use futures::unsync::oneshot; use futures::Future; use net2::TcpStreamExt; use slab::Slab; use std::rc::Rc; use std::{net, time}; use tokio_core::net::TcpStream; use tokio_core::reactor::Handle; #[cfg(any(feature = "tls", feature = "alpn"))] use futures::future; #[cfg(feature = "tls")] use native_tls::TlsAcceptor; #[cfg(feature = "tls")] use tokio_tls::TlsAcceptorExt; #[cfg(feature = "alpn")] use openssl::ssl::SslAcceptor; #[cfg(feature = "alpn")] use tokio_openssl::SslAcceptorExt; use actix::msgs::StopArbiter; use actix::*; use server::channel::HttpChannel; use server::settings::WorkerSettings; use server::{HttpHandler, KeepAlive}; #[derive(Message)] pub(crate) struct Conn { pub io: T, pub token: usize, pub peer: Option, pub http2: bool, } #[derive(Clone)] pub(crate) struct SocketInfo { pub addr: net::SocketAddr, pub htype: StreamHandlerType, } /// Stop worker message. Returns `true` on successful shutdown /// and `false` if some connections still alive. pub(crate) struct StopWorker { pub graceful: Option, } impl Message for StopWorker { type Result = Result; } /// Http worker /// /// Worker accepts Socket objects via unbounded channel and start requests /// processing. pub(crate) struct Worker where H: HttpHandler + 'static, { settings: Rc>, hnd: Handle, socks: Slab, tcp_ka: Option, } impl Worker { pub(crate) fn new( h: Vec, socks: Slab, keep_alive: KeepAlive, ) -> Worker { let tcp_ka = if let KeepAlive::Tcp(val) = keep_alive { Some(time::Duration::new(val as u64, 0)) } else { None }; Worker { settings: Rc::new(WorkerSettings::new(h, keep_alive)), hnd: Arbiter::handle().clone(), socks, tcp_ka, } } fn update_time(&self, ctx: &mut Context) { self.settings.update_date(); ctx.run_later(time::Duration::new(1, 0), |slf, ctx| { slf.update_time(ctx) }); } fn shutdown_timeout( &self, ctx: &mut Context, tx: oneshot::Sender, dur: time::Duration, ) { // sleep for 1 second and then check again ctx.run_later(time::Duration::new(1, 0), move |slf, ctx| { let num = slf.settings.num_channels(); if num == 0 { let _ = tx.send(true); Arbiter::arbiter().do_send(StopArbiter(0)); } else if let Some(d) = dur.checked_sub(time::Duration::new(1, 0)) { slf.shutdown_timeout(ctx, tx, d); } else { info!("Force shutdown http worker, {} connections", num); slf.settings.head().traverse::(); let _ = tx.send(false); Arbiter::arbiter().do_send(StopArbiter(0)); } }); } } impl Actor for Worker where H: HttpHandler + 'static, { type Context = Context; fn started(&mut self, ctx: &mut Self::Context) { self.update_time(ctx); } } impl Handler> for Worker where H: HttpHandler + 'static, { type Result = (); fn handle(&mut self, msg: Conn, _: &mut Context) { if self.tcp_ka.is_some() && msg.io.set_keepalive(self.tcp_ka).is_err() { error!("Can not set socket keep-alive option"); } self.socks.get_mut(msg.token).unwrap().htype.handle( Rc::clone(&self.settings), &self.hnd, msg, ); } } /// `StopWorker` message handler impl Handler for Worker where H: HttpHandler + 'static, { type Result = Response; fn handle(&mut self, msg: StopWorker, ctx: &mut Context) -> Self::Result { let num = self.settings.num_channels(); if num == 0 { info!("Shutting down http worker, 0 connections"); Response::reply(Ok(true)) } else if let Some(dur) = msg.graceful { info!("Graceful http worker shutdown, {} connections", num); let (tx, rx) = oneshot::channel(); self.shutdown_timeout(ctx, tx, dur); Response::async(rx.map_err(|_| ())) } else { info!("Force shutdown http worker, {} connections", num); self.settings.head().traverse::(); Response::reply(Ok(false)) } } } #[derive(Clone)] pub(crate) enum StreamHandlerType { Normal, #[cfg(feature = "tls")] Tls(TlsAcceptor), #[cfg(feature = "alpn")] Alpn(SslAcceptor), } impl StreamHandlerType { fn handle( &mut self, h: Rc>, hnd: &Handle, msg: Conn, ) { match *self { StreamHandlerType::Normal => { let _ = msg.io.set_nodelay(true); let io = TcpStream::from_stream(msg.io, hnd) .expect("failed to associate TCP stream"); hnd.spawn(HttpChannel::new(h, io, msg.peer, msg.http2)); } #[cfg(feature = "tls")] StreamHandlerType::Tls(ref acceptor) => { let Conn { io, peer, http2, .. } = msg; let _ = io.set_nodelay(true); let io = TcpStream::from_stream(io, hnd) .expect("failed to associate TCP stream"); hnd.spawn( TlsAcceptorExt::accept_async(acceptor, io).then(move |res| { match res { Ok(io) => Arbiter::handle() .spawn(HttpChannel::new(h, io, peer, http2)), Err(err) => { trace!("Error during handling tls connection: {}", err) } }; future::result(Ok(())) }), ); } #[cfg(feature = "alpn")] StreamHandlerType::Alpn(ref acceptor) => { let Conn { io, peer, .. } = msg; let _ = io.set_nodelay(true); let io = TcpStream::from_stream(io, hnd) .expect("failed to associate TCP stream"); hnd.spawn( SslAcceptorExt::accept_async(acceptor, io).then(move |res| { match res { Ok(io) => { let http2 = if let Some(p) = io.get_ref().ssl().selected_alpn_protocol() { p.len() == 2 && &p == b"h2" } else { false }; Arbiter::handle() .spawn(HttpChannel::new(h, io, peer, http2)); } Err(err) => { trace!("Error during handling tls connection: {}", err) } }; future::result(Ok(())) }), ); } } } pub(crate) fn scheme(&self) -> &'static str { match *self { StreamHandlerType::Normal => "http", #[cfg(feature = "tls")] StreamHandlerType::Tls(ref acceptor) => "https", #[cfg(feature = "alpn")] StreamHandlerType::Alpn(ref acceptor) => "https", } } }