mirror of
https://libwebsockets.org/repo/libwebsockets
synced 2024-12-25 23:00:12 +00:00
2dc148e3a3
Several examples trim their buffer with an extra LWS_PRE from the end... actually end should point to end the end of buf without a second LWS_PRE reservation. https://github.com/warmcat/libwebsockets/issues/2629
706 lines
18 KiB
C
706 lines
18 KiB
C
/*
|
|
* lws-minimal-http-client-multi
|
|
*
|
|
* Written in 2010-2021 by Andy Green <andy@warmcat.com>
|
|
*
|
|
* This file is made available under the Creative Commons CC0 1.0
|
|
* Universal Public Domain Dedication.
|
|
*
|
|
* This demonstrates the a minimal http client using lws, which makes
|
|
* 8 downloads simultaneously from warmcat.com.
|
|
*
|
|
* Currently that takes the form of 8 individual simultaneous tcp and
|
|
* tls connections, which happen concurrently. Notice that the ordering
|
|
* of the returned payload may be intermingled for the various connections.
|
|
*
|
|
* By default the connections happen all together at the beginning and operate
|
|
* concurrently, which is fast. However this is resource-intenstive, there are
|
|
* 8 tcp connections, 8 tls tunnels on both the client and server. You can
|
|
* instead opt to have the connections happen one after the other inside a
|
|
* single tcp connection and tls tunnel, using HTTP/1.1 pipelining. To be
|
|
* eligible to be pipelined on another existing connection to the same server,
|
|
* the client connection must have the LCCSCF_PIPELINE flag on its
|
|
* info.ssl_connection member (this is independent of whether the connection
|
|
* is in ssl mode or not).
|
|
*
|
|
* HTTP/1.0: Pipelining only possible if Keep-Alive: yes sent by server
|
|
* HTTP/1.1: always possible... serializes requests
|
|
* HTTP/2: always possible... all requests sent as individual streams in parallel
|
|
*
|
|
* Note: stats are kept on tls session reuse and checked depending on mode
|
|
*
|
|
* - default: no reuse expected (connections made too quickly at once)
|
|
* - staggered, no pipeline: n - 1 reuse expected
|
|
* - staggered, pipelined: no reuse expected
|
|
*/
|
|
|
|
#include <libwebsockets.h>
|
|
#include <string.h>
|
|
#include <signal.h>
|
|
#include <assert.h>
|
|
#include <time.h>
|
|
#if !defined(WIN32)
|
|
#include <sys/stat.h>
|
|
#include <fcntl.h>
|
|
#include <unistd.h>
|
|
#endif
|
|
|
|
#define COUNT 8
|
|
|
|
struct cliuser {
|
|
int index;
|
|
};
|
|
|
|
static int completed, failed, numbered, stagger_idx, posting, count = COUNT,
|
|
#if defined(LWS_WITH_TLS_SESSIONS)
|
|
reuse,
|
|
#endif
|
|
staggered;
|
|
static lws_sorted_usec_list_t sul_stagger;
|
|
static struct lws_client_connect_info i;
|
|
static struct lws *client_wsi[COUNT];
|
|
static char urlpath[64], intr;
|
|
static struct lws_context *context;
|
|
|
|
/* we only need this for tracking POST emit state */
|
|
|
|
struct pss {
|
|
char body_part;
|
|
};
|
|
|
|
#if defined(LWS_WITH_TLS_SESSIONS) && !defined(LWS_WITH_MBEDTLS) && !defined(WIN32)
|
|
|
|
/* this should work OK on win32, but not adapted for non-posix file apis */
|
|
|
|
static int
|
|
sess_save_cb(struct lws_context *cx, struct lws_tls_session_dump *info)
|
|
{
|
|
char path[128];
|
|
int fd, n;
|
|
|
|
lws_snprintf(path, sizeof(path), "%s/lws_tls_sess_%s", (const char *)info->opaque,
|
|
info->tag);
|
|
fd = open(path, LWS_O_WRONLY | O_CREAT | O_TRUNC, 0600);
|
|
if (fd < 0) {
|
|
lwsl_warn("%s: cannot open %s\n", __func__, path);
|
|
return 1;
|
|
}
|
|
|
|
n = (int)write(fd, info->blob, info->blob_len);
|
|
|
|
close(fd);
|
|
|
|
return n != (int)info->blob_len;
|
|
}
|
|
|
|
static int
|
|
sess_load_cb(struct lws_context *cx, struct lws_tls_session_dump *info)
|
|
{
|
|
struct stat sta;
|
|
char path[128];
|
|
int fd, n;
|
|
|
|
lws_snprintf(path, sizeof(path), "%s/lws_tls_sess_%s", (const char *)info->opaque,
|
|
info->tag);
|
|
fd = open(path, LWS_O_RDONLY);
|
|
if (fd < 0)
|
|
return 1;
|
|
|
|
if (fstat(fd, &sta) || !sta.st_size)
|
|
goto bail;
|
|
|
|
info->blob = malloc((size_t)sta.st_size);
|
|
/* caller will free this */
|
|
if (!info->blob)
|
|
goto bail;
|
|
|
|
info->blob_len = (size_t)sta.st_size;
|
|
|
|
n = (int)read(fd, info->blob, info->blob_len);
|
|
close(fd);
|
|
|
|
return n != (int)info->blob_len;
|
|
|
|
bail:
|
|
close(fd);
|
|
|
|
return 1;
|
|
}
|
|
#endif
|
|
|
|
#if defined(LWS_WITH_CONMON)
|
|
void
|
|
dump_conmon_data(struct lws *wsi)
|
|
{
|
|
const struct addrinfo *ai;
|
|
struct lws_conmon cm;
|
|
char ads[48];
|
|
|
|
lws_conmon_wsi_take(wsi, &cm);
|
|
|
|
lws_sa46_write_numeric_address(&cm.peer46, ads, sizeof(ads));
|
|
lwsl_notice("%s: peer %s, dns: %uus, sockconn: %uus, tls: %uus, txn_resp: %uus\n",
|
|
__func__, ads,
|
|
(unsigned int)cm.ciu_dns,
|
|
(unsigned int)cm.ciu_sockconn,
|
|
(unsigned int)cm.ciu_tls,
|
|
(unsigned int)cm.ciu_txn_resp);
|
|
|
|
ai = cm.dns_results_copy;
|
|
while (ai) {
|
|
lws_sa46_write_numeric_address((lws_sockaddr46 *)ai->ai_addr, ads, sizeof(ads));
|
|
lwsl_notice("%s: DNS %s\n", __func__, ads);
|
|
ai = ai->ai_next;
|
|
}
|
|
|
|
/*
|
|
* This destroys the DNS list in the lws_conmon that we took
|
|
* responsibility for when we used lws_conmon_wsi_take()
|
|
*/
|
|
|
|
lws_conmon_release(&cm);
|
|
}
|
|
#endif
|
|
|
|
static int
|
|
callback_http(struct lws *wsi, enum lws_callback_reasons reason,
|
|
void *user, void *in, size_t len)
|
|
{
|
|
char buf[LWS_PRE + 1024], *start = &buf[LWS_PRE], *p = start,
|
|
*end = &buf[sizeof(buf) - 1];
|
|
int n, idx = (int)(intptr_t)lws_get_opaque_user_data(wsi);
|
|
struct pss *pss = (struct pss *)user;
|
|
|
|
switch (reason) {
|
|
|
|
case LWS_CALLBACK_ESTABLISHED_CLIENT_HTTP:
|
|
lwsl_user("LWS_CALLBACK_ESTABLISHED_CLIENT_HTTP: idx: %d, resp %u\n",
|
|
idx, lws_http_client_http_response(wsi));
|
|
|
|
#if defined(LWS_WITH_TLS_SESSIONS) && !defined(LWS_WITH_MBEDTLS) && !defined(WIN32)
|
|
if (lws_tls_session_is_reused(wsi))
|
|
reuse++;
|
|
else
|
|
/*
|
|
* Attempt to store any new session into
|
|
* external storage
|
|
*/
|
|
if (lws_tls_session_dump_save(lws_get_vhost_by_name(context, "default"),
|
|
i.host, (uint16_t)i.port,
|
|
sess_save_cb, "/tmp"))
|
|
lwsl_warn("%s: session save failed\n", __func__);
|
|
#endif
|
|
break;
|
|
|
|
/* because we are protocols[0] ... */
|
|
case LWS_CALLBACK_CLIENT_CONNECTION_ERROR:
|
|
lwsl_err("CLIENT_CONNECTION_ERROR: %s\n",
|
|
in ? (char *)in : "(null)");
|
|
client_wsi[idx] = NULL;
|
|
failed++;
|
|
|
|
#if defined(LWS_WITH_CONMON)
|
|
dump_conmon_data(wsi);
|
|
#endif
|
|
|
|
goto finished;
|
|
|
|
/* chunks of chunked content, with header removed */
|
|
case LWS_CALLBACK_RECEIVE_CLIENT_HTTP_READ:
|
|
lwsl_user("RECEIVE_CLIENT_HTTP_READ: conn %d: read %d\n", idx, (int)len);
|
|
lwsl_hexdump_info(in, len);
|
|
return 0; /* don't passthru */
|
|
|
|
case LWS_CALLBACK_CLIENT_APPEND_HANDSHAKE_HEADER:
|
|
|
|
/*
|
|
* Tell lws we are going to send the body next...
|
|
*/
|
|
if (posting && !lws_http_is_redirected_to_get(wsi)) {
|
|
lwsl_user("%s: conn %d, doing POST flow\n", __func__, idx);
|
|
lws_client_http_body_pending(wsi, 1);
|
|
lws_callback_on_writable(wsi);
|
|
} else
|
|
lwsl_user("%s: conn %d, doing GET flow\n", __func__, idx);
|
|
break;
|
|
|
|
/* uninterpreted http content */
|
|
case LWS_CALLBACK_RECEIVE_CLIENT_HTTP:
|
|
{
|
|
char buffer[1024 + LWS_PRE];
|
|
char *px = buffer + LWS_PRE;
|
|
int lenx = sizeof(buffer) - LWS_PRE;
|
|
|
|
if (lws_http_client_read(wsi, &px, &lenx) < 0)
|
|
return -1;
|
|
}
|
|
return 0; /* don't passthru */
|
|
|
|
case LWS_CALLBACK_COMPLETED_CLIENT_HTTP:
|
|
lwsl_user("LWS_CALLBACK_COMPLETED_CLIENT_HTTP %s: idx %d\n",
|
|
lws_wsi_tag(wsi), idx);
|
|
client_wsi[idx] = NULL;
|
|
goto finished;
|
|
|
|
case LWS_CALLBACK_CLOSED_CLIENT_HTTP:
|
|
lwsl_info("%s: closed: %s\n", __func__, lws_wsi_tag(client_wsi[idx]));
|
|
|
|
#if defined(LWS_WITH_CONMON)
|
|
dump_conmon_data(wsi);
|
|
#endif
|
|
|
|
if (client_wsi[idx]) {
|
|
/*
|
|
* If it completed normally, it will have been set to
|
|
* NULL then already. So we are dealing with an
|
|
* abnormal, failing, close
|
|
*/
|
|
client_wsi[idx] = NULL;
|
|
failed++;
|
|
goto finished;
|
|
}
|
|
break;
|
|
|
|
case LWS_CALLBACK_CLIENT_HTTP_WRITEABLE:
|
|
if (!posting)
|
|
break;
|
|
if (lws_http_is_redirected_to_get(wsi))
|
|
break;
|
|
lwsl_info("LWS_CALLBACK_CLIENT_HTTP_WRITEABLE: %s, idx %d,"
|
|
" part %d\n", lws_wsi_tag(wsi), idx, pss->body_part);
|
|
|
|
n = LWS_WRITE_HTTP;
|
|
|
|
/*
|
|
* For a small body like this, we could prepare it in memory and
|
|
* send it all at once. But to show how to handle, eg,
|
|
* arbitrary-sized file payloads, or huge form-data fields, the
|
|
* sending is done in multiple passes through the event loop.
|
|
*/
|
|
|
|
switch (pss->body_part++) {
|
|
case 0:
|
|
if (lws_client_http_multipart(wsi, "text", NULL, NULL,
|
|
&p, end))
|
|
return -1;
|
|
/* notice every usage of the boundary starts with -- */
|
|
p += lws_snprintf(p, lws_ptr_diff_size_t(end, p), "my text field\xd\xa");
|
|
break;
|
|
case 1:
|
|
if (lws_client_http_multipart(wsi, "file", "myfile.txt",
|
|
"text/plain", &p, end))
|
|
return -1;
|
|
p += lws_snprintf(p, lws_ptr_diff_size_t(end, p),
|
|
"This is the contents of the "
|
|
"uploaded file.\xd\xa"
|
|
"\xd\xa");
|
|
break;
|
|
case 2:
|
|
if (lws_client_http_multipart(wsi, NULL, NULL, NULL,
|
|
&p, end))
|
|
return -1;
|
|
lws_client_http_body_pending(wsi, 0);
|
|
/* necessary to support H2, it means we will write no
|
|
* more on this stream */
|
|
n = LWS_WRITE_HTTP_FINAL;
|
|
break;
|
|
|
|
default:
|
|
/*
|
|
* We can get extra callbacks here, if nothing to do,
|
|
* then do nothing.
|
|
*/
|
|
return 0;
|
|
}
|
|
|
|
if (lws_write(wsi, (uint8_t *)start, lws_ptr_diff_size_t(p, start), (enum lws_write_protocol)n)
|
|
!= lws_ptr_diff(p, start))
|
|
return 1;
|
|
|
|
if (n != LWS_WRITE_HTTP_FINAL)
|
|
lws_callback_on_writable(wsi);
|
|
|
|
break;
|
|
|
|
default:
|
|
break;
|
|
}
|
|
|
|
return lws_callback_http_dummy(wsi, reason, user, in, len);
|
|
|
|
finished:
|
|
if (++completed == count) {
|
|
if (!failed)
|
|
lwsl_user("Done: all OK\n");
|
|
else
|
|
lwsl_err("Done: failed: %d\n", failed);
|
|
intr = 1;
|
|
/*
|
|
* This is how we can exit the event loop even when it's an
|
|
* event library backing it... it will start and stage the
|
|
* destroy to happen after we exited this service for each pt
|
|
*/
|
|
lws_context_destroy(lws_get_context(wsi));
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static const struct lws_protocols protocols[] = {
|
|
{ "http", callback_http, sizeof(struct pss), 0, 0, NULL, 0 },
|
|
LWS_PROTOCOL_LIST_TERM
|
|
};
|
|
|
|
#if defined(LWS_WITH_SYS_METRICS)
|
|
|
|
static int
|
|
my_metric_report(lws_metric_pub_t *mp)
|
|
{
|
|
lws_metric_bucket_t *sub = mp->u.hist.head;
|
|
char buf[192];
|
|
|
|
do {
|
|
if (lws_metrics_format(mp, &sub, buf, sizeof(buf)))
|
|
lwsl_user("%s: %s\n", __func__, buf);
|
|
} while ((mp->flags & LWSMTFL_REPORT_HIST) && sub);
|
|
|
|
/* 0 = leave metric to accumulate, 1 = reset the metric */
|
|
|
|
return 1;
|
|
}
|
|
|
|
static const lws_system_ops_t system_ops = {
|
|
.metric_report = my_metric_report,
|
|
};
|
|
|
|
#endif
|
|
|
|
static void
|
|
stagger_cb(lws_sorted_usec_list_t *sul);
|
|
|
|
static void
|
|
lws_try_client_connection(struct lws_client_connect_info *ii, int m)
|
|
{
|
|
char path[128];
|
|
|
|
if (numbered) {
|
|
lws_snprintf(path, sizeof(path), "/%d.png", m + 1);
|
|
ii->path = path;
|
|
} else
|
|
ii->path = urlpath;
|
|
|
|
ii->pwsi = &client_wsi[m];
|
|
ii->opaque_user_data = (void *)(intptr_t)m;
|
|
|
|
if (!lws_client_connect_via_info(ii)) {
|
|
failed++;
|
|
lwsl_user("%s: failed: conn idx %d\n", __func__, m);
|
|
if (++completed == count) {
|
|
lwsl_user("Done: failed: %d\n", failed);
|
|
lws_context_destroy(context);
|
|
}
|
|
} else
|
|
lwsl_user("started connection %s: idx %d (%s)\n",
|
|
lws_wsi_tag(client_wsi[m]), m, ii->path);
|
|
}
|
|
|
|
|
|
static int
|
|
system_notify_cb(lws_state_manager_t *mgr, lws_state_notify_link_t *link,
|
|
int current, int target)
|
|
{
|
|
struct lws_context *cx = mgr->parent;
|
|
int m;
|
|
|
|
if (current != LWS_SYSTATE_OPERATIONAL || target != LWS_SYSTATE_OPERATIONAL)
|
|
return 0;
|
|
|
|
/* all the system prerequisites are ready */
|
|
|
|
if (!staggered)
|
|
/*
|
|
* just pile on all the connections at once, testing the
|
|
* pipeline queuing before the first is connected
|
|
*/
|
|
for (m = 0; m < count; m++)
|
|
lws_try_client_connection(&i, m);
|
|
else
|
|
/*
|
|
* delay the connections slightly
|
|
*/
|
|
lws_sul_schedule(cx, 0, &sul_stagger, stagger_cb,
|
|
50 * LWS_US_PER_MS);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static void
|
|
signal_cb(void *handle, int signum)
|
|
{
|
|
switch (signum) {
|
|
case SIGTERM:
|
|
case SIGINT:
|
|
break;
|
|
default:
|
|
lwsl_err("%s: signal %d\n", __func__, signum);
|
|
break;
|
|
}
|
|
lws_context_destroy(context);
|
|
}
|
|
|
|
static void
|
|
sigint_handler(int sig)
|
|
{
|
|
signal_cb(NULL, sig);
|
|
}
|
|
|
|
#if defined(WIN32)
|
|
int gettimeofday(struct timeval * tp, struct timezone * tzp)
|
|
{
|
|
// Note: some broken versions only have 8 trailing zero's, the correct epoch has 9 trailing zero's
|
|
// This magic number is the number of 100 nanosecond intervals since January 1, 1601 (UTC)
|
|
// until 00:00:00 January 1, 1970
|
|
static const uint64_t EPOCH = ((uint64_t) 116444736000000000ULL);
|
|
|
|
SYSTEMTIME system_time;
|
|
FILETIME file_time;
|
|
uint64_t time;
|
|
|
|
GetSystemTime( &system_time );
|
|
SystemTimeToFileTime( &system_time, &file_time );
|
|
time = ((uint64_t)file_time.dwLowDateTime ) ;
|
|
time += ((uint64_t)file_time.dwHighDateTime) << 32;
|
|
|
|
tp->tv_sec = (long) ((time - EPOCH) / 10000000L);
|
|
tp->tv_usec = (long) (system_time.wMilliseconds * 1000);
|
|
return 0;
|
|
}
|
|
#endif
|
|
|
|
unsigned long long us(void)
|
|
{
|
|
struct timeval t;
|
|
|
|
gettimeofday(&t, NULL);
|
|
|
|
return ((unsigned long long)t.tv_sec * 1000000ull) + (unsigned long long)t.tv_usec;
|
|
}
|
|
|
|
static void
|
|
stagger_cb(lws_sorted_usec_list_t *sul)
|
|
{
|
|
lws_usec_t next;
|
|
|
|
/*
|
|
* open the connections at 100ms intervals, with the
|
|
* last one being after 1s, testing both queuing, and
|
|
* direct H2 stream addition stability
|
|
*/
|
|
lws_try_client_connection(&i, stagger_idx++);
|
|
|
|
if (stagger_idx == count)
|
|
return;
|
|
|
|
next = 150 * LWS_US_PER_MS;
|
|
if (stagger_idx == count - 1)
|
|
next += 400 * LWS_US_PER_MS;
|
|
|
|
#if defined(LWS_WITH_TLS_SESSIONS)
|
|
if (stagger_idx == 1)
|
|
next += 600 * LWS_US_PER_MS;
|
|
#endif
|
|
|
|
lws_sul_schedule(context, 0, &sul_stagger, stagger_cb, next);
|
|
}
|
|
|
|
int main(int argc, const char **argv)
|
|
{
|
|
lws_state_notify_link_t notifier = { { NULL, NULL, NULL },
|
|
system_notify_cb, "app" };
|
|
lws_state_notify_link_t *na[] = { ¬ifier, NULL };
|
|
struct lws_context_creation_info info;
|
|
unsigned long long start;
|
|
const char *p;
|
|
#if defined(LWS_WITH_TLS_SESSIONS)
|
|
int pl = 0;
|
|
#endif
|
|
|
|
memset(&info, 0, sizeof info); /* otherwise uninitialized garbage */
|
|
memset(&i, 0, sizeof i); /* otherwise uninitialized garbage */
|
|
|
|
lws_cmdline_option_handle_builtin(argc, argv, &info);
|
|
|
|
info.signal_cb = signal_cb;
|
|
info.options = LWS_SERVER_OPTION_DO_SSL_GLOBAL_INIT;
|
|
|
|
if (lws_cmdline_option(argc, argv, "--uv"))
|
|
info.options |= LWS_SERVER_OPTION_LIBUV;
|
|
else
|
|
if (lws_cmdline_option(argc, argv, "--event"))
|
|
info.options |= LWS_SERVER_OPTION_LIBEVENT;
|
|
else
|
|
if (lws_cmdline_option(argc, argv, "--ev"))
|
|
info.options |= LWS_SERVER_OPTION_LIBEV;
|
|
else
|
|
if (lws_cmdline_option(argc, argv, "--glib"))
|
|
info.options |= LWS_SERVER_OPTION_GLIB;
|
|
else
|
|
signal(SIGINT, sigint_handler);
|
|
|
|
staggered = !!lws_cmdline_option(argc, argv, "-s");
|
|
|
|
lwsl_user("LWS minimal http client [-s (staggered)] [-p (pipeline)]\n");
|
|
lwsl_user(" [--h1 (http/1 only)] [-l (localhost)] [-d <logs>]\n");
|
|
lwsl_user(" [-n (numbered)] [--post]\n");
|
|
|
|
info.port = CONTEXT_PORT_NO_LISTEN; /* we do not run any server */
|
|
info.protocols = protocols;
|
|
/*
|
|
* since we know this lws context is only ever going to be used with
|
|
* COUNT client wsis / fds / sockets at a time, let lws know it doesn't
|
|
* have to use the default allocations for fd tables up to ulimit -n.
|
|
* It will just allocate for 1 internal and COUNT + 1 (allowing for h2
|
|
* network wsi) that we will use.
|
|
*/
|
|
info.fd_limit_per_thread = 1 + COUNT + 8 + 1;
|
|
info.register_notifier_list = na;
|
|
info.pcontext = &context;
|
|
|
|
#if defined(LWS_WITH_SYS_METRICS)
|
|
info.system_ops = &system_ops;
|
|
#endif
|
|
|
|
#if defined(LWS_WITH_MBEDTLS) || defined(USE_WOLFSSL)
|
|
/*
|
|
* OpenSSL uses the system trust store. mbedTLS has to be told which
|
|
* CA to trust explicitly.
|
|
*/
|
|
info.client_ssl_ca_filepath = "./warmcat.com.cer";
|
|
#endif
|
|
|
|
/* vhost option allowing tls session reuse, requires
|
|
* LWS_WITH_TLS_SESSIONS build option */
|
|
if (lws_cmdline_option(argc, argv, "--no-tls-session-reuse"))
|
|
info.options |= LWS_SERVER_OPTION_DISABLE_TLS_SESSION_CACHE;
|
|
|
|
if ((p = lws_cmdline_option(argc, argv, "--limit")))
|
|
info.simultaneous_ssl_restriction = atoi(p);
|
|
|
|
if ((p = lws_cmdline_option(argc, argv, "--ssl-handshake-serialize")))
|
|
/* We only consider simultaneous_ssl_restriction > 1 use cases.
|
|
* If ssl isn't limited or only 1 is allowed, we don't care.
|
|
*/
|
|
info.simultaneous_ssl_handshake_restriction = atoi(p);
|
|
|
|
context = lws_create_context(&info);
|
|
if (!context) {
|
|
lwsl_err("lws init failed\n");
|
|
return 1;
|
|
}
|
|
|
|
#if defined(LWS_ROLE_H2) && defined(LWS_ROLE_H1)
|
|
i.alpn = "h2,http/1.1";
|
|
#elif defined(LWS_ROLE_H2)
|
|
i.alpn = "h2";
|
|
#elif defined(LWS_ROLE_H1)
|
|
i.alpn = "http/1.1";
|
|
#endif
|
|
|
|
i.context = context;
|
|
i.ssl_connection = LCCSCF_USE_SSL |
|
|
LCCSCF_H2_QUIRK_OVERFLOWS_TXCR |
|
|
LCCSCF_H2_QUIRK_NGHTTP2_END_STREAM;
|
|
|
|
if (lws_cmdline_option(argc, argv, "--post")) {
|
|
posting = 1;
|
|
i.method = "POST";
|
|
i.ssl_connection |= LCCSCF_HTTP_MULTIPART_MIME;
|
|
} else
|
|
i.method = "GET";
|
|
|
|
/* enables h1 or h2 connection sharing */
|
|
if (lws_cmdline_option(argc, argv, "-p")) {
|
|
i.ssl_connection |= LCCSCF_PIPELINE;
|
|
#if defined(LWS_WITH_TLS_SESSIONS)
|
|
pl = 1;
|
|
#endif
|
|
}
|
|
|
|
#if defined(LWS_WITH_CONMON)
|
|
if (lws_cmdline_option(argc, argv, "--conmon"))
|
|
i.ssl_connection |= LCCSCF_CONMON;
|
|
#endif
|
|
|
|
/* force h1 even if h2 available */
|
|
if (lws_cmdline_option(argc, argv, "--h1"))
|
|
i.alpn = "http/1.1";
|
|
|
|
strcpy(urlpath, "/");
|
|
|
|
if (lws_cmdline_option(argc, argv, "-l")) {
|
|
i.port = 7681;
|
|
i.address = "localhost";
|
|
i.ssl_connection |= LCCSCF_ALLOW_SELFSIGNED;
|
|
if (posting)
|
|
strcpy(urlpath, "/formtest");
|
|
} else {
|
|
i.port = 443;
|
|
i.address = "libwebsockets.org";
|
|
if (posting)
|
|
strcpy(urlpath, "/testserver/formtest");
|
|
}
|
|
|
|
if (lws_cmdline_option(argc, argv, "--no-tls"))
|
|
i.ssl_connection &= ~(LCCSCF_USE_SSL);
|
|
|
|
if (lws_cmdline_option(argc, argv, "-n"))
|
|
numbered = 1;
|
|
|
|
if ((p = lws_cmdline_option(argc, argv, "--server")))
|
|
i.address = p;
|
|
|
|
if ((p = lws_cmdline_option(argc, argv, "--port")))
|
|
i.port = atoi(p);
|
|
|
|
if ((p = lws_cmdline_option(argc, argv, "--path")))
|
|
lws_strncpy(urlpath, p, sizeof(urlpath));
|
|
|
|
if ((p = lws_cmdline_option(argc, argv, "-c")))
|
|
if (atoi(p) <= COUNT && atoi(p))
|
|
count = atoi(p);
|
|
|
|
i.host = i.address;
|
|
i.origin = i.address;
|
|
i.protocol = protocols[0].name;
|
|
|
|
#if defined(LWS_WITH_TLS_SESSIONS) && !defined(LWS_WITH_MBEDTLS) && !defined(WIN32)
|
|
/*
|
|
* Attempt to preload a session from external storage
|
|
*/
|
|
if (lws_tls_session_dump_load(lws_get_vhost_by_name(context, "default"),
|
|
i.host, (uint16_t)i.port, sess_load_cb, "/tmp"))
|
|
lwsl_warn("%s: session load failed\n", __func__);
|
|
#endif
|
|
|
|
start = us();
|
|
while (!intr && !lws_service(context, 0))
|
|
;
|
|
|
|
#if defined(LWS_WITH_TLS_SESSIONS)
|
|
lwsl_user("%s: session reuse count %d\n", __func__, reuse);
|
|
|
|
if (staggered && !pl && !reuse) {
|
|
lwsl_err("%s: failing, expected 1 .. %d reused\n", __func__, count - 1);
|
|
// too difficult to reproduce in CI
|
|
// failed = 1;
|
|
}
|
|
#endif
|
|
|
|
lwsl_user("Duration: %lldms\n", (us() - start) / 1000);
|
|
lws_context_destroy(context);
|
|
|
|
lwsl_user("Exiting with %d\n", failed || completed != count);
|
|
|
|
return failed || completed != count;
|
|
}
|