mirror of
https://github.com/fafhrd91/actix-web
synced 2025-02-07 13:54:24 +01:00
Extends Rustls ALPN protocols instead of replacing them when creating Rustls based services (#2226)
This commit is contained in:
parent
812269d656
commit
75f65fea4f
@ -10,6 +10,7 @@
|
|||||||
* Update `language-tags` to `0.3`.
|
* Update `language-tags` to `0.3`.
|
||||||
* `ServiceResponse::take_body`. [#2201]
|
* `ServiceResponse::take_body`. [#2201]
|
||||||
* `ServiceResponse::map_body` closure receives and returns `B` instead of `ResponseBody<B>` types. [#2201]
|
* `ServiceResponse::map_body` closure receives and returns `B` instead of `ResponseBody<B>` types. [#2201]
|
||||||
|
* `HttpServer::{listen_rustls(), bind_rustls()}` now honor the ALPN protocols in the configuation parameter. [#2226]
|
||||||
* `middleware::normalize` now will not try to normalize URIs with no valid path [#2246]
|
* `middleware::normalize` now will not try to normalize URIs with no valid path [#2246]
|
||||||
|
|
||||||
### Removed
|
### Removed
|
||||||
|
@ -19,6 +19,7 @@
|
|||||||
* Update `language-tags` to `0.3`.
|
* Update `language-tags` to `0.3`.
|
||||||
* Reduce the level from `error` to `debug` for the log line that is emitted when a `500 Internal Server Error` is built using `HttpResponse::from_error`. [#2201]
|
* Reduce the level from `error` to `debug` for the log line that is emitted when a `500 Internal Server Error` is built using `HttpResponse::from_error`. [#2201]
|
||||||
* `ResponseBuilder::message_body` now returns a `Result`. [#2201]
|
* `ResponseBuilder::message_body` now returns a `Result`. [#2201]
|
||||||
|
* `HttpServer::{listen_rustls(), bind_rustls()}` now honor the ALPN protocols in the configuation parameter. [#2226]
|
||||||
|
|
||||||
### Removed
|
### Removed
|
||||||
* Stop re-exporting `http` crate's `HeaderMap` types in addition to ours. [#2171]
|
* Stop re-exporting `http` crate's `HeaderMap` types in addition to ours. [#2171]
|
||||||
|
@ -91,6 +91,7 @@ serde = { version = "1.0", features = ["derive"] }
|
|||||||
serde_json = "1.0"
|
serde_json = "1.0"
|
||||||
tls-openssl = { version = "0.10", package = "openssl" }
|
tls-openssl = { version = "0.10", package = "openssl" }
|
||||||
tls-rustls = { version = "0.19", package = "rustls" }
|
tls-rustls = { version = "0.19", package = "rustls" }
|
||||||
|
webpki = { version = "0.21.0" }
|
||||||
|
|
||||||
[[example]]
|
[[example]]
|
||||||
name = "ws"
|
name = "ws"
|
||||||
|
@ -171,7 +171,8 @@ mod rustls {
|
|||||||
Error = TlsError<io::Error, DispatchError>,
|
Error = TlsError<io::Error, DispatchError>,
|
||||||
InitError = S::InitError,
|
InitError = S::InitError,
|
||||||
> {
|
> {
|
||||||
let protos = vec!["h2".to_string().into()];
|
let mut protos = vec![b"h2".to_vec()];
|
||||||
|
protos.extend_from_slice(&config.alpn_protocols);
|
||||||
config.set_protocols(&protos);
|
config.set_protocols(&protos);
|
||||||
|
|
||||||
Acceptor::new(config)
|
Acceptor::new(config)
|
||||||
|
@ -305,7 +305,8 @@ mod rustls {
|
|||||||
Error = TlsError<io::Error, DispatchError>,
|
Error = TlsError<io::Error, DispatchError>,
|
||||||
InitError = (),
|
InitError = (),
|
||||||
> {
|
> {
|
||||||
let protos = vec!["h2".to_string().into(), "http/1.1".to_string().into()];
|
let mut protos = vec![b"h2".to_vec(), b"http/1.1".to_vec()];
|
||||||
|
protos.extend_from_slice(&config.alpn_protocols);
|
||||||
config.set_protocols(&protos);
|
config.set_protocols(&protos);
|
||||||
|
|
||||||
Acceptor::new(config)
|
Acceptor::new(config)
|
||||||
|
@ -20,10 +20,15 @@ use futures_core::Stream;
|
|||||||
use futures_util::stream::{once, StreamExt as _};
|
use futures_util::stream::{once, StreamExt as _};
|
||||||
use rustls::{
|
use rustls::{
|
||||||
internal::pemfile::{certs, pkcs8_private_keys},
|
internal::pemfile::{certs, pkcs8_private_keys},
|
||||||
NoClientAuth, ServerConfig as RustlsServerConfig,
|
NoClientAuth, ServerConfig as RustlsServerConfig, Session,
|
||||||
};
|
};
|
||||||
|
use webpki::DNSNameRef;
|
||||||
|
|
||||||
use std::io::{self, BufReader};
|
use std::{
|
||||||
|
io::{self, BufReader, Write},
|
||||||
|
net::{SocketAddr, TcpStream as StdTcpStream},
|
||||||
|
sync::Arc,
|
||||||
|
};
|
||||||
|
|
||||||
async fn load_body<S>(mut stream: S) -> Result<BytesMut, PayloadError>
|
async fn load_body<S>(mut stream: S) -> Result<BytesMut, PayloadError>
|
||||||
where
|
where
|
||||||
@ -52,6 +57,25 @@ fn tls_config() -> RustlsServerConfig {
|
|||||||
config
|
config
|
||||||
}
|
}
|
||||||
|
|
||||||
|
pub fn get_negotiated_alpn_protocol(
|
||||||
|
addr: SocketAddr,
|
||||||
|
client_alpn_protocol: &[u8],
|
||||||
|
) -> Option<Vec<u8>> {
|
||||||
|
let mut config = rustls::ClientConfig::new();
|
||||||
|
config.alpn_protocols.push(client_alpn_protocol.to_vec());
|
||||||
|
let mut sess = rustls::ClientSession::new(
|
||||||
|
&Arc::new(config),
|
||||||
|
DNSNameRef::try_from_ascii_str("localhost").unwrap(),
|
||||||
|
);
|
||||||
|
let mut sock = StdTcpStream::connect(addr).unwrap();
|
||||||
|
let mut stream = rustls::Stream::new(&mut sess, &mut sock);
|
||||||
|
// The handshake will fails because the client will not be able to verify the server
|
||||||
|
// certificate, but it doesn't matter here as we are just interested in the negotiated ALPN
|
||||||
|
// protocol
|
||||||
|
let _ = stream.flush();
|
||||||
|
sess.get_alpn_protocol().map(|proto| proto.to_vec())
|
||||||
|
}
|
||||||
|
|
||||||
#[actix_rt::test]
|
#[actix_rt::test]
|
||||||
async fn test_h1() -> io::Result<()> {
|
async fn test_h1() -> io::Result<()> {
|
||||||
let srv = test_server(move || {
|
let srv = test_server(move || {
|
||||||
@ -460,3 +484,85 @@ async fn test_h1_service_error() {
|
|||||||
let bytes = srv.load_body(response).await.unwrap();
|
let bytes = srv.load_body(response).await.unwrap();
|
||||||
assert_eq!(bytes, Bytes::from_static(b"error"));
|
assert_eq!(bytes, Bytes::from_static(b"error"));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
const H2_ALPN_PROTOCOL: &[u8] = b"h2";
|
||||||
|
const HTTP1_1_ALPN_PROTOCOL: &[u8] = b"http/1.1";
|
||||||
|
const CUSTOM_ALPN_PROTOCOL: &[u8] = b"custom";
|
||||||
|
|
||||||
|
#[actix_rt::test]
|
||||||
|
async fn test_alpn_h1() -> io::Result<()> {
|
||||||
|
let srv = test_server(move || {
|
||||||
|
let mut config = tls_config();
|
||||||
|
config.alpn_protocols.push(CUSTOM_ALPN_PROTOCOL.to_vec());
|
||||||
|
HttpService::build()
|
||||||
|
.h1(|_| ok::<_, Error>(Response::ok()))
|
||||||
|
.rustls(config)
|
||||||
|
})
|
||||||
|
.await;
|
||||||
|
|
||||||
|
assert_eq!(
|
||||||
|
get_negotiated_alpn_protocol(srv.addr(), CUSTOM_ALPN_PROTOCOL),
|
||||||
|
Some(CUSTOM_ALPN_PROTOCOL.to_vec())
|
||||||
|
);
|
||||||
|
|
||||||
|
let response = srv.sget("/").send().await.unwrap();
|
||||||
|
assert!(response.status().is_success());
|
||||||
|
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
|
||||||
|
#[actix_rt::test]
|
||||||
|
async fn test_alpn_h2() -> io::Result<()> {
|
||||||
|
let srv = test_server(move || {
|
||||||
|
let mut config = tls_config();
|
||||||
|
config.alpn_protocols.push(CUSTOM_ALPN_PROTOCOL.to_vec());
|
||||||
|
HttpService::build()
|
||||||
|
.h2(|_| ok::<_, Error>(Response::ok()))
|
||||||
|
.rustls(config)
|
||||||
|
})
|
||||||
|
.await;
|
||||||
|
|
||||||
|
assert_eq!(
|
||||||
|
get_negotiated_alpn_protocol(srv.addr(), H2_ALPN_PROTOCOL),
|
||||||
|
Some(H2_ALPN_PROTOCOL.to_vec())
|
||||||
|
);
|
||||||
|
assert_eq!(
|
||||||
|
get_negotiated_alpn_protocol(srv.addr(), CUSTOM_ALPN_PROTOCOL),
|
||||||
|
Some(CUSTOM_ALPN_PROTOCOL.to_vec())
|
||||||
|
);
|
||||||
|
|
||||||
|
let response = srv.sget("/").send().await.unwrap();
|
||||||
|
assert!(response.status().is_success());
|
||||||
|
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
|
||||||
|
#[actix_rt::test]
|
||||||
|
async fn test_alpn_h2_1() -> io::Result<()> {
|
||||||
|
let srv = test_server(move || {
|
||||||
|
let mut config = tls_config();
|
||||||
|
config.alpn_protocols.push(CUSTOM_ALPN_PROTOCOL.to_vec());
|
||||||
|
HttpService::build()
|
||||||
|
.finish(|_| ok::<_, Error>(Response::ok()))
|
||||||
|
.rustls(config)
|
||||||
|
})
|
||||||
|
.await;
|
||||||
|
|
||||||
|
assert_eq!(
|
||||||
|
get_negotiated_alpn_protocol(srv.addr(), H2_ALPN_PROTOCOL),
|
||||||
|
Some(H2_ALPN_PROTOCOL.to_vec())
|
||||||
|
);
|
||||||
|
assert_eq!(
|
||||||
|
get_negotiated_alpn_protocol(srv.addr(), HTTP1_1_ALPN_PROTOCOL),
|
||||||
|
Some(HTTP1_1_ALPN_PROTOCOL.to_vec())
|
||||||
|
);
|
||||||
|
assert_eq!(
|
||||||
|
get_negotiated_alpn_protocol(srv.addr(), CUSTOM_ALPN_PROTOCOL),
|
||||||
|
Some(CUSTOM_ALPN_PROTOCOL.to_vec())
|
||||||
|
);
|
||||||
|
|
||||||
|
let response = srv.sget("/").send().await.unwrap();
|
||||||
|
assert!(response.status().is_success());
|
||||||
|
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
@ -368,7 +368,7 @@ where
|
|||||||
#[cfg(feature = "rustls")]
|
#[cfg(feature = "rustls")]
|
||||||
/// Use listener for accepting incoming tls connection requests
|
/// Use listener for accepting incoming tls connection requests
|
||||||
///
|
///
|
||||||
/// This method sets alpn protocols to "h2" and "http/1.1"
|
/// This method prepends alpn protocols "h2" and "http/1.1" to configured ones
|
||||||
pub fn listen_rustls(
|
pub fn listen_rustls(
|
||||||
self,
|
self,
|
||||||
lst: net::TcpListener,
|
lst: net::TcpListener,
|
||||||
@ -482,7 +482,7 @@ where
|
|||||||
#[cfg(feature = "rustls")]
|
#[cfg(feature = "rustls")]
|
||||||
/// Start listening for incoming tls connections.
|
/// Start listening for incoming tls connections.
|
||||||
///
|
///
|
||||||
/// This method sets alpn protocols to "h2" and "http/1.1"
|
/// This method prepends alpn protocols "h2" and "http/1.1" to configured ones
|
||||||
pub fn bind_rustls<A: net::ToSocketAddrs>(
|
pub fn bind_rustls<A: net::ToSocketAddrs>(
|
||||||
mut self,
|
mut self,
|
||||||
addr: A,
|
addr: A,
|
||||||
|
Loading…
x
Reference in New Issue
Block a user