1
0
mirror of https://github.com/fafhrd91/actix-web synced 2024-12-02 19:32:24 +01:00
actix-web/actix-http/src/config.rs

409 lines
11 KiB
Rust
Raw Normal View History

use std::cell::Cell;
2019-03-26 19:54:35 +01:00
use std::fmt::Write;
use std::rc::Rc;
2019-12-05 18:35:43 +01:00
use std::time::Duration;
2019-12-02 12:33:11 +01:00
use std::{fmt, net};
2019-03-26 19:54:35 +01:00
2021-02-12 22:52:58 +01:00
use actix_rt::{
task::JoinHandle,
time::{interval, sleep_until, Instant, Sleep},
};
2019-03-26 19:54:35 +01:00
use bytes::BytesMut;
Upgrade `time` to 0.2.5 (#1254) * Use `OffsetDateTime` instead of `PrimitiveDateTime` * Parse time strings with `PrimitiveDateTime::parse` instead of `OffsetDateTime::parse` * Remove unused `time` dependency from actix-multipart * Fix a few errors with time related tests from the `time` upgrade * Implement logic to convert a RFC 850 two-digit year into a full length year, and organize time parsing related functions * Upgrade `time` to 0.2.2 * Correctly parse C's asctime time format using time 0.2's new format patterns * Update CHANGES.md * Use `time` without any of its deprecated functions * Enforce a UTC time offset when converting an `OffsetDateTime` into a Header value * Use the more readable version of `Duration::seconds(0)`, `Duration::zero()` * Remove unneeded conversion of time::Duration to std::time::Duration * Use `OffsetDateTime::as_seconds_f64` instead of manually calculating the amount of seconds from nanoseconds * Replace a few additional instances of `Duration::seconds(0)` with `Duration::zero()` * Truncate any nanoseconds from a supplied `Duration` within `Cookie::set_max_age` to ensure two Cookies with the same amount whole seconds equate to one another * Fix the actix-http::cookie::do_not_panic_on_large_max_ages test * Convert `Cookie::max_age` and `Cookie::expires` examples to `time` 0.2 Mainly minor changes. Type inference can be used alongside the new `time::parse` method, such that the type doesn't need to be specified. This will be useful if a refactoring takes place that changes the type. There are also new macros, which are used where possible. One change that is not immediately obvious, in `HttpDate`, there was an unnecessary conditional. As the time crate allows for negative durations (and can perform arithmetic with such), the if/else can be removed entirely. Time v0.2.3 also has some bug fixes, which is why I am not using a more general v0.2 in Cargo.toml. v0.2.3 has been yanked, as it was backwards imcompatible. This version reverts the breaking change, while still supporting rustc back to 1.34.0. * Add missing `time::offset` macro import * Fix type confusion when using `time::parse` followed by `using_offset` * Update `time` to 0.2.5 * Update CHANGES.md Co-authored-by: Jacob Pratt <the.z.cuber@gmail.com>
2020-01-28 12:44:22 +01:00
use time::OffsetDateTime;
2019-03-26 19:54:35 +01:00
2021-01-15 06:38:50 +01:00
/// "Sun, 06 Nov 1994 08:49:37 GMT".len()
2019-03-26 19:54:35 +01:00
const DATE_VALUE_LENGTH: usize = 29;
#[derive(Debug, PartialEq, Clone, Copy)]
/// Server keep-alive setting
pub enum KeepAlive {
/// Keep alive in seconds
Timeout(usize),
/// Rely on OS to shutdown tcp connection
2019-03-26 19:54:35 +01:00
Os,
/// Disabled
Disabled,
}
impl From<usize> for KeepAlive {
fn from(keepalive: usize) -> Self {
KeepAlive::Timeout(keepalive)
}
}
impl From<Option<usize>> for KeepAlive {
fn from(keepalive: Option<usize>) -> Self {
if let Some(keepalive) = keepalive {
KeepAlive::Timeout(keepalive)
} else {
KeepAlive::Disabled
}
}
}
/// Http service configuration
pub struct ServiceConfig(Rc<Inner>);
struct Inner {
keep_alive: Option<Duration>,
client_timeout: u64,
client_disconnect: u64,
ka_enabled: bool,
2019-12-02 12:33:11 +01:00
secure: bool,
local_addr: Option<std::net::SocketAddr>,
2021-02-12 22:52:58 +01:00
date_service: DateService,
2019-03-26 19:54:35 +01:00
}
impl Clone for ServiceConfig {
fn clone(&self) -> Self {
ServiceConfig(self.0.clone())
}
}
impl Default for ServiceConfig {
fn default() -> Self {
2019-12-02 12:33:11 +01:00
Self::new(KeepAlive::Timeout(5), 0, 0, false, None)
2019-03-26 19:54:35 +01:00
}
}
impl ServiceConfig {
/// Create instance of `ServiceConfig`
pub fn new(
keep_alive: KeepAlive,
client_timeout: u64,
client_disconnect: u64,
2019-12-02 12:33:11 +01:00
secure: bool,
local_addr: Option<net::SocketAddr>,
2019-03-26 19:54:35 +01:00
) -> ServiceConfig {
let (keep_alive, ka_enabled) = match keep_alive {
KeepAlive::Timeout(val) => (val as u64, true),
KeepAlive::Os => (0, true),
KeepAlive::Disabled => (0, false),
};
let keep_alive = if ka_enabled && keep_alive > 0 {
Some(Duration::from_secs(keep_alive))
} else {
None
};
ServiceConfig(Rc::new(Inner {
keep_alive,
ka_enabled,
client_timeout,
client_disconnect,
2019-12-02 12:33:11 +01:00
secure,
local_addr,
2021-02-12 22:52:58 +01:00
date_service: DateService::new(),
2019-03-26 19:54:35 +01:00
}))
}
2021-02-11 23:39:54 +01:00
/// Returns true if connection is secure (HTTPS)
2019-12-02 12:33:11 +01:00
#[inline]
pub fn secure(&self) -> bool {
self.0.secure
}
/// Returns the local address that this server is bound to.
2021-07-12 17:55:24 +02:00
///
/// Returns `None` for connections via UDS (Unix Domain Socket).
2021-02-11 23:39:54 +01:00
#[inline]
2019-12-02 12:33:11 +01:00
pub fn local_addr(&self) -> Option<net::SocketAddr> {
self.0.local_addr
}
2019-03-26 19:54:35 +01:00
/// Keep alive duration if configured.
2021-02-11 23:39:54 +01:00
#[inline]
2019-03-26 19:54:35 +01:00
pub fn keep_alive(&self) -> Option<Duration> {
self.0.keep_alive
}
2020-04-21 05:09:35 +02:00
/// Return state of connection keep-alive functionality
2021-02-11 23:39:54 +01:00
#[inline]
2019-03-26 19:54:35 +01:00
pub fn keep_alive_enabled(&self) -> bool {
self.0.ka_enabled
}
/// Client timeout for first request.
2021-02-11 23:39:54 +01:00
#[inline]
pub fn client_timer(&self) -> Option<Sleep> {
let delay_time = self.0.client_timeout;
if delay_time != 0 {
Some(sleep_until(self.now() + Duration::from_millis(delay_time)))
2019-03-26 19:54:35 +01:00
} else {
None
}
}
/// Client timeout for first request.
pub fn client_timer_expire(&self) -> Option<Instant> {
let delay = self.0.client_timeout;
if delay != 0 {
Some(self.now() + Duration::from_millis(delay))
2019-03-26 19:54:35 +01:00
} else {
None
}
}
/// Client disconnect timer
pub fn client_disconnect_timer(&self) -> Option<Instant> {
let delay = self.0.client_disconnect;
if delay != 0 {
Some(self.now() + Duration::from_millis(delay))
2019-03-26 19:54:35 +01:00
} else {
None
}
}
/// Return keep-alive timer delay is configured.
#[inline]
pub fn keep_alive_timer(&self) -> Option<Sleep> {
self.keep_alive().map(|ka| sleep_until(self.now() + ka))
2019-03-26 19:54:35 +01:00
}
/// Keep-alive expire time
pub fn keep_alive_expire(&self) -> Option<Instant> {
self.keep_alive().map(|ka| self.now() + ka)
2019-03-26 19:54:35 +01:00
}
#[inline]
pub(crate) fn now(&self) -> Instant {
2021-02-12 22:52:58 +01:00
self.0.date_service.now()
2019-03-26 19:54:35 +01:00
}
2019-05-14 17:48:11 +02:00
#[doc(hidden)]
pub fn set_date(&self, dst: &mut BytesMut) {
2019-03-26 19:54:35 +01:00
let mut buf: [u8; 39] = [0; 39];
buf[..6].copy_from_slice(b"date: ");
2019-07-18 13:37:41 +02:00
self.0
2021-02-12 22:52:58 +01:00
.date_service
2019-07-18 13:37:41 +02:00
.set_date(|date| buf[6..35].copy_from_slice(&date.bytes));
2019-03-26 19:54:35 +01:00
buf[35..].copy_from_slice(b"\r\n\r\n");
dst.extend_from_slice(&buf);
}
pub(crate) fn set_date_header(&self, dst: &mut BytesMut) {
2019-07-18 13:37:41 +02:00
self.0
2021-02-12 22:52:58 +01:00
.date_service
2019-07-18 13:37:41 +02:00
.set_date(|date| dst.extend_from_slice(&date.bytes));
2019-03-26 19:54:35 +01:00
}
}
#[derive(Copy, Clone)]
2019-03-26 19:54:35 +01:00
struct Date {
bytes: [u8; DATE_VALUE_LENGTH],
pos: usize,
}
impl Date {
fn new() -> Date {
let mut date = Date {
bytes: [0; DATE_VALUE_LENGTH],
pos: 0,
};
date.update();
date
}
2019-03-26 19:54:35 +01:00
fn update(&mut self) {
self.pos = 0;
2020-02-27 03:10:55 +01:00
write!(
self,
"{}",
OffsetDateTime::now_utc().format("%a, %d %b %Y %H:%M:%S GMT")
2020-02-27 03:10:55 +01:00
)
.unwrap();
2019-03-26 19:54:35 +01:00
}
}
impl fmt::Write for Date {
fn write_str(&mut self, s: &str) -> fmt::Result {
let len = s.len();
self.bytes[self.pos..self.pos + len].copy_from_slice(s.as_bytes());
self.pos += len;
Ok(())
}
}
2021-02-12 22:52:58 +01:00
/// Service for update Date and Instant periodically at 500 millis interval.
struct DateService {
current: Rc<Cell<(Date, Instant)>>,
handle: JoinHandle<()>,
}
2019-03-26 19:54:35 +01:00
2021-02-12 22:52:58 +01:00
impl Drop for DateService {
fn drop(&mut self) {
// stop the timer update async task on drop.
self.handle.abort();
}
2019-03-26 19:54:35 +01:00
}
2021-02-12 22:52:58 +01:00
impl DateService {
2019-03-26 19:54:35 +01:00
fn new() -> Self {
2021-02-12 22:52:58 +01:00
// shared date and timer for DateService and update async task.
let current = Rc::new(Cell::new((Date::new(), Instant::now())));
let current_clone = Rc::clone(&current);
// spawn an async task sleep for 500 milli and update current date/timer in a loop.
// handle is used to stop the task on DateService drop.
let handle = actix_rt::spawn(async move {
#[cfg(test)]
let _notify = notify_on_drop::NotifyOnDrop::new();
let mut interval = interval(Duration::from_millis(500));
loop {
let now = interval.tick().await;
let date = Date::new();
current_clone.set((date, now));
}
});
DateService { current, handle }
2019-03-26 19:54:35 +01:00
}
2021-02-12 22:52:58 +01:00
fn now(&self) -> Instant {
self.current.get().1
2019-03-26 19:54:35 +01:00
}
2021-02-12 22:52:58 +01:00
fn set_date<F: FnMut(&Date)>(&self, mut f: F) {
f(&self.current.get().0);
2019-03-26 19:54:35 +01:00
}
}
2021-02-12 22:52:58 +01:00
// TODO: move to a util module for testing all spawn handle drop style tasks.
#[cfg(test)]
2021-02-13 05:23:37 +01:00
/// Test Module for checking the drop state of certain async tasks that are spawned
/// with `actix_rt::spawn`
///
/// The target task must explicitly generate `NotifyOnDrop` when spawn the task
2021-02-12 22:52:58 +01:00
mod notify_on_drop {
2021-02-13 05:23:37 +01:00
use std::cell::RefCell;
2019-03-26 19:54:35 +01:00
2021-02-13 05:23:37 +01:00
thread_local! {
static NOTIFY_DROPPED: RefCell<Option<bool>> = RefCell::new(None);
}
2019-03-26 19:54:35 +01:00
2021-02-13 05:23:37 +01:00
/// Check if the spawned task is dropped.
///
/// # Panic:
///
/// When there was no `NotifyOnDrop` instance on current thread
2021-02-12 22:52:58 +01:00
pub(crate) fn is_dropped() -> bool {
2021-02-13 05:23:37 +01:00
NOTIFY_DROPPED.with(|bool| {
bool.borrow()
.expect("No NotifyOnDrop existed on current thread")
})
2019-03-26 19:54:35 +01:00
}
2021-02-12 22:52:58 +01:00
pub(crate) struct NotifyOnDrop;
impl NotifyOnDrop {
2021-02-13 05:23:37 +01:00
/// # Panic:
///
/// When construct multiple instances on any given thread.
2021-02-12 22:52:58 +01:00
pub(crate) fn new() -> Self {
2021-02-13 05:23:37 +01:00
NOTIFY_DROPPED.with(|bool| {
let mut bool = bool.borrow_mut();
if bool.is_some() {
panic!("NotifyOnDrop existed on current thread");
} else {
*bool = Some(false);
}
});
2021-02-12 22:52:58 +01:00
NotifyOnDrop
}
2019-03-26 19:54:35 +01:00
}
2021-02-12 22:52:58 +01:00
impl Drop for NotifyOnDrop {
fn drop(&mut self) {
2021-02-13 05:23:37 +01:00
NOTIFY_DROPPED.with(|bool| {
if let Some(b) = bool.borrow_mut().as_mut() {
*b = true;
}
});
2021-02-12 22:52:58 +01:00
}
2019-03-26 19:54:35 +01:00
}
}
#[cfg(test)]
mod tests {
use super::*;
2021-07-10 00:57:21 +02:00
use actix_rt::{task::yield_now, time::sleep};
2021-02-12 22:52:58 +01:00
#[actix_rt::test]
async fn test_date_service_update() {
let settings = ServiceConfig::new(KeepAlive::Os, 0, 0, false, None);
yield_now().await;
let mut buf1 = BytesMut::with_capacity(DATE_VALUE_LENGTH + 10);
settings.set_date(&mut buf1);
let now1 = settings.now();
sleep_until(Instant::now() + Duration::from_secs(2)).await;
yield_now().await;
let now2 = settings.now();
let mut buf2 = BytesMut::with_capacity(DATE_VALUE_LENGTH + 10);
settings.set_date(&mut buf2);
assert_ne!(now1, now2);
assert_ne!(buf1, buf2);
drop(settings);
2021-07-10 00:57:21 +02:00
// Ensure the task will drop eventually
let mut times = 0;
while !notify_on_drop::is_dropped() {
sleep(Duration::from_millis(100)).await;
times += 1;
assert!(times < 10, "Timeout waiting for task drop");
}
2021-02-12 22:52:58 +01:00
}
#[actix_rt::test]
async fn test_date_service_drop() {
let service = Rc::new(DateService::new());
// yield so date service have a chance to register the spawned timer update task.
yield_now().await;
let clone1 = service.clone();
let clone2 = service.clone();
let clone3 = service.clone();
drop(clone1);
assert!(!notify_on_drop::is_dropped());
2021-02-12 22:52:58 +01:00
drop(clone2);
assert!(!notify_on_drop::is_dropped());
2021-02-12 22:52:58 +01:00
drop(clone3);
assert!(!notify_on_drop::is_dropped());
2021-02-12 22:52:58 +01:00
drop(service);
2021-07-10 00:57:21 +02:00
// Ensure the task will drop eventually
let mut times = 0;
while !notify_on_drop::is_dropped() {
sleep(Duration::from_millis(100)).await;
times += 1;
assert!(times < 10, "Timeout waiting for task drop");
}
}
2019-03-26 19:54:35 +01:00
#[test]
fn test_date_len() {
assert_eq!(DATE_VALUE_LENGTH, "Sun, 06 Nov 1994 08:49:37 GMT".len());
}
2019-11-26 06:25:50 +01:00
#[actix_rt::test]
async fn test_date() {
2019-12-02 12:33:11 +01:00
let settings = ServiceConfig::new(KeepAlive::Os, 0, 0, false, None);
2019-11-26 06:25:50 +01:00
let mut buf1 = BytesMut::with_capacity(DATE_VALUE_LENGTH + 10);
settings.set_date(&mut buf1);
let mut buf2 = BytesMut::with_capacity(DATE_VALUE_LENGTH + 10);
settings.set_date(&mut buf2);
assert_eq!(buf1, buf2);
2019-03-26 19:54:35 +01:00
}
}