]> git.proxmox.com Git - proxmox-backup.git/commitdiff
src/bin/h2s-server.rs: test to reproduce slow h2 download
authorDietmar Maurer <dietmar@proxmox.com>
Sat, 29 Jun 2019 12:57:54 +0000 (14:57 +0200)
committerDietmar Maurer <dietmar@proxmox.com>
Sat, 29 Jun 2019 12:57:54 +0000 (14:57 +0200)
Simplified code, use with h2s-client.rs.

src/bin/h2s-client.rs [new file with mode: 0644]
src/bin/h2s-server.rs [new file with mode: 0644]

diff --git a/src/bin/h2s-client.rs b/src/bin/h2s-client.rs
new file mode 100644 (file)
index 0000000..6de9429
--- /dev/null
@@ -0,0 +1,74 @@
+use failure::*;
+use futures::*;
+
+// Simple H2 client to test H2 download speed using h2s-server.rs
+
+fn build_client() -> hyper::client::Client<hyper_tls::HttpsConnector<hyper::client::HttpConnector>> {
+    let mut builder = native_tls::TlsConnector::builder();
+    builder.danger_accept_invalid_certs(true);
+    let tlsconnector = builder.build().unwrap();
+    let mut httpc = hyper::client::HttpConnector::new(1);
+    httpc.set_nodelay(true); // important for h2 download performance!
+    httpc.enforce_http(false); // we want https...
+    let mut https = hyper_tls::HttpsConnector::from((httpc, tlsconnector));
+    https.https_only(true); // force it!
+    hyper::client::Client::builder()
+        .http2_only(true)
+        .http2_initial_stream_window_size( (1 << 31) - 2)
+        .http2_initial_connection_window_size( (1 << 31) - 2)
+         // howto?? .http2_max_frame_size(4*1024*1024) ??
+        .build::<_, hyper::Body>(https)
+}
+
+pub fn main() -> Result<(), Error> {
+
+    let client = build_client();
+
+    let start = std::time::SystemTime::now();
+
+    let task = futures::stream::repeat(())
+        .take(100)
+        .and_then(move |_| {
+            let request = http::Request::builder()
+                .method("GET")
+                .uri("https://localhost:8008/")
+                .body(hyper::Body::empty())
+                .unwrap();
+
+            client
+                .request(request)
+                .map_err(Error::from)
+                .and_then(|resp| {
+                    resp.into_body()
+                        .map_err(Error::from)
+                        .fold(0, move |mut acc, chunk| {
+                            println!("got frame {}", chunk.len());
+                            acc += chunk.len();
+                            Ok::<_, Error>(acc)
+                        })
+                })
+        })
+        .fold(0, move |mut acc, size| {
+            acc += size;
+            Ok::<_, Error>(acc)
+        })
+        .then(move |result| {
+            match result {
+                Err(err) => {
+                    println!("ERROR {}", err);
+                }
+                Ok(bytes) => {
+                    let elapsed = start.elapsed().unwrap();
+                    let elapsed = (elapsed.as_secs() as f64) +
+                        (elapsed.subsec_millis() as f64)/1000.0;
+
+                    println!("Downloaded {} bytes, {} MB/s", bytes, (bytes as f64)/(elapsed*1024.0*1024.0));
+                }
+            }
+            Ok(())
+        });
+
+    tokio::run(task);
+
+    Ok(())
+}
diff --git a/src/bin/h2s-server.rs b/src/bin/h2s-server.rs
new file mode 100644 (file)
index 0000000..a380019
--- /dev/null
@@ -0,0 +1,120 @@
+use failure::*;
+use futures::*;
+use std::path::Path;
+
+// Simple H2 server to test H2 speed with h2s-client.rs
+
+use hyper::{Request, Response, Body};
+use tokio::net::TcpListener;
+
+use proxmox_backup::client::pipe_to_stream::*;
+use proxmox_backup::tools;
+use proxmox_backup::configdir;
+
+pub fn main() -> Result<(), Error> {
+
+    start_h2_server()?;
+
+    Ok(())
+}
+
+fn load_certificate<T: AsRef<Path>, U: AsRef<Path>>(
+    key: T,
+    cert: U,
+) -> Result<openssl::pkcs12::Pkcs12, Error> {
+    let key = tools::file_get_contents(key)?;
+    let cert = tools::file_get_contents(cert)?;
+
+    let key = openssl::pkey::PKey::private_key_from_pem(&key)?;
+    let cert = openssl::x509::X509::from_pem(&cert)?;
+
+    Ok(openssl::pkcs12::Pkcs12::builder()
+        .build("", "", &key, &cert)?)
+}
+
+pub fn start_h2_server() -> Result<(), Error> {
+
+    let cert_path = configdir!("/proxy.pfx");
+    let raw_cert = match std::fs::read(cert_path) {
+        Ok(pfx) => pfx,
+        Err(ref err) if err.kind() == std::io::ErrorKind::NotFound => {
+            let pkcs12 = load_certificate(configdir!("/proxy.key"), configdir!("/proxy.pem"))?;
+            pkcs12.to_der()?
+        }
+        Err(err) => bail!("unable to read certificate file {} - {}", cert_path, err),
+    };
+
+    let identity = match native_tls::Identity::from_pkcs12(&raw_cert, "") {
+        Ok(data) => data,
+        Err(err) => bail!("unable to decode pkcs12 identity {} - {}", cert_path, err),
+    };
+
+    let acceptor = native_tls::TlsAcceptor::new(identity)?;
+    let acceptor = std::sync::Arc::new(tokio_tls::TlsAcceptor::from(acceptor));
+
+    let listener = TcpListener::bind(&"127.0.0.1:8008".parse().unwrap()).unwrap();
+
+    println!("listening on {:?}", listener.local_addr());
+
+    let server = listener
+        .incoming()
+        .map_err(Error::from)
+        .and_then(move |sock| acceptor.accept(sock).map_err(|e| e.into()))
+        .then(|r| match r {
+            // accept()s can fail here with an Err() when eg. the client rejects
+            // the cert and closes the connection, so we follow up with mapping
+            // it to an option and then filtering None with filter_map
+            Ok(c) => Ok::<_, Error>(Some(c)),
+            Err(e) => {
+                if let Some(_io) = e.downcast_ref::<std::io::Error>() {
+                    // "real" IO errors should not simply be ignored
+                    bail!("shutting down...");
+                } else {
+                    // handshake errors just get filtered by filter_map() below:
+                    Ok(None)
+                }
+            }
+        })
+        .filter_map(|r| {
+            // Filter out the Nones
+            r
+        })
+        .for_each(move |socket| {
+
+            let mut http = hyper::server::conn::Http::new();
+            http.http2_only(true);
+            // increase window size: todo - find optiomal size
+            let max_window_size = (1 << 31) - 2;
+            http.http2_initial_stream_window_size(max_window_size);
+            http.http2_initial_connection_window_size(max_window_size);
+
+            let service = hyper::service::service_fn(|req: Request<Body>| {
+                println!("Got request");
+                let buffer = vec![65u8; 1024*1024]; // nonsense [A,A,A,A...]
+                let body = Body::from(buffer);
+
+                let response = Response::builder()
+                    .status(http::StatusCode::OK)
+                    .header(http::header::CONTENT_TYPE, "application/octet-stream")
+                    .body(body)
+                    .unwrap();
+                Ok::<_, Error>(response)
+            });
+            http.serve_connection(socket, service)
+                .map_err(Error::from)
+        })
+        .and_then(|_| {
+            println!("H2 connection CLOSE !");
+            Ok(())
+        })
+        .then(|res| {
+            if let Err(e) = res {
+                println!("  -> err={:?}", e);
+            }
+            Ok(())
+        });
+
+    tokio::run(server);
+
+    Ok(())
+}