Files
golib/test/test-https-bench/main.go
Nicolas JUHEL 9ca3530b1d Package Config/component/LDAP:
- replace mutex by atomic
- fix minor bugs & optimize code

Package Size:
- add function 'mul' allowing do a multiplaction on the size value by a float64 given value (could use another size.float64)
- add function 'div' allowing do a division of the size value by a float64 given value (could use another size.float64)
- add function 'add' allowing do an addtion of the size value with a uint64 given value (could use another size.uint64)
- add function 'sub' allowing do an substraction of the size value with a uint64 given value (could use another size.uint64)

Package Encoding:
- rework completly crypt package to new package encoding
- part aes of old crypt become new subpackage encoding/aes
- part hex of old crypt (associated with aes) become new standalone subpackage encoding/hexa
- adding new subpackage mux to use multiplexer/de-multiplexer of io stream
- mux is different of multireader / multiwriter in way as io send from mux in one channel will be received only in the coresponding channel  of de-mux
- mux is encoding subpackage becauxse based on hex + cbor marshalling / unmarshalling
- all subpackage can be used directly of by io reader / writer

Package Socket/server
- rework server to use as possible direct io to con
- rework server to optimize & fix managment (context / shutdown...)
- rework server to stop connection befor stopping server
- rework server to not load incoming and send it to handler by allowing handler to manager io input/output directly
- server not more used buff internally (less memory consuption)
- adding counter of opened connection
- adding some testing who's checking server & client for each protocol

Package Socket/client
- rework client to allow connect to server before reading/writing on io stream
- rework client to allow consum direct io stream instead of reading locally / call function
- rework client to allow having less memory consumption by removing internal buffer
- rework client allowing to use root io function (bufio, io copy, ...)

Package Socket/multi
- adding new subpackage multi to simplfy using of 1 reader / x writer
- if no writer is define, using an extended io discard
- allowing asynch instancing, populate writer and calling main writer
- allowing calling writer / reader to expose the main io reader / writer

Package Socket/delim:
- adding new subpackage delim to simplify using of bufio reader with delimiter
- using 1 writer / 1 reader
- allowing root io function like readwritecloser, writeto, ...
- use local buffer to prevent race if reader and writer are not is same process

Package PProf:
- fix missing \n in message

Package HttpServer:
- fix bug with init TLS & http2

Other:
- bump dependencies
2024-03-23 15:33:24 +01:00

220 lines
5.2 KiB
Go

/*
* MIT License
*
* Copyright (c) 2024 Nicolas JUHEL
*
* Permission is hereby granted, free of charge, to any person obtaining a copy
* of this software and associated documentation files (the "Software"), to deal
* in the Software without restriction, including without limitation the rights
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
* copies of the Software, and to permit persons to whom the Software is
* furnished to do so, subject to the following conditions:
*
* The above copyright notice and this permission notice shall be included in all
* copies or substantial portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
* SOFTWARE.
*
*
*/
package main
import (
"context"
"crypto/tls"
"flag"
"fmt"
"io"
"net"
"net/http"
"os"
"testing"
"time"
iotfds "github.com/nabbar/golib/ioutils/fileDescriptor"
libptc "github.com/nabbar/golib/network/protocol"
libpgo "github.com/nabbar/golib/pprof"
libsem "github.com/nabbar/golib/semaphore"
libsiz "github.com/nabbar/golib/size"
"golang.org/x/net/http2"
"golang.org/x/sys/cpu"
)
func GetFreePort() int {
var (
addr *net.TCPAddr
lstn *net.TCPListener
err error
)
if addr, err = net.ResolveTCPAddr("tcp", "localhost:0"); err != nil {
panic(err)
}
if lstn, err = net.ListenTCP("tcp", addr); err != nil {
panic(err)
}
defer func() {
_ = lstn.Close()
}()
return lstn.Addr().(*net.TCPAddr).Port
}
func benchCurl(show bool, cli *http.Client, addr string) {
var (
e error
r *http.Response
t = time.Now()
b []byte
)
if r, e = cli.Get("https://" + addr); e != nil {
panic(e)
}
defer func() {
_ = r.Body.Close()
}()
if b, e = io.ReadAll(r.Body); e != nil {
panic(e)
} else if show {
_, _ = fmt.Fprintf(os.Stdout, "GET https://%s - %s - %dµs\n", addr, libsiz.Size(int64(len(b))).String(), time.Since(t).Microseconds())
}
}
func serverListening(addr string) {
var (
err error
srv *http.Server
sv2 = &http2.Server{}
cert tls.Certificate
)
if cert, err = genTLSCertificate(true); err != nil {
panic(err)
} else {
srv = &http.Server{
Addr: addr,
Handler: http.DefaultServeMux,
TLSConfig: &tls.Config{
Certificates: []tls.Certificate{cert},
MinVersion: tls.VersionTLS13,
MaxVersion: tls.VersionTLS13,
CurvePreferences: append(make([]tls.CurveID, 0), tls.X25519),
CipherSuites: append(make([]uint16, 0), tls.TLS_CHACHA20_POLY1305_SHA256),
},
ReadHeaderTimeout: 30 * time.Second,
IdleTimeout: time.Minute,
}
srv.SetKeepAlivesEnabled(true)
if err = http2.ConfigureServer(srv, sv2); err != nil {
panic(err)
}
}
if e := srv.ListenAndServeTLS("", ""); e != nil {
panic(e)
}
}
func waitRunning(ctx context.Context, addr string) {
for {
d := &net.Dialer{}
if co, ce := d.DialContext(ctx, libptc.NetworkTCP.Code(), addr); ce != nil {
continue
} else {
_ = co.Close()
return
}
}
}
func main() {
if os.Getenv("PPROF") != "" {
libpgo.ProfilingCPUStart()
defer libpgo.ProfilingCPUDefer()
}
testing.Init()
flag.Parse()
var (
ctx, cnl = context.WithCancel(context.Background())
port = GetFreePort()
addr = fmt.Sprintf(":%d", port)
)
defer cnl()
_, _ = fmt.Fprintf(os.Stdout, "AVX: \t\t%v\n", cpu.X86.HasAVX)
_, _ = fmt.Fprintf(os.Stdout, "AVX2: \t\t%v\n", cpu.X86.HasAVX2)
_, _ = fmt.Fprintf(os.Stdout, "AVX512: \t%v\n", cpu.X86.HasAVX512)
RunInit(ctx, addr)
res := testing.Benchmark(func(b *testing.B) {
RunQuery(ctx, addr, b)
})
_, _ = fmt.Fprintf(os.Stdout, "Benchmark: \n")
_, _ = fmt.Fprintf(os.Stdout, "\tNumber: \t%d\n", res.N)
_, _ = fmt.Fprintf(os.Stdout, "\tPerf: \t\t%0.3f µs/curl\n", float64(res.NsPerOp())/1000)
_, _ = fmt.Fprintf(os.Stdout, "\tDuration: \t%s\n", res.T.String())
_, _ = fmt.Fprintf(os.Stdout, "Memory: \n")
_, _ = fmt.Fprintf(os.Stdout, "\tAllocs: \t%s\n", libsiz.Size(res.MemAllocs).String())
_, _ = fmt.Fprintf(os.Stdout, "\tBytes: \t\t%s\n", libsiz.Size(res.MemBytes).String())
}
func RunInit(ctx context.Context, addr string) {
if _, _, err := iotfds.SystemFileDescriptor(1024 * 1024); err != nil {
panic(err)
}
go serverListening(addr)
_, _ = fmt.Fprintf(os.Stdout, "Server Listenning '%s'...\n", addr)
waitRunning(ctx, addr) // wait for server to start
}
func RunQuery(ctx context.Context, addr string, b *testing.B) {
var sem = libsem.New(ctx, 0, false)
defer sem.DeferMain()
var cli = &http.Client{
Transport: &http.Transport{
TLSClientConfig: &tls.Config{InsecureSkipVerify: true},
},
}
for i := 0; i < b.N; i++ {
if err := sem.NewWorker(); err != nil {
panic(err)
}
go func() {
defer func() {
if e := recover(); e != nil {
_, _ = fmt.Fprintf(os.Stdout, "panic: %v\n", e)
}
sem.DeferWorker()
}()
benchCurl(false, cli, addr)
}()
}
if err := sem.WaitAll(); err != nil {
panic(err)
}
}