feat: v0.2.0-rc

This commit is contained in:
2024-03-30 17:44:36 +08:00
parent 159203bd5d
commit bb0b526c68
4 changed files with 17 additions and 6 deletions

4
.gitignore vendored
View File

@@ -1,5 +1,5 @@
intermediate_cert.pem cert.pem
intermediate_cert.key cert.key
.idea/ .idea/
# ---> Rust # ---> Rust
# Generated by Cargo # Generated by Cargo

View File

@@ -9,8 +9,8 @@
"port": 443, "port": 443,
"lookup_dns": true, "lookup_dns": true,
"tls": { "tls": {
"issuer_cert": "intermediate_cert.pem", "issuer_cert": "cert.pem",
"issuer_key": "intermediate_cert.key" "issuer_key": "cert.key"
}, },
"proxy_map": { "proxy_map": {
"hatter.ink": { "hatter.ink": {

View File

@@ -1,3 +1,5 @@
use std::fs;
use rcgen::{BasicConstraints, Certificate, CertificateParams, DistinguishedName, DnType, IsCa, KeyPair, PKCS_ECDSA_P256_SHA256}; use rcgen::{BasicConstraints, Certificate, CertificateParams, DistinguishedName, DnType, IsCa, KeyPair, PKCS_ECDSA_P256_SHA256};
fn main() { fn main() {
@@ -15,4 +17,13 @@ fn main() {
let certificate_pem = certificate.serialize_pem_with_signer(&certificate).expect("Sign cert failed"); let certificate_pem = certificate.serialize_pem_with_signer(&certificate).expect("Sign cert failed");
println!("CERTIFICATE:\n{}", certificate_pem); println!("CERTIFICATE:\n{}", certificate_pem);
println!("KEY:\n{}", key_pem); println!("KEY:\n{}", key_pem);
if fs::metadata("cert.pem").is_ok() || fs::metadata("cert.key").is_ok() {
println!("[ERROR] cert.pem or cert.key exists!");
return;
}
fs::write("cert.pem", certificate_pem).expect("Write cert.pem failed");
println!("Write cert.pem succeed");
fs::write("cert.key", key_pem).expect("Write cert.key failed");
println!("Write cert.key succeed");
} }

View File

@@ -4,8 +4,8 @@
"port": 443, "port": 443,
"lookup_dns": true, "lookup_dns": true,
"tls": { "tls": {
"issuer_cert": "intermediate_cert.pem", "issuer_cert": "cert.pem",
"issuer_key": "intermediate_cert.key" "issuer_key": "cert.key"
}, },
"proxy_map": { "proxy_map": {
"hatter.ink": { "hatter.ink": {