diff --git a/src/libdoh/Cargo.toml b/src/libdoh/Cargo.toml index cd04489..83daff6 100644 --- a/src/libdoh/Cargo.toml +++ b/src/libdoh/Cargo.toml @@ -15,16 +15,16 @@ default = ["tls"] tls = ["tokio-rustls"] [dependencies] -anyhow = "1.0.65" +anyhow = "1.0.68" arc-swap = "1.5.1" -base64 = "0.13.0" +base64 = "0.20.0" byteorder = "1.4.3" -bytes = "1.2.1" -futures = "0.3.24" -hyper = { version = "0.14.20", default-features = false, features = ["server", "http1", "http2", "stream"] } +bytes = "1.3.0" +futures = "0.3.25" +hyper = { version = "0.14.23", default-features = false, features = ["server", "http1", "http2", "stream"] } odoh-rs = "1.0.0" rand = "0.8.5" -tokio = { version = "1.21.2", features = ["net", "rt-multi-thread", "time", "sync"] } +tokio = { version = "1.23.0", features = ["net", "rt-multi-thread", "time", "sync"] } tokio-rustls = { version = "0.23.4", features = ["early-data"], optional = true } rustls-pemfile = "1.0.1" diff --git a/src/libdoh/src/errors.rs b/src/libdoh/src/errors.rs index aa7b9f0..24ae819 100644 --- a/src/libdoh/src/errors.rs +++ b/src/libdoh/src/errors.rs @@ -27,9 +27,9 @@ impl std::fmt::Display for DoHError { DoHError::UpstreamIssue => write!(fmt, "Upstream error"), DoHError::UpstreamTimeout => write!(fmt, "Upstream timeout"), DoHError::StaleKey => write!(fmt, "Stale key material"), - DoHError::Hyper(e) => write!(fmt, "HTTP error: {}", e), - DoHError::Io(e) => write!(fmt, "IO error: {}", e), - DoHError::ODoHConfigError(e) => write!(fmt, "ODoH config error: {}", e), + DoHError::Hyper(e) => write!(fmt, "HTTP error: {e}"), + DoHError::Io(e) => write!(fmt, "IO error: {e}"), + DoHError::ODoHConfigError(e) => write!(fmt, "ODoH config error: {e}"), DoHError::TooManyTcpSessions => write!(fmt, "Too many TCP sessions"), } } diff --git a/src/libdoh/src/lib.rs b/src/libdoh/src/lib.rs index 3659560..3022a7b 100644 --- a/src/libdoh/src/lib.rs +++ b/src/libdoh/src/lib.rs @@ -29,6 +29,12 @@ pub mod reexports { pub use tokio; } +const BASE64_URL_SAFE_NO_PAD: base64::engine::fast_portable::FastPortable = + base64::engine::fast_portable::FastPortable::from( + &base64::alphabet::URL_SAFE, + base64::engine::fast_portable::NO_PAD, + ); + #[derive(Clone, Debug)] struct DnsResponse { packet: Vec, @@ -162,7 +168,7 @@ impl DoH { } } let query = match question_str.and_then(|question_str| { - base64::decode_config(question_str, base64::URL_SAFE_NO_PAD).ok() + base64::decode_engine(question_str, &BASE64_URL_SAFE_NO_PAD).ok() }) { Some(query) => query, _ => return None, @@ -427,8 +433,7 @@ impl DoH { .header( hyper::header::CACHE_CONTROL, format!( - "max-age={}, stale-if-error={}, stale-while-revalidate={}", - ttl, STALE_IF_ERROR_SECS, STALE_WHILE_REVALIDATE_SECS + "max-age={ttl}, stale-if-error={STALE_IF_ERROR_SECS}, stale-while-revalidate={STALE_WHILE_REVALIDATE_SECS}" ) .as_str(), ); @@ -495,9 +500,9 @@ impl DoH { self.globals.tls_cert_path.is_some() && self.globals.tls_cert_key_path.is_some(); } if tls_enabled { - println!("Listening on https://{}{}", listen_address, path); + println!("Listening on https://{listen_address}{path}"); } else { - println!("Listening on http://{}{}", listen_address, path); + println!("Listening on http://{listen_address}{path}"); } let mut server = Http::new(); diff --git a/src/libdoh/src/odoh.rs b/src/libdoh/src/odoh.rs index 072d89c..00bb95f 100644 --- a/src/libdoh/src/odoh.rs +++ b/src/libdoh/src/odoh.rs @@ -115,7 +115,7 @@ impl ODoHRotator { Ok(key) => { current_key.store(Arc::new(key)); } - Err(e) => eprintln!("ODoH key rotation error: {}", e), + Err(e) => eprintln!("ODoH key rotation error: {e}"), }; } }); diff --git a/src/libdoh/src/tls.rs b/src/libdoh/src/tls.rs index 4c1dae0..ccc4585 100644 --- a/src/libdoh/src/tls.rs +++ b/src/libdoh/src/tls.rs @@ -30,8 +30,7 @@ where io::Error::new( e.kind(), format!( - "Unable to load the certificates [{}]: {}", - certs_path_str, e + "Unable to load the certificates [{certs_path_str}]: {e}" ), ) })?); @@ -54,8 +53,7 @@ where io::Error::new( e.kind(), format!( - "Unable to load the certificate keys [{}]: {}", - certs_keys_path_str, e + "Unable to load the certificate keys [{certs_keys_path_str}]: {e}" ), ) })? @@ -163,7 +161,7 @@ impl DoH { break; } } - Err(e) => eprintln!("TLS certificates error: {}", e), + Err(e) => eprintln!("TLS certificates error: {e}"), } tokio::time::sleep(Duration::from_secs(CERTS_WATCH_DELAY_SECS.into())).await; }