1
0
Fork 0
mirror of https://github.com/actix/actix-web.git synced 2024-06-12 10:19:36 +00:00
actix-web/src/client/connector.rs

468 lines
14 KiB
Rust
Raw Normal View History

2018-11-12 07:12:54 +00:00
use std::time::Duration;
2018-12-11 02:08:33 +00:00
use actix_codec::{AsyncRead, AsyncWrite};
use actix_connector::{Resolver, TcpConnector};
2019-02-03 18:50:29 +00:00
use actix_service::{Apply, Service, ServiceExt};
2018-12-11 02:08:33 +00:00
use actix_utils::timeout::{TimeoutError, TimeoutService};
2018-11-12 07:12:54 +00:00
use trust_dns_resolver::config::{ResolverConfig, ResolverOpts};
use super::connect::Connect;
2019-01-29 18:34:27 +00:00
use super::connection::Connection;
2018-11-12 07:12:54 +00:00
use super::error::ConnectorError;
2019-01-29 04:41:09 +00:00
use super::pool::{ConnectionPool, Protocol};
2018-11-12 07:12:54 +00:00
#[cfg(feature = "ssl")]
2018-12-11 02:08:33 +00:00
use actix_connector::ssl::OpensslConnector;
2018-11-12 07:12:54 +00:00
#[cfg(feature = "ssl")]
use openssl::ssl::{SslConnector, SslMethod};
2019-01-29 04:41:09 +00:00
#[cfg(feature = "ssl")]
const H2: &[u8] = b"h2";
2018-11-12 07:12:54 +00:00
#[cfg(not(feature = "ssl"))]
type SslConnector = ();
/// Http client connector builde instance.
/// `Connector` type uses builder-like pattern for connector service construction.
pub struct Connector {
resolver: Resolver<Connect>,
timeout: Duration,
conn_lifetime: Duration,
conn_keep_alive: Duration,
disconnect_timeout: Duration,
limit: usize,
#[allow(dead_code)]
connector: SslConnector,
}
impl Default for Connector {
fn default() -> Connector {
let connector = {
#[cfg(feature = "ssl")]
{
2019-01-29 04:41:09 +00:00
use log::error;
let mut ssl = SslConnector::builder(SslMethod::tls()).unwrap();
let _ = ssl
.set_alpn_protos(b"\x02h2\x08http/1.1")
.map_err(|e| error!("Can not set alpn protocol: {:?}", e));
ssl.build()
2018-11-12 07:12:54 +00:00
}
#[cfg(not(feature = "ssl"))]
2019-01-29 18:14:00 +00:00
{}
2018-11-12 07:12:54 +00:00
};
Connector {
connector,
resolver: Resolver::default(),
timeout: Duration::from_secs(1),
conn_lifetime: Duration::from_secs(75),
conn_keep_alive: Duration::from_secs(15),
disconnect_timeout: Duration::from_millis(3000),
limit: 100,
}
}
}
impl Connector {
2018-11-26 06:14:42 +00:00
/// Use custom resolver.
pub fn resolver(mut self, resolver: Resolver<Connect>) -> Self {
self.resolver = resolver;;
self
}
2018-11-12 07:12:54 +00:00
/// Use custom resolver configuration.
pub fn resolver_config(mut self, cfg: ResolverConfig, opts: ResolverOpts) -> Self {
self.resolver = Resolver::new(cfg, opts);
self
}
/// Connection timeout, i.e. max time to connect to remote host including dns name resolution.
/// Set to 1 second by default.
pub fn timeout(mut self, timeout: Duration) -> Self {
self.timeout = timeout;
self
}
#[cfg(feature = "ssl")]
/// Use custom `SslConnector` instance.
pub fn ssl(mut self, connector: SslConnector) -> Self {
self.connector = connector;
self
}
/// Set total number of simultaneous connections per type of scheme.
///
/// If limit is 0, the connector has no limit.
/// The default limit size is 100.
pub fn limit(mut self, limit: usize) -> Self {
self.limit = limit;
self
}
/// Set keep-alive period for opened connection.
///
/// Keep-alive period is the period between connection usage. If
/// the delay between repeated usages of the same connection
/// exceeds this period, the connection is closed.
/// Default keep-alive period is 15 seconds.
pub fn conn_keep_alive(mut self, dur: Duration) -> Self {
self.conn_keep_alive = dur;
self
}
/// Set max lifetime period for connection.
///
/// Connection lifetime is max lifetime of any opened connection
/// until it is closed regardless of keep-alive period.
/// Default lifetime period is 75 seconds.
pub fn conn_lifetime(mut self, dur: Duration) -> Self {
self.conn_lifetime = dur;
self
}
/// Set server connection disconnect timeout in milliseconds.
///
/// Defines a timeout for disconnect connection. If a disconnect procedure does not complete
/// within this time, the socket get dropped. This timeout affects only secure connections.
///
/// To disable timeout set value to 0.
///
/// By default disconnect timeout is set to 3000 milliseconds.
pub fn disconnect_timeout(mut self, dur: Duration) -> Self {
self.disconnect_timeout = dur;
self
}
/// Finish configuration process and create connector service.
pub fn service(
self,
2019-02-02 04:18:44 +00:00
) -> impl Service<
Request = Connect,
Response = impl Connection,
Error = ConnectorError,
> + Clone {
2018-11-12 07:12:54 +00:00
#[cfg(not(feature = "ssl"))]
{
2019-02-03 18:50:29 +00:00
let connector = Apply::new(
TimeoutService::new(self.timeout),
2019-01-29 04:41:09 +00:00
self.resolver.map_err(ConnectorError::from).and_then(
TcpConnector::default()
.from_err()
.map(|(msg, io)| (msg, io, Protocol::Http1)),
),
2018-12-06 22:32:52 +00:00
)
.map_err(|e| match e {
2018-11-12 07:12:54 +00:00
TimeoutError::Service(e) => e,
TimeoutError::Timeout => ConnectorError::Timeout,
});
connect_impl::InnerConnector {
tcp_pool: ConnectionPool::new(
connector,
self.conn_lifetime,
self.conn_keep_alive,
None,
self.limit,
),
}
}
#[cfg(feature = "ssl")]
{
2019-02-03 18:50:29 +00:00
let ssl_service = Apply::new(
TimeoutService::new(self.timeout),
2018-11-12 07:12:54 +00:00
self.resolver
.clone()
.map_err(ConnectorError::from)
.and_then(TcpConnector::default().from_err())
.and_then(
OpensslConnector::service(self.connector)
2019-01-29 04:41:09 +00:00
.map_err(ConnectorError::from)
.map(|(msg, io)| {
let h2 = io
.get_ref()
.ssl()
.selected_alpn_protocol()
.map(|protos| protos.windows(2).any(|w| w == H2))
.unwrap_or(false);
if h2 {
(msg, io, Protocol::Http2)
} else {
(msg, io, Protocol::Http1)
}
}),
2018-11-12 07:12:54 +00:00
),
2018-12-06 22:32:52 +00:00
)
.map_err(|e| match e {
2018-11-12 07:12:54 +00:00
TimeoutError::Service(e) => e,
TimeoutError::Timeout => ConnectorError::Timeout,
});
2019-02-03 18:50:29 +00:00
let tcp_service = Apply::new(
TimeoutService::new(self.timeout),
2019-01-29 04:41:09 +00:00
self.resolver.map_err(ConnectorError::from).and_then(
TcpConnector::default()
.from_err()
.map(|(msg, io)| (msg, io, Protocol::Http1)),
),
2018-12-06 22:32:52 +00:00
)
.map_err(|e| match e {
2018-11-12 07:12:54 +00:00
TimeoutError::Service(e) => e,
TimeoutError::Timeout => ConnectorError::Timeout,
});
connect_impl::InnerConnector {
tcp_pool: ConnectionPool::new(
tcp_service,
self.conn_lifetime,
self.conn_keep_alive,
None,
self.limit,
),
ssl_pool: ConnectionPool::new(
ssl_service,
self.conn_lifetime,
self.conn_keep_alive,
Some(self.disconnect_timeout),
self.limit,
),
}
}
}
}
#[cfg(not(feature = "ssl"))]
mod connect_impl {
2019-01-29 04:41:09 +00:00
use futures::future::{err, Either, FutureResult};
use futures::Poll;
2018-11-12 07:12:54 +00:00
use super::*;
2019-01-29 04:41:09 +00:00
use crate::client::connection::IoConnection;
2018-11-12 07:12:54 +00:00
pub(crate) struct InnerConnector<T, Io>
where
Io: AsyncRead + AsyncWrite + 'static,
2019-02-02 04:18:44 +00:00
T: Service<
Request = Connect,
Response = (Connect, Io, Protocol),
Error = ConnectorError,
>,
2018-11-12 07:12:54 +00:00
{
pub(crate) tcp_pool: ConnectionPool<T, Io>,
}
impl<T, Io> Clone for InnerConnector<T, Io>
where
Io: AsyncRead + AsyncWrite + 'static,
2019-02-02 04:18:44 +00:00
T: Service<
Request = Connect,
Response = (Connect, Io, Protocol),
Error = ConnectorError,
> + Clone,
2018-11-12 07:12:54 +00:00
{
fn clone(&self) -> Self {
InnerConnector {
tcp_pool: self.tcp_pool.clone(),
}
}
}
2019-02-02 04:18:44 +00:00
impl<T, Io> Service for InnerConnector<T, Io>
2018-11-12 07:12:54 +00:00
where
Io: AsyncRead + AsyncWrite + 'static,
2019-02-02 04:18:44 +00:00
T: Service<
Request = Connect,
Response = (Connect, Io, Protocol),
Error = ConnectorError,
>,
2018-11-12 07:12:54 +00:00
{
2019-02-02 04:18:44 +00:00
type Request = Connect;
2018-11-15 19:10:23 +00:00
type Response = IoConnection<Io>;
2018-11-12 07:12:54 +00:00
type Error = ConnectorError;
type Future = Either<
2019-02-02 04:18:44 +00:00
<ConnectionPool<T, Io> as Service>::Future,
2018-11-15 19:10:23 +00:00
FutureResult<IoConnection<Io>, ConnectorError>,
2018-11-12 07:12:54 +00:00
>;
fn poll_ready(&mut self) -> Poll<(), Self::Error> {
self.tcp_pool.poll_ready()
}
2018-11-30 19:57:57 +00:00
fn call(&mut self, req: Connect) -> Self::Future {
2018-11-12 07:12:54 +00:00
if req.is_secure() {
Either::B(err(ConnectorError::SslIsNotSupported))
} else if let Err(e) = req.validate() {
Either::B(err(e))
} else {
Either::A(self.tcp_pool.call(req))
}
}
}
}
#[cfg(feature = "ssl")]
mod connect_impl {
use std::marker::PhantomData;
2019-01-29 04:41:09 +00:00
use futures::future::{err, Either, FutureResult};
2018-11-12 07:12:54 +00:00
use futures::{Async, Future, Poll};
use super::*;
2019-01-29 04:41:09 +00:00
use crate::client::connection::EitherConnection;
2018-11-12 07:12:54 +00:00
pub(crate) struct InnerConnector<T1, T2, Io1, Io2>
where
Io1: AsyncRead + AsyncWrite + 'static,
Io2: AsyncRead + AsyncWrite + 'static,
2019-01-29 04:41:09 +00:00
T1: Service<
2019-02-02 04:18:44 +00:00
Request = Connect,
2019-01-29 04:41:09 +00:00
Response = (Connect, Io1, Protocol),
Error = ConnectorError,
>,
T2: Service<
2019-02-02 04:18:44 +00:00
Request = Connect,
2019-01-29 04:41:09 +00:00
Response = (Connect, Io2, Protocol),
Error = ConnectorError,
>,
2018-11-12 07:12:54 +00:00
{
pub(crate) tcp_pool: ConnectionPool<T1, Io1>,
pub(crate) ssl_pool: ConnectionPool<T2, Io2>,
}
impl<T1, T2, Io1, Io2> Clone for InnerConnector<T1, T2, Io1, Io2>
where
Io1: AsyncRead + AsyncWrite + 'static,
Io2: AsyncRead + AsyncWrite + 'static,
2019-01-29 04:41:09 +00:00
T1: Service<
2019-02-02 04:18:44 +00:00
Request = Connect,
2019-01-29 04:41:09 +00:00
Response = (Connect, Io1, Protocol),
Error = ConnectorError,
> + Clone,
T2: Service<
2019-02-02 04:18:44 +00:00
Request = Connect,
2019-01-29 04:41:09 +00:00
Response = (Connect, Io2, Protocol),
Error = ConnectorError,
> + Clone,
2018-11-12 07:12:54 +00:00
{
fn clone(&self) -> Self {
InnerConnector {
tcp_pool: self.tcp_pool.clone(),
ssl_pool: self.ssl_pool.clone(),
}
}
}
2019-02-02 04:18:44 +00:00
impl<T1, T2, Io1, Io2> Service for InnerConnector<T1, T2, Io1, Io2>
2018-11-12 07:12:54 +00:00
where
Io1: AsyncRead + AsyncWrite + 'static,
Io2: AsyncRead + AsyncWrite + 'static,
2019-01-29 04:41:09 +00:00
T1: Service<
2019-02-02 04:18:44 +00:00
Request = Connect,
2019-01-29 04:41:09 +00:00
Response = (Connect, Io1, Protocol),
Error = ConnectorError,
>,
T2: Service<
2019-02-02 04:18:44 +00:00
Request = Connect,
2019-01-29 04:41:09 +00:00
Response = (Connect, Io2, Protocol),
Error = ConnectorError,
>,
2018-11-12 07:12:54 +00:00
{
2019-02-02 04:18:44 +00:00
type Request = Connect;
2019-01-29 04:41:09 +00:00
type Response = EitherConnection<Io1, Io2>;
2018-11-12 07:12:54 +00:00
type Error = ConnectorError;
type Future = Either<
FutureResult<Self::Response, Self::Error>,
Either<
InnerConnectorResponseA<T1, Io1, Io2>,
InnerConnectorResponseB<T2, Io1, Io2>,
>,
>;
fn poll_ready(&mut self) -> Poll<(), Self::Error> {
self.tcp_pool.poll_ready()
}
2018-11-30 19:57:57 +00:00
fn call(&mut self, req: Connect) -> Self::Future {
2018-11-12 07:12:54 +00:00
if let Err(e) = req.validate() {
Either::A(err(e))
} else if req.is_secure() {
2018-11-15 19:10:23 +00:00
Either::B(Either::B(InnerConnectorResponseB {
fut: self.ssl_pool.call(req),
2018-11-12 07:12:54 +00:00
_t: PhantomData,
}))
} else {
2018-11-15 19:10:23 +00:00
Either::B(Either::A(InnerConnectorResponseA {
fut: self.tcp_pool.call(req),
2018-11-12 07:12:54 +00:00
_t: PhantomData,
}))
}
}
}
pub(crate) struct InnerConnectorResponseA<T, Io1, Io2>
where
Io1: AsyncRead + AsyncWrite + 'static,
2019-02-02 04:18:44 +00:00
T: Service<
Request = Connect,
Response = (Connect, Io1, Protocol),
Error = ConnectorError,
>,
2018-11-12 07:12:54 +00:00
{
2019-02-02 04:18:44 +00:00
fut: <ConnectionPool<T, Io1> as Service>::Future,
2018-11-12 07:12:54 +00:00
_t: PhantomData<Io2>,
}
impl<T, Io1, Io2> Future for InnerConnectorResponseA<T, Io1, Io2>
where
2019-02-02 04:18:44 +00:00
T: Service<
Request = Connect,
Response = (Connect, Io1, Protocol),
Error = ConnectorError,
>,
2018-11-12 07:12:54 +00:00
Io1: AsyncRead + AsyncWrite + 'static,
Io2: AsyncRead + AsyncWrite + 'static,
{
2019-01-29 04:41:09 +00:00
type Item = EitherConnection<Io1, Io2>;
2018-11-12 07:12:54 +00:00
type Error = ConnectorError;
fn poll(&mut self) -> Poll<Self::Item, Self::Error> {
match self.fut.poll()? {
Async::NotReady => Ok(Async::NotReady),
2019-01-29 04:41:09 +00:00
Async::Ready(res) => Ok(Async::Ready(EitherConnection::A(res))),
2018-11-12 07:12:54 +00:00
}
}
}
pub(crate) struct InnerConnectorResponseB<T, Io1, Io2>
where
Io2: AsyncRead + AsyncWrite + 'static,
2019-02-02 04:18:44 +00:00
T: Service<
Request = Connect,
Response = (Connect, Io2, Protocol),
Error = ConnectorError,
>,
2018-11-12 07:12:54 +00:00
{
2019-02-02 04:18:44 +00:00
fut: <ConnectionPool<T, Io2> as Service>::Future,
2018-11-12 07:12:54 +00:00
_t: PhantomData<Io1>,
}
impl<T, Io1, Io2> Future for InnerConnectorResponseB<T, Io1, Io2>
where
2019-02-02 04:18:44 +00:00
T: Service<
Request = Connect,
Response = (Connect, Io2, Protocol),
Error = ConnectorError,
>,
2018-11-12 07:12:54 +00:00
Io1: AsyncRead + AsyncWrite + 'static,
Io2: AsyncRead + AsyncWrite + 'static,
{
2019-01-29 04:41:09 +00:00
type Item = EitherConnection<Io1, Io2>;
2018-11-12 07:12:54 +00:00
type Error = ConnectorError;
fn poll(&mut self) -> Poll<Self::Item, Self::Error> {
match self.fut.poll()? {
Async::NotReady => Ok(Async::NotReady),
2019-01-29 04:41:09 +00:00
Async::Ready(res) => Ok(Async::Ready(EitherConnection::B(res))),
2018-11-12 07:12:54 +00:00
}
}
}
}