use clap::Parser; use futures::AsyncWriteExt; use futures::StreamExt; use rustls_acme::caches::DirCache; use rustls_acme::AcmeConfig; use smol::net::TcpListener; use smol::spawn; use std::net::Ipv6Addr; use std::path::PathBuf; #[derive(Parser, Debug)] struct Args { /// Domains #[clap(short, required = true)] domains: Vec, /// Contact info #[clap(short)] email: Vec, /// Cache directory #[clap(short, parse(from_os_str))] cache: Option, /// Use Let's Encrypt production environment /// (see https://letsencrypt.org/docs/staging-environment/) #[clap(long)] prod: bool, #[clap(short, long, default_value = "443")] port: u16, } #[macro_rules_attribute::apply(smol_macros::main!)] async fn main() { simple_logger::init_with_level(log::Level::Info).unwrap(); let args = Args::parse(); let tcp_listener = TcpListener::bind((Ipv6Addr::UNSPECIFIED, args.port)).await.unwrap(); let mut tls_incoming = AcmeConfig::new(args.domains) .contact(args.email.iter().map(|e| format!("mailto:{}", e))) .cache_option(args.cache.clone().map(DirCache::new)) .directory_lets_encrypt(args.prod) .incoming(tcp_listener.incoming(), Vec::new()); while let Some(tls) = tls_incoming.next().await { let mut tls = tls.unwrap(); spawn(async move { tls.write_all(HELLO).await.unwrap(); tls.close().await.unwrap(); }) .detach() } unreachable!() } const HELLO: &'static [u8] = br#"HTTP/1.1 200 OK Content-Length: 10 Content-Type: text/plain; charset=utf-8 Hello Tls!"#;