1Overview of lws test apps 2========================= 3 4Are you building a client? You just need to look at the test client 5[libwebsockets-test-client](../test-apps/test-client.c). 6 7If you are building a standalone server, there are three choices, in order of 8preferability. 9 101) lwsws + protocol plugins 11 12Lws provides a generic web server app that can be configured with JSON 13config files. https://libwebsockets.org itself uses this method. 14 15With lwsws handling the serving part, you only need to write an lws protocol 16plugin. See [plugin-standalone](../plugin-standalone) for an example of how 17to do that outside lws itself, using lws public apis. 18 19 $ cmake .. -DLWS_WITH_LWSWS=1 20 21See [README.lwsws.md](../READMEs/README.lwsws.md) for information on how to configure 22lwsws. 23 24NOTE this method implies libuv is used by lws, to provide crossplatform 25implementations of timers, dynamic lib loading etc for plugins and lwsws. 26 272) Using plugins in code 28 29This method lets you configure web serving in code, instead of using lwsws. 30 31Plugins are still used, but you have a choice whether to dynamically load 32them or statically include them. In this example, they are dynamically 33loaded. 34 35 $ cmake .. -DLWS_WITH_PLUGINS=1 36 37See, eg, the [test-server](../test-apps/test-server.c) 38 393) protocols in the server app 40 41This is the original way lws implemented servers, plugins and libuv are not 42required, but without plugins separating the protocol code directly, the 43combined code is all squidged together and is much less maintainable. 44 45This method is still supported in lws but all ongoing and future work is 46being done in protocol plugins only. 47 48You can simply include the plugin contents and have it buit statically into 49your server, just define this before including the plugin source 50 51``` 52#define LWS_PLUGIN_STATIC 53``` 54 55This gets you most of the advantages without needing dynamic loading + 56libuv. 57 58 59Notes about lws test apps 60========================= 61 62@section tsb Testing server with a browser 63 64If you run [libwebsockets-test-server](../test-apps/test-server.c) and point your browser 65(eg, Chrome) to 66 67 http://127.0.0.1:7681 68 69It will fetch a script in the form of `test.html`, and then run the 70script in there on the browser to open a websocket connection. 71Incrementing numbers should appear in the browser display. 72 73By default the test server logs to both stderr and syslog, you can control 74what is logged using `-d <log level>`, see later. 75 76 77@section tsd Running test server as a Daemon 78 79You can use the -D option on the test server to have it fork into the 80background and return immediately. In this daemonized mode all stderr is 81disabled and logging goes only to syslog, eg, `/var/log/messages` or similar. 82 83The server maintains a lockfile at `/tmp/.lwsts-lock` that contains the pid 84of the master process, and deletes this file when the master process 85terminates. 86 87To stop the daemon, do 88``` 89 $ kill \`cat /tmp/.lwsts-lock\` 90``` 91If it finds a stale lock (the pid mentioned in the file does not exist 92any more) it will delete the lock and create a new one during startup. 93 94If the lock is valid, the daemon will exit with a note on stderr that 95it was already running. 96 97@section clicert Testing Client Certs 98 99Here is a very quick way to create a CA, and a client and server cert from it, 100for testing. 101 102``` 103$ cp -rp ./scripts/client-ca /tmp 104$ cd /tmp/client-ca 105$ ./create-ca.sh 106$ ./create-server-cert.sh server 107$ ./create-client-cert.sh client 108``` 109 110The last step wants an export password, you will need this password again to 111import the p12 format certificate into your browser. 112 113This will get you the following 114 115|name|function| 116|----|--------| 117|ca.pem|Your Certificate Authority cert| 118|ca.key|Private key for the CA cert| 119|client.pem|Client certificate, signed by your CA| 120|client.key|Client private key| 121|client.p12|combined client.pem + client.key in p12 format for browsers| 122|server.pem|Server cert, signed by your CA| 123|server.key|Server private key| 124 125You can confirm yourself the client and server certs are signed by the CA. 126 127``` 128 $ openssl verify -verbose -trusted ca.pem server.pem 129 $ openssl verify -verbose -trusted ca.pem client.pem 130``` 131 132Import the client.p12 file into your browser. In FFOX57 it's 133 134 - preferences 135 - Privacy & Security 136 - Certificates | View Certificates 137 - Certificate Manager | Your Certificates | Import... 138 - Enter the password you gave when creating client1.p12 139 - Click OK. 140 141You can then run the test server like this: 142 143``` 144 $ libwebsockets-test-server -s -A ca.pem -K server.key -C server.pem -v 145``` 146 147When you connect your browser to https://localhost:7681 after accepting the 148selfsigned server cert, your browser will pop up a prompt to send the server 149your client cert (the -v switch enables this). The server will only accept 150a client cert that has been signed by ca.pem. 151 152@section sssl Using SSL on the server side 153 154To test it using SSL/WSS, just run the test server with 155``` 156 $ libwebsockets-test-server --ssl 157``` 158and use the URL 159``` 160 https://127.0.0.1:7681 161``` 162The connection will be entirely encrypted using some generated 163certificates that your browser will not accept, since they are 164not signed by any real Certificate Authority. Just accept the 165certificates in the browser and the connection will proceed 166in first https and then websocket wss, acting exactly the 167same. 168 169[test-server.c](../test-apps/test-server.c) is all that is needed to use libwebsockets for 170serving both the script html over http and websockets. 171 172@section lwstsdynvhost Dynamic Vhosts 173 174You can send libwebsockets-test-server or libwebsockets-test-server-v2.0 a SIGUSR1 175to toggle the creation and destruction of an identical second vhost on port + 1. 176 177This is intended as a test and demonstration for how to bring up and remove 178vhosts dynamically. 179 180@section unixskt Testing Unix Socket Server support 181 182Start the test server with -U and the path to create the unix domain socket 183 184``` 185 $ libwebsockets-test-server -U /tmp/uds 186``` 187 188On exit, lws will delete the socket inode. 189 190To test the client side, eg 191 192``` 193 $ nc -C -U /tmp/uds -i 30 194``` 195 196and type 197 198`GET / HTTP/1.1` 199 200followed by two ENTER. The contents of test.html should be returned. 201 202@section wscl Testing websocket client support 203 204If you run the test server as described above, you can also 205connect to it using the test client as well as a browser. 206 207``` 208 $ libwebsockets-test-client localhost 209``` 210 211will by default connect to the test server on localhost:7681 212and print the dumb increment number from the server at the 213same time as drawing random circles in the mirror protocol; 214if you connect to the test server using a browser at the 215same time you will be able to see the circles being drawn. 216 217The test client supports SSL too, use 218 219``` 220 $ libwebsockets-test-client localhost --ssl -s 221``` 222 223the -s tells it to accept the default self-signed cert from the server, 224otherwise it will strictly fail the connection if there is no CA cert to 225validate the server's certificate. 226 227 228@section choosingts Choosing between test server variations 229 230If you will be doing standalone serving with lws, ideally you should avoid 231making your own server at all, and use lwsws with your own protocol plugins. 232 233The second best option is follow test-server-v2.0.c, which uses a mount to 234autoserve a directory, and lws protocol plugins for ws, without needing any 235user callback code (other than what's needed in the protocol plugin). 236 237For those two options libuv is needed to support the protocol plugins, if 238that's not possible then the other variations with their own protocol code 239should be considered. 240 241@section tassl Testing SSL on the client side 242 243To test SSL/WSS client action, just run the client test with 244``` 245 $ libwebsockets-test-client localhost --ssl 246``` 247By default the client test applet is set to accept self-signed 248certificates used by the test server, this is indicated by the 249`use_ssl` var being set to `2`. Set it to `1` to reject any server 250certificate that it doesn't have a trusted CA cert for. 251 252 253@section taping Using the websocket ping utility 254 255libwebsockets-test-ping connects as a client to a remote 256websocket server and pings it like the 257normal unix ping utility. 258``` 259 $ libwebsockets-test-ping localhost 260 handshake OK for protocol lws-mirror-protocol 261 Websocket PING localhost.localdomain (127.0.0.1) 64 bytes of data. 262 64 bytes from localhost: req=1 time=0.1ms 263 64 bytes from localhost: req=2 time=0.1ms 264 64 bytes from localhost: req=3 time=0.1ms 265 64 bytes from localhost: req=4 time=0.2ms 266 64 bytes from localhost: req=5 time=0.1ms 267 64 bytes from localhost: req=6 time=0.2ms 268 64 bytes from localhost: req=7 time=0.2ms 269 64 bytes from localhost: req=8 time=0.1ms 270 ^C 271 --- localhost.localdomain websocket ping statistics --- 272 8 packets transmitted, 8 received, 0% packet loss, time 7458ms 273 rtt min/avg/max = 0.110/0.185/0.218 ms 274 $ 275``` 276By default it sends 64 byte payload packets using the 04 277PING packet opcode type. You can change the payload size 278using the `-s=` flag, up to a maximum of 125 mandated by the 27904 standard. 280 281Using the lws-mirror protocol that is provided by the test 282server, libwebsockets-test-ping can also use larger payload 283sizes up to 4096 is BINARY packets; lws-mirror will copy 284them back to the client and they appear as a PONG. Use the 285`-m` flag to select this operation. 286 287The default interval between pings is 1s, you can use the -i= 288flag to set this, including fractions like `-i=0.01` for 10ms 289interval. 290 291Before you can even use the PING opcode that is part of the 292standard, you must complete a handshake with a specified 293protocol. By default lws-mirror-protocol is used which is 294supported by the test server. But if you are using it on 295another server, you can specify the protocol to handshake with 296by `--protocol=protocolname` 297 298 299@section ta fraggle Fraggle test app 300 301By default it runs in server mode 302``` 303 $ libwebsockets-test-fraggle 304 libwebsockets test fraggle 305 (C) Copyright 2010-2011 Andy Green <andy@warmcat.com> licensed under MIT 306 Compiled with SSL support, not using it 307 Listening on port 7681 308 server sees client connect 309 accepted v06 connection 310 Spamming 360 random fragments 311 Spamming session over, len = 371913. sum = 0x2D3C0AE 312 Spamming 895 random fragments 313 Spamming session over, len = 875970. sum = 0x6A74DA1 314 ... 315``` 316You need to run a second session in client mode, you have to 317give the `-c` switch and the server address at least: 318``` 319 $ libwebsockets-test-fraggle -c localhost 320 libwebsockets test fraggle 321 (C) Copyright 2010-2011 Andy Green <andy@warmcat.com> licensed under MIT 322 Client mode 323 Connecting to localhost:7681 324 denied deflate-stream extension 325 handshake OK for protocol fraggle-protocol 326 client connects to server 327 EOM received 371913 correctly from 360 fragments 328 EOM received 875970 correctly from 895 fragments 329 EOM received 247140 correctly from 258 fragments 330 EOM received 695451 correctly from 692 fragments 331 ... 332``` 333The fraggle test sends a random number up to 1024 fragmented websocket frames 334each of a random size between 1 and 2001 bytes in a single message, then sends 335a checksum and starts sending a new randomly sized and fragmented message. 336 337The fraggle test client receives the same message fragments and computes the 338same checksum using websocket framing to see when the message has ended. It 339then accepts the server checksum message and compares that to its checksum. 340 341 342@section taproxy proxy support 343 344The http_proxy environment variable is respected by the client 345connection code for both `ws://` and `wss://`. It doesn't support 346authentication. 347 348You use it like this 349``` 350 $ export http_proxy=myproxy.com:3128 351 $ libwebsockets-test-client someserver.com 352``` 353 354@section talog debug logging 355 356By default logging of severity "notice", "warn" or "err" is enabled to stderr. 357 358Again by default other logging is compiled in but disabled from printing. 359 360By default debug logs below "notice" in severity are not compiled in. To get 361them included, add this option in CMAKE 362 363``` 364 $ cmake .. -DCMAKE_BUILD_TYPE=DEBUG 365``` 366 367If you want to see more detailed debug logs, you can control a bitfield to 368select which logs types may print using the `lws_set_log_level()` api, in the 369test apps you can use `-d <number>` to control this. The types of logging 370available are (OR together the numbers to select multiple) 371 372 - 1 ERR 373 - 2 WARN 374 - 4 NOTICE 375 - 8 INFO 376 - 16 DEBUG 377 - 32 PARSER 378 - 64 HEADER 379 - 128 EXTENSION 380 - 256 CLIENT 381 - 512 LATENCY 382 383 384@section ws13 Websocket version supported 385 386The final IETF standard is supported for both client and server, protocol 387version 13. 388 389 390@section latency Latency Tracking 391 392Since libwebsockets runs using `poll()` and a single threaded approach, any 393unexpected latency coming from system calls would be bad news. There's now 394a latency tracking scheme that can be built in with `-DLWS_WITH_LATENCY=1` at 395cmake, logging the time taken for system calls to complete and if 396the whole action did complete that time or was deferred. 397 398You can see the detailed data by enabling logging level 512 (eg, `-d 519` on 399the test server to see that and the usual logs), however even without that 400the "worst" latency is kept and reported to the logs with NOTICE severity 401when the context is destroyed. 402 403Some care is needed interpreting them, if the action completed the first figure 404(in us) is the time taken for the whole action, which may have retried through 405the poll loop many times and will depend on network roundtrip times. High 406figures here don't indicate a problem. The figure in us reported after "lat" 407in the logging is the time taken by this particular attempt. High figures 408here may indicate a problem, or if you system is loaded with another app at 409that time, such as the browser, it may simply indicate the OS gave preferential 410treatment to the other app during that call. 411 412 413@section autobahn Autobahn Test Suite 414 415Lws can be tested against the autobahn websocket fuzzer in both client and 416server modes 417 4181) pip install autobahntestsuite 419 4202) From your build dir: 421 422``` 423 $ cmake .. -DLWS_WITHOUT_EXTENSIONS=0 -DLWS_WITH_MINIMAL_EXAMPLES=1 && make 424``` 425 4263) ../scripts/autobahn-test.sh 427 4284) In a browser go to the directory you ran wstest in (eg, /projects/libwebsockets) 429 430file:///projects/libwebsockets/build/reports/clients/index.html 431 432to see the results 433 434 435@section autobahnnotes Autobahn Test Notes 436 4371) Two of the tests make no sense for Libwebsockets to support and we fail them. 438 439 - Tests 2.10 + 2.11: sends multiple pings on one connection. Lws policy is to 440only allow one active ping in flight on each connection, the rest are dropped. 441The autobahn test itself admits this is not part of the standard, just someone's 442random opinion about how they think a ws server should act. So we will fail 443this by design and it is no problem about RFC6455 compliance. 444 4452) Currently two parts of autobahn are broken and we skip them 446 447https://github.com/crossbario/autobahn-testsuite/issues/71 448 449