Makefile 6.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167
  1. CXX = clang++
  2. CXXFLAGS = -g -std=c++11 -I. -Wall -Wextra -Wtype-limits -Wconversion -Wshadow $(EXTRA_CXXFLAGS) -DCPPHTTPLIB_USE_NON_BLOCKING_GETADDRINFO # -fno-exceptions -DCPPHTTPLIB_NO_EXCEPTIONS -fsanitize=address
  3. ifneq ($(OS), Windows_NT)
  4. UNAME_S := $(shell uname -s)
  5. ifeq ($(UNAME_S), Darwin)
  6. PREFIX ?= $(shell brew --prefix)
  7. OPENSSL_DIR = $(PREFIX)/opt/openssl@3
  8. OPENSSL_SUPPORT = -DCPPHTTPLIB_OPENSSL_SUPPORT -I$(OPENSSL_DIR)/include -L$(OPENSSL_DIR)/lib -lssl -lcrypto
  9. OPENSSL_SUPPORT += -DCPPHTTPLIB_USE_CERTS_FROM_MACOSX_KEYCHAIN -framework Security
  10. MBEDTLS_DIR ?= $(shell brew --prefix mbedtls@3)
  11. MBEDTLS_SUPPORT = -DCPPHTTPLIB_MBEDTLS_SUPPORT -I$(MBEDTLS_DIR)/include -L$(MBEDTLS_DIR)/lib -lmbedtls -lmbedx509 -lmbedcrypto
  12. MBEDTLS_SUPPORT += -DCPPHTTPLIB_USE_CERTS_FROM_MACOSX_KEYCHAIN -framework Security
  13. else
  14. OPENSSL_SUPPORT = -DCPPHTTPLIB_OPENSSL_SUPPORT -lssl -lcrypto
  15. MBEDTLS_SUPPORT = -DCPPHTTPLIB_MBEDTLS_SUPPORT -lmbedtls -lmbedx509 -lmbedcrypto
  16. endif
  17. endif
  18. ZLIB_SUPPORT = -DCPPHTTPLIB_ZLIB_SUPPORT -lz
  19. ifneq ($(OS), Windows_NT)
  20. UNAME_S := $(shell uname -s)
  21. ifeq ($(UNAME_S), Darwin)
  22. # macOS: use Homebrew paths for brotli and zstd
  23. BROTLI_DIR = $(PREFIX)/opt/brotli
  24. BROTLI_SUPPORT = -DCPPHTTPLIB_BROTLI_SUPPORT -I$(BROTLI_DIR)/include -L$(BROTLI_DIR)/lib -lbrotlicommon -lbrotlienc -lbrotlidec
  25. ZSTD_DIR = $(PREFIX)/opt/zstd
  26. ZSTD_SUPPORT = -DCPPHTTPLIB_ZSTD_SUPPORT -I$(ZSTD_DIR)/include -L$(ZSTD_DIR)/lib -lzstd
  27. LIBS = -lpthread -lcurl -framework CoreFoundation -framework CFNetwork
  28. else
  29. # Linux: use system paths
  30. BROTLI_SUPPORT = -DCPPHTTPLIB_BROTLI_SUPPORT -lbrotlicommon -lbrotlienc -lbrotlidec
  31. ZSTD_SUPPORT = -DCPPHTTPLIB_ZSTD_SUPPORT -lzstd
  32. LIBS = -lpthread -lcurl -lanl
  33. endif
  34. endif
  35. TEST_ARGS = gtest/src/gtest-all.cc gtest/src/gtest_main.cc -Igtest -Igtest/include $(OPENSSL_SUPPORT) $(ZLIB_SUPPORT) $(BROTLI_SUPPORT) $(ZSTD_SUPPORT) $(LIBS)
  36. TEST_ARGS_MBEDTLS = gtest/src/gtest-all.cc gtest/src/gtest_main.cc -Igtest -Igtest/include $(MBEDTLS_SUPPORT) $(ZLIB_SUPPORT) $(BROTLI_SUPPORT) $(ZSTD_SUPPORT) $(LIBS)
  37. # By default, use standalone_fuzz_target_runner.
  38. # This runner does no fuzzing, but simply executes the inputs
  39. # provided via parameters.
  40. # Run e.g. "make all LIB_FUZZING_ENGINE=/path/to/libFuzzer.a"
  41. # to link the fuzzer(s) against a real fuzzing engine.
  42. # OSS-Fuzz will define its own value for LIB_FUZZING_ENGINE.
  43. LIB_FUZZING_ENGINE ?= standalone_fuzz_target_runner.o
  44. CLANG_FORMAT = clang-format
  45. REALPATH = $(shell which grealpath 2>/dev/null || which realpath 2>/dev/null)
  46. STYLE_CHECK_FILES = $(filter-out httplib.h httplib.cc, \
  47. $(wildcard example/*.h example/*.cc fuzzing/*.h fuzzing/*.cc *.h *.cc ../httplib.h))
  48. all : test test_split
  49. ./test
  50. proxy : test_proxy
  51. @echo "Starting proxy server..."
  52. cd proxy && \
  53. docker compose up -d
  54. @echo "Waiting for proxy to be ready..."
  55. @until nc -z localhost 3128 && nc -z localhost 3129; do sleep 1; done
  56. @echo "Proxy servers are ready, waiting additional 5 seconds for full startup..."
  57. @sleep 5
  58. @echo "Checking proxy server status..."
  59. @cd proxy && docker compose ps
  60. @echo "Checking proxy server logs..."
  61. @cd proxy && docker compose logs --tail=20
  62. @echo "Running proxy tests..."
  63. ./test_proxy; \
  64. exit_code=$$?; \
  65. echo "Stopping proxy server..."; \
  66. cd proxy && docker compose down; \
  67. exit $$exit_code
  68. proxy_mbedtls : test_proxy_mbedtls
  69. @echo "Starting proxy server..."
  70. cd proxy && \
  71. docker compose up -d
  72. @echo "Waiting for proxy to be ready..."
  73. @until nc -z localhost 3128 && nc -z localhost 3129; do sleep 1; done
  74. @echo "Proxy servers are ready, waiting additional 5 seconds for full startup..."
  75. @sleep 5
  76. @echo "Checking proxy server status..."
  77. @cd proxy && docker compose ps
  78. @echo "Checking proxy server logs..."
  79. @cd proxy && docker compose logs --tail=20
  80. @echo "Running proxy tests (Mbed TLS)..."
  81. ./test_proxy_mbedtls; \
  82. exit_code=$$?; \
  83. echo "Stopping proxy server..."; \
  84. cd proxy && docker compose down; \
  85. exit $$exit_code
  86. test : test.cc include_httplib.cc ../httplib.h Makefile cert.pem
  87. $(CXX) -o $@ -I.. $(CXXFLAGS) test.cc include_httplib.cc $(TEST_ARGS)
  88. @file $@
  89. # Note: The intention of test_split is to verify that it works to compile and
  90. # link the split httplib.h, so there is normally no need to execute it.
  91. test_split : test.cc ../httplib.h httplib.cc Makefile cert.pem
  92. $(CXX) -o $@ $(CXXFLAGS) test.cc httplib.cc $(TEST_ARGS)
  93. # Mbed TLS backend targets
  94. test_mbedtls : test.cc include_httplib.cc ../httplib.h Makefile cert.pem
  95. $(CXX) -o $@ -I.. $(CXXFLAGS) test.cc include_httplib.cc $(TEST_ARGS_MBEDTLS)
  96. @file $@
  97. test_split_mbedtls : test.cc ../httplib.h httplib.cc Makefile cert.pem
  98. $(CXX) -o $@ $(CXXFLAGS) test.cc httplib.cc $(TEST_ARGS_MBEDTLS)
  99. check_abi:
  100. @./check-shared-library-abi-compatibility.sh
  101. .PHONY: style_check
  102. style_check: $(STYLE_CHECK_FILES)
  103. @for file in $(STYLE_CHECK_FILES); do \
  104. $(CLANG_FORMAT) $$file > $$file.formatted; \
  105. if ! diff -u $$file $$file.formatted; then \
  106. file2=$$($(REALPATH) --relative-to=.. $$file); \
  107. printf "\n%*s\n" 80 | tr ' ' '#'; \
  108. printf "##%*s##\n" 76; \
  109. printf "## %-70s ##\n" "$$file2 not properly formatted. Please run clang-format."; \
  110. printf "##%*s##\n" 76; \
  111. printf "%*s\n\n" 80 | tr ' ' '#'; \
  112. failed=1; \
  113. fi; \
  114. rm -f $$file.formatted; \
  115. done; \
  116. if [ -n "$$failed" ]; then \
  117. echo "Style check failed for one or more files. See above for details."; \
  118. false; \
  119. else \
  120. echo "All files are properly formatted."; \
  121. fi
  122. test_proxy : test_proxy.cc ../httplib.h Makefile cert.pem
  123. $(CXX) -o $@ -I.. $(CXXFLAGS) test_proxy.cc $(TEST_ARGS)
  124. test_proxy_mbedtls : test_proxy.cc ../httplib.h Makefile cert.pem
  125. $(CXX) -o $@ -I.. $(CXXFLAGS) test_proxy.cc $(TEST_ARGS_MBEDTLS)
  126. # Runs server_fuzzer.cc based on value of $(LIB_FUZZING_ENGINE).
  127. # Usage: make fuzz_test LIB_FUZZING_ENGINE=/path/to/libFuzzer
  128. fuzz_test: server_fuzzer
  129. ./server_fuzzer fuzzing/corpus/*
  130. # Fuzz target, so that you can choose which $(LIB_FUZZING_ENGINE) to use.
  131. server_fuzzer : fuzzing/server_fuzzer.cc ../httplib.h standalone_fuzz_target_runner.o
  132. $(CXX) -o $@ -I.. $(CXXFLAGS) $< $(OPENSSL_SUPPORT) $(ZLIB_SUPPORT) $(BROTLI_SUPPORT) $(LIB_FUZZING_ENGINE) $(ZSTD_SUPPORT) $(LIBS)
  133. @file $@
  134. # Standalone fuzz runner, which just reads inputs from fuzzing/corpus/ dir and
  135. # feeds it to server_fuzzer.
  136. standalone_fuzz_target_runner.o : fuzzing/standalone_fuzz_target_runner.cpp
  137. $(CXX) -o $@ -I.. $(CXXFLAGS) -c $<
  138. httplib.cc : ../httplib.h
  139. python3 ../split.py -o .
  140. cert.pem:
  141. ./gen-certs.sh
  142. clean:
  143. rm -rf test test_split test_mbedtls test_split_mbedtls test_proxy test_proxy_mbedtls server_fuzzer *.pem *.0 *.o *.1 *.srl httplib.h httplib.cc _build* *.dSYM