1
0
mirror of https://github.com/actix/examples synced 2025-02-02 17:39:05 +01:00

63 lines
1.8 KiB
Rust
Raw Normal View History

use std::{
fs::File,
io::{self, Read as _},
};
2019-03-06 23:16:56 -08:00
use actix_web::{middleware, web, App, Error, HttpRequest, HttpResponse, HttpServer};
use openssl::{
pkey::{PKey, Private},
ssl::{SslAcceptor, SslMethod},
};
/// simple handle
2019-12-07 23:59:24 +06:00
async fn index(req: HttpRequest) -> Result<HttpResponse, Error> {
println!("{req:?}");
Ok(HttpResponse::Ok()
2018-05-08 11:08:43 -07:00
.content_type("text/plain")
.body("Hello HTTPS World!"))
}
2020-09-12 16:49:45 +01:00
#[actix_web::main]
2019-12-07 23:59:24 +06:00
async fn main() -> io::Result<()> {
2023-03-14 03:11:49 +00:00
env_logger::init_from_env(env_logger::Env::new().default_filter_or("info"));
// build TLS config from files
let mut builder = SslAcceptor::mozilla_intermediate(SslMethod::tls()).unwrap();
// set the encrypted private key
2018-05-08 11:08:43 -07:00
builder
.set_private_key(&load_encrypted_private_key())
2018-05-08 11:08:43 -07:00
.unwrap();
// set the unencrypted private key
// (uncomment if you generate your own key+cert with `mkcert`, and also remove the statement above)
2023-05-22 14:18:07 +01:00
// builder
// .set_private_key_file("key.pem", openssl::ssl::SslFiletype::PEM)
// .unwrap();
// set the certificate chain file location
2018-05-20 21:03:29 -07:00
builder.set_certificate_chain_file("cert.pem").unwrap();
2023-03-14 03:11:49 +00:00
log::info!("starting HTTPS server at http://localhost:8443");
2019-03-06 23:16:56 -08:00
HttpServer::new(|| {
2018-05-08 11:08:43 -07:00
App::new()
// enable logger
2019-03-26 04:29:00 +01:00
.wrap(middleware::Logger::default())
// simple root handler
.service(web::resource("/").route(web::get().to(index)))
2019-03-06 23:16:56 -08:00
})
2019-12-07 23:59:24 +06:00
.bind_openssl("127.0.0.1:8443", builder)?
.workers(2)
2019-12-25 20:48:33 +04:00
.run()
2019-12-07 23:59:24 +06:00
.await
}
fn load_encrypted_private_key() -> PKey<Private> {
let mut file = File::open("key.pem").unwrap();
let mut buffer = Vec::new();
file.read_to_end(&mut buffer).expect("Failed to read file");
PKey::private_key_from_pem_passphrase(&buffer, b"password").unwrap()
}