WIP: more work on aquatic_http

This commit is contained in:
Joakim Frostegård 2020-07-02 00:39:50 +02:00
parent 404e528616
commit 76079cf66e
7 changed files with 211 additions and 183 deletions

20
Cargo.lock generated
View file

@ -49,6 +49,7 @@ dependencies = [
"either", "either",
"flume", "flume",
"hashbrown", "hashbrown",
"httparse",
"indexmap", "indexmap",
"log", "log",
"mimalloc", "mimalloc",
@ -60,6 +61,7 @@ dependencies = [
"quickcheck_macros", "quickcheck_macros",
"rand", "rand",
"serde", "serde",
"serde_urlencoded",
"simplelog", "simplelog",
"socket2", "socket2",
] ]
@ -372,6 +374,12 @@ dependencies = [
"generic-array", "generic-array",
] ]
[[package]]
name = "dtoa"
version = "0.4.6"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "134951f4028bdadb9b84baf4232681efbf277da25144b9b0ad65df75946c422b"
[[package]] [[package]]
name = "either" name = "either"
version = "1.5.3" version = "1.5.3"
@ -1208,6 +1216,18 @@ dependencies = [
"serde", "serde",
] ]
[[package]]
name = "serde_urlencoded"
version = "0.6.1"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "9ec5d77e2d4c73717816afac02670d5c4f534ea95ed430442cad02e7a6e32c97"
dependencies = [
"dtoa",
"itoa",
"serde",
"url",
]
[[package]] [[package]]
name = "sha-1" name = "sha-1"
version = "0.8.2" version = "0.8.2"

View file

@ -6,10 +6,10 @@
and maybe run scripts should be adjusted and maybe run scripts should be adjusted
## aquatic_http ## aquatic_http
* setup tls connection: support TLS and plain at the same time?? * handshake stuff
* parse http requests incrementally when data comes in. crate for streaming * support TLS and plain at the same time??
parse? * simplify
* serde for request/responses, also url encoded info hashes and peer id's * test
* move stuff to common crate with ws: what about Request/InMessage etc? * move stuff to common crate with ws: what about Request/InMessage etc?
## aquatic_ws ## aquatic_ws

View file

@ -20,6 +20,7 @@ aquatic_common = { path = "../aquatic_common" }
either = "1" either = "1"
flume = "0.7" flume = "0.7"
hashbrown = { version = "0.7", features = ["serde"] } hashbrown = { version = "0.7", features = ["serde"] }
httparse = "1"
indexmap = "1" indexmap = "1"
log = "0.4" log = "0.4"
mimalloc = { version = "0.1", default-features = false } mimalloc = { version = "0.1", default-features = false }
@ -29,6 +30,7 @@ parking_lot = "0.10"
privdrop = "0.3" privdrop = "0.3"
rand = { version = "0.7", features = ["small_rng"] } rand = { version = "0.7", features = ["small_rng"] }
serde = { version = "1", features = ["derive"] } serde = { version = "1", features = ["derive"] }
serde_urlencoded = "0.6"
socket2 = { version = "0.3", features = ["reuseport"] } socket2 = { version = "0.3", features = ["reuseport"] }
simplelog = "0.8" simplelog = "0.8"

View file

@ -1,5 +1,6 @@
use std::net::{SocketAddr}; use std::net::{SocketAddr};
use std::io::{Read, Write}; use std::io::{Read, Write};
use std::io::ErrorKind;
use either::Either; use either::Either;
use hashbrown::HashMap; use hashbrown::HashMap;
@ -7,12 +8,9 @@ use log::info;
use mio::Token; use mio::Token;
use mio::net::TcpStream; use mio::net::TcpStream;
use native_tls::{TlsAcceptor, TlsStream, MidHandshakeTlsStream}; use native_tls::{TlsAcceptor, TlsStream, MidHandshakeTlsStream};
use tungstenite::WebSocket;
use tungstenite::handshake::{MidHandshake, HandshakeError, server::NoCallback};
use tungstenite::server::{ServerHandshake};
use tungstenite::protocol::WebSocketConfig;
use crate::common::*; use crate::common::*;
use crate::protocol::{Request, Response};
pub enum Stream { pub enum Stream {
@ -86,15 +84,100 @@ impl Write for Stream {
} }
enum HandshakeMachine { #[derive(Debug)]
TcpStream(TcpStream), pub enum RequestParseError {
TlsStream(TlsStream<TcpStream>), NeedMoreData,
TlsMidHandshake(MidHandshakeTlsStream<TcpStream>), Invalid,
WsMidHandshake(MidHandshake<ServerHandshake<Stream, NoCallback>>), Incomplete,
Io(::std::io::Error),
Parse(::httparse::Error)
} }
impl HandshakeMachine { pub struct EstablishedConnection {
stream: Stream,
pub peer_addr: SocketAddr,
buf: Vec<u8>,
}
impl EstablishedConnection {
fn new(stream: Stream) -> Self {
let peer_addr = stream.get_peer_addr();
Self {
stream,
peer_addr,
buf: Vec::new(), // FIXME: with capacity of like 100?
}
}
pub fn parse_request(&mut self) -> Result<Request, RequestParseError> {
match self.stream.read(&mut self.buf){
Ok(0) => {
// FIXME: finished reading completely here?
},
Ok(_) => {
return Err(RequestParseError::NeedMoreData);
},
Err(err) if err.kind() == ErrorKind::WouldBlock => {
return Err(RequestParseError::NeedMoreData);
},
Err(err) => {
return Err(RequestParseError::Io(err));
}
}
let mut headers = [httparse::EMPTY_HEADER; 1];
let mut request = httparse::Request::new(&mut headers);
let request = match request.parse(&self.buf){
Ok(httparse::Status::Complete(_)) => {
if let Some(request) = Request::from_http(request){
Ok(request)
} else {
Err(RequestParseError::Invalid)
}
},
Ok(httparse::Status::Partial) => {
Err(RequestParseError::Incomplete)
},
Err(err) => {
Err(RequestParseError::Parse(err))
}
};
self.buf.clear();
self.buf.shrink_to_fit();
request
}
pub fn send_response(&mut self, body: &str) -> Result<(), RequestParseError> {
let mut response = String::new();
response.push_str("200 OK\r\n\r\n");
response.push_str(body);
match self.stream.write(response.as_bytes()){
Ok(_) => Ok(()),
Err(err) => {
info!("send response: {:?}", err);
Err(RequestParseError::Io(err))
}
}
}
}
enum HandshakeMachine {
TcpStream(TcpStream),
TlsMidHandshake(MidHandshakeTlsStream<TcpStream>),
}
impl <'a>HandshakeMachine {
#[inline] #[inline]
fn new(tcp_stream: TcpStream) -> Self { fn new(tcp_stream: TcpStream) -> Self {
Self::TcpStream(tcp_stream) Self::TcpStream(tcp_stream)
@ -103,9 +186,8 @@ impl HandshakeMachine {
#[inline] #[inline]
fn advance( fn advance(
self, self,
ws_config: WebSocketConfig,
opt_tls_acceptor: &Option<TlsAcceptor>, // If set, run TLS opt_tls_acceptor: &Option<TlsAcceptor>, // If set, run TLS
) -> (Option<Either<EstablishedWs, Self>>, bool) { // bool = stop looping ) -> (Option<Either<EstablishedConnection, Self>>, bool) { // bool = stop looping
match self { match self {
HandshakeMachine::TcpStream(stream) => { HandshakeMachine::TcpStream(stream) => {
if let Some(tls_acceptor) = opt_tls_acceptor { if let Some(tls_acceptor) = opt_tls_acceptor {
@ -113,37 +195,22 @@ impl HandshakeMachine {
tls_acceptor.accept(stream) tls_acceptor.accept(stream)
) )
} else { } else {
let handshake_result = ::tungstenite::server::accept_with_config( (Some(Either::Left(EstablishedConnection::new(Stream::TcpStream(stream)))), false)
Stream::TcpStream(stream),
Some(ws_config)
);
Self::handle_ws_handshake_result(handshake_result)
} }
}, },
HandshakeMachine::TlsStream(stream) => {
let handshake_result = ::tungstenite::server::accept(
Stream::TlsStream(stream),
);
Self::handle_ws_handshake_result(handshake_result)
},
HandshakeMachine::TlsMidHandshake(handshake) => { HandshakeMachine::TlsMidHandshake(handshake) => {
Self::handle_tls_handshake_result(handshake.handshake()) Self::handle_tls_handshake_result(handshake.handshake())
}, },
HandshakeMachine::WsMidHandshake(handshake) => {
Self::handle_ws_handshake_result(handshake.handshake())
},
} }
} }
#[inline] #[inline]
fn handle_tls_handshake_result( fn handle_tls_handshake_result(
result: Result<TlsStream<TcpStream>, ::native_tls::HandshakeError<TcpStream>>, result: Result<TlsStream<TcpStream>, ::native_tls::HandshakeError<TcpStream>>,
) -> (Option<Either<EstablishedWs, Self>>, bool) { ) -> (Option<Either<EstablishedConnection, Self>>, bool) {
match result { match result {
Ok(stream) => { Ok(stream) => {
(Some(Either::Right(Self::TlsStream(stream))), false) (Some(Either::Left(EstablishedConnection::new(Stream::TlsStream(stream)))), false)
}, },
Err(native_tls::HandshakeError::WouldBlock(handshake)) => { Err(native_tls::HandshakeError::WouldBlock(handshake)) => {
(Some(Either::Right(Self::TlsMidHandshake(handshake))), true) (Some(Either::Right(Self::TlsMidHandshake(handshake))), true)
@ -155,76 +222,38 @@ impl HandshakeMachine {
} }
} }
} }
#[inline]
fn handle_ws_handshake_result(
result: Result<WebSocket<Stream>, HandshakeError<ServerHandshake<Stream, NoCallback>>> ,
) -> (Option<Either<EstablishedWs, Self>>, bool) {
match result {
Ok(mut ws) => {
let peer_addr = ws.get_mut().get_peer_addr();
let established_ws = EstablishedWs {
ws,
peer_addr,
};
(Some(Either::Left(established_ws)), false)
},
Err(HandshakeError::Interrupted(handshake)) => {
(Some(Either::Right(HandshakeMachine::WsMidHandshake(handshake))), true)
},
Err(HandshakeError::Failure(err)) => {
info!("ws handshake error: {}", err);
(None, false)
}
}
}
}
pub struct EstablishedWs {
pub ws: WebSocket<Stream>,
pub peer_addr: SocketAddr,
} }
pub struct Connection { pub struct Connection {
ws_config: WebSocketConfig,
pub valid_until: ValidUntil, pub valid_until: ValidUntil,
inner: Either<EstablishedWs, HandshakeMachine>, inner: Either<EstablishedConnection, HandshakeMachine>,
} }
/// Create from TcpStream. Run `advance_handshakes` until `get_established_ws` /// Create from TcpStream. Run `advance_handshakes` until `get_established_ws`
/// returns Some(EstablishedWs). /// returns Some(EstablishedWs).
/// ///
/// advance_handshakes takes ownership of self because the TLS and WebSocket /// advance_handshakes takes ownership of self because the TLS handshake
/// handshake methods do. get_established_ws doesn't, since work can be done /// methods does. get_established doesn't, since work can be done on a mutable
/// on a mutable reference to a tungstenite websocket, and this way, the whole /// reference to a tls stream, and this way, the whole connection doesn't have
/// Connection doesn't have to be removed from and reinserted into the /// to be removed/inserted into the ConnectionMap
/// TorrentMap. This is also the reason for wrapping Container.inner in an
/// Either instead of combining all states into one structure just having a
/// single method for advancing handshakes and maybe returning a websocket.
impl Connection { impl Connection {
#[inline] #[inline]
pub fn new( pub fn new(
ws_config: WebSocketConfig,
valid_until: ValidUntil, valid_until: ValidUntil,
tcp_stream: TcpStream, tcp_stream: TcpStream,
) -> Self { ) -> Self {
Self { Self {
ws_config,
valid_until, valid_until,
inner: Either::Right(HandshakeMachine::new(tcp_stream)) inner: Either::Right(HandshakeMachine::new(tcp_stream))
} }
} }
#[inline] #[inline]
pub fn get_established_ws<'a>(&mut self) -> Option<&mut EstablishedWs> { pub fn get_established(&mut self) -> Option<&mut EstablishedConnection> {
match self.inner { match self.inner {
Either::Left(ref mut ews) => Some(ews), Either::Left(ref mut established) => Some(established),
Either::Right(_) => None, Either::Right(_) => None,
} }
} }
@ -238,15 +267,11 @@ impl Connection {
match self.inner { match self.inner {
Either::Left(_) => (Some(self), false), Either::Left(_) => (Some(self), false),
Either::Right(machine) => { Either::Right(machine) => {
let ws_config = self.ws_config;
let (opt_inner, stop_loop) = machine.advance( let (opt_inner, stop_loop) = machine.advance(
ws_config,
opt_tls_acceptor opt_tls_acceptor
); );
let opt_new_self = opt_inner.map(|inner| Self { let opt_new_self = opt_inner.map(|inner| Self {
ws_config,
valid_until, valid_until,
inner inner
}); });
@ -255,24 +280,7 @@ impl Connection {
} }
} }
} }
#[inline]
pub fn close(&mut self){
if let Either::Left(ref mut ews) = self.inner {
if ews.ws.can_read(){
ews.ws.close(None).unwrap();
// Required after ws.close()
if let Err(err) = ews.ws.write_pending(){
info!(
"error writing pending messages after closing ws: {}",
err
)
}
}
}
}
} }
pub type ConnectionMap = HashMap<Token, Connection>; pub type ConnectionMap<'a> = HashMap<Token, Connection>;

View file

@ -6,7 +6,6 @@ use log::{info, debug, error};
use native_tls::TlsAcceptor; use native_tls::TlsAcceptor;
use mio::{Events, Poll, Interest, Token}; use mio::{Events, Poll, Interest, Token};
use mio::net::TcpListener; use mio::net::TcpListener;
use tungstenite::protocol::WebSocketConfig;
use crate::common::*; use crate::common::*;
use crate::config::Config; use crate::config::Config;
@ -24,8 +23,8 @@ pub fn run_socket_worker(
config: Config, config: Config,
socket_worker_index: usize, socket_worker_index: usize,
socket_worker_statuses: SocketWorkerStatuses, socket_worker_statuses: SocketWorkerStatuses,
request_channel_sender: InMessageSender, request_channel_sender: RequestChannelSender,
response_channel_receiver: OutMessageReceiver, response_channel_receiver: ResponseChannelReceiver,
opt_tls_acceptor: Option<TlsAcceptor>, opt_tls_acceptor: Option<TlsAcceptor>,
){ ){
match create_listener(&config){ match create_listener(&config){
@ -54,19 +53,14 @@ pub fn run_socket_worker(
pub fn run_poll_loop( pub fn run_poll_loop(
config: Config, config: Config,
socket_worker_index: usize, socket_worker_index: usize,
request_channel_sender: InMessageSender, request_channel_sender: RequestChannelSender,
response_channel_receiver: OutMessageReceiver, response_channel_receiver: ResponseChannelReceiver,
listener: ::std::net::TcpListener, listener: ::std::net::TcpListener,
opt_tls_acceptor: Option<TlsAcceptor>, opt_tls_acceptor: Option<TlsAcceptor>,
){ ){
let poll_timeout = Duration::from_millis( let poll_timeout = Duration::from_millis(
config.network.poll_timeout_milliseconds config.network.poll_timeout_milliseconds
); );
let ws_config = WebSocketConfig {
max_message_size: Some(config.network.websocket_max_message_size),
max_frame_size: Some(config.network.websocket_max_frame_size),
max_send_queue: None,
};
let mut listener = TcpListener::from_std(listener); let mut listener = TcpListener::from_std(listener);
let mut poll = Poll::new().expect("create poll"); let mut poll = Poll::new().expect("create poll");
@ -92,7 +86,6 @@ pub fn run_poll_loop(
if token.0 == 0 { if token.0 == 0 {
accept_new_streams( accept_new_streams(
ws_config,
&mut listener, &mut listener,
&mut poll, &mut poll,
&mut connections, &mut connections,
@ -111,7 +104,7 @@ pub fn run_poll_loop(
} }
} }
send_out_messages( send_responses(
response_channel_receiver.drain(), response_channel_receiver.drain(),
&mut connections &mut connections
); );
@ -128,7 +121,6 @@ pub fn run_poll_loop(
// will be identical to ws version // will be identical to ws version
fn accept_new_streams( fn accept_new_streams(
ws_config: WebSocketConfig,
listener: &mut TcpListener, listener: &mut TcpListener,
poll: &mut Poll, poll: &mut Poll,
connections: &mut ConnectionMap, connections: &mut ConnectionMap,
@ -152,7 +144,7 @@ fn accept_new_streams(
.register(&mut stream, token, Interest::READABLE) .register(&mut stream, token, Interest::READABLE)
.unwrap(); .unwrap();
let connection = Connection::new(ws_config, valid_until, stream); let connection = Connection::new(valid_until, stream);
connections.insert(token, connection); connections.insert(token, connection);
}, },
@ -170,56 +162,52 @@ fn accept_new_streams(
/// On the stream given by poll_token, get TLS (if requested) and tungstenite /// On the stream given by poll_token, get TLS (if requested) and tungstenite
/// up and running, then read messages and pass on through channel. /// up and running, then read messages and pass on through channel.
pub fn run_handshake_and_read_requests( pub fn run_handshake_and_read_requests<'a>(
socket_worker_index: usize, socket_worker_index: usize,
request_channel_sender: &InMessageSender, request_channel_sender: &RequestChannelSender,
opt_tls_acceptor: &Option<TlsAcceptor>, // If set, run TLS opt_tls_acceptor: &'a Option<TlsAcceptor>, // If set, run TLS
connections: &mut ConnectionMap, connections: &'a mut ConnectionMap<'a>,
poll_token: Token, poll_token: Token,
valid_until: ValidUntil, valid_until: ValidUntil,
){ ){
loop { loop {
if let Some(established_ws) = connections.get_mut(&poll_token) if let Some(established_connection) = connections.get_mut(&poll_token)
.and_then(Connection::get_established_ws) .and_then(Connection::get_established)
{ {
use ::tungstenite::Error::Io; match established_connection.parse_request(){
Ok(request) => {
match established_ws.ws.read_message(){
Ok(ws_message) => {
if let Some(in_message) = InMessage::from_ws_message(ws_message){
let meta = ConnectionMeta { let meta = ConnectionMeta {
worker_index: socket_worker_index, worker_index: socket_worker_index,
poll_token, poll_token,
peer_addr: established_ws.peer_addr peer_addr: established_connection.peer_addr
}; };
debug!("read message"); debug!("read message");
if let Err(err) = request_channel_sender if let Err(err) = request_channel_sender
.send((meta, in_message)) .send((meta, request))
{ {
error!( error!(
"InMessageSender: couldn't send message: {:?}", "RequestChannelSender: couldn't send message: {:?}",
err err
); );
} }
}
}, },
Err(Io(err)) if err.kind() == ErrorKind::WouldBlock => { Err(RequestParseError::NeedMoreData) => {
break; break;
}, },
Err(tungstenite::Error::ConnectionClosed) => { Err(RequestParseError::Io(err)) => {
remove_connection_if_exists(connections, poll_token);
break
},
Err(err) => {
info!("error reading messages: {}", err); info!("error reading messages: {}", err);
remove_connection_if_exists(connections, poll_token); remove_connection_if_exists(connections, poll_token);
break; break;
} },
Err(e) => {
info!("error reading request: {:?}", e);
break;
},
} }
} else if let Some(connection) = connections.remove(&poll_token){ } else if let Some(connection) = connections.remove(&poll_token){
let (opt_new_connection, stop_loop) = connection.advance_handshakes( let (opt_new_connection, stop_loop) = connection.advance_handshakes(
@ -240,39 +228,37 @@ pub fn run_handshake_and_read_requests(
/// Read messages from channel, send to peers /// Read messages from channel, send to peers
pub fn send_out_messages( pub fn send_responses(
response_channel_receiver: ::flume::Drain<(ConnectionMeta, OutMessage)>, response_channel_receiver: ::flume::Drain<(ConnectionMeta, Response)>,
connections: &mut ConnectionMap, connections: &mut ConnectionMap,
){ ){
for (meta, out_message) in response_channel_receiver { for (meta, response) in response_channel_receiver {
let opt_established_ws = connections.get_mut(&meta.poll_token) let opt_established = connections.get_mut(&meta.poll_token)
.and_then(Connection::get_established_ws); .and_then(Connection::get_established);
if let Some(established_ws) = opt_established_ws { if let Some(established) = opt_established {
if established_ws.peer_addr != meta.peer_addr { if established.peer_addr != meta.peer_addr {
info!("socket worker error: peer socket addrs didn't match"); info!("socket worker error: peer socket addrs didn't match");
continue; continue;
} }
use ::tungstenite::Error::Io; match established.send_response(&response.to_http_string()){
match established_ws.ws.write_message(out_message.to_ws_message()){
Ok(()) => { Ok(()) => {
debug!("sent message"); debug!("sent message");
}, },
Err(Io(err)) if err.kind() == ErrorKind::WouldBlock => {}, Err(RequestParseError::NeedMoreData) => {}, // FIXME: block?
Err(tungstenite::Error::ConnectionClosed) => { Err(RequestParseError::Io(err)) => {
remove_connection_if_exists(connections, meta.poll_token); info!("error sending response: {}", err);
},
Err(err) => {
info!("error writing ws message: {}", err);
remove_connection_if_exists( remove_connection_if_exists(
connections, connections,
meta.poll_token meta.poll_token
); );
}, },
_ => {
unreachable!()
}
} }
} }
} }

View file

@ -48,7 +48,7 @@ pub fn remove_connection_if_exists(
token: Token, token: Token,
){ ){
if let Some(mut connection) = connections.remove(&token){ if let Some(mut connection) = connections.remove(&token){
connection.close(); // connection.close(); // FIXME
} }
} }
@ -62,7 +62,7 @@ pub fn remove_inactive_connections(
connections.retain(|_, connection| { connections.retain(|_, connection| {
if connection.valid_until.0 < now { if connection.valid_until.0 < now {
connection.close(); // connection.close(); // FIXME
false false
} else { } else {

View file

@ -4,18 +4,18 @@ use serde::{Serialize, Deserialize};
use crate::common::Peer; use crate::common::Peer;
mod serde_helpers; // mod serde_helpers;
use serde_helpers::*; // use serde_helpers::*;
#[derive(Debug, Clone, Copy, Hash, PartialEq, Eq, Serialize, Deserialize)] #[derive(Debug, Clone, Copy, Hash, PartialEq, Eq, Serialize, Deserialize)]
#[serde(transparent)] #[serde(transparent)]
pub struct PeerId( pub struct PeerId(
#[serde( // #[serde(
deserialize_with = "deserialize_20_bytes", // deserialize_with = "deserialize_20_bytes",
serialize_with = "serialize_20_bytes" // serialize_with = "serialize_20_bytes"
)] // )]
pub [u8; 20] pub [u8; 20]
); );
@ -23,10 +23,10 @@ pub struct PeerId(
#[derive(Debug, Clone, Copy, Hash, PartialEq, Eq, Serialize, Deserialize)] #[derive(Debug, Clone, Copy, Hash, PartialEq, Eq, Serialize, Deserialize)]
#[serde(transparent)] #[serde(transparent)]
pub struct InfoHash( pub struct InfoHash(
#[serde( // #[serde(
deserialize_with = "deserialize_20_bytes", // deserialize_with = "deserialize_20_bytes",
serialize_with = "serialize_20_bytes" // serialize_with = "serialize_20_bytes"
)] // )]
pub [u8; 20] pub [u8; 20]
); );
@ -102,11 +102,7 @@ pub struct AnnounceResponseFailure {
#[derive(Debug, Clone, Deserialize)] #[derive(Debug, Clone, Deserialize)]
pub struct ScrapeRequest { pub struct ScrapeRequest {
#[serde( #[serde(rename = "info_hash")]
rename = "info_hash",
deserialize_with = "deserialize_info_hashes",
default
)]
pub info_hashes: Vec<InfoHash>, pub info_hashes: Vec<InfoHash>,
} }
@ -133,8 +129,17 @@ pub enum Request {
impl Request { impl Request {
pub fn from_http() -> Self { pub fn from_http(http: httparse::Request) -> Option<Self> {
unimplemented!() http.path
.and_then(|path| {
let mut iterator = path.splitn(2, '?');
iterator.next();
iterator.next()
})
.and_then(|query_string| {
serde_urlencoded::from_str(query_string).ok()
})
} }
} }
@ -145,3 +150,10 @@ pub enum Response {
AnnounceFailure(AnnounceResponseFailure), AnnounceFailure(AnnounceResponseFailure),
Scrape(ScrapeResponse) Scrape(ScrapeResponse)
} }
impl Response {
pub fn to_http_string(self) -> String {
unimplemented!()
}
}