nanoFramework.WebServer
1.1.12
Prefix Reserved
See the version list below for details.
dotnet add package nanoFramework.WebServer --version 1.1.12
NuGet\Install-Package nanoFramework.WebServer -Version 1.1.12
<PackageReference Include="nanoFramework.WebServer" Version="1.1.12" />
paket add nanoFramework.WebServer --version 1.1.12
#r "nuget: nanoFramework.WebServer, 1.1.12"
// Install nanoFramework.WebServer as a Cake Addin #addin nuget:?package=nanoFramework.WebServer&version=1.1.12 // Install nanoFramework.WebServer as a Cake Tool #tool nuget:?package=nanoFramework.WebServer&version=1.1.12
Welcome to the .NET nanoFramework WebServer repository
Build status
Component | Build Status | NuGet Package |
---|---|---|
nanoFramework.WebServer |
.NET nanoFramework WebServer
This library was coded by Laurent Ellerbach who generously offered it to the .NET nanoFramework project.
This is a simple nanoFramework WebServer. Features:
- Handle multi-thread requests
- Serve static files on any storage
- Handle parameter in URL
- Possible to have multiple WebServer running at the same time
- supports GET/PUT and any other word
- Supports any type of header
- Supports content in POST
- Reflection for easy usage of controllers and notion of routes
- Helpers to return error code directly facilitating REST API
- HTTPS support
- URL decode/encode
Limitations:
- Does not support any zip in the request or response stream
Usage
You just need to specify a port and a timeout for the queries and add an event handler when a request is incoming. With this first way, you will have an event raised every time you'll receive a request.
using (WebServer server = new WebServer(80, HttpProtocol.Http)
{
// Add a handler for commands that are received by the server.
server.CommandReceived += ServerCommandReceived;
// Start the server.
server.Start();
Thread.Sleep(Timeout.Infinite);
}
You can as well pass a controller where you can use decoration for the routes and method supported.
using (WebServer server = new WebServer(80, HttpProtocol.Http, new Type[] { typeof(ControllerPerson), typeof(ControllerTest) }))
{
// Start the server.
server.Start();
Thread.Sleep(Timeout.Infinite);
}
In this case, you're passing 2 classes where you have public methods decorated which will be called every time the route is found.
With the previous example, a very simple and straight forward Test controller will look like that:
public class ControllerTest
{
[Route("test"), Route("Test2"), Route("tEst42"), Route("TEST")]
[CaseSensitive]
[Method("GET")]
public void RoutePostTest(WebServerEventArgs e)
{
string route = $"The route asked is {e.Context.Request.RawUrl.TrimStart('/').Split('/')[0]}";
e.Context.Response.ContentType = "text/plain";
WebServer.OutPutStream(e.Context.Response, route);
}
[Route("test/any")]
public void RouteAnyTest(WebServerEventArgs e)
{
WebServer.OutputHttpCode(e.Context.Response, HttpStatusCode.OK);
}
}
In this example, the RoutePostTest
will be called every time the called url will be test
or Test2
or tEst42
or TEST
, the url can be with parameters and the method GET. Be aware that Test
won't call the function, neither test/
.
The RouteAnyTest
is called whenever the url is test/any
whatever the method is.
There is a more advance example with simple REST API to get a list of Person and add a Person. Check it in the sample.
Important
- By default the routes are not case sensitive and the attribute must be lowercase
- If you want to use case sensitive routes like in the previous example, use the attribute
CaseSensitive
. As in the previous example, you must write the route as you want it to be responded to.
A simple GPIO controller REST API
You will find in simple GPIO controller sample REST API. The controller not case sensitive and is working like this:
- To open the pin 2 as output: http://yoururl/open/2/output
- To open pin 4 as input: http://yoururl/open/4/input
- To write the value high to pin 2: http://yoururl/write/2/high
- You can use high or 1, it has the same effect and will place the pin in high value
- You can use low of 0, it has the same effect and will place the pin in low value
- To read the pin 4: http://yoururl/read/4, you will get as a raw text
high
orlow
depending on the state
Authentication on controllers
Controllers support authentication. 3 types of authentications are currently implemented on controllers only:
- Basic: the classic user and password following the HTTP standard. Usage:
[Authentication("Basic")]
will use the default credential of the webserver[Authentication("Basic:myuser mypassword")]
will use myuser as a user and my password as a password. Note: the user cannot contains spaces.
- APiKey in header: add ApiKey in headers with the API key. Usage:
[Authentication("ApiKey")]
will use the default credential of the webserver[Authentication("ApiKeyc:akey")]
will use akey as ApiKey.
- None: no authentication required. Usage:
[Authentication("None")]
will use the default credential of the webserver
The Authentication attribute applies to both public Classes an public Methods.
As for the rest of the controller, you can add attributes to define them, override them. The following example gives an idea of what can be done:
[Authentication("Basic")]
class ControllerAuth
{
[Route("authbasic")]
public void Basic(WebServerEventArgs e)
{
WebServer.OutputHttpCode(e.Context.Response, HttpStatusCode.OK);
}
[Route("authbasicspecial")]
[Authentication("Basic:user2 password")]
public void Special(WebServerEventArgs e)
{
WebServer.OutputHttpCode(e.Context.Response, HttpStatusCode.OK);
}
[Authentication("ApiKey:superKey1234")]
[Route("authapi")]
public void Key(WebServerEventArgs e)
{
WebServer.OutputHttpCode(e.Context.Response, HttpStatusCode.OK);
}
[Route("authnone")]
[Authentication("None")]
public void None(WebServerEventArgs e)
{
WebServer.OutputHttpCode(e.Context.Response, HttpStatusCode.OK);
}
[Authentication("ApiKey")]
[Route("authdefaultapi")]
public void DefaultApi(WebServerEventArgs e)
{
WebServer.OutputHttpCode(e.Context.Response, HttpStatusCode.OK);
}
}
And you can pass default credentials to the server:
using (WebServer server = new WebServer(80, HttpProtocol.Http, new Type[] { typeof(ControllerPerson), typeof(ControllerTest), typeof(ControllerAuth) }))
{
// To test authentication with various scenarios
server.ApiKey = "ATopSecretAPIKey1234";
server.Credential = new NetworkCredential("topuser", "topPassword");
// Start the server.
server.Start();
Thread.Sleep(Timeout.Infinite);
}
With the previous example the following happens:
- All the controller by default, even when nothing is specified will use the controller credentials. In our case, the Basic authentication with the default user (topuser) and password (topPassword) will be used.
- When calling http://yoururl/authbasic from a browser, you will be prompted for the user and password, use the default one topuser and topPassword to get access
- When calling http://yoururl/authnone, you won't be prompted because the authentication has been overridden for no authentication
- When calling http://yoururl/authbasicspecial, the user and password are different from the defautl ones, user2 and password is the right couple here
- If you would have define in the controller a specific user and password like
[Authentication("Basic:myuser mypassword")]
, then the default one for all the controller would have been myuser and mypassword - When calling http://yoururl/authapi, you must pass the header
ApiKey
(case sensitive) with the valuesuperKey1234
to get authorized, this is overridden the default Basic authentication - When calling http://yoururl/authdefaultapi, the default key
ATopSecretAPIKey1234
will be used so you have to pass it in the headers of the request
All up, this is an example to show how to use authentication, it's been defined to allow flexibility.
Managing incoming queries thru events
Very basic usage is the following:
private static void ServerCommandReceived(object source, WebServerEventArgs e)
{
var url = e.Context.Request.RawUrl;
Debug.WriteLine($"Command received: {url}, Method: {e.Context.Request.HttpMethod}");
if (url.ToLower() == "/sayhello")
{
// This is simple raw text returned
WebServer.OutPutStream(e.Context.Response, "It's working, url is empty, this is just raw text, /sayhello is just returning a raw text");
}
else
{
WebServer.OutputHttpCode(e.Context.Response, HttpStatusCode.NotFound);
}
}
You can do more advance scenario like returning a full HTML page:
WebServer.OutPutStream(e.Context.Response, "<html><head>" +
"<title>Hi from nanoFramework Server</title></head><body>You want me to say hello in a real HTML page!<br/><a href='/useinternal'>Generate an internal text.txt file</a><br />" +
"<a href='/Text.txt'>Download the Text.txt file</a><br>" +
"Try this url with parameters: <a href='/param.htm?param1=42&second=24&NAme=Ellerbach'>/param.htm?param1=42&second=24&NAme=Ellerbach</a></body></html>");
And can get parameters from a URL a an example from the previous link on the param.html page:
if (url.ToLower().IndexOf("/param.htm") == 0)
{
// Test with parameters
var parameters = WebServer.decryptParam(url);
string toOutput = "<html><head>" +
"<title>Hi from nanoFramework Server</title></head><body>Here are the parameters of this URL: <br />";
foreach (var par in parameters)
{
toOutput += $"Parameter name: {par.Name}, Value: {par.Value}<br />";
}
toOutput += "</body></html>";
WebServer.OutPutStream(e.Context.Response, toOutput);
}
And server static files:
var files = storage.GetFiles();
foreach (var file in files)
{
if (file.Name == url)
{
WebServer.SendFileOverHTTP(e.Context.Response, file);
return;
}
}
WebServer.OutputHttpCode(e.Context.Response, HttpStatusCode.NotFound);
And also REST API is supported, here is a comprehensive example:
if (url.ToLower().IndexOf("/api/") == 0)
{
string ret = $"Your request type is: {e.Context.Request.HttpMethod}\r\n";
ret += $"The request URL is: {e.Context.Request.RawUrl}\r\n";
var parameters = WebServer.DecodeParam(e.Context.Request.RawUrl);
if (parameters != null)
{
ret += "List of url parameters:\r\n";
foreach (var param in parameters)
{
ret += $" Parameter name: {param.Name}, value: {param.Value}\r\n";
}
}
if (e.Context.Request.Headers != null)
{
ret += $"Number of headers: {e.Context.Request.Headers.Count}\r\n";
}
else
{
ret += "There is no header in this request\r\n";
}
foreach (var head in e.Context.Request.Headers?.AllKeys)
{
ret += $" Header name: {head}, Values:";
var vals = e.Context.Request.Headers.GetValues(head);
foreach (var val in vals)
{
ret += $"{val} ";
}
ret += "\r\n";
}
if (e.Context.Request.ContentLength64 > 0)
{
ret += $"Size of content: {e.Context.Request.ContentLength64}\r\n";
byte[] buff = new byte[e.Context.Request.ContentLength64];
e.Context.Request.InputStream.Read(buff, 0, buff.Length);
ret += $"Hex string representation:\r\n";
for (int i = 0; i < buff.Length; i++)
{
ret += buff[i].ToString("X") + " ";
}
}
WebServer.OutPutStream(e.Context.Response, ret);
}
This API example is basic but as you get the method, you can choose what to do.
As you get the url, you can check for a specific controller called. And you have the parameters and the content payload!
Example of a result with call:
And more! Check the complete example for more about this WebServer!
Using HTTPS
You will need to generate a certificate and keys:
X509Certificate _myWebServerCertificate509 = new X509Certificate2(_myWebServerCrt, _myWebServerPrivateKey, "1234");
// X509 RSA key PEM format 2048 bytes
// generate with openssl:
// > openssl req -newkey rsa:2048 -nodes -keyout selfcert.key -x509 -days 365 -out selfcert.crt
// and paste selfcert.crt content below:
private const string _myWebServerCrt =
@"-----BEGIN CERTIFICATE-----
MORETEXT
-----END CERTIFICATE-----";
// this one is generated with the command below. We need a password.
// > openssl rsa -des3 -in selfcert.key -out selfcertenc.key
// the one below was encoded with '1234' as the password.
private const string _myWebServerPrivateKey =
@"-----BEGIN RSA PRIVATE KEY-----
MORETEXTANDENCRYPTED
-----END RSA PRIVATE KEY-----";
using (WebServer server = new WebServer(443, HttpProtocol.Https)
{
// Add a handler for commands that are received by the server.
server.CommandReceived += ServerCommandReceived;
server.HttpsCert = _myWebServerCertificate509;
server.SslProtocols = System.Net.Security.SslProtocols.Tls | System.Net.Security.SslProtocols.Tls11 | System.Net.Security.SslProtocols.Tls12;
// Start the server.
server.Start();
Thread.Sleep(Timeout.Infinite);
}
IMPORTANT: because the certificate above is not issued from a Certificate Authority it won't be recognized as a valid certificate. If you want to access the nanoFramework device with your browser, for example, you'll have to add the (CRT file)[WebServer.Sample\webserver-cert.crt] as a trusted one. On Windows, you just have to double click on the CRT file and then click "Install Certificate...".
You can of course use the routes as defined earlier. Both will work, event or route with the notion of controller.
Feedback and documentation
For documentation, providing feedback, issues and finding out how to contribute please refer to the Home repo.
Join our Discord community here.
Credits
The list of contributors to this project can be found at CONTRIBUTORS.
License
The nanoFramework WebServer library is licensed under the MIT license.
Code of Conduct
This project has adopted the code of conduct defined by the Contributor Covenant to clarify expected behaviour in our community. For more information see the .NET Foundation Code of Conduct.
.NET Foundation
This project is supported by the .NET Foundation.
Product | Versions Compatible and additional computed target framework versions. |
---|---|
.NET Framework | net is compatible. |
-
- nanoFramework.CoreLibrary (>= 1.12.0)
- nanoFramework.System.Net.Http.Server (>= 1.5.4)
- nanoFramework.Windows.Storage (>= 1.4.7)
NuGet packages
This package is not used by any NuGet packages.
GitHub repositories (1)
Showing the top 1 popular GitHub repositories that depend on nanoFramework.WebServer:
Repository | Stars |
---|---|
nanoframework/Samples
🍬 Code samples from the nanoFramework team used in testing, proof of concepts and other explorational endeavours
|
Version | Downloads | Last updated |
---|---|---|
1.2.63 | 326 | 10/8/2024 |
1.2.60 | 172 | 9/26/2024 |
1.2.56 | 230 | 7/30/2024 |
1.2.55 | 152 | 7/24/2024 |
1.2.52 | 262 | 6/3/2024 |
1.2.48 | 168 | 5/17/2024 |
1.2.45 | 110 | 5/13/2024 |
1.2.43 | 153 | 5/10/2024 |
1.2.40 | 238 | 4/12/2024 |
1.2.38 | 126 | 4/9/2024 |
1.2.36 | 116 | 4/8/2024 |
1.2.34 | 130 | 4/5/2024 |
1.2.32 | 124 | 4/3/2024 |
1.2.30 | 111 | 4/3/2024 |
1.2.27 | 339 | 2/14/2024 |
1.2.25 | 124 | 2/12/2024 |
1.2.23 | 217 | 1/26/2024 |
1.2.21 | 105 | 1/26/2024 |
1.2.19 | 107 | 1/26/2024 |
1.2.17 | 144 | 1/24/2024 |
1.2.14 | 444 | 11/17/2023 |
1.2.12 | 155 | 11/10/2023 |
1.2.9 | 146 | 11/9/2023 |
1.2.7 | 163 | 11/8/2023 |
1.2.6 | 127 | 11/8/2023 |
1.2.3 | 252 | 10/27/2023 |
1.2.1 | 163 | 10/25/2023 |
1.1.79 | 214 | 10/10/2023 |
1.1.77 | 200 | 10/4/2023 |
1.1.75 | 422 | 8/8/2023 |
1.1.73 | 255 | 7/27/2023 |
1.1.71 | 150 | 7/27/2023 |
1.1.65 | 682 | 2/17/2023 |
1.1.63 | 381 | 1/24/2023 |
1.1.61 | 284 | 1/24/2023 |
1.1.59 | 317 | 1/24/2023 |
1.1.56 | 408 | 12/30/2022 |
1.1.54 | 323 | 12/28/2022 |
1.1.51 | 338 | 12/27/2022 |
1.1.47 | 714 | 10/26/2022 |
1.1.44 | 385 | 10/25/2022 |
1.1.41 | 384 | 10/24/2022 |
1.1.39 | 426 | 10/23/2022 |
1.1.36 | 429 | 10/10/2022 |
1.1.32 | 420 | 10/8/2022 |
1.1.29 | 468 | 9/22/2022 |
1.1.27 | 440 | 9/22/2022 |
1.1.25 | 452 | 9/22/2022 |
1.1.23 | 508 | 9/16/2022 |
1.1.21 | 482 | 9/15/2022 |
1.1.19 | 521 | 8/29/2022 |
1.1.17 | 545 | 8/6/2022 |
1.1.14 | 442 | 8/4/2022 |
1.1.12 | 409 | 8/3/2022 |
1.1.10 | 449 | 8/3/2022 |
1.1.8 | 413 | 8/3/2022 |
1.1.6 | 609 | 6/13/2022 |
1.1.4 | 477 | 6/8/2022 |
1.1.2 | 437 | 6/8/2022 |
1.1.1 | 476 | 5/30/2022 |
1.0.0 | 706 | 3/30/2022 |
1.0.0-preview.260 | 152 | 3/29/2022 |
1.0.0-preview.258 | 130 | 3/28/2022 |
1.0.0-preview.256 | 130 | 3/28/2022 |
1.0.0-preview.254 | 141 | 3/28/2022 |
1.0.0-preview.252 | 123 | 3/28/2022 |
1.0.0-preview.250 | 131 | 3/28/2022 |
1.0.0-preview.248 | 153 | 3/17/2022 |
1.0.0-preview.246 | 136 | 3/14/2022 |
1.0.0-preview.244 | 135 | 3/14/2022 |
1.0.0-preview.242 | 129 | 3/14/2022 |
1.0.0-preview.240 | 133 | 3/14/2022 |
1.0.0-preview.238 | 136 | 3/8/2022 |
1.0.0-preview.236 | 135 | 3/8/2022 |
1.0.0-preview.234 | 127 | 3/4/2022 |
1.0.0-preview.232 | 124 | 3/3/2022 |
1.0.0-preview.230 | 136 | 3/2/2022 |
1.0.0-preview.228 | 134 | 2/28/2022 |
1.0.0-preview.226 | 166 | 2/24/2022 |
1.0.0-preview.222 | 143 | 2/17/2022 |
1.0.0-preview.220 | 140 | 2/17/2022 |
1.0.0-preview.218 | 172 | 2/6/2022 |
1.0.0-preview.216 | 131 | 2/4/2022 |
1.0.0-preview.214 | 150 | 2/4/2022 |
1.0.0-preview.212 | 158 | 1/28/2022 |
1.0.0-preview.210 | 151 | 1/28/2022 |
1.0.0-preview.208 | 153 | 1/28/2022 |
1.0.0-preview.206 | 143 | 1/25/2022 |
1.0.0-preview.204 | 140 | 1/21/2022 |
1.0.0-preview.202 | 133 | 1/21/2022 |
1.0.0-preview.200 | 140 | 1/21/2022 |
1.0.0-preview.198 | 139 | 1/21/2022 |
1.0.0-preview.196 | 142 | 1/21/2022 |
1.0.0-preview.194 | 158 | 1/13/2022 |
1.0.0-preview.192 | 154 | 1/12/2022 |
1.0.0-preview.190 | 144 | 1/12/2022 |
1.0.0-preview.188 | 143 | 1/11/2022 |
1.0.0-preview.186 | 147 | 1/11/2022 |
1.0.0-preview.183 | 157 | 1/6/2022 |
1.0.0-preview.181 | 146 | 1/5/2022 |
1.0.0-preview.180 | 153 | 1/3/2022 |
1.0.0-preview.179 | 144 | 1/3/2022 |
1.0.0-preview.178 | 149 | 1/3/2022 |
1.0.0-preview.177 | 146 | 12/30/2021 |
1.0.0-preview.176 | 156 | 12/28/2021 |
1.0.0-preview.174 | 192 | 12/3/2021 |
1.0.0-preview.172 | 162 | 12/3/2021 |
1.0.0-preview.170 | 151 | 12/3/2021 |
1.0.0-preview.168 | 152 | 12/3/2021 |
1.0.0-preview.166 | 152 | 12/3/2021 |
1.0.0-preview.164 | 155 | 12/2/2021 |
1.0.0-preview.162 | 160 | 12/2/2021 |
1.0.0-preview.160 | 151 | 12/2/2021 |
1.0.0-preview.158 | 151 | 12/2/2021 |
1.0.0-preview.156 | 154 | 12/2/2021 |
1.0.0-preview.154 | 149 | 12/2/2021 |
1.0.0-preview.152 | 159 | 12/1/2021 |
1.0.0-preview.150 | 146 | 12/1/2021 |
1.0.0-preview.148 | 162 | 12/1/2021 |
1.0.0-preview.145 | 201 | 11/11/2021 |
1.0.0-preview.143 | 196 | 10/22/2021 |
1.0.0-preview.141 | 183 | 10/18/2021 |
1.0.0-preview.138 | 205 | 10/18/2021 |
1.0.0-preview.136 | 290 | 7/17/2021 |
1.0.0-preview.134 | 163 | 7/16/2021 |
1.0.0-preview.132 | 168 | 7/16/2021 |
1.0.0-preview.130 | 181 | 7/15/2021 |
1.0.0-preview.128 | 182 | 7/14/2021 |
1.0.0-preview.126 | 274 | 6/19/2021 |
1.0.0-preview.124 | 264 | 6/19/2021 |
1.0.0-preview.122 | 171 | 6/17/2021 |
1.0.0-preview.119 | 175 | 6/7/2021 |
1.0.0-preview.117 | 163 | 6/7/2021 |
1.0.0-preview.115 | 203 | 6/7/2021 |
1.0.0-preview.113 | 200 | 6/7/2021 |
1.0.0-preview.111 | 217 | 6/6/2021 |
1.0.0-preview.109 | 912 | 6/5/2021 |
1.0.0-preview.107 | 177 | 6/3/2021 |
1.0.0-preview.105 | 165 | 6/2/2021 |
1.0.0-preview.103 | 167 | 6/2/2021 |
1.0.0-preview.101 | 178 | 6/1/2021 |
1.0.0-preview.99 | 193 | 6/1/2021 |
1.0.0-preview.96 | 191 | 6/1/2021 |
1.0.0-preview.94 | 199 | 5/31/2021 |
1.0.0-preview.92 | 208 | 5/30/2021 |
1.0.0-preview.90 | 180 | 5/27/2021 |
1.0.0-preview.88 | 178 | 5/26/2021 |
1.0.0-preview.86 | 291 | 5/23/2021 |
1.0.0-preview.84 | 195 | 5/22/2021 |
1.0.0-preview.82 | 232 | 5/21/2021 |
1.0.0-preview.80 | 185 | 5/19/2021 |
1.0.0-preview.78 | 174 | 5/19/2021 |
1.0.0-preview.76 | 195 | 5/19/2021 |
1.0.0-preview.71 | 178 | 5/15/2021 |
1.0.0-preview.69 | 153 | 5/14/2021 |
1.0.0-preview.66 | 183 | 5/13/2021 |
1.0.0-preview.64 | 189 | 5/11/2021 |
1.0.0-preview.62 | 177 | 5/11/2021 |
1.0.0-preview.59 | 234 | 5/6/2021 |
1.0.0-preview.57 | 160 | 5/5/2021 |
1.0.0-preview.51 | 183 | 4/12/2021 |
1.0.0-preview.49 | 178 | 4/12/2021 |
1.0.0-preview.47 | 190 | 4/10/2021 |
1.0.0-preview.44 | 188 | 4/6/2021 |
1.0.0-preview.41 | 168 | 4/5/2021 |
1.0.0-preview.32 | 206 | 3/21/2021 |
1.0.0-preview.30 | 232 | 3/20/2021 |
1.0.0-preview.28 | 212 | 3/19/2021 |
1.0.0-preview.26 | 197 | 3/18/2021 |
1.0.0-preview.24 | 159 | 3/17/2021 |
1.0.0-preview.22 | 170 | 3/17/2021 |
1.0.0-preview.20 | 200 | 3/5/2021 |
1.0.0-preview.18 | 171 | 3/2/2021 |
1.0.0-preview.15 | 415 | 1/19/2021 |
1.0.0-preview.13 | 183 | 1/19/2021 |
1.0.0-preview.11 | 242 | 1/7/2021 |
1.0.0-preview.10 | 203 | 12/22/2020 |
1.0.0-preview.6 | 271 | 12/1/2020 |
1.0.0-preview.3 | 274 | 11/6/2020 |