mirror of
https://github.com/badaix/snapcast.git
synced 2025-04-29 10:17:16 +02:00
Reenable plain HTTP, change HTTPS port to 1788
This commit is contained in:
parent
c5bd0ed6df
commit
153d004004
11 changed files with 264 additions and 142 deletions
|
@ -44,7 +44,12 @@ ControlServer::ControlServer(boost::asio::io_context& io_context, const ServerSe
|
||||||
{
|
{
|
||||||
const ServerSettings::Ssl& ssl = settings.ssl;
|
const ServerSettings::Ssl& ssl = settings.ssl;
|
||||||
ssl_context_.set_options(boost::asio::ssl::context::default_workarounds | boost::asio::ssl::context::no_sslv2 | boost::asio::ssl::context::single_dh_use);
|
ssl_context_.set_options(boost::asio::ssl::context::default_workarounds | boost::asio::ssl::context::no_sslv2 | boost::asio::ssl::context::single_dh_use);
|
||||||
ssl_context_.set_password_callback(std::bind(&ControlServer::getPassword, this));
|
ssl_context_.set_password_callback(
|
||||||
|
[](size_t max_length, boost::asio::ssl::context_base::password_purpose purpose) -> string
|
||||||
|
{
|
||||||
|
LOG(DEBUG, LOG_TAG) << "getPassword, purpose: " << purpose << ", max length: " << max_length << "\n";
|
||||||
|
return "test";
|
||||||
|
});
|
||||||
ssl_context_.use_certificate_chain_file(ssl.certificate);
|
ssl_context_.use_certificate_chain_file(ssl.certificate);
|
||||||
ssl_context_.use_private_key_file(ssl.private_key, boost::asio::ssl::context::pem);
|
ssl_context_.use_private_key_file(ssl.private_key, boost::asio::ssl::context::pem);
|
||||||
// ssl_context_.use_tmp_dh_file("dh4096.pem");
|
// ssl_context_.use_tmp_dh_file("dh4096.pem");
|
||||||
|
@ -57,13 +62,6 @@ ControlServer::~ControlServer()
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
std::string ControlServer::getPassword() const
|
|
||||||
{
|
|
||||||
LOG(DEBUG, LOG_TAG) << "getPassword\n";
|
|
||||||
return "test";
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
void ControlServer::cleanup()
|
void ControlServer::cleanup()
|
||||||
{
|
{
|
||||||
auto new_end = std::remove_if(sessions_.begin(), sessions_.end(), [](const std::weak_ptr<ControlSession>& session) { return session.expired(); });
|
auto new_end = std::remove_if(sessions_.begin(), sessions_.end(), [](const std::weak_ptr<ControlSession>& session) { return session.expired(); });
|
||||||
|
@ -117,39 +115,9 @@ void ControlServer::onNewSession(std::shared_ptr<StreamSession> session)
|
||||||
|
|
||||||
void ControlServer::startAccept()
|
void ControlServer::startAccept()
|
||||||
{
|
{
|
||||||
auto accept_handler_tcp = [this](error_code ec, tcp::socket socket)
|
auto accept_handler = [this](error_code ec, tcp::socket socket)
|
||||||
{
|
{
|
||||||
if (!ec)
|
if (!ec)
|
||||||
handleAccept<ControlSessionTcp>(std::move(socket));
|
|
||||||
else
|
|
||||||
LOG(ERROR, LOG_TAG) << "Error while accepting socket connection: " << ec.message() << "\n";
|
|
||||||
};
|
|
||||||
|
|
||||||
auto accept_handler_http = [this](error_code ec, tcp::socket socket)
|
|
||||||
{
|
|
||||||
if (!ec)
|
|
||||||
{
|
|
||||||
// handleAccept<ControlSessionHttp>(std::move(socket), http_settings_);
|
|
||||||
auto session = make_shared<ControlSessionHttp>(this, std::move(socket), ssl_context_, http_settings_);
|
|
||||||
onNewSession(std::move(session));
|
|
||||||
startAccept();
|
|
||||||
}
|
|
||||||
else
|
|
||||||
LOG(ERROR, LOG_TAG) << "Error while accepting socket connection: " << ec.message() << "\n";
|
|
||||||
};
|
|
||||||
|
|
||||||
for (auto& acceptor : acceptor_tcp_)
|
|
||||||
acceptor->async_accept(accept_handler_tcp);
|
|
||||||
|
|
||||||
for (auto& acceptor : acceptor_http_)
|
|
||||||
acceptor->async_accept(accept_handler_http);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
template <typename SessionType, typename... Args>
|
|
||||||
void ControlServer::handleAccept(tcp::socket socket, Args&&... args)
|
|
||||||
{
|
|
||||||
try
|
|
||||||
{
|
{
|
||||||
struct timeval tv;
|
struct timeval tv;
|
||||||
tv.tv_sec = 5;
|
tv.tv_sec = 5;
|
||||||
|
@ -157,17 +125,38 @@ void ControlServer::handleAccept(tcp::socket socket, Args&&... args)
|
||||||
setsockopt(socket.native_handle(), SOL_SOCKET, SO_RCVTIMEO, &tv, sizeof(tv));
|
setsockopt(socket.native_handle(), SOL_SOCKET, SO_RCVTIMEO, &tv, sizeof(tv));
|
||||||
setsockopt(socket.native_handle(), SOL_SOCKET, SO_SNDTIMEO, &tv, sizeof(tv));
|
setsockopt(socket.native_handle(), SOL_SOCKET, SO_SNDTIMEO, &tv, sizeof(tv));
|
||||||
// socket->set_option(boost::asio::ip::tcp::no_delay(false));
|
// socket->set_option(boost::asio::ip::tcp::no_delay(false));
|
||||||
LOG(NOTICE, LOG_TAG) << "ControlServer::NewConnection: " << socket.remote_endpoint().address().to_string() << endl;
|
auto port = socket.local_endpoint().port();
|
||||||
shared_ptr<SessionType> session = make_shared<SessionType>(this, std::move(socket), std::forward<Args>(args)...);
|
LOG(NOTICE, LOG_TAG) << "New connection from: " << socket.remote_endpoint().address().to_string() << ", port: " << port << endl;
|
||||||
|
|
||||||
|
if (port == http_settings_.ssl_port)
|
||||||
|
{
|
||||||
|
auto session = make_shared<ControlSessionHttp>(this, ssl_socket(std::move(socket), ssl_context_), http_settings_);
|
||||||
onNewSession(std::move(session));
|
onNewSession(std::move(session));
|
||||||
}
|
}
|
||||||
catch (const std::exception& e)
|
else if (port == http_settings_.port)
|
||||||
{
|
{
|
||||||
LOG(ERROR, LOG_TAG) << "Exception in ControlServer::handleAccept: " << e.what() << endl;
|
auto session = make_shared<ControlSessionHttp>(this, std::move(socket), http_settings_);
|
||||||
|
onNewSession(std::move(session));
|
||||||
}
|
}
|
||||||
startAccept();
|
else if (port == tcp_settings_.port)
|
||||||
|
{
|
||||||
|
auto session = make_shared<ControlSessionTcp>(this, std::move(socket));
|
||||||
|
onNewSession(std::move(session));
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
LOG(ERROR, LOG_TAG) << "Port unknown, should not listen on this port?!?\n";
|
||||||
}
|
}
|
||||||
|
|
||||||
|
startAccept();
|
||||||
|
}
|
||||||
|
else
|
||||||
|
LOG(ERROR, LOG_TAG) << "Error while accepting socket connection: " << ec.message() << "\n";
|
||||||
|
};
|
||||||
|
|
||||||
|
for (auto& acceptor : acceptor_)
|
||||||
|
acceptor->async_accept(accept_handler);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
void ControlServer::start()
|
void ControlServer::start()
|
||||||
|
@ -179,8 +168,8 @@ void ControlServer::start()
|
||||||
try
|
try
|
||||||
{
|
{
|
||||||
LOG(INFO, LOG_TAG) << "Creating TCP acceptor for address: " << address << ", port: " << tcp_settings_.port << "\n";
|
LOG(INFO, LOG_TAG) << "Creating TCP acceptor for address: " << address << ", port: " << tcp_settings_.port << "\n";
|
||||||
acceptor_tcp_.emplace_back(make_unique<tcp::acceptor>(boost::asio::make_strand(io_context_.get_executor()),
|
acceptor_.emplace_back(make_unique<tcp::acceptor>(boost::asio::make_strand(io_context_.get_executor()),
|
||||||
tcp::endpoint(boost::asio::ip::make_address(address), tcp_settings_.port)));
|
tcp::endpoint(boost::asio::ip::address::from_string(address), tcp_settings_.port)));
|
||||||
}
|
}
|
||||||
catch (const boost::system::system_error& e)
|
catch (const boost::system::system_error& e)
|
||||||
{
|
{
|
||||||
|
@ -195,8 +184,22 @@ void ControlServer::start()
|
||||||
try
|
try
|
||||||
{
|
{
|
||||||
LOG(INFO, LOG_TAG) << "Creating HTTP acceptor for address: " << address << ", port: " << http_settings_.port << "\n";
|
LOG(INFO, LOG_TAG) << "Creating HTTP acceptor for address: " << address << ", port: " << http_settings_.port << "\n";
|
||||||
acceptor_http_.emplace_back(make_unique<tcp::acceptor>(boost::asio::make_strand(io_context_.get_executor()),
|
acceptor_.emplace_back(make_unique<tcp::acceptor>(boost::asio::make_strand(io_context_.get_executor()),
|
||||||
tcp::endpoint(boost::asio::ip::make_address(address), http_settings_.port)));
|
tcp::endpoint(boost::asio::ip::address::from_string(address), http_settings_.port)));
|
||||||
|
}
|
||||||
|
catch (const boost::system::system_error& e)
|
||||||
|
{
|
||||||
|
LOG(ERROR, LOG_TAG) << "error creating HTTP acceptor: " << e.what() << ", code: " << e.code() << "\n";
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
for (const auto& address : http_settings_.ssl_bind_to_address)
|
||||||
|
{
|
||||||
|
try
|
||||||
|
{
|
||||||
|
LOG(INFO, LOG_TAG) << "Creating HTTPS acceptor for address: " << address << ", port: " << http_settings_.ssl_port << "\n";
|
||||||
|
acceptor_.emplace_back(make_unique<tcp::acceptor>(boost::asio::make_strand(io_context_.get_executor()),
|
||||||
|
tcp::endpoint(boost::asio::ip::address::from_string(address), http_settings_.ssl_port)));
|
||||||
}
|
}
|
||||||
catch (const boost::system::system_error& e)
|
catch (const boost::system::system_error& e)
|
||||||
{
|
{
|
||||||
|
@ -211,14 +214,10 @@ void ControlServer::start()
|
||||||
|
|
||||||
void ControlServer::stop()
|
void ControlServer::stop()
|
||||||
{
|
{
|
||||||
for (auto& acceptor : acceptor_tcp_)
|
for (auto& acceptor : acceptor_)
|
||||||
acceptor->cancel();
|
acceptor->cancel();
|
||||||
|
|
||||||
for (auto& acceptor : acceptor_http_)
|
acceptor_.clear();
|
||||||
acceptor->cancel();
|
|
||||||
|
|
||||||
acceptor_tcp_.clear();
|
|
||||||
acceptor_http_.clear();
|
|
||||||
|
|
||||||
std::lock_guard<std::recursive_mutex> mlock(session_mutex_);
|
std::lock_guard<std::recursive_mutex> mlock(session_mutex_);
|
||||||
cleanup();
|
cleanup();
|
||||||
|
|
|
@ -55,8 +55,6 @@ public:
|
||||||
private:
|
private:
|
||||||
void startAccept();
|
void startAccept();
|
||||||
|
|
||||||
template <typename SessionType, typename... Args>
|
|
||||||
void handleAccept(tcp::socket socket, Args&&... args);
|
|
||||||
void cleanup();
|
void cleanup();
|
||||||
|
|
||||||
/// Implementation of ControlMessageReceiver
|
/// Implementation of ControlMessageReceiver
|
||||||
|
@ -64,13 +62,10 @@ private:
|
||||||
void onNewSession(std::shared_ptr<ControlSession> session) override;
|
void onNewSession(std::shared_ptr<ControlSession> session) override;
|
||||||
void onNewSession(std::shared_ptr<StreamSession> session) override;
|
void onNewSession(std::shared_ptr<StreamSession> session) override;
|
||||||
|
|
||||||
std::string getPassword() const;
|
|
||||||
|
|
||||||
mutable std::recursive_mutex session_mutex_;
|
mutable std::recursive_mutex session_mutex_;
|
||||||
std::vector<std::weak_ptr<ControlSession>> sessions_;
|
std::vector<std::weak_ptr<ControlSession>> sessions_;
|
||||||
|
|
||||||
std::vector<acceptor_ptr> acceptor_tcp_;
|
std::vector<acceptor_ptr> acceptor_;
|
||||||
std::vector<acceptor_ptr> acceptor_http_;
|
|
||||||
|
|
||||||
boost::asio::io_context& io_context_;
|
boost::asio::io_context& io_context_;
|
||||||
boost::asio::ssl::context ssl_context_;
|
boost::asio::ssl::context ssl_context_;
|
||||||
|
|
|
@ -147,11 +147,16 @@ std::string path_cat(boost::beast::string_view base, boost::beast::string_view p
|
||||||
}
|
}
|
||||||
} // namespace
|
} // namespace
|
||||||
|
|
||||||
ControlSessionHttp::ControlSessionHttp(ControlMessageReceiver* receiver, tcp_socket&& socket, boost::asio::ssl::context& ssl_context,
|
ControlSessionHttp::ControlSessionHttp(ControlMessageReceiver* receiver, ssl_socket&& socket, const ServerSettings::Http& settings)
|
||||||
const ServerSettings::Http& settings)
|
: ControlSession(receiver), ssl_socket_(std::move(socket)), settings_(settings), is_ssl_(true)
|
||||||
: ControlSession(receiver), ssl_socket_(ssl_socket(std::move(socket), ssl_context)), ssl_context_(ssl_context), settings_(settings)
|
|
||||||
{
|
{
|
||||||
LOG(DEBUG, LOG_TAG) << "ControlSessionHttp, mode: ssl, Local IP: " << ssl_socket_.next_layer().local_endpoint().address().to_string() << "\n";
|
LOG(DEBUG, LOG_TAG) << "ControlSessionHttp, mode: ssl, Local IP: " << ssl_socket_->next_layer().local_endpoint().address().to_string() << "\n";
|
||||||
|
}
|
||||||
|
|
||||||
|
ControlSessionHttp::ControlSessionHttp(ControlMessageReceiver* receiver, tcp_socket&& socket, const ServerSettings::Http& settings)
|
||||||
|
: ControlSession(receiver), tcp_socket_(std::move(socket)), settings_(settings), is_ssl_(false)
|
||||||
|
{
|
||||||
|
LOG(DEBUG, LOG_TAG) << "ControlSessionHttp, mode: tcp, Local IP: " << tcp_socket_->local_endpoint().address().to_string() << "\n";
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
@ -165,7 +170,9 @@ ControlSessionHttp::~ControlSessionHttp()
|
||||||
void ControlSessionHttp::start()
|
void ControlSessionHttp::start()
|
||||||
{
|
{
|
||||||
LOG(DEBUG, LOG_TAG) << "start\n";
|
LOG(DEBUG, LOG_TAG) << "start\n";
|
||||||
ssl_socket_.async_handshake(boost::asio::ssl::stream_base::server,
|
if (is_ssl_)
|
||||||
|
{
|
||||||
|
ssl_socket_->async_handshake(boost::asio::ssl::stream_base::server,
|
||||||
[this, self = shared_from_this()](const boost::system::error_code& error)
|
[this, self = shared_from_this()](const boost::system::error_code& error)
|
||||||
{
|
{
|
||||||
LOG(DEBUG, LOG_TAG) << "async_handshake\n";
|
LOG(DEBUG, LOG_TAG) << "async_handshake\n";
|
||||||
|
@ -175,11 +182,16 @@ void ControlSessionHttp::start()
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
http::async_read(ssl_socket_, buffer_, req_,
|
http::async_read(*ssl_socket_, buffer_, req_,
|
||||||
[this, self = shared_from_this()](boost::system::error_code ec, std::size_t bytes) { on_read(ec, bytes); });
|
[this, self = shared_from_this()](boost::system::error_code ec, std::size_t bytes) { on_read(ec, bytes); });
|
||||||
}
|
}
|
||||||
});
|
});
|
||||||
// http::async_read(tcp_socket_, buffer_, req_, [this, self = shared_from_this()](boost::system::error_code ec, std::size_t bytes) { on_read(ec, bytes); });
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
http::async_read(*tcp_socket_, buffer_, req_,
|
||||||
|
[this, self = shared_from_this()](boost::system::error_code ec, std::size_t bytes) { on_read(ec, bytes); });
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
@ -349,8 +361,10 @@ void ControlSessionHttp::on_read(beast::error_code ec, std::size_t bytes_transfe
|
||||||
if (ec == http::error::end_of_stream)
|
if (ec == http::error::end_of_stream)
|
||||||
{
|
{
|
||||||
boost::system::error_code res;
|
boost::system::error_code res;
|
||||||
res = ssl_socket_.shutdown(res);
|
if (is_ssl_)
|
||||||
// auto res = ssl_socket_.lowest_layer().shutdown(tcp_socket::shutdown_send, ec);
|
res = ssl_socket_->shutdown(res);
|
||||||
|
else
|
||||||
|
res = tcp_socket_->shutdown(tcp_socket::shutdown_send, ec);
|
||||||
if (res.failed())
|
if (res.failed())
|
||||||
LOG(ERROR, LOG_TAG) << "Failed to shudown socket: " << res << "\n";
|
LOG(ERROR, LOG_TAG) << "Failed to shudown socket: " << res << "\n";
|
||||||
return;
|
return;
|
||||||
|
@ -371,9 +385,11 @@ void ControlSessionHttp::on_read(beast::error_code ec, std::size_t bytes_transfe
|
||||||
{
|
{
|
||||||
LOG(DEBUG, LOG_TAG) << "websocket upgrade, target: " << req_.target() << "\n";
|
LOG(DEBUG, LOG_TAG) << "websocket upgrade, target: " << req_.target() << "\n";
|
||||||
if ((req_.target() == "/jsonrpc") || (req_.target() == "/stream"))
|
if ((req_.target() == "/jsonrpc") || (req_.target() == "/stream"))
|
||||||
|
{
|
||||||
|
if (is_ssl_)
|
||||||
{
|
{
|
||||||
// Create a WebSocket session by transferring the socket
|
// Create a WebSocket session by transferring the socket
|
||||||
auto ws = std::make_shared<websocket::stream<ssl_socket>>(std::move(ssl_socket_));
|
auto ws = std::make_shared<websocket::stream<ssl_socket>>(std::move(*ssl_socket_));
|
||||||
// Accept the websocket handshake
|
// Accept the websocket handshake
|
||||||
ws->async_accept(req_,
|
ws->async_accept(req_,
|
||||||
[this, ws, self = shared_from_this()](beast::error_code ec) mutable
|
[this, ws, self = shared_from_this()](beast::error_code ec) mutable
|
||||||
|
@ -397,6 +413,34 @@ void ControlSessionHttp::on_read(beast::error_code ec, std::size_t bytes_transfe
|
||||||
}
|
}
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
// Create a WebSocket session by transferring the socket
|
||||||
|
auto ws = std::make_shared<websocket::stream<tcp_socket>>(std::move(*tcp_socket_));
|
||||||
|
// Accept the websocket handshake
|
||||||
|
ws->async_accept(req_,
|
||||||
|
[this, ws, self = shared_from_this()](beast::error_code ec) mutable
|
||||||
|
{
|
||||||
|
if (ec)
|
||||||
|
{
|
||||||
|
LOG(ERROR, LOG_TAG) << "Error during WebSocket accept (control): " << ec.message() << "\n";
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
if (req_.target() == "/jsonrpc")
|
||||||
|
{
|
||||||
|
auto ws_session = make_shared<ControlSessionWebsocket>(message_receiver_, std::move(*ws));
|
||||||
|
message_receiver_->onNewSession(std::move(ws_session));
|
||||||
|
}
|
||||||
|
else // if (req_.target() == "/stream")
|
||||||
|
{
|
||||||
|
auto ws_session = make_shared<StreamSessionWebsocket>(nullptr, std::move(*ws));
|
||||||
|
message_receiver_->onNewSession(std::move(ws_session));
|
||||||
|
}
|
||||||
|
}
|
||||||
|
});
|
||||||
|
}
|
||||||
|
}
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -411,8 +455,14 @@ void ControlSessionHttp::on_read(beast::error_code ec, std::size_t bytes_transfe
|
||||||
auto sp = std::make_shared<response_type>(std::forward<decltype(response)>(response));
|
auto sp = std::make_shared<response_type>(std::forward<decltype(response)>(response));
|
||||||
|
|
||||||
// Write the response
|
// Write the response
|
||||||
http::async_write(this->ssl_socket_, *sp,
|
if (is_ssl_)
|
||||||
[this, self = this->shared_from_this(), sp](beast::error_code ec, std::size_t bytes) { this->on_write(ec, bytes, sp->need_eof()); });
|
http::async_write(this->ssl_socket_.value(), *sp,
|
||||||
|
[this, self = this->shared_from_this(), sp](beast::error_code ec, std::size_t bytes)
|
||||||
|
{ this->on_write(ec, bytes, sp->need_eof()); });
|
||||||
|
else
|
||||||
|
http::async_write(this->tcp_socket_.value(), *sp,
|
||||||
|
[this, self = this->shared_from_this(), sp](beast::error_code ec, std::size_t bytes)
|
||||||
|
{ this->on_write(ec, bytes, sp->need_eof()); });
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -433,8 +483,10 @@ void ControlSessionHttp::on_write(beast::error_code ec, std::size_t bytes, bool
|
||||||
// This means we should close the connection, usually because
|
// This means we should close the connection, usually because
|
||||||
// the response indicated the "Connection: close" semantic.
|
// the response indicated the "Connection: close" semantic.
|
||||||
boost::system::error_code res;
|
boost::system::error_code res;
|
||||||
res = ssl_socket_.shutdown(res);
|
if (is_ssl_)
|
||||||
// auto res = ssl_socket_.lowest_layer().shutdown(tcp::socket::shutdown_send, ec);
|
res = ssl_socket_->shutdown(res);
|
||||||
|
else
|
||||||
|
res = tcp_socket_->shutdown(tcp_socket::shutdown_send, ec);
|
||||||
if (res.failed())
|
if (res.failed())
|
||||||
LOG(ERROR, LOG_TAG) << "Failed to shudown socket: " << res << "\n";
|
LOG(ERROR, LOG_TAG) << "Failed to shudown socket: " << res << "\n";
|
||||||
return;
|
return;
|
||||||
|
@ -445,7 +497,10 @@ void ControlSessionHttp::on_write(beast::error_code ec, std::size_t bytes, bool
|
||||||
req_ = {};
|
req_ = {};
|
||||||
|
|
||||||
// Read another request
|
// Read another request
|
||||||
http::async_read(ssl_socket_, buffer_, req_, [this, self = shared_from_this()](beast::error_code ec, std::size_t bytes) { on_read(ec, bytes); });
|
if (is_ssl_)
|
||||||
|
http::async_read(*ssl_socket_, buffer_, req_, [this, self = shared_from_this()](beast::error_code ec, std::size_t bytes) { on_read(ec, bytes); });
|
||||||
|
else
|
||||||
|
http::async_read(*tcp_socket_, buffer_, req_, [this, self = shared_from_this()](beast::error_code ec, std::size_t bytes) { on_read(ec, bytes); });
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -38,7 +38,7 @@
|
||||||
|
|
||||||
// standard headers
|
// standard headers
|
||||||
#include <deque>
|
#include <deque>
|
||||||
// #include <variant>
|
#include <optional>
|
||||||
|
|
||||||
namespace beast = boost::beast; // from <boost/beast.hpp>
|
namespace beast = boost::beast; // from <boost/beast.hpp>
|
||||||
namespace http = beast::http; // from <boost/beast/http.hpp>
|
namespace http = beast::http; // from <boost/beast/http.hpp>
|
||||||
|
@ -56,8 +56,8 @@ class ControlSessionHttp : public ControlSession
|
||||||
{
|
{
|
||||||
public:
|
public:
|
||||||
/// ctor. Received message from the client are passed to ControlMessageReceiver
|
/// ctor. Received message from the client are passed to ControlMessageReceiver
|
||||||
ControlSessionHttp(ControlMessageReceiver* receiver, tcp_socket&& socket, boost::asio::ssl::context& ssl_context, const ServerSettings::Http& settings);
|
ControlSessionHttp(ControlMessageReceiver* receiver, ssl_socket&& socket, const ServerSettings::Http& settings);
|
||||||
// ControlSessionHttp(ControlMessageReceiver* receiver, tcp_socket&& socket, const ServerSettings::Http& settings);
|
ControlSessionHttp(ControlMessageReceiver* receiver, tcp_socket&& socket, const ServerSettings::Http& settings);
|
||||||
~ControlSessionHttp() override;
|
~ControlSessionHttp() override;
|
||||||
void start() override;
|
void start() override;
|
||||||
void stop() override;
|
void stop() override;
|
||||||
|
@ -76,11 +76,10 @@ protected:
|
||||||
http::request<http::string_body> req_;
|
http::request<http::string_body> req_;
|
||||||
|
|
||||||
protected:
|
protected:
|
||||||
// tcp_socket socket_;
|
std::optional<tcp_socket> tcp_socket_;
|
||||||
ssl_socket ssl_socket_;
|
std::optional<ssl_socket> ssl_socket_;
|
||||||
// std::variant<tcp_socket, ssl_socket> socket_;
|
|
||||||
boost::asio::ssl::context& ssl_context_;
|
|
||||||
beast::flat_buffer buffer_;
|
beast::flat_buffer buffer_;
|
||||||
ServerSettings::Http settings_;
|
ServerSettings::Http settings_;
|
||||||
std::deque<std::string> messages_;
|
std::deque<std::string> messages_;
|
||||||
|
bool is_ssl_;
|
||||||
};
|
};
|
||||||
|
|
|
@ -32,10 +32,16 @@ using namespace std;
|
||||||
static constexpr auto LOG_TAG = "ControlSessionWS";
|
static constexpr auto LOG_TAG = "ControlSessionWS";
|
||||||
|
|
||||||
|
|
||||||
ControlSessionWebsocket::ControlSessionWebsocket(ControlMessageReceiver* receiver, websocket::stream<ssl_socket>&& wss)
|
ControlSessionWebsocket::ControlSessionWebsocket(ControlMessageReceiver* receiver, ssl_websocket&& ssl_ws)
|
||||||
: ControlSession(receiver), wss_(std::move(wss)), strand_(boost::asio::make_strand(wss_.get_executor()))
|
: ControlSession(receiver), ssl_ws_(std::move(ssl_ws)), strand_(boost::asio::make_strand(ssl_ws_->get_executor())), is_ssl_(true)
|
||||||
{
|
{
|
||||||
LOG(DEBUG, LOG_TAG) << "ControlSessionWebsocket\n";
|
LOG(DEBUG, LOG_TAG) << "ControlSessionWebsocket, mode: ssl\n";
|
||||||
|
}
|
||||||
|
|
||||||
|
ControlSessionWebsocket::ControlSessionWebsocket(ControlMessageReceiver* receiver, tcp_websocket&& tcp_ws)
|
||||||
|
: ControlSession(receiver), tcp_ws_(std::move(tcp_ws)), strand_(boost::asio::make_strand(tcp_ws_->get_executor())), is_ssl_(false)
|
||||||
|
{
|
||||||
|
LOG(DEBUG, LOG_TAG) << "ControlSessionWebsocket, mode: tcp\n";
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
@ -84,8 +90,8 @@ void ControlSessionWebsocket::sendAsync(const std::string& message)
|
||||||
void ControlSessionWebsocket::send_next()
|
void ControlSessionWebsocket::send_next()
|
||||||
{
|
{
|
||||||
const std::string& message = messages_.front();
|
const std::string& message = messages_.front();
|
||||||
wss_.async_write(boost::asio::buffer(message),
|
|
||||||
[this, self = shared_from_this()](std::error_code ec, std::size_t length)
|
auto write_handler = [this, self = shared_from_this()](std::error_code ec, std::size_t length)
|
||||||
{
|
{
|
||||||
messages_.pop_front();
|
messages_.pop_front();
|
||||||
if (ec)
|
if (ec)
|
||||||
|
@ -98,14 +104,28 @@ void ControlSessionWebsocket::send_next()
|
||||||
}
|
}
|
||||||
if (!messages_.empty())
|
if (!messages_.empty())
|
||||||
send_next();
|
send_next();
|
||||||
});
|
};
|
||||||
|
|
||||||
|
if (is_ssl_)
|
||||||
|
{
|
||||||
|
ssl_ws_->async_write(boost::asio::buffer(message), [write_handler](std::error_code ec, std::size_t length) { write_handler(ec, length); });
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
tcp_ws_->async_write(boost::asio::buffer(message), [write_handler](std::error_code ec, std::size_t length) { write_handler(ec, length); });
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
void ControlSessionWebsocket::do_read_ws()
|
void ControlSessionWebsocket::do_read_ws()
|
||||||
{
|
{
|
||||||
// Read a message into our buffer
|
// Read a message into our buffer
|
||||||
wss_.async_read(buffer_, [this, self = shared_from_this()](beast::error_code ec, std::size_t bytes_transferred) { on_read_ws(ec, bytes_transferred); });
|
if (is_ssl_)
|
||||||
|
ssl_ws_->async_read(buffer_,
|
||||||
|
[this, self = shared_from_this()](beast::error_code ec, std::size_t bytes_transferred) { on_read_ws(ec, bytes_transferred); });
|
||||||
|
else
|
||||||
|
tcp_ws_->async_read(buffer_,
|
||||||
|
[this, self = shared_from_this()](beast::error_code ec, std::size_t bytes_transferred) { on_read_ws(ec, bytes_transferred); });
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -45,12 +45,15 @@
|
||||||
|
|
||||||
// standard headers
|
// standard headers
|
||||||
#include <deque>
|
#include <deque>
|
||||||
|
#include <optional>
|
||||||
|
|
||||||
|
|
||||||
namespace beast = boost::beast; // from <boost/beast.hpp>
|
namespace beast = boost::beast; // from <boost/beast.hpp>
|
||||||
namespace websocket = beast::websocket; // from <boost/beast/websocket.hpp>
|
namespace websocket = beast::websocket; // from <boost/beast/websocket.hpp>
|
||||||
using tcp_socket = boost::asio::ip::tcp::socket;
|
using tcp_socket = boost::asio::ip::tcp::socket;
|
||||||
using ssl_socket = boost::asio::ssl::stream<tcp_socket>;
|
using ssl_socket = boost::asio::ssl::stream<tcp_socket>;
|
||||||
|
using tcp_websocket = websocket::stream<tcp_socket>;
|
||||||
|
using ssl_websocket = websocket::stream<ssl_socket>;
|
||||||
|
|
||||||
|
|
||||||
/// Endpoint for a connected control client.
|
/// Endpoint for a connected control client.
|
||||||
|
@ -63,7 +66,8 @@ class ControlSessionWebsocket : public ControlSession
|
||||||
{
|
{
|
||||||
public:
|
public:
|
||||||
/// ctor. Received message from the client are passed to ControlMessageReceiver
|
/// ctor. Received message from the client are passed to ControlMessageReceiver
|
||||||
ControlSessionWebsocket(ControlMessageReceiver* receiver, websocket::stream<ssl_socket>&& wss);
|
ControlSessionWebsocket(ControlMessageReceiver* receiver, ssl_websocket&& ssl_ws);
|
||||||
|
ControlSessionWebsocket(ControlMessageReceiver* receiver, tcp_websocket&& tcp_ws);
|
||||||
~ControlSessionWebsocket() override;
|
~ControlSessionWebsocket() override;
|
||||||
void start() override;
|
void start() override;
|
||||||
void stop() override;
|
void stop() override;
|
||||||
|
@ -77,10 +81,12 @@ protected:
|
||||||
void do_read_ws();
|
void do_read_ws();
|
||||||
void send_next();
|
void send_next();
|
||||||
|
|
||||||
websocket::stream<ssl_socket> wss_;
|
std::optional<ssl_websocket> ssl_ws_;
|
||||||
|
std::optional<tcp_websocket> tcp_ws_;
|
||||||
|
|
||||||
protected:
|
protected:
|
||||||
beast::flat_buffer buffer_;
|
beast::flat_buffer buffer_;
|
||||||
boost::asio::strand<boost::asio::any_io_executor> strand_;
|
boost::asio::strand<boost::asio::any_io_executor> strand_;
|
||||||
std::deque<std::string> messages_;
|
std::deque<std::string> messages_;
|
||||||
|
bool is_ssl_;
|
||||||
};
|
};
|
||||||
|
|
|
@ -75,6 +75,12 @@ private_key = certs/snapserver.key
|
||||||
# which port the server should listen to
|
# which port the server should listen to
|
||||||
#port = 1780
|
#port = 1780
|
||||||
|
|
||||||
|
#ssl address for the server to listen on
|
||||||
|
# ssl_bind_to_address = 0.0.0.0
|
||||||
|
|
||||||
|
# which ssl port the server should listen to
|
||||||
|
# ssl_port = 1788
|
||||||
|
|
||||||
# serve a website from the doc_root location
|
# serve a website from the doc_root location
|
||||||
# disabled if commented or empty
|
# disabled if commented or empty
|
||||||
doc_root = /usr/share/snapserver/snapweb
|
doc_root = /usr/share/snapserver/snapweb
|
||||||
|
|
|
@ -48,7 +48,9 @@ struct ServerSettings
|
||||||
{
|
{
|
||||||
bool enabled{true};
|
bool enabled{true};
|
||||||
size_t port{1780};
|
size_t port{1780};
|
||||||
|
size_t ssl_port{1788};
|
||||||
std::vector<std::string> bind_to_address{{"0.0.0.0"}};
|
std::vector<std::string> bind_to_address{{"0.0.0.0"}};
|
||||||
|
std::vector<std::string> ssl_bind_to_address{{"0.0.0.0"}};
|
||||||
std::string doc_root{""};
|
std::string doc_root{""};
|
||||||
std::string host{"<hostname>"};
|
std::string host{"<hostname>"};
|
||||||
inline static ImageCache image_cache;
|
inline static ImageCache image_cache;
|
||||||
|
|
|
@ -89,6 +89,9 @@ int main(int argc, char* argv[])
|
||||||
conf.add<Value<size_t>>("", "http.port", "which port the server should listen on", settings.http.port, &settings.http.port);
|
conf.add<Value<size_t>>("", "http.port", "which port the server should listen on", settings.http.port, &settings.http.port);
|
||||||
auto http_bind_to_address = conf.add<Value<string>>("", "http.bind_to_address", "address for the server to listen on",
|
auto http_bind_to_address = conf.add<Value<string>>("", "http.bind_to_address", "address for the server to listen on",
|
||||||
settings.http.bind_to_address.front(), &settings.http.bind_to_address[0]);
|
settings.http.bind_to_address.front(), &settings.http.bind_to_address[0]);
|
||||||
|
conf.add<Value<size_t>>("", "http.ssl_port", "which ssl port the server should listen on", settings.http.ssl_port, &settings.http.ssl_port);
|
||||||
|
auto http_ssl_bind_to_address = conf.add<Value<string>>("", "http.ssl_bind_to_address", "ssl address for the server to listen on",
|
||||||
|
settings.http.ssl_bind_to_address.front(), &settings.http.ssl_bind_to_address[0]);
|
||||||
conf.add<Implicit<string>>("", "http.doc_root", "serve a website from the doc_root location", settings.http.doc_root, &settings.http.doc_root);
|
conf.add<Implicit<string>>("", "http.doc_root", "serve a website from the doc_root location", settings.http.doc_root, &settings.http.doc_root);
|
||||||
conf.add<Value<string>>("", "http.host", "Hostname or IP under which clients can reach this host", settings.http.host, &settings.http.host);
|
conf.add<Value<string>>("", "http.host", "Hostname or IP under which clients can reach this host", settings.http.host, &settings.http.host);
|
||||||
|
|
||||||
|
@ -147,6 +150,12 @@ int main(int argc, char* argv[])
|
||||||
for (size_t n = 0; n < http_bind_to_address->count(); ++n)
|
for (size_t n = 0; n < http_bind_to_address->count(); ++n)
|
||||||
settings.http.bind_to_address.push_back(http_bind_to_address->value(n));
|
settings.http.bind_to_address.push_back(http_bind_to_address->value(n));
|
||||||
}
|
}
|
||||||
|
if (http_ssl_bind_to_address->is_set())
|
||||||
|
{
|
||||||
|
settings.http.ssl_bind_to_address.clear();
|
||||||
|
for (size_t n = 0; n < http_ssl_bind_to_address->count(); ++n)
|
||||||
|
settings.http.ssl_bind_to_address.push_back(http_ssl_bind_to_address->value(n));
|
||||||
|
}
|
||||||
if (stream_bind_to_address->is_set())
|
if (stream_bind_to_address->is_set())
|
||||||
{
|
{
|
||||||
settings.stream.bind_to_address.clear();
|
settings.stream.bind_to_address.clear();
|
||||||
|
|
|
@ -32,10 +32,16 @@ using namespace std;
|
||||||
static constexpr auto LOG_TAG = "StreamSessionWS";
|
static constexpr auto LOG_TAG = "StreamSessionWS";
|
||||||
|
|
||||||
|
|
||||||
StreamSessionWebsocket::StreamSessionWebsocket(StreamMessageReceiver* receiver, websocket::stream<ssl_socket>&& wss)
|
StreamSessionWebsocket::StreamSessionWebsocket(StreamMessageReceiver* receiver, ssl_websocket&& ssl_ws)
|
||||||
: StreamSession(wss.get_executor(), receiver), wss_(std::move(wss))
|
: StreamSession(ssl_ws.get_executor(), receiver), ssl_ws_(std::move(ssl_ws)), is_ssl_(true)
|
||||||
{
|
{
|
||||||
LOG(DEBUG, LOG_TAG) << "StreamSessionWS\n";
|
LOG(DEBUG, LOG_TAG) << "StreamSessionWS, mode: ssl\n";
|
||||||
|
}
|
||||||
|
|
||||||
|
StreamSessionWebsocket::StreamSessionWebsocket(StreamMessageReceiver* receiver, tcp_websocket&& tcp_ws)
|
||||||
|
: StreamSession(tcp_ws.get_executor(), receiver), tcp_ws_(std::move(tcp_ws)), is_ssl_(false)
|
||||||
|
{
|
||||||
|
LOG(DEBUG, LOG_TAG) << "StreamSessionWS, mode: tcp\n";
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
@ -50,28 +56,40 @@ void StreamSessionWebsocket::start()
|
||||||
{
|
{
|
||||||
// Read a message
|
// Read a message
|
||||||
LOG(DEBUG, LOG_TAG) << "start\n";
|
LOG(DEBUG, LOG_TAG) << "start\n";
|
||||||
wss_.binary(true);
|
if (is_ssl_)
|
||||||
|
ssl_ws_->binary(true);
|
||||||
|
else
|
||||||
|
tcp_ws_->binary(true);
|
||||||
do_read_ws();
|
do_read_ws();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
void StreamSessionWebsocket::stop()
|
void StreamSessionWebsocket::stop()
|
||||||
{
|
|
||||||
if (wss_.is_open())
|
|
||||||
{
|
{
|
||||||
boost::beast::error_code ec;
|
boost::beast::error_code ec;
|
||||||
wss_.close(beast::websocket::close_code::normal, ec);
|
if (is_ssl_)
|
||||||
|
{
|
||||||
|
if (ssl_ws_->is_open())
|
||||||
|
ssl_ws_->close(beast::websocket::close_code::normal, ec);
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
if (tcp_ws_->is_open())
|
||||||
|
tcp_ws_->close(beast::websocket::close_code::normal, ec);
|
||||||
|
}
|
||||||
if (ec)
|
if (ec)
|
||||||
LOG(ERROR, LOG_TAG) << "Error in socket close: " << ec.message() << "\n";
|
LOG(ERROR, LOG_TAG) << "Error in socket close: " << ec.message() << "\n";
|
||||||
}
|
}
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
std::string StreamSessionWebsocket::getIP()
|
std::string StreamSessionWebsocket::getIP()
|
||||||
{
|
{
|
||||||
try
|
try
|
||||||
{
|
{
|
||||||
return wss_.next_layer().lowest_layer().remote_endpoint().address().to_string();
|
if (is_ssl_)
|
||||||
|
return ssl_ws_->next_layer().lowest_layer().remote_endpoint().address().to_string();
|
||||||
|
else
|
||||||
|
return tcp_ws_->next_layer().lowest_layer().remote_endpoint().address().to_string();
|
||||||
}
|
}
|
||||||
catch (...)
|
catch (...)
|
||||||
{
|
{
|
||||||
|
@ -83,14 +101,22 @@ std::string StreamSessionWebsocket::getIP()
|
||||||
void StreamSessionWebsocket::sendAsync(const shared_const_buffer& buffer, const WriteHandler& handler)
|
void StreamSessionWebsocket::sendAsync(const shared_const_buffer& buffer, const WriteHandler& handler)
|
||||||
{
|
{
|
||||||
LOG(TRACE, LOG_TAG) << "sendAsync: " << buffer.message().type << "\n";
|
LOG(TRACE, LOG_TAG) << "sendAsync: " << buffer.message().type << "\n";
|
||||||
wss_.async_write(buffer, [self = shared_from_this(), buffer, handler](boost::system::error_code ec, std::size_t length) { handler(ec, length); });
|
if (is_ssl_)
|
||||||
|
ssl_ws_->async_write(buffer, [self = shared_from_this(), buffer, handler](boost::system::error_code ec, std::size_t length) { handler(ec, length); });
|
||||||
|
else
|
||||||
|
tcp_ws_->async_write(buffer, [self = shared_from_this(), buffer, handler](boost::system::error_code ec, std::size_t length) { handler(ec, length); });
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
void StreamSessionWebsocket::do_read_ws()
|
void StreamSessionWebsocket::do_read_ws()
|
||||||
{
|
{
|
||||||
// Read a message into our buffer
|
// Read a message into our buffer
|
||||||
wss_.async_read(buffer_, [this, self = shared_from_this()](beast::error_code ec, std::size_t bytes_transferred) { on_read_ws(ec, bytes_transferred); });
|
if (is_ssl_)
|
||||||
|
ssl_ws_->async_read(buffer_,
|
||||||
|
[this, self = shared_from_this()](beast::error_code ec, std::size_t bytes_transferred) { on_read_ws(ec, bytes_transferred); });
|
||||||
|
else
|
||||||
|
tcp_ws_->async_read(buffer_,
|
||||||
|
[this, self = shared_from_this()](beast::error_code ec, std::size_t bytes_transferred) { on_read_ws(ec, bytes_transferred); });
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -42,6 +42,8 @@ namespace beast = boost::beast; // from <boost/beast.hpp>
|
||||||
namespace websocket = beast::websocket; // from <boost/beast/websocket.hpp>
|
namespace websocket = beast::websocket; // from <boost/beast/websocket.hpp>
|
||||||
using tcp_socket = boost::asio::ip::tcp::socket;
|
using tcp_socket = boost::asio::ip::tcp::socket;
|
||||||
using ssl_socket = boost::asio::ssl::stream<tcp_socket>;
|
using ssl_socket = boost::asio::ssl::stream<tcp_socket>;
|
||||||
|
using tcp_websocket = websocket::stream<tcp_socket>;
|
||||||
|
using ssl_websocket = websocket::stream<ssl_socket>;
|
||||||
|
|
||||||
|
|
||||||
/// Endpoint for a connected control client.
|
/// Endpoint for a connected control client.
|
||||||
|
@ -54,7 +56,8 @@ class StreamSessionWebsocket : public StreamSession
|
||||||
{
|
{
|
||||||
public:
|
public:
|
||||||
/// ctor. Received message from the client are passed to StreamMessageReceiver
|
/// ctor. Received message from the client are passed to StreamMessageReceiver
|
||||||
StreamSessionWebsocket(StreamMessageReceiver* receiver, websocket::stream<ssl_socket>&& wss);
|
StreamSessionWebsocket(StreamMessageReceiver* receiver, ssl_websocket&& ssl_ws);
|
||||||
|
StreamSessionWebsocket(StreamMessageReceiver* receiver, tcp_websocket&& tcp_ws);
|
||||||
~StreamSessionWebsocket() override;
|
~StreamSessionWebsocket() override;
|
||||||
void start() override;
|
void start() override;
|
||||||
void stop() override;
|
void stop() override;
|
||||||
|
@ -66,8 +69,10 @@ protected:
|
||||||
void on_read_ws(beast::error_code ec, std::size_t bytes_transferred);
|
void on_read_ws(beast::error_code ec, std::size_t bytes_transferred);
|
||||||
void do_read_ws();
|
void do_read_ws();
|
||||||
|
|
||||||
websocket::stream<ssl_socket> wss_;
|
std::optional<ssl_websocket> ssl_ws_;
|
||||||
|
std::optional<tcp_websocket> tcp_ws_;
|
||||||
|
|
||||||
protected:
|
protected:
|
||||||
beast::flat_buffer buffer_;
|
beast::flat_buffer buffer_;
|
||||||
|
bool is_ssl_;
|
||||||
};
|
};
|
||||||
|
|
Loading…
Add table
Reference in a new issue