use security_framework::trust_settings::{
Domain,
TrustSettings,
TrustSettingsForCertificate
};
use rustls::RootCertStore;
use std::io::{Error, ErrorKind};
use std::collections::HashMap;
use crate::PartialResult;
pub fn load_native_certs() -> PartialResult<RootCertStore, Error> {
let mut store = RootCertStore::empty();
let mut all_certs = HashMap::new();
for domain in &[Domain::User, Domain::Admin, Domain::System] {
let ts = TrustSettings::new(*domain);
let iter = ts.iter()
.map_err(|err| (None, Error::new(ErrorKind::Other, err)))?;
for cert in iter {
let der = cert.to_der();
let trusted = ts.tls_trust_settings_for_certificate(&cert)
.map_err(|err| (None, Error::new(ErrorKind::Other, err)))?
.unwrap_or(TrustSettingsForCertificate::TrustRoot);
all_certs.entry(der)
.or_insert(trusted);
}
}
let mut first_error = None;
for (der, trusted) in all_certs.drain() {
match trusted {
TrustSettingsForCertificate::TrustRoot |
TrustSettingsForCertificate::TrustAsRoot => {
match store.add(&rustls::Certificate(der)) {
Err(err) => {
first_error = first_error
.or_else(|| Some(Error::new(ErrorKind::InvalidData, err)));
}
_ => {}
};
},
_ => {} }
}
if let Some(err) = first_error {
if store.is_empty() {
Err((None, err))
} else {
Err((Some(store), err))
}
} else {
Ok(store)
}
}