summaryrefslogtreecommitdiffstats
path: root/vendor/tokio-native-tls/tests/bad.rs
diff options
context:
space:
mode:
Diffstat (limited to 'vendor/tokio-native-tls/tests/bad.rs')
-rw-r--r--vendor/tokio-native-tls/tests/bad.rs122
1 files changed, 122 insertions, 0 deletions
diff --git a/vendor/tokio-native-tls/tests/bad.rs b/vendor/tokio-native-tls/tests/bad.rs
new file mode 100644
index 000000000..862d99845
--- /dev/null
+++ b/vendor/tokio-native-tls/tests/bad.rs
@@ -0,0 +1,122 @@
+#![warn(rust_2018_idioms)]
+
+use cfg_if::cfg_if;
+use native_tls::TlsConnector;
+use std::io::{self, Error};
+use std::net::ToSocketAddrs;
+use tokio::net::TcpStream;
+
+macro_rules! t {
+ ($e:expr) => {
+ match $e {
+ Ok(e) => e,
+ Err(e) => panic!("{} failed with {:?}", stringify!($e), e),
+ }
+ };
+}
+
+cfg_if! {
+ if #[cfg(feature = "force-rustls")] {
+ fn verify_failed(err: &Error, s: &str) {
+ let err = err.to_string();
+ assert!(err.contains(s), "bad error: {}", err);
+ }
+
+ fn assert_expired_error(err: &Error) {
+ verify_failed(err, "CertExpired");
+ }
+
+ fn assert_wrong_host(err: &Error) {
+ verify_failed(err, "CertNotValidForName");
+ }
+
+ fn assert_self_signed(err: &Error) {
+ verify_failed(err, "UnknownIssuer");
+ }
+
+ fn assert_untrusted_root(err: &Error) {
+ verify_failed(err, "UnknownIssuer");
+ }
+ } else if #[cfg(any(feature = "force-openssl",
+ all(not(target_os = "macos"),
+ not(target_os = "windows"),
+ not(target_os = "ios"))))] {
+ fn verify_failed(err: &Error) {
+ assert!(format!("{}", err).contains("certificate verify failed"))
+ }
+
+ use verify_failed as assert_expired_error;
+ use verify_failed as assert_wrong_host;
+ use verify_failed as assert_self_signed;
+ use verify_failed as assert_untrusted_root;
+ } else if #[cfg(any(target_os = "macos", target_os = "ios"))] {
+
+ fn assert_invalid_cert_chain(err: &Error) {
+ assert!(format!("{}", err).contains("was not trusted."))
+ }
+
+ use crate::assert_invalid_cert_chain as assert_expired_error;
+ use crate::assert_invalid_cert_chain as assert_wrong_host;
+ use crate::assert_invalid_cert_chain as assert_self_signed;
+ use crate::assert_invalid_cert_chain as assert_untrusted_root;
+ } else {
+ fn assert_expired_error(err: &Error) {
+ let s = err.to_string();
+ assert!(s.contains("system clock"), "error = {:?}", s);
+ }
+
+ fn assert_wrong_host(err: &Error) {
+ let s = err.to_string();
+ assert!(s.contains("CN name"), "error = {:?}", s);
+ }
+
+ fn assert_self_signed(err: &Error) {
+ let s = err.to_string();
+ assert!(s.contains("root certificate which is not trusted"), "error = {:?}", s);
+ }
+
+ use assert_self_signed as assert_untrusted_root;
+ }
+}
+
+async fn get_host(host: &'static str) -> Error {
+ drop(env_logger::try_init());
+
+ let addr = format!("{}:443", host);
+ let addr = t!(addr.to_socket_addrs()).next().unwrap();
+
+ let socket = t!(TcpStream::connect(&addr).await);
+ let builder = TlsConnector::builder();
+ let cx = t!(builder.build());
+ let cx = tokio_native_tls::TlsConnector::from(cx);
+ let res = cx
+ .connect(host, socket)
+ .await
+ .map_err(|e| Error::new(io::ErrorKind::Other, e));
+
+ assert!(res.is_err());
+ res.err().unwrap()
+}
+
+#[tokio::test]
+async fn expired() {
+ assert_expired_error(&get_host("expired.badssl.com").await)
+}
+
+// TODO: the OSX builders on Travis apparently fail this tests spuriously?
+// passes locally though? Seems... bad!
+#[tokio::test]
+#[cfg_attr(all(target_os = "macos", feature = "force-openssl"), ignore)]
+async fn wrong_host() {
+ assert_wrong_host(&get_host("wrong.host.badssl.com").await)
+}
+
+#[tokio::test]
+async fn self_signed() {
+ assert_self_signed(&get_host("self-signed.badssl.com").await)
+}
+
+#[tokio::test]
+async fn untrusted_root() {
+ assert_untrusted_root(&get_host("untrusted-root.badssl.com").await)
+}