/// PostgreSQL client (frontend). /// We are pretending to be the backend. use tokio::net::TcpStream; use tokio::net::tcp::{OwnedReadHalf, OwnedWriteHalf}; use tokio::io::{AsyncReadExt, BufReader}; use bytes::{BytesMut, Buf, BufMut}; use crate::errors::Error; use crate::messages::*; pub struct Client { read: BufReader, write: OwnedWriteHalf, } impl Client { pub async fn startup(mut stream: TcpStream) -> Result { loop { // Could be StartupMessage or SSLRequest // which makes this variable length. let len = match stream.read_i32().await { Ok(len) => len, Err(_) => return Err(Error::ClientBadStartup), }; // Read whatever is left. let mut startup = vec![0u8; len as usize - 4]; match stream.read_exact(&mut startup).await { Ok(_) => (), Err(_) => return Err(Error::ClientBadStartup), }; let mut bytes = BytesMut::from(&startup[..]); let code = bytes.get_i32(); match code { // Client wants SSL. We don't support it at the moment. 80877103 => { let mut no = BytesMut::with_capacity(1); no.put_u8(b'N'); write_all(&mut stream, no).await?; }, // Regular startup message. 196608 => { // TODO: perform actual auth. // TODO: record startup parameters client sends over. auth_ok(&mut stream).await?; ready_for_query(&mut stream).await?; let (read, write) = stream.into_split(); return Ok(Client { read: BufReader::new(read), write: write, }); }, _ => { return Err(Error::ProtocolSyncError); } }; } } pub async fn handle(&mut self) -> Result<(), Error> { loop { let mut message = read_message(&mut self.read).await?; let original = message.clone(); // To be forwarded to the server let code = message.get_u8() as char; let len = message.get_i32() as usize; match code { 'Q' => { println!(">>> Query: {:?}", message); }, _ => { println!(">>> Unexpected code: {}", code); }, } } } }