Skip to content

Commit cc3722d

Browse files
committed
Update example low-level-openssl to axum 0.7
1 parent b13b9d2 commit cc3722d

File tree

2 files changed

+101
-89
lines changed

2 files changed

+101
-89
lines changed

examples/low-level-openssl/Cargo.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,7 @@ publish = false
88
axum = { path = "../../axum" }
99
futures-util = { version = "0.3", default-features = false, features = ["alloc"] }
1010
hyper = { version = "1.0.0", features = ["full"] }
11+
hyper-util = { version = "0.1" }
1112
openssl = "0.10"
1213
tokio = { version = "1", features = ["full"] }
1314
tokio-openssl = "0.6"
Lines changed: 100 additions & 89 deletions
Original file line numberDiff line numberDiff line change
@@ -1,91 +1,102 @@
1-
// TODO
2-
fn main() {
3-
eprint!("this example has not yet been updated to hyper 1.0");
1+
use openssl::ssl::{Ssl, SslAcceptor, SslFiletype, SslMethod};
2+
use tokio_openssl::SslStream;
3+
4+
use axum::{http::Request, routing::get, Router};
5+
use futures_util::pin_mut;
6+
use hyper::body::Incoming;
7+
use hyper_util::rt::{TokioExecutor, TokioIo};
8+
use std::{path::PathBuf, pin::Pin};
9+
use tokio::net::TcpListener;
10+
use tower::Service;
11+
use tracing::{error, info, warn};
12+
13+
use tracing_subscriber::{layer::SubscriberExt, util::SubscriberInitExt};
14+
15+
#[tokio::main]
16+
async fn main() {
17+
tracing_subscriber::registry()
18+
.with(
19+
tracing_subscriber::EnvFilter::try_from_default_env()
20+
.unwrap_or_else(|_| "example_low_level_openssl=debug".into()),
21+
)
22+
.with(tracing_subscriber::fmt::layer())
23+
.init();
24+
25+
let mut tls_builder = SslAcceptor::mozilla_modern_v5(SslMethod::tls()).unwrap();
26+
27+
tls_builder
28+
.set_certificate_file(
29+
PathBuf::from(env!("CARGO_MANIFEST_DIR"))
30+
.join("self_signed_certs")
31+
.join("cert.pem"),
32+
SslFiletype::PEM,
33+
)
34+
.unwrap();
35+
36+
tls_builder
37+
.set_private_key_file(
38+
PathBuf::from(env!("CARGO_MANIFEST_DIR"))
39+
.join("self_signed_certs")
40+
.join("key.pem"),
41+
SslFiletype::PEM,
42+
)
43+
.unwrap();
44+
45+
tls_builder.check_private_key().unwrap();
46+
47+
let tls_acceptor = tls_builder.build();
48+
49+
let bind = "[::1]:3000";
50+
let tcp_listener = TcpListener::bind(bind).await.unwrap();
51+
info!("HTTPS server listening on {bind}. To contact curl -k https://localhost:3000");
52+
let app = Router::new().route("/", get(handler));
53+
54+
pin_mut!(tcp_listener);
55+
56+
loop {
57+
let tower_service = app.clone();
58+
let tls_acceptor = tls_acceptor.clone();
59+
60+
// Wait for new tcp connection
61+
let (cnx, addr) = tcp_listener.accept().await.unwrap();
62+
63+
tokio::spawn(async move {
64+
let ssl = Ssl::new(tls_acceptor.context()).unwrap();
65+
let mut tls_stream = SslStream::new(ssl, cnx).unwrap();
66+
if let Err(err) = SslStream::accept(Pin::new(&mut tls_stream)).await {
67+
error!(
68+
"error during tls handshake connection from {}: {}",
69+
addr, err
70+
);
71+
return;
72+
}
73+
74+
// Hyper has its own `AsyncRead` and `AsyncWrite` traits and doesn't use tokio.
75+
// `TokioIo` converts between them.
76+
let stream = TokioIo::new(tls_stream);
77+
78+
// Hyper has also its own `Service` trait and doesn't use tower. We can use
79+
// `hyper::service::service_fn` to create a hyper `Service` that calls our app through
80+
// `tower::Service::call`.
81+
let hyper_service = hyper::service::service_fn(move |request: Request<Incoming>| {
82+
// We have to clone `tower_service` because hyper's `Service` uses `&self` whereas
83+
// tower's `Service` requires `&mut self`.
84+
//
85+
// We don't need to call `poll_ready` since `Router` is always ready.
86+
tower_service.clone().call(request)
87+
});
88+
89+
let ret = hyper_util::server::conn::auto::Builder::new(TokioExecutor::new())
90+
.serve_connection_with_upgrades(stream, hyper_service)
91+
.await;
92+
93+
if let Err(err) = ret {
94+
warn!("error serving connection from {}: {}", addr, err);
95+
}
96+
});
97+
}
498
}
599

6-
// use openssl::ssl::{Ssl, SslAcceptor, SslFiletype, SslMethod};
7-
// use tokio_openssl::SslStream;
8-
9-
// use axum::{body::Body, http::Request, routing::get, Router};
10-
// use futures_util::future::poll_fn;
11-
// use hyper::server::{
12-
// accept::Accept,
13-
// conn::{AddrIncoming, Http},
14-
// };
15-
// use std::{path::PathBuf, pin::Pin, sync::Arc};
16-
// use tokio::net::TcpListener;
17-
// use tower::MakeService;
18-
19-
// use tracing_subscriber::{layer::SubscriberExt, util::SubscriberInitExt};
20-
21-
// #[tokio::main]
22-
// async fn main() {
23-
// tracing_subscriber::registry()
24-
// .with(
25-
// tracing_subscriber::EnvFilter::try_from_default_env()
26-
// .unwrap_or_else(|_| "example_low_level_openssl=debug".into()),
27-
// )
28-
// .with(tracing_subscriber::fmt::layer())
29-
// .init();
30-
31-
// let mut tls_builder = SslAcceptor::mozilla_modern_v5(SslMethod::tls()).unwrap();
32-
33-
// tls_builder
34-
// .set_certificate_file(
35-
// PathBuf::from(env!("CARGO_MANIFEST_DIR"))
36-
// .join("self_signed_certs")
37-
// .join("cert.pem"),
38-
// SslFiletype::PEM,
39-
// )
40-
// .unwrap();
41-
42-
// tls_builder
43-
// .set_private_key_file(
44-
// PathBuf::from(env!("CARGO_MANIFEST_DIR"))
45-
// .join("self_signed_certs")
46-
// .join("key.pem"),
47-
// SslFiletype::PEM,
48-
// )
49-
// .unwrap();
50-
51-
// tls_builder.check_private_key().unwrap();
52-
53-
// let acceptor = tls_builder.build();
54-
55-
// let listener = TcpListener::bind("127.0.0.1:3000").await.unwrap();
56-
// let mut listener = AddrIncoming::from_listener(listener).unwrap();
57-
58-
// let protocol = Arc::new(Http::new());
59-
60-
// let mut app = Router::new().route("/", get(handler)).into_make_service();
61-
62-
// tracing::info!("listening on https://localhost:3000");
63-
64-
// loop {
65-
// let stream = poll_fn(|cx| Pin::new(&mut listener).poll_accept(cx))
66-
// .await
67-
// .unwrap()
68-
// .unwrap();
69-
70-
// let acceptor = acceptor.clone();
71-
72-
// let protocol = protocol.clone();
73-
74-
// let svc = MakeService::<_, Request<Body>>::make_service(&mut app, &stream);
75-
76-
// tokio::spawn(async move {
77-
// let ssl = Ssl::new(acceptor.context()).unwrap();
78-
// let mut tls_stream = SslStream::new(ssl, stream).unwrap();
79-
80-
// SslStream::accept(Pin::new(&mut tls_stream)).await.unwrap();
81-
82-
// let _ = protocol
83-
// .serve_connection(tls_stream, svc.await.unwrap())
84-
// .await;
85-
// });
86-
// }
87-
// }
88-
89-
// async fn handler() -> &'static str {
90-
// "Hello, World!"
91-
// }
100+
async fn handler() -> &'static str {
101+
"Hello, World!"
102+
}

0 commit comments

Comments
 (0)