1
0
mirror of https://github.com/fafhrd91/actix-web synced 2024-11-25 08:52:42 +01:00
actix-web/src/server/h2.rs

399 lines
14 KiB
Rust
Raw Normal View History

2018-02-26 23:33:56 +01:00
#![cfg_attr(feature = "cargo-clippy", allow(redundant_field_names))]
use std::{io, cmp, mem};
2017-12-08 18:24:05 +01:00
use std::rc::Rc;
2017-11-02 20:54:09 +01:00
use std::io::{Read, Write};
2017-11-04 21:24:57 +01:00
use std::time::Duration;
use std::net::SocketAddr;
use std::collections::VecDeque;
2017-11-04 21:24:57 +01:00
use actix::Arbiter;
use http::request::Parts;
2017-11-04 17:07:44 +01:00
use http2::{Reason, RecvStream};
2018-01-03 04:37:33 +01:00
use http2::server::{self, Connection, Handshake, SendResponse};
2017-11-02 20:54:09 +01:00
use bytes::{Buf, Bytes};
use futures::{Async, Poll, Future, Stream};
2017-11-02 20:54:09 +01:00
use tokio_io::{AsyncRead, AsyncWrite};
2017-11-04 21:24:57 +01:00
use tokio_core::reactor::Timeout;
2017-11-02 20:54:09 +01:00
2017-11-25 07:15:52 +01:00
use pipeline::Pipeline;
2017-11-16 07:06:28 +01:00
use error::PayloadError;
2018-03-02 04:12:59 +01:00
use httpcodes::HttpNotFound;
use httpmessage::HttpMessage;
2017-11-25 07:15:52 +01:00
use httprequest::HttpRequest;
use payload::{Payload, PayloadWriter, PayloadStatus};
2018-01-12 03:35:05 +01:00
use super::h2writer::H2Writer;
2018-01-12 03:41:33 +01:00
use super::encoding::PayloadType;
2018-01-12 03:35:05 +01:00
use super::settings::WorkerSettings;
use super::{HttpHandler, HttpHandlerTask, Writer};
2018-01-12 03:35:05 +01:00
bitflags! {
struct Flags: u8 {
const DISCONNECTED = 0b0000_0010;
}
}
/// HTTP/2 Transport
2018-02-27 05:07:22 +01:00
pub(crate)
struct Http2<T, H>
where T: AsyncRead + AsyncWrite + 'static, H: 'static
{
flags: Flags,
2017-12-14 06:38:47 +01:00
settings: Rc<WorkerSettings<H>>,
addr: Option<SocketAddr>,
state: State<IoWrapper<T>>,
tasks: VecDeque<Entry>,
2017-11-04 21:24:57 +01:00
keepalive_timer: Option<Timeout>,
}
enum State<T: AsyncRead + AsyncWrite> {
Handshake(Handshake<T, Bytes>),
2018-01-12 01:22:27 +01:00
Connection(Connection<T, Bytes>),
Empty,
}
impl<T, H> Http2<T, H>
where T: AsyncRead + AsyncWrite + 'static,
H: HttpHandler + 'static
{
2018-02-26 23:33:56 +01:00
pub fn new(settings: Rc<WorkerSettings<H>>,
io: T,
addr: Option<SocketAddr>, buf: Bytes) -> Self
2017-12-08 07:54:44 +01:00
{
2017-12-08 18:24:05 +01:00
Http2{ flags: Flags::empty(),
tasks: VecDeque::new(),
state: State::Handshake(
2018-01-03 04:37:33 +01:00
server::handshake(IoWrapper{unread: Some(buf), inner: io})),
2017-11-04 21:24:57 +01:00
keepalive_timer: None,
2018-02-26 23:33:56 +01:00
addr,
settings,
2017-11-04 21:24:57 +01:00
}
}
2018-01-04 07:43:44 +01:00
pub(crate) fn shutdown(&mut self) {
self.state = State::Empty;
self.tasks.clear();
self.keepalive_timer.take();
}
2017-12-29 01:25:47 +01:00
pub fn settings(&self) -> &WorkerSettings<H> {
self.settings.as_ref()
}
pub fn poll(&mut self) -> Poll<(), ()> {
2017-11-04 17:07:44 +01:00
// server
2018-01-12 01:22:27 +01:00
if let State::Connection(ref mut conn) = self.state {
2017-11-04 21:24:57 +01:00
// keep-alive timer
if let Some(ref mut timeout) = self.keepalive_timer {
match timeout.poll() {
2017-11-09 04:31:25 +01:00
Ok(Async::Ready(_)) => {
trace!("Keep-alive timeout, close connection");
return Ok(Async::Ready(()))
}
2017-11-04 21:24:57 +01:00
Ok(Async::NotReady) => (),
Err(_) => unreachable!(),
}
}
2017-11-04 17:07:44 +01:00
loop {
let mut not_ready = true;
// check in-flight connections
for item in &mut self.tasks {
// read payload
item.poll_payload();
if !item.flags.contains(EntryFlags::EOF) {
let retry = item.payload.need_read() == PayloadStatus::Read;
2018-02-27 05:07:22 +01:00
loop {
match item.task.poll_io(&mut item.stream) {
Ok(Async::Ready(ready)) => {
if ready {
item.flags.insert(
EntryFlags::EOF | EntryFlags::FINISHED);
} else {
item.flags.insert(EntryFlags::EOF);
2018-02-27 05:07:22 +01:00
}
not_ready = false;
},
Ok(Async::NotReady) => {
if item.payload.need_read() == PayloadStatus::Read
&& !retry
{
2018-02-27 05:07:22 +01:00
continue
}
},
Err(err) => {
error!("Unhandled error: {}", err);
item.flags.insert(
EntryFlags::EOF |
EntryFlags::ERROR |
EntryFlags::WRITE_DONE);
2018-02-27 05:07:22 +01:00
item.stream.reset(Reason::INTERNAL_ERROR);
2017-11-04 17:07:44 +01:00
}
}
2018-02-27 05:07:22 +01:00
break
2017-11-04 17:07:44 +01:00
}
} else if !item.flags.contains(EntryFlags::FINISHED) {
2017-11-04 17:07:44 +01:00
match item.task.poll() {
Ok(Async::NotReady) => (),
Ok(Async::Ready(_)) => {
not_ready = false;
item.flags.insert(EntryFlags::FINISHED);
2017-11-04 17:07:44 +01:00
},
2017-11-25 18:28:25 +01:00
Err(err) => {
item.flags.insert(
EntryFlags::ERROR | EntryFlags::WRITE_DONE |
EntryFlags::FINISHED);
2017-11-25 18:28:25 +01:00
error!("Unhandled error: {}", err);
2017-11-04 17:07:44 +01:00
}
}
}
if !item.flags.contains(EntryFlags::WRITE_DONE) {
match item.stream.poll_completed(false) {
Ok(Async::NotReady) => (),
Ok(Async::Ready(_)) => {
not_ready = false;
item.flags.insert(EntryFlags::WRITE_DONE);
}
Err(_err) => {
item.flags.insert(EntryFlags::ERROR);
}
}
}
2017-11-04 17:07:44 +01:00
}
// cleanup finished tasks
while !self.tasks.is_empty() {
if self.tasks[0].flags.contains(EntryFlags::EOF) &&
self.tasks[0].flags.contains(EntryFlags::WRITE_DONE) ||
self.tasks[0].flags.contains(EntryFlags::ERROR)
{
2017-11-04 17:07:44 +01:00
self.tasks.pop_front();
} else {
break
}
}
// get request
if !self.flags.contains(Flags::DISCONNECTED) {
2018-01-12 01:22:27 +01:00
match conn.poll() {
2017-11-04 17:07:44 +01:00
Ok(Async::Ready(None)) => {
not_ready = false;
self.flags.insert(Flags::DISCONNECTED);
2017-11-04 17:07:44 +01:00
for entry in &mut self.tasks {
entry.task.disconnected()
}
},
2017-11-18 17:50:07 +01:00
Ok(Async::Ready(Some((req, resp)))) => {
2017-11-04 17:07:44 +01:00
not_ready = false;
let (parts, body) = req.into_parts();
// stop keepalive timer
2017-11-04 21:24:57 +01:00
self.keepalive_timer.take();
self.tasks.push_back(
2017-12-14 06:38:47 +01:00
Entry::new(parts, body, resp, self.addr, &self.settings));
2017-11-04 17:07:44 +01:00
}
2017-11-04 21:24:57 +01:00
Ok(Async::NotReady) => {
// start keep-alive timer
2017-12-14 06:38:47 +01:00
if self.tasks.is_empty() {
if self.settings.keep_alive_enabled() {
let keep_alive = self.settings.keep_alive();
2017-12-14 06:38:47 +01:00
if keep_alive > 0 && self.keepalive_timer.is_none() {
trace!("Start keep-alive timer");
let mut timeout = Timeout::new(
2017-12-14 07:36:28 +01:00
Duration::new(keep_alive, 0),
2017-12-14 06:38:47 +01:00
Arbiter::handle()).unwrap();
// register timeout
let _ = timeout.poll();
self.keepalive_timer = Some(timeout);
}
} else {
// keep-alive disable, drop connection
2018-01-12 01:22:27 +01:00
return conn.poll_close().map_err(
|e| error!("Error during connection close: {}", e))
2017-12-14 06:38:47 +01:00
}
} else {
// keep-alive unset, rely on operating system
return Ok(Async::NotReady)
2017-11-04 21:24:57 +01:00
}
}
Err(err) => {
trace!("Connection error: {}", err);
self.flags.insert(Flags::DISCONNECTED);
2017-11-04 21:24:57 +01:00
for entry in &mut self.tasks {
entry.task.disconnected()
}
self.keepalive_timer.take();
},
2017-11-04 17:07:44 +01:00
}
}
if not_ready {
if self.tasks.is_empty() && self.flags.contains(Flags::DISCONNECTED) {
2018-01-12 01:22:27 +01:00
return conn.poll_close().map_err(
|e| error!("Error during connection close: {}", e))
2017-11-04 17:07:44 +01:00
} else {
return Ok(Async::NotReady)
}
}
}
}
// handshake
self.state = if let State::Handshake(ref mut handshake) = self.state {
match handshake.poll() {
2018-01-12 01:22:27 +01:00
Ok(Async::Ready(conn)) => {
State::Connection(conn)
},
Ok(Async::NotReady) =>
return Ok(Async::NotReady),
Err(err) => {
trace!("Error handling connection: {}", err);
return Err(())
}
}
} else {
mem::replace(&mut self.state, State::Empty)
};
2017-11-04 17:07:44 +01:00
self.poll()
}
}
bitflags! {
struct EntryFlags: u8 {
const EOF = 0b0000_0001;
const REOF = 0b0000_0010;
const ERROR = 0b0000_0100;
const FINISHED = 0b0000_1000;
const WRITE_DONE = 0b0001_0000;
}
}
struct Entry {
2017-12-09 13:33:40 +01:00
task: Box<HttpHandlerTask>,
2017-11-07 01:23:58 +01:00
payload: PayloadType,
recv: RecvStream,
2017-11-04 17:07:44 +01:00
stream: H2Writer,
flags: EntryFlags,
}
impl Entry {
fn new<H>(parts: Parts,
recv: RecvStream,
2018-01-03 04:37:33 +01:00
resp: SendResponse<Bytes>,
addr: Option<SocketAddr>,
2017-12-14 06:38:47 +01:00
settings: &Rc<WorkerSettings<H>>) -> Entry
where H: HttpHandler + 'static
{
2017-11-27 04:00:57 +01:00
// Payload and Content-Encoding
let (psender, payload) = Payload::new(false);
2017-12-15 05:48:31 +01:00
let msg = settings.get_http_message();
msg.get_mut().uri = parts.uri;
msg.get_mut().method = parts.method;
msg.get_mut().version = parts.version;
msg.get_mut().headers = parts.headers;
msg.get_mut().payload = Some(payload);
msg.get_mut().addr = addr;
2017-11-06 18:35:52 +01:00
2017-12-15 05:48:31 +01:00
let mut req = HttpRequest::from_message(msg);
2017-11-25 07:15:52 +01:00
// Payload sender
let psender = PayloadType::new(req.headers(), psender);
// start request processing
let mut task = None;
2017-12-26 18:00:45 +01:00
for h in settings.handlers().iter_mut() {
2017-11-29 22:53:52 +01:00
req = match h.handle(req) {
Ok(t) => {
task = Some(t);
break
},
Err(req) => req,
}
}
2018-03-02 04:12:59 +01:00
Entry {task: task.unwrap_or_else(|| Pipeline::error(HttpNotFound)),
2017-11-07 01:23:58 +01:00
payload: psender,
2017-12-15 05:48:31 +01:00
stream: H2Writer::new(resp, settings.get_shared_bytes()),
flags: EntryFlags::empty(),
2018-02-26 23:33:56 +01:00
recv,
2017-11-04 17:07:44 +01:00
}
}
fn poll_payload(&mut self) {
if !self.flags.contains(EntryFlags::REOF) {
if self.payload.need_read() == PayloadStatus::Read {
2018-02-27 05:07:22 +01:00
if let Err(err) = self.recv.release_capacity().release_capacity(32_768) {
self.payload.set_error(PayloadError::Http2(err))
}
} else if let Err(err) = self.recv.release_capacity().release_capacity(0) {
self.payload.set_error(PayloadError::Http2(err))
}
2017-11-04 17:07:44 +01:00
match self.recv.poll() {
Ok(Async::Ready(Some(chunk))) => {
2017-11-07 01:23:58 +01:00
self.payload.feed_data(chunk);
2017-11-04 17:07:44 +01:00
},
Ok(Async::Ready(None)) => {
self.flags.insert(EntryFlags::REOF);
2017-11-04 17:07:44 +01:00
},
Ok(Async::NotReady) => (),
Err(err) => {
2017-11-07 01:23:58 +01:00
self.payload.set_error(PayloadError::Http2(err))
2017-11-04 17:07:44 +01:00
}
}
}
}
}
2017-11-02 20:54:09 +01:00
struct IoWrapper<T> {
unread: Option<Bytes>,
inner: T,
}
impl<T: Read> Read for IoWrapper<T> {
fn read(&mut self, buf: &mut [u8]) -> io::Result<usize> {
if let Some(mut bytes) = self.unread.take() {
let size = cmp::min(buf.len(), bytes.len());
buf[..size].copy_from_slice(&bytes[..size]);
if bytes.len() > size {
bytes.split_to(size);
2017-11-02 20:54:09 +01:00
self.unread = Some(bytes);
}
Ok(size)
} else {
self.inner.read(buf)
}
}
}
impl<T: Write> Write for IoWrapper<T> {
fn write(&mut self, buf: &[u8]) -> io::Result<usize> {
self.inner.write(buf)
}
fn flush(&mut self) -> io::Result<()> {
self.inner.flush()
}
}
impl<T: AsyncRead + 'static> AsyncRead for IoWrapper<T> {
unsafe fn prepare_uninitialized_buffer(&self, buf: &mut [u8]) -> bool {
self.inner.prepare_uninitialized_buffer(buf)
}
}
impl<T: AsyncWrite + 'static> AsyncWrite for IoWrapper<T> {
fn shutdown(&mut self) -> Poll<(), io::Error> {
self.inner.shutdown()
}
fn write_buf<B: Buf>(&mut self, buf: &mut B) -> Poll<usize, io::Error> {
self.inner.write_buf(buf)
}
}