diff options
| author | Garrett D'Amore <garrett@damore.org> | 2018-05-22 10:27:47 -0700 |
|---|---|---|
| committer | Garrett D'Amore <garrett@damore.org> | 2018-05-22 10:29:06 -0700 |
| commit | 959eabe2675a3b8be9bc2b2459cc899a5a64b283 (patch) | |
| tree | 373fba9ab3c7cf4c769efb1c42f896694bf16d25 /src/supplemental/websocket/websocket.c | |
| parent | 67f5ed6e5c0dd7bdd9002bbb519ab34f35fef8dd (diff) | |
| download | nng-959eabe2675a3b8be9bc2b2459cc899a5a64b283.tar.gz nng-959eabe2675a3b8be9bc2b2459cc899a5a64b283.tar.bz2 nng-959eabe2675a3b8be9bc2b2459cc899a5a64b283.zip | |
fixes #474 websocket listen on ws://*:<x> fails
fixes #464 Support NN_WS_MSG_TYPE option (compat)
fixes #415 websocket does not honor recv maxsize
This fixes a significant (and security) issue in websocket, where the
code does not honor a maximum receive size. We've exposed new API
(internal) to set the limit on the frame size, and we've changed the
default to *unlimited* for that internal API. (But the default for SP
sockets, which are the only consumers at present, is still 1MB just like
all other SP transports.)
Diffstat (limited to 'src/supplemental/websocket/websocket.c')
| -rw-r--r-- | src/supplemental/websocket/websocket.c | 46 |
1 files changed, 33 insertions, 13 deletions
diff --git a/src/supplemental/websocket/websocket.c b/src/supplemental/websocket/websocket.c index 6d4d3c13..18491190 100644 --- a/src/supplemental/websocket/websocket.c +++ b/src/supplemental/websocket/websocket.c @@ -75,6 +75,7 @@ struct nni_ws_listener { nni_ws_listen_hook hookfn; void * hookarg; nni_list headers; // response headers + size_t maxframe; }; // The dialer tracks user aios in two lists. The first list is for aios @@ -94,6 +95,7 @@ struct nni_ws_dialer { bool closed; nng_sockaddr sa; nni_list headers; // request headers + size_t maxframe; }; typedef enum ws_type { @@ -945,7 +947,7 @@ ws_read_cb(void *arg) break; } - if (frame->len > ws->maxframe) { + if ((frame->len > ws->maxframe) && (ws->maxframe > 0)) { ws_close(ws, WS_CLOSE_TOO_BIG); nni_mtx_unlock(&ws->mtx); return; @@ -1380,7 +1382,6 @@ ws_init(nni_ws **wsp) nni_aio_set_timeout(ws->httpaio, 2000); ws->fragsize = 1 << 20; // we won't send a frame larger than this - ws->maxframe = (1 << 20) * 10; // default limit on incoming frame size *wsp = ws; return (0); } @@ -1557,12 +1558,13 @@ ws_handler(nni_aio *aio) status = NNG_HTTP_STATUS_INTERNAL_SERVER_ERROR; goto err; } - ws->http = conn; - ws->req = req; - ws->res = res; - ws->mode = NNI_EP_MODE_LISTEN; + ws->http = conn; + ws->req = req; + ws->res = res; + ws->mode = NNI_EP_MODE_LISTEN; + ws->maxframe = l->maxframe; - // XXX: Inherit fragmentation and message size limits! + // XXX: Inherit fragmentation? (Frag is limited for now). nni_list_append(&l->reply, ws); nni_aio_set_data(ws->httpaio, 0, l); @@ -1621,7 +1623,8 @@ nni_ws_listener_init(nni_ws_listener **wslp, nni_url *url) return (rv); } - *wslp = l; + l->maxframe = 0; + *wslp = l; return (0); } @@ -1785,6 +1788,14 @@ nni_ws_listener_get_tls(nni_ws_listener *l, nng_tls_config **tlsp) } void +nni_ws_listener_set_maxframe(nni_ws_listener *l, size_t maxframe) +{ + nni_mtx_lock(&l->mtx); + l->maxframe = maxframe; + nni_mtx_unlock(&l->mtx); +} + +void ws_conn_cb(void *arg) { nni_ws_dialer *d; @@ -1920,8 +1931,8 @@ nni_ws_dialer_init(nni_ws_dialer **dp, nni_url *url) nni_ws_dialer_fini(d); return (rv); } - - *dp = d; + d->maxframe = 0; + *dp = d; return (0); } @@ -2021,9 +2032,10 @@ nni_ws_dialer_dial(nni_ws_dialer *d, nni_aio *aio) ws_fini(ws); return; } - ws->dialer = d; - ws->useraio = aio; - ws->mode = NNI_EP_MODE_DIAL; + ws->dialer = d; + ws->useraio = aio; + ws->mode = NNI_EP_MODE_DIAL; + ws->maxframe = d->maxframe; nni_list_append(&d->wspend, ws); nni_http_client_connect(d->client, ws->connaio); nni_mtx_unlock(&d->mtx); @@ -2071,6 +2083,14 @@ nni_ws_dialer_header(nni_ws_dialer *d, const char *n, const char *v) return (rv); } +void +nni_ws_dialer_set_maxframe(nni_ws_dialer *d, size_t maxframe) +{ + nni_mtx_lock(&d->mtx); + d->maxframe = maxframe; + nni_mtx_unlock(&d->mtx); +} + // Dialer does not get a hook chance, as it can examine the request // and reply after dial is done; this is not a 3-way handshake, so // the dialer does not confirm the server's response at the HTTP |
