blob: 7c2d8f0de691fe247f07694f0269e53d30ad701f [file] [log] [blame]
Tomas Cejkad340dbf2013-03-24 20:36:57 +01001/*
2 * libwebsockets-test-server - libwebsockets test implementation
3 *
4 * Copyright (C) 2010-2011 Andy Green <andy@warmcat.com>
5 *
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation:
9 * version 2.1 of the License.
10 *
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
15 *
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston,
19 * MA 02110-1301 USA
20 */
21#include <stdio.h>
22#include <stdlib.h>
23#include <unistd.h>
24#include <getopt.h>
25#include <string.h>
26#include <sys/time.h>
27#include <sys/stat.h>
Tomas Cejkaba21b382013-04-13 02:37:32 +020028#include <sys/queue.h>
Tomas Cejkad340dbf2013-03-24 20:36:57 +010029#include <fcntl.h>
30#include <assert.h>
Tomas Cejkaba21b382013-04-13 02:37:32 +020031#include <pthread.h>
32#include <libnetconf.h>
33#include <libwebsockets.h>
Tomas Cejkad340dbf2013-03-24 20:36:57 +010034#include "notification_module.h"
Tomas Cejkaba21b382013-04-13 02:37:32 +020035#include "mod_netconf.h"
Tomas Cejkad340dbf2013-03-24 20:36:57 +010036
37#ifndef TEST_NOTIFICATION_SERVER
38#include <httpd.h>
39#include <http_log.h>
Tomas Cejkaba21b382013-04-13 02:37:32 +020040#include <apr_hash.h>
41#include <apr_tables.h>
42
43#else
44static int force_exit = 0;
Tomas Cejkad340dbf2013-03-24 20:36:57 +010045#endif
46
47#if defined(TEST_NOTIFICATION_SERVER) || defined(WITH_NOTIFICATIONS)
Tomas Cejkad340dbf2013-03-24 20:36:57 +010048static int max_poll_elements;
49
50static struct pollfd *pollfds;
51static int *fd_lookup;
52static int count_pollfds;
Tomas Cejkad340dbf2013-03-24 20:36:57 +010053static struct libwebsocket_context *context = NULL;
Tomas Cejkad340dbf2013-03-24 20:36:57 +010054
Tomas Cejkaba21b382013-04-13 02:37:32 +020055struct ntf_thread_config {
56 struct nc_session *session;
57 char *session_hash;
58};
59
Tomas Cejka47387fd2013-06-10 20:37:46 +020060extern apr_hash_t *netconf_sessions_list;
Tomas Cejkaba21b382013-04-13 02:37:32 +020061static pthread_key_t thread_key;
62
Tomas Cejkad340dbf2013-03-24 20:36:57 +010063/*
64 * This demo server shows how to use libwebsockets for one or more
65 * websocket protocols in the same server
66 *
67 * It defines the following websocket protocols:
68 *
69 * dumb-increment-protocol: once the socket is opened, an incrementing
70 * ascii string is sent down it every 50ms.
71 * If you send "reset\n" on the websocket, then
72 * the incrementing number is reset to 0.
73 *
74 * lws-mirror-protocol: copies any received packet to every connection also
75 * using this protocol, including the sender
76 */
77
78enum demo_protocols {
79 /* always first */
80 PROTOCOL_HTTP = 0,
81
82 PROTOCOL_NOTIFICATION,
83
84 /* always last */
85 DEMO_PROTOCOL_COUNT
86};
87
88
89#define LOCAL_RESOURCE_PATH "."
90char *resource_path = LOCAL_RESOURCE_PATH;
91
92/*
93 * We take a strict whitelist approach to stop ../ attacks
94 */
95
96struct serveable {
97 const char *urlpath;
98 const char *mimetype;
Tomas Cejka15c56302013-05-30 01:11:30 +020099};
Tomas Cejkad340dbf2013-03-24 20:36:57 +0100100
101static const struct serveable whitelist[] = {
102 { "/favicon.ico", "image/x-icon" },
103 { "/libwebsockets.org-logo.png", "image/png" },
104
105 /* last one is the default served if no match */
106 { "/test.html", "text/html" },
107};
108
109struct per_session_data__http {
110 int fd;
111};
112
113/* this protocol server (always the first one) just knows how to do HTTP */
114
115static int callback_http(struct libwebsocket_context *context,
116 struct libwebsocket *wsi,
117 enum libwebsocket_callback_reasons reason, void *user,
118 void *in, size_t len)
119{
120 char client_name[128];
121 char client_ip[128];
122 char buf[256];
123 int n, m;
124 unsigned char *p;
125 static unsigned char buffer[4096];
126 struct stat stat_buf;
127 struct per_session_data__http *pss = (struct per_session_data__http *)user;
128 int fd = (int)(long)in;
129
130 switch (reason) {
131 case LWS_CALLBACK_HTTP:
132
133 /* check for the "send a big file by hand" example case */
134
135 if (!strcmp((const char *)in, "/leaf.jpg")) {
136 char leaf_path[1024];
137 snprintf(leaf_path, sizeof(leaf_path), "%s/leaf.jpg", resource_path);
138
139 /* well, let's demonstrate how to send the hard way */
140
141 p = buffer;
142
143 pss->fd = open(leaf_path, O_RDONLY);
144
145 if (pss->fd < 0)
146 return -1;
147
148 fstat(pss->fd, &stat_buf);
149
150 /*
151 * we will send a big jpeg file, but it could be
152 * anything. Set the Content-Type: appropriately
153 * so the browser knows what to do with it.
154 */
155
156 p += sprintf((char *)p,
157 "HTTP/1.0 200 OK\x0d\x0a"
158 "Server: libwebsockets\x0d\x0a"
159 "Content-Type: image/jpeg\x0d\x0a"
160 "Content-Length: %u\x0d\x0a\x0d\x0a",
161 (unsigned int)stat_buf.st_size);
162
163 /*
164 * send the http headers...
165 * this won't block since it's the first payload sent
166 * on the connection since it was established
167 * (too small for partial)
168 */
169
170 n = libwebsocket_write(wsi, buffer,
171 p - buffer, LWS_WRITE_HTTP);
172
173 if (n < 0) {
174 close(pss->fd);
175 return -1;
176 }
177 /*
178 * book us a LWS_CALLBACK_HTTP_WRITEABLE callback
179 */
180 libwebsocket_callback_on_writable(context, wsi);
181 break;
182 }
183
184 /* if not, send a file the easy way */
185
186 for (n = 0; n < (sizeof(whitelist) / sizeof(whitelist[0]) - 1); n++)
187 if (in && strcmp((const char *)in, whitelist[n].urlpath) == 0)
188 break;
189
190 sprintf(buf, "%s%s", resource_path, whitelist[n].urlpath);
191
192 if (libwebsockets_serve_http_file(context, wsi, buf, whitelist[n].mimetype))
193 return -1; /* through completion or error, close the socket */
194
195 /*
196 * notice that the sending of the file completes asynchronously,
197 * we'll get a LWS_CALLBACK_HTTP_FILE_COMPLETION callback when
198 * it's done
199 */
200
201 break;
202
203 case LWS_CALLBACK_HTTP_FILE_COMPLETION:
204// lwsl_info("LWS_CALLBACK_HTTP_FILE_COMPLETION seen\n");
205 /* kill the connection after we sent one file */
206 return -1;
207
208 case LWS_CALLBACK_HTTP_WRITEABLE:
209 /*
210 * we can send more of whatever it is we were sending
211 */
212
213 do {
214 n = read(pss->fd, buffer, sizeof buffer);
215 /* problem reading, close conn */
216 if (n < 0)
217 goto bail;
218 /* sent it all, close conn */
219 if (n == 0)
220 goto bail;
221 /*
222 * because it's HTTP and not websocket, don't need to take
223 * care about pre and postamble
224 */
225 m = libwebsocket_write(wsi, buffer, n, LWS_WRITE_HTTP);
226 if (m < 0)
227 /* write failed, close conn */
228 goto bail;
229 if (m != n)
230 /* partial write, adjust */
231 lseek(pss->fd, m - n, SEEK_CUR);
232
233 } while (!lws_send_pipe_choked(wsi));
234 libwebsocket_callback_on_writable(context, wsi);
235 break;
236
237bail:
238 close(pss->fd);
239 return -1;
240
241 /*
242 * callback for confirming to continue with client IP appear in
243 * protocol 0 callback since no websocket protocol has been agreed
244 * yet. You can just ignore this if you won't filter on client IP
245 * since the default uhandled callback return is 0 meaning let the
246 * connection continue.
247 */
248
249 case LWS_CALLBACK_FILTER_NETWORK_CONNECTION:
250 libwebsockets_get_peer_addresses(context, wsi, (int)(long)in, client_name,
251 sizeof(client_name), client_ip, sizeof(client_ip));
252
Tomas Cejkaba21b382013-04-13 02:37:32 +0200253 //fprintf(stderr, "Received network connect from %s (%s)\n", client_name, client_ip);
Tomas Cejkad340dbf2013-03-24 20:36:57 +0100254 /* if we returned non-zero from here, we kill the connection */
255 break;
256
257 /*
258 * callbacks for managing the external poll() array appear in
259 * protocol 0 callback
260 */
261
262 case LWS_CALLBACK_ADD_POLL_FD:
263
264 if (count_pollfds >= max_poll_elements) {
265 lwsl_err("LWS_CALLBACK_ADD_POLL_FD: too many sockets to track\n");
266 return 1;
267 }
268
269 fd_lookup[fd] = count_pollfds;
270 pollfds[count_pollfds].fd = fd;
271 pollfds[count_pollfds].events = (int)(long)len;
272 pollfds[count_pollfds++].revents = 0;
273 break;
274
275 case LWS_CALLBACK_DEL_POLL_FD:
276 if (!--count_pollfds)
277 break;
278 m = fd_lookup[fd];
279 /* have the last guy take up the vacant slot */
280 pollfds[m] = pollfds[count_pollfds];
281 fd_lookup[pollfds[count_pollfds].fd] = m;
282 break;
283
284 case LWS_CALLBACK_SET_MODE_POLL_FD:
285 pollfds[fd_lookup[fd]].events |= (int)(long)len;
286 break;
287
288 case LWS_CALLBACK_CLEAR_MODE_POLL_FD:
289 pollfds[fd_lookup[fd]].events &= ~(int)(long)len;
290 break;
291
292 default:
293 break;
294 }
295
296 return 0;
297}
298
Tomas Cejkaba21b382013-04-13 02:37:32 +0200299/**
Tomas Cejkad340dbf2013-03-24 20:36:57 +0100300 * this is just an example of parsing handshake headers, you don't need this
301 * in your code unless you will filter allowing connections by the header
302 * content
303 */
Tomas Cejkaba21b382013-04-13 02:37:32 +0200304//static void dump_handshake_info(struct libwebsocket *wsi)
305//{
306// int n;
307// static const char *token_names[WSI_TOKEN_COUNT] = {
308// /*[WSI_TOKEN_GET_URI] =*/ "GET URI",
309// /*[WSI_TOKEN_HOST] =*/ "Host",
310// /*[WSI_TOKEN_CONNECTION] =*/ "Connection",
311// /*[WSI_TOKEN_KEY1] =*/ "key 1",
312// /*[WSI_TOKEN_KEY2] =*/ "key 2",
313// /*[WSI_TOKEN_PROTOCOL] =*/ "Protocol",
314// /*[WSI_TOKEN_UPGRADE] =*/ "Upgrade",
315// /*[WSI_TOKEN_ORIGIN] =*/ "Origin",
316// /*[WSI_TOKEN_DRAFT] =*/ "Draft",
317// /*[WSI_TOKEN_CHALLENGE] =*/ "Challenge",
318//
319// /* new for 04 */
320// /*[WSI_TOKEN_KEY] =*/ "Key",
321// /*[WSI_TOKEN_VERSION] =*/ "Version",
322// /*[WSI_TOKEN_SWORIGIN] =*/ "Sworigin",
323//
324// /* new for 05 */
325// /*[WSI_TOKEN_EXTENSIONS] =*/ "Extensions",
326//
327// /* client receives these */
328// /*[WSI_TOKEN_ACCEPT] =*/ "Accept",
329// /*[WSI_TOKEN_NONCE] =*/ "Nonce",
330// /*[WSI_TOKEN_HTTP] =*/ "Http",
331// /*[WSI_TOKEN_MUXURL] =*/ "MuxURL",
332// };
333// char buf[256];
334//
335// for (n = 0; n < WSI_TOKEN_COUNT; n++) {
336// if (!lws_hdr_total_length(wsi, n))
337// continue;
338//
339// //lws_hdr_copy(wsi, buf, sizeof buf, n);
340//
341// //fprintf(stderr, " %s = %s\n", token_names[n], buf);
342// }
343//}
Tomas Cejkad340dbf2013-03-24 20:36:57 +0100344
345/* dumb_increment protocol */
346
347/*
348 * one of these is auto-created for each connection and a pointer to the
349 * appropriate instance is passed to the callback in the user parameter
350 *
351 * for this example protocol we use it to individualize the count for each
352 * connection.
353 */
354
Tomas Cejkaba21b382013-04-13 02:37:32 +0200355struct per_session_data__notif_client {
Tomas Cejkad340dbf2013-03-24 20:36:57 +0100356 int number;
Tomas Cejkaba21b382013-04-13 02:37:32 +0200357 char *session_key;
358 struct nc_session *session;
Tomas Cejkad340dbf2013-03-24 20:36:57 +0100359};
360
Tomas Cejkaba21b382013-04-13 02:37:32 +0200361struct session_with_mutex *get_ncsession_from_key(const char *session_key)
362{
363 struct session_with_mutex *locked_session = NULL;
364 if (session_key == NULL) {
365 return (NULL);
366 }
Tomas Cejka47387fd2013-06-10 20:37:46 +0200367 locked_session = (struct session_with_mutex *)apr_hash_get(netconf_sessions_list, session_key, APR_HASH_KEY_STRING);
Tomas Cejkaba21b382013-04-13 02:37:32 +0200368 return locked_session;
369}
370
371/* rpc parameter is freed after the function call */
372static int send_recv_process(struct nc_session *session, const char* operation, nc_rpc* rpc)
373{
374 nc_reply *reply = NULL;
375 char *data = NULL;
376 int ret = EXIT_SUCCESS;
377
378 /* send the request and get the reply */
379 switch (nc_session_send_recv(session, rpc, &reply)) {
380 case NC_MSG_UNKNOWN:
381 if (nc_session_get_status(session) != NC_SESSION_STATUS_WORKING) {
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100382 DEBUG("notifications: receiving rpc-reply failed.");
Tomas Cejkaba21b382013-04-13 02:37:32 +0200383 //cmd_disconnect(NULL);
384 ret = EXIT_FAILURE;
385 break;
386 }
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100387 DEBUG("notifications: Unknown error occurred.");
Tomas Cejkaba21b382013-04-13 02:37:32 +0200388 ret = EXIT_FAILURE;
389 break;
390 case NC_MSG_NONE:
391 /* error occurred, but processed by callback */
392 break;
393 case NC_MSG_REPLY:
394 switch (nc_reply_get_type(reply)) {
395 case NC_REPLY_OK:
396 break;
397 case NC_REPLY_DATA:
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100398 DEBUG("notifications: recv: %s.", data = nc_reply_get_data (reply));
399 free(data);
Tomas Cejkaba21b382013-04-13 02:37:32 +0200400 break;
401 case NC_REPLY_ERROR:
402 /* wtf, you shouldn't be here !?!? */
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100403 DEBUG("notifications: operation failed, but rpc-error was not processed.");
Tomas Cejkaba21b382013-04-13 02:37:32 +0200404 ret = EXIT_FAILURE;
405 break;
406 default:
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100407 DEBUG("notifications: unexpected operation result.");
Tomas Cejkaba21b382013-04-13 02:37:32 +0200408 ret = EXIT_FAILURE;
409 break;
410 }
411 break;
412 default:
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100413 DEBUG("notifications: Unknown error occurred.");
Tomas Cejkaba21b382013-04-13 02:37:32 +0200414 ret = EXIT_FAILURE;
415 break;
416 }
417 nc_rpc_free(rpc);
418 nc_reply_free(reply);
419
420 return (ret);
421}
422
423/**
424 * \brief Callback to store incoming notification
425 * \param [in] eventtime - time when notification occured
426 * \param [in] content - content of notification
427 */
428static void notification_fileprint (time_t eventtime, const char* content)
429{
Tomas Cejkaba21b382013-04-13 02:37:32 +0200430 struct session_with_mutex *target_session = NULL;
431 notification_t *ntf = NULL;
432 char *session_hash = NULL;
433
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100434 DEBUG("Accepted notif: %lu %s\n", (unsigned long int) eventtime, content);
Tomas Cejka15c56302013-05-30 01:11:30 +0200435
Tomas Cejkaba21b382013-04-13 02:37:32 +0200436 session_hash = pthread_getspecific(thread_key);
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100437 DEBUG("notification: fileprint getspecific (%s)", session_hash);
Tomas Cejkabdedcd32013-06-09 11:54:53 +0200438 if (pthread_rwlock_wrlock(&session_lock) != 0) {
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100439 DEBUG("Error while locking rwlock");
Tomas Cejkabdedcd32013-06-09 11:54:53 +0200440 return;
441 }
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100442 DEBUG("Get session with mutex from key %s.", session_hash);
Tomas Cejkaba21b382013-04-13 02:37:32 +0200443 target_session = get_ncsession_from_key(session_hash);
444 if (target_session == NULL) {
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100445 DEBUG("no session found last_session_key (%s)", session_hash);
Tomas Cejkabdedcd32013-06-09 11:54:53 +0200446 if (pthread_rwlock_unlock (&session_lock) != 0) {
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100447 DEBUG("Error while unlocking rwlock");
Tomas Cejkabdedcd32013-06-09 11:54:53 +0200448 return;
449 }
Tomas Cejkaba21b382013-04-13 02:37:32 +0200450 return;
451 }
Tomas Cejka47387fd2013-06-10 20:37:46 +0200452 if (pthread_mutex_lock(&target_session->lock) != 0) {
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100453 DEBUG("Error while locking rwlock");
Tomas Cejka47387fd2013-06-10 20:37:46 +0200454 }
455 if (pthread_rwlock_unlock(&session_lock) != 0) {
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100456 DEBUG("Error while locking rwlock");
Tomas Cejka47387fd2013-06-10 20:37:46 +0200457 }
Tomas Cejka15c56302013-05-30 01:11:30 +0200458
Tomas Cejkaba21b382013-04-13 02:37:32 +0200459 if (target_session->notifications == NULL) {
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100460 DEBUG("target_session->notifications is NULL");
Tomas Cejkaba21b382013-04-13 02:37:32 +0200461 if (pthread_mutex_unlock(&target_session->lock) != 0) {
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100462 DEBUG("Error while unlocking rwlock: %d (%s)", errno, strerror(errno));
Tomas Cejkaba21b382013-04-13 02:37:32 +0200463 return;
464 }
465 return;
466 }
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100467 DEBUG("notification: ready to push to notifications queue");
Tomas Cejkaba21b382013-04-13 02:37:32 +0200468 ntf = (notification_t *) apr_array_push(target_session->notifications);
469 if (ntf == NULL) {
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100470 DEBUG("Failed to allocate element ");
Tomas Cejkaba21b382013-04-13 02:37:32 +0200471 if (pthread_mutex_unlock(&target_session->lock) != 0) {
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100472 DEBUG("Error while unlocking rwlock");
Tomas Cejkaba21b382013-04-13 02:37:32 +0200473 return;
474 }
475 return;
476 }
Tomas Cejka73286932013-05-27 22:54:35 +0200477 ntf->eventtime = eventtime;
Tomas Cejkaba21b382013-04-13 02:37:32 +0200478 ntf->content = strdup(content);
479
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100480 DEBUG("added notif to queue %u (%s)", (unsigned int) ntf->eventtime, "notification");
Tomas Cejkaba21b382013-04-13 02:37:32 +0200481
482 if (pthread_mutex_unlock(&target_session->lock) != 0) {
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100483 DEBUG("Error while unlocking rwlock");
Tomas Cejkaba21b382013-04-13 02:37:32 +0200484 }
485}
486
487/**
488 * \brief Thread for libnetconf notifications dispatch
489 * \param [in] arg - struct ntf_thread_config * with nc_session
490 */
491void* notification_thread(void* arg)
492{
493 struct ntf_thread_config *config = (struct ntf_thread_config*)arg;
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100494 DEBUG("notifications: in thread for libnetconf notifications");
Tomas Cejka15c56302013-05-30 01:11:30 +0200495
496 /* store hash identification of netconf session for notifications printing callback */
497 if (pthread_setspecific(thread_key, config->session_hash) != 0) {
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100498 DEBUG("notifications: cannot set thread-specific hash value.");
Tomas Cejkaba21b382013-04-13 02:37:32 +0200499 }
Tomas Cejka15c56302013-05-30 01:11:30 +0200500
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100501 DEBUG("notifications: dispatching");
Tomas Cejkaba21b382013-04-13 02:37:32 +0200502 ncntf_dispatch_receive(config->session, notification_fileprint);
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100503 DEBUG("notifications: ended thread for libnetconf notifications");
504 if (config->session_hash != NULL) {
505 free(config->session_hash);
506 }
507 if (config != NULL) {
508 free(config);
509 }
Tomas Cejkaba21b382013-04-13 02:37:32 +0200510 return (NULL);
511}
512
513
514int notif_subscribe(struct session_with_mutex *locked_session, const char *session_hash, time_t start_time, time_t stop_time)
515{
516 time_t start = -1;
517 time_t stop = -1;
518 struct nc_filter *filter = NULL;
519 char *stream = NULL;
520 nc_rpc *rpc = NULL;
521 pthread_t thread;
522 struct ntf_thread_config *tconfig;
523 struct nc_session *session;
524
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100525 DEBUG("notif_subscribe");
Tomas Cejkaba21b382013-04-13 02:37:32 +0200526 if (locked_session == NULL) {
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100527 DEBUG("notifications: no locked_session was given.");
528 DEBUG("Close notification client");
Tomas Cejka47387fd2013-06-10 20:37:46 +0200529 return -1;
Tomas Cejkaba21b382013-04-13 02:37:32 +0200530 }
531
Tomas Cejka47387fd2013-06-10 20:37:46 +0200532 pthread_mutex_lock(&locked_session->lock);
Tomas Cejkaba21b382013-04-13 02:37:32 +0200533 session = locked_session->session;
534
535 start = time(NULL) + start_time;
536 stop = time(NULL) + stop_time;
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100537 DEBUG("notifications: history: %u %u", (unsigned int) start, (unsigned int) stop);
Tomas Cejkaba21b382013-04-13 02:37:32 +0200538
539 if (session == NULL) {
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100540 DEBUG("notifications: NETCONF session not established.");
Tomas Cejka5ce57b62013-08-29 17:47:39 +0200541 goto operation_failed;
Tomas Cejkaba21b382013-04-13 02:37:32 +0200542 }
543
544 /* check if notifications are allowed on this session */
545 if (nc_session_notif_allowed(session) == 0) {
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100546 DEBUG("notifications: Notification subscription is not allowed on this session.");
Tomas Cejka5ce57b62013-08-29 17:47:39 +0200547 goto operation_failed;
Tomas Cejkaba21b382013-04-13 02:37:32 +0200548 }
549 /* check times */
550 if (start != -1 && stop != -1 && start > stop) {
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100551 DEBUG("notifications: Subscription start time must be lower than the end time.");
Tomas Cejka5ce57b62013-08-29 17:47:39 +0200552 goto operation_failed;
Tomas Cejkaba21b382013-04-13 02:37:32 +0200553 }
554
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100555 DEBUG("Prepare to execute subscription.");
Tomas Cejkaba21b382013-04-13 02:37:32 +0200556 /* create requests */
557 rpc = nc_rpc_subscribe(stream, filter, (start_time == 0)?NULL:&start, (stop_time == 0)?NULL:&stop);
558 nc_filter_free(filter);
559 if (rpc == NULL) {
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100560 DEBUG("notifications: creating an rpc request failed.");
Tomas Cejka5ce57b62013-08-29 17:47:39 +0200561 goto operation_failed;
Tomas Cejkaba21b382013-04-13 02:37:32 +0200562 }
563
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100564 DEBUG("Send NC subscribe.");
Tomas Cejka442258e2014-04-01 18:17:18 +0200565 create_err_reply_p();
Tomas Cejkaba21b382013-04-13 02:37:32 +0200566 if (send_recv_process(session, "subscribe", rpc) != 0) {
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100567 DEBUG("Subscription RPC failed.");
Tomas Cejka5ce57b62013-08-29 17:47:39 +0200568 goto operation_failed;
Tomas Cejkaba21b382013-04-13 02:37:32 +0200569 }
Tomas Cejka442258e2014-04-01 18:17:18 +0200570
571 GETSPEC_ERR_REPLY
572 if (err_reply != NULL) {
573 free_err_reply();
574 DEBUG("RPC-Error received and cleaned, because we can't send it anywhere.");
575 goto operation_failed;
576 }
577
Tomas Cejkaba21b382013-04-13 02:37:32 +0200578 rpc = NULL; /* just note that rpc is already freed by send_recv_process() */
Tomas Cejka654f84e2013-04-19 11:55:01 +0200579 locked_session->ntfc_subscribed = 1;
Tomas Cejkaba21b382013-04-13 02:37:32 +0200580
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100581 DEBUG("Create config for notification_thread.");
Tomas Cejkaba21b382013-04-13 02:37:32 +0200582 tconfig = malloc(sizeof(struct ntf_thread_config));
583 tconfig->session = session;
584 tconfig->session_hash = strdup(session_hash);
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100585 DEBUG("notifications: creating libnetconf notification thread (%s).", tconfig->session_hash);
Tomas Cejka654f84e2013-04-19 11:55:01 +0200586
Tomas Cejka47387fd2013-06-10 20:37:46 +0200587 pthread_mutex_unlock(&locked_session->lock);
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100588 DEBUG("Create notification_thread.");
Tomas Cejkaba21b382013-04-13 02:37:32 +0200589 if (pthread_create(&thread, NULL, notification_thread, tconfig) != 0) {
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100590 DEBUG("notifications: creating a thread for receiving notifications failed");
Tomas Cejka47387fd2013-06-10 20:37:46 +0200591 return -1;
Tomas Cejkaba21b382013-04-13 02:37:32 +0200592 }
593 pthread_detach(thread);
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100594 DEBUG("Subscription finished.");
Tomas Cejka47387fd2013-06-10 20:37:46 +0200595 return 0;
Tomas Cejka5ce57b62013-08-29 17:47:39 +0200596
597operation_failed:
598 pthread_mutex_unlock(&locked_session->lock);
599 return -1;
Tomas Cejkaba21b382013-04-13 02:37:32 +0200600}
Tomas Cejkad340dbf2013-03-24 20:36:57 +0100601
602static int callback_notification(struct libwebsocket_context *context,
603 struct libwebsocket *wsi,
604 enum libwebsocket_callback_reasons reason,
Tomas Cejkaba21b382013-04-13 02:37:32 +0200605 void *user, void *in, size_t len)
Tomas Cejkad340dbf2013-03-24 20:36:57 +0100606{
Tomas Cejkaba21b382013-04-13 02:37:32 +0200607 int n = 0;
608 int m = 0;
Tomas Cejka47387fd2013-06-10 20:37:46 +0200609 unsigned char buf[LWS_SEND_BUFFER_PRE_PADDING + 40960 + LWS_SEND_BUFFER_POST_PADDING];
Tomas Cejkad340dbf2013-03-24 20:36:57 +0100610 unsigned char *p = &buf[LWS_SEND_BUFFER_PRE_PADDING];
Tomas Cejkaba21b382013-04-13 02:37:32 +0200611 struct per_session_data__notif_client *pss = (struct per_session_data__notif_client *)user;
612
Tomas Cejkad340dbf2013-03-24 20:36:57 +0100613 switch (reason) {
Tomas Cejkad340dbf2013-03-24 20:36:57 +0100614 case LWS_CALLBACK_ESTABLISHED:
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100615 DEBUG("notification client connected.");
Tomas Cejkad340dbf2013-03-24 20:36:57 +0100616 break;
617
618 case LWS_CALLBACK_SERVER_WRITEABLE:
Tomas Cejkaba21b382013-04-13 02:37:32 +0200619 if (pss->session_key == NULL) {
620 return 0;
621 }
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100622 //DEBUG("Callback server writeable.");
623 //DEBUG("lock session lock.");
Tomas Cejka47387fd2013-06-10 20:37:46 +0200624 if (pthread_rwlock_wrlock (&session_lock) != 0) {
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100625 DEBUG("Error while unlocking rwlock: %d (%s)", errno, strerror(errno));
Tomas Cejka47387fd2013-06-10 20:37:46 +0200626 return -1;
627 }
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100628 //DEBUG("get session_with_mutex for %s.", pss->session_key);
Tomas Cejkaba21b382013-04-13 02:37:32 +0200629 struct session_with_mutex *ls = get_ncsession_from_key(pss->session_key);
630 if (ls == NULL) {
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100631 DEBUG("notification: session not found");
Tomas Cejka47387fd2013-06-10 20:37:46 +0200632 if (pthread_rwlock_unlock (&session_lock) != 0) {
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100633 DEBUG("Error while unlocking rwlock: %d (%s)", errno, strerror(errno));
Tomas Cejka47387fd2013-06-10 20:37:46 +0200634 return -1;
635 }
Tomas Cejkaba21b382013-04-13 02:37:32 +0200636 return -1;
637 }
Tomas Cejka47387fd2013-06-10 20:37:46 +0200638 pthread_mutex_lock(&ls->lock);
639 if (pthread_rwlock_unlock (&session_lock) != 0) {
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100640 DEBUG("Error while unlocking rwlock: %d (%s)", errno, strerror(errno));
Tomas Cejkaba21b382013-04-13 02:37:32 +0200641 }
Tomas Cejkaba21b382013-04-13 02:37:32 +0200642
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100643 //DEBUG("check for closed session.");
Tomas Cejka47387fd2013-06-10 20:37:46 +0200644 if (ls->closed == 1) {
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100645 DEBUG("unlock session key.");
Tomas Cejka47387fd2013-06-10 20:37:46 +0200646 if (pthread_rwlock_unlock (&session_lock) != 0) {
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100647 DEBUG("Error while unlocking unlock: %d (%s)", errno, strerror(errno));
Tomas Cejka47387fd2013-06-10 20:37:46 +0200648 return -1;
Tomas Cejka654f84e2013-04-19 11:55:01 +0200649 }
Tomas Cejka47387fd2013-06-10 20:37:46 +0200650 return -1;
651 }
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100652 //DEBUG("lock private lock.");
Tomas Cejka47387fd2013-06-10 20:37:46 +0200653 notification_t *notif = NULL;
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100654 //DEBUG("check for uninitialized notification list.");
Tomas Cejka47387fd2013-06-10 20:37:46 +0200655 if (ls->notifications == NULL) {
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100656 DEBUG("notification: no notifications array");
657 DEBUG("unlock private lock.");
Tomas Cejka47387fd2013-06-10 20:37:46 +0200658 if (pthread_mutex_unlock(&ls->lock) != 0) {
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100659 DEBUG("notification: cannot unlock session");
Tomas Cejka47387fd2013-06-10 20:37:46 +0200660 }
661 return -1;
662 }
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100663 //DEBUG("check for empty notification list.");
Tomas Cejka47387fd2013-06-10 20:37:46 +0200664 if (!apr_is_empty_array(ls->notifications)) {
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100665 DEBUG("notification: POP notifications for session");
Tomas Cejkaba21b382013-04-13 02:37:32 +0200666
Tomas Cejka654f84e2013-04-19 11:55:01 +0200667 while ((notif = (notification_t *) apr_array_pop(ls->notifications)) != NULL) {
Tomas Cejka654f84e2013-04-19 11:55:01 +0200668 n = 0;
Tomas Cejka442258e2014-04-01 18:17:18 +0200669 pthread_mutex_lock(&json_lock);
Tomas Cejka73286932013-05-27 22:54:35 +0200670 json_object *notif_json = json_object_new_object();
Tomas Cejka8800d652013-07-16 10:47:08 +0200671 json_object_object_add(notif_json, "eventtime", json_object_new_int64(notif->eventtime));
Tomas Cejka73286932013-05-27 22:54:35 +0200672 json_object_object_add(notif_json, "content", json_object_new_string(notif->content));
Tomas Cejka442258e2014-04-01 18:17:18 +0200673 pthread_mutex_unlock(&json_lock);
Tomas Cejka73286932013-05-27 22:54:35 +0200674
Tomas Cejka00635972013-06-03 15:10:52 +0200675 const char *msgtext = json_object_to_json_string(notif_json);
Tomas Cejka15c56302013-05-30 01:11:30 +0200676
Tomas Cejka47387fd2013-06-10 20:37:46 +0200677 //n = sprintf((char *)p, "{\"eventtime\": \"%s\", \"content\": \"notification\"}", t);
Tomas Cejka15c56302013-05-30 01:11:30 +0200678 n = sprintf((char *)p, "%s", msgtext);
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100679 DEBUG("ws send %dB in %lu", n, sizeof(buf));
Tomas Cejka15c56302013-05-30 01:11:30 +0200680 m = libwebsocket_write(wsi, p, n, LWS_WRITE_TEXT);
Tomas Cejka47387fd2013-06-10 20:37:46 +0200681 if (lws_send_pipe_choked(wsi)) {
682 libwebsocket_callback_on_writable(context, wsi);
683 break;
684 }
Tomas Cejka15c56302013-05-30 01:11:30 +0200685
Tomas Cejka442258e2014-04-01 18:17:18 +0200686 pthread_mutex_lock(&json_lock);
Tomas Cejka8a82dab2013-05-30 23:37:23 +0200687 json_object_put(notif_json);
Tomas Cejka442258e2014-04-01 18:17:18 +0200688 pthread_mutex_unlock(&json_lock);
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100689 free(notif->content);
Tomas Cejka654f84e2013-04-19 11:55:01 +0200690 }
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100691 DEBUG("notification: POP notifications done");
Tomas Cejkaba21b382013-04-13 02:37:32 +0200692 }
693
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100694 //DEBUG("unlock private lock");
Tomas Cejkaba21b382013-04-13 02:37:32 +0200695 if (pthread_mutex_unlock(&ls->lock) != 0) {
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100696 DEBUG("notification: cannot unlock session");
Tomas Cejkaba21b382013-04-13 02:37:32 +0200697 }
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100698 //DEBUG("unlock session lock");
Tomas Cejkaba21b382013-04-13 02:37:32 +0200699
Tomas Cejkad340dbf2013-03-24 20:36:57 +0100700 if (m < n) {
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100701 DEBUG("ERROR %d writing to di socket.", n);
Tomas Cejka15c56302013-05-30 01:11:30 +0200702
Tomas Cejkad340dbf2013-03-24 20:36:57 +0100703 return -1;
704 }
Tomas Cejkad340dbf2013-03-24 20:36:57 +0100705 break;
706
707 case LWS_CALLBACK_RECEIVE:
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100708 DEBUG("Callback receive.");
709 DEBUG("received: (%s)", (char *)in);
Tomas Cejkaba21b382013-04-13 02:37:32 +0200710 if (pss->session_key == NULL) {
711 char session_key_buf[41];
712 int start = -1;
713 time_t stop = time(NULL) + 30;
714
715 strncpy((char *) session_key_buf, (const char *) in, 40);
716 session_key_buf[40] = '\0';
717 pss->session_key = strdup(session_key_buf);
718 sscanf(in+40, "%d %d", (int *) &start, (int *) &stop);
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100719 DEBUG("notification: get key (%s) from (%s) (%i,%i)", pss->session_key, (char *) in, (int) start, (int) stop);
Tomas Cejka15c56302013-05-30 01:11:30 +0200720
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100721 DEBUG("lock session lock");
Tomas Cejkabdedcd32013-06-09 11:54:53 +0200722 if (pthread_rwlock_rdlock (&session_lock) != 0) {
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100723 DEBUG("Error while locking rwlock: %d (%s)", errno, strerror(errno));
Tomas Cejkabdedcd32013-06-09 11:54:53 +0200724 return -1;
725 }
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100726 DEBUG("get session from key (%s)", pss->session_key);
Tomas Cejkaba21b382013-04-13 02:37:32 +0200727 struct session_with_mutex *ls = get_ncsession_from_key(pss->session_key);
728 if (ls == NULL) {
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100729 DEBUG("notification: session_key not found (%s)", pss->session_key);
730 DEBUG("unlock session lock");
Tomas Cejkabdedcd32013-06-09 11:54:53 +0200731 if (pthread_rwlock_unlock (&session_lock) != 0) {
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100732 DEBUG("Error while unlocking rwlock: %d (%s)", errno, strerror(errno));
Tomas Cejkabdedcd32013-06-09 11:54:53 +0200733 }
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100734 DEBUG("Close notification client");
Tomas Cejkabdedcd32013-06-09 11:54:53 +0200735 return -1;
736 }
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100737 DEBUG("lock private lock");
Tomas Cejka47387fd2013-06-10 20:37:46 +0200738 pthread_mutex_lock(&ls->lock);
739
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100740 DEBUG("unlock session lock");
Tomas Cejka47387fd2013-06-10 20:37:46 +0200741 if (pthread_rwlock_unlock (&session_lock) != 0) {
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100742 DEBUG("Error while unlocking rwlock: %d (%s)", errno, strerror(errno));
Tomas Cejka47387fd2013-06-10 20:37:46 +0200743 }
744
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100745 DEBUG("Found session to subscribe notif.");
Tomas Cejkabdedcd32013-06-09 11:54:53 +0200746 if (ls->closed == 1) {
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100747 DEBUG("session already closed - handle no notification");
748 DEBUG("unlock private lock");
Tomas Cejka47387fd2013-06-10 20:37:46 +0200749 pthread_mutex_unlock(&ls->lock);
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100750 DEBUG("Close notification client");
Tomas Cejkabdedcd32013-06-09 11:54:53 +0200751 return -1;
Tomas Cejkaba21b382013-04-13 02:37:32 +0200752 }
Tomas Cejka654f84e2013-04-19 11:55:01 +0200753 if (ls->ntfc_subscribed != 0) {
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100754 DEBUG("notification: already subscribed");
755 DEBUG("unlock private lock");
Tomas Cejka47387fd2013-06-10 20:37:46 +0200756 pthread_mutex_unlock(&ls->lock);
Tomas Cejkabdedcd32013-06-09 11:54:53 +0200757 /* do not close client, only do not subscribe again */
Tomas Cejka654f84e2013-04-19 11:55:01 +0200758 return 0;
759 }
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100760 DEBUG("notification: prepare to subscribe stream");
761 DEBUG("unlock session lock");
Tomas Cejka47387fd2013-06-10 20:37:46 +0200762 pthread_mutex_unlock(&ls->lock);
763
764 /* notif_subscribe locks on its own */
Tomas Cejkabdedcd32013-06-09 11:54:53 +0200765 return notif_subscribe(ls, pss->session_key, (time_t) start, (time_t) stop);
Tomas Cejkaba21b382013-04-13 02:37:32 +0200766 }
Tomas Cejkad340dbf2013-03-24 20:36:57 +0100767 if (len < 6)
768 break;
Tomas Cejkad340dbf2013-03-24 20:36:57 +0100769 break;
770 /*
771 * this just demonstrates how to use the protocol filter. If you won't
772 * study and reject connections based on header content, you don't need
773 * to handle this callback
774 */
775
776 case LWS_CALLBACK_FILTER_PROTOCOL_CONNECTION:
777 //dump_handshake_info(wsi);
778 /* you could return non-zero here and kill the connection */
779 break;
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100780 //gives segfailt :-(
781 //case LWS_CALLBACK_CLOSED:
782 // if (pss->session_key != NULL) {
783 // free(pss->session_key);
784 // }
785 // if (pss != NULL) {
786 // free(pss);
787 // }
Tomas Cejkad340dbf2013-03-24 20:36:57 +0100788
789 default:
790 break;
791 }
792
793 return 0;
794}
795
796/* list of supported protocols and callbacks */
797
798static struct libwebsocket_protocols protocols[] = {
799 /* first protocol must always be HTTP handler */
800
801 {
802 "http-only", /* name */
803 callback_http, /* callback */
804 sizeof (struct per_session_data__http), /* per_session_data_size */
805 0, /* max frame size / rx buffer */
806 },
807 {
808 "notification-protocol",
809 callback_notification,
Tomas Cejkaba21b382013-04-13 02:37:32 +0200810 sizeof(struct per_session_data__notif_client),
Tomas Cejka47387fd2013-06-10 20:37:46 +0200811 4000,
Tomas Cejkad340dbf2013-03-24 20:36:57 +0100812 },
813 { NULL, NULL, 0, 0 } /* terminator */
814};
815
816
Tomas Cejkaba21b382013-04-13 02:37:32 +0200817/**
818 * initialization of notification module
819 */
Tomas Cejka47387fd2013-06-10 20:37:46 +0200820int notification_init(apr_pool_t * pool, server_rec * server)
Tomas Cejkad340dbf2013-03-24 20:36:57 +0100821{
Tomas Cejkaba21b382013-04-13 02:37:32 +0200822 //char cert_path[1024];
823 //char key_path[1024];
824 //int use_ssl = 0;
Tomas Cejkad340dbf2013-03-24 20:36:57 +0100825 struct lws_context_creation_info info;
826 int opts = 0;
Tomas Cejkaba21b382013-04-13 02:37:32 +0200827 //char interface_name[128] = "";
Tomas Cejkad340dbf2013-03-24 20:36:57 +0100828 const char *iface = NULL;
829 int debug_level = 7;
830
831 memset(&info, 0, sizeof info);
832 info.port = NOTIFICATION_SERVER_PORT;
833
834 /* tell the library what debug level to emit and to send it to syslog */
835 lws_set_log_level(debug_level, lwsl_emit_syslog);
836
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100837 DEBUG("Initialization of libwebsocket");
Tomas Cejka15c56302013-05-30 01:11:30 +0200838 //lwsl_notice("libwebsockets test server - "
839 // "(C) Copyright 2010-2013 Andy Green <andy@warmcat.com> - "
840 // "licensed under LGPL2.1\n");
Tomas Cejkad340dbf2013-03-24 20:36:57 +0100841 max_poll_elements = getdtablesize();
842 pollfds = malloc(max_poll_elements * sizeof (struct pollfd));
843 fd_lookup = malloc(max_poll_elements * sizeof (int));
844 if (pollfds == NULL || fd_lookup == NULL) {
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100845 DEBUG("Out of memory pollfds=%d\n", max_poll_elements);
Tomas Cejkad340dbf2013-03-24 20:36:57 +0100846 return -1;
847 }
848
849 info.iface = iface;
850 info.protocols = protocols;
851
852 //snprintf(cert_path, sizeof(cert_path), "%s/libwebsockets-test-server.pem", resource_path);
853 //snprintf(key_path, sizeof(cert_path), "%s/libwebsockets-test-server.key.pem", resource_path);
854
855 //info.ssl_cert_filepath = cert_path;
856 //info.ssl_private_key_filepath = key_path;
857
858 info.gid = -1;
859 info.uid = -1;
860 info.options = opts;
861
862 /* create server */
863 context = libwebsocket_create_context(&info);
864 if (context == NULL) {
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100865 DEBUG("libwebsocket init failed.");
Tomas Cejkad340dbf2013-03-24 20:36:57 +0100866 return -1;
867 }
Tomas Cejka15c56302013-05-30 01:11:30 +0200868
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100869 DEBUG("notifications: init of pthread_key_create.");
Tomas Cejka15c56302013-05-30 01:11:30 +0200870 if (pthread_key_create(&thread_key, NULL) != 0) {
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100871 DEBUG("notifications: pthread_key_create failed");
Tomas Cejka15c56302013-05-30 01:11:30 +0200872 }
Tomas Cejkaba21b382013-04-13 02:37:32 +0200873 return 0;
Tomas Cejkad340dbf2013-03-24 20:36:57 +0100874}
875
876void notification_close()
877{
878 libwebsocket_context_destroy(context);
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100879 free(pollfds);
880 free(fd_lookup);
Tomas Cejkad340dbf2013-03-24 20:36:57 +0100881
Tomas Cejkaef531ee2013-11-12 16:07:00 +0100882 DEBUG("libwebsockets-test-server exited cleanly\n");
Tomas Cejkad340dbf2013-03-24 20:36:57 +0100883}
884
Tomas Cejkaba21b382013-04-13 02:37:32 +0200885
Tomas Cejkad340dbf2013-03-24 20:36:57 +0100886/**
887 * \brief send notification if any
888 * \return < 0 on error
889 */
890int notification_handle()
891{
892 static struct timeval tv;
893 static unsigned int olds = 0;
894 int n = 0;
895
896 gettimeofday(&tv, NULL);
897
898 /*
899 * This provokes the LWS_CALLBACK_SERVER_WRITEABLE for every
900 * live websocket connection using the DUMB_INCREMENT protocol,
901 * as soon as it can take more packets (usually immediately)
902 */
903
904 if (((unsigned int)tv.tv_sec - olds) > 0) {
905 libwebsocket_callback_on_writable_all_protocol(&protocols[PROTOCOL_NOTIFICATION]);
906 olds = tv.tv_sec;
907 }
908
909
910 /*
911 * this represents an existing server's single poll action
912 * which also includes libwebsocket sockets
913 */
914
915 n = poll(pollfds, count_pollfds, 50);
916 if (n < 0)
917 return n;
918
919
920 if (n) {
921 for (n = 0; n < count_pollfds; n++) {
922 if (pollfds[n].revents) {
923 /*
924 * returns immediately if the fd does not
925 * match anything under libwebsockets
926 * control
927 */
928 if (libwebsocket_service_fd(context, &pollfds[n]) < 0) {
929 return 1;
930 }
931 }
932 }
933 }
934 return 0;
935}
936
937#endif
938
939
940#ifndef WITH_NOTIFICATIONS
941#ifdef TEST_NOTIFICATION_SERVER
942int main(int argc, char **argv)
943{
Tomas Cejkad340dbf2013-03-24 20:36:57 +0100944 if (notification_init(NULL, NULL) == -1) {
945 fprintf(stderr, "Error during initialization\n");
946 return 1;
947 }
948 while (!force_exit) {
949 notification_handle();
950 }
951 notification_close();
952}
953#endif
954#endif