2019-03-13 22:41:40 +01:00
|
|
|
use std::fmt;
|
|
|
|
use std::marker::PhantomData;
|
2018-11-12 08:12:54 +01:00
|
|
|
use std::time::Duration;
|
|
|
|
|
2018-12-11 03:08:33 +01:00
|
|
|
use actix_codec::{AsyncRead, AsyncWrite};
|
2019-03-13 23:57:33 +01:00
|
|
|
use actix_connect::{
|
|
|
|
default_connector, Connect as TcpConnect, Connection as TcpConnection,
|
|
|
|
};
|
2019-03-13 22:41:40 +01:00
|
|
|
use actix_service::{apply_fn, Service, ServiceExt};
|
2018-12-11 03:08:33 +01:00
|
|
|
use actix_utils::timeout::{TimeoutError, TimeoutService};
|
2019-03-13 22:41:40 +01:00
|
|
|
use tokio_tcp::TcpStream;
|
2018-11-12 08:12:54 +01:00
|
|
|
|
|
|
|
use super::connect::Connect;
|
2019-01-29 19:34:27 +01:00
|
|
|
use super::connection::Connection;
|
2019-03-13 22:41:40 +01:00
|
|
|
use super::error::ConnectError;
|
2019-01-29 05:41:09 +01:00
|
|
|
use super::pool::{ConnectionPool, Protocol};
|
2018-11-12 08:12:54 +01:00
|
|
|
|
|
|
|
#[cfg(feature = "ssl")]
|
2019-02-06 20:44:15 +01:00
|
|
|
use openssl::ssl::SslConnector;
|
2018-11-12 08:12:54 +01:00
|
|
|
|
|
|
|
#[cfg(not(feature = "ssl"))]
|
|
|
|
type SslConnector = ();
|
|
|
|
|
|
|
|
/// Http client connector builde instance.
|
|
|
|
/// `Connector` type uses builder-like pattern for connector service construction.
|
2019-03-13 22:41:40 +01:00
|
|
|
pub struct Connector<T, U> {
|
|
|
|
connector: T,
|
2018-11-12 08:12:54 +01:00
|
|
|
timeout: Duration,
|
|
|
|
conn_lifetime: Duration,
|
|
|
|
conn_keep_alive: Duration,
|
|
|
|
disconnect_timeout: Duration,
|
|
|
|
limit: usize,
|
|
|
|
#[allow(dead_code)]
|
2019-03-13 22:41:40 +01:00
|
|
|
ssl: SslConnector,
|
|
|
|
_t: PhantomData<U>,
|
2018-11-12 08:12:54 +01:00
|
|
|
}
|
|
|
|
|
2019-03-13 22:41:40 +01:00
|
|
|
impl Connector<(), ()> {
|
|
|
|
pub fn new() -> Connector<
|
|
|
|
impl Service<
|
2019-03-13 23:57:33 +01:00
|
|
|
Request = TcpConnect<Connect>,
|
|
|
|
Response = TcpConnection<Connect, TcpStream>,
|
2019-03-13 22:41:40 +01:00
|
|
|
Error = actix_connect::ConnectError,
|
|
|
|
> + Clone,
|
|
|
|
TcpStream,
|
|
|
|
> {
|
|
|
|
let ssl = {
|
2018-11-12 08:12:54 +01:00
|
|
|
#[cfg(feature = "ssl")]
|
|
|
|
{
|
2019-01-29 05:41:09 +01:00
|
|
|
use log::error;
|
2019-02-06 20:44:15 +01:00
|
|
|
use openssl::ssl::{SslConnector, SslMethod};
|
|
|
|
|
2019-01-29 05:41:09 +01:00
|
|
|
let mut ssl = SslConnector::builder(SslMethod::tls()).unwrap();
|
|
|
|
let _ = ssl
|
|
|
|
.set_alpn_protos(b"\x02h2\x08http/1.1")
|
|
|
|
.map_err(|e| error!("Can not set alpn protocol: {:?}", e));
|
|
|
|
ssl.build()
|
2018-11-12 08:12:54 +01:00
|
|
|
}
|
|
|
|
#[cfg(not(feature = "ssl"))]
|
2019-01-29 19:14:00 +01:00
|
|
|
{}
|
2018-11-12 08:12:54 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
Connector {
|
2019-03-13 22:41:40 +01:00
|
|
|
ssl,
|
|
|
|
connector: default_connector(),
|
2018-11-12 08:12:54 +01:00
|
|
|
timeout: Duration::from_secs(1),
|
|
|
|
conn_lifetime: Duration::from_secs(75),
|
|
|
|
conn_keep_alive: Duration::from_secs(15),
|
|
|
|
disconnect_timeout: Duration::from_millis(3000),
|
|
|
|
limit: 100,
|
2019-03-13 22:41:40 +01:00
|
|
|
_t: PhantomData,
|
2018-11-12 08:12:54 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-03-13 22:41:40 +01:00
|
|
|
impl<T, U> Connector<T, U> {
|
|
|
|
/// Use custom connector.
|
|
|
|
pub fn connector<T1, U1>(self, connector: T1) -> Connector<T1, U1>
|
|
|
|
where
|
|
|
|
U1: AsyncRead + AsyncWrite + fmt::Debug,
|
|
|
|
T1: Service<
|
2019-03-13 23:57:33 +01:00
|
|
|
Request = TcpConnect<Connect>,
|
|
|
|
Response = TcpConnection<Connect, U1>,
|
2019-03-13 22:41:40 +01:00
|
|
|
Error = actix_connect::ConnectError,
|
|
|
|
> + Clone,
|
|
|
|
{
|
|
|
|
Connector {
|
|
|
|
connector,
|
|
|
|
timeout: self.timeout,
|
|
|
|
conn_lifetime: self.conn_lifetime,
|
|
|
|
conn_keep_alive: self.conn_keep_alive,
|
|
|
|
disconnect_timeout: self.disconnect_timeout,
|
|
|
|
limit: self.limit,
|
|
|
|
ssl: self.ssl,
|
|
|
|
_t: PhantomData,
|
|
|
|
}
|
2018-11-12 08:12:54 +01:00
|
|
|
}
|
2019-03-13 22:41:40 +01:00
|
|
|
}
|
2018-11-12 08:12:54 +01:00
|
|
|
|
2019-03-13 22:41:40 +01:00
|
|
|
impl<T, U> Connector<T, U>
|
|
|
|
where
|
|
|
|
U: AsyncRead + AsyncWrite + fmt::Debug + 'static,
|
|
|
|
T: Service<
|
2019-03-13 23:57:33 +01:00
|
|
|
Request = TcpConnect<Connect>,
|
|
|
|
Response = TcpConnection<Connect, U>,
|
2019-03-13 22:41:40 +01:00
|
|
|
Error = actix_connect::ConnectError,
|
|
|
|
> + Clone,
|
|
|
|
{
|
2018-11-12 08:12:54 +01:00
|
|
|
/// Connection timeout, i.e. max time to connect to remote host including dns name resolution.
|
|
|
|
/// Set to 1 second by default.
|
|
|
|
pub fn timeout(mut self, timeout: Duration) -> Self {
|
|
|
|
self.timeout = timeout;
|
|
|
|
self
|
|
|
|
}
|
|
|
|
|
|
|
|
#[cfg(feature = "ssl")]
|
|
|
|
/// Use custom `SslConnector` instance.
|
|
|
|
pub fn ssl(mut self, connector: SslConnector) -> Self {
|
2019-03-13 22:41:40 +01:00
|
|
|
self.ssl = connector;
|
2018-11-12 08:12:54 +01:00
|
|
|
self
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Set total number of simultaneous connections per type of scheme.
|
|
|
|
///
|
|
|
|
/// If limit is 0, the connector has no limit.
|
|
|
|
/// The default limit size is 100.
|
|
|
|
pub fn limit(mut self, limit: usize) -> Self {
|
|
|
|
self.limit = limit;
|
|
|
|
self
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Set keep-alive period for opened connection.
|
|
|
|
///
|
|
|
|
/// Keep-alive period is the period between connection usage. If
|
|
|
|
/// the delay between repeated usages of the same connection
|
|
|
|
/// exceeds this period, the connection is closed.
|
|
|
|
/// Default keep-alive period is 15 seconds.
|
|
|
|
pub fn conn_keep_alive(mut self, dur: Duration) -> Self {
|
|
|
|
self.conn_keep_alive = dur;
|
|
|
|
self
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Set max lifetime period for connection.
|
|
|
|
///
|
|
|
|
/// Connection lifetime is max lifetime of any opened connection
|
|
|
|
/// until it is closed regardless of keep-alive period.
|
|
|
|
/// Default lifetime period is 75 seconds.
|
|
|
|
pub fn conn_lifetime(mut self, dur: Duration) -> Self {
|
|
|
|
self.conn_lifetime = dur;
|
|
|
|
self
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Set server connection disconnect timeout in milliseconds.
|
|
|
|
///
|
|
|
|
/// Defines a timeout for disconnect connection. If a disconnect procedure does not complete
|
|
|
|
/// within this time, the socket get dropped. This timeout affects only secure connections.
|
|
|
|
///
|
|
|
|
/// To disable timeout set value to 0.
|
|
|
|
///
|
|
|
|
/// By default disconnect timeout is set to 3000 milliseconds.
|
|
|
|
pub fn disconnect_timeout(mut self, dur: Duration) -> Self {
|
|
|
|
self.disconnect_timeout = dur;
|
|
|
|
self
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Finish configuration process and create connector service.
|
|
|
|
pub fn service(
|
|
|
|
self,
|
2019-03-13 22:41:40 +01:00
|
|
|
) -> impl Service<Request = Connect, Response = impl Connection, Error = ConnectError>
|
|
|
|
+ Clone {
|
2018-11-12 08:12:54 +01:00
|
|
|
#[cfg(not(feature = "ssl"))]
|
|
|
|
{
|
2019-03-05 04:51:09 +01:00
|
|
|
let connector = TimeoutService::new(
|
|
|
|
self.timeout,
|
2019-03-13 23:57:33 +01:00
|
|
|
apply_fn(self.connector, |msg: Connect, srv| {
|
2019-03-14 00:56:11 +01:00
|
|
|
srv.call(actix_connect::Connect::with(msg))
|
2019-03-13 23:57:33 +01:00
|
|
|
})
|
|
|
|
.map(|stream| (stream.into_parts().0, Protocol::Http1)),
|
2018-12-06 23:32:52 +01:00
|
|
|
)
|
|
|
|
.map_err(|e| match e {
|
2018-11-12 08:12:54 +01:00
|
|
|
TimeoutError::Service(e) => e,
|
2019-03-13 22:41:40 +01:00
|
|
|
TimeoutError::Timeout => ConnectError::Timeout,
|
2018-11-12 08:12:54 +01:00
|
|
|
});
|
|
|
|
|
|
|
|
connect_impl::InnerConnector {
|
|
|
|
tcp_pool: ConnectionPool::new(
|
|
|
|
connector,
|
|
|
|
self.conn_lifetime,
|
|
|
|
self.conn_keep_alive,
|
|
|
|
None,
|
|
|
|
self.limit,
|
|
|
|
),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#[cfg(feature = "ssl")]
|
|
|
|
{
|
2019-02-06 20:44:15 +01:00
|
|
|
const H2: &[u8] = b"h2";
|
2019-03-13 22:41:40 +01:00
|
|
|
use actix_connect::ssl::OpensslConnector;
|
2019-02-06 20:44:15 +01:00
|
|
|
|
2019-03-05 04:51:09 +01:00
|
|
|
let ssl_service = TimeoutService::new(
|
|
|
|
self.timeout,
|
2019-03-13 22:41:40 +01:00
|
|
|
apply_fn(self.connector.clone(), |msg: Connect, srv| {
|
2019-03-14 00:56:11 +01:00
|
|
|
srv.call(actix_connect::Connect::with(msg))
|
2019-03-13 22:41:40 +01:00
|
|
|
})
|
|
|
|
.map_err(ConnectError::from)
|
|
|
|
.and_then(
|
|
|
|
OpensslConnector::service(self.ssl)
|
|
|
|
.map_err(ConnectError::from)
|
|
|
|
.map(|stream| {
|
|
|
|
let sock = stream.into_parts().0;
|
|
|
|
let h2 = sock
|
|
|
|
.get_ref()
|
|
|
|
.ssl()
|
|
|
|
.selected_alpn_protocol()
|
|
|
|
.map(|protos| protos.windows(2).any(|w| w == H2))
|
|
|
|
.unwrap_or(false);
|
|
|
|
if h2 {
|
|
|
|
(sock, Protocol::Http2)
|
|
|
|
} else {
|
|
|
|
(sock, Protocol::Http1)
|
|
|
|
}
|
|
|
|
}),
|
|
|
|
),
|
2018-12-06 23:32:52 +01:00
|
|
|
)
|
|
|
|
.map_err(|e| match e {
|
2018-11-12 08:12:54 +01:00
|
|
|
TimeoutError::Service(e) => e,
|
2019-03-13 22:41:40 +01:00
|
|
|
TimeoutError::Timeout => ConnectError::Timeout,
|
2018-11-12 08:12:54 +01:00
|
|
|
});
|
|
|
|
|
2019-03-05 04:51:09 +01:00
|
|
|
let tcp_service = TimeoutService::new(
|
|
|
|
self.timeout,
|
2019-03-13 22:41:40 +01:00
|
|
|
apply_fn(self.connector.clone(), |msg: Connect, srv| {
|
2019-03-14 00:56:11 +01:00
|
|
|
srv.call(actix_connect::Connect::with(msg))
|
2019-03-13 22:41:40 +01:00
|
|
|
})
|
|
|
|
.map_err(ConnectError::from)
|
|
|
|
.map(|stream| (stream.into_parts().0, Protocol::Http1)),
|
2018-12-06 23:32:52 +01:00
|
|
|
)
|
|
|
|
.map_err(|e| match e {
|
2018-11-12 08:12:54 +01:00
|
|
|
TimeoutError::Service(e) => e,
|
2019-03-13 22:41:40 +01:00
|
|
|
TimeoutError::Timeout => ConnectError::Timeout,
|
2018-11-12 08:12:54 +01:00
|
|
|
});
|
|
|
|
|
|
|
|
connect_impl::InnerConnector {
|
|
|
|
tcp_pool: ConnectionPool::new(
|
|
|
|
tcp_service,
|
|
|
|
self.conn_lifetime,
|
|
|
|
self.conn_keep_alive,
|
|
|
|
None,
|
|
|
|
self.limit,
|
|
|
|
),
|
|
|
|
ssl_pool: ConnectionPool::new(
|
|
|
|
ssl_service,
|
|
|
|
self.conn_lifetime,
|
|
|
|
self.conn_keep_alive,
|
|
|
|
Some(self.disconnect_timeout),
|
|
|
|
self.limit,
|
|
|
|
),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[cfg(not(feature = "ssl"))]
|
|
|
|
mod connect_impl {
|
2019-01-29 05:41:09 +01:00
|
|
|
use futures::future::{err, Either, FutureResult};
|
|
|
|
use futures::Poll;
|
|
|
|
|
2018-11-12 08:12:54 +01:00
|
|
|
use super::*;
|
2019-01-29 05:41:09 +01:00
|
|
|
use crate::client::connection::IoConnection;
|
2018-11-12 08:12:54 +01:00
|
|
|
|
|
|
|
pub(crate) struct InnerConnector<T, Io>
|
|
|
|
where
|
|
|
|
Io: AsyncRead + AsyncWrite + 'static,
|
2019-03-13 23:57:33 +01:00
|
|
|
T: Service<Request = Connect, Response = (Io, Protocol), Error = ConnectorError>,
|
2018-11-12 08:12:54 +01:00
|
|
|
{
|
|
|
|
pub(crate) tcp_pool: ConnectionPool<T, Io>,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl<T, Io> Clone for InnerConnector<T, Io>
|
|
|
|
where
|
|
|
|
Io: AsyncRead + AsyncWrite + 'static,
|
2019-03-13 22:41:40 +01:00
|
|
|
T: Service<Request = Connect, Response = (Io, Protocol), Error = ConnectError>
|
|
|
|
+ Clone,
|
2018-11-12 08:12:54 +01:00
|
|
|
{
|
|
|
|
fn clone(&self) -> Self {
|
|
|
|
InnerConnector {
|
|
|
|
tcp_pool: self.tcp_pool.clone(),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-03-09 16:37:23 +01:00
|
|
|
impl<T, Io> Service for InnerConnector<T, Io>
|
2018-11-12 08:12:54 +01:00
|
|
|
where
|
|
|
|
Io: AsyncRead + AsyncWrite + 'static,
|
2019-03-13 22:41:40 +01:00
|
|
|
T: Service<Request = Connect, Response = (Io, Protocol), Error = ConnectorError>,
|
2018-11-12 08:12:54 +01:00
|
|
|
{
|
2019-03-09 16:37:23 +01:00
|
|
|
type Request = Connect;
|
2018-11-15 20:10:23 +01:00
|
|
|
type Response = IoConnection<Io>;
|
2018-11-12 08:12:54 +01:00
|
|
|
type Error = ConnectorError;
|
|
|
|
type Future = Either<
|
2019-03-09 16:37:23 +01:00
|
|
|
<ConnectionPool<T, Io> as Service>::Future,
|
2018-11-15 20:10:23 +01:00
|
|
|
FutureResult<IoConnection<Io>, ConnectorError>,
|
2018-11-12 08:12:54 +01:00
|
|
|
>;
|
|
|
|
|
|
|
|
fn poll_ready(&mut self) -> Poll<(), Self::Error> {
|
|
|
|
self.tcp_pool.poll_ready()
|
|
|
|
}
|
|
|
|
|
2018-11-30 20:57:57 +01:00
|
|
|
fn call(&mut self, req: Connect) -> Self::Future {
|
2018-11-12 08:12:54 +01:00
|
|
|
if req.is_secure() {
|
2019-03-13 22:41:40 +01:00
|
|
|
Either::B(err(ConnectError::SslIsNotSupported))
|
2018-11-12 08:12:54 +01:00
|
|
|
} else if let Err(e) = req.validate() {
|
|
|
|
Either::B(err(e))
|
|
|
|
} else {
|
|
|
|
Either::A(self.tcp_pool.call(req))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[cfg(feature = "ssl")]
|
|
|
|
mod connect_impl {
|
|
|
|
use std::marker::PhantomData;
|
|
|
|
|
2019-03-13 22:41:40 +01:00
|
|
|
use futures::future::{Either, FutureResult};
|
2018-11-12 08:12:54 +01:00
|
|
|
use futures::{Async, Future, Poll};
|
|
|
|
|
|
|
|
use super::*;
|
2019-01-29 05:41:09 +01:00
|
|
|
use crate::client::connection::EitherConnection;
|
2018-11-12 08:12:54 +01:00
|
|
|
|
|
|
|
pub(crate) struct InnerConnector<T1, T2, Io1, Io2>
|
|
|
|
where
|
|
|
|
Io1: AsyncRead + AsyncWrite + 'static,
|
|
|
|
Io2: AsyncRead + AsyncWrite + 'static,
|
2019-03-13 22:41:40 +01:00
|
|
|
T1: Service<Request = Connect, Response = (Io1, Protocol), Error = ConnectError>,
|
|
|
|
T2: Service<Request = Connect, Response = (Io2, Protocol), Error = ConnectError>,
|
2018-11-12 08:12:54 +01:00
|
|
|
{
|
|
|
|
pub(crate) tcp_pool: ConnectionPool<T1, Io1>,
|
|
|
|
pub(crate) ssl_pool: ConnectionPool<T2, Io2>,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl<T1, T2, Io1, Io2> Clone for InnerConnector<T1, T2, Io1, Io2>
|
|
|
|
where
|
|
|
|
Io1: AsyncRead + AsyncWrite + 'static,
|
|
|
|
Io2: AsyncRead + AsyncWrite + 'static,
|
2019-03-13 22:41:40 +01:00
|
|
|
T1: Service<Request = Connect, Response = (Io1, Protocol), Error = ConnectError>
|
|
|
|
+ Clone,
|
|
|
|
T2: Service<Request = Connect, Response = (Io2, Protocol), Error = ConnectError>
|
|
|
|
+ Clone,
|
2018-11-12 08:12:54 +01:00
|
|
|
{
|
|
|
|
fn clone(&self) -> Self {
|
|
|
|
InnerConnector {
|
|
|
|
tcp_pool: self.tcp_pool.clone(),
|
|
|
|
ssl_pool: self.ssl_pool.clone(),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-03-09 16:37:23 +01:00
|
|
|
impl<T1, T2, Io1, Io2> Service for InnerConnector<T1, T2, Io1, Io2>
|
2018-11-12 08:12:54 +01:00
|
|
|
where
|
|
|
|
Io1: AsyncRead + AsyncWrite + 'static,
|
|
|
|
Io2: AsyncRead + AsyncWrite + 'static,
|
2019-03-13 22:41:40 +01:00
|
|
|
T1: Service<Request = Connect, Response = (Io1, Protocol), Error = ConnectError>,
|
|
|
|
T2: Service<Request = Connect, Response = (Io2, Protocol), Error = ConnectError>,
|
2018-11-12 08:12:54 +01:00
|
|
|
{
|
2019-03-09 16:37:23 +01:00
|
|
|
type Request = Connect;
|
2019-01-29 05:41:09 +01:00
|
|
|
type Response = EitherConnection<Io1, Io2>;
|
2019-03-13 22:41:40 +01:00
|
|
|
type Error = ConnectError;
|
2018-11-12 08:12:54 +01:00
|
|
|
type Future = Either<
|
|
|
|
FutureResult<Self::Response, Self::Error>,
|
|
|
|
Either<
|
|
|
|
InnerConnectorResponseA<T1, Io1, Io2>,
|
|
|
|
InnerConnectorResponseB<T2, Io1, Io2>,
|
|
|
|
>,
|
|
|
|
>;
|
|
|
|
|
|
|
|
fn poll_ready(&mut self) -> Poll<(), Self::Error> {
|
|
|
|
self.tcp_pool.poll_ready()
|
|
|
|
}
|
|
|
|
|
2018-11-30 20:57:57 +01:00
|
|
|
fn call(&mut self, req: Connect) -> Self::Future {
|
2019-03-13 22:41:40 +01:00
|
|
|
if req.is_secure() {
|
2018-11-15 20:10:23 +01:00
|
|
|
Either::B(Either::B(InnerConnectorResponseB {
|
|
|
|
fut: self.ssl_pool.call(req),
|
2018-11-12 08:12:54 +01:00
|
|
|
_t: PhantomData,
|
|
|
|
}))
|
|
|
|
} else {
|
2018-11-15 20:10:23 +01:00
|
|
|
Either::B(Either::A(InnerConnectorResponseA {
|
|
|
|
fut: self.tcp_pool.call(req),
|
2018-11-12 08:12:54 +01:00
|
|
|
_t: PhantomData,
|
|
|
|
}))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pub(crate) struct InnerConnectorResponseA<T, Io1, Io2>
|
|
|
|
where
|
|
|
|
Io1: AsyncRead + AsyncWrite + 'static,
|
2019-03-13 22:41:40 +01:00
|
|
|
T: Service<Request = Connect, Response = (Io1, Protocol), Error = ConnectError>,
|
2018-11-12 08:12:54 +01:00
|
|
|
{
|
2019-03-09 16:37:23 +01:00
|
|
|
fut: <ConnectionPool<T, Io1> as Service>::Future,
|
2018-11-12 08:12:54 +01:00
|
|
|
_t: PhantomData<Io2>,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl<T, Io1, Io2> Future for InnerConnectorResponseA<T, Io1, Io2>
|
|
|
|
where
|
2019-03-13 22:41:40 +01:00
|
|
|
T: Service<Request = Connect, Response = (Io1, Protocol), Error = ConnectError>,
|
2018-11-12 08:12:54 +01:00
|
|
|
Io1: AsyncRead + AsyncWrite + 'static,
|
|
|
|
Io2: AsyncRead + AsyncWrite + 'static,
|
|
|
|
{
|
2019-01-29 05:41:09 +01:00
|
|
|
type Item = EitherConnection<Io1, Io2>;
|
2019-03-13 22:41:40 +01:00
|
|
|
type Error = ConnectError;
|
2018-11-12 08:12:54 +01:00
|
|
|
|
|
|
|
fn poll(&mut self) -> Poll<Self::Item, Self::Error> {
|
|
|
|
match self.fut.poll()? {
|
|
|
|
Async::NotReady => Ok(Async::NotReady),
|
2019-01-29 05:41:09 +01:00
|
|
|
Async::Ready(res) => Ok(Async::Ready(EitherConnection::A(res))),
|
2018-11-12 08:12:54 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pub(crate) struct InnerConnectorResponseB<T, Io1, Io2>
|
|
|
|
where
|
|
|
|
Io2: AsyncRead + AsyncWrite + 'static,
|
2019-03-13 22:41:40 +01:00
|
|
|
T: Service<Request = Connect, Response = (Io2, Protocol), Error = ConnectError>,
|
2018-11-12 08:12:54 +01:00
|
|
|
{
|
2019-03-09 16:37:23 +01:00
|
|
|
fut: <ConnectionPool<T, Io2> as Service>::Future,
|
2018-11-12 08:12:54 +01:00
|
|
|
_t: PhantomData<Io1>,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl<T, Io1, Io2> Future for InnerConnectorResponseB<T, Io1, Io2>
|
|
|
|
where
|
2019-03-13 22:41:40 +01:00
|
|
|
T: Service<Request = Connect, Response = (Io2, Protocol), Error = ConnectError>,
|
2018-11-12 08:12:54 +01:00
|
|
|
Io1: AsyncRead + AsyncWrite + 'static,
|
|
|
|
Io2: AsyncRead + AsyncWrite + 'static,
|
|
|
|
{
|
2019-01-29 05:41:09 +01:00
|
|
|
type Item = EitherConnection<Io1, Io2>;
|
2019-03-13 22:41:40 +01:00
|
|
|
type Error = ConnectError;
|
2018-11-12 08:12:54 +01:00
|
|
|
|
|
|
|
fn poll(&mut self) -> Poll<Self::Item, Self::Error> {
|
|
|
|
match self.fut.poll()? {
|
|
|
|
Async::NotReady => Ok(Async::NotReady),
|
2019-01-29 05:41:09 +01:00
|
|
|
Async::Ready(res) => Ok(Async::Ready(EitherConnection::B(res))),
|
2018-11-12 08:12:54 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|