diff --git a/.cargo/config.toml b/.cargo/config.toml
index 350a924de..a2345e184 100644
--- a/.cargo/config.toml
+++ b/.cargo/config.toml
@@ -6,9 +6,5 @@ lint-all = "clippy --workspace --all-features --all-targets -- -Dclippy::todo"
ci-check-min = "hack --workspace check --no-default-features"
ci-check-default = "hack --workspace check"
ci-check-default-tests = "check --workspace --tests"
-ci-check-all-feature-powerset="hack --workspace --feature-powerset --skip=__compress,experimental-io-uring check"
-ci-check-all-feature-powerset-linux="hack --workspace --feature-powerset --skip=__compress check"
-
-# testing
-ci-doctest-default = "test --workspace --doc --no-fail-fast -- --nocapture"
-ci-doctest = "test --workspace --all-features --doc --no-fail-fast -- --nocapture"
+ci-check-all-feature-powerset="hack --workspace --feature-powerset --depth=4 --skip=__compress,experimental-io-uring check"
+ci-check-all-feature-powerset-linux="hack --workspace --feature-powerset --depth=4 --skip=__compress check"
diff --git a/.github/workflows/ci-post-merge.yml b/.github/workflows/ci-post-merge.yml
index 55202ba6c..dfb0ca56d 100644
--- a/.github/workflows/ci-post-merge.yml
+++ b/.github/workflows/ci-post-merge.yml
@@ -30,6 +30,10 @@ jobs:
steps:
- uses: actions/checkout@v4
+ - name: Install nasm
+ if: matrix.target.os == 'windows-latest'
+ uses: ilammy/setup-nasm@v1.5.1
+
- name: Install OpenSSL
if: matrix.target.os == 'windows-latest'
shell: bash
@@ -44,10 +48,10 @@ jobs:
with:
toolchain: ${{ matrix.version.version }}
- - name: Install cargo-hack and cargo-ci-cache-clean
- uses: taiki-e/install-action@v2.32.17
+ - name: Install just, cargo-hack, cargo-nextest, cargo-ci-cache-clean
+ uses: taiki-e/install-action@v2.33.26
with:
- tool: cargo-hack,cargo-ci-cache-clean
+ tool: just,cargo-hack,cargo-nextest,cargo-ci-cache-clean
- name: check minimal
run: cargo ci-check-min
@@ -57,19 +61,7 @@ jobs:
- name: tests
timeout-minutes: 60
- shell: bash
- run: |
- set -e
- cargo test --lib --tests -p=actix-router --all-features
- cargo test --lib --tests -p=actix-http --all-features
- cargo test --lib --tests -p=actix-web --features=rustls-0_20,rustls-0_21,rustls-0_22,openssl -- --skip=test_reading_deflate_encoding_large_random_rustls
- cargo test --lib --tests -p=actix-web-codegen --all-features
- cargo test --lib --tests -p=awc --all-features
- cargo test --lib --tests -p=actix-http-test --all-features
- cargo test --lib --tests -p=actix-test --all-features
- cargo test --lib --tests -p=actix-files
- cargo test --lib --tests -p=actix-multipart --all-features
- cargo test --lib --tests -p=actix-web-actors --all-features
+ run: just test
- name: CI cache clean
run: cargo-ci-cache-clean
@@ -88,7 +80,7 @@ jobs:
uses: actions-rust-lang/setup-rust-toolchain@v1.8.0
- name: Install cargo-hack
- uses: taiki-e/install-action@v2.32.17
+ uses: taiki-e/install-action@v2.33.26
with:
tool: cargo-hack
@@ -97,21 +89,3 @@ jobs:
- name: check feature combinations
run: cargo ci-check-all-feature-powerset-linux
-
- nextest:
- name: nextest
- runs-on: ubuntu-latest
-
- steps:
- - uses: actions/checkout@v4
-
- - name: Install Rust
- uses: actions-rust-lang/setup-rust-toolchain@v1.8.0
-
- - name: Install nextest
- uses: taiki-e/install-action@v2.32.17
- with:
- tool: nextest
-
- - name: Test with cargo-nextest
- run: cargo nextest run
diff --git a/.github/workflows/ci.yml b/.github/workflows/ci.yml
index 2488f7496..153ab78f7 100644
--- a/.github/workflows/ci.yml
+++ b/.github/workflows/ci.yml
@@ -16,7 +16,13 @@ concurrency:
cancel-in-progress: true
jobs:
+ read_msrv:
+ name: Read MSRV
+ uses: actions-rust-lang/msrv/.github/workflows/msrv.yml@main
+
build_and_test:
+ needs: read_msrv
+
strategy:
fail-fast: false
matrix:
@@ -26,7 +32,7 @@ jobs:
- { name: macOS, os: macos-latest, triple: x86_64-apple-darwin }
- { name: Windows, os: windows-latest, triple: x86_64-pc-windows-msvc }
version:
- - { name: msrv, version: 1.72.0 }
+ - { name: msrv, version: "${{ needs.read_msrv.outputs.msrv }}" }
- { name: stable, version: stable }
name: ${{ matrix.target.name }} / ${{ matrix.version.name }}
@@ -35,6 +41,10 @@ jobs:
steps:
- uses: actions/checkout@v4
+ - name: Install nasm
+ if: matrix.target.os == 'windows-latest'
+ uses: ilammy/setup-nasm@v1.5.1
+
- name: Install OpenSSL
if: matrix.target.os == 'windows-latest'
shell: bash
@@ -44,20 +54,23 @@ jobs:
echo 'OPENSSL_DIR=C:\Program Files\OpenSSL' >> $GITHUB_ENV
echo "RUSTFLAGS=-C target-feature=+crt-static" >> $GITHUB_ENV
+ - name: Setup mold linker
+ if: matrix.target.os == 'ubuntu-latest'
+ uses: rui314/setup-mold@v1
+
- name: Install Rust (${{ matrix.version.name }})
uses: actions-rust-lang/setup-rust-toolchain@v1.8.0
with:
toolchain: ${{ matrix.version.version }}
- - name: Install cargo-hack and cargo-ci-cache-clean
- uses: taiki-e/install-action@v2.32.17
+ - name: Install just, cargo-hack, cargo-nextest, cargo-ci-cache-clean
+ uses: taiki-e/install-action@v2.33.26
with:
- tool: cargo-hack,cargo-ci-cache-clean
+ tool: just,cargo-hack,cargo-nextest,cargo-ci-cache-clean
- name: workaround MSRV issues
if: matrix.version.name == 'msrv'
- run: |
- cargo update -p=clap --precise=4.4.18
+ run: just downgrade-for-msrv
- name: check minimal
run: cargo ci-check-min
@@ -67,20 +80,7 @@ jobs:
- name: tests
timeout-minutes: 60
- shell: bash
- run: |
- set -e
- cargo test --lib --tests -p=actix-router --no-default-features
- cargo test --lib --tests -p=actix-router --all-features
- cargo test --lib --tests -p=actix-http --all-features
- cargo test --lib --tests -p=actix-web --features=rustls-0_20,rustls-0_21,rustls-0_22,openssl -- --skip=test_reading_deflate_encoding_large_random_rustls
- cargo test --lib --tests -p=actix-web-codegen --all-features
- cargo test --lib --tests -p=awc --all-features
- cargo test --lib --tests -p=actix-http-test --all-features
- cargo test --lib --tests -p=actix-test --all-features
- cargo test --lib --tests -p=actix-files
- cargo test --lib --tests -p=actix-multipart --all-features
- cargo test --lib --tests -p=actix-web-actors --all-features
+ run: just test
- name: CI cache clean
run: cargo-ci-cache-clean
@@ -112,6 +112,10 @@ jobs:
with:
toolchain: nightly
+ - name: Install just
+ uses: taiki-e/install-action@v2.33.26
+ with:
+ tool: just
+
- name: doc tests
- run: cargo ci-doctest
- timeout-minutes: 60
+ run: just test-docs
diff --git a/.github/workflows/coverage.yml b/.github/workflows/coverage.yml
index ac5143d58..ce370b105 100644
--- a/.github/workflows/coverage.yml
+++ b/.github/workflows/coverage.yml
@@ -23,7 +23,7 @@ jobs:
components: llvm-tools-preview
- name: Install cargo-llvm-cov
- uses: taiki-e/install-action@v2.32.17
+ uses: taiki-e/install-action@v2.33.26
with:
tool: cargo-llvm-cov
@@ -31,7 +31,7 @@ jobs:
run: cargo llvm-cov --workspace --all-features --codecov --output-path codecov.json
- name: Upload coverage to Codecov
- uses: codecov/codecov-action@v4.3.0
+ uses: codecov/codecov-action@v4.4.0
with:
files: codecov.json
fail_ci_if_error: true
diff --git a/.github/workflows/lint.yml b/.github/workflows/lint.yml
index b0ac537a2..39392fabb 100644
--- a/.github/workflows/lint.yml
+++ b/.github/workflows/lint.yml
@@ -79,10 +79,10 @@ jobs:
- name: Install Rust
uses: actions-rust-lang/setup-rust-toolchain@v1.8.0
with:
- toolchain: nightly-2023-08-25
+ toolchain: nightly-2024-04-26
- name: Install cargo-public-api
- uses: taiki-e/install-action@v2.32.17
+ uses: taiki-e/install-action@v2.33.26
with:
tool: cargo-public-api
diff --git a/.github/workflows/upload-doc.yml b/.github/workflows/upload-doc.yml
index 963b7f6b3..b38a80e5b 100644
--- a/.github/workflows/upload-doc.yml
+++ b/.github/workflows/upload-doc.yml
@@ -35,7 +35,7 @@ jobs:
run: echo '' > target/doc/index.html
- name: Deploy to GitHub Pages
- uses: JamesIves/github-pages-deploy-action@v4.5.0
+ uses: JamesIves/github-pages-deploy-action@v4.6.1
with:
folder: target/doc
single-commit: true
diff --git a/Cargo.toml b/Cargo.toml
index 9efeda4d1..19d5dd116 100644
--- a/Cargo.toml
+++ b/Cargo.toml
@@ -15,6 +15,8 @@ members = [
]
[workspace.package]
+homepage = "https://actix.rs"
+repository = "https://github.com/actix/actix-web"
license = "MIT OR Apache-2.0"
edition = "2021"
rust-version = "1.72"
diff --git a/actix-http/CHANGES.md b/actix-http/CHANGES.md
index fddd1c2c3..61eeb4beb 100644
--- a/actix-http/CHANGES.md
+++ b/actix-http/CHANGES.md
@@ -2,8 +2,16 @@
## Unreleased
+## 3.7.0
+
+### Added
+
+- Add `rustls-0_23` crate feature
+- Add `{h1::H1Service, h2::H2Service, HttpService}::rustls_0_23()` and `HttpService::rustls_0_23_with_config()` service constructors.
+
### Changed
+- Update `brotli` dependency to `6`.
- Minimum supported Rust version (MSRV) is now 1.72.
## 3.6.0
diff --git a/actix-http/Cargo.toml b/actix-http/Cargo.toml
index 38969e901..a999e73c8 100644
--- a/actix-http/Cargo.toml
+++ b/actix-http/Cargo.toml
@@ -1,6 +1,6 @@
[package]
name = "actix-http"
-version = "3.6.0"
+version = "3.7.0"
authors = [
"Nikolay Kim ",
"Rob Ede ",
@@ -28,6 +28,7 @@ features = [
"rustls-0_20",
"rustls-0_21",
"rustls-0_22",
+ "rustls-0_23",
"compress-brotli",
"compress-gzip",
"compress-zstd",
@@ -66,6 +67,9 @@ rustls-0_21 = ["actix-tls/accept", "actix-tls/rustls-0_21"]
# TLS via Rustls v0.22
rustls-0_22 = ["actix-tls/accept", "actix-tls/rustls-0_22"]
+# TLS via Rustls v0.23
+rustls-0_23 = ["actix-tls/accept", "actix-tls/rustls-0_23"]
+
# Compression codecs
compress-brotli = ["__compress", "brotli"]
compress-gzip = ["__compress", "flate2"]
@@ -111,17 +115,17 @@ rand = { version = "0.8", optional = true }
sha1 = { version = "0.10", optional = true }
# openssl/rustls
-actix-tls = { version = "3.3", default-features = false, optional = true }
+actix-tls = { version = "3.4", default-features = false, optional = true }
# compress-*
-brotli = { version = "3.3.3", optional = true }
+brotli = { version = "6", optional = true }
flate2 = { version = "1.0.13", optional = true }
zstd = { version = "0.13", optional = true }
[dev-dependencies]
actix-http-test = { version = "3", features = ["openssl"] }
actix-server = "2"
-actix-tls = { version = "3.3", features = ["openssl", "rustls-0_22-webpki-roots"] }
+actix-tls = { version = "3.4", features = ["openssl", "rustls-0_23-webpki-roots"] }
actix-web = "4"
async-stream = "0.3"
@@ -131,7 +135,7 @@ env_logger = "0.11"
futures-util = { version = "0.3.17", default-features = false, features = ["alloc"] }
memchr = "2.4"
once_cell = "1.9"
-rcgen = "0.12"
+rcgen = "0.13"
regex = "1.3"
rustversion = "1"
rustls-pemfile = "2"
@@ -139,16 +143,16 @@ serde = { version = "1.0", features = ["derive"] }
serde_json = "1.0"
static_assertions = "1"
tls-openssl = { package = "openssl", version = "0.10.55" }
-tls-rustls_022 = { package = "rustls", version = "0.22" }
+tls-rustls_023 = { package = "rustls", version = "0.23" }
tokio = { version = "1.24.2", features = ["net", "rt", "macros"] }
[[example]]
name = "ws"
-required-features = ["ws", "rustls-0_22"]
+required-features = ["ws", "rustls-0_23"]
[[example]]
name = "tls_rustls"
-required-features = ["http2", "rustls-0_22"]
+required-features = ["http2", "rustls-0_23"]
[[bench]]
name = "response-body-compression"
diff --git a/actix-http/README.md b/actix-http/README.md
index 3881b805d..0ba3fdcac 100644
--- a/actix-http/README.md
+++ b/actix-http/README.md
@@ -5,11 +5,11 @@
[](https://crates.io/crates/actix-http)
-[](https://docs.rs/actix-http/3.6.0)
+[](https://docs.rs/actix-http/3.7.0)


-[](https://deps.rs/crate/actix-http/3.6.0)
+[](https://deps.rs/crate/actix-http/3.7.0)
[](https://crates.io/crates/actix-http)
[](https://discord.gg/NWpN5mmg3x)
diff --git a/actix-http/examples/tls_rustls.rs b/actix-http/examples/tls_rustls.rs
index 47ff061cd..17303c556 100644
--- a/actix-http/examples/tls_rustls.rs
+++ b/actix-http/examples/tls_rustls.rs
@@ -12,7 +12,7 @@
//! Protocol: HTTP/1.1
//! ```
-extern crate tls_rustls_022 as rustls;
+extern crate tls_rustls_023 as rustls;
use std::io;
@@ -36,16 +36,17 @@ async fn main() -> io::Result<()> {
);
ok::<_, Error>(Response::ok().set_body(body))
})
- .rustls_0_22(rustls_config())
+ .rustls_0_23(rustls_config())
})?
.run()
.await
}
fn rustls_config() -> rustls::ServerConfig {
- let cert = rcgen::generate_simple_self_signed(vec!["localhost".to_owned()]).unwrap();
- let cert_file = cert.serialize_pem().unwrap();
- let key_file = cert.serialize_private_key_pem();
+ let rcgen::CertifiedKey { cert, key_pair } =
+ rcgen::generate_simple_self_signed(["localhost".to_owned()]).unwrap();
+ let cert_file = cert.pem();
+ let key_file = key_pair.serialize_pem();
let cert_file = &mut io::BufReader::new(cert_file.as_bytes());
let key_file = &mut io::BufReader::new(key_file.as_bytes());
diff --git a/actix-http/examples/ws.rs b/actix-http/examples/ws.rs
index 55085fd73..fb86bc5ea 100644
--- a/actix-http/examples/ws.rs
+++ b/actix-http/examples/ws.rs
@@ -1,7 +1,7 @@
//! Sets up a WebSocket server over TCP and TLS.
//! Sends a heartbeat message every 4 seconds but does not respond to any incoming frames.
-extern crate tls_rustls_022 as rustls;
+extern crate tls_rustls_023 as rustls;
use std::{
io,
@@ -30,7 +30,7 @@ async fn main() -> io::Result<()> {
.bind("tls", ("127.0.0.1", 8443), || {
HttpService::build()
.finish(handler)
- .rustls_0_22(tls_config())
+ .rustls_0_23(tls_config())
})?
.run()
.await
@@ -87,9 +87,10 @@ fn tls_config() -> rustls::ServerConfig {
use rustls_pemfile::{certs, pkcs8_private_keys};
- let cert = rcgen::generate_simple_self_signed(vec!["localhost".to_owned()]).unwrap();
- let cert_file = cert.serialize_pem().unwrap();
- let key_file = cert.serialize_private_key_pem();
+ let rcgen::CertifiedKey { cert, key_pair } =
+ rcgen::generate_simple_self_signed(["localhost".to_owned()]).unwrap();
+ let cert_file = cert.pem();
+ let key_file = key_pair.serialize_pem();
let cert_file = &mut BufReader::new(cert_file.as_bytes());
let key_file = &mut BufReader::new(key_file.as_bytes());
diff --git a/actix-http/src/h1/dispatcher.rs b/actix-http/src/h1/dispatcher.rs
index a24a6bb07..00b51360e 100644
--- a/actix-http/src/h1/dispatcher.rs
+++ b/actix-http/src/h1/dispatcher.rs
@@ -706,7 +706,7 @@ where
req.head_mut().peer_addr = *this.peer_addr;
- req.conn_data = this.conn_data.clone();
+ req.conn_data.clone_from(this.conn_data);
match this.codec.message_type() {
// request has no payload
diff --git a/actix-http/src/h1/service.rs b/actix-http/src/h1/service.rs
index 64eb39c82..f2f8a0e48 100644
--- a/actix-http/src/h1/service.rs
+++ b/actix-http/src/h1/service.rs
@@ -335,6 +335,67 @@ mod rustls_0_22 {
}
}
+#[cfg(feature = "rustls-0_23")]
+mod rustls_0_23 {
+ use std::io;
+
+ use actix_service::ServiceFactoryExt as _;
+ use actix_tls::accept::{
+ rustls_0_23::{reexports::ServerConfig, Acceptor, TlsStream},
+ TlsError,
+ };
+
+ use super::*;
+
+ impl H1Service, S, B, X, U>
+ where
+ S: ServiceFactory,
+ S::Future: 'static,
+ S::Error: Into>,
+ S::InitError: fmt::Debug,
+ S::Response: Into>,
+
+ B: MessageBody,
+
+ X: ServiceFactory,
+ X::Future: 'static,
+ X::Error: Into>,
+ X::InitError: fmt::Debug,
+
+ U: ServiceFactory<
+ (Request, Framed, Codec>),
+ Config = (),
+ Response = (),
+ >,
+ U::Future: 'static,
+ U::Error: fmt::Display + Into>,
+ U::InitError: fmt::Debug,
+ {
+ /// Create Rustls v0.23 based service.
+ pub fn rustls_0_23(
+ self,
+ config: ServerConfig,
+ ) -> impl ServiceFactory<
+ TcpStream,
+ Config = (),
+ Response = (),
+ Error = TlsError,
+ InitError = (),
+ > {
+ Acceptor::new(config)
+ .map_init_err(|_| {
+ unreachable!("TLS acceptor service factory does not error on init")
+ })
+ .map_err(TlsError::into_service_error)
+ .map(|io: TlsStream| {
+ let peer_addr = io.get_ref().0.peer_addr().ok();
+ (io, peer_addr)
+ })
+ .and_then(self.map_err(TlsError::Service))
+ }
+ }
+}
+
impl H1Service
where
S: ServiceFactory,
diff --git a/actix-http/src/h2/dispatcher.rs b/actix-http/src/h2/dispatcher.rs
index 97ceb51e9..400476c88 100644
--- a/actix-http/src/h2/dispatcher.rs
+++ b/actix-http/src/h2/dispatcher.rs
@@ -126,7 +126,7 @@ where
head.headers = parts.headers.into();
head.peer_addr = this.peer_addr;
- req.conn_data = this.conn_data.clone();
+ req.conn_data.clone_from(&this.conn_data);
let fut = this.flow.service.call(req);
let config = this.config.clone();
diff --git a/actix-http/src/h2/service.rs b/actix-http/src/h2/service.rs
index d50ffc4e3..636ac3161 100644
--- a/actix-http/src/h2/service.rs
+++ b/actix-http/src/h2/service.rs
@@ -293,6 +293,57 @@ mod rustls_0_22 {
}
}
+#[cfg(feature = "rustls-0_23")]
+mod rustls_0_23 {
+ use std::io;
+
+ use actix_service::ServiceFactoryExt as _;
+ use actix_tls::accept::{
+ rustls_0_23::{reexports::ServerConfig, Acceptor, TlsStream},
+ TlsError,
+ };
+
+ use super::*;
+
+ impl H2Service, S, B>
+ where
+ S: ServiceFactory,
+ S::Future: 'static,
+ S::Error: Into> + 'static,
+ S::Response: Into> + 'static,
+ >::Future: 'static,
+
+ B: MessageBody + 'static,
+ {
+ /// Create Rustls v0.23 based service.
+ pub fn rustls_0_23(
+ self,
+ mut config: ServerConfig,
+ ) -> impl ServiceFactory<
+ TcpStream,
+ Config = (),
+ Response = (),
+ Error = TlsError,
+ InitError = S::InitError,
+ > {
+ let mut protos = vec![b"h2".to_vec()];
+ protos.extend_from_slice(&config.alpn_protocols);
+ config.alpn_protocols = protos;
+
+ Acceptor::new(config)
+ .map_init_err(|_| {
+ unreachable!("TLS acceptor service factory does not error on init")
+ })
+ .map_err(TlsError::into_service_error)
+ .map(|io: TlsStream| {
+ let peer_addr = io.get_ref().0.peer_addr().ok();
+ (io, peer_addr)
+ })
+ .and_then(self.map_err(TlsError::Service))
+ }
+ }
+}
+
impl ServiceFactory<(T, Option)> for H2Service
where
T: AsyncRead + AsyncWrite + Unpin + 'static,
diff --git a/actix-http/src/lib.rs b/actix-http/src/lib.rs
index cb82ced00..f9697c4d5 100644
--- a/actix-http/src/lib.rs
+++ b/actix-http/src/lib.rs
@@ -6,7 +6,10 @@
//! | ------------------- | ------------------------------------------- |
//! | `http2` | HTTP/2 support via [h2]. |
//! | `openssl` | TLS support via [OpenSSL]. |
-//! | `rustls` | TLS support via [rustls]. |
+//! | `rustls` | TLS support via [rustls] 0.20. |
+//! | `rustls-0_21` | TLS support via [rustls] 0.21. |
+//! | `rustls-0_22` | TLS support via [rustls] 0.22. |
+//! | `rustls-0_23` | TLS support via [rustls] 0.23. |
//! | `compress-brotli` | Payload compression support: Brotli. |
//! | `compress-gzip` | Payload compression support: Deflate, Gzip. |
//! | `compress-zstd` | Payload compression support: Zstd. |
@@ -28,7 +31,7 @@
#![doc(html_favicon_url = "https://actix.rs/favicon.ico")]
#![cfg_attr(docsrs, feature(doc_auto_cfg))]
-pub use ::http::{uri, uri::Uri, Method, StatusCode, Version};
+pub use http::{uri, uri::Uri, Method, StatusCode, Version};
pub mod body;
mod builder;
@@ -63,6 +66,7 @@ pub use self::payload::PayloadStream;
feature = "rustls-0_20",
feature = "rustls-0_21",
feature = "rustls-0_22",
+ feature = "rustls-0_23",
))]
pub use self::service::TlsAcceptorConfig;
pub use self::{
diff --git a/actix-http/src/service.rs b/actix-http/src/service.rs
index e24387182..a58be93c7 100644
--- a/actix-http/src/service.rs
+++ b/actix-http/src/service.rs
@@ -246,6 +246,7 @@ where
feature = "rustls-0_20",
feature = "rustls-0_21",
feature = "rustls-0_22",
+ feature = "rustls-0_23",
))]
#[derive(Debug, Default)]
pub struct TlsAcceptorConfig {
@@ -257,6 +258,7 @@ pub struct TlsAcceptorConfig {
feature = "rustls-0_20",
feature = "rustls-0_21",
feature = "rustls-0_22",
+ feature = "rustls-0_23",
))]
impl TlsAcceptorConfig {
/// Set TLS handshake timeout duration.
@@ -650,6 +652,102 @@ mod rustls_0_22 {
}
}
+#[cfg(feature = "rustls-0_23")]
+mod rustls_0_23 {
+ use std::io;
+
+ use actix_service::ServiceFactoryExt as _;
+ use actix_tls::accept::{
+ rustls_0_23::{reexports::ServerConfig, Acceptor, TlsStream},
+ TlsError,
+ };
+
+ use super::*;
+
+ impl HttpService, S, B, X, U>
+ where
+ S: ServiceFactory,
+ S::Future: 'static,
+ S::Error: Into> + 'static,
+ S::InitError: fmt::Debug,
+ S::Response: Into> + 'static,
+ >::Future: 'static,
+
+ B: MessageBody + 'static,
+
+ X: ServiceFactory,
+ X::Future: 'static,
+ X::Error: Into>,
+ X::InitError: fmt::Debug,
+
+ U: ServiceFactory<
+ (Request, Framed, h1::Codec>),
+ Config = (),
+ Response = (),
+ >,
+ U::Future: 'static,
+ U::Error: fmt::Display + Into>,
+ U::InitError: fmt::Debug,
+ {
+ /// Create Rustls v0.23 based service.
+ pub fn rustls_0_23(
+ self,
+ config: ServerConfig,
+ ) -> impl ServiceFactory<
+ TcpStream,
+ Config = (),
+ Response = (),
+ Error = TlsError,
+ InitError = (),
+ > {
+ self.rustls_0_23_with_config(config, TlsAcceptorConfig::default())
+ }
+
+ /// Create Rustls v0.23 based service with custom TLS acceptor configuration.
+ pub fn rustls_0_23_with_config(
+ self,
+ mut config: ServerConfig,
+ tls_acceptor_config: TlsAcceptorConfig,
+ ) -> impl ServiceFactory<
+ TcpStream,
+ Config = (),
+ Response = (),
+ Error = TlsError,
+ InitError = (),
+ > {
+ let mut protos = vec![b"h2".to_vec(), b"http/1.1".to_vec()];
+ protos.extend_from_slice(&config.alpn_protocols);
+ config.alpn_protocols = protos;
+
+ let mut acceptor = Acceptor::new(config);
+
+ if let Some(handshake_timeout) = tls_acceptor_config.handshake_timeout {
+ acceptor.set_handshake_timeout(handshake_timeout);
+ }
+
+ acceptor
+ .map_init_err(|_| {
+ unreachable!("TLS acceptor service factory does not error on init")
+ })
+ .map_err(TlsError::into_service_error)
+ .and_then(|io: TlsStream| async {
+ let proto = if let Some(protos) = io.get_ref().1.alpn_protocol() {
+ if protos.windows(2).any(|window| window == b"h2") {
+ Protocol::Http2
+ } else {
+ Protocol::Http1
+ }
+ } else {
+ Protocol::Http1
+ };
+ let peer_addr = io.get_ref().0.peer_addr().ok();
+ Ok((io, proto, peer_addr))
+ })
+ .and_then(self.map_err(TlsError::Service))
+ }
+ }
+}
+
impl ServiceFactory<(T, Protocol, Option)>
for HttpService
where
diff --git a/actix-http/tests/test_openssl.rs b/actix-http/tests/test_openssl.rs
index cb16a4fec..4dd22b585 100644
--- a/actix-http/tests/test_openssl.rs
+++ b/actix-http/tests/test_openssl.rs
@@ -42,9 +42,11 @@ where
}
fn tls_config() -> SslAcceptor {
- let cert = rcgen::generate_simple_self_signed(vec!["localhost".to_owned()]).unwrap();
- let cert_file = cert.serialize_pem().unwrap();
- let key_file = cert.serialize_private_key_pem();
+ let rcgen::CertifiedKey { cert, key_pair } =
+ rcgen::generate_simple_self_signed(["localhost".to_owned()]).unwrap();
+ let cert_file = cert.pem();
+ let key_file = key_pair.serialize_pem();
+
let cert = X509::from_pem(cert_file.as_bytes()).unwrap();
let key = PKey::private_key_from_pem(key_file.as_bytes()).unwrap();
diff --git a/actix-http/tests/test_rustls.rs b/actix-http/tests/test_rustls.rs
index 08b3a249b..3ca0d94c2 100644
--- a/actix-http/tests/test_rustls.rs
+++ b/actix-http/tests/test_rustls.rs
@@ -1,6 +1,6 @@
-#![cfg(feature = "rustls-0_22")]
+#![cfg(feature = "rustls-0_23")]
-extern crate tls_rustls_022 as rustls;
+extern crate tls_rustls_023 as rustls;
use std::{
convert::Infallible,
@@ -20,7 +20,7 @@ use actix_http::{
use actix_http_test::test_server;
use actix_rt::pin;
use actix_service::{fn_factory_with_config, fn_service};
-use actix_tls::connect::rustls_0_22::webpki_roots_cert_store;
+use actix_tls::connect::rustls_0_23::webpki_roots_cert_store;
use actix_utils::future::{err, ok, poll_fn};
use bytes::{Bytes, BytesMut};
use derive_more::{Display, Error};
@@ -52,9 +52,10 @@ where
}
fn tls_config() -> RustlsServerConfig {
- let cert = rcgen::generate_simple_self_signed(vec!["localhost".to_owned()]).unwrap();
- let cert_file = cert.serialize_pem().unwrap();
- let key_file = cert.serialize_private_key_pem();
+ let rcgen::CertifiedKey { cert, key_pair } =
+ rcgen::generate_simple_self_signed(["localhost".to_owned()]).unwrap();
+ let cert_file = cert.pem();
+ let key_file = key_pair.serialize_pem();
let cert_file = &mut BufReader::new(cert_file.as_bytes());
let key_file = &mut BufReader::new(key_file.as_bytes());
@@ -108,7 +109,7 @@ async fn h1() -> io::Result<()> {
let srv = test_server(move || {
HttpService::build()
.h1(|_| ok::<_, Error>(Response::ok()))
- .rustls_0_22(tls_config())
+ .rustls_0_23(tls_config())
})
.await;
@@ -122,7 +123,7 @@ async fn h2() -> io::Result<()> {
let srv = test_server(move || {
HttpService::build()
.h2(|_| ok::<_, Error>(Response::ok()))
- .rustls_0_22(tls_config())
+ .rustls_0_23(tls_config())
})
.await;
@@ -140,7 +141,7 @@ async fn h1_1() -> io::Result<()> {
assert_eq!(req.version(), Version::HTTP_11);
ok::<_, Error>(Response::ok())
})
- .rustls_0_22(tls_config())
+ .rustls_0_23(tls_config())
})
.await;
@@ -158,7 +159,7 @@ async fn h2_1() -> io::Result<()> {
assert_eq!(req.version(), Version::HTTP_2);
ok::<_, Error>(Response::ok())
})
- .rustls_0_22_with_config(
+ .rustls_0_23_with_config(
tls_config(),
TlsAcceptorConfig::default().handshake_timeout(Duration::from_secs(5)),
)
@@ -179,7 +180,7 @@ async fn h2_body1() -> io::Result<()> {
let body = load_body(req.take_payload()).await?;
Ok::<_, Error>(Response::ok().set_body(body))
})
- .rustls_0_22(tls_config())
+ .rustls_0_23(tls_config())
})
.await;
@@ -205,7 +206,7 @@ async fn h2_content_length() {
];
ok::<_, Infallible>(Response::new(statuses[indx]))
})
- .rustls_0_22(tls_config())
+ .rustls_0_23(tls_config())
})
.await;
@@ -277,7 +278,7 @@ async fn h2_headers() {
}
ok::<_, Infallible>(config.body(data.clone()))
})
- .rustls_0_22(tls_config())
+ .rustls_0_23(tls_config())
})
.await;
@@ -316,7 +317,7 @@ async fn h2_body2() {
let mut srv = test_server(move || {
HttpService::build()
.h2(|_| ok::<_, Infallible>(Response::ok().set_body(STR)))
- .rustls_0_22(tls_config())
+ .rustls_0_23(tls_config())
})
.await;
@@ -333,7 +334,7 @@ async fn h2_head_empty() {
let mut srv = test_server(move || {
HttpService::build()
.finish(|_| ok::<_, Infallible>(Response::ok().set_body(STR)))
- .rustls_0_22(tls_config())
+ .rustls_0_23(tls_config())
})
.await;
@@ -359,7 +360,7 @@ async fn h2_head_binary() {
let mut srv = test_server(move || {
HttpService::build()
.h2(|_| ok::<_, Infallible>(Response::ok().set_body(STR)))
- .rustls_0_22(tls_config())
+ .rustls_0_23(tls_config())
})
.await;
@@ -384,7 +385,7 @@ async fn h2_head_binary2() {
let srv = test_server(move || {
HttpService::build()
.h2(|_| ok::<_, Infallible>(Response::ok().set_body(STR)))
- .rustls_0_22(tls_config())
+ .rustls_0_23(tls_config())
})
.await;
@@ -410,7 +411,7 @@ async fn h2_body_length() {
Response::ok().set_body(SizedStream::new(STR.len() as u64, body)),
)
})
- .rustls_0_22(tls_config())
+ .rustls_0_23(tls_config())
})
.await;
@@ -434,7 +435,7 @@ async fn h2_body_chunked_explicit() {
.body(BodyStream::new(body)),
)
})
- .rustls_0_22(tls_config())
+ .rustls_0_23(tls_config())
})
.await;
@@ -463,7 +464,7 @@ async fn h2_response_http_error_handling() {
)
}))
}))
- .rustls_0_22(tls_config())
+ .rustls_0_23(tls_config())
})
.await;
@@ -493,7 +494,7 @@ async fn h2_service_error() {
let mut srv = test_server(move || {
HttpService::build()
.h2(|_| err::, _>(BadRequest))
- .rustls_0_22(tls_config())
+ .rustls_0_23(tls_config())
})
.await;
@@ -510,7 +511,7 @@ async fn h1_service_error() {
let mut srv = test_server(move || {
HttpService::build()
.h1(|_| err::, _>(BadRequest))
- .rustls_0_22(tls_config())
+ .rustls_0_23(tls_config())
})
.await;
@@ -533,7 +534,7 @@ async fn alpn_h1() -> io::Result<()> {
config.alpn_protocols.push(CUSTOM_ALPN_PROTOCOL.to_vec());
HttpService::build()
.h1(|_| ok::<_, Error>(Response::ok()))
- .rustls_0_22(config)
+ .rustls_0_23(config)
})
.await;
@@ -555,7 +556,7 @@ async fn alpn_h2() -> io::Result<()> {
config.alpn_protocols.push(CUSTOM_ALPN_PROTOCOL.to_vec());
HttpService::build()
.h2(|_| ok::<_, Error>(Response::ok()))
- .rustls_0_22(config)
+ .rustls_0_23(config)
})
.await;
@@ -581,7 +582,7 @@ async fn alpn_h2_1() -> io::Result<()> {
config.alpn_protocols.push(CUSTOM_ALPN_PROTOCOL.to_vec());
HttpService::build()
.finish(|_| ok::<_, Error>(Response::ok()))
- .rustls_0_22(config)
+ .rustls_0_23(config)
})
.await;
diff --git a/actix-multipart-derive/Cargo.toml b/actix-multipart-derive/Cargo.toml
index 2f049a3fb..e978864a3 100644
--- a/actix-multipart-derive/Cargo.toml
+++ b/actix-multipart-derive/Cargo.toml
@@ -4,10 +4,11 @@ version = "0.6.1"
authors = ["Jacob Halsey "]
description = "Multipart form derive macro for Actix Web"
keywords = ["http", "web", "framework", "async", "futures"]
-homepage = "https://actix.rs"
-repository = "https://github.com/actix/actix-web"
-license = "MIT OR Apache-2.0"
-edition = "2021"
+homepage.workspace = true
+repository.workspace = true
+license.workspace = true
+edition.workspace = true
+rust-version.workspace = true
[package.metadata.docs.rs]
rustdoc-args = ["--cfg", "docsrs"]
diff --git a/actix-multipart/README.md b/actix-multipart/README.md
index 56723bd68..83947b0c2 100644
--- a/actix-multipart/README.md
+++ b/actix-multipart/README.md
@@ -14,3 +14,65 @@
[](https://discord.gg/NWpN5mmg3x)
+
+
+## Example
+
+Dependencies:
+
+```toml
+[dependencies]
+actix-multipart = "0.6"
+actix-web = "4.5"
+serde = { version = "1.0", features = ["derive"] }
+```
+
+Code:
+
+```rust
+use actix_web::{post, App, HttpServer, Responder};
+
+use actix_multipart::form::{json::Json as MPJson, tempfile::TempFile, MultipartForm};
+use serde::Deserialize;
+
+#[derive(Debug, Deserialize)]
+struct Metadata {
+ name: String,
+}
+
+#[derive(Debug, MultipartForm)]
+struct UploadForm {
+ #[multipart(limit = "100MB")]
+ file: TempFile,
+ json: MPJson,
+}
+
+#[post("/videos")]
+pub async fn post_video(MultipartForm(form): MultipartForm) -> impl Responder {
+ format!(
+ "Uploaded file {}, with size: {}",
+ form.json.name, form.file.size
+ )
+}
+
+#[actix_web::main]
+async fn main() -> std::io::Result<()> {
+ HttpServer::new(move || App::new().service(post_video))
+ .bind(("127.0.0.1", 8080))?
+ .run()
+ .await
+}
+```
+
+Curl request :
+```bash
+curl -v --request POST \
+ --url http://localhost:8080/videos \
+ -F 'json={"name": "Cargo.lock"};type=application/json' \
+ -F file=@./Cargo.lock
+```
+
+
+### Examples
+
+https://github.com/actix/examples/tree/master/forms/multipart
\ No newline at end of file
diff --git a/actix-multipart/src/form/mod.rs b/actix-multipart/src/form/mod.rs
index 67adfd4b2..451b103fd 100644
--- a/actix-multipart/src/form/mod.rs
+++ b/actix-multipart/src/form/mod.rs
@@ -313,7 +313,8 @@ where
let entry = field_limits
.entry(field.name().to_owned())
.or_insert_with(|| T::limit(field.name()));
- limits.field_limit_remaining = entry.to_owned();
+
+ limits.field_limit_remaining.clone_from(entry);
T::handle_field(&req, field, &mut limits, &mut state).await?;
diff --git a/actix-multipart/src/lib.rs b/actix-multipart/src/lib.rs
index c06a00ca9..d19e951e6 100644
--- a/actix-multipart/src/lib.rs
+++ b/actix-multipart/src/lib.rs
@@ -1,4 +1,39 @@
//! Multipart form support for Actix Web.
+//! # Examples
+//! ```no_run
+//! use actix_web::{post, App, HttpServer, Responder};
+//!
+//! use actix_multipart::form::{json::Json as MPJson, tempfile::TempFile, MultipartForm};
+//! use serde::Deserialize;
+//!
+//! #[derive(Debug, Deserialize)]
+//! struct Metadata {
+//! name: String,
+//! }
+//!
+//! #[derive(Debug, MultipartForm)]
+//! struct UploadForm {
+//! #[multipart(limit = "100MB")]
+//! file: TempFile,
+//! json: MPJson,
+//! }
+//!
+//! #[post("/videos")]
+//! pub async fn post_video(MultipartForm(form): MultipartForm) -> impl Responder {
+//! format!(
+//! "Uploaded file {}, with size: {}",
+//! form.json.name, form.file.size
+//! )
+//! }
+//!
+//! #[actix_web::main]
+//! async fn main() -> std::io::Result<()> {
+//! HttpServer::new(move || App::new().service(post_video))
+//! .bind(("127.0.0.1", 8080))?
+//! .run()
+//! .await
+//! }
+//! ```
#![deny(rust_2018_idioms, nonstandard_style)]
#![warn(future_incompatible)]
diff --git a/actix-router/CHANGES.md b/actix-router/CHANGES.md
index 8aa3c8639..6305b45c3 100644
--- a/actix-router/CHANGES.md
+++ b/actix-router/CHANGES.md
@@ -2,6 +2,8 @@
## Unreleased
+## 0.5.3
+
- Add `unicode` crate feature (on-by-default) to switch between `regex` and `regex-lite` as a trade-off between full unicode support and binary size.
- Minimum supported Rust version (MSRV) is now 1.72.
diff --git a/actix-router/Cargo.toml b/actix-router/Cargo.toml
index 0b02e84b9..56e4bed2f 100644
--- a/actix-router/Cargo.toml
+++ b/actix-router/Cargo.toml
@@ -1,6 +1,6 @@
[package]
name = "actix-router"
-version = "0.5.2"
+version = "0.5.3"
authors = [
"Nikolay Kim ",
"Ali MJ Al-Nasrawy ",
diff --git a/actix-router/README.md b/actix-router/README.md
index 751c307b1..12d1b0146 100644
--- a/actix-router/README.md
+++ b/actix-router/README.md
@@ -3,11 +3,11 @@
[](https://crates.io/crates/actix-router)
-[](https://docs.rs/actix-router/0.5.2)
+[](https://docs.rs/actix-router/0.5.3)


-[](https://deps.rs/crate/actix-router/0.5.2)
+[](https://deps.rs/crate/actix-router/0.5.3)
[](https://crates.io/crates/actix-router)
[](https://discord.gg/NWpN5mmg3x)
diff --git a/actix-router/src/path.rs b/actix-router/src/path.rs
index 467420cd3..9031ab763 100644
--- a/actix-router/src/path.rs
+++ b/actix-router/src/path.rs
@@ -154,15 +154,11 @@ impl Path {
None
}
- /// Get matched parameter by name.
+ /// Returns matched parameter by name.
///
/// If keyed parameter is not available empty string is used as default value.
pub fn query(&self, key: &str) -> &str {
- if let Some(s) = self.get(key) {
- s
- } else {
- ""
- }
+ self.get(key).unwrap_or_default()
}
/// Return iterator to items in parameter container.
diff --git a/actix-test/CHANGES.md b/actix-test/CHANGES.md
index 082520447..b55a8305c 100644
--- a/actix-test/CHANGES.md
+++ b/actix-test/CHANGES.md
@@ -2,7 +2,9 @@
## Unreleased
+- Add `TestServerConfig::rustls_0_23()` method for Rustls v0.23 support behind new `rustls-0_23` crate feature.
- Minimum supported Rust version (MSRV) is now 1.72.
+- Various types from `awc`, such as `ClientRequest` and `ClientResponse`, are now re-exported.
## 0.1.3
diff --git a/actix-test/Cargo.toml b/actix-test/Cargo.toml
index 7f48fc2cc..dddcabec9 100644
--- a/actix-test/Cargo.toml
+++ b/actix-test/Cargo.toml
@@ -29,19 +29,21 @@ rustls-0_20 = ["tls-rustls-0_20", "actix-http/rustls-0_20", "awc/rustls-0_20"]
rustls-0_21 = ["tls-rustls-0_21", "actix-http/rustls-0_21", "awc/rustls-0_21"]
# TLS via Rustls v0.22
rustls-0_22 = ["tls-rustls-0_22", "actix-http/rustls-0_22", "awc/rustls-0_22-webpki-roots"]
+# TLS via Rustls v0.23
+rustls-0_23 = ["tls-rustls-0_23", "actix-http/rustls-0_23", "awc/rustls-0_23-webpki-roots"]
# TLS via OpenSSL
openssl = ["tls-openssl", "actix-http/openssl", "awc/openssl"]
[dependencies]
actix-codec = "0.5"
-actix-http = "3.6"
+actix-http = "3.7"
actix-http-test = "3"
actix-rt = "2.1"
actix-service = "2"
actix-utils = "3"
-actix-web = { version = "4.5", default-features = false, features = ["cookies"] }
-awc = { version = "3.4", default-features = false, features = ["cookies"] }
+actix-web = { version = "4.6", default-features = false, features = ["cookies"] }
+awc = { version = "3.5", default-features = false, features = ["cookies"] }
futures-core = { version = "0.3.17", default-features = false, features = ["std"] }
futures-util = { version = "0.3.17", default-features = false, features = [] }
@@ -53,4 +55,5 @@ tls-openssl = { package = "openssl", version = "0.10.55", optional = true }
tls-rustls-0_20 = { package = "rustls", version = "0.20", optional = true }
tls-rustls-0_21 = { package = "rustls", version = "0.21", optional = true }
tls-rustls-0_22 = { package = "rustls", version = "0.22", optional = true }
+tls-rustls-0_23 = { package = "rustls", version = "0.23", default-features = false, optional = true }
tokio = { version = "1.24.2", features = ["sync"] }
diff --git a/actix-test/src/lib.rs b/actix-test/src/lib.rs
index b7aeddad2..1c3d8ff11 100644
--- a/actix-test/src/lib.rs
+++ b/actix-test/src/lib.rs
@@ -52,7 +52,7 @@ use actix_web::{
rt::{self, System},
web, Error,
};
-use awc::{error::PayloadError, Client, ClientRequest, ClientResponse, Connector};
+pub use awc::{error::PayloadError, Client, ClientRequest, ClientResponse, Connector};
use futures_core::Stream;
use tokio::sync::mpsc;
@@ -145,6 +145,8 @@ where
StreamType::Rustls021(_) => true,
#[cfg(feature = "rustls-0_22")]
StreamType::Rustls022(_) => true,
+ #[cfg(feature = "rustls-0_23")]
+ StreamType::Rustls023(_) => true,
};
// run server in separate orphaned thread
@@ -371,6 +373,48 @@ where
.rustls_0_22(config.clone())
}),
},
+ #[cfg(feature = "rustls-0_23")]
+ StreamType::Rustls023(config) => match cfg.tp {
+ HttpVer::Http1 => builder.listen("test", tcp, move || {
+ let app_cfg =
+ AppConfig::__priv_test_new(false, local_addr.to_string(), local_addr);
+
+ let fac = factory()
+ .into_factory()
+ .map_err(|err| err.into().error_response());
+
+ HttpService::build()
+ .client_request_timeout(timeout)
+ .h1(map_config(fac, move |_| app_cfg.clone()))
+ .rustls_0_23(config.clone())
+ }),
+ HttpVer::Http2 => builder.listen("test", tcp, move || {
+ let app_cfg =
+ AppConfig::__priv_test_new(false, local_addr.to_string(), local_addr);
+
+ let fac = factory()
+ .into_factory()
+ .map_err(|err| err.into().error_response());
+
+ HttpService::build()
+ .client_request_timeout(timeout)
+ .h2(map_config(fac, move |_| app_cfg.clone()))
+ .rustls_0_23(config.clone())
+ }),
+ HttpVer::Both => builder.listen("test", tcp, move || {
+ let app_cfg =
+ AppConfig::__priv_test_new(false, local_addr.to_string(), local_addr);
+
+ let fac = factory()
+ .into_factory()
+ .map_err(|err| err.into().error_response());
+
+ HttpService::build()
+ .client_request_timeout(timeout)
+ .finish(map_config(fac, move |_| app_cfg.clone()))
+ .rustls_0_23(config.clone())
+ }),
+ },
}
.expect("test server could not be created");
@@ -447,6 +491,8 @@ enum StreamType {
Rustls021(tls_rustls_0_21::ServerConfig),
#[cfg(feature = "rustls-0_22")]
Rustls022(tls_rustls_0_22::ServerConfig),
+ #[cfg(feature = "rustls-0_23")]
+ Rustls023(tls_rustls_0_23::ServerConfig),
}
/// Create default test server config.
@@ -537,6 +583,13 @@ impl TestServerConfig {
self
}
+ /// Accepts secure connections via Rustls v0.23.
+ #[cfg(feature = "rustls-0_23")]
+ pub fn rustls_0_23(mut self, config: tls_rustls_0_23::ServerConfig) -> Self {
+ self.stream = StreamType::Rustls023(config);
+ self
+ }
+
/// Sets client timeout for first request.
pub fn client_request_timeout(mut self, dur: Duration) -> Self {
self.client_request_timeout = dur;
diff --git a/actix-web-codegen/Cargo.toml b/actix-web-codegen/Cargo.toml
index 7039ea7df..4a45d4fef 100644
--- a/actix-web-codegen/Cargo.toml
+++ b/actix-web-codegen/Cargo.toml
@@ -2,14 +2,15 @@
name = "actix-web-codegen"
version = "4.2.2"
description = "Routing and runtime macros for Actix Web"
-homepage = "https://actix.rs"
-repository = "https://github.com/actix/actix-web"
authors = [
"Nikolay Kim ",
"Rob Ede ",
]
-license = "MIT OR Apache-2.0"
-edition = "2021"
+homepage.workspace = true
+repository.workspace = true
+license.workspace = true
+edition.workspace = true
+rust-version.workspace = true
[lib]
proc-macro = true
diff --git a/actix-web/CHANGES.md b/actix-web/CHANGES.md
index f370f38a4..147a71f94 100644
--- a/actix-web/CHANGES.md
+++ b/actix-web/CHANGES.md
@@ -2,15 +2,25 @@
## Unreleased
+## 4.6.0
+
### Added
- Add `unicode` crate feature (on-by-default) to switch between `regex` and `regex-lite` as a trade-off between full unicode support and binary size.
-- Support for app_data method in a GuardContext
+- Add `rustls-0_23` crate feature.
+- Add `HttpServer::{bind_rustls_0_23, listen_rustls_0_23}()` builder methods.
+- Add `HttpServer::tls_handshake_timeout()` builder method for `rustls-0_22` and `rustls-0_23`.
+- Add `app_data` method for `actix_web::guard::GuardContext`
### Changed
+- Update `brotli` dependency to `6`.
- Minimum supported Rust version (MSRV) is now 1.72.
+### Fixed
+
+- Avoid type confusion with `rustls` in some circumstances.
+
## 4.5.1
### Fixed
diff --git a/actix-web/Cargo.toml b/actix-web/Cargo.toml
index aea8856b1..9f3ab6e5e 100644
--- a/actix-web/Cargo.toml
+++ b/actix-web/Cargo.toml
@@ -1,6 +1,6 @@
[package]
name = "actix-web"
-version = "4.5.1"
+version = "4.6.0"
description = "Actix Web is a powerful, pragmatic, and extremely fast web framework for Rust"
authors = [
"Nikolay Kim ",
@@ -27,6 +27,7 @@ features = [
"rustls-0_20",
"rustls-0_21",
"rustls-0_22",
+ "rustls-0_23",
"compress-brotli",
"compress-gzip",
"compress-zstd",
@@ -71,6 +72,8 @@ rustls-0_20 = ["http2", "actix-http/rustls-0_20", "actix-tls/accept", "actix-tls
rustls-0_21 = ["http2", "actix-http/rustls-0_21", "actix-tls/accept", "actix-tls/rustls-0_21"]
# TLS via Rustls v0.22
rustls-0_22 = ["http2", "actix-http/rustls-0_22", "actix-tls/accept", "actix-tls/rustls-0_22"]
+# TLS via Rustls v0.23
+rustls-0_23 = ["http2", "actix-http/rustls-0_23", "actix-tls/accept", "actix-tls/rustls-0_23"]
# Full unicode support
unicode = ["dep:regex", "actix-router/unicode"]
@@ -89,10 +92,10 @@ actix-rt = { version = "2.6", default-features = false }
actix-server = "2"
actix-service = "2"
actix-utils = "3"
-actix-tls = { version = "3.3", default-features = false, optional = true }
+actix-tls = { version = "3.4", default-features = false, optional = true }
-actix-http = { version = "3.6", features = ["ws"] }
-actix-router = { version = "0.5", default-features = false, features = ["http"] }
+actix-http = { version = "3.7", features = ["ws"] }
+actix-router = { version = "0.5.3", default-features = false, features = ["http"] }
actix-web-codegen = { version = "4.2", optional = true }
ahash = "0.8"
@@ -122,22 +125,22 @@ url = "2.1"
[dev-dependencies]
actix-files = "0.6"
-actix-test = { version = "0.1", features = ["openssl", "rustls-0_22"] }
+actix-test = { version = "0.1", features = ["openssl", "rustls-0_23"] }
awc = { version = "3", features = ["openssl"] }
-brotli = "3.3.3"
+brotli = "6"
const-str = "0.5"
criterion = { version = "0.5", features = ["html_reports"] }
env_logger = "0.11"
flate2 = "1.0.13"
futures-util = { version = "0.3.17", default-features = false, features = ["std"] }
rand = "0.8"
-rcgen = "0.12"
+rcgen = "0.13"
rustls-pemfile = "2"
serde = { version = "1.0", features = ["derive"] }
static_assertions = "1"
tls-openssl = { package = "openssl", version = "0.10.55" }
-tls-rustls = { package = "rustls", version = "0.22" }
+tls-rustls = { package = "rustls", version = "0.23" }
tokio = { version = "1.24.2", features = ["rt-multi-thread", "macros"] }
zstd = "0.13"
diff --git a/actix-web/README.md b/actix-web/README.md
index 35e07fc0b..4e7e785a5 100644
--- a/actix-web/README.md
+++ b/actix-web/README.md
@@ -8,10 +8,10 @@
[](https://crates.io/crates/actix-web)
-[](https://docs.rs/actix-web/4.5.1)
+[](https://docs.rs/actix-web/4.6.0)


-[](https://deps.rs/crate/actix-web/4.5.1)
+[](https://deps.rs/crate/actix-web/4.6.0)
[](https://github.com/actix/actix-web/actions/workflows/ci.yml)
[](https://codecov.io/gh/actix/actix-web)
diff --git a/actix-web/src/app_service.rs b/actix-web/src/app_service.rs
index f2dca954c..65a6ed87b 100644
--- a/actix-web/src/app_service.rs
+++ b/actix-web/src/app_service.rs
@@ -263,8 +263,9 @@ impl ServiceFactory for AppRoutingFactory {
let guards = guards.borrow_mut().take().unwrap_or_default();
let factory_fut = factory.new_service(());
async move {
- let service = factory_fut.await?;
- Ok((path, guards, service))
+ factory_fut
+ .await
+ .map(move |service| (path, guards, service))
}
}));
diff --git a/actix-web/src/config.rs b/actix-web/src/config.rs
index fba0c2717..5e8b056f1 100644
--- a/actix-web/src/config.rs
+++ b/actix-web/src/config.rs
@@ -148,7 +148,7 @@ impl AppConfig {
#[cfg(test)]
pub(crate) fn set_host(&mut self, host: &str) {
- self.host = host.to_owned();
+ host.clone_into(&mut self.host);
}
}
diff --git a/actix-web/src/lib.rs b/actix-web/src/lib.rs
index 88f0ae9be..f86a74406 100644
--- a/actix-web/src/lib.rs
+++ b/actix-web/src/lib.rs
@@ -64,7 +64,10 @@
//! - `compress-gzip` - gzip and deflate content encoding compression support (enabled by default)
//! - `compress-zstd` - zstd content encoding compression support (enabled by default)
//! - `openssl` - HTTPS support via `openssl` crate, supports `HTTP/2`
-//! - `rustls` - HTTPS support via `rustls` crate, supports `HTTP/2`
+//! - `rustls` - HTTPS support via `rustls` 0.20 crate, supports `HTTP/2`
+//! - `rustls-0_21` - HTTPS support via `rustls` 0.21 crate, supports `HTTP/2`
+//! - `rustls-0_22` - HTTPS support via `rustls` 0.22 crate, supports `HTTP/2`
+//! - `rustls-0_23` - HTTPS support via `rustls` 0.23 crate, supports `HTTP/2`
//! - `secure-cookies` - secure cookies support
#![deny(rust_2018_idioms, nonstandard_style)]
diff --git a/actix-web/src/middleware/mod.rs b/actix-web/src/middleware/mod.rs
index ed61556a3..e924de261 100644
--- a/actix-web/src/middleware/mod.rs
+++ b/actix-web/src/middleware/mod.rs
@@ -33,13 +33,13 @@
//!
//! # fn main() {
//! # // These aren't snake_case, because they are supposed to be unit structs.
-//! # let MiddlewareA = middleware::Compress::default();
-//! # let MiddlewareB = middleware::Compress::default();
-//! # let MiddlewareC = middleware::Compress::default();
+//! # type MiddlewareA = middleware::Compress;
+//! # type MiddlewareB = middleware::Compress;
+//! # type MiddlewareC = middleware::Compress;
//! let app = App::new()
-//! .wrap(MiddlewareA)
-//! .wrap(MiddlewareB)
-//! .wrap(MiddlewareC)
+//! .wrap(MiddlewareA::default())
+//! .wrap(MiddlewareB::default())
+//! .wrap(MiddlewareC::default())
//! .service(service);
//! # }
//! ```
diff --git a/actix-web/src/resource.rs b/actix-web/src/resource.rs
index 291d67460..00555b7b2 100644
--- a/actix-web/src/resource.rs
+++ b/actix-web/src/resource.rs
@@ -771,7 +771,7 @@ mod tests {
data3: web::Data| {
assert_eq!(**data1, 10);
assert_eq!(**data2, '*');
- let error = std::f64::EPSILON;
+ let error = f64::EPSILON;
assert!((**data3 - 1.0).abs() < error);
HttpResponse::Ok()
},
diff --git a/actix-web/src/scope.rs b/actix-web/src/scope.rs
index 27a2827a6..adc9f75d3 100644
--- a/actix-web/src/scope.rs
+++ b/actix-web/src/scope.rs
@@ -470,8 +470,9 @@ impl ServiceFactory for ScopeFactory {
let guards = guards.borrow_mut().take().unwrap_or_default();
let factory_fut = factory.new_service(());
async move {
- let service = factory_fut.await?;
- Ok((path, guards, service))
+ factory_fut
+ .await
+ .map(move |service| (path, guards, service))
}
}));
diff --git a/actix-web/src/server.rs b/actix-web/src/server.rs
index 6592079bf..33b1e1894 100644
--- a/actix-web/src/server.rs
+++ b/actix-web/src/server.rs
@@ -12,6 +12,7 @@ use std::{
feature = "rustls-0_20",
feature = "rustls-0_21",
feature = "rustls-0_22",
+ feature = "rustls-0_23",
))]
use actix_http::TlsAcceptorConfig;
use actix_http::{body::MessageBody, Extensions, HttpService, KeepAlive, Request, Response};
@@ -242,7 +243,13 @@ where
/// time, the connection is closed.
///
/// By default, the handshake timeout is 3 seconds.
- #[cfg(any(feature = "openssl", feature = "rustls-0_20", feature = "rustls-0_21"))]
+ #[cfg(any(
+ feature = "openssl",
+ feature = "rustls-0_20",
+ feature = "rustls-0_21",
+ feature = "rustls-0_22",
+ feature = "rustls-0_23",
+ ))]
pub fn tls_handshake_timeout(self, dur: Duration) -> Self {
self.config
.lock()
@@ -270,6 +277,10 @@ where
/// Rustls v0.20.
/// - `actix_tls::accept::rustls_0_21::TlsStream` when using
/// Rustls v0.21.
+ /// - `actix_tls::accept::rustls_0_22::TlsStream` when using
+ /// Rustls v0.22.
+ /// - `actix_tls::accept::rustls_0_23::TlsStream` when using
+ /// Rustls v0.23.
/// - `actix_web::rt::net::TcpStream` when no encryption is used.
///
/// See the `on_connect` example for additional details.
@@ -466,6 +477,25 @@ where
Ok(self)
}
+ /// Resolves socket address(es) and binds server to created listener(s) for TLS connections
+ /// using Rustls v0.23.
+ ///
+ /// See [`bind()`](Self::bind()) for more details on `addrs` argument.
+ ///
+ /// ALPN protocols "h2" and "http/1.1" are added to any configured ones.
+ #[cfg(feature = "rustls-0_23")]
+ pub fn bind_rustls_0_23(
+ mut self,
+ addrs: A,
+ config: actix_tls::accept::rustls_0_23::reexports::ServerConfig,
+ ) -> io::Result {
+ let sockets = bind_addrs(addrs, self.backlog)?;
+ for lst in sockets {
+ self = self.listen_rustls_0_23_inner(lst, config.clone())?;
+ }
+ Ok(self)
+ }
+
/// Resolves socket address(es) and binds server to created listener(s) for TLS connections
/// using OpenSSL.
///
@@ -595,7 +625,7 @@ where
/// Binds to existing listener for accepting incoming TLS connection requests using Rustls
/// v0.21.
///
- /// See [`listen()`](Self::listen) for more details on the `lst` argument.
+ /// See [`listen()`](Self::listen()) for more details on the `lst` argument.
///
/// ALPN protocols "h2" and "http/1.1" are added to any configured ones.
#[cfg(feature = "rustls-0_21")]
@@ -712,7 +742,7 @@ where
/// Binds to existing listener for accepting incoming TLS connection requests using Rustls
/// v0.22.
///
- /// See [`listen()`](Self::listen) for more details on the `lst` argument.
+ /// See [`listen()`](Self::listen()) for more details on the `lst` argument.
///
/// ALPN protocols "h2" and "http/1.1" are added to any configured ones.
#[cfg(feature = "rustls-0_22")]
@@ -775,6 +805,72 @@ where
Ok(self)
}
+ /// Binds to existing listener for accepting incoming TLS connection requests using Rustls
+ /// v0.23.
+ ///
+ /// See [`listen()`](Self::listen()) for more details on the `lst` argument.
+ ///
+ /// ALPN protocols "h2" and "http/1.1" are added to any configured ones.
+ #[cfg(feature = "rustls-0_23")]
+ pub fn listen_rustls_0_23(
+ self,
+ lst: net::TcpListener,
+ config: actix_tls::accept::rustls_0_23::reexports::ServerConfig,
+ ) -> io::Result {
+ self.listen_rustls_0_23_inner(lst, config)
+ }
+
+ #[cfg(feature = "rustls-0_23")]
+ fn listen_rustls_0_23_inner(
+ mut self,
+ lst: net::TcpListener,
+ config: actix_tls::accept::rustls_0_23::reexports::ServerConfig,
+ ) -> io::Result {
+ let factory = self.factory.clone();
+ let cfg = self.config.clone();
+ let addr = lst.local_addr().unwrap();
+ self.sockets.push(Socket {
+ addr,
+ scheme: "https",
+ });
+
+ let on_connect_fn = self.on_connect_fn.clone();
+
+ self.builder =
+ self.builder
+ .listen(format!("actix-web-service-{}", addr), lst, move || {
+ let c = cfg.lock().unwrap();
+ let host = c.host.clone().unwrap_or_else(|| format!("{}", addr));
+
+ let svc = HttpService::build()
+ .keep_alive(c.keep_alive)
+ .client_request_timeout(c.client_request_timeout)
+ .client_disconnect_timeout(c.client_disconnect_timeout);
+
+ let svc = if let Some(handler) = on_connect_fn.clone() {
+ svc.on_connect_ext(move |io: &_, ext: _| (handler)(io as &dyn Any, ext))
+ } else {
+ svc
+ };
+
+ let fac = factory()
+ .into_factory()
+ .map_err(|err| err.into().error_response());
+
+ let acceptor_config = match c.tls_handshake_timeout {
+ Some(dur) => TlsAcceptorConfig::default().handshake_timeout(dur),
+ None => TlsAcceptorConfig::default(),
+ };
+
+ svc.finish(map_config(fac, move |_| {
+ AppConfig::new(true, host.clone(), addr)
+ }))
+ .rustls_0_23_with_config(config.clone(), acceptor_config)
+ })?;
+
+ Ok(self)
+ }
+
/// Binds to existing listener for accepting incoming TLS connection requests using OpenSSL.
///
/// See [`listen()`](Self::listen) for more details on the `lst` argument.
diff --git a/actix-web/tests/test_httpserver.rs b/actix-web/tests/test_httpserver.rs
index 86e0575f3..039c0ffbc 100644
--- a/actix-web/tests/test_httpserver.rs
+++ b/actix-web/tests/test_httpserver.rs
@@ -64,9 +64,11 @@ fn ssl_acceptor() -> openssl::ssl::SslAcceptorBuilder {
x509::X509,
};
- let cert = rcgen::generate_simple_self_signed(vec!["localhost".to_owned()]).unwrap();
- let cert_file = cert.serialize_pem().unwrap();
- let key_file = cert.serialize_private_key_pem();
+ let rcgen::CertifiedKey { cert, key_pair } =
+ rcgen::generate_simple_self_signed(["localhost".to_owned()]).unwrap();
+ let cert_file = cert.pem();
+ let key_file = key_pair.serialize_pem();
+
let cert = X509::from_pem(cert_file.as_bytes()).unwrap();
let key = PKey::private_key_from_pem(key_file.as_bytes()).unwrap();
diff --git a/actix-web/tests/test_server.rs b/actix-web/tests/test_server.rs
index 8fb80216b..960cf1e2b 100644
--- a/actix-web/tests/test_server.rs
+++ b/actix-web/tests/test_server.rs
@@ -1,6 +1,6 @@
#[cfg(feature = "openssl")]
extern crate tls_openssl as openssl;
-#[cfg(feature = "rustls-0_22")]
+#[cfg(feature = "rustls-0_23")]
extern crate tls_rustls as rustls;
use std::{
@@ -34,9 +34,11 @@ const STR: &str = const_str::repeat!(S, 100);
#[cfg(feature = "openssl")]
fn openssl_config() -> SslAcceptor {
- let cert = rcgen::generate_simple_self_signed(vec!["localhost".to_owned()]).unwrap();
- let cert_file = cert.serialize_pem().unwrap();
- let key_file = cert.serialize_private_key_pem();
+ let rcgen::CertifiedKey { cert, key_pair } =
+ rcgen::generate_simple_self_signed(["localhost".to_owned()]).unwrap();
+ let cert_file = cert.pem();
+ let key_file = key_pair.serialize_pem();
+
let cert = X509::from_pem(cert_file.as_bytes()).unwrap();
let key = PKey::private_key_from_pem(key_file.as_bytes()).unwrap();
@@ -704,7 +706,7 @@ async fn test_brotli_encoding_large_openssl() {
srv.stop().await;
}
-#[cfg(feature = "rustls-0_22")]
+#[cfg(feature = "rustls-0_23")]
mod plus_rustls {
use std::io::BufReader;
@@ -714,9 +716,10 @@ mod plus_rustls {
use super::*;
fn tls_config() -> RustlsServerConfig {
- let cert = rcgen::generate_simple_self_signed(vec!["localhost".to_owned()]).unwrap();
- let cert_file = cert.serialize_pem().unwrap();
- let key_file = cert.serialize_private_key_pem();
+ let rcgen::CertifiedKey { cert, key_pair } =
+ rcgen::generate_simple_self_signed(["localhost".to_owned()]).unwrap();
+ let cert_file = cert.pem();
+ let key_file = key_pair.serialize_pem();
let cert_file = &mut BufReader::new(cert_file.as_bytes());
let key_file = &mut BufReader::new(key_file.as_bytes());
@@ -740,7 +743,7 @@ mod plus_rustls {
.map(char::from)
.collect::();
- let srv = actix_test::start_with(actix_test::config().rustls_0_22(tls_config()), || {
+ let srv = actix_test::start_with(actix_test::config().rustls_0_23(tls_config()), || {
App::new().service(web::resource("/").route(web::to(|bytes: Bytes| async {
// echo decompressed request body back in response
HttpResponse::Ok()
diff --git a/awc/CHANGES.md b/awc/CHANGES.md
index 507c8a080..54c5e9869 100644
--- a/awc/CHANGES.md
+++ b/awc/CHANGES.md
@@ -2,6 +2,12 @@
## Unreleased
+## 3.5.0
+
+- Add `rustls-0_23`, `rustls-0_23-webpki-roots`, and `rustls-0_23-native-roots` crate features.
+- Add `awc::Connector::rustls_0_23()` constructor.
+- Fix `rustls-0_22-native-roots` root store lookup
+- Update `brotli` dependency to `6`.
- Minimum supported Rust version (MSRV) is now 1.72.
## 3.4.0
diff --git a/awc/Cargo.toml b/awc/Cargo.toml
index da9e78ae8..f51b3904b 100644
--- a/awc/Cargo.toml
+++ b/awc/Cargo.toml
@@ -1,6 +1,6 @@
[package]
name = "awc"
-version = "3.4.0"
+version = "3.5.0"
authors = ["Nikolay Kim "]
description = "Async HTTP and WebSocket client library"
keywords = ["actix", "http", "framework", "async", "web"]
@@ -27,6 +27,7 @@ features = [
"rustls-0_20",
"rustls-0_21",
"rustls-0_22-webpki-roots",
+ "rustls-0_23-webpki-roots",
"compress-brotli",
"compress-gzip",
"compress-zstd",
@@ -48,6 +49,12 @@ rustls-0_21 = ["tls-rustls-0_21", "actix-tls/rustls-0_21"]
rustls-0_22-webpki-roots = ["tls-rustls-0_22", "actix-tls/rustls-0_22-webpki-roots"]
# TLS via Rustls v0.22 (Native roots)
rustls-0_22-native-roots = ["tls-rustls-0_22", "actix-tls/rustls-0_22-native-roots"]
+# TLS via Rustls v0.23
+rustls-0_23 = ["tls-rustls-0_23", "actix-tls/rustls-0_23"]
+# TLS via Rustls v0.23 (WebPKI roots)
+rustls-0_23-webpki-roots = ["rustls-0_23", "actix-tls/rustls-0_23-webpki-roots"]
+# TLS via Rustls v0.23 (Native roots)
+rustls-0_23-native-roots = ["rustls-0_23", "actix-tls/rustls-0_23-native-roots"]
# Brotli algorithm content-encoding support
compress-brotli = ["actix-http/compress-brotli", "__compress"]
@@ -74,9 +81,9 @@ dangerous-h2c = []
[dependencies]
actix-codec = "0.5"
actix-service = "2"
-actix-http = { version = "3.6", features = ["http2", "ws"] }
+actix-http = { version = "3.7", features = ["http2", "ws"] }
actix-rt = { version = "2.1", default-features = false }
-actix-tls = { version = "3.3", features = ["connect", "uri"] }
+actix-tls = { version = "3.4", features = ["connect", "uri"] }
actix-utils = "3"
base64 = "0.22"
@@ -104,29 +111,31 @@ tls-openssl = { package = "openssl", version = "0.10.55", optional = true }
tls-rustls-0_20 = { package = "rustls", version = "0.20", optional = true, features = ["dangerous_configuration"] }
tls-rustls-0_21 = { package = "rustls", version = "0.21", optional = true, features = ["dangerous_configuration"] }
tls-rustls-0_22 = { package = "rustls", version = "0.22", optional = true }
+tls-rustls-0_23 = { package = "rustls", version = "0.23", optional = true, default-features = false }
trust-dns-resolver = { version = "0.23", optional = true }
[dev-dependencies]
-actix-http = { version = "3.6", features = ["openssl"] }
+actix-http = { version = "3.7", features = ["openssl"] }
actix-http-test = { version = "3", features = ["openssl"] }
actix-server = "2"
-actix-test = { version = "0.1", features = ["openssl", "rustls-0_22"] }
-actix-tls = { version = "3.3", features = ["openssl", "rustls-0_22"] }
+actix-test = { version = "0.1", features = ["openssl", "rustls-0_23"] }
+actix-tls = { version = "3.4", features = ["openssl", "rustls-0_23"] }
actix-utils = "3"
actix-web = { version = "4", features = ["openssl"] }
-brotli = "3.3.3"
+brotli = "6"
const-str = "0.5"
env_logger = "0.11"
flate2 = "1.0.13"
futures-util = { version = "0.3.17", default-features = false }
static_assertions = "1.1"
-rcgen = "0.12"
+rcgen = "0.13"
rustls-pemfile = "2"
tokio = { version = "1.24.2", features = ["rt-multi-thread", "macros"] }
zstd = "0.13"
+tls-rustls-0_23 = { package = "rustls", version = "0.23" } # add rustls 0.23 with default features to make aws_lc_rs work in tests
[[example]]
name = "client"
-required-features = ["rustls-0_22-webpki-roots"]
+required-features = ["rustls-0_23-webpki-roots"]
diff --git a/awc/README.md b/awc/README.md
index 19236b85a..8e7b42812 100644
--- a/awc/README.md
+++ b/awc/README.md
@@ -5,9 +5,9 @@
[](https://crates.io/crates/awc)
-[](https://docs.rs/awc/3.4.0)
+[](https://docs.rs/awc/3.5.0)

-[](https://deps.rs/crate/awc/3.4.0)
+[](https://deps.rs/crate/awc/3.5.0)
[](https://discord.gg/NWpN5mmg3x)
diff --git a/awc/src/builder.rs b/awc/src/builder.rs
index a54960382..5aae394f8 100644
--- a/awc/src/builder.rs
+++ b/awc/src/builder.rs
@@ -37,6 +37,12 @@ pub struct ClientBuilder {
}
impl ClientBuilder {
+ /// Create a new ClientBuilder with default settings
+ ///
+ /// Note: If the `rustls-0_23` feature is enabled and neither `rustls-0_23-native-roots` nor
+ /// `rustls-0_23-webpki-roots` are enabled, this ClientBuilder will build without TLS. In order
+ /// to enable TLS in this scenario, a custom `Connector` _must_ be added to the builder before
+ /// finishing construction.
#[allow(clippy::new_ret_no_self)]
pub fn new() -> ClientBuilder<
impl Service<
diff --git a/awc/src/client/connector.rs b/awc/src/client/connector.rs
index 94629b955..5d0b655a4 100644
--- a/awc/src/client/connector.rs
+++ b/awc/src/client/connector.rs
@@ -57,6 +57,10 @@ enum OurTlsConnector {
))]
#[allow(dead_code)] // false positive; used in build_tls
Rustls022(std::sync::Arc),
+
+ #[cfg(feature = "rustls-0_23")]
+ #[allow(dead_code)] // false positive; used in build_tls
+ Rustls023(std::sync::Arc),
}
/// Manages HTTP client network connectivity.
@@ -80,6 +84,14 @@ pub struct Connector {
}
impl Connector<()> {
+ /// Create a new connector with default TLS settings
+ ///
+ /// # Panics
+ ///
+ /// - When the `rustls-0_23-webpki-roots` or `rustls-0_23-native-roots` features are enabled
+ /// and no default crypto provider has been loaded, this method will panic.
+ /// - When the `rustls-0_23-native-roots` or `rustls-0_22-native-roots` features are enabled
+ /// and the runtime system has no native root certificates, this method will panic.
#[allow(clippy::new_ret_no_self, clippy::let_unit_value)]
pub fn new() -> Connector<
impl Service<
@@ -96,10 +108,31 @@ impl Connector<()> {
}
cfg_if::cfg_if! {
- if #[cfg(any(feature = "rustls-0_22-webpki-roots", feature = "rustls-0_22-webpki-roots"))] {
- /// Build TLS connector with Rustls v0.22, based on supplied ALPN protocols.
+ if #[cfg(any(feature = "rustls-0_23-webpki-roots", feature = "rustls-0_23-native-roots"))] {
+ /// Build TLS connector with Rustls v0.23, based on supplied ALPN protocols.
///
- /// Note that if other TLS crate features are enabled, Rustls v0.22 will be used.
+ /// Note that if other TLS crate features are enabled, Rustls v0.23 will be used.
+ fn build_tls(protocols: Vec>) -> OurTlsConnector {
+ use actix_tls::connect::rustls_0_23::{self, reexports::ClientConfig};
+
+ cfg_if::cfg_if! {
+ if #[cfg(feature = "rustls-0_23-webpki-roots")] {
+ let certs = rustls_0_23::webpki_roots_cert_store();
+ } else if #[cfg(feature = "rustls-0_23-native-roots")] {
+ let certs = rustls_0_23::native_roots_cert_store().expect("Failed to find native root certificates");
+ }
+ }
+
+ let mut config = ClientConfig::builder()
+ .with_root_certificates(certs)
+ .with_no_client_auth();
+
+ config.alpn_protocols = protocols;
+
+ OurTlsConnector::Rustls023(std::sync::Arc::new(config))
+ }
+ } else if #[cfg(any(feature = "rustls-0_22-webpki-roots", feature = "rustls-0_22-native-roots"))] {
+ /// Build TLS connector with Rustls v0.22, based on supplied ALPN protocols.
fn build_tls(protocols: Vec>) -> OurTlsConnector {
use actix_tls::connect::rustls_0_22::{self, reexports::ClientConfig};
@@ -107,7 +140,7 @@ impl Connector<()> {
if #[cfg(feature = "rustls-0_22-webpki-roots")] {
let certs = rustls_0_22::webpki_roots_cert_store();
} else if #[cfg(feature = "rustls-0_22-native-roots")] {
- let certs = rustls_0_22::native_roots_cert_store();
+ let certs = rustls_0_22::native_roots_cert_store().expect("Failed to find native root certificates");
}
}
@@ -167,7 +200,8 @@ impl Connector<()> {
OurTlsConnector::OpensslBuilder(ssl)
}
} else {
- /// Provides an empty TLS connector when no TLS feature is enabled.
+ /// Provides an empty TLS connector when no TLS feature is enabled, or when only the
+ /// `rustls-0_23` crate feature is enabled.
fn build_tls(_: Vec>) -> OurTlsConnector {
OurTlsConnector::None
}
@@ -278,6 +312,24 @@ where
self
}
+ /// Sets custom Rustls v0.23 `ClientConfig` instance.
+ ///
+ /// In order to enable ALPN, set the `.alpn_protocols` field on the ClientConfig to the
+ /// following:
+ ///
+ /// ```no_run
+ /// vec![b"h2".to_vec(), b"http/1.1".to_vec()]
+ /// # ;
+ /// ```
+ #[cfg(feature = "rustls-0_23")]
+ pub fn rustls_0_23(
+ mut self,
+ connector: std::sync::Arc,
+ ) -> Self {
+ self.tls = OurTlsConnector::Rustls023(connector);
+ self
+ }
+
/// Sets maximum supported HTTP major version.
///
/// Supported versions are HTTP/1.1 and HTTP/2.
@@ -588,6 +640,40 @@ where
Some(actix_service::boxed::rc_service(tls_service))
}
+
+ #[cfg(feature = "rustls-0_23")]
+ OurTlsConnector::Rustls023(tls) => {
+ const H2: &[u8] = b"h2";
+
+ use actix_tls::connect::rustls_0_23::{reexports::AsyncTlsStream, TlsConnector};
+
+ #[allow(non_local_definitions)]
+ impl IntoConnectionIo for TcpConnection> {
+ fn into_connection_io(self) -> (Box, Protocol) {
+ let sock = self.into_parts().0;
+ let h2 = sock
+ .get_ref()
+ .1
+ .alpn_protocol()
+ .map_or(false, |protos| protos.windows(2).any(|w| w == H2));
+ if h2 {
+ (Box::new(sock), Protocol::Http2)
+ } else {
+ (Box::new(sock), Protocol::Http1)
+ }
+ }
+ }
+
+ let handshake_timeout = self.config.handshake_timeout;
+
+ let tls_service = TlsConnectorService {
+ tcp_service: tcp_service_inner,
+ tls_service: TlsConnector::service(tls),
+ timeout: handshake_timeout,
+ };
+
+ Some(actix_service::boxed::rc_service(tls_service))
+ }
};
let tcp_config = self.config.no_disconnect_timeout();
@@ -649,6 +735,17 @@ where
/// service for establish tcp connection and do client tls handshake.
/// operation is canceled when timeout limit reached.
+#[cfg(any(
+ feature = "dangerous-h2c",
+ feature = "openssl",
+ feature = "rustls-0_20",
+ feature = "rustls-0_21",
+ feature = "rustls-0_22-webpki-roots",
+ feature = "rustls-0_22-native-roots",
+ feature = "rustls-0_23",
+ feature = "rustls-0_23-webpki-roots",
+ feature = "rustls-0_23-native-roots"
+))]
struct TlsConnectorService {
/// TCP connection is canceled on `TcpConnectorInnerService`'s timeout setting.
tcp_service: Tcp,
@@ -659,6 +756,15 @@ struct TlsConnectorService {
timeout: Duration,
}
+#[cfg(any(
+ feature = "dangerous-h2c",
+ feature = "openssl",
+ feature = "rustls-0_20",
+ feature = "rustls-0_21",
+ feature = "rustls-0_22-webpki-roots",
+ feature = "rustls-0_22-native-roots",
+ feature = "rustls-0_23",
+))]
impl Service for TlsConnectorService
where
Tcp:
diff --git a/awc/tests/test_connector.rs b/awc/tests/test_connector.rs
index b3eb97367..a8b7e98c1 100644
--- a/awc/tests/test_connector.rs
+++ b/awc/tests/test_connector.rs
@@ -13,9 +13,11 @@ use openssl::{
};
fn tls_config() -> SslAcceptor {
- let cert = rcgen::generate_simple_self_signed(vec!["localhost".to_owned()]).unwrap();
- let cert_file = cert.serialize_pem().unwrap();
- let key_file = cert.serialize_private_key_pem();
+ let rcgen::CertifiedKey { cert, key_pair } =
+ rcgen::generate_simple_self_signed(["localhost".to_owned()]).unwrap();
+ let cert_file = cert.pem();
+ let key_file = key_pair.serialize_pem();
+
let cert = X509::from_pem(cert_file.as_bytes()).unwrap();
let key = PKey::private_key_from_pem(key_file.as_bytes()).unwrap();
diff --git a/awc/tests/test_rustls_client.rs b/awc/tests/test_rustls_client.rs
index 1cc3e8c48..7e832f67d 100644
--- a/awc/tests/test_rustls_client.rs
+++ b/awc/tests/test_rustls_client.rs
@@ -1,6 +1,6 @@
-#![cfg(feature = "rustls-0_22-webpki-roots")]
+#![cfg(feature = "rustls-0_23-webpki-roots")]
-extern crate tls_rustls_0_22 as rustls;
+extern crate tls_rustls_0_23 as rustls;
use std::{
io::BufReader,
@@ -13,7 +13,7 @@ use std::{
use actix_http::HttpService;
use actix_http_test::test_server;
use actix_service::{fn_service, map_config, ServiceFactoryExt};
-use actix_tls::connect::rustls_0_22::webpki_roots_cert_store;
+use actix_tls::connect::rustls_0_23::webpki_roots_cert_store;
use actix_utils::future::ok;
use actix_web::{dev::AppConfig, http::Version, web, App, HttpResponse};
use rustls::{
@@ -23,9 +23,10 @@ use rustls::{
use rustls_pemfile::{certs, pkcs8_private_keys};
fn tls_config() -> ServerConfig {
- let cert = rcgen::generate_simple_self_signed(vec!["localhost".to_owned()]).unwrap();
- let cert_file = cert.serialize_pem().unwrap();
- let key_file = cert.serialize_private_key_pem();
+ let rcgen::CertifiedKey { cert, key_pair } =
+ rcgen::generate_simple_self_signed(["localhost".to_owned()]).unwrap();
+ let cert_file = cert.pem();
+ let key_file = key_pair.serialize_pem();
let cert_file = &mut BufReader::new(cert_file.as_bytes());
let key_file = &mut BufReader::new(key_file.as_bytes());
@@ -83,7 +84,7 @@ mod danger {
}
fn supported_verify_schemes(&self) -> Vec {
- rustls::crypto::ring::default_provider()
+ rustls::crypto::aws_lc_rs::default_provider()
.signature_verification_algorithms
.supported_schemes()
}
@@ -107,7 +108,7 @@ async fn test_connection_reuse_h2() {
App::new().service(web::resource("/").route(web::to(HttpResponse::Ok))),
|_| AppConfig::default(),
))
- .rustls_0_22(tls_config())
+ .rustls_0_23(tls_config())
.map_err(|_| ()),
)
})
@@ -126,7 +127,7 @@ async fn test_connection_reuse_h2() {
.set_certificate_verifier(Arc::new(danger::NoCertificateVerification));
let client = awc::Client::builder()
- .connector(awc::Connector::new().rustls_0_22(Arc::new(config)))
+ .connector(awc::Connector::new().rustls_0_23(Arc::new(config)))
.finish();
// req 1
diff --git a/awc/tests/test_ssl_client.rs b/awc/tests/test_ssl_client.rs
index 5273c3fff..95d4c15f1 100644
--- a/awc/tests/test_ssl_client.rs
+++ b/awc/tests/test_ssl_client.rs
@@ -19,9 +19,11 @@ use openssl::{
};
fn tls_config() -> SslAcceptor {
- let cert = rcgen::generate_simple_self_signed(vec!["localhost".to_owned()]).unwrap();
- let cert_file = cert.serialize_pem().unwrap();
- let key_file = cert.serialize_private_key_pem();
+ let rcgen::CertifiedKey { cert, key_pair } =
+ rcgen::generate_simple_self_signed(["localhost".to_owned()]).unwrap();
+ let cert_file = cert.pem();
+ let key_file = key_pair.serialize_pem();
+
let cert = X509::from_pem(cert_file.as_bytes()).unwrap();
let key = PKey::private_key_from_pem(key_file.as_bytes()).unwrap();
diff --git a/justfile b/justfile
index 42979f18c..d92f4bd3d 100644
--- a/justfile
+++ b/justfile
@@ -6,14 +6,57 @@ fmt:
cargo +nightly fmt
npx -y prettier --write $(fd --type=file --hidden --extension=md --extension=yml)
+# Downgrade dev-dependencies necessary to run MSRV checks/tests.
+[private]
+downgrade-for-msrv:
+ cargo update -p=clap --precise=4.4.18
+
+msrv := ```
+ cargo metadata --format-version=1 \
+ | jq -r 'first(.packages[] | select(.source == null and .rust_version)) | .rust_version' \
+ | sed -E 's/^1\.([0-9]{2})$/1\.\1\.0/'
+```
+msrv_rustup := "+" + msrv
+
+non_linux_all_features_list := ```
+ cargo metadata --format-version=1 \
+ | jq '.packages[] | select(.source == null) | .features | keys' \
+ | jq -r --slurp \
+ --arg exclusions "tokio-uring,io-uring,experimental-io-uring" \
+ 'add | unique | . - ($exclusions | split(",")) | join(",")'
+```
+
+all_crate_features := if os() == "linux" {
+ "--all-features"
+} else {
+ "--features='" + non_linux_all_features_list + "'"
+}
+
+# Test workspace using MSRV.
+test-msrv: downgrade-for-msrv (test msrv_rustup)
+
+# Test workspace code.
+test toolchain="":
+ cargo {{ toolchain }} test --lib --tests -p=actix-web-codegen --all-features
+ cargo {{ toolchain }} test --lib --tests -p=actix-multipart-derive --all-features
+ cargo {{ toolchain }} nextest run -p=actix-router --no-default-features
+ cargo {{ toolchain }} nextest run --workspace --exclude=actix-web-codegen --exclude=actix-multipart-derive {{ all_crate_features }} --filter-expr="not test(test_reading_deflate_encoding_large_random_rustls)"
+
+# Test workspace docs.
+test-docs toolchain="": && doc
+ cargo {{ toolchain }} test --doc --workspace {{ all_crate_features }} --no-fail-fast -- --nocapture
+
+# Test workspace.
+test-all toolchain="": (test toolchain) (test-docs toolchain)
+
# Document crates in workspace.
-doc:
- RUSTDOCFLAGS="--cfg=docsrs" cargo +nightly doc --no-deps --workspace --features=rustls,openssl
+doc *args:
+ RUSTDOCFLAGS="--cfg=docsrs -Dwarnings" cargo +nightly doc --no-deps --workspace {{ all_crate_features }} {{ args }}
# Document crates in workspace and watch for changes.
doc-watch:
- RUSTDOCFLAGS="--cfg=docsrs" cargo +nightly doc --no-deps --workspace --features=rustls,openssl --open
- cargo watch -- RUSTDOCFLAGS="--cfg=docsrs" cargo +nightly doc --no-deps --workspace --features=rustls,openssl
+ @just doc --open
+ cargo watch -- just doc
# Update READMEs from crate root documentation.
update-readmes: && fmt