Skip to content
Closed
Show file tree
Hide file tree
Changes from 11 commits
Commits
Show all changes
46 commits
Select commit Hold shift + click to select a range
13e0cfd
update test_https to use local http server
ton-anywhere Feb 9, 2026
e879020
add test_https_with_client
ton-anywhere Feb 9, 2026
182e5fb
WIP: add ClientBuilder for configuring Client instances
ton-anywhere Feb 11, 2026
92ca975
WIP: pass ClientConfig struct to tls layer
ton-anywhere Feb 12, 2026
5af7539
WIP: include feature on ClientConfig import
ton-anywhere Feb 12, 2026
b6650ba
WIP append custom cert
ton-anywhere Feb 12, 2026
bf1735d
WIP: update tests
ton-anywhere Feb 12, 2026
da22cf9
rename TlsConfig cert attribute
ton-anywhere Feb 12, 2026
a01979a
remove comment
ton-anywhere Feb 12, 2026
d89f559
style adjustment
ton-anywhere Feb 12, 2026
04a1c3a
add example
ton-anywhere Feb 12, 2026
7011045
Code review adjustment: Use AsyncConnection::new instead of new_with_…
ton-anywhere Feb 13, 2026
deb5397
WIP: include certificates on TlsConfig struct
ton-anywhere Feb 13, 2026
5a97e80
style adjustment
ton-anywhere Feb 13, 2026
a61b1ec
make rustls_stream mod public temporarily
ton-anywhere Feb 13, 2026
8000c6c
WIP: create Certificates wrapper on rustls_stream mod
ton-anywhere Feb 13, 2026
9b4a839
WIP use custom error when appending a certificate
ton-anywhere Feb 13, 2026
8d7ff6c
WIP remove moved code
ton-anywhere Feb 13, 2026
0538906
WIP remove unused field from TlsConfig
ton-anywhere Feb 13, 2026
5fc031b
add Certificates module
ton-anywhere Feb 13, 2026
9c11211
adjust privacy on structs
ton-anywhere Feb 13, 2026
22c2b2f
add new docs
ton-anywhere Feb 13, 2026
97b5d56
update doc and example
ton-anywhere Feb 13, 2026
4a08c7d
remove comment
ton-anywhere Feb 13, 2026
2cf40aa
Adjust custom_cert example feature
ton-anywhere Feb 16, 2026
937e3ba
fix: correct feature flag for CustomClientConfig import
ton-anywhere Feb 16, 2026
e682f92
List adjustments
ton-anywhere Feb 16, 2026
fd47ea1
fix Cargo fmt adjustments
ton-anywhere Feb 16, 2026
728ceb4
Rename `certificate` to `cert_der`
ton-anywhere Feb 16, 2026
c9d941d
take ownership of cert_der on append_certificate
ton-anywhere Feb 16, 2026
0f67697
rename parameter cert_der on Doc for with_root_certificate
ton-anywhere Feb 16, 2026
65e7c41
Reuse existing TLSConfig if possible - allows for multiple certificat…
ton-anywhere Feb 16, 2026
ecf4d12
Update TlsConfig::new and ClientBuilder::with_root_certificate to ret…
ton-anywhere Feb 17, 2026
c11c920
Update custom_cert example with new return from with_root_certificate…
ton-anywhere Feb 18, 2026
cc84c5c
Fix test flags
ton-anywhere Feb 19, 2026
abf89cf
warnings fix
ton-anywhere Feb 19, 2026
e8f47b6
fix: unresolved import - Refactor client mod to allow cleaner conditi…
ton-anywhere Feb 19, 2026
97124a9
Gate tls modules declarations
ton-anywhere Feb 19, 2026
8382cc1
Fix doctest
ton-anywhere Feb 19, 2026
05f8e5d
remove connector caching with client_config - always create new conne…
ton-anywhere Feb 21, 2026
2ef687e
Improve code organization: Move Client and ClientImpl declarations be…
ton-anywhere Feb 22, 2026
bfe2763
wrap ClientConfig with Arc smart pointer to reduce memory usage
ton-anywhere Feb 22, 2026
b2fe156
Merge branch 'master' into bitreq-client-builder
ton-anywhere Feb 22, 2026
f3851fb
use Arc clone instead of option clone
ton-anywhere Feb 22, 2026
6ac03d7
Wrap Certificates with arc and inject from Client - load root_certs o…
ton-anywhere Feb 23, 2026
bf3a952
bump default Client default connection pool(capacity) to 10
ton-anywhere Feb 23, 2026
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
25 changes: 25 additions & 0 deletions bitreq/examples/custom_cert.rs
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
//! This example demonstrates the client builder with custom DER certificate.
// to run cargo run --example custom_cert --features async

#[cfg(feature = "async")]
fn main() -> Result<(), bitreq::Error> {
let runtime = tokio::runtime::Builder::new_current_thread()
.enable_io()
.build()
.expect("failed to build Tokio runtime");

runtime.block_on(request_with_client())
}

async fn request_with_client() -> Result<(), bitreq::Error> {
let url = "http://example.com";
let cert_der = include_bytes!("../tests/test_cert.der");
let client = bitreq::Client::builder().with_root_certificate(cert_der.as_slice()).build();

let response = client.send_async(bitreq::get(url)).await.unwrap();

println!("Status: {}", response.status_code);
println!("Body: {}", response.as_str()?);

Ok(())
}
62 changes: 61 additions & 1 deletion bitreq/src/client.rs
Original file line number Diff line number Diff line change
Expand Up @@ -39,6 +39,50 @@ struct ClientImpl<T> {
connections: HashMap<ConnectionKey, Arc<T>>,
lru_order: VecDeque<ConnectionKey>,
capacity: usize,
client_config: Option<ClientConfig>,
}

pub struct ClientBuilder {
capacity: usize,
client_config: Option<ClientConfig>,
}

#[derive(Clone)]
pub struct ClientConfig {
pub tls: Option<TlsConfig>,
}

#[derive(Clone)]
pub struct TlsConfig {
pub custom_certificate: Vec<u8>, // DER-encoded cert
}

impl ClientBuilder {
pub fn new() -> Self {
Self { capacity: 1, client_config: None }
}

pub fn with_root_certificate<T: Into<Vec<u8>>>(mut self, certificate: T) -> Self {
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Its pretty awkward that we don't error here but then just ignore certs silently. IMO we kinda need to actually make this fallible, store a root cert store in ClientConfig, and pass that around instead. We'll have to have an abstract root cert store in rustls_stream (or somewhere), but that should be pretty straightforward.

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@TheBlueMatt makes sense. Will work on that tomorrow! Thanks

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@TheBlueMatt updated the PR with your suggestion. I moved the new certificates logic to a new module. We still have lots of stuff in the rustls_stream module, but I thought refactoring that would make this PR too large.

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This still looks like its currently infallible and not parsing the cert? We should validate the cert here.

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hi @TheBlueMatt. Currently the method is fallible, it panics on expect() if certificate appending fails. However, I intentionally kept the return type as Self (not Result<Self, Error>) to maintain fluent builder chaining without requiring callers to handle Result at every step. Would you prefer that I return Result<Self, Error> here?

About parsing, I don't know if I understand you're question well, I'm sorry. But we're currently parsing it on the new Certificates module. I tried to keep this Client interface simple and more details about certificate management inside this module.

https://github.com/rust-bitcoin/corepc/pull/502/changes#diff-4501e006f554583aacf6f0039d2c12e149a90447ec1af22f3c68d74820932c5fR28

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ah, panicing isn't really "fallible" in Rust lingo :). Yes, we should return a Result.

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Updated the return type @TheBlueMatt. Let me know about the cert parsing you've mentioned.
With the updated code we're receiving encoding errors as well.

Print from a test I've run with an invalid certificate
image

let tls_config = TlsConfig { custom_certificate: certificate.into() };
self.client_config = Some(ClientConfig { tls: Some(tls_config) });
Comment thread
ton-anywhere marked this conversation as resolved.
Outdated
self
}

pub fn with_capacity(mut self, capacity: usize) -> Self {
self.capacity = capacity;
self
}

pub fn build(self) -> Client {
Client {
r#async: Arc::new(Mutex::new(ClientImpl {
connections: HashMap::new(),
lru_order: VecDeque::new(),
capacity: self.capacity,
client_config: self.client_config,
})),
}
}
}

impl Client {
Expand All @@ -54,10 +98,16 @@ impl Client {
connections: HashMap::new(),
lru_order: VecDeque::new(),
capacity,
client_config: None,
})),
}
}

/// Create a builder for a client
pub fn builder() -> ClientBuilder {
ClientBuilder::new()
}

/// Sends a request asynchronously using a cached connection if available.
pub async fn send_async(&self, request: Request) -> Result<Response, Error> {
let parsed_request = ParsedRequest::new(request)?;
Expand All @@ -77,7 +127,17 @@ impl Client {
let conn = if let Some(conn) = conn_opt {
conn
} else {
let connection = AsyncConnection::new(key, parsed_request.timeout_at).await?;
let client_config = {
let state = self.r#async.lock().unwrap();
state.client_config.clone()
};

let connection = if let Some(client_config) = client_config {
AsyncConnection::new_with_configs(key, parsed_request.timeout_at, client_config)
.await?
} else {
AsyncConnection::new(key, parsed_request.timeout_at).await?
};
let connection = Arc::new(connection);

let mut state = self.r#async.lock().unwrap();
Expand Down
38 changes: 38 additions & 0 deletions bitreq/src/connection.rs
Original file line number Diff line number Diff line change
Expand Up @@ -25,6 +25,8 @@ use tokio::sync::Mutex as AsyncMutex;
use crate::request::{ConnectionParams, OwnedConnectionParams, ParsedRequest};
#[cfg(feature = "async")]
use crate::Response;
#[cfg(feature = "async")]
use crate::client::ClientConfig;
use crate::{Error, Method, ResponseLazy};

type UnsecuredStream = TcpStream;
Expand Down Expand Up @@ -298,6 +300,42 @@ impl AsyncConnection {
}))))
}

pub(crate) async fn new_with_configs(
Comment thread
ton-anywhere marked this conversation as resolved.
Outdated
params: ConnectionParams<'_>,
timeout_at: Option<Instant>,
client_config: ClientConfig,
) -> Result<AsyncConnection, Error> {
let future = async move {
let socket = Self::connect(params).await?;

if params.https {
#[cfg(not(feature = "tokio-rustls"))]
return Err(Error::HttpsFeatureNotEnabled);
#[cfg(feature = "tokio-rustls")]
rustls_stream::wrap_async_stream_with_configs(socket, params.host, client_config).await
} else {
Ok(AsyncHttpStream::Unsecured(socket))
}
};
let stream = if let Some(timeout_at) = timeout_at {
tokio::time::timeout_at(timeout_at.into(), future)
.await
.unwrap_or(Err(Error::IoError(timeout_err())))?
} else {
future.await?
};
let (read, write) = tokio::io::split(stream);

Ok(AsyncConnection(Mutex::new(Arc::new(AsyncConnectionState {
read: AsyncMutex::new(read),
write: AsyncMutex::new(write),
next_request_id: AtomicUsize::new(0),
readable_request_id: AtomicUsize::new(0),
min_dropped_reader_id: AtomicUsize::new(usize::MAX),
socket_new_requests_timeout: Mutex::new(Instant::now() + Duration::from_secs(60)),
}))))
}

async fn tcp_connect(host: &str, port: u16) -> Result<AsyncTcpStream, Error> {
#[cfg(feature = "log")]
log::trace!("Looking up host {host}");
Expand Down
75 changes: 75 additions & 0 deletions bitreq/src/connection/rustls_stream.rs
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,8 @@ use std::io;
use std::net::TcpStream;
use std::sync::OnceLock;

#[cfg(feature = "rustls")]
use crate::client::ClientConfig as CustomClientConfig;
#[cfg(all(feature = "native-tls", not(feature = "rustls")))]
use native_tls::{HandshakeError, TlsConnector, TlsStream};
#[cfg(feature = "rustls")]
Expand Down Expand Up @@ -63,6 +65,52 @@ fn build_client_config() -> Arc<ClientConfig> {
Arc::new(config)
}

#[cfg(feature = "rustls")]
fn build_root_certificates() -> RootCertStore {
Comment thread
ton-anywhere marked this conversation as resolved.
Outdated
let mut root_certificates = RootCertStore::empty();

// Try to load native certs
#[cfg(feature = "https-rustls-probe")]
if let Ok(os_roots) = rustls_native_certs::load_native_certs() {
for root_cert in os_roots {
// Ignore erroneous OS certificates, there's nothing
// to do differently in that situation anyways.
let _ = root_certificates.add(&rustls::Certificate(root_cert.0));
}
}

#[cfg(feature = "rustls-webpki")]
{
#[allow(deprecated)] // Need to use add_server_trust_anchors to compile with rustls 0.21.1
root_certificates.add_server_trust_anchors(TLS_SERVER_ROOTS.iter().map(|ta| {
rustls::OwnedTrustAnchor::from_subject_spki_name_constraints(
ta.subject,
ta.spki,
ta.name_constraints,
)
}));
}
root_certificates
}

#[cfg(feature = "rustls")]
fn append_certificate(mut certificates: RootCertStore, certificate: Vec<u8>) -> RootCertStore {
match certificates.add(&rustls::Certificate(certificate)) {
Ok(_) => println!("Certificate added successfully"),
Err(e) => println!("Failed to add certificate: {:?}", e),
}
certificates
}

#[cfg(feature = "rustls")]
fn build_rustls_client_config(certificates: RootCertStore) -> Arc<ClientConfig> {
let config = ClientConfig::builder()
.with_safe_defaults()
.with_root_certificates(certificates)
.with_no_client_auth();
Arc::new(config)
}

#[cfg(feature = "rustls")]
pub(super) fn wrap_stream(tcp: TcpStream, host: &str) -> Result<SecuredStream, Error> {
#[cfg(feature = "log")]
Expand Down Expand Up @@ -106,6 +154,33 @@ pub(super) async fn wrap_async_stream(
Ok(AsyncHttpStream::Secured(Box::new(tls)))
}

#[cfg(all(feature = "rustls", feature = "tokio-rustls"))]
pub(super) async fn wrap_async_stream_with_configs(
Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

same as wrap_async_stream but with additional parameter custom_client_config

tcp: AsyncTcpStream,
host: &str,
custom_client_config: CustomClientConfig,
) -> Result<AsyncHttpStream, Error> {
#[cfg(feature = "log")]
log::trace!("Setting up TLS parameters for {host}.");
let dns_name = match ServerName::try_from(host) {
Ok(result) => result,
Err(err) => return Err(Error::IoError(io::Error::new(io::ErrorKind::Other, err))),
};

let certificates = build_root_certificates();
let custom_certificate = custom_client_config.tls.unwrap().custom_certificate;
let certificates = append_certificate(certificates, custom_certificate);
let client_config = build_rustls_client_config(certificates);
let connector = TlsConnector::from(CONFIG.get_or_init(|| client_config).clone());

#[cfg(feature = "log")]
log::trace!("Establishing TLS session to {host}.");

let tls = connector.connect(dns_name, tcp).await.map_err(Error::IoError)?;

Ok(AsyncHttpStream::Secured(Box::new(tls)))
}

#[cfg(all(feature = "native-tls", not(feature = "rustls")))]
pub type SecuredStream = TlsStream<TcpStream>;

Expand Down
31 changes: 31 additions & 0 deletions bitreq/tests/main.rs
Original file line number Diff line number Diff line change
Expand Up @@ -16,6 +16,37 @@ async fn test_https() {
assert_eq!(get_status_code(bitreq::get("https://example.com")).await, 200);
}

#[tokio::test]
#[cfg(feature = "rustls")]
async fn test_https_with_client() {
setup();
let client = bitreq::Client::new(1);
let response = client.send_async(bitreq::get("https://example.com")).await.unwrap();
assert_eq!(response.status_code, 200);
}

#[tokio::test]
#[cfg(feature = "rustls")]
async fn test_https_with_client_builder() {
setup();
let client = bitreq::Client::builder()
.build();
let response = client.send_async(bitreq::get("https://example.com")).await.unwrap();
assert_eq!(response.status_code, 200);
}

#[tokio::test]
#[cfg(feature = "rustls")]
async fn test_https_with_client_builder_and_cert() {
setup();
let cert_der = include_bytes!("test_cert.der");
let client = bitreq::Client::builder()
.with_root_certificate(cert_der.as_slice())
Comment thread
ton-anywhere marked this conversation as resolved.
Outdated
.build();
let response = client.send_async(bitreq::get("https://example.com")).await.unwrap();
assert_eq!(response.status_code, 200);
}

#[tokio::test]
#[cfg(feature = "json-using-serde")]
async fn test_json_using_serde() {
Expand Down
Binary file added bitreq/tests/test_cert.der
Binary file not shown.
Loading