You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
135 lines
3.8 KiB
135 lines
3.8 KiB
7 months ago
|
/*
|
||
|
* lws-minimal-raw-proxy-fallback
|
||
|
*
|
||
|
* Written in 2010-2019 by Andy Green <andy@warmcat.com>
|
||
|
*
|
||
|
* This file is made available under the Creative Commons CC0 1.0
|
||
|
* Universal Public Domain Dedication.
|
||
|
*
|
||
|
* This demonstrates a normal http / https server which if it receives something
|
||
|
* it can't make sense of at the start, falls back to becoming a raw tcp proxy
|
||
|
* to a specified address and port.
|
||
|
*
|
||
|
* Incoming connections cause an outgoing connection to be initiated, and if
|
||
|
* successfully established then traffic coming in one side is placed on a
|
||
|
* ringbuffer and sent out the opposite side as soon as possible.
|
||
|
*
|
||
|
* If it receives expected packets for an http(s) connection, it acts like a
|
||
|
* normal h1 / h2 webserver.
|
||
|
*/
|
||
|
|
||
|
#include <libwebsockets.h>
|
||
|
#include <string.h>
|
||
|
#include <signal.h>
|
||
|
#include <sys/types.h>
|
||
|
|
||
|
#define LWS_PLUGIN_STATIC
|
||
|
#include "../plugins/raw-proxy/protocol_lws_raw_proxy.c"
|
||
|
|
||
|
static struct lws_protocols protocols[] = {
|
||
|
LWS_PLUGIN_PROTOCOL_RAW_PROXY,
|
||
|
{ NULL, NULL, 0, 0 } /* terminator */
|
||
|
};
|
||
|
|
||
|
static const struct lws_http_mount mount = {
|
||
|
/* .mount_next */ NULL, /* linked-list "next" */
|
||
|
/* .mountpoint */ "/", /* mountpoint URL */
|
||
|
/* .origin */ "./mount-origin", /* serve from dir */
|
||
|
/* .def */ "index.html", /* default filename */
|
||
|
/* .protocol */ NULL,
|
||
|
/* .cgienv */ NULL,
|
||
|
/* .extra_mimetypes */ NULL,
|
||
|
/* .interpret */ NULL,
|
||
|
/* .cgi_timeout */ 0,
|
||
|
/* .cache_max_age */ 0,
|
||
|
/* .auth_mask */ 0,
|
||
|
/* .cache_reusable */ 0,
|
||
|
/* .cache_revalidate */ 0,
|
||
|
/* .cache_intermediaries */ 0,
|
||
|
/* .origin_protocol */ LWSMPRO_FILE, /* files in a dir */
|
||
|
/* .mountpoint_len */ 1, /* char count */
|
||
|
/* .basic_auth_login_file */ NULL,
|
||
|
};
|
||
|
|
||
|
static int interrupted;
|
||
|
|
||
|
void sigint_handler(int sig)
|
||
|
{
|
||
|
interrupted = 1;
|
||
|
}
|
||
|
|
||
|
static struct lws_protocol_vhost_options pvo1 = {
|
||
|
NULL,
|
||
|
NULL,
|
||
|
"onward", /* pvo name */
|
||
|
"ipv4:127.0.0.1:22" /* pvo value */
|
||
|
};
|
||
|
|
||
|
static const struct lws_protocol_vhost_options pvo = {
|
||
|
NULL, /* "next" pvo linked-list */
|
||
|
&pvo1, /* "child" pvo linked-list */
|
||
|
"raw-proxy", /* protocol name we belong to on this vhost */
|
||
|
"" /* ignored */
|
||
|
};
|
||
|
|
||
|
|
||
|
int main(int argc, const char **argv)
|
||
|
{
|
||
|
int n = 0, logs = LLL_USER | LLL_ERR | LLL_WARN | LLL_NOTICE;
|
||
|
struct lws_context_creation_info info;
|
||
|
struct lws_context *context;
|
||
|
char outward[256];
|
||
|
const char *p;
|
||
|
|
||
|
signal(SIGINT, sigint_handler);
|
||
|
|
||
|
if ((p = lws_cmdline_option(argc, argv, "-d")))
|
||
|
logs = atoi(p);
|
||
|
|
||
|
lws_set_log_level(logs, NULL);
|
||
|
lwsl_user("LWS minimal raw proxy fallback | visit http://localhost:7681\n");
|
||
|
|
||
|
if ((p = lws_cmdline_option(argc, argv, "-r"))) {
|
||
|
lws_strncpy(outward, p, sizeof(outward));
|
||
|
pvo1.value = outward;
|
||
|
}
|
||
|
|
||
|
memset(&info, 0, sizeof info); /* otherwise uninitialized garbage */
|
||
|
info.port = 7681;
|
||
|
info.protocols = protocols;
|
||
|
info.pvo = &pvo;
|
||
|
info.mounts = &mount;
|
||
|
info.error_document_404 = "/404.html";
|
||
|
info.options =
|
||
|
LWS_SERVER_OPTION_HTTP_HEADERS_SECURITY_BEST_PRACTICES_ENFORCE |
|
||
|
LWS_SERVER_OPTION_FALLBACK_TO_APPLY_LISTEN_ACCEPT_CONFIG;
|
||
|
info.listen_accept_role = "raw-proxy";
|
||
|
info.listen_accept_protocol = "raw-proxy";
|
||
|
|
||
|
if (lws_cmdline_option(argc, argv, "-s")) {
|
||
|
info.options |= LWS_SERVER_OPTION_DO_SSL_GLOBAL_INIT |
|
||
|
LWS_SERVER_OPTION_ALLOW_NON_SSL_ON_SSL_PORT;
|
||
|
info.ssl_cert_filepath = "localhost-100y.cert";
|
||
|
info.ssl_private_key_filepath = "localhost-100y.key";
|
||
|
|
||
|
if (lws_cmdline_option(argc, argv, "-u"))
|
||
|
info.options |= LWS_SERVER_OPTION_REDIRECT_HTTP_TO_HTTPS;
|
||
|
|
||
|
if (lws_cmdline_option(argc, argv, "-h"))
|
||
|
info.options |= LWS_SERVER_OPTION_ALLOW_HTTP_ON_HTTPS_LISTENER;
|
||
|
}
|
||
|
|
||
|
context = lws_create_context(&info);
|
||
|
if (!context) {
|
||
|
lwsl_err("lws init failed\n");
|
||
|
return 1;
|
||
|
}
|
||
|
|
||
|
while (n >= 0 && !interrupted)
|
||
|
n = lws_service(context, 0);
|
||
|
|
||
|
lws_context_destroy(context);
|
||
|
|
||
|
return 0;
|
||
|
}
|