LCOV - code coverage report
Current view: top level - proxy/src - serverless.rs (source / functions) Coverage Total Hit
Test: c639aa5f7ab62b43d647b10f40d15a15686ce8a9.info Lines: 76.5 % 179 137
Test Date: 2024-02-12 20:26:03 Functions: 66.7 % 30 20

            Line data    Source code
       1              : //! Routers for our serverless APIs
       2              : //!
       3              : //! Handles both SQL over HTTP and SQL over Websockets.
       4              : 
       5              : mod backend;
       6              : mod conn_pool;
       7              : mod json;
       8              : mod sql_over_http;
       9              : mod websocket;
      10              : 
      11              : pub use conn_pool::GlobalConnPoolOptions;
      12              : 
      13              : use anyhow::bail;
      14              : use hyper::StatusCode;
      15              : use metrics::IntCounterPairGuard;
      16              : use rand::rngs::StdRng;
      17              : use rand::SeedableRng;
      18              : pub use reqwest_middleware::{ClientWithMiddleware, Error};
      19              : pub use reqwest_retry::{policies::ExponentialBackoff, RetryTransientMiddleware};
      20              : use tokio_util::task::TaskTracker;
      21              : 
      22              : use crate::context::RequestMonitoring;
      23              : use crate::metrics::NUM_CLIENT_CONNECTION_GAUGE;
      24              : use crate::protocol2::{ProxyProtocolAccept, WithClientIp};
      25              : use crate::rate_limiter::EndpointRateLimiter;
      26              : use crate::serverless::backend::PoolingBackend;
      27              : use crate::{cancellation::CancelMap, config::ProxyConfig};
      28              : use futures::StreamExt;
      29              : use hyper::{
      30              :     server::{
      31              :         accept,
      32              :         conn::{AddrIncoming, AddrStream},
      33              :     },
      34              :     Body, Method, Request, Response,
      35              : };
      36              : 
      37              : use std::net::IpAddr;
      38              : use std::task::Poll;
      39              : use std::{future::ready, sync::Arc};
      40              : use tls_listener::TlsListener;
      41              : use tokio::net::TcpListener;
      42              : use tokio_util::sync::CancellationToken;
      43              : use tracing::{error, info, info_span, warn, Instrument};
      44              : use utils::http::{error::ApiError, json::json_response};
      45              : 
      46              : pub const SERVERLESS_DRIVER_SNI: &str = "api";
      47              : 
      48           25 : pub async fn task_main(
      49           25 :     config: &'static ProxyConfig,
      50           25 :     ws_listener: TcpListener,
      51           25 :     cancellation_token: CancellationToken,
      52           25 :     endpoint_rate_limiter: Arc<EndpointRateLimiter>,
      53           25 : ) -> anyhow::Result<()> {
      54           25 :     scopeguard::defer! {
      55           25 :         info!("websocket server has shut down");
      56              :     }
      57              : 
      58           25 :     let conn_pool = conn_pool::GlobalConnPool::new(&config.http_config);
      59           25 :     {
      60           25 :         let conn_pool = Arc::clone(&conn_pool);
      61           25 :         tokio::spawn(async move {
      62           32 :             conn_pool.gc_worker(StdRng::from_entropy()).await;
      63           25 :         });
      64           25 :     }
      65           25 : 
      66           25 :     // shutdown the connection pool
      67           25 :     tokio::spawn({
      68           25 :         let cancellation_token = cancellation_token.clone();
      69           25 :         let conn_pool = conn_pool.clone();
      70           25 :         async move {
      71           25 :             cancellation_token.cancelled().await;
      72           25 :             tokio::task::spawn_blocking(move || conn_pool.shutdown())
      73           25 :                 .await
      74           25 :                 .unwrap();
      75           25 :         }
      76           25 :     });
      77           25 : 
      78           25 :     let backend = Arc::new(PoolingBackend {
      79           25 :         pool: Arc::clone(&conn_pool),
      80           25 :         config,
      81           25 :     });
      82              : 
      83           25 :     let tls_config = match config.tls_config.as_ref() {
      84           25 :         Some(config) => config,
      85              :         None => {
      86            0 :             warn!("TLS config is missing, WebSocket Secure server will not be started");
      87            0 :             return Ok(());
      88              :         }
      89              :     };
      90           25 :     let tls_acceptor: tokio_rustls::TlsAcceptor = tls_config.to_server_config().into();
      91              : 
      92           25 :     let mut addr_incoming = AddrIncoming::from_listener(ws_listener)?;
      93           25 :     let _ = addr_incoming.set_nodelay(true);
      94           25 :     let addr_incoming = ProxyProtocolAccept {
      95           25 :         incoming: addr_incoming,
      96           25 :     };
      97           25 : 
      98           25 :     let ws_connections = tokio_util::task::task_tracker::TaskTracker::new();
      99           25 :     ws_connections.close(); // allows `ws_connections.wait to complete`
     100           25 : 
     101           47 :     let tls_listener = TlsListener::new(tls_acceptor, addr_incoming).filter(|conn| {
     102           47 :         if let Err(err) = conn {
     103            0 :             error!("failed to accept TLS connection for websockets: {err:?}");
     104            0 :             ready(false)
     105              :         } else {
     106           47 :             ready(true)
     107              :         }
     108           47 :     });
     109           25 : 
     110           25 :     let make_svc = hyper::service::make_service_fn(
     111           47 :         |stream: &tokio_rustls::server::TlsStream<WithClientIp<AddrStream>>| {
     112           47 :             let (io, _) = stream.get_ref();
     113           47 :             let client_addr = io.client_addr();
     114           47 :             let remote_addr = io.inner.remote_addr();
     115           47 :             let backend = backend.clone();
     116           47 :             let ws_connections = ws_connections.clone();
     117           47 :             let endpoint_rate_limiter = endpoint_rate_limiter.clone();
     118              : 
     119           47 :             async move {
     120           47 :                 let peer_addr = match client_addr {
     121            0 :                     Some(addr) => addr,
     122            0 :                     None if config.require_client_ip => bail!("missing required client ip"),
     123           47 :                     None => remote_addr,
     124              :                 };
     125           47 :                 Ok(MetricService::new(hyper::service::service_fn(
     126           47 :                     move |req: Request<Body>| {
     127           47 :                         let backend = backend.clone();
     128           47 :                         let ws_connections = ws_connections.clone();
     129           47 :                         let endpoint_rate_limiter = endpoint_rate_limiter.clone();
     130              : 
     131           47 :                         async move {
     132           47 :                             let cancel_map = Arc::new(CancelMap::default());
     133           47 :                             let session_id = uuid::Uuid::new_v4();
     134           47 : 
     135           47 :                             request_handler(
     136           47 :                                 req,
     137           47 :                                 config,
     138           47 :                                 backend,
     139           47 :                                 ws_connections,
     140           47 :                                 cancel_map,
     141           47 :                                 session_id,
     142           47 :                                 peer_addr.ip(),
     143           47 :                                 endpoint_rate_limiter,
     144           47 :                             )
     145           47 :                             .instrument(info_span!(
     146           47 :                                 "serverless",
     147           47 :                                 session = %session_id,
     148           47 :                                 %peer_addr,
     149           47 :                             ))
     150          938 :                             .await
     151           47 :                         }
     152           47 :                     },
     153           47 :                 )))
     154           47 :             }
     155           47 :         },
     156           25 :     );
     157           25 : 
     158           25 :     hyper::Server::builder(accept::from_stream(tls_listener))
     159           25 :         .serve(make_svc)
     160           25 :         .with_graceful_shutdown(cancellation_token.cancelled())
     161          218 :         .await?;
     162              : 
     163              :     // await websocket connections
     164           25 :     ws_connections.wait().await;
     165              : 
     166           25 :     Ok(())
     167           25 : }
     168              : 
     169              : struct MetricService<S> {
     170              :     inner: S,
     171              :     _gauge: IntCounterPairGuard,
     172              : }
     173              : 
     174              : impl<S> MetricService<S> {
     175           47 :     fn new(inner: S) -> MetricService<S> {
     176           47 :         MetricService {
     177           47 :             inner,
     178           47 :             _gauge: NUM_CLIENT_CONNECTION_GAUGE
     179           47 :                 .with_label_values(&["http"])
     180           47 :                 .guard(),
     181           47 :         }
     182           47 :     }
     183              : }
     184              : 
     185              : impl<S, ReqBody> hyper::service::Service<Request<ReqBody>> for MetricService<S>
     186              : where
     187              :     S: hyper::service::Service<Request<ReqBody>>,
     188              : {
     189              :     type Response = S::Response;
     190              :     type Error = S::Error;
     191              :     type Future = S::Future;
     192              : 
     193          129 :     fn poll_ready(&mut self, cx: &mut std::task::Context<'_>) -> Poll<Result<(), Self::Error>> {
     194          129 :         self.inner.poll_ready(cx)
     195          129 :     }
     196              : 
     197           47 :     fn call(&mut self, req: Request<ReqBody>) -> Self::Future {
     198           47 :         self.inner.call(req)
     199           47 :     }
     200              : }
     201              : 
     202              : #[allow(clippy::too_many_arguments)]
     203           47 : async fn request_handler(
     204           47 :     mut request: Request<Body>,
     205           47 :     config: &'static ProxyConfig,
     206           47 :     backend: Arc<PoolingBackend>,
     207           47 :     ws_connections: TaskTracker,
     208           47 :     cancel_map: Arc<CancelMap>,
     209           47 :     session_id: uuid::Uuid,
     210           47 :     peer_addr: IpAddr,
     211           47 :     endpoint_rate_limiter: Arc<EndpointRateLimiter>,
     212           47 : ) -> Result<Response<Body>, ApiError> {
     213           47 :     let host = request
     214           47 :         .headers()
     215           47 :         .get("host")
     216           47 :         .and_then(|h| h.to_str().ok())
     217           47 :         .and_then(|h| h.split(':').next())
     218           47 :         .map(|s| s.to_string());
     219           47 : 
     220           47 :     // Check if the request is a websocket upgrade request.
     221           47 :     if hyper_tungstenite::is_upgrade_request(&request) {
     222            0 :         info!(session_id = ?session_id, "performing websocket upgrade");
     223              : 
     224            0 :         let (response, websocket) = hyper_tungstenite::upgrade(&mut request, None)
     225            0 :             .map_err(|e| ApiError::BadRequest(e.into()))?;
     226              : 
     227            0 :         ws_connections.spawn(
     228            0 :             async move {
     229            0 :                 let ctx = RequestMonitoring::new(session_id, peer_addr, "ws", &config.region);
     230              : 
     231            0 :                 if let Err(e) = websocket::serve_websocket(
     232            0 :                     config,
     233            0 :                     ctx,
     234            0 :                     websocket,
     235            0 :                     cancel_map,
     236            0 :                     host,
     237            0 :                     endpoint_rate_limiter,
     238            0 :                 )
     239            0 :                 .await
     240              :                 {
     241            0 :                     error!(session_id = ?session_id, "error in websocket connection: {e:#}");
     242            0 :                 }
     243            0 :             }
     244            0 :             .in_current_span(),
     245            0 :         );
     246            0 : 
     247            0 :         // Return the response so the spawned future can continue.
     248            0 :         Ok(response)
     249           47 :     } else if request.uri().path() == "/sql" && request.method() == Method::POST {
     250           47 :         let ctx = RequestMonitoring::new(session_id, peer_addr, "http", &config.region);
     251           47 : 
     252          938 :         sql_over_http::handle(config, ctx, request, backend).await
     253            0 :     } else if request.uri().path() == "/sql" && request.method() == Method::OPTIONS {
     254            0 :         Response::builder()
     255            0 :             .header("Allow", "OPTIONS, POST")
     256            0 :             .header("Access-Control-Allow-Origin", "*")
     257            0 :             .header(
     258            0 :                 "Access-Control-Allow-Headers",
     259            0 :                 "Neon-Connection-String, Neon-Raw-Text-Output, Neon-Array-Mode, Neon-Pool-Opt-In, Neon-Batch-Read-Only, Neon-Batch-Isolation-Level",
     260            0 :             )
     261            0 :             .header("Access-Control-Max-Age", "86400" /* 24 hours */)
     262            0 :             .status(StatusCode::OK) // 204 is also valid, but see: https://developer.mozilla.org/en-US/docs/Web/HTTP/Methods/OPTIONS#status_code
     263            0 :             .body(Body::empty())
     264            0 :             .map_err(|e| ApiError::InternalServerError(e.into()))
     265              :     } else {
     266            0 :         json_response(StatusCode::BAD_REQUEST, "query is not supported")
     267              :     }
     268           47 : }
        

Generated by: LCOV version 2.1-beta