• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1Overview of lws test apps
2=========================
3
4Are you building a client?  You just need to look at the test client
5[libwebsockets-test-client](../test-apps/test-client.c).
6
7If you are building a standalone server, there are three choices, in order of
8preferability.
9
101) lwsws + protocol plugins
11
12Lws provides a generic web server app that can be configured with JSON
13config files.  https://libwebsockets.org itself uses this method.
14
15With lwsws handling the serving part, you only need to write an lws protocol
16plugin.  See [plugin-standalone](../plugin-standalone) for an example of how
17to do that outside lws itself, using lws public apis.
18
19 $ cmake .. -DLWS_WITH_LWSWS=1
20
21See [README.lwsws.md](../READMEs/README.lwsws.md) for information on how to configure
22lwsws.
23
24NOTE this method implies libuv is used by lws, to provide crossplatform
25implementations of timers, dynamic lib loading etc for plugins and lwsws.
26
272) Using plugins in code
28
29This method lets you configure web serving in code, instead of using lwsws.
30
31Plugins are still used, but you have a choice whether to dynamically load
32them or statically include them.  In this example, they are dynamically
33loaded.
34
35 $ cmake .. -DLWS_WITH_PLUGINS=1
36
37See, eg, the [test-server](../test-apps/test-server.c)
38
393) protocols in the server app
40
41This is the original way lws implemented servers, plugins and libuv are not
42required, but without plugins separating the protocol code directly, the
43combined code is all squidged together and is much less maintainable.
44
45This method is still supported in lws but all ongoing and future work is
46being done in protocol plugins only.
47
48You can simply include the plugin contents and have it buit statically into
49your server, just define this before including the plugin source
50
51```
52#define LWS_PLUGIN_STATIC
53```
54
55This gets you most of the advantages without needing dynamic loading +
56libuv.
57
58
59Notes about lws test apps
60=========================
61
62@section tsb Testing server with a browser
63
64If you run [libwebsockets-test-server](../test-apps/test-server.c) and point your browser
65(eg, Chrome) to
66
67	http://127.0.0.1:7681
68
69It will fetch a script in the form of `test.html`, and then run the
70script in there on the browser to open a websocket connection.
71Incrementing numbers should appear in the browser display.
72
73By default the test server logs to both stderr and syslog, you can control
74what is logged using `-d <log level>`, see later.
75
76
77@section tsd Running test server as a Daemon
78
79You can use the -D option on the test server to have it fork into the
80background and return immediately.  In this daemonized mode all stderr is
81disabled and logging goes only to syslog, eg, `/var/log/messages` or similar.
82
83The server maintains a lockfile at `/tmp/.lwsts-lock` that contains the pid
84of the master process, and deletes this file when the master process
85terminates.
86
87To stop the daemon, do
88```
89       $ kill \`cat /tmp/.lwsts-lock\`
90```
91If it finds a stale lock (the pid mentioned in the file does not exist
92any more) it will delete the lock and create a new one during startup.
93
94If the lock is valid, the daemon will exit with a note on stderr that
95it was already running.
96
97@section clicert Testing Client Certs
98
99Here is a very quick way to create a CA, and a client and server cert from it,
100for testing.
101
102```
103$ cp -rp ./scripts/client-ca /tmp
104$ cd /tmp/client-ca
105$ ./create-ca.sh
106$ ./create-server-cert.sh server
107$ ./create-client-cert.sh client
108```
109
110The last step wants an export password, you will need this password again to
111import the p12 format certificate into your browser.
112
113This will get you the following
114
115|name|function|
116|----|--------|
117|ca.pem|Your Certificate Authority cert|
118|ca.key|Private key for the CA cert|
119|client.pem|Client certificate, signed by your CA|
120|client.key|Client private key|
121|client.p12|combined client.pem + client.key in p12 format for browsers|
122|server.pem|Server cert, signed by your CA|
123|server.key|Server private key|
124
125You can confirm yourself the client and server certs are signed by the CA.
126
127```
128 $ openssl verify -verbose -trusted ca.pem server.pem
129 $ openssl verify -verbose -trusted ca.pem client.pem
130```
131
132Import the client.p12 file into your browser.  In FFOX57 it's
133
134 - preferences
135 - Privacy & Security
136 - Certificates | View Certificates
137 - Certificate Manager | Your Certificates | Import...
138 - Enter the password you gave when creating client1.p12
139 - Click OK.
140
141You can then run the test server like this:
142
143```
144 $ libwebsockets-test-server -s -A ca.pem -K server.key -C server.pem -v
145```
146
147When you connect your browser to https://localhost:7681 after accepting the
148selfsigned server cert, your browser will pop up a prompt to send the server
149your client cert (the -v switch enables this).  The server will only accept
150a client cert that has been signed by ca.pem.
151
152@section sssl Using SSL on the server side
153
154To test it using SSL/WSS, just run the test server with
155```
156	$ libwebsockets-test-server --ssl
157```
158and use the URL
159```
160	https://127.0.0.1:7681
161```
162The connection will be entirely encrypted using some generated
163certificates that your browser will not accept, since they are
164not signed by any real Certificate Authority.  Just accept the
165certificates in the browser and the connection will proceed
166in first https and then websocket wss, acting exactly the
167same.
168
169[test-server.c](../test-apps/test-server.c) is all that is needed to use libwebsockets for
170serving both the script html over http and websockets.
171
172@section lwstsdynvhost Dynamic Vhosts
173
174You can send libwebsockets-test-server or libwebsockets-test-server-v2.0 a SIGUSR1
175to toggle the creation and destruction of an identical second vhost on port + 1.
176
177This is intended as a test and demonstration for how to bring up and remove
178vhosts dynamically.
179
180@section unixskt Testing Unix Socket Server support
181
182Start the test server with -U and the path to create the unix domain socket
183
184```
185 $ libwebsockets-test-server -U /tmp/uds
186```
187
188On exit, lws will delete the socket inode.
189
190To test the client side, eg
191
192```
193 $ nc -C -U /tmp/uds -i 30
194```
195
196and type
197
198`GET / HTTP/1.1`
199
200followed by two ENTER.  The contents of test.html should be returned.
201
202@section wscl Testing websocket client support
203
204If you run the test server as described above, you can also
205connect to it using the test client as well as a browser.
206
207```
208	$ libwebsockets-test-client localhost
209```
210
211will by default connect to the test server on localhost:7681
212and print the dumb increment number from the server at the
213same time as drawing random circles in the mirror protocol;
214if you connect to the test server using a browser at the
215same time you will be able to see the circles being drawn.
216
217The test client supports SSL too, use
218
219```
220	$ libwebsockets-test-client localhost --ssl -s
221```
222
223the -s tells it to accept the default self-signed cert from the server,
224otherwise it will strictly fail the connection if there is no CA cert to
225validate the server's certificate.
226
227
228@section choosingts Choosing between test server variations
229
230If you will be doing standalone serving with lws, ideally you should avoid
231making your own server at all, and use lwsws with your own protocol plugins.
232
233The second best option is follow test-server-v2.0.c, which uses a mount to
234autoserve a directory, and lws protocol plugins for ws, without needing any
235user callback code (other than what's needed in the protocol plugin).
236
237For those two options libuv is needed to support the protocol plugins, if
238that's not possible then the other variations with their own protocol code
239should be considered.
240
241@section tassl Testing SSL on the client side
242
243To test SSL/WSS client action, just run the client test with
244```
245	$ libwebsockets-test-client localhost --ssl
246```
247By default the client test applet is set to accept self-signed
248certificates used by the test server, this is indicated by the
249`use_ssl` var being set to `2`.  Set it to `1` to reject any server
250certificate that it doesn't have a trusted CA cert for.
251
252
253@section taping Using the websocket ping utility
254
255libwebsockets-test-ping connects as a client to a remote
256websocket server and pings it like the
257normal unix ping utility.
258```
259	$ libwebsockets-test-ping localhost
260	handshake OK for protocol lws-mirror-protocol
261	Websocket PING localhost.localdomain (127.0.0.1) 64 bytes of data.
262	64 bytes from localhost: req=1 time=0.1ms
263	64 bytes from localhost: req=2 time=0.1ms
264	64 bytes from localhost: req=3 time=0.1ms
265	64 bytes from localhost: req=4 time=0.2ms
266	64 bytes from localhost: req=5 time=0.1ms
267	64 bytes from localhost: req=6 time=0.2ms
268	64 bytes from localhost: req=7 time=0.2ms
269	64 bytes from localhost: req=8 time=0.1ms
270	^C
271	--- localhost.localdomain websocket ping statistics ---
272	8 packets transmitted, 8 received, 0% packet loss, time 7458ms
273	rtt min/avg/max = 0.110/0.185/0.218 ms
274	$
275```
276By default it sends 64 byte payload packets using the 04
277PING packet opcode type.  You can change the payload size
278using the `-s=` flag, up to a maximum of 125 mandated by the
27904 standard.
280
281Using the lws-mirror protocol that is provided by the test
282server, libwebsockets-test-ping can also use larger payload
283sizes up to 4096 is BINARY packets; lws-mirror will copy
284them back to the client and they appear as a PONG.  Use the
285`-m` flag to select this operation.
286
287The default interval between pings is 1s, you can use the -i=
288flag to set this, including fractions like `-i=0.01` for 10ms
289interval.
290
291Before you can even use the PING opcode that is part of the
292standard, you must complete a handshake with a specified
293protocol.  By default lws-mirror-protocol is used which is
294supported by the test server.  But if you are using it on
295another server, you can specify the protocol to handshake with
296by `--protocol=protocolname`
297
298
299@section ta fraggle Fraggle test app
300
301By default it runs in server mode
302```
303	$ libwebsockets-test-fraggle
304	libwebsockets test fraggle
305	(C) Copyright 2010-2011 Andy Green <andy@warmcat.com> licensed under MIT
306	 Compiled with SSL support, not using it
307	 Listening on port 7681
308	server sees client connect
309	accepted v06 connection
310	Spamming 360 random fragments
311	Spamming session over, len = 371913. sum = 0x2D3C0AE
312	Spamming 895 random fragments
313	Spamming session over, len = 875970. sum = 0x6A74DA1
314	...
315```
316You need to run a second session in client mode, you have to
317give the `-c` switch and the server address at least:
318```
319	$ libwebsockets-test-fraggle -c localhost
320	libwebsockets test fraggle
321	(C) Copyright 2010-2011 Andy Green <andy@warmcat.com> licensed under MIT
322	 Client mode
323	Connecting to localhost:7681
324	denied deflate-stream extension
325	handshake OK for protocol fraggle-protocol
326	client connects to server
327	EOM received 371913 correctly from 360 fragments
328	EOM received 875970 correctly from 895 fragments
329	EOM received 247140 correctly from 258 fragments
330	EOM received 695451 correctly from 692 fragments
331	...
332```
333The fraggle test sends a random number up to 1024 fragmented websocket frames
334each of a random size between 1 and 2001 bytes in a single message, then sends
335a checksum and starts sending a new randomly sized and fragmented message.
336
337The fraggle test client receives the same message fragments and computes the
338same checksum using websocket framing to see when the message has ended.  It
339then accepts the server checksum message and compares that to its checksum.
340
341
342@section taproxy proxy support
343
344The http_proxy environment variable is respected by the client
345connection code for both `ws://` and `wss://`.  It doesn't support
346authentication.
347
348You use it like this
349```
350	$ export http_proxy=myproxy.com:3128
351	$ libwebsockets-test-client someserver.com
352```
353
354@section talog debug logging
355
356By default logging of severity "notice", "warn" or "err" is enabled to stderr.
357
358Again by default other logging is compiled in but disabled from printing.
359
360By default debug logs below "notice" in severity are not compiled in.  To get
361them included, add this option in CMAKE
362
363```
364	$ cmake .. -DCMAKE_BUILD_TYPE=DEBUG
365```
366
367If you want to see more detailed debug logs, you can control a bitfield to
368select which logs types may print using the `lws_set_log_level()` api, in the
369test apps you can use `-d <number>` to control this.  The types of logging
370available are (OR together the numbers to select multiple)
371
372 - 1   ERR
373 - 2   WARN
374 - 4   NOTICE
375 - 8   INFO
376 - 16  DEBUG
377 - 32  PARSER
378 - 64  HEADER
379 - 128 EXTENSION
380 - 256 CLIENT
381 - 512 LATENCY
382
383
384@section ws13 Websocket version supported
385
386The final IETF standard is supported for both client and server, protocol
387version 13.
388
389
390@section latency Latency Tracking
391
392Since libwebsockets runs using `poll()` and a single threaded approach, any
393unexpected latency coming from system calls would be bad news.  There's now
394a latency tracking scheme that can be built in with `-DLWS_WITH_LATENCY=1` at
395cmake, logging the time taken for system calls to complete and if
396the whole action did complete that time or was deferred.
397
398You can see the detailed data by enabling logging level 512 (eg, `-d 519` on
399the test server to see that and the usual logs), however even without that
400the "worst" latency is kept and reported to the logs with NOTICE severity
401when the context is destroyed.
402
403Some care is needed interpreting them, if the action completed the first figure
404(in us) is the time taken for the whole action, which may have retried through
405the poll loop many times and will depend on network roundtrip times.  High
406figures here don't indicate a problem.  The figure in us reported after "lat"
407in the logging is the time taken by this particular attempt.  High figures
408here may indicate a problem, or if you system is loaded with another app at
409that time, such as the browser, it may simply indicate the OS gave preferential
410treatment to the other app during that call.
411
412
413@section autobahn Autobahn Test Suite
414
415Lws can be tested against the autobahn websocket fuzzer in both client and
416server modes
417
4181) pip install autobahntestsuite
419
4202) From your build dir:
421
422```
423 $ cmake .. -DLWS_WITHOUT_EXTENSIONS=0 -DLWS_WITH_MINIMAL_EXAMPLES=1 && make
424```
425
4263) ../scripts/autobahn-test.sh
427
4284) In a browser go to the directory you ran wstest in (eg, /projects/libwebsockets)
429
430file:///projects/libwebsockets/build/reports/clients/index.html
431
432to see the results
433
434
435@section autobahnnotes Autobahn Test Notes
436
4371) Two of the tests make no sense for Libwebsockets to support and we fail them.
438
439 - Tests 2.10 + 2.11: sends multiple pings on one connection.  Lws policy is to
440only allow one active ping in flight on each connection, the rest are dropped.
441The autobahn test itself admits this is not part of the standard, just someone's
442random opinion about how they think a ws server should act.  So we will fail
443this by design and it is no problem about RFC6455 compliance.
444
4452) Currently two parts of autobahn are broken and we skip them
446
447https://github.com/crossbario/autobahn-testsuite/issues/71
448
449