//! Main binary entry point for vault_api implementation. #![allow(missing_docs)] // Imports required by this file. // extern crate ; extern crate vault_api; extern crate swagger; extern crate iron; extern crate hyper_openssl; extern crate clap; // Imports required by server library. // extern crate vault_api; // extern crate swagger; extern crate futures; extern crate chrono; #[macro_use] extern crate error_chain; use hyper_openssl::OpensslServer; use hyper_openssl::openssl::x509::X509_FILETYPE_PEM; use hyper_openssl::openssl::ssl::{SslAcceptorBuilder, SslMethod}; use hyper_openssl::openssl::error::ErrorStack; use clap::{App, Arg}; use iron::{Iron, Chain}; use swagger::auth::AllowAllMiddleware; mod server_lib; /// Builds an SSL implementation for Simple HTTPS from some hard-coded file names fn ssl() -> Result { let mut ssl = SslAcceptorBuilder::mozilla_intermediate_raw(SslMethod::tls())?; // Server authentication ssl.builder_mut().set_private_key_file("examples/server-key.pem", X509_FILETYPE_PEM)?; ssl.builder_mut().set_certificate_chain_file("examples/server-chain.pem")?; ssl.builder_mut().check_private_key()?; Ok(OpensslServer::from(ssl.build())) } /// Create custom server, wire it to the autogenerated router, /// and pass it to the web server. fn main() { let matches = App::new("server") .arg(Arg::with_name("https") .long("https") .help("Whether to use HTTPS or not")) .get_matches(); let server = server_lib::server().unwrap(); let router = vault_api::router(server); let mut chain = Chain::new(router); chain.link_before(vault_api::server::ExtractAuthData); // add authentication middlewares into the chain here // for the purpose of this example, pretend we have authenticated a user chain.link_before(AllowAllMiddleware::new("cosmo")); if matches.is_present("https") { // Using Simple HTTPS Iron::new(chain).https("localhost:8080", ssl().expect("Failed to load SSL keys")).expect("Failed to start HTTPS server"); } else { // Using HTTP Iron::new(chain).http("localhost:8080").expect("Failed to start HTTP server"); } }