Web push notification sender.
Any async executor for use with client.
The aesgcm
variant of ContentEncoding
has been removed. Aes128Gcm support was added in v0.8, so all uses
of ContentEncoding::aesgcm
can simply be changed to ContentEncoding::Aes128Gcm
with no change to functionality.
This will add support for Edge in the process.
WebPushClient::new()
now returns a Result
, as the default client now has a fallible constructor. Please handle
this error in the case of resource starvation.
All GCM/FCM support has been removed. If you relied on this functionality, consider the fcm crate. If you just require web push, you will need to use VAPID to send payloads. See below for info.
To send a web push from command line, first subscribe to receive push notifications with your browser and store the subscription info into a json file. It should have the following content:
json
{
"endpoint": "https://updates.push.services.mozilla.com/wpush/v1/TOKEN",
"keys": {
"auth": "####secret####",
"p256dh": "####public_key####"
}
}
Google has good instructions for building a frontend to receive notifications.
Store the subscription info to examples/test.json
and send a notification with
cargo run --example simple_send -- -f examples/test.json -p "It works!"
.
```rust use webpush::*; use base64::URLSAFE; use std::fs::File;
async fn main() -> Result<(), Box
//You would likely get this by deserializing a browser `pushSubscription` object.
let subscription_info = SubscriptionInfo::new(
endpoint,
p256dh,
auth
);
//Read signing material for payload.
let file = File::open("private.pem").unwrap();
let mut sig_builder = VapidSignatureBuilder::from_pem(file, &subscription_info)?.build()?;
//Now add payload and encrypt.
let mut builder = WebPushMessageBuilder::new(&subscription_info)?;
let content = "Encrypted payload to be sent in the notification".as_bytes();
builder.set_payload(ContentEncoding::Aes128Gcm, content);
builder.set_vapid_signature(sig_builder);
let client = WebPushClient::new()?;
//Finally, send the notification!
client.send(builder.build()?).await?;
Ok(())
} ```
VAPID authentication prevents unknown sources sending notifications to the client and is required by all current browsers when sending a payload.
The private key to be used by the server can be generated with OpenSSL:
openssl ecparam -genkey -name prime256v1 -out private_key.pem
To derive a public key from the just-generated private key, to be used in the JavaScript client:
openssl ec -in private_key.pem -pubout -outform DER|tail -c 65|base64|tr '/+' '_-'|tr -d '\n'
The signature is created with VapidSignatureBuilder
. It automatically adds the required claims aud
and exp
. Adding
these claims to the builder manually will override the default values.
Currently, implements
RFC8188 content encryption for notification payloads. This is done by
delegating encryption to mozilla's ece crate. Our security is thus tied
to theirs. The default client is built
on isahc, but can be swapped out with a hyper based client using the
hyper-client
feature. Custom clients can be made using the request_builder
module.
Library tested with Google's and Mozilla's push notification services. Also verified to work on Edge.
If you get an error or the push notification doesn't work you can try to debug using the following instructions:
Add the following to your Cargo.toml:
cargo
log = "0.4"
pretty_env_logger = "0.3"
Add the following to your main.rs:
```rust extern crate prettyenvlogger;
// ... fn main() { prettyenvlogger::init(); // ... } ```
Or use any other logging library compatible with https://docs.rs/log/
Then run your program with the following environment variables:
bash
RUST_LOG="web_push::client=trace" cargo run
This should print some more information about the requests to the push service which may aid you or somebody else in finding the error.