summaryrefslogtreecommitdiffstats
path: root/vendor/tokio-native-tls/tests/google.rs
diff options
context:
space:
mode:
Diffstat (limited to 'vendor/tokio-native-tls/tests/google.rs')
-rw-r--r--vendor/tokio-native-tls/tests/google.rs99
1 files changed, 99 insertions, 0 deletions
diff --git a/vendor/tokio-native-tls/tests/google.rs b/vendor/tokio-native-tls/tests/google.rs
new file mode 100644
index 000000000..179358e3c
--- /dev/null
+++ b/vendor/tokio-native-tls/tests/google.rs
@@ -0,0 +1,99 @@
+#![warn(rust_2018_idioms)]
+
+use cfg_if::cfg_if;
+use native_tls::TlsConnector;
+use std::io;
+use std::net::ToSocketAddrs;
+use tokio::io::{AsyncReadExt, AsyncWriteExt};
+use tokio::net::TcpStream;
+
+macro_rules! t {
+ ($e:expr) => {
+ match $e {
+ Ok(e) => e,
+ Err(e) => panic!("{} failed with {:?}", stringify!($e), e),
+ }
+ };
+}
+
+cfg_if! {
+ if #[cfg(feature = "force-rustls")] {
+ fn assert_bad_hostname_error(err: &io::Error) {
+ let err = err.to_string();
+ assert!(err.contains("CertNotValidForName"), "bad error: {}", err);
+ }
+ } else if #[cfg(any(feature = "force-openssl",
+ all(not(target_os = "macos"),
+ not(target_os = "windows"),
+ not(target_os = "ios"))))] {
+ fn assert_bad_hostname_error(err: &io::Error) {
+ let err = err.get_ref().unwrap();
+ let err = err.downcast_ref::<native_tls::Error>().unwrap();
+ assert!(format!("{}", err).contains("certificate verify failed"));
+ }
+ } else if #[cfg(any(target_os = "macos", target_os = "ios"))] {
+ fn assert_bad_hostname_error(err: &io::Error) {
+ let err = err.get_ref().unwrap();
+ let err = err.downcast_ref::<native_tls::Error>().unwrap();
+ assert!(format!("{}", err).contains("was not trusted."));
+ }
+ } else {
+ fn assert_bad_hostname_error(err: &io::Error) {
+ let err = err.get_ref().unwrap();
+ let err = err.downcast_ref::<native_tls::Error>().unwrap();
+ assert!(format!("{}", err).contains("CN name"));
+ }
+ }
+}
+
+#[tokio::test]
+async fn fetch_google() {
+ drop(env_logger::try_init());
+
+ // First up, resolve google.com
+ let addr = t!("google.com:443".to_socket_addrs()).next().unwrap();
+
+ let socket = TcpStream::connect(&addr).await.unwrap();
+
+ // Send off the request by first negotiating an SSL handshake, then writing
+ // of our request, then flushing, then finally read off the response.
+ let builder = TlsConnector::builder();
+ let connector = t!(builder.build());
+ let connector = tokio_native_tls::TlsConnector::from(connector);
+ let mut socket = t!(connector.connect("google.com", socket).await);
+ t!(socket.write_all(b"GET / HTTP/1.0\r\n\r\n").await);
+ let mut data = Vec::new();
+ t!(socket.read_to_end(&mut data).await);
+
+ // any response code is fine
+ assert!(data.starts_with(b"HTTP/1.0 "));
+
+ let data = String::from_utf8_lossy(&data);
+ let data = data.trim_end();
+ assert!(data.ends_with("</html>") || data.ends_with("</HTML>"));
+}
+
+fn native2io(e: native_tls::Error) -> io::Error {
+ io::Error::new(io::ErrorKind::Other, e)
+}
+
+// see comment in bad.rs for ignore reason
+#[cfg_attr(all(target_os = "macos", feature = "force-openssl"), ignore)]
+#[tokio::test]
+async fn wrong_hostname_error() {
+ drop(env_logger::try_init());
+
+ let addr = t!("google.com:443".to_socket_addrs()).next().unwrap();
+
+ let socket = t!(TcpStream::connect(&addr).await);
+ let builder = TlsConnector::builder();
+ let connector = t!(builder.build());
+ let connector = tokio_native_tls::TlsConnector::from(connector);
+ let res = connector
+ .connect("rust-lang.org", socket)
+ .await
+ .map_err(native2io);
+
+ assert!(res.is_err());
+ assert_bad_hostname_error(&res.err().unwrap());
+}