You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

266 lines
6.0 KiB

/*
* lws-minimal-ws-client-spam
*
* Written in 2010-2019 by Andy Green <andy@warmcat.com>
*
* This file is made available under the Creative Commons CC0 1.0
* Universal Public Domain Dedication.
*
* This demonstrates a ws client that makes continuous mass ws connections
* asynchronously
*/
#include <libwebsockets.h>
#include <string.h>
#include <signal.h>
#include <pthread.h>
enum {
CLIENT_IDLE,
CLIENT_CONNECTING,
CLIENT_AWAITING_SEND,
};
struct client {
struct lws *wsi;
int index;
int state;
};
static struct lws_context *context;
static struct client clients[200];
static int interrupted, port = 443, ssl_connection = LCCSCF_USE_SSL;
static const char *server_address = "libwebsockets.org",
*pro = "lws-mirror-protocol";
static int concurrent = 3, conn, tries, est, errors, closed, sent, limit = 15;
struct pss {
int conn;
};
static int
connect_client(int idx)
{
struct lws_client_connect_info i;
if (tries == limit) {
lwsl_user("Reached limit... finishing\n");
return 0;
}
memset(&i, 0, sizeof(i));
i.context = context;
i.port = port;
i.address = server_address;
i.path = "/";
i.host = i.address;
i.origin = i.address;
i.ssl_connection = ssl_connection;
i.protocol = pro;
i.local_protocol_name = pro;
i.pwsi = &clients[idx].wsi;
clients[idx].state = CLIENT_CONNECTING;
tries++;
if (!lws_client_connect_via_info(&i)) {
clients[idx].wsi = NULL;
clients[idx].state = CLIENT_IDLE;
return 1;
}
return 0;
}
static int
callback_minimal_spam(struct lws *wsi, enum lws_callback_reasons reason,
void *user, void *in, size_t len)
{
struct pss *pss = (struct pss *)user;
uint8_t ping[LWS_PRE + 125];
int n, m;
switch (reason) {
case LWS_CALLBACK_PROTOCOL_INIT:
for (n = 0; n < concurrent; n++) {
clients[n].index = n;
connect_client(n);
}
break;
case LWS_CALLBACK_CLIENT_CONNECTION_ERROR:
errors++;
lwsl_err("CLIENT_CONNECTION_ERROR: %s (try %d, est %d, closed %d, err %d)\n",
in ? (char *)in : "(null)", tries, est, closed, errors);
for (n = 0; n < concurrent; n++) {
if (clients[n].wsi == wsi) {
clients[n].wsi = NULL;
clients[n].state = CLIENT_IDLE;
connect_client(n);
break;
}
}
if (tries == closed + errors)
interrupted = 1;
break;
/* --- client callbacks --- */
case LWS_CALLBACK_CLIENT_ESTABLISHED:
lwsl_user("%s: established (try %d, est %d, closed %d, err %d)\n",
__func__, tries, est, closed, errors);
est++;
pss->conn = conn++;
lws_callback_on_writable(wsi);
break;
case LWS_CALLBACK_CLIENT_CLOSED:
closed++;
if (tries == closed + errors)
interrupted = 1;
if (tries == limit) {
lwsl_user("%s: leaving CLOSED (try %d, est %d, sent %d, closed %d, err %d)\n",
__func__, tries, est, sent, closed, errors);
break;
}
for (n = 0; n < concurrent; n++) {
if (clients[n].wsi == wsi) {
connect_client(n);
lwsl_user("%s: reopening (try %d, est %d, closed %d, err %d)\n",
__func__, tries, est, closed, errors);
break;
}
}
if (n == concurrent)
lwsl_user("CLOSED: can't find client wsi\n");
break;
case LWS_CALLBACK_CLIENT_WRITEABLE:
n = lws_snprintf((char *)ping + LWS_PRE, sizeof(ping) - LWS_PRE,
"hello %d", pss->conn);
m = lws_write(wsi, ping + LWS_PRE, n, LWS_WRITE_TEXT);
if (m < n) {
lwsl_err("sending ping failed: %d\n", m);
return -1;
}
lws_set_timeout(wsi, PENDING_TIMEOUT_USER_OK, LWS_TO_KILL_ASYNC);
break;
default:
break;
}
return lws_callback_http_dummy(wsi, reason, user, in, len);
}
static const struct lws_protocols protocols[] = {
{
"lws-spam-test",
callback_minimal_spam,
sizeof(struct pss),
0,
},
{ NULL, NULL, 0, 0 }
};
static void
sigint_handler(int sig)
{
interrupted = 1;
}
int main(int argc, const char **argv)
{
struct lws_context_creation_info info;
const char *p;
int n = 0, logs = LLL_USER | LLL_ERR | LLL_WARN | LLL_NOTICE
/* for LLL_ verbosity above NOTICE to be built into lws,
* lws must have been configured and built with
* -DCMAKE_BUILD_TYPE=DEBUG instead of =RELEASE */
/* | LLL_INFO */ /* | LLL_PARSER */ /* | LLL_HEADER */
/* | LLL_EXT */ /* | LLL_CLIENT */ /* | LLL_LATENCY */
/* | LLL_DEBUG */;
signal(SIGINT, sigint_handler);
if ((p = lws_cmdline_option(argc, argv, "-d")))
logs = atoi(p);
lws_set_log_level(logs, NULL);
lwsl_user("LWS minimal ws client SPAM\n");
memset(&info, 0, sizeof info); /* otherwise uninitialized garbage */
info.options = LWS_SERVER_OPTION_DO_SSL_GLOBAL_INIT;
info.port = CONTEXT_PORT_NO_LISTEN; /* we do not run any server */
info.protocols = protocols;
#if defined(LWS_WITH_MBEDTLS)
/*
* OpenSSL uses the system trust store. mbedTLS has to be told which
* CA to trust explicitly.
*/
info.client_ssl_ca_filepath = "./libwebsockets.org.cer";
#endif
if ((p = lws_cmdline_option(argc, argv, "--server"))) {
server_address = p;
ssl_connection |= LCCSCF_ALLOW_SELFSIGNED;
}
if ((p = lws_cmdline_option(argc, argv, "--port")))
port = atoi(p);
if ((p = lws_cmdline_option(argc, argv, "-l")))
limit = atoi(p);
if ((p = lws_cmdline_option(argc, argv, "-c")))
concurrent = atoi(p);
if (lws_cmdline_option(argc, argv, "-n")) {
ssl_connection = 0;
info.options = 0;
}
if (concurrent < 0 ||
concurrent > (int)LWS_ARRAY_SIZE(clients)) {
lwsl_err("%s: -c %d larger than max concurrency %d\n", __func__,
concurrent, (int)LWS_ARRAY_SIZE(clients));
return 1;
}
/*
* since we know this lws context is only ever going to be used with
* one client wsis / fds / sockets at a time, let lws know it doesn't
* have to use the default allocations for fd tables up to ulimit -n.
* It will just allocate for 1 internal and n (+ 1 http2 nwsi) that we
* will use.
*/
info.fd_limit_per_thread = 1 + concurrent + 1;
context = lws_create_context(&info);
if (!context) {
lwsl_err("lws init failed\n");
return 1;
}
while (n >= 0 && !interrupted)
n = lws_service(context, 0);
lws_context_destroy(context);
if (tries == limit && closed == tries) {
lwsl_user("Completed\n");
return 0;
}
lwsl_err("Failed\n");
return 1;
}