tokio-websockets
High performance, strict, tokio-util based websockets implementation.
Why use tokio-websockets?
- Built with tokio-util, intended to be used with tokio from the ground up
- Minimal dependencies: The base only requires:
- tokio, tokio-util, bytes, futures-core, futures-sink
- SHA1 backend, e.g. sha1_smol (see Feature flags)
- Big selection of features to tailor dependencies to any project (see Feature flags)
- SIMD support: AVX2, SSE2 or NEON for frame (un)masking and accelerated UTF-8 validation
- Strict conformance with the websocket specification, passes the Autobahn test suite without relaxations by default
- TLS support
- Reusable TLS connectors
- Uses widely known crates from the ecosystem for types, for example
Uri
fromhttp
in the client - Cheaply clonable messages due to
Bytes
as payload storage - Tuned for performance: no unnecessary duplicate UTF-8 validation, no duplicate bounds checking (this however heavily uses unsafe code, which is sound to my knowledge, if not, open an issue!)
Feature flags
Feature flags in tokio-websockets are added to allow tailoring it to your needs.
simd
will enable AVX2, SSE2 or NEON accelerated masking and UTF-8 validation. Additionally enabling thenightly
feature when using a nightly compiler will also enable AVX512 accelerated maskingclient
enables a tiny client implementationserver
enables a tiny server implementationhttp-integration
enables a method for websocket upgradehttp::Request
generation
TLS support is supported via any of the following feature flags:
native-tls
for atokio-native-tls
backed implementationrustls-webpki-roots
for atokio-rustls
backed implementation withwebpki-roots
rustls-native-roots
for atokio-rustls
backed implementation withrustls-native-certs
One SHA1 implementation is required, usually provided by the TLS implementation:
ring
is used ifrustls
is the TLS library- The
openssl
feature will useopenssl
, usually preferred on most Linux/BSD systems withnative-tls
- The
sha1_smol
feature can be used as a fallback if no TLS is needed
The client
feature requires enabling one random number generator:
fastrand
can be used as aPRNG
getrandom
can be used as a cryptographically secure RNGrand
can be used as an alternative tofastrand
and should be preferred if it is already in the dependency tree
Example
This is a simple websocket echo server without any proper error handling.
More examples can be found in the examples folder.
use futures_util::{SinkExt, StreamExt};
use http::Uri;
use tokio::net::TcpListener;
use tokio_websockets::{ClientBuilder, Error, Message, ServerBuilder};
#[tokio::main]
async fn main() -> Result<(), Error> {
let listener = TcpListener::bind("127.0.0.1:3000").await?;
tokio::spawn(async move {
while let Ok((stream, _)) = listener.accept().await {
let mut ws_stream = ServerBuilder::new()
.accept(stream)
.await?;
tokio::spawn(async move {
// Just an echo server, really
while let Some(Ok(msg)) = ws_stream.next().await {
if msg.is_text() || msg.is_binary() {
ws_stream.send(msg).await?;
}
}
Ok::<_, Error>(())
});
}
Ok::<_, Error>(())
});
let uri = Uri::from_static("ws://127.0.0.1:3000");
let (mut client, _) = ClientBuilder::from_uri(uri).connect().await?;
client.send(Message::text(String::from("Hello world!"))).await?;
while let Some(Ok(msg)) = client.next().await {
if let Some(text) = msg.as_text() {
assert_eq!(text, "Hello world!");
// We got one message, just stop now
client.close().await?;
}
}
Ok(())
}
MSRV
The current MSRV for all feature combinations is Rust 1.64.
Caveats / Limitations / ToDo
Websocket compression is currently unsupported.