// Copyright 2018-2024 the Deno authors. All rights reserved. MIT license. pub use deno_native_certs; pub use rustls; use rustls::pki_types::CertificateDer; use rustls::pki_types::PrivateKeyDer; use rustls::pki_types::ServerName; pub use rustls_pemfile; pub use rustls_tokio_stream::*; pub use webpki; pub use webpki_roots; use rustls::client::danger::HandshakeSignatureValid; use rustls::client::danger::ServerCertVerified; use rustls::client::danger::ServerCertVerifier; use rustls::client::WebPkiServerVerifier; use rustls::ClientConfig; use rustls::DigitallySignedStruct; use rustls::RootCertStore; use rustls_pemfile::certs; use rustls_pemfile::ec_private_keys; use rustls_pemfile::pkcs8_private_keys; use rustls_pemfile::rsa_private_keys; use serde::Deserialize; use std::io::BufRead; use std::io::BufReader; use std::io::Cursor; use std::net::IpAddr; use std::sync::Arc; mod tls_key; pub use tls_key::*; #[derive(Debug, thiserror::Error)] pub enum TlsError { #[error(transparent)] Rustls(#[from] rustls::Error), #[error("Unable to add pem file to certificate store: {0}")] UnableAddPemFileToCert(std::io::Error), #[error("Unable to decode certificate")] CertInvalid, #[error("No certificates found in certificate data")] CertsNotFound, #[error("No keys found in key data")] KeysNotFound, #[error("Unable to decode key")] KeyDecode, } /// Lazily resolves the root cert store. /// /// This was done because the root cert store is not needed in all cases /// and takes a bit of time to initialize. pub trait RootCertStoreProvider: Send + Sync { fn get_or_try_init( &self, ) -> Result<&RootCertStore, deno_core::error::AnyError>; } // This extension has no runtime apis, it only exports some shared native functions. deno_core::extension!(deno_tls); #[derive(Debug)] pub struct NoCertificateVerification { pub ic_allowlist: Vec, default_verifier: Arc, } impl NoCertificateVerification { pub fn new(ic_allowlist: Vec) -> Self { Self { ic_allowlist, default_verifier: WebPkiServerVerifier::builder( create_default_root_cert_store().into(), ) .build() .unwrap(), } } } impl ServerCertVerifier for NoCertificateVerification { fn supported_verify_schemes(&self) -> Vec { self.default_verifier.supported_verify_schemes() } fn verify_server_cert( &self, end_entity: &rustls::pki_types::CertificateDer<'_>, intermediates: &[rustls::pki_types::CertificateDer<'_>], server_name: &rustls::pki_types::ServerName<'_>, ocsp_response: &[u8], now: rustls::pki_types::UnixTime, ) -> Result { if self.ic_allowlist.is_empty() { return Ok(ServerCertVerified::assertion()); } let dns_name_or_ip_address = match server_name { ServerName::DnsName(dns_name) => dns_name.as_ref().to_owned(), ServerName::IpAddress(ip_address) => { Into::::into(*ip_address).to_string() } _ => { // NOTE(bartlomieju): `ServerName` is a non-exhaustive enum // so we have this catch all errors here. return Err(rustls::Error::General( "Unknown `ServerName` variant".to_string(), )); } }; if self.ic_allowlist.contains(&dns_name_or_ip_address) { Ok(ServerCertVerified::assertion()) } else { self.default_verifier.verify_server_cert( end_entity, intermediates, server_name, ocsp_response, now, ) } } fn verify_tls12_signature( &self, message: &[u8], cert: &rustls::pki_types::CertificateDer, dss: &DigitallySignedStruct, ) -> Result { if self.ic_allowlist.is_empty() { return Ok(HandshakeSignatureValid::assertion()); } filter_invalid_encoding_err( self .default_verifier .verify_tls12_signature(message, cert, dss), ) } fn verify_tls13_signature( &self, message: &[u8], cert: &rustls::pki_types::CertificateDer, dss: &DigitallySignedStruct, ) -> Result { if self.ic_allowlist.is_empty() { return Ok(HandshakeSignatureValid::assertion()); } filter_invalid_encoding_err( self .default_verifier .verify_tls13_signature(message, cert, dss), ) } } #[derive(Deserialize, Default, Debug, Clone)] #[serde(rename_all = "camelCase")] #[serde(default)] pub struct Proxy { pub url: String, pub basic_auth: Option, } #[derive(Deserialize, Default, Debug, Clone)] #[serde(default)] pub struct BasicAuth { pub username: String, pub password: String, } pub fn create_default_root_cert_store() -> RootCertStore { let root_cert_store = rustls::RootCertStore { roots: webpki_roots::TLS_SERVER_ROOTS.to_vec(), }; debug_assert!(!root_cert_store.is_empty()); root_cert_store } pub enum SocketUse { /// General SSL: No ALPN GeneralSsl, /// HTTP: h1 and h2 Http, /// http/1.1 only Http1Only, /// http/2 only Http2Only, } pub fn create_client_config( root_cert_store: Option, ca_certs: Vec>, unsafely_ignore_certificate_errors: Option>, maybe_cert_chain_and_key: TlsKeys, socket_use: SocketUse, ) -> Result { if let Some(ic_allowlist) = unsafely_ignore_certificate_errors { let client_config = ClientConfig::builder() .dangerous() .with_custom_certificate_verifier(Arc::new( NoCertificateVerification::new(ic_allowlist), )); // NOTE(bartlomieju): this if/else is duplicated at the end of the body of this function. // However it's not really feasible to deduplicate it as the `client_config` instances // are not type-compatible - one wants "client cert", the other wants "transparency policy // or client cert". let mut client = match maybe_cert_chain_and_key { TlsKeys::Static(TlsKey(cert_chain, private_key)) => client_config .with_client_auth_cert(cert_chain, private_key.clone_key()) .expect("invalid client key or certificate"), TlsKeys::Null => client_config.with_no_client_auth(), TlsKeys::Resolver(_) => unimplemented!(), }; add_alpn(&mut client, socket_use); return Ok(client); } let mut root_cert_store = root_cert_store.unwrap_or_else(create_default_root_cert_store); // If custom certs are specified, add them to the store for cert in ca_certs { let reader = &mut BufReader::new(Cursor::new(cert)); // This function does not return specific errors, if it fails give a generic message. for r in rustls_pemfile::certs(reader) { match r { Ok(cert) => { root_cert_store.add(cert)?; } Err(e) => { return Err(TlsError::UnableAddPemFileToCert(e)); } } } } let client_config = ClientConfig::builder().with_root_certificates(root_cert_store); let mut client = match maybe_cert_chain_and_key { TlsKeys::Static(TlsKey(cert_chain, private_key)) => client_config .with_client_auth_cert(cert_chain, private_key.clone_key()) .expect("invalid client key or certificate"), TlsKeys::Null => client_config.with_no_client_auth(), TlsKeys::Resolver(_) => unimplemented!(), }; add_alpn(&mut client, socket_use); Ok(client) } fn add_alpn(client: &mut ClientConfig, socket_use: SocketUse) { match socket_use { SocketUse::Http1Only => { client.alpn_protocols = vec!["http/1.1".into()]; } SocketUse::Http2Only => { client.alpn_protocols = vec!["h2".into()]; } SocketUse::Http => { client.alpn_protocols = vec!["h2".into(), "http/1.1".into()]; } SocketUse::GeneralSsl => {} }; } pub fn load_certs( reader: &mut dyn BufRead, ) -> Result>, TlsError> { let certs: Result, _> = certs(reader).collect(); let certs = certs.map_err(|_| TlsError::CertInvalid)?; if certs.is_empty() { return Err(TlsError::CertsNotFound); } Ok(certs) } /// Starts with -----BEGIN RSA PRIVATE KEY----- fn load_rsa_keys( mut bytes: &[u8], ) -> Result>, TlsError> { let keys: Result, _> = rsa_private_keys(&mut bytes).collect(); let keys = keys.map_err(|_| TlsError::KeyDecode)?; Ok(keys.into_iter().map(PrivateKeyDer::Pkcs1).collect()) } /// Starts with -----BEGIN EC PRIVATE KEY----- fn load_ec_keys( mut bytes: &[u8], ) -> Result>, TlsError> { let keys: Result, std::io::Error> = ec_private_keys(&mut bytes).collect(); let keys2 = keys.map_err(|_| TlsError::KeyDecode)?; Ok(keys2.into_iter().map(PrivateKeyDer::Sec1).collect()) } /// Starts with -----BEGIN PRIVATE KEY----- fn load_pkcs8_keys( mut bytes: &[u8], ) -> Result>, TlsError> { let keys: Result, std::io::Error> = pkcs8_private_keys(&mut bytes).collect(); let keys2 = keys.map_err(|_| TlsError::KeyDecode)?; Ok(keys2.into_iter().map(PrivateKeyDer::Pkcs8).collect()) } fn filter_invalid_encoding_err( to_be_filtered: Result, ) -> Result { match to_be_filtered { Err(rustls::Error::InvalidCertificate( rustls::CertificateError::BadEncoding, )) => Ok(HandshakeSignatureValid::assertion()), res => res, } } pub fn load_private_keys( bytes: &[u8], ) -> Result>, TlsError> { let mut keys = load_rsa_keys(bytes)?; if keys.is_empty() { keys = load_pkcs8_keys(bytes)?; } if keys.is_empty() { keys = load_ec_keys(bytes)?; } if keys.is_empty() { return Err(TlsError::KeysNotFound); } Ok(keys) }