aboutsummaryrefslogtreecommitdiffstats
path: root/components/net/tests/main.rs
diff options
context:
space:
mode:
Diffstat (limited to 'components/net/tests/main.rs')
-rw-r--r--components/net/tests/main.rs112
1 files changed, 102 insertions, 10 deletions
diff --git a/components/net/tests/main.rs b/components/net/tests/main.rs
index aeddb5105d1..ad666198a07 100644
--- a/components/net/tests/main.rs
+++ b/components/net/tests/main.rs
@@ -8,19 +8,27 @@ extern crate cookie as cookie_rs;
extern crate devtools_traits;
extern crate embedder_traits;
extern crate flate2;
+extern crate futures;
+extern crate headers_core;
+extern crate headers_ext;
+extern crate http;
extern crate hyper;
-extern crate hyper_openssl;
extern crate hyper_serde;
extern crate ipc_channel;
+#[macro_use]
+extern crate lazy_static;
+extern crate mime;
extern crate msg;
extern crate net;
extern crate net_traits;
+extern crate openssl;
extern crate profile_traits;
extern crate servo_channel;
extern crate servo_config;
extern crate servo_url;
extern crate time;
-extern crate unicase;
+extern crate tokio;
+extern crate tokio_openssl;
extern crate url;
mod cookie;
@@ -38,8 +46,12 @@ mod subresource_integrity;
use devtools_traits::DevtoolsControlMsg;
use embedder_traits::{EmbedderProxy, EventLoopWaker};
use embedder_traits::resources::{self, Resource};
-use hyper::server::{Handler, Listening, Server};
-use net::connector::create_ssl_client;
+use futures::{Future, Stream};
+use hyper::{Body, Request as HyperRequest, Response as HyperResponse};
+use hyper::server::Server as HyperServer;
+use hyper::server::conn::Http;
+use hyper::service::service_fn_ok;
+use net::connector::create_ssl_connector_builder;
use net::fetch::cors_cache::CorsCache;
use net::fetch::methods::{self, CancellationListener, FetchContext};
use net::filemanager_thread::FileManager;
@@ -47,9 +59,21 @@ use net::test::HttpState;
use net_traits::FetchTaskTarget;
use net_traits::request::Request;
use net_traits::response::Response;
+use openssl::ssl::{SslAcceptor, SslFiletype, SslMethod};
use servo_channel::{channel, Sender};
use servo_url::ServoUrl;
+use std::net::TcpListener as StdTcpListener;
+use std::path::PathBuf;
use std::sync::{Arc, Mutex};
+use tokio::net::TcpListener;
+use tokio::runtime::Runtime;
+use tokio_openssl::SslAcceptorExt;
+
+lazy_static! {
+ pub static ref HANDLE: Mutex<Runtime> = {
+ Mutex::new(Runtime::new().unwrap())
+ };
+}
const DEFAULT_USER_AGENT: &'static str = "Such Browser. Very Layout. Wow.";
@@ -84,10 +108,10 @@ fn create_embedder_proxy() -> EmbedderProxy {
}
fn new_fetch_context(dc: Option<Sender<DevtoolsControlMsg>>, fc: Option<EmbedderProxy>) -> FetchContext {
- let ssl_client = create_ssl_client(&resources::read_string(Resource::SSLCertificates));
+ let ssl_connector = create_ssl_connector_builder(&resources::read_string(Resource::SSLCertificates));
let sender = fc.unwrap_or_else(|| create_embedder_proxy());
FetchContext {
- state: Arc::new(HttpState::new(ssl_client)),
+ state: Arc::new(HttpState::new(ssl_connector)),
user_agent: DEFAULT_USER_AGENT.into(),
devtools_chan: dc,
filemanager: FileManager::new(sender),
@@ -131,10 +155,78 @@ fn fetch_with_cors_cache(request: &mut Request, cache: &mut CorsCache) -> Respon
receiver.recv().unwrap()
}
-fn make_server<H: Handler + 'static>(handler: H) -> (Listening, ServoUrl) {
- // this is a Listening server because of handle_threads()
- let server = Server::http("0.0.0.0:0").unwrap().handle_threads(handler, 2).unwrap();
- let url_string = format!("http://localhost:{}", server.socket.port());
+pub(crate) struct Server {
+ pub close_channel: futures::sync::oneshot::Sender<()>,
+}
+
+impl Server {
+ fn close(self) {
+ self.close_channel.send(()).unwrap();
+ }
+}
+
+fn make_server<H>(handler: H) -> (Server, ServoUrl)
+ where
+ H: Fn(HyperRequest<Body>, &mut HyperResponse<Body>) + Send + Sync + 'static,
+{
+ let handler = Arc::new(handler);
+ let listener = StdTcpListener::bind("0.0.0.0:0").unwrap();
+ let url_string = format!("http://localhost:{}", listener.local_addr().unwrap().port());
let url = ServoUrl::parse(&url_string).unwrap();
+ let (tx, rx) = futures::sync::oneshot::channel::<()>();
+ let server = HyperServer::from_tcp(listener).unwrap().serve(
+ move || {
+ let handler = handler.clone();
+ service_fn_ok(move |req: HyperRequest<Body>| {
+ let mut response = HyperResponse::new(Vec::<u8>::new().into());
+ handler(req, &mut response);
+ response
+ })
+ }
+ )
+ .with_graceful_shutdown(rx)
+ .map_err(|_|());
+
+ HANDLE.lock().unwrap().spawn(server);
+ let server = Server { close_channel: tx };
+ (server, url)
+}
+
+fn make_ssl_server<H>(handler: H, cert_path: PathBuf, key_path: PathBuf) -> (Server, ServoUrl)
+ where
+ H: Fn(HyperRequest<Body>, &mut HyperResponse<Body>) + Send + Sync + 'static,
+{
+ let handler = Arc::new(handler);
+ let listener = StdTcpListener::bind("[::0]:0").unwrap();
+ let listener = TcpListener::from_std(listener, &HANDLE.lock().unwrap().reactor()).unwrap();
+ let url_string = format!("http://localhost:{}", listener.local_addr().unwrap().port());
+ let url = ServoUrl::parse(&url_string).unwrap();
+
+ let server = listener.incoming()
+ .map_err(|_| ())
+ .for_each(move |sock| {
+ let mut ssl_builder = SslAcceptor::mozilla_modern(SslMethod::tls()).unwrap();
+ ssl_builder.set_certificate_file(&cert_path, SslFiletype::PEM).unwrap();
+ ssl_builder.set_private_key_file(&key_path, SslFiletype::PEM).unwrap();
+
+ let handler = handler.clone();
+ ssl_builder.build().accept_async(sock).map_err(|_| ()).and_then(move |ssl| {
+ Http::new().serve_connection(ssl,
+ service_fn_ok(move |req: HyperRequest<Body>| {
+ let mut response = HyperResponse::new(Vec::<u8>::new().into());
+ handler(req, &mut response);
+ response
+ })
+ )
+ .map_err(|_|())
+ })
+ });
+
+ let (tx, rx) = futures::sync::oneshot::channel::<()>();
+ let server = server.select(rx.map_err(|_| ())).map(|_| ()).map_err(|_| ());
+
+ HANDLE.lock().unwrap().spawn(server);
+
+ let server = Server { close_channel: tx };
(server, url)
}