mirror of
https://github.com/discourse/discourse.git
synced 2024-11-23 06:49:14 +08:00
0caa335ef0
HTTP status was not correct with send_file which uses streaming
86 lines
2.5 KiB
Ruby
86 lines
2.5 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
# This module allows us to hijack a request and send it to the client in the deferred job queue
|
|
# For cases where we are making remote calls like onebox or proxying files and so on this helps
|
|
# free up a unicorn worker while the remote IO is happening
|
|
module Hijack
|
|
|
|
def hijack(&blk)
|
|
controller_class = self.class
|
|
|
|
#env = request.env.dup
|
|
#request_copy = ActionDispatch::Request.new(env)
|
|
request_copy = self.request
|
|
|
|
if hijack = request.env['rack.hijack']
|
|
io = hijack.call
|
|
|
|
# in prd the env object is re-used
|
|
# make a copy of all strings
|
|
env_copy = {}
|
|
request.env.each do |k, v|
|
|
env_copy[k] = v if String === v
|
|
end
|
|
|
|
request_copy = ActionDispatch::Request.new(env_copy)
|
|
|
|
# params is generated per request so we can simply reuse it
|
|
params_copy = params
|
|
|
|
Scheduler::Defer.later("hijack work") do
|
|
|
|
begin
|
|
# do this first to confirm we have a working connection
|
|
# before doing any work
|
|
io.write "HTTP/1.1 "
|
|
|
|
# this trick avoids double render, also avoids any litter that the controller hooks
|
|
# place on the response
|
|
instance = controller_class.new
|
|
response = ActionDispatch::Response.new
|
|
instance.response = response
|
|
|
|
instance.request = request_copy
|
|
instance.params = params_copy
|
|
|
|
begin
|
|
instance.instance_eval(&blk)
|
|
rescue => e
|
|
Rails.logger.warn("Failed to process hijacked response correctly #{e}")
|
|
end
|
|
|
|
unless instance.response_body || response.committed?
|
|
instance.status = 500
|
|
end
|
|
|
|
response.commit!
|
|
|
|
body = response.body
|
|
|
|
headers = response.headers
|
|
headers['Content-Length'] = body.bytesize
|
|
headers['Content-Type'] = response.content_type || "text/plain"
|
|
headers['Connection'] = "close"
|
|
|
|
status_string = Rack::Utils::HTTP_STATUS_CODES[instance.status.to_i] || "Unknown"
|
|
io.write "#{instance.status} #{status_string}\r\n"
|
|
|
|
headers.each do |name, val|
|
|
io.write "#{name}: #{val}\r\n"
|
|
end
|
|
|
|
io.write "\r\n"
|
|
io.write body
|
|
io.close
|
|
rescue Errno::EPIPE, IOError
|
|
# happens if client terminated before we responded, ignore
|
|
end
|
|
end
|
|
# not leaked out, we use 418 ... I am a teapot to denote that we are hijacked
|
|
render plain: "", status: 418
|
|
else
|
|
blk.call
|
|
end
|
|
end
|
|
end
|