1
0
Fork 0
mirror of https://github.com/actix/actix-web.git synced 2024-05-20 01:08:10 +00:00
actix-web/actix-web/src/server.rs

689 lines
23 KiB
Rust
Raw Normal View History

use std::{
any::Any,
2021-12-04 19:40:47 +00:00
cmp, fmt, io,
marker::PhantomData,
net,
sync::{Arc, Mutex},
2022-01-31 17:30:34 +00:00
time::Duration,
};
2021-06-17 16:57:58 +00:00
use actix_http::{body::MessageBody, Extensions, HttpService, KeepAlive, Request, Response};
2019-03-05 00:29:03 +00:00
use actix_server::{Server, ServerBuilder};
2021-06-17 16:57:58 +00:00
use actix_service::{
map_config, IntoServiceFactory, Service, ServiceFactory, ServiceFactoryExt as _,
};
2019-03-05 00:29:03 +00:00
2019-11-20 17:33:22 +00:00
#[cfg(feature = "openssl")]
2021-11-30 14:12:04 +00:00
use actix_tls::accept::openssl::reexports::{AlpnError, SslAcceptor, SslAcceptorBuilder};
2019-11-20 17:33:22 +00:00
#[cfg(feature = "rustls")]
2021-11-30 14:12:04 +00:00
use actix_tls::accept::rustls::reexports::ServerConfig as RustlsServerConfig;
2019-03-05 00:29:03 +00:00
2021-06-17 16:57:58 +00:00
use crate::{config::AppConfig, Error};
2019-03-05 00:29:03 +00:00
struct Socket {
scheme: &'static str,
addr: net::SocketAddr,
}
struct Config {
host: Option<String>,
2019-03-05 00:29:03 +00:00
keep_alive: KeepAlive,
2022-01-31 17:30:34 +00:00
client_request_timeout: Duration,
client_disconnect_timeout: Duration,
2019-03-05 00:29:03 +00:00
}
/// An HTTP Server.
///
2021-02-11 22:39:54 +00:00
/// Create new HTTP server with application factory.
2019-03-05 00:29:03 +00:00
///
/// ```no_run
/// use actix_web::{web, App, HttpResponse, HttpServer};
2019-03-05 00:29:03 +00:00
///
/// #[actix_rt::main]
/// async fn main() -> std::io::Result<()> {
2019-03-05 00:29:03 +00:00
/// HttpServer::new(
/// || App::new()
/// .service(web::resource("/").to(|| HttpResponse::Ok())))
2019-03-05 00:29:03 +00:00
/// .bind("127.0.0.1:59090")?
/// .run()
/// .await
2019-03-05 00:29:03 +00:00
/// }
/// ```
pub struct HttpServer<F, I, S, B>
where
F: Fn() -> I + Send + Clone + 'static,
I: IntoServiceFactory<S, Request>,
S: ServiceFactory<Request, Config = AppConfig>,
2019-04-05 23:46:44 +00:00
S::Error: Into<Error>,
S::InitError: fmt::Debug,
2019-03-05 00:29:03 +00:00
S::Response: Into<Response<B>>,
B: MessageBody,
{
pub(super) factory: F,
config: Arc<Mutex<Config>>,
backlog: u32,
2019-03-05 00:29:03 +00:00
sockets: Vec<Socket>,
builder: ServerBuilder,
2021-12-25 04:53:51 +00:00
#[allow(clippy::type_complexity)]
on_connect_fn: Option<Arc<dyn Fn(&dyn Any, &mut Extensions) + Send + Sync>>,
2021-01-04 00:49:02 +00:00
_phantom: PhantomData<(S, B)>,
2019-03-05 00:29:03 +00:00
}
impl<F, I, S, B> HttpServer<F, I, S, B>
where
F: Fn() -> I + Send + Clone + 'static,
I: IntoServiceFactory<S, Request>,
S: ServiceFactory<Request, Config = AppConfig> + 'static,
2019-11-20 17:33:22 +00:00
S::Error: Into<Error> + 'static,
2019-04-05 23:46:44 +00:00
S::InitError: fmt::Debug,
2019-11-20 17:33:22 +00:00
S::Response: Into<Response<B>> + 'static,
<S::Service as Service<Request>>::Future: 'static,
S::Service: 'static,
2021-12-04 19:40:47 +00:00
2019-03-07 07:06:14 +00:00
B: MessageBody + 'static,
2019-03-05 00:29:03 +00:00
{
2021-02-11 22:39:54 +00:00
/// Create new HTTP server with application factory
2019-03-05 00:29:03 +00:00
pub fn new(factory: F) -> Self {
HttpServer {
factory,
config: Arc::new(Mutex::new(Config {
host: None,
2022-01-31 17:30:34 +00:00
keep_alive: KeepAlive::default(),
client_request_timeout: Duration::from_secs(5),
client_disconnect_timeout: Duration::from_secs(1),
2019-03-05 00:29:03 +00:00
})),
2019-03-11 22:26:05 +00:00
backlog: 1024,
2019-03-05 00:29:03 +00:00
sockets: Vec::new(),
builder: ServerBuilder::default(),
on_connect_fn: None,
2021-01-04 00:49:02 +00:00
_phantom: PhantomData,
}
}
/// Sets function that will be called once before each connection is handled.
/// It will receive a `&std::any::Any`, which contains underlying connection type and an
/// [Extensions] container so that connection data can be accessed in middleware and handlers.
///
/// # Connection Types
2021-11-30 14:12:04 +00:00
/// - `actix_tls::accept::openssl::TlsStream<actix_web::rt::net::TcpStream>` when using openssl.
/// - `actix_tls::accept::rustls::TlsStream<actix_web::rt::net::TcpStream>` when using rustls.
/// - `actix_web::rt::net::TcpStream` when no encryption is used.
///
2021-11-30 14:12:04 +00:00
/// See the `on_connect` example for additional details.
pub fn on_connect<CB>(self, f: CB) -> HttpServer<F, I, S, B>
where
CB: Fn(&dyn Any, &mut Extensions) + Send + Sync + 'static,
{
HttpServer {
factory: self.factory,
config: self.config,
backlog: self.backlog,
sockets: self.sockets,
builder: self.builder,
on_connect_fn: Some(Arc::new(f)),
2021-01-04 00:49:02 +00:00
_phantom: PhantomData,
2019-03-05 00:29:03 +00:00
}
}
/// Set number of workers to start.
///
2021-02-11 22:39:54 +00:00
/// By default, server uses number of available logical CPU as thread count.
2019-03-05 00:29:03 +00:00
pub fn workers(mut self, num: usize) -> Self {
self.builder = self.builder.workers(num);
2019-03-05 00:29:03 +00:00
self
}
/// Set the maximum number of pending connections.
///
/// This refers to the number of clients that can be waiting to be served.
/// Exceeding this number results in the client getting an error when
/// attempting to connect. It should only affect servers under significant
/// load.
///
/// Generally set in the 64-2048 range. Default value is 2048.
///
/// This method should be called before `bind()` method call.
pub fn backlog(mut self, backlog: u32) -> Self {
2019-03-11 22:26:05 +00:00
self.backlog = backlog;
self.builder = self.builder.backlog(backlog);
2019-03-05 00:29:03 +00:00
self
}
/// Sets the maximum per-worker number of concurrent connections.
///
2020-09-09 08:20:54 +00:00
/// All socket listeners will stop accepting connections when this limit is reached for
/// each worker.
2019-03-05 00:29:03 +00:00
///
/// By default max connections is set to a 25k.
2020-09-09 08:20:54 +00:00
pub fn max_connections(mut self, num: usize) -> Self {
2021-11-15 04:03:33 +00:00
self.builder = self.builder.max_concurrent_connections(num);
2019-03-05 00:29:03 +00:00
self
}
/// Sets the maximum per-worker concurrent connection establish process.
///
2020-09-09 08:20:54 +00:00
/// All listeners will stop accepting connections when this limit is reached. It can be used to
/// limit the global TLS CPU usage.
2019-03-05 00:29:03 +00:00
///
/// By default max connections is set to a 256.
#[allow(unused_variables)]
2020-09-09 08:20:54 +00:00
pub fn max_connection_rate(self, num: usize) -> Self {
#[cfg(any(feature = "rustls", feature = "openssl"))]
actix_tls::accept::max_concurrent_tls_connect(num);
2019-03-05 00:29:03 +00:00
self
}
/// Set max number of threads for each worker's blocking task thread pool.
///
/// One thread pool is set up **per worker**; not shared across workers.
///
/// By default set to 512 / workers.
pub fn worker_max_blocking_threads(mut self, num: usize) -> Self {
self.builder = self.builder.worker_max_blocking_threads(num);
self
}
2019-03-05 00:29:03 +00:00
/// Set server keep-alive setting.
///
/// By default keep alive is set to a 5 seconds.
pub fn keep_alive<T: Into<KeepAlive>>(self, val: T) -> Self {
2019-12-10 03:00:51 +00:00
self.config.lock().unwrap().keep_alive = val.into();
2019-03-05 00:29:03 +00:00
self
}
/// Set server client timeout in milliseconds for first request.
///
/// Defines a timeout for reading client request header. If a client does not transmit
/// the entire set headers within this time, the request is terminated with
/// the 408 (Request Time-out) error.
///
/// To disable timeout set value to 0.
///
/// By default client timeout is set to 5000 milliseconds.
2022-01-31 17:30:34 +00:00
pub fn client_request_timeout(self, dur: Duration) -> Self {
self.config.lock().unwrap().client_request_timeout = dur;
2019-03-05 00:29:03 +00:00
self
}
2022-01-31 17:30:34 +00:00
#[doc(hidden)]
#[deprecated(since = "4.0.0", note = "Renamed to `client_request_timeout`.")]
pub fn client_timeout(self, dur: Duration) -> Self {
self.client_request_timeout(dur)
}
2019-03-05 00:29:03 +00:00
/// Set server connection shutdown timeout in milliseconds.
///
/// Defines a timeout for shutdown connection. If a shutdown procedure does not complete
/// within this time, the request is dropped.
///
/// To disable timeout set value to 0.
///
/// By default client timeout is set to 5000 milliseconds.
2022-01-31 17:30:34 +00:00
pub fn client_disconnect_timeout(self, dur: Duration) -> Self {
self.config.lock().unwrap().client_disconnect_timeout = dur;
2019-03-05 00:29:03 +00:00
self
}
2022-01-31 17:30:34 +00:00
#[doc(hidden)]
#[deprecated(since = "4.0.0", note = "Renamed to `client_request_timeout`.")]
pub fn client_shutdown(self, dur: u64) -> Self {
self.client_disconnect_timeout(Duration::from_millis(dur))
}
2019-03-05 00:29:03 +00:00
/// Set server host name.
///
/// Host name is used by application router as a hostname for url generation.
/// Check [ConnectionInfo](super::dev::ConnectionInfo::host())
/// documentation for more information.
///
/// By default host name is set to a "localhost" value.
pub fn server_hostname<T: AsRef<str>>(self, val: T) -> Self {
self.config.lock().unwrap().host = Some(val.as_ref().to_owned());
2019-03-05 00:29:03 +00:00
self
}
2021-11-15 04:03:33 +00:00
/// Stop Actix `System` after server shutdown.
2019-03-05 00:29:03 +00:00
pub fn system_exit(mut self) -> Self {
self.builder = self.builder.system_exit();
2019-03-05 00:29:03 +00:00
self
}
/// Disable signal handling
pub fn disable_signals(mut self) -> Self {
self.builder = self.builder.disable_signals();
2019-03-05 00:29:03 +00:00
self
}
/// Timeout for graceful workers shutdown.
///
/// After receiving a stop signal, workers have this much time to finish
/// serving requests. Workers still alive after the timeout are force
/// dropped.
///
/// By default shutdown timeout sets to 30 seconds.
pub fn shutdown_timeout(mut self, sec: u64) -> Self {
self.builder = self.builder.shutdown_timeout(sec);
2019-03-05 00:29:03 +00:00
self
}
/// Get addresses of bound sockets.
pub fn addrs(&self) -> Vec<net::SocketAddr> {
self.sockets.iter().map(|s| s.addr).collect()
}
/// Get addresses of bound sockets and the scheme for it.
///
/// This is useful when the server is bound from different sources
2021-02-11 22:39:54 +00:00
/// with some sockets listening on HTTP and some listening on HTTPS
2019-03-05 00:29:03 +00:00
/// and the user should be presented with an enumeration of which
/// socket requires which protocol.
pub fn addrs_with_scheme(&self) -> Vec<(net::SocketAddr, &str)> {
self.sockets.iter().map(|s| (s.addr, s.scheme)).collect()
}
/// Use listener for accepting incoming connection requests
///
/// HttpServer does not change any configuration for TcpListener,
/// it needs to be configured before passing it to listen() method.
pub fn listen(mut self, lst: net::TcpListener) -> io::Result<Self> {
2019-03-05 00:29:03 +00:00
let cfg = self.config.clone();
let factory = self.factory.clone();
let addr = lst.local_addr().unwrap();
self.sockets.push(Socket {
addr,
scheme: "http",
});
let on_connect_fn = self.on_connect_fn.clone();
2019-03-05 00:29:03 +00:00
2021-02-11 23:03:17 +00:00
self.builder =
self.builder
.listen(format!("actix-web-service-{}", addr), lst, move || {
let c = cfg.lock().unwrap();
let host = c.host.clone().unwrap_or_else(|| format!("{}", addr));
let mut svc = HttpService::build()
2021-02-11 23:03:17 +00:00
.keep_alive(c.keep_alive)
2022-01-31 17:30:34 +00:00
.client_request_timeout(c.client_request_timeout)
.client_disconnect_timeout(c.client_disconnect_timeout)
2021-02-11 23:03:17 +00:00
.local_addr(addr);
if let Some(handler) = on_connect_fn.clone() {
svc = svc.on_connect_ext(move |io: &_, ext: _| {
(handler)(io as &dyn Any, ext)
})
2021-02-11 23:03:17 +00:00
};
2021-06-17 16:57:58 +00:00
let fac = factory()
.into_factory()
.map_err(|err| err.into().error_response());
svc.finish(map_config(fac, move |_| {
AppConfig::new(false, host.clone(), addr)
2021-02-11 23:03:17 +00:00
}))
.tcp()
})?;
Ok(self)
2019-03-05 00:29:03 +00:00
}
2019-11-20 17:33:22 +00:00
#[cfg(feature = "openssl")]
2019-03-05 00:29:03 +00:00
/// Use listener for accepting incoming tls connection requests
///
/// This method sets alpn protocols to "h2" and "http/1.1"
2019-11-20 17:33:22 +00:00
pub fn listen_openssl(
self,
2019-03-05 00:29:03 +00:00
lst: net::TcpListener,
builder: SslAcceptorBuilder,
) -> io::Result<Self> {
self.listen_ssl_inner(lst, openssl_acceptor(builder)?)
2019-03-05 00:29:03 +00:00
}
2019-11-20 17:33:22 +00:00
#[cfg(feature = "openssl")]
fn listen_ssl_inner(
mut self,
lst: net::TcpListener,
acceptor: SslAcceptor,
) -> io::Result<Self> {
2019-03-05 00:29:03 +00:00
let factory = self.factory.clone();
let cfg = self.config.clone();
let addr = lst.local_addr().unwrap();
self.sockets.push(Socket {
addr,
2019-03-29 23:28:19 +00:00
scheme: "https",
2019-03-05 00:29:03 +00:00
});
let on_connect_fn = self.on_connect_fn.clone();
2021-02-11 23:03:17 +00:00
self.builder =
self.builder
.listen(format!("actix-web-service-{}", addr), lst, move || {
let c = cfg.lock().unwrap();
let host = c.host.clone().unwrap_or_else(|| format!("{}", addr));
2021-02-11 23:03:17 +00:00
let svc = HttpService::build()
.keep_alive(c.keep_alive)
2022-01-31 17:30:34 +00:00
.client_request_timeout(c.client_request_timeout)
.client_disconnect_timeout(c.client_disconnect_timeout)
2021-07-12 15:55:24 +00:00
.local_addr(addr);
2021-02-11 23:03:17 +00:00
let svc = if let Some(handler) = on_connect_fn.clone() {
svc.on_connect_ext(move |io: &_, ext: _| {
(&*handler)(io as &dyn Any, ext)
})
} else {
svc
};
2021-06-17 16:57:58 +00:00
let fac = factory()
.into_factory()
.map_err(|err| err.into().error_response());
svc.finish(map_config(fac, move |_| {
AppConfig::new(true, host.clone(), addr)
2021-02-11 23:03:17 +00:00
}))
.openssl(acceptor.clone())
})?;
Ok(self)
2019-03-05 00:29:03 +00:00
}
2019-11-20 17:33:22 +00:00
#[cfg(feature = "rustls")]
2019-03-05 00:29:03 +00:00
/// Use listener for accepting incoming tls connection requests
///
/// This method prepends alpn protocols "h2" and "http/1.1" to configured ones
2019-03-29 23:28:19 +00:00
pub fn listen_rustls(
self,
2019-03-29 23:28:19 +00:00
lst: net::TcpListener,
config: RustlsServerConfig,
) -> io::Result<Self> {
self.listen_rustls_inner(lst, config)
2019-03-29 23:28:19 +00:00
}
2019-03-05 00:29:03 +00:00
2019-11-20 17:33:22 +00:00
#[cfg(feature = "rustls")]
2019-03-29 23:28:19 +00:00
fn listen_rustls_inner(
mut self,
2019-03-29 23:28:19 +00:00
lst: net::TcpListener,
2019-12-05 17:35:43 +00:00
config: RustlsServerConfig,
) -> io::Result<Self> {
2019-03-29 23:28:19 +00:00
let factory = self.factory.clone();
let cfg = self.config.clone();
let addr = lst.local_addr().unwrap();
self.sockets.push(Socket {
addr,
scheme: "https",
});
let on_connect_fn = self.on_connect_fn.clone();
2021-02-11 23:03:17 +00:00
self.builder =
self.builder
.listen(format!("actix-web-service-{}", addr), lst, move || {
let c = cfg.lock().unwrap();
let host = c.host.clone().unwrap_or_else(|| format!("{}", addr));
2021-02-11 23:03:17 +00:00
let svc = HttpService::build()
.keep_alive(c.keep_alive)
2022-01-31 17:30:34 +00:00
.client_request_timeout(c.client_request_timeout)
.client_disconnect_timeout(c.client_disconnect_timeout);
2021-02-11 23:03:17 +00:00
let svc = if let Some(handler) = on_connect_fn.clone() {
svc.on_connect_ext(move |io: &_, ext: _| (handler)(io as &dyn Any, ext))
} else {
svc
};
2021-06-17 16:57:58 +00:00
let fac = factory()
.into_factory()
.map_err(|err| err.into().error_response());
svc.finish(map_config(fac, move |_| {
AppConfig::new(true, host.clone(), addr)
2021-02-11 23:03:17 +00:00
}))
.rustls(config.clone())
})?;
Ok(self)
2019-03-05 00:29:03 +00:00
}
/// The socket address to bind
///
/// To bind multiple addresses this method can be called multiple times.
pub fn bind<A: net::ToSocketAddrs>(mut self, addr: A) -> io::Result<Self> {
let sockets = self.bind2(addr)?;
for lst in sockets {
self = self.listen(lst)?;
2019-03-05 00:29:03 +00:00
}
Ok(self)
}
2021-02-11 23:03:17 +00:00
fn bind2<A: net::ToSocketAddrs>(&self, addr: A) -> io::Result<Vec<net::TcpListener>> {
2019-03-05 00:29:03 +00:00
let mut err = None;
2020-09-09 08:20:54 +00:00
let mut success = false;
2019-03-05 00:29:03 +00:00
let mut sockets = Vec::new();
2020-09-09 08:20:54 +00:00
2019-03-05 00:29:03 +00:00
for addr in addr.to_socket_addrs()? {
match create_tcp_listener(addr, self.backlog) {
Ok(lst) => {
2020-09-09 08:20:54 +00:00
success = true;
2019-03-05 00:29:03 +00:00
sockets.push(lst);
}
Err(e) => err = Some(e),
}
}
if success {
2019-03-05 00:29:03 +00:00
Ok(sockets)
} else if let Some(e) = err.take() {
Err(e)
} else {
Err(io::Error::new(
io::ErrorKind::Other,
"Can not bind to address.",
))
2019-03-05 00:29:03 +00:00
}
}
2019-11-20 17:33:22 +00:00
#[cfg(feature = "openssl")]
2019-03-05 00:29:03 +00:00
/// Start listening for incoming tls connections.
///
/// This method sets alpn protocols to "h2" and "http/1.1"
2021-02-11 23:03:17 +00:00
pub fn bind_openssl<A>(mut self, addr: A, builder: SslAcceptorBuilder) -> io::Result<Self>
2019-03-05 00:29:03 +00:00
where
A: net::ToSocketAddrs,
{
let sockets = self.bind2(addr)?;
let acceptor = openssl_acceptor(builder)?;
for lst in sockets {
self = self.listen_ssl_inner(lst, acceptor.clone())?;
2019-03-05 00:29:03 +00:00
}
Ok(self)
}
2019-11-20 17:33:22 +00:00
#[cfg(feature = "rustls")]
2019-03-05 00:29:03 +00:00
/// Start listening for incoming tls connections.
///
/// This method prepends alpn protocols "h2" and "http/1.1" to configured ones
2019-03-05 00:29:03 +00:00
pub fn bind_rustls<A: net::ToSocketAddrs>(
2019-03-29 23:28:19 +00:00
mut self,
2019-03-05 00:29:03 +00:00
addr: A,
2019-03-29 23:28:19 +00:00
config: RustlsServerConfig,
2019-03-05 00:29:03 +00:00
) -> io::Result<Self> {
2019-03-29 23:28:19 +00:00
let sockets = self.bind2(addr)?;
for lst in sockets {
self = self.listen_rustls_inner(lst, config.clone())?;
2019-03-29 23:28:19 +00:00
}
Ok(self)
2019-03-05 00:29:03 +00:00
}
2019-11-20 17:33:22 +00:00
#[cfg(unix)]
/// Start listening for unix domain (UDS) connections on existing listener.
2021-02-11 23:03:17 +00:00
pub fn listen_uds(mut self, lst: std::os::unix::net::UnixListener) -> io::Result<Self> {
use actix_http::Protocol;
2019-12-02 11:33:11 +00:00
use actix_rt::net::UnixStream;
2021-04-16 19:28:21 +00:00
use actix_service::{fn_service, ServiceFactoryExt as _};
2019-12-02 11:33:11 +00:00
let cfg = self.config.clone();
let factory = self.factory.clone();
2021-02-11 23:03:17 +00:00
let socket_addr =
net::SocketAddr::new(net::IpAddr::V4(net::Ipv4Addr::new(127, 0, 0, 1)), 8080);
self.sockets.push(Socket {
scheme: "http",
addr: socket_addr,
});
2021-07-12 15:55:24 +00:00
let addr = lst.local_addr()?;
let name = format!("actix-web-service-{:?}", addr);
let on_connect_fn = self.on_connect_fn.clone();
2021-07-12 15:55:24 +00:00
self.builder = self.builder.listen_uds(name, lst, move || {
2019-12-10 03:00:51 +00:00
let c = cfg.lock().unwrap();
let config = AppConfig::new(
false,
c.host.clone().unwrap_or_else(|| format!("{}", socket_addr)),
socket_addr,
);
2021-04-16 19:28:21 +00:00
fn_service(|io: UnixStream| async { Ok((io, Protocol::Http1, None)) }).and_then({
let mut svc = HttpService::build()
2021-04-16 19:28:21 +00:00
.keep_alive(c.keep_alive)
2022-01-31 17:30:34 +00:00
.client_request_timeout(c.client_request_timeout)
.client_disconnect_timeout(c.client_disconnect_timeout);
if let Some(handler) = on_connect_fn.clone() {
svc = svc
.on_connect_ext(move |io: &_, ext: _| (&*handler)(io as &dyn Any, ext));
}
2021-06-17 16:57:58 +00:00
let fac = factory()
.into_factory()
.map_err(|err| err.into().error_response());
svc.finish(map_config(fac, move |_| config.clone()))
2021-04-16 19:28:21 +00:00
})
})?;
Ok(self)
}
/// Start listening for incoming unix domain connections.
2021-07-12 15:55:24 +00:00
#[cfg(unix)]
pub fn bind_uds<A>(mut self, addr: A) -> io::Result<Self>
where
A: AsRef<std::path::Path>,
{
use actix_http::Protocol;
2019-12-02 11:33:11 +00:00
use actix_rt::net::UnixStream;
2021-04-16 19:28:21 +00:00
use actix_service::{fn_service, ServiceFactoryExt as _};
2019-12-02 11:33:11 +00:00
let cfg = self.config.clone();
let factory = self.factory.clone();
2021-02-11 23:03:17 +00:00
let socket_addr =
net::SocketAddr::new(net::IpAddr::V4(net::Ipv4Addr::new(127, 0, 0, 1)), 8080);
2021-07-12 15:55:24 +00:00
self.sockets.push(Socket {
scheme: "http",
addr: socket_addr,
});
self.builder = self.builder.bind_uds(
format!("actix-web-service-{:?}", addr.as_ref()),
addr,
move || {
2019-12-10 03:00:51 +00:00
let c = cfg.lock().unwrap();
let config = AppConfig::new(
false,
c.host.clone().unwrap_or_else(|| format!("{}", socket_addr)),
socket_addr,
);
2021-06-17 16:57:58 +00:00
let fac = factory()
.into_factory()
.map_err(|err| err.into().error_response());
2021-04-16 19:28:21 +00:00
fn_service(|io: UnixStream| async { Ok((io, Protocol::Http1, None)) }).and_then(
HttpService::build()
.keep_alive(c.keep_alive)
2022-01-31 17:30:34 +00:00
.client_request_timeout(c.client_request_timeout)
.client_disconnect_timeout(c.client_disconnect_timeout)
2021-06-17 16:57:58 +00:00
.finish(map_config(fac, move |_| config.clone())),
2021-04-16 19:28:21 +00:00
)
},
)?;
2021-06-17 16:57:58 +00:00
Ok(self)
}
2019-03-05 00:29:03 +00:00
}
impl<F, I, S, B> HttpServer<F, I, S, B>
where
F: Fn() -> I + Send + Clone + 'static,
I: IntoServiceFactory<S, Request>,
S: ServiceFactory<Request, Config = AppConfig>,
2019-04-05 23:46:44 +00:00
S::Error: Into<Error>,
S::InitError: fmt::Debug,
2019-03-05 00:29:03 +00:00
S::Response: Into<Response<B>>,
S::Service: 'static,
B: MessageBody,
{
/// Start listening for incoming connections.
///
2021-02-11 22:39:54 +00:00
/// This method starts number of HTTP workers in separate threads.
2019-03-05 00:29:03 +00:00
/// For each address this method starts separate thread which does
/// `accept()` in a loop.
///
/// This methods panics if no socket address can be bound or an `Actix` system is not yet
/// configured.
///
/// ```no_run
/// use std::io;
/// use actix_web::{web, App, HttpResponse, HttpServer};
2019-03-05 00:29:03 +00:00
///
2019-12-05 17:35:43 +00:00
/// #[actix_rt::main]
/// async fn main() -> io::Result<()> {
/// HttpServer::new(|| App::new().service(web::resource("/").to(|| HttpResponse::Ok())))
/// .bind("127.0.0.1:0")?
/// .run()
2019-12-05 17:35:43 +00:00
/// .await
2019-03-05 00:29:03 +00:00
/// }
/// ```
pub fn run(self) -> Server {
self.builder.run()
2019-03-05 00:29:03 +00:00
}
}
2021-02-11 23:03:17 +00:00
fn create_tcp_listener(addr: net::SocketAddr, backlog: u32) -> io::Result<net::TcpListener> {
use socket2::{Domain, Protocol, Socket, Type};
2021-03-19 12:17:06 +00:00
let domain = Domain::for_address(addr);
let socket = Socket::new(domain, Type::STREAM, Some(Protocol::TCP))?;
socket.set_reuse_address(true)?;
socket.bind(&addr.into())?;
// clamp backlog to max u32 that fits in i32 range
2021-01-04 00:49:02 +00:00
let backlog = cmp::min(backlog, i32::MAX as u32) as i32;
socket.listen(backlog)?;
2021-03-19 12:17:06 +00:00
Ok(net::TcpListener::from(socket))
2019-03-05 00:29:03 +00:00
}
/// Configure `SslAcceptorBuilder` with custom server flags.
2021-12-04 19:40:47 +00:00
#[cfg(feature = "openssl")]
2019-03-05 00:29:03 +00:00
fn openssl_acceptor(mut builder: SslAcceptorBuilder) -> io::Result<SslAcceptor> {
2020-09-09 08:20:54 +00:00
builder.set_alpn_select_callback(|_, protocols| {
2019-03-05 00:29:03 +00:00
const H2: &[u8] = b"\x02h2";
2019-12-02 11:33:11 +00:00
const H11: &[u8] = b"\x08http/1.1";
2020-09-09 08:20:54 +00:00
if protocols.windows(3).any(|window| window == H2) {
2019-03-05 00:29:03 +00:00
Ok(b"h2")
2020-09-09 08:20:54 +00:00
} else if protocols.windows(9).any(|window| window == H11) {
2019-12-02 11:33:11 +00:00
Ok(b"http/1.1")
2019-03-05 00:29:03 +00:00
} else {
Err(AlpnError::NOACK)
}
});
2020-09-09 08:20:54 +00:00
2019-03-05 00:29:03 +00:00
builder.set_alpn_protos(b"\x08http/1.1\x02h2")?;
Ok(builder.build())
}