Files
pgcat/src/server.rs

342 lines
11 KiB
Rust
Raw Normal View History

2022-02-03 17:48:37 -08:00
#![allow(dead_code)]
#![allow(unused_variables)]
2022-02-04 09:28:52 -08:00
///! Implementation of the PostgreSQL server (database) protocol.
///! Here we are pretending to the a Postgres client.
2022-02-03 15:17:04 -08:00
use bytes::{Buf, BufMut, BytesMut};
use tokio::io::{AsyncReadExt, BufReader};
use tokio::net::tcp::{OwnedReadHalf, OwnedWriteHalf};
use tokio::net::TcpStream;
use crate::errors::Error;
use crate::messages::*;
2022-02-04 16:01:35 -08:00
use crate::ClientServerMap;
2022-02-03 15:17:04 -08:00
2022-02-04 09:28:52 -08:00
/// Server state.
2022-02-03 15:17:04 -08:00
pub struct Server {
read: BufReader<OwnedReadHalf>,
write: OwnedWriteHalf,
buffer: BytesMut,
2022-02-03 17:48:37 -08:00
server_info: BytesMut,
backend_id: i32,
secret_key: i32,
2022-02-03 16:25:05 -08:00
in_transaction: bool,
2022-02-04 08:26:50 -08:00
data_available: bool,
bad: bool,
2022-02-04 16:01:35 -08:00
client_server_map: ClientServerMap,
2022-02-03 15:17:04 -08:00
}
impl Server {
2022-02-04 09:28:52 -08:00
/// Pretend to be the Postgres client and connect to the server given host, port and credentials.
/// Perform the authentication and return the server in a ready-for-query mode.
2022-02-03 15:17:04 -08:00
pub async fn startup(
host: &str,
port: &str,
user: &str,
password: &str,
database: &str,
2022-02-04 16:01:35 -08:00
client_server_map: ClientServerMap,
2022-02-03 15:17:04 -08:00
) -> Result<Server, Error> {
let mut stream = match TcpStream::connect(&format!("{}:{}", host, port)).await {
Ok(stream) => stream,
Err(err) => {
println!(">> Could not connect to server: {}", err);
return Err(Error::SocketError);
}
};
startup(&mut stream, user, database).await?;
2022-02-03 17:48:37 -08:00
let mut server_info = BytesMut::with_capacity(25);
let mut backend_id: i32 = 0;
let mut secret_key: i32 = 0;
2022-02-03 15:17:04 -08:00
loop {
let code = match stream.read_u8().await {
Ok(code) => code as char,
Err(_) => return Err(Error::SocketError),
};
let len = match stream.read_i32().await {
Ok(len) => len,
Err(_) => return Err(Error::SocketError),
};
match code {
'R' => {
// Auth can proceed
let code = match stream.read_i32().await {
Ok(code) => code,
Err(_) => return Err(Error::SocketError),
};
match code {
// MD5
5 => {
let mut salt = vec![0u8; 4];
match stream.read_exact(&mut salt).await {
Ok(_) => (),
Err(_) => return Err(Error::SocketError),
};
md5_password(&mut stream, user, password, &salt[..]).await?;
}
// We're in!
0 => {
println!(">> Server authentication successful!");
}
_ => {
println!(">> Unsupported authentication mechanism: {}", code);
return Err(Error::ServerError);
}
}
}
'E' => {
println!(">> Database error");
return Err(Error::ServerError);
}
'S' => {
// Parameter
let mut param = vec![0u8; len as usize - 4];
match stream.read_exact(&mut param).await {
Ok(_) => (),
Err(_) => return Err(Error::SocketError),
};
2022-02-03 17:48:37 -08:00
server_info.put_u8(b'S');
server_info.put_i32(len);
server_info.put_slice(&param[..]);
2022-02-03 15:17:04 -08:00
}
'K' => {
2022-02-03 17:48:37 -08:00
// Query cancellation data.
backend_id = match stream.read_i32().await {
Ok(id) => id,
Err(err) => return Err(Error::SocketError),
};
secret_key = match stream.read_i32().await {
Ok(id) => id,
Err(err) => return Err(Error::SocketError),
2022-02-03 15:17:04 -08:00
};
}
'Z' => {
let mut idle = vec![0u8; len as usize - 4];
match stream.read_exact(&mut idle).await {
Ok(_) => (),
Err(_) => return Err(Error::SocketError),
};
// Startup finished
let (read, write) = stream.into_split();
return Ok(Server {
read: BufReader::new(read),
write: write,
buffer: BytesMut::with_capacity(8196),
2022-02-03 17:48:37 -08:00
server_info: server_info,
backend_id: backend_id,
secret_key: secret_key,
2022-02-03 16:25:05 -08:00
in_transaction: false,
2022-02-04 08:26:50 -08:00
data_available: false,
bad: false,
2022-02-04 16:01:35 -08:00
client_server_map: client_server_map,
2022-02-03 15:17:04 -08:00
});
}
_ => {
println!(">> Unknown code: {}", code);
return Err(Error::ProtocolSyncError);
}
};
}
}
2022-02-04 16:01:35 -08:00
/// Issue a cancellation request to the server.
/// Uses a separate connection that's not part of the connection pool.
pub async fn cancel(
host: &str,
port: &str,
process_id: i32,
secret_key: i32,
) -> Result<(), Error> {
let mut stream = match TcpStream::connect(&format!("{}:{}", host, port)).await {
Ok(stream) => stream,
Err(err) => {
println!(">> Could not connect to server: {}", err);
return Err(Error::SocketError);
}
};
let mut bytes = BytesMut::with_capacity(16);
bytes.put_i32(16);
bytes.put_i32(80877102);
bytes.put_i32(process_id);
bytes.put_i32(secret_key);
Ok(write_all(&mut stream, bytes).await?)
}
2022-02-04 09:28:52 -08:00
/// Send data to the server from the client.
2022-02-03 15:17:04 -08:00
pub async fn send(&mut self, messages: BytesMut) -> Result<(), Error> {
match write_all_half(&mut self.write, messages).await {
Ok(_) => Ok(()),
Err(err) => {
println!(">> Terminating server because of: {:?}", err);
self.bad = true;
Err(err)
}
}
2022-02-03 15:17:04 -08:00
}
2022-02-04 09:28:52 -08:00
/// Receive data from the server in response to a client request sent previously.
/// This method must be called multiple times while `self.is_data_available()` is true
/// in order to receive all data the server has to offer.
2022-02-03 15:17:04 -08:00
pub async fn recv(&mut self) -> Result<BytesMut, Error> {
loop {
let mut message = match read_message(&mut self.read).await {
Ok(message) => message,
Err(err) => {
println!(">> Terminating server because of: {:?}", err);
self.bad = true;
return Err(err);
}
};
2022-02-03 15:17:04 -08:00
// Buffer the message we'll forward to the client in a bit.
self.buffer.put(&message[..]);
let code = message.get_u8() as char;
2022-02-03 16:25:05 -08:00
let _len = message.get_i32();
2022-02-03 15:33:26 -08:00
2022-02-03 15:17:04 -08:00
match code {
'Z' => {
// Ready for query, time to forward buffer to client.
2022-02-03 16:25:05 -08:00
let transaction_state = message.get_u8() as char;
2022-02-03 16:25:05 -08:00
match transaction_state {
'T' => {
self.in_transaction = true;
}
2022-02-03 16:25:05 -08:00
'I' => {
self.in_transaction = false;
}
// Error client didn't clean up!
// We shuold drop this server
'E' => {
2022-02-03 18:13:36 -08:00
self.in_transaction = true;
}
2022-02-03 16:25:05 -08:00
_ => {
self.bad = true;
return Err(Error::ProtocolSyncError);
}
2022-02-03 16:25:05 -08:00
};
2022-02-03 15:17:04 -08:00
break;
}
2022-02-03 15:17:04 -08:00
2022-02-04 08:06:45 -08:00
// CopyInResponse: copy is starting from client to server
'G' => break,
2022-02-04 08:26:50 -08:00
// CopyOutResponse: copy is starting from the server to the client
'H' => {
self.data_available = true;
break;
}
// CopyData
'd' => break,
// CopyDone
'c' => {
self.data_available = false;
// Buffer until ReadyForQuery shows up
}
2022-02-03 15:17:04 -08:00
_ => {
// Keep buffering,
}
};
}
let bytes = self.buffer.clone();
self.buffer.clear();
Ok(bytes)
}
2022-02-03 16:25:05 -08:00
2022-02-04 09:28:52 -08:00
/// If the server is still inside a transaction.
/// If the client disconnects while the server is in a transaction, we will clean it up.
2022-02-03 16:25:05 -08:00
pub fn in_transaction(&self) -> bool {
self.in_transaction
}
2022-02-04 09:28:52 -08:00
/// We don't buffer all of server responses, e.g. COPY OUT produces too much data.
/// The client is responsible to call `self.recv()` while this method returns true.
2022-02-04 08:26:50 -08:00
pub fn is_data_available(&self) -> bool {
self.data_available
}
2022-02-04 09:28:52 -08:00
/// Server & client are out of sync, we must discard this connection.
/// This happens with clients that misbehave.
pub fn is_bad(&self) -> bool {
self.bad
}
2022-02-04 09:28:52 -08:00
/// Get server startup information to forward it to the client.
/// Not used at the moment.
2022-02-03 17:48:37 -08:00
pub fn server_info(&self) -> BytesMut {
self.server_info.clone()
}
2022-02-04 09:28:52 -08:00
/// Indicate that this server connection cannot be re-used and must be discarded.
pub fn mark_bad(&mut self) {
println!(">> Server marked bad");
self.bad = true;
}
2022-02-04 16:08:18 -08:00
/// Claim this server as mine for the purposes of query cancellation.
2022-02-04 16:01:35 -08:00
pub fn claim(&mut self, process_id: i32, secret_key: i32) {
let mut guard = self.client_server_map.lock().unwrap();
guard.insert((process_id, secret_key), (self.backend_id, self.secret_key));
}
2022-02-04 09:28:52 -08:00
/// Execute an arbitrary query against the server.
/// It will use the Simple query protocol.
/// Result will not be returned, so this is useful for things like `SET` or `ROLLBACK`.
2022-02-03 17:32:04 -08:00
pub async fn query(&mut self, query: &str) -> Result<(), Error> {
let mut query = BytesMut::from(&query.as_bytes()[..]);
query.put_u8(0);
let len = query.len() as i32 + 4;
let mut msg = BytesMut::with_capacity(len as usize + 1);
msg.put_u8(b'Q');
msg.put_i32(len);
msg.put_slice(&query[..]);
self.send(msg).await?;
let _ = self.recv().await?;
Ok(())
}
2022-02-03 17:32:04 -08:00
2022-02-04 09:28:52 -08:00
/// A shorthand for `SET application_name = $1`.
2022-02-03 17:32:04 -08:00
pub async fn set_name(&mut self, name: &str) -> Result<(), Error> {
Ok(self
.query(&format!("SET application_name = '{}'", name))
.await?)
}
2022-02-03 15:17:04 -08:00
}