static const char *test_http_index(void) { struct ns_mgr mgr; struct ns_connection *nc; const char *local_addr = "127.0.0.1:7777"; char buf[20] = ""; ns_mgr_init(&mgr, NULL); ASSERT((nc = ns_bind(&mgr, local_addr, cb1)) != NULL); ns_set_protocol_http_websocket(nc); /* Test directory. */ ASSERT((nc = ns_connect(&mgr, local_addr, cb9)) != NULL); ns_set_protocol_http_websocket(nc); nc->user_data = buf; ns_printf(nc, "GET /%s HTTP/1.0\n\n", "/"); system("echo testdata >index.html"); /* Run event loop. Use more cycles to let file download complete. */ poll_mgr(&mgr, 200); ns_mgr_free(&mgr); system("rm index.html"); /* Check that test buffer has been filled by the callback properly. */ ASSERT(strcmp(buf, "testdata\n") == 0); return NULL; }
static const char *test_http_errors(void) { struct ns_mgr mgr; struct ns_connection *nc; const char *local_addr = "127.0.0.1:7777"; char status[40] = ""; ns_mgr_init(&mgr, NULL); ASSERT((nc = ns_bind(&mgr, local_addr, cb1)) != NULL); ns_set_protocol_http_websocket(nc); /* Test file which exists but cannot be opened */ ASSERT((nc = ns_connect(&mgr, local_addr, cb8)) != NULL); ns_set_protocol_http_websocket(nc); nc->user_data = status; system("touch test_unreadable; chmod 000 test_unreadable"); ns_printf(nc, "GET /%s HTTP/1.0\n\n", "../test_unreadable"); /* Run event loop. Use more cycles to let file download complete. */ poll_mgr(&mgr, 200); system("rm -f test_unreadable"); /* Check that it failed */ ASSERT(strncmp(status, "HTTP/1.1 500", strlen("HTTP/1.1 500")) == 0); /* Test non existing file */ ASSERT((nc = ns_connect(&mgr, local_addr, cb8)) != NULL); ns_set_protocol_http_websocket(nc); nc->user_data = status; ns_printf(nc, "GET /%s HTTP/1.0\n\n", "/please_dont_create_this_file_srsly"); /* Run event loop. Use more cycles to let file download complete. */ poll_mgr(&mgr, 200); /* Check that it failed */ ASSERT(strncmp(status, "HTTP/1.1 404", strlen("HTTP/1.1 404")) == 0); /* Test directory without index.html */ ASSERT((nc = ns_connect(&mgr, local_addr, cb8)) != NULL); ns_set_protocol_http_websocket(nc); nc->user_data = status; ns_printf(nc, "GET /%s HTTP/1.0\n\n", "/"); /* Run event loop. Use more cycles to let file download complete. */ poll_mgr(&mgr, 200); /* Check that it failed */ ASSERT(strncmp(status, "HTTP/1.1 403", strlen("HTTP/1.1 403")) == 0); /* Cleanup */ ns_mgr_free(&mgr); return NULL; }
static const char *test_http(void) { struct ns_mgr mgr; struct ns_connection *nc; const char *local_addr = "127.0.0.1:7777"; char buf[20] = "", status[20] = "", mime[20] = ""; ns_mgr_init(&mgr, NULL); ASSERT((nc = ns_bind(&mgr, local_addr, cb1)) != NULL); ns_set_protocol_http_websocket(nc); /* Valid HTTP request. Pass test buffer to the callback. */ ASSERT((nc = ns_connect(&mgr, local_addr, cb2)) != NULL); ns_set_protocol_http_websocket(nc); nc->user_data = buf; ns_printf(nc, "%s", "POST /foo HTTP/1.0\nContent-Length: 10\n\n" "0123456789"); /* Invalid HTTP request */ ASSERT((nc = ns_connect(&mgr, local_addr, cb2)) != NULL); ns_set_protocol_http_websocket(nc); ns_printf(nc, "%s", "bl\x03\n\n"); /* Test static file download by downloading this executable, argv[0] */ ASSERT((nc = ns_connect(&mgr, local_addr, cb7)) != NULL); ns_set_protocol_http_websocket(nc); nc->user_data = status; ns_printf(nc, "GET /%s HTTP/1.0\n\n", s_argv_0); /* Test mime type for static file */ ASSERT((nc = ns_connect(&mgr, local_addr, cb10)) != NULL); ns_set_protocol_http_websocket(nc); nc->user_data = mime; ns_printf(nc, "%s", "GET /data/dummy.xml HTTP/1.0\n\n"); /* Run event loop. Use more cycles to let file download complete. */ poll_mgr(&mgr, 200); ns_mgr_free(&mgr); /* Check that test buffer has been filled by the callback properly. */ ASSERT(strcmp(buf, "[/foo 10]") == 0); ASSERT(strcmp(status, "success") == 0); ASSERT(strcmp(mime, "text/xml") == 0); return NULL; }
int main(int argc, char *argv[]) { struct ns_mgr mgr; struct ns_connection *nc; int i; char *cp; ns_mgr_init(&mgr, NULL); nc = ns_bind(&mgr, s_http_port, ev_handler); ns_set_protocol_http_websocket(nc); s_http_server_opts.document_root = "."; s_http_server_opts.enable_directory_listing = "yes"; /* Use current binary directory as document root */ if (argc > 0 && ((cp = strrchr(argv[0], '/')) != NULL || (cp = strrchr(argv[0], '/')) != NULL)) { *cp = '\0'; s_http_server_opts.document_root = argv[0]; } /* Process command line options to customize HTTP server */ for (i = 1; i < argc; i++) { if (strcmp(argv[i], "-D") == 0 && i + 1 < argc) { mgr.hexdump_file = argv[++i]; } else if (strcmp(argv[i], "-d") == 0 && i + 1 < argc) { s_http_server_opts.document_root = argv[++i]; } else if (strcmp(argv[i], "-a") == 0 && i + 1 < argc) { s_http_server_opts.auth_domain = argv[++i]; } else if (strcmp(argv[i], "-P") == 0 && i + 1 < argc) { s_http_server_opts.global_auth_file = argv[++i]; } else if (strcmp(argv[i], "-p") == 0 && i + 1 < argc) { s_http_server_opts.per_directory_auth_file = argv[++i]; } else if (strcmp(argv[i], "-r") == 0 && i + 1 < argc) { s_http_server_opts.url_rewrites = argv[++i]; #ifndef NS_DISABLE_CGI } else if (strcmp(argv[i], "-i") == 0 && i + 1 < argc) { s_http_server_opts.cgi_interpreter = argv[++i]; #endif #ifdef NS_ENABLE_SSL } else if (strcmp(argv[i], "-s") == 0 && i + 1 < argc) { const char *ssl_cert = argv[++i]; const char *err_str = ns_set_ssl(nc, ssl_cert, NULL); if (err_str != NULL) { fprintf(stderr, "Error loading SSL cert: %s\n", err_str); exit(1); } #endif } } printf("Starting RESTful server on port %s\n", s_http_port); for (;;) { ns_mgr_poll(&mgr, 1000); } ns_mgr_free(&mgr); return 0; }
/* * Construct a new WebSocket object: * * url: url where to connect to * protocol: websocket subprotocol * * Example: * ws = new WebSocket('wss://localhost:1234'); * ws.onopen = function(ev) { * print("ON OPEN", ev); * } * * ws.onclose = function(ev) { * print("ON CLOSE", ev); * } * * ws.onmessage = function(ev) { * print("ON MESSAGE", ev); * } * * ws.onerror = function(ev) { * print("ON ERROR", ev); * } * */ static v7_val_t sj_ws_ctor(struct v7 *v7, v7_val_t this_obj, v7_val_t args) { struct ns_connection *nc; struct user_data *ud; v7_val_t urlv = v7_array_get(v7, args, 0); v7_val_t subprotov = v7_array_get(v7, args, 1); (void) this_obj; (void) args; if (!v7_is_string(urlv)) { v7_throw(v7, "invalid ws url string"); } if (v7_is_object(this_obj) && this_obj != v7_get_global_object(v7)) { int use_ssl = 0; size_t len; const char *url = v7_to_string(v7, &urlv, &len); if (strncmp(url, "ws://", 5) == 0) { url += 5; } else if (strncmp(url, "wss://", 6) == 0) { url += 6; use_ssl = 1; } nc = ns_connect(&sj_mgr, url, ws_ev_handler); if (nc == NULL) v7_throw(v7, "error creating the connection"); #ifdef NS_ENABLE_SSL if (use_ssl) { ns_set_ssl(nc, NULL, NULL); } #endif ns_set_protocol_http_websocket(nc); ud = calloc(1, sizeof(*ud)); ud->v7 = v7; ud->ws = this_obj; nc->user_data = ud; v7_own(v7, &ud->ws); if (v7_is_string(subprotov)) { size_t len; const char *proto = v7_to_string(v7, &subprotov, &len); ud->proto = strdup(proto); } } else { v7_throw(v7, "WebSocket ctor called without new"); } return v7_create_undefined(); }
static const char *test_rpc(void) { struct ns_mgr mgr; struct ns_connection *nc; const char *local_addr = "127.0.0.1:7779"; char buf[100] = ""; ns_mgr_init(&mgr, NULL); ASSERT((nc = ns_bind(&mgr, local_addr, rpc_server)) != NULL); ns_set_protocol_http_websocket(nc); ASSERT((nc = ns_connect(&mgr, local_addr, rpc_client)) != NULL); ns_set_protocol_http_websocket(nc); nc->user_data = buf; poll_mgr(&mgr, 50); ns_mgr_free(&mgr); ASSERT(strcmp(buf, "1 1 16") == 0); return NULL; }
/* Big payloads follow a different code path because it will use the extended * length field and possibly ns_avprintf will need to reallocate the buffer. */ static const char *test_websocket_big(void) { struct ns_mgr mgr; struct ns_connection *nc; const char *local_addr = "127.0.0.1:7778"; char buf[20] = ""; struct big_payload_params params; params.buf = buf; ns_mgr_init(&mgr, NULL); /* mgr.hexdump_file = "/dev/stdout"; */ ASSERT((nc = ns_bind(&mgr, local_addr, cb3_big)) != NULL); ns_set_protocol_http_websocket(nc); /* Websocket request */ ASSERT((nc = ns_connect(&mgr, local_addr, cb4_big)) != NULL); ns_set_protocol_http_websocket(nc); params.size = 8192; nc->user_data = ¶ms; ns_send_websocket_handshake(nc, "/ws", NULL); poll_mgr(&mgr, 50); /* Check that test buffer has been filled by the callback properly. */ ASSERT(strcmp(buf, "success") == 0); /* Websocket request */ ASSERT((nc = ns_connect(&mgr, local_addr, cb4_big)) != NULL); ns_set_protocol_http_websocket(nc); params.size = 65535; nc->user_data = ¶ms; ns_send_websocket_handshake(nc, "/ws", NULL); poll_mgr(&mgr, 50); ns_mgr_free(&mgr); /* Check that test buffer has been filled by the callback properly. */ ASSERT(strcmp(buf, "success") == 0); return NULL; }
int main(void) { struct ns_mgr mgr; struct ns_connection *nc; ns_mgr_init(&mgr, NULL); nc = ns_bind(&mgr, s_http_port, ev_handler); ns_set_protocol_http_websocket(nc); printf("Starting JSON-RPC server on port %s\n", s_http_port); for (;;) { ns_mgr_poll(&mgr, 1000); } ns_mgr_free(&mgr); return 0; }
int main(void) { struct ns_mgr mgr; struct ns_connection *nc; signal(SIGTERM, signal_handler); signal(SIGINT, signal_handler); ns_mgr_init(&mgr, NULL); nc = ns_bind(&mgr, s_http_port, ev_handler); s_http_server_opts.document_root = "."; ns_set_protocol_http_websocket(nc); printf("Started on port %s\n", s_http_port); while (s_signal_received == 0) { ns_mgr_poll(&mgr, 200); } ns_mgr_free(&mgr); return 0; }
/* * choose_backend parses incoming HTTP request and routes it to the appropriate * backend. It assumes that clients don't do HTTP pipelining, handling only * one request request for each connection. To give a hint to backend about * this it inserts "Connection: close" header into each forwarded request. */ static int connect_backend(struct conn_data *conn, struct http_message *hm) { struct ns_connection *nc = conn->client.nc; struct http_backend *be = choose_backend(hm); write_log("%.*s %.*s backend=%s\n", (int) hm->method.len, hm->method.p, (int) hm->uri.len, hm->uri.p, be->host_port); if (be == NULL) return 0; if (be->redirect != 0) { ns_printf(nc, "HTTP/1.1 302 Found\r\nLocation: %s\r\n\r\n", be->host_port); return 1; } struct be_conn *bec = get_conn(be); if (bec != NULL) { bec->nc->handler = ev_handler; #ifdef DEBUG write_log("conn=%p to %p (%s) reusing bec=%p\n", conn, be, be->host_port, bec); #endif } else { bec = malloc(sizeof(*conn->be_conn)); memset(bec, 0, sizeof(*bec)); bec->nc = ns_connect(nc->mgr, be->host_port, ev_handler); #ifdef DEBUG write_log("conn=%p new conn to %p (%s) bec=%p\n", conn, be, be->host_port, bec); #endif if (bec->nc == NULL) { free(bec); write_log("Connection to [%s] failed\n", be->host_port); return 0; } } bec->be = be; conn->be_conn = bec; conn->backend.nc = bec->nc; conn->backend.nc->user_data = conn; ns_set_protocol_http_websocket(conn->backend.nc); return 1; }
int main(int argc, char *argv[]) { struct ns_mgr mgr; struct ns_connection *nc; int i, redirect = 0; const char *vhost = NULL; ns_mgr_init(&mgr, NULL); /* Parse command line arguments */ for (i = 1; i < argc; i++) { if (strcmp(argv[i], "-D") == 0) { mgr.hexdump_file = argv[i + 1]; i++; } else if (strcmp(argv[i], "-k") == 0) { s_backend_keepalive = 1; } else if (strcmp(argv[i], "-l") == 0 && i + 1 < argc) { if (strcmp(argv[i + 1], "-") == 0) { s_log_file = stdout; } else { s_log_file = fopen(argv[i + 1], "a"); if (s_log_file == NULL) { perror("fopen"); exit(EXIT_FAILURE); } } i++; } else if (strcmp(argv[i], "-p") == 0) { s_http_port = argv[i + 1]; i++; } else if (strcmp(argv[i], "-r") == 0 && i + 1 < argc) { redirect = 1; } else if (strcmp(argv[i], "-v") == 0 && i + 1 < argc) { if (strcmp(argv[i + 1], "") == 0) { vhost = NULL; } else { vhost = argv[i + 1]; } i++; } else if (strcmp(argv[i], "-b") == 0 && i + 2 < argc) { struct http_backend *be = vhost != NULL ? &s_vhost_backends[s_num_vhost_backends++] : &s_default_backends[s_num_default_backends++]; STAILQ_INIT(&be->conns); char *r = NULL; be->vhost = vhost; be->uri_prefix = argv[i + 1]; be->host_port = argv[i + 2]; be->redirect = redirect; be->uri_prefix_replacement = be->uri_prefix; if ((r = strchr(be->uri_prefix, '=')) != NULL) { *r = '\0'; be->uri_prefix_replacement = r + 1; } printf( "Adding backend for %s%s : %s " "[redirect=%d,prefix_replacement=%s]\n", be->vhost == NULL ? "" : be->vhost, be->uri_prefix, be->host_port, be->redirect, be->uri_prefix_replacement); vhost = NULL; redirect = 0; i += 2; #ifdef NS_ENABLE_SSL } else if (strcmp(argv[i], "-s") == 0 && i + 1 < argc) { s_ssl_cert = argv[++i]; #endif } else { print_usage_and_exit(argv[0]); } } /* Open listening socket */ if ((nc = ns_bind(&mgr, s_http_port, ev_handler)) == NULL) { fprintf(stderr, "ns_bind(%s) failed\n", s_http_port); exit(EXIT_FAILURE); } #if NS_ENABLE_SSL if (s_ssl_cert != NULL) { const char *err_str = ns_set_ssl(nc, s_ssl_cert, NULL); if (err_str != NULL) { fprintf(stderr, "Error loading SSL cert: %s\n", err_str); exit(1); } } #endif ns_set_protocol_http_websocket(nc); if (s_num_vhost_backends + s_num_default_backends == 0) { print_usage_and_exit(argv[0]); } signal(SIGINT, signal_handler); signal(SIGTERM, signal_handler); /* Run event loop until signal is received */ printf("Starting LB on port %s\n", s_http_port); while (s_sig_num == 0) { ns_mgr_poll(&mgr, 1000); } /* Cleanup */ ns_mgr_free(&mgr); printf("Exiting on signal %d\n", s_sig_num); return EXIT_SUCCESS; }