opal-up 0.0.4 → 0.0.5
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/ext/up_ext/App.h +665 -544
- data/ext/up_ext/AsyncSocket.h +307 -284
- data/ext/up_ext/AsyncSocketData.h +35 -51
- data/ext/up_ext/BloomFilter.h +37 -42
- data/ext/up_ext/ChunkedEncoding.h +174 -175
- data/ext/up_ext/ClientApp.h +20 -23
- data/ext/up_ext/HttpContext.h +476 -381
- data/ext/up_ext/HttpContextData.h +20 -20
- data/ext/up_ext/HttpErrors.h +14 -10
- data/ext/up_ext/HttpParser.h +631 -563
- data/ext/up_ext/HttpResponse.h +526 -460
- data/ext/up_ext/HttpResponseData.h +59 -55
- data/ext/up_ext/HttpRouter.h +328 -310
- data/ext/up_ext/Loop.h +174 -168
- data/ext/up_ext/LoopData.h +60 -67
- data/ext/up_ext/MoveOnlyFunction.h +71 -80
- data/ext/up_ext/PerMessageDeflate.h +218 -198
- data/ext/up_ext/ProxyParser.h +100 -99
- data/ext/up_ext/QueryParser.h +91 -84
- data/ext/up_ext/TopicTree.h +273 -268
- data/ext/up_ext/Utilities.h +25 -25
- data/ext/up_ext/WebSocket.h +376 -310
- data/ext/up_ext/WebSocketContext.h +487 -372
- data/ext/up_ext/WebSocketContextData.h +74 -62
- data/ext/up_ext/WebSocketData.h +53 -46
- data/ext/up_ext/WebSocketExtensions.h +194 -178
- data/ext/up_ext/WebSocketHandshake.h +115 -110
- data/ext/up_ext/WebSocketProtocol.h +441 -398
- data/ext/up_ext/up_ext.c +43 -5
- data/lib/up/ruby/cluster.rb +29 -6
- data/lib/up/version.rb +1 -1
- metadata +2 -2
data/ext/up_ext/WebSocket.h
CHANGED
@@ -18,10 +18,10 @@
|
|
18
18
|
#ifndef UWS_WEBSOCKET_H
|
19
19
|
#define UWS_WEBSOCKET_H
|
20
20
|
|
21
|
-
#include "WebSocketData.h"
|
22
|
-
#include "WebSocketProtocol.h"
|
23
21
|
#include "AsyncSocket.h"
|
24
22
|
#include "WebSocketContextData.h"
|
23
|
+
#include "WebSocketData.h"
|
24
|
+
#include "WebSocketProtocol.h"
|
25
25
|
|
26
26
|
#include <string_view>
|
27
27
|
|
@@ -29,353 +29,419 @@ namespace uWS {
|
|
29
29
|
|
30
30
|
template <bool SSL, bool isServer, typename USERDATA>
|
31
31
|
struct WebSocket : AsyncSocket<SSL> {
|
32
|
-
|
33
|
-
|
34
|
-
private:
|
35
|
-
typedef AsyncSocket<SSL> Super;
|
36
|
-
|
37
|
-
void *init(bool perMessageDeflate, CompressOptions compressOptions, BackPressure &&backpressure) {
|
38
|
-
new (us_socket_ext(SSL, (us_socket_t *) this)) WebSocketData(perMessageDeflate, compressOptions, std::move(backpressure));
|
39
|
-
return this;
|
40
|
-
}
|
41
|
-
public:
|
42
|
-
|
43
|
-
/* Returns pointer to the per socket user data */
|
44
|
-
USERDATA *getUserData() {
|
45
|
-
WebSocketData *webSocketData = (WebSocketData *) us_socket_ext(SSL, (us_socket_t *) this);
|
46
|
-
/* We just have it overallocated by sizeof type */
|
47
|
-
return (USERDATA *) (webSocketData + 1);
|
48
|
-
}
|
49
|
-
|
50
|
-
/* See AsyncSocket */
|
51
|
-
using Super::getBufferedAmount;
|
52
|
-
using Super::getRemoteAddress;
|
53
|
-
using Super::getRemoteAddressAsText;
|
54
|
-
using Super::getNativeHandle;
|
55
|
-
|
56
|
-
/* WebSocket close cannot be an alias to AsyncSocket::close since
|
57
|
-
* we need to check first if it was shut down by remote peer */
|
58
|
-
us_socket_t *close() {
|
59
|
-
if (us_socket_is_closed(SSL, (us_socket_t *) this)) {
|
60
|
-
return nullptr;
|
61
|
-
}
|
62
|
-
WebSocketData *webSocketData = (WebSocketData *) Super::getAsyncSocketData();
|
63
|
-
if (webSocketData->isShuttingDown) {
|
64
|
-
return nullptr;
|
65
|
-
}
|
32
|
+
template <bool> friend struct TemplatedApp;
|
33
|
+
template <bool> friend struct HttpResponse;
|
66
34
|
|
67
|
-
|
68
|
-
|
35
|
+
private:
|
36
|
+
typedef AsyncSocket<SSL> Super;
|
69
37
|
|
70
|
-
|
71
|
-
|
72
|
-
|
73
|
-
|
74
|
-
|
38
|
+
void *init(bool perMessageDeflate, CompressOptions compressOptions,
|
39
|
+
BackPressure &&backpressure) {
|
40
|
+
new (us_socket_ext(SSL, (us_socket_t *)this)) WebSocketData(
|
41
|
+
perMessageDeflate, compressOptions, std::move(backpressure));
|
42
|
+
return this;
|
43
|
+
}
|
75
44
|
|
76
|
-
|
77
|
-
|
78
|
-
|
79
|
-
|
45
|
+
public:
|
46
|
+
/* Returns pointer to the per socket user data */
|
47
|
+
USERDATA *getUserData() {
|
48
|
+
WebSocketData *webSocketData =
|
49
|
+
(WebSocketData *)us_socket_ext(SSL, (us_socket_t *)this);
|
50
|
+
/* We just have it overallocated by sizeof type */
|
51
|
+
return (USERDATA *)(webSocketData + 1);
|
52
|
+
}
|
53
|
+
|
54
|
+
/* See AsyncSocket */
|
55
|
+
using Super::getBufferedAmount;
|
56
|
+
using Super::getNativeHandle;
|
57
|
+
using Super::getRemoteAddress;
|
58
|
+
using Super::getRemoteAddressAsText;
|
59
|
+
|
60
|
+
/* WebSocket close cannot be an alias to AsyncSocket::close since
|
61
|
+
* we need to check first if it was shut down by remote peer */
|
62
|
+
us_socket_t *close() {
|
63
|
+
if (us_socket_is_closed(SSL, (us_socket_t *)this)) {
|
64
|
+
return nullptr;
|
80
65
|
}
|
81
|
-
|
82
|
-
|
83
|
-
|
66
|
+
WebSocketData *webSocketData = (WebSocketData *)Super::getAsyncSocketData();
|
67
|
+
if (webSocketData->isShuttingDown) {
|
68
|
+
return nullptr;
|
84
69
|
}
|
85
70
|
|
86
|
-
|
87
|
-
|
71
|
+
return us_socket_close(SSL, (us_socket_t *)this, 0, nullptr);
|
72
|
+
}
|
73
|
+
|
74
|
+
enum SendStatus : int { BACKPRESSURE, SUCCESS, DROPPED };
|
75
|
+
|
76
|
+
/* Sending fragmented messages puts a bit of effort on the user; you must not
|
77
|
+
* interleave regular sends with fragmented sends and you must
|
78
|
+
* sendFirstFragment, [sendFragment], then finally sendLastFragment. */
|
79
|
+
SendStatus sendFirstFragment(std::string_view message,
|
80
|
+
OpCode opCode = OpCode::BINARY,
|
81
|
+
bool compress = false) {
|
82
|
+
return send(message, opCode, compress, false);
|
83
|
+
}
|
84
|
+
|
85
|
+
SendStatus sendFragment(std::string_view message, bool compress = false) {
|
86
|
+
return send(message, CONTINUATION, compress, false);
|
87
|
+
}
|
88
|
+
|
89
|
+
SendStatus sendLastFragment(std::string_view message, bool compress = false) {
|
90
|
+
return send(message, CONTINUATION, compress, true);
|
91
|
+
}
|
92
|
+
|
93
|
+
/* Send or buffer a WebSocket frame, compressed or not. Returns BACKPRESSURE
|
94
|
+
* on increased user space backpressure, DROPPED on dropped message (due to
|
95
|
+
* backpressure) or SUCCCESS if you are free to send even more now. */
|
96
|
+
SendStatus send(std::string_view message, OpCode opCode = OpCode::BINARY,
|
97
|
+
bool compress = false, bool fin = true) {
|
98
|
+
WebSocketContextData<SSL, USERDATA> *webSocketContextData =
|
99
|
+
(WebSocketContextData<SSL, USERDATA> *)us_socket_context_ext(
|
100
|
+
SSL,
|
101
|
+
(us_socket_context_t *)us_socket_context(SSL, (us_socket_t *)this));
|
102
|
+
|
103
|
+
/* Skip sending and report success if we are over the limit of
|
104
|
+
* maxBackpressure */
|
105
|
+
if (webSocketContextData->maxBackpressure &&
|
106
|
+
webSocketContextData->maxBackpressure < getBufferedAmount()) {
|
107
|
+
/* Also defer a close if we should */
|
108
|
+
if (webSocketContextData->closeOnBackpressureLimit) {
|
109
|
+
us_socket_shutdown_read(SSL, (us_socket_t *)this);
|
110
|
+
}
|
111
|
+
|
112
|
+
/* It is okay to call send again from within this callback since we
|
113
|
+
* immediately return with DROPPED afterwards */
|
114
|
+
if (webSocketContextData->droppedHandler) {
|
115
|
+
webSocketContextData->droppedHandler(this, message, opCode);
|
116
|
+
}
|
117
|
+
|
118
|
+
return DROPPED;
|
88
119
|
}
|
89
120
|
|
90
|
-
/*
|
91
|
-
*
|
92
|
-
|
93
|
-
|
94
|
-
|
95
|
-
|
96
|
-
|
97
|
-
|
98
|
-
|
99
|
-
|
100
|
-
|
101
|
-
|
102
|
-
|
103
|
-
|
104
|
-
|
105
|
-
|
106
|
-
|
107
|
-
|
108
|
-
|
109
|
-
|
121
|
+
/* If we are subscribers and have messages to drain we need to drain them
|
122
|
+
* here to stay synced */
|
123
|
+
WebSocketData *webSocketData = (WebSocketData *)Super::getAsyncSocketData();
|
124
|
+
|
125
|
+
/* Special path for long sends of non-compressed, non-SSL messages */
|
126
|
+
if (message.length() >= 16 * 1024 && !compress && !SSL &&
|
127
|
+
!webSocketData->subscriber && getBufferedAmount() == 0 &&
|
128
|
+
Super::getLoopData()->corkOffset == 0) {
|
129
|
+
char header[10];
|
130
|
+
int header_length = (int)protocol::formatMessage<isServer>(
|
131
|
+
header, nullptr, 0, opCode, message.length(), compress, fin);
|
132
|
+
int written =
|
133
|
+
us_socket_write2(0, (struct us_socket_t *)this, header, header_length,
|
134
|
+
message.data(), (int)message.length());
|
135
|
+
|
136
|
+
if (written != header_length + (int)message.length()) {
|
137
|
+
/* Buffer up backpressure */
|
138
|
+
if (written > header_length) {
|
139
|
+
webSocketData->buffer.append(message.data() + written - header_length,
|
140
|
+
message.length() -
|
141
|
+
(size_t)(written - header_length));
|
142
|
+
} else {
|
143
|
+
webSocketData->buffer.append(header + written,
|
144
|
+
(size_t)header_length - (size_t)written);
|
145
|
+
webSocketData->buffer.append(message.data(), message.length());
|
110
146
|
}
|
111
|
-
|
112
|
-
|
113
|
-
|
114
|
-
|
115
|
-
|
116
|
-
|
117
|
-
|
118
|
-
|
119
|
-
|
120
|
-
|
121
|
-
|
122
|
-
|
123
|
-
|
124
|
-
|
125
|
-
|
126
|
-
|
127
|
-
|
128
|
-
|
129
|
-
|
130
|
-
|
131
|
-
|
132
|
-
|
133
|
-
|
134
|
-
|
147
|
+
/* We cannot still be corked if we have backpressure.
|
148
|
+
* We also cannot uncork normally since it will re-write the already
|
149
|
+
* buffered up backpressure again. */
|
150
|
+
Super::uncorkWithoutSending();
|
151
|
+
return BACKPRESSURE;
|
152
|
+
}
|
153
|
+
} else {
|
154
|
+
|
155
|
+
if (webSocketData->subscriber) {
|
156
|
+
/* This will call back into us, send. */
|
157
|
+
webSocketContextData->topicTree->drain(webSocketData->subscriber);
|
158
|
+
}
|
159
|
+
|
160
|
+
/* Transform the message to compressed domain if requested */
|
161
|
+
if (compress) {
|
162
|
+
WebSocketData *webSocketData =
|
163
|
+
(WebSocketData *)Super::getAsyncSocketData();
|
164
|
+
|
165
|
+
/* Check and correct the compress hint. It is never valid to compress 0
|
166
|
+
* bytes */
|
167
|
+
if (message.length() && opCode < 3 &&
|
168
|
+
webSocketData->compressionStatus == WebSocketData::ENABLED) {
|
169
|
+
LoopData *loopData = Super::getLoopData();
|
170
|
+
/* Compress using either shared or dedicated deflationStream */
|
171
|
+
if (webSocketData->deflationStream) {
|
172
|
+
message = webSocketData->deflationStream->deflate(
|
173
|
+
loopData->zlibContext, message, false);
|
174
|
+
} else {
|
175
|
+
message = loopData->deflationStream->deflate(loopData->zlibContext,
|
176
|
+
message, true);
|
177
|
+
}
|
135
178
|
} else {
|
136
|
-
|
137
|
-
if (webSocketData->subscriber) {
|
138
|
-
/* This will call back into us, send. */
|
139
|
-
webSocketContextData->topicTree->drain(webSocketData->subscriber);
|
140
|
-
}
|
141
|
-
|
142
|
-
/* Transform the message to compressed domain if requested */
|
143
|
-
if (compress) {
|
144
|
-
WebSocketData *webSocketData = (WebSocketData *) Super::getAsyncSocketData();
|
145
|
-
|
146
|
-
/* Check and correct the compress hint. It is never valid to compress 0 bytes */
|
147
|
-
if (message.length() && opCode < 3 && webSocketData->compressionStatus == WebSocketData::ENABLED) {
|
148
|
-
LoopData *loopData = Super::getLoopData();
|
149
|
-
/* Compress using either shared or dedicated deflationStream */
|
150
|
-
if (webSocketData->deflationStream) {
|
151
|
-
message = webSocketData->deflationStream->deflate(loopData->zlibContext, message, false);
|
152
|
-
} else {
|
153
|
-
message = loopData->deflationStream->deflate(loopData->zlibContext, message, true);
|
154
|
-
}
|
155
|
-
} else {
|
156
|
-
compress = false;
|
157
|
-
}
|
158
|
-
}
|
159
|
-
|
160
|
-
/* Get size, allocate size, write if needed */
|
161
|
-
size_t messageFrameSize = protocol::messageFrameSize(message.length());
|
162
|
-
auto [sendBuffer, sendBufferAttribute] = Super::getSendBuffer(messageFrameSize);
|
163
|
-
protocol::formatMessage<isServer>(sendBuffer, message.data(), message.length(), opCode, message.length(), compress, fin);
|
164
|
-
|
165
|
-
/* Depending on size of message we have different paths */
|
166
|
-
if (sendBufferAttribute == SendBufferAttribute::NEEDS_DRAIN) {
|
167
|
-
/* This is a drain */
|
168
|
-
auto[written, failed] = Super::write(nullptr, 0);
|
169
|
-
if (failed) {
|
170
|
-
/* Return false for failure, skipping to reset the timeout below */
|
171
|
-
return BACKPRESSURE;
|
172
|
-
}
|
173
|
-
} else if (sendBufferAttribute == SendBufferAttribute::NEEDS_UNCORK) {
|
174
|
-
/* Uncork if we came here uncorked */
|
175
|
-
auto [written, failed] = Super::uncork();
|
176
|
-
if (failed) {
|
177
|
-
return BACKPRESSURE;
|
178
|
-
}
|
179
|
-
}
|
180
|
-
|
179
|
+
compress = false;
|
181
180
|
}
|
182
|
-
|
183
|
-
|
184
|
-
|
185
|
-
|
186
|
-
|
187
|
-
|
181
|
+
}
|
182
|
+
|
183
|
+
/* Get size, allocate size, write if needed */
|
184
|
+
size_t messageFrameSize = protocol::messageFrameSize(message.length());
|
185
|
+
auto [sendBuffer, sendBufferAttribute] =
|
186
|
+
Super::getSendBuffer(messageFrameSize);
|
187
|
+
protocol::formatMessage<isServer>(sendBuffer, message.data(),
|
188
|
+
message.length(), opCode,
|
189
|
+
message.length(), compress, fin);
|
190
|
+
|
191
|
+
/* Depending on size of message we have different paths */
|
192
|
+
if (sendBufferAttribute == SendBufferAttribute::NEEDS_DRAIN) {
|
193
|
+
/* This is a drain */
|
194
|
+
auto [written, failed] = Super::write(nullptr, 0);
|
195
|
+
if (failed) {
|
196
|
+
/* Return false for failure, skipping to reset the timeout below */
|
197
|
+
return BACKPRESSURE;
|
188
198
|
}
|
189
|
-
|
190
|
-
/*
|
191
|
-
|
192
|
-
|
193
|
-
|
194
|
-
/* Send websocket close frame, emit close event, send FIN if successful.
|
195
|
-
* Will not append a close reason if code is 0 or 1005. */
|
196
|
-
void end(int code = 0, std::string_view message = {}) {
|
197
|
-
/* Check if we already called this one */
|
198
|
-
WebSocketData *webSocketData = (WebSocketData *) us_socket_ext(SSL, (us_socket_t *) this);
|
199
|
-
if (webSocketData->isShuttingDown) {
|
200
|
-
return;
|
199
|
+
} else if (sendBufferAttribute == SendBufferAttribute::NEEDS_UNCORK) {
|
200
|
+
/* Uncork if we came here uncorked */
|
201
|
+
auto [written, failed] = Super::uncork();
|
202
|
+
if (failed) {
|
203
|
+
return BACKPRESSURE;
|
201
204
|
}
|
205
|
+
}
|
206
|
+
}
|
202
207
|
|
203
|
-
|
204
|
-
|
205
|
-
|
206
|
-
|
207
|
-
|
208
|
-
|
209
|
-
|
210
|
-
size_t closePayloadLength = protocol::formatClosePayload(closePayload, (uint16_t) code, message.data(), length);
|
211
|
-
bool ok = send(std::string_view(closePayload, closePayloadLength), OpCode::CLOSE);
|
212
|
-
|
213
|
-
/* FIN if we are ok and not corked */
|
214
|
-
if (!this->isCorked()) {
|
215
|
-
if (ok) {
|
216
|
-
/* If we are not corked, and we just sent off everything, we need to FIN right here.
|
217
|
-
* In all other cases, we need to fin either if uncork was successful, or when drainage is complete. */
|
218
|
-
this->shutdown();
|
219
|
-
}
|
220
|
-
}
|
208
|
+
/* Every successful send resets the timeout */
|
209
|
+
if (webSocketContextData->resetIdleTimeoutOnSend) {
|
210
|
+
Super::timeout(webSocketContextData->idleTimeoutComponents.first);
|
211
|
+
WebSocketData *webSocketData =
|
212
|
+
(WebSocketData *)Super::getAsyncSocketData();
|
213
|
+
webSocketData->hasTimedOut = false;
|
214
|
+
}
|
221
215
|
|
222
|
-
|
223
|
-
|
224
|
-
|
216
|
+
/* Return success */
|
217
|
+
return SUCCESS;
|
218
|
+
}
|
219
|
+
|
220
|
+
/* Send websocket close frame, emit close event, send FIN if successful.
|
221
|
+
* Will not append a close reason if code is 0 or 1005. */
|
222
|
+
void end(int code = 0, std::string_view message = {}) {
|
223
|
+
/* Check if we already called this one */
|
224
|
+
WebSocketData *webSocketData =
|
225
|
+
(WebSocketData *)us_socket_ext(SSL, (us_socket_t *)this);
|
226
|
+
if (webSocketData->isShuttingDown) {
|
227
|
+
return;
|
228
|
+
}
|
225
229
|
|
226
|
-
|
227
|
-
|
230
|
+
/* We postpone any FIN sending to either drainage or uncorking */
|
231
|
+
webSocketData->isShuttingDown = true;
|
232
|
+
|
233
|
+
/* Format and send the close frame */
|
234
|
+
static const int MAX_CLOSE_PAYLOAD = 123;
|
235
|
+
size_t length = std::min<size_t>(MAX_CLOSE_PAYLOAD, message.length());
|
236
|
+
char closePayload[MAX_CLOSE_PAYLOAD + 2];
|
237
|
+
size_t closePayloadLength = protocol::formatClosePayload(
|
238
|
+
closePayload, (uint16_t)code, message.data(), length);
|
239
|
+
bool ok =
|
240
|
+
send(std::string_view(closePayload, closePayloadLength), OpCode::CLOSE);
|
241
|
+
|
242
|
+
/* FIN if we are ok and not corked */
|
243
|
+
if (!this->isCorked()) {
|
244
|
+
if (ok) {
|
245
|
+
/* If we are not corked, and we just sent off everything, we need to FIN
|
246
|
+
* right here. In all other cases, we need to fin either if uncork was
|
247
|
+
* successful, or when drainage is complete. */
|
248
|
+
this->shutdown();
|
249
|
+
}
|
250
|
+
}
|
228
251
|
|
229
|
-
|
230
|
-
|
231
|
-
|
232
|
-
|
233
|
-
|
234
|
-
|
252
|
+
WebSocketContextData<SSL, USERDATA> *webSocketContextData =
|
253
|
+
(WebSocketContextData<SSL, USERDATA> *)us_socket_context_ext(
|
254
|
+
SSL,
|
255
|
+
(us_socket_context_t *)us_socket_context(SSL, (us_socket_t *)this));
|
256
|
+
|
257
|
+
/* Set shorter timeout (use ping-timeout) to avoid long hanging sockets
|
258
|
+
* after end() on broken connections */
|
259
|
+
Super::timeout(webSocketContextData->idleTimeoutComponents.second);
|
260
|
+
|
261
|
+
/* At this point we iterate all currently held subscriptions and emit an
|
262
|
+
* event for all of them */
|
263
|
+
if (webSocketData->subscriber &&
|
264
|
+
webSocketContextData->subscriptionHandler) {
|
265
|
+
for (Topic *t : webSocketData->subscriber->topics) {
|
266
|
+
webSocketContextData->subscriptionHandler(
|
267
|
+
this, t->name, (int)t->size() - 1, (int)t->size());
|
268
|
+
}
|
269
|
+
}
|
235
270
|
|
236
|
-
|
237
|
-
|
238
|
-
|
271
|
+
/* Make sure to unsubscribe from any pub/sub node at exit */
|
272
|
+
webSocketContextData->topicTree->freeSubscriber(webSocketData->subscriber);
|
273
|
+
webSocketData->subscriber = nullptr;
|
239
274
|
|
240
|
-
|
241
|
-
|
242
|
-
|
243
|
-
}
|
275
|
+
/* Emit close event */
|
276
|
+
if (webSocketContextData->closeHandler) {
|
277
|
+
webSocketContextData->closeHandler(this, code, message);
|
244
278
|
}
|
245
|
-
|
246
|
-
|
247
|
-
|
248
|
-
|
249
|
-
|
250
|
-
|
251
|
-
|
252
|
-
|
253
|
-
|
254
|
-
|
255
|
-
|
256
|
-
|
257
|
-
|
258
|
-
|
259
|
-
|
260
|
-
|
279
|
+
}
|
280
|
+
|
281
|
+
/* Corks the response if possible. Leaves already corked socket be. */
|
282
|
+
void cork(MoveOnlyFunction<void()> &&handler) {
|
283
|
+
if (!Super::isCorked() && Super::canCork()) {
|
284
|
+
Super::cork();
|
285
|
+
handler();
|
286
|
+
|
287
|
+
/* There is no timeout when failing to uncork for WebSockets,
|
288
|
+
* as that is handled by idleTimeout */
|
289
|
+
auto [written, failed] = Super::uncork();
|
290
|
+
(void)written;
|
291
|
+
(void)failed;
|
292
|
+
} else {
|
293
|
+
/* We are already corked, or can't cork so let's just call the handler */
|
294
|
+
handler();
|
295
|
+
}
|
296
|
+
}
|
297
|
+
|
298
|
+
/* Subscribe to a topic according to MQTT rules and syntax. Returns success */
|
299
|
+
bool subscribe(std::string_view topic, bool = false) {
|
300
|
+
WebSocketContextData<SSL, USERDATA> *webSocketContextData =
|
301
|
+
(WebSocketContextData<SSL, USERDATA> *)us_socket_context_ext(
|
302
|
+
SSL,
|
303
|
+
(us_socket_context_t *)us_socket_context(SSL, (us_socket_t *)this));
|
304
|
+
|
305
|
+
/* Make us a subscriber if we aren't yet */
|
306
|
+
WebSocketData *webSocketData =
|
307
|
+
(WebSocketData *)us_socket_ext(SSL, (us_socket_t *)this);
|
308
|
+
if (!webSocketData->subscriber) {
|
309
|
+
webSocketData->subscriber =
|
310
|
+
webSocketContextData->topicTree->createSubscriber();
|
311
|
+
webSocketData->subscriber->user = this;
|
261
312
|
}
|
262
313
|
|
263
|
-
/*
|
264
|
-
|
265
|
-
|
266
|
-
|
267
|
-
|
268
|
-
|
269
|
-
|
270
|
-
|
271
|
-
|
272
|
-
webSocketData->subscriber = webSocketContextData->topicTree->createSubscriber();
|
273
|
-
webSocketData->subscriber->user = this;
|
274
|
-
}
|
314
|
+
/* Cannot return numSubscribers as this is only for this particular
|
315
|
+
* websocket context */
|
316
|
+
Topic *topicOrNull = webSocketContextData->topicTree->subscribe(
|
317
|
+
webSocketData->subscriber, topic);
|
318
|
+
if (topicOrNull && webSocketContextData->subscriptionHandler) {
|
319
|
+
/* Emit this socket, the topic, new count, old count */
|
320
|
+
webSocketContextData->subscriptionHandler(
|
321
|
+
this, topic, (int)topicOrNull->size(), (int)topicOrNull->size() - 1);
|
322
|
+
}
|
275
323
|
|
276
|
-
|
277
|
-
|
278
|
-
|
279
|
-
/* Emit this socket, the topic, new count, old count */
|
280
|
-
webSocketContextData->subscriptionHandler(this, topic, (int) topicOrNull->size(), (int) topicOrNull->size() - 1);
|
281
|
-
}
|
324
|
+
/* Subscribe always succeeds */
|
325
|
+
return true;
|
326
|
+
}
|
282
327
|
|
283
|
-
|
284
|
-
|
285
|
-
|
328
|
+
/* Unsubscribe from a topic, returns true if we were subscribed. */
|
329
|
+
bool unsubscribe(std::string_view topic, bool = false) {
|
330
|
+
WebSocketContextData<SSL, USERDATA> *webSocketContextData =
|
331
|
+
(WebSocketContextData<SSL, USERDATA> *)us_socket_context_ext(
|
332
|
+
SSL,
|
333
|
+
(us_socket_context_t *)us_socket_context(SSL, (us_socket_t *)this));
|
286
334
|
|
287
|
-
|
288
|
-
|
289
|
-
WebSocketContextData<SSL, USERDATA> *webSocketContextData = (WebSocketContextData<SSL, USERDATA> *) us_socket_context_ext(SSL,
|
290
|
-
(us_socket_context_t *) us_socket_context(SSL, (us_socket_t *) this)
|
291
|
-
);
|
292
|
-
|
293
|
-
WebSocketData *webSocketData = (WebSocketData *) us_socket_ext(SSL, (us_socket_t *) this);
|
294
|
-
|
295
|
-
if (!webSocketData->subscriber) { return false; }
|
296
|
-
|
297
|
-
/* Cannot return numSubscribers as this is only for this particular websocket context */
|
298
|
-
auto [ok, last, newCount] = webSocketContextData->topicTree->unsubscribe(webSocketData->subscriber, topic);
|
299
|
-
/* Emit subscription event if last */
|
300
|
-
if (ok && webSocketContextData->subscriptionHandler) {
|
301
|
-
webSocketContextData->subscriptionHandler(this, topic, newCount, newCount + 1);
|
302
|
-
}
|
335
|
+
WebSocketData *webSocketData =
|
336
|
+
(WebSocketData *)us_socket_ext(SSL, (us_socket_t *)this);
|
303
337
|
|
304
|
-
|
338
|
+
if (!webSocketData->subscriber) {
|
339
|
+
return false;
|
340
|
+
}
|
305
341
|
|
306
|
-
|
342
|
+
/* Cannot return numSubscribers as this is only for this particular
|
343
|
+
* websocket context */
|
344
|
+
auto [ok, last, newCount] = webSocketContextData->topicTree->unsubscribe(
|
345
|
+
webSocketData->subscriber, topic);
|
346
|
+
/* Emit subscription event if last */
|
347
|
+
if (ok && webSocketContextData->subscriptionHandler) {
|
348
|
+
webSocketContextData->subscriptionHandler(this, topic, newCount,
|
349
|
+
newCount + 1);
|
307
350
|
}
|
308
351
|
|
309
|
-
/*
|
310
|
-
|
311
|
-
WebSocketContextData<SSL, USERDATA> *webSocketContextData = (WebSocketContextData<SSL, USERDATA> *) us_socket_context_ext(SSL,
|
312
|
-
(us_socket_context_t *) us_socket_context(SSL, (us_socket_t *) this)
|
313
|
-
);
|
352
|
+
/* Leave us as subscribers even if we subscribe to nothing (last
|
353
|
+
* unsubscribed topic might miss its message otherwise) */
|
314
354
|
|
315
|
-
|
316
|
-
|
317
|
-
return false;
|
318
|
-
}
|
355
|
+
return ok;
|
356
|
+
}
|
319
357
|
|
320
|
-
|
321
|
-
|
322
|
-
|
323
|
-
|
358
|
+
/* Returns whether this socket is subscribed to the specified topic */
|
359
|
+
bool isSubscribed(std::string_view topic) {
|
360
|
+
WebSocketContextData<SSL, USERDATA> *webSocketContextData =
|
361
|
+
(WebSocketContextData<SSL, USERDATA> *)us_socket_context_ext(
|
362
|
+
SSL,
|
363
|
+
(us_socket_context_t *)us_socket_context(SSL, (us_socket_t *)this));
|
324
364
|
|
325
|
-
|
365
|
+
WebSocketData *webSocketData =
|
366
|
+
(WebSocketData *)us_socket_ext(SSL, (us_socket_t *)this);
|
367
|
+
if (!webSocketData->subscriber) {
|
368
|
+
return false;
|
326
369
|
}
|
327
370
|
|
328
|
-
|
329
|
-
|
330
|
-
|
331
|
-
* Topic names are valid only for the duration of the callback. */
|
332
|
-
void iterateTopics(MoveOnlyFunction<void(std::string_view)> cb) {
|
333
|
-
WebSocketContextData<SSL, USERDATA> *webSocketContextData = (WebSocketContextData<SSL, USERDATA> *) us_socket_context_ext(SSL,
|
334
|
-
(us_socket_context_t *) us_socket_context(SSL, (us_socket_t *) this)
|
335
|
-
);
|
336
|
-
|
337
|
-
WebSocketData *webSocketData = (WebSocketData *) us_socket_ext(SSL, (us_socket_t *) this);
|
338
|
-
if (webSocketData->subscriber) {
|
339
|
-
/* Lock this subscriber for unsubscription / subscription */
|
340
|
-
webSocketContextData->topicTree->iteratingSubscriber = webSocketData->subscriber;
|
341
|
-
|
342
|
-
for (Topic *topicPtr : webSocketData->subscriber->topics) {
|
343
|
-
cb({topicPtr->name.data(), topicPtr->name.length()});
|
344
|
-
}
|
345
|
-
|
346
|
-
/* Unlock subscriber */
|
347
|
-
webSocketContextData->topicTree->iteratingSubscriber = nullptr;
|
348
|
-
}
|
371
|
+
Topic *topicPtr = webSocketContextData->topicTree->lookupTopic(topic);
|
372
|
+
if (!topicPtr) {
|
373
|
+
return false;
|
349
374
|
}
|
350
375
|
|
351
|
-
|
352
|
-
|
353
|
-
|
354
|
-
|
355
|
-
|
356
|
-
|
357
|
-
|
358
|
-
|
359
|
-
|
360
|
-
|
361
|
-
|
362
|
-
|
363
|
-
|
364
|
-
|
365
|
-
|
366
|
-
|
367
|
-
|
368
|
-
|
369
|
-
|
376
|
+
return topicPtr->count(webSocketData->subscriber);
|
377
|
+
}
|
378
|
+
|
379
|
+
/* Iterates all topics of this WebSocket. Every topic is represented by its
|
380
|
+
* full name. Can be called in close handler. It is possible to modify the
|
381
|
+
* subscription list while inside the callback ONLY IF not modifying the topic
|
382
|
+
* passed to the callback. Topic names are valid only for the duration of the
|
383
|
+
* callback. */
|
384
|
+
void iterateTopics(MoveOnlyFunction<void(std::string_view)> cb) {
|
385
|
+
WebSocketContextData<SSL, USERDATA> *webSocketContextData =
|
386
|
+
(WebSocketContextData<SSL, USERDATA> *)us_socket_context_ext(
|
387
|
+
SSL,
|
388
|
+
(us_socket_context_t *)us_socket_context(SSL, (us_socket_t *)this));
|
389
|
+
|
390
|
+
WebSocketData *webSocketData =
|
391
|
+
(WebSocketData *)us_socket_ext(SSL, (us_socket_t *)this);
|
392
|
+
if (webSocketData->subscriber) {
|
393
|
+
/* Lock this subscriber for unsubscription / subscription */
|
394
|
+
webSocketContextData->topicTree->iteratingSubscriber =
|
395
|
+
webSocketData->subscriber;
|
396
|
+
|
397
|
+
for (Topic *topicPtr : webSocketData->subscriber->topics) {
|
398
|
+
cb({topicPtr->name.data(), topicPtr->name.length()});
|
399
|
+
}
|
400
|
+
|
401
|
+
/* Unlock subscriber */
|
402
|
+
webSocketContextData->topicTree->iteratingSubscriber = nullptr;
|
403
|
+
}
|
404
|
+
}
|
405
|
+
|
406
|
+
/* Publish a message to a topic according to MQTT rules and syntax. Returns
|
407
|
+
* success. We, the WebSocket, must be subscribed to the topic itself and if
|
408
|
+
* so - no message will be sent to ourselves. Use App::publish for an
|
409
|
+
* unconditional publish that simply publishes to whomever might be
|
410
|
+
* subscribed. */
|
411
|
+
bool publish(std::string_view topic, std::string_view message,
|
412
|
+
OpCode opCode = OpCode::TEXT, bool compress = false) {
|
413
|
+
WebSocketContextData<SSL, USERDATA> *webSocketContextData =
|
414
|
+
(WebSocketContextData<SSL, USERDATA> *)us_socket_context_ext(
|
415
|
+
SSL,
|
416
|
+
(us_socket_context_t *)us_socket_context(SSL, (us_socket_t *)this));
|
417
|
+
|
418
|
+
/* We cannot be a subscriber of this topic if we are not a subscriber of
|
419
|
+
* anything */
|
420
|
+
WebSocketData *webSocketData =
|
421
|
+
(WebSocketData *)us_socket_ext(SSL, (us_socket_t *)this);
|
422
|
+
if (!webSocketData->subscriber) {
|
423
|
+
/* Failure, but still do return the number of subscribers */
|
424
|
+
return false;
|
425
|
+
}
|
370
426
|
|
371
|
-
|
372
|
-
|
373
|
-
|
374
|
-
|
375
|
-
|
427
|
+
/* Publish as sender, does not receive its own messages even if subscribed
|
428
|
+
* to relevant topics */
|
429
|
+
if (message.length() >= LoopData::CORK_BUFFER_SIZE) {
|
430
|
+
return webSocketContextData->topicTree->publishBig(
|
431
|
+
webSocketData->subscriber, topic, {message, opCode, compress},
|
432
|
+
[](Subscriber *s, TopicTreeBigMessage &message) {
|
433
|
+
auto *ws = (WebSocket<SSL, true, int> *)s->user;
|
434
|
+
|
435
|
+
ws->send(message.message, (OpCode)message.opCode, message.compress);
|
436
|
+
});
|
437
|
+
} else {
|
438
|
+
return webSocketContextData->topicTree->publish(
|
439
|
+
webSocketData->subscriber, topic,
|
440
|
+
{std::string(message), opCode, compress});
|
376
441
|
}
|
442
|
+
}
|
377
443
|
};
|
378
444
|
|
379
|
-
}
|
445
|
+
} // namespace uWS
|
380
446
|
|
381
447
|
#endif // UWS_WEBSOCKET_H
|