2019-08-28 14:01:10 +00:00
|
|
|
use std::sync::Arc;
|
|
|
|
|
2020-04-17 12:11:25 +00:00
|
|
|
use anyhow::{format_err, Error};
|
2019-06-29 12:57:54 +00:00
|
|
|
use futures::*;
|
|
|
|
use hyper::{Request, Response, Body};
|
2019-07-02 11:33:58 +00:00
|
|
|
use openssl::ssl::{SslMethod, SslAcceptor, SslFiletype};
|
2019-08-28 14:01:10 +00:00
|
|
|
use tokio::net::{TcpListener, TcpStream};
|
2019-06-29 12:57:54 +00:00
|
|
|
|
2019-08-28 14:01:10 +00:00
|
|
|
use proxmox_backup::configdir;
|
2019-06-29 12:57:54 +00:00
|
|
|
|
2019-08-28 14:01:10 +00:00
|
|
|
// Simple H2 server to test H2 speed with h2s-client.rs
|
2019-06-29 12:57:54 +00:00
|
|
|
|
2020-01-20 11:52:22 +00:00
|
|
|
fn main() -> Result<(), Error> {
|
|
|
|
proxmox_backup::tools::runtime::main(run())
|
|
|
|
}
|
|
|
|
|
|
|
|
async fn run() -> Result<(), Error> {
|
2019-07-02 11:33:58 +00:00
|
|
|
let key_path = configdir!("/proxy.key");
|
|
|
|
let cert_path = configdir!("/proxy.pem");
|
2019-06-29 12:57:54 +00:00
|
|
|
|
2019-07-02 11:33:58 +00:00
|
|
|
let mut acceptor = SslAcceptor::mozilla_intermediate(SslMethod::tls()).unwrap();
|
|
|
|
acceptor.set_private_key_file(key_path, SslFiletype::PEM)
|
|
|
|
.map_err(|err| format_err!("unable to read proxy key {} - {}", key_path, err))?;
|
|
|
|
acceptor.set_certificate_chain_file(cert_path)
|
|
|
|
.map_err(|err| format_err!("unable to read proxy cert {} - {}", cert_path, err))?;
|
|
|
|
acceptor.check_private_key().unwrap();
|
2019-06-29 12:57:54 +00:00
|
|
|
|
2019-07-02 11:33:58 +00:00
|
|
|
let acceptor = Arc::new(acceptor.build());
|
2019-06-29 12:57:54 +00:00
|
|
|
|
2019-12-12 14:27:07 +00:00
|
|
|
let mut listener = TcpListener::bind(std::net::SocketAddr::from(([127,0,0,1], 8008))).await?;
|
2019-06-29 12:57:54 +00:00
|
|
|
|
|
|
|
println!("listening on {:?}", listener.local_addr());
|
|
|
|
|
2019-12-12 14:27:07 +00:00
|
|
|
loop {
|
|
|
|
let (socket, _addr) = listener.accept().await?;
|
2019-08-28 14:01:10 +00:00
|
|
|
tokio::spawn(handle_connection(socket, Arc::clone(&acceptor))
|
|
|
|
.map(|res| {
|
|
|
|
if let Err(err) = res {
|
|
|
|
eprintln!("Error: {}", err);
|
2019-06-29 12:57:54 +00:00
|
|
|
}
|
2019-08-28 14:01:10 +00:00
|
|
|
}));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
async fn handle_connection(
|
|
|
|
socket: TcpStream,
|
|
|
|
acceptor: Arc<SslAcceptor>,
|
|
|
|
) -> Result<(), Error> {
|
|
|
|
socket.set_nodelay(true).unwrap();
|
|
|
|
socket.set_send_buffer_size(1024*1024).unwrap();
|
|
|
|
socket.set_recv_buffer_size(1024*1024).unwrap();
|
|
|
|
|
|
|
|
let socket = tokio_openssl::accept(acceptor.as_ref(), socket).await?;
|
|
|
|
|
|
|
|
let mut http = hyper::server::conn::Http::new();
|
|
|
|
http.http2_only(true);
|
|
|
|
// increase window size: todo - find optiomal size
|
|
|
|
let max_window_size = (1 << 31) - 2;
|
|
|
|
http.http2_initial_stream_window_size(max_window_size);
|
|
|
|
http.http2_initial_connection_window_size(max_window_size);
|
|
|
|
|
|
|
|
let service = hyper::service::service_fn(|_req: Request<Body>| {
|
|
|
|
println!("Got request");
|
|
|
|
let buffer = vec![65u8; 1024*1024]; // nonsense [A,A,A,A...]
|
|
|
|
let body = Body::from(buffer);
|
|
|
|
|
|
|
|
let response = Response::builder()
|
|
|
|
.status(http::StatusCode::OK)
|
|
|
|
.header(http::header::CONTENT_TYPE, "application/octet-stream")
|
|
|
|
.body(body)
|
|
|
|
.unwrap();
|
|
|
|
future::ok::<_, Error>(response)
|
|
|
|
});
|
|
|
|
|
|
|
|
http.serve_connection(socket, service)
|
|
|
|
.map_err(Error::from)
|
|
|
|
.await?;
|
2019-06-29 12:57:54 +00:00
|
|
|
|
2019-08-28 14:01:10 +00:00
|
|
|
println!("H2 connection CLOSE !");
|
2019-06-29 12:57:54 +00:00
|
|
|
Ok(())
|
|
|
|
}
|