mirror of
https://github.com/actix/actix-extras.git
synced 2024-11-28 01:32:57 +01:00
add client websockets support
This commit is contained in:
parent
e254fe4f9c
commit
c59937784e
@ -49,7 +49,7 @@ fail = ["failure"]
|
|||||||
|
|
||||||
[dependencies]
|
[dependencies]
|
||||||
actix-service = "0.3.4"
|
actix-service = "0.3.4"
|
||||||
actix-codec = "0.1.1"
|
actix-codec = "0.1.2"
|
||||||
actix-connect = "0.1.0"
|
actix-connect = "0.1.0"
|
||||||
actix-utils = "0.3.4"
|
actix-utils = "0.3.4"
|
||||||
actix-server-config = "0.1.0"
|
actix-server-config = "0.1.0"
|
||||||
|
@ -1,11 +1,13 @@
|
|||||||
use std::{fmt, time};
|
use std::{fmt, io, time};
|
||||||
|
|
||||||
use actix_codec::{AsyncRead, AsyncWrite};
|
use actix_codec::{AsyncRead, AsyncWrite, Framed};
|
||||||
use bytes::Bytes;
|
use bytes::{Buf, Bytes};
|
||||||
use futures::Future;
|
use futures::future::{err, Either, Future, FutureResult};
|
||||||
|
use futures::Poll;
|
||||||
use h2::client::SendRequest;
|
use h2::client::SendRequest;
|
||||||
|
|
||||||
use crate::body::MessageBody;
|
use crate::body::MessageBody;
|
||||||
|
use crate::h1::ClientCodec;
|
||||||
use crate::message::{RequestHead, ResponseHead};
|
use crate::message::{RequestHead, ResponseHead};
|
||||||
use crate::payload::Payload;
|
use crate::payload::Payload;
|
||||||
|
|
||||||
@ -19,6 +21,7 @@ pub(crate) enum ConnectionType<Io> {
|
|||||||
}
|
}
|
||||||
|
|
||||||
pub trait Connection {
|
pub trait Connection {
|
||||||
|
type Io: AsyncRead + AsyncWrite;
|
||||||
type Future: Future<Item = (ResponseHead, Payload), Error = SendRequestError>;
|
type Future: Future<Item = (ResponseHead, Payload), Error = SendRequestError>;
|
||||||
|
|
||||||
/// Send request and body
|
/// Send request and body
|
||||||
@ -27,6 +30,14 @@ pub trait Connection {
|
|||||||
head: RequestHead,
|
head: RequestHead,
|
||||||
body: B,
|
body: B,
|
||||||
) -> Self::Future;
|
) -> Self::Future;
|
||||||
|
|
||||||
|
type TunnelFuture: Future<
|
||||||
|
Item = (ResponseHead, Framed<Self::Io, ClientCodec>),
|
||||||
|
Error = SendRequestError,
|
||||||
|
>;
|
||||||
|
|
||||||
|
/// Send request, returns Response and Framed
|
||||||
|
fn open_tunnel(self, head: RequestHead) -> Self::TunnelFuture;
|
||||||
}
|
}
|
||||||
|
|
||||||
pub(crate) trait ConnectionLifetime: AsyncRead + AsyncWrite + 'static {
|
pub(crate) trait ConnectionLifetime: AsyncRead + AsyncWrite + 'static {
|
||||||
@ -80,6 +91,7 @@ impl<T> Connection for IoConnection<T>
|
|||||||
where
|
where
|
||||||
T: AsyncRead + AsyncWrite + 'static,
|
T: AsyncRead + AsyncWrite + 'static,
|
||||||
{
|
{
|
||||||
|
type Io = T;
|
||||||
type Future = Box<Future<Item = (ResponseHead, Payload), Error = SendRequestError>>;
|
type Future = Box<Future<Item = (ResponseHead, Payload), Error = SendRequestError>>;
|
||||||
|
|
||||||
fn send_request<B: MessageBody + 'static>(
|
fn send_request<B: MessageBody + 'static>(
|
||||||
@ -104,6 +116,35 @@ where
|
|||||||
)),
|
)),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
type TunnelFuture = Either<
|
||||||
|
Box<
|
||||||
|
Future<
|
||||||
|
Item = (ResponseHead, Framed<Self::Io, ClientCodec>),
|
||||||
|
Error = SendRequestError,
|
||||||
|
>,
|
||||||
|
>,
|
||||||
|
FutureResult<(ResponseHead, Framed<Self::Io, ClientCodec>), SendRequestError>,
|
||||||
|
>;
|
||||||
|
|
||||||
|
/// Send request, returns Response and Framed
|
||||||
|
fn open_tunnel(mut self, head: RequestHead) -> Self::TunnelFuture {
|
||||||
|
match self.io.take().unwrap() {
|
||||||
|
ConnectionType::H1(io) => {
|
||||||
|
Either::A(Box::new(h1proto::open_tunnel(io, head)))
|
||||||
|
}
|
||||||
|
ConnectionType::H2(io) => {
|
||||||
|
if let Some(mut pool) = self.pool.take() {
|
||||||
|
pool.release(IoConnection::new(
|
||||||
|
ConnectionType::H2(io),
|
||||||
|
self.created,
|
||||||
|
None,
|
||||||
|
));
|
||||||
|
}
|
||||||
|
Either::B(err(SendRequestError::TunnelNotSupported))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
#[allow(dead_code)]
|
#[allow(dead_code)]
|
||||||
@ -117,6 +158,7 @@ where
|
|||||||
A: AsyncRead + AsyncWrite + 'static,
|
A: AsyncRead + AsyncWrite + 'static,
|
||||||
B: AsyncRead + AsyncWrite + 'static,
|
B: AsyncRead + AsyncWrite + 'static,
|
||||||
{
|
{
|
||||||
|
type Io = EitherIo<A, B>;
|
||||||
type Future = Box<Future<Item = (ResponseHead, Payload), Error = SendRequestError>>;
|
type Future = Box<Future<Item = (ResponseHead, Payload), Error = SendRequestError>>;
|
||||||
|
|
||||||
fn send_request<RB: MessageBody + 'static>(
|
fn send_request<RB: MessageBody + 'static>(
|
||||||
@ -129,4 +171,99 @@ where
|
|||||||
EitherConnection::B(con) => con.send_request(head, body),
|
EitherConnection::B(con) => con.send_request(head, body),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
type TunnelFuture = Box<
|
||||||
|
Future<
|
||||||
|
Item = (ResponseHead, Framed<Self::Io, ClientCodec>),
|
||||||
|
Error = SendRequestError,
|
||||||
|
>,
|
||||||
|
>;
|
||||||
|
|
||||||
|
/// Send request, returns Response and Framed
|
||||||
|
fn open_tunnel(self, head: RequestHead) -> Self::TunnelFuture {
|
||||||
|
match self {
|
||||||
|
EitherConnection::A(con) => Box::new(
|
||||||
|
con.open_tunnel(head)
|
||||||
|
.map(|(head, framed)| (head, framed.map_io(|io| EitherIo::A(io)))),
|
||||||
|
),
|
||||||
|
EitherConnection::B(con) => Box::new(
|
||||||
|
con.open_tunnel(head)
|
||||||
|
.map(|(head, framed)| (head, framed.map_io(|io| EitherIo::B(io)))),
|
||||||
|
),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
pub enum EitherIo<A, B> {
|
||||||
|
A(A),
|
||||||
|
B(B),
|
||||||
|
}
|
||||||
|
|
||||||
|
impl<A, B> io::Read for EitherIo<A, B>
|
||||||
|
where
|
||||||
|
A: io::Read,
|
||||||
|
B: io::Read,
|
||||||
|
{
|
||||||
|
fn read(&mut self, buf: &mut [u8]) -> io::Result<usize> {
|
||||||
|
match self {
|
||||||
|
EitherIo::A(ref mut val) => val.read(buf),
|
||||||
|
EitherIo::B(ref mut val) => val.read(buf),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
impl<A, B> AsyncRead for EitherIo<A, B>
|
||||||
|
where
|
||||||
|
A: AsyncRead,
|
||||||
|
B: AsyncRead,
|
||||||
|
{
|
||||||
|
unsafe fn prepare_uninitialized_buffer(&self, buf: &mut [u8]) -> bool {
|
||||||
|
match self {
|
||||||
|
EitherIo::A(ref val) => val.prepare_uninitialized_buffer(buf),
|
||||||
|
EitherIo::B(ref val) => val.prepare_uninitialized_buffer(buf),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
impl<A, B> io::Write for EitherIo<A, B>
|
||||||
|
where
|
||||||
|
A: io::Write,
|
||||||
|
B: io::Write,
|
||||||
|
{
|
||||||
|
fn write(&mut self, buf: &[u8]) -> io::Result<usize> {
|
||||||
|
match self {
|
||||||
|
EitherIo::A(ref mut val) => val.write(buf),
|
||||||
|
EitherIo::B(ref mut val) => val.write(buf),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
fn flush(&mut self) -> io::Result<()> {
|
||||||
|
match self {
|
||||||
|
EitherIo::A(ref mut val) => val.flush(),
|
||||||
|
EitherIo::B(ref mut val) => val.flush(),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
impl<A, B> AsyncWrite for EitherIo<A, B>
|
||||||
|
where
|
||||||
|
A: AsyncWrite,
|
||||||
|
B: AsyncWrite,
|
||||||
|
{
|
||||||
|
fn shutdown(&mut self) -> Poll<(), io::Error> {
|
||||||
|
match self {
|
||||||
|
EitherIo::A(ref mut val) => val.shutdown(),
|
||||||
|
EitherIo::B(ref mut val) => val.shutdown(),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
fn write_buf<U: Buf>(&mut self, buf: &mut U) -> Poll<usize, io::Error>
|
||||||
|
where
|
||||||
|
Self: Sized,
|
||||||
|
{
|
||||||
|
match self {
|
||||||
|
EitherIo::A(ref mut val) => val.write_buf(buf),
|
||||||
|
EitherIo::B(ref mut val) => val.write_buf(buf),
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
@ -105,6 +105,9 @@ pub enum SendRequestError {
|
|||||||
/// Http2 error
|
/// Http2 error
|
||||||
#[display(fmt = "{}", _0)]
|
#[display(fmt = "{}", _0)]
|
||||||
H2(h2::Error),
|
H2(h2::Error),
|
||||||
|
/// Tunnels are not supported for http2 connection
|
||||||
|
#[display(fmt = "Tunnels are not supported for http2 connection")]
|
||||||
|
TunnelNotSupported,
|
||||||
/// Error sending request body
|
/// Error sending request body
|
||||||
Body(Error),
|
Body(Error),
|
||||||
}
|
}
|
||||||
|
@ -70,6 +70,32 @@ where
|
|||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
|
pub(crate) fn open_tunnel<T>(
|
||||||
|
io: T,
|
||||||
|
head: RequestHead,
|
||||||
|
) -> impl Future<Item = (ResponseHead, Framed<T, h1::ClientCodec>), Error = SendRequestError>
|
||||||
|
where
|
||||||
|
T: AsyncRead + AsyncWrite + 'static,
|
||||||
|
{
|
||||||
|
// create Framed and send reqest
|
||||||
|
Framed::new(io, h1::ClientCodec::default())
|
||||||
|
.send((head, BodySize::None).into())
|
||||||
|
.from_err()
|
||||||
|
// read response
|
||||||
|
.and_then(|framed| {
|
||||||
|
framed
|
||||||
|
.into_future()
|
||||||
|
.map_err(|(e, _)| SendRequestError::from(e))
|
||||||
|
.and_then(|(head, framed)| {
|
||||||
|
if let Some(head) = head {
|
||||||
|
Ok((head, framed))
|
||||||
|
} else {
|
||||||
|
Err(SendRequestError::from(ConnectError::Disconnected))
|
||||||
|
}
|
||||||
|
})
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
#[doc(hidden)]
|
#[doc(hidden)]
|
||||||
/// HTTP client connection
|
/// HTTP client connection
|
||||||
pub struct H1Connection<T> {
|
pub struct H1Connection<T> {
|
||||||
|
@ -411,66 +411,6 @@ where
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// struct ConnectorPoolSupport<T, Io>
|
|
||||||
// where
|
|
||||||
// Io: AsyncRead + AsyncWrite + 'static,
|
|
||||||
// {
|
|
||||||
// connector: T,
|
|
||||||
// inner: Rc<RefCell<Inner<Io>>>,
|
|
||||||
// }
|
|
||||||
|
|
||||||
// impl<T, Io> Future for ConnectorPoolSupport<T, Io>
|
|
||||||
// where
|
|
||||||
// Io: AsyncRead + AsyncWrite + 'static,
|
|
||||||
// T: Service<Connect, Response = (Io, Protocol), Error = ConnectorError>,
|
|
||||||
// T::Future: 'static,
|
|
||||||
// {
|
|
||||||
// type Item = ();
|
|
||||||
// type Error = ();
|
|
||||||
|
|
||||||
// fn poll(&mut self) -> Poll<Self::Item, Self::Error> {
|
|
||||||
// let mut inner = self.inner.as_ref().borrow_mut();
|
|
||||||
// inner.task.register();
|
|
||||||
|
|
||||||
// // check waiters
|
|
||||||
// loop {
|
|
||||||
// let (key, token) = {
|
|
||||||
// if let Some((key, token)) = inner.waiters_queue.get_index(0) {
|
|
||||||
// (key.clone(), *token)
|
|
||||||
// } else {
|
|
||||||
// break;
|
|
||||||
// }
|
|
||||||
// };
|
|
||||||
// match inner.acquire(&key) {
|
|
||||||
// Acquire::NotAvailable => break,
|
|
||||||
// Acquire::Acquired(io, created) => {
|
|
||||||
// let (_, tx) = inner.waiters.remove(token);
|
|
||||||
// if let Err(conn) = tx.send(Ok(IoConnection::new(
|
|
||||||
// io,
|
|
||||||
// created,
|
|
||||||
// Some(Acquired(key.clone(), Some(self.inner.clone()))),
|
|
||||||
// ))) {
|
|
||||||
// let (io, created) = conn.unwrap().into_inner();
|
|
||||||
// inner.release_conn(&key, io, created);
|
|
||||||
// }
|
|
||||||
// }
|
|
||||||
// Acquire::Available => {
|
|
||||||
// let (connect, tx) = inner.waiters.remove(token);
|
|
||||||
// OpenWaitingConnection::spawn(
|
|
||||||
// key.clone(),
|
|
||||||
// tx,
|
|
||||||
// self.inner.clone(),
|
|
||||||
// self.connector.call(connect),
|
|
||||||
// );
|
|
||||||
// }
|
|
||||||
// }
|
|
||||||
// let _ = inner.waiters_queue.swap_remove_index(0);
|
|
||||||
// }
|
|
||||||
|
|
||||||
// Ok(Async::NotReady)
|
|
||||||
// }
|
|
||||||
// }
|
|
||||||
|
|
||||||
struct CloseConnection<T> {
|
struct CloseConnection<T> {
|
||||||
io: T,
|
io: T,
|
||||||
timeout: Delay,
|
timeout: Delay,
|
||||||
|
@ -611,7 +611,6 @@ mod tests {
|
|||||||
use super::*;
|
use super::*;
|
||||||
use crate::error::ParseError;
|
use crate::error::ParseError;
|
||||||
use crate::httpmessage::HttpMessage;
|
use crate::httpmessage::HttpMessage;
|
||||||
use crate::message::Head;
|
|
||||||
|
|
||||||
impl PayloadType {
|
impl PayloadType {
|
||||||
fn unwrap(self) -> PayloadDecoder {
|
fn unwrap(self) -> PayloadDecoder {
|
||||||
|
@ -1,109 +0,0 @@
|
|||||||
//! Http client request
|
|
||||||
use std::str;
|
|
||||||
|
|
||||||
#[cfg(feature = "cookies")]
|
|
||||||
use cookie::Cookie;
|
|
||||||
use http::header::{HeaderName, HeaderValue};
|
|
||||||
use http::{Error as HttpError, HttpTryFrom, Uri};
|
|
||||||
|
|
||||||
use super::ClientError;
|
|
||||||
use crate::header::IntoHeaderValue;
|
|
||||||
use crate::message::RequestHead;
|
|
||||||
|
|
||||||
/// `WebSocket` connection
|
|
||||||
pub struct Connect {
|
|
||||||
pub(super) head: RequestHead,
|
|
||||||
pub(super) err: Option<ClientError>,
|
|
||||||
pub(super) http_err: Option<HttpError>,
|
|
||||||
pub(super) origin: Option<HeaderValue>,
|
|
||||||
pub(super) protocols: Option<String>,
|
|
||||||
pub(super) max_size: usize,
|
|
||||||
pub(super) server_mode: bool,
|
|
||||||
}
|
|
||||||
|
|
||||||
impl Connect {
|
|
||||||
/// Create new websocket connection
|
|
||||||
pub fn new<S: AsRef<str>>(uri: S) -> Connect {
|
|
||||||
let mut cl = Connect {
|
|
||||||
head: RequestHead::default(),
|
|
||||||
err: None,
|
|
||||||
http_err: None,
|
|
||||||
origin: None,
|
|
||||||
protocols: None,
|
|
||||||
max_size: 65_536,
|
|
||||||
server_mode: false,
|
|
||||||
};
|
|
||||||
|
|
||||||
match Uri::try_from(uri.as_ref()) {
|
|
||||||
Ok(uri) => cl.head.uri = uri,
|
|
||||||
Err(e) => cl.http_err = Some(e.into()),
|
|
||||||
}
|
|
||||||
|
|
||||||
cl
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Set supported websocket protocols
|
|
||||||
pub fn protocols<U, V>(mut self, protos: U) -> Self
|
|
||||||
where
|
|
||||||
U: IntoIterator<Item = V> + 'static,
|
|
||||||
V: AsRef<str>,
|
|
||||||
{
|
|
||||||
let mut protos = protos
|
|
||||||
.into_iter()
|
|
||||||
.fold(String::new(), |acc, s| acc + s.as_ref() + ",");
|
|
||||||
protos.pop();
|
|
||||||
self.protocols = Some(protos);
|
|
||||||
self
|
|
||||||
}
|
|
||||||
|
|
||||||
// #[cfg(feature = "cookies")]
|
|
||||||
// /// Set cookie for handshake request
|
|
||||||
// pub fn cookie(mut self, cookie: Cookie) -> Self {
|
|
||||||
// self.request.cookie(cookie);
|
|
||||||
// self
|
|
||||||
// }
|
|
||||||
|
|
||||||
/// Set request Origin
|
|
||||||
pub fn origin<V>(mut self, origin: V) -> Self
|
|
||||||
where
|
|
||||||
HeaderValue: HttpTryFrom<V>,
|
|
||||||
{
|
|
||||||
match HeaderValue::try_from(origin) {
|
|
||||||
Ok(value) => self.origin = Some(value),
|
|
||||||
Err(e) => self.http_err = Some(e.into()),
|
|
||||||
}
|
|
||||||
self
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Set max frame size
|
|
||||||
///
|
|
||||||
/// By default max size is set to 64kb
|
|
||||||
pub fn max_frame_size(mut self, size: usize) -> Self {
|
|
||||||
self.max_size = size;
|
|
||||||
self
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Disable payload masking. By default ws client masks frame payload.
|
|
||||||
pub fn server_mode(mut self) -> Self {
|
|
||||||
self.server_mode = true;
|
|
||||||
self
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Set request header
|
|
||||||
pub fn header<K, V>(mut self, key: K, value: V) -> Self
|
|
||||||
where
|
|
||||||
HeaderName: HttpTryFrom<K>,
|
|
||||||
V: IntoHeaderValue,
|
|
||||||
{
|
|
||||||
match HeaderName::try_from(key) {
|
|
||||||
Ok(key) => match value.try_into() {
|
|
||||||
Ok(value) => {
|
|
||||||
self.head.headers.append(key, value);
|
|
||||||
}
|
|
||||||
Err(e) => self.http_err = Some(e.into()),
|
|
||||||
},
|
|
||||||
Err(e) => self.http_err = Some(e.into()),
|
|
||||||
}
|
|
||||||
self
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,48 +0,0 @@
|
|||||||
mod connect;
|
|
||||||
mod error;
|
|
||||||
mod service;
|
|
||||||
|
|
||||||
pub use self::connect::Connect;
|
|
||||||
pub use self::error::ClientError;
|
|
||||||
pub use self::service::Client;
|
|
||||||
|
|
||||||
#[derive(PartialEq, Hash, Debug, Clone, Copy)]
|
|
||||||
pub(crate) enum Protocol {
|
|
||||||
Http,
|
|
||||||
Https,
|
|
||||||
Ws,
|
|
||||||
Wss,
|
|
||||||
}
|
|
||||||
|
|
||||||
impl Protocol {
|
|
||||||
fn from(s: &str) -> Option<Protocol> {
|
|
||||||
match s {
|
|
||||||
"http" => Some(Protocol::Http),
|
|
||||||
"https" => Some(Protocol::Https),
|
|
||||||
"ws" => Some(Protocol::Ws),
|
|
||||||
"wss" => Some(Protocol::Wss),
|
|
||||||
_ => None,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// fn is_http(self) -> bool {
|
|
||||||
// match self {
|
|
||||||
// Protocol::Https | Protocol::Http => true,
|
|
||||||
// _ => false,
|
|
||||||
// }
|
|
||||||
// }
|
|
||||||
|
|
||||||
// fn is_secure(self) -> bool {
|
|
||||||
// match self {
|
|
||||||
// Protocol::Https | Protocol::Wss => true,
|
|
||||||
// _ => false,
|
|
||||||
// }
|
|
||||||
// }
|
|
||||||
|
|
||||||
fn port(self) -> u16 {
|
|
||||||
match self {
|
|
||||||
Protocol::Http | Protocol::Ws => 80,
|
|
||||||
Protocol::Https | Protocol::Wss => 443,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,272 +0,0 @@
|
|||||||
//! websockets client
|
|
||||||
use std::marker::PhantomData;
|
|
||||||
|
|
||||||
use actix_codec::{AsyncRead, AsyncWrite, Framed};
|
|
||||||
use actix_connect::{default_connector, Connect as TcpConnect, ConnectError};
|
|
||||||
use actix_service::{apply_fn, Service};
|
|
||||||
use base64;
|
|
||||||
use futures::future::{err, Either, FutureResult};
|
|
||||||
use futures::{try_ready, Async, Future, Poll, Sink, Stream};
|
|
||||||
use http::header::{self, HeaderValue};
|
|
||||||
use http::{HttpTryFrom, StatusCode};
|
|
||||||
use log::trace;
|
|
||||||
use rand;
|
|
||||||
use sha1::Sha1;
|
|
||||||
|
|
||||||
use crate::body::BodySize;
|
|
||||||
use crate::h1;
|
|
||||||
use crate::message::{ConnectionType, ResponseHead};
|
|
||||||
use crate::ws::Codec;
|
|
||||||
|
|
||||||
use super::{ClientError, Connect, Protocol};
|
|
||||||
|
|
||||||
/// WebSocket's client
|
|
||||||
pub struct Client<T> {
|
|
||||||
connector: T,
|
|
||||||
}
|
|
||||||
|
|
||||||
impl Client<()> {
|
|
||||||
/// Create client with default connector.
|
|
||||||
pub fn default() -> Client<
|
|
||||||
impl Service<
|
|
||||||
Request = TcpConnect<String>,
|
|
||||||
Response = impl AsyncRead + AsyncWrite,
|
|
||||||
Error = ConnectError,
|
|
||||||
> + Clone,
|
|
||||||
> {
|
|
||||||
Client::new(apply_fn(default_connector(), |msg: TcpConnect<_>, srv| {
|
|
||||||
srv.call(msg).map(|stream| stream.into_parts().0)
|
|
||||||
}))
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
impl<T> Client<T>
|
|
||||||
where
|
|
||||||
T: Service<Request = TcpConnect<String>, Error = ConnectError>,
|
|
||||||
T::Response: AsyncRead + AsyncWrite,
|
|
||||||
{
|
|
||||||
/// Create new websocket's client factory
|
|
||||||
pub fn new(connector: T) -> Self {
|
|
||||||
Client { connector }
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
impl<T> Clone for Client<T>
|
|
||||||
where
|
|
||||||
T: Service<Request = TcpConnect<String>, Error = ConnectError> + Clone,
|
|
||||||
T::Response: AsyncRead + AsyncWrite,
|
|
||||||
{
|
|
||||||
fn clone(&self) -> Self {
|
|
||||||
Client {
|
|
||||||
connector: self.connector.clone(),
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
impl<T> Service for Client<T>
|
|
||||||
where
|
|
||||||
T: Service<Request = TcpConnect<String>, Error = ConnectError>,
|
|
||||||
T::Response: AsyncRead + AsyncWrite + 'static,
|
|
||||||
T::Future: 'static,
|
|
||||||
{
|
|
||||||
type Request = Connect;
|
|
||||||
type Response = Framed<T::Response, Codec>;
|
|
||||||
type Error = ClientError;
|
|
||||||
type Future = Either<
|
|
||||||
FutureResult<Self::Response, Self::Error>,
|
|
||||||
ClientResponseFut<T::Response>,
|
|
||||||
>;
|
|
||||||
|
|
||||||
fn poll_ready(&mut self) -> Poll<(), Self::Error> {
|
|
||||||
self.connector.poll_ready().map_err(ClientError::from)
|
|
||||||
}
|
|
||||||
|
|
||||||
fn call(&mut self, mut req: Connect) -> Self::Future {
|
|
||||||
if let Some(e) = req.err.take() {
|
|
||||||
Either::A(err(e))
|
|
||||||
} else if let Some(e) = req.http_err.take() {
|
|
||||||
Either::A(err(e.into()))
|
|
||||||
} else {
|
|
||||||
// origin
|
|
||||||
if let Some(origin) = req.origin.take() {
|
|
||||||
req.head.headers.insert(header::ORIGIN, origin);
|
|
||||||
}
|
|
||||||
|
|
||||||
req.head.set_connection_type(ConnectionType::Upgrade);
|
|
||||||
req.head
|
|
||||||
.headers
|
|
||||||
.insert(header::UPGRADE, HeaderValue::from_static("websocket"));
|
|
||||||
req.head.headers.insert(
|
|
||||||
header::SEC_WEBSOCKET_VERSION,
|
|
||||||
HeaderValue::from_static("13"),
|
|
||||||
);
|
|
||||||
|
|
||||||
if let Some(protocols) = req.protocols.take() {
|
|
||||||
req.head.headers.insert(
|
|
||||||
header::SEC_WEBSOCKET_PROTOCOL,
|
|
||||||
HeaderValue::try_from(protocols.as_str()).unwrap(),
|
|
||||||
);
|
|
||||||
}
|
|
||||||
if let Some(e) = req.http_err {
|
|
||||||
return Either::A(err(e.into()));
|
|
||||||
};
|
|
||||||
|
|
||||||
let mut request = req.head;
|
|
||||||
if request.uri.host().is_none() {
|
|
||||||
return Either::A(err(ClientError::InvalidUrl));
|
|
||||||
}
|
|
||||||
|
|
||||||
// supported protocols
|
|
||||||
let proto = if let Some(scheme) = request.uri.scheme_part() {
|
|
||||||
match Protocol::from(scheme.as_str()) {
|
|
||||||
Some(proto) => proto,
|
|
||||||
None => return Either::A(err(ClientError::InvalidUrl)),
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
return Either::A(err(ClientError::InvalidUrl));
|
|
||||||
};
|
|
||||||
|
|
||||||
// Generate a random key for the `Sec-WebSocket-Key` header.
|
|
||||||
// a base64-encoded (see Section 4 of [RFC4648]) value that,
|
|
||||||
// when decoded, is 16 bytes in length (RFC 6455)
|
|
||||||
let sec_key: [u8; 16] = rand::random();
|
|
||||||
let key = base64::encode(&sec_key);
|
|
||||||
|
|
||||||
request.headers.insert(
|
|
||||||
header::SEC_WEBSOCKET_KEY,
|
|
||||||
HeaderValue::try_from(key.as_str()).unwrap(),
|
|
||||||
);
|
|
||||||
|
|
||||||
// prep connection
|
|
||||||
let connect = TcpConnect::new(request.uri.host().unwrap().to_string())
|
|
||||||
.set_port(request.uri.port_u16().unwrap_or_else(|| proto.port()));
|
|
||||||
|
|
||||||
let fut = Box::new(
|
|
||||||
self.connector
|
|
||||||
.call(connect)
|
|
||||||
.map_err(ClientError::from)
|
|
||||||
.and_then(move |io| {
|
|
||||||
// h1 protocol
|
|
||||||
let framed = Framed::new(io, h1::ClientCodec::default());
|
|
||||||
framed
|
|
||||||
.send((request, BodySize::None).into())
|
|
||||||
.map_err(ClientError::from)
|
|
||||||
.and_then(|framed| {
|
|
||||||
framed
|
|
||||||
.into_future()
|
|
||||||
.map_err(|(e, _)| ClientError::from(e))
|
|
||||||
})
|
|
||||||
}),
|
|
||||||
);
|
|
||||||
|
|
||||||
// start handshake
|
|
||||||
Either::B(ClientResponseFut {
|
|
||||||
key,
|
|
||||||
fut,
|
|
||||||
max_size: req.max_size,
|
|
||||||
server_mode: req.server_mode,
|
|
||||||
_t: PhantomData,
|
|
||||||
})
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Future that implementes client websocket handshake process.
|
|
||||||
///
|
|
||||||
/// It resolves to a `Framed<T, ws::Codec>` instance.
|
|
||||||
pub struct ClientResponseFut<T>
|
|
||||||
where
|
|
||||||
T: AsyncRead + AsyncWrite,
|
|
||||||
{
|
|
||||||
fut: Box<
|
|
||||||
Future<
|
|
||||||
Item = (Option<ResponseHead>, Framed<T, h1::ClientCodec>),
|
|
||||||
Error = ClientError,
|
|
||||||
>,
|
|
||||||
>,
|
|
||||||
key: String,
|
|
||||||
max_size: usize,
|
|
||||||
server_mode: bool,
|
|
||||||
_t: PhantomData<T>,
|
|
||||||
}
|
|
||||||
|
|
||||||
impl<T> Future for ClientResponseFut<T>
|
|
||||||
where
|
|
||||||
T: AsyncRead + AsyncWrite,
|
|
||||||
{
|
|
||||||
type Item = Framed<T, Codec>;
|
|
||||||
type Error = ClientError;
|
|
||||||
|
|
||||||
fn poll(&mut self) -> Poll<Self::Item, Self::Error> {
|
|
||||||
let (item, framed) = try_ready!(self.fut.poll());
|
|
||||||
|
|
||||||
let res = match item {
|
|
||||||
Some(res) => res,
|
|
||||||
None => return Err(ClientError::Disconnected),
|
|
||||||
};
|
|
||||||
|
|
||||||
// verify response
|
|
||||||
if res.status != StatusCode::SWITCHING_PROTOCOLS {
|
|
||||||
return Err(ClientError::InvalidResponseStatus(res.status));
|
|
||||||
}
|
|
||||||
// Check for "UPGRADE" to websocket header
|
|
||||||
let has_hdr = if let Some(hdr) = res.headers.get(header::UPGRADE) {
|
|
||||||
if let Ok(s) = hdr.to_str() {
|
|
||||||
s.to_lowercase().contains("websocket")
|
|
||||||
} else {
|
|
||||||
false
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
false
|
|
||||||
};
|
|
||||||
if !has_hdr {
|
|
||||||
trace!("Invalid upgrade header");
|
|
||||||
return Err(ClientError::InvalidUpgradeHeader);
|
|
||||||
}
|
|
||||||
// Check for "CONNECTION" header
|
|
||||||
if let Some(conn) = res.headers.get(header::CONNECTION) {
|
|
||||||
if let Ok(s) = conn.to_str() {
|
|
||||||
if !s.to_lowercase().contains("upgrade") {
|
|
||||||
trace!("Invalid connection header: {}", s);
|
|
||||||
return Err(ClientError::InvalidConnectionHeader(conn.clone()));
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
trace!("Invalid connection header: {:?}", conn);
|
|
||||||
return Err(ClientError::InvalidConnectionHeader(conn.clone()));
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
trace!("Missing connection header");
|
|
||||||
return Err(ClientError::MissingConnectionHeader);
|
|
||||||
}
|
|
||||||
|
|
||||||
if let Some(key) = res.headers.get(header::SEC_WEBSOCKET_ACCEPT) {
|
|
||||||
// field is constructed by concatenating /key/
|
|
||||||
// with the string "258EAFA5-E914-47DA-95CA-C5AB0DC85B11" (RFC 6455)
|
|
||||||
const WS_GUID: &[u8] = b"258EAFA5-E914-47DA-95CA-C5AB0DC85B11";
|
|
||||||
let mut sha1 = Sha1::new();
|
|
||||||
sha1.update(self.key.as_ref());
|
|
||||||
sha1.update(WS_GUID);
|
|
||||||
let encoded = base64::encode(&sha1.digest().bytes());
|
|
||||||
if key.as_bytes() != encoded.as_bytes() {
|
|
||||||
trace!(
|
|
||||||
"Invalid challenge response: expected: {} received: {:?}",
|
|
||||||
encoded,
|
|
||||||
key
|
|
||||||
);
|
|
||||||
return Err(ClientError::InvalidChallengeResponse(encoded, key.clone()));
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
trace!("Missing SEC-WEBSOCKET-ACCEPT header");
|
|
||||||
return Err(ClientError::MissingWebSocketAcceptHeader);
|
|
||||||
};
|
|
||||||
|
|
||||||
// websockets codec
|
|
||||||
let codec = if self.server_mode {
|
|
||||||
Codec::new().max_size(self.max_size)
|
|
||||||
} else {
|
|
||||||
Codec::new().max_size(self.max_size).client_mode()
|
|
||||||
};
|
|
||||||
|
|
||||||
Ok(Async::Ready(framed.into_framed(codec)))
|
|
||||||
}
|
|
||||||
}
|
|
@ -13,7 +13,6 @@ use crate::httpmessage::HttpMessage;
|
|||||||
use crate::request::Request;
|
use crate::request::Request;
|
||||||
use crate::response::{Response, ResponseBuilder};
|
use crate::response::{Response, ResponseBuilder};
|
||||||
|
|
||||||
mod client;
|
|
||||||
mod codec;
|
mod codec;
|
||||||
mod frame;
|
mod frame;
|
||||||
mod mask;
|
mod mask;
|
||||||
@ -21,7 +20,6 @@ mod proto;
|
|||||||
mod service;
|
mod service;
|
||||||
mod transport;
|
mod transport;
|
||||||
|
|
||||||
pub use self::client::{Client, ClientError, Connect};
|
|
||||||
pub use self::codec::{Codec, Frame, Message};
|
pub use self::codec::{Codec, Frame, Message};
|
||||||
pub use self::frame::Parser;
|
pub use self::frame::Parser;
|
||||||
pub use self::proto::{hash_key, CloseCode, CloseReason, OpCode};
|
pub use self::proto::{hash_key, CloseCode, CloseReason, OpCode};
|
||||||
|
@ -39,13 +39,16 @@ flate2-zlib = ["actix-http/flate2-zlib"]
|
|||||||
flate2-rust = ["actix-http/flate2-rust"]
|
flate2-rust = ["actix-http/flate2-rust"]
|
||||||
|
|
||||||
[dependencies]
|
[dependencies]
|
||||||
|
actix-codec = "0.1.1"
|
||||||
actix-service = "0.3.4"
|
actix-service = "0.3.4"
|
||||||
actix-http = { path = "../actix-http/" }
|
actix-http = { path = "../actix-http/" }
|
||||||
base64 = "0.10.1"
|
base64 = "0.10.1"
|
||||||
bytes = "0.4"
|
bytes = "0.4"
|
||||||
|
derive_more = "0.14"
|
||||||
futures = "0.1"
|
futures = "0.1"
|
||||||
log =" 0.4"
|
log =" 0.4"
|
||||||
percent-encoding = "1.0"
|
percent-encoding = "1.0"
|
||||||
|
rand = "0.6"
|
||||||
serde = "1.0"
|
serde = "1.0"
|
||||||
serde_json = "1.0"
|
serde_json = "1.0"
|
||||||
serde_urlencoded = "0.5.3"
|
serde_urlencoded = "0.5.3"
|
||||||
@ -58,8 +61,11 @@ actix-rt = "0.2.1"
|
|||||||
actix-web = { path = "..", features=["ssl"] }
|
actix-web = { path = "..", features=["ssl"] }
|
||||||
actix-http = { path = "../actix-http/", features=["ssl"] }
|
actix-http = { path = "../actix-http/", features=["ssl"] }
|
||||||
actix-http-test = { path = "../test-server/", features=["ssl"] }
|
actix-http-test = { path = "../test-server/", features=["ssl"] }
|
||||||
|
actix-utils = "0.3.4"
|
||||||
|
actix-server = { version = "0.4.0", features=["ssl"] }
|
||||||
brotli2 = { version="^0.3.2" }
|
brotli2 = { version="^0.3.2" }
|
||||||
flate2 = { version="^1.0.2" }
|
flate2 = { version="^1.0.2" }
|
||||||
env_logger = "0.6"
|
env_logger = "0.6"
|
||||||
mime = "0.3"
|
mime = "0.3"
|
||||||
rand = "0.6"
|
rand = "0.6"
|
||||||
|
tokio-tcp = "0.1"
|
@ -1,8 +1,12 @@
|
|||||||
|
use std::io;
|
||||||
|
|
||||||
|
use actix_codec::{AsyncRead, AsyncWrite, Framed};
|
||||||
use actix_http::body::Body;
|
use actix_http::body::Body;
|
||||||
use actix_http::client::{ConnectError, Connection, SendRequestError};
|
use actix_http::client::{ConnectError, Connection, SendRequestError};
|
||||||
use actix_http::{http, RequestHead};
|
use actix_http::h1::ClientCodec;
|
||||||
|
use actix_http::{http, RequestHead, ResponseHead};
|
||||||
use actix_service::Service;
|
use actix_service::Service;
|
||||||
use futures::Future;
|
use futures::{Future, Poll};
|
||||||
|
|
||||||
use crate::response::ClientResponse;
|
use crate::response::ClientResponse;
|
||||||
|
|
||||||
@ -14,13 +18,26 @@ pub(crate) trait Connect {
|
|||||||
head: RequestHead,
|
head: RequestHead,
|
||||||
body: Body,
|
body: Body,
|
||||||
) -> Box<Future<Item = ClientResponse, Error = SendRequestError>>;
|
) -> Box<Future<Item = ClientResponse, Error = SendRequestError>>;
|
||||||
|
|
||||||
|
/// Send request, returns Response and Framed
|
||||||
|
fn open_tunnel(
|
||||||
|
&mut self,
|
||||||
|
head: RequestHead,
|
||||||
|
) -> Box<
|
||||||
|
Future<
|
||||||
|
Item = (ResponseHead, Framed<BoxedSocket, ClientCodec>),
|
||||||
|
Error = SendRequestError,
|
||||||
|
>,
|
||||||
|
>;
|
||||||
}
|
}
|
||||||
|
|
||||||
impl<T> Connect for ConnectorWrapper<T>
|
impl<T> Connect for ConnectorWrapper<T>
|
||||||
where
|
where
|
||||||
T: Service<Request = http::Uri, Error = ConnectError>,
|
T: Service<Request = http::Uri, Error = ConnectError>,
|
||||||
T::Response: Connection,
|
T::Response: Connection,
|
||||||
|
<T::Response as Connection>::Io: 'static,
|
||||||
<T::Response as Connection>::Future: 'static,
|
<T::Response as Connection>::Future: 'static,
|
||||||
|
<T::Response as Connection>::TunnelFuture: 'static,
|
||||||
T::Future: 'static,
|
T::Future: 'static,
|
||||||
{
|
{
|
||||||
fn send_request(
|
fn send_request(
|
||||||
@ -38,4 +55,77 @@ where
|
|||||||
.map(|(head, payload)| ClientResponse::new(head, payload)),
|
.map(|(head, payload)| ClientResponse::new(head, payload)),
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
fn open_tunnel(
|
||||||
|
&mut self,
|
||||||
|
head: RequestHead,
|
||||||
|
) -> Box<
|
||||||
|
Future<
|
||||||
|
Item = (ResponseHead, Framed<BoxedSocket, ClientCodec>),
|
||||||
|
Error = SendRequestError,
|
||||||
|
>,
|
||||||
|
> {
|
||||||
|
Box::new(
|
||||||
|
self.0
|
||||||
|
// connect to the host
|
||||||
|
.call(head.uri.clone())
|
||||||
|
.from_err()
|
||||||
|
// send request
|
||||||
|
.and_then(move |connection| connection.open_tunnel(head))
|
||||||
|
.map(|(head, framed)| {
|
||||||
|
let framed = framed.map_io(|io| BoxedSocket(Box::new(Socket(io))));
|
||||||
|
(head, framed)
|
||||||
|
}),
|
||||||
|
)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
trait AsyncSocket {
|
||||||
|
fn as_read(&self) -> &AsyncRead;
|
||||||
|
fn as_read_mut(&mut self) -> &mut AsyncRead;
|
||||||
|
fn as_write(&mut self) -> &mut AsyncWrite;
|
||||||
|
}
|
||||||
|
|
||||||
|
struct Socket<T: AsyncRead + AsyncWrite>(T);
|
||||||
|
|
||||||
|
impl<T: AsyncRead + AsyncWrite> AsyncSocket for Socket<T> {
|
||||||
|
fn as_read(&self) -> &AsyncRead {
|
||||||
|
&self.0
|
||||||
|
}
|
||||||
|
fn as_read_mut(&mut self) -> &mut AsyncRead {
|
||||||
|
&mut self.0
|
||||||
|
}
|
||||||
|
fn as_write(&mut self) -> &mut AsyncWrite {
|
||||||
|
&mut self.0
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
pub struct BoxedSocket(Box<dyn AsyncSocket>);
|
||||||
|
|
||||||
|
impl io::Read for BoxedSocket {
|
||||||
|
fn read(&mut self, buf: &mut [u8]) -> io::Result<usize> {
|
||||||
|
self.0.as_read_mut().read(buf)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
impl AsyncRead for BoxedSocket {
|
||||||
|
unsafe fn prepare_uninitialized_buffer(&self, buf: &mut [u8]) -> bool {
|
||||||
|
self.0.as_read().prepare_uninitialized_buffer(buf)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
impl io::Write for BoxedSocket {
|
||||||
|
fn write(&mut self, buf: &[u8]) -> io::Result<usize> {
|
||||||
|
self.0.as_write().write(buf)
|
||||||
|
}
|
||||||
|
|
||||||
|
fn flush(&mut self) -> io::Result<()> {
|
||||||
|
self.0.as_write().flush()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
impl AsyncWrite for BoxedSocket {
|
||||||
|
fn shutdown(&mut self) -> Poll<(), io::Error> {
|
||||||
|
self.0.as_write().shutdown()
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
@ -1,19 +1,14 @@
|
|||||||
//! Http client request
|
//! Http client errors
|
||||||
use std::io;
|
pub use actix_http::client::{ConnectError, InvalidUrl, SendRequestError};
|
||||||
|
pub use actix_http::error::PayloadError;
|
||||||
|
pub use actix_http::ws::ProtocolError as WsProtocolError;
|
||||||
|
|
||||||
use actix_connect::ConnectError;
|
use actix_http::http::{header::HeaderValue, Error as HttpError, StatusCode};
|
||||||
use derive_more::{Display, From};
|
use derive_more::{Display, From};
|
||||||
use http::{header::HeaderValue, Error as HttpError, StatusCode};
|
|
||||||
|
|
||||||
use crate::error::ParseError;
|
|
||||||
use crate::ws::ProtocolError;
|
|
||||||
|
|
||||||
/// Websocket client error
|
/// Websocket client error
|
||||||
#[derive(Debug, Display, From)]
|
#[derive(Debug, Display, From)]
|
||||||
pub enum ClientError {
|
pub enum WsClientError {
|
||||||
/// Invalid url
|
|
||||||
#[display(fmt = "Invalid url")]
|
|
||||||
InvalidUrl,
|
|
||||||
/// Invalid response status
|
/// Invalid response status
|
||||||
#[display(fmt = "Invalid response status")]
|
#[display(fmt = "Invalid response status")]
|
||||||
InvalidResponseStatus(StatusCode),
|
InvalidResponseStatus(StatusCode),
|
||||||
@ -32,22 +27,22 @@ pub enum ClientError {
|
|||||||
/// Invalid challenge response
|
/// Invalid challenge response
|
||||||
#[display(fmt = "Invalid challenge response")]
|
#[display(fmt = "Invalid challenge response")]
|
||||||
InvalidChallengeResponse(String, HeaderValue),
|
InvalidChallengeResponse(String, HeaderValue),
|
||||||
/// Http parsing error
|
|
||||||
#[display(fmt = "Http parsing error")]
|
|
||||||
Http(HttpError),
|
|
||||||
/// Response parsing error
|
|
||||||
#[display(fmt = "Response parsing error: {}", _0)]
|
|
||||||
ParseError(ParseError),
|
|
||||||
/// Protocol error
|
/// Protocol error
|
||||||
#[display(fmt = "{}", _0)]
|
#[display(fmt = "{}", _0)]
|
||||||
Protocol(ProtocolError),
|
Protocol(WsProtocolError),
|
||||||
/// Connect error
|
/// Send request error
|
||||||
#[display(fmt = "Connector error: {:?}", _0)]
|
|
||||||
Connect(ConnectError),
|
|
||||||
/// IO Error
|
|
||||||
#[display(fmt = "{}", _0)]
|
#[display(fmt = "{}", _0)]
|
||||||
Io(io::Error),
|
SendRequest(SendRequestError),
|
||||||
/// "Disconnected"
|
}
|
||||||
#[display(fmt = "Disconnected")]
|
|
||||||
Disconnected,
|
impl From<InvalidUrl> for WsClientError {
|
||||||
|
fn from(err: InvalidUrl) -> Self {
|
||||||
|
WsClientError::SendRequest(err.into())
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
impl From<HttpError> for WsClientError {
|
||||||
|
fn from(err: HttpError) -> Self {
|
||||||
|
WsClientError::SendRequest(err.into())
|
||||||
|
}
|
||||||
}
|
}
|
@ -23,8 +23,6 @@
|
|||||||
use std::cell::RefCell;
|
use std::cell::RefCell;
|
||||||
use std::rc::Rc;
|
use std::rc::Rc;
|
||||||
|
|
||||||
pub use actix_http::client::{ConnectError, InvalidUrl, SendRequestError};
|
|
||||||
pub use actix_http::error::PayloadError;
|
|
||||||
pub use actix_http::http;
|
pub use actix_http::http;
|
||||||
|
|
||||||
use actix_http::client::Connector;
|
use actix_http::client::Connector;
|
||||||
@ -33,13 +31,16 @@ use actix_http::RequestHead;
|
|||||||
|
|
||||||
mod builder;
|
mod builder;
|
||||||
mod connect;
|
mod connect;
|
||||||
|
pub mod error;
|
||||||
mod request;
|
mod request;
|
||||||
mod response;
|
mod response;
|
||||||
pub mod test;
|
pub mod test;
|
||||||
|
mod ws;
|
||||||
|
|
||||||
pub use self::builder::ClientBuilder;
|
pub use self::builder::ClientBuilder;
|
||||||
pub use self::request::ClientRequest;
|
pub use self::request::ClientRequest;
|
||||||
pub use self::response::ClientResponse;
|
pub use self::response::ClientResponse;
|
||||||
|
pub use self::ws::WebsocketsRequest;
|
||||||
|
|
||||||
use self::connect::{Connect, ConnectorWrapper};
|
use self::connect::{Connect, ConnectorWrapper};
|
||||||
|
|
||||||
@ -165,4 +166,11 @@ impl Client {
|
|||||||
{
|
{
|
||||||
ClientRequest::new(Method::OPTIONS, url, self.connector.clone())
|
ClientRequest::new(Method::OPTIONS, url, self.connector.clone())
|
||||||
}
|
}
|
||||||
|
|
||||||
|
pub fn ws<U>(&self, url: U) -> WebsocketsRequest
|
||||||
|
where
|
||||||
|
Uri: HttpTryFrom<U>,
|
||||||
|
{
|
||||||
|
WebsocketsRequest::new(url, self.connector.clone())
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
@ -12,7 +12,6 @@ use serde::Serialize;
|
|||||||
use serde_json;
|
use serde_json;
|
||||||
|
|
||||||
use actix_http::body::{Body, BodyStream};
|
use actix_http::body::{Body, BodyStream};
|
||||||
use actix_http::client::{InvalidUrl, SendRequestError};
|
|
||||||
use actix_http::encoding::Decoder;
|
use actix_http::encoding::Decoder;
|
||||||
use actix_http::http::header::{self, ContentEncoding, Header, IntoHeaderValue};
|
use actix_http::http::header::{self, ContentEncoding, Header, IntoHeaderValue};
|
||||||
use actix_http::http::{
|
use actix_http::http::{
|
||||||
@ -21,8 +20,9 @@ use actix_http::http::{
|
|||||||
};
|
};
|
||||||
use actix_http::{Error, Payload, RequestHead};
|
use actix_http::{Error, Payload, RequestHead};
|
||||||
|
|
||||||
|
use crate::connect::Connect;
|
||||||
|
use crate::error::{InvalidUrl, PayloadError, SendRequestError};
|
||||||
use crate::response::ClientResponse;
|
use crate::response::ClientResponse;
|
||||||
use crate::{Connect, PayloadError};
|
|
||||||
|
|
||||||
#[cfg(any(feature = "brotli", feature = "flate2-zlib", feature = "flate2-rust"))]
|
#[cfg(any(feature = "brotli", feature = "flate2-zlib", feature = "flate2-rust"))]
|
||||||
const HTTPS_ENCODING: &str = "br, gzip, deflate";
|
const HTTPS_ENCODING: &str = "br, gzip, deflate";
|
||||||
|
398
awc/src/ws.rs
Normal file
398
awc/src/ws.rs
Normal file
@ -0,0 +1,398 @@
|
|||||||
|
//! Websockets client
|
||||||
|
use std::cell::RefCell;
|
||||||
|
use std::io::Write;
|
||||||
|
use std::rc::Rc;
|
||||||
|
use std::{fmt, str};
|
||||||
|
|
||||||
|
use actix_codec::Framed;
|
||||||
|
use actix_http::{ws, Payload, RequestHead};
|
||||||
|
use bytes::{BufMut, BytesMut};
|
||||||
|
#[cfg(feature = "cookies")]
|
||||||
|
use cookie::{Cookie, CookieJar};
|
||||||
|
use futures::future::{err, Either, Future};
|
||||||
|
|
||||||
|
use crate::connect::{BoxedSocket, Connect};
|
||||||
|
use crate::error::{InvalidUrl, WsClientError};
|
||||||
|
use crate::http::header::{
|
||||||
|
self, HeaderName, HeaderValue, IntoHeaderValue, AUTHORIZATION,
|
||||||
|
};
|
||||||
|
use crate::http::{
|
||||||
|
ConnectionType, Error as HttpError, HttpTryFrom, Method, StatusCode, Uri, Version,
|
||||||
|
};
|
||||||
|
use crate::response::ClientResponse;
|
||||||
|
|
||||||
|
/// `WebSocket` connection
|
||||||
|
pub struct WebsocketsRequest {
|
||||||
|
head: RequestHead,
|
||||||
|
err: Option<HttpError>,
|
||||||
|
origin: Option<HeaderValue>,
|
||||||
|
protocols: Option<String>,
|
||||||
|
max_size: usize,
|
||||||
|
server_mode: bool,
|
||||||
|
default_headers: bool,
|
||||||
|
#[cfg(feature = "cookies")]
|
||||||
|
cookies: Option<CookieJar>,
|
||||||
|
connector: Rc<RefCell<dyn Connect>>,
|
||||||
|
}
|
||||||
|
|
||||||
|
impl WebsocketsRequest {
|
||||||
|
/// Create new websocket connection
|
||||||
|
pub(crate) fn new<U>(uri: U, connector: Rc<RefCell<dyn Connect>>) -> Self
|
||||||
|
where
|
||||||
|
Uri: HttpTryFrom<U>,
|
||||||
|
{
|
||||||
|
let mut err = None;
|
||||||
|
let mut head = RequestHead::default();
|
||||||
|
head.method = Method::GET;
|
||||||
|
head.version = Version::HTTP_11;
|
||||||
|
|
||||||
|
match Uri::try_from(uri) {
|
||||||
|
Ok(uri) => head.uri = uri,
|
||||||
|
Err(e) => err = Some(e.into()),
|
||||||
|
}
|
||||||
|
|
||||||
|
WebsocketsRequest {
|
||||||
|
head,
|
||||||
|
err,
|
||||||
|
connector,
|
||||||
|
origin: None,
|
||||||
|
protocols: None,
|
||||||
|
max_size: 65_536,
|
||||||
|
server_mode: false,
|
||||||
|
#[cfg(feature = "cookies")]
|
||||||
|
cookies: None,
|
||||||
|
default_headers: true,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Set supported websocket protocols
|
||||||
|
pub fn protocols<U, V>(mut self, protos: U) -> Self
|
||||||
|
where
|
||||||
|
U: IntoIterator<Item = V> + 'static,
|
||||||
|
V: AsRef<str>,
|
||||||
|
{
|
||||||
|
let mut protos = protos
|
||||||
|
.into_iter()
|
||||||
|
.fold(String::new(), |acc, s| acc + s.as_ref() + ",");
|
||||||
|
protos.pop();
|
||||||
|
self.protocols = Some(protos);
|
||||||
|
self
|
||||||
|
}
|
||||||
|
|
||||||
|
#[cfg(feature = "cookies")]
|
||||||
|
/// Set a cookie
|
||||||
|
pub fn cookie<'c>(mut self, cookie: Cookie<'c>) -> Self {
|
||||||
|
if self.cookies.is_none() {
|
||||||
|
let mut jar = CookieJar::new();
|
||||||
|
jar.add(cookie.into_owned());
|
||||||
|
self.cookies = Some(jar)
|
||||||
|
} else {
|
||||||
|
self.cookies.as_mut().unwrap().add(cookie.into_owned());
|
||||||
|
}
|
||||||
|
self
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Set request Origin
|
||||||
|
pub fn origin<V>(mut self, origin: V) -> Self
|
||||||
|
where
|
||||||
|
HeaderValue: HttpTryFrom<V>,
|
||||||
|
{
|
||||||
|
match HeaderValue::try_from(origin) {
|
||||||
|
Ok(value) => self.origin = Some(value),
|
||||||
|
Err(e) => self.err = Some(e.into()),
|
||||||
|
}
|
||||||
|
self
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Set max frame size
|
||||||
|
///
|
||||||
|
/// By default max size is set to 64kb
|
||||||
|
pub fn max_frame_size(mut self, size: usize) -> Self {
|
||||||
|
self.max_size = size;
|
||||||
|
self
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Disable payload masking. By default ws client masks frame payload.
|
||||||
|
pub fn server_mode(mut self) -> Self {
|
||||||
|
self.server_mode = true;
|
||||||
|
self
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Do not add default request headers.
|
||||||
|
/// By default `Date` and `User-Agent` headers are set.
|
||||||
|
pub fn no_default_headers(mut self) -> Self {
|
||||||
|
self.default_headers = false;
|
||||||
|
self
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Append a header.
|
||||||
|
///
|
||||||
|
/// Header gets appended to existing header.
|
||||||
|
/// To override header use `set_header()` method.
|
||||||
|
pub fn header<K, V>(mut self, key: K, value: V) -> Self
|
||||||
|
where
|
||||||
|
HeaderName: HttpTryFrom<K>,
|
||||||
|
V: IntoHeaderValue,
|
||||||
|
{
|
||||||
|
match HeaderName::try_from(key) {
|
||||||
|
Ok(key) => match value.try_into() {
|
||||||
|
Ok(value) => {
|
||||||
|
self.head.headers.append(key, value);
|
||||||
|
}
|
||||||
|
Err(e) => self.err = Some(e.into()),
|
||||||
|
},
|
||||||
|
Err(e) => self.err = Some(e.into()),
|
||||||
|
}
|
||||||
|
self
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Insert a header, replaces existing header.
|
||||||
|
pub fn set_header<K, V>(mut self, key: K, value: V) -> Self
|
||||||
|
where
|
||||||
|
HeaderName: HttpTryFrom<K>,
|
||||||
|
V: IntoHeaderValue,
|
||||||
|
{
|
||||||
|
match HeaderName::try_from(key) {
|
||||||
|
Ok(key) => match value.try_into() {
|
||||||
|
Ok(value) => {
|
||||||
|
self.head.headers.insert(key, value);
|
||||||
|
}
|
||||||
|
Err(e) => self.err = Some(e.into()),
|
||||||
|
},
|
||||||
|
Err(e) => self.err = Some(e.into()),
|
||||||
|
}
|
||||||
|
self
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Insert a header only if it is not yet set.
|
||||||
|
pub fn set_header_if_none<K, V>(mut self, key: K, value: V) -> Self
|
||||||
|
where
|
||||||
|
HeaderName: HttpTryFrom<K>,
|
||||||
|
V: IntoHeaderValue,
|
||||||
|
{
|
||||||
|
match HeaderName::try_from(key) {
|
||||||
|
Ok(key) => {
|
||||||
|
if !self.head.headers.contains_key(&key) {
|
||||||
|
match value.try_into() {
|
||||||
|
Ok(value) => {
|
||||||
|
self.head.headers.insert(key, value);
|
||||||
|
}
|
||||||
|
Err(e) => self.err = Some(e.into()),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
Err(e) => self.err = Some(e.into()),
|
||||||
|
}
|
||||||
|
self
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Set HTTP basic authorization header
|
||||||
|
pub fn basic_auth<U, P>(self, username: U, password: Option<P>) -> Self
|
||||||
|
where
|
||||||
|
U: fmt::Display,
|
||||||
|
P: fmt::Display,
|
||||||
|
{
|
||||||
|
let auth = match password {
|
||||||
|
Some(password) => format!("{}:{}", username, password),
|
||||||
|
None => format!("{}", username),
|
||||||
|
};
|
||||||
|
self.header(AUTHORIZATION, format!("Basic {}", base64::encode(&auth)))
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Set HTTP bearer authentication header
|
||||||
|
pub fn bearer_auth<T>(self, token: T) -> Self
|
||||||
|
where
|
||||||
|
T: fmt::Display,
|
||||||
|
{
|
||||||
|
self.header(AUTHORIZATION, format!("Bearer {}", token))
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Complete request construction and connect.
|
||||||
|
pub fn connect(
|
||||||
|
mut self,
|
||||||
|
) -> impl Future<
|
||||||
|
Item = (ClientResponse, Framed<BoxedSocket, ws::Codec>),
|
||||||
|
Error = WsClientError,
|
||||||
|
> {
|
||||||
|
if let Some(e) = self.err.take() {
|
||||||
|
return Either::A(err(e.into()));
|
||||||
|
}
|
||||||
|
|
||||||
|
// validate uri
|
||||||
|
let uri = &self.head.uri;
|
||||||
|
if uri.host().is_none() {
|
||||||
|
return Either::A(err(InvalidUrl::MissingHost.into()));
|
||||||
|
} else if uri.scheme_part().is_none() {
|
||||||
|
return Either::A(err(InvalidUrl::MissingScheme.into()));
|
||||||
|
} else if let Some(scheme) = uri.scheme_part() {
|
||||||
|
match scheme.as_str() {
|
||||||
|
"http" | "ws" | "https" | "wss" => (),
|
||||||
|
_ => return Either::A(err(InvalidUrl::UnknownScheme.into())),
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
return Either::A(err(InvalidUrl::UnknownScheme.into()));
|
||||||
|
}
|
||||||
|
|
||||||
|
// set default headers
|
||||||
|
let mut slf = if self.default_headers {
|
||||||
|
// set request host header
|
||||||
|
if let Some(host) = self.head.uri.host() {
|
||||||
|
if !self.head.headers.contains_key(header::HOST) {
|
||||||
|
let mut wrt = BytesMut::with_capacity(host.len() + 5).writer();
|
||||||
|
|
||||||
|
let _ = match self.head.uri.port_u16() {
|
||||||
|
None | Some(80) | Some(443) => write!(wrt, "{}", host),
|
||||||
|
Some(port) => write!(wrt, "{}:{}", host, port),
|
||||||
|
};
|
||||||
|
|
||||||
|
match wrt.get_mut().take().freeze().try_into() {
|
||||||
|
Ok(value) => {
|
||||||
|
self.head.headers.insert(header::HOST, value);
|
||||||
|
}
|
||||||
|
Err(e) => return Either::A(err(HttpError::from(e).into())),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// user agent
|
||||||
|
self.set_header_if_none(
|
||||||
|
header::USER_AGENT,
|
||||||
|
concat!("awc/", env!("CARGO_PKG_VERSION")),
|
||||||
|
)
|
||||||
|
} else {
|
||||||
|
self
|
||||||
|
};
|
||||||
|
|
||||||
|
#[allow(unused_mut)]
|
||||||
|
let mut head = slf.head;
|
||||||
|
|
||||||
|
#[cfg(feature = "cookies")]
|
||||||
|
{
|
||||||
|
use percent_encoding::{percent_encode, USERINFO_ENCODE_SET};
|
||||||
|
use std::fmt::Write;
|
||||||
|
|
||||||
|
// set cookies
|
||||||
|
if let Some(ref mut jar) = slf.cookies {
|
||||||
|
let mut cookie = String::new();
|
||||||
|
for c in jar.delta() {
|
||||||
|
let name = percent_encode(c.name().as_bytes(), USERINFO_ENCODE_SET);
|
||||||
|
let value =
|
||||||
|
percent_encode(c.value().as_bytes(), USERINFO_ENCODE_SET);
|
||||||
|
let _ = write!(&mut cookie, "; {}={}", name, value);
|
||||||
|
}
|
||||||
|
head.headers.insert(
|
||||||
|
header::COOKIE,
|
||||||
|
HeaderValue::from_str(&cookie.as_str()[2..]).unwrap(),
|
||||||
|
);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// origin
|
||||||
|
if let Some(origin) = slf.origin.take() {
|
||||||
|
head.headers.insert(header::ORIGIN, origin);
|
||||||
|
}
|
||||||
|
|
||||||
|
head.set_connection_type(ConnectionType::Upgrade);
|
||||||
|
head.headers
|
||||||
|
.insert(header::UPGRADE, HeaderValue::from_static("websocket"));
|
||||||
|
head.headers.insert(
|
||||||
|
header::SEC_WEBSOCKET_VERSION,
|
||||||
|
HeaderValue::from_static("13"),
|
||||||
|
);
|
||||||
|
|
||||||
|
if let Some(protocols) = slf.protocols.take() {
|
||||||
|
head.headers.insert(
|
||||||
|
header::SEC_WEBSOCKET_PROTOCOL,
|
||||||
|
HeaderValue::try_from(protocols.as_str()).unwrap(),
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
// Generate a random key for the `Sec-WebSocket-Key` header.
|
||||||
|
// a base64-encoded (see Section 4 of [RFC4648]) value that,
|
||||||
|
// when decoded, is 16 bytes in length (RFC 6455)
|
||||||
|
let sec_key: [u8; 16] = rand::random();
|
||||||
|
let key = base64::encode(&sec_key);
|
||||||
|
|
||||||
|
head.headers.insert(
|
||||||
|
header::SEC_WEBSOCKET_KEY,
|
||||||
|
HeaderValue::try_from(key.as_str()).unwrap(),
|
||||||
|
);
|
||||||
|
|
||||||
|
let max_size = slf.max_size;
|
||||||
|
let server_mode = slf.server_mode;
|
||||||
|
|
||||||
|
let fut = slf
|
||||||
|
.connector
|
||||||
|
.borrow_mut()
|
||||||
|
.open_tunnel(head)
|
||||||
|
.from_err()
|
||||||
|
.and_then(move |(head, framed)| {
|
||||||
|
// verify response
|
||||||
|
if head.status != StatusCode::SWITCHING_PROTOCOLS {
|
||||||
|
return Err(WsClientError::InvalidResponseStatus(head.status));
|
||||||
|
}
|
||||||
|
// Check for "UPGRADE" to websocket header
|
||||||
|
let has_hdr = if let Some(hdr) = head.headers.get(header::UPGRADE) {
|
||||||
|
if let Ok(s) = hdr.to_str() {
|
||||||
|
s.to_ascii_lowercase().contains("websocket")
|
||||||
|
} else {
|
||||||
|
false
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
false
|
||||||
|
};
|
||||||
|
if !has_hdr {
|
||||||
|
log::trace!("Invalid upgrade header");
|
||||||
|
return Err(WsClientError::InvalidUpgradeHeader);
|
||||||
|
}
|
||||||
|
// Check for "CONNECTION" header
|
||||||
|
if let Some(conn) = head.headers.get(header::CONNECTION) {
|
||||||
|
if let Ok(s) = conn.to_str() {
|
||||||
|
if !s.to_ascii_lowercase().contains("upgrade") {
|
||||||
|
log::trace!("Invalid connection header: {}", s);
|
||||||
|
return Err(WsClientError::InvalidConnectionHeader(
|
||||||
|
conn.clone(),
|
||||||
|
));
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
log::trace!("Invalid connection header: {:?}", conn);
|
||||||
|
return Err(WsClientError::InvalidConnectionHeader(conn.clone()));
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
log::trace!("Missing connection header");
|
||||||
|
return Err(WsClientError::MissingConnectionHeader);
|
||||||
|
}
|
||||||
|
|
||||||
|
if let Some(hdr_key) = head.headers.get(header::SEC_WEBSOCKET_ACCEPT) {
|
||||||
|
let encoded = ws::hash_key(key.as_ref());
|
||||||
|
if hdr_key.as_bytes() != encoded.as_bytes() {
|
||||||
|
log::trace!(
|
||||||
|
"Invalid challenge response: expected: {} received: {:?}",
|
||||||
|
encoded,
|
||||||
|
key
|
||||||
|
);
|
||||||
|
return Err(WsClientError::InvalidChallengeResponse(
|
||||||
|
encoded,
|
||||||
|
hdr_key.clone(),
|
||||||
|
));
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
log::trace!("Missing SEC-WEBSOCKET-ACCEPT header");
|
||||||
|
return Err(WsClientError::MissingWebSocketAcceptHeader);
|
||||||
|
};
|
||||||
|
|
||||||
|
// response and ws framed
|
||||||
|
Ok((
|
||||||
|
ClientResponse::new(head, Payload::None),
|
||||||
|
framed.map_codec(|_| {
|
||||||
|
if server_mode {
|
||||||
|
ws::Codec::new().max_size(max_size)
|
||||||
|
} else {
|
||||||
|
ws::Codec::new().max_size(max_size).client_mode()
|
||||||
|
}
|
||||||
|
}),
|
||||||
|
))
|
||||||
|
});
|
||||||
|
Either::B(fut)
|
||||||
|
}
|
||||||
|
}
|
@ -393,8 +393,8 @@ pub mod client {
|
|||||||
//! }));
|
//! }));
|
||||||
//! }
|
//! }
|
||||||
//! ```
|
//! ```
|
||||||
pub use awc::{
|
pub use awc::error::{
|
||||||
test, Client, ClientBuilder, ClientRequest, ClientResponse, ConnectError,
|
ConnectError, InvalidUrl, PayloadError, SendRequestError, WsClientError,
|
||||||
InvalidUrl, PayloadError, SendRequestError,
|
|
||||||
};
|
};
|
||||||
|
pub use awc::{test, Client, ClientBuilder, ClientRequest, ClientResponse};
|
||||||
}
|
}
|
||||||
|
@ -7,7 +7,6 @@ use actix_http::client::Connector;
|
|||||||
use actix_http::ws;
|
use actix_http::ws;
|
||||||
use actix_rt::{Runtime, System};
|
use actix_rt::{Runtime, System};
|
||||||
use actix_server::{Server, StreamServiceFactory};
|
use actix_server::{Server, StreamServiceFactory};
|
||||||
use actix_service::Service;
|
|
||||||
use awc::{Client, ClientRequest};
|
use awc::{Client, ClientRequest};
|
||||||
use futures::future::{lazy, Future};
|
use futures::future::{lazy, Future};
|
||||||
use http::Method;
|
use http::Method;
|
||||||
@ -205,16 +204,19 @@ impl TestServerRuntime {
|
|||||||
pub fn ws_at(
|
pub fn ws_at(
|
||||||
&mut self,
|
&mut self,
|
||||||
path: &str,
|
path: &str,
|
||||||
) -> Result<Framed<impl AsyncRead + AsyncWrite, ws::Codec>, ws::ClientError> {
|
) -> Result<Framed<impl AsyncRead + AsyncWrite, ws::Codec>, awc::error::WsClientError>
|
||||||
|
{
|
||||||
let url = self.url(path);
|
let url = self.url(path);
|
||||||
|
let connect = self.client.ws(url).connect();
|
||||||
self.rt
|
self.rt
|
||||||
.block_on(lazy(|| ws::Client::default().call(ws::Connect::new(url))))
|
.block_on(lazy(move || connect.map(|(_, framed)| framed)))
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Connect to a websocket server
|
/// Connect to a websocket server
|
||||||
pub fn ws(
|
pub fn ws(
|
||||||
&mut self,
|
&mut self,
|
||||||
) -> Result<Framed<impl AsyncRead + AsyncWrite, ws::Codec>, ws::ClientError> {
|
) -> Result<Framed<impl AsyncRead + AsyncWrite, ws::Codec>, awc::error::WsClientError>
|
||||||
|
{
|
||||||
self.ws_at("/")
|
self.ws_at("/")
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user