Go to file
Stjepan Glavina de27769b98 wip 2020-04-24 12:38:17 +02:00
examples More comments 2020-04-21 22:38:46 +02:00
src wip 2020-04-24 12:38:17 +02:00
.gitignore Lots of changes 2020-04-21 17:51:24 +02:00
Cargo.toml WIP note 2020-04-21 20:38:50 +02:00
LICENSE-APACHE Add readme and licenses 2020-02-04 11:32:22 +01:00
LICENSE-MIT Add readme and licenses 2020-02-04 11:32:22 +01:00
README.md More comments and docs 2020-04-22 16:01:48 +02:00
certificate.pem Add certificate 2020-03-29 17:59:43 +02:00
identity.pfx Add certificate 2020-03-29 17:59:43 +02:00

README.md

smol

Build Status License Cargo Documentation chat

NOTE: Still a work in progress.

A small and fast async runtime for Rust.

This runtime extends the standard library with async combinators and is only 1500 lines of code.

Reading the docs or looking at the examples is a good way of starting to learn async Rust.

Async I/O is implemented using epoll on Linux/Android, kqueue on macOS/iOS/BSD, and wepoll on Windows.

Features

  • Async TCP, UDP, Unix domain sockets, and custom file descriptors.
  • Thread-local executor for !Send futures.
  • Work-stealing executor that adapts to uneven workloads.
  • Blocking executor for files, processes, and standard I/O.
  • Tasks that support cancelation.
  • Userspace timers.

Compatibility

This runtime is compatible with async-std and tokio.

There is an optional feature for seamless integration with crates depending on tokio. It creates a global tokio runtime and sets up its context inside smol. Enable the feature as follows:

[dependencies]
smol = { version = "1", features = ["tokio"] }

Documentation

You can read the docs here, or generate them on your own.

If you'd like to explore the implementation in more depth, the following command generates docs for the whole crate, including private modules:

cargo doc --document-private-items --no-deps --open

Other crates

My personal crate recommendation list:

TLS certificate

Some code examples are using TLS for authentication.

To access HTTPS servers from your browser, you'll first need to import the certificate from this repository (Chrome/Firefox):

  1. Open browser settings and go to the certificate Authorities list.
  2. Click Import and select certificate.pem.
  3. Enable Trust this CA to identify websites and click OK.
  4. Restart the browser (yes, you have to!) and go to https://127.0.0.1:8001

The certificate file was generated using minica and openssl:

minica --domains localhost -ip-addresses 127.0.0.1 -ca-cert certificate.pem
openssl pkcs12 -export -out identity.pfx -inkey localhost/key.pem -in localhost/cert.pem

License

Licensed under either of

at your option.

Contribution

Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in the work by you, as defined in the Apache-2.0 license, shall be dual licensed as above, without any additional terms or conditions.