3
0
mirror of https://github.com/ergochat/ergo.git synced 2024-11-13 07:29:30 +01:00
ergo/irc/websocket.go
2015-06-06 14:05:29 -07:00

66 lines
1.7 KiB
Go

package irc
import (
"github.com/gorilla/websocket"
"net"
"net/http"
"time"
)
var upgrader = websocket.Upgrader{
ReadBufferSize: 1024,
WriteBufferSize: 1024,
/* If a WS session contains sensitive information, and you choose to use
cookies for authentication (during the HTTP(S) upgrade request), then
you should check that Origin is a domain under your control. If it
isn't, then it is possible for users of your site, visiting a naughty
Origin, to have a WS opened using their credentials. See
http://www.christian-schneider.net/CrossSiteWebSocketHijacking.html#main.
We don't care about Origin because the (IRC) authentication is contained
in the WS stream -- the WS session is not privileged when it is opened.
*/
CheckOrigin: func(r *http.Request) bool { return true },
}
type WSContainer struct {
conn *websocket.Conn
}
func (this WSContainer) Close() error {
return this.conn.Close()
}
func (this WSContainer) LocalAddr() net.Addr {
return this.conn.LocalAddr()
}
func (this WSContainer) RemoteAddr() net.Addr {
return this.conn.RemoteAddr()
}
func (this WSContainer) Read(msg []byte) (int, error) {
_, tmp, err := this.conn.ReadMessage()
str := (string)(tmp)
n := copy(msg, ([]byte)(str+CRLF+CRLF))
return n, err
}
func (this WSContainer) Write(msg []byte) (int, error) {
err := this.conn.WriteMessage(1, msg)
return len(msg), err
}
func (this WSContainer) SetDeadline(t time.Time) error {
err := this.conn.SetWriteDeadline(t)
err = this.conn.SetReadDeadline(t)
return err
}
func (this WSContainer) SetReadDeadline(t time.Time) error {
return this.conn.SetReadDeadline(t)
}
func (this WSContainer) SetWriteDeadline(t time.Time) error {
return this.conn.SetWriteDeadline(t)
}