mirror of
https://github.com/servo/servo.git
synced 2025-08-04 13:10:20 +01:00
Move http_loader::Connector to a separate module
This commit is contained in:
parent
0617727f5b
commit
c344461017
5 changed files with 47 additions and 36 deletions
40
components/net/connector.rs
Normal file
40
components/net/connector.rs
Normal file
|
@ -0,0 +1,40 @@
|
||||||
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
||||||
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
||||||
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
||||||
|
|
||||||
|
use hyper::client::Pool;
|
||||||
|
use hyper::net::{HttpsConnector, Openssl};
|
||||||
|
use openssl::ssl::{SSL_OP_NO_SSLV2, SSL_OP_NO_SSLV3, SSL_VERIFY_PEER, SslContext, SslMethod};
|
||||||
|
use std::sync::Arc;
|
||||||
|
use util::resource_files::resources_dir_path;
|
||||||
|
|
||||||
|
pub type Connector = HttpsConnector<Openssl>;
|
||||||
|
|
||||||
|
// The basic logic here is to prefer ciphers with ECDSA certificates, Forward
|
||||||
|
// Secrecy, AES GCM ciphers, AES ciphers, and finally 3DES ciphers.
|
||||||
|
// A complete discussion of the issues involved in TLS configuration can be found here:
|
||||||
|
// https://wiki.mozilla.org/Security/Server_Side_TLS
|
||||||
|
const DEFAULT_CIPHERS: &'static str = concat!(
|
||||||
|
"ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:",
|
||||||
|
"ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:",
|
||||||
|
"DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-SHA256:",
|
||||||
|
"ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:",
|
||||||
|
"ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA:",
|
||||||
|
"ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:",
|
||||||
|
"DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-RSA-DES-CBC3-SHA:",
|
||||||
|
"ECDHE-ECDSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:",
|
||||||
|
"AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA"
|
||||||
|
);
|
||||||
|
|
||||||
|
pub fn create_http_connector() -> Arc<Pool<Connector>> {
|
||||||
|
let mut context = SslContext::new(SslMethod::Sslv23).unwrap();
|
||||||
|
context.set_verify(SSL_VERIFY_PEER, None);
|
||||||
|
context.set_CA_file(&resources_dir_path().join("certs")).unwrap();
|
||||||
|
context.set_cipher_list(DEFAULT_CIPHERS).unwrap();
|
||||||
|
context.set_options(SSL_OP_NO_SSLV2 | SSL_OP_NO_SSLV3);
|
||||||
|
let connector = HttpsConnector::new(Openssl {
|
||||||
|
context: Arc::new(context)
|
||||||
|
});
|
||||||
|
|
||||||
|
Arc::new(Pool::with_connector(Default::default(), connector))
|
||||||
|
}
|
|
@ -2,9 +2,10 @@
|
||||||
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
||||||
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
||||||
|
|
||||||
|
use connector::create_http_connector;
|
||||||
use data_loader::decode;
|
use data_loader::decode;
|
||||||
use fetch::cors_cache::CORSCache;
|
use fetch::cors_cache::CORSCache;
|
||||||
use http_loader::{NetworkHttpRequestFactory, create_http_connector, obtain_response};
|
use http_loader::{NetworkHttpRequestFactory, obtain_response};
|
||||||
use hyper::header::{Accept, AcceptLanguage, Authorization, AccessControlAllowCredentials};
|
use hyper::header::{Accept, AcceptLanguage, Authorization, AccessControlAllowCredentials};
|
||||||
use hyper::header::{AccessControlAllowOrigin, AccessControlAllowHeaders, AccessControlAllowMethods};
|
use hyper::header::{AccessControlAllowOrigin, AccessControlAllowHeaders, AccessControlAllowMethods};
|
||||||
use hyper::header::{AccessControlRequestHeaders, AccessControlMaxAge, AccessControlRequestMethod, Basic};
|
use hyper::header::{AccessControlRequestHeaders, AccessControlMaxAge, AccessControlRequestMethod, Basic};
|
||||||
|
|
|
@ -4,6 +4,7 @@
|
||||||
|
|
||||||
|
|
||||||
use brotli::Decompressor;
|
use brotli::Decompressor;
|
||||||
|
use connector::Connector;
|
||||||
use cookie;
|
use cookie;
|
||||||
use cookie_storage::CookieStorage;
|
use cookie_storage::CookieStorage;
|
||||||
use devtools_traits::{ChromeToDevtoolsControlMsg, DevtoolsControlMsg, HttpRequest as DevtoolsHttpRequest};
|
use devtools_traits::{ChromeToDevtoolsControlMsg, DevtoolsControlMsg, HttpRequest as DevtoolsHttpRequest};
|
||||||
|
@ -19,7 +20,7 @@ use hyper::header::{Location, SetCookie, StrictTransportSecurity, UserAgent, qit
|
||||||
use hyper::http::RawStatus;
|
use hyper::http::RawStatus;
|
||||||
use hyper::method::Method;
|
use hyper::method::Method;
|
||||||
use hyper::mime::{Mime, SubLevel, TopLevel};
|
use hyper::mime::{Mime, SubLevel, TopLevel};
|
||||||
use hyper::net::{Fresh, HttpsConnector, Openssl};
|
use hyper::net::Fresh;
|
||||||
use hyper::status::{StatusClass, StatusCode};
|
use hyper::status::{StatusClass, StatusCode};
|
||||||
use log;
|
use log;
|
||||||
use mime_classifier::MIMEClassifier;
|
use mime_classifier::MIMEClassifier;
|
||||||
|
@ -30,7 +31,6 @@ use net_traits::response::HttpsState;
|
||||||
use net_traits::{CookieSource, IncludeSubdomains, LoadConsumer, LoadContext, LoadData};
|
use net_traits::{CookieSource, IncludeSubdomains, LoadConsumer, LoadContext, LoadData};
|
||||||
use net_traits::{Metadata, NetworkError};
|
use net_traits::{Metadata, NetworkError};
|
||||||
use openssl::ssl::error::{SslError, OpensslError};
|
use openssl::ssl::error::{SslError, OpensslError};
|
||||||
use openssl::ssl::{SSL_OP_NO_SSLV2, SSL_OP_NO_SSLV3, SSL_VERIFY_PEER, SslContext, SslMethod};
|
|
||||||
use resource_thread::{CancellationListener, send_error, start_sending_sniffed_opt, AuthCache, AuthCacheEntry};
|
use resource_thread::{CancellationListener, send_error, start_sending_sniffed_opt, AuthCache, AuthCacheEntry};
|
||||||
use std::borrow::ToOwned;
|
use std::borrow::ToOwned;
|
||||||
use std::boxed::FnBox;
|
use std::boxed::FnBox;
|
||||||
|
@ -46,41 +46,9 @@ use time::Tm;
|
||||||
use tinyfiledialogs;
|
use tinyfiledialogs;
|
||||||
use url::{Url, Position};
|
use url::{Url, Position};
|
||||||
use util::prefs;
|
use util::prefs;
|
||||||
use util::resource_files::resources_dir_path;
|
|
||||||
use util::thread::spawn_named;
|
use util::thread::spawn_named;
|
||||||
use uuid;
|
use uuid;
|
||||||
|
|
||||||
pub type Connector = HttpsConnector<Openssl>;
|
|
||||||
|
|
||||||
// The basic logic here is to prefer ciphers with ECDSA certificates, Forward
|
|
||||||
// Secrecy, AES GCM ciphers, AES ciphers, and finally 3DES ciphers.
|
|
||||||
// A complete discussion of the issues involved in TLS configuration can be found here:
|
|
||||||
// https://wiki.mozilla.org/Security/Server_Side_TLS
|
|
||||||
const DEFAULT_CIPHERS: &'static str = concat!(
|
|
||||||
"ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:",
|
|
||||||
"ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:",
|
|
||||||
"DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-SHA256:",
|
|
||||||
"ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:",
|
|
||||||
"ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA:",
|
|
||||||
"ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:",
|
|
||||||
"DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-RSA-DES-CBC3-SHA:",
|
|
||||||
"ECDHE-ECDSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:",
|
|
||||||
"AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA"
|
|
||||||
);
|
|
||||||
|
|
||||||
pub fn create_http_connector() -> Arc<Pool<Connector>> {
|
|
||||||
let mut context = SslContext::new(SslMethod::Sslv23).unwrap();
|
|
||||||
context.set_verify(SSL_VERIFY_PEER, None);
|
|
||||||
context.set_CA_file(&resources_dir_path().join("certs")).unwrap();
|
|
||||||
context.set_cipher_list(DEFAULT_CIPHERS).unwrap();
|
|
||||||
context.set_options(SSL_OP_NO_SSLV2 | SSL_OP_NO_SSLV3);
|
|
||||||
let connector = HttpsConnector::new(Openssl {
|
|
||||||
context: Arc::new(context)
|
|
||||||
});
|
|
||||||
|
|
||||||
Arc::new(Pool::with_connector(Default::default(), connector))
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn factory(user_agent: String,
|
pub fn factory(user_agent: String,
|
||||||
http_state: HttpState,
|
http_state: HttpState,
|
||||||
devtools_chan: Option<Sender<DevtoolsControlMsg>>,
|
devtools_chan: Option<Sender<DevtoolsControlMsg>>,
|
||||||
|
|
|
@ -44,6 +44,7 @@ extern crate websocket;
|
||||||
pub mod about_loader;
|
pub mod about_loader;
|
||||||
pub mod bluetooth_thread;
|
pub mod bluetooth_thread;
|
||||||
pub mod chrome_loader;
|
pub mod chrome_loader;
|
||||||
|
pub mod connector;
|
||||||
pub mod cookie;
|
pub mod cookie;
|
||||||
pub mod cookie_storage;
|
pub mod cookie_storage;
|
||||||
pub mod data_loader;
|
pub mod data_loader;
|
||||||
|
|
|
@ -5,13 +5,14 @@
|
||||||
//! A thread that takes a URL and streams back the binary data.
|
//! A thread that takes a URL and streams back the binary data.
|
||||||
use about_loader;
|
use about_loader;
|
||||||
use chrome_loader;
|
use chrome_loader;
|
||||||
|
use connector::{Connector, create_http_connector};
|
||||||
use cookie;
|
use cookie;
|
||||||
use cookie_storage::CookieStorage;
|
use cookie_storage::CookieStorage;
|
||||||
use data_loader;
|
use data_loader;
|
||||||
use devtools_traits::{DevtoolsControlMsg};
|
use devtools_traits::{DevtoolsControlMsg};
|
||||||
use file_loader;
|
use file_loader;
|
||||||
use hsts::HstsList;
|
use hsts::HstsList;
|
||||||
use http_loader::{self, Connector, create_http_connector, HttpState};
|
use http_loader::{self, HttpState};
|
||||||
use hyper::client::pool::Pool;
|
use hyper::client::pool::Pool;
|
||||||
use hyper::header::{ContentType, Header, SetCookie};
|
use hyper::header::{ContentType, Header, SetCookie};
|
||||||
use hyper::mime::{Mime, SubLevel, TopLevel};
|
use hyper::mime::{Mime, SubLevel, TopLevel};
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue