: close the socket */
  357. /*
  358. * notice that the sending of the file completes asynchronously,
  359. * we'll get a LWS_CALLBACK_HTTP_FILE_COMPLETION callback when
  360. * it's done
  361. */
  362. break;
  363. case LWS_CALLBACK_HTTP_BODY:
  364. /* create the POST argument parser if not already existing */
  365. if (!pss->spa) {
  366. pss->spa = lws_spa_create(wsi, param_names,
  367. ARRAY_SIZE(param_names), 1024,
  368. file_upload_cb, pss);
  369. if (!pss->spa)
  370. return -1;
  371. pss->filename[0] = '\0';
  372. pss->file_length = 0;
  373. }
  374. /* let it parse the POST data */
  375. if (lws_spa_process(pss->spa, in, len))
  376. return -1;
  377. break;
  378. case LWS_CALLBACK_HTTP_BODY_COMPLETION:
  379. lwsl_debug("LWS_CALLBACK_HTTP_BODY_COMPLETION\n");
  380. /*
  381. * the whole of the sent body arrived,
  382. * respond to the client with a redirect to show the
  383. * results
  384. */
  385. /* call to inform no more payload data coming */
  386. lws_spa_finalize(pss->spa);
  387. p = (unsigned char *)pss->result + LWS_PRE;
  388. end = p + sizeof(pss->result) - LWS_PRE - 1;
  389. p += sprintf((char *)p,
  390. "<html><body><h1>Form results (after urldecoding)</h1>"
  391. "<table><tr><td>Name</td><td>Length</td><td>Value</td></tr>");
  392. for (n = 0; n < ARRAY_SIZE(param_names); n++)
  393. p += lws_snprintf((char *)p, end - p,
  394. "<tr><td><b>%s</b></td><td>%d</td><td>%s</td></tr>",
  395. param_names[n],
  396. lws_spa_get_length(pss->spa, n),
  397. lws_spa_get_string(pss->spa, n));
  398. p += lws_snprintf((char *)p, end - p, "</table><br><b>filename:</b> %s, <b>length</b> %ld",
  399. pss->filename, pss->file_length);
  400. p += lws_snprintf((char *)p, end - p, "</body></html>");
  401. pss->result_len = p - (unsigned char *)(pss->result + LWS_PRE);
  402. p = buffer + LWS_PRE;
  403. start = p;
  404. end = p + sizeof(buffer) - LWS_PRE;
  405. if (lws_add_http_header_status(wsi, 200, &p, end))
  406. return 1;
  407. if (lws_add_http_header_by_token(wsi, WSI_TOKEN_HTTP_CONTENT_TYPE,
  408. (unsigned char *)"text/html", 9, &p, end))
  409. return 1;
  410. if (lws_add_http_header_content_length(wsi, pss->result_len, &p, end))
  411. return 1;
  412. if (lws_finalize_http_header(wsi, &p, end))
  413. return 1;
  414. n = lws_write(wsi, start, p - start, LWS_WRITE_HTTP_HEADERS);
  415. if (n < 0)
  416. return 1;
  417. n = lws_write(wsi, (unsigned char *)pss->result + LWS_PRE,
  418. pss->result_len, LWS_WRITE_HTTP);
  419. if (n < 0)
  420. return 1;
  421. goto try_to_reuse;
  422. case LWS_CALLBACK_HTTP_DROP_PROTOCOL:
  423. lwsl_debug("LWS_CALLBACK_HTTP_DROP_PROTOCOL\n");
  424. /* called when our wsi user_space is going to be destroyed */
  425. if (pss->spa) {
  426. lws_spa_destroy(pss->spa);
  427. pss->spa = NULL;
  428. }
  429. break;
  430. case LWS_CALLBACK_HTTP_FILE_COMPLETION:
  431. goto try_to_reuse;
  432. case LWS_CALLBACK_HTTP_WRITEABLE:
  433. lwsl_info("LWS_CALLBACK_HTTP_WRITEABLE\n");
  434. if (pss->client_finished)
  435. return -1;
  436. if (pss->fd == LWS_INVALID_FILE)
  437. goto try_to_reuse;
  438. #ifndef LWS_NO_CLIENT
  439. if (pss->reason_bf & 2) {
  440. char *px = buf + LWS_PRE;
  441. int lenx = sizeof(buf) - LWS_PRE;
  442. /*
  443. * our sink is writeable and our source has something
  444. * to read. So read a lump of source material of
  445. * suitable size to send or what's available, whichever
  446. * is the smaller.
  447. */
  448. pss->reason_bf &= ~2;
  449. wsi1 = lws_get_child(wsi);
  450. if (!wsi1)
  451. break;
  452. if (lws_http_client_read(wsi1, &px, &lenx) < 0)
  453. goto bail;
  454. if (pss->client_finished)
  455. return -1;
  456. break;
  457. }
  458. #endif
  459. /*
  460. * we can send more of whatever it is we were sending
  461. */
  462. sent = 0;
  463. do {
  464. /* we'd like the send this much */
  465. n = sizeof(buffer) - LWS_PRE;
  466. /* but if the peer told us he wants less, we can adapt */
  467. m = lws_get_peer_write_allowance(wsi);
  468. /* -1 means not using a protocol that has this info */
  469. if (m == 0)
  470. /* right now, peer can't handle anything */
  471. goto later;
  472. if (m != -1 && m < n)
  473. /* he couldn't handle that much */
  474. n = m;
  475. n = lws_plat_file_read(wsi, pss->fd,
  476. &amount, buffer + LWS_PRE, n);
  477. /* problem reading, close conn */
  478. if (n < 0) {
  479. lwsl_err("problem reading file\n");
  480. goto bail;
  481. }
  482. n = (int)amount;
  483. /* sent it all, close conn */
  484. if (n == 0)
  485. goto penultimate;
  486. /*
  487. * To support HTTP2, must take care about preamble space
  488. *
  489. * identification of when we send the last payload frame
  490. * is handled by the library itself if you sent a
  491. * content-length header
  492. */
  493. m = lws_write(wsi, buffer + LWS_PRE, n, LWS_WRITE_HTTP);
  494. if (m < 0) {
  495. lwsl_err("write failed\n");
  496. /* write failed, close conn */
  497. goto bail;
  498. }
  499. if (m) /* while still active, extend timeout */
  500. lws_set_timeout(wsi, PENDING_TIMEOUT_HTTP_CONTENT, 5);
  501. sent += m;
  502. } while (!lws_send_pipe_choked(wsi) && (sent < 1024 * 1024));
  503. later:
  504. lws_callback_on_writable(wsi);
  505. break;
  506. penultimate:
  507. lws_plat_file_close(wsi, pss->fd);
  508. pss->fd = LWS_INVALID_FILE;
  509. goto try_to_reuse;
  510. bail:
  511. lws_plat_file_close(wsi, pss->fd);
  512. return -1;
  513. /*
  514. * callback for confirming to continue with client IP appear in
  515. * protocol 0 callback since no websocket protocol has been agreed
  516. * yet. You can just ignore this if you won't filter on client IP
  517. * since the default unhandled callback return is 0 meaning let the
  518. * connection continue.
  519. */
  520. case LWS_CALLBACK_FILTER_NETWORK_CONNECTION:
  521. /* if we returned non-zero from here, we kill the connection */
  522. break;
  523. #ifndef LWS_NO_CLIENT
  524. case LWS_CALLBACK_ESTABLISHED_CLIENT_HTTP: {
  525. char ctype[64], ctlen = 0;
  526. lwsl_err("LWS_CALLBACK_ESTABLISHED_CLIENT_HTTP\n");
  527. p = buffer + LWS_PRE;
  528. end = p + sizeof(buffer) - LWS_PRE;
  529. if (lws_add_http_header_status(lws_get_parent(wsi), 200, &p, end))
  530. return 1;
  531. if (lws_add_http_header_by_token(lws_get_parent(wsi),
  532. WSI_TOKEN_HTTP_SERVER,
  533. (unsigned char *)"libwebsockets",
  534. 13, &p, end))
  535. return 1;
  536. ctlen = lws_hdr_copy(wsi, ctype, sizeof(ctype), WSI_TOKEN_HTTP_CONTENT_TYPE);
  537. if (ctlen > 0) {
  538. if (lws_add_http_header_by_token(lws_get_parent(wsi),
  539. WSI_TOKEN_HTTP_CONTENT_TYPE,
  540. (unsigned char *)ctype, ctlen, &p, end))
  541. return 1;
  542. }
  543. #if 0
  544. if (lws_add_http_header_content_length(lws_get_parent(wsi),
  545. file_len, &p, end))
  546. return 1;
  547. #endif
  548. if (lws_finalize_http_header(lws_get_parent(wsi), &p, end))
  549. return 1;
  550. *p = '\0';
  551. lwsl_info("%s\n", buffer + LWS_PRE);
  552. n = lws_write(lws_get_parent(wsi), buffer + LWS_PRE,
  553. p - (buffer + LWS_PRE),
  554. LWS_WRITE_HTTP_HEADERS);
  555. if (n < 0)
  556. return -1;
  557. break; }
  558. case LWS_CALLBACK_CLOSED_CLIENT_HTTP:
  559. //lwsl_err("LWS_CALLBACK_CLOSED_CLIENT_HTTP\n");
  560. return -1;
  561. break;
  562. case LWS_CALLBACK_RECEIVE_CLIENT_HTTP:
  563. //lwsl_err("LWS_CALLBACK_RECEIVE_CLIENT_HTTP: wsi %p\n", wsi);
  564. assert(lws_get_parent(wsi));
  565. if (!lws_get_parent(wsi))
  566. break;
  567. // lwsl_err("LWS_CALLBACK_RECEIVE_CLIENT_HTTP: wsi %p: sock: %d, parent_wsi: %p, parent_sock:%d, len %d\n",
  568. // wsi, lws_get_socket_fd(wsi),
  569. // lws_get_parent(wsi),
  570. // lws_get_socket_fd(lws_get_parent(wsi)), len);
  571. pss1 = lws_wsi_user(lws_get_parent(wsi));
  572. pss1->reason_bf |= 2;
  573. lws_callback_on_writable(lws_get_parent(wsi));
  574. break;
  575. case LWS_CALLBACK_RECEIVE_CLIENT_HTTP_READ:
  576. //lwsl_err("LWS_CALLBACK_RECEIVE_CLIENT_HTTP_READ len %d\n", len);
  577. assert(lws_get_parent(wsi));
  578. m = lws_write(lws_get_parent(wsi), (unsigned char *)in,
  579. len, LWS_WRITE_HTTP);
  580. if (m < 0)
  581. return -1;
  582. break;
  583. case LWS_CALLBACK_COMPLETED_CLIENT_HTTP:
  584. //lwsl_err("LWS_CALLBACK_COMPLETED_CLIENT_HTTP\n");
  585. assert(lws_get_parent(wsi));
  586. if (!lws_get_parent(wsi))
  587. break;
  588. pss1 = lws_wsi_user(lws_get_parent(wsi));
  589. pss1->client_finished = 1;
  590. break;
  591. #endif
  592. /*
  593. * callbacks for managing the external poll() array appear in
  594. * protocol 0 callback
  595. */
  596. case LWS_CALLBACK_LOCK_POLL:
  597. /*
  598. * lock mutex to protect pollfd state
  599. * called before any other POLL related callback
  600. * if protecting wsi lifecycle change, len == 1
  601. */
  602. test_server_lock(len);
  603. break;
  604. case LWS_CALLBACK_UNLOCK_POLL:
  605. /*
  606. * unlock mutex to protect pollfd state when
  607. * called after any other POLL related callback
  608. * if protecting wsi lifecycle change, len == 1
  609. */
  610. test_server_unlock(len);
  611. break;
  612. #ifdef EXTERNAL_POLL
  613. case LWS_CALLBACK_ADD_POLL_FD:
  614. if (count_pollfds >= max_poll_elements) {
  615. lwsl_err("LWS_CALLBACK_ADD_POLL_FD: too many sockets to track\n");
  616. return 1;
  617. }
  618. fd_lookup[pa->fd] = count_pollfds;
  619. pollfds[count_pollfds].fd = pa->fd;
  620. pollfds[count_pollfds].events = pa->events;
  621. pollfds[count_pollfds++].revents = 0;
  622. break;
  623. case LWS_CALLBACK_DEL_POLL_FD:
  624. if (!--count_pollfds)
  625. break;
  626. m = fd_lookup[pa->fd];
  627. /* have the last guy take up the vacant slot */
  628. pollfds[m] = pollfds[count_pollfds];
  629. fd_lookup[pollfds[count_pollfds].fd] = m;
  630. break;
  631. case LWS_CALLBACK_CHANGE_MODE_POLL_FD:
  632. pollfds[fd_lookup[pa->fd]].events = pa->events;
  633. break;
  634. #endif
  635. case LWS_CALLBACK_GET_THREAD_ID:
  636. /*
  637. * if you will call "lws_callback_on_writable"
  638. * from a different thread, return the caller thread ID
  639. * here so lws can use this information to work out if it
  640. * should signal the poll() loop to exit and restart early
  641. */
  642. /* return pthread_getthreadid_np(); */
  643. break;
  644. #if defined(LWS_USE_POLARSSL)
  645. #else
  646. #if defined(LWS_USE_MBEDTLS)
  647. #else
  648. #if defined(LWS_OPENSSL_SUPPORT)
  649. case LWS_CALLBACK_OPENSSL_PERFORM_CLIENT_CERT_VERIFICATION:
  650. /* Verify the client certificate */
  651. if (!len || (SSL_get_verify_result((SSL*)in) != X509_V_OK)) {
  652. int err = X509_STORE_CTX_get_error((X509_STORE_CTX*)user);
  653. int depth = X509_STORE_CTX_get_error_depth((X509_STORE_CTX*)user);
  654. const char* msg = X509_verify_cert_error_string(err);
  655. lwsl_err("LWS_CALLBACK_OPENSSL_PERFORM_CLIENT_CERT_VERIFICATION: SSL error: %s (%d), depth: %d\n", msg, err, depth);
  656. return 1;
  657. }
  658. break;
  659. #if defined(LWS_HAVE_SSL_CTX_set1_param)
  660. case LWS_CALLBACK_OPENSSL_LOAD_EXTRA_SERVER_VERIFY_CERTS:
  661. if (crl_path[0]) {
  662. /* Enable CRL checking */
  663. X509_VERIFY_PARAM *param = X509_VERIFY_PARAM_new();
  664. X509_VERIFY_PARAM_set_flags(param, X509_V_FLAG_CRL_CHECK);
  665. SSL_CTX_set1_param((SSL_CTX*)user, param);
  666. X509_STORE *store = SSL_CTX_get_cert_store((SSL_CTX*)user);
  667. X509_LOOKUP *lookup = X509_STORE_add_lookup(store, X509_LOOKUP_file());
  668. n = X509_load_cert_crl_file(lookup, crl_path, X509_FILETYPE_PEM);
  669. X509_VERIFY_PARAM_free(param);
  670. if (n != 1) {
  671. char errbuf[256];
  672. n = ERR_get_error();
  673. lwsl_err("LWS_CALLBACK_OPENSSL_LOAD_EXTRA_SERVER_VERIFY_CERTS: SSL error: %s (%d)\n", ERR_error_string(n, errbuf), n);
  674. return 1;
  675. }
  676. }
  677. break;
  678. #endif
  679. #endif
  680. #endif
  681. #endif
  682. default:
  683. break;
  684. }
  685. return 0;
  686. /* if we're on HTTP1.1 or 2.0, will keep the idle connection alive */
  687. try_to_reuse:
  688. if (lws_http_transaction_completed(wsi))
  689. return -1;
  690. return 0;
  691. }