|
4 | 4 | //! cargo run -p example-low-level-rustls
|
5 | 5 | //! ```
|
6 | 6 |
|
7 |
| -// TODO |
8 |
| -fn main() { |
9 |
| - eprint!("this example has not yet been updated to hyper 1.0"); |
| 7 | +use axum::{extract::Request, routing::get, Router}; |
| 8 | +use futures_util::pin_mut; |
| 9 | +use hyper::body::Incoming; |
| 10 | +use hyper_util::rt::{TokioExecutor, TokioIo}; |
| 11 | +use rustls_pemfile::{certs, pkcs8_private_keys}; |
| 12 | +use std::{ |
| 13 | + fs::File, |
| 14 | + io::BufReader, |
| 15 | + path::{Path, PathBuf}, |
| 16 | + sync::Arc, |
| 17 | +}; |
| 18 | +use tokio::net::TcpListener; |
| 19 | +use tokio_rustls::{ |
| 20 | + rustls::{Certificate, PrivateKey, ServerConfig}, |
| 21 | + TlsAcceptor, |
| 22 | +}; |
| 23 | +use tower_service::Service; |
| 24 | +use tracing::{error, info, warn}; |
| 25 | +use tracing_subscriber::{layer::SubscriberExt, util::SubscriberInitExt}; |
| 26 | + |
| 27 | +#[tokio::main] |
| 28 | +async fn main() { |
| 29 | + tracing_subscriber::registry() |
| 30 | + .with( |
| 31 | + tracing_subscriber::EnvFilter::try_from_default_env() |
| 32 | + .unwrap_or_else(|_| "example_low_level_rustls=debug".into()), |
| 33 | + ) |
| 34 | + .with(tracing_subscriber::fmt::layer()) |
| 35 | + .init(); |
| 36 | + |
| 37 | + let rustls_config = rustls_server_config( |
| 38 | + PathBuf::from(env!("CARGO_MANIFEST_DIR")) |
| 39 | + .join("self_signed_certs") |
| 40 | + .join("key.pem"), |
| 41 | + PathBuf::from(env!("CARGO_MANIFEST_DIR")) |
| 42 | + .join("self_signed_certs") |
| 43 | + .join("cert.pem"), |
| 44 | + ); |
| 45 | + |
| 46 | + let tls_acceptor = TlsAcceptor::from(rustls_config); |
| 47 | + let bind = "[::1]:3000"; |
| 48 | + let tcp_listener = TcpListener::bind(bind).await.unwrap(); |
| 49 | + info!("HTTPS server listening on {bind}. To contact curl -k https://localhost:3000"); |
| 50 | + let app = Router::new().route("/", get(handler)); |
| 51 | + |
| 52 | + pin_mut!(tcp_listener); |
| 53 | + loop { |
| 54 | + let tower_service = app.clone(); |
| 55 | + let tls_acceptor = tls_acceptor.clone(); |
| 56 | + |
| 57 | + // Wait for new tcp connection |
| 58 | + let (cnx, addr) = tcp_listener.accept().await.unwrap(); |
| 59 | + |
| 60 | + tokio::spawn(async move { |
| 61 | + // Wait for tls handshake to happen |
| 62 | + let Ok(stream) = tls_acceptor.accept(cnx).await else { |
| 63 | + error!("error during tls handshake connection from {}", addr); |
| 64 | + return; |
| 65 | + }; |
| 66 | + |
| 67 | + // Hyper has its own `AsyncRead` and `AsyncWrite` traits and doesn't use tokio. |
| 68 | + // `TokioIo` converts between them. |
| 69 | + let stream = TokioIo::new(stream); |
| 70 | + |
| 71 | + // Hyper has also its own `Service` trait and doesn't use tower. We can use |
| 72 | + // `hyper::service::service_fn` to create a hyper `Service` that calls our app through |
| 73 | + // `tower::Service::call`. |
| 74 | + let hyper_service = hyper::service::service_fn(move |request: Request<Incoming>| { |
| 75 | + // We have to clone `tower_service` because hyper's `Service` uses `&self` whereas |
| 76 | + // tower's `Service` requires `&mut self`. |
| 77 | + // |
| 78 | + // We don't need to call `poll_ready` since `Router` is always ready. |
| 79 | + tower_service.clone().call(request) |
| 80 | + }); |
| 81 | + |
| 82 | + let ret = hyper_util::server::conn::auto::Builder::new(TokioExecutor::new()) |
| 83 | + .serve_connection_with_upgrades(stream, hyper_service) |
| 84 | + .await; |
| 85 | + |
| 86 | + if let Err(err) = ret { |
| 87 | + warn!("error serving connection from {}: {}", addr, err); |
| 88 | + } |
| 89 | + }); |
| 90 | + } |
10 | 91 | }
|
11 | 92 |
|
12 |
| -// use axum::{extract::Request, routing::get, Router}; |
13 |
| -// use futures_util::future::poll_fn; |
14 |
| -// use hyper::server::{ |
15 |
| -// accept::Accept, |
16 |
| -// conn::{AddrIncoming, Http}, |
17 |
| -// }; |
18 |
| -// use rustls_pemfile::{certs, pkcs8_private_keys}; |
19 |
| -// use std::{ |
20 |
| -// fs::File, |
21 |
| -// io::BufReader, |
22 |
| -// path::{Path, PathBuf}, |
23 |
| -// pin::Pin, |
24 |
| -// sync::Arc, |
25 |
| -// }; |
26 |
| -// use tokio::net::TcpListener; |
27 |
| -// use tokio_rustls::{ |
28 |
| -// rustls::{Certificate, PrivateKey, ServerConfig}, |
29 |
| -// TlsAcceptor, |
30 |
| -// }; |
31 |
| -// use tower::make::MakeService; |
32 |
| -// use tracing_subscriber::{layer::SubscriberExt, util::SubscriberInitExt}; |
33 |
| - |
34 |
| -// #[tokio::main] |
35 |
| -// async fn main() { |
36 |
| -// tracing_subscriber::registry() |
37 |
| -// .with( |
38 |
| -// tracing_subscriber::EnvFilter::try_from_default_env() |
39 |
| -// .unwrap_or_else(|_| "example_tls_rustls=debug".into()), |
40 |
| -// ) |
41 |
| -// .with(tracing_subscriber::fmt::layer()) |
42 |
| -// .init(); |
43 |
| - |
44 |
| -// let rustls_config = rustls_server_config( |
45 |
| -// PathBuf::from(env!("CARGO_MANIFEST_DIR")) |
46 |
| -// .join("self_signed_certs") |
47 |
| -// .join("key.pem"), |
48 |
| -// PathBuf::from(env!("CARGO_MANIFEST_DIR")) |
49 |
| -// .join("self_signed_certs") |
50 |
| -// .join("cert.pem"), |
51 |
| -// ); |
52 |
| - |
53 |
| -// let acceptor = TlsAcceptor::from(rustls_config); |
54 |
| - |
55 |
| -// let listener = TcpListener::bind("127.0.0.1:3000").await.unwrap(); |
56 |
| -// let mut listener = AddrIncoming::from_listener(listener).unwrap(); |
57 |
| - |
58 |
| -// let protocol = Arc::new(Http::new()); |
59 |
| - |
60 |
| -// let mut app = Router::<()>::new() |
61 |
| -// .route("/", get(handler)) |
62 |
| -// .into_make_service(); |
63 |
| - |
64 |
| -// loop { |
65 |
| -// let stream = poll_fn(|cx| Pin::new(&mut listener).poll_accept(cx)) |
66 |
| -// .await |
67 |
| -// .unwrap() |
68 |
| -// .unwrap(); |
69 |
| - |
70 |
| -// let acceptor = acceptor.clone(); |
71 |
| - |
72 |
| -// let protocol = protocol.clone(); |
73 |
| - |
74 |
| -// let svc = MakeService::<_, Request<hyper::Body>>::make_service(&mut app, &stream); |
75 |
| - |
76 |
| -// tokio::spawn(async move { |
77 |
| -// if let Ok(stream) = acceptor.accept(stream).await { |
78 |
| -// let _ = protocol.serve_connection(stream, svc.await.unwrap()).await; |
79 |
| -// } |
80 |
| -// }); |
81 |
| -// } |
82 |
| -// } |
83 |
| - |
84 |
| -// async fn handler() -> &'static str { |
85 |
| -// "Hello, World!" |
86 |
| -// } |
87 |
| - |
88 |
| -// fn rustls_server_config(key: impl AsRef<Path>, cert: impl AsRef<Path>) -> Arc<ServerConfig> { |
89 |
| -// let mut key_reader = BufReader::new(File::open(key).unwrap()); |
90 |
| -// let mut cert_reader = BufReader::new(File::open(cert).unwrap()); |
91 |
| - |
92 |
| -// let key = PrivateKey(pkcs8_private_keys(&mut key_reader).unwrap().remove(0)); |
93 |
| -// let certs = certs(&mut cert_reader) |
94 |
| -// .unwrap() |
95 |
| -// .into_iter() |
96 |
| -// .map(Certificate) |
97 |
| -// .collect(); |
98 |
| - |
99 |
| -// let mut config = ServerConfig::builder() |
100 |
| -// .with_safe_defaults() |
101 |
| -// .with_no_client_auth() |
102 |
| -// .with_single_cert(certs, key) |
103 |
| -// .expect("bad certificate/key"); |
104 |
| - |
105 |
| -// config.alpn_protocols = vec![b"h2".to_vec(), b"http/1.1".to_vec()]; |
106 |
| - |
107 |
| -// Arc::new(config) |
108 |
| -// } |
| 93 | +async fn handler() -> &'static str { |
| 94 | + "Hello, World!" |
| 95 | +} |
| 96 | + |
| 97 | +fn rustls_server_config(key: impl AsRef<Path>, cert: impl AsRef<Path>) -> Arc<ServerConfig> { |
| 98 | + let mut key_reader = BufReader::new(File::open(key).unwrap()); |
| 99 | + let mut cert_reader = BufReader::new(File::open(cert).unwrap()); |
| 100 | + |
| 101 | + let key = PrivateKey(pkcs8_private_keys(&mut key_reader).unwrap().remove(0)); |
| 102 | + let certs = certs(&mut cert_reader) |
| 103 | + .unwrap() |
| 104 | + .into_iter() |
| 105 | + .map(Certificate) |
| 106 | + .collect(); |
| 107 | + |
| 108 | + let mut config = ServerConfig::builder() |
| 109 | + .with_safe_defaults() |
| 110 | + .with_no_client_auth() |
| 111 | + .with_single_cert(certs, key) |
| 112 | + .expect("bad certificate/key"); |
| 113 | + |
| 114 | + config.alpn_protocols = vec![b"h2".to_vec(), b"http/1.1".to_vec()]; |
| 115 | + |
| 116 | + Arc::new(config) |
| 117 | +} |
0 commit comments