diff options
author | Bryan Newbold <bnewbold@robocracy.org> | 2019-09-05 19:04:34 -0700 |
---|---|---|
committer | Bryan Newbold <bnewbold@robocracy.org> | 2019-09-05 19:04:34 -0700 |
commit | ba722671b4791524384010705bef0aaa83c22c0b (patch) | |
tree | 9d546b87a36cfa521d8a64ea032948416c9e6314 /rust/fatcat-openapi/examples/server.rs | |
parent | a65dfc914517376b5ededb82e594236c5d61c721 (diff) | |
download | fatcat-ba722671b4791524384010705bef0aaa83c22c0b.tar.gz fatcat-ba722671b4791524384010705bef0aaa83c22c0b.zip |
rename rust crate fatcat-api-spec -> fatcat-openapi
Diffstat (limited to 'rust/fatcat-openapi/examples/server.rs')
-rw-r--r-- | rust/fatcat-openapi/examples/server.rs | 64 |
1 files changed, 64 insertions, 0 deletions
diff --git a/rust/fatcat-openapi/examples/server.rs b/rust/fatcat-openapi/examples/server.rs new file mode 100644 index 00000000..8d2e9b64 --- /dev/null +++ b/rust/fatcat-openapi/examples/server.rs @@ -0,0 +1,64 @@ +//! Main binary entry point for fatcat implementation. + +#![allow(missing_docs)] + +// Imports required by this file. +// extern crate <name of this crate>; +extern crate clap; +extern crate fatcat; +extern crate hyper_openssl; +extern crate iron; +extern crate swagger; + +// Imports required by server library. +// extern crate fatcat; +// extern crate swagger; +extern crate chrono; +extern crate futures; +#[macro_use] +extern crate error_chain; + +use clap::{App, Arg}; +use hyper_openssl::openssl::error::ErrorStack; +use hyper_openssl::openssl::ssl::{SslAcceptorBuilder, SslMethod}; +use hyper_openssl::openssl::x509::X509_FILETYPE_PEM; +use hyper_openssl::OpensslServer; +use iron::{Chain, Iron}; +use swagger::auth::AllowAllMiddleware; + +mod server_lib; + +/// Builds an SSL implementation for Simple HTTPS from some hard-coded file names +fn ssl() -> Result<OpensslServer, ErrorStack> { + let mut ssl = SslAcceptorBuilder::mozilla_intermediate_raw(SslMethod::tls())?; + + // Server authentication + ssl.set_private_key_file("examples/server-key.pem", X509_FILETYPE_PEM)?; + ssl.set_certificate_chain_file("examples/server-chain.pem")?; + ssl.check_private_key()?; + + Ok(OpensslServer::from(ssl.build())) +} + +/// Create custom server, wire it to the autogenerated router, +/// and pass it to the web server. +fn main() { + let matches = App::new("server").arg(Arg::with_name("https").long("https").help("Whether to use HTTPS or not")).get_matches(); + + let server = server_lib::server().unwrap(); + let router = fatcat::router(server); + + let mut chain = Chain::new(router); + chain.link_before(fatcat::server::ExtractAuthData); + // add authentication middlewares into the chain here + // for the purpose of this example, pretend we have authenticated a user + chain.link_before(AllowAllMiddleware::new("cosmo")); + + if matches.is_present("https") { + // Using Simple HTTPS + Iron::new(chain).https("localhost:8080", ssl().expect("Failed to load SSL keys")).expect("Failed to start HTTPS server"); + } else { + // Using HTTP + Iron::new(chain).http("localhost:8080").expect("Failed to start HTTP server"); + } +} |