mirror of
https://github.com/warmcat/libwebsockets.git
synced 2025-03-23 00:00:06 +01:00

There's no problem for library build, also with LWS_WITH_MINIMAL_EXAMPLES, but after install at least on OSX, there are problems finding the installed lws include dir (concealed on most platforms by the path being in the default search list for the toolchain), and the references in the lws includes to the tls includes meaning that explicit paths for that must be available at consuming cmakes. This patch enhances the cmake config installed by lws to deal with adding the lws include paths to CMAKE_REQUIRED_INCLUDES and include_directories, so it can be found before the target is introduced. The tls include is passed back up the CMakeLists layers and the lws targets marked with target_include_directories(PUBLIC) with them, so they are understood as needed by consumers. More boilerplate is moved out of the example consuming cmakes. After this, on machines with previous installs of older lws, you may have to clean out the cmake install path, that is usually something like /usr/local/lib/cmake/libwebsockets/* before make installing lws and putting the latest content in there.
194 lines
5.9 KiB
CMake
194 lines
5.9 KiB
CMake
project(lws-minimal-ss-http-post C)
|
|
cmake_minimum_required(VERSION 2.8.12)
|
|
find_package(libwebsockets CONFIG REQUIRED)
|
|
|
|
require_lws_config(LWS_ROLE_H1 1 requirements)
|
|
require_lws_config(LWS_WITHOUT_CLIENT 0 requirements)
|
|
require_lws_config(LWS_WITH_SECURE_STREAMS 1 requirements)
|
|
require_lws_config(LWS_WITH_SECURE_STREAMS_STATIC_POLICY_ONLY 0 requirements)
|
|
|
|
require_lws_config(LWS_WITH_SYS_FAULT_INJECTION 1 has_fault_injection)
|
|
require_lws_config(LWS_WITH_SECURE_STREAMS_PROXY_API 1 has_ss_proxy)
|
|
require_lws_config(LWS_WITH_SYS_STATE 1 has_sys_state)
|
|
|
|
CHECK_C_SOURCE_COMPILES("#include <libwebsockets.h>\nint main(void) {\ni#if defined(LWS_WITH_SECURE_STREAMS_PROXY_API)\n return 0;\n #else\n fail\n #endif\n return 0;\n}\n" HAS_LWS_WITH_SECURE_STREAMS_PROXY_API)
|
|
|
|
if (requirements)
|
|
|
|
set(SRCS main.c http-post-ss.c)
|
|
|
|
add_executable(${PROJECT_NAME} ${SRCS})
|
|
|
|
if (websockets_shared)
|
|
target_link_libraries(${PROJECT_NAME}
|
|
websockets_shared
|
|
${LIBWEBSOCKETS_DEP_LIBS})
|
|
add_dependencies(${PROJECT_NAME}
|
|
websockets_shared)
|
|
else()
|
|
target_link_libraries(${PROJECT_NAME}
|
|
websockets
|
|
${LIBWEBSOCKETS_DEP_LIBS})
|
|
endif()
|
|
|
|
### --- this section related to also building example with SSPC / Proxy --->
|
|
|
|
if (HAS_LWS_WITH_SECURE_STREAMS_PROXY_API OR has_ss_proxy OR
|
|
LWS_WITH_SECURE_STREAMS_PROXY_API)
|
|
add_compile_options(-DLWS_SS_USE_SSPC)
|
|
|
|
add_executable(${PROJECT_NAME}-client ${SRCS})
|
|
|
|
if (websockets_shared)
|
|
target_link_libraries(${PROJECT_NAME}-client
|
|
websockets_shared
|
|
${LIBWEBSOCKETS_DEP_LIBS})
|
|
add_dependencies(${PROJECT_NAME}-client
|
|
websockets_shared)
|
|
else()
|
|
target_link_libraries(${PROJECT_NAME}-client
|
|
websockets
|
|
${LIBWEBSOCKETS_DEP_LIBS})
|
|
endif()
|
|
endif()
|
|
|
|
### <--- this section related to building with SSPC / Proxy END
|
|
|
|
|
|
|
|
### ---everything else related to ctest / CI ----->
|
|
|
|
find_program(VALGRIND "valgrind")
|
|
|
|
if (LWS_CTEST_INTERNET_AVAILABLE AND NOT WIN32)
|
|
|
|
#
|
|
# When running in CI, wait for a lease on the resources
|
|
# before starting this test, so the server does not get
|
|
# thousands of simultaneous tls connection attempts
|
|
#
|
|
# sai-resource holds the lease on the resources until
|
|
# the time given in seconds or the sai-resource instance
|
|
# exits, whichever happens first
|
|
#
|
|
# If running under Sai, creates a lock test called "res_sspcmin"
|
|
#
|
|
|
|
sai_resource(warmcat_conns 1 40 sspcmin-http-post)
|
|
|
|
#
|
|
# simple test not via proxy
|
|
#
|
|
|
|
if (VALGRIND)
|
|
message("testing via valgrind")
|
|
add_test(NAME msshttp-post-warmcat COMMAND
|
|
${VALGRIND} --tool=memcheck --leak-check=yes --num-callers=20
|
|
$<TARGET_FILE:${PROJECT_NAME}>)
|
|
else()
|
|
add_test(NAME msshttp-post-warmcat COMMAND ${PROJECT_NAME})
|
|
endif()
|
|
|
|
set_tests_properties(msshttp-post-warmcat
|
|
PROPERTIES
|
|
WORKING_DIRECTORY ${CMAKE_SOURCE_DIR}/minimal-examples/client/http-post
|
|
TIMEOUT 40)
|
|
if (DEFINED ENV{SAI_OVN})
|
|
set_tests_properties(msshttp-post-warmcat PROPERTIES FIXTURES_REQUIRED "res_msspcmin")
|
|
endif()
|
|
|
|
if (has_fault_injection)
|
|
if (VALGRIND)
|
|
add_test(NAME msshttp-post-warmcat-fi1 COMMAND
|
|
${VALGRIND} --tool=memcheck --leak-check=yes --num-callers=20
|
|
$<TARGET_FILE:${PROJECT_NAME}>
|
|
--fault-injection "ss/ss_create_destroy_me"
|
|
--expected-exit 1)
|
|
add_test(NAME msshttp-post-warmcat-fi2 COMMAND
|
|
${VALGRIND} --tool=memcheck --leak-check=yes --num-callers=20
|
|
$<TARGET_FILE:${PROJECT_NAME}>
|
|
--fault-injection "ss/ss_no_streamtype_policy"
|
|
--expected-exit 1)
|
|
else()
|
|
add_test(NAME msshttp-post-warmcat-fi1 COMMAND lws-minimal-secure-streams
|
|
--fault-injection "ss/ss_create_destroy_me"
|
|
--expected-exit 1)
|
|
add_test(NAME msshttp-post-warmcat-fi2 COMMAND lws-minimal-secure-streams
|
|
--fault-injection "ss/ss_no_streamtype_policy"
|
|
--expected-exit 1)
|
|
endif()
|
|
|
|
set_tests_properties(msshttp-post-warmcat-fi1
|
|
msshttp-post-warmcat-fi2
|
|
PROPERTIES
|
|
WORKING_DIRECTORY ${CMAKE_SOURCE_DIR}/minimal-examples/client/http-post
|
|
TIMEOUT 5)
|
|
|
|
endif()
|
|
|
|
|
|
if (has_sys_state AND (HAS_LWS_WITH_SECURE_STREAMS_PROXY_API OR has_ss_proxy OR
|
|
LWS_WITH_SECURE_STREAMS_PROXY_API))
|
|
|
|
#
|
|
# Define test dep to bring up and take down the test
|
|
# proxy
|
|
#
|
|
|
|
if (${CMAKE_SYSTEM_NAME} MATCHES "Linux")
|
|
# uds abstract namespace for linux
|
|
set(CTEST_SOCKET_PATH "@ctest-mssphttp-post--$ENV{SAI_PROJECT}-$ENV{SAI_OVN}")
|
|
else()
|
|
# filesystem socket for others
|
|
set(CTEST_SOCKET_PATH "/tmp/ctest-mssphttp-post-$ENV{SAI_PROJECT}-$ENV{SAI_OVN}")
|
|
endif()
|
|
add_test(NAME st_msshttp-post-proxy COMMAND
|
|
${CMAKE_SOURCE_DIR}/scripts/ctest-background.sh
|
|
msshttp-post-proxy $<TARGET_FILE:lws-minimal-secure-streams-proxy>
|
|
-i ${CTEST_SOCKET_PATH} )
|
|
set_tests_properties(st_msshttp-post-proxy PROPERTIES
|
|
WORKING_DIRECTORY .
|
|
FIXTURES_SETUP msshttp-post-proxy
|
|
TIMEOUT 800)
|
|
|
|
add_test(NAME ki_msshttp-post-proxy COMMAND
|
|
${CMAKE_SOURCE_DIR}/scripts/ctest-background-kill.sh
|
|
msshttp-post-proxy $<TARGET_FILE:lws-minimal-secure-streams-proxy>
|
|
-i ${CTEST_SOCKET_PATH})
|
|
set_tests_properties(ki_msshttp-post-proxy PROPERTIES
|
|
FIXTURES_CLEANUP msshttp-post-proxy)
|
|
|
|
#
|
|
# the client part that will connect to the proxy
|
|
#
|
|
|
|
if (VALGRIND)
|
|
message("testing via valgrind")
|
|
add_test(NAME msspc-http-post-minimal COMMAND
|
|
${VALGRIND} --tool=memcheck --leak-check=yes --num-callers=20
|
|
$<TARGET_FILE:${PROJECT_NAME}-client>
|
|
--ssproxy-iface +${CTEST_SOCKET_PATH})
|
|
else()
|
|
add_test(NAME msspc-http-post-minimal COMMAND
|
|
${PROJECT_NAME}-client
|
|
--ssproxy-iface +${CTEST_SOCKET_PATH})
|
|
endif()
|
|
|
|
set(fixlist "msshttp-post-proxy")
|
|
if (DEFINED ENV{SAI_OVN})
|
|
list(APPEND fixlist "res_msshttp-post-proxy")
|
|
endif()
|
|
|
|
set_tests_properties(msspc-http-post-minimal PROPERTIES
|
|
WORKING_DIRECTORY ${CMAKE_SOURCE_DIR}/minimal-examples/client/http-post
|
|
FIXTURES_REQUIRED "${fixlist}"
|
|
TIMEOUT 40)
|
|
|
|
endif()
|
|
|
|
endif()
|
|
|
|
### <--- related to ctest / CI END
|
|
|
|
endif()
|
|
|