mirror of
https://github.com/denoland/deno.git
synced 2024-11-25 15:29:32 -05:00
ab1e391e1d
Closes https://github.com/denoland/deno/issues/25604 Signed-off-by: Satya Rohith <me@satyarohith.com> Co-authored-by: Satya Rohith <me@satyarohith.com>
127 lines
4.2 KiB
TypeScript
127 lines
4.2 KiB
TypeScript
// Copyright 2018-2024 the Deno authors. All rights reserved. MIT license.
|
|
// Copyright Joyent and Node contributors. All rights reserved. MIT license.
|
|
|
|
// TODO(petamoriken): enable prefer-primordials for node polyfills
|
|
// deno-lint-ignore-file prefer-primordials
|
|
|
|
import { notImplemented } from "ext:deno_node/_utils.ts";
|
|
import tlsCommon from "node:_tls_common";
|
|
import tlsWrap from "node:_tls_wrap";
|
|
import { op_get_root_certificates } from "ext:core/ops";
|
|
import { primordials } from "ext:core/mod.js";
|
|
|
|
const { ObjectFreeze } = primordials;
|
|
|
|
// openssl -> rustls
|
|
const cipherMap = {
|
|
"__proto__": null,
|
|
"AES128-GCM-SHA256": "TLS13_AES_128_GCM_SHA256",
|
|
"AES256-GCM-SHA384": "TLS13_AES_256_GCM_SHA384",
|
|
"ECDHE-ECDSA-AES128-GCM-SHA256": "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256",
|
|
"ECDHE-ECDSA-AES256-GCM-SHA384": "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384",
|
|
"ECDHE-ECDSA-CHACHA20-POLY1305":
|
|
"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256",
|
|
"ECDHE-RSA-AES128-GCM-SHA256": "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256",
|
|
"ECDHE-RSA-AES256-GCM-SHA384": "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384",
|
|
"ECDHE-RSA-CHACHA20-POLY1305": "TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256",
|
|
"TLS_AES_128_GCM_SHA256": "TLS13_AES_128_GCM_SHA256",
|
|
"TLS_AES_256_GCM_SHA384": "TLS13_AES_256_GCM_SHA384",
|
|
"TLS_CHACHA20_POLY1305_SHA256": "TLS13_CHACHA20_POLY1305_SHA256",
|
|
};
|
|
|
|
export function getCiphers() {
|
|
// TODO(bnoordhuis) Use locale-insensitive toLowerCase()
|
|
return Object.keys(cipherMap).map((name) => name.toLowerCase());
|
|
}
|
|
|
|
let lazyRootCertificates: string[] | null = null;
|
|
function ensureLazyRootCertificates(target: string[]) {
|
|
if (lazyRootCertificates === null) {
|
|
lazyRootCertificates = op_get_root_certificates() as string[];
|
|
lazyRootCertificates.forEach((v) => target.push(v));
|
|
ObjectFreeze(target);
|
|
}
|
|
}
|
|
export const rootCertificates = new Proxy([] as string[], {
|
|
// @ts-ignore __proto__ is not in the types
|
|
__proto__: null,
|
|
get(target, prop) {
|
|
ensureLazyRootCertificates(target);
|
|
return Reflect.get(target, prop);
|
|
},
|
|
ownKeys(target) {
|
|
ensureLazyRootCertificates(target);
|
|
return Reflect.ownKeys(target);
|
|
},
|
|
has(target, prop) {
|
|
ensureLazyRootCertificates(target);
|
|
return Reflect.has(target, prop);
|
|
},
|
|
getOwnPropertyDescriptor(target, prop) {
|
|
ensureLazyRootCertificates(target);
|
|
return Reflect.getOwnPropertyDescriptor(target, prop);
|
|
},
|
|
set(target, prop, value) {
|
|
ensureLazyRootCertificates(target);
|
|
return Reflect.set(target, prop, value);
|
|
},
|
|
defineProperty(target, prop, descriptor) {
|
|
ensureLazyRootCertificates(target);
|
|
return Reflect.defineProperty(target, prop, descriptor);
|
|
},
|
|
deleteProperty(target, prop) {
|
|
ensureLazyRootCertificates(target);
|
|
return Reflect.deleteProperty(target, prop);
|
|
},
|
|
isExtensible(target) {
|
|
ensureLazyRootCertificates(target);
|
|
return Reflect.isExtensible(target);
|
|
},
|
|
preventExtensions(target) {
|
|
ensureLazyRootCertificates(target);
|
|
return Reflect.preventExtensions(target);
|
|
},
|
|
setPrototypeOf() {
|
|
return false;
|
|
},
|
|
});
|
|
|
|
export const DEFAULT_ECDH_CURVE = "auto";
|
|
export const DEFAULT_MAX_VERSION = "TLSv1.3";
|
|
export const DEFAULT_MIN_VERSION = "TLSv1.2";
|
|
export const CLIENT_RENEG_LIMIT = 3;
|
|
export const CLIENT_RENEG_WINDOW = 600;
|
|
|
|
export class CryptoStream {}
|
|
export class SecurePair {}
|
|
export const Server = tlsWrap.Server;
|
|
export function createSecurePair() {
|
|
notImplemented("tls.createSecurePair");
|
|
}
|
|
|
|
export default {
|
|
CryptoStream,
|
|
SecurePair,
|
|
Server,
|
|
TLSSocket: tlsWrap.TLSSocket,
|
|
checkServerIdentity: tlsWrap.checkServerIdentity,
|
|
connect: tlsWrap.connect,
|
|
createSecureContext: tlsCommon.createSecureContext,
|
|
createSecurePair,
|
|
createServer: tlsWrap.createServer,
|
|
getCiphers,
|
|
rootCertificates,
|
|
DEFAULT_CIPHERS: tlsWrap.DEFAULT_CIPHERS,
|
|
DEFAULT_ECDH_CURVE,
|
|
DEFAULT_MAX_VERSION,
|
|
DEFAULT_MIN_VERSION,
|
|
CLIENT_RENEG_LIMIT,
|
|
CLIENT_RENEG_WINDOW,
|
|
};
|
|
|
|
export const checkServerIdentity = tlsWrap.checkServerIdentity;
|
|
export const connect = tlsWrap.connect;
|
|
export const createSecureContext = tlsCommon.createSecureContext;
|
|
export const createServer = tlsWrap.createServer;
|
|
export const DEFAULT_CIPHERS = tlsWrap.DEFAULT_CIPHERS;
|
|
export const TLSSocket = tlsWrap.TLSSocket;
|