1
0
mirror of https://github.com/fafhrd91/actix-net synced 2024-11-24 03:42:59 +01:00
actix-net/actix-tls/examples/accept-rustls.rs

94 lines
2.8 KiB
Rust
Raw Normal View History

2021-11-28 01:56:15 +01:00
//! No-Op TLS Acceptor Server
//!
//! Using either HTTPie (`http`) or cURL:
//!
//! This commands will produce errors in the server log:
//! ```sh
//! curl 127.0.0.1:8443
//! http 127.0.0.1:8443
//! ```
//!
//! These commands will show "empty reply" on the client but will debug print the TLS stream info
//! in the server log, indicating a successful TLS handshake:
//! ```sh
//! curl -k https://127.0.0.1:8443
//! http --verify=false https://127.0.0.1:8443
//! ```
2022-04-10 03:48:53 +02:00
// this `use` is only exists because of how we have organised the crate
2023-08-26 15:59:51 +02:00
// it is not necessary for your actual code; you should import from `rustls` normally
use std::{
fs::File,
io::{self, BufReader},
2023-08-26 15:59:51 +02:00
path::PathBuf,
sync::{
atomic::{AtomicUsize, Ordering},
Arc,
},
};
2021-02-20 18:25:22 +01:00
use actix_rt::net::TcpStream;
2021-11-02 00:41:28 +01:00
use actix_server::Server;
2021-04-16 01:00:02 +02:00
use actix_service::ServiceFactoryExt as _;
use actix_tls::accept::rustls_0_23::{Acceptor as RustlsAcceptor, TlsStream};
use futures_util::future::ok;
use itertools::Itertools as _;
use rustls::server::ServerConfig;
use rustls_pemfile::{certs, rsa_private_keys};
use rustls_pki_types_1::PrivateKeyDer;
use tokio_rustls_026::rustls;
2022-03-15 20:37:08 +01:00
use tracing::info;
#[actix_rt::main]
async fn main() -> io::Result<()> {
2024-05-12 20:10:27 +02:00
pretty_env_logger::formatted_timed_builder()
.parse_env(pretty_env_logger::env_logger::Env::default().default_filter_or("info"));
2023-08-26 15:59:51 +02:00
let root_path = env!("CARGO_MANIFEST_DIR")
.parse::<PathBuf>()
.unwrap()
.join("examples");
let cert_path = root_path.clone().join("cert.pem");
let key_path = root_path.clone().join("key.pem");
// Load TLS key and cert files
2023-08-26 15:59:51 +02:00
let cert_file = &mut BufReader::new(File::open(cert_path).unwrap());
let key_file = &mut BufReader::new(File::open(key_path).unwrap());
let cert_chain = certs(cert_file);
let mut keys = rsa_private_keys(key_file);
let tls_config = ServerConfig::builder()
.with_no_client_auth()
.with_single_cert(
cert_chain.try_collect::<_, Vec<_>, _>()?,
PrivateKeyDer::Pkcs1(keys.next().unwrap()?),
)
.unwrap();
let tls_acceptor = RustlsAcceptor::new(tls_config);
let count = Arc::new(AtomicUsize::new(0));
let addr = ("127.0.0.1", 8443);
2023-08-26 15:59:51 +02:00
info!("starting server at: {addr:?}");
Server::build()
.bind("tls-example", addr, move || {
let count = Arc::clone(&count);
// Set up TLS service factory
2021-04-16 01:00:02 +02:00
tls_acceptor
.clone()
.map_err(|err| println!("Rustls error: {:?}", err))
2021-02-20 18:25:22 +01:00
.and_then(move |stream: TlsStream<TcpStream>| {
let num = count.fetch_add(1, Ordering::Relaxed);
2021-02-20 18:25:22 +01:00
info!("[{}] Got TLS connection: {:?}", num, &*stream);
ok(())
})
})?
.workers(1)
.run()
.await
}