123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734 |
- /*
- * Copyright (c) 2020 SignalWire, Inc
- *
- * Permission is hereby granted, free of charge, to any person obtaining a copy
- * of this software and associated documentation files (the "Software"), to deal
- * in the Software without restriction, including without limitation the rights
- * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
- * copies of the Software, and to permit persons to whom the Software is
- * furnished to do so, subject to the following conditions:
- *
- * The above copyright notice and this permission notice shall be included in all
- * copies or substantial portions of the Software.
- *
- * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
- * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
- * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
- * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
- * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
- * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
- * SOFTWARE.
- */
- #include "libks/ks.h"
- #include <tap.h>
- #ifdef _WINDOWS_
- #undef unlink
- #define unlink _unlink
- #endif
- static char v4[48] = "";
- static char v6[48] = "";
- static int mask = 0;
- static int tcp_port = 8090;
- static char __MSG[] = "TESTING................................................................................/TESTING";
- typedef struct ssl_profile_s {
- const SSL_METHOD *ssl_method;
- SSL_CTX *ssl_ctx;
- char cert[512];
- char key[512];
- char chain[512];
- } ssl_profile_t;
- static int init_ssl(ssl_profile_t *profile)
- {
- const char *err = "";
- profile->ssl_ctx = SSL_CTX_new(profile->ssl_method); /* create context */
- assert(profile->ssl_ctx);
- /* Disable SSLv2 */
- SSL_CTX_set_options(profile->ssl_ctx, SSL_OP_NO_SSLv2);
- /* Disable SSLv3 */
- SSL_CTX_set_options(profile->ssl_ctx, SSL_OP_NO_SSLv3);
- /* Disable TLSv1 */
- SSL_CTX_set_options(profile->ssl_ctx, SSL_OP_NO_TLSv1);
- /* Disable Compression CRIME (Compression Ratio Info-leak Made Easy) */
- SSL_CTX_set_options(profile->ssl_ctx, SSL_OP_NO_COMPRESSION);
- /* set the local certificate from CertFile */
- if (!ks_zstr(profile->chain)) {
- if (!SSL_CTX_use_certificate_chain_file(profile->ssl_ctx, profile->chain)) {
- err = "CERT CHAIN FILE ERROR";
- goto fail;
- }
- }
- if (!SSL_CTX_use_certificate_file(profile->ssl_ctx, profile->cert, SSL_FILETYPE_PEM)) {
- err = "CERT FILE ERROR";
- goto fail;
- }
- /* set the private key from KeyFile */
- if (!SSL_CTX_use_PrivateKey_file(profile->ssl_ctx, profile->key, SSL_FILETYPE_PEM)) {
- err = "PRIVATE KEY FILE ERROR";
- goto fail;
- }
- /* verify private key */
- if ( !SSL_CTX_check_private_key(profile->ssl_ctx) ) {
- err = "PRIVATE KEY FILE ERROR";
- goto fail;
- }
- SSL_CTX_set_cipher_list(profile->ssl_ctx, "HIGH:!DSS:!aNULL@STRENGTH");
- return 1;
- fail:
- ks_log(KS_LOG_ERROR, "SSL ERR: %s\n", err);
- return 0;
- }
- struct tcp_data {
- ks_socket_t sock;
- ks_sockaddr_t addr;
- int ready;
- char *ip;
- ks_pool_t *pool;
- int ssl;
- ssl_profile_t client_profile;
- ssl_profile_t server_profile;
- };
- void server_callback(ks_socket_t server_sock, ks_socket_t client_sock, ks_sockaddr_t *addr, void *user_data)
- {
- struct tcp_data *tcp_data = (struct tcp_data *) user_data;
- ks_size_t bytes;
- kws_t *kws = NULL;
- kws_opcode_t oc;
- uint8_t *data;
- int keepalive = 0;
- kws_request_t *request = NULL;
- if (tcp_data->ssl) {
- tcp_data->server_profile.ssl_method = SSLv23_server_method();
- ks_set_string(tcp_data->server_profile.cert, "./testhttp.pem");
- ks_set_string(tcp_data->server_profile.key, "./testhttp.pem");
- ks_set_string(tcp_data->server_profile.chain, "./testhttp.pem");
- init_ssl(&tcp_data->server_profile);
- }
- printf("WS %s SERVER SOCK %d connection from %s:%u\n", tcp_data->ssl ? "SSL" : "PLAIN", (int)server_sock, addr->host, addr->port);
- int flags = KWS_BLOCK | KWS_STAY_OPEN | KWS_HTTP;
- if (kws_init(&kws, client_sock, tcp_data->server_profile.ssl_ctx, NULL, flags, tcp_data->pool) != KS_STATUS_SUCCESS) {
- printf("WS SERVER CREATE FAIL\n");
- goto end;
- }
- if (!kws_test_flag(kws, KWS_HTTP)) {
- printf("Non HTTP Request\n");
- goto end;
- }
- new_req:
- if (kws_parse_header(kws, &request) != KS_STATUS_SUCCESS) {
- printf("Parse Header Error\n");
- goto end;
- }
- printf("request uri: %s\n", request->uri);
- kws_request_dump(request);
- if (!strncmp(request->method, "GET", 3)) {
- char data[512];
- ks_snprintf(data, sizeof(data),
- "HTTP/1.1 200 OK\r\n"
- "Content-Length: 0\r\n"
- "Content-Type: text/plain\r\n"
- "Allow: HEAD,GET,POST,PUT,DELETE,PATCH,OPTIONS\r\n"
- "Server: libks\r\n\r\n"
- "OK libks");
- kws_raw_write(kws, data, strlen(data));
- goto end;
- }
- if (request->content_length && request->content_length > 20) {
- char *data = "HTTP/1.1 413 Request Entity Too Large\r\n"
- "Content-Length: 0\r\n\r\n";
- kws_raw_write(kws, data, strlen(data));
- goto end;
- }
- if (!strncmp(request->method, "POST", 4) && request->content_length && request->content_type &&
- !strncmp(request->content_type, "application/x-www-form-urlencoded", 33)) {
- char buffer[1024];
- ks_ssize_t len = 0, bytes = 0;
- while(bytes < (ks_ssize_t)request->content_length) {
- len = request->content_length - bytes;
- #define WS_BLOCK 1
- if ((len = kws_raw_read(kws, buffer + bytes, len, WS_BLOCK)) < 0) {
- printf("Read error %d\n", (int)len);
- goto end;
- }
- bytes += len;
- }
- *(buffer + bytes) = '\0';
- kws_parse_qs(request, buffer);
- kws_request_dump(request);
- const char *a = kws_request_get_header(request, "a");
- const char *x = kws_request_get_header(request, "x");
- const char *k = a ? "a" : "x";
- int clen = a ? strlen(a) : strlen(x);
- char data[512];
- ks_snprintf(data, sizeof(data),
- "HTTP/1.1 200 OK\r\n"
- "Content-Length: %d\r\n"
- "Content-Type: text/plain\r\n"
- "Allow: HEAD,GET,POST,PUT,DELETE,PATCH,OPTIONS\r\n"
- "Server: libks\r\n\r\n"
- "%s=%s", clen, k, a ? a : x);
- kws_raw_write(kws, data, strlen(data));
- goto end;
- }
- if (!strncmp(request->method, "POST", 4) && request->content_length && request->content_type &&
- !strncmp(request->content_type, "application/json", 16)) {
- uint8_t *buffer;
- ks_ssize_t len = 1024;
- if ((len = kws_read_buffer(kws, &buffer, 1024, 1)) < 0) {
- printf("Read error %d\n", (int)len);
- goto end;
- }
- ks_assert(buffer);
- ks_json_t *json = ks_json_parse(buffer);
- ks_assert(json);
- char *s = ks_json_print(json);
- printf("Receved JSON: %s\n", s);
- char data[512];
- ks_snprintf(data, sizeof(data),
- "HTTP/1.1 200 OK\r\n"
- "Content-Length: %d\r\n"
- "Content-Type: text/plain\r\n"
- "Allow: HEAD,GET,POST,PUT,DELETE,PATCH,OPTIONS\r\n"
- "Server: libks\r\n\r\n"
- "%s", strlen(s), s);
- kws_raw_write(kws, data, strlen(data));
- goto end;
- }
- end:
- if (request) {
- keepalive = request->keepalive;
- printf("===================== free\n");
- kws_request_free(&request);
- }
- if (keepalive) {
- int pflags = kws_wait_sock(kws, 1000, KS_POLL_READ);
- if (pflags > 0 && (pflags & KS_POLL_READ)) {
- if (kws_keepalive(kws) == KS_STATUS_SUCCESS) {
- printf("socket is going to handle a new request\n");
- goto new_req;
- }
- }
- }
- ks_socket_close(&client_sock);
- kws_destroy(&kws);
- if (tcp_data->ssl) {
- SSL_CTX_free(tcp_data->server_profile.ssl_ctx);
- }
- printf("WS SERVER COMPLETE\n");
- }
- static void *tcp_sock_server(ks_thread_t *thread, void *thread_data)
- {
- struct tcp_data *tcp_data = (struct tcp_data *) thread_data;
- tcp_data->ready = 1;
- ks_listen_sock(tcp_data->sock, &tcp_data->addr, 0, server_callback, tcp_data);
- printf("WS THREAD DONE\n");
- return NULL;
- }
- static int test_get(char *ip, int ssl)
- {
- ks_thread_t *thread_p = NULL;
- ks_pool_t *pool;
- ks_sockaddr_t addr;
- int family = AF_INET;
- ks_socket_t cl_sock = KS_SOCK_INVALID;
- struct tcp_data tcp_data = { 0 };
- int r = 1, sanity = 100;
- kws_t *kws = NULL;
- ks_pool_open(&pool);
- tcp_data.pool = pool;
- if (ssl) {
- tcp_data.ssl = 1;
- tcp_data.client_profile.ssl_method = SSLv23_client_method();
- ks_set_string(tcp_data.client_profile.cert, "./testhttp.pem");
- ks_set_string(tcp_data.client_profile.key, "./testhttp.pem");
- ks_set_string(tcp_data.client_profile.chain, "./testhttp.pem");
- init_ssl(&tcp_data.client_profile);
- }
- if (strchr(ip, ':')) {
- family = AF_INET6;
- }
- if (ks_addr_set(&tcp_data.addr, ip, tcp_port, family) != KS_STATUS_SUCCESS) {
- r = 0;
- printf("WS CLIENT Can't set ADDR\n");
- goto end;
- }
- if ((tcp_data.sock = socket(family, SOCK_STREAM, IPPROTO_TCP)) == KS_SOCK_INVALID) {
- r = 0;
- printf("WS CLIENT Can't create sock family %d\n", family);
- goto end;
- }
- ks_socket_option(tcp_data.sock, SO_REUSEADDR, KS_TRUE);
- ks_socket_option(tcp_data.sock, TCP_NODELAY, KS_TRUE);
- tcp_data.ip = ip;
- ks_thread_create(&thread_p, tcp_sock_server, &tcp_data, pool);
- while(!tcp_data.ready && --sanity > 0) {
- ks_sleep(10000);
- }
- ks_addr_set(&addr, ip, tcp_port, family);
- cl_sock = ks_socket_connect(SOCK_STREAM, IPPROTO_TCP, &addr);
- printf("WS %s CLIENT SOCKET %d %s %d\n", ssl ? "SSL" : "PLAIN", (int)cl_sock, addr.host, addr.port);
- char data[512];
- ks_snprintf(data, sizeof(data),
- "GET / HTTP/1.1\r\n"
- "HOST: localhost\r\n\r\n");
- ks_size_t len = strlen(data);
- ks_socket_send(cl_sock, data, &len);
- ks_sleep_ms(200);
- char buffer[1024];
- len = sizeof(buffer);
- ks_socket_recv(cl_sock, buffer, &len);
- if (len < 100) {
- r = 0;
- printf("ERROR read\n");
- }
- printf("HTTP GET CLIENT READ %ld bytes [%s]\n", (long)len, buffer);
- if (strstr(buffer, "libks") == NULL) {
- r = 0;
- }
- end:
- kws_destroy(&kws);
- if (ssl) {
- SSL_CTX_free(tcp_data.client_profile.ssl_ctx);
- }
- if (tcp_data.sock != KS_SOCK_INVALID) {
- ks_socket_shutdown(tcp_data.sock, 2);
- ks_socket_close(&tcp_data.sock);
- }
- if (thread_p) {
- ks_thread_join(thread_p);
- }
- ks_socket_close(&cl_sock);
- ks_pool_close(&pool);
- return r;
- }
- static int test_post(char *ip)
- {
- ks_thread_t *thread_p = NULL;
- ks_pool_t *pool;
- ks_sockaddr_t addr;
- int family = AF_INET;
- ks_socket_t cl_sock = KS_SOCK_INVALID;
- struct tcp_data tcp_data = { 0 };
- int r = 1, sanity = 100;
- kws_t *kws = NULL;
- ks_pool_open(&pool);
- tcp_data.pool = pool;
- if (strchr(ip, ':')) {
- family = AF_INET6;
- }
- if (ks_addr_set(&tcp_data.addr, ip, tcp_port, family) != KS_STATUS_SUCCESS) {
- r = 0;
- printf("WS CLIENT Can't set ADDR\n");
- goto end;
- }
- if ((tcp_data.sock = socket(family, SOCK_STREAM, IPPROTO_TCP)) == KS_SOCK_INVALID) {
- r = 0;
- printf("WS CLIENT Can't create sock family %d\n", family);
- goto end;
- }
- ks_socket_option(tcp_data.sock, SO_REUSEADDR, KS_TRUE);
- ks_socket_option(tcp_data.sock, TCP_NODELAY, KS_TRUE);
- tcp_data.ip = ip;
- ks_thread_create(&thread_p, tcp_sock_server, &tcp_data, pool);
- while(!tcp_data.ready && --sanity > 0) {
- ks_sleep(10000);
- }
- ks_addr_set(&addr, ip, tcp_port, family);
- cl_sock = ks_socket_connect(SOCK_STREAM, IPPROTO_TCP, &addr);
- printf("HTTP CLIENT SOCKET %d %s %d\n", (int)cl_sock, addr.host, addr.port);
- char data[512];
- char buffer[1024];
- const char *post_data = "a=1&b=2";
- ks_snprintf(data, sizeof(data),
- "POST /post HTTP/1.1\r\n"
- "Content-Length: %d\r\n"
- "Content-Type: application/x-www-form-urlencoded\r\n"
- "HOST: localhost\r\n\r\n"
- "%s", strlen(post_data), post_data);
- ks_size_t len = strlen(data);
- ks_socket_send(cl_sock, data, &len);
- ks_sleep_ms(200);
- len = sizeof(buffer);
- ks_socket_recv(cl_sock, buffer, &len);
- if (len < 100) {
- r = 0;
- printf("ERROR read\n");
- }
- printf("HTTP POST CLIENT READ %ld bytes [%s]\n", (long)len, buffer);
- if (strstr(buffer, "a=1") == NULL) {
- r = 0;
- }
- end:
- kws_destroy(&kws);
- if (tcp_data.sock != KS_SOCK_INVALID) {
- ks_socket_shutdown(tcp_data.sock, 2);
- ks_socket_close(&tcp_data.sock);
- }
- if (thread_p) {
- ks_thread_join(thread_p);
- }
- ks_socket_close(&cl_sock);
- ks_pool_close(&pool);
- return r;
- }
- static int test_post_json_read_buffer(char *ip)
- {
- ks_thread_t *thread_p = NULL;
- ks_pool_t *pool;
- ks_sockaddr_t addr;
- int family = AF_INET;
- ks_socket_t cl_sock = KS_SOCK_INVALID;
- struct tcp_data tcp_data = { 0 };
- int r = 1, sanity = 100;
- kws_t *kws = NULL;
- ks_pool_open(&pool);
- tcp_data.pool = pool;
- if (strchr(ip, ':')) {
- family = AF_INET6;
- }
- if (ks_addr_set(&tcp_data.addr, ip, tcp_port, family) != KS_STATUS_SUCCESS) {
- r = 0;
- printf("WS CLIENT Can't set ADDR\n");
- goto end;
- }
- if ((tcp_data.sock = socket(family, SOCK_STREAM, IPPROTO_TCP)) == KS_SOCK_INVALID) {
- r = 0;
- printf("WS CLIENT Can't create sock family %d\n", family);
- goto end;
- }
- ks_socket_option(tcp_data.sock, SO_REUSEADDR, KS_TRUE);
- ks_socket_option(tcp_data.sock, TCP_NODELAY, KS_TRUE);
- tcp_data.ip = ip;
- ks_thread_create(&thread_p, tcp_sock_server, &tcp_data, pool);
- while(!tcp_data.ready && --sanity > 0) {
- ks_sleep(10000);
- }
- ks_addr_set(&addr, ip, tcp_port, family);
- cl_sock = ks_socket_connect(SOCK_STREAM, IPPROTO_TCP, &addr);
- printf("HTTP CLIENT SOCKET %d %s %d\n", (int)cl_sock, addr.host, addr.port);
- char data[512];
- char buffer[1024];
- const char *post_data = "{\"json\": true}";
- ks_snprintf(data, sizeof(data),
- "POST /json HTTP/1.1\r\n"
- "Content-Length: %d\r\n"
- "Content-Type: application/json\r\n"
- "HOST: localhost\r\n\r\n"
- "%s", strlen(post_data), post_data);
- ks_size_t len = strlen(data);
- ks_socket_send(cl_sock, data, &len);
- ks_sleep_ms(200);
- len = sizeof(buffer);
- ks_socket_recv(cl_sock, buffer, &len);
- if (len < 100) {
- r = 0;
- printf("ERROR read\n");
- }
- printf("HTTP POST CLIENT READ %ld bytes [%s]\n", (long)len, buffer);
- if (strstr(buffer, "json") == NULL) {
- r = 0;
- }
- end:
- kws_destroy(&kws);
- if (tcp_data.sock != KS_SOCK_INVALID) {
- ks_socket_shutdown(tcp_data.sock, 2);
- ks_socket_close(&tcp_data.sock);
- }
- if (thread_p) {
- ks_thread_join(thread_p);
- }
- ks_socket_close(&cl_sock);
- ks_pool_close(&pool);
- return r;
- }
- static int test_keepalive(char *ip)
- {
- ks_thread_t *thread_p = NULL;
- ks_pool_t *pool;
- ks_sockaddr_t addr;
- int family = AF_INET;
- ks_socket_t cl_sock = KS_SOCK_INVALID;
- struct tcp_data tcp_data = { 0 };
- int r = 1, sanity = 100;
- kws_t *kws = NULL;
- ks_pool_open(&pool);
- tcp_data.pool = pool;
- if (strchr(ip, ':')) {
- family = AF_INET6;
- }
- if (ks_addr_set(&tcp_data.addr, ip, tcp_port, family) != KS_STATUS_SUCCESS) {
- r = 0;
- printf("WS CLIENT Can't set ADDR\n");
- goto end;
- }
- if ((tcp_data.sock = socket(family, SOCK_STREAM, IPPROTO_TCP)) == KS_SOCK_INVALID) {
- r = 0;
- printf("WS CLIENT Can't create sock family %d\n", family);
- goto end;
- }
- ks_socket_option(tcp_data.sock, SO_REUSEADDR, KS_TRUE);
- ks_socket_option(tcp_data.sock, TCP_NODELAY, KS_TRUE);
- tcp_data.ip = ip;
- ks_thread_create(&thread_p, tcp_sock_server, &tcp_data, pool);
- while(!tcp_data.ready && --sanity > 0) {
- ks_sleep(10000);
- }
- ks_addr_set(&addr, ip, tcp_port, family);
- cl_sock = ks_socket_connect(SOCK_STREAM, IPPROTO_TCP, &addr);
- printf("HTTP CLIENT SOCKET %d %s %d\n", (int)cl_sock, addr.host, addr.port);
- char data[512];
- char buffer[1024];
- const char *post_data = "a=1&b=2";
- ks_snprintf(data, sizeof(data),
- "POST /post HTTP/1.1\r\n"
- "Content-Length: %d\r\n"
- "Content-Type: application/x-www-form-urlencoded\r\n"
- "HOST: localhost\r\n\r\n"
- "%s", strlen(post_data), post_data);
- ks_size_t len = strlen(data);
- ks_socket_send(cl_sock, data, &len);
- ks_sleep_ms(200);
- len = sizeof(buffer);
- ks_socket_recv(cl_sock, buffer, &len);
- if (len < 100) {
- r = 0;
- printf("ERROR read\n");
- }
- printf("HTTP POST CLIENT READ %ld bytes [%s]\n", (long)len, buffer);
- if (strstr(buffer, "a=1") == NULL) {
- r = 0;
- }
- post_data = "x=1&y=2";
- ks_snprintf(data, sizeof(data),
- "POST /post HTTP/1.1\r\n"
- "Content-Length: %d\r\n"
- "Content-Type: application/x-www-form-urlencoded\r\n"
- "HOST: localhost\r\n\r\n"
- "%s", strlen(post_data), post_data);
- len = strlen(data);
- ks_socket_send(cl_sock, data, &len);
- ks_sleep_ms(200);
- len = sizeof(buffer);
- ks_socket_recv(cl_sock, buffer, &len);
- if (len < 100) {
- r = 0;
- printf("ERROR read\n");
- }
- printf("HTTP POST CLIENT READ %ld bytes [%s]\n", (long)len, buffer);
- if (strstr(buffer, "x=1") == NULL) {
- r = 0;
- }
- end:
- kws_destroy(&kws);
- if (tcp_data.sock != KS_SOCK_INVALID) {
- ks_socket_shutdown(tcp_data.sock, 2);
- ks_socket_close(&tcp_data.sock);
- }
- if (thread_p) {
- ks_thread_join(thread_p);
- }
- ks_socket_close(&cl_sock);
- ks_pool_close(&pool);
- return r;
- }
- int main(void)
- {
- int have_v4 = 0, have_v6 = 0;
- ks_find_local_ip(v4, sizeof(v4), &mask, AF_INET, NULL);
- ks_find_local_ip(v6, sizeof(v6), NULL, AF_INET6, NULL);
- ks_init();
- printf("IPS: v4: [%s] v6: [%s]\n", v4, v6);
- have_v4 = ks_zstr_buf(v4) ? 0 : 1;
- // have_v6 = ks_zstr_buf(v6) ? 0 : 1;
- plan((have_v4 * 5) + (have_v6 * 4) + 1);
- ok(have_v4 || have_v6);
- if (have_v4 || have_v6) {
- ks_gen_cert(".", "testhttp.pem");
- }
- if (have_v4) {
- ok(test_get(v4, 0));
- ok(test_get(v4, 1));
- ok(test_post(v4));
- ok(test_keepalive(v4));
- ok(test_post_json_read_buffer(v4));
- }
- if (have_v6) {
- ok(test_get(v6, 0));
- ok(test_get(v6, 1));
- ok(test_post(v6));
- ok(test_keepalive(v6));
- }
- unlink("./testhttp.pem");
- ks_shutdown();
- done_testing();
- }
|