diff options
author | Matt Mastracci <matthew@mastracci.com> | 2024-04-25 17:00:04 -0400 |
---|---|---|
committer | GitHub <noreply@github.com> | 2024-04-25 17:00:04 -0400 |
commit | 8c9caeb418f062d1cbcde0d501a8331cd65cde0f (patch) | |
tree | e97619106de6839a0123bdb68166b4666663da94 /ext/tls | |
parent | 084eafe50883bc69ae2700023f6c74db03185ba4 (diff) |
chore: rework TLS code in test server (#23566)
In order to make the reqwest/rustls upgrade more straightforward, we
refactor the test server to depend on deno_tls.
Diffstat (limited to 'ext/tls')
-rw-r--r-- | ext/tls/lib.rs | 17 |
1 files changed, 9 insertions, 8 deletions
diff --git a/ext/tls/lib.rs b/ext/tls/lib.rs index 63fc04628..7e68971e2 100644 --- a/ext/tls/lib.rs +++ b/ext/tls/lib.rs @@ -3,7 +3,7 @@ pub use deno_native_certs; pub use rustls; pub use rustls_pemfile; -pub use rustls_tokio_stream; +pub use rustls_tokio_stream::*; pub use webpki; pub use webpki_roots; @@ -15,12 +15,9 @@ use rustls::client::HandshakeSignatureValid; use rustls::client::ServerCertVerified; use rustls::client::ServerCertVerifier; use rustls::client::WebPkiVerifier; -use rustls::Certificate; use rustls::ClientConfig; use rustls::DigitallySignedStruct; use rustls::Error; -use rustls::PrivateKey; -use rustls::RootCertStore; use rustls::ServerName; use rustls_pemfile::certs; use rustls_pemfile::ec_private_keys; @@ -33,6 +30,10 @@ use std::io::Cursor; use std::sync::Arc; use std::time::SystemTime; +pub type Certificate = rustls::Certificate; +pub type PrivateKey = rustls::PrivateKey; +pub type RootCertStore = rustls::RootCertStore; + /// Lazily resolves the root cert store. /// /// This was done because the root cert store is not needed in all cases @@ -263,7 +264,7 @@ pub fn load_certs( return Err(cert_not_found_err()); } - Ok(certs.into_iter().map(Certificate).collect()) + Ok(certs.into_iter().map(rustls::Certificate).collect()) } fn key_decode_err() -> AnyError { @@ -281,19 +282,19 @@ fn cert_not_found_err() -> AnyError { /// Starts with -----BEGIN RSA PRIVATE KEY----- fn load_rsa_keys(mut bytes: &[u8]) -> Result<Vec<PrivateKey>, AnyError> { let keys = rsa_private_keys(&mut bytes).map_err(|_| key_decode_err())?; - Ok(keys.into_iter().map(PrivateKey).collect()) + Ok(keys.into_iter().map(rustls::PrivateKey).collect()) } /// Starts with -----BEGIN EC PRIVATE KEY----- fn load_ec_keys(mut bytes: &[u8]) -> Result<Vec<PrivateKey>, AnyError> { let keys = ec_private_keys(&mut bytes).map_err(|_| key_decode_err())?; - Ok(keys.into_iter().map(PrivateKey).collect()) + Ok(keys.into_iter().map(rustls::PrivateKey).collect()) } /// Starts with -----BEGIN PRIVATE KEY----- fn load_pkcs8_keys(mut bytes: &[u8]) -> Result<Vec<PrivateKey>, AnyError> { let keys = pkcs8_private_keys(&mut bytes).map_err(|_| key_decode_err())?; - Ok(keys.into_iter().map(PrivateKey).collect()) + Ok(keys.into_iter().map(rustls::PrivateKey).collect()) } fn filter_invalid_encoding_err( |