Asterisk - The Open Source Telephony Project GIT-master-c7a8271
All Data Structures Namespaces Files Functions Variables Typedefs Enumerations Enumerator Properties Macros Modules Pages
res_http_websocket.c
Go to the documentation of this file.
1/*
2 * Asterisk -- An open source telephony toolkit.
3 *
4 * Copyright (C) 2012, Digium, Inc.
5 *
6 * Joshua Colp <jcolp@digium.com>
7 *
8 * See http://www.asterisk.org for more information about
9 * the Asterisk project. Please do not directly contact
10 * any of the maintainers of this project for assistance;
11 * the project provides a web site, mailing lists and IRC
12 * channels for your use.
13 *
14 * This program is free software, distributed under the terms of
15 * the GNU General Public License Version 2. See the LICENSE file
16 * at the top of the source tree.
17 */
18
19/*! \file
20 *
21 * \brief WebSocket support for the Asterisk internal HTTP server
22 *
23 * \author Joshua Colp <jcolp@digium.com>
24 */
25
26/*** MODULEINFO
27 <support_level>core</support_level>
28 ***/
29
30#include "asterisk.h"
31
32#include "asterisk/module.h"
33#include "asterisk/http.h"
34#include "asterisk/astobj2.h"
35#include "asterisk/strings.h"
36#include "asterisk/file.h"
37#include "asterisk/unaligned.h"
38#include "asterisk/uri.h"
39#include "asterisk/uuid.h"
40
41#define AST_API_MODULE
43
44/*! \brief GUID used to compute the accept key, defined in the specifications */
45#define WEBSOCKET_GUID "258EAFA5-E914-47DA-95CA-C5AB0DC85B11"
46
47/*! \brief Length of a websocket's client key */
48#define CLIENT_KEY_SIZE 16
49
50/*! \brief Number of buckets for registered protocols */
51#define MAX_PROTOCOL_BUCKETS 7
52
53#ifdef LOW_MEMORY
54/*! \brief Size of the pre-determined buffer for WebSocket frames */
55#define MAXIMUM_FRAME_SIZE 8192
56
57/*! \brief Default reconstruction size for multi-frame payload reconstruction. If exceeded the next frame will start a
58 * payload.
59 */
60#define DEFAULT_RECONSTRUCTION_CEILING 8192
61
62/*! \brief Maximum reconstruction size for multi-frame payload reconstruction. */
63#define MAXIMUM_RECONSTRUCTION_CEILING 8192
64#else
65/*! \brief Size of the pre-determined buffer for WebSocket frames */
66#define MAXIMUM_FRAME_SIZE 65535
67
68/*! \brief Default reconstruction size for multi-frame payload reconstruction. If exceeded the next frame will start a
69 * payload.
70 */
71#define DEFAULT_RECONSTRUCTION_CEILING MAXIMUM_FRAME_SIZE
72
73/*! \brief Maximum reconstruction size for multi-frame payload reconstruction. */
74#define MAXIMUM_RECONSTRUCTION_CEILING MAXIMUM_FRAME_SIZE
75#endif
76
77/*! \brief Maximum size of a websocket frame header
78 * 1 byte flags and opcode
79 * 1 byte mask flag + payload len
80 * 8 bytes max extended length
81 * 4 bytes optional masking key
82 * ... payload follows ...
83 * */
84#define MAX_WS_HDR_SZ 14
85#define MIN_WS_HDR_SZ 2
86
87/*! \brief Structure definition for session */
89 struct ast_iostream *stream; /*!< iostream of the connection */
90 struct ast_sockaddr remote_address; /*!< Address of the remote client */
91 struct ast_sockaddr local_address; /*!< Our local address */
92 enum ast_websocket_opcode opcode; /*!< Cached opcode for multi-frame messages */
93 size_t payload_len; /*!< Length of the payload */
94 char *payload; /*!< Pointer to the payload */
95 size_t reconstruct; /*!< Number of bytes before a reconstructed payload will be returned and a new one started */
96 int timeout; /*!< The timeout for operations on the socket */
97 unsigned int secure:1; /*!< Bit to indicate that the transport is secure */
98 unsigned int closing:1; /*!< Bit to indicate that the session is in the process of being closed */
99 unsigned int close_sent:1; /*!< Bit to indicate that the session close opcode has been sent and no further data will be sent */
100 struct websocket_client *client; /*!< Client object when connected as a client websocket */
101 char session_id[AST_UUID_STR_LEN]; /*!< The identifier for the websocket session */
102 uint16_t close_status_code; /*!< Status code sent in a CLOSE frame upon shutdown */
103 char buf[MAXIMUM_FRAME_SIZE]; /*!< Fixed buffer for reading data into */
104};
105
107{
108 switch (type) {
110 return "persistent";
112 return "per_call";
114 return "per_call_config";
116 return "client";
118 return "inbound";
120 return "server";
121 case AST_WS_TYPE_ANY:
122 return "any";
123 default:
124 return "unknown";
125 }
126}
127
128/*! \brief Hashing function for protocols */
129static int protocol_hash_fn(const void *obj, const int flags)
130{
131 const struct ast_websocket_protocol *protocol = obj;
132 const char *name = obj;
133
134 return ast_str_case_hash(flags & OBJ_KEY ? name : protocol->name);
135}
136
137/*! \brief Comparison function for protocols */
138static int protocol_cmp_fn(void *obj, void *arg, int flags)
139{
140 const struct ast_websocket_protocol *protocol1 = obj, *protocol2 = arg;
141 const char *protocol = arg;
142
143 return !strcasecmp(protocol1->name, flags & OBJ_KEY ? protocol : protocol2->name) ? CMP_MATCH | CMP_STOP : 0;
144}
145
146/*! \brief Destructor function for protocols */
147static void protocol_destroy_fn(void *obj)
148{
149 struct ast_websocket_protocol *protocol = obj;
150 ast_free(protocol->name);
151}
152
153/*! \brief Structure for a WebSocket server */
155 struct ao2_container *protocols; /*!< Container for registered protocols */
156};
157
158static void websocket_server_dtor(void *obj)
159{
160 struct ast_websocket_server *server = obj;
161 ao2_cleanup(server->protocols);
162 server->protocols = NULL;
163}
164
166{
167 RAII_VAR(struct ast_websocket_server *, server, NULL, ao2_cleanup);
168
169 server = ao2_alloc(sizeof(*server), websocket_server_dtor);
170 if (!server) {
171 return NULL;
172 }
173
176 if (!server->protocols) {
177 return NULL;
178 }
179
180 ao2_ref(server, +1);
181 return server;
182}
183
185{
187}
188
190{
192}
193
194/*! \brief Destructor function for sessions */
195static void session_destroy_fn(void *obj)
196{
197 struct ast_websocket *session = obj;
198
199 if (session->stream) {
200 ast_websocket_close(session, session->close_status_code);
201 if (session->stream) {
203 session->stream = NULL;
204 ast_verb(2, "WebSocket connection %s '%s' closed\n", session->client ? "to" : "from",
205 ast_sockaddr_stringify(&session->remote_address));
206 }
207 }
208
209 ao2_cleanup(session->client);
210 ast_free(session->payload);
211}
212
214{
215 struct ast_websocket_protocol *protocol;
216
217 protocol = ao2_alloc(sizeof(*protocol), protocol_destroy_fn);
218 if (!protocol) {
219 return NULL;
220 }
221
222 protocol->name = ast_strdup(name);
223 if (!protocol->name) {
224 ao2_ref(protocol, -1);
225 return NULL;
226 }
228
229 return protocol;
230}
231
233{
234 struct ast_websocket_protocol *protocol;
235
236 if (!server->protocols) {
237 return -1;
238 }
239
241 if (!protocol) {
242 return -1;
243 }
244 protocol->session_established = callback;
245
246 if (ast_websocket_server_add_protocol2(server, protocol)) {
247 ao2_ref(protocol, -1);
248 return -1;
249 }
250
251 return 0;
252}
253
255{
256 struct ast_websocket_protocol *existing;
257
258 if (!server->protocols) {
259 return -1;
260 }
261
262 if (protocol->version != AST_WEBSOCKET_PROTOCOL_VERSION) {
263 ast_log(LOG_WARNING, "WebSocket could not register sub-protocol '%s': "
264 "expected version '%u', got version '%u'\n",
265 protocol->name, AST_WEBSOCKET_PROTOCOL_VERSION, protocol->version);
266 return -1;
267 }
268
269 ao2_lock(server->protocols);
270
271 /* Ensure a second protocol handler is not registered for the same protocol */
272 existing = ao2_find(server->protocols, protocol->name, OBJ_KEY | OBJ_NOLOCK);
273 if (existing) {
274 ao2_ref(existing, -1);
275 ao2_unlock(server->protocols);
276 return -1;
277 }
278
279 ao2_link_flags(server->protocols, protocol, OBJ_NOLOCK);
280 ao2_unlock(server->protocols);
281
282 ast_verb(5, "WebSocket registered sub-protocol '%s'\n", protocol->name);
283 ao2_ref(protocol, -1);
284
285 return 0;
286}
287
289{
290 struct ast_websocket_protocol *protocol;
291
292 if (!(protocol = ao2_find(server->protocols, name, OBJ_KEY))) {
293 return -1;
294 }
295
296 if (protocol->session_established != callback) {
297 ao2_ref(protocol, -1);
298 return -1;
299 }
300
301 ao2_unlink(server->protocols, protocol);
302 ao2_ref(protocol, -1);
303
304 ast_verb(5, "WebSocket unregistered sub-protocol '%s'\n", name);
305
306 return 0;
307}
308
309/*! \brief Perform payload masking for client sessions */
310static void websocket_mask_payload(struct ast_websocket *session, char *frame, char *payload, uint64_t payload_size)
311{
312 /* RFC 6455 5.1 - clients MUST mask frame data */
313 if (session->client) {
314 uint64_t i;
315 uint8_t mask_key_idx;
316 uint32_t mask_key = ast_random();
317 uint8_t length = frame[1] & 0x7f;
318 frame[1] |= 0x80; /* set mask bit to 1 */
319 /* The mask key octet position depends on the length */
320 mask_key_idx = length == 126 ? 4 : length == 127 ? 10 : 2;
321 put_unaligned_uint32(&frame[mask_key_idx], mask_key);
322 for (i = 0; i < payload_size; i++) {
323 payload[i] ^= ((char *)&mask_key)[i % 4];
324 }
325 }
326}
327
328
329/*! \brief Close function for websocket session */
331{
333 /* The header is either 2 or 6 bytes and the
334 * reason code takes up another 2 bytes */
335 char frame[8] = { 0, };
336 int header_size, fsize, res;
337
338 if (session->close_sent) {
339 return 0;
340 }
341
342 /* clients need space for an additional 4 byte masking key */
343 header_size = session->client ? 6 : 2;
344 fsize = header_size + 2;
345
346 frame[0] = opcode | 0x80;
347 frame[1] = 2; /* The reason code is always 2 bytes */
348
349 /* If no reason has been specified assume 1000 which is normal closure */
350 put_unaligned_uint16(&frame[header_size], htons(reason ? reason : 1000));
351
352 websocket_mask_payload(session, frame, &frame[header_size], 2);
353
354 session->closing = 1;
355 session->close_sent = 1;
356
359 res = ast_iostream_write(session->stream, frame, fsize);
361
362 /* If an error occurred when trying to close this connection explicitly terminate it now.
363 * Doing so will cause the thread polling on it to wake up and terminate.
364 */
365 if (res != fsize) {
367 session->stream = NULL;
368 ast_verb(2, "WebSocket connection %s '%s' forcefully closed due to fatal write error\n",
369 session->client ? "to" : "from", ast_sockaddr_stringify(&session->remote_address));
370 }
371
373 return res == sizeof(frame);
374}
375
376static const char *opcode_map[] = {
377 [AST_WEBSOCKET_OPCODE_CONTINUATION] = "continuation",
378 [AST_WEBSOCKET_OPCODE_TEXT] = "text",
379 [AST_WEBSOCKET_OPCODE_BINARY] = "binary",
380 [AST_WEBSOCKET_OPCODE_CLOSE] = "close",
381 [AST_WEBSOCKET_OPCODE_PING] = "ping",
382 [AST_WEBSOCKET_OPCODE_PONG] = "pong",
383};
384
386{
389 return "<unknown>";
390 } else {
391 return opcode_map[opcode];
392 }
393}
394
395/*! \brief Write function for websocket traffic */
397{
398 size_t header_size = 2; /* The minimum size of a websocket frame is 2 bytes */
399 char *frame;
400 uint64_t length;
401 uint64_t frame_size;
402
403 ast_debug(3, "Writing websocket %s frame, length %" PRIu64 "\n",
404 websocket_opcode2str(opcode), payload_size);
405
406 if (payload_size < 126) {
407 length = payload_size;
408 } else if (payload_size < (1 << 16)) {
409 length = 126;
410 /* We need an additional 2 bytes to store the extended length */
411 header_size += 2;
412 } else {
413 length = 127;
414 /* We need an additional 8 bytes to store the really really extended length */
415 header_size += 8;
416 }
417
418 if (session->client) {
419 /* Additional 4 bytes for the client masking key */
420 header_size += 4;
421 }
422
423 frame_size = header_size + payload_size;
424
425 frame = ast_alloca(frame_size + 1);
426 memset(frame, 0, frame_size + 1);
427
428 frame[0] = opcode | 0x80;
429 frame[1] = length;
430
431 /* Use the additional available bytes to store the length */
432 if (length == 126) {
433 put_unaligned_uint16(&frame[2], htons(payload_size));
434 } else if (length == 127) {
435 put_unaligned_uint64(&frame[2], htonll(payload_size));
436 }
437
438 memcpy(&frame[header_size], payload, payload_size);
439
440 websocket_mask_payload(session, frame, &frame[header_size], payload_size);
441
443 if (session->closing) {
445 return -1;
446 }
447
449 if (ast_iostream_write(session->stream, frame, frame_size) != frame_size) {
451 /* 1011 - server terminating connection due to not being able to fulfill the request */
452 ast_debug(1, "Closing WS with 1011 because we can't fulfill a write request\n");
454 return -1;
455 }
456
459
460 return 0;
461}
462
464{
465 session->reconstruct = MIN(bytes, MAXIMUM_RECONSTRUCTION_CEILING);
466}
467
469{
470 session->reconstruct = 0;
471}
472
474{
475 ao2_ref(session, +1);
476}
477
479{
481}
482
484{
485 return session->closing ? -1 : ast_iostream_get_fd(session->stream);
486}
487
489{
490 return session->closing ? -1 : ast_iostream_wait_for_input(session->stream, timeout);
491}
492
494{
495 return &session->remote_address;
496}
497
499{
500 return &session->local_address;
501}
502
504{
505 return session->secure;
506}
507
509{
512 return 0;
513}
514
516{
517 session->timeout = timeout;
518
519 return 0;
520}
521
523{
524 return session->session_id;
525}
526
527
528/* MAINTENANCE WARNING on ast_websocket_read()!
529 *
530 * We have to keep in mind during this function that the fact that session->fd seems ready
531 * (via poll) does not necessarily mean we have application data ready, because in the case
532 * of an SSL socket, there is some encryption data overhead that needs to be read from the
533 * TCP socket, so poll() may say there are bytes to be read, but whether it is just 1 byte
534 * or N bytes we do not know that, and we do not know how many of those bytes (if any) are
535 * for application data (for us) and not just for the SSL protocol consumption
536 *
537 * There used to be a couple of nasty bugs here that were fixed in last refactoring but I
538 * want to document them so the constraints are clear and we do not re-introduce them:
539 *
540 * - This function would incorrectly assume that fread() would necessarily return more than
541 * 1 byte of data, just because a websocket frame is always >= 2 bytes, but the thing
542 * is we're dealing with a TCP bitstream here, we could read just one byte and that's normal.
543 * The problem before was that if just one byte was read, the function bailed out and returned
544 * an error, effectively dropping the first byte of a websocket frame header!
545 *
546 * - Another subtle bug was that it would just read up to MAX_WS_HDR_SZ (14 bytes) via fread()
547 * then assume that executing poll() would tell you if there is more to read, but since
548 * we're dealing with a buffered stream (session->f is a FILE*), poll would say there is
549 * nothing else to read (in the real tcp socket session->fd) and we would get stuck here
550 * without processing the rest of the data in session->f internal buffers until another packet
551 * came on the network to unblock us!
552 *
553 * Note during the header parsing stage we try to read in small chunks just what we need, this
554 * is buffered data anyways, no expensive syscall required most of the time ...
555 */
556static inline int ws_safe_read(struct ast_websocket *session, char *buf, size_t len, enum ast_websocket_opcode *opcode)
557{
558 ssize_t rlen;
559 int xlen = len;
560 char *rbuf = buf;
561 int sanity = 10;
562
563 ast_assert(len > 0);
564
565 if (!len) {
566 errno = EINVAL;
567 return -1;
568 }
569
571 if (!session->stream) {
573 errno = ECONNABORTED;
574 return -1;
575 }
576
577 for (;;) {
578 rlen = ast_iostream_read(session->stream, rbuf, xlen);
579 if (rlen != xlen) {
580 if (rlen == 0) {
581 ast_log(LOG_WARNING, "Web socket closed abruptly\n");
583 session->closing = 1;
585 return -1;
586 }
587
588 if (rlen < 0 && errno != EAGAIN) {
589 ast_log(LOG_ERROR, "Error reading from web socket: %s\n", strerror(errno));
591 session->closing = 1;
593 return -1;
594 }
595
596 if (!--sanity) {
597 ast_log(LOG_WARNING, "Websocket seems unresponsive, disconnecting ...\n");
599 session->closing = 1;
601 return -1;
602 }
603 }
604 if (rlen > 0) {
605 xlen = xlen - rlen;
606 rbuf = rbuf + rlen;
607 if (!xlen) {
608 break;
609 }
610 }
611 if (ast_iostream_wait_for_input(session->stream, 1000) < 0) {
612 ast_log(LOG_ERROR, "ast_iostream_wait_for_input returned err: %s\n", strerror(errno));
614 session->closing = 1;
616 return -1;
617 }
618 }
619
621 return 0;
622}
623
625{
626 int fin = 0;
627 int mask_present = 0;
628 char *mask = NULL, *new_payload = NULL;
629 size_t options_len = 0, frame_size = 0;
630
631 *payload = NULL;
632 *payload_len = 0;
633 *fragmented = 0;
634
636 return -1;
637 }
639
640 /* ok, now we have the first 2 bytes, so we know some flags, opcode and payload length (or whether payload length extension will be required) */
641 *opcode = session->buf[0] & 0xf;
642 *payload_len = session->buf[1] & 0x7f;
645 fin = (session->buf[0] >> 7) & 1;
646 mask_present = (session->buf[1] >> 7) & 1;
647
648 /* Based on the mask flag and payload length, determine how much more we need to read before start parsing the rest of the header */
649 options_len += mask_present ? 4 : 0;
650 options_len += (*payload_len == 126) ? 2 : (*payload_len == 127) ? 8 : 0;
651 if (options_len) {
652 /* read the rest of the header options */
653 if (ws_safe_read(session, &session->buf[frame_size], options_len, opcode)) {
654 return -1;
655 }
656 frame_size += options_len;
657 }
658
659 if (*payload_len == 126) {
660 /* Grab the 2-byte payload length */
661 *payload_len = ntohs(get_unaligned_uint16(&session->buf[2]));
662 mask = &session->buf[4];
663 } else if (*payload_len == 127) {
664 /* Grab the 8-byte payload length */
666 mask = &session->buf[10];
667 } else {
668 /* Just set the mask after the small 2-byte header */
669 mask = &session->buf[2];
670 }
671
672 /* Now read the rest of the payload */
673 *payload = &session->buf[frame_size]; /* payload will start here, at the end of the options, if any */
674 frame_size = frame_size + (*payload_len); /* final frame size is header + optional headers + payload data */
676 ast_log(LOG_WARNING, "Cannot fit huge websocket frame of %zu bytes\n", frame_size);
677 /* The frame won't fit :-( */
679 return -1;
680 }
681
682 if (*payload_len) {
684 return -1;
685 }
686 }
687
688 /* If a mask is present unmask the payload */
689 if (mask_present) {
690 unsigned int pos;
691 for (pos = 0; pos < *payload_len; pos++) {
692 (*payload)[pos] ^= mask[pos % 4];
693 }
694 }
695
696 /* Per the RFC for PING we need to send back an opcode with the application data as received */
700 }
701 *payload_len = 0;
702 return 0;
703 }
704
705 /* Stop PONG processing here */
707 *payload_len = 0;
708 return 0;
709 }
710
711 /* Save the CLOSE status code which will be sent in our own CLOSE in the destructor */
713 session->closing = 1;
714 if (*payload_len >= 2) {
715 session->close_status_code = ntohs(get_unaligned_uint16(*payload));
716 }
717 *payload_len = 0;
718 return 0;
719 }
720
721 /* Below this point we are handling TEXT, BINARY or CONTINUATION opcodes */
722 if (*payload_len) {
723 if (!(new_payload = ast_realloc(session->payload, (session->payload_len + *payload_len)))) {
724 ast_log(LOG_WARNING, "Failed allocation: %p, %zu, %"PRIu64"\n",
725 session->payload, session->payload_len, *payload_len);
726 *payload_len = 0;
728 return -1;
729 }
730
731 session->payload = new_payload;
732 memcpy((session->payload + session->payload_len), (*payload), (*payload_len));
733 session->payload_len += *payload_len;
734 } else if (!session->payload_len && session->payload) {
735 ast_free(session->payload);
736 session->payload = NULL;
737 }
738
739 if (!fin && session->reconstruct && (session->payload_len < session->reconstruct)) {
740 /* If this is not a final message we need to defer returning it until later */
742 session->opcode = *opcode;
743 }
745 *payload_len = 0;
746 *payload = NULL;
747 } else {
749 if (!fin) {
750 /* If this was not actually the final message tell the user it is fragmented so they can deal with it accordingly */
751 *fragmented = 1;
752 } else {
753 /* Final frame in multi-frame so push up the actual opcode */
754 *opcode = session->opcode;
755 }
756 }
757 *payload_len = session->payload_len;
758 *payload = session->payload;
759 session->payload_len = 0;
760 }
761 } else {
762 ast_log(LOG_WARNING, "WebSocket unknown opcode %u\n", *opcode);
763 /* We received an opcode that we don't understand, the RFC states that 1003 is for a type of data that can't be accepted... opcodes
764 * fit that, I think. */
766 }
767
768 return 0;
769}
770
771/*!
772 * \brief If the server has exactly one configured protocol, return it.
773 */
775 struct ast_websocket_server *server)
776{
777 SCOPED_AO2LOCK(lock, server->protocols);
778
779 if (ao2_container_count(server->protocols) != 1) {
780 return NULL;
781 }
782
783 return ao2_callback(server->protocols, OBJ_NOLOCK, NULL, NULL);
784}
785
786static char *websocket_combine_key(const char *key, char *res, int res_size)
787{
788 char *combined;
789 unsigned combined_length = strlen(key) + strlen(WEBSOCKET_GUID) + 1;
790 uint8_t sha[20];
791
792 combined = ast_alloca(combined_length);
793 snprintf(combined, combined_length, "%s%s", key, WEBSOCKET_GUID);
794 ast_sha1_hash_uint(sha, combined);
795 ast_base64encode(res, (const unsigned char*)sha, 20, res_size);
796 return res;
797}
798
800{
801 struct ast_str *http_header = ast_str_create(64);
802
803 if (!http_header) {
805 ast_http_error(ser, 500, "Server Error", "Out of memory");
806 return;
807 }
808 ast_str_set(&http_header, 0, "Sec-WebSocket-Version: 7, 8, 13\r\n");
809 ast_http_send(ser, AST_HTTP_UNKNOWN, 400, "Bad Request", http_header, NULL, 0, 0);
810}
811
812int AST_OPTIONAL_API_NAME(ast_websocket_uri_cb)(struct ast_tcptls_session_instance *ser, const struct ast_http_uri *urih, const char *uri, enum ast_http_method method, struct ast_variable *get_vars, struct ast_variable *headers)
813{
814 struct ast_variable *v;
815 const char *upgrade = NULL, *key = NULL, *key1 = NULL, *key2 = NULL, *protos = NULL;
816 char *requested_protocols = NULL, *protocol = NULL;
817 int version = 0, flags = 1;
818 struct ast_websocket_protocol *protocol_handler = NULL;
819 struct ast_websocket *session;
820 struct ast_websocket_server *server;
821
823
824 /* Upgrade requests are only permitted on GET methods */
825 if (method != AST_HTTP_GET) {
826 ast_http_error(ser, 501, "Not Implemented", "Attempt to use unimplemented / unsupported method");
827 return 0;
828 }
829
830 server = urih->data;
831
832 /* Get the minimum headers required to satisfy our needs */
833 for (v = headers; v; v = v->next) {
834 if (!strcasecmp(v->name, "Upgrade")) {
835 upgrade = v->value;
836 } else if (!strcasecmp(v->name, "Sec-WebSocket-Key")) {
837 key = v->value;
838 } else if (!strcasecmp(v->name, "Sec-WebSocket-Key1")) {
839 key1 = v->value;
840 } else if (!strcasecmp(v->name, "Sec-WebSocket-Key2")) {
841 key2 = v->value;
842 } else if (!strcasecmp(v->name, "Sec-WebSocket-Protocol")) {
843 protos = v->value;
844 } else if (!strcasecmp(v->name, "Sec-WebSocket-Version")) {
845 if (sscanf(v->value, "%30d", &version) != 1) {
846 version = 0;
847 }
848 }
849 }
850
851 /* If this is not a websocket upgrade abort */
852 if (!upgrade || strcasecmp(upgrade, "websocket")) {
853 ast_log(LOG_WARNING, "WebSocket connection from '%s' could not be accepted - did not request WebSocket\n",
855 ast_http_error(ser, 426, "Upgrade Required", NULL);
856 return 0;
857 } else if (ast_strlen_zero(protos)) {
858 /* If there's only a single protocol registered, and the
859 * client doesn't specify what protocol it's using, go ahead
860 * and accept the connection */
861 protocol_handler = one_protocol(server);
862 if (!protocol_handler) {
863 /* Multiple registered subprotocols; client must specify */
864 ast_log(LOG_WARNING, "WebSocket connection from '%s' could not be accepted - no protocols requested\n",
867 return 0;
868 }
869 } else if (key1 && key2) {
870 /* Specification defined in http://tools.ietf.org/html/draft-hixie-thewebsocketprotocol-76 and
871 * http://tools.ietf.org/html/draft-ietf-hybi-thewebsocketprotocol-00 -- not currently supported*/
872 ast_log(LOG_WARNING, "WebSocket connection from '%s' could not be accepted - unsupported version '00/76' chosen\n",
875 return 0;
876 }
877
878 if (!protocol_handler && protos) {
879 requested_protocols = ast_strdupa(protos);
880 /* Iterate through the requested protocols trying to find one that we have a handler for */
881 while (!protocol_handler && (protocol = strsep(&requested_protocols, ","))) {
882 protocol_handler = ao2_find(server->protocols, ast_strip(protocol), OBJ_KEY);
883 }
884 }
885
886 /* If no protocol handler exists bump this back to the requester */
887 if (!protocol_handler) {
888 ast_log(LOG_WARNING, "WebSocket connection from '%s' could not be accepted - no protocols out of '%s' supported\n",
891 return 0;
892 }
893
894 /* Determine how to respond depending on the version */
895 if (version == 7 || version == 8 || version == 13) {
896 char base64[64];
897
898 if (!key || strlen(key) + strlen(WEBSOCKET_GUID) + 1 > 8192) { /* no stack overflows please */
900 ao2_ref(protocol_handler, -1);
901 return 0;
902 }
903
904 if (ast_http_body_discard(ser)) {
906 ao2_ref(protocol_handler, -1);
907 return 0;
908 }
909
910 if (!(session = ao2_alloc(sizeof(*session) + AST_UUID_STR_LEN + 1, session_destroy_fn))) {
911 ast_log(LOG_WARNING, "WebSocket connection from '%s' could not be accepted\n",
914 ao2_ref(protocol_handler, -1);
915 return 0;
916 }
918
919 /* Generate the session id */
920 if (!ast_uuid_generate_str(session->session_id, sizeof(session->session_id))) {
921 ast_log(LOG_WARNING, "WebSocket connection from '%s' could not be accepted - failed to generate a session id\n",
923 ast_http_error(ser, 500, "Internal Server Error", "Allocation failed");
924 ao2_ref(protocol_handler, -1);
925 return 0;
926 }
927
928 if (protocol_handler->session_attempted
929 && protocol_handler->session_attempted(ser, get_vars, headers, session->session_id)) {
930 ast_debug(3, "WebSocket connection from '%s' rejected by protocol handler '%s'\n",
931 ast_sockaddr_stringify(&ser->remote_address), protocol_handler->name);
933 ao2_ref(protocol_handler, -1);
934 return 0;
935 }
936
937 /* RFC 6455, Section 4.1:
938 *
939 * 6. If the response includes a |Sec-WebSocket-Protocol| header
940 * field and this header field indicates the use of a
941 * subprotocol that was not present in the client's handshake
942 * (the server has indicated a subprotocol not requested by
943 * the client), the client MUST _Fail the WebSocket
944 * Connection_.
945 */
946 if (protocol) {
948 "HTTP/1.1 101 Switching Protocols\r\n"
949 "Upgrade: %s\r\n"
950 "Connection: Upgrade\r\n"
951 "Sec-WebSocket-Accept: %s\r\n"
952 "Sec-WebSocket-Protocol: %s\r\n\r\n",
953 upgrade,
954 websocket_combine_key(key, base64, sizeof(base64)),
955 protocol);
956 } else {
958 "HTTP/1.1 101 Switching Protocols\r\n"
959 "Upgrade: %s\r\n"
960 "Connection: Upgrade\r\n"
961 "Sec-WebSocket-Accept: %s\r\n\r\n",
962 upgrade,
963 websocket_combine_key(key, base64, sizeof(base64)));
964 }
965 } else {
966
967 /* Specification defined in http://tools.ietf.org/html/draft-hixie-thewebsocketprotocol-75 or completely unknown */
968 ast_log(LOG_WARNING, "WebSocket connection from '%s' could not be accepted - unsupported version '%d' chosen\n",
971 ao2_ref(protocol_handler, -1);
972 return 0;
973 }
974
975 /* Enable keepalive on all sessions so the underlying user does not have to */
976 if (setsockopt(ast_iostream_get_fd(ser->stream), SOL_SOCKET, SO_KEEPALIVE, &flags, sizeof(flags))) {
977 ast_log(LOG_WARNING, "WebSocket connection from '%s' could not be accepted - failed to enable keepalive\n",
980 ao2_ref(session, -1);
981 ao2_ref(protocol_handler, -1);
982 return 0;
983 }
984
985 /* Get our local address for the connected socket */
986 if (ast_getsockname(ast_iostream_get_fd(ser->stream), &session->local_address)) {
987 ast_log(LOG_WARNING, "WebSocket connection from '%s' could not be accepted - failed to get local address\n",
990 ao2_ref(session, -1);
991 ao2_ref(protocol_handler, -1);
992 return 0;
993 }
994
995 ast_verb(2, "WebSocket connection from '%s' for protocol '%s' accepted using version '%d'\n", ast_sockaddr_stringify(&ser->remote_address), protocol ? : "", version);
996
997 /* Populate the session with all the needed details */
998 session->stream = ser->stream;
999 ast_sockaddr_copy(&session->remote_address, &ser->remote_address);
1000 session->opcode = -1;
1002 session->secure = ast_iostream_get_ssl(ser->stream) ? 1 : 0;
1003
1004 /* Give up ownership of the socket and pass it to the protocol handler */
1006 protocol_handler->session_established(session, get_vars, headers);
1007 ao2_ref(protocol_handler, -1);
1008
1009 /*
1010 * By dropping the stream from the session the connection
1011 * won't get closed when the HTTP server cleans up because we
1012 * passed the connection to the protocol handler.
1013 */
1014 ser->stream = NULL;
1015
1016 return 0;
1017}
1018
1021 .description = "Asterisk HTTP WebSocket",
1022 .uri = "ws",
1023 .has_subtree = 0,
1024 .data = NULL,
1025 .key = __FILE__,
1026};
1027
1028/*! \brief Simple echo implementation which echoes received text and binary frames */
1029static void websocket_echo_callback(struct ast_websocket *session, struct ast_variable *parameters, struct ast_variable *headers)
1030{
1031 int res;
1032
1033 ast_debug(1, "Entering WebSocket echo loop\n");
1034
1035 if (ast_fd_set_flags(ast_websocket_fd(session), O_NONBLOCK)) {
1036 goto end;
1037 }
1038
1039 while ((res = ast_websocket_wait_for_input(session, -1)) > 0) {
1040 char *payload;
1041 uint64_t payload_len;
1042 enum ast_websocket_opcode opcode;
1043 int fragmented;
1044
1045 if (ast_websocket_read(session, &payload, &payload_len, &opcode, &fragmented)) {
1046 /* We err on the side of caution and terminate the session if any error occurs */
1047 ast_log(LOG_WARNING, "Read failure during WebSocket echo loop\n");
1048 break;
1049 }
1050
1051 if (opcode == AST_WEBSOCKET_OPCODE_TEXT || opcode == AST_WEBSOCKET_OPCODE_BINARY) {
1052 ast_websocket_write(session, opcode, payload, payload_len);
1053 } else if (opcode == AST_WEBSOCKET_OPCODE_CLOSE) {
1054 break;
1055 } else {
1056 ast_debug(1, "Ignored WebSocket opcode %u\n", opcode);
1057 }
1058 }
1059
1060end:
1061 ast_debug(1, "Exiting WebSocket echo loop\n");
1063}
1064
1066{
1067 struct ast_websocket_server *ws_server = websocketuri.data;
1068 if (!ws_server) {
1069 return -1;
1070 }
1072}
1073
1075{
1077}
1078
1080{
1081 struct ast_websocket_server *ws_server = websocketuri.data;
1082
1083 if (!ws_server) {
1084 return -1;
1085 }
1086
1087 if (ast_websocket_server_add_protocol2(ws_server, protocol)) {
1088 return -1;
1089 }
1090
1091 return 0;
1092}
1093
1095{
1096 struct ast_websocket_server *ws_server = websocketuri.data;
1097 if (!ws_server) {
1098 return -1;
1099 }
1101}
1102
1104{
1106}
1107
1108/*! \brief Parse the given uri into a path and remote address.
1109 *
1110 * Expected uri form:
1111 * \verbatim [ws[s]]://<host>[:port][/<path>] \endverbatim
1112 *
1113 * The returned host will contain the address and optional port while
1114 * path will contain everything after the address/port if included.
1115 */
1116static int websocket_client_parse_uri(const char *uri, char **host,
1117 struct ast_str **path, char **userinfo)
1118{
1119 struct ast_uri *parsed_uri = ast_uri_parse_websocket(uri);
1120
1121 if (!parsed_uri) {
1122 return -1;
1123 }
1124
1125 *host = ast_uri_make_host_with_port(parsed_uri);
1126 *userinfo = ast_strdup(ast_uri_user_info(parsed_uri));
1127
1128 if (ast_uri_path(parsed_uri) || ast_uri_query(parsed_uri)) {
1129 *path = ast_str_create(64);
1130 if (!*path) {
1131 ao2_ref(parsed_uri, -1);
1132 return -1;
1133 }
1134
1135 if (ast_uri_path(parsed_uri)) {
1136 ast_str_set(path, 0, "%s", ast_uri_path(parsed_uri));
1137 }
1138
1139 if (ast_uri_query(parsed_uri)) {
1140 ast_str_append(path, 0, "?%s", ast_uri_query(parsed_uri));
1141 }
1142 }
1143
1144 ao2_ref(parsed_uri, -1);
1145 return 0;
1146}
1147
1148static void websocket_client_args_destroy(void *obj)
1149{
1150 struct ast_tcptls_session_args *args = obj;
1151
1152 if (args->tls_cfg) {
1153 ast_free(args->tls_cfg->certfile);
1154 ast_free(args->tls_cfg->pvtfile);
1155 ast_free(args->tls_cfg->cipher);
1156 ast_free(args->tls_cfg->cafile);
1157 ast_free(args->tls_cfg->capath);
1158
1159 ast_ssl_teardown(args->tls_cfg);
1160 }
1161 ast_free(args->tls_cfg);
1162}
1163
1165 const char *host, struct ast_tls_config *tls_cfg,
1167{
1168 struct ast_sockaddr *addr;
1171
1172 if (!args) {
1174 return NULL;
1175 }
1176
1177 args->accept_fd = -1;
1178 args->tls_cfg = tls_cfg;
1179 args->name = "websocket client";
1180
1181 if (!ast_sockaddr_resolve(&addr, host, 0, 0)) {
1182 ast_log(LOG_ERROR, "Unable to resolve address %s\n",
1183 host);
1184 ao2_ref(args, -1);
1186 return NULL;
1187 }
1188 ast_sockaddr_copy(&args->remote_address, addr);
1189 ast_free(addr);
1190
1191 /* We need to save off the hostname but it may contain a port spec */
1192 snprintf(args->hostname, sizeof(args->hostname),
1193 "%.*s",
1194 (int) strcspn(host, ":"), host);
1195
1196 return args;
1197}
1198
1200{
1201 static int encoded_size = CLIENT_KEY_SIZE * 2 * sizeof(char) + 1;
1202 /* key is randomly selected 16-byte base64 encoded value */
1203 unsigned char key[CLIENT_KEY_SIZE + sizeof(long) - 1];
1204 char *encoded = ast_malloc(encoded_size);
1205 long i = 0;
1206
1207 if (!encoded) {
1208 ast_log(LOG_ERROR, "Unable to allocate client websocket key\n");
1209 return NULL;
1210 }
1211
1212 while (i < CLIENT_KEY_SIZE) {
1213 long num = ast_random();
1214 memcpy(key + i, &num, sizeof(long));
1215 i += sizeof(long);
1216 }
1217
1218 ast_base64encode(encoded, key, CLIENT_KEY_SIZE, encoded_size);
1219 return encoded;
1220}
1221
1223 /*! host portion of client uri */
1224 char *host;
1225 /*! path for logical websocket connection */
1227 /*! unique key used during server handshaking */
1228 char *key;
1229 /*! container for registered protocols */
1231 /*! the protocol accepted by the server */
1233 /*! websocket protocol version */
1235 /*! tcptls connection arguments */
1237 /*! tcptls connection instance */
1239 /*! Authentication userid:password */
1241 /*! Suppress connection log messages */
1243};
1244
1245static void websocket_client_destroy(void *obj)
1246{
1247 struct websocket_client *client = obj;
1248
1249 ao2_cleanup(client->ser);
1250 ao2_cleanup(client->args);
1251
1252 ast_free(client->accept_protocol);
1253 ast_free(client->protocols);
1254 ast_free(client->key);
1255 ast_free(client->resource_name);
1256 ast_free(client->host);
1257 ast_free(client->userinfo);
1258}
1259
1262{
1263 struct ast_websocket *ws = ao2_alloc(sizeof(*ws), session_destroy_fn);
1264
1265 if (!ws) {
1266 ast_log(LOG_ERROR, "Unable to allocate websocket\n");
1268 return NULL;
1269 }
1270
1271 if (!ast_uuid_generate_str(ws->session_id, sizeof(ws->session_id))) {
1272 ast_log(LOG_ERROR, "Unable to allocate websocket session_id\n");
1273 ao2_ref(ws, -1);
1275 return NULL;
1276 }
1277
1278 if (!(ws->client = ao2_alloc(
1279 sizeof(*ws->client), websocket_client_destroy))) {
1280 ast_log(LOG_ERROR, "Unable to allocate websocket client\n");
1281 ao2_ref(ws, -1);
1283 return NULL;
1284 }
1285
1286 if (!(ws->client->key = websocket_client_create_key())) {
1287 ao2_ref(ws, -1);
1289 return NULL;
1290 }
1291
1293 options->uri, &ws->client->host, &ws->client->resource_name,
1294 &ws->client->userinfo)) {
1295 ao2_ref(ws, -1);
1297 return NULL;
1298 }
1299
1301 && !ast_strlen_zero(options->username)
1302 && !ast_strlen_zero(options->password)) {
1303 ast_asprintf(&ws->client->userinfo, "%s:%s", options->username,
1304 options->password);
1305 }
1306
1308 ws->client->host, options->tls_cfg, result))) {
1309 ao2_ref(ws, -1);
1310 return NULL;
1311 }
1312
1313 ws->client->suppress_connection_msgs = options->suppress_connection_msgs;
1314 ws->client->args->suppress_connection_msgs = options->suppress_connection_msgs;
1315 ws->client->protocols = ast_strdup(options->protocols);
1316 ws->client->version = 13;
1317 ws->opcode = -1;
1319 ws->timeout = options->timeout;
1320
1321 return ws;
1322}
1323
1326{
1327 return ws->client->accept_protocol;
1328}
1329
1331 struct websocket_client *client, int response_code)
1332{
1333 if (response_code <= 0) {
1334 return WS_INVALID_RESPONSE;
1335 }
1336
1337 switch (response_code) {
1338 case 101:
1339 return 0;
1340 case 400:
1342 ast_log(LOG_ERROR, "Received response 400 - Bad Request "
1343 "- from %s\n", client->host);
1344 }
1345 return WS_BAD_REQUEST;
1346 case 401:
1348 ast_log(LOG_ERROR, "Received response 401 - Unauthorized "
1349 "- from %s\n", client->host);
1350 }
1351 return WS_UNAUTHORIZED;
1352 case 404:
1354 ast_log(LOG_ERROR, "Received response 404 - Request URL not "
1355 "found - from %s\n", client->host);
1356 }
1357 return WS_URL_NOT_FOUND;
1358 }
1359
1361 ast_log(LOG_ERROR, "Invalid HTTP response code %d from %s\n",
1362 response_code, client->host);
1363 }
1364 return WS_INVALID_RESPONSE;
1365}
1366
1368 struct websocket_client *client)
1369{
1370 enum ast_websocket_result res;
1371 char buf[4096];
1372 char base64[64];
1373 int has_upgrade = 0;
1374 int has_connection = 0;
1375 int has_accept = 0;
1376 int has_protocol = 0;
1377
1378 while (ast_iostream_gets(client->ser->stream, buf, sizeof(buf)) <= 0) {
1379 if (errno == EINTR || errno == EAGAIN) {
1380 continue;
1381 }
1382
1383 ast_log(LOG_ERROR, "Unable to retrieve HTTP status line.");
1384 return WS_BAD_STATUS;
1385 }
1386
1389 buf, "HTTP/1.1", 101))) != WS_OK) {
1390 return res;
1391 }
1392
1393 /* Ignoring line folding - assuming header field values are contained
1394 within a single line */
1395 while (1) {
1396 ssize_t len = ast_iostream_gets(client->ser->stream, buf, sizeof(buf));
1397 char *name, *value;
1398 int parsed;
1399
1400 if (len <= 0) {
1401 if (errno == EINTR || errno == EAGAIN) {
1402 continue;
1403 }
1404 break;
1405 }
1406
1407 parsed = ast_http_header_parse(buf, &name, &value);
1408 if (parsed < 0) {
1409 break;
1410 }
1411
1412 if (parsed > 0) {
1413 continue;
1414 }
1415
1416 if (!has_upgrade &&
1417 (has_upgrade = ast_http_header_match(
1418 name, "upgrade", value, "websocket")) < 0) {
1419 return WS_HEADER_MISMATCH;
1420 } else if (!has_connection &&
1421 (has_connection = ast_http_header_match(
1422 name, "connection", value, "upgrade")) < 0) {
1423 return WS_HEADER_MISMATCH;
1424 } else if (!has_accept &&
1425 (has_accept = ast_http_header_match(
1426 name, "sec-websocket-accept", value,
1428 client->key, base64, sizeof(base64)))) < 0) {
1429 return WS_HEADER_MISMATCH;
1430 } else if (!has_protocol &&
1431 (has_protocol = ast_http_header_match_in(
1432 name, "sec-websocket-protocol", value, client->protocols))) {
1433 if (has_protocol < 0) {
1434 return WS_HEADER_MISMATCH;
1435 }
1437 } else if (!strcasecmp(name, "sec-websocket-extensions")) {
1438 ast_log(LOG_ERROR, "Extensions received, but not "
1439 "supported by client\n");
1440 return WS_NOT_SUPPORTED;
1441 }
1442 }
1443
1444 return has_upgrade && has_connection && has_accept ?
1446}
1447
1448#define optional_header_spec "%s%s%s"
1449#define print_optional_header(test, name, value) \
1450 test ? name : "", \
1451 test ? value : "", \
1452 test ? "\r\n" : ""
1453
1455 struct websocket_client *client)
1456{
1457 size_t protocols_len = 0;
1458 struct ast_variable *auth_header = NULL;
1459 size_t res;
1460
1461 if (!ast_strlen_zero(client->userinfo)) {
1462 auth_header = ast_http_create_basic_auth_header(client->userinfo, NULL);
1463 if (!auth_header) {
1464 ast_log(LOG_ERROR, "Unable to allocate client websocket userinfo\n");
1465 return WS_ALLOCATE_ERROR;
1466 }
1467 }
1468
1469 protocols_len = client->protocols ? strlen(client->protocols) : 0;
1470
1471 res = ast_iostream_printf(client->ser->stream,
1472 "GET /%s HTTP/1.1\r\n"
1473 "Sec-WebSocket-Version: %d\r\n"
1474 "Upgrade: websocket\r\n"
1475 "Connection: Upgrade\r\n"
1476 "Host: %s\r\n"
1479 "Sec-WebSocket-Key: %s\r\n"
1480 "\r\n",
1481 client->resource_name ? ast_str_buffer(client->resource_name) : "",
1482 client->version,
1483 client->host,
1484 print_optional_header(auth_header, "Authorization: ", auth_header->value),
1485 print_optional_header(protocols_len, "Sec-WebSocket-Protocol: ", client->protocols),
1486 client->key
1487 );
1488
1489 ast_variables_destroy(auth_header);
1490 if (res < 0) {
1491 ast_log(LOG_ERROR, "Failed to send handshake.\n");
1492 return WS_WRITE_ERROR;
1493 }
1494 /* wait for a response before doing anything else */
1496}
1497
1499{
1500 enum ast_websocket_result res;
1501 /* create and connect the client - note client_start
1502 releases the session instance on failure */
1504 ast_tcptls_client_create(ws->client->args), timeout))) {
1505 return WS_CLIENT_START_ERROR;
1506 }
1507
1508 if ((res = websocket_client_handshake(ws->client)) != WS_OK) {
1509 ao2_ref(ws->client->ser, -1);
1510 ws->client->ser = NULL;
1511 return res;
1512 }
1513
1514 ws->stream = ws->client->ser->stream;
1515 ws->secure = ast_iostream_get_ssl(ws->stream) ? 1 : 0;
1516 ws->client->ser->stream = NULL;
1518 return WS_OK;
1519}
1520
1522 (const char *uri, const char *protocols, struct ast_tls_config *tls_cfg,
1524{
1526 .uri = uri,
1527 .protocols = protocols,
1528 .timeout = -1,
1529 .tls_cfg = tls_cfg,
1530 };
1531
1533}
1534
1537{
1539
1540 if (!ws) {
1541 return NULL;
1542 }
1543
1544 if ((*result = websocket_client_connect(ws, options->timeout)) != WS_OK) {
1545 ao2_ref(ws, -1);
1546 return NULL;
1547 }
1548
1549 return ws;
1550}
1551
1553 (struct ast_websocket *ws, char **buf)
1554{
1555 char *payload;
1556 uint64_t payload_len;
1558 int fragmented = 1;
1559
1560 while (fragmented) {
1562 &opcode, &fragmented)) {
1563 ast_log(LOG_ERROR, "Client WebSocket string read - "
1564 "error reading string data\n");
1565 return -1;
1566 }
1567
1569 /* Try read again, we have sent pong already */
1570 fragmented = 1;
1571 continue;
1572 }
1573
1575 continue;
1576 }
1577
1579 return -1;
1580 }
1581
1583 ast_log(LOG_ERROR, "Client WebSocket string read - "
1584 "non string data received\n");
1585 return -1;
1586 }
1587 }
1588
1589 if (!(*buf = ast_strndup(payload, payload_len))) {
1590 return -1;
1591 }
1592
1593 return payload_len + 1;
1594}
1595
1597 (struct ast_websocket *ws, const char *buf)
1598{
1599 uint64_t len = strlen(buf);
1600
1601 ast_debug(3, "Writing websocket string of length %" PRIu64 "\n", len);
1602
1603 /* We do not pass strlen(buf) to ast_websocket_write() directly because the
1604 * size_t returned by strlen() may not require the same storage size
1605 * as the uint64_t that ast_websocket_write() uses. This normally
1606 * would not cause a problem, but since ast_websocket_write() uses
1607 * the optional API, this function call goes through a series of macros
1608 * that may cause a 32-bit to 64-bit conversion to go awry.
1609 */
1611 (char *)buf, len);
1612}
1613
1615 [WS_OK] = "OK",
1616 [WS_ALLOCATE_ERROR] = "Allocation error",
1617 [WS_KEY_ERROR] = "Key error",
1618 [WS_URI_PARSE_ERROR] = "URI parse error",
1619 [WS_URI_RESOLVE_ERROR] = "URI resolve error",
1620 [WS_BAD_STATUS] = "Bad status line",
1621 [WS_INVALID_RESPONSE] = "Invalid response code",
1622 [WS_BAD_REQUEST] = "Bad request",
1623 [WS_URL_NOT_FOUND] = "URL not found",
1624 [WS_HEADER_MISMATCH] = "Header mismatch",
1625 [WS_HEADER_MISSING] = "Header missing",
1626 [WS_NOT_SUPPORTED] = "Not supported",
1627 [WS_WRITE_ERROR] = "Write error",
1628 [WS_CLIENT_START_ERROR] = "Client start error",
1629 [WS_UNAUTHORIZED] = "Unauthorized"
1630};
1631
1634{
1636 return "unknown";
1637 }
1639}
1640
1641static int load_module(void)
1642{
1644 if (!websocketuri.data) {
1646 }
1649
1650 return 0;
1651}
1652
1653static int unload_module(void)
1654{
1659
1660 return 0;
1661}
1662
1664 .support_level = AST_MODULE_SUPPORT_CORE,
1665 .load = load_module,
1666 .unload = unload_module,
1667 .load_pri = AST_MODPRI_CHANNEL_DEPEND,
1668 .requires = "http",
ast_mutex_t lock
Definition: app_sla.c:337
uint64_t ntohll(uint64_t net64)
Definition: strcompat.c:364
char * strsep(char **str, const char *delims)
uint64_t htonll(uint64_t host64)
Definition: strcompat.c:390
Asterisk main include file. File version handling, generic pbx functions.
static struct ast_mansession session
#define ast_alloca(size)
call __builtin_alloca to ensure we get gcc builtin semantics
Definition: astmm.h:288
#define ast_free(a)
Definition: astmm.h:180
#define ast_strndup(str, len)
A wrapper for strndup()
Definition: astmm.h:256
#define ast_realloc(p, len)
A wrapper for realloc()
Definition: astmm.h:226
#define ast_strdup(str)
A wrapper for strdup()
Definition: astmm.h:241
#define ast_strdupa(s)
duplicate a string in memory from the stack
Definition: astmm.h:298
#define ast_asprintf(ret, fmt,...)
A wrapper for asprintf()
Definition: astmm.h:267
#define ast_malloc(len)
A wrapper for malloc()
Definition: astmm.h:191
#define ast_log
Definition: astobj2.c:42
@ CMP_MATCH
Definition: astobj2.h:1027
@ CMP_STOP
Definition: astobj2.h:1028
#define OBJ_KEY
Definition: astobj2.h:1151
@ AO2_ALLOC_OPT_LOCK_MUTEX
Definition: astobj2.h:363
#define ao2_callback(c, flags, cb_fn, arg)
ao2_callback() is a generic function that applies cb_fn() to all objects in a container,...
Definition: astobj2.h:1693
int ao2_container_count(struct ao2_container *c)
Returns the number of elements in a container.
#define ao2_cleanup(obj)
Definition: astobj2.h:1934
#define ao2_unlink(container, obj)
Remove an object from a container.
Definition: astobj2.h:1578
#define ao2_link_flags(container, obj, flags)
Add an object to a container.
Definition: astobj2.h:1554
#define ao2_find(container, arg, flags)
Definition: astobj2.h:1736
#define ao2_unlock(a)
Definition: astobj2.h:729
#define ao2_lock(a)
Definition: astobj2.h:717
#define ao2_ref(o, delta)
Reference/unreference an object and return the old refcount.
Definition: astobj2.h:459
@ OBJ_NOLOCK
Assume that the ao2_container is already locked.
Definition: astobj2.h:1063
#define ao2_alloc(data_size, destructor_fn)
Definition: astobj2.h:409
#define ao2_container_alloc_hash(ao2_options, container_options, n_buckets, hash_fn, sort_fn, cmp_fn)
Allocate and initialize a hash container with the desired number of buckets.
Definition: astobj2.h:1303
static PGresult * result
Definition: cel_pgsql.c:84
static const char type[]
Definition: chan_ooh323.c:109
static char version[AST_MAX_EXTENSION]
Definition: chan_ooh323.c:391
static struct ast_channel * callback(struct ast_channelstorage_instance *driver, ao2_callback_data_fn *cb_fn, void *arg, void *data, int ao2_flags)
char * end
Definition: eagi_proxy.c:73
char buf[BUFSIZE]
Definition: eagi_proxy.c:66
Generic File Format Support. Should be included by clients of the file handling routines....
static int frame_size[4]
Definition: format_g726.c:52
static const char name[]
Definition: format_mp3.c:68
static int len(struct ast_channel *chan, const char *cmd, char *data, char *buf, size_t buflen)
Support for Private Asterisk HTTP Servers.
void ast_http_send(struct ast_tcptls_session_instance *ser, enum ast_http_method method, int status_code, const char *status_title, struct ast_str *http_header, struct ast_str *out, int fd, unsigned int static_content)
Generic function for sending HTTP/1.1 response.
Definition: http.c:472
ast_http_method
HTTP Request methods known by Asterisk.
Definition: http.h:58
@ AST_HTTP_GET
Definition: http.h:60
@ AST_HTTP_UNKNOWN
Definition: http.h:59
int ast_http_header_parse(char *buf, char **name, char **value)
Parse a header into the given name/value strings.
Definition: http.c:1764
int ast_http_header_match_in(const char *name, const char *expected_name, const char *value, const char *expected_value)
Check if the header name matches the expected header name. If so, then check to see if the value can ...
Definition: http.c:1802
void ast_http_uri_unlink(struct ast_http_uri *urihandler)
Unregister a URI handler.
Definition: http.c:721
int ast_http_body_discard(struct ast_tcptls_session_instance *ser)
Read and discard any unread HTTP request body.
Definition: http.c:1135
struct ast_variable * ast_http_create_basic_auth_header(const char *userid, const char *password)
Create an HTTP authorization header.
Definition: http.c:1668
int ast_http_header_match(const char *name, const char *expected_name, const char *value, const char *expected_value)
Check if the header and value match (case insensitive) their associated expected values.
Definition: http.c:1786
int ast_http_response_status_line(const char *buf, const char *version, int code)
Parse the http response status line.
Definition: http.c:1712
void ast_http_request_close_on_completion(struct ast_tcptls_session_instance *ser)
Request the HTTP connection be closed after this HTTP request.
Definition: http.c:853
void ast_http_error(struct ast_tcptls_session_instance *ser, int status, const char *title, const char *text)
Send HTTP error message and close socket.
Definition: http.c:664
int ast_http_uri_link(struct ast_http_uri *urihandler)
Register a URI handler.
Definition: http.c:689
Support for WebSocket connections within the Asterisk HTTP server and client WebSocket connections to...
#define AST_WEBSOCKET_PROTOCOL_VERSION
Protocol version. This prevents dynamically loadable modules from registering if this struct is chang...
ast_websocket_result
Result code for a websocket client.
@ WS_BAD_REQUEST
@ WS_URL_NOT_FOUND
@ WS_CLIENT_START_ERROR
@ WS_KEY_ERROR
@ WS_NOT_SUPPORTED
@ WS_ALLOCATE_ERROR
@ WS_HEADER_MISMATCH
@ WS_WRITE_ERROR
@ WS_UNAUTHORIZED
@ WS_URI_RESOLVE_ERROR
@ WS_OK
@ WS_INVALID_RESPONSE
@ WS_BAD_STATUS
@ WS_URI_PARSE_ERROR
@ WS_HEADER_MISSING
#define AST_DEFAULT_WEBSOCKET_WRITE_TIMEOUT
Default websocket write timeout, in ms.
ast_websocket_opcode
WebSocket operation codes.
@ AST_WEBSOCKET_OPCODE_PING
@ AST_WEBSOCKET_OPCODE_PONG
@ AST_WEBSOCKET_OPCODE_CONTINUATION
@ AST_WEBSOCKET_OPCODE_BINARY
@ AST_WEBSOCKET_OPCODE_CLOSE
@ AST_WEBSOCKET_OPCODE_TEXT
ast_websocket_type
WebSocket connection/configuration types.
@ AST_WS_TYPE_ANY
@ AST_WS_TYPE_CLIENT
@ AST_WS_TYPE_INBOUND
@ AST_WS_TYPE_CLIENT_PER_CALL_CONFIG
@ AST_WS_TYPE_SERVER
@ AST_WS_TYPE_CLIENT_PERSISTENT
@ AST_WS_TYPE_CLIENT_PER_CALL
void(* ast_websocket_callback)(struct ast_websocket *session, struct ast_variable *parameters, struct ast_variable *headers)
Callback for when a new connection for a sub-protocol is established.
void ast_variables_destroy(struct ast_variable *var)
Free variable list.
Definition: extconf.c:1262
#define ast_debug(level,...)
Log a DEBUG message.
#define LOG_ERROR
#define ast_verb(level,...)
#define LOG_WARNING
ssize_t ast_iostream_printf(struct ast_iostream *stream, const char *format,...)
Write a formatted string to an iostream.
Definition: iostream.c:502
ssize_t ast_iostream_gets(struct ast_iostream *stream, char *buffer, size_t size)
Read a LF-terminated string from an iostream.
Definition: iostream.c:311
void ast_iostream_set_timeout_inactivity(struct ast_iostream *stream, int timeout)
Set the iostream inactivity timeout timer.
Definition: iostream.c:122
SSL * ast_iostream_get_ssl(struct ast_iostream *stream)
Get a pointer to an iostream's OpenSSL SSL structure.
Definition: iostream.c:109
ssize_t ast_iostream_write(struct ast_iostream *stream, const void *buffer, size_t count)
Write data to an iostream.
Definition: iostream.c:385
int ast_iostream_get_fd(struct ast_iostream *stream)
Get an iostream's file descriptor.
Definition: iostream.c:85
void ast_iostream_set_exclusive_input(struct ast_iostream *stream, int exclusive_input)
Set the iostream if it can exclusively depend upon the set timeouts.
Definition: iostream.c:149
ssize_t ast_iostream_read(struct ast_iostream *stream, void *buffer, size_t count)
Read data from an iostream.
Definition: iostream.c:284
void ast_iostream_set_timeout_sequence(struct ast_iostream *stream, struct timeval start, int timeout)
Set the iostream I/O sequence timeout timer.
Definition: iostream.c:140
void ast_iostream_nonblock(struct ast_iostream *stream)
Make an iostream non-blocking.
Definition: iostream.c:104
int ast_iostream_close(struct ast_iostream *stream)
Close an iostream.
Definition: iostream.c:539
void ast_iostream_set_timeout_disable(struct ast_iostream *stream)
Disable the iostream timeout timer.
Definition: iostream.c:114
int ast_iostream_wait_for_input(struct ast_iostream *stream, int timeout)
Wait for input on the iostream's file descriptor.
Definition: iostream.c:90
#define SCOPED_AO2LOCK(varname, obj)
scoped lock specialization for ao2 mutexes.
Definition: lock.h:611
int errno
Asterisk module definitions.
#define SCOPED_MODULE_USE(module)
Definition: module.h:679
@ AST_MODFLAG_LOAD_ORDER
Definition: module.h:331
@ AST_MODFLAG_GLOBAL_SYMBOLS
Definition: module.h:330
#define AST_MODULE_INFO(keystr, flags_to_set, desc, fields...)
Definition: module.h:557
@ AST_MODPRI_CHANNEL_DEPEND
Definition: module.h:340
@ AST_MODULE_SUPPORT_CORE
Definition: module.h:121
#define ASTERISK_GPL_KEY
The text the key() function should return.
Definition: module.h:46
@ AST_MODULE_LOAD_DECLINE
Module has failed to load, may be in an inconsistent state.
Definition: module.h:78
int ast_getsockname(int sockfd, struct ast_sockaddr *addr)
Wrapper around getsockname(2) that uses struct ast_sockaddr.
Definition: netsock2.c:600
static char * ast_sockaddr_stringify(const struct ast_sockaddr *addr)
Wrapper around ast_sockaddr_stringify_fmt() with default format.
Definition: netsock2.h:256
static void ast_sockaddr_copy(struct ast_sockaddr *dst, const struct ast_sockaddr *src)
Copies the data from one ast_sockaddr to another.
Definition: netsock2.h:167
int ast_sockaddr_resolve(struct ast_sockaddr **addrs, const char *str, int flags, int family)
Parses a string with an IPv4 or IPv6 address and place results into an array.
Definition: netsock2.c:280
#define AST_OPTIONAL_API_NAME(name)
Expands to the name of the implementation function.
Definition: optional_api.h:228
static int websocket_client_parse_uri(const char *uri, char **host, struct ast_str **path, char **userinfo)
Parse the given uri into a path and remote address.
void AST_OPTIONAL_API_NAME() ast_websocket_ref(struct ast_websocket *session)
Increase the reference count for a WebSocket session.
#define MAXIMUM_FRAME_SIZE
Size of the pre-determined buffer for WebSocket frames.
int AST_OPTIONAL_API_NAME() ast_websocket_add_protocol(const char *name, ast_websocket_callback callback)
Add a sub-protocol handler to the default /ws server.
const char *AST_OPTIONAL_API_NAME() ast_websocket_session_id(struct ast_websocket *session)
Get the session ID for a WebSocket session.
static void websocket_client_destroy(void *obj)
static enum ast_websocket_result websocket_client_handle_response_code(struct websocket_client *client, int response_code)
static void websocket_echo_callback(struct ast_websocket *session, struct ast_variable *parameters, struct ast_variable *headers)
Simple echo implementation which echoes received text and binary frames.
int AST_OPTIONAL_API_NAME() ast_websocket_write(struct ast_websocket *session, enum ast_websocket_opcode opcode, char *payload, uint64_t payload_size)
Write function for websocket traffic.
static void websocket_bad_request(struct ast_tcptls_session_instance *ser)
static struct ast_http_uri websocketuri
int AST_OPTIONAL_API_NAME() ast_websocket_server_add_protocol2(struct ast_websocket_server *server, struct ast_websocket_protocol *protocol)
Add a sub-protocol handler to the given server.
int AST_OPTIONAL_API_NAME() ast_websocket_write_string(struct ast_websocket *ws, const char *buf)
Construct and transmit a WebSocket frame containing string data.
void AST_OPTIONAL_API_NAME() ast_websocket_reconstruct_enable(struct ast_websocket *session, size_t bytes)
Enable multi-frame reconstruction up to a certain number of bytes.
static enum ast_websocket_result websocket_client_handshake_get_response(struct websocket_client *client)
#define MIN_WS_HDR_SZ
static struct ast_websocket_protocol * one_protocol(struct ast_websocket_server *server)
If the server has exactly one configured protocol, return it.
static void websocket_client_args_destroy(void *obj)
static int ws_safe_read(struct ast_websocket *session, char *buf, size_t len, enum ast_websocket_opcode *opcode)
struct ast_sockaddr *AST_OPTIONAL_API_NAME() ast_websocket_local_address(struct ast_websocket *session)
Get the local address for a WebSocket connection session.
static enum ast_websocket_result websocket_client_connect(struct ast_websocket *ws, int timeout)
static int websocket_remove_protocol_internal(const char *name, ast_websocket_callback callback)
static struct ast_websocket * websocket_client_create(struct ast_websocket_client_options *options, enum ast_websocket_result *result)
#define optional_header_spec
#define MAX_PROTOCOL_BUCKETS
Number of buckets for registered protocols.
struct ast_websocket *AST_OPTIONAL_API_NAME() ast_websocket_client_create(const char *uri, const char *protocols, struct ast_tls_config *tls_cfg, enum ast_websocket_result *result)
Create, and connect, a websocket client.
struct ast_sockaddr *AST_OPTIONAL_API_NAME() ast_websocket_remote_address(struct ast_websocket *session)
Get the remote address for a WebSocket connected session.
static struct ast_websocket_server * websocket_server_internal_create(void)
int AST_OPTIONAL_API_NAME() ast_websocket_uri_cb(struct ast_tcptls_session_instance *ser, const struct ast_http_uri *urih, const char *uri, enum ast_http_method method, struct ast_variable *get_vars, struct ast_variable *headers)
Callback suitable for use with a ast_http_uri.
int AST_OPTIONAL_API_NAME() ast_websocket_is_secure(struct ast_websocket *session)
Get whether the WebSocket session is using a secure transport or not.
static void websocket_server_dtor(void *obj)
static enum ast_websocket_result websocket_client_handshake(struct websocket_client *client)
static void websocket_mask_payload(struct ast_websocket *session, char *frame, char *payload, uint64_t payload_size)
Perform payload masking for client sessions.
void AST_OPTIONAL_API_NAME() ast_websocket_reconstruct_disable(struct ast_websocket *session)
Disable multi-frame reconstruction.
static int protocol_cmp_fn(void *obj, void *arg, int flags)
Comparison function for protocols.
#define DEFAULT_RECONSTRUCTION_CEILING
Default reconstruction size for multi-frame payload reconstruction. If exceeded the next frame will s...
struct ast_websocket *AST_OPTIONAL_API_NAME() ast_websocket_client_create_with_options(struct ast_websocket_client_options *options, enum ast_websocket_result *result)
Create, and connect, a websocket client using given options.
static char * websocket_client_create_key(void)
int AST_OPTIONAL_API_NAME() ast_websocket_wait_for_input(struct ast_websocket *session, int timeout)
Wait for the WebSocket session to be ready to be read.
const char * ast_websocket_type_to_str(enum ast_websocket_type type)
int AST_OPTIONAL_API_NAME() ast_websocket_fd(struct ast_websocket *session)
Get the file descriptor for a WebSocket session.
static void protocol_destroy_fn(void *obj)
Destructor function for protocols.
static char * websocket_combine_key(const char *key, char *res, int res_size)
#define print_optional_header(test, name, value)
static struct ast_websocket_server * websocket_server_create_impl(void)
const char *AST_OPTIONAL_API_NAME() ast_websocket_client_accept_protocol(struct ast_websocket *ws)
Retrieve the server accepted sub-protocol on the client.
static int protocol_hash_fn(const void *obj, const int flags)
Hashing function for protocols.
int AST_OPTIONAL_API_NAME() ast_websocket_set_nonblock(struct ast_websocket *session)
Set the socket of a WebSocket session to be non-blocking.
int AST_OPTIONAL_API_NAME() ast_websocket_server_add_protocol(struct ast_websocket_server *server, const char *name, ast_websocket_callback callback)
Add a sub-protocol handler to the given server.
static int websocket_add_protocol_internal(const char *name, ast_websocket_callback callback)
#define CLIENT_KEY_SIZE
Length of a websocket's client key.
static int load_module(void)
int AST_OPTIONAL_API_NAME() ast_websocket_server_remove_protocol(struct ast_websocket_server *server, const char *name, ast_websocket_callback callback)
Remove a sub-protocol handler from the given server.
static int unload_module(void)
#define WEBSOCKET_GUID
GUID used to compute the accept key, defined in the specifications.
const char * websocket_result_string_map[]
struct ast_websocket_protocol *AST_OPTIONAL_API_NAME() ast_websocket_sub_protocol_alloc(const char *name)
Allocate a websocket sub-protocol instance.
int AST_OPTIONAL_API_NAME() ast_websocket_set_timeout(struct ast_websocket *session, int timeout)
Set the timeout on a non-blocking WebSocket session.
int AST_OPTIONAL_API_NAME() ast_websocket_read(struct ast_websocket *session, char **payload, uint64_t *payload_len, enum ast_websocket_opcode *opcode, int *fragmented)
Read a WebSocket frame and handle it.
int AST_OPTIONAL_API_NAME() ast_websocket_close(struct ast_websocket *session, uint16_t reason)
Close function for websocket session.
struct ast_websocket_server *AST_OPTIONAL_API_NAME() ast_websocket_server_create(void)
Creates a ast_websocket_server.
int AST_OPTIONAL_API_NAME() ast_websocket_remove_protocol(const char *name, ast_websocket_callback callback)
Remove a sub-protocol handler from the default /ws server.
static void session_destroy_fn(void *obj)
Destructor function for sessions.
void AST_OPTIONAL_API_NAME() ast_websocket_unref(struct ast_websocket *session)
Decrease the reference count for a WebSocket session.
static const char * websocket_opcode2str(enum ast_websocket_opcode opcode)
static const char * opcode_map[]
static struct ast_tcptls_session_args * websocket_client_args_create(const char *host, struct ast_tls_config *tls_cfg, enum ast_websocket_result *result)
int AST_OPTIONAL_API_NAME() ast_websocket_read_string(struct ast_websocket *ws, char **buf)
Read a WebSocket frame containing string data.
int AST_OPTIONAL_API_NAME() ast_websocket_add_protocol2(struct ast_websocket_protocol *protocol)
Add a sub-protocol handler to the default /ws server.
#define MAXIMUM_RECONSTRUCTION_CEILING
Maximum reconstruction size for multi-frame payload reconstruction.
const char *AST_OPTIONAL_API_NAME() ast_websocket_result_to_str(enum ast_websocket_result result)
Convert a websocket result code to a string.
const char * method
Definition: res_pjsip.c:1279
#define NULL
Definition: resample.c:96
String manipulation functions.
int ast_str_append(struct ast_str **buf, ssize_t max_len, const char *fmt,...)
Append to a thread local dynamic string.
Definition: strings.h:1139
char * ast_str_buffer(const struct ast_str *buf)
Returns the string buffer within the ast_str buf.
Definition: strings.h:761
static force_inline int attribute_pure ast_strlen_zero(const char *s)
Definition: strings.h:65
#define ast_str_create(init_len)
Create a malloc'ed dynamic length string.
Definition: strings.h:659
int ast_str_set(struct ast_str **buf, ssize_t max_len, const char *fmt,...)
Set a dynamic string using variable arguments.
Definition: strings.h:1113
static force_inline int attribute_pure ast_str_case_hash(const char *str)
Compute a hash value on a case-insensitive string.
Definition: strings.h:1303
char * ast_strip(char *s)
Strip leading/trailing whitespace from a string.
Definition: strings.h:223
Generic container type.
Definition of a URI handler.
Definition: http.h:102
ast_http_callback callback
Definition: http.h:107
const char * uri
Definition: http.h:105
void * data
Definition: http.h:116
struct ast_module * self
Definition: module.h:356
Socket address structure.
Definition: netsock2.h:97
Support for dynamic strings.
Definition: strings.h:623
arguments for the accepting thread
Definition: tcptls.h:130
struct ast_tls_config * tls_cfg
Definition: tcptls.h:135
describes a server instance
Definition: tcptls.h:151
struct ast_iostream * stream
Definition: tcptls.h:162
struct ast_sockaddr remote_address
Definition: tcptls.h:153
Stores parsed uri information.
Definition: uri.c:30
char * host
Definition: uri.c:36
char * path
Definition: uri.c:40
char uri[0]
Definition: uri.c:44
Structure for variables, used for configurations and for channel variables.
struct ast_variable * next
Options used for a websocket client.
struct ast_tls_config * tls_cfg
A websocket protocol implementation.
ast_websocket_callback session_established
Callback called when a new session is established. Mandatory.
unsigned int version
Protocol version. Should be set to /ref AST_WEBSOCKET_PROTOCOL_VERSION.
char * name
Name of the protocol.
ast_websocket_pre_callback session_attempted
Callback called when a new session is attempted. Optional.
Structure for a WebSocket server.
struct ao2_container * protocols
Structure definition for session.
char buf[MAXIMUM_FRAME_SIZE]
unsigned int close_sent
struct ast_iostream * stream
struct websocket_client * client
struct ast_sockaddr local_address
uint16_t close_status_code
struct ast_sockaddr remote_address
unsigned int closing
char session_id[AST_UUID_STR_LEN]
unsigned int secure
enum ast_websocket_opcode opcode
struct ast_tcptls_session_args * args
struct ast_tcptls_session_instance * ser
struct ast_str * resource_name
int value
Definition: syslog.c:37
void ast_ssl_teardown(struct ast_tls_config *cfg)
free resources used by an SSL server
Definition: tcptls.c:582
struct ast_tcptls_session_instance * ast_tcptls_client_create(struct ast_tcptls_session_args *desc)
Creates a client connection's ast_tcptls_session_instance.
Definition: tcptls.c:686
struct ast_tcptls_session_instance * ast_tcptls_client_start_timeout(struct ast_tcptls_session_instance *tcptls_session, int timeout)
Attempt to connect and start a tcptls session within the given timeout.
Definition: tcptls.c:652
const char * args
static struct test_options options
struct timeval ast_tvnow(void)
Returns current timeval. Meant to replace calls to gettimeofday().
Definition: time.h:159
Handle unaligned data access.
static void put_unaligned_uint16(void *p, unsigned short datum)
Definition: unaligned.h:65
static unsigned short get_unaligned_uint16(const void *p)
Definition: unaligned.h:44
static void put_unaligned_uint64(void *p, uint64_t datum)
Definition: unaligned.h:51
static void put_unaligned_uint32(void *p, unsigned int datum)
Definition: unaligned.h:58
static uint64_t get_unaligned_uint64(const void *p)
Definition: unaligned.h:32
const char * ast_uri_path(const struct ast_uri *uri)
Retrieve the uri path.
Definition: uri.c:135
struct ast_uri * ast_uri_parse_websocket(const char *uri)
Parse the given websocket uri into a structure.
Definition: uri.c:295
const char * ast_uri_query(const struct ast_uri *uri)
Retrieve the uri query parameters.
Definition: uri.c:140
const char * ast_uri_user_info(const struct ast_uri *uri)
Retrieve the uri user information.
Definition: uri.c:120
char * ast_uri_make_host_with_port(const struct ast_uri *uri)
Retrieve a string of the host and port.
Definition: uri.c:300
static char base64[64]
Definition: utils.c:80
#define RAII_VAR(vartype, varname, initval, dtor)
Declare a variable that will call a destructor function when it goes out of scope.
Definition: utils.h:941
#define ast_assert(a)
Definition: utils.h:739
#define MIN(a, b)
Definition: utils.h:231
int ast_base64encode(char *dst, const unsigned char *src, int srclen, int max)
Encode data in base64.
Definition: utils.c:406
long int ast_random(void)
Definition: utils.c:2312
#define ast_fd_set_flags(fd, flags)
Set flags on the given file descriptor.
Definition: utils.h:1039
#define ARRAY_IN_BOUNDS(v, a)
Checks to see if value is within the bounds of the given array.
Definition: utils.h:687
void ast_sha1_hash_uint(uint8_t *digest, const char *input)
Produces SHA1 hash based on input string, stored in uint8_t array.
Definition: utils.c:284
Universally unique identifier support.
#define AST_UUID_STR_LEN
Definition: uuid.h:27
char * ast_uuid_generate_str(char *buf, size_t size)
Generate a UUID string.
Definition: uuid.c:141