diff options
author | Bartek IwaĆczuk <biwanczuk@gmail.com> | 2023-02-14 17:38:45 +0100 |
---|---|---|
committer | GitHub <noreply@github.com> | 2023-02-14 17:38:45 +0100 |
commit | d47147fb6ad229b1c039aff9d0959b6e281f4df5 (patch) | |
tree | 6e9e790f2b9bc71b5f0c9c7e64b95cae31579d58 /ext/node/polyfills/tls.ts | |
parent | 1d00bbe47e2ca14e2d2151518e02b2324461a065 (diff) |
feat(ext/node): embed std/node into the snapshot (#17724)
This commit moves "deno_std/node" in "ext/node" crate. The code is
transpiled and snapshotted during the build process.
During the first pass a minimal amount of work was done to create the
snapshot, a lot of code in "ext/node" depends on presence of "Deno"
global. This code will be gradually fixed in the follow up PRs to migrate
it to import relevant APIs from "internal:" modules.
Currently the code from snapshot is not used in any way, and all
Node/npm compatibility still uses code from
"https://deno.land/std/node" (or from the location specified by
"DENO_NODE_COMPAT_URL"). This will also be handled in a follow
up PRs.
---------
Co-authored-by: crowlkats <crowlkats@toaxl.com>
Co-authored-by: Divy Srivastava <dj.srivastava23@gmail.com>
Co-authored-by: Yoshiya Hinosawa <stibium121@gmail.com>
Diffstat (limited to 'ext/node/polyfills/tls.ts')
-rw-r--r-- | ext/node/polyfills/tls.ts | 65 |
1 files changed, 65 insertions, 0 deletions
diff --git a/ext/node/polyfills/tls.ts b/ext/node/polyfills/tls.ts new file mode 100644 index 000000000..b920ffc7d --- /dev/null +++ b/ext/node/polyfills/tls.ts @@ -0,0 +1,65 @@ +// Copyright 2018-2023 the Deno authors. All rights reserved. MIT license. +// Copyright Joyent and Node contributors. All rights reserved. MIT license. + +import { notImplemented } from "internal:deno_node/polyfills/_utils.ts"; +import tlsCommon from "internal:deno_node/polyfills/_tls_common.ts"; +import tlsWrap from "internal:deno_node/polyfills/_tls_wrap.ts"; + +// openssl -> rustls +const cipherMap = { + "__proto__": null, + "AES128-GCM-SHA256": "TLS13_AES_128_GCM_SHA256", + "AES256-GCM-SHA384": "TLS13_AES_256_GCM_SHA384", + "ECDHE-ECDSA-AES128-GCM-SHA256": "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256", + "ECDHE-ECDSA-AES256-GCM-SHA384": "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384", + "ECDHE-ECDSA-CHACHA20-POLY1305": + "TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256", + "ECDHE-RSA-AES128-GCM-SHA256": "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256", + "ECDHE-RSA-AES256-GCM-SHA384": "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384", + "ECDHE-RSA-CHACHA20-POLY1305": "TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256", + "TLS_AES_128_GCM_SHA256": "TLS13_AES_128_GCM_SHA256", + "TLS_AES_256_GCM_SHA384": "TLS13_AES_256_GCM_SHA384", + "TLS_CHACHA20_POLY1305_SHA256": "TLS13_CHACHA20_POLY1305_SHA256", +}; + +export function getCiphers() { + // TODO(bnoordhuis) Use locale-insensitive toLowerCase() + return Object.keys(cipherMap).map((name) => name.toLowerCase()); +} + +export const rootCertificates = undefined; +export const DEFAULT_ECDH_CURVE = "auto"; +export const DEFAULT_MAX_VERSION = "TLSv1.3"; +export const DEFAULT_MIN_VERSION = "TLSv1.2"; + +export class CryptoStream {} +export class SecurePair {} +export const Server = tlsWrap.Server; +export function createSecurePair() { + notImplemented("tls.createSecurePair"); +} + +export default { + CryptoStream, + SecurePair, + Server, + TLSSocket: tlsWrap.TLSSocket, + checkServerIdentity: tlsWrap.checkServerIdentity, + connect: tlsWrap.connect, + createSecureContext: tlsCommon.createSecureContext, + createSecurePair, + createServer: tlsWrap.createServer, + getCiphers, + rootCertificates, + DEFAULT_CIPHERS: tlsWrap.DEFAULT_CIPHERS, + DEFAULT_ECDH_CURVE, + DEFAULT_MAX_VERSION, + DEFAULT_MIN_VERSION, +}; + +export const checkServerIdentity = tlsWrap.checkServerIdentity; +export const connect = tlsWrap.connect; +export const createSecureContext = tlsCommon.createSecureContext; +export const createServer = tlsWrap.createServer; +export const DEFAULT_CIPHERS = tlsWrap.DEFAULT_CIPHERS; +export const TLSSocket = tlsWrap.TLSSocket; |