postgres_rustls 0.1.5

TLS support for tokio-postgres via tokio-rustls.
Documentation
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
When `runtime` is enabled and the `ignored` tests are run,
there must be a PostgreSQL server running on `[::1]:5432` that is configured
with TLS 1.3 support with a valid X.509 v3 certificate issued to the value in
`host`. The root certificate must be what is in `ca.crt.pem` and must be a valid
PEM-encoded X.509 v3 certificate. The user that connects to the server
must be the value in `user` and the database that is connected to must be the
value in `dbname`.

When connecting via password (e.g., `tests::test_password_and_channel_binding` is run),
the password must be the value in `password`; furthermore `scram-sha-256` must be the
configured method of authentication. When connecting via client TLS
(e.g., `tests::test_mutual_tls` is run), the client certificate chain must be what is in
`client.crt.pem` and must be valid PEM-encoded X.509 v3 certificate chain with root certificate
recognized by PostgreSQL. The client private key must be what is in `client.key.pem` and
must be a valid PEM-encoded private key associated with the client certificate in
`client.crt.pem`.