1
0
mirror of https://github.com/fafhrd91/actix-web synced 2024-11-28 01:52:57 +01:00
actix-web/actix-http/src/service.rs

887 lines
28 KiB
Rust
Raw Normal View History

2021-03-11 04:48:38 +01:00
use std::{
fmt,
future::Future,
marker::PhantomData,
net,
pin::Pin,
rc::Rc,
task::{Context, Poll},
};
2019-03-07 07:56:34 +01:00
2019-04-08 23:51:16 +02:00
use actix_codec::{AsyncRead, AsyncWrite, Framed};
2019-12-02 12:33:11 +01:00
use actix_rt::net::TcpStream;
2021-04-16 21:28:21 +02:00
use actix_service::{
fn_service, IntoServiceFactory, Service, ServiceFactory, ServiceFactoryExt as _,
};
use futures_core::{future::LocalBoxFuture, ready};
2021-12-04 20:40:47 +01:00
use pin_project_lite::pin_project;
2022-03-10 04:12:29 +01:00
use tracing::error;
2019-03-07 07:56:34 +01:00
2021-06-17 18:57:58 +02:00
use crate::{
2021-12-04 20:40:47 +01:00
body::{BoxBody, MessageBody},
2021-06-17 18:57:58 +02:00
builder::HttpServiceBuilder,
error::DispatchError,
2022-01-31 22:22:23 +01:00
h1, ConnectCallback, OnConnectData, Protocol, Request, Response, ServiceConfig,
2021-06-17 18:57:58 +02:00
};
2019-03-07 07:56:34 +01:00
/// A [`ServiceFactory`] for HTTP/1.1 and HTTP/2 connections.
///
/// Use [`build`](Self::build) to begin constructing service. Also see [`HttpServiceBuilder`].
///
/// # Automatic HTTP Version Selection
/// There are two ways to select the HTTP version of an incoming connection:
2023-07-02 02:09:15 +02:00
/// - One is to rely on the ALPN information that is provided when using TLS (HTTPS); both versions
/// are supported automatically when using either of the `.rustls()` or `.openssl()` finalizing
/// methods.
/// - The other is to read the first few bytes of the TCP stream. This is the only viable approach
/// for supporting H2C, which allows the HTTP/2 protocol to work over plaintext connections. Use
/// the `.tcp_auto_h2c()` finalizing method to enable this behavior.
///
/// # Examples
/// ```
/// # use std::convert::Infallible;
/// use actix_http::{HttpService, Request, Response, StatusCode};
///
/// // this service would constructed in an actix_server::Server
///
/// # actix_rt::System::new().block_on(async {
/// HttpService::build()
/// // the builder finalizing method, other finalizers would not return an `HttpService`
/// .finish(|_req: Request| async move {
/// Ok::<_, Infallible>(
/// Response::build(StatusCode::OK).body("Hello!")
/// )
/// })
/// // the service finalizing method method
/// // you can use `.tcp_auto_h2c()`, `.rustls()`, or `.openssl()` instead of `.tcp()`
/// .tcp();
/// # })
/// ```
pub struct HttpService<T, S, B, X = h1::ExpectHandler, U = h1::UpgradeHandler> {
2019-03-07 07:56:34 +01:00
srv: S,
cfg: ServiceConfig,
2019-04-06 01:46:44 +02:00
expect: X,
2019-04-08 23:51:16 +02:00
upgrade: Option<U>,
on_connect_ext: Option<Rc<ConnectCallback<T>>>,
2021-01-04 01:49:02 +01:00
_phantom: PhantomData<B>,
2019-03-07 07:56:34 +01:00
}
2019-12-02 12:33:11 +01:00
impl<T, S, B> HttpService<T, S, B>
2019-03-11 23:09:42 +01:00
where
S: ServiceFactory<Request, Config = ()>,
2021-12-04 20:40:47 +01:00
S::Error: Into<Response<BoxBody>> + 'static,
2019-04-06 01:46:44 +02:00
S::InitError: fmt::Debug,
2019-11-19 13:54:19 +01:00
S::Response: Into<Response<B>> + 'static,
<S::Service as Service<Request>>::Future: 'static,
2019-03-11 23:09:42 +01:00
B: MessageBody + 'static,
{
2022-01-31 18:30:34 +01:00
/// Constructs builder for `HttpService` instance.
2019-03-11 23:09:42 +01:00
pub fn build() -> HttpServiceBuilder<T, S> {
2022-01-31 18:30:34 +01:00
HttpServiceBuilder::default()
2019-03-11 23:09:42 +01:00
}
}
2019-12-02 12:33:11 +01:00
impl<T, S, B> HttpService<T, S, B>
2019-03-07 07:56:34 +01:00
where
S: ServiceFactory<Request, Config = ()>,
2021-12-04 20:40:47 +01:00
S::Error: Into<Response<BoxBody>> + 'static,
2019-04-06 01:46:44 +02:00
S::InitError: fmt::Debug,
2019-11-19 13:54:19 +01:00
S::Response: Into<Response<B>> + 'static,
<S::Service as Service<Request>>::Future: 'static,
2019-03-07 07:56:34 +01:00
B: MessageBody + 'static,
{
2022-01-31 18:30:34 +01:00
/// Constructs new `HttpService` instance from service with default config.
pub fn new<F: IntoServiceFactory<S, Request>>(service: F) -> Self {
2019-03-07 07:56:34 +01:00
HttpService {
2022-01-31 18:30:34 +01:00
cfg: ServiceConfig::default(),
srv: service.into_factory(),
2019-04-06 01:46:44 +02:00
expect: h1::ExpectHandler,
2019-04-08 23:51:16 +02:00
upgrade: None,
on_connect_ext: None,
2021-01-04 01:49:02 +01:00
_phantom: PhantomData,
}
}
2022-01-31 18:30:34 +01:00
/// Constructs new `HttpService` instance from config and service.
pub(crate) fn with_config<F: IntoServiceFactory<S, Request>>(
cfg: ServiceConfig,
service: F,
) -> Self {
HttpService {
cfg,
srv: service.into_factory(),
2019-04-06 01:46:44 +02:00
expect: h1::ExpectHandler,
2019-04-08 23:51:16 +02:00
upgrade: None,
on_connect_ext: None,
2021-01-04 01:49:02 +01:00
_phantom: PhantomData,
2019-03-07 07:56:34 +01:00
}
}
}
2019-12-02 12:33:11 +01:00
impl<T, S, B, X, U> HttpService<T, S, B, X, U>
2019-04-06 01:46:44 +02:00
where
S: ServiceFactory<Request, Config = ()>,
2021-12-04 20:40:47 +01:00
S::Error: Into<Response<BoxBody>> + 'static,
2019-04-06 01:46:44 +02:00
S::InitError: fmt::Debug,
2019-11-19 13:54:19 +01:00
S::Response: Into<Response<B>> + 'static,
<S::Service as Service<Request>>::Future: 'static,
2019-04-06 01:46:44 +02:00
B: MessageBody,
{
2022-01-31 18:30:34 +01:00
/// Sets service for `Expect: 100-Continue` handling.
2019-04-06 01:46:44 +02:00
///
2022-01-31 18:30:34 +01:00
/// An expect service is called with requests that contain an `Expect` header. A successful
/// response type is also a request which will be forwarded to the main service.
2019-12-02 12:33:11 +01:00
pub fn expect<X1>(self, expect: X1) -> HttpService<T, S, B, X1, U>
2019-04-06 01:46:44 +02:00
where
X1: ServiceFactory<Request, Config = (), Response = Request>,
2021-12-04 20:40:47 +01:00
X1::Error: Into<Response<BoxBody>>,
2019-04-08 23:51:16 +02:00
X1::InitError: fmt::Debug,
2019-04-06 01:46:44 +02:00
{
HttpService {
expect,
cfg: self.cfg,
srv: self.srv,
2019-04-08 23:51:16 +02:00
upgrade: self.upgrade,
on_connect_ext: self.on_connect_ext,
2021-01-04 01:49:02 +01:00
_phantom: PhantomData,
2019-04-08 23:51:16 +02:00
}
}
2022-01-31 18:30:34 +01:00
/// Sets service for custom `Connection: Upgrade` handling.
2019-04-08 23:51:16 +02:00
///
2022-01-31 18:30:34 +01:00
/// If service is provided then normal requests handling get halted and this service get called
/// with original request and framed object.
2019-12-02 12:33:11 +01:00
pub fn upgrade<U1>(self, upgrade: Option<U1>) -> HttpService<T, S, B, X, U1>
2019-04-08 23:51:16 +02:00
where
U1: ServiceFactory<(Request, Framed<T, h1::Codec>), Config = (), Response = ()>,
2019-04-08 23:51:16 +02:00
U1::Error: fmt::Display,
U1::InitError: fmt::Debug,
{
HttpService {
upgrade,
cfg: self.cfg,
srv: self.srv,
expect: self.expect,
on_connect_ext: self.on_connect_ext,
2021-01-04 01:49:02 +01:00
_phantom: PhantomData,
2019-04-06 01:46:44 +02:00
}
}
2019-06-28 10:34:26 +02:00
/// Set connect callback with mutable access to request data container.
pub(crate) fn on_connect_ext(mut self, f: Option<Rc<ConnectCallback<T>>>) -> Self {
self.on_connect_ext = f;
self
}
2019-04-06 01:46:44 +02:00
}
2019-12-02 12:33:11 +01:00
impl<S, B, X, U> HttpService<TcpStream, S, B, X, U>
2019-03-07 07:56:34 +01:00
where
S: ServiceFactory<Request, Config = ()>,
S::Future: 'static,
2021-12-04 20:40:47 +01:00
S::Error: Into<Response<BoxBody>> + 'static,
2019-04-06 01:46:44 +02:00
S::InitError: fmt::Debug,
2019-11-19 13:54:19 +01:00
S::Response: Into<Response<B>> + 'static,
<S::Service as Service<Request>>::Future: 'static,
2019-03-07 07:56:34 +01:00
B: MessageBody + 'static,
X: ServiceFactory<Request, Config = (), Response = Request>,
X::Future: 'static,
2021-12-04 20:40:47 +01:00
X::Error: Into<Response<BoxBody>>,
2019-04-06 01:46:44 +02:00
X::InitError: fmt::Debug,
2021-12-08 07:01:11 +01:00
U: ServiceFactory<(Request, Framed<TcpStream, h1::Codec>), Config = (), Response = ()>,
U::Future: 'static,
2021-12-04 20:40:47 +01:00
U::Error: fmt::Display + Into<Response<BoxBody>>,
2019-12-02 12:33:11 +01:00
U::InitError: fmt::Debug,
{
/// Creates TCP stream service from HTTP service.
///
/// The resulting service only supports HTTP/1.x.
2019-12-02 12:33:11 +01:00
pub fn tcp(
self,
2023-07-17 03:38:12 +02:00
) -> impl ServiceFactory<TcpStream, Config = (), Response = (), Error = DispatchError, InitError = ()>
{
2021-04-16 21:28:21 +02:00
fn_service(|io: TcpStream| async {
2019-12-02 12:33:11 +01:00
let peer_addr = io.peer_addr().ok();
Ok((io, Protocol::Http1, peer_addr))
})
.and_then(self)
}
/// Creates TCP stream service from HTTP service that automatically selects HTTP/1.x or HTTP/2
/// on plaintext connections.
#[cfg(feature = "http2")]
pub fn tcp_auto_h2c(
self,
2023-07-17 03:38:12 +02:00
) -> impl ServiceFactory<TcpStream, Config = (), Response = (), Error = DispatchError, InitError = ()>
{
fn_service(move |io: TcpStream| async move {
// subset of HTTP/2 preface defined by RFC 9113 §3.4
// this subset was chosen to maximize likelihood that peeking only once will allow us to
// reliably determine version or else it should fallback to h1 and fail quickly if data
// on the wire is junk
const H2_PREFACE: &[u8] = b"PRI * HTTP/2";
let mut buf = [0; 12];
io.peek(&mut buf).await?;
let proto = if buf == H2_PREFACE {
Protocol::Http2
} else {
Protocol::Http1
};
let peer_addr = io.peer_addr().ok();
Ok((io, proto, peer_addr))
2019-12-02 12:33:11 +01:00
})
.and_then(self)
}
}
/// Configuration options used when accepting TLS connection.
#[cfg(any(feature = "openssl", feature = "rustls-0_20", feature = "rustls-0_21"))]
#[derive(Debug, Default)]
pub struct TlsAcceptorConfig {
pub(crate) handshake_timeout: Option<std::time::Duration>,
}
#[cfg(any(feature = "openssl", feature = "rustls", feature = "rustls-0_21"))]
impl TlsAcceptorConfig {
/// Set TLS handshake timeout duration.
pub fn handshake_timeout(self, dur: std::time::Duration) -> Self {
Self {
handshake_timeout: Some(dur),
// ..self
}
}
}
2019-12-02 12:33:11 +01:00
#[cfg(feature = "openssl")]
mod openssl {
use actix_service::ServiceFactoryExt as _;
use actix_tls::accept::{
2021-11-30 15:12:04 +01:00
openssl::{
reexports::{Error as SslError, SslAcceptor},
Acceptor, TlsStream,
},
TlsError,
};
2019-12-02 12:33:11 +01:00
use super::*;
2021-02-27 20:57:09 +01:00
impl<S, B, X, U> HttpService<TlsStream<TcpStream>, S, B, X, U>
2019-12-02 12:33:11 +01:00
where
S: ServiceFactory<Request, Config = ()>,
S::Future: 'static,
2021-12-04 20:40:47 +01:00
S::Error: Into<Response<BoxBody>> + 'static,
2019-12-02 12:33:11 +01:00
S::InitError: fmt::Debug,
S::Response: Into<Response<B>> + 'static,
<S::Service as Service<Request>>::Future: 'static,
2019-12-02 12:33:11 +01:00
B: MessageBody + 'static,
X: ServiceFactory<Request, Config = (), Response = Request>,
X::Future: 'static,
2021-12-04 20:40:47 +01:00
X::Error: Into<Response<BoxBody>>,
2019-12-02 12:33:11 +01:00
X::InitError: fmt::Debug,
2019-12-02 12:33:11 +01:00
U: ServiceFactory<
2021-02-27 20:57:09 +01:00
(Request, Framed<TlsStream<TcpStream>, h1::Codec>),
2019-12-02 12:33:11 +01:00
Config = (),
Response = (),
>,
U::Future: 'static,
2021-12-04 20:40:47 +01:00
U::Error: fmt::Display + Into<Response<BoxBody>>,
2019-12-02 12:33:11 +01:00
U::InitError: fmt::Debug,
{
/// Create OpenSSL based service.
2019-12-02 12:33:11 +01:00
pub fn openssl(
self,
acceptor: SslAcceptor,
) -> impl ServiceFactory<
TcpStream,
2019-12-02 12:33:11 +01:00
Config = (),
Response = (),
Error = TlsError<SslError, DispatchError>,
2019-12-02 12:33:11 +01:00
InitError = (),
> {
self.openssl_with_config(acceptor, TlsAcceptorConfig::default())
}
/// Create OpenSSL based service with custom TLS acceptor configuration.
pub fn openssl_with_config(
self,
acceptor: SslAcceptor,
tls_acceptor_config: TlsAcceptorConfig,
) -> impl ServiceFactory<
TcpStream,
Config = (),
Response = (),
Error = TlsError<SslError, DispatchError>,
InitError = (),
> {
let mut acceptor = Acceptor::new(acceptor);
if let Some(handshake_timeout) = tls_acceptor_config.handshake_timeout {
acceptor.set_handshake_timeout(handshake_timeout);
}
acceptor
.map_init_err(|_| {
unreachable!("TLS acceptor service factory does not error on init")
})
.map_err(TlsError::into_service_error)
.map(|io: TlsStream<TcpStream>| {
2021-04-16 21:28:21 +02:00
let proto = if let Some(protos) = io.ssl().selected_alpn_protocol() {
if protos.windows(2).any(|window| window == b"h2") {
Protocol::Http2
} else {
Protocol::Http1
}
2019-12-02 12:33:11 +01:00
} else {
Protocol::Http1
2021-04-16 21:28:21 +02:00
};
2021-04-16 21:28:21 +02:00
let peer_addr = io.get_ref().peer_addr().ok();
(io, proto, peer_addr)
2021-04-16 21:28:21 +02:00
})
.and_then(self.map_err(TlsError::Service))
2019-12-02 12:33:11 +01:00
}
}
}
#[cfg(feature = "rustls-0_20")]
mod rustls_020 {
2019-12-05 18:35:43 +01:00
use std::io;
use actix_service::ServiceFactoryExt as _;
use actix_tls::accept::{
2021-11-30 15:12:04 +01:00
rustls::{reexports::ServerConfig, Acceptor, TlsStream},
TlsError,
};
use super::*;
2019-12-05 18:35:43 +01:00
impl<S, B, X, U> HttpService<TlsStream<TcpStream>, S, B, X, U>
where
S: ServiceFactory<Request, Config = ()>,
S::Future: 'static,
2021-12-04 20:40:47 +01:00
S::Error: Into<Response<BoxBody>> + 'static,
2019-12-05 18:35:43 +01:00
S::InitError: fmt::Debug,
S::Response: Into<Response<B>> + 'static,
<S::Service as Service<Request>>::Future: 'static,
2019-12-05 18:35:43 +01:00
B: MessageBody + 'static,
X: ServiceFactory<Request, Config = (), Response = Request>,
X::Future: 'static,
2021-12-04 20:40:47 +01:00
X::Error: Into<Response<BoxBody>>,
2019-12-05 18:35:43 +01:00
X::InitError: fmt::Debug,
2019-12-05 18:35:43 +01:00
U: ServiceFactory<
(Request, Framed<TlsStream<TcpStream>, h1::Codec>),
2019-12-05 18:35:43 +01:00
Config = (),
Response = (),
>,
U::Future: 'static,
2021-12-04 20:40:47 +01:00
U::Error: fmt::Display + Into<Response<BoxBody>>,
2019-12-05 18:35:43 +01:00
U::InitError: fmt::Debug,
{
/// Create Rustls based service.
2019-12-05 18:35:43 +01:00
pub fn rustls(
self,
config: ServerConfig,
) -> impl ServiceFactory<
TcpStream,
Config = (),
Response = (),
Error = TlsError<io::Error, DispatchError>,
InitError = (),
> {
self.rustls_with_config(config, TlsAcceptorConfig::default())
}
/// Create Rustls based service with custom TLS acceptor configuration.
pub fn rustls_with_config(
2019-12-05 18:35:43 +01:00
self,
mut config: ServerConfig,
tls_acceptor_config: TlsAcceptorConfig,
2019-12-05 18:35:43 +01:00
) -> impl ServiceFactory<
TcpStream,
2019-12-05 18:35:43 +01:00
Config = (),
Response = (),
2020-09-09 10:20:54 +02:00
Error = TlsError<io::Error, DispatchError>,
2019-12-05 18:35:43 +01:00
InitError = (),
> {
let mut protos = vec![b"h2".to_vec(), b"http/1.1".to_vec()];
protos.extend_from_slice(&config.alpn_protocols);
config.alpn_protocols = protos;
2019-12-05 18:35:43 +01:00
let mut acceptor = Acceptor::new(config);
if let Some(handshake_timeout) = tls_acceptor_config.handshake_timeout {
acceptor.set_handshake_timeout(handshake_timeout);
}
acceptor
.map_init_err(|_| {
unreachable!("TLS acceptor service factory does not error on init")
})
.map_err(TlsError::into_service_error)
.and_then(|io: TlsStream<TcpStream>| async {
let proto = if let Some(protos) = io.get_ref().1.alpn_protocol() {
if protos.windows(2).any(|window| window == b"h2") {
Protocol::Http2
} else {
Protocol::Http1
}
} else {
Protocol::Http1
};
let peer_addr = io.get_ref().0.peer_addr().ok();
Ok((io, proto, peer_addr))
})
.and_then(self.map_err(TlsError::Service))
}
}
}
#[cfg(feature = "rustls-0_21")]
mod rustls_021 {
use std::io;
use actix_service::ServiceFactoryExt as _;
use actix_tls::accept::{
rustls_0_21::{reexports::ServerConfig, Acceptor, TlsStream},
TlsError,
};
use super::*;
impl<S, B, X, U> HttpService<TlsStream<TcpStream>, S, B, X, U>
where
S: ServiceFactory<Request, Config = ()>,
S::Future: 'static,
S::Error: Into<Response<BoxBody>> + 'static,
S::InitError: fmt::Debug,
S::Response: Into<Response<B>> + 'static,
<S::Service as Service<Request>>::Future: 'static,
B: MessageBody + 'static,
X: ServiceFactory<Request, Config = (), Response = Request>,
X::Future: 'static,
X::Error: Into<Response<BoxBody>>,
X::InitError: fmt::Debug,
U: ServiceFactory<
(Request, Framed<TlsStream<TcpStream>, h1::Codec>),
Config = (),
Response = (),
>,
U::Future: 'static,
U::Error: fmt::Display + Into<Response<BoxBody>>,
U::InitError: fmt::Debug,
{
/// Create Rustls based service.
pub fn rustls_021(
self,
config: ServerConfig,
) -> impl ServiceFactory<
TcpStream,
Config = (),
Response = (),
Error = TlsError<io::Error, DispatchError>,
InitError = (),
> {
self.rustls_021_with_config(config, TlsAcceptorConfig::default())
}
/// Create Rustls based service with custom TLS acceptor configuration.
pub fn rustls_021_with_config(
self,
mut config: ServerConfig,
tls_acceptor_config: TlsAcceptorConfig,
) -> impl ServiceFactory<
TcpStream,
Config = (),
Response = (),
Error = TlsError<io::Error, DispatchError>,
InitError = (),
> {
let mut protos = vec![b"h2".to_vec(), b"http/1.1".to_vec()];
protos.extend_from_slice(&config.alpn_protocols);
config.alpn_protocols = protos;
let mut acceptor = Acceptor::new(config);
if let Some(handshake_timeout) = tls_acceptor_config.handshake_timeout {
acceptor.set_handshake_timeout(handshake_timeout);
}
acceptor
.map_init_err(|_| {
unreachable!("TLS acceptor service factory does not error on init")
})
.map_err(TlsError::into_service_error)
2021-04-16 21:28:21 +02:00
.and_then(|io: TlsStream<TcpStream>| async {
let proto = if let Some(protos) = io.get_ref().1.alpn_protocol() {
2021-04-16 21:28:21 +02:00
if protos.windows(2).any(|window| window == b"h2") {
Protocol::Http2
} else {
Protocol::Http1
}
2019-12-05 18:35:43 +01:00
} else {
Protocol::Http1
2021-04-16 21:28:21 +02:00
};
let peer_addr = io.get_ref().0.peer_addr().ok();
Ok((io, proto, peer_addr))
})
.and_then(self.map_err(TlsError::Service))
2019-12-05 18:35:43 +01:00
}
}
}
impl<T, S, B, X, U> ServiceFactory<(T, Protocol, Option<net::SocketAddr>)>
for HttpService<T, S, B, X, U>
2019-12-02 12:33:11 +01:00
where
T: AsyncRead + AsyncWrite + Unpin + 'static,
S: ServiceFactory<Request, Config = ()>,
S::Future: 'static,
2021-12-04 20:40:47 +01:00
S::Error: Into<Response<BoxBody>> + 'static,
2019-12-02 12:33:11 +01:00
S::InitError: fmt::Debug,
S::Response: Into<Response<B>> + 'static,
<S::Service as Service<Request>>::Future: 'static,
2019-12-02 12:33:11 +01:00
B: MessageBody + 'static,
X: ServiceFactory<Request, Config = (), Response = Request>,
X::Future: 'static,
2021-12-04 20:40:47 +01:00
X::Error: Into<Response<BoxBody>>,
2019-12-02 12:33:11 +01:00
X::InitError: fmt::Debug,
U: ServiceFactory<(Request, Framed<T, h1::Codec>), Config = (), Response = ()>,
U::Future: 'static,
2021-12-04 20:40:47 +01:00
U::Error: fmt::Display + Into<Response<BoxBody>>,
2019-04-08 23:51:16 +02:00
U::InitError: fmt::Debug,
2019-03-07 07:56:34 +01:00
{
type Response = ();
type Error = DispatchError;
type Config = ();
2019-12-02 12:33:11 +01:00
type Service = HttpServiceHandler<T, S::Service, B, X::Service, U::Service>;
type InitError = ();
type Future = LocalBoxFuture<'static, Result<Self::Service, Self::InitError>>;
2019-03-07 07:56:34 +01:00
2019-12-02 16:37:13 +01:00
fn new_service(&self, _: ()) -> Self::Future {
let service = self.srv.new_service(());
let expect = self.expect.new_service(());
let upgrade = self.upgrade.as_ref().map(|s| s.new_service(()));
let on_connect_ext = self.on_connect_ext.clone();
let cfg = self.cfg.clone();
Box::pin(async move {
let expect = expect
.await
2022-03-10 04:12:29 +01:00
.map_err(|e| error!("Init http expect service error: {:?}", e))?;
let upgrade = match upgrade {
Some(upgrade) => {
2021-12-08 07:01:11 +01:00
let upgrade = upgrade
.await
2022-03-10 04:12:29 +01:00
.map_err(|e| error!("Init http upgrade service error: {:?}", e))?;
Some(upgrade)
}
None => None,
};
let service = service
.await
2022-03-10 04:12:29 +01:00
.map_err(|e| error!("Init http service error: {:?}", e))?;
Ok(HttpServiceHandler::new(
cfg,
service,
expect,
upgrade,
on_connect_ext,
))
})
2019-03-07 07:56:34 +01:00
}
}
/// `Service` implementation for HTTP/1 and HTTP/2 transport
pub struct HttpServiceHandler<T, S, B, X, U>
where
S: Service<Request>,
X: Service<Request>,
U: Service<(Request, Framed<T, h1::Codec>)>,
{
pub(super) flow: Rc<HttpFlow<S, X, U>>,
pub(super) cfg: ServiceConfig,
pub(super) on_connect_ext: Option<Rc<ConnectCallback<T>>>,
_phantom: PhantomData<B>,
2019-03-07 07:56:34 +01:00
}
impl<T, S, B, X, U> HttpServiceHandler<T, S, B, X, U>
2019-03-07 07:56:34 +01:00
where
S: Service<Request>,
2021-12-04 20:40:47 +01:00
S::Error: Into<Response<BoxBody>>,
X: Service<Request>,
2021-12-04 20:40:47 +01:00
X::Error: Into<Response<BoxBody>>,
U: Service<(Request, Framed<T, h1::Codec>)>,
2021-12-04 20:40:47 +01:00
U::Error: Into<Response<BoxBody>>,
2019-03-07 07:56:34 +01:00
{
pub(super) fn new(
cfg: ServiceConfig,
service: S,
expect: X,
upgrade: Option<U>,
on_connect_ext: Option<Rc<ConnectCallback<T>>>,
) -> HttpServiceHandler<T, S, B, X, U> {
HttpServiceHandler {
cfg,
on_connect_ext,
flow: HttpFlow::new(service, expect, upgrade),
_phantom: PhantomData,
2019-04-06 01:46:44 +02:00
}
}
2019-04-06 01:46:44 +02:00
2023-07-17 03:38:12 +02:00
pub(super) fn _poll_ready(&self, cx: &mut Context<'_>) -> Poll<Result<(), Response<BoxBody>>> {
ready!(self.flow.expect.poll_ready(cx).map_err(Into::into))?;
2019-04-08 23:51:16 +02:00
ready!(self.flow.service.poll_ready(cx).map_err(Into::into))?;
if let Some(ref upg) = self.flow.upgrade {
ready!(upg.poll_ready(cx).map_err(Into::into))?;
};
2019-03-07 07:56:34 +01:00
Poll::Ready(Ok(()))
}
2019-03-07 07:56:34 +01:00
}
2021-01-06 19:52:06 +01:00
/// A collection of services that describe an HTTP request flow.
pub(super) struct HttpFlow<S, X, U> {
pub(super) service: S,
pub(super) expect: X,
pub(super) upgrade: Option<U>,
}
impl<S, X, U> HttpFlow<S, X, U> {
pub(super) fn new(service: S, expect: X, upgrade: Option<U>) -> Rc<Self> {
Rc::new(Self {
service,
expect,
upgrade,
})
}
}
impl<T, S, B, X, U> Service<(T, Protocol, Option<net::SocketAddr>)>
for HttpServiceHandler<T, S, B, X, U>
2019-03-07 07:56:34 +01:00
where
2019-12-02 12:33:11 +01:00
T: AsyncRead + AsyncWrite + Unpin,
S: Service<Request>,
2021-12-04 20:40:47 +01:00
S::Error: Into<Response<BoxBody>> + 'static,
2019-11-19 13:54:19 +01:00
S::Future: 'static,
S::Response: Into<Response<B>> + 'static,
2019-03-07 07:56:34 +01:00
B: MessageBody + 'static,
X: Service<Request, Response = Request>,
2021-12-04 20:40:47 +01:00
X::Error: Into<Response<BoxBody>>,
U: Service<(Request, Framed<T, h1::Codec>), Response = ()>,
2021-12-04 20:40:47 +01:00
U::Error: fmt::Display + Into<Response<BoxBody>>,
2019-03-07 07:56:34 +01:00
{
type Response = ();
type Error = DispatchError;
2019-04-08 23:51:16 +02:00
type Future = HttpServiceHandlerResponse<T, S, B, X, U>;
2019-03-07 07:56:34 +01:00
fn poll_ready(&self, cx: &mut Context<'_>) -> Poll<Result<(), Self::Error>> {
self._poll_ready(cx).map_err(|err| {
2022-03-10 04:12:29 +01:00
error!("HTTP service readiness error: {:?}", err);
DispatchError::Service(err)
})
2019-03-07 07:56:34 +01:00
}
2023-07-17 03:38:12 +02:00
fn call(&self, (io, proto, peer_addr): (T, Protocol, Option<net::SocketAddr>)) -> Self::Future {
let conn_data = OnConnectData::from_io(&io, self.on_connect_ext.as_deref());
2019-06-28 10:34:26 +02:00
2019-03-11 23:09:42 +01:00
match proto {
2022-01-31 22:22:23 +01:00
#[cfg(feature = "http2")]
2019-12-02 12:33:11 +01:00
Protocol::Http2 => HttpServiceHandlerResponse {
2021-12-04 20:40:47 +01:00
state: State::H2Handshake {
handshake: Some((
2022-01-31 22:22:23 +01:00
crate::h2::handshake_with_timeout(io, &self.cfg),
2021-12-04 20:40:47 +01:00
self.cfg.clone(),
self.flow.clone(),
conn_data,
2021-12-04 20:40:47 +01:00
peer_addr,
)),
},
2019-03-11 23:09:42 +01:00
},
2022-01-31 22:22:23 +01:00
#[cfg(not(feature = "http2"))]
Protocol::Http2 => {
panic!("HTTP/2 support is disabled (enable with the `http2` feature flag)")
}
2019-12-02 12:33:11 +01:00
Protocol::Http1 => HttpServiceHandlerResponse {
2021-12-04 20:40:47 +01:00
state: State::H1 {
dispatcher: h1::Dispatcher::new(
io,
self.flow.clone(),
self.cfg.clone(),
2021-12-04 20:40:47 +01:00
peer_addr,
conn_data,
2021-12-04 20:40:47 +01:00
),
},
2019-03-11 23:09:42 +01:00
},
2021-01-06 19:58:24 +01:00
2021-01-07 01:35:19 +01:00
proto => unimplemented!("Unsupported HTTP version: {:?}.", proto),
2019-03-07 07:56:34 +01:00
}
}
}
2022-01-31 22:22:23 +01:00
#[cfg(not(feature = "http2"))]
pin_project! {
#[project = StateProj]
enum State<T, S, B, X, U>
where
T: AsyncRead,
T: AsyncWrite,
T: Unpin,
S: Service<Request>,
S::Future: 'static,
S::Error: Into<Response<BoxBody>>,
B: MessageBody,
X: Service<Request, Response = Request>,
X::Error: Into<Response<BoxBody>>,
U: Service<(Request, Framed<T, h1::Codec>), Response = ()>,
U::Error: fmt::Display,
{
H1 { #[pin] dispatcher: h1::Dispatcher<T, S, B, X, U> },
}
}
#[cfg(feature = "http2")]
2021-12-04 20:40:47 +01:00
pin_project! {
#[project = StateProj]
enum State<T, S, B, X, U>
where
T: AsyncRead,
T: AsyncWrite,
T: Unpin,
2021-12-04 20:40:47 +01:00
S: Service<Request>,
S::Future: 'static,
S::Error: Into<Response<BoxBody>>,
2021-12-04 20:40:47 +01:00
B: MessageBody,
2021-12-04 20:40:47 +01:00
X: Service<Request, Response = Request>,
X::Error: Into<Response<BoxBody>>,
2021-12-04 20:40:47 +01:00
U: Service<(Request, Framed<T, h1::Codec>), Response = ()>,
U::Error: fmt::Display,
{
H1 { #[pin] dispatcher: h1::Dispatcher<T, S, B, X, U> },
2022-01-31 22:22:23 +01:00
H2 { #[pin] dispatcher: crate::h2::Dispatcher<T, S, B, X, U> },
2021-12-04 20:40:47 +01:00
H2Handshake {
handshake: Option<(
2022-01-31 22:22:23 +01:00
crate::h2::HandshakeWithTimeout<T>,
2021-12-04 20:40:47 +01:00
ServiceConfig,
Rc<HttpFlow<S, X, U>>,
OnConnectData,
Option<net::SocketAddr>,
)>,
},
}
2019-03-07 07:56:34 +01:00
}
2021-12-04 20:40:47 +01:00
pin_project! {
pub struct HttpServiceHandlerResponse<T, S, B, X, U>
where
T: AsyncRead,
T: AsyncWrite,
T: Unpin,
2021-12-04 20:40:47 +01:00
S: Service<Request>,
S::Error: Into<Response<BoxBody>>,
S::Error: 'static,
S::Future: 'static,
S::Response: Into<Response<B>>,
S::Response: 'static,
2021-12-04 20:40:47 +01:00
B: MessageBody,
2021-12-04 20:40:47 +01:00
X: Service<Request, Response = Request>,
X::Error: Into<Response<BoxBody>>,
2021-12-04 20:40:47 +01:00
U: Service<(Request, Framed<T, h1::Codec>), Response = ()>,
U::Error: fmt::Display,
{
#[pin]
state: State<T, S, B, X, U>,
}
2019-03-07 07:56:34 +01:00
}
2019-04-08 23:51:16 +02:00
impl<T, S, B, X, U> Future for HttpServiceHandlerResponse<T, S, B, X, U>
2019-03-07 07:56:34 +01:00
where
2019-12-02 12:33:11 +01:00
T: AsyncRead + AsyncWrite + Unpin,
S: Service<Request>,
2021-12-04 20:40:47 +01:00
S::Error: Into<Response<BoxBody>> + 'static,
2019-11-19 13:54:19 +01:00
S::Future: 'static,
S::Response: Into<Response<B>> + 'static,
B: MessageBody + 'static,
X: Service<Request, Response = Request>,
2021-12-04 20:40:47 +01:00
X::Error: Into<Response<BoxBody>>,
U: Service<(Request, Framed<T, h1::Codec>), Response = ()>,
2019-04-08 23:51:16 +02:00
U::Error: fmt::Display,
2019-03-07 07:56:34 +01:00
{
type Output = Result<(), DispatchError>;
2019-03-07 07:56:34 +01:00
fn poll(mut self: Pin<&mut Self>, cx: &mut Context<'_>) -> Poll<Self::Output> {
match self.as_mut().project().state.project() {
2021-12-04 20:40:47 +01:00
StateProj::H1 { dispatcher } => dispatcher.poll(cx),
2022-01-31 22:22:23 +01:00
#[cfg(feature = "http2")]
2021-12-04 20:40:47 +01:00
StateProj::H2 { dispatcher } => dispatcher.poll(cx),
2022-01-31 22:22:23 +01:00
#[cfg(feature = "http2")]
2021-12-04 20:40:47 +01:00
StateProj::H2Handshake { handshake: data } => {
match ready!(Pin::new(&mut data.as_mut().unwrap().0).poll(cx)) {
Ok((conn, timer)) => {
2021-12-08 07:01:11 +01:00
let (_, config, flow, conn_data, peer_addr) = data.take().unwrap();
2021-12-04 20:40:47 +01:00
self.as_mut().project().state.set(State::H2 {
2022-01-31 22:22:23 +01:00
dispatcher: crate::h2::Dispatcher::new(
conn, flow, config, peer_addr, conn_data, timer,
2021-06-17 18:57:58 +02:00
),
2021-12-04 20:40:47 +01:00
});
self.poll(cx)
2019-03-07 07:56:34 +01:00
}
Err(err) => {
2022-03-10 04:12:29 +01:00
tracing::trace!("H2 handshake error: {}", err);
Poll::Ready(Err(err))
}
}
2019-03-07 07:56:34 +01:00
}
}
}
}