introduce lws_partial_buffered
[platform/upstream/libwebsockets.git] / test-server / test-server.c
1 /*
2  * libwebsockets-test-server - libwebsockets test implementation
3  *
4  * Copyright (C) 2010-2011 Andy Green <andy@warmcat.com>
5  *
6  *  This library is free software; you can redistribute it and/or
7  *  modify it under the terms of the GNU Lesser General Public
8  *  License as published by the Free Software Foundation:
9  *  version 2.1 of the License.
10  *
11  *  This library is distributed in the hope that it will be useful,
12  *  but WITHOUT ANY WARRANTY; without even the implied warranty of
13  *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
14  *  Lesser General Public License for more details.
15  *
16  *  You should have received a copy of the GNU Lesser General Public
17  *  License along with this library; if not, write to the Free Software
18  *  Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston,
19  *  MA  02110-1301  USA
20  */
21 #ifdef CMAKE_BUILD
22 #include "lws_config.h"
23 #endif
24
25 #include <stdio.h>
26 #include <stdlib.h>
27 #include <getopt.h>
28 #include <signal.h>
29 #include <string.h>
30 #include <sys/stat.h>
31 #include <fcntl.h>
32 #include <assert.h>
33
34 #ifdef _WIN32
35 #include <io.h>
36 #ifdef EXTERNAL_POLL
37 #define poll WSAPoll
38 #endif
39 #else
40 #include <syslog.h>
41 #include <sys/time.h>
42 #include <unistd.h>
43 #endif
44
45 #include "../lib/libwebsockets.h"
46
47 static int close_testing;
48 int max_poll_elements;
49
50 struct pollfd *pollfds;
51 int *fd_lookup;
52 int count_pollfds;
53 static volatile int force_exit = 0;
54 static struct libwebsocket_context *context;
55
56 /*
57  * This demo server shows how to use libwebsockets for one or more
58  * websocket protocols in the same server
59  *
60  * It defines the following websocket protocols:
61  *
62  *  dumb-increment-protocol:  once the socket is opened, an incrementing
63  *                              ascii string is sent down it every 50ms.
64  *                              If you send "reset\n" on the websocket, then
65  *                              the incrementing number is reset to 0.
66  *
67  *  lws-mirror-protocol: copies any received packet to every connection also
68  *                              using this protocol, including the sender
69  */
70
71 enum demo_protocols {
72         /* always first */
73         PROTOCOL_HTTP = 0,
74
75         PROTOCOL_DUMB_INCREMENT,
76         PROTOCOL_LWS_MIRROR,
77
78         /* always last */
79         DEMO_PROTOCOL_COUNT
80 };
81
82
83 #define LOCAL_RESOURCE_PATH INSTALL_DATADIR"/libwebsockets-test-server"
84 char *resource_path = LOCAL_RESOURCE_PATH;
85
86 /*
87  * We take a strict whitelist approach to stop ../ attacks
88  */
89
90 struct serveable {
91         const char *urlpath;
92         const char *mimetype;
93 }; 
94
95 struct per_session_data__http {
96         int fd;
97 };
98
99 /*
100  * this is just an example of parsing handshake headers, you don't need this
101  * in your code unless you will filter allowing connections by the header
102  * content
103  */
104
105 static void
106 dump_handshake_info(struct libwebsocket *wsi)
107 {
108         int n;
109         static const char *token_names[] = {
110                 /*[WSI_TOKEN_GET_URI]           =*/ "GET URI",
111                 /*[WSI_TOKEN_POST_URI]          =*/ "POST URI",
112                 /*[WSI_TOKEN_HOST]              =*/ "Host",
113                 /*[WSI_TOKEN_CONNECTION]        =*/ "Connection",
114                 /*[WSI_TOKEN_KEY1]              =*/ "key 1",
115                 /*[WSI_TOKEN_KEY2]              =*/ "key 2",
116                 /*[WSI_TOKEN_PROTOCOL]          =*/ "Protocol",
117                 /*[WSI_TOKEN_UPGRADE]           =*/ "Upgrade",
118                 /*[WSI_TOKEN_ORIGIN]            =*/ "Origin",
119                 /*[WSI_TOKEN_DRAFT]             =*/ "Draft",
120                 /*[WSI_TOKEN_CHALLENGE]         =*/ "Challenge",
121
122                 /* new for 04 */
123                 /*[WSI_TOKEN_KEY]               =*/ "Key",
124                 /*[WSI_TOKEN_VERSION]           =*/ "Version",
125                 /*[WSI_TOKEN_SWORIGIN]          =*/ "Sworigin",
126
127                 /* new for 05 */
128                 /*[WSI_TOKEN_EXTENSIONS]        =*/ "Extensions",
129
130                 /* client receives these */
131                 /*[WSI_TOKEN_ACCEPT]            =*/ "Accept",
132                 /*[WSI_TOKEN_NONCE]             =*/ "Nonce",
133                 /*[WSI_TOKEN_HTTP]              =*/ "Http",
134
135                 "Accept:",
136                 "If-Modified-Since:",
137                 "Accept-Encoding:",
138                 "Accept-Language:",
139                 "Pragma:",
140                 "Cache-Control:",
141                 "Authorization:",
142                 "Cookie:",
143                 "Content-Length:",
144                 "Content-Type:",
145                 "Date:",
146                 "Range:",
147                 "Referer:",
148                 "Uri-Args:",
149
150                 /*[WSI_TOKEN_MUXURL]    =*/ "MuxURL",
151         };
152         char buf[256];
153
154         for (n = 0; n < sizeof(token_names) / sizeof(token_names[0]); n++) {
155                 if (!lws_hdr_total_length(wsi, n))
156                         continue;
157
158                 lws_hdr_copy(wsi, buf, sizeof buf, n);
159
160                 fprintf(stderr, "    %s = %s\n", token_names[n], buf);
161         }
162 }
163
164 const char * get_mimetype(const char *file)
165 {
166         int n = strlen(file);
167
168         if (n < 5)
169                 return NULL;
170
171         if (!strcmp(&file[n - 4], ".ico"))
172                 return "image/x-icon";
173
174         if (!strcmp(&file[n - 4], ".png"))
175                 return "image/png";
176
177         if (!strcmp(&file[n - 5], ".html"))
178                 return "text/html";
179
180         return NULL;
181 }
182
183 /* this protocol server (always the first one) just knows how to do HTTP */
184
185 static int callback_http(struct libwebsocket_context *context,
186                 struct libwebsocket *wsi,
187                 enum libwebsocket_callback_reasons reason, void *user,
188                                                            void *in, size_t len)
189 {
190 #if 0
191         char client_name[128];
192         char client_ip[128];
193 #endif
194         char buf[256];
195         char leaf_path[1024];
196         char b64[64];
197         struct timeval tv;
198         int n, m;
199         unsigned char *p;
200         char *other_headers;
201         static unsigned char buffer[4096];
202         struct stat stat_buf;
203         struct per_session_data__http *pss =
204                         (struct per_session_data__http *)user;
205         const char *mimetype;
206 #ifdef EXTERNAL_POLL
207         struct libwebsocket_pollargs *pa = (struct libwebsocket_pollargs *)in;
208 #endif
209
210         switch (reason) {
211         case LWS_CALLBACK_HTTP:
212
213                 dump_handshake_info(wsi);
214
215                 if (len < 1) {
216                         libwebsockets_return_http_status(context, wsi,
217                                                 HTTP_STATUS_BAD_REQUEST, NULL);
218                         return -1;
219                 }
220
221                 /* this server has no concept of directories */
222                 if (strchr((const char *)in + 1, '/')) {
223                         libwebsockets_return_http_status(context, wsi,
224                                                 HTTP_STATUS_FORBIDDEN, NULL);
225                         return -1;
226                 }
227
228                 /* if a legal POST URL, let it continue and accept data */
229                 if (lws_hdr_total_length(wsi, WSI_TOKEN_POST_URI))
230                         return 0;
231
232                 /* check for the "send a big file by hand" example case */
233
234                 if (!strcmp((const char *)in, "/leaf.jpg")) {
235                         if (strlen(resource_path) > sizeof(leaf_path) - 10)
236                                 return -1;
237                         sprintf(leaf_path, "%s/leaf.jpg", resource_path);
238
239                         /* well, let's demonstrate how to send the hard way */
240
241                         p = buffer;
242
243 #ifdef WIN32
244                         pss->fd = open(leaf_path, O_RDONLY | _O_BINARY);
245 #else
246                         pss->fd = open(leaf_path, O_RDONLY);
247 #endif
248
249                         if (pss->fd < 0)
250                                 return -1;
251
252                         fstat(pss->fd, &stat_buf);
253
254                         /*
255                          * we will send a big jpeg file, but it could be
256                          * anything.  Set the Content-Type: appropriately
257                          * so the browser knows what to do with it.
258                          */
259
260                         p += sprintf((char *)p,
261                                 "HTTP/1.0 200 OK\x0d\x0a"
262                                 "Server: libwebsockets\x0d\x0a"
263                                 "Content-Type: image/jpeg\x0d\x0a"
264                                         "Content-Length: %u\x0d\x0a\x0d\x0a",
265                                         (unsigned int)stat_buf.st_size);
266
267                         /*
268                          * send the http headers...
269                          * this won't block since it's the first payload sent
270                          * on the connection since it was established
271                          * (too small for partial)
272                          */
273
274                         n = libwebsocket_write(wsi, buffer,
275                                    p - buffer, LWS_WRITE_HTTP);
276
277                         if (n < 0) {
278                                 close(pss->fd);
279                                 return -1;
280                         }
281                         /*
282                          * book us a LWS_CALLBACK_HTTP_WRITEABLE callback
283                          */
284                         libwebsocket_callback_on_writable(context, wsi);
285                         break;
286                 }
287
288                 /* if not, send a file the easy way */
289                 strcpy(buf, resource_path);
290                 if (strcmp(in, "/")) {
291                         if (*((const char *)in) != '/')
292                                 strcat(buf, "/");
293                         strncat(buf, in, sizeof(buf) - strlen(resource_path));
294                 } else /* default file to serve */
295                         strcat(buf, "/test.html");
296                 buf[sizeof(buf) - 1] = '\0';
297
298                 /* refuse to serve files we don't understand */
299                 mimetype = get_mimetype(buf);
300                 if (!mimetype) {
301                         lwsl_err("Unknown mimetype for %s\n", buf);
302                         libwebsockets_return_http_status(context, wsi,
303                                       HTTP_STATUS_UNSUPPORTED_MEDIA_TYPE, NULL);
304                         return -1;
305                 }
306
307                 /* demostrates how to set a cookie on / */
308
309                 other_headers = NULL;
310                 if (!strcmp((const char *)in, "/") &&
311                            !lws_hdr_total_length(wsi, WSI_TOKEN_HTTP_COOKIE)) {
312                         /* this isn't very unguessable but it'll do for us */
313                         gettimeofday(&tv, NULL);
314                         sprintf(b64, "LWS_%u_%u_COOKIE",
315                                 (unsigned int)tv.tv_sec,
316                                 (unsigned int)tv.tv_usec);
317
318                         sprintf(leaf_path,
319                                 "Set-Cookie: test=LWS_%u_%u_COOKIE;Max-Age=360000\x0d\x0a",
320                             (unsigned int)tv.tv_sec, (unsigned int)tv.tv_usec);
321                         other_headers = leaf_path;
322                         lwsl_err(other_headers);
323                 }
324
325                 if (libwebsockets_serve_http_file(context, wsi, buf,
326                                                 mimetype, other_headers))
327                         return -1; /* through completion or error, close the socket */
328
329                 /*
330                  * notice that the sending of the file completes asynchronously,
331                  * we'll get a LWS_CALLBACK_HTTP_FILE_COMPLETION callback when
332                  * it's done
333                  */
334
335                 break;
336
337         case LWS_CALLBACK_HTTP_BODY:
338                 strncpy(buf, in, 20);
339                 buf[20] = '\0';
340                 if (len < 20)
341                         buf[len] = '\0';
342
343                 lwsl_notice("LWS_CALLBACK_HTTP_BODY: %s... len %d\n",
344                                 (const char *)buf, (int)len);
345
346                 break;
347
348         case LWS_CALLBACK_HTTP_BODY_COMPLETION:
349                 lwsl_notice("LWS_CALLBACK_HTTP_BODY_COMPLETION\n");
350                 /* the whole of the sent body arried, close the connection */
351                 libwebsockets_return_http_status(context, wsi,
352                                                 HTTP_STATUS_OK, NULL);
353
354                 return -1;
355
356         case LWS_CALLBACK_HTTP_FILE_COMPLETION:
357 //              lwsl_info("LWS_CALLBACK_HTTP_FILE_COMPLETION seen\n");
358                 /* kill the connection after we sent one file */
359                 return -1;
360
361         case LWS_CALLBACK_HTTP_WRITEABLE:
362                 /*
363                  * we can send more of whatever it is we were sending
364                  */
365
366                 do {
367                         n = read(pss->fd, buffer, sizeof buffer);
368                         /* problem reading, close conn */
369                         if (n < 0)
370                                 goto bail;
371                         /* sent it all, close conn */
372                         if (n == 0)
373                                 goto flush_bail;
374                         /*
375                          * because it's HTTP and not websocket, don't need to take
376                          * care about pre and postamble
377                          */
378                         m = libwebsocket_write(wsi, buffer, n, LWS_WRITE_HTTP);
379                         if (m < 0)
380                                 /* write failed, close conn */
381                                 goto bail;
382                         if (m != n)
383                                 /* partial write, adjust */
384                                 lseek(pss->fd, m - n, SEEK_CUR);
385
386                         if (m) /* while still active, extend timeout */
387                                 libwebsocket_set_timeout(wsi,
388                                         PENDING_TIMEOUT_HTTP_CONTENT, 5);
389                         
390                         /* if he has indigestion, let him clear it before eating more */
391                         if (lws_partial_buffered(wsi))
392                                 break;
393
394                 } while (!lws_send_pipe_choked(wsi));
395                 libwebsocket_callback_on_writable(context, wsi);
396                 break;
397 flush_bail:
398                 /* true if still partial pending */
399                 if (lws_partial_buffered(wsi)) {
400                         libwebsocket_callback_on_writable(context, wsi);
401                         break;
402                 }
403
404 bail:
405                 close(pss->fd);
406                 return -1;
407
408         /*
409          * callback for confirming to continue with client IP appear in
410          * protocol 0 callback since no websocket protocol has been agreed
411          * yet.  You can just ignore this if you won't filter on client IP
412          * since the default uhandled callback return is 0 meaning let the
413          * connection continue.
414          */
415
416         case LWS_CALLBACK_FILTER_NETWORK_CONNECTION:
417 #if 0
418                 libwebsockets_get_peer_addresses(context, wsi, (int)(long)in, client_name,
419                              sizeof(client_name), client_ip, sizeof(client_ip));
420
421                 fprintf(stderr, "Received network connect from %s (%s)\n",
422                                                         client_name, client_ip);
423 #endif
424                 /* if we returned non-zero from here, we kill the connection */
425                 break;
426
427 #ifdef EXTERNAL_POLL
428         /*
429          * callbacks for managing the external poll() array appear in
430          * protocol 0 callback
431          */
432
433         case LWS_CALLBACK_LOCK_POLL:
434                 /*
435                  * lock mutex to protect pollfd state
436                  * called before any other POLL related callback
437                  */
438                 break;
439
440         case LWS_CALLBACK_UNLOCK_POLL:
441                 /*
442                  * unlock mutex to protect pollfd state when
443                  * called after any other POLL related callback
444                  */
445                 break;
446
447         case LWS_CALLBACK_ADD_POLL_FD:
448
449                 if (count_pollfds >= max_poll_elements) {
450                         lwsl_err("LWS_CALLBACK_ADD_POLL_FD: too many sockets to track\n");
451                         return 1;
452                 }
453
454                 fd_lookup[pa->fd] = count_pollfds;
455                 pollfds[count_pollfds].fd = pa->fd;
456                 pollfds[count_pollfds].events = pa->events;
457                 pollfds[count_pollfds++].revents = 0;
458                 break;
459
460         case LWS_CALLBACK_DEL_POLL_FD:
461                 if (!--count_pollfds)
462                         break;
463                 m = fd_lookup[pa->fd];
464                 /* have the last guy take up the vacant slot */
465                 pollfds[m] = pollfds[count_pollfds];
466                 fd_lookup[pollfds[count_pollfds].fd] = m;
467                 break;
468
469         case LWS_CALLBACK_CHANGE_MODE_POLL_FD:
470                 pollfds[fd_lookup[pa->fd]].events = pa->events;
471                 break;
472
473 #endif
474
475         case LWS_CALLBACK_GET_THREAD_ID:
476                 /*
477                  * if you will call "libwebsocket_callback_on_writable"
478                  * from a different thread, return the caller thread ID
479                  * here so lws can use this information to work out if it
480                  * should signal the poll() loop to exit and restart early
481                  */
482
483                 /* return pthread_getthreadid_np(); */
484
485                 break;
486
487         default:
488                 break;
489         }
490
491         return 0;
492 }
493
494
495 /* dumb_increment protocol */
496
497 /*
498  * one of these is auto-created for each connection and a pointer to the
499  * appropriate instance is passed to the callback in the user parameter
500  *
501  * for this example protocol we use it to individualize the count for each
502  * connection.
503  */
504
505 struct per_session_data__dumb_increment {
506         int number;
507 };
508
509 static int
510 callback_dumb_increment(struct libwebsocket_context *context,
511                         struct libwebsocket *wsi,
512                         enum libwebsocket_callback_reasons reason,
513                                                void *user, void *in, size_t len)
514 {
515         int n, m;
516         unsigned char buf[LWS_SEND_BUFFER_PRE_PADDING + 512 +
517                                                   LWS_SEND_BUFFER_POST_PADDING];
518         unsigned char *p = &buf[LWS_SEND_BUFFER_PRE_PADDING];
519         struct per_session_data__dumb_increment *pss = (struct per_session_data__dumb_increment *)user;
520
521         switch (reason) {
522
523         case LWS_CALLBACK_ESTABLISHED:
524                 lwsl_info("callback_dumb_increment: "
525                                                  "LWS_CALLBACK_ESTABLISHED\n");
526                 pss->number = 0;
527                 break;
528
529         case LWS_CALLBACK_SERVER_WRITEABLE:
530                 n = sprintf((char *)p, "%d", pss->number++);
531                 m = libwebsocket_write(wsi, p, n, LWS_WRITE_TEXT);
532                 if (m < n) {
533                         lwsl_err("ERROR %d writing to di socket\n", n);
534                         return -1;
535                 }
536                 if (close_testing && pss->number == 50) {
537                         lwsl_info("close tesing limit, closing\n");
538                         return -1;
539                 }
540                 break;
541
542         case LWS_CALLBACK_RECEIVE:
543 //              fprintf(stderr, "rx %d\n", (int)len);
544                 if (len < 6)
545                         break;
546                 if (strcmp((const char *)in, "reset\n") == 0)
547                         pss->number = 0;
548                 break;
549         /*
550          * this just demonstrates how to use the protocol filter. If you won't
551          * study and reject connections based on header content, you don't need
552          * to handle this callback
553          */
554
555         case LWS_CALLBACK_FILTER_PROTOCOL_CONNECTION:
556                 dump_handshake_info(wsi);
557                 /* you could return non-zero here and kill the connection */
558                 break;
559
560         default:
561                 break;
562         }
563
564         return 0;
565 }
566
567
568 /* lws-mirror_protocol */
569
570 #define MAX_MESSAGE_QUEUE 32
571
572 struct per_session_data__lws_mirror {
573         struct libwebsocket *wsi;
574         int ringbuffer_tail;
575 };
576
577 struct a_message {
578         void *payload;
579         size_t len;
580 };
581
582 static struct a_message ringbuffer[MAX_MESSAGE_QUEUE];
583 static int ringbuffer_head;
584
585 static int
586 callback_lws_mirror(struct libwebsocket_context *context,
587                         struct libwebsocket *wsi,
588                         enum libwebsocket_callback_reasons reason,
589                                                void *user, void *in, size_t len)
590 {
591         int n;
592         struct per_session_data__lws_mirror *pss = (struct per_session_data__lws_mirror *)user;
593
594         switch (reason) {
595
596         case LWS_CALLBACK_ESTABLISHED:
597                 lwsl_info("callback_lws_mirror: LWS_CALLBACK_ESTABLISHED\n");
598                 pss->ringbuffer_tail = ringbuffer_head;
599                 pss->wsi = wsi;
600                 break;
601
602         case LWS_CALLBACK_PROTOCOL_DESTROY:
603                 lwsl_notice("mirror protocol cleaning up\n");
604                 for (n = 0; n < sizeof ringbuffer / sizeof ringbuffer[0]; n++)
605                         if (ringbuffer[n].payload)
606                                 free(ringbuffer[n].payload);
607                 break;
608
609         case LWS_CALLBACK_SERVER_WRITEABLE:
610                 if (close_testing)
611                         break;
612                 while (pss->ringbuffer_tail != ringbuffer_head) {
613
614                         n = libwebsocket_write(wsi, (unsigned char *)
615                                    ringbuffer[pss->ringbuffer_tail].payload +
616                                    LWS_SEND_BUFFER_PRE_PADDING,
617                                    ringbuffer[pss->ringbuffer_tail].len,
618                                                                 LWS_WRITE_TEXT);
619                         if (n < 0) {
620                                 lwsl_err("ERROR %d writing to mirror socket\n", n);
621                                 return -1;
622                         }
623                         if (n < ringbuffer[pss->ringbuffer_tail].len)
624                                 lwsl_err("mirror partial write %d vs %d\n",
625                                        n, ringbuffer[pss->ringbuffer_tail].len);
626
627                         if (pss->ringbuffer_tail == (MAX_MESSAGE_QUEUE - 1))
628                                 pss->ringbuffer_tail = 0;
629                         else
630                                 pss->ringbuffer_tail++;
631
632                         if (((ringbuffer_head - pss->ringbuffer_tail) &
633                                   (MAX_MESSAGE_QUEUE - 1)) == (MAX_MESSAGE_QUEUE - 15))
634                                 libwebsocket_rx_flow_allow_all_protocol(
635                                                libwebsockets_get_protocol(wsi));
636
637                         // lwsl_debug("tx fifo %d\n", (ringbuffer_head - pss->ringbuffer_tail) & (MAX_MESSAGE_QUEUE - 1));
638
639                         if (lws_partial_buffered(wsi) || lws_send_pipe_choked(wsi)) {
640                                 libwebsocket_callback_on_writable(context, wsi);
641                                 break;
642                         }
643                         /*
644                          * for tests with chrome on same machine as client and
645                          * server, this is needed to stop chrome choking
646                          */
647 #ifdef _WIN32
648                         Sleep(1);
649 #else
650                         usleep(1);
651 #endif
652                 }
653                 break;
654
655         case LWS_CALLBACK_RECEIVE:
656
657                 if (((ringbuffer_head - pss->ringbuffer_tail) &
658                                   (MAX_MESSAGE_QUEUE - 1)) == (MAX_MESSAGE_QUEUE - 1)) {
659                         lwsl_err("dropping!\n");
660                         goto choke;
661                 }
662
663                 if (ringbuffer[ringbuffer_head].payload)
664                         free(ringbuffer[ringbuffer_head].payload);
665
666                 ringbuffer[ringbuffer_head].payload =
667                                 malloc(LWS_SEND_BUFFER_PRE_PADDING + len +
668                                                   LWS_SEND_BUFFER_POST_PADDING);
669                 ringbuffer[ringbuffer_head].len = len;
670                 memcpy((char *)ringbuffer[ringbuffer_head].payload +
671                                           LWS_SEND_BUFFER_PRE_PADDING, in, len);
672                 if (ringbuffer_head == (MAX_MESSAGE_QUEUE - 1))
673                         ringbuffer_head = 0;
674                 else
675                         ringbuffer_head++;
676
677                 if (((ringbuffer_head - pss->ringbuffer_tail) &
678                                   (MAX_MESSAGE_QUEUE - 1)) != (MAX_MESSAGE_QUEUE - 2))
679                         goto done;
680
681 choke:
682                 lwsl_debug("LWS_CALLBACK_RECEIVE: throttling %p\n", wsi);
683                 libwebsocket_rx_flow_control(wsi, 0);
684
685 //              lwsl_debug("rx fifo %d\n", (ringbuffer_head - pss->ringbuffer_tail) & (MAX_MESSAGE_QUEUE - 1));
686 done:
687                 libwebsocket_callback_on_writable_all_protocol(
688                                                libwebsockets_get_protocol(wsi));
689                 break;
690
691         /*
692          * this just demonstrates how to use the protocol filter. If you won't
693          * study and reject connections based on header content, you don't need
694          * to handle this callback
695          */
696
697         case LWS_CALLBACK_FILTER_PROTOCOL_CONNECTION:
698                 dump_handshake_info(wsi);
699                 /* you could return non-zero here and kill the connection */
700                 break;
701
702         default:
703                 break;
704         }
705
706         return 0;
707 }
708
709
710 /* list of supported protocols and callbacks */
711
712 static struct libwebsocket_protocols protocols[] = {
713         /* first protocol must always be HTTP handler */
714
715         {
716                 "http-only",            /* name */
717                 callback_http,          /* callback */
718                 sizeof (struct per_session_data__http), /* per_session_data_size */
719                 0,                      /* max frame size / rx buffer */
720         },
721         {
722                 "dumb-increment-protocol",
723                 callback_dumb_increment,
724                 sizeof(struct per_session_data__dumb_increment),
725                 10,
726         },
727         {
728                 "lws-mirror-protocol",
729                 callback_lws_mirror,
730                 sizeof(struct per_session_data__lws_mirror),
731                 128,
732         },
733         { NULL, NULL, 0, 0 } /* terminator */
734 };
735
736 void sighandler(int sig)
737 {
738         force_exit = 1;
739         libwebsocket_cancel_service(context);
740 }
741
742 static struct option options[] = {
743         { "help",       no_argument,            NULL, 'h' },
744         { "debug",      required_argument,      NULL, 'd' },
745         { "port",       required_argument,      NULL, 'p' },
746         { "ssl",        no_argument,            NULL, 's' },
747         { "allow-non-ssl",      no_argument,            NULL, 'a' },
748         { "interface",  required_argument,      NULL, 'i' },
749         { "closetest",  no_argument,            NULL, 'c' },
750         { "libev",  no_argument,                NULL, 'e' },
751         #ifndef LWS_NO_DAEMONIZE
752         { "daemonize",  no_argument,            NULL, 'D' },
753 #endif
754         { "resource_path", required_argument,           NULL, 'r' },
755         { NULL, 0, 0, 0 }
756 };
757
758 int main(int argc, char **argv)
759 {
760         char cert_path[1024];
761         char key_path[1024];
762         int n = 0;
763         int use_ssl = 0;
764         int opts = 0;
765         char interface_name[128] = "";
766         const char *iface = NULL;
767 #ifndef WIN32
768         int syslog_options = LOG_PID | LOG_PERROR;
769 #endif
770         unsigned int ms, oldms = 0;
771         struct lws_context_creation_info info;
772
773         int debug_level = 7;
774 #ifndef LWS_NO_DAEMONIZE
775         int daemonize = 0;
776 #endif
777
778         memset(&info, 0, sizeof info);
779         info.port = 7681;
780
781         while (n >= 0) {
782                 n = getopt_long(argc, argv, "eci:hsap:d:Dr:", options, NULL);
783                 if (n < 0)
784                         continue;
785                 switch (n) {
786                 case 'e':
787                         opts |= LWS_SERVER_OPTION_LIBEV;
788                         break;
789 #ifndef LWS_NO_DAEMONIZE
790                 case 'D':
791                         daemonize = 1;
792                         #ifndef WIN32
793                         syslog_options &= ~LOG_PERROR;
794                         #endif
795                         break;
796 #endif
797                 case 'd':
798                         debug_level = atoi(optarg);
799                         break;
800                 case 's':
801                         use_ssl = 1;
802                         break;
803                 case 'a':
804                         opts |= LWS_SERVER_OPTION_ALLOW_NON_SSL_ON_SSL_PORT;
805                         break;
806                 case 'p':
807                         info.port = atoi(optarg);
808                         break;
809                 case 'i':
810                         strncpy(interface_name, optarg, sizeof interface_name);
811                         interface_name[(sizeof interface_name) - 1] = '\0';
812                         iface = interface_name;
813                         break;
814                 case 'c':
815                         close_testing = 1;
816                         fprintf(stderr, " Close testing mode -- closes on "
817                                            "client after 50 dumb increments"
818                                            "and suppresses lws_mirror spam\n");
819                         break;
820                 case 'r':
821                         resource_path = optarg;
822                         printf("Setting resource path to \"%s\"\n", resource_path);
823                         break;
824                 case 'h':
825                         fprintf(stderr, "Usage: test-server "
826                                         "[--port=<p>] [--ssl] "
827                                         "[-d <log bitfield>] "
828                                         "[--resource_path <path>]\n");
829                         exit(1);
830                 }
831         }
832
833 #if !defined(LWS_NO_DAEMONIZE) && !defined(WIN32)
834         /* 
835          * normally lock path would be /var/lock/lwsts or similar, to
836          * simplify getting started without having to take care about
837          * permissions or running as root, set to /tmp/.lwsts-lock
838          */
839         if (daemonize && lws_daemonize("/tmp/.lwsts-lock")) {
840                 fprintf(stderr, "Failed to daemonize\n");
841                 return 1;
842         }
843 #endif
844
845         signal(SIGINT, sighandler);
846
847 #ifndef WIN32
848         /* we will only try to log things according to our debug_level */
849         setlogmask(LOG_UPTO (LOG_DEBUG));
850         openlog("lwsts", syslog_options, LOG_DAEMON);
851 #endif
852
853         /* tell the library what debug level to emit and to send it to syslog */
854         lws_set_log_level(debug_level, lwsl_emit_syslog);
855
856         lwsl_notice("libwebsockets test server - "
857                         "(C) Copyright 2010-2013 Andy Green <andy@warmcat.com> - "
858                                                     "licensed under LGPL2.1\n");
859 #ifdef EXTERNAL_POLL
860         max_poll_elements = getdtablesize();
861         pollfds = malloc(max_poll_elements * sizeof (struct pollfd));
862         fd_lookup = malloc(max_poll_elements * sizeof (int));
863         if (pollfds == NULL || fd_lookup == NULL) {
864                 lwsl_err("Out of memory pollfds=%d\n", max_poll_elements);
865                 return -1;
866         }
867 #endif
868
869         info.iface = iface;
870         info.protocols = protocols;
871 #ifndef LWS_NO_EXTENSIONS
872         info.extensions = libwebsocket_get_internal_extensions();
873 #endif
874         if (!use_ssl) {
875                 info.ssl_cert_filepath = NULL;
876                 info.ssl_private_key_filepath = NULL;
877         } else {
878                 if (strlen(resource_path) > sizeof(cert_path) - 32) {
879                         lwsl_err("resource path too long\n");
880                         return -1;
881                 }
882                 sprintf(cert_path, "%s/libwebsockets-test-server.pem",
883                                                                 resource_path);
884                 if (strlen(resource_path) > sizeof(key_path) - 32) {
885                         lwsl_err("resource path too long\n");
886                         return -1;
887                 }
888                 sprintf(key_path, "%s/libwebsockets-test-server.key.pem",
889                                                                 resource_path);
890
891                 info.ssl_cert_filepath = cert_path;
892                 info.ssl_private_key_filepath = key_path;
893         }
894         info.gid = -1;
895         info.uid = -1;
896         info.options = opts;
897
898         context = libwebsocket_create_context(&info);
899         if (context == NULL) {
900                 lwsl_err("libwebsocket init failed\n");
901                 return -1;
902         }
903
904         n = 0;
905         while (n >= 0 && !force_exit) {
906                 struct timeval tv;
907
908                 gettimeofday(&tv, NULL);
909
910                 /*
911                  * This provokes the LWS_CALLBACK_SERVER_WRITEABLE for every
912                  * live websocket connection using the DUMB_INCREMENT protocol,
913                  * as soon as it can take more packets (usually immediately)
914                  */
915
916                 ms = (tv.tv_sec * 1000) + (tv.tv_usec / 1000);
917                 if ((ms - oldms) > 50) {
918                         libwebsocket_callback_on_writable_all_protocol(&protocols[PROTOCOL_DUMB_INCREMENT]);
919                         oldms = ms;
920                 }
921
922 #ifdef EXTERNAL_POLL
923
924                 /*
925                  * this represents an existing server's single poll action
926                  * which also includes libwebsocket sockets
927                  */
928
929                 n = poll(pollfds, count_pollfds, 50);
930                 if (n < 0)
931                         continue;
932
933
934                 if (n)
935                         for (n = 0; n < count_pollfds; n++)
936                                 if (pollfds[n].revents)
937                                         /*
938                                         * returns immediately if the fd does not
939                                         * match anything under libwebsockets
940                                         * control
941                                         */
942                                         if (libwebsocket_service_fd(context,
943                                                                   &pollfds[n]) < 0)
944                                                 goto done;
945 #else
946                 /*
947                  * If libwebsockets sockets are all we care about,
948                  * you can use this api which takes care of the poll()
949                  * and looping through finding who needed service.
950                  *
951                  * If no socket needs service, it'll return anyway after
952                  * the number of ms in the second argument.
953                  */
954
955                 n = libwebsocket_service(context, 50);
956 #endif
957         }
958
959 #ifdef EXTERNAL_POLL
960 done:
961 #endif
962
963         libwebsocket_context_destroy(context);
964
965         lwsl_notice("libwebsockets-test-server exited cleanly\n");
966
967 #ifndef WIN32
968         closelog();
969 #endif
970
971         return 0;
972 }