| /* |
| * lws-minimal-http-client-jit-trust |
| * |
| * Written in 2010-2021 by Andy Green <[email protected]> |
| * |
| * This file is made available under the Creative Commons CC0 1.0 |
| * Universal Public Domain Dedication. |
| * |
| * This demonstrates the a minimal http client using lws. |
| * |
| * It visits https://warmcat.com/ and receives the html page there. You |
| * can dump the page data by changing the #if 0 below. |
| */ |
| |
| #include <libwebsockets.h> |
| #include <string.h> |
| #include <signal.h> |
| |
| static int interrupted, bad = 1, status, conmon; |
| #if defined(LWS_WITH_HTTP2) |
| static int long_poll; |
| #endif |
| static struct lws *client_wsi; |
| static const char *ba_user, *ba_password; |
| static int budget = 6; |
| |
| /* |
| * For this example, we import the C-formatted array version of the trust blob |
| * directly. This is produced by running scripts/mozilla-trust-gen.sh and can |
| * be found in ./_trust after that. |
| */ |
| |
| static uint8_t jit_trust_blob[] = { |
| #include "./trust_blob.h" |
| }; |
| |
| static const lws_retry_bo_t retry = { |
| .secs_since_valid_ping = 3, |
| .secs_since_valid_hangup = 10, |
| }; |
| |
| #if defined(LWS_WITH_CONMON) |
| void |
| dump_conmon_data(struct lws *wsi) |
| { |
| const struct addrinfo *ai; |
| struct lws_conmon cm; |
| char ads[48]; |
| |
| lws_conmon_wsi_take(wsi, &cm); |
| |
| lws_sa46_write_numeric_address(&cm.peer46, ads, sizeof(ads)); |
| lwsl_notice("%s: peer %s, dns: %uus, sockconn: %uus, " |
| "tls: %uus, txn_resp: %uus\n", |
| __func__, ads, |
| (unsigned int)cm.ciu_dns, |
| (unsigned int)cm.ciu_sockconn, |
| (unsigned int)cm.ciu_tls, |
| (unsigned int)cm.ciu_txn_resp); |
| |
| ai = cm.dns_results_copy; |
| while (ai) { |
| lws_sa46_write_numeric_address((lws_sockaddr46 *)ai->ai_addr, |
| ads, sizeof(ads)); |
| lwsl_notice("%s: DNS %s\n", __func__, ads); |
| ai = ai->ai_next; |
| } |
| |
| /* |
| * This destroys the DNS list in the lws_conmon that we took |
| * responsibility for when we used lws_conmon_wsi_take() |
| */ |
| |
| lws_conmon_release(&cm); |
| } |
| #endif |
| |
| struct args { |
| int argc; |
| const char **argv; |
| }; |
| |
| static const struct lws_protocols protocols[]; |
| |
| static int |
| try_connect(struct lws_context *cx) |
| { |
| struct lws_client_connect_info i; |
| struct args *a = lws_context_user(cx); |
| const char *p; |
| |
| memset(&i, 0, sizeof i); /* otherwise uninitialized garbage */ |
| i.context = cx; |
| if (!lws_cmdline_option(a->argc, a->argv, "-n")) { |
| i.ssl_connection = LCCSCF_USE_SSL; |
| #if defined(LWS_WITH_HTTP2) |
| /* requires h2 */ |
| if (lws_cmdline_option(a->argc, a->argv, "--long-poll")) { |
| lwsl_user("%s: long poll mode\n", __func__); |
| long_poll = 1; |
| } |
| #endif |
| } |
| |
| if (lws_cmdline_option(a->argc, a->argv, "-l")) { |
| i.port = 7681; |
| i.address = "localhost"; |
| i.ssl_connection |= LCCSCF_ALLOW_SELFSIGNED; |
| } else { |
| i.port = 443; |
| i.address = "warmcat.com"; |
| } |
| |
| if (lws_cmdline_option(a->argc, a->argv, "--nossl")) |
| i.ssl_connection = 0; |
| |
| i.ssl_connection |= LCCSCF_H2_QUIRK_OVERFLOWS_TXCR | |
| LCCSCF_H2_QUIRK_NGHTTP2_END_STREAM | |
| LCCSCF_ACCEPT_TLS_DOWNGRADE_REDIRECTS; |
| |
| i.alpn = "h2,http/1.1"; |
| if (lws_cmdline_option(a->argc, a->argv, "--h1")) |
| i.alpn = "http/1.1"; |
| |
| if (lws_cmdline_option(a->argc, a->argv, "--h2-prior-knowledge")) |
| i.ssl_connection |= LCCSCF_H2_PRIOR_KNOWLEDGE; |
| |
| if ((p = lws_cmdline_option(a->argc, a->argv, "-p"))) |
| i.port = atoi(p); |
| |
| if ((p = lws_cmdline_option(a->argc, a->argv, "--user"))) |
| ba_user = p; |
| if ((p = lws_cmdline_option(a->argc, a->argv, "--password"))) |
| ba_password = p; |
| |
| if (lws_cmdline_option(a->argc, a->argv, "-j")) |
| i.ssl_connection |= LCCSCF_ALLOW_SELFSIGNED; |
| |
| if (lws_cmdline_option(a->argc, a->argv, "-k")) |
| i.ssl_connection |= LCCSCF_ALLOW_INSECURE; |
| |
| if (lws_cmdline_option(a->argc, a->argv, "-m")) |
| i.ssl_connection |= LCCSCF_SKIP_SERVER_CERT_HOSTNAME_CHECK; |
| |
| if (lws_cmdline_option(a->argc, a->argv, "-e")) |
| i.ssl_connection |= LCCSCF_ALLOW_EXPIRED; |
| |
| if ((p = lws_cmdline_option(a->argc, a->argv, "-f"))) { |
| i.ssl_connection |= LCCSCF_H2_MANUAL_RXFLOW; |
| i.manual_initial_tx_credit = atoi(p); |
| lwsl_notice("%s: manual peer tx credit %d\n", __func__, |
| i.manual_initial_tx_credit); |
| } |
| |
| #if defined(LWS_WITH_CONMON) |
| if (lws_cmdline_option(a->argc, a->argv, "--conmon")) { |
| i.ssl_connection |= LCCSCF_CONMON; |
| conmon = 1; |
| } |
| #endif |
| |
| /* the default validity check is 5m / 5m10s... -v = 3s / 10s */ |
| |
| if (lws_cmdline_option(a->argc, a->argv, "-v")) |
| i.retry_and_idle_policy = &retry; |
| |
| if ((p = lws_cmdline_option(a->argc, a->argv, "--server"))) |
| i.address = p; |
| |
| if ((p = lws_cmdline_option(a->argc, a->argv, "--path"))) |
| i.path = p; |
| else |
| i.path = "/"; |
| |
| i.host = i.address; |
| i.origin = i.address; |
| i.method = "GET"; |
| |
| i.protocol = protocols[0].name; |
| i.pwsi = &client_wsi; |
| i.fi_wsi_name = "user"; |
| |
| if (!lws_client_connect_via_info(&i)) { |
| lwsl_err("Client creation failed\n"); |
| interrupted = 1; |
| bad = 2; /* could not even start client connection */ |
| lws_cancel_service(cx); |
| |
| return 1; |
| } |
| |
| return 0; |
| } |
| |
| static const char *ua = "Mozilla/5.0 (X11; Linux x86_64) " |
| "AppleWebKit/537.36 (KHTML, like Gecko) " |
| "Chrome/51.0.2704.103 Safari/537.36", |
| *acc = "*/*"; |
| |
| static int |
| callback_http(struct lws *wsi, enum lws_callback_reasons reason, |
| void *user, void *in, size_t len) |
| { |
| switch (reason) { |
| |
| /* because we are protocols[0] ... */ |
| case LWS_CALLBACK_CLIENT_CONNECTION_ERROR: |
| lwsl_err("CLIENT_CONNECTION_ERROR: %s\n", |
| in ? (char *)in : "(null)"); |
| |
| if (budget--) { |
| try_connect(lws_get_context(wsi)); |
| break; |
| } |
| |
| interrupted = 1; |
| bad = 3; /* connection failed before we could make connection */ |
| lws_cancel_service(lws_get_context(wsi)); |
| |
| #if defined(LWS_WITH_CONMON) |
| if (conmon) |
| dump_conmon_data(wsi); |
| #endif |
| break; |
| |
| case LWS_CALLBACK_ESTABLISHED_CLIENT_HTTP: |
| { |
| char buf[128]; |
| |
| lws_get_peer_simple(wsi, buf, sizeof(buf)); |
| status = (int)lws_http_client_http_response(wsi); |
| |
| lwsl_user("Connected to %s, http response: %d\n", |
| buf, status); |
| } |
| #if defined(LWS_WITH_HTTP2) |
| if (long_poll) { |
| lwsl_user("%s: Client entering long poll mode\n", __func__); |
| lws_h2_client_stream_long_poll_rxonly(wsi); |
| } |
| #endif |
| |
| if (lws_fi_user_wsi_fi(wsi, "user_reject_at_est")) |
| return -1; |
| |
| break; |
| |
| |
| case LWS_CALLBACK_CLIENT_APPEND_HANDSHAKE_HEADER: |
| { |
| unsigned char **p = (unsigned char **)in, *end = (*p) + len; |
| |
| if (lws_add_http_header_by_token(wsi, WSI_TOKEN_HTTP_USER_AGENT, |
| (unsigned char *)ua, (int)strlen(ua), p, end)) |
| return -1; |
| |
| if (lws_add_http_header_by_token(wsi, WSI_TOKEN_HTTP_ACCEPT, |
| (unsigned char *)acc, (int)strlen(acc), p, end)) |
| return -1; |
| |
| #if defined(LWS_WITH_HTTP_BASIC_AUTH) |
| { |
| char b[128]; |
| |
| /* you only need this if you need to do Basic Auth */ |
| |
| if (!ba_user || !ba_password) |
| break; |
| |
| if (lws_http_basic_auth_gen(ba_user, ba_password, b, sizeof(b))) |
| break; |
| if (lws_add_http_header_by_token(wsi, WSI_TOKEN_HTTP_AUTHORIZATION, |
| (unsigned char *)b, (int)strlen(b), p, end)) |
| return -1; |
| } |
| #endif |
| |
| break; |
| } |
| |
| /* chunks of chunked content, with header removed */ |
| case LWS_CALLBACK_RECEIVE_CLIENT_HTTP_READ: |
| lwsl_user("RECEIVE_CLIENT_HTTP_READ: read %d\n", (int)len); |
| #if defined(LWS_WITH_HTTP2) |
| if (long_poll) { |
| char dotstar[128]; |
| lws_strnncpy(dotstar, (const char *)in, len, |
| sizeof(dotstar)); |
| lwsl_notice("long poll rx: %d '%s'\n", (int)len, |
| dotstar); |
| } |
| #endif |
| #if 0 |
| lwsl_hexdump_notice(in, len); |
| #endif |
| |
| return 0; /* don't passthru */ |
| |
| /* uninterpreted http content */ |
| case LWS_CALLBACK_RECEIVE_CLIENT_HTTP: |
| { |
| char buffer[1024 + LWS_PRE]; |
| char *px = buffer + LWS_PRE; |
| int lenx = sizeof(buffer) - LWS_PRE; |
| |
| if (lws_fi_user_wsi_fi(wsi, "user_reject_at_rx")) |
| return -1; |
| |
| if (lws_http_client_read(wsi, &px, &lenx) < 0) |
| return -1; |
| } |
| return 0; /* don't passthru */ |
| |
| case LWS_CALLBACK_COMPLETED_CLIENT_HTTP: |
| lwsl_user("LWS_CALLBACK_COMPLETED_CLIENT_HTTP\n"); |
| interrupted = 1; |
| bad = 0; // we accept 403 or whatever for this test status != 200; |
| lws_cancel_service(lws_get_context(wsi)); /* abort poll wait */ |
| break; |
| |
| case LWS_CALLBACK_CLOSED_CLIENT_HTTP: |
| lwsl_notice("%s: LWS_CALLBACK_CLOSED_CLIENT_HTTP\n", __func__); |
| interrupted = 1; |
| bad = 0; // status != 200; |
| lws_cancel_service(lws_get_context(wsi)); /* abort poll wait */ |
| #if defined(LWS_WITH_CONMON) |
| if (conmon) |
| dump_conmon_data(wsi); |
| #endif |
| break; |
| |
| default: |
| break; |
| } |
| |
| return lws_callback_http_dummy(wsi, reason, user, in, len); |
| } |
| |
| static const struct lws_protocols protocols[] = { |
| { |
| "http", |
| callback_http, |
| 0, 0, 0, NULL, 0 |
| }, |
| LWS_PROTOCOL_LIST_TERM |
| }; |
| |
| static void |
| sigint_handler(int sig) |
| { |
| interrupted = 1; |
| } |
| |
| static int |
| system_notify_cb(lws_state_manager_t *mgr, lws_state_notify_link_t *link, |
| int current, int target) |
| { |
| struct lws_context *cx = mgr->parent; |
| |
| if (current != LWS_SYSTATE_OPERATIONAL || |
| target != LWS_SYSTATE_OPERATIONAL) |
| return 0; |
| |
| lwsl_info("%s: operational\n", __func__); |
| |
| try_connect(cx); |
| |
| return 0; |
| } |
| |
| static int |
| jit_trust_query(struct lws_context *cx, const uint8_t *skid, |
| size_t skid_len, void *got_opaque) |
| { |
| const uint8_t *der = NULL; |
| size_t der_len = 0; |
| |
| lwsl_info("%s\n", __func__); |
| lwsl_hexdump_info(skid, skid_len); |
| |
| /* |
| * For this example, we look up SKIDs using a trust table that's |
| * compiled in, synchronously. Lws provides the necessary helper. |
| * |
| * DER will remain NULL if no match. |
| */ |
| |
| lws_tls_jit_trust_blob_queury_skid(jit_trust_blob, |
| sizeof(jit_trust_blob), skid, |
| skid_len, &der, &der_len); |
| |
| if (der) |
| lwsl_info("%s: found len %d\n", __func__, (int)der_len); |
| else |
| lwsl_info("%s: not trusted\n", __func__); |
| |
| /* Once we have a result, pass it to the completion helper */ |
| |
| return lws_tls_jit_trust_got_cert_cb(cx, got_opaque, skid, skid_len, |
| der, der_len); |
| } |
| |
| static lws_system_ops_t system_ops = { |
| .jit_trust_query = jit_trust_query |
| }; |
| |
| int main(int argc, const char **argv) |
| { |
| lws_state_notify_link_t notifier = { { NULL, NULL, NULL }, |
| system_notify_cb, "app" }; |
| lws_state_notify_link_t *na[] = { ¬ifier, NULL }; |
| struct lws_context_creation_info info; |
| struct lws_context *context; |
| int n = 0, expected = 0; |
| struct args args; |
| const char *p; |
| |
| args.argc = argc; |
| args.argv = argv; |
| |
| signal(SIGINT, sigint_handler); |
| |
| memset(&info, 0, sizeof info); /* otherwise uninitialized garbage */ |
| lws_cmdline_option_handle_builtin(argc, argv, &info); |
| |
| lwsl_user("LWS minimal http client JIT Trust [-d<verbosity>] [-l] [--h1]\n"); |
| |
| info.options = LWS_SERVER_OPTION_DO_SSL_GLOBAL_INIT | |
| /* we start off not trusting anything */ |
| LWS_SERVER_OPTION_DISABLE_OS_CA_CERTS | |
| LWS_SERVER_OPTION_H2_JUST_FIX_WINDOW_UPDATE_OVERFLOW; |
| info.port = CONTEXT_PORT_NO_LISTEN; /* we do not run any server */ |
| info.protocols = protocols; |
| info.user = &args; |
| info.register_notifier_list = na; |
| info.connect_timeout_secs = 30; |
| info.system_ops = &system_ops; |
| info.fd_limit_per_thread = 1 + 6 + 1; |
| info.max_http_header_data = 8192; |
| |
| context = lws_create_context(&info); |
| if (!context) { |
| lwsl_err("lws init failed\n"); |
| bad = 5; |
| goto bail; |
| } |
| |
| while (n >= 0 && !interrupted) |
| n = lws_service(context, 0); |
| |
| lwsl_err("%s: destroying context, interrupted = %d\n", __func__, |
| interrupted); |
| |
| lws_context_destroy(context); |
| |
| bail: |
| if ((p = lws_cmdline_option(argc, argv, "--expected-exit"))) |
| expected = atoi(p); |
| |
| if (bad == expected) { |
| lwsl_user("Completed: OK (seen expected %d)\n", expected); |
| return 0; |
| } |
| |
| lwsl_err("Completed: failed: exit %d, expected %d\n", bad, expected); |
| |
| return 1; |
| } |