1
0
Fork 0
mirror of https://github.com/actix/actix-web.git synced 2024-12-21 23:56:35 +00:00
actix-web/awc/tests/test_rustls_client.rs

102 lines
3 KiB
Rust
Raw Normal View History

2019-11-20 18:35:07 +00:00
#![cfg(feature = "rustls")]
2021-01-17 05:19:32 +00:00
2021-02-07 03:54:58 +00:00
extern crate tls_rustls as rustls;
2021-01-17 05:19:32 +00:00
use std::{
io::BufReader,
sync::{
atomic::{AtomicUsize, Ordering},
Arc,
},
};
use actix_http::HttpService;
2019-12-12 17:08:38 +00:00
use actix_http_test::test_server;
use actix_service::{map_config, pipeline_factory, ServiceFactoryExt};
2021-01-17 05:19:32 +00:00
use actix_web::{dev::AppConfig, http::Version, web, App, HttpResponse};
2020-05-18 02:46:57 +00:00
use futures_util::future::ok;
2021-01-17 05:19:32 +00:00
use rustls::internal::pemfile::{certs, pkcs8_private_keys};
use rustls::{ClientConfig, NoClientAuth, ServerConfig};
fn tls_config() -> ServerConfig {
let cert = rcgen::generate_simple_self_signed(vec!["localhost".to_owned()]).unwrap();
let cert_file = cert.serialize_pem().unwrap();
let key_file = cert.serialize_private_key_pem();
let mut config = ServerConfig::new(NoClientAuth::new());
let cert_file = &mut BufReader::new(cert_file.as_bytes());
let key_file = &mut BufReader::new(key_file.as_bytes());
let cert_chain = certs(cert_file).unwrap();
let mut keys = pkcs8_private_keys(key_file).unwrap();
config.set_single_cert(cert_chain, keys.remove(0)).unwrap();
config
}
mod danger {
2021-01-17 05:19:32 +00:00
pub struct NoCertificateVerification;
2021-01-17 05:19:32 +00:00
impl rustls::ServerCertVerifier for NoCertificateVerification {
fn verify_server_cert(
&self,
2021-01-17 05:19:32 +00:00
_roots: &rustls::RootCertStore,
_presented_certs: &[rustls::Certificate],
_dns_name: webpki::DNSNameRef<'_>,
_ocsp: &[u8],
2021-01-17 05:19:32 +00:00
) -> Result<rustls::ServerCertVerified, rustls::TLSError> {
Ok(rustls::ServerCertVerified::assertion())
}
}
}
2021-01-17 05:19:32 +00:00
#[actix_rt::test]
async fn test_connection_reuse_h2() {
2019-11-26 05:25:50 +00:00
let num = Arc::new(AtomicUsize::new(0));
let num2 = num.clone();
2019-12-12 17:08:38 +00:00
let srv = test_server(move || {
2019-11-26 05:25:50 +00:00
let num2 = num2.clone();
pipeline_factory(move |io| {
num2.fetch_add(1, Ordering::Relaxed);
ok(io)
})
.and_then(
HttpService::build()
2019-12-20 11:36:48 +00:00
.h2(map_config(
2021-02-11 23:03:17 +00:00
App::new().service(web::resource("/").route(web::to(HttpResponse::Ok))),
2019-12-20 11:36:48 +00:00
|_| AppConfig::default(),
2019-12-20 11:27:32 +00:00
))
2021-01-17 05:19:32 +00:00
.rustls(tls_config())
2019-11-26 05:25:50 +00:00
.map_err(|_| ()),
)
2020-03-08 07:42:45 +00:00
})
.await;
2021-01-17 05:19:32 +00:00
// disable TLS verification
2019-11-26 05:25:50 +00:00
let mut config = ClientConfig::new();
let protos = vec![b"h2".to_vec(), b"http/1.1".to_vec()];
config.set_protocols(&protos);
config
.dangerous()
2021-01-17 05:19:32 +00:00
.set_certificate_verifier(Arc::new(danger::NoCertificateVerification));
let client = awc::Client::builder()
2021-02-18 12:30:09 +00:00
.connector(awc::Connector::new().rustls(Arc::new(config)))
2019-11-26 05:25:50 +00:00
.finish();
2019-11-26 05:25:50 +00:00
// req 1
let request = client.get(srv.surl("/")).send();
let response = request.await.unwrap();
assert!(response.status().is_success());
2019-11-26 05:25:50 +00:00
// req 2
let req = client.post(srv.surl("/"));
let response = req.send().await.unwrap();
assert!(response.status().is_success());
assert_eq!(response.version(), Version::HTTP_2);
2019-11-26 05:25:50 +00:00
// one connection
assert_eq!(num.load(Ordering::Relaxed), 1);
}