1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
use cassandra::error::CassError;
use cassandra::util::Protected;
use cassandra_sys::CassSsl as _Ssl;
use cassandra_sys::cass_ssl_add_trusted_cert;
use cassandra_sys::cass_ssl_free;
use cassandra_sys::cass_ssl_new;
use cassandra_sys::cass_ssl_set_cert;
use cassandra_sys::cass_ssl_set_private_key;
use cassandra_sys::cass_ssl_set_verify_flags;
use errors::*;
use std::ffi::CString;
/// Describes the SSL configuration of a cluster.
#[derive(Debug)]
pub struct Ssl(*mut _Ssl);
impl Protected<*mut _Ssl> for Ssl {
fn inner(&self) -> *mut _Ssl { self.0 }
fn build(inner: *mut _Ssl) -> Self { Ssl(inner) }
}
impl Drop for Ssl {
/// Frees a SSL context instance.
fn drop(&mut self) { unsafe { cass_ssl_free(self.0) } }
}
impl Default for Ssl {
/// Creates a new SSL context.
fn default() -> Ssl { unsafe { Ssl(cass_ssl_new()) } }
}
impl Ssl {
/// Adds a trusted certificate. This is used to verify
/// the peer's certificate.
pub fn add_trusted_cert(&mut self, cert: &str) -> Result<&mut Self> {
unsafe {
cass_ssl_add_trusted_cert(self.0, CString::new(cert).expect("must be utf8").as_ptr())
.to_result(self)
.chain_err(|| "")
}
}
/// Sets verification performed on the peer's certificate.
///
/// CASS_SSL_VERIFY_NONE - No verification is performed
///
/// CASS_SSL_VERIFY_PEER_CERT - Certificate is present and valid
///
/// CASS_SSL_VERIFY_PEER_IDENTITY - IP address matches the certificate's
/// common name or one of its subject alternative names. This implies the
/// certificate is also present.
///
/// <b>Default:</b> CASS_SSL_VERIFY_PEER_CERT
pub fn set_verify_flags(&mut self, flags: i32) { unsafe { cass_ssl_set_verify_flags(self.0, flags) } }
/// Set client-side certificate chain. This is used to authenticate
/// the client on the server-side. This should contain the entire
/// Certificate chain starting with the certificate itself.
pub fn set_cert(&mut self, cert: &str) -> Result<&mut Self> {
unsafe {
cass_ssl_set_cert(self.0, CString::new(cert).expect("must be utf8").as_ptr())
.to_result(self)
.chain_err(|| "")
}
}
/// Set client-side private key. This is used to authenticate
/// the client on the server-side.
pub fn set_private_key(&mut self, key: &str, password: &str) -> Result<&mut Self> {
unsafe {
cass_ssl_set_private_key(self.0,
CString::new(key).expect("must be utf8").as_ptr(),
password.as_ptr() as *const i8)
.to_result(self)
.chain_err(|| "")
}
}
}