2 * libwebsockets - small server side websockets and web server implementation
4 * Copyright (C) 2010-2014 Andy Green <andy@warmcat.com>
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation:
9 * version 2.1 of the License.
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston,
22 #include "private-libwebsockets.h"
24 int log_level = LLL_ERR | LLL_WARN | LLL_NOTICE;
25 static void (*lwsl_emit)(int level, const char *line) = lwsl_emit_stderr;
27 static const char * const log_level_names[] = {
42 libwebsocket_close_and_free_session(struct libwebsocket_context *context,
43 struct libwebsocket *wsi, enum lws_close_status reason)
47 unsigned char buf[LWS_SEND_BUFFER_PRE_PADDING + 2 +
48 LWS_SEND_BUFFER_POST_PADDING];
49 struct lws_tokens eff_buf;
54 old_state = wsi->state;
57 case WSI_STATE_DEAD_SOCKET:
60 /* we tried the polite way... */
61 case WSI_STATE_AWAITING_CLOSE_ACK:
62 goto just_kill_connection;
64 case WSI_STATE_FLUSHING_STORED_SEND_BEFORE_CLOSE:
65 if (wsi->truncated_send_len) {
66 libwebsocket_callback_on_writable(context, wsi);
69 lwsl_info("wsi %p completed WSI_STATE_FLUSHING_STORED_SEND_BEFORE_CLOSE\n", wsi);
70 goto just_kill_connection;
72 if (wsi->truncated_send_len) {
73 lwsl_info("wsi %p entering WSI_STATE_FLUSHING_STORED_SEND_BEFORE_CLOSE\n", wsi);
74 wsi->state = WSI_STATE_FLUSHING_STORED_SEND_BEFORE_CLOSE;
80 wsi->u.ws.close_reason = reason;
82 if (wsi->mode == LWS_CONNMODE_WS_CLIENT_WAITING_CONNECT ||
83 wsi->mode == LWS_CONNMODE_WS_CLIENT_ISSUE_HANDSHAKE) {
85 context->protocols[0].callback(context, wsi,
86 LWS_CALLBACK_CLIENT_CONNECTION_ERROR, wsi->user_space, NULL, 0);
89 goto just_kill_connection;
92 if (wsi->mode == LWS_CONNMODE_HTTP2_SERVING) {
99 if (wsi->mode == LWS_CONNMODE_HTTP_SERVING_ACCEPTED) {
100 if (wsi->u.http.fd != LWS_INVALID_FILE) {
101 lwsl_debug("closing http file\n");
102 compatible_file_close(wsi->u.http.fd);
103 wsi->u.http.fd = LWS_INVALID_FILE;
104 context->protocols[0].callback(context, wsi,
105 LWS_CALLBACK_CLOSED_HTTP, wsi->user_space, NULL, 0);
110 * are his extensions okay with him closing? Eg he might be a mux
111 * parent and just his ch1 aspect is closing?
114 if (lws_ext_callback_for_each_active(wsi,
115 LWS_EXT_CALLBACK_CHECK_OK_TO_REALLY_CLOSE, NULL, 0) > 0) {
116 lwsl_ext("extension vetoed close\n");
121 * flush any tx pending from extensions, since we may send close packet
122 * if there are problems with send, just nuke the connection
127 eff_buf.token = NULL;
128 eff_buf.token_len = 0;
130 /* show every extension the new incoming data */
132 m = lws_ext_callback_for_each_active(wsi,
133 LWS_EXT_CALLBACK_FLUSH_PENDING_TX, &eff_buf, 0);
135 lwsl_ext("Extension reports fatal error\n");
136 goto just_kill_connection;
140 * at least one extension told us he has more
141 * to spill, so we will go around again after
145 /* assuming they left us something to send, send it */
147 if (eff_buf.token_len)
148 if (lws_issue_raw(wsi, (unsigned char *)eff_buf.token,
149 eff_buf.token_len) != eff_buf.token_len) {
150 lwsl_debug("close: ext spill failed\n");
151 goto just_kill_connection;
156 * signal we are closing, libsocket_write will
157 * add any necessary version-specific stuff. If the write fails,
158 * no worries we are closing anyway. If we didn't initiate this
159 * close, then our state has been changed to
160 * WSI_STATE_RETURNED_CLOSE_ALREADY and we will skip this.
162 * Likewise if it's a second call to close this connection after we
163 * sent the close indication to the peer already, we are in state
164 * WSI_STATE_AWAITING_CLOSE_ACK and will skip doing this a second time.
167 if (old_state == WSI_STATE_ESTABLISHED &&
168 reason != LWS_CLOSE_STATUS_NOSTATUS) {
170 lwsl_debug("sending close indication...\n");
172 /* make valgrind happy */
173 memset(buf, 0, sizeof(buf));
174 n = libwebsocket_write(wsi,
175 &buf[LWS_SEND_BUFFER_PRE_PADDING + 2],
179 * we have sent a nice protocol level indication we
180 * now wish to close, we should not send anything more
183 wsi->state = WSI_STATE_AWAITING_CLOSE_ACK;
186 * ...and we should wait for a reply for a bit
190 libwebsocket_set_timeout(wsi,
191 PENDING_TIMEOUT_CLOSE_ACK, 1);
193 lwsl_debug("sent close indication, awaiting ack\n");
198 lwsl_info("close: sending close packet failed, hanging up\n");
200 /* else, the send failed and we should just hang up */
203 just_kill_connection:
205 lwsl_debug("close: just_kill_connection\n");
208 * we won't be servicing or receiving anything further from this guy
209 * delete socket from the internal poll list if still present
212 remove_wsi_socket_from_fds(context, wsi);
214 wsi->state = WSI_STATE_DEAD_SOCKET;
216 if (wsi->rxflow_buffer) {
217 free(wsi->rxflow_buffer);
218 wsi->rxflow_buffer = NULL;
221 if ((old_state == WSI_STATE_ESTABLISHED ||
222 wsi->mode == LWS_CONNMODE_WS_SERVING ||
223 wsi->mode == LWS_CONNMODE_WS_CLIENT)) {
225 if (wsi->u.ws.rx_user_buffer) {
226 free(wsi->u.ws.rx_user_buffer);
227 wsi->u.ws.rx_user_buffer = NULL;
230 if (wsi->truncated_send_malloc) {
231 /* not going to be completed... nuke it */
232 free(wsi->truncated_send_malloc);
233 wsi->truncated_send_malloc = NULL;
234 wsi->truncated_send_len = 0;
236 if (wsi->u.ws.ping_payload_buf) {
237 free(wsi->u.ws.ping_payload_buf);
238 wsi->u.ws.ping_payload_buf = NULL;
239 wsi->u.ws.ping_payload_alloc = 0;
240 wsi->u.ws.ping_payload_len = 0;
244 /* tell the user it's all over for this guy */
246 if (wsi->protocol && wsi->protocol->callback &&
247 ((old_state == WSI_STATE_ESTABLISHED) ||
248 (old_state == WSI_STATE_RETURNED_CLOSE_ALREADY) ||
249 (old_state == WSI_STATE_AWAITING_CLOSE_ACK) ||
250 (old_state == WSI_STATE_FLUSHING_STORED_SEND_BEFORE_CLOSE))) {
251 lwsl_debug("calling back CLOSED\n");
252 wsi->protocol->callback(context, wsi, LWS_CALLBACK_CLOSED,
253 wsi->user_space, NULL, 0);
254 } else if (wsi->mode == LWS_CONNMODE_HTTP_SERVING_ACCEPTED) {
255 lwsl_debug("calling back CLOSED_HTTP\n");
256 context->protocols[0].callback(context, wsi,
257 LWS_CALLBACK_CLOSED_HTTP, wsi->user_space, NULL, 0 );
259 lwsl_debug("not calling back closed\n");
261 /* deallocate any active extension contexts */
263 if (lws_ext_callback_for_each_active(wsi, LWS_EXT_CALLBACK_DESTROY, NULL, 0) < 0)
264 lwsl_warn("extension destruction failed\n");
265 #ifndef LWS_NO_EXTENSIONS
266 for (n = 0; n < wsi->count_active_extensions; n++)
267 free(wsi->active_extensions_user[n]);
270 * inform all extensions in case they tracked this guy out of band
271 * even though not active on him specifically
273 if (lws_ext_callback_for_each_extension_type(context, wsi,
274 LWS_EXT_CALLBACK_DESTROY_ANY_WSI_CLOSING, NULL, 0) < 0)
275 lwsl_warn("ext destroy wsi failed\n");
277 /* lwsl_info("closing fd=%d\n", wsi->sock); */
279 if (!lws_ssl_close(wsi) && wsi->sock >= 0) {
280 n = shutdown(wsi->sock, SHUT_RDWR);
282 lwsl_debug("closing: shutdown ret %d\n", LWS_ERRNO);
284 n = compatible_close(wsi->sock);
286 lwsl_debug("closing: close ret %d\n", LWS_ERRNO);
289 /* outermost destroy notification for wsi (user_space still intact) */
290 context->protocols[0].callback(context, wsi,
291 LWS_CALLBACK_WSI_DESTROY, wsi->user_space, NULL, 0);
293 if (wsi->protocol && wsi->protocol->per_session_data_size &&
294 wsi->user_space && !wsi->user_space_externally_allocated)
295 free(wsi->user_space);
301 * libwebsockets_get_peer_addresses() - Get client address information
302 * @context: Libwebsockets context
303 * @wsi: Local struct libwebsocket associated with
304 * @fd: Connection socket descriptor
305 * @name: Buffer to take client address name
306 * @name_len: Length of client address name buffer
307 * @rip: Buffer to take client address IP qotted quad
308 * @rip_len: Length of client address IP buffer
310 * This function fills in @name and @rip with the name and IP of
311 * the client connected with socket descriptor @fd. Names may be
312 * truncated if there is not enough room. If either cannot be
313 * determined, they will be returned as valid zero-length strings.
317 libwebsockets_get_peer_addresses(struct libwebsocket_context *context,
318 struct libwebsocket *wsi, int fd, char *name, int name_len,
319 char *rip, int rip_len)
323 struct sockaddr_in6 sin6;
325 struct sockaddr_in sin4;
326 struct hostent *host;
327 struct hostent *host1;
332 struct sockaddr_un *un;
339 lws_latency_pre(context, wsi);
342 if (LWS_IPV6_ENABLED(context)) {
345 if (getpeername(fd, (struct sockaddr *) &sin6, &len) < 0) {
346 lwsl_warn("getpeername: %s\n", strerror(LWS_ERRNO));
350 if (!lws_plat_inet_ntop(AF_INET6, &sin6.sin6_addr, rip, rip_len)) {
351 lwsl_err("inet_ntop", strerror(LWS_ERRNO));
355 // Strip off the IPv4 to IPv6 header if one exists
356 if (strncmp(rip, "::ffff:", 7) == 0)
357 memmove(rip, rip + 7, strlen(rip) - 6);
359 getnameinfo((struct sockaddr *)&sin6,
360 sizeof(struct sockaddr_in6), name,
361 name_len, NULL, 0, 0);
367 if (getpeername(fd, (struct sockaddr *) &sin4, &len) < 0) {
368 lwsl_warn("getpeername: %s\n", strerror(LWS_ERRNO));
371 host = gethostbyaddr((char *) &sin4.sin_addr,
372 sizeof(sin4.sin_addr), AF_INET);
374 lwsl_warn("gethostbyaddr: %s\n", strerror(LWS_ERRNO));
378 strncpy(name, host->h_name, name_len);
379 name[name_len - 1] = '\0';
381 host1 = gethostbyname(host->h_name);
384 p = (unsigned char *)host1;
387 p = (unsigned char *)host1->h_addr_list[n++];
390 if ((host1->h_addrtype != AF_INET)
392 && (host1->h_addrtype != AF_LOCAL)
397 if (host1->h_addrtype == AF_INET)
398 sprintf(ip, "%u.%u.%u.%u",
399 p[0], p[1], p[2], p[3]);
402 un = (struct sockaddr_un *)p;
403 strncpy(ip, un->sun_path, sizeof(ip) - 1);
404 ip[sizeof(ip) - 1] = '\0';
408 strncpy(rip, ip, rip_len);
409 rip[rip_len - 1] = '\0';
415 lws_latency(context, wsi, "libwebsockets_get_peer_addresses", ret, 1);
421 * libwebsocket_context_user() - get the user data associated with the context
422 * @context: Websocket context
424 * This returns the optional user allocation that can be attached to
425 * the context the sockets live in at context_create time. It's a way
426 * to let all sockets serviced in the same context share data without
427 * using globals statics in the user code.
430 libwebsocket_context_user(struct libwebsocket_context *context)
432 return context->user_space;
437 * libwebsocket_callback_all_protocol() - Callback all connections using
438 * the given protocol with the given reason
440 * @protocol: Protocol whose connections will get callbacks
441 * @reason: Callback reason index
445 libwebsocket_callback_all_protocol(
446 const struct libwebsocket_protocols *protocol, int reason)
448 struct libwebsocket_context *context = protocol->owning_server;
450 struct libwebsocket *wsi;
452 for (n = 0; n < context->fds_count; n++) {
453 wsi = context->lws_lookup[context->fds[n].fd];
456 if (wsi->protocol == protocol)
457 protocol->callback(context, wsi,
458 reason, wsi->user_space, NULL, 0);
465 * libwebsocket_set_timeout() - marks the wsi as subject to a timeout
467 * You will not need this unless you are doing something special
469 * @wsi: Websocket connection instance
470 * @reason: timeout reason
471 * @secs: how many seconds
475 libwebsocket_set_timeout(struct libwebsocket *wsi,
476 enum pending_timeout reason, int secs)
482 wsi->pending_timeout_limit = now + secs;
483 wsi->pending_timeout = reason;
488 * libwebsocket_get_socket_fd() - returns the socket file descriptor
490 * You will not need this unless you are doing something special
492 * @wsi: Websocket connection instance
496 libwebsocket_get_socket_fd(struct libwebsocket *wsi)
503 lws_latency(struct libwebsocket_context *context, struct libwebsocket *wsi,
504 const char *action, int ret, int completed)
506 unsigned long long u;
509 u = time_in_microseconds();
512 wsi->latency_start = u;
513 if (!wsi->action_start)
514 wsi->action_start = u;
518 if (wsi->action_start == wsi->latency_start)
520 "Completion first try lat %lluus: %p: ret %d: %s\n",
521 u - wsi->latency_start,
522 (void *)wsi, ret, action);
525 "Completion %lluus: lat %lluus: %p: ret %d: %s\n",
526 u - wsi->action_start,
527 u - wsi->latency_start,
528 (void *)wsi, ret, action);
529 wsi->action_start = 0;
531 sprintf(buf, "lat %lluus: %p: ret %d: %s\n",
532 u - wsi->latency_start, (void *)wsi, ret, action);
534 if (u - wsi->latency_start > context->worst_latency) {
535 context->worst_latency = u - wsi->latency_start;
536 strcpy(context->worst_latency_info, buf);
538 lwsl_latency("%s", buf);
545 * libwebsocket_rx_flow_control() - Enable and disable socket servicing for
548 * If the output side of a server process becomes choked, this allows flow
549 * control for the input side.
551 * @wsi: Websocket connection instance to get callback for
552 * @enable: 0 = disable read servicing for this connection, 1 = enable
556 libwebsocket_rx_flow_control(struct libwebsocket *wsi, int enable)
558 if (enable == (wsi->rxflow_change_to & LWS_RXFLOW_ALLOW))
561 lwsl_info("libwebsocket_rx_flow_control(0x%p, %d)\n", wsi, enable);
562 wsi->rxflow_change_to = LWS_RXFLOW_PENDING_CHANGE | !!enable;
568 * libwebsocket_rx_flow_allow_all_protocol() - Allow all connections with this protocol to receive
570 * When the user server code realizes it can accept more input, it can
571 * call this to have the RX flow restriction removed from all connections using
572 * the given protocol.
574 * @protocol: all connections using this protocol will be allowed to receive
578 libwebsocket_rx_flow_allow_all_protocol(
579 const struct libwebsocket_protocols *protocol)
581 struct libwebsocket_context *context = protocol->owning_server;
583 struct libwebsocket *wsi;
585 for (n = 0; n < context->fds_count; n++) {
586 wsi = context->lws_lookup[context->fds[n].fd];
589 if (wsi->protocol == protocol)
590 libwebsocket_rx_flow_control(wsi, LWS_RXFLOW_ALLOW);
596 * libwebsocket_canonical_hostname() - returns this host's hostname
598 * This is typically used by client code to fill in the host parameter
599 * when making a client connection. You can only call it after the context
602 * @context: Websocket context
604 LWS_VISIBLE extern const char *
605 libwebsocket_canonical_hostname(struct libwebsocket_context *context)
607 return (const char *)context->canonical_hostname;
610 int user_callback_handle_rxflow(callback_function callback_function,
611 struct libwebsocket_context *context,
612 struct libwebsocket *wsi,
613 enum libwebsocket_callback_reasons reason, void *user,
614 void *in, size_t len)
618 n = callback_function(context, wsi, reason, user, in, len);
620 n = _libwebsocket_rx_flow_control(wsi);
627 * libwebsocket_set_proxy() - Setups proxy to libwebsocket_context.
628 * @context: pointer to struct libwebsocket_context you want set proxy to
629 * @proxy: pointer to c string containing proxy in format address:port
631 * Returns 0 if proxy string was parsed and proxy was setup.
632 * Returns -1 if @proxy is NULL or has incorrect format.
634 * This is only required if your OS does not provide the http_proxy
635 * enviroment variable (eg, OSX)
637 * IMPORTANT! You should call this function right after creation of the
638 * libwebsocket_context and before call to connect. If you call this
639 * function after connect behavior is undefined.
640 * This function will override proxy settings made on libwebsocket_context
641 * creation with genenv() call.
645 libwebsocket_set_proxy(struct libwebsocket_context *context, const char *proxy)
652 strncpy(context->http_proxy_address, proxy,
653 sizeof(context->http_proxy_address) - 1);
654 context->http_proxy_address[
655 sizeof(context->http_proxy_address) - 1] = '\0';
657 p = strchr(context->http_proxy_address, ':');
659 lwsl_err("http_proxy needs to be ads:port\n");
664 context->http_proxy_port = atoi(p + 1);
666 lwsl_notice(" Proxy %s:%u\n", context->http_proxy_address,
667 context->http_proxy_port);
673 * libwebsockets_get_protocol() - Returns a protocol pointer from a websocket
675 * @wsi: pointer to struct websocket you want to know the protocol of
678 * Some apis can act on all live connections of a given protocol,
679 * this is how you can get a pointer to the active protocol if needed.
682 LWS_VISIBLE const struct libwebsocket_protocols *
683 libwebsockets_get_protocol(struct libwebsocket *wsi)
685 return wsi->protocol;
689 libwebsocket_is_final_fragment(struct libwebsocket *wsi)
691 return wsi->u.ws.final;
694 LWS_VISIBLE unsigned char
695 libwebsocket_get_reserved_bits(struct libwebsocket *wsi)
697 return wsi->u.ws.rsv;
701 libwebsocket_ensure_user_space(struct libwebsocket *wsi)
706 /* allocate the per-connection user memory (if any) */
708 if (wsi->protocol->per_session_data_size && !wsi->user_space) {
709 wsi->user_space = malloc(
710 wsi->protocol->per_session_data_size);
711 if (wsi->user_space == NULL) {
712 lwsl_err("Out of memory for conn user space\n");
715 memset(wsi->user_space, 0,
716 wsi->protocol->per_session_data_size);
721 LWS_VISIBLE void lwsl_emit_stderr(int level, const char *line)
724 unsigned long long now;
728 for (n = 0; n < LLL_COUNT; n++)
729 if (level == (1 << n)) {
730 now = time_in_microseconds() / 100;
731 sprintf(buf, "[%lu:%04d] %s: ", (unsigned long) now / 10000,
732 (int)(now % 10000), log_level_names[n]);
736 fprintf(stderr, "%s%s", buf, line);
740 LWS_VISIBLE void _lws_log(int filter, const char *format, ...)
745 if (!(log_level & filter))
748 va_start(ap, format);
749 vsnprintf(buf, sizeof(buf), format, ap);
750 buf[sizeof(buf) - 1] = '\0';
753 lwsl_emit(filter, buf);
757 * lws_set_log_level() - Set the logging bitfield
758 * @level: OR together the LLL_ debug contexts you want output from
759 * @log_emit_function: NULL to leave it as it is, or a user-supplied
760 * function to perform log string emission instead of
761 * the default stderr one.
763 * log level defaults to "err", "warn" and "notice" contexts enabled and
764 * emission on stderr.
767 LWS_VISIBLE void lws_set_log_level(int level, void (*log_emit_function)(int level,
771 if (log_emit_function)
772 lwsl_emit = log_emit_function;
776 * lws_use_ssl() - Find out if connection is using SSL
777 * @wsi: websocket connection to check
779 * Returns 0 if the connection is not using SSL, 1 if using SSL and
780 * using verified cert, and 2 if using SSL but the cert was not
781 * checked (appears for client wsi told to skip check on connection)
784 lws_is_ssl(struct libwebsocket *wsi)
786 #ifdef LWS_OPENSSL_SUPPORT
794 * lws_partial_buffered() - find out if lws buffered the last write
795 * @wsi: websocket connection to check
797 * Returns 1 if you cannot use libwebsocket_write because the last
798 * write on this connection is still buffered, and can't be cleared without
799 * returning to the service loop and waiting for the connection to be
802 * If you will try to do >1 libwebsocket_write call inside a single
803 * WRITEABLE callback, you must check this after every write and bail if
804 * set, ask for a new writeable callback and continue writing from there.
806 * This is never set at the start of a writeable callback, but any write
811 lws_partial_buffered(struct libwebsocket *wsi)
813 return !!wsi->truncated_send_len;
816 void lws_set_protocol_write_pending(struct libwebsocket_context *context,
817 struct libwebsocket *wsi,
818 enum lws_pending_protocol_send pend)
820 lwsl_err("setting pps %d\n", pend);
823 lwsl_err("pps overwrite\n");
825 libwebsocket_rx_flow_control(wsi, 0);
826 libwebsocket_callback_on_writable(context, wsi);