|
1 |
| -// TODO |
2 |
| -fn main() { |
3 |
| - eprint!("this example has not yet been updated to hyper 1.0"); |
| 1 | +use openssl::ssl::{Ssl, SslAcceptor, SslFiletype, SslMethod}; |
| 2 | +use tokio_openssl::SslStream; |
| 3 | + |
| 4 | +use axum::{http::Request, routing::get, Router}; |
| 5 | +use futures_util::pin_mut; |
| 6 | +use hyper::body::Incoming; |
| 7 | +use hyper_util::rt::{TokioExecutor, TokioIo}; |
| 8 | +use std::{path::PathBuf, pin::Pin}; |
| 9 | +use tokio::net::TcpListener; |
| 10 | +use tower::Service; |
| 11 | +use tracing::{error, info, warn}; |
| 12 | + |
| 13 | +use tracing_subscriber::{layer::SubscriberExt, util::SubscriberInitExt}; |
| 14 | + |
| 15 | +#[tokio::main] |
| 16 | +async fn main() { |
| 17 | + tracing_subscriber::registry() |
| 18 | + .with( |
| 19 | + tracing_subscriber::EnvFilter::try_from_default_env() |
| 20 | + .unwrap_or_else(|_| "example_low_level_openssl=debug".into()), |
| 21 | + ) |
| 22 | + .with(tracing_subscriber::fmt::layer()) |
| 23 | + .init(); |
| 24 | + |
| 25 | + let mut tls_builder = SslAcceptor::mozilla_modern_v5(SslMethod::tls()).unwrap(); |
| 26 | + |
| 27 | + tls_builder |
| 28 | + .set_certificate_file( |
| 29 | + PathBuf::from(env!("CARGO_MANIFEST_DIR")) |
| 30 | + .join("self_signed_certs") |
| 31 | + .join("cert.pem"), |
| 32 | + SslFiletype::PEM, |
| 33 | + ) |
| 34 | + .unwrap(); |
| 35 | + |
| 36 | + tls_builder |
| 37 | + .set_private_key_file( |
| 38 | + PathBuf::from(env!("CARGO_MANIFEST_DIR")) |
| 39 | + .join("self_signed_certs") |
| 40 | + .join("key.pem"), |
| 41 | + SslFiletype::PEM, |
| 42 | + ) |
| 43 | + .unwrap(); |
| 44 | + |
| 45 | + tls_builder.check_private_key().unwrap(); |
| 46 | + |
| 47 | + let tls_acceptor = tls_builder.build(); |
| 48 | + |
| 49 | + let bind = "[::1]:3000"; |
| 50 | + let tcp_listener = TcpListener::bind(bind).await.unwrap(); |
| 51 | + info!("HTTPS server listening on {bind}. To contact curl -k https://localhost:3000"); |
| 52 | + let app = Router::new().route("/", get(handler)); |
| 53 | + |
| 54 | + pin_mut!(tcp_listener); |
| 55 | + |
| 56 | + loop { |
| 57 | + let tower_service = app.clone(); |
| 58 | + let tls_acceptor = tls_acceptor.clone(); |
| 59 | + |
| 60 | + // Wait for new tcp connection |
| 61 | + let (cnx, addr) = tcp_listener.accept().await.unwrap(); |
| 62 | + |
| 63 | + tokio::spawn(async move { |
| 64 | + let ssl = Ssl::new(tls_acceptor.context()).unwrap(); |
| 65 | + let mut tls_stream = SslStream::new(ssl, cnx).unwrap(); |
| 66 | + if let Err(err) = SslStream::accept(Pin::new(&mut tls_stream)).await { |
| 67 | + error!( |
| 68 | + "error during tls handshake connection from {}: {}", |
| 69 | + addr, err |
| 70 | + ); |
| 71 | + return; |
| 72 | + } |
| 73 | + |
| 74 | + // Hyper has its own `AsyncRead` and `AsyncWrite` traits and doesn't use tokio. |
| 75 | + // `TokioIo` converts between them. |
| 76 | + let stream = TokioIo::new(tls_stream); |
| 77 | + |
| 78 | + // Hyper has also its own `Service` trait and doesn't use tower. We can use |
| 79 | + // `hyper::service::service_fn` to create a hyper `Service` that calls our app through |
| 80 | + // `tower::Service::call`. |
| 81 | + let hyper_service = hyper::service::service_fn(move |request: Request<Incoming>| { |
| 82 | + // We have to clone `tower_service` because hyper's `Service` uses `&self` whereas |
| 83 | + // tower's `Service` requires `&mut self`. |
| 84 | + // |
| 85 | + // We don't need to call `poll_ready` since `Router` is always ready. |
| 86 | + tower_service.clone().call(request) |
| 87 | + }); |
| 88 | + |
| 89 | + let ret = hyper_util::server::conn::auto::Builder::new(TokioExecutor::new()) |
| 90 | + .serve_connection_with_upgrades(stream, hyper_service) |
| 91 | + .await; |
| 92 | + |
| 93 | + if let Err(err) = ret { |
| 94 | + warn!("error serving connection from {}: {}", addr, err); |
| 95 | + } |
| 96 | + }); |
| 97 | + } |
4 | 98 | }
|
5 | 99 |
|
6 |
| -// use openssl::ssl::{Ssl, SslAcceptor, SslFiletype, SslMethod}; |
7 |
| -// use tokio_openssl::SslStream; |
8 |
| - |
9 |
| -// use axum::{body::Body, http::Request, routing::get, Router}; |
10 |
| -// use futures_util::future::poll_fn; |
11 |
| -// use hyper::server::{ |
12 |
| -// accept::Accept, |
13 |
| -// conn::{AddrIncoming, Http}, |
14 |
| -// }; |
15 |
| -// use std::{path::PathBuf, pin::Pin, sync::Arc}; |
16 |
| -// use tokio::net::TcpListener; |
17 |
| -// use tower::MakeService; |
18 |
| - |
19 |
| -// use tracing_subscriber::{layer::SubscriberExt, util::SubscriberInitExt}; |
20 |
| - |
21 |
| -// #[tokio::main] |
22 |
| -// async fn main() { |
23 |
| -// tracing_subscriber::registry() |
24 |
| -// .with( |
25 |
| -// tracing_subscriber::EnvFilter::try_from_default_env() |
26 |
| -// .unwrap_or_else(|_| "example_low_level_openssl=debug".into()), |
27 |
| -// ) |
28 |
| -// .with(tracing_subscriber::fmt::layer()) |
29 |
| -// .init(); |
30 |
| - |
31 |
| -// let mut tls_builder = SslAcceptor::mozilla_modern_v5(SslMethod::tls()).unwrap(); |
32 |
| - |
33 |
| -// tls_builder |
34 |
| -// .set_certificate_file( |
35 |
| -// PathBuf::from(env!("CARGO_MANIFEST_DIR")) |
36 |
| -// .join("self_signed_certs") |
37 |
| -// .join("cert.pem"), |
38 |
| -// SslFiletype::PEM, |
39 |
| -// ) |
40 |
| -// .unwrap(); |
41 |
| - |
42 |
| -// tls_builder |
43 |
| -// .set_private_key_file( |
44 |
| -// PathBuf::from(env!("CARGO_MANIFEST_DIR")) |
45 |
| -// .join("self_signed_certs") |
46 |
| -// .join("key.pem"), |
47 |
| -// SslFiletype::PEM, |
48 |
| -// ) |
49 |
| -// .unwrap(); |
50 |
| - |
51 |
| -// tls_builder.check_private_key().unwrap(); |
52 |
| - |
53 |
| -// let acceptor = tls_builder.build(); |
54 |
| - |
55 |
| -// let listener = TcpListener::bind("127.0.0.1:3000").await.unwrap(); |
56 |
| -// let mut listener = AddrIncoming::from_listener(listener).unwrap(); |
57 |
| - |
58 |
| -// let protocol = Arc::new(Http::new()); |
59 |
| - |
60 |
| -// let mut app = Router::new().route("/", get(handler)).into_make_service(); |
61 |
| - |
62 |
| -// tracing::info!("listening on https://localhost:3000"); |
63 |
| - |
64 |
| -// loop { |
65 |
| -// let stream = poll_fn(|cx| Pin::new(&mut listener).poll_accept(cx)) |
66 |
| -// .await |
67 |
| -// .unwrap() |
68 |
| -// .unwrap(); |
69 |
| - |
70 |
| -// let acceptor = acceptor.clone(); |
71 |
| - |
72 |
| -// let protocol = protocol.clone(); |
73 |
| - |
74 |
| -// let svc = MakeService::<_, Request<Body>>::make_service(&mut app, &stream); |
75 |
| - |
76 |
| -// tokio::spawn(async move { |
77 |
| -// let ssl = Ssl::new(acceptor.context()).unwrap(); |
78 |
| -// let mut tls_stream = SslStream::new(ssl, stream).unwrap(); |
79 |
| - |
80 |
| -// SslStream::accept(Pin::new(&mut tls_stream)).await.unwrap(); |
81 |
| - |
82 |
| -// let _ = protocol |
83 |
| -// .serve_connection(tls_stream, svc.await.unwrap()) |
84 |
| -// .await; |
85 |
| -// }); |
86 |
| -// } |
87 |
| -// } |
88 |
| - |
89 |
| -// async fn handler() -> &'static str { |
90 |
| -// "Hello, World!" |
91 |
| -// } |
| 100 | +async fn handler() -> &'static str { |
| 101 | + "Hello, World!" |
| 102 | +} |
0 commit comments