mirror of
https://github.com/eddyem/eddys_snippets.git
synced 2025-12-06 10:45:12 +03:00
89 lines
3.0 KiB
C
89 lines
3.0 KiB
C
/*
|
|
* This file is part of the NES_web project.
|
|
* Copyright 2020 Edward V. Emelianov <edward.emelianoff@gmail.com>.
|
|
*
|
|
* This program is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include "auth.h"
|
|
#include "websockets.h"
|
|
|
|
#include <errno.h>
|
|
#include <onion/log.h>
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
#include <usefull_macros.h>
|
|
|
|
#define BUFLEN 255
|
|
|
|
// bit-fields of `data` field (websocket_cont)
|
|
#define WS_FLAG_NOTAUTHORIZED 1
|
|
|
|
static onion_connection_status websocket_cont(void *data, onion_websocket *ws, ssize_t dlen){
|
|
FNAME();
|
|
uint32_t flags = *((uint32_t*)data);
|
|
char tmp[BUFLEN+1];
|
|
if(dlen > BUFLEN) dlen = BUFLEN;
|
|
|
|
int len = onion_websocket_read(ws, tmp, dlen);
|
|
if(len <= 0){
|
|
ONION_ERROR("Error reading data: %d: %s (%d)", errno, strerror(errno), dlen);
|
|
return OCS_NEED_MORE_DATA;
|
|
}
|
|
tmp[len] = 0;
|
|
//ONION_INFO("Read from websocket: %s (len=%d)", tmp, len);
|
|
DBG("WS: got %s", tmp);
|
|
if(flags & WS_FLAG_NOTAUTHORIZED){ // not authorized over websocket
|
|
sessinfo *session = NULL;
|
|
if(strncmp(tmp, "Akey=", 5) == 0){ // got authorized key - check it
|
|
char *key = tmp + 5;
|
|
session = getSession(key);
|
|
/* here we should make a proper check, but for now do simplest */
|
|
}
|
|
if(!session){
|
|
onion_websocket_printf(ws, AUTH_ANS_NEEDAUTH);
|
|
WARNX("Wrong websocket session ID");
|
|
return OCS_FORBIDDEN;
|
|
}
|
|
flags &= ~WS_FLAG_NOTAUTHORIZED; // clear non-authorized flag
|
|
return OCS_NEED_MORE_DATA;
|
|
}
|
|
char *eq = strchr(tmp, '=');
|
|
if(eq){
|
|
*eq++ = 0;
|
|
onion_websocket_printf(ws, "parameter: '%s', its value: '%s'", tmp, eq);
|
|
}else{
|
|
onion_websocket_printf(ws, "Echo: %s", tmp);
|
|
}
|
|
return OCS_NEED_MORE_DATA;
|
|
}
|
|
|
|
onion_connection_status websocket_run(_U_ void *data, onion_request *req, onion_response *res){
|
|
FNAME();
|
|
onion_websocket *ws = onion_websocket_new(req, res);
|
|
if (!ws){
|
|
green("PROC\n");
|
|
DBG("Processed");
|
|
return OCS_PROCESSED;
|
|
}
|
|
DBG("WS ready");
|
|
const char *host = onion_request_get_client_description(req);
|
|
const char *UA = onion_request_get_header(req, "User-Agent");
|
|
green("Got WS connection from %s (UA: %s)\n", host, UA);
|
|
uint32_t *flags = calloc(1, 4);
|
|
onion_websocket_set_userdata(ws, (void*)flags, free);
|
|
onion_websocket_set_callback(ws, websocket_cont);
|
|
return OCS_WEBSOCKET;
|
|
}
|