feat: totally updated cache structure using lru crate instead of moka (i.e., using simpler crate)
This commit is contained in:
parent
2477c6bf1b
commit
07d3accb91
10 changed files with 157 additions and 132 deletions
|
|
@ -75,8 +75,7 @@ s2n-quic-rustls = { path = "../submodules/s2n-quic/quic/s2n-quic-rustls/", optio
|
|||
|
||||
# cache
|
||||
http-cache-semantics = { path = "../submodules/rusty-http-cache-semantics/" }
|
||||
moka = { version = "0.11.3", features = ["future", "sync"] }
|
||||
fs4 = { version = "0.6.6", features = ["tokio", "tokio-async"] }
|
||||
lru = { version = "0.11.0" }
|
||||
|
||||
# cookie handling for sticky cookie
|
||||
chrono = { version = "0.4.26", default-features = false, features = [
|
||||
|
|
|
|||
|
|
@ -31,7 +31,3 @@ pub mod H3 {
|
|||
#[cfg(feature = "sticky-cookie")]
|
||||
/// For load-balancing with sticky cookie
|
||||
pub const STICKY_COOKIE_NAME: &str = "rpxy_srv_id";
|
||||
|
||||
pub const MAX_CACHE_ENTRY: u64 = 10_000;
|
||||
// TODO: max cache size per entry
|
||||
// TODO: max cache size in total
|
||||
|
|
|
|||
|
|
@ -55,6 +55,8 @@ pub struct ProxyConfig {
|
|||
|
||||
pub cache_enabled: bool,
|
||||
pub cache_dir: Option<PathBuf>,
|
||||
pub cache_max_entry: Option<usize>,
|
||||
pub cache_max_each_size: Option<usize>,
|
||||
|
||||
// All need to make packet acceptor
|
||||
#[cfg(any(feature = "http3-quinn", feature = "http3-s2n"))]
|
||||
|
|
@ -93,6 +95,8 @@ impl Default for ProxyConfig {
|
|||
|
||||
cache_enabled: false,
|
||||
cache_dir: None,
|
||||
cache_max_entry: None,
|
||||
cache_max_each_size: None,
|
||||
|
||||
#[cfg(any(feature = "http3-quinn", feature = "http3-s2n"))]
|
||||
http3: false,
|
||||
|
|
|
|||
|
|
@ -1,18 +1,17 @@
|
|||
use crate::{constants::MAX_CACHE_ENTRY, error::*, globals::Globals, log::*, CryptoSource};
|
||||
use crate::{error::*, globals::Globals, log::*, CryptoSource};
|
||||
use base64::{engine::general_purpose, Engine as _};
|
||||
use bytes::{Buf, Bytes, BytesMut};
|
||||
use fs4::tokio::AsyncFileExt;
|
||||
use http_cache_semantics::CachePolicy;
|
||||
use hyper::{
|
||||
http::{Request, Response},
|
||||
Body,
|
||||
};
|
||||
use moka::future::Cache as MokaCache;
|
||||
use lru::LruCache;
|
||||
use sha2::{Digest, Sha256};
|
||||
use std::{
|
||||
fmt::Debug,
|
||||
path::{Path, PathBuf},
|
||||
sync::Arc,
|
||||
sync::{Arc, Mutex},
|
||||
time::SystemTime,
|
||||
};
|
||||
use tokio::{
|
||||
|
|
@ -21,34 +20,10 @@ use tokio::{
|
|||
sync::RwLock,
|
||||
};
|
||||
|
||||
// #[async_trait]
|
||||
// pub trait CacheTarget {
|
||||
// type TargetInput;
|
||||
// type TargetOutput;
|
||||
// type Error;
|
||||
// /// Get target object from somewhere
|
||||
// async fn get(&self) -> Self::TargetOutput;
|
||||
// /// Write target object into somewhere
|
||||
// async fn put(&self, taget: Self::TargetOutput) -> Result<(), Self::Error>;
|
||||
// /// Remove target object from somewhere (when evicted self)
|
||||
// async fn remove(&self) -> Result<(), Self::Error>;
|
||||
// }
|
||||
|
||||
fn derive_filename_from_uri(uri: &hyper::Uri) -> String {
|
||||
let mut hasher = Sha256::new();
|
||||
hasher.update(uri.to_string());
|
||||
let digest = hasher.finalize();
|
||||
general_purpose::URL_SAFE_NO_PAD.encode(digest)
|
||||
}
|
||||
|
||||
fn derive_moka_key_from_uri(uri: &hyper::Uri) -> String {
|
||||
uri.to_string()
|
||||
}
|
||||
|
||||
#[derive(Clone, Debug)]
|
||||
struct CacheObject {
|
||||
pub policy: CachePolicy,
|
||||
pub target: Option<PathBuf>,
|
||||
pub target: PathBuf,
|
||||
}
|
||||
|
||||
#[derive(Debug)]
|
||||
|
|
@ -74,16 +49,13 @@ impl CacheFileManager {
|
|||
}
|
||||
}
|
||||
|
||||
async fn write(&mut self, cache_filename: &str, body_bytes: &Bytes, policy: &CachePolicy) -> Result<CacheObject> {
|
||||
async fn create(&mut self, cache_filename: &str, body_bytes: &Bytes, policy: &CachePolicy) -> Result<CacheObject> {
|
||||
let cache_filepath = self.cache_dir.join(cache_filename);
|
||||
let Ok(mut file) = File::create(&cache_filepath).await else {
|
||||
return Err(RpxyError::Cache("Failed to create file"));
|
||||
};
|
||||
// TODO: ここでちゃんと書けないパターンっぽい?あるいは書いた後消されるパターンが起きている模様。
|
||||
// evictしたときファイルは消えてentryが残ってるっぽい
|
||||
let mut bytes_clone = body_bytes.clone();
|
||||
while bytes_clone.has_remaining() {
|
||||
warn!("remaining {}", bytes_clone.remaining());
|
||||
if let Err(e) = file.write_buf(&mut bytes_clone).await {
|
||||
error!("Failed to write file cache: {e}");
|
||||
return Err(RpxyError::Cache("Failed to write file cache: {e}"));
|
||||
|
|
@ -92,7 +64,7 @@ impl CacheFileManager {
|
|||
self.cnt += 1;
|
||||
Ok(CacheObject {
|
||||
policy: policy.clone(),
|
||||
target: Some(cache_filepath),
|
||||
target: cache_filepath,
|
||||
})
|
||||
}
|
||||
|
||||
|
|
@ -131,10 +103,12 @@ impl CacheFileManager {
|
|||
pub struct RpxyCache {
|
||||
/// Managing cache file objects through RwLock's lock mechanism for file lock
|
||||
cache_file_manager: Arc<RwLock<CacheFileManager>>,
|
||||
/// Moka's cache storing http message caching policy
|
||||
inner: MokaCache<String, CacheObject>, // TODO: keyはstring urlでいいのか疑問。全requestに対してcheckすることになりそう
|
||||
/// Lru cache storing http message caching policy
|
||||
inner: Arc<Mutex<LruCache<String, CacheObject>>>, // TODO: keyはstring urlでいいのか疑問。全requestに対してcheckすることになりそう
|
||||
/// Async runtime
|
||||
runtime_handle: tokio::runtime::Handle,
|
||||
/// Maximum size of each cache file object
|
||||
max_each_size: usize,
|
||||
}
|
||||
|
||||
impl RpxyCache {
|
||||
|
|
@ -146,120 +120,152 @@ impl RpxyCache {
|
|||
|
||||
let path = globals.proxy_config.cache_dir.as_ref().unwrap();
|
||||
let cache_file_manager = Arc::new(RwLock::new(CacheFileManager::new(path, &globals.runtime_handle).await));
|
||||
let mgr_clone = cache_file_manager.clone();
|
||||
|
||||
let runtime_handle = globals.runtime_handle.clone();
|
||||
let eviction_listener = move |k, v: CacheObject, cause| {
|
||||
debug!("Cache entry is being evicted : {k} {:?}", cause);
|
||||
runtime_handle.block_on(async {
|
||||
if let Some(filepath) = v.target {
|
||||
debug!("Evict file object: {k}");
|
||||
// Acquire the write lock
|
||||
let mut mgr = mgr_clone.write().await;
|
||||
if let Err(e) = mgr.remove(filepath).await {
|
||||
warn!("Eviction failed during file object removal: {:?}", e);
|
||||
};
|
||||
}
|
||||
})
|
||||
};
|
||||
let inner = Arc::new(Mutex::new(LruCache::new(
|
||||
std::num::NonZeroUsize::new(globals.proxy_config.cache_max_entry.unwrap()).unwrap(),
|
||||
)));
|
||||
|
||||
Some(Self {
|
||||
cache_file_manager,
|
||||
inner: MokaCache::builder()
|
||||
.max_capacity(MAX_CACHE_ENTRY)
|
||||
.eviction_listener_with_queued_delivery_mode(eviction_listener)
|
||||
.build(), // TODO: make this configurable, and along with size
|
||||
inner,
|
||||
runtime_handle: globals.runtime_handle.clone(),
|
||||
max_each_size: globals.proxy_config.cache_max_each_size.unwrap(),
|
||||
})
|
||||
}
|
||||
|
||||
fn evict_cache_entry(&self, cache_key: &str) -> Option<(String, CacheObject)> {
|
||||
let Ok(mut lock) = self.inner.lock() else {
|
||||
error!("Mutex can't be locked to evict a cache entry");
|
||||
return None;
|
||||
};
|
||||
lock.pop_entry(cache_key)
|
||||
}
|
||||
|
||||
async fn evict_cache_file(&self, filepath: impl AsRef<Path>) {
|
||||
// Acquire the write lock
|
||||
let mut mgr = self.cache_file_manager.write().await;
|
||||
if let Err(e) = mgr.remove(filepath).await {
|
||||
warn!("Eviction failed during file object removal: {:?}", e);
|
||||
};
|
||||
}
|
||||
|
||||
/// Get cached response
|
||||
pub async fn get<R>(&self, req: &Request<R>) -> Option<Response<Body>> {
|
||||
debug!("Current cache entries: {:?}", self.inner);
|
||||
let moka_key = req.uri().to_string();
|
||||
let cache_key = req.uri().to_string();
|
||||
|
||||
// First check cache chance
|
||||
let Some(cached_object) = self.inner.get(&moka_key) else {
|
||||
return None;
|
||||
};
|
||||
|
||||
let now = SystemTime::now();
|
||||
if let http_cache_semantics::BeforeRequest::Fresh(res_parts) = cached_object.policy.before_request(req, now) {
|
||||
let Some(filepath) = cached_object.target else {
|
||||
let cached_object = {
|
||||
let Ok(mut lock) = self.inner.lock() else {
|
||||
error!("Mutex can't be locked for checking cache entry");
|
||||
return None;
|
||||
};
|
||||
|
||||
let mgr = self.cache_file_manager.read().await;
|
||||
let res_body = match mgr.read(&filepath).await {
|
||||
Ok(res_body) => res_body,
|
||||
Err(e) => {
|
||||
warn!("Failed to read from cache: {e}");
|
||||
self.inner.invalidate(&moka_key).await;
|
||||
return None;
|
||||
}
|
||||
let Some(cached_object) = lock.get(&cache_key) else {
|
||||
return None;
|
||||
};
|
||||
debug!("Cache hit: {moka_key}");
|
||||
cached_object.clone()
|
||||
};
|
||||
|
||||
Some(Response::from_parts(res_parts, res_body))
|
||||
} else {
|
||||
// Secondly check the cache freshness as an HTTP message
|
||||
let now = SystemTime::now();
|
||||
let http_cache_semantics::BeforeRequest::Fresh(res_parts) = cached_object.policy.before_request(req, now) else {
|
||||
// Evict stale cache entry.
|
||||
// This might be okay to keep as is since it would be updated later.
|
||||
// However, there is no guarantee that newly got objects will be still cacheable.
|
||||
// So, we have to evict stale cache entries and cache file objects if found.
|
||||
debug!("Stale cache entry and file object: {moka_key}");
|
||||
self.inner.invalidate(&moka_key).await;
|
||||
// let my_cache = self.inner.clone();
|
||||
// self.runtime_handle.spawn(async move {
|
||||
// eviction listener will be activated during invalidation.
|
||||
// my_cache.invalidate(&moka_key).await;
|
||||
// });
|
||||
None
|
||||
}
|
||||
}
|
||||
|
||||
pub fn is_cacheable<R>(&self, req: Option<&Request<R>>, res: Option<&Response<Body>>) -> Result<Option<CachePolicy>>
|
||||
where
|
||||
R: Debug,
|
||||
{
|
||||
// deduce cache policy from req and res
|
||||
let (Some(req), Some(res)) = (req, res) else {
|
||||
return Err(RpxyError::Cache("Invalid null request and/or response"));
|
||||
debug!("Stale cache entry and file object: {cache_key}");
|
||||
let _evicted_entry = self.evict_cache_entry(&cache_key);
|
||||
self.evict_cache_file(&cached_object.target).await;
|
||||
return None;
|
||||
};
|
||||
|
||||
let new_policy = CachePolicy::new(req, res);
|
||||
if new_policy.is_storable() {
|
||||
debug!("Response is cacheable: {:?}\n{:?}", req, res.headers());
|
||||
Ok(Some(new_policy))
|
||||
} else {
|
||||
Ok(None)
|
||||
}
|
||||
// Finally retrieve the file object
|
||||
let mgr = self.cache_file_manager.read().await;
|
||||
let res_body = match mgr.read(&cached_object.target).await {
|
||||
Ok(res_body) => res_body,
|
||||
Err(e) => {
|
||||
warn!("Failed to read from file cache: {e}");
|
||||
let _evicted_entry = self.evict_cache_entry(&cache_key);
|
||||
self.evict_cache_file(&cached_object.target).await;
|
||||
return None;
|
||||
}
|
||||
};
|
||||
|
||||
debug!("Cache hit: {cache_key}");
|
||||
Some(Response::from_parts(res_parts, res_body))
|
||||
}
|
||||
|
||||
pub async fn put(&self, uri: &hyper::Uri, body_bytes: &Bytes, policy: &CachePolicy) -> Result<()> {
|
||||
let my_cache = self.inner.clone();
|
||||
let mgr = self.cache_file_manager.clone();
|
||||
let uri = uri.clone();
|
||||
let bytes_clone = body_bytes.clone();
|
||||
let policy_clone = policy.clone();
|
||||
let mgr_clone = self.cache_file_manager.clone();
|
||||
let max_each_size = self.max_each_size;
|
||||
|
||||
self.runtime_handle.spawn(async move {
|
||||
let moka_key = derive_moka_key_from_uri(&uri);
|
||||
if bytes_clone.len() > max_each_size {
|
||||
warn!("Too large to cache");
|
||||
return Err(RpxyError::Cache("Too large to cache"));
|
||||
}
|
||||
let cache_key = derive_cache_key_from_uri(&uri);
|
||||
let cache_filename = derive_filename_from_uri(&uri);
|
||||
|
||||
warn!("{:?} bytes to be written", bytes_clone.len());
|
||||
if let Err(e) = my_cache
|
||||
.try_get_with(moka_key, async {
|
||||
let mut mgr = mgr_clone.write().await;
|
||||
mgr.write(&cache_filename, &bytes_clone, &policy_clone).await
|
||||
})
|
||||
.await
|
||||
{
|
||||
error!("Failed to put the body into the file object or cache entry: {e}");
|
||||
};
|
||||
debug!("Cache file of {:?} bytes to be written", bytes_clone.len());
|
||||
|
||||
debug!("Current cache entries: {:?}", my_cache);
|
||||
let mut mgr = mgr.write().await;
|
||||
let Ok(cache_object) = mgr.create(&cache_filename, &bytes_clone, &policy_clone).await else {
|
||||
error!("Failed to put the body into the file object or cache entry");
|
||||
return Err(RpxyError::Cache("Failed to put the body into the file object or cache entry"));
|
||||
};
|
||||
let push_opt = {
|
||||
let Ok(mut lock) = my_cache.lock() else {
|
||||
error!("Failed to acquire mutex lock for writing cache entry");
|
||||
return Err(RpxyError::Cache("Failed to acquire mutex lock for writing cache entry"));
|
||||
};
|
||||
lock.push(cache_key.clone(), cache_object)
|
||||
};
|
||||
if let Some((k, v)) = push_opt {
|
||||
if k != cache_key {
|
||||
info!("Over the cache capacity. Evict least recent used entry");
|
||||
if let Err(e) = mgr.remove(&v.target).await {
|
||||
warn!("Eviction failed during file object removal over the capacity: {:?}", e);
|
||||
};
|
||||
}
|
||||
}
|
||||
|
||||
debug!("Cached a new file: {} - {}", cache_key, cache_filename);
|
||||
Ok(())
|
||||
});
|
||||
|
||||
Ok(())
|
||||
}
|
||||
}
|
||||
|
||||
fn derive_filename_from_uri(uri: &hyper::Uri) -> String {
|
||||
let mut hasher = Sha256::new();
|
||||
hasher.update(uri.to_string());
|
||||
let digest = hasher.finalize();
|
||||
general_purpose::URL_SAFE_NO_PAD.encode(digest)
|
||||
}
|
||||
|
||||
fn derive_cache_key_from_uri(uri: &hyper::Uri) -> String {
|
||||
uri.to_string()
|
||||
}
|
||||
|
||||
pub fn get_policy_if_cacheable<R>(req: Option<&Request<R>>, res: Option<&Response<Body>>) -> Result<Option<CachePolicy>>
|
||||
where
|
||||
R: Debug,
|
||||
{
|
||||
// deduce cache policy from req and res
|
||||
let (Some(req), Some(res)) = (req, res) else {
|
||||
return Err(RpxyError::Cache("Invalid null request and/or response"));
|
||||
};
|
||||
|
||||
let new_policy = CachePolicy::new(req, res);
|
||||
if new_policy.is_storable() {
|
||||
debug!("Response is cacheable: {:?}\n{:?}", req, res.headers());
|
||||
Ok(Some(new_policy))
|
||||
} else {
|
||||
Ok(None)
|
||||
}
|
||||
}
|
||||
|
|
|
|||
|
|
@ -1,4 +1,4 @@
|
|||
use super::cache::RpxyCache;
|
||||
use super::cache::{get_policy_if_cacheable, RpxyCache};
|
||||
use crate::{error::RpxyError, globals::Globals, log::*, CryptoSource};
|
||||
use async_trait::async_trait;
|
||||
use bytes::Buf;
|
||||
|
|
@ -55,7 +55,7 @@ where
|
|||
if self.cache.is_some() {
|
||||
if let Some(cached_response) = self.cache.as_ref().unwrap().get(&req).await {
|
||||
// if found, return it as response.
|
||||
debug!("Cache hit - Return from cache");
|
||||
info!("Cache hit - Return from cache");
|
||||
return Ok(cached_response);
|
||||
};
|
||||
|
||||
|
|
@ -76,13 +76,9 @@ where
|
|||
}
|
||||
|
||||
// check cacheability and store it if cacheable
|
||||
let Ok(Some(cache_policy)) = self
|
||||
.cache
|
||||
.as_ref()
|
||||
.unwrap()
|
||||
.is_cacheable(synth_req.as_ref(), res.as_ref().ok()) else {
|
||||
return res;
|
||||
};
|
||||
let Ok(Some(cache_policy)) = get_policy_if_cacheable(synth_req.as_ref(), res.as_ref().ok()) else {
|
||||
return res;
|
||||
};
|
||||
let (parts, body) = res.unwrap().into_parts();
|
||||
// TODO: Inefficient?
|
||||
let Ok(mut bytes) = hyper::body::aggregate(body).await else {
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue