1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
use bytes::Bytes;
use crate::error::Error;
use crate::postgres::connection::stream::PgStream;
use crate::postgres::message::SslRequest;
use crate::postgres::{PgConnectOptions, PgSslMode};
pub(super) async fn maybe_upgrade(
stream: &mut PgStream,
options: &PgConnectOptions,
) -> Result<(), Error> {
match options.ssl_mode {
PgSslMode::Allow | PgSslMode::Disable => {}
PgSslMode::Prefer => {
upgrade(stream, options).await?;
}
PgSslMode::Require | PgSslMode::VerifyFull | PgSslMode::VerifyCa => {
if !upgrade(stream, options).await? {
return Err(Error::Tls("server does not support TLS".into()));
}
}
}
Ok(())
}
async fn upgrade(stream: &mut PgStream, options: &PgConnectOptions) -> Result<bool, Error> {
stream.send(SslRequest).await?;
match stream.read::<Bytes>(1).await?[0] {
b'S' => {
}
b'N' => {
return Ok(false);
}
other => {
return Err(err_protocol!(
"unexpected response from SSLRequest: 0x{:02x}",
other
));
}
}
let accept_invalid_certs = !matches!(
options.ssl_mode,
PgSslMode::VerifyCa | PgSslMode::VerifyFull
);
let accept_invalid_hostnames = !matches!(options.ssl_mode, PgSslMode::VerifyFull);
stream
.upgrade(
&options.host,
accept_invalid_certs,
accept_invalid_hostnames,
options.ssl_root_cert.as_ref(),
)
.await?;
Ok(true)
}