rename TLSBackend to TlsBackend
This commit is contained in:
		| @@ -21,7 +21,7 @@ use {IntoUrl, Method, Proxy, StatusCode, Url}; | |||||||
| #[cfg(feature = "tls")] | #[cfg(feature = "tls")] | ||||||
| use {Certificate, Identity}; | use {Certificate, Identity}; | ||||||
| #[cfg(feature = "tls")] | #[cfg(feature = "tls")] | ||||||
| use ::tls::{ TLSBackend, inner }; | use ::tls::{TlsBackend, inner as tls_inner}; | ||||||
|  |  | ||||||
| static DEFAULT_USER_AGENT: &'static str = | static DEFAULT_USER_AGENT: &'static str = | ||||||
|     concat!(env!("CARGO_PKG_NAME"), "/", env!("CARGO_PKG_VERSION")); |     concat!(env!("CARGO_PKG_NAME"), "/", env!("CARGO_PKG_VERSION")); | ||||||
| @@ -59,7 +59,7 @@ struct Config { | |||||||
|     #[cfg(feature = "tls")] |     #[cfg(feature = "tls")] | ||||||
|     identity: Option<Identity>, |     identity: Option<Identity>, | ||||||
|     #[cfg(feature = "tls")] |     #[cfg(feature = "tls")] | ||||||
|     tls: TLSBackend, |     tls: TlsBackend, | ||||||
| } | } | ||||||
|  |  | ||||||
| impl ClientBuilder { | impl ClientBuilder { | ||||||
| @@ -86,7 +86,7 @@ impl ClientBuilder { | |||||||
|                 #[cfg(feature = "tls")] |                 #[cfg(feature = "tls")] | ||||||
|                 identity: None, |                 identity: None, | ||||||
|                 #[cfg(feature = "tls")] |                 #[cfg(feature = "tls")] | ||||||
|                 tls: TLSBackend::default(), |                 tls: TlsBackend::default(), | ||||||
|             }, |             }, | ||||||
|         } |         } | ||||||
|     } |     } | ||||||
| @@ -104,16 +104,16 @@ impl ClientBuilder { | |||||||
|             #[cfg(feature = "tls")] |             #[cfg(feature = "tls")] | ||||||
|             match config.tls { |             match config.tls { | ||||||
|                 #[cfg(feature = "default-tls")] |                 #[cfg(feature = "default-tls")] | ||||||
|                 TLSBackend::Default => { |                 TlsBackend::Default => { | ||||||
|                     let mut tls = TlsConnector::builder(); |                     let mut tls = TlsConnector::builder(); | ||||||
|                     tls.danger_accept_invalid_hostnames(!config.hostname_verification); |                     tls.danger_accept_invalid_hostnames(!config.hostname_verification); | ||||||
|                     tls.danger_accept_invalid_certs(!config.certs_verification); |                     tls.danger_accept_invalid_certs(!config.certs_verification); | ||||||
|  |  | ||||||
|                     for cert in config.root_certs { |                     for cert in config.root_certs { | ||||||
|                         let cert = match cert.inner { |                         let cert = match cert.inner { | ||||||
|                             inner::Certificate::Der(buf) => |                             tls_inner::Certificate::Der(buf) => | ||||||
|                                 try_!(::native_tls::Certificate::from_der(&buf)), |                                 try_!(::native_tls::Certificate::from_der(&buf)), | ||||||
|                             inner::Certificate::Pem(buf) => |                             tls_inner::Certificate::Pem(buf) => | ||||||
|                                 try_!(::native_tls::Certificate::from_pem(&buf)) |                                 try_!(::native_tls::Certificate::from_pem(&buf)) | ||||||
|                         }; |                         }; | ||||||
|                         tls.add_root_certificate(cert); |                         tls.add_root_certificate(cert); | ||||||
| @@ -121,7 +121,7 @@ impl ClientBuilder { | |||||||
|  |  | ||||||
|                     if let Some(id) = config.identity { |                     if let Some(id) = config.identity { | ||||||
|                         let id = match id.inner { |                         let id = match id.inner { | ||||||
|                             inner::Identity::Pkcs12(buf, passwd) => |                             tls_inner::Identity::Pkcs12(buf, passwd) => | ||||||
|                                 try_!(::native_tls::Identity::from_pkcs12(&buf, &passwd)), |                                 try_!(::native_tls::Identity::from_pkcs12(&buf, &passwd)), | ||||||
|                             #[cfg(feature = "rustls-tls")] |                             #[cfg(feature = "rustls-tls")] | ||||||
|                             _ => return Err(::error::from(::error::Kind::Incompatible)) |                             _ => return Err(::error::from(::error::Kind::Incompatible)) | ||||||
| @@ -132,7 +132,7 @@ impl ClientBuilder { | |||||||
|                     Connector::new_default_tls(tls, proxies.clone())? |                     Connector::new_default_tls(tls, proxies.clone())? | ||||||
|                 }, |                 }, | ||||||
|                 #[cfg(feature = "rustls-tls")] |                 #[cfg(feature = "rustls-tls")] | ||||||
|                 TLSBackend::Rustls => { |                 TlsBackend::Rustls => { | ||||||
|                     use std::io::Cursor; |                     use std::io::Cursor; | ||||||
|                     use rustls::TLSError; |                     use rustls::TLSError; | ||||||
|                     use rustls::internal::pemfile; |                     use rustls::internal::pemfile; | ||||||
| @@ -147,9 +147,9 @@ impl ClientBuilder { | |||||||
|  |  | ||||||
|                     for cert in config.root_certs { |                     for cert in config.root_certs { | ||||||
|                         match cert.inner { |                         match cert.inner { | ||||||
|                             inner::Certificate::Der(buf) => try_!(tls.root_store.add(&::rustls::Certificate(buf)) |                             tls_inner::Certificate::Der(buf) => try_!(tls.root_store.add(&::rustls::Certificate(buf)) | ||||||
|                                 .map_err(TLSError::WebPKIError)), |                                 .map_err(TLSError::WebPKIError)), | ||||||
|                             inner::Certificate::Pem(buf) => { |                             tls_inner::Certificate::Pem(buf) => { | ||||||
|                                 let mut pem = Cursor::new(buf); |                                 let mut pem = Cursor::new(buf); | ||||||
|                                 let mut certs = try_!(pemfile::certs(&mut pem) |                                 let mut certs = try_!(pemfile::certs(&mut pem) | ||||||
|                                     .map_err(|_| TLSError::General(String::from("No valid certificate was found")))); |                                     .map_err(|_| TLSError::General(String::from("No valid certificate was found")))); | ||||||
| @@ -163,7 +163,7 @@ impl ClientBuilder { | |||||||
|  |  | ||||||
|                     if let Some(id) = config.identity { |                     if let Some(id) = config.identity { | ||||||
|                         let (key, certs) = match id.inner { |                         let (key, certs) = match id.inner { | ||||||
|                             inner::Identity::Pem(buf) => { |                             tls_inner::Identity::Pem(buf) => { | ||||||
|                                 let mut pem = Cursor::new(buf); |                                 let mut pem = Cursor::new(buf); | ||||||
|                                 let mut certs = try_!(pemfile::certs(&mut pem) |                                 let mut certs = try_!(pemfile::certs(&mut pem) | ||||||
|                                     .map_err(|_| TLSError::General(String::from("No valid certificate was found")))); |                                     .map_err(|_| TLSError::General(String::from("No valid certificate was found")))); | ||||||
| @@ -211,14 +211,14 @@ impl ClientBuilder { | |||||||
|     /// Use native TLS backend. |     /// Use native TLS backend. | ||||||
|     #[cfg(feature = "default-tls")] |     #[cfg(feature = "default-tls")] | ||||||
|     pub fn use_default_tls(mut self) -> ClientBuilder { |     pub fn use_default_tls(mut self) -> ClientBuilder { | ||||||
|         self.config.tls = TLSBackend::Default; |         self.config.tls = TlsBackend::Default; | ||||||
|         self |         self | ||||||
|     } |     } | ||||||
|  |  | ||||||
|     /// Use rustls TLS backend. |     /// Use rustls TLS backend. | ||||||
|     #[cfg(feature = "rustls-tls")] |     #[cfg(feature = "rustls-tls")] | ||||||
|     pub fn use_rustls_tls(mut self) -> ClientBuilder { |     pub fn use_rustls_tls(mut self) -> ClientBuilder { | ||||||
|         self.config.tls = TLSBackend::Rustls; |         self.config.tls = TlsBackend::Rustls; | ||||||
|         self |         self | ||||||
|     } |     } | ||||||
|  |  | ||||||
|   | |||||||
							
								
								
									
										10
									
								
								src/tls.rs
									
									
									
									
									
								
							
							
						
						
									
										10
									
								
								src/tls.rs
									
									
									
									
									
								
							| @@ -167,20 +167,20 @@ impl fmt::Debug for Identity { | |||||||
|     } |     } | ||||||
| } | } | ||||||
|  |  | ||||||
| pub(crate) enum TLSBackend { | pub(crate) enum TlsBackend { | ||||||
|     #[cfg(feature = "default-tls")] |     #[cfg(feature = "default-tls")] | ||||||
|     Default, |     Default, | ||||||
|     #[cfg(feature = "rustls-tls")] |     #[cfg(feature = "rustls-tls")] | ||||||
|     Rustls |     Rustls | ||||||
| } | } | ||||||
|  |  | ||||||
| impl Default for TLSBackend { | impl Default for TlsBackend { | ||||||
|     fn default() -> TLSBackend { |     fn default() -> TlsBackend { | ||||||
|         #[cfg(feature = "default-tls")] |         #[cfg(feature = "default-tls")] | ||||||
|         { TLSBackend::Default } |         { TlsBackend::Default } | ||||||
|  |  | ||||||
|         #[cfg(all(feature = "rustls-tls", not(feature = "default-tls")))] |         #[cfg(all(feature = "rustls-tls", not(feature = "default-tls")))] | ||||||
|         { TLSBackend::Rustls } |         { TlsBackend::Rustls } | ||||||
|     } |     } | ||||||
| } | } | ||||||
|  |  | ||||||
|   | |||||||
		Reference in New Issue
	
	Block a user