summaryrefslogtreecommitdiff
path: root/ext/tls
diff options
context:
space:
mode:
authorMatt Mastracci <matthew@mastracci.com>2024-04-25 17:00:04 -0400
committerGitHub <noreply@github.com>2024-04-25 17:00:04 -0400
commit8c9caeb418f062d1cbcde0d501a8331cd65cde0f (patch)
treee97619106de6839a0123bdb68166b4666663da94 /ext/tls
parent084eafe50883bc69ae2700023f6c74db03185ba4 (diff)
chore: rework TLS code in test server (#23566)
In order to make the reqwest/rustls upgrade more straightforward, we refactor the test server to depend on deno_tls.
Diffstat (limited to 'ext/tls')
-rw-r--r--ext/tls/lib.rs17
1 files changed, 9 insertions, 8 deletions
diff --git a/ext/tls/lib.rs b/ext/tls/lib.rs
index 63fc04628..7e68971e2 100644
--- a/ext/tls/lib.rs
+++ b/ext/tls/lib.rs
@@ -3,7 +3,7 @@
pub use deno_native_certs;
pub use rustls;
pub use rustls_pemfile;
-pub use rustls_tokio_stream;
+pub use rustls_tokio_stream::*;
pub use webpki;
pub use webpki_roots;
@@ -15,12 +15,9 @@ use rustls::client::HandshakeSignatureValid;
use rustls::client::ServerCertVerified;
use rustls::client::ServerCertVerifier;
use rustls::client::WebPkiVerifier;
-use rustls::Certificate;
use rustls::ClientConfig;
use rustls::DigitallySignedStruct;
use rustls::Error;
-use rustls::PrivateKey;
-use rustls::RootCertStore;
use rustls::ServerName;
use rustls_pemfile::certs;
use rustls_pemfile::ec_private_keys;
@@ -33,6 +30,10 @@ use std::io::Cursor;
use std::sync::Arc;
use std::time::SystemTime;
+pub type Certificate = rustls::Certificate;
+pub type PrivateKey = rustls::PrivateKey;
+pub type RootCertStore = rustls::RootCertStore;
+
/// Lazily resolves the root cert store.
///
/// This was done because the root cert store is not needed in all cases
@@ -263,7 +264,7 @@ pub fn load_certs(
return Err(cert_not_found_err());
}
- Ok(certs.into_iter().map(Certificate).collect())
+ Ok(certs.into_iter().map(rustls::Certificate).collect())
}
fn key_decode_err() -> AnyError {
@@ -281,19 +282,19 @@ fn cert_not_found_err() -> AnyError {
/// Starts with -----BEGIN RSA PRIVATE KEY-----
fn load_rsa_keys(mut bytes: &[u8]) -> Result<Vec<PrivateKey>, AnyError> {
let keys = rsa_private_keys(&mut bytes).map_err(|_| key_decode_err())?;
- Ok(keys.into_iter().map(PrivateKey).collect())
+ Ok(keys.into_iter().map(rustls::PrivateKey).collect())
}
/// Starts with -----BEGIN EC PRIVATE KEY-----
fn load_ec_keys(mut bytes: &[u8]) -> Result<Vec<PrivateKey>, AnyError> {
let keys = ec_private_keys(&mut bytes).map_err(|_| key_decode_err())?;
- Ok(keys.into_iter().map(PrivateKey).collect())
+ Ok(keys.into_iter().map(rustls::PrivateKey).collect())
}
/// Starts with -----BEGIN PRIVATE KEY-----
fn load_pkcs8_keys(mut bytes: &[u8]) -> Result<Vec<PrivateKey>, AnyError> {
let keys = pkcs8_private_keys(&mut bytes).map_err(|_| key_decode_err())?;
- Ok(keys.into_iter().map(PrivateKey).collect())
+ Ok(keys.into_iter().map(rustls::PrivateKey).collect())
}
fn filter_invalid_encoding_err(