mirror of
https://github.com/warmcat/libwebsockets.git
synced 2025-03-23 00:00:06 +01:00

This adds a new member to the context creation info struct "ws_ping_pong_interval". If nonzero, it sets the number of seconds that established ws connections are allowed to be idle before a PING is forced to be sent. If zero (the default) then tracking of idle connection is disabled for backwards compatibility. Timeouts cover both the period between decision to send the ping and it being sent (because it needs the socket to become writeable), and the period between the ping being sent and the PONG coming back. INFO debug logs are issues when the timeout stuff is operating. You can test the server side by running the test server hacked to set ws_ping_pong_interval and debug log mask of 15. Both the mirror protocol and the server-status protocol are idle if nothing is happening and will trigger the PING / PONG testing. (You can also test using lwsws and /etc/lwsws/conf with "ws-pingpong-secs": "20" in the global section) For client, run the test client with -n -P 20 for 20s interval. -n stops the test client writing using the mirror protocol, so it will be idle and trigger the PING / PONGs. The timeout interval may be up to +10s late, as lws checks for affected connections every 10s.
584 lines
14 KiB
C
584 lines
14 KiB
C
/*
|
|
* libwebsockets-test-client - libwebsockets test implementation
|
|
*
|
|
* Copyright (C) 2011-2016 Andy Green <andy@warmcat.com>
|
|
*
|
|
* This file is made available under the Creative Commons CC0 1.0
|
|
* Universal Public Domain Dedication.
|
|
*
|
|
* The person who associated a work with this deed has dedicated
|
|
* the work to the public domain by waiving all of his or her rights
|
|
* to the work worldwide under copyright law, including all related
|
|
* and neighboring rights, to the extent allowed by law. You can copy,
|
|
* modify, distribute and perform the work, even for commercial purposes,
|
|
* all without asking permission.
|
|
*
|
|
* The test apps are intended to be adapted for use in your code, which
|
|
* may be proprietary. So unlike the library itself, they are licensed
|
|
* Public Domain.
|
|
*/
|
|
|
|
#include "lws_config.h"
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <getopt.h>
|
|
#include <string.h>
|
|
#include <signal.h>
|
|
|
|
#ifdef _WIN32
|
|
#define random rand
|
|
#include "gettimeofday.h"
|
|
#else
|
|
#include <syslog.h>
|
|
#include <sys/time.h>
|
|
#include <unistd.h>
|
|
#endif
|
|
|
|
#include "../lib/libwebsockets.h"
|
|
|
|
static int deny_deflate, longlived, mirror_lifetime;
|
|
static struct lws *wsi_dumb, *wsi_mirror;
|
|
static volatile int force_exit;
|
|
static unsigned int opts;
|
|
static int flag_no_mirror_traffic;
|
|
#if defined(LWS_USE_POLARSSL)
|
|
#else
|
|
#if defined(LWS_USE_MBEDTLS)
|
|
#else
|
|
#if defined(LWS_OPENSSL_SUPPORT) && defined(LWS_HAVE_SSL_CTX_set1_param)
|
|
char crl_path[1024] = "";
|
|
#endif
|
|
#endif
|
|
#endif
|
|
|
|
/*
|
|
* This demo shows how to connect multiple websockets simultaneously to a
|
|
* websocket server (there is no restriction on their having to be the same
|
|
* server just it simplifies the demo).
|
|
*
|
|
* dumb-increment-protocol: we connect to the server and print the number
|
|
* we are given
|
|
*
|
|
* lws-mirror-protocol: draws random circles, which are mirrored on to every
|
|
* client (see them being drawn in every browser
|
|
* session also using the test server)
|
|
*/
|
|
|
|
enum demo_protocols {
|
|
|
|
PROTOCOL_DUMB_INCREMENT,
|
|
PROTOCOL_LWS_MIRROR,
|
|
|
|
/* always last */
|
|
DEMO_PROTOCOL_COUNT
|
|
};
|
|
|
|
|
|
/*
|
|
* dumb_increment protocol
|
|
*
|
|
* since this also happens to be protocols[0], some callbacks that are not
|
|
* bound to a specific protocol also turn up here.
|
|
*/
|
|
|
|
static int
|
|
callback_dumb_increment(struct lws *wsi, enum lws_callback_reasons reason,
|
|
void *user, void *in, size_t len)
|
|
{
|
|
const char *which = "http";
|
|
|
|
switch (reason) {
|
|
|
|
case LWS_CALLBACK_CLIENT_ESTABLISHED:
|
|
lwsl_info("dumb: LWS_CALLBACK_CLIENT_ESTABLISHED\n");
|
|
break;
|
|
|
|
case LWS_CALLBACK_CLOSED:
|
|
lwsl_notice("dumb: LWS_CALLBACK_CLOSED\n");
|
|
wsi_dumb = NULL;
|
|
break;
|
|
|
|
case LWS_CALLBACK_CLIENT_RECEIVE:
|
|
((char *)in)[len] = '\0';
|
|
lwsl_info("rx %d '%s'\n", (int)len, (char *)in);
|
|
break;
|
|
|
|
/* because we are protocols[0] ... */
|
|
|
|
case LWS_CALLBACK_CLIENT_CONNECTION_ERROR:
|
|
if (wsi == wsi_dumb) {
|
|
which = "dumb";
|
|
wsi_dumb = NULL;
|
|
}
|
|
if (wsi == wsi_mirror) {
|
|
which = "mirror";
|
|
wsi_mirror = NULL;
|
|
}
|
|
|
|
lwsl_err("CLIENT_CONNECTION_ERROR: %s: %s %p\n", which, in);
|
|
break;
|
|
|
|
case LWS_CALLBACK_CLIENT_CONFIRM_EXTENSION_SUPPORTED:
|
|
if ((strcmp(in, "deflate-stream") == 0) && deny_deflate) {
|
|
lwsl_notice("denied deflate-stream extension\n");
|
|
return 1;
|
|
}
|
|
if ((strcmp(in, "x-webkit-deflate-frame") == 0))
|
|
return 1;
|
|
if ((strcmp(in, "deflate-frame") == 0))
|
|
return 1;
|
|
break;
|
|
|
|
case LWS_CALLBACK_RECEIVE_CLIENT_HTTP:
|
|
{
|
|
char buffer[1024 + LWS_PRE];
|
|
char *px = buffer + LWS_PRE;
|
|
int lenx = sizeof(buffer) - LWS_PRE;
|
|
|
|
lwsl_notice("LWS_CALLBACK_RECEIVE_CLIENT_HTTP\n");
|
|
|
|
/*
|
|
* Often you need to flow control this by something
|
|
* else being writable. In that case call the api
|
|
* to get a callback when writable here, and do the
|
|
* pending client read in the writeable callback of
|
|
* the output.
|
|
*/
|
|
if (lws_http_client_read(wsi, &px, &lenx) < 0)
|
|
return -1;
|
|
while (lenx--)
|
|
putchar(*px++);
|
|
}
|
|
break;
|
|
|
|
case LWS_CALLBACK_COMPLETED_CLIENT_HTTP:
|
|
wsi_dumb = NULL;
|
|
force_exit = 1;
|
|
break;
|
|
|
|
#if defined(LWS_USE_POLARSSL)
|
|
#else
|
|
#if defined(LWS_USE_MBEDTLS)
|
|
#else
|
|
#if defined(LWS_OPENSSL_SUPPORT) && defined(LWS_HAVE_SSL_CTX_set1_param)
|
|
case LWS_CALLBACK_OPENSSL_LOAD_EXTRA_CLIENT_VERIFY_CERTS:
|
|
if (crl_path[0]) {
|
|
/* Enable CRL checking of the server certificate */
|
|
X509_VERIFY_PARAM *param = X509_VERIFY_PARAM_new();
|
|
X509_VERIFY_PARAM_set_flags(param, X509_V_FLAG_CRL_CHECK);
|
|
SSL_CTX_set1_param((SSL_CTX*)user, param);
|
|
X509_STORE *store = SSL_CTX_get_cert_store((SSL_CTX*)user);
|
|
X509_LOOKUP *lookup = X509_STORE_add_lookup(store, X509_LOOKUP_file());
|
|
int n = X509_load_cert_crl_file(lookup, crl_path, X509_FILETYPE_PEM);
|
|
X509_VERIFY_PARAM_free(param);
|
|
if (n != 1) {
|
|
char errbuf[256];
|
|
n = ERR_get_error();
|
|
lwsl_err("LWS_CALLBACK_OPENSSL_LOAD_EXTRA_CLIENT_VERIFY_CERTS: SSL error: %s (%d)\n", ERR_error_string(n, errbuf), n);
|
|
return 1;
|
|
}
|
|
}
|
|
break;
|
|
#endif
|
|
#endif
|
|
#endif
|
|
|
|
default:
|
|
break;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
/* lws-mirror_protocol */
|
|
|
|
|
|
static int
|
|
callback_lws_mirror(struct lws *wsi, enum lws_callback_reasons reason,
|
|
void *user, void *in, size_t len)
|
|
{
|
|
unsigned char buf[LWS_PRE + 4096];
|
|
unsigned int rands[4];
|
|
int l = 0;
|
|
int n;
|
|
|
|
switch (reason) {
|
|
case LWS_CALLBACK_CLIENT_ESTABLISHED:
|
|
|
|
lwsl_notice("mirror: LWS_CALLBACK_CLIENT_ESTABLISHED\n");
|
|
|
|
lws_get_random(lws_get_context(wsi), rands, sizeof(rands[0]));
|
|
mirror_lifetime = 16384 + (rands[0] & 65535);
|
|
/* useful to test single connection stability */
|
|
if (longlived)
|
|
mirror_lifetime += 500000;
|
|
|
|
lwsl_info("opened mirror connection with "
|
|
"%d lifetime\n", mirror_lifetime);
|
|
|
|
/*
|
|
* mirror_lifetime is decremented each send, when it reaches
|
|
* zero the connection is closed in the send callback.
|
|
* When the close callback comes, wsi_mirror is set to NULL
|
|
* so a new connection will be opened
|
|
*
|
|
* start the ball rolling,
|
|
* LWS_CALLBACK_CLIENT_WRITEABLE will come next service
|
|
*/
|
|
if (!flag_no_mirror_traffic)
|
|
lws_callback_on_writable(wsi);
|
|
break;
|
|
|
|
case LWS_CALLBACK_CLOSED:
|
|
lwsl_notice("mirror: LWS_CALLBACK_CLOSED mirror_lifetime=%d\n", mirror_lifetime);
|
|
wsi_mirror = NULL;
|
|
break;
|
|
|
|
case LWS_CALLBACK_CLIENT_WRITEABLE:
|
|
if (flag_no_mirror_traffic)
|
|
return 0;
|
|
for (n = 0; n < 1; n++) {
|
|
lws_get_random(lws_get_context(wsi), rands, sizeof(rands));
|
|
l += sprintf((char *)&buf[LWS_PRE + l],
|
|
"c #%06X %u %u %u;",
|
|
rands[0] & 0xffffff, /* colour */
|
|
rands[1] & 511, /* x */
|
|
rands[2] & 255, /* y */
|
|
(rands[3] & 31) + 1); /* radius */
|
|
}
|
|
|
|
n = lws_write(wsi, &buf[LWS_PRE], l,
|
|
opts | LWS_WRITE_TEXT);
|
|
if (n < 0)
|
|
return -1;
|
|
if (n < l) {
|
|
lwsl_err("Partial write LWS_CALLBACK_CLIENT_WRITEABLE\n");
|
|
return -1;
|
|
}
|
|
|
|
mirror_lifetime--;
|
|
if (!mirror_lifetime) {
|
|
lwsl_info("closing mirror session\n");
|
|
return -1;
|
|
}
|
|
/* get notified as soon as we can write again */
|
|
lws_callback_on_writable(wsi);
|
|
break;
|
|
|
|
default:
|
|
break;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
/* list of supported protocols and callbacks */
|
|
|
|
static struct lws_protocols protocols[] = {
|
|
{
|
|
"dumb-increment-protocol,fake-nonexistant-protocol",
|
|
callback_dumb_increment,
|
|
0,
|
|
20,
|
|
},
|
|
{
|
|
"fake-nonexistant-protocol,lws-mirror-protocol",
|
|
callback_lws_mirror,
|
|
0,
|
|
128,
|
|
},
|
|
{ NULL, NULL, 0, 0 } /* end */
|
|
};
|
|
|
|
static const struct lws_extension exts[] = {
|
|
{
|
|
"permessage-deflate",
|
|
lws_extension_callback_pm_deflate,
|
|
"permessage-deflate; client_max_window_bits"
|
|
},
|
|
{
|
|
"deflate-frame",
|
|
lws_extension_callback_pm_deflate,
|
|
"deflate_frame"
|
|
},
|
|
{ NULL, NULL, NULL /* terminator */ }
|
|
};
|
|
|
|
|
|
|
|
void sighandler(int sig)
|
|
{
|
|
force_exit = 1;
|
|
}
|
|
|
|
static struct option options[] = {
|
|
{ "help", no_argument, NULL, 'h' },
|
|
{ "debug", required_argument, NULL, 'd' },
|
|
{ "port", required_argument, NULL, 'p' },
|
|
{ "ssl", no_argument, NULL, 's' },
|
|
{ "strict-ssl", no_argument, NULL, 'S' },
|
|
{ "version", required_argument, NULL, 'v' },
|
|
{ "undeflated", no_argument, NULL, 'u' },
|
|
{ "nomirror", no_argument, NULL, 'n' },
|
|
{ "longlived", no_argument, NULL, 'l' },
|
|
{ "pingpong-secs", required_argument, NULL, 'P' },
|
|
{ "ssl-cert", required_argument, NULL, 'C' },
|
|
{ "ssl-key", required_argument, NULL, 'K' },
|
|
{ "ssl-ca", required_argument, NULL, 'A' },
|
|
#if defined(LWS_OPENSSL_SUPPORT) && defined(LWS_HAVE_SSL_CTX_set1_param)
|
|
{ "ssl-crl", required_argument, NULL, 'R' },
|
|
#endif
|
|
{ NULL, 0, 0, 0 }
|
|
};
|
|
|
|
static int ratelimit_connects(unsigned int *last, unsigned int secs)
|
|
{
|
|
struct timeval tv;
|
|
|
|
gettimeofday(&tv, NULL);
|
|
|
|
if (tv.tv_sec - (*last) < secs)
|
|
return 0;
|
|
|
|
*last = tv.tv_sec;
|
|
|
|
return 1;
|
|
}
|
|
|
|
int main(int argc, char **argv)
|
|
{
|
|
int n = 0, ret = 0, port = 7681, use_ssl = 0, ietf_version = -1;
|
|
unsigned int rl_dumb = 0, rl_mirror = 0, do_ws = 1, pp_secs = 0;
|
|
struct lws_context_creation_info info;
|
|
struct lws_client_connect_info i;
|
|
struct lws_context *context;
|
|
const char *prot, *p;
|
|
char path[300];
|
|
char cert_path[1024] = "";
|
|
char key_path[1024] = "";
|
|
char ca_path[1024] = "";
|
|
|
|
memset(&info, 0, sizeof info);
|
|
|
|
lwsl_notice("libwebsockets test client - license LGPL2.1+SLE\n");
|
|
lwsl_notice("(C) Copyright 2010-2016 Andy Green <andy@warmcat.com>\n");
|
|
|
|
if (argc < 2)
|
|
goto usage;
|
|
|
|
while (n >= 0) {
|
|
n = getopt_long(argc, argv, "Snuv:hsp:d:lC:K:A:P:", options, NULL);
|
|
if (n < 0)
|
|
continue;
|
|
switch (n) {
|
|
case 'd':
|
|
lws_set_log_level(atoi(optarg), NULL);
|
|
break;
|
|
case 's': /* lax SSL, allow selfsigned, skip checking hostname */
|
|
use_ssl = LCCSCF_USE_SSL |
|
|
LCCSCF_ALLOW_SELFSIGNED |
|
|
LCCSCF_SKIP_SERVER_CERT_HOSTNAME_CHECK;
|
|
break;
|
|
case 'S': /* Strict SSL, no selfsigned, check server hostname */
|
|
use_ssl = LCCSCF_USE_SSL;
|
|
break;
|
|
case 'p':
|
|
port = atoi(optarg);
|
|
break;
|
|
case 'P':
|
|
pp_secs = atoi(optarg);
|
|
lwsl_notice("Setting pingpong interval to %d\n", pp_secs);
|
|
break;
|
|
case 'l':
|
|
longlived = 1;
|
|
break;
|
|
case 'v':
|
|
ietf_version = atoi(optarg);
|
|
break;
|
|
case 'u':
|
|
deny_deflate = 1;
|
|
break;
|
|
case 'n':
|
|
flag_no_mirror_traffic = 1;
|
|
lwsl_notice("Disabled sending mirror data (for pingpong testing)\n");
|
|
break;
|
|
case 'C':
|
|
strncpy(cert_path, optarg, sizeof(cert_path) - 1);
|
|
cert_path[sizeof(cert_path) - 1] = '\0';
|
|
break;
|
|
case 'K':
|
|
strncpy(key_path, optarg, sizeof(key_path) - 1);
|
|
key_path[sizeof(key_path) - 1] = '\0';
|
|
break;
|
|
case 'A':
|
|
strncpy(ca_path, optarg, sizeof(ca_path) - 1);
|
|
ca_path[sizeof(ca_path) - 1] = '\0';
|
|
break;
|
|
#if defined(LWS_USE_POLARSSL)
|
|
#else
|
|
#if defined(LWS_USE_MBEDTLS)
|
|
#else
|
|
#if defined(LWS_OPENSSL_SUPPORT) && defined(LWS_HAVE_SSL_CTX_set1_param)
|
|
case 'R':
|
|
strncpy(crl_path, optarg, sizeof(crl_path) - 1);
|
|
crl_path[sizeof(crl_path) - 1] = '\0';
|
|
break;
|
|
#endif
|
|
#endif
|
|
#endif
|
|
case 'h':
|
|
goto usage;
|
|
}
|
|
}
|
|
|
|
if (optind >= argc)
|
|
goto usage;
|
|
|
|
signal(SIGINT, sighandler);
|
|
|
|
memset(&i, 0, sizeof(i));
|
|
|
|
i.port = port;
|
|
if (lws_parse_uri(argv[optind], &prot, &i.address, &i.port, &p))
|
|
goto usage;
|
|
|
|
/* add back the leading / on path */
|
|
path[0] = '/';
|
|
strncpy(path + 1, p, sizeof(path) - 2);
|
|
path[sizeof(path) - 1] = '\0';
|
|
i.path = path;
|
|
|
|
if (!strcmp(prot, "http") || !strcmp(prot, "ws"))
|
|
use_ssl = 0;
|
|
if (!strcmp(prot, "https") || !strcmp(prot, "wss"))
|
|
if (!use_ssl)
|
|
use_ssl = LCCSCF_USE_SSL;
|
|
|
|
/*
|
|
* create the websockets context. This tracks open connections and
|
|
* knows how to route any traffic and which protocol version to use,
|
|
* and if each connection is client or server side.
|
|
*
|
|
* For this client-only demo, we tell it to not listen on any port.
|
|
*/
|
|
|
|
info.port = CONTEXT_PORT_NO_LISTEN;
|
|
info.protocols = protocols;
|
|
info.gid = -1;
|
|
info.uid = -1;
|
|
info.ws_ping_pong_interval = pp_secs;
|
|
|
|
if (use_ssl) {
|
|
info.options |= LWS_SERVER_OPTION_DO_SSL_GLOBAL_INIT;
|
|
|
|
/*
|
|
* If the server wants us to present a valid SSL client certificate
|
|
* then we can set it up here.
|
|
*/
|
|
|
|
if (cert_path[0])
|
|
info.ssl_cert_filepath = cert_path;
|
|
if (key_path[0])
|
|
info.ssl_private_key_filepath = key_path;
|
|
|
|
/*
|
|
* A CA cert and CRL can be used to validate the cert send by the server
|
|
*/
|
|
if (ca_path[0])
|
|
info.ssl_ca_filepath = ca_path;
|
|
#if defined(LWS_USE_POLARSSL)
|
|
#else
|
|
#if defined(LWS_USE_MBEDTLS)
|
|
#else
|
|
#if defined(LWS_OPENSSL_SUPPORT) && defined(LWS_HAVE_SSL_CTX_set1_param)
|
|
else if (crl_path[0])
|
|
lwsl_notice("WARNING, providing a CRL requires a CA cert!\n");
|
|
#endif
|
|
#endif
|
|
#endif
|
|
}
|
|
|
|
if (use_ssl & LCCSCF_USE_SSL)
|
|
lwsl_notice(" Using SSL\n");
|
|
else
|
|
lwsl_notice(" SSL disabled\n");
|
|
if (use_ssl & LCCSCF_ALLOW_SELFSIGNED)
|
|
lwsl_notice(" Selfsigned certs allowed\n");
|
|
else
|
|
lwsl_notice(" Cert must validate correctly (use -s to allow selfsigned)\n");
|
|
if (use_ssl & LCCSCF_SKIP_SERVER_CERT_HOSTNAME_CHECK)
|
|
lwsl_notice(" Skipping peer cert hostname check\n");
|
|
else
|
|
lwsl_notice(" Requiring peer cert hostname matches\n");
|
|
|
|
context = lws_create_context(&info);
|
|
if (context == NULL) {
|
|
fprintf(stderr, "Creating libwebsocket context failed\n");
|
|
return 1;
|
|
}
|
|
|
|
i.context = context;
|
|
i.ssl_connection = use_ssl;
|
|
i.host = i.address;
|
|
i.origin = i.address;
|
|
i.ietf_version_or_minus_one = ietf_version;
|
|
i.client_exts = exts;
|
|
|
|
if (!strcmp(prot, "http") || !strcmp(prot, "https")) {
|
|
lwsl_notice("using %s mode (non-ws)\n", prot);
|
|
i.method = "GET";
|
|
do_ws = 0;
|
|
} else
|
|
lwsl_notice("using %s mode (ws)\n", prot);
|
|
|
|
/*
|
|
* sit there servicing the websocket context to handle incoming
|
|
* packets, and drawing random circles on the mirror protocol websocket
|
|
*
|
|
* nothing happens until the client websocket connection is
|
|
* asynchronously established... calling lws_client_connect() only
|
|
* instantiates the connection logically, lws_service() progresses it
|
|
* asynchronously.
|
|
*/
|
|
|
|
while (!force_exit) {
|
|
|
|
if (do_ws) {
|
|
if (!wsi_dumb && ratelimit_connects(&rl_dumb, 2u)) {
|
|
lwsl_notice("dumb: connecting\n");
|
|
i.protocol = protocols[PROTOCOL_DUMB_INCREMENT].name;
|
|
i.pwsi = &wsi_dumb;
|
|
lws_client_connect_via_info(&i);
|
|
}
|
|
|
|
if (!wsi_mirror && ratelimit_connects(&rl_mirror, 2u)) {
|
|
lwsl_notice("mirror: connecting\n");
|
|
i.protocol = protocols[PROTOCOL_LWS_MIRROR].name;
|
|
i.pwsi = &wsi_mirror;
|
|
wsi_mirror = lws_client_connect_via_info(&i);
|
|
}
|
|
} else
|
|
if (!wsi_dumb && ratelimit_connects(&rl_dumb, 2u)) {
|
|
lwsl_notice("http: connecting\n");
|
|
i.pwsi = &wsi_dumb;
|
|
lws_client_connect_via_info(&i);
|
|
}
|
|
|
|
lws_service(context, 500);
|
|
}
|
|
|
|
lwsl_err("Exiting\n");
|
|
lws_context_destroy(context);
|
|
|
|
return ret;
|
|
|
|
usage:
|
|
fprintf(stderr, "Usage: libwebsockets-test-client "
|
|
"<server address> [--port=<p>] "
|
|
"[--ssl] [-k] [-v <ver>] "
|
|
"[-d <log bitfield>] [-l]\n");
|
|
return 1;
|
|
}
|