Add option to accept invalid server certificates (fixes #3)

This commit is contained in:
Jonas Herzig 2019-02-05 13:29:03 +01:00
parent d7dca0b84b
commit 8950e30690

View file

@ -18,6 +18,7 @@ extern crate tokio_tungstenite;
extern crate tungstenite; extern crate tungstenite;
extern crate webrtc_sdp; extern crate webrtc_sdp;
use argparse::StoreTrue;
use argparse::{ArgumentParser, Store}; use argparse::{ArgumentParser, Store};
use byteorder::{BigEndian, ByteOrder}; use byteorder::{BigEndian, ByteOrder};
use bytes::{Buf, BufMut, BytesMut, IntoBuf}; use bytes::{Buf, BufMut, BytesMut, IntoBuf};
@ -49,6 +50,7 @@ use error::Error;
fn main() { fn main() {
let mut ws_port = 0_u16; let mut ws_port = 0_u16;
let mut upstream = "".to_string(); let mut upstream = "".to_string();
let mut accept_invalid_certs = false;
{ {
let mut ap = ArgumentParser::new(); let mut ap = ArgumentParser::new();
@ -67,6 +69,12 @@ fn main() {
"Hostname and port of upstream mumble server", "Hostname and port of upstream mumble server",
) )
.required(); .required();
ap.refer(&mut accept_invalid_certs).add_option(
&["--accept-invalid-certificate"],
StoreTrue,
"Connect to upstream server even when its certificate is invalid.
Only ever use this if know that your server is using a self-signed certificate!",
);
ap.parse_args_or_exit(); ap.parse_args_or_exit();
} }
@ -97,7 +105,7 @@ fn main() {
.from_err() .from_err()
.and_then(move |stream| { .and_then(move |stream| {
let connector: TlsConnector = native_tls::TlsConnector::builder() let connector: TlsConnector = native_tls::TlsConnector::builder()
//.danger_accept_invalid_certs(true) .danger_accept_invalid_certs(accept_invalid_certs)
.build() .build()
.unwrap() .unwrap()
.into(); .into();