forked from kostasgr100/fastwebsockets
-
Notifications
You must be signed in to change notification settings - Fork 0
/
load_test.c
306 lines (244 loc) · 9.61 KB
/
load_test.c
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
/* This is a simple yet efficient WebSocket server benchmark much like WRK */
#define _BSD_SOURCE
#ifdef __APPLE__
#include <libkern/OSByteOrder.h>
#define htobe16(x) OSSwapHostToBigInt16(x)
#define htole16(x) OSSwapHostToLittleInt16(x)
#define be16toh(x) OSSwapBigToHostInt16(x)
#define le16toh(x) OSSwapLittleToHostInt16(x)
#define htobe32(x) OSSwapHostToBigInt32(x)
#define htole32(x) OSSwapHostToLittleInt32(x)
#define be32toh(x) OSSwapBigToHostInt32(x)
#define le32toh(x) OSSwapLittleToHostInt32(x)
#define htobe64(x) OSSwapHostToBigInt64(x)
#define htole64(x) OSSwapHostToLittleInt64(x)
#define be64toh(x) OSSwapBigToHostInt64(x)
#define le64toh(x) OSSwapLittleToHostInt64(x)
#else
#include <endian.h>
#endif
#include <stdint.h>
#include <libusockets.h>
int SSL;
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
/* Whatever type we selected (compressed or not) */
unsigned char *web_socket_request;
int web_socket_request_size;
char *upgrade_request;
int upgrade_request_length;
/* Compressed message */
unsigned char web_socket_request_deflate[13] = {
130 | 64, 128 | 7, 0, 0, 0, 0, 0xf2, 0x48, 0xcd, 0xc9, 0xc9, 0x07, 0x00};
/* Not compressed */
unsigned char web_socket_request_text_small[26] = {130, 128 | 20, 1, 2, 3, 4};
unsigned int web_socket_request_text_size = 26;
unsigned char *web_socket_request_text = web_socket_request_text_small;
/* Called to swap from small text message to big text message */
void init_big_message(unsigned int size) {
if (size < 65536) {
web_socket_request_text_size = size + 6 + 2;
web_socket_request_text = malloc(web_socket_request_text_size);
web_socket_request_text[0] = 130;
web_socket_request_text[1] = 126 | 0x80;
uint16_t msg_size = htobe16(size);
memcpy(&web_socket_request_text[2], &msg_size, 2);
web_socket_request_text[4] = 1;
web_socket_request_text[4] = 2;
web_socket_request_text[4] = 3;
web_socket_request_text[4] = 4;
return;
}
web_socket_request_text_size = size + 6 + 8;
web_socket_request_text = malloc(web_socket_request_text_size);
web_socket_request_text[0] = 130;
web_socket_request_text[1] = 255;
uint64_t msg_size = htobe64(size);
memcpy(&web_socket_request_text[2], &msg_size, 8);
web_socket_request_text[10] = 1;
web_socket_request_text[10] = 2;
web_socket_request_text[10] = 3;
web_socket_request_text[10] = 4;
}
char request_deflate[] =
"GET / HTTP/1.1\r\n"
"Upgrade: websocket\r\n"
"Connection: Upgrade\r\n"
"Sec-WebSocket-Key: x3JJHMbDL1EzLkh9GBhXDw==\r\n"
"Sec-WebSocket-Extensions: permessage-deflate; client_max_window_bits\r\n"
"Host: server.example.com\r\n"
"Sec-WebSocket-Version: 13\r\n\r\n";
char request_text[] =
"GET / HTTP/1.1\r\n"
"Upgrade: websocket\r\n"
"Connection: Upgrade\r\n"
"Sec-WebSocket-Key: x3JJHMbDL1EzLkh9GBhXDw==\r\n"
//"Sec-WebSocket-Extensions: permessage-deflate; client_max_window_bits\r\n"
"Host: server.example.com\r\n"
"Sec-WebSocket-Version: 13\r\n\r\n";
char *host;
int port;
int connections;
int responses;
struct http_socket {
/* How far we have streamed our websocket request */
int offset;
/* How far we have streamed our upgrade request */
int upgrade_offset;
/* Whether or not we have received the upgrade response */
int is_upgraded;
/* How many bytes we expect to be echoed back to us before we consider the
* echo done */
int outstanding_bytes;
};
/* We don't need any of these */
void on_wakeup(struct us_loop_t *loop) {}
void on_pre(struct us_loop_t *loop) {}
/* This is not HTTP POST, it is merely an event emitted post loop iteration */
void on_post(struct us_loop_t *loop) {}
void next_connection(struct us_socket_t *s) {
/* We could wait with this until properly upgraded */
if (--connections) {
us_socket_context_connect(SSL, us_socket_context(SSL, s), host, port, NULL,
0, sizeof(struct http_socket));
} else {
printf("Running benchmark now...\n");
us_socket_timeout(SSL, s, LIBUS_TIMEOUT_GRANULARITY);
}
}
struct us_socket_t *on_http_socket_writable(struct us_socket_t *s) {
struct http_socket *http_socket = (struct http_socket *)us_socket_ext(SSL, s);
/* Are we still not upgraded yet? */
if (http_socket->upgrade_offset < upgrade_request_length) {
http_socket->upgrade_offset += us_socket_write(
SSL, s, upgrade_request + http_socket->upgrade_offset,
upgrade_request_length - http_socket->upgrade_offset, 0);
/* Now we should be */
if (http_socket->upgrade_offset == upgrade_request_length) {
next_connection(s);
}
} else {
/* Stream whatever is remaining of the request */
http_socket->offset += us_socket_write(
SSL, s, (char *)web_socket_request + http_socket->offset,
web_socket_request_size - http_socket->offset, 0);
}
return s;
}
struct us_socket_t *on_http_socket_close(struct us_socket_t *s, int code,
void *reason) {
printf("Closed!\n");
return s;
}
struct us_socket_t *on_http_socket_end(struct us_socket_t *s) {
return us_socket_close(SSL, s, 0, NULL);
}
struct us_socket_t *on_http_socket_data(struct us_socket_t *s, char *data,
int length) {
/* Get socket extension and the socket's context's extension */
struct http_socket *http_socket = (struct http_socket *)us_socket_ext(SSL, s);
if (http_socket->is_upgraded) {
/* If we are upgraded we now count to see if we receive the corect echo */
http_socket->outstanding_bytes -= length;
if (http_socket->outstanding_bytes == 0) {
/* We got exactly the correct amount of bytes back, send another message
*/
http_socket->offset = us_socket_write(SSL, s, (char *)web_socket_request,
web_socket_request_size, 0);
http_socket->outstanding_bytes = web_socket_request_size - 4;
/* Increase stats */
responses++;
} else if (http_socket->outstanding_bytes < 0) {
/* This should never happen */
printf("ERROR: outstanding bytes negative!");
exit(0);
}
} else {
/* We assume the last 4 bytes will be delivered in one chunk */
if (length >= 4 && memcmp(data + length - 4, "\r\n\r\n", 4) == 0) {
/* We are upgraded so start sending the message for echoing */
http_socket->offset = us_socket_write(SSL, s, (char *)web_socket_request,
web_socket_request_size, 0);
/* Server will echo back the same message minus 4 bytes for mask */
http_socket->outstanding_bytes = web_socket_request_size - 4;
http_socket->is_upgraded = 1;
}
}
return s;
}
struct us_socket_t *on_http_socket_open(struct us_socket_t *s, int is_client,
char *ip, int ip_length) {
struct http_socket *http_socket = (struct http_socket *)us_socket_ext(SSL, s);
/* Reset offsets */
http_socket->offset = 0;
http_socket->is_upgraded = 0;
/* Send an upgrade request */
http_socket->upgrade_offset =
us_socket_write(SSL, s, upgrade_request, upgrade_request_length, 0);
if (http_socket->upgrade_offset == upgrade_request_length) {
next_connection(s);
}
return s;
}
struct us_socket_t *on_http_socket_timeout(struct us_socket_t *s) {
/* Print current statistics */
printf("Msg/sec: %f\n", ((float)responses) / LIBUS_TIMEOUT_GRANULARITY);
fflush(stdout);
responses = 0;
us_socket_timeout(SSL, s, LIBUS_TIMEOUT_GRANULARITY);
return s;
}
int main(int argc, char **argv) {
/* Parse host and port */
if (argc != 6 && argc != 7) {
printf("Usage: connections host port ssl deflate [size_mb]\n");
return 0;
}
port = atoi(argv[3]);
host = malloc(strlen(argv[2]) + 1);
memcpy(host, argv[2], strlen(argv[2]) + 1);
connections = atoi(argv[1]);
// SSL = atoi(argv[4]);
if (atoi(argv[5])) {
/* Set up deflate */
web_socket_request = web_socket_request_deflate;
web_socket_request_size = sizeof(web_socket_request_deflate);
upgrade_request = request_deflate;
upgrade_request_length = sizeof(request_deflate) - 1;
} else {
/* Only if we are NOT using defalte can we support testing with 100mb for
* now */
if (argc == 7) {
int size_bytes = atoi(argv[6]);
printf("Using message size of %d bytes\n", size_bytes);
init_big_message(size_bytes);
}
web_socket_request = web_socket_request_text;
web_socket_request_size = web_socket_request_text_size;
upgrade_request = request_text;
upgrade_request_length = sizeof(request_text) - 1;
}
/* Create the event loop */
struct us_loop_t *loop = us_create_loop(0, on_wakeup, on_pre, on_post, 0);
/* Create a socket context for HTTP */
struct us_socket_context_options_t options = {};
// options.key_file_name =
//"/Users/divy/gh/fastwebsockets/examples/localhost.key",
// options.cert_file_name =
//"/Users/divy/gh/fastwebsockets/examples/localhost.crt",
// options.passphrase = "1234";
struct us_socket_context_t *http_context =
us_create_socket_context(SSL, loop, 0, options);
/* Set up event handlers */
us_socket_context_on_open(SSL, http_context, on_http_socket_open);
us_socket_context_on_data(SSL, http_context, on_http_socket_data);
us_socket_context_on_writable(SSL, http_context, on_http_socket_writable);
us_socket_context_on_close(SSL, http_context, on_http_socket_close);
us_socket_context_on_timeout(SSL, http_context, on_http_socket_timeout);
us_socket_context_on_end(SSL, http_context, on_http_socket_end);
/* Start making HTTP connections */
us_socket_context_connect(SSL, http_context, host, port, NULL, 0,
sizeof(struct http_socket));
us_loop_run(loop);
}