#![warn(rust_2018_idioms)] use cfg_if::cfg_if; use native_tls_gmssl::TlsConnector; use std::io; use std::net::ToSocketAddrs; use tokio::io::{AsyncReadExt, AsyncWriteExt}; use tokio::net::TcpStream; macro_rules! t { ($e:expr) => { match $e { Ok(e) => e, Err(e) => panic!("{} failed with {:?}", stringify!($e), e), } }; } cfg_if! { if #[cfg(feature = "force-rustls")] { fn assert_bad_hostname_error(err: &io::Error) { let err = err.to_string(); assert!(err.contains("CertNotValidForName"), "bad error: {}", err); } } else if #[cfg(any(feature = "force-openssl", all(not(target_os = "macos"), not(target_os = "windows"), not(target_os = "ios"))))] { fn assert_bad_hostname_error(err: &io::Error) { let err = err.get_ref().unwrap(); let err = err.downcast_ref::().unwrap(); assert!(format!("{}", err).contains("certificate verify failed")); } } else if #[cfg(any(target_os = "macos", target_os = "ios"))] { fn assert_bad_hostname_error(err: &io::Error) { let err = err.get_ref().unwrap(); let err = err.downcast_ref::().unwrap(); assert!(format!("{}", err).contains("was not trusted.")); } } else { fn assert_bad_hostname_error(err: &io::Error) { let err = err.get_ref().unwrap(); let err = err.downcast_ref::().unwrap(); assert!(format!("{}", err).contains("CN name")); } } } #[tokio::test] async fn fetch_google() { drop(env_logger::try_init()); // First up, resolve google.com let addr = t!("google.com:443".to_socket_addrs()).next().unwrap(); let socket = TcpStream::connect(&addr).await.unwrap(); // Send off the request by first negotiating an SSL handshake, then writing // of our request, then flushing, then finally read off the response. let builder = TlsConnector::builder(); let connector = t!(builder.build()); let connector = tokio_tls_gmssl::TlsConnector::from(connector); let mut socket = t!(connector.connect("google.com", socket).await); t!(socket.write_all(b"GET / HTTP/1.0\r\n\r\n").await); let mut data = Vec::new(); t!(socket.read_to_end(&mut data).await); // any response code is fine assert!(data.starts_with(b"HTTP/1.0 ")); let data = String::from_utf8_lossy(&data); let data = data.trim_end(); assert!(data.ends_with("") || data.ends_with("")); } fn native2io(e: native_tls_gmssl::Error) -> io::Error { io::Error::new(io::ErrorKind::Other, e) } // see comment in bad.rs for ignore reason #[cfg_attr(all(target_os = "macos", feature = "force-openssl"), ignore)] #[tokio::test] async fn wrong_hostname_error() { drop(env_logger::try_init()); let addr = t!("google.com:443".to_socket_addrs()).next().unwrap(); let socket = t!(TcpStream::connect(&addr).await); let builder = TlsConnector::builder(); let connector = t!(builder.build()); let connector = tokio_tls_gmssl::TlsConnector::from(connector); let res = connector .connect("rust-lang.org", socket) .await .map_err(native2io); assert!(res.is_err()); assert_bad_hostname_error(&res.err().unwrap()); }