examples: unify h2 examples

update them to the new tokio-openssl API and remove socket buffer size
setting - it was removed from the TcpStream API, and is now only
available via TcpSocket (which can in turn be converted to a
TcpListener), but this is not needed for this example.

Signed-off-by: Fabian Grünbichler <f.gruenbichler@proxmox.com>
This commit is contained in:
Fabian Grünbichler 2020-12-04 12:59:34 +01:00
parent 89e9134a3f
commit 19f5aa252f
4 changed files with 100 additions and 102 deletions

View File

@ -2,7 +2,7 @@ use std::future::Future;
use std::pin::Pin; use std::pin::Pin;
use std::task::{Context, Poll}; use std::task::{Context, Poll};
use anyhow::{Error}; use anyhow::Error;
use futures::future::TryFutureExt; use futures::future::TryFutureExt;
use futures::stream::Stream; use futures::stream::Stream;
use tokio::net::TcpStream; use tokio::net::TcpStream;
@ -38,11 +38,11 @@ impl Future for Process {
this.body.flow_control().release_capacity(chunk.len())?; this.body.flow_control().release_capacity(chunk.len())?;
this.bytes += chunk.len(); this.bytes += chunk.len();
// println!("GOT FRAME {}", chunk.len()); // println!("GOT FRAME {}", chunk.len());
}, }
Some(Err(err)) => return Poll::Ready(Err(Error::from(err))), Some(Err(err)) => return Poll::Ready(Err(Error::from(err))),
None => { None => {
this.trailers = true; this.trailers = true;
}, }
} }
} }
} }
@ -52,7 +52,6 @@ impl Future for Process {
fn send_request( fn send_request(
mut client: h2::client::SendRequest<bytes::Bytes>, mut client: h2::client::SendRequest<bytes::Bytes>,
) -> impl Future<Output = Result<usize, Error>> { ) -> impl Future<Output = Result<usize, Error>> {
println!("sending request"); println!("sending request");
let request = http::Request::builder() let request = http::Request::builder()
@ -62,10 +61,10 @@ fn send_request(
let (response, _stream) = client.send_request(request, true).unwrap(); let (response, _stream) = client.send_request(request, true).unwrap();
response response.map_err(Error::from).and_then(|response| Process {
.map_err(Error::from) body: response.into_body(),
.and_then(|response| { trailers: false,
Process { body: response.into_body(), trailers: false, bytes: 0 } bytes: 0,
}) })
} }
@ -74,16 +73,15 @@ fn main() -> Result<(), Error> {
} }
async fn run() -> Result<(), Error> { async fn run() -> Result<(), Error> {
let start = std::time::SystemTime::now(); let start = std::time::SystemTime::now();
let conn = TcpStream::connect(std::net::SocketAddr::from(([127,0,0,1], 8008))) let conn = TcpStream::connect(std::net::SocketAddr::from(([127, 0, 0, 1], 8008))).await?;
.await?; conn.set_nodelay(true).unwrap();
let (client, h2) = h2::client::Builder::new() let (client, h2) = h2::client::Builder::new()
.initial_connection_window_size(1024*1024*1024) .initial_connection_window_size(1024 * 1024 * 1024)
.initial_window_size(1024*1024*1024) .initial_window_size(1024 * 1024 * 1024)
.max_frame_size(4*1024*1024) .max_frame_size(4 * 1024 * 1024)
.handshake(conn) .handshake(conn)
.await?; .await?;
@ -99,10 +97,13 @@ async fn run() -> Result<(), Error> {
} }
let elapsed = start.elapsed().unwrap(); let elapsed = start.elapsed().unwrap();
let elapsed = (elapsed.as_secs() as f64) + let elapsed = (elapsed.as_secs() as f64) + (elapsed.subsec_millis() as f64) / 1000.0;
(elapsed.subsec_millis() as f64)/1000.0;
println!("Downloaded {} bytes, {} MB/s", bytes, (bytes as f64)/(elapsed*1024.0*1024.0)); println!(
"Downloaded {} bytes, {} MB/s",
bytes,
(bytes as f64) / (elapsed * 1024.0 * 1024.0)
);
Ok(()) Ok(())
} }

View File

@ -5,6 +5,7 @@ use std::task::{Context, Poll};
use anyhow::{format_err, Error}; use anyhow::{format_err, Error};
use futures::future::TryFutureExt; use futures::future::TryFutureExt;
use futures::stream::Stream; use futures::stream::Stream;
use tokio::net::TcpStream;
// Simple H2 client to test H2 download speed using h2s-server.rs // Simple H2 client to test H2 download speed using h2s-server.rs
@ -37,11 +38,11 @@ impl Future for Process {
this.body.flow_control().release_capacity(chunk.len())?; this.body.flow_control().release_capacity(chunk.len())?;
this.bytes += chunk.len(); this.bytes += chunk.len();
// println!("GOT FRAME {}", chunk.len()); // println!("GOT FRAME {}", chunk.len());
}, }
Some(Err(err)) => return Poll::Ready(Err(Error::from(err))), Some(Err(err)) => return Poll::Ready(Err(Error::from(err))),
None => { None => {
this.trailers = true; this.trailers = true;
}, }
} }
} }
} }
@ -60,10 +61,10 @@ fn send_request(
let (response, _stream) = client.send_request(request, true).unwrap(); let (response, _stream) = client.send_request(request, true).unwrap();
response response.map_err(Error::from).and_then(|response| Process {
.map_err(Error::from) body: response.into_body(),
.and_then(|response| { trailers: false,
Process { body: response.into_body(), trailers: false, bytes: 0 } bytes: 0,
}) })
} }
@ -74,57 +75,51 @@ fn main() -> Result<(), Error> {
async fn run() -> Result<(), Error> { async fn run() -> Result<(), Error> {
let start = std::time::SystemTime::now(); let start = std::time::SystemTime::now();
let conn = let conn = TcpStream::connect(std::net::SocketAddr::from(([127, 0, 0, 1], 8008))).await?;
tokio::net::TcpStream::connect(std::net::SocketAddr::from(([127,0,0,1], 8008))).await?;
conn.set_nodelay(true).unwrap(); conn.set_nodelay(true).unwrap();
conn.set_recv_buffer_size(1024*1024).unwrap();
use openssl::ssl::{SslConnector, SslMethod}; use openssl::ssl::{SslConnector, SslMethod};
let mut ssl_connector_builder = SslConnector::builder(SslMethod::tls()).unwrap(); let mut ssl_connector_builder = SslConnector::builder(SslMethod::tls()).unwrap();
ssl_connector_builder.set_verify(openssl::ssl::SslVerifyMode::NONE); ssl_connector_builder.set_verify(openssl::ssl::SslVerifyMode::NONE);
let conn = let ssl = ssl_connector_builder
tokio_openssl::connect( .build()
ssl_connector_builder.build().configure()?, .configure()?
"localhost", .into_ssl("localhost")?;
conn,
) let conn = tokio_openssl::SslStream::new(ssl, conn)?;
let mut conn = Box::pin(conn);
conn.as_mut()
.connect()
.await .await
.map_err(|err| format_err!("connect failed - {}", err))?; .map_err(|err| format_err!("connect failed - {}", err))?;
let (client, h2) = h2::client::Builder::new() let (client, h2) = h2::client::Builder::new()
.initial_connection_window_size(1024*1024*1024) .initial_connection_window_size(1024 * 1024 * 1024)
.initial_window_size(1024*1024*1024) .initial_window_size(1024 * 1024 * 1024)
.max_frame_size(4*1024*1024) .max_frame_size(4 * 1024 * 1024)
.handshake(conn) .handshake(conn)
.await?; .await?;
// Spawn a task to run the conn...
tokio::spawn(async move { tokio::spawn(async move {
if let Err(e) = h2.await { if let Err(err) = h2.await {
println!("GOT ERR={:?}", e); println!("GOT ERR={:?}", err);
} }
}); });
let mut bytes = 0; let mut bytes = 0;
for _ in 0..100 { for _ in 0..2000 {
match send_request(client.clone()).await { bytes += send_request(client.clone()).await?;
Ok(b) => {
bytes += b;
}
Err(e) => {
println!("ERROR {}", e);
return Ok(());
}
}
} }
let elapsed = start.elapsed().unwrap(); let elapsed = start.elapsed().unwrap();
let elapsed = (elapsed.as_secs() as f64) + let elapsed = (elapsed.as_secs() as f64) + (elapsed.subsec_millis() as f64) / 1000.0;
(elapsed.subsec_millis() as f64)/1000.0;
println!("Downloaded {} bytes, {} MB/s", bytes, (bytes as f64)/(elapsed*1024.0*1024.0)); println!(
"Downloaded {} bytes, {} MB/s",
bytes,
(bytes as f64) / (elapsed * 1024.0 * 1024.0)
);
Ok(()) Ok(())
} }

View File

@ -2,14 +2,12 @@ use std::sync::Arc;
use anyhow::{format_err, Error}; use anyhow::{format_err, Error};
use futures::*; use futures::*;
use hyper::{Request, Response, Body}; use hyper::{Body, Request, Response};
use openssl::ssl::{SslMethod, SslAcceptor, SslFiletype}; use openssl::ssl::{SslAcceptor, SslFiletype, SslMethod};
use tokio::net::{TcpListener, TcpStream}; use tokio::net::{TcpListener, TcpStream};
use proxmox_backup::configdir; use proxmox_backup::configdir;
// Simple H2 server to test H2 speed with h2s-client.rs
fn main() -> Result<(), Error> { fn main() -> Result<(), Error> {
proxmox_backup::tools::runtime::main(run()) proxmox_backup::tools::runtime::main(run())
} }
@ -19,22 +17,23 @@ async fn run() -> Result<(), Error> {
let cert_path = configdir!("/proxy.pem"); let cert_path = configdir!("/proxy.pem");
let mut acceptor = SslAcceptor::mozilla_intermediate(SslMethod::tls()).unwrap(); let mut acceptor = SslAcceptor::mozilla_intermediate(SslMethod::tls()).unwrap();
acceptor.set_private_key_file(key_path, SslFiletype::PEM) acceptor
.set_private_key_file(key_path, SslFiletype::PEM)
.map_err(|err| format_err!("unable to read proxy key {} - {}", key_path, err))?; .map_err(|err| format_err!("unable to read proxy key {} - {}", key_path, err))?;
acceptor.set_certificate_chain_file(cert_path) acceptor
.set_certificate_chain_file(cert_path)
.map_err(|err| format_err!("unable to read proxy cert {} - {}", cert_path, err))?; .map_err(|err| format_err!("unable to read proxy cert {} - {}", cert_path, err))?;
acceptor.check_private_key().unwrap(); acceptor.check_private_key().unwrap();
let acceptor = Arc::new(acceptor.build()); let acceptor = Arc::new(acceptor.build());
let mut listener = TcpListener::bind(std::net::SocketAddr::from(([127,0,0,1], 8008))).await?; let listener = TcpListener::bind(std::net::SocketAddr::from(([127, 0, 0, 1], 8008))).await?;
println!("listening on {:?}", listener.local_addr()); println!("listening on {:?}", listener.local_addr());
loop { loop {
let (socket, _addr) = listener.accept().await?; let (socket, _addr) = listener.accept().await?;
tokio::spawn(handle_connection(socket, Arc::clone(&acceptor)) tokio::spawn(handle_connection(socket, Arc::clone(&acceptor)).map(|res| {
.map(|res| {
if let Err(err) = res { if let Err(err) = res {
eprintln!("Error: {}", err); eprintln!("Error: {}", err);
} }
@ -42,15 +41,14 @@ async fn run() -> Result<(), Error> {
} }
} }
async fn handle_connection( async fn handle_connection(socket: TcpStream, acceptor: Arc<SslAcceptor>) -> Result<(), Error> {
socket: TcpStream,
acceptor: Arc<SslAcceptor>,
) -> Result<(), Error> {
socket.set_nodelay(true).unwrap(); socket.set_nodelay(true).unwrap();
socket.set_send_buffer_size(1024*1024).unwrap();
socket.set_recv_buffer_size(1024*1024).unwrap();
let socket = tokio_openssl::accept(acceptor.as_ref(), socket).await?; let ssl = openssl::ssl::Ssl::new(acceptor.context())?;
let stream = tokio_openssl::SslStream::new(ssl, socket)?;
let mut stream = Box::pin(stream);
stream.as_mut().accept().await?;
let mut http = hyper::server::conn::Http::new(); let mut http = hyper::server::conn::Http::new();
http.http2_only(true); http.http2_only(true);
@ -61,7 +59,7 @@ async fn handle_connection(
let service = hyper::service::service_fn(|_req: Request<Body>| { let service = hyper::service::service_fn(|_req: Request<Body>| {
println!("Got request"); println!("Got request");
let buffer = vec![65u8; 1024*1024]; // nonsense [A,A,A,A...] let buffer = vec![65u8; 4 * 1024 * 1024]; // nonsense [A,A,A,A...]
let body = Body::from(buffer); let body = Body::from(buffer);
let response = Response::builder() let response = Response::builder()
@ -72,7 +70,7 @@ async fn handle_connection(
future::ok::<_, Error>(response) future::ok::<_, Error>(response)
}); });
http.serve_connection(socket, service) http.serve_connection(stream, service)
.map_err(Error::from) .map_err(Error::from)
.await?; .await?;

View File

@ -1,26 +1,21 @@
use anyhow::{Error}; use anyhow::Error;
use futures::*; use futures::*;
use hyper::{Body, Request, Response};
// Simple H2 server to test H2 speed with h2client.rs use tokio::net::{TcpListener, TcpStream};
use tokio::net::TcpListener;
use tokio::io::{AsyncRead, AsyncWrite};
use proxmox_backup::client::pipe_to_stream::PipeToSendStream;
fn main() -> Result<(), Error> { fn main() -> Result<(), Error> {
proxmox_backup::tools::runtime::main(run()) proxmox_backup::tools::runtime::main(run())
} }
async fn run() -> Result<(), Error> { async fn run() -> Result<(), Error> {
let mut listener = TcpListener::bind(std::net::SocketAddr::from(([127,0,0,1], 8008))).await?; let listener = TcpListener::bind(std::net::SocketAddr::from(([127, 0, 0, 1], 8008))).await?;
println!("listening on {:?}", listener.local_addr()); println!("listening on {:?}", listener.local_addr());
loop { loop {
let (socket, _addr) = listener.accept().await?; let (socket, _addr) = listener.accept().await?;
tokio::spawn(handle_connection(socket) tokio::spawn(handle_connection(socket).map(|res| {
.map(|res| {
if let Err(err) = res { if let Err(err) = res {
eprintln!("Error: {}", err); eprintln!("Error: {}", err);
} }
@ -28,24 +23,33 @@ async fn run() -> Result<(), Error> {
} }
} }
async fn handle_connection<T: AsyncRead + AsyncWrite + Unpin>(socket: T) -> Result<(), Error> { async fn handle_connection(socket: TcpStream) -> Result<(), Error> {
let mut conn = h2::server::handshake(socket).await?; socket.set_nodelay(true).unwrap();
println!("H2 connection bound"); let mut http = hyper::server::conn::Http::new();
http.http2_only(true);
// increase window size: todo - find optiomal size
let max_window_size = (1 << 31) - 2;
http.http2_initial_stream_window_size(max_window_size);
http.http2_initial_connection_window_size(max_window_size);
while let Some((request, mut respond)) = conn.try_next().await? { let service = hyper::service::service_fn(|_req: Request<Body>| {
println!("GOT request: {:?}", request); println!("Got request");
let buffer = vec![65u8; 4 * 1024 * 1024]; // nonsense [A,A,A,A...]
let body = Body::from(buffer);
let response = http::Response::builder() let response = Response::builder()
.status(http::StatusCode::OK) .status(http::StatusCode::OK)
.body(()) .header(http::header::CONTENT_TYPE, "application/octet-stream")
.body(body)
.unwrap(); .unwrap();
future::ok::<_, Error>(response)
});
let send = respond.send_response(response, false).unwrap(); http.serve_connection(socket, service)
let data = vec![65u8; 1024*1024]; .map_err(Error::from)
PipeToSendStream::new(bytes::Bytes::from(data), send).await?; .await?;
println!("DATA SENT");
}
println!("H2 connection CLOSE !");
Ok(()) Ok(())
} }