1
0
Fork 0
mirror of https://github.com/actix/actix-web.git synced 2024-10-11 04:32:28 +00:00
actix-web/src/server/h2.rs

413 lines
14 KiB
Rust
Raw Normal View History

2018-02-26 22:33:56 +00:00
#![cfg_attr(feature = "cargo-clippy", allow(redundant_field_names))]
2018-04-13 23:02:01 +00:00
use std::collections::VecDeque;
2017-11-02 19:54:09 +00:00
use std::io::{Read, Write};
use std::net::SocketAddr;
2018-04-13 23:02:01 +00:00
use std::rc::Rc;
use std::time::Duration;
use std::{cmp, io, mem};
2017-11-04 20:24:57 +00:00
use actix::Arbiter;
2017-11-02 19:54:09 +00:00
use bytes::{Buf, Bytes};
2018-04-13 23:02:01 +00:00
use futures::{Async, Future, Poll, Stream};
use http2::server::{self, Connection, Handshake, SendResponse};
use http2::{Reason, RecvStream};
use modhttp::request::Parts;
2017-11-04 20:24:57 +00:00
use tokio_core::reactor::Timeout;
2018-04-13 23:02:01 +00:00
use tokio_io::{AsyncRead, AsyncWrite};
2017-11-02 19:54:09 +00:00
2017-11-16 06:06:28 +00:00
use error::PayloadError;
use httpmessage::HttpMessage;
2017-11-25 06:15:52 +00:00
use httprequest::HttpRequest;
use httpresponse::HttpResponse;
2018-04-13 23:02:01 +00:00
use payload::{Payload, PayloadStatus, PayloadWriter};
use pipeline::Pipeline;
2018-04-17 19:55:13 +00:00
use uri::Url;
2018-01-12 02:41:33 +00:00
use super::encoding::PayloadType;
2018-04-13 23:02:01 +00:00
use super::h2writer::H2Writer;
2018-01-12 02:35:05 +00:00
use super::settings::WorkerSettings;
use super::{HttpHandler, HttpHandlerTask, Writer};
2018-01-12 02:35:05 +00:00
bitflags! {
struct Flags: u8 {
const DISCONNECTED = 0b0000_0010;
}
}
/// HTTP/2 Transport
2018-04-13 23:02:01 +00:00
pub(crate) struct Http2<T, H>
where
T: AsyncRead + AsyncWrite + 'static,
H: 'static,
{
flags: Flags,
2017-12-14 05:38:47 +00:00
settings: Rc<WorkerSettings<H>>,
addr: Option<SocketAddr>,
state: State<IoWrapper<T>>,
2018-03-18 18:05:44 +00:00
tasks: VecDeque<Entry<H>>,
2017-11-04 20:24:57 +00:00
keepalive_timer: Option<Timeout>,
}
enum State<T: AsyncRead + AsyncWrite> {
Handshake(Handshake<T, Bytes>),
2018-01-12 00:22:27 +00:00
Connection(Connection<T, Bytes>),
Empty,
}
impl<T, H> Http2<T, H>
2018-04-13 23:02:01 +00:00
where
T: AsyncRead + AsyncWrite + 'static,
H: HttpHandler + 'static,
{
2018-04-13 23:02:01 +00:00
pub fn new(
2018-04-29 05:55:47 +00:00
settings: Rc<WorkerSettings<H>>, io: T, addr: Option<SocketAddr>, buf: Bytes,
2018-04-13 23:02:01 +00:00
) -> Self {
Http2 {
flags: Flags::empty(),
tasks: VecDeque::new(),
state: State::Handshake(server::handshake(IoWrapper {
unread: Some(buf),
inner: io,
})),
keepalive_timer: None,
addr,
settings,
2017-11-04 20:24:57 +00:00
}
}
2018-01-04 06:43:44 +00:00
pub(crate) fn shutdown(&mut self) {
self.state = State::Empty;
self.tasks.clear();
self.keepalive_timer.take();
}
2017-12-29 00:25:47 +00:00
pub fn settings(&self) -> &WorkerSettings<H> {
self.settings.as_ref()
}
pub fn poll(&mut self) -> Poll<(), ()> {
2017-11-04 16:07:44 +00:00
// server
2018-01-12 00:22:27 +00:00
if let State::Connection(ref mut conn) = self.state {
2017-11-04 20:24:57 +00:00
// keep-alive timer
if let Some(ref mut timeout) = self.keepalive_timer {
match timeout.poll() {
2017-11-09 03:31:25 +00:00
Ok(Async::Ready(_)) => {
trace!("Keep-alive timeout, close connection");
2018-04-13 23:02:01 +00:00
return Ok(Async::Ready(()));
2017-11-09 03:31:25 +00:00
}
2017-11-04 20:24:57 +00:00
Ok(Async::NotReady) => (),
Err(_) => unreachable!(),
}
}
2017-11-04 16:07:44 +00:00
loop {
let mut not_ready = true;
// check in-flight connections
for item in &mut self.tasks {
// read payload
item.poll_payload();
if !item.flags.contains(EntryFlags::EOF) {
let retry = item.payload.need_read() == PayloadStatus::Read;
2018-02-27 04:07:22 +00:00
loop {
match item.task.poll_io(&mut item.stream) {
Ok(Async::Ready(ready)) => {
if ready {
item.flags.insert(
2018-04-13 23:02:01 +00:00
EntryFlags::EOF | EntryFlags::FINISHED,
);
} else {
item.flags.insert(EntryFlags::EOF);
2018-02-27 04:07:22 +00:00
}
not_ready = false;
2018-04-13 23:02:01 +00:00
}
2018-02-27 04:07:22 +00:00
Ok(Async::NotReady) => {
if item.payload.need_read() == PayloadStatus::Read
&& !retry
{
2018-04-13 23:02:01 +00:00
continue;
2018-02-27 04:07:22 +00:00
}
2018-04-13 23:02:01 +00:00
}
2018-02-27 04:07:22 +00:00
Err(err) => {
error!("Unhandled error: {}", err);
item.flags.insert(
2018-04-13 23:02:01 +00:00
EntryFlags::EOF | EntryFlags::ERROR
| EntryFlags::WRITE_DONE,
);
2018-02-27 04:07:22 +00:00
item.stream.reset(Reason::INTERNAL_ERROR);
2017-11-04 16:07:44 +00:00
}
}
2018-04-13 23:02:01 +00:00
break;
2017-11-04 16:07:44 +00:00
}
} else if !item.flags.contains(EntryFlags::FINISHED) {
2017-11-04 16:07:44 +00:00
match item.task.poll() {
Ok(Async::NotReady) => (),
Ok(Async::Ready(_)) => {
not_ready = false;
item.flags.insert(EntryFlags::FINISHED);
2018-04-13 23:02:01 +00:00
}
2017-11-25 17:28:25 +00:00
Err(err) => {
item.flags.insert(
2018-04-13 23:02:01 +00:00
EntryFlags::ERROR | EntryFlags::WRITE_DONE
| EntryFlags::FINISHED,
);
2017-11-25 17:28:25 +00:00
error!("Unhandled error: {}", err);
2017-11-04 16:07:44 +00:00
}
}
}
if !item.flags.contains(EntryFlags::WRITE_DONE) {
match item.stream.poll_completed(false) {
Ok(Async::NotReady) => (),
Ok(Async::Ready(_)) => {
not_ready = false;
item.flags.insert(EntryFlags::WRITE_DONE);
}
Err(_err) => {
item.flags.insert(EntryFlags::ERROR);
}
}
}
2017-11-04 16:07:44 +00:00
}
// cleanup finished tasks
while !self.tasks.is_empty() {
2018-04-13 23:02:01 +00:00
if self.tasks[0].flags.contains(EntryFlags::EOF)
&& self.tasks[0].flags.contains(EntryFlags::WRITE_DONE)
|| self.tasks[0].flags.contains(EntryFlags::ERROR)
{
2017-11-04 16:07:44 +00:00
self.tasks.pop_front();
} else {
2018-04-13 23:02:01 +00:00
break;
2017-11-04 16:07:44 +00:00
}
}
// get request
if !self.flags.contains(Flags::DISCONNECTED) {
2018-01-12 00:22:27 +00:00
match conn.poll() {
2017-11-04 16:07:44 +00:00
Ok(Async::Ready(None)) => {
not_ready = false;
self.flags.insert(Flags::DISCONNECTED);
2017-11-04 16:07:44 +00:00
for entry in &mut self.tasks {
entry.task.disconnected()
}
2018-04-13 23:02:01 +00:00
}
2017-11-18 16:50:07 +00:00
Ok(Async::Ready(Some((req, resp)))) => {
2017-11-04 16:07:44 +00:00
not_ready = false;
let (parts, body) = req.into_parts();
// stop keepalive timer
2017-11-04 20:24:57 +00:00
self.keepalive_timer.take();
2018-04-13 23:02:01 +00:00
self.tasks.push_back(Entry::new(
parts,
body,
resp,
self.addr,
&self.settings,
));
2017-11-04 16:07:44 +00:00
}
2017-11-04 20:24:57 +00:00
Ok(Async::NotReady) => {
// start keep-alive timer
2017-12-14 05:38:47 +00:00
if self.tasks.is_empty() {
if self.settings.keep_alive_enabled() {
let keep_alive = self.settings.keep_alive();
2017-12-14 05:38:47 +00:00
if keep_alive > 0 && self.keepalive_timer.is_none() {
trace!("Start keep-alive timer");
let mut timeout = Timeout::new(
2017-12-14 06:36:28 +00:00
Duration::new(keep_alive, 0),
2017-12-14 05:38:47 +00:00
Arbiter::handle()).unwrap();
// register timeout
let _ = timeout.poll();
self.keepalive_timer = Some(timeout);
}
} else {
// keep-alive disable, drop connection
2018-04-13 23:02:01 +00:00
return conn.poll_close().map_err(|e| {
error!("Error during connection close: {}", e)
});
2017-12-14 05:38:47 +00:00
}
} else {
// keep-alive unset, rely on operating system
2018-04-13 23:02:01 +00:00
return Ok(Async::NotReady);
2017-11-04 20:24:57 +00:00
}
}
Err(err) => {
trace!("Connection error: {}", err);
self.flags.insert(Flags::DISCONNECTED);
2017-11-04 20:24:57 +00:00
for entry in &mut self.tasks {
entry.task.disconnected()
}
self.keepalive_timer.take();
2018-04-13 23:02:01 +00:00
}
2017-11-04 16:07:44 +00:00
}
}
if not_ready {
2018-04-13 23:02:01 +00:00
if self.tasks.is_empty() && self.flags.contains(Flags::DISCONNECTED)
{
return conn.poll_close()
.map_err(|e| error!("Error during connection close: {}", e));
2017-11-04 16:07:44 +00:00
} else {
2018-04-13 23:02:01 +00:00
return Ok(Async::NotReady);
2017-11-04 16:07:44 +00:00
}
}
}
}
// handshake
self.state = if let State::Handshake(ref mut handshake) = self.state {
match handshake.poll() {
2018-04-13 23:02:01 +00:00
Ok(Async::Ready(conn)) => State::Connection(conn),
Ok(Async::NotReady) => return Ok(Async::NotReady),
Err(err) => {
trace!("Error handling connection: {}", err);
2018-04-13 23:02:01 +00:00
return Err(());
}
}
} else {
mem::replace(&mut self.state, State::Empty)
};
2017-11-04 16:07:44 +00:00
self.poll()
}
}
bitflags! {
struct EntryFlags: u8 {
const EOF = 0b0000_0001;
const REOF = 0b0000_0010;
const ERROR = 0b0000_0100;
const FINISHED = 0b0000_1000;
const WRITE_DONE = 0b0001_0000;
}
}
2018-03-18 18:05:44 +00:00
struct Entry<H: 'static> {
2017-12-09 12:33:40 +00:00
task: Box<HttpHandlerTask>,
2017-11-07 00:23:58 +00:00
payload: PayloadType,
recv: RecvStream,
2018-03-18 18:05:44 +00:00
stream: H2Writer<H>,
flags: EntryFlags,
}
2018-03-18 18:05:44 +00:00
impl<H: 'static> Entry<H> {
2018-04-13 23:02:01 +00:00
fn new(
parts: Parts, recv: RecvStream, resp: SendResponse<Bytes>,
addr: Option<SocketAddr>, settings: &Rc<WorkerSettings<H>>,
) -> Entry<H>
where
H: HttpHandler + 'static,
{
2017-11-27 03:00:57 +00:00
// Payload and Content-Encoding
let (psender, payload) = Payload::new(false);
2017-12-15 04:48:31 +00:00
let msg = settings.get_http_message();
2018-04-17 19:55:13 +00:00
msg.get_mut().url = Url::new(parts.uri);
2017-12-15 04:48:31 +00:00
msg.get_mut().method = parts.method;
msg.get_mut().version = parts.version;
msg.get_mut().headers = parts.headers;
msg.get_mut().payload = Some(payload);
msg.get_mut().addr = addr;
2017-11-06 17:35:52 +00:00
2017-12-15 04:48:31 +00:00
let mut req = HttpRequest::from_message(msg);
2017-11-25 06:15:52 +00:00
// Payload sender
let psender = PayloadType::new(req.headers(), psender);
// start request processing
let mut task = None;
2017-12-26 17:00:45 +00:00
for h in settings.handlers().iter_mut() {
2017-11-29 21:53:52 +00:00
req = match h.handle(req) {
Ok(t) => {
task = Some(t);
2018-04-13 23:02:01 +00:00
break;
}
2017-11-29 21:53:52 +00:00
Err(req) => req,
}
}
2018-04-13 23:02:01 +00:00
Entry {
task: task.unwrap_or_else(|| Pipeline::error(HttpResponse::NotFound())),
payload: psender,
stream: H2Writer::new(
resp,
settings.get_shared_bytes(),
Rc::clone(settings),
),
flags: EntryFlags::empty(),
recv,
2017-11-04 16:07:44 +00:00
}
}
fn poll_payload(&mut self) {
if !self.flags.contains(EntryFlags::REOF) {
if self.payload.need_read() == PayloadStatus::Read {
2018-02-27 04:07:22 +00:00
if let Err(err) = self.recv.release_capacity().release_capacity(32_768) {
self.payload.set_error(PayloadError::Http2(err))
}
} else if let Err(err) = self.recv.release_capacity().release_capacity(0) {
self.payload.set_error(PayloadError::Http2(err))
}
2017-11-04 16:07:44 +00:00
match self.recv.poll() {
Ok(Async::Ready(Some(chunk))) => {
2017-11-07 00:23:58 +00:00
self.payload.feed_data(chunk);
2018-04-13 23:02:01 +00:00
}
2017-11-04 16:07:44 +00:00
Ok(Async::Ready(None)) => {
self.flags.insert(EntryFlags::REOF);
2017-11-04 16:07:44 +00:00
}
2018-04-13 23:02:01 +00:00
Ok(Async::NotReady) => (),
Err(err) => self.payload.set_error(PayloadError::Http2(err)),
2017-11-04 16:07:44 +00:00
}
}
}
}
2017-11-02 19:54:09 +00:00
struct IoWrapper<T> {
unread: Option<Bytes>,
inner: T,
}
impl<T: Read> Read for IoWrapper<T> {
fn read(&mut self, buf: &mut [u8]) -> io::Result<usize> {
if let Some(mut bytes) = self.unread.take() {
let size = cmp::min(buf.len(), bytes.len());
buf[..size].copy_from_slice(&bytes[..size]);
if bytes.len() > size {
bytes.split_to(size);
2017-11-02 19:54:09 +00:00
self.unread = Some(bytes);
}
Ok(size)
} else {
self.inner.read(buf)
}
}
}
impl<T: Write> Write for IoWrapper<T> {
fn write(&mut self, buf: &[u8]) -> io::Result<usize> {
self.inner.write(buf)
}
fn flush(&mut self) -> io::Result<()> {
self.inner.flush()
}
}
impl<T: AsyncRead + 'static> AsyncRead for IoWrapper<T> {
unsafe fn prepare_uninitialized_buffer(&self, buf: &mut [u8]) -> bool {
self.inner.prepare_uninitialized_buffer(buf)
}
}
impl<T: AsyncWrite + 'static> AsyncWrite for IoWrapper<T> {
fn shutdown(&mut self) -> Poll<(), io::Error> {
self.inner.shutdown()
}
fn write_buf<B: Buf>(&mut self, buf: &mut B) -> Poll<usize, io::Error> {
self.inner.write_buf(buf)
}
}