summaryrefslogtreecommitdiff
path: root/ext/node/polyfills/tls.ts
diff options
context:
space:
mode:
authorBartek IwaƄczuk <biwanczuk@gmail.com>2023-02-14 17:38:45 +0100
committerGitHub <noreply@github.com>2023-02-14 17:38:45 +0100
commitd47147fb6ad229b1c039aff9d0959b6e281f4df5 (patch)
tree6e9e790f2b9bc71b5f0c9c7e64b95cae31579d58 /ext/node/polyfills/tls.ts
parent1d00bbe47e2ca14e2d2151518e02b2324461a065 (diff)
feat(ext/node): embed std/node into the snapshot (#17724)
This commit moves "deno_std/node" in "ext/node" crate. The code is transpiled and snapshotted during the build process. During the first pass a minimal amount of work was done to create the snapshot, a lot of code in "ext/node" depends on presence of "Deno" global. This code will be gradually fixed in the follow up PRs to migrate it to import relevant APIs from "internal:" modules. Currently the code from snapshot is not used in any way, and all Node/npm compatibility still uses code from "https://deno.land/std/node" (or from the location specified by "DENO_NODE_COMPAT_URL"). This will also be handled in a follow up PRs. --------- Co-authored-by: crowlkats <crowlkats@toaxl.com> Co-authored-by: Divy Srivastava <dj.srivastava23@gmail.com> Co-authored-by: Yoshiya Hinosawa <stibium121@gmail.com>
Diffstat (limited to 'ext/node/polyfills/tls.ts')
-rw-r--r--ext/node/polyfills/tls.ts65
1 files changed, 65 insertions, 0 deletions
diff --git a/ext/node/polyfills/tls.ts b/ext/node/polyfills/tls.ts
new file mode 100644
index 000000000..b920ffc7d
--- /dev/null
+++ b/ext/node/polyfills/tls.ts
@@ -0,0 +1,65 @@
+// Copyright 2018-2023 the Deno authors. All rights reserved. MIT license.
+// Copyright Joyent and Node contributors. All rights reserved. MIT license.
+
+import { notImplemented } from "internal:deno_node/polyfills/_utils.ts";
+import tlsCommon from "internal:deno_node/polyfills/_tls_common.ts";
+import tlsWrap from "internal:deno_node/polyfills/_tls_wrap.ts";
+
+// openssl -> rustls
+const cipherMap = {
+ "__proto__": null,
+ "AES128-GCM-SHA256": "TLS13_AES_128_GCM_SHA256",
+ "AES256-GCM-SHA384": "TLS13_AES_256_GCM_SHA384",
+ "ECDHE-ECDSA-AES128-GCM-SHA256": "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256",
+ "ECDHE-ECDSA-AES256-GCM-SHA384": "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384",
+ "ECDHE-ECDSA-CHACHA20-POLY1305":
+ "TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256",
+ "ECDHE-RSA-AES128-GCM-SHA256": "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256",
+ "ECDHE-RSA-AES256-GCM-SHA384": "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384",
+ "ECDHE-RSA-CHACHA20-POLY1305": "TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256",
+ "TLS_AES_128_GCM_SHA256": "TLS13_AES_128_GCM_SHA256",
+ "TLS_AES_256_GCM_SHA384": "TLS13_AES_256_GCM_SHA384",
+ "TLS_CHACHA20_POLY1305_SHA256": "TLS13_CHACHA20_POLY1305_SHA256",
+};
+
+export function getCiphers() {
+ // TODO(bnoordhuis) Use locale-insensitive toLowerCase()
+ return Object.keys(cipherMap).map((name) => name.toLowerCase());
+}
+
+export const rootCertificates = undefined;
+export const DEFAULT_ECDH_CURVE = "auto";
+export const DEFAULT_MAX_VERSION = "TLSv1.3";
+export const DEFAULT_MIN_VERSION = "TLSv1.2";
+
+export class CryptoStream {}
+export class SecurePair {}
+export const Server = tlsWrap.Server;
+export function createSecurePair() {
+ notImplemented("tls.createSecurePair");
+}
+
+export default {
+ CryptoStream,
+ SecurePair,
+ Server,
+ TLSSocket: tlsWrap.TLSSocket,
+ checkServerIdentity: tlsWrap.checkServerIdentity,
+ connect: tlsWrap.connect,
+ createSecureContext: tlsCommon.createSecureContext,
+ createSecurePair,
+ createServer: tlsWrap.createServer,
+ getCiphers,
+ rootCertificates,
+ DEFAULT_CIPHERS: tlsWrap.DEFAULT_CIPHERS,
+ DEFAULT_ECDH_CURVE,
+ DEFAULT_MAX_VERSION,
+ DEFAULT_MIN_VERSION,
+};
+
+export const checkServerIdentity = tlsWrap.checkServerIdentity;
+export const connect = tlsWrap.connect;
+export const createSecureContext = tlsCommon.createSecureContext;
+export const createServer = tlsWrap.createServer;
+export const DEFAULT_CIPHERS = tlsWrap.DEFAULT_CIPHERS;
+export const TLSSocket = tlsWrap.TLSSocket;