Makefile 4.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113
  1. CXX = clang++
  2. CXXFLAGS = -g -std=c++11 -I. -Wall -Wextra -Wtype-limits -Wconversion -Wshadow $(EXTRA_CXXFLAGS) # -fno-exceptions -DCPPHTTPLIB_NO_EXCEPTIONS -fsanitize=address
  3. PREFIX ?= $(shell brew --prefix)
  4. OPENSSL_DIR = $(PREFIX)/opt/openssl@3
  5. OPENSSL_SUPPORT = -DCPPHTTPLIB_OPENSSL_SUPPORT -I$(OPENSSL_DIR)/include -L$(OPENSSL_DIR)/lib -lssl -lcrypto
  6. ifneq ($(OS), Windows_NT)
  7. UNAME_S := $(shell uname -s)
  8. ifeq ($(UNAME_S), Darwin)
  9. OPENSSL_SUPPORT += -DCPPHTTPLIB_USE_CERTS_FROM_MACOSX_KEYCHAIN -framework CoreFoundation -framework Security -framework CFNetwork
  10. endif
  11. endif
  12. ZLIB_SUPPORT = -DCPPHTTPLIB_ZLIB_SUPPORT -lz
  13. BROTLI_DIR = $(PREFIX)/opt/brotli
  14. BROTLI_SUPPORT = -DCPPHTTPLIB_BROTLI_SUPPORT -I$(BROTLI_DIR)/include -L$(BROTLI_DIR)/lib -lbrotlicommon -lbrotlienc -lbrotlidec
  15. ZSTD_DIR = $(PREFIX)/opt/zstd
  16. ZSTD_SUPPORT = -DCPPHTTPLIB_ZSTD_SUPPORT -I$(ZSTD_DIR)/include -L$(ZSTD_DIR)/lib -lzstd
  17. LIBS = -lpthread -lcurl
  18. ifneq ($(OS), Windows_NT)
  19. UNAME_S := $(shell uname -s)
  20. ifneq ($(UNAME_S), Darwin)
  21. LIBS += -lanl
  22. endif
  23. endif
  24. TEST_ARGS = gtest/src/gtest-all.cc gtest/src/gtest_main.cc -Igtest -Igtest/include $(OPENSSL_SUPPORT) $(ZLIB_SUPPORT) $(BROTLI_SUPPORT) $(ZSTD_SUPPORT) $(LIBS)
  25. # By default, use standalone_fuzz_target_runner.
  26. # This runner does no fuzzing, but simply executes the inputs
  27. # provided via parameters.
  28. # Run e.g. "make all LIB_FUZZING_ENGINE=/path/to/libFuzzer.a"
  29. # to link the fuzzer(s) against a real fuzzing engine.
  30. # OSS-Fuzz will define its own value for LIB_FUZZING_ENGINE.
  31. LIB_FUZZING_ENGINE ?= standalone_fuzz_target_runner.o
  32. CLANG_FORMAT = clang-format
  33. REALPATH = $(shell which grealpath 2>/dev/null || which realpath 2>/dev/null)
  34. STYLE_CHECK_FILES = $(filter-out httplib.h httplib.cc, \
  35. $(wildcard example/*.h example/*.cc fuzzing/*.h fuzzing/*.cc *.h *.cc ../httplib.h))
  36. all : test test_split
  37. ./test
  38. proxy : test_proxy
  39. ./test_proxy
  40. test : test.cc include_httplib.cc ../httplib.h Makefile cert.pem
  41. $(CXX) -o $@ -I.. $(CXXFLAGS) test.cc include_httplib.cc $(TEST_ARGS)
  42. @file $@
  43. # Note: The intention of test_split is to verify that it works to compile and
  44. # link the split httplib.h, so there is normally no need to execute it.
  45. test_split : test.cc ../httplib.h httplib.cc Makefile cert.pem
  46. $(CXX) -o $@ $(CXXFLAGS) test.cc httplib.cc $(TEST_ARGS)
  47. check_abi:
  48. @./check-shared-library-abi-compatibility.sh
  49. .PHONY: style_check
  50. style_check: $(STYLE_CHECK_FILES)
  51. @for file in $(STYLE_CHECK_FILES); do \
  52. $(CLANG_FORMAT) $$file > $$file.formatted; \
  53. if ! diff -u $$file $$file.formatted; then \
  54. file2=$$($(REALPATH) --relative-to=.. $$file); \
  55. printf "\n%*s\n" 80 | tr ' ' '#'; \
  56. printf "##%*s##\n" 76; \
  57. printf "## %-70s ##\n" "$$file2 not properly formatted. Please run clang-format."; \
  58. printf "##%*s##\n" 76; \
  59. printf "%*s\n\n" 80 | tr ' ' '#'; \
  60. failed=1; \
  61. fi; \
  62. rm -f $$file.formatted; \
  63. done; \
  64. if [ -n "$$failed" ]; then \
  65. echo "Style check failed for one or more files. See above for details."; \
  66. false; \
  67. else \
  68. echo "All files are properly formatted."; \
  69. fi
  70. test_proxy : test_proxy.cc ../httplib.h Makefile cert.pem
  71. $(CXX) -o $@ -I.. $(CXXFLAGS) test_proxy.cc $(TEST_ARGS)
  72. # Runs server_fuzzer.cc based on value of $(LIB_FUZZING_ENGINE).
  73. # Usage: make fuzz_test LIB_FUZZING_ENGINE=/path/to/libFuzzer
  74. fuzz_test: server_fuzzer
  75. ./server_fuzzer fuzzing/corpus/*
  76. # Fuzz target, so that you can choose which $(LIB_FUZZING_ENGINE) to use.
  77. server_fuzzer : fuzzing/server_fuzzer.cc ../httplib.h standalone_fuzz_target_runner.o
  78. $(CXX) -o $@ -I.. $(CXXFLAGS) $< $(OPENSSL_SUPPORT) $(ZLIB_SUPPORT) $(BROTLI_SUPPORT) $(LIB_FUZZING_ENGINE) $(ZSTD_SUPPORT) $(LIBS)
  79. @file $@
  80. # Standalone fuzz runner, which just reads inputs from fuzzing/corpus/ dir and
  81. # feeds it to server_fuzzer.
  82. standalone_fuzz_target_runner.o : fuzzing/standalone_fuzz_target_runner.cpp
  83. $(CXX) -o $@ -I.. $(CXXFLAGS) -c $<
  84. httplib.cc : ../httplib.h
  85. python3 ../split.py -o .
  86. cert.pem:
  87. ./gen-certs.sh
  88. clean:
  89. rm -rf test test_split test_proxy server_fuzzer *.pem *.0 *.o *.1 *.srl httplib.h httplib.cc _build* *.dSYM