2020-10-30 02:03:26 +00:00
|
|
|
use std::{
|
|
|
|
any::Any,
|
2021-01-04 00:49:02 +00:00
|
|
|
cmp, fmt, io,
|
2020-10-30 02:03:26 +00:00
|
|
|
marker::PhantomData,
|
|
|
|
net,
|
|
|
|
sync::{Arc, Mutex},
|
|
|
|
};
|
|
|
|
|
|
|
|
use actix_http::{
|
|
|
|
body::MessageBody, Error, Extensions, HttpService, KeepAlive, Request, Response,
|
|
|
|
};
|
2019-03-05 00:29:03 +00:00
|
|
|
use actix_server::{Server, ServerBuilder};
|
2019-12-22 12:39:25 +00:00
|
|
|
use actix_service::{map_config, IntoServiceFactory, Service, ServiceFactory};
|
2019-03-05 00:29:03 +00:00
|
|
|
|
2019-12-22 07:43:41 +00:00
|
|
|
#[cfg(unix)]
|
|
|
|
use actix_http::Protocol;
|
|
|
|
#[cfg(unix)]
|
|
|
|
use actix_service::pipeline_factory;
|
|
|
|
#[cfg(unix)]
|
2020-05-18 02:47:20 +00:00
|
|
|
use futures_util::future::ok;
|
2019-12-22 07:43:41 +00:00
|
|
|
|
2019-11-20 17:33:22 +00:00
|
|
|
#[cfg(feature = "openssl")]
|
2021-01-03 23:47:04 +00:00
|
|
|
use actix_tls::accept::openssl::{AlpnError, SslAcceptor, SslAcceptorBuilder};
|
2019-11-20 17:33:22 +00:00
|
|
|
#[cfg(feature = "rustls")]
|
2021-01-03 23:47:04 +00:00
|
|
|
use actix_tls::accept::rustls::ServerConfig as RustlsServerConfig;
|
2019-03-05 00:29:03 +00:00
|
|
|
|
2019-12-20 10:04:51 +00:00
|
|
|
use crate::config::AppConfig;
|
|
|
|
|
2019-03-05 00:29:03 +00:00
|
|
|
struct Socket {
|
|
|
|
scheme: &'static str,
|
|
|
|
addr: net::SocketAddr,
|
|
|
|
}
|
|
|
|
|
|
|
|
struct Config {
|
2019-12-20 10:04:51 +00:00
|
|
|
host: Option<String>,
|
2019-03-05 00:29:03 +00:00
|
|
|
keep_alive: KeepAlive,
|
|
|
|
client_timeout: u64,
|
|
|
|
client_shutdown: u64,
|
|
|
|
}
|
|
|
|
|
|
|
|
/// An HTTP Server.
|
|
|
|
///
|
|
|
|
/// Create new http server with application factory.
|
|
|
|
///
|
2019-12-22 13:12:22 +00:00
|
|
|
/// ```rust,no_run
|
2019-03-06 23:47:15 +00:00
|
|
|
/// use actix_web::{web, App, HttpResponse, HttpServer};
|
2019-03-05 00:29:03 +00:00
|
|
|
///
|
2019-12-22 13:12:22 +00:00
|
|
|
/// #[actix_rt::main]
|
|
|
|
/// async fn main() -> std::io::Result<()> {
|
2019-03-05 00:29:03 +00:00
|
|
|
/// HttpServer::new(
|
|
|
|
/// || App::new()
|
2019-03-06 23:47:15 +00:00
|
|
|
/// .service(web::resource("/").to(|| HttpResponse::Ok())))
|
2019-03-05 00:29:03 +00:00
|
|
|
/// .bind("127.0.0.1:59090")?
|
2019-12-22 13:12:22 +00:00
|
|
|
/// .run()
|
|
|
|
/// .await
|
2019-03-05 00:29:03 +00:00
|
|
|
/// }
|
|
|
|
/// ```
|
|
|
|
pub struct HttpServer<F, I, S, B>
|
|
|
|
where
|
|
|
|
F: Fn() -> I + Send + Clone + 'static,
|
2021-01-03 23:47:04 +00:00
|
|
|
I: IntoServiceFactory<S, Request>,
|
|
|
|
S: ServiceFactory<Request, Config = AppConfig>,
|
2019-04-05 23:46:44 +00:00
|
|
|
S::Error: Into<Error>,
|
|
|
|
S::InitError: fmt::Debug,
|
2019-03-05 00:29:03 +00:00
|
|
|
S::Response: Into<Response<B>>,
|
|
|
|
B: MessageBody,
|
|
|
|
{
|
|
|
|
pub(super) factory: F,
|
|
|
|
config: Arc<Mutex<Config>>,
|
2021-01-03 23:47:04 +00:00
|
|
|
backlog: u32,
|
2019-03-05 00:29:03 +00:00
|
|
|
sockets: Vec<Socket>,
|
2019-05-23 12:21:02 +00:00
|
|
|
builder: ServerBuilder,
|
2020-10-30 02:03:26 +00:00
|
|
|
on_connect_fn: Option<Arc<dyn Fn(&dyn Any, &mut Extensions) + Send + Sync>>,
|
2021-01-04 00:49:02 +00:00
|
|
|
_phantom: PhantomData<(S, B)>,
|
2019-03-05 00:29:03 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
impl<F, I, S, B> HttpServer<F, I, S, B>
|
|
|
|
where
|
|
|
|
F: Fn() -> I + Send + Clone + 'static,
|
2021-01-03 23:47:04 +00:00
|
|
|
I: IntoServiceFactory<S, Request>,
|
|
|
|
S: ServiceFactory<Request, Config = AppConfig> + 'static,
|
2019-11-20 17:33:22 +00:00
|
|
|
S::Error: Into<Error> + 'static,
|
2019-04-05 23:46:44 +00:00
|
|
|
S::InitError: fmt::Debug,
|
2019-11-20 17:33:22 +00:00
|
|
|
S::Response: Into<Response<B>> + 'static,
|
2021-01-03 23:47:04 +00:00
|
|
|
<S::Service as Service<Request>>::Future: 'static,
|
|
|
|
S::Service: 'static,
|
2019-03-07 07:06:14 +00:00
|
|
|
B: MessageBody + 'static,
|
2019-03-05 00:29:03 +00:00
|
|
|
{
|
|
|
|
/// Create new http server with application factory
|
|
|
|
pub fn new(factory: F) -> Self {
|
|
|
|
HttpServer {
|
|
|
|
factory,
|
|
|
|
config: Arc::new(Mutex::new(Config {
|
2019-12-20 10:04:51 +00:00
|
|
|
host: None,
|
2019-03-05 00:29:03 +00:00
|
|
|
keep_alive: KeepAlive::Timeout(5),
|
|
|
|
client_timeout: 5000,
|
|
|
|
client_shutdown: 5000,
|
|
|
|
})),
|
2019-03-11 22:26:05 +00:00
|
|
|
backlog: 1024,
|
2019-03-05 00:29:03 +00:00
|
|
|
sockets: Vec::new(),
|
2019-05-23 12:21:02 +00:00
|
|
|
builder: ServerBuilder::default(),
|
2020-10-30 02:03:26 +00:00
|
|
|
on_connect_fn: None,
|
2021-01-04 00:49:02 +00:00
|
|
|
_phantom: PhantomData,
|
2020-10-30 02:03:26 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Sets function that will be called once before each connection is handled.
|
|
|
|
/// It will receive a `&std::any::Any`, which contains underlying connection type and an
|
|
|
|
/// [Extensions] container so that request-local data can be passed to middleware and handlers.
|
|
|
|
///
|
|
|
|
/// For example:
|
|
|
|
/// - `actix_tls::openssl::SslStream<actix_web::rt::net::TcpStream>` when using openssl.
|
|
|
|
/// - `actix_tls::rustls::TlsStream<actix_web::rt::net::TcpStream>` when using rustls.
|
|
|
|
/// - `actix_web::rt::net::TcpStream` when no encryption is used.
|
|
|
|
///
|
|
|
|
/// See `on_connect` example for additional details.
|
|
|
|
pub fn on_connect<CB>(self, f: CB) -> HttpServer<F, I, S, B>
|
|
|
|
where
|
|
|
|
CB: Fn(&dyn Any, &mut Extensions) + Send + Sync + 'static,
|
|
|
|
{
|
|
|
|
HttpServer {
|
|
|
|
factory: self.factory,
|
|
|
|
config: self.config,
|
|
|
|
backlog: self.backlog,
|
|
|
|
sockets: self.sockets,
|
|
|
|
builder: self.builder,
|
|
|
|
on_connect_fn: Some(Arc::new(f)),
|
2021-01-04 00:49:02 +00:00
|
|
|
_phantom: PhantomData,
|
2019-03-05 00:29:03 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Set number of workers to start.
|
|
|
|
///
|
|
|
|
/// By default http server uses number of available logical cpu as threads
|
|
|
|
/// count.
|
|
|
|
pub fn workers(mut self, num: usize) -> Self {
|
2019-05-23 12:21:02 +00:00
|
|
|
self.builder = self.builder.workers(num);
|
2019-03-05 00:29:03 +00:00
|
|
|
self
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Set the maximum number of pending connections.
|
|
|
|
///
|
|
|
|
/// This refers to the number of clients that can be waiting to be served.
|
|
|
|
/// Exceeding this number results in the client getting an error when
|
|
|
|
/// attempting to connect. It should only affect servers under significant
|
|
|
|
/// load.
|
|
|
|
///
|
|
|
|
/// Generally set in the 64-2048 range. Default value is 2048.
|
|
|
|
///
|
|
|
|
/// This method should be called before `bind()` method call.
|
2021-01-03 23:47:04 +00:00
|
|
|
pub fn backlog(mut self, backlog: u32) -> Self {
|
2019-03-11 22:26:05 +00:00
|
|
|
self.backlog = backlog;
|
2019-05-23 12:21:02 +00:00
|
|
|
self.builder = self.builder.backlog(backlog);
|
2019-03-05 00:29:03 +00:00
|
|
|
self
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Sets the maximum per-worker number of concurrent connections.
|
|
|
|
///
|
2020-09-09 08:20:54 +00:00
|
|
|
/// All socket listeners will stop accepting connections when this limit is reached for
|
|
|
|
/// each worker.
|
2019-03-05 00:29:03 +00:00
|
|
|
///
|
|
|
|
/// By default max connections is set to a 25k.
|
2020-09-09 08:20:54 +00:00
|
|
|
pub fn max_connections(mut self, num: usize) -> Self {
|
2019-05-23 12:21:02 +00:00
|
|
|
self.builder = self.builder.maxconn(num);
|
2019-03-05 00:29:03 +00:00
|
|
|
self
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Sets the maximum per-worker concurrent connection establish process.
|
|
|
|
///
|
2020-09-09 08:20:54 +00:00
|
|
|
/// All listeners will stop accepting connections when this limit is reached. It can be used to
|
|
|
|
/// limit the global TLS CPU usage.
|
2019-03-05 00:29:03 +00:00
|
|
|
///
|
|
|
|
/// By default max connections is set to a 256.
|
2021-01-03 23:47:04 +00:00
|
|
|
#[allow(unused_variables)]
|
2020-09-09 08:20:54 +00:00
|
|
|
pub fn max_connection_rate(self, num: usize) -> Self {
|
2021-01-03 23:47:04 +00:00
|
|
|
#[cfg(any(feature = "rustls", feature = "openssl"))]
|
|
|
|
actix_tls::accept::max_concurrent_tls_connect(num);
|
2019-03-05 00:29:03 +00:00
|
|
|
self
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Set server keep-alive setting.
|
|
|
|
///
|
|
|
|
/// By default keep alive is set to a 5 seconds.
|
|
|
|
pub fn keep_alive<T: Into<KeepAlive>>(self, val: T) -> Self {
|
2019-12-10 03:00:51 +00:00
|
|
|
self.config.lock().unwrap().keep_alive = val.into();
|
2019-03-05 00:29:03 +00:00
|
|
|
self
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Set server client timeout in milliseconds for first request.
|
|
|
|
///
|
|
|
|
/// Defines a timeout for reading client request header. If a client does not transmit
|
|
|
|
/// the entire set headers within this time, the request is terminated with
|
|
|
|
/// the 408 (Request Time-out) error.
|
|
|
|
///
|
|
|
|
/// To disable timeout set value to 0.
|
|
|
|
///
|
|
|
|
/// By default client timeout is set to 5000 milliseconds.
|
|
|
|
pub fn client_timeout(self, val: u64) -> Self {
|
2019-12-10 03:00:51 +00:00
|
|
|
self.config.lock().unwrap().client_timeout = val;
|
2019-03-05 00:29:03 +00:00
|
|
|
self
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Set server connection shutdown timeout in milliseconds.
|
|
|
|
///
|
|
|
|
/// Defines a timeout for shutdown connection. If a shutdown procedure does not complete
|
|
|
|
/// within this time, the request is dropped.
|
|
|
|
///
|
|
|
|
/// To disable timeout set value to 0.
|
|
|
|
///
|
|
|
|
/// By default client timeout is set to 5000 milliseconds.
|
|
|
|
pub fn client_shutdown(self, val: u64) -> Self {
|
2019-12-10 03:00:51 +00:00
|
|
|
self.config.lock().unwrap().client_shutdown = val;
|
2019-03-05 00:29:03 +00:00
|
|
|
self
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Set server host name.
|
|
|
|
///
|
2019-12-09 04:02:43 +00:00
|
|
|
/// Host name is used by application router as a hostname for url generation.
|
2020-12-13 13:28:39 +00:00
|
|
|
/// Check [ConnectionInfo](super::dev::ConnectionInfo::host())
|
2019-12-09 04:02:43 +00:00
|
|
|
/// documentation for more information.
|
|
|
|
///
|
|
|
|
/// By default host name is set to a "localhost" value.
|
2019-12-20 10:04:51 +00:00
|
|
|
pub fn server_hostname<T: AsRef<str>>(self, val: T) -> Self {
|
|
|
|
self.config.lock().unwrap().host = Some(val.as_ref().to_owned());
|
2019-03-05 00:29:03 +00:00
|
|
|
self
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Stop actix system.
|
|
|
|
pub fn system_exit(mut self) -> Self {
|
2019-05-23 12:21:02 +00:00
|
|
|
self.builder = self.builder.system_exit();
|
2019-03-05 00:29:03 +00:00
|
|
|
self
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Disable signal handling
|
|
|
|
pub fn disable_signals(mut self) -> Self {
|
2019-05-23 12:21:02 +00:00
|
|
|
self.builder = self.builder.disable_signals();
|
2019-03-05 00:29:03 +00:00
|
|
|
self
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Timeout for graceful workers shutdown.
|
|
|
|
///
|
|
|
|
/// After receiving a stop signal, workers have this much time to finish
|
|
|
|
/// serving requests. Workers still alive after the timeout are force
|
|
|
|
/// dropped.
|
|
|
|
///
|
|
|
|
/// By default shutdown timeout sets to 30 seconds.
|
2019-05-18 17:50:35 +00:00
|
|
|
pub fn shutdown_timeout(mut self, sec: u64) -> Self {
|
2019-05-23 12:21:02 +00:00
|
|
|
self.builder = self.builder.shutdown_timeout(sec);
|
2019-03-05 00:29:03 +00:00
|
|
|
self
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Get addresses of bound sockets.
|
|
|
|
pub fn addrs(&self) -> Vec<net::SocketAddr> {
|
|
|
|
self.sockets.iter().map(|s| s.addr).collect()
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Get addresses of bound sockets and the scheme for it.
|
|
|
|
///
|
|
|
|
/// This is useful when the server is bound from different sources
|
|
|
|
/// with some sockets listening on http and some listening on https
|
|
|
|
/// and the user should be presented with an enumeration of which
|
|
|
|
/// socket requires which protocol.
|
|
|
|
pub fn addrs_with_scheme(&self) -> Vec<(net::SocketAddr, &str)> {
|
|
|
|
self.sockets.iter().map(|s| (s.addr, s.scheme)).collect()
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Use listener for accepting incoming connection requests
|
|
|
|
///
|
|
|
|
/// HttpServer does not change any configuration for TcpListener,
|
|
|
|
/// it needs to be configured before passing it to listen() method.
|
2019-03-09 15:39:34 +00:00
|
|
|
pub fn listen(mut self, lst: net::TcpListener) -> io::Result<Self> {
|
2019-03-05 00:29:03 +00:00
|
|
|
let cfg = self.config.clone();
|
|
|
|
let factory = self.factory.clone();
|
|
|
|
let addr = lst.local_addr().unwrap();
|
|
|
|
self.sockets.push(Socket {
|
|
|
|
addr,
|
|
|
|
scheme: "http",
|
|
|
|
});
|
2020-10-30 02:03:26 +00:00
|
|
|
let on_connect_fn = self.on_connect_fn.clone();
|
2019-03-05 00:29:03 +00:00
|
|
|
|
2019-05-23 12:21:02 +00:00
|
|
|
self.builder = self.builder.listen(
|
2019-03-05 00:29:03 +00:00
|
|
|
format!("actix-web-service-{}", addr),
|
|
|
|
lst,
|
|
|
|
move || {
|
2019-12-10 03:00:51 +00:00
|
|
|
let c = cfg.lock().unwrap();
|
2019-12-20 10:04:51 +00:00
|
|
|
let cfg = AppConfig::new(
|
|
|
|
false,
|
|
|
|
addr,
|
|
|
|
c.host.clone().unwrap_or_else(|| format!("{}", addr)),
|
|
|
|
);
|
|
|
|
|
2020-10-30 02:03:26 +00:00
|
|
|
let svc = HttpService::build()
|
2019-03-09 18:53:00 +00:00
|
|
|
.keep_alive(c.keep_alive)
|
|
|
|
.client_timeout(c.client_timeout)
|
2020-10-30 02:03:26 +00:00
|
|
|
.local_addr(addr);
|
|
|
|
|
|
|
|
let svc = if let Some(handler) = on_connect_fn.clone() {
|
|
|
|
svc.on_connect_ext(move |io: &_, ext: _| {
|
|
|
|
(handler)(io as &dyn Any, ext)
|
|
|
|
})
|
|
|
|
} else {
|
|
|
|
svc
|
|
|
|
};
|
|
|
|
|
|
|
|
svc.finish(map_config(factory(), move |_| cfg.clone()))
|
2019-12-02 11:33:11 +00:00
|
|
|
.tcp()
|
2019-03-05 00:29:03 +00:00
|
|
|
},
|
2019-05-23 12:21:02 +00:00
|
|
|
)?;
|
2019-03-09 15:39:34 +00:00
|
|
|
Ok(self)
|
2019-03-05 00:29:03 +00:00
|
|
|
}
|
|
|
|
|
2019-11-20 17:33:22 +00:00
|
|
|
#[cfg(feature = "openssl")]
|
2019-03-05 00:29:03 +00:00
|
|
|
/// Use listener for accepting incoming tls connection requests
|
|
|
|
///
|
|
|
|
/// This method sets alpn protocols to "h2" and "http/1.1"
|
2019-11-20 17:33:22 +00:00
|
|
|
pub fn listen_openssl(
|
2019-05-23 12:21:02 +00:00
|
|
|
self,
|
2019-03-05 00:29:03 +00:00
|
|
|
lst: net::TcpListener,
|
|
|
|
builder: SslAcceptorBuilder,
|
|
|
|
) -> io::Result<Self> {
|
2019-05-23 12:21:02 +00:00
|
|
|
self.listen_ssl_inner(lst, openssl_acceptor(builder)?)
|
2019-03-05 00:29:03 +00:00
|
|
|
}
|
|
|
|
|
2019-11-20 17:33:22 +00:00
|
|
|
#[cfg(feature = "openssl")]
|
2019-03-09 18:53:00 +00:00
|
|
|
fn listen_ssl_inner(
|
2019-05-23 12:21:02 +00:00
|
|
|
mut self,
|
2019-03-09 18:53:00 +00:00
|
|
|
lst: net::TcpListener,
|
|
|
|
acceptor: SslAcceptor,
|
2019-05-23 12:21:02 +00:00
|
|
|
) -> io::Result<Self> {
|
2019-03-05 00:29:03 +00:00
|
|
|
let factory = self.factory.clone();
|
|
|
|
let cfg = self.config.clone();
|
|
|
|
let addr = lst.local_addr().unwrap();
|
|
|
|
self.sockets.push(Socket {
|
|
|
|
addr,
|
2019-03-29 23:28:19 +00:00
|
|
|
scheme: "https",
|
2019-03-05 00:29:03 +00:00
|
|
|
});
|
|
|
|
|
2020-10-30 02:03:26 +00:00
|
|
|
let on_connect_fn = self.on_connect_fn.clone();
|
|
|
|
|
2019-05-23 12:21:02 +00:00
|
|
|
self.builder = self.builder.listen(
|
2019-03-05 00:29:03 +00:00
|
|
|
format!("actix-web-service-{}", addr),
|
|
|
|
lst,
|
|
|
|
move || {
|
2019-12-10 03:00:51 +00:00
|
|
|
let c = cfg.lock().unwrap();
|
2019-12-20 10:04:51 +00:00
|
|
|
let cfg = AppConfig::new(
|
|
|
|
true,
|
|
|
|
addr,
|
|
|
|
c.host.clone().unwrap_or_else(|| format!("{}", addr)),
|
|
|
|
);
|
2020-10-30 02:03:26 +00:00
|
|
|
|
|
|
|
let svc = HttpService::build()
|
2019-12-02 11:33:11 +00:00
|
|
|
.keep_alive(c.keep_alive)
|
|
|
|
.client_timeout(c.client_timeout)
|
2020-10-30 02:03:26 +00:00
|
|
|
.client_disconnect(c.client_shutdown);
|
|
|
|
|
|
|
|
let svc = if let Some(handler) = on_connect_fn.clone() {
|
|
|
|
svc.on_connect_ext(move |io: &_, ext: _| {
|
|
|
|
(&*handler)(io as &dyn Any, ext)
|
|
|
|
})
|
|
|
|
} else {
|
|
|
|
svc
|
|
|
|
};
|
|
|
|
|
|
|
|
svc.finish(map_config(factory(), move |_| cfg.clone()))
|
2019-12-02 11:33:11 +00:00
|
|
|
.openssl(acceptor.clone())
|
2019-03-05 00:29:03 +00:00
|
|
|
},
|
2019-05-23 12:21:02 +00:00
|
|
|
)?;
|
|
|
|
Ok(self)
|
2019-03-05 00:29:03 +00:00
|
|
|
}
|
|
|
|
|
2019-11-20 17:33:22 +00:00
|
|
|
#[cfg(feature = "rustls")]
|
2019-03-05 00:29:03 +00:00
|
|
|
/// Use listener for accepting incoming tls connection requests
|
|
|
|
///
|
|
|
|
/// This method sets alpn protocols to "h2" and "http/1.1"
|
2019-03-29 23:28:19 +00:00
|
|
|
pub fn listen_rustls(
|
2019-05-23 12:21:02 +00:00
|
|
|
self,
|
2019-03-29 23:28:19 +00:00
|
|
|
lst: net::TcpListener,
|
|
|
|
config: RustlsServerConfig,
|
|
|
|
) -> io::Result<Self> {
|
2019-05-23 12:21:02 +00:00
|
|
|
self.listen_rustls_inner(lst, config)
|
2019-03-29 23:28:19 +00:00
|
|
|
}
|
2019-03-05 00:29:03 +00:00
|
|
|
|
2019-11-20 17:33:22 +00:00
|
|
|
#[cfg(feature = "rustls")]
|
2019-03-29 23:28:19 +00:00
|
|
|
fn listen_rustls_inner(
|
2019-05-23 12:21:02 +00:00
|
|
|
mut self,
|
2019-03-29 23:28:19 +00:00
|
|
|
lst: net::TcpListener,
|
2019-12-05 17:35:43 +00:00
|
|
|
config: RustlsServerConfig,
|
2019-05-23 12:21:02 +00:00
|
|
|
) -> io::Result<Self> {
|
2019-03-29 23:28:19 +00:00
|
|
|
let factory = self.factory.clone();
|
|
|
|
let cfg = self.config.clone();
|
|
|
|
let addr = lst.local_addr().unwrap();
|
|
|
|
self.sockets.push(Socket {
|
|
|
|
addr,
|
|
|
|
scheme: "https",
|
|
|
|
});
|
|
|
|
|
2020-10-30 02:03:26 +00:00
|
|
|
let on_connect_fn = self.on_connect_fn.clone();
|
|
|
|
|
2019-05-23 12:21:02 +00:00
|
|
|
self.builder = self.builder.listen(
|
2019-03-29 23:28:19 +00:00
|
|
|
format!("actix-web-service-{}", addr),
|
|
|
|
lst,
|
|
|
|
move || {
|
2019-12-10 03:00:51 +00:00
|
|
|
let c = cfg.lock().unwrap();
|
2019-12-20 10:04:51 +00:00
|
|
|
let cfg = AppConfig::new(
|
|
|
|
true,
|
|
|
|
addr,
|
|
|
|
c.host.clone().unwrap_or_else(|| format!("{}", addr)),
|
|
|
|
);
|
2020-10-30 02:03:26 +00:00
|
|
|
|
|
|
|
let svc = HttpService::build()
|
2019-12-05 17:35:43 +00:00
|
|
|
.keep_alive(c.keep_alive)
|
|
|
|
.client_timeout(c.client_timeout)
|
2020-10-30 02:03:26 +00:00
|
|
|
.client_disconnect(c.client_shutdown);
|
|
|
|
|
|
|
|
let svc = if let Some(handler) = on_connect_fn.clone() {
|
|
|
|
svc.on_connect_ext(move |io: &_, ext: _| {
|
|
|
|
(handler)(io as &dyn Any, ext)
|
|
|
|
})
|
|
|
|
} else {
|
|
|
|
svc
|
|
|
|
};
|
|
|
|
|
|
|
|
svc.finish(map_config(factory(), move |_| cfg.clone()))
|
2019-12-05 17:35:43 +00:00
|
|
|
.rustls(config.clone())
|
2019-03-29 23:28:19 +00:00
|
|
|
},
|
2019-05-23 12:21:02 +00:00
|
|
|
)?;
|
|
|
|
Ok(self)
|
2019-03-05 00:29:03 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/// The socket address to bind
|
|
|
|
///
|
|
|
|
/// To bind multiple addresses this method can be called multiple times.
|
|
|
|
pub fn bind<A: net::ToSocketAddrs>(mut self, addr: A) -> io::Result<Self> {
|
|
|
|
let sockets = self.bind2(addr)?;
|
|
|
|
|
|
|
|
for lst in sockets {
|
2019-03-09 15:39:34 +00:00
|
|
|
self = self.listen(lst)?;
|
2019-03-05 00:29:03 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
Ok(self)
|
|
|
|
}
|
|
|
|
|
|
|
|
fn bind2<A: net::ToSocketAddrs>(
|
|
|
|
&self,
|
|
|
|
addr: A,
|
|
|
|
) -> io::Result<Vec<net::TcpListener>> {
|
|
|
|
let mut err = None;
|
2020-09-09 08:20:54 +00:00
|
|
|
let mut success = false;
|
2019-03-05 00:29:03 +00:00
|
|
|
let mut sockets = Vec::new();
|
2020-09-09 08:20:54 +00:00
|
|
|
|
2019-03-05 00:29:03 +00:00
|
|
|
for addr in addr.to_socket_addrs()? {
|
|
|
|
match create_tcp_listener(addr, self.backlog) {
|
|
|
|
Ok(lst) => {
|
2020-09-09 08:20:54 +00:00
|
|
|
success = true;
|
2019-03-05 00:29:03 +00:00
|
|
|
sockets.push(lst);
|
|
|
|
}
|
|
|
|
Err(e) => err = Some(e),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-09-09 08:20:54 +00:00
|
|
|
if !success {
|
2019-03-05 00:29:03 +00:00
|
|
|
if let Some(e) = err.take() {
|
|
|
|
Err(e)
|
|
|
|
} else {
|
|
|
|
Err(io::Error::new(
|
|
|
|
io::ErrorKind::Other,
|
|
|
|
"Can not bind to address.",
|
|
|
|
))
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
Ok(sockets)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-11-20 17:33:22 +00:00
|
|
|
#[cfg(feature = "openssl")]
|
2019-03-05 00:29:03 +00:00
|
|
|
/// Start listening for incoming tls connections.
|
|
|
|
///
|
|
|
|
/// This method sets alpn protocols to "h2" and "http/1.1"
|
2019-11-20 17:33:22 +00:00
|
|
|
pub fn bind_openssl<A>(
|
2019-03-05 00:29:03 +00:00
|
|
|
mut self,
|
|
|
|
addr: A,
|
|
|
|
builder: SslAcceptorBuilder,
|
|
|
|
) -> io::Result<Self>
|
|
|
|
where
|
|
|
|
A: net::ToSocketAddrs,
|
|
|
|
{
|
|
|
|
let sockets = self.bind2(addr)?;
|
|
|
|
let acceptor = openssl_acceptor(builder)?;
|
|
|
|
|
|
|
|
for lst in sockets {
|
2019-05-23 12:21:02 +00:00
|
|
|
self = self.listen_ssl_inner(lst, acceptor.clone())?;
|
2019-03-05 00:29:03 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
Ok(self)
|
|
|
|
}
|
|
|
|
|
2019-11-20 17:33:22 +00:00
|
|
|
#[cfg(feature = "rustls")]
|
2019-03-05 00:29:03 +00:00
|
|
|
/// Start listening for incoming tls connections.
|
|
|
|
///
|
|
|
|
/// This method sets alpn protocols to "h2" and "http/1.1"
|
|
|
|
pub fn bind_rustls<A: net::ToSocketAddrs>(
|
2019-03-29 23:28:19 +00:00
|
|
|
mut self,
|
2019-03-05 00:29:03 +00:00
|
|
|
addr: A,
|
2019-03-29 23:28:19 +00:00
|
|
|
config: RustlsServerConfig,
|
2019-03-05 00:29:03 +00:00
|
|
|
) -> io::Result<Self> {
|
2019-03-29 23:28:19 +00:00
|
|
|
let sockets = self.bind2(addr)?;
|
|
|
|
for lst in sockets {
|
2019-05-23 12:21:02 +00:00
|
|
|
self = self.listen_rustls_inner(lst, config.clone())?;
|
2019-03-29 23:28:19 +00:00
|
|
|
}
|
|
|
|
Ok(self)
|
2019-03-05 00:29:03 +00:00
|
|
|
}
|
2019-07-18 11:24:12 +00:00
|
|
|
|
2019-11-20 17:33:22 +00:00
|
|
|
#[cfg(unix)]
|
2020-10-30 02:03:26 +00:00
|
|
|
/// Start listening for unix domain (UDS) connections on existing listener.
|
2019-09-25 09:16:51 +00:00
|
|
|
pub fn listen_uds(
|
|
|
|
mut self,
|
|
|
|
lst: std::os::unix::net::UnixListener,
|
|
|
|
) -> io::Result<Self> {
|
2019-12-02 11:33:11 +00:00
|
|
|
use actix_rt::net::UnixStream;
|
|
|
|
|
2019-09-25 09:16:51 +00:00
|
|
|
let cfg = self.config.clone();
|
|
|
|
let factory = self.factory.clone();
|
2019-12-20 10:04:51 +00:00
|
|
|
let socket_addr = net::SocketAddr::new(
|
|
|
|
net::IpAddr::V4(net::Ipv4Addr::new(127, 0, 0, 1)),
|
|
|
|
8080,
|
|
|
|
);
|
2019-09-25 09:16:51 +00:00
|
|
|
self.sockets.push(Socket {
|
|
|
|
scheme: "http",
|
2019-12-20 10:04:51 +00:00
|
|
|
addr: socket_addr,
|
2019-09-25 09:16:51 +00:00
|
|
|
});
|
|
|
|
|
|
|
|
let addr = format!("actix-web-service-{:?}", lst.local_addr()?);
|
2020-10-30 02:03:26 +00:00
|
|
|
let on_connect_fn = self.on_connect_fn.clone();
|
2019-09-25 09:16:51 +00:00
|
|
|
|
|
|
|
self.builder = self.builder.listen_uds(addr, lst, move || {
|
2019-12-10 03:00:51 +00:00
|
|
|
let c = cfg.lock().unwrap();
|
2019-12-20 10:04:51 +00:00
|
|
|
let config = AppConfig::new(
|
|
|
|
false,
|
|
|
|
socket_addr,
|
|
|
|
c.host.clone().unwrap_or_else(|| format!("{}", socket_addr)),
|
|
|
|
);
|
2020-10-30 02:03:26 +00:00
|
|
|
|
2019-12-02 11:33:11 +00:00
|
|
|
pipeline_factory(|io: UnixStream| ok((io, Protocol::Http1, None))).and_then(
|
2020-10-30 02:03:26 +00:00
|
|
|
{
|
|
|
|
let svc = HttpService::build()
|
|
|
|
.keep_alive(c.keep_alive)
|
|
|
|
.client_timeout(c.client_timeout);
|
|
|
|
|
|
|
|
let svc = if let Some(handler) = on_connect_fn.clone() {
|
|
|
|
svc.on_connect_ext(move |io: &_, ext: _| {
|
|
|
|
(&*handler)(io as &dyn Any, ext)
|
|
|
|
})
|
|
|
|
} else {
|
|
|
|
svc
|
|
|
|
};
|
|
|
|
|
|
|
|
svc.finish(map_config(factory(), move |_| config.clone()))
|
|
|
|
},
|
2019-12-02 11:33:11 +00:00
|
|
|
)
|
2019-09-25 09:16:51 +00:00
|
|
|
})?;
|
|
|
|
Ok(self)
|
|
|
|
}
|
|
|
|
|
2019-11-20 17:33:22 +00:00
|
|
|
#[cfg(unix)]
|
2019-07-18 11:24:12 +00:00
|
|
|
/// Start listening for incoming unix domain connections.
|
|
|
|
pub fn bind_uds<A>(mut self, addr: A) -> io::Result<Self>
|
|
|
|
where
|
|
|
|
A: AsRef<std::path::Path>,
|
|
|
|
{
|
2019-12-02 11:33:11 +00:00
|
|
|
use actix_rt::net::UnixStream;
|
|
|
|
|
2019-07-18 11:24:12 +00:00
|
|
|
let cfg = self.config.clone();
|
|
|
|
let factory = self.factory.clone();
|
2019-12-20 10:04:51 +00:00
|
|
|
let socket_addr = net::SocketAddr::new(
|
|
|
|
net::IpAddr::V4(net::Ipv4Addr::new(127, 0, 0, 1)),
|
|
|
|
8080,
|
|
|
|
);
|
2019-07-18 11:24:12 +00:00
|
|
|
self.sockets.push(Socket {
|
|
|
|
scheme: "http",
|
2019-12-20 10:04:51 +00:00
|
|
|
addr: socket_addr,
|
2019-07-18 11:24:12 +00:00
|
|
|
});
|
|
|
|
|
|
|
|
self.builder = self.builder.bind_uds(
|
|
|
|
format!("actix-web-service-{:?}", addr.as_ref()),
|
|
|
|
addr,
|
|
|
|
move || {
|
2019-12-10 03:00:51 +00:00
|
|
|
let c = cfg.lock().unwrap();
|
2019-12-20 10:04:51 +00:00
|
|
|
let config = AppConfig::new(
|
|
|
|
false,
|
|
|
|
socket_addr,
|
|
|
|
c.host.clone().unwrap_or_else(|| format!("{}", socket_addr)),
|
|
|
|
);
|
2019-12-02 11:33:11 +00:00
|
|
|
pipeline_factory(|io: UnixStream| ok((io, Protocol::Http1, None)))
|
|
|
|
.and_then(
|
|
|
|
HttpService::build()
|
|
|
|
.keep_alive(c.keep_alive)
|
|
|
|
.client_timeout(c.client_timeout)
|
2019-12-22 12:39:25 +00:00
|
|
|
.finish(map_config(factory(), move |_| config.clone())),
|
2019-12-02 11:33:11 +00:00
|
|
|
)
|
2019-07-18 11:24:12 +00:00
|
|
|
},
|
|
|
|
)?;
|
|
|
|
Ok(self)
|
|
|
|
}
|
2019-03-05 00:29:03 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
impl<F, I, S, B> HttpServer<F, I, S, B>
|
|
|
|
where
|
|
|
|
F: Fn() -> I + Send + Clone + 'static,
|
2021-01-03 23:47:04 +00:00
|
|
|
I: IntoServiceFactory<S, Request>,
|
|
|
|
S: ServiceFactory<Request, Config = AppConfig>,
|
2019-04-05 23:46:44 +00:00
|
|
|
S::Error: Into<Error>,
|
|
|
|
S::InitError: fmt::Debug,
|
2019-03-05 00:29:03 +00:00
|
|
|
S::Response: Into<Response<B>>,
|
|
|
|
S::Service: 'static,
|
|
|
|
B: MessageBody,
|
|
|
|
{
|
|
|
|
/// Start listening for incoming connections.
|
|
|
|
///
|
|
|
|
/// This method starts number of http workers in separate threads.
|
|
|
|
/// For each address this method starts separate thread which does
|
|
|
|
/// `accept()` in a loop.
|
|
|
|
///
|
|
|
|
/// This methods panics if no socket address can be bound or an `Actix` system is not yet
|
|
|
|
/// configured.
|
|
|
|
///
|
2019-12-07 06:28:26 +00:00
|
|
|
/// ```rust,no_run
|
2019-03-06 23:47:15 +00:00
|
|
|
/// use std::io;
|
|
|
|
/// use actix_web::{web, App, HttpResponse, HttpServer};
|
2019-03-05 00:29:03 +00:00
|
|
|
///
|
2019-12-05 17:35:43 +00:00
|
|
|
/// #[actix_rt::main]
|
|
|
|
/// async fn main() -> io::Result<()> {
|
2019-03-06 23:47:15 +00:00
|
|
|
/// HttpServer::new(|| App::new().service(web::resource("/").to(|| HttpResponse::Ok())))
|
|
|
|
/// .bind("127.0.0.1:0")?
|
2019-12-22 13:12:22 +00:00
|
|
|
/// .run()
|
2019-12-05 17:35:43 +00:00
|
|
|
/// .await
|
2019-03-05 00:29:03 +00:00
|
|
|
/// }
|
|
|
|
/// ```
|
2019-12-22 13:12:22 +00:00
|
|
|
pub fn run(self) -> Server {
|
2019-05-23 12:21:02 +00:00
|
|
|
self.builder.start()
|
2019-03-05 00:29:03 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
fn create_tcp_listener(
|
|
|
|
addr: net::SocketAddr,
|
2021-01-03 23:47:04 +00:00
|
|
|
backlog: u32,
|
2019-03-05 00:29:03 +00:00
|
|
|
) -> io::Result<net::TcpListener> {
|
2020-05-19 00:34:37 +00:00
|
|
|
use socket2::{Domain, Protocol, Socket, Type};
|
|
|
|
let domain = match addr {
|
|
|
|
net::SocketAddr::V4(_) => Domain::ipv4(),
|
|
|
|
net::SocketAddr::V6(_) => Domain::ipv6(),
|
2019-03-05 00:29:03 +00:00
|
|
|
};
|
2020-05-19 00:34:37 +00:00
|
|
|
let socket = Socket::new(domain, Type::stream(), Some(Protocol::tcp()))?;
|
|
|
|
socket.set_reuse_address(true)?;
|
|
|
|
socket.bind(&addr.into())?;
|
2021-01-03 23:47:04 +00:00
|
|
|
// clamp backlog to max u32 that fits in i32 range
|
2021-01-04 00:49:02 +00:00
|
|
|
let backlog = cmp::min(backlog, i32::MAX as u32) as i32;
|
2020-05-19 00:34:37 +00:00
|
|
|
socket.listen(backlog)?;
|
|
|
|
Ok(socket.into_tcp_listener())
|
2019-03-05 00:29:03 +00:00
|
|
|
}
|
|
|
|
|
2019-11-20 17:33:22 +00:00
|
|
|
#[cfg(feature = "openssl")]
|
2019-03-05 00:29:03 +00:00
|
|
|
/// Configure `SslAcceptorBuilder` with custom server flags.
|
|
|
|
fn openssl_acceptor(mut builder: SslAcceptorBuilder) -> io::Result<SslAcceptor> {
|
2020-09-09 08:20:54 +00:00
|
|
|
builder.set_alpn_select_callback(|_, protocols| {
|
2019-03-05 00:29:03 +00:00
|
|
|
const H2: &[u8] = b"\x02h2";
|
2019-12-02 11:33:11 +00:00
|
|
|
const H11: &[u8] = b"\x08http/1.1";
|
2020-09-09 08:20:54 +00:00
|
|
|
|
|
|
|
if protocols.windows(3).any(|window| window == H2) {
|
2019-03-05 00:29:03 +00:00
|
|
|
Ok(b"h2")
|
2020-09-09 08:20:54 +00:00
|
|
|
} else if protocols.windows(9).any(|window| window == H11) {
|
2019-12-02 11:33:11 +00:00
|
|
|
Ok(b"http/1.1")
|
2019-03-05 00:29:03 +00:00
|
|
|
} else {
|
|
|
|
Err(AlpnError::NOACK)
|
|
|
|
}
|
|
|
|
});
|
2020-09-09 08:20:54 +00:00
|
|
|
|
2019-03-05 00:29:03 +00:00
|
|
|
builder.set_alpn_protos(b"\x08http/1.1\x02h2")?;
|
|
|
|
|
|
|
|
Ok(builder.build())
|
|
|
|
}
|