use std::{net::SocketAddr, sync::Arc}; use axum::Router; use axum_server::Handle; use axum_server_dual_protocol::{ServerExt, axum_server::tls_rustls::RustlsConfig}; use tokio::task::JoinSet; use tuwunel_core::{Result, Server, debug, err, info, warn}; pub(super) async fn serve( server: &Arc, app: &Router, handle: &Handle, join_set: &mut JoinSet>, addrs: &[SocketAddr], ) -> Result { let tls = &server.config.tls; let certs = tls.certs.as_ref().unwrap(); let key = tls.key.as_ref().unwrap(); info!( "Note: It is strongly recommended that you use a reverse proxy instead of running \ tuwunel directly with TLS." ); debug!("Using direct TLS. Certificate path {certs} and certificate private key path {key}",); let conf = RustlsConfig::from_pem_file(certs, key) .await .map_err(|e| err!(Config("tls", "Failed to load certificates or key: {e}")))?; let app = app .clone() .into_make_service_with_connect_info::(); if tls.dual_protocol { for addr in addrs { join_set.spawn_on( axum_server_dual_protocol::bind_dual_protocol(*addr, conf.clone()) .set_upgrade(false) .handle(handle.clone()) .serve(app.clone()), server.runtime(), ); } warn!( "Listening on {addrs:?} with TLS certificate {certs} and supporting plain text \ (HTTP) connections too (insecure!)", ); } else { for addr in addrs { join_set.spawn_on( axum_server::bind_rustls(*addr, conf.clone()) .handle(handle.clone()) .serve(app.clone()), server.runtime(), ); } info!("Listening on {addrs:?} with TLS certificate {certs}"); } Ok(()) }