Hello,
On Kamailio you handle the WebSocket handshake as just another HTTP request
(in an event_route).
You do any processing and checking of headers you want in that event_route
before calling ws_handle_handshake(). That includes using URI parameters
(often more useful than Cookies: for authentication), checking Cookie:
contents, checking the Host: and Origin: headers, etc.
You can use the auth_ephemeral module at this point or, (if you have a
WebSocket client capable of handling a request for HTTP digest
authentication) HTTP digest authentication. You can also use sqlops (and
other similar modules) at this point too.
ws_handle_handshake() validates the WebSocket specific headers and
generates the 101 response if everything is OK from a protocol
point-of-view.
Regards,
Peter
On 4 February 2014 14:37, Daniel Pocock <daniel(a)pocock.com.au> wrote:
On 04/02/14 10:26, Peter Dunkley wrote:
Hello,
I don't think this is relevant to the Kamailio implementation.
The Kamailio implementation doesn't do anything with headers like
Cookie: at all. If an implementer of a Kamailio solution wants to do
anything with the Cookie: header (or any other), they can do whatever they
want using the Kamailio configuration file "programming language".
You can make use of all of the standard Kamailio header/parameter
selects and transformations to help you do whatever you want with these
headers.
Just to clarify: we are talking about HTTP Cookie headers sent during the
WebSocket handshake, not about a Cookie header in any SIP message
Does the Kamailio WebSocket transport provide access to the HTTP WebSocket
handshake headers and their contents or only the SIP headers?
Is there a way to invoke some route block in the configuration file to
examine the HTTP headers and decide whether a WebSocket connection will be
accepted?
--
Peter Dunkley
Technical Director
Crocodile RCS Ltd