125 lines
		
	
	
		
			4.5 KiB
		
	
	
	
		
			Haxe
		
	
	
	
	
	
		
		
			
		
	
	
			125 lines
		
	
	
		
			4.5 KiB
		
	
	
	
		
			Haxe
		
	
	
	
	
	
| 
								 | 
							
								/*
							 | 
						||
| 
								 | 
							
								 * Copyright (C)2014-2020 Haxe Foundation
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * Permission is hereby granted, free of charge, to any person obtaining a
							 | 
						||
| 
								 | 
							
								 * copy of this software and associated documentation files (the "Software"),
							 | 
						||
| 
								 | 
							
								 * to deal in the Software without restriction, including without limitation
							 | 
						||
| 
								 | 
							
								 * the rights to use, copy, modify, merge, publish, distribute, sublicense,
							 | 
						||
| 
								 | 
							
								 * and/or sell copies of the Software, and to permit persons to whom the
							 | 
						||
| 
								 | 
							
								 * Software is furnished to do so, subject to the following conditions:
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * The above copyright notice and this permission notice shall be included in
							 | 
						||
| 
								 | 
							
								 * all copies or substantial portions of the Software.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
							 | 
						||
| 
								 | 
							
								 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
							 | 
						||
| 
								 | 
							
								 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
							 | 
						||
| 
								 | 
							
								 * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
							 | 
						||
| 
								 | 
							
								 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
							 | 
						||
| 
								 | 
							
								 * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
							 | 
						||
| 
								 | 
							
								 * DEALINGS IN THE SOFTWARE.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								package js.node.tls;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								import js.node.Buffer;
							 | 
						||
| 
								 | 
							
								import js.node.events.EventEmitter.Event;
							 | 
						||
| 
								 | 
							
								import js.node.tls.SecureContext.SecureContextOptions;
							 | 
						||
| 
								 | 
							
								import js.node.tls.TLSSocket;
							 | 
						||
| 
								 | 
							
								#if haxe4
							 | 
						||
| 
								 | 
							
								import js.lib.Error;
							 | 
						||
| 
								 | 
							
								#else
							 | 
						||
| 
								 | 
							
								import js.Error;
							 | 
						||
| 
								 | 
							
								#end
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
									Enumeration of events emitted by `Server` in addition to its parent classes.
							 | 
						||
| 
								 | 
							
								**/
							 | 
						||
| 
								 | 
							
								@:enum abstract ServerEvent<T:haxe.Constraints.Function>(Event<T>) to Event<T> {
							 | 
						||
| 
								 | 
							
									/**
							 | 
						||
| 
								 | 
							
										This event is emitted after a new connection has been successfully handshaked.
							 | 
						||
| 
								 | 
							
									**/
							 | 
						||
| 
								 | 
							
									var SecureConnection:ServerEvent<TLSSocket->Void> = "secureConnection";
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
									/**
							 | 
						||
| 
								 | 
							
										When a client connection emits an 'error' event before secure connection is established -
							 | 
						||
| 
								 | 
							
										it will be forwarded here.
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
										Listener arguments:
							 | 
						||
| 
								 | 
							
											exception - error object
							 | 
						||
| 
								 | 
							
											securePair - the `TLSSocket` that the error originated from
							 | 
						||
| 
								 | 
							
									**/
							 | 
						||
| 
								 | 
							
									var ClientError:ServerEvent<Error->TLSSocket->Void> = "clientError";
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
									/**
							 | 
						||
| 
								 | 
							
										Emitted on creation of TLS session.
							 | 
						||
| 
								 | 
							
										May be used to store sessions in external storage.
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
										`callback` must be invoked eventually, otherwise no data will be sent or received from secure connection.
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
										Listener arguments:
							 | 
						||
| 
								 | 
							
											sessionId
							 | 
						||
| 
								 | 
							
											sessionData
							 | 
						||
| 
								 | 
							
											callback
							 | 
						||
| 
								 | 
							
									**/
							 | 
						||
| 
								 | 
							
									var NewSession:ServerEvent<Buffer->Buffer->(Void->Void)->Void> = "newSession";
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
									/**
							 | 
						||
| 
								 | 
							
										Emitted when client wants to resume previous TLS session.
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
										Event listener may perform lookup in external storage using given sessionId,
							 | 
						||
| 
								 | 
							
										and invoke callback(null, sessionData) once finished.
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
										If session can't be resumed (i.e. doesn't exist in storage) one may call callback(null, null).
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
										Calling callback(err) will terminate incoming connection and destroy socket.
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
										Listener arguments:
							 | 
						||
| 
								 | 
							
											sessionId
							 | 
						||
| 
								 | 
							
											callback
							 | 
						||
| 
								 | 
							
									**/
							 | 
						||
| 
								 | 
							
									var ResumeSession:ServerEvent<Buffer->(Error->?Buffer->Void)->Void> = "resumeSession";
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
									/**
							 | 
						||
| 
								 | 
							
										Emitted when the client sends a certificate status request.
							 | 
						||
| 
								 | 
							
										You could parse server's current certificate to obtain OCSP url and certificate id,
							 | 
						||
| 
								 | 
							
										and after obtaining OCSP response invoke `callback(null, resp)`, where `resp` is a `Buffer` instance.
							 | 
						||
| 
								 | 
							
										Both certificate and issuer are a Buffer DER-representations of the primary and issuer's certificates.
							 | 
						||
| 
								 | 
							
										They could be used to obtain OCSP certificate id and OCSP endpoint url.
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
										Alternatively, `callback(null, null)` could be called, meaning that there is no OCSP response.
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
										Calling `callback(err)` will result in a `socket.destroy(err)` call.
							 | 
						||
| 
								 | 
							
									**/
							 | 
						||
| 
								 | 
							
									var OCSPRequest:ServerEvent<Buffer->Buffer->(Error->?Buffer->Void)->Void> = "OCSPRequest";
							 | 
						||
| 
								 | 
							
								}
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
									This class is a subclass of `net.Server` and has the same methods on it.
							 | 
						||
| 
								 | 
							
									Instead of accepting just raw TCP connections, this accepts encrypted connections using TLS or SSL.
							 | 
						||
| 
								 | 
							
								**/
							 | 
						||
| 
								 | 
							
								@:jsRequire("tls", "Server")
							 | 
						||
| 
								 | 
							
								extern class Server extends js.node.net.Server {
							 | 
						||
| 
								 | 
							
									/**
							 | 
						||
| 
								 | 
							
										Returns `Buffer` instance holding the keys currently used for encryption/decryption of the TLS Session Tickets.
							 | 
						||
| 
								 | 
							
									**/
							 | 
						||
| 
								 | 
							
									function getTicketKeys():Buffer;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
									/**
							 | 
						||
| 
								 | 
							
										Updates the keys for encryption/decryption of the TLS Session Tickets.
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
										NOTE: the buffer should be 48 bytes long. See server `ticketKeys` option for
							 | 
						||
| 
								 | 
							
										more information on how it is going to be used.
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
										NOTE: the change is effective only for the future server connections. Existing or currently pending
							 | 
						||
| 
								 | 
							
										server connections will use previous keys.
							 | 
						||
| 
								 | 
							
									**/
							 | 
						||
| 
								 | 
							
									function setTicketKeys(keys:Buffer):Void;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
									/**
							 | 
						||
| 
								 | 
							
										Add secure context that will be used if client request's SNI hostname
							 | 
						||
| 
								 | 
							
										is matching passed hostname (wildcards can be used).
							 | 
						||
| 
								 | 
							
									**/
							 | 
						||
| 
								 | 
							
									function addContext(hostname:String, credentials:SecureContextOptions):Void;
							 | 
						||
| 
								 | 
							
								}
							 |