Now, callers have more control over the set of roots. Note that, due to cargo unification, other dependencies in the dependency tree might enable rustls-tls-webpki-roots or rustls-tls. This will affect connections initiated by code that explicitly enabled rustls-tls-manual-roots. So for now, the choice is done once per entire cargo dependency graph. If people want more precise control over things, they can add methods that allow controlling this on a per-connection level. Even if such methods are available, the *-manual-roots feature will still be helpful with eliminating the webpki-roots dependency for those cargo graphs where there is no unification.
87 lines
2.0 KiB
Rust
87 lines
2.0 KiB
Rust
#![cfg(not(target_arch = "wasm32"))]
|
|
|
|
#[cfg(all(feature = "__tls", not(feature = "rustls-tls-manual-roots")))]
|
|
#[tokio::test]
|
|
async fn test_badssl_modern() {
|
|
let text = reqwest::Client::builder()
|
|
.no_proxy()
|
|
.build()
|
|
.unwrap()
|
|
.get("https://mozilla-modern.badssl.com/")
|
|
.send()
|
|
.await
|
|
.unwrap()
|
|
.text()
|
|
.await
|
|
.unwrap();
|
|
|
|
assert!(text.contains("<title>mozilla-modern.badssl.com</title>"));
|
|
}
|
|
|
|
#[cfg(feature = "rustls-tls-webpki-roots")]
|
|
#[tokio::test]
|
|
async fn test_rustls_badssl_modern() {
|
|
let text = reqwest::Client::builder()
|
|
.use_rustls_tls()
|
|
.no_proxy()
|
|
.build()
|
|
.unwrap()
|
|
.get("https://mozilla-modern.badssl.com/")
|
|
.send()
|
|
.await
|
|
.unwrap()
|
|
.text()
|
|
.await
|
|
.unwrap();
|
|
|
|
assert!(text.contains("<title>mozilla-modern.badssl.com</title>"));
|
|
}
|
|
|
|
#[cfg(feature = "__tls")]
|
|
#[tokio::test]
|
|
async fn test_badssl_self_signed() {
|
|
let text = reqwest::Client::builder()
|
|
.danger_accept_invalid_certs(true)
|
|
.no_proxy()
|
|
.build()
|
|
.unwrap()
|
|
.get("https://self-signed.badssl.com/")
|
|
.send()
|
|
.await
|
|
.unwrap()
|
|
.text()
|
|
.await
|
|
.unwrap();
|
|
|
|
assert!(text.contains("<title>self-signed.badssl.com</title>"));
|
|
}
|
|
|
|
#[cfg(feature = "native-tls")]
|
|
#[tokio::test]
|
|
async fn test_badssl_wrong_host() {
|
|
let text = reqwest::Client::builder()
|
|
.danger_accept_invalid_hostnames(true)
|
|
.no_proxy()
|
|
.build()
|
|
.unwrap()
|
|
.get("https://wrong.host.badssl.com/")
|
|
.send()
|
|
.await
|
|
.unwrap()
|
|
.text()
|
|
.await
|
|
.unwrap();
|
|
|
|
assert!(text.contains("<title>wrong.host.badssl.com</title>"));
|
|
|
|
let result = reqwest::Client::builder()
|
|
.danger_accept_invalid_hostnames(true)
|
|
.build()
|
|
.unwrap()
|
|
.get("https://self-signed.badssl.com/")
|
|
.send()
|
|
.await;
|
|
|
|
assert!(result.is_err());
|
|
}
|