change invalid cert api to match native-tls (#327)
This commit is contained in:
committed by
Sean McArthur
parent
11f8588989
commit
d8e47babf6
@@ -141,7 +141,9 @@ impl ClientBuilder {
|
||||
self
|
||||
}
|
||||
|
||||
/// Disable hostname verification.
|
||||
/// Controls the use of hostname verification.
|
||||
///
|
||||
/// Defaults to `false`.
|
||||
///
|
||||
/// # Warning
|
||||
///
|
||||
@@ -150,47 +152,33 @@ impl ClientBuilder {
|
||||
/// site will be trusted for use from any other. This introduces a
|
||||
/// significant vulnerability to man-in-the-middle attacks.
|
||||
#[inline]
|
||||
pub fn danger_disable_hostname_verification(&mut self) -> &mut ClientBuilder {
|
||||
|
||||
pub fn danger_accept_invalid_hostnames(&mut self, accept_invalid_hostname: bool) -> &mut ClientBuilder {
|
||||
if let Some(config) = config_mut(&mut self.config, &self.err) {
|
||||
config.hostname_verification = false;
|
||||
config.hostname_verification = !accept_invalid_hostname;
|
||||
}
|
||||
self
|
||||
}
|
||||
|
||||
/// Enable hostname verification.
|
||||
#[inline]
|
||||
pub fn enable_hostname_verification(&mut self) -> &mut ClientBuilder {
|
||||
if let Some(config) = config_mut(&mut self.config, &self.err) {
|
||||
config.hostname_verification = true;
|
||||
}
|
||||
self
|
||||
}
|
||||
|
||||
/// Disable certs verification.
|
||||
/// Controls the use of certificate validation.
|
||||
///
|
||||
/// Defaults to `false`.
|
||||
///
|
||||
/// # Warning
|
||||
///
|
||||
/// You should think very carefully before you use this method. If
|
||||
/// hostname verification is not used, any valid certificate for any
|
||||
/// site will be trusted for use from any other. This introduces a
|
||||
/// significant vulnerability to man-in-the-middle attacks.
|
||||
/// You should think very carefully before using this method. If
|
||||
/// invalid certificates are trusted, *any* certificate for *any* site
|
||||
/// will be trusted for use. This includes expired certificates. This
|
||||
/// introduces significant vulnerabilities, and should only be used
|
||||
/// as a last resort.
|
||||
#[inline]
|
||||
pub fn danger_disable_certs_verification(&mut self) -> &mut ClientBuilder {
|
||||
pub fn danger_accept_invalid_certs(&mut self, accept_invalid_certs: bool) -> &mut ClientBuilder {
|
||||
if let Some(config) = config_mut(&mut self.config, &self.err) {
|
||||
config.certs_verification = false;
|
||||
config.certs_verification = !accept_invalid_certs;
|
||||
}
|
||||
self
|
||||
}
|
||||
|
||||
/// Enable certs verification.
|
||||
#[inline]
|
||||
pub fn enable_certs_verification(&mut self) -> &mut ClientBuilder {
|
||||
if let Some(config) = config_mut(&mut self.config, &self.err) {
|
||||
config.certs_verification = true;
|
||||
}
|
||||
self
|
||||
}
|
||||
|
||||
/// Sets the default headers for every request.
|
||||
#[inline]
|
||||
|
||||
Reference in New Issue
Block a user