diff options
author | Bryan Newbold <bnewbold@robocracy.org> | 2018-05-15 00:33:33 -0700 |
---|---|---|
committer | Bryan Newbold <bnewbold@robocracy.org> | 2018-05-15 00:33:36 -0700 |
commit | 33a4cce0b97832f5f0301b318a0a50073ce6b615 (patch) | |
tree | 1b6ba7ec5944d2be2d746510e743a7934f453cd0 /rust/src/bin/fatcat-tokio.rs | |
parent | 4a1d8f20ab91fda0f4794131144915d0c5214268 (diff) | |
download | fatcat-33a4cce0b97832f5f0301b318a0a50073ce6b615.tar.gz fatcat-33a4cce0b97832f5f0301b318a0a50073ce6b615.zip |
revert to v2.3.1 codegen
This reverts back to something compatible with Iron and simple
(blocking) parallelism, instead of the new async hyper 0.11 stuff.
Diffstat (limited to 'rust/src/bin/fatcat-tokio.rs')
-rw-r--r-- | rust/src/bin/fatcat-tokio.rs | 67 |
1 files changed, 0 insertions, 67 deletions
diff --git a/rust/src/bin/fatcat-tokio.rs b/rust/src/bin/fatcat-tokio.rs deleted file mode 100644 index cc603908..00000000 --- a/rust/src/bin/fatcat-tokio.rs +++ /dev/null @@ -1,67 +0,0 @@ -//! Main binary entry point for fatcat implementation. - -#![allow(missing_docs)] - -// Imports required by this file. -extern crate fatcat; -extern crate fatcat_api; -extern crate hyper; -extern crate swagger; -//extern crate openssl; -//extern crate native_tls; -extern crate tokio_proto; -//extern crate tokio_tls; -extern crate clap; - -//use openssl::x509::X509_FILETYPE_PEM; -//use openssl::ssl::{SslAcceptorBuilder, SslMethod}; -//use openssl::error::ErrorStack; -use clap::{App, Arg}; -use hyper::server::Http; -use swagger::auth::AllowAllAuthenticator; -use tokio_proto::TcpServer; - -// Builds an SSL implementation for Simple HTTPS from some hard-coded file names -/* -fn ssl() -> Result<SslAcceptorBuilder, ErrorStack> { - let mut ssl = SslAcceptorBuilder::mozilla_intermediate_raw(SslMethod::tls())?; - - // Server authentication - ssl.set_private_key_file("examples/server-key.pem", X509_FILETYPE_PEM)?; - ssl.set_certificate_chain_file("examples/server-chain.pem")?; - ssl.check_private_key()?; - - Ok(ssl) -} -*/ - -/// Create custom server, wire it to the autogenerated router, -/// and pass it to the web server. -fn main() { - let matches = App::new("server") - .arg( - Arg::with_name("https") - .long("https") - .help("Whether to use HTTPS or not"), - ) - .get_matches(); - - let service_fn = fatcat_api::server::auth::NewService::new(AllowAllAuthenticator::new( - fatcat::NewService, - "cosmo", - )); - - let addr = "127.0.0.1:8080" - .parse() - .expect("Failed to parse bind address"); - if matches.is_present("https") { - unimplemented!() - //let ssl = ssl().expect("Failed to load SSL keys"); - //let builder: native_tls::TlsAcceptorBuilder = native_tls::backend::openssl::TlsAcceptorBuilderExt::from_openssl(ssl); - //let tls_acceptor = builder.build().expect("Failed to build TLS acceptor"); - //TcpServer::new(tokio_tls::proto::Server::new(Http::new(), tls_acceptor), addr).serve(service_fn); - } else { - // Using HTTP - TcpServer::new(Http::new(), addr).serve(service_fn); - } -} |